CONTOH SOAL UJIAN CISCO CERTIFIED NETWORK ASSOCIATE CCNA 1
SOPY MAHENDRA 09090803041
DOSEN: CANDRA SETIAWAN, ST. CCNA
TEKNISI KOMPUTER JARINGAN FAKULTAS ILMU KOMPUTER UNIERSITAS UNIER SITAS SRIWI S RIWIJA JAY YA !009
Chapter 1 Options With Highlight Colours are Correct Answer 1. Which of the following descriptions are true regarding the management connections on a Cisco router? (Choose three.) • They are non-network connections. • They are used to connect the router to the rest of the production network. • They are synchronous serial ports. • They are used for initial router configuration. • They are asynchronous serial ports. • They are accessed using their assigned IP address. 2. The console port can be used for which of the following? (Choose three.) • debugging. • password recovery. • routing data between networks. • troubleshooting. • connecting one router to another. 3. Which of the following describes the function of a W!? • connects peripherals in a single location. • connects multiple networks in a single building. • provides connectivity on a LAN. • provides connectivity over a large geographic area. ". n internetwor# must include which of the following? (Choose three.) • switching. • static addressing. • IT! standardi"ation. • dynamic or static routing. • consistent end-to-end addressing. $. %C Compan& 'ust purchased three new routers to start their compan& networ#. Which items are needed to establish a terminal session between a C and the router for the initial configuration? (Choose three.) • straight-through cable. • terminal emulation software. • rollover cable. • #$-%& to '(-) connector. • *.+& cable. .Terminal emulation software* such as +&perTerminal* can be used to configure a router. Which of the following +&perTerminal options shown in the graphic are correctl& set to allow configuration of a Cisco router? (Choose three.) • bits per second. • data bits. • parity. • stop bits. • flow control.
Chapter 1 Options With Highlight Colours are Correct Answer 1. Which of the following descriptions are true regarding the management connections on a Cisco router? (Choose three.) • They are non-network connections. • They are used to connect the router to the rest of the production network. • They are synchronous serial ports. • They are used for initial router configuration. • They are asynchronous serial ports. • They are accessed using their assigned IP address. 2. The console port can be used for which of the following? (Choose three.) • debugging. • password recovery. • routing data between networks. • troubleshooting. • connecting one router to another. 3. Which of the following describes the function of a W!? • connects peripherals in a single location. • connects multiple networks in a single building. • provides connectivity on a LAN. • provides connectivity over a large geographic area. ". n internetwor# must include which of the following? (Choose three.) • switching. • static addressing. • IT! standardi"ation. • dynamic or static routing. • consistent end-to-end addressing. $. %C Compan& 'ust purchased three new routers to start their compan& networ#. Which items are needed to establish a terminal session between a C and the router for the initial configuration? (Choose three.) • straight-through cable. • terminal emulation software. • rollover cable. • #$-%& to '(-) connector. • *.+& cable. .Terminal emulation software* such as +&perTerminal* can be used to configure a router. Which of the following +&perTerminal options shown in the graphic are correctl& set to allow configuration of a Cisco router? (Choose three.) • bits per second. • data bits. • parity. • stop bits. • flow control.
,. Which of the following de-ices are used in the construction of a W!? (Choose three.) • hubs. • routers. • communication servers. • transceivers. • modems. • multi-port repeaters. . Which of the following are functions of /0? (Choose three.) • contains startup configuration file. • stores routing table. • holds fast switching cache. • retains contents when power is removed. • stores running configuration file. . Wh& is a console connection to a router or switch preferred when troubleshooting? (Choose two.) • can be accessed remotely. • does not depend on network services. • displays startup and error messages by default. • does not re,uire special components. 1. Which basic components do a router and a standard des#top C ha-e in common? (Choose three.) • P. • hard drive. • input/output interfaces. • keyboard. • monitor. • system bus. 11. uring the initial configuration of a 2 series Cisco router* which cable is re4uired for connecting a C to the console port? • twisted. • crossover. • rollover. • straight. 12. router is composed of man& internal components. Which of the following components stores a cop& of the router5s configuration file? • metal-o0ide memory. • read only memory. • flash memory. • non-volatile random access memory. 13. What contains the instructions that a router uses to control the f low of traffic through its interfaces? • packet configuration. • configuration files. • flash memory. • internal components.
1". 6e-eral 7thernet hosts on a 8! need the gatewa& ser-ices of a Cisco 2$ series router. Which of the following would be needed to ph&sicall& connect a router to all of the hosts on the 8!? (Choose two.) • a crossover cable between the transceiver on a router and a switch. • a crossover cables between a switch and hosts on a LAN. • a straight-through cable between the au0iliary port on a router and a switch. • a rollover cable between the console port on a router and a switch. • straight-through cables between a switch and hosts on a LAN. • a straight-through cable between the transceiver on a router and a switch. 1$. Which router component holds the configuration file when power is lost? • volatile random access memory. • read only memory. • non-volatile random access memory. • flash memory. 1. Which of the following la&ers of the 96: model are incorporated in W! standards? (Choose two.)
physical layer. • application layer. • transport layer. • data link layer. • session layer layer.. 1,. Which of the following are true regarding router interfaces? (Choose three.) • provide temporary memory for the router configuration files. • connect the router to the network for packet entry and e0it. • can be on the motherboard or a separate module. • hold the I12 image. • connect the router to LANs and 3ANs. 1. Which of the following tas#s can be accomplished through a management connection on a router? (Choose three.) • troubleshooting problems. • monitoring the s&stem. • capturing 8! data pac#ets. • configuring the router. • routing data pac#ets. 1. What do routers use to select the best path for outgoing data pac#ets? • / tables. • bridging tables. • routing tables. • switching tables. 2. Which of the following are functions of !;/0? (Choose two.) • stores the routing table. • retains contents when power is remo-ed. • stores the startup configura configuration tion file. • contains the running configuration file. • stores the / table. 21. 6elect the statements that correctl& describe flash memor& in a 2 series router? (Choose two.) • holds the startup configuration configuration b& default. • can be upgraded with single in
Chapter 2 1. Which two la&ers of the 96: model ha-e the same functions as the TC=: model !etwor# ccess 8a&er? (Choose two.) • !etwor# • Transport
• h&sical
• ata 8in#
• 6ession
2. What is a primar& function of the trailer information added b& the data lin# la&er encapsulation? • supports error detection • ensures ordered arri-al of data • pro-ides deli-er& to correct destination • identifies the de-ices on the local networ# • assists intermediar& de-ices with processing and path selection 3. uring the encapsulation process* what occurs at the data lin# la&er? • !o address is added. • The logical address is added. • The ph&sical address is added. • The process port number is added. ". What de-ice is considered an intermediar& de-ice? • file ser-er
• : phone
• laptop
• printer
• switch
$.Which la&er encapsulates the segment into pac#ets? • ph&sical • data lin#
• networ#
• transport
. Which statements correctl& identif& the role of intermediar& de-ices in the networ#? (Choose three.) • determine pathwa&s for data • initiate data communications • retime and retransmit data signals • originate the flow of data • manage data flows • final termination point for data flow ,. What can be identified b& e>amining the networ# la&er header? • the destination de-ice on the local media • the path to use to reach the destination host • the bits that will be transferred o-er the media • the source application or process creating the data . What is the proper order of the la&ers of the 96: model from the highest la&er to the lowest la&er? • ph&sical* networ#* application* data lin#* presentation* session* transport • application* ph&sical* session* transport* networ#* data lin#* presentation • application* presentation* ph&sical* session* data lin#* transport* networ# • application* presentation* session* transport* networ#* data lin#* ph&sical • presentation* data lin#* session* transport* networ#* ph&sical* application . /efer to the e>hibit. Which three labels correctl& identif& the networ# t&pes for the networ# segments that are shown? (Choose three.) • !etwor# W! • !etwor# % W! • !etwor# C << W! • !etwor# << 8!
• !etwor# C 8! • !etwor# % << 0!
