Huruf D Pictures, Images and Photos

Selasa, 08 Maret 2011

IT1 chapter8-ver.4.1

1.Which utility can be used to determine end-to-end connectivity between source and destination?
Ipconfig
Nbstat
Netstat
*Ping

2.A network administrator wants to connect a new building to an existing network using cable that can provide a secure connection and is not susceptible to electrical interference. The new building is approximately 800 meters away from the existing network. Which cable type should the administrator choose?
Category 5 STP
Category 6 UTP
coaxial
*fiber optic

3.Which three factors are reasons to choose a client/server model for a network instead of peer-to-peer? (Choose three.)
The network is small with less than eight users.
*The company network requires secure access to confidential information.
*The users need a central database to store inventory and sales information.
Each user understands how to safely share files across a network.
*The data gathered by the employees is critical and should be backed up on a regular basis.
All employees passed a strict background check as part of the corporate hiring practices.

4.What is the purpose of the device that uses the 198.133.219.43 address?
It is the device that is used to assign an IP address to the computer.
*It is the device that translates domain names to IP addresses.
It is the device that responds to requests for web pages by using the HTTP protocol.
It is the device that connects a particular computer to other networks including the Internet.

5.Which procedure is normally performed when connecting a computer to an Ethernet network for the first time?
Manually assign an IP address.
Configure the NIC for a MAC address.
*Attach a cable that has an RJ-45 connector.
Configure the NIC for a specific network protocol.

6.Which protocol is used to automatically configure network devices?
*DHCP
IPCONFIG
DNS
FTP

7.Which two factors are used to determine the different categories of UTP cabling? (Choose two.)
The distance a signal can travel through the cable.
*The number of twists in the wires inside the cable.
*The number of wires inside the cable.
The type of shielding used inside the cable.
The type of connectors required to terminate the cable.

8.Which protocol lacks support for encryption and can be initiated from a computer command prompt?
HTTP
HTTPS
POP3
SSH
*Telnet

9.Which software must be installed and working correctly on a computer to successfully enable a VPN connection to a remote site?
VPN gateway
web browser
e-mail client
*VPN client

10.Which two characteristics describe Ethernet technology? (Choose two.)
*supported by IEEE 802.3 standards
supported by IEEE 802.5 standards
typically uses an average of 16 Mb/s for data transfer rates
*uses a bus logical topology
uses a ring topology


11.Which wireless IEEE standard operates in a radio frequency of 2.4 GHz and supports a maximum bandwidth of 54 Mbps?
802.11a
802.11b
*802.11g
802.11z

12.Which broadband technology would be recommended for a business that requires workers to access the Internet while visiting customers at many different locations?
ADSL
*cellular
ISDN
VPN

13.Which layer of the OSI model is primarily concerned with accessing the physical media and physical addressing?
Application
*Data Link
Network
Physical
Presentation

14.What is the maximum range a data signal can travel through a 1000BASE-T network segment?
3280 ft (1000 m)
1640 ft (500 m)
984 ft (300 m)
607 ft (185 m)
*328 ft (100 m)

15.Which topology has only one central point of failure, is easy to troubleshoot, and is most commonly implemented in newer networks?
bus
mesh
ring
*star

16.Which term describes the process of adding headers to data as it moves through the layers of the OSI model?
demultiplexing
*encapsulation
encoding
encryption
segmentation

17.Which technique is used to ensure that data from one computer does not collide with data from any other computer in a CSMA/CD network?
Computers receive a token that allows them to send a message. They then pass the token to the next computer.
*Computers listen to the network for clearance to send data.
Each computer that is connected to the network transmits data on a different frequency.
Each time slot on the network is allocated to a different computer. A computer can only transmit in the allocated time slots.

18.Which device enables computers to be attached to a network without segmenting the network?
bridge
*hub
router
switch

19.Refer to the exhibit. Which type of network cable is shown?
10BASE5
10BASE-T
Category 5 UTP
Category 6 STP
*fiber-optic

20.Which network topology will allow all devices to continue to communicate with each other should a network cable fail?
bus
extended star
*mesh
ring
star

21.Which Windows XP command displays the route taken by packets crossing an IP network?
iproute
netview
nslookup
ping
*tracert

22.A company is investigating the use of an ISDN service to act as backup for the ASDL service they use to communicate with branch offices. They discover that the ISDN BRI service uses two 64 kb/s B channels. Which function do the B channels perform?
perform basic addressing
pass control information
*carry the data stream
broadcast timing data

23.Which digital technology provides an upstream speed that is typically less than the downstream speed?
*ADSL
HDSL
IDSL
SDSL

24.A technician is configuring a computer to send print jobs to a network printer. When the technician sends a test print to the printer, the print job fails. The technician tries to ping the network printer, but the technician suddenly remembers a change in Windows that is hampering the troubleshooting process. What change might this be?
*The Windows firewall stops pings.
The Windows firewall has network printing disabled by default.
The computer requires a special driver in order to perform network printing.
The network interface card requires a special Windows password to perform network printing.

25.A student brings a laptop to a school that has wireless access. The laptop is not connecting to the school network. What is the first thing that the student should check?
the laptop battery level
the IP address that is assigned to the laptop
the power level of the wireless antenna
*the available wireless networks within range
the distance from the school-owned wireless device


26.What is one difference between a network domain and a workgroup?
A workgroup makes use of a controller.
*A domain provides centralized control.
A domain is centralized to a specific location.
A workgroup is easier to manage when many computers are used.

27.A college student is confused. To use online banking, the student types https://www.banking.com, whereas to access the college web page, the student types http://www.college.edu. Why would the two institutions use different protocols?
*The bank encrypts the web page information that is sent and received.
The college uses the .edu domain, which requires the use of HTTP.
The bank always requires a password to see information on the banking web site.
The college must ensure that student records are secure.

28.Which three protocols are associated with e-mail? (Choose three.)
FTP
HTTP
HTTPS
*IMAP
*POP3
*SMTP




29.Which Cisco team can be contacted to help when Cisco equipment is suspected to be counterfeit?
Cisco Internal Contact Team
*Cisco Brand Protection Team
Cisco Sales Team
Cisco Auditing team
Cisco Investigation Team



30.When purchasing Cisco components for a network installation, what are three warning signs that the equipment may be counterfeit? (Choose three.)
*The price is much less than expected.
The sale includes equipment and Cisco support.
The equipment is new and in the original shipping container.
*The equipment appears to be performing at a substandard level.
The equipment was purchased from a Cisco Channel partner.
*The packaging appears to be substandard compared to the packaging of other Cisco purchases.

Tidak ada komentar:

Posting Komentar