You are on page 1of 26

Network+ 100 Question Practice Exam

Developed for www.GetCertify4Less.Com


(Author to remain anonymous.)

This practice exam has been developed exclusively for GetCertify4Less.Com. Answers and explanations on last pages 1. W hat is the length of an IPv4 address? A. 8-bit B. 32-bit C. 128-bit D. 256-bit 2. W hich of the following is the most commonly implemented network topology? A. Star B. Bus C. Ring D. Mesh 3. W hich of the following standards uses twisted pair cable? A. 10BASE5 B. 100BASE-FX C. 100BASE-T D. 10BASE2 4. What is the minimum category of twisted pair cable required when installing a 100BASE-Tx network? A. Category 3 B. Category 4 C. Category 5 D. Category 6 5. W hich of the following wireless standards can transmit data at up to 54 Mbps? (Select the best two answers.) A. 802.11b B. 802.1X C. 802.11g D. 802.11a 6. W hich of the following Ethernet standards can transmit data at up to (and not exceeding) 100 Mbps? A. 802.3 B. 802.3u C. 802.3z D. 802.3ab 7. W hich command would you use to view your IP settings including DNS server and MAC addresses? A. Ping B. Ipconfig C. Tracert D. Ipconfig /all

8. W hich of the following is the loopback address in IPv6? A. 127.0.0.1 B. ::1 C. FE80::/10 D. 0000::10 9. W hich of the following connectors would an unshielded twisted pair (UTP) cable most likely use? A. RJ11 B. RJ45 C. ST D. BNC 10. Local area networks (LANs) are commonly cabled with UTP cable. W hat is the most commonly used cabling standard when wiring LANs? A. 568B B. USOC C. BOGB D. 568A 11. Your boss asks you to connect an RJ45 plug to a CAT5 cable. Which is the best tool to use? A. TDR B. Patch tester C. Punch down tool D. Crimper 12. W hat are two common types of central connecting devices that might be used in a network with a star topology? (Select the best two answers.) A. Switch B. Network adapter C. Hub D. Router 13. W hich of the following devices will protect an entire network from an attacker? A. Hub B. Switch C. Firewall D. Router 14. W hich device connects two LANs to form a W AN? A. Hub B. Switch C. Firewall D. Router 15. W hat is the maximum approximate range of Class 2 Bluetooth devices? A. 1 meter B. 10 meters C. 100 meters D. 1000 meters

16. From the following, select two types of interference. (Select the best two answers.) A. EMI B. Static electricity C. RFI D. Faraday cage 17. You need to install a SOHO router that seconds as a wireless AP. How many channels are normally available to you within the 2.4 GHz range? A. 10 B. 6 C. 11 D. 2.4 18. After you install a SOHO router, you see that it is automatically configured to hand out IP addresses to computers. W hich of the following network numbers does the SOHO router work within to hand out addresses? A. 10.0.0.0 B. 169.254.0.0 C. 172.16.0.0 D. 192.168.1.0 19. You have been instructed to upgrade a Windows Server 2003 computer to a domain controller. W hich command will enable you to do this? A. Dcdemo B. Dcpromo C. DC Ping D. Dcconfig 20. Your boss asks you to connect his Windows Vista laptop to a W indows domain. W hat setting should you configure prior to joining the domain? A. DNS B. Gateway C. W INS D. ARP 21. W hich of the following additional settings does ipconfig /all allow you to view in comparison to the more basic ipconfig? A. IP address B. MAC address C. Gateway address D. Name of the adapter 22. The Media Access Control (MAC) sublayer is part of which OSI model layer? A. Physical B. Data Link C. Network D. Transport

23. At which layer of the OSI model does a router operate? A. Physical B. Data Link C. Network D. Transport 24. W hich of these items works on the network layer of the OSI model? A. TCP message B. HTTP protocol C. Ethernet frame D. IP packet 25. W hich layer of the OSI model does a gateway reside on? A. Physical B. Application C. Network D. Transport 26. W hat is the total number of hosts that can exist on a Class C network? A. 256 B. 65536 C. 254 D. 16,777,214 27. W hich of the following is an example of a Class B network number? A. 192.168.1.0 B. 10.0.0.0 C. 172.16.0.0 D. 127.0.0.1 28. 65.43.18.1 is an example of a public IP address. W hich class is it a member of? A. Class A B. Class B C. Class C D. Class D 29. You are troubleshooting a computer that cannot access the network or the Internet. You run an ipconfig/all and see that the IP address the computer is using is 169.254.36.189. W hat technology is at work here? A. Public networking B. APIPA C. DHCP D. Local loopback 30. W hich of the following are examples of public IP addresses? (Select the best two answers.) A. 10.1.58.244 B. 68.94.128.1 C. 208.152.36.256 D. 208.152.11.46

31. W hich of the following is a valid example of a private IP address? A. 192.168.1.100 B. 192.168.1.258 C. 172.16.0.0 D. 207.192.168.1 32. TCP connections use ports to connect to other computers. What layer of the OSI model does TCP, and ports, reside on? A. Physical B. Data Link C. Network D. Transport 33. W hich port does FTP use? A. 21 B. 23 C. 25 D. 53 34. W hich port does HTTP use? A. 21 B. 80 C. 88 D. 110 35. W hich layer of the OSI model does POP3 and HTTP reside? A. Application B. Presentation C. Session D. Transport 36. W hich of the following commands will show the IP-to-MAC conversion table? (Select the best two answers.) A. arp f B. arp a C. arp d D. arp inet_addr 37. W hat kind of name is the following: Computer1.seattle_network.com A. An FQDN B. A domain name C. A host name D. An IP address 38. W hich service resolves host names to IP addresses? A. W INS B. DNS C. ARP D. LMHOSTS

39. W hich service resolves NetBIOS names to IP addresses? A. W INS B. DNS C. ARP D. HOSTS 40 W hich protocol resolves IP addresses to MAC addresses? A. W INS B. DNS C. ARP D. HOSTS 41. A multi-homed computer is one that has more than one network adapter. Which of the following fall into the category of multi-homed computers? (Select the best two answers.) A. W INS server B. DNS server C. Router D. IP proxy 42. W hich of the following protocols is used by Active Directory? A. HTTP B. LDAP C. RDP D. Telnet 43. How many channels does a T-1 contain? A. 8 B. 24 C. 28 D. 128 44. W hat is the maximum data transfer rate of an ISDN PRI line? A. 1.536 Kbps B. 128 Kbps C. 1.536 Mbps D. 128 Mbps 45. At what speed does a SONET OC-12 line run at? A. 622 Mbps B. 1.536 Mbps C. 128 Kbps D. 56 Kbps 46. W hich of the following protocols will secure an HTTP session? A. SSH B. SSL C. SCP D. FTP

47. W hich of the following ports is used by L2TP? A. 1723 B. 1701 C. 3389 D. 389 48. W hich of the following are protocols that can be used to make VPN connections? (Select the best two answers.) A. IPsec B. L2TP C. PPTP D. DMZ 49. In W indows Server 2003, which console would you use to configure a VPN server? A. Active Directory Users and Computers B. Active Directory Sites and Services C. RRAS D. RAS 50. W hich protocol uses port 3389? A. PPTP B. LDAP C. RDP D. RRAS 51. A customer asks you to add a new segment to their network. This new segment should be set up in such a way so as to accommodate 64 new servers in a single subnet, but still conserve IP addresses. W hich of the following IP subnets should you use? A. 192.168.100.0/23 B. 192.168.100.0/24 C. 192.168.100.0/25 D. 192.168.100.0/26 52. W hich of the following services would be the best solution in a scenario where Novell NetW are clients need to access Microsoft resources? A. CSNW B. GSNW C. FPNW D. File and Printer Sharing 53. W hich service in Windows Vista enables the computer to access remote resources? A. Server B. W orkstation C. Spooler D. W orld W ide Web Publishing

54. You get complaints from a customer about poor voice quality on calls that cross a T-1 line. It appears that other users are running file sharing programs that are delaying packets of the voice calls. Which of the following should you implement to improve the voice calls? A. Install a caching proxy B. Configure separate VLANs C. Configure traffic shaping D. Upgrade the switches 55. W hich of the following is the most resistant to crosstalk? A. Fiber optic cable B. Shielded twisted pair C. Cat5e D. Unshielded twisted pair 56. W hich of the following commands will display the services (such as Workstation and Server) that are currently running on a remote computer? A. Netstat B. Nbtstat C. Ping D. Arp 57. W hich of the following W indows consoles will give you information about all of the services running on the computer? A. ADUC B. RRAS C. Device Manager D. Computer Management 58. You use the nbtstat command to identify which services are running on a remote server. W hich of the following hexadecimal numbers correctly identifies the Server service? A. <03> B. <20> C. <1f> D. <00> 59. W hich of the following OSI layers is responsible for session timeouts? A. Layer 4 B. Layer 5 C. Layer 6 D. Layer 7 60. Collisions on the network occur when two packets are transmitted simultaneously. W hich of the following hardware devices is the most susceptible to this type of collision? A. Hub B. Switch C. Router D. Gateway

61. W hat type of connector is punched down to on a 568B patch panel? A. 66 connector B. USB C. Screw terminal D. 110 IDC 62. W hat is a common mistake when wiring patch panels? A. RJ45 plug was crimped too hard B. Punched down too many times C. Reversed pair D. RJ45 plug is upside down 63. W hat would be considered the more secure VPN connection? A. PPTP B. L2TP C. L2TP with IPsec D. IPsec 64. You have setup a Windows domain. Time for each of the clients should be synchronized to the domain controller. W hat protocol is in charge of this? A. FTP B. Kerberos C. NTP D. NNTP 65. W hich port would you open on a SOHO router if you wanted to connect to your hone network from a remote location? A. 23 B. 80 C. 1723 D. 3389 66. You realize that one of your client computers time is not synchronized to the domain controller, thereby not allowing the client to login to the domain controller. However, you can log in locally. W hich of the following commands can help to fix the issue? A. Net stop B. Net time C. Arp time D. Service timeout 67. W hich layer of the OSI model does L2TP work on? A. Data Link B. Network C. Session D. Application

68. Your boss asks you to close port 25. W hat service is your boss asking you to shut off? A. SNMP B. SMB C. Telnet D. SMTP 69. One of your customers complains that they cannot access the internal company web server when typing the name of the server in their browser. However, they can ping the computer by IP address. W hich of the following TCP/IP properties on the client is not configured properly? A. DHCP B. DNS C. W INS D. MAC address 70. W hich of the following is the most common type of VLAN? A. Port-based B. MAC-based C. Protocol-based D. Router-based 71. You are traveling around the world, and want to be able to VPN into your home network. W hich of the following should you enable on your SOHO router? A. Port replication B. Port triggering C. Port forwarding D. DMZ 72. You need a solution that will allow a partner company to access some of your servers. However, you do not want them to be able to access your LAN. Also, you want your LAN users to also be able to access those same servers. W hich of the following should you implement? (Select the best two answers.) A. Port forwarding B. DMZ C. Intranet D. Extranet 73. Your boss asks you to install a second network adapter into a server. He is protecting against an event where the first network adapter fails. W hat is this known as? A. Fault tolerance B. QoS C. Load balancing D. Clustering 74. W hich fault tolerant method uses two disks, and two disks only? A. RAID 0 B. RAID 1 C. RAID 5 D. RAID 6

75. W hich of the following protects against an attackers viruses? A. Firewall B. UPS C. AV software D. Anti-spyware 76. You ran a full backup of data on Monday night. Tuesday night, your boss instructs you to backup only what has changed since the full backup. What type of backup does your boss require? (Select the best answer.) A. Incremental B. Full C. Copy D. Differential 77. You need to verify that a router in another state is functioning properly. You need to see the entire path from you to the router. W hich command would be the best in this scenario? A. Ping B. Tracert C. Ipconfig D. Netstat 78. W hich of the following disperses resource usage among multiple computers? A. Load balancing B. Fail-over clustering C. RAID 1 D. RAID 0 79. W hich of the following fault-tolerant methods will stripe data and parity across multiple disks? A. RAID 0 B. RAID 1 C. Disk duplexing D. RAID 5 80. One of your customers complains that they lose theyre wireless connection on their laptop when they talk on the cordless phone. What could be the problem? A. The phone is plugged into an RJ45 jack B. The phone is plugged into the same AC receptacle as the router C. The phone is sharing the 5.8 GHz frequency range with the laptop D. The phone is sharing the 2.4 GHz frequency range with the laptop 81. W hich of the following IP configurations will allow for 30 computers per subnet? A. 192.168.2.0/27 B. 192.168.2.0/28 C. 192.168.2.0/29 D. 192.168.2.0/30

82. You want to avoid companies next-door to yours using your wireless network. All of your computers are already set up to use the wireless network. W hat is t he easiest option? A. Enable MAC filtering B. Enable port forwarding C. Disable the SSID D. Use a signal booster 83. W hich kind of cable is used by a technician to control a router directly from a laptop? A. Crossover B. Straight-through C. Rolled D. Loopback 84. Of the following, what is the best combination of protocols to use in your wireless network? A. W PA B. W EP C. W PA and TKIP D. W PA2 and AES 85. W hich of the following is not an example of Denial of Service (DOS) attack? A. Ping flood B. Fraggle C. Null session D. Smurf attack 86. W hich of the following attacks can be described as: an attack that intercepts all data between a client and a server? A. Blind hijacking B. Man-in-the-middle attack C. Replay attack D. DNS poisoning 87. W hich command will send ICMP echoes that have been increased in packet size to 1,500 bytes each? A. Ping n 1500 B. Ping l 1500 C. Ping t 1500 D. Arp -1500 88. W hich of the following commands will resolve domain names to IP addresses? A. ARP B. DNS C. netstat D. nslookup

89. W hich command will turn off a service? A. net send B. net share C. net stop D. net start 90. W hich command will show all inbound ports in numeric fashion? A. netstat B. nbtstat C. netstat an D. nbtstat an 91. The link light on your network adapter is blinking in a quick yet non-random fashion. W hat should you check? A. Activity light B. TCP/IP settings C. Network adapter driver D. Patch cables 92. W hich of the following networking technologies sends broadcasts? A. Ethernet B. Token Ring C. Token passing D. 100BASE-T 93. W hich of the following statements best describes a collision? A. Two packets going in opposite directions B. Two tokens sharing the same bandwidth C. Two frames of data hitting each other D. One token crashing into another 94. Terminal Services allows you to do which of the following tasks? A. Remotely control a Windows computer B. Remotely connect to a Cisco router C. Remote connect to a VPN server D. Remote control a Linux computer 95. W hat should you check first if you cannot log on to a domain? (Select the best two answers.) A. IP address B. Time synchronization C. User name and password D. Caps lock 96. You need to map a drive to a share called puredata on a server named Pisces. You want to use the P: drive for this mapped network drive. W hat would be the proper syntax in the command-line to do this? A. net use \\servername\sharename B. \\puredata\pisces C. net use \\pisces\puredata D. net use P: \\pisces\puredata

