skip to main
skip to sidebar
miércoles, 20 de mayo de 2009
For the second time in a week, workstations on a LAN are not able to log into the server. The technician fixed the problem the first time, but cannot remember the steps taken to solve it. What aspect of the troubleshooting process has the technician neglected?
identifying the problem
asking end-users questions
documenting the troubleshooting process
using structured techniques to solve a problem
What is the name for the contract between a customer and an ISP that specifies requirements for uptime and service response time?
What is the purpose of pop-up blocker software?
It detects and removes spyware.
It detects and removes viruses.
It prevents the display of advertisement windows.
It removes unwanted e-mail.
Some new features are available for the OS that is currently running on a user's PC. What method should be chosen so that the user can install these new feature sets?
TCP/IP data transmission between the source and destination host is encapsulated in four steps:
A. adds the data-link header and trailer;
B. converts data to bits for transmission;
C. adds the network IP address to the header of the packet;
D. segments the data for end-to-end transport.
What is the correct sequence of these steps?
A, B, C, D
A, D, B, C
B, D, A, C
D, C, A, B
D, C, B, A
What are two characteristics of a MAC address? (Choose two.)
It indicates the physical location of the host within the network.
It is dynamically assigned by a DHCP server.
It is displayed in HEX characters.
It is a physical address.
It is cable-based.
Which type of network supports DHCP and DNS services for network users in a network domain?
A network designer is working with a small company to determine the network type best suited to the needs of the company. Which two characteristics could the designer use to describe a peer-to-peer network to the owner of the company? (Choose two.)
easy to install
What are two examples of peripheral input devices? (Choose two.)
A network technician suspects that malware on a user PC is opening multiple TCP connections to a specific foreign host address. Which Windows command line utility can be used to confirm the multiple TCP connections?
Which troubleshooting technique can be used to quickly restore user functionality without having to spend much time identifying the exact problem?
trial and error
How does a straight-through cable connect two unlike devices?
It connects the receive pins on the first device to the receive pins on the second device.
It connects the transmit pins on the first device to the receive pins on the second device.
It disconnects the transmit pins and uses only the receive pins.
It uses the same pins for transmitting and receiving.
Which IP address type is intended for a specific host?
The area covered by a single AP is known as what?
basic service set
independent basic service set
extended service set
What must be identical on all devices in a WLAN for successful wireless communication between the devices?
Which two automatic addressing assignments are supported by DHCP? (Choose two.)
local server address
default gateway address
physical address of the recipient
physical address of the sender
A client wishes to establish an FTP session with a remote server. Which two numbers could be assigned to the client source port? (Choose two.)
What does the term "attenuation" mean in data communication?
loss of signal strength as distance increases
time for a signal to reach its destination
leakage of signals from one cable pair to another
strengthening of a signal by a networking device
A network administrator has been notified that users have experienced problems gaining access to network resources. What utility could be used to directly query a name server for information on a destination domain?
A home user is looking for an ISP connection that provides high speed digital transmission over regular phone lines. What ISP connection type should be used?
Refer to the exhibit. An educational institution needs to connect PC systems that use private IP addressing to the Internet. They have multiple systems that need to access the Internet, but were only able to purchase one public IP address. What should be activated on the Linksys integrated router to achieve this goal?
A network engineer wants to represent confidential data in binary format. What are the two possible values that the engineer can use? (Choose two.)
Which adapter card would be required for a PC to exchange information with other PCs on a LAN?
What describes the external IP address that is obtained by a router through a cable or DSL modem?
a public address that is obtained from ICANN
a private address that is manually configured by the administrator
a public address that is obtained through DHCP from the ISP
a private address that converts to a public address on the internal LAN
Which wireless protocol is used for encryption?
Refer to the exhibit. If H4 sends a message to H1 and the destination MAC address is in the MAC table for both Switch1 and Switch2, which host devices will receive the message?
hosts H1 and H4
all hosts that are connected to Switch1
all hosts that are connected to Switch1 and Switch2
What is an advantage of purchasing a custom-built computer?
It is beneficial for less knowledgeable consumers.
The waiting period for assembly is negligible.
The cost is lower compared to a computer that has been preassembled.
The user can specify high-performance components to meet specific needs.
Your school network blocks all websites related to online gaming. What type of security policy is being applied?
identification and authentication
What portion of the destination IP address is used as a packet is routed through the Internet?
default gateway address
Which protocol in its default configuration downloads e-mail messages to the client computer and deletes them from the server?
Refer to the exhibit. Host2 attempts to establish communications with Server1. What action will switch SW1 take prior to forwarding the frame?
flood the frame out all interfaces
learn the MAC address that is associated with Host2
assign a MAC address to Host2 from the MAC table
poll all interfaces to learn their assigned IP addresses
Which network design layer provides a connection point for end user devices to the network?
What component of a personal computer is responsible for the processing of all data?
Which device is often configured to act as both a DHCP client and a DHCP server?
integrated services router
During the process of establishing communications between two hosts, what occurs after a switch finds the destination MAC address in its MAC address table?
A permanent circuit is established between the source and destination ports.
The switch builds a temporary connection between the source and destination ports.
The switch maps the destination MAC address to a destination IP address before forwarding the frame.
All hosts that are attached to the switch will receive the messages that are passed between the source and destination ports.
What is the purpose of creating a DMZ during network firewall implementation?
to create a server security zone accessible only to internal clients
to create a dirty zone that allows all inbound and outbound traffic
to allow for a publicly accessible zone without compromising the internal network
to specify a higher security level than normally required for the internal production network
Refer to the graphic. Based on the information that is shown, what statement is true?
This configuration would be commonly found in an ad hoc wireless network.
Any wireless client that is attached to this access point would have the same IP address and SSID.
All wireless devices that are connected to this access point must have an assigned SSID of Academy.
In addition to accepting wireless client requests, this access point must connect to the wired network.
Which two causes of networking problems are related to the physical layer? (Choose two.)
improper operation of cooling fans
incorrect MAC address
incorrect default gateway
incorrect subnet mask
What is an ISP?
It is a standards body that develops cabling and wiring standards for networking.
It is a protocol that establishes how computers within a local network communicate.
It is an organization that enables individuals and businesses to connect to the Internet.
It is a networking device that combines the functionality of several different networking devices in one.
What statement describes the filtering of traffic via the use of Stateful Packet Inspection?
It recognizes and filters predefined URLs
It permits access that is based on the application.
It permits access based on IP or MAC addresses.
It permits incoming packets that are legitimate responses to requests from internal hosts.
It translates an internal address or group of addresses into a public address that is sent across the network.
Refer to the exhibit. Assume that the exhibited output is from a host that is connected to a Linksys integrated router. What is the first thing that should be checked if using a bottom-up troubleshooting approach?
the default gateway on the host
the IP address on the host
the IP address on the router
the link status LED on the front of the router
the subnet mask on the host
What is the purpose of the
to force a client to give up its current IP address
to force the client to clear all IP-to-domain-name associations that is has learned
to force the client to clear all the MAC-address-to-IP-address associations that it has learned
to show the current IP configuration on the client
Which protocol is used to transfer files among network devices and perform file-management functions?
In IP telephony, what is the purpose of a gateway to the PSTN?
to connect IP voice clients to Internet phone service
to create a peer-to-peer connection between two IP voice clients
to map unique names of IP voice endpoints to a client list on a voice server
to allow IP voice clients to communicate with regular analog telephones.
What two pieces of information should a help desk technician document while troubleshooting connectivity issues with an end user? (Choose two.)
the CPU clock speed of the computer
the number of network jacks that are in the room
if the user can ping the default gateway address
if the word processing software is installed correctly
whether the PC uses dynamic or static IP addressing
A computer joins the network and announces itself to all hosts on the LAN. What type of message does the computer send out?
What is a function of the distribution layer in the hierarchical design model?
to provide latency free switching
to organize end devices in small manageable groups
to provide connectivity using the high-speed backbone
to provide connectivity between smaller local networks
What is the default subnet mask for the IP address 22.214.171.124?
Refer to the exhibit. A user sets up a home network and uses a crossover cable from Switch1 to the Internet port on the ISR. However, there is no connection between the host H1 and the server. What should the user do in order to establish a connection?
Replace the cable with a console cable.
Replace the cable with a rollover cable.
Replace the failed crossover cable with a working crossover cable.
Replace the cable with a straight-through cable.
wireless NIC driver
Which type of computer uses an integrated monitor and keyboard?
Refer to the graphic. Assume that the command output is from a wireless DHCP client that is connected to a Linksys integrated router. What can be deduced from the output?
The wireless connection is good.
The WEP key or SSID needs to be checked.
The DHCP configuration on the router needs to be checked.
The wireless NIC driver or the NIC itself needs to be reinstalled.
Este comentario ha sido eliminado por el autor.
10 de marzo de 2010, 6:51
Any idea where I can find the answer for that test?
10 de marzo de 2010, 6:53
Publicar un comentario
Entrada más reciente
Enviar comentarios (Atom)
Archivo del blog
For the second time in a week, workstations on a L...
Ver todo mi perfil