Wednesday, June 22, 2011

CISCO IT Essential v4.1 Chapter 8

1. Refer to the exhibit. Which type of network cable is shown?
*fiber-optic

2.Which term describes the process of adding headers to data as it moves through the layers of the OSI model?
*encapsulation

3. When purchasing Cisco components for a network installation, what are three warning signs that the equipment may be counterfeit? (Choose three.)
*The price is much less than expected.
*The equipment appears to be performing at a substandard level.

*The packaging appears to be substandard compared to the packaging of other Cisco purchases.

4. Which protocol is used to automatically configure network devices?
*DHCP
   
5. Which protocol lacks support for encryption and can be initiated from a computer command prompt?
*Telnet

6. Which broadband technology would be recommended for a business that requires workers to access the Internet while visiting customers at many different locations?
*cellular
    
7. Which two factors are used to determine the different categories of UTP cabling? (Choose two.)
*The number of twists in the wires inside the cable.
*The number of wires inside the cable.

    
8. Which network topology will allow all devices to continue to communicate with each other should a network cable fail?
*mesh
    
9. Which software must be installed and working correctly on a computer to successfully enable a VPN connection to a remote site?
*VPN client

10. A college student is confused. To use online banking, the student types https://www.banking.com, whereas to access the college web page, the student types http://www.college.edu. Why would the two institutions use different protocols?
*The bank encrypts the web page information that is sent and received.
    
11. What is the purpose of the device that uses the 198.133.219.43 address?
*It is the device that translates domain names to IP addresses.
    
12. Which Cisco team can be contacted to help when Cisco equipment is suspected to be counterfeit?
*Cisco Brand Protection Team
    
13. Which digital technology provides an upstream speed that is typically less than the downstream speed?
*ADSL
    
14. Which utility can be used to determine end-to-end connectivity between source and destination?
*Ping

15. Which Windows XP command displays the route taken by packets crossing an IP network?
*tracert

16. Which procedure is normally performed when connecting a computer to an Ethernet network for the first time?
*Manually assign an IP address.
    
17. A student brings a laptop to a school that has wireless access. The laptop is not connecting to the school network. What is the first thing that the student should check?
*the available wireless networks within range
    
18. Which device enables computers to be attached to a network without segmenting the network?
*hub

19. Which topology has only one central point of failure, is easy to troubleshoot, and is most commonly implemented in newer networks?
*star

20. Which layer of the OSI model is primarily concerned with accessing the physical media and physical addressing?
*Data Link
    
21. Which wireless IEEE standard operates in a radio frequency of 2.4 GHz and supports a maximum bandwidth of 54 Mbps?
*802.11g
    
22. A company is investigating the use of an ISDN service to act as backup for the ASDL service they use to communicate with branch offices. They discover that the ISDN BRI service uses two 64 kb/s B channels. Which function do the B channels perform?
*carry the data stream
    
23. What is the maximum range a data signal can travel through a 1000BASE-T network segment?
*328 ft (100 m)

24. A technician is configuring a computer to send print jobs to a network printer. When the technician sends a test print to the printer, the print job fails. The technician tries to ping the network printer, but the technician suddenly remembers a change in Windows that is hampering the troubleshooting process. What change might this be?
*The Windows firewall stops pings.
    
25. What is one difference between a network domain and a workgroup?
*A domain provides centralized control.
    
26. Which three protocols are associated with e-mail? (Choose three.)
*IMAP
*POP3
*SMTP

27. A network administrator wants to connect a new building to an existing network using cable that can provide a secure connection and is not susceptible to electrical interference. The new building is approximately 800 meters away from the existing network. Which cable type should the administrator choose?
*fiber optic

28. Which two characteristics describe Ethernet technology? (Choose two.)
*supported by IEEE 802.3 standards
*uses a bus logical topology
    
29. Which three factors are reasons to choose a client/server model for a network instead of peer-to-peer? (Choose three.)
*The company network requires secure access to confidential information.
*The users need a central database to store inventory and sales information.
*The data gathered by the employees is critical and should be backed up on a regular basis.
    
30. Which technique is used to ensure that data from one computer does not collide with data from any other computer in a CSMA/CD network?
*Computers listen to the network for clearance to send data.

2 komentar:

Anonymous said...

best job.. thanxx,,,

Anonymous said...

They got different questions now -_-

Post a Comment

Twitter Delicious Facebook Digg Stumbleupon Favorites More

 
Design by Free WordPress Themes | Bloggerized by Lasantha - Premium Blogger Themes | GreenGeeks Review