1.
What is a function of the distribution layer in the hierarchical design model?
Correct Answer
D. To provide connectivity between smaller local networkstion 4
Explanation
The distribution layer in the hierarchical design model is responsible for providing connectivity between smaller local networks. This layer acts as an intermediary between the access layer (where end devices are connected) and the core layer (where high-speed backbone connections are made). By organizing end devices into small manageable groups, the distribution layer helps to optimize network performance and facilitate efficient communication between different local networks.
2.
Under what circumstance would it be appropriate to use private IP addresses?
Correct Answer
C. For addresses that are used exclusively within an organization.
Explanation
Private IP addresses are used exclusively within an organization. These addresses are not routable on the internet, which means they cannot be accessed or communicated with outside of the organization's network. Using private IP addresses ensures that the organization's internal network remains separate and secure from the public internet. It allows for efficient allocation of IP addresses within the organization and helps prevent conflicts with public IP addresses.
3.
What two commands can be used to form a new binding if client information does not agree with the DHCP client table? (Choose two.)
Correct Answer(s)
A. Ipconfig /release
D. Ipconfig /renew
Explanation
The correct answer is ipconfig /release and ipconfig /renew. These two commands can be used to form a new binding if client information does not agree with the DHCP client table. The ipconfig /release command releases the current IP address lease, while the ipconfig /renew command requests a new IP address lease from the DHCP server. By using these commands, the client can obtain a new IP address that matches the DHCP client table.
4.
What type of computer would most likely use a docking station?
Correct Answer
A. Laptop
Explanation
A laptop would most likely use a docking station because it provides a convenient way to connect the laptop to additional peripherals such as a monitor, keyboard, and mouse. This allows the laptop to function more like a desktop computer when it is docked, providing a larger screen and more comfortable typing experience. Docking stations also often provide additional ports and connectivity options, making it easier to connect to external devices and expand the laptop's capabilities.
5.
For an IP address, what component decides the number of bits that is used to represent the host ID?
Correct Answer
D. Subnet mask
Explanation
The subnet mask determines the number of bits used to represent the host ID in an IP address. The subnet mask is a 32-bit value that is used to divide the IP address into network and host portions. The network portion is determined by the bits set to 1 in the subnet mask, while the host portion is determined by the bits set to 0. By changing the subnet mask, the number of bits allocated for the host ID can be adjusted, allowing for more or fewer hosts on a network.
6.
What type of cable would be required to connect a Linksys router to a wired PC?
Correct Answer
A. Crossover cable
Explanation
A crossover cable would be required to connect a Linksys router to a wired PC. A crossover cable is used to directly connect two devices of the same type, such as a router and a PC, without the need for a switch or hub. This type of cable allows the devices to communicate and share data effectively.
7.
A network technician suspects that malware on a user PC is opening multiple TCP connections to a specific foreign host address. Which Windows command line utility can be used to confirm the multiple TCP connections?
Correct Answer
B. Netstat
Explanation
The netstat command provides information about active network connections, including TCP connections, on a Windows system. By using specific options with netstat, such as "-an", you can view all active TCP connections, including the foreign host addresses with which the PC is communicating. This can help confirm if multiple TCP connections are indeed open to a specific foreign host address, which may indicate potential malware activity.
8.
A college network administrator is planning a wireless LAN to provide service in the student lounge and outdoor patio. The requirements include a range of at least 80 meters and a speed of 30 Mb/s. Which wireless LAN standard meets these requirements?
Correct Answer
B. 802.11a
Explanation
The correct answer is 802.11a. This standard operates on a frequency of 5 GHz, which allows for a faster data transfer rate compared to the other options. It has a range of up to 80 meters, meeting the specified requirement. 802.11b and 802.11g operate on a frequency of 2.4 GHz, which can have interference from other devices and may not provide the desired speed. 802.11 is a general term that encompasses all the different standards, so it does not meet the specific requirements mentioned.
9.
Which of the following statements best describes DNS?
Correct Answer
B. DNS servers are used to map a name to an IP address.
Explanation
DNS (Domain Name System) is a system that translates domain names (such as www.example.com) into IP addresses (such as 192.168.1.1) that computers can understand. It acts as a directory or phonebook for the internet, allowing users to access websites and other resources by typing in a domain name instead of remembering the IP address. Therefore, the statement "DNS servers are used to map a name to an IP address" accurately describes the function of DNS servers.
10.
A network administrator has been notified that users have experienced problems gaining access to network resources. What utility could be used to directly query a name server for information on a destination domain?
Correct Answer
E. Nslookup
Explanation
Nslookup is a utility that can be used to directly query a name server for information on a destination domain. It allows the network administrator to retrieve information such as IP addresses, hostnames, and other DNS records associated with a domain. By using nslookup, the administrator can troubleshoot network connectivity issues and identify any problems with the DNS resolution process.
11.
What is the purpose of pop-up blocker software?
Correct Answer
C. It prevents the display of advertisement windows.
Explanation
Pop-up blocker software is designed to prevent the display of advertisement windows. These windows often appear as pop-ups while browsing the internet and can be intrusive and disruptive to the user experience. By blocking these pop-ups, the software helps to create a more seamless and uninterrupted browsing experience for the user. It does not detect or remove spyware, viruses, or unwanted emails, as those tasks are typically handled by other types of security software.
12.
What data communication technology uses low-power radio waves to transmit data?
Correct Answer
C. Wireless
Explanation
Wireless technology uses low-power radio waves to transmit data. It allows devices to communicate without the need for physical cables or wires. This technology is commonly used in various applications such as Wi-Fi, Bluetooth, and cellular networks. Wireless communication is convenient, flexible, and widely used in modern devices like smartphones, laptops, and IoT devices.
13.
What are two examples of peripheral input devices? (Choose two.)
external modem
Correct Answer(s)
A. Barcode reader
B. Digital camera
Explanation
A barcode reader is a peripheral input device that is used to scan and read barcodes. It captures the information encoded in the barcode and sends it to a computer or another device. A digital camera is also a peripheral input device that captures and records images or videos. It can be connected to a computer or other devices to transfer the captured media files. Both of these devices serve as input devices by providing data or information to a computer or system.
14.
Which portion of the packet does a router use to forward the packet to the destination?
Correct Answer
C. Destination IP address
Explanation
A router uses the destination IP address to forward the packet to the destination. The destination IP address is a unique identifier assigned to the destination device on the network. When a packet arrives at a router, the router examines the destination IP address in the packet header and checks its routing table to determine the next hop for the packet. The router then forwards the packet to the appropriate interface towards the destination based on this information.
15.
Which two statements are true about local applications? (Choose two.)
Correct Answer(s)
C. They are accessed from a remote computer.
E. They run on the computer where they are installed.
Explanation
Local applications are accessed from a remote computer, meaning they can be accessed and used from a different computer than the one where the application is installed. Additionally, local applications run on the computer where they are installed, indicating that they are executed and operated on the same computer where they are installed.
16.
Which three address ranges can be used to depict private IP addresses? (Choose three.)
Correct Answer(s)
A. 10.0.0.0 to 10.0.0.255
D. 172.16.1.0 to 172.16.1.255
E. 192.168.22.0 to 192.168.22.255
Explanation
The three address ranges that can be used to depict private IP addresses are 10.0.0.0 to 10.0.0.255, 172.16.1.0 to 172.16.1.255, and 192.168.22.0 to 192.168.22.255. These address ranges are reserved for private networks and are not routable on the internet. They are commonly used in home and small office networks for internal communication.
17.
Because of an increasing number of users, bandwidth per user on a WLAN has decreased to a point where users are complaining about poor performance. What can be done to improve the user experience?
Correct Answer
D. Reduce the number of devices using each channel.
Explanation
To improve the user experience on the WLAN, reducing the number of devices using each channel is the correct answer. By doing so, the available bandwidth per user will increase as there will be less congestion on the network. This will result in better performance and fewer complaints from users. Increasing the AP radio signal strength may not be effective as it can lead to interference and overlapping of signals. Placing the AP in a more central location can help with coverage but may not directly address the issue of bandwidth per user. Deploying an external omni-directional antenna can also improve coverage but may not solve the problem of limited bandwidth.
18.
How does a straight-through cable connect two unlike devices?
Correct Answer
D. It uses the same pins for transmitting and receiving.
Explanation
A straight-through cable connects two unlike devices by using the same pins for transmitting and receiving. This means that the transmit pins on one device are connected to the corresponding transmit pins on the other device, and the receive pins on one device are connected to the corresponding receive pins on the other device. This allows for bidirectional communication between the two devices.
19.
TCP/IP data transmission between the source and destination host is encapsulated in four steps:
A. adds the data-link header and trailer;
B. converts data to bits for transmission;
C. adds the network IP address to the header of the packet;
D. segments the data for end-to-end transport.
What is the correct sequence of these steps?
Correct Answer
D. D, C, A, B
Explanation
The correct sequence of steps for TCP/IP data transmission is as follows: first, the data is segmented for end-to-end transport (D). Then, the network IP address is added to the header of the packet (C). After that, the data-link header and trailer are added (A). Finally, the data is converted to bits for transmission (B).
20.
When are leased lines typically used?
Correct Answer
C. When a dedicated digital data line is necessary
Explanation
Leased lines are typically used when a dedicated digital data line is necessary. Leased lines provide a dedicated connection between two points, ensuring consistent and reliable data transmission. This makes them suitable for applications that require high bandwidth, low latency, and secure connectivity, such as large businesses, data centers, and institutions. Leased lines are not typically used for low bandwidth requirements or as a less expensive alternative to cable and DSL modem services.
21.
What are two ways that a user can interact with an operating system shell? (Choose two.)
Correct Answer(s)
A. CLI
C. GUI
Explanation
A user can interact with an operating system shell through two ways: CLI (Command Line Interface) and GUI (Graphical User Interface). CLI allows the user to interact with the operating system by typing commands into a text-based interface, while GUI provides a visual interface with icons, menus, and windows that allow the user to interact with the operating system using a mouse or touch input. Both CLI and GUI offer different ways for users to interact with the operating system based on their preferences and requirements.
22.
Refer to the exhibit. H1 can ping H2, H3, and the Fa0/0 interface of router R1. H2 and H3 but not H1 can ping H4 and H5. What is a possible cause for the H1 failure?
Correct Answer
D. Host H1 does not have a default gateway configured.
Explanation
Host H1 does not have a default gateway configured. This means that H1 does not know where to send packets that are destined for networks outside of its own network. Without a default gateway, H1 is unable to send packets to other networks, such as the networks that H4 and H5 are on. This explains why H1 can ping H2, H3, and the Fa0/0 interface of router R1 (which are all on the same network), but cannot ping H4 and H5 (which are on different networks).
23.
After issuing the ipconfig/all command on a host that has DHCP enabled, a network administrator notes that the output contains faulty IP configuration information. What is the first step the administrator should take to resolve this issue?
Correct Answer
D. Use the release and renew options supported by the ipconfig command.
Explanation
The first step the administrator should take to resolve the issue of faulty IP configuration information is to use the release and renew options supported by the ipconfig command. This will release the current IP address lease from the DHCP server and then attempt to renew it, allowing the host to obtain a new and correct IP configuration from the DHCP server. This process can help resolve any issues with the current IP configuration and ensure that the host has the correct IP address assigned.
24.
When terminating a UTP cable, why is it important to push the wires all the way into the end of the connector?
Correct Answer
B. To ensure good electrical contact
Explanation
It is important to push the wires all the way into the end of the connector to ensure good electrical contact. By doing so, the wires make full contact with the metal contacts within the connector, allowing for a strong and reliable electrical connection. If the wires are not pushed all the way in, there may be gaps or loose connections, which can result in poor signal transmission or even complete failure of the connection.
25.
Which network design layer provides a connection point for end user devices to the network?
Correct Answer
D. Network
Explanation
The access layer in network design provides a connection point for end user devices to the network. This layer is responsible for connecting end devices such as computers, printers, and phones to the network infrastructure. It includes switches and wireless access points that allow these devices to connect and communicate with each other and with the rest of the network.
26.
All hosts within a domain receive the same frame that originates from one of the devices. The domain is also bounded by routers. What type of domain is this?
Correct Answer
A. Broadcast
Explanation
This is a broadcast domain. In a broadcast domain, all hosts within the domain receive the same frame that originates from one of the devices. The domain is bounded by routers, meaning that the broadcast traffic is contained within the boundaries of the routers.
27.
Refer to the exhibit. An educational institution needs to connect PC systems that use private IP addressing to the Internet. They have multiple systems that need to access the Internet, but were only able to purchase one public IP address. What should be activated on the Linksys integrated router to achieve this goal?
Correct Answer
E. NAT
Explanation
NAT (Network Address Translation) should be activated on the Linksys integrated router to achieve the goal of connecting PC systems that use private IP addressing to the Internet using only one public IP address. NAT allows the router to translate the private IP addresses of the PC systems to the public IP address when communicating with the Internet. This allows multiple systems to share the same public IP address and access the Internet simultaneously.
28.
Which three statements describe an IP address? (Choose three.)
Correct Answer(s)
A. An IP address is known as a logical address.
E. An IP address is unique within the same local network.
F. The network portion of an IP address will be the same for all hosts that are connected to the same local network.
Explanation
An IP address is known as a logical address because it is assigned to devices on a network to provide a logical identification. An IP address is unique within the same local network, meaning that no two devices within the same network can have the same IP address. The network portion of an IP address will be the same for all hosts that are connected to the same local network, allowing them to communicate with each other within the network.
29.
What is the purpose of creating a DMZ during network firewall implementation?
Correct Answer
C. To allow for a publicly accessible zone without compromising the internal network
Explanation
The purpose of creating a DMZ (Demilitarized Zone) during network firewall implementation is to allow for a publicly accessible zone without compromising the internal network. A DMZ acts as a buffer zone between the internet and the internal network, where public-facing servers and services can be placed. By placing these servers in the DMZ, it reduces the risk of direct access to the internal network, providing an added layer of security. This allows external users to access the public services while keeping the internal network protected from potential threats.
30.
Which two components are configured via software in order for a PC to participate in a network environment? (Choose two.)
Correct Answer(s)
B. IP address
E. Subnet mask
Explanation
The correct answer is IP address and subnet mask. IP address is a unique numerical label assigned to each device in a network, allowing it to be identified and communicate with other devices. Subnet mask is used to determine the network and host portions of an IP address, enabling proper routing of data packets within a network. Both IP address and subnet mask are configured via software to enable a PC to participate in a network environment.
31.
A home user is looking for an ISP connection that provides high speed digital transmission over regular phone lines. What ISP connection type should be used?
Correct Answer
B. Dial-up
Explanation
Dial-up is not the correct answer for a home user looking for high-speed digital transmission over regular phone lines. Dial-up connections use analog signals and are much slower compared to DSL, cable modem, or satellite connections. DSL, on the other hand, uses digital signals and provides high-speed internet access over regular phone lines, making it the appropriate choice for the given scenario.
32.
Refer to the exhibit. The security policy of an organization allows employees to connect to the office intranet from their homes. Which type of security policy is this?
Correct Answer
D. Remote access
Explanation
The security policy described in the exhibit is a remote access policy. This policy allows employees to connect to the office intranet from their homes, indicating that it is focused on providing secure access to the network remotely. Remote access policies typically outline the rules and procedures for connecting to a network from outside the organization's physical location, ensuring that the connection is secure and authorized.
33.
In IP telephony, what is the purpose of a gateway to the PSTN?
Correct Answer
D. To allow IP voice clients to communicate with regular analog telepHones.
Explanation
The purpose of a gateway to the PSTN in IP telephony is to allow IP voice clients to communicate with regular analog telephones. This means that the gateway acts as a bridge between the IP network and the traditional Public Switched Telephone Network (PSTN), enabling the conversion of IP-based voice signals into analog signals that can be understood by analog telephones. This allows IP voice clients to make and receive calls to and from regular analog telephones, expanding their communication capabilities beyond the IP network.
34.
Which two causes of networking problems are related to the physical layer? (Choose two.)
Correct Answer(s)
A. Damaged cables and connectors
D. Overheated components
Explanation
The physical layer of a network is responsible for the actual transmission of data through cables and connectors. Damaged cables and connectors can result in a loss of connectivity or a decrease in network performance. Overheated components can also cause networking problems as they can lead to system failures or intermittent connectivity issues. Both of these causes directly affect the physical infrastructure of the network, making them related to the physical layer. Incorrect addressing, incorrect subnet mask, and incorrect default gateway are all related to the network layer, not the physical layer.
35.
Which device is often configured to act as both a DHCP client and a DHCP server?
Correct Answer
C. Wireless-enabled laptop
Explanation
A wireless-enabled laptop is often configured to act as both a DHCP client and a DHCP server. This means that it can obtain an IP address from a DHCP server when connected to a network, and it can also assign IP addresses to other devices connected to its own network. This functionality is useful in situations where multiple devices need to connect to the internet through the laptop's wireless connection, allowing the laptop to act as a central hub for network connectivity.
36.
Which adapter card would be required for a PC to exchange information with other PCs on a LAN?
Correct Answer
A. NIC
Explanation
A Network Interface Card (NIC) is required for a PC to exchange information with other PCs on a Local Area Network (LAN). This card allows the PC to connect to the LAN and communicate with other devices on the network. The video card is responsible for rendering graphics on the PC's display, the sound card is responsible for audio output/input, and an internal modem allows the PC to connect to the internet via a telephone line. However, none of these cards are specifically designed for LAN communication like a NIC.
37.
Which protocol is used to transfer files among network devices and perform file-management functions?
Correct Answer
B. FTP
Explanation
FTP (File Transfer Protocol) is the correct answer because it is a protocol used to transfer files among network devices and perform file management functions. DNS (Domain Name System) is used to translate domain names into IP addresses. HTML (Hypertext Markup Language) is a markup language used for creating web pages. HTTP (Hypertext Transfer Protocol) is a protocol used for transmitting hypertext over the internet. None of these protocols specifically deal with file transfer and file management functions like FTP does.
38.
What is true about a wireless access point that is equipped with an omnidirectional antenna?
Correct Answer
D. Provides the greatest transmission distance of all antenna types that are used by APs
Explanation
A wireless access point equipped with an omnidirectional antenna radiates the signal equally in all directions. This means that the signal coverage is spread out in a circular pattern around the access point, providing coverage in all directions. This type of antenna is commonly used in situations where the goal is to provide coverage to a wide area, such as in large open spaces or outdoor environments. While it provides good coverage in all directions, it may not necessarily provide the greatest transmission distance compared to other types of antennas used by access points.
39.
What is a weakness of WEP that is solved by WPA?
Correct Answer
D. WEP uses a fixed length key for every connection whereas WPA uses a different key length for each connection.
Explanation
WEP's weakness that is solved by WPA is the use of a fixed length key for every connection. WPA, on the other hand, uses a different key length for each connection, making it more secure against attacks. By using different key lengths, WPA makes it harder for attackers to crack the encryption and gain unauthorized access to the network. This improvement in key length adds an extra layer of security to WPA compared to WEP.
40.
Which statement is true concerning stateful packet inspection?
Correct Answer
D. Access is permitted only if it is a legitimate response to a request from an internal host.
Explanation
Stateful packet inspection is a firewall technology that examines the state of a packet in relation to previous packets in the same session. It keeps track of the state of network connections and only allows access if the packet is a legitimate response to a request from an internal host. This means that the firewall will not allow any incoming packets unless they are in response to a request initiated from within the internal network. It helps to prevent unauthorized access and ensures that only legitimate traffic is allowed into the network.
41.
A home user was successfully browsing the Internet earlier in the day but is now unable to connect. A ping command from a wireless laptop to a wired PC in the LAN is successful, but the nslookup command fails to resolve a website address. The user decides to analyze the LEDs on the Linksys router to verify connectivity. Which LED should be of main concern in this situation?
Correct Answer
D. 1-4 Ethernet LEDs
Explanation
The main concern in this situation should be the 1-4 Ethernet LEDs. Since the ping command from the wireless laptop to the wired PC in the LAN is successful, it indicates that the local network connection is working fine. However, the nslookup command fails to resolve a website address, suggesting that there might be an issue with the internet connection. By analyzing the 1-4 Ethernet LEDs on the Linksys router, the user can determine if there is any activity or connectivity problem with the wired connections, which could be causing the internet connectivity issue.
42.
Some new features are available for the OS that is currently running on a user’s PC. What method should be chosen so that the user can install these new feature sets?
Correct Answer
C. Upgrade
Explanation
The correct answer is "upgrade". When new features are available for the operating system running on a user's PC, the recommended method to install these new feature sets is through an upgrade. This involves updating the existing operating system to a newer version that includes the new features. Unlike a clean install, an upgrade preserves the user's existing settings, files, and applications. Multi-boot refers to having multiple operating systems installed on the same PC, while virtualization involves running multiple operating systems simultaneously on a virtual machine.
43.
What does the term "attenuation" mean in data communication?
Correct Answer
A. Loss of signal strength as distance increases
Explanation
Attenuation refers to the loss of signal strength as distance increases in data communication. As signals travel over a distance, they experience a decrease in amplitude, resulting in a weaker signal. This can lead to errors and degradation of the transmitted data. Therefore, attenuation is an important factor to consider when designing and implementing communication systems, as it can impact the quality and reliability of the transmitted signals.
44.
After attaching four PCs to the switch ports, configuring the SSID and setting authentication properties for a small office network, a technician successfully tests the connectivity of all PCs that are connected to the switch and WLAN. A firewall is then configured on the device prior to connecting it to the Internet. What type of network device includes all of the described features?
Correct Answer
C. Firewall appliance
Explanation
A firewall appliance is a network device that includes all of the described features. It can provide connectivity for multiple PCs through switch ports and WLAN, allow configuration of SSID and authentication properties, and also include firewall functionality to protect the network from unauthorized access when connected to the Internet.
45.
Which two issues can cause connectivity problems on a wireless network? (Choose two.)
Correct Answer(s)
B. Broadcast SSID
C. Overlapping channels
Explanation
Broadcasting the SSID can cause connectivity problems on a wireless network because it allows anyone within range to see and potentially connect to the network, increasing the risk of unauthorized access and congestion. Overlapping channels can also cause connectivity problems as they can interfere with each other, resulting in signal degradation and slower network speeds.
46.
A local PC has the correct configuration that is required to access the network. A ping command that is sourced at the PC does not receive a response from a remote device. Which operating system command might be used to determine where the connection failed?
Correct Answer
B. Tracert
Explanation
The correct answer is tracert because the tracert command is used to trace the route that packets take from the local PC to a remote device. By using this command, it is possible to determine the specific point at which the connection failed, helping to identify any network issues or misconfigurations that may be causing the lack of response from the remote device.
47.
What is the default subnet mask for an IP address of 64.100.19.14?
Correct Answer
A. 255.0.0.0
Explanation
The default subnet mask for an IP address of 64.100.19.14 is 255.0.0.0. This is because the IP address falls within the range of Class A addresses, which have a default subnet mask of 255.0.0.0.
48.
Refer to the exhibit. A user on host A sends an e-mail to the user on host B. Which type of message does host A send?
Correct Answer
D. Unicast
Explanation
Host A sends a unicast message. Unicast is a type of communication where a message is sent from one sender to a specific recipient. In this case, the user on host A is sending an email to the user on host B, indicating that the message is intended for a single recipient.
49.
Refer to the graphic. Based on the information that is shown, what statement is true?
Correct Answer
C. All wireless devices that are connected to this access point must have an assigned SSID of Academy.
Explanation
The given configuration shows that all wireless devices connected to this access point must have the same SSID of "Academy". This means that any device wanting to connect to this access point must have its SSID set to "Academy" in order to establish a connection.
50.
A network engineer wants to represent confidential data in binary format. What are the two possible values that the engineer can use? (Choose two.)
Correct Answer(s)
A. 0
B. 1
Explanation
Binary format is a base-2 number system that uses only two possible values, 0 and 1, to represent data. These values are commonly used in computer systems to represent and manipulate information at the most fundamental level. The other options, 2, A, and F, are not valid in binary format as they exceed the range of possible values.