Hosting Gratis

Web Hosting

Thursday, 5 January 2012

CCNA1 FINAL EXAM. Version 4.0 (Score 98) update 2012

A network technician is tasked with setting up a network for six users, but the users should be able to use their accounts to log on from any of the six computers. What type of network should be used?
workgroup
P2P applications
peer-to-peer network
client-server network


Refer to the exhibit. The network administrator remotely accesses the CLI of RouterB from PC1 using a secure connection. Which statement is true about this connection?
The Telnet server process is running on PC1.
Only the exchange of the Telnet username and password is encrypted.
The GET request is sent to RouterA to retrieve data.
The SSH service is used to connect PC1 to RouterB.


Which statement describes the correct use of addresses to deliver an e-mail message from HostB to the e-mail service that is running on ServerA?
HostB uses the MAC address of ServerA as the destination.
Router B uses a Layer 3 network address to route the packet.***
Router A uses the Layer 4 address to forward the packet to Router B.
Via the use of a Layer 3 address, ServerA assigns the message to the e-mail service.

Which of the following are the address ranges of the private IP addresses? (Choose three.)
10.0.0.0 to 10.255.255.255***
200.100.50.0 to 200.100.25.255
150.150.0.0 to 150.150.255.255
172.16.0.0 to 172.31.255.255***
192.168.0.0 to 192.168.255.255***
127.16.0.0 to 127.31.255.255

Which password is automatically encrypted when it is created?
vty
aux
console
enable secret***
enable password


What are the default terminal emulation software settings when configuring a Cisco device through a console port?
Bits per second: 19200
Data bits: 7
Parity: None
Stop bits: 0
Flow control: None
Bits per second: 9600
Data bits: 8
Parity: None
Stop bits: 1
Flow control: None

Bits per second: 19200
Data bits: 7
Parity: None
Stop bits: 0
Flow control: Hardware
Bits per second: 9600
Data bits: 8
Parity: None
Stop bits: 1
Flow control: Hardware

Which option shows how a router will route packets to a remote network?

Answer is Option 4***


Two routers are connected via their serial ports in a lab environment. The routers are configured with valid IP addresses, but they cannot ping each other. The show interface serial0/0 command shows that the serial0/0 interface is up but the line protocol is down. What could be the cause of this problem?
The no shutdown command has not been applied to the interfaces.
The clock rate command has not been entered on the DCE interface.***
The interface timers are not cleared.
The FastEthernet interface is emulating a serial interface by assigning it a timing signal.


A network administrator subnets the network 192.168.1.0/24 into four subnets. Which option correctly addresses Router1 and host A into the second subnet created?

Answer is Option 3***


Refer to the exhibit. The router of the company failed and was replaced. After the replacement, hosts C and D in the Education office are able to ping each other, but they are unable to access the hosts in the Accounts office. What is the likely cause of the problem?
The IP address at the fa0/0 interface of the router is incorrectly configured.
The subnet mask at the fa0/1 interface of the router is incorrectly entered.
The IP address at the serial interface of the router is incorrectly configured.
The hosts in the Accounts office are not on the same subnet as the hosts in the Education office.

Which OSI layer addressing is required to route packets between two networks?
Layer 1
Layer 2
Layer 3***
Layer 4


Which exhibit shows the interface that is configured by the command, router(config)# interface serial 0/0/1?
Answer: option 4.

Which three IPv4 addresses represent subnet broadcast addresses? (Choose three.)
192.168.4.63 /26
192.168.4.129 /26
192.168.4.191 /26
192.168.4.51 /27
192.168.4.95 /27
192.168.4.221 /27

Which physical connector type is used for a serial V.35 connection to the CSU/DSU?
Answer is Option 4***

In a network design project, a network designer needs to select a device to provide collision free connections to 40 hosts on the LAN. Which device should be selected?
hub
router
switch
firewall

Refer to the exhibit. While configuring a network, a technician wired each end of a Category 5e cable as shown. Which two statements are true about this setup? (Choose two.)
The cable is suitable for connecting a switch to a router Ethernet port.***
The cable is suitable for connecting dissimilar types of devices.***
The cable is unusable and must be rewired.
The cable is terminated in a way that the transmit pin is wired to the receive pin.
The cable simulates a point-to-point WAN link.

Refer to the exhibit. The ping 127.0.0.1 command is issued on the local host. What do the ping results indicate?
The local host can send packets on the local network.
The TCP/IP stack on the local host operates properly.
The local host has full connectivity to the default gateway.
The local host has full connectivity to the remote network.

Refer to the exhibit. Host A and B are unable to communicate with each other. What is the reason for this?
Host A is assigned a network address.
Host B is assigned a multicast address.
Host A and host B belong to different networks.
The gateway addresses are network addresses.***

What is the effect of using the Router# copy running-config startup-config command on a router?
The contents of ROM will change.
The contents of RAM will change.
The contents of NVRAM will change.
The contents of flash will change.

Refer to the exhibit. Which layered network model is shown in the diagram?
Cisco
IETF
OSI
TCP/IP ***

40. Which two programs can be used to accomplish terminal emulation for configuring a router from the CLI through the console port? (Choose two.)
HyperTerminal
Internet Explorer
Minicom
Secure Shell
Telnet

Which device should be used for enabling a host to communicate with another host on a different network?
switch
hub
router***
host


Refer to the exhibit. Which option shows the correct topology given the configuration of Router1?

Answer is Option 1***


Which configuration mode is used to set a password to authenticate users that are accessing and configuring the network device using a Telnet connection?
interface mode

Refer to the exhibit. When computer A sends a frame to computer D, what computers receive the frame?
only computer D***
only computer A and computer D
only computer B, computer C, and computer D
all computers


37. Which router configuration mode will require user authentication if an administrator issues the enable secret command?
user executive mode
privileged executive mode
global configuration mode
service specific configuration mode

A user sees the command prompt: Router(config-if)# . What task can be performed at this mode?
Perform basic tests.

Refer to the exhibit. The diagram represents the process of sending e-mail between clients. Which list correctly identifies the component or protocol used at each numbered stage of the diagram?
1.MUA 2.MDA 3.MTA 4.SMTP 5.MTA 6.POP 7.MDA 8.MUA
1.MUA 2.POP 3.MDA 4.SMTP 5.MTA 6.MDA 7.SMTP 8.MUA
1.MUA 2.POP 3.SMTP 4.MDA 5.MTA 6.SMTP 7.POP 8.MUA
1.MUA 2.SMTP 3.MTA 4.SMTP 5.MTA 6.MDA 7.POP 8.MUA ***


What type of IP address should be assigned to a web server?
Broadcast

1
Which OSI layer does IP rely on to determine whether packets have been lost and to request retransmission?
application
presentation
session
transport ***


Refer to the exhibit. The nslookup command that is shown was issued on a Windows PC host. What does the 10.32.5.74 address represent?
the IP address of the host
the default gateway for the host
the primary DNS server for the host
the home page address for the host


Top of Form







Bottom of Form

Top of Form



Top of Form
1.      Which range of port numbers are reserved for services that are commonly used by applications that run on servers?
0 to 255
0 to 1023
1024 to 49151
49152 to 65535
Top of Form
2.      Refer to the exhibit. Host A is able to access resources on the local LAN but is unable to access any resources on the Internet. What is the likely cause of this problem?
The host subnet mask in incorrect.
The network uses private addresses.
The host address is a network address.
The default gateway is on a different subnet from the host.
Bottom of Form

Top of Form
Which option shows the PDU that contains the Layer 3 source and destination addressing for a packet?
Option 3

Bottom of Form
Bottom of Form

Top of Form
Which physical component is used to access and perform the initial configuration on a new unconfigured router?
Bottom of Form
Option 2
5. Refer to the exhibit. When host A sends a frame addressed for host D, which hosts will receive the frame?
only host Donly hosts A and Donly hosts B, C, and Dall hosts
6. Refer to the exhibit. RouterB is configured properly. The Ethernet interface Fa0/0 of RouterA is configured with the use of the commands that are shown. However, a ping from the Fa0/0 interface of RouterA to the Fa0/0 interface of RouterB is unsuccessful. What action should be taken on RouterA to solve this problem?
Use the description command on the FastEthernet interface Fa0/0.Configure the clock rate of the FastEthernet interface Fa0/0.Use the no shutdown command on the FastEthernet interface Fa0/0.Reboot the router.
Top of Form
7. Refer to the exhibit. Which type of network design is shown?
client/server
wide area
dedicated server
peer-to-peer
Bottom of Form

