You are on page 1of 82

Chapter 2 Correct Answers:

1. What are the key functions of encapsulation? (Choose three.)


allows modification of the original data before transmission
identifies pieces of data as part of the same communication
enables consistent network paths for communication
ensures that data pieces can be directed to the correct receiving end device
enables the reassembly of complete messages
tracks delay between end devices
2. What is a primary function of the trailer information added by the data link layer encapsulation?
supports error detection
ensures ordered arrival of data
provides delivery to correct destination
identifies the devices on the local network
assists intermediary devices with processing and path selection
. Which two layers of the !"# model have the same functions as the $C%&#% model 'etwork (ccess )ayer? (Choose two.)
'etwork
$ransport
Physical
Data Link
"ession
*. Which three statements best describe a )ocal (rea 'etwork ()(')? (Choose three.)
A LAN is usually in a single geographical area
!he network is administered by a single organi"ation
$he connection between segments in the )(' is usually through a leased connection.
$he security and access control of the network are controlled by a service provider.
A LAN provides network services and access to applications for users within a common organi"ation
+ach end of the network is generally connected to a $elecommunication "ervice %rovider ($"%).
,. -efer to the e.hibit. Which networking term describes the data interleaving process represented in the graphic?
piping
%/0
streaming
multiple#ing
encapsulation
1. What is the primary purpose of )ayer * port assignment?
to identify devices on the local media
to identify the hops between source and destination
to identify to the intermediary devices the best path through the network
to identify the source and destination end devices that are communicating
to identify the processes or services that are communicating within the end devices
1
Smith Nguyen Studio. Smith Nguyen Studio.
https:/ / www.facebook.com/ SmithNguyenStudio
2. What can be identified by e.amining the network layer header?
the destination device on the local media
the destination host address
the bits that will be transferred over the media
the source application or process creating the data
3. What is the purpose of the $C%&#% 'etwork (ccess layer?
path determination and packet switching
data representation4 encoding4 and control
reliability4 flow control4 and error detection
detailing the components that make up the physical link and how to access it
the division of segments into packets
5. Which layer encapsulates the segment into packets?
physical
data link
network
transport
16. "elect the statements that are correct concerning network protocols. (Choose three.)
define the structure of layer specific PD$%s
dictate how to accomplish layer functions
outline the functions necessary for communications between layers
limit hardware compatibility
re&uire layer dependent encapsulations
eliminate standardi7ation among vendors
11. What is a %/0?
corruption of a frame during transmission
data reassembled at the destination
retransmitted packets due to lost communication
a layer specific encapsulation
12. -efer to the e.hibit. 8Cell (8 at #% address 16.6.6.* has established an #% session with 8#% %hone 18 at #% address 122.11.1.16. 9ased
upon the graphic4 which device type best describes the function of wireless device 8Cell (?8
the destination device
an end device
an intermediate device
a media device
2
Smith Nguyen Studio. Smith Nguyen Studio.
https:/ / www.facebook.com/ SmithNguyenStudio
1. -efer to the e.hibit. Which term correctly identifies the device type that is included in the area 9?
source
end
transfer
intermediary
1*. What device is considered an intermediary device?
file server
#% phone
laptop
printer
switch
1,. Which characteristic correctly refers to end devices in a network?
manage data flows
originate data flow
retime and retransmit data signals
determine pathways for data

Smith Nguyen Studio. Smith Nguyen Studio.


https:/ / www.facebook.com/ SmithNguyenStudio
11. -efer to the e.hibit. Which set of devices contains only end devices?
(4 C4 /
94 +4 :4 ;
C4 /4 :4 ;4 #4 <
/4 +4 =4 ;4 #4 <
'( )( *( +( ,
12. /uring the encapsulation process4 what occurs at the data link layer?
'o address is added.
$he logical address is added.
!he physical address is added
$he process port number is added.
13. -efer to the e.hibit. Which three labels correctly identify the network types for the network segments that are shown? (Choose three.)
'etwork ( >> W('
Network - .. /AN
Network C .. LAN
'etwork 9 >> ?('
'etwork C >> W('
Network A .. LAN
15. What is the proper order of the layers of the !"# model from the highest layer to the lowest layer?
physical4 network4 application4 data link4 presentation4 session4 transport
application4 physical4 session4 transport4 network4 data link4 presentation
application4 presentation4 physical4 session4 data link4 transport4 network
application( presentation( session( transport( network( data link( physical
presentation4 data link4 session4 transport4 network4 physical4 application
*
Smith Nguyen Studio. Smith Nguyen Studio.
https:/ / www.facebook.com/ SmithNguyenStudio
26. Which statements correctly identify the role of intermediary devices in the network? (Choose three.)
determine pathways for data
initiate data communications
retime and retransmit data signals
originate the flow of data
manage data flows
final termination point for data flow
21. -efer to the e.hibit. What type of network is shown?
W('
?('
LAN
W)('
#n your opinion (this has no bearing on your grade)4 please indicate your interest in this course@
(1) 'ot (t (ll #nterested
(2) "lightly #nterested
012 +nterested
(*) Aery #nterested
(,) Completely #nterested
#n your opinion (this has no bearing on your grade)4 please indicate how enthusiastic you are about the content of this course and the things
youBre learning (or have learned)@
(1) 'ot (t (ll +nthusiastic
(2) "lightly +nthusiastic
012 'nthusiastic
(*) Aery +nthusiastic
(,) Completely +nthusiastic
#n your opinion (this has no bearing on your grade)4 please rate your motivation to do well in this course@
(1) 'ot (t (ll ?otivated
(2) "lightly ?otivated
() ?otivated
032 4ery 5otivated
(,) Completely ?otivated
,
Smith Nguyen Studio. Smith Nguyen Studio.
https:/ / www.facebook.com/ SmithNguyenStudio
Chapter 1
22. What are two forms of application layer software? (Choose two.)
applications
dialogs
reCuests
services
synta.
2. What is the purpose of resource records in /'"?
temporarily holds resolved entries
used by the server to resolve names
sent by the client to during a Cuery
passes authentication information between the server and client
2*. What three protocols operate at the (pplication layer of the !"# model? (Choose three.)
(-%
DN6
%%%
65!P
P7P
#C?%
2,. Which application layer protocols correctly match a corresponding function? (Choose two.)
/'" dynamically allocates #% addresses to hosts
*!!P transfers data from a web server to a client
%!% delivers email from the client to the server email server
"?$% supports file sharing
!elnet provides a virtual connection for remote access
21. (s compared to "";4 what is the primary disadvantage of telnet?
not widely available
does not support encryption
consumes more network bandwidth
does not support authentication
22. What are three properties of peer>to>peer applications? (Choose three.)
acts as both a client and server within the same communication
reCuires centrali7ed account administration
hybrid mode includes a centrali"ed directory of files
can be used in client.server networks
reCuires a direct physical connection between devices
centrali7ed authentication is reCuired
23. Which email components are used to forward mail between servers? (Choose two.)
?/(
#?(%
5!A
%!%
65!P
?0(
25. What application layer protocol describes the services that are used for file sharing in ?icrosoft networks?
/;C%
/'"
65-
"?$%
$elnet
1
Smith Nguyen Studio. Smith Nguyen Studio.
https:/ / www.facebook.com/ SmithNguyenStudio
6. Which statements are correct concerning the role of the ?$( in handling email? (Choose three.)
routes email to the ?/( on other servers
receives email from the client%s 5$A
receives email via the %!% protocol
passes email to the 5DA for final delivery
uses 65!P to route email between servers
delivers email to clients via the %!% protocol
1. ;ow does the application layer on a server usually process multiple client reCuest for services?
ceases all connections to the service
denies multiple connections to a single daemon
suspends the current connection to allow the new connection
uses support from lower layer functions to distinguish between connections to the service
2. Which layer of the !"# model supplies services that allow user to interface with the network?
physical
session
network
presentation
application
transport
. What is the automated service that matches resource names with the reCuired #% address?
;$$%
"";
=D/'
DN6
$elnet
"?$%
*. -efer to the e.hibit. What is the destination port for the communication that is represented on line ,?
89
1211
1,,
512
1,,26
,. What are two characteristics of peer>to>peer networks? (Choose two.)
scalable
one way data flow
decentrali"ed resources
centrali7ed user accounts
resource sharing without a dedicated server
2
Smith Nguyen Studio. Smith Nguyen Studio.
https:/ / www.facebook.com/ SmithNguyenStudio
1. ( network administrator is designing a network for a new branch office of twenty>five users. What are the advantages of using a client>
server model? (Choose two.)
centrali"ed administration
does not reCuire speciali7ed software
security is easier to enforce
lower cost implementation
provides a single point of failure
2. Which two protocols are used to control the transfer of web resources from a web server to a client browser? (Choose two.)
("%
=$%
;$?)
*!!P
*!!P6
#%
3. What is the role of the !"# application layer?
provides segmentation of data
provides encryption and conversion of data
provides the interface between the applications on either end of the network
provides control of all the data flowing between the source and destination devices
5. ( small home network has been installed to interconnect three computers together for gaming and file sharing. What two properties
represent this network type? (Choose two.)
0ser accounts are centrali7ed.
6ecurity is difficult to enforce
"peciali7ed operating system software is reCuired.
=ile permissions are controlled by a single computer.
A computer that responds to a file sharing re&uest is functioning as a server
*6. What application layer protocol is commonly used to support for file transfers between a client and a server?
;$?)
;$$%
)!P
$elnet
*1. What are two characteristics of clients in data networks? (Choose two.)
use daemons
initiate data e#changes
are repositories of data
may upload data to servers
listen for reCuests from servers
3
Smith Nguyen Studio. Smith Nguyen Studio.
https:/ / www.facebook.com/ SmithNguyenStudio
Chapter 3
*2. 9ased on the transport layer header shown in the diagram4 which of the following statements describe the established session? (Choose
two.)
$his is a 0/% header.
!his contains a !elnet re&uest
$his contains a $=$% data transfer.
$he return packet from this remote host will have an (cknowledgement 'umber of *15.
!his is a !CP header
*. With $C%&#% data encapsulation4 which range of port numbers identifies all well>known applications?
6 to 2,,
2,1 to 1622
9 to :921
162* to 26*2
*51, to 1,,,
**. Why are port numbers included in the $C% header of a segment?
to indicate the correct router interface that should be used to forward a segment
to identify which switch ports should receive or forward the segment
to determine which )ayer protocol should be used to encapsulate the data
to enable a receiving host to forward the data to the appropriate application
to allow the receiving host to assemble the packet in the proper order
*,. Which two options represent )ayer * addressing? (Choose two.)
identifies the destination network
identifies source and destination hosts
identifies the communicating applications
identifies multiple conversations between the hosts
identifies the devices communicating over the local media
5
Smith Nguyen Studio. Smith Nguyen Studio.
https:/ / www.facebook.com/ SmithNguyenStudio
*1. -efer to the e.hibit. #n line 2 of this Wireshark capture4 what $C% operation is being performed?
session establishment
segment retransmit
data transfer
session disconnect
*2. -efer to the e.hibit. What two pieces of information can be determined from the output that is shown? (Choose two.)
!he local host is using three client sessions
!he local host is using web sessions to a remote server
$he local host is listening for $C% connections using public addresses.
$he local host is using well>known port numbers to identify the source ports.
$he local host is performing the three>way handshake with 152.113.161@162.
*3. Which information is found in both the $C% and 0/% header information?
seCuencing
flow control
acknowledgments
source and destination port
*5. Which three features allow $C% to reliably and accurately track the transmission of data from source to destination?
encapsulation
flow control
connectionless services
session establishment
numbering and se&uencing
best effort delivery
,6. Which is an important characteristic of 0/%?
acknowledgement of data delivery
minimal delays in data delivery
high reliability of data delivery
same order data delivery
16
Smith Nguyen Studio. Smith Nguyen Studio.
https:/ / www.facebook.com/ SmithNguyenStudio
,1. (fter a web browser makes a reCuest to a web server that is listening to the standard port4 what will be the source port number in the $C%
header of the response from the server?
1
,
89
162*
1223
,2. Which event occurs during the transport layer three>way handshake?
$he two applications e.change data.
!CP initiali"es the se&uence numbers for the sessions
0/% establishes the ma.imum number of bytes to be sent.
$he server acknowledges the bytes of data received from the client.
,. Why is flow control used for $C% data transfer?
to synchroni7e eCuipment speed for sent data
to synchroni7e and order seCuence numbers so data is sent in complete numerical order
to prevent the receiver from being overwhelmed by incoming data
to synchroni7e window si7e on the server
to simplify data transfer to multiple hosts
,*. Which transport layer protocol provides low overhead and would be used for applications which do not reCuire reliable data delivery?
$C%
#%
$DP
;$$%
/'"
,,. /uring a $C% communication session4 if the packets arrive to the destination out of order4 what will happen to the original message?
$he packets will not be delivered.
$he packets will be retransmitted from the source.
!he packets will be delivered and reassembled at the destination
$he packets will be delivered and not reassembled at the destination.
,1. What mechanism is used by $C% to provide flow control as segments travel from source to destination?
seCuence numbers
session establishment
window si"e
acknowledgments
,2. -efer to the e.hibit. ;ost ( is using =$% to download a large file from "erver 1. /uring the download process4 "erver 1 does not receive
an acknowledgment from ;ost ( for several bytes of transferred data. What action will "erver 1 take as a result?
create a )ayer 1 Eam signal
reach a timeout and resend the data that needs to be acknowledged
send a -+"+$ bit to the host
change the window si7e in the )ayer * header
11
Smith Nguyen Studio. Smith Nguyen Studio.
https:/ / www.facebook.com/ SmithNguyenStudio
,3. What is dynamically selected by the source host when forwarding data?
destination logical address
source physical address
default gateway address
source port
,5. Which !"# model layer is responsible for regulating the flow of information from source to destination4 reliably and accurately?
application
presentation
session
transport
network
16. -efer to the e.hibit. ;ost1 is in the process of setting up a $C% session with ;ost2. ;ost1 has sent a "F' message to begin session
establishment. What happens ne.t?
;ost1 sends a segment with the (CG flag H 64 "F' flag H 6 to ;ost2.
;ost1 sends a segment with the (CG flag H 14 "F' flag H 6 to ;ost2.
;ost1 sends a segment with the (CG flag H 14 "F' flag H 1 to ;ost2.
;ost2 sends a segment with the (CG flag H 64 "F' flag H 1 to ;ost1.
;ost2 sends a segment with the (CG flag H 14 "F' flag H 6 to ;ost1.
*ost2 sends a segment with the AC; flag < :( 6=N flag < : to *ost:
11. What are two features of the 0ser /atagram %rotocol (0/%)? (Choose two.)
flow control
low overhead
connectionless
connection>oriented
seCuence and acknowledgements
12
Smith Nguyen Studio. Smith Nguyen Studio.
https:/ / www.facebook.com/ SmithNguyenStudio
Chapter >
12. When the destination network is not listed in the routing table of a Cisco router4 what are two possible actions that the router might take?
(Choose two.)
$he router sends an (-% reCuest to determine the reCuired ne.t hop address.
!he router discards the packet
$he router forwards the packet toward the ne.t hop indicated in the (-% table.
$he router forwards the packet to the interface indicated by the source address.
!he router forwards the packet out the interface indicated by the default route entry
1. What are the key factors to consider when grouping hosts into a common network? (Choose three.)
gateways
purpose
physical addressing
software version
geographic location
ownership
1*. What is a component of a routing table entry?
the ?(C address of the interface of the router
the destination )ayer * port number
the destination host address
the ne#t.hop address
1,. Which three statements are true about routes and their use? (Choose three.)
#f no route to the destination network is found4 the packet is returned to the previous router.
+f the destination network is directly connected( the router forwards the packet to the destination host
#f multiple network entries e.ist for the destination network4 the most general route is used to forward the packet.
+f no route e#ists for the destination network and a default route is present( the packet is forwarded to the ne#t.hop router
+f the originating host has a default gateway configured( the packet for a remote network can be forwarded using that route
#f a host does not have a route manually configured for the destination network4 the host will drop the packet.
11. -efer to the e.hibit. ( network administrator notices that there are too many broadcasts on the network. What two steps can the network
administrator take to resolve this problem? (Choose two.)
?eplace 62 with a router
%lace all servers on "1.
/isable $C%&#% broadcasts.
6ubnet the :@2:A899 B23 network
/isable all unused interfaces on the switches.
12. What two characteristics are commonly associated with dynamic routing protocols? (Choose two.)
reCuire no device configuration
provide routers with up.to.date routing tables
reCuire less processing power than static routes reCuire
consume bandwidth to e#change route information
prevent manual configuration and maintenance of the routing table
1
Smith Nguyen Studio. Smith Nguyen Studio.
https:/ / www.facebook.com/ SmithNguyenStudio
13. What statement describes the purpose of a default route?
( host uses a default route to transfer data to another host on the same network segment.
( host uses a default route to forward data to the local switch as the ne.t hop to all destinations.
( host uses a default route to identify the )ayer 2 address of an end device on the local network.
A host uses a default route to transfer data to a host outside the local network when no other route to the destination e#ists
15. What information is added during encapsulation at !"# )ayer ?
source and destination ?(C
source and destination application protocol
source and destination port number
source and destination +P address
26. #n a connectionless system4 which of the following is correct?
$he destination is contacted before a packet is sent.
!he destination is not contacted before a packet is sent
$he destination sends an acknowledgement to the source that indicates the packet was received.
$he destination sends an acknowledgement to the source that reCuests the ne.t packet to be sent.
21. Which #% packet field will prevent endless loops?
type>of>service
identification
flags
time.to.live
header checksum
22. What type of routing uses information that is manually entered into the routing table?
dynamic
interior
static
standard
2. What are three common problems with a large network? (Choose three.)
too few broadcasts
performance degradation
security issues
limited management responsibility
host identification
protocol compatibility
2*. Which intermediary devices could be used to implement security between networks? (Choose two.)
router
hub
switch
firewall
access point
bridge
2,. #n an #%v* environment4 what information is used by the router to forward data packets from one interface of a router to another?
destination network address
source network address
source ?(C address
well known port destination address
1*
Smith Nguyen Studio. Smith Nguyen Studio.
https:/ / www.facebook.com/ SmithNguyenStudio
21. -efer to the e.hibit. (ll devices shown in the e.hibit have factory default settings. ;ow many broadcast domains are represented in the
topology that is shown?

