You are on page 1of 10

What are two characteristics of a MAC address? (Choose two.

)
It indicates the physical location of the host within the network.

It is dynamically assigned by a DHCP server.

It is displayed in HEX characters.

It is a physical address.

It is cable-based.

A computer joins the network and announces itself to all hosts on the LAN. What type of
message does the computer send out?
broadcast
simulcast
multicast
unicast
Which two statements are characteristics of DHCP services? (Choose two.)
A DHCP client determines the lease time for using the IP address that is supplied by the DHCP
server.
An integrated router acts as the DHCP server to provide the IP address to the ISP.
DHCP clients send a DHCP Discover message to the destination IP address of 255.255.255.255.
The DHCP server maps the IP addresses to host names.
The integrated router acts as a DHCP server for internal hosts on local networks.
What are two ways that a user can interact with an operating system shell? (Choose two.)
CLI
OS
GUI
NIC
kernel
Which two transport layer protocols are used to transfer messages between hosts? (Choose two.)
DHCP
FTP
SMTP
TCP
UDP

Which two automatic addressing assignments are supported by DHCP? (Choose two.)
local server address
subnet mask
default gateway address
physical address of the recipient
physical address of the sender
Which protocol in its default configuration downloads e-mail messages to the client computer
and deletes them from the server?
FTP
POP3
SMTP
IMAP4
What is the correct sequence of steps in the encapsulation of TCP/IP data as it passes from a
source to a destination host?

A. converts data to bits for transmission


B. packages the data for end to end transport
C. adds the data-link header and trailer
D. adds the network IP address to the header of the packet
A,B,C,D
A,C,D,B
B,D,C,A
B,C,D,A
D,C,B,A
What is the purpose of TCP?
to manage data links and physical network transmissions
to specify the format of requests and responses that are exchanged between the client and
server
to assign the logical address and encapsulate the request into packets for routing to the
destination
to provide flow control and acknowledgment of packets that are exchanged between the
client and server
10
Refer to the exhibit. The network is experiencing excessive broadcast traffic from multiple hosts.
What can be done to reduce the broadcast traffic that each host receives without compromising
connectivity to the corporate servers?
Separate the switches with a router.
Create a separate VLAN for the servers and hosts.
Change from Ethernet switches to FastEthernet switches.
Increase the number of switches to reduce the number of PCs that are connected to each
switch.
11

Refer to the graphic. Based on the information that is shown, what statement is true?
This configuration would be commonly found in an ad hoc wireless network.
Any wireless client that is attached to this access point would have the same IP address and
SSID.
All wireless devices that are connected to this access point must have an assigned SSID of
Academy.
In addition to accepting wireless client requests, this access point must connect to the wired
network.
What is an advantage of purchasing a custom-built computer?
It is beneficial for less knowledgeable consumers
. The waiting period for assembly is negligible.
The cost is lower compared to a computer that has been preassembled.
The user can specify high-performance components to meet specific needs.

A home user is looking for an ISP connection that provides high speed digital transmission over regular
phone lines. What ISP connection type should be used?
DSL dial-up satellite cell modem cable modem

Which type of network supports DHCP and DNS services for network users in a network
domain?
client/server
peer-to-peer
hierarchical
ad hoc
After attaching four PCs to the switch ports, configuring the SSID and setting authentication properties
for a small office network, a technician successfully tests the connectivity of all PCs that are connected
to the switch and WLAN. A firewall is then configured on the device prior to connecting it to the
Internet. What type of network device includes all of the described features?
switch ISR router firewall appliance standalone wireless access point
Which two statements are true about local applications? (Choose two.)
They run on the network.
An example of a local application is e-mail.
They are accessed from a remote computer.
They are stored on the local hard disk.
They run on the computer where they are installed.
Which of the following statements best describes DNS?
DNS servers are used to map an IP address to a physical address.
DNS servers are used to map a name to an IP address.
DNS servers are used to configure logical address information for host computers.
DNS servers are used to translate from private addresses to public addresses.
Which layer in the hierarchical Ethernet design model ensures that traffic between local
networks will be allowed?
core layer
access layer
network layer
distribution layer

