ccna 1 final
TRANSCRIPT
Page 1 of 61
1. Which of the following are the address ranges of the private IP addresses? (Choose three.)
10.0.0.0 to 10.255.255.255
200.100.50.0 to 200.100.25.255
150.150.0.0 to 150.150.255.255
172.16.0.0 to 172.31.255.255
192.168.0.0 to 192.168.255.255
127.16.0.0 to 127.31.255.255
2 Which memory contents will change as a result of using the Router# erase startup-config command on a
router?
RAM
ROM
flash
NVRAM
3 Which fiber connector supports full-duplex Ethernet?
Page 2 of 61
4 What are the default terminal emulation software settings when configuring a Cisco device through a console
port?
Bits per second: 19200
Data bits: 7
Parity: None
Stop bits: 0
Flow control: None
Bits per second: 9600
Data bits: 8
Parity: None
Stop bits: 1
Flow control: None
Bits per second: 19200
Data bits: 7
Parity: None
Stop bits: 0
Flow control: Hardware
Bits per second: 9600
Data bits: 8
Parity: None
Stop bits: 1
Flow control: Hardware
5
Refer to the exhibit. In a network, PC1 sends a message to PC2. The frame received at PC2 is shown. What
information in this frame determines the correct destination application?
timing and synchronization bits
destination and source physical addresses
Page 3 of 61
destination and source logical network addresses
destination and source process numbers
6 Which type of network makes independent routing decisions at each router as a packet travels towards the
destination?
a circuit-switched network
a connection-oriented network
a packet-switched connectionless network
a circuit switched connection-oriented network
7 What type of cable is being used if a network administrator is connecting two Cisco routers and uses the
100BaseTX standard?
rollover cable
smart serial cable
crossover UTP
straight-through UTP
8 Which password is automatically encrypted when it is created?
vty
aux
console
enable secret
enable password
9
Page 4 of 61
Refer to the exhibit. A student has wired each end of a CAT 5e cable as shown. What is the result? (Choose
two.)
The cable is unusable and must be rewired.
The cable is suitable for use as a rollover cable.
The cable is suitable for use as a Fast Ethernet crossover.
The cable is suitable for use as a Gigabit Ethernet straight-through.
The cable is suitable for use between two 100 Mbps Auto-MDIX capable switches.
10 What is the protocol data unit that is associated with the data link layer of the OSI reference model?
data
frame
packet
segment
11
Page 5 of 61
Refer to the exhibit. Which list refers only to end devices?
D,E,F,G
A,H,B,C
A,D,E,F
A,D,E,G
12
Refer to the exhibit. The serial interface of the router was configured with the use of the commands that are
shown. The router cannot ping the router that is directly connected to interface serial 0/0/0. What should the
network technician do to solve this problem?
Configure the description at interface serial 0/0/0.
Configure an IP address on interface serial 0/0/0.
Remove the no shutdown command at interface serial 0/0/0
Reboot the router.
13 How many host addresses may be assigned when using the 128.107.0.0 network address with a subnet mask of
255.255.248.0?
30
Page 6 of 61
256
2046
2048
4094
4096
14
Refer to the exhibit. Host A and B are unable to communicate with each other. What is the reason for this?
Host A is assigned a network address.
Host B is assigned a multicast address.
Host A and host B belong to different networks.
The gateway addresses are network addresses.
Page 7 of 61
15
Refer to the exhibit. Host A is unable to reach host B on the remote network. A technician attempted to ping the
local gateway and the ping was successful. To verify the host configuration, the technician issued the ipconfig
command. What is the likely cause of the problem?
The local NIC is incorrectly configured.
The subnet mask on host A is incorrectly configured.
The IP address on host A is incorrectly configured.
The default gateway on host A is incorrectly configured.
16 A user sees the command prompt: Router(config-if)# . What task can be performed at this mode?
Reload the device.
Perform basic tests.
Configure individual interfaces.
Configure individual terminal lines.
