Concepts
Infrastructure
Operations
Security
Troubleshooting
100

At which layer of the OSI model is a PDU referred to as a frame?

Physical Layer (Layer 01)

100

A switch forwards data only to the port that connects to the destination device. It knows which port to forward it to based on which value?

MAC Address

100

What would allow a device to maintain the same IP address lease based on the physical address of the network card?

MAC address reservation

100

A technician wants to prevent an unauthorized host from connecting to the network via Ethernet. What Layer 2 access control the technician should implement?

Port security (802.1x)

100

Which of the switch can be used with ipconfig to purge the DNS cache?

/flushdns

200

What is the basic purpose of the OSI Physical layer?

Coordinates rules for transmitting bits.

200

Which type of problem occurs when the signals sent through media interfere with data signals on adjacent wires?

Crosstalk

200

A company has hundreds of nodes on a single subnet and has decided to implement VLANs. What would be the prime benefit of doing this?

It segments broadcast domains in the network infrastructure

200

Which key is the secret half of a cryptographic key pair that is never transmitted over a network?

Private

200

The server team has just installed an application across three different servers. They are asking that all requests to the application are spread evenly across the three servers. What should the network team implement to fulfill the request?

Load Balancer

300

In the OSI model, what is the primary function of the Network layer?

Routes messages between networks

300

Which topology connects each device to a neighboring device?

Ring

300

A firewall administrator is implementing a rule that directs HTTP traffic to an internal server listening on a non-standard socket. What is this an example of?

PAT

300

Which of the following is part of a strategic security solution that provides secure authentication services to users, applications, and network devices?

Kerberos

300

A network administrator has been given a network of 172.16.85.0/21 and wants to know the usable range of IP addresses on that subnet. What is the correct IP address range?

172.16.80.1-172.16.87.254

400

At what layer of the OSI model do time domain reflectometers operate?

Physical (Layer 01)

400

You have implemented a network where hosts are assigned specific roles, such as file sharing and printing roles. Other hosts access those resources, but do not host services of their own.

What type of network do you have?

Client-Server

400

What is the decimal format of the following binary IP address?

11001110.00111010.10101010.01000011

206.58.170.67

400

A network engineer is configuring wireless access for guests at an organization. Access to other areas in the organization should not be accessible to guests. What represents the MOST secure method to configure guest access to the wireless network?

Guests should log into a separate wireless network using a captive portal

400

A user in the accounting department stating that Internet connectivity has been lost after receiving a new workstation. No other users in accounting are reporting similar issues. The network technician is able to ping the machine from the accounting department’s router, but is not able to ping the machine from the IT network.

 Incorrect default gateway

500

To create secure data transmissions, IPsec uses which two separate protocols?

AH and ESP

500

Your manager has asked you to implement a wired network infrastructure that will accommodate failed connections. You don't have a large budget, so you decide to provide redundancy for only a handful of critical devices.

Which  network topology should you implement?

Partial Mesh

500

The acronym MTTR is used in your documentation. How would you prepare to reduce this factor?

MTTR is the Mean Time To Repair. This indicates a failure with a calculated replacement timeline. The best way to reduce this time is to have the parts on hand.

500

There are rumors of widespread layoffs in a company. A programmer that feels at risk modifies his programming to execute malicious device encryption code if he is unemployed at the end of the month. What type of security threat is this?

A Logic Bomb
500

Which of the following switches can be used with nslookup to ask for a recursive answer to the query?

/recurse