FINAL!!! Flashcards
Which of the following are the address ranges of the private IP addresses? (Choose three.)
- 10.0.0.0 to 10.255.255.255
- 200.100.50.0 to 200.100.25.255
- 150.150.0.0 to 150.150.255.255
- 172.16.0.0 to 172.31.255.255
- 192.168.0.0 to 192.168.255.255
- 127.16.0.0 to 127.31.255.255
- 10.0.0.0 to 10.255.255.255
- 172.16.0.0 to 172.31.255.255
- 192.168.0.0 to 192.168.255.255
Which two functions of the OSI model occur at layer two? (Choose two.)
- physical addressing
- encoding
- routing
- cabling
- media access control
- physical addressing
- media access control
Refer to the exhibit. What function does router RT_A need to provide to allow Internet access for hosts in this network?
- address translation
- DHCP services
- ftpd
- web server

- address translation
What is true regarding network layer addressing? (Choose three.)
- uses a flat structure
- prevent broadcasts
- heirarchical
- uniquely identifies each host
- 48 bits in length
- contains a network portion
- heirarchical
- uniquely identifies each host
- contains a network portion
Refer to the exhibit. Host A attempts to establish a TCP/IP session with host C. During this attempt, a frame was captured with the source MAC address 0050.7320.D632 and the destination MAC address 0030.8517.44C4. The packet inside the captured frame has an IP source address 192.168.7.5, and the destination IP address is 192.168.219.24. At which point in the network was this packet captured?
- leaving host A
- leaving ATL
- leaving Dallas
- leaving NYC

- leaving Dallas
Refer to the exhibit. Assume all devices are using default configurations. How many subnets are required to address the topology that is shown?
- 1
- 3
- 4
- 5
- 7

- 3
A technician is asked to secure the privileged EXEC mode of a switch by requiring a password. Which type of password would require this login and be considered the most secure?
- console
- enable
- enable secret
- VTY
- enable secret
Refer to the exhibit. A technician is working on a network problem that requires verification of the router LAN interface. What address should be pinged from this host to confirm that the router interface is operational?
- 127.0.0.1
- 192.168.64.196
- 192.168.254.1
- 192.168.254.9
- 192.168.254.254

- 192.168.254.1
Which OSI layer does IP rely on to determine whether packets have been lost and to request retransmission?
- application
- presentation
- session
- transport
- transport
When connectionless protocols are implemented at the lower layers of the OSI model, what is usually used to acknowledge that the data was received and to request the retransmission of missing data?
- IP
- UDP
- Ethernet
- a connectionless acknowledgement
- an upper-layer, connection-oriented protocol or service
- an upper-layer, connection-oriented protocol or service
Refer to the exhibit. Host C is able to ping 127.0.0.1 successfully, but is unable to communicate with hosts A and B in the organization. What is the likely cause of the problem?
- Hosts A and B are not on the same subnet as host C.
- The IP addresses on the router serial interfaces are wrong.
- The subnet mask on host C is improperly configured.
- The FastEthernet interface fa0/0 of router 1 is wrongly configured.

- The subnet mask on host C is improperly configured.
Refer to the exhibit. Which list refers only to end devices?
- D,E,F,G
- A,H,B,C
- A,D,E,F
- A,D,E,G

- D,E,F,G
Refer to the exhibit. Host A sends a frame with the destination MAC address as FFFF.FFFF.FFFF. What action will the switch take for this frame?
- It will drop the frame.
- It will send the frame back to host A.
- It will send the frame to all hosts except host A.
- It will forward the frame to the default gateway.

