Network Final
Which installation option should be chosen when the current operating system is too damaged to work properly? ~upgrade ~multi-boot ~clean install ~virtualization
clean install
For devices that do not autosense, which connection requires a crossover cable? ~hub port to router port ~PC to hub port ~PC to switch port ~PC port to PC port
PC port to PC port
What measurement is commonly used to describe communication speed when transferring data? ~bps ~cps ~Hz ~MB
bps
A computer joins the network and announces itself to all hosts on the LAN. What type of message does the computer send out? ~broadcast ~simulcast ~multicast ~unicast
broadcast
Which two causes of networking problems are related to the physical layer? (Choose two.) ~damaged cables and connectors ~incorrect addressing ~incorrect subnet mask ~overheated components ~incorrect default gateway
damaged cables and connectors overheated components
Which attribute must be the same for wireless devices on one network to be able to communicate with devices on a different network? ~DNS server ~MAC address ~default gateway ~operating system ~wireless equipment vendor
default gateway
Which portion of the packet does a router use to forward the packet to the destination? ~source IP address ~user data ~destination IP address ~control information ~destination MAC address
destination IP address
What are two examples of storage peripheral devices? (Choose two.) ~printer ~flash drive ~headphones ~external DVD ~barcode reader
external DVD flash drive
After attaching four PCs to the switch ports, configuring the SSID and setting authentication properties for a small office network, a technician successfully tests the connectivity of all PCs that are connected to the switch and WLAN. A firewall is then configured on the device prior to connecting it to the Internet. What type of network device includes all of the described features? ~switch ~ISR router ~firewall appliance ~standalone wireless access point
firewall appliance
Under what circumstance would it be appropriate to use private IP addresses? ~for communication between two ISPs ~for a network that is directly connected to the Internet ~for addresses that are used exclusively within an organization ~for a host with more than one direct connection to the Internet
for addresses that are used exclusively within an organization.
Which two issues can cause connectivity problems on a wireless network? (Choose two.) ~incorrect SSID ~broadcast SSID ~overlapping channels ~low number of clients in BSS ~802.11b clients attempting connection to 802.11g APs
incorrect SSI
Which part of the electromagnetic spectrum is commonly used to exchange data between a PDA and a computer? ~FM ~radar ~infrared ~ultraviolet
infrared
Which Windows command line utility can be used to confirm the multiple TCP connections?
ipconfig
What type of cable would be required to connect a Linksys router to a wired PC? ~crossover cable ~rollover cable ~serial cable ~straight-through cable
...
Which network design layer provides a connection point for end user devices to the network? access core distribution network
...
Which two statements are true about network applications?
...
As an assignment, a computer science student needs to present data in binary format. What are the two possible values that the student can use? (Choose two.) ~0 ~1 ~2 ~A ~F
0, 1
A home user was successfully browsing the Internet earlier in the day but is now unable to connect. A ping command from a wireless laptop to a wired PC in the LAN is successful, but the nslookup command fails to resolve a website address. The user decides to analyze the LEDs on the Linksys router to verify connectivity. Which LED should be of main concern in this situation? ~WLAN LED ~power LED ~Internet LED ~1-4 Ethernet LEDs
1-4 Ethernet LEDs
Which three address ranges can be used to depict private IP addresses? (Choose three.) ~10.0.0.0 to 10.0.0.255 ~127.16.0.0 to 127.16.255.255 ~150.150.0.0 to 150.150.255.255 ~172.16.1.0 to 172.16.1.255 ~192.168.22.0 to 192.168.22.255 ~200.100.50.0 to 200.100.50.255
10.0.0.0 to 10.0.0.255 172.16.1.0 to 172.16.1.255 192.168.22.0 to 192.168.22.255
Refer to the exhibit. Which option correctly represents the encapsulation of a packet that is sent by Host1 to the web server?
