This is default featured slide 1 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 2 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 3 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 4 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 5 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

Monday, December 31, 2012

Soal 6 Final CCNA

  1. What is the purpose of the routing process?
  2. to select the paths that are used to direct traffic to destination networks

  3. Which service team in an ISP is responsible for determining if the new customer has hardware that will support the new WAN connection and if new WAN circuits need to be installed?
  4. planning and provisioning

  5. Which statement describes a route that has been learned dynamically?
  6. It is automatically updated and maintained by routing protocols.

  7. What needs to be configured on a router to ensure that when the router receives a packet with an unknown destination, the router will forward it to the next hop?
  8. a default route

  9. Which routing protocol facilitates the exchange of routing information between different autonomous systems?
  10. BGP

  11. Which routing protocol excludes the subnet information from routing updates?
  12. RIPv1

  13. Why is the OSI model useful in network design and assessment?
  14. It divides networking communications into multiple processes that are smaller and more manageable.

  15. Refer to the exhibit. Which three IP addresses could be assigned to the hosts? (Choose three.)
  16. 192.168.88.9
    192.168.88.12
    192.168.88.14

  17. A user is attempting to do an http://www.cisco.com/ without success. Which two configuration values must be set on the host to allow this access? (Choose two.)
  18. DNS server
    default gateway

  19. Refer to the exhibit. The network administrator must set up a network with two subnets. In network A, the network administrator selects the network address 192.168.1.128/26. Which address combination should the administrator select in network B to accommodate the same number of hosts as in network A?
  20. 192.168.1.64 255.255.255.192

  21. How many host addresses may be assigned on each subnetwork when using the 130.68.0.0 network address with a subnet mask of 255.255.248.0?
  22. 2046

  23. Refer to the exhibit. What two addresses are the broadcast addresses for network A and network B? (Choose two.)
  24. Network A broadcast address 192.168.1.47
    Network B broadcast address 192.168.1.207

  25. Refer to the exhibit. A network administrator is troubleshooting the serial connection between R1 and R2. There is no communication between R1 and R2. Based on the output of the show ip interface brief command, what is the cause of the problem?
  26. There is a misconfiguration of IP addresses.

  27. What is a feature of PAT?
  28. It allows multiple hosts on a single LAN to share globally unique IP addresses.

  29. Refer to the exhibit. The PC tries to ping router B at 192.168.2.2, but the ping fails. What is the problem?
  30. The address of the PC is on the wrong subnet

  31. The show ip route command was executed on one of the routers shown in the graphic and the following output was displayed:

  32. C 192.168.4.0/24 is directly connected, Serial0/0
    R 192.168.5.0/24 [120/1] via 192.168.4.2, 00:00:19, Serial0/0
    R 192.168.1.0/24 [120/2] via 192.168.3.1, 00:00:20, Serial0/1
    R 192.168.2.0/24 [120/2] via 192.168.3.1, 00:00:20, Serial0/1
    C 192.168.3.0/24 is directly connected, Serial0/1

    From which router was this command executed?

    C

  33. Refer to the exhibit. R1 and R2 are configured with the commands that are displayed. All interfaces are properly configured, but neither router is receiving routing updates. What two things can be done to solve the problem? (Choose two.)
  34. Configure the routing protocol on R1 for network 10.0.0.0.
    Configure the routing protocol on R2 for network 10.0.0.0.

  35. Refer to the exhibit. Static routes have been configured on all routers in the network. PC2 can communicate with PC1 but not with PC3. What should be done to remedy the problem?
  36. Reconfigure the second static route with the exit interface S0/0/1.

  37. Refer to the exhibit. A technician has been assigned to configure RIPv2 as a routing protocol on the network. Users who are connected to the LAN network on router R3 can ping both S0/0/0 and S0/0/1 interfaces on R1 but are not able to ping the LAN network that is attached to R1. What could be the possible cause of the problem?
  38. The network 172.16.10.0 command was not issued when RIP was configured on router R1.

  39. Different hosts connect to the same switch port at different times. If the switch port is configured with dynamic port security, how does it process the MAC addresses?
  40. The addresses are dynamically learned and stored in the address table.

  41. Refer to the exhibit. A ping 192.168.1.20 command is issued on workstation A to determine if workstation B can be reached. What two events will occur if this command is successful? (Choose two.)
  42. Workstation A will send an ICMP echo request message to workstation B.
    Workstation B will send an ICMP echo reply message to workstation A.

  43. Refer to the exhibit. What two conclusions can be drawn about router RTB? (Choose two.)
  44. Router RTB is connected to a Cisco 1841 router.
    The IP address of the router interface that is connected to router RTB is 192.168.2.6.

