final ccna1

13
Cisco Networking Academy content is copyrighted and the unauthorized posting, distribution or sharing of this exam content is prohibited. 1 A user tries to open a page on the web server at www.cisco.com. The user’s workstation does not have the destination IP address in order to encapsulate the request. Which network topology will provide the services are required to associate the name of the web server with an IP address? ---

Upload: tities-jendrayu-sarasati

Post on 10-Apr-2015

2.091 views

Category:

Documents


4 download

DESCRIPTION

A user tries to open a page on the web server at www.cisco.com. The user’s workstation does not have the destination IP address in order to encapsulate the request. Which network topology will provide the services are required to associate the name of the web server with an IP address?---

TRANSCRIPT

Page 1: Final Ccna1

Cisco Networking Academy content is copyrighted and the unauthorized posting,

distribution or sharing of this exam content is prohibited.

1 A user tries to open a page on the web server at www.cisco.com. The user’s workstation does not have the

destination IP address in order to encapsulate the request. Which network topology will provide the services that

are required to associate the name of the web server with an IP address?

---

Page 2: Final Ccna1

2. What measurement is commonly used to describe communication speed when transferring

data?

bps ---

cps

Hz

MB

3. What type of message is sent to a specific group of hosts?

static

unicast

dynamic

multicast ----

broadcast

4. Which two automatic addressing assignments are supported by DHCP? (Choose two.)

local server address

subnet mask ----

default gateway address ----

physical address of the recipient

physical address of the sender

5

Refer to the exhibit. Which option correctly represents the encapsulation of a packet that is sent

Page 3: Final Ccna1

by Host1 to the web server?

-----

6. What are two characteristics of a MAC address? (Choose two.)

It indicates the physical location of the host within the network.

It is dynamically assigned by a DHCP server.

It is displayed in HEX characters. ----

It is a physical address. ----

It is cable-based.

7. What is the purpose of TCP?

to manage data links and physical network k transmissions

to specify the format of requests and responses that are exchanged between the client and

server

to assign the logical address and encapsulate the request into packets for routing to the

destination

to provide flow control and acknowledgment of packets that are exchanged between the

client and server -----

TCP/IP data transmission between the source and destination host is de-encapsulated in four steps: A. The TCP header is removed. B. Bits are decoded and the destination MAC address is recognized. C. The IP header is removed and the contents are passed to the next layer. D. The Ethernet header and trailer are removed.

Page 4: Final Ccna1

What is the correct sequence of these steps?

A, B, C, D A, C, B, D B, C, D, A B, D, C, A ----- C, A, B, D 8. Which statement correctly describes the function of ARP?

ARP is used by the switches on the network to build their MAC tables.

ARP is used by the routers on the network to build their routing tables.

ARP is used by hosts to resolve a host name to an IP address for the destination host.

ARP is used by hosts to resolve an IP address to a MAC address for the destination host ---- 9. What is an ISP?

It is a standards body that develops cabling and wiring standards for networking.

It is a protocol that establishes how computers within a local network communicate.

It is an organization that enables individuals and businesses to connect to the Internet. ----

It is a networking device that combines the functionality of several different networking devices in one.

10. What is the function of CSMA/CA on a wireless Ethernet network?

to prevent collisions -----

to broadcast messages

to select the least congested channel

to establish an ACK between devices

12. What is an advantage of purchasing a custom-built computer?

It is beneficial for less knowledgeable consumers.

The waiting period for assembly is negligible.

The cost is lower compared to a computer that has been preassembled.

The user can specify high-performance components to meet specific needs. -----

13. A home user is looking for an ISP connection that provides high speed digital transmission over regular phone lines. What ISP connection type should be used?

