English FormL-3a DHomesb v4.

0 Final - Domain Knowledge - Weighted Score What is the name for the contract between a customer and an ISP that specifies requirements for uptime and service response time? DSL IAB NAP SLA

Observable 1 correctness of response

Description 2 points for Option 4 0 points for any other option

Max Value 2

How does a crossover cable make it possible for two "like devices" (for example, two switches) to communicate? The transmit pins are disconnected and only the receive pins are used. The transmit pins on one device are connected to the transmit pins on the other device. The receive pins on one device are connected to the receive pins on the other device. The transmit pins on one device are connected to the receive pins on the other device.

Observable 1 correctness of response

Description 2 points for Option 4 0 points for any other option

Max Value 2

What does the term "attenuation" mean in data communication? loss of signal strength as distance increases time for a signal to reach its destination leakage of signals from one cable pair to another strengthening of a signal by a networking device

Observable 1 correctness of response

Description 2 points for Option 1 0 points for any other option

Max Value 2

Which wireless protocol is used for encryption? EAP

Open PSK WEP

Observable 1 correctness of response

Description 2 points for Option 4 0 points for any other option

Max Value 2

What is a service pack? an access policy an agreement between a company and a vendor a piece of code created to fix one specific problem a collection of patches and updates released by a vendor a small piece of software designed specifically for security issues

Observable 1 correctness of response

Description 2 points for Option 4 0 points for any other option

Max Value 2

For the second time in a week, workstations on a LAN are not able to log into the server. The technician fixed the problem the first time, cannot remember the steps taken to solve it. What aspect of the troubleshooting process has the technician neglected? identifying the problem asking end-users questions documenting the troubleshooting process using structured techniques to solve a problem

Observable 1 correctness of response

Description 2 points for Option 3 0 points for any other option

Max Value 2

What two commands can be used to form a new binding if client information does not agree with the DHCP client table? (Choose two.) ipconfig /release ipconfig /all ipconfig /flushdns ipconfig /renew ipconfig

Observable

Description

Max Value 2

Option 1 and Option 4 are correct. 1 correctness of response 1 point for each correct option. 0 points if more options are selected than required.

Which installation option should be chosen when the current operating system is too damaged to work properly? upgrade multi-boot clean install virtualization

Observable 1 correctness of response

Description 2 points for Option 3 0 points for any other option

Max Value 2

Refer to the graphic. Assume that the command output is from a wireless DHCP client that is connected to a Linksys integrated router What can be deduced from the output? The wireless connection is good. The WEP key or SSID needs to be checked. The DHCP configuration on the router needs to be checked. The wireless NIC driver or the NIC itself needs to be reinstalled.

Observable 1 correctness of response

Description 2 points for Option 1 0 points for any other option

Max Value 2

Which type of computer has an integrated mouse? desktop laptop mainframe server pocket PC

Observable 1 correctness of response

Description 2 points for Option 2 0 points for any other option

Max Value 2

Which two causes of networking problems are related to the physical layer? (Choose two.) damaged cables and connectors incorrect addressing incorrect subnet mask overheated components incorrect default gateway

Observable

Description

Max Value 2

Option 1 and Option 4 are correct. 1 correctness of response 1 point for each correct option. 0 points if more options are selected than required.

Refer to the exhibit. The security policy of an organization allows employees to connect to the office intranet from their homes. Which t of security policy is this? acceptable use

incident handling network maintenance remote access

Observable 1 correctness of response

Description 2 points for Option 4 0 points for any other option

Max Value 2

Which two components are configured via software in order for a PC to participate in a network environment? (Choose two.) MAC address IP address kernel shell subnet mask

Observable

Description

Max Value 2

Option 2 and Option 5 are correct. 1 correctness of response 1 point for each correct option. 0 points if more options are selected than required.

