SOAL-SOAL PENDIDIKAN AGAMA ISLAM KELAS XI

PENDIDIKAN AGAMA ISLAM

Kelas XI

 

 

 

  1. Di bawah ini merupakan carara berlomba dalam kebaikan, kecuali
    1. Dengan cara memilih ketaatan yang benar
    2. Dengan cara bersegera dalam kebajikan
    3. Dengan cara lebih berkelanjutan
    4. Dengan cara menampilkan kebajikan kita

       

  2. Diantara fungsi berlomba dalam kebaikan adalah
    1. Untuk menghindari kejelekan dan menjalankan kebajikan
    2. Agar semua manusia tidak berlaku semena-mena
    3. Agar umat islam selalu memperhatikan hak-hak orang lain
    4. Untuk menghindari iri dengki

       

  3. Siapakah kaum du’afa itu ?
    1. Kaum du’afa adalah kaum yang tertindas
    2. Adalah Orang yang bodoh dan malas termasuk kaum du’afa
    3. Kaum du’afa adalah orang yang tidak sanggup membahagiakan orang lain
    4. Kaum du’afa adalah mereka yang tak mampu berbuat kebajikan

     

  4. Bagaimana sikap kita terhadap kaum du’afa
    1. Biasa-biasa sebab mereka pasti di tolong Allah
    2. Menolong dan menyantuninya
    3. Membiarkannya karena mereka termasuk kelompok pemalas
    4. Membiarkannya sebab mereka sengaja memilih menjadi kaum du’afa

       

  5. Mengapa kita tidak boleh memubadzirKan harta benda.
    1. Sebab harta merupakan titipan
    2. Sebab memubazirkan harta termasuk teman syetan
    3. Sebab mubadzir termasuk perbuatan yang makruh
    4. Sebab harta benda wajib di pertahankan
      1. Dibawah ini merupakan tanda-tanda beriman kepada rasulullah saw, kecuali
        1. Selalu taat pada perintah rasul
        2. Mejauhi apa yang dilarang oleh rasul
        3. Tidak mendahulukan hukum buatan manusia atas sunnah rasul.
        4. Mengganti sunah ttg kemasyarakatan tersendiri sesuai hak-hak manusia 

           

      2. Dibawah ini merupakan sifat-sifat rasul kecuali
        1. Sidik b. fatonah c. amanah d. tablig

           

      3. Bagaimana cara meneladani sifat-sifat rasul
        1. Sudah cukup dengan cara mengagumi sikap-sikap rasul yang agung
        2. Dengan cara meniru segala apa yang rasul perbuat dengan sekuat kemampuan
        3. Memilih sikap-sikap rasul yang sesuai dengan hak azasi kemanusiaan
        4. Memuji rasul Karena memiliki sikap yg baik

       

      1. Apa hikmah mengimani sifat-sifat rasul..
        1. Dapat meniru sikap rasul tersebut
        2. Mendapatkan pujian 
        3. Meningkatkan pemahaman tentang ketuhanan
        4. Membuat orang lain sadar akan kerasulan Muhammad saw

           

      2. Ciri-ciri rasul bersifat tablig adalah
        1. Rasul selalu dapat dipercaya
        2. Tak pernah berdusta
        3. Rasul tak pernah tidak menyampaikan perintah Allah walaupun sangat berat 
        4. Kecerdasan rasul yang sangat tinggi

       

       

Soal Ujian Semester Ganjil SMK kelas XI mata pelajaran Pendidikan Agama Islam 2012