18.00-07-E9-34-AC-28... 00-07-E9-53-DE-53... 172.16.1.1
Refer to the exhibit. Given the use of default masks, which network will router R1 use as the destination network for communications from PC1 to PC2? ~128.0.0.0 ~128.107.0.0 ~128.107.1.0 ~192.0.0.0 ~192.135.0.0 ~192.135.14.0
192.135.14.0
Which two values represent the network number and default mask for the address 209.165.200.225? (Choose two.) ~209.0.0.0 ~209.165.0.0 ~209.165.200.0 ~255.0.0.0 ~255.255.0.0 ~255.255.255.0
209.165.200.0 255.255.255.0
A network administrator is setting up an application filtering firewall. Company security policy states that FTP sessions that are coming from the Internet and use the standard FTP port must be blocked. Which TCP/UDP port must the administrator block on the firewall to be in compliance? ~21 ~23 ~53 ~80
21
What is the default subnet mask for an IP address of 64.100.19.14? ~255.0.0.0 ~255.255.0.0 ~255.255.255.0 ~255.255.255.255
255.0.0.0
A college network administrator is planning a wireless LAN to provide service in the student lounge and outdoor patio. The requirements include a range of at least 80 meters and a speed of 30 Mb/s. Which wireless LAN standard meets these requirements?
802.11a
A college network administrator is planning a wireless LAN to provide service in the student lounge and outdoor patio. The requirements include a range of at least 80 meters and a speed of 30 Mb/s. Which wireless LAN standard meets these requirements? ~802.11 ~802.11a ~802.11b ~802.11g
802.11g
Refer to the exhibit. Which statement is true based on the information that is shown in the exhibit? ~All wireless devices that are connected to this AP must have an assigned SSID of College. ~Any wireless client that is attached to this AP must have the same IP address and SSID. ~The AP is not physically wired to the local LAN. ~This configuration is found only in an ad hoc wireless network.
All wireless devices that are connected to this AP must have an assigned SSID of College.
What wireless technology has the ability to communicate with many devices at the same time, makes use of the 2.4 GHz band, and is limited to low-speed, short-range communications? ~RF ~ISM ~infrared ~Bluetooth
Bluetooth
What are two ways that a user can interact with an operating system shell? (Choose two.) ~CLI ~OS ~GUI ~NIC ~kernel
CLI (command-line interface) GUI
TCP/IP data transmission between the source and destination host is encapsulated in four steps: A. adds the data-link header and trailer; B. converts data to bits for transmission; C. adds the network IP address to the header of the packet; D. segments the data for end-to-end transport. What is the correct sequence of these steps?
D, C, A, B
An administrator is troubleshooting a network problem that involves the inability of users to reach Internet sites. During troubleshooting, the administrator is able to successfully ping web sites by their IP address, but pings to domain names are unsuccessful. Which service is most likely at fault? ~DHCP ~DNS ~FTP ~NAT
DNS
A home user is looking for an ISP connection that provides high speed digital transmission over regular phone lines. What ISP connection type should be used? ~DSL ~dial-up ~satellite ~cell modem ~cable modem
DSL
Which protocol is used to transfer files among network devices and perform file-management functions? ~DNS ~FTP ~HTML ~HTTP
FTP
Which protocol is used by a client to browse the web server?
HTTP
Refer to the exhibit. H1 can ping H2, H3, and the Fa0/0 interface of router R1. H2 and H3 but not H1 can ping H4 and H5. What is a possible cause for the H1 failure? ~Router R1 has no route to the destination network ~Switch S1 does not have an IP address configured ~The link between router R1 and switch S2 has failed ~Host H1 does not have a default gateway configured
Host H1 does not have a default gateway configured
Which two components are configured via software in order for a PC to participate in a network environment? (Choose two.) ~MAC address ~IP address ~kernel ~shell ~subnet mask
IP address subnet mask
Within a local network, which two items must be unique on a computer for it to successfully connect to the network? (Choose two.) ~IP address ~subnet mask ~computer name ~default gateway address ~operating system version
IP address, computer name
Which two IP configuration components does the computer use to identify its subnetwork? (Choose two.) ~default gateway ~IP address ~MAC address ~DNS server address ~subnet mask
IP address, subnet mask
Which term is associated with logical addressing? ~IP addresses ~port addresses ~physical addresses ~Media Access Control addresses
IP addresses
What is the name given to the area covered by an ad hoc network in a WLAN? ~Basic Service Set (BSS) ~Distribution System (DS) ~Extended Service Set (ESS) ~Independent Basic Service Set (IBSS)
Independent Basic Service Set (IBSS)
What is an ISP?
It is an organization that enables individuals and businesses to connect to the Internet
What is the function of the DNS server? ~It assigns IP addresses to clients. ~It accepts HTTP requests from clients. ~It maps a hostname to a corresponding IP address. ~It manages the domain that clients are assigned to.
It maps a hostname to a corresponding IP address
How does a straight-through cable connect two unlike devices? ~It connects the receive pins on the first device to the receive pins on the second device. ~It connects the transmit pins on the first device to the receive pins on the second device. ~It disconnects the transmit pins and uses only the receive pins. ~It uses the same pins for transmitting and receiving.
It uses the same pins for transmitting and receiving.
Which value would be considered the physical address for data that is sent across an Ethernet segment? ~IP address ~port address ~MAC address ~network address
MAC address
Refer to the exhibit. An organization needs to connect PC systems that use private IP addressing to the Internet. The organization has multiple systems that need to access the Internet, but were only able to purchase one public IP address. What should be activated on the Linksys integrated router to achieve this goal? ~authentication ~DHCP ~encryption ~firewall ~NAT ~WEP
NAT
Which adapter card would be required for a PC to exchange information with other PCs on a LAN?
NIC
Which two statements are true about network applications? (Choose two.) ~Microsoft Word is an example of a network application. ~Network applications are accessible from a remote computer. ~Network applications are installed on a special type of computer that supports only network applications. ~Network applications are installed on a network server. ~Network applications are accessible by one computer at a time.
Network applications are accessible from a remote computer. Network applications are installed on a network server.
Which statement accurately describes a recommended strategy for end users to employ when they interact with a help desk technician? ~Provide as much information about the problem as possible. ~Expect first-level help desk technicians to solve the problem, because they are highly-trained personnel. ~Hand over the problem to the help desk professionals, then do not interfere with them. ~At the beginning of the call, ask for the name and number of the supervisor of the help desk technician.
Provide as much information about the problem as possible.
Because of an increasing number of users, bandwidth per user on a WLAN has decreased to a point where users are complaining about poor performance. What can be done to improve the user experience? ~Increase the AP radio signal strength. Place the AP in a more central location. ~Deploy an external omni-directional antenna. ~Reduce the number of devices using each channel.
Reduce the number of devices using each channel.
What is the name for the contract between a customer and an ISP that specifies requirements for uptime and service response time? ~DSL ~IAB ~NAP ~SLA
SLA
Which statement is true about UTP cable termination? ~Cables with RJ-45 connectors are always preterminated. ~An RJ-45 connector is used on only one end of the UTP cable. ~Up to 2 to 3 inches of cable may be untwisted at each end of the cable to allow for easier installation of the RJ-45 connector. ~The RJ-45 connector should be pushed over the wire jacket for a smooth connection.
The RJ-45 connector should be pushed over the wire jacket for a smooth connection.
Refer to the exhibit. A home network is configured with the information in the graphic. A user tries to manually create a new connection to the network using the SSID Ciscoclass. However, a connection cannot be made. What could be the problem? ~The SSID is case-sensitive. ~The SSID must contain at least one number. ~The SSID should be used with the default name. ~The SSID must contain a minimum of 32 characters.
The SSID is case-sensitive.
What does it mean when a problem is being escalated by a helpdesk? ~The helpdesk is following up on a resolved problem. ~The helpdesk has made the problem a lower priority. ~The helpdesk has solved the problem and is closing the ticket. ~The helpdesk is moving the problem to a higher level support staff
The helpdesk is moving the problem to a higher level support staff
How does a crossover cable make it possible for two "like devices" (for example, two switches) to communicate? ~The transmit pins are disconnected and only the receive pins are used. ~The transmit pins on one device are connected to the transmit pins on the other device. ~The receive pins on one device are connected to the receive pins on the other device. ~The transmit pins on one device are connected to the receive pins on the other device.
The transmit pins on one device are connected to the receive pins on the other device.
Refer to the exhibit. Assume that the command output is from a wireless DHCP client that is connected to a Linksys integrated router. What can be deduced from the output? ~The DHCP configuration on the router needs to be verified. ~The WEP key or SSID needs to be verified. ~The wireless connection is operational. ~The wireless NIC driver or the NIC itself needs to be reinstalled.
The wireless connection is operational.
Which two statements are true about local applications? (Choose two.) ~They run on the network. ~An example of a local application is e-mail. ~They are accessed from a remote computer. ~They are stored on the local hard disk. ~They run on the computer where they are installed.
They are stored on the local hard disk They run on the computer where they are installed
Which of the following are transport layer protocols of the TCP/IP model? (Choose two.) FTP UDP SMTP TFTP TCP
UDP TCP
Which picture shows a USB port on a PC?
USB
Some new features are available for the OS that is currently running on a user's PC. What method should be chosen so that the user can install these new feature sets? ~clean install ~multi-boot ~upgrade ~virtualization
Upgrade
After issuing the ipconfig/all command on a host that has DHCP enabled, a network administrator notes that the output contains faulty IP configuration information. What is the first step the administrator should take to resolve this issue? ~Replace the NIC in the host. ~Change the IP address of the DHCP server. ~Use static addressing to assign the correct IP address. ~Use the release and renew options supported by the ipconfig command.
Use the release and renew options supported by the ipconfig command.
What is a weakness of WEP that is solved by WPA? ~WEP is a proprietary standard whereas WPA is an open standard. ~WEP keys are only 64 bits long whereas WPA keys are 128 bits long. ~WEP uses the same key for every connection whereas WPA uses a different key for each connection. ~WEP uses a fixed length key for every connection whereas WPA uses a different key length for each connection.
WEP uses a fixed length key for every connection whereas WPA uses a different key length for each connection.
What will be one result of using a wireless infrastructure when designing the communications infrastructure for a new building? ~Wireless devices will be easy to add or relocate. ~Infrastructure installation will be difficult and expensive. ~There will be less interference from outside electronic sources. ~Data transmitted over wireless networks will be more secure than when transmitted over wired networks
Wireless devices will be easy to add or relocate.
What is a service pack? ~an access policy ~an agreement between a company and a vendor ~a piece of code created to fix one specific problem ~a collection of patches and updates released by a vendor ~a small piece of software designed specifically for security issues
a collection of patches and updates released by a vendor
What destination IP address is used in a unicast packet? ~a specific host ~a group of hosts ~all hosts on the network ~the network broadcast address
a specific host
Which network design layer provides a connection point for end user devices to the network? ~access ~core ~distribution ~network
access
What layer is the first point of entry for a host into the network? ~core layer ~access layer ~network layer ~distribution layer
access layer
What two commands can be used to form a new binding if client information does not agree with the DHCP client table? (Choose two.) ~ipconfig /release ~ipconfig /all ~ipconfig /flushdns ~ipconfig /renew ~ipconfig
ipconfig /release ipconfig /renew
Which type of computer has an integrated mouse? ~desktop ~laptop ~mainframe ~server ~pocket PC
laptop
What does the term "attenuation" mean in data communication? ~loss of signal strength as distance increases ~time for a signal to reach its destination ~leakage of signals from one cable pair to another ~strengthening of a signal by a networking device
loss of signal strength as distance increases
When terminating UTP cabling, why is it important to untwist only a small amount of each wire pair? minimizes crosstalk makes installation faster ensures wires are in correct order makes it easier to fit wires into connector
minimizes crosstalk
What type of message is sent to a specific group of hosts? ~static ~unicast ~dynamic ~multicast ~broadcast
multicast
Refer to the exhibit. If H4 sends a message to H1 and the destination MAC address is in the MAC table for both Switch1 and Switch2, which host devices will receive the message? ~only H1 ~hosts H1 and H4 ~all hosts that are connected to Switch1 ~all hosts that are connected to Switch1 and Switch2
only H1
What are two examples of peripheral output devices? (Choose two.) ~barcode reader ~digital camera ~external DVD ~headphones ~printer
printer headphones
What is true about a wireless access point that is equipped with an omnidirectional antenna? ~concentrates signal in one direction ~typically used in bridging applications ~radiates the signal equally in all directions ~provides the greatest transmission distance of all antenna types that are used by APs
provides the greatest transmission distance of all antenna types that are used by APs
What is true about a wireless access point that is equipped with an omnidirectional antenna? ~concentrates signal in one direction ~typically used in bridging applications ~radiates the signal equally in all directions ~provides the greatest transmission distance of all antenna types that are used by APs
radiates the signal equally in all directions
Refer to the exhibit. The security policy of an organization allows employees to connect to the office intranet from their homes. Which type of security policy is this? ~acceptable use ~incident handling ~network maintenance ~remote access
remote access
Which type of network attack occurs when an unauthorized person tries to persuade a user to share a network user ID and password? ~brute force ~denial of service ~data manipulation ~social engineering
social engineering
Refer to the exhibit. Assume that the exhibited output is from a host that is connected to a Linksys integrated router. What is the first thing that would be checked if using a bottom-up troubleshooting approach? ~the default gateway on the host ~the IP address on the host ~the IP address on the router ~the link status LED on the front of the router ~the subnet mask on the host
the link status LED on the front of the router
What is specified by the network number in an IP address? ~the network to which the host belongs ~the physical identity of the computer on the network ~the node of the subnetwork which is being addressed ~the broadcast identity of subnetwork
the network to which the host belongs
What is specified by the network number in an IP address? ~the network to which the host belongs ~the physical identity of the computer on the network ~the node of the subnetwork which is being addressed ~the broadcast identity of subnetwork
the network to which the host belongs
In IP telephony, what is the purpose of a gateway to the PSTN?
to allow IP voice clients to communicate with regular analog telephones.
What is the purpose of creating a DMZ during network firewall implementation? ~to create a server security zone accessible only to internal clients ~to create a dirty zone that allows all inbound and outbound traffic ~to allow for a publicly accessible zone without compromising the internal network ~to specify a higher security level than normally required for the internal production network
to allow for a publicly accessible zone without compromising the internal network
When terminating a UTP cable, why is it important to push the wires all the way into the end of the connector? ~to allow the cable to endure more stretching or twisting ~to ensure good electrical contact ~to ensure that the wires are in correct order ~to minimize crosstalk
to ensure good electrical contact
What is a function of the distribution layer in the hierarchical design model? ~to provide latency free switching ~to organize end devices in small manageable groups ~to provide connectivity using the high-speed backbone ~to provide connectivity between smaller local networks
to provide connectivity between smaller local networks
A user is unable to send e-mail. To begin troubleshooting this problem, the network technician uses the browser on the PC and tries to access some popular Internet websites. Which troubleshooting approach is being followed? ~bottom-up ~divide-and-conquer ~top-down ~trial and error
top-down
A local PC has the correct configuration that is required to access the network. A ping command that is sourced at the PC does not receive a response from a remote device. Which operating system command might be used to determine where the connection failed? ~netstat ~tracert ~ipconfig ~nslookup
tracert
When are leased lines typically used? ~when low bandwidth is required ~for home and small business connectivity ~when a dedicated digital data line is necessary ~as a less expensive option to cable and DSL modem service
when a dedicated digital data line is necessary
Which device is often configured to act as both a DHCP client and a DHCP server?
wireless-enabled laptop
Which three statements describe an IP address? (Choose three.) ~An IP address is known as a logical address. ~An IP address uses a 30-bit addressing scheme. ~An IP address is found in the Layer 2 header during transmission. ~The network portion of an IP address is burned into a network interface card. ~An IP address is unique within the same local network. ~The network portion of an IP address will be the same for all hosts that are connected to the same local network.
~An IP address is known as a logical address. ~An IP address is unique within the same local network. ~The network portion of an IP address will be the same for all hosts that are connected to the same local network.