CCNA Final Exam
Which two values represent the network number and default mask for the address 209.165.200.225? (Choose two.) 209.0.0.0 209.165.0.0 209.165.200.0 255.0.0.0 255.255.0.0 255.255.255.0
209.165.200.0 255.255.255.0
What is the default subnet mask for an IP address of 64.100.19.14? 255.0.0.0 255.255.0.0 255.255.255.0 255.255.255.255
255.0.0.0
A college network administrator is planning a wireless LAN to provide service in the student lounge and outdoor patio. The requirements include a range of at least 80 meters and a speed of 30 Mb/s. Which wireless LAN standard meets these requirements? 802.11 802.11a 802.11b 802.11g
802.11g
Which statement is true concerning stateful packet inspection? Access is permitted based on IP addresses of the source and destination devices. Access is permitted based on the MAC addresses of the source and destination devices. Access is permitted only if the type of application that is attempting to reach the internal host is allowed. Access is permitted only if it is a legitimate response to a request from an internal host.
Access is permitted only if it is a legitimate response to a request from an internal host.
What must be identical on all devices in a WLAN for successful wireless communication between the devices? SSID antenna type network mode wireless NIC driver
SSID
Which transport layer protocol is used when an application requires acknowledgment that data has been delivered? FTP TCP UDP RTP SMTP
TCP
Which three statements describe an IP address? (Choose three.) An IP address is known as a logical address. An IP address uses a 30-bit addressing scheme. An IP address is found in the Layer 2 header during transmission. The network portion of an IP address is burned into a network interface card. An IP address is unique within the same local network. The network portion of an IP address will be the same for all hosts that are connected to the same local network.
An IP address is found in the Layer 2 header during transmission. An IP address is unique within the same local network. The network portion of an IP address will be the same for all hosts that are connected to the same local network.
TCP/IP data transmission between the source and destination host is de-encapsulated in four steps: A. The TCP header is removed B. Bits are decoded and the destination MAC address is recognized. C. The IP header is removed and the contents are passed to the next layer. D. The Ethernet header and trailer are removed. What is the correct sequence of these steps? A, B, C, D A, C, B, D B, C, D, A B, D, C, A C, A, B, D
B, D, C, A
A network administrator wishes to deploy a small network without using static IP addresses on employee workstations. However, all employees need Internet access. Which two of these services must be configured to meet network requirements? (Choose two.) FTP DHCP HTTPS NAT HTTP
DHCP NAT
What is a major characteristic of asymmetric Internet service? Download speeds and upload speeds are equal Download speeds are faster than upload speeds Data traffic speeds are faster than voice traffic speeds Used when consistently uploading large amounts of graphics, video and multimedia traffic
Download speeds are faster than upload speeds.
After attaching four PCs to the switch ports, configuring the SSID and setting authentication properties for a small office network, a technician successfully tests the connectivity of all PCs that are connected to the switch and WLAN. A firewall is then configured on the device prior to connecting it to the Internet. What type of network device includes all of the described features? switch ISR router firewall appliance standalone wireless access point
ISR router
Which protocol is used to transfer files among network devices and perform file-management functions? DNS FTP HTML HTTP
FTP
Which protocol is used by a client to browse the web server? FTP HTTP POP SMTP
HTTP
What is an ISP? It is a standards body that develops cabling and wiring standards for networking. It is a protocol that establishes how computers within a local network communicate. It is an organization that enables individuals and businesses to connect to the Internet. It is a networking device that combines the functionality of several different networking devices in one.
It is an organization that enables individuals and businesses to connect to the Internet.
What is the purpose of pop-up blocker software? It detects and removes spyware. It detects and removes viruses. It prevents the display of advertisement windows. It removes unwanted e-mail.
It prevents the display of advertisement windows.
A user in a small office is unable to connect to the Internet. The user examines the physical connections to the ISR, a Linksys WRT300N, and notices a solid green LED on the port that is wired to the computer. What does the LED indicate about the current state of the port? The ISR is making adjustments to the port. The device is plugged in and traffic is flowing. The computer is plugged in but no traffic is flowing. The ISR does not detect that the computer is plugged in.
The computer is plugged in but no traffic is flowing.
What is an advantage of purchasing a custom-built computer? It is beneficial for less knowledgeable consumers. The waiting period for assembly is negligible. The cost is lower compared to a computer that has been preassembled. The user can specify high-performance components to meet specific needs.
The user can specify high-performance components to meet specific needs.
Which wireless protocol is used for encryption? EAP Open PSK WEP
WEP
What describes the external IP address that is obtained by a router through a cable or DSL modem? a public address that is obtained from ICANN a private address that is manually configured by the administrator a public address that is obtained through DHCP from the ISP a private address that converts to a public address on the internal LAN
a public address that is obtained through DHCP from the ISP
All hosts within a domain receive the same frame that originates from one of the devices. The domain is also bounded by routers. What type of domain is this? broadcast collision local multicast
broadcast
Identify two causes of physical layer network problems. (Choose two.) logical addressing issues improperly terminated cables cables plugged into wrong ports incorrect MAC address assigned packets received out of sequence incorrect subnet mask on an interface
cables plugged into wrong ports incorrect MAC address assigned
Which type of network supports DHCP and DNS services for network users in a network domain? client/server peer-to-peer hierarchical ad hoc
client/server
For the second time in a week, workstations on a LAN are not able to log into the server. The technician fixed the problem the first time, but cannot remember the steps taken to solve it. What aspect of the troubleshooting process has the technician neglected? identifying the problem asking end-users questions documenting the troubleshooting process using structured techniques to solve a problem
documenting the troubleshooting process
What is specified by the host bits in an IP address? broadcast identity of the network identity of the computer on the network network that is being addressed network to which the host belongs
identity of the computer on the network
Which type of computer has an integrated mouse? desktop laptop mainframe server pocket PC
laptop
What does the term "attenuation" mean in data communication? loss of signal strength as distance increases time for a signal to reach its destination leakage of signals from one cable pair to another strengthening of a signal by a networking device
loss of signal strength as distance increases
What type of message is sent to a specific group of hosts? static unicast dynamic multicast broadcast
multicast
What is true about a wireless access point that is equipped with an omnidirectional antenna? concentrates signal in one direction typically used in bridging applications radiates the signal equally in all directions provides the greatest transmission distance of all antenna types that are used by APs
radiates the signal equally in all directions
What type of cable would be required to connect a Linksys router to a wired PC? crossover cable rollover cable serial cable straight-through cable
serial cable
What is the function of a physical topology map? records IP addressing of each host records hostnames and applications organizes groups of hosts by how they use the network shows where wiring is installed and the locations of network devices
shows where wiring is installed and the locations of network devices
What is the function of CSMA/CA on a wireless Ethernet network? to prevent collisions to broadcast messages to select the least congested channel to establish an ACK between devices
to prevent collisions
When are leased lines typically used? when low bandwidth is required for home and small business connectivity when a dedicated digital data line is necessary as a less expensive option to cable and DSL modem service
when a dedicated digital data line is necessary
Which device is often configured to act as both a DHCP client and a DHCP server? home PC ISP modem wireless-enabled laptop integrated services router
wireless-enabled laptop