You are on page 1of 46

1 Refer to the exhibit.

The security policy of an organization allows employees to connect to the office intranet from their homes. Which type of security policy is this? remote access 2 What two commands can be used to form a new binding if client information does not agree with the DHCP client table? (Choose two.) ipconfig /release ipconfig /renew 3 For devices that do not autosense, which connection requires a crossover cable? PC port to PC port 4 Which adapter card would be required for a PC to exchange information with other PCs on a LAN? NIC 5 Which wireless technology provides mutual two-way authentication? EAP 6 What component of a personal computer is responsible for the processing of all data? CPU 7 What statement describes the filtering of traffic via the use of Stateful Packet Inspection? It permits incoming packets that are legitimate responses to requests from internal hosts. 8 Which protocol in its default configuration downloads e-mail messages to the client computer and deletes them from the server? POP3 9 Which protocol is used to transfer files among network devices and perform file-management functions? FTP 10 What is true about a wireless access point that is equipped with an omnidirectional antenna? radiates the signal equally in all directions

11 Refer to the exhibit. Which statement is true based on the information that is shown in the exhibit? All wireless devices that are connected to this AP must have an assigned SSID of College. 12 Which of the following statements best describes DNS? DNS servers are used to map a name to an IP address. 13 What is specified by the network number in an IP address? the network to which the host belongs 14 Which two causes of networking problems are related to the physical layer? (Choose two.) damaged cables and connectors overheated components 15 What wireless technology has the ability to communicate with many devices at the same time, makes use of the 2.4 GHz band, and is limited to low-speed, short-range communications? RF 16 The help desk at a large packaging company receives a call from a user who is concerned about lost data files on the local PC. The help desk technician learns that the user clicked on an icon that appeared to be a program update, but no updates were scheduled for that program. What type of attack has likely occurred? worm 17 What are two examples of peripheral input devices? (Choose two.) barcode reader digital camera 18 Refer to the exhibit. Assume that the command output is from a wireless DHCP client that is connected to a Linksys integrated router. What can be deduced from the output? The wireless connection is operational. 19 What does it mean when a problem is being escalated by a helpdesk? The helpdesk is moving the problem to a higher level support staff. 20

Which three statements describe an IP address? (Choose three.) An IP address is known as a logical address. An IP address is found in the Layer 2 header during transmission. An IP address is unique within the same local network. 21 What advantage does a peer-to-peer network have over a client-server network? It eliminates the need for centralized administration. 22 A wireless DHCP client cannot connect to the Internet through a Linksys integrated router. When you type ipconfig on the host, no IP address, subnet mask, or default gateway shows. What are two of the first things you will check? (Choose two.) if the wireless client is configured for DHCP if the correct default gateway is configured on the integrated router 23 Refer to the exhibit. If H4 sends a message to H1 and the destination MAC address is in the MAC table for both Switch1 and Switch2, which host devices will receive the message? all hosts that are connected to Switch1 and Switch2 24 What is the purpose of pop-up blocker software? It prevents the display of advertisement windows. 25 A host wants to send information simultaneously to all the other hosts in the same network. Which domain will support this type of communication? broadcast 26 Which portion of the packet does a router use to forward the packet to the destination? destination IP address 27 What measurement is commonly used to describe communication speed when transferring data? bps 28 What procedure will help prevent users from detecting a wireless network? Disable SSID broadcasts. 29

How does a crossover cable connect two routers? It connects the pins that are used for transmitting on one router to the pins that are used for receiving on the other router. 30 Which Windows PC command line utility can be used to discover the path that a packet takes to reach a destination? tracert 31 What destination IP address is used in a unicast packet? a specific host 32 Which two automatic addressing assignments are supported by DHCP? (Choose two.) subnet mask default gateway address 33 Which network design layer provides hosts with initial connectivity to the network? distribution 34 Which installation option should be chosen when the current operating system is too damaged to work properly? clean install 35 What are two advantages of purchasing a custom-built computer? (Choose two.) user can specify higher performance components supports higher-end graphics and gaming applications 36 When would infrared be used to connect network devices? when synchronizing a PC with a PDA that is in line of sight 37 For the second time in a week, workstations on a LAN are not able to log into the server. The technician fixed the problem the first time, but cannot remember the steps taken to solve it. What aspect of the troubleshooting process has the technician neglected? identifying the problem 38 What are two characteristics of IPv4 addresses? (Choose two.) They consist of two parts. They are Layer 2 addresses and are different for every computer.

39 Which two statements are true about local applications? (Choose two.) They are stored on the local hard disk. They run on the computer where they are installed. 40 Which picture shows a USB port on a PC? (YOU CAN ANSWER IT) 41 Why would a corporate web server be assigned a public IP address instead of a private IP address? The public address can be routed on the Internet. 42

Refer to the exhibit. An educational institution needs to connect PC systems that use private IP addressing to the Internet. They have multiple systems that need to access the Internet, but were only able to purchase one public IP address. What should be activated on the Linksys integrated router to achieve this goal? NAT 43 What type of computer would most likely use a docking station? laptop 44 What is the default subnet mask for the IP address 128.107.23.10? 255.255.0.0 45 What are two characteristics of a MAC address? (Choose two.) It is displayed in HEX characters. It is a physical address. 46 Which three addresses belong to the category of private IP addresses? (Choose three.) 10.0.0.1 172.16.0.1 192.168.31.19 47 Refer to the exhibit. A network technician is statically assigning an IP address to a PC. The default gateway is correct. What would be a valid IP address to assign to the host?