17 Which command can be issued on a PC to determine which TCP/IP ports are in use?
tracert
netstat
nslookup
Page 8 of 61
ipconfig /all
18
Refer to the exhibit. The diagram represents the process of sending e-mail between clients. Which list correctly
identifies the component or protocol used at each numbered stage of the diagram?
1.MUA 2.MDA 3.MTA 4.SMTP 5.MTA 6.POP 7.MDA 8.MUA
1.MUA 2.POP 3.MDA 4.SMTP 5.MTA 6.MDA 7.SMTP 8.MUA
1.MUA 2.POP 3.SMTP 4.MDA 5.MTA 6.SMTP 7.POP 8.MUA
1.MUA 2.SMTP 3.MTA 4.SMTP 5.MTA 6.MDA 7.POP 8.MUA
19 Which type of IP address is 192.168.88.207/28?
host address
network address
multicast address
broadcast address
20 What information is used at each hop to determine where the packet will be forwarded next?
the IP packet header
the incoming interface
the transport layer PDU
the source MAC address
Page 9 of 61
21 Which topology divides the collision domain and provides full media bandwidth to the hosts in the network?
Page 10 of 61
22
Refer to the exhibit. A PC is connected to a network. Which action will verify that the PC can communicate with
its default gateway?
Use the ping 127.0.0.1 command.
Use the ipconfig command.
Use the ipconfig/all command.
Use the ping 10.0.0.254 command.
Page 11 of 61
23
Refer to the exhibit. Host A attempts to establish a TCP/IP session with host C. During this attempt, a frame was
Page 12 of 61
captured with the source MAC address 0050.7320.D632 and the destination MAC address 0030.8517.44C4. The
packet inside the captured frame has an IP source address 192.168.7.5, and the destination IP address is
192.168.219.24. At which point in the network was this packet captured?
leaving host A
leaving ATL
leaving Dallas
leaving NYC
24
Refer to the exhibit. A network technician is trying to determine the correct IP address configuration for Host A.
What is a valid configuration for Host A?
IP address: 192.168.100.19; Subnet Mask: 255.255.255.248; Default Gateway: 192.16.1.2
IP address: 192.168.100.20; Subnet Mask: 255.255.255.240; Default Gateway: 192.168.100.17
IP address: 192.168.100.21; Subnet Mask: 255.255.255.248; Default Gateway: 192.168.100.18
IP address: 192.168.100.22; Subnet Mask: 255.255.255.240; Default Gateway: 10.1.1.5
IP address: 192.168.100.30; Subnet Mask: 255.255.255.240; Default Gateway: 192.168.1.1
IP address: 192.168.100.31; Subnet Mask: 255.255.255.240; Default Gateway: 192.168.100.18
Page 13 of 61
25
Refer to the exhibit. Host A sends a frame to host C with a destination MAC address CC. The MAC address for
host C is not in the MAC table of switch SW1. How will SW1 handle the frame?
Switch SW1 will drop the frame.
Switch SW1 will forward the frame to host C.
Switch SW1 will flood the frame out all ports.
Switch SW1 will flood the frame out all ports except port Fa0/1.
26 Which statement is true about private IP addresses?
Hosts in different organizations should not use the same private space IP addresses.
Any private IP address can be used to test the functionality of the NIC card on the network devices.
Private IP addresses should be used for hosts that send traffic on the local network and do not require access
to the Internet.
Any private IP address can be automatically assigned to the local host by the operating system in
environments where no other IP configuration is available.
27 What is the correct order for PDU encapsulation?
Page 14 of 61
28
Refer to the exhibit. The router of the company failed and was replaced. After the replacement, hosts C and D in
the Education office are able to ping each other, but they are unable to access the hosts in the Accounts office.
What is the likely cause of the problem?
The IP address at the fa0/0 interface of the router is incorrectly configured.
The subnet mask at the fa0/1 interface of the router is incorrectly entered.
The IP address at the serial interface of the router is incorrectly configured.
