1.
Which one of the
following provides a fault-tolerant storage system containing five disks and a single
controller that will function if a single disk fails?
A. A striped set array without
parity
B. A RAID 10 (Redundant Array
of Independent Disks) array
C. A striped set array with
parity
D. A duplexed RAID 01
(Redundant Array of Independent Disks)
Answer: B
2.Which of the following tools assess the
continuity of a cable?
A. Data analyzer
B. BERT (Bit-Error Rate Test)
C. TDR (Time Domain
Reflectometer)
D. Protocol analyzer
Answer: C
3.How many concurrent connections can a
Windows 2000 Professional computer support on a single share?
A. 10
B. 20
C. 30
D. 50
Answer: A
4.
A network administrator
needs to setup a salesperson laptop to connect to the company network via a
secure connection through the Internet. What should be done to the laptop to
enable the connection?
A. Install AV (Anti-Virus)
software with the latest definitions
B. Install firewall software’
C. Create a PPTP (Pont-to-Pont
Tunneling Protocol) connection
D. Install a NetBEUI (Network
Basic Input/Output Extended User Interface) protocol
Answer: C
5.
The system
administrator needs to connect a server to a 1000BASE-T switch. Which cable is required?
A. Category 3 cable
B. Category 5 cable
C. MMF (Multimode Fiber) optic
cable
D. SMF (Single Mode Fiber)
optic cable
Answer: B
6.
What happens if the
wrong WEP (Wired Equivalent Privacy) key is entered into a wireless device?
A. The network is accessible,
but the data will be garbled.
B. Data can be sent but not
received.
C. The network is not
accessible.
D. The network is only
accessible using the SSID (Service Set Identifier).
Answer: C
7.
A company wishes to
outsource the installation of an internal web server with access to employees only.
Which term best describes this web server?
A. Extranet server
B. VPN (Virtual Private
Network) server
C. RADIUS (Remote Authentic
Dial-In Service) server
D. Intranet server
Answer: D
8.
Which command in
Windows 98 would display adapter names, IP (Internet Protocol) address, subnet
mask, gateway, and DNS (Domain Name Service)?
A. winipcfg/all
B. nbtstat –a
C. nslookup –a
D. ifconfig/all
Answer: A
9.
What command is used to
view the entire TCP/IP (Transmission Control Protocol/Internet Protocol)
configuration on a Windows 98 client?
A. ifconfig/all
B. winipcfg/all
C. ipconfig/TCP (Transmission
Control Protocol) release
D. winipcfg/release
Answer: B
10.
A workstation presents
an error message to a user. The message states that duplicate IP (Internet Protocol)
has been detected on the network. After developing a hypothesis, what should
the NEXT step be according to the standard troubleshooting model?
A. Test and observe an action
plan
B. Gather facts surrounding the
error
C. Implement an action plan
D. Document solution and
process
Answer: C
11.
Which command generated
the following output?
Active Connections
Proto Local Address
Foreign Address State
TCP CompA: 3006
192.168.0.2: Microsoft Established
TCP CompA: 3021
192.168.0.246: HTTP Established
A. nbtstat
B. netstat
C. arp
D. ipconfig
Answer: B
12.
When one connection to
a host fails in a full mesh network, which of the following is true?
A. All hosts can communicate
B. No hosts can communicate
C. Half of the host will lose
communication
D. Only the two hosts between
the failed connection will lose communication
Answer: A
13.
A user complains that
they can not longer access resources on the network. The user is unable to ping
other nodes and ipconfig returns an IP (Internet Protocol) address that is not
in the correct subnet. What is the problem?
A. The DHCP (Dynamic Host
Configuration Protocol) server has lost connection to the DNS (Domain Name
Service)
B. Someone has enabled an
additional DHCP (Dynamic Host Configuration Protocol) server
C. The WINS (Windows Internet
Name Service) is offline
D. The DNS (Domain Name
Service) is offline
Answer: B
14.
An administrator has
just added a new DNS (Domain Name Service) server to a network and removed the
old DNS (Domain Name Service) server. The IP (Internet Protocol) address of the
new server is different, and the DHCP (Dynamic Host Configuration Protocol)
server was updated to reflect this change. Certain computers can connect to
www.abc computers.com while others cannot. Which of the following computers
will be able to connect to www.abc computers.com?
A. Any computer that has not
released and renewed their DHCP (Dynamic Host Configuration Protocol) lease.
B. Any statically assigned
workstation.
C. Any computer that has
released and renewed their DHCP (Dynamic Host Configuration Protocol) lease.
D. Any computer that does not
have a NIC (Network Interface Card)
Answer: C
15.
Which utility should a
technician use to troubleshoot NetBIOS (Network Basic Input/Output System) over
TCP/IP (Transmission Control Protocol/Internet Protocol) from Workstation A to Workstation
B on a Windows network?
A. ping
B. tracert
C. nbtstat
D. netstat
Answer: C
16.
Which of the following
commands will result in the display of the MAC (Media Access Control) address
of a given computer?
A. nslookup
B. ipconfig/all
C. nbtstat
D. nbtstat
Answer: B
17.
You work as an
administrator at ABC Computer. You receive a call from an end user saying they are
unable to log in to the network, although they could yesterday. Overnight, the
administrator replaced an ISA (Industry Standard Architecture) Token Ring card
with a Token Ring PCI (Peripheral Component Interconnect) NIC (Network
Interface Card) in the users computer on a 16 Mbps (Megabits per second) LAN
(Local Area Network). What is the NEXT step?
A. Verify the MAU (Multistation
Access Unit) is good
B. Verify the processor speed
C. Verify the user password is
correct
D. Verify the speed of the NIC
(Network Interface Card) matches the network
Answer: D
18.
The Following output is
from what diagnostic tool?
1 Router1 (192.168.0.1)
2.0 ms 1.0 ms 2.0 ms
2 Server.net.com
(4.150.6.3) 18.0ms12.0ms32.0ms
3 time.net.com
(2.12.14.1) 240ms 120ms 300ms
A. traceroute
B. ping
C. ifconfig
D. winipcfg
Answer: A
19.
A business with a DSL
(Digital Subscriber Line) modem lost connectivity and the secretary changed one
of the network settings to try to fix it. The settings are now:
IP address:
128.210.5.21
Subnet mask: 255.0.0.0
Gateway: 128.210.5.1
DNS server:
128.210.5.11
Given the information
above, which of the following identifies the settings that has changed?
A. IP (Internet Protocol)
address
B. Subnet mask
C. Gateway
D. DNS (Domain Name Service)
server
Answer: B
20.
A network has been set
up for DHCP (Dynamic Host Configuration Protocol) services using a PDC (Primary
Domain Controller) and BDC (Backup Domain Controller) each with a range of 192.168.0.1
to 192.168.0.254 using a class subnet of 255.255.255.0. DHCP (Dynamic Host Configuration
Protocol) errors are occurring. How can the errors be resolved?
A. Change the default subnet to
255.255.0.0 to increase the number of allowable IP (Internet Protocol)
addresses to prevent collisions.
B. The machines are holding IP
(Internet Protocol) addresses in cache mamory. Reboot to renew IP (Internet
Protocol) address.
C. Configure BootP (Boot
Protocol) on the server when the IP (Internet Protocol) class subnets are split
prior to implementing the scope.
D. Split the scope addresses
between the servers assigning 192.168.0.1 through 192.168.0.127 for the PDC
(Primary Domain Controller) and 192.168.0.128 through 192.168.0.254 for the BDC
(Backup Domain controller).
Answer: D
21.
ABC Computers has two
100BASE-TX hubs, Hub A and Hub B. The hubs are connected by a 3 meter
(9.84.feet) straight-through patch cable. The hosts on Hub A are unable to
communicate with the hosts on Hub B. What can the network administrator do to
correct the problem?
A. Install switches instead of
hubs
B. Update all clients with Hub
A as their default gateway
C. Replace the patch cable that
connects Hub A to Hub B with a crossover patch cable
D. Update clients on Hub A as
their default gateway and update clients on Hub B as their default gateway
Answer: C
22.
A webpage is hosted on
a Linux machine. Users complain that when visiting the web site, they receive a
forbidden error message. The system administrator logs onto the Linux server
and changes to the directory where the webpage is stored. What should the
system administrator do next?
A. Rename the webpage file
B. Change the symbolic link
C. Change the web port to 8080
on the client
D. Change the permissions of
the directory
Answer: D
23.
A technician is
troubleshooting a problem on a network using a utility to capture the packets. When
the technician reviews the captured data they have only captured broadcast
packets and packets from their own computer. What is the reason for this?
A. They do not have permission
to capture other packets.
B. They are connected to a
switch when trying to capture packets.
C. The router is blocking the
packets to the workstation.
D. They are using an evaluation
copy of the software utility
Answer: B
24.
A network administrator
supports a LAN (Local Area Network) with ten users wired to a switch. The
switch is connected to a router for Internet access. One day, a single user
reports being unable to access the Internet. All other users can access the
Internet. Which of the following items should the network administrator check
to solve the problem?
A. Network card of troubled
machine, port on switch that uplinks to router, and patch cable from the troubled
machine to switch.
