thi ccna1
Bai 1
Cisco CCNA1 Final Exam version 4.0
1.
Host A attempts
to establish a TCP/IP session with host C...
Refer to the exhibit. Host A attempts to establish a TSP/IP session with host C.
During this attempt, a frame was captured at the FastEthernet interface fa0/1 of
router Y. The packet inside the captured frame has the IP source address 172.16.1.5
and the destination IP address is 172.16.7.24 . What is the source MAC address of
the frame at the time of capture?
0040.8596.DE82
**0060.7320.B826
0060.7320.D632
0010.4F74.AC09
0040.8596.DE81
ccna-4.blogspot.com
2.
Refer to the exhibit. An employee wants to access the organization intranet from
home. Which intermediary device should be used to connect the organization
intranet to the Internet to enable this access?
hub
switch
**router
wireless access point
3.
The host was
disconnected from switch 2 and connected to switch 1. Which combination of IP address,
subnet mask, and default gateway should be assigned to this host to allow it to function in
the network?
Refer to the exhibit. The host was disconnected from switch 2 and connected to
switch 1. Which combination of IP address, subnet mask, and default gateway
should be assigned to this host to allow it to function in the network?
IP address: 10.10.9.37 Subnet mask: 255.255.255.240 Default gateway: 10.10.9.35
**IP address: 10.10.9.37 Subnet mask: 255.255.255.224 Default gateway: 10.10.9.35
IP address: 10.10.9.29 Subnet mask: 255.255.255.248 Default gateway: 10.10.9.35
IP address: 10.10.9.32 Subnet mask: 255.255.255.224 Default gateway: 10.10.9.35
IP address: 10.10.9.37 Subnet mask: 255.255.255.224 Default gateway: 196.1.105.6
IP address: 10.10.9.63 Subnet mask: 255.255.255.224 Default gateway: 10.10.9.35
4. Which range of port numbers is assigned dynamically to client applications when
initiating a connection to the server?
0 to 255
49152 to 65535
**1024 to 49151
0 to 1023
5.
Refer to the exhibit. The diagram represents the process of sending e-mail between
clients. Which list correctly identifies the component or protocol used at each
numbered stage of the diagram?
1.MUA 2.MDA 3.MTA 4.SMTP 5.MTA 6.POP 7.MDA 8.MUA
1.MUA 2.POP 3.MDA 4.SMTP 5.MTA 6.MDA 7.SMTP 8.MUA
1.MUA 2.POP 3.SMTP 4.MDA 5.MTA 6.SMTP 7.POP 8.MUA
**1.MUA 2.SMTP 3.MTA 4.SMTP 5.MTA 6.MDA 7.POP 8.MUA
6. Refer to the exhibit. While configuring a network, a technician wired each end of
a Category 5e cable as shown. Which two statements are true about this setup?
(Choose two.)
**The cable is suitable for connecting a switch to a router Ethernet port.
**The cable is suitable for connecting dissimilar types of devices.
The cable is unusable and must be rewired.
The cable is terminated in a way that the transmit pin is wired to the receive pin.
The cable simulates a point-to-point WAN link.
7. Refer to the exhibit. Which two facts can be determined about the topology?
(Choose two.)
**Four collision domains are present.
One logical network is represented.
**Two broadcast domains are present.
Three networks are needed.
Three logical address ranges are required.
8.
This image has been resized. Click this bar to view the full image. The original image is
sized 651x337.
nslookup command on the PC
Refer to exhibit. A technician uses the nslookup command on the PC and views the
output that is displayed in the exhibit. What is the IP address of the primary
domain name server used by the host?
**10.10.10.32
192.168.1.5
192.168.1.99
192.168.2.100
9. Which subnet mask will allow 2040 hosts per subnet on the IP network 10.0.0.0?
255.255.0.0
255.255.254.0
255.255.252.0
**255.255.248.0
255.255.240.0
255.255.255.128
10. Which three addresses belong to the category of private IP addresses? (Choose
three.)
**10.0.0.1
127.0.0.1
150.0.0.1
**172.16.0.1
**192.168.0.1
200.100.50.1
11.
Host A is transmitting data to host B. Which address combination will be used as the data
leaves the Router1 Fa0/1 interface?
Refer to the exhibit. Host A is transmitting data to host B. Which address
combination will be used as the data leaves the Router1 Fa0/1 interface?
Destination IP: 192.168.72.2 Source MAC: 0007.C2B4.3421
**Destination IP: 192.168.10.4 Source MAC: 0030.8596.DE81
Destination IP: 192.168.10.4 Source MAC: 0007.C2B4.3421
Destination IP: 192.168.72.2 Source MAC: 0030.8596.DE81
12. Which memory contents will change as a result of using the Router# erase
startup-config command on a router?
RAM
ROM
flash
**NVRAM
13. What are two characteristics of the data link layer? (Choose two.)
**It segments and reorders the data.
It exchanges the frames between nodes.
**It defines the method by which network devices place data onto the media.
It manages the transfer of data between the processes that run on each host.
It retrieves signals from the media and restores them to their bit representations.
14. Refer to the exhibit. The NAT functionality of the router is enabled to provide
the PC with Internet access. Which IP address can be assigned to router interface
Fa0/0?
10.0.0.1
172.16.1.1
**209.165.201.1
192.168.1.1
15.
A user wants to access the Internet from the PC. A part of the running configuration of
the router is shown
Refer to the exhibit. A user wants to access the Internet from the PC. A part of the
running configuration of the router is shown. Which default gateway IP address
should be configured at the PC to enable this access?
10.1.192.2
10.1.192.54
**10.1.192.1
192.31.7.1
16. Refer to the exhibit. A network technician wants to connect host A to the console
of a Cisco switch to initialize the configuration. What type of cable is required for
this connection?
straight-through cable
crossover cable
**rollover cable
serial cable
17. A network administrator wants to restrict access to the router privileged EXEC
mode. Which password should the administrator use?
**enable
aux
console
VTY
18. What are three characteristics of CSMA/CD? (Choose three.)
**Devices listen to the media and transmit data only when they cannot detect
another signal on the media.
**All devices on the media can hear all communications.
Devices communicate based on a configured priority.
After a collision occurs, the devices that caused the collision have first priority when
attempting to retransmit.
**When a collision occurs, all devices stop transmitting for a randomly generated
period of time.
CSMA/CD uses a token system to avoid collisions.
19. Refer to the exhibit. The router of the company failed and was replaced. After
the replacement, hosts C and D in the Education office are able to ping each other,
but they are unable to access the hosts in the Accounts office. What is the likely
cause of the problem?
The IP address at the fa0/0 interface of the router is incorrectly configured.
**The subnet mask at the fa0/1 interface of the router is incorrectly entered.
The IP address at the serial interface of the router is incorrectly configured.
The hosts in the Accounts office are not on the same subnet as the hosts in the Education
office.
20. Refer to the exhibit. Host A and B are unable to communicate with each other.
What is the reason for this?
Host A is assigned a network address.
Host B is assigned a multicast address.
Host A and host B belong to different networks.
**The gateway addresses are network addresses.
21. Refer to the exhibit. A user wants to view the current configuration. The output
of the ipconfig/all command is displayed in the exhibit. What three facts can be
determined from the output? (Choose three.)
The IP address is obtained from the DHCP server.
**This PC cannot communicate with other networks.
**The network can have 14 hosts.
The prefix of the computer address is /25.
The IP address is routable on the Internet.
**The assigned address is a private address.
22. Which two types of media can provide bandwidth up to 1 Gb/s? (Choose two.)
10 BASE-T
100 BASE-T
100 BASE-FX
**1000 BASE-TX
**1000 BASE-SX
23. Refer to the exhibit. RouterB is configured properly.
The Ethernet interface Fa0/0 of RouterA is configured with the use of the
commands that are shown However, a ping from the Fa0/0 interface of RouterA to
the Fa0/0 interface of RouterB is unsuccessful. What action should be taken on
RouterA to solve this problem?
Use the description command on the FastEthernet interface Fa0/0.
Configure the clock rate of the FastEthernet interface Fa0/0.
**Use the no shutdown command on the FastEthernet interface Fa0/0.
Reboot the router.
24. Refer to the exhibit. Host A wants to connect to host B on a different network.
Which three IP addresses can be assigned to host A to enable this connectivity?
(Choose three.)
172.16.11.36
172.16.11.95
**172.16.11.88
**172.16.11.70
172.16.11.64
**172.16.11.67
25. Refer to the exhibit. Host A wants to access e-mail. Which destination socket
number will be used to communicate this request?
10.10.1.2:53
0007.A7B8.0008:25
10.10.1.3:23
**10.10.1.3:25
26. A network administrator uses the copy startup-config running-config command
on a router to make configuration changes. Which component is affected by this
command?
ROM
**NVRAM
RAM
flash
27. Refer to the exhibit. In a network, Hosts A and B are exchanging segments at the
transport layer. Which two statements are true about this exchange? (Choose two.)
Host A is transferring files to host B using FTP.
**Host A will send the next segment containing data for this session starting with
byte number 11
The segment from the destination host indicates that 11 bytes have been received
successfully
**Host A is initiating a Telnet session to host B
Host B can send the next segment of the data starting with byte number 2
28. How does the transport layer allow a host to maintain multiple, simultaneous
communication streams across different applications?
It uses error control mechanisms.
**It uses a connectionless protocol only for multiple simultaneous transmissions.
It uses multiple Layer 2 source addresses.
It uses multiple ports.
29. What information is contained in the header of Layer 3 to help data delivery?
port number
device physical address
**destination host logical address
virtual connection identifier
30. Refer to the exhibit. The tracert command used from host X to host Y was
successful. What is the correct sequence of intermediary network devices that will
be present in the trace list?
switch A, switch D, switch G, host Y
**router B, router E, router F, host Y
switch A, router B, switch D, router E, router F, switch G, host Y
switch A, router B, router F, switch G, host Y
31. While configuring a router, a network technician wants to name the router.
Which prompt should the technician see when entering the hostname command?
Router>
Router#
**Router(config)#
Router(config-line)#
32. An organization has decided to use IP addresses in the range 172.20.128.0 to
172.20.143.255. Which combination of network ID and subnet mask identifies all IP
addresses in this range?
Network ID: 172.20.128.0 Subnet mask: 255.255.255.0
Network ID: 172.20.128.0 Subnet mask: 255.255.0.0
Network ID: 172.20.128.0 Subnet mask: 255.255.224.0
**Network ID: 172.20.128.0 Subnet mask: 255.255.240.0
Network ID: 172.20.128.0 Subnet mask: 255.255.255.240
33. Refer to the exhibit. Which logical topology describes the exhibited network?
star
**ring
point-to-point
multi-access
34. Refer to the exhibit. All devices in the network use default configurations. How
many broadcast domains are there in this topology?
3
**5
7
9
11
35. Which three IPv4 addresses represent valid network addresses for a subnet?
(Choose three.)
192.168.9.64/28
**192.168.9.146/28
192.168.9.96/28
**192.168.9.129/26
**192.168.9.51/26
192.168.9.64/26
36. Two routers are connected via their serial ports in a lab environment. The
routers are configured with valid IP addresses, but they cannot ping each other. The
show interface serial0/0 command shows that the serial0/0 interface is up but the
line protocol is down. What could be the cause of this problem?
The no shutdown command has not been applied to the interfaces.
**The clock rate command has not been entered on the DCE interface.
The interface timers are not cleared.
The FastEthernet interface is emulating a serial interface by assigning it a timing signal.
37. Which device should be used for enabling a host to communicate with another
host on a different network?
switch
hub
**router
host
38. Refer to the exhibit. The network administrator uses the netstat command to
display the open, active, and running TCP connections on a networked host. The
exhibit displays the output of this command. Which two facts can be determined
from this output for accessing www.cisco.com? (Choose two.)
**The source port indicates that the session is an http session.
The connection is not successful.
**The source port of the host is 3166.
The destination port is 80.
The source port does not support communication with the destination port that is listed.
The source port indicates that a UDP session has been initiated.
39. Which OSI layer uses the header information to reassemble the data segments
into streams?
application layer
network layer
presentation layer
session layer
**transport layer
40. Which three statements are true about transport layer protocols? (Choose
three.)
The UDP transport layer protocol provides for low overhead data delivery.
**The TCP transport layer protocol uses windowing and acknowledgments for
reliable transfer of data.
**The TCP and UDP port numbers are used by application layer protocols.
**The TCP transport layer protocol provides services to direct the data packets to
their destination hosts.
The UDP transport layer protocol is a connection-oriented protocol.
The UDP transport layer protocol keeps track of all the data segments in each
conversation.
41. To enhance security in a network, the network administrator uses these
commands:
Router(config)# line console 0
Router(config-line)# password j1mdi2
Router(config-line)# login
What two conclusions are evident from these commands? (Choose two.)
**Users who attempt to connect to the console port of the router must enter a
password.
**The entries permit access through the console by the use of j1mdi2 as the
password.
The entries eliminate the need for authentication.
Access through the console will be denied because the console configuration is
incomplete.
The entries prevent passwords from being displayed as plain text.
42. Refer to the exhibit. Each media link is labeled. What type of cable should be
used to connect the different devices?
Connection 1 - straight-through cable Connection 2 - straight-through cable Connection 3
- crossover cable
Connection 1 - straight-through cable Connection 2 - crossover cable Connection 3 -
rollover cable
Connection 1 - crossover cable Connection 2 - rollover cable Connection 3 - straightthrough
cable
**Connection 1 - crossover cable Connection 2 - straight-through cable Connection
3 - crossover cable
Connection 1 - straight-through cable Connection 2 - rollover cable Connection 3 -
crossover cable
43. Refer to the exhibit. The headers added at each layer are shown.
Which layer adds the destination and source process numbers to ensure that data is
delivered to the correct application?
physical layer
data link layer
network layer
**transport layer
44. Which three statements are true about network layer addressing? (Choose
three.)
It uses the last octet of the IP address to identify the network.
**It supports data communications between networks.
**It is configured by the network technician.
It is a 16-bit IPv4 address.
It prevents broadcasts.
**It uniquely identifies each host.
45. Refer to the exhibit. A PC is connected to a network. Which action will verify
that the PC can communicate with its default gateway?
Use the ping 127.0.0.1 command.
Use the ipconfig command.
Use the ipconfig/all command.
**Use the ping 10.0.0.254 command.
46. Refer to the exhibit. Host A sends a frame with the destination MAC address as
FFFF.FFFF.FFFF. What action will the switch take for this frame?
It will drop the frame.
It will send the frame back to host A.
**It will send the frame to all hosts except host A.
It will forward the frame to the default gateway.
47. Refer to the exhibit. The network administrator remotely accesses the CLI of
RouterB from PC1 using a secure connection. Which statement is true about this
connection?
The Telnet server process is running on PC1.
Only the exchange of the Telnet username and password is encrypted.
The GET request is sent to RouterA to retrieve data.
**The SSH service is used to connect PC1 to RouterB.
48. Which OSI layer uses the header information to reassemble the data segments
into streams?
application layer
network layer
presentation layer
session layer
**transport layer
49. Refer to the exhibit. A router, the table of which is shown, receives a packet that
is destined for 192.168.9.4. How will the router treat the packet?
It will drop the packet.
It will forward the packet via FastEthernet 0/1.
**It will forward the packet to the next hop address.
It will forward the packet to 172.16.2.0
50. Refer to the exhibit. Cable 1 and Cable 2 are wired for specific physical layer
requirements. The table lists each segment by number and the cable that connects
the network components on that segment. Which three segments have the correct
cables installed? (Choose three.)
**segment 1
segment 2
segment 3
**segment 4
**segment 5
segment 6
Bai tiep
TEST IS ABOVE 88%
Updated March 11th 2009
100/100
>>download<<
************************************************************************
******
1 A PC can not connect to any remote websites, ping its default gateway, or ping a
printer that is functioning properly on the local network segment. Which action will
verify that the TCP/IP stack is functioning correctly on this PC?
Use the ipconfig /all command at the host%s command prompt.
X Use the ping 127.0.0.1 command at the command prompt.
Use the traceroute command at the command prompt to identify any failures on the
path to the gateway.
Use FTP to check for connectivity to remote sites.
Download a troubleshooting tool from the PC manufacturer's website.
2 Refer to the exhibit. Which set of devices contains only intermediary devices?
X A, B, D, G
A, B, E, F
C, D, G, I
G, H, I, J
3 Refer to the exhibit. When computer A sends a frame to computer D, what
computers receive the frame?
X only computer D
only computer A and computer D
only computer B, computer C, and computer D
all computers
4 Which password is automatically encrypted when it is created?
vty
aux
console
X enable secret
enable password
5 Which three statements characterize the transport layer protocols? (Choose
three.)
X TCP and UDP port numbers are used by application layer protocols.
TCP uses port numbers to provide reliable transportation of IP packets.
UDP uses windowing and acknowledgments for reliable transfer of data.
X TCP uses windowing and sequencing to provide reliable transfer of data.
X TCP is a connection-oriented protocol. UDP is a connectionless protocol.
6 Which type of media is immune to EMI and RFI? (Choose two.)
10 Base-T
10 Base-2
10 Base-5
X 100 Base-FX
100 Base TX
X 1000 Base LX
7 Refer to the exhibit. A technician is working on a network problem that requires
verification of the router LAN interface. What address should be pinged from this
host to confirm that the router interface is operational?
127.0.0.1
192.168.64.196
X 192.168.254.1
192.168.254.9
192.168.254.254
8 Refer to the exhibit. The diagram represents the process of sending email between
clients. Select the list below that correctly identifies the component or protocol used
at each numbered stage of the diagram.
1.MUA 2.MDA 3.MTA 4.SMTP 5.MTA 6.POP 7.MDA 8.MUA
1.MUA 2.POP 3.MDA 4.SMTP 5.MTA 6.MDA 7.SMTP 8.MUA
1.MUA 2.POP 3.SMTP 4.MDA 5.MTA 6.SMTP 7.POP 8.MUA
1.MDA 2.SMTP 3.MTA 4.SMTP 5.MTA 6.MUA 7.POP 8.MDA
X 1.MUA 2.SMTP 3.MTA 4.SMTP 5.MTA 6.MDA 7.POP 8.MUA
9 Refer to the exhibit. What function does router RT_A need to provide to allow
Internet access for hosts in this network?
X address translation
DHCP services
ftpd
web server
10 Refer to the exhibit. The network containing router B is experiencing problems.
A network associate has isolated the issue in this network to router B? What action
can be preformed to correct the network issue?
issue the ip address command on interface FastEthernet 0/0
X issue the no shutdown command on interface FastEthernet 0/1
issue the clock rate command on interface Serial 0/0/0
issue the description command on interface Serial 0/0/1
11 Which three IPv4 addresses represent a broadcast for a subnet? (Choose three.)
X 172.16.4.63 /26
172.16.4.129 /26
X 172.16.4.191 /26
172.16.4.51 /27
X 172.16.4.95 /27
172.16.4.221 /27
12 What are three characteristics of CSMA/CD? (Choose three.)
Devices can be configured with a higher transmission priority.
A jam signal indicates that the collision has cleared and the media is not busy.
X A device listens and waits until the media is not busy before transmitting.
The device with the electronic token is the only one that can transmit after a
collision.
X All of the devices on a segment see data that passes on the network medium.
X After detecting a collision, hosts can attempt to resume transmission after a
random time delay has expired.
13 In a Cisco IOS device, where is the startup-configuration file stored?
Flash
X NVRAM
RAM
ROM
14 A routing issue has occurred in you internetwork. Which of the following type of
devices should be examined to isolate this error?
access point
host
hub
X router
switch
15 Which OSI layer protocol does IP rely on to determine whether packets have
been lost and to request retransmission?
application
presentation
X transport
16 Due to a security violation, the router passwords must be changed. What
information can be learned from the following configuration entries? (Choose two.)
Router(config)# line vty 0 3
Router(config-line)# password c13c0
Router(config-line)# login
The entries specify three Telnet lines for remote access.
X The entries specify four Telnet lines for remote access.
The entries set the console and Telnet password to "c13c0".
Telnet access will be denied because the Telnet configuration is incomplete.
X Access will be permitted for Telnet using "c13c0" as the password.
17 Which prompt represents the appropriate mode used for the copy running-config
startup-config command ?
Switch-6J>
X Switch-6J#
Switch-6J(config)#
Switch-6J(config-if)#
Switch-6J(config-line)#
18 Which combination of network id and subnet mask correctly identifies all IP
addresses from 172.16.128.0 through 172.16.159.255?
172.16.128.0 255.255.255.224
172.16.128.0 255.255.0.0
172.16.128.0 255.255.192.0
X 172.16.128.0 255.255.224.0
172.16.128.0 255.255.255.192
19 When must a router serial interface be configured with the clock rate command?
when the interface is functioning as a DTE device
when the interface timers have been cleared
when the connected DTE device is shut down
X when the interface is functioning as a DCE device
20 When connectionless protocols are implemented at the lower layers of the OSI
model, what are usually used to acknowledge the data receipt and request the
retransmission of missing data?
connectionless acknowledgements
X upper-layer connection-oriented protocols
Network layer IP protocols
Transport layer UDP protocols
21 A technician is asked to secure the privileged EXEC mode of a switch by
requiring a password. Which type of password would require this login and be
considered the most secure?
console
enable
X enable secret
VTY
22 Refer to the exhibit. What is required on host A for a network technician to
create the initial configuration on RouterA?
a FTP client
a telnet client
X a terminal emulation program
a web browser
23 Refer to the exhibit. A network administrator remotely accesses the CLI of
RouterB from PC1. Which two statements are true about the application layer
protocol that is used to make this connection? (Choose two.)
The data is encrypted.
X The connection type is called a VTY session.
A server process is running on PC1.
A GET request is sent to RouterB.
X The application name is the same for the service, protocol, and client.
24 The Layer 4 header contains which type of information to aid in the delivery of
data?
X service port number
host logical address
device physical address
virtual connection identifier
25 Refer to the exhibit. What two facts can be determined about the exhibited
topology? (Choose two.)
X A single broadcast domain is present
Two logical address ranges are required.
Three broadcast domains are shown.
Four networks are needed.
X Five collision domains exist.
26 Refer to the exhibit. A network technician is trying to determine the correct IP
address configuration for Host A. What is a valid configuration for Host A?
IP address: 192.168.100.19; Subnet Mask: 255.255.255.248; Default Gateway:
192.16.1.2
X IP address: 192.168.100.20; Subnet Mask: 255.255.255.240; Default Gateway:
192.168.100.17
IP address: 192.168.100.21; Subnet Mask: 255.255.255.248; Default Gateway:
192.168.100.18
IP address: 192.168.100.22; Subnet Mask: 255.255.255.240; Default Gateway:
10.1.1.5
IP address: 192.168.100.30; Subnet Mask: 255.255.255.240; Default Gateway:
192.168.1.1
IP address: 192.168.100.31; Subnet Mask: 255.255.255.240; Default Gateway:
192.168.100.18
27 Refer to the exhibit. Cable 1 and cable 2 have the ends wired for specific physical
layer requirements. The table lists each segment by number and the cable which has
been installed by the network technician between the network components on that
segment. From the data given, which segments have the correct cable installed?
(Choose three.)
X segment1
segment2
X segment3
X segment4
segment5
28 What is true regarding network layer addressing? (Choose three.)
uses a flat structure
prevent broadcasts
X heirarchical
X uniquely identifies each host
48 bits in length
X contains a network portion
29 Refer to the exhibit. A router, whose table is shown, receives a packet that is
destined for 192.168.1.4. How will router treat the packet?
The packet will be dropped.
The packet will be forwarded via FastEthernet 0/0.
X The packet will be forwarded to the destination host.
The packet will be forwarded to the 192.168.1.3 next-hop address.
30 Refer to the exhibit. Which two statements describe the information that is
represented in the header? (Choose two.)
This is a server response.
The UDP protocol is being used.
X The destination port indicates a Telnet session.
X The return segment will contain a source port of 23.
The next session originated from the client of this session will use the source port
number 13358.
31 Refer to the exhibit. What is the correct destination socket number for a web
page request from Host A to the web server?
00-08-a3-b6-ce-46
X 198.133.219.25:80
http://www.cisco.com
C 198.133.219.0/24 is directly connected, FastEthernet0/0
32 During the encapsulation process, which identifiers are added at the transport
layer?
two networks routing the packets
X two applications communicating the data
two hosts at either end of the communication
two nodes on the local network exchanging the frame
33 Refer to the exhibit. A student has wired each end of a CAT 5e cable as shown.
What is the result? (Choose two.)
The cable is unusable and must be rewired.
The cable is suitable for use as a Gigabit Ethernet straight-through.
X The cable is suitable for use as a Fast Ethernet crossover.
The cable is suitable for use as a rollover cable.
The cable is suitable for use as a Gigabit Ethernet crossover.
X The cable is suitable for use between two 100 Mbps Auto-MDIX capable switches.
34 Refer to the exhibit. Assume all devices are using default configurations. How
many subnets are required to address the topology that is shown?
1
X 3
4
5
7
35 Refer to the exhibit. On the basis of the IP configuration that is shown, what is
the reason that Host A and Host B are unable to communicate outside the local
network?
Host A was assigned a network address.
Host B was assigned a multicast address.
Host A and Host B belong to different networks.
X The gateway address was assigned a broadcast address.
36 Refer to the exhibit. Each media link is labeled. What type of cable should be
used to connect the different devices?
Connection 1 - rollover cable
Connection 2 - straight-through cable
Connection 3 - crossover cable
Connection 1 - crossover cable
Connection 2 - rollover cable
Connection 3 - crossover cable
Connection 1 - straight-through cable
Connection 2 - crossover cable
Connection 3 - crossover cable
X Connection 1 - straight-through cable
Connection 2 - crossover cable
Connection 3 - straight-through cable
Connection 1 - crossover cable
Connection 2 - straight-through cable
Connection 3 - crossover cable
37 Refer to the exhibit. What does the IP address 192.168.33.2 represent?
The host's default gateway.
The host's IP address.
X The host's primary domain name server.
The IP address of the website resolver1.mooki.local.
The IP address of the host's homepage.
38 Refer to the exhibit. What two facts can be determined from the information that
is given? (Choose two.)
This exchange is part of the three-way handshake.
The source port indicates that a Telnet session has been initiated.
The data is flowing from server to client.
X The destination port indicates that an HTTP session has been initiated.
X The data listed is associated with the transport layer.
The source port does not support communication with the destination port that is
listed.
39 Which of the following are the address ranges of the private IP addresses?
(Choose three.)
X 10.0.0.0 to 10.255.255.255
200.100.50.0 to 200.100.25.255
150.150.0.0 to 150.150.255.255
X 172.16.0.0 to 172.31.255.255
X 192.168.0.0 to 192.168.255.255
127.16.0.0 to 127.31.255.255
40 Which two functions of the OSI model occur at layer two? (Choose two.)
X physical addressing
encoding
routing
cabling
X media access control
41 Which range of port numbers are reserved for services that are commonly used
by applications that run on servers?
0 to 255
0 to 1023
X 1024 to 49151
49152 to 65535
42 As network administrator, what is the subnet mask that allows 510 hosts given the
IP address 172.30.0.0?
255.255.0.0
255.255.248.0
255.255.252.0
X 255.255.254.0
255.255.255.0
255.255.255.128
43 Refer to the exhibit. The tracert command is initiated from PC1 to the
destination PC4. Which device will send a response to the initial packet from PC1?
X London
Paris
Athens
Ankara
PC4
44 Refer to the exhibit. Host A is transmitting data to host B. What addresses will
host A use to for the destination IP and MAC addresses in this communication?
Destination MAC: BBBB:BBBB:BBBB Destination IP: 172.22.0.62
Destination MAC: DDDD:DDDD:DDDD Destination IP: 172.22.0.75
Destination MAC: EEEE:EEEE:EEEE Destination IP: 172.22.0.62
Destination MAC: BBBB:BBBB:BBBB Destination IP: 172.22.0.75
X Destination MAC: EEEE:EEEE:EEEE Destination IP: 172.22.0.75
Destination MAC: DDDD:DDDD:DDDD Destination IP: 172.22.0.94
45 Refer to the exhibit. Which logical topology best describes the exhibited
network?
star
point-to-point
multiaccess
mesh
X bus <--- True
46 Examine the graphic with current configurations. Host A in the Clerical offices
failed and was replaced. Although a ping to 127.0.0.1 was successful, the
replacement computer can not access the company network. What is the likely cause
of the problem?
IP address incorrectly entered
network cables unplugged
X subnet mask incorrectly entered
network card failure
47 Refer to the exhibit. With the router running NAT, what IP addresses can be
applied to the computer to allow access to the Internet? (Choose three.)
192.168.18.38
192.168.18.48
X 192.168.18.49
X 192.168.18.52
X 192.168.18.59
192.168.18.63
48 Refer to the exhibit. What three statements are true about the IP configuration
that is shown? (Choose three.)
X The address that is assigned to the computer represents private addressing.
X The computer is unable to communicate outside of the local network.
The network of this computer can have 126 hosts.
X The prefix of the computer address is /27.
The IP address that is assigned to the computer is routable on the Internet.
The IP address that is assigned to the computer is a broadcast address.
49 Refer to the exhibit. Host A attempts to establish a TCP/IP session with host C.
During this attempt, a frame was captured with the source MAC address
0050.7320.D632 and the destination MAC address 0030.8517.44C4. The packet
inside the captured frame has an IP source address 192.168.7.5, and the destination
IP address is 192.168.219.24. At which point in the network was this packet
captured?
leaving host A
leaving ATL
X leaving Dallas
leaving NYC
50 Which of the following OSI layers offers reliable, connection-oriented data
communication services?
application
presentation
X transport
network
Bai 3
Thursday, June 18, 2009
CCNA1 Final v1(Lastest in Jun 2009)
at 2:46 PM ·
www.ccna4u.org
Thursday, June 18, 2009
Welcome CCNA4U.ORG CCNA4U.INFO and get lastest versions
Thanks!
quocvuong
Which three IPv4 addresses represent valid network addresses for a subnet? (Choose
three.)
