Documente Academic
Documente Profesional
Documente Cultură
QUESTION 1
What is the most common central device used today to connect computers to a
network?
A. hub
B. switch
C. SOHO router
D. VPN router
Correct Answer: B
QUESTION 2
What is the most common adapter or connector used to connect a computer to a wired
network?
A. RG6
B. RG58
C. RJ45
D. RJ8
Correct Answer: C
QUESTION 3
Which of the following does a switch use for increased performance?
A. simplex
B. half duplex
C. full duplex
D. sliding duplex
Correct Answer: C
QUESTION 4
What do you use to isolate a group of computers within your organization?
A. WLAN
B. WAN
C. VLAN
D. Internet
Correct Answer: C
QUESTION 5
What do you use to create VLANs?
A. router
B. switch
C. firewall
D. proxy server
Correct Answer: B
QUESTION 6
What zone is used to publish external websites for an organization?
A. intranet
B. exanet
C. internetwork
D. DMZ
Correct Answer: D
QUESTION 7
Which topology is the most redundant and the most expensive?
A. star
< span style="mso-list: ignore">B. ring
C. mesh
D. bus
Correct Answer: C
QUESTION 8
What standard describes CSMA/CD?
A. 801.2
B. 802.3
C. 802.5
D. 802.11
Correct Answer: B
QUESTION 9
What mechanism do wireless networks use to access the network?
A. CSMA/CD
B. CSMA/CA
C. token passing
D. polling
Correct Answer: B
QUESTION 10
What model promises the most processing power?
A. centralized computing
B. distributive computing
C switching computing
D. dumb computing
Correct Answer: B
QUESTION 11
Which model users a central database for authentication?
A. peer-to-peer
B. workgroup
C. client/server
D. distributive
Correct Answer: C
QUESTION 12
What type of server does Active Director run on?
A. file server
B. print server
C. database server
D. network controller
Correct Answer: D
QUESTION 13
Which model has each host have their own security database?
A. peer-to-peer
B. client/server
C. distributive
D. sliding
Correct Answer: A
QUESTION 14
What type of communication is sent to a single designated host?
A. unicast
B. broadcast
C. multicast
D. anycast
Correct Answer: A
QUESTION 15
What is used to uniquely identify a host on a TCP/IP network?
A. IP address
B. MAC address
C. bit pattern
D. router name
Correct Answer: A
QUESTION 16
A _________ is a single computer or device that connects to a TCP/IP network.
A. Host
B. Node
C. Access Point
D. Laptop
Correct Answer: AB
QUESTION 17
What is the central device used in wireless LANs?
Correct Answer: A
QUESTION 18
What command do you use to test the TCP/IP stack on a computer?
A. Ping localhost
B. Ping 127.0.0.1
C. Ping loopback
D. ipconfig /renew
QUESTION 19
You need to divide a network into three subnets. Which Device should you use?
A. Router
B. Hub
C. Segmenter
D. Bridge
Correct Answer: A
QUESTION 20
Connecting to a private Network address from a public network requires:
Correct Answer: D
QUESTION 21
What model is used to describe how data communication occurs between hosts?
A. server-centric model
B. workgroup model
C. peer-to-peer model
D. OSI reference model
Correct Answer: D
QUESTION 22
Which layer in the OSI model do MAC addresses and switches use?
A. Physical
B. Data Link
C. Network
D. Transport
Correct Answer: B
QUESTION 23
Which layer in the OSI model covers routing between networks?
A. Physical
B. Data Link
C. Network
D. Transport
Correct Answer: C
QUESTION 24
Which layer in the OSI model is used to verify that data was delivered without error?
A. Physical
B. Data Link
C. Network
D. Transport
Correct Answer: C
QUESTION 25
Which layer in the OSI model covers HTTP, FTP, and RDC?
A. Physical
B. Session
C. Application
D. Presentation
Correct Answer: C
QUESTION 26
Which layer of the OSI model is used to create a connection so that a host can transfer
files?
A. Physical
B. Session
C. Application
D. Presentation
Correct Answer: B
QUESTION 27
Which layer of the OSI model includes VLANs?
A. Physical
B. Data Link
C. Network
D. Transport
Correct Answer: B
QUESTION 28
Which protocol do you use as the transport protocol for a video application?
A. TCP
B. UDP
C. FTP
D. RDC
Correct Answer: B
QUESTION 29
Which port categories include inbound ports of HTTP, HTTPS, FTP, and DNS?
