Beruflich Dokumente
Kultur Dokumente
(Version 4.0)
Top of Form
716519
Time Remaining:
Bottom of Form
Top of Form
1
Showing 1 of 4 Next> <Prev
Page: GO
Bottom of Form
1 Top of Form
Refer to the exhibit. A home network is configured with the information in the graphic. A user tries to manually
create a new connection to the network using the SSID Ciscoclass. However, a connection cannot be made.
What could be the problem?
The SSID is case-sensitive.
2 Top of Form
What destination IP address is used in a unicast packet?
a specific host
a group of hosts
3 Top of Form
Which type of network attack occurs when an unauthorized person tries to persuade a user to share a network
user ID and password?
brute force
denial of service
data manipulation
social engineering
Bottom of Form
4 Top of Form
What information within a data packet does a router use, by default, to make forwarding decisions?
the destination MAC address
5 Top of Form
Which type of firewall technique can be used to allow inbound traffic from the public network only if it was
initiated from the internal network?
URL filtering
packet filtering
application filtering
6 Top of Form
Which network design layer provides a connection point for end user devices to the network?
access
core
distribution
network
Bottom of Form
7 Top of Form
Which two statements are true about local applications? (Choose two.)
They run on the network.
8 Top of Form
A local PC has the correct configuration that is required to access the network. A ping command that is sourced
at the PC does not receive a response from a remote device. Which operating system command might be used to
determine where the connection failed?
netstat
tracert
ipconfig
nslookup
Bottom of Form
9 Top of Form
What does the term "attenuation" mean in data communication?
loss of signal strength as distance increases
10 Top of Form
Which wireless technology allows only one-to-one connections and is typically used for short-range, line-of-
sight communication?
GSM
Wi-Fi
Infrared
Bluetooth
Bottom of Form
11 Top of Form
Refer to the exhibit. A network technician is statically assigning an IP address to a PC. The default gateway is
correct. What would be a valid IP address to assign to the host?
128.106.10.100
128.107.255.1
128.107.255.254
128.108.100.10
Bottom of Form
12 Top of Form
The area covered by a single AP is known as what?
ad-hoc network
distribution system
Bottom of Form
13 Top of Form
An administrator is troubleshooting a network problem that involves the inability of users to reach Internet sites.
During troubleshooting, the administrator is able to successfully ping web sites by their IP address, but pings to
domain names are unsuccessful. Which service is most likely at fault?
DHCP
DNS
FTP
NAT
Bottom of Form
14 Top of Form
Which type of network supports DHCP and DNS services for network users in a network domain?
client/server
peer-to-peer
Hierarchical
ad hoc
Bottom of Form
15 Top of Form
Refer to the exhibit. The wireless router WR1 is configured with the address shown and DHCP is not
configured. What will be the result of a technician configuring the address 172.16.14.255 on the laptop?
The laptop will be configured with the network address.
Top of Form
1
Showing 1 of 4 Next> <Prev
Page: GO
Bottom of Form
All contents copyright 1992-2010 Cisco Systems, Inc. Privacy Statement and Trademarks
Top of Form
1
Bottom of Form
Assessment System
Take Assessment - DHomesb Final Exam - CCNA Discovery: Networking for Home and Small Businesses
(Version 4.0)
Top of Form
598869
Time Remaining:
Bottom of Form
Top of Form
Page:
Nex 2
Showing 2 of 4 <Prev
t>
GO
Bottom of Form
16 Top of Form
What is the function of a physical topology map?
records IP addressing of each host
17 Top of Form
Which two issues can cause connectivity problems on a wireless network? (Choose two.)
incorrect SSID
broadcast SSID
overlapping channels
18 Top of Form
Which term is associated with logical addressing?
IP addresses
port addresses
physical addresses
19 Top of Form
How does a crossover cable make it possible for two "like devices" (for example, two switches) to
communicate?
The transmit pins are disconnected and only the receive pins are used.
The transmit pins on one device are connected to the transmit pins on the other device.
The receive pins on one device are connected to the receive pins on the other device.
The transmit pins on one device are connected to the receive pins on the other device.
Bottom of Form
20 Top of Form
What two commands can be used to form a new binding if client information does not agree with the DHCP
client table? (Choose two.)
ipconfig /release
ipconfig /all
ipconfig /flushdns
ipconfig /renew
ipconfig
Bottom of Form
21 Top of Form
Which protocol is used to transfer files among network devices and perform file-management functions?
DNS
FTP
HTML
HTTP
Bottom of Form
22 Top of Form
A network technician suspects that malware on a user PC is opening multiple TCP connections to a specific
foreign host address. Which Windows command line utility can be used to confirm the multiple TCP
connections?
ping
netstat
tracert
ipconfig
nslookup
Bottom of Form
23 Top of Form
Which two automatic addressing assignments are supported by DHCP? (Choose two.)
local server address
subnet mask
24 Top of Form
How do ISPs obtain public IP addresses?
They create the addresses themselves.
25 Top of Form
When terminating a UTP cable, why is it important to push the wires all the way into the end of the connector?
to allow the cable to endure more stretching or twisting
to minimize crosstalk
Bottom of Form
26 Top of Form
How does a DMZ enhance network security for an organization?
blocks viruses and spyware
27 Top of Form
Which part of the electromagnetic spectrum is commonly used to exchange data between a PDA and a
computer?
FM
radar
infrared
ultraviolet
Bottom of Form
28 Top of Form
Which two protocols are responsible for encrypting data on a wireless network? (Choose two.)
EAP
PSK
WEP
WPA
PAP
Bottom of Form
29 Top of Form
Refer to the exhibit. Assume that the command output is from a wireless DHCP client that is connected to a
Linksys integrated router. What can be deduced from the output?
The DHCP configuration on the router needs to be verified.
Top of Form
Page:
Nex 2
Showing 2 of 4 <Prev
t>
GO
Bottom of Form
All contents copyright 1992-2010 Cisco Systems, Inc. Privacy Statement and Trademarks
Top of Form
2
Bottom of Form
Assessment System
Take Assessment - DHomesb Final Exam - CCNA Discovery: Networking for Home and Small Businesses
(Version 4.0)
Top of Form
553232
Time Remaining:
Bottom of Form
Top of Form
Page:
Nex 3
Showing 3 of 4 <Prev
t>
GO
Bottom of Form
31 Top of Form
A small company is installing a new network. The consulting technician recommends that a peer-to-peer
network be implemented. What are two advantages of this network type? (Choose two.)
scalability
ease of setup
central administration
32 Top of Form
Bottom-up troubleshooting begins at which layer of the OSI model?
network layer
physical layer
transport layer
application layer
Bottom of Form
33 Top of Form
All hosts within a domain receive the same frame that originates from one of the devices. The domain is also
bounded by routers. What type of domain is this?
broadcast
collision
local
multicast
Bottom of Form
34 Top of Form
What two pieces of information should a help desk technician document while troubleshooting connectivity
issues with an end user? (Choose two.)
the CPU clock speed of the computer
35 Top of Form
Refer to the exhibit. The security policy of an organization allows employees to connect to the office intranet
from their homes. Which type of security policy is this?
acceptable use
incident handling
network maintenance
remote access
Bottom of Form
36 Top of Form
What is an advantage of purchasing a custom-built computer?
It is beneficial for less knowledgeable consumers.
Used when consistently uploading large amounts of graphics, video and multimedia traffic.
Bottom of Form
38 Top of Form
Which two TCP/IP properties must match on hosts in the same LAN if the hosts are to be able to communicate
with each other? (Choose two.)
the subnet mask
39 Top of Form
What is the function of the DNS server?
It assigns IP addresses to clients.
40 Top of Form
Which type of computer has an integrated mouse?
desktop
laptop
mainframe
server
pocket PC
Bottom of Form
41 Top of Form
Some new features are available for the OS that is currently running on a user's PC. What method should be
chosen so that the user can install these new feature sets?
clean install
multi-boot
upgrade
virtualization
Bottom of Form
42 Top of Form
Refer to the exhibit. Why would a network administrator use the network mode that is shown?
to support hosts on different IP networks
WEP keys are only 64 bits long whereas WPA keys are 128 bits long.
WEP uses the same key for every connection whereas WPA uses a different key for each connection.
WEP uses a fixed length key for every connection whereas WPA uses a different key length for each
connection.
Bottom of Form
44 Top of Form
Which network entity would most likely be configured as both a DHCP client and a DHCP server?
ISP
desktop PC
wireless laptop
PC-based server
45 Top of Form
Refer to the exhibit. What is the reason that the host is unable to connect to the Internet?
DHCP needs to be enabled on the router.
Top of Form
Page:
Nex 3
Showing 3 of 4 <Prev
t>
GO
Bottom of Form
All contents copyright 1992-2010 Cisco Systems, Inc. Privacy Statement and Trademarks
Top of Form
3
Bottom of Form
Assessment System
Take Assessment - DHomesb Final Exam - CCNA Discovery: Networking for Home and Small Businesses
(Version 4.0)
Top of Form
513079
Time Remaining:
Bottom of Form
Top of Form
GO
Bottom of Form
46 Top of Form
How do wireless devices within a BSS access an available channel?
Channels are used sequentially in round-robin fashion by each device in the BSS.
Devices ask permission to use a channel by sending the AP a Request to Send message.
Every device within the BSS is assigned its own channel and has its own dedicated connection.
A device sends data and if it senses collisions it waits a predetermined time before re-sending on a different
channel.
Bottom of Form
47 Top of Form
What is a service pack?
an access policy
48 Top of Form
Refer to the exhibit. H1 can ping H2, H3, and the Fa0/0 interface of router R1. H2 and H3 but not H1 can ping
H4 and H5. What is a possible cause for the H1 failure?
Router R1 has no route to the destination network.
49 Top of Form
What are two ways that a user can interact with an operating system shell? (Choose two.)
CLI
OS
GUI
NIC
kernel
Bottom of Form
50 Top of Form
A network administrator has been notified that users have experienced problems gaining access to network
resources. What utility could be used to directly query a name server for information on a destination domain?
ping
tracert
netstat
ipconfig
nslookup
Bottom of Form
51 Top of Form
Which wireless protocol is used for encryption?
EAP
Open
PSK
WEP
Bottom of Form
52 Top of Form
What is the default subnet mask for an IP address of 64.100.19.14?
255.0.0.0
255.255.0.0
255.255.255.0
255.255.255.255
Bottom of Form
Top of Form
Page:
Nex 4
Showing 4 of 4 <Prev
t>
GO
Bottom of Form
All contents copyright 1992-2010 Cisco Systems, Inc. Privacy Statement and Trademarks
Top of Form
4
Bottom of Form