What is the purpose of TCP?
to manage data links and physical network transmissions
to specify the format of requests and responses that are exchanged between the client and server
*to assign the logical address and encapsulate the request into packets for routing to the destination
to provide flow control and acknowledgment of packets that are exchanged between the client and server
Which adapter card would be required for a PC to exchange information with other PCs on a LAN?
Which type of computer has an integrated mouse?
After attaching four PCs to the switch ports, configuring the SSID and setting authentication properties for a small office network, a technician successfully tests the connectivity of all PCs that are connected to the switch and WLAN. A firewall is then configured on the device prior to connecting it to the Internet. What type of network device includes all of the described features?
standalone wireless access point
Which installation option should be chosen when the current operating system is too damaged to work properly?
A computer joins the network and announces itself to all hosts on the LAN. What type of message does the computer send out?
What portion of the destination IP address is used as a packet is routed through the Internet?
default gateway address
Which layer in the hierarchical Ethernet design model ensures that traffic between local networks will be allowed?
What is the name for the contract between a customer and an ISP that specifies requirements for uptime and service response time?
A network technician is required to provide access to the Internet for a large company. What is needed to accomplish this task?
private IP addresses for each host
static IP addresses for each host
A user is not able to connect to the network. A PC technician replaces the network cable that connects the PC to the switch port. The user is now able to connect to the network. Which troubleshooting technique did the technician use?
a combination of top-down and divide-and-conquer
What component of a personal computer is responsible for the processing of all data?
Which two transport layer protocols are used to transfer messages between hosts? (Choose two.)
Which device is often configured to act as both a DHCP client and a DHCP server?
integrated services router
Refer to the exhibit. Which pair of addresses would be appropriate to use for PC1 and PC2 to establish a workgroup using private addresses?
127.0.0.1 and 127.0.0.2
*172.16.4.2 and 172.16.4.3
172.16.5.1 and 192.168.3.2
188.8.131.52 and 184.108.40.206
What are two ways that a user can interact with an operating system shell? (Choose two.)
A company has a web server that must be accessible to both external and internal clients. Which security policy best practice should be followed to maximize security of the server?
Place the web server in a DMZ.
*Keep the web server on the external network.
Configure a firewall device to serve as the web server.
Locate the web server in the server farm of the internal network.
Which wireless component allows wireless clients to gain access to a wired network?
Which two statements are characteristics of DHCP services? (Choose two.)
*A DHCP client determines the lease time for using the IP address that is supplied by the DHCP server.
An integrated router acts as the DHCP server to provide the IP address to the ISP.
DHCP clients send a DHCP Discover message to the destination IP address of 255.255.255.255.
*The DHCP server maps the IP addresses to host names.
The integrated router acts as a DHCP server for internal hosts on local networks.
What is the correct sequence of steps in the encapsulation of TCP/IP data as it passes from a source to a destination host?
A. converts data to bits for transmission
B. packages the data for end to end transport
C. adds the data-link header and trailer
D. adds the network IP address to the header of the packet
Refer to the exhibit. Assume that the exhibited output is from a host that is connected to a Linksys integrated router. What is the first thing that should be checked while using a bottom-up troubleshooting approach?
the default gateway on the host
the IP address on the host
the IP address on the router
*the link status LED on the front of the router
the subnet mask on the host
Which firewall resource could include the capability of recognizing and filtering DoS attacks?
*Layer 4 packet filtering
stateful packet inspection
Which type of network attack occurs when an unauthorized person tries to persuade a user to share a network user ID and password?
denial of service
Which type of network supports DHCP and DNS services for network users in a network domain?
What is the purpose of pop-up blocker software?
It detects and removes spyware.
It detects and removes viruses.
*It prevents the display of advertisement windows.
It removes unwanted e-mail.
What are two best practices that are used when configuring a small home WLAN? (Choose two.)
the use of EAP
the encryption of the SSID
the use of pre-shared keys
the use of open authentication
the disabling of SSID broadcasting
What is a service pack?
an access policy
an agreement between a company and a vendor
a piece of code created to fix one specific problem
*a collection of patches and updates released by a vendor
a small piece of software designed specifically for security issues
Why would a corporate web server be assigned a public IP address instead of a private IP address?
The public address can be acquired at no cost.
*The public address can be routed on the Internet.
The public address provides a security advantage.
The same public address can be used on multiple servers to prevent depletion of available IP addresses.
When would a LAN switch use flooding to forward a frame?
when the MAC address table is empty
when retransmissions are required after a collision
after all hosts on the network are added to the MAC table
when a frame is received from a port that is connected to a hub
Refer to the exhibit. The network is experiencing excessive broadcast traffic from multiple hosts. What can be done to reduce the broadcast traffic that each host receives without compromising connectivity to the corporate servers?
Separate the switches with a router.
Create a separate VLAN for the servers and hosts.
Change from Ethernet switches to FastEthernet switches.
Increase the number of switches to reduce the number of PCs that are connected to each switch.
What are two characteristics of a MAC address? (Choose two.)
*It indicates the physical location of the host within the network.
It is dynamically assigned by a DHCP server.
*It is displayed in HEX characters.
It is a physical address.
It is cable-based.
What is an advantage of purchasing a custom-built computer?
It is beneficial for less knowledgeable consumers.
The waiting period for assembly is negligible.
The cost is lower compared to a computer that has been preassembled.
*The user can specify high-performance components to meet specific needs.
What are two examples of peripheral input devices? (Choose two.)
A home user is looking for an ISP connection that provides high speed digital transmission over regular phone lines. What ISP connection type should be used?
Which protocol in its default configuration downloads e-mail messages to the client computer and deletes them from the server?
Which two statements are true about local applications? (Choose two.)
They run on the network.
An example of a local application is e-mail.
*They are accessed from a remote computer.
They are stored on the local hard disk.
*They run on the computer where they are installed.
What is the purpose of the ipconfig /release command?
*It forces a client to give up its current IP address.
It forces a client to give up its current MAC address.
It forces the client to clear all the MAC address to IP address associations it has learned.
It shows the current IP configuration on the client.
Which attribute must be the same for wireless devices on one network to be able to communicate with devices on a different network?
wireless equipment vendor
A user has reported a failure to connect to the network. Based on similar calls from other users in the same location, the network technician starts troubleshooting by entering the ipconfig command on the user computer. Which troubleshooting technique is the technician using?
Which statement accurately describes what network devices do in the distribution layer of the three layer design model?
They interconnect individual hosts.
They interconnect multiple companies.
They interconnect local network segments.
They interconnect the company network to the ISP.
Refer to the graphic. Based on the information that is shown, what statement is true?
This configuration would be commonly found in an ad hoc wireless network.
Any wireless client that is attached to this access point would have the same IP address and SSID.
*All wireless devices that are connected to this access point must have an assigned SSID of Academy.
In addition to accepting wireless client requests, this access point must connect to the wired network.
What wireless technology has the ability to communicate with many devices at the same time, makes use of the 2.4 GHz band, and is limited to low-speed, short-range communications?
Which of the following statements best describes DNS?
DNS servers are used to map an IP address to a physical address.
*DNS servers are used to map a name to an IP address.
DNS servers are used to configure logical address information for host computers.
DNS servers are used to translate from private addresses to public addresses.
Refer to the exhibit. An educational institution needs to connect PC systems that use private IP addressing to the Internet. They have multiple systems that need to access the Internet, but were only able to purchase one public IP address. What should be activated on the Linksys integrated router to achieve this goal?
What procedure will help prevent users from detecting a wireless network?
Enable MAC filtering.
Disable SSID broadcasts.
Change the default administrator password on the AP.
Wednesday, February 2, 2011
Posted by Nurul Gayatri Archuleta on 10:48 AM