1.
Given the following
output, which utility was used?
Interface 10.10.10.1 on
Interface 0x1000004
Internet Address Physical
Address Type
10.10.10.5 00-e0-29-62-0d-de
dynamic
10.10.10.11 00-00-08-fd-97-fa
static
A. arp
B. traceroute
C. ping
D. ipconfig
Answer: A
2.
A properly configured
computer on the network receives the response ping request could not find host
when pinging a web site. The computer can ping its gateway. Which of the
following explains this situation?
A. The DNS server is down.
B. The DHCP is down.
C. The LAN is down.
D. The router is down.
Answer: A
3.
Six workstations that
are numbered 1-6 are installed sequentially in a physical ring topology. Workstation
1 fails. How can the network administrator remove Workstation 1 for service without
moving the other workstations?
A. Connect Workstation 6 and
Workstation 2 using a barrel connector.
B. Add a 75 ohm terminator to
Workstation 6 and Workstation 2.
C. Connect Workstation 6 and 2
using an RJ-45 (Registered Jack) coupler.
D. Add a 50 ohm terminator to
Workstation 6 and Workstation 2.
Answer: A
4.
You work as a network
administrator at ABC Computer. You have noticed suspicious IP traffic on the
local subnet. After successfully pinging the source, which utility does the
administrator use to find the associated MAC address?
A. ipconfig
B. nbstat
C. arp
D. tracert
Answer: C
5.
You work as a network
administrator at ABC Computer. You are troubleshooting a wireless LAN that is
experiencing trouble with interference. A scan of the wireless network reports
that there are two WAPs from different companies within range of the LAN. The
two WAPs have different SSIDs than the LAN WAP, but the same channel. Also, the
WEP appears to be the same on all WAPs. What should the network administrator
do to cut down on the interference of the wireless clients on the LAN?
A. Change the LAN WAP to the
same SSID as the other two WAPs.
B. Change the WEP settings on
the two WAPs to be different that that of the LAN WAP settings.
C. Change the LAN WAP channel
to a different channel than the other two WAPs.
D. Change the LAN WAP settings
to be different than that of the other two WAPs.
Answer: C
6.
The network
administrator is configuring a computer to run SLIP as a dial-up protocol.
Which protocol should be installed?
A. TCP/IP
B. IPX/SPX
C. NetBEUI
D. Appleshare IP
Answer: A
7.
A home user purchases a
cable modem and a straight-through Category 5e patch cable at a local electronics
store. The modem will be connected to a hub which is connected to their
computer. The computer is not able to receive a DHCP address from the cable
modem network DHCP server. Why?
A. Because the cable modem must
be directly connected to a computer.
B. Because the cable modem
requires a crossover cable to connect to the hub.
C. Because the cable modem
requires a RG-6 coaxial cable to connect to a hub.
D. Because the cable modem must
use a Category 3 UTP cable to connect to a hub.
Answer: B
8.
A user is booting a
workstation and suddenly receives a message stating that a duplicate IP address
is in use on the network. Which of the following commands can be used to
troubleshoot the problem?
A. ping
B. traceroute
C. find
D. arp
Answer: D
9.
Which protocol encrypts
data between web browser and web servers?
A. IPSec
B. SSL
C. PPTP
D. L2TP
Answer: B
10. A client accessing a network share folder
has authenticated into the system and has full access rights to a folder share.
But after opening the file they find that cannot modify the file contents. What
is the likely cause?
A. The group rights filter has
been changed through the GPO to disallow file access.
B. The file registered has been
pulled from cache memory and is not writeable.
C. The file has been opened by
another user and is open for read only.
D. The file has been pulled
from the backup source not the tree directory.
Answer: C
11. You work as a network administrator at ABC Computer.
There are three identical desktop computers on the network. One of the
computers cannot connect to the other machines. The network technician checks
the network interface card in the non-working machine, and neither the link
light not the activity lights us illuminated. The technician switches the
network cable with a cable that is known to be operational, but the lights do
not illuminate on the NIC or the corresponding port on the switch. What is the
next troubleshooting step?
A. Switch to a crossover cable.
B. Reinstall the NIC.
C. Change ports on the switch.
D. Enter the correct TCP/IP
settings.
Answer: C
12. Which 3 bytes of MAC address
F2-A1-23-BC-D3-41 designates the unique station identifier?
