Assignment Paper

What is a characteristic of a fault tolerant network?

 

 

 

2

 

 

Three bank employees are using the corporate network.

 

The first employee uses a web browser to view a company

 

web page in order to read some announcements. The

 

second employee accesses the corporate database to

 

perform some financial transactions. The third employee

 

participates in an important live audio conference with

 

other corporate managers in branch offices. If QoS is

 

implemented on this network, what will be the priorities

 

from highest to lowest of the different data types?

 

 

 

 

 

3

 

 

What is a benefit of using cloud computing in

 

networking?

 

 

 

4

 

 

What is the function of the shell in an OS?

 

 

 

5

 

 

Which connection provides a secure CLI session with

 

encryption to a Cisco switch?

 

 

 

6

 

 

A network technician is attempting to configure an

 

interface by entering the following command:

 

SanJose(config)# ip address 192.168.2.1 255.255.255.0. The

 

command is rejected by the device. What is the reason for

 

this?

 

 

 

 

 

7

 

 

An administrator uses the Ctrl-Shift-6 key combination

 

on a switch after issuing the ping command. What is the

 

purpose of using these keystrokes?

 

 

 

8

 

 

Refer to the exhibit. A network administrator is

 

configuring access control to switch SW1. If the

 

administrator uses a console connection to connect to the

 

switch, which password is needed to access user EXEC

 

mode?

 

 

 

8

 

 

Refer to the exhibit. A network administrator is

 

configuring access control to switch SW1. If the

 

administrator uses a console connection to connect to the

 

switch, which password is needed to access user EXEC

 

mode?

 

 

 

10

 

 

What protocol is responsible for controlling the size of

 

segments and the rate at which segments are exchanged

 

between a web client and a web server?

 

 

 

 

 

11

 

 

 

 

What is an advantage to using a protocol that is defined

 

by an open standard?

 

 

 

12

 

 

What are two benefits of using a layered network

 

model? (Choose two.)

 

 

 

 

 

13

 

 

Which two OSI model layers have the same

 

functionality as two layers of the TCP/IP model? (Choose

 

two.)

 

 

 

 

 

14

 

 

Which name is assigned to the transport layer PDU?

 

 

 

 

 

15

 

 

A network engineer is measuring the transfer of bits

 

across the company backbone for a mission critical  

 

database application. The engineer notices that the

 

network throughput appears lower than the bandwidth

 

expected. Which three factors could influence the

 

differences in throughput? (Choose three.)

 

 

 

 

 

16

 

 

A network administrator is troubleshooting

 

connectivity issues on a server

 

. Using a tester

 

, the

 

administrator notices that the signals generated by the

 

server NIC are distorted and not usable. In which layer of

 

the OSI model is the error categorized?

 

 

 

 

 

17

 

 

Which type of UTP cable is used to connect a PC to a

 

switch port?

 

 

 

 

 

18

 

 

A network administrator is measuring the transfer of

 

bits across the company backbone for a mission critical

 

financial application. The administrator notices that the

 

network throughput appears lower than the bandwidth

 

expected. Which three factors could influence the

 

differences in throughput? (Choose three.)

 

 

 

 

 

19

 

 

What is a characteristic of UTP cabling?

 

 

 

 

 

20

 

 

What are two characteristics of fiber-optic cable?

 

(Choose two.)

 

 

 

21

 

 

What is a characteristic of the LLC sublayer?

 

 

 

22

 

 

A network team is comparing physical W

 

AN topologies

 

for connecting remote sites to a headquarters building.

 

Which topology provides high availability and connects

 

some, but not all, remote sites?

 

 

 

 

 

23

 

 

What method is used to manage contention-based

 

access on a wireless network?

 

 

 

24

 

 

What are the three primary functions provided by Layer

 

2 data encapsulation? (Choose three.)

 

 

 

25

 

 

What will a host on an Ethernet network do if it receives

 

a frame with a destination MAC address that does not

 

match its own MAC address?

 

 

 

26

 

 

What are two examples of the cut-through switching

 

method? (Choose two.)

 

 

 

27

 

 

What are two actions performed by a Cisco switch?

 

(Choose two.)

 

 

 

28

 

 

Which frame forwarding method receives the entire

 

frame and performs a CRC check to detect errors before

 

forwarding the frame?

 

 

 

29

 

 

Refer to the exhibit. If host A sends an IP packet to host

 

B, what will the destination address be in the frame when it

 

leaves host A?

 

 

 

 

 

30

 

 

What addresses are mapped by ARP?

 

 

 

168

 

 

In what networking model would eDonkey

 

, eMule,

 

BitT

 

orrent, Bitcoin, and LionShare be used?