Which factor does not affect throughput?
- the amount of data sent and received over the connection
- the type of data transmitted
- the operating system used by end devices
- the latency introduced by the number of network devices encountered between source and destination
Answers Explanation & Notes:
Throughput is the amount of data that has been successfully moved from one location to another in a given period of time. Several factors can affect throughput, including the amount and type of data being transferred and latency.
Which two devices are considered end devices? (Choose two.)
- Laptop
- Router
- switch
- Drucker
- Hub
Answers Explanation & Notes:
An end device is a device that forms the interface between users and the underlying communication network. Terminals are either the source or destination of a message.
What distinguishes a peer-to-peer application?
- Each device using the application provides a user interface and runs a background service.
- Both devices initiate a three-way handshake to determine who is initiating the communication.
- Each device can act as both a client and a server, but not at the same time.
- The resources required for the application are centralized.
Answers Explanation & Notes:
Peer-to-peer networks exist directly between client devices, without centralized resources or authentication. There are also hybrid peer-to-peer systems that decentralize resource sharing but can use centralized indices to refer to resource locations.
A user sets up a wireless home network. What kind of device does the user need to have to build the wireless network and allow multiple home devices to access the Internet?
- Hub
- wirelessRouter
- switch
- Patchfeld
Answers Explanation & Notes:
A wireless router connects multiple wireless devices to the network. It will then aggregate the internet access requests from home devices to the internet.
When troubleshooting network problems, where does a network administrator find the configuration information, e.g. B. the computer names and IP addresses used?
- Physical topology diagram
- DHCP-Server
- DNS Server
- Logical topology diagram
Answers Explanation & Notes:
A logical topology usually contains relevant network configuration information such as: B. the following: Device names
IP addressing of the device
network designations
configuration information
A consumer places a smartphone near a payment terminal in a store and the shopping fee is successfully paid. What kind of radio technology was used?
- Bluetooth
- NFC
- W-lan
- 3G
Answers Explanation & Notes:
NFC is a wireless technology that allows data to be exchanged between devices that are in close proximity to each other.
What two types of interference can affect data throughput on UTP cables? (Choose two.)
- EMI
- Noise
- humidity
- crosstalk
- Temperature
Answers Explanation & Notes:
Unshielded twisted pair (UTP) cables are susceptible to disturbances introduced by electromagnetic interference (EMI) and crosstalk.
What two wiring schemes are defined by the TIA/EIA organization for Ethernet installation in homes and businesses? (Choose two.)
- T568A
- STP
- T568B
- UTP
- RJ-45
Answers Explanation & Notes:
The TIA/EIA organization defines the T568A and T568B wiring schemes for typical Ethernet installations. Each wiring scheme defines a specific order of wire connections at the end of the cable.
What are two common media used in networking? (Choose two.)
- copper
- Water
- Nylon
- Phases
- Holz
Answers Explanation & Notes:
Common media used in networks include copper, glass or plastic fiber optics and wireless.
What is an advantage of using standards to develop and implement protocols?
- A specific protocol can only be implemented by one manufacturer.
- Products from different manufacturers can work together successfully.
- Different manufacturers are free to apply different requirements when implementing a protocol.
- Standards give manufacturers the flexibility to design devices that meet unique needs.
Answers Explanation & Notes:
Protocols based on standards enable products from different manufacturers to work together successfully. Standards-based protocols allow many manufacturers to implement this protocol. If different manufacturers implement different requirements within the same protocol, their products will not be interoperable.
What two criteria help when choosing a network medium for a network? (Choose two.)
- which data types must be prioritized
- the costs of the end devices used in the network
- the distance over which the selected medium can successfully transmit a signal
- the number of intermediate devices installed on the network
- the environment in which the selected media is to be installed
Answers Explanation & Notes:
Criteria for selecting a network medium include the following: The distance over which the selected medium can successfully transmit a signal in the environment in which the selected medium is to be installed
The amount of data and the speed at which the data must be transferred
The cost of the medium and its installation
At what level of the OSI model would a logical address be added during encapsulation?
- physical layer
- data transmission level
- network layer
- transport layer
Answers Explanation & Notes:
Logical addresses, also called IP addresses, are added at the network layer. Physical addresses are inserted at the data link layer. Port addresses are added at the transport layer. No addresses are added at the physical layer.
(Video) Networking Essentials (Version 2) – Networking Essentials 2.0 Practice Final Exam Answers Full 2021
What are two advantages of using a layered network model? (Choose two.)
- It helps in protocol design.
