Вы находитесь на странице: 1из 17

Take Assessment - DHomesb Final Exam - CCNA Discovery: Networking for Home and Small Businesses

(Version 4.0)
Bottom of Form
1 Top of Form
Which two causes of networking problems are related to the physical layer? (Choose two.)
damaged cables and connectors

incorrect addressing

incorrect subnet mask

overheated components

incorrect default gateway


Bottom of Form

2 Top of Form
Which device is often configured to act as both a DHCP client and a DHCP server?
home PC

ISP modem

wireless-enabled laptop

integrated services router


Bottom of Form

3 Top of Form
What two commands can be used to form a new binding if client information does not agree with the DHCP
client table? (Choose two.)
ipconfig /release

ipconfig /all

ipconfig /flushdns

ipconfig /renew

ipconfig
Bottom of Form

4 Top of Form
Refer to the exhibit. A user on host A sends an e-mail to the user on host B. Which type of message does host A
send?
broadcast

multicast

simulcast

unicast
Bottom of Form

5 Top of Form
All hosts within a domain receive the same frame that originates from one of the devices. The domain is also
bounded by routers. What type of domain is this?
broadcast

collision

local

multicast
Bottom of Form

6 Top of Form
What are two ways that a user can interact with an operating system shell? (Choose two.)
CLI

OS

GUI

NIC
kernel
Bottom of Form

7 Top of Form
Which portion of the packet does a router use to forward the packet to the destination?
source IP address

user data

destination IP address

control information

destination MAC address


Bottom of Form

8 Top of Form
What type of computer would most likely use a docking station?
laptop

server

desktop

mainframe

workstation
Bottom of Form

9 Top of Form

Refer to the exhibit. An educational institution needs to connect PC systems that use private IP addressing to the
Internet. They have multiple systems that need to access the Internet, but were only able to purchase one public
IP address. What should be activated on the Linksys integrated router to achieve this goal?
authentication

DHCP

encryption

firewall

NAT

WEP
Bottom of Form

10 Top of Form
What is true about a wireless access point that is equipped with an omnidirectional antenna?
concentrates signal in one direction

typically used in bridging applications

radiates the signal equally in all directions

provides the greatest transmission distance of all antenna types that are used by APs
Bottom of Form

11 Top of Form
What is a function of the distribution layer in the hierarchical design model?
to provide latency free switching

to organize end devices in small manageable groups

to provide connectivity using the high-speed backbone

to provide connectivity between smaller local networks


Bottom of Form

12 Top of Form
What is a weakness of WEP that is solved by WPA?
WEP is a proprietary standard whereas WPA is an open standard.

WEP keys are only 64 bits long whereas WPA keys are 128 bits long.

WEP uses the same key for every connection whereas WPA uses a different key for each connection.
WEP uses a fixed length key for every connection whereas WPA uses a different key length for each
connection.
Bottom of Form
13 Top of Form

Refer to the exhibit. H1 can ping H2, H3, and the Fa0/0 interface of router R1. H2 and H3 but not H1 can ping
H4 and H5. What is a possible cause for the H1 failure?
Router R1 has no route to the destination network.

Switch S1 does not have an IP address configured.

The link between router R1 and switch S2 has failed.

Host H1 does not have a default gateway configured.


Bottom of Form

14 Top of Form
For an IP address, what component decides the number of bits that is used to represent the host ID?
default-gateway

host number

network number

subnet mask
Bottom of Form

15 Top of Form
Which three statements describe an IP address? (Choose three.)
An IP address is known as a logical address.

An IP address uses a 30-bit addressing scheme.


An IP address is found in the Layer 2 header during transmission.

The network portion of an IP address is burned into a network interface card.

An IP address is unique within the same local network.

The network portion of an IP address will be the same for all hosts that are connected to the same local networ
Bottom of Form

Top of Form
Bottom of Form
16 Top of Form
Which two statements are true about local applications? (Choose two.)
They run on the network.

An example of a local application is e-mail.

They are accessed from a remote computer.

They are stored on the local hard disk.

They run on the computer where they are installed.


Bottom of Form

17 Top of Form
After attaching four PCs to the switch ports, configuring the SSID and setting authentication properties for a
small office network, a technician successfully tests the connectivity of all PCs that are connected to the switch
and WLAN. A firewall is then configured on the device prior to connecting it to the Internet. What type of
network device includes all of the described features?
switch

ISR router

firewall appliance

standalone wireless access point


Bottom of Form

18 Top of Form
What type of cable would be required to connect a Linksys router to a wired PC?
crossover cable

rollover cable

serial cable

straight-through cable
Bottom of Form
19 Top of Form
A network technician suspects that malware on a user PC is opening multiple TCP connections to a specific
foreign host address. Which Windows command line utility can be used to confirm the multiple TCP
connections?
ping

netstat

tracert

ipconfig

nslookup
Bottom of Form

20 Top of Form
Which three address ranges can be used to depict private IP addresses? (Choose three.)
10.0.0.0 to 10.0.0.255

127.16.0.0 to 127.16.255.255

150.150.0.0 to 150.150.255.255

172.16.1.0 to 172.16.1.255

192.168.22.0 to 192.168.22.255

200.100.50.0 to 200.100.50.255
Bottom of Form

21 Top of Form
Some new features are available for the OS that is currently running on a user's PC. What method should be
chosen so that the user can install these new feature sets?
clean install

multi-boot

upgrade

virtualization
Bottom of Form

22 Top of Form
Which adapter card would be required for a PC to exchange information with other PCs on a LAN?
NIC
video card

sound card

internal modem
Bottom of Form

23 Top of Form
Because of an increasing number of users, bandwidth per user on a WLAN has decreased to a point where users
are complaining about poor performance. What can be done to improve the user experience?
Increase the AP radio signal strength.

Place the AP in a more central location.

Deploy an external omni-directional antenna.

Reduce the number of devices using each channel.


Bottom of Form

24 Top of Form
Which two issues can cause connectivity problems on a wireless network? (Choose two.)
incorrect SSID

broadcast SSID

overlapping channels

low number of clients in BSS

802.11b clients attempting connection to 802.11g APs


Bottom of Form

25 Top of Form

Refer to the graphic. Based on the information that is shown, what statement is true?
This configuration would be commonly found in an ad hoc wireless network.

Any wireless client that is attached to this access point would have the same IP address and SSID.
All wireless devices that are connected to this access point must have an assigned SSID of Academy.

In addition to accepting wireless client requests, this access point must connect to the wired network.
Bottom of Form

26 Top of Form
Under what circumstance would it be appropriate to use private IP addresses?
for communication between two ISPs

for a network that is directly connected to the Internet

for addresses that are used exclusively within an organization.

for a host with more than one direct connection to the Internet
Bottom of Form

27 Top of Form
Which statement is true concerning stateful packet inspection?
Access is permitted based on IP addresses of the source and destination devices.

Access is permitted based on the MAC addresses of the source and destination devices.

Access is permitted only if the type of application that is attempting to reach the internal host is allowed.

Access is permitted only if it is a legitimate response to a request from an internal host.


Bottom of Form

28 Top of Form
What is the purpose of creating a DMZ during network firewall implementation?
to create a server security zone accessible only to internal clients

to create a dirty zone that allows all inbound and outbound traffic

to allow for a publicly accessible zone without compromising the internal network

to specify a higher security level than normally required for the internal production network
Bottom of Form

29 Top of Form
Which two components are configured via software in order for a PC to participate in a network environment?
(Choose two.)
MAC address

IP address

kernel
shell

subnet mask
Bottom of Form

30 Top of Form
A network engineer wants to represent confidential data in binary format. What are the two possible values that
the engineer can use? (Choose two.)
0

F
Bottom of Form

Top of Form
Top of Form
2

Bottom of Form

Top of Form
Bottom of Form
31 Top of Form
How does a straight-through cable connect two unlike devices?
It connects the receive pins on the first device to the receive pins on the second device.

It connects the transmit pins on the first device to the receive pins on the second device.

It disconnects the transmit pins and uses only the receive pins.

It uses the same pins for transmitting and receiving.


Bottom of Form

32 Top of Form
What data communication technology uses low-power radio waves to transmit data?
copper cable

fiber optic cable

wireless

radio
Bottom of Form

33 Top of Form
After issuing the ipconfig/all command on a host that has DHCP enabled, a network administrator notes that the
output contains faulty IP configuration information. What is the first step the administrator should take to resolve
this issue?
Replace the NIC in the host.

Change the IP address of the DHCP server.

Use static addressing to assign the correct IP address.

