CCNA Exploration 1: Network Fundamentals – Chapter 6 Exam


01.
Refer to the exhibit. Which network prefix will implement the IP addressing scheme for the LANs shown in the graphic?
  • /24
  • /16
  • /20
  • /27
  • /25
  • /28
02. Which IPv4 subnetted addresses represent valid host addresses? (Choose three.)
  • 172.16.4.127 /26
  • 172.16.4.155 /26
  • 172.16.4.193 /26
  • 172.16.4.95 /27
  • 172.16.4.159 /27
  • 172.16.4.207 /27

android gingerbread 2.3.5 for samsung galaxy ace s5830 [XWKS2]


How to Install S5830XWKS2 Android 2.3.5 Gingerbread Firmware Update on Samsung Galaxy Ace

 

update your samsung galaxy ace s5830 via Odin Multi Downloader.


This firmware version is names as XWKS2 with build date September. Also this is the first Android 2.3.5 Gingerbread update for galaxy ace and slowly being pushed worldwide, although this update is an European update thus any galaxy ace owner can install it through Odin.

Improvements: 

  1. Flashing of touch buttons,
  2. overscroll glow effect,
  3. much faster than all previous release

Firmware info:

Mode               : Samsung Galaxy S5830
Build number : S5830XWKS2
CSC                 : S5830XENKS1
Version           : Android 2.3.5 Gingerbread
Build date       : September 17, 2011

Unroot Samsung Galaxy Ace with Android 2.3.4 or 2.3.3


Rooting your Android phone leads to void the warranty and with this tutorial let’s see how to unroot a rooted Samsung Galaxy Ace. This works on devices running Gingerbread 2.3.3 or 2.3.4. this work on device running Gingerbread 2.3.3 and 2.3.4 ONLY.
Do this at your own risk. The author holds no responsibility if your device got bricked or damaged during the process.

  • Copy the Update.zip file to the root of your SD card
  • Switch off the phone and boot into recovery mode by pressing the middle key, volume down and power button together
  • Select update from SD card by pressing volume up/down key and choose Update.zip file
  • Wait for the conformation screen and reboot in normal mode.

Rooting Android 2.3.3 or 2.3.4 [Gingerbread]

how to root Samsung Galaxy Ace s5830











Tested on Samsung Galaxy Ace [Android version 2.3.3 and 2.3.4]
Do it at your own risk. I'm are not responsible if your device got damaged or bricked during the process.

  • Download upd_1.zip and copy it to the root of your SD card.
  • Boot device into recovery mode. [First turn off the phone and turn it on again by pressing Volume down button, Home button and Power button simultaneously. You’ll see the downloading icon.]
  • Update from sdcard and then select the file upd_.1zip using volume up/down key.
  • Once the file is flashed, it will reboot the device automatically

Android 2.3.4 Gingerbread Official update For Samsung Galaxy Ace using Odin Multidownloader


Android 2.3.4 Gingerbread Official update For Samsung Galaxy Ace [Installing Guide]

 What’s New:
-More support for moving apps to SD card
-Copy Paste feature
-Battery life increased
-Better performance than all previous versions
-Better wi-fi and internet

 

Note: 

1.This update will not root your phone and also it doesn’t require rooted Samsung galaxy acethus we have our warranty covered
2.To apply this update on rooted phones you need to clear cache and wipe data which can done by booting your phone in recovery mode and then select wipe cache and wipe data (To boot in recovery press middle + power on key in switch off mode)

CCNA Exploration 1: Network Fundamentals – Chapter 8 Exam

01. Which OSI layer is responsible for binary transmission, cable specification, and physical aspects of network communication?
  • Presentation
  • Transport
  • Data Link
  • Physical
02. An installed fiber run can be checked for faults, integrity, and the performance of the media by using what device?
  • light injector
  • OTDR
  • TDR
  • multimeter
03. Which characteristics describe fiber optic cable? (Choose two.)
  • It is not affected by EMI or RFI.
  • Each pair of cables is wrapped in metallic foil.
  • It combines the technique of cancellation, shielding and twisting to protect data.
  • It has a maximum speed of 100 Mbps.
  • It is the most expensive type of LAN cabling.
04. When is a straight-through cable used in a network?
  • when connecting a router through the console port
  • when connecting one switch to another switch
  • when connecting a host to a switch
  • when connecting a router to another router
05. Refer to the exhibit. Which type of Category 5 cable is used to make an Ethernet connection between Host A and Host B?
  • coax cable
  • rollover cable
  • crossover cable
  • straight-through cable
06. Which method of signal transmission uses radio waves to carry signals?
  • electrical
  • optical
  • wireless
  • acoustic
07. In most business LANs, which connector is used with twisted-pair networking cable?
  • BNC
  • RJ-11
  • RJ-45
  • Type F
08. Which of the following is a characteristic of single-mode fiber-optic cable?
  • generally uses LEDs as the light source
  • relatively larger core with multiple light paths
  • less expensive than multimode
  • generally uses lasers as the light source
09. Which type of cable run is most often associated with fiber-optic cable?
  • backbone cable
  • horizontal cable
  • patch cable
  • work area cable
10. What are three measures of data transfer? (Choose three.)
  • goodput
  • frequency
  • amplitude
  • throughput
  • crosstalk
  • bandwidth
11. With the use of unshielded twisted-pair copper wire in a network, what causes crosstalk within the cable pairs?
  • the magnetic field around the adjacent pairs of wire
  • the use of braided wire to shield the adjacent wire pairs
  • the reflection of the electrical wave back from the far end of the cable
  • the collision caused by two nodes trying to use the media simultaneously
12. What is a primary role of the Physical layer in transmitting data on the network?
  • create the signals that represent the bits in each frame on to the media
  • provide physical addressing to the devices
  • determine the path packets take through the network
  • control data access to the media
13. In LAN installations where potential electrical hazards or electromagnetic interference may be present, what type of media is recommended for backbone cabling?
  • coax
  • fiber
  • Cat5e UTP
  • Cat6 UTP
  • STP
14. What is a possible effect of improperly applying a connector to a network cable?
  • Data will be forwarded to the wrong node.
  • Data transmitted through that cable may experience signal loss.
  • An improper signaling method will be implemented for data transmitted on that cable.
  • The encoding method for data sent on that cable will change to compensate for the improper connection.
15. Which fiber connector supports full duplex Ethernet?
* (Third one is the correct one)
16. What is considered a benefit of wireless as a media choice?
  • more host mobility
  • lower security risks
  • reduced susceptibility to interference
  • less impact of the surroundings on the effective coverage area
17. What characteristic of UTP cable helps reduce the effects of interference?
  • the metal braiding in the shielding
  • the reflective cladding around core
  • the twisting of the wires in the cable
  • the insulating material in the outer jacket

CCNA Exploration 1: Network Fundamentals – Chapter 7 Exam

CCNA Exploration 1: Network Fundamentals – Chapter 7 Exam


01. Which three factors should be considered when implementing a Layer 2 protocol in a network? (Choose three.)
  • the Layer 3 protocol selected
  • the geographic scope of the network
  • the PDU defined by the transport layer
  • the physical layer implementation
  • the number of hosts to be interconnected
02.
Refer to the exhibit. Assuming that the network in the exhibit is converged meaning the routing tables and ARP tables are complete, which MAC address will Host A place in the destination address field of Ethernet frames destined for www.server?
  • 00-1c-41-ab-c0-00
  • 00-0c-85-cf-65-c0
  • 00-0c-85-cf-65-c1
  • 00-12-3f-32-05-af
03. Which options are properties of contention-based media access for a shared media? (Choose three.)
  • non-deterministic
  • less overhead
  • one station transmits at a time
  • collisions exist
  • devices must wait their turn
  • token passing
04. What is true concerning physical and logical topologies?
  • The logical topology is always the same as the physical topology.
  • Physical topologies are concerned with how a network transfers frames.
  • Physical signal paths are defined by Data Link layer protocols.
  • Logical topologies consist of virtual connections between nodes.
05. What determines the method of media access control? (Choose two.)
  • network layer addressing
  • media sharing
  • application processes
  • logical topology
  • intermediary device function
06. What is true regarding media access control? (Choose three.)
  • Ethernet utilizes CSMA/CD
  • defined as placement of data frames on the media
  • contention-based access is also known as deterministic
  • 802.11 utilizes CSMA/CD
  • Data Link layer protocols define the rules for access to different media
  • controlled access contains data collisions
07. Which statements describe the logical token-passing topology? (Choose two.)
  • Network usage is on a first come, first serve basis.
  • Computers are allowed to transmit data only when they possess a token.
  • Data from a host is received by all other hosts.
  • Electronic tokens are passed sequentially to each other.
  • Token passing networks have problems with high collision rates.
08. A network administrator has been asked to provide a graphic representation of exactly where the company network wiring and equipment are located in the building. What is this type of drawing?
  • logical topology
  • physical topology
  • cable path
  • wiring grid
  • access topology
09. What is the purpose of the preamble in an Ethernet frame?
  • is used as a padding for data
  • is used for timing synchronization
  • is used to identify the source address
  • is used to identify the destination address
10. What statements are true regarding addresses found at each layer of the OSI model? (Choose two.)
  • Layer 2 may identify devices by a physical address burned into the network card
  • Layer 2 identifies the applications that are communicating
  • Layer 3 represents a hierarchical addressing scheme
  • Layer 4 directs communication to the proper destination network
  • Layer 4 addresses are used by intermediary devices to forward data
11.
Refer to the exhibit. Which statement describes the media access control methods that are used by the networks in the exhibit?
  • All three networks use CSMA/CA
  • None of the networks require media access control.
  • Network 1 uses CSMA/CD and Network 3 uses CSMA/CA.
  • Network 1 uses CSMA/CA and Network 2 uses CSMA/CD.
  • Network 2 uses CSMA/CA and Network 3 uses CSMA/CD.
12.
Refer to the exhibit. How many CRC calculations will take place as traffic routes from the PC to the laptop?
  • 1
  • 2
  • 4
  • 6
  • 8
  • 16
13.
Refer to the exhibit. A frame is being sent from the PC to the laptop. Which source MAC and IP addresses will be included in the frame as it leaves RouterB? (Choose two.)
  • source MAC – PC
  • source MAC – S0/0 on RouterA
  • source MAC – Fa0/1 on RouterB
  • source IP – PC
  • source IP – S0/0 on RouterA
  • source IP – Fa0/1 of RouterB
14. Which sublayer of the data link layer prepares a signal to be transmitted at the physical layer?
  • LLC
  • MAC
  • HDLC
  • NIC
15. What two facts are true when a device is moved from one network or subnet to another? (Choose two.)
  • The Layer 2 address must be reassigned.
  • The default gateway address should not be changed.
  • The device will still operate at the same Layer 2 address.
  • Applications and services will need additional port numbers assigned.
  • The Layer 3 address must be reassigned to allow communications to the new network.
16. What is a function of the data link layer?
  • provides the formatting of data
  • provides end-to-end delivery of data between hosts
  • provides delivery of data between two applications
  • provides for the exchange data over a common local media
17. What is a characteristic of a logical point-to-point topology?
  • The nodes are physically connected.
  • The physical arrangement of the nodes is restricted.
  • The media access control protocol can be very simple.
  • The data link layer protocol used over the link requires a large frame header.
18. What is a primary purpose of encapsulating packets into frames?
  • provide routes across the internetwork
  • format the data for presentation to the user
  • facilitate the entry and exit of data on media
  • identify the services to which transported data is associated
19. What is the primary purpose of the trailer in a data link layer frame?
  • define the logical topology
  • provide media access control
  • support frame error detection
  • carry routing information for the frame
20. What are three characteristics of valid Ethernet Layer 2 addresses? (Choose three.)
  • They are 48 binary bits in length.
  • They are considered physical addresses.
  • They are generally represented in hexadecimal format.
  • They consist of four eight-bit octets of binary numbers.
  • They are used to determine the data path through the network.
  • They must be changed when an Ethernet device is added or moved within the network.