CCNA Discovery 1 Module 9 Exam Answers Version 4.0
1. Ask the user what URL has been typed and what error message displays.
2. substitution
3. Check the workstation TCP/IP configuration.
4. documenting the troubleshooting process
keeping a record of system upgrades and software versions
5. hardware failure
loose cable connections
6. ipconfig /renew
7. tracert
8. nslookup
9. bottom-up
10. The ports are operational and are receiving traffic.
11. A crossover cable is being used.
12. The wired connection is the wrong type of cable.
13. SSID
authentication
encryption key
14. configuring NAT
broadcasting the SSID
using open authentication
using the default internal IP address
15. The host WEP key is incorrect.
16. The host IP address is incorrect.
17. default gateway
dynamic IP address
DNS server address
18. router status page
connectivity status as indicated by LEDs
19. Ensure the correct cable is used.
the link status LED on the integrated router is lit.
20.after the network is installed and running optimally
after major changes are implemented on the network
21. identifying when the problem occurred
implementing the solution to the problem
22. Diagnostics can be run without a technician being present at the site.
Rabu, 27 Oktober 2010
ccna 1.8
CCNA Discovery 1 Module 8 Exam Answers Version 4.0
1. vishing
phishing
pretexting
2.by phone
3. Trojan horse
4. exploits vulnerabilities with the intent of propagating itself across a network
5. SYN flooding
6. pop ups
7. spam
8. acceptable use
9. Only after a virus is known can an anti-virus update be created for it.
10. When anti-spam software is loaded, legitimate e-mail may be classified as spam by mistake.
Even with anti-spam software installed, users should be careful when opening e-mail attachments.
11. appliance-based
12. DMZ
13. Only external traffic that is destined for specific internal ports is permitted. All other traffic is denied.
14. internal
15. to prevent outside intruders from attacking the router through the Internet
16. Internet access can be denied for specific days and times.
17. a large corporate environment
18. It identifies missing security updates on a computer.
19. Disable the wireless network when a vulnerability analysis is being performed.
20. a change of the default IP address
21. It requires that packets coming into the router be responses to internal host requests.
1. vishing
phishing
pretexting
2.by phone
3. Trojan horse
4. exploits vulnerabilities with the intent of propagating itself across a network
5. SYN flooding
6. pop ups
7. spam
8. acceptable use
9. Only after a virus is known can an anti-virus update be created for it.
10. When anti-spam software is loaded, legitimate e-mail may be classified as spam by mistake.
Even with anti-spam software installed, users should be careful when opening e-mail attachments.
11. appliance-based
12. DMZ
13. Only external traffic that is destined for specific internal ports is permitted. All other traffic is denied.
14. internal
15. to prevent outside intruders from attacking the router through the Internet
16. Internet access can be denied for specific days and times.
17. a large corporate environment
18. It identifies missing security updates on a computer.
19. Disable the wireless network when a vulnerability analysis is being performed.
20. a change of the default IP address
21. It requires that packets coming into the router be responses to internal host requests.
tugas ccna 1.7
CCNA Discovery 1 Module 7 Exam Answers Version 4.0
1. Why is IEEE 802.11 wireless technology able to transmit further distances than Bluetooth technology?
• transmits at much lower frequencies
• has higher power output
• transmits at much higher frequencies
• uses better encryption methods
2. What are three advantages of wireless over wired technology? (Choose three.)
• more secure
• longer range
• anytime, anywhere connectivity
• easy and inexpensive to install
• ease of using licensed air space
• ease of adding additional devices
3. What are two benefits of wireless networking over wired networking? (Choose two.)
• speed
• security
• mobility
• reduced installation time
• allows users to share more resources
• not susceptible to interference from other devices
4. A technician has been asked to provide wireless connectivity to the wired Ethernet network of a building. Which three factors affect the number of access points needed? (Choose three.)
• the size of the building
• the number of solid interior walls in the building
• the presence of microwave ovens in several offices
• the encryption method used on the wireless network
• the use of both Windows and Appletalk operating systems
• the use of shortwave or infrared on the AP
5. Why is security so important in wireless networks?
• Wireless networks are typically slower than wired networks.
• Televisions and other devices can interfere with wireless signals.
• Wireless networks broadcast data over a medium that allows easy access.
• Environmental factors such as thunderstorms can affect wireless networks.
6. What does the Wi-Fi logo indicate about a wireless device?
• IEEE has approved the device.
• The device is interoperable with all other wireless standards.
• The device is interoperable with other devices of the same standard that also display the Wi-Fi logo.
• The device is backwards compatible with all previous wireless standards.
7. Which statement is true concerning wireless bridges?
• connects two networks with a wireless link
• stationary device that connects to a wireless LAN
• allows wireless clients to connect to a wired network
• increases the strength of a wireless signal
8. Which WLAN component is commonly referred to as an STA?
• cell
• antenna
• access point
• wireless bridge
• wireless client
9. Which statement is true concerning an ad-hoc wireless network?
• created by connecting wireless clients in a peer-to-peer network
• created by connecting wireless clients to a single, centralized AP
• created by connecting multiple wireless basic service sets through a distribution system
• created by connecting wireless clients to a wired network using an ISR
10. Refer to the graphic. In the Wireless menu option of a Linksys integrated router, what does the Network Mode option Mixed mean?
• The router supports encryption and authentication.
• The router supports both wired and wireless connections.
• The router supports 802.11b, 802.11g, and 802.11n devices.
• The router supports connectivity through infrared and radio frequencies.
11. Refer to the graphic. In the Wireless menu of a Linksys integrated router, what configuration option allows the presence of the access point to be known to nearby clients?
• Network Mode
• Network Name (SSID)
• Radio Band
• Wide Channel
• Standard Channel
• SSID Broadcast
12. Which two statements about a service set identifier (SSID) are true? (Choose two.)
• tells a wireless device to which WLAN it belongs
• consists of a 32-character string and is not case sensitive
• responsible for determining the signal strength
• all wireless devices on the same WLAN must have the same SSID
• used to encrypt data sent across the wireless network
13. Which two statements characterize wireless network security? (Choose two.)
• Wireless networks offer the same security features as wired networks.
• Wardriving enhances security of wireless networks.
• With SSID broadcast disabled, an attacker must know the SSID to connect.
• Using the default IP address on an access point makes hacking easier.
• An attacker needs physical access to at least one network device to launch an attack.
14. What type of authentication does an access point use by default?
• Open
• PSK
• WEP
• EAP
15. Which statement is true about open authentication when it is enabled on an access point?
• requires no authentication
• uses a 64-bit encryption algorithm
• requires the use of an authentication server
• requires a mutually agreed upon password
16. What are two authentication methods that an access point could use? (Choose two.)
• WEP
• WPA
• EAP
• ASCII
• pre-shared keys
17. What is the difference between using open authentication and pre-shared keys?
• Open authentication requires a password. Pre-shared keys do not require a password.
