2. Which of the following is a standard measure
of signal power?
A) MhZ
B) mips
C) dBm
D) Gbps
3. Which of the following is the network topology
in which computers connect in a closed circle?
A) Bus
B) Mesh
C) Ring
D) Star
4. The Transport Layer of the TCP/IP model
corresponds to which of the following
layers of the OSI model?
A) 1
B) 3
C) 4
D) 5
5. Which of the following is the correct
representation of an IPv6 address?
A) ::
B) 0:0:0:0:0:0:0:0:1
C) 1:2:3:4:AB:CD:EF
D) 2001::4860:800f::
6. Which of the following security devices would
MOST likely be used on a network to screen &
prevent malicious traffic?
A) IDS
B) VPN
C) NIPS
D) HIDS
7. What is a client?
A Client is a device an end user uses to
access a network . This device can be
a workstation, laptop, smart phone
with wireless capabilities, or a variety
of other end-user terminal devices.
8. Users report that their internet connection is slow.
Zach, the network technician, has a suspicion that users
are streaming video music. Which of the following would
BEST confirm Zach’s theory?
A) Traffic analysis
B) SNMP
C) History logs
D) System logs
9. A company is about to install a second network
connection with a new ISP. Which of the following
routing protocols is the BEST choice?
A) IS-IS
B) BGP
C) OSPF
D) RIP
10. Lisa, a technician, is troubleshooting a problem
with a managed network switch. She determines the
resolution to the problem is beyond her experience
level. Which of the following should Lisa do NEXT?
A) Question users
B) Test the theory
C) Re-establish a theory of probable cause
D) Escalate the problem
11. A server technician notices that some changes were
implemented on a server during non-business hours.
Which of the following would allow the technician
to identify the last time an administrator was
remotely connected to the server?
A) Network sniffer
B) Traffic analyzer
C) System log
D) Security log
12. Which of the following is an intelligent repeater
that is aware of the MAC addresses of the nodes on
either side of the data link?
A) Gateway
B) Hub
C) Bridge
D) Router
13. Which of the following 802.11 standards is
MIMO used in?
A) a
B) b
C) g
D) n
14. A technician is troubleshooting a problem
with a network printer. The technician
thinks the network printer is out of paper &
ink. Which of the following should the
technician do NEXT?
A) Implement the solution
B) Question users
C) Test theory
D) Escalate the problem
15. Which of the following would be the BEST IDS
topology for monitoring one specific device?
A) Signature-based
B) Network-based
C) Host –based
D) Behavior-based
16. Which of the following is the name of the
routing update process involved when a
change occurs in the routing environment?
A) Supernetting
B) Dynamic
C) Subletting
D) Convergence
17. Which of the following fiber types is MOST
often used indoors?
A) Plenum
B) Modal conditioning
C) Singlemode
D) Multimode
18. Which of the following ports should be
allowed through a firewall to allow DNS
resolution to occur to an outside DNS
server?
A) 20
B) 53
C) 80
D) 3389
19. A customer reports a network patch cable was
unplugged from a switch & plugged back into an
available switch port. The switch’s activity lights
have been lit up constantly & network response
times are extremely slow. Which of the following
issues is MOST likely occurring?
A) Switching loop
B) DDoS attack
C) Mismatched MTU
D) Port mirroring
20. Which of the following protocols is
used to assign IP addresses to network
devices?
A) UTP
B) DHCP
C) FTP
D) TCP/IP
21. Network upgrades have been completed and the WINS
server was shutdown. It was decided that NetBIOS
network traffic will no longer be permitted.
Which of the following will accomplish this
objective?
A) Content filtering
B) Port filtering
C) MAC filtering
D) IP filtering
22. Which of the following allows access to a
network, based on the hardware address of a
network card?
A) Content filtering
B) Port filtering
C) MAC filtering
D) IP filtering
23. Which of the following is true of
NIPS?
A) Routes traffic to the proper port
B) Detects malicious host traffic
C) Detects and prevents harmful traffic
D) Prevents traffic on network hosts
24. Which of the following protocols is
used for remote management of devices?
A) TFTP
B) SNMP
C) Syslog
D) SMTP
25. Which encryption type uses only a 28
character key?
A) 40/64 bitWEP
B) WPA Personal
C) 104/128 bitWEP
D) WPA@PSK
26. At which of the following layers of the
OSI model do frames exist?
A) Application
B) Network
C) Transport
D) Data link
27. Which of the following utilities can be used
to list the routing table?
A) Ipconficj
B) Nslookup
C) Dig
D) Netstat
28. Which of the following OSI model layers is
between the Network and Session layers?
A) Presentation
B) Data link
C) Physical
D) Transport
29. Which of the following would be used to
identify terminations in a punch block for
which the wiring diagram has been lost?
A) OTDR
B) Protocol analyzer
C) TDR
D) Toner probe
30. Which of the following tools would BEST be
used to verify if a network cable is properly
terminated?
A) Multimeter
B) Cable certifier
C) Toner probe
D) Cable stripper
31. Which of the following uses port 53 by
default?
A) RDP
B) QoS
C) DHCP
D) DNS
32. Network administrators use which of the
following to monitor and map network
availability, performance, and error rates?
A) SMTP
B) PPoE
C) PoE
D) SNMP
33. Jeff, a network administrator, needs to
forward HTTP traffic from a SOHO firewall
public IP to the internal web server’s
private IP. Which of the following can Jeff
implement?
A) DNS
B) NAT
C) PKI
D) RAS
34. A firewall that examines all the incoming traffic
and decides if the traffic is going to be allowed
through or dumped is a example of which of the
following?
A) Packet sniffing
B) Packet filter
C) Stateful inspection
D) Content filter
35. Zach, a client, has a home office and also works
out of a garage on the property located 150 feet
(45 meters) from the house. Zach wants to extend
the Internet connection from the home to the
garage. Which of the following technologies would
MOST likely accommodate this range?
A) DVI cable
B) Bluetooth
C) Wireless
D) CAT3 cable
36. A power failure caused a router to reboot.
Now users are not able to reach remote
networks. Which of the following is the MOST
likely cause?
A) Dynamic NAT tables were erased by the reset
B) The DNS server settings on the workstations are
incorrect
C) MAC entries in the ARP table were not saved
D) The technician did not save the running configuration
37. Which of the following is a
device directly used by an end
user to access a network?
A) Server
B) LAN
C) Client
D) Router
38. What does a Switch do?
Interconnects network components like a hub
except the switch interrogates the traffic to
find out where its destined and forwards the
traffic thru the right port. It is considered a
Layer 2 device because it makes its
forwarding decisions from the Media Access
Control (MAC) address burned into the NIC
card.
39. Which device makes traffic-
forwarding decisions based on
the MAC address?
A) Hub
B) Router
C) Switch
D) Multiplexer
40. What type of network is a MAN?
MAN or Metro Ethernet is smaller
than aWAN. a MAN interconnects
locations throughout a metropolitan
area via a service provider’s high
speed network (10 Gbps)
41. A company has various locations
in a city interconnected using
Metro Ethernet connections. This
is an example of what type of
network?
A) WAN
B) CAN
C) PAN
D) MAN
42. What type of network is a PAN?
PAN is network whose range is only a few
meters and much smaller than a LAN. It
consists of a connection between a PC and a
digital camera via a universal serial bus (USB )
cable. It could also be a PC connected to an
external hard drive via a FireWire
connection, A PAN is not necessarily a wired
connection, it can also be a Bluetooth
connection between a cell phone & a car’s
wireless audio system.
43. A network formed by interconnecting a
PC to a digital camera via a USB cable
is considered what type of network?
A) WAN
B) CAN
C) PAN
D) MAN
44. What are some characteristics of the
star topology?
Most popular physical LAN topology used today.
The Ethernet switch is in the center of the star
and unshielded twisted pair (UTP) cables run
from the switch ports to the client and back. It
uses more cables than the other topologies
because each device requires its own wiring to
the central device. If one of the cables breaks it
only affects the device its connected to not the
entire group.
45. Which of the following LAN topologies
requires the most cabling?
A) Bus
B) Ring
C) Star
D) WLAN
46. Which of all the Network
Topologies is the least fault
tolerant and why?
A bus network requires only a single cable per
segment. If any device in the segment
fails, then the whole segment crashes.
47. What are the characteristics of a Full-
Mesh topology?
Offers the highest level of redundancy. Each
site is directly connected to every other site
so an optimal route exists between any two
sites. It is also highly fault resistant. It is
difficult and expensive to scale, because to
add a new site requires aWAN link to every
other site.
48. Which of the following topologies
offers the highest level of
redundancy?
A) Full Mesh
B) Hub & Spoke
C) BUS
D) Partial Mesh
49. How to calculate the number of
required WAN connections for a
Full-Mesh topology?
Example: If you have 5 remote sites
W= number ofWAN links
N = number of sites
W=n * (n-1) / 2
w = 5 * (5-1) / 2 (4 / 2)
w = 5 * 2
w = 10
Ans: 10WAN links are required 5 there & 5 back
50. How many WAN links are required to
create a full mesh of connections
between 5 remote sites?
A) 5
B) 10
C) 15
D) 20
51. How does the Hub and Spoke
topology differ from the Full-
Mesh topology?
Costs are reduced because each site is
connected to a central hub, not to each other so
a small amount of links are needed. It’s also
more scalable because to add another site only
requires a connection to the hub. It also lacks
redundancy because every site goes through the
central Hub so it becomes a single point of
failure. If the hub is down so is the network.
52. Identify two advantages of a hub-and-
spoke WAN topology as compared to a
Full-Mesh WAN topology? (Pick 2)
A) Lower Cost
B) Optimal Routes
C) More scalable
D) More redundancy
53. What are the characteristics of a
Peer-to- peer network?
Used for small or home based
businesses, less than 10 PC’s. It allows all
interconnected devices to share resources
like files, and printers. Inexpensive network
to run, limited scalability. The more PC’s on
the network decreases performance &
increases the burden of managing multiple
clients for the administration.
54. Which type of network is based on
clients sharing resources with
one another?
A) Client-server
B) Client- peer
C) Peer-to-peer
D) Peer-to-server
55. Which of the following is an
advantage of a peer–to-peer
network, as compared with a
client-server network?
A) More scalable
B) Less expensive
C) Better performance
D) Simplified administration
56. What is a Server?
A server, serves up resources to a
network. These resources might
include e-mail access, (as provided by
an e-mail server) web pages (as
provided by a web server) or files
(available on a file server)
57. What is a Hub?
It is a device that interconnects network
components, such as clients, and servers.
Hubs vary in their number of available ports.
Hubs can be interconnected to a point. Too
many hubs chained together will result in
network errors. A hub does not perform any
inspection of the traffic it passes. It receives
traffic through a port that’s connected to a
network cable then it repeats that traffic out
of all the other ports.
58. What are the 7 layers of the OSI Model?
Layer 1 The Physical Layer
Layer 2 The Data Link Layer
Layer 3 The Network Layer
Layer 4 TheTransport Layer
Layer 5 The Session Layer
Layer 6 The Presentation Layer
Layer 7 TheApplication Layer
59. What is the difference between the OSI
reference model and the TCP/IP model?
*The OSI ensures reliable delivery of packets at
the transport layer (4) *TCP/IP Model matches
up to the OSI model as: The Network Interface
(Link) layer compares to the Physical & Data
Link,The Internet layer is comparable to the
Network,Transport is the same in both, &The
Application layer inTCP/IP handles layers 5, 6,& 7
in the OSI model. TCP/IP does not guarantee
reliable delivery of packets at layer 4 (transport).
TCP/IP also offers the UDP (connectionless
transport layer protocol) option.
60. What is the function of the second layer
know as The Data Link Layer?
The Data Link Layer
has 2 sub layers
The 1st sub layer is the
Media Access Control
(MAC)This handles the:
Physical Addressing
LogicalTopology
Method of transmitting
on the media.
The 2nd sub layer is the
Logical Link Control
(LLC)This sub layer
handles the:
Connection services
Synchronizing
transmissions.
61. Which layer of the OSI reference
model contains the MAC and LLC
sub layers?
A) The Network Layer
B) TheTransport Layer
C) The Physical Layer
D) The Data Link Layer
62. What is Baseband?
Baseband resides in the 1st layer of the OSI
Model in the Physical Layer unlike broadband
where it divides the bandwidth over copper
etc.. Baseband uses all available frequencies
on a medium to transmit data. Ethernet is an
example of a network technology that uses
baseband.
63. Which approach to bandwidth usage
consumes all available frequencies on
a medium to transmit data?
A) Broadband
B) Baseband
C) Time – Division Multiplexing
D) Simplex
64. Windowing is provided at what layer of the
OSI reference model?
A) Data Link Layer
B) Network Layer
C) Transport Layer
D) Physical Layer
65. Which of the following IP addresses would be
classified as private?
A) 10.100.200.0
B) 169.253.5.0
C) 172.168.5.0
D) 200.100.25.0
66. Two duplicate pieces of equipment can be used in
conjunction for which of the following purposes?
(Select TWO)
A) High availability
B) Fault tolerance
C) Reduce latency
D) Wi-MAX
E) CARP
67. PKI is a method of user authentication which
uses which of the following?
A) Various router commands
B) Access control lists
C) Certificate services
D) A RADIUS server
68. Kim and Zach, attackers, use which of the
following network scanners to see the protocols
that are being used? (Select TWO).
A) IDS
B) Packet sniffer
C) Port scanner
D) Malware scanner
E) Ping sweep
69. IP addresses reside at which layer of the OSI
reference model?
A) Network Layer
B) Session Layer
C) Data Link Layer
D) Transport Layer
70. Which of the following is a connectionless
transport layer protocol?
A) IP
B) TCP
C) UDP
D) H.323
71. Identify the 4 layers of the TCP/IP stack
(Choose four)
A) Session Layer
B) Transport Layer
C) Internet Layer
D) Data Link Layer
E) Network Layer
F) Application Layer
G) Network Control Layer
72. What is the range of well-known TCP and UDP
ports?
A) Below 2048
B) Below 1024
C) 16,384 – 32,768
D) Above 8192
73. Which protocol supports a secure connection
to a remote host via terminal emulation
software?
A) Telnet
B) SSH
C) FTP
D) SFTP
74. Identify the well known port number for
NTP?
A) 53
B) 69
C) 123
D) 143
75. Identify 3 e-mail protocols? (choose 3)
A) SNMP
B) SMTP
C) POP3
D) IMAP4
76. What type of coaxial cable was often used for
10Base2 Ethernet networks?
