- Which type of computer has an integrated mouse?
- What is the function of a physical topology map?
- Refer to the exhibit. What is the reason that the host is unable to connect to the Internet?
- An administrator is troubleshooting a network problem that involves the inability of users to reach Internet sites. During troubleshooting, the administrator is able to successfully ping web sites by their IP address, but pings to domain names are unsuccessful. Which service is most likely at fault?
- Refer to the exhibit. Why would a network administrator use the network mode that is shown?
- Which network design layer provides a connection point for end user devices to the network?
- Which wireless protocol is used for encryption?
- Which two statements are true about local applications? (Choose two.)
- Which type of network attack occurs when an unauthorized person tries to persuade a user to share a network user ID and password?
- What are two ways that a user can interact with an operating system shell? (Choose two.)
- Refer to the exhibit. The wireless router WR1 is configured with the address shown and DHCP is not configured. What will be the result of a technician configuring the address 172.16.14.255 on the laptop?
- Which two issues can cause connectivity problems on a wireless network? (Choose two.)
- Which network entity would most likely be configured as both a DHCP client and a DHCP server?
- What is a major characteristic of asymmetric Internet service?
- Some new features are available for the OS that is currently running on a user's PC. What method should be chosen so that the user can install these new feature sets?
- A user starts a file transfer between a client machine and an FTP server. Which list correctly represents the sequence of protocols that are used by the client machine to encapsulate the FTP data traffic for transmission?
- A client computer on an Ethernet segment needs an IP address in order to communicate with other network resources. A DHCP server at address 192.168.1.1 has been correctly configured and enabled on the network. How will the client computer obtain a usable IP address for this network?
- What information within a data packet does a router use, by default, to make forwarding decisions?
- Which part of the electromagnetic spectrum is commonly used to exchange data between a PDA and a computer?
- Which two automatic addressing assignments are supported by DHCP? (Choose two.)
- What two pieces of information should a help desk technician document while troubleshooting connectivity issues with an end user? (Choose two.)
- Which statement accurately describes a recommended strategy for end users to employ when they interact with a help desk technician?
- Refer to the exhibit. Assume that the command output is from a wireless DHCP client that is connected to a Linksys integrated router. What can be deduced from the output?
- What does the term "attenuation" mean in data communication?
- Which two TCP/IP properties must match on hosts in the same LAN if the hosts are to be able to communicate with each other? (Choose two.)
- Which term is associated with logical addressing?
- A network technician suspects that malware on a user PC is opening multiple TCP connections to a specific foreign host address. Which Windows command line utility can be used to confirm the multiple TCP connections?
- What is an advantage of purchasing a custom-built computer?
- Which wireless technology allows only one-to-one connections and is typically used for short-range, line-of-sight communication?
- What is the function of the DNS server?
- Refer to the exhibit. H1 can ping H2, H3, and the Fa0/0 interface of router R1. H2 and H3 but not H1 can ping H4 and H5. What is a possible cause for the H1 failure?
- Bottom-up troubleshooting begins at which layer of the OSI model?
- How does a DMZ enhance network security for an organization?
- What is a weakness of WEP that is solved by WPA?
- Which two protocols are responsible for encrypting data on a wireless network? (Choose two.)
- A network administrator has been notified that users have experienced problems gaining access to network resources. What utility could be used to directly query a name server for information on a destination domain?
- When terminating a UTP cable, why is it important to push the wires all the way into the end of the connector?
- What is a service pack?
- Refer to the exhibit. The security policy of an organization allows employees to connect to the office intranet from their homes. Which type of security policy is this?
- Which type of firewall technique can be used to allow inbound traffic from the public network only if it was initiated from the internal network?
- The area covered by a single AP is known as what?
- Which protocol is used to transfer files among network devices and perform file-management functions?
- What destination IP address is used in a unicast packet?
- How does a crossover cable make it possible for two "like devices" (for example, two switches) to communicate?
- How do ISPs obtain public IP addresses?
- Refer to the exhibit. A home network is configured with the information in the graphic. A user tries to manually create a new connection to the network using the SSID Ciscoclass. However, a connection cannot be made. What could be the problem?
- A local PC has the correct configuration that is required to access the network. A ping command that is sourced at the PC does not receive a response from a remote device. Which operating system command might be used to determine where the connection failed?
- What is the default subnet mask for an IP address of 64.100.19.14?
- All hosts within a domain receive the same frame that originates from one of the devices. The domain is also bounded by routers. What type of domain is this?
- What two commands can be used to form a new binding if client information does not agree with the DHCP client table? (Choose two.)
- Which type of network supports DHCP and DNS services for network users in a network domain?
- How do wireless devices within a BSS access an available channel?
laptop
organizes groups of hosts by how they use the network
The host is configured with an incorrect gateway.
DNS
to support hosts that use different 802.11 standards
access
WEP
They are stored on the local hard disk.
They run on the computer where they are installed.
social engineering
CLI
GUI
The laptop will be configured within the same network as WR1.
incorrect SSID
low number of clients in BSS
ISP
desktop PC
wireless laptop
PC-based server
integrated services home router
Download speeds and upload speeds are equal.
Download speeds are faster than upload speeds.
Data traffic speeds are faster than voice traffic speeds.
Used when consistently uploading large amounts of graphics, video and multimedia traffic.
upgrade
FTP, TCP, IP, Network Access Protocols
Send a DHCPREQUEST packet to IP address 255.255.255.255.
the destination MAC address
the destination IP address
the destination host name
the destination service requested
infrared
subnet mask
default gateway address
if the user can ping the default gateway address
whether the PC uses dynamic or static IP addressing
At the beginning of the call, ask for the name and number of the supervisor of the help desk technician.
The wireless connection is operational.
loss of signal strength as distance increases
the subnet mask
the default gateway configurations
IP addresses
nslookup
The user can specify high-performance components to meet specific needs.
Infrared
It maps a hostname to a corresponding IP address.
Host H1 does not have a default gateway configured.
physical layer
blocks viruses and spyware
restricts internal user access to prohibited Internet sites
allows external customer access to designated internal resources
removes suspicious attachments from incoming and outgoing e-mail
WEP uses the same key for every connection whereas WPA uses a different key for each connection.
WEP
WPA
netstat
to ensure good electrical contact
a collection of patches and updates released by a vendor
remote access
stateful packet inspection
basic service set
FTP
a specific host
The transmit pins on one device are connected to the receive pins on the other device.
They obtain the addresses from the Internet registry.
The SSID is case-sensitive.
tracert
255.0.0.0
broadcast
ipconfig /release
ipconfig /renew
client/server
Every device within the BSS is assigned its own channel and has its own dedicated connection.
0 comments:
Post a Comment