Labour Day Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: suredis

CompTIA JK0-023 CompTIA Network+ certification Exam Practice Test

Page: 1 / 111
Total 1112 questions

CompTIA Network+ certification Questions and Answers

Testing Engine

  • Product Type: Testing Engine
$42  $119.99

PDF Study Guide

  • Product Type: PDF Study Guide
$36.75  $104.99
Question 1

Teachers and students at a school currently share the same bandwidth. The Internet performance for the teachers in the classroom is becoming extremely slow. Which of the following is the BEST method to mitigate the issue?

Options:

A.

Increased uptime

B.

Caching engines

C.

Traffic shaping

D.

Load balancing

Question 2

Which of the following would Karen, a technician, do to monitor remote traffic through an access point?

Options:

A.

Enable an SNMP agent

B.

Enable network mapping

C.

Set monitoring SSID

D.

Select WPA2

Question 3

After installing new cabling, Karen, a technician, notices that several computers are connecting to network resources very slowly. Which of the following tools would BEST help in determining if the new cabling is the cause of the problem?

Options:

A.

Multimeter

B.

Cable certifier

C.

Cable tester

D.

Toner probe

Question 4

A network administrator opens up the RDP port to access network resources from home. Several months later, the administrator’s account is getting locked out constantly. After closing the port, which of the following should be used to identify the source of the attack?

Options:

A.

Network maps

B.

Change management

C.

Log analysis

D.

Protocol analyzer

Question 5

Sandy, a technician, decides to upgrade a router before leaving for vacation. While away, users begin to report slow performance. Which of the following practices allows other technicians to quickly return the network to normal speeds?

Options:

A.

Change management

B.

Baselines

C.

Asset management

D.

Cable management

Question 6

Which of the following is used to verify configuration updates on a firewall?

Options:

A.

Signature identification

B.

Access control lists

C.

Scanning services

D.

Content filtering

Question 7

A new business’ web server has seen a huge spike of legitimate traffic in the last week. The owners want to ensure the site has no problems as the business continues to grow. For Kim, a network administrator, which of the following is the MOST important concern for this company?

Options:

A.

Caching

B.

Asset management

C.

Traffic shaping

D.

High availability

Question 8

The day network administrator is having problems on the network and realizes that the night administrator implemented a new device that is causing broadcast traffic. Which of the following should be implemented to avoid miscommunication between the administrators?

Options:

A.

Asset management

B.

System baselines

C.

System logging

D.

Change management

Question 9

A network administrator wants to see what ports are open on a server. Which of the following commands will show open ports?

Options:

A.

netstat

B.

tracert

C.

nbtstat

D.

nslookup

Question 10

Which of the following network performance methods would Lisa, a technician, use with SIP phones?

Options:

A.

CARP

B.

Load balancing

C.

QoS

D.

Caching engines

Question 11

Karen, an administrator, has created a patch cable. Which of the following tools should she use to check the integrity of the cable?

Options:

A.

Protocol analyzer

B.

Toner probe

C.

Cable certifier

D.

Cable stripper

Question 12

Which of the following does SNMPv3 BEST provide over previous versions?

Options:

A.

Increased security

B.

Simplified management

C.

More data types

D.

Higher productivity

Question 13

A technician has traced a POTS line to a 110 block. Which of the following devices would the technician MOST likely use to see if the line carries a dial tone?

Options:

A.

Toner Probe

B.

Punch Down Tool

C.

Protocol Analyzer

D.

Butt Set

Question 14

Kim, a network technician, needs to identify the MAC address of a device that is creating broadcast storms on the network. Which of the following tools will provide the needed information?

Options:

A.

History logs

B.

Network sniffer

C.

Network maps

D.

Traffic shaping

Question 15

A network technician is concerned that a user is utilizing a company PC for file sharing and using a large amount of the bandwidth. Which of the following tools can be used to identify the IP and MAC address of the user’s PC?

Options:

A.

System log

B.

History log

C.

Network sniffer

D.

Nslookup

Question 16

A technician suspects invalid information in the local DNS cache of a workstation. Which of the following commands can be used to clear this?

Options:

A.

nslookup

B.

ifconfig

C.

dig

D.

ipconfig

Question 17

Which of the following performance optimization techniques would be MOST beneficial for a network-wide VoIP setup? (Select TWO).

Options:

A.

Proxy server

B.

Traffic shaping

C.

Caching engines

D.

Load balancing

E.

Quality of service

Question 18

A company has gone through several upgrades on their network but unfortunately have no way of identifying who approved the upgrades. Which of the following should be implemented to track this type of work?

Options:

A.

Change management

B.

Asset management

C.

Access log

D.

Baselines

Question 19

A proxy server would MOST likely be installed to provide which of the following functions? (Select TWO).

Options:

A.

Combined DNS and DHCP hosting

B.

Encryption

C.

Content filtering

D.

Fault tolerance

E.

Website caching

Question 20

Lisa, a network technician, needs to push changes out to network devices and also monitor the devices based on each device’s MIB. Which of the following should she use?

Options:

A.

SNMP

B.

Traffic analysis

C.

Syslog

D.

Asset management

Question 21

Users report that an internal file server is inaccessible. Of the following commands, which would be the MOST useful in determining network-layer connectivity?

Options:

A.

dig

B.

nbtstat

C.

netstat

D.

ping

Question 22

A computer has lost network connectivity. The network technician determines the network cable and the cable drop are both good. Which of the following would the technician use to test the computer’s NIC?

Options:

A.

Cable certifier

B.

Throughput tester

C.

Loopback plug

D.

Multimeter

Question 23

Which of the following devices should Jeff, an administrator, connect to a protocol analyzer in order to collect all of the traffic on a LAN segment?

Options:

A.

Hub

B.

VLAN

C.

Router

D.

Server

Question 24

A public website using round robin DNS is an example of:

Options:

A.

load balancing.

B.

QoS.

C.

caching engines.

D.

traffic shaping.

Question 25

During a blizzard, a technician decides to work from home but is unable to connect to the company’s network. Which of the following is MOST likely taking place at the office?

Options:

A.

Switching loop

B.

Wrong DNS

C.

Power failure

D.

Duplicate IP address

Question 26

Which of the following can a technician use when a company implements redundant WAN links?

Options:

A.

Content filter

B.

Load balancer

C.

Proxy server

D.

VPN concentrator

Question 27

Which of the following wiring distribution types, often found in company closets, is used to connect wiring from individual offices to the main LAN cabling?

Options:

A.

MDF

B.

66 block

C.

IDF

D.

Patch panel

Question 28

A user reports that they are unable to access a new server but are able to access all other network resources. Based on the following firewall rules and network information, which of the following ACL entries is the cause?

User’s IP: 192.168.5.14

Server IP: 192.168.5.17

Firewall rules:

Permit 192.168.5.16/28192.168.5.0/28

Permit 192.168.5.0/24192.168.4.0/24

Permit 192.168.4.0/24192.168.5.0/24

Deny 192.168.5.0/28192.168.5.16/28

Deny 192.168.14.0/24192.168.5.16/28

Deny 192.168.0.0/24192.168.5.0/24

Options:

A.

Deny 192.168.0.0/24192.168.5.0/24

B.

Deny 192.168.5.0/28192.168.5.16/28

C.

Deny 192.168.14.0/24192.168.5.16/28

D.

Implicit Deny rule

Question 29

Which of the following ports is used by Telnet?

Options:

A.

21

B.

23

C.

80

D.

143

Question 30

Zach, a network technician, is unable to remotely manage or ping certain layer 2 switches. To manage those devices remotely, which of the following will MOST likely need to be configured?

Options:

A.

IP address on the native VLAN interface

B.

Port security

C.

Port forwarding

D.

IP address on the fiber interface

Question 31

Which of the following BEST describes the difference between layer 2 switching and layer 2 routing?

Options:

A.

Switching moves packets between hosts on different subnets, and routing moves packets between hosts on the same subnet.

B.

Routing moves packets between hosts on different subnets, and switching moves packets between hosts on the same subnet.

C.

Both routing and switching move packets between hosts on the same subnet, but routing does so at a faster pace.

D.

Both routing and switching move packets between hosts on different subnets, but switching does so at a faster pace.

Question 32

Which of the following is associated with DNS reverse lookup zones?

Options:

A.

CNAME

B.

