CCNA Discovery 2 : Chapter 9

1. What two actions will the EIGRP DUAL FSM take if a link to a network goes down? (Choose two.)
put the route into passive mode
query neighbors for a new route
search routing table for a feasible successor
run the SPF algorithm to find a new successor
search topology table for a feasible successor

CCNA Discovery 2 : Chapter 8

1.

CCNA Discovery 2 : Chapter 7

1. A network administrator has been told that the company IP address infrastructure must adhere to RFC 1918. What three IP address ranges from RFC 1918 could the administrator use on the network? (Choose three.)
10.0.0.0/8
127.0.0.0/8
169.254.0.0/16
172.16.0.0/12
192.168.0.0/16
209.165.201.0/27

CCNA Discovery 2 : Chapter 6

CCNA 2 Chapter 6 2011 V4.0 Answers 100%
1. What two advantages does CIDR provide to a network? (Choose two.)
reduced routing table size
dynamic address assignment
automatic route redistribution
reduced routing update traffic
automatic summarization at classful boundaries

CCNA Discovery 2 : Chapter 5

CCNA 2 Chapter 5 2011 V4.0 Answers 100%
1.

Refer to the exhibit. The network that is shown is running RIPv1. The 192.168.10.0/24 network was recently added and will only contain end users. What command or set of commands should be entered on Router1 to prevent RIPv1 updates from being sent to the end user devices on the new network while still allowing this new network to be advertised to other routers?
Router1(config-router)# no router rip Router1(config-router)# network 192.168.10.0
Router1(config-router)# no network 192.168.10.0
Router1(config-router)# passive-interface fastethernet 0/0
Router1(config-router)# passive-interface serial 0/0/0

CCNA Discovery 2 : Chapter 4

1.

What actions will occur after RouterA loses connectivity to network 114.125.16.0? (Choose two.)
RouterB will include network 123.92.76.0 and 136.125.85.0 in its update to RouterA.
During the next update interval, RouterB will send a RIP update out both ports that includes the inaccessible network.
During the next update interval, RouterC will send an update to RouterB stating that network 114.125.16.0 is accessible in 2 hops.
Router C will learn of the loss of connectivity to network 114.125.16.0 from RouterB.
RouterB will include network 123.92.76.0 and 136.125.85.0 in its update to RouterC.

CCNA Discovery 2 : Chapter 3

1. Which two statements correctly describe the concepts of administrative distance and metric? (Choose two.)
Administrative distance refers to the trustworthiness of a particular route.
A router first installs routes with higher administrative distances.

The value of the administrative distance can not be altered by the network administrator.
Routes with the smallest metric to a destination indicate the best path.
The metric is always determined based on hop count.
The metric varies depending which Layer 3 protocol is being routed, such as IP or IPX.

CCNA Discovery 2 : Chapter 2

1. A static route that points to the next hop IP will have what administrative distance and metric in the routing table?
administrative distance of 0 and metric of 0
administrative distance of 0 and metric of 1
administrative distance of 1 and metric of 0
administrative distance of 1 and metric of 1

CCNA Discovery 2 : Chapter 1 v 4.1

1. What two actions will the EIGRP DUAL FSM take if a link to a network goes down? (Choose two.)
put the route into passive mode
query neighbors for a new route
search routing table for a feasible successor
run the SPF algorithm to find a new successor
search topology table for a feasible successor

Hina Sahabat Nabi: Guru Minta Maaf

 Hina Sahabat Nabi: Guru Minta Maaf

Suami dan Isteri Hamil Tujuh Bulan Maut Dirempuh

 Suami Dan Isterinya Yang Hamil Tujuh Bulan Maut Dirempuh Bas Sekolah

CCNA Discovery 1 Final 2012 Exam Answers #ALLinONE

Which network design layer provides a connection point for end user devices to the network?
access
core
distribution
#network

CCNA Discovery 1 Final 2012 Exam Answers #10

1
Bottom-up troubleshooting begins at which layer of the OSI model?
network layer
#physical layer
data link layer
transport layer
application layer

CCNA Discovery 1 Final 2012 Exam Answers #9

When terminating a UTP cable, why is it important to push the wires all the way into the end of the connector?
to allow the cable to endure more stretching or twisting
to ensure good electrical contact
to ensure that the wires are in correct order
to minimize crosstalk

CCNA Discovery 1 Final 2012 Exam Answers #8

1
Refer to the exhibit. The security policy of an organization allows employees to connect to the office intranet from their homes. Which type of security policy is this?
    remote access

CCNA Discovery 1 Final 2012 Exam Answers #7

1
What is the purpose of TCP?
to manage data links and physical network transmissions
to specify the format of requests and responses that are exchanged between the client and server
*to assign the logical address and encapsulate the request into packets for routing to the destination
to provide flow control and acknowledgment of packets that are exchanged between the client and server

CCNA Discovery 1 Final 2012 Exam Answers #6

1. What is the purpose of TCP?
>to assign the logical address and encapsulate the request into packets for routing to the destination

CCNA Discovery 1 Final 2012 Exam Answers #5

1
How does a crossover cable connect two routers?
    It connects the pins that are used for transmitting on one router to the pins that are used for receiving on the other router.

CCNA Discovery 1 Final 2012 Exam Answers #4

1
Which protocol in its default configuration downloads e-mail messages to the client computer and deletes them from the server?
FTP
POP3
SMTP
IMAP4

CCNA Discovery 1 Final 2012 Exam Answers #3

CCNA Discovery 1 - Final Exam Answers Version 4.0
1. Which three statements are true about local and network applications? (Choose three.)
• A local application is loaded in a local computer and can be accessed by a remote computer on the network.
• A network application is loaded in a local computer and accessed from a remote computer.
• A local application is loaded in a local computer and accessed only by the local computer.
• A network application is loaded in a local computer and accessed only by the local computer.
• An example of a local application is e-mail.

CCNA Discovery 1 Final 2012 Exam Answers #2

1. When must a router serial interface be configured with the clock rate command?
when the interface is functioning as a DTE device
when the interface timers have been cleared
when the connected DTE device is shut down
when the interface is functioning as a DCE device

CCNA Discovery 1 Final 2012 Exam Answers #1

Which of the following are the address ranges of the private IP addresses? (Choose three.)
10.0.0.0 to 10.255.255.255
200.100.50.0 to 200.100.25.255
150.150.0.0 to 150.150.255.255
172.16.0.0 to 172.31.255.255
192.168.0.0 to 192.168.255.255

127.16.0.0 to 127.31.255.255

TUN DR. MAHATHIR MOHAMAD : Perjalanan Seorang Pemimpin



CCNA Discovery Chapter 2 : Networking for Home and Small Businesses (Version 4.0)

1.        Which method of interacting with an operating system involves typing commands at a command prompt?
    #CLI

2.       What occurs when computers are configured to receive their network configurations dynamically?
    #Each computer requests configuration information from a server.

CCNA Discovery Chapter 3 : Networking for Home and Small Businesses (Version 4.0)


Which two statements concerning networking standards are true? (Choose two.)
    #provides consistent interconnections across networks
    #simplifies new product development

Which two items are included in a network logical map? (Choose two.)
    #naming scheme
    #IP addressing scheme
 

CCNA Discovery Chapter 4: Networking for Home and Small Businesses (Version 4.0)


1
Which definition describes the term Internet?
#a network of networks that connects countries around the world

2
What type of connection point is a point of presence (POP)?
#between an ISP and a home-based LAN

CCNA Discovery Chapter 5: Networking for Home and Small Businesses (Version 4.0)


1  
Which two statements describe packets that are sent through a Linksys integrated router using NAT? (Choose two.)
    #Packets that are sent to a destination outside the local network need to be translated.
    #Packets that are sent between hosts on the same local network do not need to be translated.

2  
A PC obtains its IP address from a DHCP server. If the PC is taken off the network for repair, what happens to the IP address configuration?
    #The address is returned to the pool for reuse when the lease expires.
  

CCNA Discovery Chapter 6 : Networking for Home and Small Businesses (Version 4.0)


1  
What is the correct order of the layers of the OSI reference model, starting at the lowest layer and working up the model?
    #physical, data link, network, transport, session, presentation, application
  
2   
What three items are contained in an Ethernet header and trailer? (Choose three.)
    #source MAC address
    #destination MAC address
    #error-checking information

CCNA Discovery Chapter 7 : Networking for Home and Small Businesses (Version 4.0)

1
Complete the following sentence: WEP is used to ______ , and EAP is used to _____ wireless networks.
#encrypt; authenticate users on

2
What are three advantages of wireless over wired technology? (Choose three.)
#anytime, anywhere connectivity
#ease of adding additional devices
#easy and inexpensive to install

CCNA Discovery Chapter 9 : Networking for Home and Small Businesses (Version 4.0)


1
A technician is unsuccessful in establishing a console session between a PC and a Linksys integrated router. Both devices have power, and a cable is connected between them. Which two troubleshooting steps could help to diagnose this problem? (Choose two.)
#Ensure the correct cable is used.
#Ensure the link status LED on the integrated router is lit.

2
Identify two physical-layer network problems. (Choose two.)
#hardware failure
#loose cable connections

CCNA Discovery Chapter 8 : Networking for Home and Small Businesses (Version 4.0)

1
Identify three techniques used in social engineering. (Choose three.)
#vishing
#phishing
#pretexting

2
A flood of packets with invalid source-IP addresses requests a connection on the network. The server busily tries to respond, resulting in valid requests being ignored. What type of attack occurred?
#SYN flooding

CCNA Discovery Chapter 1: Networking for Home and Small Businesses (Version 4.0)


1   
Which adapter enables a computer system to exchange information with other systems on a local network?
    #network interface card

2   
What measurement is commonly associated with computer processing speed?
    #hertz

AUKU - IniAnwarHadi Pula Berkata!

ingat lagi entry aku yang INI ??
tu pun kalau korang bacalah...
ahah!
ni aku nak sambung pulak dengan seorang pelajar negara kita yang dok study kat oversea sana nunpa
 kata dia??

AUKU - Pesan Tun M

 Assalamualaikum!
ahah!
bukan main lama tak update blog..
kali ni aku nak kongsi artikal yang aku jumpa pasal AUKU.

tak tau apa AUKU?
tu yang bermain dalam fikiran aku sebenarnya..
adakah mereka yang memperjuangkan untuk memansuhkan AUKU tu paham tentang AUKU atau hanya hanya dengar AUKU tu kejam daripada orang lain dan percaya bulat-bulat apa orang kata...
adakah Mahasiswa itu sendiri paham apa itu AUKU atau tak ambik port langsung??
Related Posts Plugin for WordPress, Blogger...