What are the terms used to describe an internet service provider that utilizes T1 or T3 lines, fiber optic connections, and employs point-to- point millimeter-wave or microwave links for its backbone and service area expansion, along with point- to-multipoint wireless technology to offer Internet access to its customers?
Demarcation point.
Long-range fixed wireless.
ISP.
WISP.
The correct answers are Long-range fixed wireless and WISP because they describe an ISP using wireless technology like millimeter-wave or microwave links to provide internet. Long-range fixed wireless refers to these wireless connections, and WISP is an ISP that delivers internet this way. The wrong answers are Demarcation point and ISP. A demarcation point is just where the ISP’s network meets the customer’s, not the type of service. ISP is too general and doesn’t specify the use of wireless technology.
You’re configuring a network for a customer. The network employs a DHCP server, but the customer requires a fixed IP address for their print server. What are the possible solutions?
Configure a reserved IP address on the DHCP server for the print server
Static and dynamic IP addresses can’t exist on the same network. You’ll have to manually configure everything
Manually configure the print server to have a static IP address.
Let the DHCP server assign a number because once assigned, it will not change,
Configuring a reserved IP address on the DHCP server for the print server is correct because it allows the DHCP server to always assign the same IP address to the print server based on its MAC address, ensuring consistency while still managing IP addresses dynamically. Manually configuring the print server with a static IP address is also correct, as it ensures the device always has a fixed address, but this requires choosing an IP outside the DHCP range to avoid conflicts. The statement that static and dynamic IPs can’t exist on the same network is incorrect because networks often use both; dynamic addresses for most devices and static ones for critical infrastructure. Lastly, the idea that a DHCP-assigned address will never change is incorrect because DHCP leases expire, and addresses can be reassigned unless explicitly reserved.
What are the TWO Internet appliances that stand between a computer and the Internet, may translate traffic between networks or protocols, contain stateful packet inspection (packet filtering), and function as a gateway?
Unified threat management (UTM).
Proxy servers
Spam gateway
Load balancers.
Proxy servers and spam gateways are correct because they act as intermediaries between a computer and the internet, translating traffic between networks or protocols. Proxy servers filter and inspect packets, enforcing security policies while functioning as a gateway for web traffic. Spam gateways analyze incoming emails, blocking spam and malicious content before it reaches the user, effectively acting as a security barrier. Unified Threat Management (UTM) is incorrect because it is a broad security solution that integrates multiple features, not specifically a gateway. Load balancers are also incorrect since they primarily distribute network traffic across multiple servers for efficiency rather than filtering or translating traffic.
To reduce management time, implement dynamic IP addressing on your network. How will you do this?
Configure each NIC to a specific IP address.
Configure each NIC to obtain DNS server addresses automatically.
Enable DHCP settings on the router.
Configure each NIC to obtain an IP address automatically
Options C (Enable DHCP settings on the router) and D (Configure each NIC to obtain an IP address automatically) are correct because DHCP (Dynamic Host Configuration Protocol) automates IP address assignment, reducing management time. Enabling DHCP on the router ensures that all devices receive an IP address dynamically without manual configuration. Configuring each NIC (Network Interface Card) to obtain an IP address automatically allows the device to request and receive an IP address from the DHCP server. Option A (Configure each NIC to a specific IP address) is incorrect because static IP assignment requires manual management, increasing administrative workload. Option B (Configure each NIC to obtain DNS server addresses automatically) is also incorrect because while it automates DNS resolution, it does not handle IP address assignment, which is essential for dynamic addressing.
Which statements about an ONT are CORRECT?
It requires external power to work properly
It is user installed.
It stands for optical network terminator.
It converts fiber-optic light signals to electrical (Ethernet) signals.
The statements “It requires external power to work properly” and “It converts fiber-optic light signals to electrical (Ethernet) signals” are correct because an Optical Network Terminal (ONT) is an active device that needs power to operate and serves as the interface between a fiber-optic network and a user’s Ethernet-based network. The ONT receives optical signals from the ISP and converts them into electrical signals for use with standard networking equipment like routers and computers. The statement “It is user-installed” is incorrect because ONTs are typically installed by the service provider to ensure proper setup and connection to the fiber network. The statement “It stands for optical network terminator” is also incorrect because ONT stands for Optical Network Terminal, not Optical Network Terminator.
Which statements about an ONT are CORRECT?
It requires external power to work properly
It is user installed.
It stands for optical network terminator.
It converts fiber-optic light signals to electrical (Ethernet) signals.
The statements “It requires external power to work properly” and “It converts fiber-optic light signals to electrical (Ethernet) signals” are correct because an Optical Network Terminal (ONT) is an active device that needs power to operate and serves as the interface between a fiber-optic network and a user’s Ethernet-based network. The ONT receives optical signals from the ISP and converts them into electrical signals for use with standard networking equipment like routers and computers. The statement “It is user-installed” is incorrect because ONTs are typically installed by the service provider to ensure proper setup and connection to the fiber network. The statement “It stands for optical network terminator” is also incorrect because ONT stands for Optical Network Terminal, not Optical Network Terminator.
Your friend bought a PoE device for her home. It is classified as a type 2 device. Which of the following PoE switches is this device compatible with?
802.3bt-compliant switch,.
802.3af-compliant switch.
802.3at-compliant switch.
802.11b-compliant switch.
The 802.3bt-compliant switch and the 802.3at-compliant switch are correct because a Type 2 PoE device requires PoE+ (802.3at), which provides up to 30W of power. An 802.3bt-compliant switch is also compatible because it supports higher power levels and is backward compatible with 802.3at devices. The 802.3af-compliant switch is incorrect because it only supports PoE (Type 1), providing a maximum of 15.4W, which is insufficient for a Type 2 device. The 802.11b-compliant switch is also incorrect because 802.11b refers to a Wi-Fi standard, not a PoE standard, and does not provide power over Ethernet.
What are the tools required to connect an RJ45 connector to an appropriate cable?
Punchdown tool.
Network tap.
Cable stripper.
Crimper.
The cable stripper and crimper are correct because they are essential for properly attaching an RJ45 connector to a network cable. A cable stripper removes the outer insulation to expose the individual wires, while a crimper secures the RJ45 connector by pressing the metal pins into the wires to establish a reliable connection. The punchdown tool is incorrect because it is used for terminating wires on patch panels and keystone jacks, not for crimping RJ45 connectors. The network tap is also incorrect because it is a passive device used for monitoring network traffic, not for terminating cables.
Which of the following claims about IPv6 is correct?
Each IPv6 interface is required to have a link-local address.
IPv6 addresses are incompatible with IPv4 networks.
Each IPv6 interface can have only one address
IPv6 does not use broadcasts.
The statements “Each IPv6 interface is required to have a link-local address” and “IPv6 does not use broadcasts” are correct. Every IPv6-enabled interface must have a link-local address (fe80::/10), which is automatically assigned and used for local network communication. IPv6 eliminates broadcast traffic to reduce network congestion, using multicast and anycast instead for more efficient communication. The statement “IPv6 addresses are incompatible with IPv4 networks” is incorrect because technologies like dual-stack, tunneling, and NAT64 allow IPv6 and IPv4 to coexist. The statement “Each IPv6 interface can have only one address” is also incorrect because an IPv6 interface can have multiple addresses, including global unicast, link-local, and multicast addresses.
Which of the following IPv4 addresses are public?
144.160.155.40
172.20.10.11
69.252.80.71
169.254.1.100
The IPv4 addresses 144.160.155.40 and 169.252.80.71 are public because they do not fall within the reserved private or special-use IP ranges. Public IP addresses are routable on the internet and assigned by ISPs. The address 172.20.10.1 is incorrect because it falls within the 172.16.0.0 – 172.31.255.255 range, which is reserved for private networks. Similarly, 169.254.1.100 is incorrect because it belongs to the 169.254.0.0/16 APIPA (Automatic Private IP Addressing) range, which is used for local communication when DHCP is unavailable and is not routable on the internet.
