This action might not be possible to undo. Are you sure you want to continue?
1. A user tries to open a page on the web server at www.cisco.com. The user’s workstation does not have the destination IP address in order to encapsulate the request. Which network topology will provide the services that are required to associate the name of the web server with an IP address?
TCP/IP data transmission between the source and destination host is encapsulated in four steps: A. adds the data-link header and trailer; B. converts data to bits for transmission; C. adds the network IP address to the header of the packet; D. segments the data for end-to-end transport. What is the correct sequence of these steps? A, B, C, D A, D, B, C B, D, A, C D, C, A, B D, C, B, A
Which three statements are characteristics of DHCP services? (Choose three.) The DHCP server assigns the IP addresses and ensures that they are unique. A PC that uses a static IP address obtains IP configuration from the DHCP server. The integrated router acts as a DHCP server for internal hosts on local networks. An integrated router acts as the DHCP server to provide the IP address to the ISP.
Page 1 of 10
a computer science student needs to present data in binary format. 4. MAC addresses are physical addresses. MAC addresses contain a network number and unique host identification.) to allow the transfer of frames from source to destination to determine which host has priority to transfer data to indicate the best path between separate networks to associate with a specific network IP address to uniquely identify a node on a network 9. Which part of a data packet is used by a router to determine the destination network? source IP address user data destination IP address control information destination MAC address 10.) MAC addresses are used to identify a specific NIC.DHCP clients on medium and large networks receive the IP configuration from the ISP. What type of domain are all these hosts a part of? local domain multicast domain collision domain broadcast domain 5. As an assignment.3 Ethernet frame? 64 1024 1518 4096 7. MAC addresses are always assigned to network devices by a network administrator. A host sent a message that all other hosts on the switched local network received and processed. Which two statements correctly describe MAC addresses? (Choose two. 8. What is the maximum number of bytes that is allowed in a standard IEEE 802.) 0 1 2 A F 6. What are the two possible values that the student can use? (Choose two. MAC addresses are Layer 3 addresses. What are two functions of MAC addresses in a LAN? (Choose two. The DHCP server assigns a lease time that specifies the length of time the assigned IP address is valid. When is the use of a DSL modem necessary? when a cellular telephone provides the service when a high-speed connection is provided over a cable TV network Page 2 of 10 .
A network designer is working with a small company to determine the network type best suited to the needs of the company. Assume that the exhibited output is from a host that is connected to a Linksys integrated router. Refer to the graphic. 14.) Microsoft Word is an example of a network application. Network applications are installed on a special type of computer that supports only network applications. Which two statements are true about network applications? (Choose two. Network applications are installed on a network server. What is one of the first things you should check? IP address on the host IP address on the router subnet mask on the host default gateway on the host link status LED on the front of the router Page 3 of 10 . Network applications are accessible from a remote computer. What layer is the first point of entry for a host into the network? core layer access layer network layer distribution layer 13. Which twocharacteristics could the designer use to describe a peer-to-peer network to the owner of the company? (Choose two.) central administration easy to install low cost scalable secure 15.when a high-speed digital connection is required over the regular telephone line when a satellite dish is used 11. What is the function of CSMA/CA on a wireless Ethernet network? to prevent collisions to broadcast messages to select the least congested channel to establish an ACK between devices 12. Network applications are accessible by one computer at a time.
What action will switch SW1 take prior to forwarding the frame? flood the frame out all interfaces learn the MAC address that is associated with Host2 assign a MAC address to Host2 from the MAC table poll all interfaces to learn their assigned IP addresses Page 4 of 10 . Refer to the exhibit. Host H1 does not have a default gateway configured. Refer to the exhibit. H2 and H3 but not H1 can ping H4 and H5. WEP ensures that only authenticated users are allowed access to the WLAN. and the Fa0/0 interface of router R1. 18. WEP encrypts data between the wireless client and the access point. 17. The link between router R1 and switch S2 has failed. H1 can ping H2. H3. WEP allows the access point to inform clients of its presence. Switch S1 does not have an IP address configured.16. What is the effect of setting the security mode to WEP on the Linksys integrated router? WEP identifies the wireless LAN. WEP translates IP addresses into easy-to-remember domain names. Host2 attempts to establish communications with Server1. What is a possible cause for the H1 failure? Router R1 has no route to the destination network. Refer to the exhibit.
Replace the cable with a straight-through cable.0 255.255. What is the default subnet mask for an IP address of 198.0 255. However. Replace the cable with a rollover cable. What should the user do in order to establish a connection? Replace the cable with a console cable.255. What is specified by the host bits in an IP address? broadcast identity of the network identity of the computer on the network network that is being addressed network to which the host belongs 23. Refer to the exhibit. A new switch is connected to an existing switch that has a fully populated MAC table. there is no connection between the host H1 and the server.255.219.255.255.133. Replace the failed crossover cable with a working crossover cable. PC1 requires the destination MAC addressof PC3 in order to send a message.0. Refer to the exhibit.0 255. PC3 and PC4 20.4? 255.0. Which device or devices will see the ARP sent by PC1? only PC3 PC2 and PC3 PC3 and PC4 PC2.255 Page 5 of 10 . What is the meaning of the term crosstalk? interference of signals between wire pairs loss of signal strength as distance increases damage of the signal when two bare wires touch strengthening of a signal by a networking device 22.0. A user sets up a home network and uses a crossover cable from Switch1 to the Internet port on the ISR.19. 21.
If the administrator sees an extremely high numb er of failed attempts by a single user who is trying multiple password combinations.255 127.255.100.16. It prevents the display of advertisement windows.0.0.150.50.0 to 172.168.0 127.0.168.0 to 192.24.255. Which service will translate private internal IP addresses into Internet routable public IP addresses? ARP DHCP DNS NAT 30.0 172. Which private network address is reserved for diagnostic testing of devices? 10.255 200. It detects and removes viruses.255.255.0 192.150. What is the purpose of spam filter software? It detects and removes spyware.0 to 10.0 to 127.100. Which of the following are the address ranges of the private IP addresses? (Choose three. What is the purpose of creating a DMZ during network firewall implementation? to create a server security zone accessible only to internal clients to create a dirty zone that allows all inbound and outbound traffic Page 6 of 10 . Under what circumstance would it be appropriate to use private IP addresses? for communication between two ISPs for a network that is directly connected to the Internet for addresses that are used exclusively within an organization.0.255 220.127.116.11.255 192.0 18.104.22.168. what type of attack is in progress? brute force phishing SYN flood virus vishing 29.168.0 to 200.0.255 172. for a host with more than one direct connection to the Internet 26.255 25.255.0. It examines incoming e-mail messages to identify the unsolicited ones.0. A system administrator routinely monitors failed login attempts on a server.0.16.) 10. 28.31.0 to 150.0 22.214.171.124.16.
What is the function of a physical topology map? records IP addressing of each host records hostnames and applications organizes groups of hosts by how they use the network shows where wiring is installed and the locations of network devices 34. Which description should the engineer use? A stateful firewall is only available on a firewall appliance. A stateful firewall bases its analysis only on IP address. Which two methods can be used for this? (Choose two. The commercial license-based operating system ensures that everyone can participate in the enhancement of the product. 32. 36. The commercial license-based operating system provides structured support. The commercial license-based operating system is released free of charge.) CLI GUI kernel third party software shell Page 7 of 10 . Before implementing a stateful firewall on an ISR router. A learner wants to interact with the operating system of a computer. What is an advantage of selecting an operating system that has a commercial license over one with a GPL license? The commercial license-based operating system ensures full access to the source code for everyone. and MAC address. 35. A stateful firewall blocks or permits access based only on applications. A stateful firewall can be configured to allow incoming packets only from sessions that are initiated from inside. port number. a network engineer is asked to explain to upper management in simple terms what a stateful firewall is. Which type of computer uses an integrated monitor and keyboard? pocket PC laptop mainframe server workstation 35. The area covered by a single AP is known as what? ad-hoc network basic service set independent basic service set extended service set distribution system 33.to allow for a publicly accessible zone without compromising the internal network to specify a higher security level than normally required for the internal production network 31.
