1.
A technician can successfully remote into the company's server, however, the technician cannot connect to any of the other servers directories from the server itself, but can ping them via an IP address. Which of the following could be the problem?
Correct Answer
B. DNS is not correctly configured.
Explanation
The technician is able to successfully remote into the company's server, indicating that there is no issue with the physical network or VLAN configuration. Additionally, the technician is able to ping the other servers via their IP addresses, suggesting that there is no problem with DHCP configuration. However, the technician is unable to connect to the other servers' directories, indicating that there may be an issue with resolving the server names to their corresponding IP addresses. This suggests that DNS is not correctly configured, causing the problem.
2.
A user is unable to connect to the network. A network technician is able to determine that there is a problem on the switch. All other users on that switch are able to connect successfully to the network. Which of the following is a probable cause?
Correct Answer
D. Port is misconfigured on the switch.
Explanation
The probable cause for the user being unable to connect to the network while others on the same switch can connect successfully is a misconfiguration of the port on the switch. This means that the specific port that the user is connected to may have incorrect settings or configurations that are preventing a successful connection.
3.
Which of the following characteristics BEST describe SMF? (Select TWO).
Correct Answer(s)
A. Can be used for distances exceeding 2 kilometers (1.24 miles).
C. Uses laser light for transmission.
Explanation
SMF, or Single Mode Fiber, is a type of optical fiber that can be used for long distances, exceeding 2 kilometers. It uses laser light for transmission, which allows for higher bandwidth and longer transmission distances compared to other types of fiber. Additionally, SMF is known to have a higher cost compared to MMF, or Multimode Fiber. Therefore, the characteristics that best describe SMF are that it can be used for distances exceeding 2 kilometers and uses laser light for transmission.
4.
Which of the following would be used to connect a vertical cross connect when using data connections?
Correct Answer
C. Patch panel
Explanation
A patch panel would be used to connect a vertical cross connect when using data connections. A patch panel acts as a central point where multiple data cables can be terminated and organized. It allows for easy management and flexibility in connecting and disconnecting different devices or equipment. By using patch cables, connections can be easily made from the patch panel to the desired destination, such as switches or routers. This helps in organizing and maintaining the network infrastructure efficiently.
5.
Which of the following tools would be used to test the break in a fiber connection on the network?
Correct Answer
D. OTDR
Explanation
An OTDR (Optical Time-Domain Reflectometer) is a tool used to test the break in a fiber connection on a network. It sends a laser pulse into the fiber and measures the reflections to determine the location and severity of any breaks or faults. This allows technicians to accurately locate and troubleshoot issues in the fiber optic network. A butt set is used for testing telephone lines, a multimeter is used to measure electrical properties, and a toner probe is used to trace and identify cables.
6.
Which of the following network devices would be responsible for translating canonical names into IP addresses?
Correct Answer
C. A DNS server
Explanation
A DNS server is responsible for translating canonical names into IP addresses. DNS stands for Domain Name System, and it is a system that translates domain names (such as www.example.com) into IP addresses (such as 192.168.1.1) that computers can understand. When a user types a domain name into a web browser, the DNS server is responsible for finding the corresponding IP address and directing the user to the correct website.
7.
When all routers in a network agree about the path from one point to another, the network is said to be which of the following?
Correct Answer
B. Converged
Explanation
When all routers in a network agree about the path from one point to another, the network is said to be "converged". This means that all routers have reached a consensus on the best route to take, ensuring efficient and reliable communication between the two points.
8.
Which of the following would be used to relocate a T1 closer to the switch for connectivity?
Correct Answer
D. Smart jack
Explanation
A smart jack would be used to relocate a T1 closer to the switch for connectivity. A smart jack is a device that is used to terminate a T1 line and provide connectivity to the switch. It is typically located near the switch and allows for easy access and troubleshooting of the T1 connection. Using a smart jack would allow for a shorter distance between the T1 and the switch, improving connectivity and reducing signal loss.
9.
An organization with 2,500 users has exhausted their Internet bandwidth. After some investigation, the network administrator discovers that 95%of the traffic is coming from web browsing. Which of the following network devices could be added to BEST reduce the amount of Internet bandwidth the company is using?