97. W hat is a common default lease time for a DHCP address? A. One month B. Eight days C. One year D. 6 months 98. W hat is the third step in the DORA DHCP process? A. Revoke B. Re-negotiate C. Request D. Return 99. You have a network with two subnets. There is a DHCP server on subnet A that is configured to hand out IP addresses to all computers. If you have a router separating subnet A and subnet B and you need to hand out DHCP addresses to computers on the subnet B, what should you install? A. A second DHCP server B. A DNS server C. A W INS server D. A DHCP relay agent 100. W hich of the following should you do first when troubleshooting a problem on the network? A. Identify symptoms B. Identify the affected area C. Panic D. Test the result

ANSWERS 1.Answer: B. 32-bit Explanation: IPv4 addresses are 32 bits in length. An example of an IPv4 address would be 192.168.1.1. This address has 4 octets, which together equal 32 bits. In binary, this address would be expressed as 11000000.10101000.00000001.00000001 for 32 bits in total. IPv6 uses 128 -bit IP addresses. There are no 8-bit or 256-bit addresses as of the year 2010. 2. Answer: A. Star Explanation: The star topology connects hosts together by way of a central connecting device such as a hub or (more commonly) a switch. It is by far more common than the bus, ring, or mesh topologies. 3. Answer: C. 100BASE-T Explanation: 100BASE-T is a cabling standard that uses twisted pair cable. The 100 means 100 Mbps, the BASE specifies baseband transmissions, and the T stands for twisted pair. 10BASE5 and 10BASE2 are coaxial standards, and 100BASE-FX is a fiber optic cabling standard. 4. Answer: C. Category 5 Explanation: Category 5 (Cat5) is the minimum category of twisted pair necessary for 100BASE-Tx networks. Cat5 can run at a maximum of 100 Mbps. Cat3 and Cat4 cannot. Category 6 can run much faster and is therefore not the minimum cable that would be necessary; however, it is wise to consider Cat6 when installing a network. 5. Answers: C. and D. 802.11g, and 802.11a Explanation: 802.11g and a have a maximum data transfer rate of 54 Mbps. Although G uses the 2.4 GHz range, and A uses the 5 GHz range. 802.11b has a maximum of 11 Mbps. 802.1X does not deal with wireless transmission speeds, instead it is a form of authentication on the LAN that network cards and switches might be compliant with. It should be mentioned that 802.11n is not listed here, but can go much faster than 54 Mbps. 6. Answer: B. 802.3u Explanation: 802.3u is the IEEE standard also known as Fast Ethernet. It specifies a maximum transmission speed of 100 Mbps. 802.3 is the original Ethernet which specifies a maximum of 10 Mbps. 802.3z specifies 1000 Mbps over fiber, and 802.3ab specifies 1000 Mbps over copper. 7. Answer: D. Ipconfig /all Explanation: Ipconfig /all (when typed in the Command Prompt) shows the local computers IP configuration, including information such as DNS server address, and MAC addresses. The regular ipconfig command does not show this additional information. Ping tests whether other hosts are alive on the network. Tracert tests for hosts on other networks and traces the route from you to the final destination.

8. Answer: B. ::1 Explanation: ::1 is the loopback address or IPv6. Every local computer that runs IPv6 will use ::1 as the local loopback address. 127.0.0.1 is the local l oopback address for IPv4. FE80::/10 is the range of addresses that can be used by private IPv6 computers. Usually, the local private address of a system using IPv6 starts with FE80. 0000::10 is not a valid IPv6 address. 9. Answer: B. RJ45 Explanation: The RJ45 connector is the most commonly used connector in networks using UTP cable. RJ11 is used for phone, ST is used by fiber optic cables, and BNC connectors are used by coaxial cables, especially in older, deprecated 10BASE2 networks. 10. Answer: A. 568B Explanation: EIA/TIA 568B is the most commonly used wiring standard when dealing with UTP cable and LANs. It became the standard in the early 1990s, eclipsing 568A. It is one type of USOC (Universal Service Order Code). BOGB is the acronym that denotes the 4 main colors (blue, orange, green, and brown) that are used by the various cabling specifications such as 568B. 11. Answer: D. Crimper Explanation: An RJ45 crimper is used to connect the RJ45 plug to the CAT5 cable. A TDR is a time-domain reflectometer, which checks a cable for breaks. A patch tester will verify connectivity of a network patch cable. A punch down tool is for punching network wires down to punch blocks, patch panels, and network jacks. 12. Answers: A. and C. Switch and hub. Explanation: Hubs, and more commonly, switches are used to connect computers together in a star topology. Network adapters connect individual computers to the network. Routers connect networks together. 13. Answer: C. Firewall Explanation: The firewalls main purpose is to protect the network from attackers. Hubs and switches simply connect hosts on the LAN together. The router connects clients on one network to other networks such as the Internet. 14. Answer: D. Router Explanation: A router connects two LANs together to form a W AN. It can also allow connectivity to the Internet. Although some small office-home office (SOHO) routers have a firewall built-in, the firewall is considered a separate device that protects the LAN from attackers. Hubs and switches allow for hosts on a LAN to communicate with each other. 15. Answer: B. 10 meters Explanation: Class 2 Bluetooth devices have a maximum range of 10 meters before transmission loss will occur. Class 1 is 100 meters. Class 3 is 1 meter. As of 2010, no Bluetooth devices can transmit data to 1000 meters.

