MTA New
MTA New
MTA New
2. which setting is used to determine the domain name system (dns) settings on a client
192.168.1.1 255.255.255.128
5. which command is used to verify that a server is connected to the network? Jawaban ping
6. which of these represents the internet protocol version 6 (ipv6) loopback address?
jawaban ::1
8. which of the following uses pointer records and a records? jawaban dns server
10. One reason to incorporate vlans in a network is to : jawaban reduce the number of
router
15. the type connector used on the 100baset cable is: jawaban rj-45
16. in addition to switching, multilayer switches also: provide layer 3 routing function
17. one reason to replace an unmanaged switch with a managed switch is to: support
multiple vlans
18. to directly connect the Ethernet network interface cards (nics) of two computers, you
Jawaban star
22. which two of the following are connectivity options for wide area network (wans)?
intranet
24. security is a concern on wireless notworks due to: jawaban the radio broadcast access
method
25. a characteristic of the mesh topology is that it: jawaban use redundant paths
26. to protect a network when it is connected to the internet, you should use a: jawaban
firewall
27. one purpose of a parimeter network is to: jawaban make resources available to the
internet
28. which protocol can be used to encrypt packets on the internet? Jawaban https
29. drag and drop question. Order the layers of the osi model: jawaban physical, data link,
31. if a router is installed so that is separates a dhcp server from its clients, the clients will:
32. which of the following services masks internet ip address from outside the network?
Jawaban nat
33. the query protocol used to locate resouces on a network is: jawaban lightweight
34. tracert is used to: jawaban report the route taken by packects across an ip network
36. what type of record does dns use to find a mail service? Jawaban mail exchanger (mx)
dns record
37. the default gateway address identifies the: jawaban device that will connect the
38. How many bits are there in an Internet Protocol version 6 (Ipv6) address?
Answer : 128
40. what is the minimum cabling requirement for a 100basetx network? Jawaban category 5
utp cable
41. internet key exchange (ike) is responsible for which two functions? (chose two) jawaban
43. Hotspot question. you are trying to access a music sharing service on the internet. The
connecting. You run a trace route to the server and receive the output shown in the
following image:
44. Ipsec can be used to secure network communications between two machines
45. Match each IP address to its corresponding IPv4 address class. To answer, drag the
appropriate IP address from the colum on the left to its IPv4 address class on the right.
Each IP address may be used once, more than once, or not at all. Each correct match is
worth one point.
46. The question requires that you evaluate the underlined next to determine if it is correct.
The process of replicating a zone fine to multiple dns servers is called zone replication,
select the correct answer if the underlined text does not make the statement correct, select
server as a software router? (choose two) jawaban network policy and access services
52. which Microsoft network service can you use to establish a connection to a corporate lan
no. each correct selection is worth one point. With a recursive dns query
54. match the IPv4 address type to the corresponding definition
55. This question requires that you evaluate the underline text to determine if is correct.
A secondary zone is the first dns zone to which all updates for the records thet belong to
‘no change is needed’ if the underline text makes the statement correct.
Jawaban primary zone
56. The tracert command displays router address
60. This question requires that you evaluate the underline text to determine if is correct.
When a client computer is unable to reach a dhcp server, it will automatically assign an ip
63. This question requires that you evaluate the underline text to determine if is correct.
a/anvirtual private network (vpn) protects a network’s perimeter by monitoring traffic as
ability to
69. Which feature of category 5e stp cable reduces external interference? Jawaban twisting
70. What is an example of a network device that associates a network address with a port?
Jawaban router
71. Which wireless communication problem is caused by electromagnetic waves? Jawaban
interference
72. An action center alert recommends that you enable windows firewall.
After enabling the firewall, you can no longer access websites.
Which two tcp ports should you add exceptions for on the firewall? (Choose two)
of message swithing.
Select the correct answer if the underlined text does not make the statement correct.
Select ‘no change is needed’ if the underlined text makes the statement correct.
