Form 1 – Exam Viewer – DHomesb Final Exam – CCNA Discovery: Networking for Home and Small Businesses (Version 4.0)

1

Refer to the exhibit. A PC requests an IP address from the server. Which two protocols are used at the TCP/IP application layer and the internetwork layer? (Choose two.)

DHCP
FTP
IP
TCP
UDP
2
TCP/IP data transmission between the source and destination host is de-encapsulated in four steps:

A. The TCP header is removed.
B. Bits are decoded and the destination MAC address is recognized.
C. The IP header is removed and the contents are passed to the next layer.
D. The Ethernet header and trailer are removed.

What is the correct sequence of these steps?

A, B, C, D
A, C, B, D
B, C, D, A
B, D, C, A
C, A, B, D
3
What is the function of the DNS server?
It assigns IP addresses to clients.
It accepts HTTP requests from clients.
It maps a hostname to a corresponding IP address.
It manages the domain that clients are assigned to.
4
Which two automatic addressing assignments are supported by DHCP? (Choose two.)
local server address
subnet mask
default gateway address
physical address of the recipient
physical address of the sender
5
What measurement is commonly used to describe communication speed when transferring data?
bps
cps
Hz
MB
6

Refer to the exhibit. A user on host A sends an e-mail to the user on host B. Which type of message does host A send?

broadcast
multicast
simulcast
unicast
7
As an assignment, a computer science student needs to present data in binary format. What are the two possible values that the student can use? (Choose two.)
0
1
2
A
F
8
Which term is associated with logical addressing?
IP addresses
port addresses
physical addresses
Media Access Control addresses
9
Which three statements describe an IP address? (Choose three.)
An IP address is known as a logical address.
An IP address uses a 30-bit addressing scheme.
An IP address is found in the Layer 2 header during transmission.
The network portion of an IP address is burned into a network interface card.
An IP address is unique within the same local network.
The network portion of an IP address will be the same for all hosts that are connected to the same local network.
10

Refer to the exhibit. Which option correctly represents the encapsulation of a packet that is sent by Host1 to the web server?

<<< TRUE

11
When are leased lines typically used?
when low bandwidth is required
for home and small business connectivity
when a dedicated digital data line is necessary
as a less expensive option to cable and DSL modem service
12
What are two advantages of purchasing a custom-built computer? (Choose two.)
usually a lower cost
no waiting period for assembly
user can specify higher performance components
supports higher-end graphics and gaming applications
fewer components to replace
13
What is an ISP?
It is a standards body that develops cabling and wiring standards for networking.
It is a protocol that establishes how computers within a local network communicate.
It is an organization that enables individuals and businesses to connect to the Internet.
It is a networking device that combines the functionality of several different networking devices in one.
14
Which statement accurately describes what network devices do in the distribution layer of the three layer design model?
They interconnect individual hosts.
They interconnect multiple companies.
They interconnect local network segments.
They interconnect the company network to the ISP.
15
Which network design layer provides hosts with initial connectivity to the network?
access
core
distribution
network
16
What statement describes the filtering of traffic via the use of Stateful Packet Inspection?
It recognizes and filters predefined URLs
It permits access that is based on the application.
It permits access based on IP or MAC addresses.
It permits incoming packets that are legitimate responses to requests from internal hosts.
It translates an internal address or group of addresses into a public address that is sent across the network.
17
What advantage does a peer-to-peer network have over a client-server network?
It increases security.
It increases scalability.
It produces a higher performance for hosts.
It eliminates the need for centralized administration.
18
After attaching four PCs to the switch ports, configuring the SSID and setting authentication properties for a small office network, a technician successfully tests the connectivity of all PCs that are connected to the switch and WLAN. A firewall is then configured on the device prior to connecting it to the Internet. What type of network device includes all of the described features?
switch
ISR router
firewall appliance
standalone wireless access point
19
Which portion of the packet does a router use to forward the packet to the destination?
source IP address
user data
destination IP address
control information
destination MAC address
20

Refer to the graphic. Based on the information that is shown, what statement is true?

This configuration would be commonly found in an ad hoc wireless network.
Any wireless client that is attached to this access point would have the same IP address and SSID.
All wireless devices that are connected to this access point must have an assigned SSID of Academy.
In addition to accepting wireless client requests, this access point must connect to the wired network.
21
What is the function of a physical topology map?
records IP addressing of each host
records hostnames and applications
organizes groups of hosts by how they use the network
shows where wiring is installed and the locations of network devices
22
Which value represents the host portion of IP address 128.107.10.11 with a subnet mask of 255.255.0.0?
.10
.10.11
128.107
.107.10.11
128.107.10
23
What is specified by the host bits in an IP address?
broadcast identity of the network
identity of the computer on the network
network that is being addressed
network to which the host belongs
24
What describes the external IP address that is obtained by a router through a cable or DSL modem?
a public address that is obtained from ICANN
a private address that is manually configured by the administrator
a public address that is obtained through DHCP from the ISP
a private address that converts to a public address on the internal LAN
25

Refer to the exhibit. Which pair of addresses would be appropriate to use for PC1 and PC2 to establish a workgroup using private addresses?

