1.0 NETWORK ARCHITECTURE
2.0 NETWORK OPERATIONS
3.0 NETWORK SECURITY
4.0 TROUBLESHOOTING
5.0 INDUSTRY STANDARDS, PRACTICES & NETWORK THEORY
100

A network technician needs all nodes with IP addresses in the range of 192.168.0.3 through 192.168.0.240 to be in the same subnet. Which subnet mask will achieve this?

255.255.255.0

100

A customer shares a building with several other tenants. He has an unencrypted wireless network installed that has become increasingly slow. At the same time, his Internet traffic has steadily been increasing. What should be configured to fix both of these problems?

WAP

100

Your company has just experienced an attack that caused the Web site www.yourwebsite.com to go down. What term BEST describes this?

DoS attack

100

What Linux command is used to check or change the IP address settings of a network-interface card?

ifconfig

100

What document would you expect to find a privacy/consent-to-monitoring section?


Acceptable-use policy

200

Network technician Neo wants to install three different servers to reduce the chance of a single, insecure login. He wants to install a Linux-based e-mail server, a Microsoft Web server, and a directory services server. What technologies would BEST reduce hardware costs?

Virtual servers

200

Network administrator Marie manages one Linux and two Windows servers. She wants to be able to review all of the server logs centrally. What service could Lisa use in this scenario?

Syslog

200

What can a network administrator configure to control specific IP addresses and ports access to the internal network? (Select TWO.)

ACLs & Firewall

200

A computer user, Zaphod, is unable to log on to the domain from his desktop computer. A cable certifier is used to check his network cable and it shows a high value of NEXT. What is most likely the cause?

Crosstalk

200

What is a numbering system that represents values with ones and zeroes?

Binary

300

Class B network addresses have which default subnet mask?

255.255.0.0

300

A Windows server is experiencing problems after it boots. What should the technician immediately check?

System logs

300

Users must do their part to maintain network security. How can users know how to reduce risk factors?

Users should be trained in risk mitigation.

300

A new office's wireless network is causing interference with the medical office's wireless network located next door. What should be changed to BEST prevent the interference?

Signal strength

300

What is the maximum length of a 10Base2 Ethernet segment?

185 meters

400

A company is using VoIP phones. What network performance optimization method would Lars, a technician, use in this situation?

QoS

400

What is the benefit of using PoE+ (802.3at) over using PoE (802.3af)?

More power

400

This process watches for incoming IP address-assignment requests from unknown MAC addresses.

DHCP snooping

400

What type of user is most like to cause a DOS attack?

Malicious user

400

What document defines services, products, and time frames for support provided by a vendor?

Statement of work

500

Cliff is a network administrator who needs to add an additional connection to a room. He adds a new Ethernet switch and must now connect it to an existing switch. What type of cable should Cliff use to connect the two switches?

Crossover cable

500

When a switch does not know a path to a destination MAC address, it broadcasts an ARP request out of all of its ports. What is this process called?


Flooding

500

Two-factor authentication requires two different types of factors. What is an example of two-factor authentication?

Check card and PIN

500

There is a broadcast storm using much of the network bandwidth. Network technician Kelly needs to determine the MAC address of a device that is generating the storm. What tool will provide the needed information?

Network sniffer

500

What signaling category allows a single signal to exist on network media?

Baseband