Você está na página 1de 12

Networking 1 - Discovery 1 Final Exam Review

1. Which two transport layer protocols enable hosts to communicate and transfer data? (Choose two.)
a. DHCP
b. ICMP
c. IP
d. TCP
e. UDP
2. What is a function of the distribution layer in the hierarchical design model?
a. to provide latency free switching
b. to organize end devices in small manageable groups
c. to provide connectivity using the high-speed backbone
d. to provide connectivity between smaller local networks
3. For the TCP/IP model for internetwork communication, which statement describes the process for the transition of data
from the internet layer to the network access layer?
a. An IP packet is encapsulated in a frame.
b. A TCP segment is placed in an IP packet.
c. HTML data is encapsulated in a TCP segment.
d. A frame is placed on the network media as encoded bits.
4. What is the function of the DNS server?
a. It maps the IP address to the MAC address.
b. It translates a computer or domain name to the associated IP address.
c. It manages the domain that clients are assigned to.
d. It accepts HTTP requests from clients.
5. In IP telephony, what is the purpose of a gateway to the PSTN?
a. to connect IP voice clients to Internet phone service
b. to create a peer-to-peer connection between two IP voice clients
c. to map unique names of IP voice endpoints to a client list on a voice server
d. to allow IP voice clients to communicate with regular analog telephones.
6. Which three types of information are provided to a host by an integrated router that is acting as a DHCP server?
(Choose three.)
a. host ID
b. IP addresses of DNS servers
c. IP address
d. MAC address
e. hostname
f. subnet mask
7. A host wants to send information simultaneously to all the other hosts in the same network. Which domain will support
this type of communication?
a. broadcast
b. unicast
c. local
d. multicast
Networking 1 - Discovery 1 Final Exam Review

8. What are two functions of MAC addresses in a LAN? (Choose two.)


a. to allow the transfer of frames from source to destination
b. to determine which host has priority to transfer data
c. to indicate the best path between separate networks
d. to associate with a specific network IP address
e. to uniquely identify a node on a network
9.
Refer to the exhibit. How many additional hosts can be added to the local network?

a. 124
b. 126
c. 252
d. 254
e. 255
f. 256
10. What are two advantages of purchasing a preassembled computer? (Choose two.)
a. The cost is comparatively lower.
b. High-performance graphics and gaming applications are supported.
c. There is a negligible waiting period for assembly.
d. This type of computer is useful for knowledgeable consumers with special needs.
e. The user can specify high-performance components.
11. When is the use of a DSL modem necessary?
a. when a cellular telephone provides the service
b. when a high-speed connection is provided over a cable TV network
c. when a high-speed digital connection is required over the regular telephone line
d. when a satellite dish is used
12. A home user was successfully browsing the Internet earlier in the day but is now unable to connect. A ping command
from a wireless laptop to a wired PC in the LAN is successful, but the nslookup command fails to resolve a website
address. The user decides to analyze the LEDs on the Linksys router to verify connectivity. Which LED should be of main
concern in this situation?
a. WLAN LED
b. power LED
c. Internet LED
Networking 1 - Discovery 1 Final Exam Review

d. 1-4 Ethernet LEDs


13. What is the most common reason that ISPs provide symmetrical transfer services?
a. to address data transfer needs of home users
b. to download significantly more than upload
c. to host servers on the Internet
d. to work with applications that require less bandwidth
14. What is one purpose of using logical addresses in an IP network?
a. They identify a specific NIC on a host device by assigning a permanent logical address.
b. They are used to determine which host device accepts the frame.
c. They provide vendor-specific information about the host.
d. They are used to determine the network that the host is located on.
e. They are used by switches to make forwarding decisions.
15. A network designer is working with a small company to determine the network type best suited to the needs of the
company. Which two characteristics could the designer use to describe a peer-to-peer network to the owner of the
company? (Choose two.)
a. central administration
b. easy to install
c. low cost
d. scalable
e. secure
16. Which part of a data packet is used by a router to determine the destination network?
a. source IP address
b. user data
c. destination IP address
d. control information
e. destination MAC address
17. What is the purpose of a router?
a. to forward broadcasts to all interfaces so that all hosts receive them
b. to maintain a table of individual host addresses
c. to select the best path to reach remote networks
d. to physically connect multiple hosts that belong to the same network
18.
Networking 1 - Discovery 1 Final Exam Review

Refer to the exhibit. PC1 sends a data packet to PC4. When the router forwards the data out Fa0/1, what destination MAC

address will the router place in the frame?


a. 0050.0FA9.CB47
b. 0050.E208.A761
c. 0200.5455.4E01
d. 0200.545D.25F7
19.

Refer to the exhibit. A local area network is built with four PCs, a switch, and a hub. PC1 sends a packet to PC4 which
collides with a packet sent from PC3 to PC1. Which devices will receive the damaged frame?
a. PC1 and PC2
b. PC1, PC2, PC3, and PC4
c. PC1, PC2, and the switch
d. PC1, PC2, PC3, PC4, and the switch
20.
Networking 1 - Discovery 1 Final Exam Review

Refer to the exhibit. Host2 attempts to establish communications with Server1. What action will switch SW1 take prior to
forwarding the frame?

a. flood the frame out all interfaces


b. learn the MAC address that is associated with Host2
c. assign a MAC address to Host2 from the MAC table
d. poll all interfaces to learn their assigned IP addresses

21.
Refer to the exhibit. Which statement is true based on the information that is shown in the exhibit?
a. All wireless devices that are connected to this AP must have an assigned SSID of University.
b. Any wireless client that is attached to this AP must have the same IP address and SSID.
c. The AP is not physically wired to the local LAN.
d. This configuration is found only in an ad hoc wireless network.
22. Where do ISPs get the public addresses that they assign to end users?
a. ISPs create the addresses themselves.
b. ISPs are assigned addresses through the RFC.
c. ISPs obtain their addresses automatically.
Networking 1 - Discovery 1 Final Exam Review

d. ISPs obtain address blocks from registry organizations.


23. For an IP address, what component decides the number of bits that is used to represent the host ID?
a. default -gateway
b. host number
c. network number
d. subnet mask
24. What describes the external IP address that is obtained by a router through a cable or DSL modem?
a. a public address that is obtained from ICANN
b. a private address that is manually configured by the administrator
c. a public address that is obtained through DHCP from the ISP
d. a private address that converts to a public address on the internal LAN
25. Which three address ranges can be used to depict private IP addresses? (Choose three.)
a. 10.0.0.0 to 10.0.0.255
b. 127.16.0.0 to 127.16.255.255
c. 150.150.0.0 to 150.150.255.255
d. 172.16.1.0 to 172.16.1.255
e. 192.168.22.0 to 192.168.22.255
f. 200.100.50.0 to 200.100.50.255
26. Your school network blocks all websites related to online gaming. What type of security policy is being applied?
a. identification and authentication
b. remote access
c. acceptable use
d. incident handling
27. Which part of the electromagnetic spectrum is commonly used by wireless LANs?
a. Bluetooth
b. infrared
c. Industrial Scientific and Medical (ISM)
d. radio frequency (RF)
28. Which type of attack involves flooding a server port with SYN messages?
a. phishing
b. brute force
c. denial of service
d. data manipulation
29. What is the source of the majority of reported network security incidents?
a. adware
b. hackers
c. internal users
d. spammers
30.
Networking 1 - Discovery 1 Final Exam Review

Refer to the graphic. What feature can be installed on the Linksys integrated router to convert private IP addresses to
Internet-routable addresses?
a. authentication
b. DHCP
c. encryption
d. firewall
e. NAT
f. WEP
31. Before implementing a stateful firewall on an ISR router, a network engineer is asked to explain to upper management
in simple terms what a stateful firewall is. Which description should the engineer use?
a. A stateful firewall is only available on a firewall appliance.
b. A stateful firewall blocks or permits access based only on applications.
c. A stateful firewall bases its analysis only on IP address, port number, and MAC address.
d. A stateful firewall can be configured to allow incoming packets only from sessions that are initiated from inside.
32. What is the purpose of creating a DMZ during network firewall implementation?
a. to create a server security zone accessible only to internal clients
b. to create a dirty zone that allows all inbound and outbound traffic
c. to allow for a publicly accessible zone without compromising the internal network
d. to specify a higher security level than normally required for the internal production network
33. How does a straight-through cable connect two unlike devices?
a. It connects the receive pins on the first device to the receive pins on the second device.
b. It connects the transmit pins on the first device to the receive pins on the second device.
c. It disconnects the transmit pins and uses only the receive pins.
d. It uses the same pins for transmitting and receiving.
34. What is an advantage of selecting an operating system that has a commercial license over one with a GPL license?
a. The commercial license-based operating system ensures full access to the source code for everyone.
b. The commercial license-based operating system ensures that everyone can participate in the enhancement of the
product.
c. The commercial license-based operating system provides structured support.
d. The commercial license-based operating system is released free of charge.
Networking 1 - Discovery 1 Final Exam Review

35. Which installation option enables a single physical resource to function simultaneously as multiple logical resources?
a. clean install
b. multi-boot
c. upgrade
d. virtualization
36. For devices that do not autosense, which connection requires a crossover cable?
a. hub port to router port
b. PC to hub port
c. PC to switch port
d. PC port to PC port
37. When terminating UTP cabling, why is it important to untwist only a small amount of each wire pair?
a. minimizes crosstalk
b. makes installation faster
c. ensures wires are in correct order
d. makes it easier to fit wires into connector
38. What are two examples of storage peripheral devices? (Choose two.)
a. printer
b. flash drive
c. headphones
d. external DVD
e. barcode reader
39. Within a local network, which two items must be unique on a computer for it to successfully connect to the network?
(Choose two.)
a. IP address
b. subnet mask
c. computer name
d. default gateway address
e. operating system version
40.
Networking 1 - Discovery 1 Final Exam Review

Refer to the exhibit. A ping command that was initiated from the local PC to the file server at IP address 209.165.201.5
succeeded. However, a ping that was initiated from the file server to the local PC was unsuccessful. What could cause the
ping command that was initiated from file server to fail?
a. The file server is down.
b. The integrated router has failed.
c. NAT has been enabled on the integrated router.
d. A security measure is blocking access that initiates from the server.
e. The DSL modem failed to provide an IP address for the local PC.

41.
Refer to the exhibit. Which statement is true based on the configuration shown?
a. Multiple modes of encryption are configured on this device.
b. Both 802.11b and 802.11g hosts can connect to this device.
c. All APs in the WLAN will allow wireless connections via channel 6.
d. The network name must be entered on a host computer before the host connects to this network.
42.
Networking 1 - Discovery 1 Final Exam Review

Refer to the exhibit. What is the effect of setting the security mode to WEP on the Linksys integrated router?
a. The WEP security mode enables the AP to inform clients of its presence.
b. The WEP security mode encrypts network traffic during transmission between the AP and the wireless client.
c. The WEP security mode generates a dynamic key each time a client establishes a connection with the AP.
d. The WEP security mode identifies the WLAN.
43. A network administrator is planning an inexpensive WLAN implementation at a small business site. Which two
strategies should be included in the site survey? (Choose two.)
a. Identify the locations of sources of interference.
b. Hire a WLAN analysis firm to survey the site.
c. Deploy all APs and move them if necessary to improve coverage.
d. Use a wireless laptop to verify WLAN coverage in the work areas.
e. Employ sophisticated specialized equipment to measure signal strengths and interference.
44. While conducting a site survey for a new wireless LAN design, a network technician determines that several wireless
phones in the company use the 2.4GHz band and could interfere with the operation of the wireless LAN. Based on this,
which two wireless LAN standards could be implemented to avoid this interference? (Choose two.)
a. original 802.11
b. 802.11a
c. 802.11b
d. 802.11g
e. 802.11n
45.
Networking 1 - Discovery 1 Final Exam Review

Refer to the exhibit. A small office uses an ISR to provide connectivity for both wired and wireless computers. One day, a
sales person who is using a laptop cannot connect to Server1 through the wireless network. A network technician
attempts to determine if the problem is on the wireless or the wired network. The technician pings successfully from the
wireless laptop to the default gateway IP address on the ISR. What should be the next troubleshooting step?
a. Ping from the laptop to PC1.
b. Ping from Server1 to PC1.
c. Ping from Server1 to its gateway IP address.
d. Ping from the laptop to the Ethernet port on the cable modem.
46. A user is unable to send e-mail. To begin troubleshooting this problem, the network technician uses the browser on the
PC and tries to access some popular Internet websites. Which troubleshooting approach is being followed?
a. bottom-up
b. divide-and-conquer
c. top-down
d. trial and error
47. For the second time in a week, workstations on a LAN are not able to log into the server. The technician fixed the
problem the first time, but cannot remember the steps taken to solve it. What aspect of the troubleshooting process has
the technician neglected?
a. identifying the problem
b. asking end-users questions
c. documenting the troubleshooting process
d. using structured techniques to solve a problem
48.
Networking 1 - Discovery 1 Final Exam Review

Refer to the exhibit. When www.cisco.com is entered in a browser window on a PC, the web page is unavailable. While
troubleshooting this problem, the network technician executes the nslookup command as well as the ping command to the
web server. What is the likely reason that the web server home page cannot be displayed?
a. The DNS server service needs to be installed on the PC.
b. A DNS server is not available to resolve the name.
c. The reason that the web server is unable to display the web page is that the web server is unavailable.
d. The increased response time displayed in the ping may indicate a delay in server response time.
49. What is the meaning of the term crosstalk?
a. interference of signals between wire pairs
b. loss of signal strength as distance increases
c. damage of the signal when two bare wires touch
d. strengthening of a signal by a networking device
50. A user in a small office is unable to connect to the Internet. The user examines the physical connections to the ISR, a
Linksys WRT300N, and notices a solid green LED on the port that is wired to the computer. What does the LED indicate
about the current state of the port?
a. The ISR is making adjustments to the port.
b. The device is plugged in and traffic is flowing.
c. The computer is plugged in but no traffic is flowing.
d. The ISR does not detect that the computer is plugged in.

Você também pode gostar