Você está na página 1de 31

1-Which of the following OSI layers offers reliable, connection-oriented data co

mmunication services?
application
presentation
session
*transport
network
--------------------------------------------------------------------
2-Router interface Ethernet 0 has been assigned the IP address 10.172.192.168 25
5.255.255.240. What is the network IP address of this interface?
10.0.0.0
10.172.0.0
10.172.192.0
*10.172.192.160
10.172.192.168
10.172.192.175
--------------------------------------------------------------------
3-Examine the graphic with current configurations. The New York Offices of ABC C
ompany recently upgraded the computers in the administrative office. Shortly aft
er the upgrade, Host A in the clerical office failed and was replaced with one o
f the retired administrative office computers. However, the computer can not acc
ess the company network in the new location. What is the likely cause of this ne
twork access issue for Host A?
MAC address incorrectly entered
*default gateway incorrectly entered
subnet mask incorrectly entered
IP address incorrectly entered
----------------------------------------------------------------------
4-Which of the following increases the potential for a collision to occur?
the use of an active hub instead of an intelligent hub
the use of an intelligent hub instead of an active hub
a reduction in the number of devices attached to the hub
*an increase in the number of devices attached to the hub *
--------------------------------------------------------------------
5-What is attenuation?
opposition to the flow of current
measurement of electrical signals relative to time
*degradation of a signal as it travels along the medium
amount or volume of traffic that is flowing on the medium
--------------------------------------------------------------------
6-Two peer hosts are running applications that exchange data using UDP. During t
he current session, a datagram fails to arrive at the destination. What is true
concerning the retransmission of the datagram?
Datagram retransmission occurs when the retransmission timer expires in the sour
ce host.
Datagram retransmission occurs when the retransmission timer expires in the dest
ination host.
*Datagram retransmission is controlled by the application layer protocol.
Datagram retransmission involves only the data with sequence numbers equal to or
higher than the sequence number of the current datagram.
--------------------------------------------------------------------
7-What is significant about the ping 127.0.0.1 command?
*It verifies the operation of the TCP/IP protocol stack on a host and is called
an internal loopback test.
It verifies connection to the remote host with the IP address 127.0.0.1.
It verifies whether the router that connects the local network to other networks
can be reached.
It verifies the route packets take between the local host and the host with the
IP address 127.0.0.1.
8-Which LAN switching mode has the highest latency?
fast forward
fragment-free
latency forwarding
*store-and-forward
--------------------------------------------------------------------
9-Which of the following application layer protocols use UDP segments? (Choose t
wo.)
*DNS
FTP
Telnet
*TFTP
SMTP
--------------------------------------------------------------------
10-Which cable specifications are indicated by 100BASE-T?
100-Mbps transmission speed, baseband signal, coaxial cable
100-Mbps transmission speed, broadband signal, twisted-pair cable
*100-Mbps transmission speed, baseband signal, twisted-pair cable
Equal to 10-Gbps transmission speed, baseband signal, twisted-pair cable
--------------------------------------------------------------------
11-When is a crossover cable used in a network?
when connecting a host to the router console port
when connecting a host to a switch
*when connecting a host to a host
when connecting a switch to a router
------------------------------------------------------------------
12-Refer to the graphic. What must be configured on Host A to allow it communica
te with the e-mail server? (Choose three.)
IP address *
subnet mask *
default gateway *
router name
switch name
NetBIOS name address
--------------------------------------------------------------------
13-Which cable diagram displays the end to end pinout for a crossover cable used
with Cisco devices?
Cable A
Cable B
*Cable C
Cable D
--------------------------------------------------------------------
14- Which type of address is 192.168.17.134/29?
*host address
network address
broadcast address
multicast address
----------------------------------------------------------------------
15-How many collision domains are shown in the diagram?
three
four
five
six
*seven
eight
--------------------------------------------------------------------
16-When is a straight-through cable used in a network?
when connecting a router through the console port
when connecting one switch to another switch
*when connecting a host to a switch
when connecting a router to another router
--------------------------------------------------------------------
17-How does network cable length affect attenuation?
Category 5 cable that is run in metal conduit has the highest attenuation in the
shortest distance.
Shorter cable lengths have greater signal attenuation.
*Longer cable lengths have greater signal attenuation.
The length of the cable has no effect on signal attenuation.
--------------------------------------------------------------------------------
----
18-Which of the following statements are correct about CSMA/CD? (Choose three.)
It is a media access method used in LANs. *
It is a media access method used in FDDI WANs.
When a device needs to transmit, it checks to see if the media is available. *
A device sends data without checking media availability because all devices have
equal access. Multiple devices can successfully transmit simultaneously.
*Only one device can successfully transmit at a time.
--------------------------------------------------------------------
19- Which of the following must be present for current to flow? (Choose three.)
*closed loop
bit-generating device
insulating material
*source of voltage
*load
switch
--------------------------------------------------------------------
20-If Host A pings Host B through a newly installed switch with no entries in th
e MAC address table, which stations will receive the ping packet?
B only
A and B
B and switch
A, B, and switch
B, C, D, and switch *
A, B, C, D, and switch
----------------------------------------------------------------------
21-Which devices shown in the graphic must have a MAC address?
only PC
only router
PC and router
PC, hub, and router
*PC, printer, and router
--------------------------------------------------------------------
22-What kind of connection is represented in the graphic?
*console connection
Ethernet connection
ISDN connection
leased line connection
--------------------------------------------------------------------
23-Which of the following is the decimal representation of the binary number 110
10011?
203
204
*211
212
--------------------------------------------------------------------
24-Which type of cable is required to make a connection between a router console
port and a PC COM port?
straight-through cable
crossover cable
*rollover cable
DB-9 cable
coaxial cable
25-Determine the number of useable networks and hosts for the IP address 192.168
.50.0/27
4 networks / 62 hosts
6 networks / 64 hosts
32 networks / 8 hosts
*6 networks / 30 hosts
8 networks / 32 hosts
2 networks / 8 hosts
--------------------------------------------------------------------
26-A network administrator is placing an older router back in to service. The ad
ministrator discovered that the IOS and configuration files need to be updated t
o meet the LAN specifications. Which application layer protocol is used to trans
fer the new configuration files into the router memory?
SNMP
SMTP
HTTP
*TFTP
--------------------------------------------------------------------
27-Which of the following best describes Spanning Tree Protocol?
It enables a network to span across multiple physical segments.
*It enables a switch to eliminate switching loops.
It enables a switch to dynamically choose the best switch mode.
It enables a switch to perform as a router.
--------------------------------------------------------------------
28-Which of the following subnet masks could be used when subnetting a Class B I
P address? (Choose two.)
255.0.0.0
*255.255.0.0
255.192.255.0
255.224.0.0
*255.255.252.0
255.255.255.128
--------------------------------------------------------------------
29-How is data encapsulated as it is moved down the OSI model?
data, segments, frames, packets, bits
data, packets, segments, frames, bits
*data, segments, packets, frames, bits
data, packets, frames, segments, bits
--------------------------------------------------------------------
30-Which of the following describes latency?
the noise generated from outside a cable
the degradation of a signal as it travels along the media
the time required for a NIC to place a frame on the network media
*the delay between the time a frame leaves its source device and reaches its des
tination
--------------------------------------------------------------------
31-Which of the following is the binary representation of the decimal number 111
?
*01101111
01111101
11110111
11101101
--------------------------------------------------------------------
32-Which LAN switching mode begins switching after reading only the first 64 byt
es of the frame?
fast forward
*fragment-free
latency forwarding
store-and-forward
-----------------------------------------------------------------
33-When using Category 5 UTP cable, which RJ-45 pin pairs are used to exchange d
ata between hosts on an Ethernet network?
1 and 2; 4 and 5
1 and 2; 3 and 6 *
3 and 6; 7 and 8
4 and 5; 7 and 8
--------------------------------------------------------------------
34-Which of the following commands could be used on a Windows-based computer to
view the current IP configuration of the system? (Choose two.)
configip
ifconfig
*ipconfig
*winipcfg
winipconfig
--------------------------------------------------------------------
35-Which type of address is 192.168.17.111/28?
host address
network address
*broadcast address
multicast address
------------------------------------------------------------------
36
Which of the following networking devices increase the number of collision domai
ns? (Choose three.)
*switch
hub
*router
repeater
*bridge
--------------------------------------------------------------------
37-What information can be determined from the MAC addresses of PC1, PC2, and PC
3, as shown in the graphic? (Choose two.)
PC1 and PC2 NICs need to be replaced because they have the same OUI identifier.
PC2 and PC3 NICs need to be replaced because they have different OUI identifiers
.
*PC1 and PC2 NICs are from the same vendor.
PC1 and PC3 NICs need to be replaced because they have the same vendor-assigned
address.
*PC2 and PC3 NICs are from different vendors.
PC2 and PC3 NICs are from the same vendor.
--------------------------------------------------------------------
38-Which of the following are considered WAN technologies? (Choose two.)
*DSL
Ethernet
Wireless Ethernet
*T1-Carrier
Token Ring
-----------------------------------------------------------------
39-which one of the router connectors shown in the graphic would be used for a L
AN connection?
Connector A
Connector B
*Connector C
Connector D
--------------------------------------------------------------------
40-How is full-duplex capability typically achieved in fiber-optic cable?
*Two fibers are encased in separate sheaths.
Light is bounced at different rates in opposite directions.
Transmit speeds are so high that half-duplex is acceptable.
Colors of the light spectrum are separated into transmit and receive streams.
--------------------------------------------------------------------
41-Which of the following are characteristics of IP? (Choose three.)
connection-oriented protocol
connectionless protocol*
reliable protocol
unreliable protocol *
routed protocol *
routing protocol
--------------------------------------------------------------------
42
Which of the following describe the token-passing logical topology? (Choose two.
)
*FDDI is an example of a token-passing network.
Token-passing logical topologies must also be physical ring topologies.
One of the disadvantages of the token-passing logical topology is the high colli
sion rate.
Computers transmit data after "listening" to the wire to detect other traffic.
*Computers are allowed to transmit data only when they possess a token.
--------------------------------------------------------------------------------
------------------
43-What is the maximum length of a media segment used for 100BASE-TX?
*100 meters
185 meters
400 meters
500 meters
--------------------------------------------------------------------
44-which of the following networking devices divide a network into separate coll
ision domains? (Choose two.)
repeater
*bridge
*switch
AUI
hub
--------------------------------------------------------------------
45-Which of the following are characteristics of UTP cable? (Choose three.)
*Each wire is covered by insulating material.
It is not affected by EMI or RFI.
*It is a four-pair wire medium.*
It is difficult to terminate the cable.
*It relies on the cancellation effect produced by the twisted wire pairs.
It is more expensive than any other type of LAN cabling.
--------------------------------------------------------------------------------
---------
46-Examine the graphic with current configurations. Host A in the Clerical offic
es failed and was replaced. Although a ping to 127.0.0.1 was successful, the rep
lacement computer can not access the company network. What is the likely cause o
f the problem?
IP address incorrectly entered
network cables unplugged
*subnet mask incorrectly entered
network card failure
--------------------------------------------------------------------
47-Which of the following describes a physical full-mesh topology?
It requires termination at both ends of the cable.
It uses a hub or a switch as a central point to connect all wires.
*It provides maximum connectivity between all network systems.
It links all computers to a main computer that controls all traffic on the netwo
rk.
--------------------------------------------------------------------
48-Which two statements describe the TFTP protocol? (Choose two.)
uses authenticated file transfer procedure
provides connection-oriented service
*provides connectionless service
provides more features that FTP
*lacks most of the features of FTP
--------------------------------------------------------------------
49-Which of the following are transport layer protocols of the TCP/IP model? (Ch
oose two.)
FTP
*UDP
SMTP
TFTP
*TCP
-----------------------------------------------------------------
50-Which type of UTP network cable connects two Cisco switches?
straight-through
*crossover
rollover
patch
--------------------------------------------------------------------
51-How will the MAIN router dynamically learn a route to the 10.16.10.48/28 subn
etwork in the diagram?
with a routed protocol
*with a routing protocol
with a static route
with a directly connected route
--------------------------------------------------------------------
52-Which of the following describes the RIP version 1 routing protocol?
Cisco proprietary hybrid protocol
*distance vector protocol that uses hop count as the only metric *
link state protocol supporting multiple routed protocols
distance vector protocol that uses delay, bandwidth, load, and reliability metri
cs
--------------------------------------------------------------------
53-How many broadcast domains are shown in the diagram?
*three
four
five
six
seven
eight
--------------------------------------------------------------------
54-Which of the following are advantages of UTP cable? (Choose three.)
*less expensive than fiber optic
*flexible and easy to run in a building
distance between signal boosts is longer than it is for coaxial
*transmits data at a faster rate than any copper-based media
receives less RMF and EMI interference than other types
--------------------------------------------------------------------
Which of the following devices extend a collision domain? (choose 2)
*-hub
*-repeater
--------------------------------------------------------------------------
1. Which two statements are true regarding link-state routing protocols? (Choose
two.)
They do not work well in networks that require special heirarchical designs.
* They are aware of the complete network topology.
They pass their entire routing tables to their directly connected neighbors only
.
* They offer rapid convergence times in large networks.
They rely on decreasing hop counts to determine the best path.
They do not include subnet masks in their routing updates.
2. Which three statements about routing protocols are true? (Choose three.)
* OSPF elects designated routers on multiaccess links.
RIP does not support classless routing.
* EIGRP supports unequal cost load balancing.
EIGRP uses broadcast traffic to establish adjacencies with its neighbors.
* RIP does not advertise a route beyond a hop count of 15.
OSPF can convergence more quickly because it can find a feasible successor in it
s topology table when a successor route goes down.
3. What does RIP use to reduce convergence time in a larger network?
It reduces the update timer to 15 seconds if there are more then 10 routes.
* It uses triggered updates to announce network changes if they happen in betwee
n the periodic updates.
It uses random pings to detect if a pathway is down and therefore is preemptive
on finding networks that are down.
It uses multicast instead of broadcast to send routing updates.
4. What can be determined from the output shown in the exhibit? (Choose two.)
Annapolis is a 2611 router that is connected to the S0/0 interface of the Montgo
mery router.
All of the routers are connected to Montgomery through an Ethernet switch.
* Montgomery has Layer 2 connectivity with Cumberland.
Layer 3 connectivity is operational for all of the devices listed in the Device
ID column.
An administrator consoled into the Waldorf router can ping the Brant router.
* Brant, Fisherman, and Potomac are directly connected to Montgomery.
5. Refer to the exhibit. The results of the show ip route command are displayed
in the graphic for Router R2. Which route will be selected for a packet with a d
estination address of 10.1.4.1?
static route to 10.1.0.0/22
RIP route to 10.1.0.0/23
RIP route to 10.1.0.0/24
* 0.0.0.0/0 via 192.168.0.1
6. Refer to the exhibit. All router interfaces are configured with an IP address
and are operational. If no routing protocols or static routes are configured, w
hat information will be included in the show ip route command output for router
A?
All of the 192.168.x.0 networks will be in the routing table.
* Routes to networks 192.168.1.0/24, 192.168.2.0/24, and 192.168.3.0/24 will be
in the routing table.
The routing table will be empty because routes and dynamic routes have not been
configured.
A default route is automatically installed in the routing table to allow connect
ivity between the networks.
7. Which of the following should be considered when troubleshooting a problem wi
th the establishment of neighbor relationships between OSPF routers? (Choose thr
ee.)
* OSPF interval timers mismatch
gateway of last resort not redistributed
* interface network type mismatch
no loopback interface configured
administrative distance mismatch
* inconsistent authentication configuration
8. Refer to the exhibit. A network administrator is trying to figure out why BOS
does not have the 10.0.0.0/24 network in its routing table. All routers are con
figured for OSPF in area 0. The links between the routers are operational and th
e administrator is able to ping between all router interfaces. What is a logical
next step that the network administrator should take to troubleshoot the proble
m?
Reboot the routers.
Change the OSPF process ID on all of the routers to 0.
Check to see if the cable is loose between BOS and JAX.
Check to see if CDP packets are passing between the routers.
* Use show and debug commands to determine if hellos are propagating.
9. Refer to the exhibit. What two statements are true based on the output shown?
(Choose two.)
the reported distance to network 172.16.1.0 is 2172416
192.168.10.5 and 192.168.10.9 are feasible successors
* neighbors 192.168.10.9 and 192.168.10.5 have auto summary disabled
* router 3 is load balancing traffic to the 172.16.3.0 network across its serial
interfaces
all interfaces shown on Router3 are in the passive state and will not send EIGRP
advertisements
10. The network shown in the diagram is having problems routing traffic. It is s
uspected that the problem is with the addressing scheme. What is the problem wit
h the addressing used in the topology?
The address assigned to the Ethernet0 interface of Router1 is a broadcast addres
s for that subnetwork.
* The subnetwork configured on the serial link between Router1 and Router2 overl
aps with the subnetwork assigned to Ethernet0 of Router3.
The subnetwork assigned to the Serial0 interface of Router1 is on a different su
bnetwork from the address for Serial0 of Router2.
The subnetwork assigned to Ethernet0 of Router2 overlaps with the subnetwork ass
igned to Ethernet0 of Router3.
11. What is the function of the OSPF LSU packet?
used to confirm receipt of certain types of OSPF packets
used to establish and maintain adjacency with other OSPF routers
used to request more information about any entry in the BDR
* used to announce new OSPF information and to reply to certain types of request
s
12. Which of the following are primary functions of a router? (Choose two.)
* packet switching
microsegmentation
domain name resolution
* path selection
flow control
13. Refer to the exhibit. What summary address can Router2 advertise to Router1
to reach the three networks on Routers 3, 4, and 5 without advertising any publi
c address space or overlapping the networks on Router1?
172.16.0.0/8
172.16.0.0/10
* 172.16.0.0/13
172.16.0.0/20
172.16.0.0/24
14. What is the first step OSPF and IS-IS routers take in building a shortest pa
th first database?
* learn about directly connected networks
send hello to discover neighbors and form adjacencies
choose successors and feasible successors to populate the topology table
flood LSPs to all neighbors informing them of all known networks and their link
states
15. Which three statements describe the operation of routing with EIGRP? (Choose
three.)
* As new neighbors are discovered, entries are placed in a neighbor table.
If the feasible successor has a higher advertised cost than the current successo
r route, then it becomes the primary route.
* If hello packets are not received within the hold time, DUAL must recalculate
the topology.
* The reported distance is the distance to a destination as advertised by a neig
hbor.
EIGRP maintains full knowledge of the network topology in the topology table and
exchanges full routing information with neighboring routers in every update.
EIGRP builds one routing table that contains routes for all configured routed pr
otocols.
16. A network administrator has configured a default route on Router_A but it is
not being shared with adjacent Router_B and the other routers in the OSPF area.
Which command will save the administrator the time and trouble of configuring t
his default route on Router_B and all of the other routers in the OSPF area?
Router_A(config-router)# ospf redistribute default-route
Router_B(config-router)# ospf redistribute default-route
* Router_A(config-router)# default-information originate
Router_B(config-router)# default-information originate
Router_A(config-router)# ip ospf update-default
Router_B(config-router)# ip ospf update-default
17. Which of the following are required when adding a network to the OSPF routin
g process configuration? (Choose three.)
* network address
loopback address
autonomous system number
subnet mask
* wildcard mask
* area ID
18. A network administrator has enabled RIP on routers B and C in the network di
agram. Which of the following commands will prevent RIP updates from being sent
to Router A?
A(config)# router rip
A(config-router)# passive-interface S0/0
B(config)# router rip
B(config-router)# network 192.168.25.48
B(config-router)# network 192.168.25.64
A(config)# router rip
A(config-router)# no network 192.168.25.32
* B(config)# router rip
* B(config-router)# passive-interface S0/0
A(config)# no router rip
19. Which statement is true regarding routing metrics?
All routing protocols use the same metrics.
EIGRP uses bandwidth as its only metric.
* Routers compare metrics to determine the best route.
The larger metric generally represents the better path.
20. Refer to the exhibit. The network is running the RIP routing protocol. Netwo
rk 10.0.0.0 goes down. Which statement is true regarding how the routers in this
topology will respond to this event?
Router4 will learn about the failed route 30 seconds later in the next periodic
update.
Split horizon will prevent Router4 from fowarding packets to the 10.0.0.0 networ
k until the holddown timer expires.
Router5 immediately flushes the unreachable route from its routing table.
* Router5 will send Router4 a triggered update with a metric of 16 for network 1
0.0.0.0.
21. What command would the network administrator apply to a router that is runni
ng OSPF to advertise the entire range of addresses included in 172.16.0.0/19 in
area 0?
R1(config-router)# network 172.16.0.0 0.0.0.255 area 0
R1(config-router)# network 172.16.0.0 0.0.3.255 area 0
R1(config-router)# network 172.16.0.0 0.0.15.255 area 0
* R1(config-router)# network 172.16.0.0 0.0.31.255 area 0
22. Refer to the exhibit. How many routes are both level 1 and qualify for use a
s an ultimate route?
1
* 2
3
4
5
6
23. Refer to the exhibit. What will happen if interface Serial0/0/1 goes down on
Router1?
The Dijkstra algorithm will calculate the feasible successor.
* DUAL will query neighbors for a route to network 192.168.1.0.
Neighbor 172.16.3.2 will be promoted to the feasible successor.
Traffic destined to the 192.168.1.0 network will be dropped immediately due to l
ack of a feasible successor.
24. Refer to the exhibit. The network administrator issues the command no ip cla
ssless on Router1. What forwarding action will take place on a packet that is re
ceived by Router1 and is destined for host 192.168.0.26?
* The packet will be dropped.
The packet will be forwarded to the gateway of last resort.
The packet will match the 192.168.0.0 network and be forwarded out Serial 0/0.
The packet will most closely match the 192.168.0.8 subnet and be forwarded out S
erial 0/1.
25. Which three statements are true regarding the encapsulation and de-encapsula
tion of packets when traveling through a router? (Choose three.)
* The router modifies the TTL field, decrementing it by one.
The router changes the source IP to the IP of the exit interface.
* The router maintains the same source and destination IP.
* The router changes the source physical address to the physical address of the
exit interface.
The router changes the destination IP to the IP of the exit interface.
The router sends the packet out all other interfaces, besides the one it entered
the router on.
26. Refer to the exhibit. What is the most efficient summarization of the routes
attached to router R1?
198.18.0.0/16
* 198.18.48.0/21
198.18.32.0/22
198.18.48.0/23
198.18.49.0/23
198.18.52.0/22
27. What are two tasks that must be completed before two routers can use OSPF to
form a neighbor adjacency? (Choose two.)
The routers must elect a designated router.
* The routers must agree on the network type.
* The routers must use the same dead interval.
The routers must exchange link state requests.
The routers must exchange database description packets.
28. Refer to the exhibit. The network is using the RIPv2 routing protocol. If ne
twork 10.0.0.0 goes down, what mechanism will prevent Router1 from advertising f
alse routing information back to Router2?
triggered updates
poison reverse
* holddown timers
split horizon
29. Refer to the exhibit. R1 knows two routes, Path A and Path B, to the Etherne
t network attached to R3. R1 learned Path A to network 10.2.0.0/16 from a static
route and Path B to network 10.2.0.0/16 from EIGRP. Which route will R1 install
in its routing table?
Both routes are installed and load balancing occurs across both paths.
The route via Path B is installed because the EIGRP route has the best metric to
network 10.2.0.0/16.
* The route via Path A is installed because the static route has the best metric
to network 10.2.0.0/16.
The route via Path B is installed because the EIGRP route has the lowest adminis
trative distance to network 10.2.0.0/16.
The route via Path A is installed because the static route has the lowest admini
strative distance to network 10.2.0.0/16.
30. Refer to the exhibit. Hosts on the BOS Fa0/0 LAN are able to ping the Fa0/1
interface on the JAX router and all interfaces on the BOS and ORL routers. Why w
ould hosts from the 10.0.0.0/24 network not be able to ping hosts on the Fa0/0 L
AN of the JAX router?
The JAX router has the wrong process ID.
* The JAX router needs the network 10.0.0.0 0.0.0.255 area 0 command.
The JAX router needs the network 192.168.3.0 0.0.0.255 area 0 command.
The BOS router needs the network 192.168.3.0 0.0.0.255 area 0 command.
31. What is the purpose of the TTL field within an IP packet header?
clears an unreachable route from the routing table after the invalid timer expir
es
prevents regular update messages from inappropriately reinstating a route that m
ay have gone bad
removes an unreachable route from the routing table after the flush timer expire
s
* limits the period of time or number of hops a packet can traverse through the
network before it should be discarded
used to mark the route as unreachable in a routing update that is sent to other
routers
32. Refer to the exhibit. The network administrator is testing network connectiv
ity by issuing the tracert command from host A to host B. Given the exhibited ou
tput on host A, what are two possible routing table issues on the network? (Choo
se two.)
Router1 is missing a route to the 172.16.0.0 network
Router1 is missing a route to the 192.168.1.0 network
Router2 is missing a route to the 10.0.0.0 network
*Router2 is missing a route to the 172.16.0.0 network
* Router3 is missing a route to the 10.0.0.0 network
Router3 is missing a route to the 192.168.0.0 network
33. Refer to the exhibit. Which statement is true concerning the routing configu
ration?
Using dynamic routing instead of static routing would have required fewer config
uration steps.
The 10.1.1.0/24 and 10.1.2.0/24 routes have adjacent boudaries and should be sum
marized.
The static route will not work correctly.
* Packets routed to the R2 ethernet interface require two routing table lookups.
34. Refer to the exhibit. Pings are failing between HostA and HostB. The network
administrator discovers that Router1 does not have a route to the 172.16.0.0 ne
twork. Assuming Router2 is configured correctly, which two static routes could b
e configured on Router1 to enable Host A to reach network 172.16.0.0? (Choose tw
o.)
ip route 172.16.0.0 255.255.0.0 S0/0
ip route 172.16.0.0 255.255.0.0 S0/1
ip route 172.16.0.0 255.255.0.0 192.168.0.1
* ip route 172.16.0.0 255.255.0.0 192.168.0.2
ip route 192.168.0.1 172.16.0.0 255.255.0.0 S0/0
* ip route 192.168.0.1 172.16.0.0 255.255.0.0 S0/1
35. A router has learned about a network through static and dynamic routing proc
esses. Which route will be used to reach network 192.168.168.0?
D 192.168.168.0/24 [90/2195456] via 192.168.200.1, 00:00:09, Ethernet0
O 192.168.168.0/24 [110/1012] via 192.168.200.1, 00:00:22, Ethernet0
R 192.168.168.0/24 [120/1] via 192.168.200.1, 00:00:17, Ethernet0
* S 192.168.168.0/24 [1/0] via 192.168.200.1
36. What are three features of CDP? (Choose three.)
tests Layer 2 connectivity
* provides a layer of security
operates a OSI layers 2 and 3
enabled by default on each interface
* used for debugging Layer 4 connectivity issues
* provides information on directly connected devices that have CDP enabled
37. Refer to the exhibit. When troubleshooting a network, it is important to int
erpret the output of various router commands. On the basis of the exhibit, which
three statements are true? (Choose three.)
* The missing information for Blank 1 is the command show ip route.
The missing information for Blank 1 is the command debug ip route.
The missing information for Blank 2 is the number 100.
* The missing information for Blank 2 is the number 120.
The missing information for Blank 3 is the letter R.
* The missing information for Blank 3 is the letter C.
38. Which of the following could describe the devices labeled ? in the graphic? (C
hoose three.)
* DCE
* CSU/DSU
LAN switch
* modem
hub
39. Refer to the exhibit. Which three statements are true of the routing table f
or Router1? (Choose three.)
The route to network 172.16.0.0 has an AD of 156160.
Network 192.168.0.16 can best be reached using FastEthernet0/0.
* The AD of EIGRP routes has been manually changed to a value other than the def
ault value.
* Router1 is running both the EIGRP and OSPF routing process.
Network 172.17.0.0 can only be reached using a default route.
* No default route has been configured.
40. Refer to the exhibit. The ORL router is unable to form a neighbor relationsh
ip with the JAX router. What is a possible cause of this problem?
Router JAX has the wrong autonomous-system number.
* The command network 192.168.2.0 is missing from the EIGRP configuration on the
JAX router.
Automatic summarization is not disabled on the JAX router.
Router JAX has the wrong IP address on the Fa0/1 interface.
41. Refer to the exhibit. Routers 1 and 2 are directly connected over a serial l
ink. Pings are failing between the two routers. What change by the administrator
will correct the problem?
Set the encapsulation on both routers to PPP.
Decrease the bandwidth on Serial 0/1/0 on router 2 to 1544.
Change the cable that connects the routers to a crossover cable.
* Change the IP address on Serial 0/1/0 on router 2 to 192.168.0.1/30.
42. The Suffolk router is directly connected to the networks shown in the graphi
c and has a default route that points to the Richmond router. All interfaces are
active and properly addressed. However, when the workstation on network 172.29.
5.0/24 sends a packet to destination address 172.29.198.5, it is discarded by th
e Suffolk router. What can be a reason for this result?
The ip classless command is not enabled on the Richmond router.
The route was ignored if the Richmond router did not include the 172.29.198.0/24
network in its routing updates.
The Richmond router is in a different autonomous system than the Suffolk router.
The ip subnet-zero command was not configured on the Suffolk router.
* The ip classless command is not enabled on the Suffolk router.
43. When presented with multiple valid routes to a destination, what criteria do
es a router use to determine which routes to add to the routing table?
The router selects the routes with the best metric. All routes that have the sam
e best metric are added to the routing table.
The router first selects routes with the lowest administrative distance. The res
ulting routes are then prioritized by metric and the routes with the best metric
are added to the routing table.
* The router selects the routes with the lowest administrative distance. All rou
tes with the same lowest administrative distance are added to the routing table.
The router installs all routes in the routing table but uses the route with the
best metric most when load balancing.
44. Refer to the exhibit. What are the effects of the exhibited commands on the
router?
All passwords are encrypted.
Only Telnet sessions are encrypted.
Only the enable password is encrypted.
* Only the enable password and Telnet session are encrypted.
Enable and console passwords are encrypted.
45. Refer to the exhibit. The routers in the exhibit are running the EIGRP routi
ng protocol. What statement is true regarding how packets will travel from the 1
72.16.1.0/16 network to the 192.168.200.0/24 network?
The router chooses the first path that it learned and installs only that route i
n the routing table.
The router chooses the path with the lowest administrative distance and installs
only that route in the routing table.
The router chooses the highest routing ID based on the advertised network IP add
resses and installs only that route in the routing table.
The router installs all the equal cost paths in the routing table but sends pack
ets out only one, holding the others in reserve in case the primary route goes d
own.
* The router installs all the equal cost paths in the routing table and performs
equal cost load balancing to send packets out multiple exit interfaces.
46. When the show cdp neighbors command is issued from Router C, which devices w
ill be displayed in the output?
D, SWH-2
A, B, D
SWH-1, SWH-2
* B, D
SWH-1, A, B
A, B, D, SWH-1, SWH-2
47. Refer to the exhibit. Packets destined to which two networks will require th
e router to perform a recursive lookup? (Choose two.)
* 10.0.0.0/8
64.100.0.0/16
128.107.0.0/16
172.16.40.0/24
192.168.1.0/24
* 192.168.2.0/24
48. Refer to the exhibit. Which path will traffic from the 172.16.1.0/24 network
take to get to the 10.0.0.0/24 network?
ADC
ABC
It will load balance the traffic between ADC and ABC
* It will send the traffic via ABC, and will use ADC as a backup path only when
ABC fails.
49. Refer to exhibit. A company network engineer enters the following commands i
n the routers:
R1(config)# ip route 10.1.1.0 255.255.255.0 192.168.0.2
R2(config)# ip route 10.1.2.0 255.255.255.0 192.168.0.1
When the engineer enters the show ip route command on R1, the routing table does
not display the static route to the 10.1.1.0 network. All R1 and R2 interfaces
are correctly addressed per the graphic. What is a logical next step that the en
gineer could take in order to make the static route display in the routing table
in R1?
Enter default routes in R1 and R2.
* Enable the R1 and R2 serial interfaces.
Configure the static route to use an exit interface instead of a next-hop addres
s.
Enter the copy run start command to force the router to recognize the configurat
ion.
50. Refer to the exhibit. A packet enters Router1 with a destination IP of 172.1
6.28.121. Which routing table entry will be used to forward this packet to the d
estination address?
172.16.0.0/16 [1/0] via 192.168.0.1
* 172.16.0.0/20 [1/0] via 192.168.0.9
172.16.16.0/20 [1/0] via 192.168.0.17
0.0.0.0/0 is directly connected, Serial0/0/1
51. Refer to the exhibit. A new PC was deployed in the Sales network. It was giv
en the host address of 192.168.10.31 with a default gateway of 192.168.10.17. Th
e PC is not communicating with the network properly. What is the cause?
The address is in the wrong subnet.
* 192.168.10.31 is the broadcast address for this subnet.
The default gateway is incorrect.
The host address and default gateway are swapped.
52. Refer to the routing table shown in the exhibit. What is the meaning of the
highlighted value 192?
It is the value assigned by the Dijkstra algorithm that designates the number of
hops in the network.
It is the value used by the DUAL algorithm to determine the bandwidth for the li
nk.
* It is the metric, which is cost.
It is the administrative distance.
53. Using default settings, what is the next step in the router boot sequence af
ter the IOS loads from flash?
Perform the POST routine.
Search for a backup IOS in ROM.
Load the bootstrap program from ROM.
Load the running-config file from RAM.
* Locate and load the startup-config file from NVRAM.
54. Refer to the exhibit. All routers in the network are running RIPv2 and EIGRP
with default routing protocol settings and have interfaces configured with the
bandwidths that are shown in the exhibit. Which protocol will be used and how wi
ll traffic between the Router1 LAN and Router5 LAN be routed through the network
?
RIPv2 will load balance across both paths between Router1 and Router5.
EIGRP will load balance across both paths between Router1 and Router5.
RIPv2 traffic will use the path Router1, Router2, Router5 because it has the lea
st hops.
* EIGRP traffic will use the path Router1, Router3, Router4, Router5 because it
has the best metric.
55. Which three statements are true of holddown timers? (Choose three.)
* used by link state routing protocols to prevent routing loops
prevent update messages from reinstating a route that may have gone bad
allow routers to still forward packets to destination networks that are in holdd
own
* limit the number of hops a packet can traverse through the network before it i
s discarded
* prevent a router advertising a network through the same interface from which t
he network was learned
permit lower metric updates received from any neighboring router to reinstate th
e route to a possibly down network
56. The network administrator configures the router with the ip route 172.16.1.0
255.255.255.0 172.16.2.2 command. How will this route appear in the routing tab
le?
C 172.16.1.0 is directly connected, Serial0/0
S 172.16.1.0 is directly connected, Serial0/0
C 172.16.1.0 [1/0] via 172.16.2.2
* S 172.16.1.0 [1/0] via 172.16.2.2
57. Which two router component and operation pair are correctly described? (Choo
se two.)
DRAM - loads the bootstrap
RAM - stores the operating system
Flash - executes diagnostics at bootup
* NVRAM - stores the configuration file
ROM - stores the backup configuration file
* POST - runs diagnostics on hardware modules
58. Refer to exhibit. Given the topology shown in the exhibit, what three comman
ds are needed to configure EIGRP on the Paris router? (Choose three.)
