Category: CCNA Discovery v4
1. Refer to the exhibit. Which type of twisted pair cable is used between each device? A=console, B=straight, C=crossover, D= crossover, E=straight A=straight, B=straight, C=straight, D=crossover, E=console A=crossover, B=straight, C=straight, D=crossover, E=crossover A=console, B=straight, C=straight, D=crossover, E=crossover A=console, B=crossover, C=crossover, D=straight, E=straight 2. Which three issues should be noted …
1. Which two functions are provided by the upper layers of the OSI model? (Choose two.) placing electrical signals on the medium for transmission initiating the network communication process encrypting and compressing data for transmission segmenting and identifying data for reassembly at the destination choosing the appropriate path …
1. Which network support services team is responsible for testing a new customer connection and for monitoring the ongoing operation of the link? customer service network operations help desk on-site installation 2. Which two things can be determined by using the ping command? (Choose two.) the number of …
1. A wireless DHCP client cannot connect to the Internet through a Linksys integrated router. When you type ipconfig on the host, no IP address, subnet mask, or default gateway shows. What are two of the first things you will check? (Choose two.) SSID the cable between client …
1. Refer to the exhibit. A host is having problems maintaining a connection to a server at 192.168.100.2. Which statement best describes the output of the ping command? The server is shut down. The server has no route back to the host. Two routers along the path are …
1. What should a network administrator do first after receiving a call from a user who cannot access the company web server? Reboot the web server. Replace the NIC of the computer. Ask the user to log off and log on again. Ask the user what URL has …
1. Identify three techniques used in social engineering. (Choose three.) fishing vishing phishing spamming pretexting junk mailing 2. During a pretexting event, how is a target typically contacted? by e-mail by phone in person through another person 3. While surfing the Internet, a user notices a box claiming …
1. Why is IEEE 802.11 wireless technology able to transmit further distances than Bluetooth technology? transmits at much lower frequencies has higher power output transmits at much higher frequencies uses better encryption methods 2. What are three advantages of wireless over wired technology? (Choose three.) more secure longer …
1. A user types www.cisco.com into a web browser address textbox. What does www.cisco.com represent? the IP address of a web server a physical network address the closest router interface to the source the source IP address in the data transmission 2. What type of server would use …
1. How large are IPv4 addresses? 8 bits 16 bits 32 bits 64 bits 128 bits 2. Refer to the graphic. A user at the workstation cannot connect to the server. All cables have been tested and are working and all devices have IP addressing. However, the user …