Sie sind auf Seite 1von 15

When terminating a UTP cable, why is it important to push the wires all the way into the end

of the connector?
to allow the cable to endure more stretching or twisting
to ensure good electrical contact
to ensure that the wires are in correct order
to minimize crosstalk

What two preconfigured settings that affect security arRefer to the graphic. What is the
purpose of assigning a Network Name of Academy?e found on most new wireless routers?
(Choose two.)
broadcast SSID
MAC filtering enabled
WEP encryption enabled
PSK authentication required
default administrator password

Refer to the exhibit. Why would a network administrator use the network mode that is
shown?
to support hosts on different IP networks
to support hosts that use different 802.11 standards
to support both wireless and wired Ethernet hosts
to support hosts with different operating systems
to support hosts with network cards from different manufacturers

Which type of network attack occurs when an unauthorized person tries to persuade a user to
share a network user ID and password?
brute force
denial of service
data manipulation
social engineering

What does the term "attenuation" mean in data communication?


loss of signal strength as distance increases
time for a signal to reach its destination
leakage of signals from one cable pair to another
strengthening of a signal by a networking device

Which two issues can cause connectivity problems on a wireless network? (Choose two.)
incorrect SSID
broadcast SSID
overlapping channels
low number of clients in BSS
802.11b clients attempting connection to 802.11g APs

Which two automatic addressing assignments are supported by DHCP? (Choose two.)
local server address
subnet mask
default gateway address
physical address of the recipient
physical address of the sender

Which type of network supports DHCP and DNS services for network users in a network
domain?
client/server
peer-to-peer
hierarchical
ad hoc

Refer to the exhibit. What is the reason that the host is unable to connect to the Internet?
DHCP needs to be enabled on the router.
The router has an incorrect DHCP starting address.
The IP address on the host is in the wrong network.
The host is configured with an incorrect gateway.

Refer to the exhibit. A home network is configured with the information in the graphic. A user
tries to manually create a new connection to the network using the SSID Ciscoclass. However,
a connection cannot be made. What could be the problem?
The SSID is case-sensitive.
The SSID must contain at least one number.
The SSID should be used with the default name.
The SSID must contain a minimum of 32 characters.

Which two protocols are responsible for encrypting data on a wireless network? (Choose two.)
EAP
PSK
WEP
WPA
PAP

What is the function of the DNS server?


It assigns IP addresses to clients.
It accepts HTTP requests from clients.
It maps a hostname to a corresponding IP address.
It manages the domain that clients are assigned to.

Which part of the electromagnetic spectrum is commonly used to exchange data between a
PDA and a computer?
FM
radar
infrared
ultraviolet

Which wireless protocol is used for encryption?


EAP
Open
PSK
WEP

What information within a data packet does a router use, by default, to make forwarding
decisions?
the destination MAC address
the destination IP address
the destination host name
the destination service requested
What information is contained in the trailer of an Ethernet frame?
user data
source IP address
segment information
destination MAC address
error checking information

What two commands can be used to form a new binding if client information does not agree
with the DHCP client table? (Choose two.)
ipconfig /release
ipconfig /all
ipconfig /flushdns
ipconfig /renew
ipconfig

What is the default subnet mask for an IP address of 64.100.19.14?


255.0.0.0
255.255.0.0
255.255.255.0
255.255.255.255

Which term is associated with logical addressing?


IP addresses
port addresses
physical addresses
Media Access Control addresses

A network technician suspects that malware on a user PC is opening multiple TCP


connections to a specific foreign host address. Which Windows command line utility can be
used to confirm the multiple TCP connections?
ping
netstat
tracert
ipconfig
nslookup

Bottom-up troubleshooting begins at which layer of the OSI model?


network layer
physical layer
data link layer
transport layer
application layer

Which type of firewall technique can be used to allow inbound traffic from the public network
only if it was initiated from the internal network?
URL filtering
packet filtering
application filtering
stateful packet inspection
The area covered by a single AP is known as what?
ad-hoc network
basic service set
independent basic service set
extended service set
distribution system

Which network entity would most likely be configured as both a DHCP client and a DHCP
server?
ISP
desktop PC
wireless laptop
PC-based server
integrated services home router

What are two ways that a user can interact with an operating system shell? (Choose two.)
CLI
OS
GUI
NIC
kernel

A user starts a file transfer between a client machine and an FTP server. Which list correctly
represents the sequence of protocols that are used by the client machine to encapsulate the
FTP data traffic for transmission?
FTP, TCP, IP, Network Access Protocols
FTP, UDP, IP, Network Access Protocols
FTP, IP, UDP, Network Access Protocols
FTP, IP, TCP, Network Access Protocols

Which wireless technology allows only one-to-one connections and is typically used for short-
range, line-of-sight communication?
GSM
Wi-Fi
Infrared
Bluetooth

Which protocol is used to transfer files among network devices and perform file-management
functions?
DNS
FTP
HTML
HTTP

A network administrator has been notified that users have experienced problems gaining
access to network resources. What utility could be used to directly query a name server for
information on a destination domain?
ping
tracert
netstat
ipconfig
nslookup

What is a weakness of WEP that is solved by WPA?


WEP is a proprietary standard whereas WPA is an open standard.
WEP keys are only 64 bits long whereas WPA keys are 128 bits long.
WEP uses the same key for every connection whereas WPA uses a different key for each
connection.
WEP uses a fixed length key for every connection whereas WPA uses a different key length for
each connection.

How do ISPs obtain public IP addresses?


They create the addresses themselves.
They obtain the addresses from the home PCs.
They obtain the addresses from the Internet registry.
They obtain the addresses from the RFC.

Which type of computer has an integrated mouse?


desktop
laptop
mainframe
server
pocket PC

Refer to the exhibit. The security policy of an organization allows employees to connect to the
office intranet from their homes. Which type of security policy is this?
acceptable use
incident handling
network maintenance
remote access

What is a service pack?


an access policy
an agreement between a company and a vendor
a piece of code created to fix one specific problem
a collection of patches and updates released by a vendor
a small piece of software designed specifically for security issues

Which network design layer provides a connection point for end user devices to the network?
access
core
distribution
network

How does a DMZ enhance network security for an organization?


blocks viruses and spyware
restricts internal user access to prohibited Internet sites
allows external customer access to designated internal resources
removes suspicious attachments from incoming and outgoing e-mail

All hosts within a domain receive the same frame that originates from one of the devices. The
domain is also bounded by routers. What type of domain is this?
broadcast
collision
local
multicast

An administrator is troubleshooting a network problem that involves the inability of users to


reach Internet sites. During troubleshooting, the administrator is able to successfully ping web
sites by their IP address, but pings to domain names are unsuccessful. Which service is most
likely at fault?
DHCP
DNS
FTP
NAT

A local PC has the correct configuration that is required to access the network. A ping
command that is sourced at the PC does not receive a response from a remote device. Which
operating system command might be used to determine where the connection failed?
netstat
tracert
ipconfig
nslookup

What is the function of a physical topology map?


records IP addressing of each host
records hostnames and applications
organizes groups of hosts by how they use the network
shows where wiring is installed and the locations of network devices

Refer to the exhibit. The wireless router WR1 is configured with the address shown and
DHCP is not configured. What will be the result of a technician configuring the address
172.16.14.255 on the laptop?
The laptop will be configured with the network address.
The laptop will be configured with a public IP address.
The laptop will be configured with a broadcast address.
The laptop will be configured within the same network as WR1.

How do wireless devices within a BSS access an available channel?


Channels are used sequentially in round-robin fashion by each device in the BSS.
Devices ask permission to use a channel by sending the AP a Request to Send message.
Every device within the BSS is assigned its own channel and has its own dedicated connection.
A device sends data and if it senses collisions it waits a predetermined time before re-sending on a
different channel.

What is a major characteristic of asymmetric Internet service?