* Paris(config)# router eigrp 100
Paris(config)# router eigrp
Paris(config-router)# network 192.168.6.0
* Paris(config-router)# network 192.168.7.0
* Paris(config-router)# network 192.168.8.0
Paris(config-router)# network 192.168.9.0
---------------------------------------------------------------------------
1 Convert the binary number 10111010 into its hexadecimal equivalent. Select the
correct answer from the list below.
85
90
* BA
A1
B3
1C
2 Convert the Hexadecimal number A2 into its Base 10 equivalent. Select the corr
ect answer from the list below.
156
158
160
* 162
164
166
3 Select the necessary information that is required to compute the estimated tim
e it would take to transfer data from one location to another. (Choose two.)
* file size
data format
network in use
type of medium
* bandwidth of the link
4 Using the data transfer calculation T=S/BW, how long would it take a 4MB file
to be sent over a 1.5Mbps connection?
52.2 seconds
* 21.3 seconds
6.4 seconds
2 seconds
0.075 seconds
0.0375 seconds
5 What are features of the TCP/IP Transport layer? (Choose two.)
path determination
handles representation, encoding and dialog control
* uses TCP and UDP protocols
packet switching
* reliability, flow control and error correction
6 Which combinations of charges will be repelled by electric force? (Choose two.
)
neutral and neutral
neutral and positive
neutral and negative
* positive and positive
positive and negative
* negative and negative
7 Which of the following are considered the best electrical conductors for use i
n data network communications? (Choose three.)
glass fibers
* copper
* gold
plastic
silicon
* silver
8 During cable testing, which of the following are used to calculate the informa
tion carrying capacity of a data cable? (Choose two.)
bit speed
* attenuation
wire map
saturation limit
* analog bandwidth
9 The highest capacity Ethernet technologies should be implemented in which area
s of a network? (Choose three.)
between workstation and backbone switch
between individual workstations
* between backbone switches
* between enterprise server and switch
* on aggregate access links
10 What device must be used between an AUI port of a networking device and the m
edia to which it is being connected?
a transducer
a transmitter
* a transceiver
a transponder
a port replicator
11 An ISDN Basic Rate Interface (BRI) is composed of how many signaling channels
?
* 1
2
3
4
12 Which of the following items are common to all 100BASE technologies? (Choose
three.)
* frame format
media
connectors
* timing
* multi-part encoding
13 Which of the following does 1000BASE-T use to accomplish gigabit speeds on Ca
t 5e cable?
the use of four conductors in full-duplex mode
the use of two multiplexed pairs of wires, simultaneously
the use of three pairs of wires for data and the fourth for stabilization and fo
rward error correction
* the use of all four pairs of wires in full-duplex mode, simultaneously
14 For which of the following is Ethernet considered the standard? (Choose three
.)
* inter-building connection
mid-length voice
video conferencing
* vertical wiring
* horizontal wiring
diagonal wiring
15 John has been hired as the network administrator of a local company and has d
ecided to add more hubs to the company's existing network. Which of the followin
g has been caused by John's inexperience?
* collision domain extended
an increased number of collision domains
increased network performance
increased bandwidth
extended bandwidth
16 "CompA" is trying to locate a new computer named "CompB" on the network. Whic
h of the following does "CompA" broadcast to find the MAC address of "CompB"?
MAC request
* ARP request
ping
Telnet
proxy ARP
17 Which of the following is a term associated with replacing hubs with switches
to increase the number of collision domains?
encapsulation
latency
* segmentation
layered model
broadcast domain
extended
18 The accumulation of traffic from which of the following can cause a network c
ondition called broadcast radiation? (Choose three.)
anonymous FTP servers
telnet sessions
* video over IP applications
NAS services
* ARP requests
* RIP updates
19 Which of the following describes the use of Spanning Tree Protocol (STP)?
resolve routing loops
eliminate Split Horizon errors
limit collisions
* resolve switching loops
20 Which term describes an ARP response by a router on behalf of a requesting ho
st?
ARP
RARP
* Proxy ARP
Proxy RARP
21 Which OSI layer encapsulates data into packets?
session
transport
* network
data link
22 Which OSI layer defines the functions of a router?
physical
data link
* network
transport
session
23 Which of the following are Cisco proprietary routing protocols? (Choose two.)
RIPv2
* IGRP
OSPF
BGP
RIPv1
* EIGRP
24 A company with a Class B license needs to have a minimum of 1,000 subnets wit
h each subnet capable of accommodating 50 hosts. Which mask below is the appropr
iate one?
255.255.0.0
255.255.240.0
255.255.255.0
* 255.255.255.192
255.255.255.224
25 A small company has a class C network license and needs to create five usable
subnets, each subnet capable of accommodating at least 20 hosts. Which of the f
ollowing is the appropriate subnet mask?
255.255.255.0
255.255.255.192
* 255.255.255.224
255.255.255.240
26 When a network administrator applies the subnet mask 255.255.255.248 to a Cla
ss A address, for any given subnet, how many IP addresses are available to be as
signed to devices?
1022
510
254
126
30
* 6
27 If a network administrator needed to download files from a remote server, whi
ch protocols could the administrator use to remotely access those files? (Choose
two.)
NFS
ASCII
* TFTP
IMAP
* FTP
UDP
28 What is established during a connection-oriented file transfer between comput
ers? (Choose two.)
a temporary connection to establish authentication of hosts
* a connection used for ASCII or binary mode data transfer
a connection used to provide the tunnel through which file headers are transport
ed
a command connection which allows the transfer of multiple commands directly to
the remote server system
* a control connection between the client and server
29 Which of the following protocols are used for e-mail transfer between clients
and servers? (Choose three.)
TFTP
SNMP
* POP3
* SMTP
* IMAP4
postoffice
30 What type of wiring problem is depicted in this sample of a cable tester?
a fault
a short
* an open
a split
a good map
31 Which layer of the OSI model covers physical media?
* Layer 1
Layer 2
Layer 3
Layer 4
Layer 5
Layer 6
32 What type of network cable is used between a terminal and a console port?
cross-over
straight-through
* rollover
patch cable
33 What does the "10" in 10Base2 indicate about this version of Ethernet?
The version uses Base10 numbering within the frames.
* The version operates at a transmission rate of 10 Mbps.
Frames can travel 10 meters unrepeated.
The maximum frame length is 10 octets.
34 How is a MAC address represented?
four groups of eight binary digits separated by a decimal point
four Base10 digits separated by a decimal point
six hexadecimal digits
* twelve hexadecimal digits
twenty-four Base10 digits
35 To make sure timing limitations are not violated when implementing a 10 Mbps
Ethernet network involving hubs or repeaters, a technician should adhere to whic
h rule?
the 4-5-3 rule
the 6-4-2 rule
the 3-4-5 rule
* the 5-4-3 rule
36 Which of the following wireless standards increased transmission capabilities
to 11 Mbps?
802.11a
* 802.11b
802.11c
802.11d
37 Which protocol functions at the internet layer of the TCP/IP protocol suite?
File Transfer Protocol (FTP)
Trivial File Transfer Protocol (TFTP)
Transmission Control Protocol (TCP)
* Internet Protocol (IP)
User Datagram Protocol (UDP)
Simple Mail Transport Protocol (SMTP)
38 Which of these workstation installation and setup tasks are concerned with ne
twork access layer functions? (Choose two.)
configuring the e-mail client
* installing NIC drivers
configuring IP network settings
* connecting the network cable
using FTP to download application software updates
39 Which part of an IP address identifies a specific device on a network?
first two octets
third and fourth octets
network portion
* host portion
only the fourth octet
40 Which of the following are features of the Internet Protocol (IP)? (Choose tw
o.)
* It is the most widely implemented global addressing scheme.
It allows two hosts to share a single address on a local area network.
* It is a hierarchical addressing scheme allowing addresses to be grouped.
It is only locally significant, used primarily on local area networks.
41 In a new network installation, the network administrator has decided to use a
medium that is not affected by electrical noise. Which cable type will best mee
t this standard?
coaxial
screened twisted pair
shielded twisted pair
unshielded twisted pair
* fiber optic
42 What is the recommended maximum number of workstations configured on a peer-t
o-peer network?
25
15
* 10
5
2
43 What is the maximum distance that 10BASE-T will transmit data before signal a
ttenuation affects the data delivery?
* 100 meters
185 meters
300 meters
500 meters
44 Which type of institution does the domain suffix .org represent?
government
education
network
* non-profit
45 Which of the following services is used to translate a web address into an IP
address?
* DNS
WINS
DHCP
Telnet
46 Which part of the URL http://www.awsb.ca/teacher gives the name of the domain
?
www
http://
/teacher
* awsb.ca
47 Which of the following will test the internal loopback of a node?
ping 10.10.10.1
ping 192.168.1.1
* ping 127.0.0.1
ping 223.223.223.223
ping 255.255.255.255
48 Which of the following is the Layer 4 PDU?
bit
frame
packet
* segment
49 Which of the following are small, discrete components found within a personal
computer? (Choose three.)
* transistor
microprocessor
power supply
* capacitor
* light emitting diode
hard disk
50 What is important to remember about the data link layer of the OSI model when
considering Peer to Peer communication? (Choose three.)
It links data to the transport layer.
It encapsulates frames into packets.
* It provides a service to the network layer.
* It encapsulates the network layer information into a frame.
* Its header contains a physical address which is required to complete the data
link functions.
It encodes the data link frame into a pattern of 1s and 0s (bits) for transmissi
on on the medium.
51 Which of the following are useable Class A IP addresses with a default subnet
mask? (Choose three.)
127.0.39.1
* 111.9.28.30
* 123.1.2.132
128.50.38.2
* 105.1.34.1
0.23.92.3
----------------------------------

1
Which installation option should be chosen when the current operating system is
too damaged to work properly?
upgrade
multi-boot
clean install *
virtualization
2
Where do ISPs get the public addresses that they assign to end users?
ISPs create the addresses themselves.
ISPs are assigned addresses through the RFC.
ISPs obtain their addresses automatically.
ISPs obtain address blocks from registry organizations. *
3
When is the use of a DSL modem necessary?
when a cellular telephone provides the service
when a high-speed connection is provided over a cable TV network
when a high-speed digital connection is required over the regular telephone line
*
when a satellite dish is used
4
What is the purpose of the ipconfig /release command?
It forces a client to give up its current IP address. * (forces to give up its c
urrent IP address lease to be correct)
It forces a client to give up its current MAC address.
It forces the client to clear all the MAC address to IP address associations it
has learned.
It shows the current IP configuration on the client.
5
Which statement is true about UTP cable termination?
Cables with RJ-45 connectors are always preterminated.
An RJ-45 connector is used on only one end of the UTP cable. * (tricky not sure)
Up to 2 to 3 inches of cable may be untwisted at each end of the cable to allow
for easier installation of the RJ-45 connector.
The RJ-45 connector should be pushed over the wire jacket for a smooth connectio
n.
6
What layer is the first point of entry for a host into the network?
core layer
access layer *
network layer
distribution layer
7
What data communication technology uses low-power radio waves to transmit data?
copper cable
fiber optic cable
wireless *
radio
8
Which type of computer uses an integrated monitor and keyboard?
pocket PC
laptop *
mainframe
server
workstation
9
What is the function of CSMA/CA on a wireless Ethernet network?
to prevent collisions * (Carrier sense multiple access with collision avoidance)
to broadcast messages
to select the least congested channel
to establish an ACK between devices
10
All hosts within a domain receive the same frame that originates from one of the
devices. The domain is also bounded by routers. What type of domain is this?
broadcast *
collision
local
multicast
11
Within a local network, which two items must be unique on a computer for it to s
uccessfully connect to the network? (Choose two.)
IP address *
subnet mask
computer name *
default gateway address
operating system version
12
Which three address ranges can be used to depict private IP addresses? (Choose t
hree.)
10.0.0.0 to 10.0.0.255 *
127.16.0.0 to 127.16.255.255
150.150.0.0 to 150.150.255.255
172.16.1.0 to 172.16.1.255*
192.168.22.0 to 192.168.22.255 *
200.100.50.0 to 200.100.50.255
13
What is the default subnet mask for the IP address 128.107.23.10?
255.0.0.0
255.255.0.0 *
255.255.255.0
255.255.255.255
14

Refer to the exhibit. Assume that the exhibited output is from a host that is co
nnected to a Linksys integrated router. What is the first thing that should be c
hecked while using a bottom-up troubleshooting approach?
the default gateway on the host
the IP address on the host
the IP address on the router
the link status LED on the front of the router *
the subnet mask on the host
15
Which two values represent the network number and default mask for the address 2
09.165.200.225? Class C (Choose two.)
209.0.0.0
209.165.0.0
209.165.200.0 *
255.0.0.0
255.255.0.0
255.255.255.0 *
16
Which two statements are true about network applications? (Choose two.)
Microsoft Word is an example of a network application.
Network applications are accessible from a remote computer. *
Network applications are installed on a special type of computer that supports o
nly network applications.
Network applications are installed on a network server. *
Network applications are accessible by one computer at a time.
17
A learner wants to interact with the operating system of a computer. Which two m
ethods can be used for this? (Choose two.)
CLI
GUI *
kernel
third party software
shell*
18
What is the meaning of the term crosstalk?
interference of signals between wire pairs * (almost sure)
loss of signal strength as distance increases
damage of the signal when two bare wires touch
strengthening of a signal by a networking device
19
What is the most common reason that ISPs provide symmetrical transfer services?
to address data transfer needs of home users
to download significantly more than upload
to host servers on the Internet * (not sure, sounds reasonable)
to work with applications that require less bandwidth
20
Which of the following are transport layer protocols of the TCP/IP model? (Choos
e two.)
FTP
UDP *
SMTP
TFTP
TCP *
21
What is an advantage of purchasing a custom-built computer?
It is beneficial for less knowledgeable consumers.
The waiting period for assembly is negligible.
The cost is lower compared to a computer that has been preassembled. * (WORKSFOR
ME)
The user can specify high-performance components to meet specific needs.
22
Refer to the exhibit. A wireless DHCP client is unable to access the web server.
