You are on page 1of 18

1

Top of Form

What are two examples of storage peripheral devices? (Choose two.) printer flash drive headphones external DVD barcode reader
Bottom of Form

Top of Form

Why would a corporate web server be assigned a public IP address instead of a private IP address? The public address can be acquired at no cost. The public address can be routed on the Internet. The public address provides a security advantage.

The same public address can be used on multiple servers to prevent depletion of available IP addresse
Bottom of Form

Top of Form

Refer to the exhibit. What default gateway address will be assigned to PC1 if access to remote resources i needed?

192.31.7.3 192.168.1.101 192.168.1.253 A default gateway is not necessary.


Bottom of Form

Top of Form

What is a service pack? an access policy an agreement between a company and a vendor a piece of code created to fix one specific problem a collection of patches and updates released by a vendor a small piece of software designed specifically for security issues
Bottom of Form

Top of Form

Your school network blocks all websites related to online gaming. What type of security policy is being a identification and authentication remote access acceptable use incident handling
Bottom of Form

Top of Form

Refer to the graphic. Assume that the exhibited output is from a host that is connected to a Linksys integr router. What is one of the first things you should check? IP address on the host IP address on the router subnet mask on the host default gateway on the host link status LED on the front of the router
Bottom of Form

Top of Form

What procedure will help prevent users from detecting a wireless network? Enable WEP. Enable MAC filtering. Disable SSID broadcasts. Change the default administrator password on the AP.
Bottom of Form

Top of Form

A user is unable to send e-mail. While troubleshooting this problem, the network technician first verifies physical connectivity of cables. Which troubleshooting approach is being followed? bottom-up divide-and-conquer top-down trial and error
Bottom of Form

Top of Form

When terminating a UTP cable, why is it important to push the wires all the way into the end of the conne to allow the cable to endure more stretching or twisting to ensure good electrical contact to ensure that the wires are in correct order to minimize crosstalk
Bottom of Form

10

Top of Form

Which part of a data packet is used by a router to determine the destination network? source IP address user data destination IP address control information destination MAC address
Bottom of Form

11

Top of Form

What are the two possible values for a digital bit? (Choose two.) 0 1 A F # 9
Bottom of Form

12

Top of Form

Which three statements are true about local and network applications? (Choose three.)

A local application is loaded in a local computer and can be accessed by a remote computer on the ne A network application is loaded in a local computer and accessed from a remote computer.

A local application is loaded in a local computer and accessed only by the local computer. A network application is loaded in a local computer and accessed only by the local computer. An example of a local application is e-mail. An example of a network application is instant messaging.
Bottom of Form

13

Top of Form

What is the function of CSMA/CA on a wireless Ethernet network? to prevent collisions to broadcast messages to select the least congested channel to establish an ACK between devices
Bottom of Form

14

Top of Form

A network designer is working with a small company to determine the network type best suited to the nee the company. Which two characteristics could the designer use to describe a peer-to-peer network to the o of the company? (Choose two.) central administration easy to install low cost scalable secure
Bottom of Form

15

Top of Form

The help desk at a large packaging company receives a call from a user who is concerned about lost data the local PC. The help desk technician learns that the user clicked on an icon that appeared to be a progra update, but no updates were scheduled for that program. What type of attack has likely occurred? worm DDoS brute force Trojan horse

Bottom of Form

16

Top of Form

Which two transport layer protocols enable hosts to communicate and transfer data? (Choose two.) DHCP ICMP IP TCP UDP
Bottom of Form

17

Top of Form

Which of the following are the address ranges of the private IP addresses? (Choose three.) 10.0.0.0 to 10.255.255.255 200.100.50.0 to 200.100.25.255 150.150.0.0 to 150.150.255.255 172.16.0.0 to 172.31.255.255 192.168.0.0 to 192.168.255.255 127.16.0.0 to 127.31.255.255
Bottom of Form

18

Top of Form

A home user is looking for an ISP connection that provides high speed digital transmission over regular p lines. What ISP connection type should be used? DSL dial-up satellite cell modem cable modem
Bottom of Form

19

Top of Form

Which two IP configuration components does the computer use to identify its subnetwork? (Choose two.)

default gateway IP address MAC address DNS server address subnet mask
Bottom of Form

20

Top of Form

20

Refer to the exhibit. Assume that the command output is from a wireless DHCP client that is connected to Linksys integrated router. What can be deduced from the output? The DHCP configuration on the router needs to be verified. The WEP key or SSID needs to be verified. The wireless connection is operational. The wireless NIC driver or the NIC itself needs to be reinstalled.
Bottom of Form

21

Top of Form

What does the term "attenuation" mean in data communication? loss of signal strength as distance increases time for a signal to reach its destination

leakage of signals from one cable pair to another strengthening of a signal by a networking device
Bottom of Form

22

Top of Form

All hosts within a domain receive the same frame that originates from one of the devices. The domain is a bounded by routers. What type of domain is this? broadcast collision local multicast
Bottom of Form

