Sei sulla pagina 1di 16

Which two transport layer protocols enable hosts to communicate and transfer data? (Choose two.

DHCP

ICMP

IP

TCP

UDP

What is a function of the distribution layer in the hierarchical design model?

to provide latency free switching

to organize end devices in small manageable groups

to provide connectivity using the high-speed backbone

to provide connectivity between smaller local networks

For the TCP/IP model for internetwork communication, which statement describes the process for the transition of
data from the internet layer to the network access layer?

An IP packet is encapsulated in a frame.

A TCP segment is placed in an IP packet.

HTML data is encapsulated in a TCP segment.

A frame is placed on the network media as encoded bits.

What is the function of the DNS server?

It maps the IP address to the MAC address.

It translates a computer or domain name to the associated IP address.

It manages the domain that clients are assigned to.

It accepts HTTP requests from clients.

In IP telephony, what is the purpose of a gateway to the PSTN?

to connect IP voice clients to Internet phone service

to create a peer-to-peer connection between two IP voice clients


to map unique names of IP voice endpoints to a client list on a voice server

to allow IP voice clients to communicate with regular analog telephones.

Which three types of information are provided to a host by an integrated router that is acting as a DHCP server?
(Choose three.)

host ID

IP addresses of DNS servers

IP address

MAC address

hostname

subnet mask

A host wants to send information simultaneously to all the other hosts in the same network. Which domain will
support this type of communication?

broadcast

unicast

local

multicast

What are two functions of MAC addresses in a LAN? (Choose two.)

to allow the transfer of frames from source to destination

to determine which host has priority to transfer data

to indicate the best path between separate networks

to associate with a specific network IP address

to uniquely identify a node on a network


Refer to the exhibit. How many additional hosts can be added to the local network?

124

126

252

254

255

256

What are two advantages of purchasing a preassembled computer? (Choose two.)

The cost is comparatively lower.

High-performance graphics and gaming applications are supported.

There is a negligible waiting period for assembly.

This type of computer is useful for knowledgeable consumers with special needs.

The user can specify high-performance components.

When is the use of a DSL modem necessary?

when a cellular telephone provides the service

when a high-speed connection is provided over a cable TV network

when a high-speed digital connection is required over the regular telephone line
when a satellite dish is used

A home user was successfully browsing the Internet earlier in the day but is now unable to connect. A ping command
from a wireless laptop to a wired PC in the LAN is successful, but the nslookup command fails to resolve a website
address. The user decides to analyze the LEDs on the Linksys router to verify connectivity. Which LED should be of
main concern in this situation?

WLAN LED

power LED

Internet LED

1-4 Ethernet LEDs

What is the most common reason that ISPs provide symmetrical transfer services?

to address data transfer needs of home users

to download significantly more than upload

to host servers on the Internet

to work with applications that require less bandwidth

What is one purpose of using logical addresses in an IP network?

They identify a specific NIC on a host device by assigning a permanent logical address.

They are used to determine which host device accepts the frame.

They provide vendor-specific information about the host.

They are used to determine the network that the host is located on.

They are used by switches to make forwarding decisions.

A network designer is working with a small company to determine the network type best suited to the needs of the
company. Which two characteristics could the designer use to describe a peer-to-peer network to the owner of the
company? (Choose two.)

central administration

easy to install

low cost

scalable
secure

Which part of a data packet is used by a router to determine the destination network?

source IP address

user data

destination IP address

control information

destination MAC address

What is the purpose of a router?

to forward broadcasts to all interfaces so that all hosts receive them

to maintain a table of individual host addresses

to select the best path to reach remote networks

to physically connect multiple hosts that belong to the same network

Refer to the exhibit. PC1 sends a data packet to PC4. When the router forwards the data out Fa0/1, what destination
MAC address will the router place in the frame?

0050.0FA9.CB47

0050.E208.A761

0200.5455.4E01

0200.545D.25F7
Refer to the exhibit. A local area network is built with four PCs, a switch, and a hub. PC1 sends a packet to PC4
which collides with a packet sent from PC3 to PC1. Which devices will receive the damaged frame?

PC1 and PC2

PC1, PC2, PC3, and PC4

PC1, PC2, and the switch

PC1, PC2, PC3, PC4, and the switch

Refer to the exhibit. Host2 attempts to establish communications with Server1. What action will switch SW1 take prior
to forwarding the frame?

flood the frame out all interfaces

learn the MAC address that is associated with Host2


assign a MAC address to Host2 from the MAC table

poll all interfaces to learn their assigned IP addresses

Refer to the exhibit. Which statement is true based on the information that is shown in the exhibit?

All wireless devices that are connected to this AP must have an assigned SSID of University.

Any wireless client that is attached to this AP must have the same IP address and SSID.

The AP is not physically wired to the local LAN.

This configuration is found only in an ad hoc wireless network.

Where do ISPs get the public addresses that they assign to end users?

ISPs create the addresses themselves.

ISPs are assigned addresses through the RFC.

ISPs obtain their addresses automatically.

ISPs obtain address blocks from registry organizations.

For an IP address, what component decides the number of bits that is used to represent the host ID?

default-gateway

host number

network number

subnet mask

What describes the external IP address that is obtained by a router through a cable or DSL modem?

a public address that is obtained from ICANN


a private address that is manually configured by the administrator

a public address that is obtained through DHCP from the ISP

a private address that converts to a public address on the internal LAN

Which three address ranges can be used to depict private IP addresses? (Choose three.)

10.0.0.0 to 10.0.0.255

127.16.0.0 to 127.16.255.255

150.150.0.0 to 150.150.255.255

172.16.1.0 to 172.16.1.255

192.168.22.0 to 192.168.22.255

200.100.50.0 to 200.100.50.255

Your school network blocks all websites related to online gaming. What type of security policy is being applied?

identification and authentication

remote access

acceptable use

incident handling

Which part of the electromagnetic spectrum is commonly used by wireless LANs?

Bluetooth

infrared

Industrial Scientific and Medical (ISM)

radio frequency (RF)

Which type of attack involves flooding a server port with SYN messages?

phishing

brute force

denial of service
data manipulation

What is the source of the majority of reported network security incidents?

adware

hackers

internal users

spammers

Refer to the graphic. What feature can be installed on the Linksys integrated router to convert private IP addresses to
Internet-routable addresses?

authentication

DHCP

encryption

firewall

NAT

WEP

Before implementing a stateful firewall on an ISR router, a network engineer is asked to explain to upper
management in simple terms what a stateful firewall is. Which description should the engineer use?

A stateful firewall is only available on a firewall appliance.

A stateful firewall blocks or permits access based only on applications.


A stateful firewall bases its analysis only on IP address, port number, and MAC address.

A stateful firewall can be configured to allow incoming packets only from sessions that are initiated from inside.

What is the purpose of creating a DMZ during network firewall implementation?

to create a server security zone accessible only to internal clients

to create a dirty zone that allows all inbound and outbound traffic

to allow for a publicly accessible zone without compromising the internal network

to specify a higher security level than normally required for the internal production network

How does a straight-through cable connect two unlike devices?

It connects the receive pins on the first device to the receive pins on the second device.

It connects the transmit pins on the first device to the receive pins on the second device.

It disconnects the transmit pins and uses only the receive pins.

It uses the same pins for transmitting and receiving.

What is an advantage of selecting an operating system that has a commercial license over one with a GPL license?

The commercial license-based operating system ensures full access to the source code for everyone.

The commercial license-based operating system ensures that everyone can participate in the enhancement of
the product.

The commercial license-based operating system provides structured support.

The commercial license-based operating system is released free of charge.

Which installation option enables a single physical resource to function simultaneously as multiple logical resources?

clean install

multi-boot

upgrade

virtualization

For devices that do not autosense, which connection requires a crossover cable?

hub port to router port


PC to hub port

PC to switch port

PC port to PC port

When terminating UTP cabling, why is it important to untwist only a small amount of each wire pair?

minimizes crosstalk

makes installation faster

ensures wires are in correct order

makes it easier to fit wires into connector

Top of Form

What are two examples of storage peripheral devices? (Choose two.)

printer

flash drive

headphones

external DVD

barcode reader

Within a local network, which two items must be unique on a computer for it to successfully connect to the network?
(Choose two.)

