Answer questions appropriately GOODLUCK FROM IRISH WEB DESIGN
Several users from the same location are reporting problems accessing the intranet server. An administrator has verified that no other remote areas are having issues connecting to the same server. Which of the following steps should the administrator perform NEXT?
Determine what has changed
Test a solution.
Establish the most probable cause
Escalate the problem to the right section
Which of the following authenticates a web server to the remote client in PKI?
An administrator needs to diagnose problems with a WINS server. Which of the following tools should be used?
Which of the following connector types is used for coax cable?
In an enterprise setting, access switches providing network connectivity placed throughout a building are typically connected to a backbone called the:
Which of the following wireless standards has the highest maximum data rate?
Which of the following solutions will detect and disable a rogue access point?
A zone transfer occurs over which of the following ports?
A technician claims to have crimped a patch cable according to the T568A standard on one end and T568B on the other. Which of the following results is to be expected?
Since only half the leads are used, the cable will only work at 100Mbps.
The cable will only work at a maximum of 100Mbps. since 1Gbps only works on T568B cables.
There will be no proper data continuity; the standards utilize two different wiring diagrams.
The cable will only work at a maximum of 10Mbps. since 100/1000Mbps only works on T568B pure cables
An administrator is setting up a security camera that will send the same feed to twelve of the twenty workstations on the network. Which of the following addressing schemes was designed for this scenario?
Which of the following protocols should be used to monitor network performance?
A user receives an email slating that their account was compromised and there is a need to verify account credentials by submitting the correct information on a website. Which of the following security threats is occurring?
Denial of service
Which of the following protocols requests membership to a multicast group?
A standard installation for wireless will use which of the following antenna types?
Which of the following regulates the amount of network traffic a single node receives in a server cluster?
Quality of service
A technician would like to separate the HR department's workstations from the other workstations at the company. Which of the following network topologies should be used?
Peer to peer
A client wants to improve the wireless coverage on the third floor of their house. The wireless router is located in the basement and there is no easy way to run a cable to the third floor. Which of the following devices should be installed to extend the wireless coverage to cover the entire third floor without running cables?
An administrator has completed the installation of a new WLAN. Which of the following configuration management documents needs to be updated?
Logical network diagram
Which of the following describes what the number two represents in l00Base2 cabling?
B. Coaxial cable
A crossover cable is MOST commonly associated with which of the following layers of the OSI model?
Hardware locks, keypads on entry doors, badge readers, and biometric readers are all examples of which of the following security types?
Which of the following has a MAXIMUM distance of 300 meters (984 feet)?
Which of the following documents should always be kept up-to-date after any major changes are made to a network backbone?
Network security procedure
Which of the following is a disadvantage of using the EIGRP protocol?
It does not scale well.
It converges slower than OSPF.
It is a proprietary protocol.
It is a distance vector protocol.
Which of the following routing protocols runs over UDP and determines path based upon distance vectors?
Which of the following is equipment provided by the telephone company that provides remote diagnostic and loopback services for subscriber lines?
An administrator is troubleshooting a communication issue between two computers on the same Layer 2 switch. Which of the following is the BEST way to determine if the switch is causing the issue?
Setup an ACL that allows and logs all IP traffic between the two computers
Configure a spanning tree to check for a loop
Setup a span port on the switch to watch for CRC errors
Connect both computers using a crossover cable
Which of the following devices is used to connect multiple devices to a network and does not stop broadcast traffic?
Which of the following protocols allow the set up, teardown and streaming of VoIP traffic? (Select TWO)
Which of the following is a secure method of copying information over a public network?
An administrator receives reports from users in an office that their 802.11g wireless connectivity has been problematic since the installation of the new wireless phone system. At which of the following frequencies are both systems operating at to cause this issue?
An administrator suspects that an incorrect POTS line is carrying the DSL signal. Which of the following will help diagnose this issue?
An administrator wants to test the network MTU. Which of the following commands allows different size packets to be sent?
Which of the following is used to serve as an emergency backup line to troubleshoot a broadband connection on many routers?
Which of the following protocols uses UDP to transfer files?
Which of the following would be used to connect two IDFs in the same building with the LAN, while minimizing crosstalk?
Which of the following network devices would MOST likely be installed to allow the company's single public IP to be shared and translated into local IPs for network devices?
Which of the following network topologies BEST describes a VPN? (Select TWO)
Point to Point
Point to Multipoint
Which of the following cable speeds would provide the GREATEST theoretical bandwidth?
Which of the following is true about an IP address if the first bit is a zero?