  45. If the configuration register is currently set to 0x2102, what is the first action that a router will take after the bootstrap program loads successfully?
  46. load the IOS from flash

  47. Refer to the exhibit. A network administrator is unable to ping H1 from the router and is checking the cabling along the network. Which segment is incorrectly cabled?
  48. Segment D

  49. Refer to the exhibit. A user who is connected to RTA is trying to telnet to RTB, but the connection is failing. Based on the output of the show running-config command on router RTB, why is the Telnet session failing?
  50. No password has been configured on the VTY lines.

  51. Refer to the exhibit. What will be the effect of the configuration commands if entered on R2?
  52. The user will be able to console into R2 using the password cisco.

  53. An administrator wishes to protect a router by encrypting the console access password noaccess. Which command should be used?

  54. Router(config)# service password-encryption

  55. Refer to the exhibit. The network administrator needs to configure the Fa0/0 interface of RTB so that hosts from RTA can connect to the server that is attached to RTB. Which two commands will the administrator use to accomplish this task? (Choose two.)
  56. RTB(config-if)# no shutdown
    RTB(config-if)# ip address 192.168.102.97 255.255.255.252

  57. Refer to the exhibit. While configuring the serial interface of a router, the network administrator sees the highlighted error message. What is the reason for this?
  58. The network administrator has attempted to configure the serial interface with a broadcast address.

  59. Refer to the exhibit. The network administrator of the building in the graphic needs to choose the type of cable best suited to add ServerB to the network. Which cable type is the best choice?
  60. fiber optic

  61. In a structured cable system, which term describes the cable that connects the wall jack in the user work area to the patch panel in the wiring closet?
  62. horizontal cable

  63. What is the maximum unrepeated distance set by industry standards for UTP cable?
  64. 100 meters

  65. Which statement is true about the reverse lookup DNS zone?
  66. It resolves an IP address to a fully qualified domain name.

  67. Which statement describes a feature of TCP?
  68. It acknowledges the receipt of packets.

  69. Which transport layer protocol will allow segments to be exchanged between two hosts with low overhead and no mechanism for retransmission?
  70. UDP

  71. A company is developing an Internet store for its website. Which protocol should be used to transfer credit card information from customers to the company web server?
  72. HTTPS

  73. Which statement is correct about the proxy support that is offered by the HTTP protocol?
  74. It filters unsuitable web content.

  75. In the URL http://dev.cisco.com/wwwdocs/procedures.htm, what is identified by wwwdocs?
  76. the folder where the requested resource is stored

  77. A network administrator must access a remote Linux server at the branch office to troubleshoot a web service configuration issue. Which secure protocol would be used?
  78. SSH

  79. When customers use credit cards to make purchases at a small business, a modem is heard dialing a telephone number to transfer the transaction data to the central office. What type of WAN serial connection is in use?
  80. circuit switched

  81. Which technology is used for WAN connections and delivers up to 1.544 Mb/s of symmetrical bandwidth?
  82. T1 line

  83. Refer to the exhibit. A new branch office has been added to the corporate network and a new router is to be installed to allow branch office users to access the database server at headquarters. How should the serial 0/0/0 interface of the new branch office router be configured to connect to the headquarters router?

  84. branch_23(config-if)# encapsulation ppp
    branch_23(config-if)# ip address 192.168.5.21 255.255.255.240
    branch_23(config-if)# no shutdown

  85. The command copy tftp running-config has been entered on the router. What will this command do?
  86. copy the configuration file from a server to RAM

  87. A company functions from Monday to Friday each week. Their backup strategy calls for full backups each Friday night, with differential backups on all other weekday nights. If an administrator is asked to restore a server hard drive to its Wednesday morning state, how many backups must be used?
  88. 2

  89. What is a characteristic of Syslog?
  90. It enables devices to send information to a daemon that runs on a management station.

Sunday, December 30, 2012

Soal 5 CCNA

  1. What needs to be configured on a router to ensure that when the router receives a packet with an unknown destination, the router will forward it to the next hop?
  2. a default route

  3. Refer to the exhibit. Router R1 has been configured with the commands that are displayed. Which fact can be determined from the configuration?
  4. All passwords are encrypted

  5. A network engineer is planning a new horizontal cable installation in an office building. What advantage would UTP cable have over fiber optic cable for this installation?
  6. lower installation costs

  7. Refer to the exhibit. The network administrator is validating a WAN connection design that supports authentication between the two routers. Which statement is true about the effect of the current configuration?
  8. The serial connection will be established and meet the design objective.

  9. Refer to the exhibit. What fact can be determined from the exhibited output?
  10. The default encapsulation is set for the serial0/0/0 interface.

