Sie sind auf Seite 1von 8

Close Window

Assessment System

1. Assessment Selection

2. Assessment Settings

3. Take Assessment

Take Assessment - DHomesb Final Exam - CCNA Discovery: Networking for Home and Small Businesses (Version 4.0)

T 3823991 o p Time Remaining: o f 01:03:44 F o Bottom of Form r m

Top of Form

Refer to the exhibit. A user on host A sends an e-mail to the user on host B. Which type of message does host A send? broadcast multicast simulcast unicast
Bottom of Form

Top of Form

TCP/IP data transmission between the source and destination host is de-encapsulated in four steps: A. The TCP header is removed. B. Bits are decoded and the destination MAC address is recognized. C. The IP header is removed and the contents are passed to the next layer. D. The Ethernet header and trailer are removed. What is the correct sequence of these steps? A, B, C, D A, C, B, D B, C, D, A B, D, C, A C, A, B, D
Bottom of Form

3 What is the function of a physical topology map? records IP addressing of each host records hostnames and applications organizes groups of hosts by how they use the network

Top of Form

shows where wiring is installed and the locations of network devices


Bottom of Form

Top of Form

Refer to the exhibit. A wireless client is unable to connect to a Linksys WRT300N access point that is using network 192.168.1.0/24 its LAN and WLAN clients. What could cause the problem? The IP address is incorrect. The subnet mask is incorrect. The default gateway is incorrect. All addresses are correct, so the SSID must be incorrect.
Bottom of Form

Top of Form

Refer to the exhibit. What is the effect of setting the security mode to WEP on the Linksys integrated router? The WEP security mode enables the AP to inform clients of its presence. The WEP security mode encrypts network traffic during transmission between the AP and the wireless client. The WEP security mode generates a dynamic key each time a client establishes a connection with the AP. The WEP security mode identifies the WLAN.
Bottom of Form

6 disconnected cables improper operation of cooling fans incorrect MAC address incorrect default gateway incorrect subnet mask

Top of Form

Which two causes of networking problems are related to the physical layer? (Choose two.)

Bottom of Form

7 ipconfig /release ipconfig /all ipconfig /flushdns ipconfig /renew ipconfig

Top of Form

What two commands can be used to form a new binding if client information does not agree with the DHCP client table? (Choose tw

Bottom of Form

8 Which term is associated with logical addressing?

Top of Form

IP addresses port addresses physical addresses Media Access Control addresses


Bottom of Form

9 When are leased lines typically used? when low bandwidth is required for home and small business connectivity when a dedicated digital data line is necessary

Top of Form

as a less expensive option to cable and DSL modem service


Bottom of Form

10 a public address that is obtained from ICANN

Top of Form

What describes the external IP address that is obtained by a router through a cable or DSL modem?

a private address that is manually configured by the administrator a public address that is obtained through DHCP from the ISP a private address that converts to a public address on the internal LAN
Bottom of Form

11 ping netstat tracert nslookup ipconfig

Top of Form

Which Windows PC command line utility can be used to discover the path that a packet takes to reach a destination?

Bottom of Form

12 An IP address is known as a logical address. An IP address uses a 30-bit addressing scheme.

Top of Form

Which three statements describe an IP address? (Choose three.)

An IP address is found in the Layer 2 header during transmission. The network portion of an IP address is burned into a network interface card. An IP address is unique within the same local network. The network portion of an IP address will be the same for all hosts that are connected to the same local network.
Bottom of Form

13

Top of Form

A system administrator routinely monitors failed login attempts on a server. If the administrator sees an extremely high number of fa attempts by a single user who is trying multiple password combinations, what type of attack is in progress? brute force phishing SYN flood virus vishing
Bottom of Form

14 How does a crossover cable connect two routers?

Top of Form

It connects the pins that are used for receiving on one router to the pins that are used for receiving on the other router. It connects the pins that are used for transmitting on one router to the pins that are used for receiving on the other router. It disconnects the transmit pins and uses only the receive pins. It uses the same pins for transmitting and receiving.
Bottom of Form

15

Top of Form

Refer to the exhibit. PC1 is unable to access the web server at 209.165.200.226/27. Based on the provided output, what is the mos likely cause of the problem? PC1 is not plugged in to RTR1. Port 80 is already in use on PC1. No DNS server is configured on PC1. PC1 is configured with an incorrect IP address and default gateway.
Bottom of Form

Top of Form

Showing 1 of 4

<Prev

Page:
Bottom of Form

Next>

Close Window

All contents copyright 1992-2011 Cisco Systems, Inc. Privacy Statement and Trademarks.

Top of Form

Bottom of Form

Das könnte Ihnen auch gefallen