Search This Blog

Loading...

Tuesday, March 30, 2010

ENetwork Final Exam - CCNA Exploration: Network Fundamentals

ENetwork Final Exam - CCNA Exploration: Network Fundamentals (Version 4.0)
1
Which OSI layer does IP rely on to determine whether packets have been lost and to request retransmission?
application
presentation
session
transport ***



2
Refer to the exhibit. Which layered network model is shown in the diagram?
Cisco
IETF
OSI
TCP/IP ***



3
Refer to the exhibit. The diagram represents the process of sending e-mail between clients. Which list correctly identifies the component or protocol used at each numbered stage of the diagram?
1.MUA 2.MDA 3.MTA 4.SMTP 5.MTA 6.POP 7.MDA 8.MUA
1.MUA 2.POP 3.MDA 4.SMTP 5.MTA 6.MDA 7.SMTP 8.MUA
1.MUA 2.POP 3.SMTP 4.MDA 5.MTA 6.SMTP 7.POP 8.MUA
1.MUA 2.SMTP 3.MTA 4.SMTP 5.MTA 6.MDA 7.POP 8.MUA ***


4
A user enters http://www.cisco.com/web1.htm in the address line of a browser. Which statement is true about this transaction?
The "http" portion indicates the protocol that is being used.***
The "web1.htm" portion is the specific service name.
The retrieved web page will be displayed in URL code.
The "www.cisco.com" is the name of the web page file that is called.


5
Which range of port numbers are reserved for services that are commonly used by applications that run on servers?
0 to 255
0 to 1023 ***
1024 to 49151
49152 to 65535


6
Which OSI layer addressing is required to route packets between two networks?
Layer 1
Layer 2
Layer 3***
Layer 4



7
When connectionless protocols are implemented at the lower layers of the OSI model, what is usually used to acknowledge that the data was received and to request the retransmission of missing data?
IP
UDP
Ethernet
a connectionless acknowledgement
an upper-layer, connection-oriented protocol or service***


8
Which statement is true about Layer 3 addresses?
They are physical addresses.
They are used in routing decisions.***
They are only used on local networks.
They are altered each time a packet crosses a router.



9
Which option shows the PDU that contains the Layer 3 source and destination addressing for a packet?
Answer is Option 3***

10
During the encapsulation process, what identifiers are added at the transport layer?
source and destination IP addresses
source and destination MAC addresses
source and destination port numbers***
source and destination channel identifiers


11
Refer to the exhibit. In a network, PC1 sends a message to PC2. The frame received at PC2 is shown. What information in this frame determines the correct destination application?
timing and synchronization bits
destination and source physical addresses
destination and source logical network addresses
destination and source process numbers***


12
What three statements are true about network layer addressing? (Choose three.)
Network layer addressing uses a hierarchy.***
It uses addresses that are 48 bits in length.
It is used by Ethernet switches to make forwarding decisions.
It does not support broadcasts.
It uses a method by which the network portion of an address can be identified.***
Network layer addressing identifies each host distinctly.***


13
Which device should be used for enabling a host to communicate with another host on a different network?
switch
hub
router***
host


14
Refer to the exhibit. Host A attempts to establish a TCP/IP session with host C. During this attempt, a frame was captured with the source MAC address 0050.7320.D632 and the destination MAC address 0030.8517.44C4. The packet inside the captured frame has an IP source address 192.168.7.5, and the destination IP address is 192.168.219.24. At which point in the network was this packet captured?
leaving host A
leaving ATL
leaving Dallas***
leaving NYC


15
Refer to the exhibit. When computer A sends a frame to computer D, what computers receive the frame?
only computer D ***
only computer A and computer D
only computer B, computer C, and computer D
all computers


16
What type of network is maintained if a server takes no dedicated role in the network?
mainframe
client/server
peer-to-peer***
centralized


17
Refer to the exhibit. Assume all devices are using default configurations. How many subnets are required to address the topology that is shown?
1
3***
4
5
7



18
Refer to the exhibit. Which type of network design is shown?
client/server
wide area
dedicated server
peer-to-peer***



19
Refer to the exhibit. Host A is accessing multiple servers. Which combination of port number and address will uniquely identify a particular process running on a specific server?
MAC address of the server and port number of the service
IP address of the host and port number of the service
MAC address of the host and port number of the service
IP address of the server and port number of the service***



20
A network technician is tasked with setting up a network for six users, but the users should be able to use their accounts to log on from any of the six computers. What type of network should be used?
workgroup
P2P applications
peer-to-peer network
client-server network***





21
What are three characteristics of CSMA/CD? (Choose three.)
Devices can be configured with a higher transmission priority.
A jam signal indicates that the collision has cleared and the media is not busy.
A device listens and waits until the media is not busy before transmitting.***
The device with the electronic token is the only one that can transmit after a collision.
All of the devices on a segment see data that passes on the network medium.***
After detecting a collision, hosts can attempt to resume transmission after a random time delay has expired.***



22
Which of the following are the address ranges of the private IP addresses? (Choose three.)
10.0.0.0 to 10.255.255.255***
200.100.50.0 to 200.100.25.255
150.150.0.0 to 150.150.255.255
172.16.0.0 to 172.31.255.255***
192.168.0.0 to 192.168.255.255***
127.16.0.0 to 127.31.255.255


23
Refer to the exhibit. What function does router RT_A need to provide to allow Internet access for hosts in this network?
address translation***
DHCP services
ftpd
web server


24
Refer to the exhibit. A network technician is trying to determine the correct IP address configuration for Host A. What is a valid configuration for Host A?
IP address: 192.168.100.19; Subnet Mask: 255.255.255.248; Default Gateway: 192.16.1.2
IP address: 192.168.100.20; Subnet Mask: 255.255.255.240; Default Gateway: 192.168.100.17***
IP address: 192.168.100.21; Subnet Mask: 255.255.255.248; Default Gateway: 192.168.100.18
IP address: 192.168.100.22; Subnet Mask: 255.255.255.240; Default Gateway: 10.1.1.5
IP address: 192.168.100.30; Subnet Mask: 255.255.255.240; Default Gateway: 192.168.1.1
IP address: 192.168.100.31; Subnet Mask: 255.255.255.240; Default Gateway: 192.168.100.18


25
Refer to the exhibit. Host C is able to ping 127.0.0.1 successfully, but is unable to communicate with hosts A and B in the organization. What is the likely cause of the problem?
Hosts A and B are not on the same subnet as host C.
The IP addresses on the router serial interfaces are wrong.
The subnet mask on host C is improperly configured.***
The FastEthernet interface fa0/0 of router 1 is wrongly configured.


26
What happens when a host station receives a frame that contains its own MAC address in the destination field?
The Layer 2 information is removed and the frame is pushed up to Layer 3.***
The host station will copy the information to its buffers and send it back out.
The frame originated from the host and will be ignored.
The Layer 3 information is added to the frame.


27
Refer to the exhibit. A network administrator is troubleshooting a link that is down between Router1 and Router2. To correct the problem, which wire pairs need to be switched on one of the Ethernet cable ends?
pair 1 and pair 2
pair 1 and pair 3
pair 2 and pair 3***
pair 2 and pair 4


28
Refer to the exhibit. PC1 is unable to access PC2. To troubleshoot this problem, the technician needs to confirm that the next hop interface is operational. Which default gateway address should the technician ping from PC1 to confirm this?
10.0.0.254***
192.168.0.249
192.168.0.250
10.0.1.254


29
Which combination of network id and subnet mask correctly identifies all IP addresses from 172.16.128.0 through 172.16.159.255?
172.16.128.0 255.255.255.224
172.16.128.0 255.255.0.0
172.16.128.0 255.255.192.0
172.16.128.0 255.255.224.0***
172.16.128.0 255.255.255.192



30
Refer to the exhibit. Host A wants to connect to host B on a different network. Which three IP addresses can be assigned to host A to enable this connectivity? (Choose three.)
172.16.11.36
172.16.11.95
172.16.11.88***
172.16.11.70***
172.16.11.64
172.16.11.67***


31
A user sees the command prompt: Router(config-if)# . What task can be performed at this mode?
Reload the device.
Perform basic tests.
Configure individual interfaces.***
Configure individual terminal lines.


32
Which password is automatically encrypted when it is created?
vty
aux
console
enable secret***
enable password


33
Which router component will have contents erased when the command erase startup-config is issued?
flash
RAM
ROM
NVRAM***


34
A technician is asked to secure the privileged EXEC mode of a switch by requiring a password. Which type of password would require this login and be considered the most secure?
console
enable
enable secret***
VTY


35
Which exhibit shows the interface that is configured by the command, router(config)# interface serial 0/0/1?


Answer is Option 5***
36
When must a router serial interface be configured with the clock rate command?
when the interface is functioning as a DTE device
when the interface timers have been cleared
when the connected DTE device is shut down
when the interface is functioning as a DCE device***


37
What can the user do from the command prompt, Router(config-line)# ?
Configure one of the network interfaces.
Configure one of the physical or virtual lines.***
Verify the running configuration on the device.
Configure the parameters for one of the routing protocols.


38
Due to a security violation, the router passwords must be changed. What information can be learned from the following configuration entries? (Choose two.)

Router(config)# line vty 0 3
Router(config-line)# password c13c0
Router(config-line)# login
The entries specify three Telnet lines for remote access.
The entries specify four Telnet lines for remote access.***
The entries set the console and Telnet password to "c13c0".
Telnet access will be denied because the Telnet configuration is incomplete.
Access will be permitted for Telnet using "c13c0" as the password.***


39
Which prompt represents the appropriate mode used for the copy running-config startup-config command ?
Switch-6J>
Switch-6J#***
Switch-6J(config)#
Switch-6J(config-if)#
Switch-6J(config-line)#


40
Refer to the exhibit. An employee wants to access the organization intranet from home. Which intermediary device should be used to connect the organization intranet to the Internet to enable this access?
hub
switch
router***
wireless access point


41
Refer to the exhibit. A PC is communicating with another PC on a remote network. The two networks are connected by three routers. Which action will help to identify the path between the hosts?
Use the ipconfig command at the host.
Use the ipconfig/all command at the destination.
Use the tracert command at the host.***
Use the ping command at the destination.


42
Refer to the exhibit. RouterB is configured properly. The Ethernet interface Fa0/0 of RouterA is configured with the use of the commands that are shown. However, a ping from the Fa0/0 interface of RouterA to the Fa0/0 interface of RouterB is unsuccessful. What action should be taken on RouterA to solve this problem?
Use the description command on the FastEthernet interface Fa0/0.
Configure the clock rate of the FastEthernet interface Fa0/0.
Use the no shutdown command on the FastEthernet interface Fa0/0.***
Reboot the router.



43
Which physical connector type is used for a serial V.35 connection to the CSU/DSU?
Answer is Option 4***
44
What information can be gathered by using the command netstat?
the default gateway
the routing protocol
active TCP connections***
the locally configured subnet mask


45
Refer to the exhibit. Each media link is labeled. What type of cable should be used to connect the different devices?
Connection 1 - rollover cable
Connection 2 - straight-through cable
Connection 3 - crossover cable
Connection 1 - crossover cable
Connection 2 - rollover cable
Connection 3 - crossover cable
Connection 1 - straight-through cable
Connection 2 - crossover cable
Connection 3 - crossover cable
Connection 1 - straight-through cable***
Connection 2 - crossover cable***
Connection 3 - straight-through cable***
Connection 1 - crossover cable
Connection 2 - straight-through cable
Connection 3 - crossover cable


46
Refer to the exhibit. A network administrator remotely accesses the CLI of RouterB from PC1 using Telnet. Which statement is true about this connection?
The data is automatically encrypted.
A Telnet server process is running on PC1.
The connection is made through a VTY session on the router.***
A GET request was sent to RouterB to retrieve data during this session.


47
Refer to the exhibit. The tracert command is initiated from PC1 to PC4. Which device will send a response to the initial tracert packet from PC1?
Athens
Ankara
London***
Paris
PC4


48
Refer to the exhibit. Host A is transmitting data to host B. Which address combination will be used as the data leaves the Router1 Fa0/1 interface?
Destination IP: 192.168.72.2 Source MAC: 0007.C2B4.3421
Destination IP: 192.168.10.4 Source MAC: 0030.8596.DE81***
Destination IP: 192.168.10.4 Source MAC: 0007.C2B4.3421
Destination IP: 192.168.72.2 Source MAC: 0030.8596.DE81


49
Refer to the exhibit. While configuring a network, a technician wired each end of a Category 5e cable as shown. Which two statements are true about this setup? (Choose two.)
The cable is suitable for connecting a switch to a router Ethernet port.***
The cable is suitable for connecting dissimilar types of devices.***
The cable is unusable and must be rewired.
The cable is terminated in a way that the transmit pin is wired to the receive pin.
The cable simulates a point-to-point WAN link.


50
Refer to the exhibit. The ping 127.0.0.1 command is issued on the local host. What do the ping results indicate?
The local host can send packets on the local network.
The TCP/IP stack on the local host operates properly.***
The local host has full connectivity to the default gateway.
The local host has full connectivity to the remote network.


1
Refer to the exhibit. Which layered network model is shown in the diagram?
Cisco
IETF
OSI
TCP/IP***


2
Which OSI layer manages data segments?
application layer
presentation layer
session layer
transport layer***



3
A user enters http://www.cisco.com/web1.htm in the address line of a browser. Which statement is true about this transaction?
The "http" portion indicates the protocol that is being used.***
The "web1.htm" portion is the specific service name.
The retrieved web page will be displayed in URL code.
The "www.cisco.com" is the name of the web page file that is called.


4
Which range of port numbers are reserved for services that are commonly used by applications that run on servers?
0 to 255
0 to 1023***
1024 to 49151
49152 to 65535


5
Refer to the exhibit. Host A is requesting a web page from the web server. Which option represents the socket to which the request is made?
80
www.cisco.com
10.0.0.130
10.0.0.130:80***


6
Which option shows the PDU that contains the Layer 3 source and destination addressing for a packet?

Answer is Option 3***

7
Which statement describes the correct use of addresses to deliver an e-mail message from HostB to the e-mail service that is running on ServerA?
HostB uses the MAC address of ServerA as the destination.
Router B uses a Layer 3 network address to route the packet.***
Router A uses the Layer 4 address to forward the packet to Router B.
Via the use of a Layer 3 address, ServerA assigns the message to the e-mail service.


8
Refer to the exhibit. Host A is trying to send data to host E. When host A sends out an ARP request, what response should be received?
00-08-a3-d6-ab-17
00-10-7b-e7-fa-ef***
00-0d-88-c7-9a-24
Destination Unreachable from RouterA


9
What is the correct order for PDU encapsulation?
Answer is Option 1***
10
The tracert 10.1.3.2 command was issued on computer A. Computer A can ping other addresses on the local subnet. Computer A sent the first ICMP packet toward computer B with a TTL value of 1. A protocol analyzer that was running on computer B showed that the packet never reached its destination. Why did the packet not reach the destination?
There is a TCP/IP problem on computer A.
There is a routing loop between R1 and R2.
R1 does not have a route for the destination network.
The TTL for the packet was decreased to zero by R1.***


11
Refer to the exhibit. A web browser is running on host PC1 with an IP address 10.10.2.2/24. A dynamic port number of 49152 is assigned to the browser. The browser sends a request for a web page to the web server with an IP address 192.168.1.254/24. Which statement is true?
The session is established using TCP, and the socket number for the web server is 192.168.1.254: 80.***
The session is established using TCP, and the socket number for the web server is 192.168.1.254: 49152.
The session is established using UDP, and the socket number for the web server is 192.168.1.254: 80.
The session is established using UDP, and the socket number for the web server is 192.168.1.254: 49152.


12
How does a DTE device determine its clocking information?
The clocking information is manually configured by the administrator.
It is automatically sensed from the DCE device.***
It is automatically generated based on port speed.
It is autonegotiated between the DTE and the DCE device.


13
Which device should be used for enabling a host to communicate with another host on a different network?
switch
hub
router***
host


14
Which topology divides the collision domain and provides full media bandwidth to the hosts in the network?
Answer is Option 3***
15
Refer to the exhibit. Host A attempts to establish a TCP/IP session with host C. During this attempt, a frame was captured with the source MAC address 0050.7320.D632 and the destination MAC address 0030.8517.44C4. The packet inside the captured frame has an IP source address 192.168.7.5, and the destination IP address is 192.168.219.24. At which point in the network was this packet captured?
leaving host A
leaving ATL
leaving Dallas***
leaving NYC


16
What type of network is maintained if a server takes no dedicated role in the network?
mainframe
client/server
peer-to-peer***
centralized


17
Refer to the exhibit. Host A and B are unable to communicate with each other. What is the reason for this?
Host A is assigned a network address.
Host B is assigned a multicast address.
Host A and host B belong to different networks.
The gateway addresses are network addresses.***


18
Which topology represents a collision-free environment?

Answer is Option 3***

19
Refer to the exhibit. Host A is configured with the correct IP address for the default gateway of the router R1 FastEthernet0/1 interface. How will a packet that is sent from host A to host B be handled by the devices on the network?
R1 will drop the packet because R1 does not have a specific route in its routing table to the 10.1.1.0/24 network.***
R1 will forward the packet to its default gateway, the next hop router R2. R2 will forward the packet to the directly connected network 10.1.1.0/24.
R1 will forward the packet to its default gateway, the next hop router R2. R2 will drop the packet because it does not have a default route to network 10.1.1.0/24.
R1 will forward the packet to its default gateway, the next hop router R2. R2 will drop the packet because it does not have a route that is learned by a routing protocol to network 10.1.1.0/24.


20
Refer to the exhibit. Host A sends a frame with the destination MAC address as FFFF.FFFF.FFFF. What action will the switch take for this frame?
It will drop the frame.
It will send the frame back to host A.
It will send the frame to all hosts except host A.***
It will forward the frame to the default gateway.


21
Refer to the exhibit. Host A sends a frame to host C with a destination MAC address CC. The MAC address for host C is not in the MAC table of switch SW1. How will SW1 handle the frame?
Switch SW1 will drop the frame.
Switch SW1 will forward the frame to host C.
Switch SW1 will flood the frame out all ports.
Switch SW1 will flood the frame out all ports except port Fa0/1.***


22
Refer to the exhibit. A technician is working on a network problem that requires verification of the router LAN interface. What address should be pinged from this host to confirm that the router interface is operational?
127.0.0.1
192.168.64.196
192.168.254.1***
192.168.254.9
192.168.254.254


23
Refer to the exhibit. The router of the company failed and was replaced. After the replacement, hosts C and D in the Education office are able to ping each other, but they are unable to access the hosts in the Accounts office. What is the likely cause of the problem?
The IP address at the fa0/0 interface of the router is incorrectly configured.
The subnet mask at the fa0/1 interface of the router is incorrectly entered.***
The IP address at the serial interface of the router is incorrectly configured.
The hosts in the Accounts office are not on the same subnet as the hosts in the Education office.


24
A network administrator subnets the network 192.168.1.0/24 into four subnets. Which option correctly addresses Router1 and host A into the second subnet created?