23

Top of Form

Refer to the exhibit. A network technician is statically assigning an IP address to a PC. The default gatew correct. What would be a valid IP address to assign to the host? 128.106.10.100

128.107.255.1 128.107.255.254 128.108.100.10


Bottom of Form

24

Top of Form

Refer to the exhibit. A user sets up a home network and uses a crossover cable from Switch1 to the Intern on the ISR. However, there is no connection between the host H1 and the server. What should the user do order to establish a connection? Replace the cable with a console cable. Replace the cable with a rollover cable. Replace the failed crossover cable with a working crossover cable. Replace the cable with a straight-through cable.
Bottom of Form

25

Top of Form

Refer to the exhibit. Host A sends a message to a group of four computers out of the ten computers on thi network. Which type of message does host A send? broadcast multicast simulcast unicast
Bottom of Form

26

Top of Form

What is a major characteristic of asymmetric Internet service? Download speeds and upload speeds are equal. Download speeds are faster than upload speeds. Data traffic speeds are faster than voice traffic speeds. Used when consistently uploading large amounts of graphics, video and multimedia traffic.
Bottom of Form

27

Top of Form

Which type of attack involves flooding a server port with SYN messages? phishing brute force denial of service data manipulation

Bottom of Form

28

Top of Form

Refer to the graphic. What feature can be installed on the Linksys integrated router to convert private IP addresses to Internet-routable addresses? authentication DHCP encryption firewall NAT WEP
Bottom of Form

29

Top of Form

Refer to the exhibit. Why would a network administrator use the network mode that is shown? to support hosts on different IP networks to support hosts that use different 802.11 standards to support both wireless and wired Ethernet hosts to support hosts with different operating systems to support hosts with network cards from different manufacturers
Bottom of Form

30

Top of Form

When terminating UTP cabling, why is it important to untwist only a small amount of each wire pair? minimizes crosstalk makes installation faster ensures wires are in correct order makes it easier to fit wires into connector
Bottom of Form

36

Top of Form

Which protocol is used by a client to retrieve an e-mail from a remote server using a TCP/IP connection?

DNS FTP POP HTTP


Bottom of Form

37

Top of Form

What is the meaning of the term crosstalk? interference of signals between wire pairs loss of signal strength as distance increases damage of the signal when two bare wires touch strengthening of a signal by a networking device
Bottom of Form

38

Top of Form

What is the default subnet mask for the IP address 128.107.23.10? 255.0.0.0 255.255.0.0 255.255.255.0 255.255.255.255
Bottom of Form

39

Top of Form

What is the function of the DNS server? It maps the IP address to the MAC address. It translates a computer or domain name to the associated IP address. It manages the domain that clients are assigned to. It accepts HTTP requests from clients.
Bottom of Form

40

Top of Form

What layer is the first point of entry for a host into the network? core layer

access layer network layer distribution layer 41


Bottom of Form Top of Form

Refer to the exhibit. What is the purpose of assigning a network name of College? It enables access to the AP configuration GUI by name rather than by address. It encrypts data between the wireless client and the AP. It identifies the wireless LAN. It translates an internal address or group of addresses to a public address. It translates IP addresses into easy-to-remember domain names.
Bottom of Form

42

Top of Form

What is the maximum number of bytes that is allowed in a standard IEEE 802.3 Ethernet frame? 64 1024 1518 4096
Bottom of Form

43

Top of Form

A user is not able to connect to the network. A PC technician replaces the network cable that connects the the switch port. The user is now able to connect to the network. Which troubleshooting technique did the technician use? top-down substitution

divide-and-conquer a combination of top-down and divide-and-conquer


Bottom of Form

44

Top of Form

Refer to the exhibit. A user on Host1 requests a web page from the web server. Which diagram is accurat the encapsulation of the traffic that is sent from the user to the web server?

Bottom of Form

45

Top of Form

Select the connection that would require a straight-through cable. a switch to a hub a router to a switch a switch to a switch a router to a router
Bottom of Form

46

Top of Form

Refer to the exhibit. What is a possible reason that the PC is unable to ping the default gateway IP addres The PC is on a different network than the default gateway. A straight-through cable should be used to connect the switches. A straight-through cable should be used to connect the PC to the switch. Because the correct cable types are used for each segment, a bad cable could be the problem.
Bottom of Form

47

Top of Form

A learner wants to interact with the operating system of a computer. Which two methods can be used for (Choose two.) CLI

GUI kernel third party software shell


Bottom of Form

48

Top of Form

Which transport layer protocol is used when an application requires acknowledgment that data has been delivered? FTP TCP UDP RTP SMTP
Bottom of Form

49

Top of Form

In an attempt to verify connectivity, a user issues the ping command to a device that is not on the local ne The ping is unsuccessful. What can be determined from this result? The default gateway is misconfigured. The patch cable on the host station is faulty. The router between the host and destination is faulty. Further troubleshooting will be required to reach a definite conclusion.
Bottom of Form

50

Top of Form

Some new features are available for the OS that is currently running on a user's PC. What method should chosen so that the user can install these new feature sets? clean install multi-boot upgrade virtualization
Bottom of Form

You might also like