+ All Categories
Home > Documents > 13850488 Ccna Questions and Answers Smith.N Studio

13850488 Ccna Questions and Answers Smith.N Studio

Date post: 02-Jun-2018
Category:
Upload: smith-nguyen-studio
View: 238 times
Download: 0 times
Share this document with a friend

of 82

Transcript
  • 8/10/2019 13850488 Ccna Questions and Answers Smith.N Studio

    1/82

    Chapter 2 Correct Answers:

    1. What are the key functions of encapsulation? (Choose three.)allows modification of the original data before transmissionidentifies pieces of data as part of the same communicationenables consistent network paths for communicationensures that data pieces can be directed to the correct receiving end deviceenables the reassembly of complete messagestracks delay between end devices

    2. What is a primary function of the trailer information added by the data link layer encapsulation?supports error detectionensures ordered arrival of data

    provides delivery to correct destinationidentifies the devices on the local network assists intermediary devices with processing and path selection

    . Which two layers of the !"# model have the same functions as the $C%% model 'etwork ccess ayer? (Choose two.) 'etwork $ransportPhysicalData Link "ession

    *. Which three statements best describe a ocal rea 'etwork ( ')? (Choose three.)A LAN is usually in a single geographical area!he network is administered by a single organi"ation$he connection between segments in the ' is usually through a leased connection.$he security and access control of the network are controlled by a service provider.A LAN provides network services and access to applications for users within a common organi"ation+ach end of the network is generally connected to a $elecommunication "ervice %rovider ($"%).

    . -efer to the e hibit. Which networking term describes the data interleaving process represented in the graphic? piping%/0streaming

    multiple#ingencapsulation. What is the primary purpose of ayer * port assignment?

    to identify devices on the local mediato identify the hops between source and destinationto identify to the intermediary devices the best path through the network to identify the source and destination end devices that are communicatingto identify the processes or services that are communicating within the end devices

    1

    Smith Nguyen Studio.Smith Nguyen Studio.

    ttps://www.facebook.com/SmithNguyenStudio

  • 8/10/2019 13850488 Ccna Questions and Answers Smith.N Studio

    2/82

    . What can be identified by e amining the network layer header?the destination device on the local mediathe destination host addressthe bits that will be transferred over the mediathe source application or process creating the data

    3. What is the purpose of the $C%% 'etwork ccess layer? path determination and packet switchingdata representation4 encoding4 and controlreliability4 flow control4 and error detectiondetailing the components that make up the physical link and how to access it

    the division of segments into packets

    5. Which layer encapsulates the segment into packets? physicaldata link network transport

    16. "elect the statements that are correct concerning network protocols. (Choose three.)define the structure of layer specific PD$%sdictate how to accomplish layer functionsoutline the functions necessary for communications between layerslimit hardware compatibility

    re&uire layer dependent encapsulationseliminate standardi7ation among vendors

    11. What is a %/0?corruption of a frame during transmissiondata reassembled at the destinationretransmitted packets due to lost communicationa layer specific encapsulation

    12. -efer to the e hibit. 8Cell 8 at #% address 16.6.6. * has established an #% session with 8#% %hone 18 at #% address 1 2.1 .1.16 . 9asedupon the graphic4 which device type best describes the function of wireless device 8Cell ?8

    the destination devicean end devicean intermediate devicea media device

    2

    Smith Nguyen Studio.Smith Nguyen Studio.

    ttps://www.facebook.com/SmithNguyenStudio

  • 8/10/2019 13850488 Ccna Questions and Answers Smith.N Studio

    3/82

    1 . -efer to the e hibit. Which term correctly identifies the device type that is included in the area 9?sourceendtransfer intermediary

    1*. What device is considered an intermediary device?file server #% phonelaptop

    printer switch

    1,. Which characteristic correctly refers to end devices in a network?manage data flowsoriginate data flowretime and retransmit data signalsdetermine pathways for data

    Smith Nguyen Studio.Smith Nguyen Studio.

    ttps://www.facebook.com/SmithNguyenStudio

  • 8/10/2019 13850488 Ccna Questions and Answers Smith.N Studio

    4/82

    1 . -efer to the e hibit. Which set of devices contains only end devices?4 C4 /

    94 +4 :4 ;C4 /4 :4 ;4 #4 to>peer networks? (Choose two.)scalableone way data flowdecentrali"ed resourcescentrali7ed user accountsresource sharing without a dedicated server

    Smith Nguyen Studio.Smith Nguyen Studio.

    ttps://www.facebook.com/SmithNguyenStudio

  • 8/10/2019 13850488 Ccna Questions and Answers Smith.N Studio

    8/82

    . network administrator is designing a network for a new branch office of twenty>five users. What are the advantages of using a client>server model? (Choose two.)

    centrali"ed administrationdoes not re uire speciali7ed softwaresecurity is easier to enforcelower cost implementation

    provides a single point of failure

    . Which two protocols are used to control the transfer of web resources from a web server to a client browser? (Choose two.)"%

    =$%

    ;$*!!P*!!P6#%

    3. What is the role of the !"# application layer? provides segmentation of data provides encryption and conversion of dataprovides the interface between the applications on either end of the network

    provides control of all the data flowing between the source and destination devices

    5. small home network has been installed to interconnect three computers together for gaming and file sharing. What two propertiesepresent this network type? (Choose two.)

    0ser accounts are centrali7ed.6ecurity is difficult to enforce"peciali7ed operating system software is re uired.=ile permissions are controlled by a single computer.A computer that responds to a file sharing re&uest is functioning as a server

    *6. What application layer protocol is commonly used to support for file transfers between a client and a server?;$;$$%)!P$elnet

    *1. What are two characteristics of clients in data networks? (Choose two.)

    use daemonsinitiate data e#changesare repositories of datamay upload data to serverslisten for re uests from servers

    3

    Smith Nguyen Studio.Smith Nguyen Studio.

    ttps://www.facebook.com/SmithNguyenStudio

  • 8/10/2019 13850488 Ccna Questions and Answers Smith.N Studio

    9/82

    Chapter 3

    *2. 9ased on the transport layer header shown in the diagram4 which of the following statements describe the established session? (Choosewo.)

    $his is a 0/% header.!his contains a !elnet re&uest$his contains a $=$% data transfer.$he return packet from this remote host will have an cknowledgement 'umber of * 5 .!his is a !CP header

    * . With $C%% data encapsulation4 which range of port numbers identifies all well>known applications?6 to 2,,2, to 16229 to 921162* to 26**51, to ,, ,

    **. Why are port numbers included in the $C% header of a segment?to indicate the correct router interface that should be used to forward a segmentto identify which switch ports should receive or forward the segmentto determine which ayer protocol should be used to encapsulate the datato enable a receiving host to forward the data to the appropriate applicationto allow the receiving host to assemble the packet in the proper order

    *,. Which two options represent ayer * addressing? (Choose two.)identifies the destination network identifies source and destination hostsidentifies the communicating applicationsidentifies multiple conversations between the hostsidentifies the devices communicating over the local media

    5

    Smith Nguyen Studio.Smith Nguyen Studio.

    ttps://www.facebook.com/SmithNguyenStudio

  • 8/10/2019 13850488 Ccna Questions and Answers Smith.N Studio

    10/82

    * . -efer to the e hibit. #n line of this Wireshark capture4 what $C% operation is being performed?session establishmentsegment retransmitdata transfer session disconnect

    * . -efer to the e hibit. What two pieces of information can be determined from the output that is shown? (Choose two.)!he local host is using three client sessions!he local host is using web sessions to a remote server$he local host is l istening for $C% connections using public addresses.$he local host is using well>known port numbers to identify the source ports.$he local host is performing the three>way handshake with 152.1 3.161@16 .

    *3. Which information is found in both the $C% and 0/% header information?se uencingflow controlacknowledgmentssource and destination port

    *5. Which three features allow $C% to reliably and accurately track the transmission of data from source to destination?encapsulationflow controlconnectionless servicessession establishmentnumbering and se&uencing

    best effort delivery

    6. Which is an important characteristic of 0/%?acknowledgement of data deliveryminimal delays in data deliveryhigh reliability of data deliverysame order data delivery

    16

    Smith Nguyen Studio.Smith Nguyen Studio.

    ttps://www.facebook.com/SmithNguyenStudio

  • 8/10/2019 13850488 Ccna Questions and Answers Smith.N Studio

    11/82

    1. fter a web browser makes a re uest to a web server that is listening to the standard port4 what will be the source port number in the $C%header of the response from the server?

    1,89162*1 23

    2. Which event occurs during the transport layer three>way handshake?$he two applications e change data.!CP initiali"es the se&uence numbers for the sessions

    0/% establishes the ma imum number of bytes to be sent.$he server acknowledges the bytes of data received from the client.

    . Why is flow control used for $C% data transfer?to synchroni7e e uipment speed for sent datato synchroni7e and order se uence numbers so data is sent in complete numerical order to prevent the receiver from being overwhelmed by incoming datato synchroni7e window si7e on the server to simplify data transfer to multiple hosts

    *. Which transport layer protocol provides low overhead and would be used for applications which do not re uire reliable data delivery?$C%#%

    $DP;$$%/'"

    ,. /uring a $C% communication session4 if the packets arrive to the destination out of order4 what will happen to the original message?$he packets will not be delivered.$he packets will be retransmitted from the source.!he packets will be delivered and reassembled at the destination$he packets will be delivered and not reassembled at the destination.

    . What mechanism is used by $C% to provide flow control as segments travel from source to destination?se uence numberssession establishment

    window si"eacknowledgments

    . -efer to the e hibit. ;ost is using =$% to download a large file from "erver 1. /uring the download process4 "erver 1 does not receivean acknowledgment from ;ost for several bytes of transferred data. What action will "erver 1 take as a result?

    create a ayer 1 Eam signalreach a timeout and resend the data that needs to be acknowledgedsend a -+"+$ bit to the hostchange the window si7e in the ayer * header

    11

    Smith Nguyen Studio.Smith Nguyen Studio.

    ttps://www.facebook.com/SmithNguyenStudio

  • 8/10/2019 13850488 Ccna Questions and Answers Smith.N Studio

    12/82

    3. What is dynamically selected by the source host when forwarding data?destination logical addresssource physical addressdefault gateway addresssource port

    5. Which !"# model layer is responsible for regulating the flow of information from source to destination4 reliably and accurately?application

    presentationsessiontransport

    network

    6. -efer to the e hibit. ;ost1 is in the process of setting up a $C% session with ;ost2. ;ost1 has sent a "F' message to begin sessionestablishment. What happens ne t?

