Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

Networks 1

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 7

1.

Which two Internet solutions provide an always-on, high-bandwidth connection to computers


on a LAN? (Choose two.)
cellular
DSL
satellite
cable
dial-up telephone

2. What type of network must a home user access in order to do online shopping?
a local area network
the Internet
an extranet
an intranet

3. What are two functions of intermediary devices on a network? (Choose two.)


They are the primary source and providers of information and services to end devices.
They form the interface between the human network and the underlying communication
network.
They direct data along alternate pathways when there is a link failure.
They run applications that support collaboration for business.
They filter the flow of data, based on security settings.

5. Which description correctly defines a converged network?


a network that allows users to interact directly with each other over multiple channels
a network that is limited to exchanging character-based information
a dedicated network with separate channels for video and voice services
a single network channel capable of delivering multiple communication forms

11. What is a characteristic of circuit-switched networks?


A single message can be broken into multiple message blocks that are transmitted through
multiple circuits simultaneously.
If all circuits are busy, a new call cannot be placed.
If a circuit fails, the call will be forwarded on a new path.
Circuit-switched networks can dynamically learn and use redundant circuits.
12. Requiring strong, complex passwords is a practice that supports which network security
goal?
maintaining communication integrity
ensuring redundancy
ensuring data confidentiality
ensuring reliability of access

13. What two criteria are used to help select network media? (Choose two.)
the distance the media can successfully carry a signal
the environment where the media is to be installed
the cost of the end devices utilized in the network
the number of intermediary devices installed in the network
the types of data that need to be prioritized

14. Which statement describes a network that supports QoS?


Data sent over the network is not altered in transmission.
The fewest possible devices are affected by a failure.
The network provides predictable levels of service to different types of traffic.
The network should be able to expand to keep up with user demand.

16. Which device performs the function of determining the path that messages should take
through internetworks?
a web server
a DSL modem
a router
a firewall

18. Which two statements about the relationship between LANs and WANs are true? (Choose
two.)
Both LANs and WANs connect end devices.
WANs are typically operated through multiple ISPs, but LANs are typically operated by single
organizations or individuals.
WANs connect LANs at slower speed bandwidth than LANs connect their internal end devices.
The Internet is a WAN.
WANs must be publicly-owned, but LANs can be owned by either public or private entities.

20. Which area of the network would a college IT staff most likely have to redesign as a direct
result of many students bringing their own tablets and smartphones to school to access school
resources?
intranet
wired LAN
wireless LAN
extranet
wireless WAN

21. Which expression accurately defines the term congestion?


a method of limiting the impact of a hardware or software failure on the network
a set of techniques to manage the utilization of network resources
a state where the demand on the network resources exceeds the available capacity
a measure of the data carrying capacity of the networ

A network specialist has been hired to install a network in a company that assembles airplane
engines. Because of the nature of the business, the area is highly affected by electromagnetic
interference. Which type of network media should be recommended so that the data
communication will not be affected by EMI?
coaxial
STP
fiber optic*
UTP

39. A company is expanding its business to other countries. All branch offices must remain
connected to corporate headquarters at all times. Which network technology is required to
support this scenario?
LAN
WLAN
MAN
WAN*

Which three statements characterize the transport layer protocols? (Choose three.)
TCP uses port numbers to provide reliable transportation of IP packets.
TCP and UDP port numbers are used by application layer protocols.
TCP uses windowing and sequencing to provide reliable transfer of data.
TCP is a connection-oriented protocol. UDP is a connectionless protocol.
UDP uses windowing and acknowledgments for reliable transfer of data.

3 What is the purpose of ICMP messages?


to inform routers about network topology changes
to ensure the delivery of an IP packet
to monitor the process of a domain name to IP address resolution
to provide feedback of IP packet transmissions

4 A technician uses the ping 127.0.0.1 command. What is the technician testing?
connectivity between a PC and the default gateway
connectivity between two adjacent Cisco devices
physical connectivity of a particular PC and the network
the TCP/IP stack on a network host
connectivity between two PCs on the same network

5 What will a Layer 2 switch do when the destination MAC address of a received frame is not in
the MAC table?
It notifies the sending host that the frame cannot be delivered.
It initiates an ARP request.
It forwards the frame out of all ports except for the port at which the frame was received.
It broadcasts the frame out of all ports on the switch.

Which two components are necessary for a wireless client to be installed on a WLAN? (Choose
two.)
custom adapter
wireless bridge
media
wireless NIC
crossover cable
wireless client software

Which address on a PC does not change, even if the PC is moved to a different network?
IP address
logical address
MAC address
default gateway address

What will happen if the default gateway address is incorrectly configured on a host?
A ping from the host to 127.0.0.1 would not be successful.
The host will have to use ARP to determine the correct address of the default gateway.
The host cannot communicate with other hosts in the local network.
The host cannot communicate with hosts in other networks.
The switch will not forward packets initiated by the host.

Which technology provides a solution to IPv4 address depletion by allowing multiple devices to
share one public IP address?
ARP
DNS
SMB
DHCP
HTTP
NAT

23 What is the purpose of the routing process?


to encapsulate data that is used to communicate across a network
to select the paths that are used to direct traffic to destination networks
to convert a URL name into an IP address
to provide secure Internet file transfer
to forward traffic on the basis of MAC addresses

A home user is looking for an ISP connection that provides high speed digital transmission over
regular phone lines. What ISP connection type should be used?
cell modem
dial-up
cable modem
satellite
DSL

31 Which subnet would include the address 192.168.1.96 as a usable host address?
192.168.1.64/26
192.168.1.32/28
192.168.1.32/27
192.168.1.64/29
Which three IP addresses are private ? (Choose three.)
10.1.1.1
172.16.4.4
224.6.6.6
192.168.5.5
172.32.5.2
192.167.10.10

What is an important function of the physical layer of the OSI model?


It encodes frames into electrical, optical, or radio wave signals.
It accepts frames from the physical media.
It encapsulates upper layer data into frames.
It defines the media access method performed by the hardware interface.

What are the three primary functions provided by Layer 2 data encapsulation? (Choose three.)
placement and removal of frames from the media
detection of errors through CRC calculations
conversion of bits into data signals
delimiting groups of bits into frames
data link layer addressing
error correction through a collision detection method
session control using port numbers

46
Which function is provided by TCP?
detection of missing packets
communication session control
path determination for data packets
data encapsulation

47
How does a Layer 3 switch differ from a Layer 2 switch?
A Layer 3 switch learns the MAC addresses that are associated with each of its ports. However, a
Layer 2 switch does not.
A Layer 3 switch maintains an IP address table instead of a MAC address table.
A Layer 3 switch supports VLANs, but a Layer 2 switch does not.
An IP address can be assigned to a physical port of a Layer 3 switch. However, this is not
supported in Layer 2 switches.

3 Which two protocols function at the internet layer? (Choose two.)


ARP
ICMP*
BOOTP
PPP
IP*
4 Which firewall technique blocks incoming packets unless they are responses to internal
requests?
URL filtering
port filtering
application filtering
stateful packet inspection*
5 Consider the following range of addresses:
2001:0DB8:BC15:00A0:0000::
2001:0DB8:BC15:00A1:0000::
2001:0DB8:BC15:00A2:0000::

2001:0DB8:BC15:00AF:0000::
The prefix-length for the range of addresses is ___. (/60*)
6 What three application layer protocols are part of the TCP/IP protocol suite? (Choose three.)
FTP*
ARP
NAT
DHCP*
PPP
DNS*
7 Which communication tool allows real-time collaboration?
weblog
wiki
e-mail
instant messaging*
8 Which of the following are primary functions of a router? (Choose two.)
packet switching*
microsegmentation
flow control
path selection*
domain name resolution
9 __________ is a best-effort, connectionless application layer protocol that is used to transfer
files. (TFTP*)
**************************************************************************
I can not give you the exact wording here, but I will give you the idea of what they were asking.

3 Which frame forwarding method receives the entire frame and performs a CRC check to detect
errors before forwarding the frame?
fragment-free switching
fast-forward switching
store-and-forward switching*
cut-through switching
=================
A company is expanding its business to other countries. All branch offices must remain
connected to corporate headquarters at all times. Which network technology is required to
support this requirement?
MAN
WLAN
WAN*
LAN

Which statement best describes the operation of the File Transfer Protocol?
An FTP client uses a source port number of 21 and a randomly generated destination port
number during the establishment of control traffic with an FTP Server.
An FTP client uses a source port number of 20 and a randomly generated destination port
number during the establishment of data traffic with an FTP Server.
An FTP server uses a source port number of 20 and a randomly generated destination port
number during the establishment of control traffic with an FTP client.
An FTP server uses a source port number of 21 and a randomly generated destination port
number during the establishment of control traffic with an FTP client.

Which three IP addresses are private ? (Choose three.)


10.20.30.1*
172.32.5.2
192.167.10.10
172.30.5.3*
192.168.5.5*
224.6.6.6

Which three IP addresses are private ? (Choose three.)


10.172.168.1*
172.32.5.2
192.167.10.10
172.20.4.4*
192.168.5.254*
224.6.6.6

You might also like