1. Two switches are interconnected in the same wiring
closet. What type of cable is typically used for this connection?
*UTP crossover
2. When terminating a UTP cable, why is it important
to push the wires all the way into the end of the connector?
*to ensure good electrical
3. Which two causes of networking problems are related to
the physical layer? (Choose two.)
*damaged cables and connectors
*overheated components
*overheated components
4. What is the default subnet mask for the IP address
128.107.23.10?
* 255.255.0.
* 255.255.0.
5. Some new features are available for the OS that is
currently running on a user's PC. What method should be chosen so that the user
can install these new feature sets?
*upgrade
6. Refer to the exhibit. Assume that the command
output is from a wireless DHCP client that is connected to a Linksys integrated
router. What can be deduced from the output?
*The wireless connection is operational.
7. Refer to the
exhibit. The security policy of an organization requires users to change their
password every week. Which type of security policy is this?
* password
8.TCP/IP data transmission between the source and
destination
host is de-encapsulated in four steps:
A. The TCP header is removed.
B. Bits are decoded and the destination MAC address is recognized.
C. The IP header is removed and the contents are passed to the next layer.
D. The Ethernet header and trailer are removed.
8. What is the correct sequence of these steps?
*B, C, D, A *
host is de-encapsulated in four steps:
A. The TCP header is removed.
B. Bits are decoded and the destination MAC address is recognized.
C. The IP header is removed and the contents are passed to the next layer.
D. The Ethernet header and trailer are removed.
8. What is the correct sequence of these steps?
*B, C, D, A *
9. Which type of network supports DHCP and DNS
services for network users in a network domain?
*ad hoc
10. Which of the following statements best describes
DNS?
*DNS servers are used to map a name to an IP address.
*DNS servers are used to map a name to an IP address.
11. A computer joins the network and announces itself
to all hosts on the LAN. What type of message does the computer send out?
*broadcast
*broadcast
12. When NAT is employed in a small office, which
address type is typically used for hosts on the local LAN?
*private IP addresses
13. How do ISPs obtain public IP addresses?
*They obtain the addresses from the Internet registry.
14. Which value would be considered the physical
address for data that is sent across an Ethernet segment?
*MAC address
15. What is true about a wireless access point that is
equipped with an omnidirectional antenna?
*radiates the signal equally in all directions
16. Which wireless protocol is used for encryption?
*WEP
17. A technician can ping the public registered IP
address of www.cisco.com but cannot successfully ping the URL address
www.cisco.com from a host computer. Which software utility can the technician
use to diagnose the problem?
*Ipconfig
18. Refer to the exhibit. A network technician is
statically assigning an IP address to a PC. The default gateway is correct.
What would be a valid IP address to assign to the host?
*128.107.255.1
19. What two commands can be used to form a new
binding if client information does not agree with the DHCP client table?
(Choose two.)
*ipconfig /release
* ipconfig /renew
20. Which statement accurately describes a recommended
strategy for end users to employ when they interact with a help desk
technician?
*Provide as much information about the problem as possible.
21. A home user was successfully browsing the Internet
earlier in the day but is now unable to connect. A ping command from a wireless
laptop to a wired PC in the LAN is successful, but the nslookup command fails
to resolve a website address. The user decides to analyze the LEDs on the
Linksys router to verify connectivity. Which LED should be of main concern in
this situation?
*1-4 Ethernet LEDs
22. Refer to the exhibit. An organization needs to
connect PC systems that use private IP addressing to the Internet. The
organization has multiple systems that need to access the Internet, but were
only able to purchase one public IP address. What should be activated on the
Linksys integrated router to achieve this goal?
*NAT
23. What is a function of NAT when it is configured on
a firewall appliance?
*prevents or allows access to specific application types
based on port numbers
24. Which protocol is used to transfer files among
network devices and perform file-management functions?
*FTP
25. Which statement is true concerning stateful packet
inspection?
*Access is permitted only if it is a legitimate response to
a request from an internal host.
26. Which network design layer provides a connection point
for end user devices to the network?
*network
27. What are two examples of peripheral output devices? (Choose two.)
*headphones
*printer
28. As an assignment, a computer science student needs
to present data in binary format. What are the two possible values that the
student can use? (Choose two.)
*0
*1
29. Why would a corporate web server be assigned a
public IP address instead of a private IP address?
*The public address can be routed on the Internet.
30. What two pieces of information should a help desk technician document while troubleshooting connectivity issues with an end user? (Choose two.)
*if the user can ping the default gateway address
*whether the PC uses dynamic or static IP addressing
31. Refer to the exhibit. What is the purpose of
assigning a network name of University?
*It identifies the wireless LAN.
32. What is an advantage of purchasing a custom-built
computer?.
*The user can specify high-performance components to meet
specific needs.
33. What is specified by the network number in an IP
address?
*the network to which the host belongs
34. After attaching four PCs to the switch ports,
configuring the SSID and setting authentication properties for a small office
network, a technician successfully tests the connectivity of all PCs that are
connected to the switch and WLAN. A firewall is then configured on the device
prior to connecting it to the Internet. What type of network device includes
all of the described features?
*ISR router
35. What is a major characteristic of asymmetric
Internet service?
*Download speeds are faster than upload speeds.
36. Which two components are necessary for a wireless
client to be installed on a WLAN? (Choose two.)
*wireless NIC
*wireless bridge
37. Which two statements are true about network
applications? (Choose two.)
Microsoft Word is an example of a network application.
*Network applications are accessible from a remote
computer..
*Network applications are installed on a network server.
38. Refer to the exhibit. Assume that the exhibited
output is from a host that is connected to a Linksys integrated router. What is
the first thing that should be checked if using a bottom-up troubleshooting
approach?
*the link status LED on the front of the router
39. or devices that do not autosense, which connection
requires a crossover cable?
*PC port to PC port
40. Which type of computer has an integrated mouse?
*laptop
41. A network designer is working with a small company to determine the network type best suited to the needs of the company. Which two characteristics could the designer use to describe a peer-to-peer network to the owner of the company? (Choose two.)
*easy to install
*low cost
42. Users are complaining that they get no response
from a new application server. What tool would determine if the client
application is successfully connecting to the application on the new server?
*ping
43. Which function is available on the network when
TCP is used as the transport protocol?
*traffic encryption
44. For the second time in a week, workstations on a
LAN are not able to log into the server. The technician fixed the problem the
first time, but cannot remember the steps taken to solve it. What aspect of the
troubleshooting process has the technician neglected?
*documenting the troubleshooting process
45. A user is unable to send e-mail. To begin troubleshooting this problem, the network technician uses the browser on the PC and tries to access some popular Internet websites. Which troubleshooting approach is being followed?
* top-down
46. Refer to the exhibit. Why would a network
administrator use the network mode that is shown?
*to support hosts that use different 802.11 standards
47. Which of the following are transport layer
protocols of the TCP/IP model? (Choose two.)
*UDP
*TCP
48. Which Windows command is used to display the configured IP address, subnet mask, and default gateway?
*ipconfig
50. What destination IP address is used in a unicast packet?
*a specific host
Hello gan saya mau kerja sama nih www.ceaster.com boleh minta nomor hp yang bisa dihubungin ?
Posting Komentar
Perhatian Para Pembaca!
Dilarang Keras:
1. Menggunakan kata-kata kotor dalam menulis komentar, terima kasih atas partisipasi saudara/i.
2. Menulis link hidup, link yang tidak berkaitan.
3. Silahkan sertakan sumber jika meng-copy tulisan di atas.
4. Sangat disarankan untuk memfollow blog ini.
5. Jangan lupa untuk berlangganan artikel terbaru.