Refer to the exhibit. Assume that the exhibited output is from a host that is connected to a Linksys integrated router. What is the firs thing that should be checked while using a bottom-up troubleshooting approach? the default gateway on the host the IP address on the host the IP address on the router

the link status LED on the front of the router the subnet mask on the host

Observable 1 correctness of response

Description 2 points for Option 4 0 points for any other option

Max Value 2

What statement describes the filtering of traffic via the use of Stateful Packet Inspection? It recognizes and filters predefined URLs It permits access that is based on the application. It permits access based on IP or MAC addresses. It permits incoming packets that are legitimate responses to requests from internal hosts. It translates an internal address or group of addresses into a public address that is sent across the network.

Observable 1 correctness of response

Description 2 points for Option 4 0 points for any other option

Max Value 2

Refer to the exhibit. An educational institution needs to connect PC systems that use private IP addressing to the Internet. They hav multiple systems that need to access the Internet, but were only able to purchase one public IP address. What should be activated o the Linksys integrated router to achieve this goal? authentication DHCP

encryption firewall NAT WEP

Observable 1 correctness of response

Description 2 points for Option 5 0 points for any other option

Max Value 2

Refer to the exhibit. Which statement is true based on the information that is shown in the exhibit? All wireless devices that are connected to this AP must have an assigned SSID of College. Any wireless client that is attached to this AP must have the same IP address and SSID. The AP is not physically wired to the local LAN. This configuration is found only in an ad hoc wireless network.

Observable 1 correctness of response

Description 2 points for Option 1 0 points for any other option

Max Value 2

When terminating a UTP cable, why is it important to push the wires all the way into the end of the connector? to allow the cable to endure more stretching or twisting to ensure good electrical contact to ensure that the wires are in correct order to minimize crosstalk

Observable 1 correctness of response

Description 2 points for Option 2 0 points for any other option

Max Value 2

Which network design layer provides a connection point for end user devices to the network? access core distribution network

Observable 1 correctness of response

Description 2 points for Option 1 0 points for any other option

Max Value 2

Which portion of the packet does a router use to forward the packet to the destination? source IP address user data destination IP address control information destination MAC address

Observable 1 correctness of response

Description 2 points for Option 3 0 points for any other option

Max Value 2

As an assignment, a computer science student needs to present data in binary format. What are the two possible values that the student use? (Choose two.) 0 1 2 A F

Observable

Description

Max Value 2

Option 1 and Option 2 are correct. 1 correctness of response 1 point for each correct option. 0 points if more options are selected than required.

Which three addresses belong to the category of private IP addresses? (Choose three.) 10.0.0.1 128.0.0.1 150.0.0.1 172.16.0.1 192.168.31.19 172.168.31.1

Observable

Description

Max Value 3

Option 1, Option 4, and Option 5 are correct. 1 correctness of response 1 point for each correct option. 0 points if more options are selected than required.

Which two transport layer protocols are used to transfer messages between hosts? (Choose two.) DHCP FTP SMTP TCP UDP

Observable

Description

Max Value 2

Option 4 and Option 5 are correct. 1 correctness of response 1 point for each correct option. 0 points if more options are selected than required.

What is the default subnet mask for the IP address 128.107.23.10? 255.0.0.0 255.255.0.0 255.255.255.0 255.255.255.255

Observable 1 correctness of response

Description 2 points for Option 2 0 points for any other option

Max Value 2

What wireless technology has the ability to communicate with many devices at the same time, makes use of the 2.4 GHz band, and is limited to low-speed, short-range communications? RF ISM infrared Bluetooth

Observable 1 correctness of response

Description 2 points for Option 4 0 points for any other option

Max Value 2

TCP/IP data transmission between the source and destination host is encapsulated in four steps: A. adds the data-link header and trailer; B. converts data to bits for transmission; C. adds the network IP address to the header of the packet; D. segments the data for end-to-end transport. What is the correct sequence of these steps? A, B, C, D A, D, B, C B, D, A, C D, C, A, B D, C, B, A

Observable 1 correctness of response

Description 2 points for Option 4 0 points for any other option

Max Value 2

What are two examples of peripheral input devices? (Choose two.) external modem barcode reader digital camera plotter printer

Observable

Description

Max Value 2

Option 2 and Option 3 are correct. 1 correctness of response 1 point for each correct option. 0 points if more options are selected than required.

