A multi-layer switch operates at which of the following OSI layers?
A. Layers 1 and 5
B. Layers 2 and 3
C. Layers 4 and 5
D. Layers 5 and 6
Which of the following protocols is used to detect and eliminate switching loops within a network?
A. Spanning Tree Protocol
B. EIGRP
C. OSPF
D. Dynamic routing
The MAC address of a network device is used to communicate at which of the following OSI layers?
A. Layer 1
B. Layer 2
C. Layer 4
D. Layer 5
Which of the following defines an IP address that is NOT routed on the Internet?
A. Multicast
B. Public
C. Private
D. Classful
A user reports that some normally accessible external sites are not responding, but most other sites are responding normally. Which of the following is MOST likely the cause?
A. VLAN tag mismatch
B. Wrong subnet mask
C. Smurf attack
D. Faulty routing rule
An administrator has set up a NIPS and connected it to the same switch as the internal firewall interface and the internal router. The device, however, only detects traffic from itself to the firewall or router. Which of the following explains why additional corporate traffic cannot be detected?
A. The spanning tree protocol is preventing the traffic.
B. Port Mirroring is set up incorrectly.
C. The switch needs to be a layer 3 switch.
D. The traffic is in a classless IP range and not classful IP range.
Which of the following wireless parameters may need to be modified when a new cordless telephone is installed?
A. Encryption type
B. SSID
C. IP address
D. Channel
Which of the following connectors are MOST commonly used on a POTS line?
A. RJ-45
B. MTRJ
C. DB-9
D. RJ-11
A small office needs to connect one new system to their network in a distant office, but does not have the resources to install a new Ethernet wall jack, and does not want to use wireless. Which of the following is a simple, cost effective option for providing connectivity?
A. SONET
B. Multimode fiber
C. 802.11n
D. Broadband over Power Line
A technician is tasked with rewiring a CAT5e SOHO network with 10 existing computers. The users are currently running at 100 Mbps and would like to be upgraded to 1000 Mbps. Which of the following should the technician do FIRST?
A. Upgrade the existing computers
B. Purchase a new 802.11ac access point and install.
C. Install CAT6 wiring for the SOHO network
D. Verify the network cards can support 1Gbps
Which of the following network topologies is MOST likely used in remote access VPN?
A. Point to Point
B. Bus
C. Ring
D. Mesh
Which of the following would MOST likely be used by a network administrator to test DNS resolution?
A. dig
B. ipconfig
C. netstat
D. nbtstat
Which of the following methods would be implemented to correct a network slowdown caused by excessive video streaming?
A. Traffic shaping
B. Proxy server
C. VPN concentrator
D. High availability
An administrator determines there are an excessive number of packets being sent to a web server repeatedly by a small number of external IP addresses. This is an example of which of the following attacks?
A. DDoS
B. Viruses
C. Worms
D. Man-in-the-middle
PKI is a method of user authentication which uses which of the following?
A. Various router commands
B. Access control lists
C. Certificate services
D. A RADIUS server