The address is a Class A address.
The address is a Class B address.
The address is a Class C address.
The address is a Class D address.
Which of the following tools are BEST used to cut away the outside covering of a CAT5e cable?
Punch down tool
Which of the following is typically used In an LAN environment?
After testing a new 100BaseTX cable, the technician determines that only pairs 4, 5, 7, and 8 are straightthru wires. Which of the following MOST likely describes this cable type?
Crossover cable with open pairs
Straight-thru cable with open pairs
A server keeps rebooting at various times throughout the day. Which of the following tools would BEST help to diagnose this issue?
Which of the following devices would allow a technician using a packet sniffer to view all the data on a network?
An administrator finds a phone line but does not know where the line goes or if it is active. Which of the following can be used to test if it is active?
Punch down tool
Which of the following allows a technician to mask a private network of IP addresses behind one public IP address?
An administrator is deploying three B/G wireless access points in a new office location. Which of the following channels eliminates interference?
1, 6, and11
3, 6, and 9
36, 40, and 44
An administrator receives a contract for a server install at a new building. Which of the following should be completed after installing the server?
Log the administrator password used
Test the air temperature
Update the network diagram
Review the evacuation procedures
Which of the following is a reason to block FTP at the corporate firewall?
It does not transfer encrypted files.
It cannot be tunneled in a VPN.
It is a deprecated protocol.
It transmits passwords in clear text.
A network IPS provides which of the following?
The layer 3 protocol on which other protocols like TCP and UDP communicate.
Enables the IPSec protocol on internal workstations.
Packet-based detection and prevention of network attacks.
Single mode IP communication for a fiber line between remote sites
An administrator is configuring IP 10.178.1.5 on a legacy device that will only accept a classful address. Which of the following is the address that can be used in this scenario?
Which of the following should be configured to provide priority to voice traffic?
Which of the following protocols is the LEAST secure and should be avoided on a wireless network?
Which of the following is an invalid subnet mask?
Which of the following tools would a technician use to check functionality of a physical network connection?
Voltage event recorder
Which of the following methods can move files in clear text and can be easily intercepted?
technician needs to troubleshoot connectivity between two devices located on the same network. Which
of the following BEST describes the type of protocol being used?
Which of the following ports are used by default for web servers? (Select TWO).
An administrator is trying to isolate the location of a persistent connectivity problem caused by a faulty NIC. Which of the following diagrams would assist the technician in finding the machine that is causing the problem?
Physical and logical network
DHCP tables and DNS records
Which of the following connectivity issues is likely to occur within a token ring network?
An administrator is having a hard time adding a new switch to the network. After verifying that all the ports are configured correctly on each switch, which of the following should the administrator verily NEXT?
Straight-through cable is used to connect both switches
Loopback plug is connected
Crossover cable is used to connect both switches
Cable is a rollover cable
Which of the following devices would MOST likely integrate a DHCP server?
The helpdesk is receiving calls about the corporate web server being down. Which of the following should be taken NEXT after verifying that the server is unreachable?
Escalate the call to a technician
Document any changes in the web server configuration.
Implement and test a solution.
Continuously ping the server until a ping response is obtained
Which of the following tools would an administrator BEST use to trace a network cable?
An administrator wants to prevent users from plugging in their personal laptops and accessing the Internet without a member of the IT staff configuring the machine first. Which of the following would MOST likely be installed?
Which of the following technologies allows an administrator to submit traffic to an IDS for review?
Which of the following is true of an ACL when a packet matching an ACE is found?
The matching ACE is skipped to allow all other ACEs to be examined.
The matching ACE is processed and then the last ACE is examined.
The matching ACE is processed and then the next ACE is examined.
The matching ACE is processed and the next packet is examined.
Which of the following technologies is used on the backbone of an ISDN?
A user connecting a laptop to a wall jack is prompted for user credentials before being granted access to the network. Which of the following is MOST likely implemented on the switch?
A network administrator needs to add an additional connection to a room. The administrator adds a new Ethernet switch and must connect it to an existing switch. Which cable type should be used to connect the two switches?
Which of the following is the purpose of QoS?
Load balance traffic across multiple LAN and WAN links.
Increase speed of network traffic.
Classify, mark, and prioritize traffic on WAN and LAN links
Guarantee traffic delivery.
Which of the following LAN technology has a MAXIMUM range of 10,000 meters (6 miles)?
Prioritizing traffic between data and voice is defined as which of the following?
A demarcation point is usually installed and managed by which of the following providers?