A. well-known ports
B. registered ports
C. dynamic ports
D. private ports
Correct Answer: A
QUESTION 30
What layer in the OSI model is responsible for logging on and off?
A. Physical
B. Session
C. Application
D. Presentation
Correct Answer: B
QUESTION 31
What layer in the OSI model is used to encrypt data?
A. Physical
B. Session
C. Application
D. Presentation
Correct Answer: D
QUESTION 32
Which layer in the OSI model includes the cable and network adapters?
A. Physical
B. Session
C. Application
D. Presentation
Correct Answer: A
QUESTION 33
How many layers does the TCP/IP model have?
A. 3
B. 4
C. 6
D. 7
Correct Answer: B
QUESTION 34
Which layer in the OSI model is included in the TCP/IP model?
A. Physical
B. Data Link
C. Transport
D. Application
Correct Answer: C
QUESTION 35
Which protocol is used to translate IP addresses to MAC addresses?
A. RARP
B. ARP
C. DNS
D. WINS
Correct Answer: B
QUESTION 36
What ports are defined above 49,152?
A. well-known ports
B. registered ports
C. dynamic ports
D. sliding ports
Correct Answer: C
QUESTION 37
A layer 3 switch is similar to a __________.
A. Router
B. Repeater
C. Hub
D. Patch Panel
Correct Answer: A
QUESTION 38
TCP/IP and IPX/SPX are known as _________ stacks.
A. Protocols
B. Services
C. Layers
D. Lenses
Correct Answer: A
QUESTION 39
What is the advantage of UDP over TCP?
Correct Answer: A
QUESTION 40
What are the seven layers found in the OSI model, in order?
Correct Answer: A
QUESTION 41
What is the maximum speed supported by 802.11b?
A. 1 Mbps
B. 10 Mbps
C. 11 Mbps
D. 54 Mbps
Correct Answer: C
QUESTION 42
One reason to incorporate VLANs in a network is to:
Correct Answer: D
QUESTION 43
What is the minimum cabling requirement for a 100BaseTx network?
Correct Answer: B
QUESTION 44
A routers static route is set by the:
Correct Answer: D
QUESTION 45
What type of record does DNS use to find a mail service?
Correct Answer: D
QUESTION 46
How many bits are there in an Internet Protocol version 6 (IPv6) address?
A. 32
B. 64
C. 128
D. 256
Correct Answer: C
QUESTION 47
In which OSI layer does routing occur?
A. Physical
B. Network
C. Data Link
D. Transport
Correct Answer: B
QUESTION 48
The query protocol used to locate resources on a network is:
A. Tracert
B. Telnet.
C. Lightweight Directory Access Protocol (LDAP).
D. User Datagram Protocol (UDP).
Correct Answer: C
QUESTION 49
What is the most common cable used today?
A. UTP
B. STP
C. Coaxial
D. Fiber
Correct Answer: A
QUESTION 50
If you are making a crossover cable and one end is 568A, what should the other end be?
A. 568A
B. 568B
C. 568C
D. BOGB
Correct Answer: B
QUESTION 51
If you want to connect a computer directly to another computer without using a switch,
you use a __________.
A. straight-through cable
B. crossover cable
C. laplink cable
D. rollover cable
Correct Answer: B
QUESTION 52
You need to connect a twisted-pair cable to the back of a patch panel. What tool should
you use?
A. punch-down tool
B. zip tool
C. wire wedge
D. soldering iron
Correct Answer: A
QUESTION 53
What is the minimum category of twisted-pair cable you need to support 100 Mbps?
A. Category 3
B. Category 5
C. Category 5e
D. Category 6
Correct Answer: B
QUESTION 54
When you pick up your wireless phone, your computer drops network connectivity. What
could be the cause of the problem?
A. EMI
B. RFI
C. network adapter failure
D. cable failure
Correct Answer: B
QUESTION 55
You are setting up a network within a warehouse using Category 6 UTP. However, parts
of the network are down because of the heavy machinery used. What cable type should
you use?
A. STP
B. coaxial
C. fiber
D. plenum-rated
Correct Answer: C
QUESTION 56
What do you call it when electrical signals jump to another set of wires?
A. EMI
B. RFI
C. crosstalk
D. jump it is
Correct Answer: C
QUESTION 57
What type of cable should be used as part of a fire code for a building?
