Subscribe:

Ads 468x60px

Blogroll

About

Blogger news



Senin, 05 Desember 2011

Jawaban Cisco CCNA Discovery 3 Chapter 9

1.
1
Refer to the exhibit. Based on the output shown, to which IP network should the workstations in the Support department belong?
• 192.168.1.0
• 172.16.1.0
• 172.16.3.0
• 172.16.5.0

Jawaban Cisco CCNA Discovery 3 Chapter 8

1.      Refer to the exhibit. A network administrator needs to add the command deny ip 10.0.0.0 0.255.255.255 any log to R3. After adding the command, the administrator verifies the change using the show access-list command. What sequence number does the new entry have?
• 0
• 10, and all other items are shifted down to the next sequence number
• 50
• 60


Jawaban Cisco CCNA Discovery 3 Chapter 7

1.      Why are Network Control Protocols used in PPP?
• to establish and terminate data links
• to provide authentication capabilities to PPP
• to manage network congestion and to allow quality testing of the link
• to allow multiple Layer 3 protocols to operate over the same physical link


Jawaban Cisco CCNA Discovery 3 Chapter 6

1
1.

1. Refer to the exhibit. What statement describes the DR/BDR relationship of the HQ router?
• HQ is the DR.

• HQ is the BDR.
• HQ is a DROTHER.
• HQ is a member of an NBMA network.

Jawaban Cisco CCNA Discovery 3 Chapter 4

1. A network engineer is implementing a network design using VLSM for network 192.168.1.0/24. After subnetting the network, the engineer has decided to take one of the subnets, 192.168.1.16/28 and subnet it further to provide for point-to-point serial link addresses. What is the maximum number of subnets that can be created from the 192.168.1.16/28 subnet for serial connections?
• 1
• 2
• 4
• 6
• 8
• 16
Jawab:
• 4

Jawaban Cisco CCNA Discovery 3 Chapter 3

1.
Refer to the exhibit. What two statements can be concluded from the information that is shown in the exhibit? (Choose two.)
• All ports that are listed in the exhibit are access ports.
• ARP requests from Host1 will be forwarded to Host2.
• Attaching Host1 to port 3 will automatically allow communication between both hosts.
• The default gateway for each host must be changed to 192.168.3.250/28 to allow communication between both hosts.

Jawaban Cisco CCNA Discovery 3 Chapter 2

1.      What type of connection point is a point of presence (POP)?
• between a client and a host
• between two local networks
• between a computer and a switch
between an ISP and an Enterprise network

Jawaban Cisco CCNA Discovery 3 Chapter 1


1.      What can be found at the enterprise edge?
Internet, VPN, and WAN modules
• Internet, PSTN, and WAN services
• server farms and network management
• campus infrastructure, including access layer devices

Sabtu, 04 Juni 2011

CCENT practice certification exam #2


1. Data is being sent from a source PC to a destination server. Which three statements correctly describe the function of TCP or UDP in this situation? (Choose three.)


The UDP destination port number identifies the application or service on the server which will handle the data.

TCP is the preferred protocol when a function requires lower network overhead.

UDP segments are encapsulated within IP packets for transport across the network.

The source port field identifies the running application or service that will handle data returning to the PC.

The TCP source port number identifies the sending host on the network.

The TCP process running on the PC randomly selects the destination port when establishing a session with the server.



2. In what two situations would UDP be the preferred transport protocol over TCP? (Choose two.)

when applications need to guarantee that a packet arrives intact, in sequence, and unduplicated

when a faster delivery mechanism is needed

when delivery overhead is not an issue

when applications do not need to guarantee delivery of the data

when destination port numbers are dynamic

Rabu, 11 Mei 2011

CCENT practice certification exam #1

1. What are two ways that TCP uses the sequence numbers in a segment? (Choose two.)
to identify missing segments at the destination
to reassemble the segments at the remote location
to specify the order in which the segments travel from source to destination
to limit the number of segments that can be sent out of an interface at one time
to determine if the packet changed during transit

2. Which three statements characterize UDP? (Choose three.)



Jawaban CCNA Discovery 2 Final Exam

CCNA DISCOVERY 2 FINAL EXAM VER. 4.1

1.     1.  How many host addresses may be assigned on each subnetwork when using the 130.68.0.0 network address with a subnet mask of 255.255.248.0?
30
256
*2046
2048
4094
4096

2.      2. In an IPv4 environment, what information is used by the router to forward data packets from one interface of a router to another?
*destination network address
source network address
source MAC address
well known port destination address


Minggu, 08 Mei 2011

Jawaban CCNA Discovery 2 chapter 9

CCNA DISCOVERY 2 CHAPTER 9

1. Refer to the exhibit. What are two possible causes for the interface status? (Choose two.)
The loopback address is not set.
*The encapsulation type is mismatched.
A cable is not attached to the interface.
*Keepalive messages are not being received.
The interface is administratively shut down.

2. A network administrator is upgrading a Cisco 1841 router by adding a WIC-2T module card. Which show command can the administrator use to verify that the module is correctly recognized by the router?
show flash:
*show version
show ip route
show startup-configuration


Jawaban CCNA Discovery 2 chapter 8

CCNA DISCOVERY 2 CHAPTER 8

1. Which benefit does SSH offer over Telnet when remotely managing a router?
*encryption
TCP usage
authorization
connection using six VTY lines

2. Which means of communication does an SNMP network agent use to provide a network management station with important but unsolicited information?


Jawaban CCNA Discovery 2 chapter 7

CCNA DISCOVERY 2 CHAPTER 7

1. A client is communicating with a server on a different segment of the network. How does the server determine what service is being requested by the client?
applies the default service configured in directory services
uses ARP to discover the appropriate service from the local router
sends a request to the client asking for the appropriate service
*identifies the appropriate service from the destination port field

2. What is the function of the TCP three-way handshake?
It enables the synchronization of port numbers between source and destination hosts.
It immediately triggers the retransmission of lost data.
*It synchronizes both ends of a connection by allowing both sides to agree upon initial sequence numbers.
It identifies the destination application on the receiving host.


Jawaban CCNA Discovery 2 chapter 6

CCNA DISCOVERY 2 CHAPTER 6

1. What is the purpose of a routing protocol?
It is used to build and maintain ARP tables.
It provides a method for segmenting and reassembling data packets.
It allows an administrator to devise an addressing scheme for the network.
*It allows a router to share information about known networks with other routers.
It provides a procedure for encoding and decoding data into bits for packet forwarding.

2. Why is fast convergence desirable in networks that use dynamic routing protocols?
Routers will not allow packets to be forwarded until the network has converged.
Hosts are unable to access their gateway until the network has converged.
*Routers may make incorrect forwarding decisions until the network has converged.
Routers will not allow configuration changes to be made until the network has converged.


Jawaban CCNA Discovery 2 chapter 5

CCNA DISCOVERY 2 CHAPTER 5

1. What is the correct command sequence to configure a router host name to "LAB_A"?
*Router> enable
Router# configure terminal
Router(config)# hostname LAB_A
Router> enable
Router# hostname LAB_A
Router> enable
Router# configure router
Router(config)# hostname LAB_A
Router> enable
Router(config)# host name LAB_A

2. Passwords can be used to restrict access to all or parts of the Cisco IOS. Select the modes and interfaces that can be protected with passwords. (Choose three.)
*VTY interface
*console interface
Ethernet interface
secret EXEC mode
*privileged EXEC mode
router configuration mode


Jawaban CCNA Discovery 2 chapter 4

CCNA DISCOVERY 2 CHAPTER 4

1. In an 8 bit binary number, what is the total number of combinations of the eight bits?
128
254
255
*256
512
1024

2. Convert the decimal number 231 into its binary equivalent. Select the correct answer from the list below.
11110010
11011011
11110110
*11100111
11100101
11101110


Jawaban CCNA Discovery 2 chapter 3

CCNA DISCOVERY 2 CHAPTER 3

1. A network technician is assigned to perform a site visit to a customer location to determine the requirements for a network upgrade. In addition to the currently installed equipment inventory, what other information about the hosts and networking devices should the technician obtain from the customer?
the cost of the currently installed equipment
all product keys for site license software
*any planned growth anticipated in the near future
the memory requirements for installed application software

2. Which three issues should be noted on the technician's site survey report? (Choose three.)
*unlabeled cables
only two power outlets per wall in each room
*poor physical security of network devices
horizontal cabling runs under 100 meters
*lack of UPS for critical devices
two users sharing the same computer


Jawaban CCNA Discovery 2 chapter 2

CCNA DISCOVERY 2 CHAPTER 2

1. The DHCP server in a lab environment is down when multiple DHCP clients in the lab are booted for the first time. Which two statements describe how the DHCP clients will be affected by the absence of a DHCP server during boot? (Choose two.)
The clients will not boot completely until the DHCP server resumes functioning.
The clients will attempt via the use of the IP address 127.0.0.1 to communicate with the other clients.
*All clients with link-local addresses will communicate with each other in a peer-to-peer manner.
*A link-local address will be automatically assigned to the hosts by the operating system.
A link-local process will use a DNS query to determine if any other device uses the same link-local address.

2. Which is a function of the transport layer of the OSI model?
routes data between networks
converts data to bits for transmission
*delivers data reliably across the network using TCP
formats and encodes data for transmission
transmits data to the next directly connected device


Jawaban CCNA Discovery 2 chapter 1

CCNA DISCOVERY 2 CHAPTER 1

1. When does a host device issue an ICMP echo request?
*to initiate a ping to determine if a destination address is reachable
to respond to a DNS name query
to broadcast its identity to its locally connected neighbors
to request the MAC address of a destination IP address

2. What is the maximum T1 transmission speed?
56 kbps
128 kbps
*1.544 Mbps
2.4 Mbps