Wednesday, May 30, 2012
Tuesday, May 29, 2012
Terminology yang mesti harus dikenali
Terminology yang mesti harus dikenali
- hop count : skala ukur jarak dihitung dari beberapa router yang dibutuhkan untuk mencapai tujuan
- metric : ukuran biaya sebuah rute untuk mencapai tujuan
- setiap routing protocol menggunakan metric yang berbeda
* RIP menggunakan hop count ( loncatan router)
* OSPF menggunakan bandwidth
* EIGRP menggunkan bandwidth , Delay , Load , Reliability .
-Administrative Distance : tingkat kepercayaan router untuk routing protocol .
* setiap vendor memiliki nilai AD yang berbeda untuk setiap routing protocol
* Pada router cisco , nilai AD secara default :
* RIP 120
* OSPF 110
* EIGRP 90
* Static 1
* Directly Connected 0
* Unknown 255
-convergence : suatu keadaan jaringan dimana setiap jaringan dapat menjangkau seluruh jaringan yang ada ( routing table memiliki informasi yang lengkap )
-convergence Time : waktu yang diperlukan untuk mencapai convergence
* Slower convergence : RIP . IGRP
* Faster Convergence : OSPF , EIGRP
Pemilihan Route yangh masuk ke routing table adalah route yang memiliki AD terkecil , serta diantara AD yang sama , dipilih metric yang terkecil .
Dynamic RP umumnya memiliki 2 operasi yaitu network discovery dan routing table maintenance
IGP Dynamic Routing Protocol dibagi menjadi 2 yaitu :
Distance Vector :
-mengenai jarak ( hop -count ) dan arah saja
-sangat tergantung tetangga
-umumnya mencapai convergence dengan cara mengirimkan complete rouitng table secara estafet
-mengenal adadnya periodic update
-umumnya menggunakan algoritman bellman-ford
Read more
Sunday, May 27, 2012
ccna-1-final-exam-answers-2011
1. Due to a security violation, the router passwords must be changed. What information can be learned from the following configuration entries? (Choose two.)
Router(config)# line vty 0 3 Router(config-line)# password c13c0 Router(config-line)# login
The entries specify three Telnet lines for remote access.
The entries specify four Telnet lines for remote access.
The entries set the console and Telnet password to "c13c0".
Telnet access will be denied because the Telnet configuration is incomplete.
Access will be permitted for Telnet using "c13c0" as the password.
2. Which two actions could be taken by a router if a specific match is not made to a route in the routing table? (Choose two.)
The packet will be discarded.
The packet will be sent back to the source.
The packet will be flooded out all interfaces.
Neighboring routers are polled to find the best path.
The packet will be forwarded to a default route if one is present.
3.
Refer to the exhibit. The network administrator remotely accesses the CLI of RouterB from PC1 using a secure connection. Which statement is true about this connection?
The Telnet server process is running on PC1.
Only the exchange of the Telnet username and password is encrypted.
The GET request is sent to RouterA to retrieve data.
The SSH service is used to connect PC1 to RouterB.
4.
Refer to the exhibit. What three statements are true about the IP configuration that is shown? (Choose three.)
The prefix of the subnet mask is /26.
The network on which this computer resides can have 30 hosts.
The computer is unable to communicate outside of the local network.
The address that is assigned to the computer represents private addressing.
The IP address that is assigned to the computer is routable on the Internet.
The IP address that is assigned as the default gateway is valid for this host.
5. What information can be gathered by using the command netstat?
the default gateway
the routing protocol
active TCP connections
the locally configured subnet mask
6.
Refer to the exhibit. The nslookup command that is shown was issued on a Windows PC host. What does the 10.32.5.74 address represent?
the IP address of the host
the default gateway for the host
the primary DNS server for the host
the home page address for the host
7.
Refer to the exhibit. A network administrator remotely accesses the CLI of RouterB from PC1 using Telnet. Which statement is true about this connection?
The data is automatically encrypted.
A Telnet server process is running on PC1.
The connection is made through a VTY session on the router.
A GET request was sent to RouterB to retrieve data during this session.
8. Which three addresses are private IP addresses? (Choose three.)
10.0.0.1
46.1.1.88
172.31.31.10
172.32.16.10
192.168.8.8
9.
Refer to the exhibit. Host C is able to ping 127.0.0.1 successfully, but is unable to communicate with hosts A and B in the organization. What is the likely cause of the problem?
Hosts A and B are not on the same subnet as host C.
The IP addresses on the router serial interfaces are wrong.
The subnet mask on host C is improperly configured.
The FastEthernet interface fa0/0 of router 1 is wrongly configured.
10. Which OSI layer addressing is required to route packets between two networks?
Layer 1
Layer 2
Layer 3
Layer 4
11. What is the effect of using the Router# copy running-config startup-config command on a router?
The contents of ROM will change.
The contents of RAM will change.
The contents of NVRAM will change.
The contents of flash will change.
12. A PC can not connect to any remote websites, ping its default gateway, or ping a printer that is functioning properly on the local network segment. Which action will verify that the TCP/IP stack is functioning correctly on this PC?
Use the ipconfig /all command at the host’s command prompt.
Use the ping 127.0.0.1 command at the command prompt.
Use the traceroute command at the command prompt to identify any failures on the path to the gateway.
Use FTP to check for connectivity to remote sites.
Download a troubleshooting tool from the PC manufacturer’s website.
13. Which subnet mask will allow 2040 hosts per subnet on the IP network 10.0.0.0?
255.255.0.0
255.255.254.0
255.255.252.0
255.255.248.0
255.255.240.0
255.255.255.128
14.
Refer to the exhibit. When computer A sends a frame to computer D, what computers receive the frame?
only computer D
only computer A and computer D
only computer B, computer C, and computer D
all computers
15.
Refer to the exhibit. While configuring a network, a technician wired each end of a Category 5e cable as shown. Which two statements are true about this setup? (Choose two.)
The cable is suitable for connecting a switch to a router Ethernet port.
The cable is suitable for connecting dissimilar types of devices.
The cable is unusable and must be rewired.
The cable is terminated in a way that the transmit pin is wired to the receive pin.
The cable simulates a point-to-point WAN link.
16.
Refer to the exhibit. Which layered network model is shown in the diagram?
Cisco
IETF
OSI
TCP/IP
17. An administrator makes changes to the default configuration of a router and saves them to NVRAM. After testing, it is discovered that the configurations did not have the desired effect and must be removed. What steps must be taken to remove the changes and return the router to the default configuration?
Reboot the router.
Use no version of the commands that are issued.
Issue the erase startup-config command, and then reboot the router.
Issue the erase running-config command, and then reboot the router.
18.
Refer to the exhibit. Host A and B are unable to communicate with each other. What is the reason for this?
Host A is assigned a network address.
Host B is assigned a multicast address.
Host A and host B belong to different networks.
The gateway addresses are network addresses.
19.
Refer to the exhibit. A network technician has made several changes to R1 since the configuration has last been saved. The modified configuration did not produce the desired changes. The technician wants to store a backup copy of the saved configuration on a TFTP server before reloading. Which action will cause the unmodified data to be saved on the TFTP server?
20. What can the user do from the command prompt, Router(config-line)# ?
Configure one of the network interfaces.
Configure one of the physical or virtual lines.
Verify the running configuration on the device.
Configure the parameters for one of the routing protocols.
21.
Refer to the exhibit. A PC is connected to a network. Which action will verify that the PC can communicate with its default gateway?
Use the ping 127.0.0.1 command.
Use the ipconfig command.
Use the ipconfig/all command.
Use the ping 10.0.0.254 command.
22.
Refer to the exhibit. The serial interface of the router was configured with the use of the commands that are shown. The router cannot ping the router that is directly connected to interface serial 0/0/0. What should the network technician do to solve this problem?
Configure the description at interface serial 0/0/0.
Configure an IP address on interface serial 0/0/0.
Remove the no shutdown command at interface serial 0/0/0
Reboot the router.
23. A technician is asked to secure the privileged EXEC mode of a switch by requiring a password. Which type of password would require this login and be considered the most secure?
console
enable
enable secret
VTY
24. What are two purposes for configuring a banner on a router? (Choose two.)
to announce system downtime
to prevent unauthorized access to the router
to provide a description of interface connections
to assist in legal prosecution for unauthorized access
to provide a welcome message to users who access the router
25.
Refer to the exhibit. A PC is communicating with another PC on a remote network. The two networks are connected by three routers. Which action will help to identify the path between the hosts?
Use the ipconfig command at the host.
Use the ipconfig/all command at the destination.
Use the tracert command at the host.
Use the ping command at the destination.
26.
Refer to the exhibit. Which list refers only to end devices?
D,E,F,G
A,H,B,C
A,D,E,F
A,D,E,G
27. When must a router serial interface be configured with the clock rate command?
when the interface is functioning as a DTE device
when the interface timers have been cleared
when the connected DTE device is shut down
when the interface is functioning as a DCE device
28. Which table accurately associates the RFC 1918 private IP addresses with the correct network mask?
29.
Refer to the exhibit. Which two layers of the OSI model describe the same functions as the transport and internet layers of the TCP/IP model? (Choose two.)
application layer
presentation layer
session layer
transport layer
network layer
data link layer
physical layer
30. What happens when a host station receives a frame that contains its own MAC address in the destination field?
The Layer 2 information is removed and the frame is pushed up to Layer 3.
The host station will copy the information to its buffers and send it back out.
The frame originated from the host and will be ignored.
The Layer 3 information is added to the frame.
31.
Refer to the exhibit. Host A is configured with the correct IP address for the default gateway of the router R1 FastEthernet0/1 interface. How will a packet that is sent from host A to host B be handled by the devices on the network?
R1 will drop the packet because R1 does not have a specific route in its routing table to the 10.1.1.0/24 network.
R1 will forward the packet to its default gateway, the next hop router R2. R2 will forward the packet to the directly connected network 10.1.1.0/24.
R1 will forward the packet to its default gateway, the next hop router R2. R2 will drop the packet because it does not have a default route to network 10.1.1.0/24.
R1 will forward the packet to its default gateway, the next hop router R2. R2 will drop the packet because it does not have a route that is learned by a routing protocol to network 10.1.1.0/24.
32. What type of network is maintained if a server takes no dedicated role in the network?
mainframe
client/server
peer-to-peer
centralized
33. In a network design project, a network designer needs to select a device to provide collision free connections to 40 hosts on the LAN. Which device should be selected?
hub
router
switch
firewall
34. Which TCP/IP model layer creates additional overhead on network resources due to acknowledgments, tracking, and retransmission of data?
internet
transport
application
network access
35. How many host addresses may be assigned when using the 128.107.0.0 network address with a subnet mask of 255.255.248.0?
30
256
2046
2048
4094
4096
36. Which service is used when the nslookup command is issued on a computer?
FTP
DNS
DHCP
Telnet
37. Which process provides the means to send and receive data when running multiple applications at the same time on a computer?
interleaving
sequencing
segmentation
acknowledgement
38. Which three IPv4 addresses represent valid host addresses for a subnet? (Choose three.)
10.1.12.79/28
10.1.12.113/28
10.1.12.32/28
10.1.11.5/27
10.1.11.97/27
10.1.11.128/27
39. What is the consequence of issuing the erase startup-config command in privileged EXEC mode on a Cisco router?
Data stored in RAM will be removed.
Data stored in NVRAM will be erased.
Information in flash memory will be removed.
Flags in the configuration register will be set to 0.
Both the startup-config and the running-config will be erased.
40.
Refer to the exhibit. A network technician is trying to determine the correct IP address configuration for Host A. What is a valid configuration for Host A?
IP address: 192.168.100.19; Subnet Mask: 255.255.255.248; Default Gateway: 192.16.1.2
IP address: 192.168.100.20; Subnet Mask: 255.255.255.240; Default Gateway: 192.168.100.17
IP address: 192.168.100.21; Subnet Mask: 255.255.255.248; Default Gateway: 192.168.100.18
IP address: 192.168.100.22; Subnet Mask: 255.255.255.240; Default Gateway: 10.1.1.5
IP address: 192.168.100.30; Subnet Mask: 255.255.255.240; Default Gateway: 192.168.1.1
IP address: 192.168.100.31; Subnet Mask: 255.255.255.240; Default Gateway: 192.168.100.18
41. What is the Cisco IOS?
system software for Cisco devices
Read Only Memory in Cisco devices
non-volatile storage for device configurations
an initial operating system that is used for boot functions
42. Which router configuration mode will require user authentication if an administrator issues the enable secret command?
user executive mode
privileged executive mode
global configuration mode
service specific configuration mode
43. Which command or commands will require authentication to access the privileged exec mode?
RTRA(config)# enable secret cisco RTRA(config)# service password encryption
RTRA(config)# line con 0 RTRA(config-line)# login RTRA(config-line)# password cisco
RTRA(config)# line vty 0 4 RTRA(config-line)# login RTRA(config-line)# password cisco
44. A routing issue has occurred in your internetwork. Which of the following type of devices should be examined to isolate this error?
access point
host
hub
router
switch
45. Which statement is true about Layer 3 addresses?
They are physical addresses.
They are used in routing decisions.
They are only used on local networks.
They are altered each time a packet crosses a router.
46.
Refer to the exhibit. An administrator on PC1 wants to view some HTML code from a web page housed on the web server. Which client application will allow this request to be started?
47. Which OSI layer does IP rely on to determine whether packets have been lost and to request retransmission?
application
presentation
session
transport
48.
Refer to the exhibit. PC1 is unable to access PC2. To troubleshoot this problem, the technician needs to confirm that the next hop interface is operational. Which default gateway address should the technician ping from PC1 to confirm this?
10.0.0.254
192.168.0.249
192.168.0.250
10.0.1.254
49. An administrator is in the middle of entering a lengthy command when suddenly output from the IOS appears stating that an interface has gone down and then up again. Consequently, the command that the administrator was typing is no longer legible on the terminal. What CLI keystrokes can be entered to return to the line that the administrator was typing?
Ctrl-D
Ctrl-K
Ctrl-R
Ctrl-Z
50. Which option represents a point-to-point logical topology diagram?
Read more...
Router(config)# line vty 0 3 Router(config-line)# password c13c0 Router(config-line)# login
The entries specify three Telnet lines for remote access.
The entries specify four Telnet lines for remote access.
The entries set the console and Telnet password to "c13c0".
Telnet access will be denied because the Telnet configuration is incomplete.
Access will be permitted for Telnet using "c13c0" as the password.
2. Which two actions could be taken by a router if a specific match is not made to a route in the routing table? (Choose two.)
The packet will be discarded.
The packet will be sent back to the source.
The packet will be flooded out all interfaces.
Neighboring routers are polled to find the best path.
The packet will be forwarded to a default route if one is present.
3.
Refer to the exhibit. The network administrator remotely accesses the CLI of RouterB from PC1 using a secure connection. Which statement is true about this connection?
The Telnet server process is running on PC1.
Only the exchange of the Telnet username and password is encrypted.
The GET request is sent to RouterA to retrieve data.
The SSH service is used to connect PC1 to RouterB.
4.
Refer to the exhibit. What three statements are true about the IP configuration that is shown? (Choose three.)
The prefix of the subnet mask is /26.
The network on which this computer resides can have 30 hosts.
The computer is unable to communicate outside of the local network.
The address that is assigned to the computer represents private addressing.
The IP address that is assigned to the computer is routable on the Internet.
The IP address that is assigned as the default gateway is valid for this host.
5. What information can be gathered by using the command netstat?
the default gateway
the routing protocol
active TCP connections
the locally configured subnet mask
6.
Refer to the exhibit. The nslookup command that is shown was issued on a Windows PC host. What does the 10.32.5.74 address represent?
the IP address of the host
the default gateway for the host
the primary DNS server for the host
the home page address for the host
7.
Refer to the exhibit. A network administrator remotely accesses the CLI of RouterB from PC1 using Telnet. Which statement is true about this connection?
The data is automatically encrypted.
A Telnet server process is running on PC1.
The connection is made through a VTY session on the router.
A GET request was sent to RouterB to retrieve data during this session.
8. Which three addresses are private IP addresses? (Choose three.)
10.0.0.1
46.1.1.88
172.31.31.10
172.32.16.10
192.168.8.8
9.
Refer to the exhibit. Host C is able to ping 127.0.0.1 successfully, but is unable to communicate with hosts A and B in the organization. What is the likely cause of the problem?
Hosts A and B are not on the same subnet as host C.
The IP addresses on the router serial interfaces are wrong.
The subnet mask on host C is improperly configured.
The FastEthernet interface fa0/0 of router 1 is wrongly configured.
10. Which OSI layer addressing is required to route packets between two networks?
Layer 1
Layer 2
Layer 3
Layer 4
11. What is the effect of using the Router# copy running-config startup-config command on a router?
The contents of ROM will change.
The contents of RAM will change.
The contents of NVRAM will change.
The contents of flash will change.
12. A PC can not connect to any remote websites, ping its default gateway, or ping a printer that is functioning properly on the local network segment. Which action will verify that the TCP/IP stack is functioning correctly on this PC?
Use the ipconfig /all command at the host’s command prompt.
Use the ping 127.0.0.1 command at the command prompt.
Use the traceroute command at the command prompt to identify any failures on the path to the gateway.
Use FTP to check for connectivity to remote sites.
Download a troubleshooting tool from the PC manufacturer’s website.
13. Which subnet mask will allow 2040 hosts per subnet on the IP network 10.0.0.0?
255.255.0.0
255.255.254.0
255.255.252.0
255.255.248.0
255.255.240.0
255.255.255.128
14.
Refer to the exhibit. When computer A sends a frame to computer D, what computers receive the frame?
only computer D
only computer A and computer D
only computer B, computer C, and computer D
all computers
15.
Refer to the exhibit. While configuring a network, a technician wired each end of a Category 5e cable as shown. Which two statements are true about this setup? (Choose two.)
The cable is suitable for connecting a switch to a router Ethernet port.
The cable is suitable for connecting dissimilar types of devices.
The cable is unusable and must be rewired.
The cable is terminated in a way that the transmit pin is wired to the receive pin.
The cable simulates a point-to-point WAN link.
16.
Refer to the exhibit. Which layered network model is shown in the diagram?
Cisco
IETF
OSI
TCP/IP
17. An administrator makes changes to the default configuration of a router and saves them to NVRAM. After testing, it is discovered that the configurations did not have the desired effect and must be removed. What steps must be taken to remove the changes and return the router to the default configuration?
Reboot the router.
Use no version of the commands that are issued.
Issue the erase startup-config command, and then reboot the router.
Issue the erase running-config command, and then reboot the router.
18.
Refer to the exhibit. Host A and B are unable to communicate with each other. What is the reason for this?
Host A is assigned a network address.
Host B is assigned a multicast address.
Host A and host B belong to different networks.
The gateway addresses are network addresses.
19.
Refer to the exhibit. A network technician has made several changes to R1 since the configuration has last been saved. The modified configuration did not produce the desired changes. The technician wants to store a backup copy of the saved configuration on a TFTP server before reloading. Which action will cause the unmodified data to be saved on the TFTP server?
20. What can the user do from the command prompt, Router(config-line)# ?
Configure one of the network interfaces.
Configure one of the physical or virtual lines.
Verify the running configuration on the device.
Configure the parameters for one of the routing protocols.
21.
Refer to the exhibit. A PC is connected to a network. Which action will verify that the PC can communicate with its default gateway?
Use the ping 127.0.0.1 command.
Use the ipconfig command.
Use the ipconfig/all command.
Use the ping 10.0.0.254 command.
22.
Refer to the exhibit. The serial interface of the router was configured with the use of the commands that are shown. The router cannot ping the router that is directly connected to interface serial 0/0/0. What should the network technician do to solve this problem?
