Cisco Finaml Exam

Embed Size (px)

Citation preview

  • 8/2/2019 Cisco Finaml Exam

    1/33

    Form 1 - Exam Viewer - DHomesb Final Exam - CCNA

    Discovery: Networking for Home and Small Businesses

    (Version 4.0)

    1

    Refer to the exhibit. A PC requests an IP address from the server. Which two protocols are used at the TCP/IP applicationlayer and the internetwork layer? (Choose two.)

    DHCP

    FTP

    IP

    TCP

    UDP

    2 TCP/IP data transmission between the source and destination host is de-encapsulated in four steps:

    A. The TCP header is removed.B. Bits are decoded and the destination MAC address is recognized.C. The IP header is removed and the contents are passed to the next layer.

    D. The Ethernet header and trailer are removed.

    What is the correct sequence of these steps?

    A, B, C, D

    A, C, B, D

    B, C, D, A

    B, D, C, A

    C, A, B, D

    3 What is the function of the DNS server?

    It assigns IP addresses to clients.

    It accepts HTTP requests from clients.

    It maps a hostname to a corresponding IP address.

    It manages the domain that clients are assigned to.

    4 Which two automatic addressing assignments are supported by DHCP? (Choose two.)

    local server address

    subnet mask

    default gateway address

    physical address of the recipient

    http://4.bp.blogspot.com/-qf9nr5c6h0k/TtWeZymbRxI/AAAAAAAAAP4/-YiJXEOdZLI/s1600/17632.jpg
  • 8/2/2019 Cisco Finaml Exam

    2/33

    physical address of the sender

    5 What measurement is commonly used to describe communication speed when transferring data?

    bps

    cps

    Hz

    MB

    6

    Refer to the exhibit. A user on host A sends an e-mail to the user on host B. Which type of message does host A send?

    broadcast

    multicast

    simulcast

    unicast

    7 As an assignment, a computer science student needs to present data in binary format. What are the two possible valuesthat the student can use? (Choose two.)

    0

    1

    2

    A

    F

    8 Which term is associated with logical addressing?

    IP addresses

    port addresses

    physical addresses

    Media Access Control addresses

    9 Which three statements describe an IP address? (Choose three.)

    An IP address is known as a logical address.

    An IP address uses a 30-bit addressing scheme.

    An IP address is found in the Layer 2 header during transmission.

    The network portion of an IP address is burned into a network interface card.

    An IP address is unique within the same local network.

    The network portion of an IP address will be the same for all hosts that are connected to the same localnetwork.

    http://1.bp.blogspot.com/-xJQ6hjD8ML0/TtWe1D9k7jI/AAAAAAAAAQA/S5XTLP1ozQE/s1600/17609.jpg
  • 8/2/2019 Cisco Finaml Exam

    3/33

    10

    Refer to the exhibit. Which option correctly represents the encapsulation of a packet that is sent by Host1 to the webserver?

  • 8/2/2019 Cisco Finaml Exam

    4/33

    They interconnect multiple companies.

    They interconnect local network segments.

    They interconnect the company network to the ISP.

    15 Which network design layer provides hosts with initial connectivity to the network?access

    core

    distribution

    network

    16 What statement describes the filtering of traffic via the use of Stateful Packet Inspection?

    It recognizes and filters predefined URLs

    It permits access that is based on the application.

    It permits access based on IP or MAC addresses.

    It permits incoming packets that are legitimate responses to requests from internal hosts.

    It translates an internal address or group of addresses into a public address that is sent across the network.

    17 What advantage does a peer-to-peer network have over a client-server network?

    It increases security.

    It increases scalability.

    It produces a higher performance for hosts.

    It eliminates the need for centralized administration.

    18 After attaching four PCs to the switch ports, configuring the SSID and setting authentication properties for a small officenetwork, a technician successfully tests the connectivity of all PCs that are connected to the switch and WLAN. A firewall isthen configured on the device prior to connecting it to the Internet. What type of network device includes all of thedescribed features?

    switch

    ISR router

    firewall appliance

    standalone wireless access point

    19 Which portion of the packet does a router use to forward the packet to the destination?

    source IP addressuser data

    destination IP address

    control information

    destination MAC address

    20

  • 8/2/2019 Cisco Finaml Exam

    5/33

    Refer to the graphic. Based on the information that is shown, what statement is true?

    This configuration would be commonly found in an ad hoc wireless network.

    Any wireless client that is attached to this access point would have the same IP address and SSID.

    All wireless devices that are connected to this access point must have an assigned SSID of Academy.

    In addition to accepting wireless client requests, this access point must connect to the wired network.

