n10-005-by bawlsdeep

235
N10-005-By BawlsDeep Number : 000-000 Passing Score : 800 Time Limit : 120 min File Version : 1.0 http://www.gratisexam.com/ CompTIA N10-005 CompTIA Network+ Certification Exam Version: 8.0 Topic 1, Volume A N10-005-By BawlsDeep downloaded from Actual Tests and formatted for the older VCE ENGINES broken down into 5 different tests.

Upload: others

Post on 26-May-2022

3 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: N10-005-By BawlsDeep

N10-005-By BawlsDeep

Number: 000-000Passing Score: 800Time Limit: 120 minFile Version: 1.0

http://www.gratisexam.com/

CompTIA N10-005

CompTIA Network+ Certification Exam

Version: 8.0

Topic 1, Volume A

N10-005-By BawlsDeep downloaded from Actual Tests and formatted for the older VCEENGINES broken down into 5 different tests.

Page 2: N10-005-By BawlsDeep

Exam A

QUESTION 1Which of the following port numbers is used by HTTP?

A. 21B. 22C. 80D. 443

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 2Which of the following protocols is the BEST to use to transfer files to/from a web server?

A. TACACS+B. FTPC. IDSD. DHCP

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 3213 A technician is troubleshooting network connectivity on a laptop. The user reports that a new network interfacecard (NIC) was recently installed. The technician thinks the NIC has not been properly configured to access thenetwork. Which of the following network troubleshooting steps should the technician do NEXT?

A. Implement the solution.B. Escalate the problem to another technician.C. Test the theory to determine cause.D. Establish a plan of action to resolve the problem.

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 4A user reports incredibly slow network connectivity speeds. The technician determines the computer has aproperly configured Gigabit NIC connected to the wall outlet with a CAT5 cable. Which of the following shouldthe technician replace next to BEST improve performance?

A. NIC

Page 3: N10-005-By BawlsDeep

B. CableC. ComputerD. Wall outlet

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 5A technician needs to add an additional cable run. Which of the following hardware tools would a technician useto BEST connect cabling to a patch panel?

A. Environmental monitorB. Punch down toolC. Loopback plugD. Protocol analyzer

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

214

QUESTION 6An administrator wants to prevent traffic from a specific VLAN from reaching any internal resources, but will beable to reach the Internet. The BEST technique to accomplish this task willbe:

A. an ACLB. a MAC-filtering tableC. a static gatewayD. aTLS tunnel

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 7Which of the following would cause signal interference in a 2.4 GHz WAP? (Select TWO).

http://www.gratisexam.com/

Page 4: N10-005-By BawlsDeep

A. Cell phoneB. Cordless phoneC. Microwave ovenD. PrinterE. Television

Correct Answer: BCSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 8The network technician needs to verify that a cable is in good condition and works properly. Which of thefollowing tools should the network technician use to verify the cable?

A. Loopback plugB. CrimperC. Environment monitorD. Cable tester

Correct Answer: DSection: (none)Explanation

Explanation/Reference:215

Explanation:

QUESTION 9Which of the following is an environment where only a username and password are required for successfulauthentication results in access to multiple resources?

A. Multiple loginsB. Multifactor authenticationC. Two-factor authenticationD. Single sign-on

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 10A network administrator added a new workstation using CAT6 UTP cable to a new area of the office. The cablewas run across the ceiling tiles to the new workstation. The workstation is 50 meters (164 feet) from the switchand is having problems connecting to the network. Which of the following is the MOST likely the problem?

A. The maximum cable length was exceeded.B. The workstation needs to directly connect to the router.

Page 5: N10-005-By BawlsDeep

C. The BNC connectors on the cable are not tight enough.D. EMI is being emitted from the florescent lights.

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 11An administrator setup a firewall to secure the network and only allow traffic that originated from the internalnetwork to return; no traffic originating from the outside is allowed to enter. A new email server needs to beadded to the network that will allow traffic to originate from the outside to access the server. Which of thefollowing is the BEST method to accomplish this?

A. Add NAT to the firewall for the email server216

B. Set a rule on the firewall to allow email to go to the email serverC. Add stateful packet filtering to the firewallD. Add a DMZ to the firewall for the email server

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 12A technician is troubleshooting a replacement switch that is connected directly to another switch via fiber. Theswitch will not recognize the fiber connection. Which of the following is MOST likely the problem?

A. DB lossB. EMIC. TXRX reversedD. Open shorts

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 13A network administrator is monitoring switches on a network. Which of the following protocols is generating thistraffic?

A. SMTPB. PPoEC. PoED. SNMP

Correct Answer: D

Page 6: N10-005-By BawlsDeep

Section: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 14Which of the following allows access to a network, based on the hardware address of a network

217 card?

A. Port filteringB. Content filteringC. MAC filteringD. IP filtering

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 15Which of the following would BEST be described as a central connection point for secured client access to aprivate network from a public network?

A. Content filterB. VPN concentratorC. Load balancerD. Proxy server

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 16Which of the following connectors would require a punch down tool to attach cable to it?

A. DB-9B. 110 blockC. MTRJD. RJ-45

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 17

Page 7: N10-005-By BawlsDeep

Which of the following wireless networking standards has the SLOWEST maximum transmission

218 rate?

A. 802.11aB. 802.11bC. 802.11gD. 802.11n

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 18For which of the following reasons could a single server's NIC transmit packets from multiple MAC addresssources?

A. The server contains several virtual machines and the MAC addresses are from the virtual machines.B. The server is hosting a web server and the MAC addresses are from connected browsers.C. The server is hosting a proxy server and the MAC addresses are from the connected clients.D. The server NIC is starting to fail and should be replaced.

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 19A company wants to implement VLANs and is upgrading their networking equipment to accommodate this.Which of the following should be purchased to allow for the VLANs?

A. RoutersB. Layer 3 switchesC. HubsD. Repeaters

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 20219 Redundant network devices are used to provide which of the following performance optimizations? (SelectTWO).

A. Load balancingB. High availability

Page 8: N10-005-By BawlsDeep

C. QoSD. Traffic shapingE. Content filtering

Correct Answer: ABSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 21While troubleshooting network connectivity, a technician notices a computer has assigned itself an APIPA IPaddress of 169.254.0.1. Assuming the DNS servers have been properly configured, which of the following toolsshould the technician use to verify the DHCP server is reachable?

A. ipconfigB. digC. nslookupD. tracert

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 22Which of the following provides a device with an IP address that does not remain the same each time the leaseis renewed?

A. ReservationB. Static IP addressC. ScopeD. Dynamic IP address

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

220

QUESTION 23Which of the following ACLs limits access to a network based on the address assigned to a computer by aDHCP server?

A. Port filteringB. IP address filteringC. MAC address filteringD. Content filtering

Page 9: N10-005-By BawlsDeep

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 24A technician is asked to increase wireless availability across a large area in an office. Which of the followingshould be reconfigured to accomplish this?

A. ChannelB. Signal strengthC. Encryption typeD. Frequency

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 25Which of the following is used to share traffic between multiple network connections?

A. Load balancerB. Content filterC. VPN concentratorD. Proxy server

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:

221

QUESTION 26A user reports that while working out of a home office, the wireless signal on the laptop drops each time thetelephone rings. Which of the following is the MOST likely cause of the problem?

A. SSID mismatchB. Weak signal strengthC. Incorrect channelD. Interference

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

Page 10: N10-005-By BawlsDeep

QUESTION 27A standard CAT1 line requires a specific connector. Which of the following is the standard connector type?

A. DB-9B. BNCC. RJ-45D. RJ-11

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 28A company wants to restrict access to various websites using a blacklist. Which of the following applianceswould BEST fit the company's needs?

A. Antivirus serverB. Load balancerC. VPN concentratorD. Proxy server

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

222

QUESTION 29In order to keep records of the location of company servers, which of the following documentation is the MOSTimportant?

A. BaselineB. Change managementC. Asset managementD. Cable management

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 30A network technician is having connectivity issues from the T3 to the fiber module of the switch. The techniciansuspects that the fiber cable might be faulty. Which of the following tools can the network technician use toconfirm this?

A. OTDRB. Punch down tool

Page 11: N10-005-By BawlsDeep

C. TDRD. Toner probe

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 31A user reports that there are multiple pop-ups appearing even though the Internet browser is closed. Uponfurther investigation, the technician discovers that the user may have typed an incorrect URL in the browser.Which of the following is the NEXT step the technician should take?

A. Implement a solution.B. Identify the problem.C. Escalate the issue.D. Test the theory.

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

223

QUESTION 32A network technician needs to address bandwidth issues on the wireless network. There are currently four802.11n access points. The technician would like to increase the bandwidth. Which of the following would bethe BEST solution?

A. Disable SSIDB. Channel bondingC. MIMOD. Increase the signal

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 33At which of the following OSI layers does the CSU/DSU operate?

A. Data linkB. NetworkC. TransportD. Physical

Correct Answer: D

Page 12: N10-005-By BawlsDeep

Section: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 34A technician needs to connect a laptop to configure a switch. Which of the following would work BEST for theconnection?

A. BNCB. RJ-11C. Console portD. 110 block

Correct Answer: CSection: (none)Explanation

Explanation/Reference:224

Explanation:

QUESTION 35When a user logs in and is authenticated a ticket/token is granted and used throughout the network session.The ticket/token grants the user access to different system resources. This is an example of which of thefollowing?

A. PKI certificatesB. IPSecC. KerberosD. MS-Chap

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 36A firewall that looks at the source IP and destination IP then routes them accordingly is an example of which ofthe following?

A. Packet filteringB. Content filteringC. Packet sniffingD. Application gateway

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:

Page 13: N10-005-By BawlsDeep

QUESTION 37The cable tester displays the following information:

1 1

2 ---------- 2

3 ---------- 3

225 4 xxxxxxxx 4

5 xxxxxxxx 5

6 ---------- 6

7 ---------- 7

8 ---------- 8

Which is being reported?

A. 5 is open, 1/4 are openB. 4/5 is shorted, 1 is okC. 1 is open, 4/5 are shortedD. 1 is shorted, 4/5 are open

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 38An administrator notices that the local network, which handles both voice and data traffic, is extremelycongested causing broken audio streams during phone conversations. Configuration of which of the followingwill MOST likely correct this issue?

A. NATsB. MAC filteringC. T1 linesD. VLANs

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 39An administrator is receiving reports from an executive that the executive's wireless access point loses thesignal frequently, even though the WAP is on the executive's desk. The office contains four other 802.11naccess points. Which of the following would MOST likely correct interference problems in the executive'soffice?

Page 14: N10-005-By BawlsDeep

226

A. Turn off SSID broadcasting for the executive's access point.B. Replace the 802.11n access point in the office with an 802.11a access point.C. Change the channel on the access point to channel 11.D. Turn off as many lights in the executive's office as possible to reduce interference.

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 40A network technician has setup three VLANs on two of the company switches, enabled all the ports as accessports, and assigned the ports to VLANs. How many connections will be needed to connect the two switchestogether?

A. 1B. 2C. 3D. 5

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 41A network technician needs to install an additional access point to the company's wireless network. Thenetwork has two 802.11b access points. Which of the following channels should be used to allow the accesspoint's coverage areas to overlap?

A. 1, 6, 11B. 2, 5, 10C. 3, 13, 23D. 4, 8, 16

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 42A network technician has configured a new firewall to allow TCP port 80 traffic and deny UDP

227 traffic. Users have reported that they are unable to access Internet websites. The technician verifies byattempting to access a popular website. Which of the following will MOST likely correct the error?

Page 15: N10-005-By BawlsDeep

A. HTTP uses UDPB. DNS port 23 needs to be allowedC. HTTP needs port 443 allowedD. UDP port 53 needs to be allowed

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 43Kurt, a network technician, has configured a new firewall on the network. Users are reporting errors whenattempting to access several websites. Kurt attempts to access several popular websites with no errors,however, he does receive an error when attempting to access a bank website. Which of the following ruleswould BEST allow access to the bank website?

A. Allow UDP port 53B. Allow TCP port 80C. Allow UDP port 340D. Allow TCP port 443

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 44A company has installed a VPN concentrator at the main company headquarters and needs employees thattravel to access the company network. Which of the following solutions will allow the employees to access theVPN without installing client software?

A. KerberosB. SSL VPNC. Site-to-site VPND. WPA enterprise

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

228

QUESTION 45An owner is planning a small home based network. The owner needs to connect PCs in four different rooms forfile sharing. Cost, ease of installation, and ability to relocate the PCs for group work needs to be considered.Which of the following is the BEST topology to use?

A. Ethernet 10baseTB. Virtual server

Page 16: N10-005-By BawlsDeep

C. 802.11nD. SSL VPN

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 46Which of the following describes a single computer that is setup specifically to lure hackers into revealing theirmethods, and preventing real attacks on the production network?

A. Evil twinB. HoneypotC. DMZD. Honeynet

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 47Fifty users in an office are actively connected to the wireless network. A new employee is given the password,but is not able to connect to the network. Which of the following is the MOST likely cause of this issue?

A. SSID broadcast was disabled.B. The channels are configured incorrectly.C. The wireless network has reached the maximum number of users.D. Interference is occurring.

229

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 48An administrator has been asked to connect an analog phone cabling in a server room. Which of the followingshould the administrator use?

A. 66 blockB. DemarcC. Circuit switchD. Smart jack

Correct Answer: ASection: (none)Explanation

Page 17: N10-005-By BawlsDeep

Explanation/Reference:Explanation:

QUESTION 49A coffee shop has hired a technician to install a wireless hot-spot. However, after the hot-spot is enabled, it wasnoted that there were more cars in the parking lot than customers in the coffee shop. Which of the following willalleviate this problem?

A. Change the channel on the WAP.B. Turn down the signal strength on the WAP.C. Turn on WEP-WPA encryption on the WAP.D. Change the SSID and turn up the signal strength on the WAP.

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 50Several users in a SOHO are having problems staying connected to the WAP. The technician notices the WAPsupporting the SOHO is located in a broom closet down the hall. Which of the following will MOST likelyalleviate the problem?

A. Move the WAP from the closet to a central location.230

B. Ensure all the workstations are on the MAC address filter.C. Turn up the signal strength to 120%.D. Change the channel on the WAP.

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 51A network of servers that appear to be part of a company's network but are isolated and monitored isconsidered which of the following?

A. ICAB. DMZC. Evil twinD. Honeynet

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 52

Page 18: N10-005-By BawlsDeep

A technician has received word that the telephone company has added another POTS line to the building.Where will the technician MOST likely find the new line?

A. CSUB. DemarcC. Registered jackD. DSU

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 53Which of the following wireless device frequencies uses light waves?

231

A. 802.11bB. 802.11nC. IrDAD. Bluetooth

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 54A technician installing a new switch notices that users on the switch can communicate with other devices on thenetwork, but not with the Internet. Which of the following is the MOST likely cause?

A. Duplicate IP addressB. Wrong DHCPC. Wrong VLAN configurationD. Wrong subnet mask

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 55A user wants to connect to a home wireless network while outside on a deck but cannot receive a wirelesssignal when outside. Which of the following should a technician modify such that the deck will have wireless?

A. ChannelB. Enable SSIDC. Latency

Page 19: N10-005-By BawlsDeep

D. Signal strength

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 56A senior technician is inspecting a junior technician's created patch cables. There is a visible space betweenthe ends of the copper wiring and the top of the plastic at each end of the cables.

232 Which of the following is the reason these cables cannot be used?

A. Bad connectorsB. Open shortsC. UTPD. EMI

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 57Which of the following ports does DHCP use? (Select TWO).

A. 22B. 23C. 67D. 68E. 69

Correct Answer: CDSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 58Which of the following BEST describes the purpose of DHCP?

A. DHCP is used to filter web traffic based on content restrictions.B. DHCP is used to detect unauthorized traffic on a network.C. DHCP is used to aggregate secure connections into a private network.D. DHCP is used to assign IP addresses to clients upon request.

Correct Answer: DSection: (none)Explanation

Page 20: N10-005-By BawlsDeep

Explanation/Reference:Explanation:

QUESTION 59A company wants to implement a wireless encryption method, but wants the key to be a simple

233 phrase so they can easily allow visitors to connect. Which of the following wireless encryption methods shouldthey employ?

A. WPAB. WPA2 EnterpriseC. PKID. MS-CHAP

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 60Which of the following is an example of two-factor authentication?

A. A username and PINB. A username and passwordC. A username, password, finger print scan, and smart cardD. A username, password, and key fob number

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 61A distribution layer switch with an SC GBIC that has a fiber connection back to the core has gone bad andneeds to be replaced with a newer model and an LC GBIC. The fiber patch cable was replaced with a knowngood LC patch cable. After replacing the switch, the fiber connection shows no link. Which of the following isMOST likely the cause of the problem?

A. DB lossB. Incompatible GBICC. TXRX reversedD. Cross-talk

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

Page 21: N10-005-By BawlsDeep

234

QUESTION 62A network administrator is setting up an internal IIS server with a static IP address. When a user types the IPaddress for the IIS server into a web browser, it opens up to the printer configuration page. Which of thefollowing is MOST likely the cause?

A. Wrong default gatewayB. Wrong subnet maskC. Duplicate IP addressD. VLAN assignment

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 63A technician is configuring a multi-layer switch. In order to prevent switch looping in the future, which of thefollowing should the technician configure?

A. STPB. VLANC. QoSD. PoE

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 64Which of the following has a rated MAXIMUM speed of 100Mbps?

A. CAT3B. CAT5C. CAT5eD. CAT6

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

235

QUESTION 65A technician is configuring a wireless network. The technician would like to add multiple WAPs. Which of thefollowing should the technician ensure during setup?

Page 22: N10-005-By BawlsDeep

A. Make sure the WAPs use different frequencies.B. Disable SSID broadcast on all of the WAPs.C. Make sure WAPs channels do not overlap.D. Make sure WAPs are using the same channels.

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 66A technician is getting ready to install a WLAN in a warehouse. Which of the following will MOST likelydetermine the WAP placement?

A. Antenna typesB. SSID broadcastC. VTP configurationD. Channels

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 67A network administrator has installed and connected a new VoIP phone to a network jack. The phone iscurrently powered off. Which of the following allows the phone to power on when the network administratorenables its switch port?

A. SIPB. Plain Old Telephone Service (POTS)C. QoSD. PoE

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

236

QUESTION 68A business is expanding and has purchased a new building across the street. To cut costs, the new building willbe connected via a wireless bridge. Which of the following antenna types is BEST suited for this scenario?

A. DipoleB. IsotropicC. DirectionalD. Omni-directional

Page 23: N10-005-By BawlsDeep

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 69Which of the following IEEE standards use the same frequency? (Select TWO).

A. 802.11aB. 802.11bC. 802.11eD. 802.11gE. 802.11i

Correct Answer: BDSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 70A user is not able to connect to 802.11n WAP. The user has an 802.11g WLAN card and has connected toother 802.11n networks. Which of the following is MOST likely the reason the user is unable to connect?

A. WAP is set to use only the 2.4 GHz frequency.B. WAP is set to use "N only".C. WAP encryption is using WEP 128.D. WAP has MAC filtering disabled.

237

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 71Which of the following connector types is associated with RS-232?

A. MTRJB. DB-9C. RJ-11D. BNC

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

Page 24: N10-005-By BawlsDeep

QUESTION 72A user is receiving a lot of static on a cordless phone after the installation of the Wi-Fi network. Which of thefollowing is MOST likely causing the static?

A. SSID broadcastB. Encryption typeC. LatencyD. Interference

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 73A small office would like to have a physical cable run from one office to another. Which of the following shouldthe technician consider FIRST?

A. CostB. WirelessC. DistanceD. Connector type

238

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 74Which of the following options would need to be configured on a DHCP server to boot from the network?

A. DNS ServerB. Proxy ServerC. TFTP ServerD. NTP Server

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 75A customer reports a network patch cable was unplugged from a switch and plugged back into an availableswitch port. The switch's activity lights have been lit up constantly and network response times are extremelyslow. Which of the following issues is MOST likely occurring?

A. Switching LoopB. DDoS Attack

Page 25: N10-005-By BawlsDeep

C. Mismatched MTUD. Port Mirroring

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 76Some of the computers connected to switches with CAT6 cables have slow performance. The cable runs weretested and the lengths were found to be between 30 meters (98 feet) to 160 meters (524 feet). Which of thefollowing is the cause of the issue?

A. VLAN assignmentB. TX/RX reversed

239 C. CollisionsD. DB loss

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 77Which of the following connectors are used on coaxial cable?

A. STB. LCC. BNCD. DB-9

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 78Which of the following can a technician increase on an antenna to create a larger cell size in a WLAN?

A. AttenuationB. BandwidthC. LengthD. Gain

Correct Answer: DSection: (none)Explanation

Page 26: N10-005-By BawlsDeep

Explanation/Reference:Explanation:

QUESTION 79How many pairs of CAT5e wires are used for data with 1000BaseT?

A. 2B. 4C. 6

240 D. 8

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 80Which of the following should be utilized to reduce null zones?

A. SSID broadcastingB. DiversityC. WPAD. Horizontal polarization

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 81Which of the following can be done to increase a wireless LAN cell size?

A. Add a higher gain omni antennaB. Add diversity antennasC. Add a higher gain yagi antennaD. Increase the PoE wattage

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 82RADAR can cause interference with which of the following technologies?

A. WiMAXB. 802.11iC. 802.11n

Page 27: N10-005-By BawlsDeep

D. Bluetooth241

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 83A technician wants to implement the MOST secure method of wireless encryption. Which of the followingtechnologies should be implemented?

A. WPA PSKB. WPA EnterpriseC. WPA2 EnterpriseD. WPA2 PSK

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 84Which of the following Ethernet technologies has the LONGEST distance possible?

A. 1000BaseLXB. 1000GBaseSRC. 1000BaseSXD. 1000BaseT

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 85Which of the following is considered an Exterior Gateway Protocol (EGP)?

A. BGPB. IGRPC. RIPD. OSPF

Correct Answer: ASection: (none)Explanation

Explanation/Reference:242

Page 28: N10-005-By BawlsDeep

Explanation:

Topic 8, Volume H

QUESTION 86IPv6 routing occurs at which of the following OSI model layers?

A. Layer 2B. Layer 3C. Layer 4D. Layer 5

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 87At which of the following layers of the OSI model does Media Access Control reside?

A. Layer 1B. Layer 2C. Layer 3D. Layer 7

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 88Routers are used instead of Layer 2 switches to separate which of the following?

A. Collision DomainsB. Link StatesC. Distant VectorsD. Broadcast Domains

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

243

QUESTION 89A power failure caused a router to reboot. Now users are not able to reach remote networks.Which of the following is the MOST likely cause?

A. The dynamic NAT tables were erased by the reset.

Page 29: N10-005-By BawlsDeep

B. The DNS server setting on the workstations are incorrect.C. MAC entries in the ARP table were not saved.D. A technician did not save the running configuration.

