+ All Categories
Home > Documents > Practise

Practise

Date post: 24-Oct-2014
Category:
Upload: omar-bin-abdallah
View: 375 times
Download: 3 times
Share this document with a friend
Popular Tags:
21
Close Window Assessment System 1. Assessment Selection 2. Assessment Settings 3. Take Assessment Take Assessment - ENetwork Practice Final Exam - CCNA Exploration: Network Fundamentals (Version 4.0) Time Remaining: 1 Top of Form Refer to the exhibit. For connecting two routers with an Ethernet crossover cable, which inter should be used? A B C
Transcript

Close Window  

Assessment System

  1. Assessment Selection     2. Assessment Settings     3. Take Assessment  

Take Assessment - ENetwork Practice Final Exam - CCNA Exploration: Network Fundamentals (Version 4.0) 

Time Remaining: 

  1 Top of Form

Refer to the exhibit. For connecting two routers with an Ethernet crossover cable, which interface should be used?

A

B

C

D

2 Top of FormWhich combination of network id and subnet mask correctly identifies all IP addresses from 172.16.128.0 through 172.16.159.255?

172.16.128.0 255.255.255.224

172.16.128.0 255.255.0.0

172.16.128.0 255.255.192.0

172.16.128.0 255.255.224.0

172.16.128.0 255.255.255.192

3 Top of FormWhich two functions of the OSI model occur at layer two? (Choose two.)

physical addressing

encoding

routing

cabling

media access control

4 Top of Form

Refer to the exhibit. A network administrator is troubleshooting a link that is down between Router1 and Router2. To correct the problem, which wire pairs need to be switched on one of the Ethernet cable ends?

pair 1 and pair 2

pair 1 and pair 3

pair 2 and pair 3

pair 2 and pair 4

5 Top of Form

Refer to the exhibit. The network containing router B is experiencing problems. A network associate has isolated the issue in this network to router B. What action can be preformed to correct the network issue?

issue the clock rate command on interface Serial 0/0/0

issue the description command on interface Serial 0/0/1

issue the ip address command on interface FastEthernet 0/0

issue the no shutdown command on interface FastEthernet 0/1

6 Top of FormAs network administrator, what is the subnet mask that allows 510 hosts given the IP address 172.30.0.0?

255.255.0.0

255.255.248.0

255.255.252.0

255.255.254.0

255.255.255.0

255.255.255.128

7 Top of FormWhich communication tool allows real-time collaboration?

wiki

e-mail

weblog

instant messaging

8 Top of Form

Refer to the exhibit. All devices in the network use default configurations. How many logical address ranges are required in this topology?

2

3

4

5

6

9 Top of FormA user types the enable command. What task can be performed at the privileged EXEC mode?

Configure the device.

Configure individual interfaces.

Configure individual terminal lines.

Issue show and debug commands.

10 Top of Form

Refer to the exhibit. PC1 is unable to access PC2. To troubleshoot this problem, the technician needs to confirm that the next hop interface is operational. Which default gateway address should the technician ping from PC1 to confirm this?

10.0.0.254

192.168.0.249

192.168.0.250

10.0.1.254

11 Top of Form

Refer to the exhibit. A web browser running on host PC1 sends a request for a web page to the web server with an IP address 192.168.1.254/24. What sequence of steps will follow in order to establish the session before data can be exchanged?

The session will be initiated using UDP. No additional acknowledgment will be required to establish the session.

The session will be initiated using TCP. No additional acknowledgment will be required to establish the session.

The session will be initiated using UDP. The returned web page will serve as an acknowledgment for session establishment.

The session will be initiated using TCP. A three-way handshake must be successfully completed before the session is established.

12 Top of FormWhich three addresses belong to the category of private IP addresses? (Choose three.)

10.0.0.1

127.0.0.1

150.0.0.1

172.16.0.1

192.168.0.1

200.100.50.1

13 Top of FormWhat is the protocol data unit that is associated with the data link layer of the OSI reference model?

data

frame

packet

segment

14 Top of Form

Refer to the exhibit. Host A wants to access the Internet. Which combination of a Layer 2 address and a Layer 3 address will enable this access from host A?

Destination MAC: 0030.8596.DE83 Default gateway: 209.165.202.130

Destination MAC: 0030.8596.DE82 Default gateway: 172.16.9.2

Destination MAC: 0030.8517.44C4 Default gateway: 172.16.1.1

Destination MAC: 0030.8517.44C4 Default gateway: 209.165.202.130

15 Top of FormWhat is a benefit of using private addressing for the internal LAN?

Implementation is easier.

