- What are two characteristics of a MAC address? (Choose two.)
- A computer joins the network and announces itself to all hosts on the LAN. What type of message does the computer send out?
- Which two statements are characteristics of DHCP services? (Choose two.)
- What are two ways that a user can interact with an operating system shell? (Choose two.)
- Which two transport layer protocols are used to transfer messages between hosts? (Choose two.)
- Which two automatic addressing assignments are supported by DHCP? (Choose two.)
- Which protocol in its default configuration downloads e-mail messages to the client computer and deletes them from the server?
- What is the correct sequence of steps in the encapsulation of TCP/IP data as it passes from a source to a destination host?
- What is the purpose of TCP?
- Refer to the exhibit. The network is experiencing excessive broadcast traffic from multiple hosts. What can be done to reduce the broadcast traffic that each host receives without compromising connectivity to the corporate servers?
- Refer to the graphic. Based on the information that is shown, what statement is true?
- What is an advantage of purchasing a custom-built computer?
- A home user is looking for an ISP connection that provides high speed digital transmission over regular phone lines. What ISP connection type should be used?
- Which type of network supports DHCP and DNS services for network users in a network domain?
- After attaching four PCs to the switch ports, configuring the SSID and setting authentication properties for a small office network, a technician successfully tests the connectivity of all PCs that are connected to the switch and WLAN. A firewall is then configured on the device prior to connecting it to the Internet. What type of network device includes all of the described features?
- Which two statements are true about local applications? (Choose two.)
- Which of the following statements best describes DNS?
- Which layer in the hierarchical Ethernet design model ensures that traffic between local networks will be allowed?
- A network technician is required to provide access to the Internet for a large company. What is needed to accomplish this task?
- Which statement accurately describes what network devices do in the distribution layer of the three layer design model?
- What are two examples of peripheral input devices? (Choose two.)
- Which two values represent the network number and default mask for the address 209.165.200.225? (Choose two.)
- Why would a corporate web server be assigned a public IP address instead of a private IP address?
- What portion of the destination IP address is used as a packet is routed through the Internet?
- Refer to the exhibit. Which pair of addresses would be appropriate to use for PC1 and PC2 to establish a workgroup using private addresses?
- What is the purpose of pop-up blocker software?
- What is a service pack?
- What wireless technology has the ability to communicate with many devices at the same time, makes use of the 2.4 GHz band, and is limited to low-speed, short-range communications?
- Refer to the exhibit. An educational institution needs to connect PC systems that use private IP addressing to the Internet. They have multiple systems that need to access the Internet, but were only able to purchase one public IP address. What should be activated on the Linksys integrated router to achieve this goal?
- Which type of network attack occurs when an unauthorized person tries to persuade a user to share a network user ID and password?
- What are two best practices that are used when configuring a small home WLAN? (Choose two.)
- Which firewall resource could include the capability of recognizing and filtering DoS attacks?
- Which adapter card would be required for a PC to exchange information with other PCs on a LAN?
- Which type of computer has an integrated mouse?
- What component of a personal computer is responsible for the processing of all data?
- Refer to the exhibit. Assume that the exhibited output is from a host that is connected to a Linksys integrated router. What is the first thing that should be checked while using a bottom-up troubleshooting approach?
- Which Windows PC command line utility can be used to discover the path that a packet takes to reach a destination?
- Which device is often configured to act as both a DHCP client and a DHCP server?
- What is the name for the contract between a customer and an ISP that specifies requirements for uptime and service response time?
- What is true about a wireless access point that is equipped with an omnidirectional antenna?
- What procedure will help prevent users from detecting a wireless network?
- What is the purpose of the ipconfig /release command?
- What data communication technology uses low-power radio waves to transmit data?
- Which attribute must be the same for wireless devices on one network to be able to communicate with devices on a different network?
- A company has a web server that must be accessible to both external and internal clients. Which security policy best practice should be followed to maximize security of the server?
- Which installation option should be chosen when the current operating system is too damaged to work properly?
- What two pieces of information should a help desk technician document while troubleshooting connectivity issues with an end user? (Choose two.)
- A user is not able to connect to the network. A PC technician replaces the network cable that connects the PC to the switch port. The user is now able to connect to the network. Which troubleshooting technique did the technician use?
- Because of an increasing number of users, bandwidth per user on a WLAN has decreased to a point where users are complaining about poor performance. What can be done to improve the user experience?
- A user has reported a failure to connect to the network. Based on similar calls from other users in the same location, the network technician starts troubleshooting by entering the ipconfig command on the user computer. Which troubleshooting technique is the technician using?
It is displayed in HEX characters.
It is a physical address.
It is a physical address.
broadcast
DHCP clients send a DHCP Discover message to the destination IP address of 255.255.255.255.
The integrated router acts as a DHCP server for internal hosts on local networks.
The integrated router acts as a DHCP server for internal hosts on local networks.
CLI
GUI
GUI
TCP
UDP
UDP
subnet mask
default gateway address
default gateway address
POP3
A. converts data to bits for transmission
B. packages the data for end to end transport
C. adds the data-link header and trailer
D. adds the network IP address to the header of the packet
B,D,C,A
B. packages the data for end to end transport
C. adds the data-link header and trailer
D. adds the network IP address to the header of the packet
B,D,C,A
to provide flow control and acknowledgment of packets that are exchanged between the client and server
Separate the switches with a router.
All wireless devices that are connected to this access point must have an assigned SSID of Academy.
The user can specify high-performance components to meet specific needs.
DSL
client/server
ISR router
They are stored on the local hard disk.
They run on the computer where they are installed.
They run on the computer where they are installed.
DNS servers are used to configure logical address information for host computers.
distribution layer
ISP
They interconnect local network segments
barcode reader
digital camera
digital camera
209.165.200.0
255.255.255.0
255.255.255.0
The public address can be routed on the Internet.
network portion
172.16.4.2 and 172.16.4.3
It prevents the display of advertisement windows.
a collection of patches and updates released by a vendor
Bluetooth
WEP
social engineering
the use of pre-shared keys
the disabling of SSID broadcasting
the disabling of SSID broadcasting
stateful packet inspection
NIC
laptop
CPU
the link status LED on the front of the router
tracert
integrated services router
SLA
radiates the signal equally in all directions
Disable SSID broadcasts.
It forces a client to give up its current IP address.
wireless
default gateway
Place the web server in a DMZ.
clean install
if the user can ping the default gateway address
whether the PC uses dynamic or static IP addressing
whether the PC uses dynamic or static IP addressing
substitution
Reduce the number of devices using each channel.
divide-and-conquer
0 comments:
Post a Comment