Latihan Soal
Pendidikan Agama Islam Kelas XI
 
* Silang ( x ) huruf a, b, c, d, dan e pada jawaban yang benar !
1.       Berikut ini termasuk perilaku muslim / muslimah dalam mengamalkan Q.S. Al-Baqoroh : 148 kecuali :
a.       Dalam mengerjakan sholat berkiblat pada Baitullah (Ka’bah)
b.       Berlomba dalam mencari riski yang bermanfaat
c.       Berlomba dalam menuntut ilmu yang bermanfaat
d.      Berlomba dalam mewujudkan kebersihan, keamanan dan ketertiban
e.       Berlomba dalam memberi kepuasan pada atasan yang dicintai
2.       Potongan ayat Q.S. Al Baqoroh 148 ﺕﺮﻴﺨﻟﺍﻮﻘﺒﺘﺳﺎﻓ berisi perintah Allah :
a.       Wajib menuntut ilmu                          d. Berbuat baik terhadap lingkungan
b.      Disiplin terhadap waktu                     e. Berlomba dalam kebaikan
c.       Berbakti kepada orang tua                
3.       Kelompok Umat Islam yang perbuatan baiknya sebanding dengan perbuatan jahatnya disebut :
a.  Dzolimun Linafsihi                 c.  Muqtasidun                                                e. Muflis
b.  Sabiqul Khoirot                       d.  Mufsid                              
4.       Menyantuni kaum dhuafa’ (golongan orang-orang lemah ) menurut Al-Qur’an berupa :
a.  Infaq                                        c.  Zakat                                              e.  a, b, c, d semua benar
b.  Shodaqoh                                d. Motivasi / Pengarahan                               
5.       Ciri-ciri iman yang benar menurut Q.S. Al Baqoroh 177 antara lain, kecuali :
a.  beriman kepada Allah, kepada Nabi, Malaikat, Kitab-kitab Allah
b.  memberi / mendermakan harta yang dicintai kepada para dhuafa’
c.  mendirikan sholat dan zakat
d.  menepati janji dan bersabar dalam menerima cobaan Allah
e.  berbaik sangka pada Allah (Husnuddhon)
6.       Orang-orang yang boros (mubadzir) adalah saudara syaithan dijelaskan dalam Al-Qur’an Surat :
a.  Al-Isro’ 26                               c.  Al-Baqarah 148                              e. Semua benar           
b.  Al-Isro’ 27                              d. Al-Baqarah 177                 
7.       Orang-orang yang tidak berhak menerima zakat adalah :
a.  Fakir                                        c.  Muallaf                                           e. Muzakki                 
b.  Miskin                                     d. Ibnu Sabil                                                  
8.       Kalimat ﺍﺫﺍﻤﻫﺪﻬﻌﺑﻥﻮﻓﻮﻤﻟﺍﻭ yang terdapat dalam Al-Qur’an Al Baqoroh 177               artinya :
a.  orang-orang yang meminta-minta                               d.  orang-orang berjuang di jalan Allah
b.  orang-orang yang menepati janji                                 e.  orang yang menyantuni anak yatim
c.  dan orang (memerdekakan) hamba sahaya    
9.       Berikut ini cara mengimani rosul-rosul Allah kecuali :
a.  yakin bahwa rosul itu bukan manusia biasa                d.  meneladani kehidupannya
b.  yakin bahwa ajaran yang dibawa rosul itu benar        e.  memuji dan mendoakannya
c.  mengikuti semua ajarannya
10.   Secara bahasa rosul berarti
a.  pembawa berita                       c.  pilihan                                             e.  terpuji
b.  utusan                                      d.  terpelihara
11.   Gelar Ulul Azmi diberikan pada para rosul yang mempunyai :
a.  cobaan yang berat diterima                           d.  suri tauladan yang baik
b.  umur hingga beratus tahun                            e.  ketabahan, kesabaran dan keteguhan yang tinggi
c.  mukjizat yang besar yang tidak terkalahkan
12.   Di bawah ini fungsi Nabi dan Rosul kecuali :
a.  sebagai pemberi rahmat kepada seluruh alam
b.  sebagai pemberi kabar gembira dan peringatan
c.  sebagai pembawa kebenaran agar umatnya mendapat petunjuk
d.  sebagai contoh suritouladan yang baik
e.  sebagai pembeda yang hak dan yang batil
13.   Ucapan, tindakan, perilaku dan segala ketetapan rosul disebut :
a.  Al-Qur’an        b.  Al-Hadits               c.  Ijtihad         d.  Ijmak          e.  Qiyas
14.   Nabi Muhammad SAW, sebagai uswatun hasanah yang artinya :
a.  terpercaya                                            d. mempunyai akhlaq yang mulia
b.  jujur                                                     e. contoh suritouladan yang baik
c.  amanah
15.   Nabi Muhammad SAW, mendapat kedudukan tertinggi diantara semua rosul karena ……
a.  merupakan Nabi terakhir
b.  mendapat mukjizat yang besar yaitu Al-Qur’an
c.  di utus untuk seluruh alam semesta
d.  menyempurnakan syariat Nabi-nabi sebelumnya
e.  rosul terakhir yang diutus untuk seluruh alam dan menyempurnakan syariat Nabi sebelumnya
16.   ﺀﺎﻴﺒﻧﻻﺍﺓﺭﻮﺳ.ﻦﻴﻠﻌﻠﻟﺔﻤﺣﺭﻻﺇﻚﻨﻠﺳﺭﺍﺎﻣ
terjemahan dari firman Allah tersebut :
a.  Dan aku tidak mengutus Engkau Muhammad kecuali sebagai penyempurnaan Alam
b. Dan  Kami  tidak mengutus Engkau Muhammad kecuali sebagai pembawa rahmat terhadap seluruh alam semesta
c.  Dan aku tidak akan utus Engkau Muhammad kecuali sebagai pembawa berita gembira
d.  Muhammad sebagai penyempurna akhlaq
e.  Aku utus Engkau Muhammad sebagai pemberi rahmat terhadap seluruh alam
17.   Nabi yang diberi gelar Abul Basyar (Bapak dari Jagad Alam Raya ) ini adalah :
a.       Nabi Adam a.s.                                   d.  Nabi Muhammad SAW
b.      Nabi Musa a.s.                                                e.  Nabi Ibrahim a.s.
c.       Nabi Nuh a.s.
18.   Firman Allah yang diturunkan dan disampaikan kepada Nabi dan Rosul disebut :
a.  Kalamullah                              c.   Mukjizat                            e. Irhas                                  
b.  Toufiq                                     d.  Wahyu                                          
19.   Rosul memiliki sifat wajib tabligh yang artinya :
a.  jujur                                         c.  cerdas                                 e.  dapat dipercaya
b.  setia                                         d.  menyampaikan
20.   Rosul yang memiliki sifat mustahil kitman artinya :
a.  bodoh                                      c.  dusta                                   e. menyembunyikan
b.  khiyanat                                  d.  dungu        
21.   Taubat berasal dari Bahasa Arab yang artinya :
a.  kembali            b.  patuh            c.  pasrah              d.  taat                  e. mengadu
22.   Dibawah ini syarat taubat yang diterima oleh Allah, kecuali :
a.  menyesali perbuatan dosa yang sudah dilakukan
b.  melakukan sholat malam
c.  berjanji tidak akan berbuat dan mengulangi dosa tersebut
d.  memohon ampun (beristighfar) kepada Allah
e.  selalu melakukan amalan yang baik
23.   Orang yang bertaubat dengan disertai niat tidak akan mengulangi perbuatan dosa yang pernah dilakukan, namun dia sering tidak berdaya melawan nafsu untuk berbuat dosa, orang semacam ini tergolong dalam nafsu :
a.  Mutmainnah                b.  Lawwamah            c.  Musawalah             d.  Amarah       e.  Syahw
24.   Seseorang yang beribadah dengan mengharapkan ridho dan pertolongan Allah serta yakin segala keinginan dapat diraih disebut :
a.  Raja’                b.  Optimis                  c.  Tawakkal                d.  Qonaah                 e.  Ikhtiyah
25.   Orang yang berserah diri (pasrah) kepada Allah atas segala usaha yang telah dilakukan dengan maksimal disebut :
a.  Raja’                b.  Optimis                  c.  Tawakkal                d.  Qonaah                 e.  Ikhtiyah
26.   ﻦﻳﺮﻬﻂﺘﻤﻟﺍﺐﺤﻳﻭﻦﻴﺑﺍﻮﺘﻟﺍﺐﺤﻳﷲﺍﻥﺇ
Firman Allah ini kita temui dalam :
a.  Surat Al Baqoroh : 2               c.  Surat Al Baqoroh : 222                  e.  Surat Al Baqoroh : 120
b.  Surat Al Baqoroh : 22             d.  Surat Al Baqoroh : 122
27.   Allah pasti akan memberikan kemudahan sesudah kesulitan (QS At Talaq : 07 ) hal ini mengajarkan pada kita :
a.  dinamis dalam bekerja             c.  optimis dalam menghadapi kesulitan         e. seminar benar
b.  kreatif dalam berkarya            d.  inovatif dalam bekerja
28.   Orang yang merasa cukup dan bersyukur atas segala pemberian Allah dengan tidak seraka, serta dengan senang segala nikmat Allah disebut :
a.  Qonaah            b.  Tawakkal                c.  Taqwa                     d.  Sabar                     e.  Tekun
29.   Sikap selalu bekerja keras, ingin terus berkembang penuh kreasi, jauh dari malas dan selalu memiliki cita-cita (keinginan) ciri-ciri dari sifat :
a.  Rajak                                      c.  Pesimis                               e.  Jawaban a dan b benar
b.  Optimis                                   d.  Dinamis
41.  Yang disebut orang miskin adalah orang yang ….
a.  tidak memiliki rumah
b.  meminta-minta
c.  hidup di pelosok desa
d.  memiliki pekerjaan akan tetapi hasilnya tidak dapat mencukupi kebutuhan hidup sehari-hari
e. tidak memiliki pekerjaan clan penghasilan, sehingga hidupnya sangat tergantung dari bantuan orang lain
42.  Sedangkan yang dimaksud ibnu sabil adalah ….
a.  orang yang dalam perjalanan ke luar daerah         d.  orang yang hidupnya dihabiskan di jalanan
b.  turis maupun wisatawan dari luar negeri               e.  orang     yang    kehabisan   bekal   dalam
c.  orang yang berjuang di jalan Allah                             perjalanan jauh
44.  Orang yang berlaku boros adalah dilarang oleh agama, karena ….
a.  dapat menyebabkan kemiskinan                                 d.  pemboros  adalah  orang yang  lupa
       b.  dapat menyebabkan kehabisan harta benda                     pada fakir miskin                          
c.  pemboros adalah salah satu saudaranya setan             e.  menjadikan orang berlaku kikir
45.  Pada hakikatnya harta benda yang kits miliki sebagian adalah milik orang lain, yaitu sebanyak ….
a.  20%                 b.  10%                        c. 5%               d.  2,5%           e. 1%             
46.  Yang disebut kebajikan, sesungguhnya adalah ….
a.  orang yang rajin salat
b.  orang berlaku adil
c.  orang yang beriman dan beramal saleh Berta peduli kepada kaum duafa
d.  orang yang memiliki kekuasaan dan berakhlak baik
e.  orang yang memiliki jabatan dan bisa memahami kehenclak rakyat dan masyarakatnya
47.  Yang dimaksud hamba sahaya adalah ….
a.  seorang pembantu                               c.  seorang TKI                                   e. para gelandangan
b.  seorang tukang kebun                         d.  seorang budak pada zaman dulu
48.  Di bawah ini adalah yang disebut kebajikan, kecuali ….
a.  menyantuni fakir miskin                                      c.  mendirikan salat             e. menepati janjinya
b.  menyumbang pada acara resepsi pernikahan      d.  membayarzakat
 

 

52.  Tersebut di bawah ini adalah contoh-contoh dari perbuatan/amal yang saleh, kecuali ….
a.  menolong orang tua dalam menyeberang jalan      d.  bekerja keras untuk memupuk kekayaan
b.  menyantuni anak yatim                                           e.  berzikir pada-Nya di setiap amal
c.  menghormati orang tua dan para guru                        perbuatannya                                     
53. Ketika seseorang berbuat doss, kemudian tidak pernah merasa menyesal, bahkan justru bangga dengan menceritakan kepada kawan-kawannya, make orang tersebut tergolong ….
a.  sabiqun bil khairat                               c.  muqtasyidun                       e.  jihad fi sabilillah
b.  fastabiqul khairat                                d.  dalimun linafsihi
54.  Mustafa al Maraghi membagi orang yang mengamalkan Alquran menjadi …. kelompok.
a.  dua                  b.  tiga                          c. empat            d. lima               e. enam       
55.  Iman kepada rasul-rasul Allah, hukumnya adalah ….
a.  fardu ain                                  c.  sunah muakkad                              e.  makruh
b.  fardu kifayah                          d.  sunah gairu muakkad
56.  Iman kepada rasul adalah salah satu rukun iman yang ke ….
a.  satu                  b.  dua                             c. tiga                      d. empat              e. lima        
57.  Iman kepada rasul adalah urutan rukun iman, setelah iman kepada ….
a.  malaikat-malaikat-Nya            c.  Allah swt.                           e.  hari kiamat
b.  kitab-kitab-Nya                       d.  qada dan qadar
 
