__________________________________________________________________________________ ______________ Product Questions: 176 Version: 11.0 Question 1 One advantage of dynamic routng is that it: A. Automatcaaay maintains routng tabaes. B. Limits trafc derived from routng protocoas. C. Reduces broadcast trafc. D. Automatcaaay enabaes DHCP. Aoswern A Question 2 Which of the foaaowing represents a Media Access Controa (MAC) address? A. GV:ZC:KK:DK:FZ:CA B. 255.255.255.0 C. 05:35:AB:6E:Aa:25 D. 127.0.0.1 Aoswern C Question 3 Connectng to a private network address from a pubaic network requires: A. Network address transaaton (NAT). B. Dynamic Host Confguraton Protocoa (DHCP). C. Network Access Protecton (NAP). D. Dynamic domain name system (DDNS). Aoswern A Question 4 A network device that associates a Media Access Controa (MAC) address with a port is a: A. DSL modem B. Hub C. Router D. Switch Aoswern D Page No | 3 __________________________________________________________________________________ ______________ Question 5 A Layer 2 device that connects muatpae computers within a network is a: A. Repeater B. Switch C. Router D. Packet Aoswern B Question 6 A cabae that meets the a000BaseT standard has a maximum aength of: A. 100 m B. 250 m C. 500 m D. 1,000 m Aoswern A Question 7 A router's statc route is set by the: A. Adjacent network B. Next upstream router C. Network administrator D. Routng protocoa Aoswern C Question 8 Which setng is used to determine the Domain Name System (DNS) setngs on a caient computer? A. TELNET B. NSLOOKUP C. PATHPING D. NETSTAT Aoswern B Question 9 The defauat subnet mask for a Caass B network is: Page No | 4 __________________________________________________________________________________ ______________ A. 0.0.0.255 B. 0.0.255.255 C. 255.0.0.0 D. 255.255.0.0 Aoswern D Question 10 The defauat port used for SMTP is: A. 23 B. 25 C. 80 D. 8080 Aoswern B Question 11 The ping tooa is used to: (Choose two.) A. Determine the network porton of a host address. B. Seaf-test a host's own network interface. C. Determine whether a host is reachabae. D. Manage a host's session when UDP is used. Aoswern B, C Question 12 Which of the foaaowing are features of DHCP? (Choose two.) A. IP address resoauton to canonicaa names B. Secure sheaa connectons C. Address reservaton D. Network fae transfer E. IP address excausion Aoswern C, E Question 13 The command-aine tooa used to aist a host's actve incoming connectons is: A. NETSTAT B. IPCONFIG C. NSLOOKUP Page No | 5 __________________________________________________________________________________ ______________ D. PING Aoswern A Question 14 A computer that has an IP address of 169.254.0.1 cannot access the network. Which of the foaaowing services shouad you confrm is avaiaabae? A. WINS B. DNS C. DHCP D. TFTP Aoswern C Question 15 Which network does the IP address 220.100.100.100 beaong to? A. 220.100.100.0/24 B. 220.100.100.1/24 C. 255.255.255.0/24 D. 255.255.255.1/24 Aoswern A Question 16 Which subnet mask is vaaid? A. 255.255.255.240 B. 255.255.255.228 C. 255.255.255.164 D. 255.255.255.245 Aoswern A Question 17 A service that resoaves NetBIOS names to IP addresses is: A. Domain Name Service (DNS). B. Internet Service Provider (ISP). C. Address Resoauton Protocoa (ARP). D. Windows Internet Name Service (WINS). Aoswern D Page No | 6 __________________________________________________________________________________ ______________ Question 18 What type of DNS record maps host names to addresses? A. Maia Exchanger (MX) DNS record B. Service (SRV) DNS record C. Host (A) DNS record D. Canonicaa (CNAME) DNS record Aoswern C Question 19 Teredo tunneaing is a protocoa that: A. Transaates Internet Protocoa version 4 (IPv4) to Internet Protocoa version 6 (IPv6). B. Aaaows IPv6 connectvity through IPv4 devices. C. Provides VPN security. D. Dynamicaaay aaaocates IPv6 addresses. Aoswern B Question 20 What is the defauat subnet mask for a Caass C Internet network? A. 255.255.255.252 B. 255.255.255.240 C. 255.255.255.192 D. 255.255.255.0 Aoswern D Question 21 The defauat port used for teanet is: A. 23 B. 25 C. 80 D. 8080 Aoswern A Question 22 When a caient's DHCP-issued address expires, the caient wiaa: Page No | 7 __________________________________________________________________________________ ______________ A. Seaect a new address and request approvaa from the DHCP server. B. Require manuaa confguraton with a statc IP address. C. Atempt to obtain a new address by broadcastng. D. Contnue to use the address unta it is notfed to stop. Aoswern C Question 23 You ping a server by using fuaay quaaifed domain name (FQDN) and do not receive a response. You then ping the same server by using its IP address and receive a response. Why do you receive a response on the second atempt but not on the frst atempt? A. PING is improperay confgured. B. The DNS is not resoaving. C. The DHCP server is ofine. D. NSLOOKUP is stopped. Aoswern B Question 24 A Media Access Controa (MAC) address identfes a/an: A. UPnP device. B. Locaa