1. Why is IEEE 802.11 wireless technology able to transmit further distances than Bluetooth technology? transmits at much lower frequencies has higher power output transmits at much higher frequencies uses better encryption methods 2. What are three advantages of wireless over wired technology? (Choose three.) more secure longer …
1. A user types www.cisco.com into a web browser address textbox. What does www.cisco.com represent? the IP address of a web server a physical network address the closest router interface to the source the source IP address in the data transmission 2. What type of server would use …
1. How large are IPv4 addresses? 8 bits 16 bits 32 bits 64 bits 128 bits 2. Refer to the graphic. A user at the workstation cannot connect to the server. All cables have been tested and are working and all devices have IP addressing. However, the user …
1. Which definition describes the term Internet? a group of PCs connected together on a LAN a group of PCs connected together by an ISP a network of networks that connects countries around the world a worldwide collection of networks controlled by a single organization 2. What type …
1. Host A needs to learn the MAC address of Host B, which is on the same LAN segment. A message has been sent to all the hosts on the segment asking for the MAC address of Host B. Host B responds with its MAC address and all …
1. A computer in the Advanced Technology Center computer room on the second floor, room number 217, has the computer name ATC_217_7. What fact is true about the computer name? The name is dynamically assigned by the DNS server. The name is required to allow connectivity to the …
1. A user plans to run multiple applications simultaneously on a computer. Which computer component is essential to accomplish this? RAM NIC video card sound card storage device 2. What are two benefits of connecting a laptop computer to a docking station? (Choose two.) Mobility is increased. Less …
Assessment EWAN Final – CCNA 4 Exploration: Accessing the WAN (Version 4.0) 1. Which two statements are true about creating and applying access lists? (Choose two.) There is an implicit deny at the end of all access lists. One access list per port, per protocol, per direction is …
Assessment EWAN Practice Final – CCNA 4 Exploration: Accessing the WAN (Version 4.0) 1. What are two characteristics of DSL technology? (Choose two.) Uploads typically offer larger transfer rates than downloads. Service providers deploy DSL in the local loop of the telephone network. DSL download rates are reduced …
Assessment EWAN Chapter 8 – CCNA 4 Exploration: Accessing the WAN (Version 4.0) 1. What combination of IP address and wildcard mask should be used to specify only the last 8 addresses in the subnet 192.168.3.32/28? 192.168.3.32 0.0.0.7 192.168.3.32 0.0.0.15 192.168.3.40 0.0.0.7 192.168.3.40 0.0.0.15 2. Excessive broadcasts are …