TXT

C.

PTR

D.

MX

Question 33

Which of the following wiring components is used as a central point of termination for all network jacks through a building area?

Options:

A.

Demarc

B.

CSU

C.

Patch Panel

D.

Smart Jack

Question 34

If a wireless key gets compromised, which of the following would MOST likely prevent an unauthorized device from getting onto the network?

Options:

A.

Device placement

B.

Wireless standard

C.

Encryption type

D.

MAC filtering

Question 35

A user wants to send information and ensure that it was not modified during transmission. Which of the following should be implemented?

Options:

A.

MAC filtering

B.

Digital signatures

C.

MS-CHAP

D.

CHAP

Question 36

Which of the following VPN technologies uses IKE and ISAKMP for key exchange?

Options:

A.

SSL

B.

IPSec

C.

L2TP

D.

PPTP

Question 37

Which of the following DNS records must be queried to resolve the IPv6 address of a website?

Options:

A.

CNAME

B.

PTR

C.

AAAA

D.

A

Question 38

Which of the following DNS records is used to identify a domain’s SMTP server?

Options:

A.

CNAME

B.

PTR

C.

MX

D.

A

Question 39

Which of the following is a square shaped fiber connector that is slightly smaller than a standard copper network cable connector?

Options:

A.

BNC

B.

FSMA

C.

MT-RJ

D.

ST

Question 40

You have been tasked with testing a CAT5 cable. A summary of the test results can be found on the screen.

Step 1: Select the tool that was used to create the cable test results.

Step 2: Interpret the best results and select the options that explains the results.

Options:

Question 41

Which of the following 802.11n features allows for the use of multiple simultaneous frequencies in order to increase usable bandwidth?

Options:

A.

Channel bonding

B.

MIMO

C.

Spatial reuse

D.

20MHz channel spacing

Question 42

A technician needs to test the length of a newly installed cable run because it is believed that it exceeds the maximum specification length. Which of the following tools should be used?

Options:

A.

Cable certifier

B.

Toner probe

C.

Cable tester

D.

Protocol analyzer

Question 43

A network administrator is tasked with blocking unwanted spam is being relayed by an internal email server. Which of the following is the FIRST step in preventing spam that is originating from bots on the network?

Options:

A.

Closing off port 25 on the firewall

B.

Closing off port 53 on the firewall

C.

Turning off the SMTP service on the email server

D.

Turning off the IMAP service on the email server

Question 44

A MAC address is a part of which of the following OSI model layers?

Options:

A.

Network

B.

Data Link

C.

Physical

D.

Transport

Question 45

A network administrator has been assigned the 192.168.2.64/26 network and assigns the following computer’s IP addresses:

192.168.2.70

192.168.2.100

192.168.2.125

192.168.2.130

When the administrator tries to ping the other computers from 192.168.2.130, an ECHO REPLY is not received. Which of the following must the network administrator do?

Options:

A.

Change the IP of 192.168.2.130 to 192.168.1.128.

B.

Change the IP of 192.168.2.130 to 192.168.2.126.

C.

Change the default gateway of 192.168.2.130 accordingly.

D.

Reconfigure the switch for the right VLAN.

Question 46

Which of the following wireless parameters may need to be modified when a new cordless telephone is installed?

Options:

A.

Encryption type

B.

SSID

C.

IP address

D.

Channel

Question 47

A technician is installing an 802.11n network. The technician is using a laptop that can connect at a maximum speed of 11 Mbps. The technician has configured the 802.11n network correctly but thinks it could be the type of WLAN card used on the laptop. Which of the following wireless standards is the WLAN card MOST likely using?

Options:

A.

802.11a

B.

802.11b

C.

802.11g

D.

802.11n

Question 48

Zach, a technician, is installing an 802.11n network. Which of the following should he disable to stop broadcasting the network name?

Options:

A.

Channel

B.

WEP

C.

SSID

D.

WPA

Question 49

Stateful packet inspection is a security technology used by which of the following devices?

Options:

A.

Unmanaged switch

B.

Hardware firewall

C.

Bridge

D.

IDS

Question 50

Ann, a home user, wishes to confine a wireless network to devices ONLY inside of her house. Which of the following will accomplish this?

Options:

A.

