1.
QUESTION NO: 451
Which of the following would a technician need to install to connect a fiber NIC to an Ethernet backbone?
Correct Answer
B. Media converter
Explanation
A technician would need to install a media converter to connect a fiber NIC to an Ethernet backbone. A media converter is a device that converts the signals between fiber optic cables and Ethernet cables, allowing for the transmission of data between the two types of networks. This is necessary because fiber optic cables use light signals to transmit data, while Ethernet cables use electrical signals. Therefore, a media converter is needed to convert the signals from one type to another, enabling the connection between the fiber NIC and the Ethernet backbone.
2.
QUESTION NO: 452
Which of the following protocols describes a connectionless state and does not use acknowledgements?
Correct Answer
B. UDP
Explanation
UDP (User Datagram Protocol) is a connectionless protocol that does not use acknowledgements. It is a simple, lightweight protocol that operates at the transport layer of the OSI model. UDP does not establish a connection before sending data and does not guarantee the delivery of packets. It is commonly used for applications that require low latency and can tolerate packet loss, such as streaming media and online gaming. Unlike TCP, which is a connection-oriented protocol that ensures reliable data transmission, UDP is faster but less reliable.
3.
QUESTION NO: 453
Which of the following protocols maps an IP address to a MAC address?
Correct Answer
D. ARP
Explanation
ARP (Address Resolution Protocol) is the correct answer because it is a protocol used to map an IP address to a MAC address. It is responsible for finding the MAC address of a device on a local network when only the IP address is known. ARP operates at the data link layer of the OSI model and is used by devices to communicate with each other on a local network.
4.
QUESTION NO:454
Which of the following utilities shows the relationship between a MAC address and the corresponding IP address?
Correct Answer
A. Arp
Explanation
The utility that shows the relationship between a MAC address and the corresponding IP address is "arp". The Address Resolution Protocol (ARP) is used to map an IP address to a MAC address in a local network. It allows devices to communicate with each other by resolving the IP address to the corresponding MAC address. This is essential for sending data packets across the network.
5.
QUESTION NO: 455
A network technician has discovered that passwords are being sent unencrypted over the network. Which of the following network monitoring utilities was used?
Correct Answer
B. Packet sniffer
Explanation
A packet sniffer is a network monitoring utility that captures and analyzes network traffic. It allows the network technician to intercept and examine the packets being sent over the network, including any unencrypted passwords. By using a packet sniffer, the technician can identify any security vulnerabilities and take appropriate measures to secure the network.
6.
QUESTION NO: 456
Which of the following advanced features prevents switching loops by using a preferred path?
Correct Answer
A. Spanning tree
Explanation
The correct answer is Spanning tree. Spanning tree is an advanced feature that prevents switching loops by creating a loop-free logical topology. It does this by selectively blocking redundant paths and allowing only a preferred path for data transmission. This ensures that there are no loops in the network, which can cause broadcast storms and degrade network performance. VLAN, port bonding, and port authentication are not specifically designed to prevent switching loops.
7.
QUESTION NO: 457
Which of the following port numbers does SSH use?
Correct Answer
B. 22
Explanation
SSH (Secure Shell) is a network protocol used for secure remote login and file transfer. It operates on port number 22, which is the correct answer. Port number 21 is used for FTP (File Transfer Protocol), port number 23 is used for Telnet, and port number 20 is used for FTP data transfer.
8.
QUESTION NO: 458
Which of the following protocols will help reduce multicast flooding on a layer 2 switch?
Correct Answer
A. IGMP
Explanation
IGMP (Internet Group Management Protocol) is a protocol that helps reduce multicast flooding on a layer 2 switch. It allows hosts to join and leave multicast groups, and it enables switches to only forward multicast traffic to ports where hosts have expressed an interest in receiving it. By using IGMP, switches can effectively control and limit the propagation of multicast traffic, reducing unnecessary flooding and improving network efficiency.
9.
QUESTION NO: 459
Which of the following command line utilities is used to display the IP to Physical address table?
Correct Answer
B. Arp
Explanation
The correct answer is "arp". The Address Resolution Protocol (ARP) is used to map an IP address to its corresponding physical (MAC) address. The "arp" command line utility is used to display the IP to physical address table, which contains the mappings between IP addresses and MAC addresses in a network.
10.
QUESTION NO: 460
A network administrator is developing a solution that will allow a new remote site with 400 users access to the Internet using only one public routable IP address. The solution must allow for direct user access to the Internet. Which of the following technologies is the BEST to implement?