    21 What is the function of a physical topology map?

    records IP addressing of each host

    records hostnames and applicationsorganizes groups of hosts by how they use the network

    shows where wiring is installed and the locations of network devices

    22 Which value represents the host portion of IP address 128.107.10.11 with a subnet mask of 255.255.0.0?

    .10

    .10.11

    128.107

    .107.10.11

    128.107.10

    23 What is specified by the host bits in an IP address?

    broadcast identity of the network

    identity of the computer on the network

    network that is being addressed

    network to which the host belongs

    24 What describes the external IP address that is obtained by a router through a cable or DSL modem?

    a public address that is obtained from ICANN

    a private address that is manually configured by the administrator

    a public address that is obtained through DHCP from the ISP

    a private address that converts to a public address on the internal LAN

    25

    Refer to the exhibit. Which pair of addresses would be appropriate to use for PC1 and PC2 to establish a workgroup using

    http://1.bp.blogspot.com/-I79XlRfsAuQ/TtWgyThnv5I/AAAAAAAAARA/Qp9WxpOcRxQ/s1600/30194.jpghttp://3.bp.blogspot.com/-tT4UVK3E0NM/TtWgXSWwVZI/AAAAAAAAAQ4/cBQn41L1XHU/s1600/15831.jpghttp://1.bp.blogspot.com/-I79XlRfsAuQ/TtWgyThnv5I/AAAAAAAAARA/Qp9WxpOcRxQ/s1600/30194.jpghttp://3.bp.blogspot.com/-tT4UVK3E0NM/TtWgXSWwVZI/AAAAAAAAAQ4/cBQn41L1XHU/s1600/15831.jpg
  • 8/2/2019 Cisco Finaml Exam

    6/33

    private addresses?

    127.0.0.1 and 127.0.0.2

    172.16.4.2 and 172.16.4.3

    172.16.5.1 and 192.168.3.2

    198.133.219.25 and 198.133.219.26

    26 Under what circumstance would it be appropriate to use private IP addresses?

    for communication between two ISPs

    for a network that is directly connected to the Internet

    for addresses that are used exclusively within an organization.

    for a host with more than one direct connection to the Internet

    27 Which wireless protocol is used for encryption?

    EAP

    Open

    PSK

    WEP

    28

    Refer to the exhibit. The security policy of an organization requires users to change their password every week. Which typeof security policy is this?

    acceptable use

    network maintenance

    password

    remote access

    29 Which type of network attack occurs when an unauthorized person tries to persuade a user to share a network user ID andpassword?

    brute force

    denial of service

    data manipulation

    social engineering

    30 A system administrator routinely monitors failed login attempts on a server. If the administrator sees an extremely highnumber of failed attempts by a single user who is trying multiple password combinations, what type of attack is inprogress?

    brute force

    phishing

    http://2.bp.blogspot.com/-O7W7Bwr7rog/TtWhBlpsDpI/AAAAAAAAARI/rUZZ3Y7GOLI/s1600/17640.jpg
  • 8/2/2019 Cisco Finaml Exam

    7/33

    SYN flood

    virus

    vishing

    31 What is the purpose of spam filter software?It detects and removes spyware.

    It detects and removes viruses.

    It prevents the display of advertisement windows.

    It examines incoming e-mail messages to identify the unsolicited ones.

    32

    Refer to the exhibit. An educational institution needs to connect PC systems that use private IP addressing to the Internet.They have multiple systems that need to access the Internet, but were only able to purchase one public IP address. Whatshould be activated on the Linksys integrated router to achieve this goal?

    authentication

    DHCP

    encryption

    firewall

    NAT

    WEP

    33 How does a crossover cable connect two routers?

    It connects the pins that are used for receiving on one router to the pins that are used for receiving on the other router.

    It connects the pins that are used for transmitting on one router to the pins that are used for receiving on theother router.

    It disconnects the transmit pins and uses only the receive pins.

    It uses the same pins for transmitting and receiving.

    34 Which wireless technology allows only one-to-one connections and is typically used for short-range, line-of-sightcommunication?

    GSM

    Wi-Fi

    Infrared

    Bluetooth

    35 Which picture shows a USB port on a PC?

    http://1.bp.blogspot.com/-kLgSaZVdQas/TtWhR8ZQ19I/AAAAAAAAARQ/rNk6EcB7_D0/s1600/17629.jpg
  • 8/2/2019 Cisco Finaml Exam

    8/33

  • 8/2/2019 Cisco Finaml Exam

    9/33

    firewall

    system bus

    operating system

    39 Which wireless component allows wireless clients to gain access to a wired network?PDA

    STA

    access point

    wireless bridge

    40 Which two components are configured via software in order for a PC to participate in a network environment? (Choosetwo.)

    MAC address

    IP address

    kernel

    shell

    subnet mask

    41 Which Windows PC command line utility can be used to discover the path that a packet takes to reach a destination?

    ping

    netstat

    tracert

    nslookup

    ipconfig

    42

    Refer to the exhibit. A wireless client is unable to connect to a Linksys WRT300N access point that is using network192.168.1.0/24 for its LAN and WLAN clients. What could cause the problem?

    The IP address is incorrect.

    The subnet mask is incorrect.

    The default gateway is incorrect.

    All addresses are correct, so the SSID must be incorrect.

    43 What two commands can be used to form a new binding if client information does not agree with the DHCP client table?(Choose two.)

    http://2.bp.blogspot.com/-MonfajBNsbw/TtWiOLIsnBI/AAAAAAAAAR4/iqEkYiepYTE/s1600/35151.jpg
  • 8/2/2019 Cisco Finaml Exam

    10/33

    ipconfig /release

    ipconfig /all

    ipconfig /flushdns

    ipconfig /renew

    ipconfig

    44 Which device is often configured to act as both a DHCP client and a DHCP server?

    home PC

    ISP modem

    wireless-enabled laptop

    integrated services router

    45

    Refer to the exhibit. What is the effect of setting the security mode to WEP on the Linksys integrated router?

    The WEP security mode enables the AP to inform clients of its presence.

    The WEP security mode encrypts network traffic during transmission between the AP and the wireless client.

    The WEP security mode generates a dynamic key each time a client establishes a connection with the AP.

    The WEP security mode identifies the WLAN.

    46 Which installation option should be chosen when the current operating system is too damaged to work properly?

    upgrade

    multi-boot

    clean install

    virtualization

    47 Which two causes of networking problems are related to the physical layer? (Choose two.)

    disconnected cables

    improper operation of cooling fans

    incorrect MAC address

    incorrect default gateway

    incorrect subnet mask

    48 A user in a small office is unable to connect to the Internet. The user examines the physical connections to the ISR, aLinksys WRT300N, and notices a solid green LED on the port that is wired to the computer. What does the LED indicateabout the current state of the port?

    The ISR is making adjustments to the port.

    The device is plugged in and traffic is flowing.

    The computer is plugged in but no traffic is flowing.

    The ISR does not detect that the computer is plugged in.

    http://1.bp.blogspot.com/-vM3UQabwSVw/TtWiu9cjrrI/AAAAAAAAASA/neLGos5fpXQ/s1600/17639.jpg
  • 8/2/2019 Cisco Finaml Exam

    11/33

    49

    Refer to the exhibit. PC1 is unable to access the web server at 209.165.200.226/27. Based on the provided output, what isthe most likely cause of the problem?

    PC1 is not plugged in to RTR1.

    Port 80 is already in use on PC1.

    No DNS server is configured on PC1.

    PC1 is configured with an incorrect IP address and default gateway.

    50 What does it mean when a problem is being escalated by a helpdesk?

    The helpdesk is following up on a resolved problem.

    The helpdesk has made the problem a lower priority.

    The helpdesk has solved the problem and is closing the ticket.

    The helpdesk is moving the problem to a higher level support staff.

    Tuesday, November 29, 2011

    Form 2 - Exam Viewer - DHomesb Final Exam - CCNA

    Discovery: Networking for Home and Small Businesses

    (Version 4.0)

    1 Which protocol in its default configuration downloads e-mail messages to the client computer and deletes them from theserver?

    FTP

    POP3

    SMTP

    IMAP4

    2 A user tries to open a page on the web server at www.cisco.com. The users workstation does not have the destination IPaddress in order to encapsulate the request. Which network topology will provide the services that are required toassociate the name of the web server with an IP address?

    http://3.bp.blogspot.com/-6dEYql34RZc/Tta_PHohLLI/AAAAAAAAASQ/5mkCZcUrhB8/s1600/157780a.jpghttp://2.bp.blogspot.com/-t5ze8Qz5mMc/TtWjK_f8HNI/AAAAAAAAASI/IZH2oQ1Z3Eo/s1600/37125.pnghttp://3.bp.blogspot.com/-6dEYql34RZc/Tta_PHohLLI/AAAAAAAAASQ/5mkCZcUrhB8/s1600/157780a.jpghttp://2.bp.blogspot.com/-t5ze8Qz5mMc/TtWjK_f8HNI/AAAAAAAAASI/IZH2oQ1Z3Eo/s1600/37125.png
  • 8/2/2019 Cisco Finaml Exam

    12/33

  • 8/2/2019 Cisco Finaml Exam

    13/33

    5 Which of the following are transport layer protocols of the TCP/IP model? (Choose two.)

    FTP

    UDP

    SMTP

    TFTPTCP

    6 What measurement is commonly used to describe communication speed when transferring data?

    bps

    cps

    Hz

    MB

    7 As an assignment, a computer science student needs to present data in binary format. What are the two possible values

    that the student can use? (Choose two.)0

    1

    2

    A

    F

    8 A host wants to send information simultaneously to all the other hosts in the same network. Which domain will support thistype of communication?

    broadcast

    unicast

    local

    multicast

    9 What destination IP address is used in a unicast packet?

    a specific host

    a group of hosts

    all hosts on the network

    the network broadcast address

    10 Which portion of a received datagram is decoded and used by the internetwork layer of the TCP/IP model?

    IP address

    port number

    MAC address

    HTML/user data

    11 What are two advantages of purchasing a custom-built computer? (Choose two.)

    usually a lower cost

    no waiting period for assemblyuser can specify higher performance components

  • 8/2/2019 Cisco Finaml Exam

    14/33

    supports higher-end graphics and gaming applications

    fewer components to replace

    12 What is the most common reason that ISPs provide asymmetrical transfer services?

    to carry a large amount of data in both directions at equal rates

    to host servers on the Internet

    to work with applications that require significant bandwidth

    to work with large business applications

    13 When is the use of a DSL modem necessary?

    when a cellular telephone provides the service

    when a high-speed connection is provided over a cable TV network

    when a high-speed digital connection is required over the regular telephone line

    when a satellite dish is used

    14 Which network design layer provides a connection point for end user devices to the network?

    access

    core

    distribution

    network

    15 Which two statements are true about network applications? (Choose two.)

    Microsoft Word is an example of a network application.