(ccna4u.org)=>192.168.9.64/28
192.168.9.146/28
(ccna4u.org)=>192.168.9.96/28
192.168.9.129/26
192.168.9.51/26
(ccna4u.org)=>192.168.9.64/26
3
Refer to the exhibit. Which two facts can be determined about the topology? (Choose
two.)
(ccna4u.org)=>Four collision domains are present.
One logical network is represented.
(ccna4u.org)=>Two broadcast domains are present.
Three networks are needed.
Three logical address ranges are required.
4
Refer to the exhibit. Which logical topology describes the exhibited network?
star
(ccna4u.org)=>ring
point-to-point
multi-access
5
Refer to the exhibit. At which OSI layer is serial interface 0/0/1 experiencing problems?
(ccna4u.org)=>Layer 1
Layer 2
Layer 3
Layer 4
6
Refer to the exhibit. Which two statements describe the information that is represented in
the header? (Choose two.)
This is a server response.
The UDP protocol is being used.
(ccna4u.org)=>The destination port indicates a Telnet session.
(ccna4u.org)=>The return segment will contain a source port of 23.
The next session originated from the client of this session will use the source port number
13358.
7
Refer to the exhibit. Host B was powered off. What change will occur in the MAC table
of the switch?
The table will remain unaffected.
(ccna4u.org)=>The switch will remove the MAC address at Fa0/19.
The switch will retain the MAC address until host B is powered on again.
The switch will rebuild the MAC table by assigning the FFFF.FFFF.FFFF address to port
Fa0/19.
8
What information is contained in the header of Layer 3 to help data delivery?
(ccna4u.org)=>port number
device physical address
destination host logical address
virtual connection identifier
9
Refer to the exhibit. On the basis of the provided configuration, which statement is true?
(ccna4u.org)=>The IP address of host A is properly assigned to the local NIC.
Host A can send packets to any host on the local network only.
Host A can send packets to any host on the local and remote network.
Host A can ping successfully the default gateway address of 192.168.1.1.
10
As network administrator, what is the subnet mask that allows 510 hosts given the IP
address 172.30.0.0?
255.255.0.0
255.255.248.0
255.255.252.0
(ccna4u.org)=>255.255.254.0
255.255.255.0
255.255.255.128
11
Refer to the exhibit. The network administrator remotely accesses the CLI of RouterB
from PC1 using a secure connection. Which statement is true about this connection?
The Telnet server process is running on PC1.
Only the exchange of the Telnet username and password is encrypted.
The GET request is sent to RouterA to retrieve data.
(ccna4u.org)=>The SSH service is used to connect PC1 to RouterB.
12
A network administrator wants to restrict access to the router privileged EXEC mode.
Which password should the administrator use?
(ccna4u.org)=>enable
aux
console
VTY
13
Refer to the exhibit. Which option correctly describes the purpose for the IP address that
is assigned to VLAN 100?
provides remote switch management
(ccna4u.org)=>identifies the subnet for hosts in VLAN 100
serves as default gateway to hosts in VLAN 100
creates a routing table entry for packets to network 192.168.0.0
14
Which type of media is immune to EMI and RFI? (Choose two.)
10 Base-T
10 Base-2
10 Base-5
(ccna4u.org)=>100 Base-FX
100 Base TX
(ccna4u.org)=>1000 Base LX
15
Which device should be used for routing a packet to a remote network?
access switch
DHCP server
hub
(ccna4u.org)=>router
16
Refer to the exhibit. To create the initial configuration, a network technician connected
host A to the router using the connection that is shown. Which statement is true about this
connection?
It terminates at the Ethernet port of the router.
(ccna4u.org)=>It provides out-of-band console access.
It terminates at the serial interface of the router.
It requires a Telnet client on host A to access the router.
17
Which three IPv4 addresses represent a broadcast for a subnet? (Choose three.)
(ccna4u.org)=>172.16.4.63 /26
172.16.4.129 /26
(ccna4u.org)=>172.16.4.191 /26
172.16.4.51 /27
(ccna4u.org)=>172.16.4.95 /27
172.16.4.221 /27
18
Refer to the exhibit. On the basis of the IP configuration that is shown, what is the reason
that Host A and Host B are unable to communicate outside the local network?
Host A was assigned a network address.
Host B was assigned a multicast address.
Host A and Host B belong to different networks.
(ccna4u.org)=>The gateway address was assigned a broadcast address.
19
Because of a security violation, the router password must be changed. What information
can be learned from these configuration entries? (Choose two.)
Router(config)# line vty 0 4
Router(config-line)# password arj15
Router(config-line)# login
This configuration allows users to connect by using a modem.
Users must specify which line, 0 or 4, they wish to connect to when making a connection.
(ccna4u.org)=>This configuration allows users to connect to the router via the use of
the telnet command.
(ccna4u.org)=>This configuration allows five users to make simultaneous
connections to this router.
www.ccna4u.org
The configured password is automatically encrypted on the router.
20
Refer to the exhibit. Which statement is true about e-mail transmission between computer
A and the server?
(ccna4u.org)=>The server will use HTTP to push messages to computer A.
Computer A will connect to the server and retrieve inbound messages by using POP.
The e-mail client on computer A uses SMTP to pull inbound messages from the server
and push outbound messages to the server.
A connection is established from computer A to the server on port 21 and the client
software uses FTP to transmit messages as discreet files.
21
Which OSI layer uses a connection-oriented protocol to ensure reliable delivery of data?
application layer
presentation layer
session layer
(ccna4u.org)=>transport layer
22
Refer to the exhibit. The network administrator wants to remotely access the CLI of the
router from PC1 using modem 1. Which port of the router should be connected to modem
2 to enable this access?
console
Ethernet
(ccna4u.org)=>auxiliary
serial
23
In a Cisco IOS device, where is the startup-configuration file stored?
Flash
(ccna4u.org)=>NVRAM
RAM
ROM
24
Which statement is true about the running configuration file in a Cisco IOS device?
(ccna4u.org)=>It affects the operation of the device immediately when modified.
It is stored in NVRAM.
It should be deleted using the erase running-config command.
It is automatically saved when the router reboots.
25
Refer to the exhibit. What is the correct destination socket number for a web page request
from Host A to the web server?
00-08-a3-b6-ce-46
(ccna4u.org)=>198.133.219.25:80
http://www.cisco.com
C 198.133.219.0/24 is directly connected, FastEthernet0/0
26
A host is transmitting a video over the network. How does the transport layer allow this
host to use multiple applications to transmit other data at the same time as the video
transmission?
It uses error control mechanisms.
(ccna4u.org)=>It uses a connectionless protocol only for multiple simultaneous
transmissions.
It uses multiple Layer 2 source addresses.
It uses multiple port numbers.
27
Refer to the exhibit. A router, the table of which is shown, receives a packet that is
destined for 192.168.9.4. How will the router treat the packet?
It will drop the packet.
It will forward the packet via FastEthernet 0/1.
(ccna4u.org)=>It will forward the packet to the next hop address.
It will forward the packet to 172.16.2.0
28
Refer to the exhibit. The host was disconnected from switch 2 and connected to switch 1.
Which combination of IP address, subnet mask, and default gateway should be assigned
to this host to allow it to function in the network?
IP address: 10.10.9.37 Subnet mask: 255.255.255.240 Default gateway: 10.10.9.35
(ccna4u.org)=>IP address: 10.10.9.37 Subnet mask: 255.255.255.224 Default
gateway: 10.10.9.35
IP address: 10.10.9.29 Subnet mask: 255.255.255.248 Default gateway: 10.10.9.35
IP address: 10.10.9.32 Subnet mask: 255.255.255.224 Default gateway: 10.10.9.35
IP address: 10.10.9.37 Subnet mask: 255.255.255.224 Default gateway: 196.1.105.6
IP address: 10.10.9.63 Subnet mask: 255.255.255.224 Default gateway: 10.10.9.35
29
A user types the enable command. What task can be performed at the privileged EXEC
mode?
Configure the device.
Configure individual interfaces.
Configure individual terminal lines.
(ccna4u.org)=>Issue show and debug commands.
30
What are three characteristics of CSMA/CD? (Choose three.)
(ccna4u.org)=>It monitors the media for presence of a data signal.
(ccna4u.org)=>After detecting a collision, hosts can resume transmission after a
random timer has expired.
(ccna4u.org)=>A jam signal is used to ensure that all hosts are aware that a collision
has occurred.
Devices can be configured with a higher transmission priority.
Data is transmitted only when the data signal is present.
It uses a token system to avoid collisions.
31
Which three statements characterize the transport layer protocols? (Choose three.)
(ccna4u.org)=>TCP and UDP port numbers are used by application layer protocols.
TCP uses port numbers to provide reliable transportation of IP packets.
UDP uses windowing and acknowledgments for reliable transfer of data.
(ccna4u.org)=>TCP uses windowing and sequencing to provide reliable transfer of
data.
TCP is a connection-oriented protocol. UDP is a connectionless protocol.
32
Refer to the exhibit. The headers added at each layer are shown. Which layer adds the
destination and source process numbers to ensure that data is delivered to the correct
application?
physical layer
data link layer
network layer
(ccna4u.org)=>transport layer
33
Refer to the exhibit. In a network, Hosts A and B are exchanging segments at the
transport layer. Which two statements are true about this exchange? (Choose two.)
Host A is transferring files to host B using FTP.
(ccna4u.org)=>Host A will send the next segment containing data for this session
starting with byte number 11.
The segment from the destination host indicates that 11 bytes have been received
successfully.
(ccna4u.org)=>Host A is initiating a Telnet session to host B.
Host B can send the next segment of the data starting with byte number 2.
34
During the encapsulation process of the TCP/IP model, which layer will attach the IP
header to the data?
application
transport
(ccna4u.org)=>internet
network access
35
Refer to the exhibit. The network containing router B is experiencing problems. A
network associate has isolated the issue in this network to router B. What action can be
preformed to correct the network issue?
(ccna4u.org)=>issue the clock rate command on interface Serial 0/0/0
issue the description command on interface Serial 0/0/1
issue the ip address command on interface FastEthernet 0/0
issue the no shutdown command on interface FastEthernet 0/1
36
During the encapsulation process, what identifiers are added at the transport layer?
source and destination IP addresses
source and destination MAC addresses
source and destination port numbers
source and destination channel identifiers
37
Refer to the exhibit. A network technician wants to connect host A to the console of a
Cisco switch to initialize the configuration. What type of cable is required for this
connection?
straight-through cable
crossover cable
(ccna4u.org)=>rollover cable
serial cable
38
How does the transport layer allow a host to maintain multiple, simultaneous
communication streams across different applications?
It uses error control mechanisms.
(ccna4u.org)=>It uses a connectionless protocol only for multiple simultaneous
transmissions.
It uses multiple Layer 2 source addresses.
It uses multiple ports.
39
While configuring a router, a network technician wants to name the router. Which prompt
should the technician see when entering the hostname command?
Router>
Router#
(ccna4u.org)=>Router(config)#
Router(config-line)#
40
Refer to the exhibit. The NAT functionality of the router is enabled to provide Internet
access to the PC. However, the PC is still unable to access the Internet. Which IP address
should be changed to 209.165.201.1 to enable the PC to access the Internet?
192.168.1.191
192.168.1.101
192.168.1.1
(ccna4u.org)=>192.168.1.254
41
Which option would be a valid router hostname according to Cisco naming convention
guidelines?
Rtr1_Bldg201
(ccna4u.org)=>Building_201
Router 1
1st_Floor_Router_409_West_State_Street
42
An administrator has made changes to a device. The changes did not have the desired
effect. What can the administrator do to restore the configuration saved in NVRAM?
Issue the erase flash command.
(ccna4u.org)=>Issue the reload command and respond no to the prompt that follows.
Issue the erase start-up config command.
Issue the copy running-config start-up config command.
43
Refer to the exhibit. Each media link is labeled. What type of cable should be used to
connect the different devices?
Connection 1 - rollover cable Connection 2 - straight-through cable Connection 3 -
crossover cable
Connection 1 - straight-through cable Connection 2 - crossover cable Connection 3 -
rollover cable
Connection 1 - crossover cable Connection 2 - rollover cable Connection 3 - straightthrough
cable
Connection 1 - crossover cable Connection 2 - straight-through cable Connection 3 -
rollover cable
(ccna4u.org)=>Connection 1 - straight-through cable Connection 2 - straight-
through cable Connection 3 - straight-through cable
44
Refer to the exhibit. Host A wants to access the Internet. Which combination of a Layer 2
address and a Layer 3 address will enable this access from host A?
Destination MAC: 0030.8596.DE83 Default gateway: 209.165.202.130
Destination MAC: 0030.8596.DE82 Default gateway: 172.16.9.2
(ccna4u.org)=>Destination MAC: 0030.8517.44C4 Default gateway: 172.16.1.1
Destination MAC: 0030.8517.44C4 Default gateway: 209.165.202.130
45
Refer to the exhibit. Cable 1 and cable 2 have the ends wired for specific physical layer
requirements. The table lists each segment by number and the cable which has been
installed by the network technician between the network components on that segment.
From the data given, which segments have the correct cable installed? (Choose three.)
(ccna4u.org)=>segment1
segment2
(ccna4u.org)=>segment3
(ccna4u.org)=>segment4
segment5
46
Refer to the exhibit. Which logical topology describes the exhibited network?
star
(ccna4u.org)=>ring
point-to-point
multi-access
47
Refer to the exhibit. The PC, the routing table of which is displayed, is configured
correctly. To which network device or interface does the IP address 192.168.1.254
belong?
PC
switch
(ccna4u.org)=>router interface fa0/0
router interface fa0/1
48
Refer to the exhibit. The network administrator uses the netstat command to display the
open, active, and running TCP connections on a networked host. The exhibit displays the
output of this command. Which two facts can be determined from this output for
accessing www.cisco.com? (Choose two.)
The source port indicates that the session is an http session.
The connection is not successful.
(ccna4u.org)=>The source port of the host is 3166.
(ccna4u.org)=>The destination port is 80.
The source port does not support communication with the destination port that is listed.
The source port indicates that a UDP session has been initiated.
49
The network administrator wants to configure the port number used by an application on
a server to make it accessible by clients. Which range of port numbers would normally be
assigned for this application?
0 to 255
(ccna4u.org)=>0 to 1023
1024 to 49151
49152 to 65535
50
Refer to the exhibit. A user wants to view the current configuration. The output of the
ipconfig/all command is displayed in the exhibit. What three facts can be determined
from the output? (Choose three.)
The IP address is obtained from the DHCP server.
(ccna4u.org)=>This PC cannot communicate with other networks.
(ccna4u.org)=>The network can have 14 hosts.
The prefix of the computer address is /25.
The IP address is routable on the Internet.
The assigned address is a private address.
51
Refer to the exhibit. What is required on host A for a network technician to create the
initial configuration on Router1?
an FTP client
a Telnet client
(ccna4u.org)=>a terminal emulation program
a web browser
de 4
Refer to the exhibit. Host B attempts to establish a TCP/IP session with host C.
During this attempt, a frame was captured at the FastEthernet interface fa0/1 of the
San Francisco router. The packet inside the captured frame has the source IP
address 10.10.1.2, and the destination IP address is 10.31.1.20. What is the
destination MAC address of the frame at the time of capture?
