Sei sulla pagina 1di 31

1. A host sent a message that all other hosts on the switched local network received and processed.

What type
of domain are all these hosts a part of?

local domain
multicast domain
collision domain
broadcast domain

2. Which two statements are true about local applications? (Choose two.)
They run on the network.
An example of a local application is e-mail.
They are accessed from a remote computer.
They are stored on the local hard disk.
They run on the computer where they are installed.

3.Refer to the exhibit. What cabling fault does the exhibit represent?
open
reversed pair
short
split pair

4. A learner wants to interact with the operating system of a computer. Which two methods can be used for
this? (Choose two.)
CLI
GUI
kernel
third party software
shell

5. What is an advantage of selecting an operating system that has a commercial license over one with a GPL
license?
The commercial license-based operating system ensures full access to the source code for everyone.
The commercial license-based operating system ensures that everyone can participate in the enhancement of the product.
The commercial license-based operating system provides structured support.
The commercial license-based operating system is released free of charge.

6.Refer to the exhibit. If H8 sends a message to H4 and the destination MAC address is in the MAC
table for both Switch1 and Switch2, which host devices will receive the message?
only H4
hosts H4 and H8
all hosts that are connected to Switch1
all hosts that are connected to Switch1 and Switch2

7. For an IP address, what component decides the number of bits that is used to represent the host ID?
default-gateway
host number
network number
subnet mask

8. The help desk at a large packaging company receives a call from a user who is concerned about lost data
files on the local PC. The help desk technician learns that the user clicked on an icon that appeared to be a
program update, but no updates were scheduled for that program. What type of attack has likely occurred?
worm
DDoS
brute force
Trojan horse

9. What is the purpose of the ipconfig /release command?


It forces a client to give up its current IP address.
It forces a client to give up its current MAC address.
It forces the client to clear all the MAC address to IP address associations it has learned.
It shows the current IP configuration on the client.
10. Which protocol in its default configuration downloads e-mail messages to the client computer and deletes
them from the server?
FTP
POP3
SMTP
IMAP4

11. What are two examples of storage peripheral devices? (Choose two.)
printer
flash drive
headphones
external DVD
barcode reader

12. What is the function of the DNS server?


It maps the IP address to the MAC address.
It translates a computer or domain name to the associated IP address.
It manages the domain that clients are assigned to.
It accepts HTTP requests from clients.

13. What is the default subnet mask for an IP address of 128.100.19.14?


255.0.0.0
255.255.0.0
255.255.255.0
255.255.255.255

14. What are two best practices that are used when configuring a small home WLAN? (Choose two.)
the use of EAP
the encryption of the SSID
the use of pre-shared keys
the use of open authentication
the disabling of SSID broadcasting

15. A network engineer wants to represent confidential data in binary format. What are the two possible values
that the engineer can use? (Choose two.)
0
1
2
A
F

16.Refer to the exhibit. What is the purpose of assigning a network name of College?
It enables access to the AP configuration GUI by name rather than by address.
It encrypts data between the wireless client and the AP.
It identifies the wireless LAN.
It translates an internal address or group of addresses to a public address.
It translates IP addresses into easy-to-remember domain names.

17. A network administrator has been notified that users have experienced problems gaining access to network
resources. What utility could be used to directly query a name server for information on a destination domain?
ping
tracert
netstat
ipconfig
nslookup

18. Which two causes of networking problems are related to the physical layer? (Choose two.)
disconnected cables
improper operation of cooling fans
incorrect MAC address
incorrect default gateway
incorrect subnet mask
19. A network technician is required to provide access to the Internet for a large company. What is needed to
accomplish this task?
ISP
private IP addresses for each host
static IP addresses for each host
DHCP server

20. Your school network blocks all websites related to online gaming. What type of security policy is being
applied?
identification and authentication
remote access
acceptable use
incident handling

21.Refer to the exhibit. What is the effect of setting the security mode to WEP on the Linksys integrated
router?
The WEP security mode enables the AP to inform clients of its presence.
The WEP security mode encrypts network traffic during transmission between the AP and the wireless client.
The WEP security mode generates a dynamic key each time a client establishes a connection with the AP.
The WEP security mode identifies the WLAN.

22. When terminating UTP cabling, why is it important to untwist only a small amount of each wire pair?
minimizes crosstalk
makes installation faster
ensures wires are in correct order
makes it easier to fit wires into connector

23. Which part of the electromagnetic spectrum is commonly used to exchange data between a PDA and a
computer?
FM
radar
infrared
ultraviolet

24. A network technician suspects that malware on a user PC is opening multiple TCP connections to a
specific foreign host address. Which Windows command line utility can be used to confirm the multiple TCP
connections?
ping
netstat
tracert
ipconfig
nslookup

25. Refer to the exhibit. A user on host A sends an e-mail to the user on host B. Which type of message does
host A send?
broadcast
multicast
simulcast
unicast

26. Which two transport layer protocols enable hosts to communicate and transfer data? (Choose two.)
DHCP
ICMP
IP
TCP
UDP

27. The area covered by a single AP is known as what?


ad-hoc network
basic service set
independent basic service set
extended service set
distribution system
28. What is the purpose of spam filter software?
It detects and removes spyware.
It detects and removes viruses.
It prevents the display of advertisement windows.
It examines incoming e-mail messages to identify the unsolicited ones.

