You are on page 1of 14

When terminating a UTP cable, why is it important to push the wires all the way

into the end of the connector?


to allow the cable to endure more stretching or twisting
to ensure good electrical contact
to ensure that the wires are in correct order
to minimize crosstalk
What two preconfigured settings that affect security arRefer to the graphic. Wha
t is the purpose of assigning a Network Name of Academy?e found on most new wire
less routers? (Choose two.)
broadcast SSID
MAC filtering enabled
WEP encryption enabled
PSK authentication required
default administrator password
Refer to the exhibit. Why would a network administrator use the network mode tha
t is shown?
to support hosts on different IP networks
to support hosts that use different 802.11 standards
to support both wireless and wired Ethernet hosts
to support hosts with different operating systems
to support hosts with network cards from different manufacturers
Which type of network attack occurs when an unauthorized person tries to persuad
e a user to share a network user ID and password?
brute force
denial of service
data manipulation
social engineering
What does the term "attenuation" mean in data communication?
loss of signal strength as distance increases
time for a signal to reach its destination
leakage of signals from one cable pair to another
strengthening of a signal by a networking device
Which two issues can cause connectivity problems on a wireless network? (Choose
two.)
incorrect SSID
broadcast SSID
overlapping channels
low number of clients in BSS
802.11b clients attempting connection to 802.11g APs

Which two automatic addressing assignments are supported by DHCP? (Choose two.)
local server address
subnet mask
default gateway address
physical address of the recipient
physical address of the sender
Which type of network supports DHCP and DNS services for network users in a netw
ork domain?
client/server
peer-to-peer
hierarchical
ad hoc
Refer to the exhibit. What is the reason that the host is unable to connect to t
he Internet?
DHCP needs to be enabled on the router.
The router has an incorrect DHCP starting address.
The IP address on the host is in the wrong network.
The host is configured with an incorrect gateway.
Refer to the exhibit. A home network is configured with the information in the g
raphic. A user tries to manually create a new connection to the network using th
e SSID Ciscoclass. However, a connection cannot be made. What could be the probl
em?
The SSID is case-sensitive.
The SSID must contain at least one number.
The SSID should be used with the default name.
The SSID must contain a minimum of 32 characters.
Which two protocols are responsible for encrypting data on a wireless network? (
Choose two.)
EAP
PSK
WEP
WPA
PAP

What is the function of the DNS server?


It assigns IP addresses to clients.
It accepts HTTP requests from clients.
It maps a hostname to a corresponding IP address.
It manages the domain that clients are assigned to.
Which part of the electromagnetic spectrum is commonly used to exchange data bet
ween a PDA and a computer?
FM
radar
infrared
ultraviolet
Which wireless protocol is used for encryption?
EAP
Open
PSK
WEP
What information within a data packet does a router use, by default, to make for
warding decisions?
the destination MAC address
the destination IP address
the destination host name
the destination service requested
What information is contained in the trailer of an Ethernet frame?
user data
source IP address
segment information
destination MAC address
error checking information
What two commands can be used to form a new binding if client information does n
ot agree with the DHCP client table? (Choose two.)
ipconfig /release
ipconfig /all
ipconfig /flushdns
ipconfig /renew
ipconfig
What is the default subnet mask for an IP address of 64.100.19.14?
255.0.0.0
255.255.0.0
255.255.255.0
255.255.255.255
Which term is associated with logical addressing?
IP addresses
port addresses
physical addresses
Media Access Control addresses
A network technician suspects that malware on a user PC is opening multiple TCP
connections to a specific foreign host address. Which Windows command line utili
ty can be used to confirm the multiple TCP connections?
ping
netstat
tracert
ipconfig
nslookup
Bottom-up troubleshooting begins at which layer of the OSI model?
network layer
physical layer
data link layer
transport layer
application layer
Which type of firewall technique can be used to allow inbound traffic from the p
ublic network only if it was initiated from the internal network?
URL filtering
packet filtering
application filtering
stateful packet inspection

The area covered by a single AP is known as what?