Given the output that is shown in the exhibit, what two things should the netwo
rk technician verify first to troubleshoot this problem? (Choose two.)
the wireless client configuration for DHCP *
the default gateway
the firewall configuration
the SSID
the physical connectivity between the server and the client *
23
Refer to the exhibit. What is the effect of setting the security mode to WEP on
the Linksys integrated router?
The WEP security mode enables the AP to inform clients of its presence.
The WEP security mode encrypts network traffic during transmission between the A
P and the wireless client. *
The WEP security mode generates a dynamic key each time a client establishes a c
onnection with the AP.
The WEP security mode identifies the WLAN.
24
Which protocol is used by a client to browse the web server? (Well that depends
but most commonly HTTP)
FTP
HTTP *
POP
SMTP
25
What is the purpose of pop-up blocker software?
It detects and removes spyware.
It detects and removes viruses.
It prevents the display of advertisement windows. * O_O LOOOL
It removes unwanted e-mail
26
What is an advantage of selecting an operating system that has a commercial lice
nse over one with a GPL license?
The commercial license-based operating system ensures full access to the source
code for everyone.
The commercial license-based operating system ensures that everyone can particip
ate in the enhancement of the product.
The commercial license-based operating system provides structured support. *
The commercial license-based operating system is released free of charge.
27
A user is unable to send e-mail. To begin troubleshooting this problem, the netw
ork technician uses the browser on the PC and tries to access some popular Inter
net websites. Which troubleshooting approach is being followed?
bottom-up
divide-and-conquer * (He's an idiot but probably he uses divide and conquer)
top-down
trial and error
28
Which two causes of networking problems are related to the physical layer? (Choo
se two.)
disconnected cables *
improper operation of cooling fans (WTF??)
incorrect MAC address *
incorrect default gateway
incorrect subnet mask
29
What is the function of the DNS server?
It maps the IP address to the MAC address.
It translates a computer or domain name to the associated IP address. *
It manages the domain that clients are assigned to.
It accepts HTTP requests from clients.
30
Select the connection that would require a straight-through cable.
a switch to a hub
a router to a switch *
a switch to a switch
a router to a router
31
Your school network blocks all websites related to online gaming. What type of s
ecurity policy is being applied?
identification and authentication
remote access
acceptable use * (didn't know this one :O )
incident handling
32
How does a crossover cable connect two routers?
It connects the pins that are used for receiving on one router to the pins that
are used for receiving on the other router.
It connects the pins that are used for transmitting on one router to the pins th
at are used for receiving on the other router. *
It disconnects the transmit pins and uses only the receive pins.
It uses the same pins for transmitting and receiving.
33
What is the purpose of spam filter software?
It detects and removes spyware.
It detects and removes viruses.
It prevents the display of advertisement windows.
It examines incoming e-mail messages to identify the unsolicited ones. * (LOOOOO
OOOOOOOOOOOOOOOOOL this question is uberstupid!)
34
For an IP address, what component decides the number of bits that is used to rep
resent the host ID?
default-gateway
host number
network number
subnet mask *
35
TCP/IP data transmission between the source and destination host is de-encapsula
ted in four steps:
A. The TCP header is removed.
B. Bits are decoded and the destination MAC address is recognized.
C. The IP header is removed and the contents are passed to the next layer.
D. The Ethernet header and trailer are removed.
What is the correct sequence of these steps?
A, B, C, D
A, C, B, D
B, C, D, A * (almost sure)
B, D, C, A
C, A, B, D
36
Which statement accurately describes what network devices do in the distribution
layer of the three layer design model?
They interconnect individual hosts.
They interconnect multiple companies.
They interconnect local network segments. *
They interconnect the company network to the ISP.
37
Which two statements are characteristics of DHCP services? (Choose two.)
A DHCP client determines the lease time for using the IP address that is supplie
d by the DHCP server.
An integrated router acts as the DHCP server to provide the IP address to the IS
P.
DHCP clients send a DHCP Discover message to the destination IP address of 255.2
55.255.255.*
The DHCP server maps the IP addresses to host names.
The integrated router acts as a DHCP server for internal hosts on local networks
. *
38
What are two advantages of purchasing a preassembled computer? (Choose two.)
The cost is comparatively lower.
High-performance graphics and gaming applications are supported.
There is a negligible waiting period for assembly. *
This type of computer is useful for knowledgeable consumers with special needs.
The user can specify high-performance components. * (WORKSFORME)
39
Refer to the graphic. What feature can be installed on the Linksys integrated ro
uter to convert private IP addresses to Internet-routable addresses?
authentication
DHCP
encryption
firewall
NAT *
WEP
40
What are two examples of peripheral input devices? (Choose two.)
external modem
barcode reader *
digital camera *
plotter
printer
41
Which protocol is used by a client to retrieve an e-mail from a remote server us
ing a TCP/IP connection?
DNS
FTP
POP * (if using a mail client, HTTP using browser)
HTTP
42
Which statement is true about packet filtering?
It recognizes and filters specific types of attacks.
It permits access based on IP address. * (or first, dunno, tricky)
It is performed from a host network device.
It translates an internal address or group of addresses into a public address th
at is sent across the network.
43
What information within a data packet does a router use, by default, to make for
warding decisions?
the destination MAC address *
the destination IP address
the destination host name
the destination service requested
44
Refer to the exhibit. Host A sends a message to a group of four computers out of
the ten computers on this network. Which type of message does host A send?
broadcast
multicast *
simulcast
unicast
45
Refer to the exhibit. Which statement is true based on the information that is s
hown in the exhibit?
All wireless devices that are connected to this AP must have an assigned SSID of
University. *
Any wireless client that is attached to this AP must have the same IP address an
d SSID.
The AP is not physically wired to the local LAN.
This configuration is found only in an ad hoc wireless network.
46
Which two statements correctly describe MAC addresses? (Choose two.)
MAC addresses are used to identify a specific NIC. *
MAC addresses contain a network number and unique host identification.
MAC addresses are physical addresses. *
MAC addresses are always assigned to network devices by a network administrator.
MAC addresses are Layer 3 addresses.
47
Which part of the electromagnetic spectrum is commonly used by wireless LANs?
Bluetooth
infrared
Industrial Scientific and Medical (ISM) * (ISM because Bluetooth, IrDA and RF ar
e technologies, part of a spectrum is a band in this case ISM I think 2,4 and 5
GHz, not sure can be also RF)
radio frequency (RF)
48
As an assignment, a computer science student needs to present data in binary for
mat. What are the two possible values that the student can use? (Choose two.)
0 *
1 *
2^0
A
F

49
A network technician is required to provide access to the Internet for a large c
ompany. What is needed to accomplish this task?
ISP
private IP addresses for each host *
static IP addresses for each host
DHCP server

50
A small company owns one older AP that provides a maximum data rate of 11 Mb/s.
The company wants to add a newer AP that will provide a faster data rate but be
compatible with the existing AP. What two wireless standards are referenced in t
his scenario? (Choose two.)
802.11
802.11a
802.11b*
802.11d
802.11g*

51
Refer to the exhibit. What cabling fault does the exhibit represent? ([Bad Word]
dunno, always been shitty with cables )
open
reversed pair
short *
split pair
52
The area covered by a single AP is known as what?
ad-hoc network *
basic service set *
independent basic service set (Wtf is independent BSS?)
extended service set
distribution system
-------------------------------------------

Você também pode gostar