CCNA Final Exam

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Which two values represent the network number and default mask for the address 209.165.200.225? (Choose two.) 209.0.0.0 209.165.0.0 209.165.200.0 255.0.0.0 255.255.0.0 255.255.255.0

209.165.200.0 255.255.255.0

What is the default subnet mask for an IP address of 64.100.19.14? 255.0.0.0 255.255.0.0 255.255.255.0 255.255.255.255

255.0.0.0

A college network administrator is planning a wireless LAN to provide service in the student lounge and outdoor patio. The requirements include a range of at least 80 meters and a speed of 30 Mb/s. Which wireless LAN standard meets these requirements? 802.11 802.11a 802.11b 802.11g

802.11g

Which statement is true concerning stateful packet inspection? Access is permitted based on IP addresses of the source and destination devices. Access is permitted based on the MAC addresses of the source and destination devices. Access is permitted only if the type of application that is attempting to reach the internal host is allowed. Access is permitted only if it is a legitimate response to a request from an internal host.

Access is permitted only if it is a legitimate response to a request from an internal host.

What must be identical on all devices in a WLAN for successful wireless communication between the devices? SSID antenna type network mode wireless NIC driver

SSID

Which transport layer protocol is used when an application requires acknowledgment that data has been delivered? FTP TCP UDP RTP SMTP

TCP

Which three statements describe an IP address? (Choose three.) An IP address is known as a logical address. An IP address uses a 30-bit addressing scheme. An IP address is found in the Layer 2 header during transmission. The network portion of an IP address is burned into a network interface card. An IP address is unique within the same local network. The network portion of an IP address will be the same for all hosts that are connected to the same local network.

An IP address is found in the Layer 2 header during transmission. An IP address is unique within the same local network. The network portion of an IP address will be the same for all hosts that are connected to the same local network.

TCP/IP data transmission between the source and destination host is de-encapsulated in four steps: A. The TCP header is removed B. Bits are decoded and the destination MAC address is recognized. C. The IP header is removed and the contents are passed to the next layer. D. The Ethernet header and trailer are removed. What is the correct sequence of these steps? A, B, C, D A, C, B, D B, C, D, A B, D, C, A C, A, B, D

B, D, C, A

A network administrator wishes to deploy a small network without using static IP addresses on employee workstations. However, all employees need Internet access. Which two of these services must be configured to meet network requirements? (Choose two.) FTP DHCP HTTPS NAT HTTP

DHCP NAT

What is a major characteristic of asymmetric Internet service? Download speeds and upload speeds are equal Download speeds are faster than upload speeds Data traffic speeds are faster than voice traffic speeds Used when consistently uploading large amounts of graphics, video and multimedia traffic

Download speeds are faster than upload speeds.

After attaching four PCs to the switch ports, configuring the SSID and setting authentication properties for a small office network, a technician successfully tests the connectivity of all PCs that are connected to the switch and WLAN. A firewall is then configured on the device prior to connecting it to the Internet. What type of network device includes all of the described features? switch ISR router firewall appliance standalone wireless access point

ISR router

Which protocol is used to transfer files among network devices and perform file-management functions? DNS FTP HTML HTTP

FTP

Which protocol is used by a client to browse the web server? FTP HTTP POP SMTP

HTTP

What is an ISP? It is a standards body that develops cabling and wiring standards for networking. It is a protocol that establishes how computers within a local network communicate. It is an organization that enables individuals and businesses to connect to the Internet. It is a networking device that combines the functionality of several different networking devices in one.

It is an organization that enables individuals and businesses to connect to the Internet.

What is the purpose of pop-up blocker software? It detects and removes spyware. It detects and removes viruses. It prevents the display of advertisement windows. It removes unwanted e-mail.

It prevents the display of advertisement windows.

A user in a small office is unable to connect to the Internet. The user examines the physical connections to the ISR, a Linksys WRT300N, and notices a solid green LED on the port that is wired to the computer. What does the LED indicate about the current state of the port? The ISR is making adjustments to the port. The device is plugged in and traffic is flowing. The computer is plugged in but no traffic is flowing. The ISR does not detect that the computer is plugged in.

The computer is plugged in but no traffic is flowing.

What is an advantage of purchasing a custom-built computer? It is beneficial for less knowledgeable consumers. The waiting period for assembly is negligible. The cost is lower compared to a computer that has been preassembled. The user can specify high-performance components to meet specific needs.

The user can specify high-performance components to meet specific needs.

Which wireless protocol is used for encryption? EAP Open PSK WEP

WEP

What describes the external IP address that is obtained by a router through a cable or DSL modem? a public address that is obtained from ICANN a private address that is manually configured by the administrator a public address that is obtained through DHCP from the ISP a private address that converts to a public address on the internal LAN

a public address that is obtained through DHCP from the ISP

All hosts within a domain receive the same frame that originates from one of the devices. The domain is also bounded by routers. What type of domain is this? broadcast collision local multicast

broadcast

Identify two causes of physical layer network problems. (Choose two.) logical addressing issues improperly terminated cables cables plugged into wrong ports incorrect MAC address assigned packets received out of sequence incorrect subnet mask on an interface

cables plugged into wrong ports incorrect MAC address assigned

Which type of network supports DHCP and DNS services for network users in a network domain? client/server peer-to-peer hierarchical ad hoc

client/server

For the second time in a week, workstations on a LAN are not able to log into the server. The technician fixed the problem the first time, but cannot remember the steps taken to solve it. What aspect of the troubleshooting process has the technician neglected? identifying the problem asking end-users questions documenting the troubleshooting process using structured techniques to solve a problem

documenting the troubleshooting process

What is specified by the host bits in an IP address? broadcast identity of the network identity of the computer on the network network that is being addressed network to which the host belongs

identity of the computer on the network

Which type of computer has an integrated mouse? desktop laptop mainframe server pocket PC

laptop

What does the term "attenuation" mean in data communication? loss of signal strength as distance increases time for a signal to reach its destination leakage of signals from one cable pair to another strengthening of a signal by a networking device

loss of signal strength as distance increases

What type of message is sent to a specific group of hosts? static unicast dynamic multicast broadcast

multicast

What is true about a wireless access point that is equipped with an omnidirectional antenna? concentrates signal in one direction typically used in bridging applications radiates the signal equally in all directions provides the greatest transmission distance of all antenna types that are used by APs

radiates the signal equally in all directions

What type of cable would be required to connect a Linksys router to a wired PC? crossover cable rollover cable serial cable straight-through cable

serial cable

What is the function of a physical topology map? records IP addressing of each host records hostnames and applications organizes groups of hosts by how they use the network shows where wiring is installed and the locations of network devices

shows where wiring is installed and the locations of network devices

What is the function of CSMA/CA on a wireless Ethernet network? to prevent collisions to broadcast messages to select the least congested channel to establish an ACK between devices

to prevent collisions

When are leased lines typically used? when low bandwidth is required for home and small business connectivity when a dedicated digital data line is necessary as a less expensive option to cable and DSL modem service

when a dedicated digital data line is necessary

Which device is often configured to act as both a DHCP client and a DHCP server? home PC ISP modem wireless-enabled laptop integrated services router

wireless-enabled laptop


संबंधित स्टडी सेट्स

Cardiovascular Adaptations to Endurance Training L.O.

View Set

BUS 204 Ch. 23: Real and Personal Property

View Set

CH 50 Assessment and Management of Patients with Biliary Disorders (E3)

View Set

interactive review questions for RNs- thermoregulation

View Set

100 Security Plus Questions (104-204)

View Set

Study Unit 6- Adjustments and Deductions

View Set

международные организации

View Set