CCNA 1 Chapter 8 v5.0 Exam Answers 2014

Monday, March 23, 2015

1
Fill in the blank.
The decimal equivalent of the binary number 10010101 is    “149” .
2


Place the options in the following order:

[+] 192.168.100.161/25

[+] 203.0.113.100/24

[+] 10.0.50.10/30

[#] 192.168.1.80/29

[#] 172.110.12.64/28

[#] 10.10.10.128/25

[*] 10.0.0.159/27

[*] 192.168.1.191/26
[+] Order does not matter within this group.

[#] Order does not matter within this group.

[*] Order does not matter within this group.

3
What is indicated by a successful ping to the ::1 IPv6 address?

The link-local address is correctly configured.

The default gateway address is correctly configured.

The host is cabled properly.

All hosts on the local link are available.

IP is properly installed on the host.*

4

Launch PT –  Hide and Save PT
Open the PT Activity. Perform the tasks in the activity instructions and then answer the question.

Which message is displayed on the web server?

Correct configuration!*

IPv6 address configured!

You did it right!

Successful configuration!

5
Which two ICMP messages are used by both IPv4 and IPv6 protocols? (Choose two.)​

router solicitation

protocol unreachable*

neighbor solicitation

route redirection*

router advertisement

6
A message is sent to all hosts on a remote network. Which type of message is it?

unicast

directed broadcast*

limited broadcast

multicast

7
Which two things can be determined by using the ping command? (Choose two.)

the average time it takes each router in the path between source and destination to respond

the average time it takes a packet to reach the destination and for the response to return to the source*

whether or not the destination device is reachable through the network*

the IP address of the router nearest the destination device

the number of routers between the source and destination device

8
A DHCP server is used to assign IP addresses dynamically to the hosts on a network. The address pool is configured with 192.168.10.0/24. There are 3 printers on this network that need to use reserved static IP addresses from the pool. How many IP addresses in the pool are left to be assigned to other hosts?

253

252

251*

254

9
Which two parts are components of an IPv4 address? (Choose two.)

logical portion

network portion*

physical portion

broadcast portion

host portion*

subnet portion

10
Which IPv6 address is most compressed for the full FE80:0:0:0:2AA:FF:FE9A:4CA3 address?​

FE80::2AA:FF:FE9A:4CA3*

FE80::0:2AA:FF:FE9A:4CA3​

FE80:::0:2AA:FF:FE9A:4CA3​

FE8::2AA:FF:FE9A:4CA3​

11


12
What are three parts of an IPv6 global unicast address? (Choose three.)

an interface ID that is used to identify the local host on the network*

an interface ID that is used to identify the local network for a particular host

a subnet ID that is used to identify networks inside of the local enterprise site*

a global routing prefix that is used to identify the network portion of the address that has been provided by an ISP*

a global routing prefix that is used to identify the portion of the network address provided by a local administrator

13

14
Which network migration technique encapsulates IPv6 packets inside IPv4 packets to carry them over IPv4 network infrastructures?

encapsulation

translation

dual-stack

tunneling*

15
When an IPv6 enabled host needs to discover the MAC address of an intended IPv6 destination, which destination address is used by the source host in the NS message?

global unicast address of the receiver

solicited-node multicast address*

all-node multicast address

link-local address of the receiver

16
When a Cisco router is being moved from an IPv4 network to a complete IPv6 environment, which series of commands would correctly enable IPv6 forwarding and interface addressing?

Router# configure terminal
Router(config)# interface fastethernet 0/0
Router(config-if)# ip address 192.168.1.254 255.255.255.0
Router(config-if)# no shutdown
Router(config-if)# exit
Router(config)# ipv6 unicast-routing

Router# configure terminal
Router(config)# interface fastethernet 0/0
Router(config-if)# ipv6 address 2001:db8:bced:1::9/64
Router(config-if)# no shutdown
Router(config-if)# exit
Router(config)# ipv6 unicast-routing ***********

Router# configure terminal
Router(config)# interface fastethernet 0/0
Router(config-if)# ipv6 address 2001:db8:bced:1::9/64
Router(config-if)# no shutdown

Router# configure terminal
Router(config)# interface fastethernet 0/0
Router(config-if)# ip address 2001:db8:bced:1::9/64
Router(config-if)# ip address 192.168.1.254 255.255.255.0
Router(config-if)# no shutdown
​

17
What two statements describe characteristics of Layer 3 broadcasts? (Choose two.)

There is a broadcast domain on each switch interface.

Routers create broadcast domains.*

A router will not forward any type of Layer 3 broadcast packet.

Broadcasts are a threat and users must avoid using protocols that implement them.

A limited broadcast packet has a destination IP address of 255.255.255.255.*

Some IPv6 protocols use broadcasts.

18
Which two statements are correct about IPv4 and IPv6 addresses? (Choose two.)

IPv6 addresses are represented by hexadecimal numbers.*

IPv6 addresses are 32 bits in length.

IPv4 addresses are 128 bits in length.

IPv4 addresses are represented by hexadecimal numbers.

IPv4 addresses are 32 bits in length.*

IPv6 addresses are 64 bits in length.

19
What is the prefix length notation for the subnet mask 255.255.255.224?

/26

/28

/27*

/25

20
Fill in the blank.
What is the decimal equivalent of the hex number 0x3F?   “63
21
What are two types of IPv6 unicast addresses? (Choose two.)

anycast

link-local*

multicast

loopback*

broadcast

22
When will a router drop a traceroute packet?

when the router receives an ICMP Time Exceeded message

when the host responds with an ICMP Echo Reply message

when the value in the TTL field reaches zero*

when the values of both the Echo Request and Echo Reply messages reach zero

when the RTT value reaches zero

23
An IPv6 enabled device sends a data packet with the destination address of FF02::1. What is the target of this packet?

all IPv6 configured routers across the network

all IPv6 configured routers on the local link

all IPv6 enabled nodes on the local link*

all IPv6 DHCP servers

24
How many bits are in an IPv4 address?

256

128

64

32*

 


Read more ...

CCNA 1 Chapter 9 v5.0 Exam Answers 2014

Monday, March 23, 2015

1
Refer to the exhibit.

 

How many broadcast domains are there?

1
2
3
4*

2
How many usable host addresses are there in the subnet 192.168.1.32/27?

32
30*
64
16
62

3
How many host addresses are available on the network 172.16.128.0 with a subnet mask of 255.255.252.0?

510
512
1022*
1024
2046
2048

4
A network administrator is variably subnetting a network. The smallest subnet has a mask of 255.255.255.248. How many host addresses will this subnet provide?​

4
6*
8
10
12

5


Refer to the exhibit.

A company uses the address block of 128.107.0.0/16 for its network. What subnet mask would provide the maximum number of equal size subnets while providing enough host addresses for each subnet in the exhibit?

255.255.255.0
255.255.255.128*
255.255.255.192
255.255.255.224
255.255.255.240

6
Refer to the exhibit.

The network administrator has assigned the LAN of LBMISS an address range of 192.168.10.0. This address range has been subnetted using a /29 prefix. In order to accommodate a new building, the technician has decided to use the fifth subnet for configuring the new network (subnet zero is the first subnet). By company policies, the router interface is always assigned the first usable host address and the workgroup server is given the last usable host address. Which configuration should be entered into the properties of the workgroup server to allow connectivity to the Internet?

IP address: 192.168.10.65 subnet mask: 255.255.255.240, default gateway: 192.168.10.76
IP address: 192.168.10.38 subnet mask: 255.255.255.240, default gateway: 192.168.10.33
*IP address: 192.168.10.38 subnet mask: 255.255.255.248, default gateway: 192.168.10.33*
IP address: 192.168.10.41 subnet mask: 255.255.255.248, default gateway: 192.168.10.46
IP address: 192.168.10.254 subnet mask: 255.255.255.0, default gateway: 192.168.10.1
7
How many bits must be borrowed from the host portion of an address to accommodate a router with five connected networks?

two
three*
four
five

8
A company has a network address of 192.168.1.64 with a subnet mask of 255.255.255.192. The company wants to create two subnetworks that would contain 10 hosts and 18 hosts respectively. Which two networks would achieve that? (Choose two.)

192.168.1.16/28
192.168.1.64/27*
192.168.1.128/27
192.168.1.96/28*
192.168.1.192/28

9
In a network that uses IPv4, what prefix would best fit a subnet containing 100 hosts?

/23
/24
/25*
/26

10
Refer to the exhibit.

Given the network address of 192.168.5.0 and a subnet mask of 255.255.255.224, how many addresses are wasted in total by subnetting each network with a subnet mask of 255.255.255.224?

56
60
64
68
72*

New Question

Given the network address of 192.168.5.0 and a subnet mask of 255.255.255.224, how many total host addresses are unused in the assigned subnets?

56
64
72*
68

11
When developing an IP addressing scheme for an enterprise network, which devices are recommended to be grouped into their own subnet or logical addressing group?

end-user clients
workstation clients
mobile and laptop hosts
hosts accessible from the Internet*

12
A network administrator needs to monitor network traffic to and from servers in a data center. Which features of an IP addressing scheme should be applied to these devices?

random static addresses to improve security
addresses from different subnets for redundancy
predictable static IP addresses for easier identification*
dynamic addresses to reduce the probability of duplicate addresses

13
Which two reasons generally make DHCP the preferred method of assigning IP addresses to hosts on large networks? (Choose two.)

It eliminates most address configuration errors.*
It ensures that addresses are only applied to devices that require a permanent address.
It guarantees that every device that needs an address will get one.
It provides an address only to devices that are authorized to be connected to the network.
It reduces the burden on network support staff.*

14
Refer to the exhibit.

 

A computer that is configured with the IPv6 address as shown in the exhibit is unable to access the internet. What is the problem?

The DNS address is wrong.
There should not be an alternative DNS address.
The gateway address is in the wrong subnet.*
The settings were not validated.

15
When subnetting a /64 IPv6 network prefix, which is the preferred new prefix?

/66
/70
/72*
/74

16
What is the subnet address for the address 2001:DB8:BC15:A:12AB::1/64?

2001:DB8:BC15::0
2001:DB8:BC15:A::0*
2001:DB8:BC15:A:1::1
2001:DB8:BC15:A:12::0

17
Which two notations are useable nibble boundaries when subnetting in IPv6? (Choose two.)

/62
/64*
/66
/68*
/70
18
Fill in the blank.
In dotted decimal notation, the IP address      “172.25.0.126”     is the last host address for the network 172.25.0.64/26.

The binary representation of the network
address 172.25.0.64 is 10101100.00011001.00000000.01000000,
where the last six zeros represent the host part of the address.
The last address on that subnet would have the host part equal to 111111,
and the last host address would end in 111110. This results in a binary
representation of the last host of the IP address as 10101100.00011001.00000000.01111110,
which translates in decimal to 172.25.0.126.
19
Fill in the blank.
In dotted decimal notation, the subnet mask      “255.255.254.0”     will accommodate 500 hosts per subnet.

If the network has to accommodate 500 hosts per subnet, then we need 9 host bits
(2^9 – 2 = 510 hosts). The Class B subnet mask has 16 bits available and if
we use 9 bits for hosts, we will have 7 network bits remaining.The subnet mask
with 9 host bits is 11111111.11111111.11111110.00000000, which corresponds
to 255.255.254.0.

20
Consider the following range of addresses:
2001:0DB8:BC15:00A0:0000::
2001:0DB8:BC15:00A1:0000::
2001:0DB8:BC15:00A2:0000::

2001:0DB8:BC15:00AF:0000::
The prefix for the range of addresses is   “60”    .

All the addresses have the part 2001:0DB8:BC15:00A
in common. Each number or letter in the address
represents 4 bits, so the prefix is /60.
21
Fill in the blank.

A nibble consists of    “4”    bits.

A nibble is half of a byte or 4 bits. This is significant because
subnetting in IPv6 is usually done on a nibble boundary.

22
Question as presented:

Place the options in the following order:
– not scored –
192.168.1.64/27
– not scored –
192.168.1.32/27
192.168.1.96/27
23
Question as presented:

Place the options in the following order:
– not scored –
Network C
– not scored –
Network A
Network D
Network B
24
Open the PT Activity.

 

Perform the tasks in the activity instructions and then answer the question.

What issue is causing Host A to be unable to communicate with Host B?
The subnet mask of host A is incorrect.
Host A has an incorrect default gateway.
Host A and host B are on overlapping subnets.*
The IP address of host B is not in the same subnet as the default gateway is on.

 


Read more ...

CCNA 1 Chapter 10 v5.0 Exam Answers 2014

Monday, March 23, 2015

1
Which three layers of the OSI model provide similar network services to those provided by the application layer of the TCP/IP model? (Choose three.)

physical layer
session layer*
transport layer
application layer*
presentation layer*
data link layer

2
Which two tasks are functions of the presentation layer? (Choose two.)

compression*
addressing
encryption*
session control
authentication

3
Select three protocols that operate at the Application Layer of the OSI model. (Choose three.)

ARP
TCP
DSL
FTP*
POP3*
DHCP*

4
A manufacturing company subscribes to certain hosted services from their ISP. The services required include hosted world wide web, file transfer, and e-mail. Which protocols represent these three key applications? (Choose three.)

FTP*
HTTP*
DNS
SNMP
DHCP
SMTP*

5
What are two characteristics of peer-to-peer networks? (Choose two.)

scalable
one way data flow
decentralized resources*
centralized user accounts
resource sharing without a dedicated server*

6
What is an example of network communication that uses the client-server model?

A user uses eMule to download a file that is shared by a friend after the file location is determined.
A workstation initiates an ARP to find the MAC address of a receiving host.
A user prints a document by using a printer that is attached to a workstation of a coworker.
A workstation initiates a DNS request when the user types www.cisco.com in the address bar of a web browser.*

7
What is an advantage for small organizations of adopting IMAP instead of POP?

Messages are kept in the mail servers until the client manually deletes them.*
When the user connects to a POP server, copies of the messages are kept in the mail server for a short time, but IMAP keeps them for a long time.
IMAP sends and retrieves email, but POP only retrieves email.
POP only allows the client to store messages in a centralized way, while IMAP allows distributed storage.

8
Which two actions are taken by SMTP if the destination email server is busy when email messages are sent? (Choose two.)

SMTP sends an error message back to the sender and closes the connection.
SMTP tries to send the messages at a later time.*
SMTP will discard the message if it is still not delivered after a predetermined expiration time.
SMTP periodically checks the queue for messages and attempts to send them again.*
SMTP sends the messages to another mail server for delivery.

9
Which application layer protocol uses message types such as GET, PUT, and POST?

DNS
DHCP
SMTP
HTTP*
POP3

10
A DHCP-enabled client PC has just booted. During which two steps will the client PC use broadcast messages when communicating with a DHCP server? (Choose two.)
DHCPDISCOVER*
DHCPACK
DHCPOFFER
DHCPREQUEST*
DHCPNAK

11
A user accessed the game site www.nogamename.com last week. The night before the user accesses the game site again, the site administrator changes the site IP address. What will be the consequence of that action for the user?

The user will not be able to access the site.
The user will access the site without problems.*
The user will have to modify the DNS server address on the local PC in order to access the site.
The user will have to issue a ping to this new IP address to be sure that the domain name remained the same.

