B
I
N
G
O
100

A system administrator needs to connect to a remote Windows desktop at a remote site. Which of the following would provide this functionality?

A. services.msc

B. mstsc

C. defrag

D. Explorer

What is (B.) mstsc .

The mstsc (Microsoft Terminal Services Client) is the executable name of the remote desktop connection client software.

100

A network administrator is connecting four remote company locations that reside in different countries. Which of the following would BEST describe this configuration?

A. LAN
B. CAN
C. MAN
D. WAN

What is (D.) WAN.

A WAN (Wide Area Network) describes a network that connects locations that are geographically distant from each other.

100

A user in the IT department has an IP address listed in a report and needs to convert the address to a FQDN. Which of the following would provide this functionality?

A. NET VIEW

B. NSLOOKUP

C. NETSTAT

D. IPCONFIG

What is (B.) NSLOOKUP.

The NSLOOKUP command can query a domain name server to provide the FQDN (Fully Qualified Domain Name) of an IP address, or vice versa.

100

The Windows 10 Disk Management utility status shows that a volume is "Regenerating." Which of these describes this status message?

A. A RAID 5 volume is rebuilding data based on parity

B. A scheduled defragmentation is active

C. A drive in a RAID array has failed

D. A RAID 1 volume is copying data between mirrored drives

What is (A.) A RAID 5 volume is rebuilding data based on parity.

After replacing a bad drive in a RAID 5 array, the new drive will regenerate data based on the remaining data and parity information.

100

A system administrator at a SOHO remote site would like to modify the range of automatically-assigned IP addresses. Which of the following should be modified on the SOHO wireless router?

A. Primary and secondary DNS

B. MAC filtering

C. WPA2 security mode

D. DHCP ending address

What is (D.) DHCP ending address.

The DHCP configuration of a SOHO router can be configured with the beginning and ending DHCP address range.

200

A system administrator would like to centralize the login process for desktops, tablets, and wireless devices. Which of the following services would be the BEST fit for this requirement?

A. MDM
B. Syslog Server
C. Authentication Server
D. Endpoint Management Server

What is (C.) Authentication Server.

An authentication server provides centralized login functionality for all devices on the network.

200

A network administrator has configured an 802.11 network to use two contiguous 20 MHz bonded channels on the 2.4 GHz band. Which of these wireless standards is in use? 

A. 802.11b

B. 802.11n

C. 802.11a

D. 802.11g

What is (B.) 802.11n.

The 802.11n standard can use 40 MHz of bandwidth in the 2.4 Ghz band. It is unusual to see this particular configuration in use, since it uses much of the available bandwith in the 2.4 GHz range.

200

In which of the following would you commonly traffic prioritization and 802.1Q support?

A. Router

B. Managed Switch

C. Wireless access point

D. Cable modem

What is (B.) Managed Switch.

A managed switch includes features such as traffic prioritization, VLAN trunking support, STP (Spanning Tree Protocol) support, and more.

200

A security administrator has configured a rule to block tcp/143 on the corporate firewall. What type of traffic would be affected by this rule?

A. Authentication requests

B. Remote desktop control

C. Windows file sharing

D. Email downloads

What is (D.) Email downloads.

TCP port 143 is commonly used for IMAP (Internet Message Access Protocol).

200

A system administrator has configured a mobile phone to communicate over tcp/110. Which of the following would be the most likely reason for this configuration?

A. Web browsing over an encrypted channel

B. Synchronize calendar settings

C. Download email messages

D. Update the phone's operating system

What is (C.) Download email messages.

TCP port 110 is commonly used by POP3 (Post Office Protocol version 3) to receive email messages.

300

Each Windows device on a network is configured to maintain its own set of user information. Which of the following would BEST describe this architecture?

A. Domain
B. HomeGroup
C. Cluster
D. Workgroup

What (D.) Workgroup.

A Windows Workgroup maintains an independent authentication database on each device, and the devices do not share this information. To globally change a user's password in a Windows Workgroup, you would need to change the credentials on each device.

300

During the startup process, a computer is assigned the IP address 169.254.77.14. Which of the following would best describe this addressing?

A. The device is on a public IP network

B. The firewall is blocking udp/161

C. The DHCP server is down

D. The device uses a NAT to communicate to the Internet

What is (C.) The DHCP Server is down.


The address range of 169.254.1.0 through 169.254.254.255 is the APIPA (Automatic Private IP Addressing) range. If a DHCP server is not available to assign an IP address, a device will default to an APIPA address.


300

Which of the following would be the BEST way to view real-time network utilization, IPv4 address, and IPv6 address of a Windows 10 workstation?

A) ipconfig

B) Task Manager

C) Device Manager

D) msinfo32

What is (B.) Task Manager.

Task Manager's Performance tab provides a real-time breakdown of CPU, memory, disk, and network information.

300

A system administrator would like to restart a Windows 10 computer while connected to a command prompt. Which of the following would provide this functionality? 

A) REBOOT

B) RESTART

C) SHUTDOWN

D) POWER

What is (C.) SHUTDOWN.

The Windows SHUTDOWN command can be used to shutdown a computer from the command line, or to shutdown and restart the system.

300

During the configuration of a SOHO firewall, a network administrator notices that the UPnP option is enabled. Which of these would BEST describe this option?

A. The wireless network will not be visible in selection menus

B. Inbound connections can be opened without any explicit rules

C. Certain URLs will be blocked at the firewall

D. Only specific MAC addresses will have access to the network

What is (B.) Inbound connections can be opened without any explicit rules.

UPnP (Universal Plug and Play) allows network devices to automatically configure and find other network devices. This is commonly configured to allow internal services to automatically configure a firewall to allow inbound access to the service.

400

A system administrator needs to configure proxy addresses on a Windows 10 workstation. Where is this configuration option found?

A. Shared Folders

B. Internet Options

C. System Properties

D. Device Manager

What is (B.) Internet Options.

The Windows proxy settings are in the Control Panel under the Internet Properties applet and the Connections tab.

400

A network engineer has installed a dialup modem line into a remote office for out-of-band terminal communication. What type of network speeds would you expect to receive over this link?

A. 56 kbit/sec

B. 5 Mbit/sec

C. 560 kbit/sec

D. 16 Mbit/sec

What is (A.) 56 kbit/sec.

Analog dialup lines connect at 56 kbit/sec and can compress data to achieve speeds as high as 320 kbit/sec.

400

A system administrator is troubleshooting a Windows computer and needs to boot into Safe Mode. Which of the following would be the BEST way to provide this functionality?

A. Configure Safe Mode in System Configuration

B. Choose the Safe Mode option in Disk Management

C. Enable Safe Mode in the BIOS

D. Use the SHUTDOWN command with the Safe Mode option

What is (A.) Configure Safe Mode in System Configuration.

Booting into Safe Mode can be configured as a setting in the System Configuration utility.

400

A system administrator would like to require all passwords to be a minimum length. Which of the following would be the BEST way to accomplish this? 

A. Device Manager

B. Component Services

C. Boot Configuration Data

D. Local Security Policy

What is (D.) Local Security Policy.

The Local Security Policy utility provides for the configuration of password length, password age, and other important security parameters.

400

A mobile phone support line has requested the IMEI of the phone. Which of the following would best describe this request?

A. The phone number including area code

B. A unique identifier associated with the physical device

C. The version of the phone's operating system

D. The identifier of the closest mobile tower

What is (B.) A unique identifier associated with the physical device.

The IMEI (International Mobile Station Equipment Identity) is a unique identifier associated with the device. No other mobile device shares this unique IMEI value.

500

A system administrator needs to prevent the network interface from operating on a computer. This restriction should occur regardless of the operating system used. Which of the following would be the BEST way to configure the system?

A. Remove the driver from the Control Panel
B. Disable the interface in the BIOS
C. Set the operating system directory as read-only
D. Define a Local Security Policy for driver installation

What is (B.) Disable the interface in the BIOS.

Disabling an interface in the BIOS is a global setting that affects all operating systems that may run on the computer.

500

Which of these technologies would be the BEST way to segment devices into separate broadcast domains?

A. VLAN
B. NAT
C. VPN
D. R-E-S-P-E-C-T

What is (A.) VLAN

VLAN (Virtual Local Area Networks) are configured on a switch to provide segmentation between logical broadcast domains.

500

Which of these is used during the DHCP process?

A. Discover, Offer, Request, Acknowledge
B. Distribute, Host, Configure, Process
C. Identify, Request, Assign
D. Boot, Test, Load, Start 

What is (A.) Discover, Offer, Request, Acknowledge.

The device requesting a DHCP address first sends a discover message, and an offer is then received from the DHCP servers that received the discover message. The client then sends a request for one of the offers, and the final acknowledgement is sent from the offering DHCP server.

500

A new Windows 10 application requires the installation of a service during the setup process. Which of the following would be the MOST important consideration during the installation on a Windows 10 computer?

A. OS Compatibility

B. Available RAM 

C. Available drive space

D. User permissions 

What is (D.) User Permissions.

An application that installs system components would require elevated permissions during the installation process.

500

Which of the following would most commonly be used with the Linux operating system?

A. CDFS

B. ext4

C. NTFS

D. FAT32

What is (B.) ext4 .


The ext4 (Fourth extended file system) is a commonly used file system for Linux devices.

M
e
n
u