A. STP
B. PVC
C. heat protected
D. plenum-rated
Correct Answer: D
QUESTION 58
Which of the following is not a fiber connector?
A. FC
B. LC
C. RJ-45
D. MT-RJ
Correct Answer: C
QUESTION 59
Which of the following is a characteristic of single-mode fiber?
Correct Answer: A
QUESTION 60
Which protocol can be used to encrypt packets on the Internet?
A. HTTP
B. SNMP
C. HTTPS
D. TFTP
Correct Answer: C
QUESTION 61
What is the maximum speed supported by 802.11g?
A. 1 Mbps
B. 10 Mbps
C. 11 Mbps
D. 54 Mbps
Correct Answer: D
QUESTION 62
What of the following is not a characteristic of 802.11n?
A. frame aggregation
B. channel bonding
C. RFI protection
D. MIMO
Correct Answer: C
QUESTION 63
Which is the most secure encryption used in wireless networks?
A. WEP
B. WPA
C. WPA2
D. 802.1x
Correct Answer: C
QUESTION 64
What is used to identify a wireless network?
A. network ID
B. frequency identifier
C. wireless password
D. SSID
Correct Answer: D
QUESTION 65
To test a cable, you would use a _____________.
A. Continuity tester
B. Patch Tester
C. Loopback Plug
D. Tone & Probe
Correct Answer: A
QUESTION 66
For organizations, using ___________ authentication for wireless networks is
recommended.
A. 802.1d
B. 802.1x
C. 802.11g
D. 802.11x
Correct Answer: B
QUESTION 67
When a signal degrades as it runs through a wire, you have ________.
A. Degradation
B. Attenuation
C. Cross Over
D. Resistance
Correct Answer: A
QUESTION 68
What mode users a wireless access point?
A. Infrastructure Mode
B. Ad Hop Mode
C. Bridge Mode
D. Forward Tunneling Mode
Correct Answer: A
QUESTION 69
What command do you use to connect to a FTP server to download a file?
A. nslookup
B. ssh
C. telnet
D. ftp
Correct Answer: D
QUESTION 70
Which of the following is a public IP address?
A. 10.156.89.1
B. 68.24.78.221
C. 172.16.152.48
D. 192.168.25.101
Correct Answer: B
QUESTION 71
What is the default subnet mask for a Class B network?
A. 255.0.0.0
B. 255.255.0.0
C. 255.255.255.0
D. 255.255.255.255
Correct Answer: B
QUESTION 72
You have a host with the address of 180.24.45.120. To what class would this be address
be assigned?
A. Class A
B. Class B
C. Class C
D. Class D
Correct Answer: B
QUESTION 73
For IPv4, what class is used for multicasting?
A. Class A
B. Class B
C. Class C
D. Class D
Correct Answer: D
QUESTION 74
What is the maximum number of hosts you can use for each subnet that belongs to a
class C address?
A. 128
B. 254
C. 256
D. 65,534
Correct Answer: B
QUESTION 75
What type of address is 202.23.2.255?
A. multicast address
B. broadcast address
C. unicast address
D. anycast address
Correct Answer: B
QUESTION 76
What type of address is used to send a single set of packets to multiple hosts?
A. multicast address
B. broadcast address
C. unicast address
D. anycast address
Correct Answer: A
QUESTION 77
Which of the following is not a private address?
A. 10.4.24.24
B.
172.16.36.45
C. 192.168.34.3
D. 200.23.34.120
Correct Answer: D
QUESTION 78
What type of address is 169.254.32.23?
A. APIPA
B. multicast address
C. anycast address
D. broadcast address
Correct Answer: A
QUESTION 79
You have a computer that cannot connect to a server. When you look at the IP
configuration, the host has an address of 169.32.54.2. What is the problem?
Correct Answer: A
QUESTION 80
What defines the nearest router for a host?
A. subnet mask
B. default gateway
C. DNS server
D. WINS server
Correct Answer: B
QUESTION 81
What server is used to translate host names to IP addresses?
A. DNS
B. WINS
C. HOSTS
D. DHCP
Correct Answer: A
QUESTION 82
What is used to remap private addresses to public addresses and back?
A. DNS
B. DHCP
C. WINS
D. NAT
Correct Answer: D
QUESTION 83
What do you call a smaller network that is part of a larger network?