  11. A user reports being able to access the Internet but not being able to download e-mail from the mail server at the ISP. What should the user check on the user workstation?
  12. the POP3 and SMTP server settings in the e-mail application

  13. A company has formed a team that must analyze the probability of a disaster occurring and the associated effects and costs to their business. Which step of the disaster recovery plan is the team tasked with completing?
  14. risk assessment

  15. Refer to the exhibit. Which subnet mask would accommodate the number of hosts indicated for all subnets if the major network address was 192.168.25.0/24?
  16. 255.255.255.224

  17. Which type of cable may be used for backbone cabling between data centers that are located on different floors and that are separated by a distance of 1640 feet (500 meters)?
  18. fiber-optic

  19. Which cable type provides a foil shielding to protect from outside electromagnetic interference?
  20. STP

  21. What is the function of the forward lookup DNS zone in the DNS name resolution process?
  22. It forwards zone information updates to the secondary server.

  23. After an unsuccessful ping to the local router, the technician decides to investigate the router. The technician observes that the lights and fan on the router are not operational. In which layer of the OSI model is the problem most likely occurring?
  24. physical

  25. During the process of upgrading the IOS image on a router, the network administrator notices that the downloaded image in flash is corrupt. If ROMMON is used to perform the upgrade process again, by default which port on the router will be used to download the replacement image?
  26. console port

  27. Which routes are automatically added to the routing table on a neighbor router when routing protocols exchange information about directly connected networks?
  28. dynamic routes

  29. Refer to the exhibit. A computer with the displayed IP settings is unable to access a server on the 192.168.2.0 network using the server IP address but can access hosts on the 192.168.1.0 network. What should the network administrator do to troubleshoot this problem?
  30. Issue the ping 192.168.1.1 command on the host to determine if the host can communicate with the default gateway.

  31. What is an example of a dedicated point-to-point WAN link?
  32. T1/E1

  33. What is the purpose of using the copy tftp flash command on a router?
  34. to restore the IOS image from a server

  35. An experienced network technician has decided to use a divide-and-conquer approach to troubleshooting a network problem. What is an advantage to this approach?
  36. works well for simple problems

  37. Refer to the exhibit. There is no routing protocol configured on either router. Which command will create a default route on R1 to forward the traffic to R2?
  38. R1(config)# ip route 0.0.0.0 0.0.0.0 192.168.0.2

  39. What is a characteristic of the EIGRP routing protocol?
  40. It builds the topology table based on all of the advertisements from its neighbors.

  41. A company functions from Monday to Friday each week. Their backup strategy calls for full backups each Friday night, with incremental backups on all other weekday nights. If an administrator is asked to restore a server hard drive to its Wednesday morning state, how many backups must be used?
  42. 2

  43. A network technician begins troubleshooting by checking the status of the light on the network interface card on the web server. Which troubleshooting method is the technician using?
  44. bottom-up

  45. When a user issues the command ping –a 64.102.240.242 in a command prompt window, which database will a DNS server search for the matching record?
  46. reverse lookup zones

  47. Which two statements are correct about the UDP protocol? (Choose two.)
  48. It does not provide acknowledgment of receipt of data.
    It is a connectionless protocol.

  49. Which WAN connection provides a dedicated circuit with fixed bandwidth available at all times?
  50. point-to-point

  51. Which statement correctly describes the difference between HTTP and HTTPS?
  52. HTTPS authenticates and encrypts the data being transferred between the client and the web server.

  53. Refer to the exhibit. What method is most commonly employed by large ISPs, such as ISP1, ISP2, and ISP3, to exchange and maintain routing information?
  54. EGP protocols

  55. Refer to the exhibit. Based on the DHCP configuration commands, what is the reason that a PC is receiving an IP address but is unable to communicate outside of the local network?
  56. The DNS server is on the incorrect network.

  57. Which two statements are correct about the ICMP packet that is used by the ping command? (Choose two.)
  58. It verifies Layer 3 connectivity.
    It measures the time that elapses between when the request packet is sent and the response packet is received.

  59. What should be the first step in a structured cable project?
  60. Obtain an accurate floor plan.

  61. Refer to the exhibit. A network administrator has just entered the interface configuration commands shown in the exhibit on a brand new router. To verify basic connectivity, a ping is issued from Host A to R1. The ping is unsuccessful. Which two configuration steps should be performed to solve this problem? (Choose two.)
  62. Enable the interface administratively
    Modify the subnet mask on HostA to be the same as the Fa0/0 interface.

  63. What is one purpose of the TCP three-way handshake?
  64. synchronizing sequence numbers between source and destination in preparation for data transfer

  65. A small tire retailer requires a low-cost WAN connection to its headquarters in order to manage its inventory and process customer sales in real time. Which WAN connection type is best suited to its needs?
  66. DSL

  67. A network administrator is asked to design a system to allow simultaneous access to the Internet for 250 users. The ISP can only supply five public IP addresses for this network. What technology can the administrator use to accomplish this task?
  68. port-based Network Address Translation

  69. Refer to the exhibit. The interfaces on R1 and R2 have been properly configured with the IP addresses as shown. No dynamic routing protocols have been configured. The network administrator has entered the commands that are shown in the exhibit. 