    ;ost1 sends a segment with the CG flag H 64 "F' flag H 6 to ;ost2.;ost1 sends a segment with the CG flag H 14 "F' flag H 6 to ;ost2.;ost1 sends a segment with the CG flag H 14 "F' flag H 1 to ;ost2.;ost2 sends a segment with the CG flag H 64 "F' flag H 1 to ;ost1.;ost2 sends a segment with the CG flag H 14 "F' flag H 6 to ;ost1.*ost2 sends a segment with the AC; flag < ( 6=N flag < to *ost

    1. What are two features of the 0ser /atagram %rotocol (0/%)? (Choose two.)flow controllow overheadconnectionlessconnection>orientedse uence and acknowledgements

    12

    Smith Nguyen Studio.Smith Nguyen Studio.

    ttps://www.facebook.com/SmithNguyenStudio

  • 8/10/2019 13850488 Ccna Questions and Answers Smith.N Studio

    13/82

    Chapter >2. When the destination network is not listed in the routing table of a Cisco router4 what are two possible actions that the router might take?

    Choose two.)$he router sends an -% re uest to determine the re uired ne t hop address.!he router discards the packet$he router forwards the packet toward the ne t hop indicated in the -% table.$he router forwards the packet to the interface indicated by the source address.!he router forwards the packet out the interface indicated by the default route entry

    . What are the key factors to consider when grouping hosts into a common network? (Choose three.)gatewayspurpose

    physical addressingsoftware versiongeographic locationownership

    *. What is a component of a routing table entry?the C address of the interface of the router the destination ayer * port number the destination host addressthe ne#t.hop address

    ,. Which three statements are true about routes and their use? (Choose three.)

    #f no route to the destination network is found4 the packet is returned to the previous router.+f the destination network is directly connected( the router forwards the packet to the destination host#f multiple network entries e ist for the destination network4 the most general route is used to forward the packet.+f no route e#ists for the destination network and a default route is present( the packet is forwarded to the ne#t.hop router+f the originating host has a default gateway configured( the packet for a remote network can be forwarded using that route#f a host does not have a route manually configured for the destination network4 the host will drop the packet.

    . -efer to the e hibit. network administrator notices that there are too many broadcasts on the network. What two steps can the networkadministrator take to resolve this problem? (Choose two.)

    ?eplace 62 with a router%lace all servers on "1./isable $C%% broadcasts.

    6ubnet the @2 8 9 9 B23 network/isable all unused interfaces on the switches.

    . What two characteristics are commonly associated with dynamic routing protocols? (Choose two.)re uire no device configurationprovide routers with up.to.date routing tablesre uire less processing power than static routes re uireconsume bandwidth to e#change route information

    prevent manual configuration and maintenance of the routing table

    1

    Smith Nguyen Studio.Smith Nguyen Studio.

    ttps://www.facebook.com/SmithNguyenStudio

  • 8/10/2019 13850488 Ccna Questions and Answers Smith.N Studio

    14/82

    3. What statement describes the purpose of a default route? host uses a default route to transfer data to another host on the same network segment. host uses a default route to forward data to the local switch as the ne t hop to all destinations. host uses a default route to identify the ayer 2 address of an end device on the local network.

    A host uses a default route to transfer data to a host outside the local network when no other route to the destination e#ists

    5. What information is added during encapsulation at !"# ayer ?source and destination Csource and destination application protocolsource and destination port number source and destination +P address

    6. #n a connectionless system4 which of the following is correct?$he destination is contacted before a packet is sent.!he destination is not contacted before a packet is sent$he destination sends an acknowledgement to the source that indicates the packet was received.$he destination sends an acknowledgement to the source that re uests the ne t packet to be sent.

    1. Which #% packet field will prevent endless loops?type>of>serviceidentificationflagstime.to.liveheader checksum

    2. What type of routing uses information that is manually entered into the routing table?dynamicinterior staticstandard

    . What are three common problems with a large network? (Choose three.)too few broadcastsperformance degradationsecurity issueslimited management responsibilityhost identification

    protocol compatibility*. Which intermediary devices could be used to implement security between networks? (Choose two.)

    routerhubswitchfirewallaccess point

    bridge

    ,. #n an #%v* environment4 what information is used by the router to forward data packets from one interface of a router to another?destination network addresssource network addresssource C addresswell known port destination address

    1*

    Smith Nguyen Studio.Smith Nguyen Studio.

    ttps://www.facebook.com/SmithNguyenStudio

  • 8/10/2019 13850488 Ccna Questions and Answers Smith.N Studio

    15/82

    . -efer to the e hibit. ll devices shown in the e hibit have factory default settings. ;ow many broadcast domains are represented in theopology that is shown?

    3,

    311

    . Which portion of the network layer address does a router use to forward packets?host portion

    broadcast addressnetwork portiongateway address

    3. What is the purpose of a default gateway? physically connects a computer to a network provides a permanent address to a computer identifies the network to which a computer is connectedidentifies the logical address of a networked computer and uni uely identifies it to the rest of the network identifies the device that allows local network computers to communicate with devices on other networks

    5. #f the default gateway is configured incorrectly on the host4 what is the impact on communications?

    $he host is unable to communicate on the local network.!he host can communicate with other hosts on the local network( but is unable to communicate with hosts on remotenetworks$he host can communicate with other hosts on remote networks4 but is unable to communicate with hosts on the local network.$here is no impact on communications.

    1,

    Smith Nguyen Studio.Smith Nguyen Studio.

    ttps://www.facebook.com/SmithNguyenStudio

  • 8/10/2019 13850488 Ccna Questions and Answers Smith.N Studio

    16/82

    36. -efer to the e hibit. network administrator is troubleshooting a connectivity problem and needs to determine the address that is used toforward network packets out the network. 0sing the netstat >r command4 the administrator would identify which address as the address towhich all hosts send packets that are destined for an outside network?

    16.16.16.212 .6.6.1

    9 9 916.16.16.122*.6.6.6

    31. -efer to the e hibit. $he network in the e hibit is fully operational. What two statements correctly describe the routing for the topologyhat is shown? (Choose two.)

    @2 8 9 2 is the ne#t.hop address that is used by ?1 to route a packet from the 9 9 9 9 network to the 2 9 9 network16.6.6.1 is the ne t>hop address that is used by -1 to route a packet from the 152.1 3.12.6 network to the 16.6.6.6 network.152.1 3.6.1 is the ne t>hop address that is used by -1 to route a packet from the 152.1 3.12.6 network to the 1 2.1 .6.6 network.1 2.1 .6.1 is the ne t>hop address that is used by - to route a packet from the 16.6.6.6 to the 1 2.1 .6.6 network.

    @2 8 9 is the ne#t.hop address that is used by ?2 to route a packet from the 2 9 9 network to the @2 8 2 9network152.1 3.6.2 is the ne t>hop address that is used by -2 to route a packet from the 1 2.1 .6.6 network to the 152.1 3.12.6 network.

    1

    Smith Nguyen Studio.Smith Nguyen Studio.

    ttps://www.facebook.com/SmithNguyenStudio

  • 8/10/2019 13850488 Ccna Questions and Answers Smith.N Studio

    17/82

    32. -efer to the e hibit. 0sing the network in the e hibit4 what would be the default gateway address for host in the 152.1 .215.6network?

    152.1 ,.2,6.1152. 1. .1152.1 .215.6

    @2 11 2 @

    1

    Smith Nguyen Studio.Smith Nguyen Studio.

    ttps://www.facebook.com/SmithNguyenStudio

  • 8/10/2019 13850488 Ccna Questions and Answers Smith.N Studio

    18/82

    Chapter 3 . Which #%v* subnetted addresses represent valid host addresses? (Choose three.)

    1 2.1 .*.12 &22 3 >> B22 3 @1 B2

    1 2.1 .*.5, &21 2.1 .*.1,5 &2

    2 3 29 B2

    3*. What subnet mask would a network administrator assign to a network address of 1 2. 6.1.6 if it were possible to have up to 2,* hosts?2,,.2,,.6.62>> 2>> 2>> 92,,.2,,.2,*.62,,.2,,.2*3.6

    3,. router interface has been assigned an #% address of 1 2.1 .152.1 with a mask of 2,,.2,,.2,,.2*3. $o which subnet does the #%address belong?

    1 2.1 .6.61 2.1 .152.61 2.1 .152.123

    2 @2 91 2.1 .152.1 31 2.1 .152.1

    3 . What is the primary reason for development of #%v ?securityheader format simplificatione#panded addressing capabilitiesaddressing simplification

    3 . What is the network address of the host 1 2.2,. .55 &2 in binary?16161166. 66611661.61666611.6666666616161166. 66611661.61666611.11111111

    9 9 99 999 99 9 9999 9 9999999916161166. 66611661.61666616.6116661116161166. 66616661.61666611. 6116661616161166. 66611661.66666666.66666666

    33. What two things will happen if a router receives an #C % packet which has a $$ value of 1 and the destination host is several hopsaway? (Choose two.) !he router will discard the packet

    2 $he router will decrement the $$ value and forward the packet to the ne t router on the path to the destination host.1 !he router will send a time e#ceeded message to the source host* $he router will increment the $$ value and forward the packet to the ne t router on the path to the destination host., $he router will send an #C % -edirect essage to the source host.

    35. Which three #% addresses are private? (Choose three.)1 1 2.1 3. .12 9 1> 91 @2 8 @@ >3 2 8 88 @9, 152. .,,.35

    1 2. ,.1 .,

    56. Which process do routers use to determine the subnet network address based upon a given #% address and subnet mask?1 binary adding2 he adecimal anding

    binary division* binary multiplication> binary ANDing

    13

    Smith Nguyen Studio.Smith Nguyen Studio.

    ttps://www.facebook.com/SmithNguyenStudio

  • 8/10/2019 13850488 Ccna Questions and Answers Smith.N Studio

    19/82

    51. :iven the #% address and subnet mask of 1 2.1 .1 *. * 2,,.2,,.2,,.22*4 which of the following would describe this address?1 $his is a useable host address.2 $his is a broadcast address.1 !his is a network address* $his is not a valid address.

