Jumat, 08 Maret 2013

Final Exam CCNA Discovery: Networking for Home and Small Businesses (Version 4.0)

Final Exam CCNA Discovery: Networking for Home and Small Businesses (Version 4.0)

Cisco CCNA

1.  What is the default subnet mask for the IP address

2.  When terminating a UTP cable, why is it important to push the wires all the way into the end of the connector?
*to ensure good electrical 

3. Refer to the exhibit. The security policy of an organization requires users to change their password every week. Which type of security policy is this?
* password

4.  Two switches are interconnected in the same wiring closet. What type of cable is typically used for this connection?
*UTP crossover

5.  Some new features are available for the OS that is currently running on a user's PC. What method should be chosen so that the user can install these new feature sets?

6.  Refer to the exhibit. Assume that the command output is from a wireless DHCP client that is connected to a Linksys integrated router. What can be deduced from the output?
*The wireless connection is operational.

7.  Which two causes of networking problems are related to the physical layer? (Choose two.)
*damaged cables and connectors
 *overheated components

TCP/IP data transmission between the source and destination
host is de-encapsulated in four steps:
A. The TCP header is removed.
B. Bits are decoded and the destination MAC address is recognized.
C. The IP header is removed and the contents are passed to the next layer.
D. The Ethernet header and trailer are removed.
8.  What is the correct sequence of these steps?
*B, C, D, A * (almost sure)

9.  Which type of network supports DHCP and DNS services for network users in a network domain?
*ad hoc

10.  Which of the following statements best describes DNS?
*DNS servers are used to map a name to an IP address.

11.  A computer joins the network and announces itself to all hosts on the LAN. What type of message does the computer send out?

12.  When NAT is employed in a small office, which address type is typically used for hosts on the local LAN?
*private IP addresses

13.  How do ISPs obtain public IP addresses?
*They obtain the addresses from the Internet registry.

14.  Which value would be considered the physical address for data that is sent across an Ethernet segment?
*MAC address

15.  What is true about a wireless access point that is equipped with an omnidirectional antenna?
*radiates the signal equally in all directions

16.  Which wireless protocol is used for encryption?

17.  A technician can ping the public registered IP address of www.cisco.com but cannot successfully ping the URL address www.cisco.com from a host computer. Which software utility can the technician use to diagnose the problem?

18.  Refer to the exhibit. A network technician is statically assigning an IP address to a PC. The default gateway is correct. What would be a valid IP address to assign to the host?

19.  What two commands can be used to form a new binding if client information does not agree with the DHCP client table? (Choose two.)
*ipconfig /release
* ipconfig /renew

20.  Which statement accurately describes a recommended strategy for end users to employ when they interact with a help desk technician?
*Provide as much information about the problem as possible.

21.  A home user was successfully browsing the Internet earlier in the day but is now unable to connect. A ping command from a wireless laptop to a wired PC in the LAN is successful, but the nslookup command fails to resolve a website address. The user decides to analyze the LEDs on the Linksys router to verify connectivity. Which LED should be of main concern in this situation?
*1-4 Ethernet LEDs

22.  Refer to the exhibit. An organization needs to connect PC systems that use private IP addressing to the Internet. The organization has multiple systems that need to access the Internet, but were only able to purchase one public IP address. What should be activated on the Linksys integrated router to achieve this goal?

23.  What is a function of NAT when it is configured on a firewall appliance?
*prevents or allows access to specific application types based on port numbers

24.  Which protocol is used to transfer files among network devices and perform file-management functions?

25.  Which statement is true concerning stateful packet inspection?
*Access is permitted only if it is a legitimate response to a request from an internal host.

26. Which network design layer provides a connection point for end user devices to the network?

27.  What two pieces of information should a help desk technician document while troubleshooting connectivity issues with an end user? (Choose two.)
*if the user can ping the default gateway address
*whether the PC uses dynamic or static IP addressing

28.  As an assignment, a computer science student needs to present data in binary format. What are the two possible values that the student can use? (Choose two.)

29.  Why would a corporate web server be assigned a public IP address instead of a private IP address?
 *The public address can be routed on the Internet.

30.  What are two examples of peripheral output devices? (Choose two.)

31.  Refer to the exhibit. What is the purpose of assigning a network name of University?
*It identifies the wireless LAN.

32.  What is an advantage of purchasing a custom-built computer?.
*The user can specify high-performance components to meet specific needs.

33.  What is specified by the network number in an IP address?
*the network to which the host belongs

34.  After attaching four PCs to the switch ports, configuring the SSID and setting authentication properties for a small office network, a technician successfully tests the connectivity of all PCs that are connected to the switch and WLAN. A firewall is then configured on the device prior to connecting it to the Internet. What type of network device includes all of the described features?
*ISR router

35.  What is a major characteristic of asymmetric Internet service?
*Download speeds are faster than upload speeds.

36.  Which two components are necessary for a wireless client to be installed on a WLAN? (Choose two.)
 *wireless NIC
 *wireless bridge

37.  Which two statements are true about network applications? (Choose two.)
Microsoft Word is an example of a network application.
*Network applications are accessible from a remote computer..
*Network applications are installed on a network server.

38.  Refer to the exhibit. Assume that the exhibited output is from a host that is connected to a Linksys integrated router. What is the first thing that should be checked if using a bottom-up troubleshooting approach?
*the link status LED on the front of the router

39.  or devices that do not autosense, which connection requires a crossover cable?
*PC port to PC port

40.  Which type of computer has an integrated mouse?

41.  Which Windows command is used to display the configured IP address, subnet mask, and default gateway?

42.  Users are complaining that they get no response from a new application server. What tool would determine if the client application is successfully connecting to the application on the new server?

43.  Which function is available on the network when TCP is used as the transport protocol?
 *traffic encryption

44.  For the second time in a week, workstations on a LAN are not able to log into the server. The technician fixed the problem the first time, but cannot remember the steps taken to solve it. What aspect of the troubleshooting process has the technician neglected?
*documenting the troubleshooting process

45.  What destination IP address is used in a unicast packet?
*a specific host

46.  Refer to the exhibit. Why would a network administrator use the network mode that is shown?
*to support hosts that use different 802.11 standards

47.  Which of the following are transport layer protocols of the TCP/IP model? (Choose two.)

48.  A network designer is working with a small company to determine the network type best suited to the needs of the company. Which two characteristics could the designer use to describe a peer-to-peer network to the owner of the company? (Choose two.)
*easy to install
*low cost

49.  Which picture shows a USB port on a PC?

50.  A user is unable to send e-mail. To begin troubleshooting this problem, the network technician uses the browser on the PC and tries to access some popular Internet websites. Which troubleshooting approach is being followed?
* top-down

2 komentar:

  1. Some new features are available for the OS that is currently running on a user's PC. What method should be chosen so that the user can install these new feature sets? home business network

  2. +Jade Graham Some new features are available for the OS that is currently running on a user's PC. What method should be chosen so that the user can install these new feature sets?
    the answer is upgrade


Masukkan komentar anda jika perlu , Salam dari DSHAREE