    Network applications are accessible from a remote computer.Network applications are installed on a special type of computer that supports only network applications.

    Network applications are installed on a network server.

    Network applications are accessible by one computer at a time.

    16 Which type of network supports DHCP and DNS services for network users in a network domain?

    client/server

    peer-to-peer

    hierarchical

    ad hoc

    17 Which portion of the packet does a router use to forward the packet to the destination?

    source IP address

    user data

    destination IP address

    control information

    destination MAC address

    18

  • 8/2/2019 Cisco Finaml Exam

    15/33

    Refer to the exhibit. The network is experiencing excessive broadcast traffic from multiple hosts. What can be done toreduce the broadcast traffic that each host receives without compromising connectivity to the corporate servers?

    Separate the switches with a router.

    Create a separate VLAN for the servers and hosts.

    Change from Ethernet switches to FastEthernet switches.Increase the number of switches to reduce the number of PCs that are connected to each switch.

    19

    Refer to the exhibit. If host H8 sends a message to host H5 and the destination MAC address is in the MAC tables of bothswitches, which host device or devices will receive the message?

    only host H5

    all hosts on the network

    all hosts that are connected to switch Sw1

    all hosts that are connected to switch Sw2 and host H5.

    all hosts that are connected to hub Hub1 and switch Sw1

    20

    Refer to the graphic. Based on the information that is shown, what statement is true?

    This configuration would be commonly found in an ad hoc wireless network.

    Any wireless client that is attached to this access point would have the same IP address and SSID.

    All wireless devices that are connected to this access point must have an assigned SSID of Academy.

    In addition to accepting wireless client requests, this access point must connect to the wired network.

    21

    http://2.bp.blogspot.com/-DRjhmzAOjbk/TtbAlqVAGEI/AAAAAAAAATI/9QQ4VC_l628/s1600/15831.jpghttp://3.bp.blogspot.com/-4jVpWv_zN9o/TtbAaVA50rI/AAAAAAAAATA/zZi3NlaikZI/s1600/36828.jpghttp://4.bp.blogspot.com/-Yt1zdGG_3Ag/TtbAQ98WBKI/AAAAAAAAAS4/8E1E6QpSpNg/s1600/31336.jpghttp://2.bp.blogspot.com/-DRjhmzAOjbk/TtbAlqVAGEI/AAAAAAAAATI/9QQ4VC_l628/s1600/15831.jpghttp://3.bp.blogspot.com/-4jVpWv_zN9o/TtbAaVA50rI/AAAAAAAAATA/zZi3NlaikZI/s1600/36828.jpghttp://4.bp.blogspot.com/-Yt1zdGG_3Ag/TtbAQ98WBKI/AAAAAAAAAS4/8E1E6QpSpNg/s1600/31336.jpghttp://2.bp.blogspot.com/-DRjhmzAOjbk/TtbAlqVAGEI/AAAAAAAAATI/9QQ4VC_l628/s1600/15831.jpghttp://3.bp.blogspot.com/-4jVpWv_zN9o/TtbAaVA50rI/AAAAAAAAATA/zZi3NlaikZI/s1600/36828.jpghttp://4.bp.blogspot.com/-Yt1zdGG_3Ag/TtbAQ98WBKI/AAAAAAAAAS4/8E1E6QpSpNg/s1600/31336.jpg
  • 8/2/2019 Cisco Finaml Exam

    16/33

    Refer to the graphic. Assume that the command output is from a wireless DHCP client that is connected to a Linksysintegrated router. What can be deduced from the output?

    The wireless connection is good.

    The WEP key or SSID needs to be checked.

    The DHCP configuration on the router needs to be checked.

    The wireless NIC driver or the NIC itself needs to be reinstalled.

    22 How do ISPs obtain public IP addresses?

    They create the addresses themselves.

    They obtain the addresses from the home PCs.

    They obtain the addresses from the Internet registry.

    They obtain the addresses from the RFC.

    23

    Refer to the exhibit. In the wireless network, what is the maximum number of hosts supported if the IP addressing schemecontains four host bits?

    6

    14

    16

    30

    32

    254

    24 What describes the external IP address that is obtained by a router through a cable or DSL modem?

    a public address that is obtained from ICANN

    a private address that is manually configured by the administrator

    a public address that is obtained through DHCP from the ISP

    http://1.bp.blogspot.com/-2jYiA10TaH8/TtbA8ScwZnI/AAAAAAAAATY/UnUwuAMsZUk/s1600/29942.jpghttp://4.bp.blogspot.com/--zDfZNzakhY/TtbAs-skC0I/AAAAAAAAATQ/2mHYKu5cOwQ/s1600/16270.jpghttp://1.bp.blogspot.com/-2jYiA10TaH8/TtbA8ScwZnI/AAAAAAAAATY/UnUwuAMsZUk/s1600/29942.jpghttp://4.bp.blogspot.com/--zDfZNzakhY/TtbAs-skC0I/AAAAAAAAATQ/2mHYKu5cOwQ/s1600/16270.jpg
  • 8/2/2019 Cisco Finaml Exam

    17/33

    a private address that converts to a public address on the internal LAN

    25 After issuing the ipconfig/all command on a host that has DHCP enabled, a network administrator notes that the outputcontains faulty IP configuration information. What is the first step the administrator should take to resolve this issue?

    Replace the NIC in the host.

    Change the IP address of the DHCP server.

    Use static addressing to assign the correct IP address.

    Use the release and renew options supported by the ipconfig command.

    26 Which three addresses belong to the category of private IP addresses? (Choose three.)

    10.0.0.1

    128.0.0.1

    150.0.0.1

    172.16.0.1

    192.168.31.19

    172.168.31.1

    27 Which part of the electromagnetic spectrum is commonly used to exchange data between a PDA and a computer?

    FM

    radar

    infrared

    ultraviolet

    28 What is the purpose of pop-up blocker software?It detects and removes spyware.

    It detects and removes viruses.

    It prevents the display of advertisement windows.

    It removes unwanted e-mail.

    29

    Refer to the exhibit. The security policy of an organization allows employees to connect to the office intranet from theirhomes. Which type of security policy is this?

    acceptable use

    incident handling

    network maintenance

    remote access

    30 Which type of network attack occurs when an unauthorized person tries to persuade a user to share a network user ID and

    password?

    brute force

    http://3.bp.blogspot.com/-IeELt5tqs0I/TtbBSaaxtgI/AAAAAAAAATg/5lf5N_lRzHQ/s1600/17620.jpg
  • 8/2/2019 Cisco Finaml Exam

    18/33

    denial of service

    data manipulation

    social engineering

    31 When NAT is employed in a small office, which address type is typically used for hosts on the local LAN?private IP addresses

    global public IP addresses

    Internet-routable addresses

    both private and public IP addresses

    32 Which statement is true concerning stateful packet inspection?

    Access is permitted based on IP addresses of the source and destination devices.

    Access is permitted based on the MAC addresses of the source and destination devices.

    Access is permitted only if the type of application that is attempting to reach the internal host is allowed.

    Access is permitted only if it is a legitimate response to a request from an internal host.

    33 How does a straight-through cable connect two unlike devices?

    It connects the receive pins on the first device to the receive pins on the second device.

    It connects the transmit pins on the first device to the receive pins on the second device.

    It disconnects the transmit pins and uses only the receive pins.

    It uses the same pins for transmitting and receiving.

    34 When would infrared be used to connect network devices?

    when connecting multiple host devices to a wireless access pointwhen synchronizing a PC with a PDA that is in line of sight

    when connecting a PC to a network switch that is located in another room

    when updating two access points that are located in separate buildings

    35 Which picture shows a USB port on a PC?

    http://2.bp.blogspot.com/-DhXMx2tHW4U/TtbBzTR7EHI/AAAAAAAAATo/ukbebXb1Wsc/s1600/option+a3.jpg
  • 8/2/2019 Cisco Finaml Exam

    19/33

  • 8/2/2019 Cisco Finaml Exam

    20/33

    Refer to the exhibit. Assume that the exhibited output is from a host that is connected to a Linksys integrated router. Whatis the first thing that should be checked while using a bottom-up troubleshooting approach?

    the default gateway on the host

    the IP address on the host

    the IP address on the router

    the link status LED on the front of the router

    the subnet mask on the host

    40 For devices that do not autosense, which connection requires a crossover cable?

    hub port to router port

    PC to hub port

    PC to switch port

    PC port to PC port

    41 Which Windows command is used to display the configured IP address, subnet mask, and default gateway?

    ipconfig

    netstat

    nslookup

    tracert

    42 What must be identical on all devices in a WLAN for successful wireless communication between the devices?

    SSID

    antenna type

    network mode

    wireless NIC driver

    43 What is the purpose of the ipconfig /release command?

    It forces a client to give up its current IP address.

    It forces a client to give up its current MAC address.

    It forces the client to clear all the MAC address to IP address associations it has learned.

    It shows the current IP configuration on the client.

    44 What is the common DHCP role of the ISR router in home and small office networks?

    The ISR router acts only as a DHCP client.

    http://2.bp.blogspot.com/-AzVVyrm35iA/TtbCgnvT31I/AAAAAAAAAUQ/A3wT3jeSKuE/s1600/17963.jpg
  • 8/2/2019 Cisco Finaml Exam

    21/33

    The ISR router acts only as a DHCP server.

    The ISR router acts as both a DHCP client and server.

    The ISR router forwards all DHCP traffic and acts as neither a client nor a server.

    45 A company has a web server that must be accessible to both external and internal clients. Which security policy bestpractice should be followed to maximize security of the server?

    Place the web server in a DMZ.

    Keep the web server on the external network.

    Configure a firewall device to serve as the web server.

    Locate the web server in the server farm of the internal network.

