Refer to the exhibit. Which Layer 2 protocol could be used
inside nework A and network C?
IPTCPUDPEthernet
IPTCPUDPEthernet
Refer to the exhibit. An administrator on PC1 wants to view some
HTML code from a web page housed on the web server. Which client application
will allow this request to be started?
*Answer Option 1
Refer to the exhibit. What is
required on host A for a network technician to create the initial
configuration on Router1?
|
|
an FTP client
|
|
a Telnet client
|
|
a terminal emulation
program
|
|
a web browser
|
Refer to the exhibit. The diagram represents the process of
sending email between clients. Select the list below that correctly identifies
the component or protocol used at each numbered stage of the diagram.
1.MUA 2.MDA 3.MTA 4.SMTP 5.MTA 6.POP 7.MDA 8.MUA1.MUA 2.POP 3.MDA 4.SMTP 5.MTA 6.MDA 7.SMTP 8.MUA1.MUA 2.POP 3.SMTP 4.MDA 5.MTA 6.SMTP 7.POP 8.MUA1.MDA 2.SMTP 3.MTA 4.SMTP 5.MTA 6.MUA 7.POP 8.MDA1.MUA 2.SMTP 3.MTA 4.SMTP 5.MTA 6.MDA 7.POP 8.MUA
1.MUA 2.MDA 3.MTA 4.SMTP 5.MTA 6.POP 7.MDA 8.MUA1.MUA 2.POP 3.MDA 4.SMTP 5.MTA 6.MDA 7.SMTP 8.MUA1.MUA 2.POP 3.SMTP 4.MDA 5.MTA 6.SMTP 7.POP 8.MUA1.MDA 2.SMTP 3.MTA 4.SMTP 5.MTA 6.MUA 7.POP 8.MDA1.MUA 2.SMTP 3.MTA 4.SMTP 5.MTA 6.MDA 7.POP 8.MUA
Refer to the exhibit. At which OSI layer is serial interface
0/0/1 experiencing problems?
Layer 1Layer 2Layer 3Layer 4
Layer 1Layer 2Layer 3Layer 4
Refer to the exhibit. A technician uses the nslookup command
on the PC and views the output that is displayed in the exhibit. What is the IP
address of the primary domain name server used by the host?
10.10.10.32192.168.1.5192.168.1.99192.168.2.100
10.10.10.32192.168.1.5192.168.1.99192.168.2.100
Which OSI layer uses a connection-oriented protocol to ensure
reliable delivery of data?
application layerpresentation layersession layertransport layer
application layerpresentation layersession layertransport layer
What are two characteristics of
the data link layer? (Choose two.)
|
|||||||||||
It segments and reorders
the data.
|
|||||||||||
It exchanges the frames between
nodes.
|
|||||||||||
It defines the method by
which network devices place data onto the media.
|
|||||||||||
It manages the transfer of data
between the processes that run on each host.
|
|||||||||||
It retrieves signals from the
media and restores them to their bit representations.
Refer to the exhibit. A user wants
to access the Internet from the PC. A part of the running configuration of
the router is shown. Which default gateway IP address should be configured at
the PC to enable this access?
10.1.192.110.1.192.210.1.192.54192.31.7.1
A network administrator wants to
restrict access to the router privileged EXEC mode. Which password should the
administrator use?
enableauxconsoleVTY |
A network has grown too large for technicians to configure network
addresses and hosts files for name resolution. Which two application layer
services should be added to the server to allow these needs to be satisfied
dynamically? (Choose two.)
DNSFTPDHCPHTTPSMTP
DNSFTPDHCPHTTPSMTP
Refer to the exhibit. The host was disconnected from switch 2
and connected to switch 1. Which combination of IP address, subnet mask, and
default gateway should be assigned to this host to allow it to function in the
network?
IP address: 10.10.9.37 Subnet mask: 255.255.255.240 Default gateway: 10.10.9.35
IP address: 10.10.9.37 Subnet mask: 255.255.255.240 Default gateway: 10.10.9.35
IP
address: 10.10.9.37 Subnet mask: 255.255.255.224 Default gateway: 10.10.9.35
IP
address: 10.10.9.29 Subnet mask: 255.255.255.248 Default gateway: 10.10.9.35
IP
address: 10.10.9.32 Subnet mask: 255.255.255.224 Default gateway: 10.10.9.35
IP
address: 10.10.9.37 Subnet mask: 255.255.255.224 Default gateway: 196.1.105.6
IP
address: 10.10.9.63 Subnet mask: 255.255.255.224 Default gateway: 10.10.9.35
Refer to the exhibit. The headers
added at each layer are shown. Which layer adds the destination and source
process numbers to ensure that data is delivered to the correct application?
|
|
physical layer
|
|
data link layer
|
|
network layer
|
|
transport layer
|
Which memory contents will change as a result of using the
Router# erase startup-config command on a router?
RAMROMflashNVRAM
RAMROMflashNVRAM
Which three statements are true about network layer addressing?
(Choose three.)
It uniquely identifies each host.
It uniquely identifies each host.
It
assists in forwarding packets across internetworks.
It
uses a logical 32-bit IPv4 address.
It
is not a configurable address.
It
is a physical address.
It
identifies the host from the first part of the address.
The Layer 4 header contains which type of information to aid in
the delivery of data?
service port numberhost logical addressdevice physical addressvirtual connection identifier
service port numberhost logical addressdevice physical addressvirtual connection identifier
Refer to the exhibit. A network technician has made several
changes to R1 since the configuration has last been saved. The modified
configuration did not produce the desired changes. The technician wants to
store a backup copy of the saved configuration on a TFTP server before
reloading. Which action will cause the unmodified data to be saved on the TFTP
server? Answer Option 2
Refer to the exhibit. Which set of
devices contains only intermediary devices?
|
|
A, B, D, G
|
|
A, B, E, F
|
|
C, D, G, I
|
|
G, H, I, J
|
By using the ipconfig command, a network administrator
determines that a workstation has the address 192.168.3.38 with 29 bits set in
the subnet mask. To what network does the workstation belong?
192.168.3.8192.168.3.16192.168.3.24192.168.3.32
192.168.3.8192.168.3.16192.168.3.24192.168.3.32
What is the Cisco IOS?
system software for Cisco devicesRead Only Memory in Cisco devicesnon-volatile storage for device configurationsan initial operating system that is used for boot functions
system software for Cisco devicesRead Only Memory in Cisco devicesnon-volatile storage for device configurationsan initial operating system that is used for boot functions
Refer to the exhibit. Host X is
unable to communicate with host Y. Which command can be run at host X to
determine which intermediary device is responsible for this failure?
|
|
telnet 192.168.1.1
|
|
ping 192.168.1.1
|
|
ftp 192.168.1.1
|
|
tracert 192.168.1.1
|
Refer to the exhibit. Which
logical topology describes the exhibited network?
|
|
star
|
|
ring
|
|
point-to-point
|
|
multi-access
|
Which statement is true about the
ICMP protocol?
|
|
It is an application layer
protocol.
|
|
It is designed to make IP a
reliable protocol.
|
|
It is often filtered out
of networks for security purposes.
|
|
If a host does not respond to an
ICMP echo request, the host is not functioning.
|
Refer to the exhibit. Host A wants to access the Internet. Which
combination of a Layer 2 address and a Layer 3 address will enable this access
from host A?
Destination MAC: 0030.8596.DE83 Default gateway: 209.165.202.130
Destination MAC: 0030.8596.DE83 Default gateway: 209.165.202.130
Destination
MAC: 0030.8596.DE82 Default gateway: 172.16.9.2
Destination MAC:
0030.8517.44C4 Default gateway: 172.16.1.1
Destination
MAC: 0030.8517.44C4 Default gateway: 209.165.202.130
Examine the graphic with current configurations. Host A in the
Clerical office failed and was replaced. Although a ping to 127.0.0.1 was
successful, the replacement computer cannot access the company network. With
proxy ARP disabled on the Fa0/0 interface of the New York router, what is the
likely cause of the problem?
network card failure
network card failure
network
cables unplugged
IP
address incorrectly entered
subnet mask incorrectly
entered
Refer to the exhibit. Host B was
powered off. What change will occur in the MAC table of the switch?
|
|
The table will remain unaffected.
|
|
The switch will remove
the MAC address at Fa0/19.
|
|
The switch will retain the MAC
address until host B is powered on again.
|
|
The switch will rebuild the MAC
table by assigning the FFFF.FFFF.FFFF address to port Fa0/19.
|
Refer to the exhibit. A network administrator is troubleshooting
a link that is down between Router1 and Router2. To correct the problem, which
wire pairs need to be switched on one of the Ethernet cable ends?
pair 1 and pair 2pair 1 and pair 3pair 2 and pair 3pair 2 and pair 4
pair 1 and pair 2pair 1 and pair 3pair 2 and pair 3pair 2 and pair 4
What is the result of using
the clock rate 56000 command at the serial interface of the
router?
|
|
The interface is
configured as a DCE device.
|
|
The interface timers are cleared.
|
|
The FastEthernet interface is made
to emulate a serial interface by assigning it a timing signal.
|
|
The IP address for the serial
interface is configured.
|
What information is contained in
the header of Layer 3 to help data delivery?
|
|
port number
|
|
device physical address
|
|
destination host logical address
|
|
virtual connection identifier
|
As network administrator, what is the subnet mask that allows
510 hosts given the IP address 172.30.0.0?
255.255.0.0
255.255.0.0
255.255.248.0
255.255.252.0
255.255.254.0
255.255.255.0
255.255.255.128
Refer to the exhibit. The PC, the routing table of which is
displayed, is configured correctly. To which network device or interface does
the IP address 192.168.1.254 belong?
PC
PC
switch
router
interface fa0/0
router
interface fa0/1
Which fiber connector supports full-duplex Ethernet?
*Answer Option 3
Which three IPv4 addresses represent a broadcast for a subnet?
(Choose three.)
172.16.4.63 /26
172.16.4.63 /26
172.16.4.129
/26
172.16.4.191
/26
172.16.4.51
/27
172.16.4.95
/27
172.16.4.221
/27
Which device should be used for routing a packet to a remote
network?
access switchDHCP serverhubrouter
access switchDHCP serverhubrouter
What are three characteristics of CSMA/CD? (Choose three.)
It monitors the media for presence of a data signal.
It monitors the media for presence of a data signal.
After
detecting a collision, hosts can resume transmission after a random timer has
expired.
A
jam signal is used to ensure that all hosts are aware that a collision has
occurred.
Devices
can be configured with a higher transmission priority.
Data
is transmitted only when the data signal is present.
It
uses a token system to avoid collisions.
While configuring a router, a network technician wants to name
the router. Which prompt should the technician see when entering the hostname command?
Router>Router#Router(config)#Router(config-line)#
Router>Router#Router(config)#Router(config-line)#
Which OSI layer uses the header information to reassemble the
data segments into streams?
application layernetwork layerpresentation layersession layertransport layer
application layernetwork layerpresentation layersession layertransport layer
Refer to the exhibit. Which option shows the correct topology
given the configuration of Router1? *Answer Option 1
Refer to the exhibit. The NAT functionality of the router is
enabled to provide Internet access to the PC. However, the PC is still unable
to access the Internet. Which IP address should be changed to 209.165.201.1 to
enable the PC to access the Internet?
192.168.1.191192.168.1.101192.168.1.1192.168.1.254
192.168.1.191192.168.1.101192.168.1.1192.168.1.254
Refer to the exhibit. The serial interface of the router was
configured with the use of the commands that are shown. The router cannot ping
the router that is directly connected to interface serial 0/0/0. What should
the network technician do to solve this problem?
Configure the description at interface serial 0/0/0.
Configure the description at interface serial 0/0/0.
Configure an IP address on
interface serial 0/0/0.
Remove
the no shutdown command at interface serial 0/0/0
Reboot
the router.
Refer to the exhibit. A PC is connected to a network. Which
action will verify that the PC can communicate with its default gateway?
Use the ping 127.0.0.1 command.
Use the ping 127.0.0.1 command.
Use
the ipconfig command.
Use
the ipconfig/all command.
Use
the ping 10.0.0.254 command.
Refer to the exhibit. Host A sends a frame to host C with a
destination MAC address CC. The MAC address for host C is not in the MAC table
of switch SW1. How will SW1 handle the frame?
Switch SW1 will drop the frame.
Switch SW1 will drop the frame.
Switch
SW1 will forward the frame to host C.
Switch
SW1 will flood the frame out all ports.
Switch
SW1 will flood the frame out all ports except port Fa0/1.
A network technician is tasked
with setting up a network for six users, but the users should be able to use
their accounts to log on from any of the six computers. What type of network
should be used?
|
|
workgroup
|
|
P2P applications
|
|
peer-to-peer network
|
|
client-server network
|
Refer to the exhibit. A web browser is running on host PC1 with
an IP address 10.10.2.2/24. A dynamic port number of 49152 is assigned to the
browser. The browser sends a request for a web page to the web server with an
IP address 192.168.1.254/24. Which statement is true?
The session is established using TCP, and the socket number for the web server is 192.168.1.254: 80.
The session is established using TCP, and the socket number for the web server is 192.168.1.254: 80.
The
session is established using TCP, and the socket number for the web server is
192.168.1.254: 49152.
The
session is established using UDP, and the socket number for the web server is
192.168.1.254: 80.
The
session is established using UDP, and the socket number for the web server is
192.168.1.254: 49152.
If an administrator wished to return a router to the default
state, what additional step must be taken after issuing the command erase
start-up config?
Reload the device.
Reload the device.
Issue
the command copy running-config start-up config.
Perform
a show running-config to verify that the file was removed.Enter
the interface commands to allow the device to connect to the network.
Which statement is true about
router hostnames?
|
|
A hostname should be
unique on each router.
|
|
A router hostname cannot contain
capital letters.
|
|
A router hostname is configured in
privileged executive mode.
|
|
A router hostname must be created
before any other configurations can be added to the device.
|
Which physical connector type is used for a serial V.35
connection to the CSU/DSU? *Answer Option 4
A user types the enable command. What task can
be performed at the privileged EXEC mode?
Configure the device.
Configure the device.
Configure
individual interfaces.
Configure
individual terminal lines.
Issue show and debug commands.
Refer to the exhibit. Which two
facts can be determined about the topology? (Choose two.)
|
|
Four collision domains
are present.
|
|
One logical network is
represented.
|
|
Two broadcast domains
are present.
|
|
Three networks are needed.
|
|
Three logical address ranges are required.
CCNA 1 Practice Final Exam Answer
Juga, ini tambahan yg terbaru yang tidak ada diatas.
Refer to the exhibit. Host X is
unable to communicate with host Y. Which command can be run at host X to
determine which intermediary device is responsible for this failure?
telnet 192.168.1.1 ping 192.168.1.1 ftp 192.168.1.1 tracert 192.168.1.1
21. Refer to the exhibit. In a
network, host A is sending data segments to host B. The flow control of the
segments that are being exchanged is displayed. Which two statements are true
about this communication? (Choose two.)
- The initial window size is determined via the two-way handshake. - The window size for the TCP session that is represented is initially set to 3000 bytes. - Acknowledgment number 3001 indicates that host A will send the next segment with sequence number 3001. - Host B expects that the next received segment number will be 3000. - No more acknowledgments will be exchanged.
To enhance security in a network,
the network administrator uses these commands:
Router(config)# line console 0 Router(config-line)# password j1mdi2 Router(config-line)# login What two conclusions are evident from these commands? (Choose two.)
Users who attempt to
connect to the console port of the router must enter a password.
The entries permit
access through the console by the use of j1mdi2 as the password.
The entries eliminate the need for
authentication.
Access through the console will be
denied because the console configuration is incomplete.
The entries prevent passwords from
being displayed as
34. Which TCP/IP model layer creates additional overhead on
network resources due to acknowledgments, tracking, and retransmission of
data?
internet transport application network access
22. As network administrator, what is the subnet mask that
allows 510 hosts given the IP address 172.30.0.0?
255.255.0.0 255.255.248.0 255.255.252.0 255.255.254.0 255.255.255.0 255.255.255.128
45. Refer to the exhibit.
Interface Fa0/0 on router A is generating excessive broadcast traffic. Which
LAN segments will affected by the excessive broadcasts?
Only the 192.168.1.200/30 network will be affected. Only the link between 192.168.1.201 and port Fa0/5 on SW1 will be affected. Both the 192.168.1.200/30 and 192.168.1.204/30 networks will be affected. Only the links between 192.168.1.201 and port Fa0/7 on SW2 will be affected.
What is the effect of the
command copy running-config tftp?
copies the configuration currently
in NVRAM to a remote machine
Which password would allow a user
to establish a Telnet session with a Cisco device?
VTY password enable password console password enable secret password
Refer to the exhibit. Each media
link is labeled. What type of cable should be used to connect the different
devices?
- Connection 1 – rollover cable
Connection 2 – straight-through cable Connection 3 – crossover cable
- Connection 1 – straight-through cable Connection 2 – crossover cable Connection 3 – rollover cable - Connection 1 – crossover cable Connection 2 – rollover cable Connection 3 – straight-through cable - Connection 1 – crossover cable Connection 2 – straight-through cable Connection 3 – rollover cable - Connection 1 – straight-through cable Connection 2 – straight-through cable Connection 3 – straight-through cable
When connectionless protocols are
implemented at the lower layers of the OSI model, what is usually used to
acknowledge that the data was received and to request the retransmission of
missing data?
IP UDP Ethernet a connectionless acknowledgement an upper-layer, connection-oriented protocol or service
Refer to the exhibit. Host A uses
router A as its default gateway. If host A sends an ICMP echo request to
172.16.10.0, what ICMP response will host A receive.
echo reply source quench route redirection destination unreachable
What purpose does a hostname serve
on a router?
uniquely identifies a router on the internet used by routing protocols to identify peer routers provides device identification to users logging on remotely determines the hosts that are allowed to connect to the device
What can the user do from the
command prompt, Router(config-line)# ?
Configure one of the network
interfaces.
Configure one of the
physical or virtual lines.
Verify the running configuration
on the device.
Configure the parameters for one
of the routing protocols.
Refer to the exhibit. What is the correct destination
socket number for a web page request from Host A to the web server?
198.133.219.25:80 18. Which combination of network id and subnet mask correctly identifies all IP addresses from 172.16.128.0 through 172.16.159.255? 172.16.128.0 255.255.224.0 What are two primary responsibilities of the Ethernet MAC sublayer? (Choose two.) frame delimiting data encapsulation logical addressing error detection accessing the media A user types the enable command. What task can be performed at the privileged EXEC mode? Issue show and debug commands. Which two functions of the OSI model occur at layer two? (Choose two.) physical addressing encoding routing cabling media access control Refer to the exhibit. All devices in the network use default configurations. How many logical address ranges are required in this topology? • 2 • 3 • 4 • 5 • 6 Refer to the exhibit. The network containing router B is experiencing problems. A network associate has isolated the issue in this network to router B. What action can be preformed to correct the network issue? issue the clock rate command on interface Serial 0/0/0
Which two types of media can
provide bandwidth up to 1 Gb/s? (Choose two.)
10 BASE-T
100 BASE-T
100 BASE-FX
1000 BASE-TX
1000 BASE-SX
|
40) Refer to the
exhibit. Host A attempts to establish a TCP/IP session with host C. During this
attempt, a frame was captured at the FastEthernet interface fa0/1 of router Y.
The packet inside the captured frame has the IP source address 172.16.1.5, and
the destination IP address is 172.16.7.24. What is the source MAC address of
the frame at the time of capture?
ans:
0060.7320.B826
ans:
0060.7320.B826
Refer to the exhibit.
On the basis of the IP configuration that is shown, what is the reason that
Host A and Host B are unable to communicate outside the local network?
Host A was assigned a network address.
Host B was assigned a multicast address.
Host A and Host B belong to different networks.
The gateway address was assigned a broadcast address.
Host A was assigned a network address.
Host B was assigned a multicast address.
Host A and Host B belong to different networks.
The gateway address was assigned a broadcast address.
Refer to the exhibit.
For connecting two routers with an Ethernet crossover cable, which interface
should be used?
A
B
C
D
What information can
be gathered by using the command netstat?
the default gateway
the routing protocol
active TCP connections
the locally configured subnet mask
the default gateway
the routing protocol
active TCP connections
the locally configured subnet mask
Refer
to the exhibit. A technician has been asked to test connectivity from PC1 to a
remote network. Which action will indicate if there is remote connectivity?
Correct answer is first image ! (Pilih
Gambar yg pertama)
10) Which three
addresses belong to the category of private IP addresses? (Choose three.)
ans:
10.0.0.1
172.16.0.1
192.168.0.1
ans:
10.0.0.1
172.16.0.1
192.168.0.1
Refer to the exhibit.
A web browser running on host PC1 sends a request for a web page to the web
server with an IP address 192.168.1.254/24. What sequence of steps will follow
in order to establish the session before data can be exchanged?
The session will be initiated using UDP. No additional acknowledgment will be required to establish the session.
The session will be initiated using TCP. No additional acknowledgment will be required to establish the session.
The session will be initiated using UDP. The returned web page will serve as an acknowledgment for session establishment.
The session will be initiated using TCP. A three-way handshake must be successfully completed before the session is established.
The session will be initiated using UDP. No additional acknowledgment will be required to establish the session.
The session will be initiated using TCP. No additional acknowledgment will be required to establish the session.
The session will be initiated using UDP. The returned web page will serve as an acknowledgment for session establishment.
The session will be initiated using TCP. A three-way handshake must be successfully completed before the session is established.
What is the protocol
data unit that is associated with the data link layer of the OSI reference
model?
data
frame
packet
segment
data
frame
packet
segment
Refer to the exhibit.
What three statements are true about the IP configuration that is shown?
(Choose three.)
The prefix of the subnet mask is /26.
The network on which this computer resides can have 30 hosts.
The computer is unable to communicate outside of the local network.
The address that is assigned to the computer represents private addressing.
The IP address that is assigned to the computer is routable on the Internet.
The IP address that is assigned as the default gateway is valid for this host.
The prefix of the subnet mask is /26.
The network on which this computer resides can have 30 hosts.
The computer is unable to communicate outside of the local network.
The address that is assigned to the computer represents private addressing.
The IP address that is assigned to the computer is routable on the Internet.
The IP address that is assigned as the default gateway is valid for this host.
50. Which
communication tool allows real-time collaboration?
wikie-mailwebloginstant messaging
wikie-mailwebloginstant messaging
Refer to the exhibit.
PC1 is unable to access PC2. To troubleshoot this problem, the technician needs
to confirm that the next hop interface is operational. Which default gateway
address should the technician ping from PC1 to confirm this?
10.0.0.254
192.168.0.249
192.168.0.250
10.0.1.254
10.0.0.254
192.168.0.249
192.168.0.250
10.0.1.254
A
technician makes several changes to the running configuration on a router, but
the desired results are not achieved. The technician issues the reloadcommand.
What action will be taken by the router?
The
user will be prompted to save changes before the router restarts.
Which
statement is true about the running configuration file in a Cisco IOS device?
It
should be deleted using the erase running-config command.
What
is a benefit of using private addressing for the internal LAN?
Public address space is conserved.
0 komentar:
Posting Komentar