You are on page 1of 18

3333333333333

1. A collision has occurred on an Ethernet network. Which three statements


explain the CSMA/ CD process?
-Z--After the jam signal, all transmission stops for a random period.
When collision is detected, the hosts stop transmission immediately.
When the collision is detected, the hosts stop transmission after eight microsec
onds
-Z--When the back off period expires, the hosts involved in the collision have p
riority to transmit
When the back off period expires, each host checks to see whether the networking
media is idle and then attempts to transmit.
-Z--When the collision is detected, the hosts continue to transmit using a jam p
attern for a short time to ensure that all hosts detect the collision.
2. What should a network administrator consider when migrating to Gigabit E
thernet architecture form fast Ethernet? (Choose three)
-Z--Existing NICs might need to be upgraded.
-Z--Existing switches might need to be upgraded.
Existing NICs must support half-duplex mode.
Existing UTP wiring must be replaced with fiber.
-Z--Existing UTP must be tested for CAT 5e compatibility.
Existing network topology must support shared media.
3. Refer to the exhibit. What must be configured on Host B to allow it to c
ommunicate with the host C? (Choose three.)
The MAC address of RTA router interface connected to switch 1
-Z--A unique host IP addresses
The IP address of switch 1
The default gateway address
-Z--The MAC address of host C
-Z--The subnet mask for the LAN
4. What are the three characteristics of the TCP protocol? (Choose three.)
Exchanges datagram unreliably
Is used to send IP error messages
-Z--Forces the retransmission of unacknowledged packets
-Z--Creates a virtual session between end-user applications
Carries the IP address of the destination host in the TCP header
-Z--Is responsible for breaking messages into segments and reassembling them at
their destination
5. Refer to the exhibit. The connections in the exhibit are labeled A throu
gh E. Which of these indicate WAN links? (Choose Three
Link A
-Z--Link B
-Z--Link C
-Z--Link D
Link E

6. Refer to the exhibit. Cable 1 and cable 2 have the ends wired for specif
ic physical layer requirements. The table lists each segment by number and the c
able which has been installed by the network technician between the network comp
onents on that segment. From the data given, which segments have the correct cab
le installed? (Choose three.)
-Z--Segment1
Segment2
-Z--Segment3
-Z--Segment4
Segment5
7. What is true regarding network layer addressing? (Choose Three)
Uses a flat structure
Prevent broadcasts
-Z--Hierarchical
-Z--Uniquely indentifies each host
48 bits in length
-Z--Contains a network portion

8. Refer to the exhibit. Which the router running NAT, what IP addresses ca
n be applied to the computer to allow access to the Internet? (Choose three)
192.168.18.38
192.168.18.48
-Z--192.168.18.49
-Z--192.168.18.52
-Z--192.168.18.59
192.168.18.63
9. Which three IPv4 addresses represent a broadcast for a subnet? (Choose t
hree)
-Z--172.16.4.63/26
172.16.4.129/26
-Z--172.16.4.191/26
172.16.4.51/27
-Z--172.16.4.95/27
172.16.4.221/27
10. What are three characteristics of CSMA/CD? (Choose three)
Devices can be configured with a higher transmission priority.
A jam signal indicates that the collision has cleared and the media is not busy.
-Z--A device listens and waits until the media is not busy before transmitting.
The device with the electronic token is the only one that can transmit after a c
ollision.
-Z--All of the devices on a segment see data that passes on the network medium.
-Z--After detecting a collision, hosts cam attempt to resume transmission after
a random time delay has expired.
11. Refer to the exhibit. What three statements are true about the IP config
uration that is shown? (Choose three)
-Z--The address that is assigned to the computer represents private addressing.
-Z--The computer is unable to communicate outside of the local network.
The network of this computer can have 126 hosts.
-Z--The prefix of the computer address is /27.
The IP address that is assigned to the computer is routable on the Internet.
The IP address that is assigned to the computer is a broadcast address.
12. Which three statements characterize the transport layer protocols? (Choo
se three.)
-Z--TCP and UDP port number are used by application layer protocols.
TCP uses port numbers to provide reliable transportation of IP packets.
UDP uses windowing and acknowledgements for reliable transfer of data.
-Z--TCP uses windowing and sequencing to provide reliable transfer of date.
-Z--TCP is a connection-oriented protocol. UDP is a connectionless protocol.
13. Which of the following are the addresses ranges of the private IP addres
ses? (Choose three)
-Z--10.0.0.0 to 10.255.255.255
200.100.50.0 to 200.100.25.255
150.150.0.0 to 150.150.255.255
-Z--172.16.0.0 to 172.31.255.255
-Z--192.168.0.0 to 192.168.255.255.
127.16.0.0 to 127.31.255.255

