1) What is the reason that electronic data is represented as bits in computer processing and data communication? a) Bits are the format best understood by people. b) Bits are more secure and make transmissions harder to hack. c) Bits are more efficient for storing data. d) Bits decrease the number of connections that need to be made. 2) Which term is used to describe a network device that relies on another device to obtain information? a) web server b) console c) server d) client 3) What is a role of an intermediary device on a network? a) functions as the primary source of information for end devices b) determines the path and directs data along the way to its final destination c) runs applications that support collaboration for business d) forms the interface between the human network and the underlying communication network 4) Which type of network component can be used to share an attached printer to the network? a) personal computer b) peripheral c) access point d) network media 5) Which two devices are shared peripherals? (Choose two.) a) tablet b) laptop c) scanner d) printer e) touch-pad with digital stylus 6) When troubleshooting network problems, where would a network administrator find the configuration information, such as the computer names and the IP addresses that are used? a) physical topology diagram b) DHCP server c) DNS server d) logical topology diagram 7) When is a straight-through cable used in a network? a) when connecting a host to another host b) when connecting a host to a router c) when connecting a host to a switch d) when connecting a router to another router 8) Which organization publishes and manages the Request for Comments (RFC) documents? a) IEEE b) ISO c) IETF d) TIA/EIA 9) What is indicated by the 100 in the 100BASE-T standard? a) meters b) feet c) megabits per second d) twists per meter 10) What is the default subnet mask for an IP address of 198.133.219.4? a) 255.0.0.0 b) 255.255.0.0 c) 255.255.255.0 d) 255.255.255.255 11) What are three characteristics of multicast transmission? (Choose three.) a) The source address of a multicast transmission is in the range of 224.0.0.0 to 224.0.0.255. b) A single packet can be sent to a group of hosts. c) Multicast transmission can be used by routers to exchange routing information. d) Routers will not forward multicast addresses in the range of 224.0.0.0 to 224.0.0.255. e) Computers use multicast transmission to request IPv4 addresses. f) Multicast messages map lower layer addresses to upper layer addresses. 12) A client device on an Ethernet segment needs an IP address in order to communicate on the network. A DHCP server with IP address 192.168.1.1 has been configured and enabled on the network. How will a client device obtain a usable IP address for this network? a) Send a DHCPREQUEST packet to IP address 255.255.255.255. b) Send a DHCPACK packet to the default gateway address. c) Send a DHCPDISCOVER message to physical address FF-FF-FF-FF-FF-FF. d) Use a statically configured IP address from the pool of IP addresses that is offered by the DHCP server. 13) Which number grouping is a valid IPv6 address? a) 1234:1230::1238::1299:1000:: b) 12aa::1298:1200::129b c) 1b10::1100::2001::2900::ab11::1102::0000::2900 d) 2001:0db8:3c55:0015:1010:0000:abcd:ff13 14) Which protocol operates at the transport layer of the TCP/IP model and ensures reliable delivery of IP packets? a) HTTP b) IP c) UDP d) TCP 15) Which term is used to describe transport layer ports in the range of 1 through 1023? a) private b) well-known c) registered d) source 16) What is a function of a DNS server? a) It determines the IP address that is associated with a specific host domain name. b) It maps IP addresses to physical addresses. c) It translates private IP addresses to public IP addresses. d) It assigns logical address information to host computers. 17) What are two benefits of wireless networks over wired networks? (Choose two.) a) anytime, anywhere connectivity b) immunity to interference c) increased security d) mobility e) speed 18) Which type of network is covered by the IEEE 802.11 standards? a) Internet b) WAN c) Wi-Fi d) Ethernet 19) When a wireless router is being configured for the first time, what type of wired connection is used? a) console cable b) Ethernet patch cable c) modem cable d) telephone cable 20) Which is an example of social engineering? a) a computer displaying unauthorized pop-ups and adware b) the infection of a computer by a virus carried by a Trojan c) an anonymous programmer directing a DDoS attack on a data center d) an unidentified person claiming to be a technician collecting user information from employees 21) Which malicious program appears as a legitimate program to deceive the victim, but is in fact an attack tool that can contain malicious code? a) Trojan horse b) worm c) virus d) spyware 22) A file is downloaded from the Internet. After the user opens the downloaded file, the hard drive crashes and all information on the computer is lost. What type of attack occurred? a) worm b) virus c) Trojan horse d) denial of service 23) What is required for a network administrator to perform out-of-band management tasks on a Cisco device? a) a valid IP address configured on VLAN 1 b) SSH enabled and functional on the device c) an active network connection available to the device d) a computer directly connected to the console port of the device 24) What are two options for expanding storage space on a Cisco router? (Choose two.) a) RAM b) ROM c) NVRAM d) flash slots e) USB ports 25) If the default gateway is configured incorrectly on a host, what is the impact on communications? a) The host is unable to communicate on the local network. b) The host is unable to communicate with hosts on remote networks. c) The host is unable to communicate with hosts on both the local and remote networks. d) The host cannot get an IP address from the DHCP server. 26) A user calls the help desk to report a workstation problem. Which three questions would produce the most helpful information for troubleshooting? (Choose three.) a) If you received an error message, what was it? b) What changes have you made to your workstation? c) Do you have the warranty for your workstation? d) What operating system version is running on your workstation? e) Have you used a network monitoring tool on your workstation? f) Have you performed a backup recently? 27) Which command can be used to verify connectivity between two host devices? a) ipconfig b) ping c) netstat d) nslookup 28) Users are complaining that they are unable to browse certain websites on the Internet. An administrator can successfully ping a web server via its IP address, but cannot browse to the domain name of the website. Which troubleshooting tool would be most useful in determining where the problem is? a) netstat b) tracert c) nslookup d) ipconfig 29) Which utility can be used to view a list of open TCP connections on Linux or Windows systems? a) Tracert b) Ping c) Netstat d) Ipconfig 30) Refer to the exhibit. The command output is from a wireless DHCP host connected to a Linksys integrated router. What can be determined from the output? a) There is a DNS problem. b) A new wireless NIC needs to be installed. c) The DHCP configuration needs to be checked. d) The connection to the SSID needs to be verified. 31) Fill in the blank. When a Cisco device is powered on, the _ _ _ _ begins to test the device and determine if it is functioning properly. a) POST b) BIOS c) WIN.INI d) Autoexec.bat e) Config.sys 32) Which of the following is an example of - The attacker gathers personal information from a computer without permission. a) Phishing b) Pretexting c) Spamming d) Spyware 33) What does this describe? - The attacker uses voice mail to persuade a victim to call a legitimate looking telephone number. a) Spamming b) Phishing c) Pretexting d) Blogging 34) Which of the following is an example of -The attacker uses invented scenarios to gain the trust of victim. a) Shark Phishing b) Phishing c) Pretexting d) Texting 35) What is the following?- An attacker pretends to represent a legitimate outside organization. a) Spamming b) Pretexting c) Phishing d) Blogging

Список переможців

Візуальний стиль

Параметри

Обрати інший шаблон

Відновити автоматично збережене: ?