• (Khác biệt giữa các bản)
    (s1)
    (chap1)
    Dòng 1: Dòng 1:
    -
    91%
    +
    1. If a router cannot find a valid configuration file during the startup sequence, what will occur?
    -
    1.
    +
    **The router will prompt the user for a response to enter setup mode.
    -
    +
    2. Refer to the exhibit. The network administrator has configured the router with the interface IP addresses shown for the directly connected networks. Pings from the router to hosts on the connected networks or pings between router interfaces are not working. What is the most likely problem?
    -
    Host A attempts to establish a TCP/IP session with host C…
    +
    The destination networks do not exist.
    -
    Refer to the exhibit. Host A attempts to establish a TSP/IP session with host C. During this attempt, a frame was captured at the FastEthernet interface fa0/1 of router Y. The packet inside the captured frame has the IP source address 172.16.1.5 and the destination IP address is 172.16.7.24 . What is the source MAC address of the frame at the time of capture?
    +
    **The interfaces must be enabled with the no shutdown command.
    -
     
    +
    3. Refer to the exhibit. What can be concluded from the routing table output in the exhibit? (Choose two.)
    -
    0040.8596.DE82
    +
    **The FastEthernet0/0 and Serial0/0/0 interfaces of this router were configured with an IP address and the no shutdown command.
    -
    **0060.7320.B826
    +
    **An IP packet received by this router with a destination address of 198.18.9.1 will beforwarded out of the Serial0/0/0 interface.
    -
     
    +
    4. Refer to the exhibit. The frame shown in the exhibit was received by the router. The router interfaces are operational. How will the router process this frame? (Choose two.
    -
    060.7320.D632
    +
    **The router will change the frame type to one supported by the WAN link before forwarding the frame.
    -
    0010.4F74.AC09
    +
    5. Passwords can be used to restrict access to all or parts of the Cisco IOS. Select the modes and interfaces that can be protected with passwords. (Choose three.)
    -
    0040.8596.DE81
    +
    **VTY interface
    -
     
    +
    **console interface
    -
    2.
    +
    **privileged EXEC mode
    -
    +
    6. Which two statements correctly describe the components of a router? (Choose two.)
    -
    Refer to the exhibit. An employee wants to access the organization intranet from home. Which intermediary device should be used to connect the organization intranet to the Internet to enable this access?
    +
    **ROM contains diagnostics executed on hardware modules.
    -