• Open authentication is used with wireless networks. Pre-shared keys are used with wired networks.
• Pre-shared keys require an encrypted secret word. Open authentication does not require a secret word.
• Pre-shared keys require a MAC address programmed into the access point. Open authentication does not require this programming.
18. What term describes the encoding of wireless data to prevent intercepted data from being read by a hacker?
• address filtering
• authentication
• broadcasting
• encryption
• passphrase encoding
19. What access-point feature allows a network administrator to define what type of data can enter the wireless network?
• encryption
• hacking block
• traffic filtering
• MAC address filtering
• authentication
20. What are the two WEP key lengths? (Choose two.)
• 8 bit
• 16 bit
• 32 bit
• 64 bit
• 128 bit
21. Complete the following sentence: WEP is used to ______ , and EAP is used to _____ wireless networks.
• encrypt; authenticate users on
• filter traffic; select the operating frequency for
• identify the wireless network; compress data on
• create the smallest wireless network; limit the number of users on
• transmits at much lower frequencies
• has higher power output
• transmits at much higher frequencies
• uses better encryption methods
2. What are three advantages of wireless over wired technology? (Choose three.)
• more secure
• longer range
• anytime, anywhere connectivity
• easy and inexpensive to install
• ease of using licensed air space
• ease of adding additional devices
3. What are two benefits of wireless networking over wired networking? (Choose two.)
• speed
• security
• mobility
• reduced installation time
• allows users to share more resources
• not susceptible to interference from other devices
4. A technician has been asked to provide wireless connectivity to the wired Ethernet network of a building. Which three factors affect the number of access points needed? (Choose three.)
• the size of the building
• the number of solid interior walls in the building
• the presence of microwave ovens in several offices
• the encryption method used on the wireless network
• the use of both Windows and Appletalk operating systems
• the use of shortwave or infrared on the AP
5. Why is security so important in wireless networks?
• Wireless networks are typically slower than wired networks.
• Televisions and other devices can interfere with wireless signals.
• Wireless networks broadcast data over a medium that allows easy access.
• Environmental factors such as thunderstorms can affect wireless networks.
6. What does the Wi-Fi logo indicate about a wireless device?
• IEEE has approved the device.
• The device is interoperable with all other wireless standards.
• The device is interoperable with other devices of the same standard that also display the Wi-Fi logo.
• The device is backwards compatible with all previous wireless standards.
7. Which statement is true concerning wireless bridges?
• connects two networks with a wireless link
• stationary device that connects to a wireless LAN
• allows wireless clients to connect to a wired network
• increases the strength of a wireless signal
8. Which WLAN component is commonly referred to as an STA?
• cell
• antenna
• access point
• wireless bridge
• wireless client
9. Which statement is true concerning an ad-hoc wireless network?
• created by connecting wireless clients in a peer-to-peer network
• created by connecting wireless clients to a single, centralized AP
• created by connecting multiple wireless basic service sets through a distribution system
• created by connecting wireless clients to a wired network using an ISR
10. Refer to the graphic. In the Wireless menu option of a Linksys integrated router, what does the Network Mode option Mixed mean?
• The router supports encryption and authentication.
• The router supports both wired and wireless connections.
• The router supports 802.11b, 802.11g, and 802.11n devices.
• The router supports connectivity through infrared and radio frequencies.
11. Refer to the graphic. In the Wireless menu of a Linksys integrated router, what configuration option allows the presence of the access point to be known to nearby clients?
• Network Mode
• Network Name (SSID)
• Radio Band
• Wide Channel
• Standard Channel
• SSID Broadcast
12. Which two statements about a service set identifier (SSID) are true? (Choose two.)
• tells a wireless device to which WLAN it belongs
• consists of a 32-character string and is not case sensitive
• responsible for determining the signal strength
• all wireless devices on the same WLAN must have the same SSID
• used to encrypt data sent across the wireless network
13. Which two statements characterize wireless network security? (Choose two.)
• Wireless networks offer the same security features as wired networks.
• Wardriving enhances security of wireless networks.
• With SSID broadcast disabled, an attacker must know the SSID to connect.
• Using the default IP address on an access point makes hacking easier.
• An attacker needs physical access to at least one network device to launch an attack.
14. What type of authentication does an access point use by default?
• Open
• PSK
• WEP
• EAP
15. Which statement is true about open authentication when it is enabled on an access point?
• requires no authentication
• uses a 64-bit encryption algorithm
• requires the use of an authentication server
• requires a mutually agreed upon password
16. What are two authentication methods that an access point could use? (Choose two.)
• WEP
• WPA
• EAP
• ASCII
• pre-shared keys
17. What is the difference between using open authentication and pre-shared keys?
• Open authentication requires a password. Pre-shared keys do not require a password.
• Open authentication is used with wireless networks. Pre-shared keys are used with wired networks.
• Pre-shared keys require an encrypted secret word. Open authentication does not require a secret word.
• Pre-shared keys require a MAC address programmed into the access point. Open authentication does not require this programming.
18. What term describes the encoding of wireless data to prevent intercepted data from being read by a hacker?
• address filtering
• authentication
• broadcasting
• encryption
• passphrase encoding
19. What access-point feature allows a network administrator to define what type of data can enter the wireless network?
• encryption
• hacking block
• traffic filtering
• MAC address filtering
• authentication
20. What are the two WEP key lengths? (Choose two.)
• 8 bit
• 16 bit
• 32 bit
• 64 bit
• 128 bit
21. Complete the following sentence: WEP is used to ______ , and EAP is used to _____ wireless networks.
• encrypt; authenticate users on
• filter traffic; select the operating frequency for
• identify the wireless network; compress data on
• create the smallest wireless network; limit the number of users on
Kamis, 21 Oktober 2010
tugas ccna 7.3.5
Lab 7.3.5 Configuring Wireless Security
Lab 7.3.5 Configuring Wireless Security
Objectives
• Create a security plan for a home network.
• Configure the wireless access point (AP) portion of a multi-function device using security best practices.
Background / Preparation
A well-planned security implementation is critical to the safety of a wireless network. This lab goes over the steps that must be taken to ensure the safety of the network using the following scenario. You have just purchased a Linksys WRT300N wireless router, and you want to set up a small network in your home. You selected this router because the IEEE 802.11n specification claims that it has 12 times the speed of an 802.11g and 4 times the range. Because the 802.11n uses 2.4 GHz, it is backward compatible with both the 802.11b and 802.11g and uses MIMO (multiple-in, multiple-out) technology.
You should enable security mechanisms before connecting your multi-function device to the Internet or any wired network. You should also change the default values provided, because they are well-known values that are easily obtainable on the Internet.
The following resources are required:
• Windows-based computer
• Linksys WRT300N
• Straight-through Ethernet cable
Step 1: Plan the security for your home network
a. List at least six security best practices that you should implement to secure your multi-function device and wireless network.