1. What are the #e& functions of encapsulation? (Choose three.) • allows modification of the original data before transmission • identifies pieces of data as part of the same communication • enables consistent networ# paths for communication • ensures that data pieces can be directed to the correct recei-ing end de-ice • enables the reassembl& of complete messages • trac#s dela& between end de-ices 11. /efer to the e>hibit. Which networ#ing term describes the data interlea-ing process represented in the graphic? • piping
• @ • streaming
• multiple>ing
• encapsulation
12. What is a @? • corruption of a frame during transmission • data reassembled at the destination • retransmitted pac#ets due to lost communication • a la&er specific encapsulation 13. /efer to the e>hibit. ACell A at : address 1...3" has established an : session with A: hone 1A at : address 1,2.1.1.13. %ased upon the graphic* which de-ice t&pe best describes the function of wireless de-ice ACell ?A • the destination de-ice
• an end de-ice
• an intermediate de-ice
• a media de-ice
1". /efer to the e>hibit. W hich set of de-ices contains onl& end de-ices? • * C* • %* 7* B* + • C* * B* +* :* • * 7* D* +* :* • 7* D* +* :* 1$. /efer to the e>hibit. Which term correctl& identifies the de-ice t&pe that is included in the green area? • source
• end
• transfer • intermediar&
1. Which three statements best describe a 8ocal rea !etwor# (8!)? (Choose three.) • 8! is usuall& in a single geographical area. • The networ# is administered b& a single organiEation. • The connection between segments in the 8! is usuall& through a leased connection. • The securit& and access control of the networ# are controlled b& a ser-ice pro-ider. • 8! pro-ides networ# ser-ices and access to applications for users within a common organiEation. • 7ach end of the networ# is generall& connected to a Telecommunication 6er-ice ro-ider (T6). 1,. /efer to the e>hibit. W hat t&pe of networ# is shown? • W! • 0! • 8! • W8! 1. What is the purpose of the TC=: !etwor# ccess la&er? • path determination and pac#et switching • data representation* encoding* and control • reliabilit&* flow control* and error detection • detailing the components that ma#e up the ph&sical lin# and how to access it • the di-ision of segments into pac#ets
1. Which characteristic correctl& refers to end de-ices in a networ#? • manage data flows • originate data flow • retime and retransmit data signals • determine pathwa&s for data 2. What is the primar& purpose of 8a&er " port assignment? • to identif& de-ices on the local media • to identif& the hops between source and destination • to identif& to the intermediar& de-ices the best path through the networ# • to identif& the source and destination end de-ices that are communicating • to identif& the processes or ser-ices that are communicating within the end de-ices 21. 6elect the statements that are correct concerning networ# protocols. (Choose three.) • define the structure of la&er specific @5s • dictate how to accomplish la&er functions • outline the functions necessar& for communications between la&ers • limit hardware compatibilit& • re4uire la&er dependent encapsulations • eliminate standardiEation among -endors
Chapter 3 Options With Highlight Colours are Correct Answer 1. What application la&er protocol is commonl& used to support for file transfers between a client and a ser-er? • +T08
• +TT
• DT
• Telnet
2. What are two forms of application la&er software? (Choose two.) • applications
• dialogs
• re4uests
• ser-ices
• s&nta>
3. networ# administrator is designing a networ# for a new branch office of twent&
• !6
• Telnet • 60T
. What three protocols operate at the pplication la&er of the 96: model? (Choose three.) • / • !6
•
• 60T
• 9
• :C0
,. What are three properties of peer
• :0
• 0T
• 9 • 60T • 0@
1. s compared to 66+* what is the primar& disad-antage of telnet? • not widel& a-ailable • does not support encr&ption • consumes more networ# bandwidth • does not support authentication 11. Which statements are correct concerning the role of the 0T in handling email? (Choose three.) • routes email to the 0 on other ser-ers • recei-es email from the client5s 0@ • recei-es email -ia the 93 protocol • passes email to the 0 for final deli-er& • uses 60T to route email between ser-ers • deli-ers email to clients -ia the 93 protocol 12. Which two protocols are used to control the transfer of web resources from a web ser-er to a client browser? (Choose two.) • 6
• DT
+T08
• +TT
• +TT6
• :
13. small home networ# has been installed to interconnect three computers together for gaming and file sharing. What two properties represent this networ# t&pe? (Choose two.) • @ser accounts are centraliEed. • 6ecurit& is difficult to enforce. • 6pecialiEed operating s&stem software is re4uired. • Dile permissions are controlled b& a single computer. • computer that responds to a file sharing re4uest is functioning as a ser-er. 1". Which la&er of the 96: model supplies ser-ices that allow user to interface with the networ#? • ph&sical
• session
• networ#
• presentation • application • transport
1$. /efer to the e>hibit. What is the destination port for the communication that is represented on line $? • • 121
• 1$$33
• 312 • $$2
1. What are two characteristics of peer
• one wa& data flow • decentraliEed resources • centraliEed user accounts
• resource sharing without a dedicated ser-er 1,. What application la&er protocol describes the ser-ices that are used for file sharing in 0icrosoft networ#s? • +C
• !6
• 60%
• 60T
• Telnet
1. What are two characteristics of clients in data networ#s? (Choose two.) • use daemons • initiate data e>changes • are repositories of data • ma& upload data to ser-ers • listen for re4uests from ser-ers 1. What is the role of the 96: application la&er? • pro-ides segmentation of data
• pro-ides encr&ption and con-ersion of data
• pro-ides the interface between the applications on either end of the networ# • pro-ides control of all the data flowing between the source and destination de-ices 2. +ow does the application la&er on a ser-er usuall& process multiple client re4uest for ser-ices? • ceases all connections to the ser-ice • denies multiple connections to a single daemon • suspends the current connection to allow the new connection • uses support from lower la&er functions to distinguish between connections to the ser-ice
Chapter 4 hlight Colours are Correct Answer 1. %ased on the transport la&er header shown in the diagram* which of the following statements describe the established session? (Choose two.) • This is a @ header.
• This contains a Telnet re4uest. • This contains a TDT data transfer.
• The return pac#et from this remote host will ha-e an c#nowledgement !umber of "33. • This is a TC header. 2. With TC=: data encapsulation* which range of port numbers identifies all well<#nown applications? • to 2$$
• 2$ to 122
• to 123
• 12" to 2",
• "1$3 to $$3$
3. Wh& are port numbers included in the TC header of a segment? • to indicate the correct router interface that should be used to forward a segment • to identif& which switch ports should recei-e or forward the segment • to determine which 8a&er 3 protocol should be used to encapsulate the data • to enable a recei-ing host to forward the data to the appropriate application • to allow the recei-ing host to assemble the pac#et in the proper order ". Which 96: model la&er is responsible for regulating the flow of information from source to destination* reliabl& and accuratel&? • application
• presentation
• session
• transport
• networ#
$. /efer to the e>hibit. +ost is using DT to download a large file from 6er-er 1. uring the download process* 6er-er 1 does not recei-e an ac#nowledgment from +ost for se-eral b&tes of transferred data. What action will 6er-er 1 ta#e as a result? • create a 8a&er 1 'am signal • reach a timeout and resend the data that needs to be ac#nowledged • send a /767T bit to the host • change the window siEe in the 8a&er " header . Wh& is flow control used for TC data transfer? • to s&nchroniEe e4uipment speed for sent data • to s&nchroniEe and order se4uence numbers so data is sent in complete numerical order • to pre-ent the recei-er from being o-erwhelmed b& incoming data • to s&nchroniEe window siEe on the ser-er • to simplif& data transfer to multiple hosts ,. Which two options represent 8a&er " addressing? (Choose two.) • identifies the destination networ# • identifies source and destination hosts • identifies the communicating applications • identifies multiple con-ersations between the hosts • identifies the de-ices communicating o-er the local media . /efer to the e>hibit. :n line , of this Wireshar# capture* what TC operation is being performed? • session establishment • data transfer • session disconnect • %ottom of Dorm
• segment retransmit
. /efer to the e>hibit. What two pieces of information can be determined from the output that is shown? (Choose two.) • The local host is using well<#nown port numbers to identif& the source ports. • termination re4uest has been sent to 12.13$.2$.1. • Communication with ".1.1,3."2 is using +TT 6ecure. • The local computer is accepting +TT re4uests. • 12.1.1.11G1"2 is performing the three
• connectionless • connection
12. What mechanism is used b& TC to pro-ide flow control as segments tra-el from source to destination? • se4uence numbers • session establishment • window siEe
• ac#nowledgments
13. Which transport la&er protocol pro-ides low o-erhead and would be used for applications which do not re4uire reliable data deli-er&? • TC
• :
• @
• +TT
• !6
1". Which information is found in both the TC and @ header information? • se4uencing
• flow control
• ac#nowledgments
• source and destination
1$. Which three features allow TC to reliabl& and accuratel& trac# the transmission of data from source to destination? • encapsulation • flow control • connectionless ser-ices • session establishment • numbering and se4uencing • best effort deli-er& 1. uring a TC communication session* if the pac#ets arri-e to the destination out of order* what will happen to the original message? • The pac#ets will not be deli-ered. • The pac#ets will be retransmitted from the source. • The pac#ets will be deli-ered and reassembled at the destination. • The pac#ets will be deli-ered and not reassembled at the destination. 1,. Which is an important characteristic of @? • ac#nowledgement of data deli-er& • minimal dela&s in data deli-er& • high reliabilit& of data deli-er& • same order data deli-er&
1. fter a web browser ma#es a re4uest to a web ser-er that is listening to the standard port* what will be the source port number in the TC header of the response from the ser-er? • 13 • $3 • • 12" • 1,2 1. Which e-ent occurs during the transport la&er three
change data. • TC initialiEes the se4uence numbers for the sessions. • @ establishes the ma>imum number of b&tes to be sent. • The ser-er ac#nowledges the b&tes of data recei-ed from the client.
