ccna 1 final

of 61/61
Page 1 of 61 1. Which of the following are the address ranges of the private IP addresses? (Choose three.) 10.0.0.0 to 10.255.255.255 200.100.50.0 to 200.100.25.255 150.150.0.0 to 150.150.255.255 172.16.0.0 to 172.31.255.255 192.168.0.0 to 192.168.255.255 127.16.0.0 to 127.31.255.255 2 Which memory contents will change as a result of using the Router# erase startup-config command on a router? RAM ROM flash NVRAM 3 Which fiber connector supports full-duplex Ethernet?

Post on 24-Oct-2014

13.813 views

Category:

Documents

3 download

Embed Size (px)

TRANSCRIPT

1. Which of the following are the address ranges of the private IP addresses? (Choose three.) 10.0.0.0 to 10.255.255.255 200.100.50.0 to 200.100.25.255 150.150.0.0 to 150.150.255.255 172.16.0.0 to 172.31.255.255 192.168.0.0 to 192.168.255.255 127.16.0.0 to 127.31.255.255 2 Which memory contents will change as a result of using the Router# erase startup-config command on a router? RAM ROM flash NVRAM Which fiber connector supports full-duplex Ethernet?

3

Page 1 of 61

4

What are the default terminal emulation software settings when configuring a Cisco device through a console port? Bits per second: 19200 Data bits: 7 Parity: None Stop bits: 0 Flow control: None Bits per second: 9600 Data bits: 8 Parity: None Stop bits: 1 Flow control: None Bits per second: 19200 Data bits: 7 Parity: None Stop bits: 0 Flow control: Hardware Bits per second: 9600 Data bits: 8 Parity: None Stop bits: 1 Flow control: Hardware

5

Refer to the exhibit. In a network, PC1 sends a message to PC2. The frame received at PC2 is shown. What information in this frame determines the correct destination application? timing and synchronization bits destination and source physical addressesPage 2 of 61

destination and source logical network addresses destination and source process numbers

6

Which type of network makes independent routing decisions at each router as a packet travels towards the destination? a circuit-switched network a connection-oriented network a packet-switched connectionless network a circuit switched connection-oriented network

7

What type of cable is being used if a network administrator is connecting two Cisco routers and uses the 100BaseTX standard? rollover cable smart serial cable crossover UTP straight-through UTP

8

Which password is automatically encrypted when it is created? vty aux console enable secret enable password

9

Page 3 of 61

Refer to the exhibit. A student has wired each end of a CAT 5e cable as shown. What is the result? (Choose two.) The cable is unusable and must be rewired. The cable is suitable for use as a rollover cable. The cable is suitable for use as a Fast Ethernet crossover. The cable is suitable for use as a Gigabit Ethernet straight-through. The cable is suitable for use between two 100 Mbps Auto-MDIX capable switches. 10 What is the protocol data unit that is associated with the data link layer of the OSI reference model? data frame packet segment 11

Page 4 of 61

Refer to the exhibit. Which list refers only to end devices? D,E,F,G A,H,B,C A,D,E,F A,D,E,G 12

Refer to the exhibit. The serial interface of the router was configured with the use of the commands that are shown. The router cannot ping the router that is directly connected to interface serial 0/0/0. What should the network technician do to solve this problem? Configure the description at interface serial 0/0/0. Configure an IP address on interface serial 0/0/0. Remove the no shutdown command at interface serial 0/0/0 Reboot the router.

13 How many host addresses may be assigned when using the 128.107.0.0 network address with a subnet mask 255.255.248.0? 30Page 5 of 61

256 2046 2048 4094 4096 14

Refer to the exhibit. Host A and B are unable to communicate with each other. What is the reason for this? Host A is assigned a network address. Host B is assigned a multicast address. Host A and host B belong to different networks. The gateway addresses are network addresses.