Jawaban
1) Tambahkan password untuk akses wireless dan gunakan password WPA2 Encryption.
2) Jangan gunakan nama SSID dengan nama anda.
3) Aktifkan alamat MAC spoofing untuk mengatasi alamat MAC yang salah dari router anda.
4) Aktifkan Allow MAC Address only untuk memastikan bahwa hanya mesin yang MAC alamat yang ditentukan dapat terhubung ke wireless.
5) Sebaiknya gunakan LAN jika kita melakukan proses download misalnya pada malam hari dan matikan wireless.
6) Aktifkan firewall router jarngan wireless Anda.
b. Describe what the security risk is for each item.
1) Akan terjadi kemungkinan pengaksesan jaringan oleh pihak yang tidak berhak
2)
3)
4)
5)
6)
Step 2: Connect a computer to the multi-function device and log in to the web-based utility
a. Connect your computer (Ethernet NIC) to the multi-function device (port 1 on the Linksys WRT300N) by using a straight-through cable.
b. The default IP address of the Linksys WRT300N is 192.168.1.1, and the default subnet mask is 255.255.255.0. The computer and Linksys device must be on the same network to communicate with each other. Change the IP address of the computer to 192.168.1.2, and verify that the subnet mask is 255.255.255.0. Enter the internal address of the Linksys device (192.168.1.1) as the default gateway.
Do this by clicking, Start > Control Panel > Network Connections. Right click on the wireless connection and choose Properties. Select the Internet Protocol (TCP/IP) and enter the addresses as shown below.
c. Open a web browser, such as Internet Explorer, Netscape, or Firefox and enter the default IP address of the Linksys device (192.168.1.1) into the address field and press Enter.
d. A screen appears, requesting your user name and password.
b. Leave the User name field blank and enter admin for the password. It is the default password on the Linksys device. Click OK. Remember that passwords are case-sensitive.
c. As you make the necessary changes on the Linksys device, click Save Settings on each screen to save the changes or click Cancel Changes to keep the default settings.
Objectives
• Create a security plan for a home network.
• Configure the wireless access point (AP) portion of a multi-function device using security best practices.
Background / Preparation
A well-planned security implementation is critical to the safety of a wireless network. This lab goes over the steps that must be taken to ensure the safety of the network using the following scenario. You have just purchased a Linksys WRT300N wireless router, and you want to set up a small network in your home. You selected this router because the IEEE 802.11n specification claims that it has 12 times the speed of an 802.11g and 4 times the range. Because the 802.11n uses 2.4 GHz, it is backward compatible with both the 802.11b and 802.11g and uses MIMO (multiple-in, multiple-out) technology.
You should enable security mechanisms before connecting your multi-function device to the Internet or any wired network. You should also change the default values provided, because they are well-known values that are easily obtainable on the Internet.
The following resources are required:
• Windows-based computer
• Linksys WRT300N
• Straight-through Ethernet cable
Step 1: Plan the security for your home network
a. List at least six security best practices that you should implement to secure your multi-function device and wireless network.
Jawaban
1) Tambahkan password untuk akses wireless dan gunakan password WPA2 Encryption.
2) Jangan gunakan nama SSID dengan nama anda.
3) Aktifkan alamat MAC spoofing untuk mengatasi alamat MAC yang salah dari router anda.
4) Aktifkan Allow MAC Address only untuk memastikan bahwa hanya mesin yang MAC alamat yang ditentukan dapat terhubung ke wireless.
5) Sebaiknya gunakan LAN jika kita melakukan proses download misalnya pada malam hari dan matikan wireless.
6) Aktifkan firewall router jarngan wireless Anda.
b. Describe what the security risk is for each item.
1) Akan terjadi kemungkinan pengaksesan jaringan oleh pihak yang tidak berhak
2)
3)
4)
5)
6)
Step 2: Connect a computer to the multi-function device and log in to the web-based utility
a. Connect your computer (Ethernet NIC) to the multi-function device (port 1 on the Linksys WRT300N) by using a straight-through cable.
b. The default IP address of the Linksys WRT300N is 192.168.1.1, and the default subnet mask is 255.255.255.0. The computer and Linksys device must be on the same network to communicate with each other. Change the IP address of the computer to 192.168.1.2, and verify that the subnet mask is 255.255.255.0. Enter the internal address of the Linksys device (192.168.1.1) as the default gateway.
Do this by clicking, Start > Control Panel > Network Connections. Right click on the wireless connection and choose Properties. Select the Internet Protocol (TCP/IP) and enter the addresses as shown below.
c. Open a web browser, such as Internet Explorer, Netscape, or Firefox and enter the default IP address of the Linksys device (192.168.1.1) into the address field and press Enter.
d. A screen appears, requesting your user name and password.
b. Leave the User name field blank and enter admin for the password. It is the default password on the Linksys device. Click OK. Remember that passwords are case-sensitive.
c. As you make the necessary changes on the Linksys device, click Save Settings on each screen to save the changes or click Cancel Changes to keep the default settings.
Rabu, 20 Oktober 2010
latihan ccna 7.2.6
Lab 7.2.6 Configuring a Wireless Client
Objective
• Install and configure a driver for a wireless USB NIC for a wireless client computer.
• Determine the version of the driver installed and check the Internet for updates.
Background / Preparation
In this lab you will install a driver for a wireless USB NIC in a computer. The driver is a type of software that
controls the wireless NIC. The driver comes on a CD with the NIC or can be downloaded from the Internet.
Many manufacturers require that the driver is installed before the adapter is connected. The procedure
described in this lab is for a Linksys USB 802.11g wireless NIC, but is similar to others. You should always
follow the procedure recommended by the wireless NIC manufacturer.
The following resources are required:
• Windows XP-based computer with an available USB port
• Wireless USB NIC and associated driver
• Administrator rights to install the driver
• Linksys WRT300N with wireless access configured from previous lab
Step 1: Install the wireless NIC driver
a. Insert the CD that contains the wireless NIC driver into the CD/DVD drive and install the driver
according to the manufacturer recommendations. Most USB devices require that the driver be
installed before the device is physically attached. Note that you may do part of the installation process
now and part of it after the wireless NIC is installed
Objective
• Install and configure a driver for a wireless USB NIC for a wireless client computer.
• Determine the version of the driver installed and check the Internet for updates.
Background / Preparation
In this lab you will install a driver for a wireless USB NIC in a computer. The driver is a type of software that
controls the wireless NIC. The driver comes on a CD with the NIC or can be downloaded from the Internet.
Many manufacturers require that the driver is installed before the adapter is connected. The procedure
described in this lab is for a Linksys USB 802.11g wireless NIC, but is similar to others. You should always
follow the procedure recommended by the wireless NIC manufacturer.
The following resources are required:
• Windows XP-based computer with an available USB port
• Wireless USB NIC and associated driver
• Administrator rights to install the driver
• Linksys WRT300N with wireless access configured from previous lab
Step 1: Install the wireless NIC driver
a. Insert the CD that contains the wireless NIC driver into the CD/DVD drive and install the driver
according to the manufacturer recommendations. Most USB devices require that the driver be
installed before the device is physically attached. Note that you may do part of the installation process
now and part of it after the wireless NIC is installed
latihan ccna
Lab 7.2.5 Configuring a Wireless Access Point
Lab 7.2.5 Configuring a Wireless Access Point
Objective
• Configure the wireless access point (AP) portion of a multi-function device to allow access to a
wireless client.
Background / Preparation
The Linksys WRT300N includes an integrated 4-port switch, a router and a wireless Access Point (AP). In this
lab, you will configure the AP component of the multi-function device to allow access for wireless clients. The
basic wireless capabilities of the multi-function device will be configured but this will not be a secure wireless
network. Setting up a secure wireless network will be covered in a later lab.
The following resources are required:
• Windows XP based computer that is cabled to the multi-function device
• Linksys WRT300N
Step 1: Verify connectivity between the computer and the multi-function device
a. The computer used to configure the AP should be attached to one of the multi-function device’s
switch ports.
b. On the computer, click the Start button and select Run. Type cmd and click OK or press Enter.
c. At the command prompt, ping the multi-function device using the default IP address 192.168.1.1 or
the IP that has been configured on the multi-function device’s port. Do not proceed until the ping
succeeds.
d. Write down the command used to ping the multi-function device.
____________________________________________________________________________
NOTE: If the ping is not successful, try these troubleshooting steps:
• Check to make sure the IP address of the computer is on the 192.168.1.0 network. The computer
must be on the same network as the multi-function device to be able to ping it. The DHCP service of
the multi-function device is enabled by default. If the computer is configured as a DHCP client it
should have a valid IP address and subnet mask. If the computer has a static IP address, it must be
in on the 192.168.1.0 network and the subnet mask must be 255.255.255.0.
• Make sure the cable is a known-good straight-through cable. Test to verify.
• Verify that the link light for the port where the computer is attached is lit.
• Check whether the multi-function device has power.
If none of these steps correct the problem, check with your instructor.
Step 2: Log in to the multi-function device and configure the wireless network
a. Open a web browser. In the address line, type http://ip_address/, where ip_address is the IP address
of the wireless router (default is 192.168.1.1). At the prompt, leave the user name textbox empty, but
type the password assigned to the router. The default password is admin. Click OK.
b. In the main menu, click on the Wireless option.
Lab 7.2.5 Configuring a Wireless Access Point
Objective
• Configure the wireless access point (AP) portion of a multi-function device to allow access to a
wireless client.
Background / Preparation
The Linksys WRT300N includes an integrated 4-port switch, a router and a wireless Access Point (AP). In this
lab, you will configure the AP component of the multi-function device to allow access for wireless clients. The
basic wireless capabilities of the multi-function device will be configured but this will not be a secure wireless
network. Setting up a secure wireless network will be covered in a later lab.
The following resources are required:
• Windows XP based computer that is cabled to the multi-function device
• Linksys WRT300N
Step 1: Verify connectivity between the computer and the multi-function device
a. The computer used to configure the AP should be attached to one of the multi-function device’s
switch ports.
b. On the computer, click the Start button and select Run. Type cmd and click OK or press Enter.
c. At the command prompt, ping the multi-function device using the default IP address 192.168.1.1 or
the IP that has been configured on the multi-function device’s port. Do not proceed until the ping
succeeds.
d. Write down the command used to ping the multi-function device.
____________________________________________________________________________
NOTE: If the ping is not successful, try these troubleshooting steps:
• Check to make sure the IP address of the computer is on the 192.168.1.0 network. The computer
must be on the same network as the multi-function device to be able to ping it. The DHCP service of
the multi-function device is enabled by default. If the computer is configured as a DHCP client it
should have a valid IP address and subnet mask. If the computer has a static IP address, it must be
in on the 192.168.1.0 network and the subnet mask must be 255.255.255.0.
• Make sure the cable is a known-good straight-through cable. Test to verify.
• Verify that the link light for the port where the computer is attached is lit.
• Check whether the multi-function device has power.
If none of these steps correct the problem, check with your instructor.
Step 2: Log in to the multi-function device and configure the wireless network
a. Open a web browser. In the address line, type http://ip_address/, where ip_address is the IP address
of the wireless router (default is 192.168.1.1). At the prompt, leave the user name textbox empty, but
type the password assigned to the router. The default password is admin. Click OK.
b. In the main menu, click on the Wireless option.
latihan ccna
tep 1 :
d. 96.6.224.170
e. tidak,
f. Core FTP Lite
Step 2 :
a.
b. http://www.unp.ac.id/
c.
d. Help
e. exit, root, type
f. 60.254.168.170
g. e144.cd.akamaiedge.net
h. tidak
i. deploy.akamaitechnologies.com
Step 3
a. ns4.unp.ac.id
b. -10.1.1.3
-202.134.0.155
d. 96.6.224.170
e. tidak,
f. Core FTP Lite
Step 2 :
a.
b. http://www.unp.ac.id/
c.
d. Help
e. exit, root, type
f. 60.254.168.170
g. e144.cd.akamaiedge.net
h. tidak
i. deploy.akamaitechnologies.com
Step 3
a. ns4.unp.ac.id
b. -10.1.1.3
-202.134.0.155
latihan ccna
lab 6.2.3
step 1
a.
b.
c.
d. debug, prompt, status
e.
f. merequest data dari FTP untuk diupload
g. get ~ merequest data dari FTP untuk di download
send ~ proses upload
recv ~ proses download
h.
step 2
a.
step 1
a.
b.
c.
d. debug, prompt, status
e.
f. merequest data dari FTP untuk diupload
g. get ~ merequest data dari FTP untuk di download
send ~ proses upload
recv ~ proses download
h.
step 2
a.
Selasa, 19 Oktober 2010
Lab 6.2.4 Configuring an Email Client
Lab 6.2.4 Configuring an Email Client
Objectives
• Set up an email client.
• Send and receive mail from a mail server.
• Add an email account or change an existing one.
Background / Preparation
An email application gives the user the ability to send and receive messages from another user located on the
The following resources are required:
• Windows-based computer with Internet connectivity
• Microsoft Outlook or other email client software
Step 1: Open Microsoft Outlook
a. From the Start menu, select All Programs. Locate the Microsoft Office software.
b. Select Microsoft Office Outlook as the email program. If your computer does not have the Microsoft
Office software, there are many free email software packages available on the Internet. Search the
Internet to find a free email client that can be installed on your computer. The following instructions
may vary depending on your email client.
