Translate This Blog - Raymond

Wednesday, August 18, 2010

Lowongan Kerja PT.PLN (Persero) Operator Pembangkit Gelombang II




PT PLN (Persero) mengajak Putera-Puteri Terbaik Bangsa:
BERGABUNG BERSAMA KAMI, MEMBANGUN NEGERI
MENJADI OPERATOR PEMBANGKIT PROFESIONAL!
GELOMBANG II


Sehubungan dengan masih dibutuhkannya tenaga kerja sebagai Operator Pembangkit di Unit Pembangkit PLTP Ulumbu, PLTP Mataloko, PLTU Bolok, maka kami kembali membuka penerimaan calon operator lulusan SMK Teknik Mesin/listrik/Kimia dan SMA/MAN Jurusan IPA dengan peluang jabatan Operator di setiap Pembangkit.

Jabatan tersebut dikategorikan sebagai Tenaga Pelaksana dengan usia pensiun 45 tahun dan Jaminan Sosial dikelola oleh Lembaga asuransi yang ditunjuk oleh perusahaan. Penempatan di wilayah setempat dan tidak dapat dipindahkan ke wilayah kerja lain.
Adapun kriteria yang dipersyaratkan adalah sebagai berikut :



PERSYARATAN UMUM:

1.Jenis Kelamin laki-laki; status belum menikah.

2.Pendidikan terakhir SMK Teknik Mesin/listrik/Kimia atau SMA/MAN Jurusan IPA

3.Nilai NEM rata-rata 6 dan untuk SMA/MAN Jurusan IPA Nilai STTB/NEM mata pelajaran Fisika dan Kimia minimal 7

4.Umur maksimal tahun kelahiran 1990.

5.Tinggi badan minimal 155 cm.

6.Sehat jasmani dan rohani berdasarkan pemeriksaan dokter/laboratorium yang ditunjuk perusahaan.

7.Lulus seluruh tahapan seleksi, yang meliputi : seleksi administrasi, tes Fisik, tes Akademis, Psikotes, Tes Kesehatan, Wawancara dan Diklat Prajabatan.


PERSYARATAN KHUSUS
1.Diutamakan berasal dari penduduk di wilayah kerja PT PLN (Persero) Wilayah Nusa Tenggara Timur dan dibuktikan dengan KTP

2.Berat badan proporsional terhadap tinggi badan, tidak melebihi standar obesitas (Body Mass Index (BMI) maksimum 30).

3.Berbadan sehat (sesuai standar laboratorium), tidak buta warna, tidak rabun malam, maksimum minus 2 dan tidak silindris, dan tidak menderita epilepsi.

4.Tidak terlibat dalam penyalahgunaan narkoba dan zat adiktif lainnya dan tidak terlibat tindakan criminal yang dituangkan dalam surat pernyataan di atas materai.

5.Tidak bertatto dan tidak ditindik/bekas tindik di telinganya atau anggota tubuh lainnya

6.Memiliki kemampuan fisik untuk dapat melakukan pekerjaan di Bagian Operasi, termasuk diantaranya:
a. Bekerja secara shift (siang/malam)
b. Bekerja pada fasilitas pembangkit di lokasi pembangkit
c. Bekerja secara disiplin dan melaksanakan peraturan SMM (Sistem Manajemen Mutu), SML (Sistem Manajemen Lingkungan), SMK3 (Sistem Manajemen Kesehatan dan Keselamatan Kerja), dan K2LH (Kebersihan dan Keteduhan Lingkungan Hidup).

7.Bersedia mengikuti pendidikan prajabatan selama maksimal 12 bulan dengan status sebagai siswa Diklat prajabatan.

8.Apabila telah lulus Diklat prajabatan, akan diangkat sebagai Pegawai tetap dan wajib menjalani ikatan dinas selama 5 (lima) tahun semenjak diangkat sebagai pegawai.


Bagi pelamar yang memenuhi kriteria tersebut di atas, dapat mengirim lamaran kepada General Manager PT PLN (Persero) Wilayah Nusa Tenggara Timur Cq : Panitia Rekrutmen PT PLN (Persero) Wilayah Nusa Tenggara Timur dan dikirim ke PO BOX 1000 Kupang (tidak diperkenankan mengirimkan lamaran lebih dari 1) dengan melampirkan dokumen berupa:

1.Fotokopi KTP/SIM yang masih berlaku

2.Fotokopi Akte Kelahiran/Surat Kenal Lahir yang telah dilegalisir

3.Fotokopi ijazah dan NEM/STTB SMK Teknik Mesin/listrik/Kimia atau SMA/MAN yang telah dilegalisir

4.Fotokopi raport terakhir yang telah dilegalisir

5.Pas Photo 4x6 sebanyak 3 lembar

6.Riwayat Hidup Peserta

7.Surat lamaran ditujukan kepada :
Panitia Rekrutmen Operator & Teknisi PT PLN (Persero) Wilayah Nusa Tenggara Timur

8.Surat pernyataan di atas materai yang menyatakan bahwa:
otidak terlibat dalam penyalahgunaan narkoba dan zat adiktif lainnya dan
otidak terlibat tindakan kriminal.

9.Surat keterangan sehat dan tidak buta warna

10.Nomor telepon atau HP peserta yang bisa dihubungi


Lamaran ini ditutup tanggal 24 Agustus 2010 (cap pos). Penyampaian lamaran lebih dari waktu tersebut tidak akan diproses. Hanya pelamar yang memenuhi persyaratan yang akan dipanggil untuk mengikuti seleksi. Tempat dan jadwal seleksi akan diberitahukan kemudian oleh PT PLN (Persero) Wilayah Nusa Tenggara Timur

Kupang, 16 Agustus 2010

ttd
Panitia Rekrutmen








*) Hasil seleksi administrasi dapat dilihat pada kantor-kantor cabang dan ranting PLN diseluruh NTT antara tanggal 3 s.d 5 September 2010
*) Peserta yang lulus seleksi administrasi akan mengikuti tes fisik pada tanggal 15 s.d 16 September 2010

Monday, June 28, 2010

Bermain Dengan RegEdit




1. Membuat Shorcut tanpa nama

- klik kanan shorcut
- rename
- tahan Alt
-lalu tekan Tombol 2 5 5

2. Membersihkan Recent Document

- run “gpedit.msc”
- klik Administrative Templates di bawah User Configuration
- klik Start Menu and taksbar
- klik Clear history of recenly opened documents on exit
- pilih enabled.

3. Menghilangkan Run Dari start menu

- run “gpedit.msc”
- klik Administrative Templates di bawah User Configuration
- klik Start Menu and taksbar
- klik Remove Run from Start menu
- pilih enabled

4. Memodifikasi “Send To” pada klik kanan

- Explorer -> C:\Documents and Settings -> klik folder Administrator (Username mU)
- Tools -> Folder Option -> View -> Show hidden File and Folder (untuk menampilkan file yang tersembunyi)
- Klik folder ‘Send To’
- modifikasi (hapus atau buat shortcut baru) yang mau kamu tampilkan pada klik kanan ‘Send To’

5. Menghilangkan Prefetch
- run “regedit”;
- cari [HKEY_LOCAL_MACHINE\SYSTEM\ CurrentControlSet\Control\ Session Manager\ Memory Management\ PrefetchParameters\ EnablePrefetcher];
- ubah nilainya menjadi 0 (disable)
- reboot

6. Mengembalikan ‘Show hidden File and Folder’ jika hilang atau terkena virus
- copy paste script di bawah pada Notepad lalu simpan dengan ekstensi .reg , misal hidden.reg
- double klik file hidden.reg

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\ Explorer\Advanced\Folder\Hidden]
“Text”=”@shell32.dll,-30499?
“Type”=”group”
“Bitmap”=hex(2):25,00,53,00,79,00,73,00,74,00,65,00,6d,00,52,00,6f,00,6f,00,74,\
00,25,00,5c,00,73,00,79,00,73,00,74,00,65,00,6d,00,33,00,32,00,5c,00,53,00,\
48,00,45,00,4c,00,4c,00,33,00,32,00,2e,00,64,00,6c,00,6c,00,2c,00,34,00,00,\
00
“HelpID”=”shell.hlp#51131?

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\ Explorer\Advanced\Folder\Hidden\NOHIDDEN]
“RegPath”=”Software\\Microsoft\\Windows\\CurrentVersion\\Explorer\\Advanced”
“Text”=”@shell32.dll,-30501?
“Type”=”radio”
“CheckedValue”=dword:00000002
“ValueName”=”Hidden”
“DefaultValue”=dword:00000002
“HKeyRoot”=dword:80000001
“HelpID”=”shell.hlp#51104?

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\ Explorer\Advanced\Folder\Hidden\SHOWALL]
“RegPath”=”Software\\Microsoft\\Windows\\CurrentVersion\\Explorer\\Advanced”
“Text”=”@shell32.dll,-30500?
“Type”=”radio”
“CheckedValue”=dword:00000001
“ValueName”=”Hidden”
“DefaultValue”=dword:00000002
“HKeyRoot”=dword:80000001
“HelpID”=”shell.hlp#51105?

7. Menghilangkan Recent Document
- run “gpedit.msc”
- klik Administrative Templates di bawah User Configuration
- klik Start Menu and taksbar
- klik Do not keep history of recenly opened documents
- pilih enabled

8. Menghilangkan Recycle Bin dari dekstop icon

- run “gpedit.msc”
- klik Administrative Templates di bawah User Configuration
- klik Dekstop
- klik Remove Recycle Bin Icon from dekstop
- pilih enabled

9. Memperbaiki Registry Windows :

- run “cmd”
- ketik “scanreg/restore”


10. Membuat background image pada drive atau flashdisk

- dari explorer pilih “Tools”
- pilih ‘Show hidden file’ dan uncheck ‘hide protected operating system file’
- OK

- misal, klik pada drive D: buat file dekstop.ini
- isi dengan beberapa baris di bawah ini :

[.ShellClassInfo]

[{BE098140-A513-11D0-A3A4-00C04FD706EC}]
Attributes=1

IconArea_Image=image.jpg
IconArea_Text=0×0000FF

- save
- kembalikan ’show hidden file’ & ‘hide protected OS file’ ke kondisi semula (opsional)
- untuk flashdisk,copy paste file dekstop.ini beserta image yang ingin ditampilkan ke flasdisk kamu

Ket :

IconArea_Image=image.jpg -> mengarah pada nama file image kamu (nama harus sama,gunakan path jika image berbeda folder)
IconArea_Text=0×0000FF -> mengarah pada warna tulisan untuk foldermu (format blue-green-red) jadi,jika warna merah yang seharusnya RGB FF0000 menjadi BGR 0000FF,jika ingin warna hitam maka ganti dengan 0×000000

Thursday, June 24, 2010

Mengunci folder Flash disk dengan Password

(Mengunci Folder dengan Notepad)

Bete data-data Pribadi Flash Loe dibongkar-bangkir teman, pacar, adek, kakak, nenek, bahkan kucing tetangga??? Apalagi data-data itu bersifat sangat pribadi… Mungkin Laporan Nama-nama tersangka Korupsi (Wahahaha.. Lebayyyy…), mungkin data Tugas kamu yang gak boleh teman kamu tau… ato mungkin Koleksi Video, Cerita, Maupun gambar yang Dilarang ama Tuhan (Bertobatlah!!)…
Semua itu gampang… Kunci aja Folder Rahasiamu itu make Password kamu… tentunya passwordnnya kamu yang buat jadi Cuma kamu dan Tuhan yang tahu… Dijamin aman tentram dah,.. gak akan Pikiran lagi kalo flash dipinjamin,,, Bisa tidur nyeyak nih…
Folder sob kunci akan menghilang dari tampilan menu… kalo Tampilan Foldernya di show hidden File maka folder yang terkunci itu akan berubah menjadi jalan Pintas ke control panel jadi gak ketahuan dan gak akan bisa dibuka Folder sob itu… so gimana carannya??? Ikutin aja Langkah-langkah Berikut:

1. Buka Notepad Teman… (Tau kan Cara buka Notepad,,, Pilih Start -> All Programs -> Accessories -> Notepad, ato tekan tombol Windows + tombol ‘R’ setelah muncul kotak Run, tulis Notepad dan tekan Oke..)
2. Copas (Copy-Paste) Kode dibawah Ini ke Notepad sob…

cls
@ECHO OFF
title Folder Locker
if EXIST "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}" goto UNLOCK
if NOT EXIST Locker goto MDLOCKER
:CONFIRM
echo Kunci Folder ini?(Y/N)
set/p "cho=>"
if %cho%==Y goto LOCK
if %cho%==y goto LOCK
if %cho%==n goto END
if %cho%==N goto END
echo Invalid choice.
goto CONFIRM
:LOCK
ren Locker "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
attrib +h +s "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
echo Folder locked
goto End
:UNLOCK
echo Enter password to Unlock folder
set/p "pass=>"
if NOT %pass%==TULIS PASSWORD goto FAIL
attrib -h -s "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
ren "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}" Locker
echo Folder Unlocked successfully
goto End
:FAIL
echo Invalid password
goto end
:MDLOCKER
md Locker
echo Locker created successfully
goto End
:End


3. Ganti kata TULIS PASSWORD dengan Password yang anda Inginkan

4. Setelah Copas Kode itu Save Notepad dengan Format *.bat
Contoh: Pasword.bat
Pilih All Files untuk Type filennya… lalu klik save di tempat dimana anda Ingin Menyembunyikan Foldernnya… atau langsung aja Save ke Flash disk Sob…

5. Setelah itu double klik ke Password.bat yang tadi baru disimpan, maka akan muncul folder bernama Locker… nah didalam Folder ini silahkan disimpan data Penting anda…

6. Setelah data-data Rahasia Anda dimasukan kedalam file Locker maka double Klik lagi ke Password.bat tadi…

7. Setelah Muncul Peringatatan/perintah Kunci Folder maka tekan ‘Y’ dan Enter maka Folder anda tidak keliatan lagi… yang ada hanyalah jalan Pintas ke Kontrol Panel…

8. Jika Ingin Membuka Data anda tadi maka double Klik pada Password.bat tersebut dan masukan password yang anda Buat tadi…

Semoga Membantu,,,

_Raymond_

Monday, February 22, 2010

PLN Area Pelayanan Marunda


Area Pelayanan (AP)
Marunda
Jl. Bhayangkara No. 10-11A, Ruko Koja Baru - Tugu Utara
Telp .(021) 9173393, 43905220, 43905217
Fax. (021) 43905217
E-mail: marunda@plnjaya.co.id


No. Jabatan Nama Telepon
1 MANAGER Muhamad Syafrudin 081365100905
2 ASMAN Komersil Fachrurroji 081314744844
3 ASMAN Pemasaran dan Pelayanan Pelanggan Suryadi Abdullah 08129221517
4 Pencatatan Meter Imam Julliadhy 0817151334
5 ASMAN Administrasi dan Keuangan Nursamsi 08129999137
6 ASMAN Pengendalian Losses - -

Data Umum Area Pelayanan Marunda s.d. Desember 2009
1 Luas Wilayah 23.5 km2
2 Batas Wilayah :

- Utara

Laut Jawa, Jl. Raya Jampea s/d Jl. Yos Sudarso
- Timur Sepanjang Cakung Drain
- Selatan Jl. Pegangsaan II, Jl. Raya Bekasi s/d Cakung Drain
- Barat Jl. Pegangsaan II sisi Timur, Jl. Raya Plumpang sisi utara
Panjang JTM -
Panjang JTR -
Jumlah Gardu Terpasang -
Kapasitas Trafo Terpasang : -
Jumlah Pelanggan 93.021 pelanggan
Daya Tersambung 588.469.350 KVA
Energi Terjual per bulan 148.405.449 KWh
Rupiah Penjualan per bulan 610.73 Rupiah
Rupiah Penjualan s.d. Desember 2009 90.635.843.560
Rupiah Tunggakan s.d. Desember 2009 3.537.455.940
Jumlah Payment Point 30
Jumlah Pegawai 30 Pegawai
Rata-rata kWh/Pegawai 4.946.848
Rata-rata Rp.Penjualan/Pegawai 3.021.195
Rata-rata Pelanggan/Pegawai 3.101
Rata-rata KVA/Pegawai 19.615.645

Tuesday, February 2, 2010

FINALEXAMCCNA

Which network design layer provides a connection point for end user devices to the network?
access
core
distribution
#network
What type of cable would be required to connect a Linksys router to a wired PC?
#crossover cable
rollover cable
serial cable
straight-through cable
What is a function of the distribution layer in the hierarchical design model?
to provide latency free switching
to organize end devices in small manageable groups
to provide connectivity using the high-speed backbone
#to provide connectivity between smaller local networks
1. Which protocol is used by a client to browse the web server?
FTP
*HTTP
POP
SMTP
2. As an assignment, a computer science student needs to present data in binary format. What are the two possible values that the student can use? (Choose two.)
*0
*1
2
A
F
3. Refer to the exhibit. Host A sends a message to a group of four computers out of the ten computers on this network. Which type of message does host A send?
broadcast
*multicast
simulcast
unicast
4. What is the function of the DNS server?
It maps the IP address to the MAC address.
*It translates a computer or domain name to the associated IP address.
It manages the domain that clients are assigned to.
It accepts HTTP requests from clients.
5. TCP/IP data transmission between the source and destination host is de-encapsulated in four steps:
A. The TCP header is removed.
B. Bits are decoded and the destination MAC address is recognized.
C. The IP header is removed and the contents are passed to the next layer.
D. The Ethernet header and trailer are removed.
What is the correct sequence of these steps?
A, B, C, D
A, C, B, D
B, C, D, A
*B, D, C, A
C, A, B, D
6. All hosts within a domain receive the same frame that originates from one of the devices. The domain is also bounded by routers. What type of domain is this?
*broadcast
collision
local
multicast
7. Which protocol is used by a client to retrieve an e-mail from a remote server using a TCP/IP connection?
DNS
FTP
*POP
HTTP
8. Which two statements correctly describe MAC addresses? (Choose two.)
*MAC addresses are used to identify a specific NIC.
MAC addresses contain a network number and unique host identification.
*MAC addresses are physical addresses.
MAC addresses are always assigned to network devices by a network administrator.
MAC addresses are Layer 3 addresses.
9. Which of the following are transport layer protocols of the TCP/IP model? (Choose two.)
FTP
*UDP
SMTP
TFTP
*TCP
10. Which two statements are characteristics of DHCP services? (Choose two.)
A DHCP client determines the lease time for using the IP address that is supplied by the DHCP server.
An integrated router acts as the DHCP server to provide the IP address to the ISP.
*DHCP clients send a DHCP Discover message to the destination IP address of 255.255.255.255.
The DHCP server maps the IP addresses to host names.
*The integrated router acts as a DHCP server for internal hosts on local networks.
11. A small company owns one older AP that provides a maximum data rate of 11 Mb/s. The company wants to add a newer AP that will provide a faster data rate but be compatible with the existing AP. What two wireless standards are referenced in this scenario? (Choose two.)
802.11
802.11a
*802.11b
802.11d
*802.11g
12. What layer is the first point of entry for a host into the network?
core layer
access layer
network layer
distribution layer
13. When is the use of a DSL modem necessary?
when a cellular telephone provides the service
when a high-speed connection is provided over a cable TV network
*when a high-speed digital connection is required over the regular telephone line
when a satellite dish is used
14. A network technician is required to provide access to the Internet for a large company. What is needed to accomplish this task?
*ISP
private IP addresses for each host
static IP addresses for each host
DHCP server
15. Which two statements are true about network applications? (Choose two.)
Microsoft Word is an example of a network application.
*Network applications are accessible from a remote computer.
Network applications are installed on a special type of computer that supports only network applications.
*Network applications are installed on a network server.
Network applications are accessible by one computer at a time.
16. Refer to the exhibit. Which statement is true based on the information that is shown in the exhibit?
*All wireless devices that are connected to this AP must have an assigned SSID of University.
Any wireless client that is attached to this AP must have the same IP address and SSID.
The AP is not physically wired to the local LAN.
This configuration is found only in an ad hoc wireless network.
17. Which statement accurately describes what network devices do in the distribution layer of the three layer design model?
They interconnect individual hosts.
They interconnect multiple companies.
*They interconnect local network segments.
They interconnect the company network to the ISP.
18. What are two advantages of purchasing a preassembled computer? (Choose two.)
*The cost is comparatively lower.
High-performance graphics and gaming applications are supported.
*There is a negligible waiting period for assembly.
This type of computer is useful for knowledgeable consumers with special needs.
The user can specify high-performance components.
19. What is the most common reason that ISPs provide symmetrical transfer services?
to address data transfer needs of home users
to download significantly more than upload
*to host servers on the Internet
to work with applications that require less bandwidth
20. What are two examples of peripheral input devices? (Choose two.)
external modem
*barcode reader
*digital camera
plotter
printer
21. What is an advantage of purchasing a custom-built computer?
It is beneficial for less knowledgeable consumers.
The waiting period for assembly is negligible.
The cost is lower compared to a computer that has been preassembled.
*The user can specify high-performance components to meet specific needs.
22. Which three address ranges can be used to depict private IP addresses? (Choose three.)
*10.0.0.0 to 10.0.0.255
127.16.0.0 to 127.16.255.255
150.150.0.0 to 150.150.255.255
*172.16.1.0 to 172.16.1.255
*192.168.22.0 to 192.168.22.255
200.100.50.0 to 200.100.50.255
23. Where do ISPs get the public addresses that they assign to end users?
ISPs create the addresses themselves.
ISPs are assigned addresses through the RFC.
ISPs obtain their addresses automatically.
*ISPs obtain address blocks from registry organizations.
24. For an IP address, what component decides the number of bits that is used to represent the host ID?
default-gateway
host number
network number
*subnet mask
25. What is the default subnet mask for the IP address 128.107.23.10?
255.0.0.0
255.255.0.0
255.255.255.0
255.255.255.255
26. What is the purpose of pop-up blocker software?
It detects and removes spyware.
It detects and removes viruses.
*It prevents the display of advertisement windows.
It removes unwanted e-mail.
27. What is the purpose of spam filter software?
It detects and removes spyware.
It detects and removes viruses.
It prevents the display of advertisement windows.
*It examines incoming e-mail messages to identify the unsolicited ones.
28. Which part of the electromagnetic spectrum is commonly used by wireless LANs?
Bluetooth
infrared
Industrial Scientific and Medical (ISM)
*radio frequency (RF)
29. Your school network blocks all websites related to online gaming. What type of security policy is being applied?
identification and authentication
remote access
*acceptable use
incident handling
30. Refer to the graphic. What feature can be installed on the Linksys integrated router to convert private IP addresses to Internet-routable addresses?
authentication
DHCP
encryption
firewall
*NAT
WEP
31. Which statement is true about packet filtering?
It recognizes and filters specific types of attacks.
*It permits access based on IP address.
It is performed from a host network device.
It translates an internal address or group of addresses into a public address that is sent across the network.
32. Which type of computer uses an integrated monitor and keyboard?
pocket PC
*laptop
mainframe
server
workstation
33. How does a crossover cable connect two routers?
It connects the pins that are used for receiving on one router to the pins that are used for receiving on the other router.
*It connects the pins that are used for transmitting on one router to the pins that are used for receiving on the other router.
It disconnects the transmit pins and uses only the receive pins.
It uses the same pins for transmitting and receiving.
34.Select the connection that would require a straight-through cable.
a switch to a hub
*a router to a switch
a switch to a switch
a router to a router
35. What information within a data packet does a router use, by default, to make forwarding decisions?
the destination MAC address
*the destination IP address
the destination host name
the destination service requested
36. Refer to the exhibit. What is the effect of setting the security mode to WEP on the Linksys integrated router?
The WEP security mode enables the AP to inform clients of its presence.
*The WEP security mode encrypts network traffic during transmission between the AP and the wireless client.
The WEP security mode generates a dynamic key each time a client establishes a connection with the AP.
The WEP security mode identifies the WLAN.
37. What data communication technology uses low-power radio waves to transmit data?
copper cable
fiber optic cable
*wireless
radio
38. What is an advantage of selecting an operating system that has a commercial license over one with a GPL license?
The commercial license-based operating system ensures full access to the source code for everyone.
The commercial license-based operating system ensures that everyone can participate in the enhancement of the product.
*The commercial license-based operating system provides structured support.
The commercial license-based operating system is released free of charge.
39. A learner wants to interact with the operating system of a computer. Which two methods can be used for this? (Choose two.)
*CLI
*GUI
kernel
third party software
shell
40. Within a local network, which two items must be unique on a computer for it to successfully connect to the network? (Choose two.)
*IP address
subnet mask
*computer name
default gateway address
operating system version
41. Refer to the exhibit. Assume that the exhibited output is from a host that is connected to a Linksys integrated router. What is the first thing that should be checked while using a bottom-up troubleshooting approach?
the default gateway on the host
the IP address on the host
the IP address on the router
*the link status LED on the front of the router
the subnet mask on the host
42. The area covered by a single AP is known as what?
ad-hoc network
*basic service set
independent basic service set
extended service set
distribution system
43. What is the purpose of the ipconfig /release command?
*It forces a client to give up its current IP address.
It forces a client to give up its current MAC address.
It forces the client to clear all the MAC address to IP address associations it has learned.
It shows the current IP configuration on the client.
44. Which statement is true about UTP cable termination?
Cables with RJ-45 connectors are always preterminated.
An RJ-45 connector is used on only one end of the UTP cable.
Up to 2 to 3 inches of cable may be untwisted at each end of the cable to allow for easier installation of the RJ-45 connector.
*The RJ-45 connector should be pushed over the wire jacket for a smooth connection.
45. Which installation option should be chosen when the current operating system is too damaged to work properly?
upgrade
multi-boot
*clean install
virtualization
46. What is the meaning of the term crosstalk?
*interference of signals between wire pairs
loss of signal strength as distance increases
damage of the signal when two bare wires touch
strengthening of a signal by a networking device
47. Which two causes of networking problems are related to the physical layer? (Choose two.)
*disconnected cables
*improper operation of cooling fans
incorrect MAC address
incorrect default gateway
incorrect subnet mask
48. Refer to the exhibit. What cabling fault does the exhibit represent?
open
reversed pair
short
*split pair
49. A user is unable to send e-mail. To begin troubleshooting this problem, the network technician uses the browser on the PC and tries to access some popular Internet websites. Which troubleshooting approach is being followed?
bottom-up
divide-and-conquer
*top-down
trial and error
50. Refer to the exhibit. A wireless DHCP client is unable to access the web server. Given the output that is shown in the exhibit, what two things should the network technician verify first to troubleshoot this problem? (Choose two.)
*the wireless client configuration for DHCP
the default gateway
the firewall configuration
*the SSID
the physical connectivity between the server and the client
1. What is specified by the host bits in an IP address?
broadcast identity of the network
*identity of the computer on the network
network that is being addressed
network to which the host belongs
2. What measurement is commonly used to describe communication speed when transferring data?
*bps
cps
Hz
MB
3. What is the function of the DNS server?
It maps the IP address to the MAC address.
*It translates a computer or domain name to the associated IP address.
It manages the domain that clients are assigned to.
It accepts HTTP requests from clients.
4. Refer to the exhibit. A user on host A sends an e-mail to the user on host B. Which type of message does host A send?
broadcast
multicast
simulcast
*unicast
5. All hosts within a domain receive the same frame that originates from one of the devices. The domain is also bounded by routers. What type of domain is this?
*broadcast
collision
local
multicast
6. A network engineer wants to represent confidential data in binary format. What are the two possible values that the engineer can use? (Choose two.)
*0
*1
2
A
F
7. Which two transport layer protocols are used to transfer messages between hosts? (Choose two.)
DHCP
FTP
SMTP
*TCP
*UDP
8. Refer to the exhibit. After connectivity has been established, an Internet user needs to upload a text file. Using the TCP/IP model, one protocol will be required at the application layer and another at the internetwork layer. Which two protocols will be used at those two layers for the upload? (Choose two.)
DHCP
*FTP
*IP
TCP
UDP
9.What is the correct sequence of steps in the encapsulation of TCP/IP data as it passes from a source to a destination host?
A. converts data to bits for transmission
B. packages the data for end to end transport
C. adds the data-link header and trailer
D. adds the network IP address to the header of the packet
A,B,C,D
A,C,D,B
*B,D,C,A
B,C,D,A
D,C,B,A
10. Which three types of information are provided to a DHCP client from a DHCP server? (Choose three.)
host ID
MAC address
*default gateway
*IP addresses of DNS servers
physical address
*subnet mask
11. Refer to the exhibit. Assume that the command output is from a wireless DHCP client that is connected to a Linksys integrated router. What can be deduced from the output?
The DHCP configuration on the router needs to be verified.
The WEP key or SSID needs to be verified.
*The wireless connection is operational.
The wireless NIC driver or the NIC itself needs to be reinstalled.
12. When is a dial-up connection used to connect to an ISP?
when a cellular telephone provides the service
when a high-speed connection is provided over a cable TV network
when a satellite dish is used
*when a regular telephone line is used
13. What are two examples of peripheral output devices? (Choose two.)
barcode reader
digital camera
external DVD
*headphones
*printer
A home user was successfully browsing the Internet earlier in the day but is now unable to connect. A ping command from a wireless laptop to a wired PC in the LAN is successful, but the nslookup command fails to resolve a website address. The user decides to analyze the LEDs on the Linksys router to verify connectivity. Which LED should be of main concern in this situation?
WLAN LED
power LED
Internet LED
#1-4 Ethernet LEDs
14. A network technician is required to provide access to the Internet for a large company. What is needed to accomplish this task?
ISP
private IP addresses for each host
static IP addresses for each host
DHCP server
A college network administrator is planning a wireless LAN to provide service in the student lounge and outdoor patio. The requirements include a range of at least 80 meters and a speed of 30 Mb/s. Which wireless LAN standard meets these requirements?
802.11
#802.11a
802.11b
802.11g
Because of an increasing number of users, bandwidth per user on a WLAN has decreased to a point where users are complaining about poor performance. What can be done to improve the user experience?
Increase the AP radio signal strength.
Place the AP in a more central location.
Deploy an external omni-directional antenna.
#Reduce the number of devices using each channel.
Which adapter card would be required for a PC to exchange information with other PCs on a LAN?
#NIC
video card
sound card
internal modem
In IP telephony, what is the purpose of a gateway to the PSTN?
to connect IP voice clients to Internet phone service
to create a peer-to-peer connection between two IP voice clients
to map unique names of IP voice endpoints to a client list on a voice server
#to allow IP voice clients to communicate with regular analog telephones.
All hosts within a domain receive the same frame that originates from one of the devices. The domain is also bounded by routers. What type of domain is this?
#broadcast
collision
local
multicast
Which protocol is used to transfer files among network devices and perform file-management functions?
DNS
#FTP
HTML
HTTP
A network administrator has been notified that users have experienced problems gaining access to network resources. What utility could be used to directly query a name server for information on a destination domain?
ping
tracert
netstat
ipconfig
#nslookup
Which two components are configured via software in order for a PC to participate in a network environment? (Choose two.)
#MAC address
#IP address
kernel
shell
subnet mask
What is true about a wireless access point that is equipped with an omnidirectional antenna?
concentrates signal in one direction
typically used in bridging applications
radiates the signal equally in all directions
#provides the greatest transmission distance of all antenna types that are used by APs
Which device is often configured to act as both a DHCP client and a DHCP server?
home PC
ISP modem
#wireless-enabled laptop
integrated services router
A home user is looking for an ISP connection that provides high speed digital transmission over regular phone lines. What ISP connection type should be used?
DSL
#dial-up
satellite
cell modem
cable modem
What data communication technology uses low-power radio waves to transmit data?
copper cable
fiber optic cable
#wireless
radio
15. What statement describes the filtering of traffic via the use of Stateful Packet Inspection?
It recognizes and filters predefined URLs
It permits access that is based on the application.
It permits access based on IP or MAC addresses.
*It permits incoming packets that are legitimate responses to requests from internal hosts.
It translates an internal address or group of addresses into a public address that is sent across the network.
16. Which statement accurately describes what network devices do in the distribution layer of the three layer design model?
They interconnect individual hosts.
They interconnect multiple companies.
*They interconnect local network segments.
They interconnect the company network to the ISP.
17. Which two statements are true about local applications? (Choose two.)
They run on the network.
An example of a local application is e-mail.
They are accessed from a remote computer.
*They are stored on the local hard disk.
*They run on the computer where they are installed.
18. Which network design layer provides a connection point for end user devices to the network?
access
core
distribution
network
19. What are two advantages of purchasing a custom-built computer? (Choose two.)
usually a lower cost
no waiting period for assembly
*user can specify higher performance components
*supports higher-end graphics and gaming applications
fewer components to replace
20. Which portion of the packet does a router use to forward the packet to the destination?
source IP address
user data
*destination IP address
control information
destination MAC address
21. What is the purpose of a router?
to forward broadcasts to all interfaces so that all hosts receive them
to maintain a table of individual host addresses
*to select the best path to reach remote networks
to physically connect multiple hosts that belong to the same network
22. How do ISPs obtain public IP addresses?
They create the addresses themselves.
They obtain the addresses from the home PCs.
*They obtain the addresses from the Internet registry.
They obtain the addresses from the RFC.
23. What is the default subnet mask for an IP address of 198.133.219.4?
255.0.0.0
255.255.0.0
*255.255.255.0
255.255.255.255
24. For an IP address, what component decides the number of bits that is used to represent the host ID?
default-gateway
host number
network number
*subnet mask
25. Which three addresses belong to the category of private IP addresses? (Choose three.)
*10.0.0.1
128.0.0.1
150.0.0.1
*172.16.0.1
*192.168.31.19
172.168.31.1
26. Which part of the electromagnetic spectrum is commonly used to exchange data between a PDA and a computer?
FM
radar
*infrared
ultraviolet
TCP/IP data transmission between the source and destination host is encapsulated in four steps:
A. adds the data-link header and trailer;
B. converts data to bits for transmission;
C. adds the network IP address to the header of the packet;
D. segments the data for end-to-end transport.
A, B, C, D
A, D, B, C
B, D, A, C
#D, C, A, B
D, C, B, A
Refer to the exhibit. H1 can ping H2, H3, and the Fa0/0 interface of router R1. H2 and H3 but not H1 can ping H4 and H5. What is a possible cause for the H1 failure?
Router R1 has no route to the destination network.
Switch S1 does not have an IP address configured.
#The link between router R1 and switch S2 has failed.
Host H1 does not have a default gateway configured.
What is the correct sequence of these steps?
For the TCP/IP model for internetwork communication, which statement describes the process for the transition of data from the internet layer to the network access layer?
An IP packet is encapsulated in a frame.
#A TCP segment is placed in an IP packet.
HTML data is encapsulated in a TCP segment.
A frame is placed on the network media as encoded bits.
A network technician suspects that malware on a user PC is opening multiple TCP connections to a specific foreign host address. Which Windows command line utility can be used to confirm the multiple TCP connections?
#ping
netstat
tracert
ipconfig
nslookup
After attaching four PCs to the switch ports, configuring the SSID and setting authentication properties for a small office network, a technician successfully tests the connectivity of all PCs that are connected to the switch and WLAN. A firewall is then configured on the device prior to connecting it to the Internet. What type of network device includes all of the described features?
switch
#ISR router
firewall appliance
standalone wireless access point
After issuing the ipconfig/all command on a host that has DHCP enabled, a network administrator notes that the output contains faulty IP configuration information. What is the first step the administrator should take to resolve this issue?
Replace the NIC in the host.
Change the IP address of the DHCP server.
Use static addressing to assign the correct IP address.
#Use the release and renew options supported by the ipconfig command.
A network engineer wants to represent confidential data in binary format. What are the two possible values that the engineer can use? (Choose two.)
#0
#1
2
A
F
27. What is a service pack?
an access policy
an agreement between a company and a vendor
a piece of code created to fix one specific problem
*a collection of patches and updates released by a vendor
a small piece of software designed specifically for security issues
28. Refer to the exhibit. The security policy of an organization requires users to change their password every week. Which type of security policy is this?
acceptable use
network maintenance
*password
remote access
29. Refer to the exhibit. An educational institution needs to connect PC systems that use private IP addressing to the Internet. They have multiple systems that need to access the Internet, but were only able to purchase one public IP address. What should be activated on the Linksys integrated router to achieve this goal?
authentication
DHCP
encryption
firewall
*NAT
WEP
30. Which wireless authentication method allows the use of a backend authentication server?
*EAP
Open
PSK
WEP
31. What wireless technology has the ability to communicate with many devices at the same time, makes use of the 2.4 GHz band, and is limited to low-speed, short-range communications?
RF
ISM
infrared
*Bluetooth
32. What is the purpose of the ipconfig command?
to force a client to give up its current IP address
to force the client to clear all IP-to-domain-name associations that is has learned
to force the client to clear all the MAC-address-to-IP-address associations that it has learned
*to show the current IP configuration on the client
33. What type of computer would most likely use a docking station?
*laptop
server
desktop
mainframe
workstation
34. A new student wants to interact with the operating system of a computer. Which two methods can be used for this? (Choose two.)
*CLI
*GUI
kernel
third party software
shell
35. How does a crossover cable connect two routers?
It connects the pins that are used for receiving on one router to the pins that are used for receiving on the other router.
*It connects the pins that are used for transmitting on one router to the pins that are used for receiving on the other router.
It disconnects the transmit pins and uses only the receive pins.
It uses the same pins for transmitting and receiving.
36. Refer to the exhibit. Assume that the exhibited output is from a host that is connected to a Linksys integrated router. What is the first thing that should be checked if using a bottom-up troubleshooting approach?
the default gateway on the host
the IP address on the host
the IP address on the router
*the link status LED on the front of the router
the subnet mask on the host
37. Refer to the exhibit. What is the effect of setting the security mode to WEP on the Linksys integrated router?
The WEP security mode enables the AP to inform clients of its presence.
*The WEP security mode encrypts network traffic during transmission between the AP and the wireless client.
The WEP security mode generates a dynamic key each time a client establishes a connection with the AP.
The WEP security mode identifies the WLAN.
38. For devices that do not autosense, which connection requires a crossover cable?
hub port to router port
PC to hub port
PC to switch port
*PC port to PC port
39. When terminating a UTP cable, why is it important to push the wires all the way into the end of the connector?
to allow the cable to endure more stretching or twisting
*to ensure good electrical contact
to ensure that the wires are in correct order
to minimize crosstalk
40. What is an advantage of selecting an operating system that has a commercial license over one with a GPL license?
The commercial license-based operating system ensures full access to the source code for everyone.
The commercial license-based operating system ensures that everyone can participate in the enhancement of the product.
*The commercial license-based operating system provides structured support.
The commercial license-based operating system is released free of charge.
41. What is the name for the contract between a customer and an ISP that specifies requirements for uptime and service response time?
DSL
IAB
NAP
*SLA
42. Refer to the exhibit. What is the purpose of assigning a network name of University?
It enables access to the AP configuration GUI by name rather than by address.
It encrypts data between the wireless client and the AP.
*It identifies the wireless LAN.
It translates an internal address or group of addresses to a public address.
It translates IP addresses into easy-to-remember domain names.
43. Which two IP configuration components does the computer use to identify its subnetwork? (Choose two.)
default gateway
*IP address
MAC address
DNS server address
*subnet mask
44. What is the name given to the area covered by an ad hoc network in a WLAN?
Basic Service Set (BSS)
Distribution System (DS)
Extended Service Set (ESS)
*Independent Basic Service Set (IBSS)
45. Which installation option should be chosen when the current operating system is too damaged to work properly?
upgrade
multi-boot
*clean install
virtualization
46. Identify two causes of physical layer network problems. (Choose two.)
logical addressing issues
*improperly terminated cables
*cables plugged into wrong ports
incorrect MAC address assigned
packets received out of sequence
incorrect subnet mask on an interface
47. What is the meaning of the term crosstalk?
*interference of signals between wire pairs
loss of signal strength as distance increases
damage of the signal when two bare wires touch
strengthening of a signal by a networking device
48. A user is unable to send e-mail. While troubleshooting this problem, the network technician first verifies the physical connectivity of cables. Which troubleshooting approach is being followed?
*bottom-up
divide-and-conquer
top-down
trial and error
49. Refer to the exhibit. What cabling fault does the exhibit represent?
open
reversed pair
short
*split pair
50. A wireless DHCP client cannot connect to the Internet through a Linksys integrated router. When you type ipconfig on the host, no IP address, subnet mask, or default gateway shows. What are two of the first things you will check? (Choose two.)
*SSID
*if the wireless client is configured for DHCP
the cable between client and integrated router
the firewall configuration on the integrated router
if the correct default gateway is configured on the client
if the correct default gateway is configured on the integrated router
1. What are the two possible values for a digital bit? (Choose two.)
*0
*1
A
F
#
9
2. Which protocol is used to transfer files among network devices and perform file-management functions?
DNS
*FTP
HTML
HTTP
3. What are two ways that a user can interact with an operating system shell? (Choose two.)
*CLI
OS
*GUI
NIC
kernel
4. What is the function of the DNS server?
It maps the IP address to the MAC address.
*It translates a computer or domain name to the associated IP address.
It manages the domain that clients are assigned to.
It accepts HTTP requests from clients.
5. Refer to the exhibit. A user on host A sends an e-mail to the user on host B. Which type of message does host A send?
broadcast
multicast
simulcast
*unicast
6. Which statement accurately describes what network devices do in the distribution layer of the three layer design model?
They interconnect individual hosts.
They interconnect multiple companies.
*They interconnect local network segments.
They interconnect the company network to the ISP.
7. All hosts within a domain receive the same frame that originates from one of the devices. The domain is also bounded by routers. What type of domain is this?
broadcast
collision
local
multicast
8. What does the term “attenuation” mean in data communication?
*loss of signal strength as distance increases
time for a signal to reach its destination
leakage of signals from one cable pair to another
strengthening of a signal by a networking device
9. Which two transport layer protocols enable hosts to communicate and transfer data? (Choose two.)
DHCP
ICMP
IP
*TCP
*UDP
10. Select three statements that correctly describe how DHCP services may be provided. (Choose three.)
An integrated router provides IP configurations for most ISPs.
*An integrated router can act as both DHCP server and DHCP client.
A home PC using a static IP address obtained that address from a DHCP server.
*Most home network integrated routers receive an IP configuration directly from their ISP.
*A variety of devices can act as DHCP servers, as long as they run DHCP service software.
A home PC that is unable to find a DHCP server defaults to the static IP address of 192.168.1.1.
11. What are two characteristics of a MAC address? (Choose two.)
It indicates the physical location of the host within the network.
It is dynamically assigned by a DHCP server.
*It is displayed in HEX characters.
*It is a physical address.
It is cable-based.
12.What is an ISP?
It is a standards body that develops cabling and wiring standards for networking.
It is a protocol that establishes how computers within a local network communicate.
*It is an organization that enables individuals and businesses to connect to the Internet.
It is a networking device that combines the functionality of several different networking devices in one.
13. What layer is the first point of entry for a host into the network?
core layer
*access layer
network layer
distribution layer
14. Which part of a data packet is used by a router to determine the destination network?
source IP address
user data
*destination IP address
control information
destination MAC address
15. When is a dial-up connection used to connect to an ISP?
when a cellular telephone provides the service
when a high-speed connection is provided over a cable TV network
when a satellite dish is used
*when a regular telephone line is used
16. Refer to the exhibit. Assume that the command output is from a wireless DHCP client that is connected to a Linksys integrated router. What can be deduced from the output?
The DHCP configuration on the router needs to be verified.
The WEP key or SSID needs to be verified.
*The wireless connection is operational.
The wireless NIC driver or the NIC itself needs to be reinstalled.
17. What is the most common reason that ISPs provide asymmetrical transfer services?
to carry a large amount of data in both directions at equal rates
to host servers on the Internet
*to work with applications that require significant bandwidth
to work with large business applications
18. What is a service pack?
an access policy
an agreement between a company and a vendor
a piece of code created to fix one specific problem
*a collection of patches and updates released by a vendor
a small piece of software designed specifically for security issues
19. What action will a router take when it receives a frame with a broadcast MAC address?
*It will not forward the frame to another network.
It forwards the frame back to the sending host with its IP address as a response.
It forwards the frame out of all interfaces except the interface where the frame was received.
It forwards the frame back out the receiving interface to insure all hosts on the local network receive it.
20. For the second time in a week, workstations on a LAN are not able to log into the server. The technician fixed the problem the first time, but cannot remember the steps taken to solve it. What aspect of the troubleshooting process has the technician neglected?
identifying the problem
asking end-users questions
*documenting the troubleshooting process
using structured techniques to solve a problem
21. Which two statements are true about network applications? (Choose two.)
Microsoft Word is an example of a network application.
*Network applications are accessible from a remote computer.
Network applications are installed on a special type of computer that supports only network applications.
*Network applications are installed on a network server.
Network applications are accessible by one computer at a time.
22. What is the default subnet mask for an IP address of 64.100.19.14?
*255.0.0.0
255.255.0.0
255.255.255.0
255.255.255.255
23. How do ISPs obtain public IP addresses?
They create the addresses themselves.
They obtain the addresses from the home PCs.
*They obtain the addresses from the Internet registry.
They obtain the addresses from the RFC.
24. For an IP address, what component decides the number of bits that is used to represent the host ID?
default-gateway
host number
network number
*subnet mask
25. Which of the following are the address ranges of the private IP addresses? (Choose three.)
*10.0.0.0 to 10.255.255.255
200.100.50.0 to 200.100.25.255
150.150.0.0 to 150.150.255.255
*172.16.0.0 to 172.31.255.255
*192.168.0.0 to 192.168.255.255
127.16.0.0 to 127.31.255.255
26. What is the purpose of spam filter software?
It detects and removes spyware.
It detects and removes viruses.
It prevents the display of advertisement windows.
*It examines incoming e-mail messages to identify the unsolicited ones.
27. Refer to the exhibit. The security policy of an organization allows employees to connect to the office intranet from their homes. Which type of security policy is this?
acceptable use
incident handling
network maintenance
*remote access
28. Which statement is true concerning stateful packet inspection?
Access is permitted based on IP addresses of the source and destination devices.
Access is permitted based on the MAC addresses of the source and destination devices.
Access is permitted only if the type of application that is attempting to reach the internal host is allowed.
*Access is permitted only if it is a legitimate response to a request from an internal host.
29. Refer to the exhibit. An organization needs to connect PC systems that use private IP addressing to the Internet. The organization has multiple systems that need to access the Internet, but were only able to purchase one public IP address. What should be activated on the Linksys integrated router to achieve this goal?
authentication
DHCP
encryption
firewall
*NAT
WEP
30. What wireless technology has the ability to communicate with many devices at the same time, makes use of the 2.4 GHz band, and is limited to low-speed, short-range communications?
RF
ISM
infrared
*Bluetooth
31. Which wireless authentication method uses the same key for the AP and the client?
EAP
Open
*PSK
WEP
32. What are two examples of storage peripheral devices? (Choose two.)
printer
*flash drive
headphones
*external DVD
barcode reader
33. What is the name given to the area covered by an ad hoc network in a WLAN?
Basic Service Set (BSS)
Distribution System (DS)
Extended Service Set (ESS)
*Independent Basic Service Set (IBSS)
34. Which type of computer has an integrated mouse?
desktop
*laptop
mainframe
server
pocket PC
How does a straight-through cable connect two unlike devices?
It connects the receive pins on the first device to the receive pins on the second device.
It connects the transmit pins on the first device to the receive pins on the second device.
It disconnects the transmit pins and uses only the receive pins.
#It uses the same pins for transmitting and receiving.
As data is sent from one host on an Ethernet network to another host on the same network, which two statements describe how the data is processed as it is received by the destination host? (Choose two.)
#The data is converted from bits into electrical signals.
#The data is de-encapsulated from a frame to a packet.
The destination MAC address is examined in the frame header.
The packet header is removed to analyze the segment header information.
The segment header and trailer are removed in order to read the packet header information.
35. What two commands can be used to form a new binding if client information does not agree with the DHCP client table? (Choose two.)
*ipconfig /release
ipconfig /all
ipconfig /flushdns
*ipconfig /renew
ipconfig
36. Refer to the exhibit. Assume that the exhibited output is from a host that is connected to a Linksys integrated router. What is the first thing that should be checked if using a bottom-up troubleshooting approach?
the default gateway on the host
the IP address on the host
the IP address on the router
*the link status LED on the front of the router
the subnet mask on the host
37. When terminating UTP cabling, why is it important to untwist only a small amount of each wire pair?
*minimizes crosstalk
makes installation faster
ensures wires are in correct order
makes it easier to fit wires into connector
38. Refer to the exhibit. What is the effect of setting the security mode to WEP on the Linksys integrated router?
The WEP security mode enables the AP to inform clients of its presence.
*The WEP security mode encrypts network traffic during transmission between the AP and the wireless client.
The WEP security mode generates a dynamic key each time a client establishes a connection with the AP.
The WEP security mode identifies the WLAN.
39. Which two components are configured via software in order for a PC to participate in a network environment? (Choose two.)
MAC address
*IP address
kernel
shell
*subnet mask
40. Refer to the graphic. What is the purpose of assigning a Network Name of Academy?
*It identifies the wireless LAN.
It translates IP addresses into easy-to-remember domain names.
It encrypts data between the wireless client and the access point.
It allows access to the AP configuration GUI by name rather than address.
It translates an internal address or group of addresses into an outside, public address.
41. When considering the purchase of a new operating system, what is meant by “Total Cost of Ownership?”
applications and support costs
hardware and support costs
hardware and software costs
*hardware, software, and support costs
hardware, operating system, and applications costs
42. Which media is used to carry electrical pulses that represent digital data?
*copper cable
fiber optic cable
wireless
radio
43. How does a crossover cable connect two routers?
It connects the pins that are used for receiving on one router to the pins that are used for receiving on the other router.
*It connects the pins that are used for transmitting on one router to the pins that are used for receiving on the other router.
It disconnects the transmit pins and uses only the receive pins.
It uses the same pins for transmitting and receiving.
44. Which connection requires a straight-through cable?
PC port to PC port
PC port to router interface
*switch port to router port
switch port to switch port
45. Refer to the exhibit. What is the effect of setting the security mode to WPA on the Linksys integrated router?
The WPA security mode uses the Passphrase option.
*The WPA security mode generates a dynamic key each time a client establishes a connection with the AP.
The WPA security mode prevents attackers from intercepting data.
The WPA security mode uses preconfigured keys to encrypt and decrypt data.
46. Which installation option should be chosen when the current operating system is too damaged to work properly?
upgrade
multi-boot
*clean install
virtualization
47. What is the meaning of the term crosstalk?
*interference of signals between wire pairs
loss of signal strength as distance increases
damage of the signal when two bare wires touch
strengthening of a signal by a networking device
48. A user is unable to send e-mail. While troubleshooting this problem, the network technician first verifies the physical connectivity of cables. Which troubleshooting approach is being followed?
*bottom-up
divide-and-conquer
top-down
trial and error
49. Which two causes of networking problems are related to the physical layer? (Choose two.)
*damaged cables and connectors
incorrect addressing
incorrect subnet mask
*overheated components
incorrect default gateway
50. Refer to the exhibit. A wireless DHCP client is unable to upload a file to the server. Given the output that is shown in the exhibit, what are two tasks that the network technician should do first to troubleshoot this problem? (Choose two.)
Verify the physical connectivity between the server and the client.
*Verify the wireless client configuration for DHCP.
Verify the firewall configuration.
Verify the default gateway.
*Verify the SSID.
Q.1 A company is developing an Internet store for its website. Which protocol should be used to transfer credit card information from customers to the company web server ?
FTPS
HTTP
#HTTPS
WEP2
TFTP
schéma1
Q.2. Refer to the exhibit. A new branch office has been added to the corporate network and anew router is to be installed to allow branch office users to access the database server at headquarters. How should the serial 0/0/0 interface of the new branch office router be configured to connect to the headquarters router ?
branch_23(config-if)# ip address 192.168.5.19 255.255.255.240
branch_23(config-if)# no shutdown
branch_23(config-if)# encapsulation hdlc
branch_23(config-if)# ip address 192.168.5.25 255.255.255.240
branch_23(config-if)# no shutdown
branch_23(config-if)# encapsulation ppp
branch_23(config-if)# no shutdown
branch_23(config-if)# encapsulation ppp
branch_23(config-if)# ip address 192.168.5.33 255.255.255.240
#branch_23(config-if)# encapsulation ppp
branch_23(config-if)# ip address 192.168.5.21 255.255.255.240
branch_23(config-if)# no shutdown
Q.3 Which two commands ensure that any password that permits access to the privileged EXEC mode is not shown in plain text when the configuration files are displayed ? (Choose two.)
#Router(config)# enable secret cisco
Router(config)# enable cisco
Router(config)# encryption-password all
Router(config)# enable login encrypted
Router(config)# enable password encryption
#Router(config)# service password-encryption
Q.4 A new network is to be configured on a router. Which of the following tasks must be completed to configure this interface and implement dynamic IP routing for the new network? (Choose three.)
#Select the routing protocol to be configured.
#Assign an IP address and subnet mask to the interface
Update the ip host configuration information with the device name and new interface IP address.
#Configure the routing protocol with the new network IP address.
Configure the routing protocol with the new interface IP address and subnet mask.
Configure the routing protocol in use on all other enterprise routers with the new network information.
Q.5 How does TCP ensure the reliable transfer of data ?
If data segments are not received from the source, the destination requests that the segments be resent.
If an acknowledgment of the transmitted segments is not received from the destination in a predetermined amount of the time, the source resends the data.
#TCP uses the SYN-ACK portion of the three-way handshake to ensure that all data has been received
The TCP Protocol Interpreter process verifies the transmitted data at source and destination.
Q.6 A network administrator is asked to design a system to allow simultaneous access to the Internet for 250 users. The ISP for this network can only supply five public IPs. What can be used to accomplish this task ?
routable translation
dynamic translation
static translation
#port address translation
Q.7 What is the most commonly used exterior routing protocol ?
#BGP
RIP
OSPF
EIGRP
schéma2
Q.8 Refer to the exhibit. The network administrator needs to configure the router with a name. Which command will the administrator use to configure the router name ?
Router# ip hostname Boise
Router# enable hostname Boise
Router(config-line)# name Boise
#Router(config)# hostname Boise
Router(config)# ip hostname Boise
Q.9 Why are port numbers included in the TCP header of a segment ?
to indicate the correct router interface that should be used to forward a segment
to identify which switch ports should receive or forward the segment
#to determine which Layer 3 protocol should be used to encapsulate the data
to enable a receiving host to forward the data to the appropriate application
to allow the receiving host to assemble the packet in the proper order
Q.10 What is the purpose of the routing process ?
to encapsulate data that is used to communicate across a network
#to select the paths that are used to direct traffic to destination networks
to convert a URL name into an IP address
to provide secure Internet file transfer
to forward traffic on the basis of MAC addresses
Q.11 Which two statements are true about the use of the debug ip rip command on a Cisco router? (Choose two.)
#The debug ip rip command displays RIP routing activity in real time.
The debug ip rip command can be issued at the user EXEC configuration mode.
The debug ip rip command displays a combination of the information that is displayed by the show ip route and show ip protocols commands.
Because of router processor usage, the debug ip rip command should be used only when necessary.
The debug ip rip command should be used instead of the show ip route command whenever possible.
Q.12 What minimum configurations must be set on a host to allow a request to be sent to http://www.cisco.com/? (Choose four.)
#DNS server
WINS server
#IP address
NetBIOS
#subnet mask
#default gateway
Q.13 A Catalyst 2960 switch has been taken out of storage to be used as a temporary replacement for another switch that needs to be repaired. About a minute after the switch has started, the SYST LED on the front of the switch transitions from blinking green to amber. What is the meaning of the amber SYST LED ?
The switch has no configuration file in NVRAM.
#The switch has failed POST and must be sent for service.
The switch is functioning properly.
The switch is in half-duplex mode.
schéma3
Q.14 Refer to the exhibit. Which combination of cables and symbols is correct ?
A – crossover, B – straight-through, C – straight-through
A – crossover, B – rollover, C – straight-through
#A – straight-through, B – crossover, C – straight-through
A – straight-through, B – straight-through, C – straight-through
A – straight-through, B – straight-through, C – crossover
A – rollover, B – straight-through, C – straight-through
Q.15 After an unsuccessful ping to the local router, the technician decides to investigate the router. The technician observes that the lights and fan on the router are not operational. In which layer of the OSI model is the problem most likely occurring ?
transport
network
data link
#physical
Q.16 What are three characteristics of the TCP protocol ? (Choose three.)
exchanges datagrams unreliably
is used to send IP error messages
#forces the retransmission of unacknowledged packets
#creates a virtual session between end-user applications
carries the IP address of the destination host in the TCP header
#is responsible for breaking messages into segments and reassembling them at their destination
schéma4
Q.17 Refer to the exhibit. The network shown is connected using services from the same ISP. How will the Fohi router dynamically learn routes to the 192.168.16.16/28, 192.168.16.32/28, and 192.168.16.64/28 subnetworks ?
with BGP
#with a static route
with a directly connected route
with an interior routing protocol
schéma5
Q.18 Refer to the exhibit. Which type of UTP cable should be used to connect Host A to Switch1 ?
rollover
console
crossover
#straight-through
Q.19 When customers use credit cards to make purchases at a small business, a modem is heard dialing a telephone number to transfer the transaction data to the central office. What type of WAN serial connection is in use ?
leased line
packet switched
#circuit switched
point-to-point
Q.20 A user reports being unable to access the Internet. The help desk technician employs a bottom-up approach to troubleshooting. The technician first has the user check the patch cable connection from the PC to the wall, and then has the user verify that the NIC has a green link light. What will the technician have the user do next ?
Enter an IP address into the WWW browser address bar to see if DNS is at fault.
Use traceroute to identify the device along the path to the ISP that may be at fault.
#Verify the IP address, subnet, and gateway settings using ipconfig on the PC.
Connect to the user home router to check firewall settings for blocked TCP ports.
schéma6
Q.21 A ping 192.1.1.20 command is issued on workstation A to determine if workstation B can be reached. What events will occur if this command is successful ? (Choose two.)
The router will block the ping request message.
The router will reply to the echo request with a proxy ping response.
Workstation A will send a UDP ping request message to workstation B.
Workstation B will send a UDP ping reply message to workstation A.
#Workstation A will send an ICMP echo request message to workstation B.
#Workstation B will send an ICMP echo reply message to workstation A.
Q.22 How does a router know of paths to destination networks? (Choose two.)
#inspection of the destination IP address in data packets
ARP requests from connected routers
manual configuration of routes
#updates from other routers
DHCP information broadcasts
updates from the SMTP management information base
schéma7
Q.23 Refer to the exhibit. Which two statements describe the data conversation shown ? (Choose two.)
#The data conversation was started by the HTTP application process running on the client.
The data conversation is identified by TCP port 80 on the client.
The user started the data conversation by sending an e-mail.
The IP address of the Internet server is 192.168.17.43.
#The Internet server will send data to port 8547 on the client.
Q.24 What is one purpose of the TCP three-way handshake ?
sending echo requests from the source to the destination host to establish the presence of the destination
determining the IP address of the destination host in preparation for data transfer
requesting the destination to transfer a binary file to the source
#synchronizing sequence numbers between source and destination in preparation for data transfer
Q.25 Which type of address is 192.168.17.111/28 ?
host address
network address
#broadcast address
multicast address
Q.26 A customer reports connectivity problems to an ISP technician. Upon questioning the customer, the technician discovers that all network applications are functioning except for FTP. What should the technician suspect is the problem ?
#misconfigured firewall
bad port on switch or hub
misconfigured IP addressing on the customer’s workstation
wrong DNS server configured on the customer’s workstation
wrong default gateway configured on the customer’s workstation
schéma8
Q.27 The show ip route command was executed on one of the routers shown in the graphic and the following output was displayed :
C 192.168.4.0/24 is directly connected, Serial0/0
R 192.168.5.0/24 [120/1] via 192.168.4.2, 00:00:19, Serial0/0
R 192.168.1.0/24 [120/2] via 192.168.3.1, 00:00:20, Serial0/1
R 192.168.2.0/24[120/2] via 192.168.3.1, 00:00:20, Serial0/1
C 192.168.3.0/24 is directly connected, Serial0/1
From which router was this command executed ?
A
B
#C
D
Q.28 Refer to the exhibit. Which two sets of commands are required to configure passwords for all management ports on a Catalyst 2960 switch ? (Choose two.)
ALSwitch(config)# interface vlan 1
ALSwitch(config-if)# password cisco
ALSwitch(config-if)# login
#ALSwitch(config)# line vty 0 4
ALSwitch(config-line)# password cisco
ALSwitch(config-line)# login
ALSwitch(config)# line vty 0 15
ALSwitch(config-line)# password cisco
ALSwitch(config-line)# login
ALSwitch(config)# enable secret class
ALSwitch(config)# enable password cisco
ALSwitch(config)# interface fa0/1
ALSwitch(config-if)# password cisco
ALSwitch(config-if)# no shutdown
#ALSwitch(config)# line cons 0
ALSwitch(config-line)# password cisco
ALSwitch(config-line)# login
Q.29 A user reports being able to access the Internet but not being able to download e-mail from the mail server at the ISP. What should the user check on the user workstation ?
#the POP3 and SMTP server settings in the e-mail application
the patch cable connections at the back of the workstation and at the wall plate
the DHCP settings in the operating system
the IP address, mask, and default gateway values
the NIC drivers
schéma9
Q.30 Refer to the graphic. Which command will configure a static route on Router A to direct traffic from LAN A that is destined for LAN C ?
RouterA(config)# ip route 192.168.4.0 255.255.255.0 192.168.5.2
RouterA(config)# ip route 192.168.4.0 255.255.255.0 192.168.3.2
#RouterA(config)# ip route 192.168.5.0 255.255.255.0 192.168.3.2
RouterA(config)# ip route 192.168.3.0 255.255.255.0 192.168.3.1
RouterA(config)# ip route 192.168.3.2 255.255.255.0 192.168.4.0
Q.31 Which subnet masks could be used when subnetting a Class B IP address? (Choose two.)
255.255.255.240
#255.255.192.0
#255.255.0.0
255.192.0.0
240.0.0.0
255.0.0.0
schéma10
Q.32 Refer to the exhibit. The network administrator has configured the RTA and RTB interfaces. In order to allow hosts that are attached to RTA to reach the server that is attached to RTB, a static route from RTA to the server LAN and a default route from RTB back to RTA need to be configured. Which two commands will the administrator use to accomplish these tasks on the two routers? (Choose two.)
#RTA(config)# ip route 255.255.255.252 10.16.10.6
RTA(config)# ip route 0.0.0.0 0.0.0.0 10.16.10.6
RTA(config)# ip route 10.16.10.96 255.255.255.252 10.16.10.6
RTB(config)# ip route 10.16.10.6 255.255.255.248 10.16.10.6
#RTB(config)# ip route 0.0.0.0 0.0.0.0 S0/0/1
RTB(config)# ip route 0.0.0.0 0.0.0.0 10.16.10.6
Q.33 How do port filtering and access lists help provide network security ?
#They prevent specified types of traffic from reaching specified network destinations.
They alert network administrators to various type of denial of service attacks as they occur.
They prevent viruses, worms, and Trojans from infecting host computers and servers.
They enable encryption and authentication of confidential data communications.
schéma11
Q.34 Refer to the exhibit. The network administrator of the building in the graphic needs to choose the type of cable best suited to add ServerB to the network. Which cable type is the best choice ?
STP
UTP
coaxial
#fiber optic
Q.35 What is used by a routing protocol to determine the best path to include in the routing table ?
Convergence time
Default distance
#Metric
Type of router
schéma12
Q.36 Refer to the exhibit. Which IP addresses could be assigned to the hosts in the diagram ? (Choose two.)
192.168.65.31
192.168.65.32
#192.168.65.35
#192.168.65.60
192.168.65.63
192.168.65.64
schéma13
Q.37 Given the network 192.168.25.0 shown in the graphic, which subnet mask would accommodate the number of hosts in each subnet ?
255.255.0.0
255.255.224.0
255.255.255.0
#255.255.255.224
255.255.255.240
255.255.255.248
Q.38 Which two protocols allow network devices to report their status and events to a centralized network management device ? (Choose two.)
#Syslog
Telnet
HTTP
HTTPS
#SNMP
Q.39 What is true regarding the differences between NAT and PAT ?
PAT uses the word “overload” at the end of the access-list statement to share a single registered address.
Static NAT allows an unregistered address to map to multiple registered addresses.
Dynamic NAT allows hosts to receive the same global address each time external access is required.
#PAT uses unique source port numbers to distinguish between translations.
schéma14
Q.40 Refer to the exhibit. The graphic shows the output of a command issued on router RTB. According to the output, what two statements are true of router RTB ? (Choose two.)
#The router is connected to a router named Boise.
Router RTB is connected to a Cisco 1841 router.
Router RTB is directly connected to two other routers.
#The IP address of the router interface connected to router RTB is 192.168.2.6.
The RTB router is connected to two Cisco devices by Fast Ethernet links.
schéma15
Q.41 Refer to the exhibit. The network administrator uses the command below to configure a default route to the ISP network :
RTB(config)# ip route 0.0.0.0 0.0.0.0 10.1.1.6
A ping issued from the ISP is successful to router RTB. However, ping echo request packets arrive at a host that is attached to the Fa0/0 interface of RTB, and the replies do not make it back to the ISP router. What will fix this problem ?
The ISP must be configured to forward packets from the 192.168.1.0 network.
The ip route command needs to be edited so that the next hop address is 10.1.1.5.
#The ip route command needs to be edited so that the 192.168.1.1 address is the next hop address.
The ip route command should be removed from the RTB router configuration.
Q.42 A network technician is using anetwork management station to gather data about the performance of devices and links within the ISP. Which application layer protocol makes this possible ?
#SNMP
FTP
DHCP
SMTP
Q.43 What are two purposes of DNS ? (Choose two.)
to dynamically assign IP addressing information to network hosts
to simplify the administration of host and default gateway addressing on client computers
to assign TCP port numbers to hosts as part of the data transfer process
#to resolve human-readable domain names to numeric IP addresses
#to replace the static HOSTS file with a more practical dynamic system
Q.44 A hacker attempts to reach confidential information that is stored on a server inside the corporate network. A network security solution inspects the entire packet, determines that it is a threat, and blocks the packet from entering the inside network. Which security measure protected the network ?
an IDS
#an IPS
a host-based firewall
Anti-X software
Q.45 How many host addresses may be assigned on each subnetwork when using the 130.68.0.0 network address with a subnet mask of 255.255.248.0 ?
30
256
#2046
2048
4094
4096
Q.46 In an IPv4 environment, what information is used by the router to forward data packets from one interface of a router to another ?
#destination network address
source network address
source MAC address
well known port destination address
Q.47 A small tire retailer requires a low-cost WAN connection to its headquarters in order to manage its inventory and process customer sales in real time. Which WAN connection type is best suited to its needs ?
Sonet
T3
#dialup
DSL
leased line
Q.48 The command copy tftp running-config has been entered on the router. What will this command do ?
copy the configuration in RAM to a server
#copy the configuration file from a server to RAM
copy the configuration file in NVRAM to RAM
copy the configuration file in NVRAM to a server
copy the configuration file from a server to NVRAM
schéma16
Q.49 Refer to the exhibit. The network administrator needs to configure the Fa0/0 interface of RTB so that hosts from RTA can connect to the server that is attached to RTB. Which two commands will the administrator use to accomplish this task ? (Choose two.)
RTB# ipaddress 192.168.102.98 255.255.255.248
RTB(config-if)# ip address 192.168.102.99 255.255.255.252
RTB(config)# ip address 192.168.102.97 255.255.255.252
RTB(config)# no shutdown
#RTB(config-if)# no shutdown
#RTB(config-if)# ip address 192.168.102.97 255.255.255.252
schéma17
Q.50 Refer to the exhibit. A NOC technician at an ISP enters the command shown. What are two reasons to use this command ? (Choose two.)
to map the path to 192.168.1.7
#to test reachability to 192.168.1.7
to locate connectivity problems along the route to 192.168.1.7
to identify the ISPs that interconnect the NOC with the remote host with the address 192.168.1.7
#to measure the time that packets take to reach 192.168.1.7 and return to the technician’s workstation
1 Which AAA service reduces IT operating costs by providing detailed reporting and monitoring of network user behavior, and also by keeping a record of every access connection and device configuration change across the network?
authentication
accreditation
#accounting
authorization
2 Which three items are normally included when a log message is generated by a syslog client and forwarded to a syslog server? (Choose three.)
#date and time of message
#ID of sending device
length of message
#message ID
checksum field
community ID
3 What is the advantage of using WPA to secure a wireless network?
It uses a 128-bit pre-shared hexadecimal key to prevent unauthorized wireless access.
#It uses an advanced encryption key that is never transmitted between host and access point.
It is supported on older wireless hardware, thus providing maximum compatibility with enterprise equipment.
It requires the MAC address of a network device that is requesting wireless access to be on a list of approved MAC addresses.
4 A company wants to configure a firewall to monitor all channels of communication and allow only traffic that is part of a known connection. Which firewall configuration should be deployed?
packet filtering
proxy
#stateful packet inspection
stateless packet inspection
5 A server log includes this entry: User student accessed host server ABC using Telnet yesterday for 10 minutes. What type of log entry is this?
authentication
authorization
#accounting
accessing
6 What two measures help to verify that server backups have been reliably completed? (Choose two.)
#reviewing backup logs
#performing trial backups
performing full backups only
replacing tape backup with hard disk-based backup
using an autoloader when backups require more than one tape
7 Which means of communication does an SNMP network agent use to provide a network management station with important but unsolicited information?
query
broadcast
ICMP ping
#trap
poll
8 Which three protocols are used for in-band management? (Choose three.)
FTP
#HTTP
#SNMP
#Telnet
TFTP
DHCP
9 A hacker has gained access to sensitive network files. In analyzing the attack, it is found that the hacker gained access over a wireless segment of the network. It is further discovered that the only security measure in place on the wireless network is MAC Address Filtering. How is it likely that the hacker gained access to the network?
The hacker used a software tool to crack the shared hexadecimal wireless key.
#The hacker obtained the MAC address of a permitted host, and cloned it on his wireless laptop NIC.
The attacker mounted a denial of service attack to overwhelm the firewall before penetrating the wireless LAN.
The hacker gained wireless access to the MAC address database and added his own MAC address to the list of permitted addresses.
10 A network administrator is assigning network permissions to new groups of users and employing the principle of least privilege. Which two actions should the administrator take? (Choose two.)
#Provide users with only the access to resources required to do their jobs.
#Provide the minimum level of permissions required for users to do their jobs.
Remove all permissions from the users and grant permissions as they are requested.
Allow users to decide how much permission they need to accomplish their job tasks.
Provide full access to the users and gradually remove privileges over time.
11 Which three protocols describe methods that can be used to secure user data for transmission across the internet? (Choose three.)
SMTP
#IPSEC
#SSL
#HTTPS
FTP
TFTP
12 Which benefit does SSH offer over Telnet when remotely managing a router?
#encryption
TCP usage
authorization
connection using six VTY lines
13 Which of the following does SNMP use to hold information collected about the network?
network management station
network management database
#management information base
database information agent
14 What are two potential problems with using tape media to back up server data? (Choose two.)
Tape is not a cost-effective means of backing up data.
Data tapes are difficult to store offsite.
#Data tapes are prone to failure and must be replaced often.
#Tape drives require regular cleaning to maintain reliability.
Backup logs are not available with tape backup solutions.
15 What is the term for the public network between the boundary router and the firewall?
“clean” LAN
intranet
#DMZ
extranet
16 Which two characteristics of network traffic are being monitored if a network technician configures the company firewall to operate as a packet filter? (Choose two.)
applications
physical addresses
packet size
#ports
#protocols
17 When is the use of out-of-band network management necessary?
when a server needs to be monitored across the network
#when the management interface of a device is not reachable across the network
when enhanced monitoring features are required to gain an overall view of the entire network
when it is desirable to use the information that is provided by SNMP
18 What network layer security protocol can secure any application layer protocol used for communication?
HTTPS
IMAP
FTPS
#IPSEC
TLS
19 Before a technician upgrades a server, it is necessary to back up all data. Which type of backup is necessary to ensure that all data is backed up?
daily
differential
#full
incremental
partial
20 What AAA component assigns varying levels of rights to users of network resources?
auditing
accounting
#authorization
access control
authentication
acknowledgement
Q.1 Which two statements are true about the OSI and TCP/IP models? (Choose two.)
The two bottom layers of the TCP/IP model make up the bottom layer of the OSI model.
The TCP/IP model is a theoretical model and the OSI model is based on actual protocols.
#The OSI network layer is comparable to the Internet layer of the TCP/IP model.
The TCP/IP model specifies protocols for the physical network interconnection.
#The TCP/IP model is based on four layers and the OSI model is based on seven layers.
Q.2 To meet customer expectations, an ISP must guarantee a level of service that is based on what two factors? (Choose two.)
accessibility
adaptability
#availability
#reliability
scalability
Q.3 User1 is sending an e-mail to User2@cisco.com. What are two characteristics of the process of sending this data? (Choose two.)
It utilizes TCP port 110.
A TCP connection is established directly between the User1 and User2 client computers in order to send the e-mail message.
#It utilizes a store and forward process.
The same application layer protocol is used to send the e-mail and retrieve it from the destination server.
#SMTP is used to send the e-mail message to the mail servers.
schéma1
Q.4 Refer to the exhibit. Host1 is in the process of setting up a TCP session with Host2. Host1 has sent a SYN message to begin session establishment. What happens next?
Host1 sends an ACK message to Host2.
Host1 sends a SYN message to Host2.
Host1 sends a SYN-ACK message to Host2.
Host2 sends an ACK message to Host1.
Host2 sends a SYN message to Host1.
#Host2 sends a SYN-ACK message to Host1.
Q.5 What are three characteristics of network reliability? (Choose three.)
#Redundant hardware provides enhanced reliability.
Reliability is measured as a percent.
Reliability is the responsibility of the ISP customers.
#Fault tolerance is a measure of reliability.
#The longer the MTBF, the greater the reliability.
Q.6 Which two statements describe the FTP protocol? (Choose two.)
It uses well-known port 23.
The protocol interpreter is responsible for the data transfer function.
#In passive data connections, the FTP client initiates the transfer of data.
#It requires two connections between client and server.
FTP servers open a well-known port on the client machine.
Q.7 What is the function of the TCP three-way handshake?
It enables the synchronization of port numbers between source and destination hosts.
It immediately triggers the retransmission of lost data.
#It synchronizes both ends of a connection by allowing both sides to agree upon initial sequence numbers.
It identifies the destination application on the receiving host.
Q.8 What are three characteristics of HTTPS? (Choose three.)
It uses a different client request-server response process than HTTP uses.
It specifies additional rules for passing data between the application and data link layers.
#It supports authentication.
It allows more simultaneous connections than HTTP allows.
#It encrypts packets with SSL.
#It requires additional server processing time.
Q.9 Which DNS zone resolves an IP address to a qualified domain name?
dynamic lookup
forward lookup
resolution lookup
#reverse lookup
Q.10 What type of update allows client computers to register and update their resource records with a DNS server whenever changes occur?
#dynamic
zone transfer
local recursive query
root domain query
top-level domain query
schéma2
Q.11 Refer to the exhibit. Which two statements are true about this file? (Choose two.)
If the gateway address changes, the file will be updated dynamically.
#The command ping fileserv will use IP address 172.16.5.10.
#If the ping www.cisco.com command is issued, the file will be checked for the Cisco web server IP address before DNS is queried.
The file must be created by the user if it is to be used by a workstation.
Name to IP address mappings are added to the file after they are received from DNS.
Q.12 Which two tasks are the responsibility of the local DNS server? (Choose two.)
maintaining a large number of cached DNS entries
maintaining the ISP server
#mapping name-to-IP addresses for internal hosts
#forwarding name resolution requests to a caching-only server
forwarding all name resolution requests to root servers on the Internet
Q.13 What are three unique characteristics of UDP? (Choose three.)
connection oriented
full-duplex operation
#low overhead
#no flow control
#no error-recovery function
reliable transmission
Q.14 A manufacturing company is looking into subscribing to services from a new ISP. The company requires hosted world wide web, file transfer, and e-mail services. Which three protocols represent the key application services that are required by the company? (Choose three.)
#FTP
#HTTP
ICMP
PPP
Telnet
#SMTP
Q.15 Which two options correctly match protocol and well-known port number? (Choose two.)
DNS – 25
#FTP – 110
HTTP – 80
POP3 – 25
#SMTP – 25
Q.16 Within TCP, what combination makes up a socket pair?
source port with destination port
source IP address with destination port
source IP address and destination IP address
#source IP address and port with a destination IP address and port
Q.17 Which protocol is used to send e-mail, either from a client to a server or from a server to another server?
SNMP
FTP
#SMTP
HTTPS
schéma3
Q.18 Refer to the exhibit. The PC is requesting HTTP data from the server. What is a valid representation of source and destination sockets for this request?
Source – 192.168.1.17:80 ; Destination – 192.168.2.39:80
Source – 192.168.1.17:80 ; Destination – 192.168.2.39:1045
#Source – 192.168.1.17:1045 ; Destination – 192.168.2.39:80
Source – 192.168.1.17:1045 ; Destination – 192.168.2.39:1061
Q.19 What type of DNS server is typically maintained by an ISP?
#caching-only
root
second-level
top-level
Q.20 A client is communicating with a server on a different segment of the network. How does the server determine what service is being requested by the client?
The server will apply the default service configured in directory services.
The server will use ARP to discover the appropriate service from the local router.
The server will send a request to the client asking for the appropriate service.
#The server will determine the appropriate service from the destination port field.
Q.21 When a host is communicating with multiple applications on the same server at the same time, which of the following will have the same value for each session? (Choose two.)
#IP address
#MAC address
session number
sequence number
Q.1 Which command is used to view the RIP routing protocol settings and configuration?
show version
show ip route
show interface
#show ip protocols
schéma1
Q.2 Refer to the exhibit. What is the maximum number of RIP routers that could separate HostA and HostB and still leave the hosts with connectivity to each other?
14
15
#16
17
Q.3 In which situation would a company register for its own autonomous system number (ASN)?
when the company’s ISP adds connection points to the Internet
when additional routers are added to the corporate internetwork
when more than one interior routing protocol is used
#when the company uses two or more ISPs
Q.4 Consider this routing table entry
R 172.16.1.0/24 [120/1] via 200.1.1.1 00:00:27 Serial0/1
What type of route is this?
a static route
a default route
#a RIP route
an OSPF route
an EIGRP route
a directly-connected route
Q.5 What is the difference between interior and exterior routing protocols?
Exterior routing protocols are only used by large ISPs. Interior routing protocols are used by small ISPs.
Interior routing protocols are used to route on the Internet. Exterior routing protocols are used inside organizations.
Exterior routing protocols are used to administer a single autonomous system. Interior routing protocols are used to administer several domains.
#Interior routing protocols are used to communicate within a single autonomous system. Exterior routing protocols are used to communicate between multiple autonomous systems.
Q.6 What information is included in RIPv2 routing updates that is not included in RIPv1 updates?
metric
#subnet mask
area identification
hop count
autonomous system number
Q.7 Which routing protocol is used to exchange data between two different ISPs?
#BGP
EIGRP
OSPF
RIP v2
schéma2
Q.8 Refer to the exhibit. Which configuration command or commands contributed to the output that is shown?
routerA(config-router)# no version 2
routerA(config)# interface fa0/0
routerA(config-if)# ip address 172.19.0.0 255.255.0.0
#routerA(config-router)# network 192.168.3.0
routerA(config)# no ip default-gateway
schéma3
Q.9 Refer to the exhibit. If all routers are running RIP and network 10.0.0.0 goes down, when will R3 learn that the network is no longer available?
in 30 seconds
in 60 seconds
in 90 seconds
#Immediately
Q.10 What statement is true regarding an AS number?
AS numbers are controlled and registered for Internet use.
Interior routing protocols require registered AS numbers.
ISPs require all customers to have registered AS numbers.
#All routers at an ISP must be assigned the same AS number.
Q.11 What is the purpose of the network command used when configuring RIP?
to specify whether RIPv1 or RIPv2 will be used as the routing protocol
to allow the router to monitor RIP updates that occur on other routers
#to identify which networks on the router will send and receive RIP updates
to configure the IP address on an interface that will use RIP
to identify all of the remote networks that should be reachable from the router
Q.12 Which command would a network administrator use to determine if the routers in an enterprise have learned about a newly added network?
router# show ip address
router# show ip route
#router# show ip networks
router# show ip interface brief
router# debug ip protocol
router# debug rip update
Q.13 What is the purpose of a routing protocol?
It is used to build and maintain ARP tables.
It provides a method for segmenting and reassembling data packets.
It allows an administrator to devise an addressing scheme for the network.
#It allows a router to share information about known networks with other routers.
It provides a procedure for encoding and decoding data into bits for packet forwarding.
Q.14 What device enables an ISP to connect with other ISPs to transfer data?
#border gateway router
DSLAM
web server
interior router
Q.15 Which command will display RIP routing updates as they are sent and received?
show ip route
show ip rip
debug ip rip
show ip protocols
#show ip rip database
Q.16 Which part of an IP packet does the router use to make routing decisions?
source IP address
source MAC address
#destination IP address
destination MAC address
Q.17 What two types of businesses would benefit from registering as their own autonomous systems? (Choose two.)
a home business with one ISP connection
#a global business with connections to multiple local ISPs
#a medium-sized nationwide business with Internet connectivity through different ISPs
a large enterprise with two connections to the same ISP
a small ISP with a single Internet connection through a larger ISP
Q.18 Which command will display RIP activity as it occurs on a router?
debug ip rip
show ip route
show ip interface
show ip protocols
debug ip rip config
#show ip rip database
Q.19 Why is fast convergence desirable in networks that use dynamic routing protocols?
#Routers will not allow packets to be forwarded until the network has converged.
Hosts are unable to access their gateway until the network has converged.
Routers may make incorrect forwarding decisions until the network has converged.
Routers will not allow configuration changes to be made until the network has converged.
Q.20 Which two statements describe static routes? (Choose two.)
They are created in interface configuration mode.
#They require manual reconfiguration to accommodate network changes.
They automatically become the default gateway of the router.
#They are identified in the routing table with the prefix S
They are automatically updated whenever an interface is reconfigured or shutdown.
Q.21 Which two statements or sets of statements describe differences between link-state and distance vector routing protocols? (Choose two.)
Link-state routing protocols routinely use more bandwidth for updates than do distance vector routing protocols.
Distance vector routing protocols update all routers at one time. Link-state routing protocols update one router at a time.
#Link-state routers only know about directly connected routers. Distance vector routers know about every router in the network.
#Link-state routing protocols update when a change is made. A network using distance vector routing protocols only updates at a specific interval.
Distance vector routing protocols have limited information about the entire network. Link state routing protocols know about all routers in the network.
In case of similar topologies, networks using link-state routing protocols typically converge more rapidly than do networks using distance vector routing protocols.
Q.22 Which protocol is an exterior routing protocol?
#BGP
EIGRP
OSPF
RIP
Q.23 Hosts on two separate subnets cannot communicate. The network administrator suspects a missing route in one of the routing tables. Which three commands can be used to help troubleshoot Layer 3 connectivity issues? (Choose three.)
#Ping
show arp
#Traceroute
#show ip route
show interface
show cdp neighbor detail
Q.24 What term refers to a group of networks that uses the same internal routing policies and is controlled by a single administrative authority?
Internet
intranet
virtual private network
#autonomous system
Q.1 In what two ways does SDM differ from the IOS CLI? (Choose two.)
#SDM is used for in-band management only. The IOS CLI can be used for in-band and out-of-band management.
SDM is accessed through a Telnet application. The IOS CLI is accessed through a web browser.
SDM is available for all router platforms. The IOS CLI is available for a limited number of Cisco devices.
#SDM utilizes GUI buttons and text boxes. The IOS CLI requires the use of text-based commands.
SDM is used for advanced configuration tasks. The IOS CLI is preferred for initial basic device configuration.
Q.2 Which mode will a configured router display at login?
global configuration mode
setup mode
ROM monitor mode
#user EXEC mode
schéma1
Q.3 Refer to the exhibit. Which password or passwords will be encrypted as a result of the configuration that is shown?
virtual terminal only
enable mode only
console and virtual terminal only
enable mode and virtual terminal
only the service password
#all configured passwords
schéma2
Q.4 Refer to the exhibit. Which three sets of commands are required to enable administrators to connect to the Switch1 console over Telnet for configuration and management? (Choose three.)
#Switch1(config)# interface fa0/1
Switch1(config-if)# ip address 192.168.2.64 255.255.255.192
#Switch1(config)# interface fa0/1
Switch1(config-if)# ip address 192.168.2.66 255.255.255.192
#Switch1(config)# interface vlan 1
Switch1(config-if)# ip address 192.168.2.126 255.255.255.192
Switch1(config-if)# no shutdown
Switch1(config)# line vty 0 4
Switch1(config-line)# enable password cisco
Switch1(config-line)# login
Switch1(config)# line vty 0 15
Switch1(config-line)# password cisco
Switch1(config-line)# login
Switch1(config)# ip default-gateway 192.168.2.65
Q.5 How does the SYST LED on the catalyst 2960 switch indicate a POST failure?
blinks rapidly amber
blinks rapidly green
#steady amber
steady green
schéma3
Q.6 Refer to the exhibit. A company always uses the last valid IP address in a subnetwork as the IP address of the router LAN interface. A network administrator is using a laptop to configure switch X with a default gateway. Assuming that the switch IP address is 192.168.5.147/24, what command will the administrator use to assign a default gateway to the switch?
#X(config)# ip default-gateway 192.168.5.254
X(config)# ip gateway 192.168.5.1
X(config)# ip route 0.0.0.0 0.0.0.0 192.168.5.1
X(config)# ip default-route 192.168.5.1
X(config)# ip route 192.168.5.254 255.255.255.0 fastethernet 0/0
Q.7 A technician has made changes to the configuration of a router. What command will allow the technician to view the current configuration before he saves the changes?
#router# show running-config
router# show startup-config
router# show flash
router# show version
Q.8 Passwords can be used to restrict access to all or parts of the Cisco IOS. Select the modes and interfaces that can be protected with passwords. (Choose three.)
#VTY interface
#console interface
Ethernet interface
secret EXEC mode
#privileged EXEC mode
router configuration mode
Q.9 To save time, IOS commands may be partially entered and then completed by typing which key or key combination?
#Tab
Ctrl-P
Ctrl-N
Up Arrow
Right Arrow
Down Arrow
Q.10 What is the correct command sequence to configure a router host name to ‘LAB_A’?
#Router> enable
Router# configure terminal
Router(config)# hostname LAB_A
Router> enable
Router# hostname LAB_A
Router> enable
Router# configure router
Router(config)# hostname LAB_A
Router> enable
Router(config)# host name LAB_A
schéma4
Q.11 Refer to the exhibit. From the router console, an administrator is unable to ping a Catalyst switch that is located in another building. What can the administrator do from her location to check the IP configuration of the attached switch?
Open an SDM session with the switch from her desktop.
Telnet to the switch from the router console.
#Use the show cdp neighbors detail command from the router console.
The administrator must go to the switch location and make a console connection to check these settings.
Q.12 Which two options must be selected in SDM Express to enable a router serial interface to obtain an IP address automatically? (Choose two.)
#Easy IP (IP negotiated)
IP unnumbered
No IP address
HDLC encapsulation
Frame Relay encapsulation
#PPP encapsulation
Q.13 What three settings can be made in the SDM Express basic configuration screen? (Choose three.)
#host name
DHCP options
#domain name
interface IP addresses
#enable secret password
DNS server IP addresses
Q.14 Which tasks can be accomplished by using the command history feature? (Choose two.)
View a list of commands entered in a previous session.
Recall up to 15 command lines by default.
#Set the command history buffer size.
#Recall previously entered commands.
Save command lines in a log file for future reference.
Q.15 What option within Cisco SDM Express must be configured to allow hosts that receive IP address settings from the router to resolve names on the network or Internet?
#host name
domain name
DHCP address pool
#DNS server IP address
Q.16 Which three encapsulation types can be set on a serial interface by an administrator who is using SDM Express? (Choose three.)
ATM
CHAP
#Frame Relay
#HDLC
PAP
#PPP
Q.17 Which command will display routing table information about all known networks and subnetworks?
Router# show ip interfaces
Router# show ip connections
#Router# show ip route
Router# show ip networks
Q.18 A network administrator needs to configure a router. Which of the following connection methods requires network functionality to be accessible?
console
AUX
#Telnet
modem
Q.19 Which three pieces of information about a neighbor device can be obtained by the show cdp neighbors command? (Choose three.)
#platform
routing protocol
#connected interface of neighbor device
#device ID
IP addresses of all interfaces
enable mode password
Q.20 Which function is a unique responsibility of the DCE devices shown in the exhibit?
transmission of data
reception of data
#clocking for the synchronous link
noise cancellation in transmitted data
Q.21 Which of the following are functions of NVRAM? (Choose two.)
stores the routing table
#retains contents when power is removed
#stores the startup configuration file
contains the running configuration file
stores the ARP table
schéma5
Q.22 Refer to the exhibit. Which series of commands will enable users who are attached to Router1 to access the remote server?
Router1(config)# interface S0/0/0
Router1(config-if)# ip address 64.100.0.129 255.255.255.252
Router1(config-if)# clock rate 64000
Router1(config-if)# no shutdown
Router1(config)# interface S0/0/0
Router1(config-if)# ip address 64.100.0.125 255.255.255.252
Router1(config-if)# no shutdown
Router1(config)# interface S0/0/0
Router1(config-if)# ip address 64.100.0.125 255.255.255.252
Router1(config-if)# clock rate 64000
Router1(config-if)# no shutdown
#Router1(config)# interface S0/0/0
Router1(config-if)# ip address 64.100.0.129 255.255.255.252
Router1(config-if)# no shutdown
Q.23 A network technician is attempting to add an older workstation to a Cisco switched LAN. The technician has manually configured the workstation to full-duplex mode in order to enhance the network performance of the workstation. However, when the device is attached to the network, performance degrades and excess collision are detected. What is the cause of this problem?
The host is configured in a different subnet from the subnet of the switch.
#There is a duplex mismatch between the workstation and switch port.
The switch port is running at a different speed from the speed of the workstation NIC.
The host has been configured with a default gateway that is different from that of the switch.
Q.24 Which of the following statements are true regarding the user EXEC mode? (Choose two.)
All router commands are available.
#Global configuration mode can be accessed by entering the enable command.
A password can be entered to allow access to other modes.
Interfaces and routing protocols can be configured.
#Only some aspects of the router configuration can be viewed.
Q.25 Which command turns on a router interface?
Router(config-if)# enable
Router(config-if)# no down
Router(config-if)# s0 active
Router(config-if)# interface up
#Router(config-if)# no shutdown
Q.1 In an 8 bit binary number, what is the total number of combinations of the eight bits?
128
254
255
#256
512
1024
Q.2 Convert the decimal number 231 into its binary equivalent. Select the correct answer from the list below.
11110010
11011011
11110110
#11100111
11100101
11101110
Q.3 How many usable hosts are available given a Class C IP address with the default subnet mask?
#254
255
256
510
511
512
Q.4 Which statement describes NAT overload or PAT?
Each internal address is dynamically translated to an individual external IP address.
A single internal address is always translated to the same unique external IP address.
#Many internal addresses can be translated to a single IP address using different port assignments.
Many internal addresses are statically assigned a single IP address and port to use for communications.
Q.5 Which IPv4 class of addresses provides the most networks?
Class A
Class B
#Class C
Class D
Class E
Q.6 Which statement accurately describes public IP addresses?
Public addresses cannot be used within a private network.
#Public IP addresses must be unique across the entire Internet.
Public addresses can be duplicated only within a local network.
Public IP addresses are only required to be unique within the local network.
Network administrators are free to select any public addresses to use for network devices that access the Internet.
Q.7 Which two statements describe classful IP addresses? (Choose two.)
It is possible to determine which class an address belongs to by reading the first bit.
#The number of bits used to identify the hosts is fixed by the class of the network.
Only Class A addresses can be represented by high-order bits 100.
Up to 24 bits can make up the host portion of a Class C address.
#Up to 24 bits can be used to identify unique networks.
Three of the five classes of addresses are reserved for multicasts and experimental use.
Q.8 Company XYZ uses a network address of 192.168.4.0. It uses the mask of 255.255.255.224 to create subnets. What is the maximum number of usable hosts in each subnet?
6
14
#30
62
Q.9 hat is the network broadcast address for a Class C address of 192.168.32.0 with the default subnet mask?
192.168.0.0
192.168.0.255
192.168.32.0
192.168.32.254
#192.168.32.255
schéma1
Q.10 Refer to the exhibit. Host A is connected to the LAN, but it cannot get access to any resources on the Internet. The configuration of the host is shown in the exhibit. What could be the cause of the problem?
The host subnet mask is incorrect.
The default gateway is a network address.
The default gateway is a broadcast address.
#The default gateway is on a different subnet from the host.
Q.11 IPv6 increases the IP address size from 32 bits to how many bits?
64
96
#128
192
256
512
Q.12 What is the range of the first octet in a Class B address?
127 to 191
127 to 192
#128 to 191
128 to 192
Q.13 Which IPv4 class provides the highest number of host addresses per network?
#Class A
Class B
Class C
Class D
Class E
schéma2
Q.14 refer to the exhibit. Which range of IP addresses would allow hosts that are connected to the Router1 Fa0/0 interface to access outside networks?
192.168.1.0 through 192.168.1.95
#192.168.1.66 through 192.168.1.94
192.168.1.66 through 192.168.1.96
192.168.1.0 through 192.168.1.127
192.168.1.66 through 192.168.1.128
Q.15 Which option shows the proper notation for an IPv6 address?
2001,0db8,3c55,0015,abcd,ff13
2001-0db8-3c55-0015-abcd-ff13
2001.0db8.3c55.0015.abcd.ff13
#2001:0db8:3c55:0015::abcd:ff13
Q.16 What are two reasons that NAT was developed? (Choose two.)
to preserve registered public IP addresses
to allow users on the public Internet to access local networks
#to provide a method for privately addressed LANs to participate in the Internet
to make routing protocols operate more efficiently
#to allow private addresses to be routed on the public Internet
to reduce overhead and CPU usage on gateway routers
Q.17 What must happen for a privately addressed host on an inside local network to be able to communicate with an outside destination host on the Internet?
The host IP address must be translated to an outside private address.
The host IP address must be translated to an inside local address.
The host IP address must be translated to an outside local address.
#The host IP address must be translated to an inside global address.
Q.18 Which port numbers are used by PAT to create unique global addresses?
255 and below
1024 and below
#1025 and above
64,000 and above
Q.19 Static NAT works by mapping a specific inside local IP address to what other specific address type?
#inside global
outside local
outside global
private IP address
Q.20 What are three advantages of NAT implementations? (Choose three.)
#improved security
improved router performance
decreased processor load
#improved scalability
universal application compatibility
#sharing few public IP addresses with many hosts
Q.1 Which two benefits can be gained by locating network equipment in a telecommunications closet, rather than in a user area? (Choose two.)
faster communication speeds
#improved physical security
more resistant to hacker attempts
#centralized cable management
less electrical usage
Q.2 Which three issues should be noted on the technician’s site survey report? (Choose three.)
#unlabeled cables
only two power outlets per wall in each room
#poor physical security of network devices
horizontal cabling runs under 100 meters
#lack of UPS for critical devices
two users sharing the same computer
Q.3 Which two types of cable are used for initial router configuration? (Choose two.)
serial cable
#rollover cable
straight-through cable
crossover cable
patch cable
#console cable
Q.4 In addition to the inventory sheet, what other information about the hosts and networking equipment should be documented by the on-site technician while performing the site survey?
any obsolete office equipment being stored
all product keys for site license software
#any planned growth anticipated in the near future
the memory requirements for installed application software
schéma1
Q.5 Refer to the exhibit. What type of device is used to connect two networks?
hub
#router
switch
access point
Q.6 It is said that the goal for availability of a communications system is “five-9s”. What is meant by this?
A down time of .00001% is unacceptable.
#A network needs to be available 99.999% of the time.
Five percent of all network expense covers 99% of user requirements.
The most critical time for network availability is from 9:00 to 5:00 p.m. five days a week.
The best time to do maintenance on a network is from 5:00 p.m. to 9:00 a.m. five days a week.
Q.7 What three things are included in a logical topology document? (Choose three.)
the location of cables, computers, and other peripherals
#the path that the data takes through a network
the wireless signal coverage area
the wiring closet and access point locations
#the device names and Layer 3 addressing information
#the location of routing, network address translation, and firewall filtering
Q.8. Which device has the ability to break up broadcast and collision domains?
repeater
hub
#router
switch
Q.9 Why is it important to review the results of an on-site survey report with the customer before beginning the network design?
to inform the customer of how much time the upgrade will take
to discuss the implementation schedule for the new equipment
#to verify that the report accurately describes the current network and any plans for expansion
to layout the new network design and discuss possible equipment upgrades and replacements
Q.10 A client requires a networking device that is capable of expansion to suit growing network demands. What type of device will suit this requirement?
a networking device with ports that can be activated and deactivated
#a networking device with a modular physical configuration
a networking device with the ability to be turned off remotely
a networking device with a cost per port that is as high as possible
Q.11 What does the use of redundant network components supply to a network?
scalability
manageability
compatibility
#reliability
Q.12 What is the benefit for a company to use an ISR router?
#An ISR provides the functionality of a switch, router, and firewall in one device.
ISRs use a PC operating system for routing traffic, thus simplifying configuration and management.
An ISR is immune to security attacks by hackers and so replaces all other network security measures.
ISRs make routing decisions at OSI Layer 7, thus providing more intelligence to the network than do other routers.
Q.13 Which three items are typically found in an MDF? (Choose three.)
user workstations
#switches and routers
fax machines
#network equipment racks
#the point of presence
copier
Q.14 What are two advantages of having ISP-managed services? (Choose two.)
does not require leasing costs for service
#can guarantee up to 99.999% availability
eliminates the need for data backup
#increases availability of help desk services
does not require a Service Level Agreement
Q.15 A manufacturing company is in the process of a network upgrade. Which two statements are true about the phases of the upgrade process? (Choose two.)
#Phase 1 is used to determine network requirements.
Phase 2 includes creating an analysis report.
#Phase 3 is based on an implementation schedule that allows extra time for unexpected events.
Phase 4 is where prototypes are created and tested.
Phase 5 includes identifying and addressing any weaknesses in the design.
Q.16 When designing a network upgrade, which two tasks should the onsite technician perform? (Choose two.)
configure the servers and routers prior to delivery
upgrade the network operating system and all client operating systems
#investigate and document the physical layout of the premises
document the final design for approval by the customer
#perform a site survey to document the existing network structure
Q.17 What is the term for the location at the customer premise where the customer network physically connects to the Internet through a telecommunications service provider?
backbone area
#point of presence
network distribution facility
intermediate distribution frame
schéma2
Q.18 Refer to the exhibit. Which type of twisted pair cable is used between each device?
A=console, B=straight, C=crossover, D= crossover, E=straight
A=straight, B=straight, C=straight, D=crossover, E=console
A=crossover, B=straight, C=straight, D=crossover, E=crossover
#A=console, B=straight, C=straight, D=crossover, E=crossover
A=console, B=crossover, C=crossover, D=straight, E=straight
Q.19 In what two ways will entering into a managed service agreement with an ISP for a network upgrade affect the costs that are incurred by the customer? (Choose two.)
Customer IT training costs will increase to enable operation of the new equipment.
The cost of hardware repairs and support will become the responsibility of the customer.
#Network upgrade and maintenance costs will become predictable.
Staffing costs will increase because the customer will need to hire additional IT staff to complete the upgrade.
#The company will not need to spend a large amount of money to purchase the equipment upfront.
Q.20 Which type of cable has a solid copper core with several protective layers including PVC, braided wire shielding, and a plastic covering?
STP
UTP
#coaxial
fiber optic
Q.21 What must be added when a network expands beyond the coverage area of the current telecommunications room?
MDF
POP
#IDF
IXP
Q.1 Which two functions are provided by the upper layers of the OSI model? (Choose two.)
placing electrical signals on the medium for transmission
#initiating the network communication process
#encrypting and compressing data for transmission
segmenting and identifying data for reassembly at the destination
choosing the appropriate path for the data to take through the network
Q.2 Which is a function of the transport layer of the OSI model?
routes data between networks
converts data to bits for transmission
#delivers data reliably across the network using TCP
formats and encodes data for transmission
transmits data to the next directly connected device
Q.3 Which common Layer 1 problem can cause a user to lose connectivity?
incorrect subnet mask
incorrect default gateway
#loose network cable
NIC improperly installed
Q.4 Which three command line utilities are most commonly used to troubleshoot issues at Layer 3? (Choose three.)
#ping
a packet sniffer
Telnet
#ipconfig
#Traceroute
Q.5 Which address is used by the router to direct a packet between networks?
source MAC address
destination MAC address
source IP address
#destination IP address
Q.6 What is the correct encapsulation order when data is passed from Layer 1 up to Layer 4 of the OSI model?
#bits, frames, packets, segments
frames, bits, packets, segments
packets, frames, segments, bits
segments, packets, frames, bits
Q.7 What are two goals of the ISP help desk? (Choose two.)
conserving support resources
#network optimization
competitive scalability
#customer retention
sales of network services
Q.8 In what two ways do Level 1 and Level 2 help desk technicians attempt to solve a customer’s problems? (Choose three.)
#talking to the customer on the telephone
upgrading hardware and software
#using various web tools
making an onsite visit
installing new equipment
#with remote desktop sharing applications
Q.9 A customer calls the help desk about setting up a new PC and cable modem and being unable to access the Internet. What three questions would the technician ask if the bottom-up troubleshooting approach is used? (Choose three.)
#Is the NIC link light blinking?
What is the IP address and subnet mask?
Can the default gateway be successfully pinged?
#Is the network cable properly attached to the modem?
#Is the Category 5 cable properly connected to the network slot on the PC?
Can you access your e-mail account?
Q.10 A customer calls to report a problem accessing an e-commerce web site. The help desk technician begins troubleshooting using a top-down approach. Which question would the technician ask the customer first?
#Can you access other web sites?
Is there a firewall installed on your computer?
What is your IP address?
Is the link light lit on your NIC card?
Q.11 Which statement describes the process of escalating a help desk trouble ticket?
The help desk technican resolves the customer problem over the phone and closes the trouble ticket.
Remote desktop utilities enable the help desk technician to fix a configuration error and close the trouble ticket.
#After trying unsuccessfully to fix a problem, the help desk technician sends the trouble ticket to the onsite support staff.
When the problem is solved, all information is recorded on the trouble ticket for future reference.
Q.12 What are two functions of the physical layer of the OSI model? (Choose two.)
adding the hardware address
#converting data to bits
encapsulating data into frames
#signal generation
routing packets
Q.13 A customer calls the ISP help desk after setting up a new PC with a cable modem but being unable to access the Internet. After the help desk technician has verified Layer 1 and Layer 2, what are three questions the help desk technician should ask the customer? (Choose three.)
#What is your subnet mask?
#What is your IP address?
Is the NIC link light blinking?
#Can you ping the default gateway?
Is the network cable properly attached to the cable modem?
Is the network cable correctly connected to the network port on the PC?
Q.14 Which scenario represents a problem at Layer 4 of the OSI model?
An incorrect IP address on the default gateway.
A bad subnet mask in the host IP configuration.
#A firewall filtering traffic addressed to TCP port 25 on an email server.
An incorrect DNS server address being given out by DHCP.
Q.15 What are two basic procedures of incident management? (Choose two.)
#opening a trouble ticket
using diagnostic tools to identify the problem
surveying network conditions for further analysis
configuring new equipment and software upgrades
#adhering to a problem-solving strategy
e-mailing a problem resolution to the customer
Q.16 Which level of support is supplied by an ISP when providing managed services?
Level 1
Level 2
#Level 3
Level 4
Q.17 What is the first step that is used by a help desk technician in a systematic approach to helping a customer solve a problem?
identify and prioritize alternative solutions
isolate the cause of the problem
#define the problem
select an evaluation process
Q.18 A network technician has isolated a problem at the transport layer of the OSI model. Which question would provide further information about the problem?
#Do you have a firewall that is configured on your PC?
Do you have a link light on your network card?
Is your PC configured to obtain addressing information using DHCP?
What default gateway address is configured in your TCP/IP settings?
Can you ping http://www.cisco.com?
Q.19 An ISP help desk technician receives a call from a customer who reports that no one at their business can reach any websites, or get their e-mail. After testing the communication line and finding everything fine, the technician instructs the customer to run nslookup from the command prompt. What does the technician suspect is causing the customer’s problem?
improper IP address configuration on the host
hardware failure of the ISR used to connect the customer to the ISP
bad cables or connections at the customer site
#failure of DNS to resolve names to IP addresses
Q.20 Which layers of the OSI model are commonly referred to as the upper layers?
#application, presentation, session
application, session, network
presentation, transport, network
presentation, network, data link
session, transport, network
1 Which two things can be determined by using the ping command? (Choose two.)
the number of routers between the source and destination device
the IP address of the router nearest the destination device
#the average time it takes a packet to reach the destination and for the response to return to the source
#whether or not the destination device is reachable through the network
the average time it takes each router in the path between source and destination to respond
Q.2 What are three main types of high-bandwidth connection options used by medium- to large-sized businesses? (Choose three.)
DSL
cable modem
Ethernet
#metro Ethernet
#T1
#T3
Q.3 What is the maximum T1 transmission speed?
56 kbps
128 kbps
#1.544 Mbps
2.4 Mbps
Q.4 Which of the following start the test of destination reachability?
#echo request issued by source
echo reply issued by source
echo request issued by destination
echo reply issued by destination
Q.5 Which statement describes a function of a Tier 1 ISP?
#peers with other similarly sized ISPs to form the global Internet backbone
uses the services of Tier 3 ISPs to connect to the global Internet backbone
pays Tier 2 ISPs for transit services to connect across continents
limits the offered services to small geographic areas
Q.6 At which point do individuals and small businesses connect directly to the ISP network to obtain Internet access?
#at a POP
at an IXP
at a Metro Ethernet link
on the ISP extranet
Q.7 What information is contained in the numbered RFCs maintained by the IETF?
the rules for acceptable use of websites and e-mail
the descriptions of various hardware components that connect to the Internet
#the specifications and rules for how devices communicate over an IP network
the standards for cabling and wiring for local Ethernet networks
Q.8 Which network support services team is responsible for testing a new customer connection and for monitoring the ongoing operation of the link?”
customer service
help desk
#network operations
on-site installation
Q.9 Which network support services team identifies whether the client site has existing network hardware and circuits installed?
customer service
help desk
network operations
#planning and provisioning
Q.10 Which ISP network support systems team will typically contact the customer once a new circuit is ready and guide the customer in setting up passwords and other account information?
#help desk
customer service
network operations center
on-site installation team
planning and provisioning
Q.11 What feature allows network devices to be scalable?
a fixed number of interfaces
ease of repair
#modularity
low maintenance requirements
low cost
Q.12 Which command generated this output?
1 12.0.0.2 4 msec 4 msec 4 msec
2 23.0.0.3 20 msec 16 msec 16 msec
3 34.0.0.4 16 msec 18 msec 16 msec
#Router# traceroute 34.0.0.4
Router# nslookup 34.0.0.4
Router# ping 34.0.0.4
Router# telnet 34.0.0.4
Q.13 Which network utility helps determine the location of network problems and identifies routers that packets travel across?
ping
ipconfig
#traceroute
ixp
Q.14 What interconnects the Internet backbone?
gateway routers
#IXPs
POPs
satellite dishes
Q.15 What units are used to measure Internet bandwidth?
#bits per second
bytes per second
hertz
megabytes per second
packets per second
Q.16 The IT manager of a medium-sized business wishes to house the company-owned web servers in a facility that offers round-the-clock controlled access, redundant power, and high-bandwidth Internet access. Which ISP service will fulfill this need?
web hosting
planning and provisioning
application hosting
#equipment colocation
Tier 1 ISP services
Q.17 What is the purpose of an RFC?
to provide the connection point for multiple ISPs to the Internet
#to document the development and approval of an Internet standard
to connect a business to an ISP
to provide data communication services to ISP customers
to monitor network performance and connection status of ISP clients
Q.18 When did the Internet become available for use by businesses and consumers?
1979
1984
#1991
1999
2000
Q.19 What was the original purpose of the Internet?
voice communication
marketing
#research
commerce
Q.20 What three support service teams are commonly found within an ISP? (Choose three.)
#help desk
computer support
application readiness
#network operations center
#planning and provisioning
implementation and documentation
Q.1 Which three statements are true about local and network applications? (Choose three.)
A local application is loaded in a local computer and can be accessed by a remote computer on the network.
#A network application is loaded in a local computer and accessed from a remote computer.
#A local application is loaded in a local computer and accessed only by the local computer.
A network application is loaded in a local computer and accessed only by the local computer.
An example of a local application is e-mail.
#An example of a network application is instant messaging.
Q.2 A wireless DHCP client cannot connect to the Internet through a Linksys integrated router. When you type ipconfig on the host, no IP address, subnet mask, or default gateway shows. What are two of the first things you will check? (Choose two.)
#SSID
#if the wireless client is configured for DHCP
the cable between client and integrated router
the firewall configuration on the integrated router
if the correct default gateway is configured on the client
if the correct default gateway is configured on the integrated router
schéma1
Q.3 Refer to the graphic. Assume that the command output is from a wireless DHCP client that is connected to a Linksys integrated router. What can be deduced from the output?
#The wireless connection is good.
The WEP key or SSID needs to be checked.
The DHCP configuration on the router needs to be checked.
The wireless NIC driver or the NIC itself needs to be reinstalled.
Q.4 What measurement is commonly used to describe communication speed when transferring data?
#bps
cps
Hz
MB
Q.5 What is an accurate description of network devices in the distribution layer?
They are designed to interconnect individual hosts.
They are designed to interconnect multiple companies.
#They are designed to interconnect local network segments.
They are designed to switch data packets as fast as possible.
Q.6 When acting as a DHCP server, an integrated router can provide what three types of information to a client? (Choose three.)
physical address
MAC address
#default gateway
static IP address
#dynamic IP address
#DNS server address
Q.7 Where do ISPs get the public addresses that they assign to end users?
ISPs create the addresses themselves.
ISPs are assigned addresses through the RFC.
ISPs obtain their addresses automatically.
#ISPs obtain address blocks from registry organizations.
schéma2
Q.8 Refer to the graphic. What is the effect of setting the security mode to WEP on the Linksys integrated router?
It identifies the wireless LAN.
It allows the access point to inform clients of its presence.
It translates IP addresses into easy-to-remember domain names.
#It encrypts data between the wireless client and the access point.
It ensures that only authorized users are allowed access to the WLAN.
It translates an internal address or group of addresses into an outside, public address.
Under what circumstance would it be appropriate to use private IP addresses?
for communication between two ISPs
for a network that is directly connected to the Internet
#for addresses that are used exclusively within an organization.
for a host with more than one direct connection to the Internet
Some new features are available for the OS that is currently running on a user’s PC. What method should be chosen so that the user can install these new feature sets?
clean install
multi-boot
#upgrade
virtualization
Q.9 When are leased lines typically used?
when low bandwidth is required
for home and small business connectivity
#when a dedicated digital data line is necessary
as a less expensive option to cable and DSL modem service
Which three statements describe an IP address? (Choose three.)
#An IP address is known as a logical address.
An IP address uses a 30-bit addressing scheme.
An IP address is found in the Layer 2 header during transmission.
The network portion of an IP address is burned into a network interface card.
#An IP address is unique within the same local network.
#The network portion of an IP address will be the same for all hosts that are connected to the same local network.
Q.10 Which wireless protocol is used for encryption?
EAP
Open
PSK
#WEP
Q.11 The area covered by a single AP is known as what?
ad-hoc network
#basic service set
independent basic service set
extended service set
distribution system
Q.12 Which installation option should be chosen when the current operating system is too damaged to work properly?
upgrade
multi-boot
#clean install
virtualization
Q.13 What layer is the first point of entry for a host into the network?
core layer
#access layer
network layer
distribution layer
Q.14 What two commands can be used to form a new binding if client information does not agree with the DHCP client table? (Choose two.)
#ipconfig /release
ipconfig /all
ipconfig /flushdns
#ipconfig /renew
ipconfig
15. What are two advantages of purchasing a custom-built computer? (Choose two.)
usually a lower cost
no waiting period for assembly
#user can specify higher performance components
#supports higher-end graphics and gaming applications
fewer components to replace
Q.16 What information within a data packet does a router use, by default, to make forwarding decisions?
the destination MAC address
#the destination IP address
the destination host name
the destination service requested
Q.17 What is a service pack?
an access policy
an agreement between a company and a vendor
a piece of code created to fix one specific problem
#a collection of patches and updates released by a vendor
a small piece of software designed specifically for security issues
Q.18 What is an ISP?
It is a standards body that develops cabling and wiring standards for networking.
It is a protocol that establishes how computers within a local network communicate.
#It is an organization that allows individuals and businesses to connect to the Internet.
It is a networking device that combines the functionality of several different networking devices in one.
Q.19 Which two statements correctly describe Media Access Control (MAC) addresses? (Choose two.)
#MAC addresses are used to identify a specific NIC.
#MAC addresses are physical addresses.
MAC addresses contain a network number and unique host identification.
MAC addresses are always assigned to network devices by a network administrator.
MAC addresses can be dynamically assigned.
Q.20 What is the name for the contract between a customer and an ISP that specifies requirements for uptime and service response time?
DSL
IAB
NAP
#SLA
Q.21 What are two ways that a user can interact with an operating system shell? (Choose two.)
#CLI
OS
#GUI
NIC
kernel
Q.22 Select the connection that would require a straight-through cable.
a switch to a hub
#a router to a switch
a switch to a switch
a router to a router
23. Choose the option that shows the correct sequence of steps in the encapsulation of TCP/IP data that is passed from a source to a destination host?
A. converts data to bits for transmission
B. packages the data for end to end transport
C. adds the data-link header and trailer
D. adds the network IP address to the header of the frame
A,B,C,D
A,C,D,B
#B,D,C,A
B,C,D,A
D,C,B,A
Q.24 What is specified by the network number in an IP address?
#the network to which the host belongs
the physical identity of the computer on the network
the node of the subnetwork which is being addressed
the broadcast identity of subnetwork
schéma3
Q.25 Refer to the graphic. What is the purpose of assigning a Network Name of Academy?
#It identifies the wireless LAN.
It translates IP addresses into easy-to-remember domain names.
It encrypts data between the wireless client and the access point.
It allows access to the AP configuration GUI by name rather than address.
It translates an internal address or group of addresses into an outside, public address.
Q.26 Which of the following statements best describes DNS?
DNS servers are used to map an IP address to a physical address.
#DNS servers are used to map a name to an IP address.
DNS servers are used to configure logical address information for host computers.
DNS servers are used to translate from private addresses to public addresses.
Q.27 Which of the following are the address ranges of the private IP addresses? (Choose three.)
#10.0.0.0 to 10.255.255.255
200.100.50.0 to 200.100.25.255
150.150.0.0 to 150.150.255.255
#172.16.0.0 to 172.31.255.255
#192.168.0.0 to 192.168.255.255
127.16.0.0 to 127.31.255.255
Q.28 Which protocol is used to transfer files among network devices and perform file-management functions?
DNS
#FTP
HTML
HTTP
Q.29 Select three statements that correctly describe how DHCP services may be provided. (Choose three.)
An integrated router provides IP configurations for most ISPs.
#An integrated router can act as both DHCP server and DHCP client.
A home PC using a static IP address obtained that address from a DHCP server.
#Most home network integrated routers receive an IP configuration directly from their ISP.
#A variety of devices can act as DHCP servers, as long as they run DHCP service software.
A home PC is required by standards to obtain an IP address and default gateway from a DHCP server (usually the ISP).
A company has a web server that must be accessible to both external and internal clients. Which security policy best practice should be followed to maximize security of the server?
#Place the web server in a DMZ.
Keep the web server on the external network.
Configure a firewall device to serve as the web server.
Locate the web server in the server farm of the internal network.
schéma4
Q.30 Refer to the graphic. Based on the information that is shown, what statement is true?
This configuration would be commonly found in an ad hoc wireless network.
Any wireless client that is attached to this access point would have the same IP address and SSID.
#All wireless devices that are connected to this access point must have an assigned SSID of Academy.
In addition to accepting wireless client requests, this access point must connect to the wired network.
Q.31 Identify two causes of physical layer network problems. (Choose two.)
logical addressing issues
#improperly terminated cables
#cables plugged into wrong ports
incorrect MAC address assigned
packets received out of sequence
incorrect subnet mask on an interface
Q.32 Which part of the electromagnetic spectrum is commonly used to exchange data between a PDA and a computer?
FM
radar
#infrared
ultraviolet
Q.33 Which of the following are transport layer protocols of the TCP/IP model? (Choose two.)
FTP
#UDP
SMTP
TFTP
#TCP
Q.34 For the second time in a week, workstations on a LAN are not able to log into the server. The technician fixed the problem the first time, but cannot remember the steps taken to solve it. What aspect of the troubleshooting process has the technician neglected?
identifying the problem
asking end-users questions
#documenting the troubleshooting process
using structured techniques to solve a problem
Q.35 What action will a router take when it receives a frame with a broadcast MAC address?
#It will not forward the frame to another network.
It forwards the frame back to the sending host with its IP address as a response.
It forwards the frame out of all interfaces except the interface where the frame was received.
It forwards the frame back out the receiving interface to insure all hosts on the local network receive it.
Q.36 A network host is accessing a web server. What two protocols are most likely being used as the TCP/IP model application layer protocol and the internetwork layer protocol? (Choose two.)
#IP
FTP
TCP
DHCP
#HTTP
Q.37 Which statement is true concerning stateful packet inspection?
Access is permitted based on IP addresses of the source and destination devices.
Access is permitted based on the MAC addresses of the source and destination devices.
Access is permitted only if the type of application that is attempting to reach the internal host is allowed.
#Access is permitted only if it is a legitimate response to a request from an internal host.
Q.38 What does the term “attenuation” mean in data communication?
#loss of signal strength as distance increases
time for a signal to reach its destination
leakage of signals from one cable pair to another
strengthening of a signal by a networking device
39. What is the default subnet mask for a class B address?
255.0.0.0
#255.255.0.0
255.255.255.0
255.255.255.255
schéma5
Q.40 Refer to the graphic. Based on the configuration information that is shown, which three types of 802.11 networks are allowed access to the WLAN? (Choose three.)
802.11a
#802.11b
802.11e
#802.11g
#802.11n
802.11x
Q.41 Within a local network, which two items must be unique on a computer for it to successfully connect to the network? (Choose two.)
#IP address
subnet mask
#computer name
default gateway address
operating system version
Q.42 When considering the purchase of a new operating system, what is meant by “Total Cost of Ownership?”
applications and support costs
hardware and support costs
hardware and software costs
#hardware, software, and support costs
hardware, operating system, and applications costs
Q.43 A computer joins the network and announces itself to all hosts on the LAN. What type of message does the computer send out?
#broadcast
simulcast
multicast
unicast
schéma6
Q.44 Refer to the graphic. What feature can be installed on the Linksys integrated router to convert private IP addresses to Internet-routable addresses?
authentication
DHCP
encryption
firewall
#NAT
WEP
Q.45 When terminating UTP cabling, why is it important to untwist only a small amount of each wire pair?
#minimizes crosstalk
makes installation faster
ensures wires are in correct order
makes it easier to fit wires into connector
Q.46 A host sent a message that all other hosts on the local network received and processed. What type of domain are all these hosts a part of?
local domain
multicast domain
collision domain
#broadcast domain
Q.47 Your school network blocks all websites related to online gaming. What type of security policy is being applied?
identification and authentication
remote access
#acceptable use
incident handling
schéma7
Q.48 Refer to the graphic. Assume that the exhibited output is from a host that is connected to a Linksys integrated router. What is one of the first things you should check?
IP address on the host
IP address on the router
subnet mask on the host
default gateway on the host
#link status LED on the front of the router
Q.49 The transmit pins are disconnected and only the receive pins are used.
The transmit pins are disconnected and only the receive pins are used.
The transmit pins on one device are connected to the transmit pins on the other device.
The receive pins on one device are connected to the receive pins on the other device.
#The transmit pins on one device are connected to the receive pins on the other device.
50. What are two examples of storage peripheral devices? (Choose two.)
printer
#flash drive
headphones
#external DVD
barcode reader
Q.51 What are the two possible values for a digital bit? (Choose two.)
#0
#1
A
F
#
9
Q.52 What type of computer would most likely use a docking station?
#laptop
server
desktop
mainframe
workstation
Which two causes of networking problems are related to the physical layer? (Choose two.)
#damaged cables and connectors
incorrect addressing
incorrect subnet mask
#overheated components
incorrect default gateway
What is the purpose of creating a DMZ during network firewall implementation?
to create a server security zone accessible only to internal clients
to create a dirty zone that allows all inbound and outbound traffic
#to allow for a publicly accessible zone without compromising the internal network
to specify a higher security level than normally required for the internal production network
A local PC has the correct configuration that is required to access the network. A ping command that is sourced at the PC does not receive a response from a remote device. Which operating system command might be used to determine where the connection failed?
netstat
tracert
ipconfig
#nslookup