|
Question 1 (1 point) You like to associate an ISDN phone number with the next hop router address. You also like to include hostname of the remote router for authentication. Which command can be used to achieve this?
Question 2 (1 point) You are configuring a firewall to support Internet mail ervices. You need to allow inbound and outbound interserver message traffic as well as allowing remote users to access their POP3 mailboxes. What ports should you open on the firewall?
Question 3 (1 point) Which network applications use UDP for communication?(Choose all that apply)
Question 4 (1 point) You are able to ping a router from your workstation but are unable to telnet to it. What is the most likely cause of the problem?
Question 5 (1 point) Static packet filtering can use information found in the TCP flag field to determine if traffic is blocked or passed.
Question 6 (1 point) Which one of the following communications layers resides at the lowest end of the OSI model (i.e. furthest away from the user)?
Question 7 (1 point) How many bits are used to encapsulate a standard (i.e. non-IPv6) IP address?
Question 8 (1 point) Which of the following protocols may be used by a client to obtain an available IP address?
Question 9 (1 point)
Question 10 (1 point) Which of the following are characteristics of the User Datagram Protocol (UDP)?
Question 11 (1 point) At what layer of the TCP stack does FTP operate?
Question 12 (1 point) Which of the following devices operate at the network layer of the TCP/IP protocol stack? (Check TWO that apply)
Question 13 (1 point) Which of the following cable types use some type of copper cabling? (Check ALL that apply)
Question 14 (1 point) Which of the following pieces of information are commonly supplied to clients by a DHCP server?
Question 15 (1 point) Which of the following are routable protocols? (Check THREE that apply)
Question 16 (1 point) What layer of the OSI model contains the Media Access Control (MAC) address of a packet?
Question 17 (1 point) Which of the following are distance-vector routing protocols? (Check ALL applicable)
Question 18 (1 point) Randy is the network administrator for a growing Ethernet LAN that uses the CSMA/CD algorithm to regulate media access. Randy is concerned because a large number of collisions are occurring on the network and would like to create two separate collision domains. Which of the following devices can he use to achieve this objective? (Check THREE)
Question 19 (1 point) What type of DNS server does not contain any zone information but merely retains copies of records used to answer previous queries?
Question 20 (1 point) TCP (Transmission Control Protocol) and IP (Internet Protocol) operate at which of the following layers of the OSI Model. Choose the correct matches.
Question 21 (1 point) When speaking of the Data Link Layer of the OSI model, which of the following fit under this layer. Choose THREE that apply.
Question 22 (1 point) Which of the following would be considered operating at Layer 1 of the OSI model. Choose THREE that apply.
Question 23 (1 point) Which of the following ICMP messages would be involved in an exchange between two machines using the "ping" program? (Check TWO that apply)
Question 24 (1 point) What is the default interval between table updates between devices using the RIP protocol?
Question 25 (1 point) Which routing protocol is commonly used to implement load-balancing solutions?
Question 26 (1 point) What class of IP addresses is reserved for multicast communications?
Question 27 (1 point) What is the default subnet mask for a Class B IP address?
Question 28 (1 point) Your company has been assigned a single Class C IP address which you are currently using to support four Internet-connected hosts at your corporate headquarters.You recently submitted an application to obtain new Class C addresses for your six field offices but the application was rejected.The ISP you requested the addresses from suggested that you use subnetting to distribute addresses from the current Class C address.You do not expect to open any new offices in the near future.What subnet mask should you use to maximize the number of hosts connected to each subnetwork?
Question 29 (1 point) Identify the various types of data that are said to be operating within Layer 6 (Presentation) of the OSI Model. Choose all that apply.
Question 30 (1 point) Match the correct physical entities to the layer at which they operate.
Question 31 (1 point) Connectivity within the main office is provided via a _____.
Question 32 (1 point) Groups of people in a branch office work and connect to each other via a _______ .
Question 33 (1 point) What type of connections will home offices most likely require to access network resources?
Question 34 (1 point) The network access needs of mobile users are based on _____ .
Question 35 (1 point) Why is it important for network designers to understand business and user requirements?
Question 36 (1 point) What criteria should be used to design a network?
Question 37 (1 point) Which of the following functions characterizes the access layer? (Select two of the following.)
Question 38 (1 point) Access to which of these resources would most likely require sending a request to the distribution layer?
Question 39 (1 point) Which of these functions is performed by the distribution layer in the campus environment?
Question 40 (1 point) Which of the following IP addresses might be assigned to a web server? (Check TWO)
Question 41 (1 point) What IEEE standard provides guidance for wireless networking?
Question 42 (1 point) What is the maximum speed supported by 100baseT Ethernet?
Question 43 (1 point) Which of the following protocols are not connection-oriented? (Select TWO)
Question 44 (1 point) Which of the following OSI layers is responsible for coordinating communication between different systems?
Question 45 (1 point) In which of the following OSI layers are TCP, UDP and SPX found?
Question 46 (1 point) A device used to extend the segment beyond the maximum allowable length is a?
Question 47 (1 point) Repeaters and Hubs propagate?
Question 48 (1 point) What is the loop back address used for?
Question 49 (1 point) In a TCP/IP environment, end stations communicate with? Choose two.
Question 50 (1 point) When you hold a RJ-45 cable ends side by side and you see that pins are in the same order, you are actually holding a ________ cable.
Question 51 (1 point) The _______ layer lies between the session layer and the application layer.
Question 52 (1 point) The application, presentation, and session layers in the OSI model correspond to the _______ layer in the TCP/IP protocol suite.
Question 53 (1 point) The Ethernet access method _______.
Question 54 (1 point) The "T" in 10Base-T stands for ________.
Question 55 (1 point) Store and forward are terms used to describe _______ switching.
Question 56 (1 point) _______ switching assumes that the data rate in both directions is the same.
Question 57 (1 point) _______ is not an element of reliable delivery in the transport layer.
Question 58 (1 point) The ______ layer is responsible for source-to-destination delivery of a packet of a message.
Question 59 (1 point) The ______ layer is responsible for interoperability between two systems using different encording methods.
Question 60 (1 point) Email is a service handled by the ______ layer.
Question 61 (1 point) TCP/IP has _____ transport protocols.
Question 62 (1 point) As the data packet moves from the _______ layer up to the _______ layer, headers and trailer are removed.
Question 63 (1 point) The data link layer adds _______ addresses to the frame to identify the sender and receiver.
Question 64 (1 point) A _______ address identifies a process running on a computer.
Question 65 (1 point) What OSI layer is responsible for converting bits into frames?
Question 66 (1 point) You are a junior network associate. Your network is running on Cisco gears. How do you implement Frame relay dynamic mapping?
Question 67 (1 point) You are a junior network associate. Your network is running on Cisco gears. Which of the following OSI layers is responsible for windowing?
Question 68 (1 point) Subnets improve the ___ of network addressing?
Question 69 (1 point) In networking terms, MAC means?
Question 70 (1 point) What is the IEEE specification for Token Ring?
Question 71 (1 point) The number of data packets a sender is allowed to transmit without having received an acknowledgment is known as a?
Question 72 (1 point) You are a Wireless Network Administrator. You need to build and maintain several wireless networks. Certain advanced configuration tasks have to be performed as well. In the US, regulations on the dwell time specify limits in unit of:
Question 73 (1 point) Two ports are typically associated with email and related services. What are they?(Choose two)
Question 74 (1 point) The most common complaint against email is:
Question 75 (1 point) What is the Cisco's Primary LAN Switching Method?
Question 76 (1 point) What is the MAC address that is sent during an Ethernet Broadcast?
Question 77 (1 point) VLAN identification methods used by Cisco Switches to identify which frame belongs to which VLAN are (Choose 2 answers)
Question 78 (1 point) Dedicated bandwidth that Frame Relay Switch agrees to transfer data at any given time is known as
Question 79 (1 point) When frame relay network recognizes congestion in the cloud the switch will set ____________________________ in a Frame Relay Packet Header
Question 80 (1 point) You had configured Cisco Router for Dial-on-Demand Routing link. How do you test the connectivity?
Question 81 (1 point) You are a new Cisco network technician. You need to deploy Cisco gears in your enterprise network. Legacy network such as AppleTalk is involved. AppleTalk is a proprietary network. True or not?
Question 82 (1 point) You are a Wireless Network Administrator. You need to build and maintain several wireless networks. Certain advanced configuration tasks have to be performed as well. You are investigating the 802.11g wireless local area network specification. Which of the following are correct descriptions of this specification (Choose THREE that apply)?
Question 83 (1 point) You are a Wireless Network Administrator. You need to build and maintain several wireless networks. Certain advanced configuration tasks have to be performed as well. You plan to deploy products of the 802.11b standard. In the US, how many channels are available for actual usage with the 802.11b standard?
Question 84 (1 point) You are a Wireless Network Administrator. You need to build and maintain several wireless networks. Certain advanced configuration tasks have to be performed as well. You need to determine the number and location of access points necessary to provide adequate coverage and performance for your users. Which of the following is needed?
Question 85 (1 point) You are a Wireless Network Administrator. You need to build and maintain several wireless networks. Certain advanced configuration tasks have to be performed as well. Which of the following are NOT the factors that plague wireless LAN deployments (choose ALL that apply):
Question 86 (1 point) You are a Wireless Network Administrator. You need to build and maintain several wireless networks. Certain advanced configuration tasks have to be performed as well. Which of the following produces the MOST significant RF interference to your wireless network?
Question 87 (1 point) You are a Wireless Network Administrator. You need to build and maintain several wireless networks. Certain advanced configuration tasks have to be performed as well. You want to evaluate a HomeRF solution. HomeRF solution can cover what ranges (choose ALL that apply):
Question 88 (1 point) You are a Wireless Network Administrator. You need to build and maintain several wireless networks. Certain advanced configuration tasks have to be performed as well. You want to evaluate a HomeRF solution. HomeRF operates based on which of the following technologies (Choose all that apply)?
Question 89 (1 point) You are a Wireless Network Administrator. You need to build and maintain several wireless networks. Certain advanced configuration tasks have to be performed as well. You are considering the deployment of SWAP. SWAP can operate in which of the following bands?
Question 90 (1 point) You are a Wireless Network Administrator. You need to build and maintain several wireless networks. Certain advanced configuration tasks have to be performed as well. You are considering the deployment of SWAP. SWAP is a specification that operates at 50 hops per:
Question 91 (1 point) You are a Wireless Network Administrator. You need to build and maintain several wireless networks. Certain advanced configuration tasks have to be performed as well. You are considering the deployment of 802.11a wireless network. In theory, at the max 802.11a can provide up to how many Mbps of throughout in the 5GHz band?
Question 92 (1 point) Name the three types of backups.
Question 93 (1 point) Controls are placed on what functions Java can activate on a system. What are these controls called?
Question 94 (1 point) PGP is used to ________ _________.(Choose two)
Question 95 (1 point) Hubs operate at which OSI layer?
Question 96 (1 point) Which OSI layer do switches operate at?
Question 97 (1 point) Routers provide _______ segmentation.
Question 98 (1 point) What is the most widely implemented type of wireless Ethernet?
Question 99 (1 point) DES is what type of encryption?
Question 100 (1 point) Mandatory Access Control is considered_________ .
|
|