Chapter 5 Options With Highlight Colours are Correct Answer 1. :n an :-" en-ironment* what information is used b& the router to forward data pac#ets from one interface of a router to another? • destination networ# address • source networ# address • source 0C address • well #nown port destination address 2. What information is added during encapsulation at 96: 8a&er 3? • source and destination 0C • source and destination application protocol • source and destination port number • source and destination : address 3. :n a connectionless s&stem* which of the following is correct? • The destination is contacted before a pac#et is sent. • The destination is not contacted before a pac#et is sent. • The destination sends an ac#nowledgement to the source that indicates the pac#et was recei-ed. • The destination sends an ac#nowledgement to the source that re4uests the ne>t pac#et to be sent. ". Which : pac#et field will pre-ent endless loops? • t&pehibit. @sing the networ# in the e>hibit* what would be the default gatewa& address for host in the 12.133.21. networ#? • 12.13$.2$.1 • 12.31.,.1 • 12.133.21. • 12.133.21.1 ,. :f the default gatewa& is configured incorrectl& on the host* what is the impact on communications? • The host is unable to communicate on the local networ#. • The host can communicate with other hosts on the local networ#* but is unable to communicate with hosts on remote networ#s. • The host can communicate with other hosts on remote networ#s* but is unable to communicate with hosts on the local networ#. • There is no impact on communications.
. What is the purpose of a default gatewa&? • ph&sicall& connects a computer to a networ# • pro-ides a permanent address to a computer • identifies the networ# to which a computer is connected • identifies the logical address of a networ#ed computer and uni4uel& identifies it to the rest of the networ# • identifies the de-ice that allows local networ# computers to communicate with de-ices on other networ#s . What t&pe of routing uses information that is manuall& entered into the routing table? • d&namic
• interior
• static
• standard
1. When the destination networ# is not listed in the routing table of a Cisco router* what are two possible actions that the router might ta#e? (Choose two.) • The router sends an / re4uest to determine the re4uired ne>t hop address. • The router discards the pac#et. • The router forwards the pac#et toward the ne>t hop indicated in the / table. • The router forwards the pac#et to the interface indicated b& the source address. • The router forwards the pac#et out the interface indicated b& the default route entr&. 11. What are the #e& factors to consider when grouping hosts into a common networ#? (Choose three.) • gatewa&s • purpose • ph&sical addressing • software -ersion • geographic location • ownership 12. What is a component of a routing table entr&? • the 0C address of the interface of the router • the destination 8a&er " port number • the destination host address • the ne>t
• switch
• firewall
• access point • bridge
1". What are three common problems with a large networ#? (Choose three.) • too few broadcasts
• performance degradation • securit& issues
• limited management responsibilit& • host identification • protocol compatibilit& 1$. /efer to the e>hibit. ll de-ices shown in the e>hibit ha-e factor& default settings. +ow man& broadcast domains are represented in the topolog& that is shown? •3
•"
•$
•,
•
11
1. Which three statements are true about routes and their use? (Choose three.) :f no route to the destination networ# is found* the pac#et is returned to the pre-ious router. :f the destination networ# is directl& connected* the router forwards the pac#et to the destination host. • :f multiple networ# entries e>ist for the destination networ#* the most general route is used to forward the pac#et. • :f no route e>ists for the destination networ# and a default route is present* the pac#et is forwarded to the ne>t
1,. /efer to the e>hibit. networ# administrator is troubleshooting a connecti-it& problem and needs to determine the address that is used to forward networ# pac#ets out the networ#. @sing the netstat
• 12,...1
• 1.1.1.
• 1.1.1.1 • 22"...
1. /efer to the e>hibit. networ# administrator notices that there are too man& broadcasts on the networ#. What two steps can the networ# administrator ta#e to resol-e this problem? (Choose two.) • /eplace 62 with a router. • lace all ser-ers on 61. • isable TC=: broadcasts. • 6ubnet the 12.1.. =2" networ#. • isable all unused interfaces on the switches. 1. /efer to the e>hibit. The networ# in the e>hibit is full& operational. What two statements correctl& describe the routing for the topolog& that is shown? (Choose two.) • 12.1..2 is the ne>ttttttchange route information • pre-ent manual configuration and maintenance of the routing table 21. What statement describes the purpose of a default route? • host uses a default route to transfer data to another host on the same networ# segment. • host uses a default route to forward data to the local switch as the ne>t hop to all destinations. • host uses a default route to identif& the 8a&er 2 address of an end de-ice on the local networ#. • host uses a default route to transfer data to a host outside the local networ# when no other route to the destination e>ists.
Chapter 6 4. #efer to the e0hibit. 3hich network prefi0 will work with the IP addressing scheme shown in the graphic. 5 /6%
5 /47
5 /68
5 /69
5 /6&
5 /6:
6. 3hich IPv% subnetted addresses represent valid host addresses; <hoose three.= 5 496.47.%.469 /67 5 496.47.%.4&& /67 5 496.47.%.4)+ /67 5 496.47.%.)& /69 5 496.47.%.4&) /69 5 496.47.%.689 /69 3. Which statements are true regarding : addressing? (Choose two.)
5 NAT translates public addresses to private addresses destined for the Internet. 1nly one company is allowed to use a specific private network address space. 5 Private addresses are blocked from public Internet by router. 5 Network 496.+6.8.8 is part of the private address space. 5 IP address 469.8.8.4 can be used for a host to direct traffic to itself. %. 3hich process do routers use to determine the subnet network address based 5 upon a given IP address and subnet mask; 5 binary adding 5 he0adecimal anding 5 binary division 5 binary multiplication 5 binary AN'ing &. #efer to the e0hibit. >ost A is connected to the LAN? but it cannot get access to any resources on the Internet. The configuration of the host is shown in the e0hibit. 3hat could be the cause of the problem; 5 The host subnet mask is incorrect. 5 The default gateway is a network address. 5 The default gateway is a broadcast address. 5 The default gateway is on a different subnet from the host. 7. 3hat subnet mask would a network administrator assign to a network address of 496.+8.4.8 if it were possible to have up to 6&% hosts; 5 6&&.6&&.8.8 5 6&&.6&&.6&&.8 5 6&&.6&&.6&%.8 5 6&&.6&&.6%:.8 9. 3hich three IP addresses are private; <hoose three.= 5 496.47:.++.4 5 48.+&.77.98 5 4)6.47:.)).& 5 496.4:.::.)8 5 4)6.++.&&.:) 5 496.+&.47.& :. @iven the IP address and subnet mask of 496.47.4+%.7% 6&&.6&&.6&&.66%? which of the following would describe this address; 5 This is a useable host address. 5 This is a broadcast address. 5 This is a network address. 5 This is not a valid address.
). A router interface has been assigned an IP address of 496.47.4)6.477 with a mask of 6&&.6&&.6&&.6%:. To which subnet does the IP address belong; 5 496.47.8.8 5 496.47.4)6.8 5 496.47.4)6.46: 5 496.47.4)6.478 5 496.47.4)6.47: 5 496.47.4)6.497 48. #efer to the e0hibit. The network administrator has assigned the internetwork of L(I22 an address range of 4)6.47:.48.8. This address range has been s ubnetted using a /6) mask. In order to accommodate a new building? the technician has decided to use the fifth subnet for configuring the new network
5 servers
5 network printers
5 routers 5 remote workstations 5 laptops
46. hich of the following are features of IPv7; <hoose three.= 5 larger address space 5 faster routing protocols 5 data types and classes of service 5 authentication and encryption 5 improved host naming conventions 5 same addressing scheme as IPv% 4+. 3hat is the primary reason for development of IPv7; 5 security 5 header format simplification 5 e0panded addressing capabilities 5 addressing simplification 4%. 3hat two things will happen if a router receives an IP packet which has a TTL value of 4 and the destination host is several hops away; <hoose two.= 5 The router will discard the packet. 5 The router will decrement the TTL value and forward the packet to the ne0t router on the path to the destination host. 5 The router will send a time e0ceeded message to the source host. 5 The router will increment the TTL value and forward the packet to the ne0t router on the path to the destination host. 5 The router will send an IP #edirect essage to the source host. 4&. #efer to the e0hibit. 3hy would the response shown be displayed after issuing the command ping 469.8.8.4 on a P; 5 The IP settings are not properly co nfigured on the host.
5 Internet Protocol is not properly installed on the host. 5 There is a problem at the physical or data link layer. 5 The default gateway device is not operating. 5 A router on the path to the destination host has gone down. 47. >ow many bits make up an IPv% address; 5 46:
5 7%
5 %:
5 +6
49. #efer to the e0hibit. A network administrator discovers that host A is having trouble with Internet connectivity? but the server farm has full connectivity. In addition? host A has full connectivity to the server farm. 3hat is a possible cause of this problem; 5 The router has an incorrect gateway. 5 >ost A has an overlapping network address. 5 >ost A has an incorrect default gateway configured. 5 >ost A has an incorrect subnet mask. 5 NAT is re,uired for the host A network. 4:. 3hat three facts are true about the network portion of an IPv% address; <hoose three.= 5 identifies an individual device 5 is identical for all hosts in a broadcast domain 5 is altered as packet is forwarded 5 varies in length 5 is used to forward packets 5 uses flat addressing 4). 3hat is a group of hosts called that have identical bit patterns in the high order bits of their addresses; 5 an internet
5 a network
5 an octet
5 a radi0 5 (ottom of !orm 5 Top of !orm
5 (ottom of !orm 68. 3hat is the network address of the host 496.6&.79.)) /6+ in binary; 5 48484488. 88844884.84888844.88888888 5 48484488. 88844884.84888844.44444444 5 48484488. 88844884.84888848.88888888 5 48484488. 88844884.84888848.84488844 5 48484488. 88848884.84888844. 84488848 5 48484488. 88844884.88888888.88888888 64. #efer to the e0hibit. A network administrator has to develop an IP addressing scheme that uses the 4)6.47:.4.8 /6% address space. The network that contains the serial link has already been addressed out of a separate range. ach network will be allocated the same number of host addresses. 3hich network mask will be appropriate to address the remaining networks; 5 6&&.6&&.6&&.6%: 5 6&&.6&&.6&&.66% 5 6&&.6&&.6&&.4)6 5 6&&.6&&.6&&.6%8 5 6&&.6&&.6&&.46: 5 6&&.6&&.6&&.6&6
Chapter 7 4. 3hich three factors should be considered when implementing a Layer 6 protocol in a network; <hoose three.= 5 the Layer + protocol selected 5 the geographic scope of the network 5 the P' defined by the transport layer 5 the physical layer implementation 5 he number of hosts to be interconnected 6. #efer to the e0hibit. Assuming that the network in the e0hibit is converged meaning the routing tables and A#P tables are complete? which A address will >ost A place in the destination address field of thernet frames destined for www.server; 5 88-4c-%4-ab-c8-88
5 88-8c-:&-cf-7&-c8
5 88-8c-:&-cf-7&-c4 5 88-46-+f-+6-8&-af
3. Which options are properties of contentionist • de-ices must wait their turn • to#en passing ". What is true concerning ph&sical and logical topologies? • The logical topolog& is alwa&s the same as the ph&sical topolog&. • h&sical topologies are concerned with how a networ# transfers frames. • h&sical signal paths are defined b& ata 8in# la&er protocols. • 8ogical topologies consist of -irtual connections between nodes. $. What is true regarding media access control? (Choose three.) • 7thernet utiliEes C60=C defined as placement of data frames on the media contention
company network wiring and e,uipment are located in the building. 3hat is this type of drawing; 5 logical topology 5 physical topology 5 access topology
5 cable path
5 wiring grid
. What is the purpose of the preamble in an 7thernet frame? is used as a pad for data identifies the source address identifies the destination address mar#s the end of timing information • is used for timing s&nchroniEation with alternating patterns of ones and Eeros . What statements are true regarding addresses found at each la&er of the 96: model? (Choose two.) • 8a&er 2 ma& identif& de-ices b& a ph&sical address burned into the networ# card • 8a&er 2 identifies the applications that are communicating • 8a&er 3 represents a hierarchical addressing scheme • 8a&er " directs communication to the proper destination networ# • 8a&er " addresses are used b& intermediar& de-ices to forward data 1. /efer to the e>hibit. W hich statement describes the media access control methods that are used b& the networ#s in the e>hibit? • ll three networ#s use C60=C • !one of the networ#s re4uire media access control. • !etwor# 1 uses C60=C and !etwor# 3 uses C60=C. • !etwor# 1 uses C60=C and !etwor# 2 uses C60=C. • !etwor# 2 uses C60=C and !etwor# 3 uses C60=C. 11. /efer to the e>hibit. +ow man& uni4ue C/C calculations will ta#e place as traffic routes from the C to the laptop? •1
•2
•"
•
12. /efer to the e>hibit. frame is being sent from the C to the laptop. Which source 0C and : addresses will be included in the frame as it lea-es /outer%? (Choose two.) • source 0C < C • source 0C < 6= on /outer • source 0C < Da=1 on /outer% • source : < C • source : < 6= on /outer • source : < Da=1 of /outer% 13. Which subla&er of the data lin# la&er prepares a signal to be transmitted at the ph&sical la&er? • 88C • 0C • +8C • !:C 1". What two facts are true when a de-ice is mo-ed from one networ# or subnet to another? (Choose two.) The 8a&er 2 address must be reassigned. • The default gatewa& address should not be changed. • The de-ice will still operate at the same 8a&er 2 address. • pplications and ser-ices will need additional port numbers assigned. • The 8a&er 3 address must be reassigned to allow communications to the new networ#. 1$. What is a function of the data lin# la&er? • pro-ides the formatting of data • pro-ides endchange data o-er a common local media
1. What is a characteristic of a logical pointit of data on media • identif& the ser-ices to which transported data is associated 1. What is the primar& purpose of the trailer in a data lin# la&er frame? • define the logical topolog&
• pro-ide media access control
• support frame error detection
• carr& routing information for the frame 1. What are three characteristics of -alid 7thernet 8a&er 2 addresses? (Choose three.)
5 They are %: binary bits in length. 5 They are considered physical addresses. 5 They are generally represented in he0adecimal format. 5 They consist of four eight-bit octets of binary numbers. 5 They are used to determine the data path through the network. 5 They must be changed when an thernet de vice is added or moved within the network.
Chapter 8 4. 3hich 12I layer is responsible for binary transmission? cable specification? and physical aspects of network communication; 5 Presentation
5 Transport
5 'ata Link
5 Physical
6. An installed fiber run can be checked for faults? integrity? and the performance of the media by using what device; 5 light inDector
5 1T'#
5 T'#
5 multimeter
+. 3hich characteristics describe fiber optic cable; <hoose two.= 5 It is not affected by I or #!I. 5 ach pair of cables is wrapped in metallic foil. 5 It combines the techni,ue of cancellation? shielding and twisting to protect data. 5 It has a ma0imum speed of 488 bps. 5 It is the most e0pensive type of LAN cabling. %. 3hen is a straight-through cable used in a network; 5 when connecting a router through the c onsole port 5 when connecting one switch to another switch 5 when connecting a host to a switch 5 when connecting a router to another router &. #efer to the e0hibit. 3hich type of ategory & cable is used to make an thernet connection between >ost A and >ost (; 5 coa0 cable 5 rollover cable 5 crossover cable 5 straight-through cable 7. 3hich method of signal transmission uses radio waves to carry signals; 5 electrical
5 optical
5 wireless 5 acoustic
9. In most business LANs? which connector is used with twisted-pair networking cable; 5 (N 5 #$-44 5 #$-%& 5 Type ! :. 3hich of the following is a characteristic of single-mode fiber-optic cable; 5 generally uses L's as the light source 5 relatively larger core with multiple light paths 5 less e0pensive than multimode 5 generally uses lasers as the light source ). 3hich type of cable run is most often associated with fiber-optic cable; 5 backbone cable
5 hori"ontal cable
5 patch cable 5 work area cable
10. What are three measures of ata tra!sfer" #Choose three.$ % &oo'ut % fre(ue!)*
% am'+,tue % throu&h'ut % )rossta+- % a!/,th
11. W,th the use of u!sh,e+e t/,ste'a,r )o''er /,re ,! a !et/or- /hat )auses )rossta+/,th,! the )a+e 'a,rs" % the ma&!et,) 2e+ arou! the a3a)e!t 'a,rs of /,re % the use of ra,e /,re to sh,e+ the a3a)e!t /,re 'a,rs % the re4e)t,o! of the e+e)tr,)a+ /a5e a)- from the far e! of the )a+e % the )o++,s,o! )ause * t/o !oes tr*,!& to use the me,a s,mu+ta!eous+*
46. 3hat is a primary role of the Physical layer in transmitting data on the network; 5 create the signals that represent the bits in each frame on to the media 5 provide physical addressing to the devices 5 determine the path packets take through the network 5 control data access to the media 4+. In LAN installations where potential electrical ha"ards or electromagnetic interference may be present? what type of media is recommended for backbone cabling; 5 coa0 5 fiber
5 at&e TP
5 at7 TP
5 2TP
4%. 3hat is a possible effect of improperly applying a connector to a network cable; 5 'ata will be forwarded to the wrong node. 5 'ata transmitted through that cable may e0perience signal loss. 5 An improper signaling method will be implemented for data transmitted on that cable. 5 The encoding method for data sent on that cable will change to compensate for the improper connection. 4&. 3hich fiber connector supports full duple0 thernet; 5 1ptions three is right answer < #olmas = 47. 3hat is considered a benefit of wireless as a media choice; 5 more host mobility 5 lower security risks 5 reduced susceptibility to interference 5 less impact of the surroundings on the effective coverage area 49. 3hat characteristic of TP cable helps reduce the effects of interference; 5 the metal braiding in the shielding 5 the reflective cladding around core 5 the twisting of the wires in the cable 5 the insulating material in the outer Dacket
Chapter 9 4. In the graphic? >ost A has reached &8E completion in sending a 4 F( thernet frame to >ost ' when >ost ( wishes to transmit its own frame to >ost . 3hat must >ost ( do; 5 >ost ( can transmit immediately since it is connected on its own c able segment. 5 >ost ( must wait to receive a 2A transmission from the hub? to signal its turn. 5 >ost ( must send a re,uest signal to >ost A by transmitting an interframe gap. 5 >ost ( must wait until it is certain that >ost A has completed se nding its frame
2. Ethernet operates at which layers of the OSI model !Choose two." # $etwor% layer # &ransport layer # 'hysical layer # (pplication layer # Session layer # )ata*lin% layer
+. 3hich of the following describe interframe spacing; <hoose two.= 5 the minimum interval? measured in bit-times? that any station must wait before sending another frame. 5 the ma0imum interval? measured in bit-times? that any station must wait before sending another frame. 5 the )7-bit payload padding inserted into a frame to achieve a legal frame si"e 5 the )7-bit frame padding transmitted between frames to achieve proper synchroni"ation 5 the time allowed for slow stations to process a frame and prepare for the ne0t frame. 5 the ma0imum interval within which a station must send another frame to avoid being considered unreachable %. 3hat three primary functions does data link layer encapsulation provide; <hoose three.= 5 addressing 5 error detection 5 frame delimiting 5 port identification 5 path determination 5 IP address resolution &. 3hen a collision occurs in a network using 2A/'? how do hosts with data to transmit respond after the backoff period has e0pired; 5 The hosts return to a listen-before-transmit mode. G--5 The hosts creating the collision have priority to send data. 5 The hosts creating the collision retransmit the last 47 frames. 5 The hosts e0tend their delay period to allow for rapid transmission. 7. 3hat are three functions of the upper data link sublayer in the 12I model; <hoose three.= 5 recogni"es streams of bits 5 identifies the network layer protocol. 5 makes the connection with the upper layers. 5 identifies the source and destination applications 5 insulates network layer protocols from changes in physical e,uipment. 5 determines the source of a transmission when multiple devices are transmitting 9. 3hat does the I :86.6 standard represent in thernet technologies; 5 A sublayer
5 Physical layer
5 Logical Link ontrol sublayer 5 Network layer
:. 3hy do hosts on an thernet segment that e0perience a collision use a random delay before attempting to transmit a frame; 5 A random delay is used to ensure a collision-free link. 5 A random delay value for each device is assigned by the manufacturer. 5 A standard delay value could not be agreed upon among networking device vendors. 5 A random delay helps prevent the stations from e0periencing another collision during the transmission.
). #efer to the e0hibit. 3hich option correctly matches the frame field type with the contents that frame field includes; 5 header field - preamble and stop frame 5 data field - network layer packet 5 data field - physical addressing 5 trailer field - !2 and 2o! 48. >ost A has an IP address of 496.47.66&.)+ and a mask of 6&&.6&&.6%:.8. >ost A needs to communicate with a new host whose IP is 496.47.6+4.9:. >ost A performs the AN'ing operation on the destination address. 3hat two things will occur; <hoose two.= 5 >ost A will change the destination IP to the IP of the nearest router and forward the packet. 5 >ost A will broadcast an A#P re,uest for the A of its default gateway. 5 A result of 496.47.66&.8 will be obtained. 5 >ost A will broadcast an A#P re,uest for the A of the destination host. 5 A result of 496.47.66%.8 will be obtained. 5 A result of 496.47.66&.6&& will be obtained. 44 3hich of the following is a drawback of the 2A/' access method; 5 ollisions can decrease network performance. 5 It is more comple0 than non-deterministic protocols. 5 'eterministic media access protocols slow ne twork performance. 5 2A/' LAN technologies are only available at slower speeds than other LAN technologies. 46. thernet operates at which layer of the TP/IP network model; 5 application 5 physical 5 transport 5 internet 5 data link 5 network access 4+. 3hat is the primary purpose of A#P; 5 translate #Ls to IP addresses 5 resolve IPv% addresses to A addresses 5 provide dynamic IP configuration to network devices 5 convert internal private addresses to e0ternal public addresses
16. Refer to the e7h,,t. The s/,t)h a! /or-stat,o! are am,!,strat,5e+* )o!2&ure for fu++ u'+e7 o'erat,o!. Wh,)h stateme!t a))urate+* re4e)ts the o'erat,o! of th,s +,!-" % No )o++,s,o!s /,++ o))ur o! th,s +,!-. % O!+* o!e of the e5,)es )a! tra!sm,t at a t,me. % The s/,t)h /,++ ha5e 'r,or,t* for tra!sm,tt,!& ata. % The e5,)es /,++ efau+t a)- to ha+f u'+e7 ,f e7)ess,5e )o++,s,o!s o))ur. 18. Refer to the e7h,,t. Host9A ,s attem't,!& to )o!ta)t Ser5er9:. Wh,)h stateme!ts )orre)t+* es)r,e the aress,!& Host9A /,++ &e!erate ,! the 'ro)ess" #Choose t/o.$ % A 'a)-et /,th the est,!at,o! I; of Router9:. % A frame /,th the est,!at,o!