3
,
2
3
11
22. Which portion of the network layer address does a router use to forward packets?
host portion
broadcast address
network portion
gateway address
23. What is the purpose of a default gateway?
physically connects a computer to a network
provides a permanent address to a computer
identifies the network to which a computer is connected
identifies the logical address of a networked computer and uniCuely identifies it to the rest of the network
identifies the device that allows local network computers to communicate with devices on other networks
25. #f the default gateway is configured incorrectly on the host4 what is the impact on communications?
$he host is unable to communicate on the local network.
!he host can communicate with other hosts on the local network( but is unable to communicate with hosts on remote
networks
$he host can communicate with other hosts on remote networks4 but is unable to communicate with hosts on the local network.
$here is no impact on communications.
1,
Smith Nguyen Studio. Smith Nguyen Studio.
https:/ / www.facebook.com/ SmithNguyenStudio
36. -efer to the e.hibit. ( network administrator is troubleshooting a connectivity problem and needs to determine the address that is used to
forward network packets out the network. 0sing the netstat >r command4 the administrator would identify which address as the address to
which all hosts send packets that are destined for an outside network?
16.16.16.21
122.6.6.1
:9:9:9A
16.16.16.1
22*.6.6.6
31. -efer to the e.hibit. $he network in the e.hibit is fully operational. What two statements correctly describe the routing for the topology
that is shown? (Choose two.)
:@2:A892 is the ne#t.hop address that is used by ?1 to route a packet from the :9999 network to the :C2:A99 network
16.6.6.1 is the ne.t>hop address that is used by -1 to route a packet from the 152.113.12.6 network to the 16.6.6.6 network.
152.113.6.1 is the ne.t>hop address that is used by -1 to route a packet from the 152.113.12.6 network to the 122.11.6.6 network.
122.11.6.1 is the ne.t>hop address that is used by - to route a packet from the 16.6.6.6 to the 122.11.6.6 network.
:@2:A89: is the ne#t.hop address that is used by ?2 to route a packet from the :C2:A99 network to the :@2:A8:29
network
152.113.6.2 is the ne.t>hop address that is used by -2 to route a packet from the 122.11.6.6 network to the 152.113.12.6 network.
11
Smith Nguyen Studio. Smith Nguyen Studio.
https:/ / www.facebook.com/ SmithNguyenStudio
32. -efer to the e.hibit. 0sing the network in the e.hibit4 what would be the default gateway address for host ( in the 152.1.215.6
network?
152.1,.2,6.1
152.1.2.1
152.1.215.6
:@2:112:@:
12
Smith Nguyen Studio. Smith Nguyen Studio.
https:/ / www.facebook.com/ SmithNguyenStudio
Chapter A
3. Which #%v* subnetted addresses represent valid host addresses? (Choose three.)
122.11.*.122 &21
:C2:A3:>> B2A
:C2:A3:@1 B2A
122.11.*.5, &22
122.11.*.1,5 &22
:C2:A329C B2C
3*. What subnet mask would a network administrator assign to a network address of 122.6.1.6 if it were possible to have up to 2,* hosts?
2,,.2,,.6.6
2>>2>>2>>9
2,,.2,,.2,*.6
2,,.2,,.2*3.6
3,. ( router interface has been assigned an #% address of 122.11.152.111 with a mask of 2,,.2,,.2,,.2*3. $o which subnet does the #%
address belong?
122.11.6.6
122.11.152.6
122.11.152.123
:C2:A:@2:A9
122.11.152.113
122.11.152.121
31. What is the primary reason for development of #%v1?
security
header format simplification
e#panded addressing capabilities
addressing simplification
32. What is the network address of the host 122.2,.12.55 &2 in binary?
16161166. 66611661.61666611.66666666
16161166. 66611661.61666611.11111111
:9:9::99 999::99:9:9999:999999999
16161166. 66611661.61666616.61166611
16161166. 66616661.61666611. 61166616
16161166. 66611661.66666666.66666666
33. What two things will happen if a router receives an #C?% packet which has a $$) value of 1 and the destination host is several hops
away? (Choose two.)
: !he router will discard the packet
2 $he router will decrement the $$) value and forward the packet to the ne.t router on the path to the destination host.
1 !he router will send a time e#ceeded message to the source host
* $he router will increment the $$) value and forward the packet to the ne.t router on the path to the destination host.
, $he router will send an #C?% -edirect ?essage to the source host.
35. Which three #% addresses are private? (Choose three.)
1 122.113..1
2 :91>AAC9
1 :@2:A8@@>
3 :C2:888@9
, 152..,,.35
1 122.,.11.,
56. Which process do routers use to determine the subnet network address based upon a given #% address and subnet mask?
1 binary adding
2 he.adecimal anding
binary division
* binary multiplication
> binary ANDing
13
Smith Nguyen Studio. Smith Nguyen Studio.
https:/ / www.facebook.com/ SmithNguyenStudio
51. :iven the #% address and subnet mask of 122.11.1*.1* 2,,.2,,.2,,.22*4 which of the following would describe this address?
1 $his is a useable host address.
2 $his is a broadcast address.
1 !his is a network address
* $his is not a valid address.
52. -efer to the e.hibit. Which network prefi. will work with the #% addressing scheme shown in the graphic.
1 &2*
2 &11
&26
3 B2C
, &2,
1 &23
5. -efer to the e.hibit. Why would the response shown be displayed after issuing the command ping 122.6.6.1 on a %C?
1 $he #% settings are not properly configured on the host.
2 +nternet Protocol is not properly installed on the host
$here is a problem at the physical or data link layer.
* $he default gateway device is not operating.
, ( router on the path to the destination host has gone down.
5*. What is a group of hosts called that have identical bit patterns in the high order bits of their addresses?
1 an internet
2 a network
an octet
* a radi.
15
Smith Nguyen Studio. Smith Nguyen Studio.
https:/ / www.facebook.com/ SmithNguyenStudio
5,. -efer to the e.hibit. $he network administrator has assigned the internetwork of )9?#"" an address range of 152.113.16.6. $his address
range has been subnetted using a &25 mask. #n order to accommodate a new building4 the technician has decided to use the fifth subnet for
configuring the new network (subnet 7ero is the first subnet). 9y company policies4 the router interface is always assigned the first usable host
address and the workgroup server is given the last usable host address. Which configuration should be entered into the workgroup serverIs
properties to allow connectivity to the network?
1 #% address@ 152.113.16.3 subnet mask@ 2,,.2,,.2,,.2*6 default gateway@ 152.113.16.5
2 #% address@ 152.113.16.3 subnet mask@ 2,,.2,,.2,,.2*6 default gateway@ 152.113.16.
1 +P address: :@2:A8:918 subnet mask: 2>>2>>2>>238 default gateway: :@2:A8:911
* #% address@ 152.113.16.5 subnet mask@ 2,,.2,,.2,,.2*3 default gateway@ 152.113.16.1
, #% address@ 152.113.16.2,* subnet mask@ 2,,.2,,.2,,.6 default gateway@ 152.113.16.1
51. -efer to the e.hibit. ( network administrator has to develop an #% addressing scheme that uses the 152.113.1.6 &2* address space. $he
network that contains the serial link has already been addressed out of a separate range. +ach network will be allocated the same number of
host addresses. Which network mask will be appropriate to address the remaining networks?
1 2,,.2,,.2,,.2*3
2 2,,.2,,.2,,.22*
1 2>>2>>2>>:@2
* 2,,.2,,.2,,.2*6
, 2,,.2,,.2,,.123
1 2,,.2,,.2,,.2,2
52. What three facts are true about the network portion of an #%v* address? (Choose three.)
1 identifies an individual device
2 is identical for all hosts in a broadcast domain
is altered as packet is forwarded
3 varies in length
> is used to forward packets
1 uses flat addressing
53. Which statements are true regarding #% addressing? (Choose two.)
1 '($ translates public addresses to private addresses destined for the #nternet.
2 !nly one company is allowed to use a specific private network address space.
1 Private addresses are blocked from public +nternet by router
* 'etwork 122.2.6.6 is part of the private address space.
> +P address :2C99: can be used for a host to direct traffic to itself
26
Smith Nguyen Studio. Smith Nguyen Studio.
https:/ / www.facebook.com/ SmithNguyenStudio
55. Which of the following network devices are recommended to be assigned static #% addresses? (Choose three.)
1 )(' workstations
2 servers
1 network printers
3 routers
, remote workstations
1 laptops
166. -efer to the e.hibit. ( network administrator discovers that host ( is having trouble with #nternet connectivity4 but the server farm has
full connectivity. #n addition4 host ( has full connectivity to the server farm. What is a possible cause of this problem?
1 $he router has an incorrect gateway.
2 ;ost ( has an overlapping network address.
;ost ( has an incorrect default gateway configured.
* ;ost ( has an incorrect subnet mask.
> NA! is re&uired for the host A network
161. Which of the following are features of #%v1? (Choose three.)
: larger address space
2 faster routing protocols
1 data types and classes of service
3 authentication and encryption
, improved host naming conventions
1 same addressing scheme as #%v*
162. -efer to the e.hibit. ;ost ( is connected to the )('4 but it cannot get access to any resources on the #nternet. $he configuration of the
host is shown in the e.hibit. What could be the cause of the problem?
1 $he host subnet mask is incorrect.
2 $he default gateway is a network address.
$he default gateway is a broadcast address.
3 !he default gateway is on a different subnet from the host
21
Smith Nguyen Studio. Smith Nguyen Studio.
https:/ / www.facebook.com/ SmithNguyenStudio
16. ;ow many bits make up an #%v* address?
1 123
2 1*
*3
3 12
22
Smith Nguyen Studio. Smith Nguyen Studio.
https:/ / www.facebook.com/ SmithNguyenStudio
Chapter C
16*. What is true concerning physical and logical topologies?
$he logical topology is always the same as the physical topology.
%hysical topologies are concerned with how a network transfers frames.
%hysical signal paths are defined by /ata )ink layer protocols.
Logical topologies consist of virtual connections between nodes
16,. What determines the method of media access control? (Choose two.)
network layer addressing
media sharing
application processes
logical topology
intermediary device function
161. Which statements describe the logical token>passing topology? (Choose two.)
'etwork usage is on a first come4 first serve basis.
Computers are allowed to transmit data only when they possess a token
/ata from a host is received by all other hosts.
'lectronic tokens are passed se&uentially to each other
$oken passing networks have problems with high collision rates.
162. -efer to the e.hibit. Which statement describes the media access control methods that are used by the networks in the e.hibit?
(ll three networks use C"?(&C(
'one of the networks reCuire media access control.
Network : uses C65ABCD and Network 1 uses C65ABCA
'etwork 1 uses C"?(&C( and 'etwork 2 uses C"?(&C/.
'etwork 2 uses C"?(&C( and 'etwork uses C"?(&C/.
163. What is true regarding media access control? (Choose three.)
'thernet utili"es C65ABCD
defined as placement of data frames on the media
contention>based access is also known as deterministic
362.11 utili7es C"?(&C/
Data Link layer protocols define the rules for access to different media
controlled access contains data collisions
165. Which options are properties of contention>based media access for a shared media? (Choose three.)
non.deterministic
less overhead
one station transmits at a time
collisions e#ist
devices must wait their turn
token passing
2
Smith Nguyen Studio. Smith Nguyen Studio.
https:/ / www.facebook.com/ SmithNguyenStudio
116. What is a function of the data link layer?
provides the formatting of data
provides end>to>end delivery of data between hosts
provides delivery of data between two applications
provides for the e#change data over a common local media
111. What statements are true regarding addresses found at each layer of the !"# model? (Choose two.)
Layer 2 may identify devices by a physical address burned into the network card
)ayer 2 identifies the applications that are communicating
Layer 1 represents a hierarchical addressing scheme
)ayer * directs communication to the proper destination network
)ayer * addresses are used by intermediary devices to forward data
112. -efer to the e.hibit. ( frame is being sent from the %C to the laptop. Which source ?(C and #% addresses will be included in the frame
as it leaves -outer9? (Choose two.)
source ?(C > %C
source ?(C > "6&6 on -outer(
source 5AC . )a9B: on ?outer-
source +P . PC
source #% > "6&6 on -outer(
source #% > =a6&1 of -outer9
11. What is the purpose of the preamble in an +thernet frame?
is used as a pad for data
identifies the source address
identifies the destination address
marks the end of timing information
is used for timing synchroni"ation with alternating patterns of ones and "eros
11*. What is the primary purpose of the trailer in a data link layer frame?
define the logical topology
provide media access control
support frame error detection
carry routing information for the frame
11,. What is a characteristic of a logical point>to>point topology?
$he nodes are physically connected.
$he physical arrangement of the nodes is restricted.
!he media access control protocol can be very simple
$he data link layer protocol used over the link reCuires a large frame header.
2*
Smith Nguyen Studio. Smith Nguyen Studio.
https:/ / www.facebook.com/ SmithNguyenStudio
111. -efer to the e.hibit. ;ow many uniCue C-C calculations will take place as traffic routes from the %C to the laptop?
1
2
*
8
112. Which sublayer of the data link layer prepares a signal to be transmitted at the physical layer?
))C
5AC
;/)C
'#C
113. -efer to the e.hibit. (ssuming that the network in the e.hibit is converged meaning the routing tables and (-% tables are complete4
which ?(C address will ;ost ( place in the destination address field of +thernet frames destined for www.server?
66>1c>*1>ab>c6>66
99.9c.8>.cf.A>.c9
66>6c>3,>cf>1,>c1
66>12>f>2>6,>af
115. What two facts are true when a device is moved from one network or subnet to another? (Choose two.)
$he )ayer 2 address must be reassigned.
$he default gateway address should not be changed.
!he device will still operate at the same Layer 2 address
(pplications and services will need additional port numbers assigned.
!he Layer 1 address must be reassigned to allow communications to the new network
126. ( network administrator has been asked to provide a graphic representation of e.actly where the company network wiring and
eCuipment are located in the building. What is this type of drawing?
logical topology
physical topology
cable path
wiring grid
access topology
2,
Smith Nguyen Studio. Smith Nguyen Studio.
https:/ / www.facebook.com/ SmithNguyenStudio
121. What is a primary purpose of encapsulating packets into frames?
provide routes across the internetwork
format the data for presentation to the user
facilitate the entry and e#it of data on media
identify the services to which transported data is associated
122. What are three characteristics of valid +thernet )ayer 2 addresses? (Choose three.)
!hey are 38 binary bits in length
!hey are considered physical addresses
!hey are generally represented in he#adecimal format
$hey consist of four eight>bit octets of binary numbers.
$hey are used to determine the data path through the network.
$hey must be changed when an +thernet device is added or moved within the network.
12. Which three factors should be considered when implementing a )ayer 2 protocol in a network? (Choose three.)
the )ayer protocol selected
the geographic scope of the network
the %/0 defined by the transport layer
the physical layer implementation
the number of hosts to be interconnected
21
Smith Nguyen Studio. Smith Nguyen Studio.
https:/ / www.facebook.com/ SmithNguyenStudio
Chapter 8
12*. (n installed fiber run can be checked for faults4 integrity4 and the performance of the media by using what device?
light inEector
7!D?
$/-
?ultimeter
12,. Which characteristics describe fiber optic cable? (Choose two.)
+t is not affected by '5+ or ?)+
+ach pair of cables is wrapped in metallic foil.
#t combines the techniCue of cancellation4 shielding and twisting to protect data.
#t has a ma.imum speed of 166 ?bps.
+t is the most e#pensive type of LAN cabling
121. Which of the following is a characteristic of single>mode fiber>optic cable?
generally uses )+/s as the light source
relatively larger core with multiple light paths
less e.pensive than multimode
generally uses lasers as the light source
122. What is a possible effect of improperly applying a connector to a network cable?
/ata will be forwarded to the wrong node.
Data transmitted through that cable may e#perience signal loss
(n improper signaling method will be implemented for data transmitted on that cable.
$he encoding method for data sent on that cable will change to compensate for the improper connection.
123. With the use of unshielded twisted>pair copper wire in a network4 what causes crosstalk within the cable pairs?
the magnetic field around the adDacent pairs of wire
the use of braided wire to shield the adEacent wire pairs
the reflection of the electrical wave back from the far end of the cable
the collision caused by two nodes trying to use the media simultaneously
125. What characteristic of 0$% cable helps reduce the effects of interference?
the metal braiding in the shielding
the reflective cladding around core
the twisting of the wires in the cable
the insulating material in the outer Eacket
16. #n )(' installations where potential electrical ha7ards or electromagnetic interference may be present4 what type of media is
recommended for backbone cabling?
coa.
fiber
Cat,e 0$%
Cat1 0$%
"$%
11. Which method of signal transmission uses radio waves to carry signals?
electrical
optical
wireless
acoustic
12. What are three measures of data transfer? (Choose three.)
goodput
freCuency
amplitude
throughput
crosstalk
bandwidth
22
Smith Nguyen Studio. Smith Nguyen Studio.
https:/ / www.facebook.com/ SmithNguyenStudio
1. Which type of cable run is most often associated with fiber>optic cable?
backbone cable
hori7ontal cable
patch cable
work area cable
1*. When is a straight>through cable used in a network?
when connecting a router through the console port
when connecting one switch to another switch
when connecting a host to a switch
when connecting a router to another router
1,. What is considered a benefit of wireless as a media choice?
more host mobility
lower security risks
reduced susceptibility to interference
less impact of the surroundings on the effective coverage area
11. #n most business )('s4 which connector is used with twisted>pair networking cable?
9'C
-<>11
?,.3>
$ype =
12. Which !"# layer is responsible for binary transmission4 cable specification4 and physical aspects of network communication?
%resentation
$ransport
/ata )ink
Physical
13. Which fiber connector supports full duple. +thernet?
$his one.
15. What is a primary role of the %hysical layer in transmitting data on the network?
create the signals that represent the bits in each frame on to the media
provide physical addressing to the devices
determine the path packets take through the network
control data access to the media
23
Smith Nguyen Studio. Smith Nguyen Studio.
https:/ / www.facebook.com/ SmithNguyenStudio
1*6. -efer to the e.hibit. Which type of Category , cable is used to make an +thernet connection between ;ost ( and ;ost 9?
coa. cable
rollover cable
crossover cable
straight>through cable
25
Smith Nguyen Studio. Smith Nguyen Studio.
https:/ / www.facebook.com/ SmithNguyenStudio
Chapter @
1*1. When a collision occurs in a network using C"?(&C/4 how do hosts with data to transmit respond after the backoff period has e.pired?
!he hosts return to a listen.before.transmit mode
$he hosts creating the collision have priority to send data.
$he hosts creating the collision retransmit the last 11 frames.
$he hosts e.tend their delay period to allow for rapid transmission.
1*2. -efer to the e.hibit. $he switch and workstation are administratively configured for full>duple. operation. Which statement accurately
reflects the operation of this link?
No collisions will occur on this link
!nly one of the devices can transmit at a time.
$he switch will have priority for transmitting data.
$he devices will default back to half duple. if e.cessive collisions occur.
1*. Why do hosts on an +thernet segment that e.perience a collision use a random delay before attempting to transmit a frame?
( random delay is used to ensure a collision>free link.
( random delay value for each device is assigned by the manufacturer.
( standard delay value could not be agreed upon among networking device vendors.
A random delay helps prevent the stations from e#periencing another collision during the transmission
1**. +thernet operates at which layers of the !"# model? (Choose two.)
'etwork layer
$ransport layer
Physical layer
(pplication layer
"ession layer
Data.link layer
1*,. What does the #+++ 362.2 standard represent in +thernet technologies?
?(C sublayer
%hysical layer
Logical Link Control sublayer
'etwork layer
6
Smith Nguyen Studio. Smith Nguyen Studio.
https:/ / www.facebook.com/ SmithNguyenStudio
1*1. -efer to the e.hibit. ;ostJ( is attempting to contact "erverJ9. Which statements correctly describe the addressing ;ostJ( will generate
in the process? (Choose two.)
( packet with the destination #% of -outerJ9.
( frame with the destination ?(C address of "witchJ(.
( packet with the destination #% of -outerJ(.
A frame with the destination 5AC address of ?outerEA
A packet with the destination +P of 6erverE-
( frame with the destination ?(C address of "erverJ9.
1*2. ;ost ( has an #% address of 122.11.22,.54 a mask of 2,,.2,,.2*3.64 and a default gateway of 122.11.22*.1. ;ost ( needs to send a
packet to a new host whose #% is 122.11.21.23. ;ost ( performs the ('/ing operation on its address and subnet mask. What two things will
occur? (Choose two.)
*ost A will get a result of :C2:A2239 from the AND process
;ost ( will send on to the media a broadcast frame that contains the packet.
*ost A will broadcast an A?P re&uest for the 5AC of the host :C2:A21:C8
;ost ( will change the destination #% of the packet to 122.11.22*.1 and forward the packet.
;ost ( will encapsulate the packet in a frame with a destination ?(C that is the ?(C address associated with 122.11.22*.1.
1*3. Which two features make switches preferable to hubs in +thernet>based networks? (Choose two.)
reduction in cross>talk
minimi"ing of collisions
support for 0$% cabling
division into broadcast domains
increase in the throughput of communications
1*5. What are three functions of the upper data link sublayer in the !"# model? (Choose three.)
recogni7es streams of bits
identifies the network layer protocol
makes the connection with the upper layers
identifies the source and destination applications
insulates network layer protocols from changes in physical e&uipment
determines the source of a transmission when multiple devices are transmitting
1,6. What are the two most commonly used media types in +thernet networks today? (Choose two.)
coa.ial thicknet
copper $!P
coa.ial thinnet
optical fiber
shielded twisted pair
1
Smith Nguyen Studio. Smith Nguyen Studio.
https:/ / www.facebook.com/ SmithNguyenStudio
1,1. -efer to the e.hibit. Which option correctly identifies content that the frame data field may contain?
preamble and stop frame
network layer packet
physical addressing
=C" and "o=
1,2. Which of the following describe interframe spacing? (Choose two.)
the minimum interval( measured in bit.times( that any station must wait before sending another frame
the ma.imum interval4 measured in bit>times4 that any station must wait before sending another frame
the 51>bit payload padding inserted into a frame to achieve a legal frame si7e
the 51>bit frame padding transmitted between frames to achieve proper synchroni7ation
the time allowed for slow stations to process a frame and prepare for the ne#t frame
the ma.imum interval within which a station must send another frame to avoid being considered unreachable
1,. (fter an +thernet collision4 when the backoff algorithm is invoked4 which device has priority to transmit data?
the device involved in the collision with the lowest ?(C address
the device involved in the collision with the lowest #% address
any device in the collision domain whose backoff timer e#pires first
those that began transmitting at the same time
1,*. Convert the binary number 16111616 into its he.adecimal eCuivalent. "elect the correct answer from the list below.
3,
56
-A
(1
9
1C
1,,. Which of the following is a drawback of the C"?(&C/ access method?
Collisions can decrease network performance
#t is more comple. than non>deterministic protocols.
/eterministic media access protocols slow network performance.
C"?(&C/ )(' technologies are only available at slower speeds than other )(' technologies.
1,1. +thernet operates at which layer of the $C%&#% network model?
application
physical
transport
internet
data link
network access
2
Smith Nguyen Studio. Smith Nguyen Studio.
https:/ / www.facebook.com/ SmithNguyenStudio
1,2. #n the graphic4 ;ost ( has reached ,6K completion in sending a 1 G9 +thernet frame to ;ost / when ;ost 9 wishes to transmit its own
frame to ;ost C. What must ;ost 9 do?
;ost 9 can transmit immediately since it is connected on its own cable segment.
;ost 9 must wait to receive a C"?( transmission from the hub4 to signal its turn.
;ost 9 must send a reCuest signal to ;ost ( by transmitting an interframe gap.
*ost - must wait until it is certain that *ost A has completed sending its frame
1,3. Which statements correctly describe ?(C addresses? (Choose three.)
dynamically assigned
copied into ?A5 during system startup
layer address
contains a 1 byte 7$+
A bytes long
2 bits long
1,5. What three primary functions does data link layer encapsulation provide? (Choose three.)
addressing
error detection
frame delimiting
port identification
path determination
#% address resolution
116. What is the primary purpose of (-%?
translate 0-)s to #% addresses
resolve +Pv3 addresses to 5AC addresses
provide dynamic #% configuration to network devices
convert internal private addresses to e.ternal public addresses

Smith Nguyen Studio. Smith Nguyen Studio.


https:/ / www.facebook.com/ SmithNguyenStudio
Chapter :9
111. -efer to the e.hibit. ( student working in the lab selects a cable that is wired as shown. Which connection types can successfully be
made with this cable? (Choose two.)
connecting a %C to a routerIs console port
connecting two routers together via their fast ethernet ports
connecting two switches together at gigabit speeds
connecting a %C to a switch at :igabit +thernet speeds
connecting two devices with the same interface type at )ast 'thernet speeds
112. Which option identifies the primary interface which would be used for initial configuration of a Cisco router?
(0L interface
+thernet interface
serial interface
console interface
11. What makes fiber preferable to copper cabling for interconnecting buildings? (Choose three.)
greater distances per cable run
lower installation cost
limited susceptibility to '5+B?)+
durable connections
greater bandwidth potential
easily terminated
11*. ( network administrator is reCuired to use media in the network that can run up to 166 meters in cable length without using repeaters.
$he chosen media must be ine.pensive and easily installed. $he installation will be in a pre>e.isting building with limited cabling space.
Which type of media would best meet these reCuirements?
"$%
$!P
coa.ial
single>mode fiber
multimode fiber
11,. What does the term 8attenuation8 mean in data communication?
loss of signal strength as distance increases
time for a signal to reach its destination
leakage of signals from one cable pair to another
strengthening of a signal by a networking device
111. ;ow many host addresses may be assigned on each subnetwork when using the 16.13.6.6 network address with a subnet mask of
2,,.2,,.2*3.6?
6
2,1
293A
26*3
*65*
*651
*
Smith Nguyen Studio. Smith Nguyen Studio.
https:/ / www.facebook.com/ SmithNguyenStudio
112. Which subnet mask would be assigned to the network address of 152.113.2.6 to provide 2,* useable host addresses per subnetwork?
2,,.2,,.6.6
2>>2>>2>>9
2,,.2,,.2,*.6
2,,.2,,.2*3.6
113. ( company is planning to subnet its network for a ma.imum of 22 hosts. Which subnet mask would provide the needed hosts and leave
the fewest unused addresses in each subnet?
2,,.2,,.2,,.6
2,,.2,,.2,,.152
2>>2>>2>>223
2,,.2,,.2,,.2*6
2,,.2,,.2,,.2*3
115. What type of network cable is used between a terminal and a console port?
cross>over
straight>through
rollover
patch cable
126. Which device is used to create or divide broadcast domains?
hub
switch
bridge
router
repeater
121. -efer to the e.hibit. What destination #% address will %C1 place in the header for a packet destined for %C2?
152.113.1.1
152.113.2.1
152.113.2.2
152.113..1
:@2:A81>3
,
Smith Nguyen Studio. Smith Nguyen Studio.
https:/ / www.facebook.com/ SmithNguyenStudio
122. -efer to the e.hibit. 9ased on the #% configuration shown4 what would be the result of ;ost ( and ;ost 9 attempting to communicate
outside the network segment?
both host ( and 9 would be successful
host ( would be successful4 host 9 would fail
host - would be successful( host A would fail
both ;ost ( and 9 would fail
12. Which three types of connectors are commonly associated with CiscoIs A., serial cables? (Choose three.)
-< 11
D- A9
/inchester :> pin
/9 5
smart serial
-< *,
12*. -efer to the e.hibit. ;ow many subnets are reCuired to support the network that is shown?
2
1
*
,
12,. What are three common methods for setting a 0$% +thernet port to ?/# or ?/#L operation? (Choose three.)
direct configuration of the device
cable color code association
cable selection and configuration
use of cable testers to determine pinouts
the enabling of the mechanism to electrically swap the transmit and receive pairs
the automatic detection and negotiating of 5D+B5D+F operation of the port
1
Smith Nguyen Studio. Smith Nguyen Studio.
https:/ / www.facebook.com/ SmithNguyenStudio
121. -efer to the e.hibit. ( student is setting up a home network primarily used for e.tensive file transfers4 streaming video4 and gaming.
Which network device is best suited to these types of activities in the topology shown?
wireless access point
router
hub
switch
122. Which three statements are true about the role of routers in the network? (Choose three.)
$hey propagate broadcasts.
$hey enlarge collision domains.
!hey segment broadcast domains
!hey interconnect different network technologies
'ach router interface re&uires a separate network or subnet
$hey maintain a common frame format between )(' and W(' interfaces.
123. -efer to the e.hibit. ( network administrator has decided to use packet capture software to evaluate all traffic from the student subnet on
the way to the #nternet. $o ensure that all packets are captured4 what network device should be used to connect the monitoring station to the
network between -1 and -2?
router
hub
switch
wireless access point
2
Smith Nguyen Studio. Smith Nguyen Studio.
https:/ / www.facebook.com/ SmithNguyenStudio
125. -efer to the e.hibit. (ssume that all devices are using default settings. ;ow many subnets are reCuired to address the topology that is
shown?
:

*
,
2
136. -efer to the e.hibit. Which three statements are true about the e.hibited topology? (Choose three.)
;osts 9 and C are in the same subnet.
)ive broadcast domains are present
*ost - is using a crossover cable to connect to the router
=our broadcast domains are present.
)ive networks are shown
;ost 9 is using a rollover cable to connect to the router.
131. $o establish a console connection from a computer to a Cisco router4 which cable wiring option would be used?
crossover cable
straight through cable
rollover cable
A., cable
3
Smith Nguyen Studio. Smith Nguyen Studio.
https:/ / www.facebook.com/ SmithNguyenStudio
132. -efer to the e.hibit. Which three statements identify the type of cabling that would be used in the segments that are shown? (Choose
three.)
"egment 1 uses backbone cabling.
6egment : uses a patch cable
"egment uses patch cabling.
"egment uses vertical cabling.
6egment 1 uses hori"ontal cabling
6egment 3 uses vertical cabling
13. -efer to the e.hibit. ( network technician has been allocated the 152.113.1.6&2* private #% address range for use in the network that
shown in the e.hibit. Which subnet mask would be used to meet the host reCuirements for segment ( of this internetwork?
2,,.2,,.2,,.123
2,,.2,,.2,,.152
2>>2>>2>>223
2,,.2,,.2,,.2*6
2,,.2,,.2,,.2*3
5
Smith Nguyen Studio. Smith Nguyen Studio.
https:/ / www.facebook.com/ SmithNguyenStudio
Chapter ::
13*. 0sers in the network are e.periencing slow response time when doing file transfers to a remote server. What command could be issued
to determine if the router has e.perienced any input or output errors?
show running>config
show startup>config
show interfaces
show ip route
show version
show memory
13,. -efer to the e.hibit. ( technician applies the configuration in the e.hibit to a clean router. $o verify the configuration4 the technician
issues the show running>config command in the C)# session with the router. What lines should the technician e.pect to see in the router output
from the show running>config command?
enable password class
line console 6
password ccna
enable secret cisco
enable password class
line console 6
password ccna
enable secret , M1Mv6&MDyDWm<y$27Ca&ya9-as<m6
enable password class
line console 6
password ccna
enable secret cisco
enable password 2 1*1*1+6(1=12
line console 6
password 2 626,62,,6(
enable secret > G:Gv9B1GHyH/m,y!C"CaBya-?as,m9
enable password C :3:3:'9A:):C
line console 9
password C 929>9C>>9A
*6
Smith Nguyen Studio. Smith Nguyen Studio.
https:/ / www.facebook.com/ SmithNguyenStudio
131. -efer to the e.hibit. ( network administrator on ;ost( has problems accessing the =$% server. )ayer three connectivity testing was
successful from ;ost( to the "1 interface of -outer9. Which set of commands will allow the network administrator to telnet to -outer9 and
run debug commands?
-outer9(config)N enable secret class
-outer9(config)N line vty 6 *
-outer9(config>if)N login
-outer9(config)N enable secret class
-outer9(config)N line vty 6 2
-outer9(config>vty)N password cisco
-outer9(config>vty)N login
?outer-0config2I enable secret class
?outer-0config2I line vty 9
?outer-0config.line2I password cisco
?outer-0config.line2I login
-outer9(config)N enable secret class
-outer9(config)N line au. 6
-outer9(config>line)N password cisco
-outer9(config>line)N login
-outer9(config)N enable secret class
-outer9(config)N line au. 6
-outer9(config>vty)N password cisco
-outer9(config>vty)N login
132. $he connection between routers 9 and C has been successfully tested. ;owever4 after rebooting router C4 the administrator noticed the
response time between networks 16.16..6 and 16.16.*.6 is slower. %ing between the two routers is successful. ( trace route indicates three
hops from router 9 to router C. What else can be done to troubleshoot the problem?
%ing router 9 "6&1 connection from router C.
$race the connection between router 9 to router C "6&1.
#ssue a show ip route command in router 9 to verify routing is enabled.
+ssue a show ip interface brief command on router C
133. #n a Cisco router4 when do changes made to the running>configuration take effect?
after a system restart
as the commands are entered
when logging off the system
when the configuration is saved to the startup>configuration
*1
Smith Nguyen Studio. Smith Nguyen Studio.
https:/ / www.facebook.com/ SmithNguyenStudio
135. -efer to the e.hibit. Which names correctly identify the C)# mode represented by the prompt for "witch>+ast*N? (Choose two.)
line configuration mode
user e.ecutive mode
global configuration mode
privileged e#ecutive mode
interface configuration mode
enable mode
156. -efer to the e.hibit. What command will place the router into the correct mode to configure an appropriate interface to connect to a
)('?
09(?(N configure terminal
09(?((config)N line vty 6 *
09(?((config)N line console 6
09(?((config)N interface "erial 6&6&6
$-A5A0config2I interface )ast'thernet 9B:
151. #mmediately after a router completes its boot seCuence4 the network administrator wants to check the routers configuration. =rom
privileged +L+C mode4 which of the following commands can the administrator use for this purpose? (Choose two.)
show flash
show 'A-(?
show startup.config
show running.config
show version
*2
Smith Nguyen Studio. Smith Nguyen Studio.
https:/ / www.facebook.com/ SmithNguyenStudio
152. -efer to the e.hibit. ( student is responsible for the #% addressing4 configuration and connectivity testing of the network shown in the
graphic. ( ping from host 9 to host C results in a destination unreachable but a ping from host 9 to host ( was successful. What two reasons
could account for this failure based on the graphic and partial router output for the /allas router? (Choose two.)
$he host ( is turned off.
$he =a6&6 interface on /allas is shutdown.
$he )(' cable is disconnected from host 9.
!he 69B9B: +P address of Dallas is improperly configured
$he =a6&6 interface on /allas is in a different subnet than host 9.
!he clock rate is missing on the serial link between Dallas and N=C
15. #n a Cisco device4 where is the #!" file stored prior to system startup?
-(?
-!?
)lash
'A-(?
*
Smith Nguyen Studio. Smith Nguyen Studio.
https:/ / www.facebook.com/ SmithNguyenStudio
15*. !n a Cisco router4 which interface would be used to make the initial configuration?
Console
15,. ( network administrator needs to keep the user #/4 password4 and session contents private when establishing remote C)# connectivity
with a router to manage it. Which access method should be chosen?
$elnet
Console
(0L
66*
151. $he serial connection shown in the graphic needs to be configured. Which configuration commands must be made on the "ydney router
to establish connectivity with the ?elbourne site? (Choose three.)
6ydney0config.if2I ip address 29::99>12 2>>2>>2>>9
6ydney0config.if2I no shutdown
"ydney(config>if)N ip address 261.166.,.1 2,,.2,,.2,,.22*
6ydney0config.if2I clock rate >A999
"ydney(config>if)N ip host ?elbourne 261.166.,.2
**
Smith Nguyen Studio. Smith Nguyen Studio.
https:/ / www.facebook.com/ SmithNguyenStudio
152. Which three terms correctly define the forms of help available within the Cisco #!"? (Choose three.)
hot keys
conte.t>check
conte#t.sensitive
structured check
command override
command synta# check
153. -efer to the e.hibit. $he output is shown for the show ip route command e.ecuted on -outer (. What does the #% address 152.113.2.2
represent?
:ateway for the 152.113.1.6 network
:ateway for the 152.113..6 network
#% assigned to the serial port on -outer (
+P assigned to the serial port on ?outer -
155. Which combination of keys would be used at the C)# prompt to interrupt a ping or traceroute process?
Ctrl>C
Ctrl>%
Ctrl>-
Ctrl.6hift.A
Ctrl>O
266. -efer to the e.hibit. What additional command is reCuired to allow remote access to this switch?
'(>"W1(config>if)N no shutdown
'(>"W1(config)N enable password password
NA.6/:0config2I ip default.gateway address
'(>"W1(config>if)N description description
261. When network services fail4 which port is most often used to access a router for management purposes?
(0L
*,
Smith Nguyen Studio. Smith Nguyen Studio.
https:/ / www.facebook.com/ SmithNguyenStudio
+thernet
Console
$elnet
"";
262. What command is used to change the default router name to =ontana?
-outerN name =ontana
-outerN hostname =ontana
-outer(config)N name =ontana
?outer0config2I hostname )ontana
*1
Smith Nguyen Studio. Smith Nguyen Studio.
https:/ / www.facebook.com/ SmithNguyenStudio
26. -efer to the e.hibit. $he output is shown for the show ip route command e.ecuted on -outer (. What does the #% address 152.113.2.2
represent?
:ateway for the 152.113.1.6 network
:ateway for the 152.113..6 network
#% assigned to the serial port on -outer (
+P assigned to the serial port on ?outer -
CCNA 3 J-logspotK . )inal '#am Answers 0:2
26*. #dentify the factors that contribute to congestion on an +thernet )('. (Choose three.)
PPP improper placement of enterprise level servers
PPP addition of hosts to a physical segment
replacement of hubs with workgroup switches
PPP increasing use of bandwidth intensive network applications
www.ccna>*.blogspot.com
creation of new collision domains without first adding network hosts
migration to full>duple. +thernet within the )('
26,. Which of the following are e.amples of $C%&#% application layer protocols? (Choose three.)
PPP a terminal emulation protocol that supports remote console connections with various network devices
a protocol created by #9? that makes it easier for mainframes to connect to remote offices
PPP a protocol responsible for transporting electronic mail on $C%&#% networks and the #nternet
a protocol that controls the rate at which data is sent to another computer
PPP a protocol that e.changes network management information between a network device and a management console
261. Which of the following eliminates switching loops?
hold>down timers
poison reverse
PPP spanning tree protocol
time to live
split hori7on protocol
262. $he show cdp neighbors command is a very useful network troubleshooting tool. 0sing the output in the graphic4 select the statements
that are true. (Choose two.)
C/% operates at the network layer of the !"# model.
PPP $he output of this command displays information about directly connected Cisco devices only.
$he switch is attached to the "an<ose1 =ast+thernet6&21 interface.
"an<ose1 is running C/% version 12.6.
"an<ose1 has two fully operational4 cdp>enabled Cisco switches directly connected to it.
PPP "an<ose2 is a 2166 series router running several routed protocols
263. ( network administrator can ping the /enver router4 but gets a I%assword -eCuired but 'one "etI message when trying to connect
remotely via $elnet. Which command seCuence must be applied to the /enver router to allow remote access?
-outer(config)N line console 6
-outer(config>line)N login
-outer(config>line)N password cisco
PPP -outer(config)N line vty 6 *
PPP -outer(config>line)N login
PPP -outer(config>line)N password cisco
-outer(config)N line virtual terminal
-outer(config>line)N enable login
*2
Smith Nguyen Studio. Smith Nguyen Studio.
https:/ / www.facebook.com/ SmithNguyenStudio
-outer(config>line)N password cisco
-outer(config)N line vty 6 *
-outer(config>line)N enable secret
-outer(config>line)N password cisco
-outer(config)N enable secret cisco
-outer(config)N enable cisco
265. Which of the following is associated with link>state routing protocols?
low processor overhead
poison reverse
routing loops
split hori7on
PPP shortest>path first calculations
216. ( router does not load its configuration after a power failure. (fter running the show startup>configuration command4 the adminstrator
finds that the original configuration is intact. What is the cause of this problem?
$he configuration register is set for 6.2166.
$he configuration register is set for 6.2161.
$he configuration register is set for 6.2162.
PPP $he configuration register is set for 6.21*2.
9oot system commands are not configured.
=lash memory is empty causing the router to bypass the configuration in 'A-(?
'ederst pQ formularen
211. Which commands are used to verify the content and placement of access control lists? (Choose three.)
PPP show ip interface
show ip route
show processes
PPP show running>config
show cdp neighbor
PPP show access>lists
212. Which of the following are reCuired when creating a standard access control list? (Choose two.)
destination address and wildcard mask
PPP source address and wildcard mask
subnet mask and wildcard mask
access list number between 166 and 155 or 2666 and 2155
PPP access list number between 1 and 55 or 166 to 1555
21. Which of the following are keywords that can be used in an access control list to replace a dotted decimal wildcard mask? (Choose two.)
most
PPP host
all
PPP any
some
sum
21*. -efer to the diagram. (ll ports on "witch ( are in the "ales A)(' and all ports on "witch 9 are in the (ccounting A)('. ;ow many
broadcast domains and how many collision domains are shown? (Choose two).
collision domains
PPP broadcast domains
, broadcast domains
PPP 5 collision domains
16 collision domains
1 collision domains
21,. -efer to the graphic. 0sing the most efficient #% addressing scheme and A)"?4 which address can be configured on one of the serial
interfaces?
152.113.11.1&22
152.113.11.1,3&22
152.113.11.152&22
152.113.11.11&6
152.113.11.1*,&6
PPP 152.113.11.15&6
211. What is the purpose of the "panning $ree %rotocol ("$%)?
*3
Smith Nguyen Studio. Smith Nguyen Studio.
https:/ / www.facebook.com/ SmithNguyenStudio
PPP prevents )ayer 2 loops
prevents routing loops on a router
creates smaller collision domains
creates smaller broadcast domains
allows Cisco devices to e.change routing table updates
212. What is the purpose of a loopback address when using the !"%= routing protocol?
activates the !"%= neighboring process
PPP ensures a persistent router #/ for the !"%= process
provides a backdoor for connectivity during the convergence process
streamlines and speeds up the convergence process
213. Which statement is true regarding states of the #+++ 362.1d "panning $ree %rotocol?
%orts are manually configured to be in the forwarding state.
PPP %orts listen and learn before going into the forwarding state.
%orts must be blocked before they can be placed in the disabled state.
#t takes 1, seconds for a port to go from blocking to forwarding
215. Which seCuence of commands is used to configure a loopback address on a router?
-outer1(config)N interface loopback 1
-outer1(config>if)N ip address 152.113.1.1
-outer1(config)N interface serial 6&6
-outer1(config>if)N loopback 1
-outer1(config>if)N ip address 152.113.1.1
-outer1(config)N interface serial 6&6
-outer1(config>if)N loopback 1
-outer1(config>if)N ip address 152.113.1.1 2,,.2,,.2,,.6
PPP -outer1(config)N interface loopback 1
PPP -outer1(config>if)N ip address 152.113.1.1 2,,.2,,.2,,.2,,
226. Which routing protocols are classful and do not support A)"?? (Choose two.)
+#:-%
!"%=
PPP -#% v1
-#% v2
PPP #:-%
221. -efer to the graphic. $wo switches are connected together through a trunk port. "W2 displays the message shown. Which of the
following will solve the duple. mismatch?
"W1(config)N interface fastethernet 6&1
"W1(config>if)N duple. full
"W1(config)N interface fastethernet 6&1
"W1(config>if)N full>duple.
PPP "W2(config)N interface fastethernet 6&1
PPP "W2(config>if)N duple. full
"W2(config)N interface fastethernet 6&1
"W2(config>if)N full>duple.
222. -efer to the graphic. $wo routers have been configured to use +#:-%. %ackets are not being forwarded between the two routers. What
could be the problem?
+#:-% does not support A)"?.
$he routers were not configured to monitor neighbor adEacency changes.
$he default bandwidth was used on the routers.
PPP (n incorrect #% address was configured on a router interface.
(ccording to the the provided router output4 which of the following statements is true regarding %%% operation?
!nly the link>establishment phase completed successfully.
!nly the network>layer phase completed successfully.
'either the link>establishment phase nor the the network>layer phase completed successfully.
PPP 9oth the link>establishment and network>layer phase completed successfully
22. =rame -elay is configured over a point>to>point connection between two routers. $he output of the show frame>relay pvc command
indicates that the status of this %AC is inactive. Which of the following devices could be the source of the problem? (Choose two.)
local router
local =rame -elay switch
PPP remote router
*5
Smith Nguyen Studio. Smith Nguyen Studio.
https:/ / www.facebook.com/ SmithNguyenStudio
PPP remote =rame -elay switch
- has the following configuration@
-N show running>config
>>some output te.t omitted>>
interface serial6&6
bandwidth 123
ip address 152.113.11.2 2,,.2,,.2,,.6
encapsulation frame>relay
frame>relay map ip 152.113.11.2 6 broadcast
22*. (fter the command -N debug frame>relay packet is e.ecuted4 a ping is issued from - to -1 but is unsuccessful. 9ased on the output of
the debug command shown in the graphic and the router configuration4 what might be problem?
PPP 'o clock rate assigned.
$here is an incorrect /)C# number in the map statement.
(n incorrect #% address e.ists in the map statement.
$he encapsulation command is missing the broadcast keyword
22,. Which statements are true regarding the =rame -elay )?#? (Choose three.)
PPP $he )?# provides a virtual circuit (AC) status mechanism.
$he )?# type must always be manually configured.
$he available )?# types are '#14 /?"166 and ,+"".
$he )?# types supported by Cisco routers are C#"C! and #+$=.
PPP $he )?# type configured on the router must match the one used on the =rame -elay switch.
PPP $he )?# uses reserved /)C#s to e.change messages between the /$+ and /C+
221. Which statement describes the process that occurs in 'etwork (ddress $ranslation ('($) overloading?
PPP ?ultiple private #% addresses are mapped to one public #% address.
$he number of usable addresses assigned to a company is divided into smaller manageable groups.
( pool of #% addresses are mapped to one or more ?(C addresses.
$he router acts as a /;C% server and assigns multiple public #% addresses for each private #% address configured
222. Which two statements are true about the committed information rate on a =rame -elay link? (Choose two.)
$he sum of the C#-s for all %ACs must be less than the port speed.
$he sum of the C#-s for all %ACs must eCual the port speed.
PPP $he sum of the C#-s for all %ACs can be greater than the port speed.
PPP $he /+ bit will be set on frames that are transmitted in e.cess of the C#-.
=rames that are transmitted at greater than the C#- will be discarded at the source.
#t is impossible to transmit frames at a rate in e.cess of the C#-
223. Which of the following commands would be used to troubleshoot the processing of call control functions such as call setup4 signaling4
and termination?
show interface bri6&6
show isdn active
debug isdn C521
PPP debug isdn C51
debug ppp negotiation
debug ppp authentication
225. Which of the following statements are true regarding %%%? (Choose three.)
PPP %%% can use synchronous and asynchronous physical media.
%%% can only be used between two Cisco devices.
%%% carries packets from several network layer protocols in )C%s.
PPP %%% uses )C%s to establish4 configure4 and test the data link connection.
PPP %%% uses )C%s to agree on format options such as authentication4 compression4 and error detection
26. ( network administrator is evaluating authentication protocols for a %%% link. Which of the following reasons might lead to the selection
of C;(% over %(% as the authentication protocol? (Choose three.)
establishes identities with a two>way handshake
PPP uses a three>way authentication periodically during the session to reconfirm identities
control by the remote host of the freCuency and timing of login events
PPP transmits login information in encrypted format
PPP uses an unpredictable variable challenge value to prevent playback attacks
makes authori7ed network administrator intervention a reCuirement to establish each session
21. Why are static routes often used with #"/' //-?
$hey are more stable than dynamic routing protocols.
,6
Smith Nguyen Studio. Smith Nguyen Studio.
https:/ / www.facebook.com/ SmithNguyenStudio
$hey are more accurate than dynamic routing protocols because they are put in by a network administrator.
$hey are easier to modify when a faster technology is installed.
PPP $hey prevent the unnecessary activation of the link
22. (ssuming that four bits have been borrowed to make subnets4 identify the subnet network addresses. (Choose three.)
152.113.1*.3
PPP 152.113.1*.11
152.113.1*.2*
PPP 152.113.1*.2
152.113.1*.1*3
PPP 152.113.1*.263
2. ( switch can be configured for three different forwarding modes based on how much of a frame is received before the forwarding
process begins. +ach of the numbered arrows in the accompanying graphic signifies the point in a frame where a particular forwarding mode
will begin. Which one of the following groups reflects the seCuence of forwarding modes signified by the numbered arrows?
PPP 1) fast forward
PPP 2) fragment free
PPP ) store>and>forward
store>and>forward
2) fragment free
) fast forward
fragment free
2) fast forward
) store>and>forward
fast forward
2) store>and>forward
) fragment free
2*. Which of the following commands will display a communication message on a router before the router prompt is shown?
PPP banner motd P %roperty of $)C. 0'(0$;!-#O+/ 0"+-" W#)) 9+ %-!"+C0$+/ $! $;+ =0)) +L$+'$ != $;+
)(W. P
message %roperty of $)C. 0'(0$;!-#O+/ 0"+-" W#)) 9+ %-!"+C0$+/ $! $;+ =0)) +L$+'$ != $;+ )(W.
banner P %roperty of $)C. 0'(0$;!-#O+/ 0"+-" W#)) 9+ %-!"+C0$+/ $! $;+ =0)) +L$+'$ != $;+ )(W. P
hostname (%roperty of $)C. 0'(0$;!-#O+/ 0"+-" W#)) 9+ %-!"+C0$+/ $! $;+ =0)) +L$+'$ != $;+ )(W.)
Rverst pQ formularen
2,. ( router needs to be added to !"%= area 6. Which commands should be used to enable !"%= on the router? (Choose two.)
-outer((config)N router ospf
PPP -outer((config)N router ospf 1
-outer((config>router)N network 152.113.2.6 6.6.6.2,, 6
PPP -outer((config>router)N network 152.113.2.6 6.6.6.2,, area 6
-outer((config>router)N network 152.113.2.6 2,,.2,,.2,,.6 6
21. -efer to the graphic. Which of the following commands will configure router ( for !"%=?
router ospf 1
network 152.113.16.6
PPP router ospf 1
PPP network 152.113.16.1* 6.6.6.1 area 6
PPP network 152.113.16.152 6.6.6. area 6
router ospf 1
network 152.113.16.1* 2,,.2,,.2,,.152
network 152.113.16.152 2,,.2,,.2,,.2,2
router ospf 1
network 152.113.16.6 area 6
22. Which of the following protocols would e.change information between routers to share network addresses and their metrics?
$C%
PPP -#%
C"?(&C/
+thernet
23. Which #"/' device can be directly connected to a two>wire local loop in a 'orth (merican city?
a router with a serial interface
a router with an "&$ interface
PPP a router with a 0 interface
an #"/' terminal adapter
,1
Smith Nguyen Studio. Smith Nguyen Studio.
https:/ / www.facebook.com/ SmithNguyenStudio
25. $he output of the show ip interfaces brief command indicates that "erial6 is up but the line protocol is down. Which of the following are
possible causes for the line protocol being in the down state? (Choose two.)
$he clock rate is not set on the /$+.
(n incorrect default gateway is set on the router.
( network is missing from the routing protocol configuration.
PPP $he encapsulation on the "erial6 interface is incorrect.
PPP Geepalives are not being sent by the remote device
2*6. Which of the following is a characteristics of $C%? (Choose two.)
PPP data transport reliability
best path determination
PPP establishing4 maintaining4 and terminating virtual circuits
encapsulation of packets in a data frame with source and destination ?(C addresses
best>effort datagram delivery
2*1. Which statement is true regarding the command ip route 152.113.2.2* 2,,.2,,.2,,.2*3 152.113.2.5? (Choose two.)
PPP ( packet destined for host 152.113.2.6 will be forwarded to address 152.113.2.5.
152.113.2.5 is the destination network for this route.
152.113.2.2* is the ne.t>hop router in this command.
$his command is issued from the interface configuration mode.
PPP $his command is used to define a static route
2*2. Which of the following application layer protocols use $C%? (Choose three.)
PPP "?$%
PPP =$%
"'?%
PPP ;$$%
$=$%
/;C%
2*. Which terms refer to =rame -elay congestion management mechanisms? (Choose three.)
PPP 9+C'
/)C#
PPP /+
PPP =+C'
)?#
#nverse (-%
2**. Which of the following router commands will verify that a path e.ists to a destination network?
-outerN show ip interfaces brief
PPP -outerN show ip route
-outerN show cdp neighbors
-outerN show running>config
-outerN show protocols
2*,. When +#:-% is configured on a router4 which table of /0() information is used to calculate the best route to each destination router?
router table
PPP topology table
/0() table
C(? table
(-% table
2*1. -efer to the graphic. -outers ( and 9 have +#:-% configured and automatic summari7ation has been disabled on both routers. Which of
the following commands is used on router ( to summari7e the attached routes4 and to which interface is this command applied? (Choose two)
PPP ip summary>address eigrp 1 152.113.16.1* 2,,.2,,.2,,.152
ip area>range eigrp 1 152.113.16.36 2,,.2,,.2,,.22*
summary>address 152.113.16.36 6.6.6.1
ip summary>address eigrp 1 152.113.16.1* 6.6.6.1
PPP serial interface on router (
serial interface on router 9
2*2. ( router with two )(' interfaces4 two W(' interfaces4 and two loopback interfaces configured is operating with !"%= as its routing
protocol. What is used by the !"%= process to assign the router #/?
the #% address of the interface configured with priority 6
the !"%= area #/ configured on the interface with the highest #% address
PPP the loopback with the highest #% address configured
,2
Smith Nguyen Studio. Smith Nguyen Studio.
https:/ / www.facebook.com/ SmithNguyenStudio
the highest #% address on the )(' interfaces
the highest #% address configured on the W(' interfaces
2*3. :iven the #% address and subnet mask of 122.11.1*.,1 2,,.2,,.2,,.22*4 on which subnetwork does this address reside?
122.6.6.6
122.11.1*.6
PPP 122.11.1*.2
122.11.1*.*3
122.11.1*.*2
122.11.1*.1
2*5. Which commands show when the last #:-% routing update was received? (Choose two.)
PPP -outerN show ip protocols
-outerN show version
-outerN show interfaces
-outerN show ip updates
PPP -outerN show ip route
2,6. When using access control lists to filter traffic4 which of the following is used to track multiple sessions occurring between hosts?
#% addresses
subnet masks
PPP port numbers
routed protocols
routing protocols
interfaces
2,1. :iven the #% address and subnet mask of 122.11.1*.1* 2,,.2,,.2,,.22*4 which of the following would describe this address?
$his is a useable host address.
$his is a broadcast address.
PPP $his is a network address.
$his is not a valid address
2,2. $he company network shown in the drawing has to be subnetted. $he company has leased the Class C #% address of 266.1.2.6. Which of
the following network addresses and masks would be appropriate for one of the subnetworks?
266.1.2.51 2,,.2,,.2,,.152
PPP 266.1.2.116 2,,.2,,.2,,.22*
266.1.2.36 2,,.2,,.2,,.22*
266.1.2.2 2,,.2,,.2,,.2*6
2,. When connectionless protocols are implemented at the lower layers of the !"# model4 what is usually used to acknowledge that was
received and to reCuest the retransmission of missing data?
#%
0/%
+thernet
( connectionless acknowledgement
PPPP(n upper>layer4 connection>oriented protocol or service
2,*. -efer to the e.hibit. +ach media link is labeled. What type of cable should be used to connect the different devices?
Connection 1 S rollover cable
Connection 2 S straight>through cable
Connection S crossover cable
Connection 1 S crossover cable
Connection 2 S rollover cable
Connection S crossover cable
Connection 1 S straight>through cable
Connection 2 S crossover cable
Connection S crossover cable
PPPPConnection 1 S straight>through cable
Connection 2 S crossover cable
Connection S straight>through cable
Connection 1 S crossover cable
Connection 2 S straight>through cable
Connection S crossover cable
2,,. Which !"# layer does #% rely on to determine whether packets have been lost and to reCuest retransmission?
,
Smith Nguyen Studio. Smith Nguyen Studio.
https:/ / www.facebook.com/ SmithNguyenStudio
(pplication
%resentation
"ession
PPPP$ransport
2,1. What is true regarding network layer addressing? (Choose three.)
0ses a flat structure
%revent broadcasts
PPPP;ierarchical
PPPP0niCuely identifies each host
*3 bits in length
PPPPContains a network portion
2,2. ( %C can not connect to any remote websites4 ping its default gateway4 or ping a printer that is functioning properly on the location
segment. Which action will verify that the $C%&#% stack is functioning correctly on this %C?
0se the ipconfig Ball command at the hostBs command prompt.
PPPP0se the ping :2C99: command at the command prompt.
0se the traceroute command at the command prompt to identify any failures on the path to the gateway.
0se =$% to check for connectivity to remote sites.
/ownload a troubleshooting tool from the %C manufacturerBs website.
2,3. Which type of meia is immune to +?# and -=#? (Choose two.)
16 9ase>$
16 9ase>2
16 9ase>,
PPPP166 9ase>=L
166 9ase $L
PPPP1666 9ase )L
,*
Smith Nguyen Studio. Smith Nguyen Studio.
https:/ / www.facebook.com/ SmithNguyenStudio
2,5. -efer to the e.hibit. $he command that is shown was issued on a %C. What does the #% address 152.113..2 represent?
#% address of the host
/efault gateway of the host
#% address of the homepage for the host
PPPP%rimary domain name server for the host
#% address of the website resolver1.mooki.local
216. -efer to the e.hibit. $he diagram represents the process of sending email between clients. "elect the one that correctly identifies the
component or protocol used at each numbered stage of the diagram.
1.?0( 2.?/( .?$( *."?$% ,.?$( 1.%!% 2.?/( 3.?0(
1.?0( 2.%!% .?/( *."?$% ,.?$( 1.?/( 2."?$% 3.?0(
1.?0( 2.%!% ."?$% *.?/( ,.?$( 1."?$% 2.%!% 3.?0(
1.?/( 2."?$% .?$( *."?$% ,.?$( 1.?0( 2.%!% 3.?/(
PPPP1.?0( 2."?$% .?$( *."?$% ,.?$( 1.?/( 2.%!% 3.?0(
211. Which three statements characteri7e the transport layer protocols? (Choose three.)
PPPP$C% and 0/% port numbers are used by application layer protocols.
$C% uses port numbers to provide reliable transportation of #% packets.
0/% uses windowing and acknowledgments for reliable transfer of data.
PPPP$C% uses windowing and seCuencing to provide reliable transfer of data.
PPPP$C% is a connection>oriented protocol4 0/% is a connectionless protocol.
212. Which !"# layers offers reliable4 connection>oriented data communication services?
application
presentation
session
PPPPtransport
network
21. +.amine the graphic with current configurations. ;ost ( in the Clerical office failed and was replaced. (lthough a ping to 122.6.6.1 was
successful4 the replacement computer cannot access the company network. With pro.y (-% disabled on the =a6&6 interface of the 'ew Fork
router4 what is the likely cause of the problem?
'etwork card failure
'etwork cables unplugged
#% address incorrectly entered
PPPP"ubnet mask incorrectly entered
21*. -efer to the e.hibit. ( network technician is trying to determine the correct #% address configuration for ;ost (. What is a valid
configuration for ;ost (?
#% address@ 152.113.166.15T "ubnet ?ask@ 2,,.2,,.2,,.2*3T /efault :ateway@ 152.11.1.2
PPPP#% address@ 152.113.166.26T "ubnet ?ask@ 2,,.2,,.2,,.2*6T /efault :ateway@ 152.113.166.12
#% address@ 152.113.166.21T "ubnet ?ask@ 2,,.2,,.2,,.2*3T /efault :ateway@ 152.113.166.13
#% address@ 152.113.166.22T "ubnet ?ask@ 2,,.2,,.2,,.2*6T /efault :ateway@ 16.1.1.,
#% address@ 152.113.166.6T "ubnet ?ask@ 2,,.2,,.2,,.2*6T /efault :ateway@ 152.113.1.1
#% address@ 152.113.166.1T "ubnet ?ask@ 2,,.2,,.2,,.2*6T /efault :ateway@ 152.113.166.13
21,. (s network administrator4 what is the subnet mask that allows ,16 hosts given the #% address 122.6.6.6?
2,,.2,,.6.6
2,,.2,,.2*3.6
2,,.2,,.2,2.6
PPPP2,,.2,,.2,*.6
2,,.2,,.2,,.6
2,,.2,,.2,,.123
211. What are three characteristics of C"?(&C/? (Choose three.)
/evices can be configure with a higher transmission priority.
( Eam signal indicates that the collision has cleared and the media is not busy.
PPPP( device listens and waits until the media is not busy before transmitting.
$he device with the electronic token is the only one that can transmit after a collision.
PPPP(ll of the devices on a segment see data that passes on the network medium.
PPPP(fter detecting a collision4 hosts can attempt to resume transmission after a random time delay has e.pired.
212. Which of the following are the address ranges of the private #% addresses? (Choose three.)
PPPP16.6.6.6 to 16.2,,.2,,.2,,
266.166.,6.6 to 266.166.2,.2,,
,,
Smith Nguyen Studio. Smith Nguyen Studio.
https:/ / www.facebook.com/ SmithNguyenStudio
1,6.1,6.6.6 to 1,6.1,6.2,,.2,,
PPPP122.11.6.6 to 122.1.2,,.2,,
PPPP152.113.6.6 to 152.113.2,,.2,,
122.11.6.6 to 122.1.2,,.2,,
,1
Smith Nguyen Studio. Smith Nguyen Studio.
https:/ / www.facebook.com/ SmithNguyenStudio
213. Which combination of network id and subnet mask correctly identifies all #% addresses from 122.11.123.6 through 122.11.1,5.2?
122.11.123.6 2,,.2,,.2,,.22*
122.11.123.6. 2,,.2,,.6.6
122.11.123.6 2,,.2,,.152.6
PPPP122.11.123.6 2,,.2,,.22*.6
122.11.123.6 2,,.2,,.2,,.152
215. Which password is automatically encrypted when it is created?
Aty
(u.
Console
PPPP+nable secret
+nable password
226. /ue to a security violation4 the router passwords must be changed. What information can be learned from the following configuration
entries? (Choose two.)
-outer(config)N line vty 9 1
-outer(config>line)N password c:1c9
-outer(config>line)N login
$he entries specify three $elnet lines for remote access.
PPPP$he entries specify four $elnet lines for remote access.
$he entries set the console and $elnet password to Uc1c6V.
$elnet access will be denied because the $elnet configuration is incomplete.
PPPP(ccess will be permitted for $elnet using Uc1c6V as the password.
221. When must a router serial interface be configured with the clock rate command?
When the interface is functioning as a /$+ device
When the interface timers have been cleared
When the connected /$+ device is shut down
PPPPWhen the interface is functioning as a /C+ device
222. Which two functions of the !"# model occur at layer two? (Choose two.)
PPPP%hysical addressing
+ncoding
-outing
Cabling
PPPP?edia access control
22. ( routing issue has occurred in you internetwork. Which of the following type of devices should be e.amined to isolate this error?
(ccess point
;ost
;ub
PPPP-outer
"witch
22*. -efer to the e.hibit. With the router running '($4 what #% addresses can be applied to the computer to allow access to the #nternet?
(Choose three.)
152.113.13.3
152.113.13.*3
PPPP152.113.13.*5
PPPP152.113.13.,2
PPPP152.113.13.,5
152.113.13.1
22,. -efer to the e.hibit. What two facts can be determined from the information that is given? (Choose two.)
$his e.change is part of the three>way handshake.
$he source port indicates that a $elnet session has been initiated.
$he data is flowing from server to client.
$he destination port indicates that an ;$$% session has been initiated.
PPPP$he data listed is associated with the transport layer.
PPPP$he source port does not support communication with the destination port that is listed.
,2
Smith Nguyen Studio. Smith Nguyen Studio.
https:/ / www.facebook.com/ SmithNguyenStudio
221. -efer to the e.hibit. ;ost ( attempts to establish a $C%&#% session with host C. during this attempt4 a frame was captured with the source
?(C address 66,6.226./12 and the destination ?(C address 666.3,12.**C*. $he packet inside the captured frame has an #% source
address 152.113.2.,4 and the destination #% address is 152.113.215.2*. (t which point in the network was this packet captured?
)eaving host (
)eaving ($)
PPPP)eaving /allas
)eaving 'FC
222. -efer to the e.hibit. Cable 1 and cable 2 have the ends wired for specific physical layer reCuirements. $he table lists each segment
number and the cable which has been installed by the network technician between the network components on that segment. -eferring to the
data given4 which segments have the correct cable installed? (Choose three.)
PPPP"egment1
"egment2
PPPP"egment
PPPP"egment*
"egment,
223. -efer to the e.hibit. What three statements are true about the #% configuration that is shown? (Choose three.)
PPPP$he address that is assigned to the computer represents private addressing.
PPPP$he computer is unable to communicate outside of the local network.
$he network of this computer can have 121 hosts.
PPPP$he prefi. of the computer address is &22.
$he #% address that is assigned to the computer is routable on the #nternet.
$he #% address that is assigned to the computer is a broadcast address.
225. Which three #%v* addresses represent a broadcast for a subnet? (Choose three.)
PPPP122.11.*.1 &21
122.11.*.125 &21
PPPP122.11.*.151 &21
122.11.*.,1 &22
PPPP122.11.*.5, &22
122.11.*.221 &22
236. -efer to the e.hibit. !n the basis of the #% configuration that is shown4 what is the reason that ;ost ( and ;ost 9 are unable to
communicate outside the local network?
;ost ( was assigned a network address.
;ost 9 was assigned a multicast address.
;ost ( and ;ost 9 belong to different networks.
PPPP$he gateway address was assigned a broadcast address.
231. $he )ayer * header contains which type of information to aid in the delivery of data?
N1@ "ervice port number
232. /uring the encapsulation process4 which identifiers are added at the transport layer?
N2@ $wo applications communicating the data
23. -efer to the e.hibit. What is the correct destination socket number for a web page reCuest from ;ost ( to the web server?
N2@ 153.1.215.2,@36
23*. -efer to the e.hibit. Which logical topology best describes the e.hibited network?
N*@ ?ultiaccess
23,. -efer to the e.hibit. ;ost ( is transmitting data to host 9. What addresses will host ( use to for the destination #% and ?(C addresses
for this communication?
N,@ /estination ?(C@ ++++@++++@++++ /estination #%@ 122.22.6.2,
231. -efer to the e.hibit. ( router4 whose table is shown4 receives a packet that is destined for 152.113.1.*. ;ow will router treat the packet?
N@ $he packet will be forwarded to the destination host.
232. -efer to the e.hibit. Which set of devices contains only intermediary devices?
N1@ (4 94 /4 :
233. -efer to the e.hibit. ( technician is working on a network problem that reCuires verification of the router )(' interface. Which address
should be pinged from the host to confirm that the router interface is operational?
N@ 152.113.2*,.1
235. Which prompt represents the appropriate mode used for the copy running.config startup.config command?
N2@ "witch>1<N
256. ( technician is asked to secure the privileged +L+C mode of a switch by reCuiring a password. Which type of password would this login
and be considered the most secure?
N@ +nable secret
251. Which range of port numbers are reserved for services that are commonly used by applications that run on servers?
,3
Smith Nguyen Studio. Smith Nguyen Studio.
https:/ / www.facebook.com/ SmithNguyenStudio
N2@ 6 to 162
252. -efer to the e.hibit. Which two statements describe the information that is represented in the header? (Choose two.)
N@ $he destination port indicates a $elnet session.
N*@ $he return segment will contain a source port of 2.
25. #n a Cisco #!" device4 where is the startup>configuration file stored?
N2@ 'A-(?
25*. -efer to the e.hibit. What two facts can be determined about the e.hibited topology? (Choose two.)
N1@ ( single broadcast domain is present
N,@ =ive collision domains e.ist.
25,. -efer to the e.hibit. (ssume all devices are using default configurations. ;ow many subnets are reCuired to address the topology
shown?
N2@
251. -efer to the e.hibit. What is reCuired on host ( for a network technician to create the initial configuration on -outer 1?
N@ ( terminal emulation program
252. -efer to the e.hibit. $he tracert command is initiated from %C1 to %C*. Which device will send a response to the initial tracert from
%C1?
N@ )ondon
253. -efer to the e.hibit. When computer ( sends a frame to computer /4 what computers receive the frame?
N2@ !nly computer ( and computer /
255. -efer to the e.hibit. What function does router -$J( need to provide to allow #nternet access for hosts in this network?
N1@ (ddress translation
66. -efer to the e.hibit. $he network containing router 9 is e.periencing problems. ( network associate has isolated the issue in the network
to router 9. What action can be preformed to correct the network issue?
N*@ #ssue the no shutdown command on interface =ast+thernet 6&1
61. -efer to the e.hibit. ( student has wired each end of a C($ ,e cable as shown. What is the result? (Choose two.)
N@ $he cable is suitable for use as a =ast +thernet crossover.
N,@ $he cable is suitable for use between two 166 ?bps (uto>?/#L capable switches.
62. ( host is transmitting a video over the network. ;ow does the transport layer allow this host to use multiple applications to transmit data
at the same time as the video transmission?
N*@ #t uses multiple port numbers.
6. -efer to the e.hibit. +ach media link is labeled. What type of cable should be used to connect the different devices?
N2. Connection 1 S straight>through cable Connection 2 S crossover cable Connection S rollover cable
6*. Which !"# layer uses a connection>oriented protocol to ensure reliable delivery of data?
N*. $ransport layer
Which three statements are true about network layer addressing? (Choose three.)
N1@ #t uniCuely identifies each host.
N2. #t assists in forwarding packets across internetworks.
N@ #t uses a logical 2>bit #%v* address.
6,. -efer to the e.hibit. ( %C is communicating with another %C on a remote network. $he two networks are connected by three routers.
Which action will help to identify the path between the hosts?
N@ 0se the tracert command at the host.
Which two types of media are useful for connecting two devices separated by a distance of ,666 meters? (Choose two.)
N*. 1666 9("+ )L
N,. 1666 9("+>"L
61. -efer to the e.hibit. ( technician uses the nslookup command on the %C and views the output that is displayed in the e.hibit. What is
the #% address of the primary domain name server used by the host?
N1@ 16.16.16.2
62. -efer to the e.hibit. $he diagram represents the process of sending e>mail between clients. Which list correctly identifies the correct
seCuence or protocol used at each numbered stage of the diagram?
1.?0( 2."?$% .?$( *. "?$% ,. ?$( 1.?/( 2.%!% 3.?0(
63. Which three statements are true about transport layer protocols? (Choose three.)
N1@ $C% and 0/% manage communication between multiple applications.
N2@ $C% retransmits the packets for which the acknowledgment is not received.
N@ $C% acknowledges received data.
65. Which !"# layer offers ordered data reconstruction services?
N,@ $ransport layer
16. -efer to the e.hibit. ;ost C is able to ping 122.6.6.1 successfully4 but is unable to communicate with hosts ( or 9 in the organi7ation.
What is the likely cause of the problem?
N2@ $he #% addresses on the router serial interfaces are wrong.
11. -efer to the e.hibit. ( host is connected to hub 1. Which combination of #% address4 subnet mask4 and default gateway can allocate the
host to function in the network?
N1@ #% address@ 122.11.1.2 "ubnet mask 2,,.2,,.2,,.22* /efault gateway@ 122.11.1.,
,5
Smith Nguyen Studio. Smith Nguyen Studio.
https:/ / www.facebook.com/ SmithNguyenStudio
12. (n organi7ation wants to create a subnet of the #% network 122.11.6.6. $his subnet will accommodate 1666 hosts. Which subnet should
be assigned to this network?
N@ 2,,.2,,.2,2.6
1. What are three characteristics of C"?(&C/? (Choose three.)
N1@ #t monitors the media for presence of a data signal.
N2@ (fter detecting a collision4 hosts can resume transmission after a random timer has e.pired.
N@ ( Eam signal is used to ensure that all hosts are aware that a collision has occurred.
1*. Which three addresses belong to the category of public #% addresses? (Choose three.)
N2@ 151.1.16,.1
N@ 12.11.5.55
N1@ *1.1.1.52
1,. (n organi7ation has been assigned network #/ 16.16.123.6 and subnet mask 2,,.2,,.22*.6. Which #% address range can be used in this
organi7ation?
N2@ 16.16.123.6 to 16.16.1,5.2,,
11. Which password restricts $elnet access to the router?
N1@ +nable
12. 9ecause of a security violation4 the router password must be changed. What information can be learned from these configuration entries?
(Choose two.)
-outer(config)I line vty 9 3
-outer(config>line)I password arD:>
-outer(config>line)I login
N@ $his configuration allows users to connect to the router via the use of the telnet command.
N*@ $his configuration allows five users to make simultaneous connections to this router.
13. What is the result of using the clock rate >A999 command at the serial interface of the router?
N1@ $he interface is configured as a /C+ device.
15. What are two functions of the data link layer? (Choose two.)
N1@ #t segments and reorders the data.
N@ #t controls how data is placed onto the media.
26. Which device should be used for routing a packet to a remote network?
N*@ -outer
21. -efer to the e.hibit. ( host is using '($ to connect to the #nternet. Which three #% addresses enable this connection? (Choose three.)
N2@ 16.1.1.2
N@ 16.1.1.5
N,@ 16.1.1.16
22. -efer to the e.hibit. What two facts can be determined from the session information that is displayed? (Choose two.)
N1@ $he protocol is a connection>oriented protocol.
N*@ $he destination port indicates that a $elnet session has been initiated.
2. -efer to the e.hibit. ;ost 9 attempts to establish a $C%&#% session with host C. /uring this attempt4 a frame was captured at the
=ast+thernet interface fa6&1 of the "an =rancisco router. $he packet inside the captured frame has the source #% address 16.16.1.2. What is the
destination #% address is 16.1.1.26. What is the destination ?(C address of the frame at the time of capture?
N@ 66*6.3,12.**C
2*. -efer to the e.hibit. $he network administrator wants to remotely access the C)# of the router from %C1 using modem 1. Which cable
the router should be connected to modem 2 to enable this access?
N@ (u.iliary
2,. -efer to the e.hibit. Cable 1 and Cable 2 are wired for specific physical layer reCuirements. Which three segments use Cable 2? (Choose
three.)
N2@ "egment 2
N*@ "egment *
N,@ "egment ,
21. -efer to the e.hibit. Which three statements are true about the #% configuration that is displayed? (Choose three.)
N1@ $he assigned address is a private address.
N*@ $he prefi. of the computer address is &21.
N,@ $he #% address is routable on the #nternet.
22. Which three #%v* addresses represent valid host addresses for a subnet? (Choose three.)
N2@ 16.1.12.11&23
N*@ 16.1.11.,&22
N,@ 16.1.11.52&22
23. -efer to the e.hibit. Communication for hosts L and F is restricted to the local network. What is the reason for this?
N*@ $he gateway addresses are broadcast addresses.
25. Which information is used by the router to determine the path between the source and destination hosts?
N2@ $he network portion of the #% address.
16
Smith Nguyen Studio. Smith Nguyen Studio.
https:/ / www.facebook.com/ SmithNguyenStudio
6. -efer to the e.hibit. #n a network4 %C1 sends a message to %C2. $he frame received at %C2 is shown. What information in this
determines the correct destination application?
N*@ destination and source process numbers
1. -efer to the e.hibit. ;ost ( is accessing multiple servers. Which combination of port number and address will uniCuely identify
particular process running on a specific server?
N1@ ?(C address of the server and port number of the service
2. -efer to the e.hibit. Which logical topology describes the e.hibited network?
N@ point>to>point
. -efer to the e.hibit. ;ost ( wants to access the #nternet. Which combination of a )ayer 2 address and a )ayer address will enable this
access from host (?
N*@ /estination ?(C@ 666.3,12.**C* /efault gateway@ 265.11,.262.16
*. -efer to the e.hibit. $he %C4 the routing table of which is displayed4 is configured correctly. $o which network interface does the #%
address 152.113.1.1,* belong?
N*@ router interface fa6&1
,. -efer to the e.hibit. Which list refers only to end devices?
N1@ /4+4=4:
1. -efer to the e.hibit. %C1 is unable to access %C2. $o trouble shoot this problem4 the technician needs to confirm that the ne.t hop
interface is operational. Which default gateway address should the technician ping from %C1 to confirm this?
N1@ 16.6.6.2,*
2. ( network technician wants to configure an #% address on a router interface by using the ip address :@2:A8:9 2>>2>>2>>9
command. Which prompt should the technician see when entering this command?
N2@ -outer(config>if)N
3. What is the effect of using the ?outerI copy running.config startup.config command on a router?
N@ $he contents of 'A-(? will change.
5. $he network administrator wants to install a private application on a server. Which range of port numbers is normally assigned to this
application to make it accessible by clients?
N*@ 6 to 162
*6. -efer to the e.hibit. #n a network4 host ( is sending data segments to host 9. $he flow control of the segments that are being e.changed
is displayed. Which two statements are true about this communication? (Choose two.)
N1@ $he initial window si7e is determined via the two>way handshake.
N@ (cknowledgment number 661 indicates that host ( will send the ne.t segment with seCuence number 661.
*1@ Which statement is true about the running configuration file in a Cisco #!" device?
N1@ #t affects the operation of the device immediately when modified.
*2. -efer to the e.hibit. Which two facts can be determined about the topology? (Choose two.)
N@ ( single broadcast domain is present.
N*@ $hree collision domains are present.
*. -efer to the e.hibit. (ll devices in the network use default configurations. ;ow many logical address ranges are reCuired in this
topology?
N*@ , logical topologies
**. -efer to the e.hibit. ( technician has connected the %C to the switch using a Category 1 0$% cable. Which two statements are true about
this connection? (Choose two.)
N@ $he ma.imum distance between the switch and the %C can be 166 m.
N*@ $he ma.imum supported bandwidth is 1666 ?b&s.
*,. -efer to the e.hibit. $o create the initial configuration4 a network technician connected host ( to the router using the connection that is
shown. Which statement is true about this connection?
N2@ #t provides out>of>band console access.
*1. -efer to the e.hibit. ;ost L is unable to communicate with host F. Which command can be run at host L to determine which
intermediary device is responsible for this failure?
N*@ tracert 152.113.1.1
*2. -efer to the e.hibit. ;ost 9 was powered off. What change will occur in the ?(C table of the switch?
N2@ $he switch will remove the ?(C address at =a6&15.
-efer to the e.hibit. $he '($ functionality of the router is enabled to provide #nternet access to the %C. ;owever4 the %C is still unable to
access the #nternet. Which #% address should be changed to 265.11,.261.1 to enable the %C to access the #nternet?
N*@ 152.113.1.2,*
*3. -efer to the e.hibit. $he serial interface of the router was configured with the use of the commands that are shown. $he router cannot
ping the router that is directly connected to interface serial 6&6&6. What should the network technician do to solve this problem?
N2@ Configure an #% address on interface serial 6&6&6.
11
Smith Nguyen Studio. Smith Nguyen Studio.
https:/ / www.facebook.com/ SmithNguyenStudio
-efer to the e.hibit. Which two facts can be determined about the topology? (Choose two.)
$hree networks are needed.
$wo logical address ranges are reCuired.
A single broadcast domain is present
!hree collision domains are present
=our networks are needed.
2
-efer to the e.hibit. Which three statements are true about the #% configuration that is displayed? (Choose three.)
LLLL!he assigned address is a private address
$he %C cannot communicate with the /'" server.
$he network can have 121 hosts.
LLLL!he prefi# of the computer address is B2A
LLLL!he +P address is routable on the +nternet
12
Smith Nguyen Studio. Smith Nguyen Studio.
https:/ / www.facebook.com/ SmithNguyenStudio
$he #% address is a multicast address.