A. host
B. broadcast domain
C. cluster
D. subnet
Correct Answer: D
QUESTION 84
You have a subnet mask of 255.255.240.0. What would the CIDR notation be?
A. /16
B. /20
C. /24
D. /28
Correct Answer: B
QUESTION 85
How many bits is an IPv6 address?
A. 32
B. 48
C. 64
D. 128
Correct Answer: D
QUESTION 86
What type of address is 2001:4212:0000:34DB:0000:0000:0000:4231?
A. MAC address
B. IPv4
C. IPv6
D. anycast address
Correct Answer: C
QUESTION 87
A __________ address is assigned by a DHCP server.
A. Static
B. Dynamic
C. Private Only
D. Public Only
Correct Answer: B
QUESTION 88
What is the loopback IP address?
A. 127.0.0.1
B. loopback
C. 255.255.255.1
D. 0.0.0.0
Correct Answer: AB
QUESTION 89
What IPv6 address incorporates IPv4?
A. Starting ::ffff:
B. Starting 0:0::ffff:
C. Ending ::ffff
D. Ending 0:0::ffff
Correct Answer: A
QUESTION 90
The protocol maps IP addresses to a Media Access Control (MAC) address is:
Correct Answer: B
QUESTION 91
A service that resolves NetBIOS names to IP addresses is:
Correct Answer: C
QUESTION 92
What command displays the IP address, subnet mask, and default gateway of the
system you are currently on?
A. ipconfig
B. ping
C. tracert
D. nslookup
Correct Answer: A
QUESTION 93
What protocol does the ping command use to test network connectivity?
A. TCP
B. UDP
C. ICMP
D. FTP
Correct Answer: C
QUESTION 94
What command do you use to clear the DNS cache on a local system?
A. ipconfig /registerdns
B. ipconfig /cleardns
C. ipocnfig /flushdns
D. ipconfig /releasedns
Correct Answer: C
QUESTION 95
What command do you use to test a systems IPv4 protocol stack?
A. ping 127.0.0.1
B. ping self
C. ping 255.255.255.255
D. ping default gateway
Correct Answer: A
QUESTION 96
What command do you use to display active TCP or UDP connections?
A. nbtstat
B. netstat
C. ipconfig
D. nslookup
Correct Answer: B
QUESTION 97
What command is used to display NetBIOS over TCP/IP statistics?
A. nbtstat
B. netstat
C. ipconfig
D. nslookup
Correct Answer: B
QUESTION 98
What command clears the NetBIOS name cache table?
A. nbtstat -r
B. nbtstat -R
C. nbtstat -RR
D. nbtstat -s
Correct Answer: B
QUESTION 99
What command tests network connectivity while showing you each hop along the way?
A. ping
B. nslookup
C. nbtstat
D. tracert
Correct Answer: D
QUESTION 100
What command tests network connectivity while showing you each hop along the way
and the degree of packet loss?
A. ping
B. pathping
C. nbtstat
D. tracert
Correct Answer: B
QUESTION 101
The service that resolves fully qualified domain name (FQDN) to IP addresses is:
Correct Answer: B
QUESTION 102
What command do you use to connect to a remote computer so that you can execute
commands?
A. ftp
B. nslookup
C. telnet
D. nbtstat
Correct Answer: C
QUESTION 103
What command can you use to connect to a mail server so that you can test SMTP?
A. ftp
B. nslookup
C. telnet
D. nbtstat
Correct Answer: C
QUESTION 104
What command do you use to display and modify the network configuration of a local
computer?
A. netsh
B. netstat
C. telnet
D. nbtstat
Correct Answer: A
QUESTION 105
What command is used to add static routes to a Windows computer?
A. nslookup
B. telnet
C. route
D. nbtstat
Correct Answer: C
QUESTION 106
What command do you use to display the routing table on a local system?
A. route display
B. route table
C. route local
D. route print
Correct Answer: D
QUESTION 107
What command do you use to display the MAC address on a system?
A. ipconfig /all
B. pathping -m
C. route /showmac
D. nbstat -r
Correct Answer: A
QUESTION 108
What command do you use to retrieve or update your DHCP assigned configuration?
A. ipconfig /flushdns
B. ipconfig /all
C. ipconfig /release
D. ipconfig /renew
Correct Answer: C
QUESTION 109
What command do you use to register the computers name and IP address with the
nearest DNS server?