128.107.255.1 48 What is an ISP? It is an organization that enables individuals and businesses to connect to the Internet. 49 Which attribute must be the same for wireless devices on one network to be able to communicate with devices on a different network? default gateway 50 Which statement accurately describes a recommended strategy for end users to employ when they interact with a help desk technician? Provide as much information about the problem as possible. 51 Refer to the exhibit. Which option correctly represents the encapsulation of a packet that is sent by Host1 to the web server? (D) 52 Which Windows command is used to display the configured IP address, subnet mask, and default gateway? ipconfig 1 Bottom-up troubleshooting begins at which layer of the OSI model? network layer #physical layer data link layer transport layer application layer 2 Which two statements are true about local applications? (Choose two.) They run on the network. An example of a local application is e-mail. #They are accessed from a remote computer. They are stored on the local hard disk. #They run on the computer where they are installed. 3

Refer to the exhibit. What default gateway address will be assigned to PC1 if access to remote resources is needed? #192.31.7.3 192.168.1.101 192.168.1.253

A default gateway is not necessary. 4 Which attribute must be the same for wireless devices on one network to be able to communicate with devices on a different network? DNS server MAC address #default gateway operating system wireless equipment vendor 5 How do ISPs obtain public IP addresses? They create the addresses themselves. They obtain the addresses from the home PCs. They obtain the addresses from the Internet registry. #They obtain the addresses from the RFC. 6

Refer to the exhibit. The security policy of an organization allows employees to connect to the office intranet from their homes. Which type of security policy is this? acceptable use incident handling network maintenance #remote access 7 Which wireless component allows wireless clients to gain access to a wired network? PDA STA access point #wireless bridge 8 Which network design layer provides a connection point for end user devices to the network? access core distribution #network 9 Which two transport layer protocols are used to transfer messages between hosts? (Choose two.) DHCP FTP SMTP #TCP #UDP 10 An administrator is troubleshooting a network problem that involves the inability of users to reach Internet sites. During troubleshooting, the administrator is able to successfully ping web sites by their IP address, but pings to domain names are unsuccessful. Which service is most likely at fault?

DHCP #DNS FTP NAT 11

Refer to the graphic. Assume that the command output is from a wireless DHCP client that is connected to a Linksys integrated router. What can be deduced from the output? #The wireless connection is good. The WEP key or SSID needs to be checked. The DHCP configuration on the router needs to be checked. The wireless NIC driver or the NIC itself needs to be reinstalled. 12 A company has a web server that must be accessible to both external and internal clients. Which security policy best practice should be followed to maximize security of the server? Place the web server in a DMZ. #Keep the web server on the external network. Configure a firewall device to serve as the web server. Locate the web server in the server farm of the internal network. 13 TCP/IP data transmission between the source and destination host is de-encapsulated in four steps: A. The TCP header is removed. B. Bits are decoded and the destination MAC address is recognized. C. The IP header is removed and the contents are passed to the next layer. D. The Ethernet header and trailer are removed. What is the correct sequence of these steps? A, B, C, D A, C, B, D #B, C, D, A B, D, C, A C, A, B, D 14 A computer joins the network and announces itself to all hosts on the LAN. What type of message does the computer send out? #broadcast simulcast multicast unicast 15 What are two ways that a user can interact with an operating system shell? (Choose two.) #CLI OS #GUI NIC kernel

16 What are two examples of peripheral input devices? (Choose two.) external modem #barcode reader #digital camera plotter printer 17 What are three examples of logical configuration information used when planning a network implementation? (Choose three.) #size of broadcast domains naming scheme length of cable runs #IP addressing scheme #physical device location location of power outlets 18 Which wireless protocol is used for encryption? EAP Open PSK #WEP 19 Which value represents the host portion of IP address 128.107.10.11 with a subnet mask of 255.255.0.0? .10 #.10.11 128.107 .107.10.11 128.107.10 20 A home user is looking for an ISP connection that provides high speed digital transmission over regular phone lines. What ISP connection type should be used? #DSL dial-up satellite cell modem cable modem 21 What is the purpose of pop-up blocker software? It detects and removes spyware. It detects and removes viruses. #It prevents the display of advertisement windows. It removes unwanted e-mail. 22 What are two advantages of purchasing a custom-built computer? (Choose two.) usually a lower cost no waiting period for assembly #user can specify higher performance components

#supports higher-end graphics and gaming applications fewer components to replace 23

Refer to the exhibit. PC1 is unable to access the web server at 209.165.200.226/27. Based on the provided output, what is the most likely cause of the problem? PC1 is not plugged in to RTR1. Port 80 is already in use on PC1. No DNS server is configured on PC1. #PC1 is configured with an incorrect IP address and default gateway. 24 What is the name for the contract between a customer and an ISP that specifies requirements for uptime and service response time? DSL IAB NAP #SLA 25 Which term is associated with logical addressing? #IP addresses port addresses physical addresses Media Access Control addresses 26 Which Windows PC command line utility can be used to discover the path that a packet takes to reach a destination? ping netstat #tracert nslookup ipconfig 27 Which statement accurately describes what network devices do in the distribution layer of the three layer design model? They interconnect individual hosts. They interconnect multiple companies. #They interconnect local network segments. They interconnect the company network to the ISP. 28 Select three statements that correctly describe how DHCP services may be provided. (Choose three.) An integrated router provides IP configurations for most ISPs. #An integrated router can act as both DHCP server and DHCP client. A home PC using a static IP address obtained that address from a DHCP server. #Most home network integrated routers receive an IP configuration directly from their ISP. #A variety of devices can act as DHCP servers, as long as they run DHCP service software. A home PC that is unable to find a DHCP server defaults to the static IP address of 192.168.1.1. 29

Which two causes of networking problems are related to the physical layer? (Choose two.) #disconnected cables #improper operation of cooling fans incorrect MAC address incorrect default gateway incorrect subnet mask 30 Which installation option should be chosen when the current operating system is too damaged to work properly? upgrade multi-boot #clean install virtualization 31 What is an ISP? It is a standards body that develops cabling and wiring standards for networking. It is a protocol that establishes how computers within a local network communicate. #It is an organization that enables individuals and businesses to connect to the Internet. It is a networking device that combines the functionality of several different networking devices in one. 32 What two pieces of information should a help desk technician document while troubleshooting connectivity issues with an end user? (Choose two.) the CPU clock speed of the computer the number of network jacks that are in the room #if the user can ping the default gateway address if the word processing software is installed correctly #whether the PC uses dynamic or static IP addressing 33

Refer to the graphic. What feature can be installed on the Linksys integrated router to convert private IP addresses to Internet-routable addresses? authentication DHCP encryption firewall #NAT WEP 34 After attaching four PCs to the switch ports, configuring the SSID and setting authentication properties for a small office network, a technician successfully tests the connectivity of all PCs that are connected to the switch and WLAN. A firewall is then configured on the device prior to connecting it to the Internet. What type of network device includes all of the described features? switch ISR router #firewall appliance standalone wireless access point 35 For the second time in a week, workstations on a LAN are not able to log into the server. The technician fixed the

problem the first time, but cannot remember the steps taken to solve it. What aspect of the troubleshooting process has the technician neglected? identifying the problem asking end-users questions #documenting the troubleshooting process using structured techniques to solve a problem 36 What is the default subnet mask for an IP address of 64.100.19.14? #255.0.0.0 255.255.0.0 255.255.255.0 255.255.255.255 37 How does a crossover cable make it possible for two "like devices" (for example, two switches) to communicate? The transmit pins are disconnected and only the receive pins are used. The transmit pins on one device are connected to the transmit pins on the other device. The receive pins on one device are connected to the receive pins on the other device. #The transmit pins on one device are connected to the receive pins on the other device. 38 What will be one result of using a wireless infrastructure when designing the communications infrastructure for a new building? #Wireless devices will be easy to add or relocate. Infrastructure installation will be difficult and expensive. There will be less interference from outside electronic sources. Data transmitted over wireless networks will be more secure than when transmitted over wired networks. 39 What does the term "attenuation" mean in data communication? #loss of signal strength as distance increases time for a signal to reach its destination leakage of signals from one cable pair to another strengthening of a signal by a networking device 40 Which type of computer has an integrated mouse? desktop #laptop mainframe server pocket PC 41 Which Windows command is used to display the configured IP address, subnet mask, and default gateway? #ipconfig netstat nslookup tracert 42 What must be identical on all devices in a WLAN for successful wireless communication between the devices? #SSID

antenna type network mode wireless NIC driver 43 For devices that do not autosense, which connection requires a crossover cable? hub port to router port PC to hub port PC to switch port #PC port to PC port 44

Refer to the exhibit. A user on Host1 requests a web page from the web server. Which diagram is accurate for the encapsulation of the traffic that is sent from the user to the web server? (D)

45 What describes the external IP address that is obtained by a router through a cable or DSL modem? a public address that is obtained from ICANN a private address that is manually configured by the administrator #a public address that is obtained through DHCP from the ISP a private address that converts to a public address on the internal LAN 46 Which two components are configured via software in order for a PC to participate in a network environment? (Choose two.) MAC address #IP address kernel shell #subnet mask 47 What destination IP address is used in a unicast packet? #a specific host a group of hosts all hosts on the network the network broadcast address 48 Which part of the electromagnetic spectrum is commonly used to exchange data between a PDA and a computer? FM radar #infrared ultraviolet 49 What two commands can be used to form a new binding if client information does not agree with the DHCP client table? (Choose two.) #ipconfig /release

ipconfig /all ipconfig /flushdns #ipconfig /renew ipconfig 50 What are the two possible values for a digital bit? (Choose two.) #0 #1 A F # 9 51 Which picture shows a USB port on a PC? (I THINK YOU'ARE A SMART GUY)

52 What is the purpose of a router? #to forward broadcasts to all interfaces so that all hosts receive them to maintain a table of individual host addresses to select the best path to reach remote networks to physically connect multiple hosts that belong to the same network

1. What is specified by the host bits in an IP address? broadcast identity of the network *identity of the computer on the network network that is being addressed network to which the host belongs 2. What measurement is commonly used to describe communication speed when transferring data? *bps cps Hz MB 3. What is the function of the DNS server? It maps the IP address to the MAC address. *It translates a computer or domain name to the associated IP address. It manages the domain that clients are assigned to. It accepts HTTP requests from clients. 4. Refer to the exhibit. A user on host A sends an e-mail to the user on host B. Which type of message does host A send? broadcast multicast simulcast *unicast

5. All hosts within a domain receive the same frame that originates from one of the devices. The domain is also bounded by routers. What type of domain is this? *broadcast collision local multicast 6. A network engineer wants to represent confidential data in binary format. What are the two possible values that the engineer can use? (Choose two.) *0 *1 2 A F 7. Which two transport layer protocols are used to transfer messages between hosts? (Choose two.) DHCP FTP SMTP *TCP *UDP 8. Refer to the exhibit. After connectivity has been established, an Internet user needs to upload a text file. Using the TCP/IP model, one protocol will be required at the application layer and another at the internetwork layer. Which two protocols will be used at those two layers for the upload? (Choose two.) DHCP *FTP *IP TCP UDP 9.What is the correct sequence of steps in the encapsulation of TCP/IP data as it passes from a source to a destination host? A. converts data to bits for transmission B. packages the data for end to end transport C. adds the data-link header and trailer D. adds the network IP address to the header of the packet A,B,C,D A,C,D,B *B,D,C,A B,C,D,A D,C,B,A 10. Which three types of information are provided to a DHCP client from a DHCP server? (Choose three.)

host ID MAC address *default gateway *IP addresses of DNS servers physical address *subnet mask 11. Refer to the exhibit. Assume that the command output is from a wireless DHCP client that is connected to a Linksys integrated router. What can be deduced from the output? The DHCP configuration on the router needs to be verified. The WEP key or SSID needs to be verified. *The wireless connection is operational. The wireless NIC driver or the NIC itself needs to be reinstalled. 12. When is a dial-up connection used to connect to an ISP? when a cellular telephone provides the service when a high-speed connection is provided over a cable TV network when a satellite dish is used *when a regular telephone line is used 13. What are two examples of peripheral output devices? (Choose two.) barcode reader digital camera external DVD *headphones *printer 14. A network technician is required to provide access to the Internet for a large company. What is needed to accomplish this task? ISP private IP addresses for each host static IP addresses for each host DHCP server 15. What statement describes the filtering of traffic via the use of Stateful Packet Inspection? It recognizes and filters predefined URLs It permits access that is based on the application. It permits access based on IP or MAC addresses. *It permits incoming packets that are legitimate responses to requests from internal hosts. It translates an internal address or group of addresses into a public address that is sent across the network. 16. Which statement accurately describes what network devices do in the distribution layer of the three layer design model? They interconnect individual hosts. They interconnect multiple companies. *They interconnect local network segments. They interconnect the company network to the ISP.

17. Which two statements are true about local applications? (Choose two.) They run on the network. An example of a local application is e-mail. They are accessed from a remote computer. *They are stored on the local hard disk. *They run on the computer where they are installed. 18. Which network design layer provides a connection point for end user devices to the network? access core distribution network 19. What are two advantages of purchasing a custom-built computer? (Choose two.) usually a lower cost no waiting period for assembly *user can specify higher performance components *supports higher-end graphics and gaming applications fewer components to replace 20. Which portion of the packet does a router use to forward the packet to the destination? source IP address user data *destination IP address control information destination MAC address 21. What is the purpose of a router? to forward broadcasts to all interfaces so that all hosts receive them to maintain a table of individual host addresses *to select the best path to reach remote networks to physically connect multiple hosts that belong to the same network 22. How do ISPs obtain public IP addresses? They create the addresses themselves. They obtain the addresses from the home PCs. *They obtain the addresses from the Internet registry. They obtain the addresses from the RFC. 23. What is the default subnet mask for an IP address of 198.133.219.4? 255.0.0.0 255.255.0.0 *255.255.255.0 255.255.255.255 24. For an IP address, what component decides the number of bits that is used to represent the host ID? default-gateway host number

network number *subnet mask 25. Which three addresses belong to the category of private IP addresses? (Choose three.) *10.0.0.1 128.0.0.1 150.0.0.1 *172.16.0.1 *192.168.31.19 172.168.31.1 26. Which part of the electromagnetic spectrum is commonly used to exchange data between a PDA and a computer? FM radar *infrared ultraviolet 27. What is a service pack? an access policy an agreement between a company and a vendor a piece of code created to fix one specific problem *a collection of patches and updates released by a vendor a small piece of software designed specifically for security issues 28. Refer to the exhibit. The security policy of an organization requires users to change their password every week. Which type of security policy is this? acceptable use network maintenance *password remote access 29. Refer to the exhibit. An educational institution needs to connect PC systems that use private IP addressing to the Internet. They have multiple systems that need to access the Internet, but were only able to purchase one public IP address. What should be activated on the Linksys integrated router to achieve this goal? authentication DHCP encryption firewall *NAT WEP 30. Which wireless authentication method allows the use of a backend authentication server? *EAP Open PSK WEP

31. What wireless technology has the ability to communicate with many devices at the same time, makes use of the 2.4 GHz band, and is limited to low-speed, short-range communications? RF ISM infrared *Bluetooth 32. What is the purpose of the ipconfig command? to force a client to give up its current IP address to force the client to clear all IP-to-domain-name associations that is has learned to force the client to clear all the MAC-address-to-IP-address associations that it has learned *to show the current IP configuration on the client 33. What type of computer would most likely use a docking station? *laptop server desktop mainframe workstation 34. A new student wants to interact with the operating system of a computer. Which two methods can be used for this? (Choose two.) *CLI *GUI kernel third party software shell 35. How does a crossover cable connect two routers? It connects the pins that are used for receiving on one router to the pins that are used for receiving on the other router. *It connects the pins that are used for transmitting on one router to the pins that are used for receiving on the other router. It disconnects the transmit pins and uses only the receive pins. It uses the same pins for transmitting and receiving. 36. Refer to the exhibit. Assume that the exhibited output is from a host that is connected to a Linksys integrated router. What is the first thing that should be checked if using a bottom-up troubleshooting approach? the default gateway on the host the IP address on the host the IP address on the router *the link status LED on the front of the router the subnet mask on the host 37. Refer to the exhibit. What is the effect of setting the security mode to WEP on the Linksys integrated router? The WEP security mode enables the AP to inform clients of its presence. *The WEP security mode encrypts network traffic during transmission between the AP and the

wireless client. The WEP security mode generates a dynamic key each time a client establishes a connection with the AP. The WEP security mode identifies the WLAN. 38. For devices that do not autosense, which connection requires a crossover cable? hub port to router port PC to hub port PC to switch port *PC port to PC port 39. When terminating a UTP cable, why is it important to push the wires all the way into the end of the connector? to allow the cable to endure more stretching or twisting *to ensure good electrical contact to ensure that the wires are in correct order to minimize crosstalk 40. What is an advantage of selecting an operating system that has a commercial license over one with a GPL license? The commercial license-based operating system ensures full access to the source code for everyone. The commercial license-based operating system ensures that everyone can participate in the enhancement of the product. *The commercial license-based operating system provides structured support. The commercial license-based operating system is released free of charge. 41. What is the name for the contract between a customer and an ISP that specifies requirements for uptime and service response time? DSL IAB NAP *SLA 42. Refer to the exhibit. What is the purpose of assigning a network name of University? It enables access to the AP configuration GUI by name rather than by address. It encrypts data between the wireless client and the AP. *It identifies the wireless LAN. It translates an internal address or group of addresses to a public address. It translates IP addresses into easy-to-remember domain names. 43. Which two IP configuration components does the computer use to identify its subnetwork? (Choose two.) default gateway *IP address MAC address DNS server address *subnet mask

44. What is the name given to the area covered by an ad hoc network in a WLAN? Basic Service Set (BSS) Distribution System (DS) Extended Service Set (ESS) *Independent Basic Service Set (IBSS) 45. Which installation option should be chosen when the current operating system is too damaged to work properly? upgrade multi-boot *clean install virtualization 46. Identify two causes of physical layer network problems. (Choose two.) logical addressing issues *improperly terminated cables *cables plugged into wrong ports incorrect MAC address assigned packets received out of sequence incorrect subnet mask on an interface 47. What is the meaning of the term crosstalk? *interference of signals between wire pairs loss of signal strength as distance increases damage of the signal when two bare wires touch strengthening of a signal by a networking device 48. A user is unable to send e-mail. While troubleshooting this problem, the network technician first verifies the physical connectivity of cables. Which troubleshooting approach is being followed? *bottom-up divide-and-conquer top-down trial and error 49. Refer to the exhibit. What cabling fault does the exhibit represent? open reversed pair short *split pair 50. A wireless DHCP client cannot connect to the Internet through a Linksys integrated router. When you type ipconfig on the host, no IP address, subnet mask, or default gateway shows. What are two of the first things you will check? (Choose two.) *SSID *if the wireless client is configured for DHCP

2. Cisco Final test.


1 What is the purpose of pop-up blocker software?

It detects and removes spyware. It detects and removes viruses. It prevents the display of advertisement windows. It removes unwanted e-mail. 2 Which device is often configured to act as both a DHCP client and a DHCP server? home PC ISP modem wireless-enabled laptop integrated services router As an assignment, a computer science student needs to present data in binary format. What are the two possible values that the student can use? (Choose two.) 0 1 2 A F What is a major characteristic of asymmetric Internet service? Download speeds and upload speeds are equal. Download speeds are faster than upload speeds. Data traffic speeds are faster than voice traffic speeds. Used when consistently uploading large amounts of graphics, video and multimedia traffic. Which installation option should be chosen when the current operating system is too damaged to work properly? upgrade multi-boot clean install virtualization What measurement is commonly used to describe communication speed when transferring data? bps

cps Hz MB 7 A college network administrator is planning a wireless LAN to provide service in the student lounge and outdoor patio. The requirements include a range of at least 80 meters and a speed of 30 Mb/s. Which wireless LAN standard meets these requirements? 802.11 802.11a 802.11b 802.11g After attaching four PCs to the switch ports, configuring the SSID and setting authentication properties for a small office network, a technician successfully tests the connectivity of all PCs that are connected to the switch and WLAN. A firewall is then configured on the device prior to connecting it to the Internet. What type of network device includes all of the described features? switch ISR router firewall appliance standalone wireless access point Which statement is true concerning stateful packet inspection? Access is permitted based on IP addresses of the source and destination devices. Access is permitted based on the MAC addresses of the source and destination devices. Access is permitted only if the type of application that is attempting to reach the internal host is allowed. Access is permitted only if it is a legitimate response to a request from an internal host.

10

Refer to the exhibit. Assume that the exhibited output is from a host that is connected to a Linksys integrated router. What is the first thing that should be checked while using a bottom-up troubleshooting approach? the default gateway on the host the IP address on the host the IP address on the router the link status LED on the front of the router the subnet mask on the host 11 What does the term "attenuation" mean in data communication? loss of signal strength as distance increases time for a signal to reach its destination leakage of signals from one cable pair to another strengthening of a signal by a networking device 12

Refer to the graphic. Assume that the command output is from a wireless DHCP client that is connected to a

Linksys integrated router. What can be deduced from the output? The wireless connection is good. The WEP key or SSID needs to be checked. The DHCP configuration on the router needs to be checked. The wireless NIC driver or the NIC itself needs to be reinstalled. 13 Which transport layer protocol is used when an application requires acknowledgment that data has been delivered? FTP TCP UDP RTP SMTP 14 What is an ISP? It is a standards body that develops cabling and wiring standards for networking. It is a protocol that establishes how computers within a local network communicate. It is an organization that enables individuals and businesses to connect to the Internet. It is a networking device that combines the functionality of several different networking devices in one. 15 What must be identical on all devices in a WLAN for successful wireless communication between the devices? SSID antenna type network mode wireless NIC driver
17.

