DHomesb Chapter 9 - CCNA Discovery: Networking for Home and Small Businesses (Version 4.0)

9:41 AM Add Comment
CCNA Discovery: Networking for Home and Small Businesses (Version 4.0)  | Andri Jaya Sukma | Noname Cyber
DHomesb Chapter 9 - CCNA Discovery: Networking for Home and Small Businesses (Version 4.0)

1
A technician is unsuccessful in establishing a console session between a PC and a Linksys integrated router. Both devices have power, and a cable is connected between them. Which two troubleshooting steps could help to diagnose this problem? (Choose two.)
#Ensure the correct cable is used.
#Ensure the link status LED on the integrated router is lit.

2
Identify two physical-layer network problems. (Choose two.)
#hardware failure
#loose cable connections

3
Only one workstation on a particular network cannot reach the Internet. What is the first troubleshooting step if the divide-and-conquer method is being used?
#Check the workstation TCP/IP configuration.

4
Which two troubleshooting techniques are suitable for both home networks and large corporate networks? (Choose two.)
#documenting the troubleshooting process
#keeping a record of system upgrades and software versions

5
What two items could be checked to verify connectivity between the router and the ISP? (Choose two.)
#router status page
#connectivity status as indicated by LEDs

6
When acting as a DHCP server, what three types of information can an ISR provide to a client? (Choose three.)
#default gateway
#dynamic IP address
#DNS server address

7
A customer called the cable company to report that the Internet connection is unstable. After trying several configuration changes, the technician decided to send the customer a new cable modem to try. What troubleshooting technique does this represent?
#substitution

8
Which troubleshooting method begins by examining cable connections and wiring issues?
#bottom-up

9
What command is used to determine the location of delay for a packet traversing the Internet?
#tracert

10
A technician suspects that a Linksys integrated router is the source of a network problem. While troubleshooting, the technician notices a blinking green activity LED on some of the ports. What does this indicate?
#The ports are operational and are receiving traffic.

11
Which three settings must match on the client and access point for a wireless connection to occur? (Choose three.)
#SSID
#authentication
#encryption key

12
What should a network administrator do first after receiving a call from a user who cannot access the company web server?
#Ask the user what URL has been typed and what error message displays.

13

Refer to the graphic. What configuration is incorrect in the network shown?
#The wired connection is the wrong type of cable.

14
A technician is troubleshooting a security breach on a new wireless access point. Which three configuration settings make it easy for hackers to gain access? (Choose three.)
#broadcasting the SSID
#using open authentication
#using the default internal IP address

15

Refer to the graphic. What configuration is incorrect in the network shown?
#The host IP address is incorrect.

16
Typically, help desk personnel assist end users in which two tasks? (Choose two.)
#identifying when the problem occurred
#implementing the solution to the problem

17
Network baselines should be performed in which two situations? (Choose two.)
#after the network is installed and running optimally
#after major changes are implemented on the network

18
Which two items should be added to the documentation following a troubleshooting event? (Choose two.)
#final resolution
#results of successful and unsuccessful troubleshooting steps

19
A PC is plugged into a switch and is unable to connect to the network. The UTP cable is suspected. What could be the problem?
#A crossover cable is being used.

20
Which ipconfig command requests IP configuration from a DHCP server?
#ipconfig /renew

21

Refer to the graphic. The wireless host cannot access the Internet, but the wired host can. What is the problem?
#The host WEP key is incorrect.

22
How does remote-access software help in the troubleshooting process?
#Diagnostics can be run without a technician being present at the site.

23
What command is used to determine if a DNS server is providing name resolution?
#nslookup

Or
1
What should a network administrator do first after receiving a call from a user who cannot access the company web server?
Reboot the web server.
Replace the NIC of the computer.
Ask the user to log off and log on again.
Ask the user what URL has been typed and what error message displays.

