81.Which cable type is least susceptible to cross-talk? A. UTP B. STP C. coaxial D. fiber optic 83.Which methods implement disaster recovery? (Choose all that are applicable.) A. Tape backup B. Mirrored servers C. A remote hot site D. Off-site data archive E. Uninterruptible power supply F. Lifeboats 86.Which TCP/IP utility lets you view the table that contains IP address to MAC address resolutions? A. route B. ping C. arp D. nbtstat E. netstat F. garp 87.A user cannot access one of two applications on a server. The other users can access both applications. What is your first step to resolve the problem? A. Reboot the server B. Reboot the workstation C. Check the user's password D. Check the user's access permissions E. Ask the user to access the problem application F. Escalate this problem to your supervisor 100.Which protocol maps IP addresses to layer 2 addresses? A. DHCP B. DNS C. ICMP D. ARP E. Other: __________ 107.Which protocol recovers from lost or duplicated packets during transmission? A. IP B. ICMP C. UDP D. TCP E. Ethernet F. Diplomatic 108. Which medium connects a client to a 100Base-T switch? A. wireless B. fiber optic C. Category 3 UTP D. Category 5 UTP E. Shirley Maclaine 109.Which network device provides public to private network security and may also use Network Address Translation (NAT)? A. hub B. bridge C. switch D. firewall E. NIC F. NAC A TIA 568B crossover cable has which pairs of wires/pins connected? A. 1 and 2 B. 1 and 3 C. 2 and 5 D. 2 and 6 E. 3 and 4 F. 4 and 6 128.Your network utilization spikes and stays at a high level. What is your first troubleshooting step? A. Isolate the faulty node B. Verify problem resolution C. Isolate the faulty cable section D. Isolate the faulty network segment E. Isolate the faulty transceiver, transceiver cable, or NIC F. Delegate 130.Devices within the same VLAN always belong to the same __________. A. switch B. CSU/DSU C. broadcast domain D. Windows NT domain 135.Which is a benefit of fault tolerance? A. The efficient use of network bandwidth B. The elimination of a single point of failure C. The ability to restore data after a disk crash D. The ability to distribute CPU load across multiple servers E. The ability to tolerate faults 136.What is the goal of disaster recovery? A. To rebuild the structure area around the server farm B. To recover all users data/software for all workstations C. To recover various non-job-related files from users and workstations D. To recover the pertinent software applications and data to continue business E. To recover from a disaster 140.You have a permanent connection to the Internet for your network. Your local network includes a Web server and an SMTP server. You are concerned about the threat of hackers gaining access from the Internet. You have enforced HTTPS access to your Web server. After you make this change, your Web server is no longer accessible from the Internet, but can still be accessed by your internal network users. What would you predict is causing this problem? A. Your DNS server is down. B. Your Web server address has changed. C. Your Internet router is blocking port 25. D. Your Internet router is blocking port 443. 141.Network A is IP network 192.168.100.0/24. Which are valid IP addresses for a computer located on network A? A. 192.168.100.0 B. 192.168.100.1 C. 192.168.100.254 D. 192.168.100.255 E. 127.0.0.1 F. 192.168.100.256 151.Which cable type is most susceptible to cross-talk? A. UTP B. STP C. coaxial D. fiber optic E. brake 184.Which tape backup methods clear the archive attribute? (Choose all that are applicable.) A. Differential B. Sequential C. Full D. Incremental E. Partial differential 186.Which of the following are features of POTS? (Choose all that are applicable) A. Ease of configuration B. Digital transmission C. Inexpensive cost D. Readily available E. 64 Kbps F. Medicinal 210.Which TCP/IP protocol does a UNIX server use to send e-mail to another UNIX server? A. POP3 B. SNMP C. SMTP D. FTP E. NNTP F. none, only Microsoft can do email 215.A UNIX server on the Internet is configured to host a web site and an FTP site. How will the server know what service incoming packets are intended for? A. Protocol ID B. Host header C. TCP address D. MAC address E. Port number F. Attached sticky note 229.You load print services on a server and the service does not appear to have started and is causing problems. Where would you look to investigate further? A. Registry B. Network settings C. Log file D. DNS E. Google 249.Computers are rebooting spontaneously. The room is cold and there are space heaters in use. What is the problem? A. Bad NICs B. Bad UPS C. Bad wiring D. Voltage drop at the outlet E. Mixing cold and hot air currents 253.Which header field is used to route datagrams? A. port address B. MAC address C. source address D. destination address E. trick question, I refuse to answer it 272."Mirroring" uses what RAID level? A. 0 B. 1 C. 3 D. 5 E. Ant Baits III 283.Which of these parameters can be configured in your Network Properties? (Choose all that apply) A. Web server IP address B. DNS server IP address C. IP address D. Gateway E. IP address of DHCP server F. MySpace profile 285.You can access your Web server by its IP but not by its host name. What type of problem could be present? A. patch cable B. LMHOSTS C. DNS D. NIC E. default gateway F. memory error 290.Which of the following is used by Network Management applications to monitor network devices remotely? A. SNMP B. SMTP C. DHCP D. WINS E. DNS F. Webcam 292.Your network has a permanent connection to the Internet. Your local network included a Web server and an SMTP server. You are concerned about the threat of hackers gaining access from the Internet. You decide to set up filtering on your Internet router. After you make this change, your local clients can no longer download files from an external FTP site. You think your router may be blocking a standard port. What port is being blocked? A. 21 B. 25 C. 53 D. 110 E. 666 308.A contractor added a DHCP server to your 200-node network. The contractor was instructed to use the same range of address that was being used previously. You are able to make manual changes to most of the machines, but some machines are in locked areas. Which error messages should you expect to see on those machines? A. IP address conflicts B. IPX address conflict C. NIC address conflicts D. Server address conflict E. Send error report now? 316.You receive a call from a user working from a virtual office at home. The office is connected to the corporate site using ADSL through a local ISP. All of the light on the external DSL modem indicate that it is connected to the CO. A reboot of the modem indicates a normal reconnect to the CO. However, the user is not able to connect to the Internet. What is the possible DSL problem? A. The user's phone line is busy. B. The DSL access multiplexer is down. C. The DSL filter is connected to the modem. D. The ISP connection to the DSL access multiplexer is down. E. ISP late payment policy 322.Which dial-up protocol does not provide addressing, packet type identification, error detection/correction, or compression mechanisms and requires that the device on each end know the other's address? A. PPP B. SLIP C. POTS D. TCP/IP E. Texting 328.Which are valid IPv4 addresses? A. 129.22.253.1 B. 265.35.15.67 C. A6:30:12:C3:A4:32:E2 D. 192.168.256.2 E. 1.1.1.1