Answer is Option 3***
25
Which three addresses belong to the category of public IP addresses? (Choose three.)
127.0.0.1
196.1.105.6***
132.11.9.99***
10.0.0.1
172.16.9.10
46.1.1.97***


26
Refer to the exhibit. Host1 is in the process of setting up a TCP session with Host2. Host1 has sent a SYN message to begin session establishment. What happens next?
Host1 sends a segment with the ACK flag = 0, SYN flag = 0 to Host2.
Host1 sends a segment with the ACK flag = 1, SYN flag = 0 to Host2.
Host1 sends a segment with the ACK flag = 1, SYN flag = 1 to Host2.
Host2 sends a segment with the ACK flag = 0, SYN flag = 1 to Host1.
Host2 sends a segment with the ACK flag = 1, SYN flag = 0 to Host1.
Host2 sends a segment with the ACK flag = 1, SYN flag = 1 to Host1.***


27
Refer to the exhibit. With the router running NAT, what IP addresses can be applied to the computer to allow access to the Internet? (Choose three.)
192.168.18.38
192.168.18.48
192.168.18.49***
192.168.18.52***
192.168.18.59***
192.168.18.63


28
An organization has decided to use IP addresses in the range 172.20.128.0 to 172.20.143.255. Which combination of network ID and subnet mask identifies all IP addresses in this range?
Network ID: 172.20.128.0 Subnet mask: 255.255.255.0
Network ID: 172.20.128.0 Subnet mask: 255.255.0.0
Network ID: 172.20.128.0 Subnet mask: 255.255.224.0
Network ID: 172.20.128.0 Subnet mask: 255.255.240.0***
Network ID: 172.20.128.0 Subnet mask: 255.255.255.240



29
Which three IPv4 addresses represent valid host addresses for a subnet? (Choose three.)
10.1.12.79/28
10.1.12.113/28***
10.1.12.32/28
10.1.11.5/27***
10.1.11.97/27***
10.1.11.128/27


30
An organization wants to create a subnet of the IP network 172.16.0.0. This subnet will accommodate 1000 hosts. Which subnet mask should be assigned to this network?
255.255.0.0
255.255.248.0
255.255.252.0***
255.255.254.0
255.255.255.0
255.255.255.128


31
A user sees the command prompt: Router(config-if)# . What task can be performed at this mode?
Reload the device.
Perform basic tests.
Configure individual interfaces.***
Configure individual terminal lines.


32
What is the effect of using the Router# copy running-config startup-config command on a router?
The contents of ROM will change.
The contents of RAM will change.
The contents of NVRAM will change.***
The contents of flash will change.


33
A technician is asked to secure the privileged EXEC mode of a switch by requiring a password. Which type of password would require this login and be considered the most secure?
console
enable
enable secret***
VTY


34
When must a router serial interface be configured with the clock rate command?
when the interface is functioning as a DTE device
when the interface timers have been cleared
when the connected DTE device is shut down
when the interface is functioning as a DCE device***


35
To enhance security in a network, the network administrator uses these commands:

Router(config)# line console 0
Router(config-line)# password j1mdi2
Router(config-line)# login

What two conclusions are evident from these commands? (Choose two.)
Users who attempt to connect to the console port of the router must enter a password.***
The entries permit access through the console by the use of j1mdi2 as the password.***
The entries eliminate the need for authentication.
Access through the console will be denied because the console configuration is incomplete.
The entries prevent passwords from being displayed as plain text.



36
A network administrator is configuring several switches for a network. The switches have similar configurations and only minor differences. The administrator wants to save all commands that are issued on the first switch to a text file for editing. Which transfer option should be selected in HyperTerminal?

Answer is Option 3***

37
Refer to the exhibit. Which option shows the correct topology given the configuration of Router1?

Answer is Option 1***
38
Due to a security violation, the router passwords must be changed. What information can be learned from the following configuration entries? (Choose two.)

Router(config)# line vty 0 3
Router(config-line)# password c13c0
Router(config-line)# login
The entries specify three Telnet lines for remote access.
The entries specify four Telnet lines for remote access.***
The entries set the console and Telnet password to "c13c0".
Telnet access will be denied because the Telnet configuration is incomplete.
Access will be permitted for Telnet using "c13c0" as the password.***


39
If an administrator wished to return a router to the default state, what additional step must be taken after issuing the command erase start-up config?
Reload the device.
Issue the command copy running-config start-up config.***
Perform a show running-config to verify that the file was removed.
Enter the interface commands to allow the device to connect to the network.


40
Refer to the exhibit. Which list refers only to end devices?
D,E,F,G***
A,H,B,C
A,D,E,F
A,D,E,G


41
Refer to the exhibit. An employee wants to access the organization intranet from home. Which intermediary device should be used to connect the organization intranet to the Internet to enable this access?
hub
switch
router***
wireless access point


42
Refer to the exhibit. A PC is connected to a network. Which action will verify that the PC can communicate with its default gateway?
Use the ping 127.0.0.1 command.
Use the ipconfig command.
Use the ipconfig/all command.
Use the ping 10.0.0.254 command.***


43
Refer to the exhibit. The serial interface of the router was configured with the use of the commands that are shown. The router cannot ping the router that is directly connected to interface serial 0/0/0. What should the network technician do to solve this problem?
Configure the description at interface serial 0/0/0.
Configure an IP address on interface serial 0/0/0.***
Remove the no shutdown command at interface serial 0/0/0
Reboot the router.


