• Which of the following devices can be used to break up a broadcast domain?
A. Unmanaged switch B. Router C. DHCP server D. Bridge
• Which of the following is a secure way to transfer files from one device to another?
A. SFTP B. SNMPv3 C. TFTP D. FTP
• An administrator has a networking closet on the first floor of a building with all of the
network and communication equipment. However, the telephony provider installed
the communications line in the basement. Which of the following needs to be
extended to connect the line to the networking closet?
A. Smart jack B. Demarcation point C. Patch panel D. Router
• Which of the following network access security methods involves the analysis of a
physical hardware addresses?
A. IP filtering B. L2TP C. MAC filtering D. RAS
• Which of the following is a direct advantage of having wireless standards?
A. Increased use of wireless spectrum B. Greater device security
C. Interoperability between devices D. Increased number of protocols can be used
• Which of the following wiring standards would MOST likely be used to connect a
single network node to a switch?
A. Loopback B. Straight C. Rollover D. Crossover
• Which of the following is the maximum distance that CAT5 cable can run before
experiencing db loss?
A. 100 feet (30.5meters) B. 207 feet (63.1 meters)
C. 328 feet (100 meters) D. 358 feet (109.12meters)
• A media converter is also known as a_________?
A. transceiver. B. hub. C. modem. D. repeater.
• A technician arrives at a site and is troubleshooting an unfamiliar network. Which of
the following steps should be done FIRST to diagnose the problem?
A. Escalate the problem to administrative technician.
B. Compare wiring schematics to industry standards.
C. Identify symptoms and draw a network diagram.
D. Use a port analyzer to determine network topology
• Which of the following commands can be used to find the MAC address of a
connecting router?
A. arpB. traceroute C. ping D. ping sweep
• After accepting a request packet on port 80, the firewall automatically allows the
reply packet to pass. Which of the following terms BEST describes this firewall
behavior?
A. Stateful inspection B. Intrusion detection
C. Content filtering D. Passive fingerprinting
• Which of the following connectivity issues is the MOST likely to result from bundling
network cables tightly together?
A. Collision B. Attenuation
C. Crosstalk D. Open circuit
• Which of the following authentication mechanisms on a wireless network uses a
separate network authentication server?
A. Kerberos B. TKIP C. RADIUS D. WEP
• A company needs to perform tasteful packet filtering on the core network. Which of
the following network devices would BEST be suited to match this equipment?
A. Firewall B. Proxy C.{{ Router ACLs }} D. DHCP server
• Which of the following can be used to set options such as TFTP server addresses, DNS
search lists, and broadcast addresses on network clients and workstations?
A. Network bridge B. Layer 2 switch
C. DHCP server D. Smart jack
• An administrator needs to connect a fiber cable to a PC that only has a RJ-45 jack.
Which of the following could be used to accomplish this connection?
A. Smart jack B. Optical media
C. Token ring D. Media converter
• Which of the following devices is used for connecting multiple network hosts where
the physical signal is always repeated to all ports?
A. Bridge B. Router C. Hub D. Switch
• Which of the following protocols is used to access files on a remote server?
A. ARP B. SIP C. FTP D. NTP
• Which of the following network hardware allows the MOST network traffic collisions?
A. Hub B. WAP C. Router D. Switch
• After a power outage several switches lose their current configurations, but the core
router is still working properly. The switches affected are not able to connect to the
network. After further investigation the network administrator is able to identify the
affected areas, establish the cause, and escalated the problem. Which of the
following would be the NEXT step that the network administrator should do?
A. Immediately implement a solution.
B. Meet with the emergency response team to determine the next step.
C. Create an action plan and solution.
D. Copy the core routers current configuration to all the affected switches
• Which of the following tools could an administrator use to determine if a machine
was using the correct DNS server?
A. ipconfig B. nbtstat C. netstat D. tracert
• You have just resolved a very complex network problem. During the process, you
made some configuration changes to a router and two of the Windows 2000 servers.
The changes were successful, and your manager is now very happy with your
performance. What should be your next step?
• Document the changes you made to the router and servers.
• Enable auditing on all servers to prevent problems in the future.
• Ask your manager for a raise.
• Replicate the changes you made on two servers to all other servers.
• The most efficient way to control security in a client/ server network is to assign
permissions to
• each shared resource
• user
• groups
• directories
• The most secure and strong password from the following list is
• PASSWORD1
• paSS_Word1
• PassWOrd1
• Pass_Word#1
• The best method to restore the latest copy of the registry in a Win 2003 Server is to select the
• Ctrl +Alt + Del keys
• Recovery Console
• Emergency Repair Disk (ERD)
• Last Known Good Configuration
• .One of the following may not needed to have broad band network connectivity?
• Modem card
• NIC
• Protocol
• Network client
• Ping results may not tell you------?
• You are connected
• Your connection is responsive
• Your connection is consistent
• All configuration and setting information of the network
• Red Cross sign (Ï) on your network notification icon show you ------?
• Net workIp Address problem
• Physical network cable connection problem to NIC
• DNS resolving problem
• All
• Which one of the following is the correct syntax to Ping the reachablity of network?
• PING\192.168.1.1
• PING: 192.168.1.1
• PING 192.168.1.1
• 192.168.1.1 PING
• Which of the following PING response show correct response of network destination?
• Ping request could not find host...
• Reply from...
• Request timed out...
• All
• Which of the following Trace route Responses show correct response of network destination?
• Unable to resolve target system...
• Trace complete...
• Request timed out...
• Destination network unreachable...
• . Which of the following command used to query Internet domain name server?
• Ping
• Tracert
• Nslookup
• IP Config
• Which of the following is the maximum segment distance of a 100BaseFX
network?
A. 100 meters (328 feet) B. 2,000 meters (6,561 feet)
C. 1,024 meters (3,359 feet) D. 1,023 meters (3,356 feet)
• Which of the following OSI layers handles the routing of data across segments?
A. Network B. Transport C. Session D. Data Link
• The role of intelligently forwarding frames from one broadcast domain to another
would be performed by which of the following network equipment?
A. Router B. Hub C. Media converter D. Unmanaged switch
• Which of the following commands would allow a technician to see the DNS servers
that a computer is configured to use?
A. netstat B. nbtstat C. nslookup D. arp
• Which of the following does a star ring topology use for data transfer?
A. CSMA/CA B. CHAP C. CSMA/CD D. Token passing
• A user is unable to send an email to another user at company. A network technician
believes that the issue is DNS related. After typing nslookup, which of the following
commands would help determine the IP address of company As mail server?
A. set type=mx B. set type=ptr C. set type=soa D. set type=cname
• A company needs the ability to run a network that can handle 30Mbps data transfer
speeds but also needs to keep the cost of installing the network down. Which of the
following cable types would BEST meet the company's needs?
A. CAT6 B. CAT3 C. CAT5e D. CAT1
• Which of the following cables is used to connect multiple layer 2 switches?
A. Loopback B. Crossover C. Serial D. Rollover
• _________is a program which finds out the route to another host. It can
also help spot traffic bottlenecks and fast routes.
A, Traceroute B.Ping C. Arp D’No answer
• An Ethernet LAN has several trunk links passing near heavy machinery resulting in
EMI. Which of the following Ethernet media types should be used to avoid
interference?
A. 10Base5 B. 100BaseT C. 10Base2 D. 100BaseFX
• Two small companies sharing a switch would MOST likely benefit from which of the
following advanced switch features?
A. Spanning tree B. Trunking C. PoE D. VLAN
• A company's network is wired in a bus topology and one of the computers is unable to
access the network. Which of the following is the FIRST step in the troubleshooting
process?
A. Reinstall the NIC driver. B. Replace the cable.
C. Check the cable connections. D. Replace the NIC
• An office has just added an employee kitchen area. The work area and equipment has
stayed the same. Which of the following is the MOST likely reason why they are now
having wireless connectivity problems?
A. Distance B. Interference C. Encryption D. Antenna placement
• Which of the following technologies do the 802.11 networks utilize to prevent packet
collisions?
A. FDDI B. CSMA/CD C. CSMA/CAD.Token ring
47. to forward traffic from a host with the IP address of 10.0.0.100/25 to10.0.0.200/25
which of the following devices will be required?
A. A router B. A layer 2 switch C. A hub D. A DNS server
48. Which of the following cable types is used in a 100BaseFX
network?
A. UTP B. Coaxial C. STP D. Fiber
49. A technician receives a call on monday morning that several computers will not connect
to the network. The technician determines that the computers left on over the weekend
are functional and those that were turned off over the weekend are not functioning.
Which of the following is the MOST
likely source of the problem?
A.WINS needs to be restarted. B. DNS is not functioning.
C. DHCP is not functioning D.LDAP is not functioning.
50.An organization with 2,500 users has exhausted their Internet bandwidth. After some
investigation, the network administrator discovers that 95%of the traffic is coming
from web browsing. Which of the following network devices could be added to BEST
reduce the amount of Internet bandwidth the company is using?
A. Content switch B. Load balancer
C. Proxy server D. An additional DNS server
51. When all routers in a network agree about the path from one point to another, the
network is said to be which of the following?
A. Secure B. Static C. Converged D. Dynamic
The following figure shows a typical small size organize network setup .write each
components cable arrangement of they are marked with letters