Final 2 100

Download as doc, pdf, or txt
Download as doc, pdf, or txt
You are on page 1of 14

1 To enhance security in a network, the network administrator uses these commands:

Router(config)# line console 0


Router(config-line)# password j1mdi2
Router(config-line)# login What two conclusions are evident from these commands? (Choose two.)
Users who attempt to connect to the console port of the router must enter a password.
The entries permit access through the console by the use of j1mdi2 as the password.
The entries eliminate the need for authentication.
Access through the console will be denied because the console configuration is incomplete.
The entries prevent passwords from being displayed as plain text.
2

Refer to the exhibit. A technician is working on a network problem that requires verification of the router
LAN interface. What address should be pinged from this host to confirm that the router interface is
operational?
127.0.0.1
192.168.64.196
192.168.254.1
192.168.254.9
192.168.254.254
3

Refer to the exhibit. Which option shows the correct topology given the configuration of Router1?

corect

4
Refer to the exhibit. Host A is trying to send data to host E. When host A sends out an ARP request, what
response should be received?
00-08-a3-d6-ab-17
00-10-7b-e7-fa-ef
00-0d-88-c7-9a-24
Destination Unreachable from RouterA
5

Refer to the exhibit. Host A is requesting a web page


from the web server. Which option represents the socket to which the request is made?
80
www.cisco.com
10.0.0.130
10.0.0.130:80
6 An organization has decided to use IP addresses in the range 172.20.128.0 to 172.20.143.255. Which
combination of network ID and subnet mask identifies all IP addresses in this range?
Network ID: 172.20.128.0 Subnet mask: 255.255.255.0
Network ID: 172.20.128.0 Subnet mask: 255.255.0.0
Network ID: 172.20.128.0 Subnet mask: 255.255.224.0
Network ID: 172.20.128.0 Subnet mask: 255.255.240.0
Network ID: 172.20.128.0 Subnet mask: 255.255.255.240
7
Host A is assigned a network address.
Host B is assigned a multicast address.
Host A and host B belong to different networks.
The gateway addresses are network addresses.
8

Refer to the exhibit. With the router running NAT, what IP addresses can be applied to
the computer to allow access to the Internet? (Choose three.)
192.168.18.38
192.168.18.48
192.168.18.49
192.168.18.52
192.168.18.59
192.168.18.63
9

Refer to the exhibit. The router of the company failed


and was replaced. After the replacement, hosts C and D in the Education office are able to ping each other,
but they are unable to access the hosts in the Accounts office. What is the likely cause of the problem?
The IP address at the fa0/0 interface of the router is incorrectly configured.
The subnet mask at the fa0/1 interface of the router is incorrectly entered.
The IP address at the serial interface of the router is incorrectly configured.
The hosts in the Accounts office are not on the same subnet as the hosts in the Education office.
10 Which three IPv4 addresses represent valid host addresses for a subnet? (Choose three.)
10.1.12.79/28
10.1.12.113/28
10.1.12.32/28
10.1.11.5/27
10.1.11.97/27
10.1.11.128/27
11 What is the correct order for PDU encapsulation?
corect

12

Refer to the exhibit. Host A attempts to


establish a TCP/IP session with host C. During this attempt, a frame was captured with the source MAC
address 0050.7320.D632 and the destination MAC address 0030.8517.44C4. The packet inside the captured
frame has an IP source address 192.168.7.5, and the destination IP address is 192.168.219.24. At which point
in the network was this packet captured?
leaving host A
leaving ATL
leaving Dallas
leaving NYC
13 Which two types of media can provide bandwidth up to 1 Gb/s? (Choose two.)
10 BASE-T
100 BASE-T
100 BASE-FX
1000 BASE-TX
1000 BASE-SX
14
Use the ping 127.0.0.1 command.
Use the ipconfig command.
Use the ipconfig/all command.
Use the ping 10.0.0.254 command.
15

Refer to the exhibit. Host A sends a frame with the


destination MAC address as FFFF.FFFF.FFFF. What action will the switch take for this frame?
It will drop the frame.
It will send the frame back to host A.
It will send the frame to all hosts except host A.
It will forward the frame to the default gateway.
16 Which device should be used for enabling a host to communicate with another host on a different network?
switch
hub
router
17 A PC can not connect to any remote websites, ping its default gateway, or ping a printer that is functioning
properly on the local network segment. Which action will verify that the TCP/IP stack is functioning correctly
on this PC?
Use the ipconfig /all command at the host’s command prompt.
Use the ping 127.0.0.1 command at the command prompt.
Use the traceroute command at the command prompt to identify any failures on the path to the gateway.
Use FTP to check for connectivity to remote sites.
Download a troubleshooting tool from the PC manufacturer's website.
18

Refer to the exhibit. Host A is configured with the correct


IP address for the default gateway of the router R1 FastEthernet0/1 interface. How will a packet that is sent
from host A to host B be handled by the devices on the network?
R1 will drop the packet because R1 does not have a specific route in its routing table to the 10.1.1.0/24
network.
R1 will forward the packet to its default gateway, the next hop router R2. R2 will forward the packet to
the directly connected network 10.1.1.0/24.
R1 will forward the packet to its default gateway, the next hop router R2. R2 will drop the packet because
it does not have a default route to network 10.1.1.0/24.
R1 will forward the packet to its default gateway, the next hop router R2. R2 will drop the packet because
it does not have a route that is learned by a routing protocol to network 10.1.1.0/24.
19 A network administrator is configuring several switches for a network. The switches have similar
configurations and only minor differences. The administrator wants to save all commands that are issued on
the first switch to a text file for editing. Which transfer option should be selected in HyperTerminal?

20 Which topology divides the collision domain and provides full media bandwidth to the hosts in the network?

corect

21

Refer to the exhibit. Each


media link is labeled. What type of cable should be used to connect the different devices?
Connection 1 - straight-through cable Connection 2 - straight-through cable Connection 3 - crossover cable
Connection 1 - straight-through cable Connection 2 - crossover cable Connection 3 - rollover cable
Connection 1 - crossover cable Connection 2 - rollover cable Connection 3 - straight-through cable
Connection 1 - crossover cable Connection 2 - straight-through cable Connection 3 - crossover cable
Connection 1 - straight-through cable Connection 2 - rollover cable Connection 3 - crossover cable
22A user enters http://www.cisco.com/web1.htm in the address line of a browser. Which statement is true about
this transaction?
The "http" portion indicates the protocol that is being used.
The "web1.htm" portion is the specific service name.
The retrieved web page will be displayed in URL code.
The "www.cisco.com" is the name of the web page file that is called.
23 What information can be gathered by using the command netstat?
the default gateway
the routing protocol
active TCP connections
the locally configured subnet mask
24What type of network is maintained if a server takes no dedicated role in the network?
mainframe
client/server
peer-to-peer

25 If an administrator wished to return a router to the default state, what additional step must be taken after
issuing the command erase start-up config?
Reload the device.
Issue the command copy running-config start-up config.
Perform a show running-config to verify that the file was removed.
Enter the interface commands to allow the device to connect to the network.
26

Refer to the exhibit. Host1 is in the process of


setting up a TCP session with Host2.Host1 has sent a SYN message to begin session establishment. What
happens next?
Host1 sends a segment with the ACK flag = 0, SYN flag = 0 to Host2.
Host1 sends a segment with the ACK flag = 1, SYN flag = 0 to Host2.
Host1 sends a segment with the ACK flag = 1, SYN flag = 1 to Host2.
Host2 sends a segment with the ACK flag = 0, SYN flag = 1 to Host1.
Host2 sends a segment with the ACK flag = 1, SYN flag = 0 to Host1.
Host2 sends a segment with the ACK flag = 1, SYN flag = 1 to Host1.
27A user sees the command prompt: Router(config-if)# . What task can be performed at this mode?
Reload the device.
Perform basic tests.
Configure individual interfaces.
Configure individual terminal lines.
28

Refer to the exhibit. Host A is unable to reach the


remote network. On the basis of the provided output, what is the cause of the problem?
Host A is configured with an incorrect IP address.
Host A is configured with an incorrect default gateway IP address.
There is no path to the remote network in the routing table of router R1.
Given that the destination network has a subnet mask of /16, host A and interface Fa0/1 of R1 are both
configured with an incorrect subnet mask.
29Which topology represents a collision-free environment?

30 Which option shows the PDU that contains the Layer 3 source and destination addressing for a packet?
31 Which three addresses belong to the category of public IP addresses? (Choose three.)
127.0.0.1
196.1.105.6 132.11.9.99
10.0.0.1
172.16.9.10
46.1.1.97
32How can ARP be used to help document the network?
It can list each hop on the way to a destination host.
It can show the average latency of hosts on the network.
It can provide a list of physical addresses on the network.
It can indicate which hosts are not responding to network traffic.
33 A technician is asked to secure the privileged EXEC mode of a switch by requiring a password. Which type of
password would require this login and be considered the most secure?
console
enable
enable secret
VTY
34

Refer to the exhibit. Host A sends a frame to host C with a destination MAC address CC. The MAC address
for host C is not in the MAC table of switch SW1. How will SW1 handle the frame?
Switch SW1 will drop the frame.
Switch SW1 will forward the frame to host C.
Switch SW1 will flood the frame out all ports.
Switch SW1 will flood the frame out all ports except port Fa0/1.
35
hub
switch
router
wireless access point
36

The tracert 10.1.3.2 command was issued on computer A. Computer A can ping other addresses on the local
subnet. Computer A sent the first ICMP packet toward computer B with a TTL value of 1. A protocol analyzer
that was running on computer B showed that the packet never reached its destination. Why did the packet not
reach the destination?
There is a TCP/IP problem on computer A.
There is a routing loop between R1 and R2.
R1 does not have a route for the destination network.
The TTL for the packet was decreased to zero by R1.
37Which combination of connectors will be used to make a straight-through cable when building a LAN to the
T568A standard?

corect
38

Refer to the exhibit. Which layered network model is shown in the diagram?
Cisco
IETF
OSI
TCP/IP
39What is the effect of using the Router# copy running-config startup-config command on a router?
The contents of ROM will change.
The contents of RAM will change.
The contents of NVRAM will change.
The contents of flash will change.
40 A network administrator subnets the network 192.168.1.0/24 into four subnets. Which option correctly
addresses Router1 and host A into the second subnet created?

corect

41 An organization wants to create a subnet of the IP network 172.16.0.0. This subnet will accommodate 1000
hosts. Which subnet mask should be assigned to this network?
255.255.0.0
255.255.248.0
255.255.252.0
255.255.254.0
255.255.255.0
255.255.255.128
42

Refer to the exhibit. Which list refers only to end devices?


D,E,F,G
A,H,B,C
A,D,E,F
A,D,E,G
43 How does a DTE device determine its clocking information?
The clocking information is manually configured by the administrator.
It is automatically sensed from the DCE device.
It is automatically generated based on port speed.
It is autonegotiated between the DTE and the DCE device.
44

Which statement describes the correct use of addresses to deliver


an e-mail message from HostB to the e-mail service that is running on ServerA?
HostB uses the MAC address of ServerA as the destination.
Router B uses a Layer 3 network address to route the packet.
Router A uses the Layer 4 address to forward the packet to Router B.
Via the use of a Layer 3 address, ServerA assigns the message to the e-mail service.
45 Which range of port numbers are reserved for services that are commonly used by applications that run on
servers?
0 to 255
0 to 1023
1024 to 49151
49152 to 65535
46 Due to a security violation, the router passwords must be changed. What information can be learned from the
following configuration entries? (Choose two.)
Router(config)# line vty 0 3
Router(config-line)# password c13c0
Router(config-line)# login

The entries specify three Telnet lines for remote access.


The entries specify four Telnet lines for remote access.
The entries set the console and Telnet password to "c13c0".
Telnet access will be denied because the Telnet configuration is incomplete.
Access will be permitted for Telnet using "c13c0" as the password.
47When must a router serial interface be configured with the clock rate command?
when the interface is functioning as a DTE device
when the interface timers have been cleared
when the connected DTE device is shut down
when the interface is functioning as a DCE device
48

Refer to the exhibit. The serial interface of the router was configured
with the use of the commands that are shown. The router cannot ping the router that is directly connected to
interface serial 0/0/0. What should the network technician do to solve this problem?
Configure the description at interface serial 0/0/0.
Configure an IP address on interface serial 0/0/0.
Remove the no shutdown command at interface serial 0/0/0
Reboot the router.
49

Refer to the exhibit. A web browser is running on host PC1 with an IP address 10.10.2.2/24. A dynamic port
number of 49152 is assigned to the browser. The browser sends a request for a web page to the web server with
an IP address 192.168.1.254/24. Which statement is true?
The session is established using TCP, and the socket number for the web server is 192.168.1.254: 80.
The session is established using TCP, and the socket number for the web server is 192.168.1.254: 49152.
The session is established using UDP, and the socket number for the web server is 192.168.1.254: 80.
The session is established using UDP, and the socket number for the web server is 192.168.1.254: 49152.

50 Which OSI layer manages data segments?


application layer
presentation layer
session layer
transport layer

You might also like