But if you find the same answers for all the Module anywhere in the internet.
And if you have an Answers are correct 100% or if you find an answer, What is wrong in this blog. please send me. (Post in blog or Send Email )
Because,I will update the blog…

Showing posts with label Ccna 2 Final Exam Answers. Show all posts
Showing posts with label Ccna 2 Final Exam Answers. Show all posts

Thursday, June 13, 2013

CCNA Discovery 3 - Module Final Exam Version 4.0 Introducing Routing and Switching in the Enterprise

1. Which two statements describe how the information contained in a BPDU is used by a switch? (Choose two.)
• to set the duplex mode of a redundant link
• to activate looped paths throughout the network
to determine the root bridge
• to prevent loops by sharing routing tables between connected switches
to determine which ports are placed in forwarding mode

CCNA Discovery 3 - Module Final Exam Version 4.0 Introducing Routing and Switching in the Enterprise
2. Refer to the exhibit. If router RTA fails, which statement is true?
Hosts A and B can reach each other, but cannot reach hosts C and D or the server.
• No host can reach any other host.
• Hosts A, B, C, and D can reach each other, but cannot reach the server.
• All hosts can reach each other.

CCNA Discovery 3 - Module Final Exam Version 4.0 Introducing Routing and Switching in the Enterprise
3. Refer to the exhibit. A company has recently installed a new switch (S2) into their network.After several minutes, the network administrator notices that the new VLAN information is not being propagated to the new switch. Given the show vtp status command output, what is the possible problem that prevents the information from being received by the new switch?
VTP version mismatch
• VTP domain name mismatch
• VTP revision number mismatch
• Time synchronization problems

CCNA Discovery 3 - Module Final Exam Version 4.0 Introducing Routing and Switching in the Enterprise
4. Refer to the exhibit. Users on the 172.30.20.0/24 network are unable to access any of the servers located on the 192.168.0.0/23 network. Given the network topology and OSPF configuration, what two problems exist in this network? (Choose two.)
• There is a routing loop occurring between all three routers.
There is a network statement missing.
Network 172.30.20.0 has an incorrect wildcard mask.
• The OSPF Area configuration is incorrect.
• /23 is an invalid subnet mask for the 192.168.0.0 network.

5. What will be the two wildcard masks required in an extended access list statement that blocks traffic to host 192.168.5.45 from the 172.16.240.0/27 network? (Choose two.)
0.0.0.0 5
• 255.255.240.0
• 255.255.255.255
• 0.0.31.255
• 255.255.255.240
0.0.0.31

CCNA Discovery 3 - Module Final Exam Version 4.0 Introducing Routing and Switching in the Enterprise
6. Refer to the exhibit. What is represented by the Null0 route for the 128.107.0.0 network?
• a child route that is defined
• a parent route that is defined and sourced from a physical interface
a summary route for advertising purposes, not an actual path
• the result of the no auto-summary command on a router

CCNA Discovery 3 - Module Final Exam Version 4.0 Introducing Routing and Switching in the Enterprise
7. Refer to the exhibit. Which IP addressing scheme would be correct for the network?
• H1-172.18.0.10/16
H2-172.18.0.11/16
H3-172.18.0.12/16
H1-172.18.0.10/16
H2-172.19.0.10/16
H3-172.18.0.11/16

• H1-172.18.0.10/16
H2-172.18.0.11/16
H3-172.19.0.11/16
• H1-172.18.0.10/16
H2-172.19.0.11/16
H3-172.19.0.11/16

CCNA Discovery 3 - Module Final Exam Version 4.0 Introducing Routing and Switching in the Enterprise
8. Refer to the exhibit. A network support technician has been asked to set an IP address on one of the FastEthernet interfaces on a new router. What is causing the interface to reject the address?
• The IP address is already in use.
The technician is using a network address.
• The technician is using the wrong subnet mask for /26
• The technician must enable VLSM on the interface.

9. Which statement is accurate about the CIR in Frame Relay?
• It is important to purchase a CIR that matches the highest bandwidth requirements of the enterprise.
• The CIR can be no lower than the port speed of the local loop.
• The CIR defines the contracted maximum rate available from the service provider on the Frame Relay circuit
It is possible to burst over the CIR if bandwidth is available.

CCNA Discovery 3 - Module Final Exam Version 4.0 Introducing Routing and Switching in the Enterprise
10. Refer to the exhibit. OSPF is enabled and the network has completely converged. Which two routers will be designated as DROTHER routers? (Choose two.)
R1
• R2
• R3
• R4

11. Assuming VLSM is not being used, what impact will adding the command ip route 172.16.64.0 255.255.240.0 serial0/0 have on a router that is already operational in a network?
• All packets with a destination address between 172.16.64.1 and 172.16.80.254 will be forwarded out serial0/0.
• All packets with a destination address between 172.16.64.1 and 172.16.255.254 will be forwarded out serial0/0.
All packets with a destination address between 172.16.64.1 and 172.16.79.254 will be forwarded out serial0/0.
• All packets with a destination address between 172.16.0.1 and 172.16.64.254 will be forwarded out serial0/0.

CCNA Discovery 3 - Module Final Exam Version 4.0 Introducing Routing and Switching in the Enterprise
12. Refer to the exhibit. A network administrator enters the command ip route 10.10.4.16 255.255.255.248 s0/0/1 into the router. What will be the result of this configuration?
A static route pointing to 10.10.4.16/29 is placed into the routing table.
• A static route to 10.10.4.16/29 is placed into the routing table if interface FastEthernet0/1 goes down.
• A static route pointing to 10.10.4.16/29 is only placed into the routing table if the route to 10.10.4.0 is removed.
• A static route is not placed into the routing table because a RIP route that includes the destination network already exists.

13. If a modem is being used to connect to an ISP, which WAN connection type is being used?
• leased line
• cell switched
circuit switched
• packet switched

CCNA Discovery 3 - Module Final Exam Version 4.0 Introducing Routing and Switching in the Enterprise
14. Refer to the exhibit. All routes in the exhibit are available to a router. Which two routes will be placed into the routing table? (Choose two.)
• A
B
C
• D
• E
• F

15. A network administrator wants to deny responses to ping requests. Which ACL statement denies ping responses while not affecting other traffic?
• access-list 123 deny tcp any any eq 80
• access-list 123 deny tcp any any eq 20
• access-list 123 deny tcp any any eq 21
access-list 123 deny icmp any any echo-reply
• access-list 101 deny tcp any any established

CCNA Discovery 3 - Module Final Exam Version 4.0 Introducing Routing and Switching in the Enterprise
16. Refer to the exhibit. RIPv2 is configured in the network shown. Hosts in the network have access to all internal networks but do not have Internet access. On which router should the commands, shown in the exhibit, be added to provide Internet access for all hosts in the network?
• R1
R2
• R3
• ISP

CCNA Discovery 3 - Module Final Exam Version 4.0 Introducing Routing and Switching in the Enterprise
17. Refer to the exhibit. An administrator is adding a new router to the network. The IP address 192.168.13.6/30 has been assigned to the connecting serial interface on R2. What IP address must the administrator assign to the serial interface of the new router?
• 192.168.13.4/30
192.168.13.5/30
• 192.168.13.7/30
• 192.168.13.58/30
• 192.168.13.61/27
• 192.168.13.63/27

18. Which two statements are true about the native VLAN on a switch? (Choose two.)
• It requires a special VLAN ID tag.
• It is unable to be changed to a different VLAN.
• Untagged traffic slows the switching process down
The native VLAN defaults to VLAN 1 on Cisco Catalyst switches.
Untagged frames that are received on a trunk become members of this VLAN

CCNA Discovery 3 - Module Final Exam Version 4.0 Introducing Routing and Switching in the Enterprise
19. What is the term for the value 2172416 that is highlighted in the output of the show ip eigrp topology command?
• feasible distance of the successor
• reported distance of the successor
• feasible distance of the feasible successor
reported distance of the feasible successor

CCNA Discovery 3 - Module Final Exam Version 4.0 Introducing Routing and Switching in the Enterprise
20. Refer to the exhibit. The network is using OSPF as the routing protocol. A network administrator issues the show ip ospf neighbor command to check the status of operation. Which statement is true?
• RB has the lowest priority value.
• RC and RD have the lowest router IDs on the network.
RA has established adjacencies with all neighbor routers.
• RA and RB cannot form an adjacency because they are stuck in the 2-way state.

21. After comparing a previous baseline to current network statistics, the network engineer has discovered a significant increase in unwarranted traffic to the extranet. Which two steps simplify administration and control the unwanted traffic? (Choose two.)
define an ACL at the distribution layer to isolate packets
add an ACL at the router in the enterprise edge to block the traffic
• deploy a Layer 3 switch to contain broadcasts
• connect remote locations directly to the intranet
• configure all hosts with the same default gateway to eliminate unnecessary broadcasts
• deploy one core ISP router to reduce the delay in path determination

22. Which command should a network administrator issue to disable default summarization in an EIGRP network?
• Router(config-router)# null 0 route
• Router(config-if)# no ip summary-address
• Router(config-router)# no ip summary-address
• Router(config-if)# no auto-summary
Router(config-router)# no auto-summary

CCNA Discovery 3 - Module Final Exam Version 4.0 Introducing Routing and Switching in the Enterprise
23. Refer to the exhibit. Assuming that all three routers are configured with the EIGRP routing protocol and sharing information, what information can be gathered from the show command output?
• Router B has EIGRP adjacencies with both router A and C.
• Router B has a fully converged topology table.
• Router B has not formed an adjacency with router A.
Router B has not formed an adjacency with router C.

24. What are two characteristics of an extended ACL? (Choose two.)
• IP is used to specify TCP traffic only.
• IP is used to specify TCP and UDP traffic only.
IP is used to specify all TCP/IP protocols including TCP, UDP, ICMP and routing protocols.
• Traffic can be filtered on source address only.
• Traffic can be filtered on source and destination address only.
Traffic can be filtered on source and destination address, protocol, and specific port number.

25. Which three statements are true about RSTP? (Choose three.)
RSTP can fall back to STP to provide support for legacy equipment.
• RSTP and STP have the same number of port states.
• Like PortFast and UplinkFast, RSTP is a proprietary protocol.
• RSTP takes up to 50 seconds to converge.
RSTP requires a point-to-point, full-duplex connection.
RSTP views all ports that are not discarding as part of an active topology.

CCNA Discovery 3 - Module Final Exam Version 4.0 Introducing Routing and Switching in the Enterprise
26. Refer to the exhibit. What three facts represent the result of DR and BDR elections in this OSPF network? (Choose three.)
RTC will be the DR of 10.5.0.0/30
• RTD will be the BDR of 10.5.0.0/30.
RTD will be the DR of 10.4.0.0/28.
• RTB will be the BDR of 10.7.0.0/28.
RTB will be the DR of 10.7.0.0/28.
• RTA will be the BDR of 10.4.0.0/28.

27. Which two statements are true regarding a PPP connection between two Cisco routers? (Choose two.)
LCP tests the quality of the link.
LCP manages compression on the link
• Only a single NCP is allowed between the two routers.
• NCP terminates the link when data exchange is complete.
• With CHAP authentication, the routers exchange plain text passwords.

28. What do companies gain from the services performed at the enterprise edge?
• faster communication with server farms
stronger security against malicious attacks
• faster communication with Internet destinations
• enhanced performance and reliability through VLANs and redundant trunk links

CCNA Discovery 3 - Module Final Exam Version 4.0 Introducing Routing and Switching in the Enterprise
29. Refer to the exhibit. Because of continuing instability of one of the serial links in the OSPF network, a network administrator configures router ASBR as shown. Which two statements will be a result of this configuration? (Choose two.)
• Traffic intended for destinations across unstable serial links will be forwarded by ASBR even when the links are down
A summary route of 192.168.0.0/22 will be advertised to the ISP router.
• Serial links in range 192.168.0.0 255.255.252.0 will be forced into a passive state.
• Networks connected to the unstable serial links will be placed in an unreachable state.
Negative effects of route flapping will be reduced.

30. A sales representative is using a wireless connection to make a VoIP call. Which protocol will be used to transport the voice packets?
• TCP
UDP
• PPP
• HDLC

31. A sales representative is preparing to send sensitive information to corporate headquarters from a hotel room using the Internet. Prior to the trip, the IT staff made the necessary provisions to allow secure Internet access. What solution was implemented for the sales representative?
VPN
• Frame Relay
• PPP with CHAP authentication
• PPP with PAP authentication

32. A company is using a Class B IP addressing scheme and expects to need as many as 150 networks. What is the correct subnet mask to use with the network configuration?
• 255.255.0.0
• 255.255.240.0
• 255.255.254.0
255.255.255.0
• 255.255.255.128
• 255.255.255.192

CCNA Discovery 3 - Module Final Exam Version 4.0 Introducing Routing and Switching in the Enterprise
33. Refer to the exhibit. R1 and R2 are connected via serial interfaces. Both interfaces show that there is Layer 2 connectivity between them. The administrator verifies that CDP is operational; however, pings between the two interfaces are unsuccessful. What is the cause of this connectivity problem?
• no set loopback
incorrect subnet mask on R2
• incompatible bandwidth
• incorrect IP address on R1
• incompatible encapsulation

CCNA Discovery 3 - Module Final Exam Version 4.0 Introducing Routing and Switching in the Enterprise
34. Refer to the exhibit. Which route will appear in the routing table?
R 10.10.4.0/24 [120/1] via 10.10.10.1, 00:00:12, FastEthernet0/1
• R 10.10.4.0/24 [120/1] via 10.10.20.1, 00:00:12, FastEthernet0/0
• R 10.10.4.0/24 [120/2] via 10.10.20.1, 00:00:12, FastEthernet0/0
• R 10.10.4.0/24 [120/3] via 10.10.30.1, 00:00:12, FastEthernet1/0
• R 10.10.4.0/24 [120/1] via 10.10.30.1, 00:00:12, FastEthernet1/0

CCNA Discovery 3 - Module Final Exam Version 4.0 Introducing Routing and Switching in the Enterprise
35. Refer to the exhibit. R1 is connected to the Internet through its serial 0/0/0 interface. Hosts on the 192.168.100.0/24 LAN on R1 cannot communicate with hosts on the Internet. What two NAT configuration issues might explain this failure? (Choose two.)
The ip nat pool command has not been applied correctly.
• The inside interface has not been defined on R1.
• The access list does not include the group of IP addresses that are supported by the inside network.
The ip address that is assigned to the serial 0/0/0 interface is incorrect
• The outside interface has not been defined on R1.

CCNA Discovery 3 - Module Final Exam Version 4.0 Introducing Routing and Switching in the Enterprise
36. Refer to the exhibit. What two conclusions can be drawn from the displayed output? (Choose two.)
• A packet with a destination IP address of 172.20.1.14 will exit the router via the Serial 0/1/0n interface.
• The default administrative distance for EIGRP has been changed.
Network 172.20.1.4 can be reached through two possible routes of equal cost.
The addresses on this network were created using VLSM.
• The router connected to Serial 0/1/1 is advertising four separate routes through EIGRP to this router.

CCNA Discovery 3 - Module Final Exam Version 4.0 Introducing Routing and Switching in the Enterprise
37. Refer to the exhibit. Internet access is crucial for the company network shown. Internet access is provided by two ISPs. ISP1 is the primary provider and ISP2 is the backup provider. The network administrator configures BorderR as the border router so that in normal operations, all Internet traffic goes through ISP1. However, if the link to ISP1 fails, then BorderR will automatically forward Internet traffic to ISP2. The administrator configures two default routes:
BorderR(config)# ip route 0.0.0.0 0.0.0.0 192.168.100.1 200
BorderR(config)# ip route 0.0.0.0 0.0.0.0 172.16.1.1
However, when the administrator issued the show ip route command to verify the configuration, only the second default route is in the routing table. Why is the first default route not showing?
• The first configuration command overwrites the second command.
• The first default route will be installed into the routing table if there is traffic with an IP address that is destined for the 192.168.100.0 network.
This is expected because the link to ISP1 is active. If the link to ISP1 goes down, then the first default route will be installed into the routing table.
• The first default route cannot be installed into the routing table unless the administrator manually disables the second default route with the no ip route 0.0.0.0 0.0.0.0 172.16.1.1 command.