Correct Answer
C. Proxy server
Explanation
A proxy server can be added to the network to reduce the amount of Internet bandwidth being used. A proxy server acts as an intermediary between the users and the Internet. It can cache frequently accessed web pages and files, reducing the need for multiple users to download the same content from the Internet. This can help to conserve bandwidth and improve network performance. By routing web browsing traffic through the proxy server, the organization can effectively reduce the amount of Internet bandwidth being consumed by web browsing activities.
10.
Which of the following subnet masks will produce the smallest subnet size for a pointtopoint network link?
Correct Answer
C. 255.255.255.252
Explanation
The subnet mask 255.255.255.252 will produce the smallest subnet size for a point-to-point network link. This is because a subnet mask of 255.255.255.252 allows for only 2 usable IP addresses in the subnet, which is the minimum number required for a point-to-point link. The other subnet masks listed allow for larger subnet sizes and more usable IP addresses.
11.
Which of the following documentation would a network administrator refer to discover a rogue WAP?
Correct Answer
C. Baseline
Explanation
A network administrator would refer to a baseline documentation to discover a rogue WAP. A baseline is a set of standards and measurements that define the normal operating conditions of a network. By comparing the baseline with the current network conditions, any deviations or anomalies can be identified, including the presence of a rogue WAP. The baseline documentation provides a reference point for the network administrator to ensure the network is operating within expected parameters and to detect any unauthorized devices or configurations.
12.
Which of the following Will allow an administrator to restrict communication between network devices?
Correct Answer
D. ACL
Explanation
ACL stands for Access Control List. It is a security feature that allows an administrator to restrict communication between network devices. ACLs can be used to control network traffic by specifying which packets are allowed to pass through a network interface and which are denied. By configuring ACLs, administrators can define rules and policies to filter and control the flow of data within a network, enhancing security and preventing unauthorized access.
13.
For an enterprise to use one of the reserved private IP address ranges, as best practice they should coordinate with:
Correct Answer
A. Their IT department.
Explanation
When an enterprise wants to use one of the reserved private IP address ranges, it is best practice to coordinate with their IT department. The IT department is responsible for managing and maintaining the organization's network infrastructure, including IP address allocation. They have the knowledge and expertise to ensure that the chosen IP address range does not conflict with existing network resources and can provide guidance on best practices for IP address management within the organization. Coordinating with the IT department helps to maintain the integrity and stability of the network.
14.
Which of the following is the maximum transmission distance of 10GBase-LR?
Correct Answer
A. 6 miles (9.7 kilometers)
Explanation
The maximum transmission distance of 10GBase-LR is 6 miles (9.7 kilometers). This standard is designed for long-range fiber optic connections and can transmit data up to a distance of 6 miles. It is commonly used in applications where there is a need for high-speed and long-distance communication, such as in data centers or telecommunications networks.
15.
A company has many traveling sales employees that need secure access to corporate resources from nontrusted devices (e.g. computers at client sites and/or public computers). Which VPN solution is MOST appropriate for this company?
Correct Answer
A. SSL
Explanation
SSL (Secure Sockets Layer) VPN is the most appropriate solution for the company's traveling sales employees who need secure access to corporate resources from nontrusted devices. SSL VPN uses encryption and authentication protocols to establish a secure connection between the employee's device and the corporate network. It allows employees to access resources through a web browser without requiring any additional software installation, making it convenient for accessing corporate resources from client sites or public computers. Additionally, SSL VPN provides granular access control, ensuring that only authorized individuals can access specific resources.
16.
Which of the following commands would provide the following output?DNS request timed out. timeout was 2 seconds.*** Cant find server name for address 172.30.0.5: Timed out*** Default servers are not availableServer: UnKnownAddress: 172.30.0.5DNS request timed out. timeout was 2 seconds.*** Request to UnKnown timedout
Correct Answer
B. Nslookup
Explanation
The correct answer is nslookup because nslookup is a command-line tool used to query Domain Name System (DNS) to obtain domain name or IP address mapping. In this case, the output provided indicates that there was a DNS request timeout and the server name for the given address could not be found. This aligns with the purpose of nslookup, which is to perform DNS queries and obtain information about DNS records.
17.
