Independence Day Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: netdisc

CompTIA JK0-019 CompTIA E2C Network + Certification Exam Exam Practice Test

Demo: 124 questions
Total 828 questions

CompTIA E2C Network + Certification Exam Questions and Answers

Question 1

Which of the following source ports is MOST likely to be used by a client when making an outbound TCP connection to a windows server?

Options:

A.

80

B.

445

C.

3000

D.

3389

Question 2

At which layer of the TCP/IP model would cabling exist?

Options:

A.

Network Interface

B.

Internet

C.

Application

D.

Transport

Question 3

Which of the following network devices builds a table of ports to MAC addresses to forward packets only to necessary ports?

Options:

A.

Switch

B.

Hub

C.

Router

D.

Repeater

Question 4

Which of the following networking devices can exist at several layers of the OSI model at the same time? (Select TWO).

Options:

A.

Switch

B.

Cable

C.

Repeater

D.

Router

E.

Bridge

F.

Hub

Question 5

Which of the following uses a 128-bit addressing scheme?

Options:

A.

MAC

B.

DHCP

C.

IPv4

D.

IPv6

Question 6

Which of the following protocols resolves IP addresses to MAC addresses?

Options:

A.

DNS

B.

ARP

C.

RARP

D.

NTP

Question 7

Which of the following contains the SYN and ACK flags?

Options:

A.

UDP header

B.

IP header

C.

TCP header

D.

ICMP header

Question 8

Which of the following OSI model layers are present in the application layer of the TCP/IP model? (Select TWO).

Options:

A.

Data Link

B.

Transport

C.

Network

D.

Session

E.

Presentation

Question 9

Which of the following protocols could the below packet capture be from?

Port: 161

msgVersion:

msgUsername:

msgAuthenticationParameters:

msgPrivacyParameters:

msgData:

data: get-request

request-iD.

error-status: noError (0)

error-index: 0

variable-bindings: 0 items

Options:

A.

SNMPv3

B.

SSH

C.

HTTP

D.

SNMPv1

Question 10

A technician, Joe, visits a site that has reported a network down emergency. He immediately reboots the switches and the router since the network is down. Which of the following network troubleshooting methodology steps should Joe have performed FIRST?

Options:

A.

Determine if anything has changed

B.

Once a theory is confirmed determine the next step is to resolve the problem

C.

Implement the solution or escalate as necessary

D.

Question the obvious

Question 11

Which of the following is the common port used for IMAP?

Options:

A.

25

B.

53

C.

143

D.

443

Question 12

A technician wants to send management information from devices on the network to a central server and have it encrypted in the process. Which of the following protocols can be used?

Options:

A.

SNMPv3

B.

FTP

C.

TFTP

D.

Telnet

Question 13

Which of the following remote access protocols is commonly used for command line access to a device?

Options:

A.

RAS

B.

VPN

C.

RDP

D.

SSH

Question 14

Which of the following services are affected by closing the default ports of 80 and 21 via ACL on a company router?

Options:

A.

FTP and basic Internet traffic

B.

HTTPS and IMAP traffic

C.

DNS and TELNET traffic

D.

VPN and RDP traffic

Question 15

A technician replaces a failed router in an office with the same model unit using the default settings. After the installation, the technician reboots all of the PCs and servers. Upon reboot some of the PCs are receiving IP addresses on the same subnet as the new router; other PCs are receiving addresses on the same subnet as the servers. Which of the following most likely describes the issue?

Options:

A.

The DHCP lease pool was not large enough

B.

DHCP lease times were set too low

C.

The router is not the only DHCP server

D.

DHCP was not enabled on the replacement router

Question 16

A multi-layer switch operates at which of the following OSI layers?

Options:

A.

Layers 1 and 5

B.

Layers 2 and 3

C.

Layers 4 and 5

D.

Layers 5 and 6

Question 17

The components of a NIC function at which of the following layers of the OSI model? (Select TWO).

Options:

A.

Layer 1

B.

Layer 2

C.

Layer 3

D.

Layer 4

E.

Layer 5

Question 18

Which of the following allows for groups of ports on the same switch to operate as a part of different segmented networks?

Options:

A.

RIP

B.

STP

C.

VLAN

D.

MTU

Question 19

A technician has installed a group of layer 2 switches with multiple VLANs. The VLANs cannot talk to each other. Which of the following network devices could correct this problem? (Select TWO).

Options:

A.

Hub

B.

DNS server

C.

DHCP server

D.

Layer 3 switch

E.

Router

Question 20

203.50.5.0 is an example of which of the following network classes?

Options:

A.

Class A

B.

Class B

C.

Class C

D.

Class D

Question 21

Which of the following protocols is used by Windows to securely access a remote computer?

Options:

A.

RAS

B.

Telnet

C.

PPP

D.

RDP

Question 22

Companies trying to cut down on constant documentation of IP addresses could use which of the following?

Options:

A.

Longer lease times

B.

More reservations

C.

Larger scopes

D.

Dynamic IP addressing

Question 23

Several users from the finance department report that they are able to access the Internet, but unable to connect to their financial applications. The network technician is unable to ping the finance server. The technician decides to check the switch and determines that Internet access is working. Which of the following is a possible cause of the access issues?

Options:

A.

Faulty cable

B.

Remote management disabled

C.

Improper VLAN assignment

D.

Mismatched duplex

Question 24

A network administrator is tasked with blocking unwanted spam is being relayed by an internal email server. Which of the following is the FIRST step in preventing spam that is originating from bots on the network?

Options:

A.

Closing off port 25 on the firewall

B.

Closing off port 53 on the firewall

C.

Turning off the SMTP service on the email server

D.

Turning off the IMAP service on the email server

Question 25

On which of the following OSI model layers would a MAC address be used?

Options:

A.

Network

B.

Data Link

C.

Transport

D.

Physical

Question 26

A user reports that they are unable to access a new server but are able to access all other network resources. Based on the following firewall rules and network information, which of the following ACL entries is the cause?

User’s IP: 192.168.5.14

Server IP: 192.168.5.17

Firewall rules:

Permit 192.168.5.16/28192.168.5.0/28

Permit 192.168.5.0/24192.168.4.0/24

Permit 192.168.4.0/24192.168.5.0/24

Deny 192.168.5.0/28192.168.5.16/28

Deny 192.168.14.0/24192.168.5.16/28

Deny 192.168.0.0/24192.168.5.0/24

Options:

A.

Deny 192.168.0.0/24192.168.5.0/24

B.

Deny 192.168.5.0/28192.168.5.16/28

C.

Deny 192.168.14.0/24192.168.5.16/28

D.

Implicit Deny rule

Question 27

A network manager is interested in a device that watches for threats on a network but does not act on its own, and also does not put a strain on client systems. Which of the following would BEST meet these requirements?

Options:

A.

HIDS

B.

NIDS

C.

NIPS

D.

HIPS

Question 28

Which of the following would be used to place extranet servers in a separate subnet for security purposes?

Options:

A.

VPN

B.

NAT

C.

DMZ

D.

IDS

Question 29

A network technician has recently discovered rogue devices on their network and wishes to implement a security feature that will prevent this from occurring. Which of the following will prevent unauthorized devices from connecting to a network switch?

Options:

A.

Implement 802.11i on all switches in the network.

B.

Implement port security on all computers in the company.

C.

Implement port security on all switches in the network.

D.

Implement rules on the firewall to block unknown devices.

Question 30

Which of the following attacks is spread by attaching themselves to files?

Options:

A.

Worms

B.

Botnet

C.

DDoS

D.

FTP bounce

Question 31

Which of the following a network technician would use to reverse engineer malware and virus?

Options:

A.

IDS

B.

VLAN

C.

Virtual Machine

D.

Switch

Question 32

A network technician is concerned that an attacker is attempting to penetrate the network, and wants to set a rule on the firewall to prevent the attacker from learning which IP addresses are valid on the network. Which of the following protocols needs to be denied?

Options:

A.

TCP

B.

SMTP

C.

ICMP

D.

ARP

Question 33

Which of the following would be used in a firewall to block incoming TCP packets that are not from established connections?

Options:

A.

Access control lists

B.

Port address translation

C.

Blocking unauthorized ports

D.

Stateful inspection

Question 34

Which of the following does Kerberos provide?

Options:

A.

Non-repudiation

B.

Accounting

C.

Exchange

D.

Authentication

Question 35

A user wants to send information and ensure that it was not modified during transmission. Which of the following should be implemented?

Options:

A.

MAC filtering

B.

Digital signatures

C.

MS-CHAP

D.

CHAP

Question 36

Which of the following would be used to check whether a DoS attack is taking place from a specific remote subnet?

Options:

A.

Syslog files

B.

Honeypot

C.

Network sniffer

D.

tracert

Question 37

Which of the following performs authentication and provides a secure connection by using 3DES to encrypt all information between two systems?

Options:

A.

HTTPS

B.

SSH

C.

RSA

D.

SSL

Question 38

An unusual amount of activity is coming into one of the switches in an IDF. A malware attack is suspected. Which of the following tools would appropriately diagnose the problem?

Options:

A.

Cable tester

B.

Protocol analyzer

C.

Load balancer

D.

OTDR

Question 39

An administrator configuring remote access opens ports 500/UDP and 10000/UDP on the firewall. Which of the following services are MOST likely being allowed? (Select TWO).

Options:

A.

SSL

B.

IPSec

C.

Kerberos

D.

RDP

E.

L2TP

F.

PPTP

Question 40

Which of the following provides the STRONGEST security for a tunneled connection over the Internet?

Options:

A.

RDP

B.

SMTP

C.

RAS

D.

IPSec

Question 41

Which of the following BEST describes a firewall that can be installed via Add/Remove programs on a Windows computer?

Options:

A.

Managed

B.

Software

C.

Hardware

D.

Wireless

Question 42

A technician notices that guests have plugged their laptops into a network wall jack located in the conference room. Which of the following could the technician implement in order to ensure that ONLY employees are able to access network resources?

Options:

A.

Port mirroring

B.

VTP configuration

C.

MAC address filtering

D.

Traffic filtering

Question 43

Which of the following authentication solutions use tickets that include valid credentials to access additional network resources?

Options:

A.

Kerberos

B.

RADIUS

C.

Multi-factor authentication

D.

TACACS+

Question 44

Which of the following tools will scan a network for hosts and provide information on the installed operating system?

Options:

A.

DOCSIS

B.

NMAP

C.

IMAP

D.

BERT

Question 45

Which of the following tools could attempt to detect operating system vulnerabilities?

Options:

A.

nslookup

B.

honeynet

C.

netstat

D.

nessus

Question 46

Users are reporting that external web pages load slowly. The network administrator determines that the Internet connection is saturated. Which of the following is BEST used to decrease the impact of web surfing?

Options:

A.

Caching

B.

Load balancing

C.

Port filtering

D.

Traffic analyzer

Question 47

Which of the following monitoring devices are used only to recognize suspicious traffic from specific software?

Options:

A.

Signature based IPS

B.

Application based IDS

C.

Anomaly based IDS

D.

Application based IPS

Question 48

A network technician has a RADIUS server IP address that must be included as part of the security settings for a WAP. Which of the following encryption types should the technician select?

Options:

A.

WPA enterprise

B.

TKIP

C.

WPA2 CCMP

D.

WEP 128-bit

Question 49

A company needs to implement a secure wireless system that would require employees to authenticate to the wireless network with their domain username and password. Which of the following would a network administrator deploy to implement these requirements? (Select TWO).

Options:

A.

802.1q

B.

MAC address filtering

C.

WPA2 Personal

D.

WPA Enterprise

E.

802.1x

Question 50

Which of the following should be mitigated by employing proper coding techniques when developing software?

Options:

A.

Distributed denial of service attacks

B.

Buffer overflows

C.

War driving

D.

Packet sniffing

Question 51

Which of the following standards can operate at either 20MHz or 40MHz channel spacing?

Options:

A.

802.11a

B.

802.11b

C.

802.11g

D.

802.11n

Question 52

Users have contacted the helpdesk stating that they have been having difficulties staying connected to the wireless network. They report that their laptops connect to one access point, drop the connection and then connect to a different access point in a never-ending cycle. Which of the following would BEST remediate this?

Options:

A.

Reconfigure the access points from 802.11b to 802.11g.

B.

Establish procedures which limit user connections during peak hours.

C.

Configure the access points so that they all use different SSIDs.

D.

Move one or more access points, minimizing signal overlap.

Question 53

Which of the following must a technician enable on a switch in order to be able to view all of the packets traversing a switch using a packet sniffer?

Options:

A.

STP

B.

Port Mirroring

C.

VLANs

D.

PoE

Question 54

A company is looking for the simplest solution to help prioritize VoIP traffic on its congested network. Which of the following would BEST accomplish this?

Options:

A.

MPLS

B.

Caching engines

C.

QoS

D.

Load balancing

Question 55

Which of the following protocols is MOST commonly associated with VoIP?

Options:

A.

LDAP

B.

HTTPS

C.

SIP

D.

SCP

Question 56

A technician is setting up a wireless access point and wants to keep it as secure as possible. Which of the following settings should be configured for security purposes? (Select TWO).

Options:

A.

Channel

B.

Encryption

C.

Diversity

D.

SSID broadcast

E.

Frequency

Question 57

A company has installed a wireless network for visitors to use. They wish to give the visitors easy access to that network. Based on the configurations below, which of the following should the administrator change?

Access Point 1Access Point 2

802.11g802.11b

Encryption: WPA2Encryption: WEP

Channel: 1Channel: 7

SSID. CompanyWiFiSSID. Visitor

Options:

A.

Change the SSID on Access Point 2 to OPEN.

B.

Disable SSID broadcasting on Access Point 1.

C.

Change the encryption on Access Point 2 to WPA2.

D.

Remove the WEP encryption from Access Point 2.

Question 58

A network technician is setting up a wireless access point that would only allow a certain laptop to be able to access the WAP. By using ACL, which of the following would be filtered to ensure only the authorized laptop can access the WAP?

Options:

A.

NetBIOS name filtering

B.

IP address filtering

C.

MAC address filtering

D.

Computer name filtering

Question 59

A network technician is designing a SOHO environment where cost is a consideration. The requirements include access to the Internet and access to the guest house which is 100 feet away. The location of the Internet modem is located in the main house. Which of the following is the BEST option to accomplish these requirements?

Options:

A.

Use two combined Internet/router/wireless devices, one in each house.

B.

Use a Layer 3 switch in the main house and a combined Internet/router/wireless device in the guest house.

C.

Use a combined Internet/router/wireless device in the main house and a wireless access point in the guest house.

D.

Use a single combined Internet/router/wireless device at the guest house.

Question 60

An administrator notices that a computer on the network is unable to reach any of the servers by hostname. The computer has connectivity to the network and is able to ping all the devices by IP address. Which of the following can cause the error?

Options:

A.

The workstation has a duplicate IP address.

B.

The workstation has been assigned to the wrong VLAN.

C.

The workstation has the wrong gateway configured.

D.

The workstation has the wrong DNS configured.

Question 61

A network administrator is replacing old switches to support a VoIP deployment. Based on this parameter, which of the following is MOST likely to be implemented on these new switches?

Options:

A.

PoE

B.

STP

C.

NAT

D.

VTP

Question 62

Which of the following antenna types has a flat circular radiation pattern?

Options:

A.

Diversity

B.

Yagi

C.

Omni

D.

Patch

Question 63

Which of the following is the reason why a company’s network may contain a DHCP server?

Options:

A.

To assign IP addresses to devices on the network

B.

To convert IP addresses to fully qualified domain names

C.

To provide POP3 and IMAP email functionality

D.

To allow secure remote access

Question 64

An administrator would like to get more speed out of a wireless network. The administrator decides to configure the AP with a frequency width of 40MHz. Which of the following features is the administrator MOST likely using?

Options:

A.

MIMO

B.

AP isolation

C.

Channel bonding

D.

Burst mode

Question 65

After a new user moves furniture into a cubicle, the computer does not connect to the network any longer.

Which of the following would be the MOST likely reason? (Select TWO).

Options:

A.

Bad Ethernet switch port

B.

TX/RX reversed

C.

Bad connectors

D.

Bad patch cable

E.

Mismatched MTU

Question 66

A network technician needs to configure a port on a switch to provide connectivity and electrical support to a WAP being installed in a warehouse. Which of the following features needs to be configured on the switch?

Options:

A.

STP

B.

PoE

C.

VTP trunking

D.

Port forwarding

Question 67

The network support team is constantly getting calls from users in a specific area of an office building. The users are able to connect to the office wireless network, but they sometimes disconnect or experience very slow download speeds. Which of the following is MOST likely the problem?

Options:

A.

Incorrect service set identifier

B.

Low signal strength or interference

C.

Incorrect encryption scheme

D.

Incorrect IP address or subnet mask

Question 68

Some employees are unable to maintain a wireless network connection. The network’s wireless infrastructure is comprised of three different buildings with the configurations listed below. Wireless network in Building A and C is used exclusively for internal employees and Building B is used for visitors and requires no additional configuration on their devices. Which of the following settings would need to be modified to provide the BEST wireless experience for all employees as they move between buildings?

Building ABuilding BBuilding C

Channel: 1Channel: 6Channel: 11

Encryption: WPA2Encryption: OpenEncryption: WPA2

SSID. CorpSSID. GuestSSID. Sales

Options:

A.

Change Channel in Building B to 7

B.

Change Encryption in Building B to match A and C

C.

Change Channel in Building C to 1

D.

Change SSID in Building C to match Building A

Question 69

A network administrator suspects a broadcast storm is causing performance issues on the network. Which of the following would be used to verify this situation?

Options:

A.

Environmental monitor

B.

Multimeter

C.

Toner probe

D.

Protocol analyzer

Question 70

A network administrator needs to implement a monitoring tool and be able to send log information to a server and receive log information from other clients. Which of the following should be implemented? (Select TWO).

Options:

A.

SNMP

B.

Network sniffer

C.

Syslog

D.

System log

E.

History log

Question 71

A network administrator is tasked with deploying a company-wide wireless system which allows for accurate tracking of employees’ wireless device locations via WAP triangulation. Which of the following is the MOST important aspect of the deployment?

Options:

A.

WAP placement

B.

TX/RX channel

C.

Signal strength

D.

Transmission power

Question 72

Which of the following connectors is usable in SFP modules?

Options:

A.

ST

B.

LC

C.

LX

D.

SX

Question 73

A technician is reviewing the following aggregated information on a server to determine the cause of a user’s connection problem:

Which of the following is the technician reviewing?

Options:

A.

Syslog server logs

B.

Application logs

C.

Network sniffer logs

D.

SNMPv2 queries

Question 74

A user reports that some normally accessible external sites are not responding, but most other sites are responding normally. Which of the following is MOST likely the cause?

Options:

A.

VLAN tag mismatch

B.

Wrong subnet mask

C.

Smurf attack

D.

Faulty routing rule

Question 75

A technician needs multiple networks, high speeds, and redundancy on a system. Which of the following configurations should be considered for these requirements? (Select TWO).

Options:

A.

Routing table

B.

Next hop

C.

Port mirroring

D.

Port monitoring

E.

VLANs

Question 76

A user has network connectivity per the link lights on the NIC, but cannot access any network resources or the Internet. Which of the following commands should the technician run FIRST?

Options:

A.

arp

B.

ipconfig

C.

tracert

D.

route

Question 77

Drag and drop each networking tool to the MOST appropriate descriptor. Each tool may only be used once.

Options:

Question 78

An IT manager is looking for a solution that can easily trace back suspicious Internet browsing to particular users at a company. Which of the following can BEST provide this functionality?

Options:

A.

Layer 3 managed switch

B.

VPN concentrator

C.

Load balancer

D.

Content filter

Question 79

Users report that they are unable to access any external websites. The local intranet is not affected. A network technician has isolated the problem to a Linux-based server. Which of the following commands will enable the technician to view DNS information on the Linux-based server?

Options:

A.

nbtstat

B.

ipconfig

C.

dig

D.

netstat

Question 80

A technician has to terminate a CAT3 cable to a 110 block. Which of the following tools should the technician use?

Options:

A.

Loopback plug

B.

Multimeter

C.

Punch down

D.

Crimper

Question 81

Which of the following can be used to prioritize network streams to optimize performance for certain traffic types?

Options:

A.

VLAN

B.

VPN

C.

QoS

D.

PoE

Question 82

Which of the following would MOST likely be used by a network administrator to test DNS resolution?

Options:

A.

dig

B.

ipconfig

C.

netstat

D.

nbtstat

Question 83

Which of the following network performance optimization methods allows for frequently accessed sites to be housed locally, thereby reducing bandwidth requirements?

Options:

A.

Load balancing

B.

Traffic policing

C.

Caching engines

D.

Traffic shaping

Question 84

A network technician is concerned that a user is utilizing a company PC for file sharing and using a large amount of the bandwidth. Which of the following tools can be used to identify the IP and MAC address of the user’s PC?

Options:

A.

System log

B.

History log

C.

Network sniffer

D.

Nslookup

Question 85

Which of the following switches is used with ARP to display the cache entry for a specific IP address?

Options:

A.

-a

B.

-d

C.

-g

D.

-s

Question 86

Which of the following can determine the last time an address lease was renewed on a network device?

Options:

A.

System log

B.

Packet sniffer

C.

Time domain reflectometer

D.

Stateful packet filter

Question 87

The company’s main server is using 98% of its available resources and Joe needs to evenly distribute the work to another server using which of the following?

Options:

A.

VPN concentrator

B.

Content filter

C.

Proxy server

D.

Load balancer

Question 88

An organization finds that most of the outgoing traffic on the network is directed at several Internet sites viewed by multiple computers simultaneously. Which of the following performance optimization methods would BEST alleviate network traffic?

Options:

A.

Load balancing internal web servers

B.

Redundant network resources

C.

Implement fault tolerance on the WAN

D.

Implement caching engines

Question 89

Joe, a remote user, has called the helpdesk with an issue on his machine. The technician would like to remote into the machine for troubleshooting but does not know the IP address or host name. Which of the following commands can the technician ask Joe to execute to gain this information?

Options:

A.

netstat

B.

ipconfig

C.

ping

D.

traceroute

Question 90

A user is having difficulty connecting a laptop to the company’s network via a wireless connection. The user can connect to the network via a wired NIC. The technician suspects the laptop’s wireless NIC has failed. The technician performs hardware diagnostics on the wireless NIC and discovers the hardware is working fine. Which of the following network troubleshooting methodology steps should the technician do NEXT?

Options:

A.

Establish a plan of action to resolve the problem.

B.

Test the theory to determine a cause.

C.

Re-establish a new theory or escalate.

D.

Implement the solution or escalate as necessary.

Question 91

An administrator has added QoS settings to the LAN switches prioritizing RTP. Which of the following systems is the Administrator MOST concerned with in this scenario?

Options:

A.

Phone communications

B.

Web site downloads

C.

Streaming video clients

D.

Client bittorrent abilities

Question 92

An administrator wants to translate an internal workstation name to an IP address. Which of the following commands would be used?

Options:

A.

ifconfig

B.

nslookup

C.

netstat

D.

ipconfig

Question 93

Which of the following is used to limit the amount of bandwidth used on a link for different applications to improve overall performance?

Options:

A.

QoS

B.

Fault tolerance

C.

Load balancing

D.

Traffic shaping

Question 94

A company has a server with redundant power supplies. Which of the following is this an example of?

Options:

A.

Traffic shaping

B.

Caching engines

C.

Fault tolerance

D.

Load balancing

Question 95

Which of the following security devices can receive and process HTTP requests from hosts to allow or deny traffic for web browsing purposes only?

Options:

A.

Load balancer

B.

VPN concentrator

C.

Proxy server

D.

DNS server

Question 96

A technician needs to verify the time of a power outage. Which of the following may be used to determine this information?

Options:

A.

Network baseline

B.

Tracert

C.

System logs

D.

Protocol analyzer

Question 97

A network technician is troubleshooting a user’s connectivity problem, and has determined a probable cause. The technician is at which step in the troubleshooting methodology?

Options:

A.

Verify full system functionality

B.

Identify the problem

C.

Establish a theory

D.

Implement the solution

Question 98

Which of the following reasons would MOST likely be used to implement QoS and traffic shaping solutions?

Options:

A.

Redundancy

B.

Fault tolerance

C.

Unified communications

D.

Uptime requirements

Question 99

Users have reported choppy audio in phone conversations since the implementation of SIP phones on the network. Which of the following should be implemented to alleviate the delays?

Options:

A.

Caching

B.

VoIP

C.

QoS

D.

SMTP

Question 100

A technician discovers that the throughput of sales traffic on the primary connection is constantly reaching maximum level, and the sales users are beginning to report slowness while accessing cloud based applications. The technician allows traffic to use the secondary connection so that traffic would share both connections. This is an example of which of the following?

Options:

A.

QoS

B.

Caching engines

C.

Traffic shaping

D.

Load balancing

Question 101

A technician is tasked with replacing some older RS-232 serial printers. Which of the following ports would the technician most likely find on these printers?

Options:

A.

BNC

B.

DB-9

C.

LC

D.

RJ-11

Question 102

In the event of a fire in an office building, which of the following cable types should be installed to prevent toxic gas from burning PVC cable coatings?

Options:

A.

CAT6a

B.

Plenum

C.

Crossover

D.

STP

Question 103

A technician can increase the bandwidth of an 802.11n cell by:

Options:

A.

doubling the channel width.

B.

enabling diversity.

C.

disabling MIMO.

D.

adding a second access point.

Question 104

A user needs maximum distance in a wireless connection. Which of the following should be configured to meet this goal?

Options:

A.

802.11a at 54Mbps

B.

802.11b at 1Mbps

C.

802.11g at 11Mbps

D.

802.11n at 130Mbps

Question 105

The network administrator installed a new dipole antenna that extends 100 feet (30.48 meters) from the existing AP. All components are correct, functional, and installed properly. However, during validation, there is a very weak signal coming from the antenna.

Which of the following is the MOST likely cause of the issue?

Options:

A.

The installation exceeds the link limitations

B.

The antenna is mounted for vertical polarization

C.

The dBi output of the antenna is too low

D.

The radio is too powerful for the installation

Question 106

Which of the following is a packet switching WAN technology?

Options:

A.

Frame relay

B.

T1

C.

Asynchronous transfer mode

D.

ISDN

Question 107

Which of the following is rated for speeds over 800Mbps?

Options:

A.

Coaxial

B.

DB-9

C.

CAT6

D.

CAT5e

Question 108

The phone company has provided a channelized T1 line. Which of the following should this line be connected to?

Options:

A.

Switch

B.

CSU/DSU

C.

IDF

D.

MDF

Question 109

Which of the following is a fiber connector that is slightly smaller than a standard copper network cable connector?

Options:

A.

BNC

B.

GBIC

C.

MT-RJ

D.

SC

Question 110

Which of the following is the MAXIMUM potential speed of CAT5e UTP cable?

Options:

A.

10BaseT

B.

100BaseT

C.

100BaseFX

D.

1000BaseT

Question 111

Which of the following 802.11 standards transmits the signals the GREATEST distance?

Options:

A.

a

B.

b

C.

g

D.

n

Question 112

Which of the following supports faster wireless broadband speeds?

Options:

A.

Satellite

B.

Wi-MAX

C.

ISDN

D.

OC-3

Question 113

Which of the following is a common connector used on a coaxial cable?

Options:

A.

RJ-45

B.

DB-25

C.

BNC

D.

LC

Question 114

Which of the following is the radio frequency and data rate for 802.11g as specified by the IEEE standards?

Options:

A.

2.0 GHz at 33 Mbps

B.

2.4 GHz at 54 Mbps

C.

2.4 GHz at 128 Mbps

D.

5.0 GHz at 54 Mbps

Question 115

An administrator has added four switches to a campus network. The switch in wiring closet A is only connected to the switch in wiring closet C. The switch in wiring closet B is connected to the switch in wiring closet C as well as wiring closet D. The switch in wiring closet D is only connected to the switch in wiring closet B. Which of the following topologies is represented in this design?

Options:

A.

Ring

B.

Star

C.

Bus

D.

Mesh

Question 116

The network administrator just upgraded all of the WAPs to new ones with 2.4 GHz b/g/n support. The new WAPs reuse the same location and channel as the previous one and with no new external interference detected. However, performance issues are now occurring that did not exist before. Which of the following would correct the issue?

Options:

A.

Configure Wi-Fi Multimedia support

B.

Use only 20 MHz channel bandwidth

C.

Enable band steering to use 802.11n

D.

Configure Quality of Service

Question 117

802.11n can operate at which of the following frequencies? (Select TWO).

Options:

A.

2.4Mhz

B.

2.5Mhz

C.

5Mhz

D.

2.4Ghz

E.

2.5Ghz

F.

5Ghz

Question 118

A cable with visible space between the ends of the copper wires and the RJ-45 connector will cause which of the following problems to occur?

Options:

A.

EMI

B.

Short

C.

Reversed TXRX

D.

dB loss

Question 119

A technician notices a newly installed CAT5 cable is longer than the standard maximum length. Which of the following problems would this MOST likely cause?

Options:

A.

Split cable

B.

EMI

C.

DB loss

D.

Crosstalk

Question 120

Which wireless standard works at a MAXIMUM data rate of up to 11Mbps?

Options:

A.

802.11a

B.

802.11b

C.

802.11g

D.

802.1q

Question 121

A technician is troubleshooting a problem where data packets are being corrupted. Which of the following connectivity problems should the technician check?

Options:

A.

Attenuation

B.

Latency

C.

Crosstalk

D.

External interference

Question 122

Which of the following types of technologies should be used to provide a MAXIMUM 10 GB speed to a multi-mode fiber network?

Options:

A.

10GBaseER

B.

10GBaseSR

C.

10GBaseTX

D.

10GBaseT

Question 123

Which of the following technologies is used to connect public networks using POTS lines?

Options:

A.

OC3

B.

OC12

C.

PSTN

D.

Cable

Question 124

The cost of installing fiber cable in a factory environment is too high. Which of the following cables should be used to minimize the effect of EMI?

Options:

A.

CAT6

B.

UTP

C.

Coaxial

D.

Crossover

Demo: 124 questions
Total 828 questions