This action might not be possible to undo. Are you sure you want to continue?
The user’s workstatio does not have the destination IP address in order to encapsulate the request. Which network topology will provide the services that are required to associate the name of t web server with an IP address?
What measurement is commonly used to describe communication speed when transferring data? bps cps Hz MB 3.) local server address subnet mask default gateway address physical address of the recipient physical address of the sender 5 . What type of message is sent to a specific group of hosts? static unicast dynamic multicast broadcast 4.2. Which two automatic addressing assignments are supported by DHCP? (Choose two.
.Refer to the exhibit. What are two characteristics of a MAC address? (Choose two. 7. It is dynamically assigned by a DHCP server. B. Which option correctly represents the encapsulation of a packet that is sent by Host1 to the web server? 6. The TCP header is removed. It is displayed in HEX characters.) It indicates the physical location of the host within the network. Bits are decoded and the destination MAC address is recognized. It is a physical address. It is cable-based. What is the purpose of TCP? to manage data links and physical network k transmissions to specify the format of requests and responses that are exchanged between the client and server to assign the logical address and encapsulate the request into packets for routing to the destination to provide flow control and acknowledgment of packets that are exchanged between the client and server TCP/IP data transmission between the source and destination host is deencapsulated in four steps: A.
C. What is the function of CSMA/CA on a wireless Ethernet network? to prevent collisions to broadcast messages to select the least congested channel to establish an ACK between devices 12. ARP is used by hosts to resolve an IP address to a MAC address for the destination host 9. It is an organization that enables individuals and businesses to connect to the Internet. What is an ISP? It is a standards body that develops cabling and wiring standards for networking. B. The IP header is removed and the contents are passed to the next layer. A. D B. B. D 8. C. C. C. D. What is an advantage of purchasing a custom-built computer? It is beneficial for less knowledgeable consumers. 13. ARP is used by the routers on the network to build their routing tables. The waiting period for assembly is negligible. D. It is a networking device that combines the functionality of several different networking devices in one. C. What ISP connection type . What is the correct sequence of these steps? A. Which statement correctly describes the function of ARP? ARP is used by the switches on the network to build their MAC tables. B. The cost is lower compared to a computer that has been preassembled. ARP is used by hosts to resolve a host name to an IP address for the destination host. A home user is looking for an ISP connection that provides high speed digital transmission over regular phone lines. The Ethernet header and trailer are removed. The user can specify high-performance components to meet specific needs. A C. D. 10. D A. It is a protocol that establishes how computers within a local network communicate. A B.
Assume that the command output is from a wireless DHCP client that is connected to a Linksys integrated router. What can be deduced from the output? . a technician successfully tests the connectivity of all PCs that are connected to the switch and WLAN.) barcode reader digital camera external DVD headphones printer 16. A firewall is then configured on the device prior to connecting it to the Internet. configuring the SSID and setting authentication properties for a small office network. After attaching four PCs to the switch ports. What type of network device includes all of the described features? switch point ISR router firewall appliance standalone wireless access 15. Which network design layer provides hosts with initial connectivity to the network? Access core distribution network 17 Refer to the exhibit.should be used? DSL dial-up satellite cell modem cable modem 14. What are two examples of peripheral output devices? (Choose two.
wireless connection is operational. If H4 sends a message to H1 and the destination MAC address is in the MAC table for both Switch1 and Switch2.The The The The DHCP configuration on the router needs to be verified. wireless NIC driver or the NIC itself needs to be reinstalled. Which portion of the packet does a router use to forward the packet to the destination? source IP address user data destination IP address control information destination MAC address 19 Refer to the exhibit. 18. WEP key or SSID needs to be verified. which host devices will receive the message? only H1 hosts H1 and H4 all hosts that are connected to Switch1 all hosts that are connected to Switch1 and Switch2 20 What advantage does a peer-to-peer network have over a client-server network? .
What is the purpose of pop-up blocker software? It detects and removes spyware.1 172.255.255 220.127.116.11? 255.1 192.0.It increases security. Which IP address type is intended for a specific host? broadcast multicast simulcast unicast 23. It detects and removes viruses.255. Which three addresses belong to the category of private IP addresses? (Choose three.255. When are leased lines typically used? when low bandwidth is required for home and small business connectivity when a dedicated digital data line is necessary as a less expensive option to cable and DSL modem service 22.0 255.255.0.0.0.0. They obtain the addresses from the Internet registry. They obtain the addresses from the RFC. .1 150.1 26.168. performance for administration.0 255. hosts.) 10.23.0 255. What is the default subnet mask for the IP address 128.31. How do ISPs obtain public IP addresses? They create the addresses themselves.0.0.255.16. It eliminates the It produces a higher need for centralized 21.19 172.0. They obtain the addresses from the home PCs.31.1 128. It increases scalability. 24.107.168.
33. Which service will translate private internal IP addresses into Internet routable public IP addresses? ARP DHCP DNS NAT 29.It prevents the display of advertisement windows. How does a DMZ enhance network security for an organization? blocks viruses and spyware restricts internal user access to prohibited Internet sites allows external customer access to designated internal resources removes suspicious attachments from incoming and outgoing e-mail 32. Which picture shows a USB port on a PC? . It removes unwanted e-mail. A network administrator is setting up an application filtering firewall. Company security policy states that FTP sessions that are coming from the Internet and use the standard FTP port must be blocked. It translates an internal address or group of addresses into a public address that is sent across the network. Which type of network attack occurs when an unauthorized person tries to persuade a user to share a network user ID and password? brute force engineering denial of service data manipulation social 30. Which TCP/UDP port must the administrator block on the firewall to be in compliance? 21 23 53 80 31. 27. Which statement is true about packet filtering? It recognizes and filters specific types of attacks. It is performed from a host network device. It permits access based on IP address. Which wireless protocol is used for encryption? EAP Open PSK WEP 28.
) . Which adapter card would be required for a PC to exchange information with other PCs on a LAN? NIC video card sound card internal modem 35.34. What type of computer would most likely use a docking station? laptop server desktop mainframe workstation 36. What two commands can be used to form a new binding if client information does not agree with the DHCP client table? (Choose two.
What is a weakness of WEP that is solved by WPA? WEP is a proprietary standard whereas WPA is an open standard. When would infrared be used to connect network devices? when connecting multiple host devices to a wireless access point when synchronizing a PC with a PDA that is in line of sight when connecting a PC to a network switch that is located in another room when updating two access points that are located in separate buildings 38 Refer to the exhibit. .ipconfig /release ipconfig /all ipconfig /flushdns ipconfig /renew Ipconfig 37. A straight-through cable should be used to connect the PC to the switch. What is a possible reason that the PC is unable to ping the default gateway IP address? The PC is on a different network than the default gateway. 39. a bad cable could be the problem. -Because the correct cable types are used for each segment. A straight-through cable should be used to connect the switches. WEP keys are only 64 bits long whereas WPA keys are 128 bits long.
11b 802. A college network administrator is planning a wireless LAN to provide service in the student lounge and outdoor patio. It connects the pins that are used for transmitting on one router to the pins that are used for receiving on the other router. What is an advantage of selecting an operating system that has a GPL license over one with a commercial license? The GPL license-based operating system ensures that everyone can participate in the enhancement of the product. How does a crossover cable connect two routers? It connects the pins that are used for receiving on one router to the pins that are used for receiving on the other router. 42.11a 802.11 802. public address. The requirements include a range of at least 80 meters and a speed of 30 Mb/s. WEP uses a fixed length key for every connection whereas WPA uses a different key length for each connection. It translates an internal address or group of addresses into an outside. It disconnects the transmit pins and uses only the receive pins. 40. Which wireless LAN standard meets these requirements? 802. What is the purpose of assigning a Network Name of Academy? It identifies the wireless LAN. 41 Refer to the graphic. It encrypts data between the wireless client and the access point.11g 43. .WEP uses the same key for every connection whereas WPA uses a different key for each connection. It translates IP addresses into easy-to-remember domain names. It uses the same pins for transmitting and receiving. It allows access to the AP configuration GUI by name rather than address.
0. The GPL license-based operating system provides structured support.255. 44. 45. What two pieces of information should a help desk technician document while troubleshooting connectivity issues with an end user? (Choose two.) the CPU clock speed of the computer the number of network jacks that are in the room if the user can ping the default gateway address if the word processing software is installed correctly whether the PC uses dynamic or static IP addressing 48.0.1 224.255.0.The GPL license-based operating system implements a structured development life cycle. It can be used for communications beyond 100 meters.) damaged cables and connectors incorrect addressing incorrect subnet mask overheated components incorrect default gateway 47.1 255. What destination IP address does a DHCP client use to send the initial DHCP Discover packet when looking for a DHCP server? 127.0. Which troubleshooting technique can be used to quickly restore user functionality without having to spend much time identifying the exact problem? top-down bottom-up substitution -trial and error . It is unable to penetrate walls with a useable signal. The GPL license-based operating system prevents modification of the source code. Which two causes of networking problems are related to the physical layer? (Choose two. It operates in the 5GHz radio frequency band. What is a characteristic of Bluetooth wireless technology? It allows one-to-many connections.255 the IP address of the default gateway 46.
All cabling and interface indicator lights appear to be in order.49 Refer to the exhibit. What can . a user issues the ping command to a device that is not on the local network. In an attempt to verify connectivity. The wired and wireless hosts can connect to each other but not to the Internet. What is the most effective next step in a bottom-up troubleshooting process? Verify DNS configurations Verify the default gateway configurations Verify that the wireless settings are correct Verify that wired and wireless components are on the same network. The ping is unsuccessful. 50.
. The router between the host and destination is faulty Further troubleshooting will be required to reach a definite conclusion. The patch cable on the host station is faulty.be determined from this result? The default gateway is misconfigured.
This action might not be possible to undo. Are you sure you want to continue?
We've moved you to where you read on your other device.
Get the full title to continue listening from where you left off, or restart the preview.