Rabu, 15 Juni 2011

16.

Which statement is true concerning stateful packet inspection?

Access is permitted based on IP addresses of the source and destination devices.

Access is permitted based on the MAC addresses of the source and destination devices.

Access is permitted only if the type of application that is attempting to reach the internal host is allowed.

Access is permitted only if it is a legitimate response to a request from an internal host ##**#.

Which type of network supports DHCP and DNS services for network users in a network domain?

client/server

peer-to-peer

hierarchical#**#

ad hoc

What is the common DHCP role of the ISR router in home and small office networks?

The ISR router acts only as a DHCP client.

The ISR router acts only as a DHCP server.

The ISR router acts as both a DHCP client and server.

The ISR router forwards all DHCP traffic and acts as neither a client nor a server.

Which function is available on the network when TCP is used as the transport protocol?

traffic encryption

best effort delivery

user authentication

delivery acknowledgement

Which network design layer provides a connection point for end user devices to the network?

access#**#

core

distribution

network

A user wishes to secure a home wireless network against unknown host associations. Which procedure will do this?

filtering MAC addresses

disabling SSID broadcasting

changing the default password of the AP

changing the default IP address of the AP

How do ISPs obtain public IP addresses?

They create the addresses themselves.

They obtain the addresses from the home PCs.

They obtain the addresses from the Internet registry.

They obtain the addresses from the RFC.

For devices that do not autosense, which connection requires a crossover cable?

hub port to router port

PC to hub port

PC to switch port

PC port to PC port#**#

Which Windows command is used to display the configured IP address, subnet mask, and default gateway?

ipconfig

netstat

nslookup

tracert

What is the purpose of pop-up blocker software?

It detects and removes spyware.

It detects and removes viruses.

It prevents the display of advertisement windows.#**#

It removes unwanted e-mail.

27What destination IP address is used in a unicast packet?

a specific host

a group of hosts

all hosts on the network

the network broadcast address

28.What are two advantages of purchasing a custom-built computer? (Choose two.)

usually a lower cost

no waiting period for assembly

user can specify higher performance components#**#

supports higher-end graphics and gaming applications#**#

fewer components to replace

Tidak ada komentar:

Posting Komentar

TERIMA KASIH TELAH MENGUNJUNGI BLOG INI by:bhakti.santoso