A. ipconfig /renew
B. ipconfig /renew all
C. ipconfig /flushdns
D. ipconfig /registerdns
Correct Answer: D
QUESTION 110
What command displays Ethernet statistics?
A. netstat -e
B. netstat -x
C. netstat -q
D. netstat -t
Correct Answer: A
QUESTION 111
What option do you use to ping constantly until you stop it?
A. ping -t <host>
B. ping -q <host>
C. ping -r <host>
D. ping -s <host>
Correct Answer: A
QUESTION 112
What protocol is used with L2TP to encrypt data?
A. IPSec
B. MS-CHAP
C. MS-CHAPv2
D. MPPE
Correct Answer: A
QUESTION 113
The default gateway address identifies the:
Correct Answer: B
QUESTION 114
What protocol automatically configures IP configuration for a client?
A. DNS
B. DHCP
C. WINS
D. FTP
Correct Answer: B
QUESTION 115
Which of these ports does DHCP use?
A. 80
B. 67
C. 23
D. 500
Correct Answer: B
QUESTION 116
After you install DHCP servers and configure and activate a scope, what is the last step
in installing a DHCP server?
Correct Answer: C
QUESTION 117
You have a computer with an address of 169.254.32.23 and a subnet mask of
255.255.0.0, yet you cannot connect to your local file servers. What is most likely the
problem?
Correct Answer: A
QUESTION 118
What name does Windows Server 2008 R2 use for Terminal Services?
A. MS Telnet Server
B. MS Primary Services
C. MS Thin Server
D. Remote Desktop Services
Correct Answer: D
QUESTION 119
What port does Remote Desktop Services use?
A. 443
B. 501
C. 389
D. 3389
Correct Answer: D
QUESTION 120
What would you use to create VPN tunnels so that users can connect to your internal
network while at home using Windows Server 2008 R2?
A. Microsoft RAS
B. Microsoft RRAS
C. Microsoft RDC
D. Microsoft VPN Server
Correct Answer: B
QUESTION 121
A user reports that she cannot connect to network resources from a computer on the
company network. The user was able to connect to the network resources yesterday.
You verify that the users computer is properly physically connected to the network. You
discover that the computers IP address is 169.254.48.97. You need to restore access to
the network. What should you do next?
Correct Answer: A
QUESTION 122
Which component of IPSec is generates the encryption and authentication keys?
A. SA
B. AH
C. ESP
D. MPPE
Correct Answer: A
QUESTION 123
Which IPsec component provides connectionless integrity and data authentication but
does not provide confidentiality?
A. SA
B. AH
C. ESP
D. MPPE
Correct Answer: B
QUESTION 124
A. SA
B. AH
C. ESP
D. MPPE
Correct Answer: C
QUESTION 125
What port does DNS use?
A. 443
B. 389
C. 51
D. 53
Correct Answer: D
QUESTION 126
What service on a Windows network is used to translate between NetBIOS
names/computer names and IP addresses?
A. DNS
B. WINS
C. DHCP
D. LDAP
Correct Answer: B
QUESTION 127
What feature within Windows allows the server to act as a router?
A. IPsec
B. DHCP
C. IP forwarding
D. RDC
Correct Answer: C
QUESTION 128
You use the ________ to connect to a terminal server.
Correct Answer: A
QUESTION 129
What provides name resolution between domain names and IP addresses?
A. DHCP
B. DNS
C. ARP
D. RPC
Correct Answer: B
QUESTION 130
What allows a user to connect to a corporate network using the Internet?
A. VPN
B. VPC
C. PPTN
D. IPSec
Correct Answer: A
QUESTION 131
What command do you use to release the IP configuration handed out by a DHCP
server?
A. ipconfig /renew
B. ipconfig /releasedns
C. ipconfig /savestatic
D. ipconfig /release
Correct Answer: D
QUESTION 132
What command do you use to reacquire IP configuration from a DHCP server?
A. ipconfig /renew
B. ipconfig /releasedns
C. ipconfig /savestatic
D. ipconfig /release
Correct Answer: A
QUESTION 133
List the four steps for a client to get an IP address from a DHCP server in the correct
order.
Correct Answer: A
QUESTION 134
What is the primary disadvantage of X.25?
A. digital circuit
B. small data payloads
C. circuit switching
D. slow speeds
Correct Answer: D
QUESTION 135
What routing protocol is the most popular distance-vector routing algorithm used to
determine the best routes within a network?
