Вы находитесь на странице: 1из 20

1 Top of Form

A learner wants to interact with the operating system of a computer. Which two methods can be used for this
(Choose two.)



third party software

Bottom of Form

2 Top of Form
The area covered by a single AP is known as what?
ad-hoc network

basic service set

independent basic service set

extended service set

distribution system
Bottom of Form

3 Top of Form
Refer to the exhibit. H1 can ping H2, H3, and the Fa0/0 interface of router R1. H2 and H3 but not H1 can pin
H4 and H5. What is a possible cause for the H1 failure?
Router R1 has no route to the destination network.

Switch S1 does not have an IP address configured.

The link between router R1 and switch S2 has failed.

Host H1 does not have a default gateway configured.

Bottom of Form

4 Top of Form
What is the purpose of creating a DMZ during network firewall implementation?
to create a server security zone accessible only to internal clients

to create a dirty zone that allows all inbound and outbound traffic

to allow for a publicly accessible zone without compromising the internal network

to specify a higher security level than normally required for the internal production network
Bottom of Form

5 Top of Form
What does the term "attenuation" mean in data communication?
loss of signal strength as distance increases
time for a signal to reach its destination

leakage of signals from one cable pair to another

strengthening of a signal by a networking device

Bottom of Form

6 Top of Form
A system administrator routinely monitors failed login attempts on a server. If the administrator sees an
extremely high number of failed attempts by a single user who is trying multiple password combinations, wh
type of attack is in progress?
brute force


SYN flood


Bottom of Form

7 Top of Form
Before implementing a stateful firewall on an ISR router, a network engineer is asked to explain to upper
management in simple terms what a stateful firewall is. Which description should the engineer use?
A stateful firewall is only available on a firewall appliance.

A stateful firewall blocks or permits access based only on applications.

A stateful firewall bases its analysis only on IP address, port number, and MAC address.
A stateful firewall can be configured to allow incoming packets only from sessions that are initiated from
Bottom of Form

8 Top of Form
A host sent a message that all other hosts on the switched local network received and processed. What type o
domain are all these hosts a part of?
local domain

multicast domain

collision domain
broadcast domain
Bottom of Form

9 Top of Form
Which two statements are true about network applications? (Choose two.)
Microsoft Word is an example of a network application.

Network applications are accessible from a remote computer.

Network applications are installed on a special type of computer that supports only network applications

Network applications are installed on a network server.

Network applications are accessible by one computer at a time.

Bottom of Form

10 Top of Form
When terminating UTP cabling, why is it important to untwist only a small amount of each wire pair?
minimizes crosstalk

makes installation faster

ensures wires are in correct order

makes it easier to fit wires into connector

Bottom of Form

11 Top of Form
Which of the following are the address ranges of the private IP addresses? (Choose three.) to to to to to to
Bottom of Form
12 Top of Form
Under what circumstance would it be appropriate to use private IP addresses?
for communication between two ISPs

for a network that is directly connected to the Internet

for addresses that are used exclusively within an organization.

for a host with more than one direct connection to the Internet
Bottom of Form

13 Top of Form
What is the maximum number of bytes that is allowed in a standard IEEE 802.3 Ethernet frame?



Bottom of Form

14 Top of Form
What is the purpose of spam filter software?
It detects and removes spyware.

It detects and removes viruses.

It prevents the display of advertisement windows.

It examines incoming e-mail messages to identify the unsolicited ones.

Bottom of Form

15 Top of Form
What is the function of a physical topology map?
records IP addressing of each host

records hostnames and applications

organizes groups of hosts by how they use the network

shows where wiring is installed and the locations of network devices

Bottom of Form

Top of Form

Showing 1 of 4 <Prev Next>
Bottom of Form

Close Window

Top of Form
Which part of a data packet is used by a router to determine the destination network?
source IP address

user data

destination IP address

control information

destination MAC address

Bottom of Form

17 Top of Form
What is the default subnet mask for an IP address of
Bottom of Form

18 Top of Form
Which service will translate private internal IP addresses into Internet routable public IP addresses?


Bottom of Form

19 Top of Form
A company network user calls the company helpdesk to report that a PC is unable to access either internal o
external network resources. If the first-level helpdesk staff is unable to solve the problem, what action woul
The problem would be referred to an onsite technician.

The problem would be escalated to a higher level helpdesk staff member.

The first-level helpdesk staff would go to the user worksite to perform diagnostics.

The first-level helpdesk staff would remotely take control of the user system to perform diagnostics.

The first-level helpdesk staff would use online integrated diagnostics software to solve the problem.
Bottom of Form

20 Top of Form
When is the use of a DSL modem necessary?
when a cellular telephone provides the service

when a high-speed connection is provided over a cable TV network

when a high-speed digital connection is required over the regular telephone line

when a satellite dish is used

Bottom of Form

21 Top of Form
What is specified by the host bits in an IP address?
broadcast identity of the network

identity of the computer on the network

network that is being addressed

network to which the host belongs

Bottom of Form

22 Top of Form
What layer is the first point of entry for a host into the network?
core layer

access layer

network layer

distribution layer
Bottom of Form

23 Top of Form
Which two IP configuration components does the computer use to identify its subnetwork? (Choose two.)
default gateway

IP address

MAC address

DNS server address

subnet mask
Bottom of Form

24 Top of Form
What is the meaning of the term crosstalk?
interference of signals between wire pairs

loss of signal strength as distance increases

damage of the signal when two bare wires touch

strengthening of a signal by a networking device

Bottom of Form

25 Top of Form
Refer to the exhibit. Host2 attempts to establish communications with Server1. What action will switch SW
take prior to forwarding the frame?
flood the frame out all interfaces

learn the MAC address that is associated with Host2

assign a MAC address to Host2 from the MAC table

poll all interfaces to learn their assigned IP addresses

Bottom of Form

26 Top of Form
Which installation option enables a single physical resource to function simultaneously as multiple logical
clean install



Bottom of Form

27 Top of Form
As an assignment, a computer science student needs to present data in binary format. What are the two poss
values that the student can use? (Choose two.)

Bottom of Form

28 Top of Form
Select the connection that would require a straight-through cable.
a switch to a hub

a router to a switch

a switch to a switch

a router to a router
Bottom of Form

29 Top of Form
Which private network address is reserved for diagnostic testing of devices?
Bottom of Form

3 Top of Form

Refer to the exhibit. What is the effect of setting the security mode to WEP on the Linksys
integrated router?
WEP identifies the wireless LAN.

WEP allows the access point to inform clients of its presence.

WEP translates IP addresses into easy-to-remember domain names.

WEP encrypts data between the wireless client and the access point.

WEP ensures that only authenticated users are allowed access to the WLAN.
WEP translates an internal address or group of addresses into an outside, public address.

Top of Form
Because of an increasing number of users, bandwidth per user on a WLAN has decreased to a point where
complaining about poor performance. What can be done to improve the user experience?
Increase the AP radio signal strength.

Place the AP in a more central location.

Deploy an external omni-directional antenna.

Reduce the number of devices using each channel.

Bottom of Form

32 Top of Form
Refer to the graphic. Assume that the exhibited output is from a host that is connected to a Linksys int
router. What is one of the first things you should check?
IP address on the host

IP address on the router

subnet mask on the host

default gateway on the host

link status LED on the front of the router

Bottom of Form

33 Top of Form
Which portion of a received datagram is decoded and used by the internetwork layer of the TCP/IP m
IP address

port number

MAC address

HTML/user data
Bottom of Form

34 Top of Form
TCP/IP data transmission between the source and destination host is encapsulated in four steps:

A. adds the data-link header and trailer;

B. converts data to bits for transmission;
C. adds the network IP address to the header of the packet;
D. segments the data for end-to-end transport.
What is the correct sequence of these steps?
A, B, C, D

A, D, B, C

B, D, A, C

D, C, A, B

D, C, B, A
Bottom of Form

35 Top of Form
What is an advantage of selecting an operating system that has a commercial license over one with a G
The commercial license-based operating system ensures full access to the source code for everyon
The commercial license-based operating system ensures that everyone can participate in the enhan
the product.
The commercial license-based operating system provides structured support.

The commercial license-based operating system is released free of charge.