- It speeds up package delivery.
- It prevents designers from creating their own mockup.
- It prevents technology in one layer from affecting other layers.
- It ensures that a device at one level can function at the next higher level.
Answers Explanation & Notes:
Some vendors have developed their own reference models and protocols. Today, if a device is to communicate on the Internet, the device must use the TCP/IP model. The advantages of using a layered model are as follows: Protocol design support
promotes competition between providers
prevents a technology that works on one level from affecting another level
provides a common language for describing network functionality
helps to visualize the interaction between each layer and protocols between each layer
What kind of address does a switch use to build the MAC address table?
- destination IP address
- Ursprungs IP-Addresse
- Destination MAC address
- Quell-MAC-Address
Answers Explanation & Notes:
When a switch receives a frame with a source MAC address that is not in the MAC address table, the switch adds that MAC address to the table and maps that address to a specific port. Switches do not use IP addressing in the MAC address table.
A host needs to reach another host on a remote network, but the ARP cache has no mapping entries. To which destination address
- the host sends an ARP request?
- die Unicast-IP-Adresse des Remote-Hosts
- die Unicast-MAC-Adresse des Remote-Hosts
- the broadcast IP address of the subnet
- the broadcast MAC address
Answers Explanation & Notes:
ARP requests are sent when a host does not have an IP-to-MAC mapping for a destination in the ARP cache. ARP requests are sent to the ethernet broadcast of FF:FF:FF:FF:FF:FF. In this example, since the address of the remote host is unknown, an ARP request is sent to the Ethernet broadcast to resolve the MAC address of the default gateway used to reach the remote host.
A network administrator installs a network device that focuses on connecting independent local area networks together. At what device layer is this technology located?
- Kern
- Access
- Internet
- distribution
Answers Explanation & Notes:
The distribution layer connects local area networks and controls traffic between them. Network devices that make up the distribution layer are designed to connect networks together, not individual hosts.
A computer needs to send a packet to a destination host on the same LAN. How is the package shipped?
- The packet is first sent to the default gateway and then, depending on the gateway's response, it can be sent to the destination host.
- The packet is sent directly to the destination host.
- The packet is first sent to the default gateway and then from the default gateway directly to the destination host.
- The packet is only sent to the default gateway.
Answers Explanation & Notes:
If the destination host is on the same LAN as the source host, no default gateway is required. A default gateway is required when a packet needs to be sent outside the LAN.
What is the impact on communication if the default gateway is misconfigured on the host?
- The host cannot communicate on the local network.
- The host can communicate with other hosts on the local network, but not with hosts on remote networks.
- The host can communicate with other hosts on remote networks, but not with hosts on the local network.
- There is no impact on communication.
Answers Explanation & Notes:
A default gateway is only required to communicate with devices on another network. The lack of a default gateway does not affect connectivity between devices on the same local network.
Which two statements describe properties of network addresses? (Choose two.)
- A statically assigned IP address is valid on any network to which the device connects.
- A device's MAC address changes when that device roams from one Ethernet network to another.
- DHCP is used to dynamically assign both MAC and IP addresses to devices connected to the network.
- A MAC address is also known as a physical address because it is permanently embedded in the NIC.
- A valid public IPv4 or IPv6 address is required for devices to communicate over the Internet.
Answers Explanation & Notes:
Understanding how network addressing works can speed up configuration and troubleshooting. MAC addresses are assigned by the NIC manufacturer and remain the same as long as the NIC is not replaced. MAC addresses are used to communicate between devices connected to the same local Ethernet network. Valid IPv4 and IPv6 addresses are required for communications to be routed over the Internet. All IP addresses are only valid on a network that has the same network prefix bits and subnet mask.
What is the purpose of the subnet mask in connection with an IP address?
- to uniquely identify a host on a network
- to determine if the address is public or private
- to determine the subnet to which the host belongs
- to mask the IP address to the outside world
Answers Explanation & Notes:
A subnet mask is also required for the IPv4 address. A subnet mask is a special type of IPv4 address that, along with the IP address, specifies the subnet of which the device is a member.
What are three characteristics of multicast transmission? (Choose three.)
- The source address of a multicast transmission is in the range from 224.0.0.0 to 224.0.0.255.
- A single packet can be sent to a group of hosts.
- Multicast transmission can be used by routers to exchange routing information.
- The range from 224.0.0.0 to 224.0.0.255 is reserved to reach multicast groups on a local network.
- Computers use multicast transmission to request IPv4 addresses.
- Multicast messages map lower layer addresses to upper layer addresses.
Answers Explanation & Notes:
Broadcast messages consist of individual packets that are sent to all hosts on a network segment. These types of messages are used to request IPv4 addresses and map upper-layer addresses to lower-layer addresses. A multicast transmission is a single packet sent to a group of hosts and used by routing protocols such as OSPF and RIPv2 to exchange routes. The address range 224.0.0.0 to 224.0.0.255 is reserved for link-local addresses to reach multicast groups in a local network.
See exhibition. A newly purchased client laptop has just connected to the local network. The local network uses a wireless router that provides dynamic addressing as shown. What IP address does the laptop use as the destination address when requesting a dynamically assigned address?

- 192.168.0.1
- 192.168.0.100
- 255.255.255.0
- 255.255.255.255
- 192.168.0.255
Answers Explanation & Notes:
When a new client device is installed on a network that uses dynamic IP addressing, the client sends a DHCP request message with a destination IPv4 address of 255.255.255.255.
A DHCP server is used to dynamically assign IP addresses to hosts on a network. The address pool is configured with 192.168.10.0/24. There are 3 printers on this network that need to use reserved static IP addresses from the pool. How many IP addresses in the pool still need to be allocated to other hosts?
- 254
- 251
- 252
- 253
Answers Explanation & Notes:
(Video) [CCNA- PRACTICAL FINAL EXAM] Networking Essentials 2.0 PT Skills Assessment SPIf the block of addresses assigned to the pool is 192.168.10.0/24, then 254 IP addresses must be assigned to hosts on the network. Since there are 3 printers whose addresses must be assigned statically, 251 IP addresses are left for assignment.
A client device on an Ethernet segment needs an IP address to communicate on the network. A DHCP server with the IP address 192.168.1.1 has been configured and activated on the network. How does a client device get a usable IP address for this network?
- Send a DHCPREQUEST packet to the IP address 255.255.255.255.
- Send a DHCPACK packet to the default gateway address.
- Send a DHCPDISCOVER message to physical address FF-FF-FF-FF-FF-FF.
- Use a statically configured IP address from the pool of IP addresses offered by the DHCP server.
Answers Explanation & Notes:
As with IP addressing, there is also a special MAC address for broadcast purposes: FF-FF-FF-FF-FF-FF. When a DHCP client needs to send a DHCP Discover message to discover DHCP servers, the client uses this MAC address as the destination MAC address in the Ethernet frame. This happens because it has no knowledge of the IP and MAC addresses of DHCP servers.
Associate each DHCP message type with its description. (Not all options are used.)

Answers Explanation & Notes:
Place the options in the following order:
- a client that initiates a message to find a DHCP server - DHCPDISCOVER
- a DHCP server responding to a client's initial request - DHCPOFFER
- the client accepts the IP address provided by the DHCP server – DHCPREQUEST
- the DHCP server confirms that the lease was accepted - DHCPACK
What is the impact on communication if the default gateway is misconfigured on a host?
- The host cannot communicate on the local network.
- The host cannot communicate with hosts on remote networks.
- The host cannot communicate with hosts on the local and remote network.
- The host cannot obtain an IP address from the DHCP server.
Answers Explanation & Notes:
In data communication, the default gateway device is only involved when a host needs to communicate with other hosts on a different network. The default gateway address identifies a network device that a host device uses to communicate with devices on other networks. The default gateway device is not used when a host communicates with other hosts on the same network.
A small accounting department sets up a WLAN network to connect end devices and provide Internet access. In what two scenarios does a WiFi router perform Network Address Translation (NAT)? (Choose two.)
- when a host sends packets to a local server to update network media settings and music playlists
- when a host sends packets to the ISP to request a speed increase for internet services
- when a host sends a print job to a network printer on the LAN
- when a host sends packets to a remote site owned by the wireless router manufacturer to request a digital copy of the device manual
- when a host sends HTTP packets to the wireless router to update the LAN network addressing
Answers Explanation & Notes:
A wireless router performs Network Address Translation (NAT) when translating a private (local) source IPv4 address to a public (global) address.
What network migration technique encapsulates IPv6 packets into IPv4 packets for transmission over IPv4 network infrastructures?
- Encapsulation
- translation
- Dual-Stack
- tunnel construction
Answers Explanation & Notes:
In the tunneling migration technique, an IPv6 packet is encapsulated in an IPv4 packet. Encapsulation assembles a message and adds information to each layer to transmit the data over the network. Translation is a migration technique that allows IPv6-enabled devices to communicate with IPv4-enabled devices using a translation technique similar to NAT for IPv4. Dual-stack migration technology allows IPv4 and IPv6 protocol stacks to coexist simultaneously in the same network.
