miércoles, 20 de mayo de 2009

For the second time in a week, workstations on a LAN are not able to log into the server. The technician fixed the problem the first time, but cannot remember the steps taken to solve it. What aspect of the troubleshooting process has the technician neglected?
identifying the problem
asking end-users questions
documenting the troubleshooting process
using structured techniques to solve a problem

2
What is the name for the contract between a customer and an ISP that specifies requirements for uptime and service response time?
DSL
IAB
NAP
SLA

3
What is the purpose of pop-up blocker software?
It detects and removes spyware.
It detects and removes viruses.
It prevents the display of advertisement windows.
It removes unwanted e-mail.

4
Some new features are available for the OS that is currently running on a user's PC. What method should be chosen so that the user can install these new feature sets?
clean install
multi-boot
upgrade
virtualization

5
TCP/IP data transmission between the source and destination host is encapsulated in four steps:

A. adds the data-link header and trailer;
B. converts data to bits for transmission;
C. adds the network IP address to the header of the packet;
D. segments the data for end-to-end transport.

What is the correct sequence of these steps?
A, B, C, D
A, D, B, C
B, D, A, C
D, C, A, B
D, C, B, A

What are two characteristics of a MAC address? (Choose two.)
It indicates the physical location of the host within the network.
It is dynamically assigned by a DHCP server.
It is displayed in HEX characters.
It is a physical address.
It is cable-based.

7
Which type of network supports DHCP and DNS services for network users in a network domain?
client/server
peer-to-peer
hierarchical
ad hoc

8
A network designer is working with a small company to determine the network type best suited to the needs of the company. Which two characteristics could the designer use to describe a peer-to-peer network to the owner of the company? (Choose two.)
central administration
easy to install
low cost
scalable
secure

9
What are two examples of peripheral input devices? (Choose two.)
external modem
barcode reader
digital camera
plotter
printer

10
A network technician suspects that malware on a user PC is opening multiple TCP connections to a specific foreign host address. Which Windows command line utility can be used to confirm the multiple TCP connections?
ping
netstat
tracert
ipconfig
nslookup

Which troubleshooting technique can be used to quickly restore user functionality without having to spend much time identifying the exact problem?
top-down
bottom-up
substitution
trial and error

12
How does a straight-through cable connect two unlike devices?
It connects the receive pins on the first device to the receive pins on the second device.
It connects the transmit pins on the first device to the receive pins on the second device.
It disconnects the transmit pins and uses only the receive pins.
It uses the same pins for transmitting and receiving.

13
Which IP address type is intended for a specific host?
broadcast
multicast
simulcast
unicast

14
The area covered by a single AP is known as what?
ad-hoc network
basic service set
independent basic service set
extended service set
distribution system

15
What must be identical on all devices in a WLAN for successful wireless communication between the devices?
SSID
antenna type
network mode
Which two automatic addressing assignments are supported by DHCP? (Choose two.)
local server address
subnet mask
default gateway address
physical address of the recipient
physical address of the sender

17
A client wishes to establish an FTP session with a remote server. Which two numbers could be assigned to the client source port? (Choose two.)
20
1010
1021
1305
1404

18
What does the term "attenuation" mean in data communication?
loss of signal strength as distance increases
time for a signal to reach its destination
leakage of signals from one cable pair to another
strengthening of a signal by a networking device

19
A network administrator has been notified that users have experienced problems gaining access to network resources. What utility could be used to directly query a name server for information on a destination domain?
ping
tracert
netstat
ipconfig
nslookup

20
A home user is looking for an ISP connection that provides high speed digital transmission over regular phone lines. What ISP connection type should be used?
DSL
dial-up
satellite
cell modem
Refer to the exhibit. An educational institution needs to connect PC systems that use private IP addressing to the Internet. They have multiple systems that need to access the Internet, but were only able to purchase one public IP address. What should be activated on the Linksys integrated router to achieve this goal?
authentication
DHCP
encryption
firewall
NAT
WEP

22
A network engineer wants to represent confidential data in binary format. What are the two possible values that the engineer can use? (Choose two.)
0
1
2
A
F

23
Which adapter card would be required for a PC to exchange information with other PCs on a LAN?
NIC
video card
sound card
internal modem

24
What describes the external IP address that is obtained by a router through a cable or DSL modem?
a public address that is obtained from ICANN
a private address that is manually configured by the administrator
a public address that is obtained through DHCP from the ISP
a private address that converts to a public address on the internal LAN

25
Which wireless protocol is used for encryption?
EAP
Open
PSK
WEP
Refer to the exhibit. If H4 sends a message to H1 and the destination MAC address is in the MAC table for both Switch1 and Switch2, which host devices will receive the message?
only H1
hosts H1 and H4
all hosts that are connected to Switch1
all hosts that are connected to Switch1 and Switch2

27
What is an advantage of purchasing a custom-built computer?
It is beneficial for less knowledgeable consumers.
The waiting period for assembly is negligible.
The cost is lower compared to a computer that has been preassembled.
The user can specify high-performance components to meet specific needs.

28
Your school network blocks all websites related to online gaming. What type of security policy is being applied?
identification and authentication
remote access
acceptable use
incident handling

29
What portion of the destination IP address is used as a packet is routed through the Internet?
subnet mask
host portion
network portion
default gateway address

30
Which protocol in its default configuration downloads e-mail messages to the client computer and deletes them from the server?
FTP
POP3
SMTP
IMAP4
Refer to the exhibit. Host2 attempts to establish communications with Server1. What action will switch SW1 take prior to forwarding the frame?
flood the frame out all interfaces
learn the MAC address that is associated with Host2
assign a MAC address to Host2 from the MAC table
poll all interfaces to learn their assigned IP addresses

33
Which network design layer provides a connection point for end user devices to the network?
access
core
distribution
network

34
What component of a personal computer is responsible for the processing of all data?
RAM
CPU
firewall
system bus
operating system

35
Which device is often configured to act as both a DHCP client and a DHCP server?
home PC
ISP modem
wireless-enabled laptop
integrated services router

During the process of establishing communications between two hosts, what occurs after a switch finds the destination MAC address in its MAC address table?
A permanent circuit is established between the source and destination ports.
The switch builds a temporary connection between the source and destination ports.
The switch maps the destination MAC address to a destination IP address before forwarding the frame.
All hosts that are attached to the switch will receive the messages that are passed between the source and destination ports.

37
What is the purpose of creating a DMZ during network firewall implementation?
to create a server security zone accessible only to internal clients
to create a dirty zone that allows all inbound and outbound traffic
to allow for a publicly accessible zone without compromising the internal network
to specify a higher security level than normally required for the internal production network
cable modem





Refer to the graphic. Based on the information that is shown, what statement is true?
This configuration would be commonly found in an ad hoc wireless network.
Any wireless client that is attached to this access point would have the same IP address and SSID.
All wireless devices that are connected to this access point must have an assigned SSID of Academy.
In addition to accepting wireless client requests, this access point must connect to the wired network.

39
Which two causes of networking problems are related to the physical layer? (Choose two.)
disconnected cables
improper operation of cooling fans
incorrect MAC address
incorrect default gateway
incorrect subnet mask

40
What is an ISP?
It is a standards body that develops cabling and wiring standards for networking.
It is a protocol that establishes how computers within a local network communicate.
It is an organization that enables individuals and businesses to connect to the Internet.
It is a networking device that combines the functionality of several different networking devices in one.
What statement describes the filtering of traffic via the use of Stateful Packet Inspection?
It recognizes and filters predefined URLs
It permits access that is based on the application.
It permits access based on IP or MAC addresses.
It permits incoming packets that are legitimate responses to requests from internal hosts.
It translates an internal address or group of addresses into a public address that is sent across the network.

42


Refer to the exhibit. Assume that the exhibited output is from a host that is connected to a Linksys integrated router. What is the first thing that should be checked if using a bottom-up troubleshooting approach?
the default gateway on the host
the IP address on the host
the IP address on the router
the link status LED on the front of the router
the subnet mask on the host

43
What is the purpose of the ipconfig command?
to force a client to give up its current IP address
to force the client to clear all IP-to-domain-name associations that is has learned
to force the client to clear all the MAC-address-to-IP-address associations that it has learned
to show the current IP configuration on the client

44
Which protocol is used to transfer files among network devices and perform file-management functions?
DNS
FTP
HTML
HTTP

45
In IP telephony, what is the purpose of a gateway to the PSTN?
to connect IP voice clients to Internet phone service
to create a peer-to-peer connection between two IP voice clients
to map unique names of IP voice endpoints to a client list on a voice server
to allow IP voice clients to communicate with regular analog telephones.
What two pieces of information should a help desk technician document while troubleshooting connectivity issues with an end user? (Choose two.)
the CPU clock speed of the computer
the number of network jacks that are in the room
if the user can ping the default gateway address
if the word processing software is installed correctly
whether the PC uses dynamic or static IP addressing

47
A computer joins the network and announces itself to all hosts on the LAN. What type of message does the computer send out?
broadcast
simulcast
multicast
unicast

48
What is a function of the distribution layer in the hierarchical design model?
to provide latency free switching
to organize end devices in small manageable groups
to provide connectivity using the high-speed backbone
to provide connectivity between smaller local networks

49
What is the default subnet mask for the IP address 128.107.23.10?
255.0.0.0
255.255.0.0
255.255.255.0
255.255.255.255

50


Refer to the exhibit. A user sets up a home network and uses a crossover cable from Switch1 to the Internet port on the ISR. However, there is no connection between the host H1 and the server. What should the user do in order to establish a connection?
Replace the cable with a console cable.
Replace the cable with a rollover cable.
Replace the failed crossover cable with a working crossover cable.
Replace the cable with a straight-through cable.
wireless NIC driver
Which type of computer uses an integrated monitor and keyboard?
pocket PC
laptop
mainframe
server
workstation

52


Refer to the graphic. Assume that the command output is from a wireless DHCP client that is connected to a Linksys integrated router. What can be deduced from the output?
The wireless connection is good.
The WEP key or SSID needs to be checked.
The DHCP configuration on the router needs to be checked.
The wireless NIC driver or the NIC itself needs to be reinstalled.

2 comentarios:

Black Rose dijo...
Este comentario ha sido eliminado por el autor.
Black Rose dijo...

Any idea where I can find the answer for that test?

thnx

Theo