Bottom of Form

36 Top of Form
What are two examples of storage peripheral devices? (Choose two.)

flash drive


external DVD

barcode reader
Bottom of Form

37 Top of Form
Refer to the exhibit. A new switch is connected to an existing switch that has a fully populated MAC
requires the destination MAC address of PC3 in order to send a message. Which device or devices wi
ARP sent by PC1?
only PC3

PC2 and PC3

PC3 and PC4

PC2, PC3 and PC4

Bottom of Form

38 Top of Form
A user tries to open a page on the web server at www.cisco.com. The user’s workstation does not hav
destination IP address in order to encapsulate the request. Which network topology will provide the se
are required to associate the name of the web server with an IP address?
Bottom of Form

39 Top of Form
Refer to the exhibit. A user sets up a home network and uses a crossover cable from Switch1 to the In
on the ISR. However, there is no connection between the host H1 and the server. What should the use
order to establish a connection?
Replace the cable with a console cable.

Replace the cable with a rollover cable.

Replace the failed crossover cable with a working crossover cable.

Replace the cable with a straight-through cable.

Bottom of Form

40 Top of Form
Which three statements are characteristics of DHCP services? (Choose three.)
The DHCP server assigns the IP addresses and ensures that they are unique.

A PC that uses a static IP address obtains IP configuration from the DHCP server.

The integrated router acts as a DHCP server for internal hosts on local networks.

An integrated router acts as the DHCP server to provide the IP address to the ISP.

DHCP clients on medium and large networks receive the IP configuration from the ISP.

The DHCP server assigns a lease time that specifies the length of time the assigned IP address is v
Bottom of Form
41 Top of Form
What are two functions of MAC addresses in a LAN? (Choose two.)
to allow the transfer of frames from source to destination

to determine which host has priority to transfer data

to indicate the best path between separate networks

to associate with a specific network IP address

to uniquely identify a node on a network

Bottom of Form

42 Top of Form

Refer to the exhibit. What is the purpose of assigning a network name of College?
It enables access to the AP configuration GUI by name rather than by address.

It encrypts data between the wireless client and the AP.

It identifies the wireless LAN.

It translates an internal address or group of addresses to a public address.

It translates IP addresses into easy-to-remember domain names.

Bottom of Form

43 Top of Form
A network designer is working with a small company to determine the network type best suited to the
the company. Which two characteristics could the designer use to describe a peer-to-peer network to t
of the company? (Choose two.)
central administration
easy to install

low cost


Bottom of Form

44 Top of Form
What is a characteristic of Bluetooth wireless technology?
It allows one-to-many connections.

It operates in the 5GHz radio frequency band.

It is unable to penetrate walls with a useable signal.

It can be used for communications beyond 100 meters.

Bottom of Form

45 Top of Form
A user is unable to send e-mail. While troubleshooting this problem, the network technician first verif
physical connectivity of cables. Which troubleshooting approach is being followed?



trial and error

Bottom of Form

Top of Form
Which type of computer uses an integrated monitor and keyboard?
pocket PC



Bottom of Form

47 Top of Form

Refer to the exhibit. When www.cisco.com is entered in a browser window on a PC, the web page is
unavailable. While troubleshooting this problem, the network technician executes the nslookup
well as the ping command to the web server. What is the likely reason that the web server home page can
The DNS server service needs to be installed on the PC.

A DNS server is not available to resolve the name.

The reason that the web server is unable to display the web page is that the web server is unavailable

The increased response time displayed in the ping may indicate a delay in server response time.
Bottom of Form

48 Top of Form
What is the function of CSMA/CA on a wireless Ethernet network?
to prevent collisions
to broadcast messages

to select the least congested channel

to establish an ACK between devices

Bottom of Form

49 Top of Form
A network administrator is planning an inexpensive WLAN implementation at a small business site. Whi
strategies should be included in the site survey? (Choose two.)
Identify the locations of sources of interference.

Hire a WLAN analysis firm to survey the site.

Deploy all APs and move them if necessary to improve coverage.

Use a wireless laptop to verify WLAN coverage in the work areas.

Employ sophisticated specialized equipment to measure signal strengths and interference.

Bottom of Form

50 Top of Form
Which two statements correctly describe MAC addresses? (Choose two.)
MAC addresses are used to identify a specific NIC.

MAC addresses contain a network number and unique host identification.

MAC addresses are physical addresses.

MAC addresses are always assigned to network devices by a network administrator.

MAC addresses are Layer 3 addresses.

Bottom of Form

Bottom of Form