A student uploads files from a phone to a server on a different network. Which layer of the TCP/IP model is responsible for providing an addressing scheme for transferring data between devices?
- Application
- Transport
- Internet
- network access
Answers Explanation & Notes:
The Internet layer provides addresses to connect end devices in different networks.
Which statement describes the data transmission on the transport layer correctly?
- Retransmission of lost packets is provided by both TCP and UDP.
- The segmentation is provided by the window size field when using the TCP protocol.
- A single datagram can contain both a TCP and a UDP header.
- Both UDP and TCP use port numbers.
- When using UDP, segmentation is done using sequence numbers.
Answers Explanation & Notes:
Segmentation is handled at Layer 4 by TCP sequence numbers. UDP does not have sequence numbers in the header, instead leaving it up to the application to do the reordering if necessary. Only TCP provides reliable transmission and retransmission of data. Each segment has either a TCP header or a UDP header; it cannot contain both.
What are two characteristics of protocols used in the TCP/IP protocol stack? (Choose two.)
- The internet layer IP protocol has built-in mechanisms to ensure the reliable transmission and reception of data.
- UDP is used when an application needs to be deployed as quickly as possible and some data loss can be tolerated.
- TCP and UDP destination port numbers are dynamically generated by the sending device to track responses to requests.
- TCP mechanisms retransmit data if no acknowledgment is received from the target system within a specified period of time.
- The same Transport Layer source port is used for all tabs that are open at the same time in a web browser.
Answers Explanation & Notes:
Application programmers make decisions about which protocols to use to transport the data to and from their applications based on whether the application can tolerate lost data. Live streaming and voice transmissions can use UDP because if a few packets of data are lost, the quality of video and audio will not be seriously affected. TCP is used when all data must be complete and accurate.
Assign the protocol to the function. (Not all options are used.)
A customizable list of allowed protocols is displayed while a network security product is deployed. What three protocols should be allowed for use of email on a network? (Choose three.)
- IMAP4
- TFTP
- Telnet
- HTTP
- SMTP
- DNS
- POP3
Answers Explanation & Notes:
The e-mail protocols used in a network are SMTP, POP3 and IMAP4. SMTP is used to send messages to a local email server while POP and IMAP are used to receive emails.
Which technology converts analog voice signals into digital data?
- SMTP
- VoIP
- SNMP
- POP3
Answers Explanation & Notes:
Voice over IP (VoIP) is a technology used to make phone calls over a network or the Internet that converts analog voice signals into digital data.
See exhibition. Which router port is connected to the modem provided by the service provider?

- A
- B
- C
- D
Answers Explanation & Notes:
(Video) Networking Essentials ( Version 2) - Networking Essentials 2.0 PT Skills Assessment SP | CiscoThe ports shown in the diagram are used as follows: LAN ports A and B are used to connect wired devices to the home network. Internet port C is connected to the modem. The connector marked D is the 5VDC connector that supplies power to the router.
What wireless RF band do IEEE 802.11b/g devices use?
- 900MHz
- 2,4 GHz
- 5 GHz
- 60 GHz
Answers Explanation & Notes:
900MHz is an FCC wireless technology that predated the development of the 802.11 standards. 900MHz devices have a wider coverage area than the higher frequencies and do not require line of sight between devices. 802.11b/g/n/ad devices all operate at 2.4 GHz. 802.11a/n/ac/ad devices operate at 5 GHz and 802.11ad devices at 60 GHz.
What kind of device filtering can be enabled on some wireless access points or wireless routers?
- authentication
- IP Address
- Benutzer ID
- MAC-Address
Answers Explanation & Notes:
On wireless access points, MAC addresses can be entered manually to filter which devices are allowed on the wireless network.
A data center recently upgraded a physical server to host multiple operating systems on a single CPU. The data center can now provide each customer with a separate web server without having to allocate an actual separate server to each customer. Which networking trend is the data center implementing in this situation?
- BYOD
- virtualization
- maintaining communication integrity
- online collaboration
Answers Explanation & Notes:
Virtualization technology can run multiple different operating systems in parallel on a single CPU.
In a software-defined network architecture, what function is removed from network devices and performed by an SDN controller?
- control plane
- data plane
- Security
- Application Guidelines
Answers Explanation & Notes:
With network virtualization, the control plane function of each network device is removed and run by a centralized controller. The controller can then communicate control plane functions to any of the network devices. This allows the network devices to focus all resources on forwarding layer functions.
A user configures a wireless access point and wants to prevent neighbors from discovering the network. What action must the user take?
- Disable SSID broadcast.
- Enable WPA encryption.
- Configure DMZ settings.
- Configure a DNS server.
Answers Explanation & Notes:
Disabling SSID broadcast prevents the access point from advertising the name of the network. Enabling WPA encryption, configuring DMZ settings, and configuring a DNS server performs other tasks but still announces the network's name.
What three attacks exploit human behavior? (Choose three.)
- pretext
- brute force
- Phishing
- Zombies
- wishes
- Malware
Answers Explanation & Notes:
Attacks designed to exploit human behavior such as pretexting, phishing, and vishing are commonly used by hackers to obtain information directly from authorized users
Match the type of malware to the definition.
An intruder will try a variety of ways in rapid succession to guess a password. As a result, other users are on the network
- excluded. What type of attack occurred?
- DDoS
- brute force
- Ping of the Todes
- SYN-Flooding
Answers Explanation & Notes:
In a brute force attack, an unauthorized person attempts to gain access to a system by sending out as many passwords as possible as quickly as possible.
What is the effect of setting the security mode to WEP on a small wireless router?
- It identifies the wireless LAN.
- It allows the access point to notify clients of its presence.
- It translates IP addresses into easy-to-remember domain names.
- It encrypts data between the wireless client and the access point.
- It translates an internal address or group of addresses into an external, public address.
Answers Explanation & Notes:
WEP is used to encrypt data between the wireless client and the access point. DNS translates IP addresses into easy-to-remember domain names. NAT translates an internal address or group of addresses into an external, public address. An SSID allows the access point to notify clients of its presence.
What is an inherent vulnerability in SSID broadcasting?
- It sends the identity of the network.
- It sends unencrypted traffic between the wireless access point and the client.
- It allows any host to join the wireless network.
- It allows unauthenticated access to the wireless network.
Answers Explanation & Notes:
By default, wireless routers and access points broadcast SSIDs in clear text to all computers within range. This poses a security risk because an attacker could easily intercept the radio signals and read plain text messages.
Which solution only allows external users to access an internal FTP server on a private network?
- dynamic NAT
- NAT with overload
- port forwarding
- static NAT
Answers Explanation & Notes:
Port forwarding can be used to allow other users to reach devices on an internal network over the Internet. The firewall in the router uses the port number to determine whether to forward traffic to an internal device. Port numbers are associated with specific services such as FTP, HTTP, HTTPS, and POP3.
Which two files, if found, are copied into memory when a router boots up with the default configuration register setting? (Choose two.)
- running configuration
- IOS-Image-Datei
- launch configuration
- POST-Diagnose
Answers Explanation & Notes:
(Video) Networking Essentials 2.0 Practice Skills Assessment Packet Tracer(PT)The two primary files required for boot are the IOS image file and the boot configuration, which are copied into memory to maximize performance. If a router configuration register is set to 0x2102, the router attempts to load the IOS image from flash memory and the startup configuration file from NVRAM.
Using the default settings, what is the next step in the switch boot sequence after the IOS is loaded from flash?
- Run the POST routine.
- Look for a backup IOS in the ROM.
- Load the bootstrap program from ROM.
- Load the running-config file from RAM.
- Locate and load the startup-config file from NVRAM.
Associate the router prompt with the configuration task.
A network administrator issues the Switch(config)# Interface FastEthernet 0/1 command on a Cisco switch. What term is used to describe the "0/1" part in the command?
- Hotkey
- keyword
- Streit
- command
Answers Explanation & Notes:
In this command structure, the interface part is the command, the FastEthernet part is a keyword, and the 0/1 part is an argument.
What command can an administrator run to specify which interface a router should use to reach remote networks?
- show arp
- show interfaces
- Show IP route
- show logs
Answers Explanation & Notes:
The show ip route command displays the router's IP routing table. The IP routing table shows a list of known local and remote networks and the interfaces that the router uses to reach those networks.
See exhibition. What three facts can be determined from the visible output of the show ip interface brief command? (Choose three.)

- Two physical interfaces have been configured.
- The switch can be managed remotely.
- A device is attached to a physical interface.
- Passwords have been configured on the switch.
- Two devices are connected to the switch.
- The default SVI has been configured.
Answers Explanation & Notes:
Vlan1 is the default SVI. Because an SVI has been configured, the switch can be configured and managed remotely. FastEthernet0/0 keeps showing up, so a device is connected.