Step 2: Set up an email account
a. When you first start Microsoft Outlook, a screen appears with Email Upgrade Options. You can
choose to import email messages or address books from another account. Because this is your first
email account, select the Do Not Upgrade button.
b. The next screen is the Email Accounts screen where you are asked if you want to configure an
email account. Click Yes.
c. If Outlook has already been installed and setup for e-mail previously, you can start the Outlook
application and click Tools, E-Mail Accounts and then select View or change existing e-mail
account to see how the existing account is set up.
Step 3: Enter POP3 e-mail account information
a. The next screen requires the user of the new account to fill in information. Enter your name and email
address. Your can get your email address from your Internet provider.
NOTE: If you do not have a real ISP email account, this step can be treated as a simulation. Just
enter the information requested to become familiar with the process of creating an email
account.
b. Enter your server information. Contact your Internet provider to locate the server information for the
incoming and outgoing mail servers. Usually Internet providers put this information on their website in
their help section.
c. What is your incoming (POP3) mail server? ________________________________________
d. What is your outgoing (SMTP) mail server? _________________________________________
e. Enter your username and password. Do not check the box to remember your password. This option is
used when only one person uses the computer. If anyone else were to use the computer, they could
easily gain access to all of the information in your email.
f. Click the Test Account Settings button. If everything is correct, the screen displays that the test was
successful. If not, correct your information and try again.
NOTE: If this is a simulation, the test will not be successful and you can go to Steps 4 and 5.
g. Test your new account by sending an email to a friend in class.
Step 4: (Optional) Add another account or change an account
a. Open Microsoft Outlook. From the Tools menu, select Email Accounts.
b. In this screen, you can add another email account or you can change information in an existing
account.
Step 5: Reflection
a. What are the advantages or disadvantages to using email over regular postal mail?
____________________________________________________________________________
____________________________________________________________________________
b. What are the advantages or disadvantages to using email over an instant messaging program?
____________________________________________________________________________
____________________________________________________________________________
c. With a partner, discuss five (5) recommendations for email etiquette that should be considered when
emailing friends and business colleagues.
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
Objectives
• Set up an email client.
• Send and receive mail from a mail server.
• Add an email account or change an existing one.
Background / Preparation
An email application gives the user the ability to send and receive messages from another user located on the
same local network or on the Internet. The messages are sent by the sending client and stored on an email server. Another email client with a mailbox on the server can then access the server at any time to receive stored messages that are destined for that client.
• Windows-based computer with Internet connectivity
• Microsoft Outlook or other email client software
Step 1: Open Microsoft Outlook
a. From the Start menu, select All Programs. Locate the Microsoft Office software.
b. Select Microsoft Office Outlook as the email program. If your computer does not have the Microsoft
Office software, there are many free email software packages available on the Internet. Search the
Internet to find a free email client that can be installed on your computer. The following instructions
may vary depending on your email client.
Step 2: Set up an email account
a. When you first start Microsoft Outlook, a screen appears with Email Upgrade Options. You can
choose to import email messages or address books from another account. Because this is your first
email account, select the Do Not Upgrade button.
b. The next screen is the Email Accounts screen where you are asked if you want to configure an
email account. Click Yes.
c. If Outlook has already been installed and setup for e-mail previously, you can start the Outlook
application and click Tools, E-Mail Accounts and then select View or change existing e-mail
account to see how the existing account is set up.
Step 3: Enter POP3 e-mail account information
a. The next screen requires the user of the new account to fill in information. Enter your name and email
address. Your can get your email address from your Internet provider.
NOTE: If you do not have a real ISP email account, this step can be treated as a simulation. Just
enter the information requested to become familiar with the process of creating an email
account.
b. Enter your server information. Contact your Internet provider to locate the server information for the
incoming and outgoing mail servers. Usually Internet providers put this information on their website in
their help section.
c. What is your incoming (POP3) mail server? ________________________________________
d. What is your outgoing (SMTP) mail server? _________________________________________
e. Enter your username and password. Do not check the box to remember your password. This option is
used when only one person uses the computer. If anyone else were to use the computer, they could
easily gain access to all of the information in your email.
f. Click the Test Account Settings button. If everything is correct, the screen displays that the test was
successful. If not, correct your information and try again.
NOTE: If this is a simulation, the test will not be successful and you can go to Steps 4 and 5.
g. Test your new account by sending an email to a friend in class.
Step 4: (Optional) Add another account or change an account
a. Open Microsoft Outlook. From the Tools menu, select Email Accounts.
b. In this screen, you can add another email account or you can change information in an existing
account.
Step 5: Reflection
a. What are the advantages or disadvantages to using email over regular postal mail?
____________________________________________________________________________
____________________________________________________________________________
b. What are the advantages or disadvantages to using email over an instant messaging program?
____________________________________________________________________________
____________________________________________________________________________
c. With a partner, discuss five (5) recommendations for email etiquette that should be considered when
emailing friends and business colleagues.
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
Lab 6.2.3 Exploring FTP
Lab 6.2.3 Exploring FTP
Objective
to use than typing from a command prompt.
When using FTP, one computer is normally the server and the other computer is the client. When accessing
the server from the client, you need to provide a username and password. Some FTP servers have a userID
named anonymous. You can access these types of sites by simply typing “anonymous” for the userID, without
a password. Usually, the site administrator has files that can be copied but does not allow files to be posted
with the anonymous userID.
client. Work in teams of two to complete this lab.
The following resources are required:
• Windows-based computer with an FTP client
• FTP server (Existing FTP server, downloaded freeware, or use Live CD)
Step 1: Examine FTP from the command prompt
a. Click the Start button, select Run, type cmd on the command line, and then click OK.
b. At the prompt, type ftp to start the FTP application. The prompt changes.
c. From the ftp prompt, type ? to see a list of the commands that can be used in this mode.
d. List three FTP commands.
Jawaban : debug, prompt, status.
e. At the prompt, type help put to see a short description of the put command.
f. What is the purpose of the put command?
Jawaban : merequest data dari FTP untuk diupload
g. Use the help command again to get the purpose of the get, send, and recv commands.
get --> merequest data dari FTP untuk di download
send --> proses upload
recv --> proses download
NOTE: The original FTP commands were PUT to send a file to an FTP server and GET to download
a file from the FTP server. You also had to select ASCII or binary file mode. If you download
a binary file in ASCII mode it could end up being corrupted. Some of the newer graphical
programs now use send and receive in their place.
h. Partner with another student. Using procedures demonstrated in previous labs, write down the names
and IP addresses of each partner computer. It is very important to get these names correct. Some
FTP applications allow you to use either the IP address or the computer name.
Computer 1: __________________________________________________________________
Computer 2: __________________________________________________________________
Step 2: Use a GUI FTP client or web browser
a. If you are using a web browser as the FTP client, open the web browser and type
ftp://ip_address_of_FTP_server. If the FTP server is configured to use an anonymous userID,
connect directly to the FTP server. Using the FTP client, download an available file from the server.
b. If you are using a GUI FTP client, open the application. For most FTP clients, you must configure a
new connection by giving it a name, the IP address of the FTP server, and a username and
password. You may have to type anonymous if the FTP server allows this type of connection. Some
applications have a checkbox that allows an anonymous login. When you have configured the
connection, connect to the FTP server and download a file.
c. What is the name of the file you downloaded from the FTP server? ______________________
d. List one example of when FTP might be beneficial to a computer technician. _______________
____________________________________________________________________________
____________________________________________________________________________
Step 3: (Optional) Use both an FTP server and client
a. If you control both the FTP server and client, practice sending files to and getting files from the client
and the server.
b. Show your transferred files to another group of students.
c. Close the FTP server and client applications.
Objective
- Demonstrate how to use FTP from the command prompt and GUI.
File Transfer Protocol (FTP) is part of the TCP/IP suite. FTP is used to transfer files from one network device to another network device. Windows includes an FTP application that you can execute from the command
prompt. There are also many free GUI versions of FTP that you can download. The GUI versions are easierto use than typing from a command prompt.
When using FTP, one computer is normally the server and the other computer is the client. When accessing
the server from the client, you need to provide a username and password. Some FTP servers have a userID
named anonymous. You can access these types of sites by simply typing “anonymous” for the userID, without
a password. Usually, the site administrator has files that can be copied but does not allow files to be posted
with the anonymous userID.
If your class does not have an FTP server available, you can download and install a freeware version, such as Home FTP Server or Cerberus FTP server. The FTP Server on a computer running the CCNA Discovery Live CD may also be used. Another computer will act as the FTP client by using FTP from the command line,
a web browser, or download a freeware version of an FTP client, such as SmartFTP Client or Core FTP LEclient. Work in teams of two to complete this lab.
The following resources are required:
• Windows-based computer with an FTP client
• FTP server (Existing FTP server, downloaded freeware, or use Live CD)
Step 1: Examine FTP from the command prompt
a. Click the Start button, select Run, type cmd on the command line, and then click OK.
b. At the prompt, type ftp to start the FTP application. The prompt changes.
c. From the ftp prompt, type ? to see a list of the commands that can be used in this mode.
d. List three FTP commands.
Jawaban : debug, prompt, status.
e. At the prompt, type help put to see a short description of the put command.
f. What is the purpose of the put command?
Jawaban : merequest data dari FTP untuk diupload
g. Use the help command again to get the purpose of the get, send, and recv commands.
get --> merequest data dari FTP untuk di download
send --> proses upload
recv --> proses download
NOTE: The original FTP commands were PUT to send a file to an FTP server and GET to download
a file from the FTP server. You also had to select ASCII or binary file mode. If you download
a binary file in ASCII mode it could end up being corrupted. Some of the newer graphical
programs now use send and receive in their place.
h. Partner with another student. Using procedures demonstrated in previous labs, write down the names
and IP addresses of each partner computer. It is very important to get these names correct. Some
FTP applications allow you to use either the IP address or the computer name.
Computer 1: __________________________________________________________________
Computer 2: __________________________________________________________________
Step 2: Use a GUI FTP client or web browser
a. If you are using a web browser as the FTP client, open the web browser and type
ftp://ip_address_of_FTP_server. If the FTP server is configured to use an anonymous userID,
connect directly to the FTP server. Using the FTP client, download an available file from the server.
b. If you are using a GUI FTP client, open the application. For most FTP clients, you must configure a
new connection by giving it a name, the IP address of the FTP server, and a username and
password. You may have to type anonymous if the FTP server allows this type of connection. Some
applications have a checkbox that allows an anonymous login. When you have configured the
connection, connect to the FTP server and download a file.
c. What is the name of the file you downloaded from the FTP server? ______________________
d. List one example of when FTP might be beneficial to a computer technician. _______________
____________________________________________________________________________
____________________________________________________________________________
Step 3: (Optional) Use both an FTP server and client
a. If you control both the FTP server and client, practice sending files to and getting files from the client
and the server.
b. Show your transferred files to another group of students.
c. Close the FTP server and client applications.
Lab 6.2.1 Observing DNS Name Resolution
Lab 6.2.1 Observing DNS Name Resolution
Objectives
• Observe the conversion of a URL to an IP address.
• Observe DNS lookup using the nslookup command.
Background / Preparation
Domain Name System (DNS) is invoked when you type a Uniform Resource Locator (URL), such as http://www.cisco.com, into a web browser. The first part of the URL describes which protocol is being used. Common ones are HTTP (Hypertext Transfer Protocol), HTTPS (Hypertext Transfer Protocol over Secure Socket Layer), and FTP (File Transfer Protocol). DNS uses the second part of the URL, which in this example is www.cisco.com. DNS translates the domain name (like www.cisco.com) to an IP address in order to allow the source host to reach the destination host.
Work in pairs to complete this lab.
The following resources are required:
• Windows-based computer with Internet connectivity
• Access to the Run command
Step 1: Observe DNS conversion
a. Click the Start button, select Run, type cmd, and then click OK. The command prompt window appears.
b. At the command prompt, type ping www.cisco.com. The computer needs to translate www.cisco.com into an IP address so it knows where to send the Internet Control Message Protocol (ICMP) packets. Ping is a type of ICMP packet.
c. The first line of the output shows www.cisco.com converted to an IP address by DNS. You should be able to see the effect of DNS even if your school has a firewall that prevents pinging, or if Cisco has prevented people from pinging their web server.
d. Which IP address is shown on the screen?
Jawaban: 68.254.168.178
e. Is it the same as the one shown in the figure? Why do you think this occurred?
f. Work together with another student and discuss one or two other instances (besides the ping command) in which the computer would use DNS.
Step 2: Verify DNS operation using the nslookup command
a. At the command prompt, type the nslookup command.
b. b. What is the default DNS server being used?
Jawaban : default DNS server yang digunaka yaitu ns4.unp.ac.id
c. Notice how the command prompt changed. This is the NSLOOKUP prompt. From this prompt, you can enter commands related to DNS.
d. At the prompt, type ? to see a list of all the available commands that you can use in NSLOOKUP mode.
e. Write three commands that you can use with NSLOOKUP.
Jawaban : name, help, root.
f. At the NSLOOKUP prompt, type www.cisco.com.
g. What is the translated IP address?
The answer : the translated IP address is 60.254.176.170
h. Is it the same as the IP address shown with the ping command?
The answer : No, I don’t think so.
i. At the prompt, type the IP address of the Cisco web server that you just found. You can use NSLOOKUP to get the domain name of an IP address if you do not know the URL. Using the previous procedures, find an IP address associated with www.google.com.