58.  Nabi adalah orang yang mendapatkan wahyu dari Allah swt., untuk ….
a.  dirinya sendiri                                     c.  kerabatnya                             e. diri dan umatnya
b.  keluarganya                                         d.  umatnya
59.  Perbedaan antara nabi dengan rasul terletak pada ….
a.  keturunannya                                   d.  kewajiban menyampaikan wahyu-Nya kepada orang lain
b.  jenis kelaminnya                              e.  pemberi wahyunya
c.  suku bangsanya
60. Rasul  di  dalam  menerima  wahyu dari Allah swt. melalui beberapa cara, antara lain melalui malaikat penyampai wahyu yang bernama ….
 a.  Adam a.s.                   b.  lzrail                       c. Israfil                       d. Jibril            e. Mikail
61.  Di antara para rasul ada yang diberi gelar ulul azmi, artinya adalah yang memiliki ….
a.  harta melimpah                                    c.   kekuatan batin                   e. mukjizat
b.  akhlak mulia                                        d.  keteguhan hati
62.  Di bawah ini adalah hak-hak nabi dan rasul, kecuali ….
a.  ditaati segala sunah, ketetapan dan didahulukan ketetapan atas yang lain
b.  diperlakukan secara ikhlas, jujur dan tulus
c.  dihormati sesuai dengan kedudukannya yang mulia dan agung
d.  dikultuskan segala sesuatunya, karena dia bukan manusia biasa
e.  dibacakan selawat atasnya
63.  Rasul memiliki sifat wajib tablig, artinya ….
a.  benar                                        c.  dapat dipercaya                              e. menyampaikan
b.  besar                                        d.  cerdas dan tangkas
64.  Rasul juga memiliki sifat mustahil antara lain kitman, artinya ….
a.  berdusta                                   c.  menyembunyikan                           e.  dungu
b.  berkhianat                               d. bodoh
65. Dengan mempergunakan tongkatnya bisa membelah laut menjadi sebuah jalan adalah mukjizat Nabi….
a.  Isa a.s.            b.  Musa a.s.         c. Daud a.s.              d. Sulaiman a.s.         e. Muhammad saw.
66.  Mukjizat yang terbesar dan terbaik yang ada pada Nabi Muhammad saw. adalah ….
a.  dari jari-jarinya bisa keluar air                         d.  mendapatwahyu Alquran
b.  orangnya sakti mandraguna                            e.  dibelah dadanya tidak mati
c.  bisa terbang ke langit tingkat tujuh
67.  Di bawah ini adalah para nabi yang mendapat gelar ulul azmi, kecuali Nabi ….
a.  Adam a.s.        b.  Nuh a.s.                  c. Musa a.s.                 d. Isa a.s.         e. Ibrahim a.s. 
68.  Berikut ini adalah beberapa macam cara rasul menerima wahyu dari Allah swt., kecuali ….
a.  melalui malaikat Jibril yang menyerupai seseorang
b.  Allah berfirman dari batik hijab
c.  dengan cara membisikkan wahyu ke dalam jiwa seseorang
d.  melalui malaikat Malik yang menyerupai laki-laki tampan
e.  dengan cara mimpi yang benar
69.  Nabi yang mendapat gelar khatamul anbiya’ adalah ….
a.  Ibrahim a.s.                  b.  Musa a.s.                c. Isa a.s.         d. Nuh a.s.       e. Muhammad saw.
70.  Nabi yang dilahirkan tanpa seorang ayah, bernama ….
a.  Musa a.s.         b.  Isa a.s.                    c. Ibrahim a.s.              d. Muhammad saw.    e. Ismail a.s.
71.  Nabi yang disembelih oleh ayahnya bernama ….
a.  Musa a.s.         b.  Isa a.s             c. Ibrahim a.s.               d. Ismail a.s.            e. Muhammad saw.
72.  Nabi Daud a.s. menerima kitab suci yaitu ….
a.  Zabur                                       c.  Injil                         e.  Riyadhus shalihin
b.  Taurat                                      d.  Alquran
73.  Yang diberi kitab Taurat adalah Nabi ….
a.  Musa a.s.         b.  Isa a.s.                    c. Daud a.s.        d. Muhammad saw.             e. Adam a.s.
74.  Nabi yang dibakar tidak mempan adalah contoh mukjizat yang disebut mukjizat ….
a.  kauniyah          b.  syahsiyah                c.  salbiyah            d.  akliyah             e. nakliyah     
75.  Contoh mukjizat akliyah adalah ….
a.  Ibrahim a.s. dibakar tidak mempan
b.  tongkat Nabi Musa a.s. berubah menjadi ular raksasa
c.  jari-jari Nabi Muhammad saw. keluar air
d.  Nabi Nuh a.s. mampu membuat perahu
e.  kitab suci Alquran sebagai pedoman hidup manusia
76. Sesungguhnya Allah swt. banyak mengutus nabi di dunia ini, akan tetapi yang wajib kita yakini berdasarkan dalam Alquran berjumlah ….
a.  25 orang          b.  30 orang                 c.  35 orang                 d.  40 orang                e.  45 orang
77.  Berikut adalah empat sifat wajib bagi rasul, kecuali ….
a.  sidik                 b.  kitman                    c.  tablig                      d.  fatanah                  e.  amanah
78.  Sifat wajib bagi rasul adalah cerdas dan tangkas, yaitu ….
a.  sidik                 b.  kitman                    c.  tablig                      d.  fatanah                  e.   amanah
79.  Sifat ma’sum dimiliki pula oleh para nabi clan rasul, ma’sum artinya adalah dijauhkan dari ….
a.  kebodohan       b.  kesusahan               c. dengki                     d.  suka marah            e. dosa
 
 
   

82.  Nabi yang tergolong ulul azmi ada ….

a.  tiga                    b.  empat           d.  enam              c. lima                  e. tujuh           
83.  Di bawah ini yang bukan ulul azmi adalah Nabi ….
a.  isa a.s.              b.  Musa a.s.    c. Ibrahim a.s.              d. Ismail a.s.                e. Muhammad saw.
84.  Salah satu keajaiban/mukjizat Nabi Isa a.s. adalah bisa ….
a.  membelah bulan                                  d.  tidak mempan ketika dibakar
b.  membelah laut                                     e.  melihat ketika bayi
c.  berbicara ketika bayi
85.  Rasul dalam menjalankan tugas kerasulannya dibekali dengan mukjizat, yang berguna untuk ….
a.  menakut-nakuti lawannya               e.  menarik simpati umatnya dengan ilmu kesaktiannya
b.  membunuh musuh-musuhnya        d.  sebagai bukti kalau dirinya benar-benar utusan Allah swt.
c.  menunjukkan kesaktiannya
86.  Rasul memiliki sifat tablig, yaitu ….
a.  menyampaikan wahyu                         c.  dapat dipercaya      e.   jujur
b.  cerdas/tangkas                                     d.  pandai
87.  Rasul memiliki sifat wajib fatanah, maka mustahil rasul bersifat ….
a.  kitman                                     c.  kizib                                    e.  laknat
b.  baladah                                    d.  khianat
88.  Pada diri rasul terdapat uswatun hasanah, artinya ….
a.  keluarga yang baik-baik          c.  kedudukan yang mulia       e.  jiwa dan raga yang sempurna
b.  keturunan yang baik                d.  teladan/contoh yang baik

DHomesb Final Exam – CCNA Discovery: Networking for Home and Small Businesses (Version 4.0) 2013

1. After attaching four PCs to the switch ports, configuring the SSID and setting authentication properties for a small office network, a technician successfully tests the connectivity of all PCs that are connected to the switch and WLAN. A firewall is then configured on the device prior to connecting it to the Internet. What type of network device includes all of the described features?
switch
ISR router
firewall appliance
standalone wireless access point
2
How do ISPs obtain public IP addresses?
They create the addresses themselves.
They obtain the addresses from the home PCs.
They obtain the addresses from the Internet registry.
They obtain the addresses from the RFC.
3
Which wireless protocol is used for encryption?
EAP
Open
PSK
WEP
4

Refer to the exhibit. Why would a network administrator use the network mode that is shown?

to support hosts on different IP networks
to support hosts that use different 802.11 standards
to support both wireless and wired Ethernet hosts
to support hosts with different operating systems
to support hosts with network cards from different manufacturers
5
A computer joins the network and announces itself to all hosts on the LAN. What type of message does the computer send out?
broadcast
simulcast
multicast
unicast
6

Refer to the exhibit. Assume that the exhibited output is from a host that is connected to a Linksys integrated router. What is the first thing that should be checked if using a bottom-up troubleshooting approach?

the default gateway on the host
the IP address on the host
the IP address on the router
the link status LED on the front of the router
the subnet mask on the host
7
For the second time in a week, workstations on a LAN are not able to log into the server. The technician fixed the problem the first time, but cannot remember the steps taken to solve it. What aspect of the troubleshooting process has the technician neglected?
identifying the problem
asking end-users questions
documenting the troubleshooting process
using structured techniques to solve a problem
8

Refer to the exhibit. What is the purpose of assigning a network name of University?

