298
COMPTIA Exam Questions

Test King Virtual Test--Network+

  • Upload
    kappi98a

  • View
    1.696

  • Download
    10

Embed Size (px)

DESCRIPTION

CompTIA Network+ Test King Practice Test

Citation preview

Page 1: Test King Virtual Test--Network+

COMPTIAExam Questions

Page 2: Test King Virtual Test--Network+

Which of the following is a standard measure of signal power?

A) MhZ

B) mips

C) dBm

D) Gbps

Page 3: Test King Virtual Test--Network+

Which of the following is the network topology in which computers connect in a closed circle?

A) Bus

B) Mesh

C) Ring

D) Star

Page 4: Test King Virtual Test--Network+

The Transport Layer of the TCP/IP model corresponds to which of the following layers of the OSI model?

A) 1

B) 3

C) 4

D) 5

Page 5: Test King Virtual Test--Network+

Which of the following is the correct representation of an IPv6 address?

A) ::

B) 0:0:0:0:0:0:0:0:1

C) 1:2:3:4:AB:CD:EF

D) 2001::4860:800f::

Page 6: Test King Virtual Test--Network+

Which of the following security devices would MOST likely be used on a network to screen & prevent malicious traffic?

A) IDS

B) VPN

C) NIPS

D) HIDS

Page 7: Test King Virtual Test--Network+

What is a client?

A Client is a device an end user uses to access a network . This device can be a workstation, laptop, smart phone with wireless capabilities, or a variety of other end-user terminal devices.

Page 8: Test King Virtual Test--Network+

Users report that their internet connection is slow. Zach, the network technician, has a suspicion that users are streaming video music. Which of the following would BEST confirm Zach’s theory?

A) Traffic analysis

B) SNMP

C) History logs

D) System logs

Page 9: Test King Virtual Test--Network+

A company is about to install a second network connection with a new ISP. Which of the following routing protocols is the BEST choice?

A) IS-IS

B) BGP

C) OSPF

D) RIP

Page 10: Test King Virtual Test--Network+

Lisa, a technician, is troubleshooting a problem with a managed network switch. She determines the resolution to the problem is beyond her experience level. Which of the following should Lisa do NEXT?

A) Question users

B) Test the theory

C) Re-establish a theory of probable cause

D) Escalate the problem

Page 11: Test King Virtual Test--Network+

A server technician notices that some changes were implemented on a server during non-business hours. Which of the following would allow the technician to identify the last time an administrator was remotely connected to the server?

A) Network sniffer

B) Traffic analyzer

C) System log

D) Security log

Page 12: Test King Virtual Test--Network+

Which of the following is an intelligent repeater that is aware of the MAC addresses of the nodes on either side of the data link?

A) Gateway

B) Hub

C) Bridge

D) Router

Page 13: Test King Virtual Test--Network+

Which of the following 802.11 standards is MIMO used in?

A) a

B) b

C) g

D) n

Page 14: Test King Virtual Test--Network+

A technician is troubleshooting a problem with a network printer. The technician thinks the network printer is out of paper & ink. Which of the following should the technician do NEXT?

A) Implement the solution

B) Question users

C) Test theory

D) Escalate the problem

Page 15: Test King Virtual Test--Network+

Which of the following would be the BEST IDS topology for monitoring one specific device?

A) Signature-based

B) Network-based

C) Host –based

D) Behavior-based

Page 16: Test King Virtual Test--Network+

Which of the following is the name of the routing update process involved when a change occurs in the routing environment?

A) Supernetting

B) Dynamic

C) Subletting

D) Convergence

Page 17: Test King Virtual Test--Network+

Which of the following fiber types is MOST often used indoors?

A) Plenum

B) Modal conditioning

C) Singlemode

D) Multimode

Page 18: Test King Virtual Test--Network+

Which of the following ports should be allowed through a firewall to allow DNS resolution to occur to an outside DNS server?

A) 20

B) 53

C) 80

D) 3389

Page 19: Test King Virtual Test--Network+

A customer reports a network patch cable was unplugged from a switch & plugged back into an available switch port. The switch’s activity lights have been lit up constantly & network response times are extremely slow. Which of the following issues is MOST likely occurring?

A) Switching loop

B) DDoS attack

C) Mismatched MTU

D) Port mirroring

Page 20: Test King Virtual Test--Network+

Which of the following protocols is used to assign IP addresses to network devices?

A) UTP B) DHCP

C) FTP

D) TCP/IP

Page 21: Test King Virtual Test--Network+

Network upgrades have been completed and the WINS server was shutdown. It was decided that NetBIOS network traffic will no longer be permitted. Which of the following will accomplish this objective?

A) Content filtering

B) Port filtering

C) MAC filtering

D) IP filtering

Page 22: Test King Virtual Test--Network+

Which of the following allows access to a network, based on the hardware address of a network card?

A) Content filtering

B) Port filtering

C) MAC filtering

D) IP filtering

Page 23: Test King Virtual Test--Network+

Which of the following is true of NIPS?

A) Routes traffic to the proper port

B) Detects malicious host traffic

C) Detects and prevents harmful traffic

D) Prevents traffic on network hosts

Page 24: Test King Virtual Test--Network+

Which of the following protocols is used for remote management of devices?

A) TFTP

B) SNMP

C) Syslog

D) SMTP

Page 25: Test King Virtual Test--Network+

Which encryption type uses only a 28 character key?

A) 40/64 bit WEP

B) WPA Personal

C) 104/128 bit WEP

D) WPA@PSK

Page 26: Test King Virtual Test--Network+

At which of the following layers of the OSI model do frames exist?

A) Application

B) Network

C) Transport

D) Data link

Page 27: Test King Virtual Test--Network+

Which of the following utilities can be used to list the routing table?

A) Ipconficj

B) Nslookup

C) Dig

D) Netstat

Page 28: Test King Virtual Test--Network+

Which of the following OSI model layers is between the Network and Session layers?

A) Presentation

B) Data link

C) Physical

D) Transport

Page 29: Test King Virtual Test--Network+

 Which of the following would be used to identify terminations in a punch block for which the wiring diagram has been lost? 

A) OTDR

B) Protocol analyzer

C) TDR

D) Toner probe

Page 30: Test King Virtual Test--Network+

Which of the following tools would BEST be used to verify if a network cable is properly terminated?

A) Multimeter

B) Cable certifier

C) Toner probe

D) Cable stripper

Page 31: Test King Virtual Test--Network+

Which of the following uses port 53 by default?

A) RDP

B) QoS

C) DHCP

D) DNS

Page 32: Test King Virtual Test--Network+

Network administrators use which of the following to monitor and map network availability, performance, and error rates?

A) SMTP

B) PPoE

C) PoE

D) SNMP

Page 33: Test King Virtual Test--Network+

Jeff, a network administrator, needs to forward HTTP traffic from a SOHO firewall public IP to the internal web server’s private IP. Which of the following can Jeff implement?

A) DNS

B) NAT

C) PKI

D) RAS

Page 34: Test King Virtual Test--Network+

A firewall that examines all the incoming traffic and decides if the traffic is going to be allowed through or dumped is a example of which of the following?

A) Packet sniffing

B) Packet filter

C) Stateful inspection

D) Content filter

Page 35: Test King Virtual Test--Network+

Zach, a client, has a home office and also works out of a garage on the property located 150 feet (45 meters) from the house. Zach wants to extend the Internet connection from the home to the garage. Which of the following technologies would MOST likely accommodate this range?

A) DVI cable

B) Bluetooth

C) Wireless

D) CAT3 cable

Page 36: Test King Virtual Test--Network+

A power failure caused a router to reboot. Now users are not able to reach remote networks. Which of the following is the MOST likely cause?

A) Dynamic NAT tables were erased by the reset

B) The DNS server settings on the workstations are incorrect

C) MAC entries in the ARP table were not saved

D) The technician did not save the running configuration

Page 37: Test King Virtual Test--Network+

Which of the following is a device directly used by an end user to access a network?

A) Server B) LAN C) Client D) Router

Page 38: Test King Virtual Test--Network+

What does a Switch do?

Interconnects network components like a hub except the switch interrogates the traffic to find out where its destined and forwards the traffic thru the right port. It is considered a Layer 2 device because it makes its forwarding decisions from the Media Access Control (MAC) address burned into the NIC card.

Page 39: Test King Virtual Test--Network+

Which device makes traffic-forwarding decisions based on the MAC address?

A) Hub B) Router C) Switch D) Multiplexer

Page 40: Test King Virtual Test--Network+

What type of network is a MAN?

MAN or Metro Ethernet is smaller than a WAN. a MAN interconnects locations throughout a metropolitan area via a service provider’s high speed network (10 Gbps)

Page 41: Test King Virtual Test--Network+

A company has various locations in a city interconnected using Metro Ethernet connections. This is an example of what type of network?

A) WAN B) CAN C) PAN D) MAN

Page 42: Test King Virtual Test--Network+

What type of network is a PAN?

PAN is network whose range is only a few meters and much smaller than a LAN. It consists of a connection between a PC and a digital camera via a universal serial bus (USB ) cable. It could also be a PC connected to an external hard drive via a FireWire connection, A PAN is not necessarily a wired connection, it can also be a Bluetooth connection between a cell phone & a car’s wireless audio system.

Page 43: Test King Virtual Test--Network+

A network formed by interconnecting a PC to a digital camera via a USB cable is considered what type of network?

A) WAN B) CAN C) PAN D) MAN

Page 44: Test King Virtual Test--Network+

What are some characteristics of the star topology?

Most popular physical LAN topology used today. The Ethernet switch is in the center of the star and unshielded twisted pair (UTP) cables run from the switch ports to the client and back. It uses more cables than the other topologies because each device requires its own wiring to the central device. If one of the cables breaks it only affects the device its connected to not the entire group.

Page 45: Test King Virtual Test--Network+

Which of the following LAN topologies requires the most cabling?

A) Bus B) Ring C) Star D) WLAN

Page 46: Test King Virtual Test--Network+

Which of all the Network Topologies is the least fault tolerant and why?

A bus network requires only a single cable per segment. If any device in the segment fails, then the whole segment crashes.

Page 47: Test King Virtual Test--Network+

What are the characteristics of a Full- Mesh topology?

Offers the highest level of redundancy. Each site is directly connected to every other site so an optimal route exists between any two sites. It is also highly fault resistant. It is difficult and expensive to scale, because to add a new site requires a WAN link to every other site.

Page 48: Test King Virtual Test--Network+

Which of the following topologies offers the highest level of redundancy?

A) Full Mesh B) Hub & Spoke C) BUS D) Partial Mesh

Page 49: Test King Virtual Test--Network+

How to calculate the number of required WAN connections for a Full-Mesh topology?

Example: If you have 5 remote sites W= number of WAN links N = number of sites W=n * (n-1) / 2 w = 5 * (5-1) / 2 (4 / 2) w = 5 * 2 w = 10 Ans: 10 WAN links are required 5 there & 5

back

Page 50: Test King Virtual Test--Network+

How many WAN links are required to create a full mesh of connections between 5 remote sites? A) 5 B) 10 C) 15 D) 20

Page 51: Test King Virtual Test--Network+

How does the Hub and Spoke topology differ from the Full-Mesh topology?

Costs are reduced because each site is connected to a central hub, not to each other so a small amount of links are needed. It’s also more scalable because to add another site only requires a connection to the hub. It also lacks redundancy because every site goes through the central Hub so it becomes a single point of failure. If the hub is down so is the network.

Page 52: Test King Virtual Test--Network+

Identify two advantages of a hub-and-spoke WAN topology as compared to a Full-Mesh WAN topology? (Pick 2)

A) Lower Cost B) Optimal Routes C) More scalable D) More redundancy

Page 53: Test King Virtual Test--Network+

What are the characteristics of a Peer-to- peer network?

Used for small or home based businesses, less than 10 PC’s. It allows all interconnected devices to share resources like files, and printers. Inexpensive network to run, limited scalability. The more PC’s on the network decreases performance & increases the burden of managing multiple clients for the administration.

Page 54: Test King Virtual Test--Network+

Which type of network is based on clients sharing resources with one another?

A) Client-server B) Client- peer C) Peer-to-peer D) Peer-to-server

Page 55: Test King Virtual Test--Network+

Which of the following is an advantage of a peer–to-peer network, as compared with a client-server network?

A) More scalable B) Less expensive C) Better performance D) Simplified administration

Page 56: Test King Virtual Test--Network+

What is a Server?

A server, serves up resources to a network. These resources might include e-mail access, (as provided by an e-mail server) web pages (as provided by a web server) or files (available on a file server)

Page 57: Test King Virtual Test--Network+

What is a Hub?

It is a device that interconnects network components, such as clients, and servers. Hubs vary in their number of available ports. Hubs can be interconnected to a point. Too many hubs chained together will result in network errors. A hub does not perform any inspection of the traffic it passes. It receives traffic through a port that’s connected to a network cable then it repeats that traffic out of all the other ports.

Page 58: Test King Virtual Test--Network+

What are the 7 layers of the OSI Model?

Layer 1 The Physical Layer Layer 2 The Data Link Layer Layer 3 The Network Layer Layer 4 The Transport Layer Layer 5 The Session Layer Layer 6 The Presentation Layer Layer 7 The Application Layer

Page 59: Test King Virtual Test--Network+

What is the difference between the OSI reference model and the TCP/IP model? * The OSI ensures reliable delivery of

packets at the transport layer (4) * TCP/IP Model matches up to the OSI model as: The Network Interface (Link) layer compares to the Physical & Data Link, The Internet layer is comparable to the Network, Transport is the same in both, & The Application layer in TCP/IP handles layers 5, 6,& 7 in the OSI model. TCP/IP does not guarantee reliable delivery of packets at layer 4 (transport). TCP/IP also offers the UDP (connectionless transport layer protocol) option.

Page 60: Test King Virtual Test--Network+

What is the function of the second layer know as The Data Link Layer?

The Data Link Layer has 2 sub layers

The 1st sub layer is the Media Access Control (MAC) This handles the: Physical Addressing Logical Topology Method of

transmitting on the media.

The 2nd sub layer is the Logical Link Control (LLC) This sub layer handles the:

Connection services

Synchronizing transmissions.

Page 61: Test King Virtual Test--Network+

Which layer of the OSI reference model contains the MAC and LLCsub layers? A) The Network Layer B) The Transport Layer C) The Physical Layer D) The Data Link Layer

Page 62: Test King Virtual Test--Network+

What is Baseband?

Baseband resides in the 1st layer of the OSI Model in the Physical Layer unlike broadband where it divides the bandwidth over copper etc.. Baseband uses all available frequencies on a medium to transmit data. Ethernet is an example of a network technology that uses baseband.

Page 63: Test King Virtual Test--Network+

Which approach to bandwidth usage consumes all available frequencies on a medium to transmit data?

A) Broadband B) Baseband C) Time – Division Multiplexing D) Simplex

Page 64: Test King Virtual Test--Network+

Windowing is provided at what layer of the OSI reference model?

A) Data Link Layer B) Network Layer C) Transport Layer D) Physical Layer

Page 65: Test King Virtual Test--Network+

Which of the following IP addresses would be classified as private?

A) 10.100.200.0

B) 169.253.5.0

C) 172.168.5.0

D) 200.100.25.0

Page 66: Test King Virtual Test--Network+

Two duplicate pieces of equipment can be used in conjunction for which of the following purposes? (Select TWO)

A) High availability

B) Fault tolerance

C) Reduce latency

D) Wi-MAX

E) CARP

Page 67: Test King Virtual Test--Network+

PKI is a method of user authentication which uses which of the following?

A) Various router commands

B) Access control lists

C) Certificate services

D) A RADIUS server

Page 68: Test King Virtual Test--Network+

Kim and Zach, attackers, use which of the following network scanners to see the protocols that are being used? (Select TWO).

A) IDS

B) Packet sniffer

C) Port scanner

D) Malware scanner

E) Ping sweep

Page 69: Test King Virtual Test--Network+

IP addresses reside at which layer of the OSI reference model?

A) Network Layer

B) Session Layer

C) Data Link Layer

D) Transport Layer

Page 70: Test King Virtual Test--Network+

Which of the following is a connectionless transport layer protocol?

A) IP

B) TCP

C) UDP

D) H.323

Page 71: Test King Virtual Test--Network+

Identify the 4 layers of the TCP/IP stack (Choose four)

A) Session Layer B) Transport Layer C) Internet Layer D) Data Link Layer E) Network Layer F) Application Layer G) Network Control Layer

Page 72: Test King Virtual Test--Network+

What is the range of well-known TCP and UDP ports?

A) Below 2048 B) Below 1024 C) 16,384 – 32,768 D) Above 8192

Page 73: Test King Virtual Test--Network+

Which protocol supports a secure connection to a remote host via terminal emulation software?

A) Telnet

B) SSH

C) FTP

D) SFTP

Page 74: Test King Virtual Test--Network+

Identify the well known port number for NTP?

A) 53

B) 69

C) 123

D) 143

Page 75: Test King Virtual Test--Network+

Identify 3 e-mail protocols? (choose 3)

A) SNMP B) SMTP C) POP3 D) IMAP4

Page 76: Test King Virtual Test--Network+

What type of coaxial cable was often used for 10Base2 Ethernet networks?