The answer :
There are some IP that associated with www.google.com sucah as 64.233.181.103, 64.233.181.147, 64.233.181.106, 64.233.181.99, 64.233.181.104 and 64.233.181.105
Step 3: Identify mail servers using the nslookup command
a. At the prompt, type set type=mx to have NSLOOKUP identify mail servers.
b. At the prompt, type www.cisco.com.
c. What is the primary name server, the responsible mail address, and the default Time to Live (TTL)?
The answer: No mail exchange (MX) records available for www.cisco.com
d. At the prompt, type exit to return to the regular command prompt.
e. At the prompt, type ipconfig /all.
f. Write the IP addresses of all the DNS servers that your school uses.
Jawaban
DHCP Server . . . . . . . . . . . : 192.168.194.129
DNS Servers . . . . . . . . . . . : 192.168.194.129
10.1.1.5
202.134.0.155
g. Type exit to close the command prompt window.
Step 4: Reflection
a. If your school did not have a DNS server, what effect would this have on your use of the Internet?
b. Some companies do not dedicate a single server for DNS. Instead, the DNS server provides other functions as well. Which functions do you think might be included on a DNS server? Use the ipconfig /all command to help you with this.
Objectives
• Observe the conversion of a URL to an IP address.
• Observe DNS lookup using the nslookup command.
Background / Preparation
Domain Name System (DNS) is invoked when you type a Uniform Resource Locator (URL), such as http://www.cisco.com, into a web browser. The first part of the URL describes which protocol is being used. Common ones are HTTP (Hypertext Transfer Protocol), HTTPS (Hypertext Transfer Protocol over Secure Socket Layer), and FTP (File Transfer Protocol). DNS uses the second part of the URL, which in this example is www.cisco.com. DNS translates the domain name (like www.cisco.com) to an IP address in order to allow the source host to reach the destination host.
Work in pairs to complete this lab.
The following resources are required:
• Windows-based computer with Internet connectivity
• Access to the Run command
Step 1: Observe DNS conversion
a. Click the Start button, select Run, type cmd, and then click OK. The command prompt window appears.
b. At the command prompt, type ping www.cisco.com. The computer needs to translate www.cisco.com into an IP address so it knows where to send the Internet Control Message Protocol (ICMP) packets. Ping is a type of ICMP packet.
c. The first line of the output shows www.cisco.com converted to an IP address by DNS. You should be able to see the effect of DNS even if your school has a firewall that prevents pinging, or if Cisco has prevented people from pinging their web server.
d. Which IP address is shown on the screen?
Jawaban: 68.254.168.178
e. Is it the same as the one shown in the figure? Why do you think this occurred?
f. Work together with another student and discuss one or two other instances (besides the ping command) in which the computer would use DNS.
Step 2: Verify DNS operation using the nslookup command
a. At the command prompt, type the nslookup command.
b. b. What is the default DNS server being used?
Jawaban : default DNS server yang digunaka yaitu ns4.unp.ac.id
c. Notice how the command prompt changed. This is the NSLOOKUP prompt. From this prompt, you can enter commands related to DNS.
d. At the prompt, type ? to see a list of all the available commands that you can use in NSLOOKUP mode.
e. Write three commands that you can use with NSLOOKUP.
Jawaban : name, help, root.
f. At the NSLOOKUP prompt, type www.cisco.com.
g. What is the translated IP address?
The answer : the translated IP address is 60.254.176.170
h. Is it the same as the IP address shown with the ping command?
The answer : No, I don’t think so.
i. At the prompt, type the IP address of the Cisco web server that you just found. You can use NSLOOKUP to get the domain name of an IP address if you do not know the URL. Using the previous procedures, find an IP address associated with www.google.com.
The answer :
There are some IP that associated with www.google.com sucah as 64.233.181.103, 64.233.181.147, 64.233.181.106, 64.233.181.99, 64.233.181.104 and 64.233.181.105
Step 3: Identify mail servers using the nslookup command
a. At the prompt, type set type=mx to have NSLOOKUP identify mail servers.
b. At the prompt, type www.cisco.com.
c. What is the primary name server, the responsible mail address, and the default Time to Live (TTL)?
The answer: No mail exchange (MX) records available for www.cisco.com
d. At the prompt, type exit to return to the regular command prompt.
e. At the prompt, type ipconfig /all.
f. Write the IP addresses of all the DNS servers that your school uses.
Jawaban
DHCP Server . . . . . . . . . . . : 192.168.194.129
DNS Servers . . . . . . . . . . . : 192.168.194.129
10.1.1.5
202.134.0.155
g. Type exit to close the command prompt window.
Step 4: Reflection
a. If your school did not have a DNS server, what effect would this have on your use of the Internet?
b. Some companies do not dedicate a single server for DNS. Instead, the DNS server provides other functions as well. Which functions do you think might be included on a DNS server? Use the ipconfig /all command to help you with this.
Rabu, 13 Oktober 2010
tugas ccna
CCNA Discovery 1 Module 6 Exam Answers Version 4.0
1. A user types www.cisco.com into a web browser address textbox. What does www.cisco.com represent?
• the IP address of a web server
• a physical network address
• the closest router interface to the source (X)
• the source IP address in the data transmission
2. What type of server would use IMAP?
• DNS
• DHCP
• e-mail
• FTP (x)
• Telnet
• web
3. Which type of server would most likely be used first by a network client in a corporate environment?
• DNS (x)
• DHCP
• e-mail
• FTP
• Telnet
• web
4. Which protocol is used by FTP to transfer files over the Internet?
• TCP
• SMTP
• UDP (x)
• SNMP
5. Which protocols are TCP/IP application layer protocols? (Choose two.)
• UDP
• FTP (x)
• IP
• SMTP (x)
• TCP
6. Which of the following are layers of the TCP/IP model? (Choose three.)
• Application (x)
• Physical
• Internet (x)
• Network Access (x)
• Presentation
7. You are creating a network-based video game. What influences your decision about which transport protocol to use for the application?
• UDP will not disrupt the game to retransmit dropped packets.
• TCP provides extra acknowledgements that will ensure smooth video delivery.
• Both TCP and UDP can be used simultaneously to ensure speed and guaranteed delivery. (x)
• Both TCP and UDP may slow transmission and disrupt game operation, so no transport protocol should be used.
8. Whenever e-mail clients send letters, what device is used to translate the domain names into their associated IP addresses?
• Uniform Resource Locator (x)
• Network redirector server
• SNMP server
• DNS server
9. Which application is most likely used to translate www.cisco.com to 198.133.219.25?
• DHCP
• DNS
• FTP
• HTTP (x)
• POP
• SMTP
10. Refer to the graphic. Which protocol is used to access this website?
• IM
• FTP
• HTTP
• SNMP (x)
• VoIP
11. Which port number is used by SMTP?
• 20
• 21
• 25
• 26
• 110 (x)
12. Which protocol is used by e-mail servers to communicate with each other?
• FTP
• HTTP
• TFTP
• SMTP (x)
• POP
• SNMP
13. What client software enables logged in users to communicate with other logged in users in real time?
• blog
• e-mail (x)
• web mail
• instant messaging
14. An Internet server is running both FTP and HTTP services. How does the server know which of these applications should handle an incoming segment?