Which three statements describe an IP address? (Choose three.) An IP address is known as a logical address. An IP address uses a 30-bit addressing scheme. An IP address is found in the Layer 2 header during transmission. The network portion of an IP address is burned into a network interface card. An IP address is unique within the same local network. The network portion of an IP address will be the same for all hosts that are connected to the same local network.

Observable

Description

Max Value 3

Option 1, Option 5, and Option 6 are correct. 1 correctness of response 1 point for each correct option. 0 points if more options are selected than required.

What describes the external IP address that is obtained by a router through a cable or DSL modem? a public address that is obtained from ICANN a private address that is manually configured by the administrator a public address that is obtained through DHCP from the ISP a private address that converts to a public address on the internal LAN

Observable 1 correctness of response

Description 2 points for Option 3 0 points for any other option

Max Value 2

What component of a personal computer is responsible for the processing of all data? RAM CPU firewall system bus operating system

Observable 1 correctness of response

Description 2 points for Option 2 0 points for any other option

Max Value 2

A user in a small office is unable to connect to the Internet. The user examines the physical connections to the ISR, a Linksys WRT300N and notices a solid green LED on the port that is wired to the computer. What does the LED indicate about the current state of the port? The ISR is making adjustments to the port. The device is plugged in and traffic is flowing. The computer is plugged in but no traffic is flowing. The ISR does not detect that the computer is plugged in.

Observable 1 correctness of response

Description 2 points for Option 3 0 points for any other option

Max Value 2

Which statement accurately describes what network devices do in the distribution layer of the three layer design model? They interconnect individual hosts. They interconnect multiple companies. They interconnect local network segments. They interconnect the company network to the ISP.

Observable 1 correctness of response

Description 2 points for Option 3 0 points for any other option

Max Value 2

What destination port number would be used if a client wished to establish a secure connection to a web server? 21 53 80 443

Observable 1 correctness of response

Description 2 points for Option 4 0 points for any other option

Max Value 2

Refer to the exhibit. H1 can ping H2, H3, and the Fa0/0 interface of router R1. H2 and H3 but not H1 can ping H4 and H5. What is a poss cause for the H1 failure? Router R1 has no route to the destination network. Switch S1 does not have an IP address configured. The link between router R1 and switch S2 has failed. Host H1 does not have a default gateway configured.

Observable 1 correctness of response

Description 2 points for Option 4 0 points for any other option

Max Value 2

After issuing the ipconfig/all command on a host that has DHCP enabled, a network administrator notes that the output contains faulty I configuration information. What is the first step the administrator should take to resolve this issue? Replace the NIC in the host. Change the IP address of the DHCP server. Use static addressing to assign the correct IP address. Use the release and renew options supported by the ipconfig command.

Observable 1 correctness of response

Description 2 points for Option 4 0 points for any other option

Max Value 2

Close Window

Refer to the exhibit. A Linksys integrated services router is being used by wireless clients to access a server which is directly connecte an Ethernet port on the router. The server and the clients are using DHCP for IP addressing from the Linksys device and are on the sa subnet. The server and the wireless clients are obtaining the correct IP configuration and can ping the Linksys device, but are unable t ping each other. What could be causing this issue? The ping failures indicate a routing problem on the Linksys device. Check for proper routes. The symptoms indicate a physical connection problem on the server. Check for the proper cable type and the physical connectio

The problem is most likely occurring on the Linksys device. Check all configurations on the Linksys device to ensure no security restrictions could be causing the issue. Radio frequency problems are the likely problem if the clients cannot connect to the server on the same subnet. Begin by checkin the signal strength at the wireless clients. Observable 1 correctness of response Description 2 points for Option 3 0 points for any other option Max Value 2

What procedure will help prevent users from detecting a wireless network? Enable WEP. Enable MAC filtering. Disable SSID broadcasts. Change the default administrator password on the AP.