29. What type of message is sent to a specific group of hosts?


static
unicast
dynamic
multicast
broadcast

30. What layer is the first point of entry for a host into the network?
core layer
access layer
network layer
distribution layer

31. What type of cable would be required to connect a Linksys router to a wired PC?
crossover cable
rollover cable
serial cable
straight-through cable

32. Refer to the exhibit. Why would a network administrator use the network mode that is shown?
to support hosts on different IP networks
to support hosts that use different 802.11 standards
to support both wireless and wired Ethernet hosts
to support hosts with different operating systems
to support hosts with network cards from different manufacturers

33. In an attempt to verify connectivity, a user issues the ping command to a device that is not on the
local network. The ping is unsuccessful. What can be determined from this result?
The default gateway is misconfigured.
The patch cable on the host station is faulty.
The router between the host and destination is faulty.
Further troubleshooting will be required to reach a definite conclusion.

34. What is the function of CSMA/CA on a wireless Ethernet network?


to prevent collisions
to broadcast messages
to select the least congested channel
to establish an ACK between devices

35. Because of an increasing number of users, bandwidth per user on a WLAN has decreased to a
point where users are complaining about poor performance. What can be done to improve the user
experience?
Increase the AP radio signal strength.
Place the AP in a more central location.
Deploy an external omni-directional antenna.
Reduce the number of devices using each channel.

36. Which installation option enables a single physical resource to function simultaneously as
multiple logical resources?
clean install
multi-boot
upgrade
virtualization
37. What is the purpose of creating a DMZ during network firewall implementation?
to create a server security zone accessible only to internal clients
to create a dirty zone that allows all inbound and outbound traffic
to allow for a publicly accessible zone without compromising the internal network
to specify a higher security level than normally required for the internal production network

38. What is specified by the host bits in an IP address?


broadcast identity of the network
identity of the computer on the network
network that is being addressed
network to which the host belongs

39. Which of the following are the address ranges of the private IP addresses? (Choose three.)
10.0.0.0 to 10.255.255.255
200.100.50.0 to 200.100.25.255
150.150.0.0 to 150.150.255.255
172.16.0.0 to 172.31.255.255
192.168.0.0 to 192.168.255.255
127.16.0.0 to 127.31.255.255

40. Which type of computer uses an integrated monitor and keyboard?


pocket PC
laptop
mainframe
server
workstation

41. A company has a web server that must be accessible to both external and internal clients. Which
security policy best practice should be followed to maximize security of the server?
Place the web server in a DMZ.
Keep the web server on the external network.
Configure a firewall device to serve as the web server.
Locate the web server in the server farm of the internal network.

42. What advantage does a peer-to-peer network have over a client-server network?
It increases security.
It increases scalability.
It produces a higher performance for hosts.
It eliminates the need for centralized administration.

43. Where do ISPs get the public addresses that they assign to end users?
ISPs create the addresses themselves.
ISPs are assigned addresses through the RFC.
ISPs obtain their addresses automatically.
ISPs obtain address blocks from registry organizations.

44. Which part of a data packet is used by a router to determine the destination network?
source IP address
user data
destination IP address
control information
destination MAC address

45. Refer
to the exhibit. Assume that the command output is from a wireless DHCP client that is
connected to a Linksys integrated router. What can be deduced from the output?
The DHCP configuration on the router needs to be verified.
The WEP key or SSID needs to be verified.
The wireless connection is operational.
The wireless NIC driver or the NIC itself needs to be reinstalled.
46. When acting as a DHCP server, an integrated router can provide what three types of information
to a client? (Choose three.)
physical address
MAC address
default gateway
static IP address
dynamic IP address
DNS server address

47. Which transport layer protocol is used when an application requires acknowledgment that data has been
delivered?
FTP
TCP
UDP
RTP
SMTP

48. What does the term "attenuation" mean in data communication?


loss of signal strength as distance increases
time for a signal to reach its destination
leakage of signals from one cable pair to another
strengthening of a signal by a networking device

49. A user is unable to send e-mail. While troubleshooting this problem, the network technician first verifies
the physical connectivity of cables. Which troubleshooting approach is being followed?
bottom-up
divide-and-conquer
top-down
trial and error

50. Referto the graphic. Assume that the exhibited output is from a host that is connected to a
Linksys integrated router. What is one of the first things you should check?
IP address on the host
IP address on the router
subnet mask on the host
default gateway on the host
link status LED on the front of the router
1. What is a function of the distribution layer in the hierarchical design model?
to provide latency free switching
to organize end devices in small manageable groups
to provide connectivity using the high-speed backbone
to provide connectivity between smaller local networks

2. Under what circumstance would it be appropriate to use private IP addresses?


for communication between two ISPs
for a network that is directly connected to the Internet
for addresses that are used exclusively within an organization.
for a host with more than one direct connection to the Internet

3. What two commands can be used to form a new binding if client information does not agree with
the DHCP client table? (Choose two.)
ipconfig /release
ipconfig /all
ipconfig /flushdns
ipconfig /renew
ipconfig

4. What type of computer would most likely use a docking station?


laptop
server
desktop
mainframe
workstation

5. For an IP address, what component decides the number of bits that is used to represent the host
ID?
default-gateway
host number
network number
subnet mask

6. What type of cable would be required to connect a Linksys router to a wired PC?
crossover cable
rollover cable
serial cable
straight-through cable

7. A network technician suspects that malware on a user PC is opening multiple TCP connections to
a specific foreign host address. Which Windows command line utility can be used to confirm the
multiple TCP connections?
ping
netstat
tracert
ipconfig
nslookup

8. A college network administrator is planning a wireless LAN to provide service in the student
lounge and outdoor patio. The requirements include a range of at least 80 meters and a speed of 30
Mb/s. Which wireless LAN standard meets these requirements?
802.11
802.11a
802.11b
802.11g
9. Which of the following statements best describes DNS?
DNS servers are used to map an IP address to a physical address.
DNS servers are used to map a name to an IP address.
DNS servers are used to configure logical address information for host computers.
DNS servers are used to translate from private addresses to public addresses.

10. A network administrator has been notified that users have experienced problems gaining access
to network resources. What utility could be used to directly query a name server for information on a
destination domain?
ping
tracert
netstat
ipconfig
nslookup

11. What is the purpose of pop-up blocker software?


It detects and removes spyware.
It detects and removes viruses.
It prevents the display of advertisement windows.
It removes unwanted e-mail.

12. What data communication technology uses low-power radio waves to transmit data?
copper cable
fiber optic cable
wireless
radio

13. What are two examples of peripheral input devices? (Choose two.)
external modem
barcode reader
digital camera
plotter
printer

14. Which portion of the packet does a router use to forward the packet to the destination?
source IP address
user data
destination IP address
control information
destination MAC address

15. Which two statements are true about local applications? (Choose two.)
They run on the network.
An example of a local application is e-mail.
They are accessed from a remote computer.
They are stored on the local hard disk.
They run on the computer where they are installed.

16. Which three address ranges can be used to depict private IP addresses? (Choose three.)
10.0.0.0 to 10.0.0.255
127.16.0.0 to 127.16.255.255
150.150.0.0 to 150.150.255.255
172.16.1.0 to 172.16.1.255
192.168.22.0 to 192.168.22.255
200.100.50.0 to 200.100.50.255
17. Because of an increasing number of users, bandwidth per user on a WLAN has decreased to a
point where users are complaining about poor performance. What can be done to improve the user
experience?
Increase the AP radio signal strength.
Place the AP in a more central location.
Deploy an external omni-directional antenna.
Reduce the number of devices using each channel.

18. How does a straight-through cable connect two unlike devices?


It connects the receive pins on the first device to the receive pins on the second device.
It connects the transmit pins on the first device to the receive pins on the second device.
It disconnects the transmit pins and uses only the receive pins.
It uses the same pins for transmitting and receiving.

19. TCP/IP data transmission between the source and destination host is encapsulated in four steps:
A. adds the data-link header and trailer;
B. converts data to bits for transmission;
C. adds the network IP address to the header of the packet;
D. segments the data for end-to-end transport.
What is the correct sequence of these steps?
A, B, C, D
A, D, B, C
B, D, A, C
D, C, A, B
D, C, B, A

20. When are leased lines typically used?


when low bandwidth is required
for home and small business connectivity
when a dedicated digital data line is necessary
as a less expensive option to cable and DSL modem service

21. What are two ways that a user can interact with an operating system shell? (Choose two.)
CLI
OS
GUI
NIC
kernel

22.Refer to the exhibit. H1 can ping H2, H3, and the Fa0/0 interface of router R1. H2 and H3 but not
H1 can ping H4 and H5. What is a possible cause for the H1 failure?
Router R1 has no route to the destination network.
Switch S1 does not have an IP address configured.
The link between router R1 and switch S2 has failed.
Host H1 does not have a default gateway configured.

23. After issuing the ipconfig/all command on a host that has DHCP enabled, a network
administrator notes that the output contains faulty IP configuration information. What is the first step
the administrator should take to resolve this issue?
Replace the NIC in the host.
Change the IP address of the DHCP server.
Use static addressing to assign the correct IP address.
Use the release and renew options supported by the ipconfig command.

24. When terminating a UTP cable, why is it important to push the wires all the way into the end of
the connector?
to allow the cable to endure more stretching or twisting
to ensure good electrical contact
to ensure that the wires are in correct order
to minimize crosstalk
25. Which network design layer provides a connection point for end user devices to the network?
access
core
distribution
network

26. All hosts within a domain receive the same frame that originates from one of the devices. The
domain is also bounded by routers. What type of domain is this?
broadcast
collision
local
multicast

27.Refer to the exhibit. An educational institution needs to connect PC systems that use private IP
addressing to the Internet. They have multiple systems that need to access the Internet, but were only
able to purchase one public IP address. What should be activated on the Linksys integrated router to
achieve this goal?
authentication
DHCP
encryption
firewall
NAT
WEP

28. Which three statements describe an IP address? (Choose three.)


An IP address is known as a logical address.
An IP address uses a 30-bit addressing scheme.
An IP address is found in the Layer 2 header during transmission.
The network portion of an IP address is burned into a network interface card.
An IP address is unique within the same local network.
The network portion of an IP address will be the same for all hosts that are connected to the same local network.

