14
What is a function of the distribution layer in the hierarchical desig model? to provide latency free switching to organize end devices in small manageable groups to provide connectivity using the high-speed backbone to provide connectivity between smaller local networks 2 Which device is often configured to act as both a DHCP client and a DH server? home PC ISP modem wireless-enabled laptop integrated services router 3 What are two examples of peripheral input devices? (Choose two.) external modem barcode reader digital camera plotter printer 4 In IP telephony, what is the purpose of a gateway to the PSTN? to connect IP voice clients to Internet phone service to create a peer-to-peer connection between two IP voice clients to map unique names of IP voice endpoints to a client list on a voi server to allow IP voice clients to communicate with regular analog teleph 5 Which protocol is used by a client to browse the web server? FTP HTTP POP SMTP 6 TCP/IP data transmission between the source and destination host is encapsulated in four steps: A. adds the data-link header and trailer; B. converts data to bits for transmission;

Finakl Exam

Embed Size (px)

Citation preview

Page 1: Finakl Exam

What is a function of the distribution layer in the hierarchical design model?to provide latency free switching

to organize end devices in small manageable groups

to provide connectivity using the high-speed backbone

to provide connectivity between smaller local networks

2Which device is often configured to act as both a DHCP client and a DHCP server?home PC

ISP modem

wireless-enabled laptop

integrated services router

3 What are two examples of peripheral input devices? (Choose two.)external modem

barcode reader

digital camera

plotter

printer

4In IP telephony, what is the purpose of a gateway to the PSTN?to connect IP voice clients to Internet phone service

to create a peer-to-peer connection between two IP voice clients

to map unique names of IP voice endpoints to a client list on a voice server

to allow IP voice clients to communicate with regular analog telephones.

5 Which protocol is used by a client to browse the web server?FTP

HTTP

POP

SMTP6 TCP/IP data transmission between the source and destination host is encapsulated in four steps:

A. adds the data-link header and trailer;B. converts data to bits for transmission;C. adds the network IP address to the header of the packet;D. segments the data for end-to-end transport.

What is the correct sequence of these steps?A, B, C, D

A, D, B, C

Page 2: Finakl Exam

B, D, A, C

D, C, A, B

D, C, B, A

7

Refer to the graphic. Based on the information that is shown, what statement is true?This configuration would be commonly found in an ad hoc wireless network.Any wireless client that is attached to this access point would have the same IP address and SSID.All wireless devices that are connected to this access point must have an assigned SSID of Academy.In addition to accepting wireless client requests, this access point must connect to the wired network.

8 Some new features are available for the OS that is currently running on a user's PC. What method should be chosen so that the user can install these new feature sets?

clean install

multi-boot

upgrade

virtualization

9Which type of computer uses an integrated monitor and keyboard?pocket PC

laptop

mainframe

server

workstation

10 What is the default subnet mask for the IP address 128.107.23.10?255.0.0.0

255.255.0.0

255.255.255.0

255.255.255.255

Page 3: Finakl Exam

Which two causes of networking problems are related to the physical layer? (Choose two.)disconnected cables

improper operation of cooling fans

incorrect MAC address

incorrect default gateway

incorrect subnet mask

12What does the term "attenuation" mean in data communication?loss of signal strength as distance increases

time for a signal to reach its destination

leakage of signals from one cable pair to another

strengthening of a signal by a networking device

13 Which network design layer provides a connection point for end user devices to the network?access

core

distribution

network

14What destination port number would be used if a client wished to establish a secure connection to a web server?

21

53

80

443

15 A client wishes to establish an FTP session with a remote server. Which two numbers could be assigned to the client source port? (Choose two.)

20

1010

1021

1305

1404

Page 4: Finakl Exam

Refer to the exhibit. Host2 attempts to establish communications with Server1. What action will switch SW1 take prior to forwarding the frame?

flood the frame out all interfaces

learn the MAC address that is associated with Host2

assign a MAC address to Host2 from the MAC table

poll all interfaces to learn their assigned IP addresses

17

Refer to the exhibit. If H4 sends a message to H1 and the destination MAC address is in the MAC table for both Switch1 and Switch2, which host devices will receive the message?

only H1

Page 5: Finakl Exam

hosts H1 and H4

all hosts that are connected to Switch1

all hosts that are connected to Switch1 and Switch2

18 Which IP address type is intended for a specific host?broadcast

multicast

simulcast

unicast

19A computer joins the network and announces itself to all hosts on the LAN. What type of message does the computer send out?

broadcast

simulcast

multicast

unicast

20 A college network administrator is planning a wireless LAN to provide service in the student lounge and outdoor patio. The requirements include a range of at least 80 meters and a speed of 30 Mb/s. Which wireless LAN standard meets these requirements?

802.11

802.11a

802.11b

802.11gA network engineer wants to represent confidential data in binary format. What are the two possible values that the engineer can use? (Choose two.)

0

1

2

A

F

22A network designer is working with a small company to determine the network type best suited to the needs of the company. Which two characteristics could the designer use to describe a peer-to-peer network to the owner of the company? (Choose two.)

central administration

easy to install

low cost

scalable

secure

Page 6: Finakl Exam

23 A home user is looking for an ISP connection that provides high speed digital transmission over regular phone lines. What ISP connection type should be used?

DSL

dial-up

satellite

cell modem

cable modem

24What is the name for the contract between a customer and an ISP that specifies requirements for uptime and service response time?