Correct Answer
C. PAT
Explanation
The best technology to implement in this scenario is Port Address Translation (PAT). PAT allows multiple private IP addresses to be translated into a single public IP address, allowing all 400 users at the remote site to access the Internet using only one public routable IP address. VPN (Virtual Private Network) is used for secure remote access, DHCP (Dynamic Host Configuration Protocol) is used for assigning IP addresses, and DNS (Domain Name System) is used for translating domain names into IP addresses. However, none of these technologies specifically address the requirement of allowing direct user access to the Internet with only one public IP address.
11.
QUESTION NO: 461
A network technician has addressed an issue where many workstations have lost network connectivity, but is not able to establish the most probable cause. Which of the following steps should be taken next to resolve this issue?
Correct Answer
A. Escalate the issue to a senior network associate.
Explanation
Escalating the issue to a senior network associate is the next step because the network technician has already tried to troubleshoot the problem but was unable to determine the most probable cause. By involving a senior network associate, who has more experience and expertise, the issue can be resolved more effectively. Rebooting the computer or documenting possible causes may not be necessary at this point since the technician has already tried basic troubleshooting steps and determining if anything has changed is not mentioned as a step to be taken next.
12.
QUESTION NO: 462
The optimal transmission speed for a CAT5 network cable in a main distribution frame (MDF) is:
Correct Answer
D. 100Mbps.
Explanation
The optimal transmission speed for a CAT5 network cable in a main distribution frame (MDF) is 100Mbps. CAT5 cables are capable of supporting speeds up to 100Mbps, making it the most suitable option among the given choices. Higher speed options, such as 1000Mbps, would require a higher category cable, such as CAT6. Therefore, 100Mbps is the correct answer for the given scenario.
13.
QUESTION NO: 463
A client purchases a new wireless printer and wants to be able to bond it to their PDA. Which of the following technologies BEST describes the type of wireless printer that was purchased?
Correct Answer
A. Bluetooth
Explanation
The client purchased a wireless printer that can be bonded to their PDA. Bluetooth is the technology that allows devices to connect and communicate wirelessly over short distances. It is commonly used for connecting peripherals such as printers to mobile devices like PDAs. WiFi, IEEE 1394 (FireWire), and 802.11a are other wireless technologies, but they are not specifically designed for printer-PDA connectivity like Bluetooth is.
14.
QUESTION NO: 464
Which of the following defines the main purpose of dynamic routing?
Correct Answer
A. Adapts quickly to network changes without manual entries.
Explanation
Dynamic routing is a method of automatically updating and adjusting routing tables in response to changes in the network topology. It allows the network to adapt quickly to changes without the need for manual intervention or configuration. This ensures that the network remains efficient and functional even as the network changes over time. By automatically updating routing tables, dynamic routing enables the network to find the most optimal paths for data transmission, reducing potential delays and improving overall network performance.
15.
QUESTION NO: 465
How many DSOs are used in a T1?
Correct Answer
A. 24
Explanation
A T1 line is a digital transmission line that carries data at a rate of 1.544 Mbps. Each T1 line is divided into 24 channels, with each channel capable of carrying 64 Kbps of data. These channels are called Digital Signal 0 (DS0) channels. Therefore, the correct answer is 24, as there are 24 DSOs used in a T1 line.
16.
QUESTION NO: 466
Which of the following authentication protocols uses plain text to transmit passwords over the internet?
Correct Answer
B. PAP
Explanation
PAP (Password Authentication Protocol) is an authentication protocol that uses plain text to transmit passwords over the internet. This means that the passwords are not encrypted or protected, making them vulnerable to interception and unauthorized access. PAP is considered to be a weak authentication protocol and is not recommended for use in secure environments.
17.
QUESTION NO: 467
A technician is setting up a public server for their company. The lP address of the server is 19.19.0.1. Which of the following is the default subnet mask for the server?
Correct Answer
D. 255.0.0.0
Explanation
The default subnet mask for the given IP address 19.19.0.1 is 255.0.0.0. This is because the IP address falls within the range of Class A addresses, which have a default subnet mask of 255.0.0.0. This subnet mask allows for a large number of network addresses and a smaller number of host addresses.
18.
QUESTION NO: 468
Which of the following is a client-server based authentication software system which maintains user profiles in a central database?
Correct Answer
C. RADIUS
Explanation
RADIUS is a client-server based authentication software system that maintains user profiles in a central database. It is commonly used in network access authentication and authorization. RADIUS stands for Remote Authentication Dial-In User Service and it allows users to authenticate their identities before accessing a network. The user profiles are stored in a central database, making it easier to manage and control access to the network.
19.
QUESTION NO: 469
Which of the following protocols uses port 443?
Correct Answer
C. HTTPS
Explanation
HTTPS (Hypertext Transfer Protocol Secure) is the correct answer because it uses port 443. This protocol is an extension of HTTP and is used for secure communication over a computer network. It encrypts the data transmitted between a web server and a web browser, ensuring that it cannot be intercepted or tampered with by unauthorized individuals. Port 443 is the default port for HTTPS, allowing for secure communication between clients and servers.
20.
QUESTION NO: 470
When creating a fault tolerant switched network, which of the following will allow for loops in the switched topology while preventing a broadcast storm?
Correct Answer
A. Spanning tree protocol
Explanation
The Spanning Tree Protocol (STP) is used to prevent loops in a switched network while allowing for fault tolerance. STP creates a loop-free logical topology by blocking redundant paths and selecting a root bridge. It ensures that there is only one active path between any two network devices, preventing broadcast storms caused by endless loops. STP constantly monitors the network and dynamically adjusts the topology to maintain loop-free connectivity in the event of link failures or additions. This allows for a fault-tolerant network without compromising network performance or causing broadcast storms.
21.
QUESTION NO: 471
On a wireless network, a user is able to connect to local resources, but not to the Internet. Which of the following is the MOST likely cause?
Correct Answer
D. The gateway is not configured on the router.
Explanation
The most likely cause for the user being able to connect to local resources but not the internet on a wireless network is that the gateway is not configured on the router. The gateway is the device that connects the local network to the internet, and if it is not properly configured on the router, the user will not be able to access the internet. This issue is specific to the router's configuration and does not involve the wireless network card or its range, or the DHCP settings on the router.
22.
QUESTION NO: 472
Which of the following wiring standards is depicted below?
Pin 1 WhiteOrange Pin 2 Orange
Pin 3 White Green Pin 4 Blue
Pin 5 White Blue Pin 6 Green
Pin 7 White Brown Pin 8 Brown
Correct Answer
D. 568B
Explanation
The given wiring standard is 568B. This can be determined by looking at the order of the colored wires on each pin. In the 568B standard, the order is as follows: Pin 1 WhiteOrange, Pin 2 Orange, Pin 3 White Green, Pin 4 Blue, Pin 5 White Blue, Pin 6 Green, Pin 7 White Brown, Pin 8 Brown. This matches the given sequence, confirming that it is 568B wiring standard.
23.
QUESTION NO: 473
Which of the following would a technician find 568B standard?
Correct Answer
C. Wiring schematic
Explanation
A technician would find the 568B standard in a wiring schematic. The 568B standard is a specification for the wiring of Ethernet cables, specifically for the arrangement of the wires within the cable's connector. A wiring schematic would provide a visual representation of how the wires should be connected according to the 568B standard. This standard ensures that network cables are wired consistently and correctly, allowing for proper communication and data transmission within a network.
24.
QUESTION NO: 474
Which of the following network devices routes packets over a wireless network?
Correct Answer
B. WAP
Explanation
A Wireless Access Point (WAP) is a network device that routes packets over a wireless network. It acts as a central hub for wireless devices to connect to a wired network. WAPs enable wireless communication by receiving and transmitting data between wireless devices and the network. They provide a wireless connection to the internet or a local area network (LAN) by creating a wireless hotspot. WAPs are commonly used in homes, offices, and public spaces to provide wireless internet access.
25.
QUESTION NO: 475
Which of the following protocols is used to access files on a remote server?
Correct Answer
C. FTP
Explanation
FTP (File Transfer Protocol) is the correct answer because it is a standard network protocol used to transfer files from one host to another over a TCP-based network, such as the internet. FTP allows users to access and manipulate files on a remote server, making it the appropriate protocol for accessing files on a remote server. ARP (Address Resolution Protocol) is used for mapping an IP address to a physical (MAC) address, SIP (Session Initiation Protocol) is used for initiating, modifying, and terminating multimedia communication sessions, and NTP (Network Time Protocol) is used for synchronizing the clocks of computers over a network.
26.
