This practice exam covers basic computer networking, to include the installation and configuration of networks, media types, configuration types, and network security. Passing this exam will require knowledge in the Ethernet Protocol, IPv4, and some IPv6, MAC addressing, TCP/UDP, the OSI Layer, and various other protocols such as SNMP, SSH, FTP, SSL/TLS, and more.
1) Which port is used by SMTP?
Simple Mail Transfer Protocol (SMTP) transfers emails between servers using TCP 25.
This question is filed under objective 5, Industry standards, practices, and network theory
The Simple Mail Transfer Protocol (SMTP) is a communication protocol for electronic mail transmission As an Internet standard, SMTP was first defined in 1982 by RFC 821, and updated in 2008 by RFC 5321 to Extended SMTP additions, which is the protocol variety in widespread use today Mail servers and other message transfer agents use SMTP to send and receive mail messages SMTP servers commonly use the Transmission Control Protocol on port number 25 User-level email clients typically use SMTP only for sending messages to a mail server for relaying, and typically submit outgoing email to the mail server on port 587 or 465 per RFC 8314… Read More
2) Which of the following can translate IP Addresses, allowing for private IP's to traverse the Internet?
NAT (Network Address Translation) allows a router to translate IPs, both statically and dynamically. This allows an entire private network to share a single or group of public IP's to access the internet.
This question is filed under objective 2, Network operations
Network address translation (NAT) is a method of remapping an IP address space into another by modifying network address information in the IP header of packets while they are in transit across a traffic routing device The technique was originally used to avoid the need to assign a new address to every host when a network was moved, or when the upstream Internet service provider was replaced, but could not route the networks address space It has become a popular and essential tool in conserving global address space in the face of IPv4 address exhaustion One Internet-routable IP address of a NAT gateway can be used for an entire private network… Read More
3) Which type of cabling would not be affected by interference from other nearby cables?
Electric cabling can be effected by Electromagnetic Interference (EMO) when nearby other electric cables. Fiber-optic is not affected by EMI because it uses light to transmit data instead of electricity.
This question is filed under objective 2, Network operations
An optical fiber (or fibre in British English) is a flexible, transparent fiber made by drawing glass (silica) or plastic to a diameter slightly thicker than that of a human hair Optical fibers are used most often as a means to transmit light between the two ends of the fiber and find wide usage in fiber-optic communications, where they permit transmission over longer distances and at higher bandwidths (data transfer rates) than electrical cables Fibers are used instead of metal wires because signals travel along them with less loss in addition, fibers are immune to electromagnetic interference, a problem from which metal wires suffer… Read More
4) A malicious AP that appears as a legitimate wireless access point, is known as what?
An Evil Twin is a wireless access point that is designed to mimic another Access Point's (AP) configuration in order to trick users into connecting to the incorrect network.
This question is filed under objective 3, Network security
An evil twin is a fraudulent Wi-Fi access point that appears to be legitimate but is set up to eavesdrop on wireless communications The evil twin is the wireless LAN equivalent of the phishing scam This type of attack may be used to steal the passwords of unsuspecting users, either by monitoring their connections or by phishing, which involves setting up a fraudulent web site and luring people there… Read More
5) You need to view a Windows PC's open TCP connections, which command would you use?
Netstat is a Windows command line tool that will show you all current TCP/IP connections. IPCONFIG will show you you're current TCP/IP configuration, not connections.
This question is filed under objective 4, Troubleshooting
In computing, netstat (network statistics) is a command-line network utility that displays network connections for Transmission Control Protocol (both incoming and outgoing), routing tables, and a number of network interface (network interface controller or software-defined network interface) and network protocol statistics It is available on Unix, Plan 9, Inferno, and Unix-like operating systems including macOS, Linux, Solaris and BSD It is also available on IBM OS/2 and on Microsoft Windows NT-based operating systems including Windows XP, Windows Vista, Windows 7, Windows 8 and Windows 10 It is used for finding problems in the network and to determine the amount of traffic on the network as a performance measurement… Read More
6) Which choice prevents indefinite loops in an IP Network?
TTL (Time To Live) is the number of devices a packet can traverse before being discarded. When a device reads and re-transmits a packet it subtracts one from the current TTL. If the TTL reaches zero, the packet is discarded. TTL is specifically designed to end infinite loops, while hop count is simply the number of devices between the transmission and destination.
This question is filed under objective 2, Network operations
Time to live (TTL) or hop limit is a mechanism that limits the lifespan or lifetime of data in a computer or network TTL may be implemented as a counter or timestamp attached to or embedded in the data Once the prescribed event count or timespan has elapsed, data is discarded or revalidated In computer networking, TTL prevents a data packet from circulating indefinitely In computing applications, TTL is commonly used to improve the performance and manage the caching of data … Read More
7) What software tool will save a packet for later review?
A Protocol Analyzer, also known as a Packet Sniffer, will record a packet and save it to your computer so you can analyze network traffic at a later time.
This question is filed under objective 2, Network operations
A protocol analyzer is a tool (hardware or software) used to capture and analyze signals and data traffic over a communication channel Such a channel varies from a local computer bus to a satellite link, that provides a means of communication using a standard communication protocol (networked or point-to-point) Each type of communication protocol has a different tool to collect and analyze signals and data Specific types of protocol analyzers include: A telecom network protocol analyzer A network packet analyzer A bus analyzer An IP load tester… Read More
8) RIP and OSPF are examples of what?
RIP (Routing Information Protocol) and OSPF (Open Shortest Path First) are two examples of routing protocols. Routing protocols exchange network routes between routers to form a network map or diagram.
This question is filed under objective 1, Network Architecture
A routing protocol specifies how routers communicate with each other to distribute information that enables them to select routes between any two nodes on a computer network Routers perform the "traffic directing" functions on the Internet data packets are forwarded through the networks of the internet from router to router until they reach their destination computer Routing algorithms determine the specific choice of route Each router has a prior knowledge only of networks attached to it directly A routing protocol shares this information first among immediate neighbors, and then throughout the network This way, routers gain knowledge of the topology of the network… Read More
9) What layer does a router operate at in the OSI Model?
Routers operate at the Network level, or layer 3 of the OSI Model. This layer includes protocols such as IP, OSPF, RIP, and EIGRP.
This question is filed under objective 5, Industry standards, practices, and network theory
In the seven-layer OSI model of computer networking, the network layer is layer 3 The network layer is responsible for packet forwarding including routing through intermediate routers… Read More
10) What type of server dynamically assigns Internet Protocol Addresses?
DHCP (Dynamic Host Configuration Protocol) dynamically assigns IP addresses to network devices.
This question is filed under objective 2, Network operations
The Dynamic Host Configuration Protocol (DHCP) is a network management protocol used on Internet Protocol (IP) networks, whereby a DHCP server dynamically assigns an IP address and other network configuration parameters to each device on the network, so they can communicate with other IP networks A DHCP server enables computers to request IP addresses and networking parameters automatically from the Internet service provider (ISP), reducing the need for a network administrator or a user to manually assign IP addresses to all network devices In the absence of a DHCP server, a computer or other device on the network needs to be manually assigned an IP address, or to assign itself an APIPA address, the latter of which will not enable it to… Read More
11) Which of the following is a loopback address?
Answer D is correct because 127.0.0.1 is the IPv4 loopback address. Answer A is a mac address, while B and C are IPv6 addresses, in IPv6 the loopback is ::1
This question is filed under objective 5, Industry standards, practices, and network theory
In computer networking, localhost is a hostname that refers to the current computer used to access it It is used to access the network services that are running on the host via the loopback network interface Using the loopback interface bypasses any local network interface hardware … Read More
12) Switches and Bridges reside on what OSI layer?
OSI Layer 2 (Data-Link Layer) consists of many layer 2 protocols, including MAC Addressing, which is used by switches and bridges. This makes both of them layer 2 devices.
This question is filed under objective 5, Industry standards, practices, and network theory
The data link layer, or layer 2, is the second layer of the seven-layer OSI model of computer networking This layer is the protocol layer that transfers data between nodes on a network segment across the physical layer The data link layer provides the functional and procedural means to transfer data between network entities and might provide the means to detect and possibly correct errors that may occur in the physical layer The data link layer is concerned with local delivery of frames between nodes on the same level of the network Data-link frames, as these protocol data units are called, do not cross the boundaries of a local area network… Read More
13) In full duplex communication, information can pass?
Full duplex transmission is when transmission between two parties can happen in both directions, simultaneously.
This question is filed under objective 1, Network Architecture
A duplex communication system is a point-to-point system composed of two or more connected parties or devices that can communicate with one another in both directions Duplex systems are employed in many communications networks, either to allow for simultaneous communication in both directions between two connected parties or to provide a reverse path for the monitoring and remote adjustment of equipment in the field There are two types of duplex communication systems: full-duplex (FDX) and half-duplex (HDX) In a full-duplex system, both parties can communicate with each other simultaneously An example of a full-duplex device is plain old telephone service… Read More
14) Which tool can help a technician identify a break in a fiber optic line?
OTDR (Optical Time-domain Reflectometer) is a device that test and characterizes a fiber optic cable. This device can do many things, including finding a break or fault in a Fiber optic line.
This question is filed under objective 4, Troubleshooting
An optical time-domain reflectometer (OTDR) is an optoelectronic instrument used to characterize an optical fiber An OTDR is the optical equivalent of an electronic time domain reflectometer It injects a series of optical pulses into the fiber under test and extracts, from the same end of the fiber, light that is scattered (Rayleigh backscatter) or reflected back from points along the fiber The scattered or reflected light that is gathered back is used to characterize the optical fiber This is equivalent to the way that an electronic time-domain meter measures reflections caused by changes in the impedance of the cable under test… Read More
15) Which choice is a feature on a switch using port-security?
Mac filtering is a type of port-security on a switch. It allows a switch to only permit a certain amount of mac addresses, or only an exact set of mac addresses on a specific port. This is usefull if a network jack is in a public area.
This question is filed under objective 3, Network security
In computer networking, MAC Filtering refers to a security access control method whereby the MAC address assigned to each network card is used to determine access to the network MAC addresses are uniquely assigned to each card, so using MAC filtering on a network permits and denies network access to specific devices through the use of blacklists and whitelists While the restriction of network access through the use of lists is straightforward, an individual person is not identified by a MAC address, rather a device only, so an authorized person will need to have a whitelist entry for each device that he or she would use to access the network… Read More
16) A user on a company's network is experiencing network issues. Their IP is 169.254.144.221, what does this IP indicate?
APIPA (Automatic Private IP Addressing) is a Microsoft Windows feature used when a DHCP server cannot be contacted, the computer will automatically assign itself an address in the 169.254.0.0/16 range. This is known as Link-Local in IPv6.
This question is filed under objective 4, Troubleshooting
In computer networking, a link-local address is a network address that is valid only for communications within the network segment or the broadcast domain that the host is connected to Link-local addresses are most often assigned automatically with a process known as stateless address autoconfiguration or link-local address autoconfiguration, also known as automatic private IP addressing or auto-IP Link-local addresses are not guaranteed to be unique beyond their network segment, therefore routers do not forward packets with link-local source or destination addresses IPv4 link-local addresses are assigned from address block 16925400/16 (16925400 through 169… Read More
17) A subnet placed outside of a firewall, that is very lightly protected is known as what?
A DMZ (Demilitarized Zone) is a physical or logical area of a network, that is facing an untrusted network, generally the internet. It is normally used for servers that need to be accessable from outside a network.
This question is filed under objective 3, Network security
In computer security, a DMZ or demilitarized zone (sometimes referred to as a perimeter network or screened subnet) is a physical or logical subnetwork that contains and exposes an organization's external-facing services to an untrusted, usually larger, network such as the Internet The purpose of a DMZ is to add an additional layer of security to an organization's local area network (LAN): an external network node can access only what is exposed in the DMZ, while the rest of the organization's network is firewalled The DMZ functions as a small, isolated network positioned between the Internet and the private network … Read More
18) Jack, a network technician, needs to subnet a class C network into as many subnets as possible, with at least 22 usable hosts per subnet. What subnet mask should he use?
255.255.255.224 is the correct subnet, because it gives 30 usable hosts per subnet, and will give you the most possible subnets.
This question is filed under objective 2, Network operations
A subnetwork or subnet is a logical subdivision of an IP network The practice of dividing a network into two or more networks is called subnetting Computers that belong to a subnet are addressed with an identical most-significant bit-group in their IP addresses This results in the logical division of an IP address into two fields: the network number or routing prefix and the rest field or host identifier The rest field is an identifier for a specific host or network interface The routing prefix may be expressed in Classless Inter-Domain Routing (CIDR) notation written as the first address of a network, followed by a slash character (/), and ending with the bit-length of the prefix… Read More
19) What is the purpose of using STP ethernet cables instead of UTP ethernet cables?
Shielded Twisted Pair (STP) is an Ethernet cable that is wrapped in a Electromagnetic Interference (EMI) resistant jacket. Therefore, the purpose of using STP over UTP is to protect against EMI.
This question is filed under objective 5, Industry standards, practices, and network theory
Twisted pair cabling is a type of wiring in which two conductors of a single circuit are twisted together for the purposes of improving electromagnetic compatibility Compared to a single conductor or an untwisted balanced pair, a twisted pair reduces electromagnetic radiation from the pair and crosstalk between neighboring pairs and improves rejection of external electromagnetic interference It was invented by Alexander Graham Bell… Read More
20) Which switch for the ping command, will ping a host a specific number of times?
The switch "-n" will tell Windows to ping a host a certain amount of times. For example, ping google.com -n 10, will ping google.com 10 times.
This question is filed under objective 4, Troubleshooting
Ping is a computer network administration software utility used to test the reachability of a host on an Internet Protocol (IP) network It is available for virtually all operating systems that have networking capability, including most embedded network administration software Ping measures the round-trip time for messages sent from the originating host to a destination computer that are echoed back to the source The name comes from active sonar terminology that sends a pulse of sound and listens for the echo to detect objects under waterPing operates by sending Internet Control Message Protocol (ICMP) echo request packets to the target host and waiting for an ICMP echo reply… Read More
You can go back and review your answers or grade your test.