It translates an internal address or group of addresses to a public address. Which installation option enables a single physical resource to function simultaneously as multiple logical resources? clean install multi-boot upgrade virtualization 38. Which two IP configuration components does the computer use to identify its subnetwork? (Choose two. It identifies the wireless LAN. What are two examples of storage peripheral devices? (Choose two. a switch to a hub a router to a switch a switch to a switch a router to a router 39. What is the purpose of assigning a network name of College?) It enables access to the AP configuration GUI by name rather than by address. It translates IP addresses into easy-to-remember domain names.) default gateway IP address MAC address DNS server address subnet mask 42. Refer to the exhibit. When terminating UTP cabling. It encrypts data between the wireless client and the AP. Select the connection that would require a straight-through cable.) printer flash drive headphones external DVD barcode reader 41.37. why is it important to untwist only a small amount of each wire pair? minimizes crosstalk makes installation faster ensures wires are in correct order makes it easier to fit wires into connector 40. Page 8 of 10 .
cisco. What is the likely reason that the web server home page cannot be displayed? Page 9 of 10 .43. The first-level helpdesk staff would go to the user worksite to perform diagnostics. Which two strategies should be included in the site survey? (Choose two. While troublesho oting this problem. A user is unable to send e-mail. Which troubleshooting approach is being followed? The problem would be referred to an onsite technician. When www. The problem would be escalated to a higher level helpdesk staff member. While troubleshooting this problem. The first-level helpdesk staff would remotely take control of the user system to perform diagnostics. Use a wireless laptop to verify WLAN coverage in the work areas. 46. 45. Employ sophisticated specialized equipment to measure signal strengths and interference.com is entered in a browser window on a PC. Which troubleshooting approach is being followed? bottom-up divide-and-conquer top-down trial and error 47. the network technician first verifies the physical connectivity of cables. Hire a WLAN analysis firm to survey the site. the network technician first verifies the physical connectivity of cables. The first-level helpdesk staff would use online integrated diagnostics software to solve the problem. Deploy all APs and move them if necessary to improve coverage. the web page is unavailable. Which portion of a received datagram is decoded and used by the internetwork layer of the TCP/IP model? IP address port number MAC address HTML/user data 44. While troubleshooting this problem. the network technician executes the nslookup command as well as the ping command to the web server.) Identify the locations of sources of interference. A network administrator is planning an inexpensive WLAN implementation at a small business site. Refer to the exhibit. A user is unable to send e-mail.
Because of an increasing number of users. 48. What can be done to improve the user experience? Increase the AP radio signal strength. It operates in the 5GHz radio frequency band. Reduce the number of devices using each channel. It can be used for communications beyond 100 meters. What is a characteristic of Bluetooth wireless technology? It allows one-to-many connections. It is unable to penetrate walls with a useable signal. What does the term "attenuation" mean in data communication? loss of signal strength as distance increases time for a signal to reach its destination leakage of signals from one cable pair to another strengthening of a signal by a networking device Page 10 of 10 . bandwidth per user on a WLAN has decreased to a point where users are complaining about poor performance. 49. The reason that the web server is unable to display the web page is that the web server is unavailable. Deploy an external omni-directional antenna. 50. A DNS server is not available to resolve the name.The DNS server service needs to be installed on the PC. Place the AP in a more central location. The increased response time displayed in the ping may indicate a delay in server response time.
This action might not be possible to undo. Are you sure you want to continue?
We've moved you to where you read on your other device.
Get the full title to continue reading from where you left off, or restart the preview.