P. 1
Ccna1 Final Exam1 2011 max

Ccna1 Final Exam1 2011 max

|Views: 4,637|Likes:
Published by ashirhussain

More info:

Published by: ashirhussain on May 07, 2012
Copyright:Attribution Non-commercial


Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less





CCNA Exploration 1-Final (KMITL) A network has grown too large for technicians to configure network addresses and

hosts files for name resolution. Which two application layer services should be added to the server to allow these needs to be satisfied dynamically? (Choose two.) DNS FTP DHCP HTTP SMTP

Refer to the exhibit. The PC, the routing table of which is displayed, is configured correctly. To which network device or interface does the IP address belong? PC switch router interface fa0/0 router interface fa0/1 Which OSI layer uses a connection-oriented protocol to ensure reliable delivery of data? application layer presentation layer session layer transport layer

To correct the problem. Three networks are needed. Which two facts can be determined about the topology? (Choose two.) Four collision domains are present. which wire pairs need to be switched on one of the Ethernet cable ends? pair 1 and pair 2 pair 1 and pair 3 pair 2 and pair 3 pair 2 and pair 4 A network technician is tasked with setting up a network for six users. What type of network should be used? workgroup P2P applications peer-to-peer network client-server network . One logical network is represented. Refer to the exhibit. Two broadcast domains are present.Refer to the exhibit. A network administrator is troubleshooting a link that is down between Router1 and Router2. Three logical address ranges are required. but the users should be able to use their accounts to log on from any of the six computers.

0. Refer to the exhibit.0. A PC is connected to a network. Which Layer 2 protocol could be used inside nework A and network C? IP TCP UDP Ethernet Which memory contents will change as a result of using the Router# erase startupconfig command on a router? RAM ROM flash NVRAM . Use the ping 10.0.0. Use the ipconfig command.1 command.Refer to the exhibit. Which action will verify that the PC can communicate with its default gateway? Use the ping 127.254 command. Use the ipconfig/all command.

MDA 8.MTA 6.SMTP 3.MTA 4.POP 8.SMTP 5.POP 3.POP 3.MDA 5.MDA 4.MUA Refer to the exhibit.SMTP 4.MUA 1.MTA 4. The switch will remove the MAC address at Fa0/19. .MTA 6.MDA 7.MTA 6.MUA 2. Select the list below that correctly identifies the component or protocol used at each numbered stage of the diagram.MTA 4.MUA 2. The diagram represents the process of sending email between clients.MUA 2.MDA 3.SMTP 5.POP 8. What change will occur in the MAC table of the switch? The table will remain unaffected.MTA 6.SMTP 8.FFFF. Host B was powered off.SMTP 7.SMTP 5.MUA 1. The switch will rebuild the MAC table by assigning the FFFF.SMTP 3.Refer to the exhibit. The switch will retain the MAC address until host B is powered on again. 1.POP 7.MDA 2.MDA 7.MUA 1.MDA 1.FFFF address to port Fa0/19.MUA 7.POP 8.MUA 2.SMTP 5.MTA 6.

A network technician has made several changes to R1 since the configuration has last been saved. The technician wants to store a backup copy of the saved configuration on a TFTP server before reloading.35 connection to the CSU/DSU? .Refer to the exhibit. The modified configuration did not produce the desired changes. Which action will cause the unmodified data to be saved on the TFTP server? Which physical connector type is used for a serial V.

88.128/27 manufacturing .64/26 branch 192.88.88.Which OSI layer uses the header information to reassemble the data segments into streams? application layer network layer presentation layer session layer transport layer What is the Cisco IOS? system software for Cisco devices Read Only Memory in Cisco devices non-volatile storage for device configurations an initial operating system that is used for boot functions A network administrator wants to restrict access to the router privileged EXEC mode.88. 40 users in the branch office.88.0/26 main 192.168.96/27 sales 192.128/28 research 192.168. 28 users in manufacturing.0/26 main branch 192.64/26 manufacturing Which VLSM addressing scheme that uses the 192. and 4 users in the research office.0/24 network will fulfill the requirements while wasting the fewest addresses? 192.88.168. Which password should the administrator use? enable aux console VTY A network administrator is asked to design a new addressing scheme for a corporate network.168. There are 60 users in the main office. 12 in the sales office.168.88.

A router hostname is configured in privileged executive mode.64/28 manufacturing 192. How will SW1 handle the frame? Switch SW1 will drop the frame.168.96/29 sales manufacturing 192.80/29 sales 192.64/28 branch Host A sends a frame to host C with a destination MAC address CC.176/29 research research 192. A router hostname must be created before any other configurations can be added to the device.104/30 research Refer to the exhibit.192.168. Which fiber connector supports full-duplex Ethernet? .88.88. Which statement is true about router hostnames? A hostname should be unique on each router.88.160/28 sales main 192. A router hostname cannot contain capital letters. The MAC address for host C is not in the MAC table of switch SW1.88.88.0/27 main 192. Switch SW1 will flood the frame out all ports except port Fa0/1.32/27 branch 192.88.168. Switch SW1 will forward the frame to host C. Switch SW1 will flood the frame out all ports.88.168.168.

168.16 192.168. To what network does the workstation belong? 192. what additional step must be taken after issuing the command erase start-up config? Reload the device.By using the ipconfig command. Which layer adds the destination and source process numbers to ensure that data is delivered to the correct application? physical layer data link layer network layer transport layer .32 If an administrator wished to return a router to the default state. Issue the command copy running-config start-up config. Refer to the exhibit. Perform a show running-config to verify that the file was removed.3.3. a network administrator determines that a workstation has the address 192. Enter the interface commands to allow the device to connect to the network.24 192.38 with 29 bits set in the subnet mask.8 192.3. The headers added at each layer are shown.168.

After detecting a collision. Which statement is true about the ICMP protocol? It is an application layer protocol. A jam signal is used to ensure that all hosts are aware that a collision has occurred. At which OSI layer is serial interface 0/0/1 experiencing problems? Layer 1 Layer 2 Layer 3 Layer 4 What are three characteristics of CSMA/CD? (Choose three. If a host does not respond to an ICMP echo request.) It monitors the media for presence of a data signal.Refer to the exhibit. It is often filtered out of networks for security purposes. What is required on host A for a network technician to create the initial configuration on Router1? an FTP client a Telnet client a terminal emulation program a web browser Refer to the exhibit. the host is not functioning. . Devices can be configured with a higher transmission priority. It is designed to make IP a reliable protocol. hosts can resume transmission after a random timer has expired. It uses a token system to avoid collisions. Data is transmitted only when the data signal is present.

2/24.1. and the socket number for the web server is 192. A web browser is running on host PC1 with an IP address 10.168.1. Host X is unable to communicate with host Y. The browser sends a request for a web page to the web server with an IP address 192.254: 49152.Refer to the exhibit. Which statement is true? The session is established using TCP.168.254: 49152.254: 80.2. The session is established using UDP. The session is established using UDP.1 .254: 80.1. and the socket number for the web server is 192.1. Which device should be used for routing a packet to a remote network? access switch DHCP server hub router Refer to the exhibit. and the socket number for the web server is 192.254/24.168. Which command can be run at host X to determine which intermediary device is responsible for this failure? telnet 192. A dynamic port number of 49152 is assigned to the browser. and the socket number for the web server is 192. The session is established using TCP.1.

99 It is a physical address.2.1 Which three statements are true about network layer addressing? (Choose three. What is the IP address of the primary domain name server used by the host? 10. A technician uses the nslookup command on the PC and views the output that is displayed in the exhibit.1.1.100 .32 It is not a configurable address.168. It identifies the host from the first part of the address.168.1 ftp 192. It assists in forwarding packets across internetworks.5 192.168. It uses a logical 32-bit IPv4 address.10.1 tracert 192.ping 192. The Layer 4 header contains which type of information to aid in the delivery of data? service port number host logical address device physical address virtual connection identifier Refer to the exhibit.) It uniquely identifies each host.

What information is contained in the header of Layer 3 to help data delivery? port number device physical address destination host logical address virtual connection identifier Refer to the exhibit. Which client application will allow this request to be started? . An administrator on PC1 wants to view some HTML code from a web page housed on the web server.

0? 255.8517.0 A user types the enable command.16.255. As network administrator. Host A wants to access the Internet.30.255.Refer to the exhibit.202.252.165. Which combination of a Layer 2 address and a Layer 3 address will enable this access from host A? Destination MAC: 0030.0 255.2 Destination MAC: 0030. Destination MAC: 0030.128 What are two characteristics of the data link layer? (Choose two. .44C4 Default gateway: 172. Issue show and debug commands.0 255.0 255. Configure individual terminal lines.0 255. what is the subnet mask that allows 510 hosts given the IP address 172.DE83 Default gateway: 209.1 Destination MAC: 0030.255. What task can be performed at the privileged EXEC mode? Configure the device. Configure individual interfaces.1.44C4 Default gateway: Default gateway: It segments and reorders the data.255.0.8596.

) 172. It manages the transfer of data between the processes that run on each host.221 /27 Refer to the exhibit. Refer to the exhibit.191 /26 /26 172.4.4. It defines the method by which network devices place data onto the media.It exchanges the frames between nodes.4. Which logical topology describes the exhibited network? star ring point-to-point multi-access Which three IPv4 addresses represent a broadcast for a subnet? (Choose three.4. It retrieves signals from the media and restores them to their bit representations.63 /26 172.51 /27 172.16.95 /27 172. Which option shows the correct topology given the configuration of Router1? .

The serial interface of the router was configured with the use of the commands that are shown.168. What is the result of using the clock rate 56000 command at the serial interface of the router? The interface is configured as a DCE device. The NAT functionality of the router is enabled to provide Internet access to the PC. Which IP address should be changed to 209.201.1 to enable the PC to access the Internet? 192. What should the network technician do to solve this problem? Configure the description at interface serial 0/0/0. However. Remove the no shutdown command at interface serial 0/0/0 Reboot the router.101 .191 192. Refer to the exhibit.165.1. The IP address for the serial interface is configured. the PC is still unable to access the Internet. The router cannot ping the router that is directly connected to interface serial 0/0/0.Refer to the exhibit. The FastEthernet interface is made to emulate a serial interface by assigning it a timing signal.168.1. The interface timers are cleared. Configure an IP address on interface serial 0/0/0.

A user wants to access the Internet from the PC.1 was successful. Which default gateway IP address should be configured at the PC to enable this access? . what is the likely cause of the problem? network card failure network cables unplugged IP address incorrectly entered subnet mask incorrectly entered While configuring a router.1.168.0. a network technician wants to name the router. Host A in the Clerical office failed and was replaced. Although a ping to 127. With proxy ARP disabled on the Fa0/0 interface of the New York router.0. the replacement computer cannot access the company network. Which prompt should the technician see when entering thehostname command? Router> Router# Router(config)# Router(config-line)# Refer to the exhibit.1.1 192.254 Examine the graphic with current configurations.168. A part of the running configuration of the router is shown.192.

10. Which set of devices contains only intermediary devices? A. J Refer to the exhibit. H.224 Default gateway: 196.224 Default gateway: B.7. I.54 192.10.9. G A.10.35 . I G.37 Subnet mask: 255.35 IP address: 10.29 Subnet mask: B.35 IP address: Default gateway: 10.1 10.2 10.6 IP address: 10.9. The host was disconnected from switch 2 and connected to switch 1. Which combination of IP address.10.63 Subnet mask: 255. subnet mask. and default gateway should be assigned to this host to allow it to function in the network? IP address: 10.9. D.10.255. G.224 Default gateway: 10.105.31. F C.248 Default gateway: 10.1 Refer to the exhibit.255.10.224 Default gateway: 10.37 Subnet mask: E.32 Subnet mask: Subnet mask: IP address: 10.1.35 IP address: D.

You're Reading a Free Preview

/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->