This action might not be possible to undo. Are you sure you want to continue?
Developed for www.GetCertify4Less.Com
(Author to remain anonymous.)
This practice exam has been developed exclusively for GetCertify4Less.Com. Answers and explanations on last pages 1. W hat is the length of an IPv4 address? A. 8-bit B. 32-bit C. 128-bit D. 256-bit 2. W hich of the following is the most commonly implemented network topology? A. Star B. Bus C. Ring D. Mesh 3. W hich of the following standards uses twisted pair cable? A. 10BASE5 B. 100BASE-FX C. 100BASE-T D. 10BASE2 4. What is the minimum category of twisted pair cable required when installing a 100BASE-Tx network? A. Category 3 B. Category 4 C. Category 5 D. Category 6 5. W hich of the following wireless standards can transmit data at up to 54 Mbps? (Select the best two answers.) A. 802.11b B. 802.1X C. 802.11g D. 802.11a 6. W hich of the following Ethernet standards can transmit data at up to (and not exceeding) 100 Mbps? A. 802.3 B. 802.3u C. 802.3z D. 802.3ab 7. W hich command would you use to view your IP settings including DNS server and MAC addresses? A. Ping B. Ipconfig C. Tracert D. Ipconfig /all
8. W hich of the following is the loopback address in IPv6? A. 127.0.0.1 B. ::1 C. FE80::/10 D. 0000::10 9. W hich of the following connectors would an unshielded twisted pair (UTP) cable most likely use? A. RJ11 B. RJ45 C. ST D. BNC 10. Local area networks (LANs) are commonly cabled with UTP cable. W hat is the most commonly used cabling standard when wiring LANs? A. 568B B. USOC C. BOGB D. 568A 11. Your boss asks you to connect an RJ45 plug to a CAT5 cable. Which is the best tool to use? A. TDR B. Patch tester C. Punch down tool D. Crimper 12. W hat are two common types of central connecting devices that might be used in a network with a star topology? (Select the best two answers.) A. Switch B. Network adapter C. Hub D. Router 13. W hich of the following devices will protect an entire network from an attacker? A. Hub B. Switch C. Firewall D. Router 14. W hich device connects two LANs to form a W AN? A. Hub B. Switch C. Firewall D. Router 15. W hat is the maximum approximate range of Class 2 Bluetooth devices? A. 1 meter B. 10 meters C. 100 meters D. 1000 meters
4 18. EMI B. 10. W hat setting should you configure prior to joining the domain? A.0. W hich command will enable you to do this? A. Dcconfig 20. You have been instructed to upgrade a Windows Server 2003 computer to a domain controller. Network D. select two types of interference. Faraday cage 17. The Media Access Control (MAC) sublayer is part of which OSI model layer? A.0. 2.0 C. Data Link C. You need to install a SOHO router that seconds as a wireless AP.0 B. 172. 192. Physical B. 10 B.0. ARP 21. DC Ping D. IP address B. RFI D.) A. Static electricity C. W hich of the following additional settings does ipconfig /all allow you to view in comparison to the more basic ipconfig? A. (Select the best two answers. you see that it is automatically configured to hand out IP addresses to computers. Name of the adapter 22. 6 C. 18.104.22.168. Dcpromo C. Gateway address D. Your boss asks you to connect his Windows Vista laptop to a W indows domain. After you install a SOHO router. MAC address C.254. W INS D. Dcdemo B. DNS B. Gateway C. Transport .0 D.16.0 19.4 GHz range? A.1. W hich of the following network numbers does the SOHO router work within to hand out addresses? A. How many channels are normally available to you within the 2. From the following. 11 D.
0 D.189.94.0 C. 10.0 B.0.16. Ethernet frame D.36.152.) A.152.1.254. Physical B.168. APIPA C. W hich class is it a member of? A.1 is an example of a public IP address. Class A B. 256 B.22.214.171.124. DHCP D. At which layer of the OSI model does a router operate? A.46 . 65. HTTP protocol C. Application C. Physical B. Transport 26. TCP message B. 172. 16. Network D. 127. 254 D. You are troubleshooting a computer that cannot access the network or the Internet.244 B. 65536 C. W hat technology is at work here? A. W hich layer of the OSI model does a gateway reside on? A.58. IP packet 25. Class D 29. Class C D. Network D.0.1 C. Public networking B. Data Link C.256 D. 10.36. Transport 24. 208. 208. Local loopback 30.214 27.0. 68. You run an ipconfig/all and see that the IP address the computer is using is 169. 192.43. W hich of these items works on the network layer of the OSI model? A. Class B C.1 28.0. W hich of the following are examples of public IP addresses? (Select the best two answers.1.0.777. W hat is the total number of hosts that can exist on a Class C network? A. W hich of the following is an example of a Class B network number? A.