A. F2-A1-23
B. A1-23-BC
C. 23-BC-D3
D. BC-D3-41
Answer: D
13. Which one of the following authentication
protocols requires the use of an NTP server to synchronize the workstations
date and time with the server?
A. Kerberos
B. RADIUS
C. PAP
D. MS-CHAP
Answer: B
14. A user enters http://www.abc computers.com
into an Internet web browser. What is the default port number for the URL?
A. 21
B. 23
C. 80
D. 110
Answer: C
15. Which TCP/IP well-known port number
identifies SMTP?
A. 21
B. 23
C. 25
D. 110
Answer: C
16. PAP secures PPP sessions by:
A. Adding a secret key to the
password.
B. Adding a secret key to the
username password.
C. Double encrypting the
username and password.
D. Passing a username and
password in plaintext.
Answer: D
17. All of the following are valid IP addresses
except:
A. 192.168.0.1
B. 172.192.4.256
C. 156.144.226.123
D. 10.24.12.0
Answer: B
18. Which OSI layer converts digital data into
electronic signals to be put on a wire?
A. Physical
B. Transport
C. Data Link
D. Presentation
Answer: A
19. At which layer of the OSI model does a
router function?
A. Physical
B. Data Link
C. Network
D. Application
Answer: C
20. Which protocol is used for error reporting
in concert with IP?
A. SMTP
B. ICMP
C. IGMP
D. SNMP
Answer: B
21. Which one of the following techniques will
segment a network?
A. Subnetting
B. Implementing DHCP
C. Using DNS
D. Installing hubs
Answer: A
22. Which network topology uses the most cable?
A. Star
B. Ring
C. Bus
D. Mesh
Answer: D
23. Connecting a LAN (Local Area Network) to
mainframe can be accomplished using a:
A. bridge
B. gateway
C. transceiver
D. firewall
Answer: B
24. Which one of the following IEEE (Institute of Electrical and Electronics Engineers)
standards uses a 1300 nm (nanometer) beam?
A. 1000BASE-LX and 10 GBASE-LR
B. 1000BASE-CX and 1000BASE-T
C. 1000BASE-SX and 10 GBASE-SR
D. 10 GBASE-ER and 10 GBASE-SR
Answer: A
25. Which networking topology has the most
physical connections per node?
A. Bus
B. Ring
C. Star
D. Mesh
Answer: D
26. How can the range of an 802.11b wireless
access point be increased?
A. Lower the output power
B. Install an external antenna
C. Remove any external antennas
and use the internal one
D. Change the transmitting
frequency to the 5 GHz (Gigahertz) range
Answer: B
27. Which networking device works at the upper
three layers of the OSI (Open Systems Interconnect) and connects networks with
different architectures?
A. Router
B. Firewall
C. Modem
D. Gateway
Answer: D
28. Which one of the following antenna types is omni
directional?
A. Vertical
B. Dipole
C. Yagi
D. Parabolic
Answer: A
29. Which of the following environments is best
suited to provide more radio coverage using an omnidirectional antenna?
A. Closed office areas with
walls
B. Open office areas with cubicles
C. Hallways
D. Outdoors
Answer: D
30. Which of the following connectors are SFF
(Small Form Factor) fiber connectors?
A. MT-RJ (Mechanical
Transfer-Registered Jack) and LC (Local Connector)
B. ST (Straight Tip) and SC
(Standard Connector)
C. RJ-45 (Registered Jack) and
RJ-11 (Registered Jack)
D. Series-A and Series-B
Answer: A
31. If a destination address is not in a bridge
forwarding table, what will the bridge do?
A. Forwarding the packets to a
designated port and the one that originated the request
B. Forward the packets to all
ports except the one that originated the request
C. Forward the packets to the
default gateway
D. Forward the packet to all
ports
Answer: B
32. A client noticed that traffic increased
steadily over the last few months and performance is beginning to suffer on its
TCP/IP (Transmission Control Protocol/Internet Protocol). Which network can be
installed to reduce the impact of network traffic without dividing the LAN (Local
Area Network) into separate subnets?
A. Bridge
B. Repeater
C. Router
D. Gateway
Answer: C
33. Token ring operates at which speeds?
A. 1 Mbps, 10 Mbps (Megabit per
second)
B. 1 Mbps, 4 Mbps (Megabit per
second)
C. 4 Mbps, 16 Mbps (Megabit per
second)
D. 10 Mbps, 100 Mbps (Megabit
per second)
Answer: C
34. Which media type is the most prone to
electromagnetic interference?
