Вы находитесь на странице: 1из 13

What is a function of the distribution layer in the hierarchical design model?

to provide latency free switching


to organize end devices in small manageable groups
to provide connectivity using the high-speed backbone
to provide connectivity between smaller local networks

2Which device is often configured to act as both a DHCP client and a DHCP server?
home PC
ISP modem
wireless-enabled laptop
integrated services router

3 What are two examples of peripheral input devices? (Choose two.)


external modem
barcode reader
digital camera
plotter
printer

4In IP telephony, what is the purpose of a gateway to the PSTN?


to connect IP voice clients to Internet phone service
to create a peer-to-peer connection between two IP voice clients
to map unique names of IP voice endpoints to a client list on a voice server
to allow IP voice clients to communicate with regular analog telephones.

5 Which protocol is used by a client to browse the web server?


FTP
HTTP
POP
SMTP
6 TCP/IP data transmission between the source and destination host is encapsulated in four step

A. adds the data-link header and trailer;


B. converts data to bits for transmission;
C. adds the network IP address to the header of the packet;
D. segments the data for end-to-end transport.

What is the correct sequence of these steps?


A, B, C, D
A, D, B, C
B, D, A, C
D, C, A, B
D, C, B, A

Refer to the graphic. Based on the information that is shown, what statement is true?
This configuration would be commonly found in an ad hoc wireless network.
Any wireless client that is attached to this access point would have the same IP address an
SSID.
All wireless devices that are connected to this access point must have an assigned SSID o
Academy.
In addition to accepting wireless client requests, this access point must connect to the wired
network.

8 Some new features are available for the OS that is currently running on a user's PC. What met
should be chosen so that the user can install these new feature sets?
clean install
multi-boot
upgrade
virtualization

9Which type of computer uses an integrated monitor and keyboard?


pocket PC
laptop
mainframe
server
workstation

10 What is the default subnet mask for the IP address 128.107.23.10?


255.0.0.0
255.255.0.0
255.255.255.0
255.255.255.255
Which two causes of networking problems are related to the physical layer? (Choose two.)
disconnected cables
improper operation of cooling fans
incorrect MAC address
incorrect default gateway
incorrect subnet mask

1 What does the term "attenuation" mean in data communication?


2 loss of signal strength as distance increases
time for a signal to reach its destination
leakage of signals from one cable pair to another
strengthening of a signal by a networking device

13 Which network design layer provides a connection point for end user devices to the network?
access
core
distribution
network

1 What destination port number would be used if a client wished to establish a secure connectio
4 web server?
21
53
80
443

15 A client wishes to establish an FTP session with a remote server. Which two numbers could b
assigned to the client source port? (Choose two.)
20
1010
1021
1305
1404
Refer to the exhibit. Host2 attempts to establish communications with Server1. What action w
switch SW1 take prior to forwarding the frame?
flood the frame out all interfaces
learn the MAC address that is associated with Host2
assign a MAC address to Host2 from the MAC table
poll all interfaces to learn their assigned IP addresses

1
7

Refer to the exhibit. If H4 sends a message to H1 and the destination MAC address is in the M
table for both Switch1 and Switch2, which host devices will receive the message?
only H1
hosts H1 and H4
all hosts that are connected to Switch1
all hosts that are connected to Switch1 and Switch2

18 Which IP address type is intended for a specific host?


broadcast
multicast
simulcast
unicast

1 A computer joins the network and announces itself to all hosts on the LAN. What type of mess
9 does the computer send out?
broadcast
simulcast
multicast
unicast

20 A college network administrator is planning a wireless LAN to provide service in the student lo
and outdoor patio. The requirements include a range of at least 80 meters and a speed of 30
Which wireless LAN standard meets these requirements?
802.11
802.11a
802.11b
802.11g
A network engineer wants to represent confidential data in binary format. What are the two possible
values that the engineer can use? (Choose two.)
0
1
2
A
F

2 A network designer is working with a small company to determine the network type best suited
2 needs of the company. Which two characteristics could the designer use to describe a peer-to
network to the owner of the company? (Choose two.)
central administration
easy to install
low cost
scalable
secure

23 A home user is looking for an ISP connection that provides high speed digital transmission ov
regular phone lines. What ISP connection type should be used?
DSL
dial-up
satellite
cell modem
cable modem

2 What is the name for the contract between a customer and an ISP that specifies requirements
4 uptime and service response time?
DSL
IAB
NAP
SLA

25 What is the purpose of creating a DMZ during network firewall implementation?


to create a server security zone accessible only to internal clients
to create a dirty zone that allows all inbound and outbound traffic
to allow for a publicly accessible zone without compromising the internal network
to specify a higher security level than normally required for the internal production network
What describes the external IP address that is obtained by a router through a cable or DSL m
a public address that is obtained from ICANN
a private address that is manually configured by the administrator
a public address that is obtained through DHCP from the ISP
a private address that converts to a public address on the internal LAN

2 A network administrator has been notified that users have experienced problems gaining acce
7 network resources. What utility could be used to directly query a name server for information o
destination domain?
ping
tracert
netstat
ipconfig
nslookup
28

Refer to the graphic. Assume that the command output is from a wireless DHCP client that is
connected to a Linksys integrated router. What can be deduced from the output?
The wireless connection is good.
The WEP key or SSID needs to be checked.
The DHCP configuration on the router needs to be checked.
The wireless NIC driver or the NIC itself needs to be reinstalled.