A computer on your network cannot reach the DHCP server. The DHCP server assigns addresses in the range of 200.100.1.11 to 200.100.1.110. When this computer boots up, what are the TWO addresses might it get?
169.254.1.101.
Class C.
200.100.1.15.
APIPA.
The correct answers are 169.254.1.101 and APIPA because when a computer cannot reach the DHCP server, it automatically assigns itself an APIPA (Automatic Private IP Addressing) address in the range 169.254.0.0/16, such as 169.254.1.101. APIPA addresses allow local network communication but are not routable on the internet. The option “200.100.1.15” is incorrect because this address falls within the DHCP server’s assigned range, which the computer cannot obtain without DHCP connectivity. The option “Class C” is incorrect because it is a general term referring to IP address classifications, not a specific address that a computer would receive in this scenario.
Which of the following protocols is a connection-oriented protocol?
SSH.
HTTPS.
DHCP.
TFTP.
The correct answers are SSH (Secure Shell) and HTTPS (Hypertext Transfer Protocol Secure) because both use TCP (Transmission Control Protocol), which is a connection-oriented protocol that establishes a reliable session before data transmission. TCP ensures data integrity, error checking, and proper sequencing. DHCP (Dynamic Host Configuration Protocol) is incorrect because it primarily uses UDP (User Datagram Protocol), which is connectionless, for quick address assignment without establishing a session. TFTP (Trivial File Transfer Protocol) is also incorrect because it uses UDP, making it faster but less reliable due to the lack of connection establishment and error correction.
What are the TWO TCP/IP protocols designed for downloading email from mail servers?
SMTP.
SMB.
IMAP,
POP3.
The correct answers are IMAP (Internet Message Access Protocol) and POP3 (Post Office Protocol v3) because both are designed for downloading email from mail servers to client devices. IMAP allows users to access and manage emails directly on the server, syncing changes across multiple devices, while POP3 downloads emails to a local device and usually deletes them from the server. SMTP (Simple Mail Transfer Protocol) is incorrect because it is used for sending emails, not retrieving them. SMB (Server Message Block) is also incorrect because it is a network file-sharing protocol, not related to email communication.
You want to verify that client computer can download email from external email servers independently of the protocol used by their email client. Which firewall ports must be opened to enable this?
23
110
25
143
The correct answers are 110 (POP3) and 143 (IMAP) because these ports are used for downloading email from external email servers. POP3 (port 110) retrieves emails and stores them locally, while IMAP (port 143) allows users to manage emails directly on the server. Port 25 (SMTP) is incorrect because it is used for sending emails, not receiving them. Port 23 is also incorrect because it is used for Telnet, a remote access protocol, which is unrelated to email retrieval.
What are the two protocols/types of protocol that ensures the transmission of data packets across a network or networks and will resend the packet if its arrival is not acknowledged?
TCP.
Connectionless.
UDP.
Connection-oriented.
The correct answers are TCP (Transmission Control Protocol) and Connection-oriented because both ensure reliable data transmission across networks by establishing a connection, verifying data integrity, and resending lost packets if necessary. TCP uses a three-way handshake to establish communication and requires acknowledgment (ACK) packets to confirm data delivery. UDP (User Datagram Protocol) is incorrect because it is connectionless and does not guarantee packet delivery or retransmission. Connectionless is also incorrect because it refers to protocols like UDP that send packets without ensuring their arrival, making them unreliable for guaranteed data delivery.
When a switch overheats, the SNMP agent sends an SNMP trap to an SNMP manager. Which of the following statements is CORRECT?
It is a managed switch.
It is communicating on port 162.
It is communicating on port 161.
It is an unmanaged switch,
The correct answers are “It is a managed switch” and “It is communicating on port 162” because SNMP (Simple Network Management Protocol) traps are only supported by managed switches, which can monitor and report network conditions. SNMP traps are sent to the SNMP manager on UDP port 162, allowing network administrators to receive alerts about issues like overheating. The statement “It is communicating on port 161” is incorrect because port 161 is used for polling SNMP data, while port 162 is specifically for receiving traps. The statement “It is an unmanaged switch” is also incorrect because unmanaged switches lack SNMP support and cannot send traps or be remotely monitored.
