daily pastebin goal

Cisco Final

a guest May 1st, 2011 15,764 Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
  1. 1.Which protocol is used to transfer files among network devices and perform file-management functions?
  2. FTP
  3. 2.What is the function of the DNS server?
  4. It maps a hostname to a corresponding IP address
  5. 3.A computer joins the network and announces itself to all hosts on the LAN. What type of message does the computer send out?
  6. broadcast
  7. 4.As an assignment, a computer science student needs to present data in binary format. What are the two possible values that the student can use? (Choose two.)
  8. 0 and 1
  9. 5.What type of message is sent to a specific group of hosts?
  10. multicast
  11. 6.Which term is associated with logical addressing?
  12. IP addresses
  13. 7.What destination IP address is used in a unicast packet?
  14. a specific host
  15. 8.Which value would be considered the physical address for data that is sent across an Ethernet segment?
  16. MAC address
  17. 9.Refer to the exhibit. Which option correctly represents the encapsulation of a packet that is sent by Host1 to the web server?
  18. 00-07-E9-34-AC-28... 00-07-E9-53-DE-53...
  19. 10.What are two examples of peripheral output devices? (Choose two.)
  20. external DVD and headphones
  21. 11.What does the term "attenuation" mean in data communication?
  22. loss of signal strength as distance increases
  23. 12.Which network design layer provides a connection point for end user devices to the network?
  24. access
  25. 13.Which two statements are true about local applications? (Choose two.)
  26. They are stored on the local hard disk.  and They run on the computer where they are installed.
  27. 14.Which portion of the packet does a router use to forward the packet to the destination?
  28. destination IP address
  29. 15.Refer to the exhibit. H1 can ping H2, H3, and the Fa0/0 interface of router R1. H2 and H3 but not H1 can ping H4 and H5. What is a possible cause for the H1 failure?
  30. Host H1 does not have a default gateway configured.
  31. 16.Refer to the exhibit. If H4 sends a message to H1 and the destination MAC address is in the MAC table for both Switch1 and Switch2, which host devices will receive the message?
  32. only H1
  33. 17.Refer to the exhibit. Which statement is true based on the information that is shown in the exhibit?
  34. All wireless devices that are connected to this AP must have an assigned SSID of College.
  35. 18.Refer to the exhibit. A home network is configured with the information in the graphic. A user tries to manually create a new connection to the network using the SSID Ciscoclass. However, a connection cannot be made. What could be the problem?
  36. The SSID is case-sensitive.
  37. 19.Refer to the exhibit. Assume that the command output is from a wireless DHCP client that is connected to a Linksys integrated router. What can be deduced from the output?
  38. The wireless connection is operational.
  39. 20.What will be one result of using a wireless infrastructure when designing the communications infrastructure for a new building?
  40. Wireless devices will be easy to add or relocate.
  41. 21.What is specified by the network number in an IP address?
  42. the network to which the host belongs
  43. 22.Refer to the exhibit. Given the use of default masks, which network will router R1 use as the destination network for communications from PC1 to PC2?
  45. 23.Which two values represent the network number and default mask for the address (Choose two.)
  46. and
  47. 24.Which three address ranges can be used to depict private IP addresses? (Choose three.)
  48. to and to and to
  49. 25.Under what circumstance would it be appropriate to use private IP addresses?
  50. for addresses that are used exclusively within an organization.
  51. 26. Which part of the electromagnetic spectrum is commonly used to exchange data between a PDA and a computer?
  52. infrared
  53. 27.Refer to the exhibit. The security policy of an organization allows employees to connect to the office intranet from their homes. Which type of security policy is this?
  54. remote access
  55. 28.What wireless technology has the ability to communicate with many devices at the same time, makes use of the 2.4 GHz band, and is limited to low-speed, short-range communications?
  56. Bluetooth
  57. 29.Which type of network attack occurs when an unauthorized person tries to persuade a user to share a network user ID and password?
  58. social engineering
  59. 30.Refer to the exhibit. An organization needs to connect PC systems that use private IP addressing to the Internet. The organization has multiple systems that need to access the Internet, but were only able to purchase one public IP address. What should be activated on the Linksys integrated router to achieve this goal?
  60. NAT
  61. 31.A network administrator is setting up an application filtering firewall. Company security policy states that FTP sessions that are coming from the Internet and use the standard FTP port must be blocked. Which TCP/UDP port must the administrator block on the firewall to be in compliance?
  62. 21
  63. 32.What is the name for the contract between a customer and an ISP that specifies requirements for uptime and service response time?