38. Which bandwidth allocation technique minimizes bandwidth waste by reallocating unused time slices to communicating users?
• VPN
• NCP
• TDM
• STP
STDM

CCNA Discovery 3 - Module Final Exam Version 4.0 Introducing Routing and Switching in the Enterprise
39. Refer to the exhibit. A network administrator noticed that the VLAN configuration changes at SW2 did not propagate to SW3. On the basis of the partial output of the show vtp status command, what is the possible cause of the problem?
• VTP V2 mode is disabled.
SW3 is configured as transparent mode.
• The number of existing VLANs does not match.
• The configuration revision number does not match.

40. What are two ways VLAN memberships can be created in an enterprise network? (Choose two.)
manually configuring the switch ports to be part of a VLAN
• allowing the user to choose a specific VLAN through a GUI menu
• configuring the switch to allow VLAN membership based on NetBIOS association
• implementing an access list that specifies which devices are placed into specific VLANs.
associating MAC addresses to specific VLANs in a VLAN management policy server database
• manually configuring the host devices to be part of a VLAN

41. When MD5 authentication is used for OSPF routing protocol authentication, what two facts are known about the key? (Choose two.)
• The key passes between routers in plain text.
• The key is used to help generate an encrypted number for authentication.
• The key passes between routers in encrypted form.
The key is never transmitted.
• The key can be captured by using a packet sniffer.

42. In which VTP mode can a switch create VLANs, ignore VTP messages, and not pass local VLAN information to other VTP domain members?
• client
• server
• pruning
transparent

CCNA Discovery 3 - Module Final Exam Version 4.0 Introducing Routing and Switching in the Enterprise
43. Refer to the exhibit. If R4 is announcing all shown internal networks as a summary address to the ISP, which summary address will be most specific?
• 192.168.1.0/22
• 192.168.4.0/21
• 192.168.6.0/23
192.168.8.0/21
• 192.168.4.0/22

44. If an authentication protocol is configured for PPP operation, when is the client or user workstation authenticated?
• prior to link establishment
• during the link establishment phase
before the network layer protocol configuration begins
• after the network layer protocol configuration has ended

CCNA Discovery 3 - Module Final Exam Version 4.0 Introducing Routing and Switching in the Enterprise
45. Refer to the exhibit. A network administrator wishes to deny Internet access to all R2 LAN hosts, while allowing these hosts to reach all other devices on the company networks. Where the ACL shown in the exhibit should be placed to meet these requirements?
• R2: Fa0/0 inbound
R1: S0/1/0 outbound
• R1: S0/0/1 inbound
• R2: S0/0/1 outbound
• R2: Fa0/0 outbound

CCNA Discovery 3 - Module Final Exam Version 4.0 Introducing Routing and Switching in the Enterprise
46. Refer to the exhibit. What two pieces of information can be gathered from the output of this command? (Choose two.)
• 172.16.16.0/20 is a manually summarized route.
• All subnets are being advertised because default summarization was disabled.
The output verifies that EIGRP is advertising only the networks in the same AS.
• The 172.16.1.0/24 network is directly attached to the router that produced this output.
The Null0 interface indicates that this is not an actual path, but a summary for advertising purposes.

47. What are two benefits of implementing VLANs in an enterprise network? (Choose two.)
• eliminates the need for a Layer 3 device
provides segmentation of broadcast domains
• allows for the propagation of broadcasts from one local network to another
allows for the logical grouping of devices despite physical location
• prevents issues such as broadcast storms by ensuring a loop free environment

48. Which two statements are true about RIPv1 and RIPv2? (Choose two.)
Both versions broadcast updates on port 520.
• Both versions send the subnet mask as part of the update.
• By default, both versions will receive RIPv1 and RIPv2 updates.
Both versions support the features of split horizon and poison reverse
• By default, both versions automatically summarize routes.
• RIPv1 has a higher AD than RIPv2 has.

CCNA Discovery 3 - Module Final Exam Version 4.0 Introducing Routing and Switching in the Enterprise
49. Refer to the exhibit. A network administrator must manually summarize all IP addresses on the POP router for the ISP. Which one is the correct summary address?
192.168.0.0/22
• 192.168.0.0/23
• 192.168.0.0/24
• 192.168.0.0/25

50. Which three IP addresses are valid host addresses in the 10.200.0.0/20 network? (Choose three.)
10.200.11.69
• 10.200.16.1
10.200.0.255
• 10.201.0.55
10.200.15.240
• 10.200.30.29

CCNA Discovery 3 - Module Final Exam Version 4.0 Introducing Routing and Switching in the Enterprise
51. Refer to the exhibit. Assuming that the RIPv1 routing protocol is enabled and that all networks are being advertised, which statement is true?
• All packets from H1 that are destined to H2 will arrive at H2.
None of the packets from H1 that are destined to H2 will arrive at H2.
• Approximately half the traffic from H1 that is destined to H2 will reach R3.
• Some of the packets from H1 that are destined to H2 will be sent to the switch that is connected to network 192.168.3.64/26.

CCNA Discovery 3 - Module Final Exam Version 4.0 Introducing Routing and Switching in the Enterprise
52. Refer to the exhibit. Server7 has been added to the server farm network. The hosts can ping Servers 2 and 3 and Server2 and Server3 can ping each other. Server7 cannot ping the other servers connected to the switch. What is the cause of this problem?
• The Fa0/1 port on the switch should be in access mode.
• The switch IP address is not on the same subnet as Server7.
The switch port used for Server7 is not in the same VLAN as Server2 and Server3.
• The Fa0/0 interface of the router has not been configured for subinterfaces to support inter-VLAN routing.

CCNA Discovery 3 - Module Final Exam Version 4.0 Introducing Routing and Switching in the Enterprise
53. Refer to the exhibit. In what sequence (from first to last) does an OSPF router check the parameters listed when selecting the DR?
C, B, A, D
• D, C, B, A
• A, B, C, D
• A, C, B, D
• B, C, A, D

54. Which two criteria are used by STP to select a root bridge? (Choose two.)
• memory size
bridge priority
• number of ports
• switch location
• switching speed
base MAC address

55. The headquarters of a corporation uses static routes to connect to three branch offices. What are two advantages of using static routes for the WAN connections? (Choose two.)
Static routes are more secure.
• Static routes converge faster.
• Static routes have higher administrative distances than dynamic routing protocols.
• The metrics of a static route need adjusting only if the bandwidth of the WAN connection changes.
They are more stable and less susceptible to network changes in the interior gateway protocol.

CCNA Discovery 3 - Module Final Exam Version 4.0 Introducing Routing and Switching in the Enterprise
56. Refer to the exhibit. What is the purpose of the command: RouterA(config)# access-list 1 permit 192.168.16.0 0.0.0.255?
• It identifies traffic on all inside interfaces to be translated and given access to the ISP router.
• It identifies traffic from the fa0/1 interface to be translated and given access to the ISP router.
• It allows traffic from the ISP to reach all of the inside interfaces.
It identifies traffic from the fa0/0 interface to be translated and given access to the ISP router
• It allows traffic from the ISP router to the fa0/1 interface.

57. Why would a network administrator want to limit the size of failure domains when designing a network?
• to eliminate the effects of Ethernet collisions
to reduce the impact of a key device or service failure
• to reduce the impact of Internet congestion on critical traffic
• to eliminate the need to block broadcast packets at the edge of the local network

58. What two statements are true regarding EIGRP tables? (Choose two.)
A feasible successor route can be found in the topology table.
• A successor route can only be found in the routing table.
The topology table shows whether a route is in the passive or active state.
• The routing table shows the amount of time elapsed since a router adjacency was formed.
• The neighbor table shows all adjacent Cisco devices.
• Administrative distance is shown as a column in the neighbor table.