A) RG – 6 B) RG – 45 C) RG – 58 D) RG - 59

Page 77: Test King Virtual Test--Network+

Which of the following categories of UTP cabling are commonly used for 1000Base-T networks? (choose 2)

A) CAT 5 B) CAT5e C) CAT6 D) CAT6e

Page 78: Test King Virtual Test--Network+

Which type of cable might be required for installation in a drop ceiling, which is used as an open air return duct?

A) Riser B) Plenum C) Multimode D) Twin-axial

Page 79: Test King Virtual Test--Network+

Which network infrastructure device primarily makes forwarding decisions based on MAC addresses?

A) Router – (Layer 3 device) B) Switch (Layer 2 device) C) HUB ( Layer 1 device) D) Multi-Layer switch (Layers 2 &

above)

Page 80: Test King Virtual Test--Network+

A router(Layer 3) primarily makes its forwarding decisions based on what address?

A) Destination MAC address B) Source IP address C) Source MAC address D) Destination IP address

Page 81: Test King Virtual Test--Network+

Identify 2 differences between an Ethernet bridge and an Ethernet switch (Choose 2)

A) Switches use ASIC’s to make forwarding decisions, while bridges make their forwarding decisions in software.

B) Bridges typically operate faster than switches

C) Switches typically have higher port densities than bridges

D) Bridges can base their forwarding decisions on logical network layer addresses

Page 82: Test King Virtual Test--Network+

What layer do Bridges operate at?

Bridges operate at the Data Link Layer or Layer 2

Page 83: Test King Virtual Test--Network+

What is the purpose of the SMB (server message block) protocol?

The SMB protocol runs on the UNIX or Linux server and helps the Windows server see the UNIX/Linux servers as if they were one of the Windows servers itself.

Page 84: Test King Virtual Test--Network+

What are BNC connectors used for?

BNC connectors are used to connect computers to a 10Base2 (thinnet) cable in the BUS topology.

Page 85: Test King Virtual Test--Network+

A router has 12 ports. How many broadcast domains does the router have?

A) None B) One C) Two D) Twelve

Page 86: Test King Virtual Test--Network+

A switch has 12 ports. How many collision domains does the switch have?

A) None B) One C) Two D) Twelve

Page 87: Test King Virtual Test--Network+

What is the first DHCP message sent by a client attempting to obtain IP address information from a DHCP server?

A) DHCPOFFER B) DHCPACK C) DHCPDISCOVER D) DHCPREQUEST

Page 88: Test King Virtual Test--Network+

What specialized network device is commonly used to load balance traffic across multiple servers in a group?

A) Content switch B) Proxy server C) DNS server D) Content engine

Page 89: Test King Virtual Test--Network+

What is CSMA/CA AND WHAT DOES IT DO?

Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) It is the basic medium access method for IEEE 802.11(g) wireless networks. (CSMA/CD is collision detection, and it’s the basic access method for Ethernet networks)

Page 90: Test King Virtual Test--Network+

What is DNS?

Domain Name System (DNS) A system that provides a way to map friendly host names or URL’s to IP addresses.

Page 91: Test King Virtual Test--Network+

What is meant by Default Gateway?

It is the route taken so that a computer on one segment can communicate with a computer on another segment.

Page 92: Test King Virtual Test--Network+

What is the Demilitarized Zone (DMZ) and what does it do?

The DMZ describes the area in a network design that is located between the internal network & the external network. Usually the internet. It is used for devices accessible to internet traffic such as the web server, FTP server, SMTP server, and DNS.

Page 93: Test King Virtual Test--Network+

Which of the following describes a DNS server?

A) Translates an IP address to a name

B) Caches commonly viewed web pages

C) Assigns IP addresses to network devices

D) Provides port security for a network

Page 94: Test King Virtual Test--Network+

After Kim, a new user, moves furniture into a cubicle, the computer does not connect to the network any longer. Which of the following would be the MOST likely reason? (Select TWO).

A) Bad Ethernet switch port B) TX/RX reversed C) Bad connectors D) Bad patch cable E) Mismatched MTU

Page 95: Test King Virtual Test--Network+

Which of the following provides the use of a secure tunnel for telecommuting without manually installing and configuring encryption software?

A) RDP

B) SSL VPN

C) ISAKMP

D) TLS2.0

Page 96: Test King Virtual Test--Network+

Which of the following can be an STP cable?

A) RG-6

B) CAT5E

C) Fiber

D) RG-59

Page 97: Test King Virtual Test--Network+

Which of the following wireless authentication methods provides the GREATEST amount of security?

A) WEP

B) WPA Enterprise

C) WPA Personal

D) WPA2 Personal

Page 98: Test King Virtual Test--Network+

Which of the following OSI model layers is used for logical addressing?

A) Physical

B) Transport

C) Network

D) Data link

Page 99: Test King Virtual Test--Network+

In which of the following layers of the OSI model does the TCP protocol operate?

A) Session

B) Network

C) Data link

D) Transport

Page 100: Test King Virtual Test--Network+

A new wiring closet is setup to serve users in the east wing of a campus. Equipment is moved from the old closet, 50 feet (15 meters) away, and installed in the new closet. Users immediately begin reporting intermittent connectivity issues with both corporate and Internet resources. Which of the following is the MOST likely cause?

A) Protocol mismatch

B) MTU size was not increased for the new distance

C) Incorrect VLAN assignment

D) Incorrect cabling

Page 101: Test King Virtual Test--Network+

Which of the following protocols is used by the ping command?

A) SMTP

B) ICMP

C) TFTP

D) ARP

Page 102: Test King Virtual Test--Network+

Which of the following documents will allow Kim, an administrator, to determine a change from the standard default system configuration?

A) Baseline

B) Physical network diagram

C) Wiring schematic

D) Logical diagram

Page 103: Test King Virtual Test--Network+

Which of the following authenticates, allows, and controls the execution of router commands?

A) PKI

B) RADIUS

C) Kerberos

D) TACACS+

Page 104: Test King Virtual Test--Network+

A section of the building has been having intermittent connectivity problems lately. An action plan and solution has been created. Which of the following steps would an administrator perform NEXT?

A) Document the solution and process

B) Establish the most probable cause

C) Implement and test the solution

D) Identify additional symptoms and problems

Page 105: Test King Virtual Test--Network+

A firewall that looks at the source IP and destination IP then routes them accordingly is an example of which of the following?

A) Packet filtering

B) Content filtering

C) Packet sniffing

D) Application gateway

Page 106: Test King Virtual Test--Network+

Which of the following is a valid IPv6 address?

A) 1056: 958: E486:: F8:8962

B) 1596:H593:B5D8::B589

C) 2048:9584:A6B8::0983

D) 4820::0985:489D::8761

Page 107: Test King Virtual Test--Network+

Zach, a user, cannot access the Internet. A similar problem occurred several times last week to other users, and the solution was to reboot each workstation. As the first step, the technician reboots the workstation and it does not solve the problem. Which of the following should have been done instead?

A) Change the DNS server IP on the client

B) Information gathering

C) Change the workstation IP address

D) Establish a plan of action

Page 108: Test King Virtual Test--Network+

Logically separating the ports on a switch without physically separating them can be done using which of the following?

A) Routing tables

B) Hub logic

C) Spanning tree protocol

D) VLANs

Page 109: Test King Virtual Test--Network+

Which of the following commands can Lisa, a network technician, use to check whether the DNS server for a given domain is reachable?

A) nmap

B) nbtstat

C) dig

D) arp

Page 110: Test King Virtual Test--Network+

A customer wants to have several internal services hosted on multiple servers, all of which need to be available to the Internet through a single public IP address. Which of the following would need to be configured?

A) QoS

B) PoE

C) PAT

D) VLAN

Page 111: Test King Virtual Test--Network+

Which of the following communication modes has the LOWEST overhead necessary to support streaming protocols such as RTP?

A) Connectionless

B) Stateful

C) Full duplex

D) Quality of Service

Page 112: Test King Virtual Test--Network+

Lisa, a home user, wishes to confine a wireless network to devices ONLY inside of her house. Which of the following will accomplish this?

A) Decreasing radio strength

B) MAC filtering

C) WEP encryption

D) SSID broadcast disable

Page 113: Test King Virtual Test--Network+

Which of the following security measures is the LEAST intrusive on an end device?

A) NIPS

B) Host-based firewall

C) Antivirus

D) HIDS

Page 114: Test King Virtual Test--Network+

At which of the following layers of the OSI model does an unmanaged switch operate?

