Popular Posts

8/19/2012

DHomesb Final Exam CCNA Discovery V 4.0


DHomesb Final Exam CCNA Discovery V 4.0
 

1
A college network administrator is planning a wireless LAN to provide service in the student lounge and outdoor patio. The requirements include a range of at least 80 meters and a speed of 30 Mb/s. Which wireless LAN standard meets these requirements?
802.11
802.11a
802.11b
802.11g

2
Which network design layer provides a connection point for end user devices to the network?
access
core
distribution
network

3
A host wants to send information simultaneously to all the other hosts in the same network. Which domain will support this type of communication?
broadcast
unicast
local
multicast

4
An administrator is troubleshooting a network problem that involves the inability of users to reach Internet sites. During troubleshooting, the administrator is able to successfully ping web sites by their IP address, but pings to domain names are unsuccessful. Which service is most likely at fault?
DHCP
DNS
FTP
NAT

5


Refer to the exhibit. H1 can ping H2, H3, and the Fa0/0 interface of router R1. H2 and H3 but not H1 can ping H4 and H5. What is a possible cause for the H1 failure?
Router R1 has no route to the destination network.
Switch S1 does not have an IP address configured.
.The link between router R1 and switch S2 has failed.
Host H1 does not have a default gateway configured.

6
Which statement accurately describes what network devices do in the distribution layer of the three layer design model?
They interconnect individual hosts.
They interconnect multiple companies.
They interconnect local network segments.
They interconnect the company network to the ISP.

7
Which two components are configured via software in order for a PC to participate in a network environment? (Choose two.)
MAC address
IP address
kernel
shell
.subnet mask

8


Refer to the exhibit. What default gateway address will be assigned to PC1 if access to remote resources is needed?
192.31.7.3
192.168.1.101
.192.168.1.253
A default gateway is not necessary.

9
How does a crossover cable make it possible for two "like devices" (for example, two switches) to communicate?
The transmit pins are disconnected and only the receive pins are used.
The transmit pins on one device are connected to the transmit pins on the other device.
The receive pins on one device are connected to the receive pins on the other device.
.The transmit pins on one device are connected to the receive pins on the other device.

10
Which two transport layer protocols are used to transfer messages between hosts? (Choose two.)
DHCP
FTP
SMTP
.TCP
.UDP


11
A user in a small office is unable to connect to the Internet. The user examines the physical connections to the ISR, a Linksys WRT300N, and notices a solid green LED on the port that is wired to the computer. What does the LED indicate about the current state of the port?
The ISR is making adjustments to the port.
The device is plugged in and traffic is flowing.
.The computer is plugged in but no traffic is flowing.
The ISR does not detect that the computer is plugged in.

12
What is an advantage of purchasing a custom-built computer?
It is beneficial for less knowledgeable consumers.
The waiting period for assembly is negligible.
.The cost is lower compared to a computer that has been preassembled.
The user can specify high-performance components to meet specific needs.

13
What destination port number would be used if a client wished to establish a secure connection to a web server?
21
53
80
443

14


Refer to the exhibit. Assume that the exhibited output is from a host that is connected to a Linksys integrated router. What is the first thing that should be checked while using a bottom-up troubleshooting approach?
the default gateway on the host
the IP address on the host
.the IP address on the router
the link status LED on the front of the router
the subnet mask on the host

15
For the second time in a week, workstations on a LAN are not able to log into the server. The technician fixed the problem the first time, but cannot remember the steps taken to solve it. What aspect of the troubleshooting process has the technician neglected?
.identifying the problem
asking end-users questions
documenting the troubleshooting process
using structured techniques to solve a problem

16
What is a major characteristic of asymmetric Internet service?
Download speeds and upload speeds are equal.
.Download speeds are faster than upload speeds.
Data traffic speeds are faster than voice traffic speeds.
Used when consistently uploading large amounts of graphics, video and multimedia traffic.