ad-hoc network
basic service set
independent basic service set
extended service set
distribution system
Which network entity would most likely be configured as both a DHCP client and a
DHCP server?
ISP
desktop PC
wireless laptop
PC-based server
integrated services home router
What are two ways that a user can interact with an operating system shell? (Choo
se two.)
CLI
OS
GUI
NIC
kernel
A user starts a file transfer between a client machine and an FTP server. Which
list correctly represents the sequence of protocols that are used by the client
machine to encapsulate the FTP data traffic for transmission?
FTP, TCP, IP, Network Access Protocols
FTP, UDP, IP, Network Access Protocols
FTP, IP, UDP, Network Access Protocols
FTP, IP, TCP, Network Access Protocols
Which wireless technology allows only one-to-one connections and is typically us
ed for short-range, line-of-sight communication?
GSM
Wi-Fi
Infrared
Bluetooth
Which protocol is used to transfer files among network devices and perform file-
management functions?
DNS
FTP
HTML
HTTP
A network administrator has been notified that users have experienced problems g
aining access to network resources. What utility could be used to directly query
a name server for information on a destination domain?
ping
tracert
netstat
ipconfig
nslookup
What is a weakness of WEP that is solved by WPA?
WEP is a proprietary standard whereas WPA is an open standard.
WEP keys are only 64 bits long whereas WPA keys are 128 bits long.
WEP uses the same key for every connection whereas WPA uses a different key for
each connection.
WEP uses a fixed length key for every connection whereas WPA uses a different k
ey length for each connection.
How do ISPs obtain public IP addresses?
They create the addresses themselves.
They obtain the addresses from the home PCs.
They obtain the addresses from the Internet registry.
They obtain the addresses from the RFC.
Which type of computer has an integrated mouse?
desktop
laptop
mainframe
server
pocket PC
Refer to the exhibit. The security policy of an organization allows employees to
connect to the office intranet from their homes. Which type of security policy
is this?
acceptable use
incident handling
network maintenance
remote access
What is a service pack?
an access policy
an agreement between a company and a vendor
a piece of code created to fix one specific problem
a collection of patches and updates released by a vendor
a small piece of software designed specifically for security issues

Which network design layer provides a connection point for end user devices to
the network?
access
core
distribution
network
How does a DMZ enhance network security for an organization?
blocks viruses and spyware
restricts internal user access to prohibited Internet sites
allows external customer access to designated internal resources
removes suspicious attachments from incoming and outgoing e-mail
All hosts within a domain receive the same frame that originates from one of the
devices. The domain is also bounded by routers. What type of domain is this?
broadcast
collision
local
multicast

An administrator is troubleshooting a network problem that involves the inabili


ty of users to reach Internet sites. During troubleshooting, the administrator i
s able to successfully ping web sites by their IP address, but pings to domain n
ames are unsuccessful. Which service is most likely at fault?
DHCP
DNS
FTP
NAT
A local PC has the correct configuration that is required to access the network.
A ping command that is sourced at the PC does not receive a response from a rem
ote device. Which operating system command might be used to determine where the
connection failed?
netstat
tracert
ipconfig
nslookup
What is the function of a physical topology map?
records IP addressing of each host
records hostnames and applications
organizes groups of hosts by how they use the network
shows where wiring is installed and the locations of network devices
Refer to the exhibit. The wireless router WR1 is configured with the address sho
wn and DHCP is not configured. What will be the result of a technician configuri
ng the address 172.16.14.255 on the laptop?
The laptop will be configured with the network address.
The laptop will be configured with a public IP address.
The laptop will be configured with a broadcast address.
The laptop will be configured within the same network as WR1.
How do wireless devices within a BSS access an available channel?
Channels are used sequentially in round-robin fashion by each device in the BSS
.
Devices ask permission to use a channel by sending the AP a Request to Send mes
sage.
Every device within the BSS is assigned its own channel and has its own dedicat
ed connection.
A device sends data and if it senses collisions it waits a predetermined time b
efore re-sending on a different channel.
What is a major characteristic of asymmetric Internet service?
Download speeds and upload speeds are equal.
Download speeds are faster than upload speeds.
Data traffic speeds are faster than voice traffic speeds.
Used when consistently uploading large amounts of graphics, video and multimedi
a traffic.

