Professional Documents
Culture Documents
16. From the following, select two types of interference. (Select the best two
answers.)
A. EMI
B. Static electricity
C. RFI
D. Faraday cage
17. You need to install a SOHO router that seconds as a wireless AP. How many
channels are normally available to you within the 2.4 GHz range?
A. 10
B. 6
C. 11
D. 2.4
18. After you install a SOHO router, you see that it is automatically configured to
hand out IP addresses to computers. W hich of the following network numbers
does the SOHO router work within to hand out addresses?
A. 10.0.0.0
B. 169.254.0.0
C. 172.16.0.0
D. 192.168.1.0
19. You have been instructed to upgrade a Windows Server 2003 computer to a
domain controller. W hich command will enable you to do this?
A. Dcdemo
B. Dcpromo
C. DC Ping
D. Dcconfig
20. Your boss asks you to connect his Windows Vista laptop to a W indows
domain. W hat setting should you configure prior to joining the domain?
A. DNS
B. Gateway
C. W INS
D. ARP
21. W hich of the following additional settings does ipconfig /all allow you to view
in comparison to the more basic ipconfig?
A. IP address
B. MAC address
C. Gateway address
D. Name of the adapter
22. The Media Access Control (MAC) sublayer is part of which OSI model layer?
A. Physical
B. Data Link
C. Network
D. Transport
54. You get complaints from a customer about poor voice quality on calls that
cross a T-1 line. It appears that other users are running file sharing programs that
are delaying packets of the voice calls. Which of the following should you
implement to improve the voice calls?
A. Install a caching proxy
B. Configure separate VLANs
C. Configure traffic shaping
D. Upgrade the switches
55. W hich of the following is the most resistant to crosstalk?
A. Fiber optic cable
B. Shielded twisted pair
C. Cat5e
D. Unshielded twisted pair
56. W hich of the following commands will display the services (such as
Workstation and Server) that are currently running on a remote computer?
A. Netstat
B. Nbtstat
C. Ping
D. Arp
57. W hich of the following W indows consoles will give you information about all
of the services running on the computer?
A. ADUC
B. RRAS
C. Device Manager
D. Computer Management
58. You use the nbtstat command to identify which services are running on a
remote server. W hich of the following hexadecimal numbers correctly identifies
the Server service?
A. <03>
B. <20>
C. <1f>
D. <00>
59. W hich of the following OSI layers is responsible for session timeouts?
A. Layer 4
B. Layer 5
C. Layer 6
D. Layer 7
60. Collisions on the network occur when two packets are transmitted
simultaneously. W hich of the following hardware devices is the most susceptible
to this type of collision?
A. Hub
B. Switch
C. Router
D. Gateway
68. Your boss asks you to close port 25. W hat service is your boss asking you to
shut off?
A. SNMP
B. SMB
C. Telnet
D. SMTP
69. One of your customers complains that they cannot access the internal
company web server when typing the name of the server in their browser.
However, they can ping the computer by IP address. W hich of the following
TCP/IP properties on the client is not configured properly?
A. DHCP
B. DNS
C. W INS
D. MAC address
70. W hich of the following is the most common type of VLAN?
A. Port-based
B. MAC-based
C. Protocol-based
D. Router-based
71. You are traveling around the world, and want to be able to VPN into your
home network. W hich of the following should you enable on your SOHO router?
A. Port replication
B. Port triggering
C. Port forwarding
D. DMZ
72. You need a solution that will allow a partner company to access some of your
servers. However, you do not want them to be able to access your LAN. Also,
you want your LAN users to also be able to access those same servers. W hich of
the following should you implement? (Select the best two answers.)
A. Port forwarding
B. DMZ
C. Intranet
D. Extranet
73. Your boss asks you to install a second network adapter into a server. He is
protecting against an event where the first network adapter fails. W hat is this
known as?
A. Fault tolerance
B. QoS
C. Load balancing
D. Clustering
74. W hich fault tolerant method uses two disks, and two disks only?
A. RAID 0
B. RAID 1
C. RAID 5
D. RAID 6
82. You want to avoid companies next-door to yours using your wireless network.
All of your computers are already set up to use the wireless network. W hat is t he
easiest option?
