السلام عليكم
اخواني محتاج مساعدتكم في حل هالاسئله
Which three statements describe an IP address? (Choose three.)The network portion of an IP address will be the same for all hosts that are connected to the same local network.
An IP address is known as a logical address.
An IP address uses a 30-bit addressing scheme.
An IP address is found in the Layer 2 header during transmission.
The network portion of an IP address is burned into a network interface card.
An IP address is unique within the same local network.
ــــــــــــــ
Which two statements are true about local applications? (Choose two.)They run on the computer where they are installed
They run on the network.
An example of a local application is e-mail.
They are accessed from a remote computer.
They are stored on the local hard disk.
ــــــــــــــــــــــــ
What advantage does a peer-to-peer network have over a client-server network?It eliminates the need for centralized administration
It increases security.
It increases scalability.
It produces a higher performance for hosts.
ــــــــــــــــــــــــــــــــ
Which portion of the packet does a router use to forward the packet to the destination?destination MAC address
source IP address
user data
destination IP address
control information
ــــــــــــــــــــــــــــــــــــــــ
What is specified by the network number in an IP address?the broadcast identity of subnetwork
the network to which the host belongs
the physical identity of the computer on the network
the node of the subnetwork which is being addressed
ـــــــــــــــــــــــــــــــــــــ
Why would a corporate web server be assigned a public IP address instead of a private IP address?The same public address can be used on multiple servers to prevent depletion of available IP addresses
The public address can be acquired at no cost.
The public address can be routed on the Internet.
The public address provides a security advantage.
ــــــــــــــــــــــ
The help desk at a large packaging company receives a call from a user who is concerned about lost data files on the local PC. The helpTrojan horse
desk technician learns that the user clicked on an icon that appeared to be a program update, but no updates were scheduled for that
program. What type of attack has likely occurred?
worm
DDoS
brute force
ـــــــــــــــــــــــــــــــــ
When would infrared be used to connect network devices?when updating two access points that are located in separate buildings
when connecting multiple host devices to a wireless access point
when synchronizing a PC with a PDA that is in line of sight
when connecting a PC to a network switch that is located in another room
ـــــــــــــــــــــــــ
Which attribute must be the same for wireless devices on one network to be able to communicate with devices on a different network?wireless equipment vendor
DNS server
MAC address
default gateway
operating system
ـــــــــــــــــــــــــــــــــــ
What component of a personal computer is responsible for the processing of all data?
RAMoperating system
CPU
firewall
system bus
ـــــــــــــــــــــــــــــــــــــــــــــ
What procedure will help prevent users from detecting a wireless network?Change the default administrator password on the AP
Enable WEP.
Enable MAC filtering.
Disable SSID broadcasts.
ــــــــــــــــــــــــــــــــــــــــــ
What two commands can be used to form a new binding if client information does not agree with the DHCP client table? (Choose two.)ipconfig /releaseipconfig
ipconfig /all
ipconfig /flushdns
ipconfig /renew
ــــــــــــــــــــــــــــــــــ
This item references content from the following areas:
7.3.3 Authentication on a WLAN46For the second time in a week, workstations on a LAN are not able to log into the server. The technician fixed the problem the first time,
but cannot remember the steps taken to solve it. What aspect of the troubleshooting process has the technician
neglected?
identifying the problem
asking end-users
documenting the troubleshooting processusing structured techniques to solve a problem
ـــــــــــــــــــــــــــــــ
Which two causes of networking problems are related to the physical layer? (Choose two.)incorrect default gateway
damaged cables and connectors
incorrect addressing
incorrect subnet mask
overheated components
ــــــــــــــــــــــــــــــــــــــــــــ
Which statement accurately describes a recommended strategy for end users to employ when they interact withAt the beginning of the call, ask for the name and number of the supervisor of the help desk technician
a help desk technician?
Provide as much information about the problem as possible.
Expect first-level help desk technicians to solve the problem, because they are highly-trained personnel.
Hand over the problem to the help desk professionals, then do not interfere with them.
ــــــــــــــــــــــــ
الله يوفقه دنيا واخره اللي يحلها لي
المفضلات