Docsity
Docsity

Prepare for your exams
Prepare for your exams

Study with the several resources on Docsity


Earn points to download
Earn points to download

Earn points by helping other students or get them with a premium plan


Guidelines and tips
Guidelines and tips

CCNA Practice Final Exam 1 Questions and Answers (Verified Answers) 2023.docx, Exams of Nursing

CCNA Practice Final Exam 1 Questions and Answers (Verified Answers) 2023.docx

Typology: Exams

2022/2023

Available from 09/07/2023

MacLarenn
MacLarenn 🇺🇸

4

(10)

1.1K documents

1 / 10

Toggle sidebar

This page cannot be seen from the preview

Don't miss anything!

bg1
CCNA Practice Final Exam 1 Questions and Answers
(Verified Answers)
What is the default subnet mask for an IP address of 64.100.19.14? - correct
answer 255.0.0.0.
A network administrator has been notified that users have experienced
problems gaining access to network resources. What utility could be used to
directly query a name server for information on a destination domain? -
correct answer lookup.
What does the term "attenuation" mean in data communication? - correct
answer loss of signal strength as distance increases.
What is the function of CSMA/CA on a wireless Ethernet network? - correct
answer to prevent collisions.
The area covered by a single AP is known as what? - correct answer basic
service set.
The help desk at a large packaging company receives a call from a user who
is concerned about lost data files on the local PC. The help desk technician
learns that the user clicked on an icon that appeared to be a program.
pf3
pf4
pf5
pf8
pf9
pfa

Partial preview of the text

Download CCNA Practice Final Exam 1 Questions and Answers (Verified Answers) 2023.docx and more Exams Nursing in PDF only on Docsity!

(Verified Answers)

What is the default subnet mask for an IP address of 64.100.19.14? - correct answer ✅255.0.0.0. A network administrator has been notified that users have experienced problems gaining access to network resources. What utility could be used to directly query a name server for information on a destination domain? - correct answer ✅lookup. What does the term "attenuation" mean in data communication? - correct answer ✅loss of signal strength as distance increases. What is the function of CSMA/CA on a wireless Ethernet network? - correct answer ✅to prevent collisions. The area covered by a single AP is known as what? - correct answer ✅basic service set. The help desk at a large packaging company receives a call from a user who is concerned about lost data files on the local PC. The help desk technician learns that the user clicked on an icon that appeared to be a program.

(Verified Answers)

update, but no updates were scheduled for that program. What type of attack has likely occurred? - correct answer ✅worm. Which installation option enables a single physical resource to function simultaneously as multiple logical resources? - correct answer ✅multi-boot. Which part of the electromagnetic spectrum is commonly used to exchange data between a PDA and a computer? - correct answer ✅infrared A company has a web server that must be accessible to both external and internal clients. Which security policy best practice should be followed to maximize security of the server? - correct answer ✅Place the web server in a DMZ What is specified by the host bits in an IP address? - correct answer ✅identity of the computer on the network. For an IP address, what component decides the number of bits that is used to represent the host ID? - correct answer ✅subnet mask.

(Verified Answers)

What is the purpose of spam filter software? - correct answer ✅It examines incoming e-mail messages to identify the unsolicited ones. A network engineer wants to represent confidential data in binary format. What are the two possible values that the engineer can use? (Choose two.) - correct answer ✅0, 1 Which protocol in its default configuration downloads e-mail messages to the client computer and deletes them from the server? - correct answer ✅POP Refer to the exhibit. A user on host A sends an e-mail to the user on host B. Which type of message does host A send? - correct answer ✅Unicast What are two best practices that are used when configuring a small home WLAN? (Choose two.) - correct answer ✅the encryption of the SSID, the use of pre-shared keys What type of message is sent to a specific group of hosts? - correct answer ✅Broadcast

(Verified Answers)

Refer to the exhibit. Why would a network administrator use the network mode that is shown? - correct answer ✅to support hosts that use different 802.11 standards A network technician is required to provide access to the Internet for a large company. What is needed to accomplish this task? - correct answer ✅ISP Which type of computer uses an integrated monitor and keyboard? - correct answer ✅Laptop Which transport layer protocol is used when an application requires acknowledgment that data has been delivered? - correct answer ✅TCP Refer to the exhibit. What cabling fault does the exhibit represent? - correct answer ✅split pair Which two statements are true about local applications? (Choose two.) - correct answer ✅They are stored on the local hard disk, They run on the computer where they are installed

(Verified Answers)

What is the purpose of creating a DMZ during network firewall implementation? - correct answer ✅to allow for a publicly accessible zone without compromising the internal network A user is unable to send e-mail. While troubleshooting this problem, the network technician first verifies the physical connectivity of cables. Which troubleshooting approach is being followed? - correct answer ✅bottom-up What is the function of the DNS server? - correct answer ✅It translates a computer or domain name to the associated IP address What layer is the first point of entry for a host into the network? - correct answer ✅access layer Your school network blocks all websites related to online gaming. What type of security policy is being applied? - correct answer ✅acceptable use A host sent a message that all other hosts on the switched local network received and processed. What type of domain are all these hosts a part of? - correct answer ✅Broadcast domain

(Verified Answers)

What are two examples of storage peripheral devices? (Choose two.) - correct answer ✅Flash drive, external DVD What type of cable would be required to connect a Linksys router to a wired PC? - correct answer ✅crossover cable Refer to the exhibit. What is the effect of setting the security mode to WEP on the Linksys integrated router? - correct answer ✅The WEP security mode encrypts network traffic during transmission between the AP and the wireless client In an attempt to verify connectivity, a user issues the ping command to a device that is not on the local network. The ping is unsuccessful. What can be determined from this result? - correct answer ✅Further troubleshooting will be required to reach a definite conclusion Which two causes of networking problems are related to the physical layer? (Choose two.) - correct answer ✅disconnected cables, improper operation of cooling fans

(Verified Answers)

command line utility can be used to confirm the multiple TCP connections? - correct answer ✅Ping