Decreasing radio strength

B.

MAC filtering

C.

WEP encryption

D.

SSID broadcast disable

Question 51

Which of the following tools could attempt to detect operating system vulnerabilities?

Options:

A.

nslookup

B.

honeynet

C.

netstat

D.

nessus

Question 52

Which of the following network access methods is the MOST secure?

Options:

A.

PPPoE

B.

SIP

C.

RSH

D.

IPSec

Question 53

A company has only three laptops that connect to their wireless network. The company is currently using WEP encryption on their wireless network. They have noticed unauthorized connections on their WAP and want to secure their wireless connection to prevent this. Which of the following security measures would BEST secure their wireless network? (Select TWO).

Options:

A.

Change the encryption method to WPA

B.

Limit the DHCP scope to only have three addresses total

C.

Enable the SSID broadcast

D.

Enable and configure MAC filtering

E.

Change the broadcast channel to a less commonly used channel

Question 54

An administrator configuring remote access opens ports 500/UDP and 10000/UDP on the firewall. Which of the following services are MOST likely being allowed? (Select TWO).

Options:

A.

SSL

B.

IPSec

C.

Kerberos

D.

RDP

E.

L2TP

F.

PPTP

Question 55

Sandy, a home user, wishes to confine a wireless network to devices ONLY inside of her house. Which of the following will accomplish this?

Options:

A.

Decreasing radio strength

B.

MAC filtering

C.

WEP encryption

D.

SSID broadcast disable

Question 56

A firewall that examines all the incoming traffic and decides if the traffic is going to be allowed though or dumped is a example of which of the following?

Options:

A.

Packet sniffing

B.

Packet filter

C.

Stateful inspection

D.

Content filter

Question 57

Which of the following security protocols would BEST protect a connection to a remote email server and ensure full integrity of all transmitted email communication?

Options:

A.

TLS 1.2

B.

SNMPv3

C.

WPA2

D.

SMTP

Question 58

Which of the following is the MOST secure way to prevent malicious changes to a firewall?

Options:

A.

SNMPv2 access only

B.

TELNET access only

C.

SSH access only

D.

Console access only

Question 59

Jeff, a company executive, has noticed that a wireless network signal from the company’s WAP can be seen in the company’s parking lot. Jeff is very worried that this is a potential security threat. Which of the following can be done to eliminate this threat?

Options:

A.

Implement WEP encryption

B.

Decrease signal strength

C.

Change wireless channels

D.

Rotate the SSID daily

Question 60

Which of the following would be the BEST solution for an IDS to monitor known attacks?

Options:

A.

Host-based

B.

Signature-based

C.

Network-based

D.

Behavior-based

Question 61

Which of the following protocols works at the LOWEST layer of the OSI model?

Options:

A.

L2TP

B.

PPTP

C.

ISAKMP

D.

IPSec

Question 62

Which of the following solutions will detect and disable a rogue access point?

Options:

A.

Port scan

B.

Packet sniffer

C.

IPS

D.

IDS

Question 63

A user is unable to connect to a remote computer using RDP. The technician checks the firewall rules and notes that there is no rule that blocks RDP. Which of the following features of the firewall is responsible for blocking RDP?

Options:

A.

Stateful inspection

B.

NAT/PAT

C.

Port security

D.

Implicit deny

Question 64

Which of the following uses SSL encryption?

Options:

A.

SMTP

B.

FTP

C.

HTTPS

D.

SNMP

Question 65

Joe, a network technician, is implementing a wireless network and needs to support legacy devices. He has selected to use WPA mixed mode. WPA mixed mode is normally implemented with which of the following encryption factors? (Select TWO).

Options:

A.

SSH

B.

3DES

C.

AES

D.

SSL

E.

TLS

F.

TKIP

Question 66

An administrator determines that an attack is taking place on the email server from a group of users on the same ISP. Which of the following is the BEST way to mitigate an attack on the network?

Options:

A.

Packet filtering

B.

Spam filtering

C.

MAC filtering

D.

CSU

Question 67

Which of the following would be used to place extranet servers in a separate subnet for security purposes?

Options:

A.

VPN

B.

NAT

C.

DMZ

D.

IDS

Question 68

Which of the following security devices is used in providing packet and MAC address filtering services for the network?

Options:

A.

Host-based proxy server

B.

Network-based firewall

C.

IDS

D.

IPS

Question 69

A technician needs to restrict access to a SOHO wireless network to specific devices. Which of the following would MOST likely be used with minimal client configuration?

Options:

A.

Port filtering

B.

WEP

C.

MAC address filtering

D.

PoE

Question 70

Honeypots and honeynets are different in which of the following ways?

Options:

A.

Honeynets are managed collections of honeypots.

B.

Honeypots only test software security, not hardware.

C.

Honeynets require specialized hardware to implement.

D.

Honeypots are usually servers and honeynets are routers and switches.

Question 71

Kim, a user, reports that the web browser is indicating the site certificate is not trusted. Which of the following attacks may be in progress?

Options:

A.

Man-in-the-middle

B.

Denial of service

C.

Ping flooding

D.

Smurfing

Question 72

An organization only has a single public IP address and needs to host a website for its customers. Which of the following services is required on the network firewall to ensure connectivity?

Options:

A.

Forwarding proxy

B.

Port address translation

C.

DMZ port security

D.

Application inspection

Question 73

Which of the following DNS records would a web browser access to determine the IP address of an Internet web page?

Options:

A.

CNAME

B.

A

C.

MX

D.

PTR

Question 74

Lisa, a network technician, is attempting to map a FQDN to an internal server at the address of 10.0.0.15 without NAT/PAT. Which of the following is the reason this will ultimately not work?

Options:

A.

This is a private address which cannot be seen by external users.

B.

The address does not have the appropriate subnet mask assigned.

C.

This is a public address which can only be seen by internal users.

D.

This is a private address which can only be seen by external users.

Question 75

A technician has narrowed down the cause of a problem to two possible sources. Which of the following should the technician do NEXT?

Options:

A.

Implement a solution for both causes to be sure all possibilities are covered.

B.

Choose the more likely cause and test to confirm.

C.

Establish a plan of action for each.

D.

Choose the less likely cause and test to eliminate.

Question 76

Which of the following allows for groups of ports on the same switch to operate as a part of different segmented networks?

Options:

A.

RIP

B.

STP

C.

VLAN

D.

MTU

Question 77

A home user states during a basement remodel, one of the workers cut the network cable that goes from the modem to the WAP and nothing else has changed. According to the network troubleshooting methodology, which of the following is the NEXT step?

Options:

A.

Identify the problem

B.

Question the user

C.

Establish a plan of action

D.

Establish a theory of probable cause

Question 78

A forward lookup zone converts which of the following?

Options:

A.

IP addresses to hostnames

B.

Hostnames to IP addresses

C.

MAC addresses to IP addresses

D.

IP Addresses to MAC addresses

Question 79

Which of the following OSI layers BEST describes where an HTTP proxy operates?

Options:

A.

Transport

B.

Application

C.

Presentation

D.

Session

Question 80

Which of the following DNS record types provides the hostname to IP address mapping?

Options:

A.

A record

B.

NS record

C.

CNAME record

D.

MX record

Question 81

Which of the following ports would Zach, a technician, need to open on a firewall to allow SSH on the default port?

Options:

A.

20

B.

21

C.

22

D.

23

Question 82

Which IEEE protocol is used with VLAN technology?

Options:

A.

802.11a

B.

802.11b

C.

802.1m

D.

802.1q

Question 83

Which protocol is represented by the packet capture below?

UDP 0.0.0.0:68 -> 255.255.255.255:67

Options:

A.

DHCP

B.

FTP

C.

SNMP

D.

DNS

Question 84

Which of the following has the LEAST amount of collisions in a domain?

Options:

A.

Bridge

B.

Hub

C.

Repeater

D.

Switch

Question 85

After Kurt, a technician, has established a plan of action to resolve the problem, which of the following steps should he perform NEXT?

Options:

A.

Establish a theory of probable cause.

B.

Implement preventative measures.

C.

Verify full system functionality.

D.

Implement the solution or escalate as necessary.

Question 86

A web server that provides shopping cart capabilities for external end users will likely function with which of the following protocols?

Options:

A.

HTTPS

B.

POP3

C.

SSH

D.

SMTP

Question 87

Jeff, a user, can no longer access the accounting file share, but others are still able to access the share. Which of the following would be the FIRST step in troubleshooting the issue?

Options:

A.

Notify senior management of the issue.

B.

Develop a probable cause theory.

C.

Ask Jeff if anything has changed on the system.

D.

Escalate the issue to the vendor.

Question 88

Which of the following services are affected by closing the default ports of 80 and 21 via ACL on a company router?

Options:

A.

FTP and basic Internet traffic

B.

HTTPS and IMAP traffic

C.

DNS and TELNET traffic

D.

VPN and RDP traffic

Question 89

Which of the following is used to embed the MAC address of an Ethernet interface in a corresponding IPv6 address?

Options:

A.

Subnet

B.

IANA prefix

C.

EUI-64

D.

Site-local

Question 90

Data arranged into packets would be on which of the following layers of the OSI model?

Options:

A.

Datagram

B.

Transport

C.

Presentation

D.

Network

Question 91

At which layer of the OSI model do MAC addresses operate?

Options:

A.

Data Link

B.

Network

C.

Application

D.

Physical

Question 92

After the technician has established a theory of probable cause of a user reported problem, which of the following should the technician do NEXT in the troubleshooting process?

Options:

A.

Implement the solution to the problem.

B.

Establish a plan of action.

C.

Identify the problem.

D.

Implement preventative measures.

Question 93

Which of the following services do TCP connections provide to application layer protocols? (Select TWO).

Options:

A.

Transport services without error recovery

B.

Large data size manageability using segmentation

C.

Secure Kerberos password encryption on data

D.

Delivery through error recovery

E.

Proxy server authentication

Question 94

Which of the following should be used when throughput to the destination network is a priority?

Options:

A.

MTU

B.

Hop count

C.

Reliability of the path

D.

Bandwidth

Question 95

After a new firewall is installed, users report that they do not have connectivity to the Internet. The output of the ipconfig command shows an IP address of 169.254.0.101. Which of the following ports would need to be opened on the firewall to allow the users to obtain an IP address? (Select TWO).

Options:

A.

UDP 53

B.

UDP 67

C.

UDP 68

D.

TCP 53

E.

TCP 67

F.

TCP 68

Question 96

Multiple networked devices running on the same physical hardware that provide central access to applications and files, where each device runs as a piece of software are known as:

Options:

A.

Virtual desktops.

B.

Switches.

C.

PBXs.

D.

Virtual servers.

Question 97

A user would like to connect two laptops together and transfer files via the Ethernet ports. Which of the following should MOST likely be provided to the user to accomplish this?

Options:

A.

Crossover

B.

Rollover

C.

Loopback

D.

Straight cable

Question 98

The ISP needs to terminate the WAN connection. The connection should be located in the network server room where the company LAN equipment resides. Which of the following identifies the location?

Options:

A.

Smart jack

B.

MDF

C.

VPN

D.

66 block

Question 99

Which of the following WAN technologies utilizes an optical SONET carrier and has a maximum bandwidth of 155.54Mbps?

Options:

A.

DS3

B.

E3

C.

OC3

D.

T3

Question 100

Which of the following connectors is used for coaxial copper cable?

Options:

A.

BNC

B.

DB-9

C.

RJ-11

D.

ST

Question 101

802.11n can operate at which of the following frequencies? (Select TWO).

Options:

A.

2.4Mhz

B.

2.5Mhz

C.

5Mhz

D.

2.4Ghz

E.

2.5Ghz

F.

5Ghz

Question 102

The network technician is troubleshooting a connectivity issue on a CAT5 cable with a wire map and notices that only pins 1, 3, and 6 are mapping correctly. Which of the following pins are open and keeping traffic from flowing correctly?

Options:

A.

2

B.

4

C.

5

D.

8

Question 103

Which of the following technologies can cause interference for 802.11g?

Options:

A.

RADAR

B.

802.11a

C.

IrDA

D.

Bluetooth

Question 104

Which of the following defines the pinout of an 8P8C eight pin modular jack for a CAT6a cable?

Options:

A.

568B

B.

RJ-11

C.

RJ-45

D.

RS-232

Question 105

In a small office environment, one computer is set up to provide Internet access to three other computers that are not interconnected. This is an example of which of the following topology types?

Options:

A.

Peer-to-peer

B.

Point-to-multipoint

C.

Hybrid

D.

Point-to-point

Question 106

Joe, a technician, is troubleshooting connectivity issues with a new data circuit. Joe verifies that the ST fiber jumper is good. Which of the following is the problem?

Options:

A.

TX/RX reversed

B.

Interference

C.

Cable length

D.

Bad connectors

Question 107

Which of the following colors represents the outer leads on a connector head of a 568B patch cable? (Select TWO).

Options:

A.

Blue, brown/white

B.

Green/white, blue

C.

Orange/white, orange

D.

Blue, blue/white

E.

Brown/white, brown

Question 108

Jeff, an administrator, is using a punch-down tool to connect a cable. To which of the following is Jeff MOST likely connecting?

Options:

A.

A 110 block

B.

A demarc

C.

A DB-9

D.

A smart jack

Question 109

Which of the following connectors push and twist-on?

Options:

A.

LC

B.

SC

C.

ST

D.

RJ-45

Question 110

Kim, a technician, is connecting a new desktop computer to a switch. She was only able to locate one cable in the office for the installation. The wires at each end are color coded as follows:

End A: orange-white, orange, green-white, blue, blue-white, green, brown-white, brown

End B: green-white, green, orange-white, blue, blue-white, orange, brown-white, brown

Which of the following should Kim do to complete the installation?

Options:

A.

Re-end the provided cable, keeping the wiring the same.

B.

Use the provided cable.

C.

Purchase a crossover cable.

D.

Purchase a straight-through cable.

Question 111

Which of the following cable types is required to run through an air duct?

Options:

A.

UTP

B.

Fiber

C.

PVC

D.

Plenum

Question 112

Which of the following is a packet switching WAN technology?

Options:

A.

Frame relay

B.

T1

C.

Asynchronous transfer mode

D.

ISDN

Question 113

Which of the following 802.3 classifications has a MAXIMUM segment distance of 984 feet (300 meters)?

Options:

A.

1000Base

B.

100BaseFX

C.

1000BaseSX

D.

1000BaseT

Question 114

A technician has been dispatched to investigate connectivity problems of a recently renovated office. The technician has found that the cubicles were wired so that the network cables were run inside the conduit with the electrical cabling. Which of the following would MOST likely resolve the connectivity issue?

Options:

A.

Power-cycle the computers and switches to re-establish the network connection.

B.

Re-run the network cabling through the ceiling alongside the lights to prevent interference.

C.

Test the wiring in the network jacks for faults using a cable verifier.

D.

Re-run the network cabling so that they are 12 inches or more away from the electrical lines.

Question 115

Which of the following is the MAXIMUM distance a single 1000BaseT segment can cover?

Options:

A.

100 kilometers (62 miles)

B.

10 kilometers (6 miles)

C.

1000 meters (3281 feet)

D.

100 meters (328 feet)

Question 116

In the 2.4GHz range, which of the following channel combinations are non-overlapping?

Options:

A.

1, 6, 11

B.

2, 7, 10

C.

2, 8, 13

D.

3, 6, 9

Question 117

Which of the following standards can operate at 40MHz channel spacing?

Options:

A.

802.11a

B.

802.11b

C.

802.11g

D.

802.11n

Question 118

When examining a suspected faulty copper network cable, Kim, the administrator, notices that some of the pairs are untwisted too much. This is MOST likely causing which of the following?

Options:

A.

DB loss

B.

Dispersion

C.

Collisions

D.

Cross-talk

Question 119

Ann, a technician, is installing network cables for an office building. Some of the cables are not showing active on the switch even when moved to different ports. Which of the following is MOST likely the cause?

Options:

A.

Port speed mismatch

B.

Faulty F-connectors

C.

Bad wiring

D.

Bad switch

Question 120

Lisa, an administrator, has been tasked with running cables from one office to another neighboring office by running cables over the light fixtures in the ceiling that connects them. To prevent interference, which of the following cable types should Lisa use?

Options:

A.

CAT5e

B.

CAT6

C.

Coaxial

D.

Multimode fiber

Page: 1 / 111
Total 1112 questions