16. Answers: A and C. EMI and RFI Explanation: EMI (electromagnetic interference) and RFI (radio frequency interference) are two types of interference that can affect your wires and wireless networks. Static electricity is not considered interference, but if you discharge it to a circuit board or even an unshielded network cable, it could cause disruption and data loss. A Faraday cage is used to prevent interference. 17. Answer: C. 11 Explanation: In the United States, most devices will have 11 channels from which you can select to send your wireless transmissions. If you have more than one wireless AP, consider using Channels 1, 6 and 11 so that there are not overlapping channels. 2.4 is the frequency range that these channels use. 18. Answer: D. 192.168.1.0 Explanation: 192.168.1.0 is one example of a common network number used by a SOHO router. This is common to Linksys devices. D-Link devices use 192.168.0.0, and Belkin devices use 192.168.2.0. 19. Answer: B. Explanation: the Dcpromo command initiates the domain controller promotion for Windows Server 2003/2008, and W indows 2000 server. The other commands are not valid. 20. Answer: A. DNS Explanation: The DNS server address should be configured on the laptop prior to joining the W indows domain. This is because most domains rely on DNS for the translation of host names to IP addresses. This is a necessary component before joining the domain. 21. Answer: B. MAC address Explanation: The MAC address can only be viewed with ipconfig /all, not ipconfig. The rest of the answers are viewable simply by typing the ipconfig command. 22. Answer: B. Data Link Explanation: The MAC and LLC sublayers are part of the Data Link Layer, also known as layer 2, of the OSI model. 23. Answer: C. Network Explanation: A router operates at the network layer of the OSI model, also known as layer 3. 24. Answer: D. IP packet Explanation: IP packets reside on the Network Layer of the OSI model. TCP messages start at the Transport Layer and ascend all the way up to the Application Layer. HTTP protocols start at the Application Layer. Ethernet frames reside on the Data Link Layer.

25. Answer: B. Application. Explanation: A true gateway is one that translates from one protocol or platform to another. These reside on the Application Layer. They should not be confused with gateway addresses, which are the addresses of routers, which reside on the Network Layer of the OSI model. 26. Answer: C. 254 Explanation: A class C network, for example 192.168.1.0 can only have 254 hosts maximum. These would range between 192.168.1.1 and 192.168.1.254. 192.168.1.0 cannot be used because that is the network number. 192.168.1.255 cannot be used because its the broadcast number. The rule is that the first and last numbers cannot be used for hosts. 27. Answer: C. 172.16.0.0 Explanation: 172.16.0.0 is an example of a private, class B network number. 172.17.0.0 would be another, and so on, all the way up to 172.31.0.0. 192.168.1.0 is an example of a Class C private network number. 10.0.0.0 is the example of a Class A private network number. And 127.0.0.1 is the local loopback IP address. 28. Answer: Class A. Explanation: 65.43.18.1 is a Class A public IP address. The first octet (65) is within the Class A range of 1-126. 127 is reserved for local loopback testing. 128191 is Class B, and 192-223 is Class C. 29. Answer: B. APIPA Explanation: APIPA (Automatic Private IP Addressing) is a Microsoft technology that enables computers to auto-assign IP addresses to themselves. If you see an address on the 169.254 network, you can be fairly certain that it is an APIPA address. 30. Answers: B and D. 68.94.128.1 and 208.152.11.46 Explanation: 68.94.128.1 is a public Class A IP address. 208.152.11.46 is a public Class C IP address. 10.1.58.244 is a private Class A address. 208.152.36.256 is not a valid IP because the number 256 cannot be used in any octet of an IPv4 address. 31. Answer: A. 192.168.1.100 Explanation: 192.168.1.100 is the only answer listed that is an example of a valid private IP address. It is a Class C private address. 192.168.1.258 is not valid because 258 is not within the possible range (1-254). 172.16.0.0 is a private IP network number, not an individual IP address. 207.192.168.1 is a valid public IP address. 32. Answer: D. Transport Explanation: TCP connections are made on the Transport Layer of the OSI model, also known as layer 4. This is where port connections are made and described.

33. Answer: A. 21 Explanation: FTP (File Transfer Protocol) uses inbound port 21 to establish connections on FTP servers. Telnet uses port 23. SMTP uses port 25. DNS uses port 53. 34. Answer: B. 80 Explanation: HTTP (Hypertext Transfer Protocol) uses inbound port 80. FTP uses port 21. Kerberos uses port 88. POP3 uses port 110. 35. Answer: A. Application Explanation: POP3, HTTP, FTP, and other protocols that are directly related to their corresponding applications reside on the Application Layer of the OSI model. 36. Answers: B and C. arp a and arp d. Explanation: The arp-a and arp-g commands will show the IP to MAC conversion table for recently made connections over the network. Arp d will delete a host that can be specified by inet_addr. 37.Answer: A. An FQDN Explanation: An FQDN (fully qualified domain name) is a name that contains a domain name and a host name. In this example, computer1 is the host name , and seattle_network.com is the domain name. together they make the FQDN 38.Answer: B. DNS Explanation: DNS (the Domain Name System service) resolves host names, domain names, and FQDNs to their corresponding IP addresses. An older static text-version of this is the HOSTS.TXT file. 39. Answer: A. W INS Explanation: W INS (the W indows Internet Naming Service) is a Microsoft protocol that resolves NetBIOS names to IP addresses. An older static textversion of this is the LMHOSTS.txt file. 40. Answer: C. ARP Explanation: ARP (Address Resolution Protocol) translates between IP addresses on the Network Layer of the OSI model to MAC addresses on the Data Link Layer of the OSI model. 41. Answers: C and D, Router and IP proxy Explanation: Routers connect two or more networks together, so they need two network adapters minimum, one per network. IP proxies provide a method of protecting all of the LAN IP addresses, and allow all of the LAN computers to access the Internet; the IP proxy needs a network adapter for the LAN and for the Internet. 42. Answer: B. LDAP Explanation: LDAP (Lightweight Directory Access Protocol) is used by Microsofts Active Directory. HTTP is an Internet protocol. RDP is Remote Desktop Protocol. Telnet is used to take control of computers via the commandline, but is insecure, deprecated, and therefore not recommended for use

