1 As an assignment, a computer science student needs to present data in binary format.

What are the two possible values that the student can use? (Choose two.) 0 1 2 A F 2

Refer to the exhibit. What is the effect of setting the security mode to WEP on the Linksys integrated router? The WEP security mode enables the AP to inform clients of its presence. The WEP security mode encrypts network traffic during transmission between the AP and the wireless client. The WEP security mode generates a dynamic key each time a client establishes a connection with the AP. The WEP security mode identifies the WLAN. 3 Which two statements correctly describe MAC addresses? (Choose two.) MAC addresses are used to identify a specific NIC. MAC addresses contain a network number and unique host identification. MAC addresses are physical addresses. MAC addresses are always assigned to network devices by a network administrator. MAC addresses are Layer 3 addresses. 4 What are two examples of peripheral input devices? (Choose two.) external modem barcode reader digital camera plotter printer 5 Which protocol is used by a client to retrieve an e-mail from a remote server using a TCP/IP connection? DNS FTP POP HTTP 6 Which two statements are true about network applications? (Choose two.)

Microsoft Word is an example of a network application. Network applications are accessible from a remote computer. Network applications are installed on a special type of computer that supports only network applications. Network applications are installed on a network server. Network applications are accessible by one computer at a time. 7

Refer to the exhibit. What cabling fault does the exhibit represent? open reversed pair short split pair 8

Refer to the exhibit. A new switch is connected to an existing switch that has a fully populated MAC table. PC1 requires the destination MAC address of PC3 in order to send a message. Which device or devices will see the ARP sent by PC1? only PC3 PC2 and PC3 PC3 and PC4 PC2, PC3 and PC4 9 The area covered by a single AP is known as what? ad-hoc network basic service set independent basic service set extended service set distribution system 10 A small company owns one older AP that provides a maximum data rate of 11 Mb/s. The company wants to add a newer AP that will provide a faster data rate but be compatible with the existing AP. What two wireless standards are referenced in this scenario? (Choose two.) 802.11 802.11a 802.11b 802.11d 802.11g 11 Where do ISPs get the public addresses that they assign to end users?

ISPs ISPs ISPs ISPs 12

create the addresses themselves. are assigned addresses through the RFC. obtain their addresses automatically. obtain address blocks from registry organizations.

Refer to the exhibit. PC1 sends a data packet to PC4. When the router forwards the data out Fa0/1, what destination MAC address will the router place in the frame? 0050.0FA9.CB47 0050.E208.A761 0200.5455.4E01 0200.545D.25F7 13 What is an advantage of selecting an operating system that has a commercial license over one with a GPL license? The commercial license-based operating system ensures full access to the source code for everyone. The commercial license-based operating system ensures that everyone can participate in the enhancement of the product. The commercial license-based operating system provides structured support. The commercial license-based operating system is released free of charge. 14 A user is unable to send e-mail. To begin troubleshooting this problem, the network technician uses the browser on the PC and tries to access some popular Internet websites. Which troubleshooting approach is being followed? bottom-up divide-and-conquer top-down trial and error 15 A network technician is required to provide access to the Internet for a large company. What is needed to accomplish this task? ISP private IP addresses for each host static IP addresses for each host DHCP server

16

Refer to the exhibit. Host A sends a message to a group of four computers out of the ten computers on this network. Which type of message does host A send? broadcast multicast simulcast unicast 17 What are two advantages of purchasing a preassembled computer? (Choose two.) The cost is comparatively lower1 `. High-performance graphics and gaming applications are supported. There is a negligible waiting period for assembly. This type of computer is useful for knowledgeable consumers with special needs. The user can specify high-performance components. 18 Which protocol is used by a client to browse the web server? FTP HTTP POP SMTP 19 Which three address ranges can be used to depict private IP addresses? (Choose three.) 10.0.0.0 to 10.0.0.255 127.16.0.0 to 127.16.255.255 150.150.0.0 to 150.150.255.255 172.16.1.0 to 172.16.1.255 192.168.22.0 to 192.168.22.255 200.100.50.0 to 200.100.50.255

20 TCP/IP data transmission between the source and destination host is deencapsulated in four steps: A. The TCP header is removed.

B. Bits are decoded and the destination MAC address is recognized. C. The IP header is removed and the contents are passed to the next layer. D. The Ethernet header and trailer are removed. What is the correct sequence of these steps? A, B, C, D A, C, B, D B, C, D, A B, D, C, A C, A, B, D 21 Which two causes of networking problems are related to the physical layer? (Choose two.) disconnected cables improper operation of cooling fans incorrect MAC address incorrect default gateway incorrect subnet mask 22 For an IP address, what component decides the number of bits that is used to represent the host ID? default-gateway host number network number subnet mask 23 All hosts within a domain receive the same frame that originates from one of the devices. The domain is also bounded by routers. What type of domain is this? broadcast collision local multicast 24 What is the purpose of pop-up blocker software? It detects and removes spyware. It detects and removes viruses. It prevents the display of advertisement windows. It removes unwanted e-mail.

25 What is the purpose of spam filter software? It detects and removes spyware. It detects and removes viruses. It prevents the display of advertisement windows.

