76
CompTIA Realtests N10-005 Exam Questions & Answers Number : N10-005 Passing Score : 800 Time Limit : 120 min File Version : 21.4 http://www.gratisexam.com/ Comptia N10-005 Exam Questions & Answers Exam Name: CompTIA Network+ Certification Exam Last up date 31 ,2013

CompTIA Realtests N10-005 Exam Questions & Answers · CompTIA Realtests N10-005 Exam Questions & Answers ... Comptia N10-005 Exam Questions & Answers ... C. Presentation

  • Upload
    ngominh

  • View
    247

  • Download
    1

Embed Size (px)

Citation preview

CompTIA Realtests N10-005 Exam Questions & Answers

Number: N10-005Passing Score: 800Time Limit: 120 minFile Version: 21.4

http://www.gratisexam.com/

Comptia N10-005 Exam Questions & Answers

Exam Name: CompTIA Network+ Certification Exam

Last up date 31 ,2013

Exam A

QUESTION 1Which of the following would Kim, a technician, use in voice over IP communications?

A. SNTPB. SCPC. SMTPD. SIP

Correct Answer: DSection: (none)Explanation

Explanation/Reference:

QUESTION 2Which of the following is the MOST appropriate to use when routing Internet traffic through multiple ISPconnections?

A. BGPB. SNATC. RIPD. GPG

Correct Answer: ASection: (none)Explanation

QUESTION 3Which of the following protocols allows more than three non-overlapping channels?

A. 802.11aB. 802.11gC. 802.1qD. 802.15

Correct Answer: ASection: (none)Explanation

QUESTION 4Which of the following represents the physical address of a network access card?

A. FF01:D2:C4:87::11B. 00-30-48-83-9B-C8C. 08-9D-35-22-L2-34-FF-21D. 2D1A:C3:0:1C3B:2AD:FF:FEBE:9D3A

Correct Answer: BSection: (none)Explanation

QUESTION 5Which of the following OSI layers BEST describes where an HTTP proxy operates?

A. TransportB. ApplicationC. PresentationD. Session

Correct Answer: BSection: (none)Explanation

QUESTION 6Which of the following would be MOST useful to alert Jeff, an administrator, that a denial of service attack isoccurring?

A. RASB. RDPC. IDSD. VPN

Correct Answer: CSection: (none)Explanation

QUESTION 7A MAC address is used at which of the following layers of the OSI model?

http://www.gratisexam.com/

A. Layer 1B. Layer 2C. Layer 3D. Layer 4

Correct Answer: BSection: (none)Explanation

Explanation/Reference:

QUESTION 8Multimode fiber should be used in place of copper when:

A. distances are short.B. EMI is a concern.C. PoE is necessary.D. the switch has BNC connectors.

Correct Answer: BSection: (none)Explanation

QUESTION 9A network device is more than 100 meters (328 feet) from a 24-port copper switch. Which of the following canbe used to connect the device to the network?

A. Fiber multiplexerB. RepeaterC. AttenuatorD. OTDR

Correct Answer: BSection: (none)Explanation

QUESTION 10Which of the following regulates the amount of network traffic a single node receives in a server cluster?

A. Load balancerB. Proxy serverC. Content filterD. Quality of service

Correct Answer: ASection: (none)Explanation

QUESTION 11Which of the following evaluates packet payload when detecting network threats?

A. IPSB. Proxy serverC. Caching serverD. Content filter

Correct Answer: ASection: (none)Explanation

Explanation/Reference:

QUESTION 12A disassociation request is a way to mitigate which of the following threats?

A. ARP poisoningB. Rogue APC. Man-in-the-middle attackD. Botnet

Correct Answer: BSection: (none)Explanation

QUESTION 13A crossover cable is MOST commonly associated with which of the following layers of the OSI model?

A. SessionB. ApplicationC. NetworkD. Physical

Correct Answer: DSection: (none)Explanation

QUESTION 14Which of the following allows a malicious attacker to view network traffic if the attacker is on the same networksegment as Jeff, an administrator?

A. DoS attackB. Man-in-the-middle attackC. Smurf attackD. Xmas attack

Correct Answer: BSection: (none)Explanation

Explanation/Reference:

QUESTION 15Which of the following WAN technologies uses four wires for digital and a 66 block?

A. CableB. ATMC. T3D. POTS

Correct Answer: DSection: (none)Explanation

QUESTION 16Which of the following has the HIGHEST data rate speed?

A. T1B. ADSLC. SDSLD. OC-3

Correct Answer: DSection: (none)Explanation

QUESTION 17Which of the following is designed to be used with multimode fiber over short wavelengths?

A. 10GBaseLWB. 10GBaseERC. 10GBaseSWD. 10GBaseLR

Correct Answer: CSection: (none)Explanation

QUESTION 18Which of the following is used to verify configuration updates on a firewall?

A. Signature identificationB. Access control listsC. Scanning servicesD. Content filtering

Correct Answer: ASection: (none)Explanation

QUESTION 19Which of the following sizes is the fixed cell length in ATM?

A. 8 bytesB. 53 bytesC. 64 kilobytesD. 128 kilobytes

Correct Answer: BSection: (none)Explanation

QUESTION 20In the 2.4GHz range, which of the following channel combinations are non-overlapping?

A. 1, 6, 11B. 2, 7, 10

C. 2, 8, 13D. 3, 6, 9

Correct Answer: ASection: (none)Explanation

QUESTION 21Which of the following technologies relies on a ticket granting server to allow clients to verify their identity?

A. TACACS+B. KerberosC. PKID. RADIUS

Correct Answer: BSection: (none)Explanation

QUESTION 22Lisa, an administrator, determines there are an excessive number of packets being sent to a web serverrepeatedly by a small number of external IP addresses. This is an example of which of the following attacks?

A. DDoSB. VirusesC. WormsD. Man-in-the-middle

Correct Answer: ASection: (none)Explanation

Explanation/Reference:

QUESTION 23Which of the following authenticates, allows, and controls the execution of router commands?

A. PKIB. RADIUSC. KerberosD. TACACS+

Correct Answer: DSection: (none)Explanation

QUESTION 24A user's new computer is not able to connect to the network at all. Upon further investigation, Kim, theadministrator, finds that the wall jack is terminated with a 568B configuration. After locating the correct cable inthe IDF, which of the following is the MOST likely cause of the problem?

A. Other end of the cable is terminated with a 568B configurationB. Trunk port on the switch is disabledC. Other end of the cable is terminated with a 568A configurationD. Wall jack needs to be replaced with a smart jack

Correct Answer: CSection: (none)Explanation

QUESTION 25Which of the following network access methods is the MOST secure?

A. PPPoEB. SIPC. RSHD. IPSec

Correct Answer: DSection: (none)Explanation

Explanation/Reference:

QUESTION 26Lisa, a technician, is reporting wireless transmission speeds of 300Mbps. Which of the following wirelessstandards is being used?

A. 802.11aB. 802.11bC. 802.11gD. 802.11n

Correct Answer: DSection: (none)Explanation

QUESTION 27The selection of the correct punch down tool to use depends on which of the following?

A. Connector typeB. Demarcation point locationC. Block typeD. Switch location

Correct Answer: CSection: (none)Explanation

QUESTION 28Which of the following services do TCP connections provide to application layer protocols? (Select TWO).

A. Transport services without error recoveryB. Large data size manageability using segmentationC. Secure Kerberos password encryption on dataD. Delivery through error recoveryE. Proxy server authentication

Correct Answer: BDSection: (none)Explanation

QUESTION 29Which of the following devices will allow Lisa, a user, to see a cached copy of websites?

A. Content switchB. DNS serverC. Proxy serverD. Load balancer

Correct Answer: CSection: (none)Explanation

QUESTION 30Kim, a user, reports that the web browser is indicating the site certificate is not trusted. Which of the followingattacks may be in progress?

A. Man-in-the-middleB. Denial of serviceC. Ping floodingD. Smurfing

Correct Answer: ASection: (none)Explanation

QUESTION 31Which of the following has a DB-9 connector?

A. SCB. RS-232C. LCD. RJ-45

Correct Answer: BSection: (none)Explanation

QUESTION 32Users are unable to access the company's intranet website. Which of the following attacks has the networkMOST likely experienced?

A. Man-in-the-middleB. SmurfC. TrojanD. DoS

Correct Answer: DSection: (none)Explanation

QUESTION 33Which of the following is the BEST method to ensure network performance on a VoIP network?

A. Traffic shapingB. Quality of serviceC. Load balancingD. Caching engines

Correct Answer: BSection: (none)Explanation

Explanation/Reference:

QUESTION 34Kim, an administrator, would like to inspect all traffic flowing over the SMTP protocol on a given network. Whichof the following tools would accomplish this? (Select TWO).

A. Packet snifferB. HoneypotC. Port mirroringD. IPSE. Port scannerF. IDS

Correct Answer: ACSection: (none)Explanation

QUESTION 35Which of the following colors represents the outer leads on a connector head of a 568B patch cable? (SelectTWO).

A. Blue, brown/whiteB. Green/white, blueC. Orange/white, orangeD. Blue, blue/whiteE. Brown/white, brown

Correct Answer: CESection: (none)Explanation

Explanation/Reference:

QUESTION 36Kim, an administrator, has created a patch cable. Which of the following tools should she use to check theintegrity of the cable?

A. Protocol analyzerB. Toner probeC. Cable certifierD. Cable stripper

Correct Answer: CSection: (none)Explanation

QUESTION 37PKI is a method of user authentication which uses which of the following?

A. Various router commandsB. Access control listsC. Certificate servicesD. A RADIUS server

Correct Answer: CSection: (none)Explanation

QUESTION 38Kim, an administrator, wants to verify which protocols are in use on the network. Which of the following toolsshould she use?