  64. SLA
  65. 33.How does a crossover cable make it possible for two "like devices" (for example, two switches) to communicate?
  66. The transmit pins on one device are connected to the receive pins on the other device.
  67. 34. Which attribute must be the same for wireless devices on one network to be able to communicate with devices on a different network?
  68. default gateway
  69. 35.Which picture shows a USB port on a PC?
  70. Imbecille se la sbagli
  71. 36.A college network administrator is planning a wireless LAN to provide service in the student lounge and outdoor patio. The requirements include a range of at least 80 meters and a speed of 30 Mb/s. Which wireless LAN standard meets these requirements?
  72. 802.11g
  73. 37. Which type of computer has an integrated mouse?
  74. laptop
  75. 38.What is true about a wireless access point that is equipped with an omnidirectional antenna?
  76. radiates the signal equally in all directions
  77. 39. What are two ways that a user can interact with an operating system shell? (Choose two.)
  78. CLI and GUI
  79. 40.Refer to the exhibit. Assume that the exhibited output is from a host that is connected to a Linksys integrated router. What is the first thing that should be checked if using a bottom-up troubleshooting approach?
  80. the link status LED on the front of the router
  81. 41.For devices that do not autosense, which connection requires a crossover cable?
  82. PC port to PC port
  83. 42.Which statement is true about UTP cable termination?
  84. The RJ-45 connector should be pushed over the wire jacket for a smooth connection.
  85. 43. A local PC has the correct configuration that is required to access the network. A ping command that is sourced at the PC does not receive a response from a remote device. Which operating system command might be used to determine where the connection failed?
  86. tracert
  87. 44. An administrator is troubleshooting a network problem that involves the inability of users to reach Internet sites. During troubleshooting, the administrator is able to successfully ping web sites by their IP address, but pings to domain names are unsuccessful. Which service is most likely at fault?
  88. DNS
  89. 45.What two commands can be used to form a new binding if client information does not agree with the DHCP client table? (Choose two.)
  90. ipconfig /release and ipconfig /renew
  91. 46.Which installation option should be chosen when the current operating system is too damaged to work properly?
  92. clean install
  93. 47.A user is unable to send e-mail. To begin troubleshooting this problem, the network technician uses the browser on the PC and tries to access some popular Internet websites. Which troubleshooting approach is being followed?
  94. top-down
  95. 48.Which two causes of networking problems are related to the physical layer? (Choose two.)
  96. damaged cables and connectors and overheated components
  97. 49.Which statement accurately describes a recommended strategy for end users to employ when they interact with a help desk technician?
  98. Provide as much information about the problem as possible.
  99. 50.What does it mean when a problem is being escalated by a helpdesk?
  100. The helpdesk is moving the problem to a higher level support staff.
  102. ESAME NUMERO 1:
  104. 1.Which protocol in its default configuration downloads e-mail messages to the client computer and deletes them from the server?
  105. POP3
  106. 2.A user tries to open a page on the web server at www.cisco.com. The user’s workstation does not have the destination IP address in order to encapsulate the request. Which network topology will provide the services that are required to associate the name of the web server with an IP address?
  107. host1 --> SW1 --giu DNS Server --> R1 --> Web Server
  108. 3.TCP/IP data transmission between the source and destination host is de-encapsulated in four steps:
  109. B, D, C, A
  110. 4.Which of the following are transport layer protocols of the TCP/IP model? (Choose two.)
  111. UDP and TCP
  112. 5.What measurement is commonly used to describe communication speed when transferring data?
  113. bps
  114. 6.A host wants to send information simultaneously to all the other hosts in the same network. Which domain will support this type of communication?
  115. broadcast
  116. 7.Which portion of a received datagram is decoded and used by the internetwork layer of the TCP/IP model?
  117. IP Address
  118. 8.What are two advantages of purchasing a custom-built computer? (Choose two.)
  119. user can specify higher performance components and supports higher-end graphics and gaming applications
  120. 9.What is the most common reason that ISPs provide asymmetrical transfer services?
  121. to work with applications that require significant bandwidth
  122. 10.When is the use of a DSL modem necessary?
  123. when a high-speed digital connection is required over the regular telephone line
  124. 11.Which two statements are true about network applications? (Choose two.)
  125. Network applications are accessible from a remote computer. and Network applications are installed on a network server.
  126. 12.Which type of network supports DHCP and DNS services for network users in a network domain?
  127. client/server
  128. 13.Refer to the exhibit. The network is experiencing excessive broadcast traffic from multiple hosts. What can be done to reduce the broadcast traffic that each host receives without compromising connectivity to the corporate servers?
  129. Separate the switches with a router.
  130. 14.Refer to the exhibit. If host H8 sends a message to host H5 and the destination MAC address is in the MAC tables of both switches, which host device or devices will receive the message?
  131. only host H5
  132. 15.Refer to the graphic. Based on the information that is shown, what statement is true?
  133. All wireless devices that are connected to this access point must have an assigned SSID of Academy.
  134. 16.Refer to the graphic. Assume that the command output is from a wireless DHCP client that is connected to a Linksys integrated router. What can be deduced from the output?
  135. The wireless connection is good.
  136. 17.How do ISPs obtain public IP addresses?
  137. They obtain the addresses from the Internet registry.
  138. 18.Refer to the exhibit. In the wireless network, what is the maximum number of hosts supported if the IP addressing scheme contains four host bits?
  139. 14
  140. 19.What describes the external IP address that is obtained by a router through a cable or DSL modem?
  141. a public address that is obtained through DHCP from the ISP
  142. 20.After issuing the ipconfig/all command on a host that has DHCP enabled, a network administrator notes that the output contains faulty IP configuration information. What is the first step the administrator should take to resolve this issue?
  143. Use the release and renew options supported by the ipconfig command.
  144. 21.Which three addresses belong to the category of private IP addresses? (Choose three.)
  145. and and
  146. 22.What is the purpose of pop-up blocker software?
  147. It prevents the display of advertisement windows.
  148. 23.When NAT is employed in a small office, which address type is typically used for hosts on the local LAN?
  149. private IP addresses
  150. 24.Which statement is true concerning stateful packet inspection?
  151. Access is permitted only if it is a legitimate response to a request from an internal host.
  152. 25.How does a straight-through cable connect two unlike devices?
  153. It connects the transmit pins on the first device to the receive pins on the second device.
  154. 26.When would infrared be used to connect network devices?
  155. when synchronizing a PC with a PDA that is in line of sight
  156. 27.Which adapter card would be required for a PC to exchange information with other PCs on a LAN?
  157. NIC
  158. 28.Which two components are configured via software in order for a PC to participate in a network environment? (Choose two.)
  159. IP Address and subnet mask
  160. 29.Refer to the exhibit. Assume that the exhibited output is from a host that is connected to a Linksys integrated router. What is the first thing that should be checked while using a bottom-up troubleshooting approach?
  161. the link status LED on the front of the router
  162. 30.Which Windows command is used to display the configured IP address, subnet mask, and default gateway?
  163. ipconfig
  164. 31.What must be identical on all devices in a WLAN for successful wireless communication between the devices?
  165. SSID
  166. 32.What is the purpose of the ipconfig /release command?
  167. It forces a client to give up its current IP address.
  168. 33.What is the common DHCP role of the ISR router in home and small office networks?
  169. The ISR router acts as both a DHCP client and server.
  170. 34.A company has a web server that must be accessible to both external and internal clients. Which security policy best practice should be followed to maximize security of the server?
  171. Place the web server in a DMZ.
  172. 35.For the second time in a week, workstations on a LAN are not able to log into the server. The technician fixed the problem the first time, but cannot remember the steps taken to solve it. What aspect of the troubleshooting process has the technician neglected?
  173. documenting the troubleshooting process
  174. 36.A network technician suspects that malware on a user PC is opening multiple TCP connections to a specific foreign host address. Which Windows command line utility can be used to confirm the multiple TCP connections?
  175. netstat
  176. 37.Refer to the exhibit. A Linksys integrated services router is being used by wireless clients to access a server which is directly connected to an Ethernet port on the router. The server and the clients are using DHCP for IP addressing from the Linksys device and are on the same subnet. The server and the wireless clients are obtaining the correct IP configuration and can ping the Linksys device, but are unable to ping each other. What could be causing this issue?
  177. The problem is most likely occurring on the Linksys device. Check all configurations on the Linksys device to ensure no security restrictions could be causing the issue.
  178. 38.What two pieces of information should a help desk technician document while troubleshooting connectivity issues with an end user? (Choose two.)
  179. if the user can ping the default gateway address and whether the PC uses dynamic or static IP addressing
  181. Esame Numero 2:
  183. 1.Which protocol is used to transfer files among network devices and perform file-management functions?
  184. FTP
  185. 2.A computer joins the network and announces itself to all hosts on the LAN. What type of message does the computer send out?
  186. broadcast
  187. 3.What destination IP address is used in a unicast packet?
  188. a specific host
  189. 4.Which value would be considered the physical address for data that is sent across an Ethernet segment?
  190. MAC address
  192. Esame Numero 3:
  194. 1.Refer to the exhibit. A PC requests an IP address from the server. Which two protocols are used at the TCP/IP application layer and the internetwork layer?
  195. DHCP and IP
  196. 2.Which two automatic addressing assignments are supported by DHCP? (Choose two.)
  197. subnet mask and default gateway address
  198. 3.Refer to the exhibit. A user on host A sends an e-mail to the user on host B. Which type of message does host A send?
  199. unicast
  200. 4.Which three statements describe an IP address? (Choose three.)
  201. An IP address is known as a logical address. and An IP address is unique within the same local network. and The network portion of an IP address will be the same for all hosts that are connected to the same local network.
  202. 5.When are leased lines typically used?
  203. when a dedicated digital data line is necessary
  204. 6.What is an ISP?
  205. It is an organization that enables individuals and businesses to connect to the Internet.
  206. 7.Which statement accurately describes what network devices do in the distribution layer of the three layer design model?
  207. They interconnect local network segments.
  208. 8.Which network design layer provides hosts with initial connectivity to the network?
  209. access
  210. 9.What statement describes the filtering of traffic via the use of Stateful Packet Inspection? +
  211. It permits incoming packets that are legitimate responses to requests from internal hosts.
  212. 10.What advantage does a peer-to-peer network have over a client-server network?
  213. It eliminates the need for centralized administration.
  214. 11.After attaching four PCs to the switch ports, configuring the SSID and setting authentication properties for a small office network, a technician successfully tests the connectivity of all PCs that are connected to the switch and WLAN. A firewall is then configured on the device prior to connecting it to the Internet. What type of network device includes all of the described features?
  215. ISR router
  216. 12.What is the function of a physical topology map?
  217. shows where wiring is installed and the locations of network devices
  218. 13.Which value represents the host portion of IP address with a subnet mask of
  219. .10.11
  220. 14.What is specified by the host bits in an IP address?
  221. identity of the computer on the network
  222. 15.Refer to the exhibit. Which pair of addresses would be appropriate to use for PC1 and PC2 to establish a workgroup using private addresses?
  223. and
  224. 16.Which wireless protocol is used for encryption?
  225. WEP
  226. 17.Refer to the exhibit. The security policy of an organization requires users to change their password every week. Which type of security policy is this?
  227. password
  228. 18.A system administrator routinely monitors failed login attempts on a server. If the administrator sees an extremely high number of failed attempts by a single user who is trying multiple password combinations, what type of attack is in progress?
  229. brute force
  230. 19.What is the purpose of spam filter software?
  231. It examines incoming e-mail messages to identify the unsolicited ones.
  232. 20.How does a crossover cable connect two routers?
  233. It connects the pins that are used for transmitting on one router to the pins that are used for receiving on the other router.
  234. 21.Which wireless technology allows only one-to-one connections and is typically used for short-range, line-of-sight communication?
  235. Infrared
  236. 22.What component of a personal computer is responsible for the processing of all data?
  237. CPU
  238. 23.Which wireless component allows wireless clients to gain access to a wired network?
  239. access point
  240. 24.Which Windows PC command line utility can be used to discover the path that a packet takes to reach a destination?
  241. tracert
  242. 25.Refer to the exhibit. A wireless client is unable to connect to a Linksys WRT300N access point that is using network for its LAN and WLAN clients. What could cause the problem?
  243. The default gateway is incorrect.
  244. 26.Which device is often configured to act as both a DHCP client and a DHCP server?
  245. integrated services router
  246. 27.Refer to the exhibit. What is the effect of setting the security mode to WEP on the Linksys integrated router?
  247. The WEP security mode encrypts network traffic during transmission between the AP and the wireless client.
  248. 28.Which two causes of networking problems are related to the physical layer? (Choose two.)
  249. disconnected cables and improper operation of cooling fans
  250. 29.A user in a small office is unable to connect to the Internet. The user examines the physical connections to the ISR, a Linksys WRT300N, and notices a solid green LED on the port that is wired to the computer. What does the LED indicate about the current state of the port?
  251. The computer is plugged in but no traffic is flowing.
  252. 30.Refer to the exhibit. PC1 is unable to access the web server at Based on the provided output, what is the most likely cause of the problem?
  253. PC1 is configured with an incorrect IP address and default gateway.
RAW Paste Data