A technician is troubleshooting a switch and has identified the symptoms. Which of the following steps should the technician take NEXT?
Correct Answer
B. Determine the scope of the problem
Explanation
The technician should determine the scope of the problem next in order to understand the extent of the issue. This step will help the technician in identifying the specific areas of the switch that are affected and the potential causes of the problem. By determining the scope, the technician can then proceed to implement an appropriate solution and create an action plan for reconfiguring the switch. Escalating the issue or implementing and testing the solution without first determining the scope may result in ineffective troubleshooting and potential further complications.
18.
Which of the following transfers data at a maximum rate of 44.7Mbps?
Correct Answer
A. T3
Explanation
T3 refers to a type of telecommunications line that can transmit data at a maximum rate of 44.7Mbps. This makes it the correct answer to the question. T2, T5, and T1 are other types of telecommunications lines, but they do not have the same maximum data transfer rate as T3.
19.
A technician is asked tore-terminate a wall jack that has become loose. Upon looking at the wiring, the technician notices that it was originally wired as 568A. The company implemented a policy stating that all cable terminations should adhere to the 568B standard. With this in mind the technician should:
Correct Answer
A. Re-terminate both ends of the cable to the 568B standard.
Explanation
The technician should re-terminate both ends of the cable to the 568B standard because the company implemented a policy stating that all cable terminations should adhere to the 568B standard. Since the wall jack has become loose, it is necessary to fix it by re-terminating both ends of the cable to ensure a secure and proper connection.
20.
When using the ping utility, which switch pings a network device until stopped?
Correct Answer
A. Ping-t
Explanation
The correct answer is "ping -t". When using the ping utility, the "-t" switch is used to continuously ping a network device until it is manually stopped. This is useful for monitoring the network connection and checking for any interruptions or delays in communication.
21.
Which of the following cables would a technician make in order to identify a physical interface problem?
Correct Answer
D. Loopback
Explanation
A loopback cable is used to test the functionality of a physical interface by creating a loop within the device itself. When the loopback cable is connected, the device sends signals to itself, allowing the technician to determine if the physical interface is functioning properly. This helps in identifying any physical interface problems such as faulty connectors, cables, or ports.
22.
A client is able to ping its default gateway, but is unable to communicate with a remote host. Which of the following utilities would the technicianuse to determine where the fault is?
Correct Answer
C. Traceroute
Explanation
The technician would use the traceroute utility to determine where the fault is. Traceroute is used to trace the route that packets take from the client to the remote host, showing each hop along the way. By analyzing the output of traceroute, the technician can identify any network devices or connections that may be causing the communication issue.
23.
Which of the following is an example of secure tunneling?
Correct Answer
B. SSL VPN
Explanation
SSL VPN is an example of secure tunneling because it uses Secure Sockets Layer (SSL) encryption to create a secure and encrypted connection between the client and the VPN server. This ensures that the data transmitted between the client and the server is protected from unauthorized access and eavesdropping. SSL VPNs are commonly used to provide remote access to corporate networks and to secure communication over public networks such as the internet.
24.
Which of the following cable types is used in a 100Base-FX network?
Correct Answer
D. Fiber
Explanation
Fiber optic cable is used in a 100Base-FX network. This type of cable is specifically designed for high-speed data transmission over long distances. It uses light signals to transmit data, which allows for faster and more reliable communication compared to other cable types like UTP, coaxial, or STP. Fiber optic cables are also immune to electromagnetic interference, making them ideal for use in networking environments.
25.
A technician receives a call on monday morning that several computers will not connect to the network. The technician determines that the computers left on over the weekend are functional and those that were turned off over the weekend are not functioning. Which of the following is the MOST likely source of the problem?
Correct Answer
D. DHCP is not functioning.
Explanation
The fact that the computers left on over the weekend are functional while those that were turned off are not functioning suggests that the issue lies with the dynamic host configuration protocol (DHCP). DHCP is responsible for assigning IP addresses to computers on a network. If DHCP is not functioning, the computers that were turned off over the weekend would not have been able to obtain an IP address and therefore cannot connect to the network. Restarting WINS, fixing DNS, or LDAP would not address this specific issue.
26.
To forward traffic from a host with the IP address of 10.0.0.100/25 to10.0.0.200/25 which of the following devices will be required?
Correct Answer
A. A router
Explanation
To forward traffic from one IP address to another IP address, a router is required. A router is a networking device that connects different networks and forwards data packets between them. It examines the destination IP address of incoming packets and determines the best path to forward them to the intended destination. In this scenario, to forward traffic from the host with the IP address 10.0.0.100/25 to 10.0.0.200/25, a router would be needed to route the packets between the two hosts. A layer 2 switch and a hub are not designed to perform routing functions, and a DNS server is used for domain name resolution, not for forwarding traffic between IP addresses.
27.
Which of the following technologies do the 802.11 networks utilize to prevent packet collisions?
Correct Answer
D. CSMA/CA
Explanation
802.11 networks utilize CSMA/CA (Carrier Sense Multiple Access with Collision Avoidance) to prevent packet collisions. This technology allows devices to sense the wireless medium before transmitting data, and if it is busy, they wait for a random period of time before attempting to transmit again. This helps to avoid collisions and ensures that data is transmitted successfully in a shared network environment.
28.
Which of the following protocols uses port 22 by default?
Correct Answer
D. SSH
Explanation
SSH (Secure Shell) is a protocol used for secure remote login and file transfer. It uses port 22 by default to establish a secure connection between the client and the server. FTP (File Transfer Protocol) uses port 21, DNS (Domain Name System) uses port 53, and Telnet uses port 23. Therefore, the correct answer is SSH.
29.
Which of the following protocols permits secure polling of network devices?
Correct Answer
C. SNMPv3
Explanation
SNMPv3 is the correct answer because it is an updated version of the Simple Network Management Protocol (SNMP) that provides enhanced security features. SNMPv3 supports authentication, encryption, and access control, making it suitable for secure polling of network devices. SCP (Secure Copy Protocol) is used for secure file transfer, while SSH (Secure Shell) is used for secure remote access. SNMPv2 is an older version of SNMP and does not offer the same level of security as SNMPv3.
30.
Which of the following commands is used to provide the output below in a Windows environment?
1 * * * Request timed out.
2 * * * Request timed out.
3 * * * Request timed out.
Correct Answer
C. Tracert
Explanation
The correct answer is tracert. Tracert is a command used in Windows to trace the route taken by packets across an IP network. It sends a series of ICMP Echo Request messages to each hop along the path to a destination, and displays the round-trip time for each hop. In the given output, the "Request timed out" message indicates that the packets sent to the destination did not receive a response within the specified time limit. This can be useful in troubleshooting network connectivity issues.
31.
Which of the following traffic types would a network layer firewall be unable to filter?
Correct Answer
D. Email sender verification
Explanation
A network layer firewall operates at the network layer of the OSI model and is primarily responsible for filtering and controlling network traffic based on IP addresses, ports, and protocols. SMTP traffic, HTTP traffic, and ICMP messages are all types of network traffic that can be filtered by a network layer firewall. However, email sender verification is not a type of network traffic that can be filtered at the network layer. It is a process that involves checking the authenticity of the sender's email address, which typically occurs at the application layer of the OSI model. Therefore, a network layer firewall would be unable to filter email sender verification.
32.
Which of the following protocols would a multilayer switch use to learn the IP address of a directly connecte device?
Correct Answer
A. ARP
Explanation
A multilayer switch would use the ARP (Address Resolution Protocol) to learn the IP address of a directly connected device. ARP is used to map an IP address to a MAC address in a local network. When a device wants to communicate with another device on the same network, it uses ARP to find the MAC address associated with the IP address of the destination device. This allows the multilayer switch to build and maintain its ARP table, which is used for forwarding network traffic efficiently.
33.
Two servers and five workstations are connected using a 100BASE-T network. Which of the following physical topologies is used?
Correct Answer
D. Star
Explanation
A star topology is used in this scenario where two servers and five workstations are connected using a 100BASE-T network. In a star topology, all devices are connected to a central hub or switch. This central hub acts as a central point of communication, allowing each device to communicate directly with the hub. This topology provides a high level of reliability and scalability as each device has its own dedicated connection to the central hub, minimizing network downtime and allowing for easy addition or removal of devices.
34.
