Advertisement Upgrade to remove ads

A network technician has made a UTP cable that is terminated as T568A on one end and T568B on the opposite end. What type of cable has been constructed?

crossover

Refer to the exhibit. A technician is working on a network problem that requires verification of the router LAN interface. What address should be pinged from this host to confirm that the router interface is operational?

192.168.254.1

Refer to the exhibit. A network administrator remotely accesses the CLI of RouterB from PC1 using Telnet. Which statement is true about this connection?

The connection is made through a VTY session on the router

Which tree addresses belong to the category of public IP addresses?

- 196.1.105.6
- 132.11.9.99
- 46.1.1.97

Which range of port numbers are reserved for services that are commonly used by applications that runs on servers?

0 to 1023

Which prompt represents the appropriate mode used for the copy running-config startup-config command?

Switch-6J#

Which 2 factors contribute to the increased throughput when all nodes of a LAN are connected to a switch instead of a hub?

- Full-duplex operation
- Collision-free environment

An organization has been assigned network ID 10.10.128.0 and subnet mask 255.255.224.0. which IP address range can be used for this organization?

10.10.128.0 to 10.10.159.255

What is described by the network access layer of the TCP/IP model?

Rules for the handoff form the internet layer to the network access protocols

A technician is setting up a workgroup for six users and wants to allow users to share files without setting up a server. Which application layer protocol will provide for peer-to-peer file sharing in a workgroup?

SMB

Refer to the exhibit. Which type of network design is shown?

peer-to-peer

Refer to the exhibit. A network technician wants to connect host A to the console of a Cisco switch to initialize the configuration. What type of cable is required for this connection?

Rollover cable

What commands can be used to troubleshoot domain name resolution issues?

nslookup

Refer to the exhibit. When host A sends a frame addressed for host D, which hosts will receive the frame?

Only host D

The tracert 10.1.3.2 command was issued on computer A. Computer A can ping other addresses on the local subnet. Computer A sent the first ICMP packet toward computer B with a TTL value of 1. A protocol analyzer that was running on computer B showed that the packet never reached its destination. Why did the packet not reach the destination?

The TTL for the packet was decreased to zero by R1.

A user enters http://www.cisco.com/web1.htm in the address line of a browser. Which statement is true about this transaction?

The "http" portion indicates the protocol that is being used.

When must a router serial interface be configured with clock rate command?

When the interface is functioning as a DCE device

Which option shows the PDU that contains the Layer 3 source and destination addressing for a packet

Option 3

Which communication tool allows real-time collaboration?

instant messaging

Refer to the exhibit. Host A attempts to establish a TCP/IP session with host C. During this attempt, a frame was captured with the source MAC address 0050.7320.D632 and the destination MAC address 0030.8517.44C4. The packet inside the captured frame has an IP source address 192.168.7.5, and the destination IP address is 192.168.219.24. At which point in the network was this packet captured?

leaving Dallas

Refer to the exhibit. Which application layer service was used to determine the IP address assigned to the URL?

ICMP

Which router component will have contents erased when the command erase startup-config is issued?

NVRAM

Which prompt is associated with the privileged exec mode?

R1#

Which scenario describes a typical peer-to-peer network environment?

A user on one office PC sends output to a printer that is attached to the USB port of another PC in an adjacent office.

To enhance security in a network, the network administrator uses these commands:

- Users who attempt to connect to the console port of the router must enter a password.
- The entries permit access through the console by the use of j1mdi2 as the password.

Refer to the exhibit. Which option correctly identifies the network address, range of host addresses, and the broadcast address for the network that contains host A?

172.16.32.0-172.16.32.1-172.16.47.254-172.16.47.255

Refer to the exhibit. Host A is able to access resources on the local LAN but is unable to access any resources on the Internet. What is the likely cause of this problem?

The default gateway is on a different subnet from the host.

A routing issue has occurred in your internetwork. Which of the following type of devices should be examined to isolate this error?

router

Refer to the exhibit. For connecting two routers with an Ethernet crossover cable, which interface should be used?

C

Which option represents a point-to-point logical topology diagram?

Option 4

Which OSI layer manages data segments?

transport layer

Which two types of media can provide bandwidth up to 1Gb/s?

1. 1000 BASE-TX
2. 1000 BASE-SX

Refer to the exhibit. An employee wants to access the organization intranet from home. Which intermediary device should be used to connect the organization intranet to the Internet to enable this access?

router

How many host addresses may be assigned when using the 128.107.0.0 network address with a subnet mask of 255.255.255.248.0?

2046

Refer to the exhibit. What function does router RT_A need to provide to allow Internet access for hosts in this network?

address translation

Which application belongs to the category of the client/server model?

Using Telnet to access a router

Refer to the exhibit. Which two layers of the OSI model describe the same functions as the transport and Internet layers of the TCP/IP model/

Transport layer
Network layer

A technician is asked to ensure the priviledged EXEC mode of a switch by requiring a password. Which type of password would require this login and be considered the most secure?

enable secret

Refer to the exhibit. What two facts can be determined from the session information that is displayed?

- The protocol is a connection-oriented protocol.
- This exchange is part of the 3-way handshake.

Refer to the exhibit. RouterB is configured properly. The Ethernet interface Fa0/0 of RouterA is configured with the use of the commands that are shown. However, a ping from the Fa0/0 interface of RouterA to the Fa0/0 interface of RouterB is unsuccessful. What action should be taken on RouterA to solve this problem?

Use the no shutdown command on the FastEthernet interface Fa0/0.

Refer to the exhibit. Communication for hosts X and Y is restricted to the local network. What is the reason for this?

The gateway addresses are broadcast addresses.

Which topology divides the collision domain and provides full media bandwidth to the hosts in the network?

SW1-SW2

Refer to the exhibit. The ping 127.0.0.1 command is issued on the local host. What do the ping results indicate?

the TCP/IP stack on the local host operates properly.

A technician makes several changes to the running configuration on a router, but the desired results are not achieved. The technician issues the reload command. what action will be taken by the router?

The user will be prompted to save changes before the router restarts.

What is the effect of the command copy running-config tftp?

copies the configuration currently in RAM to a remote machine.

Refer to the exhibit. Host1 is in the process of setting up a TCP session with Host2. Host1 has sent a SYN message to begin session establishment. What happens next?

Host2 sends a segment with the ACK flag=1, SYN flag=1 to Host1.

Refer to the exhibit. A network technician is trying to determine the correct IP address configuration for Host A. What is a valid configuration for Host A?

IP address: 192.168.100.20; Subnet Mask: 255.255.255.240; Default Gateway: 192.168.100.17

Which physical component is used to access and perform the initial configuration on a new unconfigured router?

option 2

What can the user do from the command prompt, Router(config-line)#?

Configure one of the physical or virtual lines.

Refer to the exhibit. Host A is unable to reach host B on the remote network. A technician attempted to ping the local gateway and the ping was successful. To verify the host configuration, the technician issued the ipconfig command. What is the likely cause of the problem?

The default gateway on host A is incorrectly configured.

Which 3 commands will change the current configuration mode of a router?

- router rip
- line vty 0 4
interface fastethernet 0/1

What type of IP address should be assigned to a web server?

static

Which of the following are the address ranges of the private IP addresses?

- 10.0.0.0 to 10.255.255.255
- 172.16.0.0 to 172.31.255.255
- 192.168.0.0 to 192.168.255.255

Which two functions of the OSI model occur at layer two?

- Physical addressing
- media access control

What is true regarding network layer addressing?

- hierarchical
- Uniquely identifies each host
- contains a network portion

Refer to the exhibit. Assume all devices are using default configurations. How many subnets are required to address the topology that is shown?

3

A technician is asked to secure the privileged EXEC mode of a switch by requiring a password. Which type of password would require this login and be considered the most secure?

enable secret

Which OSI layer does IP rely on to determine whether packets have been lost and to request retransmission?

transport

When connectionless protocols are implemented at the lower layers of the OSI model, what is usually used to acknowledge that the data was received and to request the retransmission of missing data?

- an upper-layer
- connection-oriented protocol or service

Refer to the exhibit. Host C is able to ping 127.0.0.1 successfully, but is unable to communicate with hosts A and B in the organization. What is the likely cause of the problem?

The subnet mask on host C improperly configured

Refer to the exhibit. Which list refers only to end devices?

D, E, F, G

Refer to the exhibit. Host A sends a frame with the destination MAC address as FFFF.FFFF.FFFF. What action will the switch take for this frame?

It will send the frame to all hosts except host A.

To send data through a network, what two flags are used to establish a session?

- ACK
- SYN

Which statement is true about the TTL value of an IPv4 packet?

It specifies the remaining "life" of the packet.

What type of network is maintained if a server takes no dedicated role in the network?

peer-to-peer

A user sees the command prompt: Router(config-if)#. What task can be performed at this mode?

Configure individual interfaces

What is the correct order for PDU encapsulation?

Image 1

What information can be gathered by using the command netstat?

active TCP connections

How can ARP be used to help document the network?

It can provide a list of physical addresses on the network.

What is the protocol data unit that is associated with the data link layer of the OSI reference model?

frame

Which application layer protocol allows administrators to log into a server from remote locations and control a server as though logged in locally?

Telnet

Which statement identifies the DNS protocol?

It matches a resource name with the required network address.

Which password would allow a user to establish a Telnet session with a Cisco device?

VTY password

Which identifier is contained in the header of the Layer 2 Ethernet frame?

Physical source and destination addresses

What happens when a node on an Ethernet network is creating a frame and it does not have the destination MAC address?

The node sends out an ARP request with the destination IP address.

An administrator makes changes to the default configuration of a router and saves them to NVRAM. After testing, it is discovered that the configurations did not have the desired effect and must be removed. What steps must be taken to remove the changes and return the router to the default configuration?

Issue the erase startup-config command, and then reboot the router.

A network administrator is tasked with connecting two workgroups that are configured to use different subnets. Which device should be selected to allow connectivity between users on the two networks?

router

Which two programs can be used to accomplish terminal emulation for configuring a router from the CLI through the console port?

- Hyper Terminal
- Minicom

Which statement accurately describes file sharing in a peer-to-peer network?

Access control is decentralized.

What are two primary responsibilities of the Ethernet MAC sublayer?

- data encapsulation
- accessing the media

Which router configuration mode would an administrator use to configure the router for SSH or Telnet login access?

line

Refer to the exhibit. Which device should be included in the network topology to provide Layer 2 connectivity for all LAN devices, provide multiple collision domains, and also provide a connection to the rest of the network?

switch

Refer to the exhibit. A technician has been asked to test connectivity from PC1 to a remote network. Which action will indicate if there is remote connectivity?

C:\>ping 172.16.4.1

What purpose does a hostname serve on a router?

provides device identification to users logging on remotely

A technician wishes to connect two computers to move data from one to the other before reloading the operating system. The NICs on both PCs do not support autosensing feature. Which procedure will satisfy the requirement?

Interconnect the two PCs with a crossover cable.

Refer to the exhibit. Interface Fa0/0 on router A is generating excessive broadcast traffic. Which LAN segments will affected by the excessive broadcasts?

Only the 1992.168.1.200/30 network will be affected?

Two routers are connected via their serial ports in a lab environment. The routers are configured with valid IP addresses, but they cannot ping each other. The show interface serial0/0 command shows that the serial0/0 interface is up but the line protocol is down. What could be the cause of this problem?

The clock rate command has not been entered on the DCE interface.

Refer to the exhibit. Which layered network model is shown in the diagram?

TCP/IP

Which option shows how a router will route packets to a remote network?

option 4

A network administrator is configuring several switches for a network. The switches have similar configurations and only minor differences. The administrator wants to save all commands that are issued on the first switch to a text file for editing. Which transfer option should be selected in HyperTerminal?

option 3, CAPTURE TEXT!

Due to a security violation, the router passwords must be changed. What information can be learned form the following configuration entries?
Router(config)# line vty 0 3
Router(config-line)# password c13c0
Router(config-line)# login

- The entries specify four Telnet lines for remote access.
- Access will be permitted for Telnet using "c13c0" as the password.

Which password is automatically encrypted when it is created?

enable secret

Refer to exhibit. The tracert command is initiated form PC1 to PC4. Which device will send a response to the initial tracert packet form PC1?

London

Which information is used by the router to to determine the pat between the source and destination hosts?

the network portion of the IP address

Refer to the exhibit. A PC is communicating with another PC on a remote network. The two networks are connected by three routers. Which action will help to identify the path between the hosts?

Use the tracert command at the host.

Refer to the exhibit. The diagram represents the process of sending e-mail between clients. Which list correctly identifies the component or protocol used at each numbered stage of the diagram?

1.MUA 2.SMTP 3.MTA 4.SMTP 5.MTA 6.MDA 7.POP 8.MUA

Refer to the exhibit. The router of the company failed and was replaced. After the replacement, hosts C and D in the Education office are able to ping each other, but they are unable to access the hosts in the Accounts office. What is the likely cause of the problem?

The subnet mask at the fa0/1 interface of the router is incorrectly entered.

Refer to the exhibit. Host B attempts to establish a TCP/IP session with host C. During this attempt, a frame was captured at the FastEthernet interface fa0/1 of the San Francisco router. The packet inside the captured frame has the source IP address 10.10.1.2, and the destination IP address is 10.31.1.20. What is the destination MAC address of the frame at the time of capture?

0060.7320.D631

Refer to the exhibit. While configuring a network, a technician wired each end of a Category 5e cable as shown. Which two statements are true about this setup?

- The cable is suitable for connecting a switch to a router Ethernet port.
- The cable is suitable for connecting dissimilar types of devices.

Refer to the exhibit. Host a sends a frame with the destination MAC address as FFFF.FFFF.FFFF.FFFF. What action will the switch take for this frame?

It will send the frame to all hosts except host A.

Well-known services and applications use which range of TCP/UDP port numbers?

0 to 1023

Which three IPv4 addresses represent subnet broadcast addresses?

192.168.4.63/26
192.168.4.191/26
192.168.4.95/27

Which 3 statements are true about network layer addressing?

1. It uses a hierarchical structure
2. It uniquely identifies each host
3. A portion of the address is used to identify the network

Which OSI layer addressing is required to route packets b/w two networks?

Layer 3

What type of network is maintained if a server takes no dedicated role in the network?

peer-to-peer

Refer to the exhibit. Host A is requesting a web page form the web server. Which option represents the socket to which the request is made?

10.0.0.130:80

Which statement describes the correct use of addresses to deliver an email message from HostB to the email service that is running on ServerA?

Router B uses a Layer 3 network address to route the packet.

Refer to the exhibit. Host A is configured with the correct IP address for the default gateway of the router R1 FastEthernet0/1 interface. How will a packet that is sent from host A to host B be handled by the devices on the network?

R1 will forward the packet to its default gateway, the next hop router R2. R2 will forward the packet to the directly connected network 10.1.1.0/24.

Which option correctly identifies the interface or interfaces used to connect the router to a CSU/DSU for WAN connectivity?

How many host addresses may be assigned when using the 128.107.0.0 network address with a subnet mask of 255.255.255.248.0?

2046

During the encapsulation process, what is the PDU of the internet layer?

packet

Which service is used when the nslookup command is issued on a computer?

DNS

Refer to the exhibit. A network technician creates equal-sized subnets of network 192.168.2.0/24 using the subnet mask 255.255.255.224. If the technician wishes to calculate the number of host addresses in each subnet by using the formula that is shown in the exhibit, what value will be used for n?

5

What are the default terminal emulation software settings when configuring a Cisco device through a console port?

Bits per second: 9600
Data bits: 8
Parity: None
Stop bits: 1
Flow control: None

In a packet-switched data network, what is used to reassemble the packets in the correct order at the destination device?

sequence number

Refer to the exhibit. A network administrator tries to test the connectivity between routers R1 and R2, but the attempt to ping is unsuccessful. Based on the show ip interface brief command outputs, what could be the possible cause of the problem?

Interface S0/0/0 on router R1 is configured with an incorrect IP address.

Which router configuration mode will require user authentication if an administrator issue the enable secret command?

privileged executive mode

Which location of router memory is cleared with the erase startup-config command?

NVRAM

Which subnet mask should be used for a Class B network that is divided into subnets and will accommodate between 800 hosts and 1000 hosts?

255.255.252.0

Refer to the exhibit. The network containing router B is experiencing problems. A network associate has isolated the issue in this network to router B. What action can be preformed to correct the network issue?

Issue the no shutdown command on interface FastEthernet 0/1

Refer to the exhibit. A web browser running on host PC1 sends a request for a web page to the web server with an IP address 192.168.1.254/24. What sequence of steps will follow in order to establish the session before data can be exchanged?

The session will be initiated using TCP. A three-way handshake must be successfully completed before the session is established.

A user sees the command prompt: Router(config-if)#. What task can be performed at this mode?

Configure individual interface

Refer to the exhibit. Interface Fa0/0 on router A is generating excessive broadcast traffic. Which LAN segments will affected by the excessive broadcasts?

Only the 192.168.1.200/30 network will be affected.

What is the effect of using the Router# copy running-config startup-config command on a router?

The contents of NVRAM will change.

Which option represents a point-to-point logical topology diagram?

In a network design project, a network designer needs to select a device to provide collision free connections to 40 hosts on the LAN. Which device should be selecteed?

switch

When must a router serial interface be configured with the clock rate command?

When the interface is functioning as a DCE device

Refer to the exhibit. When host A sends a frame addressed for host D, which hosts will receive the frame?

only Host D

Which topology divides the collision domain and provides full media bandwidth to the hosts in the network?

Refer to the exhibit. Which option correctly identifies the network address, range of host addresses, and the broadcast address for network that contains host A?

Which 3 addresses belong to the category of public IP addresses?

- 196.1.105.6
- 132.11.9.99
- 46.1.1.97

Refer to the exhibit. What two facts can be determined from the session information that is displayed?

- The protocol is a connection-oriented protocol.
- This exchange is part of the three-way handshake

Please allow access to your computer’s microphone to use Voice Recording.

Having trouble? Click here for help.

We can’t access your microphone!

Click the icon above to update your browser permissions above and try again

Example:

Reload the page to try again!

Reload

Press Cmd-0 to reset your zoom

Press Ctrl-0 to reset your zoom

It looks like your browser might be zoomed in or out. Your browser needs to be zoomed to a normal size to record audio.

Please upgrade Flash or install Chrome
to use Voice Recording.

For more help, see our troubleshooting page.

Your microphone is muted

For help fixing this issue, see this FAQ.

Star this term

You can study starred terms together

NEW! Voice Recording

Create Set