1.Which protocol in its default configuration downloads e-mail messages to the client computer and deletes them from the server?
2.A user tries to open a page on the web server at www.cisco.com. The user’s workstation does not have the destination IP address in order to encapsulate the request. Which network topology will provide the services that are required to associate the name of the web server with an IP address?
host1 –> SW1 –giu DNS Server –> R1 –> Web Server
3.TCP/IP data transmission between the source and destination host is de-encapsulated in four steps:
B, D, C, A
4.Which of the following are transport layer protocols of the TCP/IP model? (Choose two.)
UDP and TCP
5.What measurement is commonly used to describe communication speed when transferring data?
6.A host wants to send information simultaneously to all the other hosts in the same network. Which domain will support this type of communication?
7.Which portion of a received datagram is decoded and used by the internetwork layer of the TCP/IP model?
8.What are two advantages of purchasing a custom-built computer? (Choose two.)
user can specify higher performance components and supports higher-end graphics and gaming applications
9.What is the most common reason that ISPs provide asymmetrical transfer services?
to work with applications that require significant bandwidth
10.When is the use of a DSL modem necessary?
when a high-speed digital connection is required over the regular telephone line
11.Which two statements are true about network applications? (Choose two.)
Network applications are accessible from a remote computer. and Network applications are installed on a network server.
12.Which type of network supports DHCP and DNS services for network users in a network domain?
13.Refer to the exhibit. The network is experiencing excessive broadcast traffic from multiple hosts. What can be done to reduce the broadcast traffic that each host receives without compromising connectivity to the corporate servers?
Separate the switches with a router.
14.Refer to the exhibit. If host H8 sends a message to host H5 and the destination MAC address is in the MAC tables of both switches, which host device or devices will receive the message?
only host H5
15.Refer to the graphic. Based on the information that is shown, what statement is true?
All wireless devices that are connected to this access point must have an assigned SSID of Academy.
16.Refer to the graphic. Assume that the command output is from a wireless DHCP client that is connected to a Linksys integrated router. What can be deduced from the output?
The wireless connection is good.
17.How do ISPs obtain public IP addresses?
They obtain the addresses from the Internet registry.
18.Refer to the exhibit. In the wireless network, what is the maximum number of hosts supported if the IP addressing scheme contains four host bits?
19.What describes the external IP address that is obtained by a router through a cable or DSL modem?
a public address that is obtained through DHCP from the ISP
20.After issuing the ipconfig/all command on a host that has DHCP enabled, a network administrator notes that the output contains faulty IP configuration information. What is the first step the administrator should take to resolve this issue?
Use the release and renew options supported by the ipconfig command.
21.Which three addresses belong to the category of private IP addresses? (Choose three.)
10.0.0.1 and 172.16.0.1 and 192.168.31.19
22.What is the purpose of pop-up blocker software?
It prevents the display of advertisement windows.
23.When NAT is employed in a small office, which address type is typically used for hosts on the local LAN?
private IP addresses
24.Which statement is true concerning stateful packet inspection?
Access is permitted only if it is a legitimate response to a request from an internal host.
25.How does a straight-through cable connect two unlike devices?
It connects the transmit pins on the first device to the receive pins on the second device.
26.When would infrared be used to connect network devices?
when synchronizing a PC with a PDA that is in line of sight
27.Which adapter card would be required for a PC to exchange information with other PCs on a LAN?
28.Which two components are configured via software in order for a PC to participate in a network environment? (Choose two.)
29.Refer to the exhibit. Assume that the exhibited output is from a host that is connected to a Linksys integrated router. What is the first thing that should be checked while using a bottom-up troubleshooting approach?
the link status LED on the front of the router
30.Which Windows command is used to display the configured IP address, subnet mask, and default gateway?
31.What must be identical on all devices in a WLAN for successful wireless communication between the devices?
32.What is the purpose of the ipconfig /release command?
It forces a client to give up its current IP address.
33.What is the common DHCP role of the ISR router in home and small office networks?
The ISR router acts as both a DHCP client and server.
34.A company has a web server that must be accessible to both external and internal clients. Which security policy best practice should be followed to maximize security of the server?
Place the web server in a DMZ.
35.For the second time in a week, workstations on a LAN are not able to log into the server. The technician fixed the problem the first time, but cannot remember the steps taken to solve it. What aspect of the troubleshooting process has the technician neglected?
documenting the troubleshooting process
36.A network technician suspects that malware on a user PC is opening multiple TCP connections to a specific foreign host address. Which Windows command line utility can be used to confirm the multiple TCP connections?
37.Refer to the exhibit. A Linksys integrated services router is being used by wireless clients to access a server which is directly connected to an Ethernet port on the router. The server and the clients are using DHCP for IP addressing from the Linksys device and are on the same subnet. The server and the wireless clients are obtaining the correct IP configuration and can ping the Linksys device, but are unable to ping each other. What could be causing this issue?
The problem is most likely occurring on the Linksys device. Check all configurations on the Linksys device to ensure no security restrictions could be causing the issue.
38.What two pieces of information should a help desk technician document while troubleshooting connectivity issues with an end user? (Choose two.)
if the user can ping the default gateway address and whether the PC uses dynamic or static IP addressing