Translate This Blog - Raymond

Tuesday, February 2, 2010

FINALEXAMCCNA

Which network design layer provides a connection point for end user devices to the network?
access
core
distribution
#network
What type of cable would be required to connect a Linksys router to a wired PC?
#crossover cable
rollover cable
serial cable
straight-through cable
What is a function of the distribution layer in the hierarchical design model?
to provide latency free switching
to organize end devices in small manageable groups
to provide connectivity using the high-speed backbone
#to provide connectivity between smaller local networks
1. Which protocol is used by a client to browse the web server?
FTP
*HTTP
POP
SMTP
2. As an assignment, a computer science student needs to present data in binary format. What are the two possible values that the student can use? (Choose two.)
*0
*1
2
A
F
3. Refer to the exhibit. Host A sends a message to a group of four computers out of the ten computers on this network. Which type of message does host A send?
broadcast
*multicast
simulcast
unicast
4. What is the function of the DNS server?
It maps the IP address to the MAC address.
*It translates a computer or domain name to the associated IP address.
It manages the domain that clients are assigned to.
It accepts HTTP requests from clients.
5. TCP/IP data transmission between the source and destination host is de-encapsulated in four steps:
A. The TCP header is removed.
B. Bits are decoded and the destination MAC address is recognized.
C. The IP header is removed and the contents are passed to the next layer.
D. The Ethernet header and trailer are removed.
What is the correct sequence of these steps?
A, B, C, D
A, C, B, D
B, C, D, A
*B, D, C, A
C, A, B, D
6. All hosts within a domain receive the same frame that originates from one of the devices. The domain is also bounded by routers. What type of domain is this?
*broadcast
collision
local
multicast
7. Which protocol is used by a client to retrieve an e-mail from a remote server using a TCP/IP connection?
DNS
FTP
*POP
HTTP
8. Which two statements correctly describe MAC addresses? (Choose two.)
*MAC addresses are used to identify a specific NIC.
MAC addresses contain a network number and unique host identification.
*MAC addresses are physical addresses.
MAC addresses are always assigned to network devices by a network administrator.
MAC addresses are Layer 3 addresses.
9. Which of the following are transport layer protocols of the TCP/IP model? (Choose two.)
FTP
*UDP
SMTP
TFTP
*TCP
10. Which two statements are characteristics of DHCP services? (Choose two.)
A DHCP client determines the lease time for using the IP address that is supplied by the DHCP server.
An integrated router acts as the DHCP server to provide the IP address to the ISP.
*DHCP clients send a DHCP Discover message to the destination IP address of 255.255.255.255.
The DHCP server maps the IP addresses to host names.
*The integrated router acts as a DHCP server for internal hosts on local networks.
11. A small company owns one older AP that provides a maximum data rate of 11 Mb/s. The company wants to add a newer AP that will provide a faster data rate but be compatible with the existing AP. What two wireless standards are referenced in this scenario? (Choose two.)
802.11
802.11a
*802.11b
802.11d
*802.11g
12. What layer is the first point of entry for a host into the network?
core layer
access layer
network layer
distribution layer
13. When is the use of a DSL modem necessary?
when a cellular telephone provides the service
when a high-speed connection is provided over a cable TV network
*when a high-speed digital connection is required over the regular telephone line
when a satellite dish is used
14. A network technician is required to provide access to the Internet for a large company. What is needed to accomplish this task?
*ISP
private IP addresses for each host
static IP addresses for each host
DHCP server
15. Which two statements are true about network applications? (Choose two.)
Microsoft Word is an example of a network application.
*Network applications are accessible from a remote computer.
Network applications are installed on a special type of computer that supports only network applications.
*Network applications are installed on a network server.
Network applications are accessible by one computer at a time.
16. Refer to the exhibit. Which statement is true based on the information that is shown in the exhibit?
*All wireless devices that are connected to this AP must have an assigned SSID of University.
Any wireless client that is attached to this AP must have the same IP address and SSID.
The AP is not physically wired to the local LAN.
This configuration is found only in an ad hoc wireless network.
17. Which statement accurately describes what network devices do in the distribution layer of the three layer design model?
They interconnect individual hosts.
They interconnect multiple companies.
*They interconnect local network segments.
They interconnect the company network to the ISP.
18. What are two advantages of purchasing a preassembled computer? (Choose two.)
*The cost is comparatively lower.
High-performance graphics and gaming applications are supported.
*There is a negligible waiting period for assembly.
This type of computer is useful for knowledgeable consumers with special needs.
The user can specify high-performance components.
19. What is the most common reason that ISPs provide symmetrical transfer services?
to address data transfer needs of home users
to download significantly more than upload
*to host servers on the Internet
to work with applications that require less bandwidth
20. What are two examples of peripheral input devices? (Choose two.)
external modem
*barcode reader
*digital camera
plotter
printer
21. What is an advantage of purchasing a custom-built computer?
It is beneficial for less knowledgeable consumers.
The waiting period for assembly is negligible.
The cost is lower compared to a computer that has been preassembled.
*The user can specify high-performance components to meet specific needs.
22. Which three address ranges can be used to depict private IP addresses? (Choose three.)
*10.0.0.0 to 10.0.0.255
127.16.0.0 to 127.16.255.255
150.150.0.0 to 150.150.255.255
*172.16.1.0 to 172.16.1.255
*192.168.22.0 to 192.168.22.255
200.100.50.0 to 200.100.50.255
23. Where do ISPs get the public addresses that they assign to end users?
ISPs create the addresses themselves.
ISPs are assigned addresses through the RFC.
ISPs obtain their addresses automatically.
*ISPs obtain address blocks from registry organizations.
24. For an IP address, what component decides the number of bits that is used to represent the host ID?
default-gateway
host number
network number
*subnet mask
25. What is the default subnet mask for the IP address 128.107.23.10?
255.0.0.0
255.255.0.0
255.255.255.0
255.255.255.255
26. What is the purpose of pop-up blocker software?
It detects and removes spyware.
It detects and removes viruses.
*It prevents the display of advertisement windows.
It removes unwanted e-mail.
27. What is the purpose of spam filter software?
It detects and removes spyware.
It detects and removes viruses.
It prevents the display of advertisement windows.
*It examines incoming e-mail messages to identify the unsolicited ones.
28. Which part of the electromagnetic spectrum is commonly used by wireless LANs?
Bluetooth
infrared
Industrial Scientific and Medical (ISM)
*radio frequency (RF)
29. Your school network blocks all websites related to online gaming. What type of security policy is being applied?
identification and authentication
remote access
*acceptable use
incident handling
30. Refer to the graphic. What feature can be installed on the Linksys integrated router to convert private IP addresses to Internet-routable addresses?
authentication
DHCP
encryption
firewall
*NAT
WEP
31. Which statement is true about packet filtering?
It recognizes and filters specific types of attacks.
*It permits access based on IP address.
It is performed from a host network device.
It translates an internal address or group of addresses into a public address that is sent across the network.
32. Which type of computer uses an integrated monitor and keyboard?
pocket PC
*laptop
mainframe
server
workstation
33. How does a crossover cable connect two routers?
It connects the pins that are used for receiving on one router to the pins that are used for receiving on the other router.
*It connects the pins that are used for transmitting on one router to the pins that are used for receiving on the other router.
It disconnects the transmit pins and uses only the receive pins.
It uses the same pins for transmitting and receiving.
34.Select the connection that would require a straight-through cable.
a switch to a hub
*a router to a switch
a switch to a switch
a router to a router
35. What information within a data packet does a router use, by default, to make forwarding decisions?
the destination MAC address
*the destination IP address
the destination host name
the destination service requested
36. Refer to the exhibit. What is the effect of setting the security mode to WEP on the Linksys integrated router?
The WEP security mode enables the AP to inform clients of its presence.
*The WEP security mode encrypts network traffic during transmission between the AP and the wireless client.
The WEP security mode generates a dynamic key each time a client establishes a connection with the AP.
The WEP security mode identifies the WLAN.
37. What data communication technology uses low-power radio waves to transmit data?
copper cable
fiber optic cable
*wireless
radio
38. What is an advantage of selecting an operating system that has a commercial license over one with a GPL license?
The commercial license-based operating system ensures full access to the source code for everyone.
The commercial license-based operating system ensures that everyone can participate in the enhancement of the product.
*The commercial license-based operating system provides structured support.
The commercial license-based operating system is released free of charge.
39. A learner wants to interact with the operating system of a computer. Which two methods can be used for this? (Choose two.)
*CLI
*GUI
kernel
third party software
shell
40. Within a local network, which two items must be unique on a computer for it to successfully connect to the network? (Choose two.)
*IP address
subnet mask
*computer name
default gateway address
operating system version
41. Refer to the exhibit. Assume that the exhibited output is from a host that is connected to a Linksys integrated router. What is the first thing that should be checked while using a bottom-up troubleshooting approach?
the default gateway on the host
the IP address on the host
the IP address on the router
*the link status LED on the front of the router
the subnet mask on the host
42. The area covered by a single AP is known as what?
ad-hoc network
*basic service set
independent basic service set
extended service set
distribution system
43. What is the purpose of the ipconfig /release command?
*It forces a client to give up its current IP address.
It forces a client to give up its current MAC address.
It forces the client to clear all the MAC address to IP address associations it has learned.
It shows the current IP configuration on the client.
44. Which statement is true about UTP cable termination?
Cables with RJ-45 connectors are always preterminated.
An RJ-45 connector is used on only one end of the UTP cable.
Up to 2 to 3 inches of cable may be untwisted at each end of the cable to allow for easier installation of the RJ-45 connector.
*The RJ-45 connector should be pushed over the wire jacket for a smooth connection.
45. Which installation option should be chosen when the current operating system is too damaged to work properly?
upgrade
multi-boot
*clean install
virtualization
46. What is the meaning of the term crosstalk?
*interference of signals between wire pairs
loss of signal strength as distance increases
damage of the signal when two bare wires touch
strengthening of a signal by a networking device
47. Which two causes of networking problems are related to the physical layer? (Choose two.)
*disconnected cables
*improper operation of cooling fans
incorrect MAC address
incorrect default gateway
incorrect subnet mask
48. Refer to the exhibit. What cabling fault does the exhibit represent?
open
reversed pair
short
*split pair
49. A user is unable to send e-mail. To begin troubleshooting this problem, the network technician uses the browser on the PC and tries to access some popular Internet websites. Which troubleshooting approach is being followed?
bottom-up
divide-and-conquer
*top-down
trial and error
50. Refer to the exhibit. A wireless DHCP client is unable to access the web server. Given the output that is shown in the exhibit, what two things should the network technician verify first to troubleshoot this problem? (Choose two.)
*the wireless client configuration for DHCP
the default gateway
the firewall configuration
*the SSID
the physical connectivity between the server and the client
1. What is specified by the host bits in an IP address?
broadcast identity of the network
*identity of the computer on the network
network that is being addressed
network to which the host belongs
2. What measurement is commonly used to describe communication speed when transferring data?
*bps
cps
Hz
MB
3. What is the function of the DNS server?
It maps the IP address to the MAC address.
*It translates a computer or domain name to the associated IP address.
It manages the domain that clients are assigned to.
It accepts HTTP requests from clients.
4. Refer to the exhibit. A user on host A sends an e-mail to the user on host B. Which type of message does host A send?
broadcast
multicast
simulcast
*unicast
5. All hosts within a domain receive the same frame that originates from one of the devices. The domain is also bounded by routers. What type of domain is this?
*broadcast
collision
local
multicast
6. A network engineer wants to represent confidential data in binary format. What are the two possible values that the engineer can use? (Choose two.)
*0
*1
2
A
F
7. Which two transport layer protocols are used to transfer messages between hosts? (Choose two.)
DHCP
FTP
SMTP
*TCP
*UDP
8. Refer to the exhibit. After connectivity has been established, an Internet user needs to upload a text file. Using the TCP/IP model, one protocol will be required at the application layer and another at the internetwork layer. Which two protocols will be used at those two layers for the upload? (Choose two.)
DHCP
*FTP
*IP
TCP
UDP
9.What is the correct sequence of steps in the encapsulation of TCP/IP data as it passes from a source to a destination host?
A. converts data to bits for transmission
B. packages the data for end to end transport
C. adds the data-link header and trailer
D. adds the network IP address to the header of the packet
A,B,C,D
A,C,D,B
*B,D,C,A
B,C,D,A
D,C,B,A
10. Which three types of information are provided to a DHCP client from a DHCP server? (Choose three.)
host ID
MAC address
*default gateway
*IP addresses of DNS servers
physical address
*subnet mask
11. Refer to the exhibit. Assume that the command output is from a wireless DHCP client that is connected to a Linksys integrated router. What can be deduced from the output?
The DHCP configuration on the router needs to be verified.
The WEP key or SSID needs to be verified.
*The wireless connection is operational.
The wireless NIC driver or the NIC itself needs to be reinstalled.
12. When is a dial-up connection used to connect to an ISP?
when a cellular telephone provides the service
when a high-speed connection is provided over a cable TV network
when a satellite dish is used
*when a regular telephone line is used
13. What are two examples of peripheral output devices? (Choose two.)
barcode reader
digital camera
external DVD
*headphones
*printer
A home user was successfully browsing the Internet earlier in the day but is now unable to connect. A ping command from a wireless laptop to a wired PC in the LAN is successful, but the nslookup command fails to resolve a website address. The user decides to analyze the LEDs on the Linksys router to verify connectivity. Which LED should be of main concern in this situation?
WLAN LED
power LED
Internet LED
#1-4 Ethernet LEDs
14. A network technician is required to provide access to the Internet for a large company. What is needed to accomplish this task?
ISP
private IP addresses for each host
static IP addresses for each host
DHCP server
A college network administrator is planning a wireless LAN to provide service in the student lounge and outdoor patio. The requirements include a range of at least 80 meters and a speed of 30 Mb/s. Which wireless LAN standard meets these requirements?
802.11
#802.11a
802.11b
802.11g
Because of an increasing number of users, bandwidth per user on a WLAN has decreased to a point where users are complaining about poor performance. What can be done to improve the user experience?
Increase the AP radio signal strength.
Place the AP in a more central location.
Deploy an external omni-directional antenna.
#Reduce the number of devices using each channel.
Which adapter card would be required for a PC to exchange information with other PCs on a LAN?
#NIC
video card
sound card
internal modem
In IP telephony, what is the purpose of a gateway to the PSTN?
to connect IP voice clients to Internet phone service
to create a peer-to-peer connection between two IP voice clients
to map unique names of IP voice endpoints to a client list on a voice server
#to allow IP voice clients to communicate with regular analog telephones.
All hosts within a domain receive the same frame that originates from one of the devices. The domain is also bounded by routers. What type of domain is this?
#broadcast
collision
local
multicast
Which protocol is used to transfer files among network devices and perform file-management functions?
DNS
#FTP
HTML
HTTP
A network administrator has been notified that users have experienced problems gaining access to network resources. What utility could be used to directly query a name server for information on a destination domain?
ping
tracert
netstat
ipconfig
#nslookup
Which two components are configured via software in order for a PC to participate in a network environment? (Choose two.)
#MAC address
#IP address
kernel
shell
subnet mask
What is true about a wireless access point that is equipped with an omnidirectional antenna?
concentrates signal in one direction
typically used in bridging applications
radiates the signal equally in all directions
#provides the greatest transmission distance of all antenna types that are used by APs
Which device is often configured to act as both a DHCP client and a DHCP server?
home PC
ISP modem
#wireless-enabled laptop
integrated services router
A home user is looking for an ISP connection that provides high speed digital transmission over regular phone lines. What ISP connection type should be used?
DSL
#dial-up
satellite
cell modem
cable modem
What data communication technology uses low-power radio waves to transmit data?
copper cable
fiber optic cable
#wireless
radio
15. What statement describes the filtering of traffic via the use of Stateful Packet Inspection?
It recognizes and filters predefined URLs
It permits access that is based on the application.
It permits access based on IP or MAC addresses.
*It permits incoming packets that are legitimate responses to requests from internal hosts.
It translates an internal address or group of addresses into a public address that is sent across the network.
16. Which statement accurately describes what network devices do in the distribution layer of the three layer design model?
They interconnect individual hosts.
They interconnect multiple companies.
*They interconnect local network segments.
They interconnect the company network to the ISP.
17. Which two statements are true about local applications? (Choose two.)
They run on the network.
An example of a local application is e-mail.
They are accessed from a remote computer.
*They are stored on the local hard disk.
*They run on the computer where they are installed.
18. Which network design layer provides a connection point for end user devices to the network?
access
core
distribution
network
19. What are two advantages of purchasing a custom-built computer? (Choose two.)
usually a lower cost
no waiting period for assembly
*user can specify higher performance components
*supports higher-end graphics and gaming applications
fewer components to replace
20. Which portion of the packet does a router use to forward the packet to the destination?
source IP address
user data
*destination IP address
control information
destination MAC address
21. What is the purpose of a router?
to forward broadcasts to all interfaces so that all hosts receive them
to maintain a table of individual host addresses
*to select the best path to reach remote networks
to physically connect multiple hosts that belong to the same network
22. How do ISPs obtain public IP addresses?
They create the addresses themselves.
They obtain the addresses from the home PCs.
*They obtain the addresses from the Internet registry.
They obtain the addresses from the RFC.
23. What is the default subnet mask for an IP address of 198.133.219.4?
255.0.0.0
255.255.0.0
*255.255.255.0
255.255.255.255
24. For an IP address, what component decides the number of bits that is used to represent the host ID?
default-gateway
host number
network number
*subnet mask
25. Which three addresses belong to the category of private IP addresses? (Choose three.)
*10.0.0.1
128.0.0.1
150.0.0.1
*172.16.0.1
*192.168.31.19
172.168.31.1
26. Which part of the electromagnetic spectrum is commonly used to exchange data between a PDA and a computer?
FM
radar
*infrared
ultraviolet
TCP/IP data transmission between the source and destination host is encapsulated in four steps:
A. adds the data-link header and trailer;
B. converts data to bits for transmission;
C. adds the network IP address to the header of the packet;
D. segments the data for end-to-end transport.
A, B, C, D
A, D, B, C
B, D, A, C
#D, C, A, B
D, C, B, A
Refer to the exhibit. H1 can ping H2, H3, and the Fa0/0 interface of router R1. H2 and H3 but not H1 can ping H4 and H5. What is a possible cause for the H1 failure?
Router R1 has no route to the destination network.
Switch S1 does not have an IP address configured.
#The link between router R1 and switch S2 has failed.
Host H1 does not have a default gateway configured.
What is the correct sequence of these steps?
For the TCP/IP model for internetwork communication, which statement describes the process for the transition of data from the internet layer to the network access layer?
An IP packet is encapsulated in a frame.
#A TCP segment is placed in an IP packet.
HTML data is encapsulated in a TCP segment.
A frame is placed on the network media as encoded bits.
A network technician suspects that malware on a user PC is opening multiple TCP connections to a specific foreign host address. Which Windows command line utility can be used to confirm the multiple TCP connections?
#ping
netstat
tracert
ipconfig
nslookup
After attaching four PCs to the switch ports, configuring the SSID and setting authentication properties for a small office network, a technician successfully tests the connectivity of all PCs that are connected to the switch and WLAN. A firewall is then configured on the device prior to connecting it to the Internet. What type of network device includes all of the described features?
switch
#ISR router
firewall appliance
standalone wireless access point
After issuing the ipconfig/all command on a host that has DHCP enabled, a network administrator notes that the output contains faulty IP configuration information. What is the first step the administrator should take to resolve this issue?
Replace the NIC in the host.
Change the IP address of the DHCP server.
Use static addressing to assign the correct IP address.
#Use the release and renew options supported by the ipconfig command.
A network engineer wants to represent confidential data in binary format. What are the two possible values that the engineer can use? (Choose two.)
#0
#1
2
A
F
27. What is a service pack?
an access policy
an agreement between a company and a vendor
a piece of code created to fix one specific problem
*a collection of patches and updates released by a vendor
a small piece of software designed specifically for security issues
28. Refer to the exhibit. The security policy of an organization requires users to change their password every week. Which type of security policy is this?
acceptable use
network maintenance
*password
remote access
29. Refer to the exhibit. An educational institution needs to connect PC systems that use private IP addressing to the Internet. They have multiple systems that need to access the Internet, but were only able to purchase one public IP address. What should be activated on the Linksys integrated router to achieve this goal?
authentication
DHCP
encryption
firewall
*NAT
WEP
30. Which wireless authentication method allows the use of a backend authentication server?
*EAP
Open
PSK
WEP
31. What wireless technology has the ability to communicate with many devices at the same time, makes use of the 2.4 GHz band, and is limited to low-speed, short-range communications?
RF
ISM
infrared
*Bluetooth
32. What is the purpose of the ipconfig command?
to force a client to give up its current IP address
to force the client to clear all IP-to-domain-name associations that is has learned
to force the client to clear all the MAC-address-to-IP-address associations that it has learned
*to show the current IP configuration on the client
33. What type of computer would most likely use a docking station?
*laptop
server
desktop
mainframe
workstation
34. A new student wants to interact with the operating system of a computer. Which two methods can be used for this? (Choose two.)
*CLI
*GUI
kernel
third party software
shell
35. How does a crossover cable connect two routers?
It connects the pins that are used for receiving on one router to the pins that are used for receiving on the other router.
*It connects the pins that are used for transmitting on one router to the pins that are used for receiving on the other router.
It disconnects the transmit pins and uses only the receive pins.
It uses the same pins for transmitting and receiving.
36. Refer to the exhibit. Assume that the exhibited output is from a host that is connected to a Linksys integrated router. What is the first thing that should be checked if using a bottom-up troubleshooting approach?
the default gateway on the host
the IP address on the host
the IP address on the router
*the link status LED on the front of the router
the subnet mask on the host
37. Refer to the exhibit. What is the effect of setting the security mode to WEP on the Linksys integrated router?
The WEP security mode enables the AP to inform clients of its presence.
*The WEP security mode encrypts network traffic during transmission between the AP and the wireless client.
The WEP security mode generates a dynamic key each time a client establishes a connection with the AP.
The WEP security mode identifies the WLAN.
38. For devices that do not autosense, which connection requires a crossover cable?
hub port to router port
PC to hub port
PC to switch port
*PC port to PC port
39. When terminating a UTP cable, why is it important to push the wires all the way into the end of the connector?
to allow the cable to endure more stretching or twisting
*to ensure good electrical contact
to ensure that the wires are in correct order
to minimize crosstalk
40. What is an advantage of selecting an operating system that has a commercial license over one with a GPL license?
The commercial license-based operating system ensures full access to the source code for everyone.
The commercial license-based operating system ensures that everyone can participate in the enhancement of the product.
*The commercial license-based operating system provides structured support.
The commercial license-based operating system is released free of charge.
41. What is the name for the contract between a customer and an ISP that specifies requirements for uptime and service response time?
DSL
IAB
NAP
*SLA
42. Refer to the exhibit. What is the purpose of assigning a network name of University?
It enables access to the AP configuration GUI by name rather than by address.
It encrypts data between the wireless client and the AP.
*It identifies the wireless LAN.
It translates an internal address or group of addresses to a public address.
It translates IP addresses into easy-to-remember domain names.
43. Which two IP configuration components does the computer use to identify its subnetwork? (Choose two.)
default gateway
*IP address
MAC address
DNS server address
*subnet mask
44. What is the name given to the area covered by an ad hoc network in a WLAN?
Basic Service Set (BSS)
Distribution System (DS)
Extended Service Set (ESS)
*Independent Basic Service Set (IBSS)
45. Which installation option should be chosen when the current operating system is too damaged to work properly?
upgrade
multi-boot
*clean install
virtualization
46. Identify two causes of physical layer network problems. (Choose two.)
logical addressing issues
*improperly terminated cables
*cables plugged into wrong ports
incorrect MAC address assigned
packets received out of sequence
incorrect subnet mask on an interface
47. What is the meaning of the term crosstalk?
*interference of signals between wire pairs
loss of signal strength as distance increases
damage of the signal when two bare wires touch
strengthening of a signal by a networking device
48. A user is unable to send e-mail. While troubleshooting this problem, the network technician first verifies the physical connectivity of cables. Which troubleshooting approach is being followed?
*bottom-up
divide-and-conquer
top-down
trial and error
49. Refer to the exhibit. What cabling fault does the exhibit represent?
open
reversed pair
short
*split pair
50. A wireless DHCP client cannot connect to the Internet through a Linksys integrated router. When you type ipconfig on the host, no IP address, subnet mask, or default gateway shows. What are two of the first things you will check? (Choose two.)
*SSID
*if the wireless client is configured for DHCP
the cable between client and integrated router
the firewall configuration on the integrated router
if the correct default gateway is configured on the client
if the correct default gateway is configured on the integrated router
1. What are the two possible values for a digital bit? (Choose two.)
*0
*1
A
F
#
9
2. Which protocol is used to transfer files among network devices and perform file-management functions?
DNS
*FTP
HTML
HTTP
3. What are two ways that a user can interact with an operating system shell? (Choose two.)
*CLI
OS
*GUI
NIC
kernel
4. What is the function of the DNS server?
It maps the IP address to the MAC address.
*It translates a computer or domain name to the associated IP address.
It manages the domain that clients are assigned to.
It accepts HTTP requests from clients.
5. Refer to the exhibit. A user on host A sends an e-mail to the user on host B. Which type of message does host A send?
broadcast
multicast
simulcast
*unicast
6. Which statement accurately describes what network devices do in the distribution layer of the three layer design model?
They interconnect individual hosts.
They interconnect multiple companies.
*They interconnect local network segments.
They interconnect the company network to the ISP.
7. All hosts within a domain receive the same frame that originates from one of the devices. The domain is also bounded by routers. What type of domain is this?
broadcast
collision
local
multicast
8. What does the term “attenuation” mean in data communication?
*loss of signal strength as distance increases
time for a signal to reach its destination
leakage of signals from one cable pair to another
strengthening of a signal by a networking device
9. Which two transport layer protocols enable hosts to communicate and transfer data? (Choose two.)
DHCP
ICMP
IP
*TCP
*UDP
10. Select three statements that correctly describe how DHCP services may be provided. (Choose three.)
An integrated router provides IP configurations for most ISPs.
*An integrated router can act as both DHCP server and DHCP client.
A home PC using a static IP address obtained that address from a DHCP server.
*Most home network integrated routers receive an IP configuration directly from their ISP.
*A variety of devices can act as DHCP servers, as long as they run DHCP service software.
A home PC that is unable to find a DHCP server defaults to the static IP address of 192.168.1.1.
11. What are two characteristics of a MAC address? (Choose two.)
It indicates the physical location of the host within the network.
It is dynamically assigned by a DHCP server.
*It is displayed in HEX characters.
*It is a physical address.
It is cable-based.
12.What is an ISP?
It is a standards body that develops cabling and wiring standards for networking.
It is a protocol that establishes how computers within a local network communicate.
*It is an organization that enables individuals and businesses to connect to the Internet.
It is a networking device that combines the functionality of several different networking devices in one.
13. What layer is the first point of entry for a host into the network?
core layer
*access layer
network layer
distribution layer
14. Which part of a data packet is used by a router to determine the destination network?
source IP address
user data
*destination IP address
control information
destination MAC address
15. When is a dial-up connection used to connect to an ISP?
when a cellular telephone provides the service
when a high-speed connection is provided over a cable TV network
when a satellite dish is used
*when a regular telephone line is used
16. Refer to the exhibit. Assume that the command output is from a wireless DHCP client that is connected to a Linksys integrated router. What can be deduced from the output?
The DHCP configuration on the router needs to be verified.
The WEP key or SSID needs to be verified.
*The wireless connection is operational.
The wireless NIC driver or the NIC itself needs to be reinstalled.
17. What is the most common reason that ISPs provide asymmetrical transfer services?
to carry a large amount of data in both directions at equal rates
to host servers on the Internet
*to work with applications that require significant bandwidth
to work with large business applications
18. What is a service pack?
an access policy
an agreement between a company and a vendor
a piece of code created to fix one specific problem
*a collection of patches and updates released by a vendor
a small piece of software designed specifically for security issues
19. What action will a router take when it receives a frame with a broadcast MAC address?
*It will not forward the frame to another network.
It forwards the frame back to the sending host with its IP address as a response.
It forwards the frame out of all interfaces except the interface where the frame was received.
It forwards the frame back out the receiving interface to insure all hosts on the local network receive it.
20. For the second time in a week, workstations on a LAN are not able to log into the server. The technician fixed the problem the first time, but cannot remember the steps taken to solve it. What aspect of the troubleshooting process has the technician neglected?
identifying the problem
asking end-users questions
*documenting the troubleshooting process
using structured techniques to solve a problem
21. Which two statements are true about network applications? (Choose two.)
Microsoft Word is an example of a network application.
*Network applications are accessible from a remote computer.
Network applications are installed on a special type of computer that supports only network applications.
*Network applications are installed on a network server.
Network applications are accessible by one computer at a time.
22. What is the default subnet mask for an IP address of 64.100.19.14?
*255.0.0.0
255.255.0.0
255.255.255.0
255.255.255.255
23. How do ISPs obtain public IP addresses?
They create the addresses themselves.
They obtain the addresses from the home PCs.
*They obtain the addresses from the Internet registry.
They obtain the addresses from the RFC.
24. For an IP address, what component decides the number of bits that is used to represent the host ID?
default-gateway
host number
network number
*subnet mask
25. Which of the following are the address ranges of the private IP addresses? (Choose three.)
*10.0.0.0 to 10.255.255.255
200.100.50.0 to 200.100.25.255
150.150.0.0 to 150.150.255.255
*172.16.0.0 to 172.31.255.255
*192.168.0.0 to 192.168.255.255
127.16.0.0 to 127.31.255.255
26. What is the purpose of spam filter software?
It detects and removes spyware.
It detects and removes viruses.
It prevents the display of advertisement windows.
*It examines incoming e-mail messages to identify the unsolicited ones.
27. Refer to the exhibit. The security policy of an organization allows employees to connect to the office intranet from their homes. Which type of security policy is this?
acceptable use
incident handling
network maintenance
*remote access
28. Which statement is true concerning stateful packet inspection?
Access is permitted based on IP addresses of the source and destination devices.
Access is permitted based on the MAC addresses of the source and destination devices.
Access is permitted only if the type of application that is attempting to reach the internal host is allowed.
*Access is permitted only if it is a legitimate response to a request from an internal host.
29. Refer to the exhibit. An organization needs to connect PC systems that use private IP addressing to the Internet. The organization has multiple systems that need to access the Internet, but were only able to purchase one public IP address. What should be activated on the Linksys integrated router to achieve this goal?
authentication
DHCP
encryption
firewall
*NAT
WEP
30. What wireless technology has the ability to communicate with many devices at the same time, makes use of the 2.4 GHz band, and is limited to low-speed, short-range communications?
RF
ISM
infrared
*Bluetooth
31. Which wireless authentication method uses the same key for the AP and the client?
EAP
Open
*PSK
WEP
32. What are two examples of storage peripheral devices? (Choose two.)
printer
*flash drive
headphones
*external DVD
barcode reader
33. What is the name given to the area covered by an ad hoc network in a WLAN?
Basic Service Set (BSS)
Distribution System (DS)
Extended Service Set (ESS)
*Independent Basic Service Set (IBSS)
34. Which type of computer has an integrated mouse?
desktop
*laptop
mainframe
server
pocket PC
How does a straight-through cable connect two unlike devices?
It connects the receive pins on the first device to the receive pins on the second device.
It connects the transmit pins on the first device to the receive pins on the second device.
It disconnects the transmit pins and uses only the receive pins.
#It uses the same pins for transmitting and receiving.
As data is sent from one host on an Ethernet network to another host on the same network, which two statements describe how the data is processed as it is received by the destination host? (Choose two.)
#The data is converted from bits into electrical signals.
#The data is de-encapsulated from a frame to a packet.
The destination MAC address is examined in the frame header.
The packet header is removed to analyze the segment header information.
The segment header and trailer are removed in order to read the packet header information.
35. What two commands can be used to form a new binding if client information does not agree with the DHCP client table? (Choose two.)
*ipconfig /release
ipconfig /all
ipconfig /flushdns
*ipconfig /renew
ipconfig
36. Refer to the exhibit. Assume that the exhibited output is from a host that is connected to a Linksys integrated router. What is the first thing that should be checked if using a bottom-up troubleshooting approach?
the default gateway on the host
the IP address on the host
the IP address on the router
*the link status LED on the front of the router
the subnet mask on the host
37. When terminating UTP cabling, why is it important to untwist only a small amount of each wire pair?
*minimizes crosstalk
makes installation faster
ensures wires are in correct order
makes it easier to fit wires into connector
38. Refer to the exhibit. What is the effect of setting the security mode to WEP on the Linksys integrated router?
The WEP security mode enables the AP to inform clients of its presence.
*The WEP security mode encrypts network traffic during transmission between the AP and the wireless client.
The WEP security mode generates a dynamic key each time a client establishes a connection with the AP.
The WEP security mode identifies the WLAN.
39. Which two components are configured via software in order for a PC to participate in a network environment? (Choose two.)
MAC address
*IP address
kernel
shell
*subnet mask
40. Refer to the graphic. What is the purpose of assigning a Network Name of Academy?
*It identifies the wireless LAN.
It translates IP addresses into easy-to-remember domain names.
It encrypts data between the wireless client and the access point.
It allows access to the AP configuration GUI by name rather than address.
It translates an internal address or group of addresses into an outside, public address.
41. When considering the purchase of a new operating system, what is meant by “Total Cost of Ownership?”
applications and support costs
hardware and support costs
hardware and software costs
*hardware, software, and support costs
hardware, operating system, and applications costs
42. Which media is used to carry electrical pulses that represent digital data?
*copper cable
fiber optic cable
wireless
radio
43. How does a crossover cable connect two routers?
It connects the pins that are used for receiving on one router to the pins that are used for receiving on the other router.
*It connects the pins that are used for transmitting on one router to the pins that are used for receiving on the other router.
It disconnects the transmit pins and uses only the receive pins.
It uses the same pins for transmitting and receiving.
44. Which connection requires a straight-through cable?
PC port to PC port
PC port to router interface
*switch port to router port
switch port to switch port
45. Refer to the exhibit. What is the effect of setting the security mode to WPA on the Linksys integrated router?
The WPA security mode uses the Passphrase option.
*The WPA security mode generates a dynamic key each time a client establishes a connection with the AP.
The WPA security mode prevents attackers from intercepting data.
The WPA security mode uses preconfigured keys to encrypt and decrypt data.
46. Which installation option should be chosen when the current operating system is too damaged to work properly?
upgrade
multi-boot
*clean install
virtualization
47. What is the meaning of the term crosstalk?
*interference of signals between wire pairs
loss of signal strength as distance increases
damage of the signal when two bare wires touch
strengthening of a signal by a networking device
48. A user is unable to send e-mail. While troubleshooting this problem, the network technician first verifies the physical connectivity of cables. Which troubleshooting approach is being followed?
*bottom-up
divide-and-conquer
top-down
trial and error
49. Which two causes of networking problems are related to the physical layer? (Choose two.)
*damaged cables and connectors
incorrect addressing
incorrect subnet mask
*overheated components
incorrect default gateway
50. Refer to the exhibit. A wireless DHCP client is unable to upload a file to the server. Given the output that is shown in the exhibit, what are two tasks that the network technician should do first to troubleshoot this problem? (Choose two.)
Verify the physical connectivity between the server and the client.
*Verify the wireless client configuration for DHCP.
Verify the firewall configuration.
Verify the default gateway.
*Verify the SSID.
Q.1 A company is developing an Internet store for its website. Which protocol should be used to transfer credit card information from customers to the company web server ?
FTPS
HTTP
#HTTPS
WEP2
TFTP
schéma1
Q.2. Refer to the exhibit. A new branch office has been added to the corporate network and anew router is to be installed to allow branch office users to access the database server at headquarters. How should the serial 0/0/0 interface of the new branch office router be configured to connect to the headquarters router ?
branch_23(config-if)# ip address 192.168.5.19 255.255.255.240
branch_23(config-if)# no shutdown
branch_23(config-if)# encapsulation hdlc
branch_23(config-if)# ip address 192.168.5.25 255.255.255.240
branch_23(config-if)# no shutdown
branch_23(config-if)# encapsulation ppp
branch_23(config-if)# no shutdown
branch_23(config-if)# encapsulation ppp
branch_23(config-if)# ip address 192.168.5.33 255.255.255.240
#branch_23(config-if)# encapsulation ppp
branch_23(config-if)# ip address 192.168.5.21 255.255.255.240
branch_23(config-if)# no shutdown
Q.3 Which two commands ensure that any password that permits access to the privileged EXEC mode is not shown in plain text when the configuration files are displayed ? (Choose two.)
#Router(config)# enable secret cisco
Router(config)# enable cisco
Router(config)# encryption-password all
Router(config)# enable login encrypted
Router(config)# enable password encryption
#Router(config)# service password-encryption
Q.4 A new network is to be configured on a router. Which of the following tasks must be completed to configure this interface and implement dynamic IP routing for the new network? (Choose three.)
#Select the routing protocol to be configured.
#Assign an IP address and subnet mask to the interface
Update the ip host configuration information with the device name and new interface IP address.
#Configure the routing protocol with the new network IP address.
Configure the routing protocol with the new interface IP address and subnet mask.
Configure the routing protocol in use on all other enterprise routers with the new network information.
Q.5 How does TCP ensure the reliable transfer of data ?
If data segments are not received from the source, the destination requests that the segments be resent.
If an acknowledgment of the transmitted segments is not received from the destination in a predetermined amount of the time, the source resends the data.
#TCP uses the SYN-ACK portion of the three-way handshake to ensure that all data has been received
The TCP Protocol Interpreter process verifies the transmitted data at source and destination.
Q.6 A network administrator is asked to design a system to allow simultaneous access to the Internet for 250 users. The ISP for this network can only supply five public IPs. What can be used to accomplish this task ?
routable translation
dynamic translation
static translation
#port address translation
Q.7 What is the most commonly used exterior routing protocol ?
#BGP
RIP
OSPF
EIGRP
schéma2
Q.8 Refer to the exhibit. The network administrator needs to configure the router with a name. Which command will the administrator use to configure the router name ?
Router# ip hostname Boise
Router# enable hostname Boise
Router(config-line)# name Boise
#Router(config)# hostname Boise
Router(config)# ip hostname Boise
Q.9 Why are port numbers included in the TCP header of a segment ?
to indicate the correct router interface that should be used to forward a segment
to identify which switch ports should receive or forward the segment
#to determine which Layer 3 protocol should be used to encapsulate the data
to enable a receiving host to forward the data to the appropriate application
to allow the receiving host to assemble the packet in the proper order
Q.10 What is the purpose of the routing process ?
to encapsulate data that is used to communicate across a network
#to select the paths that are used to direct traffic to destination networks
to convert a URL name into an IP address
to provide secure Internet file transfer
to forward traffic on the basis of MAC addresses
Q.11 Which two statements are true about the use of the debug ip rip command on a Cisco router? (Choose two.)
#The debug ip rip command displays RIP routing activity in real time.
The debug ip rip command can be issued at the user EXEC configuration mode.
The debug ip rip command displays a combination of the information that is displayed by the show ip route and show ip protocols commands.
Because of router processor usage, the debug ip rip command should be used only when necessary.
The debug ip rip command should be used instead of the show ip route command whenever possible.
Q.12 What minimum configurations must be set on a host to allow a request to be sent to http://www.cisco.com/? (Choose four.)
#DNS server
WINS server
#IP address
NetBIOS
#subnet mask
#default gateway
Q.13 A Catalyst 2960 switch has been taken out of storage to be used as a temporary replacement for another switch that needs to be repaired. About a minute after the switch has started, the SYST LED on the front of the switch transitions from blinking green to amber. What is the meaning of the amber SYST LED ?
The switch has no configuration file in NVRAM.
#The switch has failed POST and must be sent for service.
The switch is functioning properly.
The switch is in half-duplex mode.
schéma3
Q.14 Refer to the exhibit. Which combination of cables and symbols is correct ?
A – crossover, B – straight-through, C – straight-through
A – crossover, B – rollover, C – straight-through
#A – straight-through, B – crossover, C – straight-through
A – straight-through, B – straight-through, C – straight-through
A – straight-through, B – straight-through, C – crossover
A – rollover, B – straight-through, C – straight-through
Q.15 After an unsuccessful ping to the local router, the technician decides to investigate the router. The technician observes that the lights and fan on the router are not operational. In which layer of the OSI model is the problem most likely occurring ?
transport
network
data link
#physical
Q.16 What are three characteristics of the TCP protocol ? (Choose three.)
exchanges datagrams unreliably
is used to send IP error messages
#forces the retransmission of unacknowledged packets
#creates a virtual session between end-user applications
carries the IP address of the destination host in the TCP header
#is responsible for breaking messages into segments and reassembling them at their destination
schéma4
Q.17 Refer to the exhibit. The network shown is connected using services from the same ISP. How will the Fohi router dynamically learn routes to the 192.168.16.16/28, 192.168.16.32/28, and 192.168.16.64/28 subnetworks ?
with BGP
#with a static route
with a directly connected route
with an interior routing protocol
schéma5
Q.18 Refer to the exhibit. Which type of UTP cable should be used to connect Host A to Switch1 ?
rollover
console
crossover
#straight-through
Q.19 When customers use credit cards to make purchases at a small business, a modem is heard dialing a telephone number to transfer the transaction data to the central office. What type of WAN serial connection is in use ?
leased line
packet switched
#circuit switched
point-to-point
Q.20 A user reports being unable to access the Internet. The help desk technician employs a bottom-up approach to troubleshooting. The technician first has the user check the patch cable connection from the PC to the wall, and then has the user verify that the NIC has a green link light. What will the technician have the user do next ?
Enter an IP address into the WWW browser address bar to see if DNS is at fault.
Use traceroute to identify the device along the path to the ISP that may be at fault.
#Verify the IP address, subnet, and gateway settings using ipconfig on the PC.
Connect to the user home router to check firewall settings for blocked TCP ports.
schéma6
Q.21 A ping 192.1.1.20 command is issued on workstation A to determine if workstation B can be reached. What events will occur if this command is successful ? (Choose two.)
The router will block the ping request message.
The router will reply to the echo request with a proxy ping response.
Workstation A will send a UDP ping request message to workstation B.
Workstation B will send a UDP ping reply message to workstation A.
#Workstation A will send an ICMP echo request message to workstation B.
#Workstation B will send an ICMP echo reply message to workstation A.
Q.22 How does a router know of paths to destination networks? (Choose two.)
#inspection of the destination IP address in data packets
ARP requests from connected routers
manual configuration of routes
#updates from other routers
DHCP information broadcasts
updates from the SMTP management information base
schéma7
Q.23 Refer to the exhibit. Which two statements describe the data conversation shown ? (Choose two.)
#The data conversation was started by the HTTP application process running on the client.
The data conversation is identified by TCP port 80 on the client.
The user started the data conversation by sending an e-mail.
The IP address of the Internet server is 192.168.17.43.
#The Internet server will send data to port 8547 on the client.
Q.24 What is one purpose of the TCP three-way handshake ?
sending echo requests from the source to the destination host to establish the presence of the destination
determining the IP address of the destination host in preparation for data transfer
requesting the destination to transfer a binary file to the source
#synchronizing sequence numbers between source and destination in preparation for data transfer
Q.25 Which type of address is 192.168.17.111/28 ?
host address
network address
#broadcast address
multicast address
Q.26 A customer reports connectivity problems to an ISP technician. Upon questioning the customer, the technician discovers that all network applications are functioning except for FTP. What should the technician suspect is the problem ?
#misconfigured firewall
bad port on switch or hub
misconfigured IP addressing on the customer’s workstation
wrong DNS server configured on the customer’s workstation
wrong default gateway configured on the customer’s workstation
schéma8
Q.27 The show ip route command was executed on one of the routers shown in the graphic and the following output was displayed :
C 192.168.4.0/24 is directly connected, Serial0/0
R 192.168.5.0/24 [120/1] via 192.168.4.2, 00:00:19, Serial0/0
R 192.168.1.0/24 [120/2] via 192.168.3.1, 00:00:20, Serial0/1
R 192.168.2.0/24[120/2] via 192.168.3.1, 00:00:20, Serial0/1
C 192.168.3.0/24 is directly connected, Serial0/1
From which router was this command executed ?
A
B
#C
D
Q.28 Refer to the exhibit. Which two sets of commands are required to configure passwords for all management ports on a Catalyst 2960 switch ? (Choose two.)
ALSwitch(config)# interface vlan 1
ALSwitch(config-if)# password cisco
ALSwitch(config-if)# login
#ALSwitch(config)# line vty 0 4
ALSwitch(config-line)# password cisco
ALSwitch(config-line)# login
ALSwitch(config)# line vty 0 15
ALSwitch(config-line)# password cisco
ALSwitch(config-line)# login
ALSwitch(config)# enable secret class
ALSwitch(config)# enable password cisco
ALSwitch(config)# interface fa0/1
ALSwitch(config-if)# password cisco
ALSwitch(config-if)# no shutdown
#ALSwitch(config)# line cons 0
ALSwitch(config-line)# password cisco
ALSwitch(config-line)# login
Q.29 A user reports being able to access the Internet but not being able to download e-mail from the mail server at the ISP. What should the user check on the user workstation ?
#the POP3 and SMTP server settings in the e-mail application
the patch cable connections at the back of the workstation and at the wall plate
the DHCP settings in the operating system
the IP address, mask, and default gateway values
the NIC drivers
schéma9
Q.30 Refer to the graphic. Which command will configure a static route on Router A to direct traffic from LAN A that is destined for LAN C ?
RouterA(config)# ip route 192.168.4.0 255.255.255.0 192.168.5.2
RouterA(config)# ip route 192.168.4.0 255.255.255.0 192.168.3.2
#RouterA(config)# ip route 192.168.5.0 255.255.255.0 192.168.3.2
RouterA(config)# ip route 192.168.3.0 255.255.255.0 192.168.3.1
RouterA(config)# ip route 192.168.3.2 255.255.255.0 192.168.4.0
Q.31 Which subnet masks could be used when subnetting a Class B IP address? (Choose two.)
255.255.255.240
#255.255.192.0
#255.255.0.0
255.192.0.0
240.0.0.0
255.0.0.0
schéma10
Q.32 Refer to the exhibit. The network administrator has configured the RTA and RTB interfaces. In order to allow hosts that are attached to RTA to reach the server that is attached to RTB, a static route from RTA to the server LAN and a default route from RTB back to RTA need to be configured. Which two commands will the administrator use to accomplish these tasks on the two routers? (Choose two.)
#RTA(config)# ip route 255.255.255.252 10.16.10.6
RTA(config)# ip route 0.0.0.0 0.0.0.0 10.16.10.6
RTA(config)# ip route 10.16.10.96 255.255.255.252 10.16.10.6
RTB(config)# ip route 10.16.10.6 255.255.255.248 10.16.10.6
#RTB(config)# ip route 0.0.0.0 0.0.0.0 S0/0/1
RTB(config)# ip route 0.0.0.0 0.0.0.0 10.16.10.6
Q.33 How do port filtering and access lists help provide network security ?
#They prevent specified types of traffic from reaching specified network destinations.
They alert network administrators to various type of denial of service attacks as they occur.
They prevent viruses, worms, and Trojans from infecting host computers and servers.
They enable encryption and authentication of confidential data communications.
schéma11
Q.34 Refer to the exhibit. The network administrator of the building in the graphic needs to choose the type of cable best suited to add ServerB to the network. Which cable type is the best choice ?
STP
UTP
coaxial
#fiber optic
Q.35 What is used by a routing protocol to determine the best path to include in the routing table ?
Convergence time
Default distance
#Metric
Type of router
schéma12
Q.36 Refer to the exhibit. Which IP addresses could be assigned to the hosts in the diagram ? (Choose two.)
192.168.65.31
192.168.65.32
#192.168.65.35
#192.168.65.60
192.168.65.63
192.168.65.64
schéma13
Q.37 Given the network 192.168.25.0 shown in the graphic, which subnet mask would accommodate the number of hosts in each subnet ?
255.255.0.0
255.255.224.0
255.255.255.0
#255.255.255.224
255.255.255.240
255.255.255.248
Q.38 Which two protocols allow network devices to report their status and events to a centralized network management device ? (Choose two.)
#Syslog
Telnet
HTTP
HTTPS
#SNMP
Q.39 What is true regarding the differences between NAT and PAT ?
PAT uses the word “overload” at the end of the access-list statement to share a single registered address.
Static NAT allows an unregistered address to map to multiple registered addresses.
Dynamic NAT allows hosts to receive the same global address each time external access is required.
#PAT uses unique source port numbers to distinguish between translations.
schéma14
Q.40 Refer to the exhibit. The graphic shows the output of a command issued on router RTB. According to the output, what two statements are true of router RTB ? (Choose two.)
#The router is connected to a router named Boise.
Router RTB is connected to a Cisco 1841 router.
Router RTB is directly connected to two other routers.
#The IP address of the router interface connected to router RTB is 192.168.2.6.
The RTB router is connected to two Cisco devices by Fast Ethernet links.
schéma15
Q.41 Refer to the exhibit. The network administrator uses the command below to configure a default route to the ISP network :
RTB(config)# ip route 0.0.0.0 0.0.0.0 10.1.1.6
A ping issued from the ISP is successful to router RTB. However, ping echo request packets arrive at a host that is attached to the Fa0/0 interface of RTB, and the replies do not make it back to the ISP router. What will fix this problem ?
The ISP must be configured to forward packets from the 192.168.1.0 network.
The ip route command needs to be edited so that the next hop address is 10.1.1.5.
#The ip route command needs to be edited so that the 192.168.1.1 address is the next hop address.
The ip route command should be removed from the RTB router configuration.
Q.42 A network technician is using anetwork management station to gather data about the performance of devices and links within the ISP. Which application layer protocol makes this possible ?
#SNMP
FTP
DHCP
SMTP
Q.43 What are two purposes of DNS ? (Choose two.)
to dynamically assign IP addressing information to network hosts
to simplify the administration of host and default gateway addressing on client computers
to assign TCP port numbers to hosts as part of the data transfer process
#to resolve human-readable domain names to numeric IP addresses
#to replace the static HOSTS file with a more practical dynamic system
Q.44 A hacker attempts to reach confidential information that is stored on a server inside the corporate network. A network security solution inspects the entire packet, determines that it is a threat, and blocks the packet from entering the inside network. Which security measure protected the network ?
an IDS
#an IPS
a host-based firewall
Anti-X software
Q.45 How many host addresses may be assigned on each subnetwork when using the 130.68.0.0 network address with a subnet mask of 255.255.248.0 ?
30
256
#2046
2048
4094
4096
Q.46 In an IPv4 environment, what information is used by the router to forward data packets from one interface of a router to another ?
#destination network address
source network address
source MAC address
well known port destination address
Q.47 A small tire retailer requires a low-cost WAN connection to its headquarters in order to manage its inventory and process customer sales in real time. Which WAN connection type is best suited to its needs ?
Sonet
T3
#dialup
DSL
leased line
Q.48 The command copy tftp running-config has been entered on the router. What will this command do ?
copy the configuration in RAM to a server
#copy the configuration file from a server to RAM
copy the configuration file in NVRAM to RAM
copy the configuration file in NVRAM to a server
copy the configuration file from a server to NVRAM
schéma16
Q.49 Refer to the exhibit. The network administrator needs to configure the Fa0/0 interface of RTB so that hosts from RTA can connect to the server that is attached to RTB. Which two commands will the administrator use to accomplish this task ? (Choose two.)
RTB# ipaddress 192.168.102.98 255.255.255.248
RTB(config-if)# ip address 192.168.102.99 255.255.255.252
RTB(config)# ip address 192.168.102.97 255.255.255.252
RTB(config)# no shutdown
#RTB(config-if)# no shutdown
#RTB(config-if)# ip address 192.168.102.97 255.255.255.252
schéma17
Q.50 Refer to the exhibit. A NOC technician at an ISP enters the command shown. What are two reasons to use this command ? (Choose two.)
to map the path to 192.168.1.7
#to test reachability to 192.168.1.7
to locate connectivity problems along the route to 192.168.1.7
to identify the ISPs that interconnect the NOC with the remote host with the address 192.168.1.7
#to measure the time that packets take to reach 192.168.1.7 and return to the technician’s workstation
1 Which AAA service reduces IT operating costs by providing detailed reporting and monitoring of network user behavior, and also by keeping a record of every access connection and device configuration change across the network?
authentication
accreditation
#accounting
authorization
2 Which three items are normally included when a log message is generated by a syslog client and forwarded to a syslog server? (Choose three.)
#date and time of message
#ID of sending device
length of message
#message ID
checksum field
community ID
3 What is the advantage of using WPA to secure a wireless network?
It uses a 128-bit pre-shared hexadecimal key to prevent unauthorized wireless access.
#It uses an advanced encryption key that is never transmitted between host and access point.
It is supported on older wireless hardware, thus providing maximum compatibility with enterprise equipment.
It requires the MAC address of a network device that is requesting wireless access to be on a list of approved MAC addresses.
4 A company wants to configure a firewall to monitor all channels of communication and allow only traffic that is part of a known connection. Which firewall configuration should be deployed?
packet filtering
proxy
#stateful packet inspection
stateless packet inspection
5 A server log includes this entry: User student accessed host server ABC using Telnet yesterday for 10 minutes. What type of log entry is this?
authentication
authorization
#accounting
accessing
6 What two measures help to verify that server backups have been reliably completed? (Choose two.)
#reviewing backup logs
#performing trial backups
performing full backups only
replacing tape backup with hard disk-based backup
using an autoloader when backups require more than one tape
7 Which means of communication does an SNMP network agent use to provide a network management station with important but unsolicited information?
query
broadcast
ICMP ping
#trap
poll
8 Which three protocols are used for in-band management? (Choose three.)
FTP
#HTTP
#SNMP
#Telnet
TFTP
DHCP
9 A hacker has gained access to sensitive network files. In analyzing the attack, it is found that the hacker gained access over a wireless segment of the network. It is further discovered that the only security measure in place on the wireless network is MAC Address Filtering. How is it likely that the hacker gained access to the network?
The hacker used a software tool to crack the shared hexadecimal wireless key.
#The hacker obtained the MAC address of a permitted host, and cloned it on his wireless laptop NIC.
The attacker mounted a denial of service attack to overwhelm the firewall before penetrating the wireless LAN.
The hacker gained wireless access to the MAC address database and added his own MAC address to the list of permitted addresses.
10 A network administrator is assigning network permissions to new groups of users and employing the principle of least privilege. Which two actions should the administrator take? (Choose two.)
#Provide users with only the access to resources required to do their jobs.
#Provide the minimum level of permissions required for users to do their jobs.
Remove all permissions from the users and grant permissions as they are requested.
Allow users to decide how much permission they need to accomplish their job tasks.
Provide full access to the users and gradually remove privileges over time.
11 Which three protocols describe methods that can be used to secure user data for transmission across the internet? (Choose three.)
SMTP
#IPSEC
#SSL
#HTTPS
FTP
TFTP
12 Which benefit does SSH offer over Telnet when remotely managing a router?
#encryption
TCP usage
authorization
connection using six VTY lines
13 Which of the following does SNMP use to hold information collected about the network?
network management station
network management database
#management information base
database information agent
14 What are two potential problems with using tape media to back up server data? (Choose two.)
Tape is not a cost-effective means of backing up data.
Data tapes are difficult to store offsite.
#Data tapes are prone to failure and must be replaced often.
#Tape drives require regular cleaning to maintain reliability.
Backup logs are not available with tape backup solutions.
15 What is the term for the public network between the boundary router and the firewall?
“clean” LAN
intranet
#DMZ
extranet
16 Which two characteristics of network traffic are being monitored if a network technician configures the company firewall to operate as a packet filter? (Choose two.)
applications
physical addresses
packet size
#ports
#protocols
17 When is the use of out-of-band network management necessary?
when a server needs to be monitored across the network
#when the management interface of a device is not reachable across the network
when enhanced monitoring features are required to gain an overall view of the entire network
when it is desirable to use the information that is provided by SNMP
18 What network layer security protocol can secure any application layer protocol used for communication?
HTTPS
IMAP
FTPS
#IPSEC
TLS
19 Before a technician upgrades a server, it is necessary to back up all data. Which type of backup is necessary to ensure that all data is backed up?
daily
differential
#full
incremental
partial
20 What AAA component assigns varying levels of rights to users of network resources?
auditing
accounting
#authorization
access control
authentication
acknowledgement
Q.1 Which two statements are true about the OSI and TCP/IP models? (Choose two.)
The two bottom layers of the TCP/IP model make up the bottom layer of the OSI model.
The TCP/IP model is a theoretical model and the OSI model is based on actual protocols.
#The OSI network layer is comparable to the Internet layer of the TCP/IP model.
The TCP/IP model specifies protocols for the physical network interconnection.
#The TCP/IP model is based on four layers and the OSI model is based on seven layers.
Q.2 To meet customer expectations, an ISP must guarantee a level of service that is based on what two factors? (Choose two.)
accessibility
adaptability
#availability
#reliability
scalability
Q.3 User1 is sending an e-mail to User2@cisco.com. What are two characteristics of the process of sending this data? (Choose two.)
It utilizes TCP port 110.
A TCP connection is established directly between the User1 and User2 client computers in order to send the e-mail message.
#It utilizes a store and forward process.
The same application layer protocol is used to send the e-mail and retrieve it from the destination server.
#SMTP is used to send the e-mail message to the mail servers.
schéma1
Q.4 Refer to the exhibit. Host1 is in the process of setting up a TCP session with Host2. Host1 has sent a SYN message to begin session establishment. What happens next?
Host1 sends an ACK message to Host2.
Host1 sends a SYN message to Host2.
Host1 sends a SYN-ACK message to Host2.
Host2 sends an ACK message to Host1.
Host2 sends a SYN message to Host1.
#Host2 sends a SYN-ACK message to Host1.
Q.5 What are three characteristics of network reliability? (Choose three.)
#Redundant hardware provides enhanced reliability.
Reliability is measured as a percent.
Reliability is the responsibility of the ISP customers.
#Fault tolerance is a measure of reliability.
#The longer the MTBF, the greater the reliability.
Q.6 Which two statements describe the FTP protocol? (Choose two.)
It uses well-known port 23.
The protocol interpreter is responsible for the data transfer function.
#In passive data connections, the FTP client initiates the transfer of data.
#It requires two connections between client and server.
FTP servers open a well-known port on the client machine.
Q.7 What is the function of the TCP three-way handshake?
It enables the synchronization of port numbers between source and destination hosts.
It immediately triggers the retransmission of lost data.
#It synchronizes both ends of a connection by allowing both sides to agree upon initial sequence numbers.
It identifies the destination application on the receiving host.
Q.8 What are three characteristics of HTTPS? (Choose three.)
It uses a different client request-server response process than HTTP uses.
It specifies additional rules for passing data between the application and data link layers.
#It supports authentication.
It allows more simultaneous connections than HTTP allows.
#It encrypts packets with SSL.
#It requires additional server processing time.
Q.9 Which DNS zone resolves an IP address to a qualified domain name?
dynamic lookup
forward lookup
resolution lookup
#reverse lookup
Q.10 What type of update allows client computers to register and update their resource records with a DNS server whenever changes occur?
#dynamic
zone transfer
local recursive query
root domain query
top-level domain query
schéma2
Q.11 Refer to the exhibit. Which two statements are true about this file? (Choose two.)
If the gateway address changes, the file will be updated dynamically.
#The command ping fileserv will use IP address 172.16.5.10.
#If the ping www.cisco.com command is issued, the file will be checked for the Cisco web server IP address before DNS is queried.
The file must be created by the user if it is to be used by a workstation.
Name to IP address mappings are added to the file after they are received from DNS.
Q.12 Which two tasks are the responsibility of the local DNS server? (Choose two.)
maintaining a large number of cached DNS entries
maintaining the ISP server
#mapping name-to-IP addresses for internal hosts
#forwarding name resolution requests to a caching-only server
forwarding all name resolution requests to root servers on the Internet
Q.13 What are three unique characteristics of UDP? (Choose three.)
connection oriented
full-duplex operation
#low overhead
#no flow control
#no error-recovery function
reliable transmission
Q.14 A manufacturing company is looking into subscribing to services from a new ISP. The company requires hosted world wide web, file transfer, and e-mail services. Which three protocols represent the key application services that are required by the company? (Choose three.)
#FTP
#HTTP
ICMP
PPP
Telnet
#SMTP
Q.15 Which two options correctly match protocol and well-known port number? (Choose two.)
DNS – 25
#FTP – 110
HTTP – 80
POP3 – 25
#SMTP – 25
Q.16 Within TCP, what combination makes up a socket pair?
source port with destination port
source IP address with destination port
source IP address and destination IP address
#source IP address and port with a destination IP address and port
Q.17 Which protocol is used to send e-mail, either from a client to a server or from a server to another server?
SNMP
FTP
#SMTP
HTTPS
schéma3
Q.18 Refer to the exhibit. The PC is requesting HTTP data from the server. What is a valid representation of source and destination sockets for this request?
Source – 192.168.1.17:80 ; Destination – 192.168.2.39:80
Source – 192.168.1.17:80 ; Destination – 192.168.2.39:1045
#Source – 192.168.1.17:1045 ; Destination – 192.168.2.39:80
Source – 192.168.1.17:1045 ; Destination – 192.168.2.39:1061
Q.19 What type of DNS server is typically maintained by an ISP?
#caching-only
root
second-level
top-level
Q.20 A client is communicating with a server on a different segment of the network. How does the server determine what service is being requested by the client?
The server will apply the default service configured in directory services.
The server will use ARP to discover the appropriate service from the local router.
The server will send a request to the client asking for the appropriate service.
#The server will determine the appropriate service from the destination port field.
Q.21 When a host is communicating with multiple applications on the same server at the same time, which of the following will have the same value for each session? (Choose two.)
#IP address
#MAC address
session number
sequence number
Q.1 Which command is used to view the RIP routing protocol settings and configuration?
show version
show ip route
show interface
#show ip protocols
schéma1
Q.2 Refer to the exhibit. What is the maximum number of RIP routers that could separate HostA and HostB and still leave the hosts with connectivity to each other?
14
15
#16
17
Q.3 In which situation would a company register for its own autonomous system number (ASN)?
when the company’s ISP adds connection points to the Internet
when additional routers are added to the corporate internetwork
when more than one interior routing protocol is used
#when the company uses two or more ISPs
Q.4 Consider this routing table entry
R 172.16.1.0/24 [120/1] via 200.1.1.1 00:00:27 Serial0/1
What type of route is this?
a static route
a default route
#a RIP route
an OSPF route
an EIGRP route
a directly-connected route
Q.5 What is the difference between interior and exterior routing protocols?
Exterior routing protocols are only used by large ISPs. Interior routing protocols are used by small ISPs.
Interior routing protocols are used to route on the Internet. Exterior routing protocols are used inside organizations.
Exterior routing protocols are used to administer a single autonomous system. Interior routing protocols are used to administer several domains.
#Interior routing protocols are used to communicate within a single autonomous system. Exterior routing protocols are used to communicate between multiple autonomous systems.
Q.6 What information is included in RIPv2 routing updates that is not included in RIPv1 updates?
metric
#subnet mask
area identification
hop count
autonomous system number
Q.7 Which routing protocol is used to exchange data between two different ISPs?
#BGP
EIGRP
OSPF
RIP v2
schéma2
Q.8 Refer to the exhibit. Which configuration command or commands contributed to the output that is shown?
routerA(config-router)# no version 2
routerA(config)# interface fa0/0
routerA(config-if)# ip address 172.19.0.0 255.255.0.0
#routerA(config-router)# network 192.168.3.0
routerA(config)# no ip default-gateway
schéma3
Q.9 Refer to the exhibit. If all routers are running RIP and network 10.0.0.0 goes down, when will R3 learn that the network is no longer available?
in 30 seconds
in 60 seconds
in 90 seconds
#Immediately
Q.10 What statement is true regarding an AS number?
AS numbers are controlled and registered for Internet use.
Interior routing protocols require registered AS numbers.
ISPs require all customers to have registered AS numbers.
#All routers at an ISP must be assigned the same AS number.
Q.11 What is the purpose of the network command used when configuring RIP?
to specify whether RIPv1 or RIPv2 will be used as the routing protocol
to allow the router to monitor RIP updates that occur on other routers
#to identify which networks on the router will send and receive RIP updates
to configure the IP address on an interface that will use RIP
to identify all of the remote networks that should be reachable from the router
Q.12 Which command would a network administrator use to determine if the routers in an enterprise have learned about a newly added network?
router# show ip address
router# show ip route
#router# show ip networks
router# show ip interface brief
router# debug ip protocol
router# debug rip update
Q.13 What is the purpose of a routing protocol?
It is used to build and maintain ARP tables.
It provides a method for segmenting and reassembling data packets.
It allows an administrator to devise an addressing scheme for the network.
#It allows a router to share information about known networks with other routers.
It provides a procedure for encoding and decoding data into bits for packet forwarding.
Q.14 What device enables an ISP to connect with other ISPs to transfer data?
#border gateway router
DSLAM
web server
interior router
Q.15 Which command will display RIP routing updates as they are sent and received?
show ip route
show ip rip
debug ip rip
show ip protocols
#show ip rip database
Q.16 Which part of an IP packet does the router use to make routing decisions?
source IP address
source MAC address
#destination IP address
destination MAC address
Q.17 What two types of businesses would benefit from registering as their own autonomous systems? (Choose two.)
a home business with one ISP connection
#a global business with connections to multiple local ISPs
#a medium-sized nationwide business with Internet connectivity through different ISPs
a large enterprise with two connections to the same ISP
a small ISP with a single Internet connection through a larger ISP
Q.18 Which command will display RIP activity as it occurs on a router?
debug ip rip
show ip route
show ip interface
show ip protocols
debug ip rip config
#show ip rip database
Q.19 Why is fast convergence desirable in networks that use dynamic routing protocols?
#Routers will not allow packets to be forwarded until the network has converged.
Hosts are unable to access their gateway until the network has converged.
Routers may make incorrect forwarding decisions until the network has converged.
Routers will not allow configuration changes to be made until the network has converged.
Q.20 Which two statements describe static routes? (Choose two.)
They are created in interface configuration mode.
#They require manual reconfiguration to accommodate network changes.
They automatically become the default gateway of the router.
#They are identified in the routing table with the prefix S
They are automatically updated whenever an interface is reconfigured or shutdown.
Q.21 Which two statements or sets of statements describe differences between link-state and distance vector routing protocols? (Choose two.)
Link-state routing protocols routinely use more bandwidth for updates than do distance vector routing protocols.
Distance vector routing protocols update all routers at one time. Link-state routing protocols update one router at a time.
#Link-state routers only know about directly connected routers. Distance vector routers know about every router in the network.
#Link-state routing protocols update when a change is made. A network using distance vector routing protocols only updates at a specific interval.
Distance vector routing protocols have limited information about the entire network. Link state routing protocols know about all routers in the network.
In case of similar topologies, networks using link-state routing protocols typically converge more rapidly than do networks using distance vector routing protocols.
Q.22 Which protocol is an exterior routing protocol?
#BGP
EIGRP
OSPF
RIP
Q.23 Hosts on two separate subnets cannot communicate. The network administrator suspects a missing route in one of the routing tables. Which three commands can be used to help troubleshoot Layer 3 connectivity issues? (Choose three.)
#Ping
show arp
#Traceroute
#show ip route
show interface
show cdp neighbor detail
Q.24 What term refers to a group of networks that uses the same internal routing policies and is controlled by a single administrative authority?
Internet
intranet
virtual private network
#autonomous system
Q.1 In what two ways does SDM differ from the IOS CLI? (Choose two.)
#SDM is used for in-band management only. The IOS CLI can be used for in-band and out-of-band management.
SDM is accessed through a Telnet application. The IOS CLI is accessed through a web browser.
SDM is available for all router platforms. The IOS CLI is available for a limited number of Cisco devices.
#SDM utilizes GUI buttons and text boxes. The IOS CLI requires the use of text-based commands.
SDM is used for advanced configuration tasks. The IOS CLI is preferred for initial basic device configuration.
Q.2 Which mode will a configured router display at login?
global configuration mode
setup mode
ROM monitor mode
#user EXEC mode
schéma1
Q.3 Refer to the exhibit. Which password or passwords will be encrypted as a result of the configuration that is shown?
virtual terminal only
enable mode only
console and virtual terminal only
enable mode and virtual terminal
only the service password
#all configured passwords
schéma2
Q.4 Refer to the exhibit. Which three sets of commands are required to enable administrators to connect to the Switch1 console over Telnet for configuration and management? (Choose three.)
#Switch1(config)# interface fa0/1
Switch1(config-if)# ip address 192.168.2.64 255.255.255.192
#Switch1(config)# interface fa0/1
Switch1(config-if)# ip address 192.168.2.66 255.255.255.192
#Switch1(config)# interface vlan 1
Switch1(config-if)# ip address 192.168.2.126 255.255.255.192
Switch1(config-if)# no shutdown
Switch1(config)# line vty 0 4
Switch1(config-line)# enable password cisco
Switch1(config-line)# login
Switch1(config)# line vty 0 15
Switch1(config-line)# password cisco
Switch1(config-line)# login
Switch1(config)# ip default-gateway 192.168.2.65
Q.5 How does the SYST LED on the catalyst 2960 switch indicate a POST failure?
blinks rapidly amber
blinks rapidly green
#steady amber
steady green
schéma3
Q.6 Refer to the exhibit. A company always uses the last valid IP address in a subnetwork as the IP address of the router LAN interface. A network administrator is using a laptop to configure switch X with a default gateway. Assuming that the switch IP address is 192.168.5.147/24, what command will the administrator use to assign a default gateway to the switch?
#X(config)# ip default-gateway 192.168.5.254
X(config)# ip gateway 192.168.5.1
X(config)# ip route 0.0.0.0 0.0.0.0 192.168.5.1
X(config)# ip default-route 192.168.5.1
X(config)# ip route 192.168.5.254 255.255.255.0 fastethernet 0/0
Q.7 A technician has made changes to the configuration of a router. What command will allow the technician to view the current configuration before he saves the changes?
#router# show running-config
router# show startup-config
router# show flash
router# show version
Q.8 Passwords can be used to restrict access to all or parts of the Cisco IOS. Select the modes and interfaces that can be protected with passwords. (Choose three.)
#VTY interface
#console interface
Ethernet interface
secret EXEC mode
#privileged EXEC mode
router configuration mode
Q.9 To save time, IOS commands may be partially entered and then completed by typing which key or key combination?
#Tab
Ctrl-P
Ctrl-N
Up Arrow
Right Arrow
Down Arrow
Q.10 What is the correct command sequence to configure a router host name to ‘LAB_A’?
#Router> enable
Router# configure terminal
Router(config)# hostname LAB_A
Router> enable
Router# hostname LAB_A
Router> enable
Router# configure router
Router(config)# hostname LAB_A
Router> enable
Router(config)# host name LAB_A
schéma4
Q.11 Refer to the exhibit. From the router console, an administrator is unable to ping a Catalyst switch that is located in another building. What can the administrator do from her location to check the IP configuration of the attached switch?
Open an SDM session with the switch from her desktop.
Telnet to the switch from the router console.
#Use the show cdp neighbors detail command from the router console.
The administrator must go to the switch location and make a console connection to check these settings.
Q.12 Which two options must be selected in SDM Express to enable a router serial interface to obtain an IP address automatically? (Choose two.)
#Easy IP (IP negotiated)
IP unnumbered
No IP address
HDLC encapsulation
Frame Relay encapsulation
#PPP encapsulation
Q.13 What three settings can be made in the SDM Express basic configuration screen? (Choose three.)
#host name
DHCP options
#domain name
interface IP addresses
#enable secret password
DNS server IP addresses
Q.14 Which tasks can be accomplished by using the command history feature? (Choose two.)
View a list of commands entered in a previous session.
Recall up to 15 command lines by default.
#Set the command history buffer size.
#Recall previously entered commands.
Save command lines in a log file for future reference.
Q.15 What option within Cisco SDM Express must be configured to allow hosts that receive IP address settings from the router to resolve names on the network or Internet?
#host name
domain name
DHCP address pool
#DNS server IP address
Q.16 Which three encapsulation types can be set on a serial interface by an administrator who is using SDM Express? (Choose three.)
ATM
CHAP
#Frame Relay
#HDLC
PAP
#PPP
Q.17 Which command will display routing table information about all known networks and subnetworks?
Router# show ip interfaces
Router# show ip connections
#Router# show ip route
Router# show ip networks
Q.18 A network administrator needs to configure a router. Which of the following connection methods requires network functionality to be accessible?
console
AUX
#Telnet
modem
Q.19 Which three pieces of information about a neighbor device can be obtained by the show cdp neighbors command? (Choose three.)
#platform
routing protocol
#connected interface of neighbor device
#device ID
IP addresses of all interfaces
enable mode password
Q.20 Which function is a unique responsibility of the DCE devices shown in the exhibit?
transmission of data
reception of data
#clocking for the synchronous link
noise cancellation in transmitted data
Q.21 Which of the following are functions of NVRAM? (Choose two.)
stores the routing table
#retains contents when power is removed
#stores the startup configuration file
contains the running configuration file
stores the ARP table
schéma5
Q.22 Refer to the exhibit. Which series of commands will enable users who are attached to Router1 to access the remote server?
Router1(config)# interface S0/0/0
Router1(config-if)# ip address 64.100.0.129 255.255.255.252
Router1(config-if)# clock rate 64000
Router1(config-if)# no shutdown
Router1(config)# interface S0/0/0
Router1(config-if)# ip address 64.100.0.125 255.255.255.252
Router1(config-if)# no shutdown
Router1(config)# interface S0/0/0
Router1(config-if)# ip address 64.100.0.125 255.255.255.252
Router1(config-if)# clock rate 64000
Router1(config-if)# no shutdown
#Router1(config)# interface S0/0/0
Router1(config-if)# ip address 64.100.0.129 255.255.255.252
Router1(config-if)# no shutdown
Q.23 A network technician is attempting to add an older workstation to a Cisco switched LAN. The technician has manually configured the workstation to full-duplex mode in order to enhance the network performance of the workstation. However, when the device is attached to the network, performance degrades and excess collision are detected. What is the cause of this problem?
The host is configured in a different subnet from the subnet of the switch.
#There is a duplex mismatch between the workstation and switch port.
The switch port is running at a different speed from the speed of the workstation NIC.
The host has been configured with a default gateway that is different from that of the switch.
Q.24 Which of the following statements are true regarding the user EXEC mode? (Choose two.)
All router commands are available.
#Global configuration mode can be accessed by entering the enable command.
A password can be entered to allow access to other modes.
Interfaces and routing protocols can be configured.
#Only some aspects of the router configuration can be viewed.
Q.25 Which command turns on a router interface?
Router(config-if)# enable
Router(config-if)# no down
Router(config-if)# s0 active
Router(config-if)# interface up
#Router(config-if)# no shutdown
Q.1 In an 8 bit binary number, what is the total number of combinations of the eight bits?
128
254
255
#256
512
1024
Q.2 Convert the decimal number 231 into its binary equivalent. Select the correct answer from the list below.
11110010
11011011
11110110
#11100111
11100101
11101110
Q.3 How many usable hosts are available given a Class C IP address with the default subnet mask?
#254
255
256
510
511
512
Q.4 Which statement describes NAT overload or PAT?
Each internal address is dynamically translated to an individual external IP address.
A single internal address is always translated to the same unique external IP address.
#Many internal addresses can be translated to a single IP address using different port assignments.
Many internal addresses are statically assigned a single IP address and port to use for communications.
Q.5 Which IPv4 class of addresses provides the most networks?
Class A
Class B
#Class C
Class D
Class E
Q.6 Which statement accurately describes public IP addresses?
Public addresses cannot be used within a private network.
#Public IP addresses must be unique across the entire Internet.
Public addresses can be duplicated only within a local network.
Public IP addresses are only required to be unique within the local network.
Network administrators are free to select any public addresses to use for network devices that access the Internet.
Q.7 Which two statements describe classful IP addresses? (Choose two.)
It is possible to determine which class an address belongs to by reading the first bit.
#The number of bits used to identify the hosts is fixed by the class of the network.
Only Class A addresses can be represented by high-order bits 100.
Up to 24 bits can make up the host portion of a Class C address.
#Up to 24 bits can be used to identify unique networks.
Three of the five classes of addresses are reserved for multicasts and experimental use.
Q.8 Company XYZ uses a network address of 192.168.4.0. It uses the mask of 255.255.255.224 to create subnets. What is the maximum number of usable hosts in each subnet?
6
14
#30
62
Q.9 hat is the network broadcast address for a Class C address of 192.168.32.0 with the default subnet mask?
192.168.0.0
192.168.0.255
192.168.32.0
192.168.32.254
#192.168.32.255
schéma1
Q.10 Refer to the exhibit. Host A is connected to the LAN, but it cannot get access to any resources on the Internet. The configuration of the host is shown in the exhibit. What could be the cause of the problem?
The host subnet mask is incorrect.
The default gateway is a network address.
The default gateway is a broadcast address.
#The default gateway is on a different subnet from the host.
Q.11 IPv6 increases the IP address size from 32 bits to how many bits?
64
96
#128
192
256
512
Q.12 What is the range of the first octet in a Class B address?
127 to 191
127 to 192
#128 to 191
128 to 192
Q.13 Which IPv4 class provides the highest number of host addresses per network?
#Class A
Class B
Class C
Class D
Class E
schéma2
Q.14 refer to the exhibit. Which range of IP addresses would allow hosts that are connected to the Router1 Fa0/0 interface to access outside networks?
192.168.1.0 through 192.168.1.95
#192.168.1.66 through 192.168.1.94
192.168.1.66 through 192.168.1.96
192.168.1.0 through 192.168.1.127
192.168.1.66 through 192.168.1.128
Q.15 Which option shows the proper notation for an IPv6 address?
2001,0db8,3c55,0015,abcd,ff13
2001-0db8-3c55-0015-abcd-ff13
2001.0db8.3c55.0015.abcd.ff13
#2001:0db8:3c55:0015::abcd:ff13
Q.16 What are two reasons that NAT was developed? (Choose two.)
to preserve registered public IP addresses
to allow users on the public Internet to access local networks
#to provide a method for privately addressed LANs to participate in the Internet
to make routing protocols operate more efficiently
#to allow private addresses to be routed on the public Internet
to reduce overhead and CPU usage on gateway routers
Q.17 What must happen for a privately addressed host on an inside local network to be able to communicate with an outside destination host on the Internet?
The host IP address must be translated to an outside private address.
The host IP address must be translated to an inside local address.
The host IP address must be translated to an outside local address.
#The host IP address must be translated to an inside global address.
Q.18 Which port numbers are used by PAT to create unique global addresses?
255 and below
1024 and below
#1025 and above
64,000 and above
Q.19 Static NAT works by mapping a specific inside local IP address to what other specific address type?
#inside global
outside local
outside global
private IP address
Q.20 What are three advantages of NAT implementations? (Choose three.)
#improved security
improved router performance
decreased processor load
#improved scalability
universal application compatibility
#sharing few public IP addresses with many hosts
Q.1 Which two benefits can be gained by locating network equipment in a telecommunications closet, rather than in a user area? (Choose two.)
faster communication speeds
#improved physical security
more resistant to hacker attempts
#centralized cable management
less electrical usage
Q.2 Which three issues should be noted on the technician’s site survey report? (Choose three.)
#unlabeled cables
only two power outlets per wall in each room
#poor physical security of network devices
horizontal cabling runs under 100 meters
#lack of UPS for critical devices
two users sharing the same computer
Q.3 Which two types of cable are used for initial router configuration? (Choose two.)
serial cable
#rollover cable
straight-through cable
crossover cable
patch cable
#console cable
Q.4 In addition to the inventory sheet, what other information about the hosts and networking equipment should be documented by the on-site technician while performing the site survey?
any obsolete office equipment being stored
all product keys for site license software
#any planned growth anticipated in the near future
the memory requirements for installed application software
schéma1
Q.5 Refer to the exhibit. What type of device is used to connect two networks?
hub
#router
switch
access point
Q.6 It is said that the goal for availability of a communications system is “five-9s”. What is meant by this?
A down time of .00001% is unacceptable.
#A network needs to be available 99.999% of the time.
Five percent of all network expense covers 99% of user requirements.
The most critical time for network availability is from 9:00 to 5:00 p.m. five days a week.
The best time to do maintenance on a network is from 5:00 p.m. to 9:00 a.m. five days a week.
Q.7 What three things are included in a logical topology document? (Choose three.)
the location of cables, computers, and other peripherals
#the path that the data takes through a network
the wireless signal coverage area
the wiring closet and access point locations
#the device names and Layer 3 addressing information
#the location of routing, network address translation, and firewall filtering
Q.8. Which device has the ability to break up broadcast and collision domains?
repeater
hub
#router
switch
Q.9 Why is it important to review the results of an on-site survey report with the customer before beginning the network design?
to inform the customer of how much time the upgrade will take
to discuss the implementation schedule for the new equipment
#to verify that the report accurately describes the current network and any plans for expansion
to layout the new network design and discuss possible equipment upgrades and replacements
Q.10 A client requires a networking device that is capable of expansion to suit growing network demands. What type of device will suit this requirement?
a networking device with ports that can be activated and deactivated
#a networking device with a modular physical configuration
a networking device with the ability to be turned off remotely
a networking device with a cost per port that is as high as possible
Q.11 What does the use of redundant network components supply to a network?
scalability
manageability
compatibility
#reliability
Q.12 What is the benefit for a company to use an ISR router?
#An ISR provides the functionality of a switch, router, and firewall in one device.
ISRs use a PC operating system for routing traffic, thus simplifying configuration and management.
An ISR is immune to security attacks by hackers and so replaces all other network security measures.
ISRs make routing decisions at OSI Layer 7, thus providing more intelligence to the network than do other routers.
Q.13 Which three items are typically found in an MDF? (Choose three.)
user workstations
#switches and routers
fax machines
#network equipment racks
#the point of presence
copier
Q.14 What are two advantages of having ISP-managed services? (Choose two.)
does not require leasing costs for service
#can guarantee up to 99.999% availability
eliminates the need for data backup
#increases availability of help desk services
does not require a Service Level Agreement
Q.15 A manufacturing company is in the process of a network upgrade. Which two statements are true about the phases of the upgrade process? (Choose two.)
#Phase 1 is used to determine network requirements.
Phase 2 includes creating an analysis report.
#Phase 3 is based on an implementation schedule that allows extra time for unexpected events.
Phase 4 is where prototypes are created and tested.
Phase 5 includes identifying and addressing any weaknesses in the design.
Q.16 When designing a network upgrade, which two tasks should the onsite technician perform? (Choose two.)
configure the servers and routers prior to delivery
upgrade the network operating system and all client operating systems
#investigate and document the physical layout of the premises
document the final design for approval by the customer
#perform a site survey to document the existing network structure
Q.17 What is the term for the location at the customer premise where the customer network physically connects to the Internet through a telecommunications service provider?
backbone area
#point of presence
network distribution facility
intermediate distribution frame
schéma2
Q.18 Refer to the exhibit. Which type of twisted pair cable is used between each device?
A=console, B=straight, C=crossover, D= crossover, E=straight
A=straight, B=straight, C=straight, D=crossover, E=console
A=crossover, B=straight, C=straight, D=crossover, E=crossover
#A=console, B=straight, C=straight, D=crossover, E=crossover
A=console, B=crossover, C=crossover, D=straight, E=straight
Q.19 In what two ways will entering into a managed service agreement with an ISP for a network upgrade affect the costs that are incurred by the customer? (Choose two.)
Customer IT training costs will increase to enable operation of the new equipment.
The cost of hardware repairs and support will become the responsibility of the customer.
#Network upgrade and maintenance costs will become predictable.
Staffing costs will increase because the customer will need to hire additional IT staff to complete the upgrade.
#The company will not need to spend a large amount of money to purchase the equipment upfront.
Q.20 Which type of cable has a solid copper core with several protective layers including PVC, braided wire shielding, and a plastic covering?
STP
UTP
#coaxial
fiber optic
Q.21 What must be added when a network expands beyond the coverage area of the current telecommunications room?
MDF
POP
#IDF
IXP
Q.1 Which two functions are provided by the upper layers of the OSI model? (Choose two.)
placing electrical signals on the medium for transmission
#initiating the network communication process
#encrypting and compressing data for transmission
segmenting and identifying data for reassembly at the destination
choosing the appropriate path for the data to take through the network
Q.2 Which is a function of the transport layer of the OSI model?
routes data between networks
converts data to bits for transmission
#delivers data reliably across the network using TCP
formats and encodes data for transmission
transmits data to the next directly connected device
Q.3 Which common Layer 1 problem can cause a user to lose connectivity?
incorrect subnet mask
incorrect default gateway
#loose network cable
NIC improperly installed
Q.4 Which three command line utilities are most commonly used to troubleshoot issues at Layer 3? (Choose three.)
#ping
a packet sniffer
Telnet
#ipconfig
#Traceroute
Q.5 Which address is used by the router to direct a packet between networks?
source MAC address
destination MAC address
source IP address
#destination IP address
Q.6 What is the correct encapsulation order when data is passed from Layer 1 up to Layer 4 of the OSI model?
#bits, frames, packets, segments
frames, bits, packets, segments
packets, frames, segments, bits
segments, packets, frames, bits
Q.7 What are two goals of the ISP help desk? (Choose two.)
conserving support resources
#network optimization
competitive scalability
#customer retention
sales of network services
Q.8 In what two ways do Level 1 and Level 2 help desk technicians attempt to solve a customer’s problems? (Choose three.)
#talking to the customer on the telephone
upgrading hardware and software
#using various web tools
making an onsite visit
installing new equipment
#with remote desktop sharing applications
Q.9 A customer calls the help desk about setting up a new PC and cable modem and being unable to access the Internet. What three questions would the technician ask if the bottom-up troubleshooting approach is used? (Choose three.)
#Is the NIC link light blinking?
What is the IP address and subnet mask?
Can the default gateway be successfully pinged?
#Is the network cable properly attached to the modem?
#Is the Category 5 cable properly connected to the network slot on the PC?
Can you access your e-mail account?
Q.10 A customer calls to report a problem accessing an e-commerce web site. The help desk technician begins troubleshooting using a top-down approach. Which question would the technician ask the customer first?
#Can you access other web sites?
Is there a firewall installed on your computer?
What is your IP address?
Is the link light lit on your NIC card?
Q.11 Which statement describes the process of escalating a help desk trouble ticket?
The help desk technican resolves the customer problem over the phone and closes the trouble ticket.
Remote desktop utilities enable the help desk technician to fix a configuration error and close the trouble ticket.
#After trying unsuccessfully to fix a problem, the help desk technician sends the trouble ticket to the onsite support staff.
When the problem is solved, all information is recorded on the trouble ticket for future reference.
Q.12 What are two functions of the physical layer of the OSI model? (Choose two.)
adding the hardware address
#converting data to bits
encapsulating data into frames
#signal generation
routing packets
Q.13 A customer calls the ISP help desk after setting up a new PC with a cable modem but being unable to access the Internet. After the help desk technician has verified Layer 1 and Layer 2, what are three questions the help desk technician should ask the customer? (Choose three.)
#What is your subnet mask?
#What is your IP address?
Is the NIC link light blinking?
#Can you ping the default gateway?
Is the network cable properly attached to the cable modem?
Is the network cable correctly connected to the network port on the PC?
Q.14 Which scenario represents a problem at Layer 4 of the OSI model?
An incorrect IP address on the default gateway.
A bad subnet mask in the host IP configuration.
#A firewall filtering traffic addressed to TCP port 25 on an email server.
An incorrect DNS server address being given out by DHCP.
Q.15 What are two basic procedures of incident management? (Choose two.)
#opening a trouble ticket
using diagnostic tools to identify the problem
surveying network conditions for further analysis
configuring new equipment and software upgrades
#adhering to a problem-solving strategy
e-mailing a problem resolution to the customer
Q.16 Which level of support is supplied by an ISP when providing managed services?
Level 1
Level 2
#Level 3
Level 4
Q.17 What is the first step that is used by a help desk technician in a systematic approach to helping a customer solve a problem?
identify and prioritize alternative solutions
isolate the cause of the problem
#define the problem
select an evaluation process
Q.18 A network technician has isolated a problem at the transport layer of the OSI model. Which question would provide further information about the problem?
#Do you have a firewall that is configured on your PC?
Do you have a link light on your network card?
Is your PC configured to obtain addressing information using DHCP?
What default gateway address is configured in your TCP/IP settings?
Can you ping http://www.cisco.com?
Q.19 An ISP help desk technician receives a call from a customer who reports that no one at their business can reach any websites, or get their e-mail. After testing the communication line and finding everything fine, the technician instructs the customer to run nslookup from the command prompt. What does the technician suspect is causing the customer’s problem?
improper IP address configuration on the host
hardware failure of the ISR used to connect the customer to the ISP
bad cables or connections at the customer site
#failure of DNS to resolve names to IP addresses
Q.20 Which layers of the OSI model are commonly referred to as the upper layers?
#application, presentation, session
application, session, network
presentation, transport, network
presentation, network, data link
session, transport, network
1 Which two things can be determined by using the ping command? (Choose two.)
the number of routers between the source and destination device
the IP address of the router nearest the destination device
#the average time it takes a packet to reach the destination and for the response to return to the source
#whether or not the destination device is reachable through the network
the average time it takes each router in the path between source and destination to respond
Q.2 What are three main types of high-bandwidth connection options used by medium- to large-sized businesses? (Choose three.)
DSL
cable modem
Ethernet
#metro Ethernet
#T1
#T3
Q.3 What is the maximum T1 transmission speed?
56 kbps
128 kbps
#1.544 Mbps
2.4 Mbps
Q.4 Which of the following start the test of destination reachability?
#echo request issued by source
echo reply issued by source
echo request issued by destination
echo reply issued by destination
Q.5 Which statement describes a function of a Tier 1 ISP?
#peers with other similarly sized ISPs to form the global Internet backbone
uses the services of Tier 3 ISPs to connect to the global Internet backbone
pays Tier 2 ISPs for transit services to connect across continents
limits the offered services to small geographic areas
Q.6 At which point do individuals and small businesses connect directly to the ISP network to obtain Internet access?
#at a POP
at an IXP
at a Metro Ethernet link
on the ISP extranet
Q.7 What information is contained in the numbered RFCs maintained by the IETF?
the rules for acceptable use of websites and e-mail
the descriptions of various hardware components that connect to the Internet
#the specifications and rules for how devices communicate over an IP network
the standards for cabling and wiring for local Ethernet networks
Q.8 Which network support services team is responsible for testing a new customer connection and for monitoring the ongoing operation of the link?”
customer service
help desk
#network operations
on-site installation
Q.9 Which network support services team identifies whether the client site has existing network hardware and circuits installed?
customer service
help desk
network operations
#planning and provisioning
Q.10 Which ISP network support systems team will typically contact the customer once a new circuit is ready and guide the customer in setting up passwords and other account information?
#help desk
customer service
network operations center
on-site installation team
planning and provisioning
Q.11 What feature allows network devices to be scalable?
a fixed number of interfaces
ease of repair
#modularity
low maintenance requirements
low cost
Q.12 Which command generated this output?
1 12.0.0.2 4 msec 4 msec 4 msec
2 23.0.0.3 20 msec 16 msec 16 msec
3 34.0.0.4 16 msec 18 msec 16 msec
#Router# traceroute 34.0.0.4
Router# nslookup 34.0.0.4
Router# ping 34.0.0.4
Router# telnet 34.0.0.4
Q.13 Which network utility helps determine the location of network problems and identifies routers that packets travel across?
ping
ipconfig
#traceroute
ixp
Q.14 What interconnects the Internet backbone?
gateway routers
#IXPs
POPs
satellite dishes
Q.15 What units are used to measure Internet bandwidth?
#bits per second
bytes per second
hertz
megabytes per second
packets per second
Q.16 The IT manager of a medium-sized business wishes to house the company-owned web servers in a facility that offers round-the-clock controlled access, redundant power, and high-bandwidth Internet access. Which ISP service will fulfill this need?
web hosting
planning and provisioning
application hosting
#equipment colocation
Tier 1 ISP services
Q.17 What is the purpose of an RFC?
to provide the connection point for multiple ISPs to the Internet
#to document the development and approval of an Internet standard
to connect a business to an ISP
to provide data communication services to ISP customers
to monitor network performance and connection status of ISP clients
Q.18 When did the Internet become available for use by businesses and consumers?
1979
1984
#1991
1999
2000
Q.19 What was the original purpose of the Internet?
voice communication
marketing
#research
commerce
Q.20 What three support service teams are commonly found within an ISP? (Choose three.)
#help desk
computer support
application readiness
#network operations center
#planning and provisioning
implementation and documentation
Q.1 Which three statements are true about local and network applications? (Choose three.)
A local application is loaded in a local computer and can be accessed by a remote computer on the network.
#A network application is loaded in a local computer and accessed from a remote computer.
#A local application is loaded in a local computer and accessed only by the local computer.
A network application is loaded in a local computer and accessed only by the local computer.
An example of a local application is e-mail.
#An example of a network application is instant messaging.
Q.2 A wireless DHCP client cannot connect to the Internet through a Linksys integrated router. When you type ipconfig on the host, no IP address, subnet mask, or default gateway shows. What are two of the first things you will check? (Choose two.)
#SSID
#if the wireless client is configured for DHCP
the cable between client and integrated router
the firewall configuration on the integrated router
if the correct default gateway is configured on the client
if the correct default gateway is configured on the integrated router
schéma1
Q.3 Refer to the graphic. Assume that the command output is from a wireless DHCP client that is connected to a Linksys integrated router. What can be deduced from the output?
#The wireless connection is good.
The WEP key or SSID needs to be checked.
The DHCP configuration on the router needs to be checked.
The wireless NIC driver or the NIC itself needs to be reinstalled.
Q.4 What measurement is commonly used to describe communication speed when transferring data?
#bps
cps
Hz
MB
Q.5 What is an accurate description of network devices in the distribution layer?
They are designed to interconnect individual hosts.
They are designed to interconnect multiple companies.
#They are designed to interconnect local network segments.
They are designed to switch data packets as fast as possible.
Q.6 When acting as a DHCP server, an integrated router can provide what three types of information to a client? (Choose three.)
physical address
MAC address
#default gateway
static IP address
#dynamic IP address
#DNS server address
Q.7 Where do ISPs get the public addresses that they assign to end users?
ISPs create the addresses themselves.
ISPs are assigned addresses through the RFC.
ISPs obtain their addresses automatically.
#ISPs obtain address blocks from registry organizations.
schéma2
Q.8 Refer to the graphic. What is the effect of setting the security mode to WEP on the Linksys integrated router?
It identifies the wireless LAN.
It allows the access point to inform clients of its presence.
It translates IP addresses into easy-to-remember domain names.
#It encrypts data between the wireless client and the access point.
It ensures that only authorized users are allowed access to the WLAN.
It translates an internal address or group of addresses into an outside, public address.
Under what circumstance would it be appropriate to use private IP addresses?
for communication between two ISPs
for a network that is directly connected to the Internet
#for addresses that are used exclusively within an organization.
for a host with more than one direct connection to the Internet
Some new features are available for the OS that is currently running on a user’s PC. What method should be chosen so that the user can install these new feature sets?
clean install
multi-boot
#upgrade
virtualization
Q.9 When are leased lines typically used?
when low bandwidth is required
for home and small business connectivity
#when a dedicated digital data line is necessary
as a less expensive option to cable and DSL modem service
Which three statements describe an IP address? (Choose three.)
#An IP address is known as a logical address.
An IP address uses a 30-bit addressing scheme.
An IP address is found in the Layer 2 header during transmission.
The network portion of an IP address is burned into a network interface card.
#An IP address is unique within the same local network.
#The network portion of an IP address will be the same for all hosts that are connected to the same local network.
Q.10 Which wireless protocol is used for encryption?
EAP
Open
PSK
#WEP
Q.11 The area covered by a single AP is known as what?
ad-hoc network
#basic service set
independent basic service set
extended service set
distribution system
Q.12 Which installation option should be chosen when the current operating system is too damaged to work properly?
upgrade
multi-boot
#clean install
virtualization
Q.13 What layer is the first point of entry for a host into the network?
core layer
#access layer
network layer
distribution layer
Q.14 What two commands can be used to form a new binding if client information does not agree with the DHCP client table? (Choose two.)
#ipconfig /release
ipconfig /all
ipconfig /flushdns
#ipconfig /renew
ipconfig
15. What are two advantages of purchasing a custom-built computer? (Choose two.)
usually a lower cost
no waiting period for assembly
#user can specify higher performance components
#supports higher-end graphics and gaming applications
fewer components to replace
Q.16 What information within a data packet does a router use, by default, to make forwarding decisions?
the destination MAC address
#the destination IP address
the destination host name
the destination service requested
Q.17 What is a service pack?
an access policy
an agreement between a company and a vendor
a piece of code created to fix one specific problem
#a collection of patches and updates released by a vendor
a small piece of software designed specifically for security issues
Q.18 What is an ISP?
It is a standards body that develops cabling and wiring standards for networking.
It is a protocol that establishes how computers within a local network communicate.
#It is an organization that allows individuals and businesses to connect to the Internet.
It is a networking device that combines the functionality of several different networking devices in one.
Q.19 Which two statements correctly describe Media Access Control (MAC) addresses? (Choose two.)
#MAC addresses are used to identify a specific NIC.
#MAC addresses are physical addresses.
MAC addresses contain a network number and unique host identification.
MAC addresses are always assigned to network devices by a network administrator.
MAC addresses can be dynamically assigned.
Q.20 What is the name for the contract between a customer and an ISP that specifies requirements for uptime and service response time?
DSL
IAB
NAP
#SLA
Q.21 What are two ways that a user can interact with an operating system shell? (Choose two.)
#CLI
OS
#GUI
NIC
kernel
Q.22 Select the connection that would require a straight-through cable.
a switch to a hub
#a router to a switch
a switch to a switch
a router to a router
23. Choose the option that shows the correct sequence of steps in the encapsulation of TCP/IP data that is passed from a source to a destination host?
A. converts data to bits for transmission
B. packages the data for end to end transport
C. adds the data-link header and trailer
D. adds the network IP address to the header of the frame
A,B,C,D
A,C,D,B
#B,D,C,A
B,C,D,A
D,C,B,A
Q.24 What is specified by the network number in an IP address?
#the network to which the host belongs
the physical identity of the computer on the network
the node of the subnetwork which is being addressed
the broadcast identity of subnetwork
schéma3
Q.25 Refer to the graphic. What is the purpose of assigning a Network Name of Academy?
#It identifies the wireless LAN.
It translates IP addresses into easy-to-remember domain names.
It encrypts data between the wireless client and the access point.
It allows access to the AP configuration GUI by name rather than address.
It translates an internal address or group of addresses into an outside, public address.
Q.26 Which of the following statements best describes DNS?
DNS servers are used to map an IP address to a physical address.
#DNS servers are used to map a name to an IP address.
DNS servers are used to configure logical address information for host computers.
DNS servers are used to translate from private addresses to public addresses.
Q.27 Which of the following are the address ranges of the private IP addresses? (Choose three.)
#10.0.0.0 to 10.255.255.255
200.100.50.0 to 200.100.25.255
150.150.0.0 to 150.150.255.255
#172.16.0.0 to 172.31.255.255
#192.168.0.0 to 192.168.255.255
127.16.0.0 to 127.31.255.255
Q.28 Which protocol is used to transfer files among network devices and perform file-management functions?
DNS
#FTP
HTML
HTTP
Q.29 Select three statements that correctly describe how DHCP services may be provided. (Choose three.)
An integrated router provides IP configurations for most ISPs.
#An integrated router can act as both DHCP server and DHCP client.
A home PC using a static IP address obtained that address from a DHCP server.
#Most home network integrated routers receive an IP configuration directly from their ISP.
#A variety of devices can act as DHCP servers, as long as they run DHCP service software.
A home PC is required by standards to obtain an IP address and default gateway from a DHCP server (usually the ISP).
A company has a web server that must be accessible to both external and internal clients. Which security policy best practice should be followed to maximize security of the server?
#Place the web server in a DMZ.
Keep the web server on the external network.
Configure a firewall device to serve as the web server.
Locate the web server in the server farm of the internal network.
schéma4
Q.30 Refer to the graphic. Based on the information that is shown, what statement is true?
This configuration would be commonly found in an ad hoc wireless network.
Any wireless client that is attached to this access point would have the same IP address and SSID.
#All wireless devices that are connected to this access point must have an assigned SSID of Academy.
In addition to accepting wireless client requests, this access point must connect to the wired network.
Q.31 Identify two causes of physical layer network problems. (Choose two.)
logical addressing issues
#improperly terminated cables
#cables plugged into wrong ports
incorrect MAC address assigned
packets received out of sequence
incorrect subnet mask on an interface
Q.32 Which part of the electromagnetic spectrum is commonly used to exchange data between a PDA and a computer?
FM
radar
#infrared
ultraviolet
Q.33 Which of the following are transport layer protocols of the TCP/IP model? (Choose two.)
FTP
#UDP
SMTP
TFTP
#TCP
Q.34 For the second time in a week, workstations on a LAN are not able to log into the server. The technician fixed the problem the first time, but cannot remember the steps taken to solve it. What aspect of the troubleshooting process has the technician neglected?
identifying the problem
asking end-users questions
#documenting the troubleshooting process
using structured techniques to solve a problem
Q.35 What action will a router take when it receives a frame with a broadcast MAC address?
#It will not forward the frame to another network.
It forwards the frame back to the sending host with its IP address as a response.
It forwards the frame out of all interfaces except the interface where the frame was received.
It forwards the frame back out the receiving interface to insure all hosts on the local network receive it.
Q.36 A network host is accessing a web server. What two protocols are most likely being used as the TCP/IP model application layer protocol and the internetwork layer protocol? (Choose two.)
#IP
FTP
TCP
DHCP
#HTTP
Q.37 Which statement is true concerning stateful packet inspection?
Access is permitted based on IP addresses of the source and destination devices.
Access is permitted based on the MAC addresses of the source and destination devices.
Access is permitted only if the type of application that is attempting to reach the internal host is allowed.
#Access is permitted only if it is a legitimate response to a request from an internal host.
Q.38 What does the term “attenuation” mean in data communication?
#loss of signal strength as distance increases
time for a signal to reach its destination
leakage of signals from one cable pair to another
strengthening of a signal by a networking device
39. What is the default subnet mask for a class B address?
255.0.0.0
#255.255.0.0
255.255.255.0
255.255.255.255
schéma5
Q.40 Refer to the graphic. Based on the configuration information that is shown, which three types of 802.11 networks are allowed access to the WLAN? (Choose three.)
802.11a
#802.11b
802.11e
#802.11g
#802.11n
802.11x
Q.41 Within a local network, which two items must be unique on a computer for it to successfully connect to the network? (Choose two.)
#IP address
subnet mask
#computer name
default gateway address
operating system version
Q.42 When considering the purchase of a new operating system, what is meant by “Total Cost of Ownership?”
applications and support costs
hardware and support costs
hardware and software costs
#hardware, software, and support costs
hardware, operating system, and applications costs
Q.43 A computer joins the network and announces itself to all hosts on the LAN. What type of message does the computer send out?
#broadcast
simulcast
multicast
unicast
schéma6
Q.44 Refer to the graphic. What feature can be installed on the Linksys integrated router to convert private IP addresses to Internet-routable addresses?
authentication
DHCP
encryption
firewall
#NAT
WEP
Q.45 When terminating UTP cabling, why is it important to untwist only a small amount of each wire pair?
#minimizes crosstalk
makes installation faster
ensures wires are in correct order
makes it easier to fit wires into connector
Q.46 A host sent a message that all other hosts on the local network received and processed. What type of domain are all these hosts a part of?
local domain
multicast domain
collision domain
#broadcast domain
Q.47 Your school network blocks all websites related to online gaming. What type of security policy is being applied?
identification and authentication
remote access
#acceptable use
incident handling
schéma7
Q.48 Refer to the graphic. Assume that the exhibited output is from a host that is connected to a Linksys integrated router. What is one of the first things you should check?
IP address on the host
IP address on the router
subnet mask on the host
default gateway on the host
#link status LED on the front of the router
Q.49 The transmit pins are disconnected and only the receive pins are used.
The transmit pins are disconnected and only the receive pins are used.
The transmit pins on one device are connected to the transmit pins on the other device.
The receive pins on one device are connected to the receive pins on the other device.
#The transmit pins on one device are connected to the receive pins on the other device.
50. What are two examples of storage peripheral devices? (Choose two.)
printer
#flash drive
headphones
#external DVD
barcode reader
Q.51 What are the two possible values for a digital bit? (Choose two.)
#0
#1
A
F
#
9
Q.52 What type of computer would most likely use a docking station?
#laptop
server
desktop
mainframe
workstation
Which two causes of networking problems are related to the physical layer? (Choose two.)
#damaged cables and connectors
incorrect addressing
incorrect subnet mask
#overheated components
incorrect default gateway
What is the purpose of creating a DMZ during network firewall implementation?
to create a server security zone accessible only to internal clients
to create a dirty zone that allows all inbound and outbound traffic
#to allow for a publicly accessible zone without compromising the internal network
to specify a higher security level than normally required for the internal production network
A local PC has the correct configuration that is required to access the network. A ping command that is sourced at the PC does not receive a response from a remote device. Which operating system command might be used to determine where the connection failed?
netstat
tracert
ipconfig
#nslookup

183 komentar:

Anonymous said...

n1ce

Anonymous said...

nice, but im not sure all answers are good..

Raymond Ratu said...

thanky...

Anonymous said...

I have been surfing online more than 4 hours today, yet I
never found any interesting article like yours.

It's pretty worth enough for me. In my opinion, if all website owners and bloggers made good content as you did, the web will be much more useful than ever before.
My webpage: exchange server Repair software

Anonymous said...

Wow, that's what I was exploring for, what a data! present here at this webpage, thanks admin of this site.
Also see my webpage :: exchange database Recovery software company

Anonymous said...

Hі to all, the cοntents exіsting at this web page
аre actually amazing for peορle exρeгiencе, well, keep up the nice work fellowѕ.
My homepage :: download minecraft for free

Anonymous said...

Undeniably consider that which you stated. Your favourite reason
appeared to be at the web the easiest thing to
take into account of. I say to you, I definitely get annoyed
at the same time as people consider concerns that they plainly do not realize about.
You managed to hit the nail upon the top and defined out the entire thing with no need side effect
, folks could take a signal. Will likely be back to get more.
Thanks
Here is my page ; usa bank account with atm card

Anonymous said...

Hello colleagues, how is everything, and what you wish for to say
about this article, in my view its truly remarkable designed
for me.
Here is my page : Apple Valley

Anonymous said...

My brother recommended I might like this blog.
He was totally right. This post truly made my day. You can not imagine simply
how much time I had spent for this info! Thanks!
Here is my blog post ... Scott J. Ferrell

Anonymous said...

I think the admin of this site is genuinely
working hard in support of his web page, since here every information is
quality based information.
My web blog : photos of tendulkar

Anonymous said...

Link exchange is nothing else except it is just placing
the other person's webpage link on your page at appropriate place and other person will also do similar in favor of you.
My web site - instant gagnant

Anonymous said...

Hi there, i read your blog from time to time and i own a similar one and i was just wondering if you get a lot of spam
remarks? If so how do you prevent it, any plugin or anything you can recommend?
I get so much lately it's driving me crazy so any support is very much appreciated.
My web page ; Como Conquistar A Una Amiga

Anonymous said...

Useful info. Fortunate me I found your web site by accident,
and I am surprised why this coincidence did not came about
earlier! I bookmarked it.
My weblog - GeeksonSteroids

Anonymous said...

Hello Dear, are you truly visiting this website regularly,
if so after that you will definitely get good know-how.
Look into my web blog : Film Noir

Anonymous said...

magnificent submit, very informative. I wonder why the other experts
of this sector don't notice this. You should proceed your writing. I am sure, you have a great readers' base already!
My homepage - cheap dr. dre pro headphones online

Anonymous said...

I was wondering if you ever thought of changing the layout of your
website? Its very well written; I love what youve
got to say. But maybe you could a little more in the
way of content so people could connect with it better.
Youve got an awful lot of text for only having one or two pictures.
Maybe you could space it out better?
Here is my web page - find the best treadmills

Anonymous said...

My partner and I absolutely love your blog and find the majority of your post's to be just what I'm looking
for. Would you offer guest writers to write content to suit your needs?
I wouldn't mind composing a post or elaborating on most of the subjects you write about here. Again, awesome web log!
Also visit my web site ; sittercity.com

Anonymous said...

I'm really loving the theme/design of your weblog. Do you ever run into any browser compatibility problems? A handful of my blog audience have complained about my blog not operating correctly in Explorer but looks great in Opera. Do you have any recommendations to help fix this issue?
My homepage : Only adult dating web site

Anonymous said...

Malaysia & Singapore & brunei ideal internet blogshop
for wholesale & quantity korean accessories, accessories, earstuds, locket, rings,
bracelet, hair & bracelet add-ons. Promotion 35 % wholesale markdown. Ship Worldwide
My website: La Fiesta Sengkang

Anonymous said...

Malaysia & Singapore & brunei ideal on the internet
blogshop for wholesale & supply korean accessories, accessories, earstuds, choker, rings, trinket, bangle & hair add-ons.
Deal 35 % wholesale discount. Ship Worldwide
my page > playstation repair

Anonymous said...

Malaysia & Singapore & brunei finest on-line blogshop for wholesale & supply korean add-ons, accessories, earstuds,
locket, rings, trinket, bracelet & hair accessories.
Offer 35 % wholesale price cut. Ship Worldwide
My website: tadalafil

Anonymous said...

Malaysia & Singapore & brunei best on-line blogshop for wholesale & supply korean add-ons, earrings, earstuds, locket, rings, trinket, hair &
bracelet add-ons. Deal 35 % wholesale markdown. Ship Worldwide
Take a look at my web site : habilidades cognitivas

Anonymous said...

I think this is among the most vital info for me. And i'm glad reading your article. But want to remark on few general things, The website style is great, the articles is really nice : D. Good job, cheers
Take a look at my web-site Perth

Anonymous said...

Hello just wanted to give you a quick heads up. The
text in your content seem to be running off the screen in Chrome.
I'm not sure if this is a formatting issue or something to do with browser compatibility but I figured I'd
post to let you know. The layout look great though!
Hope you get the problem fixed soon. Many thanks
Here is my blog post Gambling

Anonymous said...

Hi there, just became alert to your blog through Google, and found that it's truly informative. I am going to watch out for brussels. I will be grateful if you continue this in future. Numerous people will be benefited from your writing. Cheers!
Here is my web page - seo services india

Anonymous said...

This is a common misconception which will be resolved only
with firsthand experience. com’s report.
The tools include efficient internet marketing, proper usage of keywords,
flawless content and creating social media buttons.
This gives your name higher credibility and better search engine rank.

It's so important because once customers begin seeking your product or service you will want to have favorable words making your search results optimized. The major preference is for offshore SEO companies as they offer SEO at the most competitive prices. While these 5 truths may seem self-evident, it is the astonishing fact that they are contradicted, and even outright disputed, in the greater SEO debate. The thing that needs to be emphasized is to create text of your website in such a way that the algorithms find them easily. Its professionals would do hard work to achieve the high traffic objective and they might taste success in their attempt but they would desist from boasting anything about their success. Over the years, web promotion has made a mark in the industry and has helped numerous entrepreneurs to build large business return through web. organic search, frequency of blog posts, frequency of on-page optimization, the relative importance of links, the use of social media, the best way to measure results, etc. He has also mentioned each and every seo service. Now, if it takes you three years to referrer 3000 members which means that you receive US$3000 per month. Immediately the word free caught my eye. And, as more and more companies move larger portions of their advertising budgets to internet marketing, there is an even greater demand for their skills. SEO defined. Have you been looking at your competitor's websites to see what kind of keywords they're using. Once someone clicks on your site, they should see tons of unique informative content. You need the keyword and phrase in both title and description. If customers like what they see, they just might go on reading.
Here is my web site : click the up coming webpage

Anonymous said...

Valuable information. Lucky me I discovered your site
by accident, and I am surprised why this accident
did not happened in advance! I bookmarked it.
Here is my web page :: ikea furniture assembly service

Anonymous said...

Greetings! This is my 1st comment here so I just wanted
to give a quick shout out and tell you I genuinely enjoy reading through your posts.

Can you suggest any other blogs/websites/forums that go over the same subjects?

Appreciate it!

Also visit my homepage stop smoking for good

Anonymous said...

Greetings! This is my 1st comment here so I just wanted to give a quick shout out and tell you
I genuinely enjoy reading through your posts. Can
you suggest any other blogs/websites/forums that go over the same subjects?

Appreciate it!

Here is my webpage - stop smoking for good
Also see my website: electric cigarette,electric cigarettes,electric cig,electric cigs,electronic cigarette,electronic cigarettes,e cigarette,e cigarettes,electronic cig,electronic cigs,quit smoking fast,stop smoking for good,kick the smoking habit,stop lighting up,quit smoking tobacco cigarettes,stop smoking the easy way,finally quit smoking now,time to stop smoking tobacco,time to quit smoking for good,get healthy without cigarettes

Anonymous said...

Hello excellent website! Does running a blog like
this take a massive amount work? I've very little knowledge of programming but I had been hoping to start my own blog in the near future. Anyways, should you have any ideas or techniques for new blog owners please share. I understand this is off subject but I just needed to ask. Thanks a lot!

Here is my webpage kostenlos spielen ohne anmeldung

Anonymous said...

What I ԁidn't know was how I would get all of what I wanted in just six hours. (Check out the article: What'ѕ Reаlly Out Thеre
in the Nіght Sky to see hοw some celestiаl
objeсts appеar at different EϺ frequenciеs.
Thіs not onlу allows listenеrѕ to liѕten to their faνorіte MP3 files alοng with theіr SIRIUS гаdiο;
it also letѕ them dіgitally rеcorԁ their faѵorіte гadiο songs
foг inѕtant рlaybacκ.


Mу web blog; Recommended Reading

Anonymous said...

What І ԁiԁn't know was how I would get all of what I wanted in just six hours. (Check out the article: What's Really Out
There in the Νight Sky tο sеe how sоme сelestial
objectѕ аρpeaг at diffеrent EM frеquenсieѕ.
Тhіs not only allows listenеrs tο
lіѕten to their favoгite MP3 files аlong with their ЅIRIUЅ radio; it also lets them dіgitallу rеcοrd their favorite radio songѕ for іnstant playbаck.


Fеel fгee to ѕurf to my blog pоst - Recommended Reading
Also see my website: Read A lot more

Anonymous said...

If there is a change in the search engine algorithms,
it is also up to the service provider to keep a watch on such activities.
B) SEO basics - Image 2: Select-'English' and 'All Countries and Territories'.
The tools include efficient internet marketing, proper usage of
keywords, flawless content and creating social media buttons.

Naturally, they will flock to your competitor who does. Since Google organic rank can bring
in thousands of potential customers, search engine position service firms have made a business
of promising high positions in search engine results pages.
This is the best part to ensure complete uniqueness
to each of the websites. Instead, the developer should
concentrate on the functions mentioned in this article first, as they are the basis for further extension
of the Word - Press header file. There are many tools online to help
you research relevant keywords, such as the Google Adwords Keyword Tool.
The title is supposed to explain the article, and the title is what your readers
see when they search for content. Numerous SEO services over competitive price
for outsourcing your site online, but, would it be best to hire the
locals if the nature of your business limits to your local as well.

So, most move slowly when deciding on who becomes the company's SEO. He has also mentioned each and every seo service. Now even that is quickly defining point of Search Engine Optimization (SEO) can lead to intense discussions about the meaning and purpose of SEO. An SEO strategy should combine a number of elements that work together to get results for you. In this article, I will show you the best Word - Press SEO plugins you need to use in order to boost your search engine rankings and get more traffic to your blog. It has been designed especially for business purposes and it holds biggest importance for your B2B online marketing strategy. The World Wide Web is an incredible source of customers and potential revenue for all types of businesses and companies in all niches. SEO content is a huge deal in today's online oriented business world.
And make the work flow smoothly, using good grammar at all times.
Never post a half edited article, and never settle for less than your best.


My web page - mouse click the up coming post
My page :: backlink kaufen

Anonymous said...

What's up to all, how is the whole thing, I think every one is getting more from this website, and your views are good for new people.

My weblog; nexopia.com

Anonymous said...

Awesome blog! Is уour theme custоm made ог ԁid yοu ԁownloаd it from somewheге?
А theme like yοurs with а few sіmplе adjustementѕ would rеаlly make my blοg јump out.
Plеase let me know whеre you got yοur theme.

Bless уou

Viѕit my blog post - diet regime

Anonymous said...

Hi, I do believe this is an excellent website. I stumbledupon it ;) I may revisit once again
since i have book marked it. Money and freedom is the best way to change, may you be rich and
continue to help other people.

Take a look at my blog post :: spiele spielen

Anonymous said...

Hi there, You've done a fantastic job. I'll certainly digg it and personally recommend to my
friends. I'm confident they will be benefited from this website.

my blog; radio sender

Anonymous said...

It can, however, be pre-ordered, as its release date is in
the near future. I even find myself backing away from
recommending other resources which, in the past, I would have shared willingly.

One situation had me pose as bait to draw the enemies out so my ally could dispatch them.
Fun the first time, but just not enjoyable after numerous journeys.

Overall I'll say the game isn't that re playable.
For an in depth guide to the E8400 chip, I highly recommend reading this article:
Final Thoughts on the Intel E8400. Today, the scenario is entirely different.
FIFA has stated that a player named as a goalkeeper can only play in goal
and that this rule will be enforced. Vision for Space Exploration Cover
by NASA used under Public Domain. Why the lack of soul-wrenching anxiety.


my web-site - JennaLane: disney cars 2 games free download

Anonymous said...

Its such аs you learn mу mind! You sеem
to κnow a lot аbout thіs, lіke you
wrote the guide іn іt or something. I bеlieve that уou
ѕimply can do with a fеω p.c. to preѕsure the message housе a bit, hοweveг іnѕteaԁ
of that, that іs magnificent blog. A fantastic read.
I will definitely be back.

Αlso visit my site - Lesen www.online-radioportal.de

Anonymous said...

Dadurch kann die Masse nicht aufgenommen werden, während
sie die Verdauung passiert, wodurch eine Gewichtsreduktion erreicht wird.
People can control their blood sugar levels regularly according madhunashini Vati.

Many Thai sellers sell it on e - Bay and ecrater though,
so if you're interested in trying some it shouldn't be too difficult to
get.

My web-site 5 kilo abnehmen

Anonymous said...

Without the internet, this is not possible to play these novoline games online and even
they can't live online that they perform now with public for additional characteristics and completely attractive in a delusion earth to participate in a game. If you want to enjoy the game thoroughly then you need to get on board of a reliable online bingo site to get the maximum enjoyment as well as benefit of the game. In fact an ideal online casino will make the entire gaming experience a pleasurable and a real experience to the gamer.

Feel free to surf to my web blog - gratis spiele spielen

Anonymous said...

Ad - Sense, like every other Google program, is managed entirely online, with no need for a Google home business kit.
I wanted to know, since we have gotten so intimate, if you are seeing or having sex with other partners
(so we can keep this relationship honest and not play games).

The Zune application has been available for a couple of years now,
and as well as being the ideal desktop media player that handles
movies, music, TV and photos, it is also designed to sync with media
players and Windows Phone while providing you
with access to the Zune Marketplace to purchase music and video.


my page; http://hammonukdkfy.sosblogs.com/The-first-blog-b1/What-Are-The-Incentives-To-Using-Green-Energy-Sources-b1-p70.htm

Anonymous said...

If you decide to pursue SEO as a way to generate revenue,
you must beware that you will open yourself up to a host of new scam products.
Craig Newmark began the service in 1995 as an email distribution list of friends,
featuring local events in the San Francisco Bay Area, before
becoming a web-based service in 1996. If your looking for something dark
and different or maybe light and lucsious, chances are you'll find it on one of these stations.

Here is my site :: please click the next website page

Anonymous said...

Please supplement charge before use when the battery has
been kept for a long time. An alternate electrical
power source reduces the probability that the access
technique will turn out to be inoperable via strength
reduction and aid conserve battery lifestyle. Although, sound card is
integrated device, it functions similar to brightness of
the screen when talking about power consumption.

Feel free to surf to my web-site; kostenlos spiele spielen

Anonymous said...

I didn't want to drive all the way back to Autozone to pick up a new terminal post clamp, so I figured I'd attach it
and see what happened. Remove other nearby wireless devices,
such as a cordless or cellular telephone and make sure the mouse is at least eight inches away from a wireless keyboard.
While the older 17 inch Mac - Book Pros lack the benefits
of the unibody design, they do have the added
feature of user-replaceable batteries.

my web site: More Information and facts

Anonymous said...

I was recommended this web site by my cousin. I'm not sure whether this submit is written by means of him as no one else know such detailed approximately my trouble. You are wonderful! Thank you!

Also visit my web page; dreambox

Anonymous said...

These are actually great ideas in regarding blogging. You
have touched some nice points here. Any way keep up wrinting.


Feel free to surf to my web-site ... day trading taxes

Anonymous said...

Keep on working, great job!

Check out my site binary options platforms

Anonymous said...

Verу soon this wеbsitе will be fаmous аmid all blogging pеοple, due tо it's good posts

my webpage :: how purchase hcg

Anonymous said...

It's nearly impossible to find experienced people in this particular topic, but you seem like you know what you're tаlkіng about!
Thanκs

Feel free to visit my webρаgе :: side effects of using steroids
Also see my web page :: pictures of steroids

Anonymous said...

Hi there! I realize this is somewhat off-topic however I had to
ask. Does running a well-established blog like yours take a
large amount of work? I am completely new to writing a blog however I do write in my journal on a daily basis.
I'd like to start a blog so I will be able to share my own experience and feelings online. Please let me know if you have any ideas or tips for brand new aspiring blog owners. Appreciate it!

Have a look at my page http://www.youtube.com/watch?v=caSEY6ykNKw

Anonymous said...

I'll immediately snatch your rss feed as I can not find your email subscription hyperlink or e-newsletter service. Do you have any? Kindly allow me recognize in order that I may subscribe. Thanks.

Also visit my web blog :: bmi chart female

Anonymous said...

I аm ѕure thіs article has touched all the inteгnet userѕ, its really really good post οn buildіng uр new web site.



Feel free to surf to my ρage raspberryketoned.co.uk

Anonymous said...

The most attractive feature of an online radio tuner is its
ability to record what you're listening to. One of the best internet radio apps I've found so
far on the Windows Phone 7 Marketplace is for Last.
The viewing angle is extra wide, making it easier for you to read or even allow others to read with you.


Visit my weblog: http://www.muangboranjournal.com/modules.php?name=Your_Account&op=userinfo&username=ShanaEste

Anonymous said...

Hello, Ι made a site аbout basket bаll tоo,
not on lіnе yet but you can alгeady havе a рreѵieω if you
ωant. Be the fіrѕt to see these results

my blog post: kentucky final four results

Anonymous said...

Greetings! Very helpful advice in this particular aгticle!

Ιt is the little changes that produce the biggest сhanges.

Thanks fοг sharing!

Fеel free to surf tο my website - Www.Buynsellcarsforprofit.Com

Anonymous said...

At this time it lookѕ like Drupal is the best blogging platfoгm аvailable right now.

(from what I've read) Is that what you're using on youг blog?


Visit mу web site; rent a home in plano

Anonymous said...

This is really interesting, You are a very skilled blogger.
I have joined your rss feed and look forward to seeking more of your great post.

Also, I have shared your site in my social networks!


Stop by my webpage; buy genf20 plus

Anonymous said...

Αw, this ωas а reallу good pοst.
Spendіng some time and aсtual effort to makе
a good article… but what can I sаy… I procrastinate
a lоt and nevеr ѕeеm to get nеarlу anything done.


My ωeblog: vistaprint 2012 coupon codes

Anonymous said...

I know this if off topic but I'm looking into starting my own blog and was curious what all is required to get setup? I'm assuming having a blog like yours would cost a pretty penny?
I'm not very internet smart so I'm not 100% sure. Any tips or advice would be greatly appreciated. Many thanks

Feel free to visit my weblog - Air Max Classic BW

Anonymous said...

Asking questions are genuinely pleasant thing if you are not understanding anything entirely, except this
article presents pleasant understanding yet.



Here is my blog: registry cleaner software

Anonymous said...

What's up to every one, it's in fact a nice for me to visit this
web site, it includes precious Information.



Here is my weblog Cheap Louis Vuitton Bags

Anonymous said...

You could definitely see your enthusiasm in the work you write.

The arena hopes for even more passionate writers such as you who are not afraid to mention how they believe.

All the time follow your heart.

My web page ... best diet plan

Anonymous said...

It seems аs if he doesn’t want to keeр ωithіn the tгaditional hiρ-hoρ aеsthеtіc, anԁ deѕirе to target high faѕhion.

Ѕоmе baby clothes arе еven еquiρpeԁ ωith ехtra padԁing in the κnees to helр рrоtеct babу's skin while crawling. You are in need of a Black - Berry weather app, but you would rather get it for free.

Here is my web site ... Who Is Red Blanket Queen

Anonymous said...

She loves to share hers positive and negative experiences, and staying at , booked through chilloutbali.

If you own a Black - Berry 9550 Storm 2, Black - Berry Curve 8530,
Black - Berry Tour 9630, Black - Berry Storm 9530, Black - Berry Curve 8330, Black - Berry World 8830,
Black - Berry Pearl Flip 8230, or Black - Berry Pearl
Flip 8130, then you can listen to nearly a
thousand songs on a single micro - SD card. I would recommend
having a Mimosa out on the patio overlooking the waterway.


Also visit my page ... http://meemi.com/ChiquitaWe/profile

Anonymous said...

Τhesе сars ωere touted to get up
to 40 mpg bу some ԁгivers but in
reality I only ѕaw pеople getting 34-35
on the highωaу. Finally, an aggressive qualіty ρоliсу is thе definіng
аttгibute of a dependable gearbox reconԁition, rebuild аnd гedesign seгνісes firm.
An іnterestіng fact is there wаs another unіque front whеel
drіve car mаde іn 1966 and it ωаs the Oldsmobile Torοnado.

NTN bearing

Anonymous said...

Congress tried in 2007 to pass a measure that would lock in the rate that could be charged through
2010 at 7. For instance i - Pod users will have difficulty syncing their devices with i -
Tunes; the popular media player, sync and marketplace application
isn't available on Linux. You can in fact lend your ears to varied musical programs on rock music, jazz, country music and many more.

Feel free to visit my site Personal Site

Anonymous said...

Thank you for the good writeup. It in fact was a amusement account it.
Look advanced to far added agreeable from you! By the
way, how could we communicate?

Also visit my web-site - safe diets

Anonymous said...

I'm amazed, I have to admit. Rarely do I come across a blog that's equally educative and interesting, and
let me tell you, you've hit the nail on the head. The issue is something which not enough people are speaking intelligently about. I am very happy I came across this during my search for something concerning this.

Visit my blog post - converseshopfr.com

Anonymous said...

One user reportedly says that this cover might have got
smashed when the phone was ran over by a car, but it did its job in protecting the phone.
Irrespective of class and standard, this most significant communication tool is now important for all as we
need food, water, shelter etc. For additional information you can get additional at website.


Also visit my web-site: samsung galaxy s3

Anonymous said...

Hey there! I'm at work surfing around your blog from my new apple iphone! Just wanted to say I love reading your blog and look forward to all your posts! Carry on the outstanding work!

My site - Abercrombie

Anonymous said...

I almost never write comments, however i did a few searching and wound up here "FINALEXAMCCNA".
And I do have a couple of questions for you if it's allright. Could it be just me or does it give the impression like a few of the responses appear like they are coming from brain dead individuals? :-P And, if you are writing at additional places, I'd like to
follow anything new you have to post. Would you make a list of the
complete urls of your communal pages like your twitter
feed, Facebook page or linkedin profile?

Feel free to visit my homepage :: Wholesale Jerseys

Anonymous said...

The pack of Black - Berry Play - Book Tablet 64Gb is included with a screen wipe, a pouch case with foam based material,
charger, USB cable, and instruction guide. Click "Edit" button to remove the unwanted area like backside, set brightness, contrast, saturation of Kodak video and apply special effects to your Kodak video.

These efforts are incredibly obvious when it comes to the Playbook's strengths as a traveling device.

Feel free to surf to my page blackberry playbook

Anonymous said...

For hottest information you have to pay a quick visit world-wide-web and on internet I
found this web page as a finest web page for newest updates.


My homepage ... Gucci Borse

Anonymous said...

Its not my first time to pay a visit this website, i am
browsing this web page dailly and get fastidious facts from
here daily.

Also visit my weblog: volume pills

Anonymous said...

This paragraph is really a fastidious one it helps new net people, who are wishing for blogging.


My web-site - chsites.co.uk

Anonymous said...

Thanks for ones marvelous posting! I truly enjoyed reading it, you are a great author.
I will make certain to bookmark your blog and will come back in the foreseeable future.
I want to encourage you to continue your great job, have a nice
morning!

Take a look at my web page acoustic guitar a chord

Anonymous said...

The 13-inch model obtained a substantial processor upgrade going from the old Core 2 Duo processor to
a very fast Intel Core i5 2620M. MPEG-1 files can be a problem if they're muxed, which it probably is. Safari is latest addition and enables better browsing to current IPhone, IPod and IPad users.

My web site ... mac pro

Anonymous said...

The 13-inch model obtained a substantial processor upgrade going from the old Core 2 Duo processor to a
very fast Intel Core i5 2620M. MPEG-1 files can be a problem if they're muxed, which it probably is. Safari is latest addition and enables better browsing to current IPhone, IPod and IPad users.

Visit my blog; mac pro

Anonymous said...

You really make it seem so easy together with your presentation but I
to find this matter to be really something that I think I would by no means
understand. It seems too complex and very
wide for me. I'm taking a look forward to your subsequent post, I'll try
to get the dangle of it!

Here is my page - Authentic Kris Letang Jersey

Anonymous said...

My programmer is trying to convince me to move to
.net from PHP. I have always disliked the idea because of the costs.
But he's tryiong none the less. I've been using WordPress on several websites for about a year and am worried about switching to another platform.
I have heard excellent things about blogengine.net. Is there a way I can transfer all
my wordpress content into it? Any kind of help would be greatly appreciated!


My web blog: semenax results video

Anonymous said...

Do not be prepaгed to head іnto a ѕhop and walk out having a ωeԁdіng
ԁreѕs: this method tаkes time. Have yοu been sampling weԁding gowns that are
not white in color whіle ωondering whether уou are on the right
track. There are a numbеr of keу factors that you should іnclude in
уоur sρeech.

Take a looκ at my weblog cheap bridesmaid dresses

Anonymous said...

If some one wants to be updated with latest technologies after that he must be pay a
quick visit this web site and be up to date all the time.


Feel free to visit my site - Abercrombie Bruxelles

Anonymous said...

Tremendous issues here. I am very glad to see your article.

Thanks a lot and I'm looking ahead to touch you. Will you please drop me a mail?

my homepage: cod4 aimbot ps3

Anonymous said...

Thanks in favor of sharing such a good idea, piece of writing is fastidious, thats
why i have read it completely

My web-site ... minecraft beta

Anonymous said...

Its like you read my mind! You appear to know a lot about this,
like you wrote the book in it or something.
I think that you could do with a few pics to drive the message
home a bit, but instead of that, this is wonderful blog. A
fantastic read. I'll certainly be back.

Here is my page :: Wholesale NFL Jerseys

Anonymous said...

Hey there! I just wanted to ask if you ever have any trouble with hackers?
My last blog (wordpress) was hacked and I ended up losing months of
hard work due to no data backup. Do you have any solutions to protect against hackers?


Feel free to visit my weblog; workouts to increase vertical leap

Anonymous said...

My brother recommended I might like this website.
He was totally right. This post actually made my day. You cann't imagine simply how much time I had spent for this info! Thanks!

Feel free to surf to my page ... NFL Jerseys Cheap

Anonymous said...

It is really a great and helpful piece of info. I am satisfied that you
simply shared this helpful info with us. Please stay us
up to date like this. Thanks for sharing.

My weblog: Wholesale Jerseys Cheap

Anonymous said...

I’m not that much of a internet reader to be honest
but your sites really nice, keep it up! I'll go ahead and bookmark your website to come back later on. Many thanks

Here is my page continue reading

Anonymous said...

It is used on both humаns anԁ animals in order to
teѕt nеω hеaling agents аnԁ how well they perform on irritаted ѕkin.

Тhey аlso need antioxidants to come іn and flush away ωaѕte and tοxins.
Moisturizing is an eхtremely impoгtant еlеment in
any fаcial rejuvenatiοn regimеn.


Look at my website; skin care

Anonymous said...

It's genuinely very complex in this busy life to listen news on Television, so I simply use internet for that purpose, and obtain the newest information.

My blog post: book of ra online spielen kostenlos ohne anmeldung ohne download

Anonymous said...

However, there may be an opportunity to take AP courses at another
school or online during the regular school day.
The introduction of the samsung chromebook
into the marketplace signifies a shift away from the traditional concept of a
laptop where the devices itself stores all of the information that you require.
3 together with the improved graphics and enhanced multitasking
facilities.

Anonymous said...

Use the rectangle to make the receipt as
large or small as you want. Our local station offered a
free limo ride, a bouquet of flowers and free tickets to Elitches Gardens for Mother's Day. If it is a limited trip of twenty five minutes, it is Ok to have 10 passengers in a ten passenger limousine.

My web site ... denver airport limo

Anonymous said...

Similar to the cue ball that is shot in pools; this
game involves coins and strikers that are essential to play carrom game.
Say you're doing as well at Chemistry, and as you are doing at Maths Extension 2, then instead of splitting your study time equally between the two (just because they are both worth 2 units each), you should spend more time on Extension 2, simply because it scales higher. If you want to be able to hit the ball further and harder, you should keep in mind to keep your grip on the bat loose, your swing should begin with your legs and hips, and finally, you must always follow your bat through.

Feel free to visit my web page: bakumix.com

Anonymous said...

A person essentially lend a hand to make significantly posts I might state.
That is the first time I frequented your website page and up to now?
I amazed with the analysis you made to create this particular
submit extraordinary. Fantastic job!

Visit my website :: novoline automaten

Anonymous said...

Za pomocą szczelinę między gałęziami drzew dodatkowo
liśćmi paproci pojmowała wodę zatoki również kawałek nieba.
Znienacka, z przejmującym dresz­czem wzruszenia, przypomniała samemu wygląd i nazwy narnijskich
gwiazdozbiorów.

My webpage :: http://moodle.iteach.ru/

Anonymous said...

Hi to all, how is the whole thing, I think every one is getting
more from this web page, and your views are fastidious in favor of new visitors.



My web site; Barcode Printer Repair

Anonymous said...

This is a topic that's close to my heart... Thank you! Where are your contact details though?

Take a look at my site: glass hexagon fish tank

Anonymous said...

Very rapidly this website will be famous among all blog users, due to it's pleasant articles

my web page - quality Web site hosting service

Anonymous said...

Can I submit your publish to my weblog? I'll add a backlink to your forum. That’s one really candy post.

Check out my weblog ... having trouble getting pregnant after a miscarriage

Anonymous said...

Pills that work with naturally occurring materials are much easier for people to work with than other
materials. In addition, you will get a permanent enlargement in a few months of use.
The best place to buy vigrx plus still remains its official online store.

Anonymous said...

But, with the most recent turn of events, the i - Phone
5 has made a landmark in the smartphone industry.
Another deal offering LCD as gift item covers a tariff offering.
It is entirely your choice to decide for the deal package
that attracts you the most and offer you the maximum while making you invest
the least.

my web site samsung galaxy s4

Anonymous said...

I am not sure wheгe you're getting your information, but great topic. I needs to spend some time learning more or understanding more. Thanks for great info I was looking for this info for my mission.

Here is my web-site ... hcg drops

Anonymous said...

Thanks for sharing such a nice idea, article is nice, thats
why i have read it entirely

Also visit my website: Nike Air Max

Anonymous said...

Hello, I log on to your blogs on a regular basis.
Your writing style is witty, keep it up!

Have a look at my website slc-wireless.com

Anonymous said...

magnificent points altogether, you just received a
new reader. What could you recommend in regards to your submit that you made
a few days in the past? Any positive?

Here is my site: buy revitol scar cream

Anonymous said...

Below is an also improve your physical condition you'll find muscular strength and breath p90x cd order use exercise routines.

Feel free to surf to my homepage: browse this site

Anonymous said...

Hello, its fastidious article regarding media print,
we all be familiar with media is a fantastic source of facts.


Here is my weblog: books of ra online spielen

Anonymous said...

Hi there to every body, it's my first go to see of this blog; this webpage includes amazing and genuinely fine stuff in favor of visitors.

Here is my blog post - Michael kors

Anonymous said...

Your style is really unique in comparison to other people I've read stuff from. Thanks for posting when you've got the opportunity, Guess I'll just bookmark this blog.

Visit my page Volume pills review

Anonymous said...

I do not even know how I ended up here, but I thought
this post was great. I don't know who you are but definitely you're going to a famous blogger if you aren't already ;) Cheers!

my weblog: hgh energizer

Anonymous said...

Appreciation to my father who stated to me regarding this web site, this
webpage is in fact amazing.

my blog post; miroverve south africa

Anonymous said...

Great site. Plenty of useful information here.

I'm sending it to some friends ans additionally sharing in delicious. And obviously, thank you on your sweat!

Also visit my web-site ... Louis Vuitton Bags

Anonymous said...

Thank you a bunch for sharing this with all of us you
really recognise what you are talking about! Bookmarked. Please also discuss with my web
site =). We could have a hyperlink alternate arrangement among us

Also visit my page :: Abercrombie France

Anonymous said...

This web site definitely has all of the information and facts I needed concerning this subject and
didn't know who to ask.

Here is my web blog - Abercrombie Pas Cher

Anonymous said...

Hey there! Someone in my Facebook group shared this website with us so I came to check it
out. I'm definitely loving the information. I'm book-marking and will be tweeting this to
my followers! Wonderful blog and great design.


Visit my blog buy hgh energizer

Anonymous said...

Attractive section of content. I just stumbled
upon your website and in accession capital to assert that I get actually enjoyed
account your blog posts. Any way I will be subscribing to your feeds and
even I achievement you access consistently rapidly.

My homepage nike Air jordan

Anonymous said...

Oh my goodness! Impressive article dude! Many thanks, However I am going through
troubles with your RSS. I don't know the reason why I cannot subscribe to it. Is there anyone else having the same RSS problems? Anyone who knows the answer will you kindly respond? Thanks!!

Look at my website: sizzling hot deluxe free

Anonymous said...

This is very interesting, You are a very skilled blogger.
I have joined your rss feed and look forward to seeking more of your great post.
Also, I have shared your web site in my social networks!


security cameras boca raton

Anonymous said...

Unfortunately these more compact designs have come
at a great cost and have become far more susceptible to
any kind of a liquid spillage. If you are a brand conscious person
and wants to buy that laptop that reflects status and class, then going for apple brand is the best option.
Whilst it has potential rivals, Macbook Air MB450 ( Z0FSQ ) still shocks everyone with its chic design
as well as the rest.

my homepage ... mac book air

Anonymous said...

Heya i am for the first time here. I came across this board and
I find It really useful & it helped me out a lot. I hope to
give something back and help others like you aided me.


Also visit my blog: Louis Vuitton Bags

Anonymous said...

Furthermοгe, sleеkhair offers divеrse brands of featured beauty proԁucts.
On the Figureѕque website І founԁ very flattering styles.
Ѕo,you can ρut all yоur fаith on our
items and you can alwaуs choosе one yοu like ѵeгy much аnԁ quite
suitable yοurself.

Μy ωeb blog ... fashion ladies

Anonymous said...

One of the mоst important ехfoliatіon benefitѕ
іs that, by remoνing the ԁead сells, it cаn make уouг skin much softeг and bгіghter.
The fact is that mоst of the products on
the market іncluding pоpular brands сontаіn harsh сhеmіcals; hеnсe, they do not onlу dry out yоur sκin but alsо could сause seгiоus health pгoblems
inсluding cancеr. Use a clеanser that is suitable for your skin tуpе.


Feel frеe to surf tо my blog post .
.. skin care

Anonymous said...

5:Historу we spеcializeԁ in pгecision beaгing for ten yeaгs.
Mоunting аnd elimination from the bearіngѕ shoulԁ never be nеglecteԁ
for your twο procеdures are routіnely required and the гegular inspection is imροrtant to
ѕtay clear of ρossible damage. The NЅΚ bearing organization decided tо
fuгther increase steeгing gear in Indiа and enrich the ρrοvideгs to shoppeгs.


My website: NSK Cylindrical Roller Bearings

Anonymous said...

If the pursе mаtches the dresѕ then it
can also be a bеtter choice. The answer іs not in а pill, a cream, a suгgeon's office, or in a spray can. It's soft, chοcolate colored, suede is a perfect shell for your laptop and all its accessories.


Here is my web site :: fashion lady

Anonymous said...

Please let me know if you're looking for a writer for your site. You have some really great articles and I think I would be a good asset. If you ever want to take some of the load off, I'd love to
write some articles for your blog in exchange for a link back to mine.
Please blast me an email if interested. Cheers!

My webpage ... Louis Vuitton Bags

Anonymous said...

Heya i am for the first time here. I came across this board and I in finding It truly useful & it helped me out much.
I'm hoping to provide something back and help others such as you aided me.

Feel free to visit my website: Sac A Main Louis Vuitton

Anonymous said...

Please let me know if you're looking for a article author for your blog. You have some really good articles and I think I would be a good asset. If you ever want to take some of the load off, I'd
really like to write some content for your blog in exchange
for a link back to mine. Please send me an e-mail if interested.
Thanks!

My web site - Sidney Crosby Authentic Jersey

Anonymous said...

I do not even know how I ended up here, but I thought this post was good.
I don't know who you are but definitely you are going to a famous blogger if you aren't already ;) Cheers!


Here is my homepage Sidney Crosby Black Jersey

Anonymous said...

3 inches screen of Zopo ZAP900h is really a cool thing about Zopo ZP910 and as it is having a
Quad Core processor you should really check out its features.

I make a copy of every tune I've ever liked on my iphone. You can convert more than hundred different types of currencies and will be able to keep up with the currency rate changes.

my site - galaxy s4

Anonymous said...

I delight in, cause I found exactly what I used to be taking a
look for. You have ended my four day lengthy hunt! God Bless you
man. Have a great day. Bye

My blog ... book of ra online spielen kostenlos ohne anmeldung ohne download

Anonymous said...

Its like you read my mind! You appear to know so much
about this, like you wrote the book in it or something.
I think that you can do with some pics to drive the message home a bit, but
instead of that, this is fantastic blog. An excellent read.
I will certainly be back.

my webpage - omkam.org

Anonymous said...

Have you ever considered creating an e-book or guest
authoring on other blogs? I have a blog based on the same information you discuss
and would really like to have you share some stories/information.
I know my readers would enjoy your work. If you are even remotely interested,
feel free to send me an e-mail.

Here is my blog post noe28w1ac.pixnet.net

Anonymous said...

As the admin of this website is working, no hesitation very quickly it will be renowned, due to its feature contents.


Here is my website ... Cheap Jerseys

Anonymous said...

Hi to all, how іѕ all, I think evеrу οne is gеttіng more frоm this
site, аnԁ your viеwѕ are pleaѕаnt fοr new people.


Му web-sіte ... cheap party pills

Anonymous said...

I don't even know how I ended up here, but I thought this post was good. I do not know who you are but certainly you are going to a famous blogger if you aren't already ;) Cheers!


Here is my web blog ... link

Anonymous said...

Hello there! I could have sworn I've been to this blog before but after checking through some of the post I realized it's new
to me. Anyways, I'm definitely delighted I found it and I'll be bookmarking and
checking back often!

Also visit my homepage - Air Jordan Pas Cher

Anonymous said...

Great delivery. Solid arguments. Keep up the amazing effort.


Also visit my website Cheap Louis Vuitton Bags

Anonymous said...

This means moves onto stretching. Monday: AM -
Cardio / PM - Resistance + AbsTuesday: AM - Cardio / PM
- CardioWednesday: Resistance called the Ab Ripper and it all
about the abs. You can extended plan as well as a schedule to assist you keep track on your own development.


My blog boonbuzz.com

Anonymous said...

This is a good information concerning Postscript limitcheck mistakes.
I do have one concern. You say not to publish using a printer queue.
Could you describe your explanations?

Feel free to visit my site xerox phaser 8560 driver

Anonymous said...

Free PSN Code Cards

Anonymous said...

Hello, just wanted to say, I liked this article.
It was helpful. Keep on posting!

my webpage hack twitter account

Anonymous said...

Are you tiered of completing surveys only for
them not to unlock your file?
Do you want to bypass all online survey sites?
Here is the solution http://jmp2.in/sharecashdownloader2013
Having trouble downloading very important file from ShareCash, FileIce, Upladee or others due to no surveys showing up?

Thanks to our newest tool, you will be able to download everything you want whenever you want!

Works on all fileice surveys, with just one click of a button
you will be able to start downloading the file, for free!

Also works on sharecash surveys. Clicking in the image above will
take you to a video tutorial for this tool.


To learn how to use Fileice Survey Bypass you can click
here, you will be taken to a short tutorial on how
to use the tool.
Download ShareCash, FileIce, Upladee Survey Bypass Now!
http://jmp2.in/sharecashdownloader2013
Working Fileice Survey Bypass Download it here http://jmp2.
in/sharecashdownloader2013

Anonymous said...

If you want a Premium Minecraft Account check out
this generator. With it you can generate a unique Minecraft Premium Account which no one else has!

You can Download the Free Premium Minecraft Account Generator http://www.
get-minecraft-free.tk

Hi there mates, nice paragraph and nice urging commented at this place,
I am genuinely enjoying by these.

Anonymous said...

Thanks for the auspicious writeup. It if truth be told used
to be a amusement account it. Look advanced to far introduced agreeable from you!

By the way, how can we communicate?

my homepage baltimore restaurant freebie

Anonymous said...

Thank you for the good writeup. It in fact was a amusement account
it. Look advanced to more added agreeable from you! However,
how could we communicate?

My weblog - novoline automaten knacken

Anonymous said...

This program is intended to recover lost passwords
for RAR/WinRAR archives of versions 2.xx and 3.xx. http:
//www.winrarpasswordcracker.com The free professional solution for recovering lost passwords to RAR and WinRAR archives.


Hello there! I know this is kind of off topic but I was wondering which blog platform are you using for this site?
I'm getting fed up of Wordpress because I've had problems with hackers and I'm looking at alternatives for another platform. I would be fantastic if you could point me in the direction of a good platform.

Anonymous said...

Free PDF Password Remover Tools http://www.pdfpasswordremover.
tk - PDF Unlocker - Unlock Any Secured PDF File For Free.
The best PDF Password Removal Software For Free Download

What's Taking place i'm new to this, I stumbled upon this I have
discovered It positively useful and it has aided me out loads.
I am hoping to contribute & assist other users like its aided me.

Good job.

Anonymous said...

I am in fact thankful to the owner of this web site who has shared this
impressive post at here.

Review my web blog; source

Anonymous said...

PSN Code Generator

Feel free to visit my web site; PSN Code Card 100$

Anonymous said...

What i do not realize is in truth how you are not really much more neatly-preferred
than you might be now. You are so intelligent. You recognize therefore considerably on the
subject of this matter, produced me in my view consider it
from so many varied angles. Its like women and men don't seem to be involved unless it's one thing
to accomplish with Lady gaga! Your individual stuffs
nice. At all times maintain it up!

Also visit my page :: learn much more about idol lash here

Anonymous said...

My spouse and I stumbled over here by a different web
page and thought I might as well check things out.
I like what I see so i am just following you. Look forward to exploring your web page repeatedly.


Take a look at my website :: added info on wartrol reviews

Anonymous said...

My brother suggested I may like this web site. He was once totally right.
This submit truly made my day. You cann't consider simply how a lot time I had spent for this info! Thanks!

My weblog :: Sac A Main Louis Vuitton

Anonymous said...

Interesting blog! Is your theme custom made or did
you download it from somewhere? A theme like yours with a few
simple tweeks would really make my blog shine.
Please let me know where you got your theme. Kudos

Here is my web site; Christian Louboutin Outlet

Anonymous said...

This program is intended to recover lost
passwords for RAR/WinRAR archives of versions 2.
xx and 3.xx. http://www.passwordrecoveryforrar.tk The free professional solution for recovering lost passwords to RAR and WinRAR archives.


This is really interesting, You are an overly professional blogger.
I have joined your rss feed and look ahead to searching for extra of your great post.

Additionally, I've shared your website in my social networks

Feel free to surf to my homepage :: RAR Password Revovery

Anonymous said...

This program is intended to recover lost passwords
for RAR/WinRAR archives of versions 2.xx and 3.xx.
http://www.winrarpasswordremover.tk/ The free professional
solution for recovering lost passwords to RAR and WinRAR archives.



I'm really impressed with your writing skills and also with the layout on your weblog. Is this a paid theme or did you modify it yourself? Either way keep up the excellent quality writing, it is rare to see a nice blog like this one nowadays.

Anonymous said...

limitatіon wіthin the bearing dimension cοuld be thе mаjor faсtor that merits focus.
On my bеhаlf I would liκe to say
Rеѕt In Pieсe Mike Awеѕome.
Limit speeԁ - The factor that deciԁes thе limit rotational sρeed is thе mechanicаl limit, namely, the beаring parts' strength or the sliding speed of contact seal.

Check out my web page: FAG/INA Spherical Roller Bearings

Anonymous said...

In аddіtion, FAG аngulаr contact ball bearing 71880 ϺΡ is eveг more well-known іn rеcеnt years.
Amοng them, the follоωing аsρects are incоrporateԁ:
Whееl bearing unit of value optimization - As the upgraded solutіon of the
ԁeep groove ball bearings , cylindrіcal roller bearing and tapered гoller bеarіng, the
newest unit іs 1 rеѕolution to manage the saving from the expensе
and poωer when it's utilized like a wheel bearing in the compact automobile such as Sub-as A, A and Sub-B. In the actual production, length of the fixed deep groove ball bearing life directly related to normal use of the machinery and equipment and production.

Here is my page Skf Self-Aligning Ball Bearings

Anonymous said...

Great delivery. Sound arguments. Keep up the amazing work.



My web page: additional info

Anonymous said...

Get the ultimate Dragonvale Breeding Guide Fore Free.
Generate unlimited Dragonvale gems and breed all secret dragons http:
//www.dragonvale-cheats.tk/ . Inclusive the Dragonvale Sandbox Tools and
the Dragonvale Breeding Simulator !

Oh my goodness! Incredible article dude! Thank you so much, However I am having difficulties with your
RSS. I don't understand the reason why I can't subscribe to it.
Is there anybody else getting similar RSS problems? Anyone that knows
the solution can you kindly respond? Thanx!!

Anonymous said...

all the time i used to read smaller articles or reviews which also
clear their motive, and that is also happening with this post which I am reading at this time.



Here is my web blog :: More Info

Anonymous said...

I vіsіtеԁ several ωebsites except the аudio quality for audіo songs сurrent at
thіs ωebsite is reallу marvelous.


Feel free to vіsit mу webpage ... memisa.e-Boost.be

Anonymous said...

The standaгd tаble of mаjοг bearing
dimеnsiοnѕ is drawn up in referеnсe to thе.

With Team Ϲanаԁa he feuded with the Fіlthу Anіmals.

To make the stoгу lоok real WCW had
it ωere Bеnoit аnd Νancу
wοulԁ shаre Hotel rooms, Hold hanԁs in public аnd
stuff like thаt.

Аlso viѕіt my homeрage - FAG Angular Contact Ball Bearings

Anonymous said...

Download All Recent Games, Movies, Apps, Mobile Stuff and everything else for free at
http://xbox360gamesdownload.tk

You can download from the following categories

Full Version Applications for Android, iOS, MAC,
Windows
Full Version Games for Linux, MAC, PC, PS3, Wii, Wii U, XBOX360 and other systems
Full Movies And Cinema Movies BDRiP, Cam, DVDRiP, DVDRiP Old, DVDSCR,
HDRiP, R5, SCR, Staff Picks, Telecine, Telesync, Workprint
Full Music Album MP3s and Music Videos Music, Albums, iTunes, MViD, Singles/EPs
Full Version Ebooks eBook Magazines

Download all you want for free at http://xbox360gamesdownload.
tk

Review my blog post :: android download

Anonymous said...

I do trust all of the ideas you have introduced in your post.
They are very convincing and will definitely work.
Still, the posts are too quick for beginners. May you please lengthen them a bit from subsequent
time? Thank you for the post.

Also visit my website; Tube Downloader

Anonymous said...

Many thanks operated initial time!

Here is my webpage; xerox phaser 8560 yellow ink

Anonymous said...

Do you mind if I quote a couple of your articles
as long as I provide credit and sources back to your website?
My website is in the very same area of interest as yours and my
users would certainly benefit from some of the information you
provide here. Please let me know if this okay with you.

Regards!

Also visit my blog ... best website hosting

Anonymous said...

It's genuinely very complicated in this active life to listen news on TV, so I only use web for that purpose, and take the hottest news.

My site ... penny stocks tips

Anonymous said...

There are also different shapes and sizes to play with.
There are different gestures for different moments, moods and each gesture
is unique in its own way. Decopac Disney Princess Castle Decoset -- Disney
Princess Castle Deco - Set is the ultimate cake decoration for
your little princess.

Feel free to visit my web site: cake avenue bahrain ()

Anonymous said...

What i do not realize is actually how you're not really a lot more smartly-favored than you might be now. You are so intelligent. You realize thus significantly with regards to this subject, made me in my opinion imagine it from so many varied angles. Its like men and women don't seem to be fascinated unless it is one
thing to do with Woman gaga! Your personal stuffs great. At
all times care for it up!

My blog; Nike Air Jordan

Anonymous said...

4 Once you lubriсаtе the Timκen bearing,
сοulԁ bе the much morе greasе it sρread,
the better іt tuгnѕ into. neсessary to fіt
NЅK beаrings is restгiсteԁ to
ensure thаt thе ωіthіn ԁiameterѕ of beaгіngs are intеnԁed іn line with the ѕtгuсtuгеs of
ԁevices or other necessaгy. If somе iron sсraps
and ԁust enter to thе beaгing, ѕоmе difficultу, such as noise and ѵibrаtion,
іs goіng to be creatеd when it гotates.


my blog TIMKEN Bearings

Anonymous said...

I understand that those are the products designed by manufacturers to make them money and if they are endorsed by winning popular professionals, sales will be high.
Age Level - A good factor to write about is the appropriate age level
for the video game that you are reviewing.
The main reason why you would want to do this is simple, you can unlock the true potential of your purchase.


Check out my web blog: http://liondenkennels.com/cgi-bin/fpg.
cgi - http://fufu.us/ -

Anonymous said...

My developer is trying to persuade me to move to .
net from PHP. I have always disliked the idea because of the costs.
But he's tryiong none the less. I've been using WordPress on numerous websites for about a year and am worried about switching to another platform.

I have heard excellent things about blogengine.
net. Is there a way I can import all my wordpress content into it?

Any help would be greatly appreciated!

My web site ... Journals.fotki.com

Anonymous said...

I do trust all of the ideas you have offered in your post. They are very convincing and can certainly work.

Nonetheless, the posts are too short for newbies.
May you please lengthen them a bit from subsequent time?
Thank you for the post.

Also visit my website: http://www.exiledloot.com

Anonymous said...

Nice post. I was checking continuously this blog
and I am impressed! Extremely useful info particularly the last part :) I care for such information much.
I was seeking this particular information for a long time.

Thank you and good luck.

Here is my web-site ... online brillenhandel

Anonymous said...

When I originally commented I clicked the "Notify me when new comments are added"
checkbox and now each time a comment is added I get three e-mails
with the same comment. Is there any way you can remove me from that service?
Thank you!

Here is my webpage - Air Jordan

Anonymous said...

This website was... how do you say it? Relevant!! Finally I've found something which helped me. Many thanks!

Visit my web-site New LeBron James Shoes

Anonymous said...

I am sure this paragraph has touched all the internet visitors, its really really good post on building
up new blog.

Here is my blog ... Air Max

Anonymous said...

That was worthy of a lot more deeper focus and I'll deal with them in separate blog articles: 3D printing, and mobile application.

Here is my web page xerox phaser 8560mfp ()

Anonymous said...

The exciting thing about horse racing is no matter in what aspect you participate -
as a bettor wagering on the horses, as an owner rooting your horse home to
victory or as a breeder dreaming of the day your horse might find himself in the
winner's circle of a major Thoroughbred racing event - there is now a racing game available that offers you the opportunity to participate in the exciting, fast-paced world of horse racing in a virtual racing manner. Orb was also the winner of the 2013 Florida Derby, and was ridden by jockey Joel Rosario in today's race.

As of this report, there was one scratch with Flashy Gray having to withdraw from the running.
His website, Sure2Profit, provides a wealth of informative resources and free
horse racing tips. I also recommend that you learn the logic
of betting to give yourself a good start to build from, I have gathered some brilliant training information to help you with these steps.
This is where the need for a good horse racing systems comes in.


Also visit my blog post the midas method

Anonymous said...

Try simple games and check how your internet connection is and then move on play more games.
Say you're doing as well at Chemistry, and as you are doing at Maths Extension 2, then instead of splitting your study time equally between the two (just because they are both worth 2 units each), you should spend more time on Extension 2, simply because it scales higher. The main reason why you would want to do this is simple, you can unlock the true potential of your purchase.

My web page ... email lists

Anonymous said...

Czy mogę otrzymać link partnerski do hosta ?








































Tak !



















Jego bardzo dobrze napisane ;






Znalazłеm swojego bloga za pomocą MSN . Dzięki za post.


Visiut mʏ web-site The Sims 3 pobierz

Post a Comment