Você está na página 1de 21

Close Window

Assessment System

1. Assessment Selection
2. Assessment Settings
3. Take Assessment

Take Assessment - DHomesb Final Exam - CCNA Discovery: Networking for Home and
Small Businesses (Version 4.0)
Time Remaining:

1
Which type of computer uses an integrated monitor and keyboard?

pocket PC

laptop

mainframe

server

workstation

2
What data communication technology uses low-power radio waves to transmit data?

copper cable

fiber optic cable

wireless

radio

3
What are two examples of peripheral output devices? (Choose two.)

barcode reader

digital camera

external DVD

headphones

printer
4
Which wireless authentication method allows the use of a backend authentication
server?

EAP

Open

PSK

WEP

5
Some new features are available for the OS that is currently running on a user's
PC. What method should be chosen so that the user can install these new feature
sets?

clean install

multi-boot

upgrade

virtualization

6
Which two components are configured via software in order for a PC to participate
in a network environment? (Choose two.)

MAC address

IP address

kernel

shell

subnet mask

Refer to the exhibit. Host A sends a message to a group of four computers out of
the ten computers on this network. Which type of message does host A send?

broadcast

multicast

simulcast
unicast

8
Which network design layer provides hosts access to network services?

access

core

distribution

network

9
What is one function of network devices in the distribution layer of a
hierarchical network design?

They connect multiple access layer devices.

They connect individual hosts to each other.

They connect multiple companies to each other.

They switch data packets as fast as possible.

10

Refer to the exhibit. What is the effect of setting the security mode to WEP on
the Linksys integrated router?

The WEP security mode enables the AP to inform clients of its presence.

The WEP security mode encrypts network traffic during transmission between the AP
and the wireless client.

The WEP security mode generates a dynamic key each time a client establishes a
connection with the AP.

The WEP security mode identifies the WLAN.

11
A network engineer wants to represent confidential data in binary format. What are
the two possible values that the engineer can use? (Choose two.)

1
2

12
Which part of the electromagnetic spectrum is commonly used by wireless LANs?

Bluetooth

infrared

Industrial Scientific and Medical (ISM)

radio frequency (RF)

13
When terminating a UTP cable, why is it important to push the wires all the way
into the end of the connector?

to allow the cable to endure more stretching or twisting

to ensure good electrical contact

to ensure that the wires are in correct order

to minimize crosstalk

14

Refer to the exhibit. The security policy of an organization requires users to


change their password every week. Which type of security policy is this?

acceptable use

network maintenance

password

remote access

15
All hosts within a domain receive the same frame that originates from one of the
devices. The domain is also bounded by routers. What type of domain is this?

broadcast

collision
local

multicast

Showing 1 of 4
<Prev
Page:

Next>

Close Window

All content copyright 1992-2008 Cisco Systems, Inc. Privacy Statement and
Trademarks.

Close Window

Assessment System
1. Assessment Selection
2. Assessment Settings
3. Take Assessment

Take Assessment - DHomesb Final Exam - CCNA Discovery: Networking for Home and
Small Businesses (Version 4.0)

Time Remaining:

16
What is the function of the DNS server?

It maps the IP address to the MAC address.

It translates a computer or domain name to the associated IP address.

It manages the domain that clients are assigned to.


It accepts HTTP requests from clients.

17
A network technician is required to provide access to the Internet for a large
company. What is needed to accomplish this task?

ISP

private IP addresses for each host

static IP addresses for each host

DHCP server

18

Refer to the exhibit. Assume that the command output is from a wireless DHCP
client that is connected to a Linksys integrated router. What can be deduced from
the output?

The DHCP configuration on the router needs to be verified.

The WEP key or SSID needs to be verified.

The wireless connection is operational.

The wireless NIC driver or the NIC itself needs to be reinstalled.

19
What is the most common reason that ISPs provide asymmetrical transfer services?

to carry a large amount of data in both directions at equal rates

to host servers on the Internet

to work with applications that require significant bandwidth

to work with large business applications

20
From which source could an ISP obtain blocks of public IP addresses?

IEEE

NOC

RFC

RIR
21
For devices that do not autosense, which connection requires a crossover cable?

hub port to router port

PC to hub port

PC to switch port

PC port to PC port

22
TCP/IP data transmission between the source and destination host is de-
encapsulated in four steps:

A. The TCP header is removed.


B. Bits are decoded and the destination MAC address is recognized.
C. The IP header is removed and the contents are passed to the next layer.
D. The Ethernet header and trailer are removed.