2 What component of a personal computer is responsible for the processing of all data?
9 RAM
CPU
firewall
system bus
operating system

30

Refer to the exhibit. Assume that the exhibited output is from a host that is connected to a Lin
integrated router. What is the first thing that should be checked if using a bottom-up troublesh
approach?
the default gateway on the host
the IP address on the host
the IP address on the router
the link status LED on the front of the router
the subnet mask on the host
What is an ISP?
It is a standards body that develops cabling and wiring standards for networking.
It is a protocol that establishes how computers within a local network communicate.
It is an organization that enables individuals and businesses to connect to the Internet.
It is a networking device that combines the functionality of several different networking dev
one.

3 What are two characteristics of a MAC address? (Choose two.)


2 It indicates the physical location of the host within the network.
It is dynamically assigned by a DHCP server.
It is displayed in HEX characters.
It is a physical address.
It is cable-based.

33 Which protocol is used to transfer files among network devices and perform file-management
functions?
DNS
FTP
HTML
HTTP

3 A network technician suspects that malware on a user PC is opening multiple TCP connection
4 specific foreign host address. Which Windows command line utility can be used to confirm the
multiple TCP connections?
ping
netstat
tracert
ipconfig
nslookup

35 What is an advantage of purchasing a custom-built computer?


It is beneficial for less knowledgeable consumers.
The waiting period for assembly is negligible.
The cost is lower compared to a computer that has been preassembled.
The user can specify high-performance components to meet specific needs.
Which protocol in its default configuration downloads e-mail messages to the client computer and d
them from the server?
FTP
POP3
SMTP
IMAP4

3 For the second time in a week, workstations on a LAN are not able to log into the server. The
7 technician fixed the problem the first time, but cannot remember the steps taken to solve it. W
aspect of the troubleshooting process has the technician neglected?
identifying the problem
asking end-users questions
documenting the troubleshooting process
using structured techniques to solve a problem

38

Refer to the exhibit. A user sets up a home network and uses a crossover cable from Switch1
Internet port on the ISR. However, there is no connection between the host H1 and the server
should the user do in order to establish a connection?
Replace the cable with a console cable.
Replace the cable with a rollover cable.
Replace the failed crossover cable with a working crossover cable.
Replace the cable with a straight-through cable.

3 The area covered by a single AP is known as what?


9 ad-hoc network
basic service set
independent basic service set
extended service set
distribution system

40 Which troubleshooting technique can be used to quickly restore user functionality without havin
spend much time identifying the exact problem?
top-down
bottom-up
substitution
trial and error

Showing 8 of 11 Next> Page: GO <Prev


Which wireless protocol is used for encryption?
EAP
Open
PSK
WEP

4
2
Refer to the exhibit. An educational institution needs to connect PC systems that use private I
addressing to the Internet. They have multiple systems that need to access the Internet, but w
only able to purchase one public IP address. What should be activated on the Linksys integra
router to achieve this goal?
authentication
DHCP
encryption
firewall
NAT
WEP

43 What must be identical on all devices in a WLAN for successful wireless communication be
the devices?
SSID
antenna type
network mode
wireless NIC driver

4 Which type of network supports DHCP and DNS services for network users in a network dom
4 client/server
peer-to-peer
hierarchical
ad hoc

45 What two pieces of information should a help desk technician document while troubleshooting
connectivity issues with an end user? (Choose two.)
the CPU clock speed of the computer
the number of network jacks that are in the room
if the user can ping the default gateway address
if the word processing software is installed correctly
whether the PC uses dynamic or static IP addressing
Which adapter card would be required for a PC to exchange information with other PCs on a L
NIC
video card
sound card
internal modem

4 How does a straight-through cable connect two unlike devices?


7 It connects the receive pins on the first device to the receive pins on the second device.
It connects the transmit pins on the first device to the receive pins on the second device.
It disconnects the transmit pins and uses only the receive pins.
It uses the same pins for transmitting and receiving.

48 What is the purpose of the ipconfig command?


to force a client to give up its current IP address
to force the client to clear all IP-to-domain-name associations that is has learned
to force the client to clear all the MAC-address-to-IP-address associations that it has learn
to show the current IP configuration on the client

4 What is the purpose of pop-up blocker software?


9 It detects and removes spyware.
It detects and removes viruses.
It prevents the display of advertisement windows.
It removes unwanted e-mail.

50 What statement describes the filtering of traffic via the use of Stateful Packet Inspection?
It recognizes and filters predefined URLs
It permits access that is based on the application.
It permits access based on IP or MAC addresses.
It permits incoming packets that are legitimate responses to requests from internal hosts.
It translates an internal address or group of addresses into a public address that is sent ac
the network.
Your school network blocks all websites related to online gaming. What type of security policy
being applied?
identification and authentication
remote access
acceptable use
incident handling

5 What portion of the destination IP address is used as a packet is routed through the Internet?
2 subnet mask
host portion
network portion
default gateway address