final dh05 - 15-3

15
CLASS DH05 HV CÔN G NGH Ệ THÔNG TIN BACKS KHOA HÀ NỘI 1 What two commands can be used to form a new binding if client information does not agree with the DHCP client table? (Choose two.) ipconfig /release ipconfig /all ipconfig /flushdns ipconfig /renew ipconfig 2 What statement describes the filtering of traffic via the use of Stateful Packet Inspection? It recognizes and filters predefined URLs It permits access that is based on the application. It permits access based on IP or MAC addresses. It permits incoming packets that are legitimate responses to requests from internal hosts. It translates an internal address or group of addresses into a public address that is sent across the network. 3 What destination IP address does a DHCP client use to send the initial DHCP Discover packet when looking for a DHCP server? 127.0.0.1 224.0.0.1 255.255.255.255 the IP address of the default gateway 4 Which two statements are true about network applications? (Choose two.) Microsoft Word is an example of a network application. Network applications are accessible from a remote computer. Network applications are installed on a special type of computer that supports only network applications. Network applications are installed on a network server. Network applications are accessible by one computer at a time. 5 A user in a small office is unable to connect to the Internet. The user examines the physical connections to the ISR, a Linksys WRT300N, and notices a solid green LED on the port that is wired to the computer. What does the LED indicate about the current state of the port? The ISR is making adjustments to the port. The device is plugged in and traffic is flowing. The computer is plugged in but no traffic is flowing. The ISR does not detect that the computer is plugged in. Generated by Foxit PDF Creator © Foxit Software http://www.foxitsoftware.com For evaluation only.

Upload: conghuong91

Post on 26-Mar-2015

1.205 views

Category:

Documents


1 download

TRANSCRIPT

Page 1: FINAL DH05 - 15-3

CL

AS

S D

H0

5 –

HV

NG

NG

HỆ

T

NG

T

IN

B

AC

KS

K

HO

A H

À N

ỘI

1 What two commands can be used to form a new binding if client information does not agree with the DHCP client table? (Choose two.)

ipconfig /release

ipconfig /all

ipconfig /flushdns

ipconfig /renew

ipconfig

2 What statement describes the filtering of traffic via the use of Stateful Packet Inspection?

It recognizes and filters predefined URLs

It permits access that is based on the application.

It permits access based on IP or MAC addresses.

It permits incoming packets that are legitimate responses to requests from internal hosts. It translates an internal address or group of addresses into a public address that is sent across the network.

3 What destination IP address does a DHCP client use to send the initial DHCP Discover packet when looking for a DHCP server?

127.0.0.1

224.0.0.1

255.255.255.255

the IP address of the default gateway

4 Which two statements are true about network applications? (Choose two.)

Microsoft Word is an example of a network application.

Network applications are accessible from a remote computer.

Network applications are installed on a special type of computer that supports only network applications.

Network applications are installed on a network server.

Network applications are accessible by one computer at a time.

5

A user in a small office is unable to connect to the Internet. The user examines the physical connections to the ISR, a Linksys WRT300N, and notices a solid green LED on the port that is wired to the computer. What does the LED indicate about the current state of the port?

The ISR is making adjustments to the port.

The device is plugged in and traffic is flowing.

The computer is plugged in but no traffic is flowing.

The ISR does not detect that the computer is plugged in.

Generated by Foxit PDF Creator © Foxit Softwarehttp://www.foxitsoftware.com For evaluation only.

Page 2: FINAL DH05 - 15-3

CL

AS

S D

H0

5 –

HV

NG

NG

HỆ

T

NG

T

IN

B

AC

KS

K

HO

A H

À N

ỘI

6

Refer to the exhibit. A small office uses an ISR to provide connectivity for both wired and wireless computers. One day, a sales person who is using a laptop cannot connect to Server1 through the wireless network. A network technician attempts to determine if the problem is on the wireless or the wired network. The technician pings successfully from the wireless laptop to the default gateway IP address on the ISR. What should be the next troubleshooting step?

Ping from the laptop to PC1.

Ping from Server1 to PC1.

Ping from Server1 to its gateway IP address.

Ping from the laptop to the Ethernet port on the cable modem.

Generated by Foxit PDF Creator © Foxit Softwarehttp://www.foxitsoftware.com For evaluation only.

