Quantcast
Channel: HeiseR Dev Zone » Cisco Associate
Viewing all articles
Browse latest Browse all 20

CCNA 1 v5.0 Final Exam 2 Answers 2014

$
0
0

Your school network blocks all websites related to online gaming. What type of security policy is being applied?

acceptable use

What are two examples of storage peripheral devices?

flash drive
external DVD

What layer is the first point of entry for a host into the network?

access layer

Which part of the electromagnetic spectrum is commonly used to exchange data between a PDA and a computer?

infrared

The area covered by a single AP is known as what?

basic service set

When acting as a DHCP server, an integrated router can provide what three types of information to a client?

default gateway
dynamic IP address
DNS server address

Refer to the graphic. Assume that the exhibited output is from a host that is connected to a Linksys integrated router. What is one of the first things you should check?

link status LED on the front of the router

A host sent a message that all other hosts on the switched local network received and processed. What type of domain are all these hosts a part of?

broadcast domain

Refer to the exhibit. A user on host A sends an e-mail to the user on host B. Which type of message does host A send?

unicast

Which type of computer uses an integrated monitor and keyboard?

laptop

Refer to the exhibit. What cabling fault does the exhibit represent?

split pair

What is the purpose of the ipconfig /release command?

It forces a client to give up its current IP address.

What is the function of the DNS server?

It translates a computer or domain name to the associated IP address.

Which part of a data packet is used by a router to determine the destination network?

destination IP address

A network engineer wants to represent confidential data in binary format.

What are the two possible values that the engineer can use? (Choose two.)

0
1

What is the purpose of spam filter software?

It examines incoming e-mail messages to identify the unsolicited ones.

A user is unable to send e-mail. While troubleshooting this problem, the network technician first verifies the physical connectivity of cables. Which troubleshooting approach is being followed?

bottom-up

Which two causes of networking problems are related to the physical layer? (Choose two.)

disconnected cables
improper operation of cooling fans

What is an advantage of selecting an operating system that has a commercial license over one with a GPL license?

The commercial license-based operating system provides structured support.

Refer to the exhibit. What is the purpose of assigning a network name of College?

It identifies the wireless LAN.

Refer to the exhibit. What is the effect of setting the security mode to WEP on the Linksys integrated router?

The WEP security mode encrypts network traffic during transmission between the AP and the wireless client.

A network technician is required to provide access to the Internet for a large company. What is needed to accomplish this task?

ISP

Refer to the exhibit. Assume that the command output is from a wireless DHCP client that is connected to a Linksys integrated router. What can be deduced from the output?

The wireless connection is operational.

What is specified by the host bits in an IP address?

identity of the computer on the network

What is the default subnet mask for an IP address of 64.100.19.14?

255.0.0.0

Which two transport layer protocols enable hosts to communicate and transfer data? (Choose two.)

TCP
UDP

A learner wants to interact with the operating system of a computer.

Which two methods can be used for this? (Choose two.)

CLI
GUI

Which installation option enables a single physical resource to function simultaneously as multiple logical resources?

upgrade

Which two statements are true about local applications? (Choose two.)

They are stored on the local hard disk.
They run on the computer where they are installed.

For an IP address, what component decides the number of bits that is used to represent the host ID?

network number

What type of cable would be required to connect a Linksys router to a wired PC?

straight-through cable

Refer to the exhibit. If H4 sends a message to H1 and the destination MAC address is in the MAC table for both Switch1 and Switch2, which host devices will receive the message?

only H1

Because of an increasing number of users, bandwidth per user on a WLAN has decreased to a point where users are complaining about poor performance. What can be done to improve the user experience?

Reduce the number of devices using each channel.

What are two best practices that are used when configuring a small home WLAN? (Choose two.)

the use of pre-shared keys
the disabling of SSID broadcasting

Which protocol in its default configuration downloads e-mail messages to the client computer and deletes them from the server?

POP3

What is the purpose of creating a DMZ during network firewall implementation?

to allow for a publicly accessible zone without compromising the internal network

Which of the following are the address ranges of the private IP addresses? (Choose three.)

10.0.0.0 to 10.255.255.255
172.16.0.0 to 172.31.255.255
192.168.0.0 to 192.168.255.255

What does the term “attenuation” mean in data communication?

loss of signal strength as distance increases

What advantage does a peer-to-peer network have over a client-server network?

It eliminates the need for centralized administration.

In an attempt to verify connectivity, a user issues the ping command to a device that is not on the local network. The ping is unsuccessful. What can be determined from this result?

The router between the host and destination is faulty.

A company has a web server that must be accessible to both external and internal clients. Which security policy best practice should be followed to maximize security of the server?

Place the web server in a DMZ.

The help desk at a large packaging company receives a call from a user who is concerned about lost data files on the local PC. The help desk technician learns that the user clicked on an icon that appeared to be a program update, but no updates were scheduled for that program. What type of attack has likely occurred?

Trojan horse

Where do ISPs get the public addresses that they assign to end users?

ISPs obtain address blocks from registry organizations.
Which transport layer protocol is used when an application requires acknowledgment that data has been delivered?

TCP

What type of message is sent to a specific group of hosts?

multicast

A network administrator has been notified that users have experienced problems gaining access to network resources. What utility could be used to directly query a name server for information on a destination domain?

nslookup

What is the function of CSMA/CA on a wireless Ethernet network?

to prevent collisions

Refer to the exhibit. Why would a network administrator use the network mode that is shown?

to support hosts that use different 802.11 standards

When terminating UTP cabling, why is it important to untwist only a small amount of each wire pair?

minimizes crosstalk

A network technician suspects that malware on a user PC is opening multiple TCP connections to a specific foreign host address. Which Windows command line utility can be used to confirm the multiple TCP connections?

netstat
What are two examples of storage peripheral devices? (Choose two.)

flash drive
external DVD
When acting as a DHCP server, an integrated router can provide what three types of information to a client? (Choose three.)

default gateway
dynamic IP address
DNS server address

The post CCNA 1 v5.0 Final Exam 2 Answers 2014 appeared first on HeiseR Dev Zone.


Viewing all articles
Browse latest Browse all 20

Latest Images

Trending Articles





Latest Images