What is the correct sequence of these steps?

A, B, C, D

A, C, B, D

B, C, D, A

B, D, C, A

C, A, B, D

23
How does a crossover cable connect two routers?

It connects the pins that are used for receiving on one router to the pins that
are used for receiving on the other router.

It connects the pins that are used for transmitting on one router to the pins that
are used for receiving on the other router.

It disconnects the transmit pins and uses only the receive pins.

It uses the same pins for transmitting and receiving.

24
Which two causes of networking problems are related to the physical layer? (Choose
two.)
disconnected cables

improper operation of cooling fans

incorrect MAC address

incorrect default gateway

incorrect subnet mask

25
What is specified by the host bits in an IP address?

broadcast identity of the network

identity of the computer on the network

network that is being addressed

network to which the host belongs

26
Which three address ranges can be used to depict private IP addresses? (Choose
three.)

10.0.0.0 to 10.0.0.255

127.16.0.0 to 127.16.255.255

150.150.0.0 to 150.150.255.255

172.16.1.0 to 172.16.1.255

192.168.22.0 to 192.168.22.255

200.100.50.0 to 200.100.50.255

27
What is the default subnet mask for an IP address of 64.100.19.14?

255.0.0.0

255.255.0.0

255.255.255.0

255.255.255.255

28
Which two statements are characteristics of DHCP services? (Choose two.)
A DHCP client determines the lease time for using the IP address that is supplied
by the DHCP server.

An integrated router acts as the DHCP server to provide the IP address to the ISP.

DHCP clients send a DHCP Discover message to the destination IP address of


255.255.255.255.

The DHCP server maps the IP addresses to host names.

The integrated router acts as a DHCP server for internal hosts on local networks.

29

Refer to the exhibit. An educational institution needs to connect PC systems that


use private IP addressing to the Internet. They have multiple systems that need to
access the Internet, but were only able to purchase one public IP address. What
should be activated on the Linksys integrated router to achieve this goal?

authentication

DHCP

encryption

firewall

NAT

WEP

30
What is the purpose of spam filter software?

It detects and removes spyware.

It detects and removes viruses.

It prevents the display of advertisement windows.

It examines incoming e-mail messages to identify the unsolicited ones.

Showing 2 of 4
<Prev
Page:

Next>
Close Window

All content copyright 1992-2008 Cisco Systems, Inc. Privacy Statement and
Trademarks.

Close Window

Assessment System

1. Assessment Selection
2. Assessment Settings
3. Take Assessment
Take Assessment - DHomesb Final Exam - CCNA Discovery: Networking for Home and
Small Businesses (Version 4.0)

Time Remaining:

31
What is the purpose of the ipconfig command?

to force a client to give up its current IP address

to force the client to clear all IP-to-domain-name associations that is has


learned

to force the client to clear all the MAC-address-to-IP-address associations that


it has learned

to show the current IP configuration on the client

32
When is the use of a DSL modem necessary?

when a cellular telephone provides the service

when a high-speed connection is provided over a cable TV network

when a high-speed digital connection is required over the regular telephone line
when a satellite dish is used

33
Which protocol is used by a client to browse the web server?

FTP

HTTP

POP

SMTP

34
A new student wants to interact with the operating system of a computer. Which two
methods can be used for this? (Choose two.)

CLI

GUI

kernel

third party software

shell

35

Refer to the exhibit. A PC requests an IP address from the server. Which two
protocols are used at the TCP/IP application layer and the internetwork layer?
(Choose two.)

DHCP

FTP

IP

TCP

UDP

36
What is the name given to the area covered by an ad hoc network in a WLAN?

Basic Service Set (BSS)

Distribution System (DS)


Extended Service Set (ESS)

Independent Basic Service Set (IBSS)

37

Refer to the exhibit. What is the purpose of assigning a network name of College?

It enables access to the AP configuration GUI by name rather than by address.

It encrypts data between the wireless client and the AP.

It identifies the wireless LAN.

It translates an internal address or group of addresses to a public address.

It translates IP addresses into easy-to-remember domain names.

38
What statement describes the filtering of traffic via the use of Stateful Packet
Inspection?

It recognizes and filters predefined URLs

It permits access that is based on the application.

It permits access based on IP or MAC addresses.

It permits incoming packets that are legitimate responses to requests from


internal hosts.

It translates an internal address or group of addresses into a public address that


is sent across the network.

39
A small company owns one older AP that provides a maximum data rate of 11 Mb/s.
The company wants to add a newer AP that will provide a faster data rate but be
compatible with the existing AP. What two wireless standards are referenced in
this scenario? (Choose two.)

802.11

802.11a

802.11b

802.11d

802.11g
40
What is the purpose of a router?

to forward broadcasts to all interfaces so that all hosts receive them

to maintain a table of individual host addresses

to select the best path to reach remote networks

to physically connect multiple hosts that belong to the same network

41
What are two characteristics of a MAC address? (Choose two.)

It indicates the physical location of the host within the network.

It is dynamically assigned by a DHCP server.

It is displayed in HEX characters.

It is a physical address.

It is cable-based.

42
What is the meaning of the term crosstalk?

interference of signals between wire pairs

loss of signal strength as distance increases

damage of the signal when two bare wires touch

strengthening of a signal by a networking device

43
Which two statements are true about network applications? (Choose two.)

Microsoft Word is an example of a network application.

Network applications are accessible from a remote computer.

Network applications are installed on a special type of computer that supports


only network applications.

Network applications are installed on a network server.

Network applications are accessible by one computer at a time.


44
What is an advantage of selecting an operating system that has a commercial
license over one with a GPL license?

The commercial license-based operating system ensures full access to the source
code for everyone.

The commercial license-based operating system ensures that everyone can


participate in the enhancement of the product.

The commercial license-based operating system provides structured support.

The commercial license-based operating system is released free of charge.

45
A user is unable to send e-mail. While troubleshooting this problem, the network
technician first verifies the physical connectivity of cables. Which
troubleshooting approach is being followed?

bottom-up

divide-and-conquer

top-down

trial and error

Showing 3 of 4
<Prev
Page:

Next>

Close Window

All content copyright 1992-2008 Cisco Systems, Inc. Privacy Statement and
Trademarks.
Close Window

Assessment System

1. Assessment Selection
2. Assessment Settings
3. Take Assessment

Take Assessment - DHomesb Final Exam - CCNA Discovery: Networking for Home and
Small Businesses (Version 4.0)
Time Remaining:

46
Which two transport layer protocols enable hosts to communicate and transfer data?
(Choose two.)

DHCP

ICMP

IP

TCP

UDP

47

Refer to the exhibit. Which statement is true based on the information that is
shown in the exhibit?

All wireless devices that are connected to this AP must have an assigned SSID of
College.

Any wireless client that is attached to this AP must have the same IP address and
SSID.

The AP is not physically wired to the local LAN.

This configuration is found only in an ad hoc wireless network.

48
Which part of a data packet is used by a router to determine the destination
network?

source IP address

user data
destination IP address

control information

destination MAC address

49
Which three types of information are provided to a DHCP client from a DHCP server?
(Choose three.)

host ID

MAC address

default gateway

IP addresses of DNS servers

physical address

subnet mask

50

Refer to the exhibit. Assume that the exhibited output is from a host that is
connected to a Linksys integrated router. What is the first thing that should be
checked if using a bottom-up troubleshooting approach?

the default gateway on the host

the IP address on the host

the IP address on the router

the link status LED on the front of the router

the subnet mask on the host

51

Refer to the exhibit. A wireless DHCP client is unable to access the web server.
Given the output that is shown in the exhibit, what two things should the network
technician verify first to troubleshoot this problem? (Choose two.)

the wireless client configuration for DHCP

the default gateway

the firewall configuration


the SSID

the physical connectivity between the server and the client

52
What is an advantage of purchasing a custom-built computer?

It is beneficial for less knowledgeable consumers.

The waiting period for assembly is negligible.

The cost is lower compared to a computer that has been preassembled.

The user can specify high-performance components to meet specific needs.

Showing 4 of 4
<Prev
Page:

Next>

Close Window

All content copyright 1992-2008 Cisco Systems, Inc. Privacy Statement and
Trademarks.

Você também pode gostar