A. Enable MAC filtering
B. Enable port forwarding
C. Disable the SSID
D. Use a signal booster
83. W hich kind of cable is used by a technician to control a router directly from a
laptop?
A. Crossover
B. Straight-through
C. Rolled
D. Loopback
84. Of the following, what is the best combination of protocols to use in your
wireless network?
A. W PA
B. W EP
C. W PA and TKIP
D. W PA2 and AES
85. W hich of the following is not an example of Denial of Service (DOS) attack?
A. Ping flood
B. Fraggle
C. Null session
D. Smurf attack
86. W hich of the following attacks can be described as: an attack that intercepts
all data between a client and a server?
A. Blind hijacking
B. Man-in-the-middle attack
C. Replay attack
D. DNS poisoning
87. W hich command will send ICMP echoes that have been increased in packet
size to 1,500 bytes each?
A. Ping n 1500
B. Ping l 1500
C. Ping t 1500
D. Arp -1500
88. W hich of the following commands will resolve domain names to IP
addresses?
A. ARP
B. DNS
C. netstat
D. nslookup
ANSWERS
1.Answer: B. 32-bit
Explanation: IPv4 addresses are 32 bits in length. An example of an IPv4
address would be 192.168.1.1. This address has 4 octets, which together equal
32
bits.
In
binary,
this
address
would
be
expressed
as
11000000.10101000.00000001.00000001 for 32 bits in total. IPv6 uses 128 -bit
IP addresses. There are no 8-bit or 256-bit addresses as of the year 2010.
2. Answer: A. Star
Explanation: The star topology connects hosts together by way of a central
connecting device such as a hub or (more commonly) a switch. It is by far more
common than the bus, ring, or mesh topologies.
3. Answer: C. 100BASE-T
Explanation: 100BASE-T is a cabling standard that uses twisted pair cable. The
100 means 100 Mbps, the BASE specifies baseband transmissions, and the T
stands for twisted pair. 10BASE5 and 10BASE2 are coaxial standards, and
100BASE-FX is a fiber optic cabling standard.
4. Answer: C. Category 5
Explanation: Category 5 (Cat5) is the minimum category of twisted pair
necessary for 100BASE-Tx networks. Cat5 can run at a maximum of 100 Mbps.
Cat3 and Cat4 cannot. Category 6 can run much faster and is therefore not the
minimum cable that would be necessary; however, it is wise to consider Cat6
when installing a network.
5. Answers: C. and D. 802.11g, and 802.11a
Explanation: 802.11g and a have a maximum data transfer rate of 54 Mbps.
Although G uses the 2.4 GHz range, and A uses the 5 GHz range. 802.11b has a
maximum of 11 Mbps. 802.1X does not deal with wireless transmission speeds,
instead it is a form of authentication on the LAN that network cards and switches
might be compliant with. It should be mentioned that 802.11n is not listed here,
but can go much faster than 54 Mbps.
6. Answer: B. 802.3u
Explanation: 802.3u is the IEEE standard also known as Fast Ethernet. It
specifies a maximum transmission speed of 100 Mbps. 802.3 is the original
Ethernet which specifies a maximum of 10 Mbps. 802.3z specifies 1000 Mbps
over fiber, and 802.3ab specifies 1000 Mbps over copper.
7. Answer: D. Ipconfig /all
Explanation: Ipconfig /all (when typed in the Command Prompt) shows the local
computers IP configuration, including information such as DNS server address,
and MAC addresses. The regular ipconfig command does not show this
additional information. Ping tests whether other hosts are alive on the network.
Tracert tests for hosts on other networks and traces the route from you to the
final destination.
8. Answer: B. ::1
Explanation: ::1 is the loopback address or IPv6. Every local computer that runs
IPv6 will use ::1 as the local loopback address. 127.0.0.1 is the local l oopback
address for IPv4. FE80::/10 is the range of addresses that can be used by private
IPv6 computers. Usually, the local private address of a system using IPv6 starts
with FE80. 0000::10 is not a valid IPv6 address.
9. Answer: B. RJ45
Explanation: The RJ45 connector is the most commonly used connector in
networks using UTP cable. RJ11 is used for phone, ST is used by fiber optic
cables, and BNC connectors are used by coaxial cables, especially in older,
deprecated 10BASE2 networks.
10. Answer: A. 568B
Explanation: EIA/TIA 568B is the most commonly used wiring standard when
dealing with UTP cable and LANs. It became the standard in the early 1990s,
eclipsing 568A. It is one type of USOC (Universal Service Order Code). BOGB is
the acronym that denotes the 4 main colors (blue, orange, green, and brown) that
are used by the various cabling specifications such as 568B.
11. Answer: D. Crimper
Explanation: An RJ45 crimper is used to connect the RJ45 plug to the CAT5
cable. A TDR is a time-domain reflectometer, which checks a cable for breaks. A
patch tester will verify connectivity of a network patch cable. A punch down tool is
for punching network wires down to punch blocks, patch panels, and network
jacks.
12. Answers: A. and C. Switch and hub.
Explanation: Hubs, and more commonly, switches are used to connect
computers together in a star topology. Network adapters connect individual
computers to the network. Routers connect networks together.
13. Answer: C. Firewall
Explanation: The firewalls main purpose is to protect the network from attackers.
Hubs and switches simply connect hosts on the LAN together. The router
connects clients on one network to other networks such as the Internet.
14. Answer: D. Router
Explanation: A router connects two LANs together to form a W AN. It can also
allow connectivity to the Internet. Although some small office-home office
(SOHO) routers have a firewall built-in, the firewall is considered a separate
device that protects the LAN from attackers. Hubs and switches allow for hosts
on a LAN to communicate with each other.
15. Answer: B. 10 meters
Explanation: Class 2 Bluetooth devices have a maximum range of 10 meters
before transmission loss will occur. Class 1 is 100 meters. Class 3 is 1 meter. As
of 2010, no Bluetooth devices can transmit data to 1000 meters.
33. Answer: A. 21
Explanation: FTP (File Transfer Protocol) uses inbound port 21 to establish
connections on FTP servers. Telnet uses port 23. SMTP uses port 25. DNS uses
port 53.
34. Answer: B. 80
Explanation: HTTP (Hypertext Transfer Protocol) uses inbound port 80. FTP
uses port 21. Kerberos uses port 88. POP3 uses port 110.
35. Answer: A. Application
Explanation: POP3, HTTP, FTP, and other protocols that are directly related to
their corresponding applications reside on the Application Layer of the OSI
model.
36. Answers: B and C. arp a and arp d.
Explanation: The arp-a and arp-g commands will show the IP to MAC conversion
table for recently made connections over the network. Arp d will delete a host
that can be specified by inet_addr.
37.Answer: A. An FQDN
Explanation: An FQDN (fully qualified domain name) is a name that contains a
domain name and a host name. In this example, computer1 is the host name ,
and seattle_network.com is the domain name. together they make the FQDN
38.Answer: B. DNS
Explanation: DNS (the Domain Name System service) resolves host names,
domain names, and FQDNs to their corresponding IP addresses. An older static
text-version of this is the HOSTS.TXT file.
39. Answer: A. W INS
Explanation: W INS (the W indows Internet Naming Service) is a Microsoft
protocol that resolves NetBIOS names to IP addresses. An older static textversion of this is the LMHOSTS.txt file.
40. Answer: C. ARP
Explanation: ARP (Address Resolution Protocol) translates between IP
addresses on the Network Layer of the OSI model to MAC addresses on the
Data Link Layer of the OSI model.
41. Answers: C and D, Router and IP proxy
Explanation: Routers connect two or more networks together, so they need two
network adapters minimum, one per network. IP proxies provide a method of
protecting all of the LAN IP addresses, and allow all of the LAN computers to
access the Internet; the IP proxy needs a network adapter for the LAN and for
the Internet.
42. Answer: B. LDAP
Explanation: LDAP (Lightweight
Directory Access Protocol) is used by
Microsofts Active Directory. HTTP is an Internet protocol. RDP is Remote
Desktop Protocol. Telnet is used to take control of computers via the commandline, but is insecure, deprecated, and therefore not recommended for use