29. What is the purpose of creating a DMZ during network firewall implementation?
to create a server security zone accessible only to internal clients
to create a dirty zone that allows all inbound and outbound traffic
to allow for a publicly accessible zone without compromising the internal network
to specify a higher security level than normally required for the internal production network

30. Which two components are configured via software in order for a PC to participate in a network
environment? (Choose two.)
MAC address
IP address
kernel
shell
subnet mask

31. A home user is looking for an ISP connection that provides high speed digital transmission over
regular phone lines. What ISP connection type should be used?
DSL
dial-up
satellite
cell modem
cable modem

32.Refer to the exhibit. The security policy of an organization allows employees to connect to the
office intranet from their homes. Which type of security policy is this?
acceptable use
incident handling
network maintenance
remote access

33. In IP telephony, what is the purpose of a gateway to the PSTN?


to connect IP voice clients to Internet phone service
to create a peer-to-peer connection between two IP voice clients
to map unique names of IP voice endpoints to a client list on a voice server
to allow IP voice clients to communicate with regular analog telephones.

34. Which two causes of networking problems are related to the physical layer? (Choose two.)
damaged cables and connectors
incorrect addressing
incorrect subnet mask
overheated components
incorrect default gateway

35. Which device is often configured to act as both a DHCP client and a DHCP server?
home PC
ISP modem
wireless-enabled laptop
integrated services router

36. Which adapter card would be required for a PC to exchange information with other PCs on a
LAN?
NIC
video card
sound card
internal modem

37. Which protocol is used to transfer files among network devices and perform file-management
functions?
DNS
FTP
HTML
HTTP

38. What is true about a wireless access point that is equipped with an omnidirectional antenna?
concentrates signal in one direction
typically used in bridging applications
radiates the signal equally in all directions
provides the greatest transmission distance of all antenna types that are used by APs

39. What is a weakness of WEP that is solved by WPA?


WEP is a proprietary standard whereas WPA is an open standard.
WEP keys are only 64 bits long whereas WPA keys are 128 bits long.
WEP uses the same key for every connection whereas WPA uses a different key for each connection.
WEP uses a fixed length key for every connection whereas WPA uses a different key length for each connection.

40. Which statement is true concerning stateful packet inspection?


Access is permitted based on IP addresses of the source and destination devices.
Access is permitted based on the MAC addresses of the source and destination devices.
Access is permitted only if the type of application that is attempting to reach the internal host is allowed.
Access is permitted only if it is a legitimate response to a request from an internal host.

41. A home user was successfully browsing the Internet earlier in the day but is now unable to
connect. A ping command from a wireless laptop to a wired PC in the LAN is successful, but the
nslookup command fails to resolve a website address. The user decides to analyze the LEDs on the
Linksys router to verify connectivity. Which LED should be of main concern in this situation?
WLAN LED
power LED
Internet LED
1-4 Ethernet LEDs
42. Some new features are available for the OS that is currently running on a user’s PC. What
method should be chosen so that the user can install these new feature sets?
clean install
multi-boot
upgrade
virtualization

43. What does the term "attenuation" mean in data communication?


loss of signal strength as distance increases
time for a signal to reach its destination
leakage of signals from one cable pair to another
strengthening of a signal by a networking device

44. After attaching four PCs to the switch ports, configuring the SSID and setting authentication
properties for a small office network, a technician successfully tests the connectivity of all PCs that
are connected to the switch and WLAN. A firewall is then configured on the device prior to
connecting it to the Internet. What type of network device includes all of the described features?
switch
ISR router
firewall appliance
standalone wireless access point

45. Which two issues can cause connectivity problems on a wireless network? (Choose two.)
incorrect SSID
broadcast SSID
overlapping channels
low number of clients in BSS
802.11b clients attempting connection to 802.11g APs

46. A local PC has the correct configuration that is required to access the network. A ping command
that is sourced at the PC does not receive a response from a remote device. Which operating system
command might be used to determine where the connection failed?
netstat
tracert
ipconfig
nslookup

47. What is the default subnet mask for an IP address of 64.100.19.14?


255.0.0.0
255.255.0.0
255.255.255.0
255.255.255.255

48.Refer to the exhibit. A user on host A sends an e-mail to the user on host B. Which type of
message does host A send?
broadcast
multicast
simulcast
unicast

49.Refer to the graphic. Based on the information that is shown, what statement is true?
This configuration would be commonly found in an ad hoc wireless network.
Any wireless client that is attached to this access point would have the same IP address and SSID.
All wireless devices that are connected to this access point must have an assigned SSID of Academy.
In addition to accepting wireless client requests, this access point must connect to the wired network.
50. A network engineer wants to represent confidential data in binary format. What are the two
possible values that the engineer can use? (Choose two.)
0
1
2
A
F

51. For the TCP/IP model for internetwork communication, which statement describes the process
for the transition of data from the internet layer to the network access layer?
An IP packet is encapsulated in a frame.
A TCP segment is placed in an IP packet.
HTML data is encapsulated in a TCP segment.
A frame is placed on the network media as encoded bits.

52. What is a service pack?


an access policy
an agreement between a company and a vendor
a piece of code created to fix one specific problem
a collection of patches and updates released by a vendor
a small piece of software designed specifically for security issues
1. Bottom-up troubleshooting begins at which layer of the OSI model?
network layer
#physical layer
data link layer
transport layer
application layer

2. Which two statements are true about local applications? (Choose two.)
They run on the network.
An example of a local application is e-mail.
#They are accessed from a remote computer.
They are stored on the local hard disk.
#They run on the computer where they are installed.

