1.
QUESTION NO: 151
A new segment needs to be added to a network to provide access for 64 servers. Which of the following subnets will provide the needed access and still conserve IP addresses?
Correct Answer
A. 192.168.1.0/25
2.
QUESTION NO: 152
When connecting two devices for data on a vertical cross connect, which of the following cables would be used to connect those devices?
Correct Answer
B. Fiber
Explanation
Fiber optic cables would be used to connect two devices for data on a vertical cross connect. Fiber optic cables are capable of transmitting data at high speeds over long distances. They use pulses of light to transmit data, making them immune to electromagnetic interference. Fiber optic cables are commonly used in networking and telecommunications to provide fast and reliable data transmission.
3.
QUESTION NO: 153*
Which of the following network protocols is needed to ensure that users can type in a FQDN instead of the IP address?
Correct Answer
A. DNS
Explanation
DNS (Domain Name System) is the correct answer because it is the network protocol that translates domain names (FQDN - Fully Qualified Domain Name) into IP addresses. It allows users to type in a domain name, such as www.example.com, instead of the numerical IP address, such as 192.168.0.1, when accessing websites or resources on the internet. DNS servers maintain a database of domain names and their corresponding IP addresses, allowing users to easily navigate the internet using familiar domain names.
4.
QUESTION NO: 154
A technician is called to a clients desktop for connection issues. Which of the following is the FIRST step the technician should take?
Correct Answer
A. Check the LEDs on the NIC.
Explanation
The technician should first check the LEDs on the NIC (Network Interface Card). This step is important because it helps determine whether there is a physical connection issue between the computer and the network. If the LEDs are not lit or are blinking in an abnormal pattern, it could indicate a problem with the network cable or the NIC itself. By checking the LEDs, the technician can quickly identify if there is a connectivity issue and proceed with the appropriate troubleshooting steps.
5.
QUESTION NO: 155
A technician is extending a data circuit to the other side of the building. Which of the following would the technician set up at the new location?
Correct Answer
C. IDF
Explanation
The technician would set up an IDF (Intermediate Distribution Frame) at the new location. An IDF is a network cabinet or rack that connects and distributes data circuits to various locations within a building or campus. It serves as a central point for network connectivity and allows for easy management and troubleshooting of network connections.
6.
QUESTION NO: 156*
Which of the following network devices filters packets based on rules that have been configured for it?
Correct Answer
B. Firewall
Explanation
A firewall is a network device that filters packets based on rules that have been configured for it. It acts as a barrier between a trusted internal network and an untrusted external network, controlling the incoming and outgoing network traffic. By examining the source and destination addresses, ports, and protocols of the packets, a firewall can enforce security policies and block or allow specific types of traffic. This helps to protect the network from unauthorized access, malware, and other threats.
7.
QUESTION NO: 157
A network administrator is configuring a server to provide file sharing for offices across the company. Which of the following addresses would be acceptable to set on a device?
Correct Answer
C. 192.168.0.25
Explanation
The correct answer is 192.168.0.25. This is an acceptable IP address to set on a device because it falls within the private IP address range of 192.168.0.0 to 192.168.255.255. It is a specific address within that range that can be assigned to a device on the network for file sharing purposes.
8.
QUESTION NO: 158
Which of the following is the purpose of a packet sniffer?
Correct Answer
B. Views network datagrams.
Explanation
A packet sniffer is a tool used to capture and analyze network traffic. It allows the user to view the contents of network datagrams, including the source and destination IP addresses, protocols used, and any data being transmitted. This can be useful for troubleshooting network issues, monitoring network performance, and detecting any suspicious or unauthorized activity on the network.
9.
QUESTION NO: 159
Two PC's have been assigned the following IP addresses, subnet mask, and default gateway:PC1, 192.168. 100.20, 255.255.255.240, NoDG
PC2, 192.168.100.10, 255.255.255.240, 192.168.100.1
Assuming all network devices including the switch the PC's are connected to, network cabling, and the default gateway are all functioning which of the following will occur when PCI1 attempts to transfer a file to PC2?
Correct Answer
A. PC1 will not be able to communicate with PC2 since PC2 is in a different subnet and PC1 does not have a default gateway configured.
Explanation
PC1 will not be able to communicate with PC2 since PC2 is in a different subnet and PC1 does not have a default gateway configured. This means that PC1 does not have a route to reach PC2's subnet. Without a default gateway, PC1 can only communicate with devices on its own subnet. In order for PC1 to communicate with PC2, it would need to have a default gateway configured, which would provide a route to reach PC2's subnet.
10.
QUESTION NO: 160
Which of the following tools will measure in Ohms?
Correct Answer
B. Multimeter
Explanation
A multimeter is a versatile tool that can measure various electrical properties, including resistance, which is measured in Ohms. It can be used to measure the resistance of a component or a circuit, helping to troubleshoot electrical problems or verify the integrity of connections. A cable tester is used to check the continuity or integrity of cables, not specifically to measure resistance. TDR (Time Domain Reflectometer) is used to measure cable length or locate faults, not resistance. A butt set is used by technicians to test and troubleshoot telephone lines, it does not measure resistance.
11.
QUESTION NO: 161
Which of the following are features of a DHCP server? (Select TWO)
Correct Answer(s)
B. Dynamic IP addressing
C. Static IP address reservations
Explanation
A DHCP server is responsible for dynamically assigning IP addresses to devices on a network. This allows devices to join the network and obtain an IP address automatically without manual configuration. In addition, a DHCP server can also reserve specific IP addresses for certain devices, known as static IP address reservations. This ensures that particular devices always receive the same IP address, which can be useful for devices that require a consistent IP address for specific purposes, such as servers or printers.
12.
QUESTION NO: 162*
Which of the following routing protocols uses the next hop metric in deciding how to route traffic?
Correct Answer
A. RIP
Explanation
RIP (Routing Information Protocol) uses the next hop metric in deciding how to route traffic. RIP is a distance-vector routing protocol that uses hop count as its metric. The next hop metric refers to the number of routers or hops that need to be traversed to reach a destination network. RIP selects the route with the lowest hop count as the best path to forward traffic. Therefore, RIP uses the next hop metric to determine the optimal route for routing traffic.
13.
QUESTION NO: 163*
Which of the following techniques would increase the bandwidth for network transmission by joining together multiple connections into one logical connection?
Correct Answer
A. Bonding
Explanation
Bonding is a technique that combines multiple connections into one logical connection, which helps increase the bandwidth for network transmission. By joining together multiple connections, the network can achieve higher data transfer rates and improved performance. This is particularly useful in situations where a single connection is not sufficient to handle the required bandwidth. Bonding allows for the aggregation of multiple connections, effectively increasing the overall bandwidth available for network transmission.
14.
QUESTION NO: 164
Which of the following properiies describes a rate at which bits are transmitted over a WAN link?
Correct Answer
A. Transmission speed
Explanation
The correct answer is "Transmission speed". Transmission speed refers to the rate at which bits are transmitted over a WAN link. It represents the amount of data that can be transmitted in a given time period, typically measured in bits per second (bps). Baud rate, on the other hand, refers to the number of signal changes per second in a communication channel, and is not directly related to the transmission of bits. Frequency refers to the number of cycles per second in a signal, and throughput refers to the actual amount of data that can be transmitted successfully over a network.
15.
QUESTION NO: 165*
Which of the following is a utility that translates the IP address to its physical network address?
Correct Answer
B. Arp
Explanation
The correct answer is "arp". ARP (Address Resolution Protocol) is a utility that translates the IP address to its physical network address. It is used to map an IP address to a MAC address in a local network. ARP allows devices to communicate with each other at the data link layer by resolving the IP address to its corresponding MAC address.
16.
QUESTION NO: 166*
When determining responsibility for repair and maintenance of a T1 , up to which of the following points is the local exchange carrier responsible for?
Correct Answer
C. The point of demarcation
Explanation
The local exchange carrier is responsible for the repair and maintenance of the T1 up to the point of demarcation. The point of demarcation is the location where the responsibility for the telecommunications line shifts from the service provider to the customer. Therefore, any issues or repairs beyond the point of demarcation would be the customer's responsibility.
17.
QUESTION NO: 167*
Which of the following is a disadvantage of static routing?
Correct Answer
A. Unresponsive to changes.
Explanation
Static routing is a routing method where network administrators manually configure the routes in the routing table. One disadvantage of static routing is that it is unresponsive to changes. Unlike dynamic routing protocols, static routes do not automatically adjust to network changes such as link failures or congestion. This means that if there is a change in the network topology, the static routes will not be updated accordingly, leading to potential routing issues and suboptimal routing paths.
18.
QUESTION NO: 168
A scanner has determined the open ports on a network device. Assuming services are running on their default ports, which of the following ports will provide secure conmmnications?
Correct Answer
D. 443
Explanation
Port 443 is the correct answer because it is the default port for secure communications using HTTPS (Hypertext Transfer Protocol Secure). HTTPS is a protocol that encrypts the data transmitted between a web browser and a web server, ensuring secure communication and protecting sensitive information.
19.
QUESTION NO: 169
Which of the following tools would be used to determine if the connection is punched down and there is noise coming across the cable?
Correct Answer
B. Cable tester
Explanation
A cable tester would be used to determine if the connection is punched down and there is noise coming across the cable. A cable tester is a tool that is specifically designed to test the integrity and functionality of various types of cables, including Ethernet cables. It can detect issues such as incorrect wiring, shorts, and noise interference. By using a cable tester, one can quickly identify if the connection is properly punched down and if there is any noise present on the cable.
20.
QUESTION NO: 170
Which of the following items changes the encryption key on a users session after a set period of time?
Correct Answer
A. TKIP
Explanation
TKIP (Temporal Key Integrity Protocol) is a security protocol used in Wi-Fi networks to enhance the security of the encryption keys. It periodically changes the encryption key on a user's session after a set period of time. This helps to prevent unauthorized access and maintain the confidentiality of the data being transmitted over the network. AES (Advanced Encryption Standard) is another encryption algorithm used in Wi-Fi networks, but it does not automatically change the encryption key like TKIP does. RADIUS (Remote Authentication Dial-In User Service) is a protocol used for authentication, authorization, and accounting in network access. WEP (Wired Equivalent Privacy) is an older and less secure encryption protocol compared to TKIP.
21.
QUESTION NO: 171
PPTP is a combination of which of the following protocols? (Select TWO).
Correct Answer(s)
A. PPP
E. TCP/lP
Explanation
PPTP (Point-to-Point Tunneling Protocol) is a combination of PPP (Point-to-Point Protocol) and TCP/IP (Transmission Control Protocol/Internet Protocol). PPP is used for establishing a secure connection between two points, while TCP/IP is the underlying protocol suite used for communication over the internet. POP3 (Post Office Protocol 3) and PPPoE (Point-to-Point Protocol over Ethernet) are not part of PPTP. TCP (Transmission Control Protocol) is a part of the TCP/IP suite, but it is not specifically mentioned as a component of PPTP.
22.
QUESTION NO: 172
In the OS1 model, which of the following layers would be the cause of a session time-out while browsing the web?
Correct Answer
A. Layer 5
Explanation
In the OS1 model, Layer 5 is responsible for managing the session between the client and the server. It handles the establishment, maintenance, and termination of the session. A session time-out occurs when there is no activity or communication between the client and server for a certain period of time. Therefore, Layer 5 would be the cause of a session time-out while browsing the web.
23.
QUESTION NO: 173*
A network administrator has just installed a new frame-relay DS3 to connnect an office to the corporate datacenter. Users report long load times for large documents hosted on file servers in the datacenter. Which of the following tests would be MOST useful in identifying the problem?
Correct Answer
B. A throughput test
Explanation
A throughput test would be the most useful in identifying the problem. A throughput test measures the amount of data that can be transferred over a network in a given amount of time. By conducting a throughput test, the network administrator can determine if the frame-relay DS3 connection is able to handle the large file transfers efficiently. If the test reveals low throughput, it would indicate that the connection is the bottleneck causing the long load times for the large documents.
24.
QUESTION NO: 174
A technician has tested a cable and has established it can successfully send and receive signals. Which of the following tools can be used to check the speed and condition of the signal?
Correct Answer
D. TDR
Explanation
A Time Domain Reflectometer (TDR) can be used to check the speed and condition of a signal in a cable. A TDR works by sending a signal down the cable and measuring the time it takes for the signal to bounce back. This information can then be used to determine the speed and condition of the signal. TDRs are commonly used in networking and telecommunications to troubleshoot and diagnose cable issues.
25.
QUESTION NO: 175*
Which of the following wireless security protocols supports the highest enclryption standards?
Correct Answer
B. WPA2
Explanation
WPA2 is the correct answer because it supports the highest encryption standards among the given options. WPA2 uses the Advanced Encryption Standard (AES) algorithm, which is considered more secure than the encryption algorithms used by the other protocols listed. WPA2 provides stronger data protection and is recommended for securing wireless networks. 3DES, WPA, and WEP are all older and less secure protocols compared to WPA2.
26.
QUESTION NO: 176
How many pairs are crossed in a crossover cable?
Correct Answer
B. Two
Explanation
A crossover cable is used to connect two similar devices, such as two computers or two switches, directly together without the need for a hub or switch. In a crossover cable, two pairs of wires are crossed over, specifically the transmit and receive pairs. This allows for communication between the devices by ensuring that the transmit signal from one device is connected to the receive signal of the other device. Therefore, there are two pairs crossed in a crossover cable.
27.
QUESTION NO: 177*
Which of the following is the length of a MAC address?
Correct Answer
A. 48bit
Explanation
A MAC address, also known as a Media Access Control address, is a unique identifier assigned to a network interface controller (NIC) for communications at the data link layer of a network segment. It is 48 bits in length, consisting of 6 groups of 2 hexadecimal digits separated by colons or hyphens. This address is used to uniquely identify devices on a network and is essential for proper communication between devices.
28.
QUESTION NO: 178
Which of the following layers of the OSI model does a network router perform traffic routing at?
Correct Answer
A. Layer 3
Explanation
A network router performs traffic routing at Layer 3 of the OSI model. Layer 3, also known as the network layer, is responsible for logical addressing and routing of data packets. Routers use the information in the network layer headers, such as IP addresses, to determine the best path for forwarding data packets to their destination. Therefore, a network router operates at Layer 3 to perform traffic routing.
29.
QUESTION NO: 179
All printers on a network are network printers with server hosted queues. A user reports that they cannot print. The dispatched technician verifies that all jobs sent from the users computer to the network printer fail. Which of the following would be an appropriate NEXT step?
Correct Answer
C. Try the printer from another PC.
Explanation
The appropriate next step would be to try the printer from another PC. This step will help determine if the issue is specific to the user's computer or if it is a problem with the printer itself. If the printer works fine from another PC, then the problem is likely with the user's computer and further troubleshooting can be done to identify and fix the issue. If the printer still doesn't work from another PC, then it is more likely that there is a problem with the printer itself and further steps can be taken to address the issue.
30.
QUESTION NO: 180
Which of the following BEST describes the use of plenum cable?
Correct Answer
C. Reduces toxic gas released during a fire
Explanation
Plenum cable is a type of cable that is specifically designed for use in plenum spaces, which are areas in buildings that are used for air circulation. In the event of a fire, plenum spaces can quickly fill with toxic smoke and gases. Plenum cable is made with special materials that have low smoke and low toxicity properties, which means that it releases fewer toxic gases when exposed to fire. This helps to reduce the risk of harm to people in the building during a fire. Therefore, the statement "Reduces toxic gas released during a fire" is the best description of the use of plenum cable.
31.
QUESTION NO: 181
Which of the following is an example of a valid MAC address for a workstation?
Correct Answer
C. 00:08:38:05 :B5:F4
32.
QUESTION NO: 182
Which of the following would be used before a technician crimps a connector to a UTP/STP cable?
Correct Answer
D. Cable stripper
Explanation
A cable stripper would be used before a technician crimps a connector to a UTP/STP cable in order to remove the outer insulation of the cable and expose the inner conductors. This is necessary to ensure a proper connection between the cable and the connector.
33.
QUESTION NO: 183
A network technician is connecting through the console port to configure a switch. Which of the following ports would be used to transfer configuration files from the switch?
Correct Answer
C. UDP 69
Explanation
The correct answer is UDP 69. UDP stands for User Datagram Protocol, which is a connectionless protocol that does not require a handshake before data transfer. UDP 69 is specifically used for TFTP (Trivial File Transfer Protocol), which is commonly used to transfer configuration files between devices. TCP 110, UDP 67, and TCP 69 are not used for file transfer purposes.
34.
QUESTION NO: 184
Which of the following tools would be used to establish a connection on a wall jack to connect to the desktop?
Correct Answer
C. Punch down tool
Explanation
A punch down tool is used to establish a connection on a wall jack to connect to the desktop. This tool is specifically designed to terminate and secure the wires onto the punch down block or keystone jack. It allows for quick and efficient installation of network cables by punching the wires into the appropriate slots, ensuring a secure and reliable connection.
35.
QUESTION NO: 185
A computer configured to use DHCP cannot locate a DHCP server. Automatic Private IP Address (APIPA)will assign which of the following addresses?
Correct Answer
C. 169.254.1.25
Explanation
When a computer configured to use DHCP cannot locate a DHCP server, it will be assigned an Automatic Private IP Address (APIPA). APIPA assigns IP addresses in the range of 169.254.0.0 to 169.254.255.255. Therefore, the correct answer is 169.254.1.25.
36.
QUESTION NO: 186
A company guest is requesting to use their personal laptop on the company wireless network. DHCP is configured correctly for wireless and a temporary WEP key is assigned. The laptop canot connect to the network because:
Correct Answer
D. MAC filtering is enabled on the WAP.
Explanation
The correct answer is MAC filtering is enabled on the WAP. MAC filtering is a security feature that allows or denies access to a network based on the MAC address of a device. If MAC filtering is enabled on the wireless access point (WAP), it will only allow devices with specific MAC addresses to connect to the network. Since the company guest is using a personal laptop, it is likely that their laptop's MAC address is not included in the allowed list, resulting in the inability to connect to the network.
37.
QUESTION NO: 187
221 .17.101 .223/28 is an example of which kind of notation?
Correct Answer
A. CIDR
Explanation
221.17.101.223/28 is an example of CIDR notation, which stands for Classless Inter-Domain Routing. CIDR notation is used to represent IP addresses and their associated subnet masks. In this notation, the IP address is followed by a slash (/) and the number of bits in the subnet mask. In this case, the subnet mask is 28 bits, indicating that the first 28 bits of the IP address are the network address and the remaining 4 bits are the host address.
38.
QUESTION NO: 188
Which of the following is the BEST reason to implement QoS when real-time applications are in use in the network?
Correct Answer
B. Prioritize delay sensitive traffic.
Explanation
Implementing Quality of Service (QoS) is important when real-time applications are in use because it allows for the prioritization of delay-sensitive traffic. Real-time applications, such as video conferencing or VoIP, require low latency and minimal packet loss to function properly. By implementing QoS, network administrators can allocate sufficient bandwidth and prioritize the delivery of these time-sensitive packets, ensuring a smooth and uninterrupted user experience. This helps to minimize delays and improve the overall performance of real-time applications on the network.
39.
QUESTION NO: 189
Which of the following would be an appropriate use of an EGP?
Correct Answer
B. Advertising a /24 to an upstream provider.
Explanation
An Exterior Gateway Protocol (EGP) is used to exchange routing information between different autonomous systems (AS). Advertising a /24 to an upstream provider would be an appropriate use of an EGP as it involves announcing the availability of a specific network prefix to the upstream provider. This allows the provider to direct traffic towards that network.
40.
QUESTION NO: 190
Which of the following cables has a solid Kevlar center to restrict it from making a 90 degree bend?
Correct Answer
A. CAT6
Explanation
CAT6 cables have a solid Kevlar center to restrict them from making a 90 degree bend. This feature helps to maintain the integrity and performance of the cable by preventing excessive bending or twisting that could cause signal loss or damage. CAT5, CAT5e, and CAT3 cables do not have this solid Kevlar center and are more flexible, making them more prone to bending or twisting.
41.
QUESTION NO: 191
A network technician is installing a series off three access points to cover the entire wing of a building. Each access point has a wired conection and 802.11g is being used for the wireless transmission. Which of the following channels should be used for the access points?
Correct Answer
B. Channels 1-6-11
Explanation
The access points should be set to channels 1, 6, and 11. This is because these channels do not overlap with each other and provide the best coverage without interference. By using these channels, the access points can transmit on different frequencies, reducing the chances of signal interference and ensuring a stable wireless connection for users in the building.
42.
QUESTION NO: 192*
A technician is working on a new employees workstation in the accounting department? The workstation needs access to the accounting server. Currently the technician notices that the employee can only access the Internet. Which of the following would the technician need to verify?
Correct Answer
B. Correct VLAN setting
Explanation
The technician would need to verify the correct VLAN setting. VLANs (Virtual Local Area Networks) are used to separate network traffic and isolate devices into different logical networks. If the workstation can only access the Internet and not the accounting server, it suggests that it may be on the wrong VLAN, which is preventing it from accessing the server. By verifying the VLAN setting, the technician can ensure that the workstation is on the correct network to access the accounting server.
43.
QUESTION NO: 193*
Which of the following devices can be remotely looped for troubleshooting purposes?
Correct Answer
C. A smart jack
Explanation
A smart jack can be remotely looped for troubleshooting purposes. This means that it can be tested or diagnosed from a remote location without physically accessing the device. This is useful for troubleshooting network connectivity issues or identifying faults in the smart jack without the need for on-site intervention.
44.
QUESTION NO: 194
Which of the following is part of the TCP/IP protocol suite?
Correct Answer
A. UDP
Explanation
UDP (User Datagram Protocol) is indeed part of the TCP/IP protocol suite. TCP/IP is a set of protocols that allows computers to communicate over a network. UDP is one of the core protocols in this suite, providing a connectionless and unreliable transmission of data. Unlike TCP, UDP does not guarantee the delivery of packets or the order in which they are received. It is commonly used for applications that require low latency and can tolerate packet loss, such as real-time streaming or online gaming. IPX, NetBEUI, and SPX are not part of the TCP/IP suite.
45.
QUESTION NO: 195
The function of a tone generator is to generate a tone to test:
Correct Answer
A. Continuity
Explanation
A tone generator is used to generate a continuous tone signal that can be used to test the continuity of a circuit or a cable. By connecting the tone generator to one end of the circuit and using a probe or a receiver at the other end, the presence of the tone indicates that there is a continuous path for the signal to flow through, confirming the continuity of the circuit or cable. This is useful for troubleshooting and identifying breaks or faults in the wiring.
46.
QUESTION NO: 196*
A technician is not able to ping a server by the FQDN but can by the IP. Which of the following should the technician check?
Correct Answer
B. Ensure that the DNS is configured
Explanation
The technician should check if the DNS is configured correctly. The FQDN (Fully Qualified Domain Name) is used to resolve the IP address of a server using DNS. If the technician is unable to ping the server by the FQDN but can by the IP, it suggests that the DNS is not able to resolve the FQDN to the correct IP address. Therefore, checking the DNS configuration is necessary to ensure proper resolution of the FQDN.
47.
QUESTION NO: 197
Which of the following cable types allows for the maximum cable run distance?
Correct Answer
C. Single-mode fiber
Explanation
Single-mode fiber allows for the maximum cable run distance compared to the other cable types mentioned. This is because single-mode fiber has a smaller core size and uses a single beam of light to transmit data, allowing for less signal loss and greater distance coverage. Coaxial cable, multi-mode fiber, and CAT3 cables have larger core sizes and are more susceptible to signal loss over longer distances.
48.
QUESTION NO: 198
Which of the following is a function of a NIC?
Correct Answer
D. It transceives digital data
Explanation
A NIC (Network Interface Card) is responsible for facilitating communication between a computer and a network. It transceives digital data, meaning it both transmits and receives digital data packets over the network. This allows the computer to send and receive information to and from other devices on the network. The other options listed, such as filtering frame packets, capturing keystrokes, and sending data to Non-Volatile RAM, are not functions of a NIC.
49.
QUESTION NO: 199*
A network technician discovers that the phone company has installed the smart jack in the wrong location. It needs to be moved 75 feet (23 meters) to the computer room. Which of the following should be requested?
Correct Answer
C. A demarc extension
Explanation
A demarc extension should be requested in this situation. A demarc extension is used to extend the demarcation point, which is the point where the responsibility of the phone company ends and the responsibility of the customer begins. By requesting a demarc extension, the network technician can move the smart jack to the computer room, ensuring that it is in the correct location for proper connectivity.
50.
QUESTION NO: 200
Remote users are having problems accessing files from a file selver. Which of the following should a technician check FIRST?
Correct Answer
D. Connectivity
Explanation
The technician should check connectivity first because if there is an issue with the network connection, remote users will not be able to access files from the file server. Once connectivity is confirmed, the technician can then proceed to check user accounts, access rights, and network resources to further troubleshoot the problem.