2
A customer called the cable company to report that the Internet connection is unstable. After trying several configuration changes, the technician decided to send the customer a new cable modem to try. What troubleshooting technique does this represent?
top-down
bottom-up
substitution
trial-and-error
divide-and-conquer

3
Only one workstation on a particular network cannot reach the Internet. What is the first troubleshooting step if the divide-and-conquer method is being used?
Check the NIC, and then check the cabling.
Check the workstation TCP/IP configuration.
Test all cables, and then test layer by layer up the OSI model.
Attempt to Telnet, and then test layer by layer down the OSI model.

4
Which two troubleshooting techniques are suitable for both home networks and large corporate networks? (Choose two.)
having a backup ISR
running network monitoring applications
documenting the troubleshooting process
keeping a record of system upgrades and software versions
keeping spare switches, routers, and other equipment available

5
Identify two physical-layer network problems. (Choose two.)
hardware failure
software configuration
devices not able to ping
loose cable connections
device driver configuration

6
Which ipconfig command requests IP configuration from a DHCP server?
ipconfig
ipconfig /all
ipconfig /renew
ipconfig /release

7
What command is used to determine the location of delay for a packet traversing the Internet?
ipconfig
netstat
nslookup
ping
tracert

8
What command is used to determine if a DNS server is providing name resolution?
ipconfig
netstat
nslookup
tracert

9
Which troubleshooting method begins by examining cable connections and wiring issues?
top-down
bottom-up
substitution
divide-and-conquer

10
A technician suspects that a Linksys integrated router is the source of a network problem. While troubleshooting, the technician notices a blinking green activity LED on some of the ports. What does this indicate?
Self-diagnostics have not completed.
The power supply is the source of the problem.
The ports are operational and are receiving traffic.
The ports are operational, but no traffic is flowing.
There are no cables plugged into those ISR ports.
The ports have cables plugged in, but they are not functional.

11
A PC is plugged into a switch and is unable to connect to the network. The UTP cable is suspected. What could be the problem?
A straight-through cable is being used
The connectors at both ends of the cable are RJ-45.
The RJ-45 connectors are crimped onto the cable jacket.
A crossover cable is being used.

12
Refer to the graphic. What configuration is incorrect in the network shown?
The host IP address is incorrect.
The host subnet mask is incorrect.
The host default gateway is incorrect.
The wired connection is the wrong type of cable.
The Linksys integrated router does not support wireless.

13
Which three settings must match on the client and access point for a wireless connection to occur? (Choose three.)
SSID
authentication
MD5 checksum
antennae type
encryption key
MAC address filters

14
A technician is troubleshooting a security breach on a new wireless access point. Which three configuration settings make it easy for hackers to gain access? (Choose three.)
configuring NAT
broadcasting the SSID
using open authentication
enabling MAC address filters
using the default internal IP address
using DHCP to provide IP addresses

15

Refer to the graphic. The wireless host cannot access the Internet, but the wired host can. What is the problem?
The host WEP key is incorrect.
The host IP address is incorrect.
The host subnet mask is incorrect.
The host default gateway is incorrect.
The integrated router internal IP address is incorrect.
The integrated router Internet IP address is incorrect.

16


Refer to the graphic. What configuration is incorrect in the network shown?
The host IP address is incorrect.
The host subnet mask is incorrect.
The host default gateway is incorrect.
The wired connection is the wrong type of cable.
The Linksys integrated router does not support wireless.

17
When acting as a DHCP server, what three types of information can an ISR provide to a client? (Choose three.)
physical address
MAC address
default gateway
static IP address
dynamic IP address
DNS server address

18
What two items could be checked to verify connectivity between the router and the ISP? (Choose two.)
router status page
wireless card settings
router operating system version
local host operating system version
connectivity status as indicated by LEDs

19
A technician is unsuccessful in establishing a console session between a PC and a Linksys integrated router. Both devices have power, and a cable is connected between them. Which two troubleshooting steps could help to diagnose this problem? (Choose two.)
Ensure the correct cable is used.
Ensure the SSID is the same on both devices.
Ensure both devices have the same IP address.
Ensure both devices have different subnet masks.
Ensure the encryption type on both devices match.
Ensure the link status LED on the integrated router is lit.