Jawaban circuit switching
76. hotspot question. For each of the following statements. You use perimeter network to
grant
77. Hotspot question. You are an intern for contoso ltd
computer’s ip address.
Which address indicates that your router’s dhcp services is not functioning? Jawaban
169.254.1.15
79. Which of these is a public address space? Jawaban 197.16.0.0/12
80. This question requires that you evaluate the underlined text to determine if it is correct.
In a wireless network that requires an ssl certificate, wep handles the ssl certificate.
Select the correct the answer if the underlined text does not make the statement correct.
Select ‘no change is needed’ if the underlined text makes the statement correct.
Jawaban 802.1x
81. This questiion requires that you evaluate the underlined text to determine if it is correct.
To set lower scurity setting in internet Explorer for an extranet site, add the sites’s URL to
Selecr ‘no change ins needed’ if the underlined text make the statement correct.
82. You are helping a firend set up a public-facing web server for a home office.
For each of the following statement. Select Yes if the statement is true.
Otherwise, select No. Each correct selection is worth one point. A wireless bridge
84. What are two characteristics of the CSMA/CD acces method? (choose two.)
85. What are two characteristics of a mesh network topology (choose two)
Answer DHCP
87. This question requires that you evaluate the underlined text to determine if it is correct.
According to the OSI model, encryption takes place on the transport layer.
Sekect the correct answer if the underlined text does not make the statement correct.
Select ‘NO change is needed” if the underlined text makes the statement correct.
Answer Presentation
No. Each correct selection is worth one point. An IPv4 address consists of 64 bits
89. This question requires that you evaluate the underlined text to determine if it is correct.
IPSec policies for two machines on a LAN can be modified by using be IPSec policy-in
on windows 7
Select the correct answer if the underlined text does not make the statement correct.
Select ‘No change is needed if the underlined text makes the statement correct.
90. This question requires that you evaluate the underlined text to determine if it is correct.
An address resolution protocol (ARP) table is used to associated IP addresses with host
names.
Select the correct answer if the underlined text does not make the statement correct.
Select ‘No change is needed if the underlined text makes the statement correct.
92. What is the maximum cable length for single Cat5 UTP cable run?
94. Which of these cable types transmits data the greatest distance?
96. This question requires that you evaluate the underlined text to determine if it is correct.
Select the correct answer if the underlined text does not make the statement correct.
Select ‘No change is needed if the underlined text makes the statement correct.
97. You need to run four ethernet network drop. Each drop is approximately 125feet/46.33
98. What is an example of a Layer 3 device that connects multiple computers and network
Anwer Router
99. Which metric does Routing information Protokol (RJP) use to determine the least costly
route?
100. what are two difference between switches and hubs? (choose two)
a. swithces are slower than hubs because of the extra addressing functions that swithces perfom.
b. swithces send data to all of the computers that are connected to them for efficiency.
c. swithces are capable of sending and receiving data at the same time.
d. swithces indentify the intended destination of the data that they receive.
Answer: AD
101. what is the DNS record type that specifies an alias name of another address record?
a. MX
b. CNAME
c. NS
d. SOA
Answer: B
102. this question requires that you evaluate the underline text to determine if it is correct.
Each IPv4 address consist of a MAC address and data-link laver address.
Select the correct answer if the underline text does not make the statement correct.
Select “No change is needed” if the underline text makes the statement correct.
a. Network ID and a hist ID
b. DNS record and a default route
c. 64-bit binary number divided into octets
d. No change is needed
Answer : A
103. this question requires that you evaluate the underline text to determine if it is correct.
The NTP value in a resource record indicates a length of time that other DNS servers use to
determine how long to cache information for a record before expiring and discarding it.