Which two TCP/IP properties must match on hosts in the same LAN if the hosts are
to be able to communicate with each other? (Choose two.)
the subnet mask
the DNS server configurations
the default gateway configurations
the host portion of the IP address
the network portion of the IP address
What is an advantage of purchasing a custom-built computer?
It is beneficial for less knowledgeable consumers.
The waiting period for assembly is negligible.
The cost is lower compared to a computer that has been preassembled.
The user can specify high-performance components to meet specific needs.
What two pieces of information should a help desk technician document while trou
bleshooting connectivity issues with an end user? (Choose two.)
the CPU clock speed of the computer
the number of network jacks that are in the room
if the user can ping the default gateway address
if the word processing software is installed correctly
whether the PC uses dynamic or static IP addressing

Refer to the exhibit. Assume that the command output is from a wireless DHCP cli
ent that is connected to a Linksys integrated router. What can be deduced from t
he output?
The DHCP configuration on the router needs to be verified.
The WEP key or SSID needs to be verified.
The wireless connection is operational.
The wireless NIC driver or the NIC itself needs to be reinstalled.
Which two statements are true about local applications? (Choose two.)
They run on the network.
An example of a local application is e-mail.
They are accessed from a remote computer.
They are stored on the local hard disk.
They run on the computer where they are installed.
Refer to the exhibit. H1 can ping H2, H3, and the Fa0/0 interface of router R1.
H2 and H3 but not H1 can ping H4 and H5. What is a possible cause for the H1 fai
lure?
Router R1 has no route to the destination network.
Switch S1 does not have an IP address configured.
The link between router R1 and switch S2 has failed.
Host H1 does not have a default gateway configured.
What destination IP address is used in a unicast packet?
a specific host
a group of hosts
all hosts on the network
the network broadcast address
How does a crossover cable make it possible for two "like devices" (for example,
two switches) to communicate?
The transmit pins are disconnected and only the receive pins are used.
The transmit pins on one device are connected to the transmit pins on the other
device.
The receive pins on one device are connected to the receive pins on the other d
evice.
The transmit pins on one device are connected to the receive pins on the other
device.

Some new features are available for the OS that is currently running on a user's
PC. What method should be chosen so that the user can install these new feature
sets?
clean install
multi-boot
upgrade
virtualization
What is the default subnet mask for the IP address 128.107.23.10?
255.0.0.0
255.255.0.0
255.255.255.0
255.255.255.255

When are leased lines typically used?


when low bandwidth is required
for home and small business connectivity
when a dedicated digital data line is necessary
as a less expensive option to cable and DSL modem service
A home user is looking for an ISP connection that provides high speed digital t
ransmission over regular phone lines. What ISP connection type should be used?
DSL
dial-up
satellite
cell modem
cable modem
What is the purpose of pop-up blocker software?
It detects and removes spyware.
It detects and removes viruses.
It prevents the display of advertisement windows.
It removes unwanted e-mail.
Which service will translate private internal IP addresses into Internet routabl
e public IP addresses?
ARP
DHCP
DNS
NAT
What is an ISP?
It is a standards body that develops cabling and wiring standards for networkin
g.
It is a protocol that establishes how computers within a local network communic
ate.
It is an organization that enables individuals and businesses to connect to the
Internet.
It is a networking device that combines the functionality of several different
networking devices in one.

