Friday, December 28, 2012

Soal 3 FINAL CCNA

  1. A user tries to open a page on the web server at www.cisco.com. The user’s workstation does not have the destination IP address in order to encapsulate the request. Which network topology will provide the services that are required to associate the name of the web server with an IP address? 

  2. What measurement is commonly used to describe communication speed when transferring data?
  3. bps

  4. What type of message is sent to a specific group of hosts?
  5. multicast

  6. Which two automatic addressing assignments are supported by DHCP? (Choose two.)
  7. subnet mask
    default gateway address

  8. Refer to the exhibit. Which option correctly represents the encapsulation of a packet that is sent by Host1 to the web server?

  9. What are two characteristics of a MAC address? (Choose two.)
  10. It is displayed in HEX characters.
    It is a physical address

  11. What is the purpose of TCP?
  12. to provide flow control and acknowledgment of packets that are exchanged between the client and server

  13. TCP/IP data transmission between the source and destination host is de-encapsulated in four steps: 
  14. A. The TCP header is removed.
    B. Bits are decoded and the destination MAC address is recognized.
    C. The IP header is removed and the contents are passed to the next layer.
    D. The Ethernet header and trailer are removed.
    What is the correct sequence of these steps?
    B, D, C, A

  15. Which statement correctly describes the function of ARP?
  16. ARP is used by hosts to resolve an IP address to a MAC address for the destination host

  17. What is an ISP? 
  18.  It is an organization that enables individuals and businesses to connect to the Internet

  19. What is the function of CSMA/CA on a wireless Ethernet network?
  20. to prevent collisions

  21. What is an advantage of purchasing a custom-built computer?
  22. The user can specify high-performance components to meet specific needs.

  23. A home user is looking for an ISP connection that provides high speed digital transmission over regular phone lines. What ISP connection type should be used?
  24. DSL

  25. After attaching four PCs to the switch ports, configuring the SSID and setting authentication properties for a small office network, a technician successfully tests the connectivity of all PCs that are connected to the switch and WLAN. A firewall is then configured on the device prior to connecting it to the Internet. What type of network device includes all of the described features? 
  26. ISR router

  27. What are two examples of peripheral output devices? (Choose two.)
  28. headphones
    printer

  29. Which network design layer provides hosts with initial connectivity to the network?
  30. Access

  31. Refer to the exhibit. Assume that the command output is from a wireless DHCP client that is connected to a Linksys integrated router. What can be deduced from the output?
  32. The wireless connection is operational

  33. Which portion of the packet does a router use to forward the packet to the destination?
  34. destination IP address

  35. Refer to the exhibit. If H4 sends a message to H1 and the destination MAC address is in the MAC table for both Switch1 and Switch2, which host devices will receive the message?
  36. only H1

  37. What advantage does a peer-to-peer network have over a client-server network?
  38. It eliminates the need for centralized administration.

  39. When are leased lines typically used? 
  40. when low bandwidth is required
    for home and small business connectivity
    when a dedicated digital data line is necessary
    as a less expensive option to cable and DSL modem service 

  41. Which IP address type is intended for a specific host?
  42. unicast

  43. What is the default subnet mask for the IP address 128.107.23.10?
  44. 255.255.0.0

  45. How do ISPs obtain public IP addresses?
  46. They obtain the addresses from the Internet registry.

  47. Which three addresses belong to the category of private IP addresses? (Choose three.)
  48. 10.0.0.1
    172.16.0.1
    192.168.31.19

  49. What is the purpose of pop-up blocker software?
  50. It prevents the display of advertisement windows

  51. Which wireless protocol is used for encryption? 
  52. WEP

  53. Which service will translate private internal IP addresses into Internet routable public IP addresses?
  54. NAT

  55. Which type of network attack occurs when an unauthorized person tries to persuade a user to share a network user ID and password? 
  56. social engineering

  57. A network administrator is setting up an application filtering firewall. Company security policy states that FTP sessions that are coming from the Internet and use the standard FTP port must be blocked. Which TCP/UDP port must the administrator block on the firewall to be in compliance?
  58.  21

  59. How does a DMZ enhance network security for an organization? 
  60. allows external customer access to designated internal resources

  61. Which statement is true about packet filtering?
  62. It permits access based on IP address

  63. Which picture shows a USB port on a PC? 

  64. Which adapter card would be required for a PC to exchange information with other PCs on a LAN? 
  65. NIC

  66. What type of computer would most likely use a docking station?
  67. laptop

  68. What two commands can be used to form a new binding if client information does not agree with the DHCP client table? (Choose two.)
  69. ipconfig /release
    ipconfig /renew

  70. When would infrared be used to connect network devices?
  71. when synchronizing a PC with a PDA that is in line of sight

  72. Refer to the exhibit. What is a possible reason that the PC is unable to ping the default gateway IP address? 
  73. A straight-through cable should be used to connect the PC to the switch

  74. What is a weakness of WEP that is solved by WPA? 
  75. WEP uses the same key for every connection whereas WPA uses a different key for each connection.

  76. How does a crossover cable connect two routers?
  77. It connects the pins that are used for transmitting on one router to the pins that are used for receiving on the other router.

  78. Refer to the graphic. What is the purpose of assigning a Network Name of Academy? 
  79. It identifies the wireless LAN.

  80. A college network administrator is planning a wireless LAN to provide service in the student lounge and outdoor patio. The requirements include a range of at least 80 meters and a speed of 30 Mb/s. Which wireless LAN standard meets these requirements?
  81. 802.11g

  82. What is an advantage of selecting an operating system that has a GPL license over one with a commercial license?
  83. The GPL license-based operating system ensures that everyone can participate in the enhancement of the product.

  84. What is a characteristic of Bluetooth wireless technology?
  85. It allows one-to-many connections.

  86. What destination IP address does a DHCP client use to send the initial DHCP Discover packet when looking for a DHCP server? 
  87. 255.255.255.255

  88. Which two causes of networking problems are related to the physical layer? (Choose two.) 
  89. damaged cables and connectors
    overheated components

  90. What two pieces of information should a help desk technician document while troubleshooting connectivity issues with an end user? (Choose two.)
  91. if the user can ping the default gateway address
    whether the PC uses dynamic or static IP addressing

  92. Which troubleshooting technique can be used to quickly restore user functionality without having to spend much time identifying the exact problem?
  93. substitution

  94. Refer to the exhibit. The wired and wireless hosts can connect to each other but not to the Internet. All cabling and interface indicator lights appear to be in order. What is the most effective next step in a bottom-up troubleshooting process?
  95. Verify the default gateway configurations

  96. In an attempt to verify connectivity, a user issues the ping command to a device that is not on the local network. The ping is unsuccessful. What can be determined from this result? 
  97. Further troubleshooting will be required to reach a definite conclusion.

0 comments:

Post a Comment