It examines incoming e-mail messages to identify the unsolicited ones. 26 What is the function of the DNS server? It maps the IP address to the MAC address. It translates a computer or domain name to the associated IP address. It manages the domain that clients are assigned to. It accepts HTTP requests from clients. 27 Your school network blocks all websites related to online gaming. What type of security policy is being applied? identification and authentication remote access acceptable use incident handling 28 What is an advantage of purchasing a custom-built computer? It is beneficial for less knowledgeable consumers. The waiting period for assembly is negligible. The cost is lower compared to a computer that has been preassembled. The user can specify high-performance components to meet specific needs. 29 Which statement accurately describes what network devices do in the distribution layer of the three layer design model? They interconnect individual hosts. They interconnect multiple companies. They interconnect local network segments. They interconnect the company network to the ISP. 30

Refer to the exhibit. Assume that the exhibited output is from a host that is connected to a Linksys integrated router. What is the first thing that should be checked while using a bottom-up troubleshooting approach? the default gateway on the host the IP address on the host the IP address on the router the link status LED on the front of the router the subnet mask on the 31 Which statement is true about packet filtering? It recognizes and filters specific types of attacks. It permits access based on IP address.

It is performed from a host network device. It translates an internal address or group of addresses into a public address that is sent across the network. 32 Which part of the electromagnetic spectrum is commonly used by wireless LANs? Bluetooth infrared Industrial Scientific and Medical (ISM) radio frequency (RF) 33 What is the most common reason that ISPs provide symmetrical transfer services? to address data transfer needs of home users to download significantly more than upload to host servers on the Internet to work with applications that require less bandwidth 34 What is the default subnet mask for the IP address 128.107.23.10? 255.0.0.0 255.255.0.0 255.255.255.0 255.255.255.255 35 Which type of computer uses an integrated monitor and keyboard? pocket PC laptop mainframe server workstation 36 A learner wants to interact with the operating system of a computer. Which two methods can be used for this? (Choose two.) CLI GUI kernel third party software shell 37 Select the connection that would require a straight-through cable. a switch to a hub a router to a switch a switch to a switch a router to a router 38

How does a crossover cable connect two routers? It connects the pins that are used for receiving on one router to the pins that are used for receiving on the other router. It connects the pins that are used for transmitting on one router to the pins that are used for receiving on the other router. It disconnects the transmit pins and uses only the receive pins. It uses the same pins for transmitting and receiving. 39 Within a local network, which two items must be unique on a computer for it to successfully connect to the network? (Choose two.) IP address subnet mask computer name default gateway address operating system version 40 What data communication technology uses low-power radio waves to transmit data? copper cable fiber optic cable wireless radio 41

Refer to the exhibit. A wireless DHCP client is unable to access the web server. Given the output that is shown in the exhibit, what two things should the network technician verify first to troubleshoot this problem? (Choose two.) the wireless client configuration for DHCP the default gateway the firewall configuration the SSID the physical connectivity between the server and the client 42 What is the purpose of the ipconfig /release command? It forces a client to give up its current IP address. It forces a client to give up its current MAC address. It forces the client to clear all the MAC address to IP address associations it has learned. It shows the current IP configuration on the client. 43 Which two statements are characteristics of DHCP services? (Choose two.) A DHCP client determines the lease time for using the IP address that is supplied by the DHCP server.

An integrated router acts as the DHCP server to provide the IP address to the ISP. DHCP clients send a DHCP Discover message to the destination IP address of 255.255.255.255. The DHCP server maps the IP addresses to host names. The integrated router acts as a DHCP server for internal hosts on local networks. 44 What layer is the first point of entry for a host into the network? core layer access layer network layer distribution layer 45 When is the use of a DSL modem necessary? when a cellular telephone provides the service when a high-speed connection is provided over a cable TV network when a high-speed digital connection is required over the regular telephone line when a satellite dish is used

46

Refer to the graphic. What feature can be installed on the Linksys integrated router to convert private IP addresses to Internet-routable addresses? authentication DHCP encryption firewall NAT WEP

47 Which installation option should be chosen when the current operating system is too damaged to work properly? upgrade multi-boot clean install virtualization 48 Refer to the exhibit. Which statement is true based on the information that is shown in the exhibit? All wireless devices that are connected to this AP must have an assigned SSID of University.

Any wireless client that is attached to this AP must have the same IP address and SSID. The AP is not physically wired to the local LAN. This configuration is found only in an ad hoc wireless network.

49 Which of the following are transport layer protocols of the TCP/IP model? (Choose two.) FTP UDP SMTP TFTP TCP 50 Which statement is true about UTP cable termination? Cables with RJ-45 connectors are always preterminated. An RJ-45 connector is used on only one end of the UTP cable. Up to 2 to 3 inches of cable may be untwisted at each end of the cable to allow for easier installation of the RJ-45 connector. The RJ-45 connector should be pushed over the wire jacket for a smooth connection. 51 What is the meaning of the term crosstalk? interference of signals between wire pairs loss of signal strength as distance increases damage of the signal when two bare wires touch strengthening of a signal by a networking device

52 What information within a data packet does a router use, by default, to make forwarding decisions? the destination MAC address the destination IP address the destination host name the destination service requested Showing 4 of 4 Next> Page: GO <Prev All content copyright 1992-2008 Cisco Systems, Inc. Privacy Statement and Trademarks

Master your semester with Scribd & The New York Times

Special offer for students: Only $4.99/month.

Master your semester with Scribd & The New York Times

Cancel anytime.