Anda di halaman 1dari 6

CCNA 1 Discovery 4.

0 Final Exam 2011


Assessment System Skip to Time Left | Skip to Navigation | Skip to Assessment Items Take Assessment DHomesb Final Exam CCNA Discovery: Networking for Home and Small Businesses (Version 4.0) Time Remaining: Showing 1 of 4 Next> Page: GO <Prev 1 Refer to the exhibit. A user on host A sends an e-mail to the user on host B. Which type of message does host A send? broadcast multicast simulcast unicast 2Which wireless protocol is used for encryption? EAP Open PSK WEP 3 Refer to the exhibit. PC1 is unable to access the web server at 209.165.200.226/27. Based on the provided output, what is the most likely cause of the problem? PC1 is not plugged in to RTR1. Port 80 is already in use on PC1. No DNS server is configured on PC1. PC1 is configured with an incorrect IP address and default gateway. 4Which device is often configured to act as both a DHCP client and a DHCP server? home PC ISP modem wireless-enabled laptop integrated services router 5TCP/IP data transmission between the source and destination host is de-encapsulated in four steps: A. The TCP header is removed.B. Bits are decoded and the destination MAC address is recognized.C. The IP header is removed and the contents are passed to the next layer.D. The Ethernet header and trailer are removed. What is the correct sequence of these steps? A, B, C, D A, C, B, D B, C, D, A B, D, C, A C, A, B, D 6As an assignment, a computer science student needs to present data in binary format. What are the two possible values that the student can use? (Choose two.) 0 1 2 A F 7How does a crossover cable connect two routers? It connects the pins that are used for receiving on one router to the pins that are used for receiving on the other router. It connects the pins that are used for transmitting on one router to the pins that are used for receiving on the other router. It disconnects the transmit pins and uses only the receive pins. It uses the same pins for transmitting and receiving. 8Under what circumstance would it be appropriate to use private IP addresses? for communication between two ISPs for a network that is directly connected to the Internet for addresses that are used exclusively within an organization. for a host with more than one direct connection to the Internet 9Which two components are configured via software in order for a PC to participate in a network environment? (Choose two.) MAC address IP address kernel shell subnet mask 10A technician is trying to troubleshoot a connectivity problem between a host computer and the directly connected FastEthernet0/0 port of a router. The technician believes it is a Layer 1 problem and notices that the cable that is used to connect the two devices is terminated at one end with the 568A standard and with the 568B standard at the other end. What should the technician do? Replace the cable with a rollover cable. Replace the cable with one that is terminated with 568B at both ends. Replace the cable

with one that is terminated with 568A at both ends. Replace the cable with another one with the same termination configuration. 11Which adapter card would be required for a PC to exchange information with other PCs on a LAN? NIC video card sound card internal modem 12 Refer to the exhibit. Which option correctly represents the encapsulation of a packet that is sent by Host1 to the web server? 13 Refer to the exhibit. What is the effect of setting the security mode to WEP on the Linksys integrated router? The WEP security mode enables the AP to inform clients of its presence. The WEP security mode encrypts network traffic during transmission between the AP and the wireless client. The WEP security mode generates a dynamic key each time a client establishes a connection with the AP. The WEP security mode identifies the WLAN. 14 Refer to the exhibit. An educational institution needs to connect PC systems that use private IP addressing to the Internet. They have multiple systems that need to access the Internet, but were only able to purchase one public IP address. What should be activated on the Linksys integrated router to achieve this goal? authentication DHCP encryption firewall NAT WEP 15What two commands can be used to form a new binding if client information does not agree with the DHCP client table? (Choose two.) ipconfig /release ipconfig /all ipconfig /flushdns ipconfig /renew ipconfig Showing 1 of 4 Next> Page: GO <Prev All contents copyright 1992-2011 Cisco Systems, Inc. Privacy Statement and Trademarks Assessment System Skip to Time Left | Skip to Navigation | Skip to Assessment Items Take Assessment DHomesb Final Exam CCNA Discovery: Networking for Home and Small Businesses (Version 4.0) Time Remaining: Showing 2 of 4 Next> Page: GO <Prev 16What measurement is commonly used to describe communication speed when transferring data? bps cps Hz MB 17Which type of network attack occurs when an unauthorized person tries to persuade a user to share a network user ID and password? brute force denial of service data manipulation social engineering 18Which Windows PC command line utility can be used to discover the path that a packet takes to reach a destination? ping netstat tracert nslookup ipconfig 19What describes the external IP address that is obtained by a router through a cable or DSL modem? a public address that is obtained from ICANN a private address that is manually configured by the administrator a public address that is obtained through DHCP from the ISP a private address that converts to a public address on the internal LAN

20Which statement accurately describes what network devices do in the distribution layer of the three layer design model? They interconnect individual hosts. They interconnect multiple companies. They interconnect local network segments. They interconnect the company network to the ISP. 21What is a function of the application layer of the OSI model? to support the applications and processes that use the network to route application data packets between logical networks to control application access to the physical network media to provide application data with end-to-end reliable delivery 22What is specified by the host bits in an IP address? broadcast identity of the network identity of the computer on the network network that is being addressed network to which the host belongs 23Which two causes of networking problems are related to the physical layer? (Choose two.) disconnected cables improper operation of cooling fans incorrect MAC address incorrect default gateway incorrect subnet mask 24Which two automatic addressing assignments are supported by DHCP? (Choose two.) local server address subnet mask default gateway address physical address of the recipient physical address of the sender 25Which wireless technology allows only one-to-one connections and is typically used for short-range, line-of-sight communication? GSM Wi-Fi Infrared Bluetooth 26 Refer to the exhibit. A wireless client is unable to connect to a Linksys WRT300N access point that is using network 192.168.1.0/24 for its LAN and WLAN clients. What could cause the problem? The IP address is incorrect. The subnet mask is incorrect. The default gateway is incorrect. All addresses are correct, so the SSID must be incorrect. 27Which network design layer provides hosts with initial connectivity to the network? access core distribution network 28What component of a personal computer is responsible for the processing of all data? RAM CPU firewall system bus operating system 29 Refer to the exhibit. Which pair of addresses would be appropriate to use for PC1 and PC2 to establish a workgroup using private addresses? 127.0.0.1 and 127.0.0.2 172.16.4.2 and 172.16.4.3 172.16.5.1 and 192.168.3.2 198.133.219.25 and 198.133.219.26 30Which term is associated with logical addressing? IP addresses port addresses physical addresses Media Access Control addresses Showing 2 of 4 Next> Page: GO <Prev All contents copyright 1992-2011 Cisco Systems, Inc. Privacy Statement and Trademarks Assessment System Skip to Time Left | Skip to Navigation | Skip to Assessment Items Take Assessment DHomesb Final Exam CCNA Discovery: Networking for Home and Small Businesses (Version 4.0) Time Remaining:

Showing 3 of 4 Next> Page: GO <Prev 31What advantage does a peer-to-peer network have over a client-server network? It increases security. It increases scalability. It produces a higher performance for hosts. It eliminates the need for centralized administration. 32What is an ISP? It is a standards body that develops cabling and wiring standards for networking. It is a protocol that establishes how computers within a local network communicate. It is an organization that enables individuals and businesses to connect to the Internet. It is a networking device that combines the functionality of several different networking devices in one. 33A system administrator routinely monitors failed login attempts on a server. If the administrator sees an extremely high number of failed attempts by a single user who is trying multiple password combinations, what type of attack is in progress? brute force phishing SYN flood virus vishing 34What are two advantages of purchasing a custom-built computer? (Choose two.) usually a lower cost no waiting period for assembly user can specify higher performance components supports higher-end graphics and gaming applications fewer components to replace 35Which wireless component allows wireless clients to gain access to a wired network? PDA STA access point wireless bridge 36 Refer to the graphic. Based on the information that is shown, what statement is true? This configuration would be commonly found in an ad hoc wireless network. Any wireless client that is attached to this access point would have the same IP address and SSID. All wireless devices that are connected to this access point must have an assigned SSID of Academy. In addition to accepting wireless client requests, this access point must connect to the wired network. 37Which picture shows a USB port on a PC? 38Which value represents the host portion of IP address 128.107.10.11 with a subnet mask of 255.255.0.0? .10 .10.11 128.107 .107.10.11 128.107.10 39When are leased lines typically used? when low bandwidth is required for home and small business connectivity when a dedicated digital data line is necessary as a less expensive option to cable and DSL modem service 40What does it mean when a problem is being escalated by a helpdesk? The helpdesk is following up on a resolved problem. The helpdesk has made the problem a lower priority. The helpdesk has solved the problem and is closing the ticket. The helpdesk is moving the problem to a higher level support staff. 41 Refer to the exhibit. A PC requests an IP address from the server. Which two protocols are used at the TCP/IP application layer and the internetwork layer? (Choose two.) DHCP FTP IP TCP UDP 42Which installation option should be chosen when the current operating system is too damaged to work properly? upgrade multi-boot clean install virtualization

43Which portion of the packet does a router use to forward the packet to the destination? source IP address user data destination IP address control information destination MAC address 44After attaching four PCs to the switch ports, configuring the SSID and setting authentication properties for a small office network, a technician successfully tests the connectivity of all PCs that are connected to the switch and WLAN. A firewall is then configured on the device prior to connecting it to the Internet. What type of network device includes all of the described features? switch ISR router firewall appliance standalone wireless access point 45Which type of computer has an integrated mouse? desktop laptop mainframe server pocket PC Showing 3 of 4 Next> Page: GO <Prev All contents copyright 1992-2011 Cisco Systems, Inc. Privacy Statement and Trademarks Assessment System Skip to Time Left | Skip to Navigation | Skip to Assessment Items Take Assessment DHomesb Final Exam CCNA Discovery: Networking for Home and Small Businesses (Version 4.0) Time Remaining: Showing 4 of 4 Next> Page: GO <Prev 46What is the purpose of spam filter software? It detects and removes spyware. It detects and removes viruses. It prevents the display of advertisement windows. It examines incoming e-mail messages to identify the unsolicited ones. 47What statement describes the filtering of traffic via the use of Stateful Packet Inspection? It recognizes and filters predefined URLs It permits access that is based on the application. It permits access based on IP or MAC addresses. It permits incoming packets that are legitimate responses to requests from internal hosts. It translates an internal address or group of addresses into a public address that is sent across the network. 48Which three statements describe an IP address? (Choose three.) An IP address is known as a logical address. An IP address uses a 30-bit addressing scheme. An IP address is found in the Layer 2 header during transmission. The network portion of an IP address is burned into a network interface card. An IP address is unique within the same local network. The network portion of an IP address will be the same for all hosts that are connected to the same local network. 49What is the function of the DNS server? It assigns IP addresses to clients. It accepts HTTP requests from clients. It maps a hostname to a corresponding IP address. It manages the domain that clients are assigned to. 50What is the function of a physical topology map? records IP addressing of each host records hostnames and applications organizes groups of hosts by how they use the network shows where wiring is installed and the locations of network devices 51A user in a small office is unable to connect to the Internet. The user examines the physical connections to the ISR, a Linksys WRT300N, and notices a solid green LED on the port that is wired to the computer. What does the LED indicate about the current state of the port? The ISR is making adjustments to the port. The device is plugged in and traffic is flowing. The computer is plugged in but no traffic is flowing. The ISR does not detect that the computer is plugged in. 52

Refer to the exhibit. The security policy of an organization requires users to change their password every week. Which type of security policy is this? acceptable use network maintenance password remote access

Anda mungkin juga menyukai