This practice exam covers basic computer networking, to include the installation and configuration of networks, media types, configuration types, and network security. Passing this exam will require knowledge in the Ethernet Protocol, IPv4, and some IPv6, MAC addressing, TCP/UDP, the OSI Layer, and various other protocols such as SNMP, SSH, FTP, SSL/TLS, and more.
1) Lin, a network technician, needs to configure a port on a switch to provide connectivity and electrical support to a WAP being installed in a warehouse. Which of the following features needs to be configured on the switch?
Power over Ethernet (PoE) is a technology that passes electrical power along with data on an Ethernet cable, thus providing power to the distant network device.
This question is filed under objective 1, Network Architecture
Power over Ethernet, or PoE, describes any of several standards or ad hoc systems that pass electric power along with data on twisted pair Ethernet cabling This allows a single cable to provide both data connection and electric power to devices such as Wireless Access Points (WAPs), Internet Protocol (IP) cameras, and Voice over Internet Protocol (VoIP) phones There are several common techniques for transmitting power over Ethernet cabling Three of them have been standardized by Institute of Electrical and Electronics Engineers (IEEE) standard IEEE 8023 since 2003 These standards are known as alternative A, alternative B, and 4PPoE… Read More
2) Which of the following operates at OSI layer 2 to forward traffic based on the MAC address?
A switch operates at level 2 of the OSI model, and forwards network traffic based of MAC Addresses.
This question is filed under objective 5, Industry standards, practices, and network theory
A network switch (also called switching hub, bridging hub, and, by the IEEE, MAC bridge) is networking hardware that connects devices on a computer network by using packet switching to receive and forward data to the destination device A network switch is a multiport network bridge that uses MAC addresses to forward data at the data link layer (layer 2) of the OSI model Some switches can also forward data at the network layer (layer 3) by additionally incorporating routing functionality Such switches are commonly known as layer-3 switches or multilayer switchesSwitches for Ethernet are the most common form of network switch… Read More
3) Which of the following commands could Philip, a network administrator, use to determine the IP address of a Linux server?
The ifconfig command is used in Unix-like operating systems to display and configure TCP/IP network interface parameteres.
This question is filed under objective 4, Troubleshooting
ifconfig is a system administration utility in Unix-like operating systems for network interface configuration The utility is a command-line interface tool and is also used in the system startup scripts of many operating systems It has features for configuring, controlling, and querying TCP/IP network interface parameters Ifconfig originally appeared in 42BSD as part of the BSD TCP/IP suite … Read More
4) Jeff, a customer, has requested a solution to allow all internally and externally bound traffic to be monitored. Which of the following would allow a packet sniffer to do this?
Enabling port mirroring on a network device, usually a switch, will duplicate all network traffic out a single network port so a packet sniffer may then record the traffic.
This question is filed under objective 1, Network Architecture
Port mirroring is used on a network switch to send a copy of network packets seen on one switch port (or an entire VLAN) to a network monitoring connection on another switch port This is commonly used for network appliances that require monitoring of network traffic such as an intrusion detection system, passive probe or real user monitoring (RUM) technology that is used to support application performance management (APM) Port mirroring on a Cisco Systems switch is generally referred to as Switched Port Analyzer (SPAN) or Remote Switched Port Analyzer (RSPAN) Other vendors have different names for it, such as Roving Analysis Port (RAP) on 3Com switches… Read More
5) When configuring a wireless access point, Alex, a network administrator, needs to determine the MAC address of a local printer. Which of the following commands would be MOST helpful in determining the MAC address?
The arp command display and modifies entries in the Address Resolution Protocol (ARP) table, which contains IP and MAC Addresses.
This question is filed under objective 4, Troubleshooting
The Address Resolution Protocol (ARP) is a communication protocol used for discovering the link layer address, such as a MAC address, associated with a given internet layer address, typically an IPv4 address This mapping is a critical function in the Internet protocol suite ARP was defined in 1982 by RFC 826, which is Internet Standard STD 37 ARP has been implemented with many combinations of network and data link layer technologies, such as IPv4, Chaosnet, DECnet and Xerox PARC Universal Packet (PUP) using IEEE 802 standards, FDDI, X25, Frame Relay and Asynchronous Transfer Mode (ATM) In Internet Protocol Version 6 (IPv6) networks, the functionality of ARP is provided by the Neighbor Discovery Protocol (NDP)… Read More
6) You suspect an employee of using the company's Internet connection to download illegal content. Which of the following can be used to inspect ongoing network traffic?
A packet sniffer will record network traffic onto a storage device for later review. This will allow you to save and analyze the employees network traffic.
This question is filed under objective 3, Network security
A packet analyzer or packet sniffer is a computer program or computer hardware such as a packet capture appliance, that can intercept and log traffic that passes over a computer network or part of a network Packet capture is the process of intercepting and logging traffic As data streams flow across the network, the analyzer captures each packet and, if needed, decodes the packet's raw data, showing the values of various fields in the packet, and analyzes its content according to the appropriate RFC or other specifications A packet analyzer used for intercepting traffic on wireless networks is known as a wireless analyzer or WiFi analyzer… Read More
7) Lin, a network engineer, needs to troubleshoot a remote router within the WAN. Which of the following user authentications would be the BEST to implement?