21 B.168. 207. W hich port does HTTP use? A. 172.168.) A.0. Physical B. 23 C. An FQDN B. Transport 33. W hich service resolves host names to IP addresses? A.168. What layer of the OSI model does TCP. W hich of the following is a valid example of a private IP address? A.com A. A host name D. LMHOSTS . TCP connections use ports to connect to other computers. 110 35. arp –inet_addr 37. A domain name C.1.16. reside on? A. arp –d D. Presentation C. An IP address 38.31.192. Application B. arp –f B. 192. arp –a C. W hat kind of name is the following: Computer1. W hich of the following commands will show the IP-to-MAC conversion table? (Select the best two answers. W hich layer of the OSI model does POP3 and HTTP reside? A. 192.0 D. ARP D.258 C. 21 B.1 32. 88 D.100 B. W hich port does FTP use? A. 25 D. Transport 36. DNS C. and ports. W INS B. Network D.seattle_network. Data Link C.1. 80 C. Session D. 53 34.
IP proxy 42.39. W hich service resolves NetBIOS names to IP addresses? A. 1. How many channels does a T-1 contain? A. W INS server B. 622 Mbps B. SSL C. HOSTS 41. Telnet 43. 8 B. RDP D. 1. SCP D.) A. W INS B. 56 Kbps 46. A multi-homed computer is one that has more than one network adapter. DNS server C. 28 D.536 Mbps C. SSH B. At what speed does a SONET OC-12 line run at? A. 128 Mbps 45. W hich of the following protocols will secure an HTTP session? A. 128 Kbps C. W hich of the following protocols is used by Active Directory? A.536 Mbps D. Router D. 1.536 Kbps B. 24 C. DNS C. Which of the following fall into the category of multi-homed computers? (Select the best two answers. DNS C. ARP D. HTTP B. W INS B. HOSTS 40 W hich protocol resolves IP addresses to MAC addresses? A. 128 Kbps D. FTP . ARP D. W hat is the maximum data transfer rate of an ISDN PRI line? A. 128 44. LDAP C.
W hich of the following services would be the best solution in a scenario where Novell NetW are clients need to access Microsoft resources? A. W hich of the following are protocols that can be used to make VPN connections? (Select the best two answers. W orkstation C. RDP D.47. In W indows Server 2003. W hich protocol uses port 3389? A. File and Printer Sharing 53. Spooler D. This new segment should be set up in such a way so as to accommodate 64 new servers in a single subnet.100. L2TP C. PPTP D. which console would you use to configure a VPN server? A. RRAS D. 1701 C. Active Directory Users and Computers B.168. 192. 192. RRAS 51. W hich of the following IP subnets should you use? A. RAS 50.168. Server B.100.168. CSNW B. 192. A customer asks you to add a new segment to their network. 3389 D. W hich of the following ports is used by L2TP? A.0/25 D.168.0/23 B.0/26 52. IPsec B. but still conserve IP addresses. W orld W ide Web Publishing . 389 48. LDAP C.0/24 C. W hich service in Windows Vista enables the computer to access remote resources? A.100. 1723 B.) A.100. PPTP B. Active Directory Sites and Services C. FPNW D. DMZ 49. 192. GSNW C.
RRAS C. W hich of the following OSI layers is responsible for session timeouts? A. Netstat B. W hich of the following commands will display the services (such as Workstation and Server) that are currently running on a remote computer? A. <03> B. Ping D. <20> C. Layer 4 B. Fiber optic cable B. It appears that other users are running file sharing programs that are delaying packets of the voice calls. Router D. <1f> D. Layer 7 60. W hich of the following hexadecimal numbers correctly identifies the Server service? A. You get complaints from a customer about poor voice quality on calls that cross a T-1 line. Arp 57. Device Manager D.54. Layer 5 C. Upgrade the switches 55. Configure traffic shaping D. Computer Management 58. You use the nbtstat command to identify which services are running on a remote server. Shielded twisted pair C. ADUC B. Configure separate VLANs C. W hich of the following is the most resistant to crosstalk? A. Hub B. W hich of the following W indows consoles will give you information about all of the services running on the computer? A. <00> 59. W hich of the following hardware devices is the most susceptible to this type of collision? A. Which of the following should you implement to improve the voice calls? A. Switch C. Unshielded twisted pair 56. Cat5e D. Nbtstat C. Layer 6 D. Gateway . Collisions on the network occur when two packets are transmitted simultaneously. Install a caching proxy B.
Service timeout 67. Arp time D. 23 B. FTP B. W hat protocol is in charge of this? A. USB C. Net time C. you can log in locally. 66 connector B. NTP D. W hich of the following commands can help to fix the issue? A. 3389 66. W hat is a common mistake when wiring patch panels? A. 110 IDC 62. thereby not allowing the client to login to the domain controller. Screw terminal D.61. RJ45 plug is upside down 63. Network C. W hat type of connector is punched down to on a 568B patch panel? A. L2TP C. 80 C. Session D. W hat would be considered the more secure VPN connection? A. Application . IPsec 64. You realize that one of your client computer’s time is not synchronized to the domain controller. Kerberos C. Time for each of the clients should be synchronized to the domain controller. Data Link B. 1723 D. Punched down too many times C. W hich layer of the OSI model does L2TP work on? A. L2TP with IPsec D. RJ45 plug was crimped too hard B. PPTP B. However. You have setup a Windows domain. Reversed pair D. Net stop B. W hich port would you open on a SOHO router if you wanted to connect to your hone network from a remote location? A. NNTP 65.