44
What information can be gathered by using the command netstat?
the default gateway
the routing protocol
active TCP connections***
the locally configured subnet mask


45
How can ARP be used to help document the network?
It can list each hop on the way to a destination host.
It can show the average latency of hosts on the network.
It can provide a list of physical addresses on the network.***
It can indicate which hosts are not responding to network traffic.


46
Which two types of media can provide bandwidth up to 1 Gb/s? (Choose two.)
10 BASE-T
100 BASE-T
100 BASE-FX
1000 BASE-TX***
1000 BASE-SX***


47
A PC can not connect to any remote websites, ping its default gateway, or ping a printer that is functioning properly on the local network segment. Which action will verify that the TCP/IP stack is functioning correctly on this PC?
Use the ipconfig /all command at the host’s command prompt.
Use the ping 127.0.0.1 command at the command prompt.***
Use the traceroute command at the command prompt to identify any failures on the path to the gateway.
Use FTP to check for connectivity to remote sites.
Download a troubleshooting tool from the PC manufacturer's website.


48
Refer to the exhibit. Each media link is labeled. What type of cable should be used to connect the different devices?
Connection 1 - straight-through cable Connection 2 - straight-through cable Connection 3 - crossover cable
Connection 1 - straight-through cable Connection 2 - crossover cable Connection 3 - rollover cable
Connection 1 - crossover cable Connection 2 - rollover cable Connection 3 - straight-through cable
Connection 1 - crossover cable Connection 2 - straight-through cable Connection 3 - crossover cable***
Connection 1 - straight-through cable Connection 2 - rollover cable Connection 3 - crossover cable


49
Which combination of connectors will be used to make a straight-through cable when building a LAN to the T568A standard?

Answer is Option 1***
50
Refer to the exhibit. Host A is unable to reach the remote network. On the basis of the provided output, what is the cause of the problem?
Host A is configured with an incorrect IP address.
Host A is configured with an incorrect default gateway IP address.
There is no path to the remote network in the routing table of router R1.***
Given that the destination network has a subnet mask of /16, host A and interface Fa0/1 of R1 are both configured with an incorrect subnet mask.


1
Which OSI layer manages data segments?
application layer
presentation layer
session layer
transport layer***


2
Refer to the exhibit. The diagram represents the process of sending e-mail between clients. Which list correctly identifies the component or protocol used at each numbered stage of the diagram?
1.MUA 2.MDA 3.MTA 4.SMTP 5.MTA 6.POP 7.MDA 8.MUA
1.MUA 2.POP 3.MDA 4.SMTP 5.MTA 6.MDA 7.SMTP 8.MUA
1.MUA 2.POP 3.SMTP 4.MDA 5.MTA 6.SMTP 7.POP 8.MUA
1.MUA 2.SMTP 3.MTA 4.SMTP 5.MTA 6.MDA 7.POP 8.MUA***


3
A user enters http://www.cisco.com/web1.htm in the address line of a browser. Which statement is true about this transaction?
The "http" portion indicates the protocol that is being used.***
The "web1.htm" portion is the specific service name.
The retrieved web page will be displayed in URL code.
The "www.cisco.com" is the name of the web page file that is called.


4
Which range of port numbers are reserved for services that are commonly used by applications that run on servers?
0 to 255
0 to 1023***
1024 to 49151
49152 to 65535



5
Which OSI layer offers ordered data reconstruction services?
application layer
network layer
presentation layer
session layer
transport layer***


6
Which two functions of the OSI model occur at layer two? (Choose two.)
physical addressing***
encoding
routing
cabling
media access control***


7
Which information is used by the router to determine the path between the source and destination hosts?
the host portion of the IP address
the network portion of the IP address***
host default gateway address
the MAC address


8
A network has grown too large for technicians to configure network addresses and hosts files for name resolution. Which two application layer services should be added to the server to allow these needs to be satisfied dynamically? (Choose two.)
DNS***
FTP
DHCP***
HTTP
SMTP


9
Refer to the exhibit. Which Layer 2 protocol could be used inside nework A and network C?
IP
TCP
UDP
Ethernet***


10
Which option shows the PDU that contains the Layer 3 source and destination addressing for a packet?

Answer is Option 3***
11
A technician is setting up a workgroup for six users and wants to allow users to share files without setting up a server. Which application layer protocol will provide for peer-to-peer file sharing in a workgroup?
DNS
SMB***
HTTP
DHCP


12
What are three characteristics of CSMA/CD? (Choose three.)
Devices listen to the media and transmit data only when they cannot detect another signal on the media.***
All devices on the media can hear all communications.***
Devices communicate based on a configured priority.
After a collision occurs, the devices that caused the collision have first priority when attempting to retransmit.
When a collision occurs, all devices stop transmitting for a randomly generated period of time.***
CSMA/CD uses a token system to avoid collisions.


