Академический Документы
Профессиональный Документы
Культура Документы
(Version 4.0)
Bottom of Form
1 Top of Form
Which two causes of networking problems are related to the physical layer? (Choose two.)
damaged cables and connectors
incorrect addressing
overheated components
2 Top of Form
Which device is often configured to act as both a DHCP client and a DHCP server?
home PC
ISP modem
wireless-enabled laptop
3 Top of Form
What two commands can be used to form a new binding if client information does not agree with the DHCP
client table? (Choose two.)
ipconfig /release
ipconfig /all
ipconfig /flushdns
ipconfig /renew
ipconfig
Bottom of Form
4 Top of Form
Refer to the exhibit. A user on host A sends an e-mail to the user on host B. Which type of message does host A
send?
broadcast
multicast
simulcast
unicast
Bottom of Form
5 Top of Form
All hosts within a domain receive the same frame that originates from one of the devices. The domain is also
bounded by routers. What type of domain is this?
broadcast
collision
local
multicast
Bottom of Form
6 Top of Form
What are two ways that a user can interact with an operating system shell? (Choose two.)
CLI
OS
GUI
NIC
kernel
Bottom of Form
7 Top of Form
Which portion of the packet does a router use to forward the packet to the destination?
source IP address
user data
destination IP address
control information
8 Top of Form
What type of computer would most likely use a docking station?
laptop
server
desktop
mainframe
workstation
Bottom of Form
9 Top of Form
Refer to the exhibit. An educational institution needs to connect PC systems that use private IP addressing to the
Internet. They have multiple systems that need to access the Internet, but were only able to purchase one public
IP address. What should be activated on the Linksys integrated router to achieve this goal?
authentication
DHCP
encryption
firewall
NAT
WEP
Bottom of Form
10 Top of Form
What is true about a wireless access point that is equipped with an omnidirectional antenna?
concentrates signal in one direction
provides the greatest transmission distance of all antenna types that are used by APs
Bottom of Form
11 Top of Form
What is a function of the distribution layer in the hierarchical design model?
to provide latency free switching
12 Top of Form
What is a weakness of WEP that is solved by WPA?
WEP is a proprietary standard whereas WPA is an open standard.
WEP keys are only 64 bits long whereas WPA keys are 128 bits long.
WEP uses the same key for every connection whereas WPA uses a different key for each connection.
WEP uses a fixed length key for every connection whereas WPA uses a different key length for each
connection.
Bottom of Form
13 Top of Form
Refer to the exhibit. H1 can ping H2, H3, and the Fa0/0 interface of router R1. H2 and H3 but not H1 can ping
H4 and H5. What is a possible cause for the H1 failure?
Router R1 has no route to the destination network.
14 Top of Form
For an IP address, what component decides the number of bits that is used to represent the host ID?
default-gateway
host number
network number
subnet mask
Bottom of Form
15 Top of Form
Which three statements describe an IP address? (Choose three.)
An IP address is known as a logical address.
The network portion of an IP address will be the same for all hosts that are connected to the same local networ
Bottom of Form
Top of Form
Bottom of Form
16 Top of Form
Which two statements are true about local applications? (Choose two.)
They run on the network.
17 Top of Form
After attaching four PCs to the switch ports, configuring the SSID and setting authentication properties for a
small office network, a technician successfully tests the connectivity of all PCs that are connected to the switch
and WLAN. A firewall is then configured on the device prior to connecting it to the Internet. What type of
network device includes all of the described features?
switch
ISR router
firewall appliance
18 Top of Form
What type of cable would be required to connect a Linksys router to a wired PC?
crossover cable
rollover cable
serial cable
straight-through cable
Bottom of Form
19 Top of Form
A network technician suspects that malware on a user PC is opening multiple TCP connections to a specific
foreign host address. Which Windows command line utility can be used to confirm the multiple TCP
connections?
ping
netstat
tracert
ipconfig
nslookup
Bottom of Form
20 Top of Form
Which three address ranges can be used to depict private IP addresses? (Choose three.)
10.0.0.0 to 10.0.0.255
127.16.0.0 to 127.16.255.255
150.150.0.0 to 150.150.255.255
172.16.1.0 to 172.16.1.255
192.168.22.0 to 192.168.22.255
200.100.50.0 to 200.100.50.255
Bottom of Form
21 Top of Form
Some new features are available for the OS that is currently running on a user's PC. What method should be
chosen so that the user can install these new feature sets?
clean install
multi-boot
upgrade
virtualization
Bottom of Form
22 Top of Form
Which adapter card would be required for a PC to exchange information with other PCs on a LAN?
NIC
video card
sound card
internal modem
Bottom of Form
23 Top of Form
Because of an increasing number of users, bandwidth per user on a WLAN has decreased to a point where users
are complaining about poor performance. What can be done to improve the user experience?
Increase the AP radio signal strength.
24 Top of Form
Which two issues can cause connectivity problems on a wireless network? (Choose two.)
incorrect SSID
broadcast SSID
overlapping channels
25 Top of Form
Refer to the graphic. Based on the information that is shown, what statement is true?
This configuration would be commonly found in an ad hoc wireless network.
Any wireless client that is attached to this access point would have the same IP address and SSID.
All wireless devices that are connected to this access point must have an assigned SSID of Academy.
In addition to accepting wireless client requests, this access point must connect to the wired network.
