Sandy, a network administrator, needs to allow all websites to be accessible by the sales team for business purposes. Which of the following ports need to be enabled on the firewall? (Select TWO).


A.      23

B.      25

C.      53

D.      80

E.       443


Correct Answer: DE




Which of the following technologies would Sandy, a technician, use to connect networks at large distances without the use of physical medium?


A.      Satellite

B.      ISDN

C.      OC3

D.      OC12


Correct Answer: A




Once Kurt, a technician, has implemented the solution to a user’s reported problem, which of the following should Kurt do NEXT?


A.      Alert the user that everything is repaired.

B.      Verify full system functionality.

C.      Document findings, actions, and outcomes.

D.      Establish a plan of action to resolve the problem.


Correct Answer: B




Joe, a user, reports that his PC is the only one that does not have network connectivity. All the wiring has been tested properly and the problem still exists. Joe is getting an APIPA address. Which of the following is the MOST likely cause?


A.      Crossover cable is being used

B.      Switch was powered off

C.      PoE is disabled on the port

D.      Port on the switch is disabled


Correct Answer: D




Which of the following issues is a common problem in wireless infrastructures?


A.      Incorrect port number

B.      Mismatched SSIDs

C.      Invalid telnet sessions

D.      Too many collisions

Correct Answer: B




A switch in IDF 3 has shut down at 3 p.m. every day this week. Which of the following network tools should Karen, a technician, use to troubleshoot this problem?


A.      Environmental monitor

B.      Cable tester

C.      TDR

D.      Loopback plug


Correct Answer: A




Kurt, an administrator, wants to eliminate remote access to a network from all users, except those users in Kurt’s own country. Which of the following security measures could he use to set up this functionality?


A.      MAC filtering

B.      Port filtering

C.      IP filtering

D.      TLS


Correct Answer: C




Users are unable to access the company’s intranet website. Which of the following attacks has the network MOST likely experienced?


A.      Man-in-the-middle

B.      Smurf

C.      Trojan

D.      DoS


Correct Answer: D




Kurt, a technician, spoke to a user regarding a network problem. He searched all the logs associated with the problem and pulled the change logs for the network environment. Which of the following should Kurt perform NEXT?

A.      Establish a theory of probable cause

B.      Implement preventative measures

C.      Implement the solution or escalate as necessary

D.      Establish a plan of action to resolve the problem


Correct Answer: A




Which of the following technologies would adhere to the AAA model while facilitating ease of login changes for multiple routers and switches?


A.      DOCSIS

B.      HDLC

C.      SNMP

D.      TACACS+


Correct Answer: D



Comments are closed.