43. Answer: B. 24. Explanation: There are 24 equal 64 Kbps channels within a T-1. In addition, a T-1 will have a 8 Kbps timing circuit. 44. Answer: C. 1.536 Mbps. Explanation: An ISDN PRI (Primary Rate ISDN) line has a maximum data transfer rate of 1.536 Mbps. It is divided into 24 equal 64 Kbps channels, one of which is used as an ISDN timing circuit. It is often run on a T-1 line, which has a total data throughput of 1.544 Mbps (due to the additional 8 Kbps T-1 timing circuit). A BRI ISDN line has a maximum of 128 Kbps. 45. Answer: A. 622 Mbps Explanation: A SONET OC-12 line runs at a maximum of 622 Mbps. 46. Answer: B. SSL Explanation: SSL (Secure Sockets Layer) and its successor TLS (Transport Layer Security) are used to secure HTTP sessions. SSH is a secure alternative to Telnet. SCP is the Secure Copy protocol. FTP is the File Transfer Protocol. 47. Answer: B. 1701. Explanation: L2TP (the Layer 2 Tunneling Protocol) uses inbound port 1701. PPTP uses port 1723. RDP uses port 3389, and LDAP uses port 389. 48. Answers: B and C. L2TP and PPTP. Explanation: L2TP and PPTP are common tunneling protocols used to make VPN connections. IPsec is used to secure the connection. A DMZ is a demilitarized zone. 49. Answer: C. RRAS Explanation: RRAS (Routing and Remote Access Service) is the console used to configure a VPN server, router, and so on within a W indows Server 2003. 50. Answer: C. RDP Explanation: RDP (the Remote Desktop Protocol) uses inbound port 3389. PPTP uses port 1723. LDAP uses port 389 (or 636 if it is secure LDAP). RRAS is a service and not a protocol. 51. Answer: C. 192.168.100.0/25 Explanation: The /25 equates to a subnet mask of 255.255.255.128. This means that there can be 2 subnets maximum in the segment, with a total of 126 hosts per subnet. /23 and /24 do not conserve enough IP addresses on the 192.168.100.0 network. /26 only allows for 62 hosts per subnet.

52. Answer: C. FPNW Explanation: FPNW (File and Print Services for NetW are) is the best service to use. It is installed and run on a W indows Server, and allows connectivity from Novell NetW are clients to Microsoft resources. CSNW and GSNW are used to connect Microsoft clients to NetWare resources (single clients and multiple clients respectively), and File and Print Sharing is used by Microsoft operating systems only. 53. Answer: B. W orkstation Explanation: The W orkstation service in W indows enables computers to access other computers on the network and their remote resources. The Server service enables other remote computers to access local resources on the computer running the Server service. The Spooler service deals with printing on the local computer. The W orld Wide Web Publishing service deals with websites running on the local computer. 54. Answer: C. Configure traffic shaping Explanation: By configuring traffic shaping, you can limit the amount of bandwidth that users of file sharing programs will have access to, and increase the bandwidth available to the voice calls. A caching proxy holds web information for subsequent clients. While this can conserve bandwidth, it all depends on what line the proxy is connected to. It might help to conserve bandwidth overall but is not the best answer. Configuring VLANs is done on a switch, and will therefore be removed from the affected T-1. Upgrading the switches will also affect the LAN and will be removed from the T-1. 55. Answer: A. Fiber optic cable Explanation: Fiber optic cable transmits light instead of electricity. This makes it impossible for crosstalk to occur since crosstalk is a by-product of electrical wires that are close together. The rest of the answers are copper-based and therefore susceptible to crosstalk. 56. Answer: B. Nbtstat Explanation: Nbtstat (NetBIOS over TCP/IP Statistics) can show the services running on a remote computer. For example, nbtstat a computername. Netstat shows sessions running on a local computer. Ping tests whether hosts are alive on the network. Arp deals with IP address to MAC address resolutions. 57. Answer: D. Computer Management Explanation: The Computer Management console window can show all of the services and their current state. 58. Answer: B. <20> Explanation: <20> identifies the Server service. <03> is the Messenger service. <00> is the W orkstation service. <1f> deals with domain services. 59. Answer: B. Layer 5 Explanation: Layer 5 is the Session Layer of the OSI model. It is responsible for login, logout, session connections, and timeouts. Layer 4 is the Transport Layer. Layer 6 is the Presentation Layer. Layer 7 is the Application Layer.

