Sunteți pe pagina 1din 15

Generated by Foxit PDF Creator © Foxit Software

http://www.foxitsoftware.com For evaluation only.

1 What two commands can be used to form a new binding if client information
does not agree with the DHCP client table? (Choose two.)
ipconfig /release
ipconfig /all
ipconfig /flushdns
ipconfig /renew
ipconfig

2 What statement describes the filtering of traffic via the use of Stateful Packet
CLASS DH05 –HV CÔNG NGHỆ THÔNG TIN BACKS KHOA HÀ NỘI

Inspection?
It recognizes and filters predefined URLs
It permits access that is based on the application.
It permits access based on IP or MAC addresses.
It permits incoming packets that are legitimate responses to requests from
internal hosts.
It translates an internal address or group of addresses into a public address
that is sent across the network.

3 What destination IP address does a DHCP client use to send the initial DHCP
Discover packet when looking for a DHCP server?
127.0.0.1
224.0.0.1
255.255.255.255
the IP address of the default gateway

4 Which two statements are true about network applications? (Choose two.)
Microsoft Word is an example of a network application.
Network applications are accessible from a remote computer.
Network applications are installed on a special type of computer that supports
only network applications.
Network applications are installed on a network server.
Network applications are accessible by one computer at a time.

A user in a small office is unable to connect to the Internet. The user examines
the physical connections to the ISR, a Linksys WRT300N, and notices a solid
green LED on the port that is wired to the computer. What does the LED indicate
5 about the current state of the port?
The ISR is making adjustments to the port.
The device is plugged in and traffic is flowing.
The computer is plugged in but no traffic is flowing.
The ISR does not detect that the computer is plugged in.
Generated by Foxit PDF Creator © Foxit Software
http://www.foxitsoftware.com For evaluation only.

6
CLASS DH05 –HV CÔNG NGHỆ THÔNG TIN BACKS KHOA HÀ NỘI

Refer to the exhibit. A small office uses an ISR to provide connectivity for both
wired and wireless computers. One day, a sales person who is using a laptop
cannot connect to Server1 through the wireless network. A network technician
attempts to determine if the problem is on the wireless or the wired network.
The technician pings successfully from the wireless laptop to the default gateway
IP address on the ISR. What should be the next troubleshooting step?
Ping from the laptop to PC1.
Ping from Server1 to PC1.
Ping from Server1 to its gateway IP address.
Ping from the laptop to the Ethernet port on the cable modem.
Generated by Foxit PDF Creator © Foxit Software
http://www.foxitsoftware.com For evaluation only.

7
CLASS DH05 –HV CÔNG NGHỆ THÔNG TIN BACKS KHOA HÀ NỘI

Refer to the exhibit. A new switch is connected to an existing switch that has a
fully populated MAC table. PC1 requires the destination MAC address of PC3
in order to send a message. Which device or devices will see the ARP sent by
PC1?
only PC3
PC2 and PC3
PC3 and PC4
PC2, PC3 and PC4

Refer to the exhibit. If H4 sends a message to H1 and the destination MAC


address is in the MAC table for both Switch1 and Switch2, which host devices
will receive the message?
only H1
hosts H1 and H4
all hosts that are connected to Switch1
all hosts that are connected to Switch1 and Switch2
Generated by Foxit PDF Creator © Foxit Software
http://www.foxitsoftware.com For evaluation only.

9 What is the purpose of creating a DMZ during network firewall implementation?


to create a server security zone accessible only to internal clients
to create a dirty zone that allows all inbound and outbound traffic
to allow for a publicly accessible zone without compromising the internal
network
to specify a higher security level than normally required for the internal
production network

10 Which two automatic addressing assignments are supported by DHCP?


(Choose two.)
local server address
CLASS DH05 –HV CÔNG NGHỆ THÔNG TIN BACKS KHOA HÀ NỘI

subnet mask
default gateway address
physical address of the recipient
physical address of the sender

11 What does the term "attenuation" mean in data communication?


loss of signal strength as distance increases
time for a signal to reach its destination
leakage of signals from one cable pair to another
strengthening of a signal by a networking device

12 What component of a personal computer is responsible for the processing of


all data?
CPU
RAM
firewall
system bus
operating system
Generated by Foxit PDF Creator © Foxit Software
CLASS DH05 –HV CÔNG NGHỆ THÔNG TIN BACKS KHOA HÀ NỘI http://www.foxitsoftware.com For evaluation only.

Refer to the exhibit. An educational institution needs to connect PC systems


13 that use private IP addressing to the Internet. They have multiple systems that
need to access the Internet, but were only able to purchase one public IP address.
What should be activated on the Linksys integrated router to achieve this goal?
authentication
DHCP
encryption
firewall
NAT
WEP

14 What is one function of network devices in the distribution layer of a hierarchical


network design?
They control the traffic between independent local networks.
They control the traffic between individual hosts.
They control the traffic between multiple companies.
They switch data packets as fast as possible.

