Which of the following would be used on a network to ensure access to resources if a critical host becomes unavailable?
Which of the following methods would be implemented to correct a network slowdown caused by excessive video streaming?
Which of the following should be used when throughput to the destination network is a priority?
Which of the following network protocols is used to resolve FQDNs to IP addresses?
Which of the following layers of the OSI model make up the Network Interface layer of the TCP/IP model? (Select TWO).
A user does not have network connectivity. While testing the cable the technician receives the below reading on the cable tester:
1-----------1
2-----------2
3-----------3
4-----------4
5-----------5
6-----------6
7-----------7
8-----------8
Which of the following should the technician do NEXT?
Which of the following cable types is employed to protect against interference in the physical environment or when security is a concern?
A technician is tasked with rewiring a CAT5e SOHO network with 10 existing computers. The users are currently running at 100 Mbps and would like to be upgraded to 1000 Mbps. Which of the following should the technician do FIRST?
A technician is troubleshooting a desktop computer that will not power on. After replacing the power supply, the technician tries to start the desktop, but it still fails to power on. Which of the following troubleshooting steps should the technician do NEXT?
An administrator has created several virtual machines on the same host server and requires them to each be on separate VLANs. Which of the following should the administrator configure to meet this goal?
Which of the following is the BEST way to prevent new users from connecting to a wireless access point, but still allow already connected users to continue to connect?
Which of the following tools would a technician use to terminate CAT6 wires to the inside of the wall jack?
Which of the following would a technician do to monitor remote traffic through an access point?
Which of the following network topologies is MOST commonly used by online file sharing websites?
A network administrator is implementing an IPS on VLAN 1 and wants the IPS to learn what to prevent on its own. Which of the following would MOST likely be installed?
The company is setting up a new website that will be requiring a lot of interaction with external users. The website needs to be accessible both externally and internally but without allowing access to internal resources. Which of the following would MOST likely be configured on the firewall?
A user reports sporadic network outages. The user tells the administrator it happens after approximately 20 minutes of work on an application. The administrator should begin troubleshooting by checking which of the following?
An administrator would like to provide outside access to the company web server and separate the traffic from the local network. Which of the following would the administrator use to accomplish this?
A company wants to have a security zone to isolate traffic within the firewall. Which of the following could be used?
A network administrator is implementing a wireless honeypot to detect wireless breach attempts. The honeypot must implement weak encryption to lure malicious users into easily breaking into the network. Which of the following should the network administrator implement on the WAP?
A network administrator is responding to a statement of direction made by senior management to implement network protection that will inspect packets as they enter the network. Which of the following technologies would be used?
The network administrator has been tasked to create a network segment where resources can be placed for public web access.
Which of the following should be implemented?
Which of the following a network technician would use to reverse engineer malware and virus?
Which of the following devices allows for multiple web servers to host the same web page and for traffic to be distributed between them according to some metric?
A user is having trouble with their fax machine disconnecting during transmissions. The technician believes that a DSL signal may be on the same line as the fax. Which of the following tools would MOST likely help prove this hypothesis?
Which of the following is used to ensure traffic flows efficiently on multiple T-1 circuits?
When a packet that is entering a switch port is encapsulated, which of the following is the switch performing?
A small office is looking to deploy wireless to cover one half of the work area only. The technician is restricted to suspending the WAP in the middle of the office due to network jack limitations. Which of the following antenna types would BEST meet these requirements?
Which of the following configurations of a wireless network would be considered MOST secure?
Which of the following is being described when symbols are displayed on the side of the building and/or walking path, to identify open hot-spots?
A network administrator is considering implementation of network access restrictions based upon layer two addressing information. Which of the following describes this method of network restrictions?
Which of the following should be installed to prevent inappropriate websites from being viewed?
A technician suspects invalid information in the local DNS cache of a workstation. Which of the following commands can be used to clear this?
The company’s main server is using 98% of its available resources and Joe needs to evenly distribute the work to another server using which of the following?
A network technician is trying to run a protocol analyzer and is instructed to record the chimney offload state of TCP. Which of the following utilities did the technician use to check this parameter with the output listed below?
Querying active state...
TCP Global Parameters
----------------------------------------------
Receive-Side Scaling State : enabled
Chimney Offload State : disabled
Receive Window Auto-Tuning Level : normal
Add-On Congestion Control Provider : ctcp
ECN Capability : disabled
RFC 1323 Timestamps : disabled
An IP camera has a failed PoE NIC. This is the third time in months that a PoE NIC has failed on this device. The technician suspects a possible power issue. Which of the following should be used to test the theory?
A technician discovers that the throughput of sales traffic on the primary connection is constantly reaching maximum level, and the sales users are beginning to report slowness while accessing cloud based applications. The technician allows traffic to use the secondary connection so that traffic would share both connections. This is an example of which of the following?
A company has asked the network administrator to restrict access to any websites with unauthorized material. Which of the following technologies would BEST accomplish this?
A stateful point to point wireless connection going down for a few hours at a time is MOST likely due to which of the following?
Which of the following must a technician enable on a switch in order to be able to view all of the packets traversing a switch using a packet sniffer?
A technician is configuring a new DSL router. The technician can communicate with the LAN, but not the WAN. Which of the following is the MOST likely cause?
A technician is installing a switch that will be used for VoIP and data traffic. The phones do not support the 802.3af standard. Which of the following should the technician configure on the switch?
Which of the following would allow for a specific device to receive the same IP address from a DHCP server?
A user reports that they keep getting disconnected on the wireless network. After further investigation, the technician confirms that this occurs only in that user’s office. Which of the following would MOST likely cause them to lose their connection?
A user informs the network administrator of increasingly common wireless connection problems. The administrator determines the user has recently received a new cordless phone. The phone is MOST likely causing which of the following conditions?
A technician needs to install network device in a SOHO network. The office requires 9 wired workstations to share and print data. Which of the following can the technician use?
If a technician does not assign an IP address to a device, the DHCP server will assign the device a:
A network administrator has just been notified about the loss of Internet connectivity. Another technician had just performed non-scheduled maintenance and mentioned that some cabling may have been moved. Which of the following MOST likely caused the loss of Internet connectivity?
Which of the following do DHCP servers provide to requesting devices on the network? (Select TWO).
A company wants to ensure that a wireless signal from their WAP only sends down one specific corridor. Which of the following can be done to achieve this?
A technician has received a trouble ticket from a user who has intermittent wireless access. Moving the computer farther from the WAP results in a more stable connection. Which of the following is MOST likely the cause of this instability?
A network administrator must ensure that both the server and the client are authenticated to the wireless system before access is granted. Which of the following should be implemented to meet this requirement?
A customer has requested a solution using multiple WAPs for wireless access. Which of the following should be different on each WAP to prevent wireless problems?
When a patch cable is plugged into a switch, all port activity indicators turn on and users instantly lose network connectivity. Which of the following is the MOST likely diagnosis?
A network administrator is adding 24 - 802.3af class 2 VoIP phones and needs to purchase a single PoE switch to power the phones. Which of the following is the MINIMUM PoE dedicated wattage the switch supports to power all of the phones at full power?
When a loop occurs, which of the following STP components determines which port to disable?
Which of the following is the BEST network configuration to use if the technician wants to send all outgoing traffic to the external router?
Which of the following network protocols would be used to transmit traps across a network to a log server?
Based on the packet capture below, which of the following services is the client requesting?
08:30:54.982378192.168.50.42.8329 > 192.168.50.20.53:
S 32859235:32859235(0) win 8096
08:30:55.001378192.168.50.20.53 > 192.168.50.42.8329:
S 31845637: 31845637(0) ack 32859236 win 8096
08:30:55.027578192.168.50.42.8329 > 192.168.50.51.53:
ack 1 win 8096
Given a subnet mask of 255.255.255.0, how many usable IP addresses would be in that subnet?
A number of remote users have reported being unable to securely log on to the company’s network. Upon speaking with some of the employees experiencing the issue, no changes were made to their configurations, usernames, or passwords. The technician establishes a theory that one of the VPN concentrators may be down. Which of the following should the technician do NEXT?
A network where all traffic feeds through a centralized gateway uses which of the following topologies?
Which of the following protocols are used to provide accurate time to network devices?
Which of the following can be configured on a managed network switch to send real time alerts to a technician?
Which of the following is the unit used to transfer information at Layer 2 of the OSI model?
Enterprise IP routing policy is MOST clearly depicted in which of the following configuration management documents?
A user reports they are unable to access a file on a mapped network drive. A technician discovers the server where the file is located did not come back online after last night’s power outage and manually powers the server back online. The technician then verifies the user can connect to their file. Which of the following troubleshooting steps should the technician do NEXT?
Which of the following would be used to run an instance of a Layer 2 device within an application?
Which of the following protocols is used to send time synchronization updates on a given network?
A network technician is troubleshooting signal problems with certain WAPs in an office and finds consistently high ping times across the units. Such an issue is called which of the following?
Which of the following DHCP properties defines the size of the pool of available IP addresses?
Ann, a new user, has a workstation that has connectivity to the printer located in her department, but cannot access the Internet. The result of an ipconfig command on Ann’s workstation is as follows:
IP address: 192.168.0.124
Subnet Mask: 255.255.255.128
Default Gateway: 192.168.0.254
Which is MOST likely preventing the user from accessing the Internet?
Which of the following can be used to decrypt SSL packets which encapsulate internal network addresses in the payload?
A NAS appliance has had a failed NIC replaced. Now the NAS appliance is no longer visible on the network. Which of the following is the MOST likely cause of the problem?
A technician sees suspicious traffic coming from a computer connected to a WAP. Which of the following can be used to stop this traffic while troubleshooting the problem?
Various desktop computers are not getting a link light even though the patch cables were replaced. Cables on a 110-block patch panel are suspected to be causing the issues. Which of the following hardware tools would MOST likely be used to troubleshoot and resolve the issue? (Select TWO).
Which of the following would MOST likely be used by a network administrator to test DNS resolution?
A company has gone through several upgrades on their network but unfortunately have no way of identifying who approved the upgrades. Which of the following should be implemented to track this type of work?
A company wants an administrator to perform a vulnerability test. The administrator finds the company has a POTS phone system. Which of the following can the administrator use to point out the phone system vulnerability?
Which of the following wireless security measures, although widely implemented, does not provide strong security?
Which of the following would a network administrator use to scan a network for vulnerabilities?
Which of the following security protocols would BEST protect a connection to a remote email server and ensure full integrity of all transmitted email communication?
The security measure used to reduce vulnerabilities for MOST network devices that require regular application and monitoring is:
Which of the following would allow a network administrator to implement a user authentication method that uses X.509 certificates?
Which of the following assists a network administrator in reverse engineering malware and viruses?
A malicious user connects to an open wireless network and is able to copy, reassemble and play back live VoIP data streams from wireless VoIP users. Which of the following attacks has the user performed?
A network administrator is looking to implement a solution allowing users to utilize a common password to access most network resources for an organization. Which of the following would BEST provide this functionality?
A technician is troubleshooting a network issue and needs to view network traffic on a switch in real-time. Which of the following would allow the technician to view network traffic on a switch?
A network administrator decides to secure their small network by allowing only specific MAC addresses to gain access to the network from specific switches. Which of the following is described by this example?
A user enters a password into a logon box on a PC. The server and the PC then compare one-way hashes to validate the password. Which of the following methods uses this process?
Which of the following is the default authentication method for a Windows client using PPP over a dialup connection?
Which of the following connector types is MOST commonly used for serial connections?
Which of the following 802.3 classifications has a MAXIMUM segment distance of 984 feet (300 meters)?
A large corporate office is looking to place smaller network closets around campus to handle switching for remote workstations. To which of the following is this referring?
Which of the following is a square shaped fiber connector that is slightly smaller than a standard copper network cable connector?
A technician has been called about intermittent connectivity near IDF 2. Multiple cables were recently pulled through a common conduit. Which of the following is MOST likely the cause of the problem?
Which of the following connector types are used in terminating singlemode fiber cables? (Select TWO).
Which of the following spreads out each of the individual wires of a UTP cable onto their own metal connector?
A technician testing an Ethernet card uses a cable wired with pins 1,2 to pins 3,6 on the same RJ-45 plug. Which of the following describes what the technician is using?
A Chief Executive Officer (CEO) decided that only a limited number of authorized company workstations will be able to connect to the Internet. Which of the following would BEST accomplish this goal?
In contrast to earlier Wi-Fi speeds, which of the following BEST describes the antenna and channelization properties used in 802.11n?
The ISP needs to terminate the WAN connection. The connection should be located in the network server room where the company LAN equipment resides. Which of the following identifies the location?
Which of the following network topologies describes a network where each node is connected to every other node?
Which of the following is a fiber connector that is slightly smaller than a standard copper network cable connector?