Showing 1 of 10 1
Which of the following are the address ranges of the private IP addresses? (Choose three.) 10.0.0.0 to 10.255.255.255 184.108.40.206 to 220.127.116.11 18.104.22.168 to 22.214.171.124 172.16.0.0 to 172.31.255.255 192.168.0.0 to 192.168.255.255 127.16.0.0 to 127.31.255.255
What is the purpose of the ipconfig /release command? It forces a client to give up its current IP address. It forces a client to give up its current MAC address. It forces the client to clear all the MAC address to IP address associations it has learned. It shows the current IP configuration on the client.
For an IP address, what component decides the number of bits that is used to represent the host ID? default-gateway host number network number subnet mask
What does the term "attenuation" mean in data communication? loss of signal strength as distance increases time for a signal to reach its destination leakage of signals from one cable pair to another strengthening of a signal by a networking device
What is the purpose of creating a DMZ during network firewall implementation? to create a server security zone accessible only to internal clients to create a dirty zone that allows all inbound and outbound traffic to allow for a publicly accessible zone without compromising the internal network to specify a higher security level than normally required for the internal production network
Showing 2 of 10 6
What is the function of the DNS server?
Which Windows command line utility can be used to confirm the multiple TCP connections? ping netstat tracert ipconfig nslookup 8 The help desk at a large packaging company receives a call from a user who is concerned about lost data files on the local PC. It accepts HTTP requests from clients. What type of attack has likely occurred? Worm DDoS brute force Trojan horse 9
Refer to the exhibit. It translates a computer or domain name to the associated IP address. A user on host A sends an e-mail to the user on host B.It maps the IP address to the MAC address. The help desk technician learns that the user clicked on an icon that appeared to be a program update. Which type of message does host A send?
. 7 A network technician suspects that malware on a user PC is opening multiple TCP connections to a specific foreign host address. It manages the domain that clients are assigned to. but no updates were scheduled for that program.
broadcast multicast simulcast unicast 10 A network administrator has been notified that users have experienced problems gaining access to network resources. What utility could be used to directly query a name server for information on a destination domain? Ping Tracert Netstat Ipconfig Nslookup
11 What type of cable would be required to connect a Linksys router to a wired PC? crossover cable rollover cable serial cable straight-through cable 12 A host sent a message that all other hosts on the switched local network received and processed. What type of domain are all these hosts a part of? local domain multicast domain collision domain broadcast domain 13
Refer to the graphic. bandwidth per user on a WLAN has decreased to a point where users are complaining about poor performance. What can be deduced from the output? The DHCP configuration on the router needs to be verified. Assume that the exhibited output is from a host that is connected to a Linksys integrated router. Showing 4 of 10 Next> Page:
16 Because of an increasing number of users. The wireless connection is operational. The wireless NIC driver or the NIC itself needs to be reinstalled. The WEP key or SSID needs to be verified. What is one of the first things you should check? IP address on the host IP address on the router subnet mask on the host default gateway on the host link status LED on the front of the router 14 Which two transport layer protocols enable hosts to communicate and transfer data? (Choose two. Assume that the command output is from a wireless DHCP client that is connected to a Linksys integrated router. What can be done to improve the
.) DHCP ICMP IP TCP UDP 15
Refer to the exhibit.
) the use of EAP the encryption of the SSID the use of pre-shared keys the use of open authentication the disabling of SSID broadcasting Showing 5 of 10 21 Next> Page:
. ISPs obtain their addresses automatically. Place the AP in a more central location. 20 What are two best practices that are used when configuring a small home WLAN? (Choose two.) physical address MAC address default gateway static IP address dynamic IP address DNS server address 18 Which type of computer uses an integrated monitor and keyboard? pocket PC laptop mainframe server workstation 19 Where do ISPs get the public addresses that they assign to end users? ISPs create the addresses themselves. ISPs are assigned addresses through the RFC. an integrated router can provide what three types of information to a client? (Choose three.user experience? Increase the AP radio signal strength. ISPs obtain address blocks from registry organizations. 17 When acting as a DHCP server. Deploy an external omni-directional antenna. Reduce the number of devices using each channel.
What are the two possible values that the engineer can use? (Choose two. why is it important to untwist only a small amount of each wire pair? minimizes crosstalk makes installation faster ensures wires are in correct order makes it easier to fit wires into connector 23 A network engineer wants to represent confidential data in binary format.) 0 1 2 A F
.11 standards to support both wireless and wired Ethernet hosts to support hosts with different operating systems to support hosts with network cards from different manufacturers 22 When terminating UTP cabling.Refer to the exhibit. Why would a network administrator use the network mode that is shown? to support hosts on different IP networks to support hosts that use different 802.
It encrypts data between the wireless client and the AP. An example of a local application is e-mail. the network technician first verifies the physical connectivity of cables. It translates an internal address or group of addresses to a public address. Which troubleshooting approach is being followed? bottom-up divide-and-conquer top-down trial and error 25
Refer to the exhibit.24 A user is unable to send e-mail. They are stored on the local hard disk. What is the purpose of assigning a network name of College? It enables access to the AP configuration GUI by name rather than by address. They run on the computer where they are installed.
. Showing 6 of 10 Next> Page:
26 What are two examples of storage peripheral devices? (Choose two.) printer flash drive headphones external DVD barcode reader 27 Which two statements are true about local applications? (Choose two. While troubleshooting this problem. It identifies the wireless LAN.) They run on the network. It translates IP addresses into easy-to-remember domain names. They are accessed from a remote computer.
28 In an attempt to verify connectivity. What can be determined from this result? The default gateway is misconfigured. The router between the host and destination is faulty. The ping is unsuccessful. What cabling fault does the exhibit represent? open reversed pair short split pair 32 Which protocol in its default configuration downloads e-mail messages to the client computer
. The patch cable on the host station is faulty. a user issues the ping command to a device that is not on the local network. Further troubleshooting will be required to reach a definite conclusion. 29 Which installation option enables a single physical resource to function simultaneously as multiple logical resources? clean install multi-boot upgrade virtualization 30 Your school network blocks all websites related to online gaming. What type of security policy is being applied? identification and authentication remote access acceptable use incident handling Showing 7 of 10 31 Next> Page:
Refer to the exhibit.
It detects and removes viruses.and deletes them from the server? FTP POP3 SMTP IMAP4 33 What is the purpose of spam filter software? It detects and removes spyware. It prevents the display of advertisement windows. It examines incoming e-mail messages to identify the unsolicited ones. which host devices will receive the message? only H1 hosts H1 and H4 all hosts that are connected to Switch1
. If H4 sends a message to H1 and the destination MAC address is in the MAC table for both Switch1 and Switch2. 34 The area covered by a single AP is known as what? ad-hoc network basic service set independent basic service set extended service set distribution system 35
Refer to the exhibit.
all hosts that are connected to Switch1 and Switch2