15 Because of an increasing number of users, bandwidth per user on a WLAN has


decreased to a point where users are complaining about poor performance.
What can be done to improve the user experience?
Increase the AP radio signal strength.
Place the AP in a more central location.
Deploy an external omni-directional antenna.
Reduce the number of devices using each channel.
Generated by Foxit PDF Creator © Foxit Software
http://www.foxitsoftware.com For evaluation only.

16 What destination port number would be used if a client wished to establish a


secure connection to a web server?
21
53
80
443

17 Which two values represent the network number and default mask for the address
209.165.200.225? (Choose two.)
CLASS DH05 –HV CÔNG NGHỆ THÔNG TIN BACKS KHOA HÀ NỘI

209.0.0.0
209.165.0.0
209.165.200.0
255.0.0.0
255.255.0.0
255.255.255.0

18 Which adapter card would be required for a PC to exchange information with


other PCs on a LAN?
NIC
video card
sound card
internal modem

19 What are two characteristics of a MAC address? (Choose two.)


It indicates the physical location of the host within the network.
It is dynamically assigned by a DHCP server.
It is displayed in HEX characters.
It is a physical address.
It is cable-based.

20 After issuing the ipconfig/all command on a host that has DHCP enabled,
a network administrator notes that the output contains faulty IP configuration
information. What is the first step the administrator should take to resolve this
issue?
Replace the NIC in the host.
Change the IP address of the DHCP server.
Use static addressing to assign the correct IP address.
Use the release and renew options supported by the ipconfig command.
Generated by Foxit PDF Creator © Foxit Software
http://www.foxitsoftware.com For evaluation only.

21 Which diagram correctly represents the Ethernet frame format?


CLASS DH05 –HV CÔNG NGHỆ THÔNG TIN BACKS KHOA HÀ NỘI

22 What type of computer would most likely use a docking station?


laptop
server
desktop
mainframe
workstation

23 Which network entity would most likely be configured as both a DHCP client and
a DHCP server?
ISP
desktop PC
wireless laptop
PC-based server
integrated services home router
Generated by Foxit PDF Creator © Foxit Software
http://www.foxitsoftware.com For evaluation only.

24 Which protocol is used to transfer files among network devices and perform
file-management functions?
DNS
FTP
HTML
HTTP
CLASS DH05 –HV CÔNG NGHỆ THÔNG TIN BACKS KHOA HÀ NỘI

25 Which protocol in its default configuration downloads e-mail messages to the


client computer and deletes them from the server?
FTP
POP3
SMTP
IMAP4

26 For devices that do not autosense, which connection requires a crossover cable?
hub port to router port
PC to hub port
PC to switch port
PC port to PC port

27 What is one purpose of using logical addresses in an IP network?


They identify a specific NIC on a host device by assigning a permanent
logical address.
They are used to determine which host device accepts the frame.
They provide vendor-specific information about the host.
They are used to determine the network that the host is located on.
They are used by switches to make forwarding decisions.

28 Under what circumstance would it be appropriate to use private IP addresses?


for communication between two ISPs
for a network that is directly connected to the Internet
for addresses that are used exclusively within an organization.
for a host with more than one direct connection to the Internet

29 What two pieces of information should a help desk technician document while
troubleshooting connectivity issues with an end user? (Choose two.)
the CPU clock speed of the computer
the number of network jacks that are in the room
Generated by Foxit PDF Creator © Foxit Software
http://www.foxitsoftware.com For evaluation only.
if the user can ping the default gateway address
if the word processing software is installed correctly
whether the PC uses dynamic or static IP addressing

30 What wireless technology has the ability to communicate with many devices at
the same time, makes use of the 2.4 GHz band, and is limited to low-speed,
short-range communications?
RF
ISM
infrared
CLASS DH05 –HV CÔNG NGHỆ THÔNG TIN BACKS KHOA HÀ NỘI

Bluetooth

31 Which two transport layer protocols enable hosts to communicate and transfer
data? (Choose two.)
DHCP
ICMP
IP
TCP
UDP

32 Which two IP configuration components does the computer use to identify its
subnetwork? (Choose two.)
default gateway
IP address
MAC address
DNS server address
subnet mask

33 As an assignment, a computer science student needs to present data in


binary format. What are the two possible values that the student can use?
(Choose two.)
0
1
2
A
F
Generated by Foxit PDF Creator © Foxit Software
http://www.foxitsoftware.com For evaluation only.

Refer to the exhibit. What is the effect of setting the security mode to WEP on the
CLASS DH05 –HV CÔNG NGHỆ THÔNG TIN BACKS KHOA HÀ NỘI

Linksys integrated router?


34
WEP identifies the wireless LAN.
WEP allows the access point to inform clients of its presence.
WEP translates IP addresses into easy-to-remember domain names.
WEP encrypts data between the wireless client and the access point.
WEP ensures that only authenticated users are allowed access to the WLAN.
WEP translates an internal address or group of addresses into an outside,
public address.

