Many web pages prevent you from saving QuickTime movies to your hard drive. Here are some hints to get you started. Many web pages now exist for viewing QuickTime movies. You enjoy viewing and watching the movies; however, you cannot find out how to download them directly to your hard drive. Based on the skill level of the web designer, it is possible to prevent users from directly downloading the movies’ files. Fortunately, however, most web designers do not go to such trouble. With a few simple hints, you have a good chance of directly downloading it. Methods: 1.Right-click and Save Target As If there is a direct link on the web page to the movie file, then it is very easy to download. – Right click on the direct link to the movie file (*.mov). – Select Save Target As. – Name it and save it. 2.Find the link hidden in the source Most web designers do not give a direct link; however, you can still find the link in the source code. – Navigate to the page on which the movie is playing. – Click View menu. – Click Source. – Notepad is open; click Edit menu. – Select Find. – In the text box type the following: .mov andmake sure you include the period. – Typically the end of the url will be highlighted. The URL will like this, for example: embed src= "http://www.blahblahblah.org/movies/hah_faptastic1.mov" border="0" bgcolor="#212121" controller="true" target="myself" pluginspage="http://www.apple.com/quicktime/download/" loop="FALSE" autoplay="true" height="262" width="320"> – Highlight and copy the URL part of the following: http://www.blahblahblah.org/1/graphics/movies/hah_faptastic1.mov – Paste this URL into your browser address bar, and click GO. – When the film has completely loaded, click the File menu in your browser. – Select Save As. – Name and save your movie file. Unfortunately, these two common methods will not work for all web applications. Many companies that developed highly complex methods for hiding the source quicktime files to prevent easy downloading.
Refer to the exhibit. A network technician enters the static route in R1 needed to reach network 10.1.1.0/24. A ping from R1 to Host B fails. The technician begins testing the network and has the following results:
Refer to the exhibit. A network technician enters the static route in R1 needed to reach network 10.1.1.0/24. A ping from R1 to Host B fails. The technician begins testing the network and has the following results: 1. pings from R1 to the S0/0/0 interface on R2….successful 2. pings from R1 to the Fa0/0 interface on R2….successful 3. pings from Host B to hosts on the 10.1.1.0/24 network….successful 4. pings from Host B to the Fa0/0 interface on R2….successful 5. pings from R2 to Host B….successful
Read more »
Refer to the exhibit. What subnet mask will be applied by router B when it receives a RIPv1 update for the network 172.16.1.0?
none 8 16 24
Refer to the exhibit. A network administrator needs to create two subnetworks from 10.0.0.0/8 for a router running RIPv2. The Admin subnet requires 120 hosts and the Sales subnet requires 58 hosts. The network administrator assigned 10.0.1.128/25 to the Admin subnet. The Sales subnet is given 10.0.1.192/26. What will be the result of this addressing scheme?
Refer to the exhibit. A network administrator needs to create two subnetworks from 10.0.0.0/8 for a router running RIPv2. The Admin subnet requires 120 hosts and the Sales subnet requires 58 hosts. The network administrator assigned 10.0.1.128/25 to the Admin subnet. The Sales subnet is given 10.0.1.192/26. What will be the result of this addressing scheme?
Because RIPv2 does not support VLSM, the subnet masks will not be allowed. The subnets will not have enough host addresses for the given network requirements. The subnets overlap and will be rejected by the router. The router will support the addressing scheme.
An additional subnet is required for a new Ethernet link between Router1 and Router2 as shown in the diagram. Which of the following subnet addresses can be configured in this network to provide a maximum of 14 useable addresses for this link while wasting the fewest addresses?
An additional subnet is required for a new Ethernet link between Router1 and Router2 as shown in the diagram. Which of the following subnet addresses can be configured in this network to provide a maximum of 14 useable addresses for this link while wasting the fewest addresses?
Refer to the exhibit. The number of required host addresses for each subnet in a network is listed in the exhibit. This number includes the host address requirements for all router ports and hosts on that subnet. After all device and router port address assignments are determined, what will be the total number of unused host addresses available?
Refer to the exhibit. The number of required host addresses for each subnet in a network is listed in the exhibit. This number includes the host address requirements for all router ports and hosts on that subnet. After all device and router port address assignments are determined, what will be the total number of unused host addresses available?
6 14 29 34 40 62
Refer to the exhibit. What subnet mask will be applied if Router A sends a RIPv1 update for the network 172.16.1.0 to Router B?
Refer to the exhibit. What subnet mask will be applied if Router A sends a RIPv1 update for the network 172.16.1.0 to Router B?