A. Intrusion detection softwareB. PoEC. Packet snifferD. Intrusion prevention software

Correct Answer: CSection: (none)Explanation

QUESTION 39Lisa, an administrator, needs to install a wireless network that will allow legacy devices to connect to thenetwork and also offer both 5GHz and 2.4GHz frequencies. Which of the following would BEST describe thetype of WAP needed?

A. 802.11aB. 802.11bC. 802.11gD. 802.11n

Correct Answer: DSection: (none)Explanation

QUESTION 40Which of the following is the MAXIMUM distance a single 1000BaseT segment can cover?

A. 100 kilometers (62 miles)B. 10 kilometers (6 miles)C. 1000 meters (3281 feet)D. 100 meters (328 feet)

Correct Answer: DSection: (none)Explanation

QUESTION 41Which of the following wireless standards operates on the same frequency as 802.11a?

A. Compatible with 802.11b wireless networksB. Compatible with 802.11g wireless networksC. Compatible with 802.11i wireless networksD. Compatible with 802.11n wireless networks

Correct Answer: DSection: (none)Explanation

QUESTION 42Which of the following components would a technician plug into a smart jack?

A. 25 pair cableB. 100 pair cableC. Patch cableD. Patch panel

Correct Answer: CSection: (none)Explanation

QUESTION 43Which of the following is used by RADIUS to encrypt messages between the server and the client?

A. Public keyB. CSU/DSUC. Private keyD. Shared secret

Correct Answer: DSection: (none)Explanation

QUESTION 44Which of the following network scanners detects and sends out alerts for malicious network activity?

A. Packet sniffersB. IDSC. Port scannersD. IPS

Correct Answer: BSection: (none)Explanation

QUESTION 45Which of the following is a social engineering attack?

A. WormsB. Man-in-the-middleC. PhishingD. Evil twin

Correct Answer: CSection: (none)Explanation

QUESTION 46Peer to peer networks are used to pass information in between which of the following?

A. Several clients to a centralized serverB. One client to anotherC. Several servers to several centralized clientsD. One client to a centralized server

Correct Answer: BSection: (none)Explanation

QUESTION 47Which of the following threats is MOST likely to enable an attacker to modify data in transit?

A. DoSB. Smurf attackC. VirusD. Man-in-the-middle

Correct Answer: DSection: (none)Explanation

QUESTION 48

Which of the following solutions will detect and disable a rogue access point?

A. Port scanB. Packet snifferC. IPSD. IDS

Correct Answer: CSection: (none)Explanation

QUESTION 49Which of the following connector types will MOST likely be located on a serial cable?

A. DB-9B. LCC. STD. BNC

Correct Answer: ASection: (none)Explanation

QUESTION 50Which of the following is an encrypted remote access protocol?

A. RDPB. PoEC. RASD. PPP

Correct Answer: ASection: (none)Explanation

QUESTION 51Jeff, an administrator, wishes to add a third network segment to the firewall where the company's public webservers will be placed. Which of the following BEST describes this new segment?

A. PKIB. VPNC. IPSD. DMZ

Correct Answer: DSection: (none)Explanation

QUESTION 52Which of the following would the telecommunications carrier use to segregate customer traffic over long fiberlinks?

A. VLANB. MPLSC. VPND. PSTN

Correct Answer: BSection: (none)Explanation

QUESTION 53Which of the following can be configured to restrict specific ports and IP addresses from accessing the internalnetwork? (Select TWO).

A. Layer 2 switchB. MAC address filteringC. ACLsD. IIS serverE. Port scannerF. Firewall

Correct Answer: CFSection: (none)Explanation

Explanation/Reference:

QUESTION 54Which of the following authentication solutions also provides AAA and uses TCP?

A. TACACS+B. KerberosC. RADIUSD. RAS

Correct Answer: ASection: (none)Explanation

QUESTION 55Which of the following would be used to test out the security of a specific network by allowing it to receivesecurity attacks?

A. HoneynetB. HoneypotC. Vulnerability scannerD. Network based IDS

Correct Answer: ASection: (none)Explanation

QUESTION 56Which of the following separates broadcast domains?

A. Port mirroringB. RouterC. ConvergenceD. Switch

Correct Answer: BSection: (none)Explanation

QUESTION 57Which of the following commands can Lisa, a network technician, use to check whether the DNS server for agiven domain is reachable?

A. nmapB. nbtstatC. digD. arp

Correct Answer: CSection: (none)Explanation

QUESTION 58Which of the following could Kim, a network technician, use to find the approximate location of a break in a longnetwork cable?

A. Protocol analyzerB. Time domain reflectometerC. Toner probeD. Multimeter

Correct Answer: BSection: (none)Explanation

QUESTION 59Which of the following can Jeff, a technician, modify on an 802.11n router that is not available as an option onan 802.11g device?

A. SSIDB. EncryptionC. ChannelsD. Spectrum

Correct Answer: DSection: (none)Explanation

QUESTION 60Which of the following technologies could be implemented to improve call clarity when using VoIP technology?

A. Static IP addressingB. Caching enginesC. QoSD. Port forwarding

Correct Answer: CSection: (none)Explanation

Exam B

QUESTION 1When Jeff, a technician, is troubleshooting a problem, which of the following is the NEXT step after verifying fullsystem functionality?

A. Establish a plan of action to resolve the problem and identify potential effects.B. Implement the solution.C. Establish a theory of probable cause.D. Document findings, actions, and outcomes.

Correct Answer: DSection: (none)Explanation

QUESTION 2Lisa, a technician, is troubleshooting a cable problem. She has checked both ends and suspects an issue 50yards (46 meters) from the location. Which of the following network tools will confirm this analysis?

A. TDRB. Protocol analyzerC. MultimeterD. Cable crimper

Correct Answer: ASection: (none)Explanation

QUESTION 3A switch in IDF 3 has shut down at 3 p.m. everyday this week. Which of the following network tools should Kim,a technician, use to troubleshoot this problem?

A. Environmental monitorB. Cable testerC. TDRD. Loopback plug

Correct Answer: ASection: (none)Explanation

QUESTION 4Which of the following ports would Zach, a technician, need to open on a firewall to allow SSH on the defaultport?

A. 20B. 21C. 22D. 23

Correct Answer: CSection: (none)

Explanation

Explanation/Reference:

QUESTION 5Which of the following ports is the default telnet port?

A. 20B. 21C. 22D. 23

Correct Answer: DSection: (none)Explanation

QUESTION 6Which of the following ports would have to be allowed through a firewall to allow SNMP traffic to pass on itsdefault port? (Select TWO).

A. 22B. 23C. 143D. 161E. 162F. 8080

Correct Answer: DESection: (none)Explanation

Explanation/Reference:

QUESTION 7Zach, a technician, wants to test a laptop's NIC for functionality but has no other networking equipment toattach it to. Which of the following would allow him to test basic functionality of the NIC?

A. Loopback plugB. Protocol analyzerC. Smart jackD. Coupler

Correct Answer: ASection: (none)Explanation

QUESTION 8A mobile user is no longer able to access network resources. Jeff, the network technician, is unable to ping theuser's workstation. Which of the following commands would MOST likely be used on that workstation to verifyits current network settings?

A. net shareB. hostnameC. ipconfigD. tracert

Correct Answer: CSection: (none)Explanation

QUESTION 9Which of the following hardware tools would MOST likely be used to verify Layer 1 connectivity?

A. MultimeterB. Loopback plugC. Cable certifierD. CAT3 coupler

Correct Answer: BSection: (none)Explanation

QUESTION 10Which of the following properties of DHCP would Lisa, a technician, use to ensure an IP address is not leasedout from the active scope?

A. ReservationsB. Lease timesC. Removing IPs from the active leasesD. Configuring the DNS options

Correct Answer: ASection: (none)Explanation

QUESTION 11A user has no network connectivity. Jeff, the network technician, is unable to locate the CAT5e cable from theuser at the IDF. Which of the following tools would be used to assist Jeff in locating the CAT5e cable?

A. Butt setB. Punch down toolC. Toner probeD. Protocol analyzer

Correct Answer: CSection: (none)Explanation

QUESTION 12Kim, a network technician, needs to configure a port on a switch to provide connectivity and electrical support toa WAP being installed in a warehouse. Which of the following features needs to be configured on the switch?

A. STPB. PoEC. VTP trunkingD. Port forwarding

Correct Answer: BSection: (none)Explanation

QUESTION 13Which of the following describes a rationale for a network with redundant paths?

A. VPN compatibilityB. Unified communications implementationC. High availability requirementD. QoS

Correct Answer: CSection: (none)Explanation

QUESTION 14Lisa, a network technician, needs to introduce a few more cables to the existing patch panel.Which of the following tools would she use?

A. OTDRB. MultimeterC. Punch down toolD. Temperature monitor

Correct Answer: CSection: (none)Explanation

QUESTION 15Which of the following is an example of a DHCP failover mechanism?

A. APIPAB. Inactive leaseC. ReservationsD. Active lease

Correct Answer: ASection: (none)Explanation

QUESTION 16Which of the following has a maximum transfer rate of 54Mbps and operates at the 5GHz frequency?

A. 802.11a

B. 802.11bC. 802.11gD. 802.11n

Correct Answer: ASection: (none)Explanation

QUESTION 17Which of the following devices is used to distribute network traffic equally over multiple links?

A. Content filterB. DNS serverC. Load balancerD. Proxy server

Correct Answer: CSection: (none)Explanation

Explanation/Reference:

QUESTION 18Which of the following is used to restrict access according to user policies?