49. 3hich two features make switches preferable to hubs in thernet-based networks; <hoose two.= 5 reduction in cross-talk 5 minimi"ing of collisions 5 support for TP cabling 5 division into broadcast domains 5 increase in the throughput of communications 4:. 3hat are the two most commonly used media types in thernet networks today; <hoose two.= 5 coa0ial thicknet
5 copper TP
5 coa0ial thinnet
5 optical fiber 5 shielded twisted pair
4). onvert the binary number 48444848 into its he0adecimal e,uivalent. 2elect the correct answer from the list below. 5 :& 5 )8 5 (A 5 A4 5 (+ 5 4 68. After an thernet collision? when the backoff algorithm is invoked? which device has priority to transmit data; 5 the device involved in the collision with the lowest A address 5 the device involved in the collision with the lowest IP address 5 any device in the collision domain whose backoff timer e0pires first 5 those that began transmitting at the same time
Chapter +, 1. /efer to the e>hibit. student wor#ing in the lab selects a cable that is wired as shown. Which connection t&pes can successfull& be made with this cable? (Choose two.) • connecting a C to a router5s console port • connecting two routers together -ia their fast ethernet ports • connecting two switches together at gigabit speeds • connecting a C to a switch at Bigabit 7thernet speeds • connecting two de-ices with the same interface t&pe at Dast 7thernet spee 6. 3hich option identifies the primary interface which would be used for initial configuration of
a isco router; 5 A interface 5 thernet interface 5 serial interface 5 console interface +. 3hat makes fiber preferable to copper cabling for interconnecting buildings; <hoose three.= 5 greater distances per cable run 5 lower installation cost 5 limited susceptibility to I/#!I 5 durable connections 5 greater bandwidth potential 5 easily terminated %. A network administrator is re,uired to use media in the network that can run up to 488 meters in cable length without using repeaters. The chosen media must be ine0pensive and easily installed. The installation will be in a pre-e0isting building with limited cabling space. 3hich type of media would best meet these re,uirements; 5 2TP 5 TP 5 coa0ial 5 single-mode fiber 5 multimode fiber &. 3hat does the term JattenuationJ mean in data communication; 5 loss of signal strength as distance increases 5 time for a signal to reach its destination 5 leakage of signals from one cable pair to another 5 strengthening of a signal by a networking device 7. >ow many host addresses may be assigned on each subnetwork when using the 4+8.7:.8.8 network address with a subnet mask of 6&&.6&&.6%:.8; 5 +8 5 6&7 5 68%7 5 68%: 5 %8)% 5 %8)7 9. 3hich subnet mask would be assigned to the network address of 4)6.47:.+6.8 to provide 6&% useable host addresses per subnetwork; 5 6&&.6&&.8.8 5 6&&.6&&.6&&.8 5 6&&.6&&.6&%.8 5 6&&.6&&.6%:.8
:. A company is planning to subnet its network for a ma0imum of 69 hosts. 3hich subnet mask would provide the needed hosts and leave the fewest unused addresses in each subnet; 5 6&&.6&&.6&&.8 5 6&&.6&&.6&&.4)6 5 6&&.6&&.6&&.66% 5 6&&.6&&.6&&.6%8 5 6&&.6&&.6&&.6%: ). 3hat type of network cable is used between a terminal and a console port; 5 cross-over 5 straight-through 5 rollover 5 patch cable 48. 3hich device is used to create or divide broadcast domains; 5 hub 5 switch 5 bridge 5 router 5 repeater 44. #efer to the e0hibit. 3hat destination IP address will P4 place in the header for a packet destined for P6; 5 4)6.47:.4.4 5 4)6.47:.6.4 5 4)6.47:.6.6 5 4)6.47:.+.4 5 4)6.47:.+.&% 46. #efer to the e0hibit. (ased on the IP configuration shown? what would be the result of >ost A and >ost ( attempting to communicate outside the network segment; 5 both host A and ( would be successful 5 host A would be successful? host ( would fail 5 host ( would be successful? host A would fail 5 both >ost A and ( would fail 4+. 3hich three types of connectors are commonly associated with iscoBs *.+& serial cables; <hoose three.= 5 #$ 44 5 '( 78 5 3inchester 4& pin 5 '( ) 5 smart serial 5 #$ %& 4%. #efer to the e0hibit. >ow many subnets are re,uired to support the network that is shown; 565+5%5& 4&. 3hat are three common methods for setting a TP thernet port to 'I or 'I operation; <hoose three.=
5 5 5 5 5 5
direct configuration of the device cable color code association cable selection and configuration use of cable testers to determine pinouts the enabling of the mechanism to electrically swap the transmit and receive pairs the automatic detection and negotiating of 'I/'I operation of the port
47. 3hich three statements are true about the role of routers in the network; <hoose three.= 5 They propagate broadcasts. 5 They enlarge collision domains. 5 They segment broadcast domains. 5 They interconnect different network technologies. 5 ach router interface re,uires a separate network or subnet. 5 They maintain a common frame format be tween LAN and 3AN interfaces. 49. #efer to the e0hibit. A network administrator has decided to use packet capture software to evaluate all traffic from the student subnet on the way to the Internet. To ensure that all packets are captured? what network device should be used to connect the monitoring station to the network between #4 and #6; 5 router 5 hub 5 switch 5 wireless access point 4:. #efer to the e0hibit. Assume that all devices are using default settings. >ow many subnets are re,uired to address the topology that is shown; 54 5+ 5% 5& 59 4). #efer to the e0hibit. 3hich three statements are true about the e0hibited topology; <hoose three.= 5 >osts ( and are in the same subnet. 5 !ive broadcast domains are present. 5 >ost ( is using a crossover cable to connect to the router. 5 !our broadcast domains are present. 5 !ive networks are shown. 5 >ost ( is using a rollover cable to connect to the router. 68. To establish a console connection from a computer to a isco router? which cable wiring option would be used; 5 crossover cable 5 straight through cable 5 rollover cable 5 *.+& cable
64. #efer to the e0hibit. 3hich three statements identify the type of cabling that would be used in the segments that are shown; <hoose three.= 5 2egment 4 uses backbone cabling.
5 2egment 4 uses a patch cable. 5 2egment + uses patch cabling. 5 2egment + uses vertical cabling. 5 2egment + uses hori"ontal cabling. 5 2egment % uses vertical cabling. 66. #efer to the e0hibit. A network technician has been allocated the 4)6.47:.4.8/6% private IP address range for use in the network that shown in the e0hibit. 3hich subnet mask would be used to meet the host re,uirements for segment A of this internetwork; 5 6&&.6&&.6&&.46: 5 6&&.6&&.6&&.4)6 5 6&&.6&&.6&&.66% 5 6&&.6&&.6&&.6%8 5 6&&.6&&.6&&.6%:
Chapter ++ 4. sers in the network are e0periencing slow response time when doing file transfers to a remote server. 3hat command could be issued to determine if the router has e0perienced any input or output errors; 5 show running-config 5 show startup-config 5 show interfaces 5 show ip route 5 show version 5 show memory 6. #efer to the e0hibit. A technician applies the configuration in the e0hibit to a clean router. To verify the configuration? the technician issues the show running-config command in the LI session with the router. 3hat lines should the technician e0pect to see in the router output from the show running-config command; 5 enable password classline console 8password ccna 5 enable secret ciscoenable password classline console 8password ccna 5 enable secret & K4Kv8/+Ky3m$yT9"a/ya(#as$m8enable password classline console 8password ccna 5 enable secret ciscoenable password 9 4%4%48A4!49line console 8password 9 868&89&&8A 5 enable secret & K4Kv8/+Ky3m$yT9"a/ya(#as$m8enable password 9 4%4%48A4!49line console 8password 9 868&89&&8A
3. /efer to the e>hibit. networ# administrator on +ost has problems accessing the DT ser-er. 8a&er three connecti-it& testing was successful from +ost to the 61 interface of /outer%. Which set of commands will allow the networ# administrator to telnet to /outer% and run debug commands? • /outer%(config)H enable secret class /outer%(config)H line -t& " /outer%(config /outer%(config /outer%(config<-t&)H password cisco /outer%(config<-t&)H login
%. #efer to the e0hibit. The output is shown for the show ip route command e 0ecuted on #outer A. 3hat does the IP address 4)6.47:.6.6 represent;
5 5 5 5
@ateway for the 4)6.47:.4.8 network @ateway for the 4)6.47:.+.8 network IP assigned to the serial port on #outer A IP assigned to the serial port on #outer (
&. 3hat command is used to change the default router name to !ontana; 5 #outerM name !ontana 5 #outerM hostname !ontana 5 #outer ). A network administrator needs to keep the user I'? password? and session contents private when establishing remote LI connectivity with a router to manage it. 3hich access method should be chosen; 5 Telnet 5 onsole 5 A 5 22>
48. In a isco router? when do changes made to the running-configuration take effect; 5 after a system restart
5 as the commands are entered 5 when logging off the system 5 when the configuration is saved to the startup-configuration 44. #efer to the e0hibit. 3hich names correctly identify the LI mode represented by the prompt for 2witch-ast%M; <hoose two.= 5 line configuration mode 5 user e0ecutive mode 5 global configuration mode 5 privileged e0ecutive mode 5 interface configuration mode 5 enable mode 46. 3hich three terms correctly define the forms of help available within the isco I12; <hoose three.= 5 hot keys 5 conte0t-check 5 conte0t-sensitive 5 structured check 5 command override 5 command synta0 check 13. Which combination of #e&s would be used at the C8: prompt to interrupt a ping or traceroute process? • Ctrl
-a/n0an dari chapter + 1 ++ 4. #efer to the e0hibit. >ost ( attempts to establish a TP/IP session with host . 'uring this attempt? a frame was captured at the !astthernet interface fa8/4 of the 2an !rancisco r outer. The packet inside the captured frame has the source IP address 48.48.4.6? and the destination IP address is 48.+4.4.68. 3hat is the destination A address of the frame at the time of capture; 5 8878.9+68.'7+6 5 8878.9+68.'7+4 5 88%8.:&49.%%+ 5 888).(6%.8+ 5 8848.6(%.+%64 2. What are three characteristics of C60=C? (Choose three.) • :t monitors the media for presence of a data signal. • fter detecting a collision* hosts can resume transmission after a random timer has e>pired. • 'am signal is used to ensure that all hosts are aware that a collision has occurred. • e-ices can be configured with a higher transmission priorit&. • ata is transmitted onl& when the data signal is present. • :t uses a to#en s&stem to a-oid collisions.
+. #efer to the e0hibit. The P? the routing table of which is displayed? is configured correctly. To which network device or interface does the IP address 4)6.47:.4.6&% belong; 5 P 5 switch 5 router interface fa8/8 5 router interface fa8/4 %. #efer to the e0hibit. >ost A wants to access the Internet. 3hich combination of a Layer 6 address and a Layer + address will enable this access from host A; 5 'estination AC 88+8.:&)7.':+ 'efault gatewayC 68).47&.686.4+8 5 'estination AC 88+8.:&)7.':6 'efault gatewayC 496.47.).6 5 'estination AC 88+8.:&49.%%% 'efault gatewayC 496.47.4.4 5 'estination AC 88+8.:&49.%%% 'efault gatewayC 68).47&.686.4+8 &. #efer to the e0hibit. ommunication between hosts and is restricted to the local network. 3hat is the reason for this; 5 The gateway addresses are broadcast addresses. 5 >ost is assigned a multicast address. 5 >ost and host belong to different networks . 5 >ost is assigned a network addres s. 7. 3hat is the result of using the clock rate &7888 command at the serial interface of the router; 5 The interface is configured as a ' device. 5 The interface timers are cleared. 5 The !astthernet interface is made to emulate a serial interface by assigning it a timing signal. 5 The IP address for the serial interface is configured.
9. 3hich three addresses belong to the category of public IP addresses; <hoose three.= 5 469.8.8.4 5 4)7.4.48&.7 5 4+6.44.).)) 5 48.8.8.4 5 496.47.).48
5 %7.4.4.)9
:. 3hich three statements are true about transport layer protocols; <hoose three.= 5 TP and 'P manage communication between multiple applications. 5 TP retransmits the packets for which the acknowledgment is not received. 5 TP acknowledges received data. 5 'P e0changes frames between the nodes of the network. 5 TP has no mechanism to acknowledge transmission errors. 5 'P uses windowing and se,uencing to provide reliable transfer of data. ). #efer to the e0hibit. 3hich logical topology describes the e0hibited network; 5 star 5 ring 5 point-to-point 5 multi-access 48. 3hich statement is true about the running configuration file in a isco I12 device; 5 It affects the operation of the device immediately when modified. 5 It is stored in N*#A. 5 It should be deleted using the erase running-config command. 5 It is automatically saved when the router reboots. 44. #efer to the e0hibit. >ost is able to ping 469.8.8.4 successfully? but is unable to communicate with hosts A and ( in the organi"ation. 3hat is the likely cause of the problem; 5 >osts A and ( are not on the same subnet as host . 5 The IP addresses on the router serial interfaces are wrong. 5 The subnet mask on host is improper ly configured. 5 The !astthernet interface fa8/8 of router 4 is wrongly configured. 46. A host is transmitting a video over the network. >ow does the transport layer allow this host to use multiple applications to transmit other data at the same time as the video transmission; 5 It uses error control mechanisms. 5 It uses a connectionless protocol only for multiple simultaneous transmissions. 5 It uses multiple Layer 6 source addresses. 5 It uses multiple port numbers. 4+. #efer to the e0hibit. P4 is unable to access P6. To troubleshoot this problem? the technician needs to confirm that the ne0t hop interface is operational. 3hich default gateway address should the technician ping from P4 to confirm this; 5 48.8.8.6&% 5 4)6.47:.8.6%) 5 4)6.47:.8.6&8 5 48.8.4.6&%
4%. #efer to the e0hibit. able 4 and able 6 are wired for specific physical layer re,uirements. 3hich three segments use able 6; <hoose three.=
5 2egment 4 5 2egment 6 5 2egment + 5 2egment % 5 2egment & 5 2egment 7 4&. #efer to the e0hibit. 3hich two facts can be determined about the topology; <hoose two.= 5 Three networks are needed. 5 Two logical address ranges are re,uired. 5 A single broadcast domain is present. 5 Three collision domains are present. 5 !our networks are needed. 47. #efer to the e0hibit. 3hich three statements are true about the IP configuration that is displayed; <hoose three.= 5 The assigned address is a private address. 5 The P cannot communicate with the 'N2 server. 5 The network can have 467 hosts. 5 The prefi0 of the computer address is /67. 5 The IP address is routable on the Internet. 5 The IP address is a multicast address . 49. 3hich password restricts Telnet access to the router; 5 enable 5 enable secret 5 console 5 *T 4:. #efer to the e0hibit. To create the initial configuration? a network technician connected host A to the router using the connection that is shown. 3hich statement is true about this connection; 5 It terminates at the thernet port of the router. 5 It provides out-of-band console access. 5 It terminates at the serial interface of the router. 5 It re,uires a Telnet client on host A to access the router. 4). 3hich device should be used for routing a packet to a remote network; 5 access switch 5 '>P server 5 hub 5 router
68. #efer to the e0hibit. The serial interface of the router was configured with the use of the commands that are shown. The router cannot ping the router that is directly connected to interface serial 8/8/8. 3hat should the network technician do to solve this problem; 5 onfigure the description at interface serial 8/8/8. 5 onfigure an IP address on interface ser ial 8/8/8. 5 #emove the no shutdown command at interface serial 8/8/8 5 #eboot the router.
64. #efer to the e0hibit. In a network? host A is sending data segments to hos t (. The flow control of the segments that are being e0changed is displayed. 3hich two statements are true about this communication; <hoose two.=
5 The initial window si"e is determined via the two-way handshake. 5 The window si"e for the TP session that is represented is initially set to +888 bytes. 5 Acknowledgment number +884 indicates that host A will send the ne0t segment with se,uence number +884. 5 >ost ( e0pects that the ne0t re ceived segment number will be +888. 5 No more acknowledgments will be e0changed. 66. #efer to the e0hibit. The network administrator wants to remotely access the LI of the router from P4 using modem 4. 3hich port of the r outer should be connected to modem 6 to enable this access; 5 console 5 thernet 5 au0iliary 5 serial 6+. 3hich 12I layer uses a connection-oriented protocol to ensure reliable delivery of data; 5 application layer 5 presentation layer 5 session layer 5 transport layer 6%. 3hat are two functions of the data link layer; <hoose two.= 5 It segments and reorders the data. 5 It e0changes data between programs that are running on the source and destination hosts. 5 It controls how data is placed onto the media. 5 It generates signals to represent the bits in each frame. 5 It encapsulates each packet with a header and a trailer to transfer it across the local media. 6&. #efer to the e0hibit. 3hich list refers only to end devices; 5 '??!?@ 5 A?>?(? 5 A?'??! 5 A?'??@ 67. #efer to the e0hibit. The diagram represents the process of sending e-mail between clients. 3hich list correctly identifies the component or protocol used at each numbered stage of the diagram; 5 4.A 6.'A +.TA %.2TP &.TA 7.P1P 9.'A :.A 5 4.A 6.P1P +.'A %.2TP &.TA 7.'A 9.2TP :.A 5 4.A 6.P1P +.2TP %.'A &.TA 7.2TP 9.P1P :.A 5 4.A 6.2TP +.TA %.2TP &.TA 7.'A 9.P1P :.A 69. #efer to the e0hibit. >ost ( was powered off. 3hat change will occur in the A table of the switch; The table will remain unaffected. 5 The switch will remove the A address at !a8/4) immediately. 5 The switch will retain the A address until host ( is powered on again. 5 The switch will rebuild the A table by assigning the !!!!.!!!!.!!!! address to port !a8/4). 6:. #efer to the e0hibit. A technician has connected the P to the switch using a ategory 7 TP cable. 3hich two statements are true about this connection; <hoose two.=
5 The cable that is used is an thernet c rossover cable. 5 The transmit pin of the cable is terminated to the receive pin. 5 The ma0imum distance between the switch and the P can be 488 m. 5 The ma0imum supported bandwidth is 4888 b/s. 5 The ategory 7 cable simulates a point-to-point 3AN link and is unusable for this type of connection. 6). #efer to the e0hibit. A host is using NAT to connect to the Internet. 3hich three IP addresses enable this connection; <hoose three.= 5 48.4.4.7+ 5 48.4.4.+9 5 48.4.4.+) 5 48.4.4.+6 5 48.4.4.78 5 48.4.4.6 +8. #efer to the e0hibit. A P is communicating with another P on a remote network. The two networks are connected by three routers . 3hich action will help to identify the path between the hosts; 5 se the ipconfig command at the host. 5 se the ipconfig/all command at the destination. 5 se the tracert command at the host. 5 se the ping command at the destination. +4. An organi"ation wants to create a subnet of the IP network 496.47.8.8. This subnet will accommodate 4888 hosts. 3hich subnet mask should be assigned to this network; 5 6&&.6&&.8.8 5 6&&.6&&.6%:.8 5 6&&.6&&.6&6.8 5 6&&.6&&.6&%.8 5 6&&.6&&.6&&.8 5 6&&.6&&.6&&.46: +6. #efer to the e0hibit. A host is connected to hub 4. 3hich combination of IP address? subnet mask? and default gateway can allow this host to function in the network; 5 IP addressC 496.47.+4.+7 2ubnet maskC 6&&.6&&.6&&.6%8 'efault gatewayC 496.47.+4.+& 5 IP addressC 496.47.+4.7+ 2ubnet maskC 6&&.6&&.6&&.66% 'efault gatewayC 496.47.+4.+& IP addressC 496.47.+4.6) 2ubnet maskC 6&&.6&&.6&&.6%: 'efault gatewayC 496.47.+4.+& 5 IP addressC 496.47.+4.+6 2ubnet maskC 6&&.6&&.6&&.66% 'efault gatewayC 496.47.+4.+& 5 IP addressC 496.47.+4.6) 2ubnet maskC 6&&.6&&.6&&.6%8 'efault gatewayC 496.47.+8.4 5 IP addressC 496.47.+4.+9 2ubnet maskC 6&&.6&&.6&&.66% 'efault gatewayC 496.47.+4.+& ++. #efer to the e0hibit. A technician uses the nslookup command on the P and views the output that is displayed in the e0hibit. 3hat is the IP address of the primary domain name server configured at the host; <hoose two.= 5 4)6.47:.4.)) 5 4)6.47:.6.488 5 48.48.48.+6
5 4)6.47:.4.& 5 the IP address of the website resolver4.0y".local +%. 3hich 12I layer offers ordered data reconstruction services; 5 application layer 5 network layer 5 presentation layer 5 session layer 5 transport layer +&. #efer to the e0hibit. All devices in the network use default configurations. >ow many logical address ranges are re,uired in this topology; 56 5+ 5% 5& 57 +7. The network administrator wants to install a private application on a server. 3hich range of port numbers is normally assigned to this application to make it accessible by clients; 5 8 to 6&& 5 %)4&6 to 7&&+& 5 486% to %)4&4 5 8 to 486+ +9. (ecause of a security violation? the router password must be changed. 3hat information can be learned from these configuration entries; <hoose two.= 5 #outer
5 5 5 5 5
This configuration allows users to connect by using a modem. sers must specify which line? 8 or %? they wish to connect to when making a connection. This configuration allows users to connect to the router via the use of the telnet command. This configuration allows five users to make simultaneous connections to this router. The configured password is automatically encrypted on the router.
+:. #efer to the e0hibit. ach media link is labeled. 3hat type of cable should be used to connect the different devices; 5 onnection 4 - rollover cable onnection 6 - straight-through cable onnection + - crossover cable 5 onnection 4 - straight-through cable onnection 6 - cross over cable onnection + - rollover cable 5 onnection 4 - crossover cable onnection 6 - rollover cable onnection + - straight-through cable 5 onnection 4 - crossover cable onnection 6 - straight-through cable onnection + - rollover cable 5 onnection 4 - straight-through cable onnection 6 - straight-through cable onnection + straight-through cable
+). 3hich two types of media are useful for connecting two devices separated by a distance of &88 meters; <hoose two.= 5 48 (A2-T 5 4888 (A2-T 5 48 (A2-6 5 4888 (A2 L 5 4888 (A2-2
%8. 3hich information is used by the router to determine the path between the source and destination hosts; 5 the host portion of the IP address 5 the network portion of the IP address 5 host default gateway address 5 the A address %4. #efer to the e0hibit. 3hat two facts can be determined from the session information that is displayed; <hoose two.= 5 This e0change is part of the three-way handshake. 5 The destination port indicates that a Telnet session has been initiated. 5 The source port does not support communication with the destination port that is listed. 5 The destination port indicates that an 2TP session has been initiated. 5 The protocol is a connection-oriented protocol. %6. #efer to the e0hibit. >ost A is accessing multiple servers. 3hich combination of port number and address will uni,uely identify a particular process running on a specific server; 5 A address of the server and port number of the service 5 IP address of the host and port number of the service 5 A address of the host and port number of the service 5 IP address of the server and port number of the service %+. A network technician wants to configure an IP address on a router interface by using the ip address 4)6.47:.4.8 6&&.6&&.6&&.8 command. 3hich prompt should the technician see when entering this command; 5 #outerO 5 #outerost is unable to communicate with host . 3hich command can be run at host to determine which intermediary device is responsible for this failure; 5 telnet 4)6.47:.4.4 5 ping 4)6.47:.4.4 5 ftp 4)6.47:.4.4 5 tracert 4)6.47:.4.4
%&. #efer to the e0hibit. In a network? P4 sends a message to P6. The frame received at P6 is shown. 3hat information in this frame determines the correct destination application; 5 timing and synchroni"ation bits 5 destination and source physical addresses 5 destination and source logical network addresses 5 destination and source process numbers %7. An organi"ation has been assigned network I' 48.48.46:.8 and subnet mask 6&&.6&&.66%.8. 3hich IP address range can be used for this organi"ation; 5 48.48.46:.8 to 48.48.478.6&& 5 48.48.46:.8 to 48.48.4&).6&& 5 48.48.46:.8 to 48.48.4)6.6&& 5 48.48.46:.8 to 48.48.8.4&) 5 48.48.46:.8 to 48.48.4&).8