127.0.0.1 and 127.0.0.2
172.16.4.2 and 172.16.4.3
172.16.5.1 and 192.168.3.2
198.133.219.25 and 198.133.219.26
26
Under what circumstance would it be appropriate to use private IP addresses?
for communication between two ISPs
for a network that is directly connected to the Internet
for addresses that are used exclusively within an organization.
for a host with more than one direct connection to the Internet
27
Which wireless protocol is used for encryption?
EAP
Open
PSK
WEP
28

Refer to the exhibit. The security policy of an organization requires users to change their password every week. Which type of security policy is this?

acceptable use
network maintenance
password
remote access
29
Which type of network attack occurs when an unauthorized person tries to persuade a user to share a network user ID and password?
brute force
denial of service
data manipulation
social engineering
30
A system administrator routinely monitors failed login attempts on a server. If the administrator sees an extremely high number of failed attempts by a single user who is trying multiple password combinations, what type of attack is in progress?
brute force
phishing
SYN flood
virus
vishing
31
What is the purpose of spam filter software?
It detects and removes spyware.
It detects and removes viruses.
It prevents the display of advertisement windows.
It examines incoming e-mail messages to identify the unsolicited ones.
32

Refer to the exhibit. An educational institution needs to connect PC systems that use private IP addressing to the Internet. They have multiple systems that need to access the Internet, but were only able to purchase one public IP address. What should be activated on the Linksys integrated router to achieve this goal?

authentication
DHCP
encryption
firewall
NAT
WEP
33
How does a crossover cable connect two routers?
It connects the pins that are used for receiving on one router to the pins that are used for receiving on the other router.
It connects the pins that are used for transmitting on one router to the pins that are used for receiving on the other router.
It disconnects the transmit pins and uses only the receive pins.
It uses the same pins for transmitting and receiving.
34
Which wireless technology allows only one-to-one connections and is typically used for short-range, line-of-sight communication?
GSM
Wi-Fi
Infrared
Bluetooth
35
Which picture shows a USB port on a PC?

<<< TRUE

36
Which type of computer has an integrated mouse?
desktop
laptop
mainframe
server
pocket PC
37
Which adapter card would be required for a PC to exchange information with other PCs on a LAN?
NIC
video card
sound card
internal modem
38
What component of a personal computer is responsible for the processing of all data?
RAM
CPU
firewall
system bus
operating system
39
Which wireless component allows wireless clients to gain access to a wired network?
PDA
STA
access point
wireless bridge
40
Which two components are configured via software in order for a PC to participate in a network environment? (Choose two.)
MAC address
IP address
kernel
shell
subnet mask
41
Which Windows PC command line utility can be used to discover the path that a packet takes to reach a destination?
ping
netstat
tracert
nslookup
ipconfig
42

Refer to the exhibit. A wireless client is unable to connect to a Linksys WRT300N access point that is using network 192.168.1.0/24 for its LAN and WLAN clients. What could cause the problem?

The IP address is incorrect.
The subnet mask is incorrect.
The default gateway is incorrect.
All addresses are correct, so the SSID must be incorrect.
43
What two commands can be used to form a new binding if client information does not agree with the DHCP client table? (Choose two.)
ipconfig /release
ipconfig /all
ipconfig /flushdns
ipconfig /renew
ipconfig
44
Which device is often configured to act as both a DHCP client and a DHCP server?
home PC
ISP modem
wireless-enabled laptop
integrated services router
45

Refer to the exhibit. What is the effect of setting the security mode to WEP on the Linksys integrated router?

The WEP security mode enables the AP to inform clients of its presence.
The WEP security mode encrypts network traffic during transmission between the AP and the wireless client.
The WEP security mode generates a dynamic key each time a client establishes a connection with the AP.
The WEP security mode identifies the WLAN.
46
Which installation option should be chosen when the current operating system is too damaged to work properly?
upgrade
multi-boot
clean install
virtualization
47
Which two causes of networking problems are related to the physical layer? (Choose two.)
disconnected cables
improper operation of cooling fans
incorrect MAC address
incorrect default gateway
incorrect subnet mask
48
A user in a small office is unable to connect to the Internet. The user examines the physical connections to the ISR, a Linksys WRT300N, and notices a solid green LED on the port that is wired to the computer. What does the LED indicate about the current state of the port?
The ISR is making adjustments to the port.
The device is plugged in and traffic is flowing.
The computer is plugged in but no traffic is flowing.
The ISR does not detect that the computer is plugged in.
49

Refer to the exhibit. PC1 is unable to access the web server at 209.165.200.226/27. Based on the provided output, what is the most likely cause of the problem?

PC1 is not plugged in to RTR1.
Port 80 is already in use on PC1.
No DNS server is configured on PC1.
PC1 is configured with an incorrect IP address and default gateway.
50
What does it mean when a problem is being escalated by a helpdesk?
The helpdesk is following up on a resolved problem.
The helpdesk has made the problem a lower priority.
The helpdesk has solved the problem and is closing the ticket.
The helpdesk is moving the problem to a higher level support staff.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s