A company's network is wired in a bus topology and one of the computers is unable to access the network. Which of the following is the FIRST step in the troubleshooting process?
Correct Answer
C. Check the cable connections.
Explanation
The first step in troubleshooting a network issue in a bus topology is to check the cable connections. This is because a loose or faulty cable connection can often cause connectivity problems. By checking the cable connections, you can ensure that all the devices are properly connected and that there are no loose or damaged cables. If the cable connections are found to be fine, then further troubleshooting steps can be taken, such as checking the NIC driver or replacing the cable.
35.
Which of the following network segments is located outside the firewall?
Correct Answer
C. DMZ
Explanation
A DMZ (Demilitarized Zone) is a network segment that is located outside the firewall. It acts as a buffer zone between the internal network and the external network, providing an additional layer of security. The DMZ is used to host servers that need to be accessible from the internet, such as web servers or email servers. By placing these servers in the DMZ, it reduces the risk of unauthorized access to the internal network if the server is compromised. Therefore, the correct answer is DMZ.
36.
To support roaming across a wireless 802.11g network, each access point should be configured to use which of the following?
Correct Answer
C. The same SSID
Explanation
For roaming across a wireless 802.11g network, it is important for each access point to be configured to use the same SSID (Service Set Identifier). The SSID is a unique identifier that allows devices to connect to a specific wireless network. By using the same SSID, devices can seamlessly transition from one access point to another without having to reconnect or reconfigure their network settings. This ensures a smooth and uninterrupted connection as users move throughout the network coverage area.
37.
Which of the following would a technician use a punch down tool on?
Correct Answer
C. 110 block
Explanation
A technician would use a punch down tool on a 110 block. A 110 block is a type of punch down block used to connect and terminate network cables. The punch down tool is used to insert the individual wires into the corresponding slots on the 110 block, creating a secure and reliable connection. The RJ-45 connector is typically used for Ethernet connections, the ST connector is used for fiber optic connections, and the smart jack is a type of network interface device.
38.
Two small companies sharing a switch would MOST likely benefit from which of the following advanced switch features?
Correct Answer
D. VLAN
Explanation
Two small companies sharing a switch would most likely benefit from VLAN (Virtual Local Area Network) feature. VLAN allows the switch to divide a single physical network into multiple virtual networks, providing separate broadcast domains and improving network security. With VLAN, each company can have its own isolated network within the shared switch, ensuring privacy and preventing interference between the two companies' devices. This feature allows for better network management, scalability, and flexibility in terms of network configuration and resource allocation.
39.
Which of the following is the maximum speed available from a full T1 line?
Correct Answer
A. 1.544Mbps
Explanation
A full T1 line has a maximum speed of 1.544Mbps. This is a standard data transmission rate for digital telecommunication services.
40.
A technician is connecting two buildings located approximately 1969 feet (600 meters) apart on the same campus. Primary objectives are to create a secure link that that is capable of transmitting at 1Gbps. Which of the following would be the BEST way to connect these two buildings?
Correct Answer
A. Fiber optic cable
Explanation
Fiber optic cable would be the best way to connect the two buildings located 1969 feet apart on the same campus because it can provide a secure and high-speed connection capable of transmitting at 1Gbps. Fiber optic cables use light signals to transmit data, which allows for faster and more reliable communication compared to other options like point-to-point wireless link, CAT6 cable, or RG-58 cable. Additionally, fiber optic cables are less susceptible to interference and can support longer distances without signal degradation.
41.
An Ethernet LAN has several trunk links passing near heavy machinery resulting in EMI. Which of the following Ethernet media types should be used to avoid interference?
Correct Answer
D. 100Base-FX
Explanation
100Base-FX should be used to avoid interference in an Ethernet LAN near heavy machinery because it uses fiber optic cables which are immune to electromagnetic interference (EMI). Fiber optic cables do not conduct electricity and therefore do not generate or pick up electromagnetic signals, making them ideal for environments with high levels of EMI.
42.
Which of the following software types would BEST be used for identifying an attack?