- 0060.7320.D632
- 0060.7320.D631
- 0040.8517.44C3
- 0009.B2E4.EE03
- 0010.C2B4.3421
2. What are three characteristics of CSMA/CD? (Choose three.)
- It monitors the media for presence of a data signal.
- After detecting a collision, hosts can resume transmission after a random timer
has expired.
- A jam signal is used to ensure that all hosts are aware that a collision has
occurred.
- Devices can be configured with a higher transmission priority.
- Data is transmitted only when the data signal is present.
- It uses a token system to avoid collisions.
3. Refer to the exhibit. The PC, the routing table of which is displayed, is configured
correctly. To which network device or interface does the IP address 192.168.1.254
belong?
- PC
- switch
- router interface fa 0/0
- router interface fa 0/1
4. Refer to the exhibit. Host A wants to access the Internet. Which combination of a
Layer 2 address and a Layer 3 address will enable this access from host A?
- Destination MAC: 0030.8596.DE83 Default gateway: 209.165.202.130
- Destination MAC: 0030.8596.DE82 Default gateway: 172.16.9.2
- Destination MAC: 0030.8517.44C4 Default gateway: 172.16.1.1
- Destination MAC: 0030.8517.44C4 Default gateway: 209.165.202.130
5. Refer to the exhibit. Communication between hosts X and Y is restricted to the
local network. What is the reason for this?
- The gateway addresses are broadcast addresses.
- Host Y is assigned a multicast address.
- Host X and host Y belong to different networks.
- Host X is assigned a network address.
6. What is the result of using the clock rate 56000 command at the serial interface of
the router?
- The interface is configured as a DCE device.
- The interface timers are cleared.
- The FastEthernet interface is made to emulate a serial interface by assigning it a
timing signal.
- The IP address for the serial interface is configured.
7. Which three addresses belong to the category of public IP addresses? (Choose
three.)
- 127.0.0.1
- 196.1.105.6
- 132.11.9.99
- 10.0.0.1
- 172.16.9.10
- 46.1.1.97
8. Which three statements are true about transport layer protocols? (Choose three.)
- TCP and UDP manage communication between multiple applications.
- TCP retransmits the packets for which the acknowledgment is not received.
- TCP acknowledges received data.
- UDP exchanges frames between the nodes of the network.
- TCP has no mechanism to acknowledge transmission errors.
- UDP uses windowing and sequencing to provide reliable transfer of data.
9. Refer to the exhibit. Which logical topology describes the exhibited network?
- star
- ring
- point-to-point
- multi-access
10. Which statement is true about the running configuration file in a Cisco IOS
device?
- It affects the operation of the device immediately when modified.
- It is stored in NVRAM.
- It should be deleted using the erase running-config command.
- It is automatically saved when the router reboots.
11. Refer to the exhibit. Host C is able to ping 127.0.0.1 successfully, but is unable to
communicate with hosts A and B in the organization. What is the likely cause of the
problem?
- Hosts A and B are not on the same subnet as host C.
- The IP addresses on the router serial interfaces are wrong.
- The subnet mask on host C is improperly configured.
- The FastEthernet interface fa0/0 of router 1 is wrongly configured.
12. A host is transmitting a video over the network. How does the transport layer
allow this host to use multiple applications to transmit other data at the same time
as the video transmission?
- It uses error control mechanisms.
- It uses a connectionless protocol only for multiple simultaneous transmissions.
- It uses multiple Layer 2 source addresses.
- It uses multiple port numbers.
13. Refer to the exhibit. PC1 is unable to access PC2. To troubleshoot this problem,
the technician needs to confirm that the next hop interface is operational. Which
default gateway address should the technician ping from PC1 to confirm this?
- 10.0.0.254
- 192.168.0.249
- 192.168.0.250
- 10.0.1.254
14. Refer to the exhibit. Cable 1 and Cable 2 are wired for specific physical layer
requirements. Which three segments use Cable 2? (Choose three.)
- Segment 1
- Segment 2
- Segment 3
- Segment 4
- Segment 5
- Segment 6
15. Refer to the exhibit. Which two facts can be determined about the topology?
(Choose two.)
- Three networks are needed.
- Two logical address ranges are required.
- A single broadcast domain is present.
- Three collision domains are present.
- Four networks are needed.
16. Refer to the exhibit. Which three statements are true about the IP configuration
that is displayed? (Choose three.)
- The assigned address is a private address.
- The PC cannot communicate with the DNS server.
- The network can have 126 hosts.
- The prefix of the computer address is /26.
- The IP address is routable on the Internet.
- The IP address is a multicast address.
17. Which password restricts Telnet access to the router?
- enable
- enable secret
- console
- VTY
18. Refer to the exhibit. To create the initial configuration, a network technician
connected host A to the router using the connection that is shown. Which statement
is true about this connection?
- It terminates at the Ethernet port of the router.
- It provides out-of-band console access.
- It terminates at the serial interface of the router.
- It requires a Telnet client on host A to access the router.
19. Which device should be used for routing a packet to a remote network?
- access switch
- DHCP server
- hub
- router
20. Refer to the exhibit. The serial interface of the router was configured with the
use of the commands that are shown. The router cannot ping the router that is
directly connected to interface serial 0/0/0. What should the network technician do
to solve this problem?
- Configure the description at interface serial 0/0/0.
- Configure an IP address on interface serial 0/0/0.
- Remove the no shutdown command at interface serial 0/0/0
- Reboot the router.
21. Refer to the exhibit. In a network, host A is sending data segments to host B.
The flow control of the segments that are being exchanged is displayed. Which two
statements are true about this communication? (Choose two.)
- The initial window size is determined via the two-way handshake.
- The window size for the TCP session that is represented is initially set to 3000
bytes.
- Acknowledgment number 3001 indicates that host A will send the next segment
with sequence number 3001.
- Host B expects that the next received segment number will be 3000.
- No more acknowledgments will be exchanged.
22. Refer to the exhibit. The network administrator wants to remotely access the
CLI of the router from PC1 using modem 1. Which port of the router should be
connected to modem 2 to enable this access?
- console
- Ethernet
- auxiliary
- serial
23. Which OSI layer uses a connection-oriented protocol to ensure reliable delivery
of data?
- application layer
- presentation layer
- session layer
- transport layer
24. What are two functions of the data link layer? (Choose two.)
- It segments and reorders the data.
- It exchanges data between programs that are running on the source and
destination hosts.
- It controls how data is placed onto the media.
- It generates signals to represent the bits in each frame.
- It encapsulates each packet with a header and a trailer to transfer it across the
local media.
25. Refer to the exhibit. Which list refers only to end devices?
- D,E,F,G
- A,H,B,C
- A,D,E,F
- A,D,E,G
26. Refer to the exhibit. The diagram represents the process of sending e-mail
between clients. Which list correctly identifies the component or protocol used at
each numbered stage of the diagram?
- 1.MUA 2.MDA 3.MTA 4.SMTP 5.MTA 6.POP 7.MDA 8.MUA
- 1.MUA 2.POP 3.MDA 4.SMTP 5.MTA 6.MDA 7.SMTP 8.MUA
- 1.MUA 2.POP 3.SMTP 4.MDA 5.MTA 6.SMTP 7.POP 8.MUA
- 1.MUA 2.SMTP 3.MTA 4.SMTP 5.MTA 6.MDA 7.POP 8.MUA
27. Refer to the exhibit. Host B was powered off. What change will occur in the
MAC table of the switch?
- The table will remain unaffected.
- The switch will remove the MAC address at Fa 0/19 immediately.
- The switch will retain the MAC address until host B is powered on again.
- The switch will rebuild the MAC table by assigning the FFFF.FFFF.FFFF address
to port Fa0/19.
28. Refer to the exhibit. A technician has connected the PC to the switch using a
Category 6 UTP cable. Which two statements are true about this connection?
(Choose two.)
- The cable that is used is an Ethernet crossover cable.
- The transmit pin of the cable is terminated to the receive pin.
- The maximum distance between the switch and the PC can be 100 m.
- The maximum supported bandwidth is 1000 Mb/s.
- The Category 6 cable simulates a point-to-point WAN link and is unusable for this
type of connection.
29. Refer to the exhibit. A host is using NAT to connect to the Internet. Which three
IP addresses enable this connection? (Choose three.)
- 10.1.1.63
- 10.1.1.37
- 10.1.1.39
- 10.1.1.32
- 10.1.1.60
- 10.1.1.2
30. Refer to the exhibit. A PC is communicating with another PC on a remote
network. The two networks are connected by three routers. Which action will help
to identify the path between the hosts?
- Use the ipconfig command at the host.
- Use the ipconfig/all command at the destination.
- Use the tracert command at the host.
- Use the ping command at the destination.
31. An organization wants to create a subnet of the IP network 172.16.0.0. This
subnet will accommodate 1000 hosts. Which subnet mask should be assigned to this
network?
- 255.255.0.0
- 255.255.248.0
- 255.255.252.0
- 255.255.254.0
- 255.255.255.0
- 255.255.255.128
32. Refer to the exhibit. A host is connected to hub 1. Which combination of IP
address, subnet mask, and default gateway can allow this host to function in the
network?
- IP address: 172.16.31.36 Subnet mask: 255.255.255.240 Default gateway:
172.16.31.35
- IP address: 172.16.31.63 Subnet mask: 255.255.255.224 Default gateway:
172.16.31.35
- IP address: 172.16.31.29 Subnet mask: 255.255.255.248 Default gateway:
172.16.31.35
- IP address: 172.16.31.32 Subnet mask: 255.255.255.224 Default gateway:
172.16.31.35
- IP address: 172.16.31.29 Subnet mask: 255.255.255.240 Default gateway:
172.16.30.1
- IP address: 172.16.31.37 Subnet mask: 255.255.255.224 Default gateway:
172.16.31.35
33. Refer to the exhibit. A technician uses the nslookup command on the PC and
views the output that is displayed in the exhibit. What is the IP address of the
primary domain name server configured at the host? (Choose two.)
- 192.168.1.99
- 192.168.2.100
- 10.10.10.32
- 192.168.1.5
- the IP address of the website resolver1.xyz.local
34. Which OSI layer offers ordered data reconstruction services?
- application layer
- network layer
- presentation layer
- session layer
- transport layer
35. Refer to the exhibit. All devices in the network use default configurations. How
many logical address ranges are required in this topology?
- 2
- 3
- 4
- 5
- 6
36. The network administrator wants to install a private application on a server.
Which range of port numbers is normally assigned to this application to make it
accessible by clients?
- 0 to 255
- 49152 to 65535
- 1024 to 4915
- 10 to 1023
37. Because of a security violation, the router password must be changed. What
information can be learned from these configuration entries? (Choose two.)
Router(config)# line vty 0 4
Router(config-line)# password arj15
Router(config-line)# login
- This configuration allows users to connect by using a modem.
- Users must specify which line, 0 or 4, they wish to connect to when making a
connection.
- This configuration allows users to connect to the router via the use of the telnet
command.
- This configuration allows five users to make simultaneous connections to this
router.
- The configured password is automatically encrypted on the router.
38. Refer to the exhibit. Each media link is labeled. What type of cable should be
used to connect the different devices?
- Connection 1 - rollover cable Connection 2 - straight-through cable Connection 3 -
crossover cable
- Connection 1 - straight-through cable Connection 2 - crossover cable Connection 3
- rollover cable
- Connection 1 - crossover cable Connection 2 - rollover cable Connection 3 -
straight-through cable
- Connection 1 - crossover cable Connection 2 - straight-through cable Connection 3
- rollover cable
- Connection 1 - straight-through cable Connection 2 - straight-through cable
Connection 3 - straight-through cable
39. Which two types of media are useful for connecting two devices separated by a
distance of 500 meters? (Choose two.)
- 10 BASE-T
- 1000 BASE-TX
- 10 BASE-2
- 1000 BASE LX
- 1000 BASE-SX
40. Which information is used by the router to determine the path between the
source and destination hosts?
- the host portion of the IP address
- the network portion of the IP address
- host default gateway address
- the MAC address
41. Refer to the exhibit. What two facts can be determined from the session
information that is displayed? (Choose two.)
- This exchange is part of the three-way handshake.
- The destination port indicates that a Telnet session has been initiated.
- The source port does not support communication with the destination port that is
listed.
- The destination port indicates that an SMTP session has been initiated.
- The protocol is a connection-oriented protocol.
42. Refer to the exhibit. Host A is accessing multiple servers. Which combination of
port number and address will uniquely identify a particular process running on a
specific server?
- MAC address of the server and port number of the service
- IP address of the host and port number of the service
- MAC address of the host and port number of the service
- IP address of the server and port number of the service
43. A network technician wants to configure an IP address on a router interface by
using the ip address 192.168.1.0 255.255.255.0 command. Which prompt should the
technician see when entering this command?
- Router>
- Router(config-if)#
- Router#
- Router(config)#
44. Refer to the exhibit. Host X is unable to communicate with host Y. Which
command can be run at host X to determine which intermediary device is
responsible for this failure?
- telnet 192.168.1.1
- ping 192.168.1.1
- ftp 192.168.1.1
- tracert 192.168.1.1
45. Refer to the exhibit. In a network, PC1 sends a message to PC2. The frame
received at PC2 is shown. What information in this frame determines the correct
destination application?
- timing and synchronization bits
- destination and source physical addresses
- destination and source logical network addresses
- destination and source process numbers
46. An organization has been assigned network ID 10.10.128.0 and subnet mask
255.255.224.0. Which IP address range can be used for this organization?
- 10.10.128.0 to 10.10.160.255
- 10.10.128.0 to 10.10.159.255
- 10.10.128.0 to 10.10.192.255
- 10.10.128.0 to 10.10.0.159
- 10.10.128.0 to 10.10.159.0
47. What is the effect of using the Router# copy running-config startup-config
command on a router?
- The contents of ROM will change.
- The contents of RAM will change.
- The contents of NVRAM will change.
- The contents of flash will change.
48. Which three IPv4 addresses represent valid host addresses for a subnet? (Choose
three.)
- 10.1.12.79/28
- 10.1.12.113/28
- 10.1.12.32/28
- 10.1.11.5/27
- 10.1.11.97/27
- 10.1.11.128/27
49. Refer to the exhibit. The NAT functionality of the router is enabled to provide
Internet access to the PC. However, the PC is still unable to access the Internet.
Which IP address should be changed to 209.165.201.1 to enable the PC to access the
Internet?
- 192.168.1.191
- 192.168.1.101
- 192.168.1.1
- 192.168.1.254
50. Which three statements are true about network layer addressing? (Choose
three.)
- It uniquely identifies each host.
- It assists in forwarding packets across internetworks.
- It uses a logical 32-bit IPv4 address.
- It is not a configurable address.
- It is a physical address.
- It identifies the host from the first part of the address.
Bai 5
1. Which devices will create multiple collision domains in an Ethernet network?
(Choose two.)
Switch
router
2. How many collision domains are shown in the diagram?
Seven
3. Refer to the exhibit. The physical documentation shows a portion of the
internetwork of the ABC Company. Which segments will be free of
collisions?
segments 3, 4, and 5
4. Refer to the exhibit. Which diagram represents the network topology that
an administrator would prefer, and why would the administrator prefer it?