B. Patch cable from troubled
machine to switch, port on switch the troubled machine is plugged into, and
external interface to router.
C. Network cable of troubled
machine, port on switch that troubled machine is plugged into, and patch cable
from troubled machine to switch.
D. Port on switch the troubled
machine is plugged into, network card of troubled machine, and uplink port on
the switch.
Answer: C
25.
The DHCP (Dynamic Host
Configuration Protocol) server in Subnet A is removed. The DHCP (Dynamic Host
Configuration Protocol) server in Subnet B is set with a DHCP (Dynamic Host Configuration
Protocol) addresses. What needs to be done to correct this problem?
A. Install a proxy server on
Subnet A
B. Install a DHCP (Dynamic Host
Configuration Protocol) relay agent on a server in Subnet B
C. Install a DHCP (Dynamic Host
Configuration Protocol) relay agent on the DHCP (Dynamic Host Configuration
Protocol) server in Subnet B
D. Install a DHCP (Dynamic Host
Configuration Protocol) relay agent on a server in Subnet A
Answer: D
26.
After patching and
rebooting a network DHCP (Dynamic Host Configuration Protocol) server, some
clients who were able to access resources begin to lose connectivity. What
utility can be used to regain connectivity to the network?
A. nbtstat
B. arp
C. tracert/traceroute
D. ipconfig/ifconfig
Answer: D
27.
A rogue residential
gateway has been installed in a network. It is running DHCP (Dynamic Host Configuration
Protocol). If the computers have static IP (Internet Protocol) addressed
assigned, what problems might exist on the network?
A. There will be no Internet
access
B. The computer IP (Internet
Protocol) address will change.
C. There should be no problems.
D. There will be a routing loop
between the residential gateway and the original router.
Answer: A
28.
Ten workstations numbered
1 through 10 are installed sequentially on a physical bus network. The complete
network has failed. Which of the following could have caused the failure?
A. Workstation 3 is powered
off.
B. Workstation 4 and 7 use the
DLC (Data Link Protocol).
C. A terminator has been
removed from the end of the bus trunk cable.
D. A terminator has been
installed on the end of the bus trunk cable.
Answer: C
29.
A client has normally
been able to access files shared on a remote server. After a firewall was installed
on the server, the client can no longer access the files. What should be done
to fix the problem?
A. Change the IP (Internet
Protocol) address on the client computer
B. Reboot the client computer
and try connecting again
C. Ask the system administrator
to reboot the server
D. Ask the system administrator
to unblock the necessary ports
Answer: D
30.
A user complains that
they can no longer attach to a server using its host name; however, they can attach
to it using the IP (internet Protocol) address. What is the problem?
A. The server is in the wrong
subnet.
B. The server that they are
trying to connect to is not registered in DHCP (Dynamic Host Configuration
Protocol).
C. The server that they are
trying to connect to has lost its registration in DNS (Domain Name Service).
D. The server that they are
trying to connect to has WINS (Windows Internet Name Service) enabled.
Answer: C
31.
A user is trying to
access a FTP (File Transfer Protocol) server but discovers that FTP (File Transfer
Protocol) is being blocked by a firewall. After unblocking port 21 on the
firewall, FTP (File Transfer Protocol) still does not work. What is the source
of the problem?
A. TFTP (Trivial File Transfer
Protocol) is not installed.
B. NFS (Network File System) is
not installed.
C. Port 20 must also be
unblocked.
D. Port 22 must also be unblocked.
Answer: C
32.
A technician just
installed a new NIC (Network Interface Card) in a computer and attached a cable
to connect the computer to a hub. Assuming the NIC (Network Interface Card) is functioning
correctly and the network is up, which of the following will the technician see
on the NIC (Network Interface Card)?
A. The amber light is flashing
occasionally and the green light is lit steadily.
B. The amber light is flashing
continually, the green light is lit steadily, and neither light will be on until
data is transferred.
C. The amber light is lit and
steady and the green light is flashing continually.
D. The amber light is flashing
occasionally, the green light is lit steadily, and neither light will be on until
data is transferred.
Answer: A
33.
A network administrator
manages a medium-sized network with a mixture of different platform computers.
The network contains multiple subnets located across a large geographical area.
Over half of the subnets contain a WAP (Wireless Access Point) for Internet
access. The network administrator has noticed that particular subnet users have
complained of downtime. Upon further troubleshooting, the administrator notices
that the each day the downtime lasts approximately an hour around midday. The administrator also
realizes that this period of downtime is affecting wireless users only. The
administrator travels to the troubled subnet around midday and connects using a wired workstation,
but a wireless laptop will not connect. The administrator also notices that the
WAP (Wireless Access Point) is 802.11g. Which one of the following would be an
appropriate action to address this problem?
A. Upgrade all affected
computers to a uniform platform running in ad-hoc mode
B. Eliminate any sources of RFI
(Radio Frequency Interface) around the WAP (Wireless Access
Point)
C. During the affected time,
connect the WAP (Wireless Access Point) directly into the router
D. Change the WAP (Wireless
Access Point) and all affected computers to operate in ad-hoc mode
Answer: B
34.
You work as an
administrator at ABC Computer. You implement packet filtering on the router between
the finance department and the marketing department. The following night, a
batch script runs that sends a file from the marketing server to the finance
FTP (File Transfer Protocol) server, but it does not work. What should be done?
A. You should make sure port 21
is open on the router.
B. You should change the batch
script to run during the day.
C. You should make sure ICMP
(Internet Control Message Protocol) is enabled on the router.
D. You should set the batch
script to run with elevated privileges.
Answer: A
35.
Which of the following
are classified as Layer 2 devices?
A. Hubs, switches and routers
B. Hubs, switches and bridges
C. Switches, bridges, and NICs
(network Interface Card)
D. Switches, bridges and
routers
Answer: C
36.
Which of the following
options describes a valid reason for subnetting a network?
A. To separate the network into
smaller broadcast domains
B. To minimize TCP/IP
(Transmission Control Protocol/Internet Protocol) conflicts
C. To convert from a DHCP
(Dynamic Host Configuration Protocol) to static addresses
D. To allow reception of
multicast telecom traffic
Answer: A
37.
All of the following
are true statements about private IP (Internet Protocol) addressing except:
A. private IP (Internet
Protocol) addresses may be duplicated across many networks without causing address
conflicts.
B. private IP (Internet
Protocol) addresses must be obtained dynamically from the ISP (Internet Service
Provider).
C. private IP (Internet
Protocol) addresses allow organizations to share a single public IP (Internet Protocol)
address.
D. large networks may be broken
into several private IP (Internet Protocol) networks.
Answer: B
38.
All of the following
options transmit data over a modem except:
A. POTS/PSTN (Plain Old
Telephone System/Public Switched Telephone Network).
B. xDSL (Digital Subscriber
Line).
C. cable.
D. T1 (T-Carrier Level 1).
Answer: D
39.
RADIUS (Remote
Authentication Dial-In User Service) provides which functionality for remote access?
A. Verification
B. Encryption
C. Addressing
D. Tunneling
Answer: A
40.
Which proved NetBIOS
(Network Basic Input/Output System) name to IP (Internet Protocol) address
resolution?
A. ipconfig
B. LMHOSTS
C. DNS (Domain Name Services)
D. DHCP (Dynamic Host
Configuration Protocol)
Answer: B
41.
Which address is within
an IANA (Internet Assigned Numbers Authority) private range?
A. 19.109.220.103
B. 188.209.75.46
C. 192.168.54.10
D. 216.127.51.121
Answer: C
42.
Which standard covers
the methods for performing authentication services for remote access to a central
LAN (Local Area Network)?
A. 802.5
B. 802.1x
C. 802.3
D. 802.4
Answer: B
43.
Which one of the
following is a class A IP (Internet Protocol) address?
A. 172.168.12.4
B. 18.12.4.1
C. 169.254.254.254
D. 255.255.255.0
Answer: B
44.
Which layer of the OSI
(Open Systems Interconnect) models handles formatting and code conversations?
A. Transport
B. Data Link
C. Application
D. Presentation
Answer: D
45.
A network administrator
needs to verify that the SMTP (Simple Mail Transfer Protocol) service is running
on a particular server. On what port number should a Telnet session be
established?
A. 20
B. 21
C. 23
D. 25
Answer: D
- Which type of connector does a 10BaseT Ethernet cable use?
a. BNC
b. RJ-45
c. RJ-11
d. MSAU
Ans: B
- What is the default subnet mask for Class C network?(multiple choice)
a. 255.0.0.0
b. 255.255.0.0
c. 255.255.255.0
d. /24
Ans: C and D
- Which of the following is the standard adopted for Ethernet CSMA/CD by IEEE Committee?
a. 802.2
b. 802.1d
c. 802.3
d. 802.5
Ans: C
- Disk Striping with distributed Parity corresponds to which RAID level?
a. RAID 0
b. RAID1
c. RAID3
d. RAID5
Ans: D
- Which of the following are class C IP address
a. 10.10.14.118
b. 135.23.112.57
c. 191.200.199.199
d. 204.67.118.54
Ans: D