- It will send the frame to all hosts except host A.
Which subnet mask will allow 2040 hosts per subnet on the IP network 10.0.0.0?
- 255.255.0.0
- 255.255.254.0
- 255.255.252.0
- 255.255.248.0
- 255.255.240.0
- 255.255.255.128
- 255.255.248.0
Refer to the exhibit. RouterB is configured properly. The Ethernet interface Fa0/0 of RouterA is configured with the use of the commands that are shown. However, a ping from the Fa0/0 interface of RouterA to the Fa0/0 interface of RouterB is unsuccessful. What action should be taken on RouterA to solve this problem?
- Use the description command on the FastEthernet interface Fa0/0.
- Configure the clock rate of the FastEthernet interface Fa0/0.
- Use the no shutdown command on the FastEthernet interface Fa0/0.
- Reboot the router.

- Use the no shutdown command on the FastEthernet interface Fa0/0.
To send data through a network, what two flags are used to establish a session? (Choose two.)
- ACK
- CRC
- SYN
- Ack #
- Port #
- Seq #
- ACK
- SYN
Which statement is true about the TTL value of an IPv4 packet?
- It determines the priority of a packet.
- It specifies the remaining “life” of the packet.
- It indicates that the packet has been fragmented.
- It denotes the data payload type that the packet is carrying.
- It specifies the remaining “life” of the packet.
Refer to the exhibit. Communication for hosts X and Y is restricted to the local network. What is the reason for this?
- Host X is assigned a network address.
- Host Y is assigned a multicast address.
- Host X and host Y belong to different networks.
- The gateway addresses are broadcast addresses.

- The gateway addresses are broadcast addresses.
What type of network is maintained if a server takes no dedicated role in the network?
- mainframe
- client/server
- peer-to-peer
- centralized
- peer-to-peer
A routing issue has occurred in your internetwork. Which of the following type of devices should be examined to isolate this error?
- access point
- host
- hub
- router
- switch
- router
A network technician has made a UTP cable that is terminated as T568A on one end and T568B on the opposite end. What type of cable has been constructed?
- patch
- console
- crossover
- straight-through
- crossover
Refer to the exhibit. A network administrator remotely accesses the CLI of RouterB from PC1 using Telnet. Which statement is true about this connection?
- The data is automatically encrypted.
- A Telnet server process is running on PC1.
- The connection is made through a VTY session on the router.
- A GET request was sent to RouterB to retrieve data during this session.

The connection is made through a VTY session on the router.
Which three addresses belong to the category of public IP addresses? (Choose three.)
- 127.0.0.1
- 196.1.105.6
- 132.11.9.99
- 10.0.0.1
- 172.16.9.10
- 46.1.1.97
- 196.1.105.6
- 132.11.9.99
- 46.1.1.97
Which range of port numbers are reserved for services that are commonly used by applications that run on servers?
- 0 to 255
- 0 to 1023
- 1024 to 49151
- 49152 to 65535
- 0 to 1023
Which prompt represents the appropriate mode used for the copy running-config startup-config command ?
- Switch-6J>
- Switch-6J#
- Switch-6J(config)#
- Switch-6J(config-if)#
- Switch-6J(config-line)#
- Switch-6J#
Which two factors contribute to the increased throughput when all nodes of a LAN are connected to a switch instead of a hub? (Choose two.)
- full-duplex operation
- collision-free environment
- logical bus media access
- broadcast-free environment
- point-to-multipoint topology
- full-duplex operation
- collision-free environment
A network administrator is configuring several switches for a network. The switches have similar configurations and only minor differences. The administrator wants to save all commands that are issued on the first switch to a text file for editing. Which transfer option should be selected in HyperTerminal?
- Send File…
- Receive File…
- Capture Text…
- Send Text File…
- Capture Text…
An organization has been assigned network ID 10.10.128.0 and subnet mask 255.255.224.0. Which IP address range can be used for this organization?
- 10.10.128.0 to 10.10.160.255
- 10.10.128.0 to 10.10.159.255
- 10.10.128.0 to 10.10.192.255
- 10.10.128.0 to 10.10.0.159
- 10.10.128.0 to 10.10.159.0
- 10.10.128.0 to 10.10.159.255
What is described by the network access layer of the TCP/IP model?
- rules for packet acknowledgment, error recovery, and sequencing
- rules for the handoff from the internet layer to the network access protocols
- rules for how source and destination hosts exchange data between programs
- rules for determining which processes can be used to route messages through an internetwork
- rules for the handoff from the internet layer to the network access protocols
A technician is setting up a workgroup for six users and wants to allow users to share files without setting up a server. Which application layer protocol will provide for peer-to-peer file sharing in a workgroup?
- DNS
- SMB
- HTTP
- DHCP
- SMB
Refer to the exhibit. Which type of network design is shown?
- client/server
- wide area
- dedicated server
- peer-to-peer