The hosts in the Accounts office are not on the same subnet as the hosts in the Education office.
29
Page 15 of 61
Refer to the exhibit. Which two layers of the OSI model describe the same functions as the transport and
intenrnet layers of the TCP/IP model? (Choose two.)
application layer
presentation layer
session layer
transport layer
network layer
data link layer
physical layer
30 Which type of media is immune to EMI and RFI? (Choose two.)
10 Base-T
10 Base-2
10 Base-5
100 Base-FX
100 Base TX
1000 Base LX
Which statement is true about the TTL value of an IPv4 packet?
It determines the priority of a packet.
It specifies the remaining "life" of the packet.
It indicates that the packet has been fragmented.
Page 16 of 61
It denotes the data payload type that the packet is carrying.
32 What type of network is maintained if a server takes no dedicated role in the network?
mainframe
client/server
peer-to-peer
centralized
33
Refer to the exhibit. At which OSI layer is serial interface 0/0/1 experiencing problems?
Layer 1
Layer 2
Layer 3
Layer 4
Page 17 of 61
34 A network administrator subnets the network 192.168.1.0/24 into four subnets. Which option correctly
addressses Router1 and host A into the second subnet created?
35 Which device should be used for enabling a host to communicate with another host on a different network?
switch
hub
Page 18 of 61
router
host
36 A user types the enable command. What task can be performed at the privileged EXEC mode?
Configure the device.
Configure individual interfaces.
Configure individual terminal lines.
Issue show and debug commands.
37 To enhance security in a network, the network administrator uses these commands:
Router(config)# line console 0
Router(config-line)# password j1mdi2
Router(config-line)# login
What two conclusions are evident from these commands? (Choose two.)
Users who attempt to connect to the console port of the router must enter a password.
The entries permit access through the console by the use of j1mdi2 as the password.
The entries eliminate the need for authentication.
Access through the console will be denied because the console configuration is incomplete.
The entries prevent passwords from being displayed as plain text.
38 Which option represents a point-to-point logical topology diagram?
Page 19 of 61
39 What purpose does a hostname serve on a router?
uniquely identifies a router on the internet
used by routing protocols to identify peer routers
provides device identification to users logging on remotely
determines the hosts that are allowed to connect to the device
Page 20 of 61
40
Refer to the exhibit. The ping 127.0.0.1 command is issued on the local host. What do the ping results
indicaaate?
The local host can send packets on the local network.
The TCP/IP stack on the local host operates properly.
The local host has full connectivity to the default gateway.
The local host has full connectivity to the remote network.
41
Which statement describes the correct use of addresses to deliver an e-mail message from HostB to the e-mail
Page 21 of 61
service that is running on ServerA?
HostB uses the MAC address of ServerA as the destination.
Router B uses a Layer 3 network address to route the packet.
Router A uses the Layer 4 address to forward the packet to Router B.
Via the use of a Layer 3 address, ServerA assigns the message to the e-mail service.
42 In which scenario would a crossover cable be required between Ethernet ports on the devices?
computer to hub
computer to router
computer to switch
switch to router
43 Which OSI layer does IP rely on to determine whether packets have been lost and to request retransmission?
application
presentation
session
transport
44
Page 22 of 61
Refer to the exhibit. A PC is communicating with another PC on a remote network. The two networks are
connected by three routers. Which action will help to identify the path between the hosts?
Use the ipconfig command at the host.
Use the ipconfig/all command at the destination.
Use the tracert command at the host.
Use the ping command at the destination.
45 Which statement is true about the operations of the IPv4 protocol?
IPv4 includes additional fields in the IP header, which are required for reliable delivery of the packet.
IPv4 operates independently of the media that carry the data at lower layers of the protocol stack.
IPv4 provides error control and tracking for the data delivery, and retransmits the packet if it is corrupted.
IPv4 is a connection-oriented protocol that requires some control data to be exchanged to establish the
connection before data transmission.
What three statements are true about network layer addressing? (Choose three.)
Network layer addressing uses a hierarchy.
It uses addresses that are 48 bits in length.
It is used by Ethernet switches to make forwarding decisions.
It does not support broadcasts.
It uses a method by which the network portion of an address can be identified.
Network layer addressing identifies each host distinctly.
Page 23 of 61
47 A network administrator is asked to design a new addressing scheme for a corporate network. There are 60 users
in the main office, 40 users in the branch office, 28 users in manufacturing, 12 in the sales office, and 4 users in
the research office. Which VLSM addressing scheme that uses the 192.168.88.0/24 network will fulfill the
requirements while wasting the fewest addresses?
192.168.88.0/26 main
192.168.88.32/26 branch
192.168.88.64/26 manufacturing
192.168.88.96/27 sales
192.168.88.128/28 research
192.168.88.0/26 main
192.168.88.64/26 branch
192.168.88.128/27 manufacturing
192.168.88.160/28 sales
192.168.88.176/29 research
192.168.88.0/27 main
192.168.88.32/27 branch
192.168.88.64/28 manufacturing
192.168.88.80/29 sales
192.168.88.88/30 research
192.168.88.0/27 main
192.168.88.64/28 branch
192.168.88.80/28 manufacturing
192.168.88.96/29 sales
192.168.88.104/30 research
48 Which exhibit shows the interface that is configured by the command, router(config)# interface serial 0/0/1?
Page 25 of 61
Refer to the exhibit. Which service is needed in order for the hosts to access the Internet?
NAT
RIP
FTP
DHCP
50 When must a router serial interface be configured with the clock rate command?
when the interface is functioning as a DTE device
when the interface timers have been cleared
when the connected DTE device is shut down
when the interface is functioning as a DCE device
51
Page 26 of 61
Refer to the exhibit. Which layered network model is shown in the diagram?
Cisco
IETF
OSI
TCP/IP
52
Page 27 of 61
Refer to the exhibit. How will data files get retrieved from the server?
The client establishes a two-way connection to the server on port 21 for file transfer.
From the perspective of computer A, port 21 is used to signal a push to the server, and port 20 is used to
signal a pull from the server.
There is a connection established to send files from the client to the server and a second connection to get
files from the server to the client.
Computer A establishes a connection to the server on port 21 for control and uses a second connection on
port 20 to download and upload files.
Refer to the exhibit. A user wants to access the Internet from the PC. A part of the running configuration of the
router is shown. Which default gateway IP address should be configured at the PC to enable this access?
10.1.192.1
10.1.192.2
Page 28 of 61
10.1.192.54
192.31.7.1
32
Refer to the exhibit. Host A uses router A as its default gateway. If host A sends an ICMP echo request to
172.16.10.0, what ICMP response will host A receive.
echo reply
source quench
route redirection
destination unreachable
34 Which topology represents a collision-free environment?
Page 29 of 61
35
Refer to the exhibit. A host is using NAT to connect to the Internet. Which three IP addresses enable this
connection? (Choose three.)
10.1.1.63
10.1.1.37
10.1.1.39
10.1.1.32
10.1.1.60
10.1.1.2
36 What action is taken by a host on an Ethernet network when the host attempts to contact a remote host on
another network?
The packet is sent using the IP and MAC address of the destination host.
Page 30 of 61
The packet is sent using the IP address and MAC address of the default gateway.
The packet is sent using the IP address of the destination host and MAC address of the default gateway.
The packet is sent using the IP address of the default gateway and the MAC address of the destination host.
37 Which OSI layer uses the header information to reassemble the data segments into streams?
application layer
network layer
presentation layer
session layer
transport layer
38 Well-known services and applications use which range of TCP/UDP port numbers?
0 to 255
0 to 1023
1024 to 49151
49152 to 65535
39 Which password would allow a user to establish a Telnet session with a Cisco device?
VTY password
enable password
console password
enable secret password
40 Which application layer protocol allows administrators to log into a server from remote locations and control a
server as though logged in locally?