Your boss asks you to close port 25. However. QoS C. and want to be able to VPN into your home network. Also. Port-based B. He is protecting against an event where the first network adapter fails. SMTP 69. DNS C. However. You are traveling around the world. they can ping the computer by IP address. SMB C. Fault tolerance B. SNMP B. MAC address 70. Intranet D. W hich of the following TCP/IP properties on the client is not configured properly? A. Your boss asks you to install a second network adapter into a server. RAID 0 B. W hich fault tolerant method uses two disks. Telnet D. W hich of the following should you implement? (Select the best two answers. W INS D. W hich of the following is the most common type of VLAN? A. Protocol-based D. RAID 5 D. Load balancing D. Clustering 74. Port replication B. RAID 6 . RAID 1 C.) A. Extranet 73. One of your customers complains that they cannot access the internal company web server when typing the name of the server in their browser. MAC-based C. You need a solution that will allow a partner company to access some of your servers. and two disks only? A. W hat is this known as? A. you want your LAN users to also be able to access those same servers.68. DMZ C. DHCP B. DMZ 72. Port forwarding D. Port triggering C. Router-based 71. you do not want them to be able to access your LAN. W hich of the following should you enable on your SOHO router? A. W hat service is your boss asking you to shut off? A. Port forwarding B.
168. 192. RAID 1 C. Differential 77. What could be the problem? A. RAID 0 79. RAID 5 80. W hich of the following disperses resource usage among multiple computers? A. RAID 0 B.2. Copy D.168.0/29 D. W hich of the following protects against an attacker’s viruses? A. Load balancing B. 192. W hich of the following IP configurations will allow for 30 computers per subnet? A.2. The phone is plugged into an RJ45 jack B.75. Ipconfig D.4 GHz frequency range with the laptop 81. You need to verify that a router in another state is functioning properly.8 GHz frequency range with the laptop D. Tuesday night.0/27 B. Anti-spyware 76. W hich of the following fault-tolerant methods will stripe data and parity across multiple disks? A. AV software D. W hich command would be the best in this scenario? A.2. Incremental B. RAID 1 D. 192. The phone is sharing the 2. Full C.168. UPS C. The phone is plugged into the same AC receptacle as the router C. You ran a full backup of data on Monday night.168. Tracert C. You need to see the entire path from you to the router.0/30 . your boss instructs you to backup only what has changed since the full backup. One of your customers complains that they lose they’re wireless connection on their laptop when they talk on the cordless phone. 192. The phone is sharing the 5. Firewall B.0/28 C. Fail-over clustering C. Ping B. Disk duplexing D. What type of backup does your boss require? (Select the best answer.) A. Netstat 78.2.
W hich of the following commands will resolve domain names to IP addresses? A. Fraggle C. W hich kind of cable is used by a technician to control a router directly from a laptop? A. Enable port forwarding C. Use a signal booster 83. W hich command will send ICMP echoes that have been increased in packet size to 1. W hich of the following is not an example of Denial of Service (DOS) attack? A. Straight-through C. netstat D. Rolled D. Enable MAC filtering B. W EP C. Replay attack D. Disable the SSID D. what is the best combination of protocols to use in your wireless network? A. Ping flood B. Loopback 84. You want to avoid companies next-door to yours using your wireless network. Man-in-the-middle attack C. DNS C. Blind hijacking B. Ping –n 1500 B. Of the following. ARP B. Arp -1500 88. nslookup . W hich of the following attacks can be described as: an attack that intercepts all data between a client and a server? A. W PA2 and AES 85.500 bytes each? A. Crossover B. Ping –t 1500 D. All of your computers are already set up to use the wireless network. Ping –l 1500 C.82. W hat is t he easiest option? A. Null session D. W PA and TKIP D. W PA B. Smurf attack 86. DNS poisoning 87.
Remotely control a Windows computer B. Remote control a Linux computer 95. Two tokens sharing the same bandwidth C. Token Ring C. You want to use the P: drive for this mapped network drive. W hich command will show all inbound ports in numeric fashion? A. Token passing D. net stop D.) A. Remote connect to a VPN server D. The link light on your network adapter is blinking in a quick yet non-random fashion. Caps lock 96. net send B. You need to map a drive to a share called “puredata” on a server named “Pisces”. net use P: \\pisces\puredata . One token crashing into another 94. Time synchronization C. Terminal Services allows you to do which of the following tasks? A. Remotely connect to a Cisco router C. netstat B.89. User name and password D. nbtstat –an 91. Two frames of data hitting each other D. IP address B. W hich command will turn off a service? A. W hat should you check first if you cannot log on to a domain? (Select the best two answers. Ethernet B. 100BASE-T 93. Patch cables 92. Two packets going in opposite directions B. Network adapter driver D. net start 90. \\puredata\pisces C. TCP/IP settings C. W hat would be the proper syntax in the command-line to do this? A. W hich of the following networking technologies sends broadcasts? A. net use \\pisces\puredata D. netstat –an D. Activity light B. W hat should you check? A. W hich of the following statements best describes a collision? A. nbtstat C. net use \\servername\sharename B. net share C.
what should you install? A. 6 months 98. Panic D. Eight days C. Test the result . Identify symptoms B. A DNS server C. If you have a router separating subnet A and subnet B and you need to hand out DHCP addresses to computers on the subnet B. Return 99.97. You have a network with two subnets. One month B. A second DHCP server B. Revoke B. W hat is a common default lease time for a DHCP address? A. Identify the affected area C. W hich of the following should you do first when troubleshooting a problem on the network? A. Request D. A DHCP relay agent 100. There is a DHCP server on subnet A that is configured to hand out IP addresses to all computers. One year D. Re-negotiate C. A W INS server D. W hat is the third step in the DORA DHCP process? A.
