1.
When the DHCP server is unavailable for a network, how will PCs attempt to configure their NICs?
Correct Answer
C. PCs will use APIPA
Explanation
When the DHCP server is unavailable for a network, PCs will attempt to configure their NICs using APIPA (Automatic Private IP Addressing). APIPA allows PCs to automatically assign themselves a private IP address within a specific range (169.254.0.1 to 169.254.255.254) when a DHCP server is not available. This allows the PCs to continue communicating on the network using a self-assigned IP address until the DHCP server becomes available again.
2.
A company plans to implement a wired network between several computers. The company wants
this network to be able to have a transmission rate of 1Gbps. Which of the following cable types
should be purchased?
Correct Answer
D. CAT5e
Explanation
CAT5e should be purchased because it is capable of supporting a transmission rate of 1Gbps. Coaxial and CAT3 cables are not capable of achieving this speed.
3.
Which of the following remote access methods allows an administrator to take control of a user's
machine and block the user from seeing the active session?
Correct Answer
C. RDP
Explanation
RDP (Remote Desktop Protocol) is a remote access method that allows an administrator to take control of a user's machine and block the user from seeing the active session. RDP provides a graphical interface for the administrator to access and control the user's desktop remotely. This can be useful for troubleshooting or performing tasks on the user's machine without interrupting their work or allowing them to see what is happening on their screen.
4.
Which of the following devices separates a LAN segment into two collision domains, without
affecting the broadcast domain?
Correct Answer
B. Bridge
Explanation
A bridge is a device that separates a LAN segment into two collision domains without affecting the broadcast domain. It does this by examining the MAC addresses of the frames passing through it and forwarding them only to the appropriate segment. By doing so, it reduces collisions and improves network performance within each segment. Unlike a router, a bridge operates at the data link layer of the OSI model and does not create separate broadcast domains. A firewall is a security device that filters network traffic, and a repeater simply amplifies and extends the signal.
5.
At which of the following layers does the TCP protocol operate?
Correct Answer
B. Layer4
Explanation
The TCP (Transmission Control Protocol) operates at Layer 4 of the OSI model, which is the Transport Layer. This layer is responsible for establishing and maintaining reliable end-to-end connections between hosts, ensuring the ordered and error-free delivery of data packets. TCP provides features like flow control, congestion control, and error detection to ensure reliable transmission of data over IP networks.
6.
Which of the following applications is MOST likely to require QoS to ensure proper functionality?
Correct Answer
B. VoIP
Explanation
VoIP (Voice over Internet Protocol) is the most likely application to require Quality of Service (QoS) to ensure proper functionality. QoS is necessary for VoIP because it prioritizes and manages network traffic to provide a consistent and reliable voice communication experience. VoIP relies on real-time audio transmission, and any delay, jitter, or packet loss can significantly degrade call quality. QoS helps to prioritize VoIP traffic over other less time-sensitive data, ensuring that voice packets are delivered with minimal delay and maximum quality.
7.
Which of the following ports does POP3 services use, by default?
Correct Answer
B. 110
Explanation
POP3 (Post Office Protocol version 3) is a protocol used for receiving email messages from a mail server. By default, POP3 services use port 110. This port is specifically designated for POP3 communication, allowing clients to connect to the mail server and retrieve their emails. Port 25 is used for SMTP (Simple Mail Transfer Protocol), which is responsible for sending emails. Port 143 is used for IMAP (Internet Message Access Protocol), another protocol for receiving emails. Port 443 is used for HTTPS (Hypertext Transfer Protocol Secure), which is a secure version of HTTP used for encrypted communication.
8.
In which of the following layers of the OSI model does the TCP protocol operate?
Correct Answer
D. Transport
Explanation
The TCP protocol operates in the Transport layer of the OSI model. The Transport layer is responsible for ensuring reliable communication between end systems. TCP (Transmission Control Protocol) is a connection-oriented protocol that provides reliable and ordered delivery of data packets. It handles the segmentation, reassembly, and flow control of data, ensuring that data is delivered accurately and efficiently.
9.
