Welcome to Justanswer
Hi, there is actually 60 questions total
yes i know...let me answer these first
keep noting down the answers
ok, will do
4 i need to see the illustration
I got number 4.
Send questions here
OK, you want the next set
Please Click on ACCEPT so that i can be paid for my work with positive feedback and bonus
18. What type of tool do you use to connect bulk cable runs to wall plates and patch panels?
A punchdown block tool
____ 19. You have been hired by a corporation to install cabling to connect two existing networks. The two networks are in different buildings approximately 1,000 meters apart. The cable type must support Fast Ethernet data rates of 100 megabits per second (Mbps) and provide a high level of resistance to electromagnetic interference (EMI). Your client wants the most economical cabling solution that meets the corporation’s needs. What cable type best meets the needs of this corporation?
Multimode fiber-optic cable
Shielded twisted-pair (STP)
Unshielded twisted-pair (UTP)
Thin coaxial cable
Singlemode fiber-optic cable
____ 20. You have been hired by a corporation to design the cabling for their network. The corporation just moved in to two different floors of an older building. The building has existing Category 3 (CAT3) cable. Your client wants two separate local area networks (LANs), one on each floor, with a backbone network connecting them. Your client wants a 100-megabit-per-second (Mbps) data rate for each LAN but plans on migrating to 1,000 Mbps in the future. The two networks are approximately 600 meters apart. Which of the following solutions best meets the needs of this corporation?
Install Category 5e (CAT5e) or Category 6 (CAT6) cable for the LANs. These cables run at 100 Mbps and provide a migration path to 1,000 Mbps. Use twisted-pair cable for the backbone network.
Use the existing CAT3 wiring for the LANs, because CAT3 runs at 100 Mbps and provides a migration path to 1,000 Mbps. Use thick coaxial cable for the backbone network.
Install CAT5e or CAT6 cable for the LANs. These cables run at 100 Mbps and provide a migration path to 1000 Mbps. Use multimode fiber-optic cable for the backbone network.
Install CAT5e or CAT6 cable for the LANs. These cables support 100 Mbps and provide a migration path to 1,000 Mbps. Use the existing CAT3 cable for the backbone network.
____ 21. Which twisted-pair cable category is rated for both a 10-megabit-per-second (Mbps) data rate (using two pairs) and a 100-Mbps data rate (using four pairs)?
Category 2 (CAT2)
Category 3 (CAT3)
Category 4 (CAT4)
Category 5 (CAT5)
Category 5e (CAT5e)
____ 22. Which communication method requires separate channels for simultaneously transmitting and receiving data without collisions?
____ 23. What communication method does not allow for the simultaneous transmission and reception of data and is subject to collisions?
____ 24. Which of the following features can network interface adapters use to automatically configure themselves to run at an agreed-upon speed and duplex mode?
Media Access Control (MAC) negotiation
____ 25. Which of the following protocols do enterprise networks use to track the performance of critical network components?
____ 26. On Microsoft Windows operating systems (Windows 95 and later), what is the primary tool that you use to manage and configure a network interface adapter, and where is it located?
The Network Connection tool, accessed from the Network Connections dialog box in Control Panel
The Device Manager utility, accessed from the System Properties dialog box in Control Panel
The System Manager utility, accessed from the Network Connections dialog box in Control Panel
The Interface Manager utility, accessed from the System Properties dialog box in Control Panel
____ 27. You have been hired by a company to redesign its local area network (LAN). Right now it has a single 10-Mbps Ethernet LAN with 40 users and two shared servers, all connected through three hubs. Users on the network must share files with one another and also access the shared servers to retrieve and store files. Users are complaining that the network is too slow. Management states that cost is a factor that must be considered. What would you implement in this situation?
Split the network into smaller segments with dedicated hubs as opposed to shared hubs.
Split the network into two routed LANs with 20 users each.
Replace the hubs with switches to define separate collision domains and filter unnecessary traffic from each segment.
Replace the hubs with a Layer 3 switch and define two virtual LANs (VLANS) with 20 users each.
____ 28. Which of the following devices enables two computers to communicate when they are using different protocols at each layer of the Open Systems Interconnection (OSI) reference model?
____ 29. What is the Institute of Electrical and Electronics Engineers (IEEE) standard for 100-megabit-per-second (Mbps) networks using baseband signaling over four twisted pairs?
____ 30. What term best describes the alternating clocking pattern of 1s and 0s sent prior to frame transmission?
Frame clocking sequence
____ 31. Which of the following best describes the Ethernet 5-4-3 rule?
No more than five local area networks (LANs) connected by routers with three switches
No more than five hubs, connecting four segments and three repeaters
No more than five segments, connected by four repeaters with three mixing segments
No more than five mixing segments, connected by four repeaters with three routers
____ 32. You have been hired by a company to upgrade its network infrastructure. The current network is 10-Mbps Ethernet over Category 5 (CAT5) twisted-pair cable. The network interfaces on the network can support higher data rates but are not currently configured to do so. There are 100 nodes on the network, all connected to hubs. Users are complaining that the network is too slow and connections are sometimes dropped. Management wants to upgrade to the fastest Ethernet standard possible, using the existing cabling, and still keep costs to a minimum. Which of the following implementations would you recommend?
Upgrade to 100Base-TX and keep the existing hubs.
Upgrade to Gigabit Ethernet and keep the existing hubs.
Upgrade to 100Base-T4 and replace all hubs with switches.
Upgrade to 100Base-FX and keep all existing hubs.
Upgrade to 100Base-TX and replace all hubs with switches.
____ 33. You are a network administrator who has recently deployed 20 new laptop computers to your company’s outside sales force. These salespeople do not have desks in the office, but when they’re not on the road they often come to the site and work wherever they can find free space. As a result, you have decided to deploy a wireless local area network (WLAN) so that the salespeople can connect to the company network from any location in the office and access resources such as database and e-mail servers. Which of the following wireless networking scenarios would make this possible?
Install an infrastructure network with a wireless access point.
Install an ad hoc network with a wireless access point.
Install an ad hoc network with a packet bridge.
Install an infrastructure network with a packet bridge.
____ 34. A wireless access point (WAP) enables computers equipped with wireless network interface adapters to function in which of the following topologies?
____ 35. Which of the following is not a potential cause of signal degradation on an Ethernet network?
Electromagnetic interference (EMI)
____ 36. You are a network consultant with a client who wants you to design the local area network (LAN) for his company’s new branch office. The site consists of a building with unshielded twisted-pair (UTP) cable already installed, which the client considered a major selling point when selecting the property. He wants you to install the fastest possible LAN using the existing cable. After examining the site, you note that the cable is Category 3 (CAT3), installed using a star topology, and that the individual cable runs are all less than 100 meters long. You naturally conclude that the cable installation was intended for an Ethernet network and decide to stick with Ethernet for the new network. Which of the following Ethernet physical layer specifications can you use for the new network to provide the fastest transmission speeds without replacing the cable?
____ 37. What is the size (in bytes) of an Internet Protocol (IP) header?
____ 38. You have been hired to design a company’s network. The company has an assigned Class C network address of 192.168.30.0. Your client wants the network to be configured with 8 subnets with 14 hosts each. Will this configuration work, and, if so, how many subnets and hosts can be on the network?
Yes, this will work. The network will have 14 hosts per subnet and more than 8 subnets for future growth. Four bits will be used for hosts for a total of 14. The last 4 bits will be used to get a total of 14 subnets.
No, this will not work. There are not enough bits to have 8 subnets with 14 hosts per subnet.
No, this will not work. Although you have enough bits to have 8 subnets, there are not enough bits left over to allow for 14 hosts per subnet.
Yes, this will work. The company can have 14 hosts per subnet and 8 subnets. Five bits will be used for hosts for a total of 14. The last 3 bits will be used to get a total of 8 subnets.
____ 39. You have been hired to design a company’s Internet Protocol (IP) addressing scheme. The company has an assigned Class C network address of 192.168.30.0. Your client wants 4 subnets with 28 hosts per subnet. How many bits are required for subnets? How many bits are required for hosts? What will the new mask be for this network?
3 subnet bits, 5 host bits, and mask 255.255.255.240
4 subnet bits, 3 host bits, and mask 255.255.255.248
3 subnet bits, 5 host bits, and mask 255.255.255.224
5 subnet bits, 3 host bits, and mask 255.255.255.192
____ 40. The default mask for a Class B network is 255.255.0.0. How many subnet bits do you need in order to define 600 subnets with 55 hosts per subnet, and what is the new subnet mask for the network?
10 subnet bits with a mask of 255.255.255.192
9 subnet bits with a mask of 255.255.255.128
10 subnet bits with a mask of 255.255.224.0
11 subnet bits with a mask of 255.255.255.192
I still had more questions, don't I pay when I am done?
If I can get all these done tonight, I can do $50 total.
Or If you could finish them by Tomorrow Night, send me an email when you get them completed I could pa you then
i cannot send you email
that is against the rules
i will answer you here itself
Oh ok, not a personal email but an email that justanswer sends you when ur expert has answered your questions
yes you will get a email once i answer you
OK, but I have to stay logged into chat? It is almost 2am here and I have class at 9 am tomorrow
its ok,you can sleep dear.i will take time and finish this in an hour
OK, how will you send me the remaining answers? through here? Should I leave the chat window up?
I will also attach the last of the questions
40. The default mask for a Class B network is 255.255.0.0. How many subnet bits do you need in order to define 600 subnets with 55 hosts per subnet, and what is the new subnet mask for the network?
____ 41. Convert the binary mask 11111111.11111111.11110000.00000000 into its equivalent decimal values. What is the decimal representation of this mask?
____ 42. What is the valid decimal range for the first byte of a Class B address?
1 through 127
128 through 191
192 through 223
224 through 239
____ 43. What term describes a unit of data at the transport layer?
____ 44. When you are analyzing captured Transmission Control Protocol/Internet Protocol (TCP/IP) packets, which of the following control bits must you look for in the Transmission Control Protocol (TCP) header to determine whether the receiving host has successfully received the sending host’s data?
The ACK bit
The URG bit
The PSH bit
The SYN bit
The FIN bit
____ 45. Which of the following explanations best describes the function of a Transmission Control Protocol (TCP) port and a User Datagram Protocol (UDP) port?
They indicate to the receiver that the sender can activate a specific port only.
They are used by both the sending host and the receiving host to identify the upper layer protocol or process that generated the information in the datagram.
They are used by only the server to indicate the application process running in this host.
They are used by both the sending host and the receiving host to negotiate a well-known server port for the communicating host processes.
____ 46. An Internet Protocol (IP) host is attempting to establish a Telnet session with a server. Which of the following lists the well-known server port and the correct order of Transmission Control Protocol (TCP) session establishment messages?
Port 53; SYN, SYN, ACK, ACK
Port 20; SYN, SYN/ACK, ACK
Port 23; SYN, SYN/ACK, ACK
Port 23; SYN/ACK, SYN, ACK
____ 47. Which of the following protocols is used on NetWare servers to facilitate the communication between print servers, queues, printers, and specialized programs such as remote console and backup applications?
Internetwork Packet Exchange (IPX)
Sequenced Packet Exchange (SPX)
NetWare Link Services Protocol (NLSP)
Transmission Control Protocol (TCP)
____ 48. What is the valid range for well-known Transmission Control Protocol (TCP) and User Datagram Protocol (UDP) server ports?
1023 through 65534
1 through 1024
1024 through 65534
1 through 1023
____ 49. What is the valid range for Transmission Control Protocol (TCP) and User Datagram Protocol (UDP) client ports?
____ 50. What is the well-known port value for Hypertext Transfer Protocol (HTTP) Web services?
Short Answer – Please select the answers to each question by marking your selections in BOLD. Each question is worth 5 points.
51. Which of the following statements about protocols are true? (Choose all answers that are correct.)
a. They provide a common language to communication systems, allowing them to exchange data.
b. They provide the foundation for applications to transfer data across the network.
c. They are typically based on public standards, although some are proprietary.
d. They are never based on public standards. They are always proprietary.
e. They rely on error-free networks to operate properly.
52. Which cable types are typically used in newly constructed local area network (LAN) installations? (Choose all answers that are correct.)
a. Singlemode fiber-optic
b. Multimode fiber-optic
53. Which of the following twisted-pair wiring categories are rated for 1000 megabits per second (Mbps) using two pairs? (Choose all answers that are correct.)
a. Category 3 (CAT3)
b. Category 4 (CAT4)
c. Category 5 (CAT5)
d. Category 5e (CAT5e)
e. Category 6 (CAT6)
54. In the punching down process, what is the correct order of steps that you must take to connect bulk cables to jacks in wall plates and patch panels?
a. Press the bare wire down between the two metal contacts that hold it in place.
b. Strip some of the insulating sheath off the cable end to expose the wires.
c. Insert the wires into the appropriate contacts in the jack.
d. Strip a small amount of insulation off each wire.
e. Separate the twisted wire pairs at the ends.
55. What hardware resources must always be manually configured for network interface adapters that do not support plug and play (PnP)? (Choose two correct answers.)
a. Interrupt request (IRQ) line
b. Input/output (I/O) port address
c. Direct memory access (DMA)
d. Bus mastering
56. What must you do to install a network interface adapter in a computer? (Choose three correct answers.)
a. Install the network layer protocol.
b. Physically insert the card into the slot.
c. Configure the card to use the appropriate hardware resources.
d. Reconfigure the basic input/output system (BIOS) of the computer to support a new network interface adapter.
e. Install the network interface adapter device driver.
57. Which of the following statements about routers are true? (Choose all answers that are correct.)
a. They are network layer devices that use logical addressing to forward frames.
b. They are data-link layer devices that use Media Access Control (MAC) addresses to forward frames.
c. They build their internal tables based on destination MAC address and forward frames based on source MAC address.
d. They must support the network layer protocol implemented on the local area network (LAN).
e. Each port defines a separate broadcast domain.
58. Which three fields are contained within a Token frame?
a. End Delimiter
b. Access Control
c. Frame Control
d. Start Delimiter
59. What are the two main functions of the flag bits in the Internet Protocol (IP) header? (Choose two correct answers.)
a. They indicate to the receiving system whether the datagram can be fragmented.
b. They specify how long the IP header is, including the Data and Option fields.
c. They specify whether this is the last fragment or if there are more fragments to follow.
d. They specify where this datagram should be placed in the datastream.
60. What is the purpose of the Time To Live (TTL) field in the Internet Protocol (IP) header? (Choose all answers that are correct.)
a. It specifies the number of intermediate hops a datagram has passed through on the way to the destination.
b. It is decremented by each router as it is forwarded.
c. It identifies the datagram as fragmented.
d. It identifies the protocol being carried in the datagram