Chapter 7
Practice Exam 2

  1. Which of the following are technologies typically used for Personal Area Networks (PANs)? (Choose all that apply.)
    1. RFID
    2. Z-Wave
    3. ISDN
    4. NFC
    5. Bluetooth
  2. Review the following figure. How many collision domains and broadcast domains are there in the network diagram?
    image
    1. There are three collision domains and one broadcast domain.
    2. There is one collision domain and one broadcast domain.
    3. There are three collision domains and three broadcast domains.
    4. There are seven collision domains and three broadcast domains.
    5. There are nine collision domains and three broadcast domains.
  3. Which of the following types of network devices can provide authentication services for multiple remote access servers using the device's own account database?
    1. NAS
    2. IDS
    3. NGFW
    4. RADIUS
  4. You are designing the network for your company's new branch office, and you need a device on which administrators can create Virtual Local Area Networks (VLANs) and that will forward traffic between them. Which of the following types of devices can do this?
    1. Virtual router
    2. Multilayer switch
    3. Broadband router
    4. Load balancer
  5. You are setting up a new network for which you have been given the IPv4 network address 10.61.0.0/19. You want to calculate the number of hosts you can create on each subnet. How many bits are allocated to the host identifier in an IPv4 address on this network?
    1. 5
    2. 8
    3. 13
    4. 21
  6. The protocols that are responsible for the delivery of data packets to their final destinations on an internetwork operate at which layer of the Open Systems Interconnection (OSI) reference model?
    1. Application
    2. Session
    3. Transport
    4. Network
    5. Data link
  7. Originally, Storage Area Networks (SANs) were dedicated solely to storage-based traffic. A Local Area Network (LAN) was also required for other types of traffic. Today, however, it is possible for SAN and LAN traffic to coexist on a single network medium. Which of the following SAN protocols are capable of sharing a network medium with standard LAN traffic? (Choose all that apply.)
    1. InfiniBand
    2. Fibre Channel
    3. iSCSI
    4. FCoE
  8. Which of the following application layer protocols do not include a program that enables a user to log on to a remote network device and execute commands using a character-based interface? (Choose all that apply.)
    1. Telnet
    2. Simple Mail Transfer Protocol (SMTP)
    3. File Transfer Protocol (FTP)
    4. Domain Name System (DNS)
  9. Many network diagrams use Cisco symbols to illustrate the locations of and relationships between network components. Cisco symbols are standardized pictographs that illustrate the basic function of a network component. In a network diagram that uses Cisco symbols, what component does the symbol in the figure represent?
    image
    1. A hub
    2. A switch
    3. A router
    4. A gateway
  10. You are planning an automated operating system deployment for 100 new Windows workstations your company has received. You intend to configure the workstations to boot using Preboot Execution Environment (PXE), during which time the system will obtain an IP address from a Dynamic Host Configuration Protocol (DHCP) server and then download a boot image file from a Trivial File Transfer Protocol (TFTP) server. Which of the following well-known ports must you open on the firewall separating the workstations from the servers? (Choose all that apply.)
    1. 64
    2. 65
    3. 66
    4. 67
    5. 68
    6. 69
  11. Your department is experiencing frequent delays as users wait for images to render using their outdated graphics software package. As a result, you submitted a change request for a new software product at the monthly meeting of the company's change management team. Now that the change request has been approved, it is time to implement the change. Which of the following administrative tasks will most likely be the change management team's responsibility during the implementation process? (Choose all that apply.)
    1. Notifying users
    2. Documenting all modifications made
    3. Authorizing downtime
    4. Designating a maintenance window
  12. You are installing a new server that is equipped with two power supplies. The server's firmware enables you to set the mode in which the power supplies will be used. In which of the following modes must the dual power supplies be running for the system to be fault tolerant?
    1. Individual mode
    2. Combined mode
    3. Redundant mode
    4. Hot backup mode
  13. The Domain Name System (DNS) defines a hierarchical name space, locations in which are reflected in fully qualified domain names (FQDNs). Which of the words in the FQDN www.paris.mydomain.org represents the bottommost layer in the DNS namespace's domain hierarchy?
    1. www
    2. paris
    3. mydomain
    4. org
  14. The term datagram is typically used by protocols offering connectionless delivery service. Which of the following protocols use(s) the term datagram to describe the data transfer unit it creates? (Choose all that apply.)
    1. TCP
    2. IP
    3. UDP
    4. Ethernet
  15. After using a tape backup solution for years, you have recently started backing up your server to an external hard disk drive. Your backup schedule calls for weekly full backups and daily incremental backups. In the past, performing a restore required multiple jobs, but now only a single job is needed. Why does performing incremental backups to a hard drive, rather than a tape drive, make it possible to restore a server with a single job, rather than multiple jobs?
    1. Because hard drives use a different block size than tape drives
    2. Because hard drives can transfer data faster than tape drives
    3. Because hard drives hold more data than tape drives
    4. Because hard drives are random access devices and tape drives are not
  16. You have just received notification of a new software release for an application you are running on your servers. The release is intended to address a newly discovered security vulnerability. Which of the following is the correct term for a software release containing a fix designed to address one specific issue?
