What is a function of the distribution layer in the hierarchical design model?

to provide latency free switching to organize end devices in small manageable groups to provide connectivity using the high-speed backbone to provide connectivity between smaller local networks 2Which device is often configured to act as both a DHCP client and a DHCP server? home PC ISP modem wireless-enabled laptop integrated services router 3 What are two examples of peripheral input devices? (Choose two.) external modem barcode reader digital camera plotter printer 4In IP telephony, what is the purpose of a gateway to the PSTN? to connect IP voice clients to Internet phone service to create a peer-to-peer connection between two IP voice clients to map unique names of IP voice endpoints to a client list on a voice server to allow IP voice clients to communicate with regular analog telephones. 5

6

Which protocol is used by a client to browse the web server? FTP HTTP POP SMTP TCP/IP data transmission between the source and destination host is encapsulated in four step A. adds the data-link header and trailer; B. converts data to bits for transmission; C. adds the network IP address to the header of the packet; D. segments the data for end-to-end transport. What is the correct sequence of these steps? A, B, C, D

A. All wireless devices that are connected to this access point must have an assigned SSID o Academy. Based on the information that is shown. B.23. B D.0. A. C B. D.0.0 . C D. What met should be chosen so that the user can install these new feature sets? clean install multi-boot upgrade virtualization 9Which type of computer uses an integrated monitor and keyboard? pocket PC laptop mainframe server workstation 10 What is the default subnet mask for the IP address 128. In addition to accepting wireless client requests. C. 8 Some new features are available for the OS that is currently running on a user's PC.107. D. C. B. A 7 Refer to the graphic.10? 255. this access point must connect to the wired network. Any wireless client that is attached to this access point would have the same IP address an SSID. what statement is true? This configuration would be commonly found in an ad hoc wireless network.A.

255.255.) disconnected cables improper operation of cooling fans incorrect MAC address incorrect default gateway incorrect subnet mask 2 1 What does the term "attenuation" mean in data communication? loss of signal strength as distance increases time for a signal to reach its destination leakage of signals from one cable pair to another strengthening of a signal by a networking device Which network design layer provides a connection point for end user devices to the network? access core distribution network 13 1 What destination port number would be used if a client wished to establish a secure connectio 4 web server? 21 53 80 443 15 A client wishes to establish an FTP session with a remote server.255 Which two causes of networking problems are related to the physical layer? (Choose two. Which two numbers could b assigned to the client source port? (Choose two.255.) 20 1010 1021 1305 1404 .255.255.0 255.0 255.255.0.

which host devices will receive the message? only H1 .Refer to the exhibit. If H4 sends a message to H1 and the destination MAC address is in the M table for both Switch1 and Switch2. What action w switch SW1 take prior to forwarding the frame? flood the frame out all interfaces learn the MAC address that is associated with Host2 assign a MAC address to Host2 from the MAC table poll all interfaces to learn their assigned IP addresses 1 7 Refer to the exhibit. Host2 attempts to establish communications with Server1.

11b 802.11a 802.11 802.) 0 1 2 A F 2 A network designer is working with a small company to determine the network type best suited 2 needs of the company. What type of mess does the computer send out? broadcast simulcast multicast unicast 20 A college network administrator is planning a wireless LAN to provide service in the student lo and outdoor patio. What are the two possible values that the engineer can use? (Choose two.11g A network engineer wants to represent confidential data in binary format.hosts H1 and H4 all hosts that are connected to Switch1 all hosts that are connected to Switch1 and Switch2 18 Which IP address type is intended for a specific host? broadcast multicast simulcast unicast 9 1 A computer joins the network and announces itself to all hosts on the LAN. Which two characteristics could the designer use to describe a peer-to network to the owner of the company? (Choose two.) central administration easy to install low cost . The requirements include a range of at least 80 meters and a speed of 30 Which wireless LAN standard meets these requirements? 802.

What ISP connection type should be used? DSL dial-up satellite cell modem cable modem 2 What is the name for the contract between a customer and an ISP that specifies requirements 4 uptime and service response time? DSL IAB NAP SLA 25 What is the purpose of creating a DMZ during network firewall implementation? to create a server security zone accessible only to internal clients to create a dirty zone that allows all inbound and outbound traffic to allow for a publicly accessible zone without compromising the internal network to specify a higher security level than normally required for the internal production network What describes the external IP address that is obtained by a router through a cable or DSL m a public address that is obtained from ICANN a private address that is manually configured by the administrator a public address that is obtained through DHCP from the ISP a private address that converts to a public address on the internal LAN 7 2 A network administrator has been notified that users have experienced problems gaining acce network resources. What utility could be used to directly query a name server for information o destination domain? ping tracert netstat ipconfig nslookup .scalable secure 23 A home user is looking for an ISP connection that provides high speed digital transmission ov regular phone lines.

The wireless NIC driver or the NIC itself needs to be reinstalled. Assume that the command output is from a wireless DHCP client that is connected to a Linksys integrated router. The WEP key or SSID needs to be checked.28 Refer to the graphic. 2 What component of a personal computer is responsible for the processing of all data? 9 RAM CPU firewall system bus operating system 30 Refer to the exhibit. Assume that the exhibited output is from a host that is connected to a Lin . The DHCP configuration on the router needs to be checked. What can be deduced from the output? The wireless connection is good.

It is a physical address. It is a networking device that combines the functionality of several different networking dev one. It is an organization that enables individuals and businesses to connect to the Internet. It is cable-based. It is a protocol that establishes how computers within a local network communicate.) 2 It indicates the physical location of the host within the network. 33 Which protocol is used to transfer files among network devices and perform file-management functions? DNS FTP HTML HTTP 4 3 A network technician suspects that malware on a user PC is opening multiple TCP connection specific foreign host address.integrated router. It is dynamically assigned by a DHCP server. Which Windows command line utility can be used to confirm the multiple TCP connections? ping netstat tracert ipconfig nslookup What is an advantage of purchasing a custom-built computer? 35 . 3 What are two characteristics of a MAC address? (Choose two. It is displayed in HEX characters. What is the first thing that should be checked if using a bottom-up troublesh approach? the default gateway on the host the IP address on the host the IP address on the router the link status LED on the front of the router the subnet mask on the host What is an ISP? It is a standards body that develops cabling and wiring standards for networking.

However. The cost is lower compared to a computer that has been preassembled. there is no connection between the host H1 and the server should the user do in order to establish a connection? . workstations on a LAN are not able to log into the server. The 7 technician fixed the problem the first time. but cannot remember the steps taken to solve it. The waiting period for assembly is negligible. W aspect of the troubleshooting process has the technician neglected? identifying the problem asking end-users questions documenting the troubleshooting process using structured techniques to solve a problem 38 Refer to the exhibit. A user sets up a home network and uses a crossover cable from Switch1 Internet port on the ISR. The user can specify high-performance components to meet specific needs. Which protocol in its default configuration downloads e-mail messages to the client computer and d them from the server? FTP POP3 SMTP IMAP4 3 For the second time in a week.It is beneficial for less knowledgeable consumers.

Replace the failed crossover cable with a working crossover cable. Replace the cable with a rollover cable. Replace the cable with a straight-through cable.Replace the cable with a console cable. 3 The area covered by a single AP is known as what? 9 ad-hoc network basic service set independent basic service set extended service set distribution system 40 Which troubleshooting technique can be used to quickly restore user functionality without havin spend much time identifying the exact problem? top-down bottom-up substitution trial and error Showing 8 of 11 Page: þÿ Which wireless protocol is used for encryption? EAP Open PSK WEP Next> GO <Prev 4 2 .

Refer to the exhibit. They have multiple systems that need to access the Internet. What should be activated on the Linksys integra router to achieve this goal? authentication DHCP encryption firewall NAT WEP 43 What must be identical on all devices in a WLAN for successful wireless communication be the devices? SSID antenna type network mode wireless NIC driver 4 Which type of network supports DHCP and DNS services for network users in a network dom 4 client/server peer-to-peer hierarchical ad hoc 45 What two pieces of information should a help desk technician document while troubleshooting connectivity issues with an end user? (Choose two. but w only able to purchase one public IP address. An educational institution needs to connect PC systems that use private I addressing to the Internet.) .

It permits incoming packets that are legitimate responses to requests from internal hosts. It connects the transmit pins on the first device to the receive pins on the second device.the CPU clock speed of the computer the number of network jacks that are in the room if the user can ping the default gateway address if the word processing software is installed correctly whether the PC uses dynamic or static IP addressing Which adapter card would be required for a PC to exchange information with other PCs on a L NIC video card sound card internal modem 4 How does a straight-through cable connect two unlike devices? 7 It connects the receive pins on the first device to the receive pins on the second device. What type of security policy being applied? . Your school network blocks all websites related to online gaming. It permits access based on IP or MAC addresses. It detects and removes viruses. It translates an internal address or group of addresses into a public address that is sent ac the network. It removes unwanted e-mail. It disconnects the transmit pins and uses only the receive pins. 9 50 What statement describes the filtering of traffic via the use of Stateful Packet Inspection? It recognizes and filters predefined URLs It permits access that is based on the application. It prevents the display of advertisement windows. It uses the same pins for transmitting and receiving. 48 What is the purpose of the ipconfig command? to force a client to give up its current IP address to force the client to clear all IP-to-domain-name associations that is has learned to force the client to clear all the MAC-address-to-IP-address associations that it has learn to show the current IP configuration on the client 4 What is the purpose of pop-up blocker software? It detects and removes spyware.

identification and authentication remote access acceptable use incident handling 5 What portion of the destination IP address is used as a packet is routed through the Internet? 2 subnet mask host portion network portion default gateway address .

Sign up to vote on this title
UsefulNot useful