discovery 1 final review

15
Networking 1 - Discovery 1 Final Exam Review 1. Which two transport layer protocols enable hosts to communicate and transfer data? (Choose two.) a. DHCP b. ICMP c.IP d.TCP e.UDP 2. What is a function of the distribution layer in the hierarchical design model? a. to provide latency free switching b. to organize end devices in small manageable groups c. to provide connectivity using the high-speed backbone d. to provide connectivity between smaller local networks 3. For the TCP/IP model for internetwork communication, which statement describes the process for the transition of data from the internet layer to the network access layer? a. An IP packet is encapsulated in a frame. b. A TCP segment is placed in an IP packet. c. HTML data is encapsulated in a TCP segment. d. A frame is placed on the network media as encoded bits. 4. What is the function of the DNS server? a. It maps the IP address to the MAC address. b. It translates a computer or domain name to the associated IP address. c. It manages the domain that clients are assigned to. d. It accepts HTTP requests from clients. 5. In IP telephony, what is the purpose of a gateway to the PSTN? a. to connect IP voice clients to Internet phone service b. to create a peer-to-peer connection between two IP voice clients c. to map unique names of IP voice endpoints to a client list on a voice server d. to allow IP voice clients to communicate with regular analog telephones. 6. Which three types of information are provided to a host by an integrated router that is acting as a DHCP server? (Choose three.) a. host ID b. IP addresses of DNS servers c. IP address d. MAC address

Upload: kurnia-dwi-p

Post on 28-Apr-2015

127 views

Category:

Documents


2 download

TRANSCRIPT

Page 1: Discovery 1 Final Review

Networking 1 - Discovery 1 Final Exam Review

1. Which two transport layer protocols enable hosts to communicate and transfer data? (Choose two.)

a. DHCP

b. ICMP

c. IP

d. TCP

e. UDP

2. What is a function of the distribution layer in the hierarchical design model?

a. to provide latency free switching

b. to organize end devices in small manageable groups

c. to provide connectivity using the high-speed backbone

d. to provide connectivity between smaller local networks

3. For the TCP/IP model for internetwork communication, which statement describes the process for the transition of

data from the internet layer to the network access layer?

a. An IP packet is encapsulated in a frame.

b. A TCP segment is placed in an IP packet.

c. HTML data is encapsulated in a TCP segment.

d. A frame is placed on the network media as encoded bits.

4. What is the function of the DNS server?

a. It maps the IP address to the MAC address.

b. It translates a computer or domain name to the associated IP address.

c. It manages the domain that clients are assigned to.

d. It accepts HTTP requests from clients.

5. In IP telephony, what is the purpose of a gateway to the PSTN?

a. to connect IP voice clients to Internet phone service

b. to create a peer-to-peer connection between two IP voice clients

c. to map unique names of IP voice endpoints to a client list on a voice server

d. to allow IP voice clients to communicate with regular analog telephones.

6. Which three types of information are provided to a host by an integrated router that is acting as a DHCP server?

(Choose three.)

a. host ID

b. IP addresses of DNS servers

c. IP address

d. MAC address

e. hostname

f. subnet mask

7. A host wants to send information simultaneously to all the other hosts in the same network. Which domain will

support this type of communication?

a. broadcast

b. unicast

c. local

d. multicast

Page 2: Discovery 1 Final Review

Networking 1 - Discovery 1 Final Exam Review

8. What are two functions of MAC addresses in a LAN? (Choose two.)

a. to allow the transfer of frames from source to destination

b. to determine which host has priority to transfer data

c. to indicate the best path between separate networks

d. to associate with a specific network IP address

e. to uniquely identify a node on a network

9.

Refer to the exhibit. How many additional hosts can be added to the local network?

a. 124

b. 126

c. 252

d. 254

e. 255

f. 256

10. What are two advantages of purchasing a preassembled computer? (Choose two.)

a. The cost is comparatively lower.

b. High-performance graphics and gaming applications are supported.

c. There is a negligible waiting period for assembly.

d. This type of computer is useful for knowledgeable consumers with special needs.

e. The user can specify high-performance components.

11. When is the use of a DSL modem necessary?

a. when a cellular telephone provides the service

b. when a high-speed connection is provided over a cable TV network

c. when a high-speed digital connection is required over the regular telephone line

d. when a satellite dish is used

12. A home user was successfully browsing the Internet earlier in the day but is now unable to connect. A ping

command from a wireless laptop to a wired PC in the LAN is successful, but the nslookup command fails to resolve a

website address. The user decides to analyze the LEDs on the Linksys router to verify connectivity. Which LED should

be of main concern in this situation?

a. WLAN LED

b. power LED

c. Internet LED

Page 3: Discovery 1 Final Review

Networking 1 - Discovery 1 Final Exam Review

d. 1-4 Ethernet LEDs

13. What is the most common reason that ISPs provide symmetrical transfer services?

a. to address data transfer needs of home users

b. to download significantly more than upload

c. to host servers on the Internet

d. to work with applications that require less bandwidth

14. What is one purpose of using logical addresses in an IP network?

a. They identify a specific NIC on a host device by assigning a permanent logical address.

b. They are used to determine which host device accepts the frame.

c. They provide vendor-specific information about the host.

d. They are used to determine the network that the host is located on.

e. They are used by switches to make forwarding decisions.

15. A network designer is working with a small company to determine the network type best suited to the needs of the

company. Which two characteristics could the designer use to describe a peer-to-peer network to the owner of the

company? (Choose two.)

a. central administration

b. easy to install

c. low cost

d. scalable

e. secure

16. Which part of a data packet is used by a router to determine the destination network?

a. source IP address

b. user data

c. destination IP address

d. control information

e. destination MAC address

17. What is the purpose of a router?

a. to forward broadcasts to all interfaces so that all hosts receive them

b. to maintain a table of individual host addresses

c. to select the best path to reach remote networks

d. to physically connect multiple hosts that belong to the same network

18.

Page 4: Discovery 1 Final Review

Networking 1 - Discovery 1 Final Exam Review

Refer to the exhibit. PC1 sends a data packet to PC4. When the router forwards the data out Fa0/1, what destination MAC

address will the router place in the frame?

a. 0050.0FA9.CB47

b. 0050.E208.A761

c. 0200.5455.4E01

d. 0200.545D.25F7

19.

Refer to the exhibit. A local area network is built with four PCs, a switch, and a hub. PC1 sends a packet to PC4 which

collides with a packet sent from PC3 to PC1. Which devices will receive the damaged frame?

a. PC1 and PC2

b. PC1, PC2, PC3, and PC4

c. PC1, PC2, and the switch

d. PC1, PC2, PC3, PC4, and the switch

20.

Page 5: Discovery 1 Final Review

Networking 1 - Discovery 1 Final Exam Review

Refer to the exhibit. Host2 attempts to establish communications with Server1. What action will switch SW1 take prior to

forwarding the frame?

a. flood the frame out all interfaces

b. learn the MAC address that is associated with Host2

c. assign a MAC address to Host2 from the MAC table

d. poll all interfaces to learn their assigned IP addresses

21.

Refer to the exhibit. Which statement is true based on the information that is shown in the exhibit?

a. All wireless devices that are connected to this AP must have an assigned SSID of University.

b. Any wireless client that is attached to this AP must have the same IP address and SSID.

c. The AP is not physically wired to the local LAN.

d. This configuration is found only in an ad hoc wireless network.

22. Where do ISPs get the public addresses that they assign to end users?

a. ISPs create the addresses themselves.

b. ISPs are assigned addresses through the RFC.

c. ISPs obtain their addresses automatically.

Page 6: Discovery 1 Final Review

Networking 1 - Discovery 1 Final Exam Review

d. ISPs obtain address blocks from registry organizations.

23. For an IP address, what component decides the number of bits that is used to represent the host ID?

a. default -gateway

b. host number

c. network number

d. subnet mask

24. What describes the external IP address that is obtained by a router through a cable or DSL modem?

a. a public address that is obtained from ICANN

b. a private address that is manually configured by the administrator

c. a public address that is obtained through DHCP from the ISP

d. a private address that converts to a public address on the internal LAN

25. Which three address ranges can be used to depict private IP addresses? (Choose three.)

a. 10.0.0.0 to 10.0.0.255

b. 127.16.0.0 to 127.16.255.255

c. 150.150.0.0 to 150.150.255.255

d. 172.16.1.0 to 172.16.1.255

e. 192.168.22.0 to 192.168.22.255

f. 200.100.50.0 to 200.100.50.255

26. Your school network blocks all websites related to online gaming. What type of security policy is being applied?

a. identification and authentication

b. remote access

c. acceptable use

d. incident handling

27. Which part of the electromagnetic spectrum is commonly used by wireless LANs?

a. Bluetooth

b. infrared

c. Industrial Scientific and Medical (ISM)

d. radio frequency (RF)

28. Which type of attack involves flooding a server port with SYN messages?

a. phishing

b. brute force

c. denial of service

d. data manipulation

29. What is the source of the majority of reported network security incidents?

a. adware

b. hackers

c. internal users

d. spammers

30.

Page 7: Discovery 1 Final Review

Networking 1 - Discovery 1 Final Exam Review

Refer to the graphic. What feature can be installed on the Linksys integrated router to convert private IP addresses to

Internet-routable addresses?

a. authentication

b. DHCP

c. encryption

d. firewall

e. NAT

f. WEP

31. Before implementing a stateful firewall on an ISR router, a network engineer is asked to explain to upper

management in simple terms what a stateful firewall is. Which description should the engineer use?

a. A stateful firewall is only available on a firewall appliance.

b. A stateful firewall blocks or permits access based only on applications.

c. A stateful firewall bases its analysis only on IP address, port number, and MAC address.

d. A stateful firewall can be configured to allow incoming packets only from sessions that are initiated from inside.

32. What is the purpose of creating a DMZ during network firewall implementation?

a. to create a server security zone accessible only to internal clients

b. to create a dirty zone that allows all inbound and outbound traffic

c. to allow for a publicly accessible zone without compromising the internal network

d. to specify a higher security level than normally required for the internal production network

33. How does a straight-through cable connect two unlike devices?

a. It connects the receive pins on the first device to the receive pins on the second device.

b. It connects the transmit pins on the first device to the receive pins on the second device.

c. It disconnects the transmit pins and uses only the receive pins.

d. It uses the same pins for transmitting and receiving.

34. What is an advantage of selecting an operating system that has a commercial license over one with a GPL

license?

a. The commercial license-based operating system ensures full access to the source code for everyone.

b. The commercial license-based operating system ensures that everyone can participate in the enhancement of the

product.

c. The commercial license-based operating system provides structured support.

Page 8: Discovery 1 Final Review

Networking 1 - Discovery 1 Final Exam Review

d. The commercial license-based operating system is released free of charge.

35. Which installation option enables a single physical resource to function simultaneously as multiple logical

resources?

a. clean install

b. multi-boot

c. upgrade

d. virtualization

36. For devices that do not autosense, which connection requires a crossover cable?

a. hub port to router port

b. PC to hub port

c. PC to switch port

d. PC port to PC port

37. When terminating UTP cabling, why is it important to untwist only a small amount of each wire pair?

a. minimizes crosstalk

b. makes installation faster

c. ensures wires are in correct order

d. makes it easier to fit wires into connector

38. What are two examples of storage peripheral devices? (Choose two.)

a. printer

b. flash drive

c. headphones

d. external DVD

e. barcode reader

39. Within a local network, which two items must be unique on a computer for it to successfully connect to the

network? (Choose two.)

a. IP address

b. subnet mask

c. computer name

d. default gateway address

e. operating system version

40.

Page 9: Discovery 1 Final Review

Networking 1 - Discovery 1 Final Exam Review

Refer to the exhibit. A ping command that was initiated from the local PC to the file server at IP address 209.165.201.5

succeeded. However, a ping that was initiated from the file server to the local PC was unsuccessful. What could cause the

ping command that was initiated from file server to fail?

a. The file server is down.

b. The integrated router has failed.

c. NAT has been enabled on the integrated router.

d. A security measure is blocking access that initiates from the server.

e. The DSL modem failed to provide an IP address for the local PC.

41.

Refer to the exhibit. Which statement is true based on the configuration shown?

a. Multiple modes of encryption are configured on this device.

b. Both 802.11b and 802.11g hosts can connect to this device.

c. All APs in the WLAN will allow wireless connections via channel 6.

d. The network name must be entered on a host computer before the host connects to this network.

42.

Page 10: Discovery 1 Final Review

Networking 1 - Discovery 1 Final Exam Review

Refer to the exhibit. What is the effect of setting the security mode to WEP on the Linksys integrated router?

a. The WEP security mode enables the AP to inform clients of its presence.

b. The WEP security mode encrypts network traffic during transmission between the AP and the wireless client.

c. The WEP security mode generates a dynamic key each time a client establishes a connection with the AP.

d. The WEP security mode identifies the WLAN.

43. A network administrator is planning an inexpensive WLAN implementation at a small business site. Which two

strategies should be included in the site survey? (Choose two.)

a. Identify the locations of sources of interference.

b. Hire a WLAN analysis firm to survey the site.

c. Deploy all APs and move them if necessary to improve coverage.

d. Use a wireless laptop to verify WLAN coverage in the work areas.

e. Employ sophisticated specialized equipment to measure signal strengths and interference.

44. While conducting a site survey for a new wireless LAN design, a network technician determines that several

wireless phones in the company use the 2.4GHz band and could interfere with the operation of the wireless LAN.

Based on this, which two wireless LAN standards could be implemented to avoid this interference? (Choose two.)

a. original 802.11

b. 802.11a

c. 802.11b

d. 802.11g

e. 802.11n

45.

Page 11: Discovery 1 Final Review

Networking 1 - Discovery 1 Final Exam Review

Refer to the exhibit. A small office uses an ISR to provide connectivity for both wired and wireless computers. One day, a

sales person who is using a laptop cannot connect to Server1 through the wireless network. A network technician

attempts to determine if the problem is on the wireless or the wired network. The technician pings successfully from the

wireless laptop to the default gateway IP address on the ISR. What should be the next troubleshooting step?

a. Ping from the laptop to PC1.

b. Ping from Server1 to PC1.

c. Ping from Server1 to its gateway IP address.

d. Ping from the laptop to the Ethernet port on the cable modem.

46. A user is unable to send e-mail. To begin troubleshooting this problem, the network technician uses the browser

on the PC and tries to access some popular Internet websites. Which troubleshooting approach is being followed?

a. bottom-up

b. divide-and-conquer

c. top-down

d. trial and error

47. For the second time in a week, workstations on a LAN are not able to log into the server. The technician fixed the

problem the first time, but cannot remember the steps taken to solve it. What aspect of the troubleshooting process has

the technician neglected?

a. identifying the problem

b. asking end-users questions

c. documenting the troubleshooting process

d. using structured techniques to solve a problem

48.

Page 12: Discovery 1 Final Review

Networking 1 - Discovery 1 Final Exam Review

Refer to the exhibit. When www.cisco.com is entered in a browser window on a PC, the web page is unavailable. While

troubleshooting this problem, the network technician executes the nslookup command as well as the ping command to the

web server. What is the likely reason that the web server home page cannot be displayed?

a. The DNS server service needs to be installed on the PC.

b. A DNS server is not available to resolve the name.

c. The reason that the web server is unable to display the web page is that the web server is unavailable.

d. The increased response time displayed in the ping may indicate a delay in server response time.

49. What is the meaning of the term crosstalk?

a. interference of signals between wire pairs

b. loss of signal strength as distance increases

c. damage of the signal when two bare wires touch

d. strengthening of a signal by a networking device

50. A user in a small office is unable to connect to the Internet. The user examines the physical connections to the

ISR, a Linksys WRT300N, and notices a solid green LED on the port that is wired to the computer. What does the LED

indicate about the current state of the port?

a. The ISR is making adjustments to the port.

b. The device is plugged in and traffic is flowing.

c. The computer is plugged in but no traffic is flowing.

d. The ISR does not detect that the computer is plugged in.