Bottom of Form
26 Top of Form
Under what circumstance would it be appropriate to use private IP addresses?
for communication between two ISPs
for a host with more than one direct connection to the Internet
Bottom of Form
27 Top of Form
Which statement is true concerning stateful packet inspection?
Access is permitted based on IP addresses of the source and destination devices.
Access is permitted based on the MAC addresses of the source and destination devices.
Access is permitted only if the type of application that is attempting to reach the internal host is allowed.
28 Top of Form
What is the purpose of creating a DMZ during network firewall implementation?
to create a server security zone accessible only to internal clients
to create a dirty zone that allows all inbound and outbound traffic
to allow for a publicly accessible zone without compromising the internal network
to specify a higher security level than normally required for the internal production network
Bottom of Form
29 Top of Form
Which two components are configured via software in order for a PC to participate in a network environment?
(Choose two.)
MAC address
IP address
kernel
shell
subnet mask
Bottom of Form
30 Top of Form
A network engineer wants to represent confidential data in binary format. What are the two possible values that
the engineer can use? (Choose two.)
0
F
Bottom of Form
Top of Form
Top of Form
2
Bottom of Form
Top of Form
Bottom of Form
31 Top of Form
How does a straight-through cable connect two unlike devices?
It connects the receive pins on the first device to the receive pins on the second device.
It connects the transmit pins on the first device to the receive pins on the second device.
It disconnects the transmit pins and uses only the receive pins.
32 Top of Form
What data communication technology uses low-power radio waves to transmit data?
copper cable
wireless
radio
Bottom of Form
33 Top of Form
After issuing the ipconfig/all command on a host that has DHCP enabled, a network administrator notes that the
output contains faulty IP configuration information. What is the first step the administrator should take to resolve
this issue?
Replace the NIC in the host.
Use the release and renew options supported by the ipconfig command.
Bottom of Form
34 Top of Form
What are two examples of peripheral input devices? (Choose two.)
external modem
barcode reader
digital camera
plotter
printer
Bottom of Form
35 Top of Form
A college network administrator is planning a wireless LAN to provide service in the student lounge and outdoor
patio. The requirements include a range of at least 80 meters and a speed of 30 Mb/s. Which wireless LAN
standard meets these requirements?
802.11
802.11a
802.11b
802.11g
Bottom of Form
36 Top of Form
A local PC has the correct configuration that is required to access the network. A ping command that is sourced
at the PC does not receive a response from a remote device. Which operating system command might be used to
determine where the connection failed?
netstat
tracert
ipconfig
nslookup
Bottom of Form
37 Top of Form
A home user is looking for an ISP connection that provides high speed digital transmission over regular phone
lines. What ISP connection type should be used?
DSL
dial-up
satellite
cell modem
cable modem
Bottom of Form
38 Top of Form
Which of the following statements best describes DNS?
DNS servers are used to map an IP address to a physical address.
DNS servers are used to configure logical address information for host computers.
DNS servers are used to translate from private addresses to public addresses.
Bottom of Form
39 Top of Form
For the TCP/IP model for internetwork communication, which statement describes the process for the transition
of data from the internet layer to the network access layer?
An IP packet is encapsulated in a frame.
40 Top of Form
What does the term "attenuation" mean in data communication?
loss of signal strength as distance increases
41 Top of Form
A network administrator has been notified that users have experienced problems gaining access to network
resources. What utility could be used to directly query a name server for information on a destination domain?
ping
tracert
netstat
ipconfig
nslookup
Bottom of Form
42 Top of Form
Which protocol is used to transfer files among network devices and perform file-management functions?
DNS
FTP
HTML
HTTP
Bottom of Form
43 Top of Form
What is the purpose of pop-up blocker software?
It detects and removes spyware.
44 Top of Form
Refer to the exhibit. The security policy of an organization allows employees to connect to the office intranet
from their homes. Which type of security policy is this?
acceptable use
incident handling
network maintenance
remote access
Bottom of Form
45 Top of Form
TCP/IP data transmission between the source and destination host is encapsulated in four steps:
A, D, B, C
B, D, A, C
D, C, A, B
D, C, B, A
Bottom of Form
Top of Form
Top of Form
3
Bottom of Form
Bottom of Form
46 Top of Form
When are leased lines typically used?
when low bandwidth is required
47 Top of Form
When terminating a UTP cable, why is it important to push the wires all the way into the end of the connector?
to allow the cable to endure more stretching or twisting
to minimize crosstalk
Bottom of Form
48 Top of Form
What is the default subnet mask for an IP address of 64.100.19.14?
255.0.0.0
255.255.0.0
255.255.255.0
255.255.255.255
Bottom of Form
49 Top of Form
Which network design layer provides a connection point for end user devices to the network?
access
core
distribution
network
Bottom of Form
50 Top of Form
In IP telephony, what is the purpose of a gateway to the PSTN?
to connect IP voice clients to Internet phone service
51 Top of Form
What is a service pack?
an access policy
52 Top of Form
A home user was successfully browsing the Internet earlier in the day but is now unable to connect. A ping
command from a wireless laptop to a wired PC in the LAN is successful, but the nslookup command fails to
resolve a website address. The user decides to analyze the LEDs on the Linksys router to verify connectivity.
Which LED should be of main concern in this situation?
WLAN LED
power LED
Internet LED
Top of Form
Top of Form
4
Bottom of Form