DNS
FTP
DHCP
SMTP
Telnet
Page 31 of 61
41
Refer to the exhibit. Each media link is labeled. What type of cable should be used to connect the different
devices?
Connection 1 - rollover cable
Connection 2 - straight-through cable
Connection 3 - crossover cable
Connection 1 - crossover cable
Connection 2 - rollover cable
Connection 3 - crossover cable
Connection 1 - straight-through cable
Connection 2 - crossover cable
Connection 3 - crossover cable
Connection 1 - straight-through cable
Connection 2 - crossover cable
Connection 3 - straight-through cable
Connection 1 - crossover cable
Connection 2 - straight-through cable
Connection 3 - crossover cable
43
Refer to the exhibit. Which type of network design is shown?
client/server
wide area
dedicated server
peer-to-peer
44 Which service is used when the nslookup command is issued on a computer?
Page 32 of 61
FTP
DNS
DHCP
Telnet
45 Which two functions of the OSI model occur at layer two? (Choose two.)
physical addressing
encoding
routing
cabling
media access control
46 What information is contained in the header of Layer 3 to help data delivery?
port number
device physical address
destination host logical address
virtual connection identifier
49 A network technician has made a UTP cable that is terminated as T568A on one end and T568B on the
opposite end. What type of cable has been constructed?
patch
console
crossover
straight-through
50 Which OSI layer addressing is required to route packets between two networks?
Layer 1
Layer 2
Layer 3
Layer 4
What is the Cisco IOS?
system software for Cisco devices
Page 33 of 61
Read Only Memory in Cisco devices
non-volatile storage for device configurations
an initial operating system that is used for boot functions
17
Refer to the exhibit. Which list refers only to end devices?
D,E,F,G
A,H,B,C
A,D,E,F
A,D,E,G
18 Which three IPv4 addresses represent subnet broadcast addresses? (Choose three.)
192.168.4.63 /26
192.168.4.129 /26
192.168.4.191 /26
192.168.4.51 /27
192.168.4.95 /27
192.168.4.221 /27
19 Which TCP/IP model layer creates additional overhead on network resources due to acknowledgments, tracking,
and retransmission of data?
internet
Page 34 of 61
transport
application
network access
20
Refer to the exhibit. Which option shows the correct topology given the configuration of Router1?
Page 35 of 61
22 Which device should be used for enabling a host to communicate with another host on a different network?
switch
hub
router
host
23
Refer to the exhibit. Cable A is plugged into the console port on switch S1. What is required on the PC for a
network technician to enter the initial configuration on S1?
a terminal emulation program
a web browser
a Telnet client
an FTP client
24
Page 36 of 61
Refer to the exhibit. Host A is transmitting data to host B. Which address combination will be used as the data
leaves the Router1 Fa0/1 interface?
Destination IP: 192.168.72.2 Source MAC: 0007.C2B4.3421
Destination IP: 192.168.10.4 Source MAC: 0030.8596.DE81
Destination IP: 192.168.10.4 Source MAC: 0007.C2B4.3421
Destination IP: 192.168.72.2 Source MAC: 0030.8596.DE81
26
Refer to the exhibit. An employee wants to access the organization intranet from home. Which intermediary
device should be used to connect the organization intranet to the Internet to enable this access?
hub
switch
router
Page 37 of 61
wireless access point
27
Refer to the exhibit. All routers in the network are configured with the correct IP addresses and routing protocol.
Host A sends a packet to host B. Which exhibited steps will be executed on each of the routers in the network?
Routers R1 and R2 execute all six steps.
Routers R1 and R2 execute steps 1, 2, 3, 4, and 6.
Router R1 executes steps 1,2,3,4, and 6. Router R2 executes all six steps.
Router R1 executes all six steps. Router R2 executes steps 1,2,3,4, and 6.
29 Which connection has a logical point-to-point topology but not a physical one?
a fiber optic cable that connects two buildings on an enterprise campus
a circuit that connects two routers through a service provider network
a Category 5 cable that connects a PC to an Ethernet switch
a wireless connection between a laptop and an AP
30
Page 38 of 61
Refer to the exhibit. What function does router RT_A need to provide to allow Internet access for hosts in this
network?
address translation
DHCP services
ftpd
web server
An organization has been assigned network ID 10.10.128.0 and subnet mask 255.255.224.0. Which IP address
range can be used for this organization?
10.10.128.0 to 10.10.160.255
10.10.128.0 to 10.10.159.255
10.10.128.0 to 10.10.192.255
10.10.128.0 to 10.10.0.159
10.10.128.0 to 10.10.159.0
2
Page 39 of 61
Refer to the exhibit. Host A sends a frame with the destination MAC address as FFFF.FFFF.FFFF. What action
will the switch take for this frame?
It will drop the frame.
It will send the frame back to host A.
It will send the frame to all hosts except host A.
It will forward the frame to the default gateway.
3
Refer to the exhibit. Host A is configured with the correct IP address for the default gateway of the router R11
FastEthernet0/1 interface. How will a packet that is sent from host A to host B be handled by the devices on the
network?
Page 40 of 61
R1 will drop the packet because R1 does not have a specific route in its routing table to the 10.1.1.0/24
network.
R1 will forward the packet to its default gateway, the next hop router R2. R2 will forward the packet to the
directly connected network 10.1.1.0/24.
R1 will forward the packet to its default gateway, the next hop router R2. R2 will drop the packet because it
does not have a default route to network 10.1.1.0/24.
R1 will forward the packet to its default gateway, the next hop router R2. R2 will drop the packet because it
does not have a route that is learned by a routing protocol to network 10.1.1.0/24.
4 A network technician is tasked with setting up a network for six users, but the users should be able to use their
accounts to log on from any of the six computers. What type of network should be used?
workgroup
P2P applications
peer-to-peer network
client-server network
5
Refer to the exhibit. Assume all devices are using default configurations. How many subnets are required to
address the topology that is shown?
1
3
4
5
7
6
Page 41 of 61
Refer to the exhibit. What three statements are true about the IP configuration that is shown? (Choose three.)
The address that is assigned to the computer represents private addressing.
The computer is unable to communicate outside of the local network.
The network of this computer can have 126 hosts.
The prefix of the computer address is /27.
The IP address that is assigned to the computer is routable on the Internet.
The IP address that is assigned to the computer is a broadcast address.
7 A network has grown too large for technicians to configure network addresses and hosts files for name
resolution. Which two application layer services should be added to the server to allow these needs to be
satisfied dynamically? (Choose two.)
DNS
FTP
DHCP
HTTP
SMTP
Page 42 of 61
9 Which physical component is used to access and perform the initial configuration on a new unconfigured router?
10
Page 43 of 61
Refer to the exhibit. Host A is able to access resources on the local LAN but is unable to access any resources on
the Internet. What is the likely cause of this problem?
The host subnet mask in incorrect.
The network uses private addresses.
The host address is a network address.
The default gateway is on a different subnet from the host.
11
Page 44 of 61
Refer to the exhibit. Host A is trying to send data to host E. When host A sends out an ARP request, what
response should be received?
00-08-a3-d6-ab-17
00-10-7b-e7-fa-ef
00-0d-88-c7-9a-24
Destination Unreachable from RouterA
12 What is the effect of using the Router# copy running-config startup-config command on a router?
The contents of ROM will change.
The contents of RAM will change.
The contents of NVRAM will change.
The contents of flash will change.
13
Page 45 of 61
Refer to the exhibit. When host A sends a frame addressed for host D, which hosts will receive the frame?
only host D
only hosts A and D
only hosts B, C, and D
all hosts
14 What is the consequence of issuing the erase startup-config command in privileged EXEC mode on a Cisco
router?
Data stored in RAM will be removed.
Data stored in NVRAM will be erased.
Information in flash memory will be removed.
Flags in the configuration register will be set to 0.
Page 46 of 61
Both the startup-config and the running-config will be erased.
15
PC1 cannot reach the file server. A network administrator tests the connectivity using the tracert command on
PC1. Based on the provided output, which network segment causes the failure of connectivity?
the network between PC1 and switch SW1
the network between SW1 and router R1
the network between routers R1 and R2
the network between router R2 and the file server
17
Page 47 of 61
Refer to the exhibit. Which Layer 2 protocol could be used inside nework A and network C?
IP
TCP
UDP
Ethernet
Page 48 of 61
Refer to the exhibit. The tracert command is initiated from PC1 to PC4. Which device will send
a response to the initial tracert packet from PC1?
Athens
Ankara
London
Paris
PC4
5 Two routers are connected via their serial ports in a lab environment. The routers are configured with valid IP
addresses, but they cannot ping each other. The show interface serial0/0 command shows that the serial0/0
interface is up but the line protocol is down. What could be the cause of this problem?
The no shutdown command has not been applied to the interfaces.
The clock rate command has not been entered on the DCE interface.
The interface timers are not cleared.
The FastEthernet interface is emulating a serial interface by assigning it a timing signal.
7 When connectionless protocols are implemented at the lower layers of the OSI model, what is usually used to
acknowledge that the data was received and to request the retransmission of missing data?
IP
UDP
Ethernet
a connectionless acknowledgement
an upper-layer, connection-oriented protocol or service
Page 49 of 61
Refer to the exhibit. Host A is requesting a web page from the web server. Which option represents the
socket to which the request is made?
80
www.cisco.com
10.0.0.130
10.0.0.130:80
Page 50 of 61
Refer to the exhibit. Which option correctly identifies the network address, range of host
addresses, and the broadcast address for the network that contains host A?
In a network design project, a network designer needs to select a device to provide collision free
connections to 40 hosts on the LAN. Which device should be selected?
Page 51 of 61
hub
router
switch
firewall
A technician is tasked with networking five users. The five users will be in the same broadcast domain
and the chance of collisions must be minimized. Which device should be selected to accomplish the
design?
hub
switch
router
firewall
21 Which option correctly identifies the interface or interfaces used to connect the router to a CSU/DSU for WAN
connectivity?
Page 52 of 61
Page 53 of 61
22 To send data through a network, what two flags are used to establish a session? (Choose two.)
ACK
CRC
SYN
Ack #
Port #
Seq #
Refer to the exhibit. A host is connected to hub 1. Which combination of IP address, subnet mask, and
default gateway can allow this host to function in the network?
IP address: 172.16.31.36 Subnet mask: 255.255.255.240 Default gateway: 172.16.31.35
IP address: 172.16.31.63 Subnet mask: 255.255.255.224 Default gateway: 172.16.31.35
IP address: 172.16.31.29 Subnet mask: 255.255.255.248 Default gateway: 172.16.31.35
IP address: 172.16.31.32 Subnet mask: 255.255.255.224 Default gateway: 172.16.31.35
IP address: 172.16.31.29 Subnet mask: 255.255.255.240 Default gateway: 172.16.30.1
Page 54 of 61
IP address: 172.16.31.37 Subnet mask: 255.255.255.224 Default gateway: 172.16.31.35
What happens when a node on an Ethernet network is creating a frame and it does not have the
destination MAC address?
The node drops the frame.
The node sends out a Layer 3 broadcast message.
The node sends a message directly to the router for the address.
The node sends out an ARP request with the destination IP address.
Refer to the exhibit. A router, the table of which is shown, receives a packet that is destined for
192.168.9.4. How will the router treat the packet?
It will drop the packet.
It will forward the packet via FastEthernet 0/1
. It will forward the packet to the next hop address.