Use the release and renew options supported by the ipconfig command.
Bottom of Form

34 Top of Form
What are two examples of peripheral input devices? (Choose two.)
external modem

barcode reader

digital camera

plotter

printer
Bottom of Form

35 Top of Form
A college network administrator is planning a wireless LAN to provide service in the student lounge and outdoor
patio. The requirements include a range of at least 80 meters and a speed of 30 Mb/s. Which wireless LAN
standard meets these requirements?
802.11

802.11a

802.11b

802.11g
Bottom of Form

36 Top of Form
A local PC has the correct configuration that is required to access the network. A ping command that is sourced
at the PC does not receive a response from a remote device. Which operating system command might be used to
determine where the connection failed?
netstat

tracert

ipconfig

nslookup
Bottom of Form

37 Top of Form
A home user is looking for an ISP connection that provides high speed digital transmission over regular phone
lines. What ISP connection type should be used?
DSL

dial-up

satellite

cell modem

cable modem
Bottom of Form

38 Top of Form
Which of the following statements best describes DNS?
DNS servers are used to map an IP address to a physical address.

DNS servers are used to map a name to an IP address.

DNS servers are used to configure logical address information for host computers.

DNS servers are used to translate from private addresses to public addresses.
Bottom of Form

39 Top of Form
For the TCP/IP model for internetwork communication, which statement describes the process for the transition
of data from the internet layer to the network access layer?
An IP packet is encapsulated in a frame.

A TCP segment is placed in an IP packet.

HTML data is encapsulated in a TCP segment.


A frame is placed on the network media as encoded bits.
Bottom of Form

40 Top of Form
What does the term "attenuation" mean in data communication?
loss of signal strength as distance increases

time for a signal to reach its destination

leakage of signals from one cable pair to another

strengthening of a signal by a networking device


Bottom of Form

41 Top of Form
A network administrator has been notified that users have experienced problems gaining access to network
resources. What utility could be used to directly query a name server for information on a destination domain?
ping

tracert

netstat

ipconfig

nslookup
Bottom of Form

42 Top of Form
Which protocol is used to transfer files among network devices and perform file-management functions?
DNS

FTP

HTML

HTTP
Bottom of Form

43 Top of Form
What is the purpose of pop-up blocker software?
It detects and removes spyware.

It detects and removes viruses.

It prevents the display of advertisement windows.


It removes unwanted e-mail.
Bottom of Form

44 Top of Form

Refer to the exhibit. The security policy of an organization allows employees to connect to the office intranet
from their homes. Which type of security policy is this?
acceptable use

incident handling

network maintenance

remote access
Bottom of Form

45 Top of Form
TCP/IP data transmission between the source and destination host is encapsulated in four steps:

A. adds the data-link header and trailer;


B. converts data to bits for transmission;
C. adds the network IP address to the header of the packet;
D. segments the data for end-to-end transport.

What is the correct sequence of these steps?


A, B, C, D

A, D, B, C

B, D, A, C

D, C, A, B

D, C, B, A
Bottom of Form
Top of Form
Top of Form
3

Bottom of Form

Bottom of Form
46 Top of Form
When are leased lines typically used?
when low bandwidth is required

for home and small business connectivity

when a dedicated digital data line is necessary

as a less expensive option to cable and DSL modem service


Bottom of Form

47 Top of Form
When terminating a UTP cable, why is it important to push the wires all the way into the end of the connector?
to allow the cable to endure more stretching or twisting

to ensure good electrical contact

to ensure that the wires are in correct order

to minimize crosstalk
Bottom of Form

48 Top of Form
What is the default subnet mask for an IP address of 64.100.19.14?
255.0.0.0

255.255.0.0

255.255.255.0

255.255.255.255
Bottom of Form

49 Top of Form
Which network design layer provides a connection point for end user devices to the network?
access

core
distribution

network
Bottom of Form

50 Top of Form
In IP telephony, what is the purpose of a gateway to the PSTN?
to connect IP voice clients to Internet phone service

to create a peer-to-peer connection between two IP voice clients

to map unique names of IP voice endpoints to a client list on a voice server

to allow IP voice clients to communicate with regular analog telephones.


Bottom of Form

51 Top of Form
What is a service pack?
an access policy

an agreement between a company and a vendor

a piece of code created to fix one specific problem

a collection of patches and updates released by a vendor

a small piece of software designed specifically for security issues


Bottom of Form

52 Top of Form
A home user was successfully browsing the Internet earlier in the day but is now unable to connect. A ping
command from a wireless laptop to a wired PC in the LAN is successful, but the nslookup command fails to
resolve a website address. The user decides to analyze the LEDs on the Linksys router to verify connectivity.
Which LED should be of main concern in this situation?
WLAN LED

power LED

Internet LED

1-4 Ethernet LEDs


Bottom of Form

Top of Form
Top of Form
4
Bottom of Form

Вам также может понравиться