Professional Documents
Culture Documents
A network has grown too large for technicians to configure network addresses and hosts files for name
resolution. Which two application layer services should be added to the server to allow these needs to be
satisfied dynamically? (Choose two.)
DNS
FTP
DHCP
HTTP
SMTP
Bottom of Form
2 Top of Form
While configuring a router, a network technician wants to name the router. Which prompt should the technic
see when entering the hostname command?
Router>
Router#
Router(config)#
Router(config-line)#
Bottom of Form
3 Top of Form
Refer to the exhibit. The PC, the routing table of which is displayed, is configured correctly. To which netwo
device or interface does the IP address 192.168.1.254 belong?
PC
switch
4 Top of Form
Refer to the exhibit. Host A wants to access the Internet. Which combination of a Layer 2 address and a Laye
address will enable this access from host A?
Destination MAC: 0030.8596.DE83 Default gateway: 209.165.202.130
5 Top of Form
A user types the enable command. What task can be performed at the privileged EXEC mode?
Configure the device.
6 Top of Form
Which statement is true about the ICMP protocol?
It is an application layer protocol.
If a host does not respond to an ICMP echo request, the host is not functioning.
Bottom of Form
7 Top of Form
Refer to the exhibit. The headers added at each layer are shown. Which layer adds the destination and source
process numbers to ensure that data is delivered to the correct application?
physical layer
network layer
transport layer
Bottom of Form
8 Top of Form
Refer to the exhibit. A PC is connected to a network. Which action will verify that the PC can communicate
its default gateway?
Use the ping 127.0.0.1 command.
9 Top of Form
A network technician is tasked with setting up a network for six users, but the users should be able to use the
accounts to log on from any of the six computers. What type of network should be used?
workgroup
P2P applications
peer-to-peer network
client-server network
Bottom of Form
10 Top of Form
What is the Cisco IOS?
system software for Cisco devices
11 Top of Form
What are three characteristics of CSMA/CD? (Choose three.)
It monitors the media for presence of a data signal.
After detecting a collision, hosts can resume transmission after a random timer has expired.
A jam signal is used to ensure that all hosts are aware that a collision has occurred.
12 Top of Form
Refer to the exhibit. A web browser is running on host PC1 with an IP address 10.10.2.2/24. A dynamic port
number of 49152 is assigned to the browser. The browser sends a request for a web page to the web server w
an IP address 192.168.1.254/24. Which statement is true?
The session is established using TCP, and the socket number for the web server is 192.168.1.254: 80.
The session is established using TCP, and the socket number for the web server is 192.168.1.254: 49152
The session is established using UDP, and the socket number for the web server is 192.168.1.254: 80.
The session is established using UDP, and the socket number for the web server is 192.168.1.254: 49152
Bottom of Form
13 Top of Form
Which physical connector type is used for a serial V.35 connection to the CSU/DSU?
Bottom of Form
14 Top of Form
Refer to the exhibit. What is required on host A for a network technician to create the initial configuration on
Router1?
an FTP client
a Telnet client
a web browser
Bottom of Form
15 Top of Form
Refer to the exhibit. Which Layer 2 protocol could be used inside nework A and network C?
IP
TCP
UDP
Ethernet
Bottom of Form
16 Top of Form
Refer to the exhibit. At which OSI layer is serial interface 0/0/1 experiencing problems?
Layer 1
Layer 2
Layer 3
Layer 4
Bottom of Form
17 Top of Form
Which statement is true about router hostnames?
A hostname should be unique on each router.
A router hostname must be created before any other configurations can be added to the device.
Bottom of Form
18 Top of Form
Which OSI layer uses a connection-oriented protocol to ensure reliable delivery of data?
application layer
presentation layer
session layer
transport layer
Bottom of Form
19 Top of Form
Refer to the exhibit. A network administrator is troubleshooting a link that is down between Router1 and
Router2. To correct the problem, which wire pairs need to be switched on one of the Ethernet cable ends?
pair 1 and pair 2
20 Top of Form
The Layer 4 header contains which type of information to aid in the delivery of data?
service port number
21 Top of Form
Which three statements are true about network layer addressing? (Choose three.)
It uniquely identifies each host.
It is a physical address.
22 Top of Form
Refer to the exhibit. The host was disconnected from switch 2 and connected to switch 1. Which combination
IP address, subnet mask, and default gateway should be assigned to this host to allow it to function in the
network?
IP address: 10.10.9.37 Subnet mask: 255.255.255.240 Default gateway: 10.10.9.35
23 Top of Form
Which memory contents will change as a result of using the Router# erase startup-config command on a
router?
RAM
ROM
flash
NVRAM
Bottom of Form
24 Top of Form
If an administrator wished to return a router to the default state, what additional step must be taken after issui
the command erase start-up config?
Reload the device.
Enter the interface commands to allow the device to connect to the network.
Bottom of Form
25 Top of Form
Which three IPv4 addresses represent a broadcast for a subnet? (Choose three.)
172.16.4.63 /26
172.16.4.129 /26
172.16.4.191 /26
172.16.4.51 /27
172.16.4.95 /27
172.16.4.221 /27
Bottom of Form
26 Top of Form
Refer to the exhibit. Which two facts can be determined about the topology? (Choose two.)
Four collision domains are present.
27 Top of Form
Refer to the exhibit. The diagram represents the process of sending email between clients. Select the list belo
that correctly identifies the component or protocol used at each numbered stage of the diagram.
1.MUA 2.MDA 3.MTA 4.SMTP 5.MTA 6.POP 7.MDA 8.MUA
28 Top of Form
Refer to the exhibit. Host A sends a frame to host C with a destination MAC address CC. The MAC address
host C is not in the MAC table of switch SW1. How will SW1 handle the frame?
Switch SW1 will drop the frame.
Switch SW1 will flood the frame out all ports except port Fa0/1.
Bottom of Form
29 Top of Form
Which device should be used for routing a packet to a remote network?
access switch
DHCP server
hub
router
Bottom of Form
30 Top of Form
What information is contained in the header of Layer 3 to help data delivery?
port number
31 Top of Form
What is the result of using the clock rate 56000 command at the serial interface of the router?
The interface is configured as a DCE device.
The FastEthernet interface is made to emulate a serial interface by assigning it a timing signal.
32 Top of Form
What are two characteristics of the data link layer? (Choose two.)
It segments and reorders the data.
It defines the method by which network devices place data onto the media.
It manages the transfer of data between the processes that run on each host.
It retrieves signals from the media and restores them to their bit representations.
Bottom of Form
33 Top of Form
Refer to the exhibit. Which logical topology describes the exhibited network?
star
ring
point-to-point
multi-access
Bottom of Form
34 Top of Form
A network administrator wants to restrict access to the router privileged EXEC mode. Which password shoul
the administrator use?
enable
aux
console
VTY
Bottom of Form
35 Top of Form
Refer to the exhibit. The serial interface of the router was configured with the use of the commands that are
shown. The router cannot ping the router that is directly connected to interface serial 0/0/0. What should the
network technician do to solve this problem?
Configure the description at interface serial 0/0/0.
36 Top of Form
Examine the graphic with current configurations. Host A in the Clerical office failed and was replaced. Altho
a ping to 127.0.0.1 was successful, the replacement computer cannot access the company network. With prox
ARP disabled on the Fa0/0 interface of the New York router, what is the likely cause of the problem?
network card failure
37 Top of Form
Refer to the exhibit. A network technician has made several changes to R1 since the configuration has last be
saved. The modified configuration did not produce the desired changes. The technician wants to store a back
copy of the saved configuration on a TFTP server before reloading. Which action will cause the unmodified
to be saved on the TFTP server?
Bottom of Form
38 Top of Form
Refer to the exhibit. A technician uses the nslookup command on the PC and views the output that is display
in the exhibit. What is the IP address of the primary domain name server used by the host?
10.10.10.32
192.168.1.5
192.168.1.99
192.168.2.100
Bottom of Form
39 Top of Form
Refer to the exhibit. Host B was powered off. What change will occur in the MAC table of the switch?
The table will remain unaffected.
The switch will retain the MAC address until host B is powered on again.
The switch will rebuild the MAC table by assigning the FFFF.FFFF.FFFF address to port Fa0/19.
Bottom of Form
40 Top of Form
A network administrator is asked to design a new addressing scheme for a corporate network. There are 60 u
in the main office, 40 users in the branch office, 28 users in manufacturing, 12 in the sales office, and 4 users
the research office. Which VLSM addressing scheme that uses the 192.168.88.0/24 network will fulfill the
requirements while wasting the fewest addresses?
192.168.88.0/26 main
192.168.88.32/26 branch
192.168.88.64/26 manufacturing
192.168.88.96/27 sales
192.168.88.128/28 research
192.168.88.0/26 main
192.168.88.64/26 branch
192.168.88.128/27 manufacturing
192.168.88.160/28 sales
192.168.88.176/29 research
192.168.88.0/27 main
192.168.88.32/27 branch
192.168.88.64/28 manufacturing
192.168.88.80/29 sales
192.168.88.88/30 research
192.168.88.0/27 main
192.168.88.64/28 branch
192.168.88.80/28 manufacturing
192.168.88.96/29 sales
192.168.88.104/30 research
Bottom of Form
41 Top of Form
Which fiber connector supports full-duplex Ethernet?
Bottom of Form
42 Top of Form
Refer to the exhibit. A user wants to access the Internet from the PC. A part of the running configuration of t
router is shown. Which default gateway IP address should be configured at the PC to enable this access?
10.1.192.1
10.1.192.2
10.1.192.54
192.31.7.1
Bottom of Form
43 Top of Form
As network administrator, what is the subnet mask that allows 510 hosts given the IP address 172.30.0.0?
255.255.0.0
255.255.248.0
255.255.252.0
255.255.254.0
255.255.255.0
255.255.255.128
Bottom of Form
44 Top of Form
By using the ipconfig command, a network administrator determines that a workstation has the address
192.168.3.38 with 29 bits set in the subnet mask. To what network does the workstation belong?
192.168.3.8
192.168.3.16
192.168.3.24
192.168.3.32
Bottom of Form
45 Top of Form
Refer to the exhibit. The NAT functionality of the router is enabled to provide Internet access to the PC.
However, the PC is still unable to access the Internet. Which IP address should be changed to 209.165.201.1
enable the PC to access the Internet?
192.168.1.191
192.168.1.101
192.168.1.1
192.168.1.254
Bottom of Form
46 Top of Form
Refer to the exhibit. An administrator on PC1 wants to view some HTML code from a web page housed on t
web server. Which client application will allow this request to be started?
Bottom of Form
47 Top of Form
Which OSI layer uses the header information to reassemble the data segments into streams?
application layer
network layer
presentation layer
session layer
transport layer
Bottom of Form
48 Top of Form
Refer to the exhibit. Which option shows the correct topology given the configuration of Router1?
Bottom of Form
49 Top of Form
Refer to the exhibit. Host X is unable to communicate with host Y. Which command can be run at host X to
determine which intermediary device is responsible for this failure?
telnet 192.168.1.1
ping 192.168.1.1
ftp 192.168.1.1
tracert 192.168.1.1
Bottom of Form
50 Top of Form
Refer to the exhibit. Which set of devices contains only intermediary devices?
A, B, D, G
A, B, E, F
C, D, G, I
G, H, I, J
Bottom of Form