Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- 1. Refer to the exhibit. Host B attempts to establish a TCP/IP session with host C.
- • 0060.7320.D632
- 2. What are three characteristics of CSMA/CD? (Choose three.)
- • It monitors the media for presence of a data signal.
- • After detecting a collision, hosts can resume transmission after a random timer has expired.
- • A jam signal is used to ensure that all hosts are aware that a collision has occurred.
- 3. Refer to the exhibit. The PC, the routing table of which is displayed, is configured correctly.
- • router interface fa0/0
- 4. Refer to the exhibit. Host A wants to access the Internet.
- • Destination MAC: 0030.8517.44C4 Default gateway: 172.16.1.1
- 5. Refer to the exhibit. Communication between hosts X and Y is restricted to the local network.
- • Host X and host Y belong to different networks.
- 6. What is the result of using the clock rate 56000 command at the serial interface of the router?
- • The interface is configured as a DCE device.
- 7. Which three addresses belong to the category of public IP addresses? (Choose three.)
- • 196.1.105.6
- • 132.11.9.99
- • 46.1.1.97
- 8. Which three statements are true about transport layer protocols? (Choose three.)
- • TCP and UDP manage communication between multiple applications.
- • TCP acknowledges received data.
- • UDP uses windowing and sequencing to provide reliable transfer of data.
- 9. Refer to the exhibit. Which logical topology describes the exhibited network?
- • point-to-point
- • It affects the operation of the device immediately when modified.
- 11. Refer to the exhibit. Host C is able to ping 127.0.0.1 successfully, but is unable to communicate with hosts A and B in the organization.
- • The subnet mask on host C is improperly configured.
- 12. A host is transmitting a video over the network. How does the transport layer allow this host to use multiple applications to transmit other data at the same time as the video transmission?
- • It uses a connectionless protocol only for multiple simultaneous transmissions.
- 13. Refer to the exhibit. PC1 is unable to access PC2. To troubleshoot this problem, the technician needs to confirm that the next hop interface is operational.
- • 192.168.0.250
- 14. Refer to the exhibit. Cable 1 and Cable 2 are wired for specific physical layer requirements.
- • Segment 2
- • Segment 5
- • Segment 6
- 15. Refer to the exhibit. Which two facts can be determined about the topology? (Choose two.)
- • Two logical address ranges are required.
- • A single broadcast domain is present.
- 16. Refer to the exhibit. Which three statements are true about the IP configuration that is displayed? (Choose three.)
- • The assigned address is a private address.
- • The prefix of the computer address is /26.
- 17. Which password restricts Telnet access to the router?
- • enable
- 18. Refer to the exhibit. To create the initial configuration, a network technician connected host A to the router using the connection that is shown.
- • It provides out-of-band console access.
- 19. Which device should be used for routing a packet to a remote network?
- • router
- 20. Refer to the exhibit. The serial interface of the router was configured with the use of the commands that are shown.
- • Configure an IP address on interface serial 0/0/0.
- 21. Refer to the exhibit. In a network, host A is sending data segments to host B.
- • The initial window size is determined via the two-way handshake.
- • Acknowledgment number 3001 indicates that host A will send the next segment with sequence number 3001.
- 22. Refer to the exhibit. The network administrator wants to remotely access the CLI of the router from PC1 using modem 1.
- • auxiliary
- 23. Which OSI layer uses a connection-oriented protocol to ensure reliable delivery of data?
- • transport layer
- 24. What are two functions of the data link layer? (Choose two.)
- • It segments and reorders the data.
- • It controls how data is placed onto the media.
- 25. Refer to the exhibit. Which list refers only to end devices?
- • D,E,F,G
- 26. Refer to the exhibit. The diagram represents the process of sending e-mail between clients.
- • 1.MUA 2.SMTP 3.MTA 4.SMTP 5.MTA 6.MDA 7.POP 8.MUA
- 27. Refer to the exhibit. Host B was powered off.
- • The switch will remove the MAC address at Fa0/19 immediately.
- 28. Refer to the exhibit. A technician has connected the PC to the switch using a Category 6 UTP cable.
- • The transmit pin of the cable is terminated to the receive pin.
- • The maximum supported bandwidth is 1000 Mb/s.
- 29. Refer to the exhibit. A host is using NAT to connect to the Internet.
- • 10.1.1.37
- • 10.1.1.39
- • 10.1.1.60
- 30. Refer to the exhibit. A PC is communicating with another PC on a remote network.
- • Use the tracert command at the host.
- 31. An organization wants to create a subnet of the IP network 172.16.0.0. This subnet will accommodate 1000 hosts.
- • 255.255.248.0
- 32. Refer to the exhibit. A host is connected to hub 1. Which combination of IP address, subnet mask, and default gateway can allow this host to function in the network?
- • IP address: 172.16.31.37 Subnet mask: 255.255.255.224 Default gateway: 172.16.31.35
- 33. Refer to the exhibit. A technician uses the nslookup command on the PC and views the output that is displayed in the exhibit.
- • 10.10.10.32
- • 192.168.1.5
- 34. Which OSI layer offers ordered data reconstruction services?
- • transport layer
- 35. Refer to the exhibit. All devices in the network use default configurations.
- • 5
- 36. The network administrator wants to install a private application on a server. Which range of port numbers is normally assigned to this application to make it accessible by clients?
- • 0 to 1023
- 37. Because of a security violation, the router password must be changed. What information can be learned from these configuration entries? (Choose two.)
- • This configuration allows users to connect to the router via the use of the telnet command.
- • This configuration allows five users to make simultaneous connections to this router.
- 38. Refer to the exhibit. Each media link is labeled.
- • Connection 1 - straight-through cable Connection 2 - straight-through cable Connection 3 - straight-through cable
- 39. Which two types of media are useful for connecting two devices separated by a distance of 500 meters? (Choose two.)
- • 1000 BASE-TX
- • 1000 BASE-SX
- 40. Which information is used by the router to determine the path between the source and destination hosts?
- • the network portion of the IP address
- 41. Refer to the exhibit. What two facts can be determined from the session information that is displayed? (Choose two.)
- • The destination port indicates that a Telnet session has been initiated.
- • The protocol is a connection-oriented protocol.
- 42. Refer to the exhibit. Host A is accessing multiple servers.
- • IP address of the server and port number of the service
- 43. A network technician wants to configure an IP address on a router interface by using the ip address 192.168.1.0 255.255.255.0 command. Which prompt should the technician see when entering this command?
- • Router(config-if)#
- 44. Refer to the exhibit. Host X is unable to communicate with host Y.
- • tracert 192.168.1.1
- 45. Refer to the exhibit. In a network, PC1 sends a message to PC2.
- • destination and source process numbers
- 46. An organization has been assigned network ID 10.10.128.0 and subnet mask 255.255.224.0. Which IP address range can be used for this organization?
- • 10.10.128.0 to 10.10.159.255
- 47. What is the effect of using the Router# copy running-config startup-config command on a router?
- • The contents of NVRAM will change.
- 48. Which three IPv4 addresses represent valid host addresses for a subnet? (Choose three.)
- • 10.1.12.113/28
- • 10.1.11.5/27
- • 10.1.11.97/27
- 49. Refer to the exhibit. The NAT functionality of the router is enabled to provide Internet access to the PC.
- • 192.168.1.254
- 50. Which three statements are true about network layer addressing? (Choose three.)
- • It uniquely identifies each host.
- • It assists in forwarding packets across internetworks.
- • It uses a logical 32-bit IPv4 address.
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement