#1
#2
#3
#4
#5
100
A firewall seperates a management workstation from a router. You need to manage the router using telnet withot specifying a port. Which traffic must the firewall allow? a) RPC traffic b) Traffic on port 23 c) ICMP traffic d) Traffic on port 25
What is b) Traffic on port 23
100
You are configuring a router as a firewall for your peremiter network. You want to provide the highest possible level of protection to your network. Which is the most sophisticated method for manging traffic through a router? a) Proxy b) Static packet filters c)Application layer filtering d) Stateful inspection
What is c)Application layer filtering
100
Which protocol is used to automatically assign IP address to host computers from a predefined address range? a) SNMP b) DHCP c) RIP d) DNS
What is b) DHCP
100
When would you need to deploy Windows Routing and Remote Access (RRAS) services? a) to create a public FTP site b) To support centralizzed authentication support c) To expose a public Web server to the Internet d)To configure virtual private network (VPN) site- to- site connections
What is d)To configure virtual private network (VPN) site- to- site connections
100
Which Domain Name System (DNS) resource record type identifies the primary DNS server for a DNS zone? a) SOA B) NS c) MX d) PTR e) A
What is a) SOA
200
which layer of the OSI model is responsile for the address information needed to route data between different network? a) Layer 2 b) Layer 4 c) Layer 1 d) Layer 3 e) Layer 4
What is d) Layer 3
200
Which two utilities can you use to identify a router that is experiencing problems? (Choose two) a) Pathing b) Tracet c) Ping d) Netstat e) Route
What is a) Pathing b) Tracet
200
A layer 2 switch determines which port to send a packet through by examing the: a) subnet mask of the source. b) IP address of the destination c) Subnet mask of the destination d) MAC address of the destination
What is d) MAC address of the destination
200
What type of server would you place in a peremiter network? a) A little server that contains highly confidential files b) A web server that must be accessed by external users c) An active directory domain controller d) a database server that stores information used by the company's accounting program
What is b) A web server that must be accessed by external users
200
Which method of configuring a VLAN offers the best scalability? a) Frame tagging b) Supernetting c) Subnetting d) Frame filtering
What is a) Frame tagging
300
Which two cable specifications are for coaxtial cable?(Choose 2) a) 10 Base-5 b) 100Base-FX c) 100Base-T4 d)10GBase -T d) 10Base-2
What is a) 10 Base-5 and d) 10Base-2
300
Which protocol is a distance vector routing protocol? a) RIP b)OSPF c) BGP d) SNMP
What is a) RIP
300
Which of the following is an APIPA address? a) 169.254.5.2 b) 192.168.13.4 c) 127.0.0.1 d)10.20.30.6
What is a) 169.254.5.2
300
A ring topology is used when wiring: a) aWireless ad hoc mode network b) aWireless infrastructure mode network c) a X. 25 packet switching network d) a 100BaseT Ethernet network e) a Fiber Distributed Data Interface(FDDI) network.
What is e) a Fiber Distributed Data Interface(FDDI) network.
300
Which technology is used to allow a client computer to securely connect to a remote private network across the Internet? a) MAN b) VPN c) CAN d) WLAN
What is b) VPN
400
An internet security zone includes: a) all external Web sites b) all internal and external Websites, except those listed in the Intranet zone. c) all internal and external Web sites that are not listed in the Restricted or trusted sites zone. d) All external Web sites that are not listed in the Restricted or Trusted sites zone.
What is d) All external Web sites that are not listed in the Restricted or Trusted sites zone.
400
Which WLAN security standard supports AES encryption? a) PPTP b) WEP c) WPA d) L2TP
What is c) WPA
400
Which media is immune to electromagnetic interference (EMI)? a) 10 Base2 b)1000Base_T c) 10 Base5 d) 100Base-FX
What is d) 100Base-FX
400
What is the role of a RADIUS server in awireless network that is secured using WI-FI protected Access (WPA)? a) Wired network interface b) Encryption key management c) User authentication d) Client address filtering
What is c) User authentication
400
You are using unshielded twisted pair (UTP) to wire a 100BaseT Ethernet network. Which cable type should you use? a) Cat5 b) Cat 1 c) Cat 3 d) Cat4
What is a) Cat5
500
Media access control (MAC) addresses are implemented at which layer of the OSI model? a) Datalink b) Physical c) Network d) Transport
What is a) Datalink
500
Which of the following is an IPv4 multicast address? a) 127.0.0.1 b) FF00::1 c) ::1 d) 224.0.0.1
What is d) 224.0.0.1
500
Which can be used to create a virtual local area network(VLAN)? a) One or more unmanaged switches b) One or more managed switches c) One or more bridges d) One or more hubs
What is b) One or more managed switches
500
Which DNS record is used to allow a server to resolve an IP addess to a full-qualified domain name(FQDN)? a) service (SRV) record b) Pointer(PTR) record c) Mail Exchange(MX) record d) A host (A) record
What is b) Pointer(PTR) record
500
Which tool can you use to delete the entries in the domain Name System (DNS) cache on a client computer? a) Netstat b) Dnscmd c) IPconfig d) Tracert
What is c) IPconfig
M
e
n
u