20
Network baselines should be performed in which two situations? (Choose two.)
after the network is installed and running optimally
after a virus outbreak is discovered on the network
after major changes are implemented on the network
after several computers are added to the network
at the end of the work week

21
Typically, help desk personnel assist end users in which two tasks? (Choose two.)
identifying when the problem occurred
determining if other users are currently logged into the computer
updating network diagrams and documentation
implementing the solution to the problem
running a network baseline test
determining the cost of fixing the problem

22
How does remote-access software help in the troubleshooting process?
Remote access uses a live chat feature.
Users have to be present so that they can view LEDs and change cables if necessary.
Diagnostics can be run without a technician being present at the site.
FAQs can be consulted more easily.

23
Which two items should be added to the documentation following a troubleshooting event? (Choose two.)
final resolution
repetitive measures
number of people involved in the problem
accurate current network infrastructure diagrams
results of successful and unsuccessful troubleshooting steps

DHomesb Chapter 8 - CCNA Discovery: Networking for Home and Small Businesses (Version 4.0)

9:29 AM Add Comment
CCNA Discovery: Networking for Home and Small Businesses (Version 4.0)  | Andri Jaya Sukma | Noname Cyber
DHomesb Chapter 8 - CCNA Discovery: Networking for Home and Small Businesses (Version 4.0)

1
Identify three techniques used in social engineering. (Choose three.)
#vishing
#phishing
#pretexting

2
A flood of packets with invalid source-IP addresses requests a connection on the network. The server busily tries to respond, resulting in valid requests being ignored. What type of attack occurred?
#SYN flooding

3
While surfing the Internet, a user notices a box claiming a prize has been won. The user opens the box unaware that a program is being installed. An intruder now accesses the computer and retrieves personal information. What type of attack occurred?
#Trojan horse

4
What is a major characteristic of a Worm?
#exploits vulnerabilities with the intent of propagating itself across a network

5
During a pretexting event, how is a target typically contacted?
#by phone

6
What term is used to describe a dedicated hardware device that provides firewall services?
#appliance-based

7

Refer to the graphic. In the Linksys Security menu, what does the SPI Firewall Protection option Enabled provide?
#It requires that packets coming into the router be responses to internal host requests.

8
Many best practices exist for wired and wireless network security. The list below has one item that is not a best practice. Identify the recommendation that is not a best practice for wired and wireless security.
#Disable the wireless network when a vulnerability analysis is being performed.

9
What environment would be best suited for a two-firewall network design?
#a large corporate environment

10
Which statement is true about port forwarding within a Linksys integrated router?
#Only external traffic that is destined for specific internal ports is permitted. All other traffic is denied.

11
Which two statements are true concerning anti-spam software? (Choose two.)
#When anti-spam software is loaded, legitimate e-mail may be classified as spam by mistake.
#Even with anti-spam software installed, users should be careful when opening e-mail attachments.

12
What type of advertising is typically annoying and associated with a specific website that is being visited?
#popups

13
To which part of the network does the wireless access point part of a Linksys integrated router connect?
#internal

14
What statement is true about security configuration on a Linksys integrated router?
#Internet access can be denied for specific days and times.

15
Which abbreviation refers to an area of the network that is accessible by both internal, or trusted, as well as external, or untrusted, host devices?
#DMZ

16
Which statement is true regarding anti-virus software?
#Only after a virus is known can an anti-virus update be created for it.

17
What is one function that is provided by a vulnerability analysis tool?
#It identifies missing security updates on a computer.

18
What part of the security policy states what applications and usages are permitted or denied?
#acceptable use

19
What best practice relates to wireless access point security?
#a change of the default IP address

20
What is a widely distributed approach to marketing on the Internet that advertises to as many individual users as possible via IM or e-mail?
#spam

Or
1
Identify three techniques used in social engineering. (Choose three.)
fishing
vishing
phishing
spamming
pretexting
junk mailing

2
During a pretexting event, how is a target typically contacted?
by e-mail
by phone
in person
through another person

3
While surfing the Internet, a user notices a box claiming a prize has been won. The user opens the box unaware that a program is being installed. An intruder now accesses the computer and retrieves personal information. What type of attack occurred?
worm
virus
Trojan horse
denial of service

4
What is a major characteristic of a Worm?
malicious software that copies itself into other executable programs
tricks users into running the infected software
a set of computer instructions that lies dormant until triggered by a specific event
exploits vulnerabilities with the intent of propagating itself across a network

5
A flood of packets with invalid source-IP addresses requests a connection on the network. The server busily tries to respond, resulting in valid requests being ignored. What type of attack occurred?
Trojan horse
brute force
ping of death
SYN flooding

6
What type of advertising is typically annoying and associated with a specific website that is being visited?
adware
popups
spyware
tracking cookies

7
What is a widely distributed approach to marketing on the Internet that advertises to as many individual users as possible via IM or e-mail?
brute force
spam
spyware
tracking cookies

8
What part of the security policy states what applications and usages are permitted or denied?
identification and authentication
remote access
acceptable use
incident handling

9
Which statement is true regarding anti-virus software?
Only e-mail programs need to be protected.
Only hard drives can be protected.
Only after a virus is known can an anti-virus update be created for it.
Only computers with a direct Internet connection need it.

10
Which two statements are true concerning anti-spam software? (Choose two.)
Anti-spam software can be loaded on either the end-user PC or the ISP server, but not both.
When anti-spam software is loaded, legitimate e-mail may be classified as spam by mistake.
Installing anti-spam software should be a low priority on the network.
Even with anti-spam software installed, users should be careful when opening e-mail attachments.
Virus warning e-mails that are not identified as spam via anti-spam software should be forwarded to other users immediately.

11
What term is used to describe a dedicated hardware device that provides firewall services?
server-based
integrated
personal
appliance-based

12
Which abbreviation refers to an area of the network that is accessible by both internal, or trusted, as well as external, or untrusted, host devices?
SPI
DMZ
ISR
ISP

13
Which statement is true about port forwarding within a Linksys integrated router?
Only external traffic that is destined for specific internal ports is permitted. All other traffic is denied.
Only external traffic that is destined for specific internal ports is denied. All other traffic is permitted.
Only internal traffic that is destined for specific external ports is permitted. All other traffic is denied.
Only internal traffic that is destined for specific external ports is denied. All other traffic is permitted.

14
To which part of the network does the wireless access point part of a Linksys integrated router connect?
DMZ
external
internal
a network other than the wired network

15
What statement is true about security configuration on a Linksys integrated router?
A DMZ is not supported.
The router is an example of a server-based firewall.
The router is an example of an application-based firewall.
Internet access can be denied for specific days and times.

16
What environment would be best suited for a two-firewall network design?
a large corporate environment
a home environment with 10 or fewer hosts
a home environment which requires secure VPN access
a small business environment which is experiencing continuing DDoS attacks

17
What is one function that is provided by a vulnerability analysis tool?
It provides various views of possible attack paths.
It identifies missing security updates on a computer.
It identifies wireless weak points such as rogue access points.
It identifies all network devices on the network that do not have a firewall installed.
It identifies MAC and IP addresses that have not been authenticated on the network.

18
Many best practices exist for wired and wireless network security. The list below has one item that is not a best practice. Identify the recommendation that is not a best practice for wired and wireless security.
Periodically update anti-virus software.
Be aware of normal network traffic patterns.
Periodically update the host operating system.
Activate the firewall on a Linksys integrated router.
Configure login permissions on the integrated router.
Disable the wireless network when a vulnerability analysis is being performed.

19
What best practice relates to wireless access point security?
activation of a popup stopper
a change of the default IP address
an update in the antivirus software definitions
physically securing the cable between the access point and client

20
CCNA Discovery: Networking for Home and Small Businesses (Version 4.0)  | Andri Jaya Sukma | Noname Cyber

Refer to the graphic. In the Linksys Security menu, what does the SPI Firewall Protection option Enabled provide?
It prevents packets based on the application that makes the request.
It allows packets based on approved internal MAC or IP addresses.
It requires that packets coming into the router be responses to internal host requests.
It translates an internal address or group of addresses into an outside, public address.

DHomesb Chapter 7 - CCNA Discovery: Networking for Home and Small Businesses (Version 4.0)

10:30 PM Add Comment
Windows 7 - IT Essentials: PC Hardware and Software (Version 4.1)  | Andri Jaya Sukma | Noname Cyber


DHomesb Chapter 7 - CCNA Discovery: Networking for Home and Small Businesses (Version 4.0)

1
Complete the following sentence: WEP is used to ______ , and EAP is used to _____ wireless networks.
#encrypt; authenticate users on

2
What are three advantages of wireless over wired technology? (Choose three.)
#anytime, anywhere connectivity
#ease of adding additional devices

3
A technician has been asked to provide wireless connectivity to the wired Ethernet network of a building. Which three factors affect the number of access points needed? (Choose three.)
#the size of the building
#the number of solid interior walls in the building
#the presence of microwave ovens in several offices

4
Which statement is true concerning wireless bridges?
#connects two networks with a wireless link

5


Refer to the graphic. In the Wireless menu option of a Linksys integrated router, what does the Network Mode option Mixed mean?
#The router supports 802.11b, 802.11g, and 802.11n devices.

6
Why is IEEE 802.11 wireless technology able to transmit further distances than Bluetooth technology?
#has higher power output

7
Which statement is true concerning an ad-hoc wireless network?
#created by connecting wireless clients in a peer-to-peer network

8
What is the difference between using open authentication and pre-shared keys?
#Pre-shared keys require an encrypted secret word. Open authentication does not require a secret word.

9
Which statement is true about open authentication when it is enabled on an access point?
#requires no authentication

10
Which WLAN component is commonly referred to as an STA?
#wireless client

11
Which two statements about a service set identifier (SSID) are true? (Choose two.)
#tells a wireless device to which WLAN it belongs
#all wireless devices on the same WLAN must have the same SSID

12
Why is security so important in wireless networks?
#Wireless networks broadcast data over a medium that allows easy access.

13
What term describes the encoding of wireless data to prevent intercepted data from being read by a hacker?
#encryption

14
What type of authentication do most access points use by default?
#Open

15
What are two authentication methods that an access point could use? (Choose two.)
#EAP
#pre-shared keys

16
What are two benefits of wireless networking over wired networking? (Choose two.)
#mobility
#reduced installation time

17


Refer to the graphic. In the Wireless menu of a Linksys integrated router, what configuration option allows the presence of the access point to be known to nearby clients?
#SSID Broadcast

18
What are the two WEP key lengths? (Choose two.)
#64 bit
#128 bit

19
Which two statements characterize wireless network security? (Choose two.)
#With SSID broadcast disabled, an attacker must know the SSID to connect.
#Using the default IP address on an access point makes hacking easier.

20
What does the Wi-Fi logo indicate about a wireless device?
#The device is interoperable with other devices of the same standard that also display the Wi-Fi logo.

21
What access-point feature allows a network administrator to define what type of data can enter the wireless network?
#traffic filtering

Or
1
Why is IEEE 802.11 wireless technology able to transmit further distances than Bluetooth technology?
transmits at much lower frequencies
has higher power output
transmits at much higher frequencies
uses better encryption methods

2
What are three advantages of wireless over wired technology? (Choose three.)
more secure
longer range
anytime, anywhere connectivity
easy and inexpensive to install
ease of using licensed air space
ease of adding additional devices

3
What are two benefits of wireless networking over wired networking? (Choose two.)
speed
security
mobility
reduced installation time
allows users to share more resources
not susceptible to interference from other devices

4
A technician has been asked to provide wireless connectivity to the wired Ethernet network of a building. Which three factors affect the number of access points needed? (Choose three.)
the size of the building
the number of solid interior walls in the building
the presence of microwave ovens in several offices
the encryption method used on the wireless network
the use of both Windows and Appletalk operating systems
the use of shortwave or infrared on the AP

5
Why is security so important in wireless networks?
Wireless networks are typically slower than wired networks.
Televisions and other devices can interfere with wireless signals.
Wireless networks broadcast data over a medium that allows easy access.
Environmental factors such as thunderstorms can affect wireless networks.