- peer-to-peer
Refer to the exhibit. A network technician wants to connect host A to the console of a Cisco switch to initialize the configuration. What type of cable is required for this connection?
- straight-through cable
- crossover cable
- rollover cable
- serial cable

- rollover cable
What command can be used to troubleshoot domain name resolution issues?
- get
- arp -a
- tracert
- nslookup
- nslookup
Refer to the exhibit. When host A sends a frame addressed for host D, which hosts will receive the frame?
- only host D
- only hosts A and D
- only hosts B, C, and D
- all hosts

- only host D
The tracert 10.1.3.2 command was issued on computer A. Computer A can ping other addresses on the local subnet. Computer A sent the first ICMP packet toward computer B with a TTL value of 1. A protocol analyzer that was running on computer B showed that the packet never reached its destination. Why did the packet not reach the destination?
- There is a TCP/IP problem on computer A.
- There is a routing loop between R1 and R2.
- R1 does not have a route for the destination network.
- The TTL for the packet was decreased to zero by R1.

- The TTL for the packet was decreased to zero by R1.
A user enters http://www.cisco.com/web1.htm in the address line of a browser. Which statement is true about this transaction?
- The “http” portion indicates the protocol that is being used.
- The “web1.htm” portion is the specific service name.
- The retrieved web page will be displayed in URL code.
- The “www.cisco.com” is the name of the web page file that is called.
- The “http” portion indicates the protocol that is being used.
When must a router serial interface be configured with the clock rate command?
- when the interface is functioning as a DTE device
- when the interface timers have been cleared
- when the connected DTE device is shut down
- when the interface is functioning as a DCE device
- when the interface is functioning as a DCE device
Which option shows the PDU that contains the Layer 3 source and destination addressing for a packet?

Option 3
Which communication tool allows real-time collaboration?
- wiki
- weblog
- instant messaging
- instant messaging
Refer to the exhibit. Which application layer service was used to determine the IP address assigned to the URL?
- DNS
- HTTP
- ICMP
- IP

?
Which router component will have contents erased when the command erase startup-config is issued?
- flash
- RAM
- ROM
- NVRAM
- NVRAM
Which prompt is associated with the privileged exec mode?
- R1>
- R1#
- R1(config)#
- R1(config-router)#
- R1#
Which scenario describes a typical peer-to-peer network environment?
- An employee downloads a file that is stored on a departmental file server.
- An employee edits and reviews web pages on a web server that is located in the server farm.
- A teleworker logs into a core router of the corporate network and makes a configuration change.
- A user on one office PC sends output to a printer that is attached to the USB port of another PC in an adjacent office.
- A user on one office PC sends output to a printer that is attached to the USB port of another PC in an adjacent office.
To enhance security in a network, the network administrator uses these commands:
Router(config)# line console 0
Router(config-line)# password j1mdi2
Router(config-line)# login
What two conclusions are evident from these commands? (Choose two.)
- Users who attempt to connect to the console port of the router must enter a password.
- The entries permit access through the console by the use of j1mdi2 as the password.
- The entries eliminate the need for authentication.
- Access through the console will be denied because the console configuration is incomplete.
- The entries prevent passwords from being displayed as plain text.
- Users who attempt to connect to the console port of the router must enter a password.
- The entries permit access through the console by the use of j1mdi2 as the password.
Refer to the exhibit. Which option correctly identifies the network address, range of host addresses, and the broadcast address for the network that contains host A?
- 172.16.0.0–172.16.0.1-172.16.47.254–172.16.47.255
- 172.16.16.0–172.16.0.1-172.16.47.254–172.16.47.255
- 172.16.32.0–172.16.32.1-172.16.47.254–172.16.47.255
- 172.16.32.0 –172.16.32.1-172.16.63.254–172.16.63.255

- 172.16.32.0–172.16.32.1-172.16.47.254–172.16.47.255
Refer to the exhibit. Host A is able to access resources on the local LAN but is unable to access any resources on the Internet. What is the likely cause of this problem?
- The host subnet mask in incorrect.
- The network uses private addresses.
- The host address is a network address.
- The default gateway is on a different subnet from the host.

- The default gateway is on a different subnet from the host.
A routing issue has occurred in your internetwork. Which of the following type of devices should be examined to isolate this error?
- access point
- host
- hub
- router
- switch
- router
Refer to the exhibit. For connecting two routers with an Ethernet crossover cable, which interface should be used?
- A
- B
- C
- D

- C
Which option represents a point-to-point logical topology diagram?

Which OSI layer manages data segments?
- application layer
- presentation layer
- session layer
- transport layer
- transport layer
Which two types of media can provide bandwidth up to 1 Gb/s? (Choose two.)
- 10 BASE-T
- 100 BASE-T
- 100 BASE-FX
- 1000 BASE-TX
- 1000 BASE-SX
- 1000 BASE-TX
- 1000 BASE-SX
Refer to the exhibit. An employee wants to access the organization intranet from home. Which intermediary device should be used to connect the organization intranet to the Internet to enable this access?
- hub
- switch
- router
- wireless access point

- router
How many host addresses may be assigned when using the 128.107.0.0 network address with a subnet mask of 255.255.248.0?
- 30
- 256
- 2046
- 2048
- 4094
- 4096
- 2046
Which application belongs to the category of the client/server model?
- using Telnet to access a router
- exchanging information via instant messaging
- printing a document to a locally connected printer
- scanning a document with a directly connected scanner
- using Telnet to access a router
Refer to the exhibit. Which two layers of the OSI model describe the same functions as the transport and internet layers of the TCP/IP model? (Choose two.)
- application layer
- presentation layer
- session layer
- transport layer
- network layer
- data link layer
- physical layer

- transport layer
- network layer
Which application layer protocol allows administrators to log into a server from remote locations and control a server as though logged in locally?
- DNS
- FTP
- DHCP
- SMTP
- Telnet
- Telnet
Refer to the exhibit. What two facts can be determined from the session information that is displayed? (Choose two.)
- The protocol is a connection-oriented protocol.
- This exchange is part of the three-way handshake.
- The SYN flag is representing the initial establishment of a session.
- The destination port indicates that an FTP session has been initiated.
- The source port does not support communication with the destination port that is listed.

- The protocol is a connection-oriented protocol.
- This exchange is part of the three-way handshake.
Which topology divides the collision domain and provides full media bandwidth to the hosts in the network?
- HUB1-HUB2
- SW1-HUB1
- SW1-SW2
- HUB1-HUB2-HUB3
- SW1-SW2
Refer to the exhibit. The ping 127.0.0.1 command is issued on the local host. What do the ping results indicate?
- The local host can send packets on the local network.
- The TCP/IP stack on the local host operates properly.
- The local host has full connectivity to the default gateway.
- The local host has full connectivity to the remote network.

- The TCP/IP stack on the local host operates properly.
A technician makes several changes to the running configuration on a router, but the desired results are not achieved. The technician issues the reload command. What action will be taken by the router?
- All changes will be lost and the router will restart immediately.
- Changes will be saved automatically and the router will restart.
- The user will be prompted to save changes before the router restarts.
- The router will detect changes to the running configuration and will reload using the configuration stored in RAM.
- The user will be prompted to save changes before the router restarts.
What is the effect of the command copy running-config tftp?
- copies the configuration from a remote machine into RAM
- copies the configuration from a remote machine into NVRAM
- copies the configuration currently in RAM to a remote machine
- copies the configuration currently in NVRAM to a remote machine
- copies the configuration currently in RAM to a remote machine
Refer to the exhibit. Host1 is in the process of setting up a TCP session with Host2. Host1 has sent a SYN message to begin session establishment. What happens next?
- Host1 sends a segment with the ACK flag = 0, SYN flag = 0 to Host2.
- Host1 sends a segment with the ACK flag = 1, SYN flag = 0 to Host2.
- Host1 sends a segment with the ACK flag = 1, SYN flag = 1 to Host2.
- Host2 sends a segment with the ACK flag = 0, SYN flag = 1 to Host1.
- Host2 sends a segment with the ACK flag = 1, SYN flag = 0 to Host1.
- Host2 sends a segment with the ACK flag = 1, SYN flag = 1 to Host1.

- Host2 sends a segment with the ACK flag = 1, SYN flag = 1 to Host1.
Refer to the exhibit. A network technician is trying to determine the correct IP address configuration for Host A. What is a valid configuration for Host A?
- IP address: 192.168.100.19; Subnet Mask: 255.255.255.248; Default Gateway: 192.16.1.2
- IP address: 192.168.100.20; Subnet Mask: 255.255.255.240; Default Gateway: 192.168.100.17
- IP address: 192.168.100.21; Subnet Mask: 255.255.255.248; Default Gateway: 192.168.100.18
- IP address: 192.168.100.22; Subnet Mask: 255.255.255.240; Default Gateway: 10.1.1.5
- IP address: 192.168.100.30; Subnet Mask: 255.255.255.240; Default Gateway: 192.168.1.1
- IP address: 192.168.100.31; Subnet Mask: 255.255.255.240; Default Gateway: 192.168.100.18

- IP address: 192.168.100.20; Subnet Mask: 255.255.255.240; Default Gateway: 192.168.100.17
What can the user do from the command prompt, Router(config-line)# ?
- Configure one of the network interfaces.
- Configure one of the physical or virtual lines.
- Verify the running configuration on the device.
- Configure the parameters for one of the routing protocols.
- Configure one of the physical or virtual lines.
Refer to the exhibit. Host A is unable to reach host B on the remote network. A technician attempted to ping the local gateway and the ping was successful. To verify the host configuration, the technician issued the ipconfig command. What is the likely cause of the problem?
- The local NIC is incorrectly configured.
- The subnet mask on host A is incorrectly configured.
- The IP address on host A is incorrectly configured.
- The default gateway on host A is incorrectly configured.

- The default gateway on host A is incorrectly configured.
Which three commands will change the current configuration mode of a router? (Choose three.)
- router rip
- line vty 0 4
- password class
- hostname RouterA
- enable secret class
- interface fastethernet 0/1
- router rip
- line vty 0 4
- interface fastethernet 0/1
What type of IP address should be assigned to a web server?
- static
- dynamic
- multicast
- broadcast
- static
Two routers are connected via their serial ports in a lab environment. The routers are configured with valid IP addresses, but they cannot ping each other. The show interface serial0/0 command shows that the serial0/0 interface is up but the line protocol is down. What could be the cause of this problem?
- The no shutdown command has not been applied to the interfaces.
- The clock rate command has not been entered on the DCE interface.
- The interface timers are not cleared.
- The FastEthernet interface is emulating a serial interface by assigning it a timing signal.
The clock rate command has not been entered on the DCE interface.
Which two programs can be used to accomplish terminal emulation for configuring a router from the CLI through the console port? (Choose two.)
- HyperTerminal
- Internet Explorer
- Minicom
- Secure Shell
- Telnet
- HyperTerminal
- Minicom
Which two factors contribute to the increased throughput when all nodes of a LAN are connected to a switch instead of a hub? (Choose two.)
- full-duplex operation
- collision-free environment
- logical bus media access
- broadcast-free environment
- point-to-multipoint topology
- full-duplex operation
- collision-free environment
What is the correct order for PDU encapsulation?

