Ujian Online
Ujian Online
Ujian Online
Select a new address and request approval from the DHCP server
2. For each of the following statements, select YES if the statement is true. Otherwise, select NO.
Each correct selection is worth one point
Ѻ YES/NO 21DA:D3:0:2F3B:2AA:FF:FE28:9C5A is a valid IPv6 unicast address
Ѻ YES/NO FE80::2AA:FFFE28:9C5A is a valid IPv6 Address
Ѻ YES/NO 21DA::02AA:::FF:FE28:9C5A is a valid IPv6 Address
3. You receive a call from a family member who is unable to correct to a game server. You learn
that the server’s IP is 172.16.2.11.
To help, you ping the server and receive the information shown in the following image:
Use the drop down menus to complete each statement. Each correct selection is worth one point
Data Link It checks for errors by adding CRC to the frame. Bridges
and NIC’s operate on this layer
9. This question requires that you evaluate the underlined text to determine if it is correct.
WEP wireless encryption is the most susceptible to interception and decryption.
Select the correct answer if the underlined text does not make the statement correct. Select “No change is
needed” if the underlined to makes the statement correct
WPA - AES
WPA2
WPA - PSK
No change is needed
10. If a router cannot determine the next hop for a packet, the router will:
Send the packet back to the packet’s source
optic fiber rj 11
12. What is an example of a network device that associates a network address with a port?
DSL modem
Hub
Router
Switch
14. You are home for vacation, and a family member wants your help to purchase and install
network cable for a home office. The cable needs to support at least 300 Mbps.
What is the least expensive option that meets this requirement?
Cat3
Cat5
Cat5e
Cat6
15. A cable that meets the 100BaseT standard has a maximum length of:
100 m
250 m
500 m
1000 m
16. This question requires that you evaluate the underlined text to determine if it is correct.
Every router today is TCP/IP enabled, which is an industry-standard protocol that you use on the Internet
and for local address
Select the correct answer if the underlined text does not make the statement correct. Select “No change is
needed” if the underlined to makes the statement correct
HTTP
FTP
SNMP
No Change is needed
17. This question requires that you evaluate the underlined text to determine if it is correct.
Plain Old Telephone Service (POTS), most ISDN lines and Switched T1 lines are all examples of Message
Switching.
Select the correct answer if the underlined text does not make the statement correct. Select “No change is
needed” if the underlined to makes the statement correct
Circuit Switching
Packet Switching
FDDI Switching
No Change is needed
18. What are two advantage of using star topology rather than ring topology in a computer lab
workgroup? (Choose two.)
Failure of a central connectivity device does not bring down the entire network
19. You are an intern for Contoso Ltd. Your supervisor asks you to configure the security zones for
three new PCs so that they connect to two web servers.
The servers connect to the three new PCs as shown in the following image:
20. For each of the following statements, select YES if the statement is true. Otherwise, select NO.
Each correct selection is worth one point
Ѻ YES/NO You use a perimeter network to grant internal client access to external resources
Ѻ YES/NO A LAN has no access to the perimeter network
Ѻ YES/NO A perimeter network typically contains servers that require Internet access. Such as web or
email address
Attenuation
Interference
Diffraction
Server
Hub
Segmented
Which address indicates that your router’s DHCP service is NOT functioning?
10.19.1.15
169.254.1.15
172.16.1.15
192.168.1.15
172.16.0.0/12
192.168.0.0/16
197.16.0.0/12
25. Match each set of characteristics to the corresponding 802.11 standard
To answers, drag the appropriate set of characteristics from the column on the left to its 802.11 standard
on the right. Each used once, more than once, or not all. Each correct match is worth one point
26. This question requires that you evaluate the underlined text to determine if it is correct.
In a wireless network that requires an SSL certificate, WEP handles the SSL certificate.
Select the correct answer if the underlined text does not make the statement correct. Select “No change is
needed” if the underlined to makes the statement correct
802.1X
WPA2-PSK
WPA-PSK
No change is needed
It is a non-switching protocol
29. An action center alert recommends that you enable windows firewall. After enabling the
firewall, you can lo longer access websites.
Which two TCP ports should you add exceptions for on the firewall? (Choose two)
Port 21
Port 23
Port 25
Port 80
Port 443