14. Which three statements are true about local and network applications? (C
hoose three.)
A local application is loaded in a local computer and can be accessed from by a
remote computer on the network.
-Z--A network application is loaded in a local computer and accessed from a remo
te computer.
-Z--A application is loaded in a computer and accessed only by the local
computer.
A network application is loaded in a local computer and accessed only by
the local computer.
An example of a network application is e-mail.
-Z--A example of a network application is instant messaging.

15. Which of the following are the address ranges of the private IP addresse
s? (Choose three.)
-Z--10.0.0.0 to 10.255.255.255
200.100.50.0 to 200.100.25.255
150.150.0.0 to 150.150.255.255
-Z--172.16.0.0 to 172.31.255.255
-Z--192.168.0.0 to 192.168.255.255
127.16.0.0 to 127.31.255.255

16. Refer to the graphic. Based on the configuration information that is sho
wn, which three types of 802.11 networks are allowed access to the WLAN? (Choose
three.)
802.11a
-Z--802.11b
802.11e
-Z--802.11g
-Z--802.11n
802.11x

2222222222222
1. Which devices segment collision domains? (Choose two)
Transceiver
-Z--Router
-Z--Switch
HUB
Media

2. Which of the following devices extend a collision domain? (Choose two)


Switch
-Z--Hub
Bridge
Router
-Z--Repeater

3. Workstation A sends data to workstation B. what will have to be altered


as the data passes through the router? (Choose two.)
-Z--Layer 1 bit pattern
-Z--Layer 2 frames
Layer 3 packets
Layer 4 segments
Layer 5-7 data

4. Which protocols are TCP/IP application layer protocols? (Choose two.)


UDP
-Z--FTP
IP
-Z--SMTP
TCP

5. Which technologies are considered to be WAN technologies? (choose two.)


Ethernet
-Z--DSL
Token Ring
-Z--Frame Relay
FDDI

6. Which subnet masks would be valid for a subnetted Class B address? (Choo
se two)
255.0.0.0
255.254.0.0
255.224.0.0
255.255.0.0
-Z--255.255.252.0
-Z--255.255.255.192

7. Refer to the received frame in the exhibit. In what two ways is the info
rmation from the received frame used by a switch? (Choose two)
192.168.10.5 Is used to create an ARP request.
-Z--192.168.10.5 is used to build the forwarding table.
1234.5678.1abc is stripped from the frame header.
192.168.10.11 is left intact as the frame is forwarded.
The switch compares 192.168.10.11 to the addresses in the routing table to make
the forwarding decision.
-Z--To make the forwarding decision, the switch looks in its switch table for ad
dress aaaa.bbbb.cccc.

8. Refer to the exhibit. Host A is being manually configured for connectivi


ty to the LAN. Which two addressing scheme combinations are possible configurati
ons that can be applied to the host for connectivity? (Choose two.)
Address - 192.168.1.14 Gateway 192.168.1.33
Address - 192.168.1.45 Gateway 192.168.1.33
Address - 192.168.1.32 Gateway 192.168.1.33
-Z--Address - 192.168.1.82 Gateway 192.168.1.65
Address - 192.168.1.63 Gateway 192.168.1.65
-Z--Address - 192.168.1.70 Gateway 192.168.1.65
9. Due to a security violation, the router password must be changed. What i
nformation can be learned from the following configuration entries? (Choose two)
Router (config)#line vty 0 3 router (config line)# password c13c0
Router(config-line)# login
The entries specify three Telnet lines for remote access.
-Z--The entries specify four Telnet lines for remote access.
The entries set the console and Telnet password to c13c0
Telnet access will be denied because the Telnet configuration is incomplete.
-Z--Access will be permitted for Telnet using c13c0 as the password.

10. Refer to the exhibit. What two facts can be determined about the exhibit
ed topology? (Choose two)
-Z--A single broadcast domain is present
Two logical address ranges are required.
Three broadcast domains are shown.
Four networks are needed.
-Z--Five collision domains exist.

11. Refer to the exhibit. What two facts can be determined from the informat
ion that is given? (Choose two.)
This exchange is part of the three-way handshake.
The source port indicates that a Telnet session has been initiated.
The data is flowing from server to client.
-Z--The destination port indicates that an HTTP section has been initiated.
-Z--The data listed is associated with the transport layer.
The source port does not support communication with the destination port that is
listed.
12. Refer to exhibit. Which two statements describe the information that is
represented in the header? (Choose two.)
This is a server response
The UDP protocol is being used
-Z--The destination port indicates a Telnet session.
-Z--The return segment will contain a source port 23.
The next session originated from the client of this session will use the source
port number 13358.

13. Which type of media is immune to ENI and RFI? (Choose two.)
10 Base-T
10 Base-2
10 Base-5
-Z--100 Base-FX
100 Base TX
-Z--1000 Base LX

14. Which two functions of the OSI model occur at layer two? (Choose two.)
-Z--Physical addressing
Encoding
Routing
Cabling
-Z--Media access control

15. What are two characteristics of the data link layer? (Choose two.)
-Z--It segments and reorders the data.
It exchanges the frames between nodes.
-Z--it defines the method by which network devices place data onto the media.
It manages the transfer of data between the processes that run on each host.
It retrieves signals from the media and restores

16. A wireless DHCP client cannot connect to the Internet through a Linksys
integrated router. When you type ipconfig on the host, no IP address, subnet mas
k, or default gateway shows. What are two of the first you will check? (Choose t
wo.)
-Z--SSID
-Z--if the wireless client cannot is configured for DHCP
The cable between client and integrated router
The firewall configuration on the integrated router
If the correct default gateway is configured on the client
If the correct default gateway is configured on the integrated router

17. When acting as DHCP server, an integrated router can provide what three
types of information to a client? (Choose three.)
Physical address
MAC address
-Z--Default gateway
Static IP address
-Z--Dynamic IP address

18. What two commands can be used to form a new binding if client informatio
n does not agree with the DHCP client table? (Choose two.)
-Z--IPconfig/release
IPconfig/all
IPconfig/flushdns
-Z--IPconfig/renew

19. What are two advantages of purchasing a custom-built computer? (Choose t


wo.)
-Z--Usually a lower cost
No waiting period for assembly
-Z--User can specify higher performance components
Supports higher-end graphics and gaming applications

20. What two commands can be used to form a new binding if client informatio
n does not agree with the DHCP client table? (Choose two.)
-Z--IPconfig/release
IPconfig/all
IPconfig/flushdns
-Z--IPconfig/renew
IPconfig

21. What are two advantages of purchasing a custom-built computer? (Choose t


wo.)
-Z--Usually a lower cost
No waiting period for assembly
-Z--User can specify higher performance components
Supports higher-end graphics and gaming applications
Fewer components to replace

22. Which two statements correctly describe Media Access Control (MAC) addre
sses? (Choose two.)
-Z--MAC addresses are used to identify a specific NIC.
-Z--MAC addresses physical addresses.
MAC addresses contain a network number and unique host identification.
MAC addresses are always assigned to network devices by a network administrator.
MAC addresses can be dynamically assigned.