12
Which DNS server in the DNS hierarchy would be considered authoritative for the domain name records of a company named netacad?

.com
netacad.com*
mx.netacad.com
www.netacad.com
13
Which three statements describe a DHCP Discover message? (Choose three.)

The source MAC address is 48 ones (FF-FF-FF-FF-FF-FF).
The destination IP address is 255.255.255.255.*
The message comes from a server offering an IP address.
The message comes from a client seeking an IP address. *
All hosts receive the message, but only a DHCP server replies.*
Only the DHCP server receives the message.

14
Which phrase describes an FTP daemon?

a diagnostic FTP program
a program that is running on an FTP server*
a program that is running on an FTP client
an application that is used to request data from an FTP server

15
What is true about the Server Message Block protocol?

Different SMB message types have a different format.
Clients establish a long term connection to servers.*
SMB messages cannot authenticate a session.
SMB uses the FTP protocol for communication.

16
When would it be more efficient to use SMB to transfer files instead of FTP?

when downloading large files with a variety of formats from different servers
when a peer-to-peer application is required
when the host devices on the network use the Windows operating system
when downloading large numbers of files from the same server*
when uploading the same file to multiple remote servers

17
Fill in the blank.
What is the acronym for the protocol that is used when securely communicating with a web server?     “ HTTPS “​

Hypertext Transfer Protocol Secure (HTTPS)
is the protocol that is used for accessing or
posting web server information using a secure communication channel.

18

Fill in the blank.
Refer to the exhibit. What command was used to resolve  a given host name by querying the name servers?   “ nslookup

A user can manually query the name servers to resolve
a given host name using the nslookup command.​
Nslookup is both a command and a utility.​

19
Question as presented:

Place the options in the following order:

end device address

– not scored –

authoritative name server

canonical name

mail exchange record

20
Question as presented:

Place the options in the following order:

a message that is used to identify the explicit server and lease offer to accept

a message that is used to locate any available DHCP server on a network

– not scored –

a message that is used to suggest a lease to a client

a message that is used to acknowledge that the lease is successful
21
Question as presented:

Place the options in the following order:

[+] no dedicated server is required
[+] client and server roles are set on a per request basis
[#] requires a specific user interface
[#] a background service is required

[+] Order does not matter within this group.
[#] Order does not matter within this group.
22
Open the PT Activity.

 

Perform the tasks in the activity instructions and then answer the question.

Which PC or PCs are sending FTP packets to the server?

PC_3
PC_1
PC_2*
PC_1 and PC_3

 


Read more ...

CCNA 1 v5.0 Pretest Exam Answers 2014

Monday, March 23, 2015

1


2
The failure rate in a certain brand of network interface card has been determined to be 15%. How many cards could be expected to fail in a company that has 80 of the cards installed?

10
12*
15
8

3
If a technician uses an average of 2 cans of compressed air per week for cleaning, how many cans should be ordered for 8 technicians over the next 10 weeks?

16
20
200
80
160*

4
A local real estate company can have its 25 computer systems upgraded for $1000. If the company chooses only to upgrade 10 systems, how much will the upgrade cost if the same rate is used?

$100
$200
$400*
$600
$500

5
Convert the decimal number 231 into its binary equivalent. Select the correct answer from the list below.

11100111*
11100101
11101110
11110110
11011011
11110010

6
Which is a characteristic of the Internet?

It is not centrally governed.*
It is localized to specific geographic locations.
It uses only physical addresses.
It uses private IP addressing.

7
Which command can be used to test connectivity between two computers that are attached to a network?

nbtstst -s
ifconfig
winipcfg
ping*
ipconfig

8
Which two devices provide permanent data storage? (Choose two.)

hard drive*
keyboard
Blu-Ray disc*
RAM
monitor

9

10
Convert the binary number 10111010 into its hexadecimal equivalent. Select the correct answer from the list below.

A1
BA*
85
B3
1C
90

11
What is a function of the BIOS?

provides graphic capabilities for games and applications
provides temporary data storage for the CPU
enables a computer to connect to a network
performs a power-on self test of internal components*

12
A person-hour is the amount of work that the average worker can do in one hour. It is anticipated that a company-wide system upgrade will take approximately 60 person-hours to complete. How long will it take five technicians to perform the refresh?

8 hours
10 hours
5 hours
12 hours*

13

14

15

16
A company is expanding its business to other countries. All branch offices must remain connected to corporate headquarters at all times. Which network technology is required to support this requirement?

MAN
WAN*
WLAN
LAN

17
Which subnet would include the address 192.168.1.96 as a usable host address?

192.168.1.64/29
192.168.1.64/26*
192.168.1.32/28
192.168.1.32/27

18
What is the purpose of having a converged network?

to achieve fault tolerance and high availability of data network infrastructure devices
to reduce the cost of deploying and maintaining the communication infrastructure*
to provide high speed connectivity to all end devices
to make sure that all types of data packets will be treated equally

19
A user is having problems accessing the Internet. The command ping www.cisco.com fails. However, pinging the IP address of cisco.com with the command ping 198.133.219.25 is successful. What is the problem?

The default gateway is incorrect.
There is a problem with DNS.*
The address of the ARP cache is incorrect.
The web server is down.

20


Refer to the exhibit. Host_A is preparing to send data to Server_B. How will Host_A address the packets and frames that will carry this data? (Choose two.)

The packet destination will be addressed with the IP address of the Router_B interface that is attached to Router_A.
The frame destination will be addressed with the MAC address of Server_B.
The packet destination will be addressed with the IP address of Server_B.*
The frame destination will be addressed with the MAC address of Switch_A.
The packet destination will be addressed with the IP address of the Router_A LAN interface.
The frame destination will be addressed with the MAC address of the Router_A LAN interface.*
21
Which three IP addresses are private ? (Choose three.)

10.1.1.1*
224.6.6.6
172.32.5.2
172.16.4.4*
192.167.10.10
192.168.5.5*

22
What is the general term that is used to describe a piece of data at any layer of a networking model?

segment
frame
protocol data unit*
packet

23
Which function is provided by TCP?

detection of missing packets*
path determination for data packets
communication session control
data encapsulation

24
Which option shows the proper notation for an IPv6 address?

2001.0db8.3c55.0015.abcd.ff13
2001-0db8-3c55-0015-abcd-ff13
2001,0db8,3c55,0015,abcd,ff13
2001:0db8:3c55:0015::abcd:ff13*

25


Refer to the exhibit.

Using the network in the exhibit, what would be the default gateway address for host A in the 192.133.219.0 network?

192.133.219.1*
192.133.219.0
192.135.250.1
192.31.7.1

26
Which technology provides a solution to IPv4 address depletion by allowing multiple devices to share one public IP address?

NAT*
DHCP
SMB
HTTP
ARP
DNS

27
A technician uses the ping 127.0.0.1 command. What is the technician testing?

the TCP/IP stack on a network host*
connectivity between two adjacent Cisco devices
connectivity between two PCs on the same network
physical connectivity of a particular PC and the network
connectivity between a PC and the default gateway

28
What is the purpose of ICMP messages?

to ensure the delivery of an IP packet
to inform routers about network topology changes
to provide feedback of IP packet transmissions*
to monitor the process of a domain name to IP address resolution

29
Which basic process is used to select the best path for forwarding data?

encapsulation
addressing
routing*
switching

30
Which wireless security procedure should be used to hide the WLAN ID from wireless clients?

Configure WEP only on the access point.
Configure MAC address filtering on the access point.
Decrease the antenna spectrum on each wireless client.
Install WAP on the wireless clients.
Disable the broadcast of the SSID on the access point.*

31
What statement describes the function of the Address Resolution Protocol?

ARP is used to discover the MAC address of any host on the local network.*
ARP is used to discover the IP address of any host on the local network.
ARP is used to discover the IP address of any host on a different network.
ARP is used to discover the MAC address of any host on a different network.

32
A home user is looking for an ISP connection that provides high speed digital transmission over regular phone lines. What ISP connection type should be used?

dial-up
cell modem
satellite
DSL*
cable modem

33
What is an advantage of using IPv6 ?

higher bandwidth
more addresses for networks and hosts*
more frequencies
faster connectivity

34
Which device should be used for enabling a host to communicate with another host on a different network?

router*
hub
switch
host

35
What is the purpose of the routing process?

to encapsulate data that is used to communicate across a network
to select the paths that are used to direct traffic to destination networks*
to convert a URL name into an IP address
to provide secure Internet file transfer
to forward traffic on the basis of MAC addresses

36
Which type of connector does a network interface card use?

DIN
RJ-11
RJ-45*
PS-2

37
Why would a network administrator use the tracert utility?

to display the IP address, default gateway, and DNS server address for a PC
to check information about a DNS name in the DNS server
to determine the active TCP connections on a PC
to identify where a packet was lost or delayed on a network*

38
How does a networked server manage requests from multiple clients for different services?

The server uses IP addresses to identify different services.
Each request is tracked through the physical address of the client.
The server sends all requests through a default gateway.
Each request is assigned source and destination port numbers.*

39
Which protocol translates a website name such as www.cisco.com into a network address?

FTP
DHCP
HTTP
DNS*

40


Refer to the exhibit. Consider the IP address configuration shown from PC1. What is a description of the default gateway address?

It is the IP address of the Router1 interface that connects the PC1 LAN to Router1.*
It is the IP address of Switch1 that connects PC1 to other devices on the same LAN.
It is the IP address of the Router1 interface that connects the company to the Internet.
It is the IP address of the ISP network device located in the cloud.

 

 


Read more ...

CCNA 1 v5.0 ITN Practice Final Exam Answers

Monday, March 23, 2015

Introduction to Networks  

ITN Practice Final – Introduction to Networks (Version 5.0)

1
A network administrator is designing a new network infrastructure that includes both wired and wireless connectivity. Under which situation would a wireless connection be recommended?

The end-user device requires a dedicated connection because of performance requirements.
The end-user device area has a high concentration of RFI.
The end-user device needs mobility when connecting to the network.*
The end-user device only has an Ethernet NIC.

2
A user is attempting to do an http://www.cisco.com/ without success. Which two configuration values must be set on the host to allow this access? (Choose two.)

WINS server
HTTP server
Netbios
DNS server*
default gateway*

3
Which two statements are correct in a comparison of IPv4 and IPv6 packet headers? (Choose two.)

The Source Address field name from IPv4 is kept in IPv6.*
The Version field from IPv4 is not kept in IPv6.
The Destination Address field is new in IPv6.
The Header Checksum field name from IPv4 is kept in IPv6.
The Time-to-Live field from IPv4 has been replaced by the Hop Limit field in IPv6.*

4
A user calls the help desk to report that a Windows XP workstation is unable to connect to the network after startup and that a popup window says “This connection has limited or no connectivity.” The technician asks the user to issue the ipconfig /all command. The user reports the IP address is 169.254.69.196 with subnet mask of 255.255.0.0 and nothing is displayed for the DNS server IP address. What is the cause of the problem?

The DNS server IP address needs to be configured.
The subnet mask was configured incorrectly.
The workstation is unable to obtain an IP address from a DHCP server.*
The workstation NIC has malfunctioned.

5
A network administrator has been issued a network address of 192.31.7.64/26. How many subnets of equal size could be created from the assigned /26 network by using a /28 prefix?

16
8
3
6
4*
14

6
Why are port numbers included in the TCP header of a segment?

to allow the receiving host to assemble the packet in the proper order
to enable a receiving host to forward the data to the appropriate application*
to determine which Layer 3 protocol should be used to encapsulate the data
to identify which switch ports should receive or forward the segment
to indicate the correct router interface that should be used to forward a segment

7


Refer to the exhibit. Which layer of the OSI model would format data in this way?

data link*
application
transport
network
physical

8


Open the PT Activity. Perform the tasks in the activity instructions and then answer the question.

What is the secret keyword that is displayed on the web page?

cisco
switch
frame
packet*
router

9
Which two types of applications rely on their traffic having priority over other traffic types through the network? (Choose two.)

email
voice*
file transfer
instant messaging
video*

10
Fill in the blank.
In dotted decimal notation, the IP address “172.25.0.126” is the last host address for the network 172.25.0.64/26.

11
Which devices should be secured to mitigate against MAC address spoofing attacks?

Layer 2 devices*
Layer 7 devices
Layer 3 devices
Layer 4 devices

12
Which IPv6 address notation is valid?

ABCD:160D::4GAB:FFAB
2001:0DB8::ABCD::1234
2001:DB8:0:1111::200*
2001::ABCD::

13
To revert to a previous configuration, an administrator issues the command copy tftp startup-config on a router and enters the host address and file name when prompted. After the command is completed, why does the current configuration remain unchanged?

A TFTP server can only be used to restore the Cisco IOS, not the router configuration.
The command should have been copy startup-config tftp.
The configuration should have been copied to the running configuration instead.*
The configuration changes were copied into RAM and require a reboot to take effect.

14
What are two characteristics of a scalable network? (Choose two.)

is not as reliable as a small network
grows in size without impacting existing users*
easily overloaded with increased traffic
suitable for modular devices that allow for expansion*
offers limited number of applications

15
Which two functions are primary functions of a router? (Choose two.)

packet switching*
microsegmentation
domain name resolution
flow control
path selection*

16
Using default settings, what is the next step in the router boot sequence after the IOS loads from flash?

Perform the POST routine.
Search for a backup IOS in ROM.
Load the bootstrap program from ROM.
Load the running-config file from RAM.
Locate and load the startup-config file from NVRAM.*

17
A router boots and enters setup mode. What is the reason for this?

Cisco IOS is missing from flash memory.
The POST process has detected hardware failure.
The IOS image is corrupt.
The configuration file is missing from NVRAM.*

18
What is an ISP?

It is a networking device that combines the functionality of several different networking devices in one.
It is an organization that enables individuals and businesses to connect to the Internet.*
It is a protocol that establishes how computers within a local network communicate.
It is a standards body that develops cabling and wiring standards for networking.

19

Subnet 192.168.1.32/27 will have a valid host range from 192.168.1.33 – 192.168.1.62 with the broadcast address as 192.168.1.63
Subnet 192.168.1.64/27 will have a valid host range from 192.168.1.65 – 192.168.1.94 with the broadcast address as 192.168.1.95
Subnet 192.168.1.96/27 will have a valid host range from 192.168.1.97 – 192.168.1.126 with the broadcast address as 192.168.1.127

20
What information is added during encapsulation at OSI Layer 3?

source and destination port number
source and destination MAC
source and destination IP address*
source and destination application protocol

21
What are two ways that TCP uses the sequence numbers in a segment? (Choose two.)

to limit the number of segments that can be sent out of an interface at one time
to determine if the packet changed during transit
to specify the order in which the segments travel from source to destination
to reassemble the segments at the remote location*
to identify missing segments at the destination*

22
Which statement describes a characteristic of the traceroute utility?

It is primarily used to test connectivity between two hosts.
It sends four Echo Request messages.
It identifies the routers in the path from a source host to a destination host.*
It utilizes the ICMP Source Quench messages.

23


Refer to the exhibit. HostA is attempting to contact ServerB. Which two statements correctly describe the addressing that HostA will generate in the process? (Choose two.)

