CCNA Discovery 2 Chapter 6 V4.1 Answers

CCNA Discovery 2 Chapter 6 V4.1 Answers

DsmbISP Chapter 6 – CCNA Discovery: Working at a Small-to-Medium Business or ISP (Version 4.1)

1. Which protocol is an exterior routing protocol?

BGP

EIGRP

OSPF

RIP

 

2. Which command would a network administrator use to determine if the routers in an enterprise have learned about a newly added network?

router# show ip address

router# show ip route

router# show ip networks

router# show ip interface brief

router# debug ip protocol

router# debug rip update

CCNA Discovery 2 Chapter 5 V4.1 Answers

CCNA Discovery 2 Chapter 5 V4.1 Answers

DsmbISP Chapter 5 – CCNA Discovery: Working at a Small-to-Medium Business or ISP (Version 4.1)

1. Which tasks can be accomplished by using the command history feature? (Choose two.)

View a list of commands entered in a previous session.

Recall up to 15 command lines by default.

Set the command history buffer size.

Recall previously entered commands.

Save command lines in a log file for future reference.

 

2. Which command turns on a router interface?

Router(config-if)# enable

Router(config-if)# no down

Router(config-if)# s0 active

Router(config-if)# interface up

Router(config-if)# no shutdown

CCNA Discovery 2 Chapter 4 V4.1 Answers

CCNA Discovery 2 Chapter 4 V4.1 Answers

DsmbISP Chapter 4 – CCNA Discovery: Working at a Small-to-Medium Business or ISP (Version 4.1)

1. Which two statements describe classful IP addresses? (Choose two.)

It is possible to determine which class an address belongs to by reading the first bit.

The number of bits used to identify the hosts is fixed by the class of the network.

Only Class A addresses can be represented by high-order bits 100.

Up to 24 bits can make up the host portion of a Class C address.

Up to 24 bits can be used to identify unique networks.

Three of the five classes of addresses are reserved for multicasts and experimental use.

 

2. IPv6 increases the IP address size from 32 bits to how many bits?

64

96

128

192

256

512

CCNA Discovery 2 Chapter 3 V4.1 Answers

CCNA Discovery 2 Chapter 3 V4.1 Answers

DsmbISP Chapter 3 – CCNA Discovery: Working at a Small-to-Medium Business or ISP (Version 4.1)

1. Which type of cable has a solid copper core with several protective layers including PVC, braided wire shielding, and a plastic covering?

STP

UTP

coaxial

fiber optic

 

2. What is the benefit for a company to use an ISR router?

An ISR provides the functionality of a switch, router, and firewall in one device.

ISRs use a PC operating system for routing traffic, thus simplifying configuration and management.

An ISR is immune to security attacks by hackers and so replaces all other network security measures.

ISRs make routing decisions at OSI Layer 7, thus providing more intelligence to the network than do other routers.

CCNA Discovery 2 Chapter 2 V4.1 Answers

DsmbISP Chapter 2 - CCNA Discovery: Working at a Small-to-Medium Business or ISP (Version 4.1)

1. Which device is responsible for moving packets between multiple network segments?

router

switch

CSU/DSU

IDS device

 

2. Which two router parameters can be set from interface configuration mode? (Choose two.)

IP address

Telnet password

hostname

console password

subnet mask

enable secret password

CCNA Discovery 2 Chapter 1 V4.1 Answers

CCNA Discovery 2 Chapter 1 V4.1 Answers

1. Which network support services team identifies whether the client site has existing network hardware and circuits installed?

customer service

help desk

network operations

planning and provisioning

 

2. Which network utility helps determine the location of network problems and identifies routers that packets travel across?

ping

ipconfig

tracert

netstat

nslookup

CCNA Discovery 1 Final V4.0 Answers

CCNA Discovery 1 Final V4.0 Answers

DHomesb Final Exam - CCNA Discovery: Networking for Home and Small Businesses (Version 4.0)

1. What is a function of the distribution layer in the hierarchical design model?

to provide latency free switching

to organize end devices in small manageable groups

to provide connectivity using the high-speed backbone

to provide connectivity between smaller local networks

 

2. Under what circumstance would it be appropriate to use private IP addresses?

for communication between two ISPs

for a network that is directly connected to the Internet

for addresses that are used exclusively within an organization.

for a host with more than one direct connection to the Internet

CCNA Discovery 1 Chapter 9 V4.0 Answers

DHomesb Chapter 9 – CCNA Discovery: Networking for Home and Small Businesses (Version 4.0)

1. How does remote-access software help in the troubleshooting process?

Remote access uses a live chat feature.

Users have to be present so that they can view LEDs and change cables if necessary.

Diagnostics can be run without a technician being present at the site.

FAQs can be consulted more easily.

 

2.

Networking for Home and Small Businesses Chapter 9

Refer to the graphic. The wireless host cannot access the Internet, but the wired host can. What is the problem?

The host WEP key is incorrect.

The host IP address is incorrect.

The host subnet mask is incorrect.

The host default gateway is incorrect.

The integrated router internal IP address is incorrect.

The integrated router Internet IP address is incorrect.

CCNA Discovery 1 Chapter 8 V4.0 Answers

CCNA Discovery 1 Chapter 8 V4.0 Answers

DHomesb Chapter 8 – CCNA Discovery: Networking for Home and Small Businesses (Version 4.0)

1. A flood of packets with invalid source-IP addresses requests a connection on the network. The server busily tries to respond, resulting in valid requests being ignored. What type of attack occurred?

Trojan horse 

brute force 

ping of death 

SYN flooding

 

2. What environment would be best suited for a two-firewall network design?

a large corporate environment

a home environment with 10 or fewer hosts

a home environment that needs VPN access

a smaller, less congested business environment

CCNA Discovery 1 Chapter 7 V4.0 Answers

CCNA Discovery 1 Chapter 7 V4.0 Answers

DHomesb Chapter 7 – CCNA Discovery: Networking for Home and Small Businesses (Version 4.0)

1. What are two authentication methods that an access point could use? (Choose two.)

WEP

WPA

EAP

ASCII

pre-shared keys

 

2. What term describes the encoding of wireless data to prevent intercepted data from being read by a hacker?

address filtering

authentication

broadcasting

encryption

passphrase encoding