3z specifies 1000 Mbps over fiber. and 802. Ipconfig /all Explanation: Ipconfig /all (when typed in the Command Prompt) shows the local computer’s IP configuration.1. Category 5 Explanation: Category 5 (Cat5) is the minimum category of twisted pair necessary for 100BASE-Tx networks.3ab specifies 1000 Mbps over copper. Category 6 can run much faster and is therefore not the minimum cable that would be necessary. Answer: C. Answer: A. however.3u Explanation: 802.11n is not listed here. 3. Cat5 can run at a maximum of 100 Mbps.10101000. Star Explanation: The star topology connects hosts together by way of a central connecting device such as a hub or (more commonly) a switch. including information such as DNS server address. 7. 802.ANSWERS 1. it is wise to consider Cat6 when installing a network. 802. 802. 32-bit Explanation: IPv4 addresses are 32 bits in length. 802.11a Explanation: 802. Answer: D. It specifies a maximum transmission speed of 100 Mbps. An example of an IPv4 address would be 192. 5.11b has a maximum of 11 Mbps. but can go much faster than 54 Mbps.3u is the IEEE standard also known as Fast Ethernet. It should be mentioned that 802. There are no 8-bit or 256-bit addresses as of the year 2010.00000001. and 802. Tracert tests for hosts on other networks and traces the route from you to the final destination. Ping tests whether other hosts are alive on the network. 6.4 GHz range. Answers: C. This address has 4 octets. instead it is a form of authentication on the LAN that network cards and switches might be compliant with.1.11g and a have a maximum data transfer rate of 54 Mbps. or mesh topologies. The 100 means 100 Mbps. ring. The regular ipconfig command does not show this additional information. Cat3 and Cat4 cannot. 2. 802. and D. this address would be expressed as 11000000.11g. 10BASE5 and 10BASE2 are coaxial standards. 802.3 is the original Ethernet which specifies a maximum of 10 Mbps. . Answer: C. the BASE specifies baseband transmissions. and A uses the 5 GHz range. and 100BASE-FX is a fiber optic cabling standard. IPv6 uses 128 -bit IP addresses. and the T stands for twisted pair. Although G uses the 2. In binary.1X does not deal with wireless transmission speeds. Answer: B. and MAC addresses. It is by far more common than the bus.168. which together equal 32 bits. 4. 100BASE-T Explanation: 100BASE-T is a cabling standard that uses twisted pair cable.Answer: B.00000001 for 32 bits in total.
BOGB is the acronym that denotes the 4 main colors (blue.0. Answer: B. Router Explanation: A router connects two LANs together to form a W AN. 9. Although some small office-home office (SOHO) routers have a firewall built-in. Answer: D. Answer: C. Network adapters connect individual computers to the network. and more commonly. Routers connect networks together. Every local computer that runs IPv6 will use ::1 as the local loopback address. 13. and network jacks. the local private address of a system using IPv6 starts with FE80. It is one type of USOC (Universal Service Order Code). Switch and hub. The router connects clients on one network to other networks such as the Internet. RJ11 is used for phone. It can also allow connectivity to the Internet.0. especially in older. switches are used to connect computers together in a star topology. It became the standard in the early 1990’s. Answer: A. and BNC connectors are used by coaxial cables. 14. RJ45 Explanation: The RJ45 connector is the most commonly used connector in networks using UTP cable. . Explanation: Hubs. green. eclipsing 568A. Hubs and switches allow for hosts on a LAN to communicate with each other. Answer: B. the firewall is considered a separate device that protects the LAN from attackers.8. 10 meters Explanation: Class 2 Bluetooth devices have a maximum range of 10 meters before transmission loss will occur. ::1 Explanation: ::1 is the loopback address or IPv6. Class 3 is 1 meter. 15. 11. FE80::/10 is the range of addresses that can be used by private IPv6 computers. As of 2010. 10. 127. Crimper Explanation: An RJ45 crimper is used to connect the RJ45 plug to the CAT5 cable. Answers: A. 568B Explanation: EIA/TIA 568B is the most commonly used wiring standard when dealing with UTP cable and LANs. A TDR is a time-domain reflectometer. A punch down tool is for punching network wires down to punch blocks. Answer: B. Answer: D. Hubs and switches simply connect hosts on the LAN together. Usually. no Bluetooth devices can transmit data to 1000 meters. and C. 12. A patch tester will verify connectivity of a network patch cable. deprecated 10BASE2 networks. ST is used by fiber optic cables. and brown) that are used by the various cabling specifications such as 568B. Class 1 is 100 meters. patch panels. Firewall Explanation: The firewall’s main purpose is to protect the network from attackers. orange. which checks a cable for breaks.1 is the local l oopback address for IPv4. 0000::10 is not a valid IPv6 address.
