Vous êtes sur la page 1sur 3

9

A technician is troubleshooting a problem where the user claims access to the


Internet is not working, but there was access to the Internet the day before. Upon
investigation, the technician determines that the user cannot access the network
printer in the office either. The network printer is on the same network as the
computer. The computer has 169.254.100.88 assigned as an IP address. What is the
most likely problem?
The router that connects this network to other networks is down.
The network interface card driver needs to be updated.
The IP default gateway on the computer is incorrect.
The computer cannot communicate with a DHCP server.
10
Which technology is most often used to connect devices to a PAN?
Bluetooth
IEEE 802.11n wireless
fiber optic cabling
coaxial cabling
11
Which three layers of the OSI model map to the application layer of the TCP/IP
model? (Choose three.)
data link
application
network
transport
physical
session
presentation
12
A device has an IPv6 address listed as 2001:0DB8:75a3:0214:0607:1234:aa10:ba01.
What is the interface ID of the device?

ba01
0607:1234:aa10:ba01
2001:0DB8:75a3
2001:0DB8
13
What is a characteristic of the UDP protocol?
low overhead
error correction
guaranteed delivery
end-to-end establishment before delivery
14
What would be a disadvantage of configuring a wireless router or access point to
operate only in accordance with the 802.11g protocol standard?
802.11a wireless devices will not be able to connect to the wireless network.
The 802.11g standard does not support static IP addressing.
The 802.11g standard does not support advanced network security features.
Using only 802.11g will cause multiple SSIDs to be broadcast.
15
What is the maximum segment length that is specified by the 1000BASE-T standard?
1640 ft (500 m)
984 ft (300 m)
328 ft (100 m)
3280 ft (1000 m)
607 ft (185 m)
16
Which two characteristics describe Ethernet technology? (Choose two.)
It is supported by IEEE 802.3 standards.
It is supported by IEEE 802.5 standards.
It typically uses an average of 16 Mb/s for data transfer rates.
It uses a ring topology.
It uses the CSMA/CD access control method.

17
Which three factors are reasons for a company to choose a client/server model for a
network instead of peer-to-peer? (Choose three.)
The company network requires secure access to confidential information.
Each user understands how to safely share files across a network.
All employees passed a strict background check as part of the corporate hiring practices.
The data gathered by the employees is critical and should be backed up on a regular
basis.
The network is small with fewer than eight users.
The users need a central database to store inventory and sales information.
18
What benefit is provided by a computer data network?
increased security
decentralized administration
resource sharing
simplified troubleshooting
19
When would a printer be considered a network host?
when it is connected to a workstation
when it is connected to a laptop
when it is connected to a switch
when it is connected to a PC

Vous aimerez peut-être aussi