It enables access to the AP configuration GUI by name rather than by address.
It encrypts data between the wireless client and the AP.
It identifies the wireless LAN.
It translates an internal address or group of addresses to a public address.
It translates IP addresses into easy-to-remember domain names.
9
What two pieces of information should a help desk technician document while troubleshooting connectivity issues with an end user? (Choose two.)
the CPU clock speed of the computer
the number of network jacks that are in the room
if the user can ping the default gateway address
if the word processing software is installed correctly
whether the PC uses dynamic or static IP addressing
10
When NAT is employed in a small office, which address type is typically used for hosts on the local LAN?
private IP addresses
global public IP addresses
Internet-routable addresses
both private and public IP addresses
11
What destination IP address is used in a unicast packet?
a specific host
a group of hosts
all hosts on the network
the network broadcast address

www.ceastercorp.blogspot.com

12
What is an advantage of purchasing a custom-built computer?
It is beneficial for less knowledgeable consumers.
The waiting period for assembly is negligible.
The cost is lower compared to a computer that has been preassembled.
The user can specify high-performance components to meet specific needs.
13
Which picture shows a USB port on a PC?
 <<<TRUE
14
Which of the following statements best describes DNS?
DNS servers are used to map an IP address to a physical address.
DNS servers are used to map a name to an IP address.
DNS servers are used to configure logical address information for host computers.
DNS servers are used to translate from private addresses to public addresses.
15
Which statement accurately describes a recommended strategy for end users to employ when they interact with a help desk technician?
Provide as much information about the problem as possible.
Expect first-level help desk technicians to solve the problem, because they are highly-trained personnel.
Hand over the problem to the help desk professionals, then do not interfere with them.
At the beginning of the call, ask for the name and number of the supervisor of the help desk technician.

 

At the beginning of the call, ask for the name and number of the supervisor of the help desk technician.

 

16
When terminating a UTP cable, why is it important to push the wires all the way into the end of the connector?
to allow the cable to endure more stretching or twisting
to ensure good electrical contact
to ensure that the wires are in correct order
to minimize crosstalk
17
What is specified by the network number in an IP address?
the network to which the host belongs
the physical identity of the computer on the network
the node of the subnetwork which is being addressed
the broadcast identity of subnetwork
18
Which type of computer has an integrated mouse?
desktop
laptop
mainframe
server
pocket PC
19
Which network design layer provides a connection point for end user devices to the network?
access
core
distribution
network
20
A network designer is working with a small company to determine the network type best suited to the needs of the company. Which two characteristics could the designer use to describe a peer-to-peer network to the owner of the company? (Choose two.)
central administration
easy to install
low cost
scalable
secure
21

Refer to the exhibit. The security policy of an organization requires users to change their password every week. Which type of security policy is this?

acceptable use
network maintenance
password
remote access
22
Which type of network supports DHCP and DNS services for network users in a network domain?
client/server
peer-to-peer
hierarchical
ad hoc
23
Which two causes of networking problems are related to the physical layer? (Choose two.)
damaged cables and connectors
incorrect addressing
incorrect subnet mask
overheated components
incorrect default gateway
24
Why would a corporate web server be assigned a public IP address instead of a private IP address?
The public address can be acquired at no cost.
The public address can be routed on the Internet.
The public address provides a security advantage.
The same public address can be used on multiple servers to prevent depletion of available IP addresses.
25
What two commands can be used to form a new binding if client information does not agree with the DHCP client table? (Choose two.)
ipconfig /release
ipconfig /all
ipconfig /flushdns
ipconfig /renew
ipconfig
6

Refer to the graphic. Assume that the command output is from a wireless DHCP client that is connected to a Linksys integrated router. What can be deduced from the output?

The wireless connection is good.
The WEP key or SSID needs to be checked.
The DHCP configuration on the router needs to be checked.
The wireless NIC driver or the NIC itself needs to be reinstalled.
27

Refer to the exhibit. A network technician is statically assigning an IP address to a PC. The default gateway is correct. What would be a valid IP address to assign to the host?

128.106.10.100
128.107.255.1
128.107.255.254
128.108.100.10
28
Which of the following are transport layer protocols of the TCP/IP model? (Choose two.)
FTP
UDP
SMTP
TFTP
TCP
29
Which two components are necessary for a wireless client to be installed on a WLAN? (Choose two.)
media
wireless NIC
custom adapter
crossover cable
wireless bridge
wireless client software
30
For devices that do not autosense, which connection requires a crossover cable?
hub port to router port
PC to hub port
PC to switch port
PC port to PC port
31
Which Windows command is used to display the configured IP address, subnet mask, and default gateway?
ipconfig
netstat
nslookup
tracert
32
As an assignment, a computer science student needs to present data in binary format. What are the two possible values that the student can use? (Choose two.)
0
1
2
A
F
33
Which value would be considered the physical address for data that is sent across an Ethernet segment?
IP address
port address
MAC address
network address
34
What is a function of NAT when it is configured on a firewall appliance?
prevents or allows access based on IP or MAC addresses
prevents or allows access to websites based on specific URLs or keywords
prevents or allows access to specific application types based on port numbers
provides the capability to recognize and filter out specific types of attacks such as DoS
translates an internal address or group of addresses into an outside, public address that is sent across the network
35
What are two examples of peripheral output devices? (Choose two.)
barcode reader
digital camera
external DVD
headphones
printer
36
Which statement is true concerning stateful packet inspection?
Access is permitted based on IP addresses of the source and destination devices.
Access is permitted based on the MAC addresses of the source and destination devices.
Access is permitted only if the type of application that is attempting to reach the internal host is allowed.
Access is permitted only if it is a legitimate response to a request from an internal host.
37
Users are complaining that they get no response from a new application server. What tool would determine if the client application is successfully connecting to the application on the new server?
ping
tracert
netstat
ipconfig
nslookup
38
Which function is available on the network when TCP is used as the transport protocol?
traffic encryption
best effort delivery
user authentication
delivery acknowledgement

 

39

Refer to the exhibit. An organization needs to connect PC systems that use private IP addressing to the Internet. The organization has multiple systems that need to access the Internet, but were only able to purchase one public IP address. What should be activated on the Linksys integrated router to achieve this goal?

authentication
DHCP
encryption
firewall
NAT
WEP
40
What is the default subnet mask for the IP address 128.107.23.10?
255.0.0.0
255.255.0.0
255.255.255.0
255.255.255.255
41
Two switches are interconnected in the same wiring closet. What type of cable is typically used for this connection?
UTP straight-through
multimode fiber
UTP crossover
coaxial

www.ceastercorp.blogspot.com

42
What is a major characteristic of asymmetric Internet service?
Download speeds and upload speeds are equal.
Download speeds are faster than upload speeds.
Data traffic speeds are faster than voice traffic speeds.
Used when consistently uploading large amounts of graphics, video and multimedia traffic.
43
TCP/IP data transmission between the source and destination host is de-encapsulated in four steps:

A. The TCP header is removed.

B. Bits are decoded and the destination MAC address is recognized.

C. The IP header is removed and the contents are passed to the next layer.

D. The Ethernet header and trailer are removed.

 What is the correct sequence of these steps?

A, B, C, D
A, C, B, D
B, C, D, A
B, D, C, A
C, A, B, D
44
Some new features are available for the OS that is currently running on a user’s PC. What method should be chosen so that the user can install these new feature sets?
clean install
multi-boot
upgrade
virtualization
45
What is true about a wireless access point that is equipped with an omnidirectional antenna?
concentrates signal in one direction
typically used in bridging applications
radiates the signal equally in all directions
provides the greatest transmission distance of all antenna types that are used by APs
46
Which troubleshooting technique can be used to quickly restore user functionality without having to spend much time identifying the exact problem?
top-down
bottom-up
substitution
trial and error
47
A home user was successfully browsing the Internet earlier in the day but is now unable to connect. A pingcommand from a wireless laptop to a wired PC in the LAN is successful, but the nslookup command fails to resolve a website address. The user decides to analyze the LEDs on the Linksys router to verify connectivity. Which LED should be of main concern in this situation?
WLAN LED
power LED
Internet LED
1-4 Ethernet LEDs
48
Which protocol is used to transfer files among network devices and perform file-management functions?
DNS
FTP
HTML
HTTP
49
Which two statements are true about network applications? (Choose two.)
Microsoft Word is an example of a network application.
Network applications are accessible from a remote computer.
Network applications are installed on a special type of computer that supports only network applications.
Network applications are installed on a network server.
Network applications are accessible by one computer at a time.
50
A technician can ping the public registered IP address of http://www.cisco.com but cannot successfully ping the URL address http://www.cisco.com from a host computer. Which software utility can the technician use to diagnose the problem?
Tracert
Ipconfig
Netstat
Nslookup

DHomesb Chapter final exam

DHomesb Final Exam – CCNA Discovery: Networking for Home and Small Businesses (Version 4.0) – Form 1

1

Refer to the exhibit. A PC requests an IP address from the server. Which two protocols are used at the TCP/IP application layer and the internetwork layer? (Choose two.)

DHCP
FTP
IP
TCP
UDP
2
TCP/IP data transmission between the source and destination host is de-encapsulated in four steps:A. The TCP header is removed.
B. Bits are decoded and the destination MAC address is recognized.
C. The IP header is removed and the contents are passed to the next layer.
D. The Ethernet header and trailer are removed.What is the correct sequence of these steps?
A, B, C, D
A, C, B, D
B, C, D, A
B, D, C, A
C, A, B, D
3
What is the function of the DNS server?
It assigns IP addresses to clients.
It accepts HTTP requests from clients.
It maps a hostname to a corresponding IP address.
It manages the domain that clients are assigned to.
4
Which two automatic addressing assignments are supported by DHCP? (Choose two.)
local server address
subnet mask
default gateway address
physical address of the recipient
physical address of the sender
5
What measurement is commonly used to describe communication speed when transferring data?
bps
cps
Hz
MB
6

Refer to the exhibit. A user on host A sends an e-mail to the user on host B. Which type of message does host A send?

broadcast
multicast
simulcast
unicast
7
As an assignment, a computer science student needs to present data in binary format. What are the two possible values that the student can use? (Choose two.)
0
1
2
A
F
8
Which term is associated with logical addressing?
IP addresses
port addresses
physical addresses
Media Access Control addresses
9
Which three statements describe an IP address? (Choose three.)
An IP address is known as a logical address.
An IP address uses a 30-bit addressing scheme.
An IP address is found in the Layer 2 header during transmission.
The network portion of an IP address is burned into a network interface card.
An IP address is unique within the same local network.
The network portion of an IP address will be the same for all hosts that are connected to the same local network.
10

Refer to the exhibit. Which option correctly represents the encapsulation of a packet that is sent by Host1 to the web server?

<<< TRUE
11
When are leased lines typically used?
when low bandwidth is required
for home and small business connectivity
when a dedicated digital data line is necessary
as a less expensive option to cable and DSL modem service
12
What are two advantages of purchasing a custom-built computer? (Choose two.)
usually a lower cost
no waiting period for assembly
user can specify higher performance components
supports higher-end graphics and gaming applications
fewer components to replace
13
What is an ISP?
It is a standards body that develops cabling and wiring standards for networking.
It is a protocol that establishes how computers within a local network communicate.
It is an organization that enables individuals and businesses to connect to the Internet.
It is a networking device that combines the functionality of several different networking devices in one.
14
Which statement accurately describes what network devices do in the distribution layer of the three layer design model?
They interconnect individual hosts.
They interconnect multiple companies.
They interconnect local network segments.
They interconnect the company network to the ISP.
15
Which network design layer provides hosts with initial connectivity to the network?
access
core
distribution
network
16
What statement describes the filtering of traffic via the use of Stateful Packet Inspection?
It recognizes and filters predefined URLs
It permits access that is based on the application.
It permits access based on IP or MAC addresses.
It permits incoming packets that are legitimate responses to requests from internal hosts.
It translates an internal address or group of addresses into a public address that is sent across the network.
17
What advantage does a peer-to-peer network have over a client-server network?
It increases security.
It increases scalability.
It produces a higher performance for hosts.
It eliminates the need for centralized administration.
18
After attaching four PCs to the switch ports, configuring the SSID and setting authentication properties for a small office network, a technician successfully tests the connectivity of all PCs that are connected to the switch and WLAN. A firewall is then configured on the device prior to connecting it to the Internet. What type of network device includes all of the described features?
switch
ISR router
firewall appliance
standalone wireless access point
19
Which portion of the packet does a router use to forward the packet to the destination?
source IP address
user data
destination IP address
control information
destination MAC address
20

Refer to the graphic. Based on the information that is shown, what statement is true?

This configuration would be commonly found in an ad hoc wireless network.
Any wireless client that is attached to this access point would have the same IP address and SSID.
All wireless devices that are connected to this access point must have an assigned SSID of Academy.
In addition to accepting wireless client requests, this access point must connect to the wired network.
21
What is the function of a physical topology map?
records IP addressing of each host
records hostnames and applications
organizes groups of hosts by how they use the network
shows where wiring is installed and the locations of network devices
22
Which value represents the host portion of IP address 128.107.10.11 with a subnet mask of 255.255.0.0?
.10
.10.11
128.107
.107.10.11
128.107.10
23
What is specified by the host bits in an IP address?
broadcast identity of the network
identity of the computer on the network
network that is being addressed
network to which the host belongs
24
What describes the external IP address that is obtained by a router through a cable or DSL modem?
a public address that is obtained from ICANN
a private address that is manually configured by the administrator
a public address that is obtained through DHCP from the ISP
a private address that converts to a public address on the internal LAN
25

Refer to the exhibit. Which pair of addresses would be appropriate to use for PC1 and PC2 to establish a workgroup using private addresses?

127.0.0.1 and 127.0.0.2
172.16.4.2 and 172.16.4.3
172.16.5.1 and 192.168.3.2
198.133.219.25 and 198.133.219.26
26
Under what circumstance would it be appropriate to use private IP addresses?
for communication between two ISPs
for a network that is directly connected to the Internet
for addresses that are used exclusively within an organization.
for a host with more than one direct connection to the Internet
27
Which wireless protocol is used for encryption?
EAP
Open
PSK
WEP
28

Refer to the exhibit. The security policy of an organization requires users to change their password every week. Which type of security policy is this?

acceptable use
network maintenance
password
remote access
29
Which type of network attack occurs when an unauthorized person tries to persuade a user to share a network user ID and password?
brute force
denial of service
data manipulation
social engineering
30
A system administrator routinely monitors failed login attempts on a server. If the administrator sees an extremely high number of failed attempts by a single user who is trying multiple password combinations, what type of attack is in progress?
brute force
phishing
SYN flood
virus
vishing
31
What is the purpose of spam filter software?
It detects and removes spyware.
It detects and removes viruses.
It prevents the display of advertisement windows.
It examines incoming e-mail messages to identify the unsolicited ones.
32

Refer to the exhibit. An educational institution needs to connect PC systems that use private IP addressing to the Internet. They have multiple systems that need to access the Internet, but were only able to purchase one public IP address. What should be activated on the Linksys integrated router to achieve this goal?

authentication
DHCP
encryption
firewall
NAT
WEP
33
How does a crossover cable connect two routers?
It connects the pins that are used for receiving on one router to the pins that are used for receiving on the other router.
It connects the pins that are used for transmitting on one router to the pins that are used for receiving on the other router.
It disconnects the transmit pins and uses only the receive pins.
It uses the same pins for transmitting and receiving.
34
Which wireless technology allows only one-to-one connections and is typically used for short-range, line-of-sight communication?
GSM
Wi-Fi
Infrared
Bluetooth
35
Which picture shows a USB port on a PC?
<<< TRUE
36
Which type of computer has an integrated mouse?
desktop
laptop
mainframe
server
pocket PC
37
Which adapter card would be required for a PC to exchange information with other PCs on a LAN?
NIC
video card
sound card
internal modem
38
What component of a personal computer is responsible for the processing of all data?
RAM
CPU
firewall
system bus
operating system
39
Which wireless component allows wireless clients to gain access to a wired network?
PDA
STA
access point
wireless bridge
40
Which two components are configured via software in order for a PC to participate in a network environment? (Choose two.)
MAC address
IP address
kernel
shell
subnet mask
41
Which Windows PC command line utility can be used to discover the path that a packet takes to reach a destination?
ping
netstat
tracert
nslookup
ipconfig
42

Refer to the exhibit. A wireless client is unable to connect to a Linksys WRT300N access point that is using network 192.168.1.0/24 for its LAN and WLAN clients. What could cause the problem?

The IP address is incorrect.
The subnet mask is incorrect.
The default gateway is incorrect.
All addresses are correct, so the SSID must be incorrect.
43
What two commands can be used to form a new binding if client information does not agree with the DHCP client table? (Choose two.)
ipconfig /release
ipconfig /all
ipconfig /flushdns
ipconfig /renew
ipconfig
44
Which device is often configured to act as both a DHCP client and a DHCP server?
home PC
ISP modem
wireless-enabled laptop
integrated services router
45

Refer to the exhibit. What is the effect of setting the security mode to WEP on the Linksys integrated router?

The WEP security mode enables the AP to inform clients of its presence.
The WEP security mode encrypts network traffic during transmission between the AP and the wireless client.
The WEP security mode generates a dynamic key each time a client establishes a connection with the AP.
The WEP security mode identifies the WLAN.
46
Which installation option should be chosen when the current operating system is too damaged to work properly?
upgrade
multi-boot
clean install
virtualization
47
Which two causes of networking problems are related to the physical layer? (Choose two.)
disconnected cables
improper operation of cooling fans
incorrect MAC address
incorrect default gateway
incorrect subnet mask
48
A user in a small office is unable to connect to the Internet. The user examines the physical connections to the ISR, a Linksys WRT300N, and notices a solid green LED on the port that is wired to the computer. What does the LED indicate about the current state of the port?
The ISR is making adjustments to the port.
The device is plugged in and traffic is flowing.
The computer is plugged in but no traffic is flowing.
The ISR does not detect that the computer is plugged in.
49

Refer to the exhibit. PC1 is unable to access the web server at 209.165.200.226/27. Based on the provided output, what is the most likely cause of the problem?

PC1 is not plugged in to RTR1.
Port 80 is already in use on PC1.
No DNS server is configured on PC1.
PC1 is configured with an incorrect IP address and default gateway.
50
What does it mean when a problem is being escalated by a helpdesk?
The helpdesk is following up on a resolved problem.
The helpdesk has made the problem a lower priority.
The helpdesk has solved the problem and is closing the ticket.
The helpdesk is moving the problem to a higher level support staff.

DHomesb Chapter final exam

DHomesb Final Exam – CCNA Discovery: Networking for Home and Small Businesses (Version 4.0) – Form 3

1
Which protocol is used to transfer files among network devices and perform file-management functions?
DNS
FTP
HTML
HTTP
2
What is the function of the DNS server?
It assigns IP addresses to clients.
It accepts HTTP requests from clients.
It maps a hostname to a corresponding IP address.
It manages the domain that clients are assigned to.
3
A computer joins the network and announces itself to all hosts on the LAN. What type of message does
the computer send out?
broadcast
simulcast
multicast
unicast
4
As an assignment, a computer science student needs to present data in binary format. What are the two
possible values that the student can use? (Choose two.)
0
1
2
A
F
5
What type of message is sent to a specific group of hosts?
static
unicast
dynamic
multicast
broadcast
6
Which term is associated with logical addressing?
IP addresses
port addresses
physical addresses
Media Access Control addresses
7
What destination IP address is used in a unicast packet?
a specific host
a group of hosts
all hosts on the network
the network broadcast address
8
Which value would be considered the physical address for data that is sent across an Ethernet segment?
IP address
port address
MAC address
network address
9

Refer to the exhibit. Which option correctly represents the encapsulation of a packet that is sent by
Host1 to the web server?

<<< TRUE
10
What are two examples of peripheral output devices? (Choose two.)
barcode reader
digital camera
external DVD
headphones
printer
11
What does the term “attenuation” mean in data communication?
loss of signal strength as distance increases
time for a signal to reach its destination
leakage of signals from one cable pair to another
strengthening of a signal by a networking device
12
Which network design layer provides a connection point for end user devices to the network?
access
core
distribution
network
13
Which two statements are true about local applications? (Choose two.)
They run on the network.
An example of a local application is e-mail.
They are accessed from a remote computer.
They are stored on the local hard disk.
They run on the computer where they are installed.
14
Which portion of the packet does a router use to forward the packet to the destination?
source IP address
user data
destination IP address
control information
destination MAC address
15

Refer to the exhibit. H1 can ping H2, H3, and the Fa0/0 interface of router R1. H2 and H3 but not H1
can ping H4 and H5. What is a possible cause for the H1 failure?

Router R1 has no route to the destination network.
Switch S1 does not have an IP address configured.
The link between router R1 and switch S2 has failed.
Host H1 does not have a default gateway configured.
16

Refer to the exhibit. If H4 sends a message to H1 and the destination MAC address is in the MAC table
for both Switch1 and Switch2, which host devices will receive the message?

only H1
hosts H1 and H4
all hosts that are connected to Switch1
all hosts that are connected to Switch1 and Switch2
17

Refer to the exhibit. Which statement is true based on the information that is shown in the exhibit?

All wireless devices that are connected to this AP must have an assigned SSID of College.
Any wireless client that is attached to this AP must have the same IP address and SSID.
The AP is not physically wired to the local LAN.
This configuration is found only in an ad hoc wireless network.
18

Refer to the exhibit. A home network is configured with the information in the graphic. A user tries to
manually create a new connection to the network using the SSID Ciscoclass. However, a connection
cannot be made. What could be the problem?

The SSID is case-sensitive.
The SSID must contain at least one number.
The SSID should be used with the default name.
The SSID must contain a minimum of 32 characters.
19

Refer to the exhibit. Assume that the command output is from a wireless DHCP client that is connected to
a Linksys integrated router. What can be deduced from the output?

The DHCP configuration on the router needs to be verified.
The WEP key or SSID needs to be verified.
The wireless connection is operational.
The wireless NIC driver or the NIC itself needs to be reinstalled.
20
What will be one result of using a wireless infrastructure when designing the communications infrastructure
for a new building?
Wireless devices will be easy to add or relocate.
Infrastructure installation will be difficult and expensive.
There will be less interference from outside electronic sources.
Data transmitted over wireless networks will be more secure than when transmitted over wired networks.
21
What is specified by the network number in an IP address?
the network to which the host belongs
the physical identity of the computer on the network
the node of the subnetwork which is being addressed
the broadcast identity of subnetwork
22

Refer to the exhibit. Given the use of default masks, which network will router R1 use as the destination
network for communications from PC1 to PC2?

128.0.0.0
128.107.0.0
128.107.1.0
192.0.0.0
192.135.0.0
192.135.14.0
23
Which two values represent the network number and default mask for the address 209.165.200.225? (Choose two.)
209.0.0.0
209.165.0.0
209.165.200.0
255.0.0.0
255.255.0.0
255.255.255.0
24
Which three address ranges can be used to depict private IP addresses? (Choose three.)
10.0.0.0 to 10.0.0.255
127.16.0.0 to 127.16.255.255
150.150.0.0 to 150.150.255.255
172.16.1.0 to 172.16.1.255
192.168.22.0 to 192.168.22.255
200.100.50.0 to 200.100.50.255
25
Under what circumstance would it be appropriate to use private IP addresses?
for communication between two ISPs
for a network that is directly connected to the Internet
for addresses that are used exclusively within an organization.
for a host with more than one direct connection to the Internet
26
Which part of the electromagnetic spectrum is commonly used to exchange data between a PDA and a computer?
FM
radar
infrared
ultraviolet
27

Refer to the exhibit. The security policy of an organization allows employees to connect to the office intranet from their homes. Which type of security policy is this?

acceptable use
incident handling
network maintenance
remote access
28
What wireless technology has the ability to communicate with many devices at the same time, makes use of the 2.4 GHz band, and is limited to low-speed, short-range communications?
RF
ISM
infrared
Bluetooth
29
Which type of network attack occurs when an unauthorized person tries to persuade a user to share a network user ID and password?
brute force
denial of service
data manipulation
social engineering
30

Refer to the exhibit. An organization needs to connect PC systems that use private IP addressing to the Internet. The organization has multiple systems that need to access the Internet, but were only able to purchase one public IP address. What should be activated on the Linksys integrated router to achieve this goal?

authentication
DHCP
encryption
firewall
NAT
WEP
31
A network administrator is setting up an application filtering firewall. Company security policy states that FTP sessions that are coming from the Internet and use the standard FTP port must be blocked. Which TCP/UDP port must the administrator block on the firewall to be in compliance?
21
23
53
80
32
What is the name for the contract between a customer and an ISP that specifies requirements for uptime and service response time?
DSL
IAB
NAP
SLA
33
How does a crossover cable make it possible for two “like devices” (for example, two switches) to communicate?
The transmit pins are disconnected and only the receive pins are used.
The transmit pins on one device are connected to the transmit pins on the other device.
The receive pins on one device are connected to the receive pins on the other device.
The transmit pins on one device are connected to the receive pins on the other device.
34
Which attribute must be the same for wireless devices on one network to be able to communicate with devices on a different network?
DNS server
MAC address
default gateway
operating system
wireless equipment vendor
35
Which picture shows a USB port on a PC?
<<< TRUE
36
A college network administrator is planning a wireless LAN to provide service in the student lounge and outdoor patio. The requirements include a range of at least 80 meters and a speed of 30 Mb/s. Which wireless LAN standard meets these requirements?
802.11
802.11a
802.11b
802.11g
37
Which type of computer has an integrated mouse?
desktop
laptop
mainframe
server
pocket PC
38
What is true about a wireless access point that is equipped with an omnidirectional antenna?
concentrates signal in one direction
typically used in bridging applications
radiates the signal equally in all directions
provides the greatest transmission distance of all antenna types that are used by APs
39
What are two ways that a user can interact with an operating system shell? (Choose two.)
CLI
OS
GUI
NIC
kernel
40

Refer to the exhibit. Assume that the exhibited output is from a host that is connected to a Linksys integrated router. What is the first thing that should be checked if using a bottom-up troubleshooting approach?

the default gateway on the host
the IP address on the host
the IP address on the router
the link status LED on the front of the router
the subnet mask on the host
41
For devices that do not autosense, which connection requires a crossover cable?
hub port to router port
PC to hub port
PC to switch port
PC port to PC port
42
Which statement is true about UTP cable termination?
Cables with RJ-45 connectors are always preterminated.
An RJ-45 connector is used on only one end of the UTP cable.
Up to 2 to 3 inches of cable may be untwisted at each end of the cable to allow for easier installation of the RJ-45 connector.
The RJ-45 connector should be pushed over the wire jacket for a smooth connection.
43
A local PC has the correct configuration that is required to access the network. A ping command that is sourced at the PC does not receive a response from a remote device. Which operating system command might be used to determine where the connection failed?
netstat
tracert
ipconfig
nslookup
44
An administrator is troubleshooting a network problem that involves the inability of users to reach Internet sites. During troubleshooting, the administrator is able to successfully ping web sites by their IP address, but pings to domain names are unsuccessful. Which service is most likely at fault?
DHCP
DNS
FTP
NAT
45
What two commands can be used to form a new binding if client information does not agree with the DHCP client table? (Choose two.)
ipconfig /release
ipconfig /all
ipconfig /flushdns
ipconfig /renew
ipconfig
46
Which installation option should be chosen when the current operating system is too damaged to work properly?
upgrade
multi-boot
clean install
virtualization
47
A user is unable to send e-mail. To begin troubleshooting this problem, the network technician uses the browser on the PC and tries to access some popular Internet websites. Which troubleshooting approach is being followed?
bottom-up
divide-and-conquer
top-down
trial and error
48
Which two causes of networking problems are related to the physical layer? (Choose two.)
damaged cables and connectors
incorrect addressing
incorrect subnet mask
overheated components
incorrect default gateway
49
Which statement accurately describes a recommended strategy for end users to employ when they interact with a help desk technician?
Provide as much information about the problem as possible.
Expect first-level help desk technicians to solve the problem, because they are highly-trained personnel.
Hand over the problem to the help desk professionals, then do not interfere with them.
At the beginning of the call, ask for the name and number of the supervisor of the help desk technician.
50
What does it mean when a problem is being escalated by a helpdesk?
The helpdesk is following up on a resolved problem.
The helpdesk has made the problem a lower priority.
The helpdesk has solved the problem and is closing the ticket.
The helpdesk is moving the problem to a higher level support staff.

DHomesb Chapter final exam

DHomesb Final Exam – CCNA Discovery: Networking for Home and Small Businesses (Version 4.0) – Form 2

1
Which protocol in its default configuration downloads e-mail messages to the client computer and deletes them from the server?
FTP
POP3
SMTP
IMAP4
2
A user tries to open a page on the web server at http://www.cisco.com. The user’s workstation does not have the destination IP address in order to encapsulate the request. Which network topology will provide the services that are required to associate the name of the web server with an IP address?
<<< TRUE
3
TCP/IP data transmission between the source and destination host is de-encapsulated in four steps:A. The TCP header is removed.
B. Bits are decoded and the destination MAC address is recognized.
C. The IP header is removed and the contents are passed to the next layer.
D. The Ethernet header and trailer are removed.What is the correct sequence of these steps?
A, B, C, D
A, C, B, D
B, C, D, A
B, D, C, A
C, A, B, D
4
Which protocol is used to transfer files among network devices and perform file-management functions?
DNS
FTP
HTML
HTTP
5
Which of the following are transport layer protocols of the TCP/IP model? (Choose two.)
FTP
UDP
SMTP
TFTP
TCP
6
What measurement is commonly used to describe communication speed when transferring data?
bps
cps
Hz
MB
7
As an assignment, a computer science student needs to present data in binary format. What are the two possible values that the student can use? (Choose two.)
0
1
2
A
F
8
A host wants to send information simultaneously to all the other hosts in the same network. Which domain will support this type of communication?
broadcast
unicast
local
multicast
9
What destination IP address is used in a unicast packet?
a specific host
a group of hosts
all hosts on the network
the network broadcast address
10
Which portion of a received datagram is decoded and used by the internetwork layer of the TCP/IP model?
IP address
port number
MAC address
HTML/user data
11
What are two advantages of purchasing a custom-built computer? (Choose two.)
usually a lower cost
no waiting period for assembly
user can specify higher performance components
supports higher-end graphics and gaming applications
fewer components to replace
12
What is the most common reason that ISPs provide asymmetrical transfer services?
to carry a large amount of data in both directions at equal rates
to host servers on the Internet
to work with applications that require significant bandwidth
to work with large business applications
13
When is the use of a DSL modem necessary?
when a cellular telephone provides the service
when a high-speed connection is provided over a cable TV network
when a high-speed digital connection is required over the regular telephone line
when a satellite dish is used
14
Which network design layer provides a connection point for end user devices to the network?
access
core
distribution
network
15
Which two statements are true about network applications? (Choose two.)
Microsoft Word is an example of a network application.
Network applications are accessible from a remote computer.
Network applications are installed on a special type of computer that supports only network applications.
Network applications are installed on a network server.
Network applications are accessible by one computer at a time.
16
Which type of network supports DHCP and DNS services for network users in a network domain?
client/server
peer-to-peer
hierarchical
ad hoc
17
Which portion of the packet does a router use to forward the packet to the destination?
source IP address
user data
destination IP address
control information
destination MAC address
18

Refer to the exhibit. The network is experiencing excessive broadcast traffic from multiple hosts. What can be done to reduce the broadcast traffic that each host receives without compromising connectivity to the corporate servers?

Separate the switches with a router.
Create a separate VLAN for the servers and hosts.
Change from Ethernet switches to FastEthernet switches.
Increase the number of switches to reduce the number of PCs that are connected to each switch.
19

Refer to the exhibit. If host H8 sends a message to host H5 and the destination MAC address is in the MAC tables of both switches, which host device or devices will receive the message?

only host H5
all hosts on the network
all hosts that are connected to switch Sw1
all hosts that are connected to switch Sw2 and host H5.
all hosts that are connected to hub Hub1 and switch Sw1
20

Refer to the graphic. Based on the information that is shown, what statement is true?

This configuration would be commonly found in an ad hoc wireless network.
Any wireless client that is attached to this access point would have the same IP address and SSID.
All wireless devices that are connected to this access point must have an assigned SSID of Academy.
In addition to accepting wireless client requests, this access point must connect to the wired network.
21

Refer to the graphic. Assume that the command output is from a wireless DHCP client that is connected to a Linksys integrated router. What can be deduced from the output?

The wireless connection is good.
The WEP key or SSID needs to be checked.
The DHCP configuration on the router needs to be checked.
The wireless NIC driver or the NIC itself needs to be reinstalled.
22
How do ISPs obtain public IP addresses?
They create the addresses themselves.
They obtain the addresses from the home PCs.
They obtain the addresses from the Internet registry.
They obtain the addresses from the RFC.
23

Refer to the exhibit. In the wireless network, what is the maximum number of hosts supported if the IP addressing scheme contains four host bits?

6
14
16
30
32
254
24
What describes the external IP address that is obtained by a router through a cable or DSL modem?
a public address that is obtained from ICANN
a private address that is manually configured by the administrator
a public address that is obtained through DHCP from the ISP
a private address that converts to a public address on the internal LAN
25
After issuing the ipconfig/all command on a host that has DHCP enabled, a network administrator notes that the output contains faulty IP configuration information. What is the first step the administrator should take to resolve this issue?
Replace the NIC in the host.
Change the IP address of the DHCP server.
Use static addressing to assign the correct IP address.
Use the release and renew options supported by the ipconfig command.
26
Which three addresses belong to the category of private IP addresses? (Choose three.)
10.0.0.1
128.0.0.1
150.0.0.1
172.16.0.1
192.168.31.19
172.168.31.1
27
Which part of the electromagnetic spectrum is commonly used to exchange data between a PDA and a computer?
FM
radar
infrared
ultraviolet
28
What is the purpose of pop-up blocker software?
It detects and removes spyware.
It detects and removes viruses.
It prevents the display of advertisement windows.
It removes unwanted e-mail.
29

Refer to the exhibit. The security policy of an organization allows employees to connect to the office intranet from their homes. Which type of security policy is this?

acceptable use
incident handling
network maintenance
remote access
30
Which type of network attack occurs when an unauthorized person tries to persuade a user to share a network user ID and password?
brute force
denial of service
data manipulation
social engineering
31
When NAT is employed in a small office, which address type is typically used for hosts on the local LAN?
private IP addresses
global public IP addresses
Internet-routable addresses
both private and public IP addresses
32
Which statement is true concerning stateful packet inspection?
Access is permitted based on IP addresses of the source and destination devices.
Access is permitted based on the MAC addresses of the source and destination devices.
Access is permitted only if the type of application that is attempting to reach the internal host is allowed.
Access is permitted only if it is a legitimate response to a request from an internal host.
33
How does a straight-through cable connect two unlike devices?
It connects the receive pins on the first device to the receive pins on the second device.
It connects the transmit pins on the first device to the receive pins on the second device.
It disconnects the transmit pins and uses only the receive pins.
It uses the same pins for transmitting and receiving.
34
When would infrared be used to connect network devices?
when connecting multiple host devices to a wireless access point
when synchronizing a PC with a PDA that is in line of sight
when connecting a PC to a network switch that is located in another room
when updating two access points that are located in separate buildings
35
Which picture shows a USB port on a PC?
<<< TRUE
36
Which type of computer has an integrated mouse?
desktop
laptop
mainframe
server
pocket PC
37
Which adapter card would be required for a PC to exchange information with other PCs on a LAN?
NIC
video card
sound card
internal modem
38
Which two components are configured via software in order for a PC to participate in a network environment? (Choose two.)
MAC address
IP address
kernel
shell
subnet mask
39

Refer to the exhibit. Assume that the exhibited output is from a host that is connected to a Linksys integrated router. What is the first thing that should be checked while using a bottom-up troubleshooting approach?

the default gateway on the host
the IP address on the host
the IP address on the router
the link status LED on the front of the router
the subnet mask on the host
40
For devices that do not autosense, which connection requires a crossover cable?
hub port to router port
PC to hub port
PC to switch port
PC port to PC port
41
Which Windows command is used to display the configured IP address, subnet mask, and default gateway?
ipconfig
netstat
nslookup
tracert
42
What must be identical on all devices in a WLAN for successful wireless communication between the devices?
SSID
antenna type
network mode
wireless NIC driver
43
What is the purpose of the ipconfig /release command?
It forces a client to give up its current IP address.
It forces a client to give up its current MAC address.
It forces the client to clear all the MAC address to IP address associations it has learned.
It shows the current IP configuration on the client.
44
What is the common DHCP role of the ISR router in home and small office networks?
The ISR router acts only as a DHCP client.
The ISR router acts only as a DHCP server.
The ISR router acts as both a DHCP client and server.
The ISR router forwards all DHCP traffic and acts as neither a client nor a server.
45
A company has a web server that must be accessible to both external and internal clients. Which security policy best practice should be followed to maximize security of the server?
Place the web server in a DMZ.
Keep the web server on the external network.
Configure a firewall device to serve as the web server.
Locate the web server in the server farm of the internal network.
46
For the second time in a week, workstations on a LAN are not able to log into the server. The technician fixed the problem the first time, but cannot remember the steps taken to solve it. What aspect of the troubleshooting process has the technician neglected?
identifying the problem
asking end-users questions
documenting the troubleshooting process
using structured techniques to solve a problem
47
A network technician suspects that malware on a user PC is opening multiple TCP connections to a specific foreign host address. Which Windows command line utility can be used to confirm the multiple TCP connections?
ping
netstat
tracert
ipconfig
nslookup
48
Which two causes of networking problems are related to the physical layer? (Choose two.)
damaged cables and connectors
incorrect addressing
incorrect subnet mask
overheated components
incorrect default gateway
49

Refer to the exhibit. A Linksys integrated services router is being used by wireless clients to access a server which is directly connected to an Ethernet port on the router. The server and the clients are using DHCP for IP addressing from the Linksys device and are on the same subnet. The server and the wireless clients are obtaining the correct IP configuration and can ping the Linksys device, but are unable to ping each other. What could be causing this issue?

The ping failures indicate a routing problem on the Linksys device. Check for proper routes.
The symptoms indicate a physical connection problem on the server. Check for the proper cable type and the physical connection.
The problem is most likely occurring on the Linksys device. Check all configurations on the Linksys device to ensure no security restrictions could be causing the issue.
Radio frequency problems are the likely problem if the clients cannot connect to the server on the same subnet. Begin by checking the signal strength at the wireless clients.
50
What two pieces of information should a help desk technician document while troubleshooting connectivity issues with an end user? (Choose two.)
the CPU clock speed of the computer
the number of network jacks that are in the room
if the user can ping the default gateway address
if the word processing software is installed correctly
whether the PC uses dynamic or static IP addressing

DHomesb Chapter final exam

Cara memasang widget instagram di Tumblr

How to display your Instagram photos on Tumblr

Tumblr has quickly become one of the most popular blogging platforms available today. With it’s focus on shorter more to the point posts, and lots of images, Tumblr provides users with a quick and easy way to share their thoughts.

If you are a Tumblr user, you can now easily display your Instagram photos in the sidebar of your blog by using SnapWidget.

To add your photo gallery, follow these steps:

  1. Visit SnapWidget and generate a widget for your Instagram username or hashtag
  2. Copy the code snippit
  3. Login to Tumblr and select the customize theme option for your blog
  4. Click on the “Edit HTML” button
  1. Scroll down in the HTML editor and find the sidebar section

  1. Determine where you want the widget to be displayed in the sidebar. For example to display it below the buttons, paste the code snippet here.
  2. You can also add a heading to your sidebar like we’ve done in the code below

  1. Now click the “Update Preview” button and check that the widget displays correctly in your sidebar

That’s it! Now the visitors to your blog will see your beautiful Instagram photos in the sidebar.

Please leave a comment and let us know if you’re using the widget on your blog.