3. Refer to the exhibit. What default gateway address will be assigned to PC1 if access to
remote resources is needed?
#192.31.7.3
192.168.1.101
192.168.1.253
A default gateway is not necessary.

4. Which attribute must be the same for wireless devices on one network to be able to
communicate with devices on a different network?
DNS server
MAC address
#default gateway
operating system
wireless equipment vendor

5.
How do ISPs obtain public IP addresses?
They create the addresses themselves.
They obtain the addresses from the home PCs.
They obtain the addresses from the Internet registry.
#They obtain the addresses from the RFC.

6.
Refer to the exhibit. The security policy of an organization allows employees to connect to the
office intranet from their homes. Which type of security policy is this?
acceptable use
incident handling
network maintenance
#remote access

7.
Which wireless component allows wireless clients to gain access to a wired network?
PDA
STA
access point
#wireless bridge

8.
Which network design layer provides a connection point for end user devices to the network?
access
core
distribution
#network
9. Which two transport layer protocols are used to transfer messages between hosts? (Choose
two.)
DHCP
FTP
SMTP
#TCP
#UDP

10. An administrator is troubleshooting a network problem that involves the inability of users
to reach Internet sites. During troubleshooting, the administrator is able to successfully ping
web sites by their IP address, but pings to domain names are unsuccessful. Which service is
most likely at fault?
DHCP
#DNS
FTP
NAT

11. Refer to the graphic. Assume that the command output is from a wireless DHCP client that
is connected to a Linksys integrated router. What can be deduced from the output?
#The wireless connection is good.
The WEP key or SSID needs to be checked.
The DHCP configuration on the router needs to be checked.
The wireless NIC driver or the NIC itself needs to be reinstalled.

12. A company has a web server that must be accessible to both external and internal clients.
Which security policy best practice should be followed to maximize security of the server?
Place the web server in a DMZ.
#Keep the web server on the external network.
Configure a firewall device to serve as the web server.
Locate the web server in the server farm of the internal network.

13. TCP/IP data transmission between the source and destination host is de-encapsulated in
four steps:
A. The TCP header is removed.
B. Bits are decoded and the destination MAC address is recognized.
C. The IP header is removed and the contents are passed to the next layer.
D. The Ethernet header and trailer are removed.

What is the correct sequence of these steps?


A, B, C, D
A, C, B, D
#B, C, D, A
B, D, C, A
C, A, B, D

14. A computer joins the network and announces itself to all hosts on the LAN. What type of
message does the computer send out?
#broadcast
simulcast
multicast
unicast

15. What are two ways that a user can interact with an operating system shell? (Choose two.)
#CLI
OS
#GUI
NIC
kernel
16. What are two examples of peripheral input devices? (Choose two.)
external modem
#barcode reader
#digital camera
plotter
printer

17. What are three examples of logical configuration information used when planning a
network implementation? (Choose three.)
#size of broadcast domains
naming scheme
length of cable runs
#IP addressing scheme
#physical device location
location of power outlets

18. Which wireless protocol is used for encryption?


EAP
Open
PSK
#WEP

19.
Which value represents the host portion of IP address 128.107.10.11 with a subnet mask of
255.255.0.0?
.10
#.10.11
128.107
.107.10.11
128.107.10

20. A home user is looking for an ISP connection that provides high speed digital transmission
over regular phone lines. What ISP connection type should be used?
#DSL
dial-up
satellite
cell modem
cable modem

21. What is the purpose of pop-up blocker software?


It detects and removes spyware.
It detects and removes viruses.
#It prevents the display of advertisement windows.
It removes unwanted e-mail.

22. What are two advantages of purchasing a custom-built computer? (Choose two.)
usually a lower cost
no waiting period for assembly
#user can specify higher performance components
#supports higher-end graphics and gaming applications
fewer components to replace

23. Refer to the exhibit. PC1 is unable to access the web server at 209.165.200.226/27. Based on
the provided output, what is the most likely cause of the problem?
PC1 is not plugged in to RTR1.
Port 80 is already in use on PC1.
No DNS server is configured on PC1.
#PC1 is configured with an incorrect IP address and default gateway.
24. What is the name for the contract between a customer and an ISP that specifies
requirements for uptime and service response time?
DSL
IAB
NAP
#SLA

25. Which term is associated with logical addressing?


#IP addresses
port addresses
physical addresses
Media Access Control addresses

26. Which Windows PC command line utility can be used to discover the path that a packet
takes to reach a destination?
ping
netstat
#tracert
nslookup
ipconfig

27. Which statement accurately describes what network devices do in the distribution layer of
the three layer design model?
They interconnect individual hosts.
They interconnect multiple companies.
#They interconnect local network segments.
They interconnect the company network to the ISP.

28. Select three statements that correctly describe how DHCP services may be provided.
(Choose three.)
An integrated router provides IP configurations for most ISPs.
#An integrated router can act as both DHCP server and DHCP client.
A home PC using a static IP address obtained that address from a DHCP server.
#Most home network integrated routers receive an IP configuration directly from their ISP.
#A variety of devices can act as DHCP servers, as long as they run DHCP service software.
A home PC that is unable to find a DHCP server defaults to the static IP address of 192.168.1.1.