A) Layer 1

B) Layer 2

C) Layer 3

D) Layer 4

Page 115: Test King Virtual Test--Network+

Jeff, an administrator, has just finished installing a new switch and connected two servers with IPs of 192.168.105.20 and .30. The servers are able to communicate with each other, but are unable to reach the Internet. Jeff sees the following information in the switch configuration: interface VLAN 105IP address 192.168.105.5 255.255.255.0 Jeff is able to ping the router at 192.168.105.1 from the switch. Which of the following is the MOST likely cause of the problem?

A) The subnet mask is incorrect

B) A routing loop has occurred

C) Jeff used a crossover cable to connect the switch to the gateway

D) The server is missing default-gateway information

Page 116: Test King Virtual Test--Network+

An administrator is setting up a secure wireless network. The administrator decides to support 802.11n and 802.11g with a WPA2 pre-shared key. Users are given the SSID with the pre-shared key, but the administrator has disabled the SSID broadcast and MAC filtering. Some users have reported connection issues. Which of the following would MOST likely resolve the users’ connection issues?

A) Limit the devices to 802.11n only

B) Enable the SSID broadcast

C) Enable MAC filtering

D) Use WEP 128-bit key

Page 117: Test King Virtual Test--Network+

When configuring a WAP for a SOHO, which parameter will BEST limit access to the office area?

A) Signal strength

B) SSID enable

C) Encryption

D) Password hardening

Page 118: Test King Virtual Test--Network+

Which of the following is an environment where only a username and password are required for successful authentication results in access to multiple resources?

A) Multiple logins

B) Multifactor authentication

C) Two-factor authentication

D) Single sign-on

Page 119: Test King Virtual Test--Network+

Which of the following methods limits access to a network based on characteristics of the network card?

A) IP filtering

B) MAC filtering

C) Port filtering

D) Encryption

Page 120: Test King Virtual Test--Network+

Which of the following threats is MOST likely to enable an attacker to modify data in transit?

A) DoS

B) Smurf attack

C) Virus

D) Man-in-the-middle

Page 121: Test King Virtual Test--Network+

Which of the following Ethernet technologies has the LONGEST distance possible?

A) 1000BaseLX

B) 1000GBaseSR

C) 1000BaseSX

D) 1000BaseT

Page 122: Test King Virtual Test--Network+

Which of the following technologies allows for redundant links within a layer 2 segment?

A OSPF

B RIP

C Port Mirroring

D Spanning Tree

Page 123: Test King Virtual Test--Network+

Which of the following defines access for a network?

A) ACL

B) RDP

C) RAS

D) ARP

Page 124: Test King Virtual Test--Network+

A network administrator notices that all of the company switches are running at capacity on a given day, which is abnormal according to network baselines taken recently. Which tool would BEST allow the administrator to inspect what type of traffic is on the network?

A) Wire tap

B) Network sniffer

C) Load balancing appliance

D) NIPS

Page 125: Test King Virtual Test--Network+

Which of the following problems is MOST likely to arise when configuring an IPv6 over IPv4 tunnel?

A) Routing loop

B) MTU black hole

C) Framing error

D) SYN flood

Page 126: Test King Virtual Test--Network+

Kim, an administrator, wants to list all the network connections to and from the server. Which of the following commands would MOST likely be used? (Choose 2)

A) traceroute E) Bandwidth shaper

B) ping F) Load Balancer

C) ipconfig G) DNS server

D) netstat H) IPS

Page 127: Test King Virtual Test--Network+

A network device is more than 100 meters (328 feet) from a 24-port copper switch. Which of the following can be used to connect the device to the network?

A) Fiber multiplexer

B) Repeater

C) Attenuator

D) OTDR

Page 128: Test King Virtual Test--Network+

A technician is troubleshooting a replacement switch that is connected directly to another switch via fiber. The switch will not recognize the fiber connection. Which of the following is MOST likely the problem?

A) DB loss

B) EMI

C) TXRX reversed

D) Open shorts

Page 129: Test King Virtual Test--Network+

Which of the following is an example of two factor authentication?

A) Password device certificate and PIN

B) SSL web server certificate and password

C) User password and administrator Password

D) Password and hardware token OTP

Page 130: Test King Virtual Test--Network+

Which of the following is used to restrict access according to user policies?

A) Content filter

B) DHCP server

C) DNS server

D) VPN concentrator

Page 131: Test King Virtual Test--Network+

Which of the following describes a rationale for a network with redundant paths?

A) VPN compatibility

B) Unified communications implementation

C) High availability requirement

D) QoS

Page 132: Test King Virtual Test--Network+

Teachers and students at a school currently share the same bandwidth. The Internet performance for the teachers in the classroom is becoming extremely slow. Which of the following is the BEST method to mitigate the issue?

A) Increased uptime

B) Caching engines

C) Traffic shaping

D) Load balancing

Page 133: Test King Virtual Test--Network+

Zach, a technician, wants to test a laptop’s NIC for functionality but has no other networking equipment to attach it to. Which of the following would allow him to test basic functionality of the NIC?

A) Loopback plug

B) Protocol analyzer

C) Smart jack

D) Coupler

Page 134: Test King Virtual Test--Network+

A computer on VLAN 10 with the IP address of 192.168.1.45/27 cannot ping a computer on VLAN 20 with the IP address of 192.168.1.65/27. Which configuration change will allow the PING to be successful?

A) Replace the router with a layer 2 switch that supports VLANs

B) Change VLAN 20 computers Default Gateway to 192.168.1.127/27

C) Change VLAN 10 computers Default Gateway to 192.168.1.32/27

D) Allow ICMP to pass through the router

Page 135: Test King Virtual Test--Network+

Identify the distance limitation of a 10BASE5 (thicknet)Ethernet network?

A) 100m B) 185m C) 500m D) 2km

m = meters

Page 136: Test King Virtual Test--Network+

If 2 devices simultaneously transmit data on an Ethernet network & a collision occurs, what does each station do in an attempt to resend the data & avoid another collision?

A) Each device compares the other device’s priority value (determined by IP address) with its own, & the device with the highest priority value transmits first

B) Each device waits for a clear to send (CTS) signal from the switch

C) Each device randomly picks a priority value, & the device with the highest value transmits first

D) Each device sets a random back off timer, & the device will attempt retransmission after the timer expires

Page 137: Test King Virtual Test--Network+

What kind of media is used by 100GBASE-SR10 Ethernet?

A) UTP B) MMF C) STP D) SMF

Page 138: Test King Virtual Test--Network+

Which of the following statements are true regarding VLAN’s? (choose 2)

A) A VLAN has a single broadcast domain

B) For traffic to pass between 2 VLANs, that traffic must be routed.

C) Because of a switch’s MAC address table, traffic does not need to be routed to pass between 2 VLAN’s

D) A VLAN has a single collision domain

Page 139: Test King Virtual Test--Network+

What name is given to a VLAN on an IEEE 802.1Q trunk whose frames are not tagged?

A) Native VLAN

B) Default VLAN

C) Management VLAN

D) VLAN 0

Page 140: Test King Virtual Test--Network+

In a topology running STP, every network segment has a single __________ port, which is the port on that segment that is closest to the root bridge, in terms of cost?

A) Root

B) Designated

C) Non-Designated

D) Non-root

Page 141: Test King Virtual Test--Network+

What is the IEEE standard for link aggregation?

A) 802.1Q

B) 802.3ad

C) 802.1d

D) 802.3af

Page 142: Test King Virtual Test--Network+

What is the maximum amount of power a switch is allowed to provide per port according to the IEEE 802.3af standard?

A) 7.7 W

B) 15.4 W

C) 26.4 W

D) 32.4 W

Page 143: Test King Virtual Test--Network+

What switch feature allows you to connect a network sniffer to a switch port & tells the switch to send a copy of frames seen on one port out the port to which your network sniffer is connected?

A) Port Interception

B) Port Duplexing

C) Port Mirroring

D) Port Redirect

Page 144: Test King Virtual Test--Network+

Which IEEE 802.1X component checks the credentials of a device wanting to gain access to the network?

A) Supplicant

B) Authentication server

C) Access point

D) Authenticator

Page 145: Test King Virtual Test--Network+

What is the binary representation of the decimal number 117?

A) 10110101

B) 01110101

C) 10110110

D) 01101001

Page 146: Test King Virtual Test--Network+

The binary number 10110100 has what decimal equivalent?

A) 114

B) 190

C) 172

D) 180

Page 147: Test King Virtual Test--Network+

What is the class of IP address 10.1.2.3/24?

A) Class A

B) Class B

C) Class C

D) Class D

Page 148: Test King Virtual Test--Network+

Which of the following are dynamic approaches to assigning routable IP addresses to networked devices? (choose 2)

A) BOOTP

B) APIPA

C) Zeroconf

D) DHCP

Page 149: Test King Virtual Test--Network+

How many assignable IP addresses exist in the 172.16.1.10/27 network?

