CCNA Discovery Practice Final Exam

All materials on our website are shared by users. If you have any questions about copyright issues, please report us to resolve them. We are always happy to assist you.
of 10

Please download to get full document.

View again

Showing 1 of 10 1 Next Page: 1 GO
  Showing 1of 10Next>   Page: 1  GO <Prev   1   Which of the following are the address ranges of the private IP addresses? (Choose three.) to to to to to to 2   What is the purpose of the ipconfig /release command?It forces a client to give up its current IP address.It forces a client to give up its current MAC address.It forces the client to clear all the MAC address to IP address associations it has learned.It shows the current IP configuration on the client. 3   For an IP address, what component decides the number of bits that is used to represent thehost ID?default-gatewayhost numbernetwork numbersubnet mask 4   What does the term attenuation mean in data communication?loss of signal strength as distance increasestime for a signal to reach its destinationleakage of signals from one cable pair to anotherstrengthening of a signal by a networking device 5   What is the purpose of creating a DMZ during network firewall implementation?to create a server security zone accessible only to internal clientsto create a dirty zone that allows all inbound and outbound trafficto allow for a publicly accessible zone without compromising the internal networkto specify a higher security level than normally required for the internal production networkShowing 2of 10Next>   Page: 2  GO <Prev   6   What is the function of the DNS server?    It maps the IP address to the MAC address.It translates a computer or domain name to the associated IP address.It manages the domain that clients are assigned to.It accepts HTTP requests from clients. 7   A network technician suspects that malware on a user PC is opening multiple TCP connectionsto a specific foreign host address. Which Windows command line utility can be used to confirmthe multiple TCP connections?pingnetstattracertipconfignslookup 8   The help desk at a large packaging company receives a call from a user who is concernedabout lost data files on the local PC. The help desk technician learns that the user clicked on anicon that appeared to be a program update, but no updates were scheduled for that program.What type of attack has likely occurred?WormDDoSbrute forceTrojan horse 9   Refer to the exhibit. A user on host A sends an e-mail to the user on host B. Which type ofmessage does host A send?    broadcastmulticastsimulcastunicast 10 A network administrator has been notified that users have experienced problems gaining accessto network resources. What utility could be used to directly query a name server for informationon a destination domain?PingTracertNetstatIpconfigNslookup 11 What type of cable would be required to connect a Linksys router to a wired PC?crossover cablerollover cableserial cablestraight-through cable 12 A host sent a message that all other hosts on the switched local network received and processed.What type of domain are all these hosts a part of?local domainmulticast domaincollision domainbroadcast domain 13    Refer to the graphic. Assume that the exhibited output is from a host that is connected to aLinksys integrated router. What is one of the first things you should check?IP address on the hostIP address on the routersubnet mask on the hostdefault gateway on the hostlink status LED on the front of the router 14 Which two transport layer protocols enable hosts to communicate and transfer data? (Choosetwo.)DHCPICMPIPTCPUDP 15  Refer to the exhibit. Assume that the command output is from a wireless DHCP client that isconnected to a Linksys integrated router. What can be deduced from the output?The DHCP configuration on the router needs to be verified.The WEP key or SSID needs to be verified.The wireless connection is operational.The wireless NIC driver or the NIC itself needs to be reinstalled.Showing 4of 10Next>   Page: 4  GO <Prev   16 Because of an increasing number of users, bandwidth per user on a WLAN has decreased to apoint where users are complaining about poor performance. What can be done to improve the
Related Search
We Need Your Support
Thank you for visiting our website and your interest in our free products and services. We are nonprofit website to share and download documents. To the running of this website, we need your help to support us.

Thanks to everyone for your continued support.

No, Thanks