16 All hosts within a domain receive the same frame that originates from one of the devices. The domain is also bounded by routers. What type of domain is this? broadcast collision local

multicast 17

Refer to the exhibit. Which statement is true based on the information that is shown in the exhibit? All wireless devices that are connected to this AP must have an assigned SSID of College. Any wireless client that is attached to this AP must have the same IP address and SSID. The AP is not physically wired to the local LAN. This configuration is found only in an ad hoc wireless network. 18

Refer to the exhibit. The security policy of an organization allows employees to connect to the office intranet from their homes. Which type of security policy is this? acceptable use incident handling network maintenance remote access 19 Which wireless protocol is used for encryption? EAP Open PSK

WEP 20

Refer to the exhibit. An educational institution needs to connect PC systems that use private IP addressing to the Internet. They have multiple systems that need to access the Internet, but were only able to purchase one public IP address. What should be activated on the Linksys integrated router to achieve this goal? authentication DHCP encryption firewall NAT WEP 21 What is an advantage of purchasing a custom-built computer? It is beneficial for less knowledgeable consumers. The waiting period for assembly is negligible. The cost is lower compared to a computer that has been preassembled. The user can specify high-performance components to meet specific needs. 22

Refer to the exhibit. PC1 sends a data packet to PC4. When the router forwards the data out Fa0/1, what destination MAC address will the router place in the frame? 0050.0FA9.CB47 0050.E208.A761 0200.5455.4E01 0200.545D.25F7 23 Which type of computer has an integrated mouse? desktop laptop mainframe server pocket PC 24

Refer to the exhibit. What is the reason that the host is unable to connect to the Internet? DHCP needs to be enabled on the router. The router has an incorrect DHCP starting address. The IP address on the host is in the wrong network. The host is configured with an incorrect gateway. 25 What is the function of a physical topology map? records IP addressing of each host records hostnames and applications organizes groups of hosts by how they use the network shows where wiring is installed and the locations of network devices 26 What is true about a wireless access point that is equipped with an omnidirectional antenna? concentrates signal in one direction typically used in bridging applications radiates the signal equally in all directions provides the greatest transmission distance of all antenna types that are used by APs 27

Refer to the exhibit. A ping command that was initiated from the local PC to the file server at IP address 209.165.201.5 succeeded. However, a ping that was initiated from the file server to the local PC was unsuccessful. What could cause the ping command that was initiated from file server to fail? The file server is down. The integrated router has failed. NAT has been enabled on the integrated router. A security measure is blocking access that initiates from the server. The DSL modem failed to provide an IP address for the local PC. 28 When are leased lines typically used? when low bandwidth is required for home and small business connectivity when a dedicated digital data line is necessary as a less expensive option to cable and DSL modem service 29 What is the default subnet mask for an IP address of 64.100.19.14? 255.0.0.0 255.255.0.0 255.255.255.0 255.255.255.255 30 Which protocol is used by a client to browse the web server? FTP HTTP

POP SMTP
32.

31

Refer to the exhibit. If H4 sends a message to H1 and the destination MAC address is in the MAC table for both Switch1 and Switch2, which host devices will receive the message? only H1 hosts H1 and H4 all hosts that are connected to Switch1 all hosts that are connected to Switch1 and Switch2 32 Which protocol is used to transfer files among network devices and perform file-management functions? DNS FTP HTML HTTP 33 How does a crossover cable connect two routers? It connects the pins that are used for receiving on one router to the pins that are used for receiving on the other router. It connects the pins that are used for transmitting on one router to the pins that are used for receiving on the other router. It disconnects the transmit pins and uses only the receive pins.

It uses the same pins for transmitting and receiving. 34 Which two values represent the network number and default mask for the address 209.165.200.225? (Choose two.) 209.0.0.0 209.165.0.0 209.165.200.0 255.0.0.0 255.255.0.0 255.255.255.0 35 Identify two causes of physical layer network problems. (Choose two.) logical addressing issues improperly terminated cables cables plugged into wrong ports incorrect MAC address assigned packets received out of sequence incorrect subnet mask on an interface 36 A local PC has the correct configuration that is required to access the network. A ping command that is sourced at the PC does not receive a response from a remote device. Which operating system command might be used to determine where the connection failed? netstat tracert ipconfig nslookup 37 What type of cable would be required to connect a Linksys router to a wired PC? crossover cable rollover cable serial cable straight-through cable 38 What is the function of CSMA/CA on a wireless Ethernet network? to prevent collisions

to broadcast messages to select the least congested channel to establish an ACK between devices 39 Which adapter card would be required for a PC to exchange information with other PCs on a LAN? NIC video card sound card internal modem 40 What are two examples of peripheral output devices? (Choose two.) barcode reader digital camera external DVD headphones printer 41 TCP/IP data transmission between the source and destination host is de-encapsulated in four steps: A. The TCP header is removed. B. Bits are decoded and the destination MAC address is recognized. C. The IP header is removed and the contents are passed to the next layer. D. The Ethernet header and trailer are removed. What is the correct sequence of these steps? A, B, C, D A, C, B, D B, C, D, A B, D, C, A C, A, B, D 42 Which two statements are true about local applications? (Choose two.) They run on the network. An example of a local application is e-mail. They are accessed from a remote computer.

They are stored on the local hard disk. They run on the computer where they are installed. 43 What two commands can be used to form a new binding if client information does not agree with the DHCP client table? (Choose two.) ipconfig /release ipconfig /all ipconfig /flushdns ipconfig /renew ipconfig 44 What describes the external IP address that is obtained by a router through a cable or DSL modem? a public address that is obtained from ICANN a private address that is manually configured by the administrator a public address that is obtained through DHCP from the ISP a private address that converts to a public address on the internal LAN 45 A user in a small office is unable to connect to the Internet. The user examines the physical connections to the ISR, a Linksys WRT300N, and notices a solid green LED on the port that is wired to the computer. What does the LED indicate about the current state of the port? The ISR is making adjustments to the port. The device is plugged in and traffic is flowing. The computer is plugged in but no traffic is flowing. The ISR does not detect that the computer is plugged in.
47.

46 A network administrator wishes to deploy a small network without using static IP addresses on employee workstations. However, all employees need Internet access. Which two of these services must be configured to meet network requirements? (Choose two.) FTP DHCP HTTPS

NAT HTTP 47 Which three statements describe an IP address? (Choose three.) An IP address is known as a logical address. An IP address uses a 30-bit addressing scheme. An IP address is found in the Layer 2 header during transmission. The network portion of an IP address is burned into a network interface card. An IP address is unique within the same local network. The network portion of an IP address will be the same for all hosts that are connected to the same local network. 48 Which type of network supports DHCP and DNS services for network users in a network domain? client/server peer-to-peer hierarchical ad hoc 49 For the second time in a week, workstations on a LAN are not able to log into the server. The technician fixed the problem the first time, but cannot remember the steps taken to solve it. What aspect of the troubleshooting process has the technician neglected? identifying the problem asking end-users questions documenting the troubleshooting process using structured techniques to solve a problem 50 What type of message is sent to a specific group of hosts? static unicast dynamic multicast broadcast 51 What is specified by the host bits in an IP address? broadcast identity of the network

identity of the computer on the network network that is being addressed network to which the host belongs 52

Refer to the exhibit. A user sets up a home network and uses a crossover cable from Switch1 to the Internet port on the ISR. However, there is no connection between the host H1 and the server. What should the user do in order to establish a connection? Replace the cable with a console cable. Replace the cable with a rollover cable. Replace the failed crossover cable with a working crossover cable. Replace the cable with a straight-through cable.
What is the purpose of TCP? to manage data links and physical network transmissions to specify the format of requests and responses that are exchanged between the client and server *to assign the logical address and encapsulate the request into packets for routing to the destination to provide flow control and acknowledgment of packets that are exchanged between the client and server 2

Which adapter card would be required for a PC to exchange information with other PCs on a LAN? *NIC video card sound card internal modem 3 Which type of computer has an integrated mouse? desktop *laptop mainframe server pocket PC 4 After attaching four PCs to the switch ports, configuring the SSID and setting authentication properties for a small office network, a technician successfully tests the connectivity of all PCs that are connected to the switch and WLAN. A firewall is then configured on the device prior to connecting it to the Internet. What type of network device includes all of the described features? switch ISR router *firewall appliance standalone wireless access point 5 Which installation option should be chosen when the current operating system is too damaged to work properly? upgrade multi-boot *clean install virtualization 6 A computer joins the network and announces itself to all hosts on the LAN. What type of message does the computer send out? *broadcast simulcast multicast unicast

7 What portion of the destination IP address is used as a packet is routed through the Internet? *subnet mask host portion network portion default gateway address 8 Which layer in the hierarchical Ethernet design model ensures that traffic between local networks will be allowed? core layer *access layer network layer distribution layer 9 What is the name for the contract between a customer and an ISP that specifies requirements for uptime and service response time? DSL IAB NAP *SLA 10 A network technician is required to provide access to the Internet for a large company. What is needed to accomplish this task? *ISP private IP addresses for each host static IP addresses for each host DHCP server 11 A user is not able to connect to the network. A PC technician replaces the network cable that connects the PC to the switch port. The user is now able to connect to the network. Which troubleshooting technique did the technician use? top-down substitution *divide-and-conquer a combination of top-down and divide-and-conquer

12 What component of a personal computer is responsible for the processing of all data? RAM *CPU firewall system bus operating system 13 Which two transport layer protocols are used to transfer messages between hosts? (Choose two.) DHCP FTP SMTP *TCP *UDP 14 Which device is often configured to act as both a DHCP client and a DHCP server? home PC *ISP modem wireless-enabled laptop integrated services router 15

Refer to the exhibit. Which pair of addresses would be appropriate to use for PC1 and PC2 to establish a workgroup using private addresses? 127.0.0.1 and 127.0.0.2 *172.16.4.2 and 172.16.4.3 172.16.5.1 and 192.168.3.2 198.133.219.25 and 198.133.219.26 What are two ways that a user can interact with an operating system shell? (Choose two.) *CLI OS *GUI

NIC kernel 17 A company has a web server that must be accessible to both external and internal clients. Which security policy best practice should be followed to maximize security of the server? Place the web server in a DMZ. *Keep the web server on the external network. Configure a firewall device to serve as the web server. Locate the web server in the server farm of the internal network. *18 Which wireless component allows wireless clients to gain access to a wired network? PDA STA access point *wireless bridge *19 Which two statements are characteristics of DHCP services? (Choose two.) *A DHCP client determines the lease time for using the IP address that is supplied by the DHCP server. An integrated router acts as the DHCP server to provide the IP address to the ISP. DHCP clients send a DHCP Discover message to the destination IP address of 255.255.255.255. *The DHCP server maps the IP addresses to host names. The integrated router acts as a DHCP server for internal hosts on local networks. 20 What is the correct sequence of steps in the encapsulation of TCP/IP data as it passes from a source to a destination host? A. converts data to bits for transmission B. packages the data for end to end transport C. adds the data-link header and trailer D. adds the network IP address to the header of the packet A,B,C,D A,C,D,B *B,D,C,A

B,C,D,A D,C,B,A 21

Refer to the exhibit. Assume that the exhibited output is from a host that is connected to a Linksys integrated router. What is the first thing that should be checked while using a bottom-up troubleshooting approach? the default gateway on the host the IP address on the host the IP address on the router *the link status LED on the front of the router the subnet mask on the host 22 Which firewall resource could include the capability of recognizing and filtering DoS attacks? URL filtering application filtering *Layer 4 packet filtering stateful packet inspection *23 Which type of network attack occurs when an unauthorized person tries to persuade a user to share a network user ID and password? brute force denial of service data manipulation *social engineering *24 Which type of network supports DHCP and DNS services for network users in a network domain? client/server peer-to-peer hierarchical *ad hoc *25 What is the purpose of pop-up blocker software?

It detects and removes spyware. It detects and removes viruses. *It prevents the display of advertisement windows. It removes unwanted e-mail. 26 What are two best practices that are used when configuring a small home WLAN? (Choose two.) the use of EAP the encryption of the SSID the use of pre-shared keys the use of open authentication the disabling of SSID broadcasting 27 What is a service pack? an access policy an agreement between a company and a vendor a piece of code created to fix one specific problem *a collection of patches and updates released by a vendor a small piece of software designed specifically for security issues *28 Why would a corporate web server be assigned a public IP address instead of a private IP address? The public address can be acquired at no cost. *The public address can be routed on the Internet. The public address provides a security advantage. The same public address can be used on multiple servers to prevent depletion of available IP addresses. 29 When would a LAN switch use flooding to forward a frame? when the MAC address table is empty when retransmissions are required after a collision after all hosts on the network are added to the MAC table when a frame is received from a port that is connected to a hub 30

Refer to the exhibit. The network is experiencing excessive broadcast traffic from multiple hosts. What can be done to reduce the broadcast traffic that each host receives without compromising connectivity to the corporate servers? Separate the switches with a router. Create a separate VLAN for the servers and hosts. Change from Ethernet switches to FastEthernet switches. Increase the number of switches to reduce the number of PCs that are connected to each switch. What are two characteristics of a MAC address? (Choose two.) *It indicates the physical location of the host within the network. It is dynamically assigned by a DHCP server. *It is displayed in HEX characters. It is a physical address. It is cable-based. *32 What is an advantage of purchasing a custom-built computer? It is beneficial for less knowledgeable consumers. The waiting period for assembly is negligible. The cost is lower compared to a computer that has been preassembled. *The user can specify high-performance components to meet specific needs. 33 What are two examples of peripheral input devices? (Choose two.) external modem *barcode reader digital camera *plotter printer 34 A home user is looking for an ISP connection that provides high speed digital transmission over regular phone lines. What ISP connection type should be used? *DSL dial-up satellite cell modem cable modem 35

Which protocol in its default configuration downloads e-mail messages to the client computer and deletes them from the server? FTP *POP3 SMTP IMAP4 36 Which two statements are true about local applications? (Choose two.) They run on the network. An example of a local application is e-mail. *They are accessed from a remote computer. They are stored on the local hard disk. *They run on the computer where they are installed. 37 What is the purpose of the ipconfig /release command? *It forces a client to give up its current IP address. It forces a client to give up its current MAC address. It forces the client to clear all the MAC address to IP address associations it has learned. It shows the current IP configuration on the client. 38 Which attribute must be the same for wireless devices on one network to be able to communicate with devices on a different network? DNS server MAC address *default gateway operating system wireless equipment vendor 39 A user has reported a failure to connect to the network. Based on similar calls from other users in the same location, the network technician starts troubleshooting by entering the ipconfig command on the user computer. Which troubleshooting technique is the technician using? top-down *bottom-up substitution divide-and-conquer

*40 Which statement accurately describes what network devices do in the distribution layer of the three layer design model? They interconnect individual hosts. They interconnect multiple companies. They interconnect local network segments. They interconnect the company network to the ISP. 41

Refer to the graphic. Based on the information that is shown, what statement is true? This configuration would be commonly found in an ad hoc wireless network. Any wireless client that is attached to this access point would have the same IP address and SSID. *All wireless devices that are connected to this access point must have an assigned SSID of Academy. In addition to accepting wireless client requests, this access point must connect to the wired network. 42 What wireless technology has the ability to communicate with many devices at the same time, makes use of the 2.4 GHz band, and is limited to low-speed, short-range communications? *RF ISM infrared Bluetooth *43 Which of the following statements best describes DNS? DNS servers are used to map an IP address to a physical address. *DNS servers are used to map a name to an IP address. DNS servers are used to configure logical address information for host computers. DNS servers are used to translate from private addresses to public addresses. 44

Refer to the exhibit. An educational institution needs to connect PC systems that use private IP addressing to the Internet. They have multiple systems that need to access the Internet, but were only able to purchase one public IP address. What should be activated on the Linksys integrated router to achieve this goal? authentication DHCP encryption firewall /*NAT WEP *45 What procedure will help prevent users from detecting a wireless network? Enable WEP. Enable MAC filtering. Disable SSID broadcasts. Change the default administrator password on the AP.

You might also like