Advertisement
Guest User

Untitled

a guest
Jun 20th, 2010
1,866
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 13.65 KB | None | 0 0
  1. 1 Which type of network supports DHCP and DNS services for network users in a network domain?
  2. client/server
  3. peer-to-peer
  4. hierarchical
  5. ad hoc
  6.  
  7.  
  8. 2 Refer to the exhibit. A home network is configured with the information in the graphic. A user tries to manually create a new connection to the network using the SSID Ciscoclass. However, a connection cannot be made. What could be the problem?
  9. The SSID is case-sensitive.
  10. The SSID must contain at least one number.
  11. The SSID should be used with the default name.
  12. The SSID must contain a minimum of 32 characters.
  13.  
  14.  
  15. 3 What is the function of a physical topology map?
  16. records IP addressing of each host
  17. records hostnames and applications
  18. organizes groups of hosts by how they use the network
  19. shows where wiring is installed and the locations of network devices
  20.  
  21.  
  22. 4 All hosts within a domain receive the same frame that originates from one of the devices. The domain is also bounded by routers. What type of domain is this?
  23. broadcast
  24. collision
  25. local
  26. multicast
  27.  
  28.  
  29. 5 Which two issues can cause connectivity problems on a wireless network? (Choose two.)
  30. incorrect SSID
  31. broadcast SSID
  32. overlapping channels
  33. low number of clients in BSS
  34. 802.11b clients attempting connection to 802.11g APs
  35.  
  36.  
  37. 6 Which part of the electromagnetic spectrum is commonly used to exchange data between a PDA and a computer?
  38. FM
  39. radar
  40. infrared
  41. ultraviolet
  42.  
  43.  
  44. 7 How do ISPs obtain public IP addresses?
  45. They create the addresses themselves.
  46. They obtain the addresses from the home PCs.
  47. They obtain the addresses from the Internet registry.
  48. They obtain the addresses from the RFC.
  49.  
  50.  
  51. 8 Which two automatic addressing assignments are supported by DHCP? (Choose two.)
  52. local server address
  53. subnet mask
  54. default gateway address
  55. physical address of the recipient
  56. physical address of the sender
  57.  
  58.  
  59. 9 Some new features are available for the OS that is currently running on a user's PC. What method should be chosen so that the user can install these new feature sets?
  60. clean install
  61. multi-boot
  62. upgrade
  63. virtualization
  64.  
  65.  
  66. 10 What is the function of the DNS server?
  67. It assigns IP addresses to clients.
  68. It accepts HTTP requests from clients.
  69. It maps a hostname to a corresponding IP address.
  70. It manages the domain that clients are assigned to.
  71.  
  72.  
  73. 11 An administrator is troubleshooting a network problem that involves the inability of users to reach Internet sites. During troubleshooting, the administrator is able to successfully ping web sites by their IP address, but pings to domain names are unsuccessful. Which service is most likely at fault?
  74. DHCP
  75. DNS
  76. FTP
  77. NAT
  78.  
  79.  
  80. 12 Refer to the exhibit. The security policy of an organization allows employees to connect to the office intranet from their homes. Which type of security policy is this?
  81. acceptable use
  82. incident handling
  83. network maintenance
  84. remote access
  85.  
  86.  
  87. 13 What does the term "attenuation" mean in data communication?
  88. loss of signal strength as distance increases
  89. time for a signal to reach its destination
  90. leakage of signals from one cable pair to another
  91. strengthening of a signal by a networking device
  92.  
  93.  
  94. 14 The area covered by a single AP is known as what?
  95. ad-hoc network
  96. basic service set
  97. independent basic service set
  98. extended service set
  99. distribution system
  100.  
  101.  
  102. 15 What is the default subnet mask for an IP address of 64.100.19.14?
  103. 255.0.0.0
  104. 255.255.0.0
  105. 255.255.255.0
  106. 255.255.255.255
  107.  
  108.  
  109. local PC has the correct configuration that is required to access the network. A ping command that is sourced at the PC does not receive a response from a remote device. Which operating system command might be used to determine where the connection failed?
  110. netstat
  111. tracert
  112. ipconfig
  113. nslookup
  114.  
  115.  
  116. 17 Which wireless protocol is used for encryption?
  117. EAP
  118. Open
  119. PSK
  120. WEP
  121.  
  122.  
  123. 18 What are two ways that a user can interact with an operating system shell? (Choose two.)
  124. CLI
  125. OS
  126. GUI
  127. NIC
  128. kernel
  129.  
  130.  
  131. 19 Bottom-up troubleshooting begins at which layer of the OSI model?
  132. network layer
  133. physical layer
  134. data link layer
  135. transport layer
  136. application layer
  137.  
  138.  
  139. 20 What is a service pack?
