CCNA Discovery 1

CCNA Discovery 1 Final V4.0 Answers

CCNA Discovery 1 Final V4.0 Answers

DHomesb Final Exam - CCNA Discovery: Networking for Home and Small Businesses (Version 4.0)

1. What is a function of the distribution layer in the hierarchical design model?

to provide latency free switching

to organize end devices in small manageable groups

to provide connectivity using the high-speed backbone

to provide connectivity between smaller local networks

 

2. Under what circumstance would it be appropriate to use private IP addresses?

for communication between two ISPs

for a network that is directly connected to the Internet

for addresses that are used exclusively within an organization.

for a host with more than one direct connection to the Internet

CCNA Discovery 1 Chapter 9 V4.0 Answers

DHomesb Chapter 9 – CCNA Discovery: Networking for Home and Small Businesses (Version 4.0)

1. How does remote-access software help in the troubleshooting process?

Remote access uses a live chat feature.

Users have to be present so that they can view LEDs and change cables if necessary.

Diagnostics can be run without a technician being present at the site.

FAQs can be consulted more easily.

 

2.

Networking for Home and Small Businesses Chapter 9

Refer to the graphic. The wireless host cannot access the Internet, but the wired host can. What is the problem?

The host WEP key is incorrect.

The host IP address is incorrect.

The host subnet mask is incorrect.

The host default gateway is incorrect.

The integrated router internal IP address is incorrect.

The integrated router Internet IP address is incorrect.

CCNA Discovery 1 Chapter 8 V4.0 Answers

CCNA Discovery 1 Chapter 8 V4.0 Answers

DHomesb Chapter 8 – CCNA Discovery: Networking for Home and Small Businesses (Version 4.0)

1. A flood of packets with invalid source-IP addresses requests a connection on the network. The server busily tries to respond, resulting in valid requests being ignored. What type of attack occurred?

Trojan horse 

brute force 

ping of death 

SYN flooding

 

2. What environment would be best suited for a two-firewall network design?

a large corporate environment

a home environment with 10 or fewer hosts

a home environment that needs VPN access

a smaller, less congested business environment

CCNA Discovery 1 Chapter 7 V4.0 Answers

CCNA Discovery 1 Chapter 7 V4.0 Answers

DHomesb Chapter 7 – CCNA Discovery: Networking for Home and Small Businesses (Version 4.0)

1. What are two authentication methods that an access point could use? (Choose two.)

WEP

WPA

EAP

ASCII

pre-shared keys

 

2. What term describes the encoding of wireless data to prevent intercepted data from being read by a hacker?

address filtering

authentication

broadcasting

encryption

passphrase encoding 

CCNA Discovery 1 Chapter 5 V4.0 Answers

DHomesb Chapter 5 – CCNA Discovery: Networking for Home and Small Businesses (Version 4.0)

1. How large are IPv4 addresses?

8 bits

16 bits

32 bits

64 bits

128 bits

 

2.

CCNA Discovery 1 Chapter 5

Refer to the graphic. A user at the workstation cannot connect to the server. All cables have been tested and are working and all devices have IP addressing. However, the user cannot ping the server. What is causing the problem?

The router interface does not have a default gateway.

The switch does not have an IP address and default gateway.

The workstation and server are on different logical networks.

The workstation does not know the MAC address of the switch.

CCNA Discovery 1 Chapter 4 V4.0 Answers

CCNA Discovery 1 Chapter 4 V4.0 Answers

DHomesb Chapter 4 – CCNA Discovery: Networking for Home and Small Businesses (Version 4.0)

1. What are three commonly followed standards for constructing and installing cabling? (Choose three.)

pinouts

cable lengths

connector color

connector types

cost per meter (foot)

tensile strength of plastic insulator

 

2. Which two places are most appropriate to use UTP cabling? (Choose two.)

between buildings

in a home office network

where EMI is an issue

in a cable TV network

inside a school building

in a manufacturing environment with hundreds of electrical devices

CCNA Discovery 1 Chapter 3 V4.0 Answers

CCNA Discovery 1 Chapter 3 V4.0 Answers

DHomesb Chapter 3 – CCNA Discovery: Networking for Home and Small Businesses (Version 4.0)

1. Host A needs to learn the MAC address of Host B, which is on the same LAN segment. A message has been sent to all the hosts on the segment asking for the MAC address of Host B. Host B responds with its MAC address and all other hosts disregard the request. What protocol was used in this scenario?

ARP

DHCP

DNS

WINS

 

2. Which two statements concerning networking standards are true? (Choose two.)

adds complexity to networks

encourages vendors to create proprietary protocols

provides consistent interconnections across networks

ensures that communications work best in a single-vendor environment

simplifies new product development

CCNA Discovery 1 Chapter 2 V4.0 Answers

DHomesb Chapter 2 – CCNA Discovery: Networking for Home and Small Businesses (Version 4.0)

1. A computer in the Advanced Technology Center computer room on the second floor, room number 217, has the computer name ATC_217_7. What fact is true about the computer name?

The name is dynamically assigned by the DNS server.

The name is required to allow connectivity to the DHCP server.

The name must include the floor number to support the SLA agreement.

The names of all devices in a workgroup must be the same to allow LAN connectivity.

The name makes it easier for users to reference the device when connecting to it to share resources.

 

2. Which three pieces of information must be specified on a computer to allow that computer to send and receive information across networks? (Choose three.)

IP address

subnet mask

closest server

default gateway

operating system

network card manufacturer

CCNA Discovery 1 Chapter 1 V4.0 Answers

DHomesb Chapter 1 - CCNA Discovery: Networking for Home and Small Businesses (Version 4.0)

1. Administrators at a multicampus college need access to their schedules wherever the administrators go. Which computing device would be the most appropriate?

PDA

laptop

desktop

mainframe

gaming device

 

2. Which component is designed to remove high-voltage spikes and surges from a power line so that they do not damage a computer system?

CPU

surge suppressor

motherboard

hard drive