• The packet header identifies it as an HTTP or FTP packet. (x)
• The data in the segment is specially formatted for either HTTP or FTP.
• The segment destination port number identifies the application that should handle it.
• The source port number is associated with one of these well known server applications.
15. What term is used to describe how TCP/IP protocols are layered and interact to format, address, and transmit information across a network?
• protocol hierarchy (x)
• protocol modeling
• protocol stack
• protocol layering
16. What three items are contained in an Ethernet frame? (Choose three.)
• source IP address (x)
• source MAC address
• destination IP address (x)
• destination MAC address
• error-checking information (x)
17. What information is contained in an IP header?
• source and destination IP addresses
• source and destination MAC addresses
• only destination IP and MAC addresses
• both source and destination IP and MAC addresses (x)
18. Cabling issues are associated with which OSI layer?
• 4 (x)
• 2
• 1
• 3
19. A device receives an Ethernet frame and recognizes the MAC address as its own. What does the device do to the message to get to the encapsulated data?
• removes the IP header
• removes the TCP header
• passes data to the application layer
• removes the Ethernet header and trailer (x)
20. A client has decoded a frame and started the de-encapsulation process. In which order does the de-encapsulation process occur?
• 1) remove IP header
2) remove Ethernet header and trailer
3) remove TCP header
4) pass data to the application
• 1) add TCP header to data (x)
2) add an IP header
3) add frame header and trailer
4) encode the frame into bits
• 1) remove Ethernet header and trailer
2) remove IP header
3) remove TCP header
4) pass data to the application
• 1) add TCP header to data
2) add Ethernet header and trailer
3) add an IP header
4) encode the frame into bits
21. What is an advantage of the use of layers in the OSI reference model?
• It breaks network communications into larger parts.
• It increases complexity.(x)
• It prevents changes in one layer from affecting other layers.
• It requires the use of single-vendor equipment for hardware and software communications.
22. What is the correct order of the layers of the OSI reference model, starting at the lowest layer and working up the model?
• data link, physical, transport, network, presentation, session, application
• physical, data link, network, session, transport, presentation, application (x)
• physical, data link, network, transport, presentation, session, application
1. A user types www.cisco.com into a web browser address textbox. What does www.cisco.com represent?
• the IP address of a web server
• a physical network address
• the closest router interface to the source (X)
• the source IP address in the data transmission
2. What type of server would use IMAP?
• DNS
• DHCP
• FTP (x)
• Telnet
• web
3. Which type of server would most likely be used first by a network client in a corporate environment?
• DNS (x)
• DHCP
• FTP
• Telnet
• web
4. Which protocol is used by FTP to transfer files over the Internet?
• TCP
• SMTP
• UDP (x)
• SNMP
5. Which protocols are TCP/IP application layer protocols? (Choose two.)
• UDP
• FTP (x)
• IP
• SMTP (x)
• TCP
6. Which of the following are layers of the TCP/IP model? (Choose three.)
• Application (x)
• Physical
• Internet (x)
• Network Access (x)
• Presentation
7. You are creating a network-based video game. What influences your decision about which transport protocol to use for the application?
• UDP will not disrupt the game to retransmit dropped packets.
• TCP provides extra acknowledgements that will ensure smooth video delivery.
• Both TCP and UDP can be used simultaneously to ensure speed and guaranteed delivery. (x)
• Both TCP and UDP may slow transmission and disrupt game operation, so no transport protocol should be used.
8. Whenever e-mail clients send letters, what device is used to translate the domain names into their associated IP addresses?
• Uniform Resource Locator (x)
• Network redirector server
• SNMP server
• DNS server
9. Which application is most likely used to translate www.cisco.com to 198.133.219.25?
• DHCP
• DNS
• FTP
• HTTP (x)
• POP
• SMTP
10. Refer to the graphic. Which protocol is used to access this website?
• IM
• FTP
• HTTP
• SNMP (x)
• VoIP
11. Which port number is used by SMTP?
• 20
• 21
• 25
• 26
• 110 (x)
12. Which protocol is used by e-mail servers to communicate with each other?
• FTP
• HTTP
• TFTP
• SMTP (x)
• POP
• SNMP
13. What client software enables logged in users to communicate with other logged in users in real time?
• blog
• e-mail (x)
• web mail
• instant messaging
14. An Internet server is running both FTP and HTTP services. How does the server know which of these applications should handle an incoming segment?
• The packet header identifies it as an HTTP or FTP packet. (x)
• The data in the segment is specially formatted for either HTTP or FTP.
• The segment destination port number identifies the application that should handle it.
• The source port number is associated with one of these well known server applications.
15. What term is used to describe how TCP/IP protocols are layered and interact to format, address, and transmit information across a network?
• protocol hierarchy (x)
• protocol modeling
• protocol stack
• protocol layering
16. What three items are contained in an Ethernet frame? (Choose three.)
• source IP address (x)
• source MAC address
• destination IP address (x)
• destination MAC address
• error-checking information (x)
17. What information is contained in an IP header?
• source and destination IP addresses
• source and destination MAC addresses
• only destination IP and MAC addresses
• both source and destination IP and MAC addresses (x)
18. Cabling issues are associated with which OSI layer?
• 4 (x)
• 2
• 1
• 3
19. A device receives an Ethernet frame and recognizes the MAC address as its own. What does the device do to the message to get to the encapsulated data?
• removes the IP header
• removes the TCP header
• passes data to the application layer
• removes the Ethernet header and trailer (x)
20. A client has decoded a frame and started the de-encapsulation process. In which order does the de-encapsulation process occur?
• 1) remove IP header
2) remove Ethernet header and trailer
3) remove TCP header
4) pass data to the application
• 1) add TCP header to data (x)
2) add an IP header
3) add frame header and trailer
4) encode the frame into bits
• 1) remove Ethernet header and trailer
2) remove IP header
3) remove TCP header
4) pass data to the application
• 1) add TCP header to data
2) add Ethernet header and trailer
3) add an IP header
4) encode the frame into bits
21. What is an advantage of the use of layers in the OSI reference model?
• It breaks network communications into larger parts.
• It increases complexity.(x)
• It prevents changes in one layer from affecting other layers.
• It requires the use of single-vendor equipment for hardware and software communications.
22. What is the correct order of the layers of the OSI reference model, starting at the lowest layer and working up the model?
• data link, physical, transport, network, presentation, session, application
• physical, data link, network, session, transport, presentation, application (x)
• physical, data link, network, transport, presentation, session, application
Langganan:
Postingan (Atom)