Documente Academic
Documente Profesional
Documente Cultură
RAM
CPU
video card
sound card
operating system
Q.2 What are two advantages of purchasing a preassembled computer ? (Choose two.)
Q.3 A user plans to run multiple applications simultaneously on a computer. Which computer
component is essential to accomplish this ?
RAM
NIC
video card
sound card
storage device
Q.4 Which adapter card enables a computer system to exchange information with other
systems on a local network ?
modem card
controller card
video card
sound card
Q.5 What is the main storage drive used by servers, desktops, and laptops ?
tape drive
hard drive
Q.6 Which component is designed to remove high-voltage spikes and surges from a power line
so that they do not damage a computer system ?
CPU
surge suppressor
motherboard
hard drive
Q.7 What are two examples of output peripheral devices ? (Choose two.)
printer
speakers
flash drive
external DVD
external modem
Q.8 What two functions does a UPS provide that a surge protector does not ? (Choose two.)
gives the user time to safely shut down the computer if the power fails
Q.12 What are two benefits of hooking up a laptop to a docking station ? (Choose two.)
Mobility is increased.
Q.13 Applications can be grouped into general use software or industry specific software. What
are two examples of industry specific software ? (Choose two.)
CAD
presentation
spreadsheet
word processing
contacts/scheduling management
Q.14 Which three terms describe different types of computers ? (Choose three.)
operating system
network
laptop
desktop
Windows
mainframe
Q.16 How many values are possible using a single binary digit ?
16
bits
pixels
hertz
bytes
carpeted floor
grounding strap
Q.19 If a peripheral device is not functioning, what are three things you should do to solve the
problem ? (Choose three.)
Use the testing functionality on the peripheral itself, if available.
Disconnect all cables connected to the computer except those connected to the peripheral.
Disconnect the peripheral and verify that the computer is operating normally.
Q.20 Which two steps should be performed when installing a peripheral device ? (Choose two.)
Connect the peripheral using any cable and any available port on the computer.
Test the peripheral on another machine before installing it on the one where it will be
used.
Check the computer documentation to see if the peripheral vendor is compatible with the
PC vendor.
Q.21 In newer operating systems, how are system resources assigned by default when
components are installed ?
The computer name must be unique for all computers on the same network.
The operating system must be the same on all computers on the same network.
The amount of installed RAM must be the same on all computers on the same network.
The operating system must have the latest patch applied during the installation or it will
not participate in the network.
2 What two items are available from the About Windows option through the Windows
Explorer Help menu? (Choose two.)
3 Which two items must be unique to each computer and cannot be duplicated on a
network? (Choose two.)
partition
file system
computer name
IP address
operating system
4 What occurs when computers are configured to receive their network configurations
dynamically?
ext2
ext3
NTFS
FAT16
FAT32
6 Windows XP has a known problem with specific Intel processors. What is the best
course of action to take in this situation?
7 Which two statements are true about drive partitions? (Choose two.)
IP address
subnet mask
closest server
default gateway
operating system
network card manufacturer
9 What are three characteristics of an operating system that is released under the GPL
(GNU Public License)? (Choose three.)
full access to source code
software often available free
structured development cycle
can be expensive to purchase
limits what end-user can do with code
support normally user-based and often free
10 What Explorer menu option is used to determine the Windows XP version installed on
a computer?
Edit
Help
View
Tools
Favorites
12 Which operating system patch installation method is used when a user is notified of a
security update for remotely accessing a computer, but wishes not to install this patch?
manual
automatic
semi-automatic
prompt for permission
clean install
upgrade
multi-boot
virtualization
CLI
GUI
redirector
kernel translator
15 Which three resource specifications are given by the manufacturer to ensure that an
operating system performs as designed? (Choose three.)
type of keyboard
printer requirements
required video memory
required hard disk space
processor type and speed
recommended amount of RAM
16 The Lesson TaskMaster application from ChalkBoard has a problem. Every time the
software is installed and loaded on a Windows XP-based Dell computer, and the moment
something is typed followed by a tab, two tabs are inserted instead of one. What would be
the best solution to this problem?
18 What are two ways that a user can interact with an operating system shell? (Choose
two.)
CLI
OS
GUI
NIC
kernel
19 Which Windows XP Automatic Update option allows you to select the time when a
Windows update is executed?
Automatic (recommended).
Install updates from the Windows Update web site.
