take assessment
TRANSCRIPT
Take Assessment - DHomesb Final Exam - CCNA Discovery: Networking for Home and Small Businesses (Version 4.0)
Time Remaining:
Showing 1 of 4 Next> Page: GO <Prev
1
Refer to the exhibit. A home network is configured with the information in the graphic. A user tries to manually create a new connection to the network using the SSID Ciscoclass. However, a connection cannot be made. What could be the problem?
The SSID is case-sensitive.
The SSID must contain at least one number.
The SSID should be used with the default name.
The SSID must contain a minimum of 32 characters.2 What destination IP address is used in a unicast packet?
a specific host
a group of hosts
all hosts on the network
the network broadcast address3 Which type of network attack occurs when an unauthorized person tries to persuade a user to share a network
user ID and password?brute force
denial of service
data manipulation
social engineering4 What information within a data packet does a router use, by default, to make forwarding decisions?
716519
1
the destination MAC address
the destination IP address
the destination host name
the destination service requested5 Which type of firewall technique can be used to allow inbound traffic from the public network only if it was
initiated from the internal network?URL filtering
packet filtering
application filtering
stateful packet inspection6 Which network design layer provides a connection point for end user devices to the network?
access
core
distribution
network7 Which two statements are true about local applications? (Choose two.)
They run on the network.
An example of a local application is e-mail.
They are accessed from a remote computer.
They are stored on the local hard disk.
They run on the computer where they are installed.8 A local PC has the correct configuration that is required to access the network. A ping command that is sourced
at the PC does not receive a response from a remote device. Which operating system command might be used to determine where the connection failed?
netstat
tracert
ipconfig
nslookup9 What does the term "attenuation" mean in data communication?
loss of signal strength as distance increases
time for a signal to reach its destination
leakage of signals from one cable pair to another
strengthening of a signal by a networking device10 Which wireless technology allows only one-to-one connections and is typically used for short-range, line-of-
sight communication?GSM
Wi-Fi
Infrared
Bluetooth11
Refer to the exhibit. A network technician is statically assigning an IP address to a PC. The default gateway is correct. What would be a valid IP address to assign to the host?
128.106.10.100
128.107.255.1
128.107.255.254
128.108.100.1012 The area covered by a single AP is known as what?
ad-hoc network
basic service set
independent basic service set
extended service set
distribution system13 An administrator is troubleshooting a network problem that involves the inability of users to reach Internet sites.
During troubleshooting, the administrator is able to successfully ping web sites by their IP address, but pings to domain names are unsuccessful. Which service is most likely at fault?
DHCP
DNS
FTP
NAT14 Which type of network supports DHCP and DNS services for network users in a network domain?
client/server
peer-to-peer
Hierarchical
ad hoc15
Refer to the exhibit. The wireless router WR1 is configured with the address shown and DHCP is not configured. What will be the result of a technician configuring the address 172.16.14.255 on the laptop?
The laptop will be configured with the network address.
The laptop will be configured with a public IP address.
The laptop will be configured with a broadcast address.
The laptop will be configured within the same network as WR1.
Showing 1 of 4 Next> Page: GO <Prev
All contents copyright 1992-2010 Cisco Systems, Inc. Privacy Statement and Trademarks
Assessment System
Skip to Time Left | Skip to Navigation | Skip to Assessment Items
Take Assessment - DHomesb Final Exam - CCNA Discovery: Networking for Home and Small Businesses (Version 4.0)
Time Remaining:
Showing 2 of 4 Next> Page: GO <Prev
16 What is the function of a physical topology map?records IP addressing of each host
records hostnames and applications
organizes groups of hosts by how they use the network
shows where wiring is installed and the locations of network devices17 Which two issues can cause connectivity problems on a wireless network? (Choose two.)
1
1
598869
2
incorrect SSID
broadcast SSID
overlapping channels
low number of clients in BSS
802.11b clients attempting connection to 802.11g APs18 Which term is associated with logical addressing?
IP addresses
port addresses
physical addresses
Media Access Control addresses19 How does a crossover cable make it possible for two "like devices" (for example, two switches) to
communicate?The transmit pins are disconnected and only the receive pins are used.
The transmit pins on one device are connected to the transmit pins on the other device.
The receive pins on one device are connected to the receive pins on the other device.
The transmit pins on one device are connected to the receive pins on the other device.20 What two commands can be used to form a new binding if client information does not agree with the DHCP
client table? (Choose two.)ipconfig /release
ipconfig /all
ipconfig /flushdns
ipconfig /renew
ipconfig21 Which protocol is used to transfer files among network devices and perform file-management functions?
DNS
FTP
HTML
HTTP22 A network technician suspects that malware on a user PC is opening multiple TCP connections to a specific
foreign host address. Which Windows command line utility can be used to confirm the multiple TCP connections?
ping
netstat
tracert
ipconfig
nslookup23 Which two automatic addressing assignments are supported by DHCP? (Choose two.)
local server address
subnet mask
default gateway address
physical address of the recipient
physical address of the sender
24 How do ISPs obtain public IP addresses?They create the addresses themselves.
They obtain the addresses from the home PCs.
They obtain the addresses from the Internet registry.
They obtain the addresses from the RFC.25 When terminating a UTP cable, why is it important to push the wires all the way into the end of the connector?
to allow the cable to endure more stretching or twisting
to ensure good electrical contact
to ensure that the wires are in correct order
to minimize crosstalk26 How does a DMZ enhance network security for an organization?
blocks viruses and spyware
restricts internal user access to prohibited Internet sites
allows external customer access to designated internal resources
removes suspicious attachments from incoming and outgoing e-mail27 Which part of the electromagnetic spectrum is commonly used to exchange data between a PDA and a
computer?FM
radar
infrared
ultraviolet28 Which two protocols are responsible for encrypting data on a wireless network? (Choose two.)
EAP
PSK
WEP
WPA
PAP29
Refer to the exhibit. Assume that the command output is from a wireless DHCP client that is connected to a Linksys integrated router. What can be deduced from the output?
The DHCP configuration on the router needs to be verified.
The WEP key or SSID needs to be verified.
The wireless connection is operational.
The wireless NIC driver or the NIC itself needs to be reinstalled.30 A user starts a file transfer between a client machine and an FTP server. Which list correctly represents the
sequence of protocols that are used by the client machine to encapsulate the FTP data traffic for transmission?FTP, TCP, IP, Network Access Protocols
FTP, UDP, IP, Network Access Protocols
FTP, IP, UDP, Network Access Protocols
FTP, IP, TCP, Network Access Protocols
Showing 2 of 4 Next> Page: GO <Prev
All contents copyright 1992-2010 Cisco Systems, Inc. Privacy Statement and Trademarks
Assessment System
Skip to Time Left | Skip to Navigation | Skip to Assessment Items
Take Assessment - DHomesb Final Exam - CCNA Discovery: Networking for Home and Small Businesses (Version 4.0)
Time Remaining:
Showing 3 of 4 Next> Page: GO <Prev
31 A small company is installing a new network. The consulting technician recommends that a peer-to-peer network be implemented. What are two advantages of this network type? (Choose two.)
scalability
ease of setup
low device cost
central administration
fast file access to shared folders32 Bottom-up troubleshooting begins at which layer of the OSI model?
network layer
physical layer
data link layer
transport layer
2
2
553232
3
application layer33 All hosts within a domain receive the same frame that originates from one of the devices. The domain is also
bounded by routers. What type of domain is this?broadcast
collision
local
multicast34 What two pieces of information should a help desk technician document while troubleshooting connectivity
issues with an end user? (Choose two.)the CPU clock speed of the computer
the number of network jacks that are in the room
if the user can ping the default gateway address
if the word processing software is installed correctly
whether the PC uses dynamic or static IP addressing35
Refer to the exhibit. The security policy of an organization allows employees to connect to the office intranet from their homes. Which type of security policy is this?
acceptable use
incident handling
network maintenance
remote access36 What is an advantage of purchasing a custom-built computer?
It is beneficial for less knowledgeable consumers.
The waiting period for assembly is negligible.