A. RIP
B. OSPF
C. BGP
D. IGMP
Correct Answer: A
QUESTION 136
What routing protocol is the most popular link-state protocol used within a large
organization?
A. RIP
B. OSPF
C. BGP
D. IGMP
Correct Answer: B
QUESTION 137
What technology takes data and breaks them into packets and sends them over a
network, sometimes using different routes for each packet?
A. circuit switching
B. connection switching
C. packet switching
D. network switching
Correct Answer: C
QUESTION 138
X.25 and Frame Relay are examples of what type of WAN technology?
A. circuit switching
B. connection switching
C. packet switching
D. network switching
Correct Answer: C
QUESTION 139
What device acts as a high-speed modem for a LAN?
A. analog modem
B. telco incoming router
C. packet switcher
D. CSU/DSU
Correct Answer: D
QUESTION 140
What does X.25 use as its DTE device?
QUESTION 141
What part of the network is the point where the responsibility of the administrator ends
and the telecommunications providers responsibility begins?
A. last mile
B. demarc
C. router array
D. PAD interface
Correct Answer: D
QUESTION 142
Which of these addresses is a multicast address?
A. 127.0.0.1
B. 169.254.0.1
C.< /font> 192.168.0.1
D. 224.0.0.1
Correct Answer: D
QUESTION 143
When a packet traverses a network, each router is a _____.
A. jump point
B. CSU/DSU
C. jump switch
D. hop
Correct Answer: D
QUESTION 144
When you have multiple circuits connected to a site, the entire circuit is known as a
___________.
A. virtual circuit
B. emulated circuit
C. joined circuit
D. multitasked circuit
Correct Answer: A
QUESTION 145
What replaced X.25?
A. Frame Relay
B. ATM
C. ISDN BRI
D. DSL
Correct Answer: A
QUESTION 146
At what speed does a T3 line run?
A. 1.5 Mbps
B. 4.5 Mbps
C. 44.7 Mbps
D. 128 Mbps
Correct Answer: C
QUESTION 147
In Europe, what circuit would be similar to the T1 found in the United States?
A. E1
B. J1
C. T2
D. F1
Correct Answer: A
QUESTION 148
How many B channels does an ISDN PRI support?
A. 2
B. 8
C. 23
D. 48
Correct Answer: C
QUESTION 149
What speed does FDDI use?
A. 10 Mbps
B. 44 Mbps
C. 54 Mbps
D. 100 Mbps
Correct Answer: D
QUESTION 150
What topology does FDDI use?
A. bus
B. star
C. ring
D. mesh
Correct Answer: C
QUESTION 151
What technology uses wires from the telephone company to provide broadband Internet
connection?
A. cable
B. DSL
C. FDDI
D. Frame Relay
Correct Answer: B
QUESTION 152
_________ is used to send packets from one network to another network.
A. Routing
B. Transport
C. BGP
D. Encapsulation
Correct Answer: A
QUESTION 153
_________ is a route that must be manually defined on each router.
A. Static
B. Dynamic
C. Persistent
D. Global
Correct Answer: A
QUESTION 154
_________ uses a clocking circuit to control the timing of communications between two
WAN devices such as routers.
A. Static Route
B. Dynamic Route
C. PPTP Route
D. Point To Point
Correct Answer: A
QUESTION 155
A ________ is the guaranteed certain amount of information provided by a circuit or line.
Correct Answer: A
QUESTION 156
What speed does a T1 run at?
A. 1.544 Mbps
B. 2.889 Mbps
C. 3.101 Gbps
D. 2.54 MBps
Correct Answer: A
QUESTION 157
How fast is a DS0 circuit?
A. 32 Kbps
B. 64 Kbps
C. 128 Kbps
D. 1024 Kbps
Correct Answer: B
QUESTION 158
What protocol is used with L2TP to provide encryption?
A. IPSec
B. MPPE
C. HTTPS
D. MSC-CHAP
Correct Answer: A
QUESTION 159
A. Internet
B. Intranet
C. WWW
D. MSDN
Correct Answer: A
QUESTION 160
What type of network can you set up that is another companys internal network?
A. intranet
B. extranet
C. internet
D. DMZ
Correct Answer: B
QUESTION 161
What technology can you use temporarily to connect networks from two different
companies?
A. VPN
B. HTTP
C. DHCP
D. passive router
Correct Answer: A
QUESTION 162
Which VPN technology is the most common and the easiest to set up?
A. PPTP
B. L2TP with IPSec
C. SSTP
D. CHAP
Correct Answer: A
QUESTION 163
What port does L2TP use?
A. 501
B. 1723
C. 1701
D. 443
Correct Answer: B
QUESTION 164
Which type of firewall blocks packets based on rules that are based on IP addresses or
ports?
A. packet filtering
B. stateful packet inspection
C. NAT filtering
D. Application-level gateway
Correct Answer: A
QUESTION 165
What technology used in firewalls keeps tracks of conversations so that it knows what to
allow back into a network?
Correct Answer: B
QUESTION 166
What acts as a middleman that translates between internal and external addresses and
that caches previously accessed web pages so that it can provide those more quickly in
the future?
A. NAT server
B. stateful packet inspector
C. proxy server
D. NIDS
Correct Answer: C
QUESTION 167
What type of device is used to detect malicious network activities and reports only
those issues to the administrator?
A. NIDS
B. NIPS
C. Internet content filter
D. NAT server
Correct Answer: A
QUESTION 168
What type of device is designed to inspect traffic, detect malicious activities, and take
steps to mitigate the malicious activity?
A. NIDS
B. NIPS
C. Internet content filter
D. NAT server
Correct Answer: B
QUESTION 169
Which DMZ configuration uses one firewall with three interfaces?
A. back-to-back configuration
B. three-leg perimeter configuration
C. basic configuration
D. perimeter configuration
Correct Answer: B
QUESTION 170
What stage is the World Wide Web in?
A. 1.0
B. 1.1
C. 2.0
D. 3.0
Correct Answer: C
QUESTION 171
Which of the following services masks internal IP addresses from outside the network?
A. DHCP
B. NAT
C. WINS
D. DNS
Correct Answer: B
QUESTION 172
What type of firewall works on the Session layer that creates a connection and allows
packets to flow between the two hosts without further checking?
A. proxy server
B. application firewall
C. NAT filtering
D. circuit-level gateway
Correct Answer: D
QUESTION 173
What type of firewall do you use to block access to certain websites or instant
messengers?
Correct Answer: A
QUESTION 174
When trying to protect your network, you should create your secure network based on
_______.
Correct Answer: D
QUESTION 175
If a router is installed so that it separates DHCP server from its clients, the clients will:
QUESTION 176
An _________ is the internal network for an organization.
A. Internet
B. Extranet
C. Intranet
D. WWW
Correct Answer: A
QUESTION 177
What port does PPTP use?
A. 80
B. 8080
C. 1723
D. 433
Correct Answer: C
QUESTION 178
What device is used to protect one network from another by using filtering packets?
A. Firewall
B. Point to Point Tunnel
C. VPN
D. Router
Correct Answer: A
QUESTION 179
What type of configuration creates a DMZ between two firewalls?
A. Gateway Network
B. Perimeter Network
C. DMZ
D. RADIAUS Server
Correct Answer: BC
QUESTION 180
Which type of port is used to support VLAN traffic between two switches?
A. LAN port
B. Trunk port
C. Virtual port
D. WAN port
Correct Answer: B
QUESTION 181
Tracert is used to:
Correct Answer: D
QUESTION 182
A node within a local area network (LAN) must have a network interface and a:
A. resource to share.
B. host address.
C. network account.
D. table of all network nodes.
Correct Answer: B
QUESTION 183
One purpose of a perimeter network is to:
Correct Answer: D
QUESTION 184
Which two of the following are connectivity options for wide area net
works (WANs)? (Choose two.)
A. Leased line
B. Ethernet
C. Dial-up
D. Token ring
Correct Answer: AC
QUESTION 185
In which physical network topology is each computer connected to a central point?
A. Mesh
B. Ring
C. Bus
D. Star
Correct Answer: D
QUESTION 186
A private network that allows members of an organization to exchange data is an:
A. Internet.
B. extranet.
C. Ethernet.
D. intranet.
Correct Answer: D
QUESTION 187
A characteristic of the mesh topology is that it:
QUESTION 188
To protect a network when it is connected to the Internet, you should use a:
A. router.
B. firewall.
C. switch.
D. bridge.
Correct Answer: B
QUESTION 189
Security is a concern on wireless networks due to:
Correct Answer: A
QUESTION 190
Which of these factors has the biggest impact on data transmission speed in a wireless
network?
Correct Answer: C
QUESTION 191
VPNs are implemented to provide:
Correct Answer: D
QUESTION 192
Which wireless authentication method provides the highest level of security?
A. IEEE 802.11a
B. IEEE 802.11n
C. Wired Equivalent Privacy (WEP)
D. Wi-Fi Protected Access (WPA)
Correct Answer: D
QUESTION 193
The maximum throughput of an 802.11g network is:
A. 2.4 GHz.
B. 54 GHz.
C. 2.4 Mbps.
D. 54 Mbps.
Correct Answer: D
QUESTION 194
A cable that meets the 1000BaseT standard has a maximum length of:
A. 100 m.
B. 250 m.
C. 500 m.
D. 1,000 m.
Correct Answer: A
QUESTION 195
Order the layers of the OSI model.
Correct Answer:
Layer 7 Application
Layer 6 Presentation
Layer 5 Session
Layer 4 Transport
Layer 3 Network
Layer 2 Data Link
Layer 1 Physical
QUESTION 196
What is the default subnet mask for a Class C Internet network?
A. 255.255.255.252
B. 255.255.255.240
C. 255.255.255.192
D. 255.255.255.0
Correct Answer: D
QUESTION 197
Your home computer is having problems accessing the Internet.
You suspect that your Internet routers DHCP service is not functioning, so you check your computers IP
address.
Which address indicates that your routers DHCP service is NOT functioning?
A. 169.254.1.15
B. 172.16.1.15
C. 192.168.1.15
D. 10.19.1.15
Correct Answer: B
QUESTION 198
What type of DNS record maps host names to addresses?
Correct Answer: C
QUESTION 199
You work at a coffee shop. Your supervisor asks you to help set up a computer network.
Which two items should you include in the perimeter network? (Choose two.)
A. Network printer
B. Web server
C. File server
D. Wi-Fi network
E. Point of sale terminals
Correct Answer: AB
QUESTION 200
This question requires that you evaluate the underlined text to determine if it is correct.
Each IPv4 address consists of a MAC address and data-link laver address.
Select the correct answer if the underlined text does not make the statement correct. Select No change
is needed if the underlined text makes the statement correct.
Correct Answer: A
QUESTION 221
Which IEEE 802.11 Wi-Fi networking standard requires dual antennas so it can run in all of its supported
frequencies?
A. 802.11a
B. 802.11b
C. 802.11g
D. 802.11n
Correct Answer: D
QUESTION 222
What is the maximum cable length for a single Cat5 UTP cable run?
Correct Answer: B
QUESTION 223
DRAG DROP
Match the TCP ports to the corresponding service.
To answer, drag the appropriate port number from the column on the left to its service on the right. Each
port number may be used once, more than once, or not at all. Each correct match is worth one point.
Correct Answer:
QUESTION 224
DRAG DROP
Match the IPv4 address type to the corresponding definition.
To answer, drag the appropriate definition from the column on the left to the address type on the right.
Each definition may be used once, more than once, or not at all. Each correct match is worth one point.
Correct Answer:
QUESTION 225
Which type of network is most vulnerable to intrusion?
A. Dial-up
B. Wireless
C. Broadband
D. Leased line
Correct Answer: B
QUESTION 226
This question requires that you evaluate the underlined text to determine if it is correct.
An Address Resolution Protocol (ARP) table is used to associate IP addresses with host names.
Select the correct answer if the underlined text does not make the statement correct. Select No change is
needed if the underlined text makes the statement correct.
A. MAC addresses
B. HomeGroup membership
C. Preferred routers
D. No change is needed
Correct Answer: A
QUESTION 227
The ping tool is used to: (Choose two.)
Correct Answer: BC
QUESTION 228
What happens when an 802.11a node broadcasts within the range of an 802.11g access point?
Correct Answer: C
QUESTION 229
This question requires that you evaluate the underlined text to determine if it is correct.
In a wireless network that requires an SSL certificate, WEP handles the SSL certificate.
Select the correct answer if the underlined text does not make the statement correct. Select No change is
needed if the underlined text makes the statement correct.
A. 802.1X
B. WPA2-PSK
C. WPA-PSK
D. No change is needed
Correct Answer: A
QUESTION 230
You ping a server by using fully qualified domain name (FQDN) and do not receive a response. You then
ping the same server by using its IP address and receive a response.
Why do you receive a response on the second attempt but not on the first attempt?
Correct Answer: B