Q1. A network topology that utilizes a central device with point-to-point connections to all other devices is which of the following?
A. Star
B. Ring
C. Mesh
D. Bus
Answer: A
Q2. Before logging into the company network, users are required to sign a document that is to be stored in their personnel file. This standards and policies document is usually called which of the following?
A. SOP
B. BEP
C. AUP
D. SLA
Answer: C
Q3. The RAID controller on a server failed and was replaced with a different brand. Which of the following will be needed after the server has been rebuilt and joined to the domain?
A. Vendor documentation
B. Recent backups
C. Physical IP address
D. Physical network diagram
Answer: B
Q4. A technician recently ran a 20-meter section of CAT6 to relocate a control station to a more central area on the production floor. Since the relocation, the helpdesk has received complaints about intermittent operation. During the troubleshooting process, the technician noticed that collisions are only observed on the switch port during production. Given this information, which of the following is the cause of the problem?
A. Distance limitation
B. Electromagnetic interference
C. Cross talk
D. Speed and duplex mismatch
Answer: B
Q5. Which of the following refers to a network that spans several buildings that are within walking distance of each other?
A. CAN
B. WAN
C. PAN
D. MAN
Answer: A
Q6. A technician is troubleshooting a client's connection to a wireless network. The client is asked to run a "getinfo" command to list information about the existing condition.
myClient$ wificard --getinfo
agrCtlRSSI: -72
agrExtRSSI: 0
state: running
op mode: station
lastTxRate: 178
MaxRate: 300
802.11 auth: open
link auth: wpa2-psk
BSSID: 0F:33:AE:F1:02:0A
SSID: CafeWireless
Channel: 149,1
Given this output, which of the following has the technician learned about the wireless network? (Select TWO).
A. The WAP is using RC4 encryption
B. The WAP is using 802.11a
C. The WAP is using AES encryption
D. The WAP is using the 2.4GHz channel
E. The WAP is using the 5GHz channel
F. The WAP is using 802.11g
Answer: CE
Q7. Which of the following is MOST likely to use an RJ-11 connector to connect a computer to an ISP using a POTS line?
A. Multilayer switch
B. Access point
C. Analog modem
D. DOCSIS modem
Answer: C
Q8. A network engineer is troubleshooting an issue with a computer that is unable to connect to the Internet. The network engineer analyzes the following output from a command line utility:
Network DestinationNetmask Gateway Interface
192.168.1.0 255.255.255.0 192.168.1.254 eth0
192.168.1.10255.255.255.255 192.168.1.10 eth0
127.0.0.1255.0.0.0 On-Link lo
127.0.0.0255.0.0.0 On-Link lo
255.255.255.255255.255.255.255 102.168.1.10 eth0
Which of the following is the reason for the computer issue, given the above output?
A. Wrong default gateway netmask
B. Incorrect default gateway address
C. Default gateway on the wrong interface
D. Missing default gateway
Answer: D
Q9. Which of the following describes an IPv6 address of ::1?
A. Broadcast
B. Loopback
C. Classless
D. Multicast
Answer: B
Q10. A technician is installing a surveillance system for a home network. The technician is unsure which ports need to be opened to allow remote access to the system. Which of the following should the technician perform?
A. Disable the network based firewall
B. Implicit deny all traffic on network
C. Configure a VLAN on Layer 2 switch
D. Add the system to the DMZ
Answer: D
Q11. Ann, a network technician, was asked to remove a virus. Issues were found several levels deep within the directory structure. To ensure the virus has not infected the .mp4 files in the directory, she views one of the files and believes it contains illegal material. Which of the following forensics actions should Ann perform?
A. Erase the files created by the virus
B. Stop and escalate to the proper authorities
C. Check the remaining directories for more .mp4 files
D. Copy the information to a network drive to preserve the evidence
Answer: B
Q12. HOTSPOT
Corporate headquarters provided your office a portion of their class B subnet to use at a new office location. Allocate the minimum number of addresses (using CIDR notation) needed to accommodate each department.
Alter accommodating each department, identify the unused portion of the subnet by responding to the question on the graphic. All drop downs must be filled.
Instructions: When the simulation is complete, please select the Done button to submit.
All Networks have the range form /0 to/32
Answer:
Explanation:
Sales network – /26 – This will provide up to 62 usable IP addresses (64-2 for
subnet and broadcast IP)
HR network - /27 – This will provide for up to 30 usable IP’s (32-2)
IT - /28 – This will provide for up to 14 usable IP’s (16-2)
Finance - /26 – Note that a /27 is 32 IP addresses but 2 of those are reserved for the network and
broadcast IP’s and can’t be used for hosts.
Marketing - /28
If we add up how many IP blocks are used that is 64+32+16+64+16=192.
A /24 contains 256 IP addresses, so 256-192=64.
So the last unused box should be a /26, which equates to 64 addresses
Q13. A technician, Joe, needs to troubleshoot a recently installed NIC. He decides to ping the local loopback address. Which of the following is a valid IPv4 loopback address?
A. 10.0.0.1
B. 127.0.0.1
C. 172.16.1.1
D. 192.168.1.1
Answer: B
Q14. A company is experiencing accessibility issues reaching services on a cloud-based system. Which of the following monitoring tools should be used to locate possible outages?
A. Network analyzer
B. Packet analyzer
C. Protocol analyzer
D. Network sniffer
Answer: A
Q15. Which of the following does a network technician need to implement if a change is unsuccessful within the approved maintenance window?
A. Configuration procedures
B. Stakeholder notification
C. Impact analysis
D. Rollback procedure
Answer: D