Top of Form
Which three addresses belong to the category of public IP addresses? (Choose three.)
127.0.0.1
196.1.105.6
132.11.9.99
10.0.0.1
172.16.9.10
46.1.1.97
Bottom of Form



Top of Form
An organization has been assigned network ID 10.10.128.0 and subnet mask 255.255.224.0. Which IP address range can be used for this organization?
10.10.128.0 to 10.10.160.255
10.10.128.0 to 10.10.159.255
10.10.128.0 to 10.10.192.255
10.10.128.0 to 10.10.0.159
10.10.128.0 to 10.10.159.0
Bottom of Form

Top of Form
10. The tracert 10.1.3.2 command was issued on computer A. Computer A can ping other addresses on the local subnet. Computer A sent the first ICMP packet toward computer B with a TTL value of 1. A protocol analyzer that was running on computer B showed that the packet never reached its destination. Why did the packet not reach the destination?
There is a TCP/IP problem on computer A.
There is a routing loop between R1 and R2.
R1 does not have a route for the destination network.
The TTL for the packet was decreased to zero by R1.
Bottom of Form


26. Which OSI layer manages data segments?
application layer
presentation layer
session layer
transport layer
Bottom of Form


Top of Form
A network technician has made a UTP cable that is terminated as T568A on one end and T568B on the opposite end. What type of cable has been constructed?
patch
console
crossover
straight-through
Bottom of Form



Top of Form
Refer to the exhibit. For connecting two routers with an Ethernet crossover cable, which interface should be used?
A
B
C
D
Bottom of Form


Top of Form
Refer to the exhibit. Host1 is in the process of setting up a TCP session with Host2. Host1 has sent a SYN message to begin session establishment. What happens next?
Host1 sends a segment with the ACK flag = 0, SYN flag = 0 to Host2.
Host1 sends a segment with the ACK flag = 1, SYN flag = 0 to Host2.
Host1 sends a segment with the ACK flag = 1, SYN flag = 1 to Host2.
Host2 sends a segment with the ACK flag = 0, SYN flag = 1 to Host1.
Host2 sends a segment with the ACK flag = 1, SYN flag = 0 to Host1.
Host2 sends a segment with the ACK flag = 1, SYN flag = 1 to Host1.
Bottom of Form



Top of Form
Which two types of media can provide bandwidth up to 1 Gb/s? (Choose two.)
10 BASE-T
100 BASE-T
100 BASE-FX
1000 BASE-TX
1000 BASE-SX


Bottom of Form
Top of Form
31. A routing issue has occurred in your internetwork. Which of the following type of devices should be examined to isolate this error?
access point
host
hub
router
switch
Bottom of Form

Top of Form
A user enters http://www.cisco.com/web1.htm in the address line of a browser. Which statement is true about this transaction?
The "http" portion indicates the protocol that is being used.
The "web1.htm" portion is the specific service name.
The retrieved web page will be displayed in URL code.
The "www.cisco.com" is the name of the web page file that is called.
Bottom of Form



Top of Form
How many host addresses may be assigned when using the 128.107.0.0 network address with a subnet mask of 255.255.248.0?
30
256
2046
2048
4094
4096
Bottom of Form


Top of Form



Refer to the exhibit. A technician is working on a network problem that requires verification of the router LAN interface. What address should be pinged from this host to confirm that the router interface is operational?
127.0.0.1
192.168.64.196
192.168.254.1
192.168.254.9
192.168.254.254
Bottom of Form



Top of Form
Which control flag must be included in the segment header to close a connection?
ACK
FIN
FCS
RST
URG
Bottom of Form
36.
Top of Form
When must a router serial interface be configured with the clock rate command?
when the interface is functioning as a DTE device
when the interface timers have been cleared
when the connected DTE device is shut down
when the interface is functioning as a DCE device
Bottom of Form


Top of Form
Which router component will have contents erased when the command erase startup-config is issued?
flash
RAM
ROM
NVRAM
Bottom of Form
Top of Form
38. Refer to the exhibit. An employee wants to access the organization intranet from home. Which intermediary device should be used to connect the organization intranet to the Internet to enable this access?
hub
switch
router
wireless access point
Bottom of Form

Top of Form
A network administrator is configuring several switches for a network. The switches have similar configurations and only minor differences. The administrator wants to save all commands that are issued on the first switch to a text file for editing. Which transfer option should be selected in HyperTerminal?
*Answer Option 3
Bottom of Form