A) 30

B) 32

C) 14

D) 64

Page 150: Test King Virtual Test--Network+

What is the prefix notation for a subnet mask of 255. 255. 255. 240?

A) /20

B) /24

C) /28

D) /29

Page 151: Test King Virtual Test--Network+

Your company has been assigned the 192.168.30.0/24 network for use at one of its sites. You need to use a subnet mask that will accommodate 7 subnets while simultaneously accommodating the maximum number of hosts per subnet. What subnet mask should you use?

A) /24

B) /26

C) /27

D) /28

Page 152: Test King Virtual Test--Network+

A client with an IP address of 172.16.18.5/18 belongs to what network?

A) 172.16.0.0/18

B) 172.16.4.0/18

C) 172.16.8.0/18

D) 172.16.16.0/18

Page 153: Test King Virtual Test--Network+

How can the following IPv6 address be condensed? 0AA0:0123:4040:0000:0000:000:000A:100B

A) AA0::123:404:A:100B

B) AA::123:404:A:1B

C) AA0:123:4040::A:100B

D) 0AA0:0123:4040::0::000A:100Bsection

Page 154: Test King Virtual Test--Network+

If a PC on an Ethernet network attempts to communicate with a host on a different subnet, what destination IP address & destination MAC address will be placed in the packet/frame header sent by the PC?

A) Dest. IP: IP address of default gateway. Dest. MAC: MAC address of default gateway

B) Dest.IP: IP address of remote host. Dest.MAC: MAC address of default gateway

C) Dest.IP: IP address of remote host. Dest. MAC: MAC address of remote host

D) Dest.IP: IP address of remote host. Dest.MAC: MAC address of local PC

Page 155: Test King Virtual Test--Network+

What protocol is used to request a MAC address that corresponds to a known IP address?

A) IGMP

B) TTL

C) ICMP

D) ARP

Page 156: Test King Virtual Test--Network+

What is the network address & subnet mask of a default route?

A) 255.255.255.255/32

B) 0.0.0.0/32

C) 255.255.255.255/0

D) 0.0.0.0/0

Page 157: Test King Virtual Test--Network+

What routing protocol characteristic indicates the believability of the routing protocol (as opposed to other routing protocols)?

A) Weight

B) Metric

C) Administrative distance

D) SPF algorithm

Page 158: Test King Virtual Test--Network+

Which of the following are distance vector routing protocol features that can prevent routing loops? (choose 2)

A) Reverse path forwarding (RPF) check

B) Split Horizon

C) Poison Reverse

D) Rendezvous point

Page 159: Test King Virtual Test--Network+

Which of the following is a distance-vector routing protocol with a maximum hop count of 15?

A) BGP

B) IS-IS

C) RIP

D) OSPF

Page 160: Test King Virtual Test--Network+

Which of the following routing protocols is an EGP?

A) BGP

B) IS-IS

C) RIP

D) OSPF

Page 161: Test King Virtual Test--Network+

What NAT IP address is a public IP address that references an inside device?

A) Inside Local

B) Inside Global

C) Outside Local

D) Outside Global

Page 162: Test King Virtual Test--Network+

What NAT variation automatically assigns an inside global address from a pool of available addresses?

A) SNAT

B) DNAT

C) PAT

D) GNAT

Page 163: Test King Virtual Test--Network+

What multicast protocol is used between clients & routers to let routers know which of their interfaces are connected to a multicast receiver?

A) IGMP

B) PIM-DM

C) PIM-SM

D) SPT switchover

Page 164: Test King Virtual Test--Network+

ISDN is considered to be what type of WAN connection?

A) Dedicated leased line

B) Circuit-switched connection

C) Packet-switched connection

D) Cell-switched connection

Page 165: Test King Virtual Test--Network+

What is the data rate of an OC-3 connection?

A) 51.84 Mbps

B) 622 Mbps

C) 155.52 Mbps

D) 159.25 Gbps

Page 166: Test King Virtual Test--Network+

Which of the following WAN technologies commonly use unshielded twisted pair (UTP)? (choose 3)

A) Cable modem

B) ISDN

C) DSL modem

D) POTS dial-up connection

Page 167: Test King Virtual Test--Network+

How many channels on an E1 circuit are available for voice, video, or data?

A) 23

B) 24

C) 30

D) 32

Page 168: Test King Virtual Test--Network+

Which PPP authentication method provides one-way authentication & sends credentials in clear text data?

A) WEP

B) MS-CHAP

C) PAP

D) CHAP

Page 169: Test King Virtual Test--Network+

What DSL variant has a distance limitation of 18,000 ft. between DSL modem & its DSLAM?

A) HDSL

B) ADSL

C) SDSL

D) VDSL

Page 170: Test King Virtual Test--Network+

What kind of network is used by many cable companies to service their cable modems, & contains both fiber-optic and coaxial cable?

A) Head-end

B) DOCSIS

C) Composite

D) HFC

Page 171: Test King Virtual Test--Network+

What locally significant identifier is used by a frame Relay network to reference a virtual circuit?

A) VPI/VCI

B) DLCI

C) TEI

D) MAC

Page 172: Test King Virtual Test--Network+

How big is the payload portion of an ATM cell?

A) 5 bytes

B) 48 bytes

C) 53 bytes

D) 64 bytes

Page 173: Test King Virtual Test--Network+

What type of antenna, commonly used in wireless AP’s & wireless routers in SOHO locations, radiates relatively equal power in all directions?

A) Unidirectional

B) Yagi

C) Parabolic

D) Omnidirectional

Page 174: Test King Virtual Test--Network+

When using the 2.4 GHz band for multiple access points in a WLAN located in the United States, which nonoverlapping channels should you select? (choose 3)

A) 0 B) 1 C) 5 D) 6 E) 10 F) 11 G) 14

Page 175: Test King Virtual Test--Network+

What technology do WLAN’s use to determine when they gain access to the wireless media?

A) SPF

B) CSMA/CA

C) RSTP

D) DUAL

Page 176: Test King Virtual Test--Network+

What IEEE 802.11 variant supports a maximum speed of 54 Mbps & uses 2.4 GHz band?

A) 802.11a

B) 802.11b

C) 802.11g

D) 802.11n

Page 177: Test King Virtual Test--Network+

Which of the following is used by IEEE 802.11n to achieve high through-put through the use of multiple antennas for transmission & reception?

A) MIMO

B) DSSS

C) FHSS

D) LACP

Page 178: Test King Virtual Test--Network+

A WLAN formed directly between wireless clients (without the use of a wireless AP) is referred to as what type of WLAN?

A) Enterprise mode

B) IBSS

C) Personal Mode

D) BSS

Page 179: Test King Virtual Test--Network+

When extending the range for a 2.4-GHz WLAN, you can use nonoverlapping channels for adjacent coverage cells. However, there should be some overlap in coverage between those cells (using nonoverlapping channels) to prevent a connection from dropping as a user roams from one coverage cell to another. What percentage of coverage overlap is recommended for these adjacent cells?

A) 5 – 10 percent B) 10 – 15 percent C) 15 – 20 percent D) 20 – 25 percent

Page 180: Test King Virtual Test--Network+

If a WLAN does not require a user to provide any credentials to associate with a wireless AP & access the WLAN, what type of authentication is said to be in use?

A) WEP B) SSID C) Open D) IV

Page 181: Test King Virtual Test--Network+

WEP’s RC4 approach to encryption uses a 24-bit string of characters added to transmitted data, such that the same plain text data frame will never appear as the same WEP-encrypted data frame. What is this string of characters called?

A) Initialization vector B) Chips C) Orthogonal descriptor D) Session key

Page 182: Test King Virtual Test--Network+

What standard developed by the Wi-Fi Alliance implements the requirements of IEEE 802.11i ?

A) TKIP

B) MIC

C) WEP

D) WPA2

Page 183: Test King Virtual Test--Network+

What is the MPLS header?

A) 4 bits

B) 8 bits

C) 16 bits

D) 32 bits

Page 184: Test King Virtual Test--Network+

Which of the following is a social engineering attack?

A) Man in the middle

B) Worms

C) Evil Twin

D) Phishing

Page 185: Test King Virtual Test--Network+

00:12:34:56:78 can be used in which of the following?

A Channel selection

B WPA-PSK password

C WEP key

D MAC filtering

Page 186: Test King Virtual Test--Network+

Which of the following devices will monitor for propagating worms?

A IDS

B Firewall

C Proxy server

D Mail server

Page 187: Test King Virtual Test--Network+

T568B wiring scheme is typically found on which of the following components?

A 66 block

B Demarc extension

C Patch Panel

D Vertical Cross Connect

Page 188: Test King Virtual Test--Network+

Something you have, something you are and something you know are the three tenets of:

A) access control

B) remote access

C) change management

D) social engineering

Page 189: Test King Virtual Test--Network+

After moving office furniture around a user can no longer connect to the network. Which of the following is Most likely the reason for the problem

A Split cables

B Crosstalk

C TX/RX reversed

D DB loss

Page 190: Test King Virtual Test--Network+

A company wishes to have a wireless signal broadcast only through a special tunnel. Which of the following measures will accomplish this?

A MAC filtering

B WPA encryption

C Changing antenna type

D Decreasing radio strength

Page 191: Test King Virtual Test--Network+

In IPSec, which of the following is an agreement on how devices will securely transmit information? A) ESP

B) SA

C) AH

D) ISAKMP

Page 192: Test King Virtual Test--Network+

Which of the following could be used to estimate RTT across a router?

A traceroute

B dig

C arp

D uptime

Page 193: Test King Virtual Test--Network+

The cable tester displays the following information

11 2------- 2 3------- 3 4xxxxx 4 5xxxxx 5 6------- 6 7------- 7 8------- 8

What is being reported?

A) 5 is open, 1|4 are open B) 1 is open, 4|5 are

shorted C) 4|5 is shorted, 1 is ok D) 1 is shorted, 4|5 are

open

Page 194: Test King Virtual Test--Network+

Which of the following represents the physical address of a network access card

A 00-30-48-83-9B-C8

B FF01:D2:C4:87::11

C 08-9D-35-22-L2-34-FF-21

D 2D1A:C3:0:1C3B:2AD:FF:FEBE:9D3A

Page 195: Test King Virtual Test--Network+

Which of the following records would be used for a Reverse DNS lookup?

A) MX

B) PTR

C) A

D) AAAA

Page 196: Test King Virtual Test--Network+

Which of the following defines access for a network?

A) ACL

B) RDP

C) RAS

D) ARP

Page 197: Test King Virtual Test--Network+

A technician is troubleshooting a replacement switch that is connected directly to another switch via fiber. The switch will not recognize the fiber connection. Which of the following is MOST likely the problem?

A) DB loss

B) EMI

C) TXRX reversed

D) Open shorts

Page 198: Test King Virtual Test--Network+

Which of the following is used to restrict access according to user policies?

A) Content filter

B) DHCP server

C) DNS server

D) VPN concentrator

Page 199: Test King Virtual Test--Network+

Which of the following describes a rationale for a network with redundant paths?

A) VPN compatibility

B) Unified communications implementation

C) High availability requirement

D) QoS

Page 200: Test King Virtual Test--Network+

Kim, an administrator, would like to inspect all traffic flowing over the SMTP protocol on a given network. Which of the following tools would accomplish this?(select two) A) Packet sniffer B) Honeypot C) Port mirroring D) IPS E) Port scanner F) IDS

Page 201: Test King Virtual Test--Network+

For which of the following reasons could a single server’s NIC transmit packets from multiple MAC address sources?

A) The server contains several virtual machines & the MAC addresses are from the virtual machines.

B) The server is hosting a web server & the MAC addresses are from connected browsers

C) The server is hosting a proxy server & the MAC addresses are from the connected clients

D) The server NIC is starting to fail & should be replaced.

Page 202: Test King Virtual Test--Network+

Which of the following does SNMPv3 BEST provide over previous versions?

A) Simplified management

B) Increased security

C) More data types

D) Higher productivity

Page 203: Test King Virtual Test--Network+

In which of the following would Lisa, a technician, find the LARGEST number of 110 block patch panels?

A) MDF

B) Caching engines

C) Demarc

D) IDF

Page 204: Test King Virtual Test--Network+

A company’s database software runs the cloud. The device hosting the software is an example of which of the following?

A) Virtual server

B) Virtual switch

C) Virtual desktop

D) Virtual PBX

Page 205: Test King Virtual Test--Network+

Kim, a new employee, is unable to get to the department’s server while other employees are having no issues. The network administrator has verified that Kim has permission to the server & the workstation is able to get to other network resources. Which of the following is the MOST likely cause?

A) The department server is having network issues

B) Kim’s workstation is a part of the wrong VLAN

C) The onboard NIC has outdated drivers installed

D) The wireless NIC has not been enabled for Kim’s workstation

Page 206: Test King Virtual Test--Network+

Kim, a customer, wants to install a wireless network into a shared office space. There are several other wireless networks from other companies that can be detected within the office space. Which of the following should be configured on Kim’s wireless network to differentiate it from other wireless networks & still provide the BEST performance & security? (Choose 2)

A) SSID B) Channel C) Antenna type D) Wireless standard E) NAT

Page 207: Test King Virtual Test--Network+

Which of the following allows a central point to simultaneously address other points without addressing all of them?

A) Multicast

B) Subnetting

C) Unicast

D) Broadcast

Page 208: Test King Virtual Test--Network+

Zack, a technician, wants to provide the MOST wireless security on the LAN but does not have a RADIUS server. Which technology should be used?

A) PEAP

B) WPA Personal

C) WPA2 Enterprise

D) WPA2 PSK

Page 209: Test King Virtual Test--Network+

Which of the following would a technician plug into a smartjack?

A) 25 pair cable

B) 100 pair cable

C) Patch cable

D) Patch panel

Page 210: Test King Virtual Test--Network+

A customer wishes to network several computers throughout a large warehouse containing numerous metal shelves & concrete walls. The computers are at least 175 meters (574 feet) apart. Which of the following media types should be recommended for the customer using only a single switch? A) Fiber optic

B) Wireless

C) CAT5e

D) CAT3

Page 211: Test King Virtual Test--Network+

Lisa, an administrator, is unable to route traffic between VLAN’s on a switch. Communication between devices within each VLAN is functioning. At which of the following layers does the problem MOST likely reside?

A) Network

B) Data link

C) Transport

D) Session

Page 212: Test King Virtual Test--Network+

Which of the following devices is used to distribute network traffic equally over multiple links?

A) Content filler

B) DNS server

C) Load balancer

D) Proxy server

Page 213: Test King Virtual Test--Network+

Which of the following would cause signal interference in a 2.4 GHz WAP? (Choose 2)

A) Cell phone

B) Cordless phone

C) Microwave oven

D) Printer

E) Television

Page 214: Test King Virtual Test--Network+

Which of the following default services uses TCP/UDP port 88?

A) LDAP

B) IGMP

C) HTTP

D) Kerberos

Page 215: Test King Virtual Test--Network+

Which of the following TCP/IP & OSI model layers retransmits a TCP packet if it is not received successfully at this destination?

A) The transport OSI model layer & the Internet TCP/IP model layer

B) The transport OSI model layer & the transport TCP/IP model layer

C) The network OSI model layer & the transport TCP/IP model layer

D) The network OSI model layer & the internet TCP/IP model layer

Page 216: Test King Virtual Test--Network+

Which of the following limits the number of devices that can be assigned IP addresses by DHCP?

A) A Lease

B) Reservation

C) DNS setting

D) Scope

Page 217: Test King Virtual Test--Network+

Kim, a network administrator, should consult which documentation sources FIRST to determine the cause of recent network issues?

A) Network map

B) Cable management

C) Change management

D) Asset management

Page 218: Test King Virtual Test--Network+

When using high bandwidth applications over multiple WAN connections, which of the following should be used?

A) Static IP addressing

B) Half-duplex

C) PoE devices

D) Load balancing

Page 219: Test King Virtual Test--Network+

A new user is reporting connectivity issues. Zach, the network technician, notices that there is no link light on the user’s NIC. Which of the following would be used to verify the wiring back to the patch panel?

A) Butt set

B) Cable certifier

C) Toner probe

D) Snips

Page 220: Test King Virtual Test--Network+

Which of the following ports is the default telnet port?

A) 20

B) 21

C) 22

D) 23

Page 221: Test King Virtual Test--Network+

In which of the following wireless standards is MIMO used?

A) 802.11a

B) 802.11b

C) 802.11g

D) 802.11n

Page 222: Test King Virtual Test--Network+

Which of the following address blocks would MOST likely be blocked from crossing a border router?

A) 8.0.0.0/8

B) 172.16.0.0/12

C) 122.0.0.0/24

D) 248.0.0.0/8

Page 223: Test King Virtual Test--Network+

Which of the following commands can Lisa, a network technician, use to check whether the DNS server for a given domain is reachable?

A) Nmap

B) Nbtstat

C) Dig

D) Arp

Page 224: Test King Virtual Test--Network+

Which of the following ports would have to be allowed through a firewall to allow SNMP traffic to pass on its default port? (Select TWO)

A) 22 B) 23 C) 243 D) 161 E) 162 F) 8080

Page 225: Test King Virtual Test--Network+

Lisa, a network technician, needs to introduce a few more cables to the existing patch panel. Which of the following tools would she use?