QUESTION NO: 476
Which of the following is the MOST secure access method?
Correct Answer
B. SFTP
Explanation
SFTP (Secure File Transfer Protocol) is the most secure access method among the options provided. Unlike RSH (Remote Shell), SFTP encrypts the data being transferred, ensuring confidentiality. Additionally, SFTP uses SSH (Secure Shell) for authentication and secure communication, providing a higher level of security compared to RCP (Remote Copy) and SNMPv1 (Simple Network Management Protocol version 1). Therefore, SFTP is the most secure option for accessing and transferring files.
27.
QUESTION NO: 477
After adding a new cable segment to the network, the technician should:
Correct Answer
B. Update the wiring schematics.
Explanation
After adding a new cable segment to the network, it is important for the technician to update the wiring schematics. This is because the wiring schematics provide a visual representation of the network's physical layout and connections. By updating the wiring schematics, the technician ensures that the documentation accurately reflects the current state of the network, making it easier for future troubleshooting, maintenance, and expansion. Documenting the changes in the business continuity plan, creating a new baseline document, or updating the disaster recovery plan may also be important tasks, but they are not directly related to the addition of a new cable segment.
28.
QUESTION NO: 478
A VoIP telephone with a built-in hub is plugged into a single network using both the hub port and the telephone port. The network begins to experience severe lag due to a significant increase in traffic. Which of the following features would help to prevent this from occurring in the future?
Correct Answer
C. Spanning tree
Explanation
Spanning tree is a protocol that prevents loops and ensures a loop-free logical topology in a network. In this scenario, the severe lag is likely caused by a loop created by connecting the VoIP telephone with both the hub port and the telephone port. By implementing spanning tree, the protocol will detect and disable one of the redundant connections, preventing the loop and resolving the lag issue. This feature will help to prevent such occurrences in the future.
29.
QUESTION NO: 479
An administrator needs to find out a specific NICs MAC address, the IP address of the MC is known. Which of the following network utilities would enable the administrator to discover the MAC address without physically going to the computer?
Correct Answer
D. Arp
Explanation
The correct answer is "arp". The Address Resolution Protocol (ARP) is a network protocol used to map an IP address to a MAC address. By using the ARP command, the administrator can query the ARP cache on the MC (Management Console) to find the MAC address associated with a specific IP address without needing to physically go to the computer.
30.
QUESTION NO: 480
Which of the following devices is used for connecting multiple network hosts where the physical signal is always repeated to all ports?
Correct Answer
C. Hub
Explanation
A hub is a device used for connecting multiple network hosts where the physical signal is always repeated to all ports. Unlike a switch, which intelligently routes data to specific ports based on the destination MAC address, a hub simply broadcasts all incoming data to all connected devices. This means that all devices connected to a hub will receive all data packets, regardless of whether they are the intended recipient or not.
31.
QUESTION NO: 481 Which of the following can an application layer firewall filter that a network layer firewall cannot?
Correct Answer
A. HTTP URLs
Explanation
An application layer firewall can filter HTTP URLs, while a network layer firewall cannot. This is because an application layer firewall operates at the application layer of the OSI model, which allows it to inspect and filter specific application protocols, such as HTTP. On the other hand, a network layer firewall operates at the network layer, which primarily focuses on filtering based on IP addresses and ports. Therefore, it does not have the capability to filter HTTP URLs specifically.
32.
QUESTION NO: 482
A recently installed wireless router needs to be configured to have the highest level of security. Which of the following would MOST likely be used?
Correct Answer
C. WPA
Explanation
WPA (Wi-Fi Protected Access) is the most likely option for configuring a wireless router with the highest level of security. WPA is an encryption protocol that provides stronger security than WEP (Wired Equivalent Privacy). WPA uses a stronger encryption algorithm and provides better protection against unauthorized access to the wireless network. It also supports key rotation, which enhances security by changing encryption keys at regular intervals. Therefore, WPA is the preferred choice for securing wireless networks.
33.
QUESTION NO: 483
Which of the following command line tools would BEST be used to verify DNS functionality?
Correct Answer
C. Dig
Explanation
The command line tool "dig" is the best option for verifying DNS functionality. "dig" stands for Domain Information Groper and is used to query DNS servers for information about a specific domain. It can be used to check if a domain name is resolving correctly, if the DNS records are set up correctly, and to troubleshoot any DNS issues. It provides detailed information about DNS responses, such as the IP address associated with a domain name, the DNS server that provided the response, and the time it took to receive the response.