17
What statement describes the filtering of traffic via the use of Stateful Packet Inspection?
It recognizes and filters predefined URLs
It permits access that is based on the application.
It permits access based on IP or MAC addresses.
.It permits incoming packets that are legitimate responses to requests from internal hosts.
It translates an internal address or group of addresses into a public address that is sent across the network.

18
Which type of computer has an integrated mouse?
desktop
.laptop
mainframe
server
pocket PC

19
Two switches are interconnected in the same wiring closet. What type of cable is typically used for this connection?
UTP straight-through
multimode fiber
.UTP crossover
coaxial

20
What is the default subnet mask for the IP address 128.107.23.10?
255.0.0.0
.255.255.0.0
255.255.255.0
255.255.255.255
 

21
A sender uses TCP to transmit multiple segments to a receiver. In the middle of the transmission, the sender does not receive an acknowledgement for one of the segments. What will occur?
.The sender will retransmit the entire message.
The sender will discontinue sending the remaining segments of the message.
The receiver will switch to UDP for the remainder of the message transfer.
The sender will resend the segment that was damaged or lost.

22
After issuing the ipconfig/all command on a host that has DHCP enabled, a network administrator notes that the output contains faulty IP configuration information. What is the first step the administrator should take to resolve this issue?
Replace the NIC in the host.
Change the IP address of the DHCP server.
Use static addressing to assign the correct IP address.
Use the release and renew options supported by the ipconfig command.

23
What wireless technology has the ability to communicate with many devices at the same time, makes use of the 2.4 GHz band, and is limited to low-speed, short-range communications?
RF
ISM
infrared
Bluetooth

24
Which installation option should be chosen when the current operating system is too damaged to work properly?
upgrade
multi-boot
.clean install
virtualization

25
As an assignment, a computer science student needs to present data in binary format. What are the two possible values that the student can use? (Choose two.)
0
1
2
A
F

26
Which protocol is used by a client to retrieve an e-mail from a remote server using a TCP/IP connection?
DNS
FTP
POP
HTTP

27
Which three addresses belong to the category of private IP addresses? (Choose three.)
10.0.0.1
128.0.0.1
150.0.0.1
172.16.0.1
192.168.31.19
172.168.31.1

28
A user is not able to connect to the network. A PC technician replaces the network cable that connects the PC to the switch port. The user is now able to connect to the network. Which troubleshooting technique did the technician use?
top-down
substitution
divide-and-conquer
a combination of top-down and divide-and-conquer

29
What are two examples of peripheral input devices? (Choose two.)
external modem
barcode reader
digital camera
plotter
printer

30
Which portion of the packet does a router use to forward the packet to the destination?
source IP address
user data
destination IP address
control information
destination MAC address

 

31
Which wireless protocol is used for encryption?
EAP
Open
PSK
WEP

32
Which type of network attack occurs when an unauthorized person tries to persuade a user to share a network user ID and password?
brute force
denial of service
data manipulation
social engineering

33
What is the name for the contract between a customer and an ISP that specifies requirements for uptime and service response time?
DSL
IAB
NAP
SLA

34


Refer to the exhibit. An educational institution needs to connect PC systems that use private IP addressing to the Internet. They have multiple systems that need to access the Internet, but were only able to purchase one public IP address. What should be activated on the Linksys integrated router to achieve this goal?
authentication
DHCP
encryption
firewall
NAT
WEP

35
Which Windows PC command line utility can be used to discover the path that a packet takes to reach a destination?
ping
netstat
tracert
nslookup
ipconfig

36
TCP/IP data transmission between the source and destination host is encapsulated in four steps:

A. adds the data-link header and trailer;
B. converts data to bits for transmission;
C. adds the network IP address to the header of the packet;
D. segments the data for end-to-end transport.