A. Content filterB. DHCP serverC. DNS serverD. VPN concentrator

Correct Answer: ASection: (none)Explanation

QUESTION 19Which of the following is used to filter outgoing network requests?

A. Proxy serverB. VPN concentratorC. DHCP serverD. IIS server

Correct Answer: ASection: (none)Explanation

QUESTION 20A user snapped the retention tab off of a network cable. Which of the following tools would Jeff, a technician,use to replace the RJ-45 connector?

A. Wire tester

B. Punch downC. CrimperD. Multimeter

Correct Answer: CSection: (none)Explanation

Explanation/Reference:

QUESTION 21There is suspected virus activity on the network. Which of the following would Lisa, a technician, use to studynetwork traffic?

A. Protocol analyzerB. Cable testerC. Cable certifierD. Environmental monitor

Correct Answer: ASection: (none)Explanation

QUESTION 22Kim, a network technician, is installing an 802.11n network. Which of the following should Kim enable to ensurethat the network only allows 802.11n clients?

A. Name the SSID on the 802.11n network onlyB. Limit the DHCP address poolC. Disable 802.11b and 802.11gD. Only use WPA encryption

Correct Answer: CSection: (none)Explanation

QUESTION 23Which of the following network devices restricts traffic based on words, signatures, and URLs?

A. Layer 2 switchB. Content filterC. Load balancerD. Traffic analyzer

Correct Answer: BSection: (none)Explanation

QUESTION 24Which of the following network devices hides network nodes behind one public IP address?

A. Layer 3 switchB. Content filterC. VPN serverD. Proxy server

Correct Answer: DSection: (none)Explanation

QUESTION 25A VPN concentrator is used for which of the following purposes?

A. MAC filteringB. Content filteringC. Secure network accessD. Connectivity troubleshooting

Correct Answer: CSection: (none)Explanation

QUESTION 26Lisa, a technician, has configured a new switch that is remotely accessed using SSH. The switch is workingproperly but cannot be accessed remotely. Which of the following items is MOST likely missing in theconfiguration?

A. Port speedB. CryptokeyC. Data VLAND. NAT/PAT

Correct Answer: BSection: (none)Explanation

Explanation/Reference:

QUESTION 27Kim, a technician, needs to monitor network traffic for bandwidth analysis because of slow Internet downloads.Which of the following protocols will the tool use to show the necessary information?

A. SNMPB. NTPC. SIPD. PPTP

Correct Answer: ASection: (none)Explanation

QUESTION 28

Kim, a user, on a wireless network reports an issue with network access while using a cordless phone. Whichof the following is the MOST likely cause?

A. Encryption typeB. Channel selectionC. Antenna placementD. Signal strength

Correct Answer: BSection: (none)Explanation

Explanation/Reference:

QUESTION 29Which of the following 802.11n features allows for the use of multiple simultaneous frequencies in order toincrease usable bandwidth?

A. Channel bondingB. MIMOC. Spatial reuseD. 20MHz channel spacing

Correct Answer: ASection: (none)Explanation

QUESTION 30Lisa, a user, reports the network is down. While troubleshooting, a technician walks into a communicationscloset and notices a small patch cable with both ends plugged into interfaces on the same switch. Which of thefollowing is this an example of?

A. Switch loopB. Port bondingC. Virtual switchD. Port mirroring

Correct Answer: ASection: (none)Explanation

Explanation/Reference:

QUESTION 31Kim, a user, cannot access the network using wireless. Which of the following is MOST likely the cause?

A. TXRX is reversedB. Faulty crossover cableC. Incorrect WEP keyD. A short in the cable pairs

Correct Answer: C

Section: (none)Explanation

QUESTION 32Jeff, a technician, is charged with setting up network monitoring for critical devices in the network. It isimportant the information be sent securely to the monitoring station. Which of the following protocols willsupport secure transmission of the data?

A. SNMP v2B. VPNC. SYSLOGD. SMTP

Correct Answer: ASection: (none)Explanation

QUESTION 33Which of the following network management tools can filter information from all data entering and leaving aspecific port on the switch?

A. SNMP trapB. Bandwidth analyzerC. Network snifferD. Syslog server

Correct Answer: CSection: (none)Explanation

QUESTION 34A Windows server has a problem after booting up. Kim, a technician, should immediately check the:

A. history logs.B. cron logs.C. application logs.D. system logs.

Correct Answer: DSection: (none)Explanation

QUESTION 35Management has decided that they want a high level of security. They do not want Internet requests comingdirectly from users. Which of the following is the BEST recommendation?

A. Content filterB. Proxy serverC. Layer 3 switchD. Firewall

Correct Answer: BSection: (none)Explanation

QUESTION 36A small office has asked to have six PCs networked together by Jeff, a consultant. The office users want filesharing capability with no access to the Internet. Which of the following items will Jeff need? (Select TWO).

A. Network bridgeB. RG-59 patch cablingC. CAT5e patch cablingD. FirewallE. Switch

Correct Answer: CESection: (none)Explanation

QUESTION 37Jeff, a customer, has requested a solution to allow all internally and externally bound traffic to be monitored.Which of the following would allow a packet sniffer to do this?

A. A VPN client and VPN concentratorB. A smart jack installed for each network jackC. A managed switch with port mirroringD. A proxy server with content filter

Correct Answer: CSection: (none)Explanation

QUESTION 38Jeff, a customer, shares a building with several other tenants. He reports that an unencrypted wireless networkhas been getting slower while his Internet traffic has steadily been increasing. Which of the following should beconfigured to resolve this problem?

A. VLANB. MTUC. WPAD. SSID

Correct Answer: CSection: (none)Explanation

QUESTION 39Which of the following issues is a common problem in wireless infrastructures?

A. Incorrect port numberB. Mismatched SSIDsC. Invalid telnet sessions

D. Too many collisions

Correct Answer: BSection: (none)Explanation

Explanation/Reference:

QUESTION 40After a recent generator test, several users are reporting network connectivity issues. Jeff, the networktechnician, is unable to connect via SSH to the main switch. Which of the following is the MOST likely cause ofthe connectivity issue?

A. Faulty cableB. Misconfigured speed and duplexC. Wrong gatewayD. Power loss

Correct Answer: DSection: (none)Explanation

Explanation/Reference:

QUESTION 41Lisa, the network technician, has been instructed to provide connectivity to workstations within a SOHO that isover 800 feet (243 meters) away from the main switch. Which of the following would she install to provideconnectivity?

A. CAT5eB. CAT6C. CoaxialD. Multimode fiber

Correct Answer: DSection: (none)Explanation

QUESTION 42During a disaster recovery test, several billing representatives need to be temporarily setup to take paymentsfrom customers. It has been determined that this will need to occur over a wireless network, with security beingenforced where possible. Which of the following configurations should be used in this scenario?

A. WPA2, SSID enabled, and 802.11n.B. WEP, SSID enabled, and 802.11b.C. WEP, SSID disabled, and 802.11g.D. WPA2, SSID disabled, and 802.11a.

Correct Answer: DSection: (none)Explanation

QUESTION 43Which of the following could cause employees to be redirected to an incorrect site after typing in the correctname in a web browser?

A. DNS cache poisoningB. Mismatched MTUC. Incorrect DHCP addressD. Duplicate IP address

Correct Answer: ASection: (none)Explanation

QUESTION 44Zach, a network technician, is trying to set up a SOHO network to allow Internet connectivity for all employeesbased on the following hardware:

- 4 computers with LAN and wireless cards- 1 router with 3 LAN ports- 2 Ethernet cables- 1 cable modem

The manager would like as many of the computers as possible to be physically connected, instead of usingwireless. Which of the following scenarios would meet this requirement based on the equipment available?

A. The router should be connected to the modem and one PC can be physically connected to the router.All other PCs must connect wirelessly.

B. The modem should be physically connected to the router and two PCs can be physically connected to therouter. All other PCs must connect wirelessly.

C. The router should be connected to the modem and three PCs can be physically connected to the router.The other PC must connect wirelessly.

D. The modem should be physically connected to one PC. All other PCs must connect wirelessly.

Correct Answer: ASection: (none)Explanation

QUESTION 45An 801.11g wireless access point was configured as follows:

- AP encryption forced to WPA2-AES mode only- MAC address filtering enabled with the following MAC address in the allow list: 00-ab-29-da-c3-40

Which is true about the above configuration?

A. Any 802.11b/g compatible client can connect to the wireless network if they support TKIP, the MAC addressis 00-ab-29-da-c3-40, and the encryption key is known by the client.

B. An 802.11a compatible client can connect to the wireless network only if its MAC address is 00- ab-29-da-c3-40 and the encryption key is known by the client.

C. An 802.11n compatible client can connect to the wireless network only if its MAC address is 00- ab-29-da-c3-40 and the encryption key is known by the client.

D. Any 802.11g compatible client can connect to the wireless network if the encryption key is known by theclient.

Correct Answer: CSection: (none)Explanation

Explanation/Reference:

QUESTION 46Which of the following is a reason to use dynamic DNS?

A. The host IP address is not listed in the firewall.B. The host IP address is assigned by DHCP.C. Static routes cannot be used on the host network.D. A third-party certificate is being used.

Correct Answer: BSection: (none)Explanation

QUESTION 47Jeff, a user, can no longer access the accounting file share, but others are still able to access the share. Whichof the following would be the FIRST step in troubleshooting the issue?

A. Notify senior management of the issue.B. Develop a probable cause theory.C. Ask Jeff if anything has changed on the system.D. Escalate the issue to the vendor.

Correct Answer: CSection: (none)Explanation

Explanation/Reference:

QUESTION 48Jeff, a user connected to the wireless network, takes a laptop from his desk to a conference room. Arriving atthe conference room, Jeff realizes that the laptop is in process of reconnecting to the wireless network. Whichof the following is a common wireless problem that can cause this issue?