A network technician is required to provide access to the Internet for a large company. What is needed
to accomplish this task?
ISP
private IP addresses for each host
static IP addresses for each host
DHCP server
Which statement accurately describes what network devices do in the distribution layer of the
three layer design model?
They interconnect individual hosts.
They interconnect multiple companies.
They interconnect local network segments.
They interconnect the company network to the ISP.
What are two examples of peripheral input devices? (Choose two.)
external modem
barcode reader
digital camera
plotter
printer
Which two values represent the network number and default mask for the address 209.165.200.225?
(Choose two.)
209.0.0.0 209.165.0.0 209.165.200.0 255.0.0.0 255.255.0.0 255.255.255.0
Why would a corporate web server be assigned a public IP address instead of a private IP
address?
The public address can be acquired at no cost.
The public address can be routed on the Internet.
The public address provides a security advantage.
The same public address can be used on multiple servers to prevent depletion of available IP
addresses.
What portion of the destination IP address is used as a packet is routed through the Internet?
subnet mask host portion network portion default gateway address
25
Refer to the exhibit. Which pair of addresses would be appropriate to use for PC1 and PC2 to
establish a workgroup using private addresses?
127.0.0.1 and 127.0.0.2
172.16.4.2 and 172.16.4.3
172.16.5.1 and 192.168.3.2
198.133.219.25 and 198.133.219.26
What is the purpose of pop-up blocker software?
It detects and removes spyware. It detects and removes viruses. It prevents the display of
advertisement windows. It removes unwanted e-mail.
What is a service pack?
an access policy
an agreement between a company and a vendor
a piece of code created to fix one specific problem
a collection of patches and updates released by a vendor
a small piece of software designed specifically for security issues
What wireless technology has the ability to communicate with many devices at the same time, makes
use of the 2.4 GHz band, and is limited to low-speed, short-range communications?
RF ISM infrared Bluetooth
29
Refer to the exhibit. An educational institution needs to connect PC systems that use private IP
addressing to the Internet. They have multiple systems that need to access the Internet, but were
only able to purchase one public IP address. What should be activated on the Linksys integrated
router to achieve this goal?
authentication
DHCP
encryption
firewall
NAT
WEP
Which type of network attack occurs when an unauthorized person tries to persuade a user to
share a network user ID and password?
brute force
denial of service
data manipulation
social engineering
What are two best practices that are used when configuring a small home WLAN? (Choose two.)
the use of EAP
the encryption of the SSID
the use of pre-shared keys
the use of open authentication
the disabling of SSID broadcasting
Which firewall resource could include the capability of recognizing and filtering DoS attacks?
URL filtering
application filtering
Layer 4 packet filtering
stateful packet inspection
Which adapter card would be required for a PC to exchange information with other PCs on a LAN?
NIC video card sound card internal modem
Which type of computer has an integrated mouse?
desktop laptop mainframe server pocket PC
What component of a personal computer is responsible for the processing of all data?
RAM CPU firewall system bus operating system
36

Refer to the exhibit. Assume that the exhibited output is from a host that is connected to a
Linksys integrated router. What is the first thing that should be checked while using a bottom-up
troubleshooting approach?
the default gateway on the host
the IP address on the host
the IP address on the router
the link status LED on the front of the router
the subnet mask on the host
Which Windows PC command line utility can be used to discover the path that a packet takes to reach a
destination?
ping netstat tracert nslookup ipconfig
Which device is often configured to act as both a DHCP client and a DHCP server?
home PC ISP modem wireless-enabled laptop integrated services router
What is the name for the contract between a customer and an ISP that specifies requirements for
uptime and service response time?
DSL
IAB
NAP
SLA
What is true about a wireless access point that is equipped with an omnidirectional antenna?
concentrates signal in one direction
typically used in bridging applications
radiates the signal equally in all directions
provides the greatest transmission distance of all antenna types that are used by APs
What procedure will help prevent users from detecting a wireless network?
Enable WEP.
Enable MAC filtering.
Disable SSID broadcasts.
Change the default administrator password on the AP.
What is the purpose of the ipconfig /release command?
It forces a client to give up its current IP address.
It forces a client to give up its current MAC address.
It forces the client to clear all the MAC address to IP address associations it has learned.
It shows the current IP configuration on the client
What data communication technology uses low-power radio waves to transmit data?
copper cable fiber optic cable wireless radio
Which attribute must be the same for wireless devices on one network to be able to communicate with
devices on a different network?
DNS server MAC address default gateway operating system wireless equipment
vendor
A company has a web server that must be accessible to both external and internal clients. Which
security policy best practice should be followed to maximize security of the server?
Place the web server in a DMZ.
Keep the web server on the external network.
Configure a firewall device to serve as the web server.
Locate the web server in the server farm of the internal network.
Which installation option should be chosen when the current operating system is too damaged to work
properly?
upgrade multi-boot clean install virtualization
What two pieces of information should a help desk technician document while troubleshooting
connectivity issues with an end user? (Choose two.)
the CPU clock speed of the computer
the number of network jacks that are in the room
if the user can ping the default gateway address
if the word processing software is installed correctly
whether the PC uses dynamic or static IP addressing
A user is not able to connect to the network. A PC technician replaces the network cable that connects
the PC to the switch port. The user is now able to connect to the network. Which troubleshooting
technique did the technician use?
top-down substitution divide-and-conquer a combination of top-down and divide-
and-conquer
Because of an increasing number of users, bandwidth per user on a WLAN has decreased to a point
where users are complaining about poor performance. What can be done to improve the user
experience?
Increase the AP radio signal strength. Place the AP in a more central location. Deploy an
external omni-directional antenna. Reduce the number of devices using each channel.
A user has reported a failure to connect to the network. Based on similar calls from other users in
the same location, the network technician starts troubleshooting by entering the ipconfig
command on the user computer. Which troubleshooting technique is the technician using?
top-down
bottom-up
substitution
divide-and-conquer

You might also like