Q1. What are two characteristics of fiber optic cable? (Choose two.)
A. Conducts electricity
B. Requires metal conduit
C. Supports splicing
D. Requires a polish for end connectors
Answer: A,C
Q2. You ping a server by using fully qualified domain name (FQDN) and do not receive a response. You then ping the same server by using its IP address and receive a response.
Why do you receive a response on the second attempt but not on the first attempt?
A. PING is improperly configured.
B. The DNS is not resolving.
C. The DHCP server is offline.
D. NSLOOKUP is stopped.
Answer: B
Q3. This question requires that you evaluate the underlined text to determine if it is correct.
An Address Resolution Protocol (ARP) table is used to associate IP addresses with host names.
Select the correct answer if the underlined text does not make the statement correct. Select 'No change is needed" if the underlined text makes the statement correct.
A. MAC addresses
B. HomeGroup membership
C. Preferred routers
D. No change is needed
Answer: A
Q4. This question requires that you evaluate the underlined text to determine if it is correct.
In a wireless network that requires an SSL certificate, WEP handles the SSL certificate.
Select the correct answer if the underlined text does not make the statement correct. Select 'No change is needed" if the underlined text makes the statement correct.
A. 802.1X
B. WPA2-PSK
C. WPA-PSK
D. No change is needed
Answer: A
Q5. An Action Center alert recommends that you enable Windows Firewall.
After enabling the firewall, you can no longer access websites.
Which two TCP ports should you add exceptions for on the firewall? (Choose two.)
A. Port 21
B. Port 23
C. Port 25
D. Port 80
E. Port 443
Answer: D,E
Q6. Which protocol is a transport layer protocol?
A. FTP
B. IP
C. UDP
D. ASCII
Answer: D
Q7. In local area network (LAN) topologies, the primary media access methods are: (Choose two.)
A. Contention
B. Negotiation
C. Kerberos
D. Token passing
Answer: A,D
Q8. Which wireless authentication method provides the highest level of security?
A. Wired Equivalency Privacy (WEP)
B. IEEE 802.lln
C. WI-FI Protected Access (WPA)
D. IEEE 802.11a
Answer: C
Q9. Which of the following uses a tunneling protocol?
A. Internet
B. VPN
C. Extranet
D. VLAN
Answer: B
Q10. HOTSPOT
Where in the diagram is a T3 connection possible? (To answer, select the appropriate connection in the diagram in the answer area.)
Answer:
Q11. The default gateway address identifies the:
A. Device that will connect the computer to the local network.
B. Device that will connect the computer to a remote network.
C. Server that will provide name services for the computer.
D. Server that will authenticate the user of the computer.
Answer: B
Q12. Tracert is used to:
A. Manage routing tables dynamically.
B. Manage session-oriented connections between nodes.
C. Report the route taken by packets across an IP network.
D. Report the shortest route between different networks.
Answer: C
Q13. A characteristic of the mesh topology is that it:
A. Uses a central hub.
B. Cannot use wired connections.
C. Uses redundant paths.
D. Cannot use wireless connections.
Answer: C
Q14. At what layer in the OSI model are hardware addresses referenced?
A. Network
B. Application
C. Data link
D. Physical
Answer: C
Q15. Which setting is used to determine the Domain Name System (DNS) settings on a client computer?
A. TELNET
B. NSLOOKUP
C. PATHPING
D. NETSTAT
Answer: B