TACACS+ is an open standard protocol developed by Cisco that is used to authenticate users across a network.
This question is filed under objective 5, Industry standards, practices, and network theory
Terminal Access Controller Access-Control System (TACACS, ) refers to a family of related protocols handling remote authentication and related services for networked access control through a centralized server The original TACACS protocol, which dates back to 1984, was used for communicating with an authentication server, common in older UNIX networks it spawned related protocols: Extended TACACS (XTACACS) is a proprietary extension to TACACS introduced by Cisco Systems in 1990 without backwards compatibility to the original protocol TACACS and XTACACS both allow a remote access server to communicate with an authentication server in order to determine if the user has access to the network… Read More
8) Which of the following could be used to estimate Round-Trip Time (RTT) across a router?
Tracert (traceroute) is a diagnostic tool that will display the route and measure transmit times between network devices.
This question is filed under objective 4, Troubleshooting
In computing, traceroute and tracert are computer network diagnostic commands for displaying possible routes (paths) and measuring transit delays of packets across an Internet Protocol (IP) network The history of the route is recorded as the round-trip times of the packets received from each successive host (remote node) in the route (path) the sum of the mean times in each hop is a measure of the total time spent to establish the connection Traceroute proceeds unless all (usually three) sent packets are lost more than twice then the connection is lost and the route cannot be evaluated Ping, on the other hand, only computes the final round-trip times from the destination point… Read More
9) Jennifer, a technician replaces a customer's router, and is now unable to ping the ISP's gateway. Which of the following should the technician check?
Because the router is new, it is likely that the new customer's router has not yet updated it's route table and that would be the best place to look.
This question is filed under objective 4, Troubleshooting
In computer networking a routing table, or routing information base (RIB), is a data table stored in a router or a network host that lists the routes to particular network destinations, and in some cases, metrics (distances) associated with those routes The routing table contains information about the topology of the network immediately around it The construction of routing tables is the primary goal of routing protocols Static routes are entries made in a routing table by non-automatic means and which are fixed rather than being the result of routing protocols and associated network topology discovery procedures … Read More
10) Which of the following is the prefix for a link-local IPv6 address?
In IPv6, link local addresses belong to the FE80::/10 address block. Link local is the IPv6 equivalent of IPv4's private addressing.
This question is filed under objective 1, Network Architecture
In computer networking, a link-local address is a network address that is valid only for communications within the network segment or the broadcast domain that the host is connected to Link-local addresses are most often assigned automatically with a process known as stateless address autoconfiguration or link-local address autoconfiguration, also known as automatic private IP addressing or auto-IP Link-local addresses are not guaranteed to be unique beyond their network segment, therefore routers do not forward packets with link-local source or destination addresses IPv4 link-local addresses are assigned from address block 16925400/16 (16925400 through 169… Read More
11) Which of the following network tools is used to identify running services on host devices?
Network Mapper (NMAP) is a security scanner used to discover hosts and services on a computer network.
This question is filed under objective 2, Network operations
Nmap (Network Mapper) is a free and open-source network scanner created by Gordon Lyon (also known by his pseudonym Fyodor Vaskovich) Nmap is used to discover hosts and services on a computer network by sending packets and analyzing the responses Nmap provides a number of features for probing computer networks, including host discovery and service and operating system detection These features are extensible by scripts that provide more advanced service detection, vulnerability detection, and other features Nmap can adapt to network conditions including latency and congestion during a scan Nmap started as a Linux utility and was ported to other systems including Windows, macOS, and BSD… Read More
12) In which of the following layers of the OSI model does the TCP protocol operate?
The TCP protocol operates on layer 4, the Transport layer of the OSI model.
This question is filed under objective 5, Industry standards, practices, and network theory
In computer networking, the transport layer is a conceptual division of methods in the layered architecture of protocols in the network stack in the Internet protocol suite and the OSI model The protocols of this layer provide host-to-host communication services for applications It provides services such as connection-oriented communication, reliability, flow control, and multiplexing The details of implementation and semantics of the transport layer of the Internet protocol suite, which is the foundation of the Internet, and the OSI model of general networking are different The protocols in use today in this layer for the Internet all originated in the development of TCP/IP… Read More
13) Philip, an administrator, is responsible for one Linux and two Windows servers. He would like to review all server logs centrally. Which of the following services could Philip use in this scenario?
Syslog is a standardized computer message logging technology, which can be used on many operating systems such as Windows and Linux.
This question is filed under objective 5, Industry standards, practices, and network theory
In computing, syslog is a standard for message logging It allows separation of the software that generates messages, the system that stores them, and the software that reports and analyzes them Each message is labeled with a facility code, indicating the software type generating the message, and assigned a severity level Computer system designers may use syslog for system management and security auditing as well as general informational, analysis, and debugging messages A wide variety of devices, such as printers, routers, and message receivers across many platforms use the syslog standard This permits the consolidation of logging data from different types of systems in a central repository… Read More
14) Which of the following is a Class A private IP address?
In IPv4 addressing the 10.0.0.0 - 10.255.255.255 range is the private IP range for Class A addresses.
This question is filed under objective 1, Network Architecture
An Internet Protocol address (IP address) is a numerical label assigned to each device connected to a computer network that uses the Internet Protocol for communication An IP address serves two main functions: host or network interface identification and location addressing Internet Protocol version 4 (IPv4) defines an IP address as a 32-bit number However, because of the growth of the Internet and the depletion of available IPv4 addresses, a new version of IP (IPv6), using 128 bits for the IP address, was standardized in 1998 IPv6 deployment has been ongoing since the mid-2000s IP addresses are written and displayed in human-readable notations, such as 172… Read More
15) Which of the following protocols is used by the ping command?
The Internet Control Message Protocol (ICMP) is used to control IP networks. It is used for error reporting, network congestion, and availability.
This question is filed under objective 5, Industry standards, practices, and network theory
The Internet Control Message Protocol (ICMP) is a supporting protocol in the Internet protocol suite It is used by network devices, including routers, to send error messages and operational information indicating success or failure when communicating with another IP address, for example, an error is indicated when a requested service is not available or that a host or router could not be reached ICMP differs from transport protocols such as TCP and UDP in that it is not typically used to exchange data between systems, nor is it regularly employed by end-user network applications (with the exception of some diagnostic tools like ping and traceroute)… Read More
16) Rachael, a network administrator, has disabled STP on the local network. Which of the following is MOST likely the cause of a recent spike in duplicate traffic?
Spanning Tree Protocol (STP) is used on network switches to disable duplicate routes until needed. Without STP, these duplicate routes will result in loops in network traffic.
This question is filed under objective 1, Network Architecture
A switching loop or bridge loop occurs in computer networks when there is more than one Layer 2 (OSI model) path between two endpoints (eg multiple connections between two network switches or two ports on the same switch connected to each other) The loop creates broadcast storms as broadcasts and multicasts are forwarded by switches out every port, the switch or switches will repeatedly rebroadcast the broadcast messages flooding the network Since the Layer 2 header does not support a time to live (TTL) value, if a frame is sent into a looped topology, it can loop forever A physical topology that contains switching or bridge loops is attractive for redundancy reasons, yet a switched network must not have loops… Read More
17) Managing a network device on a dedicated channel that is not used for regular network traffic is known as:
Out-of-band management is the use of a trusted, dedicated management channel for accessing a network device. This data is transmitted separately from in-band data such as network traffic.
This question is filed under objective 2, Network operations
In systems management, out-of-band management involves the use of management interfaces (or serial ports) for managing and networking equipment Out-of-band management allows the network operator to establish trust boundaries in accessing the management function to apply it to network resources It also can be used to ensure management connectivity (including the ability to determine the status of any network component) independent of the status of other in-band network components In computing, one form of out-of-band management is sometimes called lights-out management (LOM) and involves the use of a dedicated management channel for device maintenance It allows a system administrator to monitor and manage servers and other network-attached… Read More
18) Which of the following technologies would be used in a small office area that has a lot of 2.4GHz noise?
802.11a uses the 5 GHz frequency range, and is a good alternative when the 2.4 GHz range is unusable.
This question is filed under objective 1, Network Architecture
IEEE 80211a-1999 or 80211a was an amendment to the IEEE 80211 wireless local network specifications that defined requirements for an orthogonal frequency division multiplexing (OFDM) communication system It was originally designed to support wireless communication in the unlicensed national information infrastructure (U-NII) bands (in the 5–6 GHz frequency range) as regulated in the United States by the Code of Federal Regulations, Title 47, Section 15407 Originally described as clause 17 of the 1999 specification, it is now defined in clause 18 of the 2012 specification and provides protocols that allow transmission and reception of data at rates of 1… Read More
19) Philip, a technician, has been asked to configure the WAN interface connecting to the ISP's router. Which of the following interfaces on the router will be modified?
The interface in this situation is a WAN interface. The only option here that is a WAN interface is Serial 0/0/0. Fast Ethernet is a similar option, but is typically used for LAN communications.
This question is filed under objective 4, Troubleshooting
20) Which of the following OSI model layers is between the Network and Session layers?
The Transport layer, or layer 4, of the OSI model is located between the Network and Session layers.
This question is filed under objective 5, Industry standards, practices, and network theory
In computer networking, the transport layer is a conceptual division of methods in the layered architecture of protocols in the network stack in the Internet protocol suite and the OSI model The protocols of this layer provide host-to-host communication services for applications It provides services such as connection-oriented communication, reliability, flow control, and multiplexing The details of implementation and semantics of the transport layer of the Internet protocol suite, which is the foundation of the Internet, and the OSI model of general networking are different The protocols in use today in this layer for the Internet all originated in the development of TCP/IP… Read More
You can go back and review your answers or grade your test.