finalover90 (796290)
Текст из файла
Version 3.1.1 (96% if u follow this answers)1 Refer to the exhibit. How many broadcast domains are shown?Three*******foufivesixeightten******************************************************2 When using Category 5 UTP cable, which RJ-45 pin pairs are used to exchange data between hosts on anEthernet network?1 and 2; 4 and 51 and 2; 3 and 6***********3 and 6; 7 and 84 and 5; 7 and 8***********************************************************3 Refer to the exhibit. A network administrator has configured a network after subnetting the network number192.168.0.0/28.
Workstation 1 is not able to communicate with Workstation 2. What is the cause of this loss incommunications?Workstation 1 and Workstation 2 are on the same subnet.The serial connections are using addresses from the LAN subnets.Workstation 1 is not on the same network that the Router 1 LAN interface is on.***********If routers are used in the network, IP addresses do not need to be subnetted.***********************************************************************************4 Refer to the exhibit. The hub and the switch are operating using factory default settings.
Which hosts willreceive the frame if host A transmits a broadcast frame?Only workstation B and the router will receive the data.Workstations B, C, D, E, and the router will receive the data. ***********Only workstations connected to the hub will receive the data.Workstations B, C, D, E, and the router will receive the data and it will be forwarded into the Internet.****************************************************************5 Refer to the exhibit. A network associate needs to establish an Ethernet connection between Host A and HostB. However, the distance between the two hosts is further than the cabling standards allow.
Which two devicesthat operate at the physical layer of the OSI can be used to allow Host A and Host B to communicate? (Choosetwo.)switchhub***********bridgerouterrepeater********************************************************************************6 Refer to the exhibit. A network technician is trying to determine the correct IP address configuration for HostA.
What is a valid configuration for Host A?IP address: 192.168.100.19; Subnet Mask: 255.255.255.248; Default Gateway: 192.16.1.2IP address: 192.168.100.20; Subnet Mask: 255.255.255.240; Default Gateway: 192.168.100.17***********IP address: 192.168.100.21; Subnet Mask: 255.255.255.248; Default Gateway: 192.168.100.18IP address: 192.168.100.22; Subnet Mask: 255.255.255.240; Default Gateway: 10.1.1.5IP address: 192.168.100.30; Subnet Mask: 255.255.255.240; Default Gateway: 192.168.1.1IP address: 192.168.100.31; Subnet Mask: 255.255.255.240; Default Gateway: 192.168.100.18***************************************************************************7Which devices will create multiple collision domains in an Ethernet network? (Choose two.)NIChubswitch***********router***********repeater***********************************************************************8 Refer to the exhibit.
What is the order of the TCP/IP Protocol Data Units as data is moved as indicated throughthe OSI model?bits, segments, frames, packets, databits, frames, packets, segments, data***********bits, frames, segments, packets, databits, packets, frames, segments, data*****************************************************************9 Refer to the exhibit.
The connections in the exhibit are labeled A through E. Which of these indicate LANlinks? (Choose two.)link A***********link Blink Clink Dlink E*****************************************************************10 Refer to the exhibit. Which type of UTP cable should be used to connect Host A to Switch1?rolloverconsolecrossoverstraight-through***************************************************************11 A wireless workstation must scan to find an available access point. What are two characteristics of a wirelessworkstation in passive scanning mode? (Choose two.)The wireless node sends a probe request with the SSID of the network. The access point must send back a proberesponse to complete the authentication and association process.The wireless node listens for beacons from an access point advertising an SSID and then attempts to join thenetwork.
***********The wireless node may associate or disassociate with access points as signal strength changes.The wireless node listens for a beacon from an access point with the same WEP key and is allowed toauthenticate to the WLAN.**********The wireless node broadcasts multiple probe requests to all available access points. The access point with thestrongest signal responds with a probe reply and authentication to the WLAN is complete.******************************************************************************12 Based on the graphic above, which of the following occurs as each host system comes on line in thetopology?The switch sends its MAC address to each host.The switch adds MAC address to the bridge table as each host sends a frame.
***********Each host exchanges MAC addresses with each other.The switch listens for data traffic to block since the switch lacks an IP address.*******************************************************************13 How does a switch learn the addresses of hosts connected to its ports?All source MAC addresses must be manually configured in CAM.The switch reads the source MAC address on incoming frames and records it in CAM.
***********The switch reads the destination MAC address on incoming frames and records it in CAM.If a switch port is full duplex, the switch reads both the source and destination MAC addresses on incomingframes and records them in CAM.********************************************************************************14 Refer to the exhibit. Which diagram represents the network topology that an administrator would prefer, andwhy would the administrator prefer it?Diagram A. It provides the hosts with full-duplex connections.Diagram A. It will better provide available bandwidth to the hosts.******Diagram B.
It extends the collision domain.Diagram B. It prevents the frames from looping.Either network will perform equally well.***********************************************************15 After an unsuccessful ping to the local router, the technician decides to investigate the router. The technicianobserves that the lights and fan on the router are not operational.
In which layer of the OSI model is the problemmost likely occurring?transportnetworkdata linkphysical******************************************************************************16 A user initiates three simultaneous FTP connections from the local host to the same FTP server. Which OSIlayer is responsible for establishing and managing these different FTP connections?applicationsession***********transportnetworkdata link********************************************************************17 Which technologies are considered to be LAN technologies? (Choose two.)DSLToken Ring***********Frame RelayISDNEthernet**************************************************************************18A router interface has been assigned an IP address of 172.16.192.166 with a mask of 255.255.255.248.
To whichsubnet does the IP address belong?172.16.0.0172.16.192.0172.16.192.128172.16.192.160***********172.16.192.168172.16.192.176**********************************************************************************19What is the correct number of usable subnetworks and hosts for the IP network address 192.168.35.0 subnettedwith a /28 mask?6 networks / 64 hosts14 networks / 32 hosts14 networks / 14 hosts***********30 networks / 64 hosts*****************************************************************20 In the exhibit, the connections between the devices are labeled A, B, C, D, and E. For each connection, whatis the correct UTP cable to use?A=straight, B=rollover, C=straight, D=crossover, E=crossoverA=rollover, B=crossover, C=crossover, D=straight, E=straightA=rollover, B=straight, C=straight, D=crossover, E=straightA=rollover, B=straight, C=straight, D=crossover, E=crossover***********A=straight, B=crossover, C=rollover, D=straight, E=straight**********************************************************************21 A network administrator has added a new switch to the network.
Характеристики
Тип файла PDF
PDF-формат наиболее широко используется для просмотра любого типа файлов на любом устройстве. В него можно сохранить документ, таблицы, презентацию, текст, чертежи, вычисления, графики и всё остальное, что можно показать на экране любого устройства. Именно его лучше всего использовать для печати.
Например, если Вам нужно распечатать чертёж из автокада, Вы сохраните чертёж на флешку, но будет ли автокад в пункте печати? А если будет, то нужная версия с нужными библиотеками? Именно для этого и нужен формат PDF - в нём точно будет показано верно вне зависимости от того, в какой программе создали PDF-файл и есть ли нужная программа для его просмотра.














