When a patch cable is plugged into a switch, all port activity indicators turn on and users instantly lose network connectivity. Which of the following is the MOST likely diagnosis?
Which of the following ports would have to be allowed through a firewall for POP3 traffic to pass on its default port?
Which of the following is used to create a secure connection between a client and a host?
Which of the following methods limits access to a network based on characteristics of the network card?
A technician is terminating a new run of network cables to a 110 block. Which of the following tools would the technician use?
Zach, a technician, discovers a switch is not communicating with the other switches in a stack. Which of the following is the MOST likely cause?
A user reports that some normally accessible external sites are not responding, but most other sites are responding normally. Which of the following is MOST likely the cause?
In a newly installed LAN, the network administrator receives many calls about intermittent or slow connectivity to the authentication server. Which of the following could cause this problem? (Select TWO).
A network is having problems with traffic flowing to several critical websites that are used for necessary company work. Which of the following appliances would BEST handle network traffic to increase network performance?
A technician has been tasked to set-up a managed switch. Which of the following will the technician need to accomplish this task?
A network administrator is troubleshooting an intermittent network issue between devices that have a particularly long cable run. The issue was escalated to a network designer who alluded to potential attenuation issues. Which of the following BEST describes what the network designer was referring to?
A technician enters a username and password once and can access multiple databases without being prompted to reenter their password. This is an example of which of the following?
When installing new WAPs in a small office, which of the following is the BEST way to physically mitigate the threats from war driving?
The Network Interface Layer of the TCP/IP model corresponds to which of the following layers of the OSI model? (Select TWO).
Which of the following TCP/IP model layers does the OSI model Presentation layer map to?
Multiple computers are connected to a hub near a wall plate. In order to get to the computers, students step on and around the cable that connects the teacher’s station, a few feet away, to the same hub. The teacher is experiencing no network connectivity. Which of the following is MOST likely the problem?
A technician wants to separate networks on a switch. Which of the following should be configured to allow this?
An administrator would like to inspect all traffic flowing over the SMTP protocol on a given network. Which of the following tools would accomplish this? (Select TWO).
Which of the following protocols works at the LOWEST layer of the OSI model?
The company requires all users to authenticate to the network with a smart card, a pin number, and a fingerprint scan. Which of the following BEST describes the user authentication being used?
Karen, an administrator, would like to inspect all traffic flowing over the SMTP protocol on a given network. Which of the following tools would accomplish this? (Select TWO).
Which of the following would be used in a firewall to block incoming TCP packets that are not from established connections?
A network administrator is tasked with blocking unwanted spam which is being relayed by an internal email server. Which of the following is the FIRST step in preventing spam that is originating from bots on the network?
Lisa, a network administrator, needs to allow all websites to be accessible by the sales team for business purposes. Which of the following ports need to be enabled on the firewall? (Select TWO).
A network administrator is looking to implement a solution allowing users to utilize a common password to access most network resources for an organization. Which of the following would BEST provide this functionality?
Network upgrades have been completed and the WINS server was shutdown. It was decided that NetBIOS network traffic will no longer be permitted. Which of the following will accomplish this objective?
A technician is troubleshooting a computer that will not connect to the Internet. The PC is connected to the network. Which of the following tools should the technician use FIRST to understand the NIC configuration?
Lisa, an administrator, is experiencing availability issues on a Linux server. She decides to check the server for an IP address conflict on the server. Which of the following commands should Lisa use?
An application server is placed on the network and the intended application is not working correctly. Which of the following could be used to make sure sessions are being opened properly?
Joe, a network technician, is implementing a wireless network and needs to support legacy devices. He has selected to use WPA mixed mode. WPA mixed mode is normally implemented with which of the following encryption factors? (Select TWO).
A technician needs to enter a username and password and have their fingerprint scanned to access a server. Which of following types of authentication is this an example of?
A network technician has recently discovered rogue devices on their network and wishes to implement a security feature that will prevent this from occurring. Which of the following will prevent unauthorized devices from connecting to a network switch?
A user at a hotel sees two SSIDs; both are called "HotelWireless". After the PC connects to one of the APs, the user notices their browser homepage has been changed. Which of the following BEST describes this AP?
A proxy server would MOST likely be installed to provide which of the following functions? (Select TWO).
A user is unable to connect to a remote computer using RDP. The technician checks the firewall rules and notes that there is no rule that blocks RDP. Which of the following features of the firewall is responsible for blocking RDP?
A bridge handles frames at which of the following layers of the OSI model?
Users are reporting a large decrease in network performance. After further investigation, the network administrator notices large amounts of traffic coming from a specific IP address. The network administrator needs to identify the payload of the network traffic. Which of the following could be used to collect that information?
It has been suspected that one of the users is using the network inappropriately. As a preventive measure HR has authorized the IT department to enable port mirroring on the user’s network port. Which of the following devices would be used to monitor the network activity?
Which of the following tools would Kurt, an administrator, use to identify opens and shorts?
An organization wants to perform maintenance on any of its web servers without affecting the service availability during a scheduled change window. Which of the following network devices would be required to provide this functionality?
A network administrator is tasked with deploying a company-wide wireless system which allows for accurate tracking of employees’ wireless device locations via WAP triangulation. Which of the following is the MOST important aspect of the deployment?
Karen, an administrator, wants to verify which protocols are in use on the network. Which of the following tools should she use?
A security appliance is blocking a DDoS attack on the network. Which of the following logs would be used to troubleshoot the traffic patterns trying to go across the network?
Which of the following devices should Jeff, an administrator, connect to a protocol analyzer in order to collect all of the traffic on a LAN segment?
A company wants to ensure that a wireless signal from their WAP only sends down one specific corridor. Which of the following can be done to achieve this?
Assigning IP addresses from a pool of predetermined available addresses is the role of which of the following network appliances?
Which of the following services are affected by closing the default ports of 80 and 21 via ACL on a company router?
Which of the following monitoring devices are used only to recognize suspicious traffic from specific software?
A client has just leased a new office space in a busy commercial building and would like to install a wireless network. Several other tenants are on the same floor. Multiple wireless networks are present in the building. Which of the following can be changed on the client’s wireless network to help ensure that interference from other wireless networks is at a minimum?
When a loop occurs, which of the following STP components determines which port to disable?
A technician has traced a POTS line to a 110 block. Which of the following devices would the technician MOST likely use to see if the line carries a dial tone?
Which of the following is used to restrict access according to user policies?
A technician suspects invalid information in the local DNS cache of a workstation. Which of the following commands can be used to clear this?
Kim, a technician, is connecting a new desktop computer to a switch. She was only able to locate one cable in the office for the installation. The wires at each end are color coded as follows:
End A: orange-white, orange, green-white, blue, blue-white, green, brown-white, brown
End B: green-white, green, orange-white, blue, blue-white, orange, brown-white, brown
Which of the following should Kim do to complete the installation?
The network technician needs to install fiber cabling to connect two buildings less than 984 feet (300 meters) apart. Which of the following fiber types should be installed?
Ann, a technician, is installing network cables for an office building. Some of the cables are not showing active on the switch even when moved to different ports. Which of the following is MOST likely the cause?
Which of the following technologies is used to connect public networks using POTS lines?
Which of the following 802.11 standards transmits the signals the GREATEST distance?
After running a CAT6 cable from the maintenance office 80 floors above the network closet, users are reporting lack of connectivity. Which of the following is the MOST likely cause?
Which of the following WAN technologies has a MAXIMUM speed of 155.52Mbps?
At which of the following locations does the responsibility of a Telco provider cease?
Which of the following cable types is employed to protect against interference in the physical environment or when security is a concern?
Which of the following cable types is required to run through an air duct?
Which of the following defines the pinout of an 8P8C eight pin modular jack for a CAT6a cable?
Which of the following improves wireless performance by allowing only one wireless transmission on the network at a time?
Which of the following defines a rack located in an office building between the main rack and other office equipment?
Which of the following layers of the OSI model make up the Network Interface layer of the TCP/IP model? (Select TWO).
Which of the following networking devices can exist at several layers of the OSI model at the same time? (Select TWO).
Which of the following network optimization methods would be BEST to implement to increase bandwidth for an internal streaming video server?
Which of the following are valid hosts for the Private IP Address range 172.16.0.x /23? (Select TWO).
Which of the following would Kim, a technician, use in voice over IP communications?
Which of the following describes the amount of time it takes for a packet to transmit from one switch to another?
Which of the following DNS records would allow for a website to have more than one FQDN?
Which of the following TCP/IP model layers combines four OSI model layers?
