But if you find the same answers for all the Module anywhere in the internet.
And if you have an Answers are correct 100% or if you find an answer, What is wrong in this blog. please send me. (Post in blog or Send Email )
Because,I will update the blog…

Showing posts with label Ccna 640-802 Network Simulator Download. Show all posts
Showing posts with label Ccna 640-802 Network Simulator Download. Show all posts

Thursday, June 13, 2013

CCNA Discovery 2 - Module 4 Exam Version 4.0 Working at a Small-to-Medium Business or ISP

1. Which statement describes NAT overload or PAT?
• Each internal address is dynamically translated to an individual external IP address.
• A single internal address is always translated to the same unique external IP address.
Many internal addresses can be translated to a single IP address using different port assignments.
• Many internal addresses are statically assigned a single IP address and port to use for communications.

2. How many usable hosts are available given a Class C IP address with the default subnet mask?
254
• 255
• 256
• 510
• 511
• 512

3. IPv6 increases the IP address size from 32 bits to how many bits?
• 64
• 96
128
• 192
• 256
• 512

4. What are three advantages of NAT implementations? (Choose three.)
improved security
• improved router performance
• decreased processor load
improved scalability
• universal application compatibility
sharing few public IP addresses with many hosts

CCNA Discovery 2 - Module 4 Exam Version 4.0 Working at a Small-to-Medium Business or ISP
5. Refer to the exhibit. Host A is connected to the LAN, but it cannot get access to any resources on the Internet. The configuration of the host is shown in the exhibit. What could be the cause of the problem?
• The host subnet mask is incorrect.
• The default gateway is a network address.
• The default gateway is a broadcast address.
The default gateway is on a different subnet from the host.

6. In an 8 bit binary number, what is the total number of combinations of the eight bits?
• 128
• 254
• 255
256
• 512
• 1024

CCNA Discovery 2 - Module 4 Exam Version 4.0 Working at a Small-to-Medium Business or ISP
7. refer to the exhibit. Which range of IP addresses would allow hosts that are connected to the Router1 Fa0/0 interface to access outside networks?
• 192.168.1.0 through 192.168.1.95
192.168.1.66 through 192.168.1.94
• 192.168.1.66 through 192.168.1.96
• 192.168.1.0 through 192.168.1.127
• 192.168.1.66 through 192.168.1.128

8. hat is the network broadcast address for a Class C address of 192.168.32.0 with the default subnet mask?
• 192.168.0.0
• 192.168.0.255
• 192.168.32.0
• 192.168.32.254
192.168.32.255

9. Convert the decimal number 231 into its binary equivalent. Select the correct answer from the list below.
• 11110010
• 11011011
• 11110110
11100111
• 11100101
• 11101110

10. Which two statements describe classful IP addresses? (Choose two.)
• It is possible to determine which class an address belongs to by reading the first bit.
The number of bits used to identify the hosts is fixed by the class of the network.
• Only Class A addresses can be represented by high-order bits 100.
• Up to 24 bits can make up the host portion of a Class C address.
Up to 24 bits can be used to identify unique networks.
• Three of the five classes of addresses are reserved for multicasts and experimental use.

11. Which port numbers are used by PAT to create unique global addresses?
• 255 and below
• 1024 and below
1025 and above
• 64,000 and above

12. Which IPv4 class provides the highest number of host addresses per network?
Class A
• Class B
• Class C
• Class D
• Class E

13. Company XYZ uses a network address of 192.168.4.0. It uses the mask of 255.255.255.224 to create subnets. What is the maximum number of usable hosts in each subnet?
• 6
• 14
30
• 62

14. What must happen for a privately addressed host on an inside local network to be able to communicate with an outside destination host on the Internet?
• The host IP address must be translated to an outside private address.
• The host IP address must be translated to an inside local address.
• The host IP address must be translated to an outside local address.
The host IP address must be translated to an inside global address.

15. Which statement accurately describes public IP addresses?
• Public addresses cannot be used within a private network.
Public IP addresses must be unique across the entire Internet
• Public addresses can be duplicated only within a local network.
• Public IP addresses are only required to be unique within the local network.
• Network administrators are free to select any public addresses to use for network devices that access the Internet.

16. Which option shows the proper notation for an IPv6 address?
• 2001,0db8,3c55,0015,abcd,ff13
• 2001-0db8-3c55-0015-abcd-ff13
• 2001.0db8.3c55.0015.abcd.ff13
2001:0db8:3c55:0015::abcd:ff13

17. What is the range of the first octet in a Class B address?
Class A
• Class B
• Class C
• Class D
• Class E

18. What are two reasons that NAT was developed? (Choose two.)
• to preserve registered public IP addresses
• to allow users on the public Internet to access local networks
to provide a method for privately addressed LANs to participate in the Internet
• to make routing protocols operate more efficiently
to allow private addresses to be routed on the public Internet
• to reduce overhead and CPU usage on gateway routers

19. Static NAT works by mapping a specific inside local IP address to what other specific address type?
inside global
• outside local
• outside global
• private IP address

20. Which IPv4 class of addresses provides the most networks?
• Class A
• Class B
Class C
• Class D
• Class E

CCNA Discovery 1 - Module 1 Exam Version 4.0 Networking for Home and Small Businesses

1. What two functions does a UPS provide that a surge protector does not ? (Choose two.)
• protects the computer from voltage surges
provides backup power from an internal battery
• protects the computer from sudden voltage spikes
• gives the user time to phone the electrical company
gives the user time to safely shut down the computer if the power fails
• provides backup power through a generator provided by the wall outlet

2. What can be used to prevent electrostatic discharge (ESD)?
• dry and non humid conditions
• carpeted floor
grounding strap
• uncluttered work space

3. Applications can be grouped into general use software or industry specific software. What are two examples of industry specific software? (Choose two.)
CAD
• presentation
• spreadsheet
• word processing
medical practice management
• contacts/scheduling management

4. A user plans to run multiple applications simultaneously on a computer. Which computer component is essential to accomplish this?
RAM
• NIC
• video card
• sound card
• storage device

5. What are two examples of output peripheral devices? (Choose two.)
printer
speakers
• flash drive
• external DVD
• external modem

6. What measurement is commonly associated with computer processing speed?
• bits
• pixels
hertz
• bytes

7. Which adapter card enables a computer system to exchange information with other systems on a local network?
• modem card
• controller card
• video card
• sound card
network interface card

8. Which component is designed to remove high-voltage spikes and surges from a power line so that they do not damage a computer system?
• CPU
surge suppressor
• motherboard
• hard drive

9. What are two benefits of hooking up a laptop to a docking station? (Choose two.)
Mobility is increased.
An external monitor can be used.
Alternate connectivity options may be available.
• The keyboard can be changed to a QWERTY-style keyboard.
• More wireless security options are available.

10. Which computer component is considered the nerve center of the computer system and is responsible for processing all of the data within the machine?
• RAM
CPU
• video card
• sound card
• operating system

11. What are two advantages of purchasing a preassembled computer? (Choose two..
usually a lower cost
• exact components may be specified
• extended waiting period for assembly
adequate for performing most general applications
• suited for customers with special needs

12. What is a word processor?
• It is a physical computer component.
It is a program designed to perform a specific function.
• It is a program that controls the computer resources.
• It is a functional part of an operating system.

13. Why do servers often contain duplicate or redundant parts?
• Servers require more power and thus require more components.
Servers should be accessible at all times.
• Servers can be designed as standalone towers or rack mounted.
• Servers are required by networking standards to have duplicate parts.

14. Which three terms describe different types of computers? (Choose three.)
operating system
• network
laptop
desktop
• Windows
mainframe

15. How many values are possible using a single binary digit?
• 1
2
• 4
• 8
• 9
• 16

16. In newer operating systems, how are system resources assigned by default when components are installed?
• manually assigned by the operating system
• manually assigned by the administrator
• statically assigned by the component to a preset resource
dynamically assigned between the component and the operating system

17. How is a server different from a workstation computer?
• The server works as a standalone computer.
The server provides services to clients.
• The workstation has fewer applications installed.
• The workstation has more users who attach to it.

18. If a peripheral device is not functioning, what are three things you should do to solve the problem? (Choose three.)
Use the testing functionality on the peripheral itself, if available.
Verify that all cables are connected properly.
• Disconnect all cables connected to the computer except those connected to the peripheral.
Ensure that the peripheral is powered on.
• Disconnect the peripheral and verify that the computer is operating normally.
• Reload the computer operating system.

19. Which two steps should be performed when installing a peripheral device? (Choose two.)
Download and install the most current driver.
• Connect the peripheral using any cable and any available port on the computer.
Connect the peripheral using an appropriate cable or wireless connection.
• Test the peripheral on another machine before installing it on the one where it will be used.
• Check the computer documentation to see if the peripheral vendor is compatible with the PC vendor.

20. What is the main storage drive used by servers, desktops, and laptops?
• tape drive
hard drive
• optical drive (DVD)
• floppy disk drive

21. What is the purpose of the ASCII code?
• translates bits into bytes
• interprets graphics digitally
• translates digital computer language into binary language
represents letters, characters, and numbers with bits