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 90A computer on VLAN 10 with the IP address of 192.168.1.45/27 cannot ping a computer on VLAN 20 with theIP address of 192.168.1.65/27. Which configuration change will allow the PING to be successful?

http://www.gratisexam.com/

A. Replace the router with a Layer 2 switch that supports VLANsB. Change VLAN 20 computers Default Gateway to 192.168.1.127/27C. Change VLAN 10 computers Default Gateway to 192.168.1.32/27D. AllowICMP to pass through the Router

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 91Which of the following would be the BEST IDS topology for monitoring one specific device?

A. Signature-basedB. Network-basedC. Host-basedD. Behavior-based

244

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 92At which of the following layers of the OSI model do frames exist?

A. Application

Page 30: N10-005-By BawlsDeep

B. NetworkC. TransportD. Data Link

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 93Which of the following protocols could be used to transfer files to a remote site? (Select TWO).

A. FTPB. DHCPC. DNSD. TelnetE. SCP

Correct Answer: AESection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 94Which of the following technologies is considered to be cell-switched?

A. ISDNB. Frame RelayC. ATMD. DSL

Correct Answer: CSection: (none)Explanation

Explanation/Reference:245

Explanation:

QUESTION 95Users at a company are happy to find out that a large basket has been placed in the reception area withcompany branded flash drives. This is an example of which the following?

A. War chalkingB. Distributed denial of service attackC. Man in the middle attackD. Social engineering

Correct Answer: DSection: (none)

Page 31: N10-005-By BawlsDeep

Explanation

Explanation/Reference:Explanation:

QUESTION 96The Chief Information Officer (CIO) is unable to send or receive email and has asked the network administratorto resolve the email problem. Which of the following should the network administrator do NEXT?

A. Establish a plan of action to resolve the problemB. Gather additional informationC. Escalate to a senior network administratorD. Document the problem and proposed solution

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 97Which of the following uses port 53 by default?

A. RDPB. QoSC. DHCPD. DNS

246

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 98Which of the following technologies will help reduce carbon footprints?

A. Uninterrupted power suppliesB. CRT monitorsC. Virtual serversD. Hosted servers

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 99A technician has disabled ICMP on a server. Which of the following will continue to function for the purpose oftroubleshooting connectivity on the server?

Page 32: N10-005-By BawlsDeep

A. telnetB. pingC. arpD. tracert

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 100Which of the following components is used to connect to a smart jack?

A. RJ-11 modular plugB. RJ-45 modular plugC. BNC connectorD. F-connector

Correct Answer: BSection: (none)Explanation

Explanation/Reference:247

Explanation:

QUESTION 101Which of the following is the MAXIMUM rated throughput of 10BaseT?

A. 10GbpsB. 10GHzC. 10MbpsD. 10MHz

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 102A customer wants to have several internal services hosted on multiple servers, all of which need to be availableto the Internet through a single public IP address. Which of the following would need to be configured?

A. QoSB. PoEC. PATD. VLAN

Correct Answer: CSection: (none)

Page 33: N10-005-By BawlsDeep

Explanation

Explanation/Reference:Explanation:

QUESTION 103Which of the following BEST explains the purpose of a DHCP server?

A. Moves packets between different subnets within a local area network.B. Intrusion detection and prevention based on network activity and heuristicsC. Assigns IP addresses to clients based on a pool of available addressesD. Allows for a client to securely connect to a network from the Internet

Correct Answer: CSection: (none)Explanation

Explanation/Reference:248

Explanation:

QUESTION 104Which of the following WAN technologies will vary in bandwidth depending on the amount of traffic in the localarea on the same provider?

A. SatelliteB. CableC. T1D. DSL

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 105Which of the following would provide the ability to have a pool of web servers provide content as users visit thewebsite's single domain name?

A. Protocol analyzerB. Load balancerC. Content filterD. Channel bonding

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 106Which of the following provides the use of a secure tunnel for telecommuting without manually installing and

Page 34: N10-005-By BawlsDeep

configuring encryption software?

A. RDPB. SSL VPNC. ISAKMPD. TLS 2.0

249

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 107Which of the following is based ENTIRELY on using ICMP packets?

A. Social engineeringB. NMAPC. Buffer overflow attackD. Smurf attack

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 108Which of the following could be used to stop unknown threats?

A. DMZB. Signature based IPSC. Behavior based IPSD. Honeypots

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 109Which of the following describes a DNS server?

A. Translates an IP address to a nameB. Caches commonly viewed web pagesC. Assigns IP addresses to network devicesD. Provides port security for a network

Correct Answer: ASection: (none)

Page 35: N10-005-By BawlsDeep

Explanation

Explanation/Reference:Explanation:

250

QUESTION 110A technician is troubleshooting a problem with a network printer. The technician thinks the network printer is outof paper and ink. Which of the following should the technician do NEXT?

A. Implement the solutionB. Question usersC. Test the theoryD. Escalate the problem

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 111A company has just installed wireless in their office. In one corner of the office building users are not able toestablish a connection. Which of the following can be changed on the AP to help resolve this issue?

A. SSIDB. ChannelsC. Signal strengthD. Encryption

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 112Which of the following cable types have a rated MAXIMUM bandwidth of 100Mbps?

A. CAT3B. CAT5C. CAT5eD. CAT6

251

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 113

Page 36: N10-005-By BawlsDeep

A company has installed an access point and configured it to broadcast at 802.11n only. Some users arestating that they cannot connect to this access point. Which of the following is the MOST likely reason someusers cannot connect?

A. Incorrect channelB. Weak encryptionC. Incompatible NICsD. Incorrect SSID

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 114Which of the following will allow multiple frequencies to be combined?

A. WiMAXB. MPLSC. MIMOD. Channel bonding

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 115Which of the following technologies is required to allow all ports of a single private IP to be publically accessiblevia a single public IP?

A. NATB. RIPC. PATD. ACL

252

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 116Which of the following allows a technician to gather information about the operating system?

A. Domain servicesB. FingerprintingC. CountermeasuresD. Reconnaissance

Page 37: N10-005-By BawlsDeep

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 117Which of the following is indicative of an FTP bounce?

A. Arbitrary IP addressB. Reverse DNS lookupsC. Same Port NumberD. File Transfer Success

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 118The software that allows a machine to run multiple operating systems at once is called the:

A. server managerB. hypervisorC. boot loaderD. partition manager

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

253

QUESTION 119Which of the following routing protocols relies on hop count as its ONLY metric?

A. BGPB. EIGRPC. OSPFD. RIP

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 120

Page 38: N10-005-By BawlsDeep

A workstation on the network is configured as follows. A user reports that they are unable to print to a devicelocated on a different subnet. Which of the following is the MOST likely problem?

IP address: 172.16.204.12

Subnet Mask: 255.255.0.0

Default Gateway: 172.15.204.254

DNS address: 172.16.204.1

Broadcast address: 172.16.255.255

A. DNS addressB. Subnet maskC. Default gatewayD. Broadcast addressE. IP address

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 121254 A technician recently fixed a computer with several viruses and spyware programs on it and notices the Internetsettings were set to redirect all traffic through an unknown proxy. This type of attack is known as which of thefollowing?

A. PhishingB. Social engineeringC. Man-in-the-middleD. Shoulder surfing

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 122Which of the following is the BEST way to mitigate security threats on a network?

A. Social engineeringB. User trainingC. Incident responseD. Man-in-the-middle

Correct Answer: BSection: (none)Explanation

Page 39: N10-005-By BawlsDeep

Explanation/Reference:Explanation:

QUESTION 123Which of the following devices should be installed on a network to monitor the presence of and actively defendagainst attacks?

A. An IPSB. A protocol analyzerC. A traffic shaperD. An IDS

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 124255 Which of the following is an IPv6 address?

A. 00:14:38:05:7B:E5B. 10.10.1.1C. 192.168.1.1D. 2001:cdba::3257:9652

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 125A company has a large number of employees that need VPN access from home. Which of the following is theBEST solution for deploying and managing the remote access?

A. Site-to-site VPNB. Network-based firewallC. SSL VPND. Host-based firewall

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 126Which of the following is a routed protocol that functions at layer 3 of the OSI model?

A. IP

Page 40: N10-005-By BawlsDeep

B. Frame relayC. PPPD. ADSL

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 127Something you have, something you are, and something you know are the three tenets of:

256

A. social engineeringB. change managementC. remote accessD. access control

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 128A firewall that operates at Layer 7 of the OSI model is known as a(n):

A. circuit gatewayB. packet filterC. application levelD. redundant firewall

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 129Which of the following allows a central point to simultaneously address other points without addressing all ofthem?

A. MulticastB. SubnettingC. UnicastD. Broadcast

Correct Answer: ASection: (none)Explanation

Page 41: N10-005-By BawlsDeep

Explanation/Reference:Explanation:

QUESTION 130Which of the following technologies is used on cellular networks?

A. Ethernet257

B. CDMAC. CSMA/CAD. POTS

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 131Which of the following WAP security features offers the STRONGEST encryption?

A. WPAB. WPA2C. WEPD. Hidden SSID

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 132Which of the following standards can operate at both the 2.4GHz and 5GHz frequencies?

A. 802.11aB. 802.11bC. 802.11gD. 802.11n

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 133Which of the following mediums is circuit switched?

A. PSTNB. ATM

Page 42: N10-005-By BawlsDeep

C. Frame relay258

D. MPLS

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 134Which of the following is true about tunneling and encryption?

A. SIP encrypts all data going through the tunnel.B. PPTP creates a secure tunnel.C. SSL VPN provides a secure tunnel.D. RAS is a secure way to create a tunnel.

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 135Which of the following is a secure way to connect to a device?

A. RSHB. TFTPC. SNMPv2D. SFTP

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 136Which of the following connector types would Sandy, a network technician, use to connect a serial cable?

A. RJ-11B. BNCC. LCD. DB-9

259

Correct Answer: DSection: (none)Explanation

Explanation/Reference:

Page 43: N10-005-By BawlsDeep

Explanation:

QUESTION 137Which of the following are network topologies? (Select TWO).

A. EthernetB. DuplexC. StarD. CircularE. Bus

Correct Answer: CESection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 138Which of the following uses eight groups of characters for addressing?

A. MACB. IPv4C. IPv6D. DHCP

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 139A pest control contractor attempts to gain access to the datacenter; however, the manager on duty notes that apest control inspection was not on the schedule. Which of the following attacks is in progress?

A. PhishingB. Social engineeringC. Man-in-the-middleD. Smurfing

260

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 140Which of the following is the MOST economical way for Sandy, a technician, to implement 10- Gigabit Ethernetat a datacenter?

A. 10GBaseLR

Page 44: N10-005-By BawlsDeep

B. 10GBaseSRC. 10GBaseXD. 10GBaseT

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 141Which of the following is the network topology in which computers connect in a closed circle?

A. BusB. MeshC. RingD. Star

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 142Which of the following protocols would Kurt, a technician, use to synchronize local date and time of a clientworkstation to that of a server?

A. RTPB. NTPC. TFTPD. ARP

261

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 143An administrator is replacing an existing WAP because the customer is reporting that the connection speedsare too slow. Which of the following should be installed?

A. 802.11aB. 802.11bC. 802.11gD. 802.11n

Correct Answer: DSection: (none)Explanation

Page 45: N10-005-By BawlsDeep

Explanation/Reference:Explanation:

QUESTION 144Which of the following cables has the MOST twists per inch?

A. CAT3B. CAT5C. CAT5eD. CAT6

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 145Which of the following is true about an IP address if the first bit is a one and the second bit is a zero?

A. The address is a Class A address.B. The address is a Class B address.C. The address is a Class C address.D. The address is a Class D address.

262

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 146Which of the following cables is MOST likely to be terminated into a patch panel?

A. SerialB. RG-6C. RG-59D. CAT6

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 147Which of the following MUST be kept synchronized in order for Kerberos to work?

A. CertificateB. Ticket

Page 46: N10-005-By BawlsDeep

C. TimeD. Token

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 148Which of the following MUST be used when securing a VoIP network consisting of private IP addresses?

A. IPSB. Application layer firewallC. IDSD. An unmanaged switch

Correct Answer: BSection: (none)Explanation

Explanation/Reference:263

Explanation:

QUESTION 149Which of the following uses certificates as a form of security?

A. KerberosB. LDAPC. PKID. CHAP

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 150Which of the following cables will MOST likely be used to connect to a satellite dish?

A. RG-6B. CAT5eC. FiberD. CAT6

Correct Answer: ASection: (none)Explanation

Explanation/Reference:

Page 47: N10-005-By BawlsDeep

Explanation:

QUESTION 151A VoIP line will MOST likely have which of the following connectors?

A. RJ-11B. DB-25C. BNCD. RJ-45

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

264

QUESTION 152Which of the following is a proprietary routing protocol?

A. RIPB. EIGRPC. OSPFD. BGP

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 153Which of the following is an invalid MAC address?

A. AA:CE:58:FD:90:08B. 44:98:3E:F8:33:23C. 56:AD:BX:89:55:54D. 94:9E:FE:EE:8C:DF

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 154Which of the following network topologies allows only communication to take place from one node at a time bypassing a token around the network?

A. StarB. Mesh

Page 48: N10-005-By BawlsDeep

C. BusD. Ring

Correct Answer: DSection: (none)Explanation

Explanation/Reference:265

Page 49: N10-005-By BawlsDeep

Exam B

QUESTION 1Which of the following can be configured to restrict specific ports and IP addresses from accessing the internalnetwork? (Select TWO).

A. Layer 2 switchB. MAC address filteringC. ACLsD. IIS serverE. Port scannerF. Firewall

Correct Answer: CFSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 2Which of the following authentication solutions also provides AAA and uses TCP?

A. TACACS+B. KerberosC. RADIUSD. RAS

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 3Which of the following would be used to test out the security of a specific network by allowing it to receivesecurity attacks?

A. HoneynetB. HoneypotC. Vulnerability scannerD. Network based IDS

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:

2

QUESTION 4The protocols that use a three way handshake to transfer information can be found within which layer of theOSI model?

Page 50: N10-005-By BawlsDeep

A. Layer 2B. Layer 3C. Layer 4D. Layer 5

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 5Which of the following separates broadcast domains?

A. Port mirroringB. RouterC. ConvergenceD. Switch

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 6Which of the following would Kim, a technician, do to monitor remote traffic through an access point?

A. Enable an SNMP agentB. Enable network mappingC. Set monitoring SSIDD. Select WPA2

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 7Which of the following commands can Lisa, a technician, use on a server to display the default router setting?

A. pingB. nslookupC. routeD. arp

Correct Answer: CSection: (none)Explanation

Page 51: N10-005-By BawlsDeep

Explanation/Reference:Explanation:

QUESTION 8Which of the following commands can Lisa, a network technician, use to check whether the DNS server for agiven domain is reachable?

A. nmapB. nbtstatC. digD. arp

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 9Which of the following could Kim, a network technician, use to find the approximate location of a break in a longnetwork cable?

A. Protocol analyzerB. Time domain reflectometerC. Toner probeD. Multimeter

Correct Answer: BSection: (none)Explanation

Explanation/Reference:4

Explanation:

QUESTION 10Which of the following protocols is commonly used for VoIP technology?

A. TelnetB. SMTPC. SIPD. SNMP

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 11Which of the following can Jeff, a technician, modify on an 802.11n router that is not available as an option onan 802.11g device?

Page 52: N10-005-By BawlsDeep

A. SSIDB. EncryptionC. ChannelsD. Spectrum

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 12Which of the following technologies could be implemented to improve call clarity when using VoIP technology?

A. Static IP addressingB. Caching enginesC. QoSD. Port forwarding

Correct Answer: CSection: (none)Explanation

Explanation/Reference:5

Explanation:

QUESTION 13When using high bandwidth applications over multiple WAN connections, which of the following should beused?

A. Static IP addressingB. Half-duplexC. PoE devicesD. Load balancing

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 14When Jeff, a technician, is troubleshooting a problem, which of the following is the NEXT step after verifying fullsystem functionality?

A. Establish a plan of action to resolve the problem and identify potential effects.B. Implement the solution.C. Establish a theory of probable cause.D. Document findings, actions, and outcomes.

Page 53: N10-005-By BawlsDeep

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 15Kim, a network technician, is troubleshooting a problem and has just established a plan of action to resolve theproblem. Which of the following is the NEXT step in the troubleshooting methodology?

A. Verify full system functionality and if applicable implement preventative measures.B. Implement the solution or escalate as necessary.C. Document findings, actions, and outcomes.D. Establish a theory of probable cause (e.g. question the obvious).

6

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 16Lisa, a technician, is troubleshooting a cable problem. She has checked both ends and suspects an issue 50yards (46 meters) from the location. Which of the following network tools will confirm this analysis?

A. TDRB. Protocol analyzerC. MultimeterD. Cable crimper

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 17A switch in IDF 3 has shut down at 3 p.m. everyday this week. Which of the following network tools should Kim,a technician, use to troubleshoot this problem?

A. Environmental monitorB. Cable testerC. TDRD. Loopback plug

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:

Page 54: N10-005-By BawlsDeep

QUESTION 18Which of the following ports would Zach, a technician, need to open on a firewall to allow SSH on the defaultport?

A. 20B. 21C. 22

7D. 23

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 19Which of the following ports is the default telnet port?

A. 20B. 21C. 22D. 23

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 20Which of the following tools would Lisa, a technician, BEST use to trace a wire through an area where multiplewires of the same color are twisted together?

A. Cable testerB. Toner probeC. Cable crimperD. Punch down tool

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 21Which of the following DNS records would a web browser access to determine the IP address of an Internetweb page?

A. CNAMEB. A

Page 55: N10-005-By BawlsDeep

C. MX8

D. PTR

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 22Which of the following is used to prevent Layer 2 switching loops within a local area network?

A. STPB. MTUC. EGPD. IGP

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 23A bridge handles frames at which of the following layers of the OSI model?

A. NetworkB. SessionC. TransportD. Data Link

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 24Which of the following is a method to prioritize network traffic coming from VoIP phones?

A. PATB. DNSC. SIPD. QoS

9

Correct Answer: DSection: (none)Explanation

Explanation/Reference:

Page 56: N10-005-By BawlsDeep

Explanation:

QUESTION 25Kim, a technician, is installing a switch that does not feature auto-negotiation. Which of the followingcharacteristics would need to be manually configured? (Select TWO).

A. MAC addressingB. IP addressingC. Port speedD. IPv6 addressingE. Duplex

Correct Answer: CESection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 26Zach, a technician, is checking newly installed CAT5e cabling, and suspects that some of the ends were notproperly terminated. Which of the following tools will verify this?

A. Cable testerB. Toner probeC. OTDRD. Loopback plug

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 27Which of the following technologies allows for redundant links within a Layer 2 segment?

A. OSPFB. RIPC. Port MirroringD. Spanning Tree

10

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 28A company is about to install a second network connection with a new ISP. Which of the following routingprotocols is the BEST choice?

A. IS-IS

Page 57: N10-005-By BawlsDeep

B. BGPC. OSPFD. RIP

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 29Which of the following BEST describes a switch port?

A. Broadcast domainB. Distance vectorC. Link stateD. Collision domain

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 30Jeff, a user, is having a problem with a POTS line. Which of the following tools would Jeff use to make sure thephone lines have a dial tone?

A. Loopback plugsB. Butt setC. Cable certifierD. Toner probe

11

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 31Which of the following can Jeff, a network technician, change to help limit war driving?

A. Signal strengthB. SSIDC. FrequencyD. Channel

Correct Answer: ASection: (none)Explanation

Page 58: N10-005-By BawlsDeep

Explanation/Reference:Explanation:

QUESTION 32In which of the following wireless standards is MIMO used?

A. 802.11aB. 802.11bC. 802.11gD. 802.11n

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 33Which of the following utilities would Kim, a technician, use to resolve the FQDN of a web server to its IPaddress?

A. netstatB. routeC. nslookupD. arp

Correct Answer: CSection: (none)Explanation

Explanation/Reference:12

Explanation:

QUESTION 34Two WAPs are positioned with overlapping coverage, but seamless roaming across them is not working. Whichof the following should be checked?

A. WPA should be enabledB. PKI should be turned offC. WAP SSIDs are matchingD. WAPs are transmitting on same channel

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 35Which of the following is the usual number of bits for the host identifier part of an IPv6 address?

Page 59: N10-005-By BawlsDeep

A. 16B. 32C. 48D. 64

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 36Which of the following is the prefix for a link-local IPv6 address?

A. FE80::/10B. FF00::/8C. 2FFE::/16D. FEEF:/12

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:

13

QUESTION 37Which of the following layers of the OSI model maps to the Network Interface layer of the TCP stack? (SelectTWO).

A. PhysicalB. SessionC. Data LinkD. NetworkE. Transport

Correct Answer: ACSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 38Which of the following could Kim, a network technician, use to inspect connection setup, request, and responseheaders for users connecting to a web server?

A. nbtstat commandB. dig commandC. ipconfig commandD. Protocol analyzer

Page 60: N10-005-By BawlsDeep

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 39DNS lookups for a given host are intermittently failing. Which of the following would Kim, a technician, MOSTlikely use to verify this problem?

A. arpB. nbtstatC. tracerouteD. dig

14

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 40Which of the following would be used to identify terminations in a punch block for which the wiring diagram hasbeen lost?

A. OTDRB. Protocol analyzerC. Toner probeD. TDR

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 41Which of the following address blocks would MOST likely be blocked from crossing a border router?

A. 8.0.0.0/8B. 172.16.0.0/12C. 122.0.0.0/24D. 248.0.0.0/8

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 42

Page 61: N10-005-By BawlsDeep

Which of the following would Jeff, a technician, MOST likely use to remotely verify port configuration of aswitch?

A. traceroute commandB. SNMP monitorC. nbtstat command

15D. dig command

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 43Lisa, a user, reports increased delays and timeouts when trying to reach several Internet sites. Which of thefollowing would MOST likely be used when investigating the problem at Lisa's workstation?

A. nslookupB. routeC. nbtstatD. arp

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 44Which of the following performance optimization techniques would be MOST beneficial for a network-wide VoIPsetup? (Select TWO).

A. Proxy serverB. Traffic shapingC. Caching enginesD. Load balancingE. Quality of service

Correct Answer: BESection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 45Kim, a network administrator, should consult which documentation sources FIRST to determine the cause ofrecent network issues?

16

A. Network map

Page 62: N10-005-By BawlsDeep

B. Cable managementC. Change managementD. Asset management

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 46Lisa, a network technician, is attempting to map a FQDN to an internal server at the address of 10.0.0.15without NAT/PAT. Which of the following is the reason this will ultimately not work?

A. This is a private address which cannot be seen by external users.B. The address does not have the appropriate subnet mask assigned.C. This is a public address which can only be seen by internal users.D. This is a private address which can only be seen by external users.

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 47Zach, a network technician, is troubleshooting signal problems with certain WAPs in an office and findsconsistently high ping times across the units. Such an issue is called which of the following?

A. LatencyB. AttenuationC. CrosstalkD. Frequency hopping

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 48Jeff, an end user, has plugged in both ends of the same network cable to two adjacent jacks. Both ports areconnected to the same switch in the IDF. Which of the following will MOST likely happen?

17

A. VLAN malfunctionB. Broadcast stormC. Quality of Service lossD. Duplicate IP addresses

Correct Answer: B

Page 63: N10-005-By BawlsDeep

Section: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 49Which of the following is the broadcast address for a network defined as 192.168.0.0/24?

A. 192.168.0.255B. 192.168.0.1C. 192.168.0.0D. 192.168.0.253

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 50Which of the following protocols is used to securely connect to a multi-layer switch?

A. HTTPB. SMTPC. SSHD. Telnet

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 51Which of the following ports would have to be allowed through a firewall to allow SNMP traffic to pass on itsdefault port? (Select TWO).

A. 2218

B. 23C. 143D. 161E. 162F. 8080

Correct Answer: DESection: (none)Explanation

Explanation/Reference:Explanation:

Page 64: N10-005-By BawlsDeep

QUESTION 52Zach, a technician, wants to test a laptop's NIC for functionality but has no other networking equipment toattach it to. Which of the following would allow him to test basic functionality of the NIC?

A. Loopback plugB. Protocol analyzerC. Smart jackD. Coupler

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 53Which of the following BEST describes how a layer 2 switch functions?

A. Switches packets within the same subnet based on MAC addressesB. Switches packets between different subnets based on IP addressesC. Switches packets between different subnets based on MAC addressesD. Switches packets within the same subnet based on IP addresses

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 54A mobile user is no longer able to access network resources. Jeff, the network technician, is unable to ping theuser's workstation. Which of the following commands would MOST likely be

19

used on that workstation to verify its current network settings?

A. net shareB. hostnameC. ipconfigD. tracert

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 55Lisa, a technician, is tasked to monitor various analog POTS lines for voice activity. Which of the followinghardware tools would be used?

A. Butt set

Page 65: N10-005-By BawlsDeep

B. Toner probeC. Wire mapperD. Cable certifier

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 56An analog POTS voice line is no longer working and Kim, the technician, is tasked to verify if a dial tone ispresent at the IDF. Which of the following tools would be used?

A. Protocol analyzerB. Butt setC. OTDRD. Toner probe

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 5720

Which of the following hardware tools would MOST likely be used to verify Layer 1 connectivity?

A. MultimeterB. Loopback plugC. Cable certifierD. CAT3 coupler

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 58Which of the following properties of DHCP would Lisa, a technician, use to ensure an IP address is not leasedout from the active scope?

A. ReservationsB. Lease timesC. Removing IPs from the active leasesD. Configuring the DNS options

Correct Answer: ASection: (none)

Page 66: N10-005-By BawlsDeep

Explanation

Explanation/Reference:Explanation:

QUESTION 59Which of the following is needed to allow DHCP to route to a different network separated by a Layer 3 device?

A. DNS suffixesB. DHCP relay agentC. Static IP addressingD. Scope configuration

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 6021

A new user is reporting connectivity issues. Zach, the network technician, notices that there is no link light onthe user's NIC. Which of the following would be used to verify the wiring back to the patch panel?

A. Butt setB. Cable certifierC. Toner probeD. Snips

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 61A user has no network connectivity. Jeff, the network technician, is unable to locate the CAT5e cable from theuser at the IDF. Which of the following tools would be used to assist Jeff in locating the CAT5e cable?

A. Butt setB. Punch down toolC. Toner probeD. Protocol analyzer

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 62Kim, a network technician, needs to configure a port on a switch to provide connectivity and electrical support to

Page 67: N10-005-By BawlsDeep

a WAP being installed in a warehouse. Which of the following features needs to be configured on the switch?

A. STPB. PoEC. VTP trunkingD. Port forwarding

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

22

QUESTION 63Zach, a network technician, is unable to remotely manage or ping certain layer 2 switches. To manage thosedevices remotely, which of the following will MOST likely need to be configured?

A. IP address on the native VLAN interfaceB. Port securityC. Port forwardingD. IP address on the fiber interface

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 64Which of the following methods for network performance optimization is used to distribute traffic among similardevices?

A. Fault toleranceB. QoSC. Proxy serverD. Load balancing

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 65Which of the following describes a rationale for a network with redundant paths?

A. VPN compatibilityB. Unified communications implementationC. High availability requirementD. QoS

Page 68: N10-005-By BawlsDeep

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

23

QUESTION 66Lisa, a network technician, needs to introduce a few more cables to the existing patch panel.Which of the following tools would she use?

A. OTDRB. MultimeterC. Punch down toolD. Temperature monitor

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 67Which of the following is an example of a DHCP failover mechanism?

A. APIPAB. Inactive leaseC. ReservationsD. Active lease

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 68Jeff, a network technician, is installing a wireless router. Which of the following should Jeff consider to get theBEST signal strength?

A. WAP placementB. PoE devicesC. MAC filteringD. Encryption type

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:

Page 69: N10-005-By BawlsDeep

24

QUESTION 69Lisa, a network technician, is troubleshooting a new wireless network that has been dropping connections. Shenotices another wireless network in the area. Which of the following BEST explains the reason for the droppedconnections?

A. LatencyB. SSID mismatchC. InterferenceD. Encryption type

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 70Which of the following limits the number of devices that can be assigned IP addresses by DHCP?

A. LeaseB. ReservationC. DNS settingD. Scope

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 71Which of the following has a maximum transfer rate of 54Mbps and operates at the 5GHz frequency?

A. 802.11aB. 802.11bC. 802.11gD. 802.11n

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:

25

QUESTION 72Which of the following is used to create a secure connection between a client and a host?

A. VLAN

Page 70: N10-005-By BawlsDeep

B. Proxy serverC. IIS serverD. VPN

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 73Which of the following devices is used to distribute network traffic equally over multiple links?

A. Content filterB. DNS serverC. Load balancerD. Proxy server

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 74Which of the following is used to restrict access according to user policies?

A. Content filterB. DHCP serverC. DNS serverD. VPN concentrator

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:

26

QUESTION 75Which of the following is used to filter outgoing network requests?

A. Proxy serverB. VPN concentratorC. DHCP serverD. IIS server

Correct Answer: ASection: (none)Explanation

Page 71: N10-005-By BawlsDeep

Explanation/Reference:Explanation:

QUESTION 76Kim, a technician, needs to locate a cable in an unorganized wiring closet. Which of the following tools will helpher locate the cable?

A. Protocol analyzerB. Cable testerC. Toner probeD. Punch down tool

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 77Zach, a technician, needs to terminate a CAT5e Ethernet cable to a 110 block. Which of the following toolsshould he use?

A. Toner probeB. Punch downC. Wire testerD. Crimper

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

27

QUESTION 78A user snapped the retention tab off of a network cable. Which of the following tools would Jeff, a technician,use to replace the RJ-45 connector?

A. Wire testerB. Punch downC. CrimperD. Multimeter

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 79There is suspected virus activity on the network. Which of the following would Lisa, a technician, use to studynetwork traffic?

Page 72: N10-005-By BawlsDeep

A. Protocol analyzerB. Cable testerC. Cable certifierD. Environmental monitor

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 80Kim, a network technician, is installing an 802.11n network. Which of the following should Kim enable to ensurethat the network only allows 802.11n clients?

A. Name the SSID on the 802.11n network onlyB. Limit the DHCP address poolC. Disable 802.11b and 802.11gD. Only use WPA encryption

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

28

QUESTION 81Zach, a technician, is installing an 802.11n network. Which of the following should he disable to stopbroadcasting the network name?

A. ChannelB. WEPC. SSIDD. WPA

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 82Zach, a network technician, has been troubleshooting a connectivity problem in the LAN room. He hasdiagnosed the problem and implemented a solution. Which of the following would be Zach's NEXT step?

A. Test the theoryB. Establish a plan of actionC. Establish a theoryD. Document findings

Page 73: N10-005-By BawlsDeep

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 83Which of the following network devices restricts traffic based on words, signatures, and URLs?

A. Layer 2 switchB. Content filterC. Load balancerD. Traffic analyzer

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

29

QUESTION 84Which of the following network devices hides network nodes behind one public IP address?

A. Layer 3 switchB. Content filterC. VPN serverD. Proxy server

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 85A VPN concentrator is used for which of the following purposes?

A. MAC filteringB. Content filteringC. Secure network accessD. Connectivity troubleshooting

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 86

Page 74: N10-005-By BawlsDeep

Jeff, a technician, has been asked to add a subnet to the company's LAN. Which of the following interfaces onthe router will be modified?

A. FastEthernet 0/0B. AUX 0C. Console 0D. Serial 0/0/0

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 8730

Lisa, a technician, has configured a new switch that is remotely accessed using SSH. The switch is workingproperly but cannot be accessed remotely. Which of the following items is MOST likely missing in theconfiguration?

A. Port speedB. CryptokeyC. Data VLAND. NAT/PAT

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 88Jeff, a technician, is setting up an IDS security device. Which of the following should be configured on theswitch to utilize the IDS?

A. PoEB. Port mirroringC. ConvergenceD. Port speed

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 89Kim, a technician, needs to monitor network traffic for bandwidth analysis because of slow Internet downloads.Which of the following protocols will the tool use to show the necessary information?

A. SNMPB. NTP

Page 75: N10-005-By BawlsDeep

C. SIPD. PPTP

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:

31

QUESTION 90Zach, a technician, suspects a duplicate IP address assignment on the network. Which of the followingresources can be used to verify this problem?

A. Network mapB. Environmental monitorC. Placement mapD. Syslog

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 91Kim, a user, on a wireless network reports an issue with network access while using a cordless phone. Whichof the following is the MOST likely cause?

A. Encryption typeB. Channel selectionC. Antenna placementD. Signal strength

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 92Which of the following 802.11n features allows for the use of multiple simultaneous frequencies in order toincrease usable bandwidth?

A. Channel bondingB. MIMOC. Spatial reuseD. 20MHz channel spacing

Correct Answer: ASection: (none)

Page 76: N10-005-By BawlsDeep

Explanation

Explanation/Reference:Explanation:

32

QUESTION 93Zach, a technician, discovers a switch is not communicating with the other switches in a stack.Which of the following is the MOST likely cause?

A. Both T568A and T568B standards are being used.B. STP is disabled.C. The cable is not a crossover.D. The port is not trunked.

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 94Jeff, a technician, needs multiple networks, high speeds, and redundancy on a system. Which of the followingconfigurations should Jeff consider for these requirements? (Select TWO).

A. Routing tableB. Next hopC. Port mirroringD. Port monitoringE. VLANs

Correct Answer: CESection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 95Lisa, a user, reports the network is down. While troubleshooting, a technician walks into a communicationscloset and notices a small patch cable with both ends plugged into interfaces on the same switch. Which of thefollowing is this an example of?

A. Switch loopB. Port bondingC. Virtual switchD. Port mirroring

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:

Page 77: N10-005-By BawlsDeep

33

QUESTION 96Kim, a user, cannot access the network using wireless. Which of the following is MOST likely the cause?

A. TXRX is reversedB. Faulty crossover cableC. Incorrect WEP keyD. A short in the cable pairs

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 97Zach, a user, is unable to print to a network. The cable tests good and the correct VLAN is configured on theswitch. Which of the following is MOST likely the cause?

A. The printer was configured for DHCP.B. The switch was configured for trunking.C. The printer was configured for duplexing.D. The switch was configured for PoE.

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 98Jeff, a technician, is charged with setting up network monitoring for critical devices in the network. It isimportant the information be sent securely to the monitoring station. Which of the following protocols willsupport secure transmission of the data?

A. SNMP v2B. VPNC. SYSLOGD. SMTP

34

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 99Which of the following network management tools can filter information from all data entering and leaving aspecific port on the switch?

Page 78: N10-005-By BawlsDeep

A. SNMP trapB. Bandwidth analyzerC. Network snifferD. Syslog server

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 100Lisa, a technician, decides to upgrade a router before leaving for vacation. While away, users begin to reportslow performance. Which of the following practices allows other technicians to quickly return the network tonormal speeds?

A. Change managementB. BaselinesC. Asset managementD. Cable management

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:

Topic 2, Volume B

QUESTION 101A Windows server has a problem after booting up. Kim, a technician, should immediately check the:

A. history logs.B. cron logs.

35C. application logs.D. system logs.

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 102Management has decided that they want a high level of security. They do not want Internet requests comingdirectly from users. Which of the following is the BEST recommendation?

A. Content filterB. Proxy serverC. Layer 3 switchD. Firewall

Page 79: N10-005-By BawlsDeep

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 103Jeff, a technician, was requested to change the wireless channel a WAP was operating on. Which of thefollowing would be a valid reason for the change?

A. InterferenceB. War drivingC. SSIDD. Frequency speeds

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 104A new wiring closet is setup to serve users in the east wing of a campus. Equipment is moved from the oldcloset, 50 feet (15 meters) away, and installed in the new closet. Users immediately begin reporting intermittentconnectivity issues with both corporate and Internet resources. Which of the following is the MOST likelycause?

36

A. Protocol mismatchB. MTU size was not increased for the new distanceC. Incorrect VLAN assignmentD. Incorrect cabling

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 105A small office has asked to have six PCs networked together by Jeff, a consultant. The office users want filesharing capability with no access to the Internet. Which of the following items will Jeff need? (Select TWO).

A. Network bridgeB. RG-59 patch cablingC. CAT5e patch cablingD. FirewallE. Switch

Correct Answer: CESection: (none)

Page 80: N10-005-By BawlsDeep

Explanation

Explanation/Reference:Explanation:

QUESTION 106Lisa, a consultant, is inspecting an office that reports frequent wireless issues. Upon scanning the networkbroadcasting in the vicinity of the office, seven SSIDs are found. The company's Wi-Fi network and three othersall share channel six. Which of the following is MOST likely causing the issue?

A. Frequency interferenceB. Low signal strengthC. Standard mismatchD. Incorrect channel

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:

37

QUESTION 107Jeff, a customer, has requested a solution to allow all internally and externally bound traffic to be monitored.Which of the following would allow a packet sniffer to do this?

A. A VPN client and VPN concentratorB. A smart jack installed for each network jackC. A managed switch with port mirroringD. A proxy server with content filter

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 108Which of the following DNS record types will be used for mail transfer if the MX record is not found?

A. CNAMEB. AC. PTRD. AAAA

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 109

Page 81: N10-005-By BawlsDeep

Jeff, a customer, wants to have wireless network access only in the conference room. He has placed a WAP inthe room, but notices that offices across the hall also receive a wireless signal. Which of the following could bedone together to solve this problem? (Select TWO).

A. Turn down the signal gain.B. Increase the encryption method.C. Change the wireless channel.D. Replace the WAP's antennas with directional antennas.E. Disable the SSID.

Correct Answer: ADSection: (none)Explanation

Explanation/Reference:Explanation:

38

QUESTION 110Jeff, a customer, shares a building with several other tenants. He reports that an unencrypted wireless networkhas been getting slower while his Internet traffic has steadily been increasing. Which of the following should beconfigured to resolve this problem?

A. VLANB. MTUC. WPAD. SSID

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 111Which of the following should Jeff, a technician, do FIRST when setting up a SOHO network?

A. Set up an account with an Internet service provider.B. Create a list of requirements and constraints.C. Arrange a domain name with a suitable registrar.D. Choose the correct operating system version.

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 112Which of the following issues is a common problem in wireless infrastructures?

A. Incorrect port number

Page 82: N10-005-By BawlsDeep

B. Mismatched SSIDsC. Invalid telnet sessionsD. Too many collisions

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

39

QUESTION 113Kim, a network administrator, is seeing workstations in building C authenticate to the building A wireless accesspoint. Which of the following would resolve this issue?

A. Change the security methodB. Reduce the transmission powerC. Change the SSIDD. Change the frequency

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 114Lisa, a user, is unable to access the Internet. The network administrator notices that the workstation has anAPIPA address. Which of the following is MOST likely not functioning correctly in this situation?

A. Broadcast addressB. Multicast addressC. DNSD. DHCP

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 115Zach, a network technician, is configuring several switches to be managed remotely. Which of the followingmust be configured to connect via SSH to each of those devices, as well as to retrieve various parameters?

A. PoE settings and VTP configurationB. SNMP configuration onlyC. IP address and SNMP configurationD. QoS and PoE settings

40

Page 83: N10-005-By BawlsDeep

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 116After a recent generator test, several users are reporting network connectivity issues. Jeff, the networktechnician, is unable to connect via SSH to the main switch. Which of the following is the MOST likely cause ofthe connectivity issue?

A. Faulty cableB. Misconfigured speed and duplexC. Wrong gatewayD. Power loss

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 117Lisa, the network technician, has been instructed to provide connectivity to workstations within a SOHO that isover 800 feet (243 meters) away from the main switch. Which of the following would she install to provideconnectivity?

A. CAT5eB. CAT6C. CoaxialD. Multimode fiber

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 118Which of the following DHCP options would need to be configured to ensure certain IP addresses within ascope are not leased out?

A. DNS IP address informationB. WINS IP address information

41C. SuperscopesD. Reservations

Correct Answer: DSection: (none)Explanation

Explanation/Reference:

Page 84: N10-005-By BawlsDeep

Explanation:

QUESTION 119During a disaster recovery test, several billing representatives need to be temporarily setup to take paymentsfrom customers. It has been determined that this will need to occur over a wireless network, with security beingenforced where possible. Which of the following configurations should be used in this scenario?

A. WPA2, SSID enabled, and 802.11n.B. WEP, SSID enabled, and 802.11b.C. WEP, SSID disabled, and 802.11g.D. WPA2, SSID disabled, and 802.11a.

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 120A number of vendors visit a large corporation but are unable to connect to the company's wireless network.Kim, the network technician, verifies that other users are connected to the network and it seems to be fullyoperational. Which of the following steps should be taken NEXT to troubleshoot the issue?

A. Verify the SSID is enabled.B. Ensure the WAP is up and running.C. Ensure the transmission is not encrypted.D. Verify the physical network is connected to the wireless network.

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 121Which of the following could cause employees to be redirected to an incorrect site after typing in

42

the correct name in a web browser?

A. DNS cache poisoningB. Mismatched MTUC. Incorrect DHCP addressD. Duplicate IP address

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 122

Page 85: N10-005-By BawlsDeep

Zach, a network technician, is trying to set up a SOHO network to allow Internet connectivity for all employeesbased on the following hardware:

- 4 computers with LAN and wireless cards

- 1 router with 3 LAN ports

- 2 Ethernet cables

- 1 cable modem

The manager would like as many of the computers as possible to be physically connected, instead of usingwireless. Which of the following scenarios would meet this requirement based on the equipment available?

A. The router should be connected to the modem and one PC can be physically connected to the router. Allother PCs must connect wirelessly.

B. The modem should be physically connected to the router and two PCs can be physically connected to therouter. All other PCs must connect wirelessly.

C. The router should be connected to the modem and three PCs can be physically connected to the router.The other PC must connect wirelessly.

D. The modem should be physically connected to one PC. All other PCs must connect wirelessly.

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 123An 801.11g wireless access point was configured as follows:

43

- AP encryption forced to WPA2-AES mode only

- MAC address filtering enabled with the following MAC address in the allow list: 00-ab-29-da-c3- Which is trueabout the above configuration?

A. Any 802.11b/g compatible client can connect to the wireless network if they support TKIP, the MAC addressis 00-ab-29-da-c3-40, and the encryption key is known by the client.

B. An 802.11a compatible client can connect to the wireless network only if its MAC address is 00- ab-29-da-c3-40 and the encryption key is known by the client.

C. An 802.11n compatible client can connect to the wireless network only if its MAC address is 00- ab-29-da-c3-40 and the encryption key is known by the client.

D. Any 802.11g compatible client can connect to the wireless network if the encryption key is known by theclient.

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 124Which of the following is the correct representation of an IPv6 address?

Page 86: N10-005-By BawlsDeep

A. ::B. 0:0:0:0:0:0:0:0:1C. 1:2:3:4:AB:CD:EFD. 2001::4860:800f::

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 125Which protocol is represented by the packet capture below?

UDP 0.0.0.0:68 -> 255.255.255.255:67

A. DHCPB. FTPC. SNMP

44D. DNS

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 126Which of the following default ports are used with DHCP? (Select TWO).

A. 22B. 23C. 53D. 67E. 68

Correct Answer: DESection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 127Which of the following is a reason to use dynamic DNS?

A. The host IP address is not listed in the firewall.B. The host IP address is assigned by DHCP.C. Static routes cannot be used on the host network.D. A third-party certificate is being used.

Page 87: N10-005-By BawlsDeep

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 128Jeff, a user, can no longer access the accounting file share, but others are still able to access the share. Whichof the following would be the FIRST step in troubleshooting the issue?

A. Notify senior management of the issue.B. Develop a probable cause theory.C. Ask Jeff if anything has changed on the system.

45D. Escalate the issue to the vendor.

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 129Which of the following virtual components maintains a MAC-to-port forwarding table?

A. Virtual PBXB. Virtual desktopC. Virtual switchD. Virtual server

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 130Jeff, a user connected to the wireless network, takes a laptop from his desk to a conference room. Arriving atthe conference room, Jeff realizes that the laptop is in process of reconnecting to the wireless network. Whichof the following is a common wireless problem that can cause this issue?

A. Mismatched SSIDB. Incorrect encryption typeC. Weak signal strengthD. Increased latency

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

Page 88: N10-005-By BawlsDeep

QUESTION 131Which TCP/IP model layer does the OSI model layer named 'session' respond to?

A. ApplicationB. PresentationC. Internet

46D. Transport

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 132Jeff, a network administrator, would like to ensure that the footprint of the company's wireless coverage islimited to the office borders, located on the premises. Which of the following features should he adjust on all ofthe company's WAPs to make this change?

A. SSID maskingB. PPPoEC. Transmission powerD. Encryption technology

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 133Zach, a network administrator, is checking work on some new CAT5 LAN network cabling installed at anorganization. Multiple lines are receiving poor signals, and Zach finds the lengths of the runs to be sometimesover 350 feet (107 meters). Which of the following is the cause of the issue?

A. CAT5 cable runs over 330 feet (100 meters) need to utilize STP instead of UTP.B. CAT5 cabling is limited to single-run lines of 330 feet (100 meters).C. CAT5 cabling is limited to single-run lines of 250 feet (76 meters).D. CAT5 cabling needs to have terminators installed at each end for runs over 330 feet (100 meters).

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 134Many users on a small network are reporting that while they can share files amongst each other, access to theInternet has been lost. Lisa, the technician, finds that the Internet addresses are failing to resolve to IPaddresses. Which of the following is malfunctioning?

47

Page 89: N10-005-By BawlsDeep

A. DHCPB. DNSC. RADIUSD. VPN

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 135Kim, a network administrator, has made changes to the DHCP leasing setup for a given network and isexpecting all devices to recognize the changes shortly. However, after a full week, none of the machines on thecompany network are grabbing new addresses with the new lease time.

Which of the following is the problem?

A. The lease time on the original configuration was too long.B. The firewall was never configured to recognize the changes.C. The DHCP server was never restarted, so changes never took affect.D. The lease time on the original configuration was too short.

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 136Kim, a network consultant, noticed that a new installation for a network backbone looked like this:ISP Switch Firewall PC. Which of the following is the BEST configuration for a properly setup environment?

A. Switch ? ISP ? Firewall ? PCB. ISP ? Firewall ? Switch ? PCC. Firewall ? ISP ? PC ? SwitchD. ISP ? PC ? Firewall ? Switch

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

48

QUESTION 137Zach, a customer, has Internet service that includes several static IP addresses. Zach wishes to host a websitefrom a server within a privately addressed network and make it publicly available. Which of the following wouldhave to be configured on the router to allow the public to access the website from one of the static IPaddresses?

Page 90: N10-005-By BawlsDeep

A. QoS monitoringB. Static NATC. VLAN taggingD. MAC filtering

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 138Jeff, a business owner, has discovered that several of the nearby businesses have wireless networks. Jeffwants to implement a unique wireless network inside the business. Which of the following should be configuredon the wireless access point to reduce interference from the other wireless networks?

A. PPPoE authenticationB. MAC filteringC. WPA encryptionD. Wireless channel

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 139In an environment with STP disabled, which of the following is the MOST likely cause of the exponentialincrease in repeated packets transferred through the network?

A. Incorrect subnet maskB. Mismatched MTUC. Switching loopD. VLAN mismatch

Correct Answer: CSection: (none)Explanation

Explanation/Reference:49

Explanation:

QUESTION 140A company only wants preapproved laptops to be able to connect to a wireless access point.Which of the following should be configured?

A. SSID disableB. ACL rulesC. WPA encryption

Page 91: N10-005-By BawlsDeep

D. MAC filtering

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 141A company's database software runs in the cloud. The device hosting the software is an example of which ofthe following?

A. Virtual serverB. Virtual switchC. Virtual desktopD. Virtual PBX

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 142Lisa, a technician, is troubleshooting a laptop's connection to a wireless network and notices the user hasplaced their cell phone on top of the wireless router. Which of the following is the cell phone MOST likelygenerating?

A. Wrong encryptionB. An SSID mismatchC. LatencyD. Interference

50

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 143Kim, a technician, is asked to run new cabling for an office that is 350 feet (107 meters) away from thenetworking equipment. The type of cable being run is CAT6. Kim purchases and installs a 500 foot (152meters) CAT6 cable, but after installation, notices a weak signal between the office and the networkingequipment. Which of the following would have been the BEST to install instead of the CAT6 cable?

A. Install two CAT6 cables with a repeater.B. Install a 500 foot (152 meter) CAT5 cable.C. Install a 500 foot (152 meter) CAT5e cable.D. Install three CAT6 cables with a repeater.

Correct Answer: ASection: (none)

Page 92: N10-005-By BawlsDeep

Explanation

Explanation/Reference:Explanation:

QUESTION 144Which of the following default services uses TCP/UDP port 88?

A. LDAPB. IGMPC. HTTPD. Kerberos

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 145Which of the following virtualized components would provide a secure operating environment for a businessuser?

A. Virtual PBXB. Virtual switch

51C. Virtual desktopD. Virtual SAN

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 146Multiprotocol Label Switching (MPLS) operates at which of the following layers of the OSI model? (SelectTWO).

A. Layer 1B. Layer 2C. Layer 3D. Layer 4E. Layer 5

Correct Answer: BCSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 147Which of the following examples would require a private static IP address, but not a public static IP address?

Page 93: N10-005-By BawlsDeep

A. A PDA connecting to the wireless network.B. A laptop that is deployed on a LAN.C. A file server deployed in the internal datacenter.D. An Internet facing web server for external access.

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 148Kim, a user, is experiencing performance issues with a home wireless network. She has performed thefollowing steps:

52

- Checked to make sure the laptop is within the appropriate wireless network range

- Checked the connected SSID and wireless channel

- Checked that the laptop is the only device connected to the wireless network

Which is the MOST likely cause for the performance issues?

A. Kim has put in a static IP address on the wireless NIC, which is not within the appropriate home network IPrange.

B. Another computer is on the network and is downloading video content. This is overloading and flooding thewireless link.

C. There are other wireless devices in the area that operate on the wireless band and on the same wirelesschannel.

D. Kim has misconfigured the setting on the wireless client resulting in the WPA-TKIP password beingincorrectly entered.

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 149Which of the following would Zach, a network engineer, use to ensure a statically addressed device wouldreceive the same IP address, if it reverted to dynamic addressing?

A. DHCP option 3B. DHCP exclusionC. DHCP leaseD. DHCP reservation

Correct Answer: DSection: (none)Explanation

Page 94: N10-005-By BawlsDeep

Explanation/Reference:Explanation:

QUESTION 150Zach, a network engineer, is troubleshooting poor wireless throughput for a group of 15 users in a large office.Many of the computers are showing moderate to weak signals even though there are two APs less then 15 feet(4 meters) away in either direction. Which of the following is MOST likely the cause?

53

A. The local antennas are not powerful enough.B. There is an SSID mismatch.C. The receiver sensitivity is too high.D. The closest APs are down.

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 151Jeff, a network engineer, is troubleshooting an issue where clients are not receiving IP addresses from a new,properly configured DHCP server on another subnet. Statically addressed clients can get onto the samenetwork with no issues. Which of the following is causing the issue?

A. Incorrect VLAN taggingB. Missing helper addressesC. Wrong default gatewayD. Improper routing protocols

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 152A new small business needs a network solution that provides at least 50Mbps of bandwidth and supports fullduplex communication. Which of the following meets those needs?

A. 10/100 layer 2 switchB. 2.4GHz 802.11gC. 5.0GHz 802.11aD. 10Base2 Ethernet

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 153

Page 95: N10-005-By BawlsDeep

An organization currently has CAT5e cabling throughout its office. Kim, the network technician, istroubleshooting a new CAT6 run that supports network traffic, but does not meet specification

54

when tested with a TDR. Which of the following is MOST likely the cause?

A. Improper groundingB. TXRX reversedC. Incorrect terminationD. Outdated NIC drivers

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 154Which of the following services would Kim, a technician, use to create or update a client's DNS 'A' and 'PTR'records automatically?

A. KerberosB. BINDC. WINSD. DHCP

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

Page 96: N10-005-By BawlsDeep

Exam C

QUESTION 1Lisa, an administrator, has set up an 802.11n wireless network. Users with 802.11n laptops have reported thatspeeds are slow. After testing, Lisa determines that users max out at 802.11g speeds. Which of the followingwould MOST likely fix this issue?

A. Enable wireless multimedia (WMM) for QoSB. Use the 40MHz channels in the 2.4GHz bandC. Enable access point antenna isolationD. Limit the clients to 802.11g compatible laptops

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 255

During the day Kim, an administrator, noticed the network slowing down. Within an hour, the network wasshowing 100% utilization. While investigating the issue, Kim notices that most of the traffic is coming from oneswitch. Which of the following scenarios is MOST likely the cause?

A. The switch was configured for QoS and was bottlenecking all traffic.B. Kim has implemented VLAN trunking on the switch.C. A user has moved a laptop from one wall jack to another triggering port security.D. A user plugged both ends of a patch cable into the switch jacks.

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 3Zach, a client, has a home office and also works out of a garage on the property located 150 feet (45 meters)from the house. Zach wants to extend the Internet connection from the home to the garage. Which of thefollowing technologies would MOST likely accommodate this range?

A. DVI cableB. BluetoothC. WirelessD. CAT3 cable

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 4

Page 97: N10-005-By BawlsDeep

Jeff, a network administrator, detects an existing 802.11g signal on channel 5. Which of the following channelswould be the LEAST likely to interfere with the existing signal?

A. 1B. 6C. 9D. 11

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

56

QUESTION 5Lisa, a technician, is asked to install a wireless network for two neighboring buildings. Which of the followingwireless signals will MOST easily penetrate obstructions, such as walls and doors?

A. 802.11aB. 802.11gC. 802.11n 5GHzD. 802.11n 5GHz wide band

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 6Kim, a network administrator, is configuring a switch with an LACP port group for uplink. She plugs in thesecondary uplink of the group, and shortly thereafter receives widespread reports that the network ismalfunctioning. Which of the following is MOST likely the cause?

A. A network loop was created due to a misconfiguration of the port group.B. The port on the switch for the new secondary link was never enabled.C. The LACP group was mistakenly configured to do layer 2 + 3 + 4 hashing for its link balancing.D. The LACP group was only configured to do layer 2 hashing for its link balancing.

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 7A small office has created an annex in an adjacent office space just 20 feet (6 meters) away. Kim, a networkadministrator, is assigned to provide connectivity between the existing office and the new office. Which of thefollowing solutions provides the MOST security from third party tampering?

A. CAT5e connection between offices via the patch panel located in building's communication closet.

Page 98: N10-005-By BawlsDeep

B. CAT5e cable run through ceiling in the public space between offices.C. VPN between routers located in each office space.D. A WEP encrypted wireless bridge with directional antennae between offices.

Correct Answer: CSection: (none)Explanation

Explanation/Reference:57

Explanation:

QUESTION 8Kim, an administrator, is attempting to connect a laptop to a server via RJ-45 ports on both a device and aCAT5 patch cable. All of the IP settings have been verified to be correct, yet there is a connectivity problem.Which of the following would MOST likely fix the IP connectivity problem?

A. Wires 1, 2 and 3, 6 need to be swapped on one end of the connecting cable.B. Use the DB-9 port with a DB-9 to RJ-45 adapter on the server.C. Manually adjust the duplex mode on the server's link.D. Configure the laptop to receive a DHCP address from the server, rather than manually setting one.

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 9Jeff, a user, reports very slow network access. He has spoken to other users, and no one else is experiencingnetwork problems. Which of the following is the NEXT step in troubleshooting this issue?

A. Determine if anything has changed.B. Upgrade the user to a gigabit speed.C. Replace the user's network card.D. Set the switch port to full-duplex.

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 10Zach, a network administrator, needs to purchase a new switch to support VoIP phones and wireless accesspoints in a new building. Which of the following features are the MOST important for the new switch to support?

A. PoE and QoS58

B. LACP and OSPFC. 802.1x and 802.11n

Page 99: N10-005-By BawlsDeep

D. NAT and VTP

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 11To achieve MAXIMUM bandwidth throughput, 802.11n clients should use which of the following?

A. Only the 5GHz bandB. Only the 2.4GHz bandC. Only the 900MHz bandD. Both 2.4GHz and 5GHz bands

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 12Clients are unable to connect to the wireless network. The network is secured with WPA2- Enterprise. Which ofthe following is MOST likely the cause of the problem?

A. MAC address authentication is being used.B. The RADIUS server is down.C. The users are using incorrect passwords.D. The PSK is wrong.

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 13Jeff, a user, reports getting a "This page cannot be displayed" error message in his web browser. However, Jeffcan ping the default gateway. Which of the following is the MOST likely cause of the problem?

59

A. SSL certificates are expiredB. Incorrect WINS serverC. The browser is unsupportedD. Incorrect DNS settings

Correct Answer: DSection: (none)Explanation

Explanation/Reference:

Page 100: N10-005-By BawlsDeep

Explanation:

QUESTION 14A small business would like to connect a second building on their property to the network. The building is about200 meters (656 feet) away from the main building. Which of the following would be the MOST cost-effectivemethod to supply a gigabit Ethernet connection to the second building?

A. 10GBase-LWB. 1000Base-LXC. 1000Base-SXD. 1000BaseT

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 15When examining a suspected faulty copper network cable, Kim, the administrator, notices that some of thepairs are untwisted too much. This is MOST likely causing which of the following?

A. DB lossB. DispersionC. CollisionsD. Cross-talk

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 16Kim, a company's network technician, receives a report in the morning about Internet service

60

being down at the site. Kim was informed yesterday that there was a water main break in front of the site, andrepair work was going to be performed. She notices that there are workers currently performing the repair. Totest to make sure there are no internal network issues, a laptop is plugged into the border router to testconnectivity to the Internet. The laptop fails to connect to the Internet. Which of the following should beperformed according to the network troubleshooting methodology?

A. Ask the accounting department if all bills were paid to the Internet service provider.B. Verify the Internet is fully restored and notify employees of the restoration.C. Question the employees of the severity of the Internet outages by email.D. Notify employees of the outage and contact the service provider of the demarc.

Correct Answer: DSection: (none)Explanation

Explanation/Reference:

Page 101: N10-005-By BawlsDeep

Explanation:

QUESTION 17Lisa, a network technician, would like to keep the IP address of the Human Resource department's server inthe same group of 100 DHCP IP addresses that are assigned to the Human Resource department's employeeworkstations. Which of the following would BEST allow this and have the ability for the server to keep the sameIP address?

A. Implement a set of static IPs for the entire human resource department.B. Use a DHCP reservation for the server IP address.C. Use a small DHCP scope for the human resource department.D. Connect the server to a router in the network closet on the same floor.

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 18Lisa, a network technician, has implemented DHCP on the network last week. Employees are now reportingduplicate IP addresses and network connectivity errors. Which of the following would cause duplicate IPaddresses on the network?

A. A second DHCP server is on the network.B. The network IP leases are expiring and not renewing.C. The DNS record A pointers are incorrect.D. The DHCP server has run out of IP addresses to issue to clients.

61

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 19Kim, a new employee, is unable to get to the department's server while other employees are having no issues.The network administrator has verified that Kim has permission to the server and the workstation is able to getto other network resources. Which of the following is the MOST likely cause?

A. The department server is having network issues.B. Kim's workstation is a part of the wrong VLAN.C. The onboard NIC has outdated drivers installed.D. The wireless NIC has not been enabled for Kim's workstation.

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 20

Page 102: N10-005-By BawlsDeep

Lisa, a network administrator, wants to be able to block all already known malicious activity. Which of thefollowing would allow her to perform this activity?

A. Behavioral Based IDSB. Signature Based IDSC. Behavioral Based IPSD. Signature Based IPS

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 21Which of the following protocols uses port 3389?

A. IMAPB. DHCPC. SSH

62D. RDP

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 22Zach, a network technician, is installing a 48 port switch. Zach is configuring the switch to avoid switch looping.Which of the following should the technician enable?

A. Full duplexB. MAC filteringC. Spanning treeD. Port mirroring

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 23Zach, a network administrator, is responding to a support ticket. The ticket does not have enough information todetermine the problem. Which of the following should Zach perform FIRST before responding to the ticket?

A. Determine if anything has changed.B. Test a theory to determine a cause.C. Establish a plan of action to resolve the problem.D. Escalate the problem if necessary.

Page 103: N10-005-By BawlsDeep

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 24Jeff, a technician, is troubleshooting a PoE switch used for voice. Users report that their phones turn off andreboot often. Which of the following is MOST likely the cause?

A. Phone adapter failure63

B. Switch power failureC. Mismatched MTUD. Wrong subnet mask

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 25Lisa, a network technician, is troubleshooting a port on a switch that does not allow other devices tocommunicate to each other. Which of the following is MOST likely the cause?

A. Wrong DNS serverB. VLAN assignmentC. Bad SFP moduleD. Missing routes

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 26Kim, a technician, is configuring an 802.11n access point. Other WAPs on the network use 802.11b. Which ofthe following will Kim have to setup to make sure these WAPs will be able to communicate?

A. Enable mixed modeB. Disable SSIDC. Disable encryptionD. Enable `n' only mode

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:

Page 104: N10-005-By BawlsDeep

QUESTION 27Zach, a technician, is installing a new wireless network. There are currently no wireless devices in the area.Which of the following should Zach consider before installing the new devices?

64

A. FrequenciesB. SSID broadcastC. WAP placementD. Channels

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 28Zach, a user, cannot access any network resources. The technician has determined that the problem is isolatedto Zach, and that there have not been any changes to his workstation or switch port recently. Which of thefollowing steps in the troubleshooting methodology should the technician do NEXT?

A. Establish a plan of action to resolve the problem.B. Implement preventative measures.C. Implement the solution or escalate as necessary.D. Establish a theory of probable cause.

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 29Jeff, a customer, has a wireless network and has reported that the network traffic from the wireless accesspoints seems high compared to the limited number of wireless devices used. Jeff believes that other non-employees are using the wireless network to access the Internet. Which of the following could be used to limitthe access to the wireless network? (Select TWO).

A. WPA encryptionB. Changing wireless channelsC. MAC filteringD. Changing wireless speed standardsE. SSID disable

Correct Answer: ACSection: (none)Explanation

Explanation/Reference:Explanation:

65

Page 105: N10-005-By BawlsDeep

QUESTION 30Zach, a customer, wants to network several computers within a large warehouse. The warehouse has onecomputer at the very far end of the warehouse that is 170 meters (557 feet) from the network switch. Which ofthe following cable types should a technician use for this computer?

A. CAT3B. CAT5C. CAT6D. Fiber

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 31A layer 3 switch can move packets between subnets based on which of the following criteria?

A. 802.1q tagB. PortC. ApplicationD. IP address

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 32Kim, a customer, wants to install a wireless network into a shared office space. There are several otherwireless networks from other companies that can be detected within the office space. Which of the followingshould be configured on Kim's wireless network to differentiate it from other wireless networks and still providethe BEST performance and security? (Select TWO).

A. SSIDB. ChannelC. Antenna typeD. Wireless standardE. NAT

Correct Answer: ABSection: (none)Explanation

Explanation/Reference:66

Explanation:

QUESTION 33

Page 106: N10-005-By BawlsDeep

Which of the following protocols is used to assign IP addresses to network devices?

A. DHCPB. UTPC. FTPD. TCP/IP

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 34Which of the following has to be defined to guarantee a computer always has a private IP address of 10.4.0.5?

A. ScopeB. LeaseC. ReservationD. Dynamic IP addressing

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 35Switch A is configured with VLAN 105 and 106. Switch B is configured with VLAN 105 and 107. Both switchesare connected with a fiber cable. In order for packets from all VLANs to cross the fiber cable, which of thefollowing configurations MUST be present?

A. Reverse ARPB. Full duplex on the fiber linkC. PoED. 802.1q trunking

67

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 36A managed switch offers which of the following benefits over an unmanaged switch? (Select TWO).

A. 802.1qB. SNMPC. GigabitD. Layer 2 forwardingE. Fewer collision domains

Page 107: N10-005-By BawlsDeep

Correct Answer: ABSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 37After installing new cabling, Kim, a technician, notices that several computers are connecting to networkresources very slowly. Which of the following tools would BEST help in determining if the new cabling is thecause of the problem?

A. MultimeterB. Cable certifierC. Cable testerD. Toner probe

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 38Zach, a user, on a network cannot access any network resources. The link light on his computer shows that aconnection is present. Which of the following is the MOST likely cause of the problem?

A. The wrong cable type has been used.68

B. IDS has shut down the computer's switch port.C. The port on the switch is configured incorrectly.D. Spanning tree protocol was implemented.

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 39A new network printer needs to be installed in the finance department. The switch port, server, and printer NIChave been configured properly but no link light is coming up when the printer is plugged into the wall port.Which of the following tools would Jeff, an administrator, use to diagnose the problem?

A. Cable testerB. Protocol analyzerC. OTDRD. Crimper

Correct Answer: ASection: (none)Explanation

Page 108: N10-005-By BawlsDeep

Explanation/Reference:Explanation:

QUESTION 40Lisa, a network administrator, needs to facilitate traffic from several VLANs over a single port. Which of thefollowing configuration changes would facilitate access?

A. Traffic filteringB. TrunkingC. MAC filteringD. Port mirroring

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 41A new department is formed and a new section of the building is being built out for them. All 50 new employeeswill need access to the wireless network. Which of the following should Jeff, a

69

technician, complete to allow these new employees access to the wireless network?

A. Frequency settings should be changed.B. Additional WAPs should be installed.C. Channels should be changed.D. VLANs should be added.

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 42Logically separating the ports on a switch without physically separating them can be done using which of thefollowing?

A. Routing tablesB. Hub logicC. Spanning tree protocolD. VLANs

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 43

Page 109: N10-005-By BawlsDeep

Kim, a network administrator, needs to add an additional connection to a room. She adds a new Ethernetswitch and must connect it to an existing switch. Which cable type should Kim use to connect the two switches?

A. CAT3 cableB. Serial cableC. Crossover cableD. Rollover cable

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 4470

Zach, a network administrator, wants to separate the network into broadcast domains. Which of the followingcan he use? (Select TWO).

A. WAPsB. RoutersC. Patch panelsD. HubsE. BridgesF. VLANs

Correct Answer: BFSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 45Which of the following routing protocols utilizes only hop count as a metric, broadcasts its routing table every 30seconds by default, and has a MAXIMUM hop count of 15?

A. Interior Gateway Routing Protocol (IGRP)B. Routing Information Protocol (RIP)C. Open Shortest Path First (OSPF)D. Border Gateway Routing Protocol (BGP)

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 46Which of the following is the common port used for IMAP?

A. 25

Page 110: N10-005-By BawlsDeep

B. 53C. 143D. 443

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

71

Topic 3, Volume C

QUESTION 47Before installing a wireless network, which of the following should Kim, a network technician, take intoconsideration to reduce signal exposure for war drivers?

A. Device placementB. MAC address filteringC. User authenticationD. Encryption protocols

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 48Which of the following OSI model layers is between the data link and transport layers?

A. PresentationB. PhysicalC. SessionD. Network

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 49Which of the following subnet masks would allow for 192.168.0.3 and 192.168.0.240 to be in the same subnet?

A. 255.255.255.0B. 255.255.255.128C. 255.255.255.192D. 255.255.255.248

Page 111: N10-005-By BawlsDeep

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:

72

QUESTION 50Which of the following ports should be allowed through a firewall to allow DNS resolution to occur to an outsideDNS server?

A. 20B. 53C. 80D. 3389

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 51Which of the following is a Class A private IP address?

A. 4.2.2.2B. 10.1.1.45C. 169.254.9.15D. 192.168.0.100

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 52Which of the following services would have assigned the IP address 169.254.1.89?

A. DHCPB. APIPAC. IDSD. DNS

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

73

Page 112: N10-005-By BawlsDeep

QUESTION 53Which of the following BEST describes the point at which an ISP's responsibility for an Internet connectionends?

A. RouterB. MDFC. IDFD. Demarc

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 54Which of the following defines the range of IP addresses a DHCP server can assign?

A. ScopeB. LeaseC. ReservationD. Subnet

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 55Kim, a technician, is connecting a new desktop computer to a switch. She was only able to locate one cable inthe office for the installation. The wires at each end are color coded as follows:

End A. orange-white, orange, green-white, blue, blue-white, green, brown-white, brown

End B. green-white, green, orange-white, blue, blue-white, orange, brown-white, brown

Which of the following should Kim do to complete the installation?

A. Re-end the provided cable, keeping the wiring the same.B. Use the provided cable.C. Purchase a crossover cable.D. Purchase a straight-through cable.

74

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 56

Page 113: N10-005-By BawlsDeep

Zach, a technician, suspects a NIC in a desktop computer has failed. Which of the following commands canZach use to BEST troubleshoot this issue?

A. netshB. nslookupC. ipconfigD. tracert

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 57After a brownout, Zach, a user, can connect to the internal network, but not the Internet. Which of the followingis the company's DSL router experiencing that is causing this issue?

A. Switching loopB. Power failureC. Broadcast stormD. Duplicate IP address

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 58company wants the public to be able to connect to the wireless network with minimal security, but not be able toconnect to the private internal network. Which of the following firewall rules would BEST accomplish this?

A. Content filtering on the wireless access pointB. Allow traffic from the wireless access point

75C. Block traffic from the wireless access pointD. Packet filtering on the wireless access point

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 59Lisa, an administrator, attempts to open a web page and sees the following error: `Error 404: Page not found'.She then uses the ping command and finds that the default gateway cannot be pinged. At which of the followinglayers does the problem MOST likely reside?

A. Layer 1B. Layer 4

Page 114: N10-005-By BawlsDeep

C. Layer 5D. Layer 7

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 60At which of the following layers does HTML operate?

A. Layer 2B. Layer 3C. Layer 5D. Layer 7

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 61Lisa, an administrator, is unable to route traffic between VLANs on a switch. Communication between deviceswithin each VLAN is functioning. At which of the following layers does the problem MOST likely reside?

76

A. NetworkB. Data linkC. TransportD. Session

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 62A company has decided to increase wireless infrastructure security by moving from WEP encryption to WPA2.Technicians change each WAP to the new encryption standard and users are given the new passwords. Manyusers are able to reconnect using the new authentication, but several users report an inability to reconnect.Which of the following is the MOST likely cause of the problem?

A. The users who cannot connect are using older NICs without WPA2 support.B. The users who cannot connect are in areas without wireless coverage.C. The users who cannot connect have not been placed in the correct VLAN.D. The users who cannot connect have not specified the correct signal strength.

Correct Answer: A

Page 115: N10-005-By BawlsDeep

Section: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 63Lisa, a technician, installs a new WAP and users are able to connect; however, users cannot access theInternet. Which of the following is the MOST likely cause of the problem?

A. The signal strength has been degraded and latency is increasing hop count.B. An incorrect subnet mask has been entered in the WAP configuration.C. The signal strength has been degraded and packets are being lost.D. Users have specified the wrong encryption type and routes are being rejected.

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 6477

Jeff, an administrator, has just finished installing a new switch and connected two servers with IPs of192.168.105.20 and .30. The servers are able to communicate with each other, but are unable to reach theInternet. Jeff sees the following information in the switch configuration:

interface VLAN 105

IP address 192.168.105.5 255.255.255.0

Jeff is able to ping the router at 192.168.105.1 from the switch. Which of the following is the MOST likely causeof the problem?

A. The subnet mask is incorrect.B. A routing loop has occurred.C. Jeff used a crossover cable to connect the switch to the gateway.D. The server is missing default-gateway information.

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 65Zach, the network administrator, has just finished installing a new 10/100/1000 switch, but receives reportsfrom the server administrator that servers connected to the new switch seem to be experiencing slow LANconnections. Zach checks the port connecting the new switch to the core switch and sees the followinginformation:

#show run interface GigabitEthernet0/10

Switchport trunk encapsulation dot1q

Page 116: N10-005-By BawlsDeep

Switchport mode trunk

Switchport trunk native VLAN 10

Which of the following is the MOST likely cause of the slow connections?

A. The servers have not had VLAN tagging enabled on their NICs.B. Speed and duplex have not been set.C. VLAN tagging was not set on the trunk.D. The servers have been connected with CAT5 cable.

Correct Answer: BSection: (none)Explanation

Explanation/Reference:78

Explanation:

QUESTION 661000BaseT has a MAXIMUM run distance of:

A. 25 meters (82 feet).B. 100 meters (328 feet).C. 500 meters (1640 feet).D. 1000 meters (3280 feet).

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 67Which of the following DNS record types provides the hostname to IP address mapping?

A. A recordB. NS recordC. CNAME recordD. MX record

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 68Kim, a user, took a laptop on vacation and made changes to the configuration in order to use the device at thehotel. She can reach the Internet, but cannot access any internal network resources.Which of the following is the MOST likely reason?

Page 117: N10-005-By BawlsDeep

A. Incorrect DNSB. Incorrect subnet maskC. Duplicate IP addressD. Incorrect SSID

Correct Answer: ASection: (none)Explanation

Explanation/Reference:79

Explanation:

QUESTION 69Jeff, an administrator, is using a punch-down tool to connect a cable. To which of the following is Jeff MOSTlikely connecting?

A. A 110 blockB. A demarcC. A DB-9D. A smart jack

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 70Teachers and students at a school currently share the same bandwidth. The Internet performance for theteachers in the classroom is becoming extremely slow. Which of the following is the BEST method to mitigatethe issue?

A. Increased uptimeB. Caching enginesC. Traffic shapingD. Load balancing

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 71Kim, a network engineer, needs to troubleshoot a remote router within the WAN. Which of the following userauthentications would be the BEST to implement?

A. MS-CHAPB. Kerberos

Page 118: N10-005-By BawlsDeep

C. TACACS+D. PKI

80

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 72Which of the following uses copper wiring?

A. 10GBaseERB. 10GBaseLWC. 100BaseFXD. 1000BaseT

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 73The location where the Telco wiring stops and the clients wiring starts is known as the:

A. MDF.B. demarc.C. IDF.D. 66 block.

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 74Which of the following cables covers the LONGEST distance?

A. 10GBaseTB. 10GBaseFRC. 100BaseTXD. 1000BaseX

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

Page 119: N10-005-By BawlsDeep

81

QUESTION 75Users report that their Internet connection is slow. Zach, the network technician, has a suspicion that users arestreaming video and music. Which of the following would BEST confirm Zach's theory?

A. Traffic analysisB. SNMPC. History logsD. System logs

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 76Blocking a known malicious web address by using the ACL on the firewall is an example of which of thefollowing?

A. IP filteringB. Application filteringC. MAC filteringD. Port filtering

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 77A firewall that examines all the incoming traffic and decides if the traffic is going to be allowed though ordumped is a example of which of the following?

A. Packet sniffingB. Packet filterC. Stateful inspectionD. Content filter

82

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 78Two duplicate pieces of equipment can be used in conjunction for which of the following purposes? (SelectTWO).

Page 120: N10-005-By BawlsDeep

A. High availabilityB. Fault toleranceC. Reduce latencyD. Wi-MAXE. CARP

Correct Answer: ABSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 79Lisa, an administrator, has been tasked with running cables from one office to another neighboring office byrunning cables over the light fixtures in the ceiling that connects them. To prevent interference, which of thefollowing cable types should Lisa use?

A. CAT5eB. CAT6C. CoaxialD. Multimode fiber

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 80Which of the following improves wireless performance by allowing only one wireless transmission on thenetwork at a time?

A. CSMA/CAB. CSMA/CD

83C. Wireless encryptionD. Wireless bonding

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 81Lisa, an administrator, is responsible for one Linux and two Windows servers. She would like to review allserver logs centrally. Which of the following services could Lisa use in this scenario?

A. Event logsB. BaselinesC. Change managementD. Syslog

Page 121: N10-005-By BawlsDeep

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 82Kim, a network technician, is installing a new managed 10/100 Mbps switch on the network. The network hasan older printer with a 10Mbps network adapter that will be moved to the new switch. Which of the followingsettings on the switch will need to be configured to support the printer?

A. MAC filteringB. IP addressC. PoED. Port speed

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 83Zach, a new network technician, is monitoring network traffic and notices the network is operating at 80% ofcapacity. Which of the following could be used to determine if this is abnormally high traffic use?

84

A. Network mapsB. Cable management documentationC. Wire schemesD. Baseline

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 84Jeff, a network technician, arrives to work and discovers users are having a problem connecting the companyserver. The server operator was working on upgrades the night before. Which of the following documentsshould Jeff use to attempt to discover the problem?

A. Network mapsB. Change managementC. BaselinesD. Cable management

Correct Answer: BSection: (none)Explanation

Page 122: N10-005-By BawlsDeep

Explanation/Reference:Explanation:

QUESTION 85Lisa, a network technician, needs to push changes out to network devices and also monitor the devices basedon each device's MIB. Which of the following should she use?

A. SNMPB. Traffic analysisC. SyslogD. Asset management

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 86Kim, a network technician, needs to identify the MAC address of a device that is creating broadcast storms onthe network. Which of the following tools will provide the needed information?

85

A. History logsB. Network snifferC. Network mapsD. Traffic shaping

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 87Users have reported slow access times when retrieving information from a server on the company's network.Which of the following tools would provide access time information on each segment of the network to reachthe server?

A. arpB. routeC. ipconfigD. tracert

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 88

Page 123: N10-005-By BawlsDeep

Jeff, a network technician, is concerned about the environmental effects of power consumption and heat fromnetwork resources. Limited space is also a concern. Which of the following technologies should beimplemented?

A. Circuit switchingB. Network address translationC. Power over EthernetD. Virtual servers

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 89For security reasons Zach, a network technician, wants to install a Linux based email server,

86

Microsoft web services, and directory services on different servers. Which of the following technologies wouldbe BEST to reduce hardware costs?

A. VPN concentratorB. Virtual serversC. WirelessD. Multimode fiber

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 90Kim, a network technician, wants to use a packet analyzer to troubleshoot a reported problem with a user'sworkstation with IP address 192.168.1.45. To identify the workstation's packets Kim wants to use theworkstation's MAC address. Which of the following protocols would provide the needed information?

A. DHCPB. ARPC. DNSD. PING

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 91Which of the following OSI layers performs error detection using a Frame Check Sequence?

Page 124: N10-005-By BawlsDeep

A. SessionB. TransportC. PhysicalD. Data link

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

87

QUESTION 92Which of the following VPN methods is BEST used for connecting a remote office to the main company office?

A. WEP-to-WPAB. RDP-to-RASC. Client-to-siteD. Site-to-site

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 93Which of the following network optimization methods would be BEST to implement to increase bandwidth for aninternal streaming video server?

A. ISDNB. QoSC. Upgrade to 10baseTD. Buffer overflow

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 94The ISP needs to terminate the WAN connection. The connection should be located in the network server roomwhere the company LAN equipment resides. Which of the following identifies the location?

A. Smart jackB. MDFC. VPND. 66 block

Correct Answer: B

Page 125: N10-005-By BawlsDeep

Section: (none)Explanation

Explanation/Reference:Explanation:

88

QUESTION 95Creating a uniform user environment throughout the network can BEST be achieved by using which of thefollowing?

A. HoneypotsB. Virtual switchesC. Virtual PBXD. Virtual desktops

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 96Zach, an administrator, wants to eliminate remote access to a network from all users, except those users inZach's own country. Which of the following security measures could he use to set up this functionality?

A. MAC filteringB. Port filteringC. IP filteringD. TLS

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 97Lisa, an administrator, is experiencing availability issues on a Linux server. She decides to check the server foran IP address conflict on the server. Which of the following commands should Lisa use?

A. tracerouteB. tracertC. ifconfigD. ipconfig

89

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

Page 126: N10-005-By BawlsDeep

QUESTION 98Network upgrades have been completed and the WINS server was shutdown. It was decided that NetBIOSnetwork traffic will no longer be permitted. Which of the following will accomplish this objective?

A. Content filteringB. Port filteringC. MAC filteringD. IP filtering

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 99Lisa, a network administrator, needs to allow all websites to be accessible by the sales team for businesspurposes. Which of the following ports need to be enabled on the firewall? (Select TWO).

A. 23B. 25C. 53D. 80E. 443

Correct Answer: DESection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 100Lisa, a network technician, has determined that the initial theory of probable cause was incorrect. Which of thefollowing would be the NEXT step in the troubleshooting process?

A. Implement the solutionB. Establish a plan

90C. Document findingsD. Escalate the issue

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 101Which of the following is the MAXIMUM hop count for RIP before the network is considered converged?

A. 1

Page 127: N10-005-By BawlsDeep

B. 5C. 10D. 15

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 102Lisa, a technician, needs to customize various cable lengths and verify that the cables are working correctly.Which of the following tools would be needed to accomplish this? (Select TWO).

A. Cable certifierB. MultimeterC. CrimperD. Punch down toolE. Loopback plug

Correct Answer: ACSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 103Which of the following protocols is Kim, a user, utilizing if no handshake or data reliability are required?

91

A. TCPB. FTPC. TFTPD. UDP

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 104Jeff, a technician, has identified a problem, established and confirmed a theory, and has attempted to resolvethe problem. Jeff, however, does not appear to have the rights to make the needed changes. Which of thefollowing should he do NEXT?

A. Re-establish a new theory.B. Gather more information.C. Establish a plan of action.D. Escalate the problem.

Page 128: N10-005-By BawlsDeep

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 105A new business' web server has seen a huge spike of legitimate traffic in the last week. The owners want toensure the site has no problems as the business continues to grow. For Kim, a network administrator, which ofthe following is the MOST important concern for this company?

A. CachingB. Asset managementC. Traffic shapingD. High availability

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 106A company is expanding and has found that logging into each device to collect error information is

92

consuming too much time. They have asked Lisa, a network administrator, to set up a server that will captureerrors from each device automatically. Which of the following technologies would BEST fit this requirement?

A. SyslogB. RADIUSC. IPSecD. Network sniffer

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 107Jeff, a network administrator, has been requested to install wireless access throughout the entire building, whileutilizing a single SSID. Which of the following options will meet this requirement?

A. Set a separate VLAN on each WAP with the same encryption type.B. Set the SSID on each WAP and set contiguous WAPs to different channels.C. Set the SSID on each WAP and set contiguous WAPs to the same channel.D. Set a separate VLAN on each WAP with the same frequency.

Correct Answer: BSection: (none)Explanation

Page 129: N10-005-By BawlsDeep

Explanation/Reference:Explanation:

QUESTION 108Which of the following should Kim, a technician, update when new computers are purchased?

A. Asset managementB. Change managementC. Cable managementD. Baselines

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 10993

Which of the following would provide Zach, a technician, with a performance reference point to refer back toafter hardware repair?

A. BaselineB. Network mapC. Wire schemeD. Asset management

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 110Lisa, a technician, is asked to not allow FTP traffic on a network. Which of the following ports should beblocked on the firewall to achieve this?

A. 21B. 22C. 23D. 25

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 111Lisa, a network consultant, is asked to set up a wireless network in a home. The home user wants the wirelessnetwork to be available in every corner of the house. Which of the following additional information will Lisa need

Page 130: N10-005-By BawlsDeep

to determine the equipment for the installation? (Select TWO).

A. The length of the houseB. How many rooms are in the houseC. How many users will be using the wireless networkD. The building material of the houseE. The cost of the house

Correct Answer: ADSection: (none)Explanation

Explanation/Reference:Explanation:

94

QUESTION 112Kim, a technician, needs to test if domain name resolution is functioning properly. Which of the followingsoftware tools would she use to accomplish this? (Select TWO).

A. arpB. digC. routeD. nslookupE. netstat

Correct Answer: BDSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 113Which of the following OSI model layers is between the Network and Session layers?

A. PresentationB. Data linkC. TransportD. Physical

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 114Which of the following DNS records would be queried to locate a company's mail server?

A. AB. MXC. AAAA

Page 131: N10-005-By BawlsDeep

D. CNAME

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

95

QUESTION 115Which of the following protocols would Lisa, a technician, use to disable switch ports automatically to preventswitching loops?

A. RIPB. OSPFC. STPD. EGP

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 116A company has only three laptops that connect to their wireless network. The company is currently using WEPencryption on their wireless network. They have noticed unauthorized connections on their WAP and want tosecure their wireless connection to prevent this. Which of the following security measures would BEST securetheir wireless network? (Select TWO).

A. Change the encryption method to WPAB. Limit the DHCP scope to only have three addresses totalC. Enable the SSID broadcastD. Enable and configure MAC filteringE. Change the broadcast channel to a less commonly used channel

Correct Answer: ADSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 117Which of the following network appliances can BEST be described as allowing multiple servers to sharerequests for a website through the same public IP address?

A. VPN concentratorB. Content filterC. Load balancerD. Proxy server

Correct Answer: C

Page 132: N10-005-By BawlsDeep

Section: (none)Explanation

Explanation/Reference:96

Explanation:

QUESTION 118Which of the following network performance methods would Lisa, a technician, use with SIP phones?

A. CARPB. Load balancingC. QoSD. Caching engines

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 119Jeff, a company executive, has noticed that a wireless network signal from the company's WAP can be seen inthe company's parking lot. Jeff is very worried that this is a potential security threat. Which of the following canbe done to eliminate this threat?

A. Implement WEP encryptionB. Decrease signal strengthC. Change wireless channelsD. Rotate the SSID daily

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 120Which of the following connectors would Kim, a technician, use only for RG-6 cables?

A. F-connectorB. MTRJC. RJ-45D. RS-232

97

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:

Page 133: N10-005-By BawlsDeep

QUESTION 121Jeff, a network administrator, is installing an 802.11n network. Which of the following should he considerFIRST?

A. PlacementB. MAC filteringC. ChannelD. VTP configuration

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 122Which of the following technologies implements authentication headers and encapsulating security payloads?

A. IPSecB. ISAKMPC. TLSD. SSL VPN

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 123Jeff, a network administrator, needs to forward HTTP traffic from a SOHO firewall public IP to the internal webserver's private IP. Which of the following can Jeff implement?

A. DNSB. NATC. PKID. RAS

98

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 124Which of the following implements two-factor authentication?

A. Username and passwordB. Fingerprint and facial recognitionC. Check card and PIN

Page 134: N10-005-By BawlsDeep

D. PIN and password

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 125Which of the following protocols works at the LOWEST layer of the OSI model?

A. L2TPB. PPTPC. ISAKMPD. IPSec

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 126Which of the following protocols provides security through encryption? (Select TWO).

A. PPPoEB. L2TPC. IPSecD. PPPE. TLS

Correct Answer: CESection: (none)Explanation

Explanation/Reference:99

Explanation:

QUESTION 127Which of the following records would be used for a Reverse DNS lookup?

A. AAAAB. MXC. PTRD. A

Correct Answer: CSection: (none)Explanation

Page 135: N10-005-By BawlsDeep

Explanation/Reference:Explanation:

QUESTION 128Which of the following ports are MOST commonly used to interactively configure a networking device? (SelectTWO).

A. 21B. 22C. 23D. 53E. 67

Correct Answer: BCSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 129Which of the following protocols is used to resolve FQDNs to IP addresses?

A. SSHB. FTPC. DNSD. HTTP

Correct Answer: CSection: (none)Explanation

Explanation/Reference:100

Explanation:

QUESTION 130IP address based routing occurs on which of the following layers of the OSI model?

A. Layer 2B. Layer 3C. Layer 4D. Layer 5

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 131Data arranged into packets would be on which of the following layers of the OSI model?

Page 136: N10-005-By BawlsDeep

A. DatagramB. TransportC. PresentationD. Network

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 132Which of the following DNS record types is used for IPv6 resolution?

A. MXB. AAAAC. AD. PTR

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

101

QUESTION 133Lisa, a home user, wishes to confine a wireless network to devices ONLY inside of her house.Which of the following will accomplish this?

A. Decreasing radio strengthB. MAC filteringC. WEP encryptionD. SSID broadcast disable

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 134A company wishes to have a wireless signal broadcast only through a specific stretch of a highway tunnel.Which of the following measures will accomplish this?

A. WPA encryptionB. MAC filteringC. Changing antenna typeD. Decreasing radio strength

Correct Answer: C

Page 137: N10-005-By BawlsDeep

Section: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 135Which of the following protocols has the LEAST overhead and does not use a three-way handshake?

A. HTTPB. FTPC. HTTPSD. UDP

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

102

QUESTION 136Zach, a user, is unable to logon to his domain from his desktop PC. A cable certifier is used and shows a highvalue of NEXT. Which of the following represents the cause?

A. CrosstalkB. TX/RX reversedC. Split cablesD. DB loss

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 137Lisa, a user, is unable to map a drive to a known NetBIOS share. A ping from the client to the server issuccessful. Which of the following software tools is used to check if NetBIOS is enabled?

A. netstatB. arpC. nbtstatD. nslookup

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 138

Page 138: N10-005-By BawlsDeep

A SOHO with ten Wi-Fi equipped laptops needs a new network installed. Which of the following items would beused to setup the office using a new DSL line? (Select TWO).

A. RouterB. Wi-Fi Access pointC. Cable modemD. Ten WiMAX adaptersE. Ten CAT6 patch cables

103

Correct Answer: ABSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 139In order to reduce spam email, Kim, a network administrator, changes the standard SMTP port from which ofthe following port numbers to port number 587?

A. 20B. 21C. 23D. 25

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 140A company would like all HTTP traffic to filter through a proxy server on port 8080. Which of the following portnumbers needs to be redirected through the proxy server to accomplish this?

A. 20B. 80C. 143D. 443

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 141As a best practice, which of the following should be assigned to a network's main server?

A. LeaseB. Dynamic IP addressC. Static IP address

Page 139: N10-005-By BawlsDeep

D. Scope104

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 142A company's network consists of a primary switch at one end of the office building and a secondary switch atthe other end of the building, which are networked together. The office experiences a brownout only affectingthe half of the building connected to the secondary switch. When power is restored, users connected to thesecondary switch report no network or Internet connectivity. Which of the following should be verified on thesecondary switch to resolve this issue?

A. Verify VLAN assignmentB. Verify there is not a duplicate IP addressC. Verify subnet maskD. Verify the switch has power

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 143A company wants to only allow incoming HTTP and HTTPS traffic on their public wireless network. Which ofthe following port numbers should be the only allowed open ports on the firewall to accomplish this? (SelectTWO).

A. 20B. 80C. 143D. 443E. 8080

Correct Answer: BDSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 144An office would like to set up an unsecured wireless network for their customers in their lounge

105 area. Which of the following firewall capabilities should be configured to prevent the wireless traffic fromcommunicating with the office's LAN traffic?

A. NATB. Stateful inspection

Page 140: N10-005-By BawlsDeep

C. Packet filteringD. Port security

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 145Kim, an employee, connects to a work computer from home via the built-in Windows remote desktopconnection. Which of the following is she MOST likely using to establish the connection?

A. RDPB. RTPC. RIPD. RAS

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 146A new office's wireless network is causing interference with the medical office's wireless network located nextdoor. Which of the following should be changed to BEST prevent the interference?

A. Signal strengthB. WEP keyC. MAC address filteringD. WPA encryption

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:

Topic 4, Volume D

106

QUESTION 147A SOHO office recently installed a wireless network for employees to use during lunch breaks. As such, theaccess point was placed in the kitchen area by the microwave. Employees have been reporting intermittentconnectivity when using the wireless network. Which of the following would BEST improve connectivity?

A. Disable SSID broadcastB. Increase the signal strengthC. Move the access pointD. Change the broadcast channel

Page 141: N10-005-By BawlsDeep

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 148Kim, a technician, suspects a virus has infected the network and is using up bandwidth. She needs to quicklydetermine which workstation is infected with the virus. Which of the following would BEST help Kim?

A. Web serverB. SyslogC. Network snifferD. SNMP

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 149Which of the following is the default subnet mask for a Class B address?

A. 255.0.0.0B. 255.255.0.0C. 255.255.255.0D. 255.255.255.255

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

107

QUESTION 150Which of the following default ports would need to be disabled to block TFTP traffic?

A. 20B. 21C. 69D. 123

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 151

Page 142: N10-005-By BawlsDeep

When troubleshooting a connectivity issue, which of the following commands will give Jeff, the technician, a listof the host names connected to the network?

A. pingB. nbstatC. arpD. msconfig

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 152Which of the following cable types allows for the LONGEST distance of a Gigabit Ethernet connection?

A. Multimode fiberB. CAT6aC. Single mode fiberD. Coaxial

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

108

QUESTION 153Which of the following wireless technologies has the LARGEST cell size?

A. 802.11aB. 802.3afC. 802.11gD. 802.11i

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 154Which of the following is similar to MIMO?

A. WPAB. SSIDC. PoED. Diversity

Page 143: N10-005-By BawlsDeep

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

Page 144: N10-005-By BawlsDeep

Exam D

QUESTION 1Which of the following are available speeds when using 802.11b? (Select TWO).

A. 1 Mb/sB. 5.5 Mb/sC. 6 Mb/sD. 12 Mb/sE. 54 Mb/s

Correct Answer: ABSection: (none)Explanation

Explanation/Reference:Explanation:

109

QUESTION 2RADAR avoidance technologies are built into which of the following technologies?

A. 802.11aB. 802.11bC. 802.11gD. 802.11i

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 3Which of the following technologies can cause interference for 802.11g?

A. RADARB. 802.11aC. IrDAD. Bluetooth

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 4Which of the following technologies would be used in a large office area that has a lot of 2.4GHz noise?

A. 802.3afB. 802.1q

Page 145: N10-005-By BawlsDeep

C. 802.11aD. MIMO

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

110

QUESTION 5Which of the following occurs when antenna gain is increased on an access point?

A. Connection speeds decreaseB. Throughput decreasesC. Cell size increasesD. Attenuation increases

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 6Which encryption type uses only a 28 character key?

A. 40/64 bit WEPB. 104/128 bit WEPC. WPA2 PSKD. WPA Personal

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 7Which of the following is an Authentication, Authorization, and Accounting (AAA) technology that is MOSTwidely used with remote access?

A. PKIB. VPNC. MS-CHAPD. RADIUS

Correct Answer: DSection: (none)Explanation

Page 146: N10-005-By BawlsDeep

Explanation/Reference:Explanation:

QUESTION 8111 Which of the following uses a Management Information Base (MIB) to monitor the network?

A. History LogsB. SyslogC. SMTPD. SNMP

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 9Which of the following does SNMPv3 BEST provide over previous versions?

A. Increased securityB. Simplified managementC. More data typesD. Higher productivity

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 10Which of the following is a terminal emulator used to manage a network device?

A. VPNB. IDSC. PuTTYD. IPS

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 11Zach, a network administrator, is tasked with simplifying the review of events from network devices. Which ofthe following is used to accomplish this?

112

A. History logs

Page 147: N10-005-By BawlsDeep

B. Event logsC. Syslog serverD. Traffic analyzer

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 12Jeff, a technician, is troubleshooting connectivity issues with a new data circuit. Jeff verifies that the ST fiberjumper is good. Which of the following is the problem?

A. TX/RX reversedB. InterferenceC. Cable lengthD. Bad connectors

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 13Users are reporting that Internet performance is slow. Jeff, the technician, has determined that the Internetconnection is saturated. Which of the following is BEST used to determine the source, destination, and type ofthe traffic?

A. NetflowB. Protocol analyzerC. Network snifferD. SNMP

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 14Which of the following is a valid IPv6 address?

113

A. 1056:958:E486::F8:8962B. 1596:H593:B5D8::B859C. 2048::9584:A6B8::0983D. 4820::0985:489D::8761

Correct Answer: A

Page 148: N10-005-By BawlsDeep

Section: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 15Which of the following OSI model layers is responsible for the transmission of bits?

A. Layer 1B. Layer 2C. Layer 3D. Layer 4

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 16Frames are the Protocol Data Unit for which of the following layers of the OSI model?

A. Layer 1B. Layer 2C. Layer 3D. Layer 4

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 17Lisa, a network administrator, wants to automatically assign 168.254.1.0/24 addresses to computers on thenetwork. Which of the following will need to be configured?

A. DHCP addressing114

B. Private addressingC. DNS addressingD. APIPA addressing

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 18Kim, the client, has requested a cost-effective network solution to accommodate the ability to reconfigure theoffice space as needed. Which networking solution would provide the BEST solution?

Page 149: N10-005-By BawlsDeep

A. Private IP AddressingB. Wireless Access PointsC. Wide Area NetworkingD. Virtual Local Area Networks

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 19An organization is considering migrating a datacenter to a different operating system. Which of the followingcould the organization use to try out the new OS before making a wide-scale deployment?

A. Virtual PBXsB. Virtual SwitchesC. Virtual ServersD. Virtual Desktops

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 20Which of the following servers would MOST likely be placed in a DMZ?

115

A. Proxy ServerB. Web ServerC. File ServerD. Intranet Server

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 21Zach, a user, logs into a system and automatically has access to other network resources without having to login again. Which of the following is MOST likely implemented at Zach's location?

A. Biometric authenticationB. Single sign-onC. 802.1x access controlD. Two-factor authentication

Page 150: N10-005-By BawlsDeep

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 22IPSec relies on which of the following protocols? (Select TWO).

A. ESPB. EAPC. AHD. PKIE. RDP

Correct Answer: ACSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 23Which of the following commands displays the routing table on a server or workstation?

116

A. nbtstatB. routeC. tracerouteD. nmap

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 24A new firewall was recently installed blocking SMTP traffic. As a result, no one has Internet access. Which ofthe following has MOST likely occurred?

A. Port security is blocking all traffic.B. An IDS is blocking all traffic.C. Implicit deny is blocking all traffic.D. SMTP is blocking all traffic.

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

Page 151: N10-005-By BawlsDeep

QUESTION 25An organization has installed a new firewall. Users need to have access to remote websites and must be ableto use SSH to retrieve files from remote locations. Which of the following actions should be taken on the newfirewall? (Select TWO).

A. Allow UDP port 21 outboundB. Allow UDP port 22 outboundC. Allow UDP port 80 outboundD. Allow TCP port 21 outboundE. Allow TCP port 22 outboundF. Allow TCP port 80 outbound

Correct Answer: EFSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 26117 Lisa, an administrator, must connect to a remote UNIX server securely. Which of the following would be theMOST secure connection method?

A. FTPB. PPPC. TelnetD. SSH

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 27How many collision domains and broadcast domains are present on a 24-port switch with no VLANassignments?

A. 1 collision domain, 1 broadcast domainB. 1 collision domain, 24 broadcast domainsC. 24 collision domains, 1 broadcast domainD. 24 collision domains, 24 broadcast domains

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 28Which of the following commands could Lisa, a network administrator, use to determine the IP address of aUNIX server?

Page 152: N10-005-By BawlsDeep

A. ifconfigB. nbtstatC. ipconfigD. netstat

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 29118 Users report that an internal web server is not responding. Which of the following commands could be used onthe server to confirm that the web service is running?

A. nbtstatB. tracerouteC. nslookupD. netstat

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 30Kim, a network administrator, is attempting to join a workstation to a domain. Which of the following commandswould assist Kim in determining the computer name of the workstation? (Select TWO).

A. nbtstatB. net statisticsC. tracerouteD. netstatE. nslookup

Correct Answer: ABSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 31When configuring a wireless access point, Zach, a network administrator, needs to determine the MAC addressof a local printer. Which of the following commands would be MOST helpful in determining the MAC address?

A. pingB. arpC. routeD. dig

Page 153: N10-005-By BawlsDeep

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

119

QUESTION 32After a router upgrade, Jeff, the network administrator, needs to determine if workstations still have the correctdefault gateway. Which of the following commands could he use? (Select TWO).

A. netstatB. ipconfigC. digD. tracerouteE. nbtstat

Correct Answer: ABSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 33Kim, an administrator, has detected a worm spreading throughout the network. Which of the following ACLscan be configured on a Layer2 switch port to mitigate the attack?

A. Drop 19:21:68:10:20:00B. Permit ::1/32C. Permit A0:H1:B0:90:1D:6CD. Drop 192.168.10.20

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 34Which of the following MUST be used to implement a wireless network supporting EAP-TTLS?

A. KerberosB. Two factor authenticationC. CHAPD. PKI

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

Page 154: N10-005-By BawlsDeep

120

QUESTION 35After installing a SOHO wireless router, Jeff, the network administrator, notices that all internal RFC 1918 IPaddresses are being logged by an Internet web server as coming from the router's public interface IP address.Which of the following must Jeff implement to assign a different public IP from the router's public interface IPaddress to one of the workstations in the office?

A. NATB. PATC. DMZD. ACL

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 36Which of the following OSI layers is responsible for encrypting HTTPS traffic?

A. 3B. 4C. 5D. 6

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 37After running a CAT6 cable from the maintenance office 80 floors above the network closet, users are reportinglack of connectivity. Which of the following is the MOST likely cause?

A. Cable placementB. CrosstalkC. Bad wiringD. Cable length

121

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 3800:12:34:56:78 can be used in which of the following?

Page 155: N10-005-By BawlsDeep

A. WPA-PSK passwordB. Channel selectionC. WEP keyD. MAC filtering

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 39Lisa, a network administrator, must implement a wireless security encryption protocol that supports the AEScipher. Which of the following should be implemented?

A. WEPB. TKIPC. WPA2D. WPA Enterprise

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 40Lisa, a technician, is testing a CAT6 cabling run. The speed of the cable is showing 100Mbps instead of 1Gbps.Which of the following is the reason?

A. Bad connectorsB. TX/RX reversedC. Packet lossD. Distance

122

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 41Kim, a technician, is installing network cables for an office building. Some of the cables are not showing activeon the switch even when moved to different ports. Which of the following is MOST likely the cause?

A. Port speed mismatchB. Faulty F-connectorsC. Bad wiringD. Bad switch

Correct Answer: C

Page 156: N10-005-By BawlsDeep

Section: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 42When running cable in an office building, which of the following should Zach, a technician, consider to helpreduce EMI?

A. Cable distanceB. Cable placementC. Connector typesD. PoE devices

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 43Lisa, a technician, would like to look at the current configuration of a NIC. Which of the following would she useto view this information?

A. pingB. msconfigC. route

123 D. ipconfig

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 44Kim, a technician, has opened ports on the firewall to route to specific devices. Which of the following did sheMOST likely setup?

A. Deep packet inspectionB. DDNSC. Port forwardingD. DMZ

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 45

Page 157: N10-005-By BawlsDeep

Which of the following protocols is used by the ping command?

A. SMTPB. ICMPC. TFTPD. ARP

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 46Which of the following could be BEST described as multiple operating system environments running at thesame time on a single physical server?

A. Traffic ShapingB. VirtualizationC. Load Balancing

124 D. VPN tunneling

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 47Which of the following wiring components is used to move the point of entry from a Telco service provider to adifferent location in a building?

A. CSUB. MDFC. Smart jackD. Demarc extension

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 48Jeff, a user, is having intermittent connectivity problems. The technician discovers that the network cable fromJeff's desktop is run next to a user's desk where a large file cabinet has been placed on top of the wire. Whichof the following is the MOST probable cause of the intermittent connectivity problems?

A. Split cablesB. DB lossC. EMI

Page 158: N10-005-By BawlsDeep

D. TX/RX reversed

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 49Zach, a user, cannot access the Internet. A similar problem occurred several times last week to other users,and the solution was to reboot each workstation. As the first step, the technician reboots the workstation and itdoes not solve the problem. Which of the following should have been done instead?

125

A. Change the DNS server IP on the clientB. Information gatheringC. Change the workstation IP addressD. Establish a plan of action

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 50Kim, a user, has an important video conference at her cubicle in 30 minutes and Wi-Fi is not working on adedicated laptop. There is an available RJ-45 jack at Kim's cubicle. Which of the following is the FASTESTsolution to implement to get Kim working at her cubicle?

A. Disable SSID broadcastingB. Move the WAP closer to the userC. Use WEP instead of WPAD. Use a wired connection

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 51In which of the following would Lisa, a technician, find the LARGEST number of 110 block patch panels?

A. MDFB. Caching enginesC. DemarcD. IDF

Correct Answer: ASection: (none)Explanation

Page 159: N10-005-By BawlsDeep

Explanation/Reference:Explanation:

QUESTION 52Which of the following is the BEST encryption protocol to use to allow customers to access a secure websitefrom the Internet without using VPNs?

126

A. IPSecB. TLSC. SSL version 1D. SSL version 2

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 53Which of the following wireless security measures, although widely implemented, does not provide strongsecurity?

A. IPSecB. WPA2C. MAC address filteringD. 802.1x

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 54After Kim, a new user, moves furniture into a cubicle, the computer does not connect to the network any longer.Which of the following would be the MOST likely reason? (Select TWO).

A. Bad Ethernet switch portB. TX/RX reversedC. Bad connectorsD. Bad patch cableE. Mismatched MTU

Correct Answer: CDSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 55

Page 160: N10-005-By BawlsDeep

Lisa, a technician, is troubleshooting a problem with a managed network switch. She determines the resolutionto the problem is beyond her experience level. Which of the following should Lisa do

127 NEXT?

A. Question usersB. Test the theoryC. Re-establish a theory of probable causeD. Escalate the problem

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 56Which of the following connector types would MOST likely be found with an analog phone system utilizingCAT3 cabling?

A. BNCB. SCC. RJ-45D. RJ-11

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 57Kim, a technician, suspects an attacker has accessed the network. Which of the following would BEST helpconfirm her theory?

A. SNMPB. Traffic analysisC. Network snifferD. System logs

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 58128 Zach, a technician, notices a newly installed CAT5 cable is longer than the standard maximum length. Which ofthe following problems would this MOST likely cause?

A. Split cable

Page 161: N10-005-By BawlsDeep

B. EMIC. DB lossD. Crosstalk

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 59Which of the following wiring standards has both ends colored as follows: orange-white, orange, green-white,blue, blue-white, green, brown-white, brown?

A. T568AB. T568BC. Multimode fiberD. Crossover

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 60Zach, a technician, working remotely cannot connect to the database server. The server does not respondwhen he tries to ping it. Zach wants to determine which network device is preventing ping from responding.Which of the following commands should he use to determine this?

A. tracertB. nslookupC. digD. ipconfig

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:

129

QUESTION 61Which of the following could be installed to allow a home user with one desktop computer to economically haveInternet access in every room in the house?

A. Fiber opticB. CAT6C. Broadband over powerlineD. CAT5

Page 162: N10-005-By BawlsDeep

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 62Which of the following connectors push and twist on?

A. STB. LCC. MTRJD. SC

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 63Which of the following would be used to supply Internet to a cable modem?

A. RJ-11 connectorB. RJ-45 connectorC. F-connectorD. BNC connector

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 64130 Which of the following 802.11 standards transmits the signals the GREATEST distance?

A. aB. bC. gD. n

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 65Which of the following 802.11 standards is MIMO used in?

Page 163: N10-005-By BawlsDeep

A. aB. bC. gD. n

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 66After moving office furniture around a user can no longer connect to the network. Which of the following isMOST likely the reason for the problem?

A. TX/RX reversedB. Split cablesC. CrosstalkD. DB loss

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 67Which of the following wireless encryption methods provides the LEAST amount of security?

131

A. WEPB. WPAC. WPA2 EnterpriseD. WPA PSK

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 68Which of the following wireless authentication methods provides the GREATEST amount of security?

A. WEPB. WPA EnterpriseC. WPA PersonalD. WPA2 Personal

Correct Answer: BSection: (none)

Page 164: N10-005-By BawlsDeep

Explanation

Explanation/Reference:Explanation:

QUESTION 69STP prevents which of the following problems?

A. Collision domainsB. Switching loopsC. Broadcast stormsD. Routing loops

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 70Antenna gain is measured in which of the following units?

A. dBi132

B. GHzC. mWD. MHz

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 71Which of the following fiber types is MOST often used indoors?

A. PlenumB. Modal conditioningC. MultimodeD. Singlemode

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 72Which of the following types of fiber connectors is used on an SFP?

A. MTRJ

Page 165: N10-005-By BawlsDeep

B. LCC. SCD. ST

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 73Horizontal cable is terminated on which device in the wiring closet?

A. DemarcB. SwitchC. Punch down tool

133 D. Patch panel

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 74Which of the following are fiber connectors? (Select TWO).

A. LCB. MTRJC. BNCD. T1E. DB-9

Correct Answer: ABSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 75Which of the following is the standard 802.11g channel separation?

A. 11 MHzB. 20 MHzC. 54 MHzD. 20 GHz

Correct Answer: BSection: (none)Explanation

Page 166: N10-005-By BawlsDeep

Explanation/Reference:Explanation:

QUESTION 76Which of the following devices is installed by a telecommunications company to deliver a T1 or E1?

A. Smart jackB. CSU/DSUC. 66 block

134 D. Modem

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 77Zach, a technician, wants to provide the MOST wireless security on the LAN but does not have a RADIUSserver. Which technology should be used?

A. PEAPB. WPA PersonalC. WPA2 EnterpriseD. WPA2 PSK

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 78802.3 defines which of the following LAN access methods?

A. CSMA/CAB. CSMA/CDC. DSLD. MPLS

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 79Which of the following technologies allows more than two transceivers with an access point?

A. MIMOB. FIFO

Page 167: N10-005-By BawlsDeep

C. 802.1xD. WPA

135

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 80A patch cable terminated with one end as T568A and the other as T568B will create which of the followingcable types?

A. CrossoverB. SerialC. Roll overD. Straight through

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 81Which of the following will a firewall NOT protect the network from?

A. IntrusionB. DDoSC. Denial of ServiceD. Spam e-mails

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 82Which of the following provides an audit trail of user actions?

A. AuthorizationB. IdentificationC. AccountingD. Authentication

Correct Answer: CSection: (none)Explanation

Explanation/Reference:

Page 168: N10-005-By BawlsDeep

136

Explanation:

QUESTION 83Which of the following is a standard measure of signal power?

A. MHzB. mipsC. dBmD. Gbps

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 84Which of the following would Jeff, a technician, use for a service that needs fast communication and isunaffected by packet loss?

A. UDPB. ARPC. ICMPD. TCP

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 85Which of the following connectors would be found on a fiber optic cable?

A. BNCB. RJ-11C. RS-232D. MTRJ

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

137

QUESTION 86Which of the following circuits provides the MOST bandwidth?

A. T3

Page 169: N10-005-By BawlsDeep

B. OC3C. T1D. PRI

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 87Jeff, a technician, is shown a machine that has historical charts of traffic levels for all server and routerinterfaces. Which of the following is MOST likely used as a source for creating the charts?

A. SNMPB. Port scannerC. Traffic snifferD. SYSLOG

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 88Which of the following technologies is associated with the DOCSIS standard?

A. CableB. DialupC. WirelessD. Cellular

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:

138

QUESTION 89Jeff, a network technician, has been asked to add a web server and email server to the company's network.The company's stateful firewall must remain in place to prevent any external originating traffic from entering theinternal network segment. Which of the following is the BEST solution to ensure protecting the internal networkand implementing the new servers?

A. Block all TCP Port 80 trafficB. Enable WPA encryptionC. Create a DMZD. Add an implicit deny to the firewall

Page 170: N10-005-By BawlsDeep

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 90Which of the following is a contention based broadcast technology used for wireless networking?

A. CSMA/CAB. CSMA/CDC. CSU/DSUD. TCP/IP

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 91Jeff, a network technician, needs to connect to a computer in a factory environment 250 meters (820 feet) fromthe IDF. Which of the following LAN technologies would be BEST to use?

A. 100BaseFXB. 10GBaseTC. MPLSD. Coaxial

Correct Answer: ASection: (none)Explanation

Explanation/Reference:139

Explanation:

QUESTION 92Lisa, a network technician, is troubleshooting connectivity to a server at a remote office. Which of the followingutilities should be used to locate the network issue?

A. ipconfigB. arpC. tracertD. netstat

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

Page 171: N10-005-By BawlsDeep

Topic 5, Volume E

QUESTION 93Which of the following are components of IPSec? (Select TWO).

A. AHB. ESPC. SSHD. ICAE. TLS

Correct Answer: ABSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 94In IPSec, which of the following is an agreement on how devices will securely transmit information?

A. SAB. ESPC. AHD. ISAKMP

140

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 95An organization recently installed a firewall on the network. Employees must have access to their workcomputer from their home computer. In which of the following ways should the firewall be configured?

A. Allow TCP port 3389 outboundB. Allow UDP port 3389 inboundC. Allow UDP port 3389 outboundD. Allow TCP port 3389 inbound

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 96An organization recently installed a firewall on the network. Employees must be able to send and receive emailfrom a POP3 server. In which of the following ways should the firewall be configured? (Select TWO).

A. Allow TCP port 23

Page 172: N10-005-By BawlsDeep

B. Allow TCP port 25C. Allow TCP port 110D. Allow UDP port 25E. Allow UDP port 110

Correct Answer: BCSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 97Which of the following OSI model layers is responsible for data encryption?

A. ApplicationB. Presentation

141 C. PhysicalD. Data Link

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 98Lisa, a technician, replaced the CAT6 cable from the server to the patch panel. Before the cable was replaced,there were no issues with connectivity. Immediately after the cable was replaced, users report that they areunable to access a database application on the server. Which of the following is the MOST likely reason for theinaccessibility?

A. Lisa used a short patch cable.B. Lisa used a cable with an RJ-45 connector.C. Lisa used a crossover cable.D. Lisa used a patch cable that was over 50 meters long.

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 99Which of the following exterior routing protocols uses an algorithm to determine the quickest route to adestination?

A. RIPB. OSPFC. BGPD. RIPv2

Page 173: N10-005-By BawlsDeep

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 100Which of the following is occurring when Jeff, an employee, unintentionally gives information that is usedmaliciously?

142

A. TailgatingB. DoS attackC. DDoS attackD. Social engineering

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 101Which of the following OSI model layers is used for logical addressing?

A. PhysicalB. TransportC. NetworkD. Data link

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 102Which of the following attacks creates a buffer overflow to stop access to a system?

A. Blue jackingB. DoSC. NetstatD. Man-in-the-middle

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 103

Page 174: N10-005-By BawlsDeep

Please refer to the attached exhibit.

143

Which of the following types of configuration management documentation is represented?

A. Network security policyB. Network baselineC. Logical network diagramD. Wiring schematic

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

Page 175: N10-005-By BawlsDeep

QUESTION 104In which of the following layers of the OSI model does the TCP protocol operate?

A. SessionB. NetworkC. Data linkD. Transport

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

144

QUESTION 105Which of the following basic devices blocks ports and can sometimes filter data?

A. RepeaterB. HubC. FirewallD. Switch

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 106At which of the following layers of the OSI model does an unmanaged switch operate?

A. Layer 1B. Layer 2C. Layer 3D. Layer 4

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 107Which of the following devices will monitor for propagating worms?

A. FirewallB. Proxy serverC. Mail serverD. IDS

Page 176: N10-005-By BawlsDeep

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

145

QUESTION 108Which of the following is an authentication, authorization, and accounting method that provides administrativeaccess to network devices?

A. PKIB. TACACS+C. CHAPD. SSH

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 109Which of the following network tools is used to identify running services on host devices?

A. IDSB. IPSC. FirewallD. NMAP

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 110Which of the following security devices is used in providing packet and MAC address filtering services for thenetwork?

A. Host-based proxy serverB. Network-based firewallC. IDSD. IPS

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

Page 177: N10-005-By BawlsDeep

146

QUESTION 111Which of the following would Kim, a technician, use in voice over IP communications?

A. SNTPB. SCPC. SMTPD. SIP

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 112Which of the following is the MOST appropriate to use when routing Internet traffic through multiple ISPconnections?

A. BGPB. SNATC. RIPD. GPG

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 113Which of the following protocols allows more than three non-overlapping channels?

A. 802.11aB. 802.11gC. 802.1qD. 802.15

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 114147 Which of the following represents the physical address of a network access card?

A. FF01:D2:C4:87::11B. 00-30-48-83-9B-C8

Page 178: N10-005-By BawlsDeep

C. 08-9D-35-22-L2-34-FF-21D. 2D1A:C3:0:1C3B:2AD:FF:FEBE:9D3A

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 115ADSL, PPP, and ATM all operate at which of the following layers of the OSI model?

A. Layer 1B. Layer 2C. Layer 4D. Layer 7

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 116Which of the following OSI layers BEST describes where an HTTP proxy operates?

A. TransportB. ApplicationC. PresentationD. Session

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 117Which of the following would be MOST useful to alert Jeff, an administrator, that a denial of service attack isoccurring?

148

A. RASB. RDPC. IDSD. VPN

Correct Answer: CSection: (none)Explanation

Page 179: N10-005-By BawlsDeep

Explanation/Reference:Explanation:

QUESTION 118A MAC address is used at which of the following layers of the OSI model?

A. Layer 1B. Layer 2C. Layer 3D. Layer 4

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 119Multimode fiber should be used in place of copper when:

A. distances are short.B. EMI is a concern.C. PoE is necessary.D. the switch has BNC connectors.

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 120Zach, an administrator, needs to install a new 100 foot (30 meter) cable run from an IDF switch to the MDF,through a room that has a large number of motors. Which of the following would be the BEST cable type tochoose?

149

A. CAT3B. STPC. CoaxialD. Fiber

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 121A network device is more than 100 meters (328 feet) from a 24-port copper switch. Which of the following canbe used to connect the device to the network?

Page 180: N10-005-By BawlsDeep

A. Fiber multiplexerB. RepeaterC. AttenuatorD. OTDR

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 122Which of the following regulates the amount of network traffic a single node receives in a server cluster?

A. Load balancerB. Proxy serverC. Content filterD. Quality of service

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 123Lisa, an administrator, wants to limit the wireless guest network traffic to 100Kbps so that utilization issues donot occur on the company's T1 Internet access network. Which of the following optimizations should Lisaimplement?

150

A. Load balancingB. Caching engineC. Traffic shapingD. Quality of service

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 124Which of the following evaluates packet payload when detecting network threats?

A. IPSB. Proxy serverC. Caching serverD. Content filter

Correct Answer: A

Page 181: N10-005-By BawlsDeep

Section: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 125A disassociation request is a way to mitigate which of the following threats?

A. ARP poisoningB. Rogue APC. Man-in-the-middle attackD. Botnet

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 126A crossover cable is MOST commonly associated with which of the following layers of the OSI model?

A. Session151

B. ApplicationC. NetworkD. Physical

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 127Which of the following documents will allow Kim, an administrator, to determine a change from the standarddefault system configuration?

A. BaselineB. Physical network diagramC. Wiring schematicD. Logical diagram

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 128Which of the following capabilities of a firewall allows Zach, an administrator, to block traffic based on keywords determined by the company?

Page 182: N10-005-By BawlsDeep

A. Stateless traffic monitorB. Stateful traffic monitorC. Signature identificationD. Content filter

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 129Which of the following allows a malicious attacker to view network traffic if the attacker is on the same networksegment as Jeff, an administrator?

152

A. DoS attackB. Man-in-the-middle attackC. Smurf attackD. Xmas attack

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 130Which of the following cable types would have the LEAST amount of EMI?

A. CAT3B. CAT5C. STP CAT6D. Plenum CAT6

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 131Which of the following WAN technologies uses four wires for digital and a 66 block?

A. CableB. ATMC. T3D. POTS

Correct Answer: D

Page 183: N10-005-By BawlsDeep

Section: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 132Which of the following has the HIGHEST data rate speed?

A. T1B. ADSL

153 C. SDSLD. OC-3

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 133Which of the following is designed to be used with multimode fiber over short wavelengths?

A. 10GBaseLWB. 10GBaseERC. 10GBaseSWD. 10GBaseLR

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 134Kim, an administrator, wants to list all the network connections to and from the server. Which of the followingcommands would MOST likely be used?

A. tracerouteB. pingC. ipconfigD. netstat

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 135Kim, an administrator, finds a phone line but does not know where the line goes or if it is active. Which of thefollowing can be used to test if it is active?

Page 184: N10-005-By BawlsDeep

A. Butt setB. Punch down tool

154 C. Cable testerD. Cable stripper

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 136Which of the following is used to verify configuration updates on a firewall?

A. Signature identificationB. Access control listsC. Scanning servicesD. Content filtering

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 137Which of the following sizes is the fixed cell length in ATM?

A. 8 bytesB. 53 bytesC. 64 kilobytesD. 128 kilobytes

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 138Which of the following devices should Jeff, an administrator, connect to a protocol analyzer in order to collect allof the traffic on a LAN segment?

A. HubB. VLANC. Router

155 D. Server

Correct Answer: A

Page 185: N10-005-By BawlsDeep

Section: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 139In the 2.4GHz range, which of the following channel combinations are non-overlapping?

A. 1, 6, 11B. 2, 7, 10C. 2, 8, 13D. 3, 6, 9

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 140Which of the following tools would Zach, an administrator, use to identify opens and shorts?

A. OhmmeterB. Protocol analyzerC. Cable testerD. Multimeter

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 141Which of the following technologies relies on a ticket granting server to allow clients to verify their identity?

A. TACACS+B. KerberosC. PKID. RADIUS

156

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 142Which of the following is used to transfer files between computers?

A. FTP

Page 186: N10-005-By BawlsDeep

B. DHCPC. ARPD. NTP

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 143Lisa, an administrator, determines there are an excessive number of packets being sent to a web serverrepeatedly by a small number of external IP addresses. This is an example of which of the following attacks?

A. DDoSB. VirusesC. WormsD. Man-in-the-middle

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 144Which of the following authenticates, allows, and controls the execution of router commands?

A. PKIB. RADIUSC. KerberosD. TACACS+

157

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 145Which of the following is true of NIPS?

A. Routes traffic to the proper portB. Detects malicious host trafficC. Detects and prevents harmful trafficD. Prevents traffic on network hosts

Correct Answer: CSection: (none)Explanation

Page 187: N10-005-By BawlsDeep

Explanation/Reference:Explanation:

QUESTION 146A user's new computer is not able to connect to the network at all. Upon further investigation, Kim, theadministrator, finds that the wall jack is terminated with a 568B configuration. After locating the correct cable inthe IDF, which of the following is the MOST likely cause of the problem?

A. Other end of the cable is terminated with a 568B configurationB. Trunk port on the switch is disabledC. Other end of the cable is terminated with a 568A configurationD. Wall jack needs to be replaced with a smart jack

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 147Which of the following network access methods is the MOST secure?

A. PPPoEB. SIPC. RSHD. IPSec

158

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 148Lisa, a technician, is reporting wireless transmission speeds of 300Mbps. Which of the following wirelessstandards is being used?

A. 802.11aB. 802.11bC. 802.11gD. 802.11n

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 149Which of the following handles HTTP requests on behalf of the client?

A. Bandwidth shaper

Page 188: N10-005-By BawlsDeep

B. DNS serverC. Proxy serverD. Load balancer

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 150The selection of the correct punch down tool to use depends on which of the following?

A. Connector typeB. Demarcation point locationC. Block typeD. Switch location

Correct Answer: CSection: (none)Explanation

Explanation/Reference:159

Explanation:

QUESTION 151Which of the following services do TCP connections provide to application layer protocols? (Select TWO).

A. Transport services without error recoveryB. Large data size manageability using segmentationC. Secure Kerberos password encryption on dataD. Delivery through error recoveryE. Proxy server authentication

Correct Answer: BDSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 152Which of the following devices monitors and reroutes malicious traffic being sent to a host?

A. Bandwidth shaperB. IPSC. DNS serverD. Load balancer

Correct Answer: BSection: (none)Explanation

Page 189: N10-005-By BawlsDeep

Explanation/Reference:Explanation:

QUESTION 153Which of the following devices will allow Lisa, a user, to see a cached copy of websites?

A. Content switchB. DNS serverC. Proxy serverD. Load balancer

Correct Answer: CSection: (none)Explanation

Explanation/Reference:160

Explanation:

QUESTION 154Kim, a user, reports that the web browser is indicating the site certificate is not trusted. Which of the followingattacks may be in progress?

A. Man-in-the-middleB. Denial of serviceC. Ping floodingD. Smurfing

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:

Page 190: N10-005-By BawlsDeep

Exam E

QUESTION 1Which of the following uses a ring topology?

A. DSLB. EthernetC. DOCSISD. SONET

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 2Which of the following has a DB-9 connector?

A. SCB. RS-232C. LCD. RJ-45

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

161

QUESTION 3Which of the following technologies is used to connect public networks using POTS lines?

A. OC3B. OC12C. PSTND. Cable

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 4Users are unable to access the company's intranet website. Which of the following attacks has the networkMOST likely experienced?

A. Man-in-the-middleB. Smurf

Page 191: N10-005-By BawlsDeep

C. TrojanD. DoS

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 5Which of the following defines access for a network?

A. ACLB. RDPC. RASD. ARP

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:

162

QUESTION 6Which of the following is a form of encrypting packets for safe, secure data transmission within a network?

A. RASB. PPTPC. IPSecD. ICA

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

http://www.gratisexam.com/

QUESTION 7Which of the following is the BEST method to ensure network performance on a VoIP network?

A. Traffic shapingB. Quality of service

Page 192: N10-005-By BawlsDeep

C. Load balancingD. Caching engines

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 8Which of the following tools would Lisa, an administrator, use to determine if there is a problem with atelephone line?

A. Port scannerB. Punch down toolC. Butt setD. Toner probe

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

163

QUESTION 9Which of the following tools would BEST be used to verify if a network cable is properly terminated?

A. MultimeterB. Cable certifierC. Toner probeD. Cable stripper

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 10Kim, an administrator, would like to inspect all traffic flowing over the SMTP protocol on a given network. Whichof the following tools would accomplish this? (Select TWO).

A. Packet snifferB. HoneypotC. Port mirroringD. IPSE. Port scannerF. IDS

Correct Answer: AC

Page 193: N10-005-By BawlsDeep

Section: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 11Which of the following colors represents the outer leads on a connector head of a 568B patch cable? (SelectTWO).

A. Blue, brown/whiteB. Green/white, blueC. Orange/white, orangeD. Blue, blue/whiteE. Brown/white, brown

164

Correct Answer: CESection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 12Kim, an administrator, has created a patch cable. Which of the following tools should she use to check theintegrity of the cable?

A. Protocol analyzerB. Toner probeC. Cable certifierD. Cable stripper

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 13PKI is a method of user authentication which uses which of the following?

A. Various router commandsB. Access control listsC. Certificate servicesD. A RADIUS server

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 14

Page 194: N10-005-By BawlsDeep

Kim and Zach, attackers, use which of the following network scanners to see the protocols that are being used?(Select TWO).

A. IDSB. Packet snifferC. Port scannersD. Malware scannerE. Ping sweep

165

Correct Answer: BCSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 15Lisa, an administrator, believes that the network has been attacked and MAC addresses have been capturedallowing unauthorized computers to access the network. Which of the following tools did the attackers MOSTlikely use to accomplish this?

A. Intrusion prevention softwareB. Packet snifferC. Intrusion detection softwareD. Port scanner

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 16Lisa, an administrator, believes that the network has been attacked and there is no known definition orprevention method to help avoid this attack. Which of the following BEST describes this scenario?

A. Zero day attackB. DDoSC. DoSD. SQL injection

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 17Kim, an administrator, wants to verify which protocols are in use on the network. Which of the following toolsshould she use?

A. Intrusion detection software

Page 195: N10-005-By BawlsDeep

B. PoE166

C. Packet snifferD. Intrusion prevention software

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 18Lisa, an administrator, needs to install a wireless network that will allow legacy devices to connect to thenetwork and also offer both 5GHz and 2.4GHz frequencies. Which of the following would BEST describe thetype of WAP needed?

A. 802.11aB. 802.11bC. 802.11gD. 802.11n

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 19Which of the following is the MAXIMUM distance a single 1000BaseT segment can cover?

A. 100 kilometers (62 miles)B. 10 kilometers (6 miles)C. 1000 meters (3281 feet)D. 100 meters (328 feet)

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 20Which of the following is the MAXIMUM distance of a CAT5e cable on a single run when using Ethernet?

A. 1000 meters (3281 feet)167

B. 323 meters (1060 feet)C. 512 meters (1680 feet)D. 100 meters (328 feet)

Correct Answer: DSection: (none)

Page 196: N10-005-By BawlsDeep

Explanation

Explanation/Reference:Explanation:

QUESTION 21Which of the following wireless standards operates on the same frequency as 802.11a?

A. Compatible with 802.11b wireless networksB. Compatible with 802.11g wireless networksC. Compatible with 802.11i wireless networksD. Compatible with 802.11n wireless networks

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 22Which of the following components would a technician plug into a smart jack?

A. 25 pair cableB. 100 pair cableC. Patch cableD. Patch panel

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 23Which of the following is used by RADIUS to encrypt messages between the server and the client?

A. Public keyB. CSU/DSU

168 C. Private keyD. Shared secret

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 24Which of the following security measures is the LEAST intrusive on an end device?

A. NIPS

Page 197: N10-005-By BawlsDeep

B. Host-based firewallC. AntivirusD. HIDS

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 25Which of the following physical network topologies is MOST likely to be used in an FDDI network?

A. StarB. MeshC. BusD. Ring

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 26Which of the following network scanners detects and sends out alerts for malicious network activity?

A. Packet sniffersB. IDSC. Port scanners

169 D. IPS

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 27Which of the following connectors push and twist-on?

A. LCB. SCC. STD. RJ-45

Correct Answer: CSection: (none)Explanation

Explanation/Reference:

Page 198: N10-005-By BawlsDeep

Explanation:

QUESTION 28Which of the following is a social engineering attack?

A. WormsB. Man-in-the-middleC. PhishingD. Evil twin

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 29Which of the following performs posture assessments for unknown devices that connect to the network?

A. PKIB. EAPC. NACD. AAA

170

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 30Peer to peer networks are used to pass information in between which of the following?

A. Several clients to a centralized serverB. One client to anotherC. Several servers to several centralized clientsD. One client to a centralized server

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 31Which of the following threats is MOST likely to enable an attacker to modify data in transit?

A. DoSB. Smurf attackC. VirusD. Man-in-the-middle

Page 199: N10-005-By BawlsDeep

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 32Which of the following mitigation techniques is MOST effective against a DoS attack?

A. IDSB. AntivirusC. RedundancyD. Backups

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

171

QUESTION 33Which of the following solutions will detect and disable a rogue access point?

A. Port scanB. Packet snifferC. IPSD. IDS

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 34Which of the following is a valid MAC address?

A. 00:AB:C4:FE:60:D3B. 00-AE-S3-BC-90-F7C. 13-12-BC-DA-97D. 15:FA:97:44:AB

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 35

Page 200: N10-005-By BawlsDeep

Which of the following connector types will MOST likely be located on a serial cable?

A. DB-9B. LCC. STD. BNC

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:

172

QUESTION 36T568B wiring scheme is typically found on which of the following components?

A. Demarc extensionB. 66 blockC. Patch panelD. Vertical cross connect

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 37Which of the following is an encrypted remote access protocol?

A. RDPB. PoEC. RASD. PPP

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 38Port scanners and packet sniffers differ in functionality because:

A. packet sniffers and port scanners are just different names for the same device.B. packet sniffers can only log events on traffic activity and port scanners can route malicious packets.C. packet sniffers watch all traffic over certain ports and port scanners watch traffic on certain NICs.D. port scanners are limited to detecting open ports and packet sniffers watch all traffic.

Correct Answer: D

Page 201: N10-005-By BawlsDeep

Section: (none)Explanation

Explanation/Reference:Explanation:

Topic 6, Volume F

173

QUESTION 39A network topology in which the bandwidth dependency is distributed evenly amongst a large number of inter-connected clients is known as a:

A. peer-to-peer.B. bus.C. star.D. client/server.

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 40Jeff, an administrator, wishes to add a third network segment to the firewall where the company's public webservers will be placed. Which of the following BEST describes this new segment?

A. PKIB. VPNC. IPSD. DMZ

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 41Which of the following would the telecommunications carrier use to segregate customer traffic over long fiberlinks?

A. VLANB. MPLSC. VPND. PSTN

Correct Answer: BSection: (none)Explanation

Explanation/Reference:

Page 202: N10-005-By BawlsDeep

Explanation:

174

QUESTION 42Which of the following network topologies would be separated into two networks if a client in the middle isremoved or the cable is cut?

A. MeshB. RingC. BusD. Star

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

New Questions

QUESTION 43A technician discovers that a malware infection has damaged part of the Windows TCP/IP stack. Which of thefollowing commands can help repair the damage?

A. netsh lanB. netsh interfaceC. netsh wlanD. netsh winsock

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 44Which of the following devices exist as either hardware or software to assist in routing traffic? (Select TWO).

A. Cable modemB. Layer 2 switchC. RouterD. NIDSE. Layer 3 switch

Correct Answer: CESection: (none)Explanation

Explanation/Reference:175

Explanation:

Page 203: N10-005-By BawlsDeep

QUESTION 45Which of the following operates at OSI layer 2 to forward traffic based on the MAC address?

A. SwitchB. Proxy ServerC. RouterD. VPN Concentrator

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 46Please be aware that if you do not accept these terms you will not be allowed to take this CompTIA exam andyou will forfeit the fee paid.

A. RETURN TO EXAMB. EXIT EXAM

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 47The Transport Layer of the TCP/IP model corresponds to which of the following layers of the OSI model?

A. 1B. 3C. 4D. 5

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

176

QUESTION 48Which of the following is used to provide hot standby capabilities using paired routers?

A. CARPB. L2TPC. PPTPD. ISAKMP

Correct Answer: A

Page 204: N10-005-By BawlsDeep

Section: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 49Which of the following is used to assign an IP address to a device?

A. DHCPB. NTPC. DNSD. RADIUS

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 50Which of the following protocols is used to transmit outgoing email?

A. RDPB. NTPC. POP3D. SMTP

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

177

QUESTION 51A network technician is configuring a wireless network. To avoid interference from other wireless networks inthe area, the technician should change which setting?

A. ChannelB. SSIDC. Firewall ruleD. Encryption

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 52A user is unable to print to a network printer. Which of following is the FIRST step that a technician should take

Page 205: N10-005-By BawlsDeep

to troubleshoot the issue?

A. Identify the problem.B. Establish a plan of action to resolve the problem.C. Establish a theory of probable cause.D. Implement preventative measures.

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 53Which of the following is a purpose of a VLAN?

A. Decreases bandwidth on a networkB. Segments broadcast trafficC. Increases port speedD. Allows another connection to the router

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

178

QUESTION 54Which of the following would Sandy, a technician, find in a network map?

A. QoS standardsB. MDF/IDFsC. System logsD. Firewall rules

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 55Which of the following protocols would be used to send email to an email server?

A. NTPB. FTPC. SNMPD. SMTP

Correct Answer: D

Page 206: N10-005-By BawlsDeep

Section: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 56Which of the following default ports would need to be open on a firewall to allow remote desktop access?

A. 143B. 443C. 3389D. 8080

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 57179 After plugging a cable into a computer, a user reports there is no network access. Which of the following toolswould the technician MOST likely check to verify that the cable was crimped correctly?

A. Punch down toolB. Cable certifierC. Loopback plugD. Toner probe

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 58Which of the following DNS records would allow for a website to have more than one FQDN?

A. TXTB. PTRC. MXD. CNAME

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 59A small office home office (SOHO) customer is going to be replacing their switch. The customer also wants toadd a WAP in a dropped ceiling; however, there are no power outlets above the drop ceiling, but there is a

Page 207: N10-005-By BawlsDeep

CAT5e network jack. Which of the following technologies should the new switch have to allow this WAP to beplaced where the customer requests, without any other major changes to the environment?

A. PoEB. Layer 3 switchingC. STPD. VLAN

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:

180

QUESTION 60Tenants access multiple wireless networks in a building. Users report intermittent connectivity. Which of thefollowing is the MOST likely cause of the problem?

A. The channels are overlapping with other wireless networks and should be changed.B. The SSIDs are incompatible and should be renamed.C. The users have incompatible wireless network cards and should upgrade.D. The default idle period for logoff is too short and should be changed to a longer limit.

