A SOHO office recently installed a wireless network for employees to use during lunch breaks. As such, the access point was placed in the kitchen areas by the microwave. Employees have been reporting intermittent connectivity wen using the wireless network. Which of the following would BEST improve connectivity? A. Disable SSID broadcast B. Increase the signal strength C. Move the access point D. Change the broadcast channel
C. Move the access point
Kim, a technician, suspects a virus has infected the network and is using up bandwidth. She needs to quickly determine which workstation is infected with the virus. Which of the following would BEST help Kim? A. Web server B. Syslog C. Network sniffer D. SNMP
C. Network sniffer
Which of the following is the default subnet mask for a Class B address? A. 255.0.0.0 B. 255.255.0.0 C. 255.255.255.0 D. 255.255.255.255
B. 255.255.0.0
Which of the following default ports would need to be disabled to block TFTP traffic? A. 20 B. 21 C. 69 D. 123
C. 69
When troubleshooting a connectivity issue, which of the following commands will give Jeff, the technician, a list of host names connected to the network? A. ping B. nbstat C. arp D. msconfig
B. nbstat
Which of the following cable types allows for the LONGEST distance of a Gigabit Ethernet connection? A. Multimode fiber B. CAT6a C. Single mode fiber D. Coaxial
C. Single mode fiber
Which of the following wireless technologies has the LARGEST cell size? A. 802.11a B. 802.3af C. 802.11g D. 802.11i
C. 802.11g
Which of the following is similar to MIMO? A. WPA B. SSID C. PoE D. Diversity
D. Diversity
Which of the following are available speeds when using 802.11b? (SELECT TWO) A. 1Mb/s B. 5.5 Mb/s C. 6 Mb/s D. 12 Mb/s E. 54 Mb/s
A. 1Mb/s
B. 5.5 Mb/s
RADAR avoidance technologies are built into which of the following technologies? A. 802.11a B. 802.11b C. 802.11g D. 802.11i
A. 802.11a
Which of the following technologies can cause interference for 802.11g? A. RADAR B. 802.11a C. IrDA D. Bluetooth
D. Bluetooth
Which of the following technologies would be used in a large office area that has a lot of the 2.4GHz noise? A. 802.3af B. 802.1q C. 802.11a D. MIMO
C. 802.11a
Which of the following occurs when an antenna gain is increased on an access point? A. Connection speed decrease B. Throughput decreases C. Cell size increases D. Attenuation increases
C. Cell size increases
Which encryption type uses only a 28 character key? A. 40/64 bit WEP B. 104/128 bit WEP C. SPA2 PSK D. WPA Personal
B. 104/128 bit WEP
Which of the following is an Authentication, Authorization, and Accounting (AAA) technology that is MOST used with remote access? A. PKI B. VPN C. MS-CHAP D. RADIUS
D. RADIUS
Which of the following uses a Management Information Base (MIB) to monitor the network? A. History Logs B. Syslog C. SMTP D. SNMP
D. SNMP
Which of the following does SNMPv3 BEST provide over previous versions? A. Increased security B. Simplified management C. More data types D. Higher productivity
A. Increased security
Which of the following is a terminal emulator used to manage a network device? A. VPN B. IDS C. PuTTY D. IPS
C. PuTTY
Zach, a network administrator, is tasked with simplifying the review of events from network devices. Which of the following is used to accomplish this? A. History logs B. Event logs C. Syslog server D. Traffic analyzer
C. Syslog server
Jeff, a technician, is troubleshooting connectivity issues with a new data circuit. Jeff verifies that the ST fiber jumper is good. Which of the following is the problem? A. TX/RX reversed B. Interference C. Cable length D. Bad connectors
A. TX/RX reversed
Users are reporting that internet performance is slow. Jeff, the technician, has determined that the internet connection is saturated. Which of the following is BEST used to detrmine the source, destination, and type of the traffic? A. Netflow B. Protocol analyzer C. Network sniffer D. SNMP
A. Netflow
Which of the following is a valid IPv6 address? A. 4056:958:E486::F8:8962 B. 1596:H593:B5D8::B859 C. 2048::9584:A6B8::0983 D. 4820::0985:489D::8761
A. 4056:958:E486::F8:8962
Which of the following OSI model layers is responsible for the transmission of bits? A. Layer 1 B. Layer 2 C. Layer 3 D. Layer 4
A. Layer 1
Frames ate the protocol Data Unit for which of the following layers of the OSI model? A. Layer 1 B. Layer 2 C. Layer 3 D. Layer 4
B. Layer 2