A college network administrator is planning a wireless LAN to provide service i


n the student lounge and outdoor patio. The requirements include a range of at l
east 80 meters and a speed of 30 Mb/s. Which wireless LAN standard meets these r
equirements?
802.11
802.11a
802.11b
802.11g
Which adapter card would be required for a PC to exchange information with othe
r PCs on a LAN?
NIC
video card
sound card
internal modem
Which statement correctly describes the function of ARP?
ARP is used by the switches on the network to build their MAC tables.
ARP is used by the routers on the network to build their routing tables.
ARP is used by hosts to resolve a host name to an IP address for the destinatio
n host.
ARP is used by hosts to resolve an IP address to a MAC address for the destinat
ion host.
After attaching four PCs to the switch ports, configuring the SSID and setting a
uthentication properties for a small office network, a technician successfully t
ests the connectivity of all PCs that are connected to the switch and WLAN. A fi
rewall is then configured on the device prior to connecting it to the Internet.
What type of network device includes all of the described features?
switch
ISR router
firewall appliance
standalone wireless access point

What type of computer would most likely use a docking station?


laptop
server
desktop
mainframe
workstation

A network administrator is setting up an application filtering firewall. Company


security policy states that FTP sessions that are coming from the Internet and
use the standard FTP port must be blocked. Which TCP/UDP port must the administr
ator block on the firewall to be in compliance?
21
23
53
80

When would infrared be used to connect network devices?


when connecting multiple host devices to a wireless access point
when synchronizing a PC with a PDA that is in line of sight
when connecting a PC to a network switch that is located in another room
when updating two access points that are located in separate buildings
A network analyst is asked to create a physical topology map of the campus netwo
rk. Which two items of information should be included in the map? (Choose two.)
DNS entries
cabling runs
server group information
IP addressing scheme
network device locations

What type of message is sent to a specific group of hosts?


static
unicast
dynamic
multicast
broadcast
What measurement is commonly used to describe communication speed when transferr
ing data?
bps
cps
Hz
MB
Which IP address type is intended for a specific host?
broadcast
multicast
simulcast
unicast
Refer to the exhibit. If H4 sends a message to H1 and the destination MAC addres
s is in the MAC table for both Switch1 and Switch2, which host devices will rece
ive the message?
only H1
hosts H1 and H4
all hosts that are connected to Switch1
all hosts that are connected to Switch1 and Switch2
Refer to the graphic. What is the purpose of assigning a Network Name of Academy
?
It identifies the wireless LAN.
It translates IP addresses into easy-to-remember domain names.
It encrypts data between the wireless client and the access point.
It allows access to the AP configuration GUI by name rather than address.
It translates an internal address or group of addresses into an outside, public
address.
Which two statements are true about routers and switches? (Choose two.)
Switches and routers filter collisions.
Switches and routers filter broadcasts.
Switches and routers maintain ARP and routing tables.
A switch uses MAC addresses to build a forwarding table, whereas a router uses
IP networks to build its routing table.
A switch uses destination addresses to build a MAC table, whereas a router buil
ds a routing table based on source IP networks.

TCP/IP data transmission between the source and destination host is de-encapsula
ted in four steps:
A. The TCP header is removed.
B. Bits are decoded and the destination MAC address is recognized.
C. The IP header is removed and the contents are passed to the next layer.
D. The Ethernet header and trailer are removed.
What is the correct sequence of these steps?
A, B, C, D
A, C, B, D
B, C, D, A
B, D, C, A
C, A, B, D

Refer to the exhibit. What is a possible reason that the PC is unable to ping th
e default gateway IP address?
The PC is on a different network than the default gateway.
A straight-through cable should be used to connect the switches.
A straight-through cable should be used to connect the PC to the switch.
Because the correct cable types are used for each segment, a bad cable could be
the problem.
Refer to the exhibit. The wired and wireless hosts can connect to each other but
not to the Internet. All cabling and interface indicator lights appear to be in
order. What is the most effective next step in a bottom-up troubleshooting proc
ess?
Verify DNS configurations
Verify the default gateway configurations
Verify that the wireless settings are correct
Verify that wired and wireless components are on the same network.

Which troubleshooting technique can be used to quickly restore user functionali


ty without having to spend much time identifying the exact problem?
top-down
bottom-up
substitution
trial and error
What destination IP address does a DHCP client use to send the initial DHCP Disc
over packet when looking for a DHCP server?
127.0.0.1
224.0.0.1
255.255.255.255
the IP address of the default gateway
Which three addresses belong to the category of private IP addresses? (Choose th
ree.
10.0.0.1
128.0.0.1
150.0.0.1
172.16.0.1
192.168.31.19
172.168.31.1

Which portion of the packet does a router use to forward the packet to the desti
nation?
source IP address
user data
destination IP address
control information
destination MAC address
How does a crossover cable connect two routers?
It connects the pins that are used for receiving on one router to the pins tha
t are used for receiving on the other router.
It connects the pins that are used for transmitting on one router to the pins t
hat are used for receiving on the other router.
It disconnects the transmit pins and uses only the receive pins.
It uses the same pins for transmitting and receiving.
What is a characteristic of Bluetooth wireless technology?
It allows one-to-many connections.
It operates in the 5GHz radio frequency band.
It is unable to penetrate walls with a useable signal.
It can be used for communications beyond 100 meters

What is the purpose of TCP?


to manage data links and physical network transmissions
to specify the format of requests and responses that are exchanged between the
client and server
to assign the logical address and encapsulate the request into packets for rout
ing to the destination
to provide flow control and acknowledgment of packets that are exchanged betwee
n the client and server
What is the function of CSMA/CA on a wireless Ethernet network?
to prevent collisions
to broadcast messages
to select the least congested channel
to establish an ACK between devices

Which statement is true about packet filtering?


It recognizes and filters specific types of attacks.
It permits access based on IP address.
It is performed from a host network device.
It translates an internal address or group of addresses into a public address t
hat is sent across the network.
What are two examples of peripheral output devices? (Choose two.)
barcode reader
digital camera
external DVD
headphones
printer
What is an advantage of selecting an operating system that has a GPL license ov
er one with a commercial license?
The GPL license-based operating system ensures that everyone can participate in
the enhancement of the product.
The GPL license-based operating system implements a structured development life
cycle.
The GPL license-based operating system prevents modification of the source code
.
The GPL license-based operating system provides structured support.
What are two characteristics of a MAC address? (Choose two.)
It indicates the physical location of the host within the network.
It is dynamically assigned by a DHCP server.
It is displayed in HEX characters.
It is a physical address.
It is cable-based.
Which network design layer provides hosts with initial connectivity to the netwo
rk?
access
core
distribution
network
In an attempt to verify connectivity, a user issues the ping command to a devic
e that is not on the local network. The ping is unsuccessful. What can be determ
ined from this result?
The default gateway is misconfigured.
The patch cable on the host station is faulty.
The router between the host and destination is faulty.
Further troubleshooting will be required to reach a definite conclusion.

Which two causes of networking problems are related to the physical layer? (Choo
se two.)
damaged cables and connectors
incorrect addressing
incorrect subnet mask
overheated components
incorrect default gateway

What advantage does a peer-to-peer network have over a client-server network?


It increases security.
It increases scalability.
It produces a higher performance for hosts.
It eliminates the need for centralized administration.
Which wireless component allows wireless clients to gain access to a wired netwo
rk?
PDA
STA
access point
wireless bridge
Refer to the exhibit. What default gateway address will be assigned to PC1 if ac
cess to remote resources is needed?
192.31.7.3
192.168.1.101
192.168.1.253
A default gateway is not necessary.
Which two statements are true about a Linksys router that is running NAT? (Choos
e two.)
It receives a public Internet routable address from the ISP.
The assigned LAN addresses are considered global addresses.
It dynamically distributes static IP addresses to the hosts in the LAN.
It converts public IP addresses to private IP addresses in packets that are dest
ined for the Internet.
It allows packets from multiple hosts on the LAN to share a single public IP add
ress to access the Internet

Which two components are necessary for a wireless client to be installed on a WL


AN? (Choose two.)
media
wireless NIC
custom adapter
crossover cable
wireless bridge
wireless client software

Which picture shows a USB port on a PC?

Refer to the exhibit. Which option correctly represents the encapsulation of a p


acket that is sent by Host1 to the web server?
A user tries to open a page on the web server at www.cisco.com. The user s worksta
tion does not have the destination IP address in order to encapsulate the reques
t. Which network topology will provide the services that are required to associa
te the name of the web server with an IP address?

You might also like