1 Which of the following OSI layers offers reliable, connection-oriented data communication services?

application presentation session *transport network -------------------------------------------------------------------2 Router interface Ethernet 0 has been assigned the IP address 10.172.192.168 255.255.255.240. What is the network IP address of this interface? 10.0.0.0 10.172.0.0 10.172.192.0 *10.172.192.160 10.172.192.168 10.172.192.175 -------------------------------------------------------------------3 Examine the graphic with current configurations. The New York Offices of ABC Company recently upgraded the computers in the administrative office. Shortly after the upgrade, Host A in the clerical office failed and was replaced with one of the retired administrative office computers. However, the computer can not access the company network in the new location. What is the likely cause of this network access issue for Host A? MAC address incorrectly entered *default gateway incorrectly entered subnet mask incorrectly entered IP address incorrectly entered

4 Which of the following increases the potential for a collision to occur? the use of an active hub instead of an intelligent hub the use of an intelligent hub instead of an active hub a reduction in the number of devices attached to the hub *an increase in the number of devices attached to the hub *

-------------------------------------------------------------------5 What is attenuation? opposition to the flow of current measurement of electrical signals relative to time *degradation of a signal as it travels along the medium amount or volume of traffic that is flowing on the medium -------------------------------------------------------------------6 Two peer hosts are running applications that exchange data using UDP. During the current session, a datagram fails to arrive at the destination. What is true concerning the retransmission of the datagram? *Datagram retransmission occurs when the retransmission timer expires in the source host. Datagram retransmission occurs when the retransmission timer expires in the destination host. Datagram retransmission is controlled by the application layer protocol. Datagram retransmission involves only the data with sequence numbers equal to or higher than the sequence number of the current datagram. -------------------------------------------------------------------7 What is significant about the ping 127.0.0.1 command? *It verifies the operation of the TCP/IP protocol stack on a host and is called an internal loopback test. It verifies connection to the remote host with the IP address 127.0.0.1. It verifies whether the router that connects the local network to other networks can be reached. It verifies the route packets take between the local host and the host with the IP address 127.0.0.1. 8 Which LAN switching mode has the highest latency? fast forward fragment-free latency forwarding *store-and-forward -------------------------------------------------------------------9 Which of the following application layer protocols use UDP segments? (Choose two.) *DNS FTP

Telnet *TFTP SMTP -------------------------------------------------------------------10 Which cable specifications are indicated by 100BASE-T? 100-Mbps transmission speed, baseband signal, coaxial cable 100-Mbps transmission speed, broadband signal, twisted-pair cable *100-Mbps transmission speed, baseband signal, twisted-pair cable Equal to 10-Gbps transmission speed, baseband signal, twisted-pair cable -------------------------------------------------------------------11 When is a crossover cable used in a network? when connecting a host to the router console port when connecting a host to a switch *when connecting a host to a host when connecting a switch to a router 12 Refer to the graphic. What must be configured on Host A to allow it communicate with the e-mail server? (Choose three.) IP address * subnet mask * default gateway * router name switch name NetBIOS name address -------------------------------------------------------------------13 Which cable diagram displays the end to end pinout for a crossover cable used with Cisco devices? Cable A Cable B *Cable C Cable D -------------------------------------------------------------------14

Which type of address is 192.168.17.134/29? *host address network address broadcast address multicast address 15 How many collision domains are shown in the diagram? three four five *six seven eight -------------------------------------------------------------------16 When is a straight-through cable used in a network? when connecting a router through the console port when connecting one switch to another switch *when connecting a host to a switch when connecting a router to another router -------------------------------------------------------------------17 How does network cable length affect attenuation? Category 5 cable that is run in metal conduit has the highest attenuation in the shortest distance. Shorter cable lengths have greater signal attenuation. *Longer cable lengths have greater signal attenuation. The length of the cable has no effect on signal attenuation. 18 Which of the following statements are correct about CSMA/CD? (Choose three.) It is a media access method used in LANs. * It is a media access method used in FDDI WANs. When a device needs to transmit, it checks to see if the media is available. * A device sends data without checking media availability because all devices have

equal access. Multiple devices can successfully transmit simultaneously. *Only one device can successfully transmit at a time. -------------------------------------------------------------------19 Which of the following must be present for current to flow? (Choose three.) *closed loop bit-generating device insulating material *source of voltage *load switch -------------------------------------------------------------------20 If Host A pings Host B through a newly installed switch with no entries in the MAC address table, which stations will receive the ping packet? B only A and B B and switch A, B, and switch B, C, D, and switch * A, B, C, D, and switch 21 Which devices shown in the graphic must have a MAC address? only PC only router PC and router PC, hub, and router *PC, printer, and router -------------------------------------------------------------------22 What kind of connection is represented in the graphic? *console connection Ethernet connection ISDN connection

leased line connection -------------------------------------------------------------------23 Which of the following is the decimal representation of the binary number 11010011? 203 204 *211 212 -------------------------------------------------------------------24 Which type of cable is required to make a connection between a router console port and a PC COM port? straight-through cable crossover cable *rollover cable DB-9 cable coaxial cable 25 Determine the number of useable networks and hosts for the IP address 192.168.50.0/27 4 networks / 62 hosts 6 networks / 64 hosts 32 networks / 8 hosts *6 networks / 30 hosts 8 networks / 32 hosts 2 networks / 8 hosts -------------------------------------------------------------------26 A network administrator is placing an older router back in to service. The administrator discovered that the IOS and configuration files need to be updated to meet the LAN specifications. Which application layer protocol is used to transfer the new configuration files into the router memory? *SNMP SMTP HTTP TFTP --------------------------------------------------------------------

27 Which of the following best describes Spanning Tree Protocol? It enables a network to span across multiple physical segments. *It enables a switch to eliminate switching loops. It enables a switch to dynamically choose the best switch mode. It enables a switch to perform as a router. -------------------------------------------------------------------28 Which of the following subnet masks could be used when subnetting a Class B IP address? (Choose two.) 255.0.0.0 *255.255.0.0 255.192.255.0 255.224.0.0 *255.255.252.0 255.255.255.128 -------------------------------------------------------------------29 How is data encapsulated as it is moved down the OSI model? data, segments, frames, packets, bits data, packets, segments, frames, bits *data, segments, packets, frames, bits data, packets, frames, segments, bits -------------------------------------------------------------------30 Which of the following describes latency? the noise generated from outside a cable the degradation of a signal as it travels along the media the time required for a NIC to place a frame on the network media *the delay between the time a frame leaves its source device and reaches its destination -------------------------------------------------------------------31 Which of the following is the binary representation of the decimal number 111? *01101111 01111101 11110111

11101101 -------------------------------------------------------------------32 Which LAN switching mode begins switching after reading only the first 64 bytes of the frame? fast forward *fragment-free latency forwarding store-and-forward 33 When using Category 5 UTP cable, which RJ-45 pin pairs are used to exchange data between hosts on an Ethernet network? 1 and 2; 4 and 5 1 and 2; 3 and 6 * 3 and 6; 7 and 8 4 and 5; 7 and 8 -------------------------------------------------------------------34 Which of the following commands could be used on a Windows-based computer to view the current IP configuration of the system? (Choose two.) configip ifconfig *ipconfig *winipcfg winipconfig -------------------------------------------------------------------35 Which type of address is 192.168.17.111/28? host address network address *broadcast address multicast address 36 Which of the following networking devices increase the number of collision domains? (Choose three.) *switch hub

*router repeater *bridge -------------------------------------------------------------------37 What information can be determined from the MAC addresses of PC1, PC2, and PC3, as shown in the graphic? (Choose two.) PC1 and PC2 NICs need to be replaced because they have the same OUI identifier. PC2 and PC3 NICs need to be replaced because they have different OUI identifiers. *PC1 and PC2 NICs are from the same vendor. PC1 and PC3 NICs need to be replaced because they have the same vendor-assigned address. *PC2 and PC3 NICs are from different vendors. PC2 and PC3 NICs are from the same vendor. -------------------------------------------------------------------38 Which of the following are considered WAN technologies? (Choose two.) *DSL Ethernet Wireless Ethernet *T1-Carrier Token Ring 39 which one of the router connectors shown in the graphic would be used for a LAN connection? Connector A Connector B *Connector C Connector D -------------------------------------------------------------------40 How is full-duplex capability typically achieved in fiber-optic cable? *Two fibers are encased in separate sheaths. Light is bounced at different rates in opposite directions. Transmit speeds are so high that half-duplex is acceptable. Colors of the light spectrum are separated into transmit and receive streams. -------------------------------------------------------------------41 Which of the following are characteristics of IP? (Choose three.)

connection-oriented protocol connectionless protocol* reliable protocol unreliable protocol * routed protocol * routing protocol -------------------------------------------------------------------42 Which of the following describe the token-passing logical topology? (Choose two.) *FDDI is an example of a token-passing network. Token-passing logical topologies must also be physical ring topologies. One of the disadvantages of the token-passing logical topology is the high collision rate. Computers transmit data after "listening" to the wire to detect other traffic. *Computers are allowed to transmit data only when they possess a token. 43 What is the maximum length of a media segment used for 100BASE-TX? *100 meters 185 meters 400 meters 500 meters -------------------------------------------------------------------44 which of the following networking devices divide a network into separate collision domains? (Choose two.) repeater *bridge *switch AUI hub -------------------------------------------------------------------45 Which of the following are characteristics of UTP cable? (Choose three.) *Each wire is covered by insulating material.

It is not affected by EMI or RFI. *It is a four-pair wire medium.* It is difficult to terminate the cable. *It relies on the cancellation effect produced by the twisted wire pairs. It is more expensive than any other type of LAN cabling. 46 Examine the graphic with current configurations. Host A in the Clerical offices failed and was replaced. Although a ping to 127.0.0.1 was successful, the replacement computer can not access the company network. What is the likely cause of the problem? IP address incorrectly entered network cables unplugged *subnet mask incorrectly entered network card failure -------------------------------------------------------------------47 Which of the following describes a physical full-mesh topology? It requires termination at both ends of the cable. It uses a hub or a switch as a central point to connect all wires. *It provides maximum connectivity between all network systems. It links all computers to a main computer that controls all traffic on the network. -------------------------------------------------------------------48 Which two statements describe the TFTP protocol? (Choose two.) uses authenticated file transfer procedure provides connection-oriented service *provides connectionless service provides more features that FTP *lacks most of the features of FTP -------------------------------------------------------------------49 Which of the following are transport layer protocols of the TCP/IP model? (Choose two.) FTP *UDP SMTP TFTP *TCP

50 Which type of UTP network cable connects two Cisco switches? straight-through *crossover rollover patch -------------------------------------------------------------------51 How will the MAIN router dynamically learn a route to the 10.16.10.48/28 subnetwork in the diagram? with a routed protocol with a routing protocol *with a static route with a directly connected route -------------------------------------------------------------------52 Which of the following describes the RIP version 1 routing protocol? Cisco proprietary hybrid protocol *distance vector protocol that uses hop count as the only metric * link state protocol supporting multiple routed protocols distance vector protocol that uses delay, bandwidth, load, and reliability metrics -------------------------------------------------------------------53 How many broadcast domains are shown in the diagram? *three four five six seven eight 54 Which of the following are advantages of UTP cable? (Choose three.) *less expensive than fiber optic

*flexible and easy to run in a building distance between signal boosts is longer than it is for coaxial *transmits data at a faster rate than any copper-based media receives less RMF and EMI interference than other types -------------------------------------------------------------------Which of the following devices extend a collision domain? (choose 2) *-hub *-repeater

///////////////////////////////////////////////////////////////////////// We are not sure what module this is, only that its Cisco CCNA Final Study Guide 1. Which of the following describes the use of Spanning Tree Protocol (STP)? A. resolve routing loops B. eliminate Split Horizon errors C. limit collisions D. resolve switching loops 2. of A. B. C. D. E. 3. A. B. C. D. E. F. CompA" is trying to locate a new computer named "CompB" on the network. Which the following does "CompA" broadcast to find the MAC address of "CompB"? MAC request ARP request ping Telnet proxy ARP Broadcast radiation can cause which of the following? (Choose three.) higher segment attenuation reduced host performance reduced switching speeds increased network collisions increased protocol storms increased ARP requests

4. Which of the following protocols use a three-layer hierarchical networkaddressing scheme? A. IPX B. IP C. NetBeui D. UDP 5. Which of the following are useable Class A IP addresses with a default subnet mask? (Choose three.) A. 127.0.39.1 B. 111.9.28.30 C. 123.1.2.132 D. 128.50.38.2 E. 105.1.34.1 F. 0.23.92.3

6. What are the total number of bits available for assignment to the subnet field when subnetting Class A, Class B, and Class C networks? (Choose three.) A. 24 B. 22 C. 16 D. 14 E. 8 F. 6 7. Which of the following protocols are used for e-mail transfer between clients and servers? (Choose three.) A. TFTP B. SNMP C. POP3 D. SMTP E. IMAP4 F. postoffice 8. Which of the following is important when considering IP addressing in relation to BOOTP? A. BOOTP dynamically creates a database of all available IP addresses within a network. B. BOOTP allows multiple workstation profiles sharing the same IP address. C. BOOTP is not designed to provide dynamic address assignment. D. BOOTP must statically assign IP addresses through RARP. 9. Which of the following does 1000BASE-T use to accomplish gigabit speeds on Cat 5e cable? A. the use of four conductors in full-duplex mode B. the use of two multiplexed pairs of wires, simultaneously C. the use of three pairs of wires for data and the fourth for stabilization and forward error correction D. the use of all four pairs of wires in full-duplex mode, simultaneously 10. Which of the following are features of the Internet Protocol (IP)? (Choose two.) A. It is the most widely implemented global addressing scheme. B. It allows two hosts to share a single address on a local area network. C. It is a hierarchical addressing scheme allowing addresses to be grouped. D. It is only locally significant, used primarily on local area networks. 11. Which of the following are small, discrete components found within a personal computer? (Choose three.) A. transistor B. microprocessor C. power supply D. capacitor E. light emitting diode F. hard disk 12. Which of the following features are important considerations when designing a 10BASE-T network? (Choose three.) A. operates in either full-duplex or half-duplex modes B. cable is heavy, stiff, and difficult to install C. supports a longer segment length than 10BASE5 D. usually configured in a star or extended star topology

E. cabling represents a single point of failure F. utilizes a shared bus device 13. Which of the following is a term associated with replacing hubs with switches to increase the number of collision domains? A. encapsulation B. latency C. segmentation D. layered model E. broadcast domain F. extended 14. Select the necessary information that is required to compute the estimated time it would take to transfer data from one location to another. (Choose two.) A. file size B. data format C. network in use D. type of medium E. bandwidth of the link 15. What type of network cable is used to interconnect the ISDN BRI port to a service-provider device? A. cross-over B. straight-through C. roll-over D. patch cable 16. When an administrator establishes a terminal connection to a server named corporate.mydomain.com, which protocols are used to remotely issue commands to that server? (Choose two.) A. SMTP B. SNMP C. DNS D. Telnet E. FTP F. NMS 17. Convert the binary number 10111010 into its hexadecimal equivalent. Select the correct answer from the list below. A. 85 B. 90 C. BA D. A1 E. B3 F. 1C 18. Which of the following describe characteristics of the Telnet protocol? (Choose three.) A. The client host requires processing power equal to that of the server to which it is connected. B. The processing and storage takes place on the remote server. C. Telnet is a true client server application. D. Telnet is a presentation layer applet. E. The Telnet server runs special software called a daemon. F. Telnet requires the support of DNS and FTP to function properly. 19. Which of the following are valid frame types for an 802.3 WLAN? (Choose three.)

A. B. C. D. E. F.

control directional data byte management signal

20. A small company has a class C network license and needs to create five usable subnets, each subnet capable of accommodating at least 20 hosts. Which of the following is the appropriate subnet mask? A. 255.255.255.0 B. 255.255.255.192 C. 255.255.255.224 D. 255.255.255.240 21. Which of the following correctly describe AC and DC currents? (Choose three.) A. DC always flows in the same direction, and DC voltages always have the same polarity. B. In DC systems, the flow of electrons is always from a negatively charged source to a positively charged source. C. In AC systems, electrons flow from negative to positive and then from positive to negative. D. Power lines carry electricity in the form of DC because it can be delivered efficiently over large distances. E. AC voltage reverses its polarity, so that the positive terminal becomes negative, and the negative terminal becomes positive. F. For AC and DC electrical systems, the flow of electrons is always from a positively charged source to a negatively charged source. 22. Using the data transfer calculation T=S/BW, how long would it take a 4MB file to be sent over a 1.5Mbps connection? A. 52.2 seconds B. 21.3 seconds C. 6.4 seconds D. 2 seconds E. 0.075 seconds F. 0.0375 seconds 23. Which term describes an ARP response by a router on behalf of a requesting host? A. ARP B. RARP C. Proxy ARP D. Proxy RARP 24. The highest capacity Ethernet technologies should be implemented in which areas of a network? (Choose three.) A. between workstation and backbone switch B. between individual workstations C. between backbone switches D. between enterprise server and switch E. on aggregate access links 25. A company with a Class B license needs to have a minimum of 1,000 subnets with each subnet capable of accommodating 50 hosts. Which mask below is the appropriate one? A. 255.255.0.0 B. 255.255.240.0

C. 255.255.255.0 D. 255.255.255.192 E. 255.255.255.224 26. Which of the following are considered the best electrical conductors for use in data network communications? (Choose three.) A. glass fibers B. copper C. gold D. plastic E. silicon F. silver 27. When a network admin applies the subnetmask 255.255.255.248 to a Class A address, for a given subnet, how many IP addresses are available to be assigned to devices? A. 1022 B. 510 C. 254 D. 126 E. 30 F. 6 28. Depending on how easily free electrons flow through them, materials are classified into which three groups? (Choose three.) A. semiconductors B. solids C. insulators D. conductors E. liquids F. gases 29. Why are internets necessary? (Choose three.) A. to overcome LAN scalability limitations B. to overcome LAN speed limitations C. to overcome LAN distance limitations D. to prevent collision and congestion conditions E. to network networks 30. Which devices separate collision domains? (Choose three.) A. hubs B. routers C. bridges D. switches E. repeaters F. transceivers 31. What is unique about the Dynamic Host Configuration Protocol (DHCP)? (Choose two.) A. It uses profiles to identify individual workstation configurations while assigning IP addresses. B. DHCP packets also include a leased IP address. C. It uses a different message format than does BOOTP. D. It allows a host to obtain an IP address dynamically without a network administrator. E. It allows the administrator to design a preset list of addresses for the hosts to choose from automatically.

32. What device must be used between an AUI port of a networking device and the media to which it is being connected? A. a transducer B. a transmitter C. a transceiver D. a transponder E. a port replicator 33. What are facts about the operation of the Bootstrap Protocol (BOOTP)? (Choose two.) A. operates in a client-server environment B. requires only a single packet exchange to obtain an IP address C. is designed to work best in a peer-to-peer networking environment D. requires a multiple packet exchange to complete the IP address request 34. The 802.11b standard has a transmitting rate of 11 Mbps. What is the actual throughput? A. 2.0 to 3.5 Mbps B. 3.5 to 4.5 Mbps C. 5.0 to 5.5 Mbps D. 6.0 to 7.5 Mbps 35. Which of the following are defined by the terms "taking turns" and "first come, first served"? (Choose two.) A. dual-ring B. linear bus C. deterministic D. non-deterministic E. contention F. non-contention 36. A positive decibel measurement indicates which of the following about a networking signal? A. The signal has become distorted. B. The signal will have increased error rates. C. Power has been decreased. D. Power has been increased. E. Power is stable. F. Power is sufficient for data communications. 37. Using the IP address 38.159.163.37 with a subnet mask 255.255.255.240, determine the subnetwork address. A. 38.159.0.0 B. 38.159.163.0 C. 38.159.163.0 D. 38.159.163.16 E. 38.159.163.32 F. 38.159.163.36 38. What are the characteristics of a local collision? (Choose two.) A. The frame is less than minimum length. B. The frame is longer than the maximum length. C. The frame has an invalid FCS checksum. D. The frame has a valid FCS checksum. E. Over-voltage is detected on the coaxial network. F. Simultaneous RX/TX activity is detected.

39. Which of the following are common LAN Technologies? (Choose three.) A. Frame Relay B. Ethernet C. ISDN D. Token Ring E. Arcnet F. HDLC 40. What is established during a connection-oriented file transfer between computers? (Choose two.) A. a temporary connection to establish authentication of hosts B. a connection used for ASCII or binary mode data transfer C. a connection used to provide the tunnel through which file headers are transported D. a command connection which allows the transfer of multiple commands directly to the remote server system E. a control connection between the client and server 41. Which type of noise affects all transmission frequencies equally? A. baseband interference B. narrowband interference C. broadband interference D. black noise E. white noise F. gray noise 42. Which combinations of charges will be repelled by electric force? (Choose two.) A. neutral and neutral B. neutral and positive C. neutral and negative D. positive and positive E. positive and negative F. negative and negative 43. Which OSI layer defines the functions of a router? A. physical B. data link C. network D. transport E. session 44. Which of the following items are common to all 100BASE technologies? (Choose three.) A. frame format B. media C. connectors D. timing E. multi-part encoding 45. An ISDN Basic Rate Interface (BRI) is composed of how many signaling channels? A. 1 B. 2 C. 3 D. 4 46. Which of these workstation installation and setup tasks are concerned with

network access layer functions? (Choose two.) A. configuring the e-mail client B. installing NIC drivers C. configuring IP network settings D. connecting the network cable E. using FTP to download application software updates 47. For which of the following is Ethernet considered the standard? (Choose three.) A. inter-building connection B. mid-length voice C. video conferencing D. vertical wiring E. horizontal wiring F. diagonal wiring 48. How will data loss be handled after a late collision? (Choose two.) A. The stations involved in the collision automatically retransmit the frames after the collision and jam signals clear. B. The upper layer protocols will determine the frame was lost and request retransmission. C. The NIC will believe the frame went out fine, unaware of the data loss. D. The upper layer protocols will reconstruct the data from the damaged frame since most of the frame was transmitted before the collision and only the padding was damaged. E. Retransmitted data will have a segment identifier that is a higher priority than the original so the data receives special handling. 49. Which type of encoding does 100BASE-TX use? A. Manchester B. 4B/5B C. 4B/8B D. 4e/5e E. HDLC 50. John has been hired as the network administrator of a local company and has decided to add more hubs to the company's existing network. Which of the following has been caused by John's inexperience? A. collision domain extended B. an increased number of collision domains C. increased network performance D. increased bandwidth E. extended bandwidth 51. Which of the following describe interframe spacing? (Choose two.) A. the minimum interval, measured in bit-times, that any station must wait before sending another frame B. the maximum interval, measured in bit-times, that any station must wait before sending another frame C. the 96-bit payload padding inserted into a frame to achieve a legal frame size D. the 96-bit frame padding transmitted between frames to achieve proper synchronization E. the time allowed for slow stations to process a frame and prepare for the next frame F. the maximum interval within which a station must send another frame to avoid being considered unreachable 52. What is important to remember about the data link layer of the OSI model when

considering Peer to Peer communication? (Choose three.) A. It links data to the transport layer. B. It encapsulates frames into packets. C. It provides a service to the network layer. D. It encapsulates the network layer information into a frame. E. Its header contains a physical address which is required to complete the data link functions. F. It encodes the data link frame into a pattern of 1s and 0s (bits) for transmission on the medium. 53. Which of the following is the IEEE Standard for 10 Gigabit (GbE) Ethernet? A. 802.3gb B. 803.2gb C. 802.311gb D. 802.5ae E. 802.3ae F. 802.5gb 54. Which of the following are Cisco proprietary routing protocols? (Choose two.) A. RIPv2 B. IGRP C. OSPF D. BGP E. RIPv1 F. EIGRP 55. What are features of the TCP/IP Transport layer? (Choose two.) A. path determination B. handles representation, encoding and dialog control C. uses TCP and UDP protocols D. packet switching E. reliability, flow control and error correction 56. Select the option that describes the relationship between analog and digital transmissions. A. Analog transmissions occur over wire; digital transmissions do not. B. Analog transmission is bandwidth dependent; digital transmission is not. C. Digital transmission carries a variety of information; analog transmission is restricted. D. Digital signals use a wide range of frequencies; analog signals use a small range of frequencies. 57. Convert the Hexadecimal number A2 into its Base 10 equivalent. Select the correct answer from the list below. A. 156 B. 158 C. 160 D. 162 E. 164 F. 166 58. If a network administrator needed to download files from a remote server, which protocols could the administrator use to remotely access those files? (Choose two.) A. NFS B. ASCII C. TFTP

D. IMAP E. FTP F. UDP 59. During cable testing, which of the following are used to calculate the information carrying capacity of a data cable? (Choose two.) A. bit speed B. attenuation C. wire map D. saturation limit E. analog bandwidth 60. What are the three types of collisions? (Choose three.) A. premature B. late C. local D. early E. remote F. delayed //////////////////////////////////////////// When purchasing a NIC for a computer, which of the following factors need to be considered? (Choose three.) * protocols * system bus brand of PC web browser operating system * type of media use on the network Convert the hexadecimal number 19 into its base 10 equivalent. Select the correct answer from the list below. 19 91 52 * 25 36 63 The corporate user at 210.98.105.70 is having problems communicating with the remote PC at 192.5.5.25. The computers internal loopback has been tested successfully. Which of the following commands could be next in the troubleshooting process? (Choose three.) ping 129.0.0.1 ping 127.0.0.1 * ping 192.5.5.1 * ping 192.5.5.25 * ping 210.98.105.1 ping 210.98.106.70 In an 8 bit binary number, what is the total number of combinations of the eight bits? 128 254 255

* 256 512 1024 Which of the following interprets the data and displays the information in an understandable form for the user to see? * application protocol stack remote devices logical connection physical connection Which statements best describe the Internet physical layer connection? (Choose two.) connection using standard protocols internet standard is TCP/IP * could utilize modem or NIC interprets data and displays information * used to transfer data between PC and local network Which of the following are considered to be "always on" services? (Choose two.) * DSL ISDN 56kbps * cable modem Convert the decimal number 227 into its binary equivalent. Select the correct answer from the list below. 11100101 11100001 11100110 11001101 * 11100011 11100010 Which specialized equipment is used to make a physical connection to a network from a PC? (Choose two.) router * modem CD Rom ATM Switch * network interface card Which of the following describes a network interface card? large circuit board that contains sockets for expansion cards interface card capable of transferring more than one bit simultaneously and is used to connect external devices * expansion board inserted into a computer so that the computer can be connected to a network interface card that can be used for parallel communication in which only 1 bit is transmitted at a time Which of the following are functions of a web browser without the addition of plug-ins? (Choose three.) updates IRQ's * receives information * requests information * contacts web servers

displays flash animation displays Quicktime movies Convert the hexadecimal number CD into its base 10 equivalent. Select the correct answer from the list below. 197 199 201 203 * 205 207 Convert the hexadecimal number 52 into its base 10 equivalent. Select the correct answer from the list below. 25 52 28 * 82 A2 2A Which of the following are valid hexadecimal numbers? (Choose three.) * DEF3 1G45 * 1F35 DH3F * 453 X35F Connections to the Internet may use multiple protocols. Select the description that best defines a protocol. a group of numbers definitions of specific standards explanations of procedures wiring specification * a set of rules and conventions Which of the following will test the internal loopback of a node? ping 10.10.10.1 ping 192.168.1.1 * ping 127.0.0.1 ping 223.223.223.223 ping 255.255.255.255 Why were TCP/IP protocols developed? To insure that error correction of each packet takes place. * To allow cooperating computers to share resources across a network. To allocate resources that are needed for operating a computer on a LAN. To determine the "best path" decision making when forwarding packets of data. Which of the following are popular web browsers? (Choose two.) Acrobat * Internet Explorer Macromedia Flash * Netscape Navigator Quicktime World Wide Web

What is the numeric base of hexadecimal numbers? Base 2 Base 8 Base 10 * Base 16 Base 32 Convert the decimal number 231 into its binary equivalent. Select the correct answer from the list below. 11110010 11011011 11110110 * 11100111 11100101 11101110 Which of the following are high speed digital connections available to the local consumer? (Choose two.) 56kbps modem * DSL T1 * cable modem ISDN #ass2 LANs were developed to solve which business needs? (Choose three.) * reduce duplication of equipment promote the use of sneakernets increase productivity while saving money * reduce the number of duplicate copies of files connect users in different geographic locations * increase complexity of the work environment Which of the following were disadvantages of electronic bulletin boards? (Choose 3.) Simultaneous user connections to multiple computers were very fast. * Availablity was limited to those who knew the location. They did not scale well to keep up with growing demand. * Users could not simultaneously share files. * Modem and telephone line requirements were demanding. Which of the following types of networks pass a token sequentially to each host? (Choose two.) Ethernet * Token Ring * FDDI Frame Relay ISDN Which of the following are LAN design goals? (Choose three) provide full-time connectivity to remote services consolidate network devices and protocols to a single vendor * provide access to high-bandwidth media * operate within a limited geographic area * allow users to share files and printers provide access to geographically separated networks

Which of the following are considered WAN technologies? (Choose three) * DSL Ethernet FDDI * Frame Relay * Modem Token Ring Which of the following are ways that bandwidth is commonly measured? (Choose three.) GHzps * kbps * Mbps Nbps MHzps * Gbps Which of the following are typical features that determine throughput? (Choose two.) types of passwords used on servers type of Layer 3 protocol used * network topology length of the network cable * number of users on the network Which of the following would be used by a network administrator to calculate an estimate of network performance? (Choose two.) * size of file protocol overhead * line bandwidth encapsulation rate bit error rate What reasons prompted the development of a standardized set of rules to define the networking technologies? (Choose two.) * Networks used different specifications and implementations to exchange information. Networking technologies strictly following proprietary rules could communicate with technologies that followed different proprietary rules Proprietary networking technology seldom presented problems in communication among different external networks. * Companies developed private or proprietary networking technologies The Federal Government wanted a "level playing field" for all of the networking industry. What are the advantages of dividing the network into the seven layers of the OSI model? (Choose three.) describes the entire network to facilitate learning about its parts * breaks down network communtication into manageable parts * allows for different types of hardware to communicate with each other * prevents changes in one layer from affecting other layers allows for an uneven grouping of information to increase network speed prevents the IOS from affecting the OSI Which protocols are commonly part of the application layer of the TCP/IP model? (Choose three.) * FTP * DNS

UDP TCP * HTTP Which of the following are data link layer encapsulation details? (Choose two.) Packets are put into frames. * Data is packaged into a packet. Data is segmented into segments. Data is converted for Internet travel. * An address is added to identify the directly connected device. Which device is used to connect LANs that are geographically separated? hub bridge * router repeater Which of the following terms refers to end-user devices that provide users with a connection to the network? * hub router host server Which of the following physical topologies is used in situations where breaks in communications are unacceptable? ring star * mesh bus Which of the following networks is a dedicated, high-performance network used to move data between servers and storage resources? LAN MAN * SAN WAN Which type of VPN uses analog, dialup, ISDN, DSL, mobile IP, or cable technologies to securely connect mobile users and telecommuters to branch office networks? * Access VPN Intranet VPN Extranet VPN Shared VPN A contracting company is planning to allow its subcontractors and suppliers access to its network resources. It desires the security of knowing that the general public and competitors will not be able to access the information. Which of the following technologies should the company implement? Access VPN Dial-up VPN * Extranet VPN Intranet VPN Secure VPN Wide-Area VPN Which of the following is a transport layer protocol of the TCP/IP model? FTP

* UDP IP TFTP In a description of bandwidth that uses the analogy of a network of pipes bringing water to and from a house, which of the following represents bandwidth? * width of a pipe length of a pipe valves connecting to the pipe the water running through a pipe. Which of the following is the approximate amount of time it would take to transmit a 23.1 megabyte file on a T1 link? fifteen seconds fifteen million seconds * one hundred twenty seconds one hundred twenty thousand seconds Which of the following is the Layer 4 PDU? bit frame packet * segment Which of the following are layers of the TCP/IP model? (Choose three.) * application physical * internet * network presentation What is important to remember about the data link layer of the OSI model when considering Peer to Peer communication? (Choose three.) * It links data to the transport layer. It encapsulates frames into packets. It provides a service to the network layer. * It encapsulates the network layer information into a frame. Its header contains a physical address which is required to complete the data link functions. * It encodes the data link frame into a pattern of 1s and 0s (bits) for transmission on the medium. #ass3 Which devices could cause problems with a wireless transmission? (Choose two.) Radio TV * microwave * wireless phone DVD remote control What is the minimum number of devices that can exist in a wireless network? 1 * 2 3 4 Which of the following are attributes of singlemode fiber optic cable? (Choose two.)

* one path of light larger fiber optic core uses LEDs as a light source distances up to 5000 meters * higher bandwidth than multimode Which of the following are benefits of coaxial cable within a LAN environment? (Choose two.) easier to install than UTP * less expensive than fiber * requires fewer repeaters than UTP easily accommodates additions to network faster transport speeds than fiber Which of the following must be present for current to flow? (Choose three.) * closed loop resistance insulating material * source of voltage * conducting material bit generating device Which term refers to the amount of signal power loss that can be tolerated on a fiber optic link? linear laser light loss * optical link loss budget acceptable decibel power reduction maximum allowable light attenuation Which of the following characteristics describe STP cable? (Choose three.) * costs more than UTP easier to install than UTP uses the shield to carry data signals twisted pairs are not required because of the shield * must be grounded at both ends for high frequency signals * reduces both internal and external sources of interference Which effects comprise impedance? (Choose three.) * capacitance voltage current * resistance * inductance power Which factors can lead to a loss of signal strength in fiber optic cable? (Select three.) * absorption RFI crosstalk * scattering * dispersion EMI Select the characteristics specified by 10BaseT. (Choose three.) * twisted pair cable T style connectors * baseband transmission

10 gigabits per second data rate * 10 megabits per second data rate decimal encoded data transmission What is the core size of a single mode fiber-optic cable? * 8-10 microns 15 microns 50-60 microns 125 microns Which of the following are characteristics of fiber optic light receivers? (Choose two.) react to multiple wavelengths * react to a specific wavelength tuned to one wavelength for noise reduction * use PIN photodiodes to convert light pulses to electrical signals Which of the following wireless standards increased transmission capabilities to 11 Mbps? 802.11a * 802.11b 802.11c 802.11d Which of the following are typical specifications for data transmission cables? (Choose three.) * achievable bit transmission speeds supported data encoding schemes minimum distance between hosts * maximum distance before fatal attenuation * intended transmission type intended bit level protocols type Which tasks must be performed when installing fiber optic cable? (Choose three.) * install connectors inspect laser signal using a microscope * cleave and polish cable ends wash cable ends with mild soap and water * protect connector ends from dirt and damage pull cables tight to reduce the number of bends and twists Which combinations of charges will be repelled by electric force? (Choose two.) neutral and neutral neutral and positive neutral and negative * positive and positive positive and negative * negative and negative Which of the following radio carrier signal modulation types will modulate the height (amplitude) of the carrier signal? * AM FM PM RF How is full-duplex capability achieved in fiber optic cable? * Two fibers are encased in separate sheaths.

Light is bounced at different rates in opposite directions. Transmit speeds are so high that half-duplex is acceptable. Colors of the light spectrum are separated into transmit and receive streams. Your company has a new wireless network setup in their building. The boss has heard the throughput for a wireless network would be 11 Mbps. You mention that because of the way WLANs transmit and acknowledge data the actual percentage of throughput would be which of the following? 25% 40% * 50% 70% Which of the following describe the ray model of light? (Choose three.) * Light bends at the boundary of two transparent materials. The speed of light is greatest when passing through optical glass. The speed of light is constant no matter what material passes through. * The optical density of the material determines how much the light will bend. * The index of refraction is the ratio of the speed of light in a material compared to a vacuum. Which of the following identifies a node that has been authenticated but not yet associated with the access point? unauthenticated and unassociated unauthenticated and associated * authenticated and unassociated authenticated and associated Which two are necessary to achieve total internal reflection within a fiber-optic cable? (Choose two.) The entire incident light ray must be refracted into the cladding. The index of refraction of the core must be less than that of the cladding. * The index of refraction of the core must be greater than that of the cladding. The optical density of the reflecting material must be higher than the refracting index. * The angle of incidence of the light ray must be greater than the critical angle for the core and cladding. #ass4 Which of the following describes frequency? length of each wave height of each wave * number of cycles each second amount of time between each wave Which of the following describe sine waves? (Choose three.) They do not continuously vary with time. * They repeat the same pattern at regular intervals. * They occur naturally and change regularly over time. They are artificially created and do not occur naturally. * No two adjacent points on a graph have the same value. They have continuously varying patterns that do not repeat. Which of the following are true about square waves? (Choose three.) *They repeat the same pattern at regular intervals. They continuously vary with time. *They repeat the flat pattern on both the top and bottom of the wave. *They do not continuously vary with time.

They occur naturally and change regularly over time. They change intervals based upon voltage. Which of the following is another name for the binary number system? *Base 2 Base 5 Base 10 Base 16 Which of the following is another name for the decimal number system? Base 2 Base 5 *Base 10 Base 16 Which of the following units of measure are commonly used in formulas for calculating the amount of gain or loss in networking signals? (Choose three.) *watts ohms *volts *decibels joules amperes For which type of waves would the signal gain or loss be calculated using the power formula? (Choose two.) electromagnetic waves on copper cables electrical waves on copper cables *light waves on optical fiber *radio waves in the air sound waves in the air What type of analysis is performed by using an oscilloscope? power-domain frequency-domain *time-domain wave-domain spectrum-domain signal-domain Which of the following are possible sources of line noise? (Choose three.) *radio transmitters *electrical motors *crosstalk laser light incandescent light For what purpose are two y-axis inputs used when displaying voltage patterns on an oscilloscope? to insure a clean signal is obtained to determine if one is primary and one is backup to display multiple time frames to analyze a complex spectrum * to observe and measure two waves simultaneously How does noise impact a data signal in a communication system? It replaces the data signal. It blocks the data signal.

*It is added to the data signal. It creates a harmonic signal. Identify common ways in which the capacities of communication systems are measured? (Choose two.) analog bandwidth resistance capacity carrier bandwidth polarity capacity *digital bandwidth Which of the following correctly matches the definitions of analog and digital bandwidth? (Choose two.) *Analog bandwidth refers to frequency range. Analog bandwidth is a measurement of the amount of frequency sent. Digital bandwidth refers to the range of a frequency. *Digital bandwidth measures speed of the transmission. Analog bandwidth is a measurement of how much information can flow. Why would fiber optic installations be favored over copper between buildings? (Choose two.) cheaper installation larger media *attentuation properties *no electrical interference easier termination and installation How are binary ones and zeros represented in fiber optic installations? (Choose two.) +5 volts/-5 volts 0 volts/5 volts *light/no light high to low electrical transition low to high electrical transition *increasing/decreasing light intensity What are some of the factors that contribute to attenuation in a copper media? (Choose three.) type of voltage used *long cable lengths jitter signal sent by the transmitting device *defective connectors energy leaks through the insulation of the cable low signal frequencies What problems are associated with impedance mismatches in copper cabling? (Choose two.) *jitter signal absorption termination of signals * reflection NEXT What conditions are described when transmission signals from one wire pair affects another wire pair? (Choose two.) * noise resistance mismatch jitter

*crosstalk attenuation What type of wiring problem is depicted in this sample of a cable tester? a fault a short * an open a split a good map What factors need to be considered to limit the amount of signal attenuation in long Ethernet cable runs? (Choose two.) *type of media number of users type of users *length of cable type of electrical equipment Fiber optic cable was installed in a new warehouse that also houses large electrical motors. The fiber run of the longest segment has a total length of 2650m. What signal problems might be associated with this installation? (Choose two.) electrical noise * attenuation impedance mismatches crosstalk * signal loss caused by damaged cable Which of the following are tests specified by the TIA/EIA-568-B standard for copper cable? (Choose three.) signal harmonics conductive response * wire map signal absorption *insertion loss *propagation delay Which RJ-45 pins on an Ethernet NIC are used for data transmission? * 1 and 2 3 and 6 2 and 4 6 and 8 5 and 6 Which of the following describe amplitude? * the height of each wave the length of each wave the number of waves each second the amount of time between each wave In a new network installation, the network administrator has decided to use a medium that is not affected by electrical noise. Which cable type will best meet this standard? coaxial screened twisted pair shielded twisted pair unshielded twisted pair * fiber optic

#ass5 What must be connected to the DB-15 AUI port to provide connectivity for an RJ-45 terminated cable? hub joystick * transceiver router WIC NIC At which layer of the OSI model is a NIC classified? physical * data link network transport Which of the following are other names for a hub? (Choose two.) * concentrator transceiver switch bridge * multiport repeater active host Which of the following are benefits of wireless networks when compared to wired networks? (Choose two.) higher data speeds better security * mobility less expensive NIC cards * no need to run cables to hosts no transceivers required In addition to operating at higher speeds, which of the following functionalities does a switch offer over a bridge? collision domains forwarding tables broadcast domains * Virtual LANs (VLAN's) MAC address based forwarding What are the reasons for the Four Repeater Rule of 10 Mbps Ethernet? (Choose two.) to reduce total attenuation to prevent microsegmentation * to prevent late collisions to prevent bit slippage * to limit latency Which of the following are benefits of peer-to-peer networks? (Choose three.) centralized security * easy to create very scalable * no centralized equipment required * centralized administrator not required centralized control of assets

What types of interfaces may be used on ISDN BRI? (Choose two.) NT1 * S/T * U NT2 TA TE1 Which of the following companies are responsible for creating and implementing the first Ethernet LAN specifications? (Choose three.) * Intel Cisco * Digital * Xerox Microsoft Hewlett Packard What is the recommended maximum number of workstations configured on a peer-topeer network? 25 15 * 10 5 2 Which protocol is typically used to carry data over an ISDN B channel? * PPP SLIP PAP Frame Relay What are advantages of client/server networks? (Choose three.) * centralized security single point of failure * centralized backups lower operating costs * enhanced network services users control their own resources What type of network cable is used between a terminal and a console port? cross-over straight-through * rollover patch cable Which of the following are hub types? (Choose three.) LAN core * active * passive * intelligent convergent What are the two basic functions of a switch? (Choose two.) * switching data frames cost effective operation switching Layer 3 traffic * build and maintain tables

isolating packets on the LAN Which layer of the OSI model covers physical media? * Layer 1 Layer 2 Layer 3 Layer 4 Layer 5 Layer 6 In which of the following situations would a straight-through cable be used? (Choose three.) router to router router to PC * router to switch * PC to hub switch to hub * switch to PC From the diagram above, we see that Host B is connected directly to a network device. What does that network device use to make forwarding decisions? Layer 2 network addresses * Layer 2 physical addresses Layer 3 network addresses Layer 3 physical addresses Which type of connector supports 100BASE-T Ethernet over Category 5e UTP? BNC * RJ-45 S/T MIC RJ-46 Which of the following provide local address resolution services to the local area network? (Choose two.) NIC ARP * DTE * DCE CSU/DSU RARP What are the various ways interfaces are labeled on routers? (Choose three.) slot type * port number MAC address interface hostname * port type * slot number In which of the following situations would a crossover cable be used? (Choose two.) switch to router switch to PC * router to PC * switch to hub hub to router Which port on a router is used with a modem to make configuration changes?

* Console Aux BRI Ethernet An ISDN BRI connection is composed of how many bearer channels? 1 * 2 3 4 What type of connector is used to connect ADSL to the wall jack? RJ-45 * RJ-11 RJ-12 V.35 RS-232 #ass6 Which Ethernet data link layer frame comparison is correct? higher speed networks require more fields be included in the frame the faster speed frame structures are incompatible with the slower speed networks the frame structure changes with each higher speed, however, they are compatible with slower speeds * all speeds of Ethernet have nearly identical frame structures Which of the following is included in the frame address field? (Choose two.) source IP address destination IP address destination subnet mask * source MAC address * destination MAC address Which of the following are sublayers of the OSI data link layer? (Choose two.) * Logical Link Control Logical Layer Control * Media Access Control Logical Link Communication Media Access Communication Physical Access Communication How is a MAC address represented? four groups of eight binary digits separated by a decimal point four Base10 digits separated by a decimal point six hexadecimal digits * twelve hexadecimal digits twenty-four Base10 digits What does the "10" in 10Base2 indicate about this version of Ethernet? The version uses Base10 numbering within the frames. * The version operates at a transmission rate of 10 Mbps. Frames can travel 10 meters unrepeated. The maximum frame length is 10 octets. Which of the following would indicate the beginning of the frame? flag bit

* start of frame frame check sequence address field Why is Ethernet considered very scalable? The NIC cards do not need to be changed to increase the bandwidth of the network. * Bandwidth can be increased without changing the underlying technology. Ethernet standards do not need to change as new technologies are introduced. Ethernet changes the packet as necessary to move from one link to another. What are the possible reasons the MAC layer would be unable to send a frame in sixteen attempts? (Choose two.) The destination is more than 16 hops away and unreachable. * A physical problem exists on the network. The destination never received a token and therefore could not return verification of the CRC. The network administrator assigned the wrong MAC address to the device. * The network is experiencing extremely heavy traffic loads. The physical layer has not yet reached a state of convergence. What does the letter "T" indicate in 10BaseT? fiber optic cable * copper unshielded twisted pair thicknet coaxial cable thinnet coaxial cable Where does the MAC address originate? DHCP server database configured by the administrator * burned into ROM on the NIC card network configuration on the computer included in the creation of the processor chip Select the statements that correctly describe the Length and Type Ethernet frame fields. (Choose three.) Both fields, Length and Type, exist in all versions of Ethernet frames. * DIX versions of Ethernet use the field Type. Early IEEE Ethernet versions used a combined Length/Type field. * Early IEEE Ethernet versions used the field Length. * Later IEEE Ethernet versions use a combined Length/Type field. Later IEEE Ethernet versions use separate Length and Type fields. Which characteristics of Ethernet contribute to its widespread use? (Choose three.) * ease of maintenance collision free technology * scalability * low cost of installation compatibility with 802.5 standard collision avoidance capabilities What does the word "Base" indicate in 10Base2? The number standard used. * Baseband signaling is used. Only a portion of the transmission medium is used. Broadband signaling is used.

What happens on an Ethernet network after a collision occurs? (Choose three.) * A backoff algorithm is invoked and transmission is stopped. Devices involved in the collision have a random period of time for priority retransmission of the damaged packet. The devices involved in the collision release a token indicating the time each station may begin retransmitting. * The devices involved in the collision do not have priority to transmit data. * The devices with data to transmit return to a listen-before-transmit mode. Transmit work will restart with the reissuance of all data. A network administrator, while analyzing the network, notices a large number of "runts". What is significant about this? (Choose two.) A server with high network priority is receiving significant use, overriding normal packet delivery. * A significant number of collisions are occurring, leaving collision fragments. Corrupt data has been split into small packets allowing the network to function more smoothly. The network is operating smoothly allowing data to be sent in smaller increments. * Throughput on the network is significantly reduced due to excessive collisions. Why is half-duplex mode not permitted on 10 Gigabit Ethernet? It was removed from the Ethernet standards as outdated technology. * Transmission is completed before the sending station can be made aware of any collisions. Full-duplex transmission is needed in order to reach 10 Gigabit speeds. Full-duplex stations transmit too quickly, blocking half-duplex stations from sending data. Ethernet standard specifications limit network service interruption. Select the items that describe the standards. (Choose three.) minimum segment length * maximum segment length minimum number of stations per segment * maximum number of stations per segment minimum number of repeaters between segments * maximum number of repeaters between segments Which options below are field names of a generic frame? (Choose three.) IP header voltage reference * data description * length * frame check sequence Which of the following are the functions of CSMA/CD? (Choose three.) * transmitting and receiving data packets releasing a token when the network is clear * detecting errors within data packets or on the network passing a token to each station on the network * decoding data packets and checking them for valid addresses before passing them to the upper layers of the OSI model Which features describe the Token Ring topology? (Choose two.) * collisionless environment. non-deterministic.

* deterministic uses CSMA/CD prone to collisions What is the length of a MAC address? 8 bits 8 bytes 24 bits 24 bytes * 48 bits 48 bytes Which statements below are true about Ethernet? (Choose three.) addresses the needs of Layer 2 and Layer 3 of the OSI model first released as a Xerox proprietary standard * essentially the same as 802.3 standards * bandwidth can be increased without changing the underlying technology essentially the same as 802.2 standards * original idea developed at the University of Hawaii What is indicated when the length/type frame field value is greater than 0x600? DIX formatted frame header * Ethernet II code used to interpret the frame length of frame is 600 bits half duplex transmission being utilized How are collisions detected on an Ethernet network? Stations identify the altered FCS field on the colliding packets. * The signal amplitude on the networking media increases. There is blockage on the network causing no traffic to be detected. The signal amplitude on the networking media decreases. Which statements correctly describe slot time? (Choose two.) * the time period just longer than the longest possible round trip when all options are at their maximum the time required to send an entire frame through the outgoing port the minimum spacing between two non-colliding frames * undefined on 10 Gigabit Ethernet Which of the following has limited the bandwidth of fiber based Ethernet? (Choose three.) *emitter technology absolute fiber light-carrying capacities theoretical limits of fiber capacity * fiber manufacturing processes * detector technology angles and curves in the fiber run Which of the following are Fast Ethernet technologies? (Choose two.) 100BASE-5 100BASE2 1000BASE-F * 100BASE-FX * 100BASE-TX Which media types can be used in an implementation of a 10BASE-T network? (Choose three.)

* Category 5 UTP * Category 5e UTP * Category 3 UTP coaxial cable multi-mode fiber single mode fiber Why would an organization choose to implement twisted pair cabling over coaxial cabling? (Choose two.) * cheaper * easier to install proprietary used in most older networks easy to make wiring errors no limitations to the length of each segment For a network manager planning the installation of a new network, which of the following will be needed to implement a typical 10BASE-T network installation? (Choose three.) RJ-11 BNC connectors RJ-48 patch cables * RJ-45 connectors * Category 5 UTP cables * hubs or switches Which of the following are true when comparing 10BASE2 and 10BASE5? (Choose three.) 10BASE2 supports faster data rates than 10BASE5. 10BASE2 has longer allowable cable lengths. * 10BASE2 cable is more flexible than 10BASE5 cable. * 10BASE5 cable is heavier than 10BASE2 cable. * 10BASE5 and 10BASE2 networks operate in half-duplex mode. 10BASE5 and 10BASE2 networks have central hubs to control traffic networks. Which of the following were considered advantages of 10BASE5 networks? (Choose two.) easy to install easy to find hardware * inexpensive * no configuration Which of the following Ethernet technologies are considered legacy Ethernet? (Choose three.) * 10BASE2 * 10BASE5 * 10BASE-T 100BASE-T 100BASE-FX 100BASE-TX Which of the following Ethernet technologies share the same timing parameters? (Choose three.) * 10BASE2 * 10BASE5 * 10BASE-T 100BASE-TX 100BASE-FX 100BASE-RX

Which of the following common networking problems is eliminated when an Ethernet network uses separate transmit and receive wire pairs and a switched topology? * collisions on the physical bus single segment distance limitations the maximum bandwidth available on CAT 3 wiring Multi-port bridge replication errors CSCD/MA maximum repeater rules Which of the following is the line encoding conversion used by 1000BASE-X? SRS PCM NZS B8ZS * NRZ ASCII What does the "S" in 1000BASE-SX mean? short range fiber * short wavelength light source shielded twisted pair shielded fiber cladding single-mode fiber Which class of repeater changes between one Ethernet implementation and another? * Class I Class II Class III Class IV Class V Which of the following best describes how the Gigabit Ethernet, Media Access Control method views the link? Ring Shared bus * point-to-point Star extended star What is the maximum distance that 10BASE5 will transmit data before signal degration? 185 meters 200 meters * 500 meters 550 meters Which of the following is the maximum distance that 10BASE2 will transmit data before signal degration? 100 meters * 185 meters 200 meters 500 meters What is the maximum distance that 10BASE-T will transmit data before signal attenuation affects the data delivery? * 100 meters 185 meters 300 meters

500 meters Which of the following describe the Gigabit Ethernet bit patterns created at the physical layer? pulses triads frames *symbols icons What is the most important aspect to consider when designing a 10BASE-T architecture? specifying the correct category of cable in the design minimizing the number of switches in the design maximizing the use of hubs * minimizing the delay between distant stations To make sure timing limitations are not violated when implementing a 10 Mbps Ethernet network involving hubs or repeaters, a technician should adhere to which rule? the 4-5-3 rule the 6-4-2 rule the 3-4-5 rule *the 5-4-3 rule While working on her computer, Mary noticed longer than normal network data transfers. Mary investigates the problem and notices that her co-worker John has been hosting an online video conference. What is the network probably experiencing? collision storm * broadcast storm IP storm data rain storm Which of the following is a term associated with replacing hubs with switches to increase the number of collision domains? encapsulation latency * segmentation layered model broadcast domain extended What does a switch broadcast to let other switches know of its existence on the LAN? STP STA BDPU BPU * BPDU What impact does a bridge have on a network? (Choose two.) reduces collision domains * increases number of collision domains adds additional broadcast domains * has no impact on broadcast domains breaks collision domains into equal parts

Which of the following is the switching technique that reads the header and passes the frame prior to the checksum being sent? * fragment-free cut-through store-and-forward latency forwarding fast forward Which LAN switching methods have a fixed latency time? (Choose two.) store-and-forward * cut-through fast-forward free-forward cut-and-store * fragment-free Which of the following is created with switched full-duplex transmission? more collision domains fewer collision domains * no collision domains no increase in broadcast domains more broadcast domains What is the area referred to as, that controls frame propagation within that area? MAC address domain * collision domain broadcast domain propagation domain A network administrator has a multi-floor LAN to monitor and maintain. Through careful monitoring, the administrator has noticed a large amount of broadcast traffic slowing the network. Which device would you use to best solve this problem? bridge hub * router transceiver Which of the following does a router use to make a forwarding decision? * destination IP address MAC address source IP address encapsulation address default gateway Which of the following would alleviate the problem of excessive collisions in a LAN? (Choose two.) * reduce the size of collision domains reduce number of broadcast domains add extra hubs * add extra managed switches add additional transceivers increase the length of UTP cable runs What is a disadvantage of cut-through switching? * no error checking

a decrease in error checking decrease in number of collision domains decrease in bandwidth increased latency Which of the following describes shared media environment? a collision free environment made up of systems on the same medium multiple hosts have access to the same cable ISP system * multiple hosts have access to the same medium. multiple router environment in a mesh topology Which switching mode has the lowest latency? * cut-through fast-forward store-and-forward fragment-free Which switching mode describes a switch that transfers a frame as soon as the destination MAC address is read? fragment-free * cut-through store-and-forward latency forwarding Which device uses full-duplex mode to provide full bandwidth between two nodes on a network? hub router * switch gateway repeater transceiver Which of the following protocols is used to eliminate loops? * STP BDPU UDP EIGRP learning Which switching mode has the highest latency? fast-forward * store-and-forward fragment-free cut-through Which of the following devices performs the task of viewing and forwarding frames based on MAC addresses? (Choose two.) hub router * bridge * switch transceiver ATM Which of the following network types uses networking devices to extend the distances that cable can be run? length/shared media

* extended shared media point-to-point network extended point-to-point network multiple access/point-to-point Within a company's TCP/IP network, failure to access e-mail on a remote server has been diagnosed as a network access problem. Which of the following could be the cause? (Choose two.) DNS PPP * ATM TCP SMTP * Ethernet In the network shown in the accompanying graphic, where would it be appropriate to use private addressing ? only area a only area b only area c areas a and b * areas a and c areas a and b and c Which criteria identify a Class B address? (Choose two.) decimal number in first octet between 127-191 decimal number in first octect between 128-192 * decimal number in first octect between 128-191 first bit of binary IP address is 0 * first two bits of binary IP address are 10 first three bits of IP binary address are 110 What version of IP was developed as IPng , and what year was it introduced by IETF? (Choose two.) IPv4 * IPv6 IPv8 1981 * 1992 2002 Which TCP/IP model layer supports both LAN and WAN technologies? * network access layer internet layer transport layer application layer Which of the following are TCP services? (Choose three.) address resolution * end-to-end communication * flow control * reliability of data delivery path determination data representation Which items may be included in a BOOTP packet? (Choose two.) the destination IP address of a WAN workstation

* the address of a router * vendor-specific information the routing protocol of the destination network How do some computer operating systems prevent duplicate IP addresses on a local area network? They are able to allow duplicate IP addresses on a single LAN segment. The network DNS server reconciles IP address duplication. * They send ARP requests throughout a local area network. They use UDP packets to bypass IP addresses. What is the function of the Reverse Address Resolution Protocol (RARP) on a local area network? RARP binds a known IP address to an unknown MAC address. RARP reports the MAC address of a website to the ARP table of the workstation. RARP seeks out diskless workstations to assign a physical address to the network interface cards of the workstations. * RARP binds a known MAC address to an IP unknown address. Which model would a networking professional use to better understand the data communication process? * OSI model IEEE model ANSI model Internetworking model What should a system administrator consider when assigning an IP address to a network server? (Choose two.) Servers should have addresses assigned dynamically through a DHCP. * Servers with a dynamically assigned IP address would be difficult to locate on a network. Servers with periodically changed IP addresses have little effect on a network. * Servers should have IP addresses assigned statically by a network system administrator. Which functions are handled by the TCP/IP application layer? (Choose three.) logical addressing * encoding logical topology route selection * dialog control * data presentation Which OSI layers relate to the network access layer of the TCP/IP model? (Choose two.) transport * physical session network * data link application Which of the following are major advantages of DHCP over BOOTP? (Choose two.) * It allows user to be mobile. * It does not require fixed profiles to assign IP addresses. It requires only three packet exchanges to obtain an IP address. It uses a table of static IP addresses developed by the network system administrator.

It requires the IP address to be linked with the same MAC address. Name the protocols that operate at the transport layer of the TCP/IP model. (Choose two.) * TCP IP * UDP FTP NDS IPX What organization developed the TCP/IP reference model? Internet Engineering Task Force (IETF) National Intstitute of Standards and Technology (NIST) Department of the Navy (DoN) * Department of Defense (DoD) Massachusetts Institute of Technology (MIT) Stanford University Which TCP/IP layer provides services that support a logical connection between the sending and receiving hosts? application network IP * transport presentation session In what ways are the TCP/IP and OSI models the same? (Choose three.) * Both have an application layer. Both have a physical layer. Both assume circuit-switched networks. Both have network access and data-link layers. * Both have similar transport and network layers. * Both assume packet-switched networks. Which operations are performed by IP? (Choose three.) * routing packets to remote hosts providing a physical addressing scheme defining frames * defining packets * transferring data between the internet layer and the network access layer transferring data between the internet layer and the application layer Which network device table contains the IP and MAC address of other devices on the same LAN? DHCP RARP * ARP DNS What steps must occur for devices to communicate between different physical network segments? (Choose two.) learning the IP address of the source device * obtaining the MAC address of the intermediate device * transferring the data packets from one network segment to another to reach the destination host obtaining the IP address of the local host

Which layer is considered to be the host-to-network layer of the TCP/IP model? application presentation transport &nb