6
What does the Wi-Fi logo indicate about a wireless device?
IEEE has approved the device.
The device is interoperable with all other wireless standards.
The device is interoperable with other devices of the same standard that also display the Wi-Fi logo.
The device is backwards compatible with all previous wireless standards.

7
Which statement is true concerning wireless bridges?
connects two networks with a wireless link
stationary device that connects to a wireless LAN
allows wireless clients to connect to a wired network
increases the strength of a wireless signal

8
Which WLAN component is commonly referred to as an STA?
cell
antenna
access point
wireless bridge
wireless client

9
Which statement is true concerning an ad-hoc wireless network?
created by connecting wireless clients in a peer-to-peer network
created by connecting wireless clients to a single, centralized AP
created by connecting multiple wireless basic service sets through a distribution system
created by connecting wireless clients to a wired network using an ISR

10
Refer to the graphic. In the Wireless menu option of a Linksys integrated router, what does the Network Mode option Mixed mean?
The router supports encryption and authentication.
The router supports both wired and wireless connections.
The router supports 802.11b, 802.11g, and 802.11n devices.
The router supports connectivity through infrared and radio frequencies.

11
Refer to the graphic. In the Wireless menu of a Linksys integrated router, what configuration option allows the presence of the access point to be known to nearby clients?
Network Mode
Network Name (SSID)
Radio Band
Wide Channel
Standard Channel
SSID Broadcast

12
Which two statements about a service set identifier (SSID) are true? (Choose two.)
tells a wireless device to which WLAN it belongs
consists of a 32-character string and is not case sensitive
responsible for determining the signal strength
all wireless devices on the same WLAN must have the same SSID
used to encrypt data sent across the wireless network

13
Which two statements characterize wireless network security? (Choose two.)
Wireless networks offer the same security features as wired networks.
Wardriving enhances security of wireless networks.
With SSID broadcast disabled, an attacker must know the SSID to connect.
Using the default IP address on an access point makes hacking easier.
An attacker needs physical access to at least one network device to launch an attack.

14
What type of authentication do most access points use by default?
Open
PSK
WEP
EAP

15
Which statement is true about open authentication when it is enabled on an access point?
requires no authentication
uses a 64-bit encryption algorithm
requires the use of an authentication server
requires a mutually agreed upon password

16
What are two authentication methods that an access point could use? (Choose two.)
WEP
WPA
EAP
ASCII
pre-shared keys

17
What is the difference between using open authentication and pre-shared keys?
Open authentication requires a password. Pre-shared keys do not require a password.
Open authentication is used with wireless networks. Pre-shared keys are used with wired networks.
Pre-shared keys require an encrypted secret word. Open authentication does not require a secret word.
Pre-shared keys require a MAC address programmed into the access point. Open authentication does not require this programming.

18
What term describes the encoding of wireless data to prevent intercepted data from being read by a hacker?
address filtering
authentication
broadcasting
encryption
passphrase encoding

19
What access-point feature allows a network administrator to define what type of data can enter the wireless network?
encryption
hacking block
traffic filtering
MAC address filtering
authentication

20
What are the two WEP key lengths? (Choose two.)
8 bit
16 bit
32 bit
64 bit
128 bit

21
Complete the following sentence: WEP is used to ______ , and EAP is used to _____ wireless networks.
encrypt; authenticate users on
filter traffic; select the operating frequency for
identify the wireless network; compress data on
create the smallest wireless network; limit the number of users on