A. Mismatched SSIDB. Incorrect encryption typeC. Weak signal strengthD. Increased latency

Correct Answer: CSection: (none)Explanation

QUESTION 49Jeff, a network administrator, would like to ensure that the footprint of the company's wireless coverage islimited to the office borders, located on the premises. Which of the following features should he adjust on all ofthe company's WAPs to make this change?

A. SSID maskingB. PPPoEC. Transmission powerD. Encryption technology

Correct Answer: CSection: (none)Explanation

Explanation/Reference:

QUESTION 50Zach, a network administrator, is checking work on some new CAT5 LAN network cabling installed at anorganization. Multiple lines are receiving poor signals, and Zach finds the lengths of the runs to be sometimesover 350 feet (107 meters). Which of the following is the cause of the issue?

A. CAT5 cable runs over 330 feet (100 meters) need to utilize STP instead of UTP.B. CAT5 cabling is limited to single-run lines of 330 feet (100 meters).C. CAT5 cabling is limited to single-run lines of 250 feet (76 meters).D. CAT5 cabling needs to have terminators installed at each end for runs over 330 feet (100 meters).

Correct Answer: BSection: (none)Explanation

QUESTION 51Zach, a customer, has Internet service that includes several static IP addresses. Zach wishes to host a websitefrom a server within a privately addressed network and make it publicly available. Which of the following wouldhave to be configured on the router to allow the public to access the website from one of the static IPaddresses?

A. QoS monitoringB. Static NATC. VLAN taggingD. MAC filtering

Correct Answer: BSection: (none)Explanation

QUESTION 52Jeff, a business owner, has discovered that several of the nearby businesses have wireless networks. Jeffwants to implement a unique wireless network inside the business. Which of the following should be configuredon the wireless access point to reduce interference from the other wireless networks?

A. PPPoE authenticationB. MAC filteringC. WPA encryptionD. Wireless channel

Correct Answer: DSection: (none)

Explanation

QUESTION 53A company's database software runs in the cloud. The device hosting the software is an example of which ofthe following?

A. Virtual serverB. Virtual switchC. Virtual desktopD. Virtual PBX

Correct Answer: ASection: (none)Explanation

QUESTION 54Lisa, a technician, is troubleshooting a laptop's connection to a wireless network and notices the user hasplaced their cell phone on top of the wireless router. Which of the following is the cell phone MOST likelygenerating?

A. Wrong encryptionB. An SSID mismatchC. LatencyD. Interference

Correct Answer: DSection: (none)Explanation

Exam C

QUESTION 1Kim, a technician, is asked to run new cabling for an office that is 350 feet (107 meters) away from thenetworking equipment. The type of cable being run is CAT6. Kim purchases and installs a 500 foot (152meters) CAT6 cable, but after installation, notices a weak signal between the office and the networkingequipment. Which of the following would have been the BEST to install instead of the CAT6 cable?

A. Install two CAT6 cables with a repeater.B. Install a 500 foot (152 meter) CAT5 cable.C. Install a 500 foot (152 meter) CAT5e cable.D. Install three CAT6 cables with a repeater.

Correct Answer: ASection: (none)Explanation

QUESTION 2Which of the following default services uses TCP/UDP port 88?

A. LDAPB. IGMPC. HTTPD. Kerberos

Correct Answer: DSection: (none)Explanation

Explanation/Reference:

QUESTION 3Multiprotocol Label Switching (MPLS) operates at which of the following layers of the OSI model? (SelectTWO).

A. Layer 1B. Layer 2C. Layer 3D. Layer 4E. Layer 5

Correct Answer: BCSection: (none)Explanation

QUESTION 4Which of the following examples would require a private static IP address, but not a public static IP address?

A. A PDA connecting to the wireless network.B. A laptop that is deployed on a LAN.C. A file server deployed in the internal datacenter.D. An Internet facing web server for external access.

Correct Answer: CSection: (none)Explanation

QUESTION 5Zach, a network engineer, is troubleshooting poor wireless throughput for a group of 15 users in a large office.Many of the computers are showing moderate to weak signals even though there are two APs less then 15 feet(4 meters) away in either direction. Which of the following is MOST likely the cause?

A. The local antennas are not powerful enough.B. There is an SSID mismatch.C. The receiver sensitivity is too high.D. The closest APs are down.

Correct Answer: DSection: (none)Explanation

QUESTION 6An organization currently has CAT5e cabling throughout its office. Kim, the network technician, istroubleshooting a new CAT6 run that supports network traffic, but does not meet specification when tested witha TDR. Which of the following is MOST likely the cause?

A. Improper groundingB. TXRX reversedC. Incorrect terminationD. Outdated NIC drivers

Correct Answer: CSection: (none)Explanation

QUESTION 7Which of the following OSI model layers is between the data link and transport layers?

A. PresentationB. PhysicalC. SessionD. Network

Correct Answer: DSection: (none)Explanation

QUESTION 8Which of the following is a Class A private IP address?

A. 4.2.2.2B. 10.1.1.45C. 169.254.9.15

D. 192.168.0.100

Correct Answer: BSection: (none)Explanation

Explanation/Reference:

http://www.gratisexam.com/

QUESTION 9Which of the following services would have assigned the IP address 169.254.1.89?

A. DHCPB. APIPAC. IDSD. DNS

Correct Answer: BSection: (none)Explanation

QUESTION 10Zach, a technician, suspects a NIC in a desktop computer has failed. Which of the following commands canZach use to BEST troubleshoot this issue?

A. netshB. nslookupC. ipconfigD. tracert

Correct Answer: ASection: (none)Explanation

QUESTION 11company wants the public to be able to connect to the wireless network with minimal security, but not be able toconnect to the private internal network. Which of the following firewall rules would BEST accomplish this?

A. Content filtering on the wireless access pointB. Allow traffic from the wireless access pointC. Block traffic from the wireless access pointD. Packet filtering on the wireless access point

Correct Answer: CSection: (none)Explanation

Explanation/Reference:

QUESTION 12Lisa, an administrator, is unable to route traffic between VLANs on a switch. Communication between deviceswithin each VLAN is functioning. At which of the following layers does the problem MOST likely reside?

A. NetworkB. Data linkC. TransportD. Session

Correct Answer: ASection: (none)Explanation

QUESTION 13Lisa, a technician, installs a new WAP and users are able to connect; however, users cannot access theInternet. Which of the following is the MOST likely cause of the problem?

A. The signal strength has been degraded and latency is increasing hop count.B. An incorrect subnet mask has been entered in the WAP configuration.C. The signal strength has been degraded and packets are being lost.D. Users have specified the wrong encryption type and routes are being rejected.

Correct Answer: BSection: (none)Explanation

QUESTION 141000BaseT has a MAXIMUM run distance of:

A. 25 meters (82 feet).B. 100 meters (328 feet).C. 500 meters (1640 feet).D. 1000 meters (3280 feet).

Correct Answer: BSection: (none)Explanation

QUESTION 15Kim, a user, took a laptop on vacation and made changes to the configuration in order to use the device at thehotel. She can reach the Internet, but cannot access any internal network resources.Which of the following is the MOST likely reason?

A. Incorrect DNSB. Incorrect subnet maskC. Duplicate IP addressD. Incorrect SSID

Correct Answer: ASection: (none)Explanation

QUESTION 16Teachers and students at a school currently share the same bandwidth. The Internet performancefor the teachers in the classroom is becoming extremely slow. Which of the following is the BEST method tomitigate the issue?

A. Increased uptimeB. Caching enginesC. Traffic shapingD. Load balancing

Correct Answer: CSection: (none)Explanation

Explanation/Reference:

QUESTION 17The location where the Telco wiring stops and the clients wiring starts is known as the:

A. MDF.B. demarc.C. IDF.D. 66 block.

Correct Answer: BSection: (none)Explanation

QUESTION 18Blocking a known malicious web address by using the ACL on the firewall is an example of which of thefollowing?

A. IP filteringB. Application filteringC. MAC filteringD. Port filtering

Correct Answer: ASection: (none)Explanation

QUESTION 19A firewall that examines all the incoming traffic and decides if the traffic is going to be allowed though ordumped is a example of which of the following?

A. Packet sniffingB. Packet filter

C. Stateful inspectionD. Content filter

Correct Answer: CSection: (none)Explanation

QUESTION 20Two duplicate pieces of equipment can be used in conjunction for which of the following purposes? (SelectTWO).

A. High availabilityB. Fault toleranceC. Reduce latencyD. Wi-MAXE. CARP

Correct Answer: ABSection: (none)Explanation

Explanation/Reference:

QUESTION 21Which of the following improves wireless performance by allowing only one wireless transmission on thenetwork at a time?

A. CSMA/CAB. CSMA/CDC. Wireless encryptionD. Wireless bonding

Correct Answer: ASection: (none)Explanation

QUESTION 22Lisa, an administrator, is responsible for one Linux and two Windows servers. She would like to review allserver logs centrally. Which of the following services could Lisa use in this scenario?

A. Event logsB. BaselinesC. Change managementD. Syslog

Correct Answer: DSection: (none)Explanation

QUESTION 23Lisa, a network technician, needs to push changes out to network devices and also monitor the devices based

on each device's MIB. Which of the following should she use?

A. SNMPB. Traffic analysisC. SyslogD. Asset management

Correct Answer: ASection: (none)Explanation

QUESTION 24Kim, a network technician, needs to identify the MAC address of a device that is creating broadcast storms onthe network. Which of the following tools will provide the needed information?