Select the correct answer if the underline text does not make the statement correct. Select “No
change is needed” if the underline text makes the statement correct.
a. TTL
b. GPS
c. SOA RR
d. No change is needed
Answer : A
Answer :
105. hotspot question
You are studying for finals in the student lounge
When your laptop is connected to the wireless network, access to the internet is slow
When you plug your laptop into a wall jack, you can no longer access the internet att all
You run the ipconfig/all command. The results are shown in the following image:
Use the drop-down menus to select the answer choice that completes each statement
Each correct selection is worth one point.
Answer :
106. hotspot question
For each of the following statements, select Yes if the statement is true. Otherwise, select No
Each correct selection is worth one point.
IPv6 addresses are
Answer :
108. what happens when an 802. 11a node broadcasts within the range of an 802. 11g access
point?
a. the access point transmits, but the node is unable to receive
b. A connection occurs
c. both the node and the access point is unable to transmit
d. the node transmits, but the access point is unable to receive
Answer : D
110. which of the following represents a media access control (MAC) address?
a. GV:ZC:KK:DK:FZ:CA
b. 255.255.255.0
c. 05:35:AB:6E:Al:25
d. 127.0.0.1
Answer : C
112. a network device that associates a media access control (MAC) addess with a port is a:
a. DSL modem
b. Hub
c. Router
d. Switch
Answer : D
114. a cable that meets the l000BaseT standars has a maximum length of:
a. 100 m
b. 250 m
c. 500 m
d. 1000 m
Answer : A
118. the command-line tool used to list a host’s active incoming connections is:
a. NETSTAT
b. IPCONFIG
c. NSLOOKUP
d. PING
Answer : A
119. a computer that has an IP address of 169.254.0.1 cannot access the network
a. WINS
b. DNS
c. DHCP
d. TFTP
Answer : C
125. if an 802. Llg internet connection has connectivity problems, what may be the cause?
a. A cordless phone
b. A cellular phone
c. incandescent lights
d. elektromagnetik interface (EMI)
Answer : D
126. which of these factors has the biggest impact on data transmission speed in a wireless
network?
a. the access methos used for the network
b. the transmission standard of the equipment used
c. the use of strong encryption for transmissions
d. the transmission watage rating used on the NIC
Answer : B
127. which of the following used a tunneling protocol?
a. internet
b. VPN
c. extranet
d. VLAN
Answer : B
128. a network that separates an organization’s private from a public network is a/an:
a. firewall
b. extranet
c. perimeter
d. internet
Answer : C
132. in local area network (LAN) topologies, the primary media access methods are: (Choose
two)
a. contention
b. negotiation
c. kerberos
d. token pasing
Answer : AD
134. which tegnology can you use to extend an intenal network shared or public networks?
a. VLAN
b. microsoft ASP-NET
c. microsoft NET Framework
d. VPN
Answer : D
135. which two published IEEE 802.11 wireless transmission standards? (Choose two)
a. 802.1 lf
b. 802.11g
c. 802.11m
d. 802.11n
Answer : BE
136. what happens when an 802.11b node broadcasting within the range of an 802.llg access
point?
a. the access point will transmit, but the node will unable to receive
b. A connection will be established
c. both the node and the azzess point will be unable to transmit
d. the node will transmit, but the access point will be unable to receive
Answer : B
138. which DNS record type specifies the host that is the authority for a given domain?
a. NS
b. MX
c. CNAME
d. SOA
Answer : B
Answer :
Answer :
141. this question requires that you evaluate the underline text to determine if it is correct.
All session data is encrypted all machines while using telnet.
Select the correct answer if the underline text does not make the statement correct.
Select ‘No change is needed” if the underline text makes the statement correct
a. Not encrypted
b. Encrypted between any windows machines
c. Encrypted only to any non-windows machines
d. No change is needed
Answer : A
143. this question requires that you evaluate the underline text to determine if it is correct.
IPv4 multicast address range from 192.168.255.255.
Select the correct answer if the underline text does not make the statement correct.
