Trang

CCNA Exploration 4.0, CCNA Network Fundamentals: Chapter 2 toets antwoorden / Network Fundamentals exam 2 answers

Thứ Sáu, 27 tháng 1, 2012

 Network Fundamentals  Chapter 2 Exam Answers

1. Which two layers of the OSI model have the same functions as the TCP/IP model Network Access Layer? (Choose two.)
Network
Transport
Physical**
Data Link**
Session

2. What is a primary function of the trailer information added by the data link layer encapsulation?
supports error detection**
ensures ordered arrival of data
provides delivery to correct destination
identifies the devices on the local network
assists intermediary devices with processing and path selection

3. During the encapsulation process, what occurs at the data link layer?
No address is added.
The logical address is added.
The physical address is added.**
The process port number is added.

4. What device is considered an intermediary device?
file server
IP phone
laptop
printer
switch**

5. Which layer encapsulates the segment into packets?
physical
data link
network**
transport

6. Which statements correctly identify the role of intermediary devices in the network? (Choose three.)
determine pathways for data**
initiate data communications
retime and retransmit data signals**
originate the flow of data
manage data flows**
final termination point for data flow

7. What can be identified by examining the network layer header?
the destination device on the local media
the path to use to reach the destination host**
the bits that will be transferred over the media
the source application or process creating the data

8. What is the proper order of the layers of the OSI model from the highest layer to the lowest layer?
physical, network, application, data link, presentation, session, transport
application, physical, session, transport, network, data link, presentation
application, presentation, physical, session, data link, transport, network
application, presentation, session, transport, network, data link, physical**
presentation, data link, session, transport, network, physical, application

9.
9.jpg

Refer to the exhibit. Which three labels correctly identify the network types for the network segments that are shown? (Choose three.)
Network A -- WAN
Network B -- WAN**
Network C -- LAN**
Network B -- MAN
Network C -- WAN
Network A -- LAN**

10. What are the key functions of encapsulation? (Choose three.)
allows modification of the original data before transmission
identifies pieces of data as part of the same communication**
enables consistent network paths for communication
ensures that data pieces can be directed to the correct receiving end device**
enables the reassembly of complete messages**
tracks delay between end devices


11.
Refer to the exhibit. Which networking term describes the data interleaving process represented in the graphic?
piping
PDU
streaming
**multiplexing
encapsulation

12. What is a PDU?
corruption of a frame during transmission
data reassembled at the destination
retransmitted packets due to lost communication
**a layer specific encapsulation

13.
Refer to the exhibit. "Cell A" at IP address 10.0.0.34 has established an IP session with "IP Phone 1" at IP address 172.16.1.103. Based upon the graphic, which device type best describes the function of wireless device "Cell A?"
the destination device
**an end device
an intermediate device
a media device


14.
Refer to the exhibit. Which set of devices contains only end devices?
A, C, D
B, E, G, H
C, D, G, H, I, J
D, E, F, H, I, J
**E, F, H, I, J


15.
Refer to the exhibit. Which term correctly identifies the device type that is included in the green area?
source
end
transfer
**intermediary

16. Which three statements best describe a Local Area Network (LAN)? (Choose three.)
**A LAN is usually in a single geographical area.
**The network is administered by a single organization.
The connection between segments in the LAN is usually through a leased connection.
The security and access control of the network are controlled by a service provider.
**A LAN provides network services and access to applications for users within a common organization.
Each end of the network is generally connected to a Telecommunication Service Provider (TSP).

17.
Refer to the exhibit. What type of network is shown?
WAN
MAN
**LAN
WLAN

18. What is the purpose of the TCP/IP Network Access layer?
path determination and packet switching
data representation, encoding, and control
reliability, flow control, and error detection
**detailing the components that make up the physical link and how to access it
the division of segments into packets

19. Which characteristic correctly refers to end devices in a network?
manage data flows
**originate data flow
retime and retransmit data signals
determine pathways for data

20. What is the primary purpose of Layer 4 port assignment?
to identify devices on the local media
to identify the hops between source and destination
to identify to the intermediary devices the best path through the network
to identify the source and destination end devices that are communicating
**to identify the processes or services that are communicating within the end devices

21. Select the statements that are correct concerning network protocols. (Choose three.)
**define the structure of layer specific PDU's
dictate how to accomplish layer functions
**outline the functions necessary for communications between layers
limit hardware compatibility
**require layer dependent encapsulations
eliminate standardization among vendors
Read more ...

Cisco Discovery 1: DHomesb Chapter 2 toets antwoorden / DHomesb exam 2 answers

Thứ Hai, 23 tháng 1, 2012


Networking for Home and Small Businesses Version 4.0 English


DHomesb Chapter 2 Exam Answers

1) An operating system is severely damaged. All data on the partition needs to be deleted, and all application software must be reinstalled. Which installation method should be used to correct the problem?
* clean install
upgrade
multi-boot
virtualization

2) Which two statements should be included in a pre-installation checklist when upgrading an operating system? (Choose two.)
Verify that the hardware resources have multiple partitions.
* Verify that the hardware resources meet or exceed the published minimum requirements.
* Complete a full backup of all important files and data.
Overwrite any data currently contained on the drive to remove all contents.
Verify that the hardware resources are certified to work with the existing operating system prior to upgrading.

3) Which three pieces of information must be specified on a computer to allow that computer to send and receive information across networks? (Choose three.)
closest server
operating system
* IP address
* subnet mask
* default gateway
network card driver

4) Which two items must be unique to each computer and cannot be duplicated on a network? (Choose two.)
partition
file system
* computer name
* IP address
operating system

5) Which method of interacting with an operating system involves typing commands at a command prompt?
* CLI
GUI
redirector
kernel translator

6) What are three characteristics of an operating system that is released under the GPL (GNU Public License)? (Choose three.)
* full access to source code
* software often available free
structured development cycle
can be expensive to purchase
limits what end-user can do with code
* support normally user-based and often free

7) What is the purpose of a default gateway?
physically connects a computer to a network
provides a permanent address to a computer
identifies the network to which a computer is connected
identifies the logical address of a networked computer and uniquely identifies it to the rest of the network
* identifies the device that allows local network computers to communicate with devices on other networks

8) Which two statements are true about drive partitions? (Choose two.)
* Partitions are necessary in multi-boot installations.
* A hard drive can be divided into an operating system partition and a data partition.
User data is never overwritten when a drive is partitioned.
A disk partition is a defined section of an operating system.
Each partition requires a different file system type.

9) What occurs when computers are configured to receive their network configurations dynamically?
Each computer receives a permanent IP address.
A network administrator enters information on each computer.
* Each computer requests configuration information from a server.
An NIC automatically provides configuration information to the computer and stores that configuration information.

10) What are two ways that a user can interact with an operating system shell? (Choose two.)
* CLI
OS
* GUI
NIC
kernel

11) Which three resource specifications are given by the manufacturer to ensure that an operating system performs as designed? (Choose three.)
* required hard disk space
type of accelerated graphics card
* recommended amount of RAM
printer requirements
* processor type and speed
type of keyboard


12) The Lesson TaskMaster application from ChalkBoard has a problem. Every time the software is installed and loaded on a Windows XP-based Dell computer, and the moment something is typed followed by a tab, two tabs are inserted instead of one. What would be the best solution to this problem?
Uninstall and then reinstall Lesson TaskMaster.
Download, install, and apply a patch from Dell.
Download, install, and apply a patch from Microsoft.
* Download, install, and apply a patch from ChalkBoard. 

 

13) What Explorer menu option is used to determine the Windows XP version installed on a computer?
Edit
Help
View
Tools
Favorites   


14) Which Windows XP Automatic Update option allows you to select the time when a Windows update is executed?
*Automatic (recommended).
Install updates from the Windows Update web site.
Notify me but don’t automatically download or install them.
Download updates for me, but let me choose when to install them.  


 15) What two items are available from the About Windows option through the Windows Explorer Help menu? (Choose two.)
a list of troubleshooting links
*the end-user license agreement
a list of installed hardware devices  

the date of the last Windows update
*the operating system version number
 a list of terms with links to definitions



16) Which operating system patch installation method is used when a user is notified of a security update for remotely accessing a computer, but wishes not to install this patch?
manual

automatic  
semi-automatic
*prompt for permission 

17) Which statement is true about installing an operating system on computers in a networked environment?
*The computer name must be unique for all computers on the same network.
The operating system must be the same on all computers on the same network.  

The amount of installed RAM must be the same on all computers on the same network.  
The operating system must have the latest patch applied during the installation or it will not participate in the network.  

18) Windows XP has a known problem with specific Intel processors. What is the best course of action to take in this situation? 
Power off the computer and reinstall the CPU.
Delete Windows XP and perform a clean install.  

Reinstall Windows XP to the same hard drive partition.  
Reinstall Windows XP to a different hard drive partition.  
*Download and install the Windows patch that fixes this problem.  
Replace the Intel processor with one that is approved by Microsoft.  

19) Which Windows file system is more likely to be used in a business environment?
ext2  

ext3  
*NTFS  
FAT16  
FAT32 

20) You must select an operating system for the faculty at a college. All of the questions below would be logical for you to ask except one. Determine the illogical question.
How much does the operating system cost and does the college have funding? 

Is the technical support staff at the college able to support the operating systems being considered? 
*Do the operating systems being considered have the ability to support the ports available on the faculty computers?
 What types of applications do the faculty use and are they compatible with the operating systems being considered? 

Read more ...

Cisco Discovery 1: DHomesb Chapter 1 toets antwoorden / DHomesb exam 1 answers

Thứ Hai, 23 tháng 1, 2012


DHomesb Chapter 1 Exam Answers
1. Which computer component is considered the nerve center of the computer system and is responsible for processing all of the data within the machine?
RAM
* CPU
video card
sound card
operating system

2. What are two advantages of purchasing a preassembled computer? (Choose two..
* usually a lower cost
exact components may be specified
extended waiting period for assembly
* adequate for performing most general applications
suited for customers with special needs

3. A user plans to run multiple applications simultaneously on a computer. Which computer component is essential to accomplish this?
* RAM
NIC
video card
sound card
storage device

4. Which adapter card enables a computer system to exchange information with other systems on a local network?
modem card
controller card
video card
sound card
* network interface card

5. What is the main storage drive used by servers, desktops, and laptops?
tape drive
* hard drive
optical drive (DVD)
floppy disk drive

6. Which component is designed to remove high-voltage spikes and surges from a power line so that they do not damage a computer system?
CPU
* surge suppressor
motherboard
hard drive

7. What are two examples of output peripheral devices? (Choose two.)
* printer
* speakers
flash drive
external DVD
external modem

8. What two functions does a UPS provide that a surge protector does not ? (Choose two.)
protects the computer from voltage surges
* provides backup power from an internal battery
protects the computer from sudden voltage spikes
gives the user time to phone the electrical company
* gives the user time to safely shut down the computer if the power fails
provides backup power through a generator provided by the wall outlet

9. What is a word processor?
It is a physical computer component.
* It is a program designed to perform a specific function.
It is a program that controls the computer resources.
It is a functional part of an operating system.

10. What is the purpose of the ASCII code?
translates bits into bytes
interprets graphics digitally
translates digital computer language into binary language
* represents letters, characters, and numbers with bits

11. Why do servers often contain duplicate or redundant parts?
Servers require more power and thus require more components.
* Servers should be accessible at all times.
Servers can be designed as standalone towers or rack mounted.
Servers are required by networking standards to have duplicate parts.

12. What are two benefits of hooking up a laptop to a docking station? (Choose two.)
Mobility is increased.
* An external monitor can be used.
* Alternate connectivity options may be available.
The keyboard can be changed to a QWERTY-style keyboard.
More wireless security options are available.

13. Applications can be grouped into general use software or industry specific software. What are two examples of industry specific software? (Choose two.)
* CAD
presentation
spreadsheet
word processing
* medical practice management
contacts/scheduling management

14. Which three terms describe different types of computers? (Choose three.)
operating system
network
* laptop
* desktop
Windows
* mainframe

15. How is a server different from a workstation computer?
The server works as a standalone computer.
* The server provides services to clients.
The workstation has fewer applications installed.
The workstation has more users who attach to it.

16. How many values are possible using a single binary digit?
1
* 2
4
8
9
16

17. What measurement is commonly associated with computer processing speed?
bits
pixels
* hertz
bytes


18. What can be used to prevent electrostatic discharge (ESD)?
dry and non humid conditions
carpeted floor
* grounding strap
uncluttered work space

19. If a peripheral device is not functioning, what are three things you should do to solve the problem? (Choose three.)
* Use the testing functionality on the peripheral itself, if available.
* Verify that all cables are connected properly.
Disconnect all cables connected to the computer except those connected to the peripheral.
* Ensure that the peripheral is powered on.
Disconnect the peripheral and verify that the computer is operating normally.
Reload the computer operating system.

20. Which two steps should be performed when installing a peripheral device? (Choose two.)
* Download and install the most current driver.
Connect the peripheral using any cable and any available port on the computer.
* Connect the peripheral using an appropriate cable or wireless connection.
Test the peripheral on another machine before installing it on the one where it will be used.
Check the computer documentation to see if the peripheral vendor is compatible with the PC vendor.