A) OTDR

B) Multimeter

C) Punch down tool

D) Temperature monitor

Page 226: Test King Virtual Test--Network+

Jeff, a technician is setting up an IDS security device. Which of the following should be configured on the switch to utilize the IDS?

A) PoE

B) Port mirroring

C) Convergence

D) Port speed

Page 227: Test King Virtual Test--Network+

Jeff, a network technician, is installing a wireless router. Which of the following should Jeff consider to get the BEST signal strength? A) WAP placement

B) PoE devices

C) MAC filtering

D) Encryption type

Page 228: Test King Virtual Test--Network+

Zach, a technician suspects a duplicate IP address assignment on the network. Which of the following resources can be used to verify this problem?

A) Network map

B) Environmental monitor

C) Placement map

D) Syslog

Page 229: Test King Virtual Test--Network+

Lisa, a technician, decides to upgrade a router before leaving for vacation. While away, users begin to report slow performance. Which of the following practices allows other technicians to quickly return the network to normal speeds?

A) Change management

B) Baselines

C) Asset management

D) Cable management

Page 230: Test King Virtual Test--Network+

A VPN concentrator is used for which of the following purposes?

A) MAC filtering

B) Content filtering

C) Secure network access

D) Connectivity troubleshooting

Page 231: Test King Virtual Test--Network+

Which of the following layers of the OSI model, maps to the Network Interface layer of the TCP/IP Protocol stack? (pick 2)

A) Physical B) Session C) Data Link D) Network E) Transport

Page 232: Test King Virtual Test--Network+

Which of the following tools would Lisa, a technician, BEST use to trace a wire through an area where multiple wires of the same color are twisted together? A) Cable tester

B) Toner probe

C) Cable crimper

D) Punch down tool

Page 233: Test King Virtual Test--Network+

Kim, a user, cannot access the network using wireless. Which of the following is MOST likely the cause?

A) TXRX is reversed

B) Faulty crossover cable

C) Incorrect WEP key

D) A short in the cable pairs

Page 234: Test King Virtual Test--Network+

Lisa, a user, reports the network is down. While troubleshooting, a technician walks into a communications closet and notices a small patch cable with both ends plugged into interfaces on the same switch. Which of the following is this an example of?

A) Switch loop

B) Port bonding

C) Virtual switch

D) Port mirroring

Page 235: Test King Virtual Test--Network+

Jeff, a technician, is charged with setting up network monitoring for critical devices in the network. It is important the information be sent securely to the monitoring station. Which of the following protocols will support secure transmission of the data?

A) SNMPv2

B) VPN

C) SYSLOG

D) SMTP

Page 236: Test King Virtual Test--Network+

Which of the following utilities would Kim, a technician, use to resolve the FQDN of a web server to its IP address?

A) Netstat

B) Route

C) Nslookup

D) Arp

Page 237: Test King Virtual Test--Network+

Zach, a technician, is installing an 802.11n network. Which of the following should he disable to stop broadcasting the network name?

A) Channel

B) WEP

C) SSID

D) WEPA

Page 238: Test King Virtual Test--Network+

Which of the following can Jeff, a technician, modify on a 802.11n router that is not available as an option on an 802.11g device?

A) SSID

B) Encryption

C) Channels

D) Spectrum

Page 239: Test King Virtual Test--Network+

Jeff, an end user, has plugged in both ends of the same network cable to two adjacent jacks. Both ports are connected to the same switch in the IDF. Which of the following will MOST likely happen?

A) VLAN malfunction

B) Broadcast storm

C) Quality of Service loss

D) Duplicate IP addresses

Page 240: Test King Virtual Test--Network+

An analog POTS voice line is no longer working and Kim, the technician, is tasked to verify if a dial tone is present at the IDF. Which of the following tools would be used?

A) Protocol analyzer

B) Butt set

C) OTDR

D) Toner probe

Page 241: Test King Virtual Test--Network+

Lisa, a technician, is troubleshooting a cable problem. She has checked both ends and suspects an issue 50 yards (46 meters) from the location. Which of the following network tools will confirm this analysis?

A) TDR

B) Protocol analyzer

C) Multimeter

D) Cable crimper

Page 242: Test King Virtual Test--Network+

Which of the following properties of DHCP would Lisa, a technician, use to ensure an IP address is not leased out from the active scope?

A) Reservations

B) Lease times

C) Removing IPs from the active leases

D) Configuring the DNS options

Page 243: Test King Virtual Test--Network+

Zach, a network technician, has been troubleshooting a connectivity problem in the LAN room. He has diagnosed the problem and implemented a solution. Which of the following would be Zach’s NEXT step?

A) Test the theory

B) Establish a plan of action

C) Establish a theory

D) Document findings

Page 244: Test King Virtual Test--Network+

Which of the following would be used to identify terminations in a punch block for which the wiring diagram has been lost?

A) OTDR

B) Protocol analyzer

C) Toner probe

D) TDR

Page 245: Test King Virtual Test--Network+

Two WAPs are positioned with overlapping coverage, but seamless roaming across them is not working. Which of the following should be checked?

A) WPA should be enabled

B) PKI should be turned off

C) WAP SID’s are matching

D) WAPs are transmitting on the same channel

Page 246: Test King Virtual Test--Network+

Which of the following would Kim, a technician, do to monitor remote traffic through an access point?

A) Enable an SNMP agent

B) Enable network mapping

C) Set monitoring SSID

D) Select WPA2

Page 247: Test King Virtual Test--Network+

Which of the following 802.11n features allows for the use of multiple simultaneous frequencies in order to increase usable bandwidth?

A) Channel bonding

B) MIMO

C) Spatial reuse

D) 20MHzchannel spacing

Page 248: Test King Virtual Test--Network+

Which of the following ports would Zach, a technician, need to open on a firewall to allow SSH on the default port?

A) 20

B) 21

C) 22

D) 23

Page 249: Test King Virtual Test--Network+

Which of the following separates broadcast domains?

A) Port mirroring

B) Router

C) Convergence

D) Switch

Page 250: Test King Virtual Test--Network+

Zach, a technician, needs to terminate a CAT5e Ethernet cable to a 110 block. Which of the following tools should be used?

A) Tone probe

B) Punch down

C) Wire tester

D) Crimper

Page 251: Test King Virtual Test--Network+

Kim, a technician, needs to locate a cable in an unorganized wiring closet. Which of the following tools will help her locate the cable?

A) Protocol analyzer

B) Cable tester

C) Toner probe

D) Punch down tool

Page 252: Test King Virtual Test--Network+

Jeff, a technician, has been asked to add a subnet to the company’s LAN. Which of the following interfaces on the router will be modified?

A) Fast Ethernet 0/0

B) AUX 0

C) Console 0

D) Serial 0/0/0

Page 253: Test King Virtual Test--Network+

Lisa, a network technician, is attempting to map a FQDN to an internal server at the address of 10.0.0.15 without NAT/PAT. Which of the following is the reason this will ultimately not work?

A) This is a private address that cannot be seen by external users

B) This address does not have the appropriate subnet mask assigned

C) This is a public address which can only be seen by internal users

D) This is a private address which can only be seen by external users

Page 254: Test King Virtual Test--Network+

Jeff, a user, is having a problem with a POTS line. Which of the following tools would Jeff use to make sure the phone lines have a dial tone?

A) Loopback plugs

B) Butt set

C) Cable certifier

D) Tone probe

Page 255: Test King Virtual Test--Network+

Lisa, a technician, has configured a new switch that is remotely accessed using SSH. The switch is working properly, but cannot be accessed remotely. Which of the following items is MOST likely missing in the configuration?

A) Port speed

B) Cryptokey

C) Data VLAN

D) NAT/PAT

Page 256: Test King Virtual Test--Network+

Which of the following protocols is used to securely connect to a multi-layer switch? A) HTTP

B) SMTP

C) SSH

D) Telnet

Page 257: Test King Virtual Test--Network+

Which of the following is the prefix for a link-local IPv6 address?

A) FE80::/10

B) FFOO::/8

C) 2FFE::/16

D) FEEF::/12

Page 258: Test King Virtual Test--Network+

Zach, a technician, is checking newly installed CAT5 cabling and suspects that some of the ends were not properly terminated. Which of the following tools will verify this?

A) Cable tester

B) Tone probe

C) OTDR

D) Loopback plug

Page 259: Test King Virtual Test--Network+

There is suspected virus activity on the network. Which of the following would Lisa, a technician, use to study network traffic?

