Wednesday, February 25, 2009

CCNA Discovery 1 - Module 3 Exam Answers Version 4.0

1. Which term is used to describe the process of placing one message format into another format so that the message can be delivered across the appropriate medium?
• flow control
• encapsulation
• encoding
• multicasting
• access method

2. Refer to the graphic. Five PCs are connected through a hub. If host H1 wants to reply to a message from host H2, which statement is true?
• H1 sends a unicast message to H2, but the hub forwards it to all devices.
• H1 sends a unicast message to H2, and the hub forwards it directly to H2.
• H1 sends a broadcast message to H2, and the hub forwards it to all devices.
• H1 sends a multicast message to H2, and the hub forwards it directly to H2.

3. Which two statements concerning networking standards are true? (Choose two.)
• adds complexity to networks
• encourages vendors to create proprietary protocols
• provides consistent interconnections across networks
• ensures that communications work best in a single-vendor environment
• simplifies new product development

4. What does the 100 mean when referencing the 100BASE-T Ethernet standard?
• type of cable used
• type of data transmission
• speed of transmission
• type of connector required
• maximum length of cable allowed

5. Which address does an NIC use when deciding whether to accept a frame?
• source IP address
• source MAC address
• destination IP address
• destination MAC address
• source Ethernet address

6. Which type of address is used in an Ethernet frame header?
• logical addresses only
• IP addresses only
• MAC addresses only
• broadcast addresses only

7. What is the function of the FCS field in an Ethernet frame?
• detects transmission errors
• provides timing for transmission
• contains the start of frame delimiter
• indicates which protocol will receive the frame

8. What is the purpose of logical addresses in an IP network?
• They identify a specific NIC on a host device.
• They are used to determine which host device accepts the frame.
• They provide vendor-specific information about the host.
• They are used to determine the network that the host is located on.
• They are used by switches to make forwarding decisions.

9. Which device accepts a message on one port and always forwards the message to all other ports?
• modem
• switch
• router
• hub

10. Which two networking devices are used to connect hosts to the access layer? (Choose two.)
• router
• hub
• switch

• server
• computer

11. Host A needs to learn the MAC address of Host B, which is on the same LAN segment. A message has been sent to all the hosts on the segment asking for the MAC address of Host B. Host B responds with its MAC address and all other hosts disregard the request. What protocol was used in this scenario?
• ARP
• DHCP
• DNS
• WINS

12. A switch receives a frame with a destination MAC address that is currently not in the MAC table. What action does the switch perform?
• It drops the frame.
• It sends out an ARP request looking for the MAC address.
• It floods the frame out of all active ports, except the origination port.
• It returns the frame to the sender.

13. What is a benefit of having a router within the distribution layer?
• prevents collisions on a local network
• keeps broadcasts contained within a local network
• controls which hosts have access to the network
• controls host-to-host traffic within a single local network

14. Refer to the graphic. What does the router do after it determines that a data packet from Network 1 should be forwarded to Network 2?
• It sends the data packet as it was received.
• It reassembles the frame with different MAC addresses than the original frame.
• It reassembles the data packet with different IP addresses than the original data packet.
• It reassembles both the packet and the frame with different destination IP and MAC addresses.

15. Which table does a router use to make decisions on where a data packet is to be sent?
• ARP table
• routing table
• network table
• forwarding table

16. If the default gateway is configured incorrectly on the host, what is the impact on communications?
• The host is unable to communicate on the local network.
• The host can communicate with other hosts on the local network, but is unable to communicate with hosts on remote networks.
• The host can communicate with other hosts on remote networks, but is unable to communicate with hosts on the local network.
• There is no impact on communications.

17. What device is typically used as the default gateway for a computer?
• a server hosted by the ISP
• the router interface closest to the computer
• a server managed by a central IT department
• the switch interface that connects to the computer

18. If a router receives a packet that it does not know how to forward, what type of route must be configured on the router to prevent the router from dropping it?
• dynamic route
• default route
• destination route
• default destination

19. Which two items are included in a network logical map? (Choose two.)
• naming scheme
• IP addressing scheme

• length of cable runs
• physical location of networking devices
• specific layout of interconnections between networking devices and hosts

20. An integrated router can normally perform the functions of which two other network devices? (Choose two.)
• NIC
• switch
• e-mail server
• application server
• wireless access point

21. What is a reason for disabling simple file sharing?
• It enables the user to map a remote resource with a local drive.
• It enables the user to share all files with all users and groups.
• It enables the user to share printers.
• It enables the user to set more specific security access levels.

CCNA Discovery 1 - Module 2 Exam Answers Version 4.0

1. An operating system is severely damaged. All data on the partition needs to be deleted, and all application software must be reinstalled. Which installation method should be used to correct the problem?
• clean install
• upgrade
• multi-boot
• virtualization

2. Which two statements should be included in a pre-installation checklist when upgrading an operating system? (Choose two.)
• Verify that the hardware resources have multiple partitions.
• Verify that the hardware resources meet or exceed the published minimum requirements.
• Complete a full backup of all important files and data.

• Overwrite any data currently contained on the drive to remove all contents.
• Verify that the hardware resources are certified to work with the existing operating system prior to upgrading.

3. Which three pieces of information must be specified on a computer to allow that computer to send and receive information across networks? (Choose three.)
• closest server
• operating system
• IP address
• subnet mask
• default gateway

• network card driver

4. Which two items must be unique to each computer and cannot be duplicated on a network? (Choose two.)
• partition
• file system
• computer name
• IP address

• operating system

5. Which method of interacting with an operating system involves typing commands at a command prompt?
• CLI
• GUI
• redirector
• kernel translator

6. What are three characteristics of an operating system that is released under the GPL (GNU Public License)? (Choose three.)
• full access to source code
• software often available free

• structured development cycle
• can be expensive to purchase
• limits what end-user can do with code
• support normally user-based and often free

7. What is the purpose of a default gateway?
• physically connects a computer to a network
• provides a permanent address to a computer
• identifies the network to which a computer is connected
• identifies the logical address of a networked computer and uniquely identifies it to the rest of the network
• identifies the device that allows local network computers to communicate with devices on other networks

8. Which two statements are true about drive partitions? (Choose two.)
• Partitions are necessary in multi-boot installations.
• A hard drive can be divided into an operating system partition and a data partition.

• User data is never overwritten when a drive is partitioned.
• A disk partition is a defined section of an operating system.
• Each partition requires a different file system type.

9. What occurs when computers are configured to receive their network configurations dynamically?
• Each computer receives a permanent IP address.
• A network administrator enters information on each computer.
• Each computer requests configuration information from a server.
• An NIC automatically provides configuration information to the computer and stores that configuration information.

10. What are two ways that a user can interact with an operating system shell? (Choose two.)
• CLI
• OS
• GUI
• NIC
• kernel

11. Which three resource specifications are given by the manufacturer to ensure that an operating system performs as designed? (Choose three.)
• required hard disk space
• type of accelerated graphics card
• recommended amount of RAM
• printer requirements
• processor type and speed
• type of keyboard

Friday, February 13, 2009

CCNA Discovery 1 Modul 1 Exam Answer V 4.0

1. Which computer component is considered the nerve center of the computer system and is responsible for processing all of the data within the machine?
• RAM
• CPU
• video card
• sound card
• operating system

2. What are two advantages of purchasing a preassembled computer? (Choose two.)
• usually a lower cost
• exact components may be specified
• extended waiting period for assembly
• adequate for performing most general applications
• suited for customers with special needs

3. A user plans to run multiple applications simultaneously on a computer. Which computer component is essential to accomplish this?
• RAM
• NIC
• video card
• sound card
• storage device

4. Which adapter card enables a computer system to exchange information with other systems on a local network?
• modem card
• controller card
• video card
• sound card
• network interface card

5. What is the main storage drive used by servers, desktops, and laptops?
• tape drive
• hard drive
• optical drive (DVD)
• floppy disk drive

6. Which component is designed to remove high-voltage spikes and surges from a power line so that they do not damage a computer system?
• CPU
• surge suppressor
• motherboard
• hard drive

7. What are two examples of output peripheral devices? (Choose two.)
• printer
• speakers

• flash drive
• external DVD
• external modem

8. What two functions does a UPS provide that a surge protector does not ? (Choose two.)
• protects the computer from voltage surges
• provides backup power from an internal battery
• protects the computer from sudden voltage spikes
• gives the user time to phone the electrical company
• gives the user time to safely shut down the computer if the power fails
• provides backup power through a generator provided by the wall outlet

9. What is a word processor?
• It is a physical computer component.
• It is a program designed to perform a specific function.
• It is a program that controls the computer resources.
• It is a functional part of an operating system.

10. What is the purpose of the ASCII code?
• translates bits into bytes
• interprets graphics digitally
• translates digital computer language into binary language
• represents letters, characters, and numbers with bits

11. Why do servers often contain duplicate or redundant parts?
• Servers require more power and thus require more components.
• Servers should be accessible at all times.
• Servers can be designed as standalone towers or rack mounted.
• Servers are required by networking standards to have duplicate parts.

12. What are two benefits of hooking up a laptop to a docking station? (Choose two.)
• Mobility is increased.
• An external monitor can be used.
• Alternate connectivity options may be available.

• The keyboard can be changed to a QWERTY-style keyboard.
• More wireless security options are available.

13. Applications can be grouped into general use software or industry specific software. What are two examples of industry specific software? (Choose two.)
• CAD
• presentation
• spreadsheet
• word processing
• medical practice management
• contacts/scheduling management

14. Which three terms describe different types of computers? (Choose three.)
• operating system
• network
• laptop
• desktop

• Windows
• mainframe

15. How is a server different from a workstation computer?
• The server works as a standalone computer.
• The server provides services to clients.
• The workstation has fewer applications installed.
• The workstation has more users who attach to it.

16. How many values are possible using a single binary digit?
• 1
• 2
• 4
• 8
• 9
• 16

17. What measurement is commonly associated with computer processing speed?
• bits
• pixels
• hertz
• bytes

18. What can be used to prevent electrostatic discharge (ESD)?
• dry and non humid conditions
• carpeted floor
• grounding strap
• uncluttered work space

19. If a peripheral device is not functioning, what are three things you should do to solve the problem? (Choose three.)
• Use the testing functionality on the peripheral itself, if available.
• Verify that all cables are connected properly.

• Disconnect all cables connected to the computer except those connected to the peripheral.
• Ensure that the peripheral is powered on.
• Disconnect the peripheral and verify that the computer is operating normally.
• Reload the computer operating system.

20. Which two steps should be performed when installing a peripheral device? (Choose two.)
• Download and install the most current driver.
• Connect the peripheral using any cable and any available port on the computer.
• Connect the peripheral using an appropriate cable or wireless connection.
• Test the peripheral on another machine before installing it on the one where it will be used.
• Check the computer documentation to see if the peripheral vendor is compatible with the PC vendor.

21. In newer operating systems, how are system resources assigned by default when components are installed?
• manually assigned by the operating system
• manually assigned by the administrator
• statically assigned by the component to a preset resource
• dynamically assigned between the component and the operating system