DSL

IAB

NAP

SLA

25 What is the purpose of creating a DMZ during network firewall implementation?to create a server security zone accessible only to internal clients

to create a dirty zone that allows all inbound and outbound traffic

to allow for a publicly accessible zone without compromising the internal network

to specify a higher security level than normally required for the internal production networkWhat describes the external IP address that is obtained by a router through a cable or DSL modem?

a public address that is obtained from ICANN

a private address that is manually configured by the administrator

a public address that is obtained through DHCP from the ISP

a private address that converts to a public address on the internal LAN

27A network administrator has been notified that users have experienced problems gaining access to network resources. What utility could be used to directly query a name server for information on a destination domain?

ping

tracert

netstat

ipconfig

nslookup

28

Page 7: Finakl Exam

Refer to the graphic. Assume that the command output is from a wireless DHCP client that is connected to a Linksys integrated router. What can be deduced from the output?

The wireless connection is good.

The WEP key or SSID needs to be checked.

The DHCP configuration on the router needs to be checked.

The wireless NIC driver or the NIC itself needs to be reinstalled.

29What component of a personal computer is responsible for the processing of all data?RAM

CPU

firewall

system bus

operating system

30

Refer to the exhibit. Assume that the exhibited output is from a host that is connected to a Linksys integrated router. What is the first thing that should be checked if using a bottom-up troubleshooting approach?

Page 8: Finakl Exam

the default gateway on the host

the IP address on the host

the IP address on the router

the link status LED on the front of the router

the subnet mask on the hostWhat is an ISP?

It is a standards body that develops cabling and wiring standards for networking.

It is a protocol that establishes how computers within a local network communicate.

It is an organization that enables individuals and businesses to connect to the Internet.It is a networking device that combines the functionality of several different networking devices in one.

32What are two characteristics of a MAC address? (Choose two.)It indicates the physical location of the host within the network.

It is dynamically assigned by a DHCP server.

It is displayed in HEX characters.

It is a physical address.

It is cable-based.

33 Which protocol is used to transfer files among network devices and perform file-management functions?

DNS

FTP

HTML

HTTP

34A network technician suspects that malware on a user PC is opening multiple TCP connections to a specific foreign host address. Which Windows command line utility can be used to confirm the multiple TCP connections?

ping

netstat

tracert

ipconfig

nslookup

35 What is an advantage of purchasing a custom-built computer?It is beneficial for less knowledgeable consumers.

The waiting period for assembly is negligible.

The cost is lower compared to a computer that has been preassembled.

Page 9: Finakl Exam

The user can specify high-performance components to meet specific needs.Which protocol in its default configuration downloads e-mail messages to the client computer and deletes them from the server?

FTP

POP3

SMTP

IMAP4

37For the second time in a week, workstations on a LAN are not able to log into the server. The technician fixed the problem the first time, but cannot remember the steps taken to solve it. What aspect of the troubleshooting process has the technician neglected?

identifying the problem

asking end-users questions

documenting the troubleshooting process

using structured techniques to solve a problem

38

Refer to the exhibit. A user sets up a home network and uses a crossover cable from Switch1 to the Internet port on the ISR. However, there is no connection between the host H1 and the server. What should the user do in order to establish a connection?

Replace the cable with a console cable.

Replace the cable with a rollover cable.

Replace the failed crossover cable with a working crossover cable.

Replace the cable with a straight-through cable.

Page 10: Finakl Exam

39The area covered by a single AP is known as what?ad-hoc network

basic service set

independent basic service set

extended service set

distribution system

40 Which troubleshooting technique can be used to quickly restore user functionality without having to spend much time identifying the exact problem?

top-down

bottom-up

substitution

trial and error

Showing 8 of 11 Next> Page:   GO <Prev

Which wireless protocol is used for encryption?EAP

Open

PSK

WEP

42

Refer to the exhibit. An educational institution needs to connect PC systems that use private IP addressing to the Internet. They have multiple systems that need to access the Internet, but were only able to purchase one public IP address. What should be activated on the Linksys integrated

Page 11: Finakl Exam

router to achieve this goal?authentication

DHCP

encryption

firewall

NAT

WEP

43 What must be identical on all devices in a WLAN for successful wireless communication between the devices?

SSID

antenna type

network mode

wireless NIC driver

44Which type of network supports DHCP and DNS services for network users in a network domain?client/server

peer-to-peer

hierarchical

ad hoc

45 What two pieces of information should a help desk technician document while troubleshooting connectivity issues with an end user? (Choose two.)

the CPU clock speed of the computer

the number of network jacks that are in the room

if the user can ping the default gateway address

if the word processing software is installed correctly

whether the PC uses dynamic or static IP addressingWhich adapter card would be required for a PC to exchange information with other PCs on a LAN?

NIC

video card

sound card

internal modem

47How does a straight-through cable connect two unlike devices?It connects the receive pins on the first device to the receive pins on the second device.

It connects the transmit pins on the first device to the receive pins on the second device.

It disconnects the transmit pins and uses only the receive pins.

It uses the same pins for transmitting and receiving.

Page 12: Finakl Exam

48 What is the purpose of the ipconfig command?to force a client to give up its current IP address

to force the client to clear all IP-to-domain-name associations that is has learned

to force the client to clear all the MAC-address-to-IP-address associations that it has learned

to show the current IP configuration on the client

49What is the purpose of pop-up blocker software?It detects and removes spyware.

It detects and removes viruses.

It prevents the display of advertisement windows.

It removes unwanted e-mail.

50 What statement describes the filtering of traffic via the use of Stateful Packet Inspection?It recognizes and filters predefined URLs

It permits access that is based on the application.

It permits access based on IP or MAC addresses.

It permits incoming packets that are legitimate responses to requests from internal hosts. It translates an internal address or group of addresses into a public address that is sent across the network.

Your school network blocks all websites related to online gaming. What type of security policy is being applied?

identification and authentication

remote access

acceptable use

incident handling

52What portion of the destination IP address is used as a packet is routed through the Internet?subnet mask

host portion

network portion

default gateway address