60. Answer: A. Hub Explanation: A hub is the most susceptible to collisions because all of the copper wiring inside the hub is shared. W hen computers are connected to a hub it is considered to be shared bandwidth. Switches and other devices do not have this issue due to the fact that they employ a matrix of wiring, creating separate segments of traffic. 61. Answer: D. 110 IDC Explanation: Patch panels use 110 IDC connectors and require a special punchdown tool. 66 blocks (also known as punch blocks) that are used for telephone connections have 66 connectors. Screw terminals can be found on older telephone modules; in this case wires are stripped and wrapped around the terminal, not punched down. USB simply connects to a USB port, no punching down is required for screw terminals or USB connections. 62. Answer: C. Reversed pair Explanation: W hen wiring a patch panel, each pair of colors must be punched down correctly; it can be easy to reverse a pair unwittingly. It is wise to double punch and even triple punch connections; it is difficult to punch down too many times, because the patch panel is built to withstand that kind of abuse. RJ45 plugs dont come into play when it comes to wiring a patch panel. 63. Answer: C. L2TP with IPsec Explanation: L2TP with IPsec provides better encryption and security than PPTP. L2TP should not be used by itself. IPsec is a security protocol that can be used in various situations, and is commonly used to encrypt L2TP VPN connections. 64. Answer: C. NTP Explanation: NTP (the Network Time Protocol) is used to synchronize time between clients of a domain and the domain controller. FTP is the File Transfer Protocol. Kerberos is another protocol used in W indows domains that enables the login from clients to the domain controller. NNTP is the Network News Transfer Protocol. 65. Answer: C. 1723 Explanation: PPTP is a commonly used protocol for connecting to a home network via a VPN. It uses port 1723. Port 23 is used by Telnet. Port 80 is used by HTTP. Port 3389 is used by RDP. 66. Answer: B. Net time Explanation: The Net time command is used to synchronize time between Windows clients and other W indows computers such as domain controllers. Net stop will stop a service in the command-line. The other two answers are not valid. 67. Answer: A. Data Link Explanation: As the name implies (L2TP stands for Layer 2 Tunneling Protocol), L2TP works on Layer 2 of the OSI model; the Data Link Layer.

68. Answer: D. SMTP Explanation: SMTP (the Simple Mail Transfer Protocol) uses port 25. SNMP uses port 161. SMB stands for Server Message Block and is a type of packet. Telnet uses port 23. 69. Answer: B. DNS Explanation: DNS (the Domain Name System) needs to be configured properly in order to facilitate the resolution of domain names to IP addresses. Without DNS, a person could ping the IP address of the host, but not connect by name. DHCP is not configured on the client, it is simply turned on. W INS deals with NetBIOS name to IP address resolution and is far less common than DNS. MAC addresses are not normally configured. 70. Answer: A. Port-based Explanation: Port-based VLANs are the most common. They deal with the physical ports of a switch. Protocol and MAC-based VLANs are more complicated to set up and are less common. There are no router-based VLANs. VLANs are setup on a switch. 71. Answer: C. Port forwarding Explanation: Port forwarding allows you to redirect ports on the router to specific computers on your home network, for example a VPN server. 72. Answers: B and D. DMZ and Extranet. Explanation: A DMZ (demilitarized zone) is used to store less volatile information in order to share it with sister-companies, partner companies, and other remote users, without allowing them access to the LAN. Often, DMZs can also be accessed by LAN users. This is done with a special firewall configuration. The extranet is used to share information with other companies, but not the public. So DMZ and extranet are both valid answers. Port forwarding might be initiated, but it is a technical need that is possibly required when implementing a DMZ. Intranets are used by employees of the company only. 73. Answer: A. Fault tolerance Explanation: The additional of extra components in an effort to protect against failure is done to increase the fault tolerance of a device. 74. Answer: B. RAID 1 Explanation: RAID 1 (mirroring) can use two disks only. RAID 0 can use two or more disks but it is not fault tolerant. RAID 5 requires a minimum of 3 disks. RAID 6 requires a minimum of 4 disks. 75. Answer: C. AV software Explanation: AV (antivirus) software protects against viruses. Firewalls protect an entire network against attackers using attacks such as DOS. A UPS protects a computer from power issues. Anti-spyware protects against spyware intrusions.

76. Answer: A. Incremental Explanation: An incremental backup will backup only what has changed since the last full backup, or last incremental backup. It also sets the archive bit to one, so if you wish to run another incremental backup on W ednesday, that backup will only backup what has changed since the incremental on Tuesday. This saves time and resources in comparison to a differential backup, which does not se the archive bit. 77. Answer: B. Tracert Explanation: Tracert will check the router from you to the final destination, whatever that might be; a router, computer, and so on. Ping checks if hosts are alive, but it does not show paths to the final destination, and is usually used on the LAN. Ipconfig shows the IP configuration of the local computer. Netstat shows (among other things) network sessions the local computer currently has running. 78. Answer: A. Load balancing Explanation: Load balancing distributes resource load among multiple devices or computers. It is also known as true clustering. Fail-over clustering is when a secondary computer takes over completely when the first computer fails. RAID 1 is mirroring and is when data is written to two drives. RAID 0 is striping, when multiple drives are used together for speed. 79. Answer: D. RAID 5 Explanation: RAID 5 uses three or more disks, and stripes data and parity information across those disks. Disk duplexing is when a RAID 1 mirror has been set up, but with a separate hard drive controller for each drive. 80. Answer: D. The phone is sharing the 2.4 GHz frequency range with the laptop Explanation: It is common to find cordless phones that use the 2.4 GHz frequency range. Also, 802.11b, g, and n utilize the 2.4 GHz range. This makes interference a common occurrence. 81. Answer: A. 192.168.2.0/27 Explanation: /27 equates to a subnet mask of 255.255.255.224. This allows for 8 subnets total, with a maximum of 30 hosts per subnet. /28 only allows for 14 hosts per subnet. /29 is 6 hosts per subnet. /30 is 2 hosts per subnet. 82. Answer: C. Disable the SSID Explanation: By disabling the SSID, wireless users from next-door companies will not be able to find your network (using conventional means). Enabling MAC filtering is a possible solution, but not the easiest by far. Port forwarding deals with making a redirection from the router to a computer on the network. Using a signal booster would make it easier for other users to connect to your wireless network, because it would extend your wireless range.

83. Answer: C. Rolled Explanation: A rolled cable is used to connect a laptops serial port to a routers console port, giving the person at the laptop full control of the router. Crossover connections are used when like devices are connected together. Straight-through connections (the most common) are used to connect unlike device, such as a computer and a switch. Loopback cables are used to identify network adapter issues. 84. Answer: D. W PA2 and AES Explanation: W PA2 is the newest of the listed encryptions standards. It is best used with AES (Advanced Encryption Standard). W EP is deprecated and should be avoided. 85. Answer: C. Null session Explanation: The null session is the only attack listed that is not a DOS attack. Null session attacks make unauthenticated NetBIOS connections to a target computer. 86. Answer: B. Man-in-the-middle attack Explanation: The man-in-the-middle attack attempts to intercept all data between a client and a server. 87. Answer: B. Ping l 1500 Explanation: -l (as in L like Larry) allows you to change the buffer size, or packet size. n deals with the amount of packets sent. t 1500 is invalid because t sends continuous packets. Arp -1500 is invalid. 88. Answer: D.nslookup Explanation: The nslookup command can be used to (among other things) resolve domain names to their corresponding IP addresses. ARP resolves IP addresses to MAC addresses. DNS is not a command but the service that resolves domain names to IP addresses. Netstat shows network connections of the local computer. 89. Answer: C. net stop Explanation: The net stop command can stop services in the command-line. For example, net stop spooler would stop the print spooler service. 90. Answer: C. netstat an Explanation: The netstat command shows network connections and the ports they use. However, it is limited. To get a full listing of ports being used, use netstat a. To get that same information in numeric format, use netstat an. 91. Answer: D. Patch cables Explanation: If the link light is behaving abnormally, check the patch cables, and make sure they are the right type, wired properly, and dont have any kinks or slices.

92. Answer: A. Ethernet Explanation: W hen a computer transmits data on an Ethernet network, the data is by default broadcast to every host on the network. Token Ring and Token passing technologies use a single token to deliver packets, instead of utilizing broadcasts. 100BASE-T is a cabling technology that specifies 100 Mbps over twisted pair cable. 93. Answer: C. Two frames of data hitting each other Explanation: Collisions occur on Ethernet networks when two frames of data are transmitted simultaneously. Token passing and Token Ring networks do not have this problem because they only use one token (normally). Also, it isnt really packets that collide, it is the frames that contain the packets. 94. Answer: A. Remotely control a W indows computer Explanation: Terminal Services is a W indows service also known simply as Remote Desktop (or RDP). It allows a person to remotely control a W indows computer; the display looks as if the person is sitting right at the remote computer. 95. Answers: C and D. Username and password, and Caps lock Explanation: The most common reason why a user cant log on to a domain is because they typed the username or password incorrectly. The Caps lock can get in the way of typing this correctly also. More advanced things like IP configurations and time synchronization can be checked afterwards. 96. Answer: D. net use P: \\pisces\puredata Explanation: Net use is the proper command, followed by P: to specify the drive letter you want to use for the mapped connection. Finally, \\pisces\puredata would be the proper path. 97. Answer: B. Eight days Explanation: Most W indows Server systems will default to eight days for DHCP addresses. 98. Answer: C. Request Explanation: The third step of the DHCP DORA process, (the R in DORA), stands for request. This is when the client computer requests an IP address from the DHCP server. It is usually the IP address that the server offered in the previous step. 99. Answer: D. A DHCP relay agent Explanation: By default, DHCP packets cannot cross a router. There are two possible solutions to this: installing the BootP protocol on the router or installing a DHCP relay agent on the other subnet. The relay agent will talk directly through the router to the DHCP server and allow the packets to cross to the other network. This way, you do not need a second DHCP server. 100. Answer: A. Identify symptoms Explanation: Identify symptoms before you actually do anything. Dont let emotions cloud your judgment. Never panic. Later, you would identify the area affected, and finally, you would test the result.

You might also like