АвтоАвтоматизацияАрхитектураАстрономияАудитБиологияБухгалтерияВоенное делоГенетикаГеографияГеологияГосударствоДомДругоеЖурналистика и СМИИзобретательствоИностранные языкиИнформатикаИскусствоИсторияКомпьютерыКулинарияКультураЛексикологияЛитератураЛогикаМаркетингМатематикаМашиностроениеМедицинаМенеджментМеталлы и СваркаМеханикаМузыкаНаселениеОбразованиеОхрана безопасности жизниОхрана ТрудаПедагогикаПолитикаПравоПриборостроениеПрограммированиеПроизводствоПромышленностьПсихологияРадиоРегилияСвязьСоциологияСпортСтандартизацияСтроительствоТехнологииТорговляТуризмФизикаФизиологияФилософияФинансыХимияХозяйствоЦеннообразованиеЧерчениеЭкологияЭконометрикаЭкономикаЭлектроникаЮриспунденкция

What benefit does DHCP provide to a network?

Читайте также:
  1. Benefit for New Balls
  2. Best Interest Rate by Major Bank Deposit Account Providers
  3. Coffee as a Health Drink? Studies Find Some Benefits
  4. Consult the Law on the Notary Service Board of Ukraine and decide if it provides the performance of the similar notarial acts by the notaries of Ukraine. Give your opinion.
  5. Employee benefits
  6. Graph-based physical synthesis provides tight correlation to final timing
  7. Kind of shops: what they sell or the service they provide
  8. RSD - Ozzie - The Physical Game Part Three: Getting Physical CHAPTER 4: The Benefits of Physical Game
  9. Using the network in the exhibit, what would be the default gateway address for host A in the 192.133.219.0 network?
  10. Which description correctly defines a converged network?

Hosts can connect to the network and get an IP address without manual configuration.
Duplicate addresses cannot occur on a network that issues dynamic addresses using DHCP and has static assignments.
DHCP allows users to refer to locations by a name rather than an IP address.
Hosts always have the same IP address and are therefore always reachable.

12.
Which two functions are provided to users by the context-sensitive help feature of the Cisco IOS CLI? (Choose two.)

providing an error message when a wrong command is submitted
allowing the user to complete the remainder of an abbreviated command with the TAB key
displaying a list of all available commands within the current mode
selecting the best command to accomplish a task
determining which option, keyword, or argument is available for the entered command

13.
A router has a valid operating system and a configuration stored in NVRAM. When the router boots up, which mode will display?

global configuration mode
user EXEC mode
setup mode
ROM monitor mode

14.
Which two features are characteristics of flash memory? (Choose two.)

Flash receives a copy of the IOS from RAM when a device is powered on.
Flash provides nonvolatile storage.
The contents of flash may be overwritten.
Flash is a component in Cisco switches but not in Cisco routers.
The contents of flash may be lost during a power cycle.

15.
Passwords can be used to restrict access to all or parts of the Cisco IOS. Select the modes and interfaces that can be protected with passwords. (Choose three.)

boot IOS mode
Ethernet interface
privileged EXEC mode
VTY interface
console interface
router configuration mode

16.
Why would a Layer 2 switch need an IP address?

to enable the switch to send broadcast frames to attached PCs
to enable the switch to function as a default gateway
to enable the switch to receive frames from attached PCs
to enable the switch to be managed remotely

17.
What is a user trying to determine when issuing a ping 10.1.1.1 command on a PC?

if there is connectivity with the destination device
what type of device is at the destination
if the TCP/IP stack is functioning on the PC without putting traffic on the wire
the path that traffic will take to reach the destination

18.
What command can be used on a Windows PC to see the IP configuration of that computer?

ping
show interfaces
show ip interface brief
ipconfig

19.
Which statement is true about the running configuration file in a Cisco IOS device?

It should be deleted using the erase running-config command.
It is automatically saved when the router reboots.
It affects the operation of the device immediately when modified.
It is stored in NVRAM.

20.
Match the description to the common IOS CLI access method.

21.
Which two characters are allowed as part of the hostname of a Cisco device? (Choose two.)

tab
space
question mark
numbers
underline

22.
A new network administrator has been asked to enter a banner message on a Cisco device. What is the fastest way a network administrator could test whether the banner is properly configured?

Power cycle the device.
Enter CTRL-Z at the privileged mode prompt.
Exit global configuration mode.
Exit enable mode and press Enter.
Reboot the device.

CCNA 1 R&S ITN Chapter 3 v5.0 Exam Answers 2014

1.
Which PDU format is used when bits are received from the network medium by the NIC of a host?
packet
segment
frame
file

2.
A user sends an HTTP request to a web server on a remote network. During encapsulation for this request, what information is added to the address field of a frame to indicate the destination?
the MAC address of the default gateway
the IP address of the destination host
the MAC address of the destination host
the IP address of the default gateway

3.
What is a benefit of using a layered model for network communications?
fostering competition among device and software vendors by enforcing the compatibility of their products
avoiding possible incompatibility issues by using a common set of developing tools
enhancing network transmission performance by defining targets for each layer
simplifying protocol development by limiting every layer to one function

4.
What method can be used by two computers to ensure that packets are not dropped because too much data is being sent too quickly?
flow control
encapsulation
access method
response timeout

5.
A web client is sending a request for a webpage to a web server. From the perspective of the client, what is the correct order of the protocol stack that is used to prepare the request for transmission?
HTTP, TCP, IP, Ethernet
Ethernet, TCP, IP, HTTP
HTTP, IP, TCP, Ethernet
Ethernet, IP, TCP, HTTP

6.
Which statement accurately describes a TCP/IP encapsulation process when a PC is sending data to the network?
Packets are sent from the network access layer to the transport layer.
Segments are sent from the transport layer to the internet layer.
Data is sent from the internet layer to the network access layer.
Frames are sent from the network access layer to the internet layer.

7.
Which protocol is responsible for controlling the size and rate of the HTTP messages exchanged between server and client?
ARP
HTTP
TCP
DHCP

8.
Launch PT Hide and Save PT

Open the PT Activity. Perform the tasks in the activity instructions and then answer the question.
Based on the configured network, what IP address would PC1 and PC2 use as their default gateway?
192.168.1.2
10.1.1.1
192.168.1.10
172.16.1.1
192.168.1.1

9.
A computer in a given network is communicating with a specific group of computers. What type of communication is this?
broadcast
HTTP
multicast
unicast
ARP

10.
What is a function of Layer 4 of the OSI model?
to represent data to the user, including encoding and dialog control
to specify the packet type to be used by the communications
to describe the ordered and reliable delivery of data between source and destination
to apply framing information to the packet, based on the attached media

11.
What is an advantage of network devices using open standard protocols?
Competition and innovation are limited to specific types of products.
A client host and a server running different operating systems can successfully exchange data.
Network communications is confined to data transfers between devices from the same vendor.
Internet access can be controlled by a single ISP in each market.

12.
Which IEEE standard enables a wireless NIC to connect to a wireless AP that is made by a different manufacturer?
802.11
802.1
802.3
802.2

13.
If the default gateway is configured incorrectly on the host, what is the impact on communications?
The host is unable to communicate on the local network.
There is no impact on communications.
The host can communicate with other hosts on the local network, but is unable to communicate with hosts on remote networks.
The host can communicate with other hosts on remote networks, but is unable to communicate with hosts on the local network.

14.
What statement describes the function of the Address Resolution Protocol?
ARP is used to discover the IP address of any host on the local network.
ARP is used to discover the IP address of any host on a different network.
ARP is used to discover the MAC address of any host on a different network.
ARP is used to discover the MAC address of any host on the local network.

15.
At which layer of the OSI model would a logical address be encapsulated?
transport layer
physical layer
network layer
data link layer

16.
What is the general term that is used to describe a piece of data at any layer of a networking model?
protocol data unit
segment
frame
packet

17.
Which statement is true about the TCP/IP and OSI models?​
The first three OSI layers describe general services that are also provided by the TCP/IP internet layer.​
The TCP/IP transport layer and OSI Layer 4 provide similar services and functions.
The TCP/IP network access layer has similar functions to the OSI network layer.​
The OSI Layer 7 and the TCP/IP application layer provide identical functions.

18.
Which address provides a unique host address for data communications at the internet layer?
Layer 2 address
data-link address
physical address
logical address

19.
A user is viewing an HTML document located on a web server. What protocol segments the messages and manages the segments in the individual conversation between the web server and the web client?
DHCP
HTTP
ARP
TCP

20.
Which address does a NIC use when deciding whether to accept a frame?
source MAC address
destination MAC address
source Ethernet address
destination IP address
source IP address

21.
Match the description to the organization.

22.
What are proprietary protocols?
protocols that can be freely used by any organization or vendor
protocols developed by organizations who have control over their definition and operation
a collection of protocols known as the TCP/IP protocol suite
protocols developed by private organizations to operate on any vendor hardware

CCNA 1 R&S ITN Chapter 4 v5.0 Exam Answers 2014

1
What are two reasons for physical layer protocols to use frame encoding techniques? (Choose two.)

to identify where the frame starts and ends*

to distinguish data bits from control bits*

to reduce the number of collisions on the media

to increase the media throughput

to provide better media error correction

2
Which statement is correct about multimode fiber?

Multimode fiber commonly uses a laser as a light source.

Multimode fiber cables carry signals from multiple connected sending devices.

SC-ST patch cords are used with multimode fiber cables.

SC-SC patch cords are used with multimode fiber cables.*

3
Which layer of the OSI model is responsible for specifying the encapsulation method used for specific types of media?

data link*

application

transport

physical

4
The throughput of a FastEthernet network is 80 Mb/s. The traffic overhead for establishing sessions, acknowledgments, and encapsulation is 15 Mb/s for the same time period. What is the goodput for this network?

15 Mb/s

55 Mb/s

65 Mb/s*

95 Mb/s

80 Mb/s

5
A network administrator notices that some newly installed Ethernet cabling is carrying corrupt and distorted data signals. The new cabling was installed in the ceiling close to fluorescent lights and electrical equipment. Which two factors may interfere with the copper cabling and result in signal distortion and data corruption? (Choose two.)

RFI​ *

signal attenuation

crosstalk

EMI *

extended length of cabling

7
What is the purpose of the FCS field in a frame?

to obtain the MAC address of the sending node

to verify the logical address of the sending node

to compute the CRC header for the data field

to determine if errors occurred in the transmission and reception*

8
As data travels on the media in a stream of 1s and 0s how does a receiving node identify the beginning and end of a frame?​

The transmitting node sends an out-of-band signal to the receiver about the beginning of the frame.

The transmitting node sends a beacon to notify that a data frame is attached.

The receiving node identifies the beginning of a frame by seeing a physical address.

The transmitting node inserts start and stop bits into the frame.*

9
Which statement describes signaling at the physical layer?

Sending the signals asynchronously means that they are transmitted without a clock signal.*

Signaling is a method of converting a stream of data into a predefined code.

Wireless encoding includes sending a series of clicks to delimit the frames.

In signaling, a 1 always represents voltage and a 0 always represents the absence of voltage.

10
A network administrator is designing the layout of a new wireless network. Which three areas of concern should be accounted for when building a wireless network? (Choose three.)

mobility options

extensive cabling

coverage area*

interference*

packet collision

security*

11
What is one main characteristic of the data link layer?

It converts a stream of data bits into a predefined code.

It shields the upper layer protocol from being aware of the physical medium to be used in the communication.*

It accepts Layer 3 packets and decides the path by which to forward a frame to a host on a remote network.

It generates the electrical or optical signals that represent the 1 and 0 on the media.

12
What is one advantage of using fiber optic cabling rather than copper cabling?

It is easier to terminate and install than copper cabling.

It is able to be installed around sharp bends.

It is usually cheaper than copper cabling.

It is able to carry signals much farther than copper cabling.*
13
Fill in the blank.
What acronym is used to reference the data link sublayer that identifies the network layer protocol encapsulated in the frame?
LLC

14
Why are two strands of fiber used for a single fiber optic connection?

They allow for full-duplex connectivity.*

They prevent crosstalk from causing interference on the connection.

They increase the speed at which the data can travel.

The two strands allow the data to travel for longer distances without degrading.
15


Refer to the exhibit. The PC is connected to the console port of the switch. All the other connections are made through FastEthernet links. Which types of UTP cables can be used to connect the devices?​

1 – crossover, 2 – rollover, 3 – straight-through

1 – crossover, 2 – straight-through, 3 – rollover

1 – rollover, 2 – straight-through, 3 – crossover*

1 – rollover, 2 – crossover, 3 – straight-through
16
What is true concerning physical and logical topologies?

Physical topologies display the IP addressing scheme of each network.

Logical topologies determine the media access control method used.*

Physical topologies are concerned with how a network transfers frames.

The logical topology is always the same as the physical topology.

17
Fill in the blank.
The term “ Bandwidth ” indicates the capacity of a medium to carry data and it is typically measured in kilobits per second (kb/s) or megabits per second (Mb/s).​
18


1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14 | 15 | 16 | 17 | 18 | 19 | 20 | 21 | 22 | 23 | 24 | 25 | 26 | 27 | 28 | 29 | 30 | 31 | 32 | 33 | 34 | 35 | 36 | 37 | 38 | 39 | 40 | 41 |

Поиск по сайту:



Все материалы представленные на сайте исключительно с целью ознакомления читателями и не преследуют коммерческих целей или нарушение авторских прав. Студалл.Орг (0.02 сек.)