Which of these standards are capable of operating at both the 2.4 GHz and 5 GHz frequencies?
802.11n
802.11ax
802.11ac
802.11g
The correct answers are 802.11n and 802.11ax because both standards support dual-band operation, meaning they can function on both 2.4 GHz and 5 GHz frequencies. 802.11n introduced MIMO (Multiple Input Multiple Output) technology and was the first Wi-Fi standard to support both bands. 802.11ax (Wi-Fi 6) further improves efficiency and speed while maintaining dual-band compatibility. 802.11ac is incorrect because it operates only on the 5 GHz band, optimizing speed and reducing interference but not supporting 2.4 GHz. 802.11g is also incorrect because it operates only on the 2.4 GHz band, making it incompatible with 5 GHz networks.
Your friend is thinking about the network configuration in his house, He wants you to explain the difference between the 2.4 GHz and 5 GHz networks available on their Internet connection. What are you going to tell your friend?
If they are using the 2.4 GHz network, they should choose channel 1, 6, or 11 because they don’t overlap each other.
The 5 GHz network channels provide greater bandwidth, so data could be transferred faster, but they may have more interference with their neighbors
The 5 6Hz frequency is considered obsolete, so the 2.4 GHz frequency should be used.
All of the 5 GHz frequencies overlap, so there will be greater interference
The correct answers are “If they are using the 2.4 GHz network, they should choose channel 1, 6, or 11 because they don’t overlap each other” and “The 5 GHz network channels provide greater bandwidth, so data could be transferred faster, but they may have more interference with their neighbors.” The 2.4 GHz band is more prone to interference because it has only 14 channels, with only 1, 6, and 11 being non-overlapping, reducing congestion. The 5 GHz band offers wider channels and faster speeds, but in crowded areas, neighboring networks using the same channels can still cause interference. The statement “The 5 GHz frequency is considered obsolete, so the 2.4 GHz frequency should be used” is incorrect because 5 GHz is widely used and preferred for high-speed connections. The statement “All of the 5 GHz frequencies overlap, so there will be greater interference” is also incorrect because 5 GHz offers multiple non-overlapping channels, making it less congested than 2.4 GHz.
What are the TWO wireless networking (Wi-Fi) standards that can use both the 2.4 GHz and 5 GHz frequencies?
802.11ax (Wi-Fi 6)
802.11g
802.11ac (Wi-Fi 5)
802.11n
The correct answers are 802.11ax (Wi-Fi 6) and 802.11n because both support dual-band operation, meaning they can function on both 2.4 GHz and 5 GHz frequencies. 802.11n was the first standard to introduce simultaneous dual-band support, improving flexibility and reducing interference. 802.11ax (Wi-Fi 6) builds on this by enhancing efficiency, speed, and network capacity across both bands. 802.11g is incorrect because it operates only on the 2.4 GHz band, limiting its speed and range. 802.11ac (Wi-Fi 5) is also incorrect because it operates only on the 5 GHz band, optimizing speed and reducing congestion but lacking 2.4 GHz support.
You are building a wireless network for a small business. The administrator wants to have wireless communication rates of 1 Gbps or higher. Which of the following standards will enable you to do so?
802.11g
802.11n.
802.11ac.
802.11ax.
The correct answers are 802.11ac (Wi-Fi 5) and 802.11ax (Wi-Fi 6) because both standards support wireless communication rates of 1 Gbps or higher. 802.11ac operates exclusively on the 5 GHz band, utilizing wider channels and multiple spatial streams to achieve speeds well above 1 Gbps. 802.11ax improves upon this with higher efficiency, better performance in crowded networks, and speeds exceeding 10 Gbps in ideal conditions. 802.11g is incorrect because it operates only on 2.4 GHz with a maximum speed of 54 Mbps, far below 1 Gbps. 802.11n is also incorrect because, while it supports both 2.4 GHz and 5 GHz bands, its maximum speed is 600 Mbps, which does not meet the 1 Gbps requirement.