    1. An upgrade
    2. A patch
    3. A service pack
    4. An update
  17. Twisted-pair cables consist of multiple pairs of wires within a sheath, with each pair of wires twisted together separately. Which of the following statements best explains the reason for the twists in twisted-pair cabling? (Choose all that apply.)
    1. The twists help to prevent crosstalk in adjacent wire pairs.
    2. The twists make it easier for installers to attach connectors to the cable ends.
    3. The twists extend the cable's bend radius allowance, making it easier to install.
    4. The twists limit the effects of electromagnetic interference (EMI) on the signals carried over the cable.
    5. The twists help to prevent data collisions from occurring.
  18. The figure shown here lists the processes currently running on a Linux workstation. Which of the following performance monitoring tools, provided in Linux and Unix operating systems, enables you to display information about processes that are currently running on a system?
    image
    1. netstat
    2. dig
    3. perfmon
    4. top
  19. You are contracting with a provider to obtain email services for the clients on your network, using their existing email servers in the public cloud. You do not need anything from the provider other than email. Which of the following service models will you be using?
    1. PaaS
    2. SaaS
    3. IaaS
    4. All of the above
  20. Security Information and Event Management (SIEM) is a combination tool that uses information gathered from logs and network devices to provide a real-time analysis of the network's security condition. Which of the following SIEM processes performs searches for specific criteria, during specific time frames, in logs located on different computers?
    1. Correlation
    2. Retention
    3. Data aggregation
    4. Forensic analysis
  21. When you start Dynamic Host Configuration Protocol (DHCP) client, it transmits DHCPDISCOVER messages to locate and initiate contact with DHCP servers. Which of the following types of transmissions does the client use for this purpose?
    1. Broadcast
    2. Multicast
    3. Anycast
    4. Unicast
  22. Virtual Private Networks (VPNs) use a technique called tunneling to secure traffic as it passes over a public network, such as the Internet. In some cases, the traffic within the VPN tunnel is also encrypted. Which of the following VPN protocols does not provide encryption within the tunnel?
    1. L2TP
    2. IPsec
    3. PPTP
    4. SSL
  23. You are installing a wireless network in a site that has a great many 2.4 GHz wireless telephones. Which of the following wireless networking technologies can you use, which will never experience interference from the telephones? (Choose all that apply.)
    1. IEEE 802.11b
    2. IEEE 802.11g
    3. IEEE 802.11ac
    4. IEEE 802.11a
    5. IEEE 802.11n
  24. Which of the following is another term for a switch?
    1. Multicast hub
    2. Multiport repeater
    3. Multiport bridge
    4. Multihomed router
  25. You are working at a client site with a managed router that includes a console port for administrative access, which you can use to connect a laptop and run a terminal program to access the device's interface. Which of the following is the best term for this type of access to the device?
    1. Client-to-site
    2. In-band
    3. BYOD
    4. Out-of-band
  26. After some incidents of security breaches, you have been asked to draft a revised password policy for the company's users. Which of the following are typical elements of a corporate password policy? (Choose all that apply.)
    1. Frequent password changes
    2. Use of special characters
    3. Minimum password length
    4. Unique passwords
  27. You have a laptop that requires you to hold your finger on a scanner pad before you can use it. A device equipped with a fingerprint scanner that authenticates the user is using which of the following types of technology?
    1. Tamper detection
    2. Biometrics
    3. Hand geometry
    4. Pattern recognition
  28. You have been asked to locate the computers on a network which the previous consultant has configured with incorrect IPv6 addresses. Which of the following are not correctly formatted IPv6 addresses? (Choose all that apply.)
    1. fe00::c955:c944:acdd:3fcb
    2. fe00::b491:cf79:p493:23ff
    3. 2001:0:44ef68:23eb:99fe:72bec6:ea5f
    4. 2001:0:49e6:39ff:8cf5:6812:ef56
  29. During a security evaluation by an outside contractor, you are asked whether your company uses a fail open or fail closed policy for the datacenter. You do not know what the contractor means. Which of the following physical security mechanisms can either fail closed or fail open?
    1. Door locks
    2. Motion detectors
    3. Honeypots
    4. Video cameras
  30. Your company is concerned about the possibility of insider threats. Which of the following security measures can you use to monitor the specific activities of authorized individuals within sensitive areas?
    1. Identification badges
    2. Motion detection
    3. Video surveillance
    4. Key fobs
  31. Ralph is troubleshooting a Windows server, and while doing so, he runs the following command: ping 127.0.0.1 . The command completes successfully. What has Ralph proven by doing this?
    1. That the computer's network adapter is functioning properly
    2. That the computer's IP address is correct for the network
    3. That the computer's TCP/IP networking stack is loaded and functioning
    4. Nothing
  32. Which of the following are not examples of multifactor authentication? (Choose all that apply.)
    1. A system that requires a smart card and a PIN for authentication
    2. A system that uses an external RADIUS server for authentication
    3. A system that requires two passwords for authentication
    4. A system that requires a password and a retinal scan for authentication
  33. A user calls Ed at the help desk to report that he cannot access the Internet. He can access systems on the local network, however. Ed examines the routing table on the user's workstation and sees the following listing. Which statement explains why the user cannot access the Internet?
    IPv4 Route Table
    ==========================================================================
    Active Routes:
    Network Destination  Netmask         Gateway    Interface      Metric
     127.0.0.0           255.0.0.0        On-link     127.0.0.1     331
     127.0.0.1           255.255.255.255  On-link     127.0.0.1     331
     127.255.255.255     255.255.255.255  On-link     127.0.0.1     331
     192.168.2.0         255.255.255.0    On-link     192.168.2.37  281
     192.168.2.37        255.255.255.255  On-link     192.168.2.37  281
     192.168.2.255       255.255.255.255  On-link     192.168.2.37  281
     224.0.0.0           240.0.0.0        On-link     127.0.0.1     331
     224.0.0.0           240.0.0.0        On-link     192.168.2.37  281
     255.255.255.255     255.255.255.255  On-link     127.0.0.1     331
     255.255.255.255     255.255.255.255  On-link     192.168.2.37  281
    ==========================================================================
    Persistent Routes:
     None
    1. The routing table does not specify a loopback address.
    2. The routing table does not specify a DNS server address.
    3. The routing table does not specify a default gateway address.
    4. The routing table contains two different routes to the 224.0.0.0 network.
  34. Which of the following statements about single-mode fiber-optic cable are true? (Choose all that apply.)
    1. Multimode cables use an LED light source, while single-mode cables use a laser.
    2. Multimode cables can span longer distances than single-mode cables.
    3. Multimode cables have a smaller core filament than single-mode cables.
    4. Multimode cables have a smaller bend radius than single-mode, making them easier to install.
    5. Multimode fiber-optic cables require a ground, whereas single-mode cables do not.
  35. A user swipes a smartcard through the reader connected to a laptop and then types a password to log on to the system. Which of the following actions is the user performing?
    1. Auditing
    2. Accounting
    3. Authorization
    4. Authentication
  36. Which of the following cabling topologies have never been used by standard Ethernet networks? (Choose all that apply.)
    1. Bus
    2. Ring
    3. Star
    4. Mesh
  37. Pulling into your company parking lot at lunchtime, you notice a person without a company parking sticker on his car working at a laptop. You have seen this more than once, and you begin to suspect that unauthorized users are connecting to the company's Wireless Access Point (WAP) and gaining access to the network. Which of the following are steps you can take to prevent this from happening in the future? (Choose all that apply.)
    1. Use Kerberos for authentication
    2. Place the access point in a screened subnet
    3. Disable SSID broadcasting
    4. Implement MAC address filtering
  38. Traffic shaping is a series of techniques that optimize the allocation of network bandwidth. Which of the following are techniques used in traffic shaping to prevent networks from being overwhelmed by data transmissions? (Choose all that apply.)
    1. Broadcast storming
    2. Bandwidth throttling
    3. Network Address Translation (NAT)
    4. Rate limiting
  39. Multiprotocol switches are devices that perform functions associated with two different layers of the Open Systems Interconnection (OSI) reference model. Which two of the following layers are often associated with network switching? (Choose all that apply.)
    1. Application
    2. Presentation
    3. Session
    4. Transport
    5. Network
    6. Data link
    7. Physical
  40. You are attempting to connect your new laptop to your company's wireless network. The Wireless Access Point (WAP) on the network has a Service Set Identifier (SSID) that is not broadcasted and uses WiFi Protected Access II (WPA2) for security. Which of the following describes what you must do to connect your laptop to the network?
    1. Select the SSID from a list and allow the client to automatically detect the security protocol.
    2. Type the SSID manually and then select WPA2 from the security protocol options provided.
    3. Type the SSID manually and allow the client to automatically detect the security protocol.
    4. Select the SSID from a list and then select WPA2 from the security protocol options provided.
  41. Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) is a Media Access Control (MAC) mechanism designed to prevent two systems using the same network medium from transmitting at the same time. Which of the following IEEE standards calls for the use of CSMA/CA?
    1. 802.3
    2. 802.1X
    3. 802.11ac
    4. All of the above
  42. A large enterprise network will—at a minimum—have demarcation points for telephone services and a connection to an Internet Service Provider's (ISP's) network. In many cases, these services will enter the building in the same equipment room that houses the backbone switch. Which of the following is the term used to describe this wiring nexus?
    1. MTBF
    2. IDF
    3. RDP
    4. MDF
  43. You have configured your company's wireless network to enable clients to authenticate only when the signal strength of their connections exceeds a specified level. Which of the following terms best describes the security mechanism provided by this configuration?
    1. Geofencing
    2. Local authentication
    3. Motion detection
    4. Port security
  44. Social engineering has become an increasingly serious problem on your company network. Which of the following is an effective method for preventing sensitive data from being compromised through social engineering?
    1. Install a firewall between the internal network and the Internet.
    2. Install an antivirus software product on all user workstations.
    3. Implement a program of user education and corporate policies.
    4. Use IPSec to encrypt all network traffic.
  45. You have been given a Class B network IP address with which to configure the new network you are designing. Which of the following is the default subnet mask you should use for an IPv4 Class B network?
    1. 255.255.255.255
    2. 255.255.255.0
    3. 255.255.0.0
    4. 255.0.0.0
  46. Alice's company has just started working with sensitive government data. To enhance the security of the datacenter, she has implemented some additional security measures. All of the servers now have crimped metal tags holding the cases closed. All of the hardware racks are locked in clear-fronted cabinets. All of the cable runs are installed in transparent conduits. These are all examples of which of the following physical security measures?
    1. Geofencing
    2. Tamper detection
    3. Port security
    4. Asset tracking
  47. You have just installed a web server for your company, which is configured to host a public Internet site using the registered domain name adatum.com. The server's hostname in the Domain Name System (DNS) is www . The web server also has an administrative site, which you want to be able to access remotely. You have configured the administrative site to be encrypted and to use the port number 12354. Which of the following URLs must you use to access the administrative website from the Internet?
    1. https://www.adatum.com:12354
    2. http://www.adatum.com
    3. https://www.adatum.com:80
    4. http://www.adatum.com:12354
  48. To prevent outside users from accessing your wireless network, you configure the access point not to broadcast the network's Service Set Identifier (SSID). However, you later discover that outsiders are still accessing the network. For which of the following reasons is disabling SSID broadcasts a relatively weak method of device hardening?
    1. Every access point's SSID is printed on a label on the back of the device.
    2. Attackers have software that can easily guess a network's SSID
    3. Attackers can capture packets transmitted over the network and read the SSID from them.
    4. Attackers have ways of connecting to the network without the SSID.
  49. You are installing a web server farm in your corporate headquarters, which will be used to host websites for the corporation's subsidiaries, located all around the world. In which of the following cloud models does a single organization function as both the provider and the consumer of all cloud services?
    1. Private cloud
    2. Public cloud
    3. Ad hoc cloud
    4. Hybrid cloud
  50. Your supervisor has recently begun using the terms on-boarding and off-boarding. With which of the following types of policies are these terms typically associated?
    1. Incident response
    2. Identity management
    3. Inventory management
    4. Data loss prevention
  51. Virtual Private Networks (VPNs) use a data transmission technique called tunneling, which encapsulates a data packet within another packet for transmission over a network connection, typically using the Internet. The system also encrypts the entire encapsulated data packet for protection. Split tunneling is a variation of this method that provides which of the following advantages? (Choose all that apply.)
    1. Additional data integrity protection
    2. Access to local network devices while connected to the VPN
    3. Faster data transmission through multiplexing
    4. Conservation of VPN bandwidth
  52. Your supervisor wants you to disable all of the ports on the network's switches that are not in use. You tell her that this is not necessary, and she wants to know why you think so. Which of the following are valid reasons not to disable unused switch ports? (Choose all that apply.)
    1. The unused ports are not patched in to wall jacks.
    2. The datacenter is already secured from unauthorized access.
    3. The switch is configured to use a MAC-based ACL.
    4. Leaving some ports enabled facilitates the on-boarding of new users.
  53. Despite having imposed password policies on your network that compel users to change their passwords frequently, create passwords of a specific length, and use complex passwords, you have still had several reports of account penetrations. After investigating the incidents, you determine that the victims had all apparently shared a “tip” suggesting that users cycle through the names of their children, nephews, nieces, and other relatives when forced to create new passwords, changing letters to numbers as needed. Which of the following actions can you take to remedy the situation without creating a larger problem?
    1. Modify the password policies to force users to change passwords more frequently.
    2. Change the minimum password age policy to a larger value.
    3. Distribute a list of common passwords that are insecure, such as those based on names, birth dates, etc.
    4. Assign the users long passwords consisting of random-generated characters and change them often.
  54. Which of the following network devices can employ Access Control Lists (ACLs) to restrict access? (Choose all that apply.)
    1. Routers
    2. Servers
    3. Switches
    4. Hubs
    5. Wireless Access Points
  55. Which of the following terms is used to describe the threat mitigation technique of deploying individual applications and services on separate virtual servers so that no more than one is endangered at any one time, rather than deploying multiple applications on a single server?
    1. Network segmentation
    2. Geofencing
    3. VLAN hopping
    4. Role separation
  56. Which of the following statements about Dynamic Host Configuration Protocol (DHCP) snooping are true? (Choose all that apply.)
    1. DHCP snooping is implemented in network switches.
    2. DHCP snooping prevents DNS cache poisoning.
    3. DHCP snooping detects rogue DHCP servers.
    4. DHCP snooping drops DHCP messages arriving over the incorrect port.
  57. A user reports that she cannot connect to a server on her network. You want to identify the scope of the problem, so you try to reproduce the problem on the user's computer. The problem persists. No other users are reporting the same problem. What is the next logical step that you should perform to identify the affected area?
    1. Examine the server's configuration for the correct settings.
    2. Verify that the local router is forwarding traffic.
    3. Confirm that the switch the client is connected to is functioning.
    4. Perform the same task on another computer connected to the same segment.
  58. On a wireless network, which of the following best describes an example of a captive portal?
    1. A web page stating that the data on a user's computer has been locked and will only be unlocked after payment of a fee
    2. A series of two doors with an intervening airlock through which people must pass before they can enter a secured space
    3. A dedicated switch port used to connect to other switches
    4. A web page with which a user must interact before being granted access to a wireless network
  59. In the standard troubleshooting methodology, you begin by taking steps to identify the problem. After you have done this, which of the following steps should you perform next?
    1. Verify full system functionality
    2. Establish a theory of probable cause
    3. Establish a plan of action
    4. Implement the solution
  60. The secured version of the Hypertext Transfer Protocol (HTTPS) uses a different well-known port from the unsecured version (HTTP). Which of the following ports are used by HTTP and HTTPS by default? (Choose all that apply.)
    1. 25
    2. 80
    3. 110
    4. 443
  61. Which of the following are criteria typically used by load balancers to direct incoming traffic to one server out of a group of servers? (Choose all that apply.)
    1. Fastest response time
    2. Fastest processor
    3. Lightest load
    4. The next in an even rotation
  62. You are responsible for a network that has a Domain Name System (DNS) server, a proxy server, and an Internet router. A user is reporting that she cannot connect to hosts on her own Local Area Network (LAN) or other internal LANs, and she also cannot access hosts on the Internet. No one else has reported a problem. What is the likeliest location of the issue preventing the user's access to the network?
    1. The router
    2. The DNS server
    3. The proxy server
    4. The user's computer configuration
  63. Virtual Local Area Network (VLAN) hopping is a type of attack directed at network switches. Which of the following best describes how VLAN hopping is a potential threat?
    1. VLAN hopping enables an attacker to access different VLANs using 802.1q spoofing.
    2. VLAN hopping enables an attacker to scramble a switch's patch panel connections.
    3. VLAN hopping enables an attacker to change the native VLAN on a switch.
    4. VLAN hopping enables an attacker to rename the default VLAN on a switch.
  64. You are a first-tier support technician working the IT help desk at your company. In your first hour of duty, you receive four trouble calls. Your job is to prioritize the calls based on their severity. Which of the following should be the problem that receives the lowest priority?
    1. A fatal error that causes a single computer to fail
    2. A problem with a mission-critical backbone router that affects an entire network
    3. A problem with an application server that affects a single Local Area Network (LAN)
    4. A problem with an order entry or customer service call center resource that affects an entire department, with multiple LANs
  65. You are attempting to access a Domain Name System (DNS) server located on the other side of a router, but your attempt fails with an error stating that the destination port UDP 53 is unreachable. Your first step in troubleshooting the problem is to try using the nslookup utility to access that specific DNS server. This attempt also fails. Next, you use the ping utility with the DNS server's IP address. The ping test is successful, indicating that the server is up and running. Which of the following are possible causes of the problem? (Choose all that apply.)
    1. The TCP/IP host settings on your computer are improperly configured.
    2. The router connecting the networks is not running DNS and will not forward this type of datagram.
    3. There is a firewall blocking the DNS server's UDP port 53.
    4. The DNS process on the remote server is not running.
    5. The TCP/IP host settings on the DNS server are improperly configured.
  66. Which of the following types of switches performs a Cyclic Redundancy Check (CRC) on an entire frame's contents prior to forwarding it out a port leading to the destination system?
    1. Packet filtering
    2. Cut-through
    3. Source route
    4. Store-and-forward
  67. Which of the following attack types is not specifically targeted at wireless network clients?
    1. Logic bomb
    2. Deauthentication
    3. Evil twin
    4. War driving
  68. You are having trouble installing a Wireless Local Area Network (WLAN) using IEEE 802.11b/g equipment in a new office complex. The wireless devices have trouble connecting to the access point, and when they do, they achieve only low speeds. When you use a WiFi analyzer to scan the 2.4 GHz frequency band, you see literally dozens of other networks in the area, spread across all of the available channels. Choose the tasks from the following list that you should perform to enable your wireless devices to connect to the network reliably and at their best possible speeds. (Choose all that apply.)
    1. Configure the access point to suppress SSID broadcasts.
    2. Configure all of the wireless network devices to use the 5 GHz band.
    3. Upgrade all of the network devices to the latest firmware.
    4. Configure all of the network devices to use WPA2 encryption with AES.
    5. Upgrade the access point and all of the wireless client devices to IEEE 802.11n.
  69. Which Windows command-line utility produced the output shown here?
    Interface: 192.168.2.24 --- 0x2
      Internet Address      Physical Address      Type
      192.168.2.2           d4-ae-52-bf-c3-2d     dynamic   
      192.168.2.20          00-26-c7-7e-00-e0     dynamic   
      192.168.2.22          00-90-a9-a2-43-8f     dynamic   
      192.168.2.27          1c-c1-de-ca-1f-12     dynamic   
      192.168.2.28          30-f7-72-38-e9-1d     dynamic   
      192.168.2.255         ff-ff-ff-ff-ff-ff     static    
      224.0.0.22            01-00-5e-00-00-16     static    
      224.0.0.251           01-00-5e-00-00-fb     static    
      224.0.0.252           01-00-5e-00-00-fc     static    
      224.0.0.253           01-00-5e-00-00-fd     static    
      239.255.255.250       01-00-5e-7f-ff-fa     static    
      255.255.255.255       ff-ff-ff-ff-ff-ff     static    
    1. arp
    2. ping
    3. tracert
    4. netstat
  70. Your boss is working in the crawlspace under the floor of the datacenter, and he asks you to hand him the pliers. You hand him the tool shown in the following figure, and he throws it back at you. What is the real function of the tool shown in the figure?
    image

    Reprinted from CompTIA Network+ Study Guide: Exam N10-006, Third Edition by Todd Lammle (Wiley, 2015)

    1. When you connect the tool to pins in a punchdown block, you can access telephone circuits in order to test them or place telephone calls.
    2. When you attach the tool to one end of a wire, it generates a tone that can be detected at the other end.
    3. To attach a bulk cable end to an RJ45 connector, you use the tool to squeeze the connector closed, forcing the wire ends to contact the connector's pins.
    4. When you attach the tool to a copper cable, you can detect and measure the electrical current flowing through it.
  71. You are starting work for a contractor that performs telecommunications cable installations. One of the tools in the kit you have been given is in the following figure. What is the name of the tool shown?
    image

    Reprinted from CompTIA Network+ Study Guide: Exam N10-006, Third Edition by Todd Lammle (Wiley, 2015)

    1. Crimper
    2. Punchdown tool
    3. Butt set
    4. Tone generator and locator
  72. You are seeking to upgrade your company's IEEE 802.11b access point to one that provides faster transmission speeds for your newer workstations. Which of the following wireless networking standards are capable of supporting speeds faster than the 11 Mbps of 802.11b but that are still backward compatible with your existing IEEE 802.11b workstations? (Choose all that apply.)
    1. IEEE 802.11
    2. Bluetooth
    3. IEEE 802.11g
    4. IEEE 802.11a
    5. IEEE 802.11n
  73. You are working on your company's screened subnet (also known as a perimeter network), which has five Linux web servers, a Cisco router, a CSU/DSU providing a leased line connection, and a Windows-based firewall on it. While trying to troubleshoot a network communications failure, you type the following command on one of the systems: traceroute adatum.com. Which of the following systems might you be working on? (Choose all that apply.)
    1. The Cisco router
    2. One of the Linux web servers
    3. The CSU/DSU console
    4. The Windows-based firewall
  74. Which of the following are network topologies used by IEEE 802.11 Wireless Local Area Networks (WLANs)? (Choose all that apply.)
    1. Bus
    2. Mesh
    3. Ad hoc
    4. Star
    5. Infrastructure
  75. You have recently started a new job that enables you to telecommute from home, and you need a Wide Area Network (WAN) connection to the Internet. You will need to access the company network using a Virtual Private Network (VPN) connection to obtain client information, transfer files, and send email through the company servers. Your home is over 30 years old. The existing telephone wiring was not run through a conduit, and it seems to be deteriorating. You have cable television service, and your home is approximately 20,000 feet from the nearest telephone central office. You want to implement the fastest possible remote connection service, but cost is still a factor in the decision. Which WAN technology should you implement?
    1. A standard modem-to-modem connection
    2. A DSL (Digital Subscriber Line) connection
    3. A broadband cable television (CATV) connection
    4. A dedicated leased line (fractional T-1)
  76. You are working the help desk at a local computer store, and you receive a call from a customer trying to set up a home network using computers running Windows 10 and wired Ethernet equipment. The customer reports that she cannot access the other two computers in the house from her workstation, nor can she access the Internet. You ask her to run the ipconfig /all command and read the results to you. She says that her IP address is 192.168.0.2, her subnet mask is 255.255.255.0, and her default gateway is 192.168.0.1. Which of the following is the most likely cause of the customer's problem?
    1. The customer's network address cannot include a zero.
    2. The customer has an incorrect subnet mask.
    3. The customer's network cable is damaged or unplugged.
    4. The customer has an incorrect default gateway address.
  77. Some networks are designed with a switching fabric that contains redundant paths, for fault tolerance purposes. However, in this type of design, it is possible for packets to circulate endlessly around the network, which is called a switching loop. Which of the following protocols prevents network switching loops from occurring by shutting down redundant links until they are needed?
    1. NAT
    2. RIP
    3. VLAN
    4. STP
  78. You are responsible for an internetwork that consists of four internal Local Area Networks (LANs) with 50 users each. Each internal LAN uses twisted-pair Gigabit Ethernet links that connect the users to a switch. Each of the four switches is connected to a separate router. All four routers connect to the same backbone network, which has a single additional router to connect the company's network to the Internet, using a T-1 Wide Area Network (WAN) link. Today, users on one of the four internal LANs are reporting that when they came in this morning, they could not access the Internet or resources on the other three internal LANs. However, they could access resources on their own LAN with no problems. Which network component is the likeliest source of the problem in this scenario?
    1. The switch on the problem LAN
    2. The Internet router
    3. The router connecting the problem LAN to the backbone
    4. The cable on the backbone network
  79. You are negotiating an agreement with a provider for your company's email service. You have been told to require a 99.99 percent guaranteed rate of service reliability, but the provider is only willing to guarantee 99 percent. Eventually, you and the provider agree on a compromise of 99.9 percent. Which of the following documents will include the negotiated language on this particular point?
    1. AUP
    2. SLA
    3. BYOD
    4. NDA
  80. Which of the following types of networking devices can split a single network into multiple collision domains while maintaining a single broadcast domain? (Choose all that apply.)