Notify me but don’t automatically download or install them.
Download updates for me, but let me choose when to install them.
20 A computer in the Advanced Technology Center computer room on the second floor,
room number 217, has the computer name ATC_217_7. What fact is true about the
computer name?
perating system
Q.1 Which term is used to describe the process of placing one message format into another
format so that the message can be delivered across the appropriate medium?
flow control
encapsulation
encoding
multicasting
access method
Q.2 Refer to the graphic. Five PCs are connected through a hub. If host H1 wants to reply to a
message from host H2, which statement is true?
H1 sends a unicast message to H2, but the hub forwards it to all devices.
H1 sends a unicast message to H2, and the hub forwards it directly to H2.
H1 sends a broadcast message to H2, and the hub forwards it to all devices.
H1 sends a multicast message to H2, and the hub forwards it directly to H2.
Q.3 Which two statements concerning networking standards are true? (Choose two.)
Q.4 What does the 100 mean when referencing the 100BASE-T Ethernet standard?
speed of transmission
source IP address
destination IP address
IP addresses only
They are used to determine which host device accepts the frame.
They are used to determine the network that the host is located on.
Q.9 Which device accepts a message on one port and always forwards the message to all
other ports?
modem
switch
router
hub
Q.10 Which two networking devices are used to connect hosts to the access layer? (Choose
two.)
router
hub
switch
server
computer
Q.11 Host A needs to learn the MAC address of Host B, which is on the same LAN segment. A
message has been sent to all the hosts on the segment asking for the MAC address of Host B.
Host B responds with its MAC address and all other hosts disregard the request. What protocol
was used in this scenario?
ARP
DHCP
DNS
WINS
Q.12 A switch receives a frame with a destination MAC address that is currently not in the
MAC table. What action does the switch perform?
It floods the frame out of all active ports, except the origination port.
It reassembles the frame with different MAC addresses than the original frame.
It reassembles the data packet with different IP addresses than the original data packet.
It reassembles both the packet and the frame with different destination IP and MAC
addresses.
Q.15 Which table does a router use to make decisions on where a data packet is to be sent?
ARP table
routing table
network table
forwarding table
Q.16 If the default gateway is configured incorrectly on the host, what is the impact on
communications?
The host can communicate with other hosts on the local network, but is unable to
communicate with hosts on remote networks.
The host can communicate with other hosts on remote networks, but is unable to
communicate with hosts on the local network.
Q.17 What device is typically used as the default gateway for a computer?
Q.18 If a router receives a packet that it does not know how to forward, what type of route
must be configured on the router to prevent the router from dropping it?
dynamic route
default route
destination route
default destination
Q.19 Which two items are included in a network logical map? (Choose two.)
naming scheme
IP addressing scheme
Q.20 An integrated router can normally perform the functions of which two other network
devices? (Choose two.)
NIC
switch
e-mail server
application server
It enables the user to share all files with all users and groups.
Q.3 What is the term for the group of high-speed data links that interconnect ISPs?
Internet LAN
ISP backbone
Internet gateways
Internet providers
Internet backbone
Q.4 Which device can act as a router, switch, and wireless access point in one package?
hub
bridge
modem
repeater
ISR
Q.5 What are three characteristics of business class ISP service? (Choose three.)
fast connections
Q.7 Which three elements are required to successfully connect to the Internet? (Choose
three.)
an IP address
a network connection
Q.8 What term describes each router through which a packet travels when moving between
source and destination networks?
NOC
ISP
hop
segment
NIC functionality
Q.10 What type of end-user connectivity requires that an ISP have a DSLAM device in their
network?
analog technology
wireless technology
STP
UTP
coax
fiber
STP
UTP
coax
fiber
Q.14 Which two places are most appropriate to use UTP cabling? (Choose two.)
between buildings
in a cable TV network
data security
no loss of signal
no electromagnetic interference
crossover
multimode fiber
single-mode fiber
straight-through
Q.17 What connector is used to terminate Ethernet unshielded twisted pair (UTP) cabling?
ST
BNC
RJ-11
RJ-45
Q.18 Which two characteristics describe copper patch panels? (Choose two.)
requires no preplanning
Q.20 What are two common causes of signal degradation when using UTP cabling? (Choose
two.)
Q.21 What are three commonly followed standards for constructing and installing cabling?
(Choose three.)
pinouts
cable lengths
connector color
connector types
8 bits
16 bits
32 bits
64 bits
128 bits
Q.2 Refer to the graphic. A user at the workstation cannot connect to the server. All cables
have been tested and are working and all devices have IP addressing. However, the user
cannot ping the server. What is causing the problem?
The workstation does not know the MAC address of the switch.
network portion
host portion
Q.4 Given a host with the IP address 172.32.65.13 and a default subnet mask, to which
network does the host belong?
172.32.65.0
172.32.65.32
172.32.0.0
172.32.32.0
Q.5 Which default subnet mask provides the most host bits?
255.0.0.0
255.255.0.0
255.255.255.0
255.255.255.252
Q.6 How many bits are available for Class B host IP addresses using a default subnet mask?
16
24
Q.7 How many usable hosts are available given a Class C IP address with the default subnet
mask?
254
255
256
510
511
512
Q.8 Assuming a default mask, which portion of the IP address 175.124.35.4 represents the
host?
175.124
35.4
.4
124.35.4
175.124.35
10.1.1.1
172.32.5.2
192.167.10.10
172.16.4.4
192.168.5.5
224.6.6.6
a specific host
a group of host
Q.12 Yvonne is talking to her friend on the phone. What type of message is this?
broadcast
simulcast
multicast
unicast
Q.13 What information must be included within a unicast message for it to be delivered on an
Ethernet network?
Q.14 A PC obtains its IP address from a DHCP server. If the PC is taken off the network for
repair, what happens to the IP address configuration?
The configuration is permanent and nothing changes.
The address is returned to the pool for reuse when the lease expires.
ARP
DHCP
DNS
RARP
Q.16 Which three statements describe a DHCP Discover message? (Choose three.)
All hosts receive the message, but only a DHCP server replies.
Q.17 Refer to the graphic. A host connects to a Linksys integrated router that is also a DHCP
server and receives an IP address from it. Which address does the host need to access the ISP
and the Internet?
internal IP address of the integrated router that connects to the local network
Q.18 Which statement is true concerning private IP addresses?
ensures that two networks separated by the Internet use unique IP network numbers
inspects traffic that might be harmful or used in an attack against the network
Q.20 Which two statements describe packets that are sent through a Linksys integrated router
using NAT? (Choose two.)
Packets that are sent to hosts on the same network need to be translated.
Packets that are sent to a destination outside the local network need to be translated.
Packets that are sent to a destination outside a local network do not need to be
translated.
Packets that are sent between hosts on the same local network do not need to be
translated.
Q.21 Refer to the graphic. NAT and DHCP are installed on the Linksys integrated router. Which
IP address is most likely to be assigned to the local computer, Host1?
10.0.0.17
128.107.1.2
192.135.250.0
209.165.201.1
Q.1 A user types www.cisco.com into a web browser address textbox. What does
www.cisco.com represent?
DNS
DHCP
FTP
Telnet
web
Q.3 Which type of server would most likely be used first by a network client in a corporate
environment?
DNS
DHCP
FTP
Telnet
web
Q.4 Which protocol is used by FTP to transfer files over the Internet?
TCP
SMTP
UDP
SNMP
Q.5 Which protocols are TCP/IP application layer protocols? (Choose two.)
UDP
FTP
IP
SMTP
TCP
Q.6 Which of the following are layers of the TCP/IP model? (Choose three.)
Application
Physical
Internet
Network Access
Presentation
Q.7 You are creating a network-based video game. What influences your decision about which
transport protocol to use for the application?
TCP provides extra acknowledgements that will ensure smooth video delivery.
Both TCP and UDP can be used simultaneously to ensure speed and guaranteed delivery.
Both TCP and UDP may slow transmission and disrupt game operation, so no transport
protocol should be used.
Q.8 Whenever e-mail clients send letters, what device is used to translate the domain names
into their associated IP addresses?
SNMP server
DNS server
DHCP
DNS
FTP
HTTP
POP
SMTP
Q.10 Refer to the graphic. Which protocol is used to access this website?
IM
FTP
HTTP
SNMP
VoIP
20
21
25
26
110
Q.12 Which protocol is used by e-mail servers to communicate with each other?
FTP
HTTP
TFTP
SMTP
POP
SNMP
Q.13 What client software enables logged in users to communicate with other logged in users
in real time?
blog
web mail
instant messaging
Q.14 An Internet server is running both FTP and HTTP services. How does the server know
which of these applications should handle an incoming segment?