IP address

subnet mask

computer name

default gateway address

operating system version


Refer to the exhibit. A ping command that was initiated from the local PC to the file server at IP address
209.165.201.5 succeeded. However, a ping that was initiated from the file server to the local PC was unsuccessful.
What could cause the ping command that was initiated from file server to fail?

The file server is down.

The integrated router has failed.

NAT has been enabled on the integrated router.

A security measure is blocking access that initiates from the server.

The DSL modem failed to provide an IP address for the local PC.

Refer to the exhibit. Which statement is true based on the configuration shown?

Multiple modes of encryption are configured on this device.


Both 802.11b and 802.11g hosts can connect to this device.

All APs in the WLAN will allow wireless connections via channel 6.

The network name must be entered on a host computer before the host connects to this
network.

Refer to the exhibit. What is the effect of setting the security mode to WEP on the Linksys integrated router?

The WEP security mode enables the AP to inform clients of its presence.

The WEP security mode encrypts network traffic during transmission between the AP and
the wireless client.

The WEP security mode generates a dynamic key each time a client establishes a
connection with the AP.

The WEP security mode identifies the WLAN.

A network administrator is planning an inexpensive WLAN implementation at a small business site. Which two
strategies should be included in the site survey? (Choose two.)

Identify the locations of sources of interference.

Hire a WLAN analysis firm to survey the site.

Deploy all APs and move them if necessary to improve coverage.

Use a wireless laptop to verify WLAN coverage in the work areas.

Employ sophisticated specialized equipment to measure signal strengths and interference.

While conducting a site survey for a new wireless LAN design, a network technician determines that several wireless
phones in the company use the 2.4GHz band and could interfere with the operation of the wireless LAN. Based on
this, which two wireless LAN standards could be implemented to avoid this interference? (Choose two.)

original 802.11

802.11a

802.11b

802.11g
802.11n

Refer to the exhibit. A small office uses an ISR to provide connectivity for both wired and wireless computers. One
day, a sales person who is using a laptop cannot connect to Server1 through the wireless network. A network
technician attempts to determine if the problem is on the wireless or the wired network. The technician pings
successfully from the wireless laptop to the default gateway IP address on the ISR. What should be the next
troubleshooting step?

Ping from the laptop to PC1.

Ping from Server1 to PC1.

Ping from Server1 to its gateway IP address.

Ping from the laptop to the Ethernet port on the cable modem.

A user is unable to send e-mail. To begin troubleshooting this problem, the network technician uses the browser on
the PC and tries to access some popular Internet websites. Which troubleshooting approach is being followed?

bottom-up

divide-and-conquer

top-down

trial and error

For the second time in a week, workstations on a LAN are not able to log into the server. The technician fixed the
problem the first time, but cannot remember the steps taken to solve it. What aspect of the troubleshooting process
has the technician neglected?
identifying the problem

asking end-users questions

documenting the troubleshooting process

using structured techniques to solve a problem

Refer to the exhibit. When www.cisco.com is entered in a browser window on a PC, the web page is unavailable.
While troubleshooting this problem, the network technician executes the nslookup command as well as the ping
command to the web server. What is the likely reason that the web server home page cannot be displayed?

The DNS server service needs to be installed on the PC.

A DNS server is not available to resolve the name.

The reason that the web server is unable to display the web page is that the web server is unavailable.

The increased response time displayed in the ping may indicate a delay in server response time.

What is the meaning of the term crosstalk?

interference of signals between wire pairs

loss of signal strength as distance increases


damage of the signal when two bare wires touch

strengthening of a signal by a networking device

A user in a small office is unable to connect to the Internet. The user examines the physical connections to the ISR, a
Linksys WRT300N, and notices a solid green LED on the port that is wired to the computer. What does the LED
indicate about the current state of the port?

The ISR is making adjustments to the port.

The device is plugged in and traffic is flowing.

The computer is plugged in but no traffic is flowing.

The ISR does not detect that the computer is plugged in.

Bottom of Form

Potrebbero piacerti anche