Configure the description at interface serial 0/0/0.
Configure an IP address on interface serial 0/0/0.
Remove the no shutdown command at interface serial 0/0/0
Reboot the router.
23. A technician is asked to secure the privileged EXEC mode of a switch by requiring a password. Which type of password would require this login and be considered the most secure?
console
enable
enable secret
VTY
24. What are two purposes for configuring a banner on a router? (Choose two.)
to announce system downtime
to prevent unauthorized access to the router
to provide a description of interface connections
to assist in legal prosecution for unauthorized access
to provide a welcome message to users who access the router
25.
Refer to the exhibit. A PC is communicating with another PC on a remote network. The two networks are connected by three routers. Which action will help to identify the path between the hosts?
Use the ipconfig command at the host.
Use the ipconfig/all command at the destination.
Use the tracert command at the host.
Use the ping command at the destination.
26.
Refer to the exhibit. Which list refers only to end devices?
D,E,F,G
A,H,B,C
A,D,E,F
A,D,E,G
27. When must a router serial interface be configured with the clock rate command?
when the interface is functioning as a DTE device
when the interface timers have been cleared
when the connected DTE device is shut down
when the interface is functioning as a DCE device
28. Which table accurately associates the RFC 1918 private IP addresses with the correct network mask?
29.
Refer to the exhibit. Which two layers of the OSI model describe the same functions as the transport and internet layers of the TCP/IP model? (Choose two.)
application layer
presentation layer
session layer
transport layer
network layer
data link layer
physical layer
30. What happens when a host station receives a frame that contains its own MAC address in the destination field?
The Layer 2 information is removed and the frame is pushed up to Layer 3.
The host station will copy the information to its buffers and send it back out.
The frame originated from the host and will be ignored.
The Layer 3 information is added to the frame.
31.
Refer to the exhibit. Host A is configured with the correct IP address for the default gateway of the router R1 FastEthernet0/1 interface. How will a packet that is sent from host A to host B be handled by the devices on the network?
R1 will drop the packet because R1 does not have a specific route in its routing table to the 10.1.1.0/24 network.
R1 will forward the packet to its default gateway, the next hop router R2. R2 will forward the packet to the directly connected network 10.1.1.0/24.
R1 will forward the packet to its default gateway, the next hop router R2. R2 will drop the packet because it does not have a default route to network 10.1.1.0/24.
R1 will forward the packet to its default gateway, the next hop router R2. R2 will drop the packet because it does not have a route that is learned by a routing protocol to network 10.1.1.0/24.
32. What type of network is maintained if a server takes no dedicated role in the network?
mainframe
client/server
peer-to-peer
centralized
33. In a network design project, a network designer needs to select a device to provide collision free connections to 40 hosts on the LAN. Which device should be selected?
hub
router
switch
firewall
34. Which TCP/IP model layer creates additional overhead on network resources due to acknowledgments, tracking, and retransmission of data?
internet
transport
application
network access
35. How many host addresses may be assigned when using the 128.107.0.0 network address with a subnet mask of 255.255.248.0?
30
256
2046
2048
4094
4096
36. Which service is used when the nslookup command is issued on a computer?
FTP
DNS
DHCP
Telnet
37. Which process provides the means to send and receive data when running multiple applications at the same time on a computer?
interleaving
sequencing
segmentation
acknowledgement
38. Which three IPv4 addresses represent valid host addresses for a subnet? (Choose three.)
10.1.12.79/28
10.1.12.113/28
10.1.12.32/28
10.1.11.5/27
10.1.11.97/27
10.1.11.128/27
39. What is the consequence of issuing the erase startup-config command in privileged EXEC mode on a Cisco router?
Data stored in RAM will be removed.
Data stored in NVRAM will be erased.
Information in flash memory will be removed.
Flags in the configuration register will be set to 0.
Both the startup-config and the running-config will be erased.
40.
Refer to the exhibit. A network technician is trying to determine the correct IP address configuration for Host A. What is a valid configuration for Host A?
IP address: 192.168.100.19; Subnet Mask: 255.255.255.248; Default Gateway: 192.16.1.2
IP address: 192.168.100.20; Subnet Mask: 255.255.255.240; Default Gateway: 192.168.100.17
IP address: 192.168.100.21; Subnet Mask: 255.255.255.248; Default Gateway: 192.168.100.18
IP address: 192.168.100.22; Subnet Mask: 255.255.255.240; Default Gateway: 10.1.1.5
IP address: 192.168.100.30; Subnet Mask: 255.255.255.240; Default Gateway: 192.168.1.1
IP address: 192.168.100.31; Subnet Mask: 255.255.255.240; Default Gateway: 192.168.100.18
41. What is the Cisco IOS?
system software for Cisco devices
Read Only Memory in Cisco devices
non-volatile storage for device configurations
an initial operating system that is used for boot functions
42. Which router configuration mode will require user authentication if an administrator issues the enable secret command?
user executive mode
privileged executive mode
global configuration mode
service specific configuration mode
43. Which command or commands will require authentication to access the privileged exec mode?
RTRA(config)# enable secret cisco RTRA(config)# service password encryption
RTRA(config)# line con 0 RTRA(config-line)# login RTRA(config-line)# password cisco
RTRA(config)# line vty 0 4 RTRA(config-line)# login RTRA(config-line)# password cisco
44. A routing issue has occurred in your internetwork. Which of the following type of devices should be examined to isolate this error?
access point
host
hub
router
switch
45. Which statement is true about Layer 3 addresses?
They are physical addresses.
They are used in routing decisions.
They are only used on local networks.
They are altered each time a packet crosses a router.
46.
Refer to the exhibit. An administrator on PC1 wants to view some HTML code from a web page housed on the web server. Which client application will allow this request to be started?
47. Which OSI layer does IP rely on to determine whether packets have been lost and to request retransmission?
application
presentation
session
transport
48.
Refer to the exhibit. PC1 is unable to access PC2. To troubleshoot this problem, the technician needs to confirm that the next hop interface is operational. Which default gateway address should the technician ping from PC1 to confirm this?
10.0.0.254
192.168.0.249
192.168.0.250
10.0.1.254
49. An administrator is in the middle of entering a lengthy command when suddenly output from the IOS appears stating that an interface has gone down and then up again. Consequently, the command that the administrator was typing is no longer legible on the terminal. What CLI keystrokes can be entered to return to the line that the administrator was typing?
Ctrl-D
Ctrl-K
Ctrl-R
Ctrl-Z
50. Which option represents a point-to-point logical topology diagram?
ccna-1-final-exam-v4-0-answers1
1.
Refer to the exhibit. What is the correct destination socket number for a web page request from Host A to the web server?
00-08-a3-b6-ce-46
198.133.219.25:80
http://www.ccnafinal.net
C 198.133.219.0/24 is directly connected, FastEthernet0/0
2. Which prompt represents the appropriate mode used for the copy running-config startup-config command ?
Switch-6J>
Switch-6J#
Switch-6J(config)#
Switch-6J(config-if)#
Switch-6J(config-line)#
3. Due to a security violation, the router passwords must be changed. What information can be learned from the following configuration entries? (Choose two)
Router(config)# line vty 0 3 Router(config-line)# password c13c0
Router(config-line)# login
The entries specify three Telnet lines for remote access.
The entries specify four Telnet lines for remote access.
The entries set the console and Telnet password to “c13c0″.
Telnet access will be denied because the Telnet configuration is incomplete.
Access will be permitted for Telnet using “c13c0″ as the password.
4.
Refer to the exhibit. Each media link is labeled. What type of cable should be used to connect the different devices?
Connection 1 – rollover cable
Connection 2 – straight-through cable
Connection 3 – crossover cable
Connection 1 – crossover cable
Connection 2 – rollover cable
Connection 3 – crossover cable
Connection 1 – straight-through cable
Connection 2 – crossover cable
Connection 3 – crossover cable
Connection 1 – straight-through cable
Connection 2 – crossover cable
Connection 3 – straight-through cable
Connection 1 – crossover cable
Connection 2 – straight-through cable
Connection 3 – crossover cable
5.
Refer to the exhibit. What function does router RT_A need to provide to allow Internet access for hosts in this network?
address translation
DHCP services
ftpd
web server
6. When connectionless protocols are implemented at the lower layers of the OSI model, what is usually used to acknowledge that the data was received and to request the retransmission of missing data?
IP
UDP
Ethernet
a connectionless acknowledgement
an upper-layer, connection-oriented protocol or service
7.
Refer to the exhibit. Host A is transmitting data to host B. What addresses will host A use to for the destination IP and MAC addresses in this communication?
Destination MAC: BBBB:BBBB:BBBB Destination IP: 172.22.0.62
Destination MAC: DDDD:DDDD:DDDD Destination IP: 172.22.0.75
Destination MAC: EEEE:EEEE:EEEE Destination IP: 172.22.0.62
Destination MAC: BBBB:BBBB:BBBB Destination IP: 172.22.0.75
Destination MAC: EEEE:EEEE:EEEE Destination IP: 172.22.0.75
Destination MAC: DDDD:DDDD:DDDD Destination IP: 172.22.0.94
8.
Refer to the exhibit. Cable 1 and cable 2 have the ends wired for specific physical layer requirements. The table lists each segment by number and the cable which has been installed by the network technician between the network components on that segment. From the data given, which segments have the correct cable installed? (Choose three.)
segment1
segment2
segment3
segment4
segment5
9. What is true regarding network layer addressing? (Choose three)
uses a flat structure
prevent broadcasts
heirarchical
uniquely identifies each host
48 bits in length
contains a network portion
10.
Refer to the exhibit. What two facts can be determined about the exhibited topology? (Choose two)
A single broadcast domain is present
Two logical address ranges are required.
Three broadcast domains are shown.
Four networks are needed.
Five collision domains exist.
11.
Refer to the exhibit. What two facts can be determined from the information that is given? (Choose two.)
This exchange is part of the three-way handshake.