21. In newer operating systems, how are system resources assigned by default when components are installed?
manually assigned by the operating system
manually assigned by the administrator
statically assigned by the component to a preset resource
* dynamically assigned between the component and the operating system
Read more ...

Cisco Discovery 1 final toets antwoorden, DHomesb finale exam answers, cisco final exam answers 2011-2012

Chủ Nhật, 15 tháng 1, 2012


Version 4.0 English

 
DHomesb Final Exam Answers (version 1)

1
Bottom-up troubleshooting begins at which layer of the OSI model?
network layer
#physical layer
data link layer
transport layer
application layer

2
Which two statements are true about local applications? (Choose two.)
They run on the network.
An example of a local application is e-mail.
#They are accessed from a remote computer.
They are stored on the local hard disk.
#They run on the computer where they are installed.

3


Refer to the exhibit. What default gateway address will be assigned to PC1 if access to remote resources is needed?

#192.31.7.3
192.168.1.101
192.168.1.253
A default gateway is not necessary.

4
Which attribute must be the same for wireless devices on one network to be able to communicate with devices on a different network?
DNS server
MAC address
#default gateway
operating system
wireless equipment vendor

5
How do ISPs obtain public IP addresses?
They create the addresses themselves.
They obtain the addresses from the home PCs.
They obtain the addresses from the Internet registry.
#They obtain the addresses from the RFC.

6
Refer to the exhibit. The security policy of an organization allows employees to connect to the office intranet from their homes. Which type of security policy is this?
acceptable use
incident handling
network maintenance
#remote access

7
Which wireless component allows wireless clients to gain access to a wired network?
PDA
STA
access point
#wireless bridge

8
Which network design layer provides a connection point for end user devices to the network?
access
core
distribution
#network

9
Which two transport layer protocols are used to transfer messages between hosts? (Choose two.)
DHCP
FTP
SMTP
#TCP
#UDP

10
An administrator is troubleshooting a network problem that involves the inability of users to reach Internet sites. During troubleshooting, the administrator is able to successfully ping web sites by their IP address, but pings to domain names are unsuccessful. Which service is most likely at fault?
DHCP
#DNS
FTP
NAT

11


Refer to the graphic. Assume that the command output is from a wireless DHCP client that is connected to a Linksys integrated router. What can be deduced from the output?
#The wireless connection is good.
The WEP key or SSID needs to be checked.
The DHCP configuration on the router needs to be checked.
The wireless NIC driver or the NIC itself needs to be reinstalled.

12
A company has a web server that must be accessible to both external and internal clients. Which security policy best practice should be followed to maximize security of the server?
Place the web server in a DMZ.
#Keep the web server on the external network.
Configure a firewall device to serve as the web server.
Locate the web server in the server farm of the internal network.

13
TCP/IP data transmission between the source and destination host is de-encapsulated in four steps:

A. The TCP header is removed.
B. Bits are decoded and the destination MAC address is recognized.
C. The IP header is removed and the contents are passed to the next layer.
D. The Ethernet header and trailer are removed.

What is the correct sequence of these steps?
A, B, C, D
A, C, B, D
#B, C, D, A
B, D, C, A
C, A, B, D

14
A computer joins the network and announces itself to all hosts on the LAN. What type of message does the computer send out?

#broadcast
simulcast
multicast
unicast

15
What are two ways that a user can interact with an operating system shell? (Choose two.)

#CLI
OS
#GUI
NIC
kernel

16
What are two examples of peripheral input devices? (Choose two.)
external modem
#barcode reader
#digital camera
plotter
printer

17
What are three examples of logical configuration information used when planning a network implementation? (Choose three.)

#size of broadcast domains
naming scheme
length of cable runs
#IP addressing scheme
#physical device location
location of power outlets

18
Which wireless protocol is used for encryption?
EAP
Open
PSK
#WEP

19
Which value represents the host portion of IP address 128.107.10.11 with a subnet mask of 255.255.0.0?
.10
#.10.11
128.107
.107.10.11
128.107.10

20
A home user is looking for an ISP connection that provides high speed digital transmission over regular phone lines. What ISP connection type should be used?

#DSL
dial-up
satellite
cell modem
cable modem

21
What is the purpose of pop-up blocker software?
It detects and removes spyware.
It detects and removes viruses.
#It prevents the display of advertisement windows.
It removes unwanted e-mail.

22
What are two advantages of purchasing a custom-built computer? (Choose two.)
usually a lower cost
no waiting period for assembly
#user can specify higher performance components
#supports higher-end graphics and gaming applications
fewer components to replace

23
Refer to the exhibit. PC1 is unable to access the web server at 209.165.200.226/27. Based on the provided output, what is the most likely cause of the problem?
PC1 is not plugged in to RTR1.
Port 80 is already in use on PC1.
No DNS server is configured on PC1.
#PC1 is configured with an incorrect IP address and default gateway.

24
What is the name for the contract between a customer and an ISP that specifies requirements for uptime and service response time?
DSL
IAB
NAP
#SLA

25
Which term is associated with logical addressing?

#IP addresses
port addresses
physical addresses
Media Access Control addresses

26
Which Windows PC command line utility can be used to discover the path that a packet takes to reach a destination?

ping
netstat
#tracert
nslookup
ipconfig

27
Which statement accurately describes what network devices do in the distribution layer of the three layer design model?

They interconnect individual hosts.
They interconnect multiple companies.
#They interconnect local network segments.
They interconnect the company network to the ISP.

28
Select three statements that correctly describe how DHCP services may be provided. (Choose three.)

An integrated router provides IP configurations for most ISPs.
#An integrated router can act as both DHCP server and DHCP client.
A home PC using a static IP address obtained that address from a DHCP server.
#Most home network integrated routers receive an IP configuration directly from their ISP.
#A variety of devices can act as DHCP servers, as long as they run DHCP service software.
A home PC that is unable to find a DHCP server defaults to the static IP address of 192.168.1.1.

29
Which two causes of networking problems are related to the physical layer? (Choose two.)

#disconnected cables
#improper operation of cooling fans
incorrect MAC address
incorrect default gateway
incorrect subnet mask

30
Which installation option should be chosen when the current operating system is too damaged to work properly?

upgrade
multi-boot
#clean install
virtualization

31
What is an ISP?

It is a standards body that develops cabling and wiring standards for networking.
It is a protocol that establishes how computers within a local network communicate.
#It is an organization that enables individuals and businesses to connect to the Internet.
It is a networking device that combines the functionality of several different networking devices in one.

32
What two pieces of information should a help desk technician document while troubleshooting connectivity issues with an end user? (Choose two.)

the CPU clock speed of the computer
the number of network jacks that are in the room
#if the user can ping the default gateway address
if the word processing software is installed correctly
#whether the PC uses dynamic or static IP addressing

33
Refer to the graphic. What feature can be installed on the Linksys integrated router to convert private IP addresses to Internet-
routable addresses?
authentication
DHCP
encryption
firewall
#NAT
WEP

34
After attaching four PCs to the switch ports, configuring the SSID and setting authentication properties for a small office network, a technician successfully tests the connectivity of all PCs that are connected to the switch and WLAN. A firewall is then configured on the device prior to connecting it to the Internet. What type of network device includes all of the described features?
switch
ISR router
#firewall appliance
standalone wireless access point

35
For the second time in a week, workstations on a LAN are not able to log into the server. The technician fixed the problem the first time, but cannot remember the steps taken to solve it. What aspect of the troubleshooting process has the technician neglected?
identifying the problem
asking end-users questions
#documenting the troubleshooting process
using structured techniques to solve a problem

36
What is the default subnet mask for an IP address of 64.100.19.14?

#255.0.0.0
255.255.0.0
255.255.255.0
255.255.255.255

37
How does a crossover cable make it possible for two "like devices" (for example, two switches) to communicate?

The transmit pins are disconnected and only the receive pins are used.
The transmit pins on one device are connected to the transmit pins on the other device.
The receive pins on one device are connected to the receive pins on the other device.
#The transmit pins on one device are connected to the receive pins on the other device.

38
What will be one result of using a wireless infrastructure when designing the communications infrastructure for a new building?
#Wireless devices will be easy to add or relocate.
Infrastructure installation will be difficult and expensive.
There will be less interference from outside electronic sources.
Data transmitted over wireless networks will be more secure than when transmitted over wired networks.

39
What does the term "attenuation" mean in data communication?

#loss of signal strength as distance increases
time for a signal to reach its destination
leakage of signals from one cable pair to another
strengthening of a signal by a networking device

40
Which type of computer has an integrated mouse?
desktop
#laptop
mainframe
server
pocket PC

41
Which Windows command is used to display the configured IP address, subnet mask, and default gateway?
#ipconfig
netstat
nslookup
tracert

42
What must be identical on all devices in a WLAN for successful wireless communication between the devices?

#SSID
antenna type
network mode
wireless NIC driver

43
For devices that do not autosense, which connection requires a crossover cable?
hub port to router port
PC to hub port
PC to switch port
#PC port to PC port

44
Refer to the exhibit. A user on Host1 requests a web page from the web server. Which diagram is accurate for the encapsulation of the traffic that is sent from the user to the web server?

ONBEKEND> Waarschijnlijk D


45
What describes the external IP address that is obtained by a router through a cable or DSL modem?
a public address that is obtained from ICANN
a private address that is manually configured by the administrator
#a public address that is obtained through DHCP from the ISP
a private address that converts to a public address on the internal LAN

46
Which two components are configured via software in order for a PC to participate in a network environment? (Choose two.)
MAC address
#IP address
kernel
shell
#subnet mask

47
What destination IP address is used in a unicast packet?

#a specific host
a group of hosts
all hosts on the network
the network broadcast address

48
Which part of the electromagnetic spectrum is commonly used to exchange data between a PDA and a computer?
FM
radar
#infrared
ultraviolet

49
What two commands can be used to form a new binding if client information does not agree with the DHCP client table? (Choose two.)

#ipconfig /release
ipconfig /all
ipconfig /flushdns
#ipconfig /renew
ipconfig

50
What are the two possible values for a digital bit? (Choose two.)

#0
#1
A
F
#
9

51
Which picture shows a USB port on a PC?
*deze moet je toch echt weten..


52
What is the purpose of a router?

#to forward broadcasts to all interfaces so that all hosts receive them
to maintain a table of individual host addresses
to select the best path to reach remote networks
to physically connect multiple hosts that belong to the same network 
Read more ...

Cisco Discovery 1: DHomesb Chapter 9 toets antwoorden / DHomesb exam 9 answers

Thứ Tư, 11 tháng 1, 2012

Networking for Home and Small Businesses Version 4.0 English


DHomesb Chapter 9 Exam Answers

Q.1. What should a network administrator do first after receiving a call from a user who cannot access the company web server? 
• Reboot the web server.
• Replace the NIC of the computer.
• Ask the user to log off and log on again.
• Ask the user what URL has been typed and what error message displays.

Q.2. A customer called the cable company to report that the Internet connection is unstable. After trying several configuration changes, the technician decided to send the customer a new cable modem to try. What troubleshooting technique does this represent? 
• top-down
• bottom-up
• substitution
• trial-and-error
• divide-and-conquer 

Q.3. Only one workstation on a particular network cannot reach the Internet. What is the first troubleshooting step if the divide-and-conquer method is being used?
• Check the NIC, and then check the cabling.
• Check the workstation TCP/IP configuration.
• Test all cables, and then test layer by layer up the OSI model.
• Attempt to Telnet, and then test layer by layer down the OSI model. 

Q.4. Which two troubleshooting techniques are suitable for both home networks and large corporate networks? (Choose two.)
• having a backup ISR
• running network monitoring applications
• documenting the troubleshooting process
• keeping a record of system upgrades and software versions

• keeping spare switches, routers, and other equipment available 

Q.5. Identify two physical-layer network problems. (Choose two.)
• hardware failure
• software configuration
• devices not able to ping
• loose cable connections
• device driver configuration

Q.6. Which ipconfig command requests IP configuration from a DHCP server?
• ipconfig
• ipconfig /all
• ipconfig /renew
• ipconfig /release 

Q.7. What command is used to determine the location of delay for a packet traversing the Internet?
• ipconfig
• netstat
• nslookup
• ping
• tracert 

Q.8. What command is used to determine if a DNS server is providing name resolution?
• ipconfig
• netstat
• nslookup
• tracert 

Q.9. Which troubleshooting method begins by examining cable connections and wiring issues?
• top-down
• bottom-up
• substitution
• divide-and-conquer 

Q.10. A technician suspects that a Linksys integrated router is the source of a network problem. While troubleshooting, the technician notices a blinking green activity LED on some of the ports. What does this indicate?
• Self-diagnostics have not completed.
• The power supply is the source of the problem.  
• The ports are operational and are receiving traffic.
• The ports are operational, but no traffic is flowing.
• There are no cables plugged into those ISR ports.
• The ports have cables plugged in, but they are not functional. 



Q.11. A PC is plugged into a switch and is unable to connect to the network. The UTP cable is suspected. What could be the problem?
• A straight-through cable is being used
• The connectors at both ends of the cable are RJ-45.
• The RJ-45 connectors are crimped onto the cable jacket.
• A crossover cable is being used. 

Q.12. Refer to the graphic. What configuration is incorrect in the network shown?
• The host IP address is incorrect.
• The host subnet mask is incorrect.
• The host default gateway is incorrect.
• The wired connection is the wrong type of cable.
• The Linksys integrated router does not support wireless.

Q.13. Which three settings must match on the client and access point for a wireless connection to occur? (Choose three.)
• SSID
• authentication
• MD5 checksum
• antennae type
• encryption key
• MAC address filters

Q.14. A technician is troubleshooting a security breach on a new wireless access point. Which three configuration settings make it easy for hackers to gain access? (Choose three.)
• configuring NAT
• broadcasting the SSID
• using open authentication
• enabling MAC address filters
• using the default internal IP address
• using DHCP to provide IP addresses




Q.15. Refer to the graphic. The wireless host cannot access the Internet, but the wired host can. What is the problem?
• The host WEP key is incorrect.
• The host IP address is incorrect.
• The host subnet mask is incorrect.
• The host default gateway is incorrect.
• The integrated router internal IP address is incorrect.
• The integrated router Internet IP address is incorrect.









Q.16. Refer to the graphic. What configuration is incorrect in the network shown?
• The host IP address is incorrect.
• The host subnet mask is incorrect.
• The host default gateway is incorrect.
• The wired connection is the wrong type of cable.
• The Linksys integrated router does not support wireless.


Q.17. When acting as a DHCP server, what three types of information can an ISR provide to a client? (Choose three.)
• physical address
• MAC address
• default gateway
• static IP address
• dynamic IP address
• DNS server address
 

Q.18. What two items could be checked to verify connectivity between the router and the ISP? (Choose two.)
• router status page
• wireless card settings
• router operating system version
• local host operating system version
• connectivity status as indicated by LEDs

Q.19. A technician is unsuccessful in establishing a console session between a PC and a Linksys integrated router. Both devices have power, and a cable is connected between them. Which two troubleshooting steps could help to diagnose this problem? (Choose two.)
• Ensure the correct cable is used.
• Ensure the SSID is the same on both devices.
• Ensure both devices have the same IP address.
• Ensure both devices have different subnet masks.
• Ensure the encryption type on both devices match.
• Ensure the link status LED on the integrated router is lit.

Q.20. Network baselines should be performed in which two situations? (Choose two.)
• after the network is installed and running optimally
• after a virus outbreak is discovered on the network
• after major changes are implemented on the network
• after several computers are added to the network
• at the end of the work week

Q.21. Typically, help desk personnel assist end users in which two tasks? (Choose two.)
• identifying when the problem occurred
• determining if other users are currently logged into the computer
• updating network diagrams and documentation
• implementing the solution to the problem
• running a network baseline test
• determining the cost of fixing the problem

Q.22. How does remote-access software help in the troubleshooting process?
• Remote access uses a live chat feature.
• Users have to be present so that they can view LEDs and change cables if necessary.
• Diagnostics can be run without a technician being present at the site.
• FAQs can be consulted more easily. 

Q.23. Which two items should be added to the documentation following a troubleshooting event? (Choose two.)
• final resolution
• repetitive measures
• number of people involved in the problem
• accurate current network infrastructure diagrams
• results of successful and unsuccessful troubleshooting steps
Read more ...

Cisco Discovery 1: DHomesb Chapter 8 toets antwoorden / DHomesb exam 8 answers

Thứ Tư, 11 tháng 1, 2012

Networking for Home and Small Businesses Version 4.0 English

 
DHomesb Chapter 8 Exam Answers


 Q. 1. Identify three techniques used in social engineering. (Choose three.) 
• fishing 

• vishing 
• phishing

• spamming 

• pretexting 

• junk mailing 


Q.2. During a pretexting event, how is a target typically contacted? 
• by e-mail
• by phone

• in person
• through another person

Q.3. While surfing the Internet, a user notices a box claiming a prize has been won. The user opens the box unaware that a program is being installed. An intruder now accesses the computer and retrieves personal information. What type of attack occurred? 
• worm
• virus
• Trojan horse

• denial of service

Q.4. What is a major characteristic of a Worm? 
• malicious software that copies itself into other executable programs
• tricks users into running the infected software
• a set of computer instructions that lies dormant until triggered by a specific event
• exploits vulnerabilities with the intent of propagating itself across a network

Q.5. A flood of packets with invalid source-IP addresses requests a connection on the network. The server busily tries to respond, resulting in valid requests being ignored. What type of attack occurred? 
• Trojan horse
• brute force
• ping of death
• SYN flooding


Q.6. What type of advertising is typically annoying and associated with a specific website that is being visited? 
• adware
• popups

• spyware
• tracking cookies

Q.7. What is a widely distributed approach to marketing on the Internet that advertises to as many individual users as possible via IM or e-mail? 
• brute force
• spam

• spyware
• tracking cookies

Q.8. What part of the security policy states what applications and usages are permitted or denied? 
• identification and authentication
• remote access
• acceptable use

• incident handling

Q.9. Which statement is true regarding anti-virus software? 
• Only e-mail programs need to be protected.
• Only hard drives can be protected.
• Only after a virus is known can an anti-virus update be created for it.

• Only computers with a direct Internet connection need it.

Q.10. Which two statements are true concerning anti-spam software? (Choose two.) 
• Anti-spam software can be loaded on either the end-user PC or the ISP server, but not both.
• When anti-spam software is loaded, legitimate e-mail may be classified as spam by mistake.

• Installing anti-spam software should be a low priority on the network.
• Even with anti-spam software installed, users should be careful when opening e-mail attachments.
• Virus warning e-mails that are not identified as spam via anti-spam software should be forwarded to other users immediately.


Q.11. What term is used to describe a dedicated hardware device that provides firewall services?
• server-based 
• integrated 

• personal
• appliance-based


Q.12. Which acronym refers to an area of the network that is accessible by both internal, or trusted, as well as external, or untrusted, host devices? 
• SPI
• DMZ

• ISR
• ISP

Q.13. Which statement is true about port forwarding within a Linksys integrated router?
• Only external traffic that is destined for specific internal ports is permitted. All other traffic is denied.

• Only external traffic that is destined for specific internal ports is denied. All other traffic is permitted.
• Only internal traffic that is destined for specific external ports is permitted. All other traffic is denied.
• Only internal traffic that is destined for specific external ports is denied. All other traffic is permitted.

Q.14. To which part of the network does the wireless access point part of a Linksys integrated router connect? 
• DMZ
• external
• internal

• a network other than the wired network 



Q.15. Refer to the graphic. What is the purpose of the Internet Filter option of Filter IDENT (Port 113.  on the Linksys integrated router? 
• to require a user ID and password to access the router
• to prevent outside intruders from attacking the router through the Internet

• to require a pre-programmed MAC address or IP address to access the router
• to disable tracking of internal IP addresses so they cannot be spoofed by outside devices

Q.16. What statement is true about security configuration on a Linksys integrated router? 
• A DMZ is not supported.
• The router is an example of a server-based firewall.
• The router is an example of an application-based firewall.
• Internet access can be denied for specific days and times.


Q.17. What environment would be best suited for a two-firewall network design?

• a large corporate environment

• a home environment with 10 or fewer hosts
• a home environment that needs VPN access
• a smaller, less congested business environment 

Q.18. What is one function that is provided by a vulnerability analysis tool?
• It provides various views of possible attack paths.
• It identifies missing security updates on a computer.

• It identifies wireless weak points such as rogue access points.
• It identifies all network devices on the network that do not have a firewall installed.
• It identifies MAC and IP addresses that have not been authenticated on the network.

Q.19. Many best practices exist for wired and wireless network security. The list below has one item that is not a best practice. Identify the recommendation that is not a best practice for wired and wireless security.
• Periodically update anti-virus software.
• Be aware of normal network traffic patterns.
• Periodically update the host operating system.
• Activate the firewall on a Linksys integrated router.
• Configure login permissions on the integrated router.
• Disable the wireless network when a vulnerability analysis is being performed.


Q.20. What best practice relates to wireless access point security?

• activation of a popup stopper
• a change of the default IP address

• an update in the antivirus software definitions
• physically securing the cable between the access point and client 

Q.21. Refer to the graphic. In the Linksys Security menu, what does the SPI Firewall Protection option Enabled provide? 
• It prevents packets based on the application that makes the request.
• It allows packets based on approved internal MAC or IP addresses.
• It requires that packets coming into the router be responses to internal host requests.

• It translates an internal address or group of addresses into an outside, public address
Read more ...