Page 6 of 61

15

Refer to the exhibit. Host A is unable to reach host B on the remote network. A technician attempted to ping local gateway and the ping was successful. To verify the host configuration, the technician issued the ipconfi command. What is the likely cause of the problem? The local NIC is incorrectly configured. The subnet mask on host A is incorrectly configured. The IP address on host A is incorrectly configured. The default gateway on host A is incorrectly configured. 16 A user sees the command prompt: Router(config-if)# . What task can be performed at this mode? Reload the device. Perform basic tests. Configure individual interfaces. Configure individual terminal lines. 17 Which command can be issued on a PC to determine which TCP/IP ports are in use? tracert netstat nslookupPage 7 of 61

ipconfig /all 18

Refer to the exhibit. The diagram represents the process of sending e-mail between clients. Which list correct identifies the component or protocol used at each numbered stage of the diagram? 1.MUA 2.MDA 3.MTA 4.SMTP 5.MTA 6.POP 7.MDA 8.MUA 1.MUA 2.POP 3.MDA 4.SMTP 5.MTA 6.MDA 7.SMTP 8.MUA 1.MUA 2.POP 3.SMTP 4.MDA 5.MTA 6.SMTP 7.POP 8.MUA 1.MUA 2.SMTP 3.MTA 4.SMTP 5.MTA 6.MDA 7.POP 8.MUA 19 Which type of IP address is 192.168.88.207/28? host address network address multicast address broadcast address 20 What information is used at each hop to determine where the packet will be forwarded next? the IP packet header the incoming interface the transport layer PDU the source MAC address

Page 8 of 61

21 Which topology divides the collision domain and provides full media bandwidth to the hosts in the network?

Page 9 of 61

22

Refer to the exhibit. A PC is connected to a network. Which action will verify that the PC can communicate w its default gateway? Use the ping 127.0.0.1 command. Use the ipconfig command. Use the ipconfig/all command. Use the ping 10.0.0.254 command.

Page 10 of 61

23

Refer to the exhibit. Host A attempts to establish a TCP/IP session with host C. During this attempt, a framePage 11 of 61

captured with the source MAC address 0050.7320.D632 and the destination MAC address 0030.8517.44C4. packet inside the captured frame has an IP source address 192.168.7.5, and the destination IP address is 192.168.219.24. At which point in the network was this packet captured? leaving host A leaving ATL leaving Dallas leaving NYC

24

Refer to the exhibit. A network technician is trying to determine the correct IP address configuration for Hos What is a valid configuration for Host A? IP address: 192.168.100.19; Subnet Mask: 255.255.255.248; Default Gateway: 192.16.1.2 IP address: 192.168.100.20; Subnet Mask: 255.255.255.240; Default Gateway: 192.168.100.17 IP address: 192.168.100.21; Subnet Mask: 255.255.255.248; Default Gateway: 192.168.100.18 IP address: 192.168.100.22; Subnet Mask: 255.255.255.240; Default Gateway: 10.1.1.5 IP address: 192.168.100.30; Subnet Mask: 255.255.255.240; Default Gateway: 192.168.1.1 IP address: 192.168.100.31; Subnet Mask: 255.255.255.240; Default Gateway: 192.168.100.18Page 12 of 61

25

Refer to the exhibit. Host A sends a frame to host C with a destination MAC address CC. The MAC address host C is not in the MAC table of switch SW1. How will SW1 handle the frame? Switch SW1 will drop the frame. Switch SW1 will forward the frame to host C. Switch SW1 will flood the frame out all ports. Switch SW1 will flood the frame out all ports except port Fa0/1. 26 Which statement is true about private IP addresses? Hosts in different organizations should not use the same private space IP addresses.

Any private IP address can be used to test the functionality of the NIC card on the network devices. Private IP addresses should be used for hosts that send traffic on the local network and do not require acc to the Internet. Any private IP address can be automatically assigned to the local host by the operating system in environments where no other IP configuration is available. 27 What is the correct order for PDU encapsulation?

Page 13 of 61

28

Refer to the exhibit. The router of the company failed and was replaced. After the replacement, hosts C and D the Education office are able to ping each other, but they are unable to access the hosts in the Accounts office What is the likely cause of the problem? The IP address at the fa0/0 interface of the router is incorrectly configured. The subnet mask at the fa0/1 interface of the router is incorrectly entered. The IP address at the serial interface of the router is incorrectly configured. The hosts in the Accounts office are not on the same subnet as the hosts in the Education office.

29

Page 14 of 61

Refer to the exhibit. Which two layers of the OSI model describe the same functions as the transport and intenrnet layers of the TCP/IP model? (Choose two.) application layer presentation layer session layer transport layer network layer data link layer physical layer 30 Which type of media is immune to EMI and RFI? (Choose two.) 10 Base-T 10 Base-2 10 Base-5 100 Base-FX 100 Base TX 1000 Base LX Which statement is true about the TTL value of an IPv4 packet? It determines the priority of a packet. It specifies the remaining "life" of the packet. It indicates that the packet has been fragmented.Page 15 of 61

It denotes the data payload type that the packet is carrying. 32 What type of network is maintained if a server takes no dedicated role in the network? mainframe client/server peer-to-peer centralized 33

Refer to the exhibit. At which OSI layer is serial interface 0/0/1 experiencing problems? Layer 1 Layer 2 Layer 3 Layer 4

Page 16 of 61

34 A network administrator subnets the network 192.168.1.0/24 into four subnets. Which option correctly addressses Router1 and host A into the second subnet created?

35 Which device should be used for enabling a host to communicate with another host on a different network? switch hubPage 17 of 61

router host

36 A user types the enable command. What task can be performed at the privileged EXEC mode? Configure the device. Configure individual interfaces. Configure individual terminal lines. Issue show and debug commands. 37 To enhance security in a network, the network administrator uses these commands: Router(config)# line console 0 Router(config-line)# password j1mdi2 Router(config-line)# login What two conclusions are evident from these commands? (Choose two.) Users who attempt to connect to the console port of the router must enter a password. The entries permit access through the console by the use of j1mdi2 as the password. The entries eliminate the need for authentication. Access through the console will be denied because the console configuration is incomplete. The entries prevent passwords from being displayed as plain text. 38 Which option represents a point-to-point logical topology diagram?

Page 18 of 61

39 What purpose does a hostname serve on a router? uniquely identifies a router on the internet used by routing protocols to identify peer routers provides device identification to users logging on remotely determines the hosts that are allowed to connect to the devicePage 19 of 61

40

Refer to the exhibit. The ping 127.0.0.1 command is issued on the local host. What do the ping results indicaaate? The local host can send packets on the local network. The TCP/IP stack on the local host operates properly. The local host has full connectivity to the default gateway. The local host has full connectivity to the remote network.

41

Which statement describes the correct use of addresses to deliver an e-mail message from HostB to the e-maiPage 20 of 61

service that is running on ServerA? HostB uses the MAC address of ServerA as the destination. Router B uses a Layer 3 network address to route the packet. Router A uses the Layer 4 address to forward the packet to Router B. Via the use of a Layer 3 address, ServerA assigns the message to the e-mail service. 42 In which scenario would a crossover cable be required between Ethernet ports on the devices? computer to hub computer to router computer to switch switch to router 43 Which OSI layer does IP rely on to determine whether packets have been lost and to request retransmission? application presentation session transport

44

Page 21 of 61

Refer to the exhibit. A PC is communicating with another PC on a remote network. The two networks are connected by three routers. Which action will help to identify the path between the hosts? Use the ipconfig command at the host. Use the ipconfig/all command at the destination. Use the tracert command at the host. Use the ping command at the destination.

45 Which statement is true about the operations of the IPv4 protocol? IPv4 includes additional fields in the IP header, which are required for reliable delivery of the packet. IPv4 operates independently of the media that carry the data at lower layers of the protocol stack. IPv4 provides error control and tracking for the data delivery, and retransmits the packet if it is corrupted IPv4 is a connection-oriented protocol that requires some control data to be exchanged to establish the connection before data transmission. What three statements are true about network layer addressing? (Choose three.) Network layer addressing uses a hierarchy. It uses addresses that are 48 bits in length. It is used by Ethernet switches to make forwarding decisions. It does not support broadcasts. It uses a method by which the network portion of an address can be identified. Network layer addressing identifies each host distinctly.

Page 22 of 61

47 A network administrator is asked to design a new addressing scheme for a corporate network. There are 60 u in the main office, 40 users in the branch office, 28 users in manufacturing, 12 in the sales office, and 4 users the research office. Which VLSM addressing scheme that uses the 192.168.88.0/24 network will fulfill the requirements while wasting the fewest addresses? 192.168.88.0/26 main 192.168.88.32/26 branch 192.168.88.64/26 manufacturing 192.168.88.96/27 sales 192.168.88.128/28 research 192.168.88.0/26 main 192.168.88.64/26 branch 192.168.88.128/27 manufacturing 192.168.88.160/28 sales 192.168.88.176/29 research 192.168.88.0/27 main 192.168.88.32/27 branch 192.168.88.64/28 manufacturing 192.168.88.80/29 sales 192.168.88.88/30 research 192.168.88.0/27 main 192.168.88.64/28 branch 192.168.88.80/28 manufacturing 192.168.88.96/29 sales 192.168.88.104/30 research