Diagram A. It will better provide available bandwidth to the hosts.
5. After an unsuccessful ping to the local router, the technician decides to
investigate the router. The technician observes that the lights and fan on the
router are not operational. In which layer of the OSI model is the problem
most likely occurring?
Physical
6. Refer to the exhibit. How many broadcast domains are shown?
Three
7. Refer to the exhibit. A network associate needs to establish an Ethernet
connection between Host A and Host B. However, the distance between the
two hosts is further than the cabling standards allow. Which two devices that
operate at the physical layer of the OSI can be used to allow Host A and
Host B to communicate? (Choose two.)
hub
repeater
8. Refer to the exhibit. What must be configured on Host B to allow it to
communicate with the file server? (Choose three.)
a unique host IP address
the subnet mask for the LAN
the default gateway address
9. Refer to the exhibit. Host A pings Host B. What can be concluded about
the source and destination addresses contained in the communication sent by
Router R5 when it forwards the ping out the Ethernet interface to Host B?
(Choose two.)
source MAC address: 5555.AAAA.6666
destination IP address: 192.168.10.134
10. What is the correct number of usable subnetworks and hosts for the IP
network address 192.168.35.0 subnetted with a /28 mask?
14 networks / 14 hosts
11. Refer to the exhibit. The network administrator wants to create a subnet
for the point-to-point connection between the two routers. Which
subnetwork mask would provide enough addresses for the point-to-point link
with the least number of wasted addresses?
255.255.255.252
12. Refer to the exhibit. A network technician is trying to determine the
correct IP address configuration for Host A. What is a valid configuration for
Host A?
IP address: 192.168.100.20; Subnet Mask: 255.255.255.240; Default Gateway:
192.168.100.17
13. Two peer hosts are exchanging data using TFTP. During the current
session, a datagram fails to arrive at the destination. Which statement is true
regarding the retransmission of the datagram?
Datagram retransmission is controlled by the application.
14. Which protocols are TCP/IP application layer protocols? (Choose two.)
TFTP
DNS
15. When using Category 5 UTP cable, which RJ-45 pin pairs are used to
exchange data between hosts on an Ethernet network?
1 and 2; 3 and 6
16. In the exhibit, the connections between the devices are labeled A, B, C,
D, and E. For each connection, what is the correct UTP cable to use?
A=rollover, B=straight, C=straight, D=crossover, E=crossover
17. Which cable diagram displays the end to end pinout for a crossover cable
used with Cisco devices?
Cable C
18. Which subnet masks could be used when subnetting a Class B IP address?
(Choose two.)
255.255.255.240
255.255.192.0
19. Which physical network topology is easy to monitor and troubleshoot,
easy to add new devices to as the network expands, but subject to complete
failure when a central hub or switch ceases to work?
Star
20. A computer technician is asked to make a network cable. One end of the
cable is pinned as a 568A and the other as a 568B. For what purposes can this
cable be used? (Choose two.)
to connect a switch to a switch
to connect a hub to a switch
21. Refer to the exhibit. Workstation 1 pings the Fa0/1 interface of Router 1.
Which MAC address will workstation 1 obtain during the ARP request for
this communication?
00-08-A3-B6-CE-02
22. Refer to the exhibit. A network administrator has configured a network
after subnetting the network number 192.168.0.0/28. Workstation 1 is not
able to communicate with Workstation 2. What is the cause of this loss in
communications?
Workstation 1 is not on the same network that the Router 1 LAN interface is
on.
23. Which network device creates the highest amount of latency?
Router
24. An Ethernet host receives a frame, calculates the FCS, and compares the
calculated FCS to the FCS received in the frame. The host finds that the two
FCS values do not match. What action will be taken by the host?
The host discards the frame.
25. A user initiates three simultaneous FTP connections from the local host
to the same FTP server. Which OSI layer is responsible for establishing and
managing these different FTP connections?
Session
26. A network administrator has installed a 24 port switch and connected 10
computers with 10/100 NICs. If the NICs are operating at 100 Mbps, how
much bandwidth is available for each computer to receive data?
100 Mbps
27. Based on the graphic above, which of the following occurs as each host
system comes on line in the topology?
The switch adds MAC address to the bridge table as each host sends a frame.
28. Consider the networks shown in the exhibit. Host A is sending packets to
host B. Which layer of the OSI model is being used when the router is
making the calculated decision to determine which interface to send the
packet out?
Network
29. Why would a company install a switch instead of a hub when building or
expanding a corporate network?
A switch provides more bandwidth by sending frames only out the port to
which the destination device is attached. A hub sends the frame out all ports
except the source port.
30. Refer to the exhibit. The hub and the switch are operating using factory
default settings. Which hosts will receive the frame if host A transmits a
broadcast frame?
Workstations B, C, D, E, and the router will receive the data.
31. Refer to the exhibit. What kind of Ethernet cable is represented?
straight-through cable
32. The ping command can be used to test connectivity between hosts. Which
OSI model layers are verified by this test?
Layers 1, 2 and 3
33. A technician is testing connectivity between the devices using the ping
command. Pings between Host B and Host A were successful. The technician
could not ping the R3 address 172.16.3.2 from Host A. The technician issued
ipconfig from Host A and saw the information displayed in the exhibit. What
is the most likely problem?
The default gateway of Host A is incorrect.
34. Why do vendors utilize the OSI model when designing networking
products?
It ensures greater compatibility and interoperability with equipment from
different vendors.
35. A router determines the path to deliver a packet. What layer of the OSI
model does this fact represent?
Network
36. How does a switch learn the addresses of hosts connected to its ports?
The switch reads the source MAC address on incoming frames and records it
in CAM.
37. Refer to the exhibit. The connections in the exhibit are labeled A through
E. Which of these indicate LAN links? (Choose two.)
link A
link E
38. A large company has a network that is constantly changing. The routing
tables in the routers need to be adjusted to reflect the changes in the routing
paths. What type of routing would the network administrator implement?
dynamic routing protocols
39. A network administrator has added a new switch to the network. The new
switch connects to an existing switch that is already installed. Which UTP
cable correctly connects the new switch to the existing switch?
crossover
40. Refer to the exhibit. A newly hired technician has a task of terminating
CAT 5 UTP cables. The network administrator visually examined the cables
the technician terminated. Some of the cables have connectors as shown in
the exhibit. What should the network administrator explain to the technician
about the cables?
The cable in Graphic A will produce more crosstalk.
41. Refer to the exhibit. What is the order of the TCP/IP Protocol Data Units
as data is moved as indicated through the OSI model?
bits, frames, packets, segments, data
42. Refer to the exhibit. Which type of UTP cable should be used to connect
Host A to Switch1?
straight-through
43. Which technologies are considered to be LAN technologies? (Choose
two.)
Token Ring
Ethernet
44. Refer to the topology in the graphic. Which characteristic does this type
of topology possess?
Communication continues in the event of a break in any one connection.
45. Which characteristics are common to both UDP and TCP? (Choose two.)
uses port numbers
classified as a transport layer protocol
46. A router interface has been assigned an IP address of 172.16.192.166 with
a mask of 255.255.255.248. To which subnet does the IP address belong?
172.16.192.160
47. Which type of address is 192.168.170.112/28?
subnetwork address
48. What is the decimal representation of the binary number 11111000?
248
49. What are important characteristics to consider when purchasing a
network interface card? (Choose two.)
media used on the network system
bus used on the computer
50. Which of the following statements are correct about CSMA/CD?
(Choose three.)
It is a media access method used in LANs.
When a device needs to transmit, it checks to see if the media is available.
Only one device can successfully transmit at a time.
Bai 6
1 A PC can not connect to any remote websites, ping its default
gateway, or ping a printer that is functioning properly on the local
network segment. Which action will verify that the TCP/IP stack is
functioning correctly on this PC?
Use the ipconfig /all command at the hostıs command prompt.
X Use the ping 127.0.0.1 command at the command prompt.
Use the traceroute command at the command prompt to identify
any failures on the path to the gateway.
Use FTP to check for connectivity to remote sites.
Download a troubleshooting tool from the PC manufacturer's
website.
2 Refer to the exhibit. Which set of devices contains only
intermediary devices?
X A, B, D, G
A, B, E, F
C, D, G, I
G, H, I, J
3 Refer to the exhibit. When computer A sends a frame to
computer D, what computers receive the frame?
X only computer D
only computer A and computer D
only computer B, computer C, and computer D
all computers
4 Which password is automatically encrypted when it is created?
vty
aux
console
X enable secret
enable password
5 Which three statements characterize the transport layer
protocols? (Choose three.)
X TCP and UDP port numbers are used by application layer
protocols.
TCP uses port numbers to provide reliable transportation of IP
packets.
UDP uses windowing and acknowledgments for reliable transfer of
data.
X TCP uses windowing and sequencing to provide reliable transfer
of data.
X TCP is a connection-oriented protocol. UDP is a connectionless
protocol.
6 Which type of media is immune to EMI and RFI? (Choose two.)
10 Base-T
10 Base-2
10 Base-5
X 100 Base-FX
100 Base TX
X 1000 Base LX
7 Refer to the exhibit. A technician is working on a network
problem that requires verification of the router LAN interface. What
address should be pinged from this host to confirm that the router
interface is operational?
127.0.0.1
192.168.64.196
X 192.168.254.1
192.168.254.9
192.168.254.254
8 Refer to the exhibit. The diagram represents the process of
sending email between clients. Select the list below that correctly
identifies the component or protocol used at each numbered stage
of the diagram.
1.MUA 2.MDA 3.MTA 4.SMTP 5.MTA 6.POP 7.MDA 8.MUA
1.MUA 2.POP 3.MDA 4.SMTP 5.MTA 6.MDA 7.SMTP 8.MUA
1.MUA 2.POP 3.SMTP 4.MDA 5.MTA 6.SMTP 7.POP 8.MUA
1.MDA 2.SMTP 3.MTA 4.SMTP 5.MTA 6.MUA 7.POP 8.MDA
X 1.MUA 2.SMTP 3.MTA 4.SMTP 5.MTA 6.MDA 7.POP 8.MUA
9 Refer to the exhibit. What function does router RT_A need to
provide to allow Internet access for hosts in this network?
X address translation
DHCP services
ftpd
web server
10 Refer to the exhibit. The network containing router B is
experiencing problems. A network associate has isolated the issue
in this network to router B? What action can be preformed to
correct the network issue?
issue the ip address command on interface FastEthernet 0/0
X issue the no shutdown command on interface FastEthernet 0/1
issue the clock rate command on interface Serial 0/0/0
issue the description command on interface Serial 0/0/1
11 Which three IPv4 addresses represent a broadcast for a
subnet? (Choose three.)
X 172.16.4.63 /26
172.16.4.129 /26
X 172.16.4.191 /26
172.16.4.51 /27
X 172.16.4.95 /27
172.16.4.221 /27
12 What are three characteristics of CSMA/CD? (Choose three.)
Devices can be configured with a higher transmission priority.
A jam signal indicates that the collision has cleared and the media
is not busy.
X A device listens and waits until the media is not busy before
transmitting.
The device with the electronic token is the only one that can
transmit after a collision.
X All of the devices on a segment see data that passes on the
network medium.
X After detecting a collision, hosts can attempt to resume
transmission after a random time delay has expired.
13 In a Cisco IOS device, where is the startup-configuration file
stored?
Flash
X NVRAM
RAM
ROM
14 A routing issue has occurred in you internetwork. Which of the
following type of devices should be examined to isolate this error?
access point
host
hub
X router
switch
15 Which OSI layer protocol does IP rely on to determine whether
packets have been lost and to request retransmission?
application
presentation
X transport
16 Due to a security violation, the router passwords must be
changed. What information can be learned from the following
configuration entries? (Choose two.)
Router(config)# line vty 0 3
Router(config-line)# password c13c0
Router(config-line)# login
The entries specify three Telnet lines for remote access.
X The entries specify four Telnet lines for remote access.
The entries set the console and Telnet password to "c13c0".
Telnet access will be denied because the Telnet configuration is
incomplete.
X Access will be permitted for Telnet using "c13c0" as the
password.
17 Which prompt represents the appropriate mode used for the
copy running-config startup-config command ?
Switch-6J>
X Switch-6J#
Switch-6J(config)#
Switch-6J(config-if)#
Switch-6J(config-line)#
18 Which combination of network id and subnet mask correctly
identifies all IP addresses from 172.16.128.0 through
172.16.159.255?
172.16.128.0 255.255.255.224
172.16.128.0 255.255.0.0
X 172.16.128.0 255.255.192.0
172.16.128.0 255.255.224.0
172.16.128.0 255.255.255.192
19 When must a router serial interface be configured with the clock
rate command?
when the interface is functioning as a DTE device
when the interface timers have been cleared
when the connected DTE device is shut down
X when the interface is functioning as a DCE device
20 When connectionless protocols are implemented at the lower
layers of the OSI model, what are usually used to acknowledge the
data receipt and request the retransmission of missing data?
connectionless acknowledgements
X upper-layer connection-oriented protocols
Network layer IP protocols
Transport layer UDP protocols
21 A technician is asked to secure the privileged EXEC mode of a
switch by requiring a password. Which type of password would
require this login and be considered the most secure?
console
enable
X enable secret
VTY
22 Refer to the exhibit. What is required on host A for a network
technician to create the initial configuration on RouterA?
a FTP client
a telnet client
X a terminal emulation program
a web browser
23 Refer to the exhibit. A network administrator remotely accesses
the CLI of RouterB from PC1. Which two statements are true about
the application layer protocol that is used to make this connection?
(Choose two.)
The data is encrypted.
X The connection type is called a VTY session.
A server process is running on PC1.
A GET request is sent to RouterB.
X The application name is the same for the service, protocol, and
client.
24 The Layer 4 header contains which type of information to aid in
the delivery of data?
X service port number
host logical address
device physical address
virtual connection identifier
25 Refer to the exhibit. What two facts can be determined about
the exhibited topology? (Choose two.)
X A single broadcast domain is present
Two logical address ranges are required.
Three broadcast domains are shown.
Four networks are needed.
X Five collision domains exist.
26 Refer to the exhibit. A network technician is trying to determine
the correct IP address configuration for Host A. What is a valid
configuration for Host A?
IP address: 192.168.100.19; Subnet Mask: 255.255.255.248;
Default Gateway: 192.16.1.2
X IP address: 192.168.100.20; Subnet Mask: 255.255.255.240;
Default Gateway: 192.168.100.17
IP address: 192.168.100.21; Subnet Mask: 255.255.255.248;
Default Gateway: 192.168.100.18
IP address: 192.168.100.22; Subnet Mask: 255.255.255.240;
Default Gateway: 10.1.1.5
IP address: 192.168.100.30; Subnet Mask: 255.255.255.240;
Default Gateway: 192.168.1.1
IP address: 192.168.100.31; Subnet Mask: 255.255.255.240;
Default Gateway: 192.168.100.18
27 Refer to the exhibit. Cable 1 and cable 2 have the ends wired
for specific physical layer requirements. The table lists each
segment by number and the cable which has been installed by the
network technician between the network components on that
segment. From the data given, which segments have the correct
cable installed? (Choose three.)
X segment1
segment2
X segment3
X segment4
segment5
28 What is true regarding network layer addressing? (Choose
three.)
uses a flat structure
prevent broadcasts
X heirarchical
X uniquely identifies each host
48 bits in length
X contains a network portion
29 Refer to the exhibit. A router, whose table is shown, receives a
packet that is destined for 192.168.1.4. How will router treat the
packet?
The packet will be dropped.
The packet will be forwarded via FastEthernet 0/0.
X The packet will be forwarded to the destination host.
The packet will be forwarded to the 192.168.1.3 next-hop address.
30 Refer to the exhibit. Which two statements describe the
information that is represented in the header? (Choose two.)
This is a server response.
The UDP protocol is being used.
X The destination port indicates a Telnet session.
X The return segment will contain a source port of 23.
The next session originated from the client of this session will use
the source port number 13358.
31 Refer to the exhibit. What is the correct destination socket
number for a web page request from Host A to the web server?
00-08-a3-b6-ce-46
X 198.133.219.25:80
http://www.cisco.com
C 198.133.219.0/24 is directly connected, FastEthernet0/0
32 During the encapsulation process, which identifiers are added
at the transport layer?
two networks routing the packets
X two applications communicating the data
two hosts at either end of the communication
two nodes on the local network exchanging the frame
33 Refer to the exhibit. A student has wired each end of a CAT 5e
cable as shown. What is the result? (Choose two.)
The cable is unusable and must be rewired.
The cable is suitable for use as a Gigabit Ethernet straight-through.
X The cable is suitable for use as a Fast Ethernet crossover.
The cable is suitable for use as a rollover cable.
The cable is suitable for use as a Gigabit Ethernet crossover.
X The cable is suitable for use between two 100 Mbps Auto-MDIX
capable switches.
34 Refer to the exhibit. Assume all devices are using default
configurations. How many subnets are required to address the
topology that is shown?
1
X 3
4
5
7
35 Refer to the exhibit. On the basis of the IP configuration that is
shown, what is the reason that Host A and Host B are unable to
communicate outside the local network?
Host A was assigned a network address.
Host B was assigned a multicast address.
Host A and Host B belong to different networks.
X The gateway address was assigned a broadcast address.
36 Refer to the exhibit. Each media link is labeled. What type of
cable should be used to connect the different devices?
Connection 1 - rollover cable
Connection 2 - straight-through cable
Connection 3 - crossover cable
Connection 1 - crossover cable
Connection 2 - rollover cable
Connection 3 - crossover cable
Connection 1 - straight-through cable
Connection 2 - crossover cable
Connection 3 - crossover cable
X Connection 1 - straight-through cable
Connection 2 - crossover cable
Connection 3 - straight-through cable
Connection 1 - crossover cable
Connection 2 - straight-through cable
Connection 3 - crossover cable
37 Refer to the exhibit. What does the IP address 192.168.33.2
represent?
The host's default gateway.
The host's IP address.
X The host's primary domain name server.
The IP address of the website resolver1.mooki.local.
The IP address of the host's homepage.
38 Refer to the exhibit. What two facts can be determined from the
information that is given? (Choose two.)
This exchange is part of the three-way handshake.
The source port indicates that a Telnet session has been initiated.
The data is flowing from server to client.
X The destination port indicates that an HTTP session has been
initiated.
X The data listed is associated with the transport layer.
The source port does not support communication with the
destination port that is listed.
39 Which of the following are the address ranges of the private IP
addresses? (Choose three.)
X 10.0.0.0 to 10.255.255.255
200.100.50.0 to 200.100.25.255
150.150.0.0 to 150.150.255.255
X 172.16.0.0 to 172.31.255.255
X 192.168.0.0 to 192.168.255.255
127.16.0.0 to 127.31.255.255
40 Which two functions of the OSI model occur at layer two?
(Choose two.)
X physical addressing
encoding
routing
cabling
X media access control
41 Which range of port numbers are reserved for services that are
commonly used by applications that run on servers?
0 to 255
X 0 to 1023
1024 to 49151
49152 to 65535
42 As network administrator, what is the subnet mask that allows
510 hosts given the IP address 172.30.0.0?
255.255.0.0
255.255.248.0
255.255.252.0
X 255.255.254.0
255.255.255.0
255.255.255.128
43 Refer to the exhibit. The tracert command is initiated from PC1
to the destination PC4. Which device will send a response to the
initial packet from PC1?
X London
Paris
Athens
Ankara
PC4
44 Refer to the exhibit. Host A is transmitting data to host B. What
addresses will host A use to for the destination IP and MAC
addresses in this communication?
Destination MAC: BBBB:BBBB:BBBB Destination IP: 172.22.0.62
Destination MAC: DDDD:DDDD:DDDD Destination IP: 172.22.0.75
Destination MAC: EEEE:EEEE:EEEE Destination IP: 172.22.0.62
Destination MAC: BBBB:BBBB:BBBB Destination IP: 172.22.0.75
X Destination MAC: EEEE:EEEE:EEEE Destination IP: 172.22.0.75
Destination MAC: DDDD:DDDD:DDDD Destination IP: 172.22.0.94
45 Refer to the exhibit. Which logical topology best describes the
exhibited network?
star
point-to-point
X multiaccess
mesh
46 Examine the graphic with current configurations. Host A in the
Clerical offices failed and was replaced. Although a ping to
127.0.0.1 was successful, the replacement computer can not
access the company network. What is the likely cause of the
problem?
IP address incorrectly entered
network cables unplugged
X subnet mask incorrectly entered
network card failure
47 Refer to the exhibit. With the router running NAT, what IP
addresses can be applied to the computer to allow access to the
Internet? (Choose three.)
192.168.18.38
192.168.18.48
X 192.168.18.49
X 192.168.18.52
X 192.168.18.59
192.168.18.63
48 Refer to the exhibit. What three statements are true about the
IP configuration that is shown? (Choose three.)
X The address that is assigned to the computer represents private
addressing.
X The computer is unable to communicate outside of the local
network.
The network of this computer can have 126 hosts.
X The prefix of the computer address is /27.
The IP address that is assigned to the computer is routable on the
Internet.
The IP address that is assigned to the computer is a broadcast
address.
49 Refer to the exhibit. Host A attempts to establish a TCP/IP
session with host C. During this attempt, a frame was captured with
the source MAC address 0050.7320.D632 and the destination MAC
address 0030.8517.44C4. The packet inside the captured frame
has an IP source address 192.168.7.5, and the destination IP
address is 192.168.219.24. At which point in the network was this
packet captured?
leaving host A
leaving ATL
X leaving Dallas
leaving NYC
50 Which of the following OSI layers offers reliable, connection-
oriented data communication services?
application
presentation
X transport
network
Bai 7
1 A PC can not connect to any remote websites, ping its default gateway, or ping a printer
that is functioning properly on the local network segment. Which action will verify that
the TCP/IP stack is functioning correctly on this PC?
Use the ipconfig /all command at the host%s command prompt.
----> Use the ping 127.0.0.1 command at the command prompt.
Use the traceroute command at the command prompt to identify any failures on the path
to the gateway.
Use FTP to check for connectivity to remote sites.
Download a troubleshooting tool from the PC manufacturer's website.
2 Refer to the exhibit. Which set of devices contains only intermediary devices?
----> A, B, D, G
A, B, E, F
C, D, G, I
G, H, I, J
3 Refer to the exhibit. When computer A sends a frame to computer D, what computers
receive the frame?
----> only computer D
only computer A and computer D
only computer B, computer C, and computer D
all computers
4 Which password is automatically encrypted when it is created?
vty
aux
console
----> enable secret
enable password
5 Which three statements characterize the transport layer protocols? (Choose three.)
----> TCP and UDP port numbers are used by application layer protocols.
TCP uses port numbers to provide reliable transportation of IP packets.
UDP uses windowing and acknowledgments for reliable transfer of data.
----> TCP uses windowing and sequencing to provide reliable transfer of data.
----> TCP is a connection-oriented protocol. UDP is a connectionless protocol.
6 Which type of media is immune to EMI and RFI? (Choose two.)
10 Base-T
10 Base-2
10 Base-5
----> 100 Base-FX
100 Base TX
----> 1000 Base LX
7 Refer to the exhibit. A technician is working on a network problem that requires
verification of the router LAN interface. What address should be pinged from this host to
confirm that the router interface is operational?
127.0.0.1
192.168.64.196
----> 192.168.254.1
192.168.254.9
192.168.254.254
8 Refer to the exhibit. The diagram represents the process of sending email between
clients. Select the list below that correctly identifies the component or protocol used at
each numbered stage of the diagram.
1.MUA 2.MDA 3.MTA 4.SMTP 5.MTA 6.POP 7.MDA 8.MUA
1.MUA 2.POP 3.MDA 4.SMTP 5.MTA 6.MDA 7.SMTP 8.MUA
1.MUA 2.POP 3.SMTP 4.MDA 5.MTA 6.SMTP 7.POP 8.MUA
1.MDA 2.SMTP 3.MTA 4.SMTP 5.MTA 6.MUA 7.POP 8.MDA
----> 1.MUA 2.SMTP 3.MTA 4.SMTP 5.MTA 6.MDA 7.POP 8.MUA
9 Refer to the exhibit. What function does router RT_A need to provide to allow Internet
access for hosts in this network?
----> address translation
DHCP services
ftpd
web server
10 Refer to the exhibit. The network containing router B is experiencing problems. A
network associate has isolated the issue in this network to router B? What action can be
preformed to correct the network issue?
issue the ip address command on interface FastEthernet 0/0
----> issue the no shutdown command on interface FastEthernet 0/1
issue the clock rate command on interface Serial 0/0/0
issue the description command on interface Serial 0/0/1
11 Which three IPv4 addresses represent a broadcast for a subnet? (Choose three.)
----> 172.16.4.63 /26
172.16.4.129 /26
----> 172.16.4.191 /26
172.16.4.51 /27
----> 172.16.4.95 /27
172.16.4.221 /27
12 What are three characteristics of CSMA/CD? (Choose three.)
Devices can be configured with a higher transmission priority.
A jam signal indicates that the collision has cleared and the media is not busy.
----> A device listens and waits until the media is not busy before transmitting.
The device with the electronic token is the only one that can transmit after a collision.
----> All of the devices on a segment see data that passes on the network medium.
----> After detecting a collision, hosts can attempt to resume transmission after a random
time delay has expired.
13 In a Cisco IOS device, where is the startup-configuration file stored?
Flash
----> NVRAM
RAM
ROM
14 A routing issue has occurred in you internetwork. Which of the following type of
devices should be examined to isolate this error?
access point
host
hub
----> router
switch
15 Which OSI layer protocol does IP rely on to determine whether packets have been lost
and to request retransmission?
application
presentation
----> transport
16 Due to a security violation, the router passwords must be changed. What information
can be learned from the following configuration entries? (Choose two.)
Router(config)# line vty 0 3
Router(config-line)# password c13c0
Router(config-line)# login
The entries specify three Telnet lines for remote access.
----> The entries specify four Telnet lines for remote access.
The entries set the console and Telnet password to "c13c0".
Telnet access will be denied because the Telnet configuration is incomplete.
----> Access will be permitted for Telnet using "c13c0" as the password.
17 Which prompt represents the appropriate mode used for the copy running-config
startup-config command ?
Switch-6J>
----> Switch-6J#
Switch-6J(config)#
Switch-6J(config-if)#
Switch-6J(config-line)#
18 Which combination of network id and subnet mask correctly identifies all IP addresses
from 172.16.128.0 through 172.16.159.255?
172.16.128.0 255.255.255.224
172.16.128.0 255.255.0.0
172.16.128.0 255.255.192.0
----> 172.16.128.0 255.255.224.0
172.16.128.0 255.255.255.192
19 When must a router serial interface be configured with the clock rate command?
when the interface is functioning as a DTE device
when the interface timers have been cleared
when the connected DTE device is shut down
----> when the interface is functioning as a DCE device
20 When connectionless protocols are implemented at the lower layers of the OSI model,
what are usually used to acknowledge the data receipt and request the retransmission of
missing data?
connectionless acknowledgements
----> upper-layer connection-oriented protocols
Network layer IP protocols
Transport layer UDP protocols
21 A technician is asked to secure the privileged EXEC mode of a switch by requiring a
password. Which type of password would require this login and be considered the most
secure?
console
enable
----> enable secret
VTY
22 Refer to the exhibit. What is required on host A for a network technician to create the
initial configuration on RouterA?
a FTP client
a telnet client
----> a terminal emulation program
a web browser
23 Refer to the exhibit. A network administrator remotely accesses the CLI of RouterB
from PC1. Which two statements are true about the application layer protocol that is used
to make this connection? (Choose two.)
The data is encrypted.
----> The connection type is called a VTY session.
A server process is running on PC1.
A GET request is sent to RouterB.
----> The application name is the same for the service, protocol, and client.
24 The Layer 4 header contains which type of information to aid in the delivery of data?
----> service port number
host logical address
device physical address
virtual connection identifier
25 Refer to the exhibit. What two facts can be determined about the exhibited topology?
(Choose two.)
----> A single broadcast domain is present
Two logical address ranges are required.
Three broadcast domains are shown.
Four networks are needed.
----> Five collision domains exist.
26 Refer to the exhibit. A network technician is trying to determine the correct IP address
configuration for Host A. What is a valid configuration for Host A?
IP address: 192.168.100.19; Subnet Mask: 255.255.255.248; Default Gateway:
192.16.1.2
----> IP address: 192.168.100.20; Subnet Mask: 255.255.255.240; Default Gateway:
192.168.100.17
IP address: 192.168.100.21; Subnet Mask: 255.255.255.248; Default Gateway:
192.168.100.18
IP address: 192.168.100.22; Subnet Mask: 255.255.255.240; Default Gateway: 10.1.1.5
IP address: 192.168.100.30; Subnet Mask: 255.255.255.240; Default Gateway:
192.168.1.1
IP address: 192.168.100.31; Subnet Mask: 255.255.255.240; Default Gateway:
192.168.100.18
27 Refer to the exhibit. Cable 1 and cable 2 have the ends wired for specific physical
layer requirements. The table lists each segment by number and the cable which has been
installed by the network technician between the network components on that segment.
From the data given, which segments have the correct cable installed? (Choose three.)
----> segment1
segment2
----> segment3
----> segment4
segment5
28 What is true regarding network layer addressing? (Choose three.)
uses a flat structure
prevent broadcasts
----> heirarchical
----> uniquely identifies each host
48 bits in length
----> contains a network portion
29 Refer to the exhibit. A router, whose table is shown, receives a packet that is destined
for 192.168.1.4. How will router treat the packet?
The packet will be dropped.
The packet will be forwarded via FastEthernet 0/0.
----> The packet will be forwarded to the destination host.
The packet will be forwarded to the 192.168.1.3 next-hop address.
30 Refer to the exhibit. Which two statements describe the information that is represented
in the header? (Choose two.)
This is a server response.
The UDP protocol is being used.
----> The destination port indicates a Telnet session.
----> The return segment will contain a source port of 23.
The next session originated from the client of this session will use the source port number
13358.
31 Refer to the exhibit. What is the correct destination socket number for a web page
request from Host A to the web server?
00-08-a3-b6-ce-46
----> 198.133.219.25:80
http://www.cisco.com
C 198.133.219.0/24 is directly connected, FastEthernet0/0
32 During the encapsulation process, which identifiers are added at the transport layer?
two networks routing the packets
----> two applications communicating the data
two hosts at either end of the communication
two nodes on the local network exchanging the frame
33 Refer to the exhibit. A student has wired each end of a CAT 5e cable as shown. What
is the result? (Choose two.)
The cable is unusable and must be rewired.
The cable is suitable for use as a Gigabit Ethernet straight-through.
----> The cable is suitable for use as a Fast Ethernet crossover.
The cable is suitable for use as a rollover cable.
The cable is suitable for use as a Gigabit Ethernet crossover.
----> The cable is suitable for use between two 100 Mbps Auto-MDIX capable switches.
34 Refer to the exhibit. Assume all devices are using default configurations. How many
subnets are required to address the topology that is shown?
1
----> 3
4
5
7
35 Refer to the exhibit. On the basis of the IP configuration that is shown, what is the
reason that Host A and Host B are unable to communicate outside the local network?
Host A was assigned a network address.
Host B was assigned a multicast address.
Host A and Host B belong to different networks.
----> The gateway address was assigned a broadcast address.
36 Refer to the exhibit. Each media link is labeled. What type of cable should be used to
connect the different devices?
Connection 1 - rollover cable
Connection 2 - straight-through cable
Connection 3 - crossover cable
Connection 1 - crossover cable
Connection 2 - rollover cable
Connection 3 - crossover cable
Connection 1 - straight-through cable
Connection 2 - crossover cable
Connection 3 - crossover cable
----> Connection 1 - straight-through cable
Connection 2 - crossover cable
Connection 3 - straight-through cable
Connection 1 - crossover cable
Connection 2 - straight-through cable
Connection 3 - crossover cable
37 Refer to the exhibit. What does the IP address 192.168.33.2 represent?
The host's default gateway.
The host's IP address.
----> The host's primary domain name server.
The IP address of the website resolver1.mooki.local.
The IP address of the host's homepage.
38 Refer to the exhibit. What two facts can be determined from the information that is
given? (Choose two.)
This exchange is part of the three-way handshake.
The source port indicates that a Telnet session has been initiated.
The data is flowing from server to client.
----> The destination port indicates that an HTTP session has been initiated.
X The data listed is associated with the transport layer.
The source port does not support communication with the destination port that is listed.
39 Which of the following are the address ranges of the private IP addresses? (Choose
three.)
----> 10.0.0.0 to 10.255.255.255
200.100.50.0 to 200.100.25.255
150.150.0.0 to 150.150.255.255
----> 172.16.0.0 to 172.31.255.255
----> 192.168.0.0 to 192.168.255.255
127.16.0.0 to 127.31.255.255
40 Which two functions of the OSI model occur at layer two? (Choose two.)
----> physical addressing
encoding
routing
cabling
----> media access control
41 Which range of port numbers are reserved for services that are commonly used by
applications that run on servers?
0 to 255
----> 0 to 1023
1024 to 49151
49152 to 65535
42 As network administrator, what is the subnet mask that allows 510 hosts given the IP
address 172.30.0.0?
255.255.0.0
255.255.248.0
255.255.252.0
----> 255.255.254.0
255.255.255.0
255.255.255.128
43 Refer to the exhibit. The tracert command is initiated from PC1 to the destination
PC4. Which device will send a response to the initial packet from PC1?
----> London
Paris
Athens
Ankara
PC4
44 Refer to the exhibit. Host A is transmitting data to host B. What addresses will host A
use to for the destination IP and MAC addresses in this communication?
Destination MAC: BBBB:BBBB:BBBB Destination IP: 172.22.0.62
Destination MAC: DDDD:DDDD:DDDD Destination IP: 172.22.0.75
Destination MAC: EEEE:EEEE:EEEE Destination IP: 172.22.0.62
Destination MAC: BBBB:BBBB:BBBB Destination IP: 172.22.0.75
----> Destination MAC: EEEE:EEEE:EEEE Destination IP: 172.22.0.75
Destination MAC: DDDD:DDDD:DDDD Destination IP: 172.22.0.94
45 Refer to the exhibit. Which logical topology best describes the exhibited network?
star
point-to-point
----> multiaccess
mesh
46 Examine the graphic with current configurations. Host A in the Clerical offices failed
and was replaced. Although a ping to 127.0.0.1 was successful, the replacement computer
can not access the company network. What is the likely cause of the problem?
IP address incorrectly entered
network cables unplugged
----> subnet mask incorrectly entered
network card failure
47 Refer to the exhibit. With the router running NAT, what IP addresses can be applied to
the computer to allow access to the Internet? (Choose three.)
192.168.18.38
192.168.18.48
----> 192.168.18.49
----> 192.168.18.52
----> 192.168.18.59
192.168.18.63
48 Refer to the exhibit. What three statements are true about the IP configuration that is
shown? (Choose three.)
----> The address that is assigned to the computer represents private addressing.
----> The computer is unable to communicate outside of the local network.
The network of this computer can have 126 hosts.
----> The prefix of the computer address is /27.
The IP address that is assigned to the computer is routable on the Internet.
The IP address that is assigned to the computer is a broadcast address.
49 Refer to the exhibit. Host A attempts to establish a TCP/IP session with host C.
During this attempt, a frame was captured with the source MAC address 0050.7320.D632
and the destination MAC address 0030.8517.44C4. The packet inside the captured frame
has an IP source address 192.168.7.5, and the destination IP address is 192.168.219.24.
At which point in the network was this packet captured?
leaving host A
leaving ATL
----> leaving Dallas
leaving NYC
50 Which of the following OSI layers offers reliable, connection-oriented data
communication services?
application
presentation
----> transport
network
Bai 8
Wednesday, June 10, 2009
Cisco CCNA1 Final test version 4.0 (91%)
at 4:00 PM ·
1.
Host A attempts to establish a TCP/IP session with host C...
Refer to the exhibit. Host A attempts to establish a TSP/IP session with host C.
During this attempt, a frame was captured at the FastEthernet interface fa0/1 of
router Y. The packet inside the captured frame has the IP source address 172.16.1.5
and the destination IP address is 172.16.7.24 . What is the source MAC address of
the frame at the time of capture?
0040.8596.DE82
**0060.7320.B826
060.7320.D632
0010.4F74.AC09
0040.8596.DE81
2.
Refer to the exhibit. An employee wants to access the organization intranet from
home. Which intermediary device should be used to connect the organization
intranet to the Internet to enable this access?
hub
switch
**router
wireless access point
3.
The host was disconnected from switch 2 and connected to switch 1. Which combination
of IP address, subnet mask, and default gateway should be assigned to this host to allow it
to function in the network?
Refer to the exhibit. The host was disconnected from switch 2 and connected to
switch 1. Which combination of IP address, subnet mask, and default gateway
should be assigned to this host to allow it to function in the network?
IP address: 10.10.9.37 Subnet mask: 255.255.255.240 Default gateway: 10.10.9.35
**IP address: 10.10.9.37 Subnet mask: 255.255.255.224 Default gateway: 10.10.9.35
IP address: 10.10.9.29 Subnet mask: 255.255.255.248 Default gateway: 10.10.9.35
IP address: 10.10.9.32 Subnet mask: 255.255.255.224 Default gateway: 10.10.9.35
IP address: 10.10.9.37 Subnet mask: 255.255.255.224 Default gateway: 196.1.105.6
IP address: 10.10.9.63 Subnet mask: 255.255.255.224 Default gateway: 10.10.9.35
4. Which range of port numbers is assigned dynamically to client applications when
initiating a connection to the server?
0 to 255
**49152 to 65535
1024 to 49151
0 to 1023
5.
Refer to the exhibit. The diagram represents the process of sending e-mail between
clients. Which list correctly identifies the component or protocol used at each
numbered stage of the diagram?
1.MUA 2.MDA 3.MTA 4.SMTP 5.MTA 6.POP 7.MDA 8.MUA
1.MUA 2.POP 3.MDA 4.SMTP 5.MTA 6.MDA 7.SMTP 8.MUA
1.MUA 2.POP 3.SMTP 4.MDA 5.MTA 6.SMTP 7.POP 8.MUA
**1.MUA 2.SMTP 3.MTA 4.SMTP 5.MTA 6.MDA 7.POP 8.MUA
6. Refer to the exhibit. While configuring a network, a technician wired each end of
a Category 5e cable as shown. Which two statements are true about this setup?
(Choose two.)
**The cable is suitable for connecting a switch to a router Ethernet port.
**The cable is suitable for connecting dissimilar types of devices.
The cable is unusable and must be rewired.
The cable is terminated in a way that the transmit pin is wired to the receive pin.
The cable simulates a point-to-point WAN link.
7. Refer to the exhibit. Which two facts can be determined about the topology?
(Choose two.)
**Four collision domains are present.
One logical network is represented.
**Two broadcast domains are present.
Three networks are needed.
Three logical address ranges are required.
8.
nslookup command on the PC
Refer to exhibit. A technician uses the nslookup command on the PC and views the
output that is displayed in the exhibit. What is the IP address of the primary
domain name server used by the host?
**10.10.10.32
192.168.1.5
192.168.1.99
192.168.2.100
9. Which subnet mask will allow 2040 hosts per subnet on the IP network 10.0.0.0?
255.255.0.0
255.255.254.0
255.255.252.0
**255.255.248.0
255.255.240.0
255.255.255.128
10. Which three addresses belong to the category of private IP addresses? (Choose
three.)
**10.0.0.1
127.0.0.1
150.0.0.1
**172.16.0.1
**192.168.0.1
200.100.50.1
11.
Host A is transmitting data to host B. Which address combination will be used as the data
leaves the Router1 Fa0/1 interface?
Refer to the exhibit. Host A is transmitting data to host B. Which address
combination will be used as the data leaves the Router1 Fa0/1 interface?
Destination IP: 192.168.72.2 Source MAC: 0007.C2B4.3421
**Destination IP: 192.168.10.4 Source MAC: 0030.8596.DE81
Destination IP: 192.168.10.4 Source MAC: 0007.C2B4.3421
Destination IP: 192.168.72.2 Source MAC: 0030.8596.DE81
12. Which memory contents will change as a result of using the Router# erase
startup-config command on a router?
RAM
ROM
flash
**NVRAM
13. What are two characteristics of the data link layer? (Choose two.)
**It segments and reorders the data.
It exchanges the frames between nodes.
**It defines the method by which network devices place data onto the media.
It manages the transfer of data between the processes that run on each host.
It retrieves signals from the media and restores them to their bit representations.
14. Refer to the exhibit. The NAT functionality of the router is enabled to provide
the PC with Internet access. Which IP address can be assigned to router interface
Fa0/0?
10.0.0.1
172.16.1.1
**209.165.201.1
192.168.1.1
15.
A user wants to access the Internet from the PC. A part of the running configuration of
the router is shown
Refer to the exhibit. A user wants to access the Internet from the PC. A part of the
running configuration of the router is shown. Which default gateway IP address
should be configured at the PC to enable this access?
10.1.192.2
10.1.192.54
**10.1.192.1
192.31.7.1
16. Refer to the exhibit. A network technician wants to connect host A to the console
of a Cisco switch to initialize the configuration. What type of cable is required for
this connection?
straight-through cable
crossover cable
**rollover cable
serial cable
17. A network administrator wants to restrict access to the router privileged EXEC
mode. Which password should the administrator use?
**enable
aux
console
VTY
18. What are three characteristics of CSMA/CD? (Choose three.)
**Devices listen to the media and transmit data only when they cannot detect
another signal on the media.
**All devices on the media can hear all communications.
Devices communicate based on a configured priority.
After a collision occurs, the devices that caused the collision have first priority when
attempting to retransmit.
**When a collision occurs, all devices stop transmitting for a randomly generated
period of time.
CSMA/CD uses a token system to avoid collisions.
19. Refer to the exhibit. The router of the company failed and was replaced. After
the replacement, hosts C and D in the Education office are able to ping each other,
but they are unable to access the hosts in the Accounts office. What is the likely
cause of the problem?
The IP address at the fa0/0 interface of the router is incorrectly configured.
**The subnet mask at the fa0/1 interface of the router is incorrectly entered.
The IP address at the serial interface of the router is incorrectly configured.
The hosts in the Accounts office are not on the same subnet as the hosts in the Education
office.
20. Refer to the exhibit. Host A and B are unable to communicate with each other.
What is the reason for this?
Host A is assigned a network address.
Host B is assigned a multicast address.
Host A and host B belong to different networks.
**The gateway addresses are network addresses.
21. Refer to the exhibit. A user wants to view the current configuration. The output
of the ipconfig/all command is displayed in the exhibit. What three facts can be
determined from the output? (Choose three.)
The IP address is obtained from the DHCP server.
**This PC cannot communicate with other networks.
**The network can have 14 hosts.
The prefix of the computer address is /25.
The IP address is routable on the Internet.
**The assigned address is a private address.
22. Which two types of media can provide bandwidth up to 1 Gb/s? (Choose two.)
10 BASE-T
100 BASE-T
100 BASE-FX
**1000 BASE-TX
**1000 BASE-SX
23. Refer to the exhibit. RouterB is configured properly.
The Ethernet interface Fa0/0 of RouterA is configured with the use of the
commands that are shown However, a ping from the Fa0/0 interface of RouterA to
the Fa0/0 interface of RouterB is unsuccessful. What action should be taken on
RouterA to solve this problem?
Use the description command on the FastEthernet interface Fa0/0.
Configure the clock rate of the FastEthernet interface Fa0/0.
**Use the no shutdown command on the FastEthernet interface Fa0/0.
Reboot the router.
24. Refer to the exhibit. Host A wants to connect to host B on a different network.
Which three IP addresses can be assigned to host A to enable this connectivity?
(Choose three.)
172.16.11.36
172.16.11.95
**172.16.11.88
**172.16.11.70
172.16.11.64
**172.16.11.67
25. Refer to the exhibit. Host A wants to access e-mail. Which destination socket
number will be used to communicate this request?
10.10.1.2:53
0007.A7B8.0008:25
10.10.1.3:23
**10.10.1.3:25
26. A network administrator uses the copy startup-config running-config command
on a router to make configuration changes. Which component is affected by this
command?
ROM
**NVRAM
RAM
flash
27. Refer to the exhibit. In a network, Hosts A and B are exchanging segments at the
transport layer. Which two statements are true about this exchange? (Choose two.)
Host A is transferring files to host B using FTP.
**Host A will send the next segment containing data for this session starting with
byte number 11
The segment from the destination host indicates that 11 bytes have been received
successfully
**Host A is initiating a Telnet session to host B
Host B can send the next segment of the data starting with byte number 2
28. How does the transport layer allow a host to maintain multiple, simultaneous
communication streams across different applications?
It uses error control mechanisms.
**It uses a connectionless protocol only for multiple simultaneous transmissions.
It uses multiple Layer 2 source addresses.
It uses multiple ports.
29. What information is contained in the header of Layer 3 to help data delivery?
port number
device physical address
**destination host logical address
virtual connection identifier
30. Refer to the exhibit. The tracert command used from host X to host Y was
successful. What is the correct sequence of intermediary network devices that will
be present in the trace list?
switch A, switch D, switch G, host Y
**router B, router E, router F, host Y
switch A, router B, switch D, router E, router F, switch G, host Y
switch A, router B, router F, switch G, host Y
31. While configuring a router, a network technician wants to name the router.
Which prompt should the technician see when entering the hostname command?
Router>
Router#
**Router(config)#
Router(config-line)#
32. An organization has decided to use IP addresses in the range 172.20.128.0 to
172.20.143.255. Which combination of network ID and subnet mask identifies all IP
addresses in this range?
Network ID: 172.20.128.0 Subnet mask: 255.255.255.0
Network ID: 172.20.128.0 Subnet mask: 255.255.0.0
Network ID: 172.20.128.0 Subnet mask: 255.255.224.0
**Network ID: 172.20.128.0 Subnet mask: 255.255.240.0
Network ID: 172.20.128.0 Subnet mask: 255.255.255.240
33. Refer to the exhibit. Which logical topology describes the exhibited network?
star
**ring
point-to-point
multi-access
34. Refer to the exhibit. All devices in the network use default configurations. How
many broadcast domains are there in this topology?
3
**5
7
9
11
35. Which three IPv4 addresses represent valid network addresses for a subnet?
(Choose three.)
192.168.9.64/28
**192.168.9.146/28
192.168.9.96/28
**192.168.9.129/26
**192.168.9.51/26
192.168.9.64/26
36. Two routers are connected via their serial ports in a lab environment. The
routers are configured with valid IP addresses, but they cannot ping each other. The
show interface serial0/0 command shows that the serial0/0 interface is up but the
line protocol is down. What could be the cause of this problem?
The no shutdown command has not been applied to the interfaces.
**The clock rate command has not been entered on the DCE interface.
The interface timers are not cleared.
The FastEthernet interface is emulating a serial interface by assigning it a timing signal.
37. Which device should be used for enabling a host to communicate with another
host on a different network?
switch
hub
**router
host
38. Refer to the exhibit. The network administrator uses the netstat command to
display the open, active, and running TCP connections on a networked host. The
exhibit displays the output of this command. Which two facts can be determined
from this output for accessing www.cisco.com? (Choose two.)
**The source port indicates that the session is an http session.
The connection is not successful.
**The source port of the host is 3166.
The destination port is 80.
The source port does not support communication with the destination port that is listed.
The source port indicates that a UDP session has been initiated.
39. Which OSI layer uses the header information to reassemble the data segments
into streams?
application layer
network layer
presentation layer
session layer
**transport layer
40. Which three statements are true about transport layer protocols? (Choose
three.)
The UDP transport layer protocol provides for low overhead data delivery.
**The TCP transport layer protocol uses windowing and acknowledgments for
reliable transfer of data.
**The TCP and UDP port numbers are used by application layer protocols.
**The TCP transport layer protocol provides services to direct the data packets to
their destination hosts.
The UDP transport layer protocol is a connection-oriented protocol.
The UDP transport layer protocol keeps track of all the data segments in each
conversation.
41. To enhance security in a network, the network administrator uses these
commands:
Router(config)# line console 0
Router(config-line)# password j1mdi2
Router(config-line)# login
What two conclusions are evident from these commands? (Choose two.)
**Users who attempt to connect to the console port of the router must enter a
password.
**The entries permit access through the console by the use of j1mdi2 as the
password.
The entries eliminate the need for authentication.
Access through the console will be denied because the console configuration is
incomplete.
The entries prevent passwords from being displayed as plain text.
42. Refer to the exhibit. Each media link is labeled. What type of cable should be
used to connect the different devices?
Connection 1 - straight-through cable Connection 2 - straight-through cable Connection 3
- crossover cable
Connection 1 - straight-through cable Connection 2 - crossover cable Connection 3 -
rollover cable
Connection 1 - crossover cable Connection 2 - rollover cable Connection 3 - straightthrough
cable
**Connection 1 - crossover cable Connection 2 - straight-through cable Connection
3 - crossover cable
Connection 1 - straight-through cable Connection 2 - rollover cable Connection 3 -
crossover cable
43. Refer to the exhibit. The headers added at each layer are shown.
Which layer adds the destination and source process numbers to ensure that data is
delivered to the correct application?
physical layer
data link layer
network layer
**transport layer
44. Which three statements are true about network layer addressing? (Choose
three.)
It uses the last octet of the IP address to identify the network.
**It supports data communications between networks.
**It is configured by the network technician.
It is a 16-bit IPv4 address.
It prevents broadcasts.
**It uniquely identifies each host.
45. Refer to the exhibit. A PC is connected to a network. Which action will verify
that the PC can communicate with its default gateway?
Use the ping 127.0.0.1 command.
Use the ipconfig command.
Use the ipconfig/all command.
**Use the ping 10.0.0.254 command.
46. Refer to the exhibit. Host A sends a frame with the destination MAC address as
FFFF.FFFF.FFFF. What action will the switch take for this frame?
It will drop the frame.
It will send the frame back to host A.
**It will send the frame to all hosts except host A.
It will forward the frame to the default gateway.
47. Refer to the exhibit. The network administrator remotely accesses the CLI of
RouterB from PC1 using a secure connection. Which statement is true about this
connection?
The Telnet server process is running on PC1.
Only the exchange of the Telnet username and password is encrypted.
The GET request is sent to RouterA to retrieve data.
**The SSH service is used to connect PC1 to RouterB.
48. Which OSI layer uses the header information to reassemble the data segments
into streams?
application layer
network layer
presentation layer
session layer
**transport layer
49. Refer to the exhibit. A router, the table of which is shown, receives a packet that
is destined for 192.168.9.4. How will the router treat the packet?
It will drop the packet.
It will forward the packet via FastEthernet 0/1.
**It will forward the packet to the next hop address.
It will forward the packet to 172.16.2.0
50. Refer to the exhibit. Cable 1 and Cable 2 are wired for specific physical layer
requirements. The table lists each segment by number and the cable that connects
the network components on that segment. Which three segments have the correct
cables installed? (Choose three.)
**segment 1
segment 2
segment 3
**segment 4
**segment 5
segment 6
Thursday, June 18, 2009
CCNA 1 - Exam 640 - 802 (Only 85%)
at 10:36 AM ·
www.ccna4u.org
Final Exam Answer [CCNA 1 - EXPLORATION]
1. A PC can not connect to any remote websites, ping its default gateway, or ping a
printer that is functioning properly on the local network segment. Which action will
verify that the TCP/IP stack is functioning correctly on this PC?
--> Use the ping 127.0.0.1 command at the command prompt.
2. Refer to the exhibit. Which set of devices contains only intermediary devices?
--> A, B, D, G
3. Refer to the exhibit. When computer A sends a frame to computer D, what computers
receive the frame?
--> only computer D
4. Which password is automatically encrypted when it is created?
--> enable secret
5. Which three statements characterize the transport layer protocols? (Choose three.)
--> TCP and UDP port numbers are used by application layer protocols.
--> TCP uses windowing and sequencing to provide reliable transfer of data.
--> TCP is a connection-oriented protocol. UDP is a connectionless protocol.
6. Which type of media is immune to EMI and RFI? (Choose two.)
--> 100 Base-FX
--> 1000 Base LX
7. Refer to the exhibit. A technician is working on a network problem that requires
verification of the router LAN interface. What address should be pinged from this host to
confirm that the router interface is operational?
--> 192.168.254.1
8. Refer to the exhibit. The diagram represents the process of sending email between
clients.
Select the list below that correctly identifies the component or protocol used at each
numbered stage of the diagram.
--> 1.MUA 2.SMTP 3.MTA 4.SMTP 5.MTA 6.MDA 7.POP 8.MUA
9. Refer to the exhibit. What function does router RT_A need to provide to allow Internet
access for hosts in this network?
--> address translation
10. Refer to the exhibit. The network containing router B is experiencing problems. A
network associate has isolated the issue in this network to router B? What action can be
preformed to correct the network issue?
--> issue the no shutdown command on interface FastEthernet 0/1
11. Which three IPv4 addresses represent a broadcast for a subnet? (Choose three.)
--> 172.16.4.63 /26
--> 172.16.4.191 /26
--> 172.16.4.95 /27
12. What are three characteristics of CSMA/CD? (Choose three.)
--> A device listens and waits until the media is not busy before transmitting.
--> All of the devices on a segment see data that passes on the network medium.
--> After detecting a collision, hosts can attempt to resume transmission after a random
time delay has expired.
13. In a Cisco IOS device, where is the startup-configuration file stored?
--> NVRAM
14. A routing issue has occurred in you internetwork. Which of the following type of
devices should be examined to isolate this error?
--> router
15. Which OSI layer protocol does IP rely on to determine whether packets have been
lost and to request retransmission?
--> transport
16. Due to a security violation, the router passwords must be changed. What information
can be learned from the following configuration entries? (Choose two.)
--> The entries specify four Telnet lines for remote access.
The entries set the console and Telnet password to "c13c0".
Telnet access will be denied because the Telnet configuration is incomplete.
--> Access will be permitted for Telnet using "c13c0" as the password.
17. Which prompt represents the appropriate mode used for the copy running-config
startup-config command ?
--> Switch-6J#
18. Which combination of network id and subnet mask correctly identifies all IP
addresses from 172.16.128.0 through 172.16.159.255?
--> 172.16.128.0 255.255.224.0
19. When must a router serial interface be configured with the clock rate command?
--> when the interface is functioning as a DCE device
20. When connectionless protocols are implemented at the lower layers of the OSI model,
what are usually used to acknowledge the data receipt and request the retransmission of
missing data?
--> upper-layer connection-oriented protocols
21. A technician is asked to secure the privileged EXEC mode of a switch by requiring a
password. Which type of password would require this login and be considered the most
secure?
--> enable secret
22. Refer to the exhibit. What is required on host A for a network technician to create the
initial configuration on RouterA?
--> a terminal emulation program
23. Refer to the exhibit. A network administrator remotely accesses the CLI of RouterB
from PC1. Which two statements are true about the application layer protocol that is used
to make this connection? (Choose two.)
-->The connection type is called a VTY session.
--> The application name is the same for the service, protocol, and client.
24. The Layer 4 header contains which type of information to aid in the delivery of data?
--> service port number
25. Refer to the exhibit. What two facts can be determined about the exhibited topology?
(Choose two.)
--> A single broadcast domain is present
--> Five collision domains exist.
26. Refer to the exhibit. A network technician is trying to determine the correct IP
address configuration for Host A. What is a valid configuration for Host A?
--> IP address: 192.168.100.20; Subnet Mask: 255.255.255.240; Default Gateway:
192.168.100.17
27. Refer to the exhibit. Cable 1 and cable 2 have the ends wired for specific physical
layer requirements. The table lists each segment by number and the cable which has been
installed by the network technician between the network components on that segment.
From the data
given, which segments have the correct cable installed? (Choose three.)
--> segment1
--> segment3
--> segment4
28. What is true regarding network layer addressing? (Choose three.)
--> uses a flat structure
--> uniquely identifies each host
--> contains a network portion
29. Refer to the exhibit. A router, whose table is shown, receives a packet that is destined
for 192.168.1.4. How will router treat the packet?
--> The packet will be forwarded to the destination host.
30. Refer to the exhibit. Which two statements describe the information that is
represented in the header? (Choose two.)
--> The destination port indicates a Telnet session.
--> The return segment will contain a source port of 23.
31. Refer to the exhibit. What is the correct destination socket number for a web page
request from Host A to the web server?
--> 198.133.219.25:80
http://www.cisco.com
32. During the encapsulation process, which identifiers are added at the transport layer?
--> two applications communicating the data
33. Refer to the exhibit. A student has wired each end of a CAT 5e cable as shown. What
is the result? (Choose two.)
--> The cable is suitable for use as a Fast Ethernet crossover.
--> The cable is suitable for use between two 100 Mbps Auto-MDIX capable switches.
34. Refer to the exhibit. Assume all devices are using default configurations. How many
subnets are required to address the topology that is shown?
--> 3
35. Refer to the exhibit. On the basis of the IP configuration that is shown, what is the
reason that Host A and Host B are unable to communicate outside the local network?
--> The gateway address was assigned a broadcast address.
36. Refer to the exhibit. Each media link is labeled. What type of cable should be used to
connect the different devices?
--> Connection 1 - straight-through cable , Connection 2 - crossover cable , Connection 3
- straight-through cable
37. Refer to the exhibit. What does the IP address 192.168.33.2 represent?
--> The host's primary domain name server.
38. Refer to the exhibit. What two facts can be determined from the information that is
given? (Choose two.)
--> The destination port indicates that an HTTP session has been initiated.
--> The data listed is associated with the transport layer.
39. Which of the following are the address ranges of the private IP addresses? (Choose
three.)
--> 10.0.0.0 to 10.255.255.255
--> 172.16.0.0 to 172.31.255.255
--> 192.168.0.0 to 192.168.255.255
40. Which two functions of the OSI model occur at layer two? (Choose two.)
--> physical addressing
--> media access control
41. Which range of port numbers are reserved for services that are commonly used by
applications that run on servers?
--> 0 to 1023
42. As network administrator, what is the subnet mask that allows 510 hosts given the IP
address 172.30.0.0?
--> 255.255.254.0
43. Refer to the exhibit. The tracert command is initiated from PC1 to the destination
PC4. Which device will send a response to the initial packet from PC1?
--> Athens
44. Refer to the exhibit. Host A is transmitting data to host B. What addresses will host A
use to for the destination IP and MAC addresses in this communication?
--> Destination MAC: EEEE:EEEE:EEEE Destination IP: 172.22.0.75
45. Refer to the exhibit. Which logical topology best describes the exhibited network?
--> star
46. Examine the graphic with current configurations. Host A in the Clerical offices failed
and was replaced. Although a ping to 127.0.0.1 was successful, the replacement computer
can not access the company network. What is the likely cause of the problem?
--> subnet mask incorrectly entered
47. Refer to the exhibit. With the router running NAT, what IP addresses can be applied
to the computer to allow access to the Internet? (Choose three.)
--> 192.168.18.49
--> 192.168.18.52
-->192.168.18.59
48. Refer to the exhibit. What three statements are true about the IP configuration that is
shown? (Choose three.)
--> The address that is assigned to the computer represents private addressing.
--> The computer is unable to communicate outside of the local network.
--> The prefix of the computer address is /27.
49. Refer to the exhibit. Host A attempts to establish a TCP/IP session with host C.
During this attempt, a frame was captured with the source MAC address 0050.7320.D632
and the destination MAC address 0030.8517.44C4. The packet inside the captured frame
has an IP source address 192.168.7.5, and the destination IP address is 192.168.219.24.
At which point in the network was this packet captured?
--> leaving Dallas
50. WWhich OSI layer uses a connection-oriented protocol to ensure reliable delivery of
data?
Bạn đang đọc truyện trên: AzTruyen.Top