When the DHCP server is unavailable for a network, how will PCs attempt to configure their NICs?
A. PCs will attempt to use the last address assigned to them.
B. PCs will pull from a static address pool.
C. PCs will use APIPA.
D. PCs will prompt the user for an address.
Which of the following protocols uses port 119, by default?
A company plans to implement a wired network between several computers. The company wants this
network to be able to have a transmission rate of 1Gbps. Which of the following cable types should be
Session affinity is a feature of which of the following devices?
A. DNS server
B. DHCP server
C. Load balancer
Which of the following describes 1Gigabit Ethernet?
A user in the accounting department reports that their office is able to connect to the network, but they are
unable to connect to the Internet. Which of the following documentation would be the MOST useful to the
administrator in diagnosing this issue? (Select TWO).
A. Physical network diagram
B. Job log
C. Acceptable use policy
D. Baseline documentation
E. Wiring schematic
Which of the following remote access methods allows an administrator to take control of a user's machine
and block the user from seeing the active session?
Which of the following is primarily used for VoIP?
Which of the following tools would allow an administrator to push out a software update to all switches on
A. Network management
B. Protocol analyzer
C. Network monitoring
D. System diagnostic
Which of the following wiring distribution components uses a bridge clip to connect both sides of the block?
A. 110 block
C. Smart jack
D. 66 block
Administrators are performing a war drive around their company's complex. Which of the following are they
attempting to detect?
B. Rogue access points
C. DDoS attacks
D. Bluesnarfing attacks
Which of the following is an interior routing protocol that is used to provide routing within autonomous
On a network switch, which of the following is the default native VLAN?
When setting up a wireless network to cover a large area, which of the following needs to be considered
A. Device placement
B. Encryption methods
C. Wireless channels
D. SSID name
Which of the following security threats involves making phone calls?
D. Xmas attack
Which of the following LAN technologies is defined as fast Ethernet?
A network consultant is asked to set up a wireless network in a home. The home user wants the wireless
network to be available in every comer of the house. Which of the following additional information will the
technician need to determine the equipment for the installation? (Select TWO).
A. The length of the house
B. How many rooms are in the house
C. How many users will be using the wireless network
D. The building material of the house
E. The cost of the house
A user plugged a cable between two network jacks that attach to the same switch and caused a broadcast
storm. Which of the following would have prevented the broadcast storm?
A. Spanning tree
B. VLAN tagging
D. Port mirroring
Which of the following protocols is used to encrypt data between web servers and web browsers?
Which of the following devices separates a LAN segment into two collision domains, without affecting the
When configured. MPLS can increase routing redundancy by providing which of the following network
On which of the following cables would a technician find a BNC connector installed?
Which of the following ping parameters will set the size of the outgoing packet?
Which of the following WAN technologies modulates 24 channels into a 1 5Mbps signal?
A company wants to secure access to its internal wireless network. The company wants to use the most
secure means to access the network. Which of the following is the BEST choice for wireless security in this
A. WEP encryption
B. Channel rotation
C. Disable SSID
D. WPA encryption
A user on a network cannot access any network resources. The link light on the computer shows that a
connection is present. Which of the following is the MOST likely cause of the problem?
A. The wrong cable type has been used.
B. IDS has shut down the computer's switch port.
C. The port on the switch is configured incorrectly
D. Spanning tree protocol was implemented.
At which of the following layers does the TCP protocol operate?
A. Layer 1
C. Layer 6
D. Layer 7
A technician is troubleshooting a network connectivity issue. Given the following abbreviated trace route
Which of the following is MOST likely occurring?
A. Switching loop
B. Broadcast storm
C. IP conflict
D. Routing loop
Which of the following configuration management documentation types would an administrator use to know
how and when to property install new network devices on the LAN?
A. Baseline configuration
B. Logical network diagram
C. Network policy
D. Wiring schematic
Which of the following applications is MOST likely to require QoS to ensure proper functionality?
D. Peer to peer
An administrator wants to limit the wireless guest network traffic to 100Kbps so that utilization issues do not
occur on the company's T1 Internet access network. Which of the following optimizations should the
A. Load balancing
B. Caching engine
C. Traffic shaping
D. Quality of service
Which of the following commands would be used to display the IP address on a UNIX/Linux computer?
A technician wants to test the DNS server ns.company.com to ensure it is able to resolve the company web
address. Which of the following command sequences will test DNS functionality?
Which of the following components is typically used for voice transmissions and has a 10Mbps maximum
A. 110 block
B. Patch panel
C. Vertical cross connect
D. 66 block
An administrator wants to be alerted when a network-based attack is underway, but the company policy
prohibits blocking or dropping network connections. Which of the following MUST be deployed?
D. Managed PKI
A company is about to install a second network connect on with a new ISP. Which of the following routing
protocols is the BEST choice?
A customer wants to network several computers within a large warehouse. The warehouse has one
computer at the very far end of the warehouse that is 170 meters (557 feet) from the network switch. Which
of the following cable types should a technician use for this computer?
Office A is located 500 miles (805 kilometers) away from Office B, yet they are on the same private
network. Which of the following is MOST likely being used to accomplish this scenario?
D. Peer to peer
Which of the following represents the physical address of a network access card?
New service from the telephone company is delivered over fiber, but the technician does not have a fiber
module for the router. Which of the following would remedy this issue?
B. Media converter
D. Fiber repeater
An administrator needs to update a router configuration for a router that does not support SSH. Which of
the following can be used to securely update the router configuration?
Which of the following is an invalid IPv4 address?
A layer 3 switch can move packets between subnets based on which of the following criteria?
A. 802.1q tag
D. IP address
Which of the following features is essential in a firewall if it is to support RTP sessions?
A. Remote console
C. Address translation
1000BaseT has a MAXIMUM run distance of:
A. 25 meters (82 feet)
B. 100 meters (328 feet)
C. 500 meters (1640 feet)
D. 1000 meters (3280 feet)
Which of the following features would BEST be used to optimize real-time voice and video chat? (Select
A. Load balancing
B. Caching engines
D. Fault tolerance systems
E. Traffic shaping
An administrator is unable to ping a workstation. Which of the following tools would BEST help to resolve
A. Cable tester
C. Toner probe
D. Protocol analyzer
A new company has been given one public IP address. The company employs 200 users requiring Internet
access from the headquarters. Which of the following can be implemented to provide Internet access for all
B. Proxy server
A technician is reporting wireless transmission speeds of 300Mbps. Which of the following wireless
standards is being used?
A user took a laptop on vacation and made changes to the configuration in order to use the device at the
hotel. The user can reach the Internet, but cannot access any internal network resources.
Which of the following is the MOST likely reason?
A. Incorrect DNS
B. Incorrect subnet mask
C. Duplicate IP address
D. Incorrect SSID
Which of the following ports does POP3 services use, by default?
In which of the following layers of the OSI model does the TCP protocol operate?
C. Data link
Which of the following would MOST likely be used to punch down LAN cables before connecting them to
the main switch?
B. 66 block
D. 110 block
A technician needs to manage a switch by using the management port on the back of the switch. Which of
the following cables would the technician use?
A network technician wants to use a packet analyzer to troubleshoot a reported problem with a user's
workstation with IP address 192.168.1.45. To identify the workstation's packets the technician wants to use
the workstation's MAC address. Which of the following protocols would provide the needed information?
Which of the following network appliances can BEST be described as allowing multiple servers to share
requests for a website through the same public IP address?
A. VPN concentrator
B. Content filter
C. Load balancer
D. Proxy server
A workstation is having connectivity issues when being added to the domain. Which of the following
commands would allow the administrator to see the DNS and WINS servers that are currently configured
for the workstation?
A SONET network typically uses which of the following transmission media?
A. Single-mode fiber
B. Multimode fiber
In order for computers with private IP addresses to access the public Internet, which of the following must
the router perform?
A link light on a switch is an example of which of the following Ethernet properties?
A. Collision detection
B. Multiple access points
C. Carrier sense
D. Collision avoidance
Which of the following is required if ports from VLANs on two separate switches need to broadcast to each
A. Port mirroring
D. Port authentication
A new department is formed and a new section of the building is being built out for them. All 50 new
employees will need access to the wireless network. Which of the following should be completed to allow
these new employees access to the wireless network?
A. Frequency settings should be changed
B. Additional WAPs should be installed
C. Channels should be changed
D. VLANs should be added
Which of the following describes an area where communications equipment is stored?
C. 110 block
Which of the following operates in the 2.4GHz range and has a MAXIMUM distance of 10 meters (33 feet)?
Which of the following networks would MOST likely require EGP routing?
A. Networks that use OSPF in addition to static routes
B. Networks with classless Internet domain routing
C. Networks with multiple ISPs
D. Networks that use encryption
A company needs strong wireless security enabled for minimal cost. Which of the following security
measures is the BEST to use?
B. Port filtering
D. Longer SSID broadcast intervals
A user reports being occasionally disconnected from the server. Which of the following tools could the
technician use to determine if it is the client or the server that is dropping the connection?
A. Packet sniffer
C. Load balancer
D. Throughput tester
Which of the following LAN technologies is considered fast Ethernet and uses two pairs of cabling, one pair
for sending and the other pair for receiving?
A technician needs to install additional access points for a new high speed connection being added in the
new office space. Which of the following will MOST likely be installed to allow additional CAT5 cable
A. Smart Jack
C. 110 Block
D. 66 Block
An administrator is implementing a second server due to the increased usage. Which of the following
optimization techniques is the administrator using?
A. Caching engines
C. Traffic shaping
D. Load balancing
Which of the following would be used to test out the security of a specific network by allowing it to receive
C. Vulnerability scanner
D. Network based IDS
A network technician is installing a new managed 10/100 Mbps switch on the network. The network has an
older printer with a 10Mbps network adapter that will be moved to the new switch. Which of the following
settings on the switch will need to be configured to support the printer?
A. MAC filtering
B. IP address
D. Port speed
An administrator is using a protocol analyzer to monitor traffic between two servers. However, the only
traffic that appears is broadcast and traffic originating from the administrator's PC. Which of the following
devices is the administrator plugged into?
Which of the following is a secure method of remote access via command line?
Which of the following DNS records would be queried to locate a company's mail server?
Which of the following uses copper wiring?
Which of the following protocols is used to disable switch ports automatically to prevent switching loops?
B. 0S: F
Which of the following commands provides similar information about the current configuration of active local
Ethernet adapters? (Select TWO).
Which of the following would be used to optimize network performance and increase bandwidth availability?
A. Packet analysis
C. Traffic shaping
D. Fault tolerance
A technician is using a packet sniffer to identify a server. The technician observes the following network
HOST-A TCP 80 -> HOST-B TCP 1328 PUSH
HOST-B TCP 1328 -> HOST-A TCP 80 PUSH ACK
HOST-A UDP 69 -> HOSTC UDP 1235
HOST-C ICMP -> HOST-D ICMP
Which of the following is MOST likely to be the server?
When ordering switches for a new building, which of the following is the BEST way for the technician to
determine the number of switches to put in each network closet?
A. Review the architectural plans to see how many drops go to each closet.
B. Count the number of rooms near each closet and standardize eight drops per room.
C. Wireless is the new standard and no network switches will be needed in the building,
D. Count the number of phone ports and configure two network ports for each phone port.
The network technician is troubleshooting a network issue by implementing a new security device. After
installing and configuring the device, which of the following steps should the technician take NEXT?
A. Verity full system functionality
B. Identify the main problem and question the user
C. Document their findings, actions, and outcomes
D. Escalate the issue to upper management
Which of the following would provide a technician with a performance reference point to refer back to after
B. Network map
C. Wire scheme
D. Asset management
A user is unable to access the company website on a laptop. A network technician verifies that the user can
access other Internet pages. According to network troubleshooting methodology, which of the following
steps should be taken NEXT?
A. Remotely connect to the user's laptop and review the network configuration settings
B. Ping the web server from inside the network to ensure it is still up and running.
C. Check to make sure the company's website is accessible from the Internet.
D. Ensure the Ethernet cable is securely plugged into the user's laptop
Which of the following uses a ring topology?
After a baseline check was completed it was noted that the network was working far below the level of the
last baseline. Which of the following should the technician do NEXT to determine where the network
problems are occurring?
A. Upgrade the firmware on all routers and switches
B. Reboot the entire network one device at a time
C. Conduct a network traffic analysis
D. Rerun the baseline to ensure the results were correct
Which of the following wiring standards would MOST likely be used to interconnect two devices without the
use of a hub or switch?
Which of the following ports would have to be allowed through a firewall to allow SNMP traffic to pass on its
default port? (Select TWO).
Which of the following defines access for a network?
The administrator's ISP indicates that they will need an autonomous system number to begin routing
external network traffic. Which of the following protocols should the ISP plan to use?
After a brownout, a user can connect to the internal network, but not the Internet. Which of the following is
the company's DSL router experiencing that is causing this issue?
A. Switching loop
B. Power failure
C. Broadcast storm
D. Duplicate IP address
An administrator is experiencing availability issues on a Linux server. The administrator decides to check
the server for an IP address conflict on the server. Which of the following commands should the
Which of the following protocols is commonly used for VoIP technology?
A router that takes the workstations internal IP address and changes it to another IP address when it sends
the data outside of the network is an example of which of the following?
A company has recently received a new ADSL backup Internet connection. Which of the following will
MOST likely be used between the modem and the ISP?
Which of the following would MOST likely be used with multimode fiber?
When each routing device has a consistent view of the network topology, the network is said to be:
A. fault tolerant
A network technician is concerned about the environmental effects of power consumption and heat from
network resources Limited space is also a concern. Which of the following technologies should be implemented?
A. Circuit switching
B. Network address translation
C. Power over Ethernet
D. Virtual servers
Which of the following should be used to ensure that all packets are received by every connected device?
Which of the following devices will allow a technician to measure the amount of data that is capable of
traversing the network?
A. Event logs
B. Throughput tester
C. Packet sniffers
Which of the following devices should an administrator connect to a protocol analyzer in order to collect all
of the traffic on a LAN segment?
The network administrator has just finished installing a new 10/100/1000 switch, but receives reports from
the server administrator that servers connected to the new switch seem to be experiencing slow LAN
connections. The network administrator checks the port connecting the new switch to the core switch and
sees the following information:
#show run interface GigabitEthernet0/10
Switchport trunk encapsulation dot1q
Switchport mode trunk
Switchport trunk native VLAN 10
Which of the following is the MOST likely cause of the slow connections?
A. The servers have not had VLAN tagging enabled on their NICs.
B. Speed and duplex have not been set.
C. VLAN tagging was not set on the trunk.
D. The servers have been connected with CAT5 cable.
Which of the following protocols can be found at the application layer?
Users report that there Internet connection is slow. The network technician has a suspicion that users are
streaming video and music. Which of the following would BEST confirm the technician's theory?
A. Traffic analysis
C. History logs
D. System logs
A technician is at a client's site to figure out an intermittent network problem. The technician has
implemented the solution. Which of the following is the NEXT step in the troubleshooting methodology?
A. Document the solution and the entire process.
B. Create an action plan and identify potential effects.
C. Determine if escalation is necessary.
D. Determine if anything has changed
Which of the following wireless technologies can support the GREATEST distance on either 2.4GHz or
Which of the following should be updated when new computers are purchased?
A. Asset management
B. Change management
C. Cable management
Which of the following DNS record types provides the hostname to IP address mapping?
A. A record
B. NS record
C. CNAME record
D. MX record
Which of the following holds multiple connections and is usually maintained by the telephone company?
D. 110 block
Which of the following processes translates a private IP address for a public IP address?
Which of the following technologies facilitates the conversion of internal private IP addressing to external
public IP addressing?
Which of the following logical network topologies is used to provide a secure connection across the
B. Peer to Peer
An administrator replaced a router with a switch. End users are able to access network shares but are not
able to access the Internet. Which of the following is the BEST explanation why the users are unable to
access the Internet?
A. Router routes traffic between different networks and a switch does not
B. The new switch is faulty and needs to be replaced and configured correctly
C. The firewall needs to be setup to allow traffic to reach the Internet
D. The switch needs to be setup to forward data traffic to the Internet
Which of the following is a hybrid network topology used for fault tolerance, in which all computers MUST
connect to each other?
A small amount of spoofed packets are being sent across a network and a large amount of reply packets
are being sent back to the network resource. Which of the following BEST describes this security threat?
C. Logic Bomb
Which of the following protocols requests membership to a multicast group?
Which of the following cable types is intended to be used on short distances and is immune to any type of
A. Singlemode fiber
B. Multimode fiber
C. Shielded twisted pair
D. Unshielded twisted pair
The technician notices that one of the wires in a CAT5 cable is cut in half. Which of the following
connectivity issues did the technician discover?
A. Open pairs
An administrator attempts to open a web page and sees the following error: 'Error 404: Page not found'.
The administrator then uses the ping command and finds that the default gateway cannot be pinged. At
which of the following layers does the problem MOST likely reside?
A. Layer 1
B. Layer 4
C. Layer 5
D. Layer 7
A wireless access point supports up to 20 clients. Which of the following describes this wireless network?
B. Point to point
C. Point to multipoint