Match the commands to the correct actions. (Not all options are used.)
What three commands are used to set up secure access to a router over a console port connection? (Choose three.)
- Interface fastethernet 0/0
- vty lines 0 4
- line console 0
- Activate secret cisco
- Registration
- Password Cisco
Answers Explanation & Notes:
The three commands required to password protect the console port are as follows:
line console 0
Password Cisco
Registration
The interface fastethernet 0/0 command is commonly used to access the configuration mode, which is used to apply certain parameters such as the IP address to the Fa0/0 port. The line vty 0 4 command is used to access configuration mode for telnet. Parameters 0 and 4 specify ports 0 through 4, or a maximum of five simultaneous Telnet connections. The enable secret command is used to apply a password that is used on the router to access privileged mode.
A network administrator connects to a switch using SSH. Which property uniquely describes the SSH connection?
- Out-of-band access to a switch using a virtual terminal with password authentication
- Remote access to the switch through a dial-up phone connection
- On-premises access to a switch using a directly attached PC and console cable
- Remote access to a switch where data is encrypted during the session
- direct access to the switch through the use of a terminal emulation program
Answers Explanation & Notes:
SSH provides secure remote login over a virtual interface. SSH offers stronger password authentication than Telnet. SSH also encrypts the data during the session.
What kind of access is secured on a Cisco router or switch with the enable secret command?
- virtual terminal
- privileged EXEC
- AUX-Anschluss
- console line
Answers Explanation & Notes:
The enable secret command secures access to the privileged EXEC mode of a Cisco router or switch.
When configuring SSH on a router to implement secure network management, a network engineer issued the login local and transport input ssh line vty commands. What three additional configuration actions must be performed to complete the SSH configuration? (Choose three.)
- Set user permission levels.
- Generate the RSA asymmetric keys.
- Configure the correct IP domain name.
- Configure role-based CLI access.
- Create a valid local username and password database.
- Manually enable SSH after the RSA keys are generated.
Answers Explanation & Notes:
SSH is automatically enabled after the RSA keys are generated. Setting user permission levels and configuring role-based CLI access are good security practices, but not a requirement for implementing SSH.
Using a systematic troubleshooting approach, a helpdesk engineer suspects a problem at Layer 3 of the OSI model. What two questions are associated with layer 3 when gathering information? (Choose two.)
- Is the PC configured for DHCP?
- Does a browser connection to www.cisco.com work?
- Is the network cable plugged in?
- Can the default gateway be reached from the PC using the ping command?
- Is there a connection indicator on the network card?
Answers Explanation & Notes:
The IP address configuration and the ping command are associated with Layer 3 protocols. Visiting a web server is assigned to the application layer. An Ethernet cable connection and NIC map to Layer 1 functions.
During a move, employees' workstations were disconnected from the network and reconnected in new offices. However, after the move, some workstations cannot obtain a valid IP address. What should be checked first to identify the cause of the problem?
- Check the operational status of the DHCP server.
- Test that these workstations can ping the default gateway.
- Make sure the cables are functional and plugged in properly.
- Install all software updates.
Answers Explanation & Notes:
Because the workstations have just been moved from one location to another, the internal operating system and applications have not changed. The first thing to check is the Ethernet cable, including the type of cable you are using and whether the cables are properly plugged in at both the workstation and the wall jack.
A customer calls the hotline to report a computer problem. The helpline technician responds and works with the customer for some time. However, the technician cannot identify the root cause of the problem. What should the technician do to help the customer?
- Notify the customer that a replacement computer will be shipped immediately.
- Suggest customer visit support site for more information.
- Notify the customer that a ticket has been created and another technician will contact the user soon.
- Ask for the customer's email address to send all support documents for the computer.
Answers Explanation & Notes:
If the first line technician cannot identify the cause of the problem, the technician should create a ticket and initiate the escalation process. Since the cause of the problem has not been identified, the technician should not authorize the replacement process. The customer should not be sent for further troubleshooting.
A host needs to reach another host on a remote network, but the ARP cache has no mapping entries. To which destination address does the host send an ARP request?
- the broadcast IP address of the subnet
- die Unicast-MAC-Adresse des Remote-Hosts
- die Unicast-IP-Adresse des Remote-Hosts
- the broadcast MAC address
An intruder will try a variety of ways in rapid succession to guess a password. This blocks other users on the network. What type of attack occurred?
- brute force
- Syn Flood
- Ping of the Todes
- DDoS