Top of Form
Which prompt represents the appropriate mode used for the copy running-config startup-config command ?
Switch-6J>
Switch-6J#
Switch-6J(config)#
Switch-6J(config-if)#
Switch-6J(config-line)#
Bottom of Form
Top of Form







Bottom of Form
Top of Form
Which two factors contribute to the increased throughput when all nodes of a LAN are connected to a switch instead of a hub? (Choose two.)
full-duplex operation
collision-free environment
logical bus media access
broadcast-free environment
point-to-multipoint topology
Bottom of Form


Top of Form
A technician makes several changes to the running configuration on a router, but the desired results are not achieved. The technician issues the reload command. What action will be taken by the router?
All changes will be lost and the router will restart immediately.
Changes will be saved automatically and the router will restart.
The user will be prompted to save changes before the router restarts.
The router will detect changes to the running configuration and will reload using the configuration stored in RAM.
Bottom of Form



Top of Form
To enhance security in a network, the network administrator uses these commands:

Router(config)# line console 0
Router(config-line)# password j1mdi2
Router(config-line)# login

What two conclusions are evident from these commands? (Choose two.)
Users who attempt to connect to the console port of the router must enter a password.
The entries permit access through the console by the use of j1mdi2 as the password.
The entries eliminate the need for authentication.
Access through the console will be denied because the console configuration is incomplete.
The entries prevent passwords from being displayed as plain text.
Bottom of Form


Top of Form
A technician is setting up a workgroup for six users and wants to allow users to share files without setting up a server. Which application layer protocol will provide for peer-to-peer file sharing in a workgroup?
DNS
SMB
HTTP
DHCP
Bottom of Form


45. Refer to the exhibit. What two facts can be determined from the session information that is displayed? (Choose two.)
The protocol is a connection-oriented protocol.
This exchange is part of the three-way handshake.
The SYN flag is representing the initial establishment of a session.
The destination port indicates that an FTP session has been initiated.
The source port does not support communication with the destination port that is listed.
Top of Form
Showing 10 of 11
Description: http://assessment.netacad.net/static/508theme/508/images/spacer.gif
Description: http://assessment.netacad.net/static/508theme/508/images/spacer.gif
Page:   GO
Description: http://assessment.netacad.net/static/508theme/508/images/spacer.gif
Bottom of Form
Top of Form
What is described by the network access layer of the TCP/IP model?
rules for packet acknowledgment, error recovery, and sequencing
rules for the handoff from the internet layer to the network access protocols
rules for how source and destination hosts exchange data between programs
rules for determining which processes can be used to route messages through an internetwork
Bottom of Form


Top of Form
Which application belongs to the category of the client/server model?
using Telnet to access a router
exchanging information via instant messaging
printing a document to a locally connected printer
scanning a document with a directly connected scanner
Bottom of Form
48. Refer to the exhibit. A network technician wants to connect host A to the console of a Cisco switch to initialize the configuration. What type of cable is required for this connection?
straight-through cablecrossover cablerollover cableserial cable
49. Refer to the exhibit. Which option correctly identifies the network address, range of host addresses, and the broadcast address for the network that contains host A?
*Answer Option 3
50. Which communication tool allows real-time collaboration?
wikie-mailwebloginstant messaging

51. Refer to the exhibit. Host A attempts to establish a TCP/IP session with host C. During this attempt, a frame was captured with the source MAC address 0050.7320.D632 and the destination MAC address 0030.8517.44C4. The packet inside the captured frame has an IP source address 192.168.7.5, and the destination IP address is 192.168.219.24. At which point in the network was this packet captured?
leaving host A
leaving ATL
leaving Dallas
leaving NYC


Top of Form
52. Refer to the exhibit. The ping 127.0.0.1 command is issued on the local host. What do the ping results indicate?
The local host can send packets on the local network.
The TCP/IP stack on the local host operates properly.
The local host has full connectivity to the default gateway.
The local host has full connectivity to the remote network.
Bottom of Form

Top of Form
11. Refer to the exhibit. Communication for hosts X and Y is restricted to the local network. What is the reason for this?
Host X is assigned a network address.
Host Y is assigned a multicast address.
Host X and host Y belong to different networks.
The gateway addresses are broadcast addresses.
Bottom of Form

Top of Form
A technician is asked to secure the privileged EXEC mode of a switch by requiring a password. Which type of password would require this login and be considered the most secure?
console
enable
enable secret
VTY
Bottom of Form



Top of Form
Which topology divides the collision domain and provides full media bandwidth to the hosts in the network?
Option 3

Bottom of Form
Top of Form

Top of Form
What can the user do from the command prompt, Router(config-line)# ?
Configure one of the network interfaces.
Configure one of the physical or virtual lines.
Verify the running configuration on the device.
Configure the parameters for one of the routing protocols.
Bottom of Form

Top of Form
Refer to the exhibit. Which two layers of the OSI model describe the same functions as the transport and internet layers of the TCP/IP model? (Choose two.)
application layer
presentation layer
session layer
transport layer
network layer
data link layer
physical layer
Bottom of Form
16. Which option represents a point-to-point logical topology diagram?
Option 4
Top of Form
17. Refer to the exhibit. What function does router RT_A need to provide to allow Internet access for hosts in this network?
address translation
DHCP services
ftpd
web server
Bottom of Form
Top of Form
18. Refer to the exhibit. A network administrator remotely accesses the CLI of RouterB from PC1 using Telnet. Which statement is true about this connection?
The data is automatically encrypted.
A Telnet server process is running on PC1.
The connection is made through a VTY session on the router.
A GET request was sent to RouterB to retrieve data during this session.
Bottom of Form

Top of Form
Which prompt is associated with the privileged exec mode?
R1>
Top of Form
21. Which application layer protocol allows administrators to log into a server from remote locations and control a server as though logged in locally?
DNS
FTP
DHCP
SMTP
Telnet
Bottom of Form
R1(config)#
R1(config-router)#
Bottom of Form



Top of Form
What is the effect of the command copy running-config tftp?
copies the configuration from a remote machine into RAM
copies the configuration from a remote machine into NVRAM
copies the configuration currently in RAM to a remote machine
copies the configuration currently in NVRAM to a remote machine
Bottom of Form


Top of Form
22. Refer to the exhibit. A network technician is trying to determine the correct IP address configuration for Host A. What is a valid configuration for Host A?
IP address: 192.168.100.19; Subnet Mask: 255.255.255.248; Default Gateway: 192.16.1.2
IP address: 192.168.100.20; Subnet Mask: 255.255.255.240; Default Gateway: 192.168.100.17
IP address: 192.168.100.21; Subnet Mask: 255.255.255.248; Default Gateway: 192.168.100.18
IP address: 192.168.100.22; Subnet Mask: 255.255.255.240; Default Gateway: 10.1.1.5
IP address: 192.168.100.30; Subnet Mask: 255.255.255.240; Default Gateway: 192.168.1.1
IP address: 192.168.100.31; Subnet Mask: 255.255.255.240; Default Gateway: 192.168.100.18
Bottom of Form
Top of Form
23. Refer to the exhibit. Host A is unable to reach host B on the remote network. A technician attempted to ping the local gateway and the ping was successful. To verify the host configuration, the technician issued the ipconfig command. What is the likely cause of the problem?
The local NIC is incorrectly configured.
The subnet mask on host A is incorrectly configured.
The IP address on host A is incorrectly configured.
The default gateway on host A is incorrectly configured.
Bottom of Form

Top of Form
What command can be used to troubleshoot domain name resolution issues?
get
arp -a
tracert
nslookup
Bottom of Form

25. Refer to the exhibit. The network administrator for a small advertising company has chosen to use the 192.168.5.96/27 network for internal LAN addressing. As shown in the exhibit, a static IP address is assigned to the company web server. However, the web server cannot access the Internet. The administrator verifies that local workstations with IP addresses that are assigned by a DHCP server can access the Internet, and the web server is able to ping local workstations. Which component is incorrectly configured?
subnet maskDNS addresshost IP addressdefault gateway address



Refer to the exhibit. Which Layer 2 protocol could be used inside nework A and network C?
IP
TCP
UDP
Ethernet***


Refer to the exhibit. The serial interface of the router was configured with the use of the commands that are shown. The router cannot ping the router that is directly connected to interface serial 0/0/0. What should the network technician do to solve this problem?
Configure the description at interface serial 0/0/0.
Configure an IP address on interface serial 0/0/0.***
Remove the no shutdown command at interface serial 0/0/0
Reboot the router.


Refer to the exhibit. A PC is connected to a network. Which action will verify that the PC can communicate with its default gateway?
Use the ping 127.0.0.1 command.
Use the ipconfig command.
Use the ipconfig/all command.
Use the ping 10.0.0.254 command.***

Refer to the exhibit. Which list refers only to end devices?
D,E,F,G***
A,H,B,C
A,D,E,F
A,D,E,G

Refer to the exhibit. Host C is able to ping 127.0.0.1 successfully, but is unable to communicate with hosts A and B in the organization. What is the likely cause of the problem?
Hosts A and B are not on the same subnet as host C.
The IP addresses on the router serial interfaces are wrong.
The subnet mask on host C is improperly configured.***
The FastEthernet interface fa0/0 of router 1 is wrongly configured.

To send data through a network, what two flags are used to establish a session? (Choose two.)
ACK
CRC
SYN
Ack #
Port #
Seq #

By using the ipconfig command, a network administrator determines that a workstation has the address 192.168.3.38 with 29 bits set in the subnet mask. To what network does the workstation belong?
192.168.3.8192.168.3.16192.168.3.24192.168.3.32

Which Layer 4 protocol is used to transport voice packets in a VoIP deployment?
UDP

What type of network is maintained if a server takes no dedicated role in the network?
mainframe
client/server
peer-to-peer***
centralized

A network has grown too large for technicians to configure network addresses and hosts files for name resolution. Which two application layer services should be added to the server to allow these needs to be satisfied dynamically? (Choose two.)
DNSFTPDHCPHTTPSMTP

Which router configuration mode would an administrator use to configure the router for SSH or Telnet login access?
line
router
global
interface
privileged EXEC
Refer to the exhibit. What is the total amount of RAM on the router?
131072 KB

In which scenario would a crossover cable be required between Ethernet ports on the devices?
computer to router

What are two purposes for configuring a banner on a router? (Choose two.)
to announce system downtime
to prevent unauthorized access to the router
to provide a description of interface connections
to assist in legal prosecution for unauthorized access
to provide a welcome message to users who access the router

Which basic process is used to select the best path for forwarding data?
Encapsulation

Which three commands will change the current configuration mode of a router? (Choose three.)
router rip ***
line vty 0 4 ***
password class
hostname RouterA
enable secret class
interface fastethernet 0/1 ***

Which subnet mask should be used for a Class B network that is divided into subnets and will accommodate between 800 hosts and 1000 hosts?

255.255.255.0

255.255.254.0

255.255.252.0

255.255.248.0

255.255.240.0

Refer to the exhibit. Host A is configured with the correct IP address for the default gateway of the router R1 FastEthernet0/1 interface. How will a packet that is sent from host A to host B be handled by the devices on the network?
R1 will drop the packet because R1 does not have a specific route in its routing table to the 10.1.1.0/24 network.
R1 will forward the packet to its default gateway, the next hop router R2. R2 will forward the packet to the directly connected network 10.1.1.0/24.
R1 will forward the packet to its default gateway, the next hop router R2. R2 will drop the packet because it does not have a default route to network 10.1.1.0/24.
R1 will forward the packet to its default gateway, the next hop router R2. R2 will drop the packet because it does not have a route that is learned by a routing protocol to network 10.1.1.0/24.

Which statement is true about router hostnames?
A hostname should be unique on each router.
A router hostname cannot contain capital letters.
A router hostname is configured in privileged executive mode.
A router hostname must be created before any other configurations can be added to the device.


A network administrator is asked to design a new addressing scheme for a corporate network. There are 60 users in the main office, 40 users in the branch office, 28 users in manufacturing, 12 in the sales office, and 4 users in the research office. Which VLSM addressing scheme that uses the 192.168.88.0/24 network will fulfill the requirements while wasting the fewest addresses?
192.168.88.0/26 main
192.168.88.32/26 branch
192.168.88.64/26 manufacturing
192.168.88.96/27 sales
192.168.88.128/28 research
192.168.88.0/26 main
192.168.88.64/26 branch
192.168.88.128/27 manufacturing
192.168.88.160/28 sales
192.168.88.176/29 research
192.168.88.0/27 main
192.168.88.32/27 branch
192.168.88.64/28 manufacturing
192.168.88.80/29 sales
192.168.88.88/30 research
192.168.88.0/27 main
192.168.88.64/28 branch
192.168.88.80/28 manufacturing
192.168.88.96/29 sales
192.168.88.104/30 research


Which answer lists the CLI mode hierarchy from least level of privilege to greatest?
user, privileged, global, specific

During the encapsulation process, which identifiers are added at the transport layer?
two applications communicating the data

Which service is used when the nslookup command is issued on a computer?
FTP
DNS
DHCP
Telnet

Which topology represents a collision-free environment?

Answer is Option 3***


A technician wishes to connect two computers to move data from one to the other before reloading the operating system. The NICs on both PCs do not support autosensing feature. Which procedure will satisfy the requirement?
Interconnect the two PCs with a rollover cable.
Interconnect the two PCs with two rollover cables and a hub.
Interconnect the two PCs with a crossover cable.
Interconnest the two PCs with two crossover cables and a hub.

Refer to the exhibit. Host A wants to connect to host B on a different network. Which three IP addresses can be assigned to host A to enable this connectivity? (Choose three.)
172.16.11.36
172.16.11.95
172.16.11.88***
172.16.11.70***
172.16.11.64
172.16.11.67***


Well-known services and applications use which range of TCP/UDP port numbers?
0 to 1023


Refer to the exhibit. What is required on host A for a network technician to create the initial configuration on Router1?
an FTP client
a Telnet client
a terminal emulation program
a web browser

What is true regarding network layer addressing? (Choose three.)
uses a flat structure
prevent broadcasts
hierarchical
uniquely identifies each host
48 bits in length
contains a network portion

Refer to the exhibit. The Wireshark output shows details of frame 456, which was captured after a ping command was issued. Based on the output that is shown, what is the Layer 3 address of the source computer?
10.90.0.237



A PC can not connect to any remote websites, ping its default gateway, or ping a printer that is functioning properly on the local network segment. Which action will verify that the TCP/IP stack is functioning correctly on this PC?
Use the ipconfig /all command at the host’s command prompt.
Use the ping 127.0.0.1 command at the command prompt.
Use the traceroute command at the command prompt to identify any failures on the path to the gateway.
Use FTP to check for connectivity to remote sites.
Download a troubleshooting tool from the PC manufacturer’s website.

What is the correct order for PDU encapsulation?
Option 1

In a packet-switched data network, what is used to reassemble the packets in the correct order at the destination device?
destination address

During the encapsulation process, what identifiers are added at the transport layer?
source and destination port numbers

Which statement is true about the TTL value of an IPv4 packet?
It determines the priority of a packet.
***It specifies the remaining "life" of the packet.
It indicates that the packet has been fragmented.
It denotes the data payload type that the packet is carrying.

Which scenario describes a typical peer-to-peer network environment?
An employee downloads a file that is stored on a departmental file server.
An employee edits and reviews web pages on a web server that is located in the server farm.
A teleworker logs into a core router of the corporate network and makes a configuration change.
A user on one office PC sends output to a printer that is attached to the USB port of another PC in an adjacent office.

Which statement is true about Layer 3 addresses?
They are used in routing decisions

What happens when a node on an Ethernet network is creating a frame and it does not have the destination MAC address?
The node sends out an ARP request with the destination IP address.

An administrator makes changes to the default configuration of a router and saves them to NVRAM. After testing, it is discovered that the configurations did not have the desired effect and must be removed. What steps must be taken to remove the changes and return the router to the default configuration?
Reboot the router.
Use no version of the commands that are issued.
Issue the erase startup-config command, and then reboot the router.
Issue the erase running-config command, and then reboot the router.

What type of cable is being used if a network administrator is connecting two Cisco routers and uses the 100BaseTX standard?
crossover UTP

Which statement identifies the DNS protocol?
It matches a resource name with the required network address

Refer to the exhibit. Assume all devices are using default configurations. How many subnets are required to address the topology that is shown?
1
3
4
5
7

Refer to the exhibit. Which device should be included in the network topology to provide Layer 2 connectivity for all LAN devices, provide multiple collision domains, and also provide a connection to the rest of the network?
server
hub
switch
PC

What action is taken by a host on an Ethernet network when the host attempts to contact a remote host on another network?
The packet is sent using the IP address and MAC address of the default gateway.

Which subnet mask will allow 2040 hosts per subnet on the IP network 10.0.0.0?
255.255.248.0

Which option correctly identifies the interface or interfaces used to connect the router to a CSU/DSU for WAN connectivity?
Option4

7 comments: