Passed CompTIA https://www.pass4itsure.com/cn0-201.html yesterday on first attempt only using the Flydumps premium vce and one corrected answers.Thanks a lot for your valuable update reagding premium dump.It will definitely help me for preparing for the exam before to write.
Exam A QUESTION 1
H.323 is a group of protocols defined by the International Telecommunication Union for multimedia conferences over Local Area Networks. H.323 uses ASN.1 binary code.
Which of the following layers of the OSI model is responsible for translating, processing, and reading ASN.1 and ASCII messages?
A. Transport layer
B. Application layer
C. Physical layer
D. Presentation layer
Correct Answer: D QUESTION 2
Which of the following devices is used to make decisions based on MAC addresses and is considered the most appropriate device to use when limiting broadcast domains for devices that will process voice data?
A. Layer 3 switch
C. Layer 2 switch
Correct Answer: C QUESTION 3
Which of the following are endpoints in Cisco Unified Communications? Each correct answer represents a complete solution. Choose two.
D. IP phones
Correct Answer: CD QUESTION 4
Which of the following is a mechanism used by the Multimedia Extensions (WME) standard to avoid contentions in a particular traffic category?
A. Sliding Window Protocol
B. Contention Window (CW)
C. Auto-Rate Fallback
D. Maximum Segment Size (MSS)
Correct Answer: B QUESTION 5
Adam works as a Sales Engineer for Umbrella Inc. One of his customers complains that the PBX is getting reset several times in a day. Adam finds that the power LEDs of PBX are fluttering. He suspects that faulty power supply is the cause of this problem.
Which of the following troubleshooting tools should Adam use to verify these suspicions?
A. Continuity tester
B. Line tester
C. Volt meter
D. T-BERD 4000
Correct Answer: C QUESTION 6
You work as a network consultant for Net World International. You are designing a network for a client company. The proposed network will use a class B address for its network. The network will be divided into thirty-two subnets.
Which of the following subnet masks will you use to design the network?
Correct Answer: A QUESTION 7
Which of the following ITU standards specifies PCM voice coding at 64 kbps?
Correct Answer: D QUESTION 8
Which of the following statements are true about session hijacking? Each correct answer represents a complete solution. Choose all that apply.
A. Use of a long random number or string as the session key reduces session hijacking.
B. It is used to slow the working of victim’s network resources.
C. TCP session hijacking is when a hacker takes over a TCP session between two machines.
D. It is the exploitation of a valid computer session to gain unauthorized access to information or services in a computer system.
Correct Answer: ACD QUESTION 9
Rick, an administrator of a TCP/IP network, wants to achieve the following goals:
l Reduce congestion of network traffic.
l Optimize the utilization of the IP address space.
Which of the following technologies may help him to accomplish the task?
Correct Answer: D QUESTION 10
Voice over IP is an application that requires efficient use of bandwidth and reliability. VoIP must not suffer the delays that can be seen at times with Web sites and Web applications. Which technology can be used to help ensure the efficient transport of VoIP traffic?
Correct Answer: B QUESTION 11
Which of the following are examples of interactive communication? Each correct answer represents a complete solution. Choose all that apply.
A. Video Conferencing
D. Phone call
Correct Answer: AD QUESTION 12
Which of the following devices is used to create VLANs in a small network?
Correct Answer: B QUESTION 13
Which of the following protocols provides sequence numbers to VoIP packets?
Correct Answer: B QUESTION 14
You have just set up a wireless network for customers at a coffee shop. Which of the following are good security measures to implement?
Each correct answer represents a complete solution. Choose two.
A. Not broadcasting SSID
B. MAC filtering the router
C. Using WEP encryption
D. Using WPA encryption
Correct Answer: CD QUESTION 15
Which of the following protocols is used by VoIP applications for communication initiation in the network?
Correct Answer: C QUESTION 16
Which of the following standards designates international numbering plans for devices connected to the PSTN?
Correct Answer: A QUESTION 17
You work as a Network Administrator for McNeil Inc. The company has a TCP/IP-based network.
Performance of the network is slow because of heavy traffic. A hub is used as a central connecting device
in the network.
Which of the following devices can be used in place of a hub to control the network traffic efficiently?
Correct Answer: C QUESTION 18
Andrew is working for a television station in North America and South America.
What video standard is more possibly be used with the video stored in the archives of these stations?
D. IEEE 1394
Correct Answer: C QUESTION 19
Which of the following layers of the OSI model manages communication between communication entities in a network?
Correct Answer: D QUESTION 20
When a phone is lifted off-hook, it connects the two wires causing an electrical signal to flow from the phone exchange to the phone. What is this electrical signal called?
A. Off-hook signal
B. Ground start signal
C. Loop start signal
D. On-hook signal
Correct Answer: C QUESTION 21
Trace analysis tools, management tools, and NBAR are used while implementing QoS policies. Which of the following tasks is performed by these tools during implementation of QoS policies?
A. Defining policies
B. Network audit
C. Network security configuration
D. Division of traffic into classes
Correct Answer: B QUESTION 22
Andrew has received a call from a user on a land line indicating that she cannot place calls with her VoIP softphone, but she can check her e-mail.
What is the first step that Andrew should take to resolve this problem?
A. Execute ping command on her PC.
B. Log the problem.
C. Execute the ipconfig command on her PC.
D. Instruct her to ping the call manager.
Correct Answer: B QUESTION 23
Which of the following layers of the OSI model is responsible for converting between ASCII and EBCDIC?
A. Network Layer
B. Presentation Layer
C. Transport Layer
D. Application Layer
Correct Answer: B QUESTION 24
Which of the following types of attack can guess a hashed password?
A. Evasion attack
B. Denial of Service attack
C. Teardrop attack
D. Brute force attack
Correct Answer: D QUESTION 25
In McNeil Inc. the voicemail system is configured to send email alerts when new voicemails are left for users. Users are complaining that they are only receiving voicemails, but not email alerts.
Which of the following is the most likely cause of this issue?
A. Port 25 is not functioning on the email server.
B. Port 53 is not functioning on the email server.
C. Port 21 is not functioning on the voicemail server.
D. Port 23 is not functioning on the voicemail server.
Correct Answer: A
Flydumps.com CompTIA https://www.pass4itsure.com/cn0-201.html practice tests hold the key importance and provide a considerable gain for your knowledge base. You can rely on our products with unwavering confidence; Get the profound knowledge and become a pro with Flydumps.com assistance.