Documente Academic
Documente Profesional
Documente Cultură
1. A user tries to open a page on the web server at www.cisco.com. The user’s workstation does not have
destination IP address in order to encapsulate the request. Which network topology will provide the
services that are required to associate the name of the web server with an IP address?
Bottom of Form
Top
of
Form
Botto
m of
Form
bps cps Hz MB
subnet mask
Bottom of Form
Top
of
Form
Botto
m of
Form
6. What are two characteristics of a MAC address? (Choose two.)
It is a physical address.
It is cable-based.
to specify the format of requests and responses that are exchanged between
the client and server to assign the logical address and encapsulate the request
into packets for routing to the destination to provide flow control and
acknowledgment of packets that are exchanged between the client and server
8.
Top of Form
TCP/IP data transmission between the source and destination host is de-encapsulated in four steps:
A, C, B, D
B, C, D, A
B, D, C, A
C, A, B, D
Bottom of Form
Top
of
Form
Botto
m of
Form
ARP is used by the switches on the network to build their MAC tables.
ARP is used by the routers on the network to build their routing tables.
ARP is used by hosts to resolve a host name to an IP address for the destination
host.
to prevent collisions
to broadcast messages
13. A home user is looking for an ISP connection that provides high speed digital
transmission over regular phone lines. What ISP connection type should be used?
DSL
dial-up
satellite
cell modem
cable modem
14. After attaching four PCs to the switch ports, configuring the SSID and setting
authentication properties for a small office network, a technician successfully tests
the connectivity of all PCs that are connected to the switch and WLAN. A firewall is
then configured on the device prior to connecting it to the Internet. What type of
network device includes all of the described features?
switch
ISR router
firewall appliance
15. What are two examples of peripheral output devices? (Choose two.)
barcode reader
digital camera
external DVD
headphones
printer
16. Which network design layer provides hosts with initial connectivity to the
network?
access
core
distribution
network
Refer to the exhibit. Assume that the command output is from a wireless DHCP client that is
connected to a Linksys integrated router. What can be deduced from the output?
The DHCP configuration on the router needs to be verified.
18. Which portion of the packet does a router use to forward the packet to the
destination?
source IP address
user data
destination IP address
control information
19. Refer to the exhibit. If H4 sends a message to H1 and the destination MAC address is in the
MAC table for both Switch1 and Switch2, which host devices will receive the message?
only H1
hosts H1 and H4
It increases scalability.
broadcast
multicast
simulcast
unicast
23. What is the default subnet mask for the IP address 128.107.23.10?
28. Which service will translate private internal IP addresses into Internet routable
public IP addresses?
29. Which type of network attack occurs when an unauthorized person tries to
persuade a user to share a network user ID and password?
21 23 53 80
Top of Form
32. Which statement is true about packet filtering?
It recognizes and filters specific types of attacks.
video card
sound card
internal modem
35. What type of computer would most likely use a docking station?
ipconfig /all
ipconfig /flushdns
ipconfig /renew
ipconfig
37. When would infrared be used to connect network devices?
when updating two access points that are located in separate buildings
38. Refer to the exhibit. What is a possible reason that the PC is unable to ping the default
gateway IP address?
The PC is on a different network than the default gateway.
Because the correct cable types are used for each segment, a bad cable could be the problem.
39. What is a weakness of WEP that is solved by WPA?
WEP keys are only 64 bits long whereas WPA keys are 128 bits long.
WEP uses the same key for every connection whereas WPA uses a different key
for each connection.
WEP uses a fixed length key for every connection whereas WPA uses a different
key length for each connection.
It connects the pins that are used for receiving on one router to the pins that are
used for receiving on the other router.
It connects the pins that are used for transmitting on one router to the pins that
are used for receiving on the other router.
It disconnects the transmit pins and uses only the receive pins.
Top of Form
41. Refer to the graphic. What is the purpose of assigning a Network Name of Academy?
It identifies the wireless LAN.
It encrypts data between the wireless client and the access point.
43. What is an advantage of selecting an operating system that has a GPL license
over one with a commercial license?
The GPL license-based operating system ensures that everyone can participate
in the enhancement of the product.
Top of Form
44. What is a characteristic of Bluetooth wireless technology?
It allows one-to-many connections.
45. What destination IP address does a DHCP client use to send the initial DHCP
Discover packet when looking for a DHCP server?
46. Which two causes of networking problems are related to the physical layer?
(Choose two.)
overheated components
Top of Form
47. What two pieces of information should a help desk technician document while
troubleshooting connectivity issues with an end user? (Choose two.)
the CPU clock speed of the computer
Top of Form
49. Refer to the exhibit. The wired and wireless hosts can connect to each other but not to the
Internet. All cabling and interface indicator lights appear to be in order. What is the most
effective next step in a bottom-up troubleshooting process?
Verify DNS configurations