Managing Networks Exam 1

¡Supera tus tareas y exámenes ahora con Quizwiz!

Your network follows the 100BaseTX specifications for Fast Ethernet. What is the maximum cable segment length allowed? Correct Answer: 2,000 meters Correct Answer: 100 meters Correct Answer: 500 meters Correct Answer: 412 meters Correct Answer: 1,000 meters

Correct Answer: 100 meters

You want to implement an Ethernet network at very long distances using fiber optic cables. Which standard and cable type would you choose? (Select two.) Correct Answer: 1000BaseCX Correct Answer: Single-mode fiber Correct Answer: 1000BaseLX Correct Answer: 1000BaseSX Correct Answer: Muti-mode fiber

Correct Answer: 1000BaseLX Correct Answer: Single-mode fiber

You have been tasked with designing an Ethernet network. Your client needs to implement a very high-speed network backbone between campus buildings, some of which are around 300 meters apart. Multi-mode fiber optic cabling has already been installed between buildings. Your client has asked that you use the existing cabling. Which Ethernet standard meets these guidelines? (Choose two.) Correct Answer: 10GBaseER Correct Answer: 10GBaseSR Correct Answer: 10BaseFL Correct Answer: 1000BaseCX Correct Answer: 1000BaseT Correct Answer: 1000BaseSX

Correct Answer: 10GBaseSR Correct Answer: 1000BaseSX

Assuming the network is indicated by the default portion of the IP address, which three of the following IP addresses belong to the Class A network 114.0.0.0? (Select three.) Correct Answer: 115.77.89.4 Correct Answer: 115.0.0.66 Correct Answer: 114.122.66.12 Correct Answer: 115.88.0.55 Correct Answer: 114.0.0.15 Correct Answer: 114.58.12.0

Correct Answer: 114.122.66.12 Correct Answer: 114.0.0.15 Correct Answer: 114.58.12.0

A host on the network has an IP address of 129.11.99.78 using the default subnet mask. How would you identify the address and mask using CIDR notation? Correct Answer: 129.11.99.78:24 Correct Answer: 129.11.99.78/8 Correct Answer: 129.11.99.78:8 Correct Answer: 129.11.99.78/16 Correct Answer: 129.11.99.78:16 Correct Answer: 129.11.99.78/24

Correct Answer: 129.11.99.78/16

Which of the following is the last IP address that can be assigned to hosts on the 166.70.0.0 network using the default subnet mask? Correct Answer: 166.70.255.254 Correct Answer: 166.71.0.0 Correct Answer: 166.70.255.255 Correct Answer: 166.70.0.255 Correct Answer: 166.70.0.254

Correct Answer: 166.70.255.254

Which of the following IP address ranges is reserved for automatic private IP addressing? Correct Answer: 169.192.0.0 - 169.192.254.255 Correct Answer: 169.168.0.1 - 169.168.255.255 Correct Answer: 192.168.0.1 - 192.168.254.255 Correct Answer: 169.254.0.1 - 169.254.255.254 Correct Answer: 192.168.0.0 - 192.168.255.254

Correct Answer: 169.254.0.1 - 169.254.255.254

You've decided to use a subnet mask of 255.255.192.0 on the 172.17.0.0 network to create four separate subnets. Which network IDs will be assigned to these subnets in this configuration? (Select two.) Correct Answer: 172.17.16.0 Correct Answer: 172.17.32.0 Correct Answer: 172.17.0.0 Correct Answer: 172.17.128.0 Correct Answer: 172.17.96.0

Correct Answer: 172.17.0.0 Correct Answer: 172.17.128.0

Your network has been assigned the Class B network address of 179.113.0.0. Which three of the following addresses can be assigned to hosts on your network? Correct Answer: 180.113.0.67 Correct Answer: 179.114.88.0 Correct Answer: 179.113.65.12 Correct Answer: 179.113.0.0 Correct Answer: 179.112.95.64 Correct Answer: 179.113.89.0 Correct Answer: 179.113.0.118

Correct Answer: 179.113.65.12 Correct Answer: 179.113.89.0 Correct Answer: 179.113.0.118

Your network has been assigned the Class C network address 200.78.151.0. Which of the following addresses can be assigned to hosts on your network? (Select three.) Correct Answer: 200.78.151.252 Correct Answer: 200.78.151.257 Correct Answer: 200.78.151.111 Correct Answer: 200.78.151.0 Correct Answer: 200.78.151.12 Correct Answer: 200.78.151.255 Correct Answer: 200.78.152.14

Correct Answer: 200.78.151.252 Correct Answer: 200.78.151.111 Correct Answer: 200.78.151.12

Which two of the following statements about the dynamic host configuration protocol (DHCP) are true? Correct Answer: A DHCP server assigns addresses to requesting hosts. Correct Answer: It is only used to deliver IP addresses to hosts. Correct Answer: It can deliver other configuration information in addition to IP addresses. Correct Answer: It cannot be configured to assign the same IP address to the same host each time it boots.

Correct Answer: A DHCP server assigns addresses to requesting hosts. Correct Answer: It can deliver other configuration information in addition to IP addresses.

Which of the following is a valid MAC address? Correct Answer: 145.65.254.10 Correct Answer: AB.07.CF.62.16.BD Correct Answer: FABC.875E.9BG6 Correct Answer: 95ABC2F4.ABC5.569D.43BF

Correct Answer: AB.07.CF.62.16.BD

A host wants to send a message to another host that has the IP address 115.99.80.157. IP does not know the hardware address of the destination device. Which protocol can be used to discover the MAC address? Correct Answer: BOOTP Correct Answer: ICMP Correct Answer: DHCP Correct Answer: IGMP Correct Answer: DNS Correct Answer: ARP

Correct Answer: ARP

The media access control method of all Ethernet networks is __________. Correct Answer: Polling Correct Answer: CSMA/CA Correct Answer: CSMA/CD Correct Answer: Token passing

Correct Answer: CSMA/CD

What is the minimum cable specification that supports 1000 Mbps Ethernet? Correct Answer: Cat 3 Correct Answer: Cat 4 Correct Answer: Cat 5 Correct Answer: Cat 5e Correct Answer: Cat 6 Correct Answer: Cat 7

Correct Answer: Cat 5e

You have implemented a network where hosts are assigned specific roles, such as file sharing and printing roles. Other hosts access those resources, but do not host services of their own. What type of network do you have? Correct Answer: Extranet Correct Answer: Peer-to-peer Correct Answer: Intranet Correct Answer: Client-server

Correct Answer: Client-server

Which of the following tasks is associated with the Session layer? Correct Answer: Host ID number assignment Correct Answer: Connection establishment Correct Answer: Transmission synchronization Correct Answer: Acknowledgement coordination

Correct Answer: Connection establishment

The UDP transport protocol provides which of the following features? (Select all that apply.) Correct Answer: Connectionless datagram services Correct Answer: Low overhead Correct Answer: Guaranteed delivery Correct Answer: Sequence numbers and acknowledgements

Correct Answer: Connectionless datagram services Correct Answer: Low overhead

What is the basic purpose of the OSI Physical layer? Correct Answer: Coordinates rules for routing packets. Correct Answer: Coordinates rules for managing network servers. Correct Answer: Defines basic physical structures, such as disks. Correct Answer: Coordinates rules for transmitting bits.

Correct Answer: Coordinates rules for transmitting bits.

You are building network cables and attaching RJ45 connectors to each end. Which tool do you need for this task? Correct Answer: Needle nose pliers Correct Answer: Punch down tool Correct Answer: Wire puller Correct Answer: Crimping tool

Correct Answer: Crimping tool

You have a TCP/IP network with 50 hosts. There have been inconsistent communication problems between hosts. You run a protocol analyzer and discover that two hosts have the same IP address assigned. Which protocol can you implement on your network to help prevent problems such as this? Correct Answer: TCP Correct Answer: DHCP Correct Answer: ICMP Correct Answer: IP Correct Answer: SNMP Correct Answer: IGMP

Correct Answer: DHCP

You have a network with 50 workstations. You want to automatically configure workstations with the IP address, subnet mask, and default gateway values. Which device should you use? Correct Answer: DHCP server Correct Answer: Gateway Correct Answer: Router Correct Answer: DNS server

Correct Answer: DHCP server

You need to enable hosts on your network to find the IP address of logical names such as srv1.myserver.com. Which device would you use? Correct Answer: Load balancer Correct Answer: DNS server Correct Answer: Bandwidth shaper Correct Answer: IPS Correct Answer: IDS

Correct Answer: DNS server

You have a small network, as shown in the Exhibit. You have configured the IP address and subnet mask on Wrk1. You want to be able to use Wrk1 to browse the internet to connect to sites like www.cisco.com. Which other parameters are required on the workstation? (Select two.) Correct Answer: DHCP server address Correct Answer: WINS server address Correct Answer: Default gateway Correct Answer: Host name Correct Answer: DNS server address

Correct Answer: Default gateway Correct Answer: DNS server address

You are the administrator of your company's network. You want to prevent unauthorized access to your intranet from the internet. Which of the following should you implement? Correct Answer: Proxy server Correct Answer: Firewall Correct Answer: Packet Internet Groper Correct Answer: ICS

Correct Answer: Firewall

You are the network administrator for a small organization. Recently, you contracted with an ISP to connect your organization's network to the internet to provide users with internet access. Since doing so, it has come to your attention that an intruder has invaded your network from the internet on three separate occasions. What type of network hardware should you implement to prevent this from happening again? Correct Answer: CSU/DSU Correct Answer: Switch Correct Answer: Firewall Correct Answer: Hub Correct Answer: Proxy server Correct Answer: Router

Correct Answer: Firewall

You want a switch to have the ability to modify the media type the switch port supports. Which type of module might you use to make this possible? Correct Answer: GBIC Correct Answer: MPLS Correct Answer: SFP Correct Answer: OC-x

Correct Answer: GBIC Correct Answer: SFP

Which of the following are advantages of using fiber optic cabling for a network? (Select two.) Correct Answer: No special training or equipment is required Correct Answer: Greater cable distances without a repeater Correct Answer: Immunity to electromagnetic interference Correct Answer: Lower installation cost

Correct Answer: Greater cable distances without a repeater Correct Answer: Immunity to electromagnetic interference

Which protocol is used on the World Wide Web to transmit web pages to web browsers? Correct Answer: SMTP Correct Answer: HTTP Correct Answer: NNTP Correct Answer: HTML

Correct Answer: HTTP

Which protocol is used to securely browse a website? Correct Answer: SSH Correct Answer: ARP Correct Answer: HTTPS Correct Answer: SIP Correct Answer: UDP

Correct Answer: HTTPS

Which of the following devices does not segment the network? Correct Answer: Switch Correct Answer: Firewall Correct Answer: Router Correct Answer: Hub

Correct Answer: Hub

Which of the following protocols allows hosts to exchange messages to indicate problems with packet delivery? Correct Answer: ARP Correct Answer: TCP Correct Answer: IGMP Correct Answer: DHCP Correct Answer: IP Correct Answer: ICMP

Correct Answer: ICMP

You have a network that occupies both floors of a building. The WAN service provider has installed the line for the WAN service in a wiring closet on the main floor. You have a second wiring closet on the second floor directly above the wiring closet that holds the demarc. Which of the following terms describes the closet on the second floor? Correct Answer: IDF Correct Answer: Vertical cross connect Correct Answer: Horizontal cross connect Correct Answer: Demarc extension Correct Answer: MDF

Correct Answer: IDF

You have a workstation connected to a small branch network using a single switch. The network does not have any routers and is not connected to the internet. What are the minimum configuration parameters required on the workstation to be able to communicate with all hosts on the network? Correct Answer: IP address and subnet mask Correct Answer: IP address Correct Answer: IP address and default gateway Correct Answer: IP address, subnet mask, and default gateway

Correct Answer: IP address and subnet mask

You recently created a new network segment for the development department. Because the hosts are now on a different network segment, they can no longer contact the DHCP server. Both network segments are connected via a Cisco router. Which of the following would be the best action to take in order to fix the problem? Correct Answer: Implement an IP helper address on the router. Correct Answer: Move the DHCP server to the new network segment. Correct Answer: Install and configure a new DHCP server on the development network segment. Correct Answer: Configure the router to forward broadcast messages.

Correct Answer: Implement an IP helper address on the router.

Your Windows DHCP server had a default lease time of eight days. However, you have decided to reconfigure this DHCP server to dynamically assign IP addresses to DHCP clients using a lease duration of four days. What impact, if any, will this have on the network? Correct Answer: Network bandwidth will increase Correct Answer: Router performance will improve Correct Answer: No impact Correct Answer: Increased network traffic Correct Answer: Decreased network traffic

Correct Answer: Increased network traffic

Which of the following are reasons to configure VLANs on a switch as opposed to using switches without VLANs? (Select two.) Correct Answer: Increased number of broadcast domains Correct Answer: Increased number of collision domains Correct Answer: Increased security Correct Answer: Redundant paths between two hosts Correct Answer: Allowing broadcast traffic between subnets

Correct Answer: Increased number of broadcast domains Correct Answer: Increased security

Users are complaining that sometimes network communications are slow. You use a protocol analyzer and find that packets are being corrupted as they pass through a switch. You also notice that this only seems to happen when the elevator is running. What should you do? Correct Answer: Install a dedicated power circuit for the switch. Correct Answer: Install shielded cables near the elevator. Correct Answer: Add a UPS system to the switch. Correct Answer: Add a dedicated A/C unit to the switch closet.

Correct Answer: Install shielded cables near the elevator.

Which of the following best describes how a switch functions? Correct Answer: It connects multiple cable segments (or devices) and forwards frames to the appropriate segment. Correct Answer: It connects multiple segments of different architectures. It translates frames and forwards them to the appropriate segment. Correct Answer: It connects multiple cable segments (or devices) and broadcasts frames to all of its ports. Correct Answer: It connects multiple segments of different architectures. It translates frames and broadcasts them to all of its ports.

Correct Answer: It connects multiple cable segments (or devices) and forwards frames to the appropriate segment.

Which of the following is true about the MAC address? (Select two.) Correct Answer: It is a 64-bit address. Correct Answer: It is a 32-bit address. Correct Answer: It is typically represented by hexadecimal numbers. Correct Answer: It is typically represented by octets of decimal numbers between 0-255. Correct Answer: It is a 48-bit address.

Correct Answer: It is typically represented by hexadecimal numbers. Correct Answer: It is a 48-bit address.

At which OSI model layer does a media converter operate? Correct Answer: Layer 1 Correct Answer: Layer 2 Correct Answer: Layer 3 Correct Answer: Layer 4

Correct Answer: Layer 1

At which of the following OSI layers does a router operate? Correct Answer: Layer 1 Correct Answer: Layer 2 Correct Answer: Layer 3 Correct Answer: Layer 4

Correct Answer: Layer 3

Which of the following are functions of the MAC sublayer? (Select two.) Correct Answer: Letting devices on the network have access to the LAN Correct Answer: Creating routing tables based on MAC addresses Correct Answer: Defining a unique hardware address for each device on the network Correct Answer: Mapping hardware addresses to link-layer addresses

Correct Answer: Letting devices on the network have access to the LAN Correct Answer: Defining a unique hardware address for each device on the network

Which of the following terms identifies the wiring closet in the basement or a ground floor that typically includes the demarcation point? Correct Answer: IDF Correct Answer: Smart jack Correct Answer: 110 block Correct Answer: Horizontal cross connect Correct Answer: MDF

Correct Answer: MDF

You have a server that has a 100BaseFX network interface card that you need to connect to a switch. The switch only has 100BaseTX switch ports. Which device should you use? Correct Answer: Hub Correct Answer: Repeater Correct Answer: Gateway Correct Answer: Media converter Correct Answer: Bridge

Correct Answer: Media converter

Your manager has asked you to implement a network infrastructure that will accommodate failed connections. Which of the following network topologies provides redundancy for a failed link? Correct Answer: Ring Correct Answer: Mesh Correct Answer: Bus Correct Answer: Star

Correct Answer: Mesh

You have a network that uses a logical ring topology. How do messages travel through the network? Correct Answer: Messages are sent to all devices connected to the network. Correct Answer: Messages are sent directly to the destination device only. Correct Answer: Messages are sent to a central device that forwards them to the destination devices. Correct Answer: Messages travel from one device to the next until they reach the destination device.

Correct Answer: Messages travel from one device to the next until they reach the destination device.

Which of the following geographic network types are typically managed by a city as a public utility? Correct Answer: Wide area network (WAN) Correct Answer: Local area network (LAN) Correct Answer: Metropolitan area network (MAN) Correct Answer: Personal area network (PAN)

Correct Answer: Metropolitan area network (MAN)

Which of the following functions are performed at the Physical layer of the OSI model? Correct Answer: Conversation identification Correct Answer: Enabling network services Correct Answer: Moving data across network cables Correct Answer: Data translation Correct Answer: Provisioning environments where you can run network applications

Correct Answer: Moving data across network cables

You have a large TCP/IP network and want to keep a host's real time clock synchronized. What protocol should you use? Correct Answer: NNTP Correct Answer: NTP Correct Answer: SAP Correct Answer: SNMP Correct Answer: SMTP

Correct Answer: NTP

At which OSI layer does a router operate to forward network messages? Correct Answer: Data Link Correct Answer: Network Correct Answer: Physical Correct Answer: Session Correct Answer: Transport

Correct Answer: Network

Which network component connects a device to transmission media and allows the device to send and receive messages? Correct Answer: Client Correct Answer: Network interface card Correct Answer: Peripheral Correct Answer: Protocol Correct Answer: Server

Correct Answer: Network interface card

You are configuring a switch so that you can manage it using PuTTY from the same network segment as the switch. On the switch, you enter the following commands: switch#config terminalswitch(config)#interface vlan 1switch(config-if)#ip address 192.168.1.10 255.255.255.0 Will this configuration work? Correct Answer: No, the ip default-gateway command needs to be set. Correct Answer: No, the switch needs to obtain an IP address from the DHCP server using the ip address dhcp command. Correct Answer: Yes, the switch can now be accessed by PuTTY using the IP address 192.168.1.10. Correct Answer: No, the no shutdowncommand needs to be entered.

Correct Answer: No, the no shutdowncommand needs to be entered.

You have implemented a network where each device provides all other devices on the network with access to shared files. What type of network do you have? Correct Answer: Peer-to-peer Correct Answer: Client-server Correct Answer: Polling Correct Answer: Multiple access

Correct Answer: Peer-to-peer

At which layer of the OSI model do hubs operate? Correct Answer: Physical Correct Answer: Data Link Correct Answer: Internet Correct Answer: Layer 3

Correct Answer: Physical

You are adding new wires in your building for some new offices. The building has a false ceiling that holds the lights and provides an air path for heating and air conditioning. You would like to run your Ethernet cables in this area. Which type of cable must you use? Correct Answer: Cat 5e or Cat 6a cables Correct Answer: Plenum rated cable Correct Answer: Fiber optic cables Correct Answer: STP cables Correct Answer: PVC jacketed cables

Correct Answer: Plenum rated cable

Which of the following connectors is used with Ethernet 100BaseT networks? Correct Answer: ST Correct Answer: RJ45 Correct Answer: BNC Correct Answer: RJ11

Correct Answer: RJ45

In the OSI model, what is the primary function of the Network layer? Correct Answer: Ensures that packets are delivered with no loss or duplication Correct Answer: Allows applications to establish, use, and end a connection Correct Answer: Routes messages between networks Correct Answer: Transmits data frames

Correct Answer: Routes messages between networks

What protocol sends email to a mail server? Correct Answer: POP3 Correct Answer: TFTP Correct Answer: SMTP Correct Answer: SNMP Correct Answer: FTP

Correct Answer: SMTP

Your company has just acquired another company in the same city. You need to integrate the two email systems so that messages can be exchanged between the email servers. Currently, each network uses an email package from a different vendor. Which TCP/IP protocol will enable message exchange between systems? Correct Answer: IMAP4 Correct Answer: FTP Correct Answer: SMTP Correct Answer: POP3 Correct Answer: ICMP

Correct Answer: SMTP

Which type of optical fiber is normally used to connect two buildings that are several kilometers apart? Correct Answer: Multi-mode Correct Answer: Fibre Channel mode Correct Answer: Dual-mode Correct Answer: Single-mode

Correct Answer: Single-mode

Of the following cables, which offer the best protection against EMI? Correct Answer: Cat 5 Correct Answer: Single-mode fiber optic Correct Answer: Cat 5e Correct Answer: RG-6

Correct Answer: Single-mode fiber optic

You manage a single subnet with three switches. The switches are connected to provide redundant paths between the switches. Which feature prevents switching loops and ensures there is only a single active path between any two switches? Correct Answer: Bonding Correct Answer: Spanning tree Correct Answer: PoE Correct Answer: Trunking Correct Answer: 802.1x

Correct Answer: Spanning tree

In the OSI model, which of the following functions are performed at the Presentation layer? (Select two.) Correct Answer: Handle general network access, flow control, and error recovery Correct Answer: Specify data format (such as file formats) Correct Answer: Transmit data frames Correct Answer: Maintain separate client connections Correct Answer: Provide network services Correct Answer: Encrypt and compress data

Correct Answer: Specify data format (such as file formats) Correct Answer: Encrypt and compress data

Which of the following topologies connects each network device to a central hub? Correct Answer: Ring Correct Answer: Star Correct Answer: Bus Correct Answer: Mesh

Correct Answer: Star

You have a small network that uses a switch to connect multiple devices. Which physical topology are you using? Correct Answer: Mesh Correct Answer: Star Correct Answer: Ring Correct Answer: Bus

Correct Answer: Star

You need to connect a workstation to a switch using a regular port on the switch (not an uplink port). The switch does not support auto-MDI. Which type of cable should you use? Correct Answer: Rollover Correct Answer: Crossover Correct Answer: Loopback Correct Answer: Straight-through

Correct Answer: Straight-through

Which of the following best describes the purpose of using subnets? Correct Answer: Subnets place each device within its own collision domain. Correct Answer: Subnets let you connect a private network to the internet. Correct Answer: Subnets combine multiple IP network addresses into one network address. Correct Answer: Subnets divide an IP network address into multiple network addresses.

Correct Answer: Subnets divide an IP network address into multiple network addresses.

Angela is the network administrator for a rapidly growing company with a 100BaseT network. Users have recently complained about slow file transfers. While checking network traffic, Angela discovers a high number of collisions. Which connectivity device would best reduce the number of collisions and allow future growth? Correct Answer: Gateway Correct Answer: Bridge Correct Answer: Switch Correct Answer: Hub Correct Answer: Router

Correct Answer: Switch

You can create a virtual LAN using which of the following? Correct Answer: Router Correct Answer: Hub Correct Answer: Gateway Correct Answer: Switch

Correct Answer: Switch

You want to reduce collisions by creating separate collision domains and virtual LANs. Which of the following devices should you choose? Correct Answer: Bridge Correct Answer: Active hub Correct Answer: Router Correct Answer: Switch

Correct Answer: Switch

Which of the following devices operate at OSI model Layer 2? (Select two.) Correct Answer: Firewall Correct Answer: Router Correct Answer: Repeater Correct Answer: Switch Correct Answer: Hub Correct Answer: Network interface card

Correct Answer: Switch Correct Answer: Network interface card

Which of the following statements accurately describes a VLAN ID? Correct Answer: VLAN IDs identify both the source and destination VLAN. They are like network addresses, except they exist at the Data Link layer. Correct Answer: VLAN IDs are defined at the Network layer and help route the frame through the switch fabric. Correct Answer: Switches append a VLAN ID to the header of each frame to identify the virtual network it belongs to. Correct Answer: VLAN IDs identify the VLAN where the frame originated so the receiving host can reply.

Correct Answer: Switches append a VLAN ID to the header of each frame to identify the virtual network it belongs to.

You are an application developer, and you are writing a program for exchanging video files through a TCP/IP network. You need to select a transport protocol that will guarantee delivery. Which TCP/IP protocol provides this capability? Correct Answer: FTP Correct Answer: IP Correct Answer: RIP Correct Answer: UDP Correct Answer: TFTP Correct Answer: TCP

Correct Answer: TCP

You have a small network connected to the internet as shown in the Exhibit. You need to configure the default gateway address on Wrk1 so that it can communicate with hosts on the internet. Which address would you use for the default gateway address? Correct Answer: The IP address assigned to Fa0/0 on Router1. Correct Answer: The IP address assigned to Fa0/1 on Router2. Correct Answer: The IP address assigned to SwitchA. Correct Answer: The IP address assigned to Fa0/0 on Router2. Correct Answer: The IP address assigned to Fa0/1 on Router1.

Correct Answer: The IP address assigned to Fa0/0 on Router1.