Download speeds and upload speeds are equal.
Download speeds are faster than upload speeds.
Data traffic speeds are faster than voice traffic speeds.
Used when consistently uploading large amounts of graphics, video and multimedia traffic.

Which two TCP/IP properties must match on hosts in the same LAN if the hosts are to be able
to communicate with each other? (Choose two.)
the subnet mask
the DNS server configurations
the default gateway configurations
the host portion of the IP address
the network portion of the IP address

What is an advantage of purchasing a custom-built computer?


It is beneficial for less knowledgeable consumers.
The waiting period for assembly is negligible.
The cost is lower compared to a computer that has been preassembled.
The user can specify high-performance components to meet specific needs.

What two pieces of information should a help desk technician document while
troubleshooting connectivity issues with an end user? (Choose two.)
the CPU clock speed of the computer
the number of network jacks that are in the room
if the user can ping the default gateway address
if the word processing software is installed correctly
whether the PC uses dynamic or static IP addressing

Refer to the exhibit. Assume that the command output is from a wireless DHCP client that is
connected to a Linksys integrated router. What can be deduced from the output?
The DHCP configuration on the router needs to be verified.
The WEP key or SSID needs to be verified.
The wireless connection is operational.
The wireless NIC driver or the NIC itself needs to be reinstalled.

Which two statements are true about local applications? (Choose two.)
They run on the network.
An example of a local application is e-mail.
They are accessed from a remote computer.
They are stored on the local hard disk.
They run on the computer where they are installed.

Refer to the exhibit. H1 can ping H2, H3, and the Fa0/0 interface of router R1. H2 and H3 but
not H1 can ping H4 and H5. What is a possible cause for the H1 failure?
Router R1 has no route to the destination network.
Switch S1 does not have an IP address configured.
The link between router R1 and switch S2 has failed.
Host H1 does not have a default gateway configured.

What destination IP address is used in a unicast packet?


a specific host
a group of hosts
all hosts on the network
the network broadcast address

How does a crossover cable make it possible for two "like devices" (for example, two switches)
to communicate?
The transmit pins are disconnected and only the receive pins are used.
The transmit pins on one device are connected to the transmit pins on the other device.
The receive pins on one device are connected to the receive pins on the other device.
The transmit pins on one device are connected to the receive pins on the other device.

Some new features are available for the OS that is currently running on a user's PC. What
method should be chosen so that the user can install these new feature sets?
clean install
multi-boot
upgrade
virtualization

What is the default subnet mask for the IP address 128.107.23.10?


255.0.0.0
255.255.0.0
255.255.255.0
255.255.255.255

When are leased lines typically used?


when low bandwidth is required
for home and small business connectivity
when a dedicated digital data line is necessary
as a less expensive option to cable and DSL modem service

A home user is looking for an ISP connection that provides high speed digital transmission
over regular phone lines. What ISP connection type should be used?
DSL
dial-up
satellite
cell modem
cable modem

What is the purpose of pop-up blocker software?


It detects and removes spyware.
It detects and removes viruses.
It prevents the display of advertisement windows.
It removes unwanted e-mail.

Which service will translate private internal IP addresses into Internet routable public IP
addresses?
ARP
DHCP
DNS
NAT

What is an ISP?
It is a standards body that develops cabling and wiring standards for networking.
It is a protocol that establishes how computers within a local network communicate.
It is an organization that enables individuals and businesses to connect to the Internet.
It is a networking device that combines the functionality of several different networking devices in
one.

A college network administrator is planning a wireless LAN to provide service in the student
lounge and outdoor patio. The requirements include a range of at least 80 meters and a speed
of 30 Mb/s. Which wireless LAN standard meets these requirements?
802.11
802.11a
802.11b
802.11g

Which adapter card would be required for a PC to exchange information with other PCs on a
LAN?
NIC
video card
sound card
internal modem

Which statement correctly describes the function of ARP?


ARP is used by the switches on the network to build their MAC tables.
ARP is used by the routers on the network to build their routing tables.
ARP is used by hosts to resolve a host name to an IP address for the destination host.
ARP is used by hosts to resolve an IP address to a MAC address for the destination host.

After attaching four PCs to the switch ports, configuring the SSID and setting authentication
properties for a small office network, a technician successfully tests the connectivity of all PCs
that are connected to the switch and WLAN. A firewall is then configured on the device prior
to connecting it to the Internet. What type of network device includes all of the described
features?
switch
ISR router
firewall appliance
standalone wireless access point

What type of computer would most likely use a docking station?


laptop
server
desktop
mainframe
workstation

A network administrator is setting up an application filtering firewall. Company security


policy states that FTP sessions that are coming from the Internet and use the standard FTP
port must be blocked. Which TCP/UDP port must the administrator block on the firewall to
be in compliance?
21
23
53
80

When would infrared be used to connect network devices?


when connecting multiple host devices to a wireless access point
when synchronizing a PC with a PDA that is in line of sight
when connecting a PC to a network switch that is located in another room
when updating two access points that are located in separate buildings

A network analyst is asked to create a physical topology map of the campus network. Which
two items of information should be included in the map? (Choose two.)
DNS entries
cabling runs
server group information
IP addressing scheme
network device locations

What type of message is sent to a specific group of hosts?


static
unicast
dynamic
multicast
broadcast

What measurement is commonly used to describe communication speed when transferring


data?
bps
cps
Hz
MB

Which IP address type is intended for a specific host?


broadcast
multicast
simulcast
unicast

Refer to the exhibit. If H4 sends a message to H1 and the destination MAC address is in the
MAC table for both Switch1 and Switch2, which host devices will receive the message?
only H1
hosts H1 and H4
all hosts that are connected to Switch1
all hosts that are connected to Switch1 and Switch2

Refer to the graphic. What is the purpose of assigning a Network Name of Academy?
It identifies the wireless LAN.
It translates IP addresses into easy-to-remember domain names.
It encrypts data between the wireless client and the access point.
It allows access to the AP configuration GUI by name rather than address.
It translates an internal address or group of addresses into an outside, public address.

Which two statements are true about routers and switches? (Choose two.)
Switches and routers filter collisions.
Switches and routers filter broadcasts.
Switches and routers maintain ARP and routing tables.
A switch uses MAC addresses to build a forwarding table, whereas a router uses IP networks to
build its routing table.
A switch uses destination addresses to build a MAC table, whereas a router builds a routing table
based on source IP networks.

TCP/IP data transmission between the source and destination host is de-encapsulated in four
steps:
A. The TCP header is removed.
B. Bits are decoded and the destination MAC address is recognized.
C. The IP header is removed and the contents are passed to the next layer.
D. The Ethernet header and trailer are removed.
What is the correct sequence of these steps?
A, B, C, D
A, C, B, D
B, C, D, A
B, D, C, A
C, A, B, D

Refer to the exhibit. What is a possible reason that the PC is unable to ping the default
gateway IP address?
The PC is on a different network than the default gateway.
A straight-through cable should be used to connect the switches.
A straight-through cable should be used to connect the PC to the switch.
Because the correct cable types are used for each segment, a bad cable could be the problem.

Refer to the exhibit. The wired and wireless hosts can connect to each other but not to the
Internet. All cabling and interface indicator lights appear to be in order. What is the most
effective next step in a bottom-up troubleshooting process?
Verify DNS configurations
Verify the default gateway configurations
Verify that the wireless settings are correct
Verify that wired and wireless components are on the same network.

Which troubleshooting technique can be used to quickly restore user functionality without
having to spend much time identifying the exact problem?
top-down
bottom-up
substitution
trial and error

What destination IP address does a DHCP client use to send the initial DHCP Discover packet
when looking for a DHCP server?
127.0.0.1
224.0.0.1
255.255.255.255
the IP address of the default gateway
Which three addresses belong to the category of private IP addresses? (Choose three.
10.0.0.1
128.0.0.1
150.0.0.1
172.16.0.1
192.168.31.19
172.168.31.1

Which portion of the packet does a router use to forward the packet to the destination?
source IP address
user data
destination IP address
control information
destination MAC address

How does a crossover cable connect two routers?


It connects the pins that are used for receiving on one router to the pins that are used for receiving
on the other router.
It connects the pins that are used for transmitting on one router to the pins that are used for
receiving on the other router.
It disconnects the transmit pins and uses only the receive pins.
It uses the same pins for transmitting and receiving.

What is a characteristic of Bluetooth wireless technology?


It allows one-to-many connections.
It operates in the 5GHz radio frequency band.
It is unable to penetrate walls with a useable signal.
It can be used for communications beyond 100 meters

What is the purpose of TCP?


to manage data links and physical network transmissions
to specify the format of requests and responses that are exchanged between the client and server
to assign the logical address and encapsulate the request into packets for routing to the destination
to provide flow control and acknowledgment of packets that are exchanged between the client and
server

What is the function of CSMA/CA on a wireless Ethernet network?


to prevent collisions
to broadcast messages
to select the least congested channel
to establish an ACK between devices

Which statement is true about packet filtering?


It recognizes and filters specific types of attacks.
It permits access based on IP address.
It is performed from a host network device.
It translates an internal address or group of addresses into a public address that is sent across the
network.
What are two examples of peripheral output devices? (Choose two.)
barcode reader
digital camera
external DVD
headphones
printer

What is an advantage of selecting an operating system that has a GPL license over one with a
commercial license?
The GPL license-based operating system ensures that everyone can participate in the enhancement
of the product.
The GPL license-based operating system implements a structured development life cycle.
The GPL license-based operating system prevents modification of the source code.
The GPL license-based operating system provides structured support.

What are two characteristics of a MAC address? (Choose two.)


It indicates the physical location of the host within the network.
It is dynamically assigned by a DHCP server.
It is displayed in HEX characters.
It is a physical address.
It is cable-based.

Which network design layer provides hosts with initial connectivity to the network?
access
core
distribution
network

In an attempt to verify connectivity, a user issues the ping command to a device that is not on
the local network. The ping is unsuccessful. What can be determined from this result?
The default gateway is misconfigured.
The patch cable on the host station is faulty.
The router between the host and destination is faulty.
Further troubleshooting will be required to reach a definite conclusion.

Which two causes of networking problems are related to the physical layer? (Choose two.)
damaged cables and connectors
incorrect addressing
incorrect subnet mask
overheated components
incorrect default gateway

What advantage does a peer-to-peer network have over a client-server network?


It increases security.
It increases scalability.
It produces a higher performance for hosts.
It eliminates the need for centralized administration.

Which wireless component allows wireless clients to gain access to a wired network?
PDA
STA
access point
wireless bridge

Refer to the exhibit. What default gateway address will be assigned to PC1 if access to remote
resources is needed?
192.31.7.3
192.168.1.101
192.168.1.253
A default gateway is not necessary.

Which two statements are true about a Linksys router that is running NAT? (Choose two.)
It receives a public Internet routable address from the ISP.
The assigned LAN addresses are considered global addresses.
It dynamically distributes static IP addresses to the hosts in the LAN.
It converts public IP addresses to private IP addresses in packets that are destined for the Internet.
It allows packets from multiple hosts on the LAN to share a single public IP address to access the
Internet

Which two components are necessary for a wireless client to be installed on a WLAN?
(Choose two.)
media
wireless NIC
custom adapter
crossover cable
wireless bridge
wireless client software

Which picture shows a USB port on a PC?


Refer to the exhibit. Which option correctly represents the encapsulation of a packet that is sent by
Host1 to the web server?

A user tries to open a page on the web server at www.cisco.com. The users workstation does not
have the destination IP address in order to encapsulate the request. Which network topology will
provide the services that are required to associate the name of the web server with an IP address?

Das könnte Ihnen auch gefallen