Answer: D.168. also known as layer 3.0.2. Answer: C. D-Link devices use 192. Data Link Explanation: The MAC and LLC sublayers are part of the Data Link Layer. 24. 19. not ipconfig.1. The other commands are not valid. Answer: B. This is a necessary component before joining the domain. 2. of the OSI model. 20. but if you discharge it to a circuit board or even an unshielded network cable. consider using Channels 1. Network Explanation: A router operates at the network layer of the OSI model. The rest of the answers are viewable simply by typing the ipconfig command. This is because most domains rely on DNS for the translation of host names to IP addresses. 17. MAC address Explanation: The MAC address can only be viewed with ipconfig /all.0. Ethernet frames reside on the Data Link Layer. Explanation: the Dcpromo command initiates the domain controller promotion for Windows Server 2003/2008. Answer: A. and W indows 2000 server. Answers: A and C.0 Explanation: 192. A Faraday cage is used to prevent interference. most devices will have 11 channels from which you can select to send your wireless transmissions.1. 22. 192. Answer: B. 21. If you have more than one wireless AP. Answer: C. Answer: B.168. and Belkin devices use 192.0. it could cause disruption and data loss.16. Answer: D.0 is one example of a common network number used by a SOHO router. also known as layer 2. This is common to Linksys devices. IP packet Explanation: IP packets reside on the Network Layer of the OSI model. . DNS Explanation: The DNS server address should be configured on the laptop prior to joining the W indows domain. 6 and 11 so that there are not overlapping channels. 11 Explanation: In the United States.4 is the frequency range that these channels use. EMI and RFI Explanation: EMI (electromagnetic interference) and RFI (radio frequency interference) are two types of interference that can affect your wires and wireless networks. TCP messages start at the Transport Layer and ascend all the way up to the Application Layer. 18.168. 23. HTTP protocols start at the Application Layer. Static electricity is not considered interference.168.
31.100 is the only answer listed that is an example of a valid private IP address.0. Application.152.1. 68.1 is a public Class A IP address.58.0 is an example of a private.0. 30. and 192-223 is Class C.16. Answer: C.168. . which are the addresses of routers.0 is a private IP network number. These reside on the Application Layer. Explanation: A true gateway is one that translates from one protocol or platform to another.46 Explanation: 68. Answer: B. 192. 32. This is where port connections are made and described. They should not be confused with gateway addresses. These would range between 192.1 and 192.16.0 cannot be used because that is the network number.0 is the example of a Class A private network number.1. APIPA Explanation: APIPA (Automatic Private IP Addressing) is a Microsoft technology that enables computers to auto-assign IP addresses to themselves.0.168. you can be fairly certain that it is an APIPA address.1.168. 126.96.36.199 is the local loopback IP address. for example 192.11. which reside on the Network Layer of the OSI model. Answer: A. 188.8.131.52.1.192. 172. also known as layer 4.0.46 is a public Class C IP address. Answer: B.152.100 Explanation: 192.254. 184.108.40.206. 29. 127 is reserved for local loopback testing. all the way up to 172. Answer: C.1. 10. The rule is that the first and last numbers cannot be used for hosts. 27.0.1 is a Class A public IP address.152.258 is not valid because 258 is not within the possible range (1-254).256 is not a valid IP because the number 256 cannot be used in any octet of an IPv4 address. 128191 is Class B.168. Answers: B and D.1 is a valid public IP address.18. The first octet (65) is within the Class A range of 1-126.168. class B network number. 28.0.16. 208. 207.1. Answer: Class A.0 is an example of a Class C private network number.43.254 network.244 is a private Class A address. Transport Explanation: TCP connections are made on the Transport Layer of the OSI model.1.168. 26. If you see an address on the 169.0 would be another.94. It is a Class C private address.1. and so on. 10. Explanation: 65. 172. 192.36. And 127.0 can only have 254 hosts maximum. 208.31.255 cannot be used because it’s the broadcast number.220.127.116.11.25. Answer: D.1. 192.0 Explanation: 172.128.168. not an individual IP address.1 and 208. 254 Explanation: A class C network.
34. FTP.txt file. 41. and FQDNs to their corresponding IP addresses. DNS uses port 53. Answers: C and D.com is the domain name.Answer: B. 80 Explanation: HTTP (Hypertext Transfer Protocol) uses inbound port 80. domain names. 42. An older static textversion of this is the LMHOSTS. one per network. and other protocols that are directly related to their corresponding applications reside on the Application Layer of the OSI model. Kerberos uses port 88. computer1 is the host name . An older static text-version of this is the HOSTS.Answer: A. SMTP uses port 25.33. Explanation: The arp-a and arp-g commands will show the IP to MAC conversion table for recently made connections over the network. but is insecure. Answer: B. Answers: B and C. 39. and seattle_network. the IP proxy needs a network adapter for the LAN and for the Internet. Answer: A. Telnet uses port 23. RDP is Remote Desktop Protocol. Application Explanation: POP3. LDAP Explanation: LDAP (Lightweight Directory Access Protocol) is used by Microsoft’s Active Directory. arp –a and arp –d. Answer: B. Router and IP proxy Explanation: Routers connect two or more networks together. 36. 35. FTP uses port 21. Telnet is used to take control of computers via the commandline. and therefore not recommended for use . deprecated.TXT file. and allow all of the LAN computers to access the Internet. HTTP is an Internet protocol. W INS Explanation: W INS (the W indows Internet Naming Service) is a Microsoft protocol that resolves NetBIOS names to IP addresses. An FQDN Explanation: An FQDN (fully qualified domain name) is a name that contains a domain name and a host name. HTTP. Answer: A. Answer: A. together they make the FQDN 38. DNS Explanation: DNS (the Domain Name System service) resolves host names. Arp –d will delete a host that can be specified by inet_addr. IP proxies provide a method of protecting all of the LAN IP addresses. 37. Answer: C. 21 Explanation: FTP (File Transfer Protocol) uses inbound port 21 to establish connections on FTP servers. so they need two network adapters minimum. ARP Explanation: ARP (Address Resolution Protocol) translates between IP addresses on the Network Layer of the OSI model to MAC addresses on the Data Link Layer of the OSI model. In this example. 40. POP3 uses port 110.
and LDAP uses port 389. /26 only allows for 62 hosts per subnet.100. 1701. 51. 45. with a total of 126 hosts per subnet. It is divided into 24 equal 64 Kbps channels.544 Mbps (due to the additional 8 Kbps T-1 timing circuit). Answer: C.536 Mbps.168. 49.0 network. 46. SSH is a secure alternative to Telnet. RDP uses port 3389. /23 and /24 do not conserve enough IP addresses on the 192. router. Explanation: L2TP and PPTP are common tunneling protocols used to make VPN connections. Answer: B.255. LDAP uses port 389 (or 636 if it is secure LDAP). 192. . which has a total data throughput of 1. A BRI ISDN line has a maximum of 128 Kbps. RRAS is a service and not a protocol. Answer: B. 50. SSL Explanation: SSL (Secure Sockets Layer) and its successor TLS (Transport Layer Security) are used to secure HTTP sessions. Explanation: There are 24 equal 64 Kbps channels within a T-1. Answers: B and C. PPTP uses port 1723. a T-1 will have a 8 Kbps timing circuit. 24. 1. Explanation: L2TP (the Layer 2 Tunneling Protocol) uses inbound port 1701. RDP Explanation: RDP (the Remote Desktop Protocol) uses inbound port 3389. and so on within a W indows Server 2003. SCP is the Secure Copy protocol. L2TP and PPTP. A DMZ is a demilitarized zone. 47. Answer: B.100.536 Mbps.128. Answer: C. RRAS Explanation: RRAS (Routing and Remote Access Service) is the console used to configure a VPN server. 44. In addition. one of which is used as an ISDN timing circuit.43. Answer: C. IPsec is used to secure the connection.255. Answer: C.168. PPTP uses port 1723. FTP is the File Transfer Protocol. 48. This means that there can be 2 subnets maximum in the segment. Explanation: An ISDN PRI (Primary Rate ISDN) line has a maximum data transfer rate of 1. It is often run on a T-1 line. Answer: A. 622 Mbps Explanation: A SONET OC-12 line runs at a maximum of 622 Mbps.0/25 Explanation: The /25 equates to a subnet mask of 255.
Computer Management Explanation: The Computer Management console window can show all of the services and their current state. Answer: C. The W orld Wide Web Publishing service deals with websites running on the local computer. Answer: D. and timeouts. Fiber optic cable Explanation: Fiber optic cable transmits light instead of electricity. Layer 4 is the Transport Layer. Answer: A. and File and Print Sharing is used by Microsoft operating systems only. 58. Layer 6 is the Presentation Layer. logout. Upgrading the switches will also affect the LAN and will be removed from the T-1. <20> Explanation: <20> identifies the Server service. 56. For example. CSNW and GSNW are used to connect Microsoft clients to NetWare resources (single clients and multiple clients respectively). <1f> deals with domain services. <00> is the W orkstation service. 54. 55. and allows connectivity from Novell NetW are clients to Microsoft resources. Nbtstat Explanation: Nbtstat (NetBIOS over TCP/IP Statistics) can show the services running on a remote computer. session connections. 57. Configure traffic shaping Explanation: By configuring traffic shaping. 59. W orkstation Explanation: The W orkstation service in W indows enables computers to access other computers on the network and their remote resources. you can limit the amount of bandwidth that users of file sharing programs will have access to. This makes it impossible for crosstalk to occur since crosstalk is a by-product of electrical wires that are close together.52. It is responsible for login. Arp deals with IP address to MAC address resolutions. Netstat shows sessions running on a local computer. Answer: C. The Server service enables other remote computers to access local resources on the computer running the Server service. The rest of the answers are copper-based and therefore susceptible to crosstalk. Answer: B. It might help to conserve bandwidth overall but is not the best answer. Layer 5 Explanation: Layer 5 is the Session Layer of the OSI model. A caching proxy holds web information for subsequent clients. and increase the bandwidth available to the voice calls. Configuring VLANs is done on a switch. It is installed and run on a W indows Server. 53. it all depends on what line the proxy is connected to. Answer: B. . nbtstat –a computername. and will therefore be removed from the affected T-1. <03> is the Messenger service. Ping tests whether hosts are alive on the network. The Spooler service deals with printing on the local computer. Layer 7 is the Application Layer. Answer: B. While this can conserve bandwidth. FPNW Explanation: FPNW (File and Print Services for NetW are) is the best service to use. Answer: B.
L2TP should not be used by itself. USB simply connects to a USB port. Answer: C. W hen computers are connected to a hub it is considered to be shared bandwidth. Answer: D. NNTP is the Network News Transfer Protocol. IPsec is a security protocol that can be used in various situations. 62. 1723 Explanation: PPTP is a commonly used protocol for connecting to a home network via a VPN. 67. L2TP with IPsec Explanation: L2TP with IPsec provides better encryption and security than PPTP. Screw terminals can be found on older telephone modules. It uses port 1723. Port 80 is used by HTTP. The other two answers are not valid. RJ45 plugs don’t come into play when it comes to wiring a patch panel. Kerberos is another protocol used in W indows domains that enables the login from clients to the domain controller. in this case wires are stripped and wrapped around the terminal. 61. Answer: B. Answer: C. Port 3389 is used by RDP. 110 IDC Explanation: Patch panels use 110 IDC connectors and require a special punchdown tool. L2TP works on Layer 2 of the OSI model. FTP is the File Transfer Protocol. 63. and is commonly used to encrypt L2TP VPN connections. Reversed pair Explanation: W hen wiring a patch panel. Answer: A. Answer: C. 66 blocks (also known as punch blocks) that are used for telephone connections have 66 connectors. 66. Net stop will stop a service in the command-line. Data Link Explanation: As the name implies (L2TP stands for Layer 2 Tunneling Protocol). Switches and other devices do not have this issue due to the fact that they employ a matrix of wiring. it is difficult to punch down too many times. it can be easy to reverse a pair unwittingly. Port 23 is used by Telnet. NTP Explanation: NTP (the Network Time Protocol) is used to synchronize time between clients of a domain and the domain controller. It is wise to double punch and even triple punch connections. Hub Explanation: A hub is the most susceptible to collisions because all of the copper wiring inside the hub is shared. each pair of colors must be punched down correctly. not punched down.60. Answer: A. 64. because the patch panel is built to withstand that kind of abuse. no punching down is required for screw terminals or USB connections. . the Data Link Layer. 65. Answer: C. Net time Explanation: The Net time command is used to synchronize time between Windows clients and other W indows computers such as domain controllers. creating separate segments of traffic.
Fault tolerance Explanation: The additional of extra components in an effort to protect against failure is done to increase the fault tolerance of a device. VLANs are setup on a switch. but not the public. Answer: B. 70. partner companies. 73. Answers: B and D. Often. Answer: D. RAID 6 requires a minimum of 4 disks. Answer: A. but not connect by name. The extranet is used to share information with other companies. a person could ping the IP address of the host. Anti-spyware protects against spyware intrusions.68. There are no router-based VLANs. DMZs can also be accessed by LAN users. Answer: C. 75. 71. AV software Explanation: AV (antivirus) software protects against viruses. but it is a technical need that is possibly required when implementing a DMZ. DNS Explanation: DNS (the Domain Name System) needs to be configured properly in order to facilitate the resolution of domain names to IP addresses. So DMZ and extranet are both valid answers. RAID 0 can use two or more disks but it is not fault tolerant. Port-based Explanation: Port-based VLANs are the most common. Intranets are used by employees of the company only. SMTP Explanation: SMTP (the Simple Mail Transfer Protocol) uses port 25. SMB stands for Server Message Block and is a type of packet. 74. without allowing them access to the LAN. Answer: A. 72. MAC addresses are not normally configured. RAID 5 requires a minimum of 3 disks. This is done with a special firewall configuration. Telnet uses port 23. Explanation: A DMZ (demilitarized zone) is used to store less volatile information in order to share it with sister-companies. for example a VPN server. W INS deals with NetBIOS name to IP address resolution and is far less common than DNS. Answer: C. DHCP is not configured on the client. A UPS protects a computer from power issues. it is simply turned on. Answer: B. Port forwarding Explanation: Port forwarding allows you to redirect ports on the router to specific computers on your home network. SNMP uses port 161. Port forwarding might be initiated. . Firewalls protect an entire network against attackers using attacks such as DOS. RAID 1 Explanation: RAID 1 (mirroring) can use two disks only. 69. and other remote users. DMZ and Extranet. Without DNS. They deal with the physical ports of a switch. Protocol and MAC-based VLANs are more complicated to set up and are less common.