What information can be gathered by using the command netstat?
- the default gateway
- the routing protocol
- active TCP connections
- the locally configured subnet mask
- active TCP connections
How can ARP be used to help document the network?
- It can list each hop on the way to a destination host.
- It can show the average latency of hosts on the network.
- It can provide a list of physical addresses on the network.
- It can indicate which hosts are not responding to network traffic.
- It can provide a list of physical addresses on the network.
What is the protocol data unit that is associated with the data link layer of the OSI reference model?
- data
- frame
- packet
- segment
- frame
Which statement identifies the DNS protocol?
- It transmits information using TCP port 25.
- It transfers and conveys information using HTML pages.
- It matches a resource name with the required network address.
- It requests and assigns an IP address, default gateway, and server addresses to hosts.
- It matches a resource name with the required network address.
Which password would allow a user to establish a Telnet session with a Cisco device?
- VTY password
- enable password
- console password
- enable secret password
Which identifier is contained in the header of the Layer 2 Ethernet frame?
- timing and synchronization of bits
- source and destination port numbers
- logical source and destination addresses
- physical source and destination addresses
- physical source and destination addresses
What happens when a node on an Ethernet network is creating a frame and it does not have the destination MAC address?
- The node drops the frame.
- The node sends out a Layer 3 broadcast message.
- The node sends a message directly to the router for the address.
- The node sends out an ARP request with the destination IP address.
- The node sends out an ARP request with the destination IP address.
An administrator makes changes to the default configuration of a router and saves them to NVRAM. After testing, it is discovered that the configurations did not have the desired effect and must be removed. What steps must be taken to remove the changes and return the router to the default configuration?
- Reboot the router.
- Use no version of the commands that are issued.
- Issue the erase startup-config command, and then reboot the router.
- Issue the erase running-config command, and then reboot the router.
- Issue the erase startup-config command, and then reboot the router.
A network administrator is tasked with connecting two workgroups that are configured to use different subnets. Which device should be selected to allow connectivity between users on the two networks?
- hub
- switch
- router
- wireless access point
- router
Which statement accurately describes file sharing in a peer-to-peer network?
- A dedicated server is required.
- Access control is decentralized.
- Files are typically stored on the most powerful peer in the network.
- Peers can either make requests, or respond to requests, but not both.
- Access control is decentralized.
What are two primary responsibilities of the Ethernet MAC sublayer? (Choose two.)
- frame delimiting
- data encapsulation
- logical addressing
- error detection
- accessing the media
- data encapsulation
- accessing the media
Refer to the exhibit. Interface Fa0/0 on router A is generating excessive broadcast traffic. Which LAN segments will affected by the excessive broadcasts?
- Only the 192.168.1.200/30 network will be affected.
- Only the link between 192.168.1.201 and port Fa0/5 on SW1 will be affected.
- Both the 192.168.1.200/30 and 192.168.1.204/30 networks will be affected.
- Only the links between 192.168.1.201 and port Fa0/7 on SW2 will be affected.

- Only the 192.168.1.200/30 network will be affected.
Two routers are connected via their serial ports in a lab environment. The routers are configured with valid IP addresses, but they cannot ping each other. The show interface serial0/0 command shows that the serial0/0 interface is up but the line protocol is down. What could be the cause of this problem?
- The no shutdown command has not been applied to the interfaces.
- The clock rate command has not been entered on the DCE interface.
- The interface timers are not cleared.
- The clock rate command has not been entered on the DCE interface.