A. Category 5e UTP (Unshielded
Twisted Pair)
B. RG-58 (Radio Grade) coaxial
cable
C. SMF (Single Mode Fiber)
optic cable
D. MMF (Multimode Fiber) optic
cable
Answer: A
35. The 802.11b frequency band is:
A. 1.5 GHz (Gigahertz)
B. 2.4 GHz (Gigahertz)
C. 5.0 GHz (Gigahertz)
D. 7.0 GHz (Gigahertz)
Answer: B
36. Which type of connector would a cable have
if it were supplied with a splitter and a cable modem for Internet access?
A. F-Type
B. RJ-45 (Registered Jack)
C. RJ-11 (Registered Jack)
D. IEEE 1394 (Institute of
Electrical and Electronics Engineers)
Answer: A
37. Which one of the following IEEE (Institute of Electrical and Electronics Engineers)
standards represents Ethernet?
A. 802.0
B. 802.3
C. 802.5
D. 802.11
Answer: B
38. What is the maximum length of a gigabit
Ethernet segment using MMF (Multimode Fiber) optic cable?
A. 100 meters (328.08 feet)
B. 250 meters (820.21.feet)
C. 550 meters (1,804.46 feet)
D. 3000 meters (9,842.52 feet)
Answer: C
39. All of the following are terminated on a
punch down block except:
A. STP (Shielded Twisted Pair)
cable
B. MMF (Multimode Fiber) cable
C. UTP (Unshielded Twisted
Pair) cable
D. Category 3 cable
Answer: B
40. What is the desired result when implementing
fault tolerance?
A. It maintains standards
within the IEEE (Institute
of Electrical and
Electronics Engineers)
B. It completely eliminates all
faults
C. It ensures production is not
impacted in the event of a failure
D. It improves throughput
Answer: C
41. What RAID (Redundant Array of Independent
Disks) level uses a disk mirroring technique to provide fault tolerance?
A. RAID 0 (Redundant Array of
Independent Disks)
B. RAID 1 (Redundant Array of
Independent Disks)
C. RAID 3 (Redundant Array of
Independent Disks)
D. RAID 5 (Redundant Array of
Independent Disks)
Answer: B
42. In order to resolve the name www.abccomputer.com,
which type of server is required?
A. DHCP (Dynamic Host
Configuration Protocol)
B. DNS (Domain Name Service)
C. WINS (Windows Internet Name
Service)
D. NAT (Network Address
Translation)
Answer: B
43. Which of the following can be used to cache
web pages for future retrieval?
A. Switch
B. Web server
C. Repeater
D. Proxy service
Answer: D
44. A workstation is configured for dial-in
connectivity to a remote access server. Which information does the client need
to authenticate?
A. Username and password
B. IP (Internet Protocol)
address and password
C. IPX (Internet Packet
Exchange) address and username
D. Domain name and password
Answer: A
45. Which cable would users utilize to connect a
client workstation directly to another client workstation when using
100BASE-TX?
A. Category 5 crossover cable
B. Coaxial cable
C. Category 3 straight cable
D. Category 5 straight cable
Answer: A
46. Upon which devices can NAT (Network Address
Translation) be used?
A. Hub
B. Bridge
C. Switch
D. Firewall
Answer: D
47. An administrator is configuring a company
Microsoft Exchange server for e-mail services. The Exchange server needs to
send e-mail to a partner company that uses a Novell GroupWise e-mail server.
What protocol is needed to send e-mail between the two servers?
A. CSNW (Client Service for
NetWare)
B. SMTP (Simple Mail Transfer
Protocol)
C. IPX/SPX (Internet Packet
Exchange/Sequence Packet Exchange)
D. POP3 (Post Office Protocol
version 3)
Answer: B
48. The AV (Anti-Virus) software provides
optimum protection when it is installed on all:
A. workstations connected to
the Internet
B. servers
C. workstations and servers
D. workstations with disk drives
Answer: C
49. While configuring a dial-up network on a
computer running Windows, which one of the following protocols establishes the
connection?
A. HTTP (Hypertext Transfer
Protocol)
B. Telnet
C. PPP (Pont-to-Point Protocol)
D. SSH (Secure Shell)
Answer: C
50. A network administrator implements four
VLANs (Virtual Local Area Network) on a switch. Which device will be required
to pass traffic among the VLANs (Virtual Local Area Network)?
A. Router
B. No additional device needed
C. Another switch
D. A hub
Answer: A