mod1 peshal 100%

26
Close Window Assessment System 1. Assessment Selection 2. Assessment Settings 3. Take Assessment Take Assessment - ENetwork Final Exam - CCNA Exploration: Network Fundamentals (Version 4.0) Time Remaining: 1 An administrator is in the middle of entering a lengthy command when suddenly output from the IOS appears stating that an interface has gone down and then up again. Consequently, the command that the administrator was typing is no longer legible on the terminal. What CLI keystrokes can be entered to return to the line that the administrator was typing? Ctrl-D Ctrl-K Ctrl-R Ctrl-Z 2 A network technician has made a UTP cable that is terminated as T568A on one end and T568B on the opposite end. What type of cable has been constructed? patch console crossover 1240235 00:20:41

Upload: laxhu3877

Post on 26-Mar-2015

428 views

Category:

Documents


1 download

TRANSCRIPT

Page 1: mod1 peshal 100%

Close Window

Assessment System

  1. Assessment Selection     2. Assessment Settings     3. Take Assessment  

Take Assessment - ENetwork Final Exam - CCNA Exploration: Network Fundamentals (Version 4.0)

Time Remaining:

1 An administrator is in the middle of entering a lengthy command when suddenly output from the IOS appears stating that an interface has gone down and then up again. Consequently, the command that the administrator was typing is no longer legible on the terminal. What CLI keystrokes can be entered to return to the line that the administrator was typing?

Ctrl-D

Ctrl-K

Ctrl-R

Ctrl-Z

2 A network technician has made a UTP cable that is terminated as T568A on one end and T568B on the opposite end. What type of cable has been constructed?

patch

console

crossover

straight-through

3

1240235

00:20:41

Page 2: mod1 peshal 100%

Refer to the exhibit. Which two layers of the OSI model describe the same functions as the transport and internet layers of the TCP/IP model? (Choose two.)

application layer

presentation layer

session layer

transport layer

network layer

data link layer

physical layer

4 Which application layer protocol allows administrators to log into a server from remote locations and control a server as though logged in locally?

DNS

FTP

DHCP

SMTP

Telnet

5 Which option correctly identifies the interface or interfaces used to connect the router to a CSU/DSU for WAN connectivity?

Page 3: mod1 peshal 100%

6 Which answer lists the CLI mode hierarchy from least level of privilege to greatest?

global, privileged, user, specific

global, user, privileged, specific

user, global, privileged, specific

user, privileged, global, specific

7 What are three characteristics of CSMA/CD? (Choose three.)

Devices can be configured with a higher transmission priority.

A jam signal indicates that the collision has cleared and the media is not busy.

A device listens and waits until the media is not busy before transmitting.

The device with the electronic token is the only one that can transmit after a collision.

All of the devices on a segment see data that passes on the network medium.

After detecting a collision, hosts can attempt to resume transmission after a random time delay has expired.

8

Refer to the exhibit. Each media link is labeled. What type of cable should be used to connect the different devices?

Page 4: mod1 peshal 100%

Connection 1 - rollover cableConnection 2 - straight-through cableConnection 3 - crossover cableConnection 1 - crossover cableConnection 2 - rollover cableConnection 3 - crossover cableConnection 1 - straight-through cableConnection 2 - crossover cableConnection 3 - crossover cableConnection 1 - straight-through cableConnection 2 - crossover cableConnection 3 - straight-through cableConnection 1 - crossover cableConnection 2 - straight-through cableConnection 3 - crossover cable

9 Which OSI layer offers ordered data reconstruction services?

application layer

network layer

presentation layer

session layer

transport layer

10 What can the user do from the command prompt, Router(config-line)# ?

Configure one of the network interfaces.

Configure one of the physical or virtual lines.

Verify the running configuration on the device.

Configure the parameters for one of the routing protocols.

11

Refer to the exhibit. The router of the company failed and was replaced. After the replacement, hosts C and D in the Education office are able to ping each other, but they are unable to access the hosts in the Accounts office. What is the likely cause of the problem?

The IP address at the fa0/0 interface of the router is incorrectly configured.

The subnet mask at the fa0/1 interface of the router is incorrectly entered.

The IP address at the serial interface of the router is incorrectly configured.

The hosts in the Accounts office are not on the same subnet as the hosts in the Education office.

12

Page 5: mod1 peshal 100%

Refer to the exhibit. Host A wants to connect to host B on a different network. Which three IP addresses can be assigned to host A to enable this connectivity? (Choose three.)

172.16.11.36

172.16.11.95

172.16.11.88

172.16.11.70

172.16.11.64

172.16.11.67

13

Refer to the exhibit. Which logical topology describes the exhibited network?

star

ring

point-to-point

multi-access

14

Page 6: mod1 peshal 100%

Refer to the exhibit. Assume all devices are using default configurations. How many subnets are required to address the topology that is shown?

1

3

4

5

7

15 A network administrator is asked to design a new addressing scheme for a corporate network. There are 60 users in the main office, 40 users in the branch office, 28 users in manufacturing, 12 in the sales office, and 4 users in the research office. Which VLSM addressing scheme that uses the 192.168.88.0/24 network will fulfill the requirements while wasting the fewest addresses?

192.168.88.0/26 main192.168.88.32/26 branch192.168.88.64/26 manufacturing192.168.88.96/27 sales192.168.88.128/28 research192.168.88.0/26 main192.168.88.64/26 branch192.168.88.128/27 manufacturing192.168.88.160/28 sales192.168.88.176/29 research192.168.88.0/27 main192.168.88.32/27 branch192.168.88.64/28 manufacturing192.168.88.80/29 sales192.168.88.88/30 research192.168.88.0/27 main192.168.88.64/28 branch192.168.88.80/28 manufacturing192.168.88.96/29 sales192.168.88.104/30 research

Showing 1 of 4 <Prev Page: Next>

Close Window

All contents copyright 1992-2010 Cisco Systems, Inc. Privacy Statement  and  Trademarks.

1

Page 7: mod1 peshal 100%

Close Window

Assessment System

  1. Assessment Selection     2. Assessment Settings     3. Take Assessment  

Take Assessment - ENetwork Final Exam - CCNA Exploration: Network Fundamentals (Version 4.0)

Time Remaining:

16

1

1047830

00:17:28

Page 8: mod1 peshal 100%

Refer to the exhibit. An employee wants to access the organization intranet from home. Which intermediary device should be used to connect the organization intranet to the Internet to enable this access?

hub

switch

router

wireless access point

17

Refer to the exhibit. Host A sends a frame with the destination MAC address as FFFF.FFFF.FFFF. What action will the switch take for this frame?

It will drop the frame.

It will send the frame back to host A.

It will send the frame to all hosts except host A.

It will forward the frame to the default gateway.

18 How can ARP be used to help document the network?

Page 9: mod1 peshal 100%

It can list each hop on the way to a destination host.

It can show the average latency of hosts on the network.

It can provide a list of physical addresses on the network.

It can indicate which hosts are not responding to network traffic.

19 A routing issue has occurred in your internetwork. Which of the following type of devices should be examined to isolate this error?

access point

host

hub

router

switch

20

Refer to the exhibit. Which type of network design is shown?

client/server

wide area

dedicated server

peer-to-peer

21 Which physical component is used to access and perform the initial configuration on a new unconfigured router?

Page 10: mod1 peshal 100%

22 What happens when a host station receives a frame that contains its own MAC address in the destination field?

The Layer 2 information is removed and the frame is pushed up to Layer 3.

The host station will copy the information to its buffers and send it back out.

The frame originated from the host and will be ignored.

The Layer 3 information is added to the frame.

23 What is the Cisco IOS?

system software for Cisco devices

Read Only Memory in Cisco devices

non-volatile storage for device configurations

an initial operating system that is used for boot functions

24 Which two types of media can provide bandwidth up to 1 Gb/s? (Choose two.)

10 BASE-T

100 BASE-T

100 BASE-FX

1000 BASE-TX

1000 BASE-SX

25

Page 11: mod1 peshal 100%

Refer to the exhibit. PC1 can ping all PCs on the LAN, but a ping to the Fa0/1 interface of router R1 fails. What could be the cause of the problem?

Interface Fa0/1 on R1 is shut down.

Interface Fa0/1 on SW1 is shut down.

SW1 and R1 are interconnected with an incorrect cable.

PC1 is configured with an incorrect gateway IP address.

PC2 is configured with an incorrect gateway IP address.

26 A network administrator is designing an IP address scheme for a site. To comply with company policy, the address scheme must support up to 500 hosts and must be RFC 1918 compliant. Which IP address and prefix meets these requirements?

64.100.0.0/16

128.107.0.0/16

172.30.0.0/21

192.18.0.0/16

192.168.0.0/24

27 An administrator makes changes to the default configuration of a router and saves them to NVRAM. After testing, it is discovered that the configurations did not have the desired effect and must be removed. What steps must be taken to remove the changes and return the router to the default configuration?

Reboot the router.

Use no version of the commands that are issued.

Issue the erase startup-config command, and then reboot the router.

Issue the erase running-config command, and then reboot the router.

28 Which physical connector type is used for a serial V.35 connection to the CSU/DSU?

Page 12: mod1 peshal 100%

29

Refer to the exhibit. The diagram represents the process of sending e-mail between clients. Which list correctly identifies the component or protocol used at each numbered stage of the diagram?

1.MUA 2.MDA 3.MTA 4.SMTP 5.MTA 6.POP 7.MDA 8.MUA

Page 13: mod1 peshal 100%

1.MUA 2.POP 3.MDA 4.SMTP 5.MTA 6.MDA 7.SMTP 8.MUA

1.MUA 2.POP 3.SMTP 4.MDA 5.MTA 6.SMTP 7.POP 8.MUA

1.MUA 2.SMTP 3.MTA 4.SMTP 5.MTA 6.MDA 7.POP 8.MUA

30 A network administrator subnets the network 192.168.1.0/24 into four subnets. Which option correctly addresses Router1 and host A into the second subnet created?

Showing 2 of 4 <Prev Page: Next>

Close Window

All contents copyright 1992-2010 Cisco Systems, Inc. Privacy Statement  and  Trademarks.

2

2

Page 14: mod1 peshal 100%

Close Window

Assessment System

  1. Assessment Selection     2. Assessment Settings     3. Take Assessment  

Take Assessment - ENetwork Final Exam - CCNA Exploration: Network Fundamentals (Version 4.0)

Time Remaining:

31

911033

00:15:12

Page 15: mod1 peshal 100%

Refer to the exhibit. Which two facts can be determined about the topology? (Choose two.)

Three networks are needed.

Two logical address ranges are required.

Three broadcast domains are present.

Three collision domains are present.

Four networks are needed.

32 A network has grown too large for technicians to configure network addresses and hosts files for name resolution. Which two application layer services should be added to the server to allow these needs to be satisfied dynamically? (Choose two.)

DNS

FTP

DHCP

HTTP

SMTP

33

Refer to the exhibit. An administrator made several changes to the configuration of the router but did not accomplish the desired result. To undo the changes the reload command was used. What will happen if the administrator answers yes to the prompt?

The changes will be lost and the configuration file in RAM will be loaded.

The changes will be saved and the configuration file in RAM will be loaded.

The changes will be lost and the configuration file in NVRAM will be loaded.

The changes will be saved and the configuration file in NVRAM will be loaded.

34 Which password is automatically encrypted when it is created?

Page 16: mod1 peshal 100%

vty

aux

console

enable secret

enable password

35

Refer to the exhibit. A network administrator is troubleshooting a link that is down between Router1 and Router2. To correct the problem, which wire pairs need to be switched on one of the Ethernet cable ends?

pair 1 and pair 2

pair 1 and pair 3

pair 2 and pair 3

pair 2 and pair 4

36 A technician wishes to connect two computers to move data from one to the other before reloading the operating system. The NICs on both PCs do not support autosensing feature. Which procedure will satisfy the requirement?

Interconnect the two PCs with a rollover cable.

Interconnect the two PCs with two rollover cables and a hub.

Interconnect the two PCs with a crossover cable.

Interconnest the two PCs with two crossover cables and a hub.

37

Page 17: mod1 peshal 100%

Refer to the exhibit. Host A is able to access resources on the local LAN but is unable to access any resources on the Internet. What is the likely cause of this problem?

The host subnet mask in incorrect.

The network uses private addresses.

The host address is a network address.

The default gateway is on a different subnet from the host.

38

Page 18: mod1 peshal 100%

Refer to the exhibit. A technician is working on a network problem that requires verification of the router LAN interface. What address should be pinged from this host to confirm that the router interface is operational?

127.0.0.1

192.168.64.196

192.168.254.1

192.168.254.9

192.168.254.254

39 Which requirement would cause a network designer to use a router instead of a switch in a network design?

creating smaller collision domains

providing both UTP and fiber ports

connecting end-user devices to the network core

interconnecting several networks using different technologies

40

Page 19: mod1 peshal 100%

Refer to the exhibit. A host is connected to hub 1. Which combination of IP address, subnet mask, and default gateway can allow this host to function in the network?

IP address: 172.16.31.36 Subnet mask: 255.255.255.240 Default gateway: 172.16.31.35

IP address: 172.16.31.63 Subnet mask: 255.255.255.224 Default gateway: 172.16.31.35

IP address: 172.16.31.29 Subnet mask: 255.255.255.248 Default gateway: 172.16.31.35

IP address: 172.16.31.32 Subnet mask: 255.255.255.224 Default gateway: 172.16.31.35

IP address: 172.16.31.29 Subnet mask: 255.255.255.240 Default gateway: 172.16.30.1

IP address: 172.16.31.37 Subnet mask: 255.255.255.224 Default gateway: 172.16.31.35

41

Refer to the exhibit. Which list refers only to end devices?

D,E,F,G

A,H,B,C

A,D,E,F

A,D,E,G

Page 20: mod1 peshal 100%

42 Which password would allow a user to establish a Telnet session with a Cisco device?

VTY password

enable password

console password

enable secret password

43 Which option shows how a router will route packets to a remote network?

44 Which identifier is contained in the header of the Layer 2 Ethernet frame?

timing and synchronization of bits

source and destination port numbers

logical source and destination addresses

physical source and destination addresses

45

Page 21: mod1 peshal 100%

Refer to the exhibit. The tracert command is initiated from PC1 to PC4. Which device will send a response to the initial tracert packet from PC1?

Athens

Ankara

London

Paris

PC4

Showing 3 of 4 <Prev Page: Next>

Close Window

All contents copyright 1992-2010 Cisco Systems, Inc. Privacy Statement  and  Trademarks.

Close Window

Assessment System

3

3

Page 22: mod1 peshal 100%

  1. Assessment Selection     2. Assessment Settings     3. Take Assessment  

Take Assessment - ENetwork Final Exam - CCNA Exploration: Network Fundamentals (Version 4.0)

Time Remaining:

46 Which prompt is associated with the privileged exec mode?

R1>

R1#

R1(config)#

R1(config-router)#

47 Which location of router memory is cleared with the erase startup-config command?

flash

RAM

ROM

NVRAM

48

Refer to the exhibit. A network technician has made several changes to R1 since the configuration has last been saved. The modified configuration did not produce the desired changes. The technician wants to store a backup copy of the saved configuration on a TFTP server before reloading. Which action will cause the unmodified data to be saved on the TFTP server?

861879

00:14:22

Page 23: mod1 peshal 100%

49 Which TCP/IP model layer creates additional overhead on network resources due to acknowledgments, tracking, and retransmission of data?

internet

transport

application

network access

50

Refer to the exhibit. From global configuration mode, an administrator is attempting to create a message-of-the-day banner by using the command banner motd V Authorized access only! Violators will be prosecuted! V When users log in using Telnet, the banner does not appear correctly. What is the problem?

The banner message is too long.

The delimiting character appears in the banner message.

The symbol “!” signals the end of a banner message.

Message-of-the-day banners will only appear when a user logs in through the console port.

51 Which of the following are the address ranges of the private IP addresses? (Choose three.)

10.0.0.0 to 10.255.255.255

Page 24: mod1 peshal 100%

200.100.50.0 to 200.100.25.255

150.150.0.0 to 150.150.255.255

172.16.0.0 to 172.31.255.255

192.168.0.0 to 192.168.255.255

127.16.0.0 to 127.31.255.255

52

Refer to the exhibit. Host A is accessing multiple servers. Which combination of port number and address will uniquely identify a particular process running on a specific server?

MAC address of the server and port number of the service

IP address of the host and port number of the service

MAC address of the host and port number of the service

IP address of the server and port number of the service

Showing 4 of 4 <Prev Page: Next>

Close Window

All contents copyright 1992-2010 Cisco Systems, Inc. Privacy Statement  and  Trademarks.

4

4