Sunteți pe pagina 1din 3

1. Refer to the exhibit. Assume that the 12.

What is an advantage of selecting an user data


exhibited output is from a host that is operating system that has a commercial destination IP address
connected to a Linksys integrated router. license over one with a GPL license? control information
What is the first thing that should be The commercial license-based operating system destination MAC address
checked while using a bottom-up ensures full access to the source code for
troubleshooting approach? everyone.
the default gateway on the host The commercial license-based operating system
the IP address on the host ensures that everyone can participate in the
the IP address on the router enhancement of the product.
the link status LED on the front of the router The commercial license-based operating
the subnet mask on the system provides structured support.
The commercial license-based operating system is
2. What layer is the first point of entry for a released free of charge. 21.
host into the network?
core layer 13.A user is unable to send e-mail. While
access layer * troubleshooting this problem, the network
network layer technician first verifies the physical
distribution layer connectivity of cables. Which
troubleshooting approach is being followed?
3.Which type of computer uses an integrated bottom-up
monitor and keyboard? divide-and-conquer
pocket PC top-down
laptop * trial and error
mainframe
server 15. Select the connection that would require
workstation a straight-through cable.
a switch to a hub
4.What is the function of CSMA/CA on a a router to a switch Refer to the exhibit. Host2 attempts to
wireless Ethernet network? a switch to a switch establish communications with Server1.
to prevent collisions * (Carrier sense a router to a router What action will switch SW1 take prior to
multiple access with collision avoidance) forwarding the frame?
to broadcast messages
to select the least congested channel flood the frame out all interfaces
16. learn the MAC address that is associated
to establish an ACK between devices
with Host2
5. All hosts within a domain receive the
same frame that originates from one of the assign a MAC address to Host2 from the MAC
devices. The domain is also bounded by table
routers. What type of domain is this? poll all interfaces to learn their assigned IP
broadcast * addresses
collision
local 22.
multicast
Refer to the graphic. What feature can be
6. Which three address ranges can be used to
installed on the Linksys integrated
depict private IP addresses? (Choose three.)
router to convert private IP addresses to
10.0.0.0 to 10.0.0.255 *
Internet-routable addresses?
127.16.0.0 to 127.16.255.255
150.150.0.0 to 150.150.255.255
authentication
172.16.1.0 to 172.16.1.255*
DHCP
192.168.22.0 to 192.168.22.255 *
encryption
200.100.50.0 to 200.100.50.255
firewall Refer to the exhibit. Which statement is
NAT true based on the information that is
7.What is the default subnet mask for the IP
WEP shown in the exhibit?
address 198.133.219.4?
255.0.0.0
17. What are two functions of MAC All wireless devices that are connected
255.255.0.0
addresses in a LAN? (Choose two.) to this AP must have an assigned SSID of
255.255.255.0
to allow the transfer of frames from source University.
255.255.255.255
to destination Any wireless client that is attached to this AP
to determine which host has priority to transfer must have the same IP address and SSID.
8. Which two statements are characteristics of
data The AP is not physically wired to the local
DHCP services? (Choose two.)
to indicate the best path between separate LAN.
A DHCP client determines the lease time for using
networks This configuration is found only in an ad hoc
the IP address that is supplied by
to associate with a specific network IP address wireless network.
the DHCP server.
to uniquely identify a node on a network
23. Before implementing a stateful firewall
An integrated router acts as the DHCP server
18. When is the use of a DSL modem on an ISR router, a network engineer is
to provide the IP address to the ISP.
necessary? asked to explain to upper management in
DHCP clients send a DHCP Discover message to
simple terms what a stateful firewall is.
the destination IP address of
when a cellular telephone provides the Which description should the engineer use?
255.255.255.255.
service
The DHCP server maps the IP addresses to host
when a high-speed connection is provided A stateful firewall is only available on a firewall
names.
over a cable TV network appliance.
The integrated router acts as a DHCP server
when a high-speed digital connection is A stateful firewall blocks or permits access based
for internal hosts on local networks.
required over the regular telephone line only on applications.
when a satellite dish is used A stateful firewall bases its analysis only on IP
9. A learner wants to interact with the
address, port number, and MAC address.
operating system of a computer. Which two
19. A network designer is working with a A stateful firewall can be configured to allow
methods can be used for this? (Choose two.)
small company to determine the network incoming packets only from sessions that
CLI
type best suited to the needs of the are initiated from inside.
GUI
company. Which two characteristics could
kernel
third party software the designer use to describe a peer-to-peer
network to the owner of the company? 24. What is the purpose of creating a DMZ
shell
(Choose two.) during network firewall implementation?
10. Refer to the exhibit. What is the effect of to create a server security zone accessible only to
setting the security mode to WEP on the central administration internal clients
easy to install to create a dirty zone that allows all inbound and
Linksys integrated router?
The WEP security mode enables the AP to inform low cost outbound traffic
scalable to allow for a publicly accessible zone
clients of its presence.
The WEP security mode encrypts network secure without compromising the internal network
traffic during transmission between the AP to specify a higher security level than normally
and the wireless client. required for the internal production network
The WEP security mode generates a dynamic key 20. Which part of a data packet is used
each time a client establishes a connection with by a router to determine the destination 25. Which installation option enables a
the AP. network? single physical resource to function
The WEP security mode identifies the WLAN. simultaneously as multiple logical
resources?
source IP address
clean install each wire pair?
multi-boot • minimizes crosstalk
upgrade • makes installation faster
virtualization • ensures wires are in correct order
• makes it easier to fit wires into connector

