CCNA Discovery 2 Chapter 2 V4.1 Answers

DsmbISP Chapter 2 - CCNA Discovery: Working at a Small-to-Medium Business or ISP (Version 4.1)

1. Which device is responsible for moving packets between multiple network segments?

router

switch

CSU/DSU

IDS device

 

2. Which two router parameters can be set from interface configuration mode? (Choose two.)

IP address

Telnet password

hostname

console password

subnet mask

enable secret password

CCNA Discovery 2 Chapter 1 V4.1 Answers

CCNA Discovery 2 Chapter 1 V4.1 Answers

1. Which network support services team identifies whether the client site has existing network hardware and circuits installed?

customer service

help desk

network operations

planning and provisioning

 

2. Which network utility helps determine the location of network problems and identifies routers that packets travel across?

ping

ipconfig

tracert

netstat

nslookup

CCNA Discovery 1 Final V4.0 Answers

CCNA Discovery 1 Final V4.0 Answers

DHomesb Final Exam - CCNA Discovery: Networking for Home and Small Businesses (Version 4.0)

1. What is a function of the distribution layer in the hierarchical design model?

to provide latency free switching

to organize end devices in small manageable groups

to provide connectivity using the high-speed backbone

to provide connectivity between smaller local networks

 

2. Under what circumstance would it be appropriate to use private IP addresses?

for communication between two ISPs

for a network that is directly connected to the Internet

for addresses that are used exclusively within an organization.

for a host with more than one direct connection to the Internet

CCNA Discovery 1 Chapter 9 V4.0 Answers

DHomesb Chapter 9 – CCNA Discovery: Networking for Home and Small Businesses (Version 4.0)

1. How does remote-access software help in the troubleshooting process?

Remote access uses a live chat feature.

Users have to be present so that they can view LEDs and change cables if necessary.

Diagnostics can be run without a technician being present at the site.

FAQs can be consulted more easily.

 

2.

Networking for Home and Small Businesses Chapter 9

Refer to the graphic. The wireless host cannot access the Internet, but the wired host can. What is the problem?

The host WEP key is incorrect.

The host IP address is incorrect.

The host subnet mask is incorrect.

The host default gateway is incorrect.

The integrated router internal IP address is incorrect.

The integrated router Internet IP address is incorrect.

CCNA Discovery 1 Chapter 8 V4.0 Answers

CCNA Discovery 1 Chapter 8 V4.0 Answers

DHomesb Chapter 8 – CCNA Discovery: Networking for Home and Small Businesses (Version 4.0)

1. A flood of packets with invalid source-IP addresses requests a connection on the network. The server busily tries to respond, resulting in valid requests being ignored. What type of attack occurred?

Trojan horse 

brute force 

ping of death 

SYN flooding

 

2. What environment would be best suited for a two-firewall network design?

a large corporate environment

a home environment with 10 or fewer hosts

a home environment that needs VPN access

a smaller, less congested business environment

CCNA Discovery 1 Chapter 7 V4.0 Answers

CCNA Discovery 1 Chapter 7 V4.0 Answers

DHomesb Chapter 7 – CCNA Discovery: Networking for Home and Small Businesses (Version 4.0)

1. What are two authentication methods that an access point could use? (Choose two.)

WEP

WPA

EAP

ASCII

pre-shared keys

 

2. What term describes the encoding of wireless data to prevent intercepted data from being read by a hacker?

address filtering

authentication

broadcasting

encryption

passphrase encoding 

CCNA Discovery 1 Chapter 6 V4.0 Answers

CCNA Discovery 1 Chapter 6 V4.0 Answers

DHomesb Chapter 6 – CCNA Discovery: Networking for Home and Small Businesses (Version 4.0)

1. Which port number is used by SMTP?

20

21

25

26

110

 

2. What three items are contained in an Ethernet header and trailer? (Choose three.)

source IP address

source MAC address

destination IP address

destination MAC address

error-checking information

CCNA Discovery 1 Chapter 5 V4.0 Answers

DHomesb Chapter 5 – CCNA Discovery: Networking for Home and Small Businesses (Version 4.0)

1. How large are IPv4 addresses?

8 bits

16 bits

32 bits

64 bits

128 bits

 

2.

CCNA Discovery 1 Chapter 5

Refer to the graphic. A user at the workstation cannot connect to the server. All cables have been tested and are working and all devices have IP addressing. However, the user cannot ping the server. What is causing the problem?

The router interface does not have a default gateway.

The switch does not have an IP address and default gateway.

The workstation and server are on different logical networks.

The workstation does not know the MAC address of the switch.

CCNA Discovery 1 Chapter 4 V4.0 Answers

CCNA Discovery 1 Chapter 4 V4.0 Answers

DHomesb Chapter 4 – CCNA Discovery: Networking for Home and Small Businesses (Version 4.0)

1. What are three commonly followed standards for constructing and installing cabling? (Choose three.)

pinouts

cable lengths

connector color

connector types

cost per meter (foot)

tensile strength of plastic insulator

 

2. Which two places are most appropriate to use UTP cabling? (Choose two.)

between buildings

in a home office network

where EMI is an issue

in a cable TV network

inside a school building

in a manufacturing environment with hundreds of electrical devices

CCNA Discovery 1 Chapter 3 V4.0 Answers

CCNA Discovery 1 Chapter 3 V4.0 Answers

DHomesb Chapter 3 – CCNA Discovery: Networking for Home and Small Businesses (Version 4.0)

1. Host A needs to learn the MAC address of Host B, which is on the same LAN segment. A message has been sent to all the hosts on the segment asking for the MAC address of Host B. Host B responds with its MAC address and all other hosts disregard the request. What protocol was used in this scenario?

ARP

DHCP

DNS

WINS

 

2. Which two statements concerning networking standards are true? (Choose two.)

adds complexity to networks

encourages vendors to create proprietary protocols

provides consistent interconnections across networks

ensures that communications work best in a single-vendor environment

simplifies new product development