Saturday, July 23, 2011

Cisco Discovery Exam - V.4 in english

1.Which protocol is used to transfer files among network devices and perform file-management functions?
FTP
2.What is the function of the DNS server?
It maps a hostname to a corresponding IP address
3.A computer joins the network and announces itself to all hosts on the LAN. What type of message does the computer send out?
broadcast
4.As an assignment, a computer science student needs to present data in binary format. What are the two possible values that the student can use? (Choose two.)
0 and 1

5.What type of message is sent to a specific group of hosts?
multicast
6.Which term is associated with logical addressing?
IP addresses
7.What destination IP address is used in a unicast packet?
a specific host
8.Which value would be considered the physical address for data that is sent across an Ethernet segment?
MAC address
9.Refer to the exhibit. Which option correctly represents the encapsulation of a packet that is sent by Host1 to the web server?
00-07-E9-34-AC-28… 00-07-E9-53-DE-53… 172.16.1.1
10.What are two examples of peripheral output devices? (Choose two.)
external DVD and headphones
11.What does the term “attenuation” mean in data communication?
loss of signal strength as distance increases
12.Which network design layer provides a connection point for end user devices to the network?
access
13.Which two statements are true about local applications? (Choose two.)
They are stored on the local hard disk.  and They run on the computer where they are installed.
14.Which portion of the packet does a router use to forward the packet to the destination?
destination IP address
15.Refer to the exhibit. H1 can ping H2, H3, and the Fa0/0 interface of router R1. H2 and H3 but not H1 can ping H4 and H5. What is a possible cause for the H1 failure?
Host H1 does not have a default gateway configured.
16.Refer to the exhibit. If H4 sends a message to H1 and the destination MAC address is in the MAC table for both Switch1 and Switch2, which host devices will receive the message?
only H1
17.Refer to the exhibit. Which statement is true based on the information that is shown in the exhibit?
All wireless devices that are connected to this AP must have an assigned SSID of College.
18.Refer to the exhibit. A home network is configured with the information in the graphic. A user tries to manually create a new connection to the network using the SSID Ciscoclass. However, a connection cannot be made. What could be the problem?
The SSID is case-sensitive.
19.Refer to the exhibit. Assume that the command output is from a wireless DHCP client that is connected to a Linksys integrated router. What can be deduced from the output?
The wireless connection is operational.
20.What will be one result of using a wireless infrastructure when designing the communications infrastructure for a new building?
Wireless devices will be easy to add or relocate.
21.What is specified by the network number in an IP address?
the network to which the host belongs
22.Refer to the exhibit. Given the use of default masks, which network will router R1 use as the destination network for communications from PC1 to PC2?
192.135.14.0
23.Which two values represent the network number and default mask for the address 209.165.200.225? (Choose two.)
209.165.200.0 and 255.255.255.0
24.Which three address ranges can be used to depict private IP addresses? (Choose three.)
10.0.0.0 to 10.0.0.255 and 172.16.1.0 to 172.16.1.255 and 192.168.22.0 to 192.168.22.255
25.Under what circumstance would it be appropriate to use private IP addresses?
for addresses that are used exclusively within an organization.
26. Which part of the electromagnetic spectrum is commonly used to exchange data between a PDA and a computer?
infrared
27.Refer to the exhibit. The security policy of an organization allows employees to connect to the office intranet from their homes. Which type of security policy is this?
remote access
28.What wireless technology has the ability to communicate with many devices at the same time, makes use of the 2.4 GHz band, and is limited to low-speed, short-range communications?
Bluetooth
29.Which type of network attack occurs when an unauthorized person tries to persuade a user to share a network user ID and password?
social engineering
30.Refer to the exhibit. An organization needs to connect PC systems that use private IP addressing to the Internet. The organization has multiple systems that need to access the Internet, but were only able to purchase one public IP address. What should be activated on the Linksys integrated router to achieve this goal?
NAT
31.A network administrator is setting up an application filtering firewall. Company security policy states that FTP sessions that are coming from the Internet and use the standard FTP port must be blocked. Which TCP/UDP port must the administrator block on the firewall to be in compliance?
21
32.What is the name for the contract between a customer and an ISP that specifies requirements for uptime and service response time?
SLA
33.How does a crossover cable make it possible for two “like devices” (for example, two switches) to communicate?
The transmit pins on one device are connected to the receive pins on the other device.
34. Which attribute must be the same for wireless devices on one network to be able to communicate with devices on a different network?
default gateway
35.Which picture shows a USB port on a PC?
Imbecille se la sbagli
36.A college network administrator is planning a wireless LAN to provide service in the student lounge and outdoor patio. The requirements include a range of at least 80 meters and a speed of 30 Mb/s. Which wireless LAN standard meets these requirements?
802.11g
37. Which type of computer has an integrated mouse?
laptop
38.What is true about a wireless access point that is equipped with an omnidirectional antenna?
radiates the signal equally in all directions
39. What are two ways that a user can interact with an operating system shell? (Choose two.)
CLI and GUI
40.Refer to the exhibit. Assume that the exhibited output is from a host that is connected to a Linksys integrated router. What is the first thing that should be checked if using a bottom-up troubleshooting approach?
the link status LED on the front of the router
41.For devices that do not autosense, which connection requires a crossover cable?
PC port to PC port
42.Which statement is true about UTP cable termination?
The RJ-45 connector should be pushed over the wire jacket for a smooth connection.
43. A local PC has the correct configuration that is required to access the network. A ping command that is sourced at the PC does not receive a response from a remote device. Which operating system command might be used to determine where the connection failed?
tracert
44. An administrator is troubleshooting a network problem that involves the inability of users to reach Internet sites. During troubleshooting, the administrator is able to successfully ping web sites by their IP address, but pings to domain names are unsuccessful. Which service is most likely at fault?
DNS
45.What two commands can be used to form a new binding if client information does not agree with the DHCP client table? (Choose two.)
ipconfig /release and ipconfig /renew
46.Which installation option should be chosen when the current operating system is too damaged to work properly?
clean install
47.A user is unable to send e-mail. To begin troubleshooting this problem, the network technician uses the browser on the PC and tries to access some popular Internet websites. Which troubleshooting approach is being followed?
top-down
48.Which two causes of networking problems are related to the physical layer? (Choose two.)
damaged cables and connectors and overheated components
49.Which statement accurately describes a recommended strategy for end users to employ when they interact with a help desk technician?
Provide as much information about the problem as possible.
50.What does it mean when a problem is being escalated by a helpdesk?
The helpdesk has solved the problem and is closing the ticket.

No comments:

Post a Comment