You are on page 1of 10

DHomesb Practice Final Exam

CCNA Discovery: Networking for Home and Small Businesses (Version 4.0)

1. A user tries to open a page on the web server at www.cisco.com. The user’s workstation does not have the destination IP address in order to
encapsulate the request. Which network topology will provide the services that are required to associate the name of the web server with an IP
address?

2. TCP/IP data transmission between the source and destination host is encapsulated in four steps:
A. adds the data-link header and trailer;
B. converts data to bits for transmission;
C. adds the network IP address to the header of the packet;
D. segments the data for end-to-end transport.
What is the correct sequence of these steps?
A, B, C, D

A, D, B, C

B, D, A, C

D, C, A, B

D, C, B, A

3. Which three statements are characteristics of DHCP services? (Choose three.)


The DHCP server assigns the IP addresses and ensures that they are unique.

A PC that uses a static IP address obtains IP configuration from the DHCP server.

The integrated router acts as a DHCP server for internal hosts on local networks.

An integrated router acts as the DHCP server to provide the IP address to the ISP.
Page 1 of 10
DHCP clients on medium and large networks receive the IP configuration from the ISP.

The DHCP server assigns a lease time that specifies the length of time the assigned IP address is valid.

4. A host sent a message that all other hosts on the switched local network received and processed. What type of domain are all these hosts a part of?
local domain

multicast domain

collision domain

broadcast domain

5. As an assignment, a computer science student needs to present data in binary format. What are the two possible values that the student can use?
(Choose two.)
0

6. What is the maximum number of bytes that is allowed in a standard IEEE 802.3 Ethernet frame?
64

1024

1518

4096

7. Which two statements correctly describe MAC addresses? (Choose two.)


MAC addresses are used to identify a specific NIC.

MAC addresses contain a network number and unique host identification.

MAC addresses are physical addresses.

MAC addresses are always assigned to network devices by a network administrator.

MAC addresses are Layer 3 addresses.

8. What are two functions of MAC addresses in a LAN? (Choose two.)


to allow the transfer of frames from source to destination

to determine which host has priority to transfer data

to indicate the best path between separate networks

to associate with a specific network IP address

to uniquely identify a node on a network

9. Which part of a data packet is used by a router to determine the destination network?
source IP address

user data

destination IP address

control information

destination MAC address

10. When is the use of a DSL modem necessary?


when a cellular telephone provides the service

when a high-speed connection is provided over a cable TV network


Page 2 of 10
when a high-speed digital connection is required over the regular telephone line

when a satellite dish is used

11. What is the function of CSMA/CA on a wireless Ethernet network?


to prevent collisions

to broadcast messages

to select the least congested channel

to establish an ACK between devices

12. What layer is the first point of entry for a host into the network?
core layer

access layer

network layer

distribution layer

13. Which two statements are true about network applications? (Choose two.)
Microsoft Word is an example of a network application.

Network applications are accessible from a remote computer.

Network applications are installed on a special type of computer that supports only network applications.

Network applications are installed on a network server.

Network applications are accessible by one computer at a time.

14. A network designer is working with a small company to determine the network type best suited to the needs of the company. Which
twocharacteristics could the designer use to describe a peer-to-peer network to the owner of the company? (Choose two.)
central administration

easy to install

low cost

scalable

secure

15.

Refer to the graphic. Assume that the exhibited output is from a host that is connected to a Linksys integrated router. What is one of the first
things you should check?
IP address on the host

IP address on the router

subnet mask on the host

default gateway on the host

link status LED on the front of the router

Page 3 of 10
16.

Refer to the exhibit. What is the effect of setting the security mode to WEP on the Linksys integrated router?
WEP identifies the wireless LAN.

WEP allows the access point to inform clients of its presence.

WEP translates IP addresses into easy-to-remember domain names.

WEP encrypts data between the wireless client and the access point.

WEP ensures that only authenticated users are allowed access to the WLAN.

17.

Refer to the exhibit. H1 can ping H2, H3, and the Fa0/0 interface of router R1. H2 and H3 but not H1 can ping H4 and H5. What is a possible cause for the
H1 failure?
Router R1 has no route to the destination network.

Switch S1 does not have an IP address configured.

The link between router R1 and switch S2 has failed.

Host H1 does not have a default gateway configured.

18.

Refer to the exhibit. Host2 attempts to establish communications with Server1. What action will switch SW1 take prior to forwarding the frame?
flood the frame out all interfaces

learn the MAC address that is associated with Host2

assign a MAC address to Host2 from the MAC table

poll all interfaces to learn their assigned IP addresses

Page 4 of 10
19.

Refer to the exhibit. A new switch is connected to an existing switch that has a fully populated MAC table. PC1 requires the destination MAC addressof
PC3 in order to send a message. Which device or devices will see the ARP sent by PC1?
only PC3

PC2 and PC3

PC3 and PC4

PC2, PC3 and PC4

20.

Refer to the exhibit. A user sets up a home network and uses a crossover cable from Switch1 to the Internet port on the ISR. However, there is no
connection between the host H1 and the server. What should the user do in order to establish a connection?
Replace the cable with a console cable.

Replace the cable with a rollover cable.

Replace the failed crossover cable with a working crossover cable.

Replace the cable with a straight-through cable.

21. What is the meaning of the term crosstalk?


interference of signals between wire pairs

loss of signal strength as distance increases

damage of the signal when two bare wires touch

strengthening of a signal by a networking device

22. What is specified by the host bits in an IP address?


broadcast identity of the network

identity of the computer on the network

network that is being addressed

network to which the host belongs

23. What is the default subnet mask for an IP address of 198.133.219.4?


255.0.0.0

255.255.0.0

255.255.255.0

255.255.255.255

Page 5 of 10
24. Which of the following are the address ranges of the private IP addresses? (Choose three.)
10.0.0.0 to 10.255.255.255

200.100.50.0 to 200.100.25.255

150.150.0.0 to 150.150.255.255

172.16.0.0 to 172.31.255.255

192.168.0.0 to 192.168.255.255

127.16.0.0 to 127.31.255.255

25. Under what circumstance would it be appropriate to use private IP addresses?


for communication between two ISPs

for a network that is directly connected to the Internet

for addresses that are used exclusively within an organization.

for a host with more than one direct connection to the Internet

26. Which private network address is reserved for diagnostic testing of devices?
10.0.0.0

127.0.0.0

172.16.0.0

172.31.0.0

192.168.0.0

27. What is the purpose of spam filter software?


It detects and removes spyware.

It detects and removes viruses.

It prevents the display of advertisement windows.

It examines incoming e-mail messages to identify the unsolicited ones.

28. A system administrator routinely monitors failed login attempts on a server. If the administrator sees an extremely high numb er of failed attempts by
a single user who is trying multiple password combinations, what type of attack is in progress?
brute force

phishing

SYN flood

virus

vishing

29. Which service will translate private internal IP addresses into Internet routable public IP addresses?
ARP

DHCP

DNS

NAT

30. What is the purpose of creating a DMZ during network firewall implementation?
to create a server security zone accessible only to internal clients

to create a dirty zone that allows all inbound and outbound traffic

Page 6 of 10
to allow for a publicly accessible zone without compromising the internal network

to specify a higher security level than normally required for the internal production network

31. Before implementing a stateful firewall on an ISR router, a network engineer is asked to explain to upper management in simple terms what a stateful
firewall is. Which description should the engineer use?
A stateful firewall is only available on a firewall appliance.

A stateful firewall blocks or permits access based only on applications.

A stateful firewall bases its analysis only on IP address, port number, and MAC address.

A stateful firewall can be configured to allow incoming packets only from sessions that are initiated from inside.

32. The area covered by a single AP is known as what?


ad-hoc network

basic service set

independent basic service set

extended service set

distribution system

33. What is the function of a physical topology map?


records IP addressing of each host

records hostnames and applications

organizes groups of hosts by how they use the network

shows where wiring is installed and the locations of network devices

34. Which type of computer uses an integrated monitor and keyboard?


pocket PC

laptop

mainframe

server

workstation
35.
35. What is an advantage of selecting an operating system that has a commercial license over one with a GPL
license?
The commercial license-based operating system ensures full access to the source code for everyone.

The commercial license-based operating system ensures that everyone can participate in the enhancement of the product.

The commercial license-based operating system provides structured support.

The commercial license-based operating system is released free of charge.

36. A learner wants to interact with the operating system of a computer. Which two methods can be used for this? (Choose two.)
CLI

GUI

kernel

third party software

shell

Page 7 of 10
37. Which installation option enables a single physical resource to function simultaneously as multiple logical resources?
clean install

multi-boot

upgrade

virtualization

38. Select the connection that would require a straight-through cable.


a switch to a hub

a router to a switch

a switch to a switch

a router to a router

39. When terminating UTP cabling, why is it important to untwist only a small amount of each wire pair?
minimizes crosstalk

makes installation faster

ensures wires are in correct order

makes it easier to fit wires into connector

40. What are two examples of storage peripheral devices?


(Choose two.)
printer

flash drive

headphones

external DVD

barcode reader

41. Which two IP configuration components does the computer use to identify its subnetwork? (Choose two.)
default gateway

IP address

MAC address

DNS server address

subnet mask

42.

Refer to the exhibit. What is the purpose of assigning a network name of College?)
It enables access to the AP configuration GUI by name rather than by address.

It encrypts data between the wireless client and the AP.

It identifies the wireless LAN.

It translates an internal address or group of addresses to a public address.

It translates IP addresses into easy-to-remember domain names.

Page 8 of 10
43. Which portion of a received datagram is decoded and used by the internetwork layer of the TCP/IP model?
IP address

port number

MAC address

HTML/user data

44. A network administrator is planning an inexpensive WLAN implementation at a small business site. Which two strategies should be included in the site
survey? (Choose two.)
Identify the locations of sources of interference.

Hire a WLAN analysis firm to survey the site.

Deploy all APs and move them if necessary to improve coverage.

Use a wireless laptop to verify WLAN coverage in the work areas.

Employ sophisticated specialized equipment to measure signal strengths and interference.

45. A user is unable to send e-mail. While troubleshooting this problem, the network technician first verifies the physical connectivity of cables. Which
troubleshooting approach is being followed?
The problem would be referred to an onsite technician.

The problem would be escalated to a higher level helpdesk staff member.

The first-level helpdesk staff would go to the user worksite to perform diagnostics.

The first-level helpdesk staff would remotely take control of the user system to perform diagnostics.

The first-level helpdesk staff would use online integrated diagnostics software to solve the problem.

46. A user is unable to send e-mail. While troubleshooting this problem, the network technician first verifies the physical connectivity of cables. Which
troubleshooting approach is being followed?
bottom-up

divide-and-conquer

top-down

trial and error

47.

Refer to the exhibit. When www.cisco.com is entered in a browser window on a PC, the web page is unavailable. While troublesho oting this problem, the
network technician executes the nslookup command as well as the ping command to the web server. What is the likely reason that the web server home
page cannot be displayed?
Page 9 of 10
The DNS server service needs to be installed on the PC.

A DNS server is not available to resolve the name.

The reason that the web server is unable to display the web page is that the web server is unavailable.

The increased response time displayed in the ping may indicate a delay in server response time.

48. What is a characteristic of Bluetooth wireless technology?


It allows one-to-many connections.

It operates in the 5GHz radio frequency band.

It is unable to penetrate walls with a useable signal.

It can be used for communications beyond 100 meters.

49. Because of an increasing number of users, bandwidth per user on a WLAN has decreased to a point where users are complaining about poor
performance. What can be done to improve the user experience?
Increase the AP radio signal strength.

Place the AP in a more central location.

Deploy an external omni-directional antenna.

Reduce the number of devices using each channel.

50. What does the term "attenuation" mean in data communication?

loss of signal strength as distance increases

time for a signal to reach its destination

leakage of signals from one cable pair to another

strengthening of a signal by a networking device

Page 10 of 10

You might also like