34.
QUESTION NO: 484
A company has one headquarters location and ten remote sites. The remote sites do not need to communicate with each other, just with headquarters. Which of the following is the BEST topology to use?
Correct Answer
D. Star
Explanation
In a star topology, all remote sites are connected to the headquarters location. This allows for efficient communication between each remote site and the headquarters, as all traffic flows through a central point. Since the remote sites do not need to communicate with each other, a star topology is the best choice as it simplifies the network design and reduces complexity.
35.
QUESTION NO: 485
A tool that is used to capture usernames and passwords on the network is known as a:
Correct Answer
C. Sniffer
Explanation
A sniffer is a tool used to capture usernames and passwords on the network. It is designed to intercept and analyze network traffic, allowing an attacker to capture sensitive information such as login credentials. Unlike a honey pot, which is a decoy system used to attract and deceive attackers, a sniffer actively intercepts and captures data. A firewall is a network security device that monitors and filters incoming and outgoing network traffic. A proxy server is an intermediary between a client and a server, used for various purposes including caching, filtering, and anonymity.
36.
QUESTION NO: 486
An administrator is implementing a new wireless network. Which of the following is the highest level of wireless encryption that the administrator can run?
Correct Answer
B. WPA2 AES
Explanation
WPA2 AES is the highest level of wireless encryption that the administrator can run. AES (Advanced Encryption Standard) is a symmetric encryption algorithm that provides a high level of security. WPA2 (Wi-Fi Protected Access 2) is the latest and most secure protocol for wireless networks. It uses AES encryption to protect the data transmitted over the network, making it difficult for unauthorized users to intercept and decode the information. WEP (Wired Equivalent Privacy) and WPA2 TKIP (Temporal Key Integrity Protocol) are older and less secure encryption methods compared to WPA2 AES.
37.
QUESTION NO: 487
A technician is troubleshooting connectivity issues on a clients machine. The technician needs to see the current NetBIOS configuration and open connections, which of the following commands would allow
this information to be displayed?
Correct Answer
A. Nbtstat
Explanation
The correct answer is nbtstat. This command is used to display the current NetBIOS configuration and open connections on a machine. It provides information about NetBIOS over TCP/IP (NetBT) protocol statistics, NetBIOS name tables for both local and remote computers, and current NetBIOS sessions. This command is commonly used for troubleshooting network connectivity issues and diagnosing NetBIOS-related problems.
38.
QUESTION NO: 488
The below output is from which of the following utilities? Interface: 172.30.0.104 --- 0x2 Internet Address
Physical AddressType 172.30.0.500-30-48-82-72-8c dynamic 172.30.0.25400-30-48-82-65-0e
dynamic
Correct Answer
B. Arp
Explanation
The given output shows the IP addresses and corresponding physical addresses (MAC addresses) of devices on the network. This information is obtained using the Address Resolution Protocol (ARP) utility. ARP is used to map an IP address to its corresponding MAC address, allowing devices to communicate with each other on a local network.
39.
QUESTION NO: 489
The below output is from which of the following utilities?
Active Connections Prato Local Address
Foreign Address
State TCP COMPUTER1:1085 172.30.0.5:3389
ESTABLISHED TCP COMPUTER1:1089172.30.0.5-microsoft-dsTIME WAIT
Correct Answer
D. Netstat
Explanation
The given output is from the "netstat" utility. Netstat is a command-line network utility tool that displays active network connections and listening ports on a computer. It provides information about the local address, foreign address, and state of each connection. In the given output, we can see the active TCP connections with their local and foreign addresses, as well as their states (ESTABLISHED and TIME WAIT).
40.
QUESTION NO: 490
A technician is troubleshooting the phone service at a site. The technician tests one of the connections on the 66 block and no dial tone is present. Which of the following would be the BEST tool to test the connection at the demarcation point?
Correct Answer
A. Butt set
Explanation
A butt set is the best tool to test the connection at the demarcation point because it allows the technician to directly connect to the phone line and listen for a dial tone. It can also be used to test for noise on the line and check for proper voltage levels. A cable tester is used to test the integrity of network cables, not phone lines. A multimeter is used to measure voltage, current, and resistance, but it does not provide the same level of functionality as a butt set for testing phone lines. A toner probe is used to trace and identify cables, but it does not test for dial tone or other phone line issues.