13
Which device should be used for enabling a host to communicate with another host on a different network?
switch
hub
router***
host


14
Refer to the exhibit. Assume all devices are using default configurations. How many subnets are required to address the topology that is shown?
1
3***
4
5
7


15
Refer to the exhibit. When computer A sends a frame to computer D, what computers receive the frame?
only computer D***
only computer A and computer D
only computer B, computer C, and computer D
all computers


16
Which topology represents a collision-free environment?

Answer is Option 3***
17
Refer to the exhibit. Communication for hosts X and Y is restricted to the local network. What is the reason for this?
Host X is assigned a network address.
Host Y is assigned a multicast address.
Host X and host Y belong to different networks.
The gateway addresses are broadcast addresses.***


18
Which option shows how a router will route packets to a remote network?

Answer is Option 4***
19
Refer to the exhibit. What two facts can be determined about the exhibited topology? (Choose two.)
A single broadcast domain is present***
Two logical address ranges are required.
Three broadcast domains are shown.
Four networks are needed.
Five collision domains exist.***


20
Refer to the exhibit. Host B attempts to establish a TCP/IP session with host C. During this attempt, a frame was captured at the FastEthernet interface fa0/1 of the San Francisco router. The packet inside the captured frame has the source IP address 10.10.1.2, and the destination IP address is 10.31.1.20. What is the destination MAC address of the frame at the time of capture?
0060.7320.D632
0060.7320.D631***
0040.8517.44C3
0009.B2E4.EE03
0010.C2B4.3421


21
Refer to the exhibit. A router, whose table is shown, receives a packet that is destined for 192.168.1.4. How will router treat the packet?
The packet will be dropped.
The packet will be forwarded via FastEthernet 0/0.
The packet will be forwarded to the destination host.***
The packet will be forwarded to the 192.168.1.3 next-hop address.


22
Refer to the exhibit. A technician is working on a network problem that requires verification of the router LAN interface. What address should be pinged from this host to confirm that the router interface is operational?
127.0.0.1
192.168.64.196
192.168.254.1***
192.168.254.9
192.168.254.254


23
Refer to the exhibit. A network technician is trying to determine the correct IP address configuration for Host A. What is a valid configuration for Host A?
IP address: 192.168.100.19; Subnet Mask: 255.255.255.248; Default Gateway: 192.16.1.2
IP address: 192.168.100.20; Subnet Mask: 255.255.255.240; Default Gateway: 192.168.100.17***
IP address: 192.168.100.21; Subnet Mask: 255.255.255.248; Default Gateway: 192.168.100.18
IP address: 192.168.100.22; Subnet Mask: 255.255.255.240; Default Gateway: 10.1.1.5
IP address: 192.168.100.30; Subnet Mask: 255.255.255.240; Default Gateway: 192.168.1.1
IP address: 192.168.100.31; Subnet Mask: 255.255.255.240; Default Gateway: 192.168.100.18


24
Refer to the exhibit. A user wants to access the Internet from the PC. A part of the running configuration of the router is shown. Which default gateway IP address should be configured at the PC to enable this access?
10.1.192.1***
10.1.192.2
10.1.192.54
192.31.7.1


25
Refer to the exhibit. Which option correctly identifies the network address, range of host addresses, and the broadcast address for the network that contains host A?

Answer is Option 3***

26
A network administrator subnets the network 192.168.1.0/24 into four subnets. Which option correctly addresses Router1 and host A into the second subnet created?

Answer is Option 3***
27
Which subnet mask will allow 2040 hosts per subnet on the IP network 10.0.0.0?
255.255.0.0
255.255.254.0
255.255.252.0
255.255.248.0***
255.255.240.0
255.255.255.128


28
An organization has been assigned network ID 10.10.128.0 and subnet mask 255.255.224.0. Which IP address range can be used for this organization?
10.10.128.0 to 10.10.160.255
10.10.128.0 to 10.10.159.255***
10.10.128.0 to 10.10.192.255
10.10.128.0 to 10.10.0.159
10.10.128.0 to 10.10.159.0


29
Which table accurately associates the RFC 1918 private IP addresses with the correct network mask?

Answer is Option 3***
30
What is true regarding network layer addressing? (Choose three.)
uses a flat structure
prevent broadcasts
heirarchical***
uniquely identifies each host***
48 bits in length
contains a network portion***



31
A user sees the command prompt: Router(config-if)# . What task can be performed at this mode?
Reload the device.
Perform basic tests.
Configure individual interfaces.***
Configure individual terminal lines.


32
Which memory contents will change as a result of using the Router# erase startup-config command on a router?
RAM
ROM
flash
NVRAM***


33
Which exhibit shows the interface that is configured by the command, router(config)# interface serial 0/0/1?

Answer is Option 5***
34
Two routers are connected via their serial ports in a lab environment. The routers are configured with valid IP addresses, but they cannot ping each other. The show interface serial0/0 command shows that the serial0/0 interface is up but the line protocol is down. What could be the cause of this problem?
The no shutdown command has not been applied to the interfaces.
The clock rate command has not been entered on the DCE interface.***
The interface timers are not cleared.
The FastEthernet interface is emulating a serial interface by assigning it a timing signal.


35
What is the Cisco IOS?
system software for Cisco devices***
Read Only Memory in Cisco devices
non-volatile storage for device configurations
an initial operating system that is used for boot functions


36
Refer to the exhibit. Which option shows the correct topology given the configuration of Router1?

Answer is Option 1

37
Refer to the exhibit. An administrator made several changes to the configuration of the router but did not accomplish the desired result. To undo the changes the reload command was used. What will happen if the administrator answers yes to the prompt?
The changes will be lost and the configuration file in RAM will be loaded.
The changes will be saved and the configuration file in RAM will be loaded.
The changes will be lost and the configuration file in NVRAM will be loaded.
The changes will be saved and the configuration file in NVRAM will be loaded.***


38
Which statement is true about router hostnames?
A hostname should be unique on each router.***
A router hostname cannot contain capital letters.
A router hostname is configured in privileged executive mode.
A router hostname must be created before any other configurations can be added to the device.


39
Refer to the exhibit. A network technician has made several changes to R1 since the configuration has last been saved. The modified configuration did not produce the desired changes. The technician wants to store a backup copy of the saved configuration on a TFTP server before reloading. Which action will cause the unmodified data to be saved on the TFTP server?

Answer is Option 2***
40
Refer to the exhibit. An employee wants to access the organization intranet from home. Which intermediary device should be used to connect the organization intranet to the Internet to enable this access?
hub
switch
router***
wireless access point


41
Which physical component is used to access and perform the initial configuration on a new unconfigured router?

Answer is Option 2***

42
Refer to the exhibit. A PC is communicating with another PC on a remote network. The two networks are connected by three routers. Which action will help to identify the path between the hosts?
Use the ipconfig command at the host.
Use the ipconfig/all command at the destination.
Use the tracert command at the host.***
Use the ping command at the destination.


43
Refer to the exhibit. RouterB is configured properly. The Ethernet interface Fa0/0 of RouterA is configured with the use of the commands that are shown. However, a ping from the Fa0/0 interface of RouterA to the Fa0/0 interface of RouterB is unsuccessful. What action should be taken on RouterA to solve this problem?
Use the description command on the FastEthernet interface Fa0/0.
Configure the clock rate of the FastEthernet interface Fa0/0.
Use the no shutdown command on the FastEthernet interface Fa0/0.***
Reboot the router.


44
Refer to the exhibit. A PC is connected to a network. Which action will verify that the PC can communicate with its default gateway?
Use the ping 127.0.0.1 command.
Use the ipconfig command.
Use the ipconfig/all command.
Use the ping 10.0.0.254 command.***


45
How can ARP be used to help document the network?
It can list each hop on the way to a destination host.
It can show the average latency of hosts on the network.
It can provide a list of physical addresses on the network.***
It can indicate which hosts are not responding to network traffic.


46
Refer to the exhibit. Host A is unable to reach host B on the remote network. A technician attempted to ping the local gateway and the ping was successful. To verify the host configuration, the technician issued the ipconfig command. What is the likely cause of the problem?
The local NIC is incorrectly configured.
The subnet mask on host A is incorrectly configured.
The IP address on host A is incorrectly configured.
The default gateway on host A is incorrectly configured.***


47
Refer to the exhibit. A student has wired each end of a CAT 5e cable as shown. What is the result? (Choose two.)
The cable is unusable and must be rewired.
The cable is suitable for use as a rollover cable.
The cable is suitable for use as a Fast Ethernet crossover.***
The cable is suitable for use as a Gigabit Ethernet straight-through.
The cable is suitable for use between two 100 Mbps Auto-MDIX capable switches.***


48
Which option correctly identifies the interface or interfaces used to connect the router to a CSU/DSU for WAN connectivity?

Answer is Option 4***

49
Refer to the exhibit. Which diagram depicts the path through the network that is represented in the output of the tracert command?

Answer is Option 4***

50
Refer to the exhibit. The command that is shown was issued on a PC. What does the IP address 192.168.33.2 represent?
IP address of the host
default gateway of the host
IP address of the homepage for the host
primary domain name server for the host***
IP address of the website resolver1.mooki.local



2 comments:

  1. well not 100% but damn near :D

    39
    If an administrator wished to return a router to the default state, what additional step must be taken after issuing the command erase start-up config?
    Reload the device. ****
    Issue the command copy running-config start-up config.***
    Perform a show running-config to verify that the file was removed.
    Enter the interface commands to allow the device to connect to the network.

    ReplyDelete