Kunci Jawaban Discovery 1

Embed Size (px)

Text of Kunci Jawaban Discovery 1

English FormL-3a DHomesb v4.0 Final - Domain Knowledge - Weighted Score What is the name for the contract between a customer and an ISP that specifies requirements for uptime and service response time? DSL IAB NAP SLA

Observable 1 correctness of response

Description 2 points for Option 4 0 points for any other option

Max Value 2

How does a crossover cable make it possible for two "like devices" (for example, two switches) to communicate? The transmit pins are disconnected and only the receive pins are used. The transmit pins on one device are connected to the transmit pins on the other device. The receive pins on one device are connected to the receive pins on the other device. The transmit pins on one device are connected to the receive pins on the other device.

Observable 1 correctness of response

Description 2 points for Option 4 0 points for any other option

Max Value 2

What does the term "attenuation" mean in data communication? loss of signal strength as distance increases time for a signal to reach its destination leakage of signals from one cable pair to another strengthening of a signal by a networking device

Observable 1 correctness of response

Description 2 points for Option 1 0 points for any other option

Max Value 2

Which wireless protocol is used for encryption? EAP

Open PSK WEP

Observable 1 correctness of response

Description 2 points for Option 4 0 points for any other option

Max Value 2

What is a service pack? an access policy an agreement between a company and a vendor a piece of code created to fix one specific problem a collection of patches and updates released by a vendor a small piece of software designed specifically for security issues

Observable 1 correctness of response

Description 2 points for Option 4 0 points for any other option

Max Value 2

For the second time in a week, workstations on a LAN are not able to log into the server. The technician fixed the problem the first time, cannot remember the steps taken to solve it. What aspect of the troubleshooting process has the technician neglected? identifying the problem asking end-users questions documenting the troubleshooting process using structured techniques to solve a problem

Observable 1 correctness of response

Description 2 points for Option 3 0 points for any other option

Max Value 2

What two commands can be used to form a new binding if client information does not agree with the DHCP client table? (Choose two.) ipconfig /release ipconfig /all ipconfig /flushdns ipconfig /renew ipconfig

Observable

Description

Max Value 2

Option 1 and Option 4 are correct. 1 correctness of response 1 point for each correct option. 0 points if more options are selected than required.

Which installation option should be chosen when the current operating system is too damaged to work properly? upgrade multi-boot clean install virtualization

Observable 1 correctness of response

Description 2 points for Option 3 0 points for any other option

Max Value 2

Refer to the graphic. Assume that the command output is from a wireless DHCP client that is connected to a Linksys integrated router What can be deduced from the output? The wireless connection is good. The WEP key or SSID needs to be checked. The DHCP configuration on the router needs to be checked. The wireless NIC driver or the NIC itself needs to be reinstalled.

Observable 1 correctness of response

Description 2 points for Option 1 0 points for any other option

Max Value 2

Which type of computer has an integrated mouse? desktop laptop mainframe server pocket PC

Observable 1 correctness of response

Description 2 points for Option 2 0 points for any other option

Max Value 2

Which two causes of networking problems are related to the physical layer? (Choose two.) damaged cables and connectors incorrect addressing incorrect subnet mask overheated components incorrect default gateway

Observable

Description

Max Value 2

Option 1 and Option 4 are correct. 1 correctness of response 1 point for each correct option. 0 points if more options are selected than required.

Refer to the exhibit. The security policy of an organization allows employees to connect to the office intranet from their homes. Which t of security policy is this? acceptable use

incident handling network maintenance remote access

Observable 1 correctness of response

Description 2 points for Option 4 0 points for any other option

Max Value 2

Which two components are configured via software in order for a PC to participate in a network environment? (Choose two.) MAC address IP address kernel shell subnet mask

Observable

Description

Max Value 2

Option 2 and Option 5 are correct. 1 correctness of response 1 point for each correct option. 0 points if more options are selected than required.

Refer to the exhibit. Assume that the exhibited output is from a host that is connected to a Linksys integrated router. What is the firs thing that should be checked while using a bottom-up troubleshooting approach? the default gateway on the host the IP address on the host the IP address on the router

the link status LED on the front of the router the subnet mask on the host

Observable 1 correctness of response

Description 2 points for Option 4 0 points for any other option

Max Value 2

What statement describes the filtering of traffic via the use of Stateful Packet Inspection? It recognizes and filters predefined URLs It permits access that is based on the application. It permits access based on IP or MAC addresses. It permits incoming packets that are legitimate responses to requests from internal hosts. It translates an internal address or group of addresses into a public address that is sent across the network.

Observable 1 correctness of response

Description 2 points for Option 4 0 points for any other option

Max Value 2

Refer to the exhibit. An educational institution needs to connect PC systems that use private IP addressing to the Internet. They hav multiple systems that need to access the Internet, but were only able to purchase one public IP address. What should be activated o the Linksys integrated router to achieve this goal? authentication DHCP

encryption firewall NAT WEP

Observable 1 correctness of response

Description 2 points for Option 5 0 points for any other option

Max Value 2

Refer to the exhibit. Which statement is true based on the information that is shown in the exhibit? All wireless devices that are connected to this AP must have an assigned SSID of College. Any wireless client that is attached to this AP must have the same IP address and SSID. The AP is not physically wired to the local LAN. This configuration is found only in an ad hoc wireless network.

Observable 1 correctness of response

Description 2 points for Option 1 0 points for any other option

Max Value 2

When terminating a UTP cable, why is it important to push the wires all the way into the end of the connector? to allow the cable to endure more stretching or twisting to ensure good electrical contact to ensure that the wires are in correct order to minimize crosstalk

Observable 1 correctness of response

Description 2 points for Option 2 0 points for any other option

Max Value 2

Which network design layer provides a connection point for end user devices to the network? access core distribution network

Observable 1 correctness of response

Description 2 points for Option 1 0 points for any other option

Max Value 2

Which portion of the packet does a router use to forward the packet to the destination? source IP address user data destination IP address control information destination MAC address

Observable 1 correctness of response

Description 2 points for Option 3 0 points for any other option

Max Value 2

As an assignment, a computer science student needs to present data in binary format. What are the two possible values that the student use? (Choose two.) 0 1 2 A F

Observable

Description

Max Value 2

Option 1 and Option 2 are correct. 1 correctness of response 1 point for each correct option. 0 points if more options are selected than required.

Which three addresses belong to the category of private IP addresses? (Choose three.) 10.0.0.1 128.0.0.1 150.0.0.1 172.16.0.1 192.168.31.19 172.168.31.1

Observable

Description

Max Value 3

Option 1, Option 4, and Option 5 are correct. 1 correctness of response 1 point for each correct option. 0 points if more options are selected than required.

Which two transport layer protocols are used to transfer messages between hosts? (Choose two.) DHCP FTP SMTP TCP UDP

Observable

Description

Max Value 2

Option 4 and Option 5 are correct. 1 correctness of response 1 point for each correct option. 0 points if more options are selected than required.

What is the default subnet mask for the IP address 128.107.23.10? 255.0.0.0 255.255.0.0 255.255.255.0 255.255.255.255

Observable 1 correctness of response

Description 2 points for Option 2 0 points for any other option

Max Value 2

What wireless technology has the ability to communicate with many devices at the same time, makes use of the 2.4 GHz band, and is limited to low-speed, short-range communications? RF ISM infrared Bluetooth

Observable 1 correctness