tag:blogger.com,1999:blog-92202005593823055812024-02-20T12:10:29.131-08:00computercomputerhttp://www.blogger.com/profile/00775484145552043479noreply@blogger.comBlogger15125tag:blogger.com,1999:blog-9220200559382305581.post-67959766184460420752011-03-23T23:08:00.000-07:002011-03-23T23:09:33.910-07:00<span style="font-weight: bold;">final ccna4-4</span><br /><br />1. A small bookstore would like to offer wireless connectivity for customers with laptops. Which wireless components or devices will provide connectivity to the customers with the least possible cost to the bookstore?<br /> *standalone access points<br /> wireless LAN controllers<br /> standalone lightweight access points<br /> lightweight access point and wireless LAN controller<br /><br />2. What can be broadcast over the wireless network to help a user connect to the network and use wireless services?<br /> *SSID<br /> WEP keys<br /> VLAN parameters<br /> WPA encryption keys<br /> VPN authentication information<br /><br />3. A company has an IT staff that is not highly trained. What two features or technologies must the network designer identify as training needs in order for the staff to understand the basic operation of VPNs? (Choose two.)<br /> access control lists<br /> *encryption algorithms<br /> Frame Relay configuration<br /> QoS operation<br /> *tunneling protocols<br /> VLAN configuration<br /><br />4. A large company plans to add several servers and requires that the servers be reachable directly from the Internet. Which action will help the company accomplish this goal?<br /> *Assign to each server a static internal IP address that is mapped statically to a public IP address.<br /> Place all servers in their own Class C private subnet.<br /> Provide a private address to each server using DHCP.<br /> Assign addresses from a pool of public Class B addresses using DHCP.<br /><br />5. Which technical requirement is satisfied when providing QoS for delay sensitive applications?<br /> *availability<br /> manageability<br /> scalability<br /> security <br /><br />6. During a review of the proposed bill of materials, an account manager of the network solution company realizes that the systems engineer included a switch with lower cost and reduced capabilities for the access layer than was originally specified by the network designer. When questioned, the systems engineer responds that the switches specified by the designer cannot be purchased within the budget limitations of the customer. Which action should the account manager take?<br /> Inform the customer that the project budget must be increased.<br /> Inform the customer that the project cannot be completed given the unreasonable budget constraints.<br /> *Communicate any risks that are associated with the equipment substitution and obtain customer approval to proceed.<br /> Because the customer is probably aware that the budget limitations will require lower cost, less capable equipment, the account manager should do nothing.<br /><br />7. Which protocol is enabled by default to dynamically discover and eliminate Layer 2 loops that are created by redundant links between switches?<br /> CDP<br /> DTP<br /> *STP<br /> VTP<br /><br />8. Which statement describes the use of a network baseline?<br /> It creates a high level logical network diagram.<br /> *It provides a point of reference for future network evaluations.<br /> It allows precise identification of the original location of network equipment.<br /> It should be established as soon as a problem is detected on the network.<br /><br />9. Refer to the exhibit. The network administrator wishes to use the Cisco Feature Navigator to choose a Cisco IOS image to install on a router that will allow VoIP functionality. Based on the output of the show version command, which statement accurately describes the ability of the router to run the Cisco IOS image selected?<br /> *There is enough DRAM and flash.<br /> There is enough DRAM but not enough flash.<br /> There is not enough DRAM but there is enough flash.<br /> There is not enough DRAM and flash.<br /><br />10. What information does an administrator require before saving the running configuration from a router to a TFTP server?<br /> router IP address and the name of the configuration file in NVRAM<br /> TFTP server IP address and the size of the configuration file in RAM<br /> *TFTP server IP address and the name of the configuration file that will be saved<br /> router IP address, size of the file and name of the configuration file on the TFTP server<br /> TFTP server IP address, the router IP address, and the router interface through which the file will be loaded<br /><br />11. If a router is unable to find a suitable IOS to load into RAM, in what mode does the boot process end?<br /> setup mode<br /> user mode<br /> *rommon mode<br /> privileged mode<br /><br />12. Which command can be used to load a new Cisco IOS image on a router?<br /> copy startup-config tftp:<br /> copy tftp: startup-config<br /> copy running-config tftp:<br /> *copy tftp: flash:<br /> copy flash: tftp:<br /> copy flash: startup-config<br /><br />13. A WIC-1T module needs to be installed in a Cisco 1841 router that currently has a WIC-2T module in slot 0. What should the network technician do first?<br /> Install the hot-swappable option module.<br /> *Turn off the power to the router before installing the new module.<br /> Remove the WIC-2T module so that the new module can be installed in slot 0.<br /> Shut down all Fast Ethernet ports on the router until the new WIC module installation is complete.<br /> Configure the Cisco IOS software to support an internal trunk link between the two WIC modules.<br /><br />14. Refer to the exhibit. An administrator installs a WIC-2T module into a Cisco 1841 router. Attempts to configure the S0/0/0 interface are unsuccessful. As a first step in troubleshooting the failure, the administrator issues the show version command. What is a possible reason for the failure?<br /> *The WIC was not physically installed properly.<br /> The WIC was installed into slot 1 instead of slot 0.<br /> The interface type and number are invalid on an 1841.<br /> The configuration register is the wrong value for adding new modules.<br /><br />15. Which IOS component can be used to classify and monitor network traffic?<br /> CDP<br /> *NBAR<br /> CiscoWorks<br /> Network Assistant<br /><br />16. Refer to the exhibit. Which type of application communication model best describes this network?<br /> *client-client<br /> client-server farm<br /> client-enterprise edge<br /> client-enterprise server<br /><br />17. What is a characteristic of FTP traffic flows?<br /> low-volume traffic<br /> predictable bandwidth usage<br /> *large packet sizes for transfers<br /> low throughput with high response-time requirements<br /><br />18. What is a function of software queuing?<br /> filters traffic on the basis of administrator defined rules<br /> stores received traffic and sends packets based on the order that the packets are received<br /> *sends packets on the basis of priorities that are manually set<br /> transmits packets in a priority sequence that is based on source port<br /><br />19. In a converged network, which two types of traffic would be categorized as real-time traffic? (Choose two.)<br /> e-mail<br /> file transfer<br /> web browsing<br /> *videoconferencing<br /> *voice over IP<br /> video on demand<br /><br />20. When implementing an IP telephony solution, why should VLANs be used?<br /> to allow the use of a single IP gateway<br /> *to separate voice from data traffic for ease of prioritization<br /> to allow the PBX to use VLAN IDs to filter both voice and data traffic<br /> to allow connectivity between traditional phone devices and IP-based telephony devices<br /><br />21. A school district decides to use the 172.30.0.0/16 network for its LAN networks. The network administrator must create an addressing scheme to support 500 users in the admin office, 200 at the high school, 60 at the elementary school and 28 at the district office. Which VLSM addressing scheme will correctly address the network with minimal waste?<br /> 172.30.0.0/20 admin<br />172.30.1.0/21 high school<br />172.30.1.8/22 elementary<br />172.30.1.12/26 district<br /> 172.30.0.0/22 admin<br />172.30.4.0/23 high school<br />172.30.5.0/24 elementary<br />172.30.6.0/26 district<br /> 172.30.0.0/23 admin<br />172.30.2.0/24 high school<br />172.30.3.0/26 elementary<br />172.30.3.64/27 district<br />* 172.30.0.0/23 admin<br />172.30.2.0/24 high school<br />172.30.3.0/25 elementary<br />172.30.3.127/26 district<br /><br />22. Refer to the exhibit. The routers are configured with RIPv2 with default configurations. When attempting to communicate with other networks, hosts from 172.16.2.0/24 are experiencing connectivity issues. What could be done to resolve this issue?<br /> Change to a public IP address scheme.<br /> *Disable automatic route summarization.<br /> Change the IP network address on R3 Fa0/0 to 172.16.1.128 /26.<br /> Change the subnet mask on the link between R2 and R3 to 255.255.255.0.<br /><br />23. Refer to the exhibit. A network administrator is validating the routing for the new network design. Which command should be used to configure the s0/0/0 interface of the SALES router to advertise the Sales Department networks as one route?<br /> SALES(config-if)# ip summary-address eigrp 100 172.16.0.0 255.255.0.0<br /> SALES(config-if)# ip summary-address eigrp 100 172.16.8.0 255.255.240.0<br /> *SALES(config-if)# ip summary-address eigrp 100 172.16.16.0 255.255.240.0<br /> SALES(config-if)# ip summary-address eigrp 100 172.16.31.0 255.255.248.0<br /><br />24. Refer to the exhibit. Which summarized route would be advertised by R1 to R2?<br /> *10.0.0.0/13<br /> 10.4.0.0/14<br /> 10.5.0.0/13<br /> 10.6.0.0/14<br /><br /><br />25. Which two values represent valid IPv6 addresses? (Choose two.)<br /> ::::1<br /> *FF01::1<br /> *0:0:0:0:0:0:0:1<br /> 2001:DB8::47::2A4<br /> 2031:0000:04AC:3400:FFE3:0<br /><br />26. A network administrator is integrating IPv6 into an IPv4 network by encapsulating one protocol packet within another protocol. Which transition method is being used?<br /> dual stack<br /> *tunneling<br /> proxying and translation<br /> NAT with Protocol Translator<br /><br />27. A network administrator is configuring a router interface with the command R1(config-if)# ipv6 address 2001:DB8:C18:1::/64 eui-64. If the MAC address of this Ethernet interface is 01-1C-70-CF-B4-30, what is the host identifier for this interface under EUI-64 format?<br /> 11C:7000:00CF:B430<br /> 11C:70FE:FECF:B430<br /> *11C:70FF:FECF:B430<br /> 11C:70FF:FFCF:B430<br /><br />28. Refer to the exhibit. Following a test plan, the network systems engineer completes the configuration of an access layer switch and connects three PCs to test the configuration. The engineer attempts to ping from each PC to the other connected PCs. Which three statements describe the expected results of pinging from one host to another? (Choose three.)<br /> Host1 can ping Host2.<br /> *Host1 cannot ping Host2.<br /> *Host1 can ping Host3.<br /> Host1 cannot ping Host3.<br /> Host2 can ping Host3.<br /> *Host2 cannot ping Host3.<br /><br />29. Refer to the exhibit. A network associate is configuring a new router to provide routing between VLANs. The associate removes the router from the box and connects the Fa0/0 interface to a trunking port on the switch. After the configuration is applied to the router, the traffic between VLANs still fails. What is causing this to occur?<br /> The NWRnStick router needs a routing protocol configured.<br /> The NWRnStick router needs additional Fast Ethernet interfaces installed.<br /> *The subinterfaces of the NWRnStick router should have IP addresses applied.<br /> All the subinterfaces of the NWRnStick router should be configured in the same VLAN.<br /><br />30. When designing a prototype network for a new server farm, a network designer chooses to use redundant links to connect to the rest of the network. Which business goal will be addressed by this choice?<br /> security<br /> scalability<br /> *availability<br /> manageability<br /><br />31. Refer to the exhibit. A company decides to install a new data center to improve the services available on the network. EIGRP is chosen as a routing protocol. VLAN 100 is the management VLAN. After a prototype network is built, the staff executes basic connectivity tests. The results show very slow convergence after a network failure. Which step should be taken by the engineers to improve the network performance?<br /> Eliminate all trunk links in the network.<br /> *Configure per-VLAN rapid spanning tree.<br /> Configure VLAN 1 as a management VLAN.<br /> At the distribution layer, replace EIGRP with RIPv2.<br /><br />32. Refer to the exhibit. EIGRP has been configured as a routing protocol in the network. Users who are connected on LAN_1 and LAN_2 can ping their default gateways. Users on LAN_1 complain that they are unable to access the resources on the file server that is connected to LAN_2. A technician issues the show ip interface brief command on R1 to verify the status of the interfaces. What information will help the technician troubleshoot the issue?<br /> *Interface S0/0/1 line protocol is down.<br /> Interface Vlan1 is administratively down.<br /> Interface Fa0/1 is missing an IP address.<br /> Interface S0/0/0 is configured with an incorrect IP address.<br /><br />33. Refer to the exhibit. During a test of an EIGRP prototype network, a network administrator issues a show ip protocols command. What two facts can be determined from the output? (Choose two.)<br /> The administrative distance is 100.<br /> *This router has one adjacent neighbor.<br /> There are 10 Cisco devices in this prototype network.<br /> The auto-summary command was applied on this router.<br /> *EIGRP is using two values for the calculation of the composite metric.<br /> EIGRP on this router will display up to four unequal cost routes to the same destination.<br /><br />34. Refer to the exhibit. A NetworkingCompany designer is reviewing a diagram of a customer network. What two risks or issues can be identified in the topology that is shown? (Choose two.)<br /> *The firewall router and ISP connection represent a single point of failure.<br /> *A failure of the switch that connects the Cisco Call Manager to the network will cause the entire IP telephony system to fail.<br /> Using Layer 3 switches to interconnect the data center servers to the IP phones introduces too much delay.<br /> The IP phones need to be redundantly connected to the switches to prevent single points of failure at the access layer.<br /> If one of the Layer 3 switches fails, the Cisco Call Manager will be unreachable.<br /><br />35. On a Monday morning the help desk at a large company receives an unusually high number of calls reporting no connectivity to the Internet or to any other network resources. Otherwise the PCs are functioning normally. Help desk technicians note that all the calls are from a single department, and all affected users are on the same floor of a single building. Where should the help desk technicians suspect that the problem lies?<br /> *workgroup switch<br /> PC power supplies<br /> patch cords from PCs to network jacks<br /> cabling from the network jack to the wiring closet<br /><br />36. Refer to the exhibit. The named ACL "Managers" already exists on the router. What will happen when the network administrator issues the commands that are shown in the exhibit?<br /> The commands overwrite the existing Managers ACL.<br /> *The commands are added at the end of the existing Managers ACL.<br /> The commands are added at the beginning of the existing Managers ACL.<br /> The network administrator receives an error that states that the ACL already exists.<br /><br />37. Refer to the exhibit. Which ACL statements, if properly placed, will prevent host 10.10.10.1 from accessing the 172.16.2.0/24 network but will permit the rest of the 10.10.10.0/24 network?<br /> access-list 10 permit 172.16.2.0 0.0.0.255<br />access-list 10 deny 10.10.10.1 0.0.0.0<br /> access-list 10 deny 10.10.10.1 0.0.0.0<br />access-list 10 permit 172.16.2.0 0.0.0.255<br />* access-list 101 deny ip 10.10.10.1 0.0.0.0 172.16.2.0 0.0.0.255<br />access-list 101 permit ip 10.10.10.0 0.0.0.255 172.16.2.0 0.0.0.255<br /> access-list 101 permit ip 10.10.10.0 0.0.0.255 172.16.2.0 0.0.0.255<br />access-list 101 deny ip 10.10.10.1 0.0.0.0 172.16.2.0 0.0.0.255<br /> access-list 10 deny 10.10.10.1 0.0.0.0<br /><br />38. Refer to the exhibit. An extended ACL has been created to deny traffic from host 192.168.20.254 to the web server with IP address 209.165.201.30. However, host 192.168.20.254 is allowed access to all resources on network 192.168.30.0/24. According to Cisco best practices, where should the ACL be applied?<br /> ISP Fa0/0 inbound<br /> ISP Fa0/0 outbound<br /> ISP S0/0/0 inbound<br /> *R2 Fa0/0 inbound<br /> R2 Fa0/0 outbound<br /> R2 S0/1/0 outbound<br /><br />39. A company is concerned with protecting internal e-commerce servers against external attacks. An application layer firewall is installed at the network edge and a host-based IDS system is installed on the internal LAN. What should be done to ensure a fast response and minimum server downtime in the event of an external attack?<br /> * Replace the host-based IDS with an IPS.<br /> Place the e-commerce servers in a DMZ.<br /> Install a logging server to monitor all attacks.<br /> Replace the application layer firewall with a stateful one.<br /><br />40. A bank is planning to add a secure, authenticated WAN connection to a rural branch office. The connection must provide bandwidth of up to 10 Mb/s with QoS supporting VoIP. Which WAN connection type should the network designer recommend?<br /> DSL<br /> ISDN<br /> *leased line<br /> Frame Relay<br /><br />41. While configuring EIGRP on a router, the technician enters this command:<br /><br />Router(config-router)# variance 8<br /><br />What is the effect of entering this command?<br /> It adjusts the cost of all EIGRP routes to 8.<br /> *It enables unequal cost load balancing on the router.<br /> It restricts the number of EIGRP feasible successor routes to 8.<br /> It enables EIGRP equal cost load balancing over a maximum of 8 routes.<br /> It modifies the number of values used in the composite metric calculation.<br /><br />42. A designer is creating a test plan to validate a WAN design that is based on Frame Relay technology. Which network device can be used in the prototype network to serve as a Frame Relay switch?<br /> DSLAM<br /> CSU/DSU<br /> Cisco 2950 switch<br /> *Cisco router with appropriate IOS<br /><br />43. Refer to the exhibit. A pre-sales systems engineer receives a diagram of the exhibited WAN implementation from a customer. EIGRP is the routing protocol that is used on the WAN. None of the parameters for EIGRP metric calculation have been modified in any router configurations. Which statement is true about the routing table on router RM?<br /> There is a single route to the 192.168.24.0/24 LAN using the T1 connection.<br /> There is a single route to the 192.168.24.0/24 LAN using the DSL connection.<br /> *There is a single route to the 192.168.24.0/24 LAN using the Metro Ethernet connection.<br /> EIGRP installs all three routes to the 192.168.24.0/24 LAN and load balances the traffic.<br /><br />44. When implementing a security policy, which two actions should be included as part of the security checklist? (Choose two.)<br /> Disable all logging.<br /> Enable Telnet on TCP port 23.<br /> Use HTTP for web administration.<br /> *Set timeouts and ACLs on VTY lines.<br /> *Shut down any unused ports and interfaces.<br /><br />45. A network administrator has configured Frame Relay on a serial interface and issued the show interfaces serial command. The output shows that the interface is up and the line protocol is up. However, pings to the remote router across the link fail. What should the next step be to ensure that the IP address of the remote router appears in the Frame Relay map table of the local router?<br /> Configure the router using the no inverse-arp command.<br /> Ensure that the LMI type is correct for the circuit.<br /> *Configure the router using the frame-relay map ip command.<br /> Verify that the remote router has Frame Relay encapsulation enabled.<br /><br />46. Refer to the exhibit. A NetworkingCompany engineer is characterizing an existing network for a new customer. The engineer issues a show running-config command on the branch router to gather configuration information. What is the engineer able to determine as a result of viewing the output of this command?<br /> The branch office router has two routes to the main office LANs in the routing table.<br /> The default route for the branch office traffic is the serial link to the Edge2 router.<br /> *A connection through ISP-A will be used to reach the main office LANs if the Frame Relay network is unavailable.<br /> By using both the DSL and the Frame Relay connection, the branch office router will load balance traffic that is destined for the main office LANs.<br /><br /><br />47. Refer to the exhibit. What can be determined about the operation of DLCI 101?<br /> It is shut down.<br /> Traffic flows in only one direction.<br /> Packet size is limited to 2000 bytes.<br /> *The Frame Relay network is experiencing congestion.<br /> All packets moving across the link are marked as discard eligible.<br /><br />48. A company establishes a Frame Relay connection between corporate headquarters and a branch office. The CIR for the connection is set at 4 Mb/s. Which statement is true about this WAN connection?<br /> The company will not be able to send data faster than 4 Mb/s.<br /> *If the company sends data faster than 4 Mb/s, some of the data frames will be flagged with a DE bit.<br /> If the company sends data faster than 4 Mb/s, the TSP will change the CIR to zero.<br /> When the company sends data faster than 4 Mb/s, the Frame Relay switch will set the BECN bit to 1 on the frames that are headed to the company.<br /><br /><br />49. The main office of a NetworkingCompany customer currently connects to three branch offices via three separate point-to-point T1 circuits. The customer network uses RIPv2 as the routing protocol within both the LAN and the WAN. The account manager proposes a change to a Frame Relay network because the costs are lower. A single local loop connection can be installed at the main office with three separate PVCs to connect the branch offices. How can the main office edge router be configured to enable the customer to continue to use RIP as the WAN routing protocol?<br /> Enable Inverse ARP on the serial interface in order to learn the routes to the IP addresses of the remote routers.<br /> To prevent the Frame Relay network from causing a routing loop, disable split horizon on the serial interface.<br /> *Create three separate point-to-point subinterfaces on the serial interface and assign a different subnet IP address to each one.<br /> Configure the serial interface with a single interface DLCI number and create frame-relay map statements for each remote site address.<br /><br /><br />50. What type of Frame Relay subinterface must be used to connect remote sites without having to disable split horizon?<br /> multipoint<br /> multiaccess<br /> *point-to-point<br /> nonbroadcast multiaccesscomputerhttp://www.blogger.com/profile/00775484145552043479noreply@blogger.com1tag:blogger.com,1999:blog-9220200559382305581.post-44802065936115600822011-03-23T22:23:00.000-07:002011-03-23T22:24:57.568-07:00<span style="font-weight: bold;">final ccna4-2</span><br /><br />1. What is a function that is associated with the access layer in a hierarchically designed network?<br /> performs routing and packet manipulation<br /> supplies redundancy and failover protection<br /> provides a high-speed, low-latency backbone<br /> *serves as a network connection point for IP telephony devices<br /><br />2. What can be broadcast over the wireless network to help a user connect to the network and use wireless services?<br /> *SSID<br /> WEP keys<br /> VLAN parameters<br /> WPA encryption keys<br /> VPN authentication information<br /><br />3. What is the advantage of choosing EasyVPN for a new VPN implementation?<br /> to provide encryption algorithms unavailable in other systems<br /> to ensure that remote workers actually use the VPN for connectivity<br /> to allow a greater variety of network devices to be used for VPN connections<br /> *to simplify the configuration tasks for the device that is used as the VPN server<br /><br />4. A company has help desk staff that is not highly trained in VPNs. What two features or technologies must the network designer identify as training needs in order for the help desk to support secure remote access for teleworkers? (Choose two.)<br /> QoS operation<br /> VLAN configuration<br /> *tunneling protocols<br /> IPv6 and IPv4 dual stack<br /> *encryption algorithms<br /> Frame Relay configuration<br /><br />5. Which statement best describes the VPN feature called split tunneling?<br /> It creates separate pathways for different VLANs.<br /> It creates two tunnels, one for user traffic and one for management traffic such as CDP and SNMP.<br /> *It allows user traffic that is destined for the corporate network to travel across the VPN tunnel, while traffic destined for the Internet travels through the local LAN of the VPN client.<br /> It allows separate tunnels so that high priority traffic, such as voice and video, uses the higher bandwidth tunnel, while all other user traffic travels on the lower bandwidth tunnel.<br /><br />6. The network infrastructure at the headquarters of an organization consists of Cisco network devices that are running RIPv1. As part of an upgrade project, a portion of the company backbone will be increased to 10 Gb/s and needs to support unequal cost load balancing between routers. The IP addressing scheme is also changing and needs to support VLSM and CIDR. Which routing protocol should be selected for the network?<br /> BGP<br /> *EIGRP<br /> OSPF<br /> RIPv2<br /><br />7. A NetworkingCompany engineer is on a support call resolving technical problems for a client network. After the issue is resolved, the engineer also provides a training session for the network support staff. What role is the engineer filling on the networking company team?<br /> *post-sales field engineer<br /> pre-sales engineer<br /> network designer<br /> account manager<br /><br />8. Refer to the exhibit. What can be concluded from the output that is shown?<br /> MDF_R1 has a MAC address of 2294:300F:0000.<br /> *MDF_R1 is connected through FastEthernet0/1 to C2960-24TT-L_IDF1.<br /> Device C2960-24TT-L_IDF1 is running Cisco IOS Software Release 12.2(25)SEE2.<br /> MDF_R1 is installed in the main distribution facility on floor 24 of building L.<br /><br />9. Refer to the exhibit. In the Cisco IOS filename that is shown, what is signified by the underlined portion?<br /> version<br /> platform<br /> *file format<br /> feature set <br /><br />10. A network administrator has removed a router from the network for maintenance. A new Cisco IOS software image has been successfully downloaded to a server and copied into the flash of the router. What should the administrator do before placing the router back into service?<br /> Delete the previous version of the Cisco IOS software from flash.<br /> Copy the new IOS into NVRAM to create a backup copy.<br /> *Restart the router and verify that the new image starts successfully.<br /> Verify the free space available on the router to store the new IOS image.<br /><br />11. What information does an administrator require before saving the running configuration from a router to a TFTP server?<br /> router IP address and the name of the configuration file in NVRAM<br /> TFTP server IP address and the size of the configuration file in RAM<br /> *TFTP server IP address and the name of the configuration file that will be saved<br /> router IP address, size of the file and name of the configuration file on the TFTP server<br /> TFTP server IP address, the router IP address, and the router interface through which the file will be loaded<br /><br />12. A network administrator needs to transfer an IOS image to a router using a TFTP server. What should be verified prior to beginning the transfer process?<br /> The TFTP server must connect to the router via a serial connection.<br /> *Connectivity between the TFTP server and the router should have been established.<br /> The TFTP server and the router must be on different networks for the transfer.<br /> The TFTP server software must be the same version as the Cisco IOS software.<br /><br />13. A network technician needs to install a four-port switch module in an operational Cisco 1841 router that has an available HWIC slot. What should the technician do first?<br /> *Turn off the power to the router before installing the new module.<br /> Install the hot-swappable four-port switch module directly into slot 1 of the 1841.<br /> Move the existing WIC-2T module to slot 1 and install the four-port module in slot 0.<br /> Shut down all Fast Ethernet ports on the router until the switch module installation is complete.<br /><br />14. Refer to the exhibit. An administrator installs a WIC-2T module into a Cisco 1841 router. Attempts to configure the S0/0/0 interface are unsuccessful. As a first step in troubleshooting the failure, the administrator issues the show version command. What is a possible reason for the failure?<br /> *The WIC was not physically installed properly.<br /> The WIC was installed into slot 1 instead of slot 0.<br /> The interface type and number are invalid on an 1841.<br /> The configuration register is the wrong value for adding new modules.<br /><br />15. Refer to the exhibit. Which type of application communication model best describes this network?<br /> *client-client<br /> client-server farm<br /> client-enterprise edge<br /> client-enterprise server<br /><br />16. If traditional phones are used when introducing VoIP to a network, what component would be required to convert the analog voice from traditional telephone signals into IP packets?<br /> Multipoint control unit<br /> Power over Ethernet switches<br /> *a router that acts as a voice gateway<br /> Cisco Unified Communications Manager <br /><br />17. Which characteristic should be considered by a network designer when implementing a VoIP solution?<br /> VoIP traffic is generally classified as low priority.<br /> VoIP centrally routes calls in the same manner as a traditional PBX.<br /> VoIP traffic is highly reliable because of retransmission of dropped packets.<br /> *VoIP can make use of QoS features to help reduce interruptions in communication.<br /><br />18. What supports the ability of streaming video to be sent to a group of viewers simultaneously without congesting the entire network?<br /> traffic queues<br /> *multicast<br /> multiple Layer 4 sessions<br /> high priority from QoS<br /><br />19. Which feature relies on prioritization of network traffic and is used to ensure successful delivery of real-time services?<br /> security<br /> reliability<br /> redundancy<br /> *quality of service<br /><br />20. When implementing an IP telephony solution, why should VLANs be used?<br /> to allow the use of a single IP gateway<br /> *to separate voice from data traffic for ease of prioritization<br /> to allow the PBX to use VLAN IDs to filter both voice and data traffic<br /> to allow connectivity between traditional phone devices and IP-based telephony devices<br /><br />21. Refer to the exhibit. What problem is associated with the the addressing scheme of the network?<br /> The WAN links need IP addresses from a different major network.<br /> The R1 LAN is incorrect because subnet zero cannot be used with VLSM.<br /> The WAN link IP address that connects R1 to R3 has an incorrect mask.<br /> *The R1 to R3 and R1 to R2 WAN links have IP addresses that overlap.<br /> The WAN IP address that connects R1 to R2 overlaps with the R3 LAN IP addresses.<br /><br />22. A customer of a large multisite organization has asked a network engineer to compare a new IPv4 addressing strategy with an IPv6 strategy for their new network implementation. Which tool is appropriate for testing and comparing both addressing schemes?<br /> NBAR<br /> Cisco SDM<br /> Network Assistant<br /> *network simulation tool<br /><br />23. A network administrator wants to configure a router that is running EIGRP so that it will advertise a route that will summarize the networks that are shown. Which network will summarize only these networks?<br /><br />192.168.12.0/24<br />192.168.13.0/24<br />192.168.14.0/24<br />192.168.15.0/24<br /><br /> 192.168.0.0/16<br /> 192.168.0.0/20<br /> 192.168.8.0/21<br /> *192.168.12.0/22<br /> 192.168.16.0/22<br /><br />24. A school district decides to use the 172.30.0.0/16 network for its LAN networks. The network administrator must create an addressing scheme to support 500 users in the admin office, 200 at the high school, 60 at the elementary school and 28 at the district office. Which VLSM addressing scheme will correctly address the network with minimal waste?<br /> 172.30.0.0/20 admin<br />172.30.1.0/21 high school<br />172.30.1.8/22 elementary<br />172.30.1.12/26 district<br /> 172.30.0.0/22 admin<br />172.30.4.0/23 high school<br />172.30.5.0/24 elementary<br />172.30.6.0/26 district<br /> 172.30.0.0/23 admin<br />*172.30.2.0/24 high school<br />172.30.3.0/26 elementary<br />172.30.3.64/27 district<br /> 172.30.0.0/23 admin<br />172.30.2.0/24 high school<br />172.30.3.0/25 elementary<br />172.30.3.127/26 district<br /><br />25. Refer to the exhibit. All router interfaces are up and RIP version 2 is configured as the routing protocol. The users in networks 172.16.8.0 /24 and 172.16.9.0/24 are not able to reach users in the 172.16.16.0/24 network. The network administrator examines the routing tables and finds that even though all directly connected networks have been entered in the RIP configuration, not all routes are present. What is the most likely cause of this problem?<br /> *Autosummarization is enabled on all routers.<br /> The split-horizon rule is disabled on all routers.<br /> RIP version 2 does not support classless routing.<br /> RIP version 1 should have been used instead of version 2.<br /> The 10.10.4.0 networks should be replaced with 192.168.4.0 networks.<br /><br />26. Which two processes allow a smooth transition from IPv4 to IPv6? (Choose two.)<br /> IPSec<br /> *tunneling<br /> *dual stack<br /> authentication<br /> anycast addressing<br /> header simplification<br /><br />27. Which two values represent valid IPv6 addresses? (Choose two.)<br /> ::::1<br /> *FF01::1<br /> *0:0:0:0:0:0:0:1<br /> 2001:DB8::47::2A4<br /> 2031:0000:04AC:3400:FFE3:0<br /><br />28. A network administrator of a middle-sized company is asked to upgrade the routing protocol of the network to support VLSM and route summarization. The current company network contains both Cisco and non-Cisco routers. Which routing protocol should be used for the upgrade?<br /> BGP<br /> RIPv1<br /> *RIPv2<br /> EIGRP<br /><br />29. During prototype testing, a LAN switch fails. As the switch re-initializes using the default parameters, a port that has a PC attached transitions to the forwarding state within one second. What protocol would support this feature?<br /> STP<br /> RIP<br /> BGP<br /> VTP<br /> *RSTP<br /><br />30. Refer to the exhibit. Based on the output, which statement is correct? Switch2 is the root bridge.<br /> Traffic will use Fa0/1 as an alternative link if Gi0/1 is busy.<br /> All traffic with a destination on another switch will exit via Gi0/1.<br /> *The port cost on Gi0/1 has been changed from its default settings.<br /><br />31. When designing a prototype network for a new server farm, a network designer chooses to use redundant links to connect to the rest of the network. Which business goal will be addressed by this choice?<br /> security<br /> scalability<br /> *availability<br /> manageability<br /><br />32. Refer to the exhibit. To provide better customer service, the network management decides to implement a new server farm, which is located in a data center. Which two technology implementations will address the requirements for strict security policies to prevent unauthorized access to the server farm? (Choose two.)<br /> *Install firewalls and IDS capabilities on the network.<br /> Apply ACLs to permit only inbound TCP traffic to the servers.<br /> *Apply filters that permit traffic only to required ports on the servers.<br /> Configure a flexible IP addressing structure that allocates a single subnet per VLAN.<br /> Configure a fast-converging routing protocol with authentication at the core layer.<br /> Create a management VLAN and provide access to the data center devices through Telnet.<br /> Interface Fa0/1 on Switch2 has no role in the operation of spanning tree.<br /><br />33. A wireless survey has been conducted before the deployment of a wireless network. What would be the benefit of the survey?<br /> provides initial configuration of the access points<br /> determines the channel settings of the access points<br /> determines the security settings on the access points<br /> *finds the optimal number and placement of access points<br /><br />34. Refer to the exhibit. What does the TOR router do with traffic that is destined for a web server with an IP address of 172.18.10.24?<br /> *The router sends the traffic out Serial 0/0/0.<br /> The router sends the traffic out all interfaces other than the one it came in on.<br /> The router places the packets into a queue until a better route is discovered via RIP.<br /> The router sends a request to neighboring routers for paths to the 172.18.10.0 network.<br /><br />35. A user in a large office calls technical support to complain that a PC has suddenly lost connectivity to the network. The technician asks the caller to talk to nearby users to see if other machines are affected. The caller reports that several immediate neighbors in the same department have a similar problem and that they cannot ping each other. Those who are seated in other departments have connectivity. What should the technician check as the first step in troubleshooting the issue?<br /> the power outlet to the PC that is used by the caller.<br /> the trunks between switches in the wiring closet.<br /> *the status of the departmental workgroup switch in the wiring closet.<br /> the cable that connects the PC of the caller to the network jack.<br /> the cable connection between a PC and a network outlet that is used by a neighbor.<br /><br />36. A company would like to ensure that the failure of a single access switch does not disrupt service to the mail servers located in the data center. What can be done to ensure maximum connectivity to the mail servers?<br /> Enable CDP to ensure all neighboring devices are known.<br /> Create a separate RSTP specifically for the mail servers.<br /> Configure a routing protocol so that paths to all Layer 3 devices are cached.<br /> *Install redundant access links between the servers and the access layer switches.<br /><br />37. Refer to the exhibit. An extended ACL has been created to deny traffic from the 192.168.35.0/24 network to the web server with IP address 209.165.201.15. According to Cisco best practices, where should the ACL be applied?<br /> *RTB Fa0/0 inbound<br /> RTC S0/0/1 inbound<br /> RTD Fa0/0 outbound<br /> RTC S0/1/0 outbound<br /><br />38. Refer to the exhibit. The named ACL "Managers" already exists on the router. What will happen when the network administrator issues the commands that are shown in the exhibit?<br /> The commands overwrite the existing Managers ACL.<br /> *The commands are added at the end of the existing Managers ACL.<br /> The commands are added at the beginning of the existing Managers ACL.<br /> The network administrator receives an error that states that the ACL already exists.<br /><br />39. A company is concerned with protecting internal e-commerce servers against external attacks. An application layer firewall is installed at the network edge and a host-based IDS system is installed on the internal LAN. What should be done to ensure a fast response and minimum server downtime in the event of an external attack?<br /> *Replace the host-based IDS with an IPS.<br /> Place the e-commerce servers in a DMZ.<br /> Install a logging server to monitor all attacks.<br /> Replace the application layer firewall with a stateful one.<br /><br />40. Which two security best practices are recommended for a router deployed as a WAN endpoint? (Choose two.)<br /> *Turn off unnecessary services.<br /> Enable HTTP for web administration.<br /> Configure easy to remember passwords.<br /> *Apply timeouts on VTY, AUX, and console ports.<br /> Enable Telnet access to allow for remote management.<br /><br />41. Company XYZ requires a WAN solution that provides flexible bandwidth options and supports one physical interface at the head office that would provide simultaneous connectivity to various remote sites. The distance from each site should not make the solution more expensive. Which WAN technology meets the requirements of the company?<br /> DSL<br /> cable<br /> *Frame Relay<br /> T1 leased line<br /><br />42. A technician adds the command Router(config-router)# variance 5 to a router using EIGRP as the routing protocol. What is the result of entering this command?<br /> *enables unequal cost load balancing<br /> adjusts the metric of all EIGRP routes to 5<br /> restricts the number of EIGRP feasible successor routes to 5<br /> activates the use of all K values in the composite metric calculation<br /> enables EIGRP equal cost load balancing over a maximum of 5 routes<br /><br />43. Refer to the exhibit. A pre-sales system engineer receives a diagram of the current WAN from a customer. EIGRP is the routing protocol used on the WAN. Based on the default operation of EIGRP, which statement is true about the routing table on router R1?<br /> There is a single route to the 192.168.16.0/24 LAN using the T1 connection.<br /> There is a single route to the 192.168.16.0/24 LAN using the DSL connection.<br /> *There is a single route to the 192.168.16.0/24 LAN using the Metro Ethernet connection.<br /> EIGRP installs all three routes to the 192.168.16.0/24 LAN and load balances the traffic.<br /><br />44. Which feature of network design and configuration would be considered a weakness?<br /> *Choosing a flat network model.<br /> Choosing to implement an IPS instead of IDS.<br /> Choosing to disable Telnet and allow only SSH connections for remote access to the core routers.<br /> Choosing not to broadcast the SSID for wireless access points. <br /><br />45. Refer to the exhibit. What can the field engineer conclude about the EIGRP authentication between Router1 and Router2?<br /> Authentication will fail because only one key is configured.<br /> *Authentication will succeed and EIGRP updates can be exchanged.<br /> Authentication will fail because the key chain names do not match.<br /> Authentication will fail because the key chain names must match the router names.<br /><br />46. Refer to the exhibit. A networking engineer is characterizing an existing network for a new customer. The engineer issues a show running-config command on the R1 router to gather configuration information. What is the engineer able to determine as a result of viewing the output of this command?<br /> The R1 router has two specific routes to the main office LANs in the routing table.<br /> The default route for the R1 router points to the Edge1 router.<br /> The R1 router will load-balance traffic to the main office LANs by using both DSL and Frame Relay.<br /> *A connection through ISP-1 will be used to reach the main office LANs if the Frame Relay network is unavailable.<br /><br /><br />47. A network administrator has configured Frame Relay on a serial interface and issued the show interfaces serial command. The output shows that the interface is up and the line protocol is up. However, pings to the remote router across the link fail. What should the next step be to ensure that the IP address of the remote router appears in the Frame Relay map table of the local router?<br /> Configure the router using the no inverse-arp command.<br /> Ensure that the LMI type is correct for the circuit.<br /> *Configure the router using the frame-relay map ip command.<br /> Verify that the remote router has Frame Relay encapsulation enabled.<br /><br />48. What are two accurate descriptors of a DLCI? (Choose two.)<br /> *Frame Relay Layer 2 address<br /> one DLCI allowed per local loop<br /> *locally significant circuit endpoint<br /> signaling standard between DTE and DCE<br /> establishes the data transfer rate through a Frame Relay network<br /><br />49. The main office of a NetworkingCompany customer currently connects to three branch offices via three separate point-to-point T1 circuits. The customer network uses RIPv2 as the routing protocol within both the LAN and the WAN. The account manager proposes a change to a Frame Relay network because the costs are lower. A single local loop connection can be installed at the main office with three separate PVCs to connect the branch offices. How can the main office edge router be configured to enable the customer to continue to use RIP as the WAN routing protocol?<br /> Enable Inverse ARP on the serial interface in order to learn the routes to the IP addresses of the remote routers.<br /> To prevent the Frame Relay network from causing a routing loop, disable split horizon on the serial interface.<br /> *Create three separate point-to-point subinterfaces on the serial interface and assign a different subnet IP address to each one.<br /> Configure the serial interface with a single interface DLCI number and create frame-relay map statements for each remote site address.<br /> <br /><br /><span style="font-weight: bold;">final ccna4-3</span><br /><br />1. What can be broadcast over the wireless network to help a user connect to the network and use wireless services?<br /> *SSID<br /> WEP keys<br /> VLAN parameters<br /> WPA encryption keys<br /> VPN authentication information<br /><br />2. The network designer recommends using RSTP in the design of a new data center. There are multiple redundant Layer 2 switches and links contained in the new design. What is the benefit of using RSTP rather than STP in this situation?<br /> Redundant links are not blocked.<br /> Routing tables converge more quickly.<br /> *Spanning Tree convergence times are reduced.<br /> Fewer redundant links are required to maintain connectivity.<br /><br />3. Several key servers in an organization must be directly accessible from the Internet. What addressing policy should be implemented for these servers?<br /> Use dynamic NAT to provide addresses for the servers.<br /> Place all of the servers in their own Class C private subnet.<br /> Use DHCP to assign addresses from the pool of Class B addresses.<br /> *Assign static internal addresses and public external addresses to each of the servers.<br /><br />4. During a review of the proposed bill of materials, an account manager of the network solution company realizes that the systems engineer included a switch with lower cost and reduced capabilities for the access layer than was originally specified by the network designer. When questioned, the systems engineer responds that the switches specified by the designer cannot be purchased within the budget limitations of the customer. Which action should the account manager take?<br /> Inform the customer that the project budget must be increased.<br /> Inform the customer that the project cannot be completed given the unreasonable budget constraints.<br /> *Communicate any risks that are associated with the equipment substitution and obtain customer approval to proceed.<br /> Because the customer is probably aware that the budget limitations will require lower cost, less capable equipment, the account manager should do nothing.<br /><br />5. A network designer has chosen to specify the use of a dedicated firewall appliance at the perimeter of a large network. Why would the designer use a dedicated firewall rather than using the Cisco IOS firewall feature set on the existing router?<br /> Traffic filtering is needed on the internal LAN.<br /> Multiple levels of access to the network are needed.<br /> The DMZ requires packet filtering and port blocking.<br /> *Heavy network traffic will be handled best by using a dedicated device.<br /><br />6. An administrator is charged with providing guaranteed quality of service for certain applications. What technical requirement does QoS help to satisfy?<br /> *availability<br /> manageability<br /> security<br /> scalabilty<br /><br />7. A network engineer is at a customer site. After resolving technical problems in the network, the engineer provides a training session for the support staff. Which job function best fits the activities of this network engineer?<br /> network designer<br /> account manager<br /> pre-sales engineer<br /> *post-sales field engineer<br /><br />8. Refer to the exhibit. What can be concluded from the output that is shown?<br /> MDF_2811 has a MAC address of 2294:300F:0000.<br /> *Device C3750-24_IDF2 is running Cisco IOS Software Release 12.3(23)SEE2.<br /> A Cisco 3750 switch is connected to the FastEthernet1/0/1 port on MDF_2811.<br /> MDF_2811 is installed in the main distribution facility on floor 28 of building 11.<br /><br />9. What is the purpose of a network baseline?<br /> to add access control capabilities to the network<br /> to reserve a spot in a rack for installing network equipment<br /> to create a configuration template for quickly configuring new equipment<br /> *to establish a point of reference for comparison with current performance<br /><br />10. Refer to the exhibit. The network administrator has used the Cisco Feature Navigator to choose a Cisco IOS image to install on a router. Given the exhibited output of the show version command, which statement is true about the capacity of the router to use this Cisco IOS image?<br /> There is enough DRAM and flash.<br /> There is not enough DRAM and flash.<br /> There is enough DRAM but not enough flash.<br /> *There is not enough DRAM but enough flash.<br /><br />11. Which two pieces of information are needed before an IOS image may be loaded on a router from a TFTP server? (Choose two.)<br /> *the IP address of the TFTP server<br /> the current name of the IOS image on the router<br /> the operating system of the TFTP server<br /> the name of the configuration file in NVRAM<br /> *the name of the IOS image on the TFTP server<br /> encapsulation of the router interface that is connected to the TFTP server<br /><br />12. During the boot process and using the default sequence, what is the first location where the router will look for the IOS?<br /> ROM<br /> *flash<br /> NVRAM<br /> TFTP server<br /><br />13. A network administrator needs to transfer an IOS image to a router using a TFTP server. What should be verified prior to beginning the transfer process?<br /> The TFTP server must connect to the router via a serial connection.<br /> *Connectivity between the TFTP server and the router should have been established.<br /> The TFTP server and the router must be on different networks for the transfer.<br /> The TFTP server software must be the same version as the Cisco IOS software.<br /><br />14. A network technician needs to install a four-port switch module in an operational Cisco 1841 router that has an available HWIC slot. What should the technician do first?<br /> *Turn off the power to the router before installing the new module.<br /> Install the hot-swappable four-port switch module directly into slot 1 of the 1841.<br /> Move the existing WIC-2T module to slot 1 and install the four-port module in slot 0.<br /> Shut down all Fast Ethernet ports on the router until the switch module installation is complete.<br /><br />15. Why is it difficult for network designers to predict the patterns and behavior of file transfer traffic?<br /> *The traffic is user initiated.<br /> File size is typically very small.<br /> Dedicated bandwidth is essential.<br /> All file transfer traffic is queued as high priority.<br /><br />16. What functionality does NBAR provide to network technicians?<br /> provides data which can be used to create a network diagram<br /> allows for monitoring and managing network devices<br /> *allows for classification and monitoring of network traffic<br /> displays the IOS versions and IP addresses on neighboring devices<br /><br />17. What type of system connects to the PSTN and uses a PBX to route calls via analog or digital lines?<br /> VPN<br /> VoIP<br /> IP telephony<br /> *traditional telephony<br /><br />18. Which statement is true about the pairing of services and transport layer protocols for FTP and VoIP?<br /> FTP applications and VoIP use TCP at the transport layer.<br /> FTP applications and VoIP use UDP at the transport layer.<br /> *FTP applications use TCP at the transport layer while VoIP uses UDP at the transport layer.<br /> FTP applications use UDP at the transport layer while VoIP uses TCP at the transport layer.<br /><br />19. Which technology will prioritize traffic based upon the technical requirements of IP telephony?<br /> PoE<br /> *QoS<br /> RPC<br /> RTP<br /> VPN<br /><br />20. A network engineer is prototyping a new IP addressing and summarization strategy for a new network that will be integrated into the existing infrastructure. Which method is appropriate for testing the addressing scheme?<br /> using the production network of the customer<br /> using actual network equipment in a lab<br /> using the Cisco Network Assistant<br /> *using a network simulation tool<br /><br />21. In a converged network, which two types of traffic would be categorized as real-time traffic? (Choose two.)<br /> e-mail<br /> file transfer<br /> web browsing<br /> *videoconferencing<br /> *voice over IP<br /> video on demand<br /><br />22. Refer to the exhibit. A customer has a problem with connectivity in the network. Based on the IP addressing scheme, what is causing the problem?<br /> The WAN links need IP addresses from a different major network.<br /> *The WAN link that connects R1 to R2 overlaps with the R3 LAN.<br /> The WAN links that connect R1 to R3 and R1 to R2 have incorrect masks.<br /> The R1 LAN is incorrect because subnet zero cannot be used with VLSM.<br /><br />23. A network administrator is given a network address of 192.168.1.64/26 to create four subnets with seven hosts in each subnet. Which subnet mask should be used?<br /> 255.255.255.224<br /> *255.255.255.240<br /> 255.255.255.248<br /> 255.255.255.252<br /><br />24. Refer to the exhibit. The routers are configured with RIPv2 with default configurations. When attempting to communicate with other networks, hosts from 10.0.11.0/24 are experiencing connectivity issues. What could be done to resolve this issue?<br /> Change to a public IP addressing scheme.<br /> Use EIGRP with its default configuration as the routing protocol.<br /> Change the subnet mask on the link between R2 and R3 to 255.255.255.0.<br /> *Disable automatic route summarization on all routers in the network.<br /><br />25. Refer to the exhibit. Which summarized route would be advertised by R1 to R2?<br /> *10.0.0.0/13<br /> 10.4.0.0/14<br /> 10.5.0.0/13<br /> 10.6.0.0/14<br /><br />26. What value is an alternative representation of the IPv6 address 2001:DB80:0000:0000:0C41:3EFF:FE00:0000?<br /> 2001:DB8::C41:3EFF:FE:<br /> 2001:DB80::C41:3EFF:FE00::<br /> *2001:DB80::C41:3EFF:FE00:0<br /> 2001:DB80:0:0:0:C41:3EFF:FE::<br /><br />27. A network administrator is integrating IPv6 into an IPv4 network by encapsulating an IPV6 packet within an IPv4 protocol. Which transition method is being used?<br /> *tunneling<br /> dual stack<br /> proxying and translation<br /> NAT with Protocol Translator<br /><br />28. Refer to the exhibit. A network associate is configuring a new router to provide routing between VLANs. The associate removes the router from the box and connects the Fa0/0 interface to a trunking port on the switch. After the configuration is applied to the router, the traffic between VLANs still fails. What is causing this to occur?<br /> The NWRnStick router needs a routing protocol configured.<br /> The NWRnStick router needs additional Fast Ethernet interfaces installed.<br /> *The subinterfaces of the NWRnStick router should have IP addresses applied.<br /> All the subinterfaces of the NWRnStick router should be configured in the same VLAN.<br /><br />29. A network designer must select a routing protocol for the network of a customer. The currently installed network contains both Cisco and non-Cisco routers, and there is no budget to replace them. The designer plans on implementing both VLSM and route summarization in the new network design. Which two protocols can provide the necessary functionality for this LAN? (Choose two.)<br /> RTP<br /> RSTP<br /> RIPv1<br /> *RIPv2<br /> EIGRP<br /> *OSPF<br /><br />30. Refer to the exhibit. What result can be expected for STP in VLAN1?<br /> DSW1 is the root bridge. DSW3 would become root upon failure of DSW1.<br /> *DSW2 is the root bridge. DSW3 would become root upon failure of DSW2.<br /> DSW3 is the root bridge. DSW1 would become root upon failure of DSW3.<br /> DSW3 is the root bridge. DSW2 would become root upon failure of DSW3.<br /><br />31. Refer to the exhibit. The users on the 192.168.10.128/26 network are not allowed Internet access. Where is the most efficient location to place an extended ACL?<br /> inbound on S0/0/0 of R1<br /> outbound on S0/0/1 of R1<br /> *inbound on Fa0/0 of R2<br /> outbound on Fa0/0 of R2<br /> inbound on S0/0/1 of R2<br /><br />32. Refer to the exhibit. What does the TOR router do with traffic that is destined for a web server with an IP address of 172.18.10.24?<br /> *The router sends the traffic out Serial 0/0/0.<br /> The router sends the traffic out all interfaces other than the one it came in on.<br /> The router places the packets into a queue until a better route is discovered via RIP.<br /> The router sends a request to neighboring routers for paths to the 172.18.10.0 network.<br /><br />33. A user in a large office calls technical support to complain that a PC has suddenly lost connectivity to the network. The technician asks the caller to talk to nearby users to see if other machines are affected. The caller reports that several immediate neighbors in the same department have a similar problem and that they cannot ping each other. Those who are seated in other departments have connectivity. What should the technician check as the first step in troubleshooting the issue?<br /> the power outlet to the PC that is used by the caller.<br /> the trunks between switches in the wiring closet.<br /> *the status of the departmental workgroup switch in the wiring closet.<br /> the cable that connects the PC of the caller to the network jack.<br /> the cable connection between a PC and a network outlet that is used by a neighbor.<br /><br />34. Refer to the exhibit. A technician at the ISP site asks the network administrator at the client site to change the CHAP password as part of the routing security maintenance. After the administrator makes the change and reboots the router, the technician issues a show interfaces serial 0/0/0 command. According to the output, what can be concluded about the serial connection between the client site and ISP site?<br /> The router at the client site is still in the process of rebooting.<br /> *The administrator probably configured the wrong password.<br /> The administrator has not issued a no shut command on the serial interface.<br /> The administrator probably configured the wrong IP address for the serial interface.<br /><br />35. Refer to the exhibit. A network engineer issues the show ip route command to validate that the newly designed network is working as anticipated. Which users will the Admin_LAN be able to communicate with?<br /> Users on the Admin_LAN will not be able to communicate with users on either LAN.<br /> *Users on the Admin_LAN will be able to communicate with the users on the Faculty_LAN.<br /> Users on the Admin_LAN will be able to communicate with the users on the Student_LAN.<br /> Users on the Admin_LAN will be able to communicate with the users on the Faculty_LAN and the Student_LAN. <br /><br />36. Refer to the exhibit. A NetworkingCompany designer is reviewing a diagram of a customer network. What two risks or issues can be identified in the topology that is shown? (Choose two.)<br /> *The firewall router and ISP connection represent a single point of failure.<br /> *A failure of the switch that connects the Cisco Call Manager to the network will cause the entire IP telephony system to fail.<br /> Using Layer 3 switches to interconnect the data center servers to the IP phones introduces too much delay.<br /> The IP phones need to be redundantly connected to the switches to prevent single points of failure at the access layer.<br /> If one of the Layer 3 switches fails, the Cisco Call Manager will be unreachable.<br /><br />37. Refer to the exhibit. A company with four servers in its server farm has not enabled PVRST on the switches that connect to the server farm segment. What will happen within the network if a primary link goes down?<br /> Access to the the servers will be lost.<br /> *Convergence time will be slow and possibly cause applications to time out.<br /> Routing protocols will not send the triggered updates in the event of a failure of the root bridge.<br /> Switches that connect the servers to the network will not be found by other switches in the network.<br /><br />38. Refer to the exhibit. The named ACL "Managers" already exists on the router. What will happen when the network administrator issues the commands that are shown in the exhibit?<br /> The commands overwrite the existing Managers ACL.<br /> *The commands are added at the end of the existing Managers ACL.<br /> The commands are added at the beginning of the existing Managers ACL.<br /> The network administrator receives an error that states that the ACL already exists.<br /><br />39. A company has branch offices at several locations across the country. Which security implementation would provide a cost-effective, secure, and authenticated connection to centralized internal resources that are located at company headquarters, without requiring configuration for individual employees at the branch offices?<br /> leased line with PPP authentication<br /> *site-to-site VPN<br /> access control list<br /> remote-access VPN<br /><br />40. A company is concerned with protecting internal e-commerce servers against external attacks. An application layer firewall is installed at the network edge and a host-based IDS system is installed on the internal LAN. What should be done to ensure a fast response and minimum server downtime in the event of an external attack?<br /> */Replace the host-based IDS with an IPS.<br /> Place the e-commerce servers in a DMZ.<br /> Install a logging server to monitor all attacks.<br /> Replace the application layer firewall with a stateful one.<br /><br />41. Refer to the exhibit. What will be the result of entering the commands as shown in the exhibit?<br /> RIPng will not be enabled on interface fa0/0 because the network address is a broadcast address.<br /> RIPng will not be enabled on this interface because the IPv6 address is only /64 bits long.<br /> *RIPng will be enabled on interface fa0/0 and will advertise the configured network.<br /> The IPv6 interface configuration requires a network statement for the network.<br /> The IPv6 routing instance must be called RTA not RT0.<br /><br />42. Refer to the exhibit. A pre-sales system engineer receives a diagram of the current WAN from a customer. EIGRP is the routing protocol used on the WAN. Based on the default operation of EIGRP, which statement is true about the routing table on router R1?<br /> There is a single route to the 192.168.16.0/24 LAN using the T1 connection.<br /> There is a single route to the 192.168.16.0/24 LAN using the DSL connection.<br /> *There is a single route to the 192.168.16.0/24 LAN using the Metro Ethernet connection.<br /> EIGRP installs all three routes to the 192.168.16.0/24 LAN and load balances the traffic.<br /><br /><br />43. To reduce unwanted incoming traffic from the outside, a network technician is tasked with establishing the filtering rules for the network firewall. Which traffic should be allowed?<br /> incoming ICMP traffic<br /> all incoming connections to internal servers<br /> *incoming responses to traffic that is generated from the inside<br /> incoming connections from the outside that duplicate inside addresses<br /><br />44. Refer to the exhibit. Based on the EIGRP configuration that is shown, what can the field engineer conclude about the EIGRP authentication between RouterA and RouterB?<br /> Authentication will fail because only one key is configured.<br /> Authentication will fail because the key chain names do not match.<br /> *Authentication will succeed and EIGRP updates can be exchanged.<br /> Authentication will fail because the key chain names must match the router names.<br /><br />45. Refer to the exhibit. A networking company engineer is characterizing an existing network for a new customer. The engineer issues a show running-config command on the branch router to gather configuration information. What is the engineer able to determine as a result of viewing the output of this command?<br /> *Branch office traffic will be routed through the Frame Relay connection to reach the main office LANs.<br /> The default route for the branch office traffic uses a path through the Frame Relay network.<br /> Under normal circumstances, the connection through ISP-A will be used to reach the main office LANs.<br /> By using both the DSL and the Frame Relay connection, the branch office router will load balance traffic that is destined for the main office LANs.<br /><br />46. A network administrator has configured Frame Relay on a serial interface and issued the show interfaces serial command. The output shows that the interface is up and the line protocol is up. However, pings to the remote router across the link fail. What should the next step be to ensure that the IP address of the remote router appears in the Frame Relay map table of the local router?<br /> Configure the router using the no inverse-arp command.<br /> Ensure that the LMI type is correct for the circuit.<br /> *Configure the router using the frame-relay map ip command.<br /> Verify that the remote router has Frame Relay encapsulation enabled.<br /><br />47. Which two statements accurately describe the result of entering the command BRT(config-if)# frame-relay map ip 10.1.10.1 35 on a router? (Choose two.)<br /> The remote router updates the Frame Relay map table with DLCI 35 to reach the 10.1.10.0 network.<br /> Inverse ARP is used to add an entry for 10.1.10.1 into the Frame Relay map table via the use of DLCI 35.<br /> DLCI 35 replaces the MAC address in the ARP table for entry 10.1.10.1.<br /> *A Layer 2 address is statically mapped to a Layer 3 address.<br /> *Router BRT uses DLCI 35 to forward data to 10.1.10.1.<br /><br />48.The main office of a NetworkingCompany customer currently connects to three branch offices via three separate point-to-point T1 circuits. The customer network uses RIPv2 as the routing protocol within both the LAN and the WAN. The account manager proposes a change to a Frame Relay network because the costs are lower. A single local loop connection can be installed at the main office with three separate PVCs to connect the branch offices. How can the main office edge router be configured to enable the customer to continue to use RIP as the WAN routing protocol?<br /> Enable Inverse ARP on the serial interface in order to learn the routes to the IP addresses of the remote routers.<br /> To prevent the Frame Relay network from causing a routing loop, disable split horizon on the serial interface.<br /> *Create three separate point-to-point subinterfaces on the serial interface and assign a different subnet IP address to each one.<br /> Configure the serial interface with a single interface DLCI number and create frame-relay map statements for each remote site address.<br /><br />49. A company plans to establish Frame Relay connections between corporate headquarters and several branch offices. The network designer recommends using one physical interface on the edge router to support the new Frame Relay connections. The company currently uses RIPv2 for routing and plans no changes to the RIPv2 configuration. What should be done to ensure that each branch office link is a separate subnet and that routing updates are successful between corporate headquarters and the branch offices?<br /> Configure multipoint subinterfaces on the physical interface.<br /> *Configure point-to-point subinterfaces on the physical interface.<br /> Configure a single subinterface to establish multiple PVC connections.<br /> Configure the physical interface to share one DLCI to multiple remote sites and their connections.<br /><br />50. What is used locally by a router to identify each Frame Relay PVC?<br /> LMI<br /> *DLCI<br /> IP address<br /> MAC addresscomputerhttp://www.blogger.com/profile/00775484145552043479noreply@blogger.com0tag:blogger.com,1999:blog-9220200559382305581.post-22704603163015492932011-03-08T18:23:00.000-08:002011-03-08T18:24:53.971-08:00<span style="font-weight: bold;">CCNA 4-1 </span><br /><br />1. What can be broadcast over the wireless network to help a user connect to the network and use wireless services?<br /> * SSID<br /> WEP keys<br /> VLAN parameters<br /> WPA encryption keys<br /> VPN authentication information<br /><br />2. The network designer recommends using RSTP in the design of a new data center. There are multiple redundant Layer 2 switches and links contained in the new design. What is the benefit of using RSTP rather than STP in this situation?<br /> Redundant links are not blocked.<br /> Routing tables converge more quickly.<br /> * Spanning Tree convergence times are reduced.<br /> Fewer redundant links are required to maintain connectivity.<br /><br />3. A NetworkingCompany engineer is on a support call resolving technical problems for a client network. After the issue is resolved, the engineer also provides a training session for the network support staff. What role is the engineer filling on the networking company team?<br /> * post-sales field engineer<br /> pre-sales engineer<br /> network designer<br /> account manager<br /><br />4. What is a function that is associated with the access layer in a hierarchically designed network?<br /> performs routing and packet manipulation<br /> supplies redundancy and failover protection<br /> provides a high-speed, low-latency backbone<br /> * serves as a network connection point for IP telephony devices<br /><br />5. A company has help desk staff that is not highly trained in VPNs. What two features or technologies must the network designer identify as training needs in order for the help desk to support secure remote access for teleworkers? (Choose two.)<br /> QoS operation<br /> VLAN configuration<br /> * tunneling protocols<br /> IPv6 and IPv4 dual stack<br /> * encryption algorithms<br /> Frame Relay configuration<br /><br />6. A network designer has chosen to specify the use of a dedicated firewall appliance at the perimeter of a large network. Why would the designer use a dedicated firewall rather than using the Cisco IOS firewall feature set on the existing router?<br /> Traffic filtering is needed on the internal LAN.<br /> Multiple levels of access to the network are needed.<br /> The DMZ requires packet filtering and port blocking.<br /> * Heavy network traffic will be handled best by using a dedicated device.<br /><br />7. What type of ACL permits outbound traffic, but permits inbound traffic only if it is a response to the traffic that is initiated from inside the network?<br /> dynamic<br /> * reflexive<br /> standard<br /> extended<br /> time-based<br /><br />8. The network infrastructure at the headquarters of an organization consists of Cisco network devices that are running RIPv1. As part of an upgrade project, a portion of the company backbone will be increased to 10 Gb/s and needs to support unequal cost load balancing between routers. The IP addressing scheme is also changing and needs to support VLSM and CIDR. Which routing protocol should be selected for the network?<br /> BGP<br /> *EIGRP<br /> OSPF<br /> RIPv2<br /><br />9. At the distribution layer of a hierarchical network, what are two advantages of using Layer 3 devices instead of Layer 2 switches? (Choose two.)<br /> provides reliable connectivity to end users<br /> creates fewer IP subnets to configure and manage<br /> reduces the number of redundant links required<br /> * provides connectivity between different VLANs<br /> * enables traffic filtering based on subnet addresses<br /><br />10. A company uses the Frame Relay network to establish a VPN connection between headquarters and the branch office. The company wants to add a backup link in case the Frame Relay connection fails. The backup link will use the business DSL connection through another ISP. How should the router be configured to include the backup link?<br /> Create a static route with the administrative distance of 1.<br /> *Create a floating static route.<br /> Add a new route to the routing protocol configuration.<br /> Create a second default route for the backup path.<br /><br />11. A WIC-1T module needs to be installed in a Cisco 1841 router that currently has a WIC-2T module in slot 0. What should the network technician do first?<br /> Install the hot-swappable option module.<br /> * Turn off the power to the router before installing the new module.<br /> Remove the WIC-2T module so that the new module can be installed in slot 0.<br /> Shut down all Fast Ethernet ports on the router until the new WIC module installation is complete.<br /> Configure the Cisco IOS software to support an internal trunk link between the two WIC modules.<br /><br />12. Which two pieces of information are needed before an IOS image may be loaded on a router from a TFTP server? (Choose two.)<br /> * the IP address of the TFTP server<br /> the current name of the IOS image on the router<br /> the operating system of the TFTP server<br /> the name of the configuration file in NVRAM<br /> * the name of the IOS image on the TFTP server<br /> encapsulation of the router interface that is connected to the TFTP server<br /><br />13. As part of network monitoring, a network administrator receives an alert that the CPU usage of the core router reaches 90% several times a day. Which protocol is in use to monitor the network performance?<br /> DNS<br /> * SNMP<br /> SMTP<br /> DHCP<br /> TFTP<br /><br />14. If a router is unable to find a suitable IOS to load into RAM, in what mode does the boot process end?<br /> setup mode<br /> user mode<br /> * rommon mode<br /> privileged mode<br /><br />15. Refer to the exhibit. What is an accurate description of the first neighbor that is displayed in the output?<br /> 24 port 2950 switch with a non-default native VLAN<br /> *24 port 2950 switch that is connected to Fa0/0 on Router1<br /> 24 port 2950 switch that is assigned to the administrator-defined VTP domain<br /> 24 port 2950 switch with interface GigabitEthernet0/1 that is operating at 1000 Mb/s<br /><br />16. How should a network engineer determine if a router module is hot-swappable?<br /> Insert the module with the power on, then check to see if the associated LED is lit.<br /> * Check the router and interface module data sheets on CCO to determine hot-swappability.<br /> Insert the module with the power on, then issue the show running-config command to verify that all new interfaces are recognized.<br /> Power off the router, insert the module, then verify new interfaces using the show running-config command after powering up.<br /><br />17. Refer to the exhibit. The network administrator has used the Cisco Feature Navigator to choose a Cisco IOS image to install on a router. Given the exhibited output of the show version command, which statement is true about the capacity of the router to use this Cisco IOS image?<br /> There is enough DRAM and flash.<br /> There is not enough DRAM and flash.<br /> There is enough DRAM but not enough flash.<br /> * There is not enough DRAM but enough flash.<br /><br />18. What functionality does NBAR provide to network technicians?<br /> provides data which can be used to create a network diagram<br /> allows for monitoring and managing network devices<br /> *allows for classification and monitoring of network traffic<br /> displays the IOS versions and IP addresses on neighboring devices<br /><br />19. In a converged network, which two types of traffic would be categorized as real-time traffic? (Choose two.)<br /> e-mail<br /> file transfer<br /> web browsing<br /> * videoconferencing<br /> * voice over IP<br /> video on demand<br /><br />20. What is a characteristic of FTP traffic flows?<br /> low-volume traffic<br /> predictable bandwidth usage<br /> *large packet sizes for transfers<br /> low throughput with high response-time requirements<br /><br />21. What supports the ability of streaming video to be sent to a group of viewers simultaneously without congesting the entire network?<br /> traffic queues<br /> * multicast<br /> multiple Layer 4 sessions<br /> high priority from QoS<br /><br />22. Refer to the exhibit. The routers are configured with RIPv2 with default configurations. When attempting to communicate with other networks, hosts from 172.16.2.0/24 are experiencing connectivity issues. What could be done to resolve this issue?<br /> Change to a public IP address scheme.<br /> * Disable automatic route summarization.<br /> Change the IP network address on R3 Fa0/0 to 172.16.1.128 /26.<br /> Change the subnet mask on the link between R2 and R3 to 255.255.255.0.<br /><br />23. A network engineer is prototyping a new IP addressing and summarization strategy for a new network that will be integrated into the existing infrastructure. Which method is appropriate for testing the addressing scheme?<br /> using the production network of the customer<br /> using actual network equipment in a lab<br /> using the Cisco Network Assistant<br /> * using a network simulation tool<br /><br />24. Refer to the exhibit. A customer has a problem with connectivity in the network. Based on the IP addressing scheme, what is causing the problem?<br /> The WAN links need IP addresses from a different major network.<br /> * The WAN link that connects R1 to R2 overlaps with the R3 LAN.<br /> The WAN links that connect R1 to R3 and R1 to R2 have incorrect masks.<br /> The R1 LAN is incorrect because subnet zero cannot be used with VLSM.<br /><br />25. Refer to the exhibit. A new host needs to be connected to the switch and be assigned to VLAN 2. Router RA is attached to the switch via a trunk and is configured as shown. What IP address should be assigned to this new host?<br /> 192.168.1.1 /26<br /> 192.168.1.22 /28<br /> 192.168.1.32 /28<br /> * 192.168.1.44 /28<br /> 192.168.1.47 /28<br /> 192.168.1.55 /28<br /><br />26. Which two processes allow a smooth transition from IPv4 to IPv6? (Choose two.)<br /> IPSec<br /> * tunneling<br /> * dual stack<br /> authentication<br /> anycast addressing<br /> header simplification<br /><br />27. Which two statements are true about the enhancements IPv6 has over IPv4? (Choose two.)<br /> *IPv6 does not support broadcasts.<br /> *IPv6 uses a simplified header structure.<br /> IPv6 does not require private addresses.<br /> IPv6 uses fixed length address strings.<br /> IPsec for IPv6 is not compatible with IPsec for IPv4.<br /><br />28. Refer to the exhibit. The named ACL "Managers" already exists on the router. What will happen when the network administrator issues the commands that are shown in the exhibit?<br /> The commands overwrite the existing Managers ACL.<br /> * The commands are added at the end of the existing Managers ACL.<br /> The commands are added at the beginning of the existing Managers ACL.<br /> The network administrator receives an error that states that the ACL already exists.<br /><br /> <br />29. Refer to the exhibit. Following a test plan, the network systems engineer completes the configuration of an access layer switch and connects three PCs. The engineer attempts to ping from each PC to the other connected PCs to test the configuration. Which statement describes the result of the last step?<br /> Host 1 can ping Host 2.<br /> * Host 1 can ping Host 3.<br /> Host 2 can ping Host 3.<br /> No hosts can ping any other host.<br /><br />30. Refer to the exhibit. A network administrator is configuring a new router to provide routing between VLANs. The administrator removes the router from the box and connects the Fa0/0 interface to a trunking port on the switch. After the configuration is applied to the router, as shown in the exhibit, the traffic between VLANs fails. What is causing this to occur?<br /> The R1 router needs a routing protocol configured.<br /> * The subinterfaces of the R1 router should have IP addresses applied.<br /> The R1 router needs three additional Fast Ethernet interfaces installed.<br /> The subinterfaces of the R1 router should be configured in the same VLAN.<br /><br />31. During prototype testing, the network designer performs a test to determine the ability of the network to recover from a link or device failure. Which design goal is validated if the test is a success?<br /> scalability<br /> manageability<br /> * availability<br /> security<br /><br />32. A network administrator of a middle-sized company is asked to upgrade the routing protocol of the network to support VLSM and route summarization. The current company network contains both Cisco and non-Cisco routers. Which routing protocol should be used for the upgrade?<br /> BGP<br /> RIPv1<br /> * RIPv2<br /> EIGRP<br /><br />33. Refer to the exhibit. What is the spanning-tree role of all the enabled interfaces of SW11?<br /> alternate<br /> backup<br /> * designated<br /> root<br /><br />34. Refer to the exhibit. An extended ACL has been created to deny traffic from the 192.168.35.0/24 network to the web server with IP address 209.165.201.15. According to Cisco best practices, where should the ACL be applied?<br /> * RTB Fa0/0 inbound<br /> RTC S0/0/1 inbound<br /> RTD Fa0/0 outbound<br /> RTC S0/1/0 outbound<br /><br />35. A user in a large office calls technical support to complain that a PC has suddenly lost connectivity to the network. The technician asks the caller to talk to nearby users to see if other machines are affected. The caller reports that several immediate neighbors in the same department have a similar problem and that they cannot ping each other. Those who are seated in other departments have connectivity. What should the technician check as the first step in troubleshooting the issue?<br /> the power outlet to the PC that is used by the caller.<br /> the trunks between switches in the wiring closet.<br /> * the status of the departmental workgroup switch in the wiring closet.<br /> the cable that connects the PC of the caller to the network jack.<br /> the cable connection between a PC and a network outlet that is used by a neighbor.<br /><br />36. During prototype testing, a LAN switch fails. As the switch re-initializes using the default parameters, a port that has a PC attached transitions to the forwarding state within one second. What protocol would support this feature?<br /> STP<br /> RIP<br /> BGP<br /> VTP<br /> * RSTP<br /><br />37. Refer to the exhibit. A networking company designer is reviewing a diagram of a customer network. What are the two problems that need to be resolved in the topology that is shown? (Choose two.)<br /> * The firewall router and ISP connection represent a single point of failure.<br /> If one of the Layer 3 switches fails, the Cisco Call Manager will be unreachable.<br /> * A power supply failure of the server block switch will cause the entire IP telephony system to fail.<br /> Using Layer 3 switches to interconnect the server block servers to the IP phones introduces too much delay.<br /> The IP phones need to be redundantly connected to the switches to prevent single points of failure at the access layer.<br /><br />38. Refer to the exhibit. A technician at the ISP site asks the network administrator at the client site to change the CHAP password as part of the routing security maintenance. After the administrator makes the change and reboots the router, the technician issues a show interfaces serial 0/0/0 command. According to the output, what can be concluded about the serial connection between the client site and ISP site?<br /> The router at the client site is still in the process of rebooting.<br /> *The administrator probably configured the wrong password.<br /> The administrator has not issued a no shut command on the serial interface.<br /> The administrator probably configured the wrong IP address for the serial interface.<br /><br /><br />39. Refer to the exhibit. Based on the EIGRP configuration that is shown, what can the field engineer conclude about the EIGRP authentication between RouterA and RouterB?<br /> Authentication will fail because only one key is configured.<br /> Authentication will fail because the key chain names do not match.<br /> * Authentication will succeed and EIGRP updates can be exchanged.<br /> Authentication will fail because the key chain names must match the router names.<br /><br /> <br />40. A network administrator has configured Frame Relay on a serial interface and issued the show interfaces serial command. The output shows that the interface is up and the line protocol is up. However, pings to the remote router across the link fail. What should the next step be to ensure that the IP address of the remote router appears in the Frame Relay map table of the local router?<br /> Configure the router using the no inverse-arp command.<br /> Ensure that the LMI type is correct for the circuit.<br /> *Configure the router using the frame-relay map ip command.<br /> Verify that the remote router has Frame Relay encapsulation enabled.<br /><br />41. Refer to the exhibit. A pre-sales systems engineer receives a diagram of the exhibited WAN implementation from a customer. EIGRP is the routing protocol that is used on the WAN. None of the parameters for EIGRP metric calculation have been modified in any router configurations. Which statement is true about the routing table on router RM?<br /> There is a single route to the 192.168.24.0/24 LAN using the T1 connection.<br /> There is a single route to the 192.168.24.0/24 LAN using the DSL connection.<br /> * There is a single route to the 192.168.24.0/24 LAN using the Metro Ethernet connection.<br /> EIGRP installs all three routes to the 192.168.24.0/24 LAN and load balances the traffic.<br /><br /><br />42. A company establishes a Frame Relay connection between corporate headquarters and a branch office. The CIR for the connection is set at 4 Mb/s. Which statement is true about this WAN connection?<br /> The company will not be able to send data faster than 4 Mb/s.<br /> * If the company sends data faster than 4 Mb/s, some of the data frames will be flagged with a DE bit.<br /> If the company sends data faster than 4 Mb/s, the TSP will change the CIR to zero.<br /> When the company sends data faster than 4 Mb/s, the Frame Relay switch will set the BECN bit to 1 on the frames that are headed to the company.<br /><br />43.What are two accurate descriptors of a DLCI? (Choose two.)<br /> * Frame Relay Layer 2 address<br /> one DLCI allowed per local loop<br /> * locally significant circuit endpoint<br /> signaling standard between DTE and DCE<br /> establishes the data transfer rate through a Frame Relay network<br /><br />44. When implementing a security policy, which two actions should be included as part of the security checklist? (Choose two.)<br /> Disable all logging.<br /> Enable Telnet on TCP port 23.<br /> Use HTTP for web administration.<br /> * Set timeouts and ACLs on VTY lines.<br /> * Shut down any unused ports and interfaces.<br /><br />45. A company plans to establish Frame Relay connections between corporate headquarters and several branch offices. The network designer recommends using one physical interface on the edge router to support the new Frame Relay connections. The company currently uses RIPv2 for routing and plans no changes to the RIPv2 configuration. What should be done to ensure that each branch office link is a separate subnet and that routing updates are successful between corporate headquarters and the branch offices?<br /> Configure multipoint subinterfaces on the physical interface.<br /> * Configure point-to-point subinterfaces on the physical interface.<br /> Configure a single subinterface to establish multiple PVC connections.<br /> Configure the physical interface to share one DLCI to multiple remote sites and their connections.<br /><br /><br />46. A company has branch offices at several locations across the country. Which security implementation would provide a cost-effective, secure, and authenticated connection to centralized internal resources that are located at company headquarters, without requiring configuration for individual employees at the branch offices?<br /> leased line with PPP authentication<br /> * site-to-site VPN<br /> access control list<br /> remote-access VPN<br /><br />47. A bank is planning to add a secure, authenticated WAN connection to a rural branch office. The connection must provide bandwidth of up to 10 Mb/s with QoS supporting VoIP. Which WAN connection type should the network designer recommend?<br /> DSL<br /> ISDN<br /> * leased line<br /> Frame Relay<br /><br />48. What Cisco VPN solution allows for simple configuration of VPNs on the laptops of remote and mobile employees?<br /> EasyVPN Server<br /> * EasyVPN Remote<br /> EasyVPN Client<br /> EasyVPN Remote-Access<br /><br />49. Which two technologies can provide data integrity in a VPN connection? (Choose two.)<br /> ESP<br /> DES<br /> * MD5<br /> DH1<br /> * SHA-1computerhttp://www.blogger.com/profile/00775484145552043479noreply@blogger.com0tag:blogger.com,1999:blog-9220200559382305581.post-45794677911262357792011-01-17T22:16:00.000-08:002011-01-17T22:17:12.785-08:00<span style="font-weight: bold;">CCNA1 MODUL 1</span><br /><br />1. Applications can be grouped into general use software or industry specific software. What are two examples of industry specific software? (Choose two.)<br /> *an educational tool<br /> presentation<br /> spreadsheet<br /> word processing<br /> *medical practice management software<br /> database management<br /><br />2. What characteristic of word processing software would make it a local application?<br /> The application is shared between users.<br /> *The software is stored on the local hard drive.<br /> The software is accessible through a web page.<br /> The software has the ability to manipulate text and graphics.<br /><br />3. Which three terms describe different types of computers? (Choose three.)<br /> operating system<br /> network<br /> *laptop<br /> *desktop<br /> Windows<br /> *mainframe<br /><br />4. What are two benefits of connecting a laptop computer to a docking station? (Choose two.)<br /> Mobility is increased.<br /> Less power is required.<br /> *An external monitor can be used.<br /> More wireless security options are available.<br /> *Alternate connectivity options may be available.<br /><br />5. Why do servers often contain duplicate or redundant parts?<br /> Servers require more power and thus require more components.<br /> *Servers should be accessible at all times.<br /> Servers can be designed as standalone towers or rack mounted.<br /> Servers are required by networking standards to have duplicate parts.<br /><br />6. What measurement is commonly associated with computer processing speed?<br /> bits<br /> pixels<br /> *hertz<br /> bytes<br /><br />7. What are two advantages of purchasing a preassembled computer? (Choose two.)<br /> *usually a lower cost<br /> exact components may be specified<br /> extended waiting period for assembly<br /> *adequate for performing most general applications<br /> suited for customers with special needs<br /><br />8. A user plans to run multiple applications simultaneously on a computer. Which computer component is essential to accomplish this?<br /> *RAM<br /> NIC<br /> video card<br /> sound card<br /> storage device<br /><br />9. Which adapter enables a computer system to exchange information with other systems on a local network?<br /> video card<br /> sound card<br /> modem card<br /> *network interface card<br /><br />10. What is the main storage drive used by servers, desktops, and laptops?<br /> tape drive<br /> *hard drive<br /> optical drive (DVD)<br /> floppy disk drive<br /><br />11. Which component is designed to remove high-voltage spikes and surges from a power line so that they do not damage a computer system?<br /> CPU<br /> *surge suppressor<br /> motherboard<br /> hard drive<br /><br />12. What two functions does a UPS provide that a surge protector does not? (Choose two.)<br /> It protects the computer from voltage surges.<br /> *It provides backup power from an internal battery.<br /> It protects the computer from sudden voltage spikes.<br /> It gives the user time to phone the electrical company.<br /> *It gives the user time to safely shut down the computer if the power fails.<br /> It provides backup power through a generator provided by the wall outlet.<br /><br />13. Which computer component is considered the nerve center of the computer system and is responsible for processing all of the data within the machine?<br /> RAM<br /> *CPU<br /> video card<br /> sound card<br /> operating system<br /><br />14. What can be used to prevent electrostatic discharge (ESD)?<br /> dry and non humid conditions<br /> carpeted floor<br /> *grounding strap<br /> uncluttered work space<br /><br />15. Because of the potentially dangerous voltage levels, which two devices should you not open unless you have been specifically trained to work on them? (Choose two.)<br /> mouse<br /> printer<br /> *monitor<br /> keyboard<br /> hard drive<br /> *power supply<br /><br />16. In newer operating systems, how are system resources assigned by default when components are installed?<br /> manually assigned by the operating system<br /> manually assigned by the administrator<br /> statically assigned by the component to a preset resource<br /> *dynamically assigned between the component and the operating system<br /><br />17. A user reports that a peripheral device that was installed correctly last week has not been functioning since the PC was booted today. All other PC functions are working properly. What are three things a service technician should do to solve the problem? (Choose three.)<br /> *Use the testing functionality on the peripheral itself, if available.<br /> *Verify that all cables are connected properly.<br /> Disconnect all cables connected to the computer except those connected to the peripheral.<br /> *Ensure that the peripheral is powered on.<br /> Disconnect the peripheral and verify that the computer is operating normally.<br /> Reload the computer operating system.<br /><br />18. Which two steps should be performed when installing a peripheral device? (Choose two.)<br /> *Download and install the most current driver.<br /> Connect the peripheral using any cable and any available port on the computer.<br /> *Connect the peripheral using an appropriate cable or wireless connection.<br /> Test the peripheral on another machine before installing it on the one where it will be used.<br /> Check the computer documentation to see if the peripheral vendor is compatible with the PC vendor.<br /><br />19. How is a server different from a workstation computer?<br /> The server works as a standalone computer.<br /> *The server provides services to clients.<br /> The workstation has fewer applications installed.<br /> The workstation has more users who attach to it.computerhttp://www.blogger.com/profile/00775484145552043479noreply@blogger.com0tag:blogger.com,1999:blog-9220200559382305581.post-28418699303724888092011-01-17T21:57:00.000-08:002011-01-17T21:58:17.136-08:00<span style="font-weight: bold;">FINAL CCNA2 VERSI 3</span><br /><br />1. What is a characteristic of a scalable network?<br /> 100% uptime<br /> redundant links<br /> *easy expansion<br /> multiple backup devices <br /><br />2. In an IPv4 environment, what information is used by the router to forward data packets from one interface of a router to another?<br /> *destination network address<br /> source network address<br /> source MAC address<br /> well known port destination address<br /><br />3. When a router learns two paths to the same destination network, which two factors determine the path that will be included in the routing table? (Choose two.)<br /> *route metric<br /> the MAC address of the neighboring router<br /> the source IP address in data packets<br /> the IP address of the next hop router<br /> *administrative distance<br /><br />4. What needs to be configured on a router to ensure that when the router receives a packet with an unknown destination, the router will forward it to the next hop?<br /> *a default route<br /> a directly connected route<br /> a dynamically updated route<br /> a static route to the destination network<br /><br />5. What routing protocol would be appropriate to use for exchanging routes between ISPs?<br /> RIPv2<br /> *BGP<br /> OSPF<br /> EIGRP<br /><br />6. Wireless radio waves are associated with which layer of the OSI model?<br /> *Layer 1<br /> Layer 2<br /> Layer 3<br /> Layer 4<br /> Layer 5<br /> Layer 6<br /> Layer 7<br /><br />7. What happens when a segment is encapsulated into a packet?<br /> Data is converted to bits for transmission.<br /> The destination port number is specified.<br /> *A header with logical addresses is added.<br /> A session with a destination is established.<br /><br />8. Refer to the exhibit. Hosts that belong to the IT department use 10.10.55.33/27 as a default gateway. Where can this IP address be located in the network?<br /> A<br /> B<br /> C<br /> *D<br /> E<br /> F<br /><br />9. A network administrator wants to configure six subnets for a Class C network. Which subnet mask will support the maximum number of hosts on each subnet?<br /> 255.255.255.248<br /> 255.255.255.240<br /> *255.255.255.224<br /> 255.255.255.192<br /><br />10. Which two subnet masks can be used when subnetting a Class A IP address? (Choose two.)<br /> 255.0.0.0<br /> 240.0.0.0<br /> 224.0.0.0<br /> *255.255.0.0<br /> *255.255.255.0<br /><br />11. A user is attempting to do an http://www.cisco.com/ without success. Which two configuration values must be set on the host to allow this access? (Choose two.)<br /> *DNS server<br /> WINS server<br /> HTTP server<br /> *default gateway<br /> Netbios<br /><br />12. Refer to the exhibit. What two addresses are the broadcast addresses for network A and network B? (Choose two.)<br /> Network A broadcast address 192.168.1.32<br /> *Network A broadcast address 192.168.1.47<br /> Network A broadcast address 192.168.1.15<br /> *Network B broadcast address 192.168.1.207<br /> Network B broadcast address 192.168.1.240<br /> Network B broadcast address 192.168.1.192<br /><br />13. Refer to the exhibit. A network administrator is troubleshooting the serial connection between R1 and R2. There is no communication between R1 and R2. Based on the output of the show ip interface brief command, what is the cause of the problem?<br /> *There is a misconfiguration of IP addresses.<br /> There is a mismatch of encapsulation methods.<br /> The no shutdown command should be issued on R2.<br /> The routing protocols are not compatible.<br /><br />14. Refer to the exhibit. Host H1 is sending a datagram to host H2 across the Internet. NAT will be configured on RTRC. Which address is considered the inside local address?<br /> 10.1.1.1<br /> *10.1.1.6<br /> 209.165.201.2<br /> 209.165.201.17<br /> 209.165.200.226<br /><br />15. Refer to the exhibit. What two facts can be determined from the output of the show ip protocols command? (Choose two.)<br /> *The routing protocol in use on RTA is RIPv1.<br /> RTA is directly connected to four neighbor routers.<br /> *The administrative distance of the routing protocol is 120.<br /> RTA will receive the next update from its neighbor in 30 seconds.<br /> The routing protocol is only sending updates out the serial interface.<br /><br />16. How does a switch interface that uses sticky port security handle MAC addresses?<br /> The addresses are configured manually and are saved in the running configuration.<br /> They are configured manually and are not saved in the running configuration.<br /> *They are configured dynamically and are saved in the running configuration.<br /> They are configured dynamically and are not saved in the running configuration.<br /><br />17. Which statement best describes the operation of a Layer 2 switch?<br /> functions at the network layer of the OSI model<br /> forwards traffic from one local IP network to another<br /> *directs traffic from one port to another based on the destination MAC address<br /> dynamically creates a forwarding table that maps IP addresses to MAC addresses<br /><br />18. To manage a Cisco switch using Telnet, where would the management IP address be configured on the switch?<br /> *VLAN 1 interface<br /> first vty port<br /> first trunk port<br /> console port<br /> FastEthernet 0/1 interface<br /><br />19. Refer to the exhibit. A ping 192.168.1.20 command is issued on workstation A to determine if workstation B can be reached. What two events will occur if this command is successful? (Choose two.)<br /> The router will reply to the echo request with a proxy ping response.<br /> Workstation A will send a UDP ping request message to workstation B.<br /> The router will send a TCP acknowledgment message to workstation A.<br /> Workstation B will send a UDP ping reply message to the router.<br /> *Workstation A will send an ICMP echo request message to workstation B.<br /> *Workstation B will send an ICMP echo reply message to workstation A.<br /><br />20. A tracert command is run on a host to determine if another host can be reached across a network. Which two events will occur if connectivity with the other host is unsuccessful? (Choose two.)<br /> *The command will display all the successful hops a packet makes before it is lost.<br /> The command will calculate the time between successful and unsuccessful packets.<br /> The host on which the command is run will send a UDP request message to the other host.<br /> *The command helps to determine where a packet was lost on the path from the source to the destination.<br /> All hops between the two hosts display !!!!! to signify success.<br /><br />21. Which protocol allows secure in-band management so that a network administrator can monitor and configure network devices without fear of any passwords being compromised?<br /> *SSH<br /> HTTP<br /> SNMP<br /> Telnet<br /><br />22. Refer to the exhibit. A network administrator is unable to ping H1 from the router and is checking the cabling along the network. Which segment is incorrectly cabled?<br /> Segment A<br /> Segment B<br /> Segment C<br /> *Segment D<br /><br />23. When does a router enter the setup mode?<br /> when the Cisco IOS is missing in flash<br /> *when the configuration is missing in NVRAM<br /> when the setup command is run from the user mode<br /> when the boot system command is missing in the configuration<br /><br />24. Which two commands ensure that any password that permits access to the privileged EXEC mode is not shown in plain text when the configuration files are displayed? (Choose two.)<br /> *Router(config)# enable secret cisco<br /> Router(config)# enable cisco<br /> Router(config)# encryption-password all<br /> Router(config)# enable login encrypted<br /> Router(config)# enable password encryption<br /> *Router(config)# service password-encryption<br /><br />25. What is the effect of issuing the hostname RouterA command on a router?<br /> A description will be configured on the router interfaces identifying them as belonging to RouterA.<br /> The router will attempt to establish a connection to the host with the name RouterA.<br /> The router will map an IP address to the domain name RouterA.<br /> *The router prompt will change from Router(config)# to RouterA(config)#<br /><br />26. Refer to the exhibit. What is the possible reason that a technician is unable to telnet into the HQ router and make configuration changes?<br /> *A password is required for vty 0.<br /> A password for line con 0 is required.<br /> All five virtual interfaces must be configured before Telnet is possible.<br /> The service password-encryption command is preventing Telnet access.<br /><br />27. Refer to the exhibit. Which type of link is supported by this interface module?<br /> LAN<br /> *WAN<br /> WLAN<br /> VLAN<br /><br />28. Refer to the exhibit. While configuring the serial interface of a router, the network administrator sees the highlighted error message. What is the reason for this?<br /> The serial interface is administratively down.<br /> The serial interface is already configured with an IP address.<br /> *The network administrator has attempted to configure the serial interface with a broadcast address.<br /> The same IP address has been configured on another interface.<br /><br />29. Refer to the exhibit. The network administrator has added a route by using the ip route 10.13.13.0 255.255.255.0 192.168.1.1 command on R1. Hosts on the 10.12.12.0 network cannot communicate with hosts on the 10.13.13.0 network. What is the reason for this?<br /> The gateway of last resort is not set.<br /> The destination prefix mask is incorrectly configured.<br /> The routing protocol has not been configured on R1.<br /> *The static route has not been configured correctly.<br /><br />30. A network administrator is planning new cable installations for an automated manufacturing facility. The cabling solution must be scalable and function reliably in an environment subject to electromagnetic interference. Which two cable solutions should the administrator consider? (Choose two.)<br /> *STP<br /> UTP<br /> coaxial<br /> *fiber optic<br /> wireless<br /><br />31. In a structured cable system, which term describes the cable that connects the wall jack in the user work area to the patch panel in the wiring closet?<br /> patch cable<br /> vertical cable<br /> *horizontal cable<br /> backbone cable<br /><br />32. What should be the first step in a structured cable project?<br /> Locate all sources of EMI.<br /> *Obtain an accurate floor plan.<br /> Identify the network backbone.<br /> Design efficient cable management systems.<br /><br />33. What can be gained by using a caching-only DNS server?<br /> The DNS server will use more WAN bandwidth.<br /> The DNS server will only answer recursive queries.<br /> The DNS server will be authoritative for only one zone.<br /> *The DNS server will resolve most queries more quickly.<br /><br />34. Refer to the exhibit. Which two statements describe the data conversation shown? (Choose two.)<br /> *The data conversation was started by the HTTP application process running on the client.<br /> The data conversation is identified by TCP port 80 on the client.<br /> The user started the data conversation by sending an e-mail.<br /> The IP address of the Internet server is 192.168.17.43.<br /> *The Internet server will send data to port 8547 on the client.<br /><br />35. Which statement describes a feature of TCP?<br /> It provides low overhead data delivery.<br /> *It acknowledges the receipt of packets.<br /> It does not provide error checking.<br /> It is a connectionless protocol.<br /><br />36. Which application can be delivered using UDP?<br /> FTP<br /> *DNS<br /> HTTP<br /> SMTP<br /><br />37. Which statement is correct about passive data connections in the FTP protocol?<br /> The server initiates the data transfer connection.<br /> *The server forwards its IP address and a random port number to the FTP client through the control stream.<br /> The firewalls do not permit passive data connections to hosts that are located within the network.<br /> The client forwards data to port 21 of the server.<br /><br /><br />38. A hacker attempts to reach confidential information that is stored on a server inside the corporate network. A network security solution inspects the entire packet, determines that it is a threat, and blocks the packet from entering the inside network. Which security measure protected the network?<br /> an IDS<br /> *an IPS<br /> a host-based firewall<br /> Anti-X software<br /><br />39. For the assignment of permissions to files and folders, what does the "principle of least privilege" imply?<br /> No user has more privileges than any other user.<br /> Permissions to files are given based on seniority.<br /> *Users only have access to resources that are necessary for their jobs.<br /> Users should be given no access to computer resources until they ask.<br /><br />40. Refer to the exhibit. A new branch office has been added to the corporate network and a new router is to be installed to allow branch office users to access the database server at headquarters. How should the serial 0/0/0 interface of the new branch office router be configured to connect to the headquarters router?<br /> branch_23(config-if)# ip address 192.168.5.19 255.255.255.240<br />branch_23(config-if)# no shutdown<br /> branch_23(config-if)# encapsulation hdlc<br />branch_23(config-if)# ip address 192.168.5.25 255.255.255.240<br />branch_23(config-if)# no shutdown<br /> branch_23(config-if)# encapsulation ppp<br />branch_23(config-if)# no shutdown<br /> branch_23(config-if)# encapsulation ppp<br />branch_23(config-if)# ip address 192.168.5.33 255.255.255.240<br /> *branch_23(config-if)# encapsulation ppp<br />branch_23(config-if)# ip address 192.168.5.21 255.255.255.240<br />branch_23(config-if)# no shutdown<br /><br />41. What is the default encapsulation for serial interfaces on Cisco routers?<br /> PPP<br /> SLIP<br /> *HDLC<br /> Frame Relay<br /><br />42. A large company wants to ensure its connection to a remote branch office. The connection must be able to support equally high upstream and downstream traffic. The service provider must also provide an SLA with a guarantee of specific uptime and security. What type of connection best suits the needs of the company?<br /> DSL connection<br /> cable connection<br /> dialup connection<br /> *point-to-point leased line connection<br /><br />43. Refer to the exhibit. The Transfer > Capture Text feature available through HyperTerminal has been used to capture the running configuration on a router. The startup-configuration has been erased from the router followed by the issuing of the reload command. The startup-config is restored by using the captured file, but all interfaces on the router are shown as administratively down. What could cause this problem?<br /> The enable password was incorrectly entered.<br /> The configuration register was not set to 0x2142.<br /> The enable secret password was incorrectly entered.<br /> *The no shutdown command must be entered under each interface section in the file being sent.<br /> The captured file should have restored the running configuration not the startup configuration.<br /><br />44. The IT department of a company implements a backup plan which includes a daily backup on Monday through Saturday. Only files that were modified during each day are backed up. Which backup method is being used?<br /> full backup<br /> normal backup<br /> differential backup<br /> *incremental backup<br /><br />45. Which statement correctly describes an SLA?<br /> It lists the terms of the agreement between the user and the manufacturer of the system.<br /> *It outlines the management, monitoring, and maintenance of a network.<br /> It specifies the software and hardware configurations of a system.<br /> It describes the operation of a system.computerhttp://www.blogger.com/profile/00775484145552043479noreply@blogger.com0tag:blogger.com,1999:blog-9220200559382305581.post-81176949050021960942011-01-17T21:56:00.000-08:002011-01-17T21:57:46.715-08:00<span style="font-weight: bold;">FINAL CCNA2 VERSI 2</span><br /><br />1. What is the purpose of the routing process?<br /> to encapsulate data that is used to communicate across a network<br /> *to select the paths that are used to direct traffic to destination networks<br /> to convert a URL name into an IP address<br /> to provide secure Internet file transfer<br /> to forward traffic on the basis of MAC addresses<br /><br />2. Which service team in an ISP is responsible for determining if the new customer has hardware that will support the new WAN connection and if new WAN circuits need to be installed?<br /> customer service<br /> onsite installation<br /> *planning and provisioning<br /> network operations center<br /><br />3. Which statement describes a route that has been learned dynamically?<br /> *It is automatically updated and maintained by routing protocols.<br /> It is unaffected by changes in the topology of the network.<br /> It has an administrative distance of 1.<br /> It is identified by the prefix C in the routing table.<br /><br />4. What needs to be configured on a router to ensure that when the router receives a packet with an unknown destination, the router will forward it to the next hop?<br /> *a default route<br /> a directly connected route<br /> a dynamically updated route<br /> a static route to the destination network<br /><br />5. Which routing protocol facilitates the exchange of routing information between different autonomous systems?<br /> OSPF<br /> EIGRP<br /> RIP<br /> *BGP<br /><br />6. Which routing protocol excludes the subnet information from routing updates?<br /> EIGRP<br /> OSPF<br /> *RIPv1<br /> BGP<br /><br />7. Why is the OSI model useful in network design and assessment?<br /> It combines specific networking tasks into a complex format.<br /> It defines the four lower layers, which standardize applications supported within the model.<br /> It is used during troubleshooting to focus on the entire networking process instead of a single layer.<br /> *It divides networking communications into multiple processes that are smaller and more manageable.<br /><br /><br />8. Refer to the exhibit. Which three IP addresses could be assigned to the hosts? (Choose three.)<br /> 192.168.88.1<br /> 192.168.88.8<br /> *192.168.88.9<br /> *192.168.88.12<br /> *192.168.88.14<br /> 192.168.88.15<br /> 192.168.88.16<br /> 192.168.88.18<br /><br />9. A user is attempting to do an http://www.cisco.com/ without success. Which two configuration values must be set on the host to allow this access? (Choose two.)<br /> *DNS server<br /> WINS server<br /> HTTP server<br /> *default gateway<br /> Netbios<br /><br />10. Refer to the exhibit. The network administrator must set up a network with two subnets. In network A, the network administrator selects the network address 192.168.1.128/26. Which address combination should the administrator select in network B to accommodate the same number of hosts as in network A?<br /> 192.168.1.32 255.255.255.128<br /> 192.168.1.0 255.255.255.224<br /> *192.168.1.64 255.255.255.192<br /> 192.168.1.192 255.255.255.128<br /><br />11. How many host addresses may be assigned on each subnetwork when using the 130.68.0.0 network address with a subnet mask of 255.255.248.0?<br /> 30<br /> 256<br /> *2046<br /> 2048<br /> 4094<br /> 4096<br /><br />12. Refer to the exhibit. What two addresses are the broadcast addresses for network A and network B? (Choose two.)<br /> Network A broadcast address 192.168.1.32<br /> *Network A broadcast address 192.168.1.47<br /> Network A broadcast address 192.168.1.15<br /> *Network B broadcast address 192.168.1.207<br /> Network B broadcast address 192.168.1.240<br /> Network B broadcast address 192.168.1.192<br /><br />13. Refer to the exhibit. A network administrator is troubleshooting the serial connection between R1 and R2. There is no communication between R1 and R2. Based on the output of the show ip interface brief command, what is the cause of the problem?<br /> *There is a misconfiguration of IP addresses.<br /> There is a mismatch of encapsulation methods.<br /> The no shutdown command should be issued on R2.<br /> The routing protocols are not compatible.<br /><br />14. What is a feature of PAT?<br /> It maps IP addresses to URLs.<br /> It displays private IP addresses to public networks.<br /> It sends acknowledgments of received packets.<br /> *It allows multiple hosts on a single LAN to share globally unique IP addresses.<br /><br />15. Refer to the exhibit. The PC tries to ping router B at 192.168.2.2, but the ping fails. What is the problem?<br /> *The address of the PC is on the wrong subnet.<br /> The subnet mask of the PC should be 255.255.255.0.<br /> The default gateway should be 192.168.2.1.<br /> The DNS server is incorrect.<br /><br />16.The show ip route command was executed on one of the routers shown in the graphic and the following output was displayed:<br /><br />C 192.168.4.0/24 is directly connected, Serial0/0<br />R 192.168.5.0/24 [120/1] via 192.168.4.2, 00:00:19, Serial0/0<br />R 192.168.1.0/24 [120/2] via 192.168.3.1, 00:00:20, Serial0/1<br />R 192.168.2.0/24 [120/2] via 192.168.3.1, 00:00:20, Serial0/1<br />C 192.168.3.0/24 is directly connected, Serial0/1<br /><br />From which router was this command executed?<br /> A<br /> B<br /> *C<br /> D<br /><br />17. Refer to the exhibit. R1 and R2 are configured with the commands that are displayed. All interfaces are properly configured, but neither router is receiving routing updates. What two things can be done to solve the problem? (Choose two.)<br /> *Configure the routing protocol on R1 for network 10.0.0.0.<br /> *Configure the routing protocol on R2 for network 10.0.0.0.<br /> Configure the routing protocol on R1 for network 192.168.4.0.<br /> Configure the routing protocol on R1 for network 192.168.2.0.<br /> Configure the routing protocol on R2 for network 192.168.1.0.<br /> Configure the routing protocol on R2 for network 192.168.3.0.<br /><br />18. Refer to the exhibit. Static routes have been configured on all routers in the network. PC2 can communicate with PC1 but not with PC3. What should be done to remedy the problem?<br /> Reconfigure the first static route with the exit interface S0/0/0.<br /> *Reconfigure the second static route with the exit interface S0/0/1.<br /> Reconfigure the first static route with the next hop address 172.16.3.1.<br /> Reconfigure the second static route with the next hop address 172.16.3.1.<br /><br />19. Refer to the exhibit. A technician has been assigned to configure RIPv2 as a routing protocol on the network. Users who are connected to the LAN network on router R3 can ping both S0/0/0 and S0/0/1 interfaces on R1 but are not able to ping the LAN network that is attached to R1. What could be the possible cause of the problem?<br /> The version 2 command was not issued when RIP was configured on router R1.<br /> The ip address command was not issued when interfaces S0/0/0 and S0/0/1 were configured on router R1.<br /> The no shutdown command was not issued when interfaces S0/0/0 and S0/0/1 were configured on router R1.<br /> *The network 172.16.10.0 command was not issued when RIP was configured on router R1.<br /> The no auto-summary command is required on router R1.<br /><br /><br />20. Different hosts connect to the same switch port at different times. If the switch port is configured with dynamic port security, how does it process the MAC addresses?<br /> The addresses are manually assigned with the use of the switchport command.<br /> *The addresses are dynamically learned and stored in the address table.<br /> The addresses are dynamically configured and saved in the running configuration.<br /> The addresses are stored in the address table and added to the running configuration.<br /><br />21. Refer to the exhibit. A ping 192.168.1.20 command is issued on workstation A to determine if workstation B can be reached. What two events will occur if this command is successful? (Choose two.)<br /> The router will reply to the echo request with a proxy ping response.<br /> Workstation A will send a UDP ping request message to workstation B.<br /> The router will send a TCP acknowledgment message to workstation A.<br /> Workstation B will send a UDP ping reply message to the router.<br /> *Workstation A will send an ICMP echo request message to workstation B.<br /> *Workstation B will send an ICMP echo reply message to workstation A.<br /><br />22. Refer to the exhibit. What two conclusions can be drawn about router RTB? (Choose two.)<br /> The router is connected to a router named Boise.<br /> *Router RTB is connected to a Cisco 1841 router.<br /> Router RTB is directly connected to two other routers.<br /> *The IP address of the router interface that is connected to router RTB is 192.168.2.6.<br /> The RTB router is connected to two Cisco devices by FastEthernet links.<br /><br />23. If the configuration register is currently set to 0x2102, what is the first action that a router will take after the bootstrap program loads successfully?<br /> *load the IOS from flash<br /> load the IOS from NVRAM<br /> load the IOS from the TFTP server<br /> load the startup configuration file from flash<br /> load the startup configuration file from NVRAM<br /> load the startup configuration file from the TFTP server<br /><br />24. Refer to the exhibit. A network administrator is unable to ping H1 from the router and is checking the cabling along the network. Which segment is incorrectly cabled?<br /> Segment A<br /> Segment B<br /> Segment C<br /> *Segment D<br /><br />25. Refer to the exhibit. A user who is connected to RTA is trying to telnet to RTB, but the connection is failing. Based on the output of the show running-config command on router RTB, why is the Telnet session failing?<br /> Telnet has not been configured on the console line.<br /> The login command has not been issued on the console line.<br /> *No password has been configured on the VTY lines.<br /> A session limit has not been configured for Telnet.<br /><br />26. Refer to the exhibit. What will be the effect of the configuration commands if entered on R2?<br /> In-band management access to R2 is configured.<br /> *The user will be able to console into R2 using the password cisco.<br /> The user will be able to telnet into R2 by using the password cisco.<br /> Secure access to R2 for router management via SSH is configured.<br /><br />27. An administrator wishes to protect a router by encrypting the console access password noaccess. Which command should be used?<br /> Router(config)# enable secret noaccess<br /> Router(config)# enable password noaccess<br /> Router(config-line)# password noaccess<br /> *Router(config)# service password-encryption<br /><br />28. Refer to the exhibit. The network administrator needs to configure the Fa0/0 interface of RTB so that hosts from RTA can connect to the server that is attached to RTB. Which two commands will the administrator use to accomplish this task? (Choose two.)<br /> RTB# ip address 192.168.102.98 255.255.255.248<br /> RTB(config-if)# ip address 192.168.102.99 255.255.255.252<br /> RTB(config)# ip address 192.168.102.97 255.255.255.252<br /> RTB(config)# no shutdown<br /> *RTB(config-if)# no shutdown<br /> *RTB(config-if)# ip address 192.168.102.97 255.255.255.252<br /><br />29. Refer to the exhibit. While configuring the serial interface of a router, the network administrator sees the highlighted error message. What is the reason for this?<br /> The serial interface is administratively down.<br /> The serial interface is already configured with an IP address.<br /> *The network administrator has attempted to configure the serial interface with a broadcast address.<br /> The same IP address has been configured on another interface.<br /><br />30. Refer to the exhibit. The network administrator of the building in the graphic needs to choose the type of cable best suited to add ServerB to the network. Which cable type is the best choice?<br /> STP<br /> UTP<br /> coaxial<br /> *fiber optic<br /><br />31. In a structured cable system, which term describes the cable that connects the wall jack in the user work area to the patch panel in the wiring closet?<br /> patch cable<br /> vertical cable<br /> *horizontal cable<br /> backbone cable<br /><br />32. What is the maximum unrepeated distance set by industry standards for UTP cable?<br /> 10 meters<br /> 75 meters<br /> *100 meters<br /> 325 meters <br /><br />33. Which statement is true about the reverse lookup DNS zone?<br /> It is most commonly experienced when users are surfing the Internet.<br /> It is the backup for the forward lookup zone.<br /> It dynamically updates the resource records.<br /> *It resolves an IP address to a fully qualified domain name.<br /><br />34. Which statement describes a feature of TCP?<br /> It provides low overhead data delivery.<br /> *It acknowledges the receipt of packets.<br /> It does not provide error checking.<br /> It is a connectionless protocol.<br /><br />35. Which transport layer protocol will allow segments to be exchanged between two hosts with low overhead and no mechanism for retransmission?<br /> IP<br /> FTP<br /> TCP<br /> *UDP<br /> SMTP<br /><br />36. A company is developing an Internet store for its website. Which protocol should be used to transfer credit card information from customers to the company web server?<br /> FTPS<br /> HTTP<br /> *HTTPS<br /> WEP2<br /> TFTP<br /><br />37. Which statement is correct about the proxy support that is offered by the HTTP protocol?<br /> It allows clients to make direct network connections to other network services.<br /> *It filters unsuitable web content.<br /> It reduces the speed of the network.<br /> It encrypts the data that is being transmitted.<br /><br />38. In the URL http://dev.cisco.com/wwwdocs/procedures.htm, what is identified by wwwdocs?<br /> the server name where the resource is located<br /> the protocol that is used for the resource request<br /> the domain name of the server that is being accessed<br /> *the folder where the requested resource is stored<br /><br />39. A network administrator must access a remote Linux server at the branch office to troubleshoot a web service configuration issue. Which secure protocol would be used?<br /> DNS<br /> FTP<br /> HTTPS<br /> SMTP<br /> *SSH<br /> Telnet<br /><br />40. When customers use credit cards to make purchases at a small business, a modem is heard dialing a telephone number to transfer the transaction data to the central office. What type of WAN serial connection is in use?<br /> leased line<br /> packet switched<br /> *circuit switched<br /> point-to-point<br /><br />41. Which technology is used for WAN connections and delivers up to 1.544 Mb/s of symmetrical bandwidth?<br /> DSL<br /> dialup<br /> *T1 line<br /> T3 line<br /><br />42. Refer to the exhibit. A new branch office has been added to the corporate network and a new router is to be installed to allow branch office users to access the database server at headquarters. How should the serial 0/0/0 interface of the new branch office router be configured to connect to the headquarters router?<br /> branch_23(config-if)# ip address 192.168.5.19 255.255.255.240<br />branch_23(config-if)# no shutdown<br /> branch_23(config-if)# encapsulation hdlc<br />branch_23(config-if)# ip address 192.168.5.25 255.255.255.240<br />branch_23(config-if)# no shutdown<br /> branch_23(config-if)# encapsulation ppp<br />branch_23(config-if)# no shutdown<br /> branch_23(config-if)# encapsulation ppp<br />branch_23(config-if)# ip address 192.168.5.33 255.255.255.240<br /> *branch_23(config-if)# encapsulation ppp<br />branch_23(config-if)# ip address 192.168.5.21 255.255.255.240<br />branch_23(config-if)# no shutdown<br /><br />43. The command copy tftp running-config has been entered on the router. What will this command do?<br /> copy the configuration in RAM to a server<br /> *copy the configuration file from a server to RAM<br /> copy the configuration file in NVRAM to RAM<br /> copy the configuration file in NVRAM to a server<br /> copy the configuration file from a server to NVRAM<br /><br />44. A company functions from Monday to Friday each week. Their backup strategy calls for full backups each Friday night, with differential backups on all other weekday nights. If an administrator is asked to restore a server hard drive to its Wednesday morning state, how many backups must be used?<br /> 1<br /> *2<br /> 3<br /> 4<br /><br />45. What is a characteristic of Syslog?<br /> It requires users to prove their identity with the use of a username and password before users can access network resources.<br /> It listens to network traffic and sends an alert to a management station to track which applications are used and the length of time for which they are used.<br /> *It enables devices to send information to a daemon that runs on a management station.<br /> It provides users the rights to access specific resources and perform specific tasks.computerhttp://www.blogger.com/profile/00775484145552043479noreply@blogger.com0tag:blogger.com,1999:blog-9220200559382305581.post-1481609291714728942011-01-17T21:14:00.000-08:002011-01-17T21:55:48.585-08:00<span style="font-weight: bold;">FINAL CCNA2 VERSI 1</span><br /><br /><span style="font-weight: bold;"> </span><br />1. What is a characteristic of a scalable network?<br /> 100% uptime<br /> redundant links<br /> *easy expansion<br /> multiple backup devices<br /><br />2. What is the primary function of the NOC at a large ISP?<br /> installing equipment at a customer site<br /> setting up customer accounts and passwords<br /> *monitoring and testing customer network connections<br /> entering customer requirements in an order-tracking database<br /><br />3. What is used by a routing protocol to determine the best path to include in the routing table?<br /> Convergence time<br /> Default distance<br /> *Metric<br /> Type of router<br /><br />4. In an IPv4 environment, what information is used by the router to forward data packets from one interface of a router to another?<br /> *destination network address<br /> source network address<br /> source MAC address<br /> well known port destination address<br /><br />5. Which statement describes a route that has been learned dynamically?<br /> *It is automatically updated and maintained by routing protocols.<br /> It is unaffected by changes in the topology of the network.<br /> It has an administrative distance of 1.<br /> It is identified by the prefix C in the routing table.<br /><br />6. What routing protocol would be appropriate to use for exchanging routes between ISPs?<br /> RIPv2<br /> *BGP<br /> OSPF<br /> EIGRP<br /><br />7. At which layer of the OSI model is the Ethernet family of technologies defined?<br /> Layer 1<br /> *Layer 2<br /> Layer 3<br /> Layer 4<br /> Layer 5<br /> Layer 6<br /> Layer 7<br /><br />8. Which two services are required to enable a computer to receive dynamic IP addresses and access the Internet using domain names? (Choose two.)<br /> *DNS<br /> WINS<br /> HTTP<br /> *DHCP<br /> SMTP<br />9. Which combination of network address and subnet mask allows 62 hosts to be connected in a single subnet?<br /> Network address 10.1.1.4 Subnet mask 255.255.255.240<br /> Network address 10.1.1.0 Subnet mask 255.255.255.252<br /> *Network address 10.1.1.0 Subnet mask 255.255.255.192<br /> Network address 10.1.1.4 Subnet mask 255.255.255.248<br /><br />10. Refer to the exhibit. Which subnet mask would accommodate the number of hosts shown for each subnetwork with the least amount of IP addresses wasted?<br /> 255.255.0.0<br /> 255.255.255.192<br /> *255.255.255.224<br /> 255.255.255.240<br /> 255.255.255.248<br /><br />11. Refer to the exhibit. Devices need to connect to the file server from remote networks. What method should be used to provide the file server with an IP address to allow these connections?<br /> *static NAT<br /> static PAT<br /> dynamic NAT<br /> dynamic PAT<br /><br />12. While configuring PAT on a Cisco ISR, a network technician defines the IP address of the router interface that connects to the ISP. This address will be the translated address for all Internet traffic from inside hosts. What is this IP address called?<br /> inside local address<br /> *inside global address<br /> outside local address<br /> outside global address<br /><br />13. What does the command RA(dhcp-config)# dns-server 10.10.64.221 10.10.64.222 accomplish?<br /> allows RA to act as a DNS relay agent<br /> allows RA to be configured as a DNS server<br /> identifies the default gateway address that is used to reach the DNS servers<br /> *enables DHCP clients to use the specified IP addresses as DNS servers<br /><br />14. The show ip route command was executed on one of the routers shown in the graphic and the following output was displayed:<br /><br />C 192.168.4.0/24 is directly connected, Serial0/0<br />R 192.168.5.0/24 [120/1] via 192.168.4.2, 00:00:19, Serial0/0<br />R 192.168.1.0/24 [120/2] via 192.168.3.1, 00:00:20, Serial0/1<br />R 192.168.2.0/24 [120/2] via 192.168.3.1, 00:00:20, Serial0/1<br />C 192.168.3.0/24 is directly connected, Serial0/1<br /><br />From which router was this command executed?<br /> A<br /> B<br /> *C<br /> D<br /><br />15. Refer to the exhibit. R1 and R2 are configured with the commands that are displayed. All interfaces are properly configured, but neither router is receiving routing updates. What two things can be done to solve the problem? (Choose two.)<br /> *Configure the routing protocol on R1 for network 10.0.0.0.<br /> *Configure the routing protocol on R2 for network 10.0.0.0.<br /> Configure the routing protocol on R1 for network 192.168.4.0.<br /> Configure the routing protocol on R1 for network 192.168.2.0.<br /> Configure the routing protocol on R2 for network 192.168.1.0.<br /> Configure the routing protocol on R2 for network 192.168.3.0.<br /><br />16. Refer to the exhibit. A NOC technician at an ISP enters the command c:\ping 209.165.201.7. What are two reasons to use this command? (Choose two.)<br /> map the path to 209.165.201.7<br /> *test reachability to 209.165.201.7<br /> locate connectivity problems along the route to 209.165.201.7<br /> identify ISPs that interconnect the NOC and remote host with IP 209.165.201.7<br /> *measure the time that packets take to reach 209.165.201.7 and return to the technician's workstation<br /><br />17. Refer to the exhibit. A ping 192.168.1.20 command is issued on workstation A to determine if workstation B can be reached. What two events will occur if this command is successful? (Choose two.)<br /> The router will reply to the echo request with a proxy ping response.<br /> Workstation A will send a UDP ping request message to workstation B.<br /> The router will send a TCP acknowledgment message to workstation A.<br /> Workstation B will send a UDP ping reply message to the router.<br /> *Workstation A will send an ICMP echo request message to workstation B.<br /> *Workstation B will send an ICMP echo reply message to workstation A.<br /><br />18. Refer to the exhibit. What does the highlighted value 120 represent?<br /> the number of hops between the router and network 10.0.5.0<br /> *the administrative distance of the routing protocol<br /> the UDP port number that is used for forwarding traffic<br /> the bandwidth that is allocated to the serial interface<br /><br />19. Refer to the exhibit. If the show cdp neighbors command is issued on RTB, which devices will appear in the output if all devices use the Cisco IOS and have CDP enabled?<br /> RTA, RTC<br /> *RTA, RTC, Sw2<br /> RTA, RTC, Sw1, Sw2, Sw3<br /> RTA, RTC, Sw1, Sw2, Sw3, PC1, PC2<br /><br />20. Which protocol allows secure in-band management so that a network administrator can monitor and configure network devices without fear of any passwords being compromised?<br /> *SSH<br /> HTTP<br /> SNMP<br /> Telnet<br /><br />21. Which mode does a router enter when no configuration file is located in NVRAM?<br /> ROMMON<br /> *setup<br /> global configuration<br /> privileged exec<br /><br />22. If the configuration register is currently set to 0x2102, what is the first action that a router will take after the bootstrap program loads successfully?<br /> *load the IOS from flash<br /> load the IOS from NVRAM<br /> load the IOS from the TFTP server<br /> load the startup configuration file from flash<br /> load the startup configuration file from NVRAM<br /> load the startup configuration file from the TFTP server<br /><br />23. Refer to the exhibit. A network administrator is unable to ping H1 from the router and is checking the cabling along the network. Which segment is incorrectly cabled?<br /> Segment A<br /> Segment B<br /> Segment C<br /> *Segment D<br /><br />24. Refer to the exhibit. Router R1 has been configured with the commands that are displayed. Which fact can be determined from the configuration?<br /> *All passwords are encrypted.<br /> The privileged EXEC mode password is “password1.”<br /> The router can support four Telnet sessions simultaneously.<br /> The router can be accessed from the console without using any password.<br /><br />25. Refer to the exhibit. While configuring the serial interface of a router, the network administrator sees the highlighted error message. What is the reason for this?<br /> The serial interface is administratively down.<br /> The serial interface is already configured with an IP address.<br /> *The network administrator has attempted to configure the serial interface with a broadcast address.<br /> The same IP address has been configured on another interface.<br /><br /><br />26. Refer to the exhibit. A technician uses the SDM application to configure router R1. Which step should be taken by the technician to enable the Fa0/0 interface on R1 to participate on the connected local network?<br /> Enable a DHCP server on the Fa0/0 LAN interface.<br /> *Configure the appropriate IP address on the Fa0/0 interface.<br /> Configure IP addresses for the primary and secondary DNS server.<br /> Configure the starting and ending IP addresses for the DHCP pool but exclude the Fa0/0 IP address.<br /><br />27. Refer to the exhibit. The network administrator uses the command below to configure a default route on RTB:<br /><br />RTB(config)# ip route 0.0.0.0 0.0.0.0 fa0/0<br /><br />A ping issued from PC3 is successful to RTB. However, echo request packets arrive at PC1 but the echo replies do not make it back to PC3. What will fix this problem?<br /> RTA must be configured to forward packets to the 192.168.2.0 network.<br /> *The ip route command needs to be edited so that the next hop address is 10.1.1.5.<br /> The ip route command needs to be edited so that the 192.168.2.1 address is the next hop address.<br /> The ip route command should be removed from the RTB router configuration.<br /> Another default route should be configured on RTA with a next hop address of 10.1.1.6.<br /><br />28. Which type of cable may be used for backbone cabling between data centers that are located on different floors and that are separated by a distance of 1640 feet (500 meters)?<br /> STP<br /> UTP<br /> coaxial<br /> *fiber-optic<br /><br />29. A network engineer is planning a new horizontal cable installation in an office building. What advantage would UTP cable have over fiber optic cable for this installation?<br /> *lower installation costs<br /> better protection from EMI<br /> higher transmission speeds<br /> longer unrepeated distance between endpoints<br /><br />30. What is the maximum unrepeated distance set by industry standards for UTP cable?<br /> 10 meters<br /> 75 meters<br /> *100 meters<br /> 325 meters<br /><br />31. What are three features of the TCP protocol? (Choose three.)<br /> *It provides retransmission of data packets if they are lost during transmission.<br /> It is a connectionless protocol.<br /> *It uses a three-way handshake between the sending and receiving systems to establish each conversation.<br /> *It specifies how messages are reassembled at the destination host.<br /> It requires only 8 bytes of overhead.<br /> It breaks the data packet into datagrams.<br /><br />32. A company is developing an Internet store for its website. Which protocol should be used to transfer credit card information from customers to the company web server?<br /> FTPS<br /> HTTP<br /> *HTTPS<br /> WEP2<br /> TFTP<br /><br />33. In the URL http://dev.cisco.com/wwwdocs/procedures.htm, what is identified by wwwdocs?<br /> the server name where the resource is located<br /> the protocol that is used for the resource request<br /> the domain name of the server that is being accessed<br /> *the folder where the requested resource is stored<br /><br /><br />34. A small company wishes to provide e-mail accounts for its users. For insurance reasons the company wants to ensure that proper mail retention policies are followed. The company wants to ensure that all e-mail is backed up regularly, but it does not want the users to have to perform this backup themselves. Which protocol would meet the needs of the company?<br /> SSL<br /> POP3<br /> SMTP<br /> *IMAP4<br /><br />35. Which AAA process requires users to prove their identity with a username and password to gain access to a network?<br /> accounting<br /> authorization<br /> *authentication<br /> acknowledgment<br /><br />36. Refer to the exhibit. A network administrator has an extra router and wishes to use it as shown to passively monitor network traffic. Which IOS feature should be implemented on router EXTRA?<br /> ACLs<br /> CDP<br /> *IDS<br /> IPS<br /><br />37. Which networking service is used to provide name to IP address mapping?<br /> *DNS<br /> FTP<br /> NAT<br /> DHCP<br /><br />38. What is an example of a dedicated point-to-point WAN link?<br /> ISDN<br /> Frame Relay<br /> dialup<br /> *T1/E1<br /><br />39. A small tire retailer requires a low-cost WAN connection to its headquarters in order to manage its inventory and process customer sales in real time. Which WAN connection type is best suited to its needs?<br /> SONET<br /> T3<br /> T1<br /> *DSL<br /> leased line<br /><br />40. Refer to the exhibit. Router Left is unable to ping router Right. The show interfaces serial 0/0/0 command indicates that the interface is up but the line protocol is down on both routers. Which action could be taken to establish connectivity between the two routers?<br /> Configure S0/0/1 instead of S0/0/0 on router Right.<br /> Enter the encapsulation hdlc command on router Right.<br /> Contact the service provider to report that the circuit is down.<br /> Contact the service provider to enable PPP on the WAN circuit.<br /> *Enter the no encapsulation ppp command on router Left S0/0/0.<br /><br />41. A network technician wants to restore a backup copy of the saved configuration file on a router from a TFTP server. After restoring the file from the TFTP server, the technician reloads the router and finds that it still has the old configuration file instead of the restored file. What could have caused this?<br /> The technician entered the command delete flash: before reloading the router.<br /> The technician entered the command boot system rom before reloading the router.<br /> The technician entered the command erase startup-config before reloading the router.<br /> *The technician failed to enter the command copy running-config startup-config before reloading the router.<br /><br /><br />42. A company functions from Monday to Friday each week. Their backup strategy calls for full backups each Friday night, with differential backups on all other weekday nights. If an administrator is asked to restore a server hard drive to its Wednesday morning state, how many backups must be used?<br /> 1<br /> *2<br /> 3<br /> 4<br /><br />43. A small company has contracted with its ISP for web hosting. Which two items would be included in the SLA for this service? (Choose two.)<br /> *performance<br /> web server cost<br /> *(service availability<br /> operating system on the web server<br /> web server model and configuration<br /><br />44. A building has experienced a power outage. When the power returns, none of the devices on one floor can access the Internet. The network administrator checks the switch in the IDF that these devices are connected to and notes that the SYST LED on the front of the switch is amber.<br /><br />What is a possible cause of this problem?<br /> The switch is functioning properly.<br /> *The switch has failed POST.<br /> The switch configuration file was not saved to NVRAM.<br /> The connection between the switch and the server did not autonegotiate speed and duplex properly.<br /><br />45. How does an SNMP trap aid network monitoring and management?<br /> It reports to the management station by responding to polls.<br /> It collects information for the management station by using polling devices.<br /> *It sends an alert message to the management station when a threshold is reached.<br /> It flags attempts to begin a DoS attack on the network.computerhttp://www.blogger.com/profile/00775484145552043479noreply@blogger.com0tag:blogger.com,1999:blog-9220200559382305581.post-27552366355961546012010-03-30T01:47:00.001-07:002010-03-30T01:47:37.589-07:00<span style="font-weight: bold;">modul 9</span><br /><br />1.You have decided to install your new Linux distribution by using the bootable CD that came with it. What must be configured before you can boot from the CD?<br /> CMOS<br /> NVRAM<br /> *BIOS<br /> Hard drive<br /><br />2. You are installing RedHat 7.2 and have decided to use the installation class called "Workstation". Which of the following packages will not be installed? (Select two.)<br /> X Windows<br /> *Telnet daemon<br /> *HTTP daemon<br /> Vi editor<br /> Sendmail daemon<br /> Browser<br /><br />3. Which of the following would be standard file system types that Linux would use during an installation? (Select two.)<br /> NTFS<br /> FAT16<br /> FAT32<br /> *ext2<br /> *ext3<br /> VFAT<br /><br />4. You have formatted a drive while doing a Linux installation for a production server. The formatting revealed that there were several bad blocks. You see that the bad blocks make up about four percent of the total disk. Which of the following would be the best course of action?<br /> reformat the drive with a high level format<br /> reformat the drive with a low level format<br /> *replace the drive<br /> mark the blocks as "bad" and continue the installation<br /><br />5. You would like to perform a high-level format on a hard disk. Which of the following Linux commands will accomplish this?<br /> format<br /> fdformat<br /> hformat<br /> *mkfs<br /> mkhfs<br /><br />6. You have tried to install a particular RedHat package but it keeps telling you that it has a "failed dependency". What would cause this error?<br /> The package depends on certain user input.<br /> The package depends on operating system input.<br /> *The package depends on another package being installed.<br /> The package depends on hardware that is not present in the computer.<br /><br />7. When is the root account typically created in Linux?<br /> at first login<br /> *during NOS installation<br /> when configuring NOS user accounts<br /> after user accounts are created<br /><br />8. Which statement correctly describes shadow passwords?<br /> They allow users to have two different passwords.<br /> They are stored in encrypted form in /etc/passwd.<br /> They are stored in encrypted form in a file all users can read.<br /> *They are stored in a file which is not accessible by all users.<br /><br />9. Which term describes the Linux superuser account?<br /> sys<br /> *root<br /> power user<br /> wheel<br /> daemon<br /><br />10. Where, on a Linux server, would you find the main password file that is readable by any logged-in user?<br /> /etc/password<br /> /etc/shadow<br /> */etc/passwd<br /> /var/password<br /> /var/passwd<br /><br />11. You are setting up a Linux workstation and you would like it to automatically get all of the correct IP settings as soon as it boots. Which protocol should you set the workstation to use to accomplish this?<br /> DNS<br /> ARP<br /> *DHCP<br /> NetBEUI<br /> Default Gateway<br /><br />12. Which of the following are valid boot loader options for most Linux installations? (Select two.)<br /> Boot.ini<br /> Autoexec.bat<br /> *LILO<br /> *GRUB<br /> Loadlite<br /> RPM Loader<br /><br />13. Which of the following can be set within the LILO configuration file?<br /> an option to ask for a DNS server<br /> *an option to clear the /tmp directory at boot<br /> an option to boot to runlevel 5<br /> an option to use DHCP<br /><br />14. You have successfully installed your Linux server but notice that it only seems to be using 64 megabytes of RAM. You know that there are actually 128 megabytes of RAM in the server. How can you force Linux to use the full 128 megabytes of RAM?<br /> adjust the RAM setting in the BIOS<br /> create a file called SYSRAM in /etc<br /> *put the actual amount of RAM in the LILO configuration file<br /> manually enter the amount of RAM in the /dev directory<br /><br />15. What is the name of the X Windows package that is supplied with most distributions of Linux?<br /> X Windows<br /> *Xfree86<br /> Xfree386<br /> Xlib86<br /> Xlib386<br /><br />16. You have successfully installed your Linux workstation complete with working X Windows. However, your supervisor tells you that you should check for a new video driver. Why might you want to do this?<br /> RedHat writes their own video drivers but factory ones are better.<br /> *The manufacturer may have improved the performance with new drivers.<br /> Specific video drivers are not included on the distribution disks.<br /> All of the video drivers on the distribution disks are limited to 800 x 600 resolution.<br /><br /><br />17. You are installing X Windows on your RedHat server. Which command would be similar to what you would need to type at the command prompt in order to install X Windows?<br /> dpkg -i xserver-xfree86_4.0.2-7_i386.deb<br /> install -UvH X-Windows_4.0.2-7_i386<br /> *rpm -Uvh XFree86-server-4.0.2-11.i386.rpm<br /> tarrpm -Uvh XFree86-server-4.0.2-11.i386.tar<br /><br />18. Where would the driver files for Xfree86 be stored?<br /> /etc/X11R6/lib/modules/drivers<br /> */usr/X11R6/lib/modules/drivers<br /> /var/X11R6/lib/modules/drivers<br /> /dev/X11R6/lib/modules/drivers<br /><br />19. Which command will terminate an X Windows session and present the user with a text mode login prompt?<br /> Xend<br /> init 5<br /> *telinit 3<br /> xstop 3<br /> telinit 5<br /> stopx<br /><br />20. You have installed X Windows version 4.0.x and it will not work. Which of the following could be used to reconfigure it? (Select two.)<br /> Xf86cfg<br /> Xf86setup<br /> Xf86config<br /> *Xconfigurator<br /> *XFree86<br /><br />21. Focus-follows-mouse and click-to-focus are two types of focus models. Which software would be responsible for configuring an X Windows installation to use one of these models?<br /> desktop environment<br /> environment variables<br /> *windows manager<br /> mouse driver<br /><br />22.You would like to install the samba program on your Linux machine. You have located the file samba-2.0.7.tar.gz. Which command should you use to completely unpack the files in this package?<br /> gunzip samba-2.0.7.tar.gz<br /> tar -xvf samba-2.0.7.tar.gz<br /> *tar -xvzf samba-2.0.7.tar.gz<br /> gunzip -xvf samba-2.0.7.tar.gz<br /><br />23. You are examining lilo.conf and see a line that says "prompt". What will this command prompt a user for?<br /> a password<br /> *an operating system<br /> a username<br /> boot parameterscomputerhttp://www.blogger.com/profile/00775484145552043479noreply@blogger.com0tag:blogger.com,1999:blog-9220200559382305581.post-44519178192721961792010-03-30T01:36:00.001-07:002010-03-30T01:36:50.678-07:00<span style="font-weight: bold;">modul 8</span><br /><br />1. Which account, created during installation, allows someone to manage the Windows 2000 NOS?<br /> Manager<br /> Supervisor<br /> *Administrator<br /> SuperUser<br /><br />2. When installing Windows 2000 Professional on a new machine, what must you do to boot from the CD?<br /> Nothing, it will automatically boot from the CD.<br /> Select the correct install device option from the menu.<br /> *Enter the CMOS setup and set the boot sequence to boot from the CD-ROM drive first.<br /> Insert the Windows 2000 CD in the CD-ROM drive and press Enter.<br /><br />3. In a Windows 2000 environment, which key combination is used to enable the Windows logon window?<br /> Alt+Shift+Enter<br /> Ctrl+Shift+Delete<br /> *Ctrl+Alt+Delete<br /> Ctrl+Alt+Enter<br /><br />4. When entered in the Run box, which command will launch the Windows 2000 CLI?<br /> doskey<br /> cli<br /> *cmd<br /> msdos<br /><br />5. Which key combination, when executed in the Windows 2000 CLI, will display the command interpreter window in full screen mode?<br /> Shift+Enter<br /> Ctrl+Enter<br /> *Alt+Enter<br /> Delete+Enter<br /><br />6. Which Windows tool provides administrators with an easy way to view or navigate a file system?<br /> Internet Explorer<br /> *Windows Explorer<br /> WinNT Explorer<br /> File Explorer<br /><br />7. What is the purpose of the user's full name in the New User account box?<br /> *It is informational only.<br /> It authenticates the username.<br /> It allows the user to logon.<br /> It matches the user to permissions.<br /><br />8. In Windows 2000, which of the following is a required field when creating a new user account?<br /> the full name<br /> the password<br /> *the user name<br /> the description<br /><br />9. Which Windows 2000 Administrative Tools submenu provides configuration options for storage, shared resources, hardware devices, and other key components?<br /> Component Services<br /> Configure Your Server<br /> *Computer Management<br /> Server Extensions Administrator<br /><br />10. In Windows 2000, what is the best way to restore a deleted user account?<br /> Select undelete from the popup menu.<br /> Create a new account with the same user name.<br /> Select undo from the Edit menu.<br /> *Delete cannot be undone.<br /><br /><br />11. What is the proper way to shut down Windows?<br /> Push the power off button.<br /> Open a DOS window and enter the shut down command.<br /> *Choose Shut Down from the Start menu.<br /> Log off, then push the power off button.<br /><br />12. The network administrator needs to setup a new user account. After clicking on Start --> Programs --> Administrative Tools, which menu option from Administrative Tools should be selected to complete the task?<br /> Event Viewer<br /> Performance<br /> Local Security Policy<br /> *Computer Management<br /><br />13. All of the following groups can be created in Windows 2000 except:<br /> local groups<br /> global groups<br /> domain local groups<br /> *domain global groups<br /><br />14. In the graphic, which type of permissions are being set?<br /> share<br /> domain<br /> *NTFS<br /> FAT32<br /><br />15. What are the most basic user-related security tools available to an administrator?<br /> logons, permissions<br /> permissions, groups<br /> *permissions, passwords<br /> passwords, logons<br /><br />16. Where does the address http://127.0.0.1 point?<br /> to the closest web server<br /> *to the local host<br /> to the nearest DNS server<br /> to the local intranet<br /><br />17. In Windows 2000, what is the name of the HTTP web service located in the Administrative tools menu?<br /> Default FTP site<br /> *Default Web site<br /> Default Web service<br /> Default Internet Information Service<br /><br />18. In the Windows 2000 NOS, which tools must be loaded to run FTP services?<br /> FTP Services<br /> Network Services<br /> *Internet Information Services<br /> Site Services<br /><br />19. What must occur for a user to telnet to a Windows 2000 machine?<br /> The Telnet client must be configured on the Windows 2000 machine.<br /> *The user must have a valid user account on the Windows 2000 machine.<br /> The Telnet service must be stopped on the Windows 2000 machine.<br /> The user must physically be at the Windows 2000 machine.<br /><br />20. Which Start Menu item would the administrator choose to configure Telnet services in Windows 2000?<br /> Programs > Administrative Tools > Telnet Client<br /> Programs> System tools > Administration > Telnet<br /> *Programs > Administrative Tools > Telnet Server Administration<br /> Programs > Accessories > System Administration > Telnet Server<br /><br />21. In Windows 2000, which command terminates a Telnet session?<br /> end<br /> *exit<br /> bye<br /> logout<br /><br />22. What is the default authentication method for Windows 2000 Telnet sessions?<br /> NTFS<br /> *NTLM<br /> clear text<br /> security access method<br /><br />23. What is meant by the "store-and-forward" nature of e-mail?<br /> All messages are automatically stored on the server until the recipient forwards them to another user's account.<br /> *The recipients do not need to be present when an e-mail is delivered to their account.<br /> The recipients receive e-mail messages on the server and then must forward them to their personal e-mail accounts.<br /> The recipients must be present to receive and store their messages.<br /><br />24. What should a Windows 2000 administrator do to restrict Telnet access to specific users?<br /> Start the Telnet service.<br /> Change user permissions to include Telnet.<br /> List user names in the file telnet.ini.<br /> *Create a Telnet Client group.<br /><br />25. Which component of Windows 2000 accommodates many types of scripting languages?<br /> VBScript<br /> JScript<br /> *WSH<br /> ShellScriptcomputerhttp://www.blogger.com/profile/00775484145552043479noreply@blogger.com0tag:blogger.com,1999:blog-9220200559382305581.post-73063285079866817662010-03-29T22:53:00.000-07:002010-03-29T23:17:05.996-07:00<span style="font-weight: bold;">modul 7</span><br /><br />1. Which of the following is an advantage of getting a device with a pre-installed NOS or OS?<br /> *It is optimized for the particular hardware installed.<br /> It compounds the need for a complex installation process.<br /> It does not support custom and legacy applications.<br /> It completes configuration of server-specific features.<br /><br />2. Which task should be performed before installing a NOS?<br /> Change the system hardware and peripherals before beginning.<br /> *Verify that the NOS supports all application software that will run on the server.<br /> Run the evaluator software prior to loading to establish hardware settings.<br /> Be familiar with the NOS so configuration questions can be ignored.<br /><br />3. Most NOSs will only run on certain hardware configurations. There are typically 4 key elements of the system's hardware that must meet the minimum requirements of the NOS. Choose the list that contains these elements.<br /><br />1. CPU speed, RAM, NIC, hard disk space.<br />2. CPU type, CPU speed, RAM, hard disk space.<br />3. CPU type, RAM, NIC, CD ROM drive.<br />4. CPU type, RAM, CPU speed, CD ROM drive.<br /><br /> 1<br /> *2<br /> 3<br /> 4<br /><br />4. What is the best source of information for the latest hardware compatibility list?<br /> *the World Wide Web<br /> a hardware manual<br /> a software manual<br /> the CD-ROM Read Me document<br /><br />5. Which Windows utility can be used to perform a hardware inventory?<br /> Administrative Tools<br /> ScanDisk<br /> Windows Explorer<br /> *Device Manager<br /><br />6. The ping command is used to test network connectivity. What is the best IP address to ping for this test?<br /> the DNS address<br /> the loopback address<br /> the local NIC address<br /> *the default gateway address<br /><br />7. When preparing for a CD-ROM based NOS installation, which BIOS setting is important to the system administrator?<br /> Boot Up Floppy Seek: Enabled<br /> Swap Floppy Drive: Disabled<br /> *Boot Sequence: CD-ROM, C<br /> Quick Power On Self Test: Enabled<br /><br />8. All of the following are functions of an installation program except:<br /> *ensure interoperability of components<br /> request user input for configuration information<br /> provide a default set of configuration options<br /> simplify the installation process<br /><br />9. What are logical divisions on a hard disk called?<br /> *partitions<br /> sectors<br /> divisions<br /> cylinders<br /><br />10. How is the root partition identified in Linux?<br /> ?<br /> Root<br /> /root<br /> */<br /><br />11. When setting up a hard disk, what are the three possible types of partitions?<br /> primary, secondary, and logical<br /> *primary, logical, and extended<br /> C, D, and E<br /> boot, program, and data<br /><br />12. In Windows 9x and Linux, why is it important to keep a startup floppy containing the MBR?<br /> The startup floppy disk with the MBR must be used to boot from multiple partitions.<br /> *The floppy disk can be used to boot the system if the MBR on the first sector of the hard disk is corrupt.<br /> The MBR on the floppy keeps an error log for troubleshooting purposes.<br /> The startup floppy disk with MBR defines the size of partitions on startup.<br /><br />13. A DOS-type partition table can describe how many primary partitions?<br /> one<br /> two<br /> *four<br /> eight<br /><br />14. What is the maximum number of extended partitions supported in any partitioning scheme?<br /> *one<br /> two<br /> four<br /> eight<br /><br />15. What is the first sector of a hard drive called on systems that use DOS-type partitioning?<br /> partition table<br /> drive C<br /> swap space<br /> *MBR<br /><br />16. What is virtual memory?<br /> logical RAM that is created during installation<br /> memory that is installed on the logic board<br /> memory that can only be used by high-end programs<br /> *hard disk space that is used to supplement RAM<br /><br />17. UNIX systems typically dedicate an entire partition to virtual memory. What is this partition called?<br /> the RAM partition<br /> *the swap partition<br /> the page partition<br /> the memory partition<br /><br />18. What are valid file systems for a UNIX or Linux partition?<br /> EXT1 and EXT2<br /> *EXT3 and UFS<br /> UFS and EXT1<br /> LFS and EXT2<br /><br />19. What are the default names of the administrative accounts on a Windows and UNIX NOS, respectively?<br /> root, Administrator<br /> Admin, root<br /> *Administrator, root<br /> root, Admin<br /><br />20. What is the maximum number of primary partitions allowed in a Sun-type partition table?<br /> one<br /> two<br /> four<br /> *eight<br /><br />21. When a computer is turned on, what is the first step every computer will do regardless of the operating system?<br /> Boot<br /> RAM<br /> *POST<br /> SCSI<br /><br />22. In Windows 2000, which file is only used when the computer is set up to dual-boot?<br /> *BOOTSECT.DOS<br /> NTDETECT.COM<br /> NTLDR<br /> BOOT.INIcomputerhttp://www.blogger.com/profile/00775484145552043479noreply@blogger.com0tag:blogger.com,1999:blog-9220200559382305581.post-59585533765859128782010-03-29T22:52:00.001-07:002010-03-29T22:52:41.249-07:00<span style="font-weight: bold;">modul 6</span><br /><br />1. What are Network Operating Systems designed to do?<br /> *share resources across a network with multiple users<br /> remotely control other computers on the network<br /> access and control the local hard disk<br /> run stand-alone computers that are not LAN capable<br /><br />2. A user account on a server enables the server to do which of the following?<br /> automatically download appropriate applications and print queues to that user<br /> *authenticate that user and allocate those resources the user is allowed to access<br /> assign a specific IP and MAC address to the user's workstation<br /> assign the user to a specific domain and user group<br /><br />3. What are two benefits of having more than one processor in a system?<br /> support for remote locations and automatic job queuing<br /> *faster speeds and increased work capacity<br /> reduced need for IP addresses and decreased boot time<br /> reduced need for IP addresses and increased manageability<br /><br />4. How is redundancy built into a server system?<br /> *by including additional hardware components that can take over if other components fail<br /> by including a tape back-up system to preserve data<br /> by adding redundancy software to the system<br /> by keeping duplicates of all data<br /><br />5. What are two important features provided by security on a NOS?<br /> *authentication and encryption<br /> reliable performance and account management<br /> virus protection and prevention from spamming<br /> processor balance and sustained work load<br /><br />6. Which of the following are Network Operating Systems?<br /> Linux, Windows 2000, Windows 98<br /> Windows 2000, Windows 98, Novell NetWare<br /> *Novell NetWare, Linux, Windows 2000<br /> Novell NetWare, Linux, Windows 98<br /><br />7. In a Windows NT environment, what is the meaning of the term domain?<br /> a dedicated server containing the database of all IP and MAC addresses on the network<br /> a group of computers located in a specific physical or geographic region<br /> the OU that contains all user accounts<br /> *groups of computers, users, and resources that form an administrative boundary<br /><br />8. How many Primary Domain Controllers (PDCs) are allowed in a Windows NT environment?<br /> *1<br /> 2<br /> 4<br /> 9<br /><br />9. In Windows 2000, administrative tasks are accomplished using the Microsoft Management Console. Which type of module does this tool require for specific administrative functions?<br /> plug-in<br /> add-on<br /> *snap-in<br /> clip-on<br /><br />10. Windows 2000 Professional supports plug-and-play technology. What is one of the major advantages of this technology?<br /> An administrator can add devices from any manufacturer to the system and they will work.<br /> Devices no longer need software drivers to interact with the system.<br /> Components will interact with the system if plugged in prior to system boot.<br /> *An administrator or user can easily add components to the system without manual configuration.<br /><br />11. Which type of authentication security does Windows 2000 Professional support?<br /> Secure Socket Layer<br /> *Kerberos<br /> Samba<br /> Apache<br /><br />12.How many simultaneous connections does Windows 2000 Professional support?<br /> 3<br /> *10<br /> 40<br /> 25<br /><br />13.What is the primary intended use of Windows 2000 Professional?<br /> FTP server<br /> enterprise network server<br /> DNS server<br /> *client-side OS<br /><br />14. In Windows 2000 Server, what is the function of symmetric multiprocessing?<br /> *It allows multiple processors to work together to share the workload in a computer.<br /> It provides for redundancy of data over multiple processors to prevent data loss.<br /> It assures that each processor in the server works on the same projects simultaneously.<br /> It monitors the processors for errors, performance levels, and queued jobs to ensure quality.<br /> <br />15. Windows .NET Server is tailored to provide what types of services?<br /> reliable application and database services<br /> *reliable web and FTP services<br /> remote access and application services<br /> IPSec and remote access services<br /><br />16. Which of the following is open source?<br /> all versions of UNIX<br /> Windows 2000<br /> all versions of NetWare<br /> *Linux<br /><br />17. Which of the following criteria must software meet in order to display the Open Source Initiative trademark?<br /> It must be easily altered and adapted to all major operating systems and source code must be limited.<br /> It must be compatible with third party add-ons and use standard source code.<br /> It must be provided in multiple languages and cost must be minimal.<br /> *It must be freely distributed without restriction and the source code must be available.<br /><br />18. Which Linux distribution was built solely for nonprofit uses?<br /> *Debian GNU/Linux<br /> Caldera eDesktop and eServer<br /> SuSE Linux<br /> LinuxPPC<br /><br />19. Which program, running on a Linux server, allows Windows-based clients to see the Linux file system without installing client software?<br /> NFS<br /> Apache<br /> *Samba<br /> KDE<br /><br />20. Which client/server file system is used by most varieties of Linux file servers?<br /> FAT32<br /> *NFS<br /> NT<br /> SMB<br /><br />21. What are two popular Desktop Environments that run on Linux?<br /> *GNOME and KDE<br /> Apache and Samba<br /> Xfree86 and GNOME<br /> Apache and KDE<br /><br />22. What is the name of a mail server software package that is popular in Linux distributions?<br /> POP<br /> SMTP<br /> Postoffice<br /> *Sendmailcomputerhttp://www.blogger.com/profile/00775484145552043479noreply@blogger.com0tag:blogger.com,1999:blog-9220200559382305581.post-80328171342125709022009-05-10T23:30:00.000-07:002009-05-10T23:31:11.965-07:00<span style="font-weight: bold;">IT2 FINAL</span><br /><br />1. Which are three reasons a company may choose Linux over Windows as an operating system? (Choose three.)<br /> It is difficult to buy a new computer with a server version of Windows pre-installed.<br /> There is more application software available for Linux.<br /> *Running a Linux server without a GUI will increase efficiency and reliability. This option is not available in server versions of Windows.<br /> *After a user has purchased a copy of Linux, it can be installed on any number of computers for no additional charge.<br /> After a user has purchased a copy of Windows, it can be installed on any number of computers for no additional charge.<br /> *By default, users must provide a username and password to log into a Linux system, which improves system security.<br /><br />2. What are three network operating systems? (Choose three.)<br /> *Windows XP<br /> Windows 98<br /> Windows ME<br /> *Windows NT<br /> *Windows 2000<br /><br />3. What are three important considerations when designing a server? (Choose three.)<br /> monitor screen size<br /> *memory requirements<br /> *CPU speed<br /> speaker quality<br /> *hard disk type<br /> sound card capabilities<br /><br />4. Which distribution is one of the oldest and viewed as being one of the most significant?<br /> Caldera<br /> Debian<br /> SuSE<br /> *Red Hat<br /> Slackware<br /><br />5. When developing a network security plan, what are three factors that should be considered? (Choose three.)<br /> *the type of business conducted by the company and any laws pertaining to confidentiality of data<br /> the type of hardware being used by the company<br /> the geographic location and industry ranking of the company<br /> *the type of data stored on the company network<br /> *the management philosophy and how it is presented to employees<br /><br />6. Which two of the following commands can be used to configure security for a Linux system that is acting as a dedicated firewall? (Choose two.)<br /> ipconfig<br /> *ipchains<br /> iptrans<br /> *iptables<br /> ifconfig<br /><br />7. Which statement accurately describes the Slackware Linux distribution?<br /> It is designed for Linux novices.<br /> It has a range of user interfaces and uses RPM.<br /> *It is designed for advanced users and uses text-based configuration tools.<br /> It is intended solely for non-profit organizations and uses the Debian package manager.<br /><br />8. An instructor in a small college is putting together systems on which students will practice installing Windows 2000 Advanced Server. The instructor has been given 133 MHz Pentium computers with 128 MB of RAM, 2 GB hard drive, and a 12X CD-ROM drive. Which component needs to be upgraded to bring the machines up to the recommended standard for Windows 2000 Advanced Server?<br /> CPU<br /> *RAM<br /> hard drive<br /> CD-ROM drive<br /><br />9. In Windows 2000 Professional, which of the following functions can a user perform without administrator rights?<br /> *add a mapping to a network printer<br /> manage the domain configuration<br /> assign permissions to a user account<br /> manage security policies<br /><br />10. A technician in a small company has been asked to install Windows 2000 onto a laptop that belongs to a manager. Which installation option should the technician choose?<br /> typical<br /> mobile<br /> custom<br /> *portable<br /> compact<br /><br />11. Which three of the following file systems can be used to format a Windows NOS partition? (Choose three.)<br /> ext2<br /> *FAT<br /> *FAT32<br /> HFS<br /> *NTFS<br /> vfat<br /><br />12. What are two ways a Windows client can connect to a shared network printer? (Choose two.)<br /> *Add Printer Wizard<br /> Net Connection Wizard<br /> net connect command<br /> *net use command<br /><br />13. If network users cannot access an FTP server, what are two ways to stop and restart the FTP service on a Windows 2000 server? (Choose two.)<br /> use the IIS Wizard<br /> *click on the Services and Applications > Services tab in the MMC<br /> enter netstat -halt at the command line<br /> *select Control Panel > Administrative Tools > Services<br /> select IIS Maintenance Console > Services<br /><br />14. How can a technician change the IP address of a Windows 2000 system?<br /> run cmd and then enter the command ipconfig<br /> right-click on My Computer and then Properties > Network Connections > TCP Settings<br /> *right-click on My Network Places > Properties and then Local Area Network > Properties > TCP/IP > Properties<br /> left-click on Start > Programs > Accessories > Administrative Tools > Network Settings<br /><br />15. Which of the following is the most popular type of package manager available for Linux?<br /> DBM<br /> *RPM<br /> WINZIP<br /> PKZIP<br /><br />16. Which two of the following statements are true about Linux scripts? (Choose two.)<br /> Scripts cannot contain loops.<br /> *Scripts are executed in a top down fashion.<br /> *Scripts can be created using the vi text editor.<br /> Scripts cannot contain commands.<br /> A script is part of the OS.<br /><br />17. Which mode of the vi text editor will be accessed by typing a colon (:)?<br /> edit<br /> entry<br /> command<br /> *last-line<br /><br />18. What is the name of the standard X Window terminal program?<br /> *xterm<br /> xshell<br /> cli-win<br /> cli-shell<br /><br />19. Which of the following, when used with the telinit command, will cause a system to read the /etc/inittab file and implement new changes?<br /> s<br /> o<br /> *q<br /> z<br /><br />20. Which extension is found on the end of files that have been compressed using the compress program?<br /> .gz<br /> *.Z<br /> .c<br /> .XZ<br /><br />21. When using Linux, which of the following commands is used to perform a low-level format?<br /> mkfs<br /> format<br /> df<br /> *fdformat<br /> du<br /><br />22. Which file system type is recommended for a Linux hard disk partition to be used for applications and data?<br /> ext2<br /> *ext3<br /> reiser<br /> boot<br /> swap<br /><br />23. Which two of the following are common Linux super-servers? (Choose two.)<br /> *inetd.d<br /> initd.d<br /> inet.d<br /> *xinetd.d<br /> xinit.d<br /> xinitd.d<br /><br />24. Which three of the following network configuration parameters can be set during installation? (Choose three.)<br /> *IP address<br /> MAC address<br /> file server address<br /> *DNS server address<br /> *subnet mask<br /> network type<br /><br />25. Which of the following commands would allow a user to switch from a user account to the root account to execute a program that requires root permissions?<br /> switch<br /> flip<br /> logon<br /> *su<br /> jump<br /><br />26. Which Linux partition generally contains the kernel?<br /> */boot<br /> /<br /> root<br /> swap<br /><br />27. Which three of the following statements correctly describe topologies? (Choose three.)<br /> The physical topology of a network refers to the path data travels from a source to a destination.<br /> *The logical topology of a network refers to the path signals travel from a source to a destination.<br /> *A ring topology can refer to either a physical or logical topology.<br /> A logical topology refers to the actual map and layout of a network.<br /> *A physical topology describes the actual layout of network devices.<br /><br />28. A technician is setting up a Windows workstation that has an IP address of 192.168.64.23 to work on a network that contains a Linux file server with the IP address 192.168.64.2. What should the technician do to view the IP configuration on the workstation?<br /> *run ipconfig /all on the workstation<br /> run ipconfig 192.168.64.23 on the workstation<br /> run ping 192.168.64.2 on the workstation<br /> run ifconfig addr 192.168.64.23 on the server<br /> run ping 192.168.64.23 on the server<br /><br />29. A technician is troubleshooting a Windows machine that is not communicating with the network server. The technician verifies that the server is not reachable and ipconfig shows that the workstation is configured properly. What should the technician do next?<br /> ping the default gateway<br /> *ping 127.0.0.1<br /> check the configuration of the server<br /> tracert to the server<br /><br />30. A technician wishes to load Linux onto a new computer system that currently has no operating system loaded on the single hard drive. The technician wishes to boot from the installation CD but the message 'Media error' keeps appearing. What should the technician do next?<br /> *check the BIOS to make sure the CD-ROM is the first boot device<br /> make sure the cable to the CD-ROM is inserted correctly<br /> partition the disk using fdisk<br /> boot from a boot floppy<br /> try booting from a different Linux distribution<br /><br />31. Which of the following commands can be used to specify the user and group ownership of a file?<br /> *chown<br /> chgrp<br /> usermod<br /> groupmod<br /> filemod<br /> more<br /><br />32. If the kill command is used on a computer running Linux without specifying a signal, which signal is used by default?<br /> SIGEND<br /> SIGCTRLC<br /> SIGKILL<br /> *SIGTERM<br /> SIGNAL<br /><br />33. Which three of the following statements about memory are true? (Choose three.)<br /> *RAM is faster than the hard disk of a computer.<br /> Hard disks normally have smaller storage capacity than RAM.<br /> *Virtual memory can be used to compensate for a lack of physical memory.<br /> Virtual memory must be managed manually.<br /> *A lack of available RAM will impact the performance of a computer.<br /><br />34. A technician has determined that the reason a Linux system refuses to boot is that the /etc/fstab file is corrupt. What should the technician do to try to repair the system?<br /> use an MS-DOS boot disk to boot the system and then use the MS-DOS edit utility to repair the /etc/fstab file<br /> *boot the system using an emergency boot disk floppy and then edit the /etc/fstab file on the hard drive<br /> boot the system using the emergency repair disk and then run fdisk /mbr<br /> run the Linux installation program from the installation CD and select Repair fstab when it reaches the disk partitioning step<br /><br />35. Which of the following directories contains most of the Linux system log files?<br /> /etc/log<br /> /etc/sys/log<br /> */var/log<br /> /var/sys/log<br /><br />36. Which of the following commands will show a listing of all the Linux commands and a brief description?<br /> man man<br /> *man intro<br /> man list<br /> man more<br /> man command<br /><br />37. Which of the following situations can be addressed by using the fsck command?<br /> A user has been given the job of creating two new partitions on an existing hard drive.<br /> A user must change the permissions on three existing files without changing any existing permissions on the directory where the files are stored.<br /> *A user must repair the file structure after an unexpected power failure causes a system to abruptly shut down.<br /> A user must batch create home directories for seven new users.<br /><br />38. The table shows the users and groups that have permission to access a file and the permissions they have in a Windows XP system. If User1 is a member of the User group but not a member of the Administrator group, which users can delete the file?<br /> administrators only<br /> any member of the Administrator and User groups<br /> *User1 and any member of the Administrator group<br /> any member of the User group only<br /> User1 only<br /><br />39. Which tool, native to Windows XP, is used to monitor system resources?<br /> SysScan<br /> *Performance Tool<br /> XPMON<br /> XP Benchmark Tool<br /> System Safeguard<br /><br />40. While using a non-administrator Windows 2000 account, an administrator is asked to add a new user to the system. What is the easiest way for the administrator to create a new user?<br /> The administrator enters Administrator Tools and then clicks on Computer Management. The administrator will then be able to create a new user.<br /> *The administrator enters Administrator Tools without changing to the Administrator account then right-clicks on Computer Management and selects Run as. After entering the Administrator account password the administrator can create a new user.<br /> The administrator clicks on Start > Switch User. The administrator then chooses the Administrator account to create the new user.<br /> The administrator logs out from the the non-administrator account and then logs in as the administrator. The administrator will then be able to create a new user.<br /><br />41. How can an administrator assist a Windows 2000 user with a forgotten password?<br /> *set a new password for the user in the Computer Management tool<br /> enter the Computer Management tool, click on the user, and then select Properties > Password to display the password<br /> switch to the user account from the administrator account and select Set Password from the Control Panel<br /> log in as the user using the administrator password, enter Ctrl-Alt-Del, and click on Change Password<br /> delete the user account from the Computer Management tool and create a new user account<br /> e-mail Microsoft to request a new password for the account, which will then be e-mailed directly to the user<br /><br />42. A technician is given a Windows 2000 computer that apparently has an inoperable modem card. What should the technician do first?<br /> take the case off the computer and make sure the modem card is properly seated in the expansion slot<br /> remove the suspect card and replace it with another one to see if the fault goes away<br /> *check in Device Manager to see if there are any icons next to the modem device<br /> left-click on My Computer and then click on Explore to detect any faults within the system<br /> double-click on My Computer and then Dialup Network Connections to determine if Windows recognizes the modem device<br /><br />43. A user wants to give other network users access to a folder on a Windows 2000 system. After right-clicking on the folder, which item should the user select?<br /> *Sharing<br /> Rights<br /> Permissions<br /> Properties<br /> Security<br /><br />44. Which Microsoft option will use the Internet to contact a vendor's website in search of patches, fixes, and updates?<br /> Secure Update<br /> Flash Update<br /> *Windows Update<br /> Update Manager<br /> Patch Manager<br /><br />45. Which of the following Linux commands is used to create a directory?<br /> diradd<br /> *mkdir<br /> dir<br /> touch<br /> makedr<br /><br />46. What is the function of the netstat utility?<br /> It displays the manufacturer and version of network devices.<br /> It is the part of the SNMP suite, which collects network usage information.<br /> It is a Linux utility for collecting information about other devices that are connected to a network.<br /> It converts an IP address to a MAC address.<br /> *It displays information about a network such as connections, routing tables, and interfaces.<br /><br />47. Which command is used to change groups after a user has logged into a system?<br /> *newgrp<br /> changegrp<br /> switchgrp<br /> sgrp<br /> chgrp<br /> chgroup<br /><br />48. A new administrator has discovered that kernel messages are not saved to a log file when the system is booted. The LILO boot loader is used. What can the administrator do to correct this?<br /> *put the line dmesg > /var/log/boot.messsages in the /etc/rc.d/rc.local file<br /> put the line dmesg in the init.conf file<br /> press the F8 button when the system is booted<br /> hold the F6 key down when the system is powered up<br /> put the line messages = /etc/log/boot.messages in lilo.conf<br /><br />49. What are two steps in the creation of a Windows 2000 or Windows XP script? (Choose two.)<br /> *write the script code and save as ASCII text<br /> make sure the first line of the script defines the scripting language used<br /> compile the script into a bytecode file<br /> compile the script into a binary executable file<br /> *save the script with the appropriate filename extension for the scripting language used<br /><br />50. Which two of the following standards are necessary for proper virus protection? (Choose two.)<br /> Virus protection software should only be installed on client workstations that have Internet access.<br /> Virus protection software should only be installed on servers that can be accessed by remote clients.<br /> *Virus protection software should be installed on all workstations and servers.<br /> All virus warnings should come from at least two network support technicians.<br /> *One person should be responsible for communicating virus alerts to all users.<br /><br />51. Which two of the following standards describe proper security for usernames and passwords? (Choose two.)<br /> A complex password convention is less important than having a complex standard regarding usernames.<br /> All passwords should be a short combination of easily remembered letters and numbers so that users will not need to write their passwords down.<br /> *The level of password control for assigning passwords should match the level of protection required.<br /> Both usernames and passwords should periodically expire to ensure maximum security.<br /> *Password expiration and lockout rules should be clearly defined and communicated to network users.<br /><br />52. What is the name of a free software program that is useful for monitoring security breaches on Linux servers without enhancing security?<br /> 3DES<br /> *LSAT<br /> PC Guardian<br /> Winzap<br /> PortSentry<br /><br />53. What allows Linux applications to print to non-PostScript printers?<br /> /etc/lpn<br /> *Ghostscript<br /> LPRng<br /> /etc/printcap<br /> printtool<br /><br />54. The Apache web server has been installed on a Linux server and is being configured. The administrator wishes to change the location of the web pages that will be served to /home/www and knows that the main configuration file contains this directive. What is the name of the file that needs to be edited?<br /> access.conf<br /> apache.conf<br /> *httpd.conf<br /> inetd.conf<br /> initd.conf<br /> www.conf<br /><br />55. Which four parts of a Linux file system are often located in dedicated partitions? (Choose four.)<br /> */<br /> */boot<br /> /etc/httpd<br /> */home<br /> /mnt<br /> *swap file<br /><br />56. Which two of the following devices are most likely to have drivers that are already compiled into a modern Linux kernel? (Choose two.)<br /> printer<br /> scanner<br /> *sound card<br /> software modem<br /> *USB device<br /> video card<br /><br />57. Which of the following statements is true of NIS?<br /> The NIS domain name must be the same as the Internet DNS domain name.<br /> Changes to the NIS database can be made on any NIS server and will be replicated throughout the system.<br /> *Slave servers provide load sharing for the NIS server.<br /> All NIS configuration changes to an NIS client must be performed in an ASCII text editor.<br /> For security purposes, it is recommended that the yppasswd command be used to set a different NIS user password than the one on the local machine.<br /><br />58. In Windows 2000, which two categories within Computer Management under System Tools store logged information? (Choose two.)<br /> System Log<br /> Warnings, Errors, and Alerts<br /> Service Log<br /> *Performance Logs and Alerts<br /> *Event Viewer<br /> Network Log<br /><br />59. Why might the administrator of a small company choose Windows 2000 Server instead of Windows 2000 Professional?<br /> The operating system is to run on a dual-processor system.<br /> *The system is to act as a DNS server.<br /> The company needs an intranet based on a small web server.<br /> The server will be accessed by up to ten simultaneous users.<br /><br />60. After configuring Web services with Windows XP, what two methods can be used to view the default web page? (Choose two.)<br /> Users can view the default web page by using the View Web Page tool found under Administrative Tools in the IIS Manager.<br /> *Users can view the default web page by submitting the address http://127.0.0.1 via a web browser on the Windows XP server.<br /> Users can view the default web page by submitting http://www.localstart.asp in the web browser on the Windows XP server.<br /> *Users can view the default web page by submitting the IP address of the Windows XP server via a web browser on the Windows XP server.<br /><br />61. The administrator of a Windows 2000 system believes that the reason for the reduced performance of the network is due to the condition of the server's disks. What Windows 2000 tool can the administrator use to get the most complete information regarding the status of the disks on the server?<br /> Right-click on My Computer and select Properties.<br /> *Click on Start > Control Panel > Administrative Tools > Computer Management.<br /> Click on Run and enter msconfig in the text box.<br /> Click Start > Accessories > System Tools > Disk Management.<br /><br />62. What is the System Monitor tool?<br /> It is an MS-DOS utility that displays current CPU usage only.<br /> It is an MS-DOS tool that displays information about the usage of a variety of resources.<br /> It is a tool available in Windows 2000 and XP that will display the current state of a number of system resources in a textual format.<br /> *It is a Windows 2000 and XP tool that shows graphically the utilization of a number of system resources over a period of time.computerhttp://www.blogger.com/profile/00775484145552043479noreply@blogger.com0tag:blogger.com,1999:blog-9220200559382305581.post-35820269949622852982009-04-15T00:32:00.000-07:002009-04-15T00:34:13.937-07:00<p><b>Komputer</b> adalah alat yang dipakai untuk mengolah <a href="http://id.wikipedia.org/wiki/Data" title="Data">data</a> menurut <a href="http://id.wikipedia.org/wiki/Prosedur" title="Prosedur">prosedur</a> yang telah dirumuskan. Kata <i>computer</i> semula dipergunakan untuk menggambarkan orang yang perkerjaannya melakukan per<a href="http://id.wikipedia.org/wiki/Hitung" title="Hitung">hitungan</a> <a href="http://id.wikipedia.org/wiki/Aritmatika" title="Aritmatika" class="mw-redirect">aritmatika</a>, dengan atau tanpa alat bantu, tetapi arti kata ini kemudian dipindahkan kepada mesin itu sendiri. Asal mulanya, pengolahan informasi hampir eksklusif berhubungan dengan masalah aritmatika, tetapi komputer modern dipakai untuk banyak tugas yang tidak berhubungan dengan <a href="http://id.wikipedia.org/wiki/Matematika" title="Matematika">matematika</a>.</p> <p>Dalam definisi seperti itu terdapat alat seperti <i><a href="http://id.wikipedia.org/w/index.php?title=Slide_rule&action=edit&redlink=1" class="new" title="Slide rule (halaman belum tersedia)">slide rule</a></i>, jenis <a href="http://id.wikipedia.org/w/index.php?title=Kalkulator_mekanik&action=edit&redlink=1" class="new" title="Kalkulator mekanik (halaman belum tersedia)">kalkulator mekanik</a> mulai dari <a href="http://id.wikipedia.org/wiki/Abakus" title="Abakus" class="mw-redirect">abakus</a> dan seterusnya, sampai semua komputer elektronik yang kontemporer. Istilah lebih baik yang cocok untuk arti luas seperti "komputer" adalah "yang mem<a href="http://id.wikipedia.org/wiki/Proses" title="Proses">proses</a> <a href="http://id.wikipedia.org/wiki/Informasi" title="Informasi">informasi</a>" atau "<a href="http://id.wikipedia.org/wiki/Sistem" title="Sistem">sistem</a> peng<a href="http://id.wikipedia.org/w/index.php?title=Olah&action=edit&redlink=1" class="new" title="Olah (halaman belum tersedia)">olah</a> <a href="http://id.wikipedia.org/wiki/Informasi" title="Informasi">informasi</a>."</p>computerhttp://www.blogger.com/profile/00775484145552043479noreply@blogger.com0tag:blogger.com,1999:blog-9220200559382305581.post-15536779637000747652009-04-01T01:36:00.000-07:002009-04-01T01:42:35.772-07:00Istilah-istilah umum didalam Jaringan Komputer<h2><br /></h2><strong>Jaringan :</strong> jaringan (<em>network</em>) adalah kumpulan dua atau lebih sistem komputer yang terhubung. Terdapat banyak jenis jaringan komputer:<br />a. <em>local-area network</em> (LAN): komputer yang terhubung berada pada tempat yang berdekatan secara gografis (misalkan satu gedung).<br />b. <em>wide-area network</em> (WAN): komputer yang terhubung berada pada tempat yang berjauhan dan dihubungkan dengan line telepon atau gelombang radio. selain itu, jaringan komputer dapat juga dikelompokan berdasar kriteria di bawah ini:<br />a. <em>topologi</em>: pengaturan keterhubungan antar sistem komputer. Terdapat bermacam-macam topologi seperti <em>bus, star,</em> dan <em>ring</em>.<br />b. <em>protokol</em>: protokol mendefinisikan sekelompok aturan dan sinyal yang digunakan oleh komputer pada jaringan untuk berkomunikasi. Protokol LAN yang paling populer adalah <em>Ethernet</em>. Protokol LAN lain yang banyak digunakan adalah <em>IBM token-ring network</em>.<br />c. <em>arsitektur</em>: jaringan dapat diklasifikasikan ke dalam arsitektur <em>peer-to-peer</em> atau <em>client/server</em>. <p class="MsoNormal"><strong>NIC :</strong> NIC <em>(network interface card)</em> adalah <em>expansion board</em> yang digunakan supaya komputer dapat dihubungkan dengan jaringan. Sebagian besar NIC dirancang untuk jaringan, protokol, dan media tertentu. NIC biasa disebut dengan LAN card (Local Area Network Card).</p> <p class="MsoNormal"><strong>Backbone : </strong>Backbone adalah saluran atau koneksi berkecepatan tinggi yang menjadi lintasan utama dalam sebuah jaringan.</p> <p class="MsoNormal"><strong>Bandwidth :</strong> Bandwidth menunjukan kapasitas dalam membawa informasi. Istilah ini dapat digunakan dalam banyak hal: Telepon, jaringan kabel, bus, sinyal frekuensi radio, dan monitor. Paling tepat, bandwidth diukur dengan putaran perdetik (<em>cycles per second</em>), atau hertz (Hz), yaitu perbedaan antara frekuensi terendah dan tertinggi yang dapat ditransmisikan. Tetapi juga sering digunakan ukuran bit per second (bps).</p> <p class="MsoNormal"><span id="more-30"></span></p> <p class="MsoNormal"><strong>Bridge :</strong> Bridge adalah peranti yang meneruskan lalu lintas antara segmen jaringan berdasar informasi pada lapisan data link. Segmen ini mempunyai alamat lapisan jaringan yang sama. Setiap jaringan seharusnya hanya mempunyai sebuah bridge utama.</p> <p class="MsoNormal"><strong>DNS : </strong> DNS (<em>domain name sistem</em>) adalah sistem yang menerjemahkan domain Internet, seperti www.microsoft.com menjadi alamat Internet, yaitu serangkaian nomor yang terlihat seperti 101.232.12.5. Istilah DNS berhubungan dengan konvensi untuk penamaan host pada Internet dan cara penangan nama-nama tersebut.</p> <p class="MsoNormal"><strong>Ethernet : </strong>Ethernet adalah protokol LAN yang dikembangkan oleh Xerox Corporation yang bekerjasama dengan DEC dan Intel pada tahun 1976. Ethernet menggunakan topologi bus atau star dan medukung transfer data sampai dengan 10 Mbps. Versi Ethernet yang lebih baru yang disebut 100Base-T (atau Fast Ethernet), mendukung transfer data sampai dengan 100 Mbps, dan versi terbarunya, Gigabit Ethernet, mendukung tranfer data sampai dengan 1 Gigabit per detik atau 1000 Mbps.</p> <p class="MsoNormal"><a title="FastEthernet" name="FastEthernet"></a><strong>Fast Ethernet</strong><strong> : </strong>Fast Ethernet seperti Ethernet biasa, namun dengan kecepatan transfer data yang lebih cepat, sampai dengan 100 mbps. Ethernet ini juga disebut 100BaseT.</p> <p class="MsoNormal"><a title="Gateway" name="Gateway"></a><strong>Gateway</strong><strong> : </strong>Istilah gateway merujuk kepada hardware atau software yang menjembatani dua aplikasi atau jaringan yang tidak kompatibel, sehingga data dapat ditransfer antar komputer yang berbeda-beda. Salah satu contoh penggunaan gateway adalah pada email, sehingga pertukaran email dapat dilakukan pada sistem yang berbeda.</p> <p><strong>GPS : </strong>GPS (<em>Global Positioning System </em>) adalah sistem navigasi menggunakan 24 satelit MEO (<em>medium earth orbit</em> atau <em>middle earth orbit</em>) yang mengelilingi bumi dan penerima-penerima di bumi. Satelit mengorbit pada ketinggian sekitar 12.000 mil di atas bumi dan mampu mengelilingi bumi dua kali dalam 24 jam. Satelit GPS secara kontinu mengirimkan sinyal radio digital yang mengandung data lokasi satelit dan waktu pada penerima yang berhubungan. Satelit GPS dilengkapi dengan jam atom dengan ketepatan satu per satu juta detik. Berdasar informasi ini, stasiun penerima mengetahui berapa lama waktu yang digunakan untuk mengirim sinyal sampai ke penerima di bumi. Semakin lama waktu yang digunakan untuk sampai ke penerima, semakin jauh posisi satelit dari stasiun penerima. dengan mengetahui posisi satelit, penerima mengetahui bahwa satelit terletak pada posisi tertentu pada permukaan bola imaginer yang berpusat pada satelit. Dengan menggunakan tiga satelit, GPS dapat menghitung lintang dan bujur penerima berdasar perpotongan ketiga bola imaginer. Dengan menggunakan empat satelit, dapat juga ditentukan ketinggian. GPS dikembangkan dan dioperasikan oleh Departemen Pertahanan Amerika. GPS, asalnya dikenal dengan NAVSTAR (<em>Navigation System with Timing and Ranging</em>). Sebelum untuk keperluan yang lebih luas, GPS digunakan untuk menyediakan kemampuan navigasi sepanjang waktu dan dalam segala cuaca untuk militer darat, laut, dan angkatan udara. Disamping untuk navigasi dan penentuan posisi geografik, GPS dapat juga digunakan di antaranya untuk pemetaan, kehutanan, eksplorasi mineral, manajemen habitat liar, dan pengawasan perpindahan penduduk.</p> <p class="MsoNormal"><strong>Host : </strong>Host adalah sistem komputer yang diakses oleh pengguna yang bekerja pada lokasi yang jauh. Biasanya, istilah ini digunakan jika ada dua sistem komputer yang terhubung dengan modem dan saluran telepon. Sistem mengandung data yang disebut <em>host</em>, sedang sitem yang digunakan untuk mengases dari jarak jauh disebut <em>remote terminal</em>. Istilah <em>host</em> juga digunakan untuk menyebut komputer yang terhubung dengan jaringan TCP/IP, termasuk Internet. Setiap host mempunyai alamat IP yang unik. Selain itu, istilah <em>host</em> juga merujuk pada penyediaan infrastruktur layanan komputer. Sebagai contoh, banyak perusahaan yang menjadi host Web server, yang berarti bahwa perusahaan tersebut menyediakan hardware, software, dan saluran komunikasi yang dibutuhkan oleh server, tetapi isi server (data) dikendalikan oleh pihak lain.</p> <p class="MsoNormal"><a title="ISP(InternetServiceProvider)" name="ISP(InternetServiceProvider)"></a><strong>ISP (Internet Service Provider)</strong><strong> : </strong><a title="Internet" name="Internet"></a>ISP (<em>Internet service provider</em>) adalah penyedia layanan Internet. Sebagian besar ISP mempunyai jaringan server (mail, berita, Web), router, modem yang dihubungkan dengan koneksi “backbone” Internet yang permanen dan berkecepatan tinggi. Pelanggan ISP dapat mendapatkan koneksi Internet dengan modem dan telepon. Untuk mengakses Internet pelanggan ISP harus melakukan <em>dial</em> ke jaringan dengan menekan nomor telepon tertentu milik ISP.</p> <p class="MsoNormal"><strong>Internet</strong><strong> : </strong>Internet adalah jaringan global yang menghubungkan jutaan komputer. Sejak 1999 Internet telah memiliki 200 juta pemakai di seluruh dunia, dan jumlah ini meningkat cepat. Lebih dari 100 negara terhubung dengan Internet untuk menukar data, berita, dan informasi lainnya. Setiap komputer yang terhubung dengan Internet disebut <em>host</em>.</p> <p><a title="ISDN" name="ISDN"></a><strong>ISDN</strong><strong> : </strong>ISDN (<em>Integrated Services Digital Network</em>) adalah standard komunikasi internasional untuk pengiriman suara, video dan data melalui line telepon digital atau telepon kawat biasa. ISDN mempunyai kecepatan transfer data 64 Kbps. Sebagian besar saluran ISDN ditawarkan oleh perusahaan telepon yang memungkinkan dua saluran, yang disebut kanal B (<em>B channel</em>). Satu line dapat digunakan untuk suara dan yang lain untuk data lain dan keduanya mempunyai kecepatan transfer 128 Kbps. Versi awal ISDN menggunakan transmisi <em>baseband</em>. Versi lain ISDN, yaitu B-ISDN, menggunakan transmisi broadband dan dapat mendukung transmisi data dengan kecepatan 1,5 Mbps.</p> <p><a title="Protocol(protokol)" name="Protocol(protokol)"></a><strong>Protocol (protokol)</strong><strong> :</strong> Bahasa atau prosedur hubungan yang digunakan oleh satu sistem komputer dengan sistem lainnya sehingga antara keduanya dapat saling berhububngan. Untuk dapat berkomunikasi. Kedua system harus menggunakan protokol yang sama.</p> <p><a title="PPP(PointToPointProtocol)" name="PPP(PointToPointProtocol)"></a><strong>PPP (Point To Point Protocol)</strong><strong> :</strong> Protokol TCP/IP yang memungkinkan hubungan antara host dengan jaringan dan antara router dengan router atau dapat pula digunakan untuk hubungan serial antara 2 system.</p> <p><a title="Repeater" name="Repeater"></a><strong>Repeater</strong><strong> :</strong> Suatu perangkat yang dipasang di titik-titik tertentu dalam jaringan untuk memperbarui sinyal-sinyal yang di transmisikan agar mencapai kembali kekuatan dan bentuknya yang semula, guna memperpanjang jarak yang dapat di tempuh. Ini di perlukan karena sinyal-sinyal mengalami perlemahan dan perubahan bentuk selama transmisi.</p> <p><a title="Router" name="Router"></a><strong>Router</strong><strong> :</strong> Suatu perangkat yang berfungsi menghubungkan suatu LAN ke suatu internetworking/WAN dan mengelola penyaluran lalu-lintas data di dalamnya.</p> <p><a title="Routing" name="Routing"></a><strong>Routing</strong><strong> : </strong>Proses dari penentuan sebuah path yang di pakai untuk mengirim data ke tujuan tertentu.</p> <p><a title="RJ-45" name="RJ-45"></a><strong>RJ-45</strong><strong> : </strong>RJ-45 (<em>Registered Jack-45</em>) adalah konektor delapan kabel yang biasanya digunakan untuk menghubungkan komputer ke sebuah <em>local-area network</em> (LAN), khususnya Ethernets. Konektor RJ-45 mirip dengan konektor RJ-11 yang digunakan dalam koneksi telepon, tetapi lebih besar.</p> <p><a title="Server" name="Server"></a><strong>Server</strong><strong> : </strong>Suatu unit yang berfungsi untuk menyimpan informasi dan untuk mengelola suatu jaringan komputer.komputer server akan melayani seluruh client atau worstation yang terhubung ke jaringannya.</p> <p class="MsoNormal"><a title="TCP/IP" name="TCP/IP"></a><strong>TCP/IP</strong><strong> : </strong>TCP/IP <em>Transmission Control Protokol</em> adalah dua buah protokol yang dikembangkan oleh militer AS yang memungkinkan komputer pada jaringan dapat saling berhubungan. IP digunakan untuk memindahkan paket data antarsimpul. TCP dugunakan untuk memverifikasi pengiriman dari client ke server. TCP/IP adalah dasar internet dan dapat ditemukan pada semua system operasi modern, seperti Unix dan Windows.</p> <p class="MsoNormal"><a title="Topologi" name="Topologi"></a><strong>Topologi</strong><strong> : </strong>Dalam jaringan komputer <em>topologi</em> adalah bentuk pengaturan keterhubungan antar sistem komputer. terdapat bermacam-macam topologi seperti bus, star, ring.</p> <p class="MsoNormal"><a title="UTP" name="UTP"></a><strong>UTP</strong><strong> : </strong>UTP (<em>Unshielded Twisted Pair</em>) adalah jenis kabel yang terdiri dari dua kawat tak terbungkus yang berpilin. Kabel UTP banyak digunakan pada local-area networks (LANs) dan sambungan telepon karena harganya lebih murah. Kabel UTP tidak sebaik kabel koaksial dan serat optik dalam hal penyediaan banwidth dan ketahanan terhadap interferensi.</p> <p class="MsoNormal"><a title="VLAN" name="VLAN"></a><strong>VLAN</strong><strong> : </strong>VLAN (<em>virtual local-area network</em>) adalah jaringan komputer yang seakan terhubung menggunakan kabel yang sama meskipun mungkin secara fisik berada pada bagian LAN yang lain. VLAN dikonfigurasi melalui software dan tidak hardware, yang membuatnya sangat fleksible.<br />Salah satu keunggulan VLAN adalah jika sebuah komputer secara fisik dipindah ke lokasi lain, komputer tersebut tetap pada VLAN yang sama tanpa melakukan konfigurasi ulang hardware.</p> <p class="MsoNormal"><a title="VPN" name="VPN"></a><strong>VPN</strong><strong> : </strong>VPN (<em>virtual private network</em>) adalah koneksi internet pribadi yang aman dan terenkripsi untuk menjamin bahwa hanya pengguna yang berhak yang dapat mengaksesnya dan trasfer data yang dilakukan tidak dapat diganggu.</p> <p class="MsoNormal"><a title="VSAT" name="VSAT"></a><strong>VSAT</strong><strong> : </strong>VSAT (<em>Very Small Aperture Terminal</em>) stasiun bumi yang digunakan pada satelit komunikasi sinyal data, suara, dan video, kecuali pemancaran televisi. VSAT terdiri dari dua bagian: sebuah <em>transceiver</em> yang diletakkan ditempat terbuka sehingga dapat secara langsung menerima sinyal dari satelit dan sebuah piranti yang diletakkan dalam ruangan untuk menghubungkan transceiver dan piranti komunikasi pengguna akhir(<em>end user</em>), seperti PC.<br />Transceiver menerima dan mengirim sinyal ke transponder satelit diluar angkasa. Satelit mengirimkan dan menerima sinyal dari komputer stasiun bumi yang berfungsi sebagai <em>hub</em> sistem. Setiap pengguna yang saling terhubung dengan stasiun<em>hub</em> melewati satelit, membentuk topologi bintang. <em>hub</em> mengendalikan semua operasi pada jaringan. Semua transmisi untuk komunikasi antar pengguna harus melewati stasiun<em>hub</em> yang meneruskannya ke satelit dan kepengguna VSAT yang lain. VSAT dapat mengirimkan data sampai dengan kecepatan 56 Kbps.</p> <p class="MsoNormal"><a title="WAN" name="WAN"></a><strong>WAN</strong><strong> : </strong>WAN <em>wide area network</em> adalah komputer yang terhubung berada pada tempat yang berjauhan dan hubungan dengan line telepon atau gelombang radio. <em>Lihat</em> juga LAN dan jaringan.</p> <p class="MsoNormal"><a title="Wi-Fi" name="Wi-Fi"></a><strong>Wi-Fi</strong><strong> : </strong>Wi-Fi <em>Wireless Fidelity</em> adalah nama dagang resmi untuk IEEE 802.11b yang dibuat oleh Wireless Ethernet Compatibility Aliance (WECA). Istilah Wi-Fi menggantikan 802.11b seperti halnya istilah Ethernet menggantikan IEEE 802.3. Produk yang disertifikasi oleh WECA sebagai Wi-Fi dapat beroperasi bersama meskipun dibuat oleh perusahaan yang berbeda.</p> <p class="MsoNormal"><a title="Workstation" name="Workstation"></a><strong>Workstation</strong><strong> : </strong>Pada jaringan komputer, workstation adalah komputer yang terhubung dengan sebuah local-area network (LAN).<br />Istilah workstation juga digunakan untuk menyebut komputer yang digunakan untuk aplikasi teknik (CAD/CAM), <em>desktop publishing</em>, pengembangan software, dan aplikasi lainnya yang membutuhkan tingkat komputasi dan kemampuan grafis yang cukup tinggi.<br />Workstation biasanya terdiri dari layar grafik yang besar dengan revolusi tinggi, RAM minimal 64 MB, dukungan jaringan built-in, dan <em>graphical user interface</em>.<br />Sebagian besar workstation juga mempunyai piranti penyimpanan seperti disk drive, tetapi jenis workstation khusus, yang disebut <em>diskless workstation</em>, tidak mempunyai disk drive. Sistem operasi yang banyak digunakan untuk workstation adalah UNIX dan windows NT. Seperti halnya PC, sebagian besar workstation adalah komputer <em>single user</em>, Meski demikian, workstation pada dasarnya dihubungkan dengan local area network, meskipun dapat juga sebgian sistem yang berdiri sendiri <em>stand alone</em>.</p> <p class="MsoNormal"><a title="100BaseT" name="100BaseT"></a><strong>100BaseT</strong><strong> :</strong> 100BaseT adalah nama lain fast Ethernet yang mempunyai kecepatan transmisi sampai dengan 100 mbps. Jenis 100BaseT ini lebih mahal daripada 10BaseT dan lebih jarang digunakan pada <em>local area network</em> (LAN).</p> <p class="MsoNormal"><a title="10Base2" name="10Base2"></a><strong>10Base2</strong><strong> :</strong> 10Base2 adalah satu jenis standar Ethernet ( IEEE802.3) untuk lokal area network ( LAN ). Standard 10 Base-2 ( yang juga disebut Thinnet )menggunakan kabel koasial 50 ohm ( RG-58A/U ) dengan panjang maksimal 185 meter.kabel ini lebih kecil dan lebih flesibel daripada yang digunakan untuk standard 10 Base 5. Sistem 10 Base-2 beroperasi pada 10 Mbps dan menggunakan metode tranmisi baseband.</p> <p class="MsoNormal"><a title="10Base5" name="10Base5"></a><strong>10 Base5</strong><strong> :</strong> 10 Base-5 adalqh standard awal untuk Ethernet yang menggunakan kabel koasial. nama 10 Base5 didasarkan pada fakta bahwa kecepatan transfer data maksimum adalah 10 Mbps. menggunakan transmisi Baseband, dan panjang kabel maksimal adalah 500 meter. 10 Base5 juga disebut Thick Wire atau thick Net.</p> <p class="MsoNormal"> </p> <p class="MsoNormal"><strong>10BaseT :</strong> 10BaseT adalah jenis Ethernet yang paling umum. Nama tersebut menunjukan bahwa kecepatan transmisi maksimum adalah 10Mbps. 10BaseT menggunakan kabel tembaga dan merupakan card standard untuk menghubungkan komputer pada <em>lokal area network (LAN)</em></p>computerhttp://www.blogger.com/profile/00775484145552043479noreply@blogger.com0tag:blogger.com,1999:blog-9220200559382305581.post-60264512329296004092009-04-01T01:15:00.000-07:002009-04-01T01:45:26.383-07:00Jaringan komputer<p><b>Jaringan komputer</b> adalah sebuah <a href="http://id.wikipedia.org/wiki/Sistem" title="Sistem">sistem</a> yang terdiri atas <a href="http://id.wikipedia.org/wiki/Komputer" title="Komputer">komputer</a> dan perangkat jaringan lainnya yang bekerja bersama-sama untuk mencapai suatu tujuan yang sama. Tujuan dari jaringan komputer adalah:</p> <ul><li>Membagi sumber daya: contohnya berbagi pemakaian <a href="http://id.wikipedia.org/wiki/Printer" title="Printer" class="mw-redirect">printer</a>, <a href="http://id.wikipedia.org/wiki/CPU" title="CPU">CPU</a>, <a href="http://id.wikipedia.org/wiki/Memori" title="Memori" class="mw-redirect">memori</a>, <a href="http://id.wikipedia.org/wiki/Harddisk" title="Harddisk" class="mw-redirect">harddisk</a></li><li>Komunikasi: contohnya <a href="http://id.wikipedia.org/wiki/Surat_elektronik" title="Surat elektronik">surat elektronik</a>, <i><a href="http://id.wikipedia.org/wiki/Instant_messaging" title="Instant messaging" class="mw-redirect">instant messaging</a></i>, <i><a href="http://id.wikipedia.org/wiki/Chatting" title="Chatting" class="mw-redirect">chatting</a></i></li><li>Akses informasi: contohnya <i>web browsing</i></li></ul> <p>Agar dapat mencapai tujuan yang sama, setiap bagian dari jaringan komputer meminta dan memberikan layanan (<i>service</i>). Pihak yang meminta layanan disebut klien (<i>client</i>) dan yang memberikan layanan disebut pelayan (<i>server</i>). Arsitektur ini disebut dengan sistem client-server, dan digunakan pada hampir seluruh aplikasi jaringan komputer.</p> <p>Klasifikasi Berdasarkan skala :</p> <ul><li>Personal Area Network (PAN)</li><li>Campus Area Network (CAN)</li><li>Local Area Network (LAN)</li><li>Metropolitant Area Network (MAN)</li><li>Wide Area Network (WAN)</li><li>Global Area Network (GAN)</li></ul> <p>Berdasarkan fungsi : Pada dasarnya setiap jaringan komputer ada yang berfungsi sebagai client dan juga server. Tetapi ada jaringan yang memiliki komputer yang khusus didedikasikan sebagai server sedangkan yang lain sebagai client. Ada juga yang tidak memiliki komputer yang khusus berfungsi sebagai server saja. Karena itu berdasarkan fungsinya maka ada dua jenis jaringan komputer:</p> <ul><li>Client-server</li></ul> <p>Yaitu jaringan komputer dengan komputer yang didedikasikan khusus sebagai server. Sebuah service/layanan bisa diberikan oleh sebuah komputer atau lebih. Contohnya adalah sebuah domain seperti www.detik.com yang dilayani oleh banyak komputer web server. Atau bisa juga banyak service/layanan yang diberikan oleh satu komputer. Contohnya adalah server jtk.polban.ac.id yang merupakan satu komputer dengan multi service yaitu mail server, web server, file server, database server dan lainnya.</p> <ul><li>Peer-to-peer</li></ul> <p>Yaitu jaringan komputer dimana setiap host dapat menjadi server dan juga menjadi client secara bersamaan. Contohnya dalam file sharing antar komputer di Jaringan Windows Network Neighbourhood ada 5 komputer (kita beri nama A,B,C,D dan E) yang memberi hak akses terhadap file yang dimilikinya. Pada satu saat A mengakses file share dari B bernama data_nilai.xls dan juga memberi akses file soal_uas.doc kepada C. Saat A mengakses file dari B maka A berfungsi sebagai client dan saat A memberi akses file kepada C maka A berfungsi sebagai server. Kedua fungsi itu dilakukan oleh A secara bersamaan maka jaringan seperti ini dinamakan peer to peer.</p> <p>Berdasarkan <a href="http://id.wikipedia.org/wiki/Topologi_jaringan" title="Topologi jaringan">topologi jaringan</a>: Berdasarkan [topologi jaringan], jaringan komputer dapat dibedakan atas:</p> <ul><li><a href="http://id.wikipedia.org/wiki/Topologi_bus" title="Topologi bus">Topologi bus</a></li><li><a href="http://id.wikipedia.org/wiki/Topologi_bintang" title="Topologi bintang">Topologi bintang</a></li><li><a href="http://id.wikipedia.org/wiki/Topologi_cincin" title="Topologi cincin">Topologi cincin</a></li><li><a href="http://id.wikipedia.org/wiki/Topologi_mesh" title="Topologi mesh" class="mw-redirect">Topologi mesh</a></li><li><a href="http://id.wikipedia.org/wiki/Topologi_pohon" title="Topologi pohon">Topologi pohon</a></li><li><a href="http://id.wikipedia.org/wiki/Topologi_linier" title="Topologi linier">Topologi linier</a></li></ul>computerhttp://www.blogger.com/profile/00775484145552043479noreply@blogger.com0