Karen, an administrator, has created a patch cable. Which of the following tools should she use to check the integrity of the cable?


A.      Protocol analyzer

B.      Toner probe

C.      Cable certifier

D.      Cable stripper


Correct Answer: C




Which of the following tools would Kurt, an administrator, use to identify opens and shorts?


A.      Ohmmeter

B.      Protocol analyzer

C.      Cable tester

D.      Multimeter


Correct Answer: C




Which of the following could Karen, a network technician, use to inspect connection setup, request, and response headers for users connecting to a web server?


A.      nbtstat command

B.      dig command

C.      ipconfig command

D.      Protocol analyzer


Correct Answer: D




A new business’ web server has seen a huge spike of legitimate traffic in the last week. The owners want to ensure the site has no problems as the business continues to grow. For Karen, a network administrator, which of the following is the MOST important concern for this company?


A.      Caching

B.      Asset management

C.      Traffic shaping

D.      High availability


Correct Answer: D




Kurt, a customer, has been using a combination of SSID disable and WEP encryption for wireless security. Lately there have been many unauthorized devices on Kurt’s wireless network. Which of the following should also be implemented to prevent unauthorized devices from connecting? (Select TWO).


A.      SSID should be changed daily and enabled.

B.      WEP should be replaced with WPA encryption.

C.      MAC filtering should be enabled and configured.

D.      A different WAP manufacturer should be used to prevent commonly used security cracking techniques

E.       Omni-directional antennas should be used to limit signal strength


Correct Answer: BC




Joe, a technician, is setting up an IDS security device. Which of the following should be configured on the switch to utilize the IDS?

A.      PoE

B.      Port mirroring

C.      Convergence

D.      Port speed


Correct Answer: B




Joe, a client, has observed non-employees sitting in his parking lot and surfing on his unsecured wireless connection. Which of the following could be employed to potentially prevent this? (Select TWO).


A.      PoE

B.      VLANs

C.      MTU black hole

D.      GBIC installation

E.       WPA

F.       Reduction of signal gain


Correct Answer: EF




Joe, a network technician, blocks access to ports 25,110, and 143 on the firewall. Which of the following application services will be blocked due to this?


A.      Email sending and receiving

B.      Domain Name Service

C.      FTP access to external servers

D.      Remote desktop access


Correct Answer: A




Which of the following services do TCP connections provide to application layer protocols? (Select TWO).


A.      Transport services without error recovery

B.      Large data size manageability using segmentation

C.      Secure Kerberos password encryption on data

D.      Delivery through error recovery

E.       Proxy server authentication


Correct Answer: BD




Which of the following cable mediums is NOT susceptible to EMI?


A.      Wireless

B.      Fiber

C.      Coaxial

D.      UTP


Correct Answer: B



Comments are closed.