A network technician wants to use a packet analyzer to troubleshoot a reported problem with a
user's workstation with IP address 192.168.1.45. To identify the workstation's packets the
technician wants to use the workstation's MAC address. Which of the following protocols would
provide the needed information?
Correct Answer
B. ARP
Explanation
The Address Resolution Protocol (ARP) would provide the needed information. ARP is used to map an IP address to a MAC address on a local network. In this case, the network technician can use ARP to obtain the MAC address of the workstation with the IP address 192.168.1.45, which will help identify the workstation's packets in the packet analyzer.
10.
A workstation is having connectivity issues when being added to the domain. Which of the
following commands would allow the administrator to see the DNS and WINS servers that are
currently configured for the workstation?
Correct Answer
A. Ipconfig
Explanation
The correct answer is "Ipconfig." The Ipconfig command is used to display the IP configuration settings of a network interface on a Windows computer. By running the Ipconfig command, the administrator can view the DNS (Domain Name System) and WINS (Windows Internet Name Service) servers that are currently configured for the workstation. This information can help identify any connectivity issues related to the domain.
11.
In order for computers with private IP addresses to access the public Internet, which of the
following must the router perform?
Correct Answer
A. NAT
Explanation
The router must perform Network Address Translation (NAT) in order for computers with private IP addresses to access the public Internet. NAT allows the router to translate the private IP addresses of the computers into a single public IP address that can be recognized and routed on the Internet. This allows multiple devices on a private network to share a single public IP address, conserving IP address space and providing a level of security by hiding the private IP addresses from the public network.
12.
A new department is formed and a new section of the building is being built out for them. All 50
new employees will need access to the wireless network. Which of the following should be
completed to allow these new employees access to the wireless network?
Correct Answer
B. Additional WAPs should be installed
Explanation
To allow the new employees access to the wireless network, additional WAPs (Wireless Access Points) should be installed. This is because the existing WAPs may not have enough coverage or capacity to accommodate the increased number of users. By installing additional WAPs, the network will be able to handle the increased demand and provide reliable and efficient wireless connectivity to all 50 new employees.
13.
Which of the following is a secure method of remote access via command line?
Correct Answer
D. SSH
Explanation
SSH (Secure Shell) is a secure method of remote access via command line. Unlike Telnet, RCP, and RSH, SSH provides encryption and authentication, ensuring that the connection between the client and the server is secure. It uses cryptographic techniques to protect the data transmitted over the network, making it a reliable and secure method for remote access and management of systems.
14.
Which of the following protocols is commonly used for VoIP technology?
Correct Answer
C. SIP
Explanation
SIP (Session Initiation Protocol) is commonly used for VoIP (Voice over Internet Protocol) technology. SIP is an application-layer protocol that establishes, modifies, and terminates multimedia sessions such as voice and video calls over IP networks. It is designed to enable communication between devices and applications in a flexible and scalable manner. Telnet is a remote login protocol, SMTP is an email protocol, and SNMP is a network management protocol, none of which are directly related to VoIP technology.
15.
Which of the following protocols can be found at the application layer?
Correct Answer
A. Telnet
Explanation
Telnet is a protocol that operates at the application layer. It allows a user to remotely access and control a device or computer over a network. This protocol provides a virtual terminal session, allowing users to interact with the remote device as if they were physically present. Telnet is commonly used for remote administration, troubleshooting, and configuring network devices. Unlike TCP and UDP, which operate at the transport layer, Telnet is specifically designed for application layer communication. SNMP (Simple Network Management Protocol) is also an application layer protocol, but the correct answer is Telnet.
16.
Which of the following processes translates a private IP address for a public IP address?
Correct Answer
A. NAT
Explanation
NAT (Network Address Translation) is the process that translates a private IP address to a public IP address. It allows multiple devices on a private network to share a single public IP address when communicating with devices on the internet. NAT modifies the IP header of outgoing packets, replacing the private IP address with the public IP address, and vice versa for incoming packets, enabling communication between the private and public networks. DNS (Domain Name System) is responsible for translating domain names to IP addresses, DHCP (Dynamic Host Configuration Protocol) assigns IP addresses to devices on a network, and PAT (Port Address Translation) is a variant of NAT that translates both IP addresses and port numbers.
17.
Which of the following logical network topologies is used to provide a secure connection across
the Internet?
Correct Answer
D. VPN
Explanation
A VPN (Virtual Private Network) is used to provide a secure connection across the Internet. It creates a private network over a public network, such as the Internet, allowing users to securely access and transmit data. VPNs use encryption and tunneling protocols to ensure that data is protected and secure from unauthorized access. This makes VPNs an ideal choice for organizations or individuals who need to connect to a network remotely while maintaining privacy and security.
18.
An administrator replaced a router with a switch. End users are able to access network shares but are not able to access the Internet. Which of the following is the BEST explanation why the users
are unable to access the Internet?
Correct Answer
A. Router routes traffic between different networks and a switch does not
Explanation
A switch is a networking device that connects devices within a local network, while a router is responsible for routing traffic between different networks. In this scenario, the administrator replaced the router with a switch, which means that the switch is not capable of routing traffic between the local network and the Internet. Therefore, the users are unable to access the Internet because the switch does not have the functionality to route traffic to the Internet.
19.
Which of the following is a hybrid network topology used for fault tolerance, in which all computers
MUST connect to each other?
Correct Answer
D. Mesh
Explanation
A mesh network topology is a type of network configuration where each computer or device is connected to every other device in the network. This ensures fault tolerance as if one connection fails, there are multiple alternate paths for data transmission. This redundancy provides high reliability and fault tolerance, making mesh topology suitable for critical systems where uninterrupted connectivity is crucial.
20.
Which of the following cable types is intended to be used on short distances and is immune to any
type of interference?
Correct Answer
B. Multimode fiber
Explanation
Multimode fiber is the correct answer because it is designed to be used on short distances and is immune to any type of interference. Unlike singlemode fiber, which is better suited for longer distances, multimode fiber allows multiple light rays to travel simultaneously through the core, resulting in higher data transmission rates. Additionally, multimode fiber is less susceptible to interference compared to shielded twisted pair and unshielded twisted pair cables, which are commonly used for Ethernet connections.
21.
The technician notices that one of the wires in a CAT5 cable is cut in half. Which of the following
connectivity issues did the technician discover?
Correct Answer
A. Open pairs
Explanation
The technician discovered open pairs connectivity issues. Open pairs refer to a situation where one or more wires in a cable are cut or disconnected, resulting in a loss of connectivity. In this case, one of the wires in the CAT5 cable is cut in half, causing a break in the connection and leading to connectivity issues.
22.
An administrator attempts to open a web page and sees the following error: 'Error 404: Page not
found'. The administrator then uses the ping command and finds that the default gateway cannot
be pinged. At which of the following layers does the problem MOST likely reside?
Correct Answer
A. Layer 1
Explanation
The problem most likely resides at Layer 1, the physical layer. This is because the administrator is unable to ping the default gateway, indicating a connectivity issue at the lowest level of the network stack. Layer 1 deals with the physical transmission of data, such as cables, connectors, and network interface cards. If the default gateway cannot be pinged, it suggests a problem with the physical connection between the administrator's device and the gateway.
23.
What information can the Netstat command line utility provide?
Correct Answer
D. Displays all open connections along with protocols and ports used
Explanation
The Netstat command line utility can provide information about all open connections on a system, including the protocols and ports being used. This can be useful for troubleshooting network connectivity issues or identifying any unauthorized connections. It does not verify local and remote connectivity, identify routers, or display IP address configuration information.
24.
Other than segmentation what other service do both TCP and UDP provide for the upper layer protocols?
Correct Answer
D. Provide service addressing
Explanation
Both TCP and UDP provide service addressing for the upper layer protocols. This means that they allow the upper layer protocols to identify the specific service or application that they want to communicate with on a remote host. This is important for establishing a connection and ensuring that the data is sent to the correct destination.
25.
Where can a client system get an IP address and the associated information from? (choose 2)
Correct Answer(s)
A. DHCP server
C. Network Administrator
Explanation
A client system can obtain an IP address and associated information from a DHCP server. DHCP (Dynamic Host Configuration Protocol) is a network protocol that automatically assigns IP addresses to client devices on a network. The DHCP server is responsible for managing and distributing IP addresses to client systems. Additionally, a network administrator can also provide an IP address and associated information manually to a client system if necessary.
26.
L2TP and PPTP are protocols associated with what service?
Correct Answer
D. VPN
Explanation
L2TP (Layer 2 Tunneling Protocol) and PPTP (Point-to-Point Tunneling Protocol) are both protocols that are commonly used in VPN (Virtual Private Network) services. VPNs allow users to securely connect to a private network over a public network, such as the internet. L2TP and PPTP are used to establish and maintain the secure tunnel between the user's device and the VPN server, ensuring that data transmitted over the connection remains encrypted and protected from unauthorized access. Therefore, the correct answer is VPN.
27.
Which secure command line utility is used for remote management of a cisco router or switch?
Correct Answer
B. SSH
Explanation
SSH (Secure Shell) is the correct answer because it is a secure command line utility used for remote management of a Cisco router or switch. Telnet is not secure as it transmits data in plain text, making it vulnerable to eavesdropping. RDP (Remote Desktop Protocol) is used for remote desktop access, not specifically for managing Cisco devices. CISC is not a command line utility or a protocol used for remote management.
28.
What protocol does Microsoft clients employ for file transfers?
Correct Answer
B. SMB
Explanation
Microsoft clients employ the SMB (Server Message Block) protocol for file transfers. SMB is a network file sharing protocol that allows clients to access files, printers, and other resources on a network. It is commonly used in Windows operating systems to facilitate file sharing and remote access.
29.
The PDU created at the Internet layer of the TCP/IP 4 layer model is called ___________________.
Correct Answer
C. A packet
Explanation
The PDU created at the Internet layer of the TCP/IP 4 layer model is called a packet. This is because at the Internet layer, data is divided into smaller units called packets before being transmitted over the network. These packets contain the necessary information such as source and destination IP addresses, as well as the actual data being transmitted. Therefore, a packet is the correct term for the PDU created at the Internet layer.
30.
At what layer does the TCP/IP protocol stack define the most protocols?
Correct Answer
A. Application
Explanation
The TCP/IP protocol stack defines the most protocols at the Application layer. This layer is responsible for providing network services to applications and includes protocols such as HTTP, FTP, SMTP, and DNS. These protocols enable communication between different applications running on different devices over a network. The Transport layer, Internet layer, and Network Interface layer also define protocols, but the Application layer has the highest number of protocols defined within the TCP/IP protocol stack.
31.
What command will display your cache of IP to MAC address name resolutions?
Correct Answer
A. Arp -a
Explanation
The correct answer is "arp -a". The "arp -a" command displays the cache of IP to MAC address name resolutions. ARP (Address Resolution Protocol) is used to map an IP address to a MAC address on a local network. By using the "arp -a" command, you can view the current mapping of IP addresses to MAC addresses in your cache.
32.
Given the following configuration information:
IP address: 150.150.150.38
subnet mask: 255.255.255.0
default gateway: 150.150.150.1
DNS server: 150.150.150.10
Which of the following would you ping to verify that the DNS server was functioning normally?
Correct Answer
D. Ping www.google.ca
Explanation
To verify that the DNS server is functioning normally, you would ping the DNS server's IP address, which is 150.150.150.10. Pinging www.google.ca would not directly test the functionality of the DNS server as it would rely on the DNS server to resolve the domain name to an IP address before pinging it.
33.
What IP helper protocol is used by both the Ping and Tracert utilities to perform their jobs?
Correct Answer
C. ICMP
Explanation
ICMP (Internet Control Message Protocol) is the correct answer. ICMP is used by both the Ping and Tracert utilities to perform their jobs. Ping uses ICMP Echo Request messages to check if a remote host is reachable, while Tracert uses ICMP Time Exceeded messages to trace the route packets take to reach a destination. ICMP is a network protocol that allows devices to send error messages and operational information about the network. It is commonly used for diagnostic and troubleshooting purposes in network communication.
34.
What type of address is the following?
169.254.73.244
255.255.0.0
Correct Answer
D. APIPA
Explanation
The given IP address 169.254.73.244 falls within the range of APIPA (Automatic Private IP Addressing) addresses. APIPA is a feature in Windows operating systems that allows devices to automatically assign themselves an IP address when they are unable to obtain one from a DHCP server. These addresses are typically used for local network communication and cannot be routed on the internet. Therefore, the correct answer is APIPA.
35.
Which three of the following protocols are associated with email? (choose 3)
Correct Answer(s)
D. SMTP
E. POP3
F. IMAP4
Explanation
SMTP (Simple Mail Transfer Protocol), POP3 (Post Office Protocol version 3), and IMAP4 (Internet Message Access Protocol version 4) are all protocols associated with email. SMTP is responsible for sending emails from the client to the server, POP3 is used for retrieving emails from the server to the client, and IMAP4 is used for accessing and managing emails on a remote mail server. SNMP, HTTPS, and NTP are not directly related to email protocols.
36.
Which of the following is a key rule concerning subnet masks?
Correct Answer
C. The binary 0’ must all be together at the end of the address
Explanation
A key rule concerning subnet masks is that the binary 0's must all be together at the end of the address. This means that the subnet mask should consist of a continuous sequence of 1's followed by a continuous sequence of 0's. This rule is important because it helps to identify the network portion and the host portion of an IP address. The 1's represent the network portion, while the 0's represent the host portion. By following this rule, devices can determine which network an IP address belongs to and properly route the network traffic.
37.
What does the tracert utility mostly help with?
Correct Answer
C. Troubleshooting routers
Explanation
The tracert utility is primarily used for troubleshooting routers. It helps in identifying the path taken by data packets from the source to the destination by sending out ICMP echo requests with incrementing TTL values. By analyzing the response time and the routers encountered along the way, network administrators can pinpoint any issues or bottlenecks in the network infrastructure. This makes tracert a valuable tool for diagnosing and resolving router-related problems.
38.
Looking at the following address, identify what class address it is:
126.128.255.99
255.255.255.0
Correct Answer
A. A
Explanation
The given IP address 126.128.255.99 falls within the range of Class A addresses. In Class A, the first octet is used to identify the network, while the remaining three octets are used for host addresses. The range for Class A addresses is from 1.0.0.0 to 126.0.0.0. Therefore, based on the given IP address, it can be concluded that it belongs to Class A.
39.
What is required to make sense of an IP address or to make it useful?
Correct Answer
D. A subnet mask
Explanation
A subnet mask is required to make sense of an IP address or to make it useful. A subnet mask is used to divide an IP address into network and host portions, allowing devices to determine if they are on the same network or if they need to communicate through a router. It helps in identifying the network address and the host address within a given IP address. Without a subnet mask, it would be difficult to determine the network boundaries and properly route the traffic.
40.
How many bits is an IPv4 address?
Correct Answer
B. 32
Explanation
An IPv4 address is composed of 32 bits. This means that it is represented by a sequence of 32 binary digits (0s and 1s). Each bit in the address can have two possible values, 0 or 1, giving a total of 2^32 (or approximately 4.3 billion) unique addresses. This is the reason why IPv4 addresses are often referred to as 32-bit addresses.
41.
It’s impossible for a system to communicate directly with a destination system that is on a different network. How can systems on different networks share information?
Correct Answer
C. They do it through their default gateways (local routers)
Explanation
Systems on different networks share information by sending their data through their default gateways, which are local routers. These routers act as intermediaries, forwarding the data between the different networks. When a system wants to communicate with a destination on a different network, it sends the data to its default gateway, which then routes it to the appropriate destination network. This allows systems on different networks to communicate and share information effectively.
42.
What does a system need before they can communicate directly with another system on the same network?
Correct Answer
D. Destination MAC address
Explanation
Before a system can communicate directly with another system on the same network, it needs the destination MAC address. The MAC address is a unique identifier assigned to each network interface card (NIC) and is used to identify and communicate with specific devices on a local network. By knowing the destination MAC address, a system can send data packets directly to the intended recipient on the same network.
43.
Logical addressing today is pretty much exclusively represented by ___________________.
Correct Answer
B. IP address
Explanation
Logical addressing today is pretty much exclusively represented by IP address. This is because IP (Internet Protocol) address is used to identify and locate devices within a network. It provides a unique numerical label to each device, allowing them to communicate and exchange data over the internet. MAC address is a hardware address used at the data link layer, HTTP address is a protocol used for web communication, and ARP address is used for mapping IP addresses to MAC addresses. However, when it comes to logical addressing, IP address is the primary and widely used method.
44.
Who would the following destination MAC address be sent to by a switch?
FF:FF:FF:FF:FF:FF
Correct Answer
C. Everyone on the local network
Explanation
The destination MAC address FF:FF:FF:FF:FF:FF is the broadcast address, which means it is sent to all devices on the local network. Broadcast messages are intended to be received by every device on the network, so the switch would forward this message to everyone on the local network.
45.
How many bytes is a MAC address?
Correct Answer
B. 6
Explanation
A MAC address is a unique identifier assigned to network interfaces for communications on a network. It consists of 6 bytes or 48 bits. Each byte is represented by 2 hexadecimal digits, resulting in a total of 12 characters when written in the standard format. Therefore, the correct answer is 6.
46.
MAC or physical addresses are divided into two parts. The second part is just a unique number assigned to each component coming off the assembly line. The first part of the MAC is known as the OUI and is used for which of the following?
Correct Answer
B. Organization unique identifier (to identify the manufacturer of the component)
Explanation
The first part of the MAC address, known as the OUI (Organization Unique Identifier), is used to identify the manufacturer of the component. It is a unique number assigned to each component coming off the assembly line, allowing the identification of the manufacturer. This information is useful in various networking scenarios, such as troubleshooting, inventory management, and ensuring compatibility between different components.
47.
The media access method used by Ethernet networks is ___________________.
Correct Answer
B. CSMA/CD
Explanation
CSMA/CD stands for Carrier Sense Multiple Access with Collision Detection. It is the media access method used by Ethernet networks. In CSMA/CD, devices on the network listen to the medium before transmitting data. If the medium is idle, the device can transmit. However, if two devices transmit at the same time and a collision occurs, both devices detect the collision and stop transmitting. They then wait for a random amount of time before retransmitting, reducing the chances of another collision. This method allows for efficient sharing of the network medium among multiple devices.
48.
The ISO defined the OSI model to create a standardized approach to network communications and break up the process into clearly defined steps. The layered approach allowed for modular engineering and multi-vendor interoperability. How many layers were defined in the OSI model?
Correct Answer
D. 7
Explanation
The OSI model defined seven layers in order to create a standardized approach to network communications. This layered approach allowed for modular engineering and multi-vendor interoperability. Each layer has its own specific function and interacts with the layers above and below it in a hierarchical manner. By breaking up the process into clearly defined steps, the OSI model provides a framework for understanding and troubleshooting network communication.
49.
Given the following results of the route print command what can you tell about the client system the command was run on?
Correct Answer
D. It cannot communicate with anyone beyond its local network
Explanation
Based on the given results of the route print command, it can be inferred that the client system has a misconfigured IP address. This is because the statement "It cannot communicate with anyone beyond its local network" suggests that the system is unable to establish connections outside of its local network, indicating a problem with its IP address configuration.
50.
The ____________ protocol provides error messaging for IP communications as well as a handy echo request / reply mechanism used by the ping utility to verify connectivity on the network.
Correct Answer
B. ICMP
Explanation
ICMP (Internet Control Message Protocol) is the correct answer. ICMP is a protocol that provides error messaging for IP communications. It is also used by the ping utility to send echo request messages and receive echo reply messages, which helps in verifying connectivity on the network. The ping utility sends an ICMP echo request message to a destination IP address and waits for an ICMP echo reply message from the destination. This mechanism is commonly used to troubleshoot network connectivity issues.