    52. -efer to the e hibit. Which network prefi will work with the #% addressing scheme shown in the graphic.1 &2*2 &1

    &26

    3 B2, &2, &23

    5 . -efer to the e hibit. Why would the response shown be displayed after issuing the command ping 12 .6.6.1 on a %C?1 $he #% settings are not properly configured on the host.2 +nternet Protocol is not properly installed on the host

    $here is a problem at the physical or data link layer.* $he default gateway device is not operating., router on the path to the destination host has gone down.

    5*. What is a group of hosts called that have identical bit patterns in the high order bits of their addresses?1 an internet2 a network

    an octet* a radi

    15

    Smith Nguyen Studio.Smith Nguyen Studio.

    ttps://www.facebook.com/SmithNguyenStudio

  • 8/10/2019 13850488 Ccna Questions and Answers Smith.N Studio

    20/82

    5,. -efer to the e hibit. $he network administrator has assigned the internetwork of 9 #"" an address range of 152.1 3.16.6. $his addressange has been subnetted using a &25 mask. #n order to accommodate a new building4 the technician has decided to use the fifth subnet for

    configuring the new network (subnet 7ero is the first subnet). 9y company policies4 the router interface is always assigned the first usable hostaddress and the workgroup server is given the last usable host address. Which configuration should be entered into the workgroup serverIsproperties to allow connectivity to the network?

    1 #% address@ 152.1 3.16. 3 subnet mask@ 2,,.2,,.2,,.2*6 default gateway@ 152.1 3.16. 52 #% address@ 152.1 3.16. 3 subnet mask@ 2,,.2,,.2,,.2*6 default gateway@ 152.1 3.16.1 +P address: @2 8 9 18 subnet mask: 2>> 2>> 2>> 238 default gateway: @2 8 9 11* #% address@ 152.1 3.16. 5 subnet mask@ 2,,.2,,.2,,.2*3 default gateway@ 152.1 3.16. 1, #% address@ 152.1 3.16.2,* subnet mask@ 2,,.2,,.2,,.6 default gateway@ 152.1 3.16.1

    5 . -efer to the e hibit. network administrator has to develop an #% addressing scheme that uses the 152.1 3.1.6 &2* address space. $henetwork that contains the serial link has already been addressed out of a separate range. +ach network will be allocated the same number ofhost addresses. Which network mask will be appropriate to address the remaining networks?

    1 2,,.2,,.2,,.2*32 2,,.2,,.2,,.22*1 2>> 2>> 2>> @2* 2,,.2,,.2,,.2*6, 2,,.2,,.2,,.123

    2,,.2,,.2,,.2,2

    5 . What three facts are true about the network portion of an #%v* address? (Choose three.)1 identifies an individual device

    2 is identical for all hosts in a broadcast domain is altered as packet is forwarded3 varies in length> is used to forward packets

    uses flat addressing

    53. Which statements are true regarding #% addressing? (Choose two.)1 ' $ translates public addresses to private addresses destined for the #nternet.2 !nly one company is allowed to use a specific private network address space.1 Private addresses are blocked from public +nternet by router* 'etwork 1 2. 2.6.6 is part of the private address space.> +P address 2 9 9 can be used for a host to direct traffic to itself

    26

    Smith Nguyen Studio.Smith Nguyen Studio.

    ttps://www.facebook.com/SmithNguyenStudio

  • 8/10/2019 13850488 Ccna Questions and Answers Smith.N Studio

    21/82

    55. Which of the following network devices are recommended to be assigned static #% addresses? (Choose three.)1 ' workstations2 servers1 network printers3 routers, remote workstations

    laptops

    166. -efer to the e hibit. network administrator discovers that host is having trouble with #nternet connectivity4 but the server farm hasfull connectivity. #n addition4 host has full connectivity to the server farm. What is a possible cause of this problem?

    1 $he router has an incorrect gateway.2 ;ost has an overlapping network address.

    ;ost has an incorrect default gateway configured.* ;ost has an incorrect subnet mask.> NA! is re&uired for the host A network

    161. Which of the following are features of #%v ? (Choose three.) larger address space

    2 faster routing protocols1 data types and classes of service3 authentication and encryption, improved host naming conventions

    same addressing scheme as #%v*

    162. -efer to the e hibit. ;ost is connected to the '4 but it cannot get access to any resources on the #nternet. $he configuration of thehost is shown in the e hibit. What could be the cause of the problem?

    1 $he host subnet mask is incorrect.2 $he default gateway is a network address.

    $he default gateway is a broadcast address.3 !he default gateway is on a different subnet from the host

    21

    Smith Nguyen Studio.Smith Nguyen Studio.

    ttps://www.facebook.com/SmithNguyenStudio

  • 8/10/2019 13850488 Ccna Questions and Answers Smith.N Studio

    22/82

    16 . ;ow many bits make up an #%v* address?1 1232 *

    *33 12

    22

    Smith Nguyen Studio.Smith Nguyen Studio.

    ttps://www.facebook.com/SmithNguyenStudio

  • 8/10/2019 13850488 Ccna Questions and Answers Smith.N Studio

    23/82

    Chapter 16*. What is true concerning physical and logical topologies?

    $he logical topology is always the same as the physical topology.%hysical topologies are concerned with how a network transfers frames.%hysical signal paths are defined by /ata ink layer protocols.Logical topologies consist of virtual connections between nodes

    16,. What determines the method of media access control? (Choose two.)network layer addressingmedia sharingapplication processeslogical topologyintermediary device function

    16 . Which statements describe the logical token>passing topology? (Choose two.) 'etwork usage is on a first come4 first serve basis.Computers are allowed to transmit data only when they possess a token/ata from a host is received by all other hosts.'lectronic tokens are passed se&uentially to each other$oken passing networks have problems with high collision rates.

    16 . -efer to the e hibit. Which statement describes the media access control methods that are used by the networks in the e hibit?ll three networks use C" &C

    'one of the networks re uire media access control.Network uses C65ABCD and Network 1 uses C65ABCA

    'etwork 1 uses C" &C and 'etwork 2 uses C" &C/. 'etwork 2 uses C" &C and 'etwork uses C" &C/.

    163. What is true regarding media access control? (Choose three.)'thernet utili"es C65ABCDdefined as placement of data frames on the mediacontention>based access is also known as deterministic362.11 utili7es C" &C/Data Link layer protocols define the rules for access to different media

    controlled access contains data collisions

    165. Which options are properties of contention>based media access for a shared media? (Choose three.)non.deterministicless overheadone station transmits at a timecollisions e#istdevices must wait their turntoken passing

    2

    Smith Nguyen Studio.Smith Nguyen Studio.

    ttps://www.facebook.com/SmithNguyenStudio

  • 8/10/2019 13850488 Ccna Questions and Answers Smith.N Studio

    24/82

    116. What is a function of the data link layer? provides the formatting of data provides end>to>end delivery of data between hosts provides delivery of data between two applicationsprovides for the e#change data over a common local media

    111. What statements are true regarding addresses found at each layer of the !"# model? (Choose two.)Layer 2 may identify devices by a physical address burned into the network card

    ayer 2 identifies the applications that are communicatingLayer 1 represents a hierarchical addressing scheme

    ayer * directs communication to the proper destination network

    ayer * addresses are used by intermediary devices to forward data

    112. -efer to the e hibit. frame is being sent from the %C to the laptop. Which source C and #% addresses will be included in the frameas it leaves -outer9? (Choose two.)

    source C > %Csource C > "6&6 on -outersource 5AC . )a9B on ?outer-source +P . PCsource #% > "6&6 on -outersource #% > =a6&1 of -outer9

    11 . What is the purpose of the preamble in an +thernet frame?is used as a pad for dataidentifies the source addressidentifies the destination address

    marks the end of timing informationis used for timing synchroni"ation with alternating patterns of ones and "eros

    11*. What is the primary purpose of the trailer in a data link layer frame?define the logical topology

    provide media access controlsupport frame error detectioncarry routing information for the frame

    11,. What is a characteristic of a logical point>to>point topology?$he nodes are physically connected.$he physical arrangement of the nodes is restricted.!he media access control protocol can be very simple$he data link layer protocol used over the link re uires a large frame header.

    2*

    Smith Nguyen Studio.Smith Nguyen Studio.

    ttps://www.facebook.com/SmithNguyenStudio

  • 8/10/2019 13850488 Ccna Questions and Answers Smith.N Studio

    25/82

    11 . -efer to the e hibit. ;ow many uni ue C-C calculations will take place as traffic routes from the %C to the laptop?

    12*8

    11 . Which sublayer of the data link layer prepares a signal to be transmitted at the physical layer?C

    5AC;/ C

    '#C

    113. -efer to the e hibit. ssuming that the network in the e hibit is converged meaning the routing tables and -% tables are complete4

    which C address will ;ost place in the destination address field of +thernet frames destined for www.server?66>1c>*1>ab>c6>6699.9c.8>.cf. >.c966>6c>3,>cf> ,>c166>12> f> 2>6,>af

    115. What two facts are true when a device is moved from one network or subnet to another? (Choose two.)$he ayer 2 address must be reassigned.$he default gateway address should not be changed.!he device will still operate at the same Layer 2 address

    pplications and services will need additional port numbers assigned.!he Layer 1 address must be reassigned to allow communications to the new network

    126. network administrator has been asked to provide a graphic representation of e actly where the company network wiring ande uipment are located in the building. What is this type of drawing?

    logical topologyphysical topologycable pathwiring gridaccess topology

    2,

    Smith Nguyen Studio.Smith Nguyen Studio.

    ttps://www.facebook.com/SmithNguyenStudio

  • 8/10/2019 13850488 Ccna Questions and Answers Smith.N Studio

    26/82

    121. What is a primary purpose of encapsulating packets into frames? provide routes across the internetwork format the data for presentation to the user facilitate the entry and e#it of data on mediaidentify the services to which transported data is associated

    122. What are three characteristics of valid +thernet ayer 2 addresses? (Choose three.)!hey are 38 binary bits in length!hey are considered physical addresses!hey are generally represented in he#adecimal format$hey consist of four eight>bit octets of binary numbers.

    $hey are used to determine the data path through the network.$hey must be changed when an +thernet device is added or moved within the network.

    12 . Which three factors should be considered when implementing a ayer 2 protocol in a network? (Choose three.)the ayer protocol selectedthe geographic scope of the network the %/0 defined by the transport layer the physical layer implementationthe number of hosts to be interconnected

    2

    Smith Nguyen Studio.Smith Nguyen Studio.

    ttps://www.facebook.com/SmithNguyenStudio

  • 8/10/2019 13850488 Ccna Questions and Answers Smith.N Studio

    27/82

    Chapter 812*. n installed fiber run can be checked for faults4 integrity4 and the performance of the media by using what device?

    light inEector 7!D? $/-

    ultimeter

    12,. Which characteristics describe fiber optic cable? (Choose two.)+t is not affected by '5+ or ?)++ach pair of cables is wrapped in metallic foil.#t combines the techni ue of cancellation4 shielding and twisting to protect data.

    #t has a ma imum speed of 166 bps.+t is the most e#pensive type of LAN cabling

    12 . Which of the following is a characteristic of single>mode fiber>optic cable?generally uses +/s as the light sourcerelatively larger core with multiple light pathsless e pensive than multimodegenerally uses lasers as the light source

    12 . What is a possible effect of improperly applying a connector to a network cable?/ata will be forwarded to the wrong node.Data transmitted through that cable may e#perience signal loss

    n improper signaling method will be implemented for data transmitted on that cable.

    $he encoding method for data sent on that cable will change to compensate for the improper connection.

    123. With the use of unshielded twisted>pair copper wire in a network4 what causes crosstalk within the cable pairs?the magnetic field around the ad acent pairs of wirethe use of braided wire to shield the adEacent wire pairsthe reflection of the electrical wave back from the far end of the cablethe collision caused by two nodes trying to use the media simultaneously

    125. What characteristic of 0$% cable helps reduce the effects of interference?the metal braiding in the shieldingthe reflective cladding around corethe twisting of the wires in the cablethe insulating material in the outer Eacket

    1 6. #n ' installations where potential electrical ha7ards or electromagnetic interference may be present4 what type of media isecommended for backbone cabling?

    coafiberCat,e 0$%Cat 0$%"$%

    1 1. Which method of signal transmission uses radio waves to carry signals?electricalopticalwirelessacoustic

    1 2. What are three measures of data transfer? (Choose three.)goodputfre uencyamplitudethroughputcrosstalk bandwidth

    2

    Smith Nguyen Studio.Smith Nguyen Studio.

    ttps://www.facebook.com/SmithNguyenStudio

  • 8/10/2019 13850488 Ccna Questions and Answers Smith.N Studio

    28/82

    1 . Which type of cable run is most often associated with fiber>optic cable?backbone cablehori7ontal cable

    patch cablework area cable

    1 *. When is a straight>through cable used in a network?when connecting a router through the console portwhen connecting one switch to another switchwhen connecting a host to a switchwhen connecting a router to another router

    1 ,. What is considered a benefit of wireless as a media choice?more host mobilitylower security risksreduced susceptibility to interferenceless impact of the surroundings on the effective coverage area

    1 . #n most business 's4 which connector is used with twisted>pair networking cable?9'C-11?,.3>$ype =

    1 . Which !"# layer is responsible for binary transmission4 cable specification4 and physical aspects of network communication?%resentation$ransport/ata ink Physical

    1 3. Which fiber connector supports full duple +thernet?

    $his one.

    1 5. What is a primary role of the %hysical layer in transmitting data on the network?create the signals that represent the bits in each frame on to the media

    provide physical addressing to the devicesdetermine the path packets take through the network control data access to the media

    23

    Smith Nguyen Studio.Smith Nguyen Studio.

    ttps://www.facebook.com/SmithNguyenStudio

  • 8/10/2019 13850488 Ccna Questions and Answers Smith.N Studio

    29/82

    1*6. -efer to the e hibit. Which type of Category , cable is used to make an +thernet connection between ;ost and ;ost 9?coa cablerollover cablecrossover cablestraight>through cable

    25

    Smith Nguyen Studio.Smith Nguyen Studio.

    ttps://www.facebook.com/SmithNguyenStudio

  • 8/10/2019 13850488 Ccna Questions and Answers Smith.N Studio

    30/82

    Chapter @1*1. When a collision occurs in a network using C" &C/4 how do hosts with data to transmit respond after the backoff period has e pired?

    !he hosts return to a listen.before.transmit mode$he hosts creating the collision have priority to send data.$he hosts creating the collision retransmit the last 1 frames.$he hosts e tend their delay period to allow for rapid transmission.

    1*2. -efer to the e hibit. $he switch and workstation are administratively configured for full>duple operation. Which statement accuratelyeflects the operation of this link?

    No collisions will occur on this link!nly one of the devices can transmit at a time.$he switch will have priority for transmitting data.$he devices will default back to half duple if e cessive collisions occur.

    1* . Why do hosts on an +thernet segment that e perience a collision use a random delay before attempting to transmit a frame? random delay is used to ensure a collision>free link. random delay value for each device is assigned by the manufacturer. standard delay value could not be agreed upon among networking device vendors.

    A random delay helps prevent the stations from e#periencing another collision during the transmission

    1**. +thernet operates at which layers of the !"# model? (Choose two.) 'etwork layer $ransport layer Physical layer

    pplication layer "ession layer Data.link layer

    1*,. What does the #+++ 362.2 standard represent in +thernet technologies?C sublayer

    %hysical layer Logical Link Control sublayer

    'etwork layer

    6

    Smith Nguyen Studio.Smith Nguyen Studio.

    ttps://www.facebook.com/SmithNguyenStudio

  • 8/10/2019 13850488 Ccna Questions and Answers Smith.N Studio

    31/82

    1* . -efer to the e hibit. ;ostJ is attempting to contact "erverJ9. Which statements correctly describe the addressing ;ostJ will generaten the process? (Choose two.)

    packet with the destination #% of -outerJ9. frame with the destination C address of "witchJ . packet with the destination #% of -outerJ .

    A frame with the destination 5AC address of ?outerEAA packet with the destination +P of 6erverE-

    frame with the destination C address of "erverJ9.

    1* . ;ost has an #% address of 1 2.1 .22,.5 4 a mask of 2,,.2,,.2*3.64 and a default gateway of 1 2.1 .22*.1. ;ost needs to send apacket to a new host whose #% is 1 2.1 .2 1. 3. ;ost performs the '/ing operation on its address and subnet mask. What two things willoccur? (Choose two.)

    *ost A will get a result of 2 223 9 from the AND process;ost will send on to the media a broadcast frame that contains the packet.*ost A will broadcast an A?P re&uest for the 5AC of the host 2 21 8;ost will change the destination #% of the packet to 1 2.1 .22*.1 and forward the packet.;ost will encapsulate the packet in a frame with a destination C that is the C address associated with 1 2.1 .22*.1.

    1*3. Which two features make switches preferable to hubs in +thernet>based networks? (Choose two.)reduction in cross>talk minimi"ing of collisionssupport for 0$% cablingdivision into broadcast domainsincrease in the throughput of communications

    1*5. What are three functions of the upper data link sublayer in the !"# model? (Choose three.)recogni7es streams of bitsidentifies the network layer protocolmakes the connection with the upper layersidentifies the source and destination applications

    insulates network layer protocols from changes in physical e&uipmentdetermines the source of a transmission when multiple devices are transmitting

    1,6. What are the two most commonly used media types in +thernet networks today? (Choose two.)coa ial thicknetcopper $!Pcoa ial thinnetoptical fibershielded twisted pair

    1

    Smith Nguyen Studio.Smith Nguyen Studio.

    ttps://www.facebook.com/SmithNguyenStudio

  • 8/10/2019 13850488 Ccna Questions and Answers Smith.N Studio

    32/82

    1,1. -efer to the e hibit. Which option correctly identifies content that the frame data field may contain? preamble and stop framenetwork layer packet

    physical addressing=C" and "o=

    1,2. Which of the following describe interframe spacing? (Choose two.)the minimum interval( measured in bit.times( that any station must wait before sending another framethe ma imum interval4 measured in bit>times4 that any station must wait before sending another framethe 5 >bit payload padding inserted into a frame to achieve a legal frame si7ethe 5 >bit frame padding transmitted between frames to achieve proper synchroni7ationthe time allowed for slow stations to process a frame and prepare for the ne#t framethe ma imum interval within which a station must send another frame to avoid being considered unreachable

    1, . fter an +thernet collision4 when the backoff algorithm is invoked4 which device has priority to transmit data?the device involved in the collision with the lowest C addressthe device involved in the collision with the lowest #% addressany device in the collision domain whose backoff timer e#pires firstthose that began transmitting at the same time

    1,*. Convert the binary number 16111616 into its he adecimal e uivalent. "elect the correct answer from the list below.3,56-A

    191C

    1,,. Which of the following is a drawback of the C" &C/ access method?Collisions can decrease network performance#t is more comple than non>deterministic protocols.

    /eterministic media access protocols slow network performance.C" &C/ ' technologies are only available at slower speeds than other ' technologies.

    1, . +thernet operates at which layer of the $C%% network model?application

    physicaltransportinternetdata link network access

    2

    Smith Nguyen Studio.Smith Nguyen Studio.

    ttps://www.facebook.com/SmithNguyenStudio

  • 8/10/2019 13850488 Ccna Questions and Answers Smith.N Studio

    33/82

    1, . #n the graphic4 ;ost has reached ,6K completion in sending a 1 G9 +thernet frame to ;ost / when ;ost 9 wishes to transmit its ownframe to ;ost C. What must ;ost 9 do?

    ;ost 9 can transmit immediately since it is connected on its own cable segment.;ost 9 must wait to receive a C" transmission from the hub4 to signal its turn.;ost 9 must send a re uest signal to ;ost by transmitting an interframe gap.*ost - must wait until it is certain that *ost A has completed sending its frame

    1,3. Which statements correctly describe C addresses? (Choose three.)dynamically assignedcopied into ?A5 during system startuplayer addresscontains a 1 byte 7$+

    bytes long2 bits long

    1,5. What three primary functions does data link layer encapsulation provide? (Choose three.)addressingerror detectionframe delimiting

    port identification path determination#% address resolution

    1 6. What is the primary purpose of -%?translate 0- s to #% addressesresolve +Pv3 addresses to 5AC addresses

    provide dynamic #% configuration to network devicesconvert internal private addresses to e ternal public addresses

    Smith Nguyen Studio.Smith Nguyen Studio.

    ttps://www.facebook.com/SmithNguyenStudio

  • 8/10/2019 13850488 Ccna Questions and Answers Smith.N Studio

    34/82

    Chapter 9

    1 1. -efer to the e hibit. student working in the lab selects a cable that is wired as shown. Which connection types can successfully bemade with this cable? (Choose two.)

    connecting a %C to a routerIs console portconnecting two routers together via their fast ethernet portsconnecting two switches together at gigabit speedsconnecting a %C to a switch at :igabit +thernet speedsconnecting two devices with the same interface type at )ast 'thernet speeds

    1 2. Which option identifies the primary interface which would be used for initial configuration of a Cisco router?0L interface

    +thernet interfaceserial interfaceconsole interface

    1 . What makes fiber preferable to copper cabling for interconnecting buildings? (Choose three.)greater distances per cable runlower installation costlimited susceptibility to '5+B?)+durable connectionsgreater bandwidth potentialeasily terminated

    1 *. network administrator is re uired to use media in the network that can run up to 166 meters in cable length without using repeaters.$he chosen media must be ine pensive and easily installed. $he installation will be in a pre>e isting building with limited cabling space.Which type of media would best meet these re uirements?

    "$%$!Pcoa ialsingle>mode fiber multimode fiber

    1 ,. What does the term 8attenuation8 mean in data communication?loss of signal strength as distance increasestime for a signal to reach its destinationleakage of signals from one cable pair to another

    strengthening of a signal by a networking device1 . ;ow many host addresses may be assigned on each subnetwork when using the 1 6. 3.6.6 network address with a subnet mask of2,,.2,,.2*3.6?

    62,29326*3*65**65

    *

    Smith Nguyen Studio.Smith Nguyen Studio.

    ttps://www.facebook.com/SmithNguyenStudio

  • 8/10/2019 13850488 Ccna Questions and Answers Smith.N Studio

    35/82

    1 . Which subnet mask would be assigned to the network address of 152.1 3. 2.6 to provide 2,* useable host addresses per subnetwork?2,,.2,,.6.62>> 2>> 2>> 92,,.2,,.2,*.62,,.2,,.2*3.6

    1 3. company is planning to subnet its network for a ma imum of 2 hosts. Which subnet mask would provide the needed hosts and leavehe fewest unused addresses in each subnet?

    2,,.2,,.2,,.62,,.2,,.2,,.1522>> 2>> 2>> 223

    2,,.2,,.2,,.2*62,,.2,,.2,,.2*3

    1 5. What type of network cable is used between a terminal and a console port?cross>over straight>throughrollover

    patch cable

    1 6. Which device is used to create or divide broadcast domains?hubswitch

    bridge

    routerrepeater

    1 1. -efer to the e hibit. What destination #% address will %C1 place in the header for a packet destined for %C2?152.1 3.1.1152.1 3.2.1152.1 3.2.2152.1 3. .1

    @2 8 1 >3

    ,

    Smith Nguyen Studio.Smith Nguyen Studio.

    ttps://www.facebook.com/SmithNguyenStudio

  • 8/10/2019 13850488 Ccna Questions and Answers Smith.N Studio

    36/82

  • 8/10/2019 13850488 Ccna Questions and Answers Smith.N Studio

    37/82

    1 . -efer to the e hibit. student is setting up a home network primarily used for e tensive file transfers4 streaming video4 and gaming.Which network device is best suited to these types of activities in the topology shown?

    wireless access pointrouter hubswitch

    1 . Which three statements are true about the role of routers in the network? (Choose three.)$hey propagate broadcasts.$hey enlarge collision domains.!hey segment broadcast domains!hey interconnect different network technologies'ach router interface re&uires a separate network or subnet$hey maintain a common frame format between ' and W ' interfaces.

    1 3. -efer to the e hibit. network administrator has decided to use packet capture software to evaluate all traffic from the student subnet onhe way to the #nternet. $o ensure that all packets are captured4 what network device should be used to connect the monitoring station to the

    network between -1 and -2?router hubswitchwireless access point

    Smith Nguyen Studio.Smith Nguyen Studio.

    ttps://www.facebook.com/SmithNguyenStudio

  • 8/10/2019 13850488 Ccna Questions and Answers Smith.N Studio

    38/82

    1 5. -efer to the e hibit. ssume that all devices are using default settings. ;ow many subnets are re uired to address the topology that isshown?

    *,

    136. -efer to the e hibit. Which three statements are true about the e hibited topology? (Choose three.);osts 9 and C are in the same subnet.)ive broadcast domains are present*ost - is using a crossover cable to connect to the router=our broadcast domains are present.)ive networks are shown;ost 9 is using a rollover cable to connect to the router.

    131. $o establish a console connection from a computer to a Cisco router4 which cable wiring option would be used?crossover cablestraight through cablerollover cableA. , cable

    3

    Smith Nguyen Studio.Smith Nguyen Studio.

    ttps://www.facebook.com/SmithNguyenStudio

  • 8/10/2019 13850488 Ccna Questions and Answers Smith.N Studio

    39/82

    132. -efer to the e hibit. Which three statements identify the type of cabling that would be used in the segments that are shown? (Choosehree.)

    "egment 1 uses backbone cabling.6egment uses a patch cable"egment uses patch cabling."egment uses vertical cabling.6egment 1 uses hori"ontal cabling6egment 3 uses vertical cabling

    13 . -efer to the e hibit. network technician has been allocated the 152.1 3.1.6&2* private #% address range for use in the network thatshown in the e hibit. Which subnet mask would be used to meet the host re uirements for segment of this internetwork?

    2,,.2,,.2,,.1232,,.2,,.2,,.1522>> 2>> 2>> 2232,,.2,,.2,,.2*62,,.2,,.2,,.2*3

    5

    Smith Nguyen Studio.Smith Nguyen Studio.

    ttps://www.facebook.com/SmithNguyenStudio

  • 8/10/2019 13850488 Ccna Questions and Answers Smith.N Studio

    40/82

    Chapter 13*. 0sers in the network are e periencing slow response time when doing file transfers to a remote server. What command could be issuedo determine if the router has e perienced any input or output errors?

    show running>configshow startup>configshow interfacesshow ip routeshow versionshow memory

    13,. -efer to the e hibit. technician applies the configuration in the e hibit to a clean router. $o verify the configuration4 the technicianssues the show running>config command in the C # session with the router. What lines should the technician e pect to see in the router output

    from the show running>config command? enable password class

    line console 6 password ccna

    enable secret ciscoenable password classline console 6

    password ccna enable secret , M1Mv6& MDyDWm

  • 8/10/2019 13850488 Ccna Questions and Answers Smith.N Studio

    41/82

    13 . -efer to the e hibit. network administrator on ;ost has problems accessing the =$% server. ayer three connectivity testing wassuccessful from ;ost to the "1 interface of -outer9. Which set of commands will allow the network administrator to telnet to -outer9 andun debug commands?

    -outer9(config)N enable secret class-outer9(config)N line vty 6 *-outer9(config>if)N login

    -outer9(config)N enable secret class-outer9(config)N line vty 6 2-outer9(config>vty)N password cisco-outer9(config>vty)N login

    ?outer-0config I enable secret class?outer-0config I line vty 9?outer-0config.line I password cisco?outer-0config.line I login

    -outer9(config)N enable secret class-outer9(config)N line au 6-outer9(config>line)N password cisco-outer9(config>line)N login

    -outer9(config)N enable secret class-outer9(config)N line au 6-outer9(config>vty)N password cisco-outer9(config>vty)N login

    13 . $he connection between routers 9 and C has been successfully tested. ;owever4 after rebooting router C4 the administrator noticed theesponse time between networks 16.16. .6 and 16.16.*.6 is slower. %ing between the two routers is successful. trace route indicates three

    hops from router 9 to router C. What else can be done to troubleshoot the problem?%ing router 9 "6&1 connection from router C.$race the connection between router 9 to router C "6&1.#ssue a show ip route command in router 9 to verify routing is enabled.+ssue a show ip interface brief command on router C

    133. #n a Cisco router4 when do changes made to the running>configuration take effect?after a system restartas the commands are enteredwhen logging off the systemwhen the configuration is saved to the startup>configuration

    *1

    Smith Nguyen Studio.Smith Nguyen Studio.

    ttps://www.facebook.com/SmithNguyenStudio

  • 8/10/2019 13850488 Ccna Questions and Answers Smith.N Studio

    42/82

    135. -efer to the e hibit. Which names correctly identify the C # mode represented by the prompt for "witch>+ast*N? (Choose two.)line configuration modeuser e ecutive modeglobal configuration modeprivileged e#ecutive modeinterface configuration modeenable mode

    156. -efer to the e hibit. What command will place the router into the correct mode to configure an appropriate interface to connect to a'?

    09 N configure terminal09 (config)N line vty 6 *09 (config)N line console 609 (config)N interface "erial 6&6&6$-A5A0config I interface )ast'thernet 9B

    151. #mmediately after a router completes its boot se uence4 the network administrator wants to check the routers configuration. =romprivileged +L+C mode4 which of the following commands can the administrator use for this purpose? (Choose two.)

    show flashshow 'A-show startup.configshow running.configshow version

    *2

    Smith Nguyen Studio.Smith Nguyen Studio.

    ttps://www.facebook.com/SmithNguyenStudio

  • 8/10/2019 13850488 Ccna Questions and Answers Smith.N Studio

    43/82

    152. -efer to the e hibit. student is responsible for the #% addressing4 configuration and connectivity testing of the network shown in thegraphic. ping from host 9 to host C results in a destination unreachable but a ping from host 9 to host was successful. What two reasonscould account for this failure based on the graphic and partial router output for the /allas router? (Choose two.)

    $he host is turned off.$he =a6&6 interface on /allas is shutdown.$he ' cable is disconnected from host 9.!he 69B9B +P address of Dallas is improperly configured$he =a6&6 interface on /allas is in a different subnet than host 9.!he clock rate is missing on the serial link between Dallas and N=C

    15 . #n a Cisco device4 where is the #!" file stored prior to system startup?--!)lash

    'A-

    *

    Smith Nguyen Studio.Smith Nguyen Studio.

    ttps://www.facebook.com/SmithNguyenStudio

  • 8/10/2019 13850488 Ccna Questions and Answers Smith.N Studio

    44/82

    15*. !n a Cisco router4 which interface would be used to make the initial configuration?

    Console

    15,. network administrator needs to keep the user #/4 password4 and session contents private when establishing remote C # connectivitywith a router to manage it. Which access method should be chosen?

    $elnetConsole

    0L66*

    15 . $he serial connection shown in the graphic needs to be configured. Which configuration commands must be made on the "ydney routero establish connectivity with the elbourne site? (Choose three.)

    6ydney0config.if I ip address 29 99 >1 2 2>> 2>> 2>> 96ydney0config.if I no shutdown"ydney(config>if)N ip address 261.166., .1 2,,.2,,.2,,.22*6ydney0config.if I clock rate > 999"ydney(config>if)N ip host elbourne 261.166., .2

    **

    Smith Nguyen Studio.Smith Nguyen Studio.

    ttps://www.facebook.com/SmithNguyenStudio

  • 8/10/2019 13850488 Ccna Questions and Answers Smith.N Studio

    45/82

    15 . Which three terms correctly define the forms of help available within the Cisco #!"? (Choose three.)hot keysconte t>check conte#t.sensitivestructured check command overridecommand synta# check

    153. -efer to the e hibit. $he output is shown for the show ip route command e ecuted on -outer . What does the #% address 152.1 3.2.2epresent?

    :ateway for the 152.1 3.1.6 network :ateway for the 152.1 3. .6 network #% assigned to the serial port on -outer +P assigned to the serial port on ?outer -

    155. Which combination of keys would be used at the C # prompt to interrupt a ping or traceroute process?Ctrl>CCtrl>%Ctrl>- Ctrl.6hift.Ctrl>O

    266. -efer to the e hibit. What additional command is re uired to allow remote access to this switch? ' >"W1(config>if)N no shutdown ' >"W1(config)N enable password password NA.6/ 0config I ip default.gateway address

    ' >"W1(config>if)N description description

    261. When network services fail4 which port is most often used to access a router for management purposes?0L

    *,

    Smith Nguyen Studio.Smith Nguyen Studio.

    ttps://www.facebook.com/SmithNguyenStudio

  • 8/10/2019 13850488 Ccna Questions and Answers Smith.N Studio

    46/82

    +thernetConsole$elnet"";

    262. What command is used to change the default router name to =ontana?-outerN name =ontana-outerN hostname =ontana-outer(config)N name =ontana?outer0config I hostname )ontana

    *

    Smith Nguyen Studio.Smith Nguyen Studio.

    ttps://www.facebook.com/SmithNguyenStudio

  • 8/10/2019 13850488 Ccna Questions and Answers Smith.N Studio

    47/82

    26 . -efer to the e hibit. $he output is shown for the show ip route command e ecuted on -outer . What does the #% address 152.1 3.2.2epresent?

    :ateway for the 152.1 3.1.6 network :ateway for the 152.1 3. .6 network #% assigned to the serial port on -outer +P assigned to the serial port on ?outer -

    CCNA 3 J-logspotK . )inal '#am Answers 026*. #dentify the factors that contribute to congestion on an +thernet '. (Choose three.)

    PPP improper placement of enterprise level servers

    PPP addition of hosts to a physical segmentreplacement of hubs with workgroup switchesPPP increasing use of bandwidth intensive network applicationswww.ccna>*.blogspot.comcreation of new collision domains without first adding network hostsmigration to full>duple +thernet within the '

    26,. Which of the following are e amples of $C%% application layer protocols? (Choose three.)PPP a terminal emulation protocol that supports remote console connections with various network devicesa protocol created by #9 that makes it easier for mainframes to connect to remote officesPPP a protocol responsible for transporting electronic mail on $C%% networks and the #nterneta protocol that controls the rate at which data is sent to another computer PPP a protocol that e changes network management information between a network device and a management console

    26 . Which of the following eliminates switching loops?hold>down timers

    poison reversePPP spanning tree protocoltime to livesplit hori7on protocol

    26 . $he show cdp neighbors command is a very useful network troubleshooting tool. 0sing the output in the graphic4 select the statementshat are true. (Choose two.)

    C/% operates at the network layer of the !"# model.PPP $he output of this command displays information about directly connected Cisco devices only.$he switch is attached to the "anline)N login-outer(config>line)N password ciscoPPP -outer(config)N line vty 6 *PPP -outer(config>line)N loginPPP -outer(config>line)N password cisco-outer(config)N line virtual terminal-outer(config>line)N enable login

    *

    Smith Nguyen Studio.Smith Nguyen Studio.

    ttps://www.facebook.com/SmithNguyenStudio

  • 8/10/2019 13850488 Ccna Questions and Answers Smith.N Studio

    48/82

    -outer(config>line)N password cisco-outer(config)N line vty 6 *-outer(config>line)N enable secret-outer(config>line)N password cisco-outer(config)N enable secret cisco-outer(config)N enable cisco

    265. Which of the following is associated with link>state routing protocols?low processor overhead

    poison reverserouting loopssplit hori7onPPP shortest>path first calculations

    216. router does not load its configuration after a power failure. fter running the show startup>configuration command4 the adminstratorfinds that the original configuration is intact. What is the cause of this problem?

    $he configuration register is set for 6 2166.$he configuration register is set for 6 2161.$he configuration register is set for 6 2162.PPP $he configuration register is set for 6 21*2.9oot system commands are not configured.=lash memory is empty causing the router to bypass the configuration in 'A-

    'ederst pQ formularen211. Which commands are used to verify the content and placement of access control lists? (Choose three.)

    PPP show ip interfaceshow ip routeshow processesPPP show running>configshow cdp neighbor PPP show access>lists

    212. Which of the following are re uired when creating a standard access control list? (Choose two.)destination address and wildcard mask

    PPP source address and wildcard mask subnet mask and wildcard mask access list number between 166 and 155 or 2666 and 2 55PPP access list number between 1 and 55 or 1 66 to 1555

    21 . Which of the following are keywords that can be used in an access control list to replace a dotted decimal wildcard mask? (Choose two.)

    mostPPP hostallPPP anysomesum

    21*. -efer to the diagram. ll ports on "witch are in the "ales A ' and all ports on "witch 9 are in the ccounting A '. ;ow manybroadcast domains and how many collision domains are shown? (Choose two).

    collision domainsPPP broadcast domains, broadcast domainsPPP 5 collision domains16 collision domains1 collision domains

    21,. -efer to the graphic. 0sing the most efficient #% addressing scheme and A " 4 which address can be configured on one of the serialnterfaces?

    152.1 3.1 . &2152.1 3.1 .1,3&2152.1 3.1 .152&2152.1 3.1 .11 & 6152.1 3.1 .1*,& 6PPP 152.1 3.1 .15 & 6

    21 . What is the purpose of the "panning $ree %rotocol ("$%)?

    *3

    Smith Nguyen Studio.Smith Nguyen Studio.

    ttps://www.facebook.com/SmithNguyenStudio

  • 8/10/2019 13850488 Ccna Questions and Answers Smith.N Studio

    49/82

    PPP prevents ayer 2 loops prevents routing loops on a router creates smaller collision domainscreates smaller broadcast domainsallows Cisco devices to e change routing table updates

    21 . What is the purpose of a loopback address when using the !"%= routing protocol?activates the !"%= neighboring processPPP ensures a persistent router #/ for the !"%= process

    provides a backdoor for connectivity during the convergence processstreamlines and speeds up the convergence process

    213. Which statement is true regarding states of the #+++ 362.1d "panning $ree %rotocol?%orts are manually configured to be in the forwarding state.PPP %orts listen and learn before going into the forwarding state.%orts must be blocked before they can be placed in the disabled state.#t takes 1, seconds for a port to go from blocking to forwarding

    215. Which se uence of commands is used to configure a loopback address on a router?-outer1(config)N interface loopback 1-outer1(config>if)N ip address 152.1 3.1.1-outer1(config)N interface serial 6&6-outer1(config>if)N loopback 1-outer1(config>if)N ip address 152.1 3.1.1-outer1(config)N interface serial 6&6-outer1(config>if)N loopback 1-outer1(config>if)N ip address 152.1 3.1.1 2,,.2,,.2,,.6PPP -outer1(config)N interface loopback 1PPP -outer1(config>if)N ip address 152.1 3.1.1 2,,.2,,.2,,.2,,

    226. Which routing protocols are classful and do not support A " ? (Choose two.)+#:-%!"%=PPP -#% v1-#% v2PPP #:-%

    221. -efer to the graphic. $wo switches are connected together through a trunk port. "W2 displays the message shown. Which of thefollowing will solve the duple mismatch?

    "W1(config)N interface fastethernet 6&1

    "W1(config>if)N duple full"W1(config)N interface fastethernet 6&1"W1(config>if)N full>duplePPP "W2(config)N interface fastethernet 6&1PPP "W2(config>if)N duple full"W2(config)N interface fastethernet 6&1"W2(config>if)N full>duple

    222. -efer to the graphic. $wo routers have been configured to use +#:-%. %ackets are not being forwarded between the two routers. Whatcould be the problem?

    +#:-% does not support A " .$he routers were not configured to monitor neighbor adEacency changes.$he default bandwidth was used on the routers.PPP n incorrect #% address was configured on a router interface.

    ccording to the the provided router output4 which of the following statements is true regarding %%% operation?!nly the link>establishment phase completed successfully.!nly the network>layer phase completed successfully.

    'either the link>establishment phase nor the the network>layer phase completed successfully.PPP 9oth the link>establishment and network>layer phase completed successfully

    22 . =rame -elay is configured over a point>to>point connection between two routers. $he output of the show frame>relay pvc commandndicates that the status of this %AC is inactive. Which of the following devices could be the source of the problem? (Choose two.)

    local router local =rame -elay switchPPP remote router

    *5

    Smith Nguyen Studio.Smith Nguyen Studio.

    ttps://www.facebook.com/SmithNguyenStudio

  • 8/10/2019 13850488 Ccna Questions and Answers Smith.N Studio

    50/82

    PPP remote =rame -elay switch- has the following configuration@- N show running>config>>some output te t omitted>>interface serial6&6

    bandwidth 123ip address 152.1 3.11.2 2,,.2,,.2,,.6encapsulation frame>relayframe>relay map ip 152.1 3.11.2 6 broadcast

    22*. fter the command - N debug frame>relay packet is e ecuted4 a ping is issued from - to -1 but is unsuccessful. 9ased on the output of

    he debug command shown in the graphic and the router configuration4 what might be problem?PPP 'o clock rate assigned.$here is an incorrect / C# number in the map statement.

    n incorrect #% address e ists in the map statement.$he encapsulation command is missing the broadcast keyword

    22,. Which statements are true regarding the =rame -elay #? (Choose three.)PPP $he # provides a virtual circuit (AC) status mechanism.$he # type must always be manually configured.$he available # types are '#14 / "166 and ,+"".$he # types supported by Cisco routers are C#"C! and #+$=.PPP $he # type configured on the router must match the one used on the =rame -elay switch.PPP $he # uses reserved / C#s to e change messages between the /$+ and /C+

    22 . Which statement describes the process that occurs in 'etwork ddress $ranslation (' $) overloading?PPP ultiple private #% addresses are mapped to one public #% address.$he number of usable addresses assigned to a company is divided into smaller manageable groups.

    pool of #% addresses are mapped to one or more C addresses.$he router acts as a /;C% server and assigns multiple public #% addresses for each private #% address configured

    22 . Which two statements are true about the committed information rate on a =rame -elay link? (Choose two.)$he sum of the C#-s for all %ACs must be less than the port speed.$he sum of the C#-s for all %ACs must e ual the port speed.PPP $he sum of the C#-s for all %ACs can be greater than the port speed.PPP $he /+ bit will be set on frames that are transmitted in e cess of the C#-.=rames that are transmitted at greater than the C#- will be discarded at the source.#t is impossible to transmit frames at a rate in e cess of the C#-

    223. Which of the following commands would be used to troubleshoot the processing of call control functions such as call setup4 signaling4

    and termination?show interface bri6&6show isdn activedebug isdn 521PPP debug isdn 5 1debug ppp negotiationdebug ppp authentication

    225. Which of the following statements are true regarding %%%? (Choose three.)PPP %%% can use synchronous and asynchronous physical media.%%% can only be used between two Cisco devices.%%% carries packets from several network layer protocols in C%s.PPP %%% uses C%s to establish4 configure4 and test the data link connection.

    PPP %%% uses C%s to agree on format options such as authentication4 compression4 and error detection2 6. network administrator is evaluating authentication protocols for a %%% link. Which of the following reasons might lead to the selectionof C; % over % % as the authentication protocol? (Choose three.)

    establishes identities with a two>way handshakePPP uses a three>way authentication periodically during the session to reconfirm identitiescontrol by the remote host of the fre uency and timing of login eventsPPP transmits login information in encrypted formatPPP uses an unpredictable variable challenge value to prevent playback attacksmakes authori7ed network administrator intervention a re uirement to establish each session

    2 1. Why are static routes often used with #"/' //-?$hey are more stable than dynamic routing protocols.

    ,6

    Smith Nguyen Studio.Smith Nguyen Studio.

    ttps://www.facebook.com/SmithNguyenStudio

  • 8/10/2019 13850488 Ccna Questions and Answers Smith.N Studio

    51/82

  • 8/10/2019 13850488 Ccna Questions and Answers Smith.N Studio

    52/82

    2 5. $he output of the show ip interfaces brief command indicates that "erial6 is up but the line protocol is down. Which of the following arepossible causes for the line protocol being in the down state? (Choose two.)

    $he clock rate is not set on the /$+.n incorrect default gateway is set on the router. network is missing from the routing protocol configuration.

    PPP $he encapsulation on the "erial6 interface is incorrect.PPP Geepalives are not being sent by the remote device

    2*6. Which of the following is a characteristics of $C%? (Choose two.)PPP data transport reliability

    best path determination

    PPP establishing4 maintaining4 and terminating virtual circuitsencapsulation of packets in a data frame with source and destination C addresses best>effort datagram delivery

    2*1. Which statement is true regarding the command ip route 152.1 3. .2* 2,,.2,,.2,,.2*3 152.1 3. .5? (Choose two.)PPP packet destined for host 152.1 3. . 6 will be forwarded to address 152.1 3. .5.152.1 3. .5 is the destination network for this route.152.1 3. .2* is the ne t>hop router in this command.$his command is issued from the interface configuration mode.PPP $his command is used to define a static route

    2*2. Which of the following application layer protocols use $C%? (Choose three.)PPP " $%PPP =$%"' %PPP ;$$%$=$%/;C%

    2* . Which terms refer to =rame -elay congestion management mechanisms? (Choose three.)PPP 9+C'/ C#PPP /+PPP =+C'

    ##nverse -%

    2**. Which of the following router commands will verify that a path e ists to a destination network?-outerN show ip interfaces brief

    PPP -outerN show ip route-outerN show cdp neighbors-outerN show running>config-outerN show protocols

    2*,. When +#:-% is configured on a router4 which table of /0 information is used to calculate the best route to each destination router?router tablePPP topology table/0 tableC table

    -% table2* . -efer to the graphic. -outers and 9 have +#:-% configured and automatic summari7ation has been disabled on both routers. Which ofhe following commands is used on router to summari7e the attached routes4 and to which interface is this command applied? (Choose two)

    PPP ip summary>address eigrp 1 152.1 3.16. * 2,,.2,,.2,,.152ip area>range eigrp 1 152.1 3.16.36 2,,.2,,.2,,.22*summary>address 152.1 3.16.36 6.6.6. 1ip summary>address eigrp 1 152.1 3.16. * 6.6.6.PPP serial interface on router serial interface on router 9

    2* . router with two ' interfaces4 two W ' interfaces4 and two loopback interfaces configured is operating with !"%= as its routingprotocol. What is used by the !"%= process to assign the router #/?

    the #% address of the interface configured with priority 6the !"%= area #/ configured on the interface with the highest #% addressPPP the loopback with the highest #% address configured

    ,2

    Smith Nguyen Studio.Smith Nguyen Studio.

    ttps://www.facebook.com/SmithNguyenStudio

  • 8/10/2019 13850488 Ccna Questions and Answers Smith.N Studio

    53/82

    the highest #% address on the ' interfacesthe highest #% address configured on the W ' interfaces

    2*3. :iven the #% address and subnet mask of 1 2.1 .1 *., 2,,.2,,.2,,.22*4 on which subnetwork does this address reside?1 2.6.6.61 2.1 .1 *.6PPP 1 2.1 .1 *. 21 2.1 .1 *.*31 2.1 .1 *.*1 2.1 .1 *.

    2*5. Which commands show when the last #:-% routing update was received? (Choose two.)

    PPP -outerN show ip protocols-outerN show version-outerN show interfaces-outerN show ip updatesPPP -outerN show ip route

    2,6. When using access control lists to filter traffic4 which of the following is used to track multiple sessions occurring between hosts?#% addressessubnet masksPPP port numbersrouted protocolsrouting protocolsinterfaces

    2,1. :iven the #% address and subnet mask of 1 2.1 .1 *. * 2,,.2,,.2,,.22*4 which of the following would describe this address?$his is a useable host address.$his is a broadcast address.PPP $his is a network address.$his is not a valid address

    2,2. $he company network shown in the drawing has to be subnetted. $he company has leased the Class C #% address of 266.1.2.6. Which ofhe following network addresses and masks would be appropriate for one of the subnetworks?

    266.1.2.5 2,,.2,,.2,,.152PPP 266.1.2.1 6 2,,.2,,.2,,.22*266.1.2.36 2,,.2,,.2,,.22*266.1.2. 2 2,,.2,,.2,,.2*6

    2, . When connectionless protocols are implemented at the lower layers of the !"# model4 what is usually used to acknowledge that was

    eceived and to re uest the retransmission of missing data?#%0/%+thernet

    connectionless acknowledgementPPPP n upper>layer4 connection>oriented protocol or service

    2,*. -efer to the e hibit. +ach media link is labeled. What type of cable should be used to connect the different devices?Connection 1 S rollover cableConnection 2 S straight>through cableConnection S crossover cableConnection 1 S crossover cableConnection 2 S rollover cable

    Connection S crossover cableConnection 1 S straight>through cableConnection 2 S crossover cableConnection S crossover cablePPPPConnection 1 S straight>through cableConnection 2 S crossover cableConnection S straight>through cableConnection 1 S crossover cableConnection 2 S straight>through cableConnection S crossover cable

    2,,. Which !"# layer does #% rely on to determine whether packets have been lost and to re uest retransmission?

    ,

    Smith Nguyen Studio.Smith Nguyen Studio.

    ttps://www.facebook.com/SmithNguyenStudio

  • 8/10/2019 13850488 Ccna Questions and Answers Smith.N Studio

    54/82

    pplication%resentation"essionPPPP$ransport

    2, . What is true regarding network layer addressing? (Choose three.)0ses a flat structure%revent broadcastsPPPP;ierarchicalPPPP0ni uely identifies each host*3 bits in length

    PPPPContains a network portion2, . %C can not connect to any remote websites4 ping its default gateway4 or ping a printer that is functioning properly on the locationsegment. Which action will verify that the $C%% stack is functioning correctly on this %C?

    0se the ipconfig Ball command at the hostBs command prompt.PPPP0se the ping 2 9 9 command at the command prompt.0se the traceroute command at the command prompt to identify any failures on the path to the gateway.0se =$% to check for connectivity to remote sites./ownload a troubleshooting tool from the %C manufacturerBs website.

    2,3. Which type of meia is immune to + # and -=#? (Choose two.)16 9ase>$16 9ase>216 9ase>,

    PPPP166 9ase>=L166 9ase $LPPPP1666 9ase L

    ,*

    Smith Nguyen Studio.Smith Nguyen Studio.

    ttps://www.facebook.com/SmithNguyenStudio

  • 8/10/2019 13850488 Ccna Questions and Answers Smith.N Studio

    55/82

    2,5. -efer to the e hibit. $he command that is shown was issued on a %C. What does the #% address 152.1 3. .2 represent?#% address of the host/efault gateway of the host#% address of the homepage for the hostPPPP%rimary domain name server for the host#% address of the website resolver1.mooki.local

    2 6. -efer to the e hibit. $he diagram represents the process of sending email between clients. "elect the one that correctly identifies thecomponent or protocol used at each numbered stage of the diagram.

    1. 0 2. / . $ *." $% ,. $ .%!% . / 3. 01. 0 2.%!% . / *." $% ,. $ . / ." $% 3. 0

    1. 0 2.%!% ." $% *. / ,. $ ." $% .%!% 3. 01. / 2." $% . $ *." $% ,. $ . 0 .%!% 3. /PPPP1. 0 2." $% . $ *." $% ,. $ . / .%!% 3. 0

    2 1. Which three statements characteri7e the transport layer protocols? (Choose three.)PPPP$C% and 0/% port numbers are used by application layer protocols.$C% uses port numbers to provide reliable transportation of #% packets.0/% uses windowing and acknowledgments for reliable transfer of data.PPPP$C% uses windowing and se uencing to provide reliable transfer of data.PPPP$C% is a connection>oriented protocol4 0/% is a connectionless protocol.

    2 2. Which !"# layers offers reliable4 connection>oriented data communication services?application

    presentationsessionPPPPtransportnetwork

    2 . + amine the graphic with current configurations. ;ost in the Clerical office failed and was replaced. lthough a ping to 12 .6.6.1 wassuccessful4 the replacement computer cannot access the company network. With pro y -% disabled on the =a6&6 interface of the 'ew Forkouter4 what is the likely cause of the problem?

    'etwork card failure 'etwork cables unplugged#% address incorrectly enteredPPPP"ubnet mask incorrectly entered

    2 *. -efer to the e hibit. network technician is trying to determine the correct #% address configuration for ;ost . What is a validconfiguration for ;ost ?

    #% address@ 152.1 3.166.15T "ubnet ask@ 2,,.2,,.2,,.2*3T /efault :ateway@ 152.1 .1.2PPPP#% address@ 152.1 3.166.26T "ubnet ask@ 2,,.2,,.2,,.2*6T /efault :ateway@ 152.1 3.166.1#% address@ 152.1 3.166.21T "ubnet ask@ 2,,.2,,.2,,.2*3T /efault :ateway@ 152.1 3.166.13#% address@ 152.1 3.166.22T "ubnet ask@ 2,,.2,,.2,,.2*6T /efault :ateway@ 16.1.1.,#% address@ 152.1 3.166. 6T "ubnet ask@ 2,,.2,,.2,,.2*6T /efault :ateway@ 152.1 3.1.1#% address@ 152.1 3.166. 1T "ubnet ask@ 2,,.2,,.2,,.2*6T /efault :ateway@ 152.1 3.166.13

    2 ,. s network administrator4 what is the subnet mask that allows ,16 hosts given the #% address 1 2. 6.6.6?2,,.2,,.6.62,,.2,,.2*3.62,,.2,,.2,2.6PPPP2,,.2,,.2,*.62,,.2,,.2,,.6

    2,,.2,,.2,,.1232 . What are three characteristics of C" &C/? (Choose three.)/evices can be configure with a higher transmission priority.

    Eam signal indicates that the collision has cleared and the media is not busy.PPPP device listens and waits until the media is not busy before transmitting.$he device with the electronic token is the only one that can transmit after a collision.PPPP ll of the devices on a segment see data that passes on the network medium.PPPP fter detecting a collision4 hosts can attempt to resume transmission after a random time delay has e pired.

    2 . Which of the following are the address ranges of the private #% addresses? (Choose three.)PPPP16.6.6.6 to 16.2,,.2,,.2,,266.166.,6.6 to 266.166.2,.2,,

    ,,

    Smith Nguyen Studio.Smith Nguyen Studio.

    ttps://www.facebook.com/SmithNguyenStudio

  • 8/10/2019 13850488 Ccna Questions and Answers Smith.N Studio

    56/82

    1,6.1,6.6.6 to 1,6.1,6.2,,.2,,PPPP1 2.1 .6.6 to 1 2. 1.2,,.2,,PPPP152.1 3.6.6 to 152.1 3.2,,.2,,12 .1 .6.6 to 12 . 1.2,,.2,,

    ,

    Smith Nguyen Studio.Smith Nguyen Studio.

    ttps://www.facebook.com/SmithNguyenStudio

  • 8/10/2019 13850488 Ccna Questions and Answers Smith.N Studio

    57/82

  • 8/10/2019 13850488 Ccna Questions and Answers Smith.N Studio

    58/82

    2 . -efer to the e hibit. ;ost attempts to establish a $C%% session with host C. during this attempt4 a frame was captured with the sourceC address 66,6. 26./ 2 and the destination C address 66 6.3,1 .**C*. $he packet inside the captured frame has an #% source

    address 152.1 3. .,4 and the destination #% address is 152.1 3.215.2*. t which point in the network was this packet captured?eaving host eaving $

    PPPP eaving /allaseaving 'FC

    2 . -efer to the e hibit. Cable 1 and cable 2 have the ends wired for specific physical layer re uirements. $he table lists each segmentnumber and the cable which has been installed by the network technician between the network components on that segment. -eferring to thedata given4 which segments have the correct cable installed? (Choose three.)

    PPPP"egment1"egment2PPPP"egmentPPPP"egment*"egment,

    2 3. -efer to the e hibit. What three statements are true about the #% configuration that is shown? (Choose three.)PPPP$he address that is assigned to the computer represents private addressing.PPPP$he computer is unable to communicate outside of the local network.$he network of this computer can have 12 hosts.PPPP$he prefi of the computer address is &2 .$he #% address that is assigned to the computer is routable on the #nternet.$he #% address that is assigned to the computer is a broadcast address.

    2 5. Which three #%v* addresses represent a broadcast for a subnet? (Choose three.)PPPP1 2.1 .*. &21 2.1 .*.125 &2PPPP1 2.1 .*.151 &21 2.1 .*.,1 &2PPPP1 2.1 .*.5, &21 2.1 .*.221 &2

    236. -efer to the e hibit. !n the basis of the #% configuration that is shown4 what is the reason that ;ost and ;ost 9 are unable tocommunicate outside the local network?

    ;ost was assigned a network address.;ost 9 was assigned a multicast address.;ost and ;ost 9 belong to different networks.

    PPPP$he gateway address was assigned a broadcast address.231. $he ayer * header contains which type of information to aid in the delivery of data?N1@ "ervice port number 232. /uring the encapsulation process4 which identifiers are added at the transport layer?N2@ $wo applications communicating the data23 . -efer to the e hibit. What is the correct destination socket number for a web page re uest from ;ost to the web server?N2@ 153.1 .215.2,@3623*. -efer to the e hibit. Which logical topology best describes the e hibited network?N*@ ultiaccess23,. -efer to the e hibit. ;ost is transmitting data to host 9. What addresses will host use to for the destination #% and C addressesfor this communication?N,@ /estination C@ ++++@++++@++++ /estination #%@ 1 2.22.6. ,23 . -efer to the e hibit. router4 whose table is shown4 receives a packet that is destined for 152.1 3.1.*. ;ow will router treat the packet?

    N @ $he packet will be forwarded to the destination host.23 . -efer to the e hibit. Which set of devices contains only intermediary devices?N1@ 4 94 /4 :233. -efer to the e hibit. technician is working on a network problem that re uires verification of the router ' interface. Which addressshould be pinged from the host to confirm that the router interface is operational?N @ 152.1 3.2*,.1235. Which prompt represents the appropriate mode used for the copy running.config startup.config command?N2@ "witch>

  • 8/10/2019 13850488 Ccna Questions and Answers Smith.N Studio

    59/82

    N2@ 6 to 162252. -efer to the e hibit. Which two statements describe the information that is represented in the header? (Choose two.)N @ $he destination port indicates a $elnet session.N*@ $he return segment will contain a source port of 2 .25 . #n a Cisco #!" device4 where is the startup>configuration file stored?N2@ 'A-25*. -efer to the e hibit. What two facts can be determined about the e hibited topology? (Choose two.)N1@ single broadcast domain is presentN,@ =ive collision domains e ist.25,. -efer to the e hibit. ssume all devices are using default configurations. ;ow many subnets are re uired to address the topologyshown?

    N2@ 25 . -efer to the e hibit. What is re uired on host for a network technician to create the initial configuration on -outer 1?N @ terminal emulation program25 . -efer to the e hibit. $he tracert command is initiated from %C1 to %C*. Which device will send a response to the initial tracert from%C1?N @ ondon253. -efer to the e hibit. When computer sends a frame to computer /4 what computers receive the frame?N2@ !nly computer and computer /255. -efer to the e hibit. What function does router -$J need to provide to allow #nternet access for hosts in this network?N1@ ddress translation

    66. -efer to the e hibit. $he network containing router 9 is e periencing problems. network associate has isolated the issue in the networko router 9. What action can be preformed to correct the network issue?

    N*@ #ssue theno shutdown command on interface =ast+thernet 6&1

    61. -efer to the e hibit. student has wired each end of a C $ ,e cable as shown. What is the result? (Choose two.)N @ $he cable is suitable for use as a =ast +thernet crossover.N,@ $he cable is suitable for use between two 166 bps uto> /#L capable switches.

    62. host is transmitting a video over the network. ;ow does the transport layer allow this host to use multiple applications to transmit dataat the same time as the video transmission?N*@ #t uses multiple port numbers.

    6 . -efer to the e hibit. +ach media link is labeled. What type of cable should be used to connect the different devices?N2. Connection 1 S straight>through cable Connection 2 S crossover cable Connection S rollover cable

    6*. Which !"# layer uses a connection>oriented protocol to ensure r


Recommended