A. History logsB. Network snifferC. Network mapsD. Traffic shaping

Correct Answer: BSection: (none)Explanation

QUESTION 25For security reasons Zach, a network technician, wants to install a Linux based email server, Microsoft webservices, and directory services on different servers. Which of the following technologies would be BEST toreduce hardware costs?

A. VPN concentratorB. Virtual serversC. WirelessD. Multimode fiber

Correct Answer: BSection: (none)Explanation

QUESTION 26Which of the following VPN methods is BEST used for connecting a remote office to the main company office?

A. WEP-to-WPAB. RDP-to-RASC. Client-to-siteD. Site-to-site

Correct Answer: DSection: (none)Explanation

QUESTION 27

Creating a uniform user environment throughout the network can BEST be achieved by using which of thefollowing?

A. HoneypotsB. Virtual switchesC. Virtual PBXD. Virtual desktops

Correct Answer: DSection: (none)Explanation

Explanation/Reference:

QUESTION 28Zach, an administrator, wants to eliminate remote access to a network from all users, except those users inZach's own country. Which of the following security measures could he use to set up this functionality?

A. MAC filteringB. Port filteringC. IP filteringD. TLS

Correct Answer: CSection: (none)Explanation

QUESTION 29Lisa, a network technician, has determined that the initial theory of probable cause was incorrect. Which of thefollowing would be the NEXT step in the troubleshooting process?

A. Implement the solutionB. Establish a planC. Document findingsD. Escalate the issue

Correct Answer: DSection: (none)Explanation

QUESTION 30Which of the following is the MAXIMUM hop count for RIP before the network is considered converged?

A. 1B. 5C. 10D. 15

Correct Answer: DSection: (none)Explanation

QUESTION 31Jeff, a technician, has identified a problem, established and confirmed a theory, and has attempted to resolvethe problem. Jeff, however, does not appear to have the rights to make the needed changes. Which of thefollowing should he do NEXT?

A. Re-establish a new theory.B. Gather more information.C. Establish a plan of action.D. Escalate the problem.

Correct Answer: DSection: (none)Explanation

Explanation/Reference:

QUESTION 32Jeff, a network administrator, has been requested to install wireless access throughout the entire building, whileutilizing a single SSID. Which of the following options will meet this requirement?

A. Set a separate VLAN on each WAP with the same encryption type.B. Set the SSID on each WAP and set contiguous WAPs to different channels.C. Set the SSID on each WAP and set contiguous WAPs to the same channel.D. Set a separate VLAN on each WAP with the same frequency.

Correct Answer: BSection: (none)Explanation

QUESTION 33Which of the following should Kim, a technician, update when new computers are purchased?

A. Asset managementB. Change managementC. Cable managementD. Baselines

Correct Answer: ASection: (none)Explanation

Explanation/Reference:

QUESTION 34Lisa, a technician, is asked to not allow FTP traffic on a network. Which of the following ports should beblocked on the firewall to achieve this?

A. 21B. 22C. 23D. 25

Correct Answer: ASection: (none)Explanation

QUESTION 35Kim, a technician, needs to test if domain name resolution is functioning properly. Which of the followingsoftware tools would she use to accomplish this? (Select TWO).

A. arpB. digC. routeD. nslookupE. netstat

Correct Answer: BDSection: (none)Explanation

Explanation/Reference:

QUESTION 36Which of the following DNS records would be queried to locate a company's mail server?

A. AB. MXC. AAAAD. CNAME

Correct Answer: BSection: (none)Explanation

QUESTION 37Which of the following protocols would Lisa, a technician, use to disable switch ports automatically to preventswitching loops?

A. RIPB. OSPFC. STPD. EGP

Correct Answer: CSection: (none)Explanation

QUESTION 38Which of the following network appliances can BEST be described as allowing multiple servers to sharerequests for a website through the same public IP address?

A. VPN concentrator

B. Content filterC. Load balancerD. Proxy server

Correct Answer: CSection: (none)Explanation

QUESTION 39Jeff, a company executive, has noticed that a wireless network signal from the company's WAP can be seen inthe company's parking lot. Jeff is very worried that this is a potential security threat. Which of the following canbe done to eliminate this threat?

A. Implement WEP encryptionB. Decrease signal strengthC. Change wireless channelsD. Rotate the SSID daily

Correct Answer: BSection: (none)Explanation

QUESTION 40Jeff, a network administrator, is installing an 802.11n network. Which of the following should he considerFIRST?

A. PlacementB. MAC filteringC. ChannelD. VTP configuration

Correct Answer: ASection: (none)Explanation

Explanation/Reference:

QUESTION 41Jeff, a network administrator, needs to forward HTTP traffic from a SOHO firewall public IP to the internal webserver's private IP. Which of the following can Jeff implement?

A. DNSB. NATC. PKID. RAS

Correct Answer: BSection: (none)Explanation

QUESTION 42

Which of the following ports are MOST commonly used to interactively configure a networking device? (SelectTWO).

A. 21B. 22C. 23D. 53E. 67

Correct Answer: BCSection: (none)Explanation

QUESTION 43Which of the following DNS record types is used for IPv6 resolution?

A. MXB. AAAAC. AD. PTR

Correct Answer: BSection: (none)Explanation

QUESTION 44A company wishes to have a wireless signal broadcast only through a specific stretch of a highway tunnel.Which of the following measures will accomplish this?

A. WPA encryptionB. MAC filteringC. Changing antenna typeD. Decreasing radio strength

Correct Answer: CSection: (none)Explanation

Exam D

QUESTION 1Zach, a user, is unable to logon to his domain from his desktop PC. A cable certifier is used and shows a highvalue of NEXT. Which of the following represents the cause?

A. CrosstalkB. TX/RX reversedC. Split cablesD. DB loss

Correct Answer: ASection: (none)Explanation

QUESTION 2Lisa, a user, is unable to map a drive to a known NetBIOS share. A ping from the client to the server issuccessful. Which of the following software tools is used to check if NetBIOS is enabled?

A. netstatB. arpC. nbtstatD. nslookup

Correct Answer: CSection: (none)Explanation

QUESTION 3In order to reduce spam email, Kim, a network administrator, changes the standard SMTP port from which ofthe following port numbers to port number 587?

A. 20B. 21C. 23D. 25

Correct Answer: DSection: (none)Explanation

Explanation/Reference:

QUESTION 4A company would like all HTTP traffic to filter through a proxy server on port 8080. Which of the following portnumbers needs to be redirected through the proxy server to accomplish this?

A. 20B. 80C. 143D. 443

Correct Answer: BSection: (none)Explanation

QUESTION 5As a best practice, which of the following should be assigned to a network's main server?

A. LeaseB. Dynamic IP addressC. Static IP addressD. Scope

Correct Answer: CSection: (none)Explanation

QUESTION 6A company wants to only allow incoming HTTP and HTTPS traffic on their public wireless network. Which ofthe following port numbers should be the only allowed open ports on the firewall to accomplish this? (SelectTWO).

A. 20B. 80C. 143D. 443E. 8080

Correct Answer: BDSection: (none)Explanation

Explanation/Reference:

QUESTION 7Kim, an employee, connects to a work computer from home via the built-in Windows remote desktopconnection. Which of the following is she MOST likely using to establish the connection?

A. RDPB. RTPC. RIPD. RAS

Correct Answer: ASection: (none)Explanation

QUESTION 8A SOHO office recently installed a wireless network for employees to use during lunch breaks. As such, theaccess point was placed in the kitchen area by the microwave. Employees have been reporting intermittentconnectivity when using the wireless network. Which of the following would BEST improve connectivity?

A. Disable SSID broadcastB. Increase the signal strengthC. Move the access pointD. Change the broadcast channel

Correct Answer: CSection: (none)Explanation

Explanation/Reference:

QUESTION 9Which of the following is the default subnet mask for a Class B address?

A. 255.0.0.0B. 255.255.0.0C. 255.255.255.0D. 255.255.255.255

Correct Answer: BSection: (none)Explanation

QUESTION 10Which of the following wireless technologies has the LARGEST cell size?

A. 802.11aB. 802.3afC. 802.11gD. 802.11i

Correct Answer: CSection: (none)Explanation

QUESTION 11Which of the following is similar to MIMO?

A. WPAB. SSIDC. PoED. Diversity

Correct Answer: DSection: (none)Explanation

QUESTION 12RADAR avoidance technologies are built into which of the following technologies?

A. 802.11a

B. 802.11bC. 802.11gD. 802.11i

Correct Answer: ASection: (none)Explanation

Explanation/Reference:

QUESTION 13Which of the following occurs when antenna gain is increased on an access point?

A. Connection speeds decreaseB. Throughput decreasesC. Cell size increasesD. Attenuation increases

Correct Answer: CSection: (none)Explanation

QUESTION 14Which encryption type uses only a 28 character key?

A. 40/64 bit WEPB. 104/128 bit WEPC. WPA2 PSKD. WPA Personal

Correct Answer: BSection: (none)Explanation

QUESTION 15Which of the following uses a Management Information Base (MIB) to monitor the network?

A. History LogsB. SyslogC. SMTPD. SNMP

Correct Answer: DSection: (none)Explanation

QUESTION 16Zach, a network administrator, is tasked with simplifying the review of events from network devices.Which of the following is used to accomplish this?

A. History logs

B. Event logsC. Syslog serverD. Traffic analyzer

Correct Answer: CSection: (none)Explanation

QUESTION 17Jeff, a technician, is troubleshooting connectivity issues with a new data circuit. Jeff verifies that the ST fiberjumper is good. Which of the following is the problem?

A. TX/RX reversedB. InterferenceC. Cable lengthD. Bad connectors

Correct Answer: ASection: (none)Explanation

Explanation/Reference:

QUESTION 18Frames are the Protocol Data Unit for which of the following layers of the OSI model?

A. Layer 1B. Layer 2C. Layer 3D. Layer 4

Correct Answer: BSection: (none)Explanation

Explanation/Reference:

QUESTION 19Kim, the client, has requested a cost-effective network solution to accommodate the ability to reconfigure theoffice space as needed. Which networking solution would provide the BEST solution?

A. Private IP AddressingB. Wireless Access PointsC. Wide Area NetworkingD. Virtual Local Area Networks

Correct Answer: BSection: (none)Explanation

QUESTION 20

Which of the following servers would MOST likely be placed in a DMZ?

A. Proxy ServerB. Web ServerC. File ServerD. Intranet Server

Correct Answer: BSection: (none)Explanation

Explanation/Reference:

QUESTION 21Lisa, an administrator, must connect to a remote UNIX server securely. Which of the following would be theMOST secure connection method?

A. FTPB. PPPC. TelnetD. SSH

Correct Answer: DSection: (none)Explanation

QUESTION 22How many collision domains and broadcast domains are present on a 24-port switch with no VLANassignments?

A. 1 collision domain, 1 broadcast domainB. 1 collision domain, 24 broadcast domainsC. 24 collision domains, 1 broadcast domainD. 24 collision domains, 24 broadcast domains

Correct Answer: CSection: (none)Explanation

QUESTION 23Users report that an internal web server is not responding. Which of the following commands could be used onthe server to confirm that the web service is running?

A. nbtstatB. tracerouteC. nslookupD. netstat

Correct Answer: DSection: (none)Explanation

Explanation/Reference:

QUESTION 24When configuring a wireless access point, Zach, a network administrator, needs to determine the MAC addressof a local printer. Which of the following commands would be MOST helpful in determining the MAC address?

A. pingB. arpC. routeD. dig

Correct Answer: BSection: (none)Explanation

QUESTION 25Kim, an administrator, has detected a worm spreading throughout the network. Which of the following ACLscan be configured on a Layer2 switch port to mitigate the attack?

A. Drop 19:21:68:10:20:00B. Permit ::1/32C. Permit A0:H1:B0:90:1D:6CD. Drop 192.168.10.20

Correct Answer: ASection: (none)Explanation

Explanation/Reference:

QUESTION 26Which of the following MUST be used to implement a wireless network supporting EAP-TTLS?

A. KerberosB. Two factor authenticationC. CHAPD. PKI

Correct Answer: DSection: (none)Explanation

QUESTION 27After installing a SOHO wireless router, Jeff, the network administrator, notices that all internal RFC 1918 IPaddresses are being logged by an Internet web server as coming from the router's public interface IP address.Which of the following must Jeff implement to assign a different public IP from the router's public interface IPaddress to one of the workstations in the office?

A. NATB. PATC. DMZ

D. ACL

Correct Answer: ASection: (none)Explanation

QUESTION 28After running a CAT6 cable from the maintenance office 80 floors above the network closet, users are reportinglack of connectivity. Which of the following is the MOST likely cause?

A. Cable placementB. CrosstalkC. Bad wiringD. Cable length

Correct Answer: DSection: (none)Explanation

QUESTION 29Lisa, a technician, is testing a CAT6 cabling run. The speed of the cable is showing 100Mbps instead of 1Gbps.Which of the following is the reason?

A. Bad connectorsB. TX/RX reversedC. Packet lossD. Distance

Correct Answer: DSection: (none)Explanation

QUESTION 30When running cable in an office building, which of the following should Zach, a technician, consider to helpreduce EMI?

A. Cable distanceB. Cable placementC. Connector typesD. PoE devices

Correct Answer: BSection: (none)Explanation

Explanation/Reference:

QUESTION 31Which of the following protocols is used by the ping command?

A. SMTP

B. ICMPC. TFTPD. ARP

Correct Answer: BSection: (none)Explanation

QUESTION 32Which of the following could be BEST described as multiple operating system environments running at thesame time on a single physical server?

A. Traffic ShapingB. VirtualizationC. Load BalancingD. VPN tunneling

Correct Answer: BSection: (none)Explanation

QUESTION 33Jeff, a user, is having intermittent connectivity problems. The technician discovers that the network cable fromJeff's desktop is run next to a user's desk where a large file cabinet has been placed on top of the wire. Whichof the following is the MOST probable cause of the intermittent connectivity problems?

A. Split cablesB. DB lossC. EMID. TX/RX reversed

Correct Answer: ASection: (none)Explanation

QUESTION 34Zach, a user, cannot access the Internet. A similar problem occurred several times last week to other users,and the solution was to reboot each workstation. As the first step, the technician reboots the workstation and itdoes not solve the problem. Which of the following should have been done instead?

A. Change the DNS server IP on the clientB. Information gatheringC. Change the workstation IP addressD. Establish a plan of action

Correct Answer: BSection: (none)Explanation

QUESTION 35Which of the following is the BEST encryption protocol to use to allow customers to access a secure website

from the Internet without using VPNs?

A. IPSecB. TLSC. SSL version 1D. SSL version 2

Correct Answer: BSection: (none)Explanation

QUESTION 36Lisa, a technician, is troubleshooting a problem with a managed network switch. She determines the resolutionto the problem is beyond her experience level. Which of the following should Lisa do NEXT?

A. Question usersB. Test the theoryC. Re-establish a theory of probable causeD. Escalate the problem

Correct Answer: DSection: (none)Explanation

Explanation/Reference:

QUESTION 37Which of the following circuits provides the MOST bandwidth?

A. T3B. OC3C. T1D. PRI

Correct Answer: BSection: (none)Explanation

Explanation/Reference:

QUESTION 38Jeff, a network technician, has been asked to add a web server and email server to the company's network.The company's stateful firewall must remain in place to prevent any external originating traffic from entering theinternal network segment. Which of the following is the BEST solution to ensure protecting the internal networkand implementing the new servers?

A. Block all TCP Port 80 trafficB. Enable WPA encryptionC. Create a DMZD. Add an implicit deny to the firewall

Correct Answer: C

Section: (none)Explanation

QUESTION 39Which of the following are components of IPSec? (Select TWO).

A. AHB. ESPC. SSHD. ICAE. TLS

Correct Answer: ABSection: (none)Explanation

QUESTION 40An organization recently installed a firewall on the network. Employees must be able to send and receive emailfrom a POP3 server. In which of the following ways should the firewall be configured? (Select TWO).

A. Allow TCP port 23B. Allow TCP port 25C. Allow TCP port 110D. Allow UDP port 25E. Allow UDP port 110

Correct Answer: BCSection: (none)Explanation

QUESTION 41Lisa, a technician, replaced the CAT6 cable from the server to the patch panel. Before the cable was replaced,there were no issues with connectivity. Immediately after the cable was replaced, users report that they areunable to access a database application on the server. Which of the following is the MOST likely reason for theinaccessibility?

A. Lisa used a short patch cable.B. Lisa used a cable with an RJ-45 connector.C. Lisa used a crossover cable.D. Lisa used a patch cable that was over 50 meters long.

Correct Answer: CSection: (none)Explanation

QUESTION 42Which of the following is occurring when Jeff, an employee, unintentionally gives information that is usedmaliciously?

A. TailgatingB. DoS attack

C. DDoS attackD. Social engineering

Correct Answer: DSection: (none)Explanation

QUESTION 43Which of the following attacks creates a buffer overflow to stop access to a system?

A. Blue jackingB. DoSC. NetstatD. Man-in-the-middle

Correct Answer: BSection: (none)Explanation

QUESTION 44At which of the following layers of the OSI model does an unmanaged switch operate?

A. Layer 1B. Layer 2C. Layer 3D. Layer 4

Correct Answer: BSection: (none)Explanation

Explanation/Reference:

Exam E

QUESTION 1When using high bandwidth applications over multiple WAN connections, which of the following should beused?

A. Static IP addressingB. Half-duplexC. PoE devicesD. Load balancing

Correct Answer: DSection: (none)Explanation

QUESTION 2Kim, an administrator, is attempting to connect a laptop to a server via RJ-45 ports on both adevice and a CAT5 patch cable. All of the IP settings have been verified to be correct, yet there is a connectivityproblem. Which of the following would MOST likely fix the IP connectivity problem?

A. Wires 1, 2 and 3, 6 need to be swapped on one end of the connecting cable.B. Use the DB-9 port with a DB-9 to RJ-45 adapter on the server.C. Manually adjust the duplex mode on the server's link.D. Configure the laptop to receive a DHCP address from the server, rather than manually setting one.

Correct Answer: ASection: (none)Explanation

Explanation/Reference:

QUESTION 3Jeff, a user, reports very slow network access. He has spoken to other users, and no one else is experiencingnetwork problems. Which of the following is the NEXT step in troubleshooting this issue?

A. Determine if anything has changed.B. Upgrade the user to a gigabit speed.C. Replace the user's network card.D. Set the switch port to full-duplex.

Correct Answer: ASection: (none)Explanation

QUESTION 4To achieve MAXIMUM bandwidth throughput, 802.11n clients should use which of the following?

A. Only the 5GHz bandB. Only the 2.4GHz bandC. Only the 900MHz bandD. Both 2.4GHz and 5GHz bands

Correct Answer: ASection: (none)Explanation

QUESTION 5Jeff, a user, reports getting a "This page cannot be displayed" error message in his web browser. However, Jeffcan ping the default gateway. Which of the following is the MOST likely cause of the problem?

A. SSL certificates are expiredB. Incorrect WINS serverC. The browser is unsupportedD. Incorrect DNS settings

Correct Answer: DSection: (none)Explanation

QUESTION 6A small business would like to connect a second building on their property to the network. The building is about200 meters (656 feet) away from the main building. Which of the following would be the MOST cost-effectivemethod to supply a gigabit Ethernet connection to the second building?

