Laman

21 Desember, 2010

DHomesb Final Exam Answer

1. What is specified by the host bits in an IP address?
broadcast identity of the network
*identity of the computer on the network
network that is being addressed
network to which the host belongs

2. What measurement is commonly used to describe communication speed when transferring data?
*bps
cps
Hz
MB

3. What is the function of the DNS server?
It maps the IP address to the MAC address.
*It translates a computer or domain name to the associated IP address.
It manages the domain that clients are assigned to.
It accepts HTTP requests from clients.

4. Refer to the exhibit. A user on host A sends an e-mail to the user on host B. Which type of message does host A send?
broadcast
multicast
simulcast
*unicast

5. All hosts within a domain receive the same frame that originates from one of the devices. The domain is also bounded by routers. What type of domain is this?
*broadcast
collision
local
multicast

6. A network engineer wants to represent confidential data in binary format. What are the two possible values that the engineer can use? (Choose two.)
*0
*1
2
A
F

7. Which two transport layer protocols are used to transfer messages between hosts? (Choose two.)
DHCP
FTP
SMTP
*TCP
*UDP

8. Refer to the exhibit. After connectivity has been established, an Internet user needs to upload a text file. Using the TCP/IP model, one protocol will be required at the application layer and another at the internetwork layer. Which two protocols will be used at those two layers for the upload? (Choose two.)
DHCP
*FTP
*IP
TCP
UDP

9.What is the correct sequence of steps in the encapsulation of TCP/IP data as it passes from a source to a destination host?

A. converts data to bits for transmission
B. packages the data for end to end transport
C. adds the data-link header and trailer
D. adds the network IP address to the header of the packet
A,B,C,D
A,C,D,B
*B,D,C,A
B,C,D,A
D,C,B,A

10. Which three types of information are provided to a DHCP client from a DHCP server? (Choose three.)
host ID
MAC address
*default gateway
*IP addresses of DNS servers
physical address
*subnet mask

11. Refer to the exhibit. Assume that the command output is from a wireless DHCP client that is connected to a Linksys integrated router. What can be deduced from the output?
The DHCP configuration on the router needs to be verified.
The WEP key or SSID needs to be verified.
*The wireless connection is operational.
The wireless NIC driver or the NIC itself needs to be reinstalled.

12. When is a dial-up connection used to connect to an ISP?
when a cellular telephone provides the service
when a high-speed connection is provided over a cable TV network
when a satellite dish is used
*when a regular telephone line is used

13. What are two examples of peripheral output devices? (Choose two.)
barcode reader
digital camera
external DVD
*headphones
*printer

14. A network technician is required to provide access to the Internet for a large company. What is needed to accomplish this task?
ISP
private IP addresses for each host
static IP addresses for each host
DHCP server

15. What statement describes the filtering of traffic via the use of Stateful Packet Inspection?
It recognizes and filters predefined URLs
It permits access that is based on the application.
It permits access based on IP or MAC addresses.
*It permits incoming packets that are legitimate responses to requests from internal hosts.
It translates an internal address or group of addresses into a public address that is sent across the network.

16. Which statement accurately describes what network devices do in the distribution layer of the three layer design model?
They interconnect individual hosts.
They interconnect multiple companies.
*They interconnect local network segments.
They interconnect the company network to the ISP.

17. Which two statements are true about local applications? (Choose two.)
They run on the network.
An example of a local application is e-mail.
They are accessed from a remote computer.
*They are stored on the local hard disk.
*They run on the computer where they are installed.

18. Which network design layer provides a connection point for end user devices to the network?
access
core
distribution
network

19. What are two advantages of purchasing a custom-built computer? (Choose two.)
usually a lower cost
no waiting period for assembly
*user can specify higher performance components
*supports higher-end graphics and gaming applications
fewer components to replace

20. Which portion of the packet does a router use to forward the packet to the destination?
source IP address
user data
*destination IP address
control information
destination MAC address

21. What is the purpose of a router?
to forward broadcasts to all interfaces so that all hosts receive them
to maintain a table of individual host addresses
*to select the best path to reach remote networks
to physically connect multiple hosts that belong to the same network

22. How do ISPs obtain public IP addresses?
They create the addresses themselves.
They obtain the addresses from the home PCs.
*They obtain the addresses from the Internet registry.
They obtain the addresses from the RFC.

23. What is the default subnet mask for an IP address of 198.133.219.4?
255.0.0.0
255.255.0.0
*255.255.255.0
255.255.255.255

24. For an IP address, what component decides the number of bits that is used to represent the host ID?
default-gateway
host number
network number
*subnet mask

25. Which three addresses belong to the category of private IP addresses? (Choose three.)
*10.0.0.1
128.0.0.1
150.0.0.1
*172.16.0.1
*192.168.31.19
172.168.31.1

26. Which part of the electromagnetic spectrum is commonly used to exchange data between a PDA and a computer?
FM
radar
*infrared
ultraviolet

27. What is a service pack?
an access policy
an agreement between a company and a vendor
a piece of code created to fix one specific problem
*a collection of patches and updates released by a vendor
a small piece of software designed specifically for security issues

28. Refer to the exhibit. The security policy of an organization requires users to change their password every week. Which type of security policy is this?
acceptable use
network maintenance
*password
remote access

29. Refer to the exhibit. An educational institution needs to connect PC systems that use private IP addressing to the Internet. They have multiple systems that need to access the Internet, but were only able to purchase one public IP address. What should be activated on the Linksys integrated router to achieve this goal?
authentication
DHCP
encryption
firewall
*NAT
WEP

30. Which wireless authentication method allows the use of a backend authentication server?
*EAP
Open
PSK
WEP

31. What wireless technology has the ability to communicate with many devices at the same time, makes use of the 2.4 GHz band, and is limited to low-speed, short-range communications?
RF
ISM
infrared
*Bluetooth

32. What is the purpose of the ipconfig command?
to force a client to give up its current IP address
to force the client to clear all IP-to-domain-name associations that is has learned
to force the client to clear all the MAC-address-to-IP-address associations that it has learned
*to show the current IP configuration on the client

33. What type of computer would most likely use a docking station?
*laptop
server
desktop
mainframe
workstation

34. A new student wants to interact with the operating system of a computer. Which two methods can be used for this? (Choose two.)
*CLI
*GUI
kernel
third party software
shell

35. How does a crossover cable connect two routers?
It connects the pins that are used for receiving on one router to the pins that are used for receiving on the other router.
*It connects the pins that are used for transmitting on one router to the pins that are used for receiving on the other router.
It disconnects the transmit pins and uses only the receive pins.
It uses the same pins for transmitting and receiving.

36. Refer to the exhibit. Assume that the exhibited output is from a host that is connected to a Linksys integrated router. What is the first thing that should be checked if using a bottom-up troubleshooting approach?
the default gateway on the host
the IP address on the host
the IP address on the router
*the link status LED on the front of the router
the subnet mask on the host

37. Refer to the exhibit. What is the effect of setting the security mode to WEP on the Linksys integrated router?
The WEP security mode enables the AP to inform clients of its presence.
*The WEP security mode encrypts network traffic during transmission between the AP and the wireless client.
The WEP security mode generates a dynamic key each time a client establishes a connection with the AP.
The WEP security mode identifies the WLAN.

38. For devices that do not autosense, which connection requires a crossover cable?
hub port to router port
PC to hub port
PC to switch port
*PC port to PC port

39. When terminating a UTP cable, why is it important to push the wires all the way into the end of the connector?
to allow the cable to endure more stretching or twisting
*to ensure good electrical contact
to ensure that the wires are in correct order
to minimize crosstalk

40. What is an advantage of selecting an operating system that has a commercial license over one with a GPL license?
The commercial license-based operating system ensures full access to the source code for everyone.
The commercial license-based operating system ensures that everyone can participate in the enhancement of the product.
*The commercial license-based operating system provides structured support.
The commercial license-based operating system is released free of charge.

41. What is the name for the contract between a customer and an ISP that specifies requirements for uptime and service response time?
DSL
IAB
NAP
*SLA

42. Refer to the exhibit. What is the purpose of assigning a network name of University?
It enables access to the AP configuration GUI by name rather than by address.
It encrypts data between the wireless client and the AP.
*It identifies the wireless LAN.
It translates an internal address or group of addresses to a public address.
It translates IP addresses into easy-to-remember domain names.

43. Which two IP configuration components does the computer use to identify its subnetwork? (Choose two.)
default gateway
*IP address
MAC address
DNS server address
*subnet mask

44. What is the name given to the area covered by an ad hoc network in a WLAN?
Basic Service Set (BSS)
Distribution System (DS)
Extended Service Set (ESS)
*Independent Basic Service Set (IBSS)

45. Which installation option should be chosen when the current operating system is too damaged to work properly?
upgrade
multi-boot
*clean install
virtualization

46. Identify two causes of physical layer network problems. (Choose two.)
logical addressing issues
*improperly terminated cables
*cables plugged into wrong ports
incorrect MAC address assigned
packets received out of sequence
incorrect subnet mask on an interface

47. What is the meaning of the term crosstalk?
*interference of signals between wire pairs
loss of signal strength as distance increases
damage of the signal when two bare wires touch
strengthening of a signal by a networking device

48. A user is unable to send e-mail. While troubleshooting this problem, the network technician first verifies the physical connectivity of cables. Which troubleshooting approach is being followed?
*bottom-up
divide-and-conquer
top-down
trial and error

49. Refer to the exhibit. What cabling fault does the exhibit represent?
open
reversed pair
short
*split pair

50. A wireless DHCP client cannot connect to the Internet through a Linksys integrated router. When you type ipconfig on the host, no IP address, subnet mask, or default gateway shows. What are two of the first things you will check? (Choose two.)
*SSID
*if the wireless client is configured for DHCP
the cable between client and integrated router
the firewall configuration on the integrated router
if the correct default gateway is configured on the client
if the correct default gateway is configured on the integrated router

Tidak ada komentar:

Posting Komentar