DSL ------ dial-up satellite cell modem cable modem 14. After attaching four PCs to the switch ports, configuring the SSID and setting authentication properties for a small office network, a technician successfully tests the connectivity of all PCs that are connected to the switch and WLAN. A firewall is then configured on the device prior to connecting it to the Internet. What type of network device includes all of the described features?

switch ISR router ------ firewall appliance standalone wireless access point

Page 5: Final Ccna1

15. What are two examples of peripheral output devices? (Choose two.)

barcode reader

digital camera

external DVD

headphones ----

printer -----

16. Which network design layer provides hosts with initial connectivity to the network?

Access ----

core

distribution

network

17

Refer to the exhibit. Assume that the command output is from a wireless DHCP client that is

connected to a Linksys integrated router. What can be deduced from the output?

The DHCP configuration on the router needs to be verified.

The WEP key or SSID needs to be verified.

The wireless connection is operational. ----

The wireless NIC driver or the NIC itself needs to be reinstalled.

18. Which portion of the packet does a router use to forward the packet to the destination?

source IP address

user data

destination IP address -----

control information

destination MAC address

Page 6: Final Ccna1

19

Refer to the exhibit. If H4 sends a message to H1 and the destination MAC address is in the

MAC table for both Switch1 and Switch2, which host devices will receive the message?

only H1 ------

hosts H1 and H4

all hosts that are connected to Switch1

all hosts that are connected to Switch1 and Switch2

20 What advantage does a peer-to-peer network have over a client-server network?

It increases security. It increases scalability. It produces a higher performance for hosts.

It eliminates the need for centralized administration.----- 21. When are leased lines typically used?

when low bandwidth is required

for home and small business connectivity

when a dedicated digital data line is necessary

as a less expensive option to cable and DSL modem service

22. Which IP address type is intended for a specific host?

broadcast

multicast

simulcast

unicast -----

Page 7: Final Ccna1

23. What is the default subnet mask for the IP address 128.107.23.10?

255.0.0.0 255.255.0.0 ------ 255.255.255.0 255.255.255.255 24. How do ISPs obtain public IP addresses?

They create the addresses themselves.

They obtain the addresses from the home PCs.

They obtain the addresses from the Internet registry. ------

They obtain the addresses from the RFC.

24. Which three addresses belong to the category of private IP addresses? (Choose three.)

10.0.0.1 ----

128.0.0.1

150.0.0.1

172.16.0.1 ----

192.168.31.19 -----

172.168.31.1

26. What is the purpose of pop-up blocker software?

It detects and removes spyware.

It detects and removes viruses.

It prevents the display of advertisement windows. -----

It removes unwanted e-mail. 27. Which wireless protocol is used for encryption?

EAP Open PSK WEP ------

28. Which service will translate private internal IP addresses into Internet routable public IP

addresses?

ARP

DHCP

DNS

NAT ----

29. Which type of network attack occurs when an unauthorized person tries to persuade a user to share

a network user ID and password?

brute force denial of service data manipulation social engineering -----

30. A network administrator is setting up an application filtering firewall. Company security policy states

that FTP sessions that are coming from the Internet and use the standard FTP port must be blocked.

Which TCP/UDP port must the administrator block on the firewall to be in compliance?

21 ---- 23 53 80

Page 8: Final Ccna1

31. How does a DMZ enhance network security for an organization?

blocks viruses and spyware

restricts internal user access to prohibited Internet sites

allows external customer access to designated internal resources -----

removes suspicious attachments from incoming and outgoing e-mail

32. Which statement is true about packet filtering?

It recognizes and filters specific types of attacks.

It permits access based on IP address. -----

It is performed from a host network device.

It translates an internal address or group of addresses into a public address that is sent across

the network.

33. Which picture shows a USB port on a PC?

-----

Page 9: Final Ccna1

34. Which adapter card would be required for a PC to exchange information with other PCs on a LAN?

NIC ---- video card sound card internal modem

35. What type of computer would most likely use a docking station?

laptop -----

server

desktop

mainframe

workstation

36. What two commands can be used to form a new binding if client information does not agree

with the DHCP client table? (Choose two.)

ipconfig /release -----

ipconfig /all

ipconfig /flushdns

ipconfig /renew -----

ipconfig

37. When would infrared be used to connect network devices?

when connecting multiple host devices to a wireless access point

when synchronizing a PC with a PDA that is in line of sight -----

when connecting a PC to a network switch that is located in another room

when updating two access points that are located in separate buildings

38

Page 10: Final Ccna1

Refer to the exhibit. What is a possible reason that the PC is unable to ping the default gateway

IP address?

The PC is on a different network than the default gateway.

A straight-through cable should be used to connect the switches.

A straight-through cable should be used to connect the PC to the switch. ------

Because the correct cable types are used for each segment, a bad cable could be the problem.

39. What is a weakness of WEP that is solved by WPA?

WEP is a proprietary standard whereas WPA is an open standard.

WEP keys are only 64 bits long whereas WPA keys are 128 bits long.

WEP uses the same key for every connection whereas WPA uses a different key for each

connection. -----

WEP uses a fixed length key for every connection whereas WPA uses a different key length

for each connection.

40. How does a crossover cable connect two routers?

It connects the pins that are used for receiving on one router to the pins that are used for

receiving on the other router.

It connects the pins that are used for transmitting on one router to the pins that are used for

receiving on the other router. ------

It disconnects the transmit pins and uses only the receive pins.

It uses the same pins for transmitting and receiving.

41

Page 11: Final Ccna1

Refer to the graphic. What is the purpose of assigning a Network Name of Academy?

It identifies the wireless LAN. -----

It translates IP addresses into easy-to-remember domain names.

It encrypts data between the wireless client and the access point.

It allows access to the AP configuration GUI by name rather than address.

It translates an internal address or group of addresses into an outside, public address.

42. A college network administrator is planning a wireless LAN to provide service in the student

lounge and outdoor patio. The requirements include a range of at least 80 meters and a speed of

30 Mb/s. Which wireless LAN standard meets these requirements?

802.11

802.11a

802.11b

802.11g ------

43. What is an advantage of selecting an operating system that has a GPL license over one with a commercial license?

The GPL license-based operating system ensures that everyone can participate in the enhancement of the product. ----

The GPL license-based operating system implements a structured development life cycle.

The GPL license-based operating system prevents modification of the source code.

The GPL license-based operating system provides structured support. 44. What is a characteristic of Bluetooth wireless technology?

It allows one-to-many connections.------

It operates in the 5GHz radio frequency band.

It is unable to penetrate walls with a useable signal.

It can be used for communications beyond 100 meters.

45. What destination IP address does a DHCP client use to send the initial DHCP Discover

packet when looking for a DHCP server?

127.0.0.1

224.0.0.1

Page 12: Final Ccna1

255.255.255.255 -----

the IP address of the default gateway

46. Which two causes of networking problems are related to the physical layer? (Choose two.)

damaged cables and connectors ---

incorrect addressing

incorrect subnet mask

overheated components ----

incorrect default gateway 47. What two pieces of information should a help desk technician document while troubleshooting connectivity issues with an end user? (Choose two.)

the CPU clock speed of the computer

the number of network jacks that are in the room

if the user can ping the default gateway address ----

if the word processing software is installed correctly

whether the PC uses dynamic or static IP addressing ----- 48. Which troubleshooting technique can be used to quickly restore user functionality without having to spend much time identifying the exact problem?

top-down bottom-up substitution ------ trial and error

49

Page 13: Final Ccna1

Refer to the exhibit. The wired and wireless hosts can connect to each other but not to the

Internet. All cabling and interface indicator lights appear to be in order. What is the most

effective next step in a bottom-up troubleshooting process?

Verify DNS configurations

Verify the default gateway configurations -----

Verify that the wireless settings are correct

Verify that wired and wireless components are on the same network.

50. In an attempt to verify connectivity, a user issues the ping command to a device that is not on the local network. The ping is unsuccessful. What can be determined from this result?

The default gateway is misconfigured.

The patch cable on the host station is faulty.

The router between the host and destination is faulty

. Further troubleshooting will be required to reach a definite conclusion. -----