You are on page 1of 43

1. A network administrator implements four VLANs (Virtual Local Area Network) on a switch.

Which device will be required to pass traffic among the VLANs (Virtual Local Area Network)? a. Router b. No additional device needed c. Another switch d. A hub 2. Which of the following options are the minimal settings for connecting a computer to a TCP / IP (Transmission control Protocol / Internet Protocol) LAN (Local Area Network) while accessing the Internet? a. IP (Internet Protocol) address, subnet mask, gateway, and DNS (Domain Name Service) b. IP (Internet Protocol) address and gateway c. Subnet mask, IP (Internet Protocol) address, and DNS (Domain Name Service) d. IP (Internet Protocol) address, DNS (Domain Name Service), and gateway 3. Which IEEE (Institute of Electrical and Electronics Engineers) 802.x standard defines the operation of the LLC (Logical Link Control) sublayer of the OSI (Open Systems Interconnect) models Data Link Layer? a. 1 b. 2 c. 3 d. 4 4. A junior network administrator downloads a beta version of a patch to apply to a production e-mail server. The junior administrator plans to apply the patch during off-hours when e-mail usage is low. One morning the e-mail server fails and has to be repaired offline. The junior administrator repairs the e-mail server and is ready to reconnect the e-mail server to the network. What should be done regarding the patch? a. Set up an additional server in a cluster with the original server and install the patch on the secondary server b. Install the patch on a non-production server to test the effects. c. Set up an additional server in a cluster with the original server and install the patch on the primary server d. Install the patch now while the server is offline to prevent any further downtime 5. In order for a client to share resources on a wired network, the client must be physically connected and: a. mapped to the resources using the host name, followed by the resource name. b. allowed permission to the resources. c. be a member of AD (Active Directory). d. be listed in DNS (Domain Name Service). 6. Which dial-up protocol is capable of passing multiple LAN (Local Area Network) protocols across the wire? a. PPP (Point-to-Point Protocol) b. SLIP (Serial Line Internet Protocol) c. RADIUS (Remote Authentication Dial-In User Service) d. TCP / IP (Transmission Control Protocol / Internet Protocol)

7. Which digital interface device is used to connect to a local service providers digital T1 (T-Carrier Level 1) or E1 network? a. NIC (Network Interface Card) b. ISDN (Integrated Services Digital Network) c. CSU / DSU (Channel Service Unit / Data Service Unit) d. WAP (Wireless Access Point) 8. All of the following are valid IP (Internet Protocol) addresses EXCEPT: a. 192.168.0.1 b. 172.192.4.256 c. 156.144.226.123 d. 10.24.12.0 9. An Ethernet MAC (Media Access Control) address consists of: a. 12 bits. b. 32 bits. c. 48 bits. d. 64 bits. 10. The following are characteristics of AV (Anti-Virus) software EXCEPT that it will: a. update a definition automatically. b. delete an infected file. c. backup a registry. d. scan within a compress file. 11. A user complains that they can no longer access resources on the network. The user Is unable to ping other nodes and ipconfig returns an IP (Internet Protocol) address that is not in the correct subnet. What Is the problem? ) a. The DHCP (Dynamic Host Configuration Protocol) server has lost connection to the DNS (Domain Name Service). b. Someone has enabled an additional DHCP (Dynamic Host Configuration Protocol) server. c. The WINS (Windows Internet Name Service) is offline. d. The DNS (Domain Name Service) is offline. 12. A network administrator has setup a new mail server in a new domain. Which DNS (Domain Name Service) records need to be created before e-mail can be received from the internet? a. A record only b. MX (Mail Exchanger) records only c. MX (Mail Exchanger) and CNAME (Canonical Name) records d. MX (Mail Exchanger) and A records 13. A user at a workstation within a workgroup tries to access a file server in the domain "CompTIA." The user exists in the "CompTIA" domain as "jsmith." Which login credential should be used to access the file server? a. jsmith b. \\jsmith c. \\CompTIA\jsmith d. CompTIA\jsmith

14. A home user has been assigned one static IP (Internet Protocol) address. If the user wishes to use the 192.168.0.1 address range, what technology should the user implement? a. PPP (Point-to-Point Protocol) b. Proxy server c. RADIUS (Remote Authentication Dial-In User Service) server d. SLIP (Serial Line Internet Protocol) 15. Which one of the following choices is the MOST secure place to store tape backups? a. Next to the server b. In a locked room in the same building as the server c. locked room in an offsite location d. In a desk drawer 16. Which device is responsible for converting data to the proper network media? a. Switch b. Transceiver c. Bluetooth d. NIC (Network Interface Card) 17. Which one of the following servers provides web caching services? a. DNS (Domain Name Service) b. DHCP (Dynamic Host Configuration Protocol) c. Proxy d. File 18. Which one of the following antenna types is omnidirectional? a. Vertical b. Dipole c. Yagi d. Parabolic 19. Which command will produce the following output? ethoLink encap : Ethernet HWaddr: 00 : 80 : C8 : D6 : 74 : 43 inet adder : 4.150.6.3 Beast: 4.255.255.255 Mask: 255.0.0.0 a. ipconfig b. nslookup c. ifconfig d. arp 20. A firewall can be used to prevent which of the following? a. Packets from entering and leaving a network b. Packets from entering a network and viruses within a subnet c. Packets from entering and leaving a network as well as broadcast traffic within a subnet d. Packets from leaving a network as well as broadcast and viruses within a subnet

21. A user is trying to access a FTP (File Transfer Protocol) server but discovers that FTP (File Transfer Protocol) is being is being blocked by a firewall. After unblocking port 21 on the firewall, FTP (File Transfer Protocol) still does not work. What is the source of the problem? a. TFTP (Trivial File Transfer Protocol) is not installed. b. NFS (Network File System) is not installed. c. Port 20 must also be unblocked. d. Port 22 must also be unblocked. 22. Which type of connector is used to connect a cable modem to a broadband provider? a. RJ-45 (Registered Jack) b. F-Type c. Series-B d. MT-RJ (Mechanical Transfer-Registered Jack) 23. How many connections nave to be maintained on a companys mesh network with eight nodes? a. 8 b. 16 c. 28 d. 32 24. How many concurrent connections can a Windows 2000 Professional computer support on a single share? a. 10 b. 20 c. 30 d. 50 25. A computer that is working on a network is unplugged and then plugged into another switch with a new cable. The link LED (Light Emitting Diode) on the NIC (Network Interface Card) does not come on. All of the following could be the source of the problem EXCEPT that: a. the port on the switch is bad. b. the cable has a short in it. c. the wrong type of cable is used. d. the NIC (Network Interface Card) is bad. 26. Which IEEE (Institute of Electrical and Electronics Engineers) 802.x standard describes the physical layer for networks that use a ring topology? a. 802.2 b. 802.3 c. 802.4 d. 802.5 27. All of the following IP (Internet Protocol) addresses are mutable EXCEPT: a. 126.14.254.1 b. 172.16.16.1 c. 192.10.20.1 d. 201.35.44.1

28. A technician connects a computer to the LAN (Local Area Network) switch to analyze the traffic occurring from another computer on the network. The only traffic observed coming from the other computer is broadcast frames. What can be concluded from this information? a. DNS (Domain Name Service) is not installed. b. WINS (Windows Internet Name Service) is not installed. c. DHCP (Dynamic Host Configuration Protocol) is not installed. d. The analyzer is functioning properly. 29. Which standard covers the methods for performing authentication services for remote access to a central LAN (Local Area Network)? a. 802.5 b. 802.1x c. 802.3 d. 802.4 30. Which one of the following directory services is hierarchical in design? a. Windows AD (Active Directory) b. Novell NetWare Bindery c. NT (New Technology) 4.0 Domain d. Linux / etc / password file 31. Given the following output, identify the utility used NAME Type Status WORKSTATION1 <00> UNIQUE Registered WORKSTATION1 <20> UNIQUE Registered MAC Address = 00-40-60-EA-BC-3B a. netstat b. ipconfig c. ifconfig d. nbtstat 32. A small office network with ten computers uses a cable modem and router to connect to the Internet and distribute services to clients. After several weeks of use, the routers collision LED (Light Emitting Diode) has begun to stay on permanently. What is the MOST likely cause of the problem and the FIRST troubleshooting steps? a. There are too many collisions occurring in traffic. Disconnect each network card individually to find and replace the one that is broadcasting b. The cable modem is set to receive packets at a faster rate than the routers receive port allows. Lower the buffer threshold limits to correct levels. c. The routers primary link to the modem has been lost. Reboot the modem and router to reset the link. d. The router has been compromised by an external source attack. Modify the routers registry to disallow the offending IP (Internet Protocol) source from connecting again. 33. When one connection to a host fails in a full mesh network, which of the following is true? a. All hosts can communicate. b. No hosts can communicate. c. Half of the hosts will lose communication. d. Only the two hosts between the failed connection will lose communication.

34. Which one of the following security protocols creates a secure connection over the Internet? a. L2TP (Layer 2 Tunneling Protocol) b. PPP (Point-to-Point Protocol) c. SNMP (Simple Network Management Protocol) d. WEP (Wired Equivalent Privacy) 35. What is the maximum standard distance allowed to connect a customer via an ISDN (Integrated Services Digital Network) line? a. 6,000 feet (1,828.8 meters) b. 8,000 feet (2,438.4 meters) c. 2,000 feet (3,657.6 meters) d. 18,000 feet (5,486.4 meters) 36. A network administrator is troubleshooting connectivity from a client machine. An error message that reads "Page Cannot be Displayed" is shown in the browser whenever a FQDN (Fully Qualified Domain Name) is typed in the address bar. However, if the IP (Internet Protocol) address is typed in the browser the site is displayed. At which port number is the problem taking place? a. 53 b. 80 c. 119 d. 443 37. Which of the following cable types is used to link together two buildings that are over 10 miles (16.09 kilometers) apart? a. SMF (Single Mode Fiber) b. MMF (MultiMode Fiber) c. Coaxial cable d. Category 6 cable 38. Which of the following connectors are SFF (Small Form Factor) fiber connectors? a. MT-RJ (Mechanical Transfer-Registered Jack) and LC (Local Connector) b. ST (Straight Tip) and SC (Standard Connector) c. RJ-45 (Registered Jack) and RJ-11 (Registered Jack) d. Series-A and Series-B 39. Around noon, 802.11b wireless users near the break room have intermittent, random connections. What is the problem? a. There are too many people located too close to the access point causing interference. b. An old microwave oven is being used in the break room which causes interference with the access point. c. Old fluorescent lights in the break room are interfering with the access point. d. 900 MHz (Megahertz) cordless phones being used by employees on break are causing interference with the access point.