29. Which two causes of networking problems are related to the physical layer? (Choose two.)
#disconnected cables
#improper operation of cooling fans
incorrect MAC address
incorrect default gateway
incorrect subnet mask

30. Which installation option should be chosen when the current operating system is too
damaged to work properly?
upgrade
multi-boot
#clean install
virtualization

31. What is an ISP?


It is a standards body that develops cabling and wiring standards for networking.
It is a protocol that establishes how computers within a local network communicate.
#It is an organization that enables individuals and businesses to connect to the Internet.
It is a networking device that combines the functionality of several different networking devices in one.
32. What two pieces of information should a help desk technician document while
troubleshooting connectivity issues with an end user? (Choose two.)
the CPU clock speed of the computer
the number of network jacks that are in the room
#if the user can ping the default gateway address
if the word processing software is installed correctly
#whether the PC uses dynamic or static IP addressing

33. Refer to the graphic. What feature can be installed on the Linksys integrated router to
convert private IP addresses to Internet-routable addresses?
authentication
DHCP
encryption
firewall
#NAT
WEP

34. After attaching four PCs to the switch ports, configuring the SSID and setting
authentication properties for a small office network, a technician successfully tests the
connectivity of all PCs that are connected to the switch and WLAN. A firewall is then
configured on the device prior to connecting it to the Internet. What type of network device
includes all of the described features?
switch
ISR router
#firewall appliance
standalone wireless access point

35. For the second time in a week, workstations on a LAN are not able to log into the server.
The technician fixed the problem the first time, but cannot remember the steps taken to solve
it. What aspect of the troubleshooting process has the technician neglected?
identifying the problem
asking end-users questions
#documenting the troubleshooting process
using structured techniques to solve a problem

36. What is the default subnet mask for an IP address of 64.100.19.14?


#255.0.0.0
255.255.0.0
255.255.255.0
255.255.255.255

37. How does a crossover cable make it possible for two "like devices" (for example, two
switches) to communicate?
The transmit pins are disconnected and only the receive pins are used.
The transmit pins on one device are connected to the transmit pins on the other device.
The receive pins on one device are connected to the receive pins on the other device.
#The transmit pins on one device are connected to the receive pins on the other device.

38. What will be one result of using a wireless infrastructure when designing the
communications infrastructure for a new building?
#Wireless devices will be easy to add or relocate.
Infrastructure installation will be difficult and expensive.
There will be less interference from outside electronic sources.
Data transmitted over wireless networks will be more secure than when transmitted over wired networks.

39. What does the term "attenuation" mean in data communication?


#loss of signal strength as distance increases
time for a signal to reach its destination
leakage of signals from one cable pair to another
strengthening of a signal by a networking device
40. Which type of computer has an integrated mouse?
desktop
#laptop
mainframe
server
pocket PC

41. Which Windows command is used to display the configured IP address, subnet mask, and default
gateway?
#ipconfig
netstat
nslookup
tracert

42. What must be identical on all devices in a WLAN for successful wireless communication
between the devices?
#SSID
antenna type
network mode
wireless NIC driver

43. For devices that do not autosense, which connection requires a crossover cable?
hub port to router port
PC to hub port
PC to switch port
#PC port to PC port

44. Refer to the exhibit. A user on Host1 requests a web page from the web server. Which
diagram is accurate for the encapsulation of the traffic that is sent from the user to the web
server?

45. What describes the external IP address that is obtained by a router through a cable or DSL
modem?
a public address that is obtained from ICANN
a private address that is manually configured by the administrator
#a public address that is obtained through DHCP from the ISP
a private address that converts to a public address on the internal LAN

46. Which two components are configured via software in order for a PC to participate in a
network environment? (Choose two.)
MAC address
#IP address
kernel
shell
#subnet mask

47. What destination IP address is used in a unicast packet?


#a specific host
a group of hosts
all hosts on the network
the network broadcast address

48. Which part of the electromagnetic spectrum is commonly used to exchange data between a
PDA and a computer?
FM
radar
#infrared
ultraviolet
49. What two commands can be used to form a new binding if client information does not agree
with the DHCP client table? (Choose two.)
#ipconfig /release
ipconfig /all
ipconfig /flushdns
#ipconfig /renew
ipconfig

50. What are the two possible values for a digital bit? (Choose two.)
#0
#1
A
F
#
9

51. Which picture shows a USB port on a PC?

52. What is the purpose of a router?


#to forward broadcasts to all interfaces so that all hosts receive them
to maintain a table of individual host addresses
to select the best path to reach remote networks
to physically connect multiple hosts that belong to the same network
1. Which three statements are true about local and network applications? (Choose three.)
A local application is loaded in a local computer and can be accessed by a remote computer on the network.
**A network application is loaded in a local computer and accessed from a remote computer.
**A local application is loaded in a local computer and accessed only by the local computer.
A network application is loaded in a local computer and accessed only by the local computer.
An example of a local application is e-mail.
**An example of a network application is instant messaging.

