DHomesb Final Exam – CCNA Discovery: Networking for Home and Small Businesses (Version 4.0) FIX

Untuk Selengkapnya Download Disini

1. Which protocol is used by a client to browse the web server?
>HTTP


2. As an assignment, a computer science student needs to present data in binary format. What are the two possible values that the student can use? (Choose two.)
>0
>1


3. Refer to the exhibit. Host A sends a message to a group of four computers out of the ten computers on this network. Which type of message does host A send?
>multicast


4. What is the function of the DNS server?
>It translates a computer or domain name to the associated IP address.


5. TCP/IP data transmission between the source and destination host is de-encapsulated in four steps:
A. The TCP header is removed.
B. Bits are decoded and the destination MAC address is recognized.
C. The IP header is removed and the contents are passed to the next layer.
D. The Ethernet header and trailer are removed.
What is the correct sequence of these steps
>B, D, C, A


6. All hosts within a domain receive the same frame that originates from one of the devices. The domain is also bounded by routers. What type of domain is this?
>broadcast


7. Which protocol is used by a client to retrieve an e-mail from a remote server using a TCP/IP connection?
>POP


8. Which two statements correctly describe MAC addresses? (Choose two.)
>MAC addresses are used to identify a specific NIC.
>MAC addresses are physical addresses.


9. Which of the following are transport layer protocols of the TCP/IP model? (Choose two.)
>UDP
>TCP


10. Which two statements are characteristics of DHCP services? (Choose two.)
>DHCP clients send a DHCP Discover message to the destination IP address of 255.255.255.255.
>The integrated router acts as a DHCP server for internal hosts on local networks.


11. A small company owns one older AP that provides a maximum data rate of 11 Mb/s. The company wants to add a newer AP that will provide a faster data rate but be compatible with the existing AP. What two wireless standards are referenced in this scenario? (Choose two.)
>802.11b
>802.11g


12. What layer is the first point of entry for a host into the network?
core layer
access layer
network layer
distribution layer


13. When is the use of a DSL modem necessary?
>when a high-speed digital connection is required over the regular telephone line


14. A network technician is required to provide access to the Internet for a large company. What is needed to accomplish this task?
>ISP


15. Which two statements are true about network applications? (Choose two.)
>Network applications are accessible from a remote computer.
>Network applications are installed on a network server.


16. Refer to the exhibit. Which statement is true based on the information that is shown in the exhibit?
>All wireless devices that are connected to this AP must have an assigned SSID of University.


17. Which statement accurately describes what network devices do in the distribution layer of the three layer design model?
>They interconnect local network segments.


18. What are two advantages of purchasing a preassembled computer? (Choose two.)
>The cost is comparatively lower.
>There is a negligible waiting period for assembly.


19. What is the most common reason that ISPs provide symmetrical transfer services?
>to host servers on the Internet


20. What are two examples of peripheral input devices? (Choose two.)
>barcode reader
>digital camera


21. What is an advantage of purchasing a custom-built computer?
>The user can specify high-performance components to meet specific needs.


22. Which three address ranges can be used to depict private IP addresses? (Choose three.)
>10.0.0.0 to 10.0.0.255
>172.16.1.0 to 172.16.1.255
>192.168.22.0 to 192.168.22.255


23. Where do ISPs get the public addresses that they assign to end users?
>ISPs obtain address blocks from registry organizations.


24. For an IP address, what component decides the number of bits that is used to represent the host ID?
>subnet mask


25. What is the default subnet mask for the IP address 128.107.23.10?
255.0.0.0
255.255.0.0
255.255.255.0
255.255.255.255


26. What is the purpose of pop-up blocker software?
>It prevents the display of advertisement windows.


27. What is the purpose of spam filter software?
>It examines incoming e-mail messages to identify the unsolicited ones.


28. Which part of the electromagnetic spectrum is commonly used by wireless LANs?
>radio frequency (RF)


29. Your school network blocks all websites related to online gaming. What type of security policy is being applied?
>acceptable use


30. Refer to the graphic. What feature can be installed on the Linksys integrated router to convert private IP addresses to Internet-routable addresses?
>NAT


31. Which statement is true about packet filtering?
>It permits access based on IP address.


32. Which type of computer uses an integrated monitor and keyboard?
>laptop


33. How does a crossover cable connect two routers?
>It connects the pins that are used for transmitting on one router to the pins that are used for receiving on the other router.


34.Select the connection that would require a straight-through cable.
>a router to a switch


35. What information within a data packet does a router use, by default, to make forwarding decisions?
>the destination IP address


36. Refer to the exhibit. What is the effect of setting the security mode to WEP on the Linksys integrated router?
>The WEP security mode encrypts network traffic during transmission between the AP and the wireless client.


37. What data communication technology uses low-power radio waves to transmit data?
>wireless


38. What is an advantage of selecting an operating system that has a commercial license over one with a GPL license?
>The commercial license-based operating system provides structured support.


39. A learner wants to interact with the operating system of a computer. Which two methods can be used for this? (Choose two.)
>CLI
>GUI


40. Within a local network, which two items must be unique on a computer for it to successfully connect to the network? (Choose two.)
>IP address
>computer name


41. Refer to the exhibit. Assume that the exhibited output is from a host that is connected to a Linksys integrated router. What is the first thing that should be checked while using a bottom-up troubleshooting approach?
>the link status LED on the front of the router


42. The area covered by a single AP is known as what?
>basic service set


43. What is the purpose of the ipconfig /release command?
>It forces a client to give up its current IP address.


44. Which statement is true about UTP cable termination?
>The RJ-45 connector should be pushed over the wire jacket for a smooth connection.


45. Which installation option should be chosen when the current operating system is too damaged to work properly?
>clean install


46. What is the meaning of the term crosstalk?
>interference of signals between wire pairs


47. Which two causes of networking problems are related to the physical layer? (Choose two.)
>disconnected cables
>improper operation of cooling fans


48. Refer to the exhibit. What cabling fault does the exhibit represent?
>split pair


49. A user is unable to send e-mail. To begin troubleshooting this problem, the network technician uses the browser on the PC and tries to access some popular Internet websites. Which troubleshooting approach is being followed?
>top-down


50. Refer to the exhibit. A wireless DHCP client is unable to access the web server. Given the output that is shown in the exhibit, what two things should the network technician verify first to troubleshoot this problem? (Choose two.)
>the wireless client configuration for DHCP
>the SSID


0 komentar to "DHomesb Final Exam – CCNA Discovery: Networking for Home and Small Businesses (Version 4.0) FIX"

Posting Komentar

Diberdayakan oleh Blogger.

Related Post

Cisco CCNA 2 (Version 4.0), Cisco CCNA Discovery (Version 4.0), Cisco IT Essentials (Version 4.1), Sport, Tips, Tutorials
Related Posts Plugin for WordPress, Blogger...

Time Now

Gadget Unik - Jual Beli Aman
Toko Online

Follow me on Twitter


Followers

Web hosting for webmasters