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 61Karen, a network technician, is troubleshooting in a wiring closet in 2011. The cabling to all the equipment doesnot match the documentation from 2007. Which of the following configuration management methods has beenoverlooked?

A. Change managementB. System logsC. Asset managementD. Baselining

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 62Which of the following wireless standards is capable of ONLY operating on 5.8GHz?

A. 802.11aB. 802.11b

Page 208: N10-005-By BawlsDeep

C. 802.11gD. 802.11n

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:

181

QUESTION 63Which of the following protocols are used to connect devices in a secure manner? (Select TWO).

A. TELNETB. SSHC. RDPD. HTTPE. DNSF. FTP

Correct Answer: BCSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 64Which of the following needs to be configured on a switch to use a packet sniffer?

A. Port trunkingB. Port mirroringC. Tagged VLAND. Untagged VLAN

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 65Which of the following layers of the OSI model is between the Data Link and Transport layers?

A. ApplicationB. SessionC. NetworkD. Physical

Correct Answer: CSection: (none)Explanation

Page 209: N10-005-By BawlsDeep

Explanation/Reference:Explanation:

182

QUESTION 66Which of the following utilities would a technician use to determine the location of lost packets on a routednetwork?

A. pingB. nslookupC. routeD. tracert

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 67Which of the following problems is MOST likely to arise when configuring an IPv6 over IPv4 tunnel?

A. Routing loopB. MTU black holeC. Framing errorsD. SYN flood

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 68Which of the following could be used to estimate RTT across a router?

A. digB. tracerouteC. arpD. uptime

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

183

QUESTION 69169.254.0.100 is an IP address which would MOST likely come from which of the following?

Page 210: N10-005-By BawlsDeep

A. CIDRB. DHCPC. APIPAD. DNS

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 70Which of the following will prevent switching loops by selectively shutting down switch ports?

A. RIPB. IGPC. STPD. VLAN

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 71Which of the following ports would have to be allowed through a firewall for IMAP traffic to pass on its defaultport?

A. 23B. 143C. 443D. 8080

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

184

QUESTION 72Which of the following DNS records allows for reverse lookup of a domain?

A. PTRB. AAAAC. AD. MX

Correct Answer: A

Page 211: N10-005-By BawlsDeep

Section: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 73Which of the following BEST describes the difference between layer 2 switching and layer 2 routing?

A. Switching moves packets between hosts on different subnets, and routing moves packets between hosts onthe same subnet.

B. Routing moves packets between hosts on different subnets, and switching moves packets between hostson the same subnet.

C. Both routing and switching move packets between hosts on the same subnet, but routing does so at a fasterpace.

D. Both routing and switching move packets between hosts on different subnets, but switching does so at afaster pace.

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 74After Kurt, a technician, has established a plan of action to resolve the problem, which of the following stepsshould he perform NEXT?

A. Establish a theory of probable cause.B. Implement preventative measures.C. Verify full system functionality.D. Implement the solution or escalate as necessary.

185

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 75A technician notices that network access is becoming increasingly slow. All of the activity lights, on the onlynetwork layer 2 switch, are blinking at steadily increasing rates. Which of the following is the MOST likely causeof the increased traffic?

A. STP blockingB. Duplicate IP addressesC. MTU mismatchD. Switching loop

Correct Answer: DSection: (none)Explanation

Page 212: N10-005-By BawlsDeep

Explanation/Reference:Explanation:

QUESTION 76No link lights on a switch's SFP are functioning, so the network technician re-terminates the end. After testingthe cable, the tester is showing a db loss of -9. Which of the following types of cable is MOST likely beingtested?

A. FiberB. CAT3C. CAT5eD. CAT6a

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 77Several users from the same building are reporting connectivity issues. The SFP at that building's IDF switch isshowing a link light, but there is no link light to the corresponding switch's SFP at the MDF. Which of thefollowing is the MOST likely cause?

A. A crossover cable is being used.186

B. DB loss is too high on all strands.C. Only TX or RX strand is working.D. TX and RX are reversed.

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 78VoIP is being implemented throughout a company and Joe, the network technician, needs to ensure that dataand voice traffic do not interfere with each other. Which of the following features should be configured on alayer 3 switch to prioritize traffic for VoIP?

A. VLANB. VTPC. Port securityD. QoS

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 79

Page 213: N10-005-By BawlsDeep

Joe, a user, reports that his PC is the only one that does not have network connectivity. All the wiring has beentested properly and the problem still exists. Joe is getting an APIPA address.Which of the following is the MOST likely cause?

A. Crossover cable is being usedB. Switch was powered offC. PoE is disabled on the portD. Port on the switch is disabled

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 80Which of the following tools can the technician use to analyze TCP/IP packets when trying to determine aconnection problem within a subnet?

187

A. Wire mapperB. Protocol analyzerC. Cable testerD. SYSLOG server

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 81Which of the following does the IP address 169.254.222.10 indicate?

A. No DHCP server connectivityB. The DNS server is unavailableC. Firewall issueD. Duplicate IP addresses are found

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 82Which of the following IP addresses would be classified as private?

A. 10.100.200.0B. 169.253.10.20C. 172.168.5.0

Page 214: N10-005-By BawlsDeep

D. 200.100.25.0

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 83Which of the following protocols is used to allow multiple hosts to share a common IP address?

A. HTTPS188

B. ARPC. CARPD. NAT

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 84When configuring a WAP for a SOHO, which parameter will BEST limit access to the office area?

A. Signal strengthB. SSID enableC. EncryptionD. Password hardening

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 85Joe, a technician, needs multiple networks, high speeds, and redundancy on a system. Which of the followingconfigurations should Joe consider for these requirements? (Select TWO).

A. Routing tableB. Next hopC. Port mirroringD. Port monitoringE. VLANs

Correct Answer: CESection: (none)Explanation

Explanation/Reference:

Page 215: N10-005-By BawlsDeep

Explanation:

QUESTION 86A supervisor requests that a technician downloads a MIB for a particular server. Which of the

189 following protocols requires MIBs?

A. IPSecB. SSLC. ISAKMPD. SNMP

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 87A technician replaces a customer's router, and is now unable to ping the ISP's gateway. Which of the followingshould the technician check?

A. The arp table of the new customer's router.B. The route table of the next-hop router.C. The route table of the new customer's router.D. The arp table of a network user.

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 88Joe, a user, is unable to reach websites, but is able to ping several Internet IPv4 addresses.Which of the following is the MOST likely problem?

A. Incorrect subnet maskB. Incorrect DNSC. Missing default gatewayD. Incorrect IPv6 address

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 89190 A new monitoring device is installed in the network that uses ping to determine whether critical network Internetrouters are up. After three missing pings, the alarm reports the device is down. The device is now constantly

Page 216: N10-005-By BawlsDeep

reporting alarms, yet there are no reported Internet problems from users. Which of the following is the MOSTlikely cause?

A. A missing route on the alarm device.B. Incorrect VLAN assignment on the router.C. A missing route on the network routers.D. Incorrect speed/duplex setting on the alarm device.

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 90A network technician configures a firewall to block only certain IP addresses from accessing the Internet. Allusers are reporting that they are unable to access the Internet. Which of the following is the MOST likelyreason?

A. Incorrectly configured ACLB. Implicit allow statementC. SMTP requests are being deniedD. All protocols are being allowed in

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 91Which of the following protocols is used for remote management of devices?

A. SNMPB. TFTPC. SyslogD. SMTP

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:

191

QUESTION 92A DSL modem connects to the provider's network using which of the following authentication techniques?

A. PoEB. MS-CHAPC. PPPoE

Page 217: N10-005-By BawlsDeep

D. EAP

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 93A technician needs to test the length of a newly installed cable run because it is believed that it exceeds themaximum specification length. Which of the following tools should be used?

A. Cable certifierB. Toner probeC. Cable testerD. Protocol analyzer

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 94A customer has not been using security on a wireless network and has recently received many attacks throughthis vector. Which of the following would be the MOST secure way to harden this wireless network?

A. Disable the SSIDB. WPA encryptionC. VLAN implementationD. WEP encryption

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

192

QUESTION 95Keeping an authoritative and timely record of network devices and their settings is a key activity of which of thefollowing?

A. Project managementB. Quality of serviceC. Configuration managementD. Bandwidth shaping

Correct Answer: CSection: (none)Explanation

Page 218: N10-005-By BawlsDeep

Explanation/Reference:Explanation:

QUESTION 96Which of the following diagnostic commands relies on proper forwarding of ICMP ECHO packets?

A. ifconfigB. pingC. routeD. nbtstat

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 97A network administrator suspects an employee of using the company's Internet connection to download illegalcontent. Which of the following can be used to inspect ongoing network traffic?

A. Syslog serverB. Toner probeC. OTDRD. Packet sniffer

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

193

QUESTION 98A technician is setting up a firewall on the network that would show a public IP address out to the Internet andassign private IP addresses to users inside the network. Which of the following processes should be set up?

A. Port securityB. MAC filteringC. ACLD. NAT

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 99A technician has replaced the Internet gateway router, and now no users can reach the Internet. The techniciancan ping the router Ethernet port but not the ISP's router IP address. Which of the following is the MOST likelyproblem?

Page 219: N10-005-By BawlsDeep

A. Faulty crossover cableB. DNS server is downC. Switching loopD. Outside interface shutdown

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 100The network optimization process used to allow reasonable use of data, voice, and video on the same networkinfrastructure is called:

A. CARP.B. QoS.C. traffic shaping.D. fault tolerance.

194

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 101A user wants a SOHO network to be protected from unauthorized users hacking their network. Which of thefollowing should be implemented to aide in this matter?

A. VPNB. Throughput testerC. FirewallD. OC3

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 102A user is getting very weak signals while trying to connect to the wireless. Which of the following should theuser do to help with signal strength?

A. Call the wireless provider and ask for a T3 circuit.B. Move the wireless router to a better location where line of sight is obtained.C. Reinstall the operating system to the PC to ensure the newest patches are installed.D. Install a hub to ensure there is a clear path for the cables to run.

Page 220: N10-005-By BawlsDeep

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 103A network technician performs several switch commands to enable various advanced features on the switch inthe accounting department. During the configuration changes, several users from this department reportconnectivity issues. Which of the following logs would the network technician need to analyze to troubleshootthe connectivity issues?

A. Router logsB. History logs

195 C. Startup/bootup config logsD. Event Viewer logs

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 104Which of the following TCP/IP and OSI model layers retransmits a TCP packet if it is not received successfullyat its destination?

A. The transport OSI model layer and the transport TCP/IP model layer.B. The transport OSI model layer and the Internet TCP/IP model layer.C. The network OSI model layer and the transport TCP/IP model layer.D. The network OSI model layer and the Internet TCP/IP model layer.

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 105A national cable company providing TV, telephone, and Internet service to home users over its IP network, hasbeen tracking a large increase of network bandwidth due to P2P file sharing. Which of the following should thecompany deploy to ensure excellent TV and telephone service?

A. QoSB. Load balancingC. High availabilityD. Fiber optics

Correct Answer: ASection: (none)Explanation

Page 221: N10-005-By BawlsDeep

Explanation/Reference:Explanation:

QUESTION 106A user reports a network failure on a computer. The technician determines that the computer and NIC areoperating properly. Which of the following tools can the technician use to trace the

196 network cabling back to the punch down block?

A. Protocol analyzerB. MultimeterC. Punch down toolD. Toner probe

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 107A network administrator wants to monitor traffic by deploying MIBs. Which of the follow network monitoringresources would be used?

A. SCTPB. Packet snifferC. DCCPD. SNMP

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 108A company has attempted to introduce a new major network segment to allow growth in capacity. On the coreswitch, a GBIC was used to interconnect with a newly placed downstream distribution switch for the first time.Soon after this implementation, a network flood and an outage occurred between the core and new distributionnetwork modules. Which of the following should the network administrator troubleshoot FIRST in order to rectifythe issue?

A. Check for switching loops between core and distribution switches.B. Check whether an incorrect VLAN has been assigned to the new distribution switch.C. Check for inconsistent or missing routes between the core and distribution switches.D. Check whether the GBIC was set to multi-mode instead of single-mode SFP.

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:

Page 222: N10-005-By BawlsDeep

197

QUESTION 109A network administrator is troubleshooting an intermittent network issue between devices that have aparticularly long cable run. The issue was escalated to a network designer who alluded to potential attenuationissues. Which of the following BEST describes what the network designer was referring to?

A. Bad connectorsB. Cross-talkC. EMI / InterferenceD. dB loss

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 110A network administrator notices that all of the company switches are running at capacity on a given day, whichis abnormal according to network baselines taken recently. Which tool would BEST allow the administrator toinspect what type of traffic is on the network?

A. Wire tapB. Network snifferC. Load balancing applianceD. NIPS

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 111Which of the following commands will display the associated IP address of a network adapter in Windows andLinux environments? (Select TWO).

A. digB. nslookupC. nbstatD. ifconfigE. ipconfig

Correct Answer: DESection: (none)Explanation

Explanation/Reference:198

Explanation:

Page 223: N10-005-By BawlsDeep

QUESTION 112A network technician is trying to terminate CAT5 modular jacks. Which of the following tools would be MOSTappropriate for this scenario?

A. CrimperB. OTDRC. Throughput testerD. Punch down tool

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 113Which of the following media types can carry a standard Ethernet signal for network connectivity?

A. USBB. ParallelC. SerialD. CAT6

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 114A network technician is installing a simple SOHO router with wireless functionality. Which of the followingwireless encryption standards would be BEST suited for the HIGHEST level of security?

A. WPA2B. WPAC. WEP64D. WEP128

Correct Answer: ASection: (none)Explanation

Explanation/Reference:199

Explanation:

QUESTION 115A technician is looking to secure an entire network by blocking all non-essential ports. Which of the followingdevices would BEST provide this functionality?

A. FirewallB. Honeynet

Page 224: N10-005-By BawlsDeep

C. IDSD. IPS

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 116CAT6 Ethernet cabling has a rated maximum transmission capability of:

A. 10MbpsB. 100MbpsC. 20,000MbpsD. 10,000Mbps

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 117A customer wishes to network several computers throughout a large warehouse containing numerous metalshelves and concrete walls. The computers are at least 175 meters (574 feet) apart. Which of the followingmedia types should be recommended for the customer using only a single switch?

A. Fiber opticB. WirelessC. CAT5eD. CAT3

200

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 118Which of the following should be implemented in a networked environment carrying teleconferencing packets?

A. L2TPB. SSHC. QoSD. SNMP

Correct Answer: CSection: (none)Explanation

Page 225: N10-005-By BawlsDeep

Explanation/Reference:Explanation:

QUESTION 119A technician wants to connect a new wireless router to a main network switch. Which of the following cabletypes would MOST likely be used to establish this connection?

A. TelephoneB. ParallelC. SerialD. CAT6

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 120A technician needs to verify an Ethernet run is functioning properly. Which of the following tools should beused?

A. Protocol analyzerB. CrimperC. Cable testerD. Punch down tool

201

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 121Which of the following methods limits access to a network based on characteristics of the network card?

A. IP filteringB. MAC filteringC. Port filteringD. Encryption

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 122A router operates at which of the following layers of the OSI model?

A. Layer 2

Page 226: N10-005-By BawlsDeep

B. Layer 3C. Layer 4D. Layer 5

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 123An organization wants to perform maintenance on any of its web servers without affecting the serviceavailability during a scheduled change window. Which of the following network devices would be required toprovide this functionality?

A. RouterB. Forward proxyC. Load balancerD. Firewall

202

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 124Which of the following is an example of two factor authentication?

A. Password, device certificate and PINB. SSL web server certificate and passwordC. User password and administrator passwordD. Password and hardware token OTP

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 125Which of the following protocols are used for accessing a command line terminal session for managementpurposes? (Select TWO).

A. TelnetB. FTPC. SNMPD. SSHE. RDP

Correct Answer: AD

Page 227: N10-005-By BawlsDeep

Section: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 126The software in a virtualized environment that controls resource allocation and allows multiple operating systemguests to run on the same physical platform is known as the:

A. HypervisorB. LPAR.C. BrokerD. VDI.

203

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 127Which of the following communication modes has the LOWEST overhead necessary to support streamingprotocols such as RTP?

A. ConnectionlessB. StatefulC. Full DuplexD. Quality of Service

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 128A network technician is troubleshooting intermittent issues with VoIP call quality. A throughput tester can helpassess the functionality of which of the following?

A. LLDPB. VLAN taggingC. QoSD. SIP trunking

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 129

Page 228: N10-005-By BawlsDeep

A network technician wants to baseline traffic flows on a specific network. Which of the following will provide theGREATEST level of detail?

A. Network flow informationB. SNMP trapsC. Debug level syslogD. Protocol analyzer

204

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 130An administrator is setting up a secure wireless network. The administrator decides to support 802.11n and802.11g with a WPA2 pre-shared key. Users are given the SSID with the pre-shared key, but the administratorhas disabled the SSID broadcast and MAC filtering. Some users have reported connection issues. Which of thefollowing would MOST likely resolve the users' connection issues?

A. Limit the devices to 802.11n onlyB. Enable the SSID broadcastC. Enable MAC filteringD. Use a WEP 128-bit key

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 131Which of the following devices can be used to offload outbound web server SSL encryption overhead?

A. NIPSB. Proxy serverC. Content filterD. VPN concentrator

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 132An administrator is troubleshooting analog telephony issues on the punch down block. Which of the followingtools would be MOST useful in this scenario?

A. T1 loopback205

B. Butt set

Page 229: N10-005-By BawlsDeep

C. MultimeterD. Protocol analyzer

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 133An administrator has received a recommendation against deploying WEP as a wireless encryption protectionscheme. Which of the following is MOST likely the reason?

A. WEP's IV is too small.B. WEP uses RC4 which is easily accessible and not secure.C. WEP uses plain text.D. WEP is not well supported.

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 134An administrator would like to redirect connections to the firewall external interface IP address on port 80 toweb server A and connections on port 8080 to web server B. Which of the following technologies would beused for this?

A. NATB. PATC. NAT-TD. ACL

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 135On which of the following OSI layers would a computer send ARP packets in order to discover physicaladdresses?

206

A. Layer 2B. Layer 3C. Layer 6D. Layer 7

Correct Answer: A

Page 230: N10-005-By BawlsDeep

Section: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 136Which of the following describes what a network administrator should do FIRST when troubleshooting networkconnectivity issues?

A. Document the event.B. Run tests to confirm a theory about the cause.C. Gather information and identify the problem.D. Verify systems and implement preventative measures.

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 137Which of the following refers to the telephone company's endpoint at a service location?

A. Patch panelB. Smart jackC. Communication closetD. Demarc

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 138When querying a DNS server for an AAAA record, which of the following is an appropriate response?

207

A. 192.168.2.1B. 00:f3:82:99:a2:b8C. 61.23.168.192.in-addr.arpaD. 3ffe:1900:4545:3:200:f8ff:fe21:67cf

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

Topic 7, Volume G

Page 231: N10-005-By BawlsDeep

QUESTION 139Joe, a user, reports getting a "This page cannot be displayed" error message in his web browser. However, Joecan ping the default gateway. Which of the following is the MOST likely cause of the problem?

A. SSL certificates are expiredB. Incorrect WINS serverC. The browser is unsupportedD. Incorrect DNS settings

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 140A network administrator knows that one of the fibers in an underground fiber run is broken, but does not knowwhere it is broken. Which of the following tools can the administrator use to determine where along the path thefiber is broken?

A. Optical TDRB. Cable testerC. Punch down toolD. Toner probe

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 141Which of the following applications are extremely sensitive to latency? (Select TWO).

208

A. VPNB. Video conferencingC. HTTP trafficD. Peer-to-peerE. VoIP systems

Correct Answer: BESection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 142Which of the following uses IPSec to provide encryption?

A. PPPoE

Page 232: N10-005-By BawlsDeep

B. PPTPC. L2TPD. TLS

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 143Karen, a new employee, is unable to get to the department's server while other employees are having noissues. The network administrator has verified that Karen has permission to the server and the workstation isable to get to other network resources. Which of the following is the MOST likely cause?

A. The department server is having network issues.B. Karen's workstation is a part of the wrong VLAN.C. The onboard NIC has outdated drivers installed.D. The wireless NIC has not been enabled for Karen's workstation.

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 144Which of the following is used to separate external untrusted hosts and internal trusted hosts?

209

A. Content filterB. DNS serverC. Load balancerD. Firewall

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 145A technician notices that the application server's resources are momentary at full capacity for the amount ofincoming and outgoing packets outside the LAN. Which of the following tools would be used to find out what IPsare connecting to the server and in active mode?

A. pingB. tracertC. netstatD. ipconfig

Page 233: N10-005-By BawlsDeep

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 146A server technician notices that some changes were implemented on a server during non- business hours.Which of the following would allow the technician to identify the last time an administrator was remotelyconnected to the server?

A. Network snifferB. Traffic analyzerC. System logD. Security log

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 147Which of the following would a server technician use before deploying an email server to mitigate

210 already known security exploits on the operating system?

A. Disable unused servicesB. Network cut sheetC. Baseline imageD. Enable all services

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 148A network technician is installing a honeypot in the DMZ and wants to create a report of all the UDP protocolsthat are being used. Which of the following firewalls can be used to track this?

A. Dual homedB. Packet filteringC. Kernel proxyD. Stateful-inspection

Correct Answer: DSection: (none)Explanation

Explanation/Reference:

Page 234: N10-005-By BawlsDeep

Explanation:

QUESTION 149A network technician is examining network traffic before setting up QoS on the switch. Which of the followingtools is the technician MOST likely using to examine the network traffic?

A. Connectivity softwareB. Throughput testerC. ipconfigD. Protocol analyzer

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 150211 A technician is configuring a wireless network. Which of the following should the technician setup in order toprevent intruders if the encryption key gets compromised?

A. WAP placementB. MAC filteringC. WPA2 PSKD. Disable SSID broadcasting

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 151Which of the following OSI model layers is located between the data link and transport layers?

A. ApplicationB. SessionC. NetworkD. Physical

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 152Which of the following BEST describes the operation of a VLAN?

A. A VLAN gives higher priority to packets of a specific type to ensure consistent throughput.B. A VLAN allows for multiple logical subnets to coexist on a single physical switch.

Page 235: N10-005-By BawlsDeep

C. A VLAN tracks user network traffic throughout the network to detect improper usage.D. A VLAN is used to scan all packets entering a network to ensure no viruses are present.

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 153A customer has recently implemented a VoIP telephone system on a flat network. The customer

212 reports issues with call clarity during business hours. Which of the following would a technician configure on thecustomer's network to help alleviate this problem? (Select TWO).

A. NATB. Full duplexC. QoSD. VLANsE. MAC filtering

Correct Answer: CDSection: (none)Explanation

Explanation/Reference:Explanation:

http://www.gratisexam.com/