A) Protocol analyzer

B) Cable tester

C) Cable verifier

D) Environmental monitor

Page 260: Test King Virtual Test--Network+

Which of the following is used to prevent Layer 2 switching loops within a local area network? A) STP

B) MTU

C) EGP

D) IGP

Page 261: Test King Virtual Test--Network+

Which of the following network management tools can filter information from all data entering and leaving a specific port on the switch?

A) SNMP trap

B) Bandwidth analyzer

C) Network sniffer

D) Syslog server

Page 262: Test King Virtual Test--Network+

Which of the following is a method to prioritize network traffic coming on VoIP phones?

A) PAT

B) DNS

C) SIP

D) QoS

Page 263: Test King Virtual Test--Network+

Which of the following network devices hides network nodes behind one public IP address?

A) Layer 3 switch

B) Content filter

C) VPN server

D) Proxy server

Page 264: Test King Virtual Test--Network+

A mobile user is no longer able to access network resources. Jeff, the network technician, is unable to ping the user’s workstation. Which of the following commands would MOST likely be used on that workstation to verify its current network settings?

A) Net share

B) Hostname

C) IPconfig

D) Tracert

Page 265: Test King Virtual Test--Network+

Which of the following Ethernet technologies has the LONGEST distance possible?

A) 1000BaseLX

B) 1000GBaseSR

C) 1000BaseSX

D) 1000BaseT

Page 266: Test King Virtual Test--Network+

Which of the following threats is MOST likely to enable an attacker to modify data in transit?

A) DoS

B) Smurf attack

C) Virus

D) Man-in-the-middle

Page 267: Test King Virtual Test--Network+

Which of the following is a terminal emulator used to manage a network device?

A) VPN

B) IDS

C) PUTTY

D) IPS

Page 268: Test King Virtual Test--Network+

Which of the following DNS record types is used for IPv6 resolution?

A) MX

B) AAAA

C) A

D) PTR

Page 269: Test King Virtual Test--Network+

A technician has received word that the telephone company has added another POTS line to the building. Where will the technician MOST likely find the new line?

A) CSU

B) Demarc

C) Registered jack

D) DSU

Page 270: Test King Virtual Test--Network+

Which of the following is the MAXIMUM distance a single 1000BaseT segment can cover?

A) 100 kilometers (62 miles)

B) 10 kilometers (6 miles)

C) 1000 meters (3281 feet)

D) 100 meters (328 feet)

Page 271: Test King Virtual Test--Network+

Kim, a network technician wants to use a packet analyzer to troubleshoot a reported problem with a user's workstation with IP address 192.168.1.45. To identify the workstation's packets she wants to use the workstation's MAC address. Which of the following protocols would provide the needed information?

A) DHCP

B) ARP

C) DNS

D) Ping

Page 272: Test King Virtual Test--Network+

An organization currently has CAT5e cabling throughout its office. Kim, the network technician, is troubleshooting a new CAT6 run that supports network traffic but does not meet specification when tested with a TDR. Which of the following is MOST likely the cause?

A) Improper grounding

B) TXRX reversed

C) Incorrect termination

D) Outdated NIC drivers

Page 273: Test King Virtual Test--Network+

Which of the following are components of IPSec? (Select 2)

A) AH B) ESP C) SSH D) ICA E) TLS

Page 274: Test King Virtual Test--Network+

Which of the following authenticates, allows, and controls the execution of router commands?

A) PKI

B) RADIUS

C) Kerberos

D) TACACS+

Page 275: Test King Virtual Test--Network+

A technician is configuring a wireless network. To avoid interference from other wireless networks in the area, the technician should change which setting?

A) Channel

B) SSID

C) Firewall rule

D) Encryption

Page 276: Test King Virtual Test--Network+

Jeff, a company executive, has noticed that a wireless network signal from the company's WAP can be seen in the company's parking lot. Jeff is very worried that this is a potential security threat.Which of the following can be done to eliminate this threat?

A) Implement WEP encryption

B) Decrease signal strength

C) Change wireless channels

D) Rotate the SSID daily

Page 277: Test King Virtual Test--Network+

Which of the following DNS record types provides the hostname to IP address mapping?

A) A record

B) NS record

C) CNAME record

D) MX record

Page 278: Test King Virtual Test--Network+

Which of the following would be used to test out the security of a specific network by allowing it to receive security attacks?

A) Honeynet

B) Honeypot

C) Vulnerability scanner

D) Network based IDS

Page 279: Test King Virtual Test--Network+

Which of the following would Kim, a technician, use in voice over IP communications?

A) SNTP

B) SCP

C) SMTP

D) SIP

Page 280: Test King Virtual Test--Network+

Which of the following is the best way to mitigate security threats on a network?

A) Social engineering

B) User training

C) Incident response

D) Man-in-the-middle

Page 281: Test King Virtual Test--Network+

Which of the following subnet masks would allow for 192.168.0.3 and 192.168.0.240 to be in the same subnet?

A) 255.255.255.0

B) 255.255.255.128

C) 255.255.255.192

D) 255.255.255.248

Page 282: Test King Virtual Test--Network+

Jeff, an administrator, wishes to add a third network segment to the firewall where the company’s public web servers will be placed. Which of the following BEST describes this new segment? A) PKI

B) VPN

C) IPS

D) DMZ

Page 283: Test King Virtual Test--Network+

Which of the following would help a new administrator quickly determine if a network had a VLAN for its publicly accessible servers?

A) Baselines

B) Regulations

C) Logical network diagrams

D) Wiring schematics

Page 284: Test King Virtual Test--Network+

Which of the following has the HIGHEST data rate speed?

A) T1

B) ADSL

C) SDSL

D) OC-3

Page 285: Test King Virtual Test--Network+

Which of the following technologies is associated with the DOCSIS standard?

A) Cable

B) Dialup

C) Wireless

D) Cellular

Page 286: Test King Virtual Test--Network+

Which of the following MUST be used when securing a VoIP network consisting of private IP addresses?

A) IPS

B) Application layer firewall

C) IDS

D) An unmanaged switch

Page 287: Test King Virtual Test--Network+

Which of the following should an administrator do after running a command from the console on the perimeter router?

A) Update the configuration logs

B) Update the network wiring schematics

C) Update the network configuration procedures

D) Compare the configuration with the baseline

Page 288: Test King Virtual Test--Network+

Kim, a technician, is connecting a new desktop computer to a switch. She was only able to locate one cable in the office for installation. The wires at each end are color coded as follows: END A orange-white, orange, green-white, blue, blue-white, green, brown-white, brown. END B green-white, green, orange-white, blue, blue-white, orange, brown-white, brown. Which of the following should Kim do to complete the installation?

A) Re-end the provided cable, keeping the wiring the same.

B) Use the provided cable C) Purchase a crossover cable D) Purchase a straight-through cable

Page 289: Test King Virtual Test--Network+

Which of the following are fiber connectors? (Select 2)

A) LC

B) MTRJ

C) T1

D) DB-9

E) BNC

Page 290: Test King Virtual Test--Network+

Which of the following solutions will detect and disable a rogue access point?

A) Port scan

B) packet sniffer

C) IPS

D) IDS

Page 291: Test King Virtual Test--Network+

Which of the following is the MOST economical way for Sandy, a technician, to implement 10-Gigabit Ethernet at a datacenter?

A) 10GBaseLR

B) 10GBaseSR

C) 10G BaseX

D) 10GBaseT

Page 292: Test King Virtual Test--Network+

Which of the following can be done to increase a wireless LAN cell size?

A) Add a higher gain omni antenna

B) Add diversity antennas

C) Add a higher gain yagi antenna

D) Increase the PoE wattage

Page 293: Test King Virtual Test--Network+

Which of the following can be configured to restrict specific ports and IP addresses from accessing the internal network? (select 2)

A) Layer 2 switch B) MAC address filtering C) ACLs D) IIS server E) Port scanner F) Firewall

Page 294: Test King Virtual Test--Network+

Which of the following is used to identify active hosts along with their network addresses?

A) Port scan

B) Ping sweep

C) IDS

D) NIPS

Page 295: Test King Virtual Test--Network+

Which of the following is used to share traffic between multiple network connections?

A) Load balancer

B) Content filter

C) VPN concentrator

D) Proxy server

Page 296: Test King Virtual Test--Network+

What layers of the OSI model does Stateful Inspection operate at?

It assures the connection (session) between 2 parties is valid and inspects packets from this connection to assure the packets are not malicious (application level) and acts as a circuit level firewall. It operates at the network 3, session 5, & application 7 layers

Page 297: Test King Virtual Test--Network+

Which of the following cable types allows for the LONGEST distance of a Gigabit Ethernet connection? A) Multimode fiber

B) CAT6a

C) Single mode fiber

D) Coaxial

Page 298: Test King Virtual Test--Network+

Which of the following mediums is circuit switched?

A) PSTN

B) ATM

C) Frame relay

D) MPLS