What is the correct sequence of these steps?
A, B, C, D
A, D, B, C
B, D, A, C
D, C, A, B
D, C, B, A

37


Refer to the exhibit. The security policy of an organization allows employees to connect to the office intranet from their homes. Which type of security policy is this?
acceptable use
incident handling
network maintenance
remote access

38
What component of a personal computer is responsible for the processing of all data?
RAM
CPU
firewall
system bus
operating system

39


Refer to the exhibit. A Linksys integrated services router is being used by wireless clients to access a server which is directly connected to an Ethernet port on the router. The server and the clients are using DHCP for IP addressing from the Linksys device and are on the same subnet. The server and the wireless clients are obtaining the correct IP configuration and can ping the Linksys device, but are unable to ping each other. What could be causing this issue?
The ping failures indicate a routing problem on the Linksys device. Check for proper routes.
The symptoms indicate a physical connection problem on the server. Check for the proper cable type and the physical connection.
The problem is most likely occurring on the Linksys device. Check all configurations on the Linksys device to ensure no security restrictions could be causing the issue.
Radio frequency problems are the likely problem if the clients cannot connect to the server on the same subnet. Begin by checking the signal strength at the wireless clients.

40
When terminating a UTP cable, why is it important to push the wires all the way into the end of the connector?
to allow the cable to endure more stretching or twisting
to ensure good electrical contact
to ensure that the wires are in correct order
to minimize crosstalk

41
What describes the external IP address that is obtained by a router through a cable or DSL modem?
a public address that is obtained from ICANN
a private address that is manually configured by the administrator
a public address that is obtained through DHCP from the ISP
a private address that converts to a public address on the internal LAN

42


Refer to the exhibit. PC1 and PC2 cannot connect to the web server, www.cisco.com, but they can ping each other. What are three troubleshooting steps that will help identify the problem? (Choose three.)
Ping the web server from GTWY1.
Ping the default gateway from PC2.
Use the tracert command on PC2 to the web server.
Use the ipconfig command on PC1 to check the default gateway.
Run the netstat command on PC2 to see the active TCP connections.
Use the nslookup command on the PC1 to attempt to resolve www.cisco.com.

43
What two commands can be used to form a new binding if client information does not agree with the DHCP client table? (Choose two.)
ipconfig /release
ipconfig /all
ipconfig /flushdns
ipconfig /renew
ipconfig

44
What does the term "attenuation" mean in data communication?
loss of signal strength as distance increases
time for a signal to reach its destination
leakage of signals from one cable pair to another
strengthening of a signal by a networking device

45
What procedure will help prevent users from detecting a wireless network?
Enable WEP.
Enable MAC filtering.
Disable SSID broadcasts.
Change the default administrator password on the AP.

46
Which two causes of networking problems are related to the physical layer? (Choose two.)
damaged cables and connectors
incorrect addressing
incorrect subnet mask
overheated components
incorrect default gateway

47
Which three statements describe an IP address? (Choose three.)
An IP address is known as a logical address.
An IP address uses a 30-bit addressing scheme.
An IP address is found in the Layer 2 header during transmission
The network portion of an IP address is burned into a network interface card.
An IP address is unique within the same local network.
The network portion of an IP address will be the same for all hosts that are connected to the same local network.

48


Refer to the exhibit. Which statement is true based on the information that is shown in the exhibit?
All wireless devices that are connected to this AP must have an assigned SSID of College.
Any wireless client that is attached to this AP must have the same IP address and SSID.
The AP is not physically wired to the local LAN.
This configuration is found only in an ad hoc wireless network.

49


Refer to the graphic. Assume that the command output is from a wireless DHCP client that is connected to a Linksys integrated router. What can be deduced from the output?
The wireless connection is good.
The WEP key or SSID needs to be checked.
The DHCP configuration on the router needs to be checked.
The wireless NIC driver or the NIC itself needs to be reinstalled.

50
What is a service pack?
an access policy
an agreement between a company and a vendor
a piece of code created to fix one specific problem
a collection of patches and updates released by a vendor
a small piece of software designed specifically for security issues

In this final exam I got only 82.5 only. Leave me a command for a wrong answers ..
Thanks for your visit my website ..

8/18/2012

Final CCNA 1 Discovery V 4.0


Final CCNA 1 Discovery V 4.0  


 

1. A host sent a message that all other hosts on the switched local network received and processed. What type of domain are all these hosts a part of?
local domain
multicast domain
collision domain
broadcast domain

2. Which two statements are true about local applications? (Choose two.)
They run on the network.
An example of a local application is e-mail.
They are accessed from a remote computer.
They are stored on the local hard disk.
They run on the computer where they are installed.

3.


Refer to the exhibit. What cabling fault does the exhibit represent?
open
reversed pair
short
split pair

4. A learner wants to interact with the operating system of a computer. Which two methods can be used for this? (Choose two.)
CLI
GUI
kernel
third party software
shell

5. What is an advantage of selecting an operating system that has a commercial license over one with a GPL license?
The commercial license-based operating system ensures full access to the source code for everyone.
The commercial license-based operating system ensures that everyone can participate in the enhancement of the product.
The commercial license-based operating system provides structured support.
The commercial license-based operating system is released free of charge.

6.


Refer to the exhibit. If H4 sends a message to H1 and the destination MAC address is in the MAC table for both Switch1 and Switch2, which host devices will receive the message?
only H1
hosts H1 and H4
all hosts that are connected to Switch1
all hosts that are connected to Switch1 and Switch2

7. For an IP address, what component decides the number of bits that is used to represent the host ID?
default-gateway
host number
network number
subnet mask

8. The help desk at a large packaging company receives a call from a user who is concerned about lost data files on the local PC. The help desk technician learns that the user clicked on an icon that appeared to be a program update, but no updates were scheduled for that program. What type of attack has likely occurred?
worm
DDoS
brute force
Trojan horse

9. What is the purpose of the ipconfig /release command?
It forces a client to give up its current IP address.
It forces a client to give up its current MAC address.
It forces the client to clear all the MAC address to IP address associations it has learned.
It shows the current IP configuration on the client.

10. Which protocol in its default configuration downloads e-mail messages to the client computer and deletes them from the server?
FTP
POP3
SMTP
IMAP4
 

11. What are two examples of storage peripheral devices? (Choose two.)
printer
flash drive
headphones
external DVD
barcode reader

12. What is the function of the DNS server?
It maps the IP address to the MAC address.
It translates a computer or domain name to the associated IP address.
It manages the domain that clients are assigned to.
It accepts HTTP requests from clients.

13. What is the default subnet mask for an IP address of 64.100.19.14?
255.0.0.0
255.255.0.0
255.255.255.0
255.255.255.255

14. What are two best practices that are used when configuring a small home WLAN? (Choose two.)
the use of EAP
the encryption of the SSID
the use of pre-shared keys
the use of open authentication
the disabling of SSID broadcasting

15. A network engineer wants to represent confidential data in binary format. What are the two possible values that the engineer can use? (Choose two.)
0
1
2
A
F

16.


Refer to the exhibit. What is the purpose of assigning a network name of College?
It enables access to the AP configuration GUI by name rather than by address.
It encrypts data between the wireless client and the AP.
It identifies the wireless LAN.
It translates an internal address or group of addresses to a public address.
It translates IP addresses into easy-to-remember domain names.

17. A network administrator has been notified that users have experienced problems gaining access to network resources. What utility could be used to directly query a name server for information on a destination domain?
ping
tracert
netstat
ipconfig
nslookup

18. Which two causes of networking problems are related to the physical layer? (Choose two.)
disconnected cables
improper operation of cooling fans
incorrect MAC address
incorrect default gateway
incorrect subnet mask

19. A network technician is required to provide access to the Internet for a large company. What is needed to accomplish this task?
ISP
private IP addresses for each host
static IP addresses for each host
DHCP server

20. Your school network blocks all websites related to online gaming. What type of security policy is being applied?
identification and authentication
remote access
acceptable use
incident handling

21.


Refer to the exhibit. What is the effect of setting the security mode to WEP on the Linksys integrated router?
The WEP security mode enables the AP to inform clients of its presence.
The WEP security mode encrypts network traffic during transmission between the AP and the wireless client.
The WEP security mode generates a dynamic key each time a client establishes a connection with the AP.
The WEP security mode identifies the WLAN.

22. When terminating UTP cabling, why is it important to untwist only a small amount of each wire pair?
minimizes crosstalk
makes installation faster
ensures wires are in correct order
makes it easier to fit wires into connector

23. Which part of the electromagnetic spectrum is commonly used to exchange data between a PDA and a computer?
FM
radar
infrared
ultraviolet

24. A network technician suspects that malware on a user PC is opening multiple TCP connections to a specific foreign host address. Which Windows command line utility can be used to confirm the multiple TCP connections?
ping
netstat
tracert
ipconfig
nslookup

25.


Refer to the exhibit. A user on host A sends an e-mail to the user on host B. Which type of message does host A send?
broadcast
multicast
simulcast
unicast

26. Which two transport layer protocols enable hosts to communicate and transfer data? (Choose two.)
DHCP
ICMP
IP
TCP
UDP

27. The area covered by a single AP is known as what?
ad-hoc network
basic service set
independent basic service set
extended service set
distribution system

28. What is the purpose of spam filter software?
It detects and removes spyware.
It detects and removes viruses.
It prevents the display of advertisement windows.
It examines incoming e-mail messages to identify the unsolicited ones.

29. What type of message is sent to a specific group of hosts?
static
unicast
dynamic
multicast
broadcast

30. What layer is the first point of entry for a host into the network?
core layer
access layer
network layer
distribution layer

31. What type of cable would be required to connect a Linksys router to a wired PC?
crossover cable
rollover cable
serial cable
straight-through cable

32.


Refer to the exhibit. Why would a network administrator use the network mode that is shown?
to support hosts on different IP networks
to support hosts that use different 802.11 standards
to support both wireless and wired Ethernet hosts
to support hosts with different operating systems
to support hosts with network cards from different manufacturers

33. In an attempt to verify connectivity, a user issues the ping command to a device that is not on the local network. The ping is unsuccessful. What can be determined from this result?
The default gateway is misconfigured.
The patch cable on the host station is faulty.
The router between the host and destination is faulty.
Further troubleshooting will be required to reach a definite conclusion.

34. What is the function of CSMA/CA on a wireless Ethernet network?
to prevent collisions
to broadcast messages
to select the least congested channel
to establish an ACK between devices

35. Because of an increasing number of users, bandwidth per user on a WLAN has decreased to a point where users are complaining about poor performance. What can be done to improve the user experience?
Increase the AP radio signal strength.
Place the AP in a more central location.
Deploy an external omni-directional antenna.
Reduce the number of devices using each channel.

36. Which installation option enables a single physical resource to function simultaneously as multiple logical resources?
clean install
multi-boot
upgrade
virtualization

37. What is the purpose of creating a DMZ during network firewall implementation?
to create a server security zone accessible only to internal clients
to create a dirty zone that allows all inbound and outbound traffic
to allow for a publicly accessible zone without compromising the internal network
to specify a higher security level than normally required for the internal production network

38. What is specified by the host bits in an IP address?
broadcast identity of the network
identity of the computer on the network
network that is being addressed
network to which the host belongs

39. Which of the following are the address ranges of the private IP addresses? (Choose three.)
10.0.0.0 to 10.255.255.255
200.100.50.0 to 200.100.25.255
150.150.0.0 to 150.150.255.255
172.16.0.0 to 172.31.255.255
192.168.0.0 to 192.168.255.255
127.16.0.0 to 127.31.255.255

40. Which type of computer uses an integrated monitor and keyboard?
pocket PC
laptop
mainframe
server
workstation


41. A company has a web server that must be accessible to both external and internal clients. Which security policy best practice should be followed to maximize security of the server?
Place the web server in a DMZ.
Keep the web server on the external network.
Configure a firewall device to serve as the web server.
Locate the web server in the server farm of the internal network.

42. What advantage does a peer-to-peer network have over a client-server network?
It increases security.
It increases scalability.
It produces a higher performance for hosts.
It eliminates the need for centralized administration.

43. Where do ISPs get the public addresses that they assign to end users?
ISPs create the addresses themselves.
ISPs are assigned addresses through the RFC.
ISPs obtain their addresses automatically.
ISPs obtain address blocks from registry organizations.

44. Which part of a data packet is used by a router to determine the destination network?
source IP address
user data
destination IP address
control information
destination MAC address

45.


Refer to the exhibit. Assume that the command output is from a wireless DHCP client that is connected to a Linksys integrated router. What can be deduced from the output?
The DHCP configuration on the router needs to be verified.
The WEP key or SSID needs to be verified.
The wireless connection is operational.
The wireless NIC driver or the NIC itself needs to be reinstalled.

46. When acting as a DHCP server, an integrated router can provide what three types of information to a client? (Choose three.)
physical address
MAC address
default gateway
static IP address
dynamic IP address
DNS server address

47. Which transport layer protocol is used when an application requires acknowledgment that data has been delivered?
FTP
TCP
UDP
RTP
SMTP

48. What does the term "attenuation" mean in data communication?
loss of signal strength as distance increases
time for a signal to reach its destination
leakage of signals from one cable pair to another
strengthening of a signal by a networking device

49. A user is unable to send e-mail. While troubleshooting this problem, the network technician first verifies the physical connectivity of cables. Which troubleshooting approach is being followed?
bottom-up
divide-and-conquer
top-down
trial and error

50.


Refer to the graphic. Assume that the exhibited output is from a host that is connected to a Linksys integrated router. What is one of the first things you should check?
IP address on the host
IP address on the router
subnet mask on the host
default gateway on the host
link status LED on the front of the router

CCNA 1 Discovery V 4.0 Chapter 9 Answer


CCNA 1 Discovery V 4.0 Chapter 9 Answer


1. Which ipconfig command requests IP configuration from a DHCP server?
ipconfig
ipconfig /all
ipconfig /renew
ipconfig /release

2. Only one workstation on a particular network cannot reach the Internet. What is the first troubleshooting step if the divide-and-conquer method is being used?
Check the NIC, and then check the cabling.
Check the workstation TCP/IP configuration.
Test all cables, and then test layer by layer up the OSI model.
Attempt to Telnet, and then test layer by layer down the OSI model.

3. A technician is troubleshooting a security breach on a new wireless access point. Which three configuration settings make it easy for hackers to gain access? (Choose three.)
configuring NAT
broadcasting the SSID
using open authentication
enabling MAC address filters
using the default internal IP address
using DHCP to provide IP addresses

4. Which three settings must match on the client and access point for a wireless connection to occur? (Choose three.)
SSID
authentication
MD5 checksum
antennae type
encryption key
MAC address filters

5. A PC is plugged into a switch and is unable to connect to the network. The UTP cable is suspected. What could be the problem?
A straight-through cable is being used
The connectors at both ends of the cable are RJ-45.
The RJ-45 connectors are crimped onto the cable jacket.
A crossover cable is being used.

6. What command is used to determine the location of delay for a packet traversing the Internet?
ipconfig
netstat
nslookup
ping
tracert

7.


Refer to the graphic. The wireless host cannot access the Internet, but the wired host can. What is the problem?
The host WEP key is incorrect.
The host IP address is incorrect.
The host subnet mask is incorrect.
The host default gateway is incorrect.
The integrated router internal IP address is incorrect.
The integrated router Internet IP address is incorrect.

8. Identify two physical-layer network problems. (Choose two.)
hardware failure
software configuration
devices not able to ping
loose cable connections
device driver configuration

9. What two items could be checked to verify connectivity between the router and the ISP? (Choose two.)
router status page
wireless card settings
router operating system version
local host operating system version
connectivity status as indicated by LEDs

10. Which troubleshooting method begins by examining cable connections and wiring issues?
top-down
bottom-up
substitution
divide-and-conquer

11. Typically, help desk personnel assist end users in which two tasks? (Choose two.)
identifying when the problem occurred
determining if other users are currently logged into the computer
updating network diagrams and documentation
implementing the solution to the problem
running a network baseline test
determining the cost of fixing the problem

12. A technician is unsuccessful in establishing a console session between a PC and a Linksys integrated router. Both devices have power, and a cable is connected between them. Which two troubleshooting steps could help to diagnose this problem? (Choose two.)
Ensure the correct cable is used.
Ensure the SSID is the same on both devices.
Ensure both devices have the same IP address.
Ensure both devices have different subnet masks.
Ensure the encryption type on both devices match.
Ensure the link status LED on the integrated router is lit.

13. Which two items should be added to the documentation following a troubleshooting event? (Choose two.)
final resolution
repetitive measures
number of people involved in the problem
accurate current network infrastructure diagrams
results of successful and unsuccessful troubleshooting steps

14


Refer to the graphic. What configuration is incorrect in the network shown?
The host IP address is incorrect.
The host subnet mask is incorrect.
The host default gateway is incorrect.
The wired connection is the wrong type of cable.
The Linksys integrated router does not support wireless.

15. What command is used to determine if a DNS server is providing name resolution?
ipconfig
netstat
nslookup
tracert

16. Which two troubleshooting techniques are suitable for both home networks and large corporate networks? (Choose two.)
having a backup ISR
running network monitoring applications
documenting the troubleshooting process
keeping a record of system upgrades and software versions
keeping spare switches, routers, and other equipment available

17. How does remote-access software help in the troubleshooting process?
Remote access uses a live chat feature.
Users have to be present so that they can view LEDs and change cables if necessary.
Diagnostics can be run without a technician being present at the site.
FAQs can be consulted more easily.

18. A customer called the cable company to report that the Internet connection is unstable. After trying several configuration changes, the technician decided to send the customer a new cable modem to try. What troubleshooting technique does this represent?
top-down
bottom-up
substitution
trial-and-error
divide-and-conquer

19. Network baselines should be performed in which two situations? (Choose two.)
after the network is installed and running optimally
after a virus outbreak is discovered on the network
after major changes are implemented on the network
after several computers are added to the network
at the end of the work week

20. When acting as a DHCP server, what three types of information can an ISR provide to a client? (Choose three.)
physical address
MAC address
default gateway
static IP address
dynamic IP address
DNS server address

21


Refer to the graphic. What configuration is incorrect in the network shown?
The host IP address is incorrect.
The host subnet mask is incorrect.
The host default gateway is incorrect.
The wired connection is the wrong type of cable.
The Linksys integrated router does not support wireless.

22. A technician suspects that a Linksys integrated router is the source of a network problem. While troubleshooting, the technician notices a blinking green activity LED on some of the ports. What does this indicate?
Self-diagnostics have not completed.
The power supply is the source of the problem.
The ports are operational and are receiving traffic.
The ports are operational, but no traffic is flowing.
There are no cables plugged into those ISR ports.
The ports have cables plugged in, but they are not functional.

23. What should a network administrator do first after receiving a call from a user who cannot access the company web server?
Reboot the web server.
Replace the NIC of the computer.
Ask the user to log off and log on again.
Ask the user what URL has been typed and what error message displays.

Thanks for your visit our site .. !
for more visite us at www.khmermega.net

8/15/2012

CCNA 1 Discovery V 4.0 Chapter 8 Answer


CCNA 1 Discovery V 4.0 Chapter 8 Answer    100 By Som Dara

1. Identify three techniques used in social engineering. (Choose three.)
fishing
vishing
phishing
spamming
pretexting
junk mailing

2. To which part of the network does the wireless access point part of a Linksys integrated router connect?
DMZ
external
internal
a network other than the wired network

3. A flood of packets with invalid source-IP addresses requests a connection on the network. The server busily tries to respond, resulting in valid requests being ignored. What type of attack occurred?
Trojan horse
brute force
ping of death
SYN flooding

4. What is a major characteristic of a Worm?
malicious software that copies itself into other executable programs
tricks users into running the infected software
a set of computer instructions that lies dormant until triggered by a specific event
exploits vulnerabilities with the intent of propagating itself across a network

5. While surfing the Internet, a user notices a box claiming a prize has been won. The user opens the box unaware that a program is being installed. An intruder now accesses the computer and retrieves personal information. What type of attack occurred?
worm
virus
Trojan horse
denial of service

6. What type of advertising is typically annoying and associated with a specific website that is being visited?
adware
popups
spyware
tracking cookies

7. What is a widely distributed approach to marketing on the Internet that advertises to as many individual users as possible via IM or e-mail?
brute force
spam
spyware
tracking cookies

8. Which abbreviation refers to an area of the network that is accessible by both internal, or trusted, as well as external, or untrusted, host devices?
SPI
DMZ
ISR
ISP

9. Which statement is true regarding anti-virus software?
Only e-mail programs need to be protected.
Only hard drives can be protected.
Only after a virus is known can an anti-virus update be created for it.
Only computers with a direct Internet connection need it.

10. What part of the security policy states what applications and usages are permitted or denied?
identification and authentication
remote access
acceptable use
incident handling



11. What best practice relates to wireless access point security?
activation of a popup stopper
a change of the default IP address
an update in the antivirus software definitions
physically securing the cable between the access point and client

12


Refer to the graphic. In the Linksys Security menu, what does the SPI Firewall Protection option Enabled provide?
It prevents packets based on the application that makes the request.
It allows packets based on approved internal MAC or IP addresses.
It requires that packets coming into the router be responses to internal host requests.
It translates an internal address or group of addresses into an outside, public address.

13. What environment would be best suited for a two-firewall network design?
a large corporate environment
a home environment with 10 or fewer hosts
a home environment which requires secure VPN access
a small business environment which is experiencing continuing DDoS attacks

14. Which two statements are true concerning anti-spam software? (Choose two.)
Anti-spam software can be loaded on either the end-user PC or the ISP server, but not both.
When anti-spam software is loaded, legitimate e-mail may be classified as spam by mistake.
Installing anti-spam software should be a low priority on the network.
Even with anti-spam software installed, users should be careful when opening e-mail attachments.
Virus warning e-mails that are not identified as spam via anti-spam software should be forwarded to other users immediately.

15. What statement is true about security configuration on a Linksys integrated router?
A DMZ is not supported.
The router is an example of a server-based firewall.
The router is an example of an application-based firewall.
Internet access can be denied for specific days and times.

16. What term is used to describe a dedicated hardware device that provides firewall services?
server-based
integrated
personal
appliance-based

17. What is one function that is provided by a vulnerability analysis tool?
It provides various views of possible attack paths.
It identifies missing security updates on a computer.
It identifies wireless weak points such as rogue access points.
It identifies all network devices on the network that do not have a firewall installed.
It identifies MAC and IP addresses that have not been authenticated on the network.

18. Many best practices exist for wired and wireless network security. The list below has one item that is not a best practice. Identify the recommendation that is not a best practice for wired and wireless security.
Periodically update anti-virus software.
Be aware of normal network traffic patterns.
Periodically update the host operating system.
Activate the firewall on a Linksys integrated router.
Configure login permissions on the integrated router.
Disable the wireless network when a vulnerability analysis is being performed.

19. Which statement is true about port forwarding within a Linksys integrated router?
Only external traffic that is destined for specific internal ports is permitted. All other traffic is denied.
Only external traffic that is destined for specific internal ports is denied. All other traffic is permitted.
Only internal traffic that is destined for specific external ports is permitted. All other traffic is denied.
Only internal traffic that is destined for specific external ports is denied. All other traffic is permitted.

20. During a pretexting event, how is a target typically contacted?
by e-mail
by phone
in person
through another person

Thanks for your visit our site .. wish it could help .. for more go to khmermega.net