  70. Which two additional routes need to be configured to enable host A to access the Internet? (Choose two.)
    a default route on R1 using exit interface S0/0/0
    a static route on R2 for network 10.1.1.0 using exit interface S0/0/0

  71. Which statement correctly describes an SLA?
  72. It outlines the management, monitoring, and maintenance of a network.

  73. What contributes to the fact that transmitting a file using TCP will take longer than transmitting the same file using UDP?
  74. UDP does not need to add a header to a data packet.

  75. Which protocol defines the types of messages that a client uses to request a web page and the messages a server uses to respond to those requests?
  76. HTTP

  77. Refer to the exhibit. What two addresses are the broadcast addresses for network A and network B? (Choose two.)
  78. Network A broadcast address 192.168.1.47
    Network B broadcast address 192.168.1.207

  79. Which scenario may require the use of a crossover UTP cable?
  80. connecting a switch to another switch

  81. Which networking service is used to provide name to IP address mapping?
  82. DNS

  83. The IT department of a company implements a backup plan which includes a daily backup on Monday through Saturday. Only files that were modified during each day are backed up. Which backup method is being used?
  84. incremental backup

  85. Refer to the exhibit. Which cable path segments require the use of crossover cables?
  86. B, D, E

  87. Refer to the exhibit. Once DHCP is configured on a router with the Cisco SDM entries that are exhibited, which three statements could a network technician expect to see in the running configuration of the router? (Choose three.)
  88. ip dhcp pool abc-widgets.inc
    network 192.168.1.0 255.255.255.0
    ip dhcp excluded-address 192.168.1.1

  89. When should an ISP helpdesk technician start documentation during the customer troubleshooting process?
  90. when the technician answers the initial call from the customer who reports a problem

  91. Which two commands ensure that any password that permits access to the privileged EXEC mode is not shown in plain text when the configuration files are displayed? (Choose two.)
  92. Router(config)# enable secret cisco
    Router(config)# service password-encryption

  93. With a Class C address, which subnet mask should be used to connect 56 hosts to the network while wasting the minimum of available host addresses?
  94. 255.255.255.192

  95. A Catalyst switch is used as a temporary replacement for another switch that needs to be repaired. About a minute after the switch has started, the SYST LED on the front of the switch transitions from blinking green to amber. What is the meaning of the amber SYST LED?
  96. The switch has failed POST and must be sent for service.

  97. Refer to the exhibit. The network administrator uses the exhibited commands to configure R1 and R2. The administrator confirms Layer 1 connectivity between the two routers is functioning properly. However, R1 is unable to ping the serial interface of R2. 

  98. What could be the reason for this problem?
    Different encapsulations are configured on the two routers.

  99. What is a characteristic of Syslog?
  100. It enables devices to send information to a daemon that runs on a management station.

Saturday, December 29, 2012

Soal 4 FINAL CCNA

  1. What are two characteristics of a MAC address? (Choose two.)
  2. It is displayed in HEX characters.
    It is a physical address.

  3. A computer joins the network and announces itself to all hosts on the LAN. What type of message does the computer send out?
  4. broadcast

  5. Which two statements are characteristics of DHCP services? (Choose two.)
  6. DHCP clients send a DHCP Discover message to the destination IP address of 255.255.255.255.
    The integrated router acts as a DHCP server for internal hosts on local networks.

  7. What are two ways that a user can interact with an operating system shell? (Choose two.) 
  8. CLI
    GUI

  9. Which two transport layer protocols are used to transfer messages between hosts? (Choose two.) 
  10. TCP
    UDP

  11. Which two automatic addressing assignments are supported by DHCP? (Choose two.) 
  12. subnet mask
    default gateway address 

  13. Which protocol in its default configuration downloads e-mail messages to the client computer and deletes them from the server? 
  14. POP3

  15. What is the correct sequence of steps in the encapsulation of TCP/IP data as it passes from a source to a destination host? 
  16. A. converts data to bits for transmission
    B. packages the data for end to end transport
    C. adds the data-link header and trailer
    D. adds the network IP address to the header of the packet
    B,D,C,A 

  17. What is the purpose of TCP? 
  18. to provide flow control and acknowledgment of packets that are exchanged between the client and server 

  19. Refer to the exhibit. The network is experiencing excessive broadcast traffic from multiple hosts. What can be done to reduce the broadcast traffic that each host receives without compromising connectivity to the corporate servers?
  20. Separate the switches with a router. 

  21. Refer to the graphic. Based on the information that is shown, what statement is true? 
  22. All wireless devices that are connected to this access point must have an assigned SSID of Academy. 

  23. What is an advantage of purchasing a custom-built computer? 
  24. The user can specify high-performance components to meet specific needs.

  25. A home user is looking for an ISP connection that provides high speed digital transmission over regular phone lines. What ISP connection type should be used? 
  26. DSL

  27. Which type of network supports DHCP and DNS services for network users in a network domain? 
  28. client/server

  29. After attaching four PCs to the switch ports, configuring the SSID and setting authentication properties for a small office network, a technician successfully tests the connectivity of all PCs that are connected to the switch and WLAN. A firewall is then configured on the device prior to connecting it to the Internet. What type of network device includes all of the described features? 
  30. ISR router

  31. Which two statements are true about local applications? (Choose two.) 
  32. They are stored on the local hard disk.
    They run on the computer where they are installed.

  33. Which of the following statements best describes DNS? 
  34. DNS servers are used to configure logical address information for host computers.

  35. Which layer in the hierarchical Ethernet design model ensures that traffic between local networks will be allowed?
  36. distribution layer 

  37. A network technician is required to provide access to the Internet for a large company. What is needed to accomplish this task? 
  38. ISP

  39. Which statement accurately describes what network devices do in the distribution layer of the three layer design model?
  40. They interconnect local network segments

  41. What are two examples of peripheral input devices? (Choose two.) 
  42. barcode reader
    digital camera

  43. Which two values represent the network number and default mask for the address 209.165.200.225? (Choose two.) 
  44. 209.165.200.0
    255.255.255.0

  45. Why would a corporate web server be assigned a public IP address instead of a private IP address? 
  46. The public address can be routed on the Internet. 

  47. What portion of the destination IP address is used as a packet is routed through the Internet? 
  48. network portion

  49. Refer to the exhibit. Which pair of addresses would be appropriate to use for PC1 and PC2 to establish a workgroup using private addresses?
  50. 172.16.4.2 and 172.16.4.3 

  51. What is the purpose of pop-up blocker software? 
  52. It prevents the display of advertisement windows.

  53. What is a service pack?
  54. a collection of patches and updates released by a vendor

  55. What wireless technology has the ability to communicate with many devices at the same time, makes use of the 2.4 GHz band, and is limited to low-speed, short-range communications? 
  56. Bluetooth

  57. Refer to the exhibit. An educational institution needs to connect PC systems that use private IP addressing to the Internet. They have multiple systems that need to access the Internet, but were only able to purchase one public IP address. What should be activated on the Linksys integrated router to achieve this goal?
  58. WEP

  59. Which type of network attack occurs when an unauthorized person tries to persuade a user to share a network user ID and password? 
  60. social engineering 

  61. What are two best practices that are used when configuring a small home WLAN? (Choose two.)
  62. the use of pre-shared keys
    the disabling of SSID broadcasting

  63. Which firewall resource could include the capability of recognizing and filtering DoS attacks?
  64. stateful packet inspection 

  65. Which adapter card would be required for a PC to exchange information with other PCs on a LAN? 
  66. NIC

  67. Which type of computer has an integrated mouse? 
  68. laptop

  69. What component of a personal computer is responsible for the processing of all data? 
  70. CPU

  71. Refer to the exhibit. Assume that the exhibited output is from a host that is connected to a Linksys integrated router. What is the first thing that should be checked while using a bottom-up troubleshooting approach?
  72. the link status LED on the front of the router 

  73. Which Windows PC command line utility can be used to discover the path that a packet takes to reach a destination?
  74. tracert

  75. Which device is often configured to act as both a DHCP client and a DHCP server?
  76. integrated services router

  77. What is the name for the contract between a customer and an ISP that specifies requirements for uptime and service response time? 
  78. SLA

  79. What is true about a wireless access point that is equipped with an omnidirectional antenna? 
  80. radiates the signal equally in all directions

  81. What procedure will help prevent users from detecting a wireless network?
  82. Disable SSID broadcasts. 

  83. What is the purpose of the ipconfig /release command? 
  84. It forces a client to give up its current IP address.

  85. What data communication technology uses low-power radio waves to transmit data? 
  86. wireless

  87. Which attribute must be the same for wireless devices on one network to be able to communicate with devices on a different network?
  88. default gateway

  89. A company has a web server that must be accessible to both external and internal clients. Which security policy best practice should be followed to maximize security of the server?
  90. Place the web server in a DMZ.

  91. Which installation option should be chosen when the current operating system is too damaged to work properly?
  92. clean install

  93. What two pieces of information should a help desk technician document while troubleshooting connectivity issues with an end user? (Choose two.)
  94. if the user can ping the default gateway address
    whether the PC uses dynamic or static IP addressing

  95. A user is not able to connect to the network. A PC technician replaces the network cable that connects the PC to the switch port. The user is now able to connect to the network. Which troubleshooting technique did the technician use?
  96. substitution

  97. Because of an increasing number of users, bandwidth per user on a WLAN has decreased to a point where users are complaining about poor performance. What can be done to improve the user experience? 
  98. Reduce the number of devices using each channel. 

  99. A user has reported a failure to connect to the network. Based on similar calls from other users in the same location, the network technician starts troubleshooting by entering the ipconfig command on the user computer. Which troubleshooting technique is the technician using?
  100. divide-and-conquer 

Friday, December 28, 2012

Soal 3 FINAL CCNA

  1. A user tries to open a page on the web server at www.cisco.com. The user’s workstation does not have the destination IP address in order to encapsulate the request. Which network topology will provide the services that are required to associate the name of the web server with an IP address? 

  2. What measurement is commonly used to describe communication speed when transferring data?
  3. bps

  4. What type of message is sent to a specific group of hosts?
  5. multicast

  6. Which two automatic addressing assignments are supported by DHCP? (Choose two.)
  7. subnet mask
    default gateway address

  8. Refer to the exhibit. Which option correctly represents the encapsulation of a packet that is sent by Host1 to the web server?

  9. What are two characteristics of a MAC address? (Choose two.)
  10. It is displayed in HEX characters.
    It is a physical address

  11. What is the purpose of TCP?
  12. to provide flow control and acknowledgment of packets that are exchanged between the client and server

  13. TCP/IP data transmission between the source and destination host is de-encapsulated in four steps: 
  14. A. The TCP header is removed.
    B. Bits are decoded and the destination MAC address is recognized.
    C. The IP header is removed and the contents are passed to the next layer.
    D. The Ethernet header and trailer are removed.
    What is the correct sequence of these steps?
    B, D, C, A

  15. Which statement correctly describes the function of ARP?
  16. ARP is used by hosts to resolve an IP address to a MAC address for the destination host

  17. What is an ISP? 
  18.  It is an organization that enables individuals and businesses to connect to the Internet

  19. What is the function of CSMA/CA on a wireless Ethernet network?
  20. to prevent collisions

  21. What is an advantage of purchasing a custom-built computer?
  22. The user can specify high-performance components to meet specific needs.

  23. A home user is looking for an ISP connection that provides high speed digital transmission over regular phone lines. What ISP connection type should be used?
  24. DSL

  25. After attaching four PCs to the switch ports, configuring the SSID and setting authentication properties for a small office network, a technician successfully tests the connectivity of all PCs that are connected to the switch and WLAN. A firewall is then configured on the device prior to connecting it to the Internet. What type of network device includes all of the described features? 
  26. ISR router

  27. What are two examples of peripheral output devices? (Choose two.)
  28. headphones
    printer

  29. Which network design layer provides hosts with initial connectivity to the network?
  30. Access

  31. Refer to the exhibit. Assume that the command output is from a wireless DHCP client that is connected to a Linksys integrated router. What can be deduced from the output?
  32. The wireless connection is operational

  33. Which portion of the packet does a router use to forward the packet to the destination?
  34. destination IP address

  35. Refer to the exhibit. If H4 sends a message to H1 and the destination MAC address is in the MAC table for both Switch1 and Switch2, which host devices will receive the message?
  36. only H1

  37. What advantage does a peer-to-peer network have over a client-server network?
  38. It eliminates the need for centralized administration.

  39. When are leased lines typically used? 
  40. when low bandwidth is required
    for home and small business connectivity
    when a dedicated digital data line is necessary
    as a less expensive option to cable and DSL modem service 

  41. Which IP address type is intended for a specific host?
  42. unicast

  43. What is the default subnet mask for the IP address 128.107.23.10?
  44. 255.255.0.0

  45. How do ISPs obtain public IP addresses?
  46. They obtain the addresses from the Internet registry.

  47. Which three addresses belong to the category of private IP addresses? (Choose three.)
  48. 10.0.0.1
    172.16.0.1
    192.168.31.19

  49. What is the purpose of pop-up blocker software?
  50. It prevents the display of advertisement windows

  51. Which wireless protocol is used for encryption? 
  52. WEP

  53. Which service will translate private internal IP addresses into Internet routable public IP addresses?
  54. NAT

  55. Which type of network attack occurs when an unauthorized person tries to persuade a user to share a network user ID and password? 
  56. social engineering

  57. A network administrator is setting up an application filtering firewall. Company security policy states that FTP sessions that are coming from the Internet and use the standard FTP port must be blocked. Which TCP/UDP port must the administrator block on the firewall to be in compliance?
  58.  21

  59. How does a DMZ enhance network security for an organization? 
  60. allows external customer access to designated internal resources

  61. Which statement is true about packet filtering?
  62. It permits access based on IP address

  63. Which picture shows a USB port on a PC? 

  64. Which adapter card would be required for a PC to exchange information with other PCs on a LAN? 
  65. NIC

  66. What type of computer would most likely use a docking station?
  67. laptop

  68. What two commands can be used to form a new binding if client information does not agree with the DHCP client table? (Choose two.)
  69. ipconfig /release
    ipconfig /renew

  70. When would infrared be used to connect network devices?
  71. when synchronizing a PC with a PDA that is in line of sight

  72. Refer to the exhibit. What is a possible reason that the PC is unable to ping the default gateway IP address? 
  73. A straight-through cable should be used to connect the PC to the switch

  74. What is a weakness of WEP that is solved by WPA? 
  75. WEP uses the same key for every connection whereas WPA uses a different key for each connection.