Which of the following services do TCP connections provide to application layer protocols? (Select TWO).
Joe has a small office and is looking to replace his phone system with a lower cost solution that requires minimal in-house support. Which of the following is the BEST choice?
Which of the following services would have assigned the IP address 169.254.1.89?
Which of the following exterior routing protocols uses an algorithm to determine the quickest route to a destination?
Which of the following solutions will detect and disable a rogue access point?
A company wishes to have a wireless signal broadcast only through a specific stretch of a highway tunnel. Which of the following measures will accomplish this?
A SOHO had their wireless network breached on several occasions. The user turned off the SSID and enabled WEP encryption, but breaches are still occurring. Which of the following will improve security and MOST likely prevent future breaches?
Which of the following tools will scan a network for hosts and provide information on the installed operating system?
A user’s network connection is slow. After testing the cabling, the cable tester shows that only pins 1, 2, 3 and 6 are being used. After accurately terminating both ends, the tester displays the same results. Which of the following is the MOST likely cause?
Which of the following can MOST likely cause intermittent connection problems with a CAT5 network cable?
Kim, an administrator, is attempting to connect a laptop to a server via RJ-45 ports on both a device and a CAT5 patch cable. All of the IP settings have been verified to be correct, yet there is a connectivity problem. Which of the following would MOST likely fix the IP connectivity problem?
An administrator would like to get more speed out of a wireless network. The administrator decides to configure the AP with a frequency width of 40MHz. Which of the following features is the administrator MOST likely using?
Which of the following would the telecommunications carrier use to segregate customer traffic over long fiber links?
Which of the following network topologies describes a network where each node is connected to multiple devices?
A technician has been dispatched to investigate connectivity problems of a recently renovated office. The technician has found that the cubicles were wired so that the network cables were run inside the conduit with the electrical cabling. Which of the following would MOST likely resolve the connectivity issue?
Users have reported issues accessing an Internet website. The network technician wants to verify network layer connectivity. Which of the following tools can provide the verification?
Which of the following commands can Lisa, a technician, use on a server to display the default router setting?
A new business’ web server has seen a huge spike of legitimate traffic in the last week. The owners want to ensure the site has no problems as the business continues to grow. For Kim, a network administrator, which of the following is the MOST important concern for this company?
An organization recently installed a firewall on the network. Employees must have access to their work computer from their home computer. In which of the following ways should the firewall be configured?
Which of the following protocols is used by Windows to securely access a remote computer?
Which of the following can be configured to restrict specific ports and IP addresses from accessing the internal network? (Select TWO).
An organization recently installed a firewall on the network. Employees must be able to send and receive email from a POP3 server. In which of the following ways should the firewall be configured? (Select TWO).
An administrator notices SMTP traffic is being blocked by the company firewall. Which of the following ports should be opened?
A user reports they are unable to access a file on a mapped network drive. A technician discovers the server where the file is located did not come back online after last night’s power outage and manually powers the server back online. The technician then verifies the user can connect to their file. Which of the following troubleshooting steps should the technician do NEXT?
Which of the following protocols are used to view and send mail from a local host off of a remote server? (Select TWO).
Which of the following is the MAXIMUM hop count for RIP before the network is considered converged?
Which of the following DNS records would be queried to locate a company’s mail server?
A user reports intermittent network connectivity from their desktop PC. A technician determines the cause to be a bad wall jack and fixes the jack. Which of the following should the technician do NEXT?
Which of the following performance optimization techniques would be MOST beneficial for a network-wide VoIP setup? (Select TWO).
An application is using port 2000 on a PC. Which of the following could an administrator do to determine what software is listening on that port?
Karen, an administrator, has created a patch cable. Which of the following tools should she use to check the integrity of the cable?
Kim, a technician, needs to test if domain name resolution is functioning properly. Which of the following software tools would she use to accomplish this? (Select TWO).
An administrator is trying to retrieve management information from the network devices on their LAN. Which of the following monitoring resources provides the ability to collect this information encrypted over the network?
Sandy, a user, is unable to map a drive to a known NetBIOS share. A ping from the client to the server is successful. Which of the following software tools is used to check if NetBIOS is enabled?
Which of the following can assist when troubleshooting a cable that meets the 1000BaseLX specification?
Users report that an internal file server is inaccessible. Of the following commands, which would be the MOST useful in determining network-layer connectivity?