48 Which exhibit shows the interface that is configured by the command, router(config)# interface serial 0/0/1?

Page 23 of 61

49

Page 24 of 61

Refer to the exhibit. Which service is needed in order for the hosts to access the Internet? NAT RIP FTP DHCP 50 When must a router serial interface be configured with the clock rate command? when the interface is functioning as a DTE device when the interface timers have been cleared when the connected DTE device is shut down when the interface is functioning as a DCE device 51

Page 25 of 61

Refer to the exhibit. Which layered network model is shown in the diagram? Cisco IETF OSI TCP/IP

52

Page 26 of 61

Refer to the exhibit. How will data files get retrieved from the server? The client establishes a two-way connection to the server on port 21 for file transfer. From the perspective of computer A, port 21 is used to signal a push to the server, and port 20 is used to signal a pull from the server. There is a connection established to send files from the client to the server and a second connection to ge files from the server to the client. Computer A establishes a connection to the server on port 21 for control and uses a second connection on port 20 to download and upload files.

Refer to the exhibit. A user wants to access the Internet from the PC. A part of the running configuration of t router is shown. Which default gateway IP address should be configured at the PC to enable this access? 10.1.192.1 10.1.192.2Page 27 of 61

10.1.192.54 192.31.7.1 32

Refer to the exhibit. Host A uses router A as its default gateway. If host A sends an ICMP echo request to 172.16.10.0, what ICMP response will host A receive. echo reply source quench route redirection destination unreachable 34 Which topology represents a collision-free environment?

Page 28 of 61

35

Refer to the exhibit. A host is using NAT to connect to the Internet. Which three IP addresses enable this connection? (Choose three.) 10.1.1.63 10.1.1.37 10.1.1.39 10.1.1.32 10.1.1.60 10.1.1.2 36 What action is taken by a host on an Ethernet network when the host attempts to contact a remote host on another network? The packet is sent using the IP and MAC address of the destination host.Page 29 of 61

The packet is sent using the IP address and MAC address of the default gateway.

The packet is sent using the IP address of the destination host and MAC address of the default gateway. The packet is sent using the IP address of the default gateway and the MAC address of the destination ho

37 Which OSI layer uses the header information to reassemble the data segments into streams? application layer network layer presentation layer session layer transport layer 38 Well-known services and applications use which range of TCP/UDP port numbers? 0 to 255 0 to 1023 1024 to 49151 49152 to 65535 39 Which password would allow a user to establish a Telnet session with a Cisco device? VTY password enable password console password enable secret password

40 Which application layer protocol allows administrators to log into a server from remote locations and control server as though logged in locally? DNS FTP DHCP SMTP TelnetPage 30 of 61

41

Refer to the exhibit. Each media link is labeled. What type of cable should be used to connect the different devices? Connection 1 - rollover cable Connection 2 - straight-through cable Connection 3 - crossover cable Connection 1 - crossover cable Connection 2 - rollover cable Connection 3 - crossover cable Connection 1 - straight-through cable Connection 2 - crossover cable Connection 3 - crossover cable Connection 1 - straight-through cable Connection 2 - crossover cable Connection 3 - straight-through cable Connection 1 - crossover cable Connection 2 - straight-through cable Connection 3 - crossover cable 43

Refer to the exhibit. Which type of network design is shown? client/server wide area dedicated server peer-to-peer 44 Which service is used when the nslookup command is issued on a computer?Page 31 of 61

FTP DNS DHCP Telnet 45 Which two functions of the OSI model occur at layer two? (Choose two.) physical addressing encoding routing cabling media access control

46

What information is contained in the header of Layer 3 to help data delivery? port number device physical address destination host logical address virtual connection identifier

49

A network technician has made a UTP cable that is terminated as T568A on one end and T568B on the opposite end. What type of cable has been constructed? patch console crossover straight-through

50 Which OSI layer addressing is required to route packets between two networks? Layer 1 Layer 2 Layer 3 Layer 4 What is the Cisco IOS? system software for Cisco devicesPage 32 of 61

Read Only Memory in Cisco devices non-volatile storage for device configurations an initial operating system that is used for boot functions 17

Refer to the exhibit. Which list refers only to end devices? D,E,F,G A,H,B,C A,D,E,F A,D,E,G 18 Which three IPv4 addresses represent subnet broadcast addresses? (Choose three.) 192.168.4.63 /26 192.168.4.129 /26 192.168.4.191 /26 192.168.4.51 /27 192.168.4.95 /27 192.168.4.221 /27

19 Which TCP/IP model layer creates additional overhead on network resources due to acknowledgments, track and retransmission of data? internetPage 33 of 61

transport application network access 20

Refer to the exhibit. Which option shows the correct topology given the configuration of Router1?

Page 34 of 61

22 Which device should be used for enabling a host to communicate with another host on a different network? switch hub router host 23

Refer to the exhibit. Cable A is plugged into the console port on switch S1. What is required on the PC for a network technician to enter the initial configuration on S1? a terminal emulation program a web browser a Telnet client an FTP client 24

Page 35 of 61

Refer to the exhibit. Host A is transmitting data to host B. Which address combination will be used as the d leaves the Router1 Fa0/1 interface? Destination IP: 192.168.72.2 Source MAC: 0007.C2B4.3421 Destination IP: 192.168.10.4 Source MAC: 0030.8596.DE81 Destination IP: 192.168.10.4 Source MAC: 0007.C2B4.3421 Destination IP: 192.168.72.2 Source MAC: 0030.8596.DE81 26

Refer to the exhibit. An employee wants to access the organization intranet from home. Which intermediary device should be used to connect the organization intranet to the Internet to enable this access? hub switch routerPage 36 of 61

wireless access point 27

Refer to the exhibit. All routers in the network are configured with the correct IP addresses and routing proto Host A sends a packet to host B. Which exhibited steps will be executed on each of the routers in the networkRouters R1 and R2 execute all six steps.

Routers R1 and R2 execute steps 1, 2, 3, 4, and 6. Router R1 executes steps 1,2,3,4, and 6. Router R2 executes all six steps. Router R1 executes all six steps. Router R2 executes steps 1,2,3,4, and 6.

29

Which connection has a logical point-to-point topology but not a physical one? a fiber optic cable that connects two buildings on an enterprise campus a circuit that connects two routers through a service provider network a Category 5 cable that connects a PC to an Ethernet switch a wireless connection between a laptop and an AP

30

Page 37 of 61

Refer to the exhibit. What function does router RT_A need to provide to allow Internet access for hosts in thi network? address translation DHCP services ftpd web server

An organization has been assigned network ID 10.10.128.0 and subnet mask 255.255.224.0. Which IP addres range can be used for this organization? 10.10.128.0 to 10.10.160.255 10.10.128.0 to 10.10.159.255 10.10.128.0 to 10.10.192.255 10.10.128.0 to 10.10.0.159 10.10.128.0 to 10.10.159.0 2

Page 38 of 61

Refer to the exhibit. Host A sends a frame with the destination MAC address as FFFF.FFFF.FFFF. What acti will the switch take for this frame? It will drop the frame. It will send the frame back to host A. It will send the frame to all hosts except host A. It will forward the frame to the default gateway. 3

Refer to the exhibit. Host A is configured with the correct IP address for the default gateway of the router R1 FastEthernet0/1 interface. How will a packet that is sent from host A to host B be handled by the devices on network?Page 39 of 61

R1 will drop the packet because R1 does not have a specific route in its routing table to the 10.1.1.0/24 network. R1 will forward the packet to its default gateway, the next hop router R2. R2 will forward the packet to t directly connected network 10.1.1.0/24. R1 will forward the packet to its default gateway, the next hop router R2. R2 will drop the packet becaus does not have a default route to network 10.1.1.0/24. R1 will forward the packet to its default gateway, the next hop router R2. R2 will drop the packet becaus does not have a route that is learned by a routing protocol to network 10.1.1.0/24. 4

A network technician is tasked with setting up a network for six users, but the users should be able to use the accounts to log on from any of the six computers. What type of network should be used? workgroup P2P applications peer-to-peer network client-server network

5

Refer to the exhibit. Assume all devices are using default configurations. How many subnets are required to address the topology that is shown? 1 3 4 5 7 6

Page 40 of 61

Refer to the exhibit. What three statements are true about the IP configuration that is shown? (Choose three.) The address that is assigned to the computer represents private addressing. The computer is unable to communicate outside of the local network. The network of this computer can have 126 hosts. The prefix of the computer address is /27. The IP address that is assigned to the computer is routable on the Internet. The IP address that is assigned to the computer is a broadcast address. 7 A network has grown too large for technicians to configure network addresses and hosts files for name resolution. Which two application layer services should be added to the server to allow these needs to be satisfied dynamically? (Choose two.) DNS FTP DHCP HTTP SMTP

Page 41 of 61

9

Which physical component is used to access and perform the initial configuration on a new unconfigured rou

10Page 42 of 61

Refer to the exhibit. Host A is able to access resources on the local LAN but is unable to access any resource the Internet. What is the likely cause of this problem? The host subnet mask in incorrect. The network uses private addresses. The host address is a network address. The default gateway is on a different subnet from the host. 11

Page 43 of 61

Refer to the exhibit. Host A is trying to send data to host E. When host A sends out an ARP request, what response should be received? 00-08-a3-d6-ab-17 00-10-7b-e7-fa-ef 00-0d-88-c7-9a-24 Destination Unreachable from RouterA 12 What is the effect of using the Router# copy running-config startup-config command on a router? The contents of ROM will change. The contents of RAM will change. The contents of NVRAM will change. The contents of flash will change. 13

Page 44 of 61

Refer to the exhibit. When host A sends a frame addressed for host D, which hosts will receive the frame? only host D only hosts A and D only hosts B, C, and D all hosts

14 What is the consequence of issuing the erase startup-config command in privileged EXEC mode on a Cisco router? Data stored in RAM will be removed. Data stored in NVRAM will be erased. Information in flash memory will be removed. Flags in the configuration register will be set to 0.Page 45 of 61

Both the startup-config and the running-config will be erased. 15

PC1 cannot reach the file server. A network administrator tests the connectivity using the tracert command o PC1. Based on the provided output, which network segment causes the failure of connectivity? the network between PC1 and switch SW1 the network between SW1 and router R1 the network between routers R1 and R2 the network between router R2 and the file server

17

Page 46 of 61

Refer to the exhibit. Which Layer 2 protocol could be used inside nework A and network C? IP TCP UDP Ethernet

Page 47 of 61

Refer to the exhibit. The tracert command is initiated from PC1 to PC4. Which device will send a response to the initial tracert packet from PC1? Athens Ankara London Paris PC4 5 Two routers are connected via their serial ports in a lab environment. The routers are configured with valid I addresses, but they cannot ping each other. The show interface serial0/0 command shows that the serial0/0 interface is up but the line protocol is down. What could be the cause of this problem? The no shutdown command has not been applied to the interfaces. The clock rate command has not been entered on the DCE interface. The interface timers are not cleared. The FastEthernet interface is emulating a serial interface by assigning it a timing signal. 7

When connectionless protocols are implemented at the lower layers of the OSI model, what is usually used t acknowledge that the data was received and to request the retransmission of missing data? IP UDP Ethernet a connectionless acknowledgement an upper-layer, connection-oriented protocol or service

Page 48 of 61

Refer to the exhibit. Host A is requesting a web page from the web server. Which option represents the socket to which the request is made? 80 www.cisco.com 10.0.0.130 10.0.0.130:80

Page 49 of 61

Refer to the exhibit. Which option correctly identifies the network address, range of host addresses, and the broadcast address for the network that contains host A?

In a network design project, a network designer needs to select a device to provide collision free connections to 40 hosts on the LAN. Which device should be selected?Page 50 of 61

hub router switch firewallA technician is tasked with networking five users. The five users will be in the same broadcast domain and the chance of collisions must be minimized. Which device should be selected to accomplish the design? hub switch router firewall

21 Which option correctly identifies the interface or interfaces used to connect the router to a CSU/DSU for WA connectivity?

Page 51 of 61

Page 52 of 61

22 To send data through a network, what two flags are used to establish a session? (Choose two.) ACK CRC SYN Ack # Port # Seq #

Refer to the exhibit. A host is connected to hub 1. Which combination of IP address, subnet mask, and default gateway can allow this host to function in the network? IP address: 172.16.31.36 Subnet mask: 255.255.255.240 Default gateway: 172.16.31.35 IP address: 172.16.31.63 Subnet mask: 255.255.255.224 Default gateway: 172.16.31.35 IP address: 172.16.31.29 Subnet mask: 255.255.255.248 Default gateway: 172.16.31.35 IP address: 172.16.31.32 Subnet mask: 255.255.255.224 Default gateway: 172.16.31.35 IP address: 172.16.31.29 Subnet mask: 255.255.255.240 Default gateway: 172.16.30.1 Page 53 of 61

IP address: 172.16.31.37 Subnet mask: 255.255.255.224 Default gateway: 172.16.31.35

What happens when a node on an Ethernet network is creating a frame and it does not have the destination MAC address? The node drops the frame. The node sends out a Layer 3 broadcast message. The node sends a message directly to the router for the address. The node sends out an ARP request with the destination IP address.

Refer to the exhibit. A router, the table of which is shown, receives a packet that is destined for 192.168.9.4. How will the router treat the packet? It will drop the packet. It will forward the packet via FastEthernet 0/1 . It will forward the packet to the next hop address. Page 54 of 61

It will forward the packet to 172.16.2.0

Refer to the exhibit. A network administrator remotely accesses the CLI of RouterB from PC1 using Telnet. Which statement is true about this connection? The data is automatically encrypted. A Telnet server process is running on PC1. The connection is made through a VTY session on the router. A GET request was sent to RouterB to retrieve data during this session.

Which option shows how a router will route packets to a remote network?

Page 55 of 61

Which combination of network id and subnet mask correctly identifies all IP addresses from 172.16.128.0 through 172.16.159.255? 172.16.128.0 255.255.255.224 172.16.128.0 255.255.0.0 172.16.128.0 255.255.192.0 172.16.128.0 255.255.224.0 Page 56 of 61

172.16.128.0 255.255.255.192

How can ARP be used to help document the network? It can list each hop on the way to a destination host. It can show the average latency of hosts on the network. It can provide a list of physical addresses on the network. It can indicate which hosts are not responding to network traffic. Which prompt represents the appropriate mode used for the copy running-config startupconfig command ? Switch-6J> Switch-6J# Switch-6J(config)# Switch-6J(config-if)# Switch-6J(config-line)# Which application belongs to the category of the client/server model? using Telnet to access a router exchanging information via instant messaging printing a document to a locally connected printer scanning a document with a directly connected scanner What information can be gathered by using the command netstat? the default gateway the routing protocol active TCP connections the locally configured subnet mask

Page 57 of 61

Refer to the exhibit. When computer A sends a frame to computer D, what computers receive the frame? only computer D only computer A and computer D only computer B, computer C, and computer D all computersWhich two types of media can provide bandwidth up to 1 Gb/s? (Choose two.) 10 BASE-T 100 BASE-T 100 BASE-FX 1000 BASE-TX 1000 BASE-SX

Page 58 of 61

Refer to the exhibit. RouterB is configured properly. The Ethernet interface Fa0/0 of RouterA is configured with the use of the commands that are shown. However, a ping from the Fa0/0 interface of RouterA to the Fa0/0 interface of RouterB is unsuccessful. What action should be taken on RouterA to solve this problem? Use the description command on the FastEthernet interface Fa0/0. Configure the clock rate of the FastEthernet interface Fa0/0. Use the no shutdown command on the FastEthernet interface Fa0/0. Reboot the router. 44

What happens when a host station receives a frame that contains its own MAC address in the destination fie The Layer 2 information is removed and the frame is pushed up to Layer 3. The host station will copy the information to its buffers and send it back out. The frame originated from the host and will be ignored. The Layer 3 information is added to the frame.

Refer to the exhibit. Host A sends data to host B. Which destination MAC and IP addresses will be encapsulated in the frames when they leave host A?Page 59 of 61

172.16.5.3 2b-53-72-00-1a-2b 172.16.5.3 00-1c-00-5b-3c-2a 192.168.3.1 2b-53-72-00-1a-2b 192.168.3.1 00-1c-00-5b-3c-2a What two processes are specified by the transport layer? (Choose two.) signaling routing encryption segmentation windowingIf the first octet of an IP address begins with binary 101, what class is the address? Class A Class B Class C Class D

Refer to the exhibit. A user on PC1 wants to access a web server on the Internet. An ARP request has been initiated from PC1. Which MAC address will be encapsulated as a destination address in the header of the Ethernet frame when the web request packet is sent out? the MAC address of Fa0/10 interface on SW1Page 60 of 61

the MAC address of Fa0/0 interface on R1 the MAC address of Fa0/1 interface on R2 the MAC address of the web serverWhich statement is true about the CSMA/CD access method that is used in Ethernet? When a device hears a carrier signal and transmits, a collision cannot occur. A jamming signal causes only devices that caused the collision to execute a backoff algorithm. All network devices must listen before transmitting. Devices involved in a collision get priority to transmit after the backoff period.

Page 61 of 61