23. What are the two ways that a user can interact with a operating system s
hell?(choose two.)
-Z--CLI
OS
-Z--GUI
NIC
Kernel

24. Select three statements that correctly describe how DHCP services may be
provided. (Choose three.)
An integrated router provides IP configurations for most ISPs.
An integrated router can act as both DHCP server and DHCP client.
A home PC using a static IP address obtained that address from a DHCP server.
-Z--Most home network integrated routers receive an IP configuration directly fr
om their ISP.
-Z--A variety of devices can act as DHCP servers, as long as they run DHCP servi
ce software.

25. Identify two causes of physical layer network problems. (Choose two.)
Logical addressing issues
-Z--Improperly terminated cables
-Z--Cables plugged into wrong ports
Incorrect MAC address assigned
Incorrect subnet mask on an interface

26. Which of the following are transport layer protocols of the TCP/IP model
? (Choose two.)
FTP
-Z--UDP
SMTP
TFTP
-Z--TCP

27. A network host is accessing a web server. What two protocols are most li
kely being used as the TCP/IP model application layer protocol and the internetw
ork layer protocol? (Choose two.)
IP
FTP
-Z--TCP
DHCP
-Z--HTTP
28. What are two examples of storage peripheral devices? (Choose two.)
Printer
-Z--Flash drive
Headphones
-Z--External DVD
Barcode reader

29. What are the two possible values for a digital bit? (Choose two.)
-Z--0
-Z--1
A
F
#
9

1111111111
Set A (CCNA)
1. Refer to the exhibit. How many collision domains are present in the topo
logy?
3
5
6
-Z--7
8
9
2. Refer to the exhibit. An instructor in the network class has given the s
tudents the network diagram and asks the students to select the appropriate netw
ork devices. The goals are to provide a collision-free LAN environment and to pr
ovide internet connectivity. What is the correct design?
Replace box 1 with a hub and box 2 with a router.
Replace box 1 with a router and box 2 with a bridge.
-Z--Replace box 1 with a layer 2 switch and box 2 with a router
Replace box 1 with a router and box 2 with a layer 2 switch
Replace box 1 with a bridge and box 2 with a layer 2 switch
3. Refer to the exhibit. A network administrator attempts to increase the a
vailable bandwidth for workstation A by setting the NIC to full-duplex mode. Aft
er the configuration is changed, there are increased collision and errors occurr
ing. Why is the occurring in the network?
-Z--The NIC is no longer detecting collisions.
The switch will not support full-duplex mode.
The hub will be continually producing a jam signal.
The cabling will not support bidirectional transmissions.
4. Refer to the exhibit. A network administrator is testing a connectivity
issue in the network. The administrator discovers that host A cannot communicate
with host B, host C, or router A. A ping command on host A to 127.0.0.1 succeed
s. The NIC link indicator on host A is illuminated. Temporarily, the administrat
or removes the cable from host A and uses the LAN cable from host B to connect
from host A to port 1on the switch. While using the substitute cable, host A can
communicate with host C and Router A. at which layer of the OSI model was the p
roblem occurring?
Session
Transport
Network
Data link
-Z--Physical
5. How many broadcast domains are shown in the diagram?
-Z--Three
Four
Five
Six
Seven
Eight

6. Which binary number is a representation of the decimal number 248?


11101000
11110100
-Z--11111000
11111010
7. Which type of address is 223.168.17.167/ 29? 223.168.17.167/ 29
Host address
Multicast address
-Z--Broadcast address
Sub network address

8. Which combination of network id and subnet mask correctly identifies all


IP addresses from 172.16.128.0 through 172.16.159.255?
172.16.128.0 255.255.255.254
172.16.128.0 255.255.0.0
172.16.128.0 255.255.192.0
-Z--172.16.128.0 255.255.224.0
172.16.128.0 255.255.255.192
9. What is the correct number of usable subnetworks and hosts for the IP ne
twork address 192.168.99.0 subnetted with a /29 mask?
6 networks / 32 hosts
14 networks / 14 hosts
-Z--30 networks / 6 hosts
62 networks / 2 hosts
10. Refer to the exhibit. The internetwork in the exhibit has been assigned
the IP address 172.20.0.0. What would be the appropriate subnet mask to maximize
the number of networks available for future growth?
255.255.224.0
255.255.240.0
255.255.248.0
-Z--255.255.252.0
255.255.254.0
255.255.255.0
11. The NIC of computer has been assigned an IP address of 172.31.192.166 wi
th a mask of 255.255.255.248. To which subnet does the IP address belong?
172.31.0.0
172.31.160.0
172.31.192.0
172.31.248.0
-Z--172.31.192.160
172.31.192.248
12. A network user is using the FTP protocol to transfer data from the local
host to an FTP server. The local host is also using the SNMP protocol to report
the system status to the network statement describes the communication from the
host?
FTP and SNMP will use the same port number.
-Z--FTP uses TCP to establish a session before any data is transferred.
The UDP session will reorder the SNMP data as it is received by the network mana
gement system.
The UDP protocol for the FTP transfer will use a random destination port number
to the FTP server.
13. Refer to the exhibit. What is the order of the TCP/ IP protocol data Uni
ts as data is moved as indicated through the OSI model?
Data, segments, frames, packets, bits
Data, packets, segments, frames, bits
-Z--Data, segments, packets, frames, bits
Data, packets, frames, segments, bits
14. Refer to the exhibit. A newly hired technician has a task of terminatin
g CAT 5 UTP cables. The network administrator visually examined the cables the t
echnician terminated. Some of the cables have connectors as shown in the exhibit
. What should the network administrator explain to the technician about the cabl
es?
Both cables are acceptable
-Z--The cable in Graphic A will produce more crosstalk.
The cable in graphic A should be used in the more critical network segments.
The cable in graphic A is preferred because it will be easier to crimp the conne
ctor.

15. Refer to the exhibit. Which type of UTP cable should be used to connect
switch1 to switch2?
Rollover
Console
-Z--Crossover
Straight-through

16. When using category 5 UTP cable, which RJ-45 pin pairs are used to excha
nge data between hosts on an Ethernet network?
1 and 2; 4 and 5
-Z--1 and 2; 3 and 6
3 and 6; 7 and 8
4 and 5; 7 and 8

17. Refer to the exhibit. Which type of cabling should be used at each of
the connection points shown?
Crossover B- straight-through C-straight-through D-fiber E-straight-through
Crossover B-crossover C-straight-through D-fiber E-crossover
-Z--Straight-through B-crossover C-straight-through D-fiber E-straight-through
Fiber B-crossover C-crossover D-crossover E-straight-through
Straight-through B-crossover C-straight-through D-fiber E-straight-through

18. Refer to the exhibit. What type of cable connects the two router togeth
er without any intermediary device?
Console
Rollover
Crossover
Straight-through
19. Which cable diagram displays the end to end pinout for a console cable u
sed with Cisco devices?
Cable a
-Z--Cable B
Cable C
Cable D

20. What type of routing is it when the network administrator manually confi
gures a routes?
-Z--Static
Dynamic
Interior
Exterior

21. Which statement describes a star topology?


Each host in the network is connected to a backbone cable that is terminated at
both ends.
-Z--Each host is connected to a hub or switch, either of which acts as a central
point for all network connections.
Each host is directly connected to two other hosts to form a long chain of hosts
.
Each host has a connection to all other hosts in the network.
22. A technician needs to connect a FasthEthernet port from a router to a Fa
stEthernet port on a switch. The graphic shows RJ-45 cable ends for a patch cabl
e. What result can be expected if this cable is used for the link?
-Z--The cable will be able to pass traffic between the devices.
The cable has reversed-pairs, which will degrade the I quality
The cable has split-pairs, which will increase crosstalk and create an unreliabl
e link.
The cable has all the wires reversed, which will prevent the link lights from in
dicating that there is link.

23. Which layer of the OSI model defines the process of adding the source an
d destination IP address to a data packet?
Transport
-Z--Network
Data link
Physical link

24. Refer to the exhibit. Workstation 1 pings the Fa0/1 interface of Router
1. Which MAC address will workstation 1 obtain during the ARP request for this c
ommunication?
00-06-5B-88-DF-C3
B0-D0-7F-F7-46
00-0B-E5-64-BD-44
-Z--00-08-A3-B6-CE-02
00-08-A3-B6-CE-03

25. Refer to the exhibit. What device does Device X represent in the graphic
to allow PC1 to ping PC4?
Hub
-Z--Router
Bridge
Access point
Layer 2 switch

26. When the receiving workstation detects an error in data it has received,
it does not acknowledge receipt of the data.
The Source workstation retransmits the unacknowledged data. Which layer of the O
SI model supports this process of retransmission?
Network
Application
Session
-Z Transport

27. A company has the following addressing scheme requirements: -currently h


as 25 subnets uses a Class B IP address has maximum of 300 computers on any networ
k segment needs to leave the fewest unused address in each subnet. What subnet ma
sk is appropriate to use in this company?
255.255.240.0
255.255.248.0
-Z--255.255.254.0
255.255.2555.0
255.255.255.128
255.255.255.248

28. What can be verified by successfully pinging the reserved loopback addre
ss on a host?
Connectivity exists between two hosts on the LAN
-Z--The TCP/IP stack of the local host is installed correctly.
A connection exists between a host and the default gateway.
The route a packet takes from the local host to a remote host is valid.

29. Refer to the exhibit. A company needs to attach workstation E at a point


150 meters from an existing hub. What device should be placed at location D to
allow the new host to connect to the network with the least amount of latency?
Router
Switch
Bridge
-Z Repeater

30. Refer to the exhibit. Which type of Category 5 cable is used to make an
Ethernet connection between Host A and Host B?
Coax cable
Rollover cable
-Z--Crossover cable
Straight-through cable
31. A simplified CAM table for switch1 is shown in the exhibit. If host A se
nds a frame with a destination MAC address of 66C, how does the switch process t
his frame?
The switch drops the frame.
The switch sends the frame out port 3.
The switch sends the frame out ports 1, 2, and 4.
-Z--The switch sends the frame out ports 2, 3 and 4.
The switch sends the frame out ports 1, 2, 3, and 4.

32. Which of the following increases the computer for a collision to occur?
The use of an active hub instead of an intelligent hub
The use of an intelligent hub instead of an active hub
A reduction in the number of devices attached to the hub
-Z--An increase in the number of devices attached to the hub
33. Refer to the exhibit. Host A has been added to the network; however, hos
t A cannot communicate with the server B or the Internet. All cables have been t
ested and are functioning to standards. At which layer of the OSI model is this
problem occurring?
Layer 1
Layer 2
-Z--Layer 3
Layer 4
34. A workstation is browsing a web server. What will be the partial content
s of the segment sent from the workstation to the web server?
-Z--1
2
3
4
35. Refer to the exhibit. What is the purpose of the highlighted address?
-Z--It allows the NIC to communicate with other devices on the same network.
It identifies which part of the IP address is to be considered the network porti
on.
It provides an address to which all packets that do not have a specific route ar
e sent.
It uniquely identifies the NIC to the free token that is passed on the Ethernet
network.

36. A user initiates three simultaneous FTP connections from the local host
to the same FTP server. Which OSI layer is responsible for establishing and mana
ging these different FTP connections?
Application
-Z--Session
Transport
Network
Data link

37. Refer to the graphic. Assume that the command output is from a wireless
DHCP client that is connected to a Linksys integrated router. What can be deduce
d from the output?
-Z--the wireless connection is good.
The WEP key or SSID needs to be checked.
The DHCP configuration on the router needs to be checked.
The wireless NIC driver or the NIC itself needs to be reinstalled.
38. What measurement is commonly used to describe communication speed when t
ransferring data?
-Z--bps
Cps
Hz
MB
39. What is an accurate description of network devices in the distribution l
ayer?
They are designed to interconnect individual hosts.
They are designed to interconnect multiple companies.
-Z--They are designed to interconnect local network segments.
They are designed to switch data packets as fast possible.
40. Where do ISPs get the public address that they assign to end users?
ISPs create the addresses themselves.
ISPs are assigned addresses through the RFC.
ISPs obtain their addresses automatically.
-Z--ISPs obtain address blocks from registry organizations.
41. Refer to the graphic. What is the effect of setting the security mode to
WEP on the Linksys integrated router?
It identifies the wireless LAN.
It allows the access point to inform clients of its presence.
It translates IP address into easy-to-remember domain names.
-Z--It encrypts data between the wireless client and the access point.
It ensures that only authorized users are allowed access to the WLAN.
It translates an internal address or group of addresses into an outside, public
address.
42. When are leased lines typically used?
When low bandwidth is required
For home and small business connectivity
-Z--When a dedicated digital data line is necessary
As a less expensive option to cable and DSL modem service
43. Which wireless protocol is used for encryption?
EAP
Open
PSK
-Z--WEP
44. The area covered by a single AP is known as what?
-Z--Ad-hoc network
Basic service set
Independent basic service set
Extended service set
Distribution system
45. Which installation option should be chosen when the current operating sy
stem is too damaged to work properly?
Upgrade
Multi-boot
-Z--Clean install
Virtualization
46. What layer is the first point of entry for a host into the network?
Core layer
-Z--Access layer
Network layer
Distribution layer

47. What information within a data packet does a router use, by default, to
make forwarding decisions?
-Z--The destination MAC address
The destination IP address
The destination host name
The destination service requested
48. What is a service pack?
An access policy
An agreement between a company and a vendor
A piece of code created to fix one specific problem
-Z--A collection of patches and updates released by a vendor
A small piece of software designed specifically for security issues
49. What is an ISP?
It is a standards body that develops cabling and wiring standards for networking
.
It is a protocol that establishes how computers within a local network communica
te.
-Z--It is an organization that allows individuals and businesses to connect to t
he Internet.
It is a networking device that combines the functionality of several different n
etworking devices in one.

50. What is the name for the contract between a customer and a ISP that spec
ifies requirements for uptime and service response time?
DSL
IAB
NAP
-Z--SLA
51. Select the connection that would require a straight-trough cable.
A switch to a hub
-Z--A router to a switch
A switch to a switch
A router to a router
52. Choose the option that shows the correct sequence of steps in the encaps
ulation of TCP/IP data that is passed from a source to a destination host?
A. Converts data to bits for transmission
B. Packages the data for end to end transport
C. Adds the data-link header and trailer
D. Adds the network IP address to the header of the frame
A,B,C,D
A,CD,B
B,D,C,A
B,C,D,A
-Z--D,C,B,A
53. What is specified by the network number in an IP address?
-Z--The network to which the host belongs
The physical identity of the computer on the network
The node of the subnetwork which is being addressed
The broadcast identity of subnetwork
54. Refer to the graphic. What is the purpose of assigning a Network Name of
academy?
-Z--It identifies the wireless LAN.
It translates IP addresses into easy-to-remember domain names.
It encrypts data between the wireless client and the access point.
It allows access to the AP configuration GUI by name rather than address.
It translates an internal address or group of addresses into an outside, public
address.
55. Which of the following statements best describes DNS?
DNS servers are used to map an IP address to a physical address.
-Z--DNS servers are used to map a name to an IP address.
DNS servers are used to configure logical address information for host computers
.
DNS servers are used to translate from private addresses to public addresses.

56. Which protocol is used to transfer files among network devices and perfo
rm file-management functions?
DNS
-Z--FTP
HTML
HTTP

57. Refer to the graphic. Based on the information that is shown, what state
ment is true?
This configuration would be commonly found in an ad hoc wireless network.
Any wireless client that is attached to this access point would have the same IP
address SSID.
-Z--All wireless devices that are connected to this access point must have an as
signed SSID of Academy.
In addition to accepting wireless client requests, this access point must connec
t to the wired network.
58. Which part of the electromagnetic spectrum is commonly used to exchange
data between a PDA and a computer?
FM
Radar
-Z--Infrared
Ultraviolet

59. For the second time in a week, workstations on a LAN are not able to log
into the server. The technician fixed the problem the first time, but cannot re
member the steps taken to solve it. What aspect of the troubleshooting process h
as the technician neglected?
Identifying the problem
Asking end-users questions
-Z--Documenting the troubleshooting process
Using structured techniques to solve a problem
60. What action will a router take when it receives a frame with a broadcast
MAC address?
It will not forward the frame to another network.
It forwards the frame back to the sending host with its IP address as a response
.
-Z--It forwards the frame out of all interfaces except the interface where the f
rame was received.
It forwards the frame back out the receiving interface to insure all hosts on th
e local network receive it.

61. Witch statement is true concerting stateful packet inspection?


Access is permitted based on IP addresses of the source and destination devices.
Access is permitted based on the MAC addresses of the source and destination dev
ices.
Access is permitted only if the type of application that is attempting to reach
the internal host is allowed.
-Z--Access is permitted only if it is legitimate response to a request from an i
nternal host.

62. What does the term attenuation mean in data communication?


-Z--Loss of signal strength as distance increases
Time for a signal to reach its destination
Leakage of signals from one cable pair to another
Strengthening of a signal by a networking device
63. What is the default subnet mask for a class B address?
255.0.0.0
-Z--255.255.0.0
255.255.255.0
255.255.255.255
64. When considering the purchase of a new operating system, what is meant b
y total cost of ownership?
Applications and support costs
Hardware and support costs
Hardware and software costs
-Z--Hardware, software, and support costs
Hardware, operating system, and applications costs
65. A computer joins the network and announces itself to all hosts on the LA
N. What type of message does the computer send out?
-Z--Broadcast
Simulcast
Multicast
Unicast

66. Refer to the graphic. What feature can be installed on the Linksys integ
rated router to convert private IP addresses to Internet-routable addresses?
Authentication
DHCP
Encryption
Firewall
-Z--NAT
WEP
67. When terminating UTP cabling, why is it important to untwist only a smal
l amount of each wire pair?
-Z--Minimizes crosstalk
Makes installation faster
Ensures wires are in correct order
Makes it easier to fit wires into connector
68. A host sent message that all other hosts on the local network received a
nd processed. What type of domain are all these hosts a part of?
Local domain
Multicast domain
Collision domain
-Z--Broadcast domain
69. Your school network blocks all websites related to online gaming. What t
ype of security policy is being applied?
Identification and authentication
Remote access
-Z--Acceptable use
Incident handling
70. Refer to the graphic. Assume that the exhibited output is from a host th
at is connected to a Linksys integrated router. What is one of the first things
you should check?
IP address on the host
IP address on the router
Subnet mask on the host
Default gateway on the host
-Z--Link status LED on the front of the router
71. How does a crossover cable make it possible for two like devices (for exam
ple. Two switches) to communicate?
The transmit pins are disconnected and only the receive pins are used.
The transmit pins on the device are connected to the transmit pins on the other
device.
The receive pins on one are connected to the receive pins on the other device.
-Z--The transmit pins on one device are connected to the receive pins on the oth
er device.

72. What type of computer would most likely use a docking station?
-Z--Laptop
Server
Desktop
Mainframe
Workstation

You might also like