Take Assessment

14
Take Assessment - DHomesb Final Exam - CCNA Discovery: Networking for Home and Small Businesses (Version 4.0) Time Remaining: Showing 1 of 4 Next > Page: GO <Pre v 1 Refer to the exhibit. A home network is configured with the information in the graphic. A user tries to manually create a new connection to the network using the SSID Ciscoclass. However, a connection cannot be made. What could be the problem? The SSID is case-sensitive. The SSID must contain at least one number. The SSID should be used with the default name. The SSID must contain a minimum of 32 characters. 2 What destination IP address is used in a unicast packet? a specific host a group of hosts all hosts on the network the network broadcast address 3 Which type of network attack occurs when an unauthorized person tries to persuade a user to share a network user ID and password? brute force 716519 1

Transcript of Take Assessment

Page 1: Take Assessment

Take Assessment - DHomesb Final Exam - CCNA Discovery: Networking for Home and Small Businesses (Version 4.0)

Time Remaining:

Showing 1 of 4 Next> Page:   GO <Prev

1

Refer to the exhibit. A home network is configured with the information in the graphic. A user tries to manually create a new connection to the network using the SSID Ciscoclass. However, a connection cannot be made. What could be the problem?

The SSID is case-sensitive.

The SSID must contain at least one number.

The SSID should be used with the default name.

The SSID must contain a minimum of 32 characters.2 What destination IP address is used in a unicast packet?

a specific host

a group of hosts

all hosts on the network

the network broadcast address3 Which type of network attack occurs when an unauthorized person tries to persuade a user to share a network

user ID and password?brute force

denial of service

data manipulation

social engineering4 What information within a data packet does a router use, by default, to make forwarding decisions?

716519

1

Page 2: Take Assessment

the destination MAC address

the destination IP address

the destination host name

the destination service requested5 Which type of firewall technique can be used to allow inbound traffic from the public network only if it was

initiated from the internal network?URL filtering

packet filtering

application filtering

stateful packet inspection6 Which network design layer provides a connection point for end user devices to the network?

access

core

distribution

network7 Which two statements are true about local applications? (Choose two.)

They run on the network.

An example of a local application is e-mail.

They are accessed from a remote computer.

They are stored on the local hard disk.

They run on the computer where they are installed.8 A local PC has the correct configuration that is required to access the network. A ping command that is sourced

at the PC does not receive a response from a remote device. Which operating system command might be used to determine where the connection failed?

netstat

tracert

ipconfig

nslookup9 What does the term "attenuation" mean in data communication?

loss of signal strength as distance increases

time for a signal to reach its destination

leakage of signals from one cable pair to another

strengthening of a signal by a networking device10 Which wireless technology allows only one-to-one connections and is typically used for short-range, line-of-

sight communication?GSM

Wi-Fi

Infrared

Bluetooth11

Page 3: Take Assessment

Refer to the exhibit. A network technician is statically assigning an IP address to a PC. The default gateway is correct. What would be a valid IP address to assign to the host?

128.106.10.100

128.107.255.1

128.107.255.254

128.108.100.1012 The area covered by a single AP is known as what?

ad-hoc network

basic service set

independent basic service set

extended service set

distribution system13 An administrator is troubleshooting a network problem that involves the inability of users to reach Internet sites.

During troubleshooting, the administrator is able to successfully ping web sites by their IP address, but pings to domain names are unsuccessful. Which service is most likely at fault?

DHCP

DNS

FTP

NAT14 Which type of network supports DHCP and DNS services for network users in a network domain?

client/server

peer-to-peer

Page 4: Take Assessment

Hierarchical

ad hoc15

Refer to the exhibit. The wireless router WR1 is configured with the address shown and DHCP is not configured. What will be the result of a technician configuring the address 172.16.14.255 on the laptop?

The laptop will be configured with the network address.

The laptop will be configured with a public IP address.

The laptop will be configured with a broadcast address.

The laptop will be configured within the same network as WR1.

Showing 1 of 4 Next> Page:   GO <Prev

All contents copyright 1992-2010 Cisco Systems, Inc. Privacy Statement  and  Trademarks

Assessment System

Skip to Time Left   |   Skip to Navigation   |   Skip to Assessment Items

Take Assessment - DHomesb Final Exam - CCNA Discovery: Networking for Home and Small Businesses (Version 4.0)

Time Remaining:

Showing 2 of 4 Next> Page:   GO <Prev

16 What is the function of a physical topology map?records IP addressing of each host

records hostnames and applications

organizes groups of hosts by how they use the network

shows where wiring is installed and the locations of network devices17 Which two issues can cause connectivity problems on a wireless network? (Choose two.)

1

1

598869

2

Page 5: Take Assessment

incorrect SSID

broadcast SSID

overlapping channels

low number of clients in BSS

802.11b clients attempting connection to 802.11g APs18 Which term is associated with logical addressing?

IP addresses

port addresses

physical addresses

Media Access Control addresses19 How does a crossover cable make it possible for two "like devices" (for example, two switches) to

communicate?The transmit pins are disconnected and only the receive pins are used.

The transmit pins on one device are connected to the transmit pins on the other device.

The receive pins on one device are connected to the receive pins on the other device.

The transmit pins on one device are connected to the receive pins on the other device.20 What two commands can be used to form a new binding if client information does not agree with the DHCP

client table? (Choose two.)ipconfig /release

ipconfig /all

ipconfig /flushdns

ipconfig /renew

ipconfig21 Which protocol is used to transfer files among network devices and perform file-management functions?

DNS

FTP

HTML

HTTP22 A network technician suspects that malware on a user PC is opening multiple TCP connections to a specific

foreign host address. Which Windows command line utility can be used to confirm the multiple TCP connections?

ping

netstat

tracert

ipconfig

nslookup23 Which two automatic addressing assignments are supported by DHCP? (Choose two.)

local server address

subnet mask

default gateway address

physical address of the recipient

physical address of the sender

Page 6: Take Assessment

24 How do ISPs obtain public IP addresses?They create the addresses themselves.

They obtain the addresses from the home PCs.

They obtain the addresses from the Internet registry.

They obtain the addresses from the RFC.25 When terminating a UTP cable, why is it important to push the wires all the way into the end of the connector?

to allow the cable to endure more stretching or twisting

to ensure good electrical contact

to ensure that the wires are in correct order

to minimize crosstalk26 How does a DMZ enhance network security for an organization?

blocks viruses and spyware

restricts internal user access to prohibited Internet sites

allows external customer access to designated internal resources

removes suspicious attachments from incoming and outgoing e-mail27 Which part of the electromagnetic spectrum is commonly used to exchange data between a PDA and a

computer?FM

radar

infrared

ultraviolet28 Which two protocols are responsible for encrypting data on a wireless network? (Choose two.)

EAP

PSK

WEP

WPA

PAP29

Refer to the exhibit. Assume that the command output is from a wireless DHCP client that is connected to a Linksys integrated router. What can be deduced from the output?

The DHCP configuration on the router needs to be verified.

Page 7: Take Assessment

The WEP key or SSID needs to be verified.

The wireless connection is operational.

The wireless NIC driver or the NIC itself needs to be reinstalled.30 A user starts a file transfer between a client machine and an FTP server. Which list correctly represents the

sequence of protocols that are used by the client machine to encapsulate the FTP data traffic for transmission?FTP, TCP, IP, Network Access Protocols

FTP, UDP, IP, Network Access Protocols

FTP, IP, UDP, Network Access Protocols

FTP, IP, TCP, Network Access Protocols

Showing 2 of 4 Next> Page:   GO <Prev

All contents copyright 1992-2010 Cisco Systems, Inc. Privacy Statement  and  Trademarks

Assessment System

Skip to Time Left   |   Skip to Navigation   |   Skip to Assessment Items

Take Assessment - DHomesb Final Exam - CCNA Discovery: Networking for Home and Small Businesses (Version 4.0)

Time Remaining:

Showing 3 of 4 Next> Page:   GO <Prev

31 A small company is installing a new network. The consulting technician recommends that a peer-to-peer network be implemented. What are two advantages of this network type? (Choose two.)

scalability

ease of setup

low device cost

central administration

fast file access to shared folders32 Bottom-up troubleshooting begins at which layer of the OSI model?

network layer

physical layer

data link layer

transport layer

2

2

553232

3

Page 8: Take Assessment

application layer33 All hosts within a domain receive the same frame that originates from one of the devices. The domain is also

bounded by routers. What type of domain is this?broadcast

collision

local

multicast34 What two pieces of information should a help desk technician document while troubleshooting connectivity

issues with an end user? (Choose two.)the CPU clock speed of the computer

the number of network jacks that are in the room

if the user can ping the default gateway address

if the word processing software is installed correctly

whether the PC uses dynamic or static IP addressing35

Refer to the exhibit. The security policy of an organization allows employees to connect to the office intranet from their homes. Which type of security policy is this?

acceptable use

incident handling

network maintenance

remote access36 What is an advantage of purchasing a custom-built computer?

It is beneficial for less knowledgeable consumers.

The waiting period for assembly is negligible.

The cost is lower compared to a computer that has been preassembled.

The user can specify high-performance components to meet specific needs.37 What is a major characteristic of asymmetric Internet service?

Download speeds and upload speeds are equal.

Download speeds are faster than upload speeds.

Data traffic speeds are faster than voice traffic speeds.

Used when consistently uploading large amounts of graphics, video and multimedia traffic.38 Which two TCP/IP properties must match on hosts in the same LAN if the hosts are to be able to communicate

Page 9: Take Assessment

with each other? (Choose two.)the subnet mask

the DNS server configurations

the default gateway configurations

the host portion of the IP address

the network portion of the IP address39 What is the function of the DNS server?

It assigns IP addresses to clients.

It accepts HTTP requests from clients.

It maps a hostname to a corresponding IP address.

It manages the domain that clients are assigned to.40 Which type of computer has an integrated mouse?

desktop

laptop

mainframe

server

pocket PC41 Some new features are available for the OS that is currently running on a user's PC. What method should be

chosen so that the user can install these new feature sets?clean install

multi-boot

upgrade

virtualization42

Refer to the exhibit. Why would a network administrator use the network mode that is shown?

Page 10: Take Assessment

to support hosts on different IP networks

to support hosts that use different 802.11 standards

to support both wireless and wired Ethernet hosts

to support hosts with different operating systems

to support hosts with network cards from different manufacturers43 What is a weakness of WEP that is solved by WPA?

WEP is a proprietary standard whereas WPA is an open standard.

WEP keys are only 64 bits long whereas WPA keys are 128 bits long.

WEP uses the same key for every connection whereas WPA uses a different key for each connection.WEP uses a fixed length key for every connection whereas WPA uses a different key length for each connection.

44 Which network entity would most likely be configured as both a DHCP client and a DHCP server?ISP

desktop PC

wireless laptop

PC-based server

integrated services home router45

Refer to the exhibit. What is the reason that the host is unable to connect to the Internet?DHCP needs to be enabled on the router.

The router has an incorrect DHCP starting address.

The IP address on the host is in the wrong network.

The host is configured with an incorrect gateway.

Showing 3 of 4 Next> Page:   GO <Prev 3

Page 11: Take Assessment

All contents copyright 1992-2010 Cisco Systems, Inc. Privacy Statement  and  Trademarks

Assessment System

Skip to Time Left   |   Skip to Navigation   |   Skip to Assessment Items

Take Assessment - DHomesb Final Exam - CCNA Discovery: Networking for Home and Small Businesses (Version 4.0)

Time Remaining:

Showing 4 of 4 Next> Page:   GO <Prev

46 How do wireless devices within a BSS access an available channel?Channels are used sequentially in round-robin fashion by each device in the BSS.

Devices ask permission to use a channel by sending the AP a Request to Send message.

Every device within the BSS is assigned its own channel and has its own dedicated connection.A device sends data and if it senses collisions it waits a predetermined time before re-sending on a different channel.

47 What is a service pack?an access policy

an agreement between a company and a vendor

a piece of code created to fix one specific problem

a collection of patches and updates released by a vendor

a small piece of software designed specifically for security issues48

3

513079

4

Page 12: Take Assessment

Refer to the exhibit. H1 can ping H2, H3, and the Fa0/0 interface of router R1. H2 and H3 but not H1 can ping H4 and H5. What is a possible cause for the H1 failure?

Router R1 has no route to the destination network.

Switch S1 does not have an IP address configured.

The link between router R1 and switch S2 has failed.

Host H1 does not have a default gateway configured.49 What are two ways that a user can interact with an operating system shell? (Choose two.)

CLI

OS

GUI

NIC

kernel50 A network administrator has been notified that users have experienced problems gaining access to network

resources. What utility could be used to directly query a name server for information on a destination domain?ping

tracert

netstat

ipconfig

nslookup51 Which wireless protocol is used for encryption?

EAP

Open

PSK

WEP52 What is the default subnet mask for an IP address of 64.100.19.14?

255.0.0.0

255.255.0.0

255.255.255.0

Page 13: Take Assessment

255.255.255.255

Showing 4 of 4 Next> Page:   GO <Prev

All contents copyright 1992-2010 Cisco Systems, Inc. Privacy Statement  and  Trademarks

4

4