Sie sind auf Seite 1von 20

Take Assessment - DHomesb Final Exam - CCNA Discovery: Networking for Home and Small Businesses

(Version 4.0)
Top of Form
716519

Time Remaining:
Bottom of Form
Top of Form

1
Showing 1 of 4 Next> <Prev
Page: GO
Bottom of Form
1 Top of Form

Refer to the exhibit. A home network is configured with the information in the graphic. A user tries to manually
create a new connection to the network using the SSID Ciscoclass. However, a connection cannot be made.
What could be the problem?
The SSID is case-sensitive.

The SSID must contain at least one number.

The SSID should be used with the default name.

The SSID must contain a minimum of 32 characters.


Bottom of Form

2 Top of Form
What destination IP address is used in a unicast packet?
a specific host
a group of hosts

all hosts on the network

the network broadcast address


Bottom of Form

3 Top of Form
Which type of network attack occurs when an unauthorized person tries to persuade a user to share a network
user ID and password?
brute force

denial of service

data manipulation

social engineering
Bottom of Form

4 Top of Form
What information within a data packet does a router use, by default, to make forwarding decisions?
the destination MAC address

the destination IP address

the destination host name

the destination service requested


Bottom of Form

5 Top of Form
Which type of firewall technique can be used to allow inbound traffic from the public network only if it was
initiated from the internal network?
URL filtering

packet filtering

application filtering

stateful packet inspection


Bottom of Form

6 Top of Form
Which network design layer provides a connection point for end user devices to the network?
access
core

distribution

network
Bottom of Form

7 Top of Form
Which two statements are true about local applications? (Choose two.)
They run on the network.

An example of a local application is e-mail.

They are accessed from a remote computer.

They are stored on the local hard disk.

They run on the computer where they are installed.


Bottom of Form

8 Top of Form
A local PC has the correct configuration that is required to access the network. A ping command that is sourced
at the PC does not receive a response from a remote device. Which operating system command might be used to
determine where the connection failed?
netstat

tracert

ipconfig

nslookup
Bottom of Form

9 Top of Form
What does the term "attenuation" mean in data communication?
loss of signal strength as distance increases

time for a signal to reach its destination

leakage of signals from one cable pair to another

strengthening of a signal by a networking device


Bottom of Form

10 Top of Form
Which wireless technology allows only one-to-one connections and is typically used for short-range, line-of-
sight communication?
GSM

Wi-Fi

Infrared

Bluetooth
Bottom of Form

11 Top of Form

Refer to the exhibit. A network technician is statically assigning an IP address to a PC. The default gateway is
correct. What would be a valid IP address to assign to the host?
128.106.10.100

128.107.255.1

128.107.255.254

128.108.100.10
Bottom of Form

12 Top of Form
The area covered by a single AP is known as what?
ad-hoc network

basic service set

independent basic service set

extended service set

distribution system
Bottom of Form

13 Top of Form
An administrator is troubleshooting a network problem that involves the inability of users to reach Internet sites.
During troubleshooting, the administrator is able to successfully ping web sites by their IP address, but pings to
domain names are unsuccessful. Which service is most likely at fault?
DHCP

DNS

FTP

NAT
Bottom of Form

14 Top of Form
Which type of network supports DHCP and DNS services for network users in a network domain?
client/server

peer-to-peer

Hierarchical

ad hoc
Bottom of Form

15 Top of Form
Refer to the exhibit. The wireless router WR1 is configured with the address shown and DHCP is not
configured. What will be the result of a technician configuring the address 172.16.14.255 on the laptop?
The laptop will be configured with the network address.

The laptop will be configured with a public IP address.

The laptop will be configured with a broadcast address.

The laptop will be configured within the same network as WR1.


Bottom of Form

Top of Form

1
Showing 1 of 4 Next> <Prev
Page: GO
Bottom of Form

All contents copyright 1992-2010 Cisco Systems, Inc. Privacy Statement and Trademarks
Top of Form
1

Bottom of Form

Assessment System

Skip to Time Left | Skip to Navigation | Skip to Assessment Items

Take Assessment - DHomesb Final Exam - CCNA Discovery: Networking for Home and Small Businesses
(Version 4.0)
Top of Form
598869

Time Remaining:
Bottom of Form
Top of Form

Page:
Nex 2
Showing 2 of 4 <Prev
t>
GO
Bottom of Form
16 Top of Form
What is the function of a physical topology map?
records IP addressing of each host

records hostnames and applications

organizes groups of hosts by how they use the network

shows where wiring is installed and the locations of network devices


Bottom of Form

17 Top of Form
Which two issues can cause connectivity problems on a wireless network? (Choose two.)
incorrect SSID

broadcast SSID

overlapping channels

low number of clients in BSS

802.11b clients attempting connection to 802.11g APs


Bottom of Form

18 Top of Form
Which term is associated with logical addressing?
IP addresses

port addresses

physical addresses

Media Access Control addresses


Bottom of Form

19 Top of Form
How does a crossover cable make it possible for two "like devices" (for example, two switches) to
communicate?
The transmit pins are disconnected and only the receive pins are used.
The transmit pins on one device are connected to the transmit pins on the other device.

The receive pins on one device are connected to the receive pins on the other device.

The transmit pins on one device are connected to the receive pins on the other device.
Bottom of Form

20 Top of Form
What two commands can be used to form a new binding if client information does not agree with the DHCP
client table? (Choose two.)
ipconfig /release

ipconfig /all

ipconfig /flushdns

ipconfig /renew

ipconfig
Bottom of Form

21 Top of Form
Which protocol is used to transfer files among network devices and perform file-management functions?
DNS

FTP

HTML

HTTP
Bottom of Form

22 Top of Form
A network technician suspects that malware on a user PC is opening multiple TCP connections to a specific
foreign host address. Which Windows command line utility can be used to confirm the multiple TCP
connections?
ping

netstat

tracert

ipconfig

nslookup
Bottom of Form
23 Top of Form
Which two automatic addressing assignments are supported by DHCP? (Choose two.)
local server address

subnet mask

default gateway address

physical address of the recipient

physical address of the sender


Bottom of Form

24 Top of Form
How do ISPs obtain public IP addresses?
They create the addresses themselves.

They obtain the addresses from the home PCs.

They obtain the addresses from the Internet registry.

They obtain the addresses from the RFC.


Bottom of Form

25 Top of Form
When terminating a UTP cable, why is it important to push the wires all the way into the end of the connector?
to allow the cable to endure more stretching or twisting

to ensure good electrical contact

to ensure that the wires are in correct order

to minimize crosstalk
Bottom of Form

26 Top of Form
How does a DMZ enhance network security for an organization?
blocks viruses and spyware

restricts internal user access to prohibited Internet sites

allows external customer access to designated internal resources

removes suspicious attachments from incoming and outgoing e-mail


Bottom of Form

27 Top of Form
Which part of the electromagnetic spectrum is commonly used to exchange data between a PDA and a
computer?
FM

radar

infrared

ultraviolet
Bottom of Form

28 Top of Form
Which two protocols are responsible for encrypting data on a wireless network? (Choose two.)
EAP

PSK

WEP

WPA

PAP
Bottom of Form

29 Top of Form

Refer to the exhibit. Assume that the command output is from a wireless DHCP client that is connected to a
Linksys integrated router. What can be deduced from the output?
The DHCP configuration on the router needs to be verified.

The WEP key or SSID needs to be verified.

The wireless connection is operational.

The wireless NIC driver or the NIC itself needs to be reinstalled.


Bottom of Form
30 Top of Form
A user starts a file transfer between a client machine and an FTP server. Which list correctly represents the
sequence of protocols that are used by the client machine to encapsulate the FTP data traffic for transmission?
FTP, TCP, IP, Network Access Protocols

FTP, UDP, IP, Network Access Protocols

FTP, IP, UDP, Network Access Protocols

FTP, IP, TCP, Network Access Protocols


Bottom of Form

Top of Form

Page:
Nex 2
Showing 2 of 4 <Prev
t>
GO
Bottom of Form

All contents copyright 1992-2010 Cisco Systems, Inc. Privacy Statement and Trademarks
Top of Form
2

Bottom of Form

Assessment System

Skip to Time Left | Skip to Navigation | Skip to Assessment Items

Take Assessment - DHomesb Final Exam - CCNA Discovery: Networking for Home and Small Businesses
(Version 4.0)
Top of Form
553232

Time Remaining:
Bottom of Form
Top of Form

Page:
Nex 3
Showing 3 of 4 <Prev
t>
GO
Bottom of Form
31 Top of Form
A small company is installing a new network. The consulting technician recommends that a peer-to-peer
network be implemented. What are two advantages of this network type? (Choose two.)
scalability

ease of setup

low device cost

central administration

fast file access to shared folders


Bottom of Form

32 Top of Form
Bottom-up troubleshooting begins at which layer of the OSI model?
network layer

physical layer

data link layer

transport layer

application layer
Bottom of Form

33 Top of Form
All hosts within a domain receive the same frame that originates from one of the devices. The domain is also
bounded by routers. What type of domain is this?
broadcast

collision

local

multicast
Bottom of Form

34 Top of Form
What two pieces of information should a help desk technician document while troubleshooting connectivity
issues with an end user? (Choose two.)
the CPU clock speed of the computer

the number of network jacks that are in the room

if the user can ping the default gateway address

if the word processing software is installed correctly

whether the PC uses dynamic or static IP addressing


Bottom of Form

35 Top of Form

Refer to the exhibit. The security policy of an organization allows employees to connect to the office intranet
from their homes. Which type of security policy is this?
acceptable use

incident handling

network maintenance

remote access
Bottom of Form

36 Top of Form
What is an advantage of purchasing a custom-built computer?
It is beneficial for less knowledgeable consumers.

The waiting period for assembly is negligible.

The cost is lower compared to a computer that has been preassembled.

The user can specify high-performance components to meet specific needs.


Bottom of Form
37 Top of Form
What is a major characteristic of asymmetric Internet service?
Download speeds and upload speeds are equal.

Download speeds are faster than upload speeds.

Data traffic speeds are faster than voice traffic speeds.

Used when consistently uploading large amounts of graphics, video and multimedia traffic.
Bottom of Form

38 Top of Form
Which two TCP/IP properties must match on hosts in the same LAN if the hosts are to be able to communicate
with each other? (Choose two.)
the subnet mask

the DNS server configurations

the default gateway configurations

the host portion of the IP address

the network portion of the IP address


Bottom of Form

39 Top of Form
What is the function of the DNS server?
It assigns IP addresses to clients.

It accepts HTTP requests from clients.

It maps a hostname to a corresponding IP address.

It manages the domain that clients are assigned to.


Bottom of Form

40 Top of Form
Which type of computer has an integrated mouse?
desktop

laptop

mainframe

server

pocket PC
Bottom of Form

41 Top of Form
Some new features are available for the OS that is currently running on a user's PC. What method should be
chosen so that the user can install these new feature sets?
clean install

multi-boot

upgrade

virtualization
Bottom of Form

42 Top of Form

Refer to the exhibit. Why would a network administrator use the network mode that is shown?
to support hosts on different IP networks

to support hosts that use different 802.11 standards

to support both wireless and wired Ethernet hosts

to support hosts with different operating systems

to support hosts with network cards from different manufacturers


Bottom of Form
43 Top of Form
What is a weakness of WEP that is solved by WPA?
WEP is a proprietary standard whereas WPA is an open standard.

WEP keys are only 64 bits long whereas WPA keys are 128 bits long.

WEP uses the same key for every connection whereas WPA uses a different key for each connection.
WEP uses a fixed length key for every connection whereas WPA uses a different key length for each
connection.
Bottom of Form

44 Top of Form
Which network entity would most likely be configured as both a DHCP client and a DHCP server?
ISP

desktop PC

wireless laptop

PC-based server

integrated services home router


Bottom of Form

45 Top of Form

Refer to the exhibit. What is the reason that the host is unable to connect to the Internet?
DHCP needs to be enabled on the router.

The router has an incorrect DHCP starting address.

The IP address on the host is in the wrong network.

The host is configured with an incorrect gateway.


Bottom of Form

Top of Form

Page:
Nex 3
Showing 3 of 4 <Prev
t>
GO
Bottom of Form

All contents copyright 1992-2010 Cisco Systems, Inc. Privacy Statement and Trademarks
Top of Form
3

Bottom of Form

Assessment System

Skip to Time Left | Skip to Navigation | Skip to Assessment Items

Take Assessment - DHomesb Final Exam - CCNA Discovery: Networking for Home and Small Businesses
(Version 4.0)
Top of Form
513079

Time Remaining:
Bottom of Form
Top of Form

Showing 4 of 4 Nex Page: <Prev


t>
4

GO
Bottom of Form
46 Top of Form
How do wireless devices within a BSS access an available channel?
Channels are used sequentially in round-robin fashion by each device in the BSS.

Devices ask permission to use a channel by sending the AP a Request to Send message.

Every device within the BSS is assigned its own channel and has its own dedicated connection.
A device sends data and if it senses collisions it waits a predetermined time before re-sending on a different
channel.
Bottom of Form

47 Top of Form
What is a service pack?
an access policy

an agreement between a company and a vendor

a piece of code created to fix one specific problem

a collection of patches and updates released by a vendor

a small piece of software designed specifically for security issues


Bottom of Form

48 Top of Form

Refer to the exhibit. H1 can ping H2, H3, and the Fa0/0 interface of router R1. H2 and H3 but not H1 can ping
H4 and H5. What is a possible cause for the H1 failure?
Router R1 has no route to the destination network.

Switch S1 does not have an IP address configured.

The link between router R1 and switch S2 has failed.

Host H1 does not have a default gateway configured.


Bottom of Form

49 Top of Form
What are two ways that a user can interact with an operating system shell? (Choose two.)
CLI

OS

GUI

NIC

kernel
Bottom of Form

50 Top of Form
A network administrator has been notified that users have experienced problems gaining access to network
resources. What utility could be used to directly query a name server for information on a destination domain?
ping

tracert

netstat

ipconfig

nslookup
Bottom of Form

51 Top of Form
Which wireless protocol is used for encryption?
EAP

Open

PSK

WEP
Bottom of Form
52 Top of Form
What is the default subnet mask for an IP address of 64.100.19.14?
255.0.0.0

255.255.0.0

255.255.255.0

255.255.255.255
Bottom of Form

Top of Form

Page:
Nex 4
Showing 4 of 4 <Prev
t>
GO
Bottom of Form

All contents copyright 1992-2010 Cisco Systems, Inc. Privacy Statement and Trademarks
Top of Form
4

Bottom of Form

Das könnte Ihnen auch gefallen