Anda di halaman 1dari 15

Take Assessment - DsmbISP Final Exam - CCNA Discovery: Working at

a Small-to-Medium Business or ISP (Version 4.1)

1 A user calls a help desk about being unable to connect to a web server. The technician asks the us
to issue a ping 127.0.0.1 command. What is the purpose of this command?
verify if the network cable is connected to the PC
verify if the TCP/IP stack is functioning on the PC
verify if the IP address is configured correctly on the PC
verify if the DNS server IP addresses are present on the PC

Refer to the exhibit. Which two IP addresses could be assigned to the hosts in the diagram? (Choo
two.)
192.168.65.31
192.168.65.32
192.168.65.35
192.168.65.60
192.168.65.63
192.168.65.64

3 What is a characteristic of UDP?


It is a reliable transport protocol.
It requires the source host to resend packets that are not acknowledged.
It adds a minimal amount of overhead to the data to be transmitted.
It is a connection-oriented protocol.
4 A hacker attempts to reach confidential information that is stored on a server inside the corporate
network. A network security solution inspects the entire packet, determines that it is a threat, and
blocks the packet from entering the inside network. Which security measure protected the network?
an IDS
an IPS
a host-based firewall
Anti-X software

Refer to the exhibit. A network administrator is troubleshooting the serial connection between R1 an
R2. There is no communication between R1 and R2. Based on the output of the show ip interface
briefcommand, what is the cause of the problem?
There is a misconfiguration of IP addresses.
There is a mismatch of encapsulation methods.
The no shutdown command has not been issued on R2.
The routing protocols are not compatible.

6 What is the primary function of a Level 1 support technician in an ISP help desk department with
multiple levels of customer support?
to install hardware replacements for the customer
to accompany an on-site technician to provide additional technical support
to diagnose and document the symptoms of hardware, software, and system problems
to design network enhancements that support the new technology requirements of the custome

7 In a structured cable system, which term describes the cable that connects the wall jack in the user
work area to the patch panel in the wiring closet?
patch cable
vertical cable
horizontal cable
backbone cable

8 A client complains to an ISP that the hosted web server seems slow and frequently cannot be reach
The technician suspects the special high performance server NIC might be the source of the problem
After checking with vendor support, it is verified that the NIC is causing framing errors and the firmw
needs to be upgraded. With which layer of the OSI model is this problem associated?
Layer 1
Layer 2
Layer 4
Layer 7

9 When a field technician visits a customer site and resolves the issue that was opened in a trouble
ticket, what should the technician do?
assess the network design of the customer site
survey users at the customer site for further needs
document the solution and obtain acceptance of the customer
discuss further problems that are identified during the visit and offer cost estimates

10 Different hosts connect to the same switch port at different times. If the switch port is configured wi
dynamic port security, how does it process the MAC addresses?
The addresses are manually assigned with the use of the switchport command.
The addresses are dynamically learned and stored in the address table.
The addresses are dynamically configured and saved in the running configuration.
The addresses are stored in the address table and added to the running configuration.

11
Refer to the exhibit. A PC has an IP address of 192.168.87.30 but is unable to contact a web serve
on the Internet. A network administrator is troubleshooting the DHCP configuration on a Cisco 1841
router. What is the possible error?
The IP address of the PC is outside the network range.
A domain name is required in the DHCP configuration.
The DHCP service has not been activated.
The default-router command needs to be included in the DHCP configuration.
The DHCP pool has not been applied to an active interface.

12 Which statement correctly describes the difference between HTTP and HTTPS?
The maximum number of simultaneous connections that a server can support for HTTPS is mo
than for HTTP.
HTTPS and HTTP use different client request-server response processes.
HTTPS authenticates and encrypts the data being transferred between the client and the web
server.
HTTPS specifies the rules for passing data between the physical layer and the data link layer.

13

Refer to the exhibit. While configuring the serial interface of a router, the network administrator see
the highlighted error message. What is the reason for this?
The serial interface is administratively down.
The serial interface is already configured with an IP address.
The network administrator has attempted to configure the serial interface with a broadcast
address.
The same IP address has been configured on another interface.

14 Which routing protocol depends on the DUAL algorithm to calculate the shortest path to a destinati
OSPF
EIGRP
RIP
BGP

15 Which service team in an ISP is responsible for determining if the new customer has hardware that
support the new WAN connection and if new WAN circuits need to be installed?
customer service
onsite installation
planning and provisioning
network operations center

16 Which WAN service provides point-to-point connections with a predefined communications path?
E1
T1
dialup
leased line

17 Which statement best describes the operation of a Layer 2 switch?


functions at the network layer of the OSI model
forwards traffic from one local IP network to another
directs traffic from one port to another based on the destination MAC address
dynamically creates a forwarding table that maps IP addresses to MAC addresses

18 Which application can be delivered using UDP?


FTP
DNS
HTTP
SMTP

19 Which device will set the clock rate for a serial link of a customer router that is connected to an ISP
over a leased T1 line?
DTE
CMTS
DSLAM
CSU/DSU

20
Refer to the exhibit. R1 and R2 are configured with the commands that are displayed. All interfaces
are properly configured, but neither router is receiving routing updates. What two things can be don
to solve the problem? (Choose two.)
Configure the routing protocol on R1 for network 10.0.0.0.
Configure the routing protocol on R2 for network 10.0.0.0.
Configure the routing protocol on R1 for network 192.168.4.0.
Configure the routing protocol on R1 for network 192.168.2.0.
Configure the routing protocol on R2 for network 192.168.1.0.
Configure the routing protocol on R2 for network 192.168.3.0.

21

Refer to the exhibit. A network administrator is unable to ping H1 from the router and is checking th
cabling along the network. Which segment is incorrectly cabled?
Segment A
Segment B
Segment C
Segment D

22

Refer to the exhibit. The network administrator needs to configure the Fa0/0 interface of RTB so th
hosts from RTA can connect to the server that is attached to RTB. Which two commands will the
administrator use to accomplish this task? (Choose two.)
RTB# ip address 192.168.102.98 255.255.255.248
RTB(config-if)# ip address 192.168.102.99 255.255.255.252
RTB(config)# ip address 192.168.102.97 255.255.255.252
RTB(config)# no shutdown
RTB(config-if)# no shutdown
RTB(config-if)# ip address 192.168.102.97 255.255.255.252

23 Which two services are required to enable a computer to receive dynamic IP addresses and acces
the Internet using domain names? (Choose two.)
DNS
WINS
HTTP
DHCP
SMTP

24 How do port filtering and access lists help provide network security?
They prevent specified types of traffic from reaching specified network destinations.
They alert network administrators to various type of denial of service attacks as they occur.
They prevent viruses, worms, and Trojans from infecting host computers and servers.
They enable encryption and authentication of confidential data communications.

25 A network administrator is configuring a DTE serial interface on a 1841 router. The serial interface
installed in the first controller, second slot, first port, with an IP address from the 192.168.1.8 /30
network. Which set of commands correctly configures this interface?
Router(config)# interface serial 0/0/0
Router(config-if)# ip address 192.168.1.10 255.255.255.252
Router(config-if)# clock rate 64000
Router(config-if)# no shutdown
Router(config)# interface serial 0/1/1
Router(config-if)# ip address 192.168.1.10 255.255.255.252
Router(config-if)# clock rate 64000
Router(config-if)# no shutdown
Router(config)# interface serial 0/1/0
Router(config-if)# ip address 192.168.1.10 255.255.255.252
Router(config-if)# no shutdown
Router(config)# interface serial 1/2/1
Router(config-if)# ip address 192.168.1.10 255.255.255.252
Router(config-if)# no shutdown

26

Refer to the exhibit. The network administrator uses the command below to configure a default rou
on RTB:

RTB(config)# ip route 0.0.0.0 0.0.0.0 fa0/0

A ping issued from PC3 is successful to RTB. However, echo request packets arrive at PC1 but the
echo replies do not make it back to PC3. What will fix this problem?
RTA must be configured to forward packets to the 192.168.2.0 network.
The ip route command needs to be edited so that the next hop address is 10.1.1.5.
The ip route command needs to be edited so that the 192.168.2.1 address is the next hop
address.
The ip route command should be removed from the RTB router configuration.
Another default route should be configured on RTA with a next hop address of 10.1.1.6.

27 Which routing protocol facilitates the exchange of routing information between different autonomou
systems?
OSPF
EIGRP
RIP
BGP

28 A network administrator has designed a Class B network with a 255.255.254.0 mask. Which two
statements are true for this network? (Choose two.)
There are 128 subnets.
There are 256 subnets.
There are 512 subnets.
There are 126 usable hosts per subnet.
There are 254 usable hosts per subnet.
There are 510 usable hosts per subnet.

29 A building has experienced a power outage. When the power returns, none of the devices on one f
can access the Internet. The network administrator checks the switch in the IDF that these devices
connected to and notes that the SYST LED on the front of the switch is amber.

What is a possible cause of this problem?


The switch is functioning properly.
The switch has failed POST.
The switch configuration file was not saved to NVRAM.
The connection between the switch and the server did not autonegotiate speed and duplex
properly.

30 Which statement correctly describes an SLA?


It lists the terms of the agreement between the user and the manufacturer of the system.
It outlines the management, monitoring, and maintenance of a network.
It specifies the software and hardware configurations of a system.
It describes the operation of a system.

31 An administrator wishes to protect a router by encrypting the console access password noaccess.
Which command should be used?
Router(config)# enable secret noaccess
Router(config)# enable password noaccess
Router(config-line)# password noaccess
Router(config)# service password-encryption

32

Refer to the exhibit. Which type of cables would be required to connect the network devices?
A crossover
B straight-through
C crossover
A straight-through
B crossover
C straight-through
A straight-through
B crossover
C crossover
A straight-through
B straight-through
C straight- through
A crossover
B crossover
C straight-through

33 Which statement is true about FTP implementations?


The protocol interpreter (PI) function engages once the data transfer process (DTP) function is
complete.
The DTP function is responsible for the login sequence.
FTP requires two connections, one for control and one for data.
Both the PI and the DTP close automatically when the transfer is complete.
34 Which type of cable may be used for backbone cabling between data centers that are located on
different floors and that are separated by a distance of 1640 feet (500 meters)?
STP
UTP
coaxial
fiber-optic

35 A company functions from Monday to Friday each week. Their backup strategy calls for full backup
each Friday night, with incremental backups on all other weekday nights. If an administrator is aske
to restore a server hard drive to its Wednesday morning state, how many backups must be used?
1
2
3
4

36 The command copy tftp running-config has been entered on the router. What will this command
copy the configuration in RAM to a server
copy the configuration file from a server to RAM
copy the configuration file in NVRAM to RAM
copy the configuration file in NVRAM to a server
copy the configuration file from a server to NVRAM

37 What are two purposes of DNS? (Choose two.)


to dynamically assign IP addressing information to network hosts
to simplify the administration of host and default gateway addressing on client computers
to assign TCP port numbers to hosts as part of the data transfer process
to resolve human-readable domain names to numeric IP addresses
to replace the static HOSTS file with a more practical dynamic system

38 A user reports being able to access the Internet but not being able to download e-mail from the ma
server at the ISP. What should the user check on the user workstation?
the POP3 and SMTP server settings in the e-mail application
the patch cable connections at the back of the workstation and at the wall plate
the DHCP settings in the operating system
the IP address, mask, and default gateway values
the NIC drivers

39 Which technology is used for WAN connections and delivers up to 1.544 Mb/s of symmetrical
bandwidth?
DSL
dialup
T1 line
T3 line

40 Why is the OSI model useful in network design and assessment?


It combines specific networking tasks into a complex format.
It defines the four lower layers, which standardize applications supported within the model.
It is used during troubleshooting to focus on the entire networking process instead of a single
layer.
It divides networking communications into multiple processes that are smaller and more
manageable.

41

Refer to the exhibit. A ping 192.168.1.20 command is issued on workstation A to determine if


workstation B can be reached. What two events will occur if this command is successful? (Choose
two.)
The router will reply to the echo request with a proxy ping response.
Workstation A will send a UDP ping request message to workstation B.
The router will send a TCP acknowledgment message to workstation A.
Workstation B will send a UDP ping reply message to the router.
Workstation A will send an ICMP echo request message to workstation B.
Workstation B will send an ICMP echo reply message to workstation A.

42 What is the purpose of the routing process?


to encapsulate data that is used to communicate across a network
to select the paths that are used to direct traffic to destination networks
to convert a URL name into an IP address
to provide secure Internet file transfer
to forward traffic on the basis of MAC addresses

43 The IT department of a company implements a backup plan which includes a daily backup on Mond
through Saturday. Only files that were modified during each day are backed up. Which backup met
is being used?
full backup
normal backup
differential backup
incremental backup

44 While configuring PAT on a Cisco ISR, a network technician defines the IP address of the router
interface that connects to the ISP. This address will be the translated address for all Internet traffic
from inside hosts. What is this IP address called?
inside local address
inside global address
outside local address
outside global address

45 A user is unable to connect to the Internet. The network administrator decides to use the top-down
troubleshooting approach. Which action should the administrator perform first?
Run the tracert command to identify the faulty device.
Check the patch cable connection from the PC to the wall.
Enter an IP address in the address bar of the web browser to determine if DNS has failed.
Run the ipconfig command to verify the IP address, subnet mask, and gateway on the PC.

46 Which statement correctly describes the function of AAA?


It prevents unauthorized access to a network.
It filters traffic based on destination IP and port number.
It enables users to send information to a daemon that is running on a management station.
It encrypts data to provide network security.

47 For the assignment of permissions to files and folders, what does the "principle of least privilege"
imply?
No user has more privileges than any other user.
Permissions to files are given based on seniority.
Users only have access to resources that are necessary for their jobs.
Users should be given no access to computer resources until they ask.

48 When customers use credit cards to make purchases at a small business, a modem is heard dialin
telephone number to transfer the transaction data to the central office. What type of WAN serial
connection is in use?
leased line
packet switched
circuit switched
point-to-point

49

Refer to the exhibit. What fact can be determined from the exhibited output?
PPP is enabled on this router.
The bandwidth setting of the interfaces is consistent with a T1 connection.
The serial0/0/0 interface is administratively down.
The default encapsulation is set for the serial0/0/0 interface.
Subnet mask 255.255.255.255 has been configured for the serial0/0/0 interface.

50 What is the effect of issuing the banner login #Unauthorized login prohibited# command on a
router?
It will display the message "Unauthorized login prohibited" before the router prompts for a user
name.
It replaces the banner motd command.
It causes the router to prompt for login credentials for any user who is attempting to connect to
router.
It causes the message "Unauthorized access prohibited" to display when a HyperTerminal
connection is idle.
51 A new Cisco IOS is installed on a router in the default location. After booting, the router enters
ROMMON mode. What is the reason for this?
The configuration is missing in NVRAM.
The configuration register value is set to 0x2102.
There is inadequate memory to load the Cisco IOS.
The boot system command has not been run.

52

Refer to the exhibit. Devices need to connect to the file server from remote networks. What method
should be used to provide the file server with an IP address to allow these connections?
static NAT
static PAT
dynamic NAT
dynamic PAT

Anda mungkin juga menyukai