-efer to the e.hibit. ;ost 9 was powered off. What change will occur in the ?(C table of the switch?
$he table will remain unaffected.
LLLL!he switch will remove the 5AC address at )a9B:@
$he switch will retain the ?(C address until host 9 is powered on again.
$he switch will rebuild the ?(C table by assigning the ====.====.==== address to port =a6&15.
*
-efer to the e.hibit. $he diagram represents the process of sending e>mail between clients. Which list correctly identifies the component or
protocol used at each numbered stage of the diagram?
1.?0( 2.?/( .?$( *."?$% ,.?$( 1.%!% 2.?/( 3.?0(
1.?0( 2.%!% .?/( *."?$% ,.?$( 1.?/( 2."?$% 3.?0(
1.?0( 2.%!% ."?$% *.?/( ,.?$( 1."?$% 2.%!% 3.?0(
LLLL:5$A 265!P 15!A 365!P >5!A A5DA CP7P 85$A
,
1
Smith Nguyen Studio. Smith Nguyen Studio.
https:/ / www.facebook.com/ SmithNguyenStudio
-efer to the e.hibit. #n a network4 host ( is sending data segments to host 9. $he flow control of the segments that are being e.changed is
displayed. Which two statements are true about this communication? (Choose two.)
!he initial window si"e is determined via the two.way handshake
$he window si7e for the $C% session that is represented is initially set to 666 bytes.
Acknowledgment number 199: indicates that host A will send the ne#t segment with se&uence number 199:
;ost 9 e.pects that the ne.t received segment number will be 666.
'o more acknowledgments will be e.changed.
1
-efer to the e.hibit. $he '($ functionality of the router is enabled to provide #nternet access to the %C. ;owever4 the %C is still unable to
access the #nternet. Which #% address should be changed to 265.11,.261.1 to enable the %C to access the #nternet?
152.113.1.151
152.113.1.161
152.113.1.1
:@2:A8:2>3
2
Which !"# layer uses a connection>oriented protocol to ensure reliable delivery of data?
application layer
presentation layer
session layer
transport layer
3
1*
Smith Nguyen Studio. Smith Nguyen Studio.
https:/ / www.facebook.com/ SmithNguyenStudio
-efer to the e.hibit. ;ost 9 attempts to establish a $C%&#% session with host C. /uring this attempt4 a frame was captured at the =ast+thernet
interface fa6&1 of the "an =rancisco router. $he packet inside the captured frame has the source #% address 16.16.1.24 and the destination #%
address is 16.1.1.26. What is the destination ?(C address of the frame at the time of capture?
6616.226./12
6616.226./11
LLLL99398>:C33C1
6665.92+*.++6
6616.C29*.*21
5
-efer to the e.hibit. (ll devices in the network use default configurations. ;ow many logical address ranges are reCuired in this topology?
2

*
> logical topologies
1,
Smith Nguyen Studio. Smith Nguyen Studio.
https:/ / www.facebook.com/ SmithNguyenStudio
1
16
Which three statements are true about network layer addressing? (Choose three.)
+t uni&uely identifies each host
+t assists in forwarding packets across internetworks
+t uses a logical 12.bit +Pv3 address
#t is not a configurable address.
#t is a physical address.
#t identifies the host from the first part of the address.
11
***Caution*** -efer to the e.hibit. ;ost C is able to ping 122.6.6.1 successfully4 but is unable to communicate with hosts ( and 9 in the
organi7ation. What is the likely cause of the problem?
;osts ( and 9 are not on the same subnet as host C.
$he #% addresses on the router serial interfaces are wrong.
!he subnet mask on host C is improperly configured
$he =ast+thernet interface fa6&6 of router 1 is wrongly configured.
12
Which statement is true about the running configuration file in a Cisco #!" device?
+t affects the operation of the device immediately when modified
#t is stored in 'A-(?.
#t should be deleted using the erase running>config command.
#t is automatically saved when the router reboots.
1
***Caution*** (n organi7ation wants to create a subnet of the #% network 122.11.6.6. $his subnet will accommodate 1666 hosts. Which
subnet mask should be assigned to this network?
2,,.2,,.6.6
2,,.2,,.2*3.6
2>>2>>2>29
2,,.2,,.2,*.6
2,,.2,,.2,,.6
2,,.2,,.2,,.123
1*
11
Smith Nguyen Studio. Smith Nguyen Studio.
https:/ / www.facebook.com/ SmithNguyenStudio
-efer to the e.hibit. ;ost ( is accessing multiple servers. Which combination of port number and address will uniCuely identify a particular
process running on a specific server?
5AC address of the server and port number of the service
#% address of the host and port number of the service
?(C address of the host and port number of the service
#% address of the server and port number of the service
1,
Which three addresses belong to the category of public #% addresses? (Choose three.)
122.6.6.1
:@A::9>A
:12::@@@
16.6.6.1
122.11.5.16
3A::@C
11.
-efer to the e.hibit. Communication for hosts L and F is restricted to the local network. What is the reason for this?
;ost L is assigned a network address.
;ost F is assigned a multicast address.
;ost L and host F belong to different networks.
LLLL!he gateway addresses are broadcast addresses
12
12
Smith Nguyen Studio. Smith Nguyen Studio.
https:/ / www.facebook.com/ SmithNguyenStudio
-efer to the e.hibit. ;ost L is unable to communicate with host F. Which command can be run at host L to determine which intermediary
device is responsible for this failure?
telnet 152.113.1.1
ping 152.113.1.1
ftp 152.113.1.1
tracert :@2:A8::
13
***Caution*** ( host is transmitting a video over the network. ;ow does the transport layer allow this host to use multiple applications to
transmit other data at the same time as the video transmission?
#t uses error control mechanisms.
#t uses a connectionless protocol only for multiple simultaneous transmissions.
#t uses multiple )ayer 2 source addresses.
+t uses multiple port numbers
15
***Caution*** -efer to the e.hibit. #n a network4 %C1 sends a message to %C2. $he frame received at %C2 is shown. What information in
this frame determines the correct destination application?
timing and synchroni7ation bits
destination and source physical addresses
destination and source logical network addresses
destination and source process numbers
26
***Caution*** -efer to the e.hibit. +ach media link is labeled. What type of cable should be used to connect the different devices?
Connection 1 > rollover cable Connection 2 > straight>through cable Connection > crossover cable
Connection : . straight.through cable Connection 2 . crossover cable Connection 1 . rollover cable
Connection 1 > crossover cable Connection 2 > rollover cable Connection > straight>through cable
Connection 1 > crossover cable Connection 2 > straight>through cable Connection > rollover cable
13
Smith Nguyen Studio. Smith Nguyen Studio.
https:/ / www.facebook.com/ SmithNguyenStudio
Connection 1 > straight>through cable Connection 2 > straight>through cable Connection > straight>through cable
21
-efer to the e.hibit. $he serial interface of the router was configured with the use of the commands that are shown. $he router cannot ping the
router that is directly connected to interface serial 6&6&6. What should the network technician do to solve this problem?
Configure the description at interface serial 6&6&6.
Configure an +P address on interface serial 9B9B9
-emove the no shutdown command at interface serial 6&6&6
-eboot the router.
22
-efer to the e.hibit. Which logical topology describes the e.hibited network?
star
ring
point.to.point
multi>access
2
Which three statements are true about transport layer protocols? (Choose three.)
!CP and $DP manage communication between multiple applications
!CP retransmits the packets for which the acknowledgment is not received
!CP acknowledges received data
0/% e.changes frames between the nodes of the network.
$C% has no mechanism to acknowledge transmission errors.
0/% uses windowing and seCuencing to provide reliable transfer of data.
2*
Which !"# layer offers ordered data reconstruction services?
application layer
network layer
presentation layer
session layer
transport layer
2,
Which password restricts $elnet access to the router?
enable
enable secret
console
A$F
15
Smith Nguyen Studio. Smith Nguyen Studio.
https:/ / www.facebook.com/ SmithNguyenStudio
21
-efer to the e.hibit. Cable 1 and Cable 2 are wired for specific physical layer reCuirements. Which three segments use Cable 2? (Choose
three.)
"egment 1
LLLL6egment 2
"egment
LLLL6egment 3
LLLL6egment >
"egment 1
22
-efer to the e.hibit. ( technician uses the nslookup command on the %C and views the output that is displayed in the e.hibit. What is the #%
address of the primary domain name server used by the host?
26
Smith Nguyen Studio. Smith Nguyen Studio.
https:/ / www.facebook.com/ SmithNguyenStudio
:9:9:912
152.113.1.,
152.113.1.55
152.113.2.166
23
-efer to the e.hibit. ( technician has connected the %C to the switch using a Category 1 0$% cable. Which two statements are true about this
connection? (Choose two.)
$he cable that is used is an +thernet crossover cable.
$he transmit pin of the cable is terminated to the receive pin.
!he ma#imum distance between the switch and the PC can be :99 m
!he ma#imum supported bandwidth is :999 5bBs
$he Category 1 cable simulates a point>to>point W(' link and is unusable for this type of connection.
25
What is the effect of using the -outerN copy running>config startup>config command on a router?
$he contents of -!? will change.
$he contents of -(? will change.
!he contents of N4?A5 will change
$he contents of flash will change.
6
****Caution**** -efer to the e.hibit. $he %C4 the routing table of which is displayed4 is configured correctly. $o which network device or
interface does the #% address 152.113.1.2,* belong?
PC
switch
router interface fa6&6
router interface fa6&1
1
Which three #%v* addresses represent valid host addresses for a subnet? (Choose three.)
16.1.12.25&23
:9::2::1B28
16.1.12.2&23
:9:::>B2C
21
Smith Nguyen Studio. Smith Nguyen Studio.
https:/ / www.facebook.com/ SmithNguyenStudio
:9:::@CB2C
16.1.11.123&22
2
$he network administrator wants to install a private application on a server. Which range of port numbers is normally assigned to this
application to make it accessible by clients?
6 to 2,,
*51,2 to 1,,,
162* to *51,1
9 to :921

( network technician wants to configure an #% address on a router interface by using the ip address 152.113.1.6 2,,.2,,.2,,.6 command.
Which prompt should the technician see when entering this command?
-outerW
?outer0config.if2I
-outerN
-outer(config)N
*
-efer to the e.hibit. ( %C is communicating with another %C on a remote network. $he two networks are connected by three routers. Which
action will help to identify the path between the hosts?
0se the ipconfig command at the host.
0se the ipconfig&all command at the destination.
$se the tracert command at the host
0se the ping command at the destination.
,
Which device should be used for routing a packet to a remote network?
access switch
/;C% server
hub
router
1
-efer to the e.hibit. What two facts can be determined from the session information that is displayed? (Choose two.)
!he protocol is a connection.oriented protocol
$his e.change is part of the three>way handshake.
$he "F' flag is representing the initial establishment of a session.
!he destination port indicates that a !elnet session has been initiated
$he source port does not support communication with the destination port that is listed.
2
-efer to the e.hibit. ( host is using '($ to connect to the #nternet. Which three #% addresses enable this connection? (Choose three.)
16.1.1.1
:9::1C
:9::1@
16.1.1.2
:9::A9
16.1.1.2
3
22
Smith Nguyen Studio. Smith Nguyen Studio.
https:/ / www.facebook.com/ SmithNguyenStudio
****Caution**** -efer to the e.hibit. %C1 is unable to access %C2. $o troubleshoot this problem4 the technician needs to confirm that the
ne.t hop interface is operational. Which default gateway address should the technician ping from %C1 to confirm this?
16.6.6.2,*
152.113.6.2*5
152.113.6.2,6
16.6.1.2,*
5
****Caution**** -efer to the e.hibit. ( host is connected to hub 1. Which combination of #% address4 subnet mask4 and default gateway
can allow this host to function in the network?
#% address@ 122.11.1.1 "ubnet mask@ 2,,.2,,.2,,.2*6 /efault gateway@ 122.11.1.,
#% address@ 122.11.1.1 "ubnet mask@ 2,,.2,,.2,,.22* /efault gateway@ 122.11.1.,
#% address@ 122.11.1.25 "ubnet mask@ 2,,.2,,.2,,.2*3 /efault gateway@ 122.11.1.,
#% address@ 122.11.1.2 "ubnet mask@ 2,,.2,,.2,,.22* /efault gateway@ 122.11.1.,
#% address@ 122.11.1.25 "ubnet mask@ 2,,.2,,.2,,.2*6 /efault gateway@ 122.11.6.1
+P address: :C2:A1:1C 6ubnet mask: 2>>2>>2>>223 Default gateway: :C2:A1:1>
*6
(n organi7ation has been assigned network #/ 16.16.123.6 and subnet mask 2,,.2,,.22*.6. Which #% address range can be used for this
organi7ation?
16.16.123.6 to 16.16.116.2,,
:9:9:289 to :9:9:>@2>>
16.16.123.6 to 16.16.152.2,,
16.16.123.6 to 16.16.6.1,5
16.16.123.6 to 16.16.1,5.6
*1
Which two types of media are useful for connecting two devices separated by a distance of ,66 meters? (Choose two.)
16 9("+>$
1666 9("+>$L
16 9("+>2
:999 -A6' LF
:999 -A6'.6F
*2
-efer to the e.hibit. ;ost ( wants to access the #nternet. Which combination of a )ayer 2 address and a )ayer address will enable this access
from host (?
/estination ?(C@ 666.3,51./+3 /efault gateway@ 265.11,.262.16
/estination ?(C@ 666.3,51./+32 /efault gateway@ 122.11.5.2
/estination ?(C@ 666.3,12.**C* /efault gateway@ 122.11.1.1
Destination 5AC: 99198>:C33C3 Default gateway: 29@:A>292:19
*
-efer to the e.hibit. $o create the initial configuration4 a network technician connected host ( to the router using the connection that is shown.
Which statement is true about this connection?
#t terminates at the +thernet port of the router.
+t provides out.of.band console access
#t terminates at the serial interface of the router.
#t reCuires a $elnet client on host ( to access the router.
**
2
Smith Nguyen Studio. Smith Nguyen Studio.
https:/ / www.facebook.com/ SmithNguyenStudio
-efer to the e.hibit. Which list refers only to end devices?
D('()(M
(4;494C
(4/4+4=
(4/4+4:
*,
-efer to the e.hibit. $he network administrator wants to remotely access the C)# of the router from %C1 using modem 1. Which port of the
router should be connected to modem 2 to enable this access?
console
+thernet
au#iliary
serial
*1
What is the result of using the clock rate ,1666 command at the serial interface of the router?
!he interface is configured as a DC' device
$he interface timers are cleared.
$he =ast+thernet interface is made to emulate a serial interface by assigning it a timing signal.
$he #% address for the serial interface is configured.
*2
What are two functions of the data link layer? (Choose two.)
+t segments and reorders the data
#t e.changes data between programs that are running on the source and destination hosts.
+t controls how data is placed onto the media
#t generates signals to represent the bits in each frame.
#t encapsulates each packet with a header and a trailer to transfer it across the local media.
*3
9ecause of a security violation4 the router password must be changed. What information can be learned from these configuration entries?
(Choose two.)
-outer(config)N line vty 6 *
-outer(config>line)N password arE1,
-outer(config>line)N login
$his configuration allows users to connect by using a modem.
0sers must specify which line4 6 or *4 they wish to connect to when making a connection.
!his configuration allows users to connect to the router via the use of the telnet command
!his configuration allows five users to make simultaneous connections to this router
$he configured password is automatically encrypted on the router.
*5
****CAUTION**** What are three characteristics of C"?(&C/? (Choose three.)
#t monitors the media for presence of a data signal.
After detecting a collision( hosts can resume transmission after a random timer has e#pired
A Dam signal is used to ensure that all hosts are aware that a collision has occurred
/evices can be configured with a higher transmission priority.
/ata is transmitted only when the data signal is present.
+t uses a token system to avoid collisions
,6
Which information is used by the router to determine the path between the source and destination hosts?
the host portion of the #% address
the network portion of the +P address
host default gateway address
2*
Smith Nguyen Studio. Smith Nguyen Studio.
https:/ / www.facebook.com/ SmithNguyenStudio
the ?(C address
/omain Gnowledge > Weighted "core
?a. %oints@ 163
+arned %oints@ 2,
%ercentage@ 15.*K
%ersonali7ed =eedback has been generated based on your responses to this e.am. Click ;ere to view your %ersonali7ed =eedback
/omain Gnowledge > 9inary "core
?a. %oints@ ,6
+arned %oints@ 1
%ercentage@ 12.6K
Close
(ll content copyright 1552>2663 Cisco "ystems4 #nc. %rivacy "tatement and $rademarks
2,
Smith Nguyen Studio. Smith Nguyen Studio.
https:/ / www.facebook.com/ SmithNguyenStudio
-efer to the e.hibit. ( router4 whose table is shown4 receives a packet that is destined for 152.113.1.*. ;ow will router treat the packet?
$he packet will be dropped.
$he packet will be forwarded via =ast+thernet 6&6.
!he packet will be forwarded to the destination host
$he packet will be forwarded to the 152.113.1. ne.t>hop address.
Which of the following are the address ranges of the private #% addresses? (Choose three.)
:9999 to :92>>2>>2>>
266.166.,6.6 to 266.166.2,.2,,
1,6.1,6.6.6 to 1,6.1,6.2,,.2,,
:C2:A99 to :C21:2>>2>>
:@2:A899 to :@2:A82>>2>>
122.11.6.6 to 122.1.2,,.2,,
( %C can not connect to any remote websites4 ping its default gateway4 or ping a printer that is functioning properly on the local network
segment. Which action will verify that the $C%&#% stack is functioning correctly on this %C?
0se the ipconfig &all command at the hostBs command prompt.
$se the ping :2C99: command at the command prompt
0se the traceroute command at the command prompt to identify any failures on the path to the gateway.
0se =$% to check for connectivity to remote sites.
/ownload a troubleshooting tool from the %C manufacturerIs website.
Which prompt represents the appropriate mode used for the copy running>config startup>config command ?
"witch>1<W
6witch.A,I
"witch>1<(config)N
"witch>1<(config>if)N
"witch>1<(config>line)N
-efer to the e.hibit. Which two statements describe the information that is represented in the header? (Choose two.)
$his is a server response.
$he 0/% protocol is being used.
!he destination port indicates a !elnet session
!he return segment will contain a source port of 21
$he ne.t session originated from the client of this session will use the source port number 1,3.
-efer to the e.hibit. Which set of devices contains only intermediary devices?
A( -( D( M
(4 94 +4 =
C4 /4 :4 #
:4 ;4 #4 <
Which range of port numbers are reserved for services that are commonly used by applications that run on servers?
6 to 2,,
9 to :921
162* to *51,1
*51,2 to 1,,,
-efer to the e.hibit. ;ost ( attempts to establish a $C%&#% session with host C. /uring this attempt4 a frame was captured with the source
?(C address 66,6.226./12 and the destination ?(C address 666.3,12.**C*. $he packet inside the captured frame has an #% source
address 152.113.2.,4 and the destination #% address is 152.113.215.2*. (t which point in the network was this packet captured?
leaving host (
leaving ($)
21
Smith Nguyen Studio. Smith Nguyen Studio.
https:/ / www.facebook.com/ SmithNguyenStudio
leaving Dallas
leaving 'FC
Which !"# layers offers reliable4 connection>oriented data communication services?
application
presentation
session
transport
network
-efer to the e.hibit. What is reCuired on host ( for a network technician to create the initial configuration on -outer1?
an =$% client
a $elnet client
a terminal emulation program
a web browser
( routing issue has occurred in you internetwork. Which of the following type of devices should be e.amined to isolate this error?
access point
host
hub
router
switch
-efer to the e.hibit. (ssume all devices are using default configurations. ;ow many subnets are reCuired to address the topology that is
shown?
1
1
*
,
2
13
-efer to the e.hibit. !n the basis of the #% configuration that is shown4 what is the reason that ;ost ( and ;ost 9 are unable to communicate
outside the local network?
;ost ( was assigned a network address.
;ost 9 was assigned a multicast address.
;ost ( and ;ost 9 belong to different networks.
!he gateway address was assigned a broadcast address
(s network administrator4 what is the subnet mask that allows ,16 hosts given the #% address 122.6.6.6?
2,,.2,,.6.6
2,,.2,,.2*3.6
2,,.2,,.2,2.6
2>>2>>2>39
2,,.2,,.2,,.6
2,,.2,,.2,,.123
-efer to the e.hibit. $he diagram represents the process of sending email between clients. "elect the list below that correctly identifies the
component or protocol used at each numbered stage of the diagram.
1.?0( 2.?/( .?$( *."?$% ,.?$( 1.%!% 2.?/( 3.?0(
1.?0( 2.%!% .?/( *."?$% ,.?$( 1.?/( 2."?$% 3.?0(
1.?0( 2.%!% ."?$% *.?/( ,.?$( 1."?$% 2.%!% 3.?0(
1.?/( 2."?$% .?$( *."?$% ,.?$( 1.?0( 2.%!% 3.?/(
:5$A 265!P 15!A 365!P >5!A A5DA CP7P 85$A
22
Smith Nguyen Studio. Smith Nguyen Studio.
https:/ / www.facebook.com/ SmithNguyenStudio
Which three statements characteri7e the transport layer protocols? (Choose three.)
!CP and $DP port numbers are used by application layer protocols
$C% uses port numbers to provide reliable transportation of #% packets.
0/% uses windowing and acknowledgments for reliable transfer of data.
!CP uses windowing and se&uencing to provide reliable transfer of data
!CP is a connection.oriented protocol $DP is a connectionless protocol
-efer to the e.hibit. ( network technician is trying to determine the correct #% address configuration for ;ost (. What is a valid configuration
for ;ost (?
#% address@ 152.113.166.15T "ubnet ?ask@ 2,,.2,,.2,,.2*3T /efault :ateway@ 152.11.1.2
+P address: :@2:A8:9929N 6ubnet 5ask: 2>>2>>2>>239N Default Mateway: :@2:A8:99:C
#% address@ 152.113.166.21T "ubnet ?ask@ 2,,.2,,.2,,.2*3T /efault :ateway@ 152.113.166.13
#% address@ 152.113.166.22T "ubnet ?ask@ 2,,.2,,.2,,.2*6T /efault :ateway@ 16.1.1.,
#% address@ 152.113.166.6T "ubnet ?ask@ 2,,.2,,.2,,.2*6T /efault :ateway@ 152.113.1.1
#% address@ 152.113.166.1T "ubnet ?ask@ 2,,.2,,.2,,.2*6T /efault :ateway@ 152.113.166.13
-efer to the e.hibit. What is the correct destination socket number for a web page reCuest from ;ost ( to the web server?
66>63>a>b1>ce>*1
:@8:112:@2>:89
http@&&www.cisco.com
C 153.1.215.6&2* is directly connected4 =ast+thernet6&6
-efer to the e.hibit. +ach media link is labeled. What type of cable should be used to connect the different devices?
Connection 1 > rollover cable
Connection 2 > straight>through cable
Connection > crossover cable
Connection 1 > crossover cable
Connection 2 > rollover cable
Connection > crossover cable
Connection 1 > straight>through cable
Connection 2 > crossover cable
Connection > crossover cable
Connection : . straight.through cable
Connection 2 . crossover cable
Connection 1 . straight.through cable
Connection 1 > crossover cable
Connection 2 > straight>through cable
Connection > crossover cable

Which combination of network id and subnet mask correctly identifies all #% addresses from 122.11.123.6 through 122.11.1,5.2,,?
122.11.123.6 2,,.2,,.2,,.22*
122.11.123.6 2,,.2,,.6.6
122.11.123.6 2,,.2,,.152.6
:C2:A:289 2>>2>>2239
122.11.123.6 2,,.2,,.2,,.152
-efer to the e.hibit. When computer ( sends a frame to computer /4 what computers receive the frame?
only computer /
only computer A and computer D
only computer 94 computer C4 and computer /
all computers
23
Smith Nguyen Studio. Smith Nguyen Studio.
https:/ / www.facebook.com/ SmithNguyenStudio
What is true regarding network layer addressing? (Choose three.)
uses a flat structure
prevent broadcasts
heirarchical
uni&uely identifies each host
*3 bits in length
contains a network portion
-efer to the e.hibit. ;ost ( is transmitting data to host 9. What addresses will host ( use to for the destination #% and ?(C addresses in this
communication?
/estination ?(C@ 9999@9999@9999 /estination #%@ 122.22.6.12
/estination ?(C@ ////@////@//// /estination #%@ 122.22.6.2,
/estination ?(C@ ++++@++++@++++ /estination #%@ 122.22.6.12
/estination ?(C@ 9999@9999@9999 /estination #%@ 122.22.6.2,
Destination 5AC: '''':'''':'''' Destination +P: :C2229C>
/estination ?(C@ ////@////@//// /estination #%@ 122.22.6.5*
+.amine the graphic with current configurations. ;ost ( in the Clerical office failed and was replaced. (lthough a ping to 122.6.6.1 was
successful4 the replacement computer cannot access the company network. With pro.y (-% disabled on the =a6&6 interface of the 'ew Fork
router4 what is the likely cause of the problem?
network card failure
network cables unplugged
#% address incorrectly entered
subnet mask incorrectly entered
When must a router serial interface be configured with the clock rate command?
when the interface is functioning as a /$+ device
when the interface timers have been cleared
when the connected /$+ device is shut down
when the interface is functioning as a DC' device
-efer to the e.hibit. What three statements are true about the #% configuration that is shown? (Choose three.)
!he address that is assigned to the computer represents private addressing
!he computer is unable to communicate outside of the local network
$he network of this computer can have 121 hosts.
!he prefi# of the computer address is B2C
$he #% address that is assigned to the computer is routable on the #nternet.
$he #% address that is assigned to the computer is a broadcast address.
-efer to the e.hibit. What two facts can be determined from the information that is given? (Choose two.)
$his e.change is part of the three>way handshake.
$he source port indicates that a $elnet session has been initiated.
$he data is flowing from server to client.
$he destination port indicates that an ;$$% session has been initiated.
!he data listed is associated with the transport layer
!he source port does not support communication with the destination port that is listed
-efer to the e.hibit. What function does router -$J( need to provide to allow #nternet access for hosts in this network?
address translation
/;C% services
ftpd
web server
Which two functions of the !"# model occur at layer two? (Choose two.)
25
Smith Nguyen Studio. Smith Nguyen Studio.
https:/ / www.facebook.com/ SmithNguyenStudio
physical addressing
encoding
routing
cabling
media access control
When connectionless protocols are implemented at the lower layers of the !"# model4 what is usually used to acknowledge that the data was
received and to reCuest the retransmission of missing data?
#%
0/%
+thernet
a connectionless acknowledgement
an upper.layer( connection.oriented protocol or service
LLLLCautionLLLL -efer to the e.hibit. ( network administrator remotely accesses the C)# of -outer9 from %C1 using $elnet. Which
statement is true about this connection?
$he data is automatically encrypted.
( $elnet server process is running on %C1.
$he connection is made through a A$F session on the router.
( :+$ reCuest was sent to -outer9 to retrieve data during this session.
2 Which three #%v* addresses represent a broadcast for a subnet? (Choose three.)
:C2:A3A1 B2A
122.11.*.125 &21
:C2:A3:@: B2A
122.11.*.,1 &22
:C2:A3@> B2C
122.11.*.221 &22
-efer to the e.hibit. With the router running '($4 what #% addresses can be applied to the computer to allow access to the #nternet? (Choose
three.)
152.113.13.3
152.113.13.*3
:@2:A8:83@
:@2:A8:8>2
:@2:A8:8>@
152.113.13.1
#n a Cisco #!" device4 where is the startup>configuration file stored?
=lash
N4?A5
-(?
-!?
-efer to the e.hibit. What two facts can be determined about the e.hibited topology? (Choose two.)
A single broadcast domain is present
$wo logical address ranges are reCuired.
$hree broadcast domains are shown.
=our networks are needed.
)ive collision domains e#ist
/uring the encapsulation process4 which identifiers are added at the transport layer?
two networks routing the packets
two applications communicating the data
36
Smith Nguyen Studio. Smith Nguyen Studio.
https:/ / www.facebook.com/ SmithNguyenStudio
two hosts at either end of the communication
two nodes on the local network e.changing the frame
Which !"# layer does #% rely on to determine whether packets have been lost and to reCuest retransmission?
application
presentation
session
transport
LLLLCA$!+7NLLLL Which type of media is immune to +?# and -=#? (Choose two.)
16 9ase>$
16 9ase>2
16 9ase>,
:99 -ase.)F
166 9ase $L
:999 -ase LF
-efer to the e.hibit. $he tracert command is initiated from %C1 to %C*. Which device will send a response to the initial tracert packet from
%C1?
(thens
(nkara
London
%aris
%C*
-efer to the e.hibit. $he command that is shown was issued on a %C. What does the #% address 152.113..2 represent?
#% address of the host
default gateway of the host
#% address of the homepage for the host
primary domain name server for the host
#% address of the website resolver1.mooki.local
Which password is automatically encrypted when it is created?
vty
au.
console
enable secret
enable password
-efer to the e.hibit. Cable 1 and cable 2 have the ends wired for specific physical layer reCuirements. $he table lists each segment by number
and the cable which has been installed by the network technician between the network components on that segment. =rom the data given4
which segments have the correct cable installed? (Choose three.)
segment:
segment2
segment1
segment3
segment,
*3

-efer to the e.hibit. Which logical topology best describes the e.hibited network?
star
ring
point>to>point
31
Smith Nguyen Studio. Smith Nguyen Studio.
https:/ / www.facebook.com/ SmithNguyenStudio
multiaccess
mesh
What are three characteristics of C"?(&C/? (Choose three.)
/evices can be configured with a higher transmission priority.
( Eam signal indicates that the collision has cleared and the media is not busy.
A device listens and waits until the media is not busy before transmitting
$he device with the electronic token is the only one that can transmit after a collision.
All of the devices on a segment see data that passes on the network medium
After detecting a collision( hosts can attempt to resume transmission after a random time delay has e#pired
-efer to the e.hibit. $he network containing router 9 is e.periencing problems. ( network associate has isolated the issue in this network to
router 9. What action can be preformed to correct the network issue?
issue the clock rate command on interface "erial 6&6&6
issue the description command on interface "erial 6&6&1
issue the ip address command on interface =ast+thernet 6&6
issue the no shutdown command on interface )ast'thernet 9B:
32
Smith Nguyen Studio. Smith Nguyen Studio.
https:/ / www.facebook.com/ SmithNguyenStudio

You might also like