Read more »
Refer to the exhibit. In the network that is shown, the router interfaces are assigned the first address in each subnet. Which IP address would be usable for a host on one of the LANs in this network?
Refer to the exhibit. In the network that is shown, the router interfaces are assigned the first address in each subnet. Which IP address would be usable for a host on one of the LANs in this network?
Read more »
A Class C address has been assigned for use in the network shown in the graphic. Using VLSM, which bit mask should be used to provide for the number of host addresses required on Router A, while wasting the fewest addresses?
A Class C address has been assigned for use in the network shown in the graphic. Using VLSM, which bit mask should be used to provide for the number of host addresses required on Router A, while wasting the fewest addresses?
/31 /30 /29 /28 /27 /26
Refer to the exhibit. A network engineer is summarizing the two groups of routes on router R1 shown in the exhibit. Which summarization will work for all the subnets?
Refer to the exhibit. A network technician enters the static route in R1 needed to reach network 10.1.1.0/24. A ping from the S0/0/0 interface on R1 to host B fails. The technician begins testing the network and has the following results:
1. pings from R1 to the S0/0/0 interface on R2….successful 2. pings from R1 to the Fa0/0 interface on R2….successful 3. pings from host B to hosts on the 10.1.1.0/24 network….successful 4. pings from host B to the Fa0/0 interface on R2….successful 5. pings from R2 to host B….successful.
What is the likely cause of the failure of the ping from R1 to host B?
The default gateway on host B is not correctly set. There are no routes back to networks connected to R1 from R2. There is a Layer 2 problem between R2 and host B. Host B has a defective Ethernet card.
A network administrator is tasked with dividing up a class C network among the QA, Sales, and Administration departments. The QA department is made up of 10 people, the Sales is made up of 28 people, and the Administration has 6. Which two subnets masks adequately address the QA and Sales departments? (Choose two.)
255.255.255.252 for QA 255.255.255.224 for Sales 255.255.255.240 for QA 255.255.255.248 for QA 255.255.255.0 for Sales
Which of the following problems does VLSM help to alleviate?
the shortage of IP addresses the difficulty of assigning static IP addresses to hosts in large enterprises the complexity of implementing advanced routing protocols such as OSPF and EIGRP the shortage of network administrators qualified in the use of RIP v1 and IGRP
Read more »
Which three interior routing protocols support VLSM? (Choose three.)
What does VLSM allow a network administrator to do?
utilize one subnet mask throughout an autonomous system utilize multiple subnet masks in the same IP address space utilize IGRP as the routing protocol in an entire autonomous system utilize multiple routing protocols within an autonomous system
Read more »
Refer to the exhibit. The network administrator wants to create a subnet for the point-to-point connection between the two routers. Which subnetwork mask would provide enough addresses for the point-to-point link with the least number of wasted addresses?
Refer to the exhibit. The network administrator wants to create a subnet for the point-to-point connection between the two routers. Which subnetwork mask would provide enough addresses for the point-to-point link with the least number of wasted addresses?
Read more »
In the network shown in the graphic, three bits were borrowed from the host portion of a Class C address. How many valid host addresses will be unused on the three point-to-point links combined if VLSM is not used?
In the network shown in the graphic, three bits were borrowed from the host portion of a Class C address. How many valid host addresses will be unused on the three point-to-point links combined if VLSM is not used?
Read more »
Refer to the exhibit. Which address is a broadcast address for one of the subnets that are shown in the exhibit?
Refer to the exhibit. Which address is a broadcast address for one of the subnets that are shown in the exhibit?
Which portion of the network layer address does a router use to forward packets?
host portion
broadcast address
network portion
gateway address
What information is added during encapsulation at OSI Layer 3?
source and destination MAC
source and destination application protocol
source and destination port number
source and destination IP address
What statement describes the purpose of a default route?
A host uses a default route to transfer data to another host on the same network segment.
A host uses a default route to forward data to the local switch as the next hop to all destinations.
A host uses a default route to identify the Layer 2 address of an end device on the local network.
A host uses a default route to transfer data to a host outside the local network when no other route to the destination exists.
In a connectionless system, which of the following is correct?
The destination is contacted before a packet is sent.
The destination is not contacted before a packet is sent.
The destination sends an acknowledgement to the source that indicates the packet was received.
The destination sends an acknowledgement to the source that requests the next packet to be sent.
Refer to the exhibit. Using the network in the exhibit, what would be the default gateway address for host A in the 192.133.219.0 network?
192.135.250.1
192.31.7.1
192.133.219.0
192.133.219.1
If the default gateway is configured incorrectly on the host, what is the impact on communications?
The host is unable to communicate on the local network.
The host can communicate with other hosts on the local network, but is unable to communicate with hosts on remote networks.
The host can communicate with other hosts on remote networks, but is unable to communicate with hosts on the local network.
There is no impact on communications.
What is the purpose of a default gateway?
physically connects a computer to a network
provides a permanent address to a computer
identifies the network to which a computer is connected
identifies the logical address of a networked computer and uniquely identifies it to the rest of the network
identifies the device that allows local network computers to communicate with devices on other networks
What type of routing uses information that is manually entered into the routing table?
dynamic
interior
static
standard
When the destination network is not listed in the routing table of a Cisco router, what are two possible actions that the router might take? (Choose two.)
The router sends an ARP request to determine the required next hop address.
The router discards the packet.
The router forwards the packet toward the next hop indicated in the ARP table.
The router forwards the packet to the interface indicated by the source address.
The router forwards the packet out the interface indicated by the default route entry.
In an IPv4 environment, what information is used by the router to forward data packets from one interface of a router to another?
destination network address
source network address
source MAC address
well known port destination address
What are the key factors to consider when grouping hosts into a common network? (Choose three.)
gateways
purpose
physical addressing
software version
geographic location
ownership
Which intermediary devices could be used to implement security between networks? (Choose two.)
router
hub
switch
firewall
access point
bridge
What are three common problems with a large network? (Choose three.)
too few broadcasts
performance degradation
security issues
limited management responsibility
host identification
protocol compatibility
Refer to the exhibit. All devices shown in the exhibit have factory default settings. How many broadcast domains are represented in the topology that is shown?
3
4
5
7
8
11
Refer to the exhibit. The network in the exhibit is fully operational. What two statements correctly describe the routing for the topology that is shown? (Choose two.)
192.168.0.2 is the next-hop address that is used by R3 to route a packet from the 10.0.0.0 network to the 172.16.0.0 network.
10.0.0.1 is the next-hop address that is used by R1 to route a packet from the 192.168.12.0 network to the 10.0.0.0 network.
192.168.0.1 is the next-hop address that is used by R1 to route a packet from the 192.168.12.0 network to the 172.16.0.0 network.
172.16.0.1 is the next-hop address that is used by R3 to route a packet from the 10.0.0.0 to the 172.16.0.0 network.
192.168.0.1 is the next-hop address that is used by R2 to route a packet from the 172.16.0.0 network to the 192.168.12.0 network.
192.168.0.2 is the next-hop address that is used by R2 to route a packet from the 172.16.0.0 network to the 192.168.12.0 network.
Which three statements are true about routes and their use? (Choose three.)
If no route to the destination network is found, the packet is returned to the previous router.
If the destination network is directly connected, the router forwards the packet to the destination host.
If multiple network entries exist for the destination network, the most general route is used to forward the packet.
If no route exists for the destination network and a default route is present, the packet is forwarded to the next-hop router.
If the originating host has a default gateway configured, the packet for a remote network can be forwarded using that route.
If a host does not have a route manually configured for the destination network, the host will drop the packet.
Refer to the exhibit. A network administrator is troubleshooting a connectivity problem and needs to determine the address that is used to forward network packets out the network. Using the netstat -r command, the administrator would identify which address as the address to which all hosts send packets that are destined for an outside network?
10.10.10.26
127.0.0.1
10.10.10.6
10.10.10.1
224.0.0.0
Refer to the exhibit. A network administrator notices that there are too many broadcasts on the network. What two steps can the network administrator take to resolve this problem? (Choose two.)
Replace S2 with a router.
Place all servers on S1.
Disable TCP/IP broadcasts.
Subnet the 192.168.0.0 /24 network.
Disable all unused interfaces on the switches.
Which IP packet field will prevent endless loops?
type-of-service
identification
flags
time-to-live
header checksum
What two characteristics are commonly associated with dynamic routing protocols? (Choose two.)
require no device configuration
provide routers with up-to-date routing tables
require less processing power than static routes require
consume bandwidth to exchange route information
prevent manual configuration and maintenance of the routing table
Talk about your hot phone. A truck containing 22,500 LG G2 smartphones was stolen on the way to its destination in Louisville, Ky., CNET has learned. The phones were on their way to Sprint, which is expected to launch its version of the G2 early next month.
The phones were stolen at 6:30 p.m. Thursday at a truck stop in Gary, Ind., an LG representative confirmed to CNET. The driver left the truck for a bathroom break, and upon returning, found the vehicle missing. The Indiana and Illinois state police have been contacted, as well as the FBI. The G2 is LG's flagship device, and has stood out in the market with its unique volume and power button located at the back of the smartphone, right under the camera. It's a controversial change that has met with mixed reviews. The G2, like other flagship phones such as the Galaxy S4, iPhone 5S, and HTC One, was released on multiple carriers, with Sprint among the later carriers to sell the device.
DHomesb Chapter 1 Exam Answers 1. Which computer component is considered the nerve center of the computer system and is responsible for processing all of the data within the machine? RAM * CPU video card sound card operating system
2. What are two advantages of purchasing a preassembled computer? (Choose two.. * usually a lower cost exact components may be specified extended waiting period for assembly * adequate for performing most general applications suited for customers with special needs
3. A user plans to run multiple applications simultaneously on a computer. Which computer component is essential to accomplish this? * RAM NIC video card sound card storage device
4. Which adapter card enables a computer system to exchange information with other systems on a local network? modem card controller card video card sound card * network interface card
5. What is the main storage drive used by servers, desktops, and laptops? tape drive * hard drive optical drive (DVD) floppy disk drive
6. Which component is designed to remove high-voltage spikes and surges from a power line so that they do not damage a computer system? CPU * surge suppressor motherboard hard drive
7. What are two examples of output peripheral devices? (Choose two.) * printer * speakers flash drive external DVD external modem
8. What two functions does a UPS provide that a surge protector does not ? (Choose two.) protects the computer from voltage surges * provides backup power from an internal battery protects the computer from sudden voltage spikes gives the user time to phone the electrical company * gives the user time to safely shut down the computer if the power fails provides backup power through a generator provided by the wall outlet
9. What is a word processor? It is a physical computer component. * It is a program designed to perform a specific function. It is a program that controls the computer resources. It is a functional part of an operating system.
10. What is the purpose of the ASCII code? translates bits into bytes interprets graphics digitally translates digital computer language into binary language * represents letters, characters, and numbers with bits
11. Why do servers often contain duplicate or redundant parts? Servers require more power and thus require more components. * Servers should be accessible at all times. Servers can be designed as standalone towers or rack mounted. Servers are required by networking standards to have duplicate parts.
12. What are two benefits of hooking up a laptop to a docking station? (Choose two.) Mobility is increased. * An external monitor can be used. * Alternate connectivity options may be available. The keyboard can be changed to a QWERTY-style keyboard. More wireless security options are available.
13. Applications can be grouped into general use software or industry specific software. What are two examples of industry specific software? (Choose two.) * CAD presentation spreadsheet word processing * medical practice management contacts/scheduling management
14. Which three terms describe different types of computers? (Choose three.) operating system network * laptop * desktop Windows * mainframe
15. How is a server different from a workstation computer? The server works as a standalone computer. * The server provides services to clients. The workstation has fewer applications installed. The workstation has more users who attach to it.
16. How many values are possible using a single binary digit? 1 * 2 4 8 9 16
17. What measurement is commonly associated with computer processing speed? bits pixels * hertz bytes
18. What can be used to prevent electrostatic discharge (ESD)? dry and non humid conditions carpeted floor * grounding strap uncluttered work space
19. If a peripheral device is not functioning, what are three things you should do to solve the problem? (Choose three.) * Use the testing functionality on the peripheral itself, if available. * Verify that all cables are connected properly. Disconnect all cables connected to the computer except those connected to the peripheral. * Ensure that the peripheral is powered on. Disconnect the peripheral and verify that the computer is operating normally. Reload the computer operating system.
20. Which two steps should be performed when installing a peripheral device? (Choose two.) * Download and install the most current driver. Connect the peripheral using any cable and any available port on the computer. * Connect the peripheral using an appropriate cable or wireless connection. Test the peripheral on another machine before installing it on the one where it will be used. Check the computer documentation to see if the peripheral vendor is compatible with the PC vendor.
21. In newer operating systems, how are system resources assigned by default when components are installed? manually assigned by the operating system manually assigned by the administrator statically assigned by the component to a preset resource * dynamically assigned between the component and the operating system
Passing one or more exams is the requirement for achieving certification and, in most cases, for recertification. The following list identifies all currently available exams by certification and track. In some cases, different tracks may require the same exam. Exams required for more than one track are listed within each track. All exams are available worldwide in English. Availability of exams in other languages varies. Please contact an authorized Cisco testing delivery partner for availability in your area.