After installing a new DHCP server on the network, you need to verify that network devices are receiving IP addressing via DHCP. You reboot a Windows 10 client system and using the ipconfig /all command, receive the following information: Ethernet adapter Local Area Connection 1:Description . . . . . . . . . . . : Intel(R) Ethernet ConnectionPhysical Address. . . . . . . . . : 02-00-4C-4F-3F-50DHCP Enabled. . . . . . . . . . . : YesAutoconfiguration Enabled . . . . : YesAutoconfiguration IPv4 Address. . : 169.254.25.129Subnet Mask . . . . . . . . . . . : 255.255.0.0Default Gateway . . . . . . . . . :DNS Servers . . . . . . . . . . . : Which of the following statements are true? (Select two). Correct Answer: The client system is configured to use DHCP. Correct Answer: The default gateway address needs to point to the DHCP server. Correct Answer: DHCP is disabled on the client system. Correct Answer: The network is configured to use static IP addressing. Correct Answer: The network subnet mask is incorrect. Correct Answer: The client system is unable to reach the DHCP server.

Correct Answer: The client system is unable to reach the DHCP server. Correct Answer: The client system is configured to use DHCP.

Which device sends signals from a computer onto a network? Correct Answer: Router Correct Answer: Cable Correct Answer: Transceiver Correct Answer: Gateway

Correct Answer: Transceiver

Which OSI model layer is responsible for guaranteeing reliable message delivery? Correct Answer: Application Correct Answer: Transport Correct Answer: Data Link Correct Answer: Session

Correct Answer: Transport

You manage a single subnet with three switches. The switches are connected to provide redundant paths between the switches. Which feature allows the switches to pass VLAN traffic between the switches? Correct Answer: Trunking Correct Answer: 802.1x Correct Answer: PoE Correct Answer: Spanning tree Correct Answer: Bonding

Correct Answer: Trunking

Your company is a small start-up that has leased office space in a building shared by other businesses. All businesses share a common network infrastructure. A single switch connects all devices in the building to the router that provides internet access. You would like to make sure that your computers are isolated from computers used by other companies. Which feature should you request to have implemented? Correct Answer: VPN Correct Answer: Port security Correct Answer: Spanning tree Correct Answer: VLAN

Correct Answer: VLAN

You manage a network that uses a single switch. All ports within your building connect through the single switch. In the lobby of your building are three RJ45 ports connected to the switch. You want to allow visitors to plug into these ports to gain internet access, but they should not have access to any other devices on your private network. Employees connected throughout the rest of your building should have both private and internet access. Which feature should you implement? Correct Answer: VLANs Correct Answer: Port authentication Correct Answer: DMZ Correct Answer: NAT

Correct Answer: VLANs

Which of the following terms are often synonymous with or made possible with CIDR? (Select two.) Correct Answer: Classful Correct Answer: VLSM Correct Answer: OSPF Correct Answer: Classless Correct Answer: NAT

Correct Answer: VLSM Correct Answer: Classless

How do switches and bridges learn where devices are located on a network? Correct Answer: When a frame enters a port, the source MAC address is copied from the frame header. Correct Answer: When a frame enters a port, the destination MAC address is copied from frame header. Correct Answer: When a frame enters a port, the destination IP address is copied from the frame header. Correct Answer: When a frame enters a port, the source IP address is copied from the frame header.

Correct Answer: When a frame enters a port, the source MAC address is copied from the frame header.

Which of the following solutions would you implement to eliminate switching loops? Spanning tree Auto-duplex Inter-VLAN routing CSMA/CD

Spanning tree


Conjuntos de estudio relacionados

Unit 11: Project Systems AND Unit 12: Enterprise Asset Management (EAM)

View Set

Chapter 4: Individual, Family, Community

View Set

Fundamentals of Computer Science - What is Computing? - Unit 4

View Set

Chapter 51: Neonatal and Newborn

View Set

Motivational interviewing, Narrative Therapy, CH 8 - Cognitive-Behavioral Theory and Therapy, Clinical chapter 12, Psychoanalytic Therapy and CBT, CLINICAL INDIVIDUAL TEST ONE: Ch ONE Systems, Ecological, Ecosystems; Ch TWO CBT, CLINICAL INDIVIDUAL:...

View Set