The cost is lower compared to a computer that has been preassembled.
The user can specify high-performance components to meet specific needs.37 What is a major characteristic of asymmetric Internet service?
Download speeds and upload speeds are equal.
Download speeds are faster than upload speeds.
Data traffic speeds are faster than voice traffic speeds.
Used when consistently uploading large amounts of graphics, video and multimedia traffic.38 Which two TCP/IP properties must match on hosts in the same LAN if the hosts are to be able to communicate
with each other? (Choose two.)the subnet mask
the DNS server configurations
the default gateway configurations
the host portion of the IP address
the network portion of the IP address39 What is the function of the DNS server?
It assigns IP addresses to clients.
It accepts HTTP requests from clients.
It maps a hostname to a corresponding IP address.
It manages the domain that clients are assigned to.40 Which type of computer has an integrated mouse?
desktop
laptop
mainframe
server
pocket PC41 Some new features are available for the OS that is currently running on a user's PC. What method should be
chosen so that the user can install these new feature sets?clean install
multi-boot
upgrade
virtualization42
Refer to the exhibit. Why would a network administrator use the network mode that is shown?
to support hosts on different IP networks
to support hosts that use different 802.11 standards
to support both wireless and wired Ethernet hosts
to support hosts with different operating systems
to support hosts with network cards from different manufacturers43 What is a weakness of WEP that is solved by WPA?
WEP is a proprietary standard whereas WPA is an open standard.
WEP keys are only 64 bits long whereas WPA keys are 128 bits long.
WEP uses the same key for every connection whereas WPA uses a different key for each connection.WEP uses a fixed length key for every connection whereas WPA uses a different key length for each connection.
44 Which network entity would most likely be configured as both a DHCP client and a DHCP server?ISP
desktop PC
wireless laptop
PC-based server
integrated services home router45
Refer to the exhibit. What is the reason that the host is unable to connect to the Internet?DHCP needs to be enabled on the router.
The router has an incorrect DHCP starting address.
The IP address on the host is in the wrong network.
The host is configured with an incorrect gateway.
Showing 3 of 4 Next> Page: GO <Prev 3
All contents copyright 1992-2010 Cisco Systems, Inc. Privacy Statement and Trademarks
Assessment System
Skip to Time Left | Skip to Navigation | Skip to Assessment Items
Take Assessment - DHomesb Final Exam - CCNA Discovery: Networking for Home and Small Businesses (Version 4.0)
Time Remaining:
Showing 4 of 4 Next> Page: GO <Prev
46 How do wireless devices within a BSS access an available channel?Channels are used sequentially in round-robin fashion by each device in the BSS.
Devices ask permission to use a channel by sending the AP a Request to Send message.
Every device within the BSS is assigned its own channel and has its own dedicated connection.A device sends data and if it senses collisions it waits a predetermined time before re-sending on a different channel.
47 What is a service pack?an access policy
an agreement between a company and a vendor
a piece of code created to fix one specific problem
a collection of patches and updates released by a vendor
a small piece of software designed specifically for security issues48
3
513079
4
Refer to the exhibit. H1 can ping H2, H3, and the Fa0/0 interface of router R1. H2 and H3 but not H1 can ping H4 and H5. What is a possible cause for the H1 failure?
Router R1 has no route to the destination network.
Switch S1 does not have an IP address configured.
The link between router R1 and switch S2 has failed.
Host H1 does not have a default gateway configured.49 What are two ways that a user can interact with an operating system shell? (Choose two.)
CLI
OS
GUI
NIC
kernel50 A network administrator has been notified that users have experienced problems gaining access to network
resources. What utility could be used to directly query a name server for information on a destination domain?ping
tracert
netstat
ipconfig
nslookup51 Which wireless protocol is used for encryption?
EAP
Open
PSK
WEP52 What is the default subnet mask for an IP address of 64.100.19.14?
255.0.0.0
255.255.0.0
255.255.255.0
255.255.255.255
Showing 4 of 4 Next> Page: GO <Prev
All contents copyright 1992-2010 Cisco Systems, Inc. Privacy Statement and Trademarks
4
4