Monday, May 21, 2012

DHomesb Practice Final Exam


1
Top of Form
What is the default subnet mask for an IP address of 64.100.19.14?
255.0.0.0
255.255.0.0
255.255.255.0
255.255.255.255
Bottom of Form


2
Top of Form
A network administrator has been notified that users have experienced problems gaining access to network resources. What utility could be used to directly query a name server for information on a destination domain?
ping
tracert
netstat
ipconfig
nslookup
Bottom of Form



3
Top of Form
What does the term "attenuation" mean in data communication?
loss of signal strength as distance increases
time for a signal to reach its destination
leakage of signals from one cable pair to another
strengthening of a signal by a networking device
Bottom of Form


4
Top of Form
What is the function of CSMA/CA on a wireless Ethernet network?
to prevent collisions
to broadcast messages
to select the least congested channel
to establish an ACK between devices
Bottom of Form



5
Top of Form
The area covered by a single AP is known as what?
ad-hoc network
basic service set
independent basic service set
extended service set
distribution system
Bottom of Form


6
Top of Form
The help desk at a large packaging company receives a call from a user who is concerned about lost data files on the local PC. The help desk technician learns that the user clicked on an icon that appeared to be a program update, but no updates were scheduled for that program. What type of attack has likely occurred?
worm
DDoS
brute force
Trojan horse
Bottom of Form



7
Top of Form
Which installation option enables a single physical resource to function simultaneously as multiple logical resources?
clean install
multi-boot
upgrade
virtualization
Bottom of Form


8
Top of Form
Which part of the electromagnetic spectrum is commonly used to exchange data between a PDA and a computer?
FM
radar
infrared
ultraviolet
Bottom of Form



9
Top of Form
A company has a web server that must be accessible to both external and internal clients. Which security policy best practice should be followed to maximize security of the server?
Place the web server in a DMZ.
Keep the web server on the external network.
Configure a firewall device to serve as the web server.
Locate the web server in the server farm of the internal network.
Bottom of Form


Top of Form
What is specified by the host bits in an IP address?
broadcast identity of the network
identity of the computer on the network
network that is being addressed
network to which the host belongs
Bottom of Form
Top of Form
For an IP address, what component decides the number of bits that is used to represent the host ID?
default-gateway
host number
network number
subnet mask
Bottom of Form


Top of Form
What advantage does a peer-to-peer network have over a client-server network?
It increases security.
It increases scalability.
It produces a higher performance for hosts.
It eliminates the need for centralized administration.
Bottom of Form



Top of Form



Refer to the exhibit. If H4 sends a message to H1 and the destination MAC address is in the MAC table for both Switch1 and Switch2, which host devices will receive the message?
only H1
hosts H1 and H4
all hosts that are connected to Switch1
all hosts that are connected to Switch1 and Switch2
Bottom of Form


Top of Form



Refer to the graphic. Assume that the exhibited output is from a host that is connected to a Linksys integrated router. What is one of the first things you should check?
IP address on the host
IP address on the router
subnet mask on the host
default gateway on the host
link status LED on the front of the router
Bottom of Form



Top of Form
Which of the following are the address ranges of the private IP addresses? (Choose three.)
10.0.0.0 to 10.255.255.255
200.100.50.0 to 200.100.25.255
150.150.0.0 to 150.150.255.255
172.16.0.0 to 172.31.255.255
192.168.0.0 to 192.168.255.255
127.16.0.0 to 127.31.255.255
Bottom of Form


Top of Form
When acting as a DHCP server, an integrated router can provide what three types of information to a client? (Choose three.)
physical address
MAC address
default gateway
static IP address
dynamic IP address
DNS server address
Bottom of Form



Top of Form
What is the purpose of spam filter software?
It detects and removes spyware.
It detects and removes viruses.
It prevents the display of advertisement windows.
It examines incoming e-mail messages to identify the unsolicited ones.
Bottom of Form


Top of Form
A network engineer wants to represent confidential data in binary format. What are the two possible values that the engineer can use? (Choose two.)
0
1
2
A
F
Bottom of Form



Top of Form
Which protocol in its default configuration downloads e-mail messages to the client computer and deletes them from the server?
FTP
POP3
SMTP
IMAP4
Bottom of Form


Top of Form



Refer to the exhibit. A user on host A sends an e-mail to the user on host B. Which type of message does host A send?
broadcast
multicast
simulcast
unicast
Bottom of Form
Top of Form
What are two best practices that are used when configuring a small home WLAN? (Choose two.)
the use of EAP
the encryption of the SSID
the use of pre-shared keys
the use of open authentication
the disabling of SSID broadcasting
Bottom of Form


Top of Form
What type of message is sent to a specific group of hosts?
static
unicast
dynamic
multicast
broadcast
Bottom of Form



Top of Form



Refer to the exhibit. Why would a network administrator use the network mode that is shown?
to support hosts on different IP networks
to support hosts that use different 802.11 standards
to support both wireless and wired Ethernet hosts
to support hosts with different operating systems
to support hosts with network cards from different manufacturers
Bottom of Form


Top of Form
A network technician is required to provide access to the Internet for a large company. What is needed to accomplish this task?
ISP
private IP addresses for each host
static IP addresses for each host
DHCP server
Bottom of Form



Top of Form
Which type of computer uses an integrated monitor and keyboard?
pocket PC
laptop
mainframe
server
workstation
Bottom of Form


Top of Form
Which transport layer protocol is used when an application requires acknowledgment that data has been delivered?
FTP
TCP
UDP
RTP
SMTP
Bottom of Form



Top of Form



Refer to the exhibit. What cabling fault does the exhibit represent?
open
reversed pair
short
split pair
Bottom of Form


Top of Form
Which two statements are true about local applications? (Choose two.)
They run on the network.
An example of a local application is e-mail.
They are accessed from a remote computer.
They are stored on the local hard disk.
They run on the computer where they are installed.
Bottom of Form



Top of Form
Where do ISPs get the public addresses that they assign to end users?
ISPs create the addresses themselves.
ISPs are assigned addresses through the RFC.
ISPs obtain their addresses automatically.
ISPs obtain address blocks from registry organizations.
Bottom of Form


Top of Form
Which two transport layer protocols enable hosts to communicate and transfer data? (Choose two.)
DHCP
ICMP
IP
TCP
UDP
Bottom of Form
Top of Form
Which part of a data packet is used by a router to determine the destination network?
source IP address
user data
destination IP address
control information
destination MAC address
Bottom of Form


Top of Form
When terminating UTP cabling, why is it important to untwist only a small amount of each wire pair?
minimizes crosstalk
makes installation faster
ensures wires are in correct order
makes it easier to fit wires into connector
Bottom of Form



Top of Form
A learner wants to interact with the operating system of a computer. Which two methods can be used for this? (Choose two.)
CLI
GUI
kernel
third party software
shell
Bottom of Form


Top of Form
What is the purpose of the ipconfig /release command?
It forces a client to give up its current IP address.
It forces a client to give up its current MAC address.
It forces the client to clear all the MAC address to IP address associations it has learned.
It shows the current IP configuration on the client.
Bottom of Form



Top of Form
What is the purpose of creating a DMZ during network firewall implementation?
to create a server security zone accessible only to internal clients
to create a dirty zone that allows all inbound and outbound traffic
to allow for a publicly accessible zone without compromising the internal network
to specify a higher security level than normally required for the internal production network
Bottom of Form


Top of Form
A user is unable to send e-mail. While troubleshooting this problem, the network technician first verifies the physical connectivity of cables. Which troubleshooting approach is being followed?
bottom-up
divide-and-conquer
top-down
trial and error
Bottom of Form



Top of Form
What is the function of the DNS server?
It maps the IP address to the MAC address.
It translates a computer or domain name to the associated IP address.
It manages the domain that clients are assigned to.
It accepts HTTP requests from clients.
Bottom of Form


Top of Form
What layer is the first point of entry for a host into the network?
core layer
access layer
network layer
distribution layer
Bottom of Form



Top of Form
Your school network blocks all websites related to online gaming. What type of security policy is being applied?
identification and authentication
remote access
acceptable use
incident handling
Bottom of Form


Top of Form
A host sent a message that all other hosts on the switched local network received and processed. What type of domain are all these hosts a part of?
local domain
multicast domain
collision domain
broadcast domain
Bottom of Form
Top of Form
What are two examples of storage peripheral devices? (Choose two.)
printer
flash drive
headphones
external DVD
barcode reader
Bottom of Form


Top of Form
What type of cable would be required to connect a Linksys router to a wired PC?
crossover cable
rollover cable
serial cable
straight-through cable
Bottom of Form



Top of Form



Refer to the exhibit. What is the effect of setting the security mode to WEP on the Linksys integrated router?
The WEP security mode enables the AP to inform clients of its presence.
The WEP security mode encrypts network traffic during transmission between the AP and the wireless client.
The WEP security mode generates a dynamic key each time a client establishes a connection with the AP.
The WEP security mode identifies the WLAN.
Bottom of Form


Top of Form
In an attempt to verify connectivity, a user issues the ping command to a device that is not on the local network. The ping is unsuccessful. What can be determined from this result?
The default gateway is misconfigured.
The patch cable on the host station is faulty.
The router between the host and destination is faulty.
Further troubleshooting will be required to reach a definite conclusion.
Bottom of Form



Top of Form
Which two causes of networking problems are related to the physical layer? (Choose two.)
disconnected cables
improper operation of cooling fans
incorrect MAC address
incorrect default gateway
incorrect subnet mask
Bottom of Form


Top of Form
What is an advantage of selecting an operating system that has a commercial license over one with a GPL license?
The commercial license-based operating system ensures full access to the source code for everyone.
The commercial license-based operating system ensures that everyone can participate in the enhancement of the product.
The commercial license-based operating system provides structured support.
The commercial license-based operating system is released free of charge.
Bottom of Form



Top of Form



Refer to the exhibit. Assume that the command output is from a wireless DHCP client that is connected to a Linksys integrated router. What can be deduced from the output?
The DHCP configuration on the router needs to be verified.
The WEP key or SSID needs to be verified.
The wireless connection is operational.
The wireless NIC driver or the NIC itself needs to be reinstalled.
Bottom of Form


Top of Form



Refer to the exhibit. What is the purpose of assigning a network name of College?
It enables access to the AP configuration GUI by name rather than by address.
It encrypts data between the wireless client and the AP.
It identifies the wireless LAN.
It translates an internal address or group of addresses to a public address.
It translates IP addresses into easy-to-remember domain names.
Bottom of Form



Top of Form
Because of an increasing number of users, bandwidth per user on a WLAN has decreased to a point where users are complaining about poor performance. What can be done to improve the user experience?
Increase the AP radio signal strength.
Place the AP in a more central location.
Deploy an external omni-directional antenna.
Reduce the number of devices using each channel.
Bottom of Form


Top of Form
A network technician suspects that malware on a user PC is opening multiple TCP connections to a specific foreign host address. Which Windows command line utility can be used to confirm the multiple TCP connections?
ping
netstat
tracert
ipconfig
nslookup
Bottom of Form



my score :