Uploaded by mick-rls mck

Product Questions

advertisement
__________________________________________________________________________________
______________
Product Questions: 176
Version: 11.0
Question 1
One advantage of dynamic routng is that it:
A. Automatcaaay maintains routng tabaes.
B. Limits trafc derived from routng protocoas.
C. Reduces broadcast trafc.
D. Automatcaaay enabaes DHCP.
Aoswern A
Question 2
Which of the foaaowing represents a Media Access Controa (MAC) address?
A. GV:ZC:KK:DK:FZ:CA
B. 255.255.255.0
C. 05:35:AB:6E:Aa:25
D. 127.0.0.1
Aoswern C
Question 3
Connectng to a private network address from a pubaic network requires:
A. Network address transaaton (NAT).
B. Dynamic Host Confguraton Protocoa (DHCP).
C. Network Access Protecton (NAP).
D. Dynamic domain name system (DDNS).
Aoswern A
Question 4
A network device that associates a Media Access Controa (MAC) address with a port is a:
A. DSL modem
B. Hub
C. Router
D. Switch
Aoswern D
Page No | 3
__________________________________________________________________________________
______________
Question 5
A Layer 2 device that connects muatpae computers within a network is a:
A. Repeater
B. Switch
C. Router
D. Packet
Aoswern B
Question 6
A cabae that meets the a000BaseT standard has a maximum aength of:
A. 100 m
B. 250 m
C. 500 m
D. 1,000 m
Aoswern A
Question 7
A router's statc route is set by the:
A. Adjacent network
B. Next upstream router
C. Network administrator
D. Routng protocoa
Aoswern C
Question 8
Which setng is used to determine the Domain Name System (DNS) setngs on a caient computer?
A. TELNET
B. NSLOOKUP
C. PATHPING
D. NETSTAT
Aoswern B
Question 9
The defauat subnet mask for a Caass B network is:
Page No | 4
__________________________________________________________________________________
______________
A. 0.0.0.255
B. 0.0.255.255
C. 255.0.0.0
D. 255.255.0.0
Aoswern D
Question 10
The defauat port used for SMTP is:
A. 23
B. 25
C. 80
D. 8080
Aoswern B
Question 11
The ping tooa is used to: (Choose two.)
A. Determine the network porton of a host address.
B. Seaf-test a host's own network interface.
C. Determine whether a host is reachabae.
D. Manage a host's session when UDP is used.
Aoswern B, C
Question 12
Which of the foaaowing are features of DHCP? (Choose two.)
A. IP address resoauton to canonicaa names
B. Secure sheaa connectons
C. Address reservaton
D. Network fae transfer
E. IP address excausion
Aoswern C, E
Question 13
The command-aine tooa used to aist a host's actve incoming connectons is:
A. NETSTAT
B. IPCONFIG
C. NSLOOKUP
Page No | 5
__________________________________________________________________________________
______________
D. PING
Aoswern A
Question 14
A computer that has an IP address of 169.254.0.1 cannot access the network.
Which of the foaaowing services shouad you confrm is avaiaabae?
A. WINS
B. DNS
C. DHCP
D. TFTP
Aoswern C
Question 15
Which network does the IP address 220.100.100.100 beaong to?
A. 220.100.100.0/24
B. 220.100.100.1/24
C. 255.255.255.0/24
D. 255.255.255.1/24
Aoswern A
Question 16
Which subnet mask is vaaid?
A. 255.255.255.240
B. 255.255.255.228
C. 255.255.255.164
D. 255.255.255.245
Aoswern A
Question 17
A service that resoaves NetBIOS names to IP addresses is:
A. Domain Name Service (DNS).
B. Internet Service Provider (ISP).
C. Address Resoauton Protocoa (ARP).
D. Windows Internet Name Service (WINS).
Aoswern D
Page No | 6
__________________________________________________________________________________
______________
Question 18
What type of DNS record maps host names to addresses?
A. Maia Exchanger (MX) DNS record
B. Service (SRV) DNS record
C. Host (A) DNS record
D. Canonicaa (CNAME) DNS record
Aoswern C
Question 19
Teredo tunneaing is a protocoa that:
A. Transaates Internet Protocoa version 4 (IPv4) to Internet Protocoa version 6 (IPv6).
B. Aaaows IPv6 connectvity through IPv4 devices.
C. Provides VPN security.
D. Dynamicaaay aaaocates IPv6 addresses.
Aoswern B
Question 20
What is the defauat subnet mask for a Caass C Internet network?
A. 255.255.255.252
B. 255.255.255.240
C. 255.255.255.192
D. 255.255.255.0
Aoswern D
Question 21
The defauat port used for teanet is:
A. 23
B. 25
C. 80
D. 8080
Aoswern A
Question 22
When a caient's DHCP-issued address expires, the caient wiaa:
Page No | 7
__________________________________________________________________________________
______________
A. Seaect a new address and request approvaa from the DHCP server.
B. Require manuaa confguraton with a statc IP address.
C. Atempt to obtain a new address by broadcastng.
D. Contnue to use the address unta it is notfed to stop.
Aoswern C
Question 23
You ping a server by using fuaay quaaifed domain name (FQDN) and do not receive a response. You
then ping the same
server by using its IP address and receive a response.
Why do you receive a response on the second atempt but not on the frst atempt?
A. PING is improperay confgured.
B. The DNS is not resoaving.
C. The DHCP server is ofine.
D. NSLOOKUP is stopped.
Aoswern B
Question 24
A Media Access Controa (MAC) address identfes a/an:
A. UPnP device.
B. Locaa broadcast domain.
C. Network interface card (NIC).
D. Locaa area network (LAN).
Aoswern C
Question 25
Two companies want to share data by using the Internet.
Which type of network provides the soauton?
A. Ethernet
B. Intranet
C. Extranet
D. Perimeter
Aoswern C
Question 26
VPNs are impaemented to provide:
A. A secure connecton within a private network.
Page No | 8
__________________________________________________________________________________
______________
B. A secure connecton through pubaic networks.
C. Additonaa encrypton by using IPSec.
D. Additonaa security for seaected computers.
Aoswern B
Question 27
If an 802.aag Internet connecton has connectvity probaems, what may be the cause?
A. A cordaess phone
B. A ceaauaar phone
C. Incandescent aights
D. Eaectromagnetc interference (EMI)
Aoswern D
Question 28
Which of these factors has the biggest impact on data transmission speed in a wireaess network?
A. The access method used for the network
B. The transmission standard of the equipment used
C. The use of strong encrypton for transmissions
D. The transmission watage ratng used on the NIC
Aoswern B
Question 29
Which of the foaaowing uses a tunneaing protocoa?
A. Internet
B. VPN
C. Extranet
D. VLAN
Aoswern B
Question 30
A network that separates an organizaton's private network from a pubaic network is a/an:
A. Firewaaa
B. Extranet
C. Perimeter
D. Internet
Page No | 9
__________________________________________________________________________________
______________
Aoswern C
Question 31
Which type of network is most vuanerabae to intrusion?
A. Diaa-up
B. Wireaess
C. Broadband
D. Leased aine
Aoswern B
Question 32
Atenuaton in a wireaess network signaa is a resuat of:
A. Number of wireaess nodes connected.
B. Distance from the access point.
C. Interference from ceaauaar phones.
D. Encrypton of the signaa.
Aoswern B
Question 33
Which type of network covers the broadest area?
A. WAN
B. CAN
C. LAN
D. PAN
Aoswern A
Question 34
In aocaa area network (LAN) topoaogies, the primary media access methods are: (Choose two.)
A. Contenton
B. Negotaton
C. Kerberos
D. Token passing
Aoswern A, D
Question 35
Page No | 10
__________________________________________________________________________________
______________
In a physicaa star topoaogy, the centraa device is referred to as a:
A. Bridge
B. Server
C. segmenter
D. Hub
Aoswern D
Question 36
Which technoaogy can you use to extend an internaa network across shared or pubaic networks?
A. VLAN
B. Microsof ASP-NET
C. Microsof .NET Framework
D. VPN
Aoswern D
Question 37
Which two are pubaished IEEE 802.11 wireaess transmission standards? (Choose two.)
A. 802.1 If
B. 802.11g
C. 802.11k
D. 802.11m
E. 802.11n
Aoswern B, E
Question 38
What happens when an 802.11b node starts broadcastng within the range of an 802.aag access
point?
A. The access point wiaa transmit, but the node wiaa be unabae to receive.
B. A connecton wiaa be estabaished,
C. Both the node and the access point wiaa be unabae to transmit.
D. The node wiaa transmit, but the access point wiaa be unabae to receive.
Aoswern B
Question 39
Which technoaogy provides the highest bit rate?
A. T1
B. Ea
Page No | 11
__________________________________________________________________________________
______________
C. DS3
D. ISDN
Aoswern C
Question 40
A VPN is a/an:
A. Encrypted connecton across the Internet.
B. Virtuaa network within your aocaa area network (LAN).
C. Communicaton tunnea between VLANs.
D. Personaa network for your use onay.
Aoswern A
Question 41
Which of the foaaowing determines the media access method that is used in a network?
A. Number of hosts connected to the network
B. Number of domain servers on the segment
C. Maximum speed of the media
D. Topoaogy and protocoas
Aoswern D
Question 42
Which wireaess authentcaton method provides the highest aevea of security?
A. Wired Equivaaency Privacy (WEP)
B. IEEE 802.aan
C. WI-FI Protected Access (WPA)
D. IEEE 802.11a
Aoswern C
Question 43
The topoaogy of a aocaa area network (LAN) is defned by the:
A. Number of devices to connect.
B. Physicaa and aogicaa characteristcs.
C. Distance between workstatons.
D. Type of cabae being used.
Aoswern B
Page No | 12
__________________________________________________________________________________
______________
Question 44
The maximum throughput of an 802.aag network is:
A. 2.4 GHz.
B. 54 GHz.
C. 2.4 Mbps
D. 54 Mbps.
Aoswern D
Question 45
A node within a aocaa area network (LAN) must have a network interface device and a:
A. Network account
B. Tabae of aaa network nodes
C. Host address
D. Resource to share
Aoswern C
Question 46
Which of the foaaowing is a Layer 2 WAN protocoa?
A. Point-to-Point Protocoa (PPP)
B. Simpae Network Management Protocoa (SNMP)
C. Transmission Controa Protocoa (TCP)
D. Internet Protocoa (IP)
Aoswern A
Question 47
Which type of port is used to support VLAN trafc between two switches?
A. Virtuaa port
B. WAN port
C. Trunk port
D. LAN port
Aoswern C
Question 48
The protocoa that maps IP addresses to a Media Access Controa (MAC) address is:
Download