Thursday, December 27, 2012

Soal 2 CCNA

  1. Which type of computer has an integrated mouse?
  2. laptop

  3. What is the function of a physical topology map?
  4. organizes groups of hosts by how they use the network

  5. Refer to the exhibit. What is the reason that the host is unable to connect to the Internet?
  6. The host is configured with an incorrect gateway.

  7. An administrator is troubleshooting a network problem that involves the inability of users to reach Internet sites. During troubleshooting, the administrator is able to successfully ping web sites by their IP address, but pings to domain names are unsuccessful. Which service is most likely at fault?
  8. DNS

  9. Refer to the exhibit. Why would a network administrator use the network mode that is shown?
  10. to support hosts that use different 802.11 standards

  11. Which network design layer provides a connection point for end user devices to the network?
  12. access

  13. Which wireless protocol is used for encryption?
  14. WEP

  15. Which two statements are true about local applications? (Choose two.)
  16. They are stored on the local hard disk.
    They run on the computer where they are installed.

  17. Which type of network attack occurs when an unauthorized person tries to persuade a user to share a network user ID and password?
  18. social engineering

  19. What are two ways that a user can interact with an operating system shell? (Choose two.)
  20. CLI
    GUI

  21. Refer to the exhibit. The wireless router WR1 is configured with the address shown and DHCP is not configured. What will be the result of a technician configuring the address 172.16.14.255 on the laptop?
  22. The laptop will be configured within the same network as WR1.

  23. Which two issues can cause connectivity problems on a wireless network? (Choose two.)
  24. incorrect SSID
    low number of clients in BSS

  25. Which network entity would most likely be configured as both a DHCP client and a DHCP server?
  26. ISP
    desktop PC
    wireless laptop
    PC-based server
    integrated services home router

  27. What is a major characteristic of asymmetric Internet service?
  28. Download speeds and upload speeds are equal.
    Download speeds are faster than upload speeds.
    Data traffic speeds are faster than voice traffic speeds.
    Used when consistently uploading large amounts of graphics, video and multimedia traffic. 

  29. Some new features are available for the OS that is currently running on a user's PC. What method should be chosen so that the user can install these new feature sets?
  30. upgrade

  31. A user starts a file transfer between a client machine and an FTP server. Which list correctly represents the sequence of protocols that are used by the client machine to encapsulate the FTP data traffic for transmission?
  32. FTP, TCP, IP, Network Access Protocols

  33. A client computer on an Ethernet segment needs an IP address in order to communicate with other network resources. A DHCP server at address 192.168.1.1 has been correctly configured and enabled on the network. How will the client computer obtain a usable IP address for this network?
  34. Send a DHCPREQUEST packet to IP address 255.255.255.255.

  35. What information within a data packet does a router use, by default, to make forwarding decisions?
  36. the destination MAC address
    the destination IP address
    the destination host name
    the destination service requested

  37. Which part of the electromagnetic spectrum is commonly used to exchange data between a PDA and a computer?
  38. infrared

  39. Which two automatic addressing assignments are supported by DHCP? (Choose two.)
  40. subnet mask
    default gateway address

  41. What two pieces of information should a help desk technician document while troubleshooting connectivity issues with an end user? (Choose two.)
  42. if the user can ping the default gateway address
    whether the PC uses dynamic or static IP addressing

  43. Which statement accurately describes a recommended strategy for end users to employ when they interact with a help desk technician?
  44. At the beginning of the call, ask for the name and number of the supervisor of the help desk technician.

  45. Refer to the exhibit. Assume that the command output is from a wireless DHCP client that is connected to a Linksys integrated router. What can be deduced from the output?
  46. The wireless connection is operational.

  47. What does the term "attenuation" mean in data communication?
  48. loss of signal strength as distance increases

  49. Which two TCP/IP properties must match on hosts in the same LAN if the hosts are to be able to communicate with each other? (Choose two.)
  50. the subnet mask
    the default gateway configurations

  51. Which term is associated with logical addressing?
  52. IP addresses

  53. A network technician suspects that malware on a user PC is opening multiple TCP connections to a specific foreign host address. Which Windows command line utility can be used to confirm the multiple TCP connections?
  54. nslookup

  55. What is an advantage of purchasing a custom-built computer?
  56. The user can specify high-performance components to meet specific needs.

  57. Which wireless technology allows only one-to-one connections and is typically used for short-range, line-of-sight communication?
  58. Infrared

  59. What is the function of the DNS server?
  60. It maps a hostname to a corresponding IP address.

  61. Refer to the exhibit. H1 can ping H2, H3, and the Fa0/0 interface of router R1. H2 and H3 but not H1 can ping H4 and H5. What is a possible cause for the H1 failure?
  62. Host H1 does not have a default gateway configured.

  63. Bottom-up troubleshooting begins at which layer of the OSI model?
  64. physical layer

  65. How does a DMZ enhance network security for an organization?
  66. blocks viruses and spyware
    restricts internal user access to prohibited Internet sites
    allows external customer access to designated internal resources
    removes suspicious attachments from incoming and outgoing e-mail 

  67. What is a weakness of WEP that is solved by WPA?
  68. WEP uses the same key for every connection whereas WPA uses a different key for each connection.

  69. Which two protocols are responsible for encrypting data on a wireless network? (Choose two.)
  70. WEP
    WPA

  71. A network administrator has been notified that users have experienced problems gaining access to network resources. What utility could be used to directly query a name server for information on a destination domain?
  72. netstat

  73. When terminating a UTP cable, why is it important to push the wires all the way into the end of the connector?
  74. to ensure good electrical contact

  75. What is a service pack?
  76. a collection of patches and updates released by a vendor

  77. Refer to the exhibit. The security policy of an organization allows employees to connect to the office intranet from their homes. Which type of security policy is this?
  78. remote access

  79. Which type of firewall technique can be used to allow inbound traffic from the public network only if it was initiated from the internal network?
  80. stateful packet inspection

  81. The area covered by a single AP is known as what?
  82. basic service set

  83. Which protocol is used to transfer files among network devices and perform file-management functions?
  84. FTP

  85. What destination IP address is used in a unicast packet?
  86. a specific host

  87. How does a crossover cable make it possible for two "like devices" (for example, two switches) to communicate?
  88. The transmit pins on one device are connected to the receive pins on the other device.

  89. How do ISPs obtain public IP addresses?
  90. They obtain the addresses from the Internet registry.

  91. Refer to the exhibit. A home network is configured with the information in the graphic. A user tries to manually create a new connection to the network using the SSID Ciscoclass. However, a connection cannot be made. What could be the problem?
  92. The SSID is case-sensitive.

  93. A local PC has the correct configuration that is required to access the network. A ping command that is sourced at the PC does not receive a response from a remote device. Which operating system command might be used to determine where the connection failed?
  94. tracert

  95. What is the default subnet mask for an IP address of 64.100.19.14?
  96. 255.0.0.0

  97. All hosts within a domain receive the same frame that originates from one of the devices. The domain is also bounded by routers. What type of domain is this?
  98. broadcast

  99. What two commands can be used to form a new binding if client information does not agree with the DHCP client table? (Choose two.)
  100. ipconfig /release
    ipconfig /renew

  101. Which type of network supports DHCP and DNS services for network users in a network domain?
  102. client/server

  103. How do wireless devices within a BSS access an available channel?
  104. Every device within the BSS is assigned its own channel and has its own dedicated connection.

0 comments:

Post a Comment