Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- 1 Which type of network supports DHCP and DNS services for network users in a network domain?
- client/server
- peer-to-peer
- hierarchical
- ad hoc
- 2 Refer to the exhibit. A home network is configured with the information in the graphic. A user tries to manually create a new connection to the network using the SSID Ciscoclass. However, a connection cannot be made. What could be the problem?
- The SSID is case-sensitive.
- The SSID must contain at least one number.
- The SSID should be used with the default name.
- The SSID must contain a minimum of 32 characters.
- 3 What is the function of a physical topology map?
- records IP addressing of each host
- records hostnames and applications
- organizes groups of hosts by how they use the network
- shows where wiring is installed and the locations of network devices
- 4 All hosts within a domain receive the same frame that originates from one of the devices. The domain is also bounded by routers. What type of domain is this?
- broadcast
- collision
- local
- multicast
- 5 Which two issues can cause connectivity problems on a wireless network? (Choose two.)
- incorrect SSID
- broadcast SSID
- overlapping channels
- low number of clients in BSS
- 802.11b clients attempting connection to 802.11g APs
- 6 Which part of the electromagnetic spectrum is commonly used to exchange data between a PDA and a computer?
- FM
- radar
- infrared
- ultraviolet
- 7 How do ISPs obtain public IP addresses?
- They create the addresses themselves.
- They obtain the addresses from the home PCs.
- They obtain the addresses from the Internet registry.
- They obtain the addresses from the RFC.
- 8 Which two automatic addressing assignments are supported by DHCP? (Choose two.)
- local server address
- subnet mask
- default gateway address
- physical address of the recipient
- physical address of the sender
- 9 Some new features are available for the OS that is currently running on a user's PC. What method should be chosen so that the user can install these new feature sets?
- clean install
- multi-boot
- upgrade
- virtualization
- 10 What is the function of the DNS server?
- It assigns IP addresses to clients.
- It accepts HTTP requests from clients.
- It maps a hostname to a corresponding IP address.
- It manages the domain that clients are assigned to.
- 11 An administrator is troubleshooting a network problem that involves the inability of users to reach Internet sites. During troubleshooting, the administrator is able to successfully ping web sites by their IP address, but pings to domain names are unsuccessful. Which service is most likely at fault?
- DHCP
- DNS
- FTP
- NAT
- 12 Refer to the exhibit. The security policy of an organization allows employees to connect to the office intranet from their homes. Which type of security policy is this?
- acceptable use
- incident handling
- network maintenance
- remote access
- 13 What does the term "attenuation" mean in data communication?
- loss of signal strength as distance increases
- time for a signal to reach its destination
- leakage of signals from one cable pair to another
- strengthening of a signal by a networking device
- 14 The area covered by a single AP is known as what?
- ad-hoc network
- basic service set
- independent basic service set
- extended service set
- distribution system
- 15 What is the default subnet mask for an IP address of 64.100.19.14?
- 255.0.0.0
- 255.255.0.0
- 255.255.255.0
- 255.255.255.255
- local PC has the correct configuration that is required to access the network. A ping command that is sourced at the PC does not receive a response from a remote device. Which operating system command might be used to determine where the connection failed?
- netstat
- tracert
- ipconfig
- nslookup
- 17 Which wireless protocol is used for encryption?
- EAP
- Open
- PSK
- WEP
- 18 What are two ways that a user can interact with an operating system shell? (Choose two.)
- CLI
- OS
- GUI
- NIC
- kernel
- 19 Bottom-up troubleshooting begins at which layer of the OSI model?
- network layer
- physical layer
- data link layer
- transport layer
- application layer
- 20 What is a service pack?
- an access policy
- an agreement between a company and a vendor
- a piece of code created to fix one specific problem
- a collection of patches and updates released by a vendor
- a small piece of software designed specifically for security issues
- 21 A network administrator has been notified that users have experienced problems gaining access to network resources. What utility could be used to directly query a name server for information on a destination domain?
- ping
- tracert
- netstat
- ipconfig
- nslookup
- 22 Which network entity would most likely be configured as both a DHCP client and a DHCP server?
- ISP
- desktop PC
- wireless laptop
- PC-based server
- integrated services home router
- 23 What is a weakness of WEP that is solved by WPA?
- WEP is a proprietary standard whereas WPA is an open standard.
- WEP keys are only 64 bits long whereas WPA keys are 128 bits long.
- WEP uses the same key for every connection whereas WPA uses a different key for each connection.
- WEP uses a fixed length key for every connection whereas WPA uses a different key length for each connection.
- 24 A wireless AP that will be used exclusively by network administrators has been installed on a company network. Security measures have been configured on the device, but it is still considered vulnerable to attack. Which configuration detail could account for this vulnerability?
- Traffic filtering is enabled.
- SSID broadcast is enabled.
- MAC address filtering is enabled.
- WEP encryption is implemented.
- The default AP values have been modified.
- 25 A user starts a file transfer between a client machine and an FTP server. Which list correctly represents the sequence of protocols that are used by the client machine to encapsulate the FTP data traffic for transmission?
- FTP, TCP, IP, Network Access Protocols
- FTP, UDP, IP, Network Access Protocols
- FTP, IP, UDP, Network Access Protocols
- FTP, IP, TCP, Network Access Protocols
- 26 Refer to the exhibit. The wireless router WR1 is configured with the address shown and DHCP is not configured. What will be the result of a technician configuring the address 172.16.14.255 on the laptop?
- The laptop will be configured with the network address.
- The laptop will be configured with a public IP address.
- The laptop will be configured with a broadcast address.
- The laptop will be configured within the same network as WR1.
- 27 What destination IP address is used in a unicast packet?