    1. Switch
    2. Bridge
    3. Router
    4. Hub
  81. You have just finished installing a web server farm on your company's network, along with a router to create a screened subnet (perimeter network) on which the web servers are located. However, you now cannot access the web servers from your workstation on the internal network. Which of the following is not one of the tasks you will have to complete before you can access the screened subnet from the internal network?
    1. Change MAC addresses
    2. Change IP addresses
    3. Update the DNS records
    4. Change default gateway addresses
  82. You are testing a twisted-pair cable run using a tone generator and locator. When you apply the tone generator to a particular pin at one end of the cable, you detect a tone on two pins at the other end. Which of the following faults have you discovered?
    1. Split pair
    2. Open
    3. Short
    4. Crosstalk
  83. Your network has been experiencing intermittent service slowdowns and outages ever since the company moved into their new building. You have tried every troubleshooting modality you can think of, but you have not been able to determine the cause. One particular user, perhaps hoping to be the squeaky wheel that gets the grease, has taken to calling you every time he experiences a problem. One day, as you are working in the datacenter, you notice that the user calls every time you hear an additional humming noise. After examining the doors in the hallway, you realize that the racks containing the network switches are located right next to the elevator machinery room. Which of the following conditions is probably causing this intermittent network communication problem?
    1. Bottleneck
    2. EMI
    3. Latency
    4. Crosstalk
  84. Ralph is installing a pair of redundant servers and must choose whether to run them in an active-active or active-passive configuration. Running the servers in an active-active configuration provides which of the following advantages that the same servers in an active-passive configuration do not? (Choose all that apply.)
    1. Fault tolerance
    2. Load balancing
    3. Data encapsulation
    4. Increased performance
  85. You are starting work at a new company, and on your first day, you ask about wireless access for your laptop. You are given a Service Set Identifier (SSID) and a WiFi Protected Access II (WPA2) passphrase. Later, in the lunchroom, when you try to connect your laptop to the network, you cannot see the SSID you were given in the list of available networks, although you can see other networks. What should you do next to try to resolve the problem?
    1. Move closer to the Wireless Access Point (WAP).
    2. Move away from the microwave in the lunchroom.
    3. Type in the WPA2 passphrase.
    4. Type the SSID in manually.
  86. You are responsible for a Wireless Local Area Network (WLAN) that consists of an 802.11n 2x2 access point and laptop computers with a variety of network adapters. Some of the laptops support 802.11n, most support 802.11g, and a few older models have 802.11b adapters. The WLAN is located in a large office building with many other wireless networks, and you are having trouble finding a channel on the 2.4 GHz band that is not congested with traffic. Scanning the 5 GHz band, you find relatively little traffic, so you reconfigure the access point to use a 5 GHz channel. The result is that some of the laptops are able to connect to the network, whereas others are not. What is the most likely reason for the connection failures, and what must you do to enable all the laptops to connect to the wireless network?
    1. The 802.11b standard does not support communication using the 5 GHz band. You must replace the network adapters in those laptops with newer models for them to connect successfully.
    2. The 5 GHz band does not support automatic channel selection. You must configure each laptop to use the same channel as the access point for all the laptops to connect successfully.
    3. The 5 GHz band does not support Multiple Input, Multiple Output (MIMO) communications, so the 802.11n laptops are unable to connect to the network. You must replace the access point with an 802.11g unit for all the laptops to connect successfully.
    4. The 802.11g and 802.11b standards do not support communication using the 5 GHz band. You must configure the access point to support 2.4 GHz for all the laptops to connect successfully.
  87. In the Domain Name System (DNS), a zone is a contiguous area of the DNS namespace for which authority is delegated to one or more DNS servers. Which of the following DNS resource record types specifies the IP addresses of the authoritative DNS servers for a particular zone?
    1. PTR
    2. SRV
    3. MX
    4. NS
  88. You are experiencing poor performance on your home 802.11n wireless network. You live in a large apartment complex, and when you run a WiFi analyzer, you see many other nearby networks using the often-recommended channels 1, 6, and 11 on the 2.4 GHz frequency. Using the 5 GHz frequency is not an option for your equipment. What should you do to improve the network's performance?
    1. Configure your equipment to use channel 10.
    2. Configure your equipment to use channel 9.
    3. Configure your equipment to use channel 5.
    4. Configure your equipment to use channel 2.
  89. Your company's office building is having a fire inspection, and you are the only person on duty in the datacenter. The inspector from the fire department asks you where they can find documentation about all chemicals and equipment used in the company's datacenter. You lead the inspector to the director's office, but you are not sure what the documents he needs are called. Which of the following document types contains this information?
    1. MSDS
    2. NDA
    3. BYOD
    4. ESD
  90. Which of the following Power over Ethernet (PoE) specifications supplies power to devices using the spare wire pair on a 10Base-T or 100Base-TX twisted-pair network?
    1. 4PPoE
    2. Alternative A
    3. Alternative B
    4. All of the above
  91. The iSCSI storage area networking protocol uses clients called initiators and servers called targets. However, on many Storage Area Networks (SANs), there needs to be a way for the initiators to locate the targets. Which of the following technologies do iSCSI initiators use to locate iSCSI targets on the network?
    1. ICMP
    2. DNS
    3. iDNS
    4. iSNS
  92. You are deploying an 802.11n wireless network for a client that is asking for the best possible security you can provide without deploying additional servers. When setting up the Wireless Access Point (WAP), you disable Service Set Identifier (SSID) broadcasts, select WiFi Protected Access with Pre-Shared Keys (WPA-PSKs), and configure Media Access Control (MAC) address filtering. Which of the following statements about the security of this arrangement is true?
    1. You should not disable SSID broadcasts since this prevents users from connecting to the network.
    2. The configuration is as secure as you can make it with the specified equipment.
    3. You should use WiFi Protected Access II (WPA2) instead of WPA, since it is more resistant to certain types of attacks.
    4. You should not use MAC address filtering since it exposes MAC addresses to possible attacks.
  93. Which of the following connector types are used with fiber-optic cables? (Choose all that apply.)
    1. DB-9
    2. SC
    3. BNC
    4. ST
    5. MTRJ
    6. RJ11
  94. Which of the following are available as Internet of Things (IoT) devices?
    1. Refrigerators
    2. Doorbells
    3. Thermostats
    4. Speakers
    5. All of the above
  95. You are designing an Ethernet network for your company's newest branch office. Your current task is to decide which Ethernet specification to use for the network, a decision that you know will determine what type of cabling you need to purchase and the topology with which the cable will be installed. Which layers of the Open Systems Interconnection (OSI) reference model apply to the cabling and topology elements of a network?
    1. The application and transport layers
    2. The transport and network layers
    3. The network and data link layers
    4. The data link and physical layers
  96. You are troubleshooting a workstation that cannot access the network. The workstation is plugged into a wall plate that should provide it with access to a DHCP-equipped network using the 192.168.4.0/24 network address. No one else on that network is reporting a problem. You check that the patch cable is properly plugged into the workstation and the wall plate, which they are, and then run ipconfig /all on the workstation and examine the output. Which of the statements could be the explanation for the workstation's problem, based on the following ipconfig results?
    Windows IP Configuration
     
       Host Name . . . . . . . . . . . . : Client12
       Primary Dns Suffix  . . . . . . . : 
       Node Type . . . . . . . . . . . . : Hybrid
       IP Routing Enabled. . . . . . . . : No
       WINS Proxy Enabled. . . . . . . . : No
     
    Ethernet adapter Local Area Connection:
     
       Connection-specific DNS Suffix  . : 
       Description . . . . . . . . . . . : PCIe Family Controller
       Physical Address. . . . . . . . . : 60-EB-69-93-5E-E5
       DHCP Enabled. . . . . . . . . . . : Yes
       Autoconfiguration Enabled . . . . : Yes
       Link-local IPv6 Address . . . . . : fe80::c955:c944:acdd:3fcb%2
       IPv4 Address. . . . . . . . . . . : 169.254.203.42
       Subnet Mask . . . . . . . . . . . : 255.255.0.0
       Lease Obtained. . . . . . . . . . : Monday, October 23, 2017 6:23:47 PM
       Lease Expires . . . . . . . . . . : Saturday, November 18, 2017 9:49:24 PM
       Default Gateway . . . . . . . . . : 
       DHCPv6 IAID . . . . . . . . . . . : 241232745
       DHCPv6 Client DUID.    . . . . . . . : 00-01-00-01-18-10-22-0D-60-EB-69-93-5E-E5
       DNS Servers . . . . . . . . . . . : fec0:0:0:ffff::1%1
                                           fec0:0:0:ffff::2%1
                                           fec0:0:0:ffff::3%1
       NetBIOS over Tcpip. . . . . . . . : Enabled
    1. The DNS server addresses are incorrect.
    2. The Default Gateway address is missing.
    3. The Subnet Mask value is incorrect.
    4. The DHCP scope is exhausted.
  97. A user calls you at the IT help desk and reports that she is having intermittent problems accessing both local servers and internet websites. Which of the following potential problems can you rule out immediately?
    1. Malfunctioning Domain Name System (DNS) server
    2. Duplicate Media Access Control (MAC) addresses
    3. Duplicate IP addresses
    4. Malfunctioning router
  98. You have recently discovered a rogue Dynamic Host Configuration Protocol (DHCP) server on your network. After disabling the rogue server, you now need to terminate all of the rogue IP address leases currently held by DHCP clients on the network and then have them request new leases from the authorized DHCP server. Which of the following commands must you run on each client to do this? (Choose all that apply.)
    1. ipconfig /dump
    2. ipconfig /lease
    3. ipconfig /release
    4. ipconfig /renew
    5. ipconfig /discard
  99. Ralph is reading an article about datacenter design, and he is puzzled by references to east-west and north-south traffic. Which of the following statements best describes the difference between east-west and north-south traffic in a datacenter?
    1. East-west is switch-to-switch traffic, while north-south is switch-to-router traffic.
    2. East-west describes traffic between devices at the same layer of the Open Systems Interconnection (OSI) reference model, while north-south describes traffic between OSI model layers.
    3. East-west traffic stays within the datacenter, while north-south traffic does not.
    4. East-west is backbone traffic among switches and routers, while north-south is traffic to end systems, such as servers.
  100. Which of the following attack types involves the modification of a legitimate software product?
    1. War driving
    2. Logic bomb
    3. Evil twin
    4. Social engineering
..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
18.118.164.164