2. A wireless DHCP client cannot connect to the Internet through a Linksys integrated router. When
you type ipconfig on the host, no IP address, subnet mask, or default gateway shows. What are two
of the first things you will check? (Choose two.)
**SSID
**if the wireless client is configured for DHCP
the cable between client and integrated router
the firewall configuration on the integrated router
if the correct default gateway is configured on the client
if the correct default gateway is configured on the integrated router

3. Refer to the graphic. Assume that the command


output is from a wireless DHCP client that is
connected to a Linksys integrated router. What can be
deduced from the output?
**The wireless connection is good.
The WEP key or SSID needs to be checked.
The DHCP configuration on the router needs to be checked.
The wireless NIC driver or the NIC itself needs to be reinstalled.

4. What measurement is commonly used to describe communication speed when transferring


data?
**bps
cps
Hz
MB

5. What is an accurate description of network devices in the distribution layer?


They are designed to interconnect individual hosts.
They are designed to interconnect multiple companies.
**They are designed to interconnect local network segments.
They are designed to switch data packets as fast as possible.

6. When acting as a DHCP server, an integrated router can provide what three types of
information to a client? (Choose three.)
physical address
MAC address
**default gateway
static IP address
**dynamic IP address
**DNS server address

7. Where do ISPs get the public addresses that they assign to end users?
ISPs create the addresses themselves.
ISPs are assigned addresses through the RFC.
ISPs obtain their addresses automatically.
**ISPs obtain address blocks from registry organizations.
8. Refer to the graphic. What is the effect of setting
the security mode to WEP on the Linksys integrated
router?
It identifies the wireless LAN.
It allows the access point to inform clients of its presence.
It translates IP addresses into easy-to-remember domain
names.
**It encrypts data between the wireless client and the access point.
It ensures that only authorized users are allowed access to the WLAN.
It translates an internal address or group of addresses into an outside, public address.

9. When are leased lines typically used?


when low bandwidth is required
for home and small business connectivity
**when a dedicated digital data line is necessary
as a less expensive option to cable and DSL modem service

10. Which wireless protocol is used for encryption?


EAP
Open
PSK
**WEP

11. The area covered by a single AP is known as what?


**ad-hoc network
basic service set
independent basic service set
extended service set
distribution system

12. Which installation option should be chosen when the current operating system is too
damaged to work properly?
upgrade
multi-boot
**clean install
virtualization

13. What layer is the first point of entry for a host into the network?
core layer
**access layer
network layer
distribution layer

14. What two commands can be used to form a new binding if client information does not agree
with the DHCP client table? (Choose two.)
**ipconfig /release
ipconfig /all
ipconfig /flushdns
**ipconfig /renew
ipconfig

15. What are two advantages of purchasing a custom-built computer? (Choose two.)
**usually a lower cost
no waiting period for assembly
**user can specify higher performance components
supports higher-end graphics and gaming applications
fewer components to replace
16. What information within a data packet does a router use, by default, to make forwarding
decisions?
**the destination MAC address
the destination IP address
the destination host name
the destination service requested

17. What is a service pack?


an access policy
an agreement between a company and a vendor
a piece of code created to fix one specific problem
**a collection of patches and updates released by a vendor
a small piece of software designed specifically for security issues

18. What is an ISP?


It is a standards body that develops cabling and wiring standards for networking.
It is a protocol that establishes how computers within a local network communicate.
**It is an organization that allows individuals and businesses to connect to the Internet.
It is a networking device that combines the functionality of several different networking devices in one.

19. Which two statements correctly describe Media Access Control (MAC) addresses? (Choose
two.)
**MAC addresses are used to identify a specific NIC.
**MAC addresses are physical addresses.
MAC addresses contain a network number and unique host identification.
MAC addresses are always assigned to network devices by a network administrator.
MAC addresses can be dynamically assigned.

20. What is the name for the contract between a customer and an ISP that specifies requirements
for uptime and service response time?
DSL
IAB
NAP
**SLA

21. What are two ways that a user can interact with an operating system shell? (Choose two.)
**CLI
OS
**GUI
NIC
kernel

22. Select the connection that would require a straight-through cable.


a switch to a hub
**a router to a switch
a switch to a switch
a router to a router

23. Choose the option that shows the correct sequence of steps in the encapsulation of TCP/IP
data that is passed from a source to a destination host?
A. converts data to bits for transmission
B. packages the data for end to end transport
C. adds the data-link header and trailer
D. adds the network IP address to the header of the frame
A,B,C,D
A,C,D,B
B,D,C,A
B,C,D,A
**D,C,B,A
24. What is specified by the network number in an IP address?
**the network to which the host belongs
the physical identity of the computer on the network
the node of the subnetwork which is being addressed
the broadcast identity of subnetwork

25. Refer to the graphic. What is the purpose


of assigning a Network Name of Academy?
**It identifies the wireless LAN.
It translates IP addresses into easy-to-remember domain
names.
It encrypts data between the wireless client and the
access point.
It allows access to the AP configuration GUI by name
rather than address.
It translates an internal address or group of addresses into an outside, public address .

26. Which of the following statements best describes DNS?


DNS servers are used to map an IP address to a physical address.
**DNS servers are used to map a name to an IP address.
DNS servers are used to configure logical address information for host computers.
DNS servers are used to translate from private addresses to public addresses.

27. Which of the following are the address ranges of the private IP addresses? (Choose three.)
**10.0.0.0 to 10.255.255.255
200.100.50.0 to 200.100.25.255
150.150.0.0 to 150.150.255.255
**172.16.0.0 to 172.31.255.255
**192.168.0.0 to 192.168.255.255
127.16.0.0 to 127.31.255.255

28. Which protocol is used to transfer files among network devices and perform file-management
functions?
DNS
**FTP
HTML
HTTP

29. Select three statements that correctly describe how DHCP services may be provided. (Choose
three.)
An integrated router provides IP configurations for most ISPs.
An integrated router can act as both DHCP server and DHCP client.
A home PC using a static IP address obtained that address from a DHCP server.
**Most home network integrated routers receive an IP configuration directly from their ISP.
**A variety of devices can act as DHCP servers, as long as they run DHCP service software.
A home PC is required by standards to obtain an IP address and default gateway from a DHCP server (usually the
ISP).

30. Refer to the graphic. Based on the information


that is shown, what statement is true?
This configuration would be commonly found in an ad hoc
wireless network.
Any wireless client that is attached to this access point would
have the same IP address and SSID.
**All wireless devices that are connected to this access point
must have an assigned SSID of Academy.
In addition to accepting wireless client requests, this access point must connect to the wired network.
31. Identify two causes of physical layer network problems. (Choose two.)
logical addressing issues
**improperly terminated cables
**cables plugged into wrong ports
incorrect MAC address assigned
packets received out of sequence
incorrect subnet mask on an interface

32. Which part of the electromagnetic spectrum is commonly used to exchange data between a PDA
and a computer?
FM
radar
**infrared
ultraviolet

33. Which of the following are transport layer protocols of the TCP/IP model? (Choose two.)
FTP
**UDP
SMTP
TFTP
**TCP

34. For the second time in a week, workstations on a LAN are not able to log into the server. The
technician fixed the problem the first time, but cannot remember the steps taken to solve it. What
aspect of the troubleshooting process has the technician neglected?
identifying the problem
asking end-users questions
**documenting the troubleshooting process
using structured techniques to solve a problem

35. What action will a router take when it receives a frame with a broadcast MAC address?
It will not forward the frame to another network.
It forwards the frame back to the sending host with its IP address as a response.
**It forwards the frame out of all interfaces except the interface where the frame was received.
It forwards the frame back out the receiving interface to insure all hosts on the local network receive it.

36. A network host is accessing a web server. What two protocols are most likely being used as the
TCP/IP model application layer protocol and the internetwork layer protocol? (Choose two.)
IP
FTP
**TCP
DHCP
**HTTP

37. Which statement is true concerning stateful packet inspection?


Access is permitted based on IP addresses of the source and destination devices.
Access is permitted based on the MAC addresses of the source and destination devices.
Access is permitted only if the type of application that is attempting to reach the internal host is allowed.
**Access is permitted only if it is a legitimate response to a request from an internal host.

38.What does the term "attenuation" mean in data communication?


**loss of signal strength as distance increases
time for a signal to reach its destination
leakage of signals from one cable pair to another
strengthening of a signal by a networking device

39.What is the default subnet mask for a class B address?


255.0.0.0
**255.255.0.0
255.255.255.0
255.255.255.255

40. Refer to the graphic. Based on the


configuration information that is shown, which
three types of 802.11 networks are allowed
access to the WLAN? (Choose three.)
802.11a
**802.11b
802.11e
**802.11g
**802.11n
802.11x

41. Within a local network, which two items must be unique on a computer for it to successfully
connect to the network? (Choose two.)
**IP address
subnet mask
**computer name
default gateway address
operating system version

42. When considering the purchase of a new operating system, what is meant by "Total Cost of
Ownership?"
applications and support costs
hardware and support costs
hardware and software costs
**hardware, software, and support costs
hardware, operating system, and applications costs

43. A computer joins the network and announces itself to all hosts on the LAN. What type of
message does the computer send out?
**broadcast
simulcast
multicast
unicast

44. Refer to the graphic. What feature can be


installed on the Linksys integrated router to convert
private IP addresses to Internet-routable addresses?
authentication
DHCP
encryption
firewall
**NAT
WEP

45. When terminating UTP cabling, why is it important to untwist only a small amount of each wire
pair?
**minimizes crosstalk
makes installation faster
ensures wires are in correct order
makes it easier to fit wires into connector

46. A host sent a message that all other hosts on the local network received and processed. What type
of domain are all these hosts a part of?
local domain
multicast domain
collision domain
**broadcast domain

47. Your school network blocks all websites related to online gaming. What type of security policy is
being applied?
identification and authentication
remote access
**acceptable use
incident handling

48.Refer to the graphic. Assume that the exhibited


output is from a host that is connected to a Linksys
integrated router. What is one of the first things you
should check?
IP address on the host
IP address on the router
subnet mask on the host
default gateway on the host
**link status LED on the front of the router

49. How does a crossover cable make it possible for two "like devices" (for example, two switches)
to communicate?
The transmit pins are disconnected and only the receive pins are used.
The transmit pins on one device are connected to the transmit pins on the other device.
The receive pins on one device are connected to the receive pins on the other device.
**The transmit pins on one device are connected to the receive pins on the other device.

50.What are two examples of storage peripheral devices? (Choose two.)


printer
**flash drive
headphones
**external DVD
barcode reader

51. What are the two possible values for a digital bit? (Choose two.)
**0
**1
A
F
#
9

52. What type of computer would most likely use a docking station?
**laptop
server
desktop
mainframe
workstation

Potrebbero piacerti anche