A packet with the destination IP address of RouterA.
A frame with the destination MAC address of SwitchA.
A frame with the destination MAC address of RouterA.*
A packet with the destination IP address of RouterB.
A packet with the destination IP address of ServerB.*
A frame with the destination MAC address of ServerB.

24
For which three reasons was a packet-switched connectionless data communications technology used when developing the Internet? (Choose three.)

It requires that a data circuit between the source and destination be established before data can be transferred.
It can rapidly adapt to the loss of data transmission facilities.*
It efficiently utilizes the network infrastructure to transfer data.*
It allows for billing of network use by the amount of time a connection is established.
Data packets can travel multiple paths through the network simultaneously.*  

25
A network administrator is troubleshooting connectivity issues on a server. Using a tester, the administrator notices that the signals generated by the server NIC are distorted and not usable. In which layer of the OSI model is the error categorized?

data link layer
physical layer*
network layer
presentation layer

26
What will a host on an Ethernet network do if it receives a frame with a destination MAC address that does not match its own MAC address?

It will remove the frame from the media.
It will discard the frame.*
It will forward the frame to the next host.
It will strip off the data-link frame to check the destination IP address.

27
What are the three parts of an IPv6 global unicast address? (Choose three.)

broadcast address
global routing prefix*
subnet mask
subnet ID*
interface ID*

28
A PC that is communicating with a web server is utilizing a window size of 6,000 bytes when sending data and a packet size of 1,500 bytes. What byte of information will the web server acknowledge after it has received four packets of data from the PC?

1,500
5
6,001*
1,501
6,000

29
What three primary functions does data link layer encapsulation provide? (Choose three.)

error detection*
port identification
addressing*
path determination
IP address resolution
frame delimiting*

30


Refer to the exhibit. A network engineer is attempting to connect to a new router to perform the initial configuration. The engineer connects a rollover cable from the serial port of a PC to the Aux port on the router, then configures HyperTerminal as shown. The engineer cannot get a login prompt in HyperTerminal. What would fix the problem?

Move the cable to the router console port.*
Use a crossover cable instead of a rollover cable.
Connect to the Ethernet port on the PC.
Change connection settings to even parity.

31
The administrator of a branch office receives an IPv6 prefix of 2001:db8:3000::/52 from the corporate network manager. How many subnets can the administrator create?

1024
2048
4096*
8192
65536

32


Refer to the exhibit. Which two settings could be changed to improve security on the wireless network? (Choose two.)

wide channel
radio band
SSID*
network mode
SSID broadcast*
standard channel

33
Fill in the blank using a number.
The minimum Ethernet frame size is “64” bytes. Anything smaller than that should be considered a “runt frame.”

34


Refer to the exhibit. From global configuration mode, an administrator is attempting to create a message-of-the-day banner by using the command banner motd V Authorized access only! Violators will be prosecuted! V When users log in using Telnet, the banner does not appear correctly. What is the problem?

The symbol “!” signals the end of a banner message.
Message-of-the-day banners will only appear when a user logs in through the console port.
The banner message is too long.
The delimiting character appears in the banner message.*

35
Which router configuration mode would an administrator use to configure the router for SSH or Telnet login access?

interface
router
line*
privileged EXEC
global

36
Which service will translate private internal IP addresses into Internet routable public IP addresses?

NAT*
DNS
ARP
DHCP

37
What three statements describe features or functions of media access control? (Choose three.)

Ethernet utilizes CSMA/CD.*
802.11 utilizes CSMA/CD.
It uses contention-based access also known as deterministic access.
Data link layer protocols define the rules for access to different media.*
Controlled media access involves collision handling.
It is responsible for detecting transmission errors in transmitted data.*

38
Fill in the blank. Do not abbreviate. Use lower case.
Which interface configuration mode command puts a Layer 3 switch interface into Layer 3 mode?
no switchport ” ​

39


Open the PT activity. Perform the tasks in the activity instructions and then answer the question.

Which information is obtained from this command output?

10.20.20.3, non-authoritative answer*
10.20.20.4, non-authoritative answer
10.20.20.3, authoritative answer
10.20.20.4, authoritative answer

40
A small satellite office has been given the overall network number of 192.168.99.0/24 and the network technician can subdivide the network addresses as needed. The office needs network access for both wired and wireless devices. However, because of the security consideration, these two networks should be separate. The wired network will have 20 devices. The wireless network has a potential connection of 45 devices. Which addressing scheme would be most efficient for these two networks?

192.168.99.0/27
192.168.99.32/28

192.168.99.0/27
192.168.99.32/26

192.168.99.0/26
192.168.99.64/27 **************

192.168.99.0/28
192.168.99.64/26

192.168.99.0/28
192.168.99.16/28

41
What makes fiber preferable to copper cabling for interconnecting buildings? (Choose three.)

greater bandwidth potential*
limited susceptibility to EMI/RFI*
durable connections
easily terminated
greater distances per cable run*
lower installation cost

42
A network team is comparing physical WAN topologies for connecting remote sites to a headquarters building. Which topology provides high availability and connects some, but not all, remote sites?

point-to-point
mesh
partial mesh*
hub and spoke

43
What is the function of CSMA/CA in a WLAN?

It assures that clients are connected to the correct WLAN.
It describes the smallest building block of the WLAN.
It provides the mechanism for media access.*
It allows a host to move between cells without loss of signal.

44
A network administrator enters the service password-encryption command into the configuration mode of a router. What does this command accomplish?

This command provides an exclusive encrypted password for external service personnel who are required to do router maintenance.
This command enables a strong encryption algorithm for the enable secret password command.
This command encrypts passwords as they are transmitted across serial WAN links.
This command prevents someone from viewing the running configuration passwords.*
This command automatically encrypts passwords in configuration files that are currently stored in NVRAM.

45
Fill in the blank.

A nibble consists of “4” bits.

46

Place the options in the following order:
[+] cables connecting rooms to wiring closets
[+] desktop PC in a classroom
[#] IP address of a server
[#] a switch located in a classroom

[+] Order does not matter within this group.
[#] Order does not matter within this group.

47
Why are the paired wires twisted in a CAT5 cable?

to improve the mechanical strength
to provide eletromagnetic noise cancellation*
to facilitate cable termination in the connector
to extend the signaling length

48
A medium-sized business is researching available options for connecting to the Internet. The company is looking for a high speed option with dedicated, symmetric access. Which connection type should the company choose?

cable modem
DSL
satellite
leased line*
dialup

49


Refer to the exhibit. What will be the result of entering this configuration the next time a network administrator connects a console cable to the router and no additional commands have been entered?

The administrator will be presented with the R1> prompt.*
The administrator will be required to enter Cisco789.
The administrator will be required to enter Cisco234.
The administrator will be required to enter Cisco123.

50
The ARP table in a switch maps which two types of address together?

Layer 2 address to a Layer 4 address
Layer 3 address to a Layer 2 address*
Layer 4 address to a Layer 2 address
Layer 3 address to a Layer 4 address

51
Which is a function of the show ip route command when used as a tool for troubleshooting network connectivity?

shows the IP address of the next hop router for each route*
lists the IP addresses of all hops the traffic will pass through to reach the destination network
shows the incoming and outgoing interfaces the traffic will go through in order to reach the destination network
indicates the point of failure in the connection

52


Refer to the graphic. What is the effect of setting the security mode to WEP on the Linksys integrated router?

It encrypts data between the wireless client and the access point.*
It identifies the wireless LAN.
It allows the access point to inform clients of its presence.
It translates an internal address or group of addresses into an outside, public address.
It translates IP addresses into easy-to-remember domain names.

53

54
What are two actions performed by a Cisco switch? (Choose two.)

building a routing table that is based on the first IP address in the frame header
utilizing the MAC address table to forward frames via the destination MAC address*
forwarding frames with unknown destination IP addresses to the default gateway
using the source MAC addresses of frames to build and maintain a MAC address table*
examining the destination MAC address to add new entries to the MAC address table

55


Refer to the exhibit. Using VLSM, what is the largest and smallest subnet mask required on this network in order to minimize address waste?

255.255.254.0 and 255.255.255.252*
255.255.255.128 and 255.255.255.224
255.255.254.0 and 255.255.255.224
255.255.255.0 and 255.255.255.252

56


Refer to the exhibit. An administrator is testing connectivity to a remote device with the IP address 10.1.1.1. What does the output of this command indicate?

The connection timed out while waiting for a reply from the remote device.
A ping packet is being blocked by a security device along the path.
A router along the path did not have a route to the destination.*
Connectivity to the remote device was successful.

57
What is one purpose of the TCP three-way handshake?

synchronizing sequence numbers between source and destination in preparation for data transfer*
determining the IP address of the destination host in preparation for data transfer
sending echo requests from the source to the destination host to establish the presence of the destination
requesting the destination to transfer a binary file to the source

NEW
1. A particular email site does not appear to be responding on a Windows 7 computer. What command could the technician use to show any cached DNS entries for this web page?
ipconfig /all
arp -a
ipconfig /displaydns*
nslookup

2. A frame is transmitted from one networking device to another. Why does the receiving device check the FCS field in the frame?
to determine the physical address of the sending device
to verify the network layer protocol information
to check the frame for possible transmission errors*
to compare the interface media type between the sending and receiving ends
to verify that the frame destination matches the MAC address of the receiving device

3.  Which type of wireless security is easily compromised?
EAP
PSK
WEP
WPA

IMAGE:
Router# sh r
%ambiguous command: ‘sh r’

4. Refer to the exhibit. An administrator is trying to view the current configuration on this switch but receives the error message that is displayed. What does this error indicate?
The command does not exist.
The administrator does not have the required level of access to use this command.
Not enough characters were entered for the interpreter to recognize the command.

5. Which range of link-local addresses can be assigned to an IPv6-enabled interface?​
FEC0::/10​
FEBF::/10*
FDEE::/7​
FF00::/8​

6. On a point-to-point network, which communication type is used when two devices can both transmit and receive but not at the same time?
half-duplex
deterministic
controlled access
full-duplex

7. What is the purpose of ICMP messages?
to inform routers about network topology changes
to ensure the delivery of an IP packet
to provide feedback of IP packet transmissions
to monitor the process of a domain name to IP address resolution

8. An administrator needs to upgrade the IOS in a router to a version that supports new features. Which factor should the administrator consider before performing the upgrade?
NVRAM must be erased before the new IOS can be installed.
The old IOS should be backed up to NVRAM so that it is not lost during a power failure.
The new IOS might require more RAM to function properly.
The old IOS must be removed first.

9. What will happen if the default gateway address is incorrectly configured on a host?
The host cannot communicate with other hosts in the local network.
The switch will not forward packets initiated by the host.
The host will have to use ARP to determine the correct address of the default gateway.
The host cannot communicate with hosts in other networks.
A ping from the host to 127.0.0.1 would not be successful.

10. Which connection provides a secure CLI session with encryption to a Cisco router?
a console connection
an AUX connection
a Telnet connection
an SSH connection

11. A high school in New York (school A) is using videoconferencing technology to establish student interactions with another high school (school B) in Russia. The videoconferencing is conducted between two end devices through the Internet. The network administrator of school A configures the end device with the IP address 192.168.25.10. The administrator sends a request for the IP address for the end device in school B and the response is 192.168.25.10. The administrator knows immediately that this IP will not work. Why?
This is a loopback address.
This is a link-local address.
There is an IP address conflict.
This is a private IP address.

 

 

 


Read more ...

CCNA 1 Routing and Switching: Introduction to Networks Final Exam – 26 new questions

Monday, March 23, 2015

1  Refer to the exhibit.

The network administrator enters these commands into the R1 router:

R1# copy running-config tftp
Address or name of remote host [ ]?

When the router prompts for an address or remote host name, what IP address should the administrator enter at the prompt?

192.168.9.254

192.168.10.1

192.168.10.2

192.168.11.254

192.168.11.252

 

2 Which three statements characterize the transport layer protocols? (Choose three.)

TCP uses port numbers to provide reliable transportation of IP packets.

TCP and UDP port numbers are used by application layer protocols.

TCP uses windowing and sequencing to provide reliable transfer of data.

TCP is a connection-oriented protocol. UDP is a connectionless protocol.

UDP uses windowing and acknowledgments for reliable transfer of data.

 

3 What is the purpose of ICMP messages?

to inform routers about network topology changes

to ensure the delivery of an IP packet

to monitor the process of a domain name to IP address resolution

to provide feedback of IP packet transmissions

 

4 A technician uses the ping 127.0.0.1 command. What is the technician testing?

connectivity between a PC and the default gateway

connectivity between two adjacent Cisco devices

physical connectivity of a particular PC and the network

the TCP/IP stack on a network host

connectivity between two PCs on the same network

 

5 What will a Layer 2 switch do when the destination MAC address of a received frame is not in the MAC table?

It notifies the sending host that the frame cannot be delivered.

It initiates an ARP request.

It forwards the frame out of all ports except for the port at which the frame was received.

It broadcasts the frame out of all ports on the switch.

 

6 What is a characteristic of the LLC sublayer?

It places information in the frame that allows multiple Layer 3 protocols to use the same network interface and media.

It provides delimitation of data according to the physical signaling requirements of the medium.

It defines software processes that provide services to the physical layer.

It provides the logical addressing required that identifies the device.

 

7
On which switch interface would an administrator configure an IP address so that the switch can be managed remotely?

VLAN 1

console 0

vty 0

FastEthernet0/1

 

8
A network engineer is measuring the transfer of bits across the company backbone for a mission critical database application. The engineer notices that the network throughput appears lower than the bandwidth expected. Which three factors could influence the differences in throughput? (Choose three.)

the reliability of the gigabit Ethernet infrastructure of the backbone

the amount of traffic that is currently crossing the network

the type of traffic that is crossing the network

the sophistication of the encapsulation method applied to the data

the bandwidth of the WAN connection to the Internet

the latency that is created by the number of network devices that the data is crossing

 

9
When applied to a router, which command would help mitigate brute-force password attacks against the router?

service password-encryption

login block-for 60 attempts 5 within 60

banner motd $Max failed logins = 5$

exec-timeout 30

 

10
Which two statements correctly describe a router memory type and its contents? (Choose two.)

ROM is nonvolatile and contains basic diagnostic software.

FLASH is nonvolatile and contains a limited portion of the IOS​.

ROM is nonvolatile and stores the running IOS.

RAM is volatile and stores the IP routing table.

NVRAM is nonvolatile and stores other system files.

 

11
Which two components are necessary for a wireless client to be installed on a WLAN? (Choose two.)

custom adapter

wireless bridge

media

wireless NIC

crossover cable

wireless client software

 

12  Launch PT –  Hide and Save PT

Open the PT activity. Perform the tasks in the activity instructions and then fill in the blank.

The Server0 message is .​ ”   winner   ”

 

13
A host is accessing a Web server on a remote network. Which three functions are performed by intermediary network devices during this conversation? (Choose three.)

applying security settings to control the flow of data

notifying other devices when errors occur

regenerating data signals

acting as a client or a server

serving as the source or destination of the messages

providing a channel over which messages travel

 

14

15

16
Which address on a PC does not change, even if the PC is moved to a different network?

IP address

logical address

MAC address

default gateway address

 

17
What will happen if the default gateway address is incorrectly configured on a host?

A ping from the host to 127.0.0.1 would not be successful.

The host will have to use ARP to determine the correct address of the default gateway.

The host cannot communicate with other hosts in the local network.

The host cannot communicate with hosts in other networks.

The switch will not forward packets initiated by the host.

 

18
A host PC has just booted and is attempting to lease an address through DHCP. Which two messages will the client typically broadcast on the network? (Choose two.)

DHCPREQUEST

DHCPOFFER

DHCPDISCOVER

DHCPNACK

DHCPACK

 

19

Refer to the exhibit. An administrator wants to change the name of a brand new switch, using the hostname command as shown. What prompt will display after the command is issued?​

Switch#

My(config)#​

My Switch(config)#​

Switch(config)#​

MySwitch(config)#​

 

20
After making configuration changes, a network administrator issues a copy running-config startup-config command in a Cisco switch. What is the result of issuing this command?

The configuration changes will be removed and the original configuration will be restored.

The new configuration will be stored in flash memory.

The current IOS file will be replaced with the newly configured file.

The new configuration will be loaded if the switch is restarted.

 

21

Refer to the exhibit.A TCP segment from a server has been captured by Wireshark, which is running on a host. What acknowledgement number will the host return for the TCP segment that has been received?

2921

250

2

306

21

 

22
Which technology provides a solution to IPv4 address depletion by allowing multiple devices to share one public IP address?

ARP

DNS

SMB

DHCP

HTTP

NAT

 

  23 What is the purpose of the routing process?

to encapsulate data that is used to communicate across a network

to select the paths that are used to direct traffic to destination networks

to convert a URL name into an IP address

to provide secure Internet file transfer

to forward traffic on the basis of MAC addresses

 

  24 Three bank employees are using the corporate network. The first employee uses a web browser to view a company web page in order to read some announcements. The second employee accesses the corporate database to perform some financial transactions. The third employee participates in an important live audio conference with other corporate managers in branch offices. If QoS is implemented on this network, what will be the priorities from highest to lowest of the different data types?

audio conference, financial transactions, web page

financial transactions, audio conference, web page

audio conference, web page, financial transactions

financial transactions, web page, audio conference

 

25
A home user is looking for an ISP connection that provides high speed digital transmission over regular phone lines. What ISP connection type should be used?

cell modem

dial-up

cable modem

satellite

DSL

 

26
Which connection provides a secure CLI session with encryption to a Cisco switch?

a Telnet connection

an SSH connection

a console connection

an AUX connection

 

27 What is the purpose of the network security accounting function?

to provide challenge and response questions

to require users to prove who they are

to determine which resources a user can access

to keep track of the actions of a user

 

28


Refer to the exhibit. A network administrator is configuring access control to switch SW1. If the administrator uses Telnet to connect to the switch, which password is needed to access user EXEC mode?

lineconin

linevtyin

letmein

secretin

 

29
Which publicly available resources describe protocols, processes, and technologies for the Internet but do not give implementation details?

IEEE standards

Request for Comments

IRTF research papers

protocol models

 

  30 A PC is configured to obtain an IP address automatically from network 192.168.1.0/24. The network administrator issues the arp –a command and notices an entry of 192.168.1.255 ff-ff-ff-ff-ff-ff. Which statement describes this entry?

This entry refers to the PC itself.

This entry maps to the default gateway.

This is a static map entry.

This is a dynamic map entry.

 

31 Which subnet would include the address 192.168.1.96 as a usable host address?

192.168.1.64/26

192.168.1.32/28

192.168.1.32/27

192.168.1.64/29

 

32
A particular website does not appear to be responding on a Windows 7 computer. What command could the technician use to show any cached DNS entries for this web page?

ipconfig /all

ipconfig /displaydns

arp -a

nslookup

 

33 Which type of wireless security generates dynamic encryption keys each time a client associates with an AP?

WPA

PSK

WEP

EAP

 

34
A frame is transmitted from one networking device to another. Why does the receiving device check the FCS field in the frame?

to compare the interface media type between the sending and receiving ends

to determine the physical address of the sending device

to verify that the frame destination matches the MAC address of the receiving device

to check the frame for possible transmission errors

to verify the network layer protocol information

 

35

Refer to the exhibit. Which IP addressing scheme should be changed?

Site 1

Site 3

Site 4

Site 2

 

36
What is the effect of configuring the ipv6 unicast-routing command on a router?

to assign the router to the all-nodes multicast group

to permit only unicast packets on the router

to enable the router as an IPv6 router

to prevent the router from joining the all-routers multicast group

 

37
Which three IP addresses are private ? (Choose three.)

10.1.1.1

172.16.4.4

224.6.6.6

192.168.5.5

172.32.5.2

192.167.10.10

 

38

Refer to the exhibit. Consider the IP address configuration shown from PC1. What is a description of the default gateway address?

It is the IP address of the Router1 interface that connects the company to the Internet.

It is the IP address of the ISP network device located in the cloud.

It is the IP address of Switch1 that connects PC1 to other devices on the same LAN.

It is the IP address of the Router1 interface that connects the PC1 LAN to Router1.

 

39 During normal operation, from which location do most Cisco switches and routers run the IOS?

flash

RAM

NVRAM

disk drive

 

40
What is an important function of the physical layer of the OSI model?

It encodes frames into electrical, optical, or radio wave signals.

It accepts frames from the physical media.

It encapsulates upper layer data into frames.

It defines the media access method performed by the hardware interface.

 

41
Which procedure is used to reduce the effect of crosstalk in copper cables?

wrapping the bundle of wires with metallic shielding

avoiding sharp bends during installation

requiring proper grounding connections

designing a cable infrastructure to avoid crosstalk interference

twisting opposing circuit wire pairs together

 

42
What are the three primary functions provided by Layer 2 data encapsulation? (Choose three.)

placement and removal of frames from the media

detection of errors through CRC calculations

conversion of bits into data signals

delimiting groups of bits into frames

data link layer addressing

error correction through a collision detection method

session control using port numbers

 

43
What method is used to manage contention-based access on a wireless network?

token passing

CSMA/CD

CSMA/CA

priority ordering

 

44
What happens when part of an Internet radio transmission is not delivered to the destination?

A delivery failure message is sent to the source host.

The part of the radio transmission that was lost is re-sent.

The transmission continues without the missing portion.

The entire transmission is re-sent.

 

45
What is the auto-MDIX feature on a switch?

the automatic configuration of full-duplex operation over a single Ethernet copper or optical cable

the automatic configuration of an interface for a straight-through or a crossover Ethernet cable connection

the ability to turn a switch interface on or off accordingly if an active connection is detected

the automatic configuration of an interface for 10/100/1000 Mb/s operation

 

46
Which function is provided by TCP?

detection of missing packets

communication session control

path determination for data packets

data encapsulation

 

47
How does a Layer 3 switch differ from a Layer 2 switch?

A Layer 3 switch learns the MAC addresses that are associated with each of its ports. However, a Layer 2 switch does not.

A Layer 3 switch maintains an IP address table instead of a MAC address table.

A Layer 3 switch supports VLANs, but a Layer 2 switch does not.

An IP address can be assigned to a physical port of a Layer 3 switch. However, this is not supported in Layer 2 switches.

 

48
Which two notations are useable nibble boundaries when subnetting in IPv6? (Choose two.)

/68

/62

/66

/64

/70

 

49
What is the purpose of having a converged network?

to reduce the cost of deploying and maintaining the communication infrastructure

to provide high speed connectivity to all end devices

to make sure that all types of data packets will be treated equally

to achieve fault tolerance and high availability of data network infrastructure devices

 

50


Refer to the exhibit. A ping to PC3 is issued from PC0, PC1, and PC2 in this exact order. Which MAC addresses will be contained in the S1 MAC address table that is associated with the Fa0/1 port?

just the PC0 MAC address

PC0, PC1, and PC2 MAC addresses

just the PC2 MAC address​

just PC0 and PC1 MAC addresses

just the PC1 MAC address

 

51
Which field in an IPv4 packet header will typically stay the same during its transmission?

Packet Length

Destination Address

Flag

Time-to-Live

 

52
What two preconfigured settings that affect security are found on most new wireless routers? (Choose two.)

MAC filtering enabled

default administrator password

WEP encryption enabled

PSK authentication required

broadcast SSID

 

53
Which parameter does the router use to choose the path to the destination when there are multiple routes available?

the higher metric value that is associated with the destination network

the lower metric value that is associated with the destination network

the higher gateway IP address to get to the destination network

the lower gateway IP address to get to the destination network

 

54

Refer to the exhibit. What is the significance of the asterisk (*) in the exhibited output?

An asterisk designates that the file system has at least one file that uses that file system.

The asterisk designates which file system is the default file system.

An asterisk indicates that the file system is bootable.

The asterisk shows which file system was used to boot the system.

 

55


56

Fill in the blank.

During data communications, a host may need to send a single message to a specific group of destination hosts simultaneously. This message is in the form of a    ”  multicast    ”    message.

 

57

An administrator uses the Ctrl-Shift-6 key combination on a switch after issuing the ping command. What is the purpose of using these keystrokes?

to interrupt the ping process

to restart the ping process

to allow the user to complete the command

to exit to a different configuration mode

 

58


Refer to the exhibit. Which area would most likely be an extranet for the company network that is shown?

area A

area D

area C

area B

 

59

60

61
In which default order will a router search for startup configuration information?

setup mode, NVRAM, TFTP

NVRAM, TFTP, setup mode

NVRAM, RAM, TFTP

TFTP, ROM, NVRAM

flash, ROM, setup mode

 

62

Launch PT –  Hide and Save PT

Open the PT Activity. Perform the tasks in the activity instructions and then answer the question.
Which IPv6 address is assigned to the Serial0/0/0 interface on RT2?

2001:db8:abc:1::1

2001:db8:abc:5::1

2001:db8:abc:5::2

2001:db8:abc:10::15

 

63
What is contained in the trailer of a data-link frame?

physical address

data

error detection*

logical address

64

New Questions

1.
1
Refer to the exhibit. What is the maximum TIL value that is used to reach the destination www.cisco.com?

11
12
13*
14

2.
Which IPv4 address can be pinged to test the internal TCP/IP operation of a host?

192.168.1.1
0.0.0.0
0.0.1
255.255.255.255
127.0.0.1*

3.
A host is accessing a Telnet server on a remote network. Which three functions are performed by intermediary network devices during this conversation? (Choose three.)

regenerating data signals*
acting as a client or a server
providing a channel over which messages travel
applying security settings to control the ftow of data*
notifying other devices when errors occur*
serving as the source or destination of the messages

4.
Which statement is true about DHCP operation?

When a device that is configured to use DHCP boots, the client broadcasts a DHCPDISCOVER message to identify any available DHCP servers on the networK.*
A client must wait for lease expiration before it sends another DHCPREOUEST message.
The DHCPDISCOVER message contains the IP address and sub net masK to be assigned, the IP address of the DNS server, and the IP address of the default gateway.
If the client receives several DHCPOFFER messages from different servers, it sends a unicast DHCPREOUEST message to the server from which it chooses to obtain the IP information.

5.
Which type of wireless security is easily compromised?

EAP
PSK
WEP*
WPA

6.
What types of addresses make up the majority of addresses within the /8 block 1Pv4 bit space?

multicast addresses
private addresses
public addresses*
experimental addresses

7.
Which protocol supports rapid delivery of streaming media?

Video over Internet Protocol
Real-Time Transport Protocol*
Transmission Control Protocol
Secure File Transfer Protocol

8.
A network administrator notices that the throughput on the network appears lower than expected when compared to the end-to-end network bandwidth. Which three factors can
explain this difference? (Choose three.)

the amount of traffic*
the type of data encapsulation in use
the type of traffic*
the number and type of network devices that the data is crossing*
the bandwidth of the connection to the ISP
the reliability of the network backbone

9.
Which group of IPv6 addresses cannot be allocated as a host source address?

FECO::/10
FEBF::/10
FF00::/8*
FDFF::/7

10.
A host PC is attempting to lease an address through DHCP. What message is sent by the server to the client know it is able to use the provided IP information?

DHCPDISCOVER
DHCPOFFER*
DHCPPREQUEST
DHCPACK
DHCPNACK

New Questions

1 What is the protocol that is used to discover a physical address from a known logical address and what message type does it use?

-ARP, broadcast*

2 Which group of IPv6 addresses cannot be allocated as a host source address??

-FF00::/8 (multicast)*

3 A network administrator is configuring access control to switch SW1. If the administrator uses console line to connect to the switch, which password is needed to access user EXEC mode?

-lineconin*

New Questions December  2014 By  Erian

1  A _________ topology influences the type of network framing and media access control that will be used. (logical*)

2  Which two statements describe the characteristics of fiber-optic cabling? (Choose two.)
Fiber-optic cabling uses LEDs for single-mode cables and laser technology for multimode cables.
Fiber-optic cabling does not conduct electricity.*
Fiber-optic cabling has high signal loss.
Fiber-optic cabling is primarily used as backbone cabling.*
Multimode fiber-optic cabling carries signals from multiple sending devices.

3 Which two protocols function at the internet layer? (Choose two.)
ARP
ICMP*
BOOTP
PPP
IP*

4  Which firewall technique blocks incoming packets unless they are responses to internal requests?
URL filtering
port filtering
application filtering
stateful packet inspection*

5  Consider the following range of addresses:
2001:0DB8:BC15:00A0:0000::
2001:0DB8:BC15:00A1:0000::
2001:0DB8:BC15:00A2:0000::
…
2001:0DB8:BC15:00AF:0000::
The prefix-length for the range of addresses is ___. (/60*)

6  What three application layer protocols are part of the TCP/IP protocol suite? (Choose three.)
FTP*
ARP
NAT
DHCP*
PPP
DNS*

7  Which communication tool allows real-time collaboration?
weblog
wiki
e-mail
instant messaging*

8  Which of the following are primary functions of a router? (Choose two.)
packet switching*
microsegmentation
flow control
path selection*
domain name resolution

9  __________ is a best-effort, connectionless application layer protocol that is used to transfer files. (TFTP*)

**************************************************************************

I can not give you the exact wording here, but I will give you the idea of what they were asking.

10

Can not connect to webpages, dns is ok. Issue is: Default Gateway.*

11

It will give 4 options about ping, the correct one is: The PC2 will be able to ping 192.168.1.1*

12

The question is from where is the system image being loaded. Answer: flash.*

13

It will ask what is the issue. Answer is: The user has to be in privileged EXEC mode to use that command.*

Thank you so much Erian  

New Questions By ALEX  

1 What are three characteristics of multicast transmission? (Choose three.)

A single packet can be sent to a group of hosts.*

Multicast messages map lower layer addresses to upper layer addresses.*

Multicast transmission can be used by routers to exchange routing information.*

Computers use multicast transmission to request IPv4 addresses.

The source address of a multicast transmission is in the range of 224.0.0.0 to 224.0.0.255.

2 At a minimum, which address is required on IPv6-enabled interfaces?

global unicast

link-local*

site local

unique local

3 Which frame forwarding method receives the entire frame and performs a CRC check to detect errors before forwarding the frame?

fragment-free switching

fast-forward switching

store-and-forward switching*

cut-through switching


Read more ...