  76. How does a crossover cable connect two routers?
  77. It connects the pins that are used for transmitting on one router to the pins that are used for receiving on the other router.

  78. Refer to the graphic. What is the purpose of assigning a Network Name of Academy? 
  79. It identifies the wireless LAN.

  80. A college network administrator is planning a wireless LAN to provide service in the student lounge and outdoor patio. The requirements include a range of at least 80 meters and a speed of 30 Mb/s. Which wireless LAN standard meets these requirements?
  81. 802.11g

  82. What is an advantage of selecting an operating system that has a GPL license over one with a commercial license?
  83. The GPL license-based operating system ensures that everyone can participate in the enhancement of the product.

  84. What is a characteristic of Bluetooth wireless technology?
  85. It allows one-to-many connections.

  86. What destination IP address does a DHCP client use to send the initial DHCP Discover packet when looking for a DHCP server? 
  87. 255.255.255.255

  88. Which two causes of networking problems are related to the physical layer? (Choose two.) 
  89. damaged cables and connectors
    overheated components

  90. What two pieces of information should a help desk technician document while troubleshooting connectivity issues with an end user? (Choose two.)
  91. if the user can ping the default gateway address
    whether the PC uses dynamic or static IP addressing

  92. Which troubleshooting technique can be used to quickly restore user functionality without having to spend much time identifying the exact problem?
  93. substitution

  94. Refer to the exhibit. The wired and wireless hosts can connect to each other but not to the Internet. All cabling and interface indicator lights appear to be in order. What is the most effective next step in a bottom-up troubleshooting process?
  95. Verify the default gateway configurations

  96. In an attempt to verify connectivity, a user issues the ping command to a device that is not on the local network. The ping is unsuccessful. What can be determined from this result? 
  97. Further troubleshooting will be required to reach a definite conclusion.

Thursday, December 27, 2012

Soal 2 CCNA

  1. Which type of computer has an integrated mouse?
  2. laptop

  3. What is the function of a physical topology map?
  4. organizes groups of hosts by how they use the network

  5. Refer to the exhibit. What is the reason that the host is unable to connect to the Internet?
  6. The host is configured with an incorrect gateway.

  7. An administrator is troubleshooting a network problem that involves the inability of users to reach Internet sites. During troubleshooting, the administrator is able to successfully ping web sites by their IP address, but pings to domain names are unsuccessful. Which service is most likely at fault?
  8. DNS

  9. Refer to the exhibit. Why would a network administrator use the network mode that is shown?
  10. to support hosts that use different 802.11 standards

  11. Which network design layer provides a connection point for end user devices to the network?
  12. access

  13. Which wireless protocol is used for encryption?
  14. WEP

  15. Which two statements are true about local applications? (Choose two.)
  16. They are stored on the local hard disk.
    They run on the computer where they are installed.

  17. Which type of network attack occurs when an unauthorized person tries to persuade a user to share a network user ID and password?
  18. social engineering

  19. What are two ways that a user can interact with an operating system shell? (Choose two.)
  20. CLI
    GUI

  21. Refer to the exhibit. The wireless router WR1 is configured with the address shown and DHCP is not configured. What will be the result of a technician configuring the address 172.16.14.255 on the laptop?
  22. The laptop will be configured within the same network as WR1.

  23. Which two issues can cause connectivity problems on a wireless network? (Choose two.)
  24. incorrect SSID
    low number of clients in BSS

  25. Which network entity would most likely be configured as both a DHCP client and a DHCP server?
  26. ISP
    desktop PC
    wireless laptop
    PC-based server
    integrated services home router

  27. What is a major characteristic of asymmetric Internet service?
  28. Download speeds and upload speeds are equal.
    Download speeds are faster than upload speeds.
    Data traffic speeds are faster than voice traffic speeds.
    Used when consistently uploading large amounts of graphics, video and multimedia traffic. 

  29. Some new features are available for the OS that is currently running on a user's PC. What method should be chosen so that the user can install these new feature sets?
  30. upgrade

  31. A user starts a file transfer between a client machine and an FTP server. Which list correctly represents the sequence of protocols that are used by the client machine to encapsulate the FTP data traffic for transmission?
  32. FTP, TCP, IP, Network Access Protocols

  33. A client computer on an Ethernet segment needs an IP address in order to communicate with other network resources. A DHCP server at address 192.168.1.1 has been correctly configured and enabled on the network. How will the client computer obtain a usable IP address for this network?
  34. Send a DHCPREQUEST packet to IP address 255.255.255.255.

  35. What information within a data packet does a router use, by default, to make forwarding decisions?
  36. the destination MAC address
    the destination IP address
    the destination host name
    the destination service requested

  37. Which part of the electromagnetic spectrum is commonly used to exchange data between a PDA and a computer?
  38. infrared

  39. Which two automatic addressing assignments are supported by DHCP? (Choose two.)
  40. subnet mask
    default gateway address

  41. What two pieces of information should a help desk technician document while troubleshooting connectivity issues with an end user? (Choose two.)
  42. if the user can ping the default gateway address
    whether the PC uses dynamic or static IP addressing

  43. Which statement accurately describes a recommended strategy for end users to employ when they interact with a help desk technician?
  44. At the beginning of the call, ask for the name and number of the supervisor of the help desk technician.

  45. Refer to the exhibit. Assume that the command output is from a wireless DHCP client that is connected to a Linksys integrated router. What can be deduced from the output?
  46. The wireless connection is operational.

  47. What does the term "attenuation" mean in data communication?
  48. loss of signal strength as distance increases

  49. Which two TCP/IP properties must match on hosts in the same LAN if the hosts are to be able to communicate with each other? (Choose two.)
  50. the subnet mask
    the default gateway configurations

  51. Which term is associated with logical addressing?
  52. IP addresses

  53. A network technician suspects that malware on a user PC is opening multiple TCP connections to a specific foreign host address. Which Windows command line utility can be used to confirm the multiple TCP connections?
  54. nslookup

  55. What is an advantage of purchasing a custom-built computer?
  56. The user can specify high-performance components to meet specific needs.

  57. Which wireless technology allows only one-to-one connections and is typically used for short-range, line-of-sight communication?
  58. Infrared

  59. What is the function of the DNS server?
  60. It maps a hostname to a corresponding IP address.

  61. Refer to the exhibit. H1 can ping H2, H3, and the Fa0/0 interface of router R1. H2 and H3 but not H1 can ping H4 and H5. What is a possible cause for the H1 failure?
  62. Host H1 does not have a default gateway configured.

  63. Bottom-up troubleshooting begins at which layer of the OSI model?
  64. physical layer

  65. How does a DMZ enhance network security for an organization?
  66. blocks viruses and spyware
    restricts internal user access to prohibited Internet sites
    allows external customer access to designated internal resources
    removes suspicious attachments from incoming and outgoing e-mail 

  67. What is a weakness of WEP that is solved by WPA?
  68. WEP uses the same key for every connection whereas WPA uses a different key for each connection.

  69. Which two protocols are responsible for encrypting data on a wireless network? (Choose two.)
  70. WEP
    WPA

  71. A network administrator has been notified that users have experienced problems gaining access to network resources. What utility could be used to directly query a name server for information on a destination domain?
  72. netstat

  73. When terminating a UTP cable, why is it important to push the wires all the way into the end of the connector?
  74. to ensure good electrical contact

  75. What is a service pack?
  76. a collection of patches and updates released by a vendor

  77. Refer to the exhibit. The security policy of an organization allows employees to connect to the office intranet from their homes. Which type of security policy is this?
  78. remote access

  79. Which type of firewall technique can be used to allow inbound traffic from the public network only if it was initiated from the internal network?
  80. stateful packet inspection

  81. The area covered by a single AP is known as what?
  82. basic service set

  83. Which protocol is used to transfer files among network devices and perform file-management functions?
  84. FTP

  85. What destination IP address is used in a unicast packet?
  86. a specific host

  87. How does a crossover cable make it possible for two "like devices" (for example, two switches) to communicate?
  88. The transmit pins on one device are connected to the receive pins on the other device.

  89. How do ISPs obtain public IP addresses?
  90. They obtain the addresses from the Internet registry.

  91. Refer to the exhibit. A home network is configured with the information in the graphic. A user tries to manually create a new connection to the network using the SSID Ciscoclass. However, a connection cannot be made. What could be the problem?
  92. The SSID is case-sensitive.

  93. A local PC has the correct configuration that is required to access the network. A ping command that is sourced at the PC does not receive a response from a remote device. Which operating system command might be used to determine where the connection failed?
  94. tracert

  95. What is the default subnet mask for an IP address of 64.100.19.14?
  96. 255.0.0.0

  97. All hosts within a domain receive the same frame that originates from one of the devices. The domain is also bounded by routers. What type of domain is this?
  98. broadcast

  99. What two commands can be used to form a new binding if client information does not agree with the DHCP client table? (Choose two.)
  100. ipconfig /release
    ipconfig /renew

  101. Which type of network supports DHCP and DNS services for network users in a network domain?
  102. client/server

  103. How do wireless devices within a BSS access an available channel?
  104. Every device within the BSS is assigned its own channel and has its own dedicated connection.