Observable

Description

Max Value

1 correctness of response

2 points for Option 3 0 points for any other option

2

Close Window

An administrator is troubleshooting a network problem that involves the inability of users to reach Internet sites. During troubleshoot the administrator is able to successfully ping web sites by their IP address, but pings to domain names are unsuccessful. Which ser is most likely at fault? DHCP DNS FTP NAT

Observable 1 correctness of response

Description 2 points for Option 2 0 points for any other option

Max Value 2

A user is not able to connect to the network. A PC technician replaces the network cable that connects the PC to the switch port. The u is now able to connect to the network. Which troubleshooting technique did the technician use? top-down substitution divide-and-conquer a combination of top-down and divide-and-conquer

Observable 1 correctness of response

Description 2 points for Option 2 0 points for any other option

Max Value 2

Which Windows PC command line utility can be used to discover the path that a packet takes to reach a destination? ping netstat tracert nslookup ipconfig

Observable 1 correctness of response

Description 2 points for Option 3 0 points for any other option

Max Value 2

A sender uses TCP to transmit multiple segments to a receiver. In the middle of the transmission, the sender does not receive an acknowledgement for one of the segments. What will occur? The sender will retransmit the entire message. The sender will discontinue sending the remaining segments of the message. The receiver will switch to UDP for the remainder of the message transfer. The sender will resend the segment that was damaged or lost.

Observable 1 correctness of response

Description 2 points for Option 4 0 points for any other option

Max Value 2

Refer to the exhibit. PC1 and PC2 cannot connect to the web server, www.cisco.com, but they can ping each other. What are three troubleshooting steps that will help identify the problem? (Choose three.) Ping the web server from GTWY1. Ping the default gateway from PC2. Use the tracert command on PC2 to the web server. Use the ipconfig command on PC1 to check the default gateway. Run the netstat command on PC2 to see the active TCP connections. Use the nslookup command on the PC1 to attempt to resolve www.cisco.com.

Observable

Description

Max Value 3

Option 1, Option 3, and Option 6 are correct. 1 correctness of response 1 point for each correct option. 0 points if more options are selected than required.

What is a major characteristic of asymmetric Internet service? Download speeds and upload speeds are equal. Download speeds are faster than upload speeds. Data traffic speeds are faster than voice traffic speeds. Used when consistently uploading large amounts of graphics, video and multimedia traffic.

Observable 1 correctness of response

Description 2 points for Option 2 0 points for any other option

Max Value 2

Close Window

Which protocol is used by a client to retrieve an e-mail from a remote server using a TCP/IP connection? DNS FTP POP HTTP

Observable 1 correctness of response

Description 2 points for Option 3 0 points for any other option

Max Value 2

Two switches are interconnected in the same wiring closet. What type of cable is typically used for this connection? UTP straight-through multimode fiber UTP crossover coaxial

Observable 1 correctness of response

Description 2 points for Option 3 0 points for any other option

Max Value 2

A host wants to send information simultaneously to all the other hosts in the same network. Which domain will support this type of communication? broadcast unicast local multicast

Observable 1 correctness of response

Description 2 points for Option 1 0 points for any other option

Max Value 2

What is an advantage of purchasing a custom-built computer? It is beneficial for less knowledgeable consumers. The waiting period for assembly is negligible. The cost is lower compared to a computer that has been preassembled. The user can specify high-performance components to meet specific needs.

Observable 1 correctness of response

Description 2 points for Option 4 0 points for any other option

Max Value 2

A college network administrator is planning a wireless LAN to provide service in the student lounge and outdoor patio. The requiremen include a range of at least 80 meters and a speed of 30 Mb/s. Which wireless LAN standard meets these requirements? 802.11 802.11a 802.11b 802.11g

Observable 1 correctness of response

Description 2 points for Option 4 0 points for any other option

Max Value 2

Which type of network attack occurs when an unauthorized person tries to persuade a user to share a network user ID and password?

brute force denial of service data manipulation social engineering

Observable 1 correctness of response

Description 2 points for Option 4 0 points for any other option

Max Value 2

Refer to the exhibit. What default gateway address will be assigned to PC1 if access to remote resources is needed? 192.31.7.3 192.168.1.101 192.168.1.253 A default gateway is not necessary.

Observable 1 correctness of response

Description 2 points for Option 3 0 points for any other option

Max Value 2