18) Which statement is correct about the proxy support that is offered by the HTTP protocol?
a) It allows clients to make direct network connections to other network services.
b) It filters unsuitable web content.
c) It reduces the speed of the network.
d) It encrypts the data that is being transmitted.
------
30) Which combination of network address and subnet mask allows 62 hosts to be connected in a single subnet?
a) Network address 10.1.1.4 Subnet mask 255.255.255.240
b) Network address 10.1.1.0 Subnet mask 255.255.255.252
c) Network address 10.1.1.0 Subnet mask 255.255.255.192
d) Network address 10.1.1.4 Subnet mask 255.255.255.248
------
45) Which two statements are correct about the ICMP packet that is used by the ping command? (Choose two.)
a) It guarantees datagram delivery.
b) It verifies Layer 3 connectivity.
c) It acknowledges the receipt of TCP segments.
d) It determines where a packet is lost on the path from the source to the destination.
e) It measures the time that elapses between when the request packet is sent and the response packet is received.
-----
47) Which two statements are correct about the DNS hierarchy? (Choose two.)
a) The root server maintains records for atable cable managementll servers in the Internet.
b) DNS relies on a hierarchy of decentralized servers to maintain records.
c) The root servers maintain records about how to reach top-level domain servers.
d) All DNS servers manage databases that store name-to-IP mappings for the entire DNS structure.
e) A query requesting a name resolution starts from the client and is passed directly to the server at the top of the DNS hierarchy.
-----
48) Which statement is correct about passive data connections in the FTP protocol?
a) The server initiates the data transfer connection.
b) The server forwards its IP address and a random port number to the FTP client through the control stream.
c) The firewalls do not permit passive data connections to hosts that are located within the network.
d) The client forwards data to port 21 of the server.
-----
51) How does an SNMP trap aid network monitoring and management?
a) It reports to the management station by responding to polls.
b) It collects information for the management station by using polling devices.
c) It sends an alert message to the management station when a threshold is reached.
d) It flags atable cable managementttempts to begin a DoS attack on the network.
-----
52) A network is spread across two buildings that are separated by a distance of 500 feet (152 meters). An electrical transformer is installed near the cable route. Which type of cable should be used in this network?
a) STP
b) UTP
c) coaxial
d) fiber-optic
-----
54) Which statement describes a route that has been learned dynamically?
a) It is automatically updated and maintained by routing protocols.
b) It is unaffected by changes in the topology of the network.
c) It has an administrative distance of 1.
d) It is identified by the prefix C in the routing table.
-----
56) What can cause a problem at the data link layer?
a) a faulty network cable
b) a firewall that is blocking all HTTP traffic
c) incorrectly configured device drivers
d) incorrectly configured subnet masks
30) c) Network address 10.1.1.0 Subnet mask 255.255.255.192 is a /26 which can have up to 64 host.
i'm still learning too, they're all out there.
No comments:
Post a Comment