You are on page 1of 10

1

As an assignment, a computer science student needs to present data in binary


format. What are the two possible values that the student can use? (Choose two.)
0
1
2
A
F

Refer to the exhibit. What is the effect of setting the security mode to WEP on the
Linksys integrated router?
The WEP security mode enables the AP to inform clients of its presence.
The WEP security mode encrypts network traffic during transmission between the
AP and the wireless client.
The WEP security mode generates a dynamic key each time a client establishes a
connection with the AP.
The WEP security mode identifies the WLAN.

3
Which two statements correctly describe MAC addresses? (Choose two.)
MAC addresses are used to identify a specific NIC.
MAC addresses contain a network number and unique host identification.
MAC addresses are physical addresses.
MAC addresses are always assigned to network devices by a network administrator.
MAC addresses are Layer 3 addresses.

4
What are two examples of peripheral input devices? (Choose two.)
external modem
barcode reader
digital camera
plotter
printer

5
Which protocol is used by a client to retrieve an e-mail from a remote server using a
TCP/IP connection?
DNS
FTP
POP
HTTP

6
Which two statements are true about network applications? (Choose two.)
Microsoft Word is an example of a network application.
Network applications are accessible from a remote computer.
Network applications are installed on a special type of computer that supports only
network applications.
Network applications are installed on a network server.
Network applications are accessible by one computer at a time.

Refer to the exhibit. What cabling fault does the exhibit represent?
open
reversed pair
short
split pair

Refer to the exhibit. A new switch is connected to an existing switch that has a fully
populated MAC table. PC1 requires the destination MAC address of PC3 in order to
send a message. Which device or devices will see the ARP sent by PC1?
only PC3
PC2 and PC3
PC3 and PC4
PC2, PC3 and PC4

9
The area covered by a single AP is known as what?
ad-hoc network
basic service set
independent basic service set
extended service set
distribution system

10
A small company owns one older AP that provides a maximum data rate of 11 Mb/s.
The company wants to add a newer AP that will provide a faster data rate but be
compatible with the existing AP. What two wireless standards are referenced in this
scenario? (Choose two.)
802.11
802.11a
802.11b
802.11d
802.11g

11
Where do ISPs get the public addresses that they assign to end users?
ISPs create the addresses themselves.
ISPs are assigned addresses through the RFC.
ISPs obtain their addresses automatically.
ISPs obtain address blocks from registry organizations.

12

Refer to the exhibit. PC1 sends a data packet to PC4. When the router forwards the
data out Fa0/1, what destination MAC address will the router place in the frame?
0050.0FA9.CB47
0050.E208.A761
0200.5455.4E01
0200.545D.25F7

13
What is an advantage of selecting an operating system that has a commercial
license over one with a GPL license?
The commercial license-based operating system ensures full access to the source
code for everyone.
The commercial license-based operating system ensures that everyone can
participate in the enhancement of the product.
The commercial license-based operating system provides structured support.
The commercial license-based operating system is released free of charge.

14
A user is unable to send e-mail. To begin troubleshooting this problem, the network
technician uses the browser on the PC and tries to access some popular Internet
websites. Which troubleshooting approach is being followed?
bottom-up
divide-and-conquer
top-down
trial and error

15
A network technician is required to provide access to the Internet for a large
company. What is needed to accomplish this task?
ISP
private IP addresses for each host
static IP addresses for each host
DHCP server

16
Refer to the exhibit. Host A sends a message to a group of four computers out of the
ten computers on this network. Which type of message does host A send?
broadcast
multicast
simulcast
unicast

17
What are two advantages of purchasing a preassembled computer? (Choose two.)
The cost is comparatively lower1 `.
High-performance graphics and gaming applications are supported.
There is a negligible waiting period for assembly.
This type of computer is useful for knowledgeable consumers with special needs.
The user can specify high-performance components.

18
Which protocol is used by a client to browse the web server?
FTP
HTTP
POP
SMTP

19
Which three address ranges can be used to depict private IP addresses? (Choose
three.)
10.0.0.0 to 10.0.0.255
127.16.0.0 to 127.16.255.255
150.150.0.0 to 150.150.255.255
172.16.1.0 to 172.16.1.255
192.168.22.0 to 192.168.22.255
200.100.50.0 to 200.100.50.255

20
TCP/IP data transmission between the source and destination host is de-
encapsulated in four steps:

A. The TCP header is removed.


B. Bits are decoded and the destination MAC address is recognized.
C. The IP header is removed and the contents are passed to the next layer.
D. The Ethernet header and trailer are removed.

What is the correct sequence of these steps?


A, B, C, D
A, C, B, D
B, C, D, A
B, D, C, A
C, A, B, D

21
Which two causes of networking problems are related to the physical layer? (Choose
two.)
disconnected cables
improper operation of cooling fans
incorrect MAC address
incorrect default gateway
incorrect subnet mask

22
For an IP address, what component decides the number of bits that is used to
represent the host ID?
default-gateway
host number
network number
subnet mask

23
All hosts within a domain receive the same frame that originates from one of the
devices. The domain is also bounded by routers. What type of domain is this?
broadcast
collision
local
multicast

24
What is the purpose of pop-up blocker software?
It detects and removes spyware.
It detects and removes viruses.
It prevents the display of advertisement windows.
It removes unwanted e-mail.

25
What is the purpose of spam filter software?
It detects and removes spyware.
It detects and removes viruses.
It prevents the display of advertisement windows.
It examines incoming e-mail messages to identify the unsolicited ones.

26
What is the function of the DNS server?
It maps the IP address to the MAC address.
It translates a computer or domain name to the associated IP address.
It manages the domain that clients are assigned to.
It accepts HTTP requests from clients.

27
Your school network blocks all websites related to online gaming. What type of
security policy is being applied?
identification and authentication
remote access
acceptable use
incident handling

28
What is an advantage of purchasing a custom-built computer?
It is beneficial for less knowledgeable consumers.
The waiting period for assembly is negligible.
The cost is lower compared to a computer that has been preassembled.
The user can specify high-performance components to meet specific needs.

29
Which statement accurately describes what network devices do in the distribution
layer of the three layer design model?
They interconnect individual hosts.
They interconnect multiple companies.
They interconnect local network segments.
They interconnect the company network to the ISP.

30

Refer to the exhibit. Assume that the exhibited output is from a host that is
connected to a Linksys integrated router. What is the first thing that should be
checked while using a bottom-up troubleshooting approach?
the default gateway on the host
the IP address on the host
the IP address on the router
the link status LED on the front of the router
the subnet mask on the

31
Which statement is true about packet filtering?
It recognizes and filters specific types of attacks.
It permits access based on IP address.
It is performed from a host network device.
It translates an internal address or group of addresses into a public address that is
sent across the network.

32
Which part of the electromagnetic spectrum is commonly used by wireless LANs?
Bluetooth
infrared
Industrial Scientific and Medical (ISM)
radio frequency (RF)

33
What is the most common reason that ISPs provide symmetrical transfer services?
to address data transfer needs of home users
to download significantly more than upload
to host servers on the Internet
to work with applications that require less bandwidth

34
What is the default subnet mask for the IP address 128.107.23.10?
255.0.0.0
255.255.0.0
255.255.255.0
255.255.255.255

35
Which type of computer uses an integrated monitor and keyboard?
pocket PC
laptop
mainframe
server
workstation

36
A learner wants to interact with the operating system of a computer. Which two
methods can be used for this? (Choose two.)
CLI
GUI
kernel
third party software
shell

37
Select the connection that would require a straight-through cable.
a switch to a hub
a router to a switch
a switch to a switch
a router to a router

38
How does a crossover cable connect two routers?
It connects the pins that are used for receiving on one router to the pins that are
used for receiving on the other router.
It connects the pins that are used for transmitting on one router to the pins that are
used for receiving on the other router.
It disconnects the transmit pins and uses only the receive pins.
It uses the same pins for transmitting and receiving.

39
Within a local network, which two items must be unique on a computer for it to
successfully connect to the network? (Choose two.)
IP address
subnet mask
computer name
default gateway address
operating system version

40
What data communication technology uses low-power radio waves to transmit data?
copper cable
fiber optic cable
wireless
radio

41

Refer to the exhibit. A wireless DHCP client is unable to access the web server.
Given the output that is shown in the exhibit, what two things should the network
technician verify first to troubleshoot this problem? (Choose two.)
the wireless client configuration for DHCP
the default gateway
the firewall configuration
the SSID
the physical connectivity between the server and the client

42
What is the purpose of the ipconfig /release command?
It forces a client to give up its current IP address.
It forces a client to give up its current MAC address.
It forces the client to clear all the MAC address to IP address associations it has
learned.
It shows the current IP configuration on the client.

43
Which two statements are characteristics of DHCP services? (Choose two.)
A DHCP client determines the lease time for using the IP address that is supplied by
the DHCP server.
An integrated router acts as the DHCP server to provide the IP address to the ISP.
DHCP clients send a DHCP Discover message to the destination IP address of
255.255.255.255.
The DHCP server maps the IP addresses to host names.
The integrated router acts as a DHCP server for internal hosts on local networks.

44
What layer is the first point of entry for a host into the network?
core layer
access layer
network layer
distribution layer

45
When is the use of a DSL modem necessary?
when a cellular telephone provides the service
when a high-speed connection is provided over a cable TV network
when a high-speed digital connection is required over the regular telephone line
when a satellite dish is used
46

Refer to the graphic. What feature can be installed on the Linksys integrated router to convert
private IP addresses to Internet-routable addresses?
authentication
DHCP
encryption
firewall
NAT
WEP

47
Which installation option should be chosen when the current operating system is too damaged to
work properly?
upgrade
multi-boot
clean install
virtualization

48
Refer to the exhibit. Which statement is true based on the information that is shown in the
exhibit?
All wireless devices that are connected to this AP must have an assigned SSID of University.
Any wireless client that is attached to this AP must have the same IP address and SSID.
The AP is not physically wired to the local LAN.
This configuration is found only in an ad hoc wireless network.

49
Which of the following are transport layer protocols of the TCP/IP model? (Choose two.)
FTP
UDP
SMTP
TFTP
TCP

50
Which statement is true about UTP cable termination?
Cables with RJ-45 connectors are always preterminated.
An RJ-45 connector is used on only one end of the UTP cable.
Up to 2 to 3 inches of cable may be untwisted at each end of the cable to allow for easier
installation of the RJ-45 connector.
The RJ-45 connector should be pushed over the wire jacket for a smooth connection.

51
What is the meaning of the term crosstalk?
interference of signals between wire pairs
loss of signal strength as distance increases
damage of the signal when two bare wires touch
strengthening of a signal by a networking device

52
What information within a data packet does a router use, by default, to make forwarding
decisions?
the destination MAC address
the destination IP address
the destination host name
the destination service requested

Showing 4 of 4 Next> Page: GO <Prev

All content copyright 1992-2008 Cisco Systems, Inc. Privacy Statement and Trademarks

You might also like