CCNA Discovery 2 - Module 8 Exam Version 4.0 Working at a Small-to-Medium Business or ISP

1. Which benefit does SSH offer over Telnet when remotely managing a router?
encryption
• TCP usage
• authorization
• connection using six VTY lines

2. Which three protocols describe methods that can be used to secure user data for transmission across the internet? (Choose three.)
• SMTP
IPSEC
SSL
HTTPS
• FTP
• TFTP

3. Before a technician upgrades a server, it is necessary to back up all data. Which type of backup is necessary to ensure that all data is backed up?
• daily
• differential
full
• incremental
• partial

4. What are two potential problems with using tape media to back up server data? (Choose two.)
Tape is not a cost-effective means of backing up data.
• Data tapes are difficult to store offsite.
• Data tapes are prone to failure and must be replaced often.
Tape drives require regular cleaning to maintain reliability.
• Backup logs are not available with tape backup solutions.

5. What network layer security protocol can secure any application layer protocol used for communication?
• HTTPS
• IMAP
• FTPS
IPSEC
• TLS

6. A company wants to configure a firewall to monitor all channels of communication and allow only traffic that is part of a known connection. Which firewall configuration should be deployed?
packet filtering
• proxy
• stateful packet inspection
• stateless packet inspection

7. What AAA component assigns varying levels of rights to users of network resources?
• auditing
• accounting
• authorization
• access control
authentication
• acknowledgement

8. Which means of communication does an SNMP network agent use to provide a network management station with important but unsolicited information?
• query
• broadcast
• ICMP ping
• trap
poll

9. What two measures help to verify that server backups have been reliably completed? (Choose two.)
reviewing backup logs
performing trial backups
• performing full backups only
• replacing tape backup with hard disk-based backup
• using an autoloader when backups require more than one tape

10. What is the term for the public network between the boundary router and the firewall?
• "clean" LAN
• intranet
DMZ
• extranet

11. A network administrator is assigning network permissions to new groups of users and employing the principle of least privilege. Which two actions should the administrator take? (Choose two.)
Provide users with only the access to resources required to do their jobs.
• Provide the minimum level of permissions required for users to do their jobs.
• Remove all permissions from the users and grant permissions as they are requested.
Allow users to decide how much permission they need to accomplish their job tasks.
• Provide full access to the users and gradually remove privileges over time.

12. A hacker has gained access to sensitive network files. In analyzing the attack, it is found that the hacker gained access over a wireless segment of the network. It is further discovered that the only security measure in place on the wireless network is MAC Address Filtering. How is it likely that the hacker gained access to the network?
• The hacker used a software tool to crack the shared hexadecimal wireless key.
The hacker obtained the MAC address of a permitted host, and cloned it on his wireless laptop NIC.
• The attacker mounted a denial of service attack to overwhelm the firewall before penetrating the wireless LAN.
• The hacker gained wireless access to the MAC address database and added his own MAC address to the list of permitted addresses.

13. Which of the following does SNMP use to hold information collected about the network?
• network management station
network management database
• management information base
• database information agent

14. A server log includes this entry: User student accessed host server ABC using Telnet yesterday for 10 minutes. What type of log entry is this?
• authentication
• authorization
accounting
• accessing

15. When is the use of out-of-band network management necessary?
• when a server needs to be monitored across the network
when the management interface of a device is not reachable across the network
• when enhanced monitoring features are required to gain an overall view of the entire network
• when it is desirable to use the information that is provided by SNMP

16. What is the advantage of using WPA to secure a wireless network?
It uses a 128-bit pre-shared hexadecimal key to prevent unauthorized wireless access.
• It uses an advanced encryption key that is never transmitted between host and access point.
• It is supported on older wireless hardware, thus providing maximum compatibility with enterprise equipment.
• It requires the MAC address of a network device that is requesting wireless access to be on a list of approved MAC addresses.

17. Which three protocols are used for in-band management? (Choose three.)
• FTP
• HTTP
SNMP
Telnet
TFTP
• DHCP

18. Which AAA service reduces IT operating costs by providing detailed reporting and monitoring of network user behavior, and also by keeping a record of every access connection and device configuration change across the network?
authentication
• accreditation
• accounting
• authorization

19. Which three items are normally included when a log message is generated by a syslog client and forwarded to a syslog server? (Choose three.)
date and time of message
ID of sending device
• length of message
message ID
• checksum field
• community ID

20. Which two characteristics of network traffic are being monitored if a network technician configures the company firewall to operate as a packet filter? (Choose two.)
• applications
• physical addresses
• packet size
ports
protocols

CCNA Discovery 1 - Module 1 Exam Version 4.0 Networking for Home and Small Businesses

1. What two functions does a UPS provide that a surge protector does not ? (Choose two.)
• protects the computer from voltage surges
provides backup power from an internal battery
• protects the computer from sudden voltage spikes
• gives the user time to phone the electrical company
gives the user time to safely shut down the computer if the power fails
• provides backup power through a generator provided by the wall outlet

2. What can be used to prevent electrostatic discharge (ESD)?
• dry and non humid conditions
• carpeted floor
grounding strap
• uncluttered work space

3. Applications can be grouped into general use software or industry specific software. What are two examples of industry specific software? (Choose two.)
CAD
• presentation
• spreadsheet
• word processing
medical practice management
• contacts/scheduling management

4. A user plans to run multiple applications simultaneously on a computer. Which computer component is essential to accomplish this?
RAM
• NIC
• video card
• sound card
• storage device

5. What are two examples of output peripheral devices? (Choose two.)
printer
speakers
• flash drive
• external DVD
• external modem

6. What measurement is commonly associated with computer processing speed?
• bits
• pixels
hertz
• bytes

7. Which adapter card enables a computer system to exchange information with other systems on a local network?
• modem card
• controller card
• video card
• sound card
network interface card

8. Which component is designed to remove high-voltage spikes and surges from a power line so that they do not damage a computer system?
• CPU
surge suppressor
• motherboard
• hard drive

9. What are two benefits of hooking up a laptop to a docking station? (Choose two.)
Mobility is increased.
An external monitor can be used.
Alternate connectivity options may be available.
• The keyboard can be changed to a QWERTY-style keyboard.
• More wireless security options are available.

10. Which computer component is considered the nerve center of the computer system and is responsible for processing all of the data within the machine?
• RAM
CPU
• video card
• sound card
• operating system

11. What are two advantages of purchasing a preassembled computer? (Choose two..
usually a lower cost
• exact components may be specified
• extended waiting period for assembly
adequate for performing most general applications
• suited for customers with special needs

12. What is a word processor?
• It is a physical computer component.
It is a program designed to perform a specific function.
• It is a program that controls the computer resources.
• It is a functional part of an operating system.

13. Why do servers often contain duplicate or redundant parts?
• Servers require more power and thus require more components.
Servers should be accessible at all times.
• Servers can be designed as standalone towers or rack mounted.
• Servers are required by networking standards to have duplicate parts.

14. Which three terms describe different types of computers? (Choose three.)
operating system
• network
laptop
desktop
• Windows
mainframe

15. How many values are possible using a single binary digit?
• 1
2
• 4
• 8
• 9
• 16

16. In newer operating systems, how are system resources assigned by default when components are installed?
• manually assigned by the operating system
• manually assigned by the administrator
• statically assigned by the component to a preset resource
dynamically assigned between the component and the operating system

17. How is a server different from a workstation computer?
• The server works as a standalone computer.
The server provides services to clients.
• The workstation has fewer applications installed.
• The workstation has more users who attach to it.

18. If a peripheral device is not functioning, what are three things you should do to solve the problem? (Choose three.)
Use the testing functionality on the peripheral itself, if available.
Verify that all cables are connected properly.
• Disconnect all cables connected to the computer except those connected to the peripheral.
Ensure that the peripheral is powered on.
• Disconnect the peripheral and verify that the computer is operating normally.
• Reload the computer operating system.

19. Which two steps should be performed when installing a peripheral device? (Choose two.)
Download and install the most current driver.
• Connect the peripheral using any cable and any available port on the computer.
Connect the peripheral using an appropriate cable or wireless connection.
• Test the peripheral on another machine before installing it on the one where it will be used.
• Check the computer documentation to see if the peripheral vendor is compatible with the PC vendor.

20. What is the main storage drive used by servers, desktops, and laptops?
• tape drive
hard drive
• optical drive (DVD)
• floppy disk drive

21. What is the purpose of the ASCII code?
• translates bits into bytes
• interprets graphics digitally
• translates digital computer language into binary language
represents letters, characters, and numbers with bits