- a specific host
- a group of hosts
- all hosts on the network
- the network broadcast address
- 28 Refer to the exhibit. Assume that the command output is from a wireless DHCP client that is connected to a Linksys integrated router. What can be deduced from the output?
- The DHCP configuration on the router needs to be verified.
- The WEP key or SSID needs to be verified.
- The wireless connection is operational.
- The wireless NIC driver or the NIC itself needs to be reinstalled.
- 29 Which two protocols are responsible for encrypting data on a wireless network? (Choose two.)
- EAP
- PSK
- WEP
- WPA
- PAP
- 30 Which type of firewall technique can be used to allow inbound traffic from the public network only if it was initiated from the internal network?
- URL filtering
- packet filtering
- application filtering
- stateful packet inspection
- Which two TCP/IP properties must match on hosts in the same LAN if the hosts are to be able to communicate with each other? (Choose two.)
- the subnet mask
- the DNS server configurations
- the default gateway configurations
- the host portion of the IP address
- the network portion of the IP address
- 32 How does a crossover cable make it possible for two "like devices" (for example, two switches) to communicate?
- The transmit pins are disconnected and only the receive pins are used.
- The transmit pins on one device are connected to the transmit pins on the other device.
- The receive pins on one device are connected to the receive pins on the other device.
- The transmit pins on one device are connected to the receive pins on the other device.
- 33 Which type of network attack occurs when an unauthorized person tries to persuade a user to share a network user ID and password?
- brute force
- denial of service
- data manipulation
- social engineering
- 34 Which term is associated with logical addressing?
- IP addresses
- port addresses
- physical addresses
- Media Access Control addresses
- 35 Which two statements are true about local applications? (Choose two.)
- They run on the network.
- An example of a local application is e-mail.
- They are accessed from a remote computer.
- They are stored on the local hard disk.
- They run on the computer where they are installed.
- 36 What is an advantage of purchasing a custom-built computer?
- It is beneficial for less knowledgeable consumers.
- The waiting period for assembly is negligible.
- The cost is lower compared to a computer that has been preassembled.
- The user can specify high-performance components to meet specific needs.
- 37 How do wireless devices within a BSS access an available channel?
- Channels are used sequentially in round-robin fashion by each device in the BSS.
- Devices ask permission to use a channel by sending the AP a Request to Send message.
- Every device within the BSS is assigned its own channel and has its own dedicated connection.
- A device sends data and if it senses collisions it waits a predetermined time before re-sending on a different channel.
- 38 A network technician suspects that malware on a user PC is opening multiple TCP connections to a specific foreign host address. Which Windows command line utility can be used to confirm the multiple TCP connections?
- ping
- netstat
- tracert
- ipconfig
- nslookup
- 39 What information within a data packet does a router use, by default, to make forwarding decisions?
- the destination MAC address
- the destination IP address
- the destination host name
- the destination service requested
- 40 Which type of computer has an integrated mouse?
- desktop
- laptop
- mainframe
- server
- pocket PC
- 41 What is a major characteristic of asymmetric Internet service?
- Download speeds and upload speeds are equal.
- Download speeds are faster than upload speeds.
- Data traffic speeds are faster than voice traffic speeds.
- Used when consistently uploading large amounts of graphics, video and multimedia traffic.
- 42 Refer to the exhibit. Why would a network administrator use the network mode that is shown?
- to support hosts on different IP networks
- to support hosts that use different 802.11 standards
- to support both wireless and wired Ethernet hosts
- to support hosts with different operating systems
- to support hosts with network cards from different manufacturers
- 43 Which is an example of the first step in a divide-and-conquer troubleshooting process?
- Ask a user to send a test email.
- Attempt to reach a particular web site.
- Verify that all cables are firmly seated.
- Check that all IP information is correctly configured.
- 44 Refer to the exhibit. H1 can ping H2, H3, and the Fa0/0 interface of router R1. H2 and H3 but not H1 can ping H4 and H5. What is a possible cause for the H1 failure?
- Router R1 has no route to the destination network.
- Switch S1 does not have an IP address configured.
- The link between router R1 and switch S2 has failed.
- Host H1 does not have a default gateway configured.
- 45 Which protocol is used to transfer files among network devices and perform file-management functions?
- DNS
- FTP
- HTML
- HTTP
- Refer to the exhibit. What is the reason that the host is unable to connect to the Internet?
- DHCP needs to be enabled on the router.
- The router has an incorrect DHCP starting address.
- The IP address on the host is in the wrong network.
- The host is configured with an incorrect gateway.
- 47 Which network design layer provides a connection point for end user devices to the network?
- access
- core
- distribution
- network
- 48 How does a DMZ enhance network security for an organization?
- blocks viruses and spyware
- restricts internal user access to prohibited Internet sites
- allows external customer access to designated internal resources
- removes suspicious attachments from incoming and outgoing e-mail
- 49 What two pieces of information should a help desk technician document while troubleshooting connectivity issues with an end user? (Choose two.)
- the CPU clock speed of the computer
- the number of network jacks that are in the room
- if the user can ping the default gateway address
- if the word processing software is installed correctly
- whether the PC uses dynamic or static IP addressing
- 50 Which wireless technology allows only one-to-one connections and is typically used for short-range, line-of-sight communication?
- GSM
- Wi-Fi
- Infrared
- Bluetooth
- 51 When terminating a UTP cable, why is it important to push the wires all the way into the end of the connector?
- to allow the cable to endure more stretching or twisting
- to ensure good electrical contact
- to ensure that the wires are in correct order
- to minimize crosstalk
- 52 What two commands can be used to form a new binding if client information does not agree with the DHCP client table? (Choose two.)
- ipconfig /release
- ipconfig /all
- ipconfig /flushdns
- ipconfig /renew
- ipconfig
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement