ccna 2_practice final exam

13
CCNA 2 – Practice Final Exam 1 Which protocol defines the types of messages that a client uses to request a web page and the messages a server uses to respond to those requests? FTP TCP HTTP HTML 2 Refer to the exhibit. Router R1 has been configured with the commands that are displayed. Which fact can be determined from the configuration? All passwords are encrypted. The privileged EXEC mode password is “password1.” The router can support four Telnet sessions simultaneously. The router can be accessed from the console without using any password. 3 During the process of upgrading the IOS image on a router, the network administrator notices that the downloaded image in flash is corrupt. If ROMMON is used to perform the upgrade process again, by default which port on the router will be used to download the replacement image? AUX port console port first available LAN port first available serial port 4 Refer to the exhibit. What two addresses are the broadcast addresses for network A and network B? (Choose two.) Network A broadcast address 192.168.1.32 Network A broadcast address 192.168.1.47 Network A broadcast address 192.168.1.15 Network B broadcast address 192.168.1.207 Network B broadcast address 192.168.1.240 Network B broadcast address 192.168.1.192

Upload: goestoeari

Post on 28-Nov-2014

4.122 views

Category:

Documents


5 download

TRANSCRIPT

Page 1: CCNA 2_Practice Final Exam

CCNA 2 – Practice Final Exam

1 Which protocol defines the types of messages that a client uses to request a web page and the messages a server uses to respond to those requests?

FTPTCPHTTPHTML

2

Refer to the exhibit. Router R1 has been configured with the commands that are displayed. Which fact can be determined from the configuration?

All passwords are encrypted.The privileged EXEC mode password is “password1.”The router can support four Telnet sessions simultaneously.The router can be accessed from the console without using any password.

3 During the process of upgrading the IOS image on a router, the network administrator notices that the downloaded image in flash is corrupt. If ROMMON is used to perform the upgrade process again, by default which port on the router will be used to download the replacement image?

AUX portconsole portfirst available LAN portfirst available serial port

4

Refer to the exhibit. What two addresses are the broadcast addresses for network A and network B? (Choose two.)Network A broadcast address 192.168.1.32Network A broadcast address 192.168.1.47Network A broadcast address 192.168.1.15Network B broadcast address 192.168.1.207Network B broadcast address 192.168.1.240Network B broadcast address 192.168.1.192

5 Which scenario may require the use of a crossover UTP cable?connecting a host to a hubconnecting a host to a switchconnecting a router to a switchconnecting a switch to another switch

Page 2: CCNA 2_Practice Final Exam

6 When a user issues the command ping –a 64.102.240.242 in a command prompt window, which database will a DNS server search for the matching record?

reverse lookup zonesforward lookup zonesdomain name search zonesdomain address search zones

7

Refer to the exhibit. Which cable path segments require the use of crossover cables?A, D, FB, C, EB, D, EA, C, F

8 Which networking service is used to provide name to IP address mapping?DNSFTPNATDHCP

9 What is the purpose of using the copy tftp flash command on a router?to back up the current IOS image to a serverto restore the IOS image from a serverto back up the router configuration to a serverto restore the router configuration from flash

10 What contributes to the fact that transmitting a file using TCP will take longer than transmitting the same file using UDP?

UDP does not need to add a header to a data packet.UDP utilizes a more efficient error checking mechanism than TCP.The UDP authentication process is faster than the process that is used by TCP.The TCP verification process adds more transmissions during the file transfer.

11

Page 3: CCNA 2_Practice Final Exam

Refer to the exhibit. The network administrator uses the exhibited commands to configure R1 and R2. The administrator confirms Layer 1 connectivity between the two routers is functioning properly. However, R1 is unable to ping the serial interface of R2.What could be the reason for this problem?

The subnet mask is incorrectly configured on both routers.A static route is not configured on both routers.Different encapsulations are configured on the two routers.The clock rate is not set on any of the router serial interfaces.

12 After an unsuccessful ping to the local router, the technician decides to investigate the router. The technician observes that the lights and fan on the router are not operational. In which layer of the OSI model is the problem most likely occurring?

transportnetworkdata linkphysical

13

Page 4: CCNA 2_Practice Final Exam

Refer to the exhibit. What method is most commonly employed by large ISPs, such as ISP1, ISP2, and ISP3, to exchange and maintain routing information?

static routesIGP protocolsEGP protocolsdirectly connected routes

14 A small tire retailer requires a low-cost WAN connection to its headquarters in order to manage its inventory and process customer sales in real time. Which WAN connection type is best suited to its needs?

SONETT3T1DSLleased line

15

Refer to the exhibit. A computer with the displayed IP settings is unable to access a server on the 192.168.2.0 network using the server IP address but can access hosts on the 192.168.1.0 network. What should the network administrator do to troubleshoot this problem?

Issue the ping 192.168.1.1 command on the host to determine if the host can communicate with the default gateway.

Issue the ipconfig /all command to determine if a DNS server IP address was configured.Verify that the host has a link light.Check the cabling of the host.

16 Which type of cable may be used for backbone cabling between data centers that are located on different floors and that are separated by a distance of 1640 feet (500 meters)?

STPUTPcoaxialfiber-optic

17 Which WAN connection provides a dedicated circuit with fixed bandwidth available at all times?point-to-pointcircuit-switched

Page 5: CCNA 2_Practice Final Exam

packet-switchedcable

18 A company has formed a team that must analyze the probability of a disaster occurring and the associated effects and costs to their business. Which step of the disaster recovery plan is the team tasked with completing?

risk assessmentvulnerability assessmentdisaster scenario prioritizationdisaster recovery strategy development

19 Which routes are automatically added to the routing table on a neighbor router when routing protocols exchange information about directly connected networks?

dynamic routesstatic routesdefault routesdirectly connected routes

20 What should be the first step in a structured cable project?Locate all sources of EMI.Obtain an accurate floor plan.Identify the network backbone.Design efficient cable management systems

21 What is the function of the forward lookup DNS zone in the DNS name resolution process?It resolves fully qualified domain names into IP addresses.It stores the information about the domain namespace structure.It forwards zone information updates to the secondary server.It maintains a database of ARP entries for all servers.

22 A network engineer is planning a new horizontal cable installation in an office building. What advantage would UTP cable have over fiber optic cable for this installation?

lower installation costsbetter protection from EMIhigher transmission speedslonger unrepeated distance between endpoints

23 A network technician begins troubleshooting by checking the status of the light on the network interface card on the web server. Which troubleshooting method is the technician using?

top-downbottom-updivide-and-conquerfrom hardware to software

24 Which statement correctly describes an SLA?It lists the terms of the agreement between the user and the manufacturer of the system.It outlines the management, monitoring, and maintenance of a network.It specifies the software and hardware configurations of a system.It describes the operation of a system.

25 What needs to be configured on a router to ensure that when the router receives a packet with an unknown destination, the router will forward it to the next hop?

a default routea directly connected routea dynamically updated routea static route to the destination network

26 A Catalyst switch is used as a temporary replacement for another switch that needs to be repaired. About a minute after the switch has started, the SYST LED on the front of the switch transitions from blinking green to amber. What is the meaning of the amber SYST LED?

The switch has no configuration file in NVRAM.

Page 6: CCNA 2_Practice Final Exam

The switch has failed POST and must be sent for service.The switch is functioning properly.The switch is in half-duplex mode.

27 Which two statements are correct about the UDP protocol? (Choose two.)It utilizes a flow control mechanism.It uses windowing.It does not provide acknowledgment of receipt of data.It is a connectionless protocol.It guarantees the sequential arrival of data packets.

28

Refer to the exhibit. Based on the DHCP configuration commands, what is the reason that a PC is receiving an IP address but is unable to communicate outside of the local network?

The default gateway is misconfigured.Excluded addresses must be configured.The DNS server is on the incorrect network.There are not enough addresses to support the 28 hosts that are required for this LAN.

29 Which two commands ensure that any password that permits access to the privileged EXEC mode is not shown in plain text when the configuration files are displayed? (Choose two.)

Router(config)# enable secret ciscoRouter(config)# enable ciscoRouter(config)# encryption-password allRouter(config)# enable login encryptedRouter(config)# enable password encryptionRouter(config)# service password-encryption

30 A company functions from Monday to Friday each week. Their backup strategy calls for full backups each Friday night, with incremental backups on all other weekday nights. If an administrator is asked to restore a server hard drive to its Wednesday morning state, how many backups must be used?

1234

31 A network administrator is asked to design a system to allow simultaneous access to the Internet for 250 users. The ISP can only supply five public IP addresses for this network. What technology can the administrator use to accomplish this task?

classful subnettingvariable length subnet masksclassless interdomain routingport-based Network Address Translation

32

Page 7: CCNA 2_Practice Final Exam

Refer to the exhibit. There is no routing protocol configured on either router. Which command will create a default route on R1 to forward the traffic to R2?

R1(config)# ip route 0.0.0.0 0.0.0.0 10.1.1.1R1(config)# ip route 0.0.0.0 0.0.0.0 192.168.0.2R1(config)# ip route 0.0.0.0 0.0.0.0 192.168.0.1R1(config)# ip route 0.0.0.0 0.0.0.0 S0/0/1

33

Refer to the exhibit. Once DHCP is configured on a router with the Cisco SDM entries that are exhibited, which three statements could a network technician expect to see in the running configuration of the router? (Choose three.)

ip dhcp pool INTERNALip dhcp pool abc-widgets.incnetwork 192.168.1.0 255.255.255.0network 192.168.1.2 192.168.1.100 255.255.255.0default-router 192.168.1.100default-router 192.168.1.200ip dhcp excluded-address 192.168.1.1

34 What is a characteristic of the EIGRP routing protocol?It has a hop count limitation that makes it suitable only for small, simple networks that consist of fewer than 15 hops.It does not include subnet mask information in routing updates.It builds the topology table based on all of the advertisements from its neighbors.

Page 8: CCNA 2_Practice Final Exam

It maintains a full database of distant routers and the methods by which they interconnect.35

Refer to the exhibit. The interfaces on R1 and R2 have been properly configured with the IP addresses as shown. No dynamic routing protocols have been configured. The network administrator has entered the commands that are shown in the exhibit.Which two additional routes need to be configured to enable host A to access the Internet? (Choose two.)

a default route on R1 using exit interface S0/0/0a default route on R1 using exit interface S0/0/1a default route on R1 using exit IP address 198.133.219.1a static route on R2 for network 192.168.1.0 using exit interface S0/0/0a static route on R2 for network 198.133.219.1 using exit interface S0/0/0a static route on R2 for network 10.1.1.0 using exit interface S0/0/0

36 Which statement correctly describes the difference between HTTP and HTTPS?The maximum number of simultaneous connections that a server can support for HTTPS is more than for HTTP.HTTPS and HTTP use different client request-server response processes.HTTPS authenticates and encrypts the data being transferred between the client and the web server.HTTPS specifies the rules for passing data between the physical layer and the data link layer.

37 Which cable type provides a foil shielding to protect from outside electromagnetic interference?STPUTPcoaxialfiber-optic

38

Page 9: CCNA 2_Practice Final Exam

Refer to the exhibit. What fact can be determined from the exhibited output?PPP is enabled on this router.The bandwidth setting of the interfaces is consistent with a T1 connection.The serial0/0/0 interface is administratively down.The default encapsulation is set for the serial0/0/0 interface.Subnet mask 255.255.255.255 has been configured for the serial0/0/0 interface.

39

Refer to the exhibit. A network administrator has just entered the interface configuration commands shown in the exhibit on a brand new router. To verify basic connectivity, a ping is issued from Host A to R1. The ping is unsuccessful. Which two configuration steps should be performed to solve this problem? (Choose two.)

Configure the appropriate line password to access the router.Configure the speed of the interface.Enable the interface administratively.Configure a dynamic routing protocol on the router.Configure the subnet mask on the router interface to 255.255.255.248.Modify the subnet mask on HostA to be the same as the Fa0/0 interface.

40 The IT department of a company implements a backup plan which includes a daily backup on Monday through Saturday. Only files that were modified during each day are backed up. Which backup method is being used?

full backupnormal backup

Page 10: CCNA 2_Practice Final Exam

differential backupincremental backup

41 With a Class C address, which subnet mask should be used to connect 56 hosts to the network while wasting the minimum of available host addresses?

255.255.255.0255.255.255.128255.255.255.192255.255.255.224

42 When should an ISP helpdesk technician start documentation during the customer troubleshooting process?when the issue is resolvedwhen the technician answers the initial call from the customer who reports a problemwhen it is necessary to create a work order so that the onsite technician can visit the customer sitewhen the technician cannot resolve the issue and the case needs to be escalated to the next level technician

43 What is an example of a dedicated point-to-point WAN link?ISDNFrame RelaydialupT1/E1

44 What is one purpose of the TCP three-way handshake?sending echo requests from the source to the destination host to establish the presence of the destinationdetermining the IP address of the destination host in preparation for data transferrequesting the destination to transfer a binary file to the sourcesynchronizing sequence numbers between source and destination in preparation for data transfer

45 A user reports being able to access the Internet but not being able to download e-mail from the mail server at the ISP. What should the user check on the user workstation?

the POP3 and SMTP server settings in the e-mail applicationthe patch cable connections at the back of the workstation and at the wall platethe DHCP settings in the operating systemthe IP address, mask, and default gateway valuesthe NIC drivers

46

Refer to the exhibit. Which subnet mask would accommodate the number of hosts indicated for all subnets if the major network address was 192.168.25.0/24?

255.255.0.0255.255.224.0255.255.255.0255.255.255.224

Page 11: CCNA 2_Practice Final Exam

255.255.255.240255.255.255.248

47

Refer to the exhibit. The network administrator is validating a WAN connection design that supports authentication between the two routers. Which statement is true about the effect of the current configuration?

The serial connection cannot be established.The configuration does not meet the design objective.The clock rate must be configured on both routers.The serial connection will be established and meet the design objective.

48 What is a characteristic of Syslog?It requires users to prove their identity with the use of a username and password before users can access network resources.It listens to network traffic and sends an alert to a management station to track which applications are used and the length of time for which they are used.It enables devices to send information to a daemon that runs on a management station.It provides users the rights to access specific resources and perform specific tasks.

49 An experienced network technician has decided to use a divide-and-conquer approach to troubleshooting a network problem. What is an advantage to this approach?

works well for simple problemsquickly resolves user-related issueseasiest to use in a multi-vendor environmenttargets the problem layer more quickly than other methods do

50 Which two statements are correct about the ICMP packet that is used by the ping command? (Choose two.)It guarantees datagram delivery.It verifies Layer 3 connectivity.It acknowledges the receipt of TCP segments.It determines where a packet is lost on the path from the source to the destination.It measures the time that elapses between when the request packet is sent and the response packet is received.