Escolar Documentos
Profissional Documentos
Cultura Documentos
2Which device is often configured to act as both a DHCP client and a DHCP server?
home PC
ISP modem
wireless-enabled laptop
integrated services router
Refer to the graphic. Based on the information that is shown, what statement is true?
This configuration would be commonly found in an ad hoc wireless network.
Any wireless client that is attached to this access point would have the same IP address an
SSID.
All wireless devices that are connected to this access point must have an assigned SSID o
Academy.
In addition to accepting wireless client requests, this access point must connect to the wired
network.
8 Some new features are available for the OS that is currently running on a user's PC. What met
should be chosen so that the user can install these new feature sets?
clean install
multi-boot
upgrade
virtualization
13 Which network design layer provides a connection point for end user devices to the network?
access
core
distribution
network
1 What destination port number would be used if a client wished to establish a secure connectio
4 web server?
21
53
80
443
15 A client wishes to establish an FTP session with a remote server. Which two numbers could b
assigned to the client source port? (Choose two.)
20
1010
1021
1305
1404
Refer to the exhibit. Host2 attempts to establish communications with Server1. What action w
switch SW1 take prior to forwarding the frame?
flood the frame out all interfaces
learn the MAC address that is associated with Host2
assign a MAC address to Host2 from the MAC table
poll all interfaces to learn their assigned IP addresses
1
7
Refer to the exhibit. If H4 sends a message to H1 and the destination MAC address is in the M
table for both Switch1 and Switch2, which host devices will receive the message?
only H1
hosts H1 and H4
all hosts that are connected to Switch1
all hosts that are connected to Switch1 and Switch2
1 A computer joins the network and announces itself to all hosts on the LAN. What type of mess
9 does the computer send out?
broadcast
simulcast
multicast
unicast
20 A college network administrator is planning a wireless LAN to provide service in the student lo
and outdoor patio. The requirements include a range of at least 80 meters and a speed of 30
Which wireless LAN standard meets these requirements?
802.11
802.11a
802.11b
802.11g
A network engineer wants to represent confidential data in binary format. What are the two possible
values that the engineer can use? (Choose two.)
0
1
2
A
F
2 A network designer is working with a small company to determine the network type best suited
2 needs of the company. Which two characteristics could the designer use to describe a peer-to
network to the owner of the company? (Choose two.)
central administration
easy to install
low cost
scalable
secure
23 A home user is looking for an ISP connection that provides high speed digital transmission ov
regular phone lines. What ISP connection type should be used?
DSL
dial-up
satellite
cell modem
cable modem
2 What is the name for the contract between a customer and an ISP that specifies requirements
4 uptime and service response time?
DSL
IAB
NAP
SLA
2 A network administrator has been notified that users have experienced problems gaining acce
7 network resources. What utility could be used to directly query a name server for information o
destination domain?
ping
tracert
netstat
ipconfig
nslookup
28
Refer to the graphic. Assume that the command output is from a wireless DHCP client that is
connected to a Linksys integrated router. What can be deduced from the output?
The wireless connection is good.
The WEP key or SSID needs to be checked.
The DHCP configuration on the router needs to be checked.
The wireless NIC driver or the NIC itself needs to be reinstalled.
2 What component of a personal computer is responsible for the processing of all data?
9 RAM
CPU
firewall
system bus
operating system
30
Refer to the exhibit. Assume that the exhibited output is from a host that is connected to a Lin
integrated router. What is the first thing that should be checked if using a bottom-up troublesh
approach?
the default gateway on the host
the IP address on the host
the IP address on the router
the link status LED on the front of the router
the subnet mask on the host
What is an ISP?
It is a standards body that develops cabling and wiring standards for networking.
It is a protocol that establishes how computers within a local network communicate.
It is an organization that enables individuals and businesses to connect to the Internet.
It is a networking device that combines the functionality of several different networking dev
one.
33 Which protocol is used to transfer files among network devices and perform file-management
functions?
DNS
FTP
HTML
HTTP
3 A network technician suspects that malware on a user PC is opening multiple TCP connection
4 specific foreign host address. Which Windows command line utility can be used to confirm the
multiple TCP connections?
ping
netstat
tracert
ipconfig
nslookup
3 For the second time in a week, workstations on a LAN are not able to log into the server. The
7 technician fixed the problem the first time, but cannot remember the steps taken to solve it. W
aspect of the troubleshooting process has the technician neglected?
identifying the problem
asking end-users questions
documenting the troubleshooting process
using structured techniques to solve a problem
38
Refer to the exhibit. A user sets up a home network and uses a crossover cable from Switch1
Internet port on the ISR. However, there is no connection between the host H1 and the server
should the user do in order to establish a connection?
Replace the cable with a console cable.
Replace the cable with a rollover cable.
Replace the failed crossover cable with a working crossover cable.
Replace the cable with a straight-through cable.
40 Which troubleshooting technique can be used to quickly restore user functionality without havin
spend much time identifying the exact problem?
top-down
bottom-up
substitution
trial and error
4
2
Refer to the exhibit. An educational institution needs to connect PC systems that use private I
addressing to the Internet. They have multiple systems that need to access the Internet, but w
only able to purchase one public IP address. What should be activated on the Linksys integra
router to achieve this goal?
authentication
DHCP
encryption
firewall
NAT
WEP
43 What must be identical on all devices in a WLAN for successful wireless communication be
the devices?
SSID
antenna type
network mode
wireless NIC driver
4 Which type of network supports DHCP and DNS services for network users in a network dom
4 client/server
peer-to-peer
hierarchical
ad hoc
45 What two pieces of information should a help desk technician document while troubleshooting
connectivity issues with an end user? (Choose two.)
the CPU clock speed of the computer
the number of network jacks that are in the room
if the user can ping the default gateway address
if the word processing software is installed correctly
whether the PC uses dynamic or static IP addressing
Which adapter card would be required for a PC to exchange information with other PCs on a L
NIC
video card
sound card
internal modem
50 What statement describes the filtering of traffic via the use of Stateful Packet Inspection?
It recognizes and filters predefined URLs
It permits access that is based on the application.
It permits access based on IP or MAC addresses.
It permits incoming packets that are legitimate responses to requests from internal hosts.
It translates an internal address or group of addresses into a public address that is sent ac
the network.
Your school network blocks all websites related to online gaming. What type of security policy
being applied?
identification and authentication
remote access
acceptable use
incident handling
5 What portion of the destination IP address is used as a packet is routed through the Internet?
2 subnet mask
host portion
network portion
default gateway address