The data in the segment is specially formatted for either HTTP or FTP.
The segment destination port number identifies the application that should handle it.
The source port number is associated with one of these well known server applications.
Q.15 What term is used to describe how TCP/IP protocols are layered and interact to format,
address, and transmit information across a network?
protocol hierarchy
protocol modeling
protocol stack
protocol layering
Q.16 What three items are contained in an Ethernet frame? (Choose three.)
source IP address
destination IP address
error-checking information
Q.17 What information is contained in an IP header?
Q.19 A device receives an Ethernet frame and recognizes the MAC address as its own. What
does the device do to the message to get to the encapsulated data?
Q.20 A client has decoded a frame and started the de-encapsulation process. In which order
does the de-encapsulation process occur?
1) remove IP header
2) remove Ethernet header and trailer
3) remove TCP header
4) pass data to the application
It increases complexity.
Q.22 What is the correct order of the layers of the OSI reference model, starting at the lowest
layer and working up the model?
Q.2 What are three advantages of wireless over wired technology? (Choose three.)
more secure
longer range
Q.3 What are two benefits of wireless networking over wired networking? (Choose two.)
speed
security
mobility
Q.4 A technician has been asked to provide wireless connectivity to the wired Ethernet
network of a building. Which three factors affect the number of access points needed? (Choose
three.)
Wireless networks broadcast data over a medium that allows easy access.
Q.6 What does the Wi-Fi logo indicate about a wireless device?
The device is interoperable with other devices of the same standard that also display the
Wi-Fi logo.
cell
antenna
access point
wireless bridge
wireless client
created by connecting multiple wireless basic service sets through a distribution system
Q.10 Refer to the graphic. In the Wireless menu option of a Linksys integrated router, what
does the Network Mode option Mixed mean?
Network Mode
Radio Band
Wide Channel
Standard Channel
SSID Broadcast
Q.12 Which two statements about a service set identifier (SSID) are true? (Choose two.)
all wireless devices on the same WLAN must have the same SSID
Q.13 Which two statements characterize wireless network security? (Choose two.)
With SSID broadcast disabled, an attacker must know the SSID to connect.
An attacker needs physical access to at least one network device to launch an attack.
PSK
WEP
EAP
Q.15 Which statement is true about open authentication when it is enabled on an access
point?
requires no authentication
Q.16 What are two authentication methods that an access point could use? (Choose two.)
WEP
WPA
EAP
ASCII
pre-shared keys
Q.17 What is the difference between using open authentication and pre-shared keys?
Open authentication is used with wireless networks. Pre-shared keys are used with wired
networks.
Pre-shared keys require an encrypted secret word. Open authentication does not require a
secret word.
Pre-shared keys require a MAC address programmed into the access point. Open
authentication does not require this programming.
Q.18 What term describes the encoding of wireless data to prevent intercepted data from
being read by a hacker?
address filtering
authentication
broadcasting
encryption
passphrase encoding
Q.19 What access-point feature allows a network administrator to define what type of data can
enter the wireless network?
encryption
hacking block
traffic filtering
authentication
Q.20 What are the two WEP key lengths? (Choose two.)
8 bit
16 bit
32 bit
64 bit
128 bit
Q.21 Complete the following sentence: WEP is used to ______ , and EAP is used to _____
wireless networks.
fishing
vishing
phishing
spamming
pretexting
junk mailing
by phone
in person
Q.3 While surfing the Internet, a user notices a box claiming a prize has been won. The user
opens the box unaware that a program is being installed. An intruder now accesses the
computer and retrieves personal information. What type of attack occurred?
worm
virus
Trojan horse
denial of service
a set of computer instructions that lies dormant until triggered by a specific event
Q.5 A flood of packets with invalid source-IP addresses requests a connection on the network.
The server busily tries to respond, resulting in valid requests being ignored. What type of
attack occurred?
Trojan horse
brute force
ping of death
SYN flooding
Q.6 What type of advertising is typically annoying and associated with a specific website that
is being visited?
adware
popups
spyware
tracking cookies
Q.7 What is a widely distributed approach to marketing on the Internet that advertises to as
many individual users as possible via IM or e-mail?
brute force
spam
spyware
tracking cookies
Q.8 What part of the security policy states what applications and usages are permitted or
denied?
remote access
acceptable use
incident handling
Only after a virus is known can an anti-virus update be created for it.
Q.10 Which two statements are true concerning anti-spam software? (Choose two.)
Anti-spam software can be loaded on either the end-user PC or the ISP server, but not
both.
Even with anti-spam software installed, users should be careful when opening e-mail
attachments.
Virus warning e-mails that are not identified as spam via anti-spam software should be
forwarded to other users immediately.
Q.11 What term is used to describe a dedicated hardware device that provides firewall
services?
server-based
integrated
personal
appliance-based
Q.12 Which acronym refers to an area of the network that is accessible by both internal, or
trusted, as well as external, or untrusted, host devices?
SPI
DMZ
ISR
ISP
Q.13 Which statement is true about port forwarding within a Linksys integrated router?
Only external traffic that is destined for specific internal ports is permitted. All other traffic
is denied.
Only external traffic that is destined for specific internal ports is denied. All other traffic is
permitted.
Only internal traffic that is destined for specific external ports is permitted. All other traffic
is denied.
Only internal traffic that is destined for specific external ports is denied. All other traffic is
permitted.
Q.14 To which part of the network does the wireless access point part of a Linksys integrated
router connect?
DMZ
external
internal
to prevent outside intruders from attacking the router through the Internet
Q.16 What statement is true about security configuration on a Linksys integrated router?
Q.17 What environment would be best suited for a two-firewall network design?
It identifies MAC and IP addresses that have not been authenticated on the network.
Q.19 Many best practices exist for wired and wireless network security. The list below has one
item that is not a best practice. Identify the recommendation that is not a best practice for
wired and wireless security.
physically securing the cable between the access point and client
Q.21 Refer to the graphic. In the Linksys Security menu, what does the SPI Firewall Protection
option Enabled provide?
Ask the user what URL has been typed and what error message displays.
Q.2 A customer called the cable company to report that the Internet connection is unstable.
After trying several configuration changes, the technician decided to send the customer a new
cable modem to try. What troubleshooting technique does this represent?
top-down
bottom-up
substitution
trial-and-error
divide-and-conquer
Q.3 Only one workstation on a particular network cannot reach the Internet. What is the first
troubleshooting step if the divide-and-conquer method is being used?
Test all cables, and then test layer by layer up the OSI model.
Attempt to Telnet, and then test layer by layer down the OSI model.
Q.4 Which two troubleshooting techniques are suitable for both home networks and large
corporate networks? (Choose two.)
software configuration
ipconfig
ipconfig /all
ipconfig /renew
ipconfig /release
Q.7 What command is used to determine the location of delay for a packet traversing the
Internet?
ipconfig
netstat
nslookup
ping
tracert
Q.8 What command is used to determine if a DNS server is providing name resolution?
ipconfig
netstat
nslookup
tracert
Q.9 Which troubleshooting method begins by examining cable connections and wiring issues?
top-down
bottom-up
substitution
divide-and-conquer
Q.10 A technician suspects that a Linksys integrated router is the source of a network
problem. While troubleshooting, the technician notices a blinking green activity LED on some
of the ports. What does this indicate?
The ports have cables plugged in, but they are not functional.
Q.11 A PC is plugged into a switch and is unable to connect to the network. The UTP cable is
suspected. What could be the problem?
Q.12 Refer to the graphic. What configuration is incorrect in the network shown?
Q.13 Which three settings must match on the client and access point for a wireless connection
to occur? (Choose three.)
SSID
authentication
MD5 checksum
antennae type
encryption key
Q.14 A technician is troubleshooting a security breach on a new wireless access point. Which
three configuration settings make it easy for hackers to gain access? (Choose three.)
configuring NAT
Q.15 Refer to the graphic. The wireless host cannot access the Internet, but the wired host
can. What is the problem?
Q.16 Refer to the graphic. What configuration is incorrect in the network shown?
Q.17 When acting as a DHCP server, what three types of information can an ISR provide to a
client? (Choose three.)
physical address
MAC address
default gateway
static IP address
dynamic IP address
Q.18 What two items could be checked to verify connectivity between the router and the ISP?
(Choose two.)
Q.20 Network baselines should be performed in which two situations? (Choose two.)
Q.21 Typically, help desk personnel assist end users in which two tasks? (Choose two.)
Users have to be present so that they can view LEDs and change cables if necessary.
final resolution
repetitive measures