A. 10GBase-LWB. 1000Base-LXC. 1000Base-SXD. 1000BaseT

Correct Answer: CSection: (none)Explanation

QUESTION 7Kim, a company's network technician, receives a report in the morning about Internet service being down at thesite. Kim was informed yesterday that there was a water main break in front of the site, and repair work wasgoing to be performed. She notices that there are workers currently performing the repair. To test to make surethere are no internal network issues, a laptop is plugged into the border router to test connectivity to theInternet. The laptop fails to connect to the Internet. Which of the following should be performed according to thenetwork troubleshootingmethodology?

A. Ask the accounting department if all bills were paid to the Internet service provider.B. Verify the Internet is fully restored and notify employees of the restoration.C. Question the employees of the severity of the Internet outages by email.D. Notify employees of the outage and contact the service provider of the demarc.

Correct Answer: DSection: (none)Explanation

Explanation/Reference:

QUESTION 8

Lisa, a network technician, would like to keep the IP address of the Human Resource department's server inthe same group of 100 DHCP IP addresses that are assigned to the Human Resource department's employeeworkstations. Which of the following would BEST allow this and have the ability for the server to keep the sameIP address?

A. Implement a set of static IPs for the entire human resource department.B. Use a DHCP reservation for the server IP address.C. Use a small DHCP scope for the human resource department.D. Connect the server to a router in the network closet on the same floor.

Correct Answer: BSection: (none)Explanation

QUESTION 9Kim, a new employee, is unable to get to the department's server while other employees are having no issues.The network administrator has verified that Kim has permission to the server and the workstation is able to getto other network resources. Which of the following is the MOST likely cause?

A. The department server is having network issues.B. Kim's workstation is a part of the wrong VLAN.C. The onboard NIC has outdated drivers installed.D. The wireless NIC has not been enabled for Kim's workstation.

Correct Answer: BSection: (none)Explanation

QUESTION 10Lisa, a network administrator, wants to be able to block all already known malicious activity. Whichof the following would allow her to perform this activity?

A. Behavioral Based IDSB. Signature Based IDSC. Behavioral Based IPSD. Signature Based IPS

Correct Answer: DSection: (none)Explanation

Explanation/Reference:

http://www.gratisexam.com/

QUESTION 11During the day Kim, an administrator, noticed the network slowing down. Within an hour, the network wasshowing 100% utilization. While investigating the issue, Kim notices that most of the traffic is coming from one

switch. Which of the following scenarios is MOST likely the cause?

A. The switch was configured for QoS and was bottlenecking all traffic.B. Kim has implemented VLAN trunking on the switch.C. A user has moved a laptop from one wall jack to another triggering port security.D. A user plugged both ends of a patch cable into the switch jacks.

Correct Answer: DSection: (none)Explanation

Explanation/Reference:

QUESTION 12Lisa, a technician, is asked to install a wireless network for two neighboring buildings. Which of the followingwireless signals will MOST easily penetrate obstructions, such as walls and doors?

A. 802.11aB. 802.11gC. 802.11n 5GHzD. 802.11n 5GHz wide band

Correct Answer: BSection: (none)Explanation

QUESTION 13Zach, a network technician, is installing a 48 port switch. Zach is configuring the switch to avoid switch looping.Which of the following should the technician enable?

A. Full duplexB. MAC filteringC. Spanning treeD. Port mirroring

Correct Answer: CSection: (none)Explanation

QUESTION 14Lisa, a network technician, is troubleshooting a port on a switch that does not allow other devices tocommunicate to each other. Which of the following is MOST likely the cause?

A. Wrong DNS serverB. VLAN assignmentC. Bad SFP moduleD. Missing routes

Correct Answer: BSection: (none)Explanation

QUESTION 15Zach, a technician, is installing a new wireless network. There are currently no wireless devices in the area.Which of the following should Zach consider before installing the new devices?

A. FrequenciesB. SSID broadcastC. WAP placementD. Channels

Correct Answer: CSection: (none)Explanation

QUESTION 16Zach, a user, cannot access any network resources. The technician has determined that the problem is isolatedto Zach, and that there have not been any changes to his workstation or switch port recently. Which of thefollowing steps in the troubleshooting methodology should the technician do NEXT?

A. Establish a plan of action to resolve the problem.B. Implement preventative measures.C. Implement the solution or escalate as necessary.D. Establish a theory of probable cause.

Correct Answer: DSection: (none)Explanation

QUESTION 17Zach, a customer, wants to network several computers within a large warehouse. The warehouse has onecomputer at the very far end of the warehouse that is 170 meters (557 feet) from the network switch. Which ofthe following cable types should a technician use for this computer?

A. CAT3B. CAT5C. CAT6D. Fiber

Correct Answer: DSection: (none)Explanation

QUESTION 18Which of the following has to be defined to guarantee a computer always has a private IP address of 10.4.0.5?

A. ScopeB. LeaseC. ReservationD. Dynamic IP addressing

Correct Answer: CSection: (none)

Explanation

Explanation/Reference:

QUESTION 19Switch A is configured with VLAN 105 and 106. Switch B is configured with VLAN 105 and 107. Both switchesare connected with a fiber cable. In order for packets from all VLANs to cross the fiber cable, which of thefollowing configurations MUST be present?

A. Reverse ARPB. Full duplex on the fiber linkC. PoED. 802.1q trunking

Correct Answer: DSection: (none)Explanation

QUESTION 20After installing new cabling, Kim, a technician, notices that several computers are connecting to networkresources very slowly. Which of the following tools would BEST help in determining if the new cabling is thecause of the problem?

A. MultimeterB. Cable certifierC. Cable testerD. Toner probe

Correct Answer: BSection: (none)Explanation

QUESTION 21Zach, a user, on a network cannot access any network resources. The link light on his computer shows that aconnection is present. Which of the following is the MOST likely cause of the problem?

A. The wrong cable type has been used.B. IDS has shut down the computer's switch port.C. The port on the switch is configured incorrectly.D. Spanning tree protocol was implemented.

Correct Answer: CSection: (none)Explanation

Explanation/Reference:

QUESTION 22Lisa, a network administrator, needs to facilitate traffic from several VLANs over a single port. Which of thefollowing configuration changes would facilitate access?

A. Traffic filtering

B. TrunkingC. MAC filteringD. Port mirroring

Correct Answer: BSection: (none)Explanation

QUESTION 23Logically separating the ports on a switch without physically separating them can be done using which of thefollowing?

A. Routing tablesB. Hub logicC. Spanning tree protocolD. VLANs

Correct Answer: DSection: (none)Explanation

Explanation/Reference:

QUESTION 24Kim, a network administrator, needs to add an additional connection to a room. She adds a new Ethernetswitch and must connect it to an existing switch. Which cable type should Kim use to connect the two switches?

A. CAT3 cableB. Serial cableC. Crossover cableD. Rollover cable

Correct Answer: CSection: (none)Explanation

QUESTION 25Zach, a network administrator, wants to separate the network into broadcast domains. Which of the followingcan he use? (Select TWO).

A. WAPsB. RoutersC. Patch panelsD. HubsE. BridgesF. VLANs

Correct Answer: BFSection: (none)Explanation

QUESTION 26Which of the following is the common port used for IMAP?

A. 25B. 53C. 143D. 443

Correct Answer: CSection: (none)Explanation

Explanation/Reference:

QUESTION 27Which of the following wiring standards has both ends colored as follows: orange-white, orange, green-white,blue, blue-white, green, brown-white, brown?

A. T568AB. T568BC. Multimode fiberD. Crossover

Correct Answer: BSection: (none)Explanation

QUESTION 28Zach, a technician, working remotely cannot connect to the database server. The server does not respondwhen he tries to ping it. Zach wants to determine which network device is preventing ping from responding.Which of the following commands should he use to determine this?

A. tracertB. nslookupC. digD. ipconfig

Correct Answer: ASection: (none)Explanation

QUESTION 29Which of the following connectors push and twist on?

A. STB. LCC. MTRJD. SC

Correct Answer: ASection: (none)Explanation

QUESTION 30Which of the following 802.11 standards transmits the signals the GREATEST distance?

A. aB. bC. gD. n

Correct Answer: DSection: (none)Explanation

QUESTION 31Which of the following 802.11 standards is MIMO used in?

A. aB. bC. gD. n

Correct Answer: DSection: (none)Explanation

QUESTION 32Which of the following wireless encryption methods provides the LEAST amount of security?

A. WEPB. WPAC. WPA2 EnterpriseD. WPA PSK

Correct Answer: ASection: (none)Explanation

Explanation/Reference:

QUESTION 33STP prevents which of the following problems?

A. Collision domainsB. Switching loopsC. Broadcast stormsD. Routing loops

Correct Answer: BSection: (none)Explanation

QUESTION 34Antenna gain is measured in which of the following units?

A. dBiB. GHzC. mWD. MHz

Correct Answer: ASection: (none)Explanation

QUESTION 35Horizontal cable is terminated on which device in the wiring closet?

A. DemarcB. SwitchC. Punch down toolD. Patch panel

Correct Answer: DSection: (none)Explanation

QUESTION 36Which of the following is the standard 802.11g channel separation?

A. 11 MHzB. 20 MHzC. 54 MHzD. 20 GHz

Correct Answer: BSection: (none)Explanation

QUESTION 37Zach, a technician, wants to provide the MOST wireless security on the LAN but does not have a RADIUSserver. Which technology should be used?

A. PEAPB. WPA PersonalC. WPA2 EnterpriseD. WPA2 PSK

Correct Answer: DSection: (none)Explanation

Explanation/Reference:

QUESTION 38Which of the following technologies allows more than two transceivers with an access point?

A. MIMOB. FIFOC. 802.1xD. WPA

Correct Answer: ASection: (none)Explanation

QUESTION 39Which of the following will a firewall NOT protect the network from?

A. IntrusionB. DDoSC. Denial of ServiceD. Spam e-mails

Correct Answer: DSection: (none)Explanation

Explanation/Reference:

QUESTION 40Which of the following would Jeff, a technician, use for a service that needs fast communication and isunaffected by packet loss?

A. UDPB. ARPC. ICMPD. TCP

Correct Answer: ASection: (none)Explanation

QUESTION 41A bridge handles frames at which of the following layers of the OSI model?

A. NetworkB. SessionC. TransportD. Data Link

Correct Answer: DSection: (none)Explanation

QUESTION 42Zach, a technician, is checking newly installed CAT5e cabling, and suspects that some of the ends were notproperly terminated. Which of the following tools will verify this?

A. Cable testerB. Toner probeC. OTDRD. Loopback plug

Correct Answer: ASection: (none)Explanation

QUESTION 43Which of the following technologies allows for redundant links within a Layer 2 segment?

A. OSPFB. RIPC. Port MirroringD. Spanning Tree

Correct Answer: DSection: (none)Explanation

Explanation/Reference:

QUESTION 44Which of the following BEST describes a switch port?

A. Broadcast domainB. Distance vectorC. Link stateD. Collision domain

Correct Answer: DSection: (none)Explanation

QUESTION 45Jeff, a user, is having a problem with a POTS line. Which of the following tools would Jeff use to make sure thephone lines have a dial tone?

A. Loopback plugsB. Butt setC. Cable certifierD. Toner probe

Correct Answer: BSection: (none)Explanation

QUESTION 46Which of the following can Jeff, a network technician, change to help limit war driving?

A. Signal strengthB. SSIDC. FrequencyD. Channel

Correct Answer: ASection: (none)Explanation

Explanation/Reference:

QUESTION 47In which of the following wireless standards is MIMO used?

A. 802.11aB. 802.11bC. 802.11gD. 802.11n

Correct Answer: DSection: (none)Explanation

QUESTION 48Which of the following utilities would Kim, a technician, use to resolve the FQDN of a web server to its IPaddress?

A. netstatB. routeC. nslookupD. arp

Correct Answer: CSection: (none)Explanation

QUESTION 49Which of the following is the usual number of bits for the host identifier part of an IPv6 address?

A. 16B. 32C. 48D. 64

Correct Answer: DSection: (none)Explanation

QUESTION 50Which of the following layers of the OSI model maps to the Network Interface layer of the TCP stack? (SelectTWO).

A. PhysicalB. SessionC. Data LinkD. NetworkE. Transport

Correct Answer: ACSection: (none)Explanation

QUESTION 51Which of the following could Kim, a network technician, use to inspect connection setup, request, and responseheaders for users connecting to a web server?

A. nbtstat commandB. dig commandC. ipconfig commandD. Protocol analyzer

Correct Answer: DSection: (none)Explanation

QUESTION 52DNS lookups for a given host are intermittently failing. Which of the following would Kim, a technician, MOSTlikely use to verify this problem?

A. arpB. nbtstatC. tracerouteD. dig

Correct Answer: DSection: (none)Explanation

QUESTION 53Which of the following would be used to identify terminations in a punch block for which the wiring diagram hasbeen lost?

A. OTDRB. Protocol analyzerC. Toner probeD. TDR

Correct Answer: C

Section: (none)Explanation

Explanation/Reference:

QUESTION 54Which of the following would Jeff, a technician, MOST likely use to remotely verify port configuration of aswitch?

A. traceroute commandB. SNMP monitorC. nbtstat commandD. dig command

Correct Answer: BSection: (none)Explanation

QUESTION 55Lisa, a user, reports increased delays and timeouts when trying to reach several Internet sites. Which of thefollowing would MOST likely be used when investigating the problem at Lisa's workstation?

A. nslookupB. routeC. nbtstatD. arp

Correct Answer: ASection: (none)Explanation

QUESTION 56Which of the following performance optimization techniques would be MOST beneficial for a network-wide VoIPsetup? (Select TWO).

A. Proxy serverB. Traffic shapingC. Caching enginesD. Load balancingE. Quality of service

Correct Answer: BESection: (none)Explanation

QUESTION 57Kim, a network administrator, should consult which documentation sources FIRST to determine the cause ofrecent network issues?

A. Network mapB. Cable management

C. Change managementD. Asset management

Correct Answer: CSection: (none)Explanation

Explanation/Reference:

QUESTION 58Zach, a network technician, is troubleshooting signal problems with certain WAPs in an office and findsconsistently high ping times across the units. Such an issue is called which of the following?

A. LatencyB. AttenuationC. CrosstalkD. Frequency hopping

Correct Answer: ASection: (none)Explanation

QUESTION 59Which of the following is the broadcast address for a network defined as 192.168.0.0/24?

A. 192.168.0.255B. 192.168.0.1C. 192.168.0.0D. 192.168.0.253

Correct Answer: ASection: (none)Explanation

Explanation/Reference:

QUESTION 60Which of the following protocols is used to securely connect to a multi-layer switch?

A. HTTPB. SMTPC. SSHD. Telnet

Correct Answer: CSection: (none)Explanation

QUESTION 61Which of the following TCP/IP and OSI model layers retransmits a TCP packet if it is not received successfullyat its destination?

A. The transport OSI model layer and the transport TCP/IP model layerB. The transport OSI model layer and the Internet TCP/IP model layerC. The network OSI model layer and the transport TCP/IP model layerD. The network OSI model layer and the Internet TCP/IP model layer

Correct Answer: ASection: (none)Explanation

QUESTION 62Which of the following network appliances would facilitate an even amount of traffic hitting each web server?

A. Load balancerB. VPN concentratorC. Proxy serverD. Content filter

Correct Answer: ASection: (none)Explanation

Explanation/Reference:

QUESTION 63Which of the following can Joe, a network technician, change to help limit war driving?

A. Signal strengthB. SSIDC. FrequencyD. Channel

Correct Answer: ASection: (none)Explanation

QUESTION 64A packet sniffer is MOST likely used to do which of the following?

A. Prevent network based attacksB. Capture and analyze network trafficC. Route IP packets to remote destinationsD. Record the switch ARP table

Correct Answer: BSection: (none)Explanation

QUESTION 65Which of the following ports carries IMAP traffic, by default, on modern email systems?

A. 23B. 25C. 80D. 143

Correct Answer: DSection: (none)Explanation

Explanation/Reference:

QUESTION 66Which of the following security threats relies primarily on user deception and misinformation?

A. Rogue access pointsB. DoS attacksC. Man-in-the-middle attacksD. Phishing

Correct Answer: DSection: (none)Explanation

Explanation/Reference:

QUESTION 67Which of the following protocols would Kurt, a technician, use to synchronize local date and time of a clientworkstation to that of a server?

A. RTPB. NTPC. TFTPD. ARP

Correct Answer: BSection: (none)Explanation

QUESTION 68Which of the following services would Karen, a technician, use to create or update a client's DNS 'A' and 'PTR'records automatically?

A. KerberosB. BINDC. WINSD. DHCP

Correct Answer: DSection: (none)Explanation

QUESTION 69Kurt, a customer, has been using a combination of SSID disable and WEP encryption for wireless security.Lately there have been many unauthorized devices on Kurt's wireless network. Which of the following shouldalso be implemented to prevent unauthorized devices from connecting? (Select TWO).

A. SSID should be changed daily and enabled.B. WEP should be replaced with WPA encryption.C. MAC filtering should be enabled and configured.D. A different WAP manufacturer should be used to prevent commonly used security cracking techniquesE. Omni-directional antennas should be used to limit signal strength

Correct Answer: BCSection: (none)Explanation

QUESTION 70Joe, a client, has observed non-employees sitting in his parking lot and surfing on his unsecured wirelessconnection. Which of the following could be employed to potentially prevent this? (Select TWO).

A. PoEB. VLANsC. MTU black holeD. GBIC installationE. WPAF. Reduction of signal gain

Correct Answer: EFSection: (none)Explanation

Explanation/Reference:

QUESTION 71Which of the following cable mediums is NOT susceptible to EMI?

A. WirelessB. FiberC. CoaxialD. UTP

Correct Answer: BSection: (none)Explanation

QUESTION 72CAT6 Ethernet cabling has a rated maximum transmission capability of:

A. 10MbpsB. 100MbpsC. 20,000MbpsD. 10,000Mbps

Correct Answer: DSection: (none)Explanation

QUESTION 73Which of the following is a high performance WAN protocol that operates at the physical and data link layers ofthe OSI model?

A. 802.11gB. Asynchronous transfer modeC. Asymmetric digital subscriberD. Frame relay

Correct Answer: DSection: (none)Explanation

Explanation/Reference:

About Lead2pass.com

Lead2pass.com was founded in 2006. We provide latest & high quality IT Certification Training ExamQuestions, Study Guides, Practice Tests. Lead the way to help you pass any IT Certification exams, 100%Pass Guaranteed or Full Refund. Especially Cisco, CompTIA, Citrix, EMC, HP, Oracle, VMware, Juniper,Check Point, LPI, Nortel, EXIN and so on.

Our Slogan: First Test, First Pass.

Help you to pass any IT Certification exams at the first try.

You can reach us at any of the email addresses listed below.

Sales: [email protected]

Support: [email protected]

Technical Assistance Center: [email protected]

Any problems about IT certification or our products, you could rely upon us, we will give you satisfactoryanswers in 24 hours.

http://www.gratisexam.com/