Select “No change is needed” if the underline text makes the statement correct.
a. 127.0.0.0 to 127.255.255.255
b. 172.16.0.0 to 172.31.255.255
c. 224.0.0.0 to 239.255.255.25
d. No change is needed
Answer : C
144. this question requires that you evaluate the underline text to determine if it is correct.
The four IEEE standards, 802.11a, b, g, and n, are collectively known as mobile ad hic networks.
Select the correct answer if the underline text does not make the statement correct. Select ‘No
change is needed” if the underline text makes the statement correct.
a. WiMAX
b. Bluetooth
c. WiFi
d. No change is needed
Answer : C
Answer :
146. A university has network links between various locations.
Where would a T3 connection be appropriate?
a. Server to network in the main campus server room
b. Main campus to a large satellite campus
c. Computer lab PC to lab printer
d. Library laptop PC to internet
Answer : A
Answer :
Answer :
151. two companies want to share data by using the internet. Which type of nerwork provides the
solution?
a. Ethernet
b.intranet
c. extranet
d. perimeter
jawaban = c
jawaban = a
153. which of the following determines the media access method that is used in a network?
jawaban = d
154. which wireless authentication method provides the highest level of security?
b. IEEE 802.IIn
D. IEEE 802.11a
jawaban = c
jawaban = b
a. 2.4 GHz
b. 54 GHz
c. 2.4 Mbps
d. 54 Mbps
jawaban = d
157. a node within a local area network (LAN) must have a network interface device and a
a. network account
c. host address
d. resource to share
jawaban = c
jawaban = a
159. which type of port is used to support VLAN traffic between two switches?
a. virtual port
b. WAN port
c. trunk port
d. LAN port
jawaban = c
160. the protocol that maps IP addresses to media access control (MAC) address is
jawaban = e
d. they are efficient because a single switch can implement only a single VLANs
e. they act as though they are on the same LAN regardless on physical location
jawaban = bce
162. match the OSI layer to its corresponding description
Jawanan =
163. hotspot question
You receive a call from a family member who is unabel to connect to a game server
a. data compression
b. data integrity
c. data redundancy
d. data confidentiality
jawaban = bd
166. this question requires that you evaluate the underlined text to determine if it is correct
Every router today is TPC/IP enable, which is an industry-standard protocol that you use on
internet and for local addressing.
Select the correct answer if the underlined text does not make the statement correct
Select ‘No change is needed” if the underlined text makes the statement correct.
a. HTTP
b. FTP
c. SNMP
d. No change is needed
jawaban = d
167. you are home for vacation, and a family member wants your help to purchase and install
network cable for a home office.
a. Cat3
b. Cat5
c. Cat5e
d. Cat6
jawaban = c
168. this question requires that you evaluate the underlined text to determine if it is correct
Select the correct answer if the underlined text does not make the statement correct
Select no change is needed if the underlined text makes the statemen correct
a. WPA-AES
b. WPA2
c. WPA-PSK
d. No change is needed
jawaban = d
For each pf the following statements, select yes if the statement is true
a. 0.0.0.255
b. 0.0.255.255
c. 255.0.0.0
d. 255.255.0.0
jawaban = d
jawaban = b
172. what is the default subnet mask for a class c internet network?
a. 255.255.255.252
b. 255.255.255.240
c. 255.255.255.192
d. 255.255.255.0
jawaban = d
a. 23
b. 25
c. 80
d. 8080
jawaban = a
a. select a new address and request approval from the DHCP server
jawaban = c
175. you ping a server by using fully qualified domain name (FQDN) and do not receive a
response
You then ping the same server by using its IP address and receive a response
Why do you receive a response on the second attempt but not on the first attempt?
jawaban = B
176. a user reports that she cannot connect to network resources from a computer on the
company network. The user was able to connect to the network resources yesterday.
You verify that the user’s computer is properly physically connected to the nerwork
jawaban = d
177. what command do you use to release the IP configuration handed out by a DHCP server?
a. ipconfig/renew
b. ipconfig /releasedns
c. ipconfig /savestatic
d. ipconfig /release
jawaban = d
a. degradation
b. attenuation
c.cross over
d.resistance
jawaban = a
179. what command do you use to reacquire IP configuration from a DHCP server?
a. ipconfig/renew
b. ipconfig /releasedns
c. ipconfig /savestatic
d. ipconfig /release
jawaban = a
180. list the four steps for a client to get an IP address from a DHCP server in the correct order
jawaban = d
a. digital circuit
c.circuit switching
d.slow speeds
jawaban = a
a. static
b. dynamic
c. persistent
d. global
jawaban = c
183. which layer in the OSI model covers routing between networks?
a. physical
b. data link
c. network
d.transport
jawaban = c
a. frame aggregation
b.channel bonding
c.RFI protection
d.MIMO
jawaban = c
a. 80
b. 67
c. 23
d. 500
jawaban = b
a. IPsec
b. MPPE
c. HTTPS
d. MSC-CHAP
jawaban = a
a. internet
b. intranet
c. WWW
d. MSDN
jawaban = a
a. DNS
b. DHCP
c. WINS
d. FTP
jawaban = b
a. 1.0
b. 1.1
c. 2.0
d. 3.0
jawaban = c
190. after you install DHCP servers and configure and activate a scope, what is the last step in
installing a DHCP server?
191. you have a computer whit an address of 169.254.32.23 and a subnet mask of 255.255.0.0,
yet you cannot connect to your local file servers.
jawaban = a
192. what name does windows server 2008 R2 use for terminal service?
a. MS telnet server
b. MS primary services
c. MS thin server
jawaban = d
a. 443
b. 501
c. 389
d. 3389
jawaban = a
194. what would you use to create VPN tunnels so that users can connect to your internal
network while at home using windows server 2008 R2?
a. Microsoft RAS
b. Microsoft RRAS
c. Microsoft RDC
d. Microsoft VPN Server
jawaban = b
a. IPSec
b. MS-CHAP
c.MS-CHAPv2
d. MPPE
jawaban = a
196. which component of IPSec is generates the encryption and authentication keys?
a. SA
b. AH
c. EP
d. MPPE
jawaban = a
197. which IPSec component provides connectionless integrity and data authentication but does
not provide confidentiality?
a. SA
b. AH
c. ESP
d. MPPE
jawaban = b
198. which IPSec component includes the most security, including confidentiality?
a. SA
b. AH
c. ESP
d. MPPE
jawaban = c
a. 443
b. 389
c. 51
d. 53
jawaban = d
200. what service on a windows network is used to translate between NetBIOS name/computer
name and IP addresses?
a. DNS
b. WINS
c. DHCP
d. LDAP
jawaban = b
201. what feature within windows allows the server to act as a router?
a. IPSec
b. DHCP
c. IP forwarding
d. RDC
jawaban = c
jawaban = a
203. what provides name resolution between domain names and IP addresses
a. DHCP
b.DNS
c. ARP
d. RPC
jawaban = b
204. what allows a user to connect to a corporate network using the internet?
a. VPN
b. VPC
c. PPTN
d. IPSec
jawaban = a
205. when you have multiple circuits connected to a site, the entire circuit is known as a
a. virtual circuit
b. emulated circuit
c. joined circuit
d. multitasked circuit
jawaban = a
a. frame relay
b. ATM
c. ISDN BRI
d. DSL
jawaban = a
a. 1.5 Mbps
b. 4.5 Mbps
c. 44.7 Mbps
d. 128 Mbps
jawaban = c
208. in Europe, what circuit would be similar to the T1 found in the United States?
a. E1
b. J1
c. T2
d. F1
jawaban = a
a. 2
b. 8
c. 23
d. 48
jawaban = c
a. 10 Mbps
b. 44 Mbps
c. 54 Mbps
d. 100 Mbps
jawaban = d
211. what topology does FDDI use?
a. bus
b. star
c. ring
d. mesh
jawaban = c
212. what technology uses wires from the telephone company to provide broadband internet
connection?
a. cable
b. DSL
c. FDDI
d. frame relay
jawaban = b
213. _____________ is used to send packets from one network to another network
a. routing
b. transport
c. BGP
d. encapsulation
jawaban = a
214. what type of network can you set up that is another company’s internal network?
a. intranet
b. extranet
c. internet
d. DMZ
jawaban = b
215. _______________ uses a clocking circuit to control the timing of communications between
two WAN devices such as router
a. static route
b. dynamic route
c. PPTP route
d. poit to point
jawaban = a
jawaban = a
a. 1.544 Mbps
b. 2.889 Mbps
c. 3.101 Gbps
d. 2.54 Mbps
jawaban = a
a. 32 Kbps
b. 62 Kbps
c. 128 Kbps
d. 1024 Kbps
jawaban = b
219. what command do you use to display and modify the network configuration of a local
computer?
a. netsh
b. netstat
c. telnet
d. nbtstat
jawaban = a
a. nslookup
b. telnet
c. route
d. nbtstat
jawaban = c
221. what command do you use to display the routing table on a local system?
a. route display
b. route table
c. route local
d. route print
jawaban = d
222. what command do you use to display the MAC address on system?
a. ipconfig/all
b. pathping –m
c. route /showmac
d. nbstat -r
jawaban = a
223. what command do you use to retrieve or update your DHCP assigned configuration?
a. ipconfig /flushdns
b. ipconfig /all
c. ipconfig /release
d. ipconfig /renew
jawaban = d
224. what command do you use to register the computer’s name and IP address with the nearest
DNS server?
a. ipconfig /renew
c. ipconfig /flushdns
d. ipconfig /registerdns
jawaban = d
a. netstat -e
b. netstat -x
c. netstat -q
d. netstat –t
jawaban = a
226. what ooption do you use to ping constantly until you stop it?
a. ping –t <host>
b. ping –q <host>
c. ping –r <host>
d. ping –s <host>
jawaban = a
227. what protocol is used with L2TP to encrypt data?
a. IPsec
b. MS-CHAP
c. MS-CHAPv2
d. MPPE
jawaban = a
a. DNS
b. WINS
c. HOSTS
d. DHCP
jawaban = a
229. what routing protocol is the most popular distance-vector routing algorithm used to
determine the best routes within a network?
a. RIP
b. OSPF
c. BGP
d. IGMP
jawaban = a
230. what routing protocol is the most popular link-state protocol used within a large
organization?
a. RIP
b. OSPF
c. BGP
d. IGMP
jawaban = b
231. what technology takes data and breaks them into packets and sends them over a network,
some times using different routes for each packet?
a. circuit switching
b. connection switching
c. packet switching
d. network switching
jawaban = c
232. X.25 and frame relay are examples of what type of WAN technology?
a. circuit switching
b. connection switching
c. packet switching
d. network switching
jawaban = c
a. analog modem
c. packet switcher
d. CSU/DSU
jawaban = d
b. packet switcher
c. analog modem
d. PAD
jawaban = d
235. what part of the network is the point where the responsibility of the administrator ends and
the telecommunications provider’s responsibility begins?
a. last mile
b. demarc
c. router array
d. PAD interface
jawaban = d
a. digital circuit
c. circuit switching
d. slow speed
jawaban = d
a. jump point
b. CSU/DSU
c. jump switch
d. hop
jawaban = d
238. what command can you use to connec to a mail sever so that you can test SMTP?
a. ftp
b. nslookup
c. telnet
d. nbstatat
jawaban = c
239. what command do you use to connect to a remote computer so that you can execute
commands?
a. ftp
b. nslookup
c. telnet
d. nbstatat
jawaban = c
240. what command do you use to connect to a FTP server to download a file?
a. nslookup
b. ssh
c. telnet
d. ftp
jawaban = d