new microsoft word document

15
Tak e 1 In an attempt to verify connectivity, a user issues the ping command to a device that is not on t local network. The ping is unsuccessful. What can be determined from this result? The default gateway is misconfigured. The patch cable on the host station is faulty. The router between the host and destination is faulty. Further troubleshooting will be required to reach a definite conclusion. 2 Select the connection that would require a straight-through cable. a switch to a hub a router to a switch a switch to a switch a router to a router 3 What is a major characteristic of asymmetric Internet service? Download speeds and upload speeds are equal. Download speeds are faster than upload speeds. Data traffic speeds are faster than voice traffic speeds. Used when consistently uploading large amounts of graphics, video and multimedia traffic. 4 Which three statements are true about local and network applications? (Choose three.) A local application is loaded in a local computer and can be accessed by a remote computer on the network. A network application is loaded in a local computer and accessed from a remote computer. A local application is loaded in a local computer and accessed only by the local computer. A network application is loaded in a local computer and accessed only by the local computer. An example of a local application is e-mail. An example of a network application is instant messaging. 5 Refer to the graphic. What feature can be installed on the Linksys integrated router to convert

Upload: ermalk

Post on 14-Sep-2014

115 views

Category:

Documents


5 download

TRANSCRIPT

Page 1: New Microsoft Word Document

Take

1 In an attempt to verify connectivity, a user issues the ping command to a device that is not on the local network. The ping is unsuccessful. What can be determined from this result?

The default gateway is misconfigured.

The patch cable on the host station is faulty.

The router between the host and destination is faulty.

Further troubleshooting will be required to reach a definite conclusion.

2 Select the connection that would require a straight-through cable.

a switch to a hub

a router to a switch

a switch to a switch

a router to a router

3 What is a major characteristic of asymmetric Internet service?

Download speeds and upload speeds are equal.

Download speeds are faster than upload speeds.

Data traffic speeds are faster than voice traffic speeds.

Used when consistently uploading large amounts of graphics, video and multimedia traffic.

4 Which three statements are true about local and network applications? (Choose three.)

A local application is loaded in a local computer and can be accessed by a remote computer on the network.

A network application is loaded in a local computer and accessed from a remote computer.

A local application is loaded in a local computer and accessed only by the local computer.

A network application is loaded in a local computer and accessed only by the local computer.

An example of a local application is e-mail.

An example of a network application is instant messaging.

5

Refer to the graphic. What feature can be installed on the Linksys integrated router to convert private IP addresses to Internet-routable addresses?

authentication

Page 2: New Microsoft Word Document

DHCP

encryption

firewall

NAT

WEP

6 Which of the following are the address ranges of the private IP addresses? (Choose three.)

10.0.0.0 to 10.255.255.255

200.100.50.0 to 200.100.25.255

150.150.0.0 to 150.150.255.255

172.16.0.0 to 172.31.255.255

192.168.0.0 to 192.168.255.255

127.16.0.0 to 127.31.255.255

7 When terminating a UTP cable, why is it important to push the wires all the way into the end of the connector?

to allow the cable to endure more stretching or twisting

to ensure good electrical contact

to ensure that the wires are in correct order

to minimize crosstalk

8 What is the purpose of creating a DMZ during network firewall implementation?

to create a server security zone accessible only to internal clients

to create a dirty zone that allows all inbound and outbound traffic

to allow for a publicly accessible zone without compromising the internal network

to specify a higher security level than normally required for the internal production network

9

Page 3: New Microsoft Word Document

Refer to the exhibit. What default gateway address will be assigned to PC1 if access to remote resources is needed?

192.31.7.3

192.168.1.101

192.168.1.253

A default gateway is not necessary.

10 The help desk at a large packaging company receives a call from a user who is concerned about lost data files on the local PC. The help desk technician learns that the user clicked on an icon that appeared to be a program update, but no updates were scheduled for that program. What type of attack has likely occurred?

worm

DDoS

brute force

Trojan horse

11

Refer to the exhibit. Why would a network administrator use the network mode that is shown?

to support hosts on different IP networks

to support hosts that use different 802.11 standards

to support both wireless and wired Ethernet hosts

to support hosts with different operating systems

to support hosts with network cards from different manufacturers

12

Page 4: New Microsoft Word Document

Refer to the exhibit. A user on Host1 requests a web page from the web server. Which diagram is accurate for the encapsulation of the traffic that is sent from the user to the web server?

13

Page 5: New Microsoft Word Document

Refer to the exhibit. What is a possible reason that the PC is unable to ping the default gateway IP address?

The PC is on a different network than the default gateway.

A straight-through cable should be used to connect the switches.

A straight-through cable should be used to connect the PC to the switch.

Because the correct cable types are used for each segment, a bad cable could be the problem.

14 Why would a corporate web server be assigned a public IP address instead of a private IP address?

The public address can be acquired at no cost.

The public address can be routed on the Internet.

The public address provides a security advantage.

The same public address can be used on multiple servers to prevent depletion of available IP addresses.

15

Refer to the exhibit. Assume that the command output is from a wireless DHCP client that is connected to a Linksys integrated router. What can be deduced from the output?

Page 6: New Microsoft Word Document

The DHCP configuration on the router needs to be verified.

The WEP key or SSID needs to be verified.

The wireless connection is operational.

The wireless NIC driver or the NIC itself needs to be reinstalled.

Take Assessment - DHomesb Practice Final Exam - CCNA Discovery: Networking for Home and Small Businesses (Version 4.0)

Time Remaining:

16 A network designer is working with a small company to determine the network type best suited to the needs of the company. Which two characteristics could the designer use to describe a peer-to-peer network to the owner of the company? (Choose two.)

central administration

easy to install

low cost

scalable

secure

17 All hosts within a domain receive the same frame that originates from one of the devices. The domain is also bounded by routers. What type of domain is this?

broadcast

collision

local

multicast

18

Refer to the graphic. Assume that the exhibited output is from a host that is connected to a Linksys integrated router. What is one of the first things you should check?

IP address on the host

1864489

00:31:05

Page 7: New Microsoft Word Document

IP address on the router

subnet mask on the host

default gateway on the host

link status LED on the front of the router

19 A learner wants to interact with the operating system of a computer. Which two methods can be used for this? (Choose two.)

CLI

GUI

kernel

third party software

shell

20

Refer to the exhibit. A network technician is statically assigning an IP address to a PC. The default gateway is correct. What would be a valid IP address to assign to the host?

128.106.10.100

128.107.255.1

128.107.255.254

128.108.100.10

21 Which two IP configuration components does the computer use to identify its subnetwork? (Choose two.)

default gateway

Page 8: New Microsoft Word Document

IP address

MAC address

DNS server address

subnet mask

22 What is a service pack?

an access policy

an agreement between a company and a vendor

a piece of code created to fix one specific problem

a collection of patches and updates released by a vendor

a small piece of software designed specifically for security issues

23

Refer to the exhibit. Host2 attempts to establish communications with Server1. What action will switch SW1 take prior to forwarding the frame?

flood the frame out all interfaces

learn the MAC address that is associated with Host2

assign a MAC address to Host2 from the MAC table

poll all interfaces to learn their assigned IP addresses

24 Which transport layer protocol is used when an application requires acknowledgment that data has been delivered?

FTP

TCP

UDP

RTP

SMTP

25 Which protocol is used by a client to retrieve an e-mail from a remote server using a TCP/IP connection?

DNS

Page 9: New Microsoft Word Document

FTP

POP

HTTP

26

Refer to the exhibit. Host A sends a message to a group of four computers out of the ten computers on this network. Which type of message does host A send?

broadcast

multicast

simulcast

unicast

27 Your school network blocks all websites related to online gaming. What type of security policy is being applied?

identification and authentication

remote access

acceptable use

incident handling

28 What layer is the first point of entry for a host into the network?

core layer

access layer

network layer

distribution layer

29 What is the meaning of the term crosstalk?

interference of signals between wire pairs

loss of signal strength as distance increases

damage of the signal when two bare wires touch

strengthening of a signal by a networking device

30 What does the term "attenuation" mean in data communication?

Page 10: New Microsoft Word Document

loss of signal strength as distance increases

time for a signal to reach its destination

leakage of signals from one cable pair to another

strengthening of a signal by a networking device

A user is unable to send e-mail. While troubleshooting this problem, the network technician first verifies the physical connectivity of cables. Which troubleshooting approach is being followed?

bottom-up

divide-and-conquer

top-down

trial and error

32 Which part of a data packet is used by a router to determine the destination network?

source IP address

user data

destination IP address

control information

destination MAC address

33 What is the maximum number of bytes that is allowed in a standard IEEE 802.3 Ethernet frame?

64

1024

1518

4096

34 When terminating UTP cabling, why is it important to untwist only a small amount of each wire pair?

minimizes crosstalk

makes installation faster

ensures wires are in correct order

makes it easier to fit wires into connector

35 What is the function of CSMA/CA on a wireless Ethernet network?

to prevent collisions

to broadcast messages

to select the least congested channel

to establish an ACK between devices

36 Which type of attack involves flooding a server port with SYN messages?

phishing

brute force

denial of service

data manipulation

37 What is the function of the DNS server?

It maps the IP address to the MAC address.

It translates a computer or domain name to the associated IP address.

Page 11: New Microsoft Word Document

It manages the domain that clients are assigned to.

It accepts HTTP requests from clients.

38

Refer to the exhibit. What is the purpose of assigning a network name of College?

It enables access to the AP configuration GUI by name rather than by address.

It encrypts data between the wireless client and the AP.

It identifies the wireless LAN.

It translates an internal address or group of addresses to a public address.

It translates IP addresses into easy-to-remember domain names.

39 Which two transport layer protocols enable hosts to communicate and transfer data? (Choose two.)

DHCP

ICMP

IP

TCP

UDP

40 Which media is used to carry electrical pulses that represent digital data?

copper cable

fiber optic cable

wireless

radio

41 What network device contains a table of all locally connected networks and the interfaces used to connect to them?

hub

switch

router

access point

NIC

42 What procedure will help prevent users from detecting a wireless network?

Enable WEP.

Enable MAC filtering.

Disable SSID broadcasts.

Change the default administrator password on the AP.

43 What is the default subnet mask for the IP address 128.107.23.10?

Page 12: New Microsoft Word Document

255.0.0.0

255.255.0.0

255.255.255.0

255.255.255.255

44 A user is not able to connect to the network. A PC technician replaces the network cable that connects the PC to the switch port. The user is now able to connect to the network. Which troubleshooting technique did the technician use?

top-down

substitution

divide-and-conquer

a combination of top-down and divide-and-conquer

45

Refer to the exhibit. A user sets up a home network and uses a crossover cable from Switch1 to the Internet port on the ISR. However, there is no connection between the host H1 and the server. What should the user do in order to establish a connection?

Replace the cable with a console cable.

Replace the cable with a rollover cable.

Replace the failed crossover cable with a working crossover cable.

Replace the cable with a straight-through cable.

Showing 3 of 4 <Prev Page: Next>

Take Assessment - DHomesb Practice Final Exam - CCNA Discovery: Networking for Home and Small Businesses (Version 4.0)

Time Remaining:

3

1815845

00:30:16

Page 13: New Microsoft Word Document

46 What are two examples of storage peripheral devices? (Choose two.)

printer

flash drive

headphones

external DVD

barcode reader

47 A home user is looking for an ISP connection that provides high speed digital transmission over regular phone lines. What ISP connection type should be used?

DSL

dial-up

satellite

cell modem

cable modem

48 Some new features are available for the OS that is currently running on a user's PC. What method should be chosen so that the user can install these new feature sets?

clean install

multi-boot

upgrade

virtualization

49 Which type of computer uses an integrated monitor and keyboard?

pocket PC

laptop

mainframe

server

workstation

50 What are the two possible values for a digital bit? (Choose two.)

0

1

A

F

#

9

00:30:16