cute

Saturday, May 26, 2012

CCNA 1 Discovery 4.0 Final Exam 2012


hi guys, umm its so hard to me .. but i will help u if maybe u cant to have 100% point but.. its can make your point above the average value of you guys in cisco.. okay this is it GOOD LUCK


1
Top of Form
When terminating a UTP cable, why is it important to push the wires all the way into the end of the connector?
to allow the cable to endure more stretching or twisting
to ensure good electrical contact
to ensure that the wires are in correct order
to minimize crosstalk
Bottom of Form
2
Top of Form
When would infrared be used to connect network devices?
when connecting multiple host devices to a wireless access point
when synchronizing a PC with a PDA that is in line of sight
when connecting a PC to a network switch that is located in another room
when updating two access points that are located in separate buildings
Bottom of Form

3
Top of Form
What is specified by the network number in an IP address?
the network to which the host belongs
the physical identity of the computer on the network
the node of the subnetwork which is being addressed
the broadcast identity of subnetwork
Bottom of Form
4
Top of Form
Which two automatic addressing assignments are supported by DHCP? (Choose two.)
local server address
subnet mask
default gateway address
physical address of the recipient
physical address of the sender
Bottom of Form

5
Top of Form
Which adapter card would be required for a PC to exchange information with other PCs on a LAN?
NIC
video card
sound card
internal modem
Bottom of Form
6
Top of Form
Which three address ranges can be used to depict private IP addresses? (Choose three.)
10.0.0.0 to 10.0.0.255
127.16.0.0 to 127.16.255.255
150.150.0.0 to 150.150.255.255
172.16.1.0 to 172.16.1.255
192.168.22.0 to 192.168.22.255
200.100.50.0 to 200.100.50.255
Bottom of Form

7
Top of Form
A network analyst is asked to create a physical topology map of the campus network. Which two items of information should be included in the map? (Choose two.)
DNS entries
cabling runs
server group information
IP addressing scheme
network device locations
Bottom of Form
8
Top of Form
What is the function of the DNS server?
It assigns IP addresses to clients.
It accepts HTTP requests from clients.
It maps a hostname to a corresponding IP address.
It manages the domain that clients are assigned to.
Bottom of Form

9
Top of Form
Which two causes of networking problems are related to the physical layer? (Choose two.)
damaged cables and connectors
incorrect addressing
incorrect subnet mask
overheated components
incorrect default gateway
Bottom of Form
Top of Form
What is the purpose of TCP?
to manage data links and physical network transmissions
to specify the format of requests and responses that are exchanged between the client and server
to assign the logical address and encapsulate the request into packets for routing to the destination
to provide flow control and acknowledgment of packets that are exchanged between the client and server
Bottom of Form

Top of Form
A user has reported a failure to connect to the network. Based on similar calls from other users in the same location, the network technician starts troubleshooting by entering the ipconfig command on the user computer. Which troubleshooting technique is the technician using?
top-down
bottom-up
substitution
divide-and-conquer
Bottom of Form
Top of Form
A local PC has the correct configuration that is required to access the network. A ping command that is sourced at the PC does not receive a response from a remote device. Which operating system command might be used to determine where the connection failed?
netstat
tracert
ipconfig
nslookup
Bottom of Form

Top of Form
A network design engineer has been asked to design the IP addressing scheme for a customer network. The network will use IP addresses from the 192.168.30.0/24 network. The engineer allocates 254 IP addresses for the hosts on the network but excludes 192.168.30.0/24 and 192.168.30.255/24 IP addresses. Why must the engineer exclude the addresses from the allocated IP address pool?
192.168.30.0/24 and 192.168.30.255/24 IP addresses are reserved for the e-mail and DNS servers.
192.168.30.0/24 and 192.168.30.255/24 IP addresses are reserved for outside Internet connectivity.
192.168.30.0/24 is the network IP address and 192.168.30.255/24 is the IP broadcast address.
192.168.30.0/24 is the IP address that is reserved for the default gateway, and the 192.168.30.255/24 IP address is reserved for the DHCP server.
Bottom of Form
Top of Form
A user is not able to connect to the network. A PC technician replaces the network cable that connects the PC to the switch port. The user is now able to connect to the network. Which troubleshooting technique did the technician use?
top-down
substitution
divide-and-conquer
a combination of top-down and divide-and-conquer
Bottom of Form

Top of Form
What statement describes the filtering of traffic via the use of Stateful Packet Inspection?
It recognizes and filters predefined URLs
It permits access that is based on the application.
It permits access based on IP or MAC addresses.
It permits incoming packets that are legitimate responses to requests from internal hosts.
It translates an internal address or group of addresses into a public address that is sent across the network.
Bottom of Form
Top of Form
What measurement is commonly used to describe communication speed when transferring data?
bps
cps
Hz
MB
Bottom of Form

Top of Form
Two switches are interconnected in the same wiring closet. What type of cable is typically used for this connection?
UTP straight-through
multimode fiber
UTP crossover
coaxial
Bottom of Form
Top of Form
What is the default subnet mask for the IP address 128.107.23.10?
255.0.0.0
255.255.0.0
255.255.255.0
255.255.255.255
Bottom of Form

Top of Form
All hosts within a domain receive the same frame that originates from one of the devices. The domain is also bounded by routers. What type of domain is this?
broadcast
collision
local
multicast
Bottom of Form
Top of Form
What is the purpose of pop-up blocker software?
It detects and removes spyware.
It detects and removes viruses.
It prevents the display of advertisement windows.
It removes unwanted e-mail.
Bottom of Form
Top of Form
What component of a personal computer is responsible for the processing of all data?
RAM
CPU
firewall
system bus
operating system
Bottom of Form
Top of Form
Which picture shows a USB port on a PC?


http://assessment.netacad.net/assessment/images/option%20a3.jpg

USB

http://assessment.netacad.net/assessment/images/option%20b3.jpg



http://assessment.netacad.net/assessment/images/option%20c3.jpg



http://assessment.netacad.net/assessment/images/option%20d3.jpg

Bottom of Form

Top of Form


http://assessment.netacad.net/assessment/images/25000.jpg
Refer to the exhibit. When www.cisco.com is entered in a browser window on a PC, the web page is unavailable. While troubleshooting this problem, the network technician executes the nslookup command as well as the ping command to the web server. What is the likely reason that the web server home page cannot be displayed?
The DNS server service needs to be installed on the PC.
A DNS server is not available to resolve the name.
The reason that the web server is unable to display the web page is that the web server is unavailable.
The increased response time displayed in the ping may indicate a delay in server response time.
Bottom of Form
Top of Form


http://assessment.netacad.net/assessment/images/17629.jpg
Refer to the exhibit. An educational institution needs to connect PC systems that use private IP addressing to the Internet. They have multiple systems that need to access the Internet, but were only able to purchase one public IP address. What should be activated on the Linksys integrated router to achieve this goal?
authentication
DHCP
encryption
firewall
NAT
WEP
Bottom of Form

Top of Form
Some new features are available for the OS that is currently running on a user's PC. What method should be chosen so that the user can install these new feature sets?
clean install
multi-boot
upgrade
virtualization
Bottom of Form
Top of Form
A network designer is working with a small company to determine the network type best suited to the needs of the company. Which two characteristics could the designer use to describe a peer-to-peer network to the owner of the company? (Choose two.)
central administration
easy to install
low cost
scalable
secure
Bottom of Form

Top of Form
Which type of computer has an integrated mouse?
desktop
laptop
mainframe
server
pocket PC
Bottom of Form
Top of Form
Which attribute must be the same for wireless devices on one network to be able to communicate with devices on a different network?
DNS server
MAC address
default gateway
operating system
wireless equipment vendor

Top of Form
What does it mean when a problem is being escalated by a helpdesk?
The helpdesk is following up on a resolved problem.
The helpdesk has made the problem a lower priority.
The helpdesk has solved the problem and is closing the ticket.
The helpdesk is moving the problem to a higher level support staff.
Bottom of Form
Top of Form
Which type of network supports DHCP and DNS services for network users in a network domain?
client/server
peer-to-peer
hierarchical
ad hoc
Bottom of Form
Top of Form
31.
How does a crossover cable connect two routers?
It connects the pins that are used for receiving on one router to the pins that are used for receiving on the other router.
It connects the pins that are used for transmitting on one router to the pins that are used for receiving on the other router.
It disconnects the transmit pins and uses only the receive pins.
It uses the same pins for transmitting and receiving.
Bottom of Form
Top of Form


http://assessment.netacad.net/assessment/images/17961.jpg
Refer to the exhibit. Assume that the exhibited output is from a host that is connected to a Linksys integrated router. What is the first thing that should be checked if using a bottom-up troubleshooting approach?
the default gateway on the host
the IP address on the host
the IP address on the router
the link status LED on the front of the router
the subnet mask on the host
Bottom of Form

Top of Form
A home user is looking for an ISP connection that provides high speed digital transmission over regular phone lines. What ISP connection type should be used?
DSL
dial-up
satellite
cell modem
cable modem
Bottom of Form
Top of Form
Which network design layer provides hosts with initial connectivity to the network?
access
core
distribution
network
Bottom of Form

Top of Form


http://assessment.netacad.net/assessment/images/36828.jpg
Refer to the exhibit. If host H8 sends a message to host H5 and the destination MAC address is in the MAC tables of both switches, which host device or devices will receive the message?
only host H5
all hosts on the network
all hosts that are connected to switch Sw1
all hosts that are connected to switch Sw2 and host H5.
all hosts that are connected to hub Hub1 and switch Sw1
Bottom of Form
Top of Form
As an assignment, a computer science student needs to present data in binary format. What are the two possible values that the student can use? (Choose two.)
0
1
2
A
F
Bottom of Form

Top of Form
A wireless DHCP client cannot connect to the Internet through a Linksys integrated router. When you type ipconfig on the host, no IP address, subnet mask, or default gateway shows. What are two of the first things you will check? (Choose two.)
SSID
if the wireless client is configured for DHCP
the cable between client and integrated router
the firewall configuration on the integrated router
if the correct default gateway is configured on the client
if the correct default gateway is configured on the integrated router
Bottom of Form
Top of Form
Which type of firewall is implemented by adding firewall functionality to an existing device, such as a router?
appliance-based firewall
server-based firewall
integrated firewall
personal firewall
Bottom of Form

Top of Form


http://assessment.netacad.net/assessment/images/37125.png
Refer to the exhibit. PC1 is unable to access the web server at 209.165.200.226/27. Based on the provided output, what is the most likely cause of the problem?
PC1 is not plugged in to RTR1.
Port 80 is already in use on PC1.
No DNS server is configured on PC1.
PC1 is configured with an incorrect IP address and default gateway.
Bottom of Form
Top of Form
Which two TCP/IP properties must match on hosts in the same LAN if the hosts are to be able to communicate with each other? (Choose two.)
the subnet mask
the DNS server configurations
the default gateway configurations
the host portion of the IP address
the network portion of the IP address
Bottom of Form
Top of Form
What is an ISP?
It is a standards body that develops cabling and wiring standards for networking.
It is a protocol that establishes how computers within a local network communicate.
It is an organization that enables individuals and businesses to connect to the Internet.
It is a networking device that combines the functionality of several different networking devices in one.
Bottom of Form
Top of Form


http://assessment.netacad.net/assessment/images/16270.jpg
Refer to the graphic. Assume that the command output is from a wireless DHCP client that is connected to a Linksys integrated router. What can be deduced from the output?
The wireless connection is good.
The WEP key or SSID needs to be checked.
The DHCP configuration on the router needs to be checked.
The wireless NIC driver or the NIC itself needs to be reinstalled.
Bottom of Form

Top of Form
How does a DMZ enhance network security for an organization?
blocks viruses and spyware
restricts internal user access to prohibited Internet sites
allows external customer access to designated internal resources
removes suspicious attachments from incoming and outgoing e-mail
Bottom of Form
Top of Form
A user starts a file transfer between a client machine and an FTP server. Which list correctly represents the sequence of protocols that are used by the client machine to encapsulate the FTP data traffic for transmission?
FTP, TCP, IP, Network Access Protocols
FTP, UDP, IP, Network Access Protocols
FTP, IP, UDP, Network Access Protocols
FTP, IP, TCP, Network Access Protocols
Bottom of Form

Top of Form
What is used at the transport layer to identify protocols and services?
domain name
port number
IP address
MAC Address
Bottom of Form
Top of Form
Which protocol is used by a client to retrieve an e-mail from a remote server using a TCP/IP connection?
DNS
FTP
POP
HTTP
Bottom of Form

Top of Form


http://assessment.netacad.net/assessment/images/17620.jpg
Refer to the exhibit. The security policy of an organization allows employees to connect to the office intranet from their homes. Which type of security policy is this?
acceptable use
incident handling
network maintenance
remote access
Bottom of Form
Top of Form
Which wireless component allows wireless clients to gain access to a wired network?
PDA
STA
access point
wireless bridge
Bottom of Form

Top of Form
Which type of attack involves flooding a server port with SYN messages?
phishing
brute force
denial of service
data manipulation
Bottom of Form
Top of Form
What are two advantages of purchasing a custom-built computer? (Choose two.)
usually a lower cost
no waiting period for assembly
user can specify higher performance components
supports higher-end graphics and gaming applications
fewer components to replace
Bottom of Form


you can to have the answers in here ..

http://pastebin.com/nitgqxmL


http://mu-nar.blogspot.com/2012/01/dhomesb-final-exam-ccna-discovery.html


http://allforcisco.blogspot.com/p/final-exam.html

all answers in here... thank you for you attention ^_^


http://tubanpunyatoak.blogspot.com/2011/01/dhomesb-final-exam-ccna-discovery_16.html