Correct Answer
A. IDS
Explanation
An IDS (Intrusion Detection System) would be the best software type for identifying an attack. IDS monitors network traffic and analyzes it for any signs of malicious activity or unauthorized access attempts. It can detect and alert administrators about potential attacks, allowing them to take appropriate action to prevent further damage. IPS (Intrusion Prevention System) is similar to IDS but also has the ability to actively block or prevent attacks. A packet sniffer is a tool used to capture and analyze network traffic, but it may not specifically focus on identifying attacks. A port scanner is used to identify open ports on a network, but it may not provide comprehensive attack identification capabilities.
43.
A packet sniffer has been placed on a network and shows client A is sending TCP SYN packets to server B. Which of the following packets should be sent from server B in response?
Correct Answer
B. SYN-ACK
Explanation
When client A sends TCP SYN packets to server B, it is initiating a connection request. In response, server B should send a SYN-ACK packet. This packet acknowledges the receipt of the SYN packet and also includes its own SYN flag to establish a connection. This is part of the TCP three-way handshake process, where the client sends a SYN packet, the server responds with a SYN-ACK packet, and finally, the client sends an ACK packet to complete the connection establishment.
44.
Which of the following Ethernet technologies has the shortest transmission distance?
Correct Answer
B. 10GBase-T
Explanation
10GBase-T has the shortest transmission distance among the given Ethernet technologies. This is because 10GBase-T uses twisted pair copper cables for transmission, which have a limited distance capability compared to other technologies. 10GBase-SR, on the other hand, uses fiber optic cables and can transmit data over longer distances. Therefore, 10GBase-T is the correct answer.
45.
A network technician is implementing new wireless access points in an existing wireless infrastructure. The security is the WPA 2 standard. Which of the following encryption methods may not be compatible with the previously installed access points?
Correct Answer
C. AES
Explanation
AES (Advanced Encryption Standard) is a strong encryption method that is commonly used in wireless networks. It is compatible with the WPA 2 standard and can be used with the existing wireless access points. Therefore, the encryption method that may not be compatible with the previously installed access points is not AES.
46.
In a Class C subnet, a network ID may occupy a maximum of:
Correct Answer
A. 24bits
Explanation
In a Class C subnet, the network ID may occupy a maximum of 24 bits. This means that the first 24 bits of the IP address are used to identify the network, while the remaining 8 bits are used to identify the hosts within that network. This allows for a maximum of 256 (2^8) hosts in a Class C subnet.
47.
A 100 pair cable is typically used to connect:
Correct Answer
A. TelepHony distribution.
Explanation
A 100 pair cable is typically used to connect telephony distribution because telephony distribution systems often require a large number of connections. A 100 pair cable has 100 individual pairs of wires, which allows for a high number of connections to be made. This is necessary in telephony distribution systems where multiple telephone lines need to be connected and distributed to various locations.
48.
Which of the following utilities will produce the results printed below?TCP Certs03:1072 172.31.0.78:3389 Established
Correct Answer
A. Netstat
Explanation
Netstat is the correct answer because it is a utility that displays active network connections and listening ports on a computer. It provides information about the protocol, local and remote IP addresses, and the state of the connection. In this case, the output "TCP Certs03:1072 172.31.0.78:3389 Established" indicates an established TCP connection between the local host Certs03 on port 1072 and the remote IP address 172.31.0.78 on port 3389.
49.
A technician is asked to place wireless Internet access in an open warehouse environment. After installing the equipment the technician notices varying signal strengths at different locations. Which of the following should the technician consider to increase the consistency of the signal strength?
Correct Answer
B. Change the antenna placement
Explanation
To increase the consistency of the signal strength in an open warehouse environment, the technician should consider changing the antenna placement. This is because the varying signal strengths at different locations indicate that the current antenna placement may not be optimal for providing a consistent signal throughout the warehouse. By strategically relocating the antennas, the technician can potentially improve the coverage and signal strength in areas that are currently experiencing weak or inconsistent signals.
50.
Which of the following actions should the administrator do FIRST to help access a gigabit connection?
Correct Answer
C. Change the CAT5 cable to a CAT6 cable.
Explanation
Changing the CAT5 cable to a CAT6 cable would be the first step to help access a gigabit connection. CAT6 cables are designed to support higher bandwidth and faster data transmission compared to CAT5 cables. This upgrade would ensure that the network is capable of handling the increased speed and performance requirements of a gigabit connection.