    46 For the second time in a week, workstations on a LAN are not able to log into the server. The technician fixed the problemthe first time, but cannot remember the steps taken to solve it. What aspect of the troubleshooting process has thetechnician neglected?

    identifying the problem

    asking end-users questions

    documenting the troubleshooting process

    using structured techniques to solve a problem

    47 A network technician suspects that malware on a user PC is opening multiple TCP connections to a specific foreign hostaddress. Which Windows command line utility can be used to confirm the multiple TCP connections?

    ping

    netstat

    tracert

    ipconfig

    nslookup

    48 Which two causes of networking problems are related to the physical layer? (Choose two.)

    damaged cables and connectors

    incorrect addressing

    incorrect subnet mask

    overheated components

    incorrect default gateway

    49

  • 8/2/2019 Cisco Finaml Exam

    22/33

    Refer to the exhibit. A Linksys integrated services router is being used by wireless clients to access a server which isdirectly connected to an Ethernet port on the router. The server and the clients are using DHCP for IP addressing from theLinksys device and are on the same subnet. The server and the wireless clients are obtaining the correct IP configurationand can ping the Linksys device, but are unable to ping each other. What could be causing this issue?

    The ping failures indicate a routing problem on the Linksys device. Check for proper routes.

    The symptoms indicate a physical connection problem on the server. Check for the proper cable type and the physicalconnection.The problem is most likely occurring on the Linksys device. Check all configurations on the Linksys device toensure no security restrictions could be causing the issue.Radio frequency problems are the likely problem if the clients cannot connect to the server on the same subnet. Beginby checking the signal strength at the wireless clients.

    50 What two pieces of information should a help desk technician document while troubleshooting connectivity issues with an

    end user? (Choose two.)

    the CPU clock speed of the computer

    the number of network jacks that are in the room

    if the user can ping the default gateway address

    if the word processing software is installed correctly

    whether the PC uses dynamic or static IP addressing

    Thursday, December 1, 2011

    Form 3 - Exam Viewer - DHomesb Final Exam - CCNA

    Discovery: Networking for Home and Small Businesses(Version 4.0)

    1 Which protocol is used to transfer files among network devices and perform file-management functions?

    DNS

    FTP

    HTML

    HTTP

    2 What is the function of the DNS server?It assigns IP addresses to clients.

    http://1.bp.blogspot.com/-kkDMTwaPBM8/TtbC9Ot3iPI/AAAAAAAAAUY/kdIjoaigtsw/s1600/31334.jpg
  • 8/2/2019 Cisco Finaml Exam

    23/33

    It accepts HTTP requests from clients.

    It maps a hostname to a corresponding IP address.

    It manages the domain that clients are assigned to.

    3 A computer joins the network and announces itself to all hosts on the LAN. What type of message doesthe computer send out?

    broadcast

    simulcast

    multicast

    unicast

    4 As an assignment, a computer science student needs to present data in binary format. What are the twopossible values that the student can use? (Choose two.)

    0

    12

    A

    F

    5 What type of message is sent to a specific group of hosts?

    static

    unicast

    dynamic

    multicastbroadcast

    6 Which term is associated with logical addressing?

    IP addresses

    port addresses

    physical addresses

    Media Access Control addresses

    7 What destination IP address is used in a unicast packet?

    a specific host

    a group of hosts

    all hosts on the network

    the network broadcast address

    8 Which value would be considered the physical address for data that is sent across an Ethernet segment?

    IP address

    port address

    MAC address

    network address

  • 8/2/2019 Cisco Finaml Exam

    24/33

    9

    Refer to the exhibit. Which option correctly represents the encapsulation of a packet that is sent byHost1 to the web server?

  • 8/2/2019 Cisco Finaml Exam

    25/33

    They are accessed from a remote computer.

    They are stored on the local hard disk.

    They run on the computer where they are installed.

    14 Which portion of the packet does a router use to forward the packet to the destination?source IP address

    user data

    destination IP address

    control information

    destination MAC address

    15

    Refer to the exhibit. H1 can ping H2, H3, and the Fa0/0 interface of router R1. H2 and H3 but not H1can ping H4 and H5. What is a possible cause for the H1 failure?

    Router R1 has no route to the destination network.

    Switch S1 does not have an IP address configured.

    The link between router R1 and switch S2 has failed.

    Host H1 does not have a default gateway configured.

    16

    Refer to the exhibit. If H4 sends a message to H1 and the destination MAC address is in the MAC tablefor both Switch1 and Switch2, which host devices will receive the message?

    only H1

    hosts H1 and H4

    all hosts that are connected to Switch1

    all hosts that are connected to Switch1 and Switch2

    17

    http://1.bp.blogspot.com/-0qDqz_g_TtQ/Ttc8UIxCwmI/AAAAAAAAAU4/RQ2qKGUWr1Q/s1600/25931.jpghttp://4.bp.blogspot.com/-LVA_M_lkm64/Ttc8Mlu0B9I/AAAAAAAAAUw/RBQlOmkCvyI/s1600/27754.jpghttp://1.bp.blogspot.com/-0qDqz_g_TtQ/Ttc8UIxCwmI/AAAAAAAAAU4/RQ2qKGUWr1Q/s1600/25931.jpghttp://4.bp.blogspot.com/-LVA_M_lkm64/Ttc8Mlu0B9I/AAAAAAAAAUw/RBQlOmkCvyI/s1600/27754.jpg
  • 8/2/2019 Cisco Finaml Exam

    26/33

    Refer to the exhibit. Which statement is true based on the information that is shown in the exhibit?

    All wireless devices that are connected to this AP must have an assigned SSID of College.

    Any wireless client that is attached to this AP must have the same IP address and SSID.

    The AP is not physically wired to the local LAN.

    This configuration is found only in an ad hoc wireless network.

    18

    Refer to the exhibit. A home network is configured with the information in the graphic. A user tries tomanually create a new connection to the network using the SSID Ciscoclass. However, a connection

    cannot be made. What could be the problem?

    The SSID is case-sensitive.

    The SSID must contain at least one number.

    The SSID should be used with the default name.

    The SSID must contain a minimum of 32 characters.

    19

    Refer to the exhibit. Assume that the command output is from a wireless DHCP client that is connected toa Linksys integrated router. What can be deduced from the output?

    The DHCP configuration on the router needs to be verified.

    The WEP key or SSID needs to be verified.

    http://1.bp.blogspot.com/-EI0jIbx960M/Ttc8w6iYEXI/AAAAAAAAAVQ/PKPkH18Nu68/s1600/17960.jpghttp://1.bp.blogspot.com/-BFudrGs-v24/Ttc8hFZ7hzI/AAAAAAAAAVI/aU7pIqw1c-M/s1600/24661.jpghttp://4.bp.blogspot.com/-3ocF83smm1M/Ttc8bhBvHfI/AAAAAAAAAVA/whiWG05UHyc/s1600/17635.jpghttp://1.bp.blogspot.com/-EI0jIbx960M/Ttc8w6iYEXI/AAAAAAAAAVQ/PKPkH18Nu68/s1600/17960.jpghttp://1.bp.blogspot.com/-BFudrGs-v24/Ttc8hFZ7hzI/AAAAAAAAAVI/aU7pIqw1c-M/s1600/24661.jpghttp://4.bp.blogspot.com/-3ocF83smm1M/Ttc8bhBvHfI/AAAAAAAAAVA/whiWG05UHyc/s1600/17635.jpghttp://1.bp.blogspot.com/-EI0jIbx960M/Ttc8w6iYEXI/AAAAAAAAAVQ/PKPkH18Nu68/s1600/17960.jpghttp://1.bp.blogspot.com/-BFudrGs-v24/Ttc8hFZ7hzI/AAAAAAAAAVI/aU7pIqw1c-M/s1600/24661.jpghttp://4.bp.blogspot.com/-3ocF83smm1M/Ttc8bhBvHfI/AAAAAAAAAVA/whiWG05UHyc/s1600/17635.jpg
  • 8/2/2019 Cisco Finaml Exam

    27/33

    The wireless connection is operational.

    The wireless NIC driver or the NIC itself needs to be reinstalled.

    20 What will be one result of using a wireless infrastructure when designing the communications infrastructurefor a new building?

    Wireless devices will be easy to add or relocate.

    Infrastructure installation will be difficult and expensive.

    There will be less interference from outside electronic sources.

    Data transmitted over wireless networks will be more secure than when transmitted over wired networks.

    21 What is specified by the network number in an IP address?

    the network to which the host belongs

    the physical identity of the computer on the network

    the node of the subnetwork which is being addressed

    the broadcast identity of subnetwork

    22

    Refer to the exhibit. Given the use of default masks, which network will router R1 use as the destinationnetwork for communications from PC1 to PC2?

    128.0.0.0

    128.107.0.0

    128.107.1.0

    192.0.0.0

    192.135.0.0

    192.135.14.0

    23 Which two values represent the network number and default mask for the address 209.165.200.225? (Choose two.)

    209.0.0.0

    209.165.0.0

    209.165.200.0

    255.0.0.0

    255.255.0.0

    255.255.255.0

    http://1.bp.blogspot.com/-i-GFUSfJ0W0/Ttc9gfoETJI/AAAAAAAAAVY/LP3y1YutGME/s1600/24981.jpg
  • 8/2/2019 Cisco Finaml Exam

    28/33

    24 Which three address ranges can be used to depict private IP addresses? (Choose three.)

    10.0.0.0 to 10.0.0.255

    127.16.0.0 to 127.16.255.255

    150.150.0.0 to 150.150.255.255

    172.16.1.0 to 172.16.1.255

    192.168.22.0 to 192.168.22.255

    200.100.50.0 to 200.100.50.255

    25 Under what circumstance would it be appropriate to use private IP addresses?

    for communication between two ISPs

    for a network that is directly connected to the Internet

    for addresses that are used exclusively within an organization.

    for a host with more than one direct connection to the Internet

    26 Which part of the electromagnetic spectrum is commonly used to exchange data between a PDA and a computer?

    FM

    radar

    infrared

    ultraviolet

    27

    Refer to the exhibit. The security policy of an organization allows employees to connect to the office intranet from theirhomes. Which type of security policy is this?

    acceptable use

    incident handling

    network maintenance

    remote access

    28 What wireless technology has the ability to communicate with many devices at the same time, makes use of the 2.4 GHzband, and is limited to low-speed, short-range communications?

    RF

    ISM

    infrared

    Bluetooth

    29 Which type of network attack occurs when an unauthorized person tries to persuade a user to share a network user ID andpassword?

    brute force

    denial of service

    http://3.bp.blogspot.com/-KjCYodjBFeU/Ttc90qxWWvI/AAAAAAAAAVg/G-l7897mMSY/s1600/17620.jpg
  • 8/2/2019 Cisco Finaml Exam

    29/33

    data manipulation

    social engineering

    30

    Refer to the exhibit. An organization needs to connect PC systems that use private IP addressing to the Internet. Theorganization has multiple systems that need to access the Internet, but were only able to purchase one public IP address.What should be activated on the Linksys integrated router to achieve this goal?

    authentication

    DHCP

    encryption

    firewall

    NAT

    WEP

    31 A network administrator is setting up an application filtering firewall. Company security policy states that FTP sessions thatare coming from the Internet and use the standard FTP port must be blocked. Which TCP/UDP port must the administratorblock on the firewall to be in compliance?

    21

    23

    53

    80

    32 What is the name for the contract between a customer and an ISP that specifies requirements for uptime and serviceresponse time?

    DSL

    IAB

    NAP

    SLA

    33 How does a crossover cable make it possible for two "like devices" (for example, two switches) to communicate?

    The transmit pins are disconnected and only the receive pins are used.

    The transmit pins on one device are connected to the transmit pins on the other device.

    The receive pins on one device are connected to the receive pins on the other device.

    The transmit pins on one device are connected to the receive pins on the other device.

    34 Which attribute must be the same for wireless devices on one network to be able to communicate with devices on adifferent network?

    DNS server

    http://3.bp.blogspot.com/-4lXy-iEcBOA/Ttc-CL6ihiI/AAAAAAAAAVo/8YPRtrukkKg/s1600/17611.jpg
  • 8/2/2019 Cisco Finaml Exam

    30/33

    MAC address

    default gateway

    operating system

    wireless equipment vendor

    35 Which picture shows a USB port on a PC?

  • 8/2/2019 Cisco Finaml Exam

    31/33

    mainframe

    server

    pocket PC

    38 What is true about a wireless access point that is equipped with an omnidirectional antenna?concentrates signal in one direction

    typically used in bridging applications

    radiates the signal equally in all directions

    provides the greatest transmission distance of all antenna types that are used by APs

    39 What are two ways that a user can interact with an operating system shell? (Choose two.)

    CLI

    OS

    GUI

    NIC

    kernel

    40

    Refer to the exhibit. Assume that the exhibited output is from a host that is connected to a Linksys integrated router. Whatis the first thing that should be checked if using a bottom-up troubleshooting approach?

    the default gateway on the host

    the IP address on the host

    the IP address on the router

    the link status LED on the front of the router

    the subnet mask on the host

    41 For devices that do not autosense, which connection requires a crossover cable?

    hub port to router port

    PC to hub port

    PC to switch port

    PC port to PC port

    42 Which statement is true about UTP cable termination?

    Cables with RJ-45 connectors are always preterminated.

    http://1.bp.blogspot.com/-_tCqoLS_8Xg/Ttc-uU9yDVI/AAAAAAAAAVw/qvJFGpaEhV8/s1600/17961.jpg
  • 8/2/2019 Cisco Finaml Exam

    32/33

    An RJ-45 connector is used on only one end of the UTP cable.

    Up to 2 to 3 inches of cable may be untwisted at each end of the cable to allow for easier installation of the RJ-45connector.

    The RJ-45 connector should be pushed over the wire jacket for a smooth connection.

    43 A local PC has the correct configuration that is required to access the network. A ping command that is sourced at the PCdoes not receive a response from a remote device. Which operating system command might be used to determine wherethe connection failed?

    netstat

    tracert

    ipconfig

    nslookup

    44 An administrator is troubleshooting a network problem that involves the inability of users to reach Internet sites. Duringtroubleshooting, the administrator is able to successfully ping web sites by their IP address, but pings to domain names areunsuccessful. Which service is most likely at fault?

    DHCP

    DNS

    FTP

    NAT

    45 What two commands can be used to form a new binding if client information does not agree with the DHCP client table?(Choose two.)

    ipconfig /release

    ipconfig /all

    ipconfig /flushdns

    ipconfig /renew

    ipconfig

    46 Which installation option should be chosen when the current operating system is too damaged to work properly?

    upgrade

    multi-boot

    clean install

    virtualization

    47 A user is unable to send e-mail. To begin troubleshooting this problem, the network technician uses the browser on the PCand tries to access some popular Internet websites. Which troubleshooting approach is being followed?

    bottom-up

    divide-and-conquer

    top-down

    trial and error

    48 Which two causes of networking problems are related to the physical layer? (Choose two.)

    damaged cables and connectors

    incorrect addressing

  • 8/2/2019 Cisco Finaml Exam

    33/33

    incorrect subnet mask

    overheated components

    incorrect default gateway

    49 Which statement accurately describes a recommended strategy for end users to employ when they interact with a helpdesk technician?

    Provide as much information about the problem as possible.

    Expect first-level help desk technicians to solve the problem, because they are highly-trained personnel.

    Hand over the problem to the help desk professionals, then do not interfere with them.

    At the beginning of the call, ask for the name and number of the supervisor of the help desk technician.

    50 What does it mean when a problem is being escalated by a helpdesk?

    The helpdesk is following up on a resolved problem.

    The helpdesk has made the problem a lower priority.

    The helpdesk has solved the problem and is closing the ticket.

    The helpdesk is moving the problem to a higher level support staff.