  140. an access policy
  141. an agreement between a company and a vendor
  142. a piece of code created to fix one specific problem
  143. a collection of patches and updates released by a vendor
  144. a small piece of software designed specifically for security issues
  145.  
  146.  
  147. 21 A network administrator has been notified that users have experienced problems gaining access to network resources. What utility could be used to directly query a name server for information on a destination domain?
  148. ping
  149. tracert
  150. netstat
  151. ipconfig
  152. nslookup
  153.  
  154.  
  155. 22 Which network entity would most likely be configured as both a DHCP client and a DHCP server?
  156. ISP
  157. desktop PC
  158. wireless laptop
  159. PC-based server
  160. integrated services home router
  161.  
  162.  
  163. 23 What is a weakness of WEP that is solved by WPA?
  164. WEP is a proprietary standard whereas WPA is an open standard.
  165. WEP keys are only 64 bits long whereas WPA keys are 128 bits long.
  166. WEP uses the same key for every connection whereas WPA uses a different key for each connection.
  167. WEP uses a fixed length key for every connection whereas WPA uses a different key length for each connection.
  168.  
  169.  
  170. 24 A wireless AP that will be used exclusively by network administrators has been installed on a company network. Security measures have been configured on the device, but it is still considered vulnerable to attack. Which configuration detail could account for this vulnerability?
  171. Traffic filtering is enabled.
  172. SSID broadcast is enabled.
  173. MAC address filtering is enabled.
  174. WEP encryption is implemented.
  175. The default AP values have been modified.
  176.  
  177.  
  178. 25 A user starts a file transfer between a client machine and an FTP server. Which list correctly represents the sequence of protocols that are used by the client machine to encapsulate the FTP data traffic for transmission?
  179. FTP, TCP, IP, Network Access Protocols
  180. FTP, UDP, IP, Network Access Protocols
  181. FTP, IP, UDP, Network Access Protocols
  182. FTP, IP, TCP, Network Access Protocols
  183.  
  184.  
  185. 26 Refer to the exhibit. The wireless router WR1 is configured with the address shown and DHCP is not configured. What will be the result of a technician configuring the address 172.16.14.255 on the laptop?
  186. The laptop will be configured with the network address.
  187. The laptop will be configured with a public IP address.
  188. The laptop will be configured with a broadcast address.
  189. The laptop will be configured within the same network as WR1.
  190.  
  191.  
  192. 27 What destination IP address is used in a unicast packet?
  193. a specific host
  194. a group of hosts
  195. all hosts on the network
  196. the network broadcast address
  197.  
  198.  
  199. 28 Refer to the exhibit. Assume that the command output is from a wireless DHCP client that is connected to a Linksys integrated router. What can be deduced from the output?
  200. The DHCP configuration on the router needs to be verified.
  201. The WEP key or SSID needs to be verified.
  202. The wireless connection is operational.
  203. The wireless NIC driver or the NIC itself needs to be reinstalled.
  204.  
  205.  
  206. 29 Which two protocols are responsible for encrypting data on a wireless network? (Choose two.)
  207. EAP
  208. PSK
  209. WEP
  210. WPA
  211. PAP
  212.  
  213.  
  214. 30 Which type of firewall technique can be used to allow inbound traffic from the public network only if it was initiated from the internal network?
  215. URL filtering
  216. packet filtering
  217. application filtering
  218. stateful packet inspection
  219.  
  220. Which two TCP/IP properties must match on hosts in the same LAN if the hosts are to be able to communicate with each other? (Choose two.)
  221. the subnet mask
  222. the DNS server configurations
  223. the default gateway configurations
  224. the host portion of the IP address
  225. the network portion of the IP address
  226.  
  227.  
  228. 32 How does a crossover cable make it possible for two "like devices" (for example, two switches) to communicate?
  229. The transmit pins are disconnected and only the receive pins are used.
  230. The transmit pins on one device are connected to the transmit pins on the other device.
  231. The receive pins on one device are connected to the receive pins on the other device.
  232. The transmit pins on one device are connected to the receive pins on the other device.
  233.  
  234.  
  235. 33 Which type of network attack occurs when an unauthorized person tries to persuade a user to share a network user ID and password?
  236. brute force
  237. denial of service
  238. data manipulation
  239. social engineering
  240.  
  241.  
  242. 34 Which term is associated with logical addressing?
  243. IP addresses
  244. port addresses
  245. physical addresses
  246. Media Access Control addresses
  247.  
  248.  
  249. 35 Which two statements are true about local applications? (Choose two.)
  250. They run on the network.
  251. An example of a local application is e-mail.
  252. They are accessed from a remote computer.
  253. They are stored on the local hard disk.
  254. They run on the computer where they are installed.
  255.  
  256.  
  257. 36 What is an advantage of purchasing a custom-built computer?