Page 55 of 61
It will forward the packet to 172.16.2.0
Refer to the exhibit. A network administrator remotely accesses the CLI of RouterB from PC1 using
Telnet. Which statement is true about this connection?
The data is automatically encrypted.
A Telnet server process is running on PC1.
The connection is made through a VTY session on the router.
A GET request was sent to RouterB to retrieve data during this session.
Which option shows how a router will route packets to a remote network?
Page 56 of 61
Which combination of network id and subnet mask correctly identifies all IP addresses from
172.16.128.0 through 172.16.159.255?
172.16.128.0 255.255.255.224
172.16.128.0 255.255.0.0
172.16.128.0 255.255.192.0
172.16.128.0 255.255.224.0
Page 57 of 61
172.16.128.0 255.255.255.192
How can ARP be used to help document the network?
It can list each hop on the way to a destination host.
It can show the average latency of hosts on the network.
It can provide a list of physical addresses on the network.
It can indicate which hosts are not responding to network traffic.
Which prompt represents the appropriate mode used for the copy running-config startup-
config command ?
Switch-6J>
Switch-6J#
Switch-6J(config)#
Switch-6J(config-if)#
Switch-6J(config-line)#
Which application belongs to the category of the client/server model?
using Telnet to access a router
exchanging information via instant messaging
printing a document to a locally connected printer
scanning a document with a directly connected scanner
What information can be gathered by using the command netstat?
the default gateway
the routing protocol
active TCP connections
the locally configured subnet mask
Page 58 of 61
Refer to the exhibit. When computer A sends a frame to computer D, what computers receive the
frame?
only computer D
only computer A and computer D
only computer B, computer C, and computer D
all computers
Which two types of media can provide bandwidth up to 1 Gb/s? (Choose two.)
10 BASE-T
100 BASE-T
100 BASE-FX
1000 BASE-TX
1000 BASE-SX
Page 59 of 61
Refer to the exhibit. RouterB is configured properly. The Ethernet interface Fa0/0 of RouterA is configured
with the use of the commands that are shown. However, a ping from the Fa0/0 interface of RouterA to the
Fa0/0 interface of RouterB is unsuccessful. What action should be taken on RouterA to solve this problem?
Use the description command on the FastEthernet interface Fa0/0.
Configure the clock rate of the FastEthernet interface Fa0/0.
Use the no shutdown command on the FastEthernet interface Fa0/0.
Reboot the router.
44 What happens when a host station receives a frame that contains its own MAC address in the destination field?
The Layer 2 information is removed and the frame is pushed up to Layer 3.
The host station will copy the information to its buffers and send it back out.
The frame originated from the host and will be ignored.
The Layer 3 information is added to the frame.
Refer to the exhibit. Host A sends data to host B. Which destination MAC and IP addresses will
be encapsulated in the frames when they leave host A?
Page 60 of 61
172.16.5.3
2b-53-72-00-1a-2b
172.16.5.3
00-1c-00-5b-3c-2a
192.168.3.1
2b-53-72-00-1a-2b
192.168.3.1
00-1c-00-5b-3c-2a
What two processes are specified by the transport layer? (Choose two.)
signaling
routing
encryption
segmentation
windowing
If the first octet of an IP address begins with binary 101, what class is the address?
Class A
Class B
Class C
Class D
Refer to the exhibit. A user on PC1 wants to access a web server on the Internet. An ARP request
has been initiated from PC1. Which MAC address will be encapsulated as a destination address
in the header of the Ethernet frame when the web request packet is sent out?
the MAC address of Fa0/10 interface on SW1
Page 61 of 61
the MAC address of Fa0/0 interface on R1
the MAC address of Fa0/1 interface on R2
the MAC address of the web server
Which statement is true about the CSMA/CD access method that is used in Ethernet?
When a device hears a carrier signal and transmits, a collision cannot occur.
A jamming signal causes only devices that caused the collision to execute a backoff algorithm.
All network devices must listen before transmitting.
Devices involved in a collision get priority to transmit after the backoff period.