40. Given the output: 1 .pgw (129.6.80.254) *4ms 3ms 2.129.6.1.245 (129.6.1.245) 4ms 3ms * 3.129.6.2.252 (129.6.2.252) 5ms 5ms 4ms Which of the following commands causes the results above? a. ping b. arp c. nslookup d. traceroute 41. A user is booting a workstation and suddenly receives a message stating that a duplicate IP (Internet Protocol) address is in use on the network. Which of the following commands can be used to troubleshoot the problem? a. pmg b. traceroute c. find d. arp 42. When installed on a Windows 2000 server, which one of the following allows a Windows-only client to access files on a NetWare 4.1 server? a. CSNW (Client Services for NetWare) b. GSNW (Gateway Services for NetWare) c. Novell NetWare client d. DNS (Domain Name Service) 43. A technician is troubleshooting a problem on a network using a utility to capture the packets. When the technician reviews the captured data they have only captured broadcast packets and packets from their own computer. What is the reason for this? a. They do not have permission to capture other packets. b. They are connected to a switch when trying to capture packets. c. The router is blocking the packets to the workstation. d. They are using an evaluation copy of the software utility. 44. An administrator is unsuccessful when attempting to ping a network device on a remote site with a firewall in between. In order for the administrator to be successful, what protocol needs to be allowed through the firewall? a. SNMP (Simple Network Management Protocol) b. UDP (User Datagram Protocol) c. ICMP (Internet Control Message Protocol) d. IGMP (Internet Group Multicast Protocol) 45. Which one of the following IEEE (Institute of Electrical and Electronics Engineers) standards uses a 1300 nm (nanometer) beam? a. 1000BASE-LX and 10 GBASE-LR b. 1000BASE-CX and 1000BASE-T c. 1000BASE-SX and 10 GBASE-SR d. 10 GBASE-ER and 10 GBASE-SR

46. At which layer of the OSI (Open Systems Interconnect) model does UDP (User Datagram Protocol) reside? a. Session b. Network c. Physical d. Transport 47. A network administrator notices in his secure wireless office that many of his wireless client machines constantly lose network connectivity. The wired clients never have downtime. The administrator also notices that the wireless clients all lose connectivity from the network at the same time, but can still see each other. What should be done to solve this problem? a. Change the SSID (Service Set Identifier) on all of the clients b. Check the connection from the WAP (Wireless Access Point) to the network c. Check the connection from the WAP (Wireless Access Point) to the wired clients d. Check the WEP (Wired Equivalent Privacy) settings on the clients 48. Which one of the following is a purpose for subnetting? a. To block Internet traffic b. To decrease network congestion c. To increase network bandwidth d. To consolidate several small networks into one large network 49. Company A has two networks, one on the west side of town and one on the east side. The network administrator wants to connect the two networks with a leased line but is concerned about limiting broadcast traffic. What can the administrator do to alleviate broadcast traffic? a. Put a router between the two network segments b. Put a bridge between the two network segments c. Run different protocols on the two network segments d. Use a pocket-filtering firewall on each network segment 50. Which of the following choices describes an RJ-45 (Registered Jack) connector? a. A BNC (British Naval Connector / Bayonet Niell-Concelman) connector which uses fiber. b. A four-position connector which uses UTP (Unshielded Twisted Pair). c. A six-position connector which uses UTP (Unshielded Twisted Pair). d. An eight-position connector which uses UTP (Unshielded Twisted Pair). 51. A firewall differs from a proxy server in that a proxy server operates at which of the following levels of the OSI (Open Systems Interconnect) model? a. Application b. Network c. Transport d. Data Link 52. RADIUS (Remote Authentication Dial-In User Service) provides which functionality for remote access? a. Verification b. Encryption c. Addressing d. Tunneling

53. Given the address 00:B0:D0:5A:E1:B5, what does 5A:E1:B5 identify? a. The device ID (Identification) b. The type of device c. The manufacturer of the device d. The network address of the device 54. A Microsoft client is configured to use the NWLINK IPX / SPX (Internetwork Packet Exchange / Sequence Packet Exchange) protocol. The network has four Novell servers but the client can only see two of the servers. The client wants to change to frame type setting to see all of the servers. What setting should the client make to correct the problem and see all of the servers? a. Configure the frame type to auto frame type detection b. Configure the frame type for 802.3 c. Configure the frame type to 802.3 or 802.2 d. Configure the frame type for NetBIOS (Network Basic Input / Output System) 55. Which protocol is used for error reporting in concert with IP (Internet Protocol)? a. SMTP (Simple Mail Transfer Protocol) b. CMP (Internet Control Message Protocol) c. IGMP (Internet Group Multicast Protocol) d. SNMP (Simple Network Management Protocol) 56. What is the default authentication protocol for Windows clients higher than Win9x on a Windows 2000 / 2003 based network? a. MS-CHAPv1 (Microsoft Challenge Handshake Authentication Protocol version 1) b. Kerberos c. MS-CHAPv2 (Microsoft Challenge Handshake Authentication Protocol version 2) d. IPSec (Internet Protocol Security) AH (Authentication Header) 57. What is a MAC (Media Access Control) address? a. It is an address assigned to enable routing over a WAN (Wide Area Network) b. It is an address assigned to a TCP (Transmission Control Protocol) port. c. It is an address assigned to a DNS (Domain Name Service) entry. d. It is an address assigned to a NIC (Network Interface Card). 58. A user is unable to reach a web site on a host computer. The user can ping the host name and Telnet to the host name. What is the source of the problem? a. The host does not have a DNS (Domain Name Service) entry. b. The hosts HTTP (Hypertext Transfer Protocol) is down. c. The host does not have a WINS (Windows Internet Name Service) entry. d. The host is down. 59. All of the following options transmit data over a modem EXCEPT: a. POTS / PSTN (Plain Old Telephone System / Public Switched Telephone Network). b. xDSL (Digital Subscriber Line). c. cable. d. T1 (T-Carrier Level 1).

60. Which OSI (Open Systems Interconnect) layer provides interfaces to the user that enable programs to use network services? a. Transport b. Data Link c. Application d. Presentation 61. Which command generated the following output? Active Connections Proto Local Address Foreign Address State TCP CompA:3006 192.168.0.2:Microsoft Established TCP CompA:3021 192.168.0.246:HTTP Established a. nbtstat b. netstat c. arp a d. ipconfig 62. The system administrator performs full backups on Sundays. Incremental backups are performed every day EXCEPT Sunday. The backups start at 10 a.m. and end by 12 p.m. The system crashes on Wednesday night. Which tapes must be used to restore data? a. Sundays full backup as well as Wednesdays tape b. Sundays full backup as well as Tuesdays and Wednesdays tapes c. Sundays full backup as well as Mondays, Tuesdays, and Wednesdays tapes d. Sundays full backup as well as Mondays, Tuesdays, Wednesdays, and Thursdays tapes 63. Which fiber connector looks similar to an RJ-45 (Registered Jack) connector and connects two strands of fiber? a. RJ-11 (Registered Jack) b. Series-B c. MT-RJ (Mechanical Transfer-Registered Jack) d. ST (Straight Tip) 64. Which one of the following options is required for a client workstation to connect to a network resource? a. Client, protocol, and adapter b. Proxy, service, and adapter c. Client, protocol, and proxy d. Service, protocol, and adapter 65. A packet filtering firewall operates at which layers of the OSI (Open Systems Interconnect) model? a. Network and Data Link b. Network and Transport c. Transport and Session d. Physical and Data Link 66. All of the following are benefits of IPv6 (Internet Protocol version 6) EXCEPT a. packet labeling. b. smaller header. c. improved authentication and security. d. larger subnet masks.

67. Which two utilities can be used to find out what IP (Internet Protocol) address resolves from a domain name? a. netstatand ping b. arp and ping c. ipconfig and nbtstat d. nbtstat and tracer 68. If an authentication protocol is being implemented that uses a private key and a session key, the protocol is: a. L2TP (Layer 2 Tunneling Protocol). b. Kerberos. c. IPSec (Internet Protocol Security). d. PPTP (Point-to-Point Tunneling Protocol). 69. Which networking device works at the upper three layers of the OSI (Open Systems Interconnect) and connects networks with different architectures? a. Router b. Firewall c. Modem d. Gateway 70. A user connects to the companys intranet server via a VPN (Virtual Private Network) connection from a SOHO (Small Office / Home Office) using the broadband service. One day, the user cannot successfully connect to the VPN (Virtual Private Network) and receives an error message that states "Username and password are invalid on the domain." What should be done to correct this problem? a. Call the corporate help desk to have the VPN (Virtual Private Network) server rebooted b. Re-enter the username and password in the VPN (Virtual Private Network) connection and reconnect c. Call the broadband Internet provider to replace the SOHO (Small Office / Home Office) router with a newer model d. Ping the corporate VPN (Virtual Private Network) server to ensure it is online 71. While reviewing network traffic statistics, technicians have noticed that there is an abnormally high amount of DNS (Domain Name Service) traffic. What recommendation would help reduce traffic? a. Increase the TTL (Time to Live) on the DNS (Domain Name Service) servers b. Decrease the TTL (Time to Live) on the DNS (Domain Name Service) servers c. Increase the DHCP (Dynamic Host Configuration Protocol) lease expiration time on the DHCP (Dynamic Host Configuration Protocol) servers d. Decrease the DHCP (Dynamic Host Configuration Protocol) lease expiration time on the DHCP (Dynamic Host Configuration Protocol) servers 72. Which of the following commands does a network administrator use to verify the mail server addresses for a remote domain? a. nslookup/dig b. nbtstat c. tracert/trace route d. netstat

73. Upon which devices can NAT (Network Address Translation) be used? a. Hub b. Bridge c. Switch d. Firewall 74. Which one of the following communication protocols does a UNIX system primarily rely on a. A-.IPX / SPX (Internetwork Packet Exchange / Sequence Packet Exchange) b. B-.Kerberos c. C- TCP / IP (Transmission Control Protocol / Internet Protocol) d. D- NetBEUI (Network Basic Input/ Output Extended User Interface) 75. A remote user has been set up to print to a network printer. After connecting remotely, the print server stops functioning; and the router shows 100% traffic being received. What is the cause of the problem? a. The client is using an unauthorized user name and password, causing a stop function call. b. The client is performing a defragmentation and thus consuming network print server resources. c. The client is acting as a zombie and is causing a denial of service attack to occur on the print server. d. The client is infected with a virus, causing the print server to close the network connection. 76. There is a suspected SMTP (Simple Mail Transfer Protocol) virus on the workstation. E-mail programs are not currently running. Which of the following utilities should be run to see if there are any open SMTP (Simple Mail Transfer Protocol) sockets? a. nbtstat b. netstat c. arp d. nslookup 77. Which one of the following will affect the range of an 802.11b WAP (Wireless Access Point)? a. 5 GHz (Gigahertz) interference b. High number of wireless users c. 900 MHz (Megahertz) interference d. A long length of antenna extension cable

78. Computer A can connect with computers on Network A, but cannot connect with computers on Network B. Which of the following solutions will allow communication between Network A and Network B? Computer A: Computer B: IP: 123.132.192.50 IP: 200.201.202.52 Subnet Mask: 255.255.240.0 Subnet Mask: 255.255.255.0 Default Gateway: 200.201.202.1 Default Gateway: 200.201.202.1 Network A: Network B: Network: 123.132.192.0 Network: 200.201.202.0 Subnet Mask: 255.255.240.0 Subnet Mask: 255.255.255.0 Router A: Router B: IP: 123.132.192.1 IP: 200.201.202.1 a. Change the default gateway of Computer B to 123.132.192.1 b. Change the default gateway on Computer A to 123.132.192.1 c. Change the subnet mask for Computer A to 255.255.255.0 d. Change the subnet mask for Computer B to 255.255.240.0 79. A network is experiencing a high volume of SMTP (Simple Mail Transfer Protocol) traffic. Which utility can a user run from the affected e-mail server to determine the source? a. netstat b. nbtstat c. nslookup/dig d. Ping 80. Which type of connector would a cable have if it were supplied with a splitter and a cable modem for Internet access? a. F-Type b. RJ-45 (Registered Jack) c. RJ-11 (Registered Jack) d. IEEE 1394 (Institute of Electrical and Electronics Engineers) 81. Which disaster recovery implementation is the MOST expensive? a. Cold site b. Warm site C -Hot site c. Dynamic site 82. If a user needs to know the NetBIOS (Network Basic Input / Output System) name of the server that they are connected to, which of the following utilities will provide this information? a. nbtstat b. tracert c. nslookup d. netstat

83. A technician just installed a new NIC (Network Interface Card) in a computer and attached a cable to connect the computer to a hub. Assuming the NIC (Network Interface Card) is functioning correct and the network is up, which of the following will the technician see on the NIC (Network Interface Card)? a. The amber light is flashing occasionally and the green light is lit steadily. b. The amber light is flashing continually, the green light is lit steadily, and neither light will be on until data is transferred. c. The amber light is lit and steady and the green light is flashing continually. d. The amber light is flashing occasionally, the green light is lit steadily, and neither light will be on until data is transferred. 84. Which one of the following is an IEEE (Institute of Electrical and Electronics Engineers) fiber optic standard? a. 1000BASE-TX b. 10 GBASE-LR c. 1000BASE-CX d. 10BASE-T 85. The IPSec (Internet Protocol Security) protocol suite can secure network transmissions by: a. increasing encryption to a 128-bit cipher. b. encapsulating the data payload. c. double encrypting the data payload. d. adding a second password. 86. A client on a Winciows 2000 network cannot access resources on a Winciows 2000 server because the DHCP (Dynamic Host Configuration Protocol) server is down. The client obtained an IP (Interne Protocol) address. What IP (Internet Protocol) address is the client using? a. 169.254.X.X with a subnet mask of 255.255.0.0 b. 169.254.X.X with a subnet mask of 255.255.255.0 c. 169.255.X.X with a subnet mask of 255.255.0.0 d. 169.255.X.X with a subnet mask of 255.255.255.0 87. Which type of connector would a cable have if it were supplied with a splitter and a cable modem for Internet access? a. F-Type b. RJ-45 (Registered Jack) c. RJ-11 (Registered Jack) d. IEEE 1394 (Institute of Electrical and Electronics Engineers) 88. A network technician is troubleshooting a remote home users computer that is behind a SOHO (Small Office / Home Office) router running NAT (Network Address Translation). The technician wants to ping the IP (Internet Protocol) address of the remote users computer. The technician has the user perform an ipconfig command and verifies that the users IP (Internet Protocol) address is 192.168.1.100. The home user can also access the Internet with no trouble. The technician then pings the users IP (Internet Protocol) address but it times out. Why is the ping unsuccessful? a. The SOHO (Small Office / Home Office) router is down. b. The user has a different subnet mask than that of the SOHO (Small Office / Home Office) router. c. This IP (Internet Protocol) address cannot be pinged remotely. d. This IP (Internet Protocol) address is in a different subnet class than the IP (Internet Protocol) address of the technicians computer.

89. A network administrator installs a Linux DHCP (Dynamic Host Configuration Protocol) server. To configure the Windows clients to use the Linux DHCP (Dynamic Host Configuration Protocol) server, what must be configured on the Windows clients? a. Install a Linux compatible DHCP (Dynamic Host Configuration Protocol) client b. Enable "Obtain IP (Internet Protocol) address automatically" c. Install WINS (Windows Internet Name Service) d. Windows clients are not compatible with Linux DHCP (Dynamic Host Configuration Protocol) server 90. What functionality does Kerberos provide? a. Compression b. Encryption c. Authentication d. Encapsulation 91. A network administrator is configuring a router to support a new subnet on a TCP / IP (Transmission Control Protocol / Internet Protocol) network. The subnet uses 192.168.96.0/24. The administrators company policy is to reserve the highest IP (Internet Protocol) address on each subnet for the router interface. What IP (Internet Protocol) address should the administrator assign to the router? a. 192.168.96.255 b. 192.168.96.254 c. 192.168.95.254 d. 192.168.95.255 92. Which one of the following is true concerning bridges and their forwarding decisions? a. Bridges operate at OSI (Open Systems Interconnect) Layer 2 and use IP (Internet Protocol) addresses to make decisions. b. Bridges operate at OSI (Open Systems Interconnect) Layer 3 and use IP (Internet Protocol) addresses to make decisions. c. Bridges operate at OSI (Open Systems Interconnect) Layer 2 and use MAC (Media Access Control) addresses to make decisions. d. Bridges operate at OSI (Open Systems Interconnect) Layer 3 and use MAC (Media Access Control) addresses to make decisions. 93. There are three Windows 2000 servers, a NetWare server, and ten Windows 2000 clients. A network technician installs NWLINK on the Windows servers and clients, yet the clients cannot access the Novell server. What step must be taken so that the clients can access the Novell server? a. CSNW (Client Services for NetWare) on the Windows 2000 servers b. CSNW (Client Services for NetWare) on the Windows clients c. GSNW (Gateway Services for NetWare) on the NetWare server d. GSNW (Gateway Services for NetWare) on the Windows clients 94. A client needs to attach to a server using the NetBIOS (Network Basic Input/ Output System) name. In addition to the IP (Internet Protocol) address, what is required to accomplish this? a. Gateway and subnet mask b. Subnet mask and HOSTS file c. Subnet mask and LMHOSTS file d. Gateway and HOSTS file

95. A server has three hard drives. The system uses hardware RAID (Redundant Array of Independent Disks) with hot swappable drives. Drive 1 is for the OS (Operating System). Drives 2 and 3 are striped and contain user data files. Drive 2 fails. What must be done to restore the system to normal operation? a. Shut down, replace hard drives, and reboot b. Replace hard drives with system running; upon installations the RAID (Redundant Array of Independent Disks) will automatically rebuild c. Replace hard drives with system running .format data drive, and restore user data from latest backup d. Shut down, replace hard drives, reboot, and format data drive 96. Which one of the following is an IEEE (Institute of Electrical and Electronics Engineers) fiber optic standard? a. 1000BASE-TX b. 10 GBASE-LR c. 1000BASE-CX d. 10BASE-T 97. An administrator has just received a call from an end user saying they are unable to log in to the network, although they could yesterday. Overnight, the administrator replaced an ISA (Industry Standard Architecture) Token Ring card with a Token Ring PCI (Peripheral Component Interconnect) NIC (Network Interface Card) in the users computer on a 16 Mbps (Megabits per seconds) LAN (Local Area Network). What is the NEXT step? a. Verify the MAU (Multistation Access Unit) is good b. Verify the processor speed c. Verify the user password is correct d. Verify the speed of the NIC (Network Interface Card) matches the network 98. A home user switches from dial-up Internet access to PPPoE (Point-to-Point Protocol over Ethernet) DSL (Digital Subscriber Line) service. When attempting to send e-mail, an error message stating "Relay forbidden" appears. The e-mail is not sent even though the user can receive e-mail. What action must the user take to successfully send e-mail from their account? a. Change the outgoing SMTP (Simple Mail Transfer Protocol) server address to their DSL (Digital Subscriber Line) provider b. Make sure that the DSL (Digital Subscriber Line) providers e-mail server allows SMTP (Simple Mail Transfer Protocol) c. Change the default protocol on the users e-mail client to POP3 (Post Office Protocol version 3) d. Make sure their DSL (Digital Subscriber Line) providers modem is not blocking SMTP (Simple Mail Transfer Protocol) traffic 99. A network gateway is required to share a printer for users and has been implemented by the systems administrator. An account was created called NTGATEWAY on the Windows server and the NetWare server and users have been assigned gateway privileges. How are accounts assigned to limit certain users from having more privileges than others to modify print jobs? a. There is only one account created on each server and all users have the same rights, so this request cannot be fulfilled. b. Each user must have individual accounts set up on the Novell server to allow specific printer rights. c. Each user must have individual accounts set up on the Windows server to allow specific printer rights. d. Separate print queues must be created for each Windows user to manage rights levels.

100. A Windows 2000 work station has a TCP / IP (Transmission Control Protocol / Internet Protocol) address of 169.254.12.1. Which statement describes the state of the computers TCP / IP (Transmission Control Protocol / Internet Protocol) configuration? a. The network administrator assigned an address of 169.254.12.1 for the network. b. The computer is set for DHCP (Dynamic Host Configuration Protocol), but no DHCP (Dynamic Host Configuration Protocol) server is available for the network. c. The computer received the address from a DHCP (Dynamic Host Configuration Protocol) server on the network. d. The computer received the address from a BootP (Boot Protocol) server on the network. 101. Which one of the following choices is the MOST secure place to store tape backups? a. Next to the server b. In a locked room in the same building as the server c. In a locked room in an offsite location d. In a desk drawer 102. Which one of the following provides a fault-tolerant storage system containing five disks and a single controller that will function if a single disk fails? a. A striped set array without parity b. A RAID 0 (Redundant Array of Independent Disks) array c. A striped set array with parity d. A duplexed RAID 1 (Redundant Array of Independent Disks) 103. A user would like to implement a secure ordering system on a web server. Which of the following protocols is installed? a. S/MIME (Secure / Multipurpose Internet Mail Extensions) b. SSL (Secure Sockets Layer) c. IPSec (Internet Protocol Security) d. Kerberos 104. 802.11 security is defined in: a. 802.11a b. 802.11b c. 802.11g d. 802.11i 105. An administrator wants to set up an e-mail server to exchange e-mails with other servers over the Internet. Which protocol is used? a. SMTP (Simple Mall Transfer Protocol) b. IMAP4 (Internet Message Access Protocol version 4) c. POP3 (Post Office Protocol version 3) d. SNMP (Simple Network Management Protocol)

106. A router malfunctioned and was replaced with another. Each client computer on Subnet G and Subnet H is configured with a static IP (Internet Protocol) address, subnet mask, and a default gateway that allows access to the other subnet. It should not be necessary to reconfigure the clients. The configuration design is described below: Subnet G is attached to interface 0 of the router. Subnet H is attached to interface 1. Which IP (Internet Protocol) address should be assigned to interface 1? a. 172.17.100.2 b. 172.16.100.255 c. 172.17.100.25 d. 172.16.100.1 107. Upon which devices can NAT (Network Address Translation) be used? a. Hub b. Bridge c. Switch d. Firewall 108. What is the maximum length of a gigabit Ethernet segment using MMF (MultiMode Fiber) optic cable? a. 100 meters (328.08 feet) b. 250 meters (820.21 feet) c. 550 meters (1,804.46 feet) d. 3000 meters (9,842.52 feet) 109. What is the maximum standard distance allowed to connect a customer via an ISDN (Integrated Services Digital Network) line? a. 6,000 feet (1,828.8 meters) b. 8,000 feet (2,438.4 meters) c. 12,000 feet (3,657.6 meters) d. 18,000 feet (5,486.4 meters) 110. Which one of the following IEEE (Institute of Electrical and Electronics Engineers) standards uses CSMA / CA (Carrier Sense Multiple Access / Collision Avoidance)? a. 802.2 b. 802.3 c. 802.5 d. 802.11 111. Which of the following is a self-assigned address based on APIPA (Automatic Private Internet Protocol Addressing)? a. 169.255.1.0 b. 169.254.1.1 c. 192.168.1.0 d. 192.168.1.1 112. If a new network has just been installed but is not functioning correctly, which command should be used FIRST to test basic connectivity? a. ipconfig b. arp c. Ping d. netstat

113. Which media access method is used for an IEEE (Institute of Electrical and Electronics Engineers) 802.5 network? a. Polling b. Token passing c. CSMA / CD (Carrier Sense Multiple Access / Collision Detection) d. CSMA / CA (Carrier Sense Multiple Access / Collision Avoidance) 114. Which protocol uses domain name resolution to find addresses? a. TCP / IP (Transmission Control Protocol / Internet Protocol) b. IPX / SPX (Internetwork Packet Exchange / Sequence Packet Exchange) c. NetBEUI (Network Basic Input / Output Extended User Interface) d. AppleTalk 115. A remote office connected to a network has changed locations. The move required re-addressing all network devices in the office. The remote server is working on the remote segment properly. However, corporate users cannot connect to the remote server by host name, but can by IP (Internet Protocol) address. Which utility should be used at the corporate site to identify the cause of the problem? a. arp b. netstat c. tracert d. nslookup 116. WINS (Window Internet Name Service) provides a more centralized method of name resolution than using which of the following items? a. SMB (Server Message Block) b. HOSTS files c. DHCP (Dynamic Host Configuration Protocol) d. LMHOSTS files 117. A company wishes to outsource the installation of an internal web server with access to employees only. Which term BEST describes this web server? a. Extranet server b. VPN (Virtual Private Network) server c. RADIUS (Remote Authentication Dial-In User Service) server d. Intranet server 118. A WINS (Windows Internet Name Service) network administrator has disabled DNS (Domain Name Service) for security reasons. Users have lost the ability to access remote network shares named ournetworkshares and ourprivateshares. How can this be resolved? a. Have the administrator recreate the shares to be named our.network.shares and our.private.shares in order to differentiate the old links address b. Have the administrator recreate the shares to be named networkshares and privateshares in order to modify the share names to acceptable lengths c. Flush the DNS (Domain Name Service) cache to remove old pathway links and allow for a new dynamic path table to be established d. These shares cannot be modified, ask the administrator to create new folders called ournetwork.shares and ourprivate.shares

119. Which steps are required to install RAS (Remote Access Service) on Windows NT (New Technology)? a. Start, settings, control panel, and network b. Start, properties, advanced, and network c. System, services, network, and dial-in d. Control panel, network, dial-in, and remote services 120. A network has grown to include seventy 24 port Ethernet switches and has decreased in performance steadily as new switches are added. What adjustments can be made to the infrastructure to improve the performance? a. Purchase 48 port switches b. Implement VLANs (Virtual Local Area Network) c. Turn on Spanning-Tree Protocol d. Purchase 16 port switches 121. Which one of the following standards has a maximum data rate of 11 Mbps (Megabits per second)? a. 802.11a b. 802.11b c. 802.11c d. 802.11g 122. Which of the following can be used to cache web pages for future retrieval? a. Switch b. Web server c. Repeater d. Proxy service 123. Connecting a LAN (Local Area Network) to a mainframe can be accomplished using a: a. bridge. b. gateway. c. transceiver. d. firewall. 124. An 802.11a/b/g access point is installed in a computer lab. An administrator has a client that is based on 802.11g technology. There are times when the client slows or stops working entirely. What is the cause of the problem? a. A FM (Frequency Modulation) radio is in use. b. A 900 MHz (Megahertz) cordless telephone is in use. c. A 2.4 GHz (Gigahertz) cordless telephone is in use. d. A 5 GHz (Gigahertz) cordless telephone is in use. 125. Which protocol is the fastest file transfer protocol? a. HTTP (Hypertext Transfer Protocol) b. FTP (File Transfer Protocol) c. SFTP (Secure File Transfer Protocol) d. TFTP (Trivial File Transfer Protocol)

126. Which layer of the OSI (Open Systems Interconnect) model handles formatting and code conversion? a. Transport b. Data Link c. Application d. Presentation 127. All of the following are benefits of IPv6 (Internet Protocol version 6) EXCEPT: a. packet labeling. b. smaller header. c. improved authentication and security. d. larger subnet masks. 128. If a destination address is not in a bridges forwarding table, what will the bridge do? a. Forward the packets to a designated port and the one that originated the request b. Forward the packets to all ports except the one that originated the request c. Forward the packets to the default gateway d. Forward the packet to all ports 129. Which one of the following topologies does FDDI (Fiber Distributed Data Interface) use? a. Star b. Bus c. Mesh d. Ring 130. A new intranet web server has been installed for a company. The clients access the intranet server by its DNS (Domain Name Service) name. To automatically change the clients to connect to the new server, an administrator modifies the DNS (Domain Name Service) name to reference the IP (Internet Protocol) of the new server. However, some clients are still connecting to the older server. What is causing the problem? a. Problematic workstations have cached the old IP (Internet Protocol) address of the server. b. Problematic workstations have cached the old DHCP (Dynamic Host Configuration Protocol) address of the server. c. Problematic workstations have cached the old IPX (Internetwork Packet Exchange) address of the server. d. Problematic workstations have cached the old WINS (Windows Internet Name Service) address of the server. 131. When attaching to a Windows network resource, credentials are supplied through the use of a: a. cookie. b. cache. c. token. d. key file. 132. Which of the following are classified as Layer 2 devices? a. Hubs, switches, and routers b. Hubs, switches, and bridges c. Switches, bridges, and NICs (Network Interface Card) d. Switches, bridges, and routers

133. When installed on a Windows 2000 server, which one of the following allows a Windows-only client to access files on a NetWare 4.1 server? a. CSNW (Client Services for NetWare) b. GSNW (Gateway Services for NetWare) c. Novell NetWare client d. DNS (Domain Name Service) 134. Which one of the following UNIX commands is similar to Telnet and used for terminal emulation? a. route b. emacs c. rlogin d. ifconfig 135. Identify the Windows utility being used given the following output: Proto Local Address Foreign Address State TCP JDoe:epmap JDoe.jdoe.com:0 Listening a. winipcfg b. nslookup c. nbtstat d. netstat 136. How many connections have to be maintained on a companys mesh network with eight nodes? a. 8 b. 16 c. 28 d. 32 137. A technician is troubleshooting a problem on a network using a utility to capture the packets. When the technician reviews the captured data they have only captured broadcast packets and packets from their own computer. What is the reason for this? a. They do not have permission to capture other packets. b. They are connected to a switch when trying to capture packets. c. The router is blocking the packets to the workstation. d. They are using an evaluation copy of the software utility. 138. A workstation on the network is unable to connect to the server. Which utility should be used FIRST when troubleshooting? a. arp b. tracert/traceroute c. ipconfig/ifconfig d. netstat 139. Which one of the following will affect the range of an 802.11b WAP (Wireless Access Point)? a. 5 GHz (Gigahertz) interference b. High number of wireless users c. 900 MHz (Megahertz) interference d. A long length of antenna extension cable

140. On a switched Ethernet network that is operating perfectly, what is the state in which a user will find the activity LED (Light Emitting Diode)? a. Lit solid b. Off c. Rhythmically blinking d. Periodically blinking 141. What is the mechanism a DHCP (Dynamic Host Configuration Protocol) server uses to track which IP (Internet Protocol) address is assigned to a particular computer? a. MAC (Media Access Control) address b. DNS (Domain Name Service) c. WINS (Windows Internet Name Service) d. FQDN (Fully Qualified Domain Name) 142. The 802.11 frequency band is: a. 1.5 GHz (Gigahertz). b. 2.4 GHz (Gigahertz). c. 5.0 GHz (Gigahertz). d. 7.0 GHz (Gigahertz). 143. An administrator has been called to consult on a network. After receiving network traffic statistics, the administrator notices that there is an abnormally high amount of DHCP (Dynamic Host Configuration Protocol) traffic. What recommendation would the administrator give to the customer to reduce the traffic? a. Configure the DHCP (Dynamic Host Configuration Protocol) server to increase lease expiration time b. Configure the DHCP (Dynamic Host Configuration Protocol) server to decrease lease expiration time c. Configure the DHCP (Dynamic Host Configuration Protocol) client to increase lease expiration time d. Configure the DHCP (Dynamic Host Configuration Protocol) client to decrease lease expiration time 144. Which one of the following protocols is used with the traceroute command? a. HTTP (Hypertext Transfer Protocol) b. SNMP (Simple Network Management Protocol) c. ICMP (Internet Control Message Protocol) d. XML (Extensible Markup Language) 145. A company wants to have an intranet. Where would the intranet web server be located in the network? a. Outside the firewall b. In the DMZ (Demilitarized Zone) c. In the LAN (Local Area Network) d. In the DMZ (Demilitarized Zone) with port 80 open from the Internet

146. A rogue residential gateway has been installed in a network. It is running DHCP (Dynamic Host Configuration Protocol) problems might exist on the network? a. There will be no Internet access. b. The computer IP (Internet Protocol) addresses will change. c. There should be no problems. d. There will be a routing loop between the residential gateway and the original router. 147. Which one of the following options is a security standard for 802.11? a. WAP (Wireless Access Point) b. EAP (Extensible Authentication Protocol) c. WEP (Wired Equivalent Privacy) d. Kerberos 148. What is a MAC (Media Access Control) address? a. It is an address assigned to enable routing over a WAN (Wide Area Network) b. It is an address assigned to a TCP (Transmission Control Protocol) port. c. It is an address assigned to a DNS (Domain Name Service) entry. d. It is an address assigned to a NIC (Network Interface Card). 149. A Microsoft client is configured to use the NWLINK IPX / SPX (Internetwork Packet Exchange / Sequence Packet Exchange) protocol. The network has four Novell servers but the client can only see two of the servers. The client wants to change to frame type setting to see all of the servers. What setting should the client make to correct the problem and see all of the servers? a. Configure the frame type to auto frame type detection b. Configure the frame type for 802.3 c. Configure the frame type to 802.3 or 802.2 d. Configure the frame type for NetBIOS (Network Basic Input / Output System) 150. Given the following output, which utility was used? Default Server: bigserver.datacenter.com Address: 4.12.18.1 a. Ping b. nbtstat c. nslookup d. ipconfig 151. When a user authenticates using a Novell Directory Service login, the following: OU = Managers. OU = Middle. 0 = Joe is known as the users: a. preferred server. b. Novell Directory Service schema. c. context. d. FQDN (Fully Qualified Distinguished Name) 152. An employee needs to access the Internal secure company web site from a hotel. The employee will need which of the following connections? a. Sneakernet connection b. LAN (Local Area Network) connection c. ICMP (Internet Control Message Protocol) connection d. Internet connection

153. An administrator is unsuccessful when attempting to ping a network device on a remote site with a firewall in between. In order for the administrator to be successful, what protocol needs to be allowed through the firewall? a. SNMP (Simple Network Management Protocol) b. UDP (User Datagram Protocol) c. ICMP (Internet Control Message Protocol) d. IGMP (Internet Group Multicast Protocol) 154. Which of the following operating systems use NetBIOS (Network Basic Input / Output System) as the default protocol? a. Microsoft Windows 2000 b. Microsoft Windows NT (New Technology) 3.1 c. Novell NetWare 5.0 d. Novell NetWare 3.1 155. A company wishes to establish a secure network connection with a sister company over the Internet. Both companies must have access to each others resources without allowing general public access. What describes the type of network that should be employed? a. Extranet b. Subnet c. WAN (Wide Area Network) d. Intranet 156. The user has connected a laptop to a SOHO (Small Office / Home Office) router. The router connects to a cable modem. The laptop is unable to get an IP (Internet Protocol) address. The user notices that the link status LED (Light Emitting Diode) is not illuminated on the router or laptop. What is the cause of the problem? a. DHCP (Dynamic Host Configuration Protocol) is not enabled on the router. b. There is a bad port on the cable modem. c. There is a bad cable or wrong cable type. d. A wrong IP (Internet Protocol) is configured on the router. 157. As new workstations and servers have been added to a company network performance has decreased due to broadcast storms. Which network device will help prevent the broadcast storms? a. Switch b. Repeater c. Firewall d. Router 158. A client accessing a network share folder has authenticated into the system and has full access rights to a folder share. But after opening the file they find they cannot modify the files contents. What is the likely cause? a. The group rights filter has been changed through the GPO (Group Policy Object) to disallow file access. b. The file requested has been pulled from cache memory and is not writeable. c. The file has been opened by another user and is open for read only. d. The file has been pulled from the backup source not the tree directory.

159. Which of the following methods transfers files with the use of a UDP (User Datagram Protocol)? a. HTTP (Hypertext Transfer Protocol) b. TFTP (Trivial File Transfer Protocol) c. SCP (Secure Copy Protocol) d. FTP (File Transfer Protocol) 160. An administrator has added a new DNS (Domain Name Service) server for fault tolerance in a network. If the administrator wants the DHCP (Dynamic Host Configuration Protocol) clients to use the new server, they should configure: a. a static IP (Internet Protocol) on the client and add the server IP (Internet Protocol) to the DNS (Domain Name Service) list. b. the DHCP (Dynamic Host Configuration Protocol) server to provide the setting to the clients. c. the DHCP (Dynamic Host Configuration Protocol) server to increase lease expiration time. d. the DHCP (Dynamic Host Configuration Protocol) client to increase lease expiration time. 161. Which one of the following servers provides web caching services? a. DNS (Domain Name Service) b. DHCP (Dynamic Host Configuration Protocol) c. Proxy d. File 162. Which UNIX service provides interoperability with Windows file and print sharing? a. Mozilla b. NFS (Network File Service) c. SMB (Server Message Block) d. TCL (Terminal Control Language) 163. A facility designed to receive computer equipment during a disaster recovery is known as a(n): a. hot site. b. cold site. c. warm site. d. off site. 164. Ten workstations numbered 1 through 10 are installed sequentially on a physical star network. The network uses a logical bus topology and is cabled using Category 3 UTP (Unshielded Twisted Pair. The cable to Workstation 3 has been severed. Which of the following statements is true? a. All workstations including Workstation 3 can communicate to each other. b. All workstations except Workstation 3 can communicate to each other. c. No workstations can communicate with each other. d. Only Workstations 1 and 2 can communicate with each other, but all other workstations cease to communicate. 165. In which OSI (Open Systems Interconnect) layer does a bridge operate? a. Network b. Physical c. Data Link d. Transport

166. Which digital interface device is used to connect to a local service providers digital T1 (T-Carrier Level 1) or E1 network? a. NIC (Network Interface Card) b. ISDN (Integrated Services Digital Network) c. CSU / DSU (Channel Service Unit / Data Service Unit) d. WAP (Wireless Access Point) 167. A workstation presents an error message to a user. The message states that "Duplicate IP (Internet Protocol) has been detected on the network." After establishing what has changed in the network, a. what should be the NEXT step using the standard troubleshooting model? b. Test the result c. Select the most probable cause d. Implement an action plan e. Document the solution and process 168. Which one of the following will interfere with an IEEE (Institute of Electrical and Electronics Engineers) 802.11b access point? a. 802.11a access point b. Bluetooth enabled cell phones c. 900 MHz (Megahertz) cordless phones d. Infrared television remote control 169. A client workstation can authenticate user names and passwords to which type of server? a. DNS (Domain Name Service) b. DHCP (Dynamic Host Configuration Protocol) c. PDC (Primary Domain Controller) d. WINS (Windows Internet Name Service) 170. What enables a UNIX computer to access exported file systems from other UNIX computers? a. SMS (Storage Management Services) b. NFS (Network File System) c. NetBIOS (Network Basic Input / Output System) d. NetBEUI (Network Basic Input / Output Extended User Interface) 171. Which one of the following devices connects a network segment to a public telephone network? a. CSU / DSU (Channel Service Unit / Data Service Unit) b. Gateway c. WAP (Wireless Access Point) d. Transceiver 172. Which digital interface device is used to connect to a local service providers digital T1 (T-Carrier Level 1) or E1 network? a. NIC (Network Interface Card) b. ISDN (Integrated Services Digital Network) c. CSU / DSU (Channel Service Unit / Data Service Unit) d. WAP (Wireless Access Point)

173. A network administrator adds a router to create a new subnet. Which of the following network services requires configuration to accommodate NetBIOS (Network Basic Input / Output System) on the new network? a. DHCP (Dynamic Host Configuration Protocol) b. NNTP (Network News Transport Protocol) c. WINS (Windows Internet Name Service) d. NTP (Network Time Protocol) 174. A client noticed that traffic has increased steadily over the last few months and performance is beginning to suffer on its TCP / IP (Transmission Control Protocol / Internet Protocol). Which network device can be installed to reduce the impact of network traffic without dividing the LAN (Local Area Network) into separate subnets? a. Bridge b. Repeater c. Router d. Gateway 175. A user complains that they are unable to connect to a remote server using either FTP (File Transfer Protocol) or Telnet, although the user was able to connect yesterday. Which of the following commands is used to troubleshoot the problem? a. arp b. Ping c. nslookup d. nbtstat 176. FDDI (Fiber Distributed Data Interface) operates at what speed? a. 1 Mbps (Megabits per second) b. 10 Mbps (Megabits per second) c. 100 Mbps (Megabits per second) d. 1000 Mbps (Megabits per second) 177. The Spanning-Tree Protocol allows for redundancy of what networking device? a. Transceiver b. Router c. Bridge d. Gateway 178. A network has been set up for DHCP (Dynamic Host Configuration Protocol) services using a PDC (Primary Domain Controller) and BDC (Backup Domain Controller) each with a range of 192.168.0.1 to192.168.0.254 using a class subnet of 255.255.255.0. DHCP (Dynamic Host Configuration Protocol) errors are occurring. How can the errors be resolved? a. Change the default subnet to 255.255.0.0 to increase the number of allowable IP (Internet Protocol) addresses to prevent collisions. b. The machines are holding IP (Internet Protocol) addresses in cache memory. Reboot to renew the IP (Internet Protocol) address. c. Configure BootP (Boot Protocol) on the server when the IP (Internet Protocol) class subnets are split prior to implementing the scope. d. Split the scope addresses between the servers assigning 192.168.0.1 through 192.168.0.127 for the PDC (Primary Domain Controller) and 192.168.0.128 through 192.168.0.254 for the BDC (Backup Domain Controller).

179. Which of the following is true regarding NDS (NetWare Directory Services) configuration? a. Remote users can access the tree through dial-in connections. b. Mobile users do not require changing the NDS (NetWare Directory Services) name context. c. Remote users do not require a special NDS (NetWare Directory Services) object entry. d. There are no differences between mobile users and remote users. 180. Which device selectively forwards data packets? a. Bridge b. Hub c. Modem d. Transceiver 181. A small company connected to the Internet through a SOHO (Small Office / Home Office) router wants to make an internal web server public on the Internet. Computers on the LAN (Local Area Network) can access the web pages but Internet users cannot. What should be done to solve the problem? a. Make certain the web site has an external DNS (Domain Name Service) (Domain Name Service) name and a public IP (Internet Protocol) address, the web site is functioning, and that port 53 is open on the router. b. Make certain the web site has a public IP (Internet Protocol) address, the web site is functioning, and that port 80 is open on the router. c. Make certain the web site has an external DNS (Domain Name Service) name and a public IP (Internet Protocol) address, and that port 80 is open on the router. d. Make certain the web site has an external DNS (Domain Name Service) name, the web site is functioning, and that port 53 is open on the router. 182. To increase the number of available IP (Internet Protocol) addresses, IPv6 (Internet Protocol version 6) uses which one of the following options? a. 128 bit addresses b. 12 octet pairs c. 8 byte addresses d. 64 bit addresses 183. A technician is assisting their senior technician with terminating a line that was extending the demarcation point for a new DSL (Digital Subscriber Line) circuit. Which tool would be needed? a. Multimeter b. Optical tester c. Punch down tool d. BERT (Bit-Error Rate Test) 184. PAP (Password Authentication Protocol) secures PPP (Point-to-Point Protocol) sessions by: a. adding a secret key to the password. b. adding a secret key to the username password. c. double encrypting the username and password. d. passing a username and password in plaintext. 185. Which physical topology is used by a 10BASE2 network? a. Bus b. Ring c. Star d. Mesh

186. Which one of the following IEEE (Institute of Electrical and Electronics Engineers) standards has the shortest maximum distance? a. 10BASE-T b. 10GBASE-SR c. 1000BASE-T d. 1000BASE-CX 187. Which of the following is used to translate NetBIOS (Network Basic Input/ Output System) names to IP (Internet Protocol) addresses? a. DNS (Domain Name Service) b. WINS (Windows Internet Name Service) c. NAT (Network Address Translation) d. SNMP (Simple Network Management Protocol) 188. Which protocol could be used by a VPN (Virtual Private Network)? a. PPP (Point-to-Point) b. SLIP (Serial Line Internet Protocol) c. HDLC (High-Level Data Link Control) d. PPTP (Point-to-Point Tunneling Protocol) 189. A Windows user wants to access a share hosted on a Mac OS X server, but the server is not visible on the network. What must the network administrator enable on the Mac OS X server to allow Windows users to connect to shares? a. AFP (Apple File Protocol) b. VPN (Virtual Private Network) c. Windows file and print sharing d. DHCP (Dynamic Host Configuration Protocol) 190. Which one of the following should be selected for a Microsoft client using CSNW (Client Services for NetWare) to connect to a Novell NetWare 4.1 server? a. TCP / IP (Transmission Control Protocol / Internet Protocol) b. IPX / SPX (Internetwork Packet Exchange / Sequence Packet Exchange) c. NetBEUI (Network Basic Input / Output Extended User Interface) d. GSNW (Gateway Services for NetWare) 191. Which one of the following choices is the MOST secure place to store tape backups? a. Next to the server b. In a locked room in the same building as the server c. In a locked room in an offsite location d. In a desk drawer 192. Which of the following options allows for secure communication over the Internet? a. RAS (Remote Access Service) b. RDP (Remote Desktop Protocol) c. SLIP (Serial Line Internet Protocol) d. VPN (Virtual Private Network)

193. Which utility should a technician use to troubleshoot NetBIOS (Network Basic Input / Output System) over TCP / IP (Transmission Control Protocol / Internet Protocol) from Workstation A to Workstation B on a Windows network? a. Ping b. tracert c. nbtstat d. netstat 194. Several Win9x clients are connected on a LAN (Local Area Network), and they can all ping each other. One of the computers cannot browse any file or printer shares on the Windows based network. Which command would be useful in determining the problem? a. traceroute b. nbtstat c. netstat d. ifconfig 195. How can a system administrator verify that a backup is valid? a. Run parallel backups b. Check the tape archive c. Restore the backup d. Verify the archive bit 196. A network administrator manages a medium-sized network with a mixture of different platform computers. The network contains multiple subnets located across a large geographical area. Over half of the subnets contain a WAP (Wireless Access Point) for Internet access. The network administrator has noticed that a particular subnets users have complained of downtime. Upon further troubleshooting, the administrator notices that the each day the downtime lasts approximately an hour around midday. The administrator also realizes that this period of downtime is affecting wireless users only. The administrator travels to the troubled subnet around midday and connects using a wired workstation, but a wireless laptop will not connect. The administrator also notices that the WAP (Wireless Access Point) is 802.11g. Which one of the following would be an appropriate action to address this problem? a. Upgrade all affected computers to a uniform platform running in ad-hoc mode b. Eliminate any sources of RFI (Radio Frequency Interference) around the WAP (Wireless Access Point) c. During the affected time, connect the WAP (Wireless Access Point) directly into the router d. Change the WAP (Wireless Access Point) and all affected computers to operate in ad-hoc mode 197. Which type of connector does a 10BASE-F network use? a. MT-RJ (Mechanical Transfer-Registered Jack) b. RJ-45 (Registered Jack) c. Series-A d. ST (Straight Tip)

198. A companys network currently has three Microsoft Windows 2000 servers. A Novell NetWare 4.0 server is added, but none of the Microsoft Windows 2000 servers can access the Novell server. We must be done so that the Microsoft Windows 2000 servers can access the Novell NetWare 4.0 server? a. Install NetBEUI (Network Basic Input / Output Extended User Interface) on the Microsoft Windows 2000 servers b. Install NetBEUI (Network Basic Input / Output Extended User Interface) on the Novell NetWare 4.0 server c. Install NWLINK on the Microsoft 2000 servers d. Install NWLINK on the Novell NetWare 4.0 server 199. A junior network administrator configures a token ring network in a physical star, logical ring topology. He connects the end nodes into a 100BASE-TX network hub. Users complain of not having network access. What device should replace the hub? a. Router b. MAU (Multistation Access Unit) c. 10BASE-T hub d. Bridge 200. Which two devices both operate at the same layer of the OSI (Open Systems Interconnect) model? a. Hub and switch b. Hub and router c. Router and bridge d. Switch and bridge 201. Each of the following wireless standards use a 2.4 GHz (Gigahertz) ISM (Industrial, Scientific, and Medical) hand EXCEPT: a. Bluetooth. b. 802.11a. c. 802.11b. d. 802.11g. 202. Which one of the following IEEE (Institute of Electrical and Electronics Engineers) standards has a longer maximum distance than 100 meters (328 feet)? a. 10BASE-T b. 1000BASE-CX c. 1000BASE-T d. 10OBASE-FX 203. A Microsoft client is configured to use the NWLINK IPX/ SPX (Internetwork Packet Exchange / Sequence Packet Exchange) protocol. The network has four Novell servers but the client can only see two of the servers. The client wants to change to frame type setting to see all of the servers. What setting should the client make to correct the problem and see all of the servers? a. Configure the frame type to auto frame type detection b. Configure the frame type for 802.3 c. Configure the frame type to 802.3 or 802.2 d. Configure the frame type for NetBIOS (Network Basic Input / Output System)

204. All of the following are true statements about private IP (Internet Protocol) addressing EXCEPT: a. private IP (Internet Protocol) addresses may be duplicated across many networks without causing address conflicts. b. private IP (Internet Protocol) addresses must be obtained dynamically from the ISP (Internet Service Provider). c. private IP (Internet Protocol) addresses allow organizations to share a single public IP (Internet Protocol) address. d. large networks may be broken into several private IP (Internet Protocol) networks. 205. All of the following Novell NetWare operating systems support NDS (NetWare Directory Services) natively EXCEPT: a. 3.1 b. 4.1 c. 5.0 d. 6.0 206. When mapping to a network printer for the FIRST time, the print driver initially attempts to download from: a. the Internet. b. a file server. c. the local cab files. d. a print server. 207. A technician is troubleshooting a problem on a network using a utility to capture the packets. When the technician reviews the captured data they have only captured broadcast packets and packets from their own computer. What is the reason for this? a. They do not have permission to capture other packets. b. They are connected to a switch when trying to capture packets. c. The router is blocking the packets to the workstation. d. They are using an evaluation copy of the software utility. 208. A companys disaster recovery plan requires that a hot site be maintained for fault tolerance. Which of the following would achieve this goal? a. Data is backed up on tape and stored at an offsite location. b. An exact duplicate of the infrastructure is stored onsite. c. An exact duplicate of the infrastructure is mirrored offsite. d. Data is backed up on a second hard drive in a server. 209. Modal distortion is a problem with which type of media? a. Fiber optic cable b. Coaxial cable c. UTP (Unshielded Twisted Pair) d. STP (Shielded Twisted Pair) 210. A user has set up filtering on an Internet router. The local SMTP (Simple Mail Transfer Protocol) server has stopped sending or receiving messages from the Internet. What is the cause of the problem? a. The DHCP (Dynamic Host Configuration Protocol) server is down. b. The Internet router is blocking port 25. c. The Internet router is blocking port 110. d. The proxy server is filtering mail requests.

211. If a user needs to know the NetBIOS (Network Basic Input / Output System) name of the server that they are connected to, which of the following utilities will provide this information? a. nbtstat b. tracert c. nslookup d. netstat 212. An administrator changes the lease time of the DHCP (Dynamic Host Configuration Protocol) scope from one week to one day. What affect will this have on the end users? a. The users will have to re-login every day now. b. The users will have to manually release and renew their IP (Internet Protocol) addresses to continue working on the network. c. The users will not be affected by the change. d. The users will have to shut their computers down for the duration of the lease to obtain a new lease. 213. What is a MAC (Media Access Control) address? a. It is an address assigned to enable routing over a WAN (Wide Area Network). b. It is an address assigned to a TCP (Transmission Control Protocol) port. c. It is an address assigned to a DNS (Domain Name Service) entry. d. It is an address assigned to a NIC (Network Interface Card). 214. On an Apple File Service share point configured in Mac OS X Server 10.3, the permissions for new files and folders can be set to default to: a. CIFS (Common Internet File System) permissions. b. NTFS (New Technology File System) permissions. c. MAC OS 9 permissions. d. Standard UNIX permissions. 215. A network gateway is required to share a printer for users and has been implemented by the systems administrator. An account was created called NTGATEWAY on the Windows server and the NetWare server and users have been assigned gateway privileges. How are accounts assigned to limit certain users from having more privileges than others to modify print jobs? a. There is only one account created on each server and all users have the same rights, so this request cannot be fulfilled. b. Each user must have individual accounts set up on the Novell server to allow specific printer rights. c. Each user must have individual accounts set up on the Windows server to allow specific printer rights. d. Separate print queues must be created for each Windows user to manage rights levels. 216. All of the following are valid WEP (Wired Equivalent Privacy) key lengths EXCEPT: a. 32 bit. b. 40 bit. c. 64 bit. d. 128 bit.

217. A node on the network appears to be dropping packets. Which utility will help verify the problem? a. ipconfig b. Ping c. netstat d. nbtstat 218. A workstation with a static IP (Internet Protocol) address can print and authenticate to a server, but cannot browse to www.comptia.org. What is the FIRST item to troubleshoot? a. The physical connection b. User account on server c. WINS (Windows Internet Name Service) server settings d. DNS (Domain Name Service) server settings 219. The DHCP (Dynamic Host Configuration Protocol) server in Subnet A is removed. The DHCP (Dynamic Host Configuration Protocol) server in Subnet B is set with a DHCP (Dynamic Host Configuration Protocol) scope for Subnet A. After that, users in Subnet A still cannot receive IP (Internet Protocol) addresses. What needs to be done to correct this problem? a. Install a proxy server on Subnet A b. Install a DHCP (Dynamic Host Configuration Protocol) relay agent on a server in Subnet B c. Install a DHCP (Dynamic Host Configuration Protocol) relay agent on the DHCP (Dynamic Host Configuration Protocol) server in Subnet B d. Install a DHCP (Dynamic Host Configuration Protocol) relay agent on a server in Subnet A 220. Which one of the following will affect the range of an 802.11b WAP (Wireless Access Point)? a. 5 GHz (Gigahertz) interference b. High number of wireless users c. 900 MHz (Megahertz) interference d. A long length of antenna extension cable 221. Which type of connector would a cable have if it were supplied with a splitter and a cable modem for Internet access? a. F-Type b. RJ-45 (Registered Jack) c. RJ-11 (Registered Jack) d. IEEE 1394 (Institute of Electrical and Electronics Engineers) 222. Disk mirroring is also known as RAID (Redundant Array of Independent Disks): a. 0 b. 1 c. 2 d. 5

223. A workstation on a TCP / IP (Transmission Control Protocol / Internet Protocol) network cannot log on to a server located at another subnet. Which of the following tasks will help determine the cause of the problem? a. Ask a user on a remote segment to try to connect, replace the NIC (Network Interface Card) in the workstation, and run nbtstat at the command prompt b. Ask a user on the same segment to try to connect, ask a user on a remote segment to try to connect, and ping the server c. Ask a user on the same segment to try to connect, ask a user on a remote segment to try to connect, and run nbtstat at the command prompt d. Ping the server, replace the NIC (Network Interface Card) in the workstation, and run nbtstat at the command prompt 224. A valid MAC (Media Access Control) address is how many bytes long? a. 2 b. 4 c. 6 d. 8 225. Which one of the following authentication protocols requires the use of an NTP (Network Time Protocol) server to synchronize the workstations date and time with the server? a. Kerberos b. RADIUS (Remote Authentication Dial-In User Service) c. PAP (Password Authentication Protocol) d. MS-CHAP (Microsoft Challenge Handshake Authentication Protocol) 226. An administrator is configuring a companys Microsoft Exchange server for e-mail services. The Exchange server needs to sent e-mail to a partner company that uses a Novell GroupWise e-mail server. What protocol is needed to send e-mail between the two servers? a. CSNW (Client Services for NetWare) b. SMTP (Simple Mail Transfer Protocol) c. IPX / SPX (Internetwork Packet Exchange / Sequence Packet Exchange) d. POP3 (Post Office Protocol version 3) 227. A user complains that they are unable to connect to a new server, but they can connect to all other servers on the network. The user can ping the static IP (Internet Protocol) address of the server but cannot connect by its NetBIOS (Network Basic Input/ Output System) name. Which of the following explains the situation? a. The server has an incorrect subnet mask. b. The server has an outdated LMHOST file. c. The client has an incorrect subnet mask. d. The client has an outdated LMHOST file. 228. Which one of the following is an IEEE (Institute of Electrical and Electronics Engineers) fiber optic standard? a. 1000BASE-TX b. 10 GBASE-LR c. 1000BASE-CX d. 10BASE-T

229. An administrator is unsuccessful when attempting to ping a network device on a remote site with a firewall in between. In order for the administrator to be successful, what protocol needs to be allowed through the firewall? a. SNMP (Simple Network Management Protocol) b. UDP (User Datagram Protocol) c. ICMP (Internet Control Message Protocol) d. IGMP (Internet Group Multicast Protocol) 230. A computer on the network is able to access file shares from other computers on the LAN (Local Area Network) but not on the LANs (Local Area Network) server. The computer can access other services on the server. What is the problem? a. The computer did not log on to the servers domain. b. The computer has the wrong gateway. c. The computer does not have DNS (Domain Name Service) installed. d. The computer has the wrong subnet mask. 231. What is the minimum number of hard drives required to implement RAID 0 (Redundant Array of Independent Disks)? a. 1 b. 2 c. 3 d. 4 232. What enables remote network servers to handle multiple incoming requests, such as FTP (File Transfer Protocol), HTTP (Hypertext Transfer Protocol), Telnet, DNS (Domain Name Service), etc., from a single IP (Internet Protocol) address? a. Different services b. Routers c. Multihoming d. Different ports 233. In order to assure fault tolerance in the event of a disk controller failure, which level of RAID (Redundant Array of Independent Disks) should be implemented? a. 0 b. 1 c. 3 d. 5

234. When placing a new AV (Anti-Virus) program onto a Novell 5.0 server, the administrator must place the definition files into a globally accessible folder. Which folder in the default directory is designed for this purpose and is globally accessible by default? a. Sys:users b. Sys:apps c. Sys:system d. Sys:shared 235. A network administrator is in charge of a large corporate network containing a DNS (Domain Name Service) server, DHCP (Dynamic Host Configuration Protocol) server, and an internal web server. One particular subnet is experiencing trouble with Internet connectivity and is a wireless only subnet. The network administrator begins troubleshooting the wireless subnet and notices that there is a mixture of static and dynamic addresses, and a mixture of ad-hoc and infrastructure mode wireless settings. Some of the wireless clients can also access the corporate web server, while others cannot. What must the administrator do to enable all wireless clients to access the Internet and all corporate servers? a. Enable infrastructure mode and statically set the default gateway to the routers interface on the wireless subnet on all clients b. Enable ad-hoc mode and obtain the IP (Internet Protocol) address automatically on all clients c. Enable ad-hoc mode and statically set the default gateway to the routers interface on the wireless subnet on all clients d. Enable infrastructure mode and obtain the IP (Internet Protocol) address automatically on all clients 236. A network administrator needs to verify that the SMTP (Simple Mail Transfer Protocol) service is running on a particular server. On what port number should a Telnet session be established? a. 20 b. 21 c. 23 d. 25 237. Which of the following environments is BEST suited to provide more radio coverage using an omnidirectional antenna? a. Closed office areas with walls b. Open office areas with cubicles c. Hallways d. Outdoors 238. A Mac OS X 10.3 Kerberos user experiences an authentication failure when trying to access a kerberized service provided by Mac OS X Server 10.3. Which of these steps might resolve the issue? a. Install Kerberos client software for Mac OS X 10.3 on the user's computer. b. Synchronize all Kerberos principals' clocks using a network time server. c. Ensure that the key distribution center is running on the user's computer. d. Change the IP address of the user's computer to allow the user to access the service.

239. After creating a print queue object in the NDS (NetWare Directory Services) tree, the systems administrator creates the printer object. Users are unable to connect to the printer. What is the likely cause? a. A profile object must be created for each user. b. Container objects must be associated with the printer object. c. The print queue must be associated with the printer object. d. The global bin script must be associated with the printer object. 240. Six workstations that are numbered 1-6 are installed sequentially in a physical ring topology. Workstation 1 fails. How can the network administrator remove Workstation 1 for service without moving the other workstations? a. Connect Workstation 6 and Workstation 2 using a barrel connector b. Add a 75 ohm terminator to Workstation 6 and Workstation 2 c. Connect Workstation 6 and 2 using an RJ-45 (Registered Jack) coupler d. Add a 50 ohm terminator to Workstation 6 and Workstation 2 241. A star network that uses several cable types must use which hub type in order to accommodate all client machines? a. Active hub b. Passive hub c. Multiport repeater hub d. Hybrid hub 242. An ICS (Internet Connection Sharing) network has been setup as follows: Clients 1 and 2 cannot access the Internet. What is the problem? a. Windows 98 Second Edition does not support ICS (Internet Connection Sharing). b. A second NIC (Network Interface Card) needs to be Installed on the ICS (Internet Connection Sharing) host. c. Windows 95B does not support ICS (Internet Connection Sharing). d. A second NIC (Network Interface Card) needs to be installed on Clients 1 and 2 and the ICS (Internet Connection Sharing) host. 243. When installed on a Windows 2000 server, which one of the following allows a Windows-only client to access files on a NetWare 4.1 server? a. CSNW (Client Services for NetWare) b. GSNW (Gateway Services for NetWare) c. Novell NetWare client d. DNS (Domain Name Service) 244. What is the maximum standard distance allowed to connect a customer via an ISDN (Integrated Services Digital Network) line? a. 6,000 feet (1,828.8 meters) b. 8,000 feet (2,438.4 meters) c. 12,000 feet (3,657.6 meters) d. 18,000 feet (5,486.4 meters)

245. Which OSI (Open Systems Interconnect) layer converts digital data into electronic signals to be put on a wire? a. Physical b. Transport c. Data Link d. Presentation 246. All of the following are benefits of IPv6 (Internet Protocol version 6) EXCEPT: a. packet labeling. b. smaller header. c. improved authentication and security. d. larger subnet masks. 247. Which protocol does a diskless workstation use to obtain a network address? a. FTP (File Transfer Protocol) b. DNS (Domain Name Service) c. ARP (Address Resolution Protocol) d. BootP (Boot Protocol) 248. A network administrator of a 50 machine network is receiving complaints that some users are losing connectivity to network services. On inspection it is discovered that the IP (Internet Protocol) addresses for the subnet of 255.255.255.128 have been exhausted. Which of the following explains the problem? a. The subnet range needs to be changed to 255.255.255.0 to accommodate more users. b. A DNS (Domain Name Service) A record has been deleted for the DHCP (Dynamic Host Configuration Protocol) server path and must be re-established. c. The network router has lost its connection to the DHCP (Dynamic Host Configuration Protocol) server and must be rebooted. d. A rogue Windows DHCP (Dynamic Host Configuration Protocol) server is running a man-inthe-middle attack and has exhausted the IP (Internet Protocol) stack. 249. A new e-mail server has been added to a network. The administrator needs to change the public mail A record for the domain name to the new server IP (Internet Protocol). Whom should the administrator contact to make this change? a. Any ISP (Internet Service Provider) who has a public DNS (Domain Name Service). b. No one; the change will happen automatically. c. The domain registrar where the domain was purchased. d. The ISP (Internet Service Provider) who hosts the authoritative DNS (Domain Name Service) servers for the domain. 250. Which one of the following is an IEEE (Institute of Electrical and Electronics Engineers) copper cable standard? a. 100BASE-FX b. 1000BASE-CX c. 10 GBASE-LR d. 10BASE-FL

251. A network administrator is troubleshooting a wireless LAN (Local Area Network) that is experiencing trouble with interference. A scan of the wireless network reports that there are two WAPs (Wireless Access Point) from different companies within range of the LAN (Local Area Network). The two WAPs (Wireless Access Point) have different SSIDs (Service Set Identifier) than the LANs (Local Area Network)s WAP (Wireless Access Point), but the same channel. Also, the WEP (Wired Equivalent Privacy) appears to be the same on all WAPs (Wireless Access Point). What should the network administrator do to cut down on the interference of the wireless clients on the LAN (Local Area Network)? a. Change the LANs (Local Area Network) WAP (Wireless Access Point) to the same SSID (Service Set Identifier) as the other two WAPs (Wireless Access Point) b. Change the WEP (Wired Equivalent Privacy) settings on the two WAPs (Wireless Access Point) to be different than that of the LANs (Local Area Networks, WAPs (Wireless Access Point), and WEPs (Wired Equivalent Privacy) settings c. Change the LANs (Local Area Network) WAP (Wireless Access Point) channel to a different channel than the other two WAPs (Wireless Access Point) d. Change the LANs (Local Area Network) WAPs (Wireless Access Point) WEP (Wired Equivalent Privacy) settings to be different than that of the other two WAPs (Wireless Access Point) 252. How many connections have to be maintained on a companys mesh network with eight nodes? a. 8 b. 16 c. 28 d. 32 253. Upon which devices can NAT (Network Address Translation) be used? a. Hub b. Bridge c. Switch d. Firewall 254. What part of an Ethernet MAC (Media Access Control) address designates the manufacturer of the NIC (Network Interface Card)? a. bytes 1-3 b. bytes 1-6 c. bytes 4-6 d. bytes 4-8 255. Which of the following connectors will be required for a RAS (Remote Access Service) server accepting four incoming dial-up connections to connect to the PSTN (Public Switched Telephone Network)? a. MT-RJ (Mechanical Transfer-Registered Jack) b. RJ-11 (Registered Jack) c. RJ-45 (Registered Jack) d. RJ-48 (Registered Jack)

1. A 2. A 3. B 4. B 5. B 6. A 7. C 8. B 9. C 10. C 11. B 12. D 13. D 14. B 15. C 16. B 17. C 18. A 19. C 20. A 21. C 22. B 23. C 24. A 25. D 26. D 27. B 28. D 29. B 30. A 31. D 32. A 33. A 34. A 35. D 36. A 37. A 38. A 39. B 40. D 41. D 42. B 43. B 44. C 45. A 46. D

47. B 48. B 49. A 50. D 51. A 52. A 53. A 54. C 55. B 56. B 57. D 58. B 59. D 60. C 61. B 62. C 63. C 64. A 65. B 66. D 67. A 68. B 69. D 70. B 71. A 72. A 73. D 74. C 75. C 76. B 77. D 78. B 79. A 80. A 81. C 82. A 83. A 84. B 85. B 86. A 87. A 88. C 89. B 90. C 91. B 92. C

93. B 94. C 95. C 96. B 97. D 98. A 99. A 100. 101. 102. 103. 104. 105. 106. 107. 108. 109. 110. 111. 112. 113. 114. 115. 116. 117. 118. 119. 120. 121. 122. 123. 124. 125. 126. 127. 128. 129. 130. 131. 132. 133. 134. 135. 136. 137. 138.

B C C B D A A D C D D B C B A D D D B A B B D B C D D D B D A C C B C D C B C

139. 140. 141. 142. 143. 144. 145. 146. 147. 148. 149. 150. 151. 152. 153. 154. 155. 156. 157. 158. 159. 160. 161. 162. 163. 164. 165. 166. 167. 168. 169. 170. 171. 172. 173. 174. 175. 176. 177.

D D A B A C C C C D C C C D C B A C D C B B C C B B C C B B C B A C C A B C C

178. 179. 180. 181. 182. 183. 184. 185. 186. 187. 188. 189. 190. 191. 192. 193. 194. 195. 196. 197. 198. 199. 200. 201. 202. 203. 204. 205. 206. 207. 208. 209. 210. 211. 212. 213. 214. 215. 216.

D A A C A C D A D B D C B C D C B C B D C B D B D C B A D B C A B A C D D A A

217. 218. 219. 220. 221. 222. 223. 224. 225. 226. 227. 228. 229. 230. 231. 232. 233. 234. 235. 236. 237. 238. 239. 240. 241. 242. 243. 244. 245. 246. 247. 248. 249. 250. 251. 252. 253. 254. 255.

B D D D A B B C A B D B C A B D B D D D D B C A D B B D A D D D D B C C D A B