Which two transport layer protocols enable hosts to communicate and transfer data? (Choose two.

) DHCP ICMP IP TCP UDP What is a function of the distribution layer in the hierarchical design model? to provide latency free switching to organize end devices in small manageable groups to provide connectivity using the high-speed backbone to provide connectivity between smaller local networks For the TCP/IP model for internetwork communication, which statement describes the process for the transition of data from the internet layer to the network access layer? An IP packet is encapsulated in a frame. A TCP segment is placed in an IP packet. HTML data is encapsulated in a TCP segment. A frame is placed on the network media as encoded bits. What is the function of the DNS server? It maps the IP address to the MAC address. It translates a computer or domain name to the associated IP address. It manages the domain that clients are assigned to. It accepts HTTP requests from clients. In IP telephony, what is the purpose of a gateway to the PSTN? to connect IP voice clients to Internet phone service to create a peer-to-peer connection between two IP voice clients

to map unique names of IP voice endpoints to a client list on a voice server to allow IP voice clients to communicate with regular analog telephones. Which three types of information are provided to a host by an integrated router that is acting as a DHCP server? (Choose three.) host ID IP addresses of DNS servers IP address MAC address hostname subnet mask

A host wants to send information simultaneously to all the other hosts in the same network. Which domain will support this type of communication? broadcast unicast local multicast What are two functions of MAC addresses in a LAN? (Choose two.) to allow the transfer of frames from source to destination to determine which host has priority to transfer data to indicate the best path between separate networks to associate with a specific network IP address to uniquely identify a node on a network

Refer to the exhibit. How many additional hosts can be added to the local network? 124 126 252 254 255 256 What are two advantages of purchasing a preassembled computer? (Choose two.) The cost is comparatively lower. High-performance graphics and gaming applications are supported. There is a negligible waiting period for assembly. This type of computer is useful for knowledgeable consumers with special needs. The user can specify high-performance components.

When is the use of a DSL modem necessary? when a cellular telephone provides the service when a high-speed connection is provided over a cable TV network when a high-speed digital connection is required over the regular telephone line

when a satellite dish is used A home user was successfully browsing the Internet earlier in the day but is now unable to connect. A ping command from a wireless laptop to a wired PC in the LAN is successful, but the nslookup command fails to resolve a website address. The user decides to analyze the LEDs on the Linksys router to verify connectivity. Which LED should be of main concern in this situation? WLAN LED power LED Internet LED 1-4 Ethernet LEDs What is the most common reason that ISPs provide symmetrical transfer services? to address data transfer needs of home users to download significantly more than upload to host servers on the Internet to work with applications that require less bandwidth What is one purpose of using logical addresses in an IP network? They identify a specific NIC on a host device by assigning a permanent logical address. They are used to determine which host device accepts the frame. They provide vendor-specific information about the host. They are used to determine the network that the host is located on. They are used by switches to make forwarding decisions. A network designer is working with a small company to determine the network type best suited to the needs of the company. Which two characteristics could the designer use to describe a peer-to-peer network to the owner of the company? (Choose two.) central administration easy to install low cost scalable

secure Which part of a data packet is used by a router to determine the destination network? source IP address user data destination IP address control information destination MAC address What is the purpose of a router? to forward broadcasts to all interfaces so that all hosts receive them to maintain a table of individual host addresses to select the best path to reach remote networks to physically connect multiple hosts that belong to the same network

Refer to the exhibit. PC1 sends a data packet to PC4. When the router forwards the data out Fa0/1, what destination MAC address will the router place in the frame? 0050.0FA9.CB47 0050.E208.A761 0200.5455.4E01 0200.545D.25F7

Refer to the exhibit. A local area network is built with four PCs, a switch, and a hub. PC1 sends a packet to PC4 which collides with a packet sent from PC3 to PC1. Which devices will receive the damaged frame? PC1 and PC2 PC1, PC2, PC3, and PC4 PC1, PC2, and the switch PC1, PC2, PC3, PC4, and the switch

Refer to the exhibit. Host2 attempts to establish communications with Server1. What action will switch SW1 take prior to forwarding the frame? flood the frame out all interfaces learn the MAC address that is associated with Host2

assign a MAC address to Host2 from the MAC table poll all interfaces to learn their assigned IP addresses

Refer to the exhibit. Which statement is true based on the information that is shown in the exhibit? All wireless devices that are connected to this AP must have an assigned SSID of University. Any wireless client that is attached to this AP must have the same IP address and SSID. The AP is not physically wired to the local LAN. This configuration is found only in an ad hoc wireless network. Where do ISPs get the public addresses that they assign to end users? ISPs create the addresses themselves. ISPs are assigned addresses through the RFC. ISPs obtain their addresses automatically. ISPs obtain address blocks from registry organizations.

For an IP address, what component decides the number of bits that is used to represent the host ID? default-gateway host number network number subnet mask What describes the external IP address that is obtained by a router through a cable or DSL modem? a public address that is obtained from ICANN

a private address that is manually configured by the administrator a public address that is obtained through DHCP from the ISP a private address that converts to a public address on the internal LAN Which three address ranges can be used to depict private IP addresses? (Choose three.) to to to to to to Your school network blocks all websites related to online gaming. What type of security policy is being applied? identification and authentication remote access acceptable use incident handling Which part of the electromagnetic spectrum is commonly used by wireless LANs? Bluetooth infrared Industrial Scientific and Medical (ISM) radio frequency (RF) Which type of attack involves flooding a server port with SYN messages? phishing brute force denial of service

data manipulation

What is the source of the majority of reported network security incidents? adware hackers internal users spammers

Refer to the graphic. What feature can be installed on the Linksys integrated router to convert private IP addresses to Internet-routable addresses? authentication DHCP encryption firewall NAT WEP Before implementing a stateful firewall on an ISR router, a network engineer is asked to explain to upper management in simple terms what a stateful firewall is. Which description should the engineer use? A stateful firewall is only available on a firewall appliance. A stateful firewall blocks or permits access based only on applications.

A stateful firewall bases its analysis only on IP address, port number, and MAC address. A stateful firewall can be configured to allow incoming packets only from sessions that are initiated from inside. What is the purpose of creating a DMZ during network firewall implementation? to create a server security zone accessible only to internal clients to create a dirty zone that allows all inbound and outbound traffic to allow for a publicly accessible zone without compromising the internal network to specify a higher security level than normally required for the internal production network How does a straight-through cable connect two unlike devices? It connects the receive pins on the first device to the receive pins on the second device. It connects the transmit pins on the first device to the receive pins on the second device. It disconnects the transmit pins and uses only the receive pins. It uses the same pins for transmitting and receiving.

What is an advantage of selecting an operating system that has a commercial license over one with a GPL license? The commercial license-based operating system ensures full access to the source code for everyone. The commercial license-based operating system ensures that everyone can participate in the enhancement of the product. The commercial license-based operating system provides structured support. The commercial license-based operating system is released free of charge. Which installation option enables a single physical resource to function simultaneously as multiple logical resources? clean install multi-boot upgrade virtualization For devices that do not autosense, which connection requires a crossover cable? hub port to router port

PC to hub port PC to switch port PC port to PC port When terminating UTP cabling, why is it important to untwist only a small amount of each wire pair? minimizes crosstalk makes installation faster ensures wires are in correct order makes it easier to fit wires into connector
Top of Form

What are two examples of storage peripheral devices? (Choose two.) printer flash drive headphones external DVD barcode reader Within a local network, which two items must be unique on a computer for it to successfully connect to the network? (Choose two.) IP address subnet mask computer name default gateway address operating system version

Refer to the exhibit. A ping command that was initiated from the local PC to the file server at IP address succeeded. However, a ping that was initiated from the file server to the local PC was unsuccessful. What could cause the ping command that was initiated from file server to fail? The file server is down. The integrated router has failed. NAT has been enabled on the integrated router. A security measure is blocking access that initiates from the server. The DSL modem failed to provide an IP address for the local PC.

Refer to the exhibit. Which statement is true based on the configuration shown? Multiple modes of encryption are configured on this device.

Both 802.11b and 802.11g hosts can connect to this device. All APs in the WLAN will allow wireless connections via channel 6. The network name must be entered on a host computer before the host connects to this network.

Refer to the exhibit. What is the effect of setting the security mode to WEP on the Linksys integrated router? The WEP security mode enables the AP to inform clients of its presence. The WEP security mode encrypts network traffic during transmission between the AP and the wireless client. The WEP security mode generates a dynamic key each time a client establishes a connection with the AP. The WEP security mode identifies the WLAN. A network administrator is planning an inexpensive WLAN implementation at a small business site. Which two strategies should be included in the site survey? (Choose two.) Identify the locations of sources of interference. Hire a WLAN analysis firm to survey the site. Deploy all APs and move them if necessary to improve coverage. Use a wireless laptop to verify WLAN coverage in the work areas. Employ sophisticated specialized equipment to measure signal strengths and interference. While conducting a site survey for a new wireless LAN design, a network technician determines that several wireless phones in the company use the 2.4GHz band and could interfere with the operation of the wireless LAN. Based on this, which two wireless LAN standards could be implemented to avoid this interference? (Choose two.) original 802.11 802.11a 802.11b 802.11g


Refer to the exhibit. A small office uses an ISR to provide connectivity for both wired and wireless computers. One day, a sales person who is using a laptop cannot connect to Server1 through the wireless network. A network technician attempts to determine if the problem is on the wireless or the wired network. The technician pings successfully from the wireless laptop to the default gateway IP address on the ISR. What should be the next troubleshooting step? Ping from the laptop to PC1. Ping from Server1 to PC1. Ping from Server1 to its gateway IP address. Ping from the laptop to the Ethernet port on the cable modem. A user is unable to send e-mail. To begin troubleshooting this problem, the network technician uses the browser on the PC and tries to access some popular Internet websites. Which troubleshooting approach is being followed? bottom-up divide-and-conquer top-down trial and error For the second time in a week, workstations on a LAN are not able to log into the server. The technician fixed the problem the first time, but cannot remember the steps taken to solve it. What aspect of the troubleshooting process has the technician neglected?

identifying the problem asking end-users questions documenting the troubleshooting process using structured techniques to solve a problem

Refer to the exhibit. When www.cisco.com is entered in a browser window on a PC, the web page is unavailable. While troubleshooting this problem, the network technician executes the nslookup command as well as the ping command to the web server. What is the likely reason that the web server home page cannot be displayed? The DNS server service needs to be installed on the PC. A DNS server is not available to resolve the name. The reason that the web server is unable to display the web page is that the web server is unavailable. The increased response time displayed in the ping may indicate a delay in server response time. What is the meaning of the term crosstalk? interference of signals between wire pairs loss of signal strength as distance increases

damage of the signal when two bare wires touch strengthening of a signal by a networking device A user in a small office is unable to connect to the Internet. The user examines the physical connections to the ISR, a Linksys WRT300N, and notices a solid green LED on the port that is wired to the computer. What does the LED indicate about the current state of the port? The ISR is making adjustments to the port. The device is plugged in and traffic is flowing. The computer is plugged in but no traffic is flowing. The ISR does not detect that the computer is plugged in.
Bottom of Form

Sign up to vote on this title
UsefulNot useful