A) RG – 6
B) RG – 45
C) RG – 58
D) RG - 59
77. Which of the following categories of UTP
cabling are commonly used for 1000Base-T
networks? (choose 2)
A) CAT 5
B) CAT5e
C) CAT6
D) CAT6e
78. Which type of cable might be required for
installation in a drop ceiling, which is
used as an open air return duct?
A) Riser
B) Plenum
C) Multimode
D) Twin-axial
79. Which network infrastructure device
primarily makes forwarding decisions based
on MAC addresses?
A) Router – (Layer 3 device)
B) Switch (Layer 2 device)
C) HUB ( Layer 1 device)
D) Multi-Layer switch (Layers 2 & above)
80. A router(Layer 3) primarily makes its
forwarding decisions based on what address?
A) Destination MAC address
B) Source IP address
C) Source MAC address
D) Destination IP address
81. Identify 2 differences between an Ethernet
bridge and an Ethernet switch (Choose 2)
A) Switches use ASIC’s to make forwarding
decisions, while bridges make their
forwarding decisions in software.
B) Bridges typically operate faster than
switches
C) Switches typically have higher port
densities than bridges
D) Bridges can base their forwarding
decisions on logical network layer addresses
82. What layer do Bridges operate
at?
Bridges operate at the Data Link Layer or
Layer 2
83. What is the purpose of the SMB
(server message block)
protocol?
The SMB protocol runs on the UNIX or Linux
server and helps theWindows server see the
UNIX/Linux servers as if they were one of the
Windows servers itself.
84. What are BNC connectors used
for?
BNC connectors are used to connect
computers to a 10Base2 (thinnet) cable in the
BUS topology.
85. A router has 12 ports. How many broadcast
domains does the router have?
A) None
B) One
C) Two
D) Twelve
86. A switch has 12 ports. How many collision
domains does the switch have?
A) None
B) One
C) Two
D) Twelve
87. What is the first DHCP message sent by a
client attempting to obtain IP address
information from a DHCP server?
A) DHCPOFFER
B) DHCPACK
C) DHCPDISCOVER
D) DHCPREQUEST
88. What specialized network device is commonly
used to load balance traffic across multiple
servers in a group?
A) Content switch
B) Proxy server
C) DNS server
D) Content engine
89. What is CSMA/CA AND WHAT DOES IT
DO?
Carrier Sense Multiple Access with Collision
Avoidance (CSMA/CA) It is the basic medium
access method for IEEE 802.11(g) wireless
networks. (CSMA/CD is collision
detection, and it’s the basic access method
for Ethernet networks)
90. What is DNS?
Domain Name System (DNS) A system that
provides a way to map friendly host names or
URL’s to IP addresses.
91. What is meant by Default Gateway?
It is the route taken so that a computer on
one segment can communicate with a
computer on another segment.
92. What is the Demilitarized Zone
(DMZ) and what does it do?
The DMZ describes the area in a network
design that is located between the internal
network & the external network. Usually the
internet. It is used for devices accessible to
internet traffic such as the web server, FTP
server, SMTP server, and DNS.
93. Which of the following describes a DNS
server?
A) Translates an IP address to a name
B) Caches commonly viewed web pages
C) Assigns IP addresses to network devices
D) Provides port security for a network
94. After Kim, a new user, moves furniture into a
cubicle, the computer does not connect to the
network any longer. Which of the following would
be the MOST likely reason? (Select TWO).
A) Bad Ethernet switch port
B) TX/RX reversed
C) Bad connectors
D) Bad patch cable
E) Mismatched MTU
95. Which of the following provides the use of a
secure tunnel for telecommuting without manually
installing and configuring encryption software?
A) RDP
B) SSLVPN
C) ISAKMP
D) TLS2.0
96. Which of the following can be an
STP cable?
A) RG-6
B) CAT5E
C) Fiber
D) RG-59
97. Which of the following wireless
authentication methods provides the GREATEST
amount of security?
A) WEP
B) WPA Enterprise
C) WPA Personal
D) WPA2 Personal
98. Which of the following OSI model
layers is used for logical
addressing?
A) Physical
B) Transport
C) Network
D) Data link
99. In which of the following layers of the OSI
model does the TCP protocol operate?
A) Session
B) Network
C) Data link
D) Transport
100. A new wiring closet is setup to serve users in the east
wing of a campus. Equipment is moved from the old
closet, 50 feet (15 meters) away, and installed in the
new closet. Users immediately begin reporting
intermittent connectivity issues with both corporate and
Internet resources. Which of the following is the MOST
likely cause?
A) Protocol mismatch
B) MTU size was not increased for the new distance
C) IncorrectVLAN assignment
D) Incorrect cabling
101. Which of the following protocols is used by
the ping command?
A) SMTP
B) ICMP
C) TFTP
D) ARP
102. Which of the following documents will allow
Kim, an administrator, to determine a change from
the standard default system configuration?
A) Baseline
B) Physical network diagram
C) Wiring schematic
D) Logical diagram
103. Which of the following
authenticates, allows, and controls the
execution of router commands?
A) PKI
B) RADIUS
C) Kerberos
D) TACACS+
104. A section of the building has been having
intermittent connectivity problems lately. An
action plan and solution has been created. Which
of the following steps would an administrator
perform NEXT?
A) Document the solution and process
B) Establish the most probable cause
C) Implement and test the solution
D) Identify additional symptoms and problems
105. A firewall that looks at the source IP and
destination IP then routes them accordingly
is an example of which of the following?
A) Packet filtering
B) Content filtering
C) Packet sniffing
D) Application gateway
106. Which of the following is a valid IPv6
address?
A) 1056: 958: E486:: F8:8962
B) 1596:H593:B5D8::B589
C) 2048:9584:A6B8::0983
D) 4820::0985:489D::8761
107. Zach, a user, cannot access the Internet. A similar problem
occurred several times last week to other users, and the
solution was to reboot each workstation. As the first step, the
technician reboots the workstation and it does not solve the
problem. Which of the following should have been done instead?
A) Change the DNS server IP on the client
B) Information gathering
C) Change the workstation IP address
D) Establish a plan of action
108. Logically separating the ports on a switch
without physically separating them can be
done using which of the following?
A) Routing tables
B) Hub logic
C) Spanning tree protocol
D) VLANs
109. Which of the following commands can Lisa, a
network technician, use to check whether the
DNS server for a given domain is reachable?
A) nmap
B) nbtstat
C) dig
D) arp
110. A customer wants to have several internal
services hosted on multiple servers, all of which
need to be available to the Internet through a
single public IP address. Which of the following
would need to be configured?
A) QoS
B) PoE
C) PAT
D) VLAN
111. Which of the following communication modes
has the LOWEST overhead necessary to support
streaming protocols such as RTP?
A) Connectionless
B) Stateful
C) Full duplex
D) Quality of Service
112. Lisa, a home user, wishes to confine a
wireless network to devices ONLY inside of
her house. Which of the following will
accomplish this?
A) Decreasing radio strength
B) MAC filtering
C) WEP encryption
D) SSID broadcast disable
113. Which of the following security measures is
the LEAST intrusive on an end device?
A) NIPS
B) Host-based firewall
C) Antivirus
D) HIDS
114. At which of the following layers of the OSI
model does an unmanaged switch operate?
A) Layer 1
B) Layer 2
C) Layer 3
D) Layer 4
115. Jeff, an administrator, has just finished installing a new switch and connected
two servers with IPs of 192.168.105.20 and .30. The servers are able to
communicate with each other, but are unable to reach the Internet. Jeff sees the
following information in the switch configuration: interface VLAN 105
IP address 192.168.105.5 255.255.255.0 Jeff is able to ping the router at
192.168.105.1 from the switch. Which of the following is the MOST likely cause of
the problem?
A) The subnet mask is incorrect
B) A routing loop has occurred
C) Jeff used a crossover cable to connect the switch to the gateway
D) The server is missing default-gateway information
116. An administrator is setting up a secure wireless network. The
administrator decides to support 802.11n and 802.11g with a
WPA2 pre-shared key. Users are given the SSID with the pre-
shared key, but the administrator has disabled the SSID
broadcast and MAC filtering. Some users have reported
connection issues. Which of the following would MOST likely
resolve the users’ connection issues?
A) Limit the devices to 802.11n only
B) Enable the SSID broadcast
C) Enable MAC filtering
D) UseWEP 128-bit key
117. When configuring a WAP for a SOHO, which
parameter will BEST limit access to the
office area?
A) Signal strength
B) SSID enable
C) Encryption
D) Password hardening
118. Which of the following is an environment where
only a username and password are required for
successful authentication results in access to
multiple resources?
A) Multiple logins
B) Multifactor authentication
C) Two-factor authentication
D) Single sign-on
119. Which of the following methods limits access
to a network based on characteristics of the
network card?
A) IP filtering
B) MAC filtering
C) Port filtering
D) Encryption
120. Which of the following threats is MOST
likely to enable an attacker to modify data
in transit?
A) DoS
B) Smurf attack
C) Virus
D) Man-in-the-middle
121. Which of the following Ethernet
technologies has the LONGEST
distance possible?
A) 1000BaseLX
B) 1000GBaseSR
C) 1000BaseSX
D) 1000BaseT
122. Which of the following technologies
allows for redundant links within a
layer 2 segment?
A OSPF
B RIP
C Port Mirroring
D SpanningTree
123. Which of the following defines access for a
network?
A) ACL
B) RDP
C) RAS
D) ARP
124. A network administrator notices that all of the
company switches are running at capacity on a
given day, which is abnormal according to network
baselines taken recently. Which tool would BEST
allow the administrator to inspect what type of
traffic is on the network?
A) Wire tap
B) Network sniffer
C) Load balancing appliance
D) NIPS
125. Which of the following problems is MOST likely to
arise when configuring an IPv6 over IPv4 tunnel?
A) Routing loop
B) MTU black hole
C) Framing error
D) SYN flood
126. Kim, an administrator, wants to list all the
network connections to and from the server. Which
of the following commands would MOST likely be
used? (Choose 2)
A) traceroute E) Bandwidth shaper
B) ping F) Load Balancer
C) ipconfig G) DNS server
D) netstat H) IPS
127. A network device is more than 100 meters (328
feet) from a 24-port copper switch. Which of the
following can be used to connect the device to
the network?
A) Fiber multiplexer
B) Repeater
C) Attenuator
D) OTDR
128. A technician is troubleshooting a replacement
switch that is connected directly to another
switch via fiber. The switch will not recognize
the fiber connection. Which of the following is
MOST likely the problem?
A) DB loss
B) EMI
C) TXRX reversed
D) Open shorts
129. Which of the following is an example of two
factor authentication?
A) Password device certificate and PIN
B) SSL web server certificate and password
C) User password and administrator
Password
D) Password and hardware token OTP
130. Which of the following is used to restrict
access according to user policies?
A) Content filter
B) DHCP server
C) DNS server
D) VPN concentrator
131. Which of the following describes a rationale
for a network with redundant paths?
A) VPN compatibility
B) Unified communications implementation
C) High availability requirement
D) QoS
132. Teachers and students at a school currently share
the same bandwidth. The Internet performance for
the teachers in the classroom is becoming
extremely slow. Which of the following is the
BEST method to mitigate the issue?
A) Increased uptime
B) Caching engines
C) Traffic shaping
D) Load balancing
133. Zach, a technician, wants to test a laptop’s NIC
for functionality but has no other networking
equipment to attach it to. Which of the following
would allow him to test basic functionality of the
NIC?
A) Loopback plug
B) Protocol analyzer
C) Smart jack
D) Coupler
134. A computer on VLAN 10 with the IP address of 192.168.1.45/27
cannot ping a computer on VLAN 20 with the IP address of
192.168.1.65/27. Which configuration change will allow the PING
to be successful?
A) Replace the router with a layer 2 switch that supportsVLANs
B) ChangeVLAN 20 computers Default Gateway to 192.168.1.127/27
C) ChangeVLAN 10 computers Default Gateway to 192.168.1.32/27
D) Allow ICMP to pass through the router
135. Identify the distance limitation of a 10BASE5
(thicknet)Ethernet network?
A) 100m
B) 185m
C) 500m
D) 2km
m = meters
136. If 2 devices simultaneously transmit data on an Ethernet network &
a collision occurs, what does each station do in an attempt to
resend the data & avoid another collision?
A) Each device compares the other device’s priority value
(determined by IP address) with its own, & the device with the
highest priority value transmits first
B) Each device waits for a clear to send (CTS) signal from the switch
C) Each device randomly picks a priority value, & the device with the
highest value transmits first
D) Each device sets a random back off timer, & the device will
attempt retransmission after the timer expires
137. What kind of media is used by 100GBASE-
SR10 Ethernet?
A) UTP
B) MMF
C) STP
D) SMF
138. Which of the following statements are true
regarding VLAN’s? (choose 2)
A) A VLAN has a single broadcast domain
B) For traffic to pass between 2VLANs, that
traffic must be routed.
C) Because of a switch’s MAC address
table, traffic does not need to be routed to pass
between 2VLAN’s
D) A VLAN has a single collision domain
139. What name is given to a VLAN on an
IEEE 802.1Q trunk whose frames are not
tagged?
A) NativeVLAN
B) DefaultVLAN
C) ManagementVLAN
D) VLAN 0
140. In a topology running STP, every network
segment has a single __________ port, which
is the port on that segment that is closest
to the root bridge, in terms of cost?
A) Root
B) Designated
C) Non-Designated
D) Non-root
141. What is the IEEE standard for link
aggregation?
A) 802.1Q
B) 802.3ad
C) 802.1d
D) 802.3af
142. What is the maximum amount of power a switch
is allowed to provide per port according to
the IEEE 802.3af standard?
A) 7.7W
B) 15.4W
C) 26.4W
D) 32.4W
143. What switch feature allows you to connect a network
sniffer to a switch port & tells the switch to send
a copy of frames seen on one port out the port to
which your network sniffer is connected?
A) Port Interception
B) Port Duplexing
C) Port Mirroring
D) Port Redirect
144. Which IEEE 802.1X component checks the
credentials of a device wanting to gain
access to the network?
A) Supplicant
B) Authentication server
C) Access point
D) Authenticator
145. What is the binary representation of the
decimal number 117?
A) 10110101
B) 01110101
C) 10110110
D) 01101001
146. The binary number 10110100 has what decimal
equivalent?
A) 114
B) 190
C) 172
D) 180
147. What is the class of IP address 10.1.2.3/24?
A) Class A
B) Class B
C) Class C
D) Class D
148. Which of the following are dynamic
approaches to assigning routable IP
addresses to networked devices? (choose 2)
A) BOOTP
B) APIPA
C) Zeroconf
D) DHCP
149. How many assignable IP addresses exist in the
172.16.1.10/27 network?
A) 30
B) 32
C) 14
D) 64
150. What is the prefix notation for a subnet mask
of 255. 255. 255. 240?
A) /20
B) /24
C) /28
D) /29
151. Your company has been assigned the 192.168.30.0/24
network for use at one of its sites. You need to use a
subnet mask that will accommodate 7 subnets while
simultaneously accommodating the maximum number of hosts
per subnet. What subnet mask should you use?
A) /24
B) /26
C) /27
D) /28
152. A client with an IP address of 172.16.18.5/18
belongs to what network?
A) 172.16.0.0/18
B) 172.16.4.0/18
C) 172.16.8.0/18
D) 172.16.16.0/18
153. How can the following IPv6 address be
condensed?
0AA0:0123:4040:0000:0000:000:000A:100B
A) AA0::123:404:A:100B
B) AA::123:404:A:1B
C) AA0:123:4040::A:100B
D) 0AA0:0123:4040::0::000A:100Bsection
154. If a PC on an Ethernet network attempts to
communicate with a host on a different subnet, what
destination IP address & destination MAC address
will be placed in the packet/frame header sent by
the PC?
A) Dest. IP: IP address of default gateway.
Dest. MAC: MAC address of default gateway
B) Dest.IP: IP address of remote host.
Dest.MAC: MAC address of default gateway
C) Dest.IP: IP address of remote host. Dest.
MAC: MAC address of remote host
D) Dest.IP: IP address of remote host.
Dest.MAC: MAC address of local PC
155. What protocol is used to request a MAC address
that corresponds to a known IP address?
A) IGMP
B) TTL
C) ICMP
D) ARP
156. What is the network address & subnet mask of a
default route?
A) 255.255.255.255/32
B) 0.0.0.0/32
C) 255.255.255.255/0
D) 0.0.0.0/0
157. What routing protocol characteristic indicates
the believability of the routing protocol (as
opposed to other routing protocols)?
A) Weight
B) Metric
C) Administrative distance
D) SPF algorithm
158. Which of the following are distance vector
routing protocol features that can prevent
routing loops? (choose 2)
A) Reverse path forwarding (RPF) check
B) Split Horizon
C) Poison Reverse
D) Rendezvous point
159. Which of the following is a distance-vector
routing protocol with a maximum hop count of
15?
A) BGP
B) IS-IS
C) RIP
D) OSPF
160. Which of the following routing protocols is an
EGP?
A) BGP
B) IS-IS
C) RIP
D) OSPF
161. What NAT IP address is a public IP address
that references an inside device?
A) Inside Local
B) Inside Global
C) Outside Local
D) Outside Global
162. What NAT variation automatically assigns an
inside global address from a pool of available
addresses?
A) SNAT
B) DNAT
C) PAT
D) GNAT
163. What multicast protocol is used between clients &
routers to let routers know which of their
interfaces are connected to a multicast receiver?
A) IGMP
B) PIM-DM
C) PIM-SM
D) SPT switchover
164. ISDN is considered to be what type of WAN
connection?
A) Dedicated leased line
B) Circuit-switched connection
C) Packet-switched connection
D) Cell-switched connection
165. What is the data rate of an OC-3 connection?
A) 51.84 Mbps
B) 622 Mbps
C) 155.52 Mbps
D) 159.25 Gbps
166. Which of the following WAN technologies
commonly use unshielded twisted pair (UTP)?
(choose 3)
A) Cable modem
B) ISDN
C) DSL modem
D) POTS dial-up connection
167. How many channels on an E1 circuit are
available for voice, video, or data?
A) 23
B) 24
C) 30
D) 32
168. Which PPP authentication method provides one-
way authentication & sends credentials in
clear text data?
A) WEP
B) MS-CHAP
C) PAP
D) CHAP
169. What DSL variant has a distance limitation of
18,000 ft. between DSL modem & its DSLAM?
A) HDSL
B) ADSL
C) SDSL
D) VDSL
170. What kind of network is used by many cable
companies to service their cable modems, &
contains both fiber-optic and coaxial cable?
A) Head-end
B) DOCSIS
C) Composite
D) HFC
171. What locally significant identifier is used by
a frame Relay network to reference a virtual
circuit?
A) VPI/VCI
B) DLCI
C) TEI
D) MAC
172. How big is the payload portion of an ATM cell?
A) 5 bytes
B) 48 bytes
C) 53 bytes
D) 64 bytes
173. What type of antenna, commonly used in wireless AP’s
& wireless routers in SOHO locations, radiates
relatively equal power in all directions?
A) Unidirectional
B) Yagi
C) Parabolic
D) Omnidirectional
174. When using the 2.4 GHz band for multiple access points in a WLAN
located in the United States, which nonoverlapping channels should
you select? (choose 3)
A) 0
B) 1
C) 5
D) 6
E) 10
F) 11
G) 14
175. What technology do WLAN’s use to determine when
they gain access to the wireless media?
A) SPF
B) CSMA/CA
C) RSTP
D) DUAL
176. What IEEE 802.11 variant supports a maximum
speed of 54 Mbps & uses 2.4 GHz band?
A) 802.11a
B) 802.11b
C) 802.11g
D) 802.11n
177. Which of the following is used by IEEE 802.11n to
achieve high through-put through the use of multiple
antennas for transmission & reception?
A) MIMO
B) DSSS
C) FHSS
D) LACP
178. A WLAN formed directly between wireless clients
(without the use of a wireless AP) is referred to as
what type of WLAN?
A) Enterprise mode
B) IBSS
C) Personal Mode
D) BSS
179. When extending the range for a 2.4-GHz WLAN, you can use
nonoverlapping channels for adjacent coverage cells.
However, there should be some overlap in coverage between
those cells (using nonoverlapping channels) to prevent a
connection from dropping as a user roams from one coverage cell
to another. What percentage of coverage overlap is recommended
for these adjacent cells?
A) 5 – 10 percent
B) 10 – 15 percent
C) 15 – 20 percent
D) 20 – 25 percent
180. If a WLAN does not require a user to provide any
credentials to associate with a wireless AP &
access the WLAN, what type of authentication is
said to be in use?
A) WEP
B) SSID
C) Open
D) IV
181. WEP’s RC4 approach to encryption uses a 24-
bit string of characters added to
transmitted data, such that the same plain
text data frame will never appear as the
same WEP-encrypted data frame. What is
this string of characters called?
A) Initialization vector
B) Chips
C) Orthogonal descriptor
D) Session key
182. What standard developed by the Wi-Fi
Alliance implements the requirements of IEEE
802.11i ?
A) TKIP
B) MIC
C) WEP
D) WPA2
183. What is the MPLS header?
A) 4 bits
B) 8 bits
C) 16 bits
D) 32 bits
184. Which of the following is a social
engineering attack?
A) Man in the middle
B) Worms
C) EvilTwin
D) Phishing
185. 00:12:34:56:78 can be used in which of
the following?
A Channel selection
B WPA-PSK password
C WEP key
D MAC filtering
186. Which of the following devices
will monitor for propagating
worms?
A IDS
B Firewall
C Proxy server
D Mail server
187. T568B wiring scheme is typically found on
which of the following components?
A 66 block
B Demarc extension
C Patch Panel
D Vertical Cross Connect
188. Something you have, something you
are and something you know are the
three tenets of:
A) access control
B) remote access
C) change management
D) social engineering
189. After moving office furniture around a
user can no longer connect to the
network. Which of the following is Most
likely the reason for the problem
A Split cables
B Crosstalk
C TX/RX reversed
D DB loss
190. A company wishes to have a wireless signal
broadcast only through a special tunnel.