26. What are two examples of storage 33. What is the purpose of spam filter
peripheral devices? (Choose two.) software?
printer It detects and removes spyware.
flash drive It detects and removes viruses.
headphones It prevents the display of advertisement windows.
external DVD It examines incoming e-mail messages to
barcode reader identify the unsolicited ones.

34. The area covered by a single AP is known


as what?
ad-hoc network
basic service set
independent basic service set
extended service set
distribution system

35. Which two IP configuration components DNS SERVER


27
does the computer use to identify its
subnetwork? (Choose two.) 40. What is the maximum number of bytes
default gateway that is allowed in a standard IEEE 802.3
IP address Ethernet frame?
MAC address 64
DNS server address 1024
subnet mask 1518
4096
36. Which two statements are true about
network applications? (Choose two.) 41.

Microsoft Word is an example of a network


Refer to the exhibit. When www.cisco.com is application.
entered in a browser window on a PC, the Network applications are accessible from a
web page is unavailable. While remote computer.
troubleshooting this problem, the network Network applications are installed on a special
technician executes the nslookup command type of computer that supports only network
as well as the ping command to the web applications.
server. What is the likely reason that the Network applications are installed on a Refer to the exhibit. H1 can ping H2, H3, and
web server home page cannot be displayed? network server. the Fa0/0 interface of router R1. H2 and H3
Network applications are accessible by one but not H1 can ping H4 and H5. What is a
The DNS server service needs to be installed on computer at a time. possible cause for theH1 failure?
the PC.
Router R1 has no route to the destination
A DNS server is not available to resolve the 37. A network administrator is planning an network.
name. inexpensive WLAN implementation at a small Switch S1 does not have an IP address
The reason that the web server is unable to business site. Which two strategies should configured.
display the web page is that the web server is be included in the site survey? (Choose two.) The link between router R1 and switch S2 has
unavailable.
failed.
The increased response time displayed in thep i n Identify the locations of sources of Host H1 does not have a default gateway
g may indicate a delay in server response time. interference. configured
Hire a WLAN analysis firm to survey the site.
28. What is the meaning of the term Deploy all APs and move them if necessary to
crosstalk? improve coverage.
Use a wireless laptop to verify WLAN
interference of signals between wire pairs coverage in the work areas.
damage of the signal when two bare wires touch Employ sophisticated specialized equipment to
strengthening of a signal by a networking device measure signal strengths and interference
loss of signal strength as distance increases
38. Because of an increasing number of
29. . Which two statements correctly users, bandwidth per user on a WLAN has 42.
describe Media Access Control (MAC) decreased
addresses? (Choose two.) to a point where users are complaining Refer to the exhibit. A new switch is
• MAC addresses are used to identify a about poor performance. connected to an existing switch that has a
specific NIC. fully populated MAC table. PC1 requires the
• MAC addresses are physical addresses. What can be done to improve the user destination MAC addressof PC3 in order to
• MAC addresses contain a network number and experience? send a message. Which device or devices
unique host identification. Increase the AP radio signal strength. will see the ARP sent by PC1?
• MAC addresses are always assigned to network Place the AP in a more central location.
devices by a network administrator. Deploy an external omni-directional antenna. only PC3
• MAC addresses can be dynamically assigned Reduce the number of devices using each PC2 and PC3
channel PC3 and PC4
30. Choose the option that shows the correct PC2, PC3 and PC4
sequence of steps in the encapsulation of 39. A user tries to open a page on the web
TCP/IP data that is passed from a source to a server at www.cisco.com. The user’s 43.
destination host? workstation does not have the destination
A. converts data to bits for transmission IP address in order to encapsulate the
B. packages the data for end to end transport request. Which network topology will
C. adds the data-link header and trailer provide the services that are required to
D. adds the network IP address to the header of associate the name of the web server with
the frame an IPaddress?
• A,B,C,D
• A,C,D,B
• B,D,C,A
• B,C,D,A
• D,C,B,A Refer to the exhibit. A user sets up a home
network and uses a crossover cable from
31. What does the term "attenuation" mean Switch1 to the Internet port on the ISR.
in data communication? However, there is noconnection between the
• loss of signal strength as distance host H1 and the server. What should the
increases user do in order to establish a connection?
• time for a signal to reach its destination
• leakage of signals from one cable pair to another Replace the cable with a console cable.
• strengthening of a signal by a networking device Replace the cable with a rollover cable.
Replace the failed crossover cable with a working
32. When terminating UTP cabling, why is it crossover cable.
important to untwist only a small amount of
Replace the cable with a straight-through
cable

44. Under what circumstance would it be


appropriate to use private IP addresses?
for communication between two ISPs
for a network that is directly connected to the
Internet
for addresses that are used exclusively
within an organization.
for a host with more than one direct connection to
the Internet

45. A system administrator routinely


monitors failed login attempts on a server. If
the administrator sees an extremely high
number of failed attempts bya single user
who is trying multiple password
combinations, what type of attack is in
progress?

brute force
phishing
SYN flood
Virus
Vishing

46. Which portion of a received datagram

is decoded and used by the internetwork


layer of the TCP/IP model?

IP address
port number
MAC address
HTML/user data

47. A user is unable to send e-mail. While


troubleshooting this problem, the network
technician first verifies the physical
connectivity of cables. Whichtroubleshooting
approach is being followed?

The problem would be referred to an onsite


technician.
The problem would be escalated to a higher
level helpdesk staff member.
The first-level helpdesk staff would go to the user
worksite to perform diagnostics.
The first-level helpdesk staff would remotely take
control of the user system to perform diagnostics.
The first-level helpdesk staff would use online
integrated diagnostics software to solve the
problem

48. What is a characteristic of Bluetooth


wireless technology?

It allows one-to-many connections.


It operates in the 5GHz radio frequency band.
It is unable to penetrate walls with a useable
signal.
It can be used for communications beyond 100
meters

49. What is the function of a physical


topology map?

records IP addressing of each host


records hostnames and applications
organizes groups of hosts by how they use the
network
shows where wiring is installed and the
locations of network devices

S-ar putea să vă placă și