79. Answer: D. It also sets the archive bit to one. It is also known as true clustering. or last incremental backup. but it does not show paths to the final destination. when multiple drives are used together for speed. 802.0/27 Explanation: /27 equates to a subnet mask of 255. Tracert Explanation: Tracert will check the router from you to the final destination. RAID 0 is striping. and stripes data and parity information across those disks. /29 is 6 hosts per subnet. . so if you wish to run another incremental backup on W ednesday. Answer: A.4 GHz range. Disk duplexing is when a RAID 1 mirror has been set up.2. Incremental Explanation: An incremental backup will backup only what has changed since the last full backup. Enabling MAC filtering is a possible solution. Answer: C. Disable the SSID Explanation: By disabling the SSID. RAID 1 is mirroring and is when data is written to two drives. Ipconfig shows the IP configuration of the local computer. and is usually used on the LAN. Ping checks if hosts are alive. but with a separate hard drive controller for each drive. a router. and so on. 80.255. Answer: D. that backup will only backup what has changed since the incremental on Tuesday. This makes interference a common occurrence. 81. Port forwarding deals with making a redirection from the router to a computer on the network. 82. which does not se the archive bit.224.4 GHz frequency range with the laptop Explanation: It is common to find cordless phones that use the 2. with a maximum of 30 hosts per subnet. 192. Fail-over clustering is when a secondary computer takes over completely when the first computer fails. Using a signal booster would make it easier for other users to connect to your wireless network. The phone is sharing the 2. computer. Answer: A.76. Also. 77.168. whatever that might be.255. and n utilize the 2. g.4 GHz frequency range. Netstat shows (among other things) network sessions the local computer currently has running. Answer: B. but not the easiest by far. This allows for 8 subnets total. Load balancing Explanation: Load balancing distributes resource load among multiple devices or computers. 78. /28 only allows for 14 hosts per subnet.11b. because it would extend your wireless range. /30 is 2 hosts per subnet. wireless users from next-door companies will not be able to find your network (using conventional means). Answer: A. RAID 5 Explanation: RAID 5 uses three or more disks. This saves time and resources in comparison to a differential backup.
. Crossover connections are used when like devices are connected together. Answer: C. 85. –n deals with the amount of packets sent. Netstat shows network connections of the local computer. 91. To get a full listing of ports being used. and don’t have any kinks or slices. Patch cables Explanation: If the link light is behaving abnormally. 87. wired properly. Ping –l 1500 Explanation: -l (as in L like Larry) allows you to change the buffer size. Answer: B. ARP resolves IP addresses to MAC addresses. netstat –an Explanation: The netstat command shows network connections and the ports they use. Answer: D. Answer: C. Arp -1500 is invalid. net stop Explanation: The net stop command can stop services in the command-line. Null session Explanation: The null session is the only attack listed that is not a DOS attack. Answer: D. Answer: D. Loopback cables are used to identify network adapter issues. giving the person at the laptop full control of the router. 88. –t 1500 is invalid because –t sends continuous packets. use netstat –an. Rolled Explanation: A rolled cable is used to connect a laptop’s serial port to a router’s console port. 86. For example. such as a computer and a switch.nslookup Explanation: The nslookup command can be used to (among other things) resolve domain names to their corresponding IP addresses. Man-in-the-middle attack Explanation: The man-in-the-middle attack attempts to intercept all data between a client and a server. 84. Null session attacks make unauthenticated NetBIOS connections to a target computer. and make sure they are the right type. 90. W EP is deprecated and should be avoided. it is limited.83. net stop spooler would stop the print spooler service. DNS is not a command but the service that resolves domain names to IP addresses. 89. Straight-through connections (the most common) are used to connect unlike device. However. or packet size. Answer: C. use netstat –a. Answer: C. To get that same information in numeric format. Answer: B. check the patch cables. W PA2 and AES Explanation: W PA2 is the newest of the listed encryptions standards. It is best used with AES (Advanced Encryption Standard).
Finally. Don’t let emotions cloud your judgment. Later. 93. Answer: A. 99. 96. the display looks as if the person is sitting right at the remote computer. The Caps lock can get in the way of typing this correctly also. There are two possible solutions to this: installing the BootP protocol on the router or installing a DHCP relay agent on the other subnet. it is the frames that contain the packets. net use P: \\pisces\puredata Explanation: Net use is the proper command. you do not need a second DHCP server. Two frames of data hitting each other Explanation: Collisions occur on Ethernet networks when two frames of data are transmitted simultaneously. instead of utilizing broadcasts. This is when the client computer “requests” an IP address from the DHCP server. Answer: C. The relay agent will talk directly through the router to the DHCP server and allow the packets to cross to the other network. 95. Ethernet Explanation: W hen a computer transmits data on an Ethernet network. you would identify the area affected. Token Ring and Token passing technologies use a single token to deliver packets. DHCP packets cannot cross a router. More advanced things like IP configurations and time synchronization can be checked afterwards. 97. 100. stands for request. Identify symptoms Explanation: Identify symptoms before you actually do anything. 100BASE-T is a cabling technology that specifies 100 Mbps over twisted pair cable. 94. . Answer: A. 98. Token passing and Token Ring networks do not have this problem because they only use one token (normally). Username and password. Answer: C. Never panic. Answer: B. Answer: D. A DHCP relay agent Explanation: By default. \\pisces\puredata would be the proper path.92. It is usually the IP address that the server offered in the previous step. it isn’t really packets that collide. Answers: C and D. followed by P: to specify the drive letter you want to use for the mapped connection. Answer: D. and finally. you would test the result. Answer: A. Remotely control a W indows computer Explanation: Terminal Services is a W indows service also known simply as Remote Desktop (or RDP). It allows a person to remotely control a W indows computer. (the R in DORA). Request Explanation: The third step of the DHCP DORA process. Eight days Explanation: Most W indows Server systems will default to eight days for DHCP addresses. and Caps lock Explanation: The most common reason why a user can’t log on to a domain is because they typed the username or password incorrectly. Also. the data is by default broadcast to every host on the network. This way.
This action might not be possible to undo. Are you sure you want to continue?
We've moved you to where you read on your other device.
Get the full title to continue listening from where you left off, or restart the preview.