Which of the following measures will
accomplish this?
A MAC filtering
B WPA encryption
C Changing antenna type
D Decreasing radio strength
191. In IPSec, which of the following
is an agreement on how devices
will securely transmit
information?
A) ESP
B) SA
C) AH
D) ISAKMP
192. Which of the following could be
used to estimate RTT across a
router?
A traceroute
B dig
C arp
D uptime
193. The cable tester displays the
following information
11
2------- 2
3------- 3
4xxxxx 4
5xxxxx 5
6------- 6
7------- 7
8------- 8
What is being reported?
A) 5 is open, 1|4 are open
B) 1 is open, 4|5 are
shorted
C) 4|5 is shorted, 1 is ok
D) 1 is shorted, 4|5 are open
194. Which of the following represents
the physical address of a network
access card
A 00-30-48-83-9B-C8
B FF01:D2:C4:87::11
C 08-9D-35-22-L2-34-FF-21
D 2D1A:C3:0:1C3B:2AD:FF:FEBE:9D3A
195. Which of the following records
would be used for a Reverse
DNS lookup?
A) MX
B) PTR
C) A
D) AAAA
196. Which of the following defines access for a
network?
A) ACL
B) RDP
C) RAS
D) ARP
197. A technician is troubleshooting a replacement
switch that is connected directly to another
switch via fiber. The switch will not recognize
the fiber connection. Which of the following is
MOST likely the problem?
A) DB loss
B) EMI
C) TXRX reversed
D) Open shorts
198. Which of the following is used to restrict
access according to user policies?
A) Content filter
B) DHCP server
C) DNS server
D) VPN concentrator
199. Which of the following describes a rationale
for a network with redundant paths?
A) VPN compatibility
B) Unified communications implementation
C) High availability requirement
D) QoS
200. Kim, an administrator, would like to inspect
all traffic flowing over the SMTP protocol
on a given network. Which of the following
tools would accomplish this?
(select two)
A) Packet sniffer
B) Honeypot
C) Port mirroring
D) IPS
E) Port scanner
F) IDS
201. For which of the following reasons could a
single server’s NIC transmit packets from
multiple MAC address sources?
A) The server contains several virtual machines & the MAC
addresses are from the virtual machines.
B) The server is hosting a web server & the MAC addresses are from
connected browsers
C) The server is hosting a proxy server & the MAC addresses are
from the connected clients
D) The server NIC is starting to fail & should be replaced.
202. Which of the following does SNMPv3 BEST
provide over previous versions?
A) Simplified management
B) Increased security
C) More data types
D) Higher productivity
203. In which of the following would Lisa, a
technician, find the LARGEST number of 110
block patch panels?
A) MDF
B) Caching engines
C) Demarc
D) IDF
204. A company’s database software runs the cloud.
The device hosting the software is an example
of which of the following?
A) Virtual server
B) Virtual switch
C) Virtual desktop
D) Virtual PBX
205. Kim, a new employee, is unable to get to the department’s
server while other employees are having no issues. The network
administrator has verified that Kim has permission to the
server & the workstation is able to get to other network
resources. Which of the following is the MOST likely cause?
A) The department server is having network issues
B) Kim’s workstation is a part of the wrongVLAN
C) The onboard NIC has outdated drivers installed
D) The wireless NIC has not been enabled for Kim’s workstation
206. Kim, a customer, wants to install a wireless network
into a shared office space. There are several other
wireless networks from other companies that can be
detected within the office space. Which of the
following should be configured on Kim’s wireless network
to differentiate it from other wireless networks & still
provide the BEST performance & security? (Choose 2)
A) SSID
B) Channel
C) Antenna type
D) Wireless standard
E) NAT
207. Which of the following allows a central point
to simultaneously address other points without
addressing all of them?
A) Multicast
B) Subnetting
C) Unicast
D) Broadcast
208. Zack, a technician, wants to provide the
MOST wireless security on the LAN but does
not have a RADIUS server. Which technology
should be used?
A) PEAP
B) WPA Personal
C) WPA2 Enterprise
D) WPA2 PSK
209. Which of the following would a technician plug
into a smartjack?
A) 25 pair cable
B) 100 pair cable
C) Patch cable
D) Patch panel
210. A customer wishes to network several computers
throughout a large warehouse containing numerous
metal shelves & concrete walls. The computers are
at least 175 meters (574 feet) apart. Which of the
following media types should be recommended for the
customer using only a single switch?
A) Fiber optic
B) Wireless
C) CAT5e
D) CAT3
211. Lisa, an administrator, is unable to route traffic
between VLAN’s on a switch. Communication between
devices within each VLAN is functioning. At which
of the following layers does the problem MOST
likely reside?
A) Network
B) Data link
C) Transport
D) Session
212. Which of the following devices is used to
distribute network traffic equally over
multiple links?
A) Content filler
B) DNS server
C) Load balancer
D) Proxy server
213. Which of the following would cause signal
interference in a 2.4 GHz WAP? (Choose 2)
A) Cell phone
B) Cordless phone
C) Microwave oven
D) Printer
E) Television
214. Which of the following default services uses
TCP/UDP port 88?
A) LDAP
B) IGMP
C) HTTP
D) Kerberos
215. Which of the following TCP/IP & OSI model
layers retransmits a TCP packet if it is not
received successfully at this destination?
A) The transport OSI model layer & the InternetTCP/IP model layer
B) The transport OSI model layer & the transportTCP/IP model layer
C) The network OSI model layer & the transportTCP/IP model layer
D) The network OSI model layer & the internetTCP/IP model layer
216. Which of the following limits the number of
devices that can be assigned IP addresses by
DHCP?
A) A Lease
B) Reservation
C) DNS setting
D) Scope
217. Kim, a network administrator, should consult
which documentation sources FIRST to
determine the cause of recent network
issues?
A) Network map
B) Cable management
C) Change management
D) Asset management
218. When using high bandwidth applications over
multiple WAN connections, which of the
following should be used?
A) Static IP addressing
B) Half-duplex
C) PoE devices
D) Load balancing
219. A new user is reporting connectivity issues.
Zach, the network technician, notices that there
is no link light on the user’s NIC. Which of the
following would be used to verify the wiring back
to the patch panel?
A) Butt set
B) Cable certifier
C) Toner probe
D) Snips
220. Which of the following ports is
the default telnet port?
A) 20
B) 21
C) 22
D) 23
221. In which of the following
wireless standards is MIMO used?
A) 802.11a
B) 802.11b
C) 802.11g
D) 802.11n
222. Which of the following address blocks
would MOST likely be blocked from
crossing a border router?
A) 8.0.0.0/8
B) 172.16.0.0/12
C) 122.0.0.0/24
D) 248.0.0.0/8
223. Which of the following commands can Lisa, a
network technician, use to check whether the
DNS server for a given domain is reachable?
A) Nmap
B) Nbtstat
C) Dig
D) Arp
224. Which of the following ports would have to
be allowed through a firewall to allow SNMP
traffic to pass on its default port? (Select
TWO)
A) 22
B) 23
C) 243
D) 161
E) 162
F) 8080
225. Lisa, a network technician, needs to
introduce a few more cables to the existing
patch panel. Which of the following tools
would she use?
A) OTDR
B) Multimeter
C) Punch down tool
D) Temperature monitor
226. Jeff, a technician is setting up an IDS security
device. Which of the following should be
configured on the switch to utilize the IDS?
A) PoE
B) Port mirroring
C) Convergence
D) Port speed
227. Jeff, a network technician, is
installing a wireless router. Which of
the following should Jeff consider to
get the BEST signal strength?
A) WAP placement
B) PoE devices
C) MAC filtering
D) Encryption type
228. Zach, a technician suspects a duplicate IP
address assignment on the network. Which
of the following resources can be used to
verify this problem?
A) Network map
B) Environmental monitor
C) Placement map
D) Syslog
229. Lisa, a technician, decides to upgrade a router
before leaving for vacation. While away, users
begin to report slow performance. Which of the
following practices allows other technicians to
quickly return the network to normal speeds?
A) Change management
B) Baselines
C) Asset management
D) Cable management
230. A VPN concentrator is used for which
of the following purposes?
A) MAC filtering
B) Content filtering
C) Secure network access
D) Connectivity troubleshooting
231. Which of the following layers of the OSI
model, maps to the Network Interface
layer of the TCP/IP Protocol stack? (pick
2)
A) Physical
B) Session
C) Data Link
D) Network
E) Transport
232. Which of the following tools would Lisa, a
technician, BEST use to trace a wire
through an area where multiple wires of
the same color are twisted together?
A) Cable tester
B) Toner probe
C) Cable crimper
D) Punch down tool
233. Kim, a user, cannot access the network using
wireless. Which of the following is MOST
likely the cause?
A) TXRX is reversed
B) Faulty crossover cable
C) IncorrectWEP key
D) A short in the cable pairs
234. Lisa, a user, reports the network is down. While
troubleshooting, a technician walks into a
communications closet and notices a small patch
cable with both ends plugged into interfaces on
the same switch. Which of the following is this
an example of?
A) Switch loop
B) Port bonding
C) Virtual switch
D) Port mirroring
235. Jeff, a technician, is charged with setting up
network monitoring for critical devices in the
network. It is important the information be sent
securely to the monitoring station. Which of the
following protocols will support secure
transmission of the data?
A) SNMPv2
B) VPN
C) SYSLOG
D) SMTP
236. Which of the following utilities would
Kim, a technician, use to resolve the FQDN
of a web server to its IP address?
A) Netstat
B) Route
C) Nslookup
D) Arp
237. Zach, a technician, is installing an 802.11n
network. Which of the following should he
disable to stop broadcasting the network
name?
A) Channel
B) WEP
C) SSID
D) WEPA
238. Which of the following can Jeff, a
technician, modify on a 802.11n router that
is not available as an option on an 802.11g
device?
A) SSID
B) Encryption
C) Channels
D) Spectrum
239. Jeff, an end user, has plugged in both ends of
the same network cable to two adjacent jacks.
Both ports are connected to the same switch in
the IDF. Which of the following will MOST likely
happen?
A) VLAN malfunction
B) Broadcast storm
C) Quality of Service loss
D) Duplicate IP addresses
240. An analog POTS voice line is no longer
working and Kim, the technician, is tasked
to verify if a dial tone is present at the
IDF. Which of the following tools would be
used?
A) Protocol analyzer
B) Butt set
C) OTDR
D) Toner probe
241. Lisa, a technician, is troubleshooting a
cable problem. She has checked both ends and
suspects an issue 50 yards (46 meters) from
the location. Which of the following network
tools will confirm this analysis?
A) TDR
B) Protocol analyzer
C) Multimeter
D) Cable crimper
242. Which of the following properties of DHCP
would Lisa, a technician, use to ensure an
IP address is not leased out from the active
scope?
A) Reservations
B) Lease times
C) Removing IPs from the active leases
D) Configuring the DNS options
243. Zach, a network technician, has been
troubleshooting a connectivity problem in the LAN
room. He has diagnosed the problem and
implemented a solution. Which of the following
would be Zach’s NEXT step?
A) Test the theory
B) Establish a plan of action
C) Establish a theory
D) Document findings
244. Which of the following would be used to
identify terminations in a punch block for
which the wiring diagram has been lost?
A) OTDR
B) Protocol analyzer
C) Toner probe
D) TDR
245. Two WAPs are positioned with overlapping
coverage, but seamless roaming across them
is not working. Which of the following
should be checked?
A) WPA should be enabled
B) PKI should be turned off
C) WAP SID’s are matching
D) WAPs are transmitting on the same channel
246. Which of the following would Kim, a
technician, do to monitor remote traffic
through an access point?
A) Enable an SNMP agent
B) Enable network mapping
C) Set monitoring SSID
D) SelectWPA2
247. Which of the following 802.11n features
allows for the use of multiple
simultaneous frequencies in order to
increase usable bandwidth?
A) Channel bonding
B) MIMO
C) Spatial reuse
D) 20MHzchannel spacing
248. Which of the following ports would Zach, a
technician, need to open on a firewall to
allow SSH on the default port?
A) 20
B) 21
C) 22
D) 23
249. Which of the following separates
broadcast domains?
A) Port mirroring
B) Router
C) Convergence
D) Switch
250. Zach, a technician, needs to terminate a
CAT5e Ethernet cable to a 110 block. Which
of the following tools should be used?
A) Tone probe
B) Punch down
C) Wire tester
D) Crimper
251. Kim, a technician, needs to locate a cable
in an unorganized wiring closet. Which of
the following tools will help her locate the
cable?
A) Protocol analyzer
B) Cable tester
C) Toner probe
D) Punch down tool
252. Jeff, a technician, has been asked to add a
subnet to the company’s LAN. Which of the
following interfaces on the router will be
modified?
A) Fast Ethernet 0/0
B) AUX 0
C) Console 0
D) Serial 0/0/0
253. Lisa, a network technician, is attempting to map a
FQDN to an internal server at the address of
10.0.0.15 without NAT/PAT. Which of the following
is the reason this will ultimately not work?
A) This is a private address that cannot be seen
by external users
B) This address does not have the appropriate
subnet mask assigned
C) This is a public address which can only be
seen by internal users
D) This is a private address which can only be
seen by external users
254. Jeff, a user, is having a problem with a
POTS line. Which of the following tools
would Jeff use to make sure the phone
lines have a dial tone?
A) Loopback plugs
B) Butt set
C) Cable certifier
D) Tone probe
255. Lisa, a technician, has configured a new switch
that is remotely accessed using SSH. The switch is
working properly, but cannot be accessed remotely.
Which of the following items is MOST likely missing
in the configuration?
A) Port speed
B) Cryptokey
C) DataVLAN
D) NAT/PAT
256. Which of the following protocols
is used to securely connect to a
multi-layer switch?
A) HTTP
B) SMTP
C) SSH
D) Telnet
257. Which of the following is the prefix for a
link-local IPv6 address?
A) FE80::/10
B) FFOO::/8
C) 2FFE::/16
D) FEEF::/12
258. Zach, a technician, is checking newly installed
CAT5 cabling and suspects that some of the ends
were not properly terminated. Which of the
following tools will verify this?
A) Cable tester
B) Tone probe
C) OTDR
D) Loopback plug
259. There is suspected virus activity on the
network. Which of the following would
Lisa, a technician, use to study network
traffic?
A) Protocol analyzer
B) Cable tester
C) Cable verifier
D) Environmental monitor
260. Which of the following is used to
prevent Layer 2 switching loops
within a local area network?
A) STP
B) MTU
C) EGP
D) IGP
261. Which of the following network management
tools can filter information from all data
entering and leaving a specific port on the
switch?
A) SNMP trap
B) Bandwidth analyzer
C) Network sniffer
D) Syslog server
262. Which of the following is a method to
prioritize network traffic coming on VoIP
phones?
A) PAT
B) DNS
C) SIP
D) QoS
263. Which of the following network
devices hides network nodes
behind one public IP address?
A) Layer 3 switch
B) Content filter
C) VPN server
D) Proxy server
264. A mobile user is no longer able to access network resources.
Jeff, the network technician, is unable to ping the user’s
workstation. Which of the following commands would MOST likely
be used on that workstation to verify its current network
settings?
A) Net share
B) Hostname
C) IPconfig
D) Tracert
265. Which of the following Ethernet
technologies has the LONGEST
distance possible?
A) 1000BaseLX
B) 1000GBaseSR
C) 1000BaseSX
D) 1000BaseT
266. Which of the following threats is MOST
likely to enable an attacker to modify data
in transit?
A) DoS
B) Smurf attack
C) Virus
D) Man-in-the-middle
267. Which of the following is a terminal
emulator used to manage a network device?
A) VPN
B) IDS
C) PUTTY
D) IPS
268. Which of the following DNS record
types is used for IPv6 resolution?
A) MX
B) AAAA
C) A
D) PTR
269. A technician has received word that the
telephone company has added another POTS
line to the building. Where will the
technician MOST likely find the new line?
A) CSU
B) Demarc
C) Registered jack
D) DSU
270. Which of the following is the MAXIMUM
distance a single 1000BaseT segment can
cover?
A) 100 kilometers (62 miles)
B) 10 kilometers (6 miles)
C) 1000 meters (3281 feet)
D) 100 meters (328 feet)
271. Kim, a network technician wants to use a packet analyzer to
troubleshoot a reported problem with a user's workstation with
IP address 192.168.1.45. To identify the workstation's packets
she wants to use the workstation's MAC address. Which of the
following protocols would provide the needed information?
A) DHCP
B) ARP
C) DNS
D) Ping
272. An organization currently has CAT5e cabling
throughout its office. Kim, the network
technician, is troubleshooting a new CAT6 run
that supports network traffic but does not meet
specification when tested with a TDR. Which of
the following is MOST likely the cause?
A) Improper grounding
B) TXRX reversed
C) Incorrect termination
D) Outdated NIC drivers
273. Which of the following are components of
IPSec? (Select 2)
A) AH
B) ESP
C) SSH
D) ICA
E) TLS
274. Which of the following
authenticates, allows, and controls
the execution of router commands?
A) PKI
B) RADIUS
C) Kerberos
D) TACACS+
275. A technician is configuring a wireless
network. To avoid interference from other
wireless networks in the area, the
technician should change which setting?
A) Channel
B) SSID
C) Firewall rule
D) Encryption
276. Jeff, a company executive, has noticed that a wireless
network signal from the company's WAP can be seen in the
company's parking lot. Jeff is very worried that this is a
potential security threat.
Which of the following can be done to eliminate this
threat?
A) Implement WEP encryption
B) Decrease signal strength
C) Change wireless channels
D) Rotate the SSID daily
277. Which of the following DNS record types
provides the hostname to IP address
mapping?
A) A record
B) NS record
C) CNAME record
D) MX record
278. Which of the following would be used to
test out the security of a specific
network by allowing it to receive
security attacks?
A) Honeynet
B) Honeypot
C) Vulnerability scanner
D) Network based IDS
279. Which of the following would Kim, a
technician, use in voice over IP
communications?
A) SNTP
B) SCP
C) SMTP
D) SIP
280. Which of the following is the best way to
mitigate security threats on a network?
A) Social engineering
B) User training
C) Incident response
D) Man-in-the-middle
281. Which of the following subnet masks would
allow for 192.168.0.3 and 192.168.0.240
to be in the same subnet?
A) 255.255.255.0
B) 255.255.255.128
C) 255.255.255.192
D) 255.255.255.248
282. Jeff, an administrator, wishes to add a
third network segment to the firewall
where the company’s public web servers
will be placed. Which of the following
BEST describes this new segment?
A) PKI
B) VPN
C) IPS
D) DMZ
283. Which of the following would help a new
administrator quickly determine if a
network had a VLAN for its publicly
accessible servers?
A) Baselines
B) Regulations
C) Logical network diagrams
D) Wiring schematics
284. Which of the following has the
HIGHEST data rate speed?
A) T1
B) ADSL
C) SDSL
D) OC-3
285. Which of the following technologies is
associated with the DOCSIS standard?
A) Cable
B) Dialup
C) Wireless
D) Cellular
286. Which of the following MUST be used when
securing a VoIP network consisting of
private IP addresses?
A) IPS
B) Application layer firewall
C) IDS
D) An unmanaged switch
287. Which of the following should an
administrator do after running a command
from the console on the perimeter router?
A) Update the configuration logs
B) Update the network wiring schematics
C) Update the network configuration procedures
D) Compare the configuration with the baseline
288. Kim, a technician, is connecting a new desktop computer to
a switch. She was only able to locate one cable in the
office for installation. The wires at each end are color
coded as follows: END A orange-white, orange, green-
white, blue, blue-white, green, brown-white, brown. END B
green-white, green, orange-white, blue, blue-
white, orange, brown-white, brown. Which of the following
should Kim do to complete the installation?
A) Re-end the provided cable, keeping the wiring the
same.
B) Use the provided cable
C) Purchase a crossover cable
D) Purchase a straight-through cable
289. Which of the following are fiber
connectors? (Select 2)
A) LC
B) MTRJ
C) T1
D) DB-9
E) BNC
290. Which of the following solutions will
detect and disable a rogue access point?
A) Port scan
B) packet sniffer
C) IPS
D) IDS
291. Which of the following is the MOST
economical way for Sandy, a
technician, to implement 10-Gigabit
Ethernet at a datacenter?
A) 10GBaseLR
B) 10GBaseSR
C) 10G BaseX
D) 10GBaseT
292. Which of the following can be done
to increase a wireless LAN cell
size?
A) Add a higher gain omni antenna
B) Add diversity antennas
C) Add a higher gain yagi antenna
D) Increase the PoE wattage
293. Which of the following can be configured
to restrict specific ports and IP
addresses from accessing the internal
network? (select 2)
A) Layer 2 switch
B) MAC address filtering
C) ACLs
D) IIS server
E) Port scanner
F) Firewall
294. Which of the following is used to
identify active hosts along with their
network addresses?
A) Port scan
B) Ping sweep
C) IDS
D) NIPS
295. Which of the following is used to share
traffic between multiple network
connections?
A) Load balancer
B) Content filter
C) VPN concentrator
D) Proxy server
296. What layers of the OSI model
does Stateful Inspection
operate at?
It assures the connection (session) between 2
parties is valid and inspects packets from this
connection to assure the packets are not
malicious (application level) and acts as a
circuit level firewall. It operates at the network
3, session 5, & application 7 layers
297. Which of the following cable types
allows for the LONGEST distance of
a Gigabit Ethernet connection?
A) Multimode fiber
B) CAT6a
C) Single mode fiber
D) Coaxial
298. Which of the following mediums is
circuit switched?
A) PSTN
B) ATM
C) Frame relay
D) MPLS