35 Which term is associated with logical addressing?


IP addresses
port addresses
physical addresses
Media Access Control addresses

36 What is the default subnet mask for the IP address 128.107.23.10?


255.0.0.0
255.255.0.0
255.255.255.0
255.255.255.255

37 A computer joins the network and announces itself to all hosts on the LAN.
What type of message does the computer send out?
broadcast
simulcast
multicast
unicast
Generated by Foxit PDF Creator © Foxit Software
http://www.foxitsoftware.com For evaluation only.

38

Refer to the exhibit. The security policy of an organization allows employees to


CLASS DH05 –HV CÔNG NGHỆ THÔNG TIN BACKS KHOA HÀ NỘI

connect to the office intranet from their homes. Which type of security policy is this?
acceptable use
incident handling
network maintenance
remote access

39 A network technician is required to provide access to the Internet for a large


company. What is needed to accomplish this task?
ISP
private IP addresses for each host
static IP addresses for each host
DHCP server
Generated by Foxit PDF Creator © Foxit Software
http://www.foxitsoftware.com For evaluation only.

40

Refer to the exhibit. Assume that the exhibited output is from a host that is
CLASS DH05 –HV CÔNG NGHỆ THÔNG TIN BACKS KHOA HÀ NỘI

connected to a Linksys integrated router. What is the first thing that should be
checked if using a bottom-up troubleshooting approach?
the default gateway on the host
the IP address on the host
the IP address on the router
the link status LED on the front of the router
the subnet mask on the host

41 The area covered by a single AP is known as what?


ad-hoc network
basic service set
independent basic service set
extended service set
distribution system

42 A network designer is working with a small company to determine the network


type best suited to the needs of the company. Which two characteristics could
the designer use to describe a peer-to-peer network to the owner of the company?
(Choose two.)
central administration
easy to install
low cost
scalable
secure

43 What is true about a wireless access point that is equipped with an omnidirectional
antenna?
concentrates signal in one direction
typically used in bridging applications
radiates the signal equally in all directions
provides the greatest transmission distance of all antenna types that are used
by APs
Generated by Foxit PDF Creator © Foxit Software
http://www.foxitsoftware.com For evaluation only.

44 What are two advantages of purchasing a custom-built computer? (Choose two.)


usually a lower cost
no waiting period for assembly
user can specify higher performance components
supports higher-end graphics and gaming applications
fewer components to replace

45
CLASS DH05 –HV CÔNG NGHỆ THÔNG TIN BACKS KHOA HÀ NỘI

Refer to the exhibit. A PC is requesting a web page from a server on the Internet
through a router running NAT. What combination of destination IP address and
destination port number will the web server use when replying to this request?
64.100.15.2, 38459
64.100.15.2, 49159
172.16.4.6, 38459
172.16.4.6, 49159

46 What are two examples of peripheral input devices? (Choose two.)


external modem
barcode reader
digital camera
plotter
printer

47 What is the purpose of pop-up blocker software?


It detects and removes spyware.
It detects and removes viruses.
It prevents the display of advertisement windows.
It removes unwanted e-mail.
Generated by Foxit PDF Creator © Foxit Software
http://www.foxitsoftware.com For evaluation only.

48 How do ISPs obtain public IP addresses?


They create the addresses themselves.
They obtain the addresses from the home PCs.
They obtain the addresses from the Internet registry.
They obtain the addresses from the RFC.

49 How does a crossover cable make it possible for two "like devices"
(for example, two switches) to communicate?
The transmit pins are disconnected and only the receive pins are used.
The transmit pins on one device are connected to the transmit pins on the
other device.
CLASS DH05 –HV CÔNG NGHỆ THÔNG TIN BACKS KHOA HÀ NỘI

The receive pins on one device are connected to the receive pins on the
other device.
The transmit pins on one device are connected to the receive pins on the
other device.

50

Refer to the graphic. What is the purpose of assigning a Network Name of


Academy?
It identifies the wireless LAN.
It translates IP addresses into easy-to-remember domain names.
It encrypts data between the wireless client and the access point.
It allows access to the AP configuration GUI by name rather than address.
It translates an internal address or group of addresses into an outside, public
address.

51 What is the function of the DNS server?


It assigns IP addresses to clients.
It accepts HTTP requests from clients.
It manages the domain that clients are assigned to.
It maps a hostname to a corresponding IP address.
Generated by Foxit PDF Creator © Foxit Software
http://www.foxitsoftware.com For evaluation only.

52 Which type of network supports DHCP and DNS services for network users in
a network domain?
client/server
peer-to-peer
hierarchical
ad hoc
CLASS DH05 –HV CÔNG NGHỆ THÔNG TIN BACKS KHOA HÀ NỘI

S-ar putea să vă placă și