Network + Practice Exam 2

A

1. Which of the following is an industrial control system used with networked
devices such as electrical meters, HVAC devices, and other large
communication systems?
A. SCADA
B. SOHO
C. SOW
D. SoA

C

2. You are the administrator for a telecommunications company and need to add
support for a network control protocol used with streaming media servers.
Which protocol best fits that description?
? A. RSA
? B. RTT
? C. RTSP
? D. SGCP

D

3. Most UNIX/Linux-based systems include the ability to write messages (either
directly or through applications) to log files by using which utility with syslog?
? A. Scribe
? B. Master
? C. Recorder
? D. Logger

C

4. Which tool is shown in the following figure?
? A. Voltmeter
? B. Micrometer
? C. Punchdown
? D. Event recorder

D

5. At what layer of the OSI model do time domain reflectometers operate?
? A. Session
? B. Presentation
? C. Application
? D. Physical

B

6. Which switch is used with ipconfig to purge the DNS cache?
? A. /release
? B. /flushdns
? C. /purgedns
? D. /purge

C

7. Which utility is shown in the following figure (portions of which have been
obscured to prevent telegraphing the answer)?
? A. ipconfig
? B. ifconfig
? C. nslookup
? D. nbtstat

B

8. Your boss returns from a conference and can't stop talking about EUI-64, which
he no doubt overheard other administrators discussing. What is he referring to?
? A. An IPv4 subnet mask
? B. The last 64 bits of an IPv6 address
? C. The MAC address
? D. T

C

9. You've been summoned to a small law firm to help a client with networking
issues that cropped up when it added a number of new workstations. The CIDR
notation appearing in the documentation kept on site is 192.168.12.0/26. What is
the range of IPv4 add

C

10. Traffic is not being allowed through port 53 of the firewall. Which TCP or UDP
protocol is associated with that port by default?
? A. IMAP
? B. RDP
? C. DNS
? D. DHCP

B

11. Which command is shown in the following figure (portions of which have been
obscured to prevent telegraphing the answer)?
? A. arp -d
? B. arp -a
? C. arp -s
? D. traceroute

F,G

12. Which layers of the OSI model match the network interface layer of the TCP/IP
model? (Choose all that apply.)
? A. Application
? B. Presentation
? C. Session
? D. Transport
? E. Network
? F. Data link
? G. Physical

A,B.

13. Which of the following are considered vulnerability scanners? (Choose all correct
choices.)
? A. Nmap
? B. Nessus
? C. OVAL
? D. Blackhole

D

14. IPv4 has automatic private IP addressing within the range beginning 169.254.0.0.
What is the equivalent addressing in IPv6?
? A. There is not an equivalent.
? B. FFFF:: prefix
? C. 0000:: prefix
? D. FE80:: prefix

C

15. What is the next step in the troubleshooting methodology after identifying
the problem?
? A. Test the theory to determine the cause.
? B. Implement the solution or escalate as necessary.
? C. Establish a theory of probable cause.
? D. Document finding

B

16. Which of the following enables electrical power to transmit over twisted-pair
Ethernet cable?
? A. PPPoE
? B. PoE
? C. VoIP
? D. iSCSI

D

17. Which of the following can be used on the Internet to capture data traveling
between computers?
? A. Registered Jack
? B. NIDS
? C. NIPS
? D. Packet sniffer

C

18. Which type of connector is used with coaxial cable?
? A. ST
? B. SC
? C. F
? D. MT-RJ
? E. LC
? F. FC

A,D

19. Which two of the following define types of wiring closets? (Choose two.)
? A. MDF
? B. XDF
? C. FDF
? D. IDF

D

20. Traffic is not being allowed through ports 67 and 68 of the firewall. Which TCP
or UDP protocol is associated with those ports by default?
? A. IMAP
? B. RDP
? C. DNS
? D. DHCP
? E. SMB
? F. TFTP

B,D.

21. Which of the following are link-state protocols? (Choose all that apply.)
? A. IGRP
? B. OSPF
? C. RIP
? D. IS-IS

D

22. Which utility is shown in the following figure (portions of which have been
obscured to prevent telegraphing the answer)?
? A. tracert
? B. arp
? C. ping6
? D. netstat

C

23. Which of the following refers to the connection point between the ISP's part of
the network and the customer's portion of the network?
? A. Loop
? B. Rubicon
? C. Demarcation
? D. DMZ

A,B.

24. In a traditional crossover cable, which sets of wires are crossed? (Choose all
correct answers.)
? A. 1 and 3
? B. 2 and 6
? C. 4 and 8
? D. 5 and 7

C

25. Which of the following is a security protocol designed to provide centralized
validation of users who attempt to gain access to a router or network access
server (NAS)?
? A. RDP
? B. AAA
? C. TACACS+
? D. ASDM

A

26. Which of the following is a digitally signed statement that associates the
credentials of a public key to the identity of the person, device, or service that
holds the corresponding private key?
? A. Certificate
? B. Record
? C. Card
? D. Ticket

D

27. To prevent intruders from gaining access to your live data, you have been
instructed to create another server that may lure attackers in and allow you to
catch them in the act. What type of server do you need to create?
? A. NAT
? B. DMZ
? C. ACL
? D.

B

28. Which of the following is a collection of software, standards, and policies
combined to enable users from the Internet or other unsecured public networks
to securely exchange data?
? A. Honeynet
? B. PKI
? C. X.509
? D. X.500

D

29. Which of the following is a security protocol designed to ensure privacy between
communicating client/server applications?
? A. STFP
? B. TFTP
? C. IGMP
? D. TLS

B

30. Which type of RAID implements disk striping with distributed parity?
? A. RAID 1
? B. RAID 5
? C. RAID 0
? D. RAID 0 + 1

A

31. Traffic is not being allowed through port 143 of the firewall. Which TCP or UDP
protocol is associated with that port by default?
? A. IMAP
? B. RDP
? C. DNS
? D. DHCP
? E. SIP
? F. MGCP

C

32. Which of the following refers to the rate of data delivery over a communication
channel?
? A. Cost
? B. Convergence
? C. Throughput
? D. Latency
? E. Route aggregation

A

33. Which of the following involves the use of multiple antennas to increase
data throughput?
? A. MIMO
? B. HSPA+
? C. LTE
? D. WiMAX

A

34. The monitoring software you are using shows which host is receiving the most
data. This is helpful in knowing who is downloading large amounts of data from
the Internet. What is this host referred to as by many monitoring tools?
? A. Top listener
? B.

A,D

35. Which of the following protocols enable client systems to access and run
applications on a remote system, using that system's resources? (Choose all
correct answers.)
? A. RDP
? B. MOU
? C. SOW
? D. ICA

B

36. Which key is a nonsecret key that forms half of a cryptographic key pair used
with a public key algorithm and freely given to all potential receivers?
? A. Open
? B. Public
? C. Private
? D. Restricted

C

37. Which of the following is true on a network that uses CSMA/CD?
? A. Nodes can be prioritized for access to the network media.
? B. No node is given direct access to the network media.
? C. Every node has equal access to the network media.
? D. Collisi

D

38. What hardware is located at the demarcation point?
? A. AP
? B. Punchdown block
? C. Terminator
? D. Smart jack

B

39. Traffic is not being allowed through port 443 of the firewall. Which TCP or UDP
protocol is associated with that port by default?
? A. RDP
? B. HTTPS
? C. SSH
? D. SMTP
? E. H.323

C

40. What is the primary purpose of PPTP?
? A. Routes data through multiple ports
? B. Enables you to disable the capability for traffic to pass through a port
? C. Creates a secure tunnel between two points on a network
? D. Looks for inappropriate activi

B

41. Which of the following tests focus on network functioning today, as opposed to
what may or may not be in the future?
? A. Load tests
? B. Performance tests
? C. EGP tests
? D. IGP tests

B

42. An IP address of 130.3.3.3 falls into which class?
? A. Class A
? B. Class B
? C. Class C
? D. Class D
? E. Class E

C

43. Which of the following is a framework defining the procedures for authentication,
creation, and management of security associations (SAs), key generation
techniques, and threat mitigation?
? A. STFP
? B. TFTP
? C. ISAKMP
? D. TLS

D

44. What type of cable connects systems to the switch or hub using the MDI-X ports?
? A. Plenum
? B. ISA
? C. Cross-over
? D. Straight-through

B

45. Which framework defines a spectrum of security measures, policies, and
procedures that are combined to create a secure network?
? A. ACL
? B. AAA
? C. PKI
? D. OC3

C

46. You try to troubleshoot telephony issues. What enables you to connect to an
existing communication line and use it (make a call, answer a call, or listen in to
a call)?
? A. OTDR
? B. TDR
? C. Butt set
? D. Loopback plug

A

47. During what type of attack does an attacker send continuous ping packets to a
server or network system, eventually tying up that system's resources, making it
unable to respond to requests from other systems?
? A. ICMP flood
? B. Buffer overflow
? C.

A

48. Traffic is not being allowed through port 3389 of the firewall. Which TCP or UDP
protocol is associated with that port by default?
? A. RDP
? B. HTTPS
? C. SSH
? D. SMTP
? E. NetBIOS
? F. SIP

A,C.

49. Which of the following are distance-vector protocols? (Choose all that apply.)
? A. IGRP
? B. OSPF
? C. RIP
? D. IS-IS

D

50. Which of the following refers to specific access permissions assigned to an object
or device on the network? (For example, wireless routers can be configured to
restrict who can and cannot access the router based on the MAC address.)
? A. GFS
? B. DAC

B

51. Which of the following refers to the mechanisms used to verify the identity of
the computer or user attempting to access a particular resource (including
passwords and biometrics)?
? A. Access control
? B. Authentication
? C. Authorization
? D. Accoun

B

52. Which of the following protocols facilitates the access and downloading of
messages from newsgroup servers?
? A. NTP
? B. NNTP
? C. SIP
? D. RTP

A

53. When a WAN is confined to a certain geographic area, such as a university
campus or city, it is sometimes known as which of the following?
? A. MAN
? B. SAN
? C. NAS
? D. CRAN

C

54. Which of the following refers to the wireless technologies involved in connecting
devices in close proximity to exchange data or resources?
? A. CAN
? B. WAN
? C. WPAN
? D. MPLAN

B

55. What protocol is used by systems within a multicast group to communicate
registration information with each other?
? A. ICMP
? B. IGMP
? C. NNTP
? D. NTP

B,D.

56. Which of the following connectors would you use when working with fiber-optic
cable? (Choose the two best answers.)
? A. RJ-11
? B. SC
? C. RJ-45
? D. ST
? E. BNC
? F. RG-59
? G. RG-6

B

57. Your manager asks you to procure a cable with a Type A connector on one end
and a Type B connector on the other. What kind of interface are you most likely
to be dealing with?
? A. 568A/568B
? B. USB
? C. RJ-11
? D. Fiber-optic

C

58. Which of the following wireless security protocols uses TKIP?
? A. WEP-Open
? B. WEP-Shared
? C. WPA
? D. WAP-Shared
? E. AES

A

59. Which of the following is a valid Class A IP address?
? A. 124.254.254.254
? B. 127.0.0.1
? C. 128.16.200.12
? D. 131.17.25.200

A,C

60. You are the administrator for a network with 2 Windows Server systems and
40 Windows client systems. One morning, three users call to report that they
are having problems accessing the Windows servers. Upon investigation, you
determine that the DHCP s

A

61. Which of the following is not a protocol and not part of the TCP/IP protocol
suite? (Choose all that apply.)
? A. VPN
? B. FTP
? C. DHCP
? D. HTTP
? E. DNS

C

62. You are attempting to configure a client's email program. The user can receive
mail but cannot send any. In the mail server configuration screen of the mail
application, you notice that the Type of Outgoing Mail Server field is blank. This
explains wh

C

63. Which of the following is a configurable client identification setting used to
differentiate one WLAN from another?
? A. SID
? B. WPA2
? C. SSID
? D. Wireless channel

A

64. Which of the following is a valid MAC address?
? A. 00:D0:59:09:07:51
? B. 00:D0:59
? C. 192.168.2.1
? D. 2001:0db8:85a3:0000:0000:8a2e:0370:7334
? E. 00:DG:59:09:07:51

A

65. Which of the following best describes 802.1X?
? A. Port-based access control
? B. A wireless standard specifying 54Mbps data transfer
? C. A wireless standard specifying 600Mbps data transfer
? D. Integrity-based access control

C

66. Which command produces the following output (portions of which have been
obscured to prevent telegraphing the answer)?
? A. nslookup
? B. nbtstat
? C. pathping
? D. netstat

B

67. Which command would clear the routing table of all gateway entries?
? A. route -p
? B. route -f
? C. route -g
? D. route -r

A

68. Which layer of the OSI model is responsible for placing the signal on the network
medium?
? A. Physical
? B. Data link
? C. MAC
? D. LLC
69.

D

69. An IP address of 230.5.7.9 falls into which class?
? A. Class A
? B. Class B
? C. Class C
? D. Class D
? E. Class E

C

70. Which TCP or UDP protocol is associated with port 22 by default?
? A. RDP
? B. HTTPS
? C. SSH
? D. SMTP

B

71. Which layer of the OSI model is responsible for synchronizing the data exchange
between applications on separate devices?
? A. Presentation
? B. Session
? C. Transport
? D. Network

D

72. Which of the following performs the same basic function as a wire media tester,
but on optical media?
? A. Punchdown tool
? B. Voltage event recorder
? C. Toner probe
? D. OTDR
? E. Multimeter
? F. Wi-Fi analyzer

C,D,E.

73. Which three of the following protocols are commonly used to create, manage,
and secure VPNs? (Choose three.)
? A. PPPoE
? B. SIP
? C. PPTP
? D. L2TP
? E. IPsec

A

74. Which of the following are specifically used to locate cables and track them from
the patch panel to their destination?
? A. Toner probes
? B. Cable certifiers
? C. Punchdown tools
? D. Butt sets
? E. Protocol analyzers

C

75. Which of the following refers to the method used to determine whether an
authenticated user has access to a particular resource (commonly determined
through group association)?
? A. Access control
? B. Authentication
? C. Authorization
? D. Accounting

A

76. Which of the following is part of a strategic security solution that provides secure
authentication services to users, applications, and network devices?
? A. Kerberos
? B. PKI
? C. LDAP
? D. SSL

C

77. Which key is the secret half of a cryptographic key pair that is never transmitted
over a network?
A. Open
B. Public
C. Private
D. Restricted

D

78. Which of the following refers to the tracking mechanisms used to keep a record
of events on a system?
? A. Access control
? B. Authentication
? C. Authorization
? D. Accounting

D

79. To create secure data transmissions, IPsec uses which two separate protocols?
? A. EGP and BGP
? B. EIGRP and IGRP
? C. AH and IGRP
? D. AH and ESP

B

80. Your company has become very concerned about security of the physical
premises since winning some new contracts. Management is installing a small
room at the main entryway that will have two sets of interlocking doors (one door
must be closed before t

A

81. Which layer of the OSI model is responsible for converting data from the
application layer into a format that can be sent over the network?
? A. Presentation
? B. Session
? C. Transport
? D. Network

D

82. Which of the following is part of a network on which you place servers that must
be accessible by sources both outside and inside your network?
? A. MAN
? B. SAN
? C. NAS
? D. DMZ
83. Which type of RAID

C

83. Which type of RAID offers no fault tolerance and improves I/O performance
(requiring a minimum of two disks)?
? A. RAID 1
? B. RAID 5
? C. RAID 0
? D. RAID 0 + 1

C

84. Which type of media is used to connect telecommunication rooms, server
rooms, and remote locations and offices?
? A. PCV
? B. Plenum
? C. Vertical
? D. Tracer

A

85. Which switch can be used with ping to force it to use IPv6?
? A. -6
? B. -a
? C. -n
? D. -l

D

86. What is the next step in the troubleshooting methodology after testing the theory
to determine cause?
? A. Identify the problem.
? B. Implement the solution or escalate as necessary.
? C. Establish a theory of probable cause.
? D. Establish a plan of

D

87. What is the software-based firewall included with modern Windows versions
known as?
? A. PAT
? B. Firewall Manager
? C. ICS
? D. Windows Firewall

B

88. Which of the following is a UDP-based protocol for file transfer that does not
include security or error checking?
? A. STFP
? B. TFTP
? C. IGMP
? D. TLS

A

89. Which utility is shown in the following figure (portions of which have been
obscured to prevent telegraphing the answer)?
? A. Event Viewer
? B. System Monitor
? C. Performance Monitor
? D. Network Monitor

A

90. Which type of the following fiber connectors has a twist-type attachment?
? A. ST
? B. SC
? C. LC
? D. MT-RJ

B

91. You are configuring a secretary's workstation to share files with others on
the network. You want anything she places in a particular location to be
automatically shared with users who have access to that folder. All workstations
in question, includin

C

92. Which utility is shown in the following figure (portions of which have been
obscured to prevent telegraphing the answer)?
? A. tracert
? B. arp
? C. ping
? D. netstat

A

93. How does a router that uses a link-state protocol differ from a router that uses a
distance-vector protocol?
? A. Link-state builds a map of the entire network and then holds that map
in memory.
? B. Distance-vector builds a map of the entire network

C

94. Which layer of the OSI model is responsible for establishing, maintaining, and
breaking connections between two devices?
? A. Presentation
? B. Session
? C. Transport
? D. Network

C

95. A toner probe consists of which two parts?
? A. Tone gauge and tone indicator
? B. Tone sine and tone cosine
? C. Tone generator and tone locator
? D. Tone test and tone bank

E

96. An IP address of 241.45.37.29 falls into which class?
? A. Class A
? B. Class B
? C. Class C
? D. Class D
? E. Class E

D

97. Which TCP or UDP protocol is associated with port 25 by default?
? A. RDP
? B. HTTPS
? C. SSH
? D. SMTP

A

98. The CIDR notation for the network you are now troubleshooting is
192.168.67.32/28. What is the range of IPv4 addresses that can be assigned to
workstations?
? A. 192.168.67.33 to 192.168.67.46
? B. 192.168.67.33 to 192.168.67.62
? C. 192.168.67.1 to 1

C

99. Which utility is shown in the following figure (portions of which have been
obscured to prevent telegraphing the answer)?
? A. ipconfig
? B. nbtstat
? C. ifconfig
? D. nslookup

C

100. A colleague asks to take a measure of performance that indicates how hard the
network is working and where network resources are being spent. What is this
known as?
? A. Foundation
? B. Metric
? C. Baseline
? D. Control