  258. It is beneficial for less knowledgeable consumers.
  259. The waiting period for assembly is negligible.
  260. The cost is lower compared to a computer that has been preassembled.
  261. The user can specify high-performance components to meet specific needs.
  262.  
  263.  
  264. 37 How do wireless devices within a BSS access an available channel?
  265. Channels are used sequentially in round-robin fashion by each device in the BSS.
  266. Devices ask permission to use a channel by sending the AP a Request to Send message.
  267. Every device within the BSS is assigned its own channel and has its own dedicated connection.
  268. A device sends data and if it senses collisions it waits a predetermined time before re-sending on a different channel.
  269.  
  270.  
  271. 38 A network technician suspects that malware on a user PC is opening multiple TCP connections to a specific foreign host address. Which Windows command line utility can be used to confirm the multiple TCP connections?
  272. ping
  273. netstat
  274. tracert
  275. ipconfig
  276. nslookup
  277.  
  278.  
  279. 39 What information within a data packet does a router use, by default, to make forwarding decisions?
  280. the destination MAC address
  281. the destination IP address
  282. the destination host name
  283. the destination service requested
  284.  
  285.  
  286. 40 Which type of computer has an integrated mouse?
  287. desktop
  288. laptop
  289. mainframe
  290. server
  291. pocket PC
  292.  
  293.  
  294. 41 What is a major characteristic of asymmetric Internet service?
  295. Download speeds and upload speeds are equal.
  296. Download speeds are faster than upload speeds.
  297. Data traffic speeds are faster than voice traffic speeds.
  298. Used when consistently uploading large amounts of graphics, video and multimedia traffic.
  299.  
  300.  
  301. 42 Refer to the exhibit. Why would a network administrator use the network mode that is shown?
  302. to support hosts on different IP networks
  303. to support hosts that use different 802.11 standards
  304. to support both wireless and wired Ethernet hosts
  305. to support hosts with different operating systems
  306. to support hosts with network cards from different manufacturers
  307.  
  308.  
  309. 43 Which is an example of the first step in a divide-and-conquer troubleshooting process?
  310. Ask a user to send a test email.
  311. Attempt to reach a particular web site.
  312. Verify that all cables are firmly seated.
  313. Check that all IP information is correctly configured.
  314.  
  315.  
  316. 44 Refer to the exhibit. H1 can ping H2, H3, and the Fa0/0 interface of router R1. H2 and H3 but not H1 can ping H4 and H5. What is a possible cause for the H1 failure?
  317. Router R1 has no route to the destination network.
  318. Switch S1 does not have an IP address configured.
  319. The link between router R1 and switch S2 has failed.
  320. Host H1 does not have a default gateway configured.
  321.  
  322.  
  323. 45 Which protocol is used to transfer files among network devices and perform file-management functions?
  324. DNS
  325. FTP
  326. HTML
  327. HTTP
  328.  
  329. Refer to the exhibit. What is the reason that the host is unable to connect to the Internet?
  330. DHCP needs to be enabled on the router.
  331. The router has an incorrect DHCP starting address.
  332. The IP address on the host is in the wrong network.
  333. The host is configured with an incorrect gateway.
  334.  
  335.  
  336. 47 Which network design layer provides a connection point for end user devices to the network?
  337. access
  338. core
  339. distribution
  340. network
  341.  
  342.  
  343. 48 How does a DMZ enhance network security for an organization?
  344. blocks viruses and spyware
  345. restricts internal user access to prohibited Internet sites
  346. allows external customer access to designated internal resources
  347. removes suspicious attachments from incoming and outgoing e-mail
  348.  
  349.  
  350. 49 What two pieces of information should a help desk technician document while troubleshooting connectivity issues with an end user? (Choose two.)
  351. the CPU clock speed of the computer
  352. the number of network jacks that are in the room
  353. if the user can ping the default gateway address
  354. if the word processing software is installed correctly
  355. whether the PC uses dynamic or static IP addressing
  356.  
  357.  
  358. 50 Which wireless technology allows only one-to-one connections and is typically used for short-range, line-of-sight communication?
  359. GSM
  360. Wi-Fi
  361. Infrared
  362. Bluetooth
  363.  
  364.  
  365. 51 When terminating a UTP cable, why is it important to push the wires all the way into the end of the connector?
  366. to allow the cable to endure more stretching or twisting
  367. to ensure good electrical contact
  368. to ensure that the wires are in correct order
  369. to minimize crosstalk
  370.  
  371.  
  372. 52 What two commands can be used to form a new binding if client information does not agree with the DHCP client table? (Choose two.)
  373. ipconfig /release
  374. ipconfig /all
  375. ipconfig /flushdns
  376. ipconfig /renew
  377. ipconfig
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement