25B Phase 2 Final Exam Pool
When a computer assembles a frame to be sent over the network, what is the maximum size of an Ethernet frame?
1518 bytes
Which scenario describes a peer-to-peer network?
A user has shared a printer attached to the workstation.
What are two ways to protect a computer from malware?
Keep software up to date Use antivirus software
What is the difference between the terms bandwidth and throughput?
Bandwidth is the capacity of data transfer in a network and throughput is the actual data transfer rate.
A medium-sized company uses APs, WLCs, and laptops for employee workstations. An employee reports the inability to connect to the Internet. A technician verifies that other workstations can successfully connect to the Internet. What are tow possible reasons for the problem?
The wireless client is not configured for DHCP The workstation is out of range
Which three attacks exploit vulnerabilities in software? (Choose three.)
Trojan horses worms viruses
A file is downloaded form the Internet. After the user opens the downloaded file, the hard drive crashes and all information on the computer is lost. What type of attack occurred?
Virus
What is the function of ARP?
maps IPv4 addresses to MAC addresses
Users are complaining that they are unable to browse certain websites on the Internet. An administrator can successfully ping a web server via its IP address, but cannot browse to the domain name of the website. Which troubleshooting tool would be most useful in determining where the problem is?
nslookup