Professional Documents
Culture Documents
CCNA Discovery: Networking for Home and Small Businesses (Version 4.0)
1. A user tries to open a page on the web server at www.cisco.com. The user’s workstation does not have the destination IP address in order to
encapsulate the request. Which network topology will provide the services that are required to associate the name of the web server with an IP
address?
2. TCP/IP data transmission between the source and destination host is encapsulated in four steps:
A. adds the data-link header and trailer;
B. converts data to bits for transmission;
C. adds the network IP address to the header of the packet;
D. segments the data for end-to-end transport.
What is the correct sequence of these steps?
A, B, C, D
A, D, B, C
B, D, A, C
D, C, A, B
D, C, B, A
A PC that uses a static IP address obtains IP configuration from the DHCP server.
The integrated router acts as a DHCP server for internal hosts on local networks.
An integrated router acts as the DHCP server to provide the IP address to the ISP.
Page 1 of 10
DHCP clients on medium and large networks receive the IP configuration from the ISP.
The DHCP server assigns a lease time that specifies the length of time the assigned IP address is valid.
4. A host sent a message that all other hosts on the switched local network received and processed. What type of domain are all these hosts a part of?
local domain
multicast domain
collision domain
broadcast domain
5. As an assignment, a computer science student needs to present data in binary format. What are the two possible values that the student can use?
(Choose two.)
0
6. What is the maximum number of bytes that is allowed in a standard IEEE 802.3 Ethernet frame?
64
1024
1518
4096
9. Which part of a data packet is used by a router to determine the destination network?
source IP address
user data
destination IP address
control information
to broadcast messages
12. What layer is the first point of entry for a host into the network?
core layer
access layer
network layer
distribution layer
13. Which two statements are true about network applications? (Choose two.)
Microsoft Word is an example of a network application.
Network applications are installed on a special type of computer that supports only network applications.
14. A network designer is working with a small company to determine the network type best suited to the needs of the company. Which
twocharacteristics could the designer use to describe a peer-to-peer network to the owner of the company? (Choose two.)
central administration
easy to install
low cost
scalable
secure
15.
Refer to the graphic. Assume that the exhibited output is from a host that is connected to a Linksys integrated router. What is one of the first
things you should check?
IP address on the host
Page 3 of 10
16.
Refer to the exhibit. What is the effect of setting the security mode to WEP on the Linksys integrated router?
WEP identifies the wireless LAN.
WEP encrypts data between the wireless client and the access point.
WEP ensures that only authenticated users are allowed access to the WLAN.
17.
Refer to the exhibit. H1 can ping H2, H3, and the Fa0/0 interface of router R1. H2 and H3 but not H1 can ping H4 and H5. What is a possible cause for the
H1 failure?
Router R1 has no route to the destination network.
18.
Refer to the exhibit. Host2 attempts to establish communications with Server1. What action will switch SW1 take prior to forwarding the frame?
flood the frame out all interfaces
Page 4 of 10
19.
Refer to the exhibit. A new switch is connected to an existing switch that has a fully populated MAC table. PC1 requires the destination MAC addressof
PC3 in order to send a message. Which device or devices will see the ARP sent by PC1?
only PC3
20.
Refer to the exhibit. A user sets up a home network and uses a crossover cable from Switch1 to the Internet port on the ISR. However, there is no
connection between the host H1 and the server. What should the user do in order to establish a connection?
Replace the cable with a console cable.
255.255.0.0
255.255.255.0
255.255.255.255
Page 5 of 10
24. Which of the following are the address ranges of the private IP addresses? (Choose three.)
10.0.0.0 to 10.255.255.255
200.100.50.0 to 200.100.25.255
150.150.0.0 to 150.150.255.255
172.16.0.0 to 172.31.255.255
192.168.0.0 to 192.168.255.255
127.16.0.0 to 127.31.255.255
for a host with more than one direct connection to the Internet
26. Which private network address is reserved for diagnostic testing of devices?
10.0.0.0
127.0.0.0
172.16.0.0
172.31.0.0
192.168.0.0
28. A system administrator routinely monitors failed login attempts on a server. If the administrator sees an extremely high numb er of failed attempts by
a single user who is trying multiple password combinations, what type of attack is in progress?
brute force
phishing
SYN flood
virus
vishing
29. Which service will translate private internal IP addresses into Internet routable public IP addresses?
ARP
DHCP
DNS
NAT
30. What is the purpose of creating a DMZ during network firewall implementation?
to create a server security zone accessible only to internal clients
to create a dirty zone that allows all inbound and outbound traffic
Page 6 of 10
to allow for a publicly accessible zone without compromising the internal network
to specify a higher security level than normally required for the internal production network
31. Before implementing a stateful firewall on an ISR router, a network engineer is asked to explain to upper management in simple terms what a stateful
firewall is. Which description should the engineer use?
A stateful firewall is only available on a firewall appliance.
A stateful firewall bases its analysis only on IP address, port number, and MAC address.
A stateful firewall can be configured to allow incoming packets only from sessions that are initiated from inside.
distribution system
laptop
mainframe
server
workstation
35.
35. What is an advantage of selecting an operating system that has a commercial license over one with a GPL
license?
The commercial license-based operating system ensures full access to the source code for everyone.
The commercial license-based operating system ensures that everyone can participate in the enhancement of the product.
36. A learner wants to interact with the operating system of a computer. Which two methods can be used for this? (Choose two.)
CLI
GUI
kernel
shell
Page 7 of 10
37. Which installation option enables a single physical resource to function simultaneously as multiple logical resources?
clean install
multi-boot
upgrade
virtualization
a router to a switch
a switch to a switch
a router to a router
39. When terminating UTP cabling, why is it important to untwist only a small amount of each wire pair?
minimizes crosstalk
flash drive
headphones
external DVD
barcode reader
41. Which two IP configuration components does the computer use to identify its subnetwork? (Choose two.)
default gateway
IP address
MAC address
subnet mask
42.
Refer to the exhibit. What is the purpose of assigning a network name of College?)
It enables access to the AP configuration GUI by name rather than by address.
Page 8 of 10
43. Which portion of a received datagram is decoded and used by the internetwork layer of the TCP/IP model?
IP address
port number
MAC address
HTML/user data
44. A network administrator is planning an inexpensive WLAN implementation at a small business site. Which two strategies should be included in the site
survey? (Choose two.)
Identify the locations of sources of interference.
45. A user is unable to send e-mail. While troubleshooting this problem, the network technician first verifies the physical connectivity of cables. Which
troubleshooting approach is being followed?
The problem would be referred to an onsite technician.
The first-level helpdesk staff would go to the user worksite to perform diagnostics.
The first-level helpdesk staff would remotely take control of the user system to perform diagnostics.
The first-level helpdesk staff would use online integrated diagnostics software to solve the problem.
46. A user is unable to send e-mail. While troubleshooting this problem, the network technician first verifies the physical connectivity of cables. Which
troubleshooting approach is being followed?
bottom-up
divide-and-conquer
top-down
47.
Refer to the exhibit. When www.cisco.com is entered in a browser window on a PC, the web page is unavailable. While troublesho oting this problem, the
network technician executes the nslookup command as well as the ping command to the web server. What is the likely reason that the web server home
page cannot be displayed?
Page 9 of 10
The DNS server service needs to be installed on the PC.
The reason that the web server is unable to display the web page is that the web server is unavailable.
The increased response time displayed in the ping may indicate a delay in server response time.
49. Because of an increasing number of users, bandwidth per user on a WLAN has decreased to a point where users are complaining about poor
performance. What can be done to improve the user experience?
Increase the AP radio signal strength.
Page 10 of 10