You are on page 1of 19

DsmbISP Final Exam - CCNA Discovery: Working at a Small-to-Medium Business

or ISP (Version 4.1)


1 Top of Form

Refer to the exhibit. The network administrator has added a route by using the ip route 10.13.13.0
255.255.255.0 192.168.1.1 command on R1. Hosts on the 10.12.12.0 network cannot communicate with h
the 10.13.13.0 network. What is the reason for this?
The gateway of last resort is not set.

The destination prefix mask is incorrectly configured.

The routing protocol has not been configured on R1.

The static route has not been configured correctly.


Bottom of Form

2 Top of Form
What is the effect of issuing the hostname RouterA command on a router?
A description will be configured on the router interfaces identifying them as belonging to RouterA.

The router will attempt to establish a connection to the host with the name RouterA.

The router will map an IP address to the domain name RouterA.

The router prompt will change from Router(config)# to RouterA(config)#


Bottom of Form

3 Top of Form
Refer to the exhibit. A network administrator is troubleshooting the serial connection between R1 and R2
is no communication between R1 and R2. Based on the output of the show ip interface brief command,
the cause of the problem?
There is a misconfiguration of IP addresses.

There is a mismatch of encapsulation methods.

The no shutdown command should be issued on R2.

The routing protocols are not compatible.


Bottom of Form

4 Top of Form
Wireless radio waves are associated with which layer of the OSI model?
Layer 1

Layer 2

Layer 3

Layer 4

Layer 5

Layer 6

Layer 7
Bottom of Form
5 Top of Form
Which statement correctly describes the function of AAA?
It prevents unauthorized access to a network.

It filters traffic based on destination IP and port number.

It enables users to send information to a daemon that is running on a management station.

It encrypts data to provide network security.


Bottom of Form
6 Top of Form
What routing protocol would be appropriate to use for exchanging routes between ISPs?
RIPv2

BGP

OSPF

EIGRP
Bottom of Form

7 Top of Form
Which statement correctly describes an SLA?
It lists the terms of the agreement between the user and the manufacturer of the system.

It outlines the management, monitoring, and maintenance of a network.

It specifies the software and hardware configurations of a system.

It describes the operation of a system.


Bottom of Form

8 Top of Form
What is a characteristic of a scalable network?
100% uptime

redundant links

easy expansion

multiple backup devices


Bottom of Form

9 Top of Form
A user is attempting to do an http://www.cisco.com/ without success. Which two configuration values mu
set on the host to allow this access? (Choose two.)
DNS server

WINS server

HTTP server

default gateway

Netbios
Bottom of Form

10 Top of Form
Which two commands ensure that any password that permits access to the privileged EXEC mode is not s
in plain text when the configuration files are displayed? (Choose two.)
Router(config)# enable secret cisco

Router(config)# enable cisco

Router(config)# encryption-password all

Router(config)# enable login encrypted

Router(config)# enable password encryption

Router(config)# service password-encryption


Bottom of Form
11 Top of Form
A network administrator subnets the network 172.16.1.0/24 into four subnets of equal size. Which combi
of mask and addresses correctly configures a host with an address and default gateway in the second subn
Host address: 172.16.1.129
Subnet mask: 255.255.255.224
Default gateway: 172.16.1.75
Host address: 172.16.1.75
Subnet mask: 255.255.255.224
Default gateway: 172.16.1.126
Host address: 172.16.1.60
Subnet mask: 255.255.255.192
Default gateway: 172.16.1.65
Host address: 172.16.1.75
Subnet mask: 255.255.255.192
Default gateway: 172.16.1.126
Bottom of Form

12 Top of Form
When a field technician visits a customer site and resolves the issue that was opened in a trouble ticket, w
should the technician do?
assess the network design of the customer site
survey users at the customer site for further needs

document the solution and obtain acceptance of the customer

discuss further problems that are identified during the visit and offer cost estimates
Bottom of Form

13 Top of Form
What happens when a segment is encapsulated into a packet?
Data is converted to bits for transmission.

The destination port number is specified.

A header with logical addresses is added.

A session with a destination is established.


Bottom of Form

14 Top of Form
What should be the first step in a structured cable project?
Locate all sources of EMI.

Obtain an accurate floor plan.

Identify the network backbone.

Design efficient cable management systems.


Bottom of Form

15 Top of Form

Refer to the exhibit. What two addresses are the broadcast addresses for network A and network B? (Cho
two.)
Network A broadcast address 192.168.1.32

Network A broadcast address 192.168.1.47


Network A broadcast address 192.168.1.15

Network B broadcast address 192.168.1.207

Network B broadcast address 192.168.1.240

Network B broadcast address 192.168.1.192


Bottom of Form

Top of Form
16 Top of Form
A network administrator is planning new cable installations for an automated manufacturing facility. The
solution must be scalable and function reliably in an environment subject to electromagnetic interference.
two cable solutions should the administrator consider? (Choose two.)
STP

UTP

coaxial

fiber optic

wireless
Bottom of Form

17 Top of Form

Refer to the exhibit. A ping 192.168.1.20 command is issued on workstation A to determine if workstatio
can be reached. What two events will occur if this command is successful? (Choose two.)
The router will reply to the echo request with a proxy ping response.

Workstation A will send a UDP ping request message to workstation B.


The router will send a TCP acknowledgment message to workstation A.

Workstation B will send a UDP ping reply message to the router.

Workstation A will send an ICMP echo request message to workstation B.

Workstation B will send an ICMP echo reply message to workstation A.


Bottom of Form

18 Top of Form
Which statement best describes the operation of a Layer 2 switch?
functions at the network layer of the OSI model

forwards traffic from one local IP network to another

directs traffic from one port to another based on the destination MAC address

dynamically creates a forwarding table that maps IP addresses to MAC addresses


Bottom of Form

19 Top of Form

Refer to the exhibit. What is the possible reason that a technician is unable to telnet into the HQ router an
configuration changes?
A password is required for vty 0.

A password for line con 0 is required.


All five virtual interfaces must be configured before Telnet is possible.

The service password-encryption command is preventing Telnet access.


Bottom of Form

20 Top of Form
To manage a Cisco switch using Telnet, where would the management IP address be configured on the sw
VLAN 1 interface

first vty port

first trunk port

console port

FastEthernet 0/1 interface


Bottom of Form
21 Top of Form
For the assignment of permissions to files and folders, what does the "principle of least privilege" imply?
No user has more privileges than any other user.

Permissions to files are given based on seniority.

Users only have access to resources that are necessary for their jobs.

Users should be given no access to computer resources until they ask.


Bottom of Form

22 Top of Form
A network administrator wants to configure six subnets for a Class C network. Which subnet mask will su
the maximum number of hosts on each subnet?
255.255.255.248

255.255.255.240

255.255.255.224

255.255.255.192
Bottom of Form

23 Top of Form
Refer to the exhibit. The Transfer > Capture Text feature available through HyperTerminal has been used
capture the running configuration on a router. The startup-configuration has been erased from the router
followed by the issuing of the reload command. The startup-config is restored by using the captured file,
interfaces on the router are shown as administratively down. What could cause this problem?
The enable password was incorrectly entered.

The configuration register was not set to 0x2142.

The enable secret password was incorrectly entered.

The no shutdown command must be entered under each interface section in the file being sent.

The captured file should have restored the running configuration not the startup configuration.
Bottom of Form

24 Top of Form
Which statement describes a feature of TCP?
It provides low overhead data delivery.

It acknowledges the receipt of packets.

It does not provide error checking.


It is a connectionless protocol.
Bottom of Form

25 Top of Form

Refer to the exhibit. Hosts that belong to the IT department use 10.10.55.33/27 as a default gateway. Whe
this IP address be located in the network?
A

F
Bottom of Form
26 Top of Form
Which protocol allows secure in-band management so that a network administrator can monitor and conf
network devices without fear of any passwords being compromised?
SSH

HTTP

SNMP

Telnet
Bottom of Form

27 Top of Form
In an IPv4 environment, what information is used by the router to forward data packets from one interfac
router to another?
destination network address

source network address

source MAC address

well known port destination address


Bottom of Form

28 Top of Form
Which is the best description of the operation of a Layer 2 LAN switch?
A switch forwards data packets from one port to another based on the destination IP address within th
packet.
A switch forwards frames between multiple devices on a LAN by broadcasting all received frames ou
ports.
A switch directs a stream of frames from one port to another based on the destination MAC address w
the frame.
A switch breaks a network into multiple local networks by using subnets and thus restricts the size of
broadcast domains.
Bottom of Form

29 Top of Form
When a router learns two paths to the same destination network, which two factors determine the path tha
be included in the routing table? (Choose two.)
route metric

the MAC address of the neighboring router

the source IP address in data packets

the IP address of the next hop router

administrative distance
Bottom of Form

30 Top of Form
A large company wants to ensure its connection to a remote branch office. The connection must be able to
support equally high upstream and downstream traffic. The service provider must also provide an SLA wi
guarantee of specific uptime and security. What type of connection best suits the needs of the company?
DSL connection
cable connection

dialup connection

point-to-point leased line connection


Bottom of Form

Bottom of Form
31 Top of Form
What is the primary function of a Level 1 support technician in an ISP help desk department with multipl
of customer support?
to install hardware replacements for the customer

to accompany an on-site technician to provide additional technical support

to diagnose and document the symptoms of hardware, software, and system problems

to design network enhancements that support the new technology requirements of the customer
Bottom of Form

32 Top of Form

Refer to the exhibit. A network administrator is unable to ping H1 from the router and is checking the cab
along the network. Which segment is incorrectly cabled?
Segment A

Segment B

Segment C

Segment D
Bottom of Form
33 Top of Form

Refer to the exhibit. Host H1 is sending a datagram to host H2 across the Internet. NAT will be configure
RTRC. Which address is considered the inside local address?
10.1.1.1

10.1.1.6

209.165.201.2

209.165.201.17

209.165.200.226
Bottom of Form

34 Top of Form
Which application can be delivered using UDP?
FTP

DNS

HTTP

SMTP
Bottom of Form

35 Top of Form
Refer to the exhibit. What two facts can be determined from the output of the show ip protocols comman
(Choose two.)
The routing protocol in use on RTA is RIPv1.

RTA is directly connected to four neighbor routers.

The administrative distance of the routing protocol is 120.

RTA will receive the next update from its neighbor in 30 seconds.

The routing protocol is only sending updates out the serial interface.
Bottom of Form
36 Top of Form
A tracert command is run on a host to determine if another host can be reached across a network. Which
events will occur if connectivity with the other host is unsuccessful? (Choose two.)
The command will display all the successful hops a packet makes before it is lost.

The command will calculate the time between successful and unsuccessful packets.

The host on which the command is run will send a UDP request message to the other host.

The command helps to determine where a packet was lost on the path from the source to the destinati

All hops between the two hosts display !!!!! to signify success.
Bottom of Form

37 Top of Form
What can be gained by using a caching-only DNS server?
The DNS server will use more WAN bandwidth.

The DNS server will only answer recursive queries.

The DNS server will be authoritative for only one zone.

The DNS server will resolve most queries more quickly.


Bottom of Form

38 Top of Form
Which statement is correct about passive data connections in the FTP protocol?
The server initiates the data transfer connection.

The server forwards its IP address and a random port number to the FTP client through the control str

The firewalls do not permit passive data connections to hosts that are located within the network.

The client forwards data to port 21 of the server.


Bottom of Form

39 Top of Form
A hacker attempts to reach confidential information that is stored on a server inside the corporate network
network security solution inspects the entire packet, determines that it is a threat, and blocks the packet fr
entering the inside network. Which security measure protected the network?
an IDS

an IPS

a host-based firewall

Anti-X software
Bottom of Form

40 Top of Form
Refer to the exhibit. Which type of link is supported by this interface module?
LAN

WAN

WLAN

VLAN
Bottom of Form
41 Top of Form

Refer to the exhibit. Which two statements describe the data conversation shown? (Choose two.)
The data conversation was started by the HTTP application process running on the client.

The data conversation is identified by TCP port 80 on the client.

The user started the data conversation by sending an e-mail.

The IP address of the Internet server is 192.168.17.43.

The Internet server will send data to port 8547 on the client.
Bottom of Form
42 Top of Form
The IT department of a company implements a backup plan which includes a daily backup on Monday th
Saturday. Only files that were modified during each day are backed up. Which backup method is being us
full backup

normal backup

differential backup

incremental backup
Bottom of Form

43 Top of Form

Refer to the exhibit. While configuring the serial interface of a router, the network administrator sees the
highlighted error message. What is the reason for this?
The serial interface is administratively down.

The serial interface is already configured with an IP address.

The network administrator has attempted to configure the serial interface with a broadcast address.

The same IP address has been configured on another interface.


Bottom of Form

44 Top of Form
When does a router enter the setup mode?
when the Cisco IOS is missing in flash

when the configuration is missing in NVRAM

when the setup command is run from the user mode

when the boot system command is missing in the configuration


Bottom of Form

45 Top of Form
In a structured cable system, which term describes the cable that connects the wall jack in the user work a
the patch panel in the wiring closet?
patch cable

vertical cable

horizontal cable

backbone cable
Bottom of Form

46 Top of Form
What is the default encapsulation for serial interfaces on Cisco routers?
PPP

SLIP

HDLC

Frame Relay
Bottom of Form

47 Top of Form

Refer to the exhibit. A new branch office has been added to the corporate network and a new router is to b
installed to allow branch office users to access the database server at headquarters. How should the serial
interface of the new branch office router be configured to connect to the headquarters router?
branch_23(config-if)# ip address 192.168.5.19 255.255.255.240
branch_23(config-if)# no shutdown
branch_23(config-if)# encapsulation hdlc
branch_23(config-if)# ip address 192.168.5.25 255.255.255.240
branch_23(config-if)# no shutdown
branch_23(config-if)# encapsulation ppp
branch_23(config-if)# no shutdown
branch_23(config-if)# encapsulation ppp
branch_23(config-if)# ip address 192.168.5.33 255.255.255.240
branch_23(config-if)# encapsulation ppp
branch_23(config-if)# ip address 192.168.5.21 255.255.255.240
branch_23(config-if)# no shutdown
Bottom of Form

48 Top of Form
A network technician is using a network management station to gather data about the performance of dev
and links within the ISP. Which application layer protocol makes this possible?
SNMP

FTP

DHCP

SMTP
Bottom of Form

49 Top of Form
A user reports being unable to access the Internet. The help desk technician employs a bottom-up approac
troubleshooting. The technician first has the user check the patch cable connection from the PC to the wa
then has the user verify that the NIC has a green link light. What will the technician have the user do next
Enter an IP address into the WWW browser address bar to see if DNS is at fault.

Use traceroute to identify the device along the path to the ISP that may be at fault.

Verify the IP address, subnet, and gateway settings using ipconfig on the PC.

Connect to the user home router to check firewall settings for blocked TCP ports.
Bottom of Form

50 Top of Form
What needs to be configured on a router to ensure that when the router receives a packet with an unknow
destination, the router will forward it to the next hop?
a default route

a directly connected route

a dynamically updated route

a static route to the destination network


Bottom of Form

You might also like