finalover90 (796290), страница 2
Текст из файла (страница 2)
The new switch connects to an existingswitch that is already installed. Which UTP cable correctly connects the new switch to the existing switch?crossover***********rolloverstraight-throughconsole****************************************************************22 How many collision domains are shown in the diagram?threefourfivesix ******seveneight************************************************************23 Refer to the exhibit.
What must be configured on Host B to allow it to communicate with the file server?(Choose three.)the MAC address of the file serverthe MAC address of the PADI router interface connected to Switch Athe IP address of Switch Aa unique host IP address***********the subnet mask for the LAN***********the default gateway address**************************************************************************24 Refer to the exhibit. Host A pings Host B.
What can be concluded about the source and destination addressescontained in the communication sent by Router R5 when it forwards the ping out the Ethernet interface to HostB? (Choose two.)source IP address: 192.168.10.129source MAC address: BBBB.3333.5677source MAC address: 5555.AAAA.6666*************destination IP address: 192.168.10.33destination IP address: 192.168.10.134***********destination MAC address: 9999.DADC.1234*********************************************************************25What is the decimal representation of the binary number 11111000?224240248***********252254**************************************************26 A large company has a network that is constantly changing.
The routing tables in the routers need to beadjusted to reflect the changes in the routing paths. What type of routing would the network administratorimplement?static routesdynamic routing protocols***********only default routesnone. No routing is necessary.**********************************************************27 Which network device creates the highest amount of latency?hubrouter***********switchbridge**************************************************28 Why do vendors utilize the OSI model when designing networking products?It places requirements on all vendors that develop proprietary networking technologies for advance networkingsystems.It ensures greater compatibility and interoperability with equipment from different vendors.
***********The International Organization for Standards develops all new products to be incorporated into the product.It is mandated by the International Organization for Standardization that network products be compliant with theOSI model.***********************************************************29 Which type of address is 192.168.170.112/28?host addresssubnetwork address***********broadcast addressmulticast address************************************************************30A router determines the path to deliver a packet.
What layer of the OSI model does this fact represent?sessiontransportnetwork***********data linkphysical************************************************************31 What are important characteristics to consider when purchasing a network interface card? (Choose two.)security used on the networkmedia used on the network***********system bus used on the computer***********software installed on the networkdiagnostic tools installed on the network************************************************32 Which subnet masks could be used when subnetting a Class B IP address? (Choose two.)255.255.255.240***********255.255.192.0***********255.255.0.0255.192.0.0240.0.0.0255.0.0.0***************************************************33 Refer to the exhibit. The network administrator wants to create a subnet for the point-to-point connectionbetween the two routers.
Which subnetwork mask would provide enough addresses for the point-to-point linkwith the least number of wasted addresses?255.255.255.192255.255.255.224255.255.255.240255.255.255.248255.255.255.252*************************************************************************34 Which characteristics are common to both UDP and TCP? (Choose two.)provides windowingprovides reliabilityuses port numbers***********acknowledges receipt of dataclassified as a connectionless protocolclassified as a transport layer protocol*************************************************************35 Refer to the diagram. Which statements describe the transfer of data between Host A and the HTTP server?(Choose three.)Host A uses UDP and creates a three-way handshake to synchronize sequence numbers. Window sizes are thesame at the source and destination.
The number of acknowledgments sent is less than or equal to the number ofdata segments received. ***********Host A uses TCP and creates a three-way handshake to synchronize sequence numbers. Window sizes are thesame at the source and destination. The number of acknowledgments sent are less than or equal to the number ofdata segments received.Host A uses TCP and creates segments of data. Source port numbers are assigned dynamically and thedestination port number will be fixed to 80.Host A uses TCP and creates segments of data. Destination port numbers are assigned dynamically and thesource port number will be fixed to 80.
***********The transport layer is responsible for information flow control as well as establishing, maintaining, andterminating virtual connections between the client and server. ***********Host A uses UDP and creates segments of data. Source port numbers are assigned dynamically and thedestination port number will be fixed to 80.*****************************************************************************************36 Two peer hosts are exchanging data using TFTP. During the current session, a Cisco devices fails to arrive atthe destination. Which statement is true regarding the retransmission of the Cisco devices?Cisco devices retransmission requires user authentication.Cisco devices retransmission is controlled by the application.
***********Cisco devices retransmission relies on the acknowledgements at transport layer.Cisco devices retransmission occurs when the retransmission timer expires in the source host.******************************************************************************37 Which protocols are TCP/IP application layer protocols? (Choose two.)TFTP***********IPTCPUDPDNS********************************************************************************************38 Which of the following statements are correct about CSMA/CD? (Choose three.)It is a media access method used in LANs.
***********It is a media access method used in FDDI WANs.When a device needs to transmit, it checks to see if the media is available. ***********A device sends data without checking media availability because all devices have equal access.Multiple devices can successfully transmit simultaneously.Only one device can successfully transmit at a time. *********************************************************************************************39 Consider the networks shown in the exhibit.
Host A is sending packets to host B. Which layer of the OSImodel is being used when the router is making the calculated decision to determine which interface to send thepacket out?physicaldata linknetwork***********transportsessionpresentation******************************************************************40 An Ethernet host receives a frame, calculates the FCS, and compares the calculated FCS to the FCS receivedin the frame. The host finds that the two FCS values do not match.
What action will be taken by the host?The host discards the frame. ***********The host processes the data frame normally.The host initiates a request for retransmission of the frame.The host sends the frame content to an upper layer protocol for error recovery.***************************************************************************41 A computer technician is asked to make a network cable. One end of the cable is pinned as a 568A and theother as a 568B.
For what purhuhus can this cable be used? (Choose two.)to connect a router to a switchto connect a switch to a switch***********to connect a host to a switchto connect a hub to a switch***********to connect a router to a hubto connect a host to a hub*******************************************************************42 Why would a company install a switch instead of a hub when building or expanding a corporate network?A switch manages frames faster than a hub does.A switch operates at 100 Mbps. A hub operates at a maximum of 10 Mbps.A switch modifies the Ethernet frame to remove any errors.
A hub forwards the frame exactly as it arrived.A switch provides more bandwidth by sending frames only out the port to which the destination device isattached. A hub sends the frame out all ports except the source port. **********************************************************************************43Refer to the exhibit. A newly hired technician has a task of terminating CAT 5 UTP cables. The networkadministrator visually examined the cables the technician terminated. Some of the cables have connectors asshown in the exhibit. What should the network administrator explain to the technician about the cables?Both cables are acceptable.The cable in Graphic A will produce more crosstalk. ***********The cable in Graphic A should be used in the more critical network segments.The cable in Graphic A is preferred because it will be easier to crimp the connector.********************************************************************44 Refer to the topology in the graphic.