The source port indicates that a Telnet session has been initiated.
The data is flowing from server to client.
The destination port indicates that an HTTP session has been initiated.
The data listed is associated with the transport layer.
The source port does not support communication with the destination port that is listed.
12. In a Cisco IOS device, where is the startup-configuration file stored?
Flash
NVRAM
RAM
ROM
13.
Refer to the exhibit. The network containing router B is experiencing problems. A network associate has isolated the issue in this network to router B. What action can be preformed to correct the network issue?
issue the clock rate command on interface Serial 0/0/0
issue the description command on interface Serial 0/0/1
issue the ip address command on interface FastEthernet 0/0
issue the no shutdown command on interface FastEthernet 0/1
14.
Refer to the exhibit. A technician is working on a network problem that requires verification of the router LAN interface. What address should be pinged from this host to confirm that the router interface is operational?
127.0.0.1
192.168.64.196
192.168.254.1
192.168.254.9
192.168.254.254
15. Which combination of network id and subnet mask correctly identifies all IP addresses from 172.16.128.0 through 172.16.159.255?
172.16.128.0 255.255.255.224
172.16.128.0 255.255.0.0
172.16.128.0 255.255.192.0
172.16.128.0 255.255.224.0
172.16.128.0 255.255.255.192
16.
Refer to the exhibit. Host A attempts to establish a TCP/IP session with host C. During this attempt, a frame was captured with the source MAC address 0050.7320.D632 and the destination MAC address 0030.8517.44C4. The packet inside the captured frame has an IP source address 192.168.7.5, and the destination IP address is 192.168.219.24. At which point in the network was this packet captured?
leaving host A
leaving ATL
leaving Dallas
leaving NYC
17.
Refer to the exhibit. The diagram represents the process of sending email between clients. Select the list below that correctly identifies the component or protocol used at each numbered stage of the diagram.
1.MUA 2.MDA 3.MTA 4.SMTP 5.MTA 6.POP 7.MDA 8.MUA
1.MUA 2.POP 3.MDA 4.SMTP 5.MTA 6.MDA 7.SMTP 8.MUA
1.MUA 2.POP 3.SMTP 4.MDA 5.MTA 6.SMTP 7.POP 8.MUA
1.MDA 2.SMTP 3.MTA 4.SMTP 5.MTA 6.MUA 7.POP 8.MDA
1.MUA 2.SMTP 3.MTA 4.SMTP 5.MTA 6.MDA 7.POP 8.MUA
18.
Refer to the exhibit. The command that is shown was issued on a PC. What does the IP address 192.168.33.2 represent?
IP address of the host
default gateway of the host
IP address of the homepage for the host
primary domain name server for the host
IP address of the website resolver1.mooki.local
19.
Refer to the exhibit. On the basis of the IP configuration that is shown, what is the reason that Host A and Host B are unable to communicate outside the local network?
Host A was assigned a network address.
Host B was assigned a multicast address.
Host A and Host B belong to different networks.
The gateway address was assigned a broadcast address.
20.
Refer to the exhibit. The tracert command is initiated from PC1 to PC4. Which device will send a response to the initial tracert packet from PC1?
Athens
Ankara
London
Paris
PC4
21. Which password is automatically encrypted when it is created?
vty
aux
console
enable secret
enable password
22. Which OSI layer does IP rely on to determine whether packets have been lost and to request retransmission?
application
presentation
session
transport
23.
Refer to the exhibit. Which two statements describe the information that is represented in the header? (Choose two)
This is a server response.
The UDP protocol is being used.
The destination port indicates a Telnet session.
The return segment will contain a source port of 23.
The next session originated from the client of this session will use the source port number 13358.
24. The Layer 4 header contains which type of information to aid in the delivery of data?
service port number
host logical address
device physical address
virtual connection identifier
25. As network administrator, what is the subnet mask that allows 510 hosts given the IP address 172.30.0.0?
255.255.0.0
255.255.248.0
255.255.252.0
255.255.254.0
255.255.255.0
255.255.255.128
26. When must a router serial interface be configured with the clock rate command?
when the interface is functioning as a DTE device
when the interface timers have been cleared
when the connected DTE device is shut down
when the interface is functioning as a DCE device
27.
Refer to the exhibit. What is required on host A for a network technician to create the initial configuration on Router1?
an FTP client
a Telnet client
a terminal emulation program
a web browser
28.
Refer to the exhibit. Which set of devices contains only intermediary devices?
A, B, D, G
A, B, E, F
C, D, G, I
G, H, I, J
29.
Refer to the exhibit. A network technician is trying to determine the correct IP address configuration for Host A. What is a valid configuration for Host A?
IP address: 192.168.100.19; Subnet Mask: 255.255.255.248; Default Gateway: 192.16.1.2
IP address: 192.168.100.20; Subnet Mask: 255.255.255.240; Default Gateway: 192.168.100.17
IP address: 192.168.100.21; Subnet Mask: 255.255.255.248; Default Gateway: 192.168.100.18
IP address: 192.168.100.22; Subnet Mask: 255.255.255.240; Default Gateway: 10.1.1.5
IP address: 192.168.100.30; Subnet Mask: 255.255.255.240; Default Gateway: 192.168.1.1
IP address: 192.168.100.31; Subnet Mask: 255.255.255.240; Default Gateway: 192.168.100.18
30. A routing issue has occurred in you internetwork. Which of the following type of devices should be examined to isolate this error?
access point
host
hub
router
switch
31. Which type of media is immune to EMI and RFI? (Choose two.)
10 Base-T
10 Base-2
10 Base-5
100 Base-FX
100 Base TX
1000 Base LX
32.
Refer to the exhibit. With the router running NAT, what IP addresses can be applied to the computer to allow access to the Internet? (Choose three)
192.168.18.38
192.168.18.48
192.168.18.49
192.168.18.52
192.168.18.59
192.168.18.63
33. Which three IPv4 addresses represent a broadcast for a subnet? (Choose three.)
172.16.4.63 /26
172.16.4.129 /26
172.16.4.191 /26
172.16.4.51 /27
172.16.4.95 /27
172.16.4.221 /27
34.
Refer to the exhibit. Assume all devices are using default configurations. How many subnets are required to address the topology that is shown?
1
3
4
5
7
35. What are three characteristics of CSMA/CD? (Choose three)
Devices can be configured with a higher transmission priority.
A jam signal indicates that the collision has cleared and the media is not busy.
A device listens and waits until the media is not busy before transmitting.
The device with the electronic token is the only one that can transmit after a collision.
All of the devices on a segment see data that passes on the network medium.
After detecting a collision, hosts can attempt to resume transmission after a random time delay has expired.
36. A technician is asked to secure the privileged EXEC mode of a switch by requiring a password. Which type of password would require this login and be considered the most secure?
console
enable
enable secret
VTY
37. A PC can not connect to any remote websites, ping its default gateway, or ping a printer that is functioning properly on the local network segment. Which action will verify that the TCP/IP stack is functioning correctly on this PC?
Use the ipconfig /all command at the host’s command prompt.
Use the ping 127.0.0.1 command at the command prompt.
Use the traceroute command at the command prompt to identify any failures on the path to the gateway.
Use FTP to check for connectivity to remote sites.
Download a troubleshooting tool from the PC manufacturer’s website.
38.
Refer to the exhibit. When computer A sends a frame to computer D, what computers receive the frame?
only computer D
only computer A and computer D
only computer B, computer C, and computer D
all computers
39.
Examine the graphic with current configurations. Host A in the Clerical offices failed and was replaced. Although a ping to 127.0.0.1 was successful, the replacement computer can not access the company network. What is the likely cause of the problem?
IP address incorrectly entered
network cables unplugged
subnet mask incorrectly entered
network card failure
40. Which two functions of the OSI model occur at layer two? (Choose two.)
physical addressing
encoding
routing
cabling
media access control
41.
Refer to the exhibit. A router, whose table is shown, receives a packet that is destined for 192.168.1.4. How will router treat the packet?
The packet will be dropped.
The packet will be forwarded via FastEthernet 0/0.
The packet will be forwarded to the destination host.
The packet will be forwarded to the 192.168.1.3 next-hop address.
42. Which range of port numbers are reserved for services that are commonly used by applications that run on servers?
0 to 255
0 to 1023
1024 to 49151
49152 to 65535
43.
Refer to the exhibit. What three statements are true about the IP configuration that is shown? (Choose three.)
The address that is assigned to the computer represents private addressing.
The computer is unable to communicate outside of the local network.
The network of this computer can have 126 hosts.
The prefix of the computer address is /27.
The IP address that is assigned to the computer is routable on the Internet.
The IP address that is assigned to the computer is a broadcast address.
44.
Refer to the exhibit. A network administrator remotely accesses the CLI of RouterB from PC1 using Telnet. Which statement is true about this connection?
The data is automatically encrypted.
A Telnet server process is running on PC1.
The connection is made through a VTY session on the router.
A GET request was sent to RouterB to retrieve data during this session.
45. Which three statements characterize the transport layer protocols? (Choose three.)
TCP and UDP port numbers are used by application layer protocols.
UDP uses windowing and acknowledgments for reliable transfer of data.
TCP uses windowing and sequencing to provide reliable transfer of data.
TCP is a connection-oriented protocol. UDP is a connectionless protocol.
46. Which of the following are the address ranges of the private IP addresses? (Choose three.)
10.0.0.0 to 10.255.255.255
200.100.50.0 to 200.100.25.255
150.150.0.0 to 150.150.255.255
172.16.0.0 to 172.31.255.255
192.168.0.0 to 192.168.255.255
127.16.0.0 to 127.31.255.255
47. Which OSI layers offers reliable, connection-oriented data communication services?
application
presentation
session
transport
network
48.
Refer to the exhibit. Which logical topology best describes the exhibited network?
star
ring
point-to-point
multiaccess
mesh
49. During the encapsulation process, which identifiers are added at the transport layer?
two networks routing the packets
two applications communicating the data
two hosts at either end of the communication
two nodes on the local network exchanging the frame
50. What are two characteristics of the data link layer? (Choose two.)
It segments and reorders the data.
