Sei sulla pagina 1di 8

1

Which two automatic addressing assignments are supported by DHCP? (Choose two.)
local server address
subnet mask
default gateway address
physical address of the recipient
physical address of the sender
2
What is specified by the network number in an IP address?
the network to which the host belongs
the physical identity of the computer on the network
the node of the subnetwork which is being addressed
the broadcast identity of subnetwork
3
A wireless DHCP client cannot connect to the Internet through a Linksys integrat
ed router. When you type ipconfig on the host, no IP address, subnet mask, or de
fault gateway shows. What are two of the first things you will check? (Choose tw
o.)
SSID
if the wireless client is configured for DHCP
the cable between client and integrated router
the firewall configuration on the integrated router
if the correct default gateway is configured on the client
if the correct default gateway is configured on the integrated router
4
For the second time in a week, workstations on a LAN are not able to log into th
e server. The technician fixed the problem the first time, but cannot remember t
he steps taken to solve it. What aspect of the troubleshooting process has the t
echnician neglected?
identifying the problem
asking end-users questions
documenting the troubleshooting process
using structured techniques to solve a problem
5
What is true about a wireless access point that is equipped with an omnidirectio
nal antenna?
concentrates signal in one direction
typically used in bridging applications
radiates the signal equally in all directions
provides the greatest transmission distance of all antenna types that ar
e used by APs
6

Refer to the exhibit. Which statement is true based on the information that is s
hown in the exhibit?
All wireless devices that are connected to this AP must have an assigned
SSID of College.
Any wireless client that is attached to this AP must have the same IP ad
dress and SSID.
The AP is not physically wired to the local LAN.
This configuration is found only in an ad hoc wireless network.
7
What destination IP address is used in a unicast packet?
a specific host
a group of hosts
all hosts on the network
the network broadcast address
8
Why would a corporate web server be assigned a public IP address instead of a pr
ivate IP address?
The public address can be acquired at no cost.
The public address can be routed on the Internet.
The public address provides a security advantage.
The same public address can be used on multiple servers to prevent deple
tion of available IP addresses.
9
Which two causes of networking problems are related to the physical layer? (Choo
se two.)
damaged cables and connectors
incorrect addressing
incorrect subnet mask
overheated components
incorrect default gateway
10
What is the default subnet mask for the IP address 128.107.23.10?
255.0.0.0
255.255.0.0
255.255.255.0
255.255.255.255
11
What type of computer would most likely use a docking station?
laptop
server
desktop
mainframe
workstation
12
When would infrared be used to connect network devices?
when connecting multiple host devices to a wireless access point
when synchronizing a PC with a PDA that is in line of sight
when connecting a PC to a network switch that is located in another room
when updating two access points that are located in separate buildings
13
A host wants to send information simultaneously to all the other hosts in the sa
me network. Which domain will support this type of communication?
broadcast
unicast
local
multicast
14
For devices that do not autosense, which connection requires a crossover cable?
hub port to router port
PC to hub port
PC to switch port
PC port to PC port
15
Which protocol is used to transfer files among network devices and perform file-
management functions?
DNS
FTP
HTML
HTTP
16
Which wireless technology provides mutual two-way authentication?
EAP
pre-shared keys
open authentication
PAP
17
What measurement is commonly used to describe communication speed when transferr
ing data?
bps
cps
Hz
MB
18
What are two advantages of purchasing a custom-built computer? (Choose two.)
usually a lower cost
no waiting period for assembly
user can specify higher performance components
supports higher-end graphics and gaming applications
fewer components to replace
19
What statement describes the filtering of traffic via the use of Stateful Packet
Inspection?
It recognizes and filters predefined URLs
It permits access that is based on the application.
It permits access based on IP or MAC addresses.
It permits incoming packets that are legitimate responses to requests fr
om internal hosts.
It translates an internal address or group of addresses into a public ad
dress that is sent across the network.
20

Refer to the exhibit. An educational institution needs to connect PC systems tha


t use private IP addressing to the Internet. They have multiple systems that nee
d to access the Internet, but were only able to purchase one public IP address.
What should be activated on the Linksys integrated router to achieve this goal?
authentication
DHCP
encryption
firewall
NAT
WEP
21
What advantage does a peer-to-peer network have over a client-server network?
It increases security.
It increases scalability.
It produces a higher performance for hosts.
It eliminates the need for centralized administration.
22
Which protocol in its default configuration downloads e-mail messages to the cli
ent computer and deletes them from the server?
FTP
POP3
SMTP
IMAP4
23

Refer to the exhibit. A network technician is statically assigning an IP address


to a PC. The default gateway is correct. What would be a valid IP address to as
sign to the host?
128.106.10.100
128.107.255.1
128.107.255.254
128.108.100.10
24
What is the purpose of pop-up blocker software?
It detects and removes spyware.
It detects and removes viruses.
It prevents the display of advertisement windows.
It removes unwanted e-mail.
25
What is the purpose of a ticket number that is assigned to a help desk call?
It determines the place of a person in the hold queue.
It uniquely identifies a piece of hardware.
It assigns a priority value to the problem.
It acts as a reference number for follow-up calls.
26

Refer to the exhibit. The security policy of an organization allows employees to


connect to the office intranet from their homes. Which type of security policy
is this?
acceptable use
incident handling
network maintenance
remote access
27

