Rabu, 15 Juni 2011




Refer to the exhibit. The network is experiencing excessive broadcast traffic from multiple hosts. What can be done to reduce the broadcast traffic that each host receives without compromising connectivity to the corporate servers?

Separate the switches with a router#**#.

Create a separate VLAN for the servers and hosts.

Change from Ethernet switches to FastEthernet switches.

Increase the number of switches to reduce the number of PCs that are connected to each switch.




Refer to the exhibit. In the wireless network, what is the maximum number of hosts supported if the IP addressing scheme contains four host bits?

6

14

16

30

32

254




When NAT is employed in a small office, which address type is typically used for hosts on the local LAN?

private IP addresses

global public IP addresses

Internet-routable addresses

both private and public IP addresses





Refer to the graphic. Based on the information that is shown, what statement is true?

This configuration would be commonly found in an ad hoc wireless network.

Any wireless client that is attached to this access point would have the same IP address and SSID.

All wireless devices that are connected to this access point must have an assigned SSID of Academy#**#.

In addition to accepting wireless client requests, this access point must connect to the wired network.



What must be identical on all devices in a WLAN for successful wireless communication between the devices?

SSID#**#

antenna type

network mode

wireless NIC driver






Which protocol in its default configuration downloads e-mail messages to the client computer and deletes them from the server?

FTP

POP3#**#

SMTP

IMAP4

Which part of the electromagnetic spectrum is commonly used to exchange data between a PDA and a computer?

FM

radar

infrared#**#

ultraviolet

What two pieces of information should a help desk technician document while troubleshooting connectivity issues with an end user? (Choose two.)

the CPU clock speed of the computer

the number of network jacks that are in the room

if the user can ping the default gateway address#**#

if the word processing software is installed correctly

whether the PC uses dynamic or static IP addressing#**#


Which portion of a received datagram is decoded and used by the internetwork layer of the TCP/IP model?

IP address

port number

MAC address

HTML/user data


38.TCP/IP data transmission between the source and destination host is de-encapsulated in four steps:

A. The TCP header is removed.
B. Bits are decoded and the destination MAC address is recognized.
C. The IP header is removed and the contents are passed to the next layer.
D. The Ethernet header and trailer are removed.

What is the correct sequence of these steps?

A, B, C, D

A, C, B, D

B, C, D, A

B, D, C, A#**#

C, A, B, D

39.A network technician suspects that malware on a user PC is opening multiple TCP connections to a specific foreign host address. Which Windows command line utility can be used to confirm the multiple TCP connections?

ping

netstat#**#

tracert

ipconfig

nslookup

















Tidak ada komentar:

Posting Komentar

TERIMA KASIH TELAH MENGUNJUNGI BLOG INI by:bhakti.santoso