Manageability is improved.

Troubleshooting is easier.

Public address space is conserved.

16 Top of Form

Refer to the exhibit. Which set of devices contains only intermediary devices?

A, B, D, G

A, B, E, F

C, D, G, I

G, H, I, J

17 Top of FormThe Layer 4 header contains which type of information to aid in the delivery of data?

service port number

host logical address

device physical address

virtual connection identifier

18 Top of FormWhat is the effect of the command copy running-config tftp?

copies the configuration from a remote machine into RAM

copies the configuration from a remote machine into NVRAM

copies the configuration currently in RAM to a remote machine

copies the configuration currently in NVRAM to a remote machine

19 Top of Form

Refer to the exhibit. Host A attempts to establish a TCP/IP session with host C. During this attempt, a frame was captured at the FastEthernet interface fa0/1 of router Y. The packet inside the captured frame has the IP source address 172.16.1.5, and the destination IP address is 172.16.7.24. What is the source MAC address of the frame at the time of capture?

0040.8596.DE82

0060.7320.B826

0060.7320.D632

0010.4F74.AC09

0040.8596.DE81

20 Top of FormWhich memory contents will change as a result of using the Router# erase startup-config command on a router?

RAM

ROM

flash

NVRAM

21 Top of Form

Refer to the exhibit. In a network, host A is sending data segments to host B. The flow control of the segments that are being exchanged is displayed. Which two statements are true about this communication? (Choose two.)

The initial window size is determined via the two-way handshake.

The window size for the TCP session that is represented is initially set to 3000 bytes.

Acknowledgment number 3001 indicates that host A will send the next segment with sequence number 3001.

Host B expects that the next received segment number will be 3000.

No more acknowledgments will be exchanged.

22 Top of Form

Refer to the exhibit. A technician uses the nslookup command on the PC and views the output that is displayed in the exhibit. What is the IP address of the primary domain name server used by the host?

10.10.10.32

192.168.1.5

192.168.1.99

192.168.2.100

23 Top of Form

Refer to the exhibit. Interface Fa0/0 on router A is generating excessive broadcast traffic. Which LAN segments will affected by the excessive broadcasts?

Only the 192.168.1.200/30 network will be affected.

Only the link between 192.168.1.201 and port Fa0/5 on SW1 will be affected.

Both the 192.168.1.200/30 and 192.168.1.204/30 networks will be affected.

Only the links between 192.168.1.201 and port Fa0/7 on SW2 will be affected.

24 Top of Form

Refer to the exhibit. On the basis of the IP configuration that is shown, what is the reason that Host A and Host B are unable to communicate outside the local network?

Host A was assigned a network address.

Host B was assigned a multicast address.

Host A and Host B belong to different networks.

The gateway address was assigned a broadcast address.

25 Top of Form

Refer to the exhibit. Which logical topology describes the exhibited network?

star

ring

point-to-point

multi-access

26 Top of FormWhat information is contained in the header of Layer 3 to help data delivery?

port number

device physical address

destination host logical address

virtual connection identifier

27 Top of Form

Refer to the exhibit. What three statements are true about the IP configuration that is shown? (Choose three.)

The prefix of the subnet mask is /26.

The network on which this computer resides can have 30 hosts.

The computer is unable to communicate outside of the local network.

The address that is assigned to the computer represents private addressing.

The IP address that is assigned to the computer is routable on the Internet.

The IP address that is assigned as the default gateway is valid for this host.

28 Top of Form

Refer to the exhibit. Each media link is labeled. What type of cable should be used to connect the different devices?

Connection 1 - rollover cable Connection 2 - straight-through cable Connection 3 - crossover cable

Connection 1 - straight-through cable Connection 2 - crossover cable Connection 3 - rollover cable

Connection 1 - crossover cable Connection 2 - rollover cable Connection 3 - straight-through cable

Connection 1 - crossover cable Connection 2 - straight-through cable Connection 3 - rollover cable

Connection 1 - straight-through cable Connection 2 - straight-through cable Connection 3 - straight-through cable

29 Top of FormWhat information can be gathered by using the command netstat?

the default gateway

the routing protocol

active TCP connections

the locally configured subnet mask

30 Top of Form

Refer to the exhibit. A user wants to access the Internet from the PC. A part of the running configuration of the router is shown. Which default gateway IP address should be configured at the PC to enable this access?

10.1.192.1

10.1.192.2

10.1.192.54

192.31.7.1

31 Top of FormTo enhance security in a network, the network administrator uses these commands: 

Router(config)# line console 0 Router(config-line)# password j1mdi2Router(config-line)# login 

What two conclusions are evident from these commands? (Choose two.)

Users who attempt to connect to the console port of the router must enter a password.

The entries permit access through the console by the use of j1mdi2 as the password.

The entries eliminate the need for authentication.

Access through the console will be denied because the console configuration is incomplete.

The entries prevent passwords from being displayed as plain text.

32 Top of Form

Refer to the exhibit. The PC, the routing table of which is displayed, is configured correctly. To which network device or interface does the IP address 192.168.1.254 belong?

PC

switch

router interface fa0/0

router interface fa0/1

33 Top of FormA technician makes several changes to the running configuration on a router, but the desired results are not achieved. The technician issues the reload command. What action will be taken by the router?

All changes will be lost and the router will restart immediately.

Changes will be saved automatically and the router will restart.

The user will be prompted to save changes before the router restarts.

The router will detect changes to the running configuration and will reload using the configuration stored in RAM.

34 Top of FormA network administrator wants to restrict access to the router privileged EXEC mode. Which password should the administrator use?

enable

aux

console

VTY

35 Top of Form

Refer to the exhibit. A technician has been asked to test connectivity from PC1 to a remote network. Which action will indicate if there is remote connectivity?

36 Top of FormWhich fiber connector supports full-duplex Ethernet?

37 Top of Form

Refer to the exhibit. Host A uses router A as its default gateway. If host A sends an ICMP echo request to 172.16.10.0, what ICMP response will host A receive.

echo reply

source quench

route redirection

destination unreachable

38 Top of FormWhat purpose does a hostname serve on a router?

uniquely identifies a router on the internet

used by routing protocols to identify peer routers

provides device identification to users logging on remotely

determines the hosts that are allowed to connect to the device

39 Top of FormWhich two types of media can provide bandwidth up to 1 Gb/s? (Choose two.)

10 BASE-T

100 BASE-T

100 BASE-FX

1000 BASE-TX

1000 BASE-SX

40 Top of Form

Examine the graphic with current configurations. Host A in the Clerical office failed and was replaced. Although a ping to 127.0.0.1 was successful, the replacement computer cannot access the company network. With proxy ARP disabled on the Fa0/0 interface of the New York router, what is the likely cause of the problem?

network card failure

network cables unplugged

IP address incorrectly entered

subnet mask incorrectly entered

41 Top of Form

Refer to the exhibit. What is the correct destination socket number for a web page request from Host A to the web server?

00-08-a3-b6-ce-46

198.133.219.25:80

http://www.cisco.com

C 198.133.219.0/24 is directly connected, FastEthernet0/0

42 Top of FormWhile configuring a router, a network technician wants to name the router. Which prompt should the technician see when entering thehostname command?

Router>

Router#

Router(config)#

Router(config-line)#

43 Top of FormWhich device should be used for routing a packet to a remote network?

access switch

DHCP server

hub

router

44 Top of Form

Refer to the exhibit. Host X is unable to communicate with host Y. Which command can be run at host X to determine which intermediary device is responsible for this failure?

telnet 192.168.1.1

ping 192.168.1.1

ftp 192.168.1.1

tracert 192.168.1.1

45 Top of FormWhat are two primary responsibilities of the Ethernet MAC sublayer? (Choose two.)

frame delimiting

data encapsulation

logical addressing

error detection

accessing the media

46 Top of FormWhich OSI layer uses a connection-oriented protocol to ensure reliable delivery of data?

application layer

presentation layer

session layer

transport layer

47 Top of FormWhen connectionless protocols are implemented at the lower layers of the OSI model, what is usually used to acknowledge that the data was received and to request the retransmission of missing data?

IP

UDP

Ethernet

a connectionless acknowledgement

an upper-layer, connection-oriented protocol or service

48 Top of FormWhich TCP/IP model layer creates additional overhead on network resources due to acknowledgments, tracking, and retransmission of data?

internet

transport

application

network access

49 Top of FormWhat can the user do from the command prompt, Router(config-line)# ?

Configure one of the network interfaces.

Configure one of the physical or virtual lines.

Verify the running configuration on the device.

Configure the parameters for one of the routing protocols.

50 Top of FormWhich password would allow a user to establish a Telnet session with a Cisco device?

VTY password

enable password

console password

enable secret password


Recommended