|
|||||||
АвтоАвтоматизацияАрхитектураАстрономияАудитБиологияБухгалтерияВоенное делоГенетикаГеографияГеологияГосударствоДомДругоеЖурналистика и СМИИзобретательствоИностранные языкиИнформатикаИскусствоИсторияКомпьютерыКулинарияКультураЛексикологияЛитератураЛогикаМаркетингМатематикаМашиностроениеМедицинаМенеджментМеталлы и СваркаМеханикаМузыкаНаселениеОбразованиеОхрана безопасности жизниОхрана ТрудаПедагогикаПолитикаПравоПриборостроениеПрограммированиеПроизводствоПромышленностьПсихологияРадиоРегилияСвязьСоциологияСпортСтандартизацияСтроительствоТехнологииТорговляТуризмФизикаФизиологияФилософияФинансыХимияХозяйствоЦеннообразованиеЧерчениеЭкологияЭконометрикаЭкономикаЭлектроникаЮриспунденкция |
A message is sent to all hosts on a remote network. Which type of message is it:directed broadcastA DHCP server is used to assign IP addresses dynamically to the hosts on a network. The address pool is configured with 192.168.10.0/24. There are 3 printers on this network that need to use reserved static IP addresses from the pool. How many IP addresses in the pool are left to be assigned to other hosts:251 A frame is transmitted from one networking device to another. Why does the receiving device check the FCS field in the frame: to check the frame for possible transmission errors A home user is looking for an ISP connection that provides high speed digital transmission over regular phone lines. What ISP connection type should be used: DSL A host device sends a data packet to a web server via the HTTP protocol. What is used by the transport layer to pass the data stream to the proper application on the server:destination port number A host is accessing a Web server on a remote network. Which three functions are performed by intermediary network devices during this conversation: applying security settings to control the flow of data;notifying other devices when errors occur;regenerating data signals A host is trying to send a packet to a device on a remote LAN segment, but there are currently no mappings in its ARP cache. How will the device obtain a destination MAC address:It will send an ARP request for the MAC address of the default gateway. A host PC has just booted and is attempting to lease an address through DHCP. Which two messages will the client typically broadcast on the network: DHCPREQUEST;DHCPDISCOVER A Layer 2 switch is used to switch incoming frames from a 1000BASE-T port to a port connected to a 100Base-T network. Which method of memory buffering would work best for this task:shared memory buffering A local real estate company can have its 25 computer systems upgraded for $1000. If the company chooses only to upgrade 10 systems, how much will the upgrade cost if the same rate is used:$400 A message is sent to all hosts on a remote network. Which type of message is it:directed broadcast A network administrator checks the security log and notices there was unauthorized access to an internal file server over the weekend. Upon further investigation of the file system log, the administrator notices several important documents were copied to a host located outside of the company. What kind of threat is represented in this scenario:information theft A network administrator has determined that various computers on the network are infected with a worm. Which sequence of steps should be followed to mitigate the worm attack:containment, inoculation, quarantine, and treatment A network administrator has forgotten the argument of an IOS command. How would the administrator get help from the IOS CLI to complete the command correctly: Type the command and then press the? key A network administrator is connecting two modern switches using a straight-through cable. The switches are new and have never been configured. Which three statements are correct about the final result of the connection:The auto-MDIX feature will configure the interfaces eliminating the need for a crossover cable.*The link between switches will work as full-duplex.*The link between the switches will work at the fastest speed that is supported by both switches. A network administrator is designing the layout of a new wireless network. Which three areas of concern should be accounted for when building a wireless network:coverage rea*interference* A network administrator is planning an IOS upgrade on several of the head office routers and switches. Which three questions must be answered before continuing with the IOS selection and upgrade: What models of routers and switches require upgrades?Do the routers and switches have enough RAM and flash memory for the proposed IOS versions?What features are required for the devices? A network administrator is required to upgrade wireless access to end users in a building. To provide data rates up to 1.3 Gb/s and still be backward compatible with older devices, which wireless standard should be implemented:802.11ac A network administrator issues the following commands on a Layer 3 switch:DLS1(config)# interface f0/3;DLS1(config-if)# no switchport;DLS1(config-if)# ip address 172.16.0.1;255.255.255.0;DLS1(config-if)# no shutdown;DLS1(config-if)# end;What is the administrator configuring:a routed port A network administrator needs to monitor network traffic to and from servers in a data center. Which features of an IP addressing scheme should be applied to these devices:predictable static IP addresses for easier identification A network administrator notices that some newly installed Ethernet cabling is carrying corrupt and distorted data signals. The new cabling was installed in the ceiling close to fluorescent lights and electrical equipment. Which two factors may interfere with the copper cabling and result in signal distortion and data corruption:RFI *EMI A network administrator notices that the default gateway device sends an ICMP Redirect message to the workstation when the workstation tries to connect to a file server on another network. What is the purpose for this ICMP message: To notify the workstation, that another router on the same network, is the better default-gateway to reach the remote server A network engineer is measuring the transfer of bits across the company backbone for a mission critical database application. The engineer notices that the network throughput appears lower than the bandwidth expected. Which three factors could influence the differences in throughput: the amount of traffic that is currently crossing the network;the type of traffic that is crossing the network;the latency that is created by the number of network devices that the data is crossing A network engineer is subnetting the 10.0.240.0/20 network into smaller subnets. Each new subnet will contain between a minimum of 20 hosts and a maximum of 30 hosts. Which subnet mask will meet these requirements: 255.255.255.224 A new network administrator has been asked to enter a banner message on a Cisco device. What is the fastest way a network administrator could test whether the banner is properly configured: Exit enable mode and press Enter A packet arrives at a router interface. The router goes through a series of steps to determine where the packet should be forwarded. Place the steps of the router forwarding process in the correct order. (Not all options are used.) 1examine packet header;2 determine destination network;3 examine routing table;4 identify exit interface to destination from route entry;5 move packet to forwarding interface A particular website does not appear to be responding on a Windows 7 computer. What command could the technician use to show any cached DNS entries for this web page: ipconfig /displaydns A PC is configured to obtain an IP address automatically from network 192.168.1.0/24. The network administrator issues the arp –a command and notices an entry of 192.168.1.255 ff-ff-ff-ff-ff-ff. Which statement describes this entry: This is a static map entry. A person-hour is the amount of work that the average worker can do in one hour. It is anticipated that a company-wide system upgrade will take approximately 60 person-hours to complete. How long will it take five technicians to perform the refresh:12 hours A ping fails when performed from router R1 to directly connected router R2. The network administrator then proceeds to issue the show cdp neighbors command. Why would the network administrator issue this command if the ping failed between the two routers:The network administrator wants to verify Layer 2 connectivity. A router has a valid operating system and a configuration stored in NVRAM. When the router boots up, which mode will display: user EXEC mode A small company has only one router as the exit point to its ISP. Which solution could be adopted to maintain connectivity if the router itself, or its connection to the ISP, fails: Have a second router that is connected to another ISP A technician configures a switch with these commands:SwitchA(config)# interface vlan 1 SwitchA(config-if)# ip address 192.168.1.1 255.255.255.0 SwitchA(config-if)# no shutdown What is the technician configuring: SVI A technician is configuring a router that is actively running on the network. Suddenly, power to the router is lost. If the technician has not saved the configuration, which two types of information will be lost:routing table*ARP cache* A technician is unsuccessful in establishing a console session between a PC and a Linksys integrated router. Both devices have power, and a cable is connected between them. Which two troubleshooting steps could help to diagnose this problem: Ensure the correct cable is used; Ensure the link status LED on the integrated router is lit A technician uses the ping 127.0.0.1 command. What is the technician testing: the TCP/IP stack on a network host A user is having problems accessing the Internet. The command ping www.cisco.com fails. However, pinging the IP address of cisco.com with the command ping 198.133.219.25 is successful. What is the problem:There is a problem with DNS A user is unable to access the company server from a computer. On issuing the ipconfig command, the user finds that the IP address of the computer is displayed as 169.254.0.2. What type of address is this: link-local A user is viewing an HTML document located on a web server. What protocol segments the messages and manages the segments in the individual conversation between the web server and the web client:TCP A user reboots a PC which has been configured to dynamically receive an IPv4 address from a DHCP server. In which order do the DHCP message transactions between the client and server occur: DHCPDISCOVER, DHCPOFFER, DHCPREQUEST, DHCPACK A user who is unable to connect to the file server contacts the help desk. The helpdesk technician asks the user to ping the IP address of the default gateway that is configured on the workstation. What is the purpose for this ping command: to test if the workstation can communicate on the network After making configuration changes, a network administrator issues a copy running-config startup-config command in a Cisco switch. What is the result of issuing this command: The new configuration will be loaded if the switch is restarted. After troubleshooting a router, the network administrator wants to save the router configuration so that it will be used automatically the next time that the router reboots. What command should be issued:copy running-config startup-config An administrator has just changed the IP address of an interface on an IOS device. What else must be done in order to apply those changes to the device: Nothing must be done. Changes to the configuration on an IOS device take effect as soon as the command is typed correctly and the Enter key has been pressed An administrator measured the transfer of usable data across a 100 Mb/s physical channel over a given period of time and obtained 60 Mb/s. Which kind of measurement did the administrator obtain: goodput An administrator uses the Ctrl-Shift-6 key combination on a switch after issuing the ping command. What is the purpose of using these keystrokes: to interrupt the ping p rocess An administrator wants to back up a router configuration file to a USB drive that is connected to the router. Which command should the administrator use to verify that the USB drive is being recognized by the router: show file systems An administrator wants to create four subnetworks from the network address 192.168.1.0/24. What is the network address and subnet mask of the second useable subnet: subnetwork 192.168.1.64;subnet mask 255.255.255.192 Поиск по сайту: |
Все материалы представленные на сайте исключительно с целью ознакомления читателями и не преследуют коммерческих целей или нарушение авторских прав. Студалл.Орг (0.008 сек.) |