Refer to the exhibit. If H4 sends a message to H1 and the destination MAC addres
s is in the MAC table for both Switch1 and Switch2, which host devices will rece
ive the message?
only H1
hosts H1 and H4
all hosts that are connected to Switch1
all hosts that are connected to Switch1 and Switch2
28
Which adapter card would be required for a PC to exchange information with other
PCs on a LAN?
NIC
video card
sound card
internal modem
29
Why does a router maintain an ARP table?
to determine the best interface to forward packets
to store network addresses and the best paths to them
to allow packets to be forwarded to a final destination network
to determine addressing of frames for delivery on a local network segmen
t
30
Which attribute must be the same for wireless devices on one network to be able
to communicate with devices on a different network?
DNS server
MAC address
default gateway
operating system
wireless equipment vendor
31
How does a crossover cable connect two routers?
It connects the pins that are used for receiving on one router to the pi
ns that are used for receiving on the other router.
It connects the pins that are used for transmitting on one router to the
pins that are used for receiving on the other router.
It disconnects the transmit pins and uses only the receive pins.
It uses the same pins for transmitting and receiving.
32
What two commands can be used to form a new binding if client information does n
ot agree with the DHCP client table? (Choose two.)
ipconfig /release
ipconfig /all
ipconfig /flushdns
ipconfig /renew
ipconfig
33
Which installation option should be chosen when the current operating system is
too damaged to work properly?
upgrade
multi-boot
clean install
virtualization
34
What procedure will help prevent users from detecting a wireless network?
Enable WEP.
Enable MAC filtering.
Disable SSID broadcasts.
Change the default administrator password on the AP.
35
Which network design layer provides hosts with initial connectivity to the netwo
rk?
access
core
distribution
network
36
What is an ISP?
It is a standards body that develops cabling and wiring standards for ne
tworking.
It is a protocol that establishes how computers within a local network c
ommunicate.
It is an organization that enables individuals and businesses to connect
to the Internet.
It is a networking device that combines the functionality of several dif
ferent networking devices in one.
37
Which Windows PC command line utility can be used to discover the path that a pa
cket takes to reach a destination?
ping
netstat
tracert
nslookup
ipconfig
38
Which of the following statements best describes DNS?
DNS servers are used to map an IP address to a physical address.
DNS servers are used to map a name to an IP address.
DNS servers are used to configure logical address information for host c
omputers.
DNS servers are used to translate from private addresses to public addre
sses.
39
What are two characteristics of a MAC address? (Choose two.)
It indicates the physical location of the host within the network.
It is dynamically assigned by a DHCP server.
It is displayed in HEX characters.
It is a physical address.
It is cable-based.
40

Refer to the exhibit. Which option correctly represents the encapsulation of a p


acket that is sent by Host1 to the web server?

41
What component of a personal computer is responsible for the processing of all d
ata?
RAM
CPU
firewall
system bus
operating system
42
Which Windows command is used to display the configured IP address, subnet mask,
and default gateway?
ipconfig
netstat
nslookup
tracert
43

Refer to the exhibit. Assume that the command output is from a wireless DHCP cli
ent that is connected to a Linksys integrated router. What can be deduced from t
he output?
The DHCP configuration on the router needs to be verified.
The WEP key or SSID needs to be verified.
The wireless connection is operational.
The wireless NIC driver or the NIC itself needs to be reinstalled.
44
Which statement accurately describes a recommended strategy for end users to emp
loy when they interact with a help desk technician?
Provide as much information about the problem as possible.
Expect first-level help desk technicians to solve the problem, because t
hey are highly-trained personnel.
Hand over the problem to the help desk professionals, then do not interf
ere with them.
At the beginning of the call, ask for the name and number of the supervi
sor of the help desk technician.
45
Which two statements are true about local applications? (Choose two.)
They run on the network.
An example of a local application is e-mail.
They are accessed from a remote computer.
They are stored on the local hard disk.
They run on the computer where they are installed.
What are two examples of peripheral input devices? (Choose two.)
external modem
barcode reader
digital camera
plotter
printer
47
The help desk at a large packaging company receives a call from a user who is co
ncerned about lost data files on the local PC. The help desk technician learns t
hat the user clicked on an icon that appeared to be a program update, but no upd
ates were scheduled for that program. What type of attack has likely occurred?
worm
DDoS
brute force
Trojan horse
48
Which picture shows a USB port on a PC?

49
Which three addresses belong to the category of private IP addresses? (Choose th
ree.)
10.0.0.1
128.0.0.1
150.0.0.1
172.16.0.1
192.168.31.19
172.168.31.1
50
What wireless technology has the ability to communicate with many devices at the
same time, makes use of the 2.4 GHz band, and is limited to low-speed, short-ra
nge communications?
RF
ISM
infrared
Bluetooth
51
Which three statements describe an IP address? (Choose three.)
An IP address is known as a logical address.
An IP address uses a 30-bit addressing scheme.
An IP address is found in the Layer 2 header during transmission.
The network portion of an IP address is burned into a network interface
card.
An IP address is unique within the same local network.
The network portion of an IP address will be the same for all hosts that
are connected to the same local network.
52
Which portion of the packet does a router use to forward the packet to the desti
nation?
source IP address
user data
destination IP address
control information
destination MAC address

Potrebbero piacerti anche