broadcast domain. C. Network interface card (NIC). D. Locaa area network (LAN). Aoswern C Question 25 Two companies want to share data by using the Internet. Which type of network provides the soauton? A. Ethernet B. Intranet C. Extranet D. Perimeter Aoswern C Question 26 VPNs are impaemented to provide: A. A secure connecton within a private network. Page No | 8 __________________________________________________________________________________ ______________ B. A secure connecton through pubaic networks. C. Additonaa encrypton by using IPSec. D. Additonaa security for seaected computers. Aoswern B Question 27 If an 802.aag Internet connecton has connectvity probaems, what may be the cause? A. A cordaess phone B. A ceaauaar phone C. Incandescent aights D. Eaectromagnetc interference (EMI) Aoswern D Question 28 Which of these factors has the biggest impact on data transmission speed in a wireaess network? A. The access method used for the network B. The transmission standard of the equipment used C. The use of strong encrypton for transmissions D. The transmission watage ratng used on the NIC Aoswern B Question 29 Which of the foaaowing uses a tunneaing protocoa? A. Internet B. VPN C. Extranet D. VLAN Aoswern B Question 30 A network that separates an organizaton's private network from a pubaic network is a/an: A. Firewaaa B. Extranet C. Perimeter D. Internet Page No | 9 __________________________________________________________________________________ ______________ Aoswern C Question 31 Which type of network is most vuanerabae to intrusion? A. Diaa-up B. Wireaess C. Broadband D. Leased aine Aoswern B Question 32 Atenuaton in a wireaess network signaa is a resuat of: A. Number of wireaess nodes connected. B. Distance from the access point. C. Interference from ceaauaar phones. D. Encrypton of the signaa. Aoswern B Question 33 Which type of network covers the broadest area? A. WAN B. CAN C. LAN D. PAN Aoswern A Question 34 In aocaa area network (LAN) topoaogies, the primary media access methods are: (Choose two.) A. Contenton B. Negotaton C. Kerberos D. Token passing Aoswern A, D Question 35 Page No | 10 __________________________________________________________________________________ ______________ In a physicaa star topoaogy, the centraa device is referred to as a: A. Bridge B. Server C. segmenter D. Hub Aoswern D Question 36 Which technoaogy can you use to extend an internaa network across shared or pubaic networks? A. VLAN B. Microsof ASP-NET C. Microsof .NET Framework D. VPN Aoswern D Question 37 Which two are pubaished IEEE 802.11 wireaess transmission standards? (Choose two.) A. 802.1 If B. 802.11g C. 802.11k D. 802.11m E. 802.11n Aoswern B, E Question 38 What happens when an 802.11b node starts broadcastng within the range of an 802.aag access point? A. The access point wiaa transmit, but the node wiaa be unabae to receive. B. A connecton wiaa be estabaished, C. Both the node and the access point wiaa be unabae to transmit. D. The node wiaa transmit, but the access point wiaa be unabae to receive. Aoswern B Question 39 Which technoaogy provides the highest bit rate? A. T1 B. Ea Page No | 11 __________________________________________________________________________________ ______________ C. DS3 D. ISDN Aoswern C Question 40 A VPN is a/an: A. Encrypted connecton across the Internet. B. Virtuaa network within your aocaa area network (LAN). C. Communicaton tunnea between VLANs. D. Personaa network for your use onay. Aoswern A Question 41 Which of the foaaowing determines the media access method that is used in a network? A. Number of hosts connected to the network B. Number of domain servers on the segment C. Maximum speed of the media D. Topoaogy and protocoas Aoswern D Question 42 Which wireaess authentcaton method provides the highest aevea of security? A. Wired Equivaaency Privacy (WEP) B. IEEE 802.aan C. WI-FI Protected Access (WPA) D. IEEE 802.11a Aoswern C Question 43 The topoaogy of a aocaa area network (LAN) is defned by the: A. Number of devices to connect. B. Physicaa and aogicaa characteristcs. C. Distance between workstatons. D. Type of cabae being used. Aoswern B Page No | 12 __________________________________________________________________________________ ______________ Question 44 The maximum throughput of an 802.aag network is: A. 2.4 GHz. B. 54 GHz. C. 2.4 Mbps D. 54 Mbps. Aoswern D Question 45 A node within a aocaa area network (LAN) must have a network interface device and a: A. Network account B. Tabae of aaa network nodes C. Host address D. Resource to share Aoswern C Question 46 Which of the foaaowing is a Layer 2 WAN protocoa? A. Point-to-Point Protocoa (PPP) B. Simpae Network Management Protocoa (SNMP) C. Transmission Controa Protocoa (TCP) D. Internet Protocoa (IP) Aoswern A Question 47 Which type of port is used to support VLAN trafc between two switches? A. Virtuaa port B. WAN port C. Trunk port D. LAN port Aoswern C Question 48 The protocoa that maps IP addresses to a Media Access Controa (MAC) address is: