السلام عليكم

اخواني محتاج مساعدتكم في حل هالاسئله


Which three statements describe an IP address? (Choose three.)
An IP address is known as a logical address.
An IP address uses a 30-bit addressing scheme.
An IP address is found in the Layer 2 header during transmission.
The network portion of an IP address is burned into a network interface card.
An IP address is unique within the same local network.
The network portion of an IP address will be the same for all hosts that are connected to the same local network.

ــــــــــــــ

Which two statements are true about local applications? (Choose two.)
They run on the network.
An example of a local application is e-mail.
They are accessed from a remote computer.
They are stored on the local hard disk.
They run on the computer where they are installed

ــــــــــــــــــــــــ

What advantage does a peer-to-peer network have over a client-server network?
It increases security.
It increases scalability.
It produces a higher performance for hosts.
It eliminates the need for centralized administration

ــــــــــــــــــــــــــــــــ

Which portion of the packet does a router use to forward the packet to the destination?
source IP address
user data
destination IP address
control information
destination MAC address

ــــــــــــــــــــــــــــــــــــــــ


What is specified by the network number in an IP address?
the network to which the host belongs
the physical identity of the computer on the network
the node of the subnetwork which is being addressed
the broadcast identity of subnetwork


ـــــــــــــــــــــــــــــــــــــ

Why would a corporate web server be assigned a public IP address instead of a private IP address?
The public address can be acquired at no cost.
The public address can be routed on the Internet.
The public address provides a security advantage.
The same public address can be used on multiple servers to prevent depletion of available IP addresses

ــــــــــــــــــــــ

The help desk at a large packaging company receives a call from a user who is concerned about lost data files on the local PC. The help
desk technician learns that the user clicked on an icon that appeared to be a program update, but no updates were scheduled for that
program. What type of attack has likely occurred?
worm
DDoS
brute force
Trojan horse

ـــــــــــــــــــــــــــــــــ

When would infrared be used to connect network devices?
when connecting multiple host devices to a wireless access point
when synchronizing a PC with a PDA that is in line of sight
when connecting a PC to a network switch that is located in another room
when updating two access points that are located in separate buildings

ـــــــــــــــــــــــــ


Which attribute must be the same for wireless devices on one network to be able to communicate with devices on a different network?
DNS server
MAC address
default gateway
operating system
wireless equipment vendor


ـــــــــــــــــــــــــــــــــــ

What component of a personal computer is responsible for the processing of all data?

RAM
CPU
firewall
system bus
operating system


ـــــــــــــــــــــــــــــــــــــــــــــ

What procedure will help prevent users from detecting a wireless network?
Enable WEP.
Enable MAC filtering.
Disable SSID broadcasts.
Change the default administrator password on the AP

ــــــــــــــــــــــــــــــــــــــــــ

What two commands can be used to form a new binding if client information does not agree with the DHCP client table? (Choose two.)
ipconfig /release
ipconfig /all
ipconfig /flushdns
ipconfig /renew
ipconfig

ــــــــــــــــــــــــــــــــــ

This item references content from the following areas:
7.3.3 Authentication on a WLAN
46
For the second time in a week, workstations on a LAN are not able to log into the server. The technician fixed the problem the first time,
but cannot remember the steps taken to solve it. What aspect of the troubleshooting process has the technician
neglected?

identifying the problem

asking end-users
documenting the troubleshooting process
using structured techniques to solve a problem

ـــــــــــــــــــــــــــــــ

Which two causes of networking problems are related to the physical layer? (Choose two.)
damaged cables and connectors
incorrect addressing
incorrect subnet mask
overheated components
incorrect default gateway


ــــــــــــــــــــــــــــــــــــــــــــ

Which statement accurately describes a recommended strategy for end users to employ when they interact with
a help desk technician?

Provide as much information about the problem as possible.
Expect first-level help desk technicians to solve the problem, because they are highly-trained personnel.
Hand over the problem to the help desk professionals, then do not interfere with them.
At the beginning of the call, ask for the name and number of the supervisor of the help desk technician

ــــــــــــــــــــــــ

الله يوفقه دنيا واخره اللي يحلها لي