DHomesb Final Exam – CCNA Discovery: Networking for Home and Small Businesses (Version 4.0) 2013



1. After attaching four PCs to the switch ports, configuring the SSID and setting authentication properties for a small office network, a technician successfully tests the connectivity of all PCs that are connected to the switch and WLAN. A firewall is then configured on the device prior to connecting it to the Internet. What type of network device includes all of the described features?
switch
ISR router
firewall appliance
standalone wireless access point
2
How do ISPs obtain public IP addresses?
They create the addresses themselves.
They obtain the addresses from the home PCs.
They obtain the addresses from the Internet registry.
They obtain the addresses from the RFC.
3
Which wireless protocol is used for encryption?
EAP
Open
PSK
WEP
4

Refer to the exhibit. Why would a network administrator use the network mode that is shown?
to support hosts on different IP networks
to support hosts that use different 802.11 standards
to support both wireless and wired Ethernet hosts
to support hosts with different operating systems
to support hosts with network cards from different manufacturers
5
A computer joins the network and announces itself to all hosts on the LAN. What type of message does the computer send out?
broadcast
simulcast
multicast
unicast
6

Refer to the exhibit. Assume that the exhibited output is from a host that is connected to a Linksys integrated router. What is the first thing that should be checked if using a bottom-up troubleshooting approach?
the default gateway on the host
the IP address on the host
the IP address on the router
the link status LED on the front of the router
the subnet mask on the host
7
For the second time in a week, workstations on a LAN are not able to log into the server. The technician fixed the problem the first time, but cannot remember the steps taken to solve it. What aspect of the troubleshooting process has the technician neglected?
identifying the problem
asking end-users questions
documenting the troubleshooting process
using structured techniques to solve a problem
8

Refer to the exhibit. What is the purpose of assigning a network name of University?
It enables access to the AP configuration GUI by name rather than by address.
It encrypts data between the wireless client and the AP.
It identifies the wireless LAN.
It translates an internal address or group of addresses to a public address.
It translates IP addresses into easy-to-remember domain names.
9
What two pieces of information should a help desk technician document while troubleshooting connectivity issues with an end user? (Choose two.)
the CPU clock speed of the computer
the number of network jacks that are in the room
if the user can ping the default gateway address
if the word processing software is installed correctly
whether the PC uses dynamic or static IP addressing
10
When NAT is employed in a small office, which address type is typically used for hosts on the local LAN?
private IP addresses
global public IP addresses
Internet-routable addresses
both private and public IP addresses
11
What destination IP address is used in a unicast packet?
a specific host
a group of hosts
all hosts on the network
the network broadcast address
www.ceastercorp.blogspot.com
12
What is an advantage of purchasing a custom-built computer?
It is beneficial for less knowledgeable consumers.
The waiting period for assembly is negligible.
The cost is lower compared to a computer that has been preassembled.
The user can specify high-performance components to meet specific needs.
13
Which picture shows a USB port on a PC?
 <<<TRUE
14
Which of the following statements best describes DNS?
DNS servers are used to map an IP address to a physical address.
DNS servers are used to map a name to an IP address.
DNS servers are used to configure logical address information for host computers.
DNS servers are used to translate from private addresses to public addresses.
15
Which statement accurately describes a recommended strategy for end users to employ when they interact with a help desk technician?
Provide as much information about the problem as possible.
Expect first-level help desk technicians to solve the problem, because they are highly-trained personnel.
Hand over the problem to the help desk professionals, then do not interfere with them.
At the beginning of the call, ask for the name and number of the supervisor of the help desk technician.

At the beginning of the call, ask for the name and number of the supervisor of the help desk technician.

16
When terminating a UTP cable, why is it important to push the wires all the way into the end of the connector?
to allow the cable to endure more stretching or twisting
to ensure good electrical contact
to ensure that the wires are in correct order
to minimize crosstalk
17
What is specified by the network number in an IP address?
the network to which the host belongs
the physical identity of the computer on the network
the node of the subnetwork which is being addressed
the broadcast identity of subnetwork
18
Which type of computer has an integrated mouse?
desktop
laptop
mainframe
server
pocket PC
19
Which network design layer provides a connection point for end user devices to the network?
access
core
distribution
network
20
A network designer is working with a small company to determine the network type best suited to the needs of the company. Which two characteristics could the designer use to describe a peer-to-peer network to the owner of the company? (Choose two.)
central administration
easy to install
low cost
scalable
secure
21

Refer to the exhibit. The security policy of an organization requires users to change their password every week. Which type of security policy is this?
acceptable use
network maintenance
password
remote access
22
Which type of network supports DHCP and DNS services for network users in a network domain?
client/server
peer-to-peer
hierarchical
ad hoc
23
Which two causes of networking problems are related to the physical layer? (Choose two.)
damaged cables and connectors
incorrect addressing
incorrect subnet mask
overheated components
incorrect default gateway
24
Why would a corporate web server be assigned a public IP address instead of a private IP address?
The public address can be acquired at no cost.
The public address can be routed on the Internet.
The public address provides a security advantage.
The same public address can be used on multiple servers to prevent depletion of available IP addresses.
25
What two commands can be used to form a new binding if client information does not agree with the DHCP client table? (Choose two.)
ipconfig /release
ipconfig /all
ipconfig /flushdns
ipconfig /renew
ipconfig
6

Refer to the graphic. Assume that the command output is from a wireless DHCP client that is connected to a Linksys integrated router. What can be deduced from the output?
The wireless connection is good.
The WEP key or SSID needs to be checked.
The DHCP configuration on the router needs to be checked.
The wireless NIC driver or the NIC itself needs to be reinstalled.
27

Refer to the exhibit. A network technician is statically assigning an IP address to a PC. The default gateway is correct. What would be a valid IP address to assign to the host?
128.106.10.100
128.107.255.1
128.107.255.254
128.108.100.10
28
Which of the following are transport layer protocols of the TCP/IP model? (Choose two.)
FTP
UDP
SMTP
TFTP
TCP
29
Which two components are necessary for a wireless client to be installed on a WLAN? (Choose two.)
media
wireless NIC
custom adapter
crossover cable
wireless bridge
wireless client software
30
For devices that do not autosense, which connection requires a crossover cable?
hub port to router port
PC to hub port
PC to switch port
PC port to PC port
31
Which Windows command is used to display the configured IP address, subnet mask, and default gateway?
ipconfig
netstat
nslookup
tracert
32
As an assignment, a computer science student needs to present data in binary format. What are the two possible values that the student can use? (Choose two.)
0
1
2
A
F
33
Which value would be considered the physical address for data that is sent across an Ethernet segment?
IP address
port address
MAC address
network address
34
What is a function of NAT when it is configured on a firewall appliance?
prevents or allows access based on IP or MAC addresses
prevents or allows access to websites based on specific URLs or keywords
prevents or allows access to specific application types based on port numbers
provides the capability to recognize and filter out specific types of attacks such as DoS
translates an internal address or group of addresses into an outside, public address that is sent across the network
35
What are two examples of peripheral output devices? (Choose two.)
barcode reader
digital camera
external DVD
headphones
printer
36
Which statement is true concerning stateful packet inspection?
Access is permitted based on IP addresses of the source and destination devices.
Access is permitted based on the MAC addresses of the source and destination devices.
Access is permitted only if the type of application that is attempting to reach the internal host is allowed.
Access is permitted only if it is a legitimate response to a request from an internal host.
37
Users are complaining that they get no response from a new application server. What tool would determine if the client application is successfully connecting to the application on the new server?
ping
tracert
netstat
ipconfig
nslookup
38
Which function is available on the network when TCP is used as the transport protocol?
traffic encryption
best effort delivery
user authentication
delivery acknowledgement

39

Refer to the exhibit. An organization needs to connect PC systems that use private IP addressing to the Internet. The organization has multiple systems that need to access the Internet, but were only able to purchase one public IP address. What should be activated on the Linksys integrated router to achieve this goal?
authentication
DHCP
encryption
firewall
NAT
WEP
40
What is the default subnet mask for the IP address 128.107.23.10?
255.0.0.0
255.255.0.0
255.255.255.0
255.255.255.255
41
Two switches are interconnected in the same wiring closet. What type of cable is typically used for this connection?
UTP straight-through
multimode fiber
UTP crossover
coaxial
www.ceastercorp.blogspot.com
42
What is a major characteristic of asymmetric Internet service?
Download speeds and upload speeds are equal.
Download speeds are faster than upload speeds.
Data traffic speeds are faster than voice traffic speeds.
Used when consistently uploading large amounts of graphics, video and multimedia traffic.
43
TCP/IP data transmission between the source and destination host is de-encapsulated in four steps:
A. The TCP header is removed.
B. Bits are decoded and the destination MAC address is recognized.
C. The IP header is removed and the contents are passed to the next layer.
D. The Ethernet header and trailer are removed.
 What is the correct sequence of these steps?
A, B, C, D
A, C, B, D
B, C, D, A
B, D, C, A
C, A, B, D
44
Some new features are available for the OS that is currently running on a user’s PC. What method should be chosen so that the user can install these new feature sets?
clean install
multi-boot
upgrade
virtualization
45
What is true about a wireless access point that is equipped with an omnidirectional antenna?
concentrates signal in one direction
typically used in bridging applications
radiates the signal equally in all directions
provides the greatest transmission distance of all antenna types that are used by APs
46
Which troubleshooting technique can be used to quickly restore user functionality without having to spend much time identifying the exact problem?
top-down
bottom-up
substitution
trial and error
47
A home user was successfully browsing the Internet earlier in the day but is now unable to connect. A pingcommand from a wireless laptop to a wired PC in the LAN is successful, but the nslookup command fails to resolve a website address. The user decides to analyze the LEDs on the Linksys router to verify connectivity. Which LED should be of main concern in this situation?
WLAN LED
power LED
Internet LED
1-4 Ethernet LEDs
48
Which protocol is used to transfer files among network devices and perform file-management functions?
DNS
FTP
HTML
HTTP
49
Which two statements are true about network applications? (Choose two.)
Microsoft Word is an example of a network application.
Network applications are accessible from a remote computer.
Network applications are installed on a special type of computer that supports only network applications.
Network applications are installed on a network server.
Network applications are accessible by one computer at a time.
50
A technician can ping the public registered IP address of http://www.cisco.com but cannot successfully ping the URL address http://www.cisco.com from a host computer. Which software utility can the technician use to diagnose the problem?
Tracert
Ipconfig
Netstat
Nslookup