It exchanges the frames between nodes.
It defines the method by which network devices place data onto the media.
It manages the transfer of data between the processes that run on each host.
It retrieves signals from the media and restores them to their bit representations
Read more...
Refer to the exhibit. What is the correct destination socket number for a web page request from Host A to the web server?
00-08-a3-b6-ce-46
198.133.219.25:80
http://www.ccnafinal.net
C 198.133.219.0/24 is directly connected, FastEthernet0/0
2. Which prompt represents the appropriate mode used for the copy running-config startup-config command ?
Switch-6J>
Switch-6J#
Switch-6J(config)#
Switch-6J(config-if)#
Switch-6J(config-line)#
3. Due to a security violation, the router passwords must be changed. What information can be learned from the following configuration entries? (Choose two)
Router(config)# line vty 0 3 Router(config-line)# password c13c0
Router(config-line)# login
The entries specify three Telnet lines for remote access.
The entries specify four Telnet lines for remote access.
The entries set the console and Telnet password to “c13c0″.
Telnet access will be denied because the Telnet configuration is incomplete.
Access will be permitted for Telnet using “c13c0″ as the password.
4.
Refer to the exhibit. Each media link is labeled. What type of cable should be used to connect the different devices?
Connection 1 – rollover cable
Connection 2 – straight-through cable
Connection 3 – crossover cable
Connection 1 – crossover cable
Connection 2 – rollover cable
Connection 3 – crossover cable
Connection 1 – straight-through cable
Connection 2 – crossover cable
Connection 3 – crossover cable
Connection 1 – straight-through cable
Connection 2 – crossover cable
Connection 3 – straight-through cable
Connection 1 – crossover cable
Connection 2 – straight-through cable
Connection 3 – crossover cable
5.
Refer to the exhibit. What function does router RT_A need to provide to allow Internet access for hosts in this network?
address translation
DHCP services
ftpd
web server
6. When connectionless protocols are implemented at the lower layers of the OSI model, what is usually used to acknowledge that the data was received and to request the retransmission of missing data?
IP
UDP
Ethernet
a connectionless acknowledgement
an upper-layer, connection-oriented protocol or service
7.
Refer to the exhibit. Host A is transmitting data to host B. What addresses will host A use to for the destination IP and MAC addresses in this communication?
Destination MAC: BBBB:BBBB:BBBB Destination IP: 172.22.0.62
Destination MAC: DDDD:DDDD:DDDD Destination IP: 172.22.0.75
Destination MAC: EEEE:EEEE:EEEE Destination IP: 172.22.0.62
Destination MAC: BBBB:BBBB:BBBB Destination IP: 172.22.0.75
Destination MAC: EEEE:EEEE:EEEE Destination IP: 172.22.0.75
Destination MAC: DDDD:DDDD:DDDD Destination IP: 172.22.0.94
8.
Refer to the exhibit. Cable 1 and cable 2 have the ends wired for specific physical layer requirements. The table lists each segment by number and the cable which has been installed by the network technician between the network components on that segment. From the data given, which segments have the correct cable installed? (Choose three.)
segment1
segment2
segment3
segment4
segment5
9. What is true regarding network layer addressing? (Choose three)
uses a flat structure
prevent broadcasts
heirarchical
uniquely identifies each host
48 bits in length
contains a network portion
10.
Refer to the exhibit. What two facts can be determined about the exhibited topology? (Choose two)
A single broadcast domain is present
Two logical address ranges are required.
Three broadcast domains are shown.
Four networks are needed.
Five collision domains exist.
11.
Refer to the exhibit. What two facts can be determined from the information that is given? (Choose two.)
This exchange is part of the three-way handshake.
The source port indicates that a Telnet session has been initiated.
The data is flowing from server to client.
The destination port indicates that an HTTP session has been initiated.
The data listed is associated with the transport layer.
The source port does not support communication with the destination port that is listed.
12. In a Cisco IOS device, where is the startup-configuration file stored?
Flash
NVRAM
RAM
ROM
13.
Refer to the exhibit. The network containing router B is experiencing problems. A network associate has isolated the issue in this network to router B. What action can be preformed to correct the network issue?
issue the clock rate command on interface Serial 0/0/0
issue the description command on interface Serial 0/0/1
issue the ip address command on interface FastEthernet 0/0
issue the no shutdown command on interface FastEthernet 0/1
14.
Refer to the exhibit. A technician is working on a network problem that requires verification of the router LAN interface. What address should be pinged from this host to confirm that the router interface is operational?
127.0.0.1
192.168.64.196
192.168.254.1
192.168.254.9
192.168.254.254
15. Which combination of network id and subnet mask correctly identifies all IP addresses from 172.16.128.0 through 172.16.159.255?
172.16.128.0 255.255.255.224
172.16.128.0 255.255.0.0
172.16.128.0 255.255.192.0
172.16.128.0 255.255.224.0
172.16.128.0 255.255.255.192
16.
Refer to the exhibit. Host A attempts to establish a TCP/IP session with host C. During this attempt, a frame was captured with the source MAC address 0050.7320.D632 and the destination MAC address 0030.8517.44C4. The packet inside the captured frame has an IP source address 192.168.7.5, and the destination IP address is 192.168.219.24. At which point in the network was this packet captured?
leaving host A
leaving ATL
leaving Dallas
leaving NYC
17.
Refer to the exhibit. The diagram represents the process of sending email between clients. Select the list below that correctly identifies the component or protocol used at each numbered stage of the diagram.
1.MUA 2.MDA 3.MTA 4.SMTP 5.MTA 6.POP 7.MDA 8.MUA
1.MUA 2.POP 3.MDA 4.SMTP 5.MTA 6.MDA 7.SMTP 8.MUA
1.MUA 2.POP 3.SMTP 4.MDA 5.MTA 6.SMTP 7.POP 8.MUA
1.MDA 2.SMTP 3.MTA 4.SMTP 5.MTA 6.MUA 7.POP 8.MDA
1.MUA 2.SMTP 3.MTA 4.SMTP 5.MTA 6.MDA 7.POP 8.MUA
18.
Refer to the exhibit. The command that is shown was issued on a PC. What does the IP address 192.168.33.2 represent?
IP address of the host
default gateway of the host
IP address of the homepage for the host
primary domain name server for the host
IP address of the website resolver1.mooki.local
19.
Refer to the exhibit. On the basis of the IP configuration that is shown, what is the reason that Host A and Host B are unable to communicate outside the local network?
Host A was assigned a network address.
Host B was assigned a multicast address.
Host A and Host B belong to different networks.
The gateway address was assigned a broadcast address.
20.
Refer to the exhibit. The tracert command is initiated from PC1 to PC4. Which device will send a response to the initial tracert packet from PC1?
Athens
Ankara
London
Paris
PC4
21. Which password is automatically encrypted when it is created?
vty
aux
console
enable secret
enable password
22. Which OSI layer does IP rely on to determine whether packets have been lost and to request retransmission?
application
presentation
session
transport
23.
Refer to the exhibit. Which two statements describe the information that is represented in the header? (Choose two)
This is a server response.
The UDP protocol is being used.
The destination port indicates a Telnet session.
The return segment will contain a source port of 23.
The next session originated from the client of this session will use the source port number 13358.
24. The Layer 4 header contains which type of information to aid in the delivery of data?
service port number
host logical address
device physical address
virtual connection identifier
25. As network administrator, what is the subnet mask that allows 510 hosts given the IP address 172.30.0.0?
255.255.0.0
255.255.248.0
255.255.252.0
255.255.254.0
255.255.255.0
255.255.255.128
26. When must a router serial interface be configured with the clock rate command?
when the interface is functioning as a DTE device
when the interface timers have been cleared
when the connected DTE device is shut down
when the interface is functioning as a DCE device
27.
Refer to the exhibit. What is required on host A for a network technician to create the initial configuration on Router1?
an FTP client
a Telnet client
a terminal emulation program
a web browser
28.
Refer to the exhibit. Which set of devices contains only intermediary devices?
A, B, D, G
A, B, E, F
C, D, G, I
G, H, I, J
29.
Refer to the exhibit. A network technician is trying to determine the correct IP address configuration for Host A. What is a valid configuration for Host A?
IP address: 192.168.100.19; Subnet Mask: 255.255.255.248; Default Gateway: 192.16.1.2
IP address: 192.168.100.20; Subnet Mask: 255.255.255.240; Default Gateway: 192.168.100.17
IP address: 192.168.100.21; Subnet Mask: 255.255.255.248; Default Gateway: 192.168.100.18
IP address: 192.168.100.22; Subnet Mask: 255.255.255.240; Default Gateway: 10.1.1.5
IP address: 192.168.100.30; Subnet Mask: 255.255.255.240; Default Gateway: 192.168.1.1
IP address: 192.168.100.31; Subnet Mask: 255.255.255.240; Default Gateway: 192.168.100.18
30. A routing issue has occurred in you internetwork. Which of the following type of devices should be examined to isolate this error?
access point
host
hub
router
switch
31. Which type of media is immune to EMI and RFI? (Choose two.)
10 Base-T
10 Base-2
10 Base-5
100 Base-FX
100 Base TX
1000 Base LX
32.
Refer to the exhibit. With the router running NAT, what IP addresses can be applied to the computer to allow access to the Internet? (Choose three)
192.168.18.38
192.168.18.48
192.168.18.49
192.168.18.52
192.168.18.59
192.168.18.63
33. Which three IPv4 addresses represent a broadcast for a subnet? (Choose three.)
172.16.4.63 /26
172.16.4.129 /26
172.16.4.191 /26
172.16.4.51 /27
172.16.4.95 /27
172.16.4.221 /27
34.
Refer to the exhibit. Assume all devices are using default configurations. How many subnets are required to address the topology that is shown?
1
3
4
5
7
35. What are three characteristics of CSMA/CD? (Choose three)
Devices can be configured with a higher transmission priority.
A jam signal indicates that the collision has cleared and the media is not busy.
A device listens and waits until the media is not busy before transmitting.
The device with the electronic token is the only one that can transmit after a collision.
All of the devices on a segment see data that passes on the network medium.
After detecting a collision, hosts can attempt to resume transmission after a random time delay has expired.
36. A technician is asked to secure the privileged EXEC mode of a switch by requiring a password. Which type of password would require this login and be considered the most secure?
console
enable
enable secret
VTY
37. A PC can not connect to any remote websites, ping its default gateway, or ping a printer that is functioning properly on the local network segment. Which action will verify that the TCP/IP stack is functioning correctly on this PC?
Use the ipconfig /all command at the host’s command prompt.
Use the ping 127.0.0.1 command at the command prompt.
Use the traceroute command at the command prompt to identify any failures on the path to the gateway.
Use FTP to check for connectivity to remote sites.
Download a troubleshooting tool from the PC manufacturer’s website.
38.
Refer to the exhibit. When computer A sends a frame to computer D, what computers receive the frame?
only computer D
only computer A and computer D
only computer B, computer C, and computer D
all computers
39.
Examine the graphic with current configurations. Host A in the Clerical offices failed and was replaced. Although a ping to 127.0.0.1 was successful, the replacement computer can not access the company network. What is the likely cause of the problem?
IP address incorrectly entered
network cables unplugged
subnet mask incorrectly entered
network card failure
40. Which two functions of the OSI model occur at layer two? (Choose two.)
physical addressing
encoding
routing
cabling
media access control
41.
Refer to the exhibit. A router, whose table is shown, receives a packet that is destined for 192.168.1.4. How will router treat the packet?
The packet will be dropped.
The packet will be forwarded via FastEthernet 0/0.
The packet will be forwarded to the destination host.
The packet will be forwarded to the 192.168.1.3 next-hop address.
42. Which range of port numbers are reserved for services that are commonly used by applications that run on servers?
0 to 255
0 to 1023
1024 to 49151
49152 to 65535
43.
Refer to the exhibit. What three statements are true about the IP configuration that is shown? (Choose three.)
The address that is assigned to the computer represents private addressing.
The computer is unable to communicate outside of the local network.
The network of this computer can have 126 hosts.
The prefix of the computer address is /27.
The IP address that is assigned to the computer is routable on the Internet.
The IP address that is assigned to the computer is a broadcast address.
44.
Refer to the exhibit. A network administrator remotely accesses the CLI of RouterB from PC1 using Telnet. Which statement is true about this connection?
The data is automatically encrypted.
A Telnet server process is running on PC1.
The connection is made through a VTY session on the router.
A GET request was sent to RouterB to retrieve data during this session.
45. Which three statements characterize the transport layer protocols? (Choose three.)
TCP and UDP port numbers are used by application layer protocols.
UDP uses windowing and acknowledgments for reliable transfer of data.
TCP uses windowing and sequencing to provide reliable transfer of data.
TCP is a connection-oriented protocol. UDP is a connectionless protocol.
46. Which of the following are the address ranges of the private IP addresses? (Choose three.)
10.0.0.0 to 10.255.255.255
200.100.50.0 to 200.100.25.255
150.150.0.0 to 150.150.255.255
172.16.0.0 to 172.31.255.255
192.168.0.0 to 192.168.255.255
127.16.0.0 to 127.31.255.255
47. Which OSI layers offers reliable, connection-oriented data communication services?
application
presentation
session
transport
network
48.
Refer to the exhibit. Which logical topology best describes the exhibited network?
star
ring
point-to-point
multiaccess
mesh
49. During the encapsulation process, which identifiers are added at the transport layer?
two networks routing the packets
two applications communicating the data
two hosts at either end of the communication
two nodes on the local network exchanging the frame
50. What are two characteristics of the data link layer? (Choose two.)
It segments and reorders the data.
It exchanges the frames between nodes.
It defines the method by which network devices place data onto the media.
It manages the transfer of data between the processes that run on each host.
It retrieves signals from the media and restores them to their bit representations
ccna-1-final-exam-answers-2012
1. Which OSI layers offers reliable, connection-oriented data communication services?
application
presentation
session
transport
network
2.
Refer to the exhibit. The host was disconnected from switch 2 and connected to switch 1. Which combination of IP address, subnet mask, and default gateway should be assigned to this host to allow it to function in the network?
IP address: 10.10.9.37 Subnet mask: 255.255.255.240 Default gateway: 10.10.9.35
IP address: 10.10.9.37 Subnet mask: 255.255.255.224 Default gateway: 10.10.9.35
IP address: 10.10.9.29 Subnet mask: 255.255.255.248 Default gateway: 10.10.9.35
IP address: 10.10.9.32 Subnet mask: 255.255.255.224 Default gateway: 10.10.9.35
IP address: 10.10.9.37 Subnet mask: 255.255.255.224 Default gateway: 196.1.105.6
IP address: 10.10.9.63 Subnet mask: 255.255.255.224 Default gateway: 10.10.9.35
3.
Refer to the exhibit. What is the correct destination socket number for a web page request from Host A to the web server?
00-08-a3-b6-ce-46
198.133.219.25:80
http://www.cisco.com
C 198.133.219.0/24 is directly connected, FastEthernet0/0
4.
Refer to the exhibit. How will data files get retrieved from the server?
The client establishes a two-way connection to the server on port 21 for file transfer.
From the perspective of computer A, port 21 is used to signal a push to the server, and port 20 is used to signal a pull from the server.
There is a connection established to send files from the client to the server and a second connection to get files from the server to the client.
Computer A establishes a connection to the server on port 21 for control and uses a second connection on port 20 to download and upload files.
5. Which three IPv4 addresses represent a broadcast for a subnet? (Choose three.)
172.16.4.63 /26
172.16.4.129 /26
172.16.4.191 /26
172.16.4.51 /27
172.16.4.95 /27
172.16.4.221 /27
6.
Refer to the exhibit. The PC, the routing table of which is displayed, is configured correctly. To which network device or interface does the IP address 192.168.1.254 belong?
PC
Switch
router interface fa0/0
router interface fa0/1
7. How does the transport layer allow a host to maintain multiple, simultaneous communication streams across different applications?
It uses error control mechanisms.
It uses a connectionless protocol only for multiple simultaneous transmissions.
It uses multiple Layer 2 source addresses.
It uses multiple ports.
8.
Refer to the exhibit. The NAT functionality of the router is enabled to provide Internet access to the PC. However, the PC is still unable to access the Internet. Which IP address should be changed to 209.165.201.1 to enable the PC to access the Internet?
192.168.1.191
192.168.1.101
192.168.1.1
192.168.1.254
9.
Refer to the exhibit. A technician uses the nslookup command on the PC and views the output that is displayed in the exhibit. What is the IP address of the primary domain name server used by the host?
10.10.10.32
192.168.1.5
192.168.1.99
192.168.2.100
10.
Refer to the exhibit. Host X is unable to communicate with host Y. Which command can be run at host X to determine which intermediary device is responsible for this failure?
telnet 192.168.1.1
ping 192.168.1.1
ftp 192.168.1.1
tracert 192.168.1.1
11. In a Cisco IOS device, where is the startup-configuration file stored?
Flash
NVRAM
RAM
ROM
12. A host is transmitting a video over the network. How does the transport layer allow this host to use multiple applications to transmit other data at the same time as the video transmission?
It uses error control mechanisms.
It uses a connectionless protocol only for multiple simultaneous transmissions.
It uses multiple Layer 2 source addresses.
It uses multiple port numbers.
13.
Refer to the exhibit. Which logical topology describes the exhibited network?
star
ring
point-to-point
multi-access
14. A user types the enable command. What task can be performed at the privileged EXEC mode?
Configure the device.
Configure individual interfaces.
Configure individual terminal lines.
Issue show and debug commands.
15. Which type of media is immune to EMI and RFI? (Choose two.)
10 Base-T
10 Base-2
10 Base-5
100 Base-FX
100 Base TX
1000 Base LX
16.
Refer to the exhibit. The network administrator remotely accesses the CLI of RouterB from PC1 using a secure connection. Which statement is true about this connection?
The Telnet server process is running on PC1.
Only the exchange of the Telnet username and password is encrypted.
The GET request is sent to RouterA to retrieve data.
The SSH service is used to connect PC1 to RouterB.
17. Which three addresses belong to the category of private IP addresses? (Choose three.)
10.0.0.1
127.0.0.1
150.0.0.1
172.16.0.1
192.168.0.1
200.100.50.1
18.
Refer to the exhibit. On the basis of the IP configuration that is shown, what is the reason that Host A and Host B are unable to communicate outside the local network?
Host A was assigned a network address.
Host B was assigned a multicast address.
Host A and Host B belong to different networks.
The gateway address was assigned a broadcast address.
19. Which three statements are true about network layer addressing? (Choose three.)
It uniquely identifies each host.
It assists in forwarding packets across internetworks.
It uses a logical 32-bit IPv4 address.
It is not a configurable address.
It is a physical address.
It identifies the host from the first part of the address.
20. Which device should be used for routing a packet to a remote network?
access switch
DHCP server
hub
router
21.
Refer to the exhibit. What is required on host A for a network technician to create the initial configuration on Router1?
an FTP client
a Telnet client
a terminal emulation program
a web browser
22. As network administrator, what is the subnet mask that allows 510 hosts given the IP address 172.30.0.0?
255.255.0.0
255.255.248.0
255.255.252.0
255.255.254.0
255.255.255.0
255.255.255.128
23.
Refer to the exhibit. The headers added at each layer are shown. Which layer adds the destination and source process numbers to ensure that data is delivered to the correct application?
physical layer
data link layer
network layer
transport layer
24. What is the result of using the clock rate 56000 command at the serial interface of the router?
The interface is configured as a DCE device.
The interface timers are cleared.
The FastEthernet interface is made to emulate a serial interface by assigning it a timing signal.
The IP address for the serial interface is configured.
25.
Refer to the exhibit. Host A uses router A as its default gateway. If host A sends an ICMP echo request to 172.16.10.0, what ICMP response will host A receive.
echo reply
source quench
route redirection
destination unreachable
26.
Refer to the exhibit. A host is using NAT to connect to the Internet. Which three IP addresses enable this connection? (Choose three.)
10.1.1.63
10.1.1.37
10.1.1.39
10.1.1.32
10.1.1.60
10.1.1.2
27. Which OSI layer uses the header information to reassemble the data segments into streams?
application layer
network layer
presentation layer
session layer
transport layer
28.
Refer to the exhibit. The diagram represents the process of sending email between clients. Select the list below that correctly identifies the component or protocol used at each numbered stage of the diagram.
1.MUA 2.MDA 3.MTA 4.SMTP 5.MTA 6.POP 7.MDA 8.MUA
1.MUA 2.POP 3.MDA 4.SMTP 5.MTA 6.MDA 7.SMTP 8.MUA
1.MUA 2.POP 3.SMTP 4.MDA 5.MTA 6.SMTP 7.POP 8.MUA
1.MDA 2.SMTP 3.MTA 4.SMTP 5.MTA 6.MUA 7.POP 8.MDA
1.MUA 2.SMTP 3.MTA 4.SMTP 5.MTA 6.MDA 7.POP 8.MUA
29. Which three statements characterize the transport layer protocols? (Choose three.)
TCP and UDP port numbers are used by application layer protocols.
TCP uses port numbers to provide reliable transportation of IP packets.
UDP uses windowing and acknowledgments for reliable transfer of data.
TCP uses windowing and sequencing to provide reliable transfer of data.
TCP is a connection-oriented protocol. UDP is a connectionless protocol.
30.
Examine the graphic with current configurations. Host A in the Clerical office failed and was replaced. Although a ping to 127.0.0.1 was successful, the replacement computer cannot access the company network. With proxy ARP disabled on the Fa0/0 interface of the New York router, what is the likely cause of the problem?
network card failure
network cables unplugged
IP address incorrectly entered
subnet mask incorrectly entered
31. Which fiber connector supports full-duplex Ethernet?
32. What purpose does a hostname serve on a router?
uniquely identifies a router on the internet
used by routing protocols to identify peer routers
provides device identification to users logging on remotely
determines the hosts that are allowed to connect to the device
33. Which range of port numbers is assigned dynamically to client applications when initiating a connection to the server?
0 to 255
0 to 1023
1024 to 49151
greater than 65535
34.
Refer to the exhibit. A network technician wants to connect host A to the console of a Cisco switch to initialize the configuration. What type of cable is required for this connection?
straight-through cable
crossover cable
rollover cable
serial cable
35.
Refer to the exhibit. Host A wants to access the Internet. Which combination of a Layer 2 address and a Layer 3 address will enable this access from host A?
Destination MAC: 0030.8596.DE83 Default gateway: 209.165.202.130
Destination MAC: 0030.8596.DE82 Default gateway: 172.16.9.2
Destination MAC: 0030.8517.44C4 Default gateway: 172.16.1.1
Destination MAC: 0030.8517.44C4 Default gateway: 209.165.202.130
36.
Refer to the exhibit. Each media link is labeled. What type of cable should be used to connect the different devices?
Connection 1 – rollover cable Connection 2 – straight-through cable Connection 3 – crossover cable
Connection 1 – straight-through cable Connection 2 – crossover cable Connection 3 – rollover cable
Connection 1 – crossover cable Connection 2 – rollover cable Connection 3 – straight-through cable
Connection 1 – crossover cable Connection 2 – straight-through cable Connection 3 – rollover cable
Connection 1 – straight-through cable Connection 2 – straight-through cable Connection 3 – straight-through cable
37. The Layer 4 header contains which type of information to aid in the delivery of data?
service port number
host logical address
device physical address
virtual connection identifier
38.
Refer to the exhibit. The network containing router B is experiencing problems. A network associate has isolated the issue in this network to router B. What action can be preformed to correct the network issue?
issue the clock rate command on interface Serial 0/0/0
issue the description command on interface Serial 0/0/1
issue the ip address command on interface FastEthernet 0/0
issue the no shutdown command on interface FastEthernet 0/1
39.
Refer to the exhibit. Which two statements describe the information that is represented in the header? (Choose two.)
This is a server response.
The UDP protocol is being used.
The destination port indicates a Telnet session.
The return segment will contain a source port of 23.
The next session originated from the client of this session will use the source port number 13358.
40. What information is used at each hop to determine where the packet will be forwarded next?
the IP packet header
the incoming interface
the transport layer PDU
the source MAC address
41.
Refer to the exhibit. Cable 1 and cable 2 have the ends wired for specific physical layer requirements. The table lists each segment by number and the cable which has been installed by the network technician between the network components on that segment. From the data given, which segments have the correct cable installed? (Choose three.)
segment1
segment2
segment3
segment4
segment5
42. An administrator has made changes to a device. The changes did not have the desired effect. What can the administrator do to restore the configuration saved in NVRAM?
Issue the erase flash command.
Issue the reload command and respond no to the prompt that follows.
Issue the erase start-up config command.
Issue the copy running-config start-up config command.
43.
Refer to the exhibit. Which logical topology describes the exhibited network?
star
ring
point-to-point
multi-access
44. A network administrator wants to restrict access to the router privileged EXEC mode. Which password should the administrator use?
enable
aux
console
VTY
45.
Refer to the exhibit. Which set of devices contains only intermediary devices?
A, B, D, G
A, B, E, F
C, D, G, I
G, H, I, J
46. While configuring a router, a network technician wants to name the router. Which prompt should the technician see when entering the hostname command?
Router>
Router#
Router(config)#
Router(config-line)#
47.
Refer to the exhibit. An administrator on PC1 wants to view some HTML code from a web page housed on the web server. Which client application will allow this request to be started?
48.
Refer to the exhibit. A technician has been asked to test connectivity from PC1 to a remote network. Which action will indicate if there is remote connectivity?
49.
Refer to the exhibit. A web browser running on host PC1 sends a request for a web page to the web server with an IP address 192.168.1.254/24. What sequence of steps will follow in order to establish the session before data can be exchanged?
The session will be initiated using UDP. No additional acknowledgment will be required to establish the session.
The session will be initiated using TCP. No additional acknowledgment will be required to establish the session.
The session will be initiated using UDP. The returned web page will serve as an acknowledgment for session establishment.
The session will be initiated using TCP. A three-way handshake must be successfully completed before the session is established.
50. Because of a security violation, the router password must be changed. What information can be learned from these configuration entries? (Choose two.)
Router(config)# line vty 0 4 Router(config-line)# password arj15 Router(config-line)# login
This configuration allows users to connect by using a modem.
Users must specify which line, 0 or 4, they wish to connect to when making a connection.
This configuration allows users to connect to the router via the use of the telnet command.
This configuration allows five users to make simultaneous connections to this router.
The configured password is automatically encrypted on the router.
Read more...
application
presentation
session
transport
network
2.
Refer to the exhibit. The host was disconnected from switch 2 and connected to switch 1. Which combination of IP address, subnet mask, and default gateway should be assigned to this host to allow it to function in the network?
IP address: 10.10.9.37 Subnet mask: 255.255.255.240 Default gateway: 10.10.9.35
IP address: 10.10.9.37 Subnet mask: 255.255.255.224 Default gateway: 10.10.9.35
IP address: 10.10.9.29 Subnet mask: 255.255.255.248 Default gateway: 10.10.9.35
IP address: 10.10.9.32 Subnet mask: 255.255.255.224 Default gateway: 10.10.9.35
IP address: 10.10.9.37 Subnet mask: 255.255.255.224 Default gateway: 196.1.105.6
IP address: 10.10.9.63 Subnet mask: 255.255.255.224 Default gateway: 10.10.9.35
3.
Refer to the exhibit. What is the correct destination socket number for a web page request from Host A to the web server?
00-08-a3-b6-ce-46
198.133.219.25:80
http://www.cisco.com
C 198.133.219.0/24 is directly connected, FastEthernet0/0
4.
Refer to the exhibit. How will data files get retrieved from the server?
The client establishes a two-way connection to the server on port 21 for file transfer.
From the perspective of computer A, port 21 is used to signal a push to the server, and port 20 is used to signal a pull from the server.
There is a connection established to send files from the client to the server and a second connection to get files from the server to the client.
Computer A establishes a connection to the server on port 21 for control and uses a second connection on port 20 to download and upload files.
5. Which three IPv4 addresses represent a broadcast for a subnet? (Choose three.)
172.16.4.63 /26
172.16.4.129 /26
172.16.4.191 /26
172.16.4.51 /27
172.16.4.95 /27
172.16.4.221 /27
6.
Refer to the exhibit. The PC, the routing table of which is displayed, is configured correctly. To which network device or interface does the IP address 192.168.1.254 belong?
PC
Switch
router interface fa0/0
router interface fa0/1
7. How does the transport layer allow a host to maintain multiple, simultaneous communication streams across different applications?
It uses error control mechanisms.
It uses a connectionless protocol only for multiple simultaneous transmissions.
It uses multiple Layer 2 source addresses.
It uses multiple ports.
8.
Refer to the exhibit. The NAT functionality of the router is enabled to provide Internet access to the PC. However, the PC is still unable to access the Internet. Which IP address should be changed to 209.165.201.1 to enable the PC to access the Internet?
192.168.1.191
192.168.1.101
192.168.1.1
192.168.1.254
9.
Refer to the exhibit. A technician uses the nslookup command on the PC and views the output that is displayed in the exhibit. What is the IP address of the primary domain name server used by the host?
10.10.10.32
192.168.1.5
192.168.1.99
192.168.2.100
10.
Refer to the exhibit. Host X is unable to communicate with host Y. Which command can be run at host X to determine which intermediary device is responsible for this failure?
telnet 192.168.1.1
ping 192.168.1.1
ftp 192.168.1.1
tracert 192.168.1.1
11. In a Cisco IOS device, where is the startup-configuration file stored?
Flash
NVRAM
RAM
ROM
12. A host is transmitting a video over the network. How does the transport layer allow this host to use multiple applications to transmit other data at the same time as the video transmission?
It uses error control mechanisms.
It uses a connectionless protocol only for multiple simultaneous transmissions.
It uses multiple Layer 2 source addresses.
It uses multiple port numbers.
13.
Refer to the exhibit. Which logical topology describes the exhibited network?
star
ring
point-to-point
multi-access
14. A user types the enable command. What task can be performed at the privileged EXEC mode?
Configure the device.
Configure individual interfaces.
Configure individual terminal lines.
Issue show and debug commands.
15. Which type of media is immune to EMI and RFI? (Choose two.)
10 Base-T
10 Base-2
10 Base-5
100 Base-FX
100 Base TX
1000 Base LX
16.
Refer to the exhibit. The network administrator remotely accesses the CLI of RouterB from PC1 using a secure connection. Which statement is true about this connection?
The Telnet server process is running on PC1.
Only the exchange of the Telnet username and password is encrypted.
The GET request is sent to RouterA to retrieve data.
The SSH service is used to connect PC1 to RouterB.
17. Which three addresses belong to the category of private IP addresses? (Choose three.)
10.0.0.1
127.0.0.1
150.0.0.1
172.16.0.1
192.168.0.1
200.100.50.1
18.
Refer to the exhibit. On the basis of the IP configuration that is shown, what is the reason that Host A and Host B are unable to communicate outside the local network?
Host A was assigned a network address.
Host B was assigned a multicast address.
Host A and Host B belong to different networks.
The gateway address was assigned a broadcast address.
19. Which three statements are true about network layer addressing? (Choose three.)
It uniquely identifies each host.
It assists in forwarding packets across internetworks.
It uses a logical 32-bit IPv4 address.
It is not a configurable address.
It is a physical address.
It identifies the host from the first part of the address.
20. Which device should be used for routing a packet to a remote network?
access switch
DHCP server
hub
router
21.
Refer to the exhibit. What is required on host A for a network technician to create the initial configuration on Router1?
an FTP client
a Telnet client
a terminal emulation program
a web browser
22. As network administrator, what is the subnet mask that allows 510 hosts given the IP address 172.30.0.0?
255.255.0.0
255.255.248.0
255.255.252.0
255.255.254.0
255.255.255.0
255.255.255.128
23.
Refer to the exhibit. The headers added at each layer are shown. Which layer adds the destination and source process numbers to ensure that data is delivered to the correct application?
physical layer
data link layer
network layer
transport layer
24. What is the result of using the clock rate 56000 command at the serial interface of the router?
The interface is configured as a DCE device.
The interface timers are cleared.
The FastEthernet interface is made to emulate a serial interface by assigning it a timing signal.
The IP address for the serial interface is configured.
25.
Refer to the exhibit. Host A uses router A as its default gateway. If host A sends an ICMP echo request to 172.16.10.0, what ICMP response will host A receive.
echo reply
source quench
route redirection
destination unreachable
26.
Refer to the exhibit. A host is using NAT to connect to the Internet. Which three IP addresses enable this connection? (Choose three.)
10.1.1.63
10.1.1.37
10.1.1.39
10.1.1.32
10.1.1.60
10.1.1.2
27. Which OSI layer uses the header information to reassemble the data segments into streams?
application layer
network layer
presentation layer
session layer
transport layer
28.
Refer to the exhibit. The diagram represents the process of sending email between clients. Select the list below that correctly identifies the component or protocol used at each numbered stage of the diagram.
1.MUA 2.MDA 3.MTA 4.SMTP 5.MTA 6.POP 7.MDA 8.MUA
1.MUA 2.POP 3.MDA 4.SMTP 5.MTA 6.MDA 7.SMTP 8.MUA
1.MUA 2.POP 3.SMTP 4.MDA 5.MTA 6.SMTP 7.POP 8.MUA
1.MDA 2.SMTP 3.MTA 4.SMTP 5.MTA 6.MUA 7.POP 8.MDA
1.MUA 2.SMTP 3.MTA 4.SMTP 5.MTA 6.MDA 7.POP 8.MUA
29. Which three statements characterize the transport layer protocols? (Choose three.)
TCP and UDP port numbers are used by application layer protocols.
TCP uses port numbers to provide reliable transportation of IP packets.
UDP uses windowing and acknowledgments for reliable transfer of data.
TCP uses windowing and sequencing to provide reliable transfer of data.
TCP is a connection-oriented protocol. UDP is a connectionless protocol.
30.
Examine the graphic with current configurations. Host A in the Clerical office failed and was replaced. Although a ping to 127.0.0.1 was successful, the replacement computer cannot access the company network. With proxy ARP disabled on the Fa0/0 interface of the New York router, what is the likely cause of the problem?
network card failure
network cables unplugged
IP address incorrectly entered
subnet mask incorrectly entered
31. Which fiber connector supports full-duplex Ethernet?
32. What purpose does a hostname serve on a router?
uniquely identifies a router on the internet
used by routing protocols to identify peer routers
provides device identification to users logging on remotely
determines the hosts that are allowed to connect to the device
33. Which range of port numbers is assigned dynamically to client applications when initiating a connection to the server?
0 to 255
0 to 1023
1024 to 49151
greater than 65535
34.
Refer to the exhibit. A network technician wants to connect host A to the console of a Cisco switch to initialize the configuration. What type of cable is required for this connection?
straight-through cable
crossover cable
rollover cable
serial cable
35.
Refer to the exhibit. Host A wants to access the Internet. Which combination of a Layer 2 address and a Layer 3 address will enable this access from host A?
Destination MAC: 0030.8596.DE83 Default gateway: 209.165.202.130
Destination MAC: 0030.8596.DE82 Default gateway: 172.16.9.2
Destination MAC: 0030.8517.44C4 Default gateway: 172.16.1.1
Destination MAC: 0030.8517.44C4 Default gateway: 209.165.202.130
36.
Refer to the exhibit. Each media link is labeled. What type of cable should be used to connect the different devices?
Connection 1 – rollover cable Connection 2 – straight-through cable Connection 3 – crossover cable
Connection 1 – straight-through cable Connection 2 – crossover cable Connection 3 – rollover cable
Connection 1 – crossover cable Connection 2 – rollover cable Connection 3 – straight-through cable
Connection 1 – crossover cable Connection 2 – straight-through cable Connection 3 – rollover cable
Connection 1 – straight-through cable Connection 2 – straight-through cable Connection 3 – straight-through cable
37. The Layer 4 header contains which type of information to aid in the delivery of data?
service port number
host logical address
device physical address
virtual connection identifier
38.
Refer to the exhibit. The network containing router B is experiencing problems. A network associate has isolated the issue in this network to router B. What action can be preformed to correct the network issue?
issue the clock rate command on interface Serial 0/0/0
issue the description command on interface Serial 0/0/1
issue the ip address command on interface FastEthernet 0/0
issue the no shutdown command on interface FastEthernet 0/1
39.
Refer to the exhibit. Which two statements describe the information that is represented in the header? (Choose two.)
This is a server response.
The UDP protocol is being used.
The destination port indicates a Telnet session.
The return segment will contain a source port of 23.
The next session originated from the client of this session will use the source port number 13358.
40. What information is used at each hop to determine where the packet will be forwarded next?
the IP packet header
the incoming interface
the transport layer PDU
the source MAC address
41.
Refer to the exhibit. Cable 1 and cable 2 have the ends wired for specific physical layer requirements. The table lists each segment by number and the cable which has been installed by the network technician between the network components on that segment. From the data given, which segments have the correct cable installed? (Choose three.)
segment1
segment2
segment3
segment4
segment5
42. An administrator has made changes to a device. The changes did not have the desired effect. What can the administrator do to restore the configuration saved in NVRAM?
Issue the erase flash command.
Issue the reload command and respond no to the prompt that follows.
Issue the erase start-up config command.
Issue the copy running-config start-up config command.
43.
Refer to the exhibit. Which logical topology describes the exhibited network?
star
ring
point-to-point
multi-access
44. A network administrator wants to restrict access to the router privileged EXEC mode. Which password should the administrator use?
enable
aux
console
VTY
45.
Refer to the exhibit. Which set of devices contains only intermediary devices?
A, B, D, G
A, B, E, F
C, D, G, I
G, H, I, J
46. While configuring a router, a network technician wants to name the router. Which prompt should the technician see when entering the hostname command?
Router>
Router#
Router(config)#
Router(config-line)#
47.
Refer to the exhibit. An administrator on PC1 wants to view some HTML code from a web page housed on the web server. Which client application will allow this request to be started?
48.
Refer to the exhibit. A technician has been asked to test connectivity from PC1 to a remote network. Which action will indicate if there is remote connectivity?
49.
Refer to the exhibit. A web browser running on host PC1 sends a request for a web page to the web server with an IP address 192.168.1.254/24. What sequence of steps will follow in order to establish the session before data can be exchanged?
The session will be initiated using UDP. No additional acknowledgment will be required to establish the session.
The session will be initiated using TCP. No additional acknowledgment will be required to establish the session.
The session will be initiated using UDP. The returned web page will serve as an acknowledgment for session establishment.
The session will be initiated using TCP. A three-way handshake must be successfully completed before the session is established.
50. Because of a security violation, the router password must be changed. What information can be learned from these configuration entries? (Choose two.)
Router(config)# line vty 0 4 Router(config-line)# password arj15 Router(config-line)# login
This configuration allows users to connect by using a modem.
Users must specify which line, 0 or 4, they wish to connect to when making a connection.
This configuration allows users to connect to the router via the use of the telnet command.
This configuration allows five users to make simultaneous connections to this router.
The configured password is automatically encrypted on the router.
Subscribe to:
Posts (Atom)