Page 3: FINAL DH05 - 15-3

CL

AS

S D

H0

5 –

HV

NG

NG

HỆ

T

NG

T

IN

B

AC

KS

K

HO

A H

À N

ỘI

7

Refer to the exhibit. A new switch is connected to an existing switch that has a fully populated MAC table. PC1 requires the destination MAC address of PC3 in order to send a message. Which device or devices will see the ARP sent by PC1?

only PC3

PC2 and PC3

PC3 and PC4

PC2, PC3 and PC4

8

Refer to the exhibit. If H4 sends a message to H1 and the destination MAC address is in the MAC table for both Switch1 and Switch2, which host devices will receive the message?

only H1

hosts H1 and H4

all hosts that are connected to Switch1

all hosts that are connected to Switch1 and Switch2

Generated by Foxit PDF Creator © Foxit Softwarehttp://www.foxitsoftware.com For evaluation only.

Page 4: FINAL DH05 - 15-3

CL

AS

S D

H0

5 –

HV

NG

NG

HỆ

T

NG

T

IN

B

AC

KS

K

HO

A H

À N

ỘI

9 What is the purpose of creating a DMZ during network firewall implementation?

to create a server security zone accessible only to internal clients

to create a dirty zone that allows all inbound and outbound traffic

to allow for a publicly accessible zone without compromising the internal network to specify a higher security level than normally required for the internal production network

10 Which two automatic addressing assignments are supported by DHCP? (Choose two.)

local server address

subnet mask

default gateway address

physical address of the recipient

physical address of the sender

11 What does the term "attenuation" mean in data communication?

loss of signal strength as distance increases

time for a signal to reach its destination

leakage of signals from one cable pair to another

strengthening of a signal by a networking device

12 What component of a personal computer is responsible for the processing of all data?

CPU

RAM

firewall

system bus

operating system

Generated by Foxit PDF Creator © Foxit Softwarehttp://www.foxitsoftware.com For evaluation only.

Page 5: FINAL DH05 - 15-3

CL

AS

S D

H0

5 –

HV

NG

NG

HỆ

T

NG

T

IN

B

AC

KS

K

HO

A H

À N

ỘI

13

Refer to the exhibit. An educational institution needs to connect PC systems that use private IP addressing to the Internet. They have multiple systems that need to access the Internet, but were only able to purchase one public IP address. What should be activated on the Linksys integrated router to achieve this goal?

authentication

DHCP

encryption

firewall

NAT

WEP

14 What is one function of network devices in the distribution layer of a hierarchical network design?

They control the traffic between independent local networks.

They control the traffic between individual hosts.

They control the traffic between multiple companies.

They switch data packets as fast as possible.

15 Because of an increasing number of users, bandwidth per user on a WLAN has decreased to a point where users are complaining about poor performance. What can be done to improve the user experience?

Increase the AP radio signal strength.

Place the AP in a more central location.

Deploy an external omni-directional antenna.

Reduce the number of devices using each channel.

Generated by Foxit PDF Creator © Foxit Softwarehttp://www.foxitsoftware.com For evaluation only.

Page 6: FINAL DH05 - 15-3

CL

AS

S D

H0

5 –

HV

NG

NG

HỆ

T

NG

T

IN

B

AC

KS

K

HO

A H

À N

ỘI

16 What destination port number would be used if a client wished to establish a secure connection to a web server?

21

53

80

443

17 Which two values represent the network number and default mask for the address 209.165.200.225? (Choose two.)

209.0.0.0

209.165.0.0

209.165.200.0

255.0.0.0

255.255.0.0

255.255.255.0

18 Which adapter card would be required for a PC to exchange information with other PCs on a LAN?

NIC

video card

sound card

internal modem

19 What are two characteristics of a MAC address? (Choose two.)

It indicates the physical location of the host within the network.

It is dynamically assigned by a DHCP server.

It is displayed in HEX characters.

It is a physical address.

It is cable-based.

20 After issuing the ipconfig/all command on a host that has DHCP enabled, a network administrator notes that the output contains faulty IP configuration information. What is the first step the administrator should take to resolve this issue?

Replace the NIC in the host.

Change the IP address of the DHCP server.

Use static addressing to assign the correct IP address.

Use the release and renew options supported by the ipconfig command.

Generated by Foxit PDF Creator © Foxit Softwarehttp://www.foxitsoftware.com For evaluation only.

Page 7: FINAL DH05 - 15-3

CL

AS

S D

H0

5 –

HV

NG

NG

HỆ

T

NG

T

IN

B

AC

KS

K

HO

A H

À N

ỘI

21

Which diagram correctly represents the Ethernet frame format?

22 What type of computer would most likely use a docking station?

laptop

server

desktop

mainframe

workstation

23 Which network entity would most likely be configured as both a DHCP client and a DHCP server?

ISP

desktop PC

wireless laptop

PC-based server

integrated services home router

Generated by Foxit PDF Creator © Foxit Softwarehttp://www.foxitsoftware.com For evaluation only.

Page 8: FINAL DH05 - 15-3

CL

AS

S D

H0

5 –

HV

NG

NG

HỆ

T

NG

T

IN

B

AC

KS

K

HO

A H

À N

ỘI

24

Which protocol is used to transfer files among network devices and perform file-management functions?

DNS

FTP

HTML

HTTP

25 Which protocol in its default configuration downloads e-mail messages to the client computer and deletes them from the server?

FTP

POP3

SMTP

IMAP4

26 For devices that do not autosense, which connection requires a crossover cable?

hub port to router port

PC to hub port

PC to switch port

PC port to PC port

27 What is one purpose of using logical addresses in an IP network? They identify a specific NIC on a host device by assigning a permanent logical address.

They are used to determine which host device accepts the frame.

They provide vendor-specific information about the host.

They are used to determine the network that the host is located on.

They are used by switches to make forwarding decisions.

28 Under what circumstance would it be appropriate to use private IP addresses?

for communication between two ISPs

for a network that is directly connected to the Internet

for addresses that are used exclusively within an organization.

for a host with more than one direct connection to the Internet

29 What two pieces of information should a help desk technician document while troubleshooting connectivity issues with an end user? (Choose two.)

the CPU clock speed of the computer

the number of network jacks that are in the room

Generated by Foxit PDF Creator © Foxit Softwarehttp://www.foxitsoftware.com For evaluation only.

Page 9: FINAL DH05 - 15-3

CL

AS

S D

H0

5 –

HV

NG

NG

HỆ

T

NG

T

IN

B

AC

KS

K

HO

A H

À N

ỘI

if the user can ping the default gateway address

if the word processing software is installed correctly

whether the PC uses dynamic or static IP addressing

30

What wireless technology has the ability to communicate with many devices at the same time, makes use of the 2.4 GHz band, and is limited to low-speed, short-range communications?

RF

ISM

infrared

Bluetooth

31 Which two transport layer protocols enable hosts to communicate and transfer data? (Choose two.)

DHCP

ICMP

IP

TCP

UDP

32 Which two IP configuration components does the computer use to identify its subnetwork? (Choose two.)

default gateway

IP address

MAC address

DNS server address

subnet mask

33 As an assignment, a computer science student needs to present data in binary format. What are the two possible values that the student can use? (Choose two.)

0

1

2

A

F

Generated by Foxit PDF Creator © Foxit Softwarehttp://www.foxitsoftware.com For evaluation only.

Page 10: FINAL DH05 - 15-3

CL

AS

S D

H0

5 –

HV

NG

NG

HỆ

T

NG

T

IN

B

AC

KS

K

HO

A H

À N

ỘI

34

Refer to the exhibit. What is the effect of setting the security mode to WEP on the Linksys integrated router?

WEP identifies the wireless LAN.

WEP allows the access point to inform clients of its presence.

WEP translates IP addresses into easy-to-remember domain names.

WEP encrypts data between the wireless client and the access point.

WEP ensures that only authenticated users are allowed access to the WLAN.

WEP translates an internal address or group of addresses into an outside, public address.

35 Which term is associated with logical addressing?

IP addresses

port addresses

physical addresses

Media Access Control addresses

36 What is the default subnet mask for the IP address 128.107.23.10?

255.0.0.0

255.255.0.0

255.255.255.0

255.255.255.255

37 A computer joins the network and announces itself to all hosts on the LAN. What type of message does the computer send out?

broadcast

simulcast

multicast

unicast

Generated by Foxit PDF Creator © Foxit Softwarehttp://www.foxitsoftware.com For evaluation only.

Page 11: FINAL DH05 - 15-3

CL

AS

S D

H0

5 –

HV

NG

NG

HỆ

T

NG

T

IN

B

AC

KS

K

HO

A H

À N

ỘI

38

Refer to the exhibit. The security policy of an organization allows employees to connect to the office intranet from their homes. Which type of security policy is this?

acceptable use

incident handling

network maintenance

remote access

39 A network technician is required to provide access to the Internet for a large company. What is needed to accomplish this task?

ISP

private IP addresses for each host

static IP addresses for each host

DHCP server

Generated by Foxit PDF Creator © Foxit Softwarehttp://www.foxitsoftware.com For evaluation only.

Page 12: FINAL DH05 - 15-3

CL

AS

S D

H0

5 –

HV

NG

NG

HỆ

T

NG

T

IN

B

AC

KS

K

HO

A H

À N

ỘI

40

Refer to the exhibit. Assume that the exhibited output is from a host that is connected to a Linksys integrated router. What is the first thing that should be checked if using a bottom-up troubleshooting approach?

the default gateway on the host

the IP address on the host

the IP address on the router

the link status LED on the front of the router

the subnet mask on the host

41 The area covered by a single AP is known as what?

ad-hoc network

basic service set

independent basic service set

extended service set

distribution system

42 A network designer is working with a small company to determine the network type best suited to the needs of the company. Which two characteristics could the designer use to describe a peer-to-peer network to the owner of the company? (Choose two.)

central administration

easy to install

low cost

scalable

secure

43 What is true about a wireless access point that is equipped with an omnidirectional antenna?

concentrates signal in one direction

typically used in bridging applications

radiates the signal equally in all directions

provides the greatest transmission distance of all antenna types that are used by APs

Generated by Foxit PDF Creator © Foxit Softwarehttp://www.foxitsoftware.com For evaluation only.

Page 13: FINAL DH05 - 15-3

CL

AS

S D

H0

5 –

HV

NG

NG

HỆ

T

NG

T

IN

B

AC

KS

K

HO

A H

À N

ỘI

44 What are two advantages of purchasing a custom-built computer? (Choose two.)

usually a lower cost

no waiting period for assembly

user can specify higher performance components

supports higher-end graphics and gaming applications

fewer components to replace

45

Refer to the exhibit. A PC is requesting a web page from a server on the Internet through a router running NAT. What combination of destination IP address and destination port number will the web server use when replying to this request?

64.100.15.2, 38459

64.100.15.2, 49159

172.16.4.6, 38459

172.16.4.6, 49159

46 What are two examples of peripheral input devices? (Choose two.)

external modem

barcode reader

digital camera

plotter

printer

47 What is the purpose of pop-up blocker software?

It detects and removes spyware.

It detects and removes viruses.

It prevents the display of advertisement windows.

It removes unwanted e-mail.

Generated by Foxit PDF Creator © Foxit Softwarehttp://www.foxitsoftware.com For evaluation only.

Page 14: FINAL DH05 - 15-3

CL

AS

S D

H0

5 –

HV

NG

NG

HỆ

T

NG

T

IN

B

AC

KS

K

HO

A H

À N

ỘI

48 How do ISPs obtain public IP addresses?

They create the addresses themselves.

They obtain the addresses from the home PCs.

They obtain the addresses from the Internet registry.

They obtain the addresses from the RFC.

49 How does a crossover cable make it possible for two "like devices" (for example, two switches) to communicate?

The transmit pins are disconnected and only the receive pins are used.

The transmit pins on one device are connected to the transmit pins on the other device. The receive pins on one device are connected to the receive pins on the other device. The transmit pins on one device are connected to the receive pins on the other device.

50

Refer to the graphic. What is the purpose of assigning a Network Name of Academy?

It identifies the wireless LAN.

It translates IP addresses into easy-to-remember domain names.

It encrypts data between the wireless client and the access point.

It allows access to the AP configuration GUI by name rather than address.

It translates an internal address or group of addresses into an outside, public address.

51 What is the function of the DNS server?

It assigns IP addresses to clients.

It accepts HTTP requests from clients.

It manages the domain that clients are assigned to.

It maps a hostname to a corresponding IP address.

Generated by Foxit PDF Creator © Foxit Softwarehttp://www.foxitsoftware.com For evaluation only.

Page 15: FINAL DH05 - 15-3

CL

AS

S D

H0

5 –

HV

NG

NG

HỆ

T

NG

T

IN

B

AC

KS

K

HO

A H

À N

ỘI

52 Which type of network supports DHCP and DNS services for network users in a network domain?

client/server

peer-to-peer

hierarchical

ad hoc

Generated by Foxit PDF Creator © Foxit Softwarehttp://www.foxitsoftware.com For evaluation only.