MTA New

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 79

1.

a router's static route is set by the : jawaban Network administrator

2. which setting is used to determine the domain name system (dns) settings on a client

computer? jawaban nslookup

3. the host name of the fully qualified domain name (fqdn)

mail.exchange.corp.n2traders.com is: jawaban mail

4. to which ip configuration does the cidr notation 192.168.1.1/25 refer? jawaban

192.168.1.1 255.255.255.128

5. which command is used to verify that a server is connected to the network? Jawaban ping

6. which of these represents the internet protocol version 6 (ipv6) loopback address?

jawaban ::1

7. which of these addresses is a multicast address? jawaban 244.0.0.1

8. which of the following uses pointer records and a records? jawaban dns server

9. the ipconfig command will : jawaban display a client's address

10. One reason to incorporate vlans in a network is to : jawaban reduce the number of

nodes in a broadcast domain

11. which of these is an application layer protocol? Jawaban FTP


12. the top-level domain of www.adventureworks.com is: jawaban com
13. at what layer in the osi model are hardware address rreferenced? Jawaban data link
14. you need to devide a network into there subnets. Which device should you use? Jawaban

router
15. the type connector used on the 100baset cable is: jawaban rj-45
16. in addition to switching, multilayer switches also: provide layer 3 routing function
17. one reason to replace an unmanaged switch with a managed switch is to: support

multiple vlans
18. to directly connect the Ethernet network interface cards (nics) of two computers, you

should use a: jawaban crossover cable


19. the function of a router is to: jawaban forward traffic to other networks
20. if a router cannot determine the next hop for a packet, the router will: jawaban forward

the packet to the default route


21. in which physical network topology is each computer connected to a central point?

Jawaban star
22. which two of the following are connectivity options for wide area network (wans)?

(choose two). Jawaban dial up dan leased line


23. a private network that allows members of an organization to exchange data is an: jawaban

intranet
24. security is a concern on wireless notworks due to: jawaban the radio broadcast access

method
25. a characteristic of the mesh topology is that it: jawaban use redundant paths
26. to protect a network when it is connected to the internet, you should use a: jawaban

firewall
27. one purpose of a parimeter network is to: jawaban make resources available to the

internet

28. which protocol can be used to encrypt packets on the internet? Jawaban https

29. drag and drop question. Order the layers of the osi model: jawaban physical, data link,

network, transport, session, presentation, application


30. the service that resolves fully qualified domain names (fqdn) to ip address is: jawaban

domain name servis (dns)

31. if a router is installed so that is separates a dhcp server from its clients, the clients will:

jawaban be unable to obtain their leases from the server

32. which of the following services masks internet ip address from outside the network?

Jawaban nat

33. the query protocol used to locate resouces on a network is: jawaban lightweight

directory access protocol (LDAP)

34. tracert is used to: jawaban report the route taken by packects across an ip network

35. in which osi layer does routing occur? Jawaban network

36. what type of record does dns use to find a mail service? Jawaban mail exchanger (mx)

dns record

37. the default gateway address identifies the: jawaban device that will connect the

computer to a remote network

38. How many bits are there in an Internet Protocol version 6 (Ipv6) address?

Answer : 128

39. which of the following Is a public ip address? Jawaban 68.24.78.221

40. what is the minimum cabling requirement for a 100basetx network? Jawaban category 5

utp cable

41. internet key exchange (ike) is responsible for which two functions? (chose two) jawaban

negotiating algorithms to use dan exchanging key information


42. hotspot question. For each of the following statements, select yes if the statement is true.

Otherwise, select no each correct selection is worth one point

43. Hotspot question. you are trying to access a music sharing service on the internet. The

service is located at the IP addres 173.194.75.105. you are experiencing problems

connecting. You run a trace route to the server and receive the output shown in the

following image:
44. Ipsec can be used to secure network communications between two machines

45. Match each IP address to its corresponding IPv4 address class. To answer, drag the

appropriate IP address from the colum on the left to its IPv4 address class on the right.

Each IP address may be used once, more than once, or not at all. Each correct match is
worth one point.

46. The question requires that you evaluate the underlined next to determine if it is correct.

The process of replicating a zone fine to multiple dns servers is called zone replication,

select the correct answer if the underlined text does not make the statement correct, select

‘no change is needed’ if the underlined text makes the statementcorrect.


Jawaban zone transfer
47. You work at a coffee shop. Your supervisor asks you to help set up a computer network.

The network needs to have the following items


48. Match the networking topologies to their corresponding characterictics
49. which two features of a windows server 2008 r2 server should you install to use that

server as a software router? (choose two) jawaban network policy and access services

dan routing and remote access services


50. what are two characteristics of fiber optic cable?(choose two) jawaban support splicing

dan requires a polish for end connectors


51. indentify the network cable type and connector in the following graphic

52. which Microsoft network service can you use to establish a connection to a corporate lan

without any user action? Jawaban direct access


53. for each of the following statements, select yes if the statement is true. Otherwise, select

no. each correct selection is worth one point. With a recursive dns query
54. match the IPv4 address type to the corresponding definition
55. This question requires that you evaluate the underline text to determine if is correct.
A secondary zone is the first dns zone to which all updates for the records thet belong to

that zone are written.


Select the correct answer if the underline text does not make the statement correct. Select

‘no change is needed’ if the underline text makes the statement correct.
Jawaban primary zone
56. The tracert command displays router address

57. You are setting up a network computer game.


You need to open up ports on your firewall so your friends can join the network.
Which command displays the ports that your computer is listening for? Jawaban netstat
58. Match the TCP port to the corresponding service
59. Hostspot question. For each of the following statements. The loopback address for IPv6

60. This question requires that you evaluate the underline text to determine if is correct.
When a client computer is unable to reach a dhcp server, it will automatically assign an ip

address in the 10.0.0.0-10.0.0.255 range. Jawaban 169.254.0.0-169.254.255.255


61. A node within a local area network (lan) must have which two of the following? (choose

two) jawaban nic dan ip address


62. You are configuring a wireless network with the wireless network properties that are

shown in the following image

63. This question requires that you evaluate the underline text to determine if is correct.
a/anvirtual private network (vpn) protects a network’s perimeter by monitoring traffic as

it enters and leaves.


Select the correct answer if the underline text makes the statement correct.
Jawaban firewall
64. This question requires that you evaluate the underline text to determine if is correct.
The loopback address of your computer is 127.0.0.1
Select the correct answer if the underline text does not make the statement correct.
Select ‘no change is needed’ if the underlined text makes the statement correct.
Jawaban no change is needed
65. You run the ipconfig command. The output is shown in the following image
66. which ieee 802. 11n wi-fi networking standard requires dual antennas so it can run in all

of its supported frequencies? Jawaban 802. 11n


67. what is the bit rate for a north American t3 circuit? Jawaban 44.736 mbit/s
68. hotspot question. For each of the following statements. Dynamic routing provides the

ability to

69. Which feature of category 5e stp cable reduces external interference? Jawaban twisting
70. What is an example of a network device that associates a network address with a port?

Jawaban router
71. Which wireless communication problem is caused by electromagnetic waves? Jawaban

interference
72. An action center alert recommends that you enable windows firewall.
After enabling the firewall, you can no longer access websites.
Which two tcp ports should you add exceptions for on the firewall? (Choose two)

jawaban port 80 dan port 443


73. What are two advantages of using star topology rather than ring topology in a computer

in a computer lab workgroup?(choose two) jawaban


-a central connection point allows for flexibility and scalability
-a cable problem within the group affects two nodes, at most.
74. What are three charecteristics of Ethernet network topology?(choose three) jawaban
-it can use coaxial, twisted pair, and fiber optic media
-it comprises the largest share of the networks in place today
-it can negotiate different transmission speeds
75. This question requires that you evaluate the underline text to determine if it is correct.
Plain old telephone service (pots), most isdn lines, and switched t1 lines are all examples

of message swithing.
Select the correct answer if the underlined text does not make the statement correct.
Select ‘no change is needed’ if the underlined text makes the statement correct.
Jawaban circuit switching
76. hotspot question. For each of the following statements. You use perimeter network to

grant
77. Hotspot question. You are an intern for contoso ltd

78. Your home computer in having problems accessing the internet.


You suspect that your internet router’s dhcp service is not functioning, so you check your

computer’s ip address.
Which address indicates that your router’s dhcp services is not functioning? Jawaban

169.254.1.15
79. Which of these is a public address space? Jawaban 197.16.0.0/12
80. This question requires that you evaluate the underlined text to determine if it is correct.
In a wireless network that requires an ssl certificate, wep handles the ssl certificate.
Select the correct the answer if the underlined text does not make the statement correct.
Select ‘no change is needed’ if the underlined text makes the statement correct.
Jawaban 802.1x

81. This questiion requires that you evaluate the underlined text to determine if it is correct.

To set lower scurity setting in internet Explorer for an extranet site, add the sites’s URL to

the local Intranet zone.


Select the correct answer if the underlined text does not make the statement correct.

Selecr ‘no change ins needed’ if the underlined text make the statement correct.

Answer Trusted Site

82. You are helping a firend set up a public-facing web server for a home office.

You friend wants to protect the internal network from intrusion.

What should you do?

Asnwer Set the web server in a primeter network

83. Hotspot question

For each of the following statement. Select Yes if the statement is true.

Otherwise, select No. Each correct selection is worth one point. A wireless bridge
84. What are two characteristics of the CSMA/CD acces method? (choose two.)

Answer It checks to see if collision has been detected

it waits until the tranmission medium is die.

85. What are two characteristics of a mesh network topology (choose two)

Answer It is fault tolerant because of redundant connections.

every node connects to every other node on the network.

86. Whic protocol is responsible for automatically assigning ip addresses?

Answer DHCP

87. This question requires that you evaluate the underlined text to determine if it is correct.

According to the OSI model, encryption takes place on the transport layer.

Sekect the correct answer if the underlined text does not make the statement correct.

Select ‘NO change is needed” if the underlined text makes the statement correct.

Answer Presentation

88. Hotspot Question


For each of the following statements, select Yes if the statement is true. Otherwise, select

No. Each correct selection is worth one point. An IPv4 address consists of 64 bits
89. This question requires that you evaluate the underlined text to determine if it is correct.

IPSec policies for two machines on a LAN can be modified by using be IPSec policy-in

on windows 7

Select the correct answer if the underlined text does not make the statement correct.

Select ‘No change is needed if the underlined text makes the statement correct.

Answer Windows firewall with advanced scurity snap-in

90. This question requires that you evaluate the underlined text to determine if it is correct.

An address resolution protocol (ARP) table is used to associated IP addresses with host

names.

Select the correct answer if the underlined text does not make the statement correct.

Select ‘No change is needed if the underlined text makes the statement correct.

Answer MAC addreses

91. Which network divice interconnects computers in a workgroup, is able to be remotely

configured and provides the best througput?

Answer Managed switch

92. What is the maximum cable length for single Cat5 UTP cable run?

Aswer 328 feet/99.97 meters

93. Hotspot question


For each of the following statements, select Yes if the statement is true. Otherwise, select

no. Each correct selection is worth one point. Quality of service

94. Which of these cable types transmits data the greatest distance?

Answer Single-mode fiber

95. What is a similarity between layer 2 and layer 3 switches?

Answer Both allow the implementation of VLANs.

96. This question requires that you evaluate the underlined text to determine if it is correct.

“dynamic routing” is fault tolerant.

Select the correct answer if the underlined text does not make the statement correct.
Select ‘No change is needed if the underlined text makes the statement correct.

Answer No change is needed

97. You need to run four ethernet network drop. Each drop is approximately 125feet/46.33

meters. An interference exist along the path of each drop.

You need to ensure that interference is reduced.

Which cable type should you use?

Answer STP Cat5e

98. What is an example of a Layer 3 device that connects multiple computers and network

Anwer Router

99. Which metric does Routing information Protokol (RJP) use to determine the least costly

route?

Answer Hop Count

100. what are two difference between switches and hubs? (choose two)
a. swithces are slower than hubs because of the extra addressing functions that swithces perfom.
b. swithces send data to all of the computers that are connected to them for efficiency.
c. swithces are capable of sending and receiving data at the same time.
d. swithces indentify the intended destination of the data that they receive.
Answer: AD

101. what is the DNS record type that specifies an alias name of another address record?
a. MX
b. CNAME
c. NS
d. SOA
Answer: B

102. this question requires that you evaluate the underline text to determine if it is correct.
Each IPv4 address consist of a MAC address and data-link laver address.
Select the correct answer if the underline text does not make the statement correct.
Select “No change is needed” if the underline text makes the statement correct.
a. Network ID and a hist ID
b. DNS record and a default route
c. 64-bit binary number divided into octets

d. No change is needed
Answer : A

103. this question requires that you evaluate the underline text to determine if it is correct.
The NTP value in a resource record indicates a length of time that other DNS servers use to
determine how long to cache information for a record before expiring and discarding it.
Select the correct answer if the underline text does not make the statement correct. Select “No
change is needed” if the underline text makes the statement correct.
a. TTL
b. GPS
c. SOA RR
d. No change is needed
Answer : A

104. hotspot question


For each of the following statements, select Yes if the statements it true. Otherwise, select No.
Each correct selection is worth one point.
Layer 4 of the osi model http telnet ftp

Answer :
105. hotspot question
You are studying for finals in the student lounge
When your laptop is connected to the wireless network, access to the internet is slow
When you plug your laptop into a wall jack, you can no longer access the internet att all
You run the ipconfig/all command. The results are shown in the following image:
Use the drop-down menus to select the answer choice that completes each statement
Each correct selection is worth one point.

Answer :
106. hotspot question
For each of the following statements, select Yes if the statement is true. Otherwise, select No
Each correct selection is worth one point.
IPv6 addresses are

Answer :

107. hotspot question


Where in the diagram is a T3 connection possible? (To answer, select the appropriate connection
in the diagram in the answer area)
Answer :

108. what happens when an 802. 11a node broadcasts within the range of an 802. 11g access
point?
a. the access point transmits, but the node is unable to receive
b. A connection occurs
c. both the node and the access point is unable to transmit
d. the node transmits, but the access point is unable to receive
Answer : D

109. one advantage of dynamic routing is that it:


a. automatically maintains routing tables
b. limits traffic derived from routing protocols
c. reduces broadcast traffic
d. automatically enables DHCP
Answer : A

110. which of the following represents a media access control (MAC) address?
a. GV:ZC:KK:DK:FZ:CA
b. 255.255.255.0
c. 05:35:AB:6E:Al:25
d. 127.0.0.1
Answer : C

111. connecting to a private network address from a public network requires:


a. network address translation (NAT)
b. dynamic host configuration protocol (DHCP)
c. netwok access protection (NAP)
d, dynamic domain name system (DDNS)
Answer : A

112. a network device that associates a media access control (MAC) addess with a port is a:
a. DSL modem
b. Hub
c. Router
d. Switch
Answer : D

113. a layer 2 device that connect multiple computers within a netwok is a:


a. Repeater
b. Switch
c. Router
d. Packet
Answer : B

114. a cable that meets the l000BaseT standars has a maximum length of:
a. 100 m
b. 250 m
c. 500 m
d. 1000 m
Answer : A

115. the default port used for SMTP is:


a. 23
b. 25
c. 80
d. 8080
Answer : B

116. the ping is used to: (Choose two)


a. determine the network portion of a host address
b. self-test a host own network interface
c. determine whether a host is reachable
d. manage a host’s session when UDP is used
Answer : BC

117. which of the following of DHCP? (Choose two)


a. IP address resolution to canonical names
b. secure shell connections
c. address reservation
d. network file transfer
e. IP address exclusion
Answer : CE

118. the command-line tool used to list a host’s active incoming connections is:
a. NETSTAT
b. IPCONFIG
c. NSLOOKUP
d. PING
Answer : A

119. a computer that has an IP address of 169.254.0.1 cannot access the network
a. WINS
b. DNS
c. DHCP
d. TFTP
Answer : C

120. which network does the IP address 220.100.100.100 belong to?


a. 220.100.100.0/24
b. 220.100.100.1/24
c. 255.255.255.0/24
d. 255.255.255.1/24
Answer : A

121. which subnet mask is valid?


a. 255.255.255.240
b. 255.255.255.228
c. 255.255.255.164
d. 255.255.255.245
Answer : A

122. a service that resolves NetBIOS names to IP addresses is:


a. domain name service (DNS)
b. internet service provider (ISP)
c. address resolution protocol (ARP)
d. windows internet name service (WINS)
Answer : D

123. what type of DNS record maps host names to addresses?


a. mail exchanger (MX) DNS record
b. service (SRV) DNS record
c. host (A) DNS record
d. canonical (CNAME) DNS record
Answer : C

124. VPNs are implemented to provide:


a. A secure connection within a private network
b. A secure connection through public networks
c. Additional encryption by using IPSec
d. Additional security for selected computers
Answer : B

125. if an 802. Llg internet connection has connectivity problems, what may be the cause?
a. A cordless phone
b. A cellular phone
c. incandescent lights
d. elektromagnetik interface (EMI)
Answer : D

126. which of these factors has the biggest impact on data transmission speed in a wireless
network?
a. the access methos used for the network
b. the transmission standard of the equipment used
c. the use of strong encryption for transmissions
d. the transmission watage rating used on the NIC
Answer : B
127. which of the following used a tunneling protocol?
a. internet
b. VPN
c. extranet
d. VLAN
Answer : B

128. a network that separates an organization’s private from a public network is a/an:
a. firewall
b. extranet
c. perimeter
d. internet
Answer : C

129. which type of network is most vulnerable to intrusion?


a. dial-up
b. wireless
c. broadband
d. leased line
Answer : B

130. attenuation in a wireless network signal is a result of:


a. number of wireless nodes connected
b. distance from the access point
c. interference from cellular phones
d. encryption of the signal
Answer : B

131. which type of network covers the broadest area?


a. WAN
b. CAN
c. LAN
d. PAN
Answer : A

132. in local area network (LAN) topologies, the primary media access methods are: (Choose
two)
a. contention
b. negotiation
c. kerberos
d. token pasing
Answer : AD

133. in a physical star topology, the central device is referred to as a:


a. bridge
b. server
c. segmenter
d. hub
Answer : D

134. which tegnology can you use to extend an intenal network shared or public networks?
a. VLAN
b. microsoft ASP-NET
c. microsoft NET Framework
d. VPN
Answer : D

135. which two published IEEE 802.11 wireless transmission standards? (Choose two)
a. 802.1 lf
b. 802.11g
c. 802.11m
d. 802.11n
Answer : BE

136. what happens when an 802.11b node broadcasting within the range of an 802.llg access
point?
a. the access point will transmit, but the node will unable to receive
b. A connection will be established
c. both the node and the azzess point will be unable to transmit
d. the node will transmit, but the access point will be unable to receive
Answer : B

137. whict technology provides the highest bit rate?


a. T1
b. El
c. DS3
d. ISDN
Answer : C

138. which DNS record type specifies the host that is the authority for a given domain?
a. NS
b. MX
c. CNAME
d. SOA
Answer : B

139. drag and drop question


Match each protocol to its description
To answer, drag approriate protocol form the column on the left to its description on the right.
Each protocol may be used once, more than once, or not at all. Each correct match is worth on
point.

Answer :

140. hotspot question


For each pf the following statements, select Yes if the statement is true. Otherwise, select No.
Each correct selection is worth one point.
The TCP/IP model has

Answer :

141. this question requires that you evaluate the underline text to determine if it is correct.
All session data is encrypted all machines while using telnet.
Select the correct answer if the underline text does not make the statement correct.
Select ‘No change is needed” if the underline text makes the statement correct
a. Not encrypted
b. Encrypted between any windows machines
c. Encrypted only to any non-windows machines
d. No change is needed
Answer : A

142. which protocol is a transport layer protocol?


a. FTP
b. IP
c. UDP
d. ASCII
Answer : C

143. this question requires that you evaluate the underline text to determine if it is correct.
IPv4 multicast address range from 192.168.255.255.
Select the correct answer if the underline text does not make the statement correct.
Select “No change is needed” if the underline text makes the statement correct.
a. 127.0.0.0 to 127.255.255.255
b. 172.16.0.0 to 172.31.255.255
c. 224.0.0.0 to 239.255.255.25
d. No change is needed
Answer : C

144. this question requires that you evaluate the underline text to determine if it is correct.
The four IEEE standards, 802.11a, b, g, and n, are collectively known as mobile ad hic networks.
Select the correct answer if the underline text does not make the statement correct. Select ‘No
change is needed” if the underline text makes the statement correct.
a. WiMAX
b. Bluetooth
c. WiFi
d. No change is needed
Answer : C

145. hostpot question


You cannot get to any site in the internet or on the school’s internet.
You school uses DHCP.
You check your network settings, which are configured as shown in the following image:
You need to change the settings to access website.
Use the drop-down menus to select the answer choice that completes each statement.
Each correct selection is worth one point.

Answer :
146. A university has network links between various locations.
Where would a T3 connection be appropriate?
a. Server to network in the main campus server room
b. Main campus to a large satellite campus
c. Computer lab PC to lab printer
d. Library laptop PC to internet
Answer : A

147. drag and drop question


Match each network type to its corresponding definition.
To answer, drag the appropriate type from the column on the left to its definition on the right.
Each network type may be used once, more than once, or not at all. Each correct match is worth
one point.
A network that allows

Answer :

148. drag and drop question


Match the VPN connection type to the corresponding definition.
To answer, drag the appropriate VPN term from the column on the left to its definition on the
right. Each term may be used once, more than once, or not at all. Each correct match is worth
one point.
Allow a remote user

Answer :

149. drag and drop question


Match each set of characteristics from the column on the left to its 802.11 standard pn the right.
Each set may be used once, more than once, or not at all.
Each correct match is worth one point.
Frequency range
Answer :
150. A media access control (MAC) address identifier a/an:
a. UpnP device
b. local broadcast domain
c. network interface card (NIC)
d. local area network (LAN)
Answer : C

151. two companies want to share data by using the internet. Which type of nerwork provides the
solution?

a. Ethernet

b.intranet

c. extranet

d. perimeter

jawaban = c

152. a vpn is a/an:

a. encrypted connection across the internet

b. virtual network within your local area network(LAN)

c. communication tunnel beetwen VLANs.

d. personal network for your use only.

jawaban = a

153. which of the following determines the media access method that is used in a network?

a. number of hosts connected to the network

b. number of domain servers on the segment

c. maximum speed of the media

d. topology and protocols

jawaban = d
154. which wireless authentication method provides the highest level of security?

a. wired quivlency privacy (WEP)

b. IEEE 802.IIn

c. WI-FI Protected access(WPA)

D. IEEE 802.11a

jawaban = c

155. te topology of a local area network (LAN) is defined by the:

a. number of devices to connect.

b. physical and logical characteristics

c. distance between workstations

d. type of cable being used

jawaban = b

156. the maximum throughput of an 802.llg network is:

a. 2.4 GHz

b. 54 GHz

c. 2.4 Mbps

d. 54 Mbps

jawaban = d

157. a node within a local area network (LAN) must have a network interface device and a

a. network account

b. table of all network nodes

c. host address

d. resource to share

jawaban = c

158. which of the following is a layer 2 WAN protocol?


a. point to point protocol (PPP)

b. simple nerwok management protocol (SNMP)

c. transmission control protocol (TCP)

d. internet protocol (IP)

jawaban = a

159. which type of port is used to support VLAN traffic between two switches?

a. virtual port

b. WAN port

c. trunk port

d. LAN port

jawaban = c

160. the protocol that maps IP addresses to media access control (MAC) address is

a. internet message access protocol (IMAP)

b. dynamic host configuration protocol (DHCP)l

c. routing information protocol (RIP)

d. user datagram protocol (UDP)

e. addres resolution protocol (ARP)

jawaban = e

161. what are three advantages of VLANs? (choosh tree)

a. they can logically address packets by using IP

b. theyrequire a router to connect to VLANs on another switch

c. they compartmentalize a network and isolate traffic

d. they are efficient because a single switch can implement only a single VLANs

e. they act as though they are on the same LAN regardless on physical location

jawaban = bce
162. match the OSI layer to its corresponding description

Jawanan =
163. hotspot question

You receive a call from a family member who is unabel to connect to a game server

You learn that the server’s IP is 172.16.2.11.


JAWABAN =
164. drag and drop question

Match each addres type to its appropriate range


JAWABAN =
165. for which two reasons should you use IPsec between computers? (choos two)

a. data compression

b. data integrity

c. data redundancy

d. data confidentiality

jawaban = bd

166. this question requires that you evaluate the underlined text to determine if it is correct

Every router today is TPC/IP enable, which is an industry-standard protocol that you use on
internet and for local addressing.

Select the correct answer if the underlined text does not make the statement correct

Select ‘No change is needed” if the underlined text makes the statement correct.

a. HTTP
b. FTP
c. SNMP
d. No change is needed

jawaban = d

167. you are home for vacation, and a family member wants your help to purchase and install
network cable for a home office.

The cable needs to support at least 300 Mbps

What is the least expensive option that meets this requirement?

a. Cat3
b. Cat5
c. Cat5e
d. Cat6

jawaban = c

168. this question requires that you evaluate the underlined text to determine if it is correct

WEP wireless encryption is the most susceptible to interception and decryption

Select the correct answer if the underlined text does not make the statement correct

Select no change is needed if the underlined text makes the statemen correct
a. WPA-AES
b. WPA2
c. WPA-PSK
d. No change is needed

jawaban = d

169. hotspot question

For each pf the following statements, select yes if the statement is true

Otherwise, select no. each correct selection is wordth one point

A switc sends unicast packets to one destination port only

170. the default subnet mask for a class b network is

a. 0.0.0.255

b. 0.0.255.255

c. 255.0.0.0

d. 255.255.0.0
jawaban = d

171. teredo tunneling is a protocol that

a. translate internet protocol version 4 (IPv4) to internet protocol version 6 (IPv6)

b. allows IPv6 connectivity through IPv4 device

c. provides VPN security

d. dynamically allocates IPv6 addresses

jawaban = b

172. what is the default subnet mask for a class c internet network?

a. 255.255.255.252

b. 255.255.255.240

c. 255.255.255.192

d. 255.255.255.0

jawaban = d

173. the default port used for telnet is

a. 23

b. 25

c. 80

d. 8080

jawaban = a

174. when a client’s DHCP-isssued address expires, the client will

a. select a new address and request approval from the DHCP server

b. require manual configuration with a static IP address

c. attempt to obtain a new address by broadcasting

d. continue to use the address until it is notified to shop

jawaban = c
175. you ping a server by using fully qualified domain name (FQDN) and do not receive a
response

You then ping the same server by using its IP address and receive a response

Why do you receive a response on the second attempt but not on the first attempt?

a. PING is improperly configured


b. The DNS is not resolving
c. The DHCP server is offline
d. NSLOOKUP is stopped

jawaban = B

176. a user reports that she cannot connect to network resources from a computer on the
company network. The user was able to connect to the network resources yesterday.

You verify that the user’s computer is properly physically connected to the nerwork

You discover that the computer’s IP address is 169.254.48.49

You need to restore access to network resources

What should you do next?

a. Flush the cache on the DNS server


b. Reset the user’s password on the server
c. Check your router’s current routing tables
d. Verify that the DHCP service is available

jawaban = d

177. what command do you use to release the IP configuration handed out by a DHCP server?

a. ipconfig/renew

b. ipconfig /releasedns

c. ipconfig /savestatic

d. ipconfig /release

jawaban = d

178. when a signal degrades as it runs through a wire, you have

a. degradation

b. attenuation
c.cross over

d.resistance

jawaban = a

179. what command do you use to reacquire IP configuration from a DHCP server?

a. ipconfig/renew

b. ipconfig /releasedns

c. ipconfig /savestatic

d. ipconfig /release

jawaban = a

180. list the four steps for a client to get an IP address from a DHCP server in the correct order

a. discovery offering request ac knowledge

b. request offering discovery knowledge

c. discovery request offering knowledge

d. request offering discovery knowledge

jawaban = d

181. what is the primary disadvantage of X.25?

a. digital circuit

b.small data payloads

c.circuit switching

d.slow speeds

jawaban = a

182. ________ is a route that must be manually defined on each router

a. static

b. dynamic

c. persistent
d. global

jawaban = c

183. which layer in the OSI model covers routing between networks?

a. physical

b. data link

c. network

d.transport

jawaban = c

184. what of the following is not a characteristic of 802.1 1n?

a. frame aggregation

b.channel bonding

c.RFI protection

d.MIMO

jawaban = c

185. which of these ports does DHCP use?

a. 80

b. 67

c. 23

d. 500

jawaban = b

186. what protocol is used with L2TP to provide encryption?

a. IPsec

b. MPPE

c. HTTPS

d. MSC-CHAP
jawaban = a

187. the _____________ is the largest WAN in the word

a. internet

b. intranet

c. WWW

d. MSDN

jawaban = a

188. what protocol automatically configures IP configuration for a client?

a. DNS

b. DHCP

c. WINS

d. FTP

jawaban = b

189. what stage is the world wide web in?

a. 1.0

b. 1.1

c. 2.0

d. 3.0

jawaban = c

190. after you install DHCP servers and configure and activate a scope, what is the last step in
installing a DHCP server?

a. register the scope

b. register the server

c. authorize the server

d. register the clients


jawaban = c

191. you have a computer whit an address of 169.254.32.23 and a subnet mask of 255.255.0.0,
yet you cannot connect to your local file servers.

What is most likely the problem?

a. it cannot communicate with a DHCP server

b. the DNS servers specified are incorrect or are down

c. NetBIOS over TCP/IP has not been enabled

d. The network card is not connected properly to the network

jawaban = a

192. what name does windows server 2008 R2 use for terminal service?

a. MS telnet server

b. MS primary services

c. MS thin server

d. remote desktop service

jawaban = d

193. what port does remote desktop services use?

a. 443

b. 501

c. 389

d. 3389

jawaban = a

194. what would you use to create VPN tunnels so that users can connect to your internal
network while at home using windows server 2008 R2?

a. Microsoft RAS

b. Microsoft RRAS

c. Microsoft RDC
d. Microsoft VPN Server

jawaban = b

195. what protocol is used witH L2TP to encrypt data?

a. IPSec

b. MS-CHAP

c.MS-CHAPv2

d. MPPE

jawaban = a

196. which component of IPSec is generates the encryption and authentication keys?

a. SA

b. AH

c. EP

d. MPPE

jawaban = a

197. which IPSec component provides connectionless integrity and data authentication but does
not provide confidentiality?

a. SA

b. AH

c. ESP

d. MPPE

jawaban = b

198. which IPSec component includes the most security, including confidentiality?

a. SA

b. AH

c. ESP
d. MPPE

jawaban = c

199. what port does DNS use?

a. 443

b. 389

c. 51

d. 53

jawaban = d

200. what service on a windows network is used to translate between NetBIOS name/computer
name and IP addresses?

a. DNS

b. WINS

c. DHCP

d. LDAP

jawaban = b

201. what feature within windows allows the server to act as a router?

a. IPSec

b. DHCP

c. IP forwarding

d. RDC

jawaban = c

202. you use the ____________ to connect to a terminal server

a. Remote Dekstop Connection (RDC)

b. Remote Dekstop Protocol (RDP)

c. Remote Session Call (RSC)


d. Remote NetBios Connection (RNC)

jawaban = a

203. what provides name resolution between domain names and IP addresses

a. DHCP

b.DNS

c. ARP

d. RPC

jawaban = b

204. what allows a user to connect to a corporate network using the internet?

a. VPN

b. VPC

c. PPTN

d. IPSec

jawaban = a

205. when you have multiple circuits connected to a site, the entire circuit is known as a

a. virtual circuit

b. emulated circuit

c. joined circuit

d. multitasked circuit

jawaban = a

206. what replaced X.25?

a. frame relay

b. ATM

c. ISDN BRI

d. DSL
jawaban = a

207. at what speed does a T3 line run?

a. 1.5 Mbps

b. 4.5 Mbps

c. 44.7 Mbps

d. 128 Mbps

jawaban = c

208. in Europe, what circuit would be similar to the T1 found in the United States?

a. E1

b. J1

c. T2

d. F1

jawaban = a

209. how many B channels does an ISDN PRI support?

a. 2

b. 8

c. 23

d. 48

jawaban = c

210. what speed does FDDI use?

a. 10 Mbps

b. 44 Mbps

c. 54 Mbps

d. 100 Mbps

jawaban = d
211. what topology does FDDI use?

a. bus

b. star

c. ring

d. mesh

jawaban = c

212. what technology uses wires from the telephone company to provide broadband internet
connection?

a. cable

b. DSL

c. FDDI

d. frame relay

jawaban = b

213. _____________ is used to send packets from one network to another network

a. routing

b. transport

c. BGP

d. encapsulation

jawaban = a

214. what type of network can you set up that is another company’s internal network?

a. intranet

b. extranet

c. internet

d. DMZ

jawaban = b
215. _______________ uses a clocking circuit to control the timing of communications between
two WAN devices such as router

a. static route

b. dynamic route

c. PPTP route

d. poit to point

jawaban = a

216. a ______________ is the guaranteed certain amount of information provided by a circuit or


line.

a. committed information route

b. pivotal information route

c. next hop policy route

d. frame x frame route

jawaban = a

217. what speed does a T1 run at?

a. 1.544 Mbps

b. 2.889 Mbps

c. 3.101 Gbps

d. 2.54 Mbps

jawaban = a

218. how fast is a DS0 circuit?

a. 32 Kbps

b. 62 Kbps

c. 128 Kbps

d. 1024 Kbps

jawaban = b
219. what command do you use to display and modify the network configuration of a local
computer?

a. netsh

b. netstat

c. telnet

d. nbtstat

jawaban = a

220. what command is used to add static routes to a windows computer?

a. nslookup

b. telnet

c. route

d. nbtstat

jawaban = c

221. what command do you use to display the routing table on a local system?

a. route display

b. route table

c. route local

d. route print

jawaban = d

222. what command do you use to display the MAC address on system?

a. ipconfig/all

b. pathping –m

c. route /showmac

d. nbstat -r

jawaban = a
223. what command do you use to retrieve or update your DHCP assigned configuration?

a. ipconfig /flushdns

b. ipconfig /all

c. ipconfig /release

d. ipconfig /renew

jawaban = d

224. what command do you use to register the computer’s name and IP address with the nearest
DNS server?

a. ipconfig /renew

b. ipconfig /renew aall

c. ipconfig /flushdns

d. ipconfig /registerdns

jawaban = d

225. what command display Ethernet statistics?

a. netstat -e

b. netstat -x

c. netstat -q

d. netstat –t

jawaban = a

226. what ooption do you use to ping constantly until you stop it?

a. ping –t <host>

b. ping –q <host>

c. ping –r <host>

d. ping –s <host>

jawaban = a
227. what protocol is used with L2TP to encrypt data?

a. IPsec

b. MS-CHAP

c. MS-CHAPv2

d. MPPE

jawaban = a

228. what server is used to translate host names to IP addresses?

a. DNS

b. WINS

c. HOSTS

d. DHCP

jawaban = a

229. what routing protocol is the most popular distance-vector routing algorithm used to
determine the best routes within a network?

a. RIP

b. OSPF

c. BGP

d. IGMP

jawaban = a

230. what routing protocol is the most popular link-state protocol used within a large
organization?

a. RIP

b. OSPF

c. BGP

d. IGMP

jawaban = b
231. what technology takes data and breaks them into packets and sends them over a network,
some times using different routes for each packet?

a. circuit switching

b. connection switching

c. packet switching

d. network switching

jawaban = c

232. X.25 and frame relay are examples of what type of WAN technology?

a. circuit switching

b. connection switching

c. packet switching

d. network switching

jawaban = c

233. what device acts as a high-speed modem for LAN?

a. analog modem

b. telco incoming router

c. packet switcher

d. CSU/DSU

jawaban = d

234. what does X.25 use at its DTE device?

a. telco incoming router

b. packet switcher

c. analog modem

d. PAD

jawaban = d
235. what part of the network is the point where the responsibility of the administrator ends and
the telecommunications provider’s responsibility begins?

a. last mile

b. demarc

c. router array

d. PAD interface

jawaban = d

236. what is primary disadvantage of X.25?

a. digital circuit

b. small data payloads

c. circuit switching

d. slow speed

jawaban = d

237. when a packet traverses a network, each router is a____________

a. jump point

b. CSU/DSU

c. jump switch

d. hop

jawaban = d

238. what command can you use to connec to a mail sever so that you can test SMTP?

a. ftp

b. nslookup

c. telnet

d. nbstatat

jawaban = c
239. what command do you use to connect to a remote computer so that you can execute
commands?

a. ftp

b. nslookup

c. telnet

d. nbstatat

jawaban = c

240. what command do you use to connect to a FTP server to download a file?

a. nslookup

b. ssh

c. telnet

d. ftp

jawaban = d

You might also like