You are on page 1of 14

1. Which physical connector type is used for a serial V.35 connection to the CSU/DSU?

Top of Form

If an administrator wished to return a router to the default state, what additional step must be tak after issuing the command erase start-up config? Reload the device. Issue the command copy running-config start-up config. Perform a show running-config to verify that the file was removed. Enter the interface commands to allow the device to connect to the network.
Bottom of Form

Refer to the exhibit. A technician uses the nslookup command on the PC and views the output that is displayed in the exhibit. What is the IP address of the primary domain name server used by the host? 10.10.10.32 192.168.1.5 192.168.1.99 192.168.2.100 5
Top of Form

A network administrator wants to restrict access to the router privileged EXEC mode. Which passw should the administrator use?

enable aux console VTY 6


Bottom of Form Top of Form

A network has grown too large for technicians to configure network addresses and hosts files for na resolution. Which two application layer services should be added to the server to allow these needs be satisfied dynamically? (Choose two.) DNS FTP DHCP HTTP SMTP

Bottom of Form Top of Form

Refer to the exhibit. A network administrator is troubleshooting a link that is down between Router1 and Router2. To correct the problem, which wire pairs need to be switched on one of the Ethernet cable ends? pair 1 and pair 2

pair 1 and pair 3 pair 2 and pair 3 pair 2 and pair 4 8


Bottom of Form Top of Form

Which device should be used for routing a packet to a remote network? access switch DHCP server hub router

Bottom of Form Top of Form

What are two characteristics of the data link layer? (Choose two.) It segments and reorders the data. It exchanges the frames between nodes. It defines the method by which network devices place data onto the media. It manages the transfer of data between the processes that run on each host. It retrieves signals from the media and restores them to their bit representations.
Bottom of Form

It segments and reorders the data. It defines the method by which network devices place data onto the media.

Refer to the exhibit. The diagram represents the process of sending email between clients. Select the list below that correctly identifies the component or protocol used at each numbered stage of the diagram. 1.MUA 2.MDA 3.MTA 4.SMTP 5.MTA 6.POP 7.MDA 8.MUA 1.MUA 2.POP 3.MDA 4.SMTP 5.MTA 6.MDA 7.SMTP 8.MUA 1.MUA 2.POP 3.SMTP 4.MDA 5.MTA 6.SMTP 7.POP 8.MUA 1.MDA 2.SMTP 3.MTA 4.SMTP 5.MTA 6.MUA 7.POP 8.MDA 1.MUA 2.SMTP 3.MTA 4.SMTP 5.MTA 6.MDA 7.POP 8.MUA 11
Top of Form

Refer to the exhibit. The NAT functionality of the router is enabled to provide Internet access to the PC. However, the PC is still unable to access the Internet. Which IP address should be changed to 209.165.201.1 to enable the PC to access the Internet? 192.168.1.191 192.168.1.101 192.168.1.1 192.168.1.254 12
Bottom of Form Top of Form

Which fiber connector supports full-duplex Ethernet?

13

Bottom of Form Top of Form

What are three characteristics of CSMA/CD? (Choose three.) It monitors the media for presence of a data signal. After detecting a collision, hosts can resume transmission after a random timer has expired. A jam signal is used to ensure that all hosts are aware that a collision has occurred. Devices can be configured with a higher transmission priority. Data is transmitted only when the data signal is present. It uses a token system to avoid collisions.
Bottom of Form

A jam signal indicates that the collision has cleared and the media is not busy. X A device listens and waits until the media is not busy before transmitting.

The device with the electronic token is the only one that can transmit after a collision. X All of the devices on a segment see data that passes on the network medium. X After detecting a collision, hosts can attempt to resume transmission after a random time delay has expired.

14

Top of Form

Refer to the exhibit. At which OSI layer is serial interface 0/0/1 experiencing problems? Layer 1 Layer 2 Layer 3 Layer 4 15
Bottom of Form Top of Form

A network technician is tasked with setting up a network for six users, but the users should be able use their accounts to log on from any of the six computers. What type of network should be used? workgroup P2P applications peer-to-peer network client-server network

16

Bottom of Form Top of Form

While configuring a router, a network technician wants to name the router. Which prompt should th technician see when entering the hostname command? Router>

Router# Router(config)# Router(config-line)#


Bottom of Form

17

Top of Form

Refer to the exhibit. A user wants to access the Internet from the PC. A part of the running configuration of the router is shown. Which default gateway IP address should be configured at the to enable this access? 10.1.192.1 10.1.192.2 10.1.192.54 192.31.7.1 18
Bottom of Form Top of Form

The Layer 4 header contains which type of information to aid in the delivery of data? service port number host logical address device physical address

virtual connection identifier 19


Bottom of Form Top of Form

Refer to the exhibit. Which logical topology describes the exhibited network? star ring point-to-point multi-access 20
Bottom of Form Top of Form

Refer to the exhibit. Which Layer 2 protocol could be used inside nework A and network C? IP TCP UDP Ethernet 21
Bottom of Form Top of Form

Which statement is true about the ICMP protocol? It is an application layer protocol. It is designed to make IP a reliable protocol. It is often filtered out of networks for security purposes. If a host does not respond to an ICMP echo request, the host is not functioning.

23

Bottom of Form Top of Form

By using the ipconfig command, a network administrator determines that a workstation has the address 192.168.3.38 with 29 bits set in the subnet mask. To what network does the workstation belong? 192.168.3.8

192.168.3.16 192.168.3.24 192.168.3.32 24


Bottom of Form Top of Form

Which three statements are true about network layer addressing? (Choose three.) It uniquely identifies each host. It assists in forwarding packets across internetworks. It uses a logical 32-bit IPv4 address. It is not a configurable address. It is a physical address. It identifies the host from the first part of the address.

26

Bottom of Form Top of Form

Which three IPv4 addresses represent a broadcast for a subnet? (Choose three.) 172.16.4.63 /26 172.16.4.129 /26 172.16.4.191 /26 172.16.4.51 /27 172.16.4.95 /27 172.16.4.221 /27

27

Bottom of Form Top of Form

Refer to the exhibit. The host was disconnected from switch 2 and connected to switch 1. Which combination of IP address, subnet mask, and default gateway should be assigned to this host to al it to function in the network? IP address: 10.10.9.37 Subnet mask: 255.255.255.240 Default gateway: 10.10.9.35 IP address: 10.10.9.37 Subnet mask: 255.255.255.224 Default gateway: 10.10.9.35 IP address: 10.10.9.29 Subnet mask: 255.255.255.248 Default gateway: 10.10.9.35 IP address: 10.10.9.32 Subnet mask: 255.255.255.224 Default gateway: 10.10.9.35 IP address: 10.10.9.37 Subnet mask: 255.255.255.224 Default gateway: 196.1.105.6 IP address: 10.10.9.63 Subnet mask: 255.255.255.224 Default gateway: 10.10.9.35 28
Bottom of Form Top of Form

Refer to the exhibit. Host A wants to access the Internet. Which combination of a Layer 2 address a a Layer 3 address will enable this access from host A?

Destination MAC: 0030.8596.DE83 Default gateway: 209.165.202.130 Destination MAC: 0030.8596.DE82 Default gateway: 172.16.9.2 Destination MAC: 0030.8517.44C4 Default gateway: 172.16.1.1 Destination MAC: 0030.8517.44C4 Default gateway: 209.165.202.130 29
Bottom of Form Top of Form

A network administrator is asked to design a new addressing scheme for a corporate network. The are 60 users in the main office, 40 users in the branch office, 28 users in manufacturing, 12 in the sales office, and 4 users in the research office. Which VLSM addressing scheme that uses the 192.168.88.0/24 network will fulfill the requirements while wasting the fewest addresses? 192.168.88.0/26 main 192.168.88.32/26 branch 192.168.88.64/26 manufacturing 192.168.88.96/27 sales 192.168.88.128/28 research 192.168.88.0/26 main 192.168.88.64/26 branch 192.168.88.128/27 manufacturing 192.168.88.160/28 sales 192.168.88.176/29 research 192.168.88.0/27 main 192.168.88.32/27 branch 192.168.88.64/28 manufacturing 192.168.88.80/29 sales 192.168.88.88/30 research 192.168.88.0/27 main 192.168.88.64/28 branch 192.168.88.80/28 manufacturing 192.168.88.96/29 sales 192.168.88.104/30 research
Bottom of Form Top of Form

30

What is the Cisco IOS? system software for Cisco devices Read Only Memory in Cisco devices non-volatile storage for device configurations an initial operating system that is used for boot functions

31

Bottom of Form Top of Form

As network administrator, what is the subnet mask that allows 510 hosts given the IP address

172.30.0.0? 255.255.0.0 255.255.248.0 255.255.252.0 255.255.254.0 255.255.255.0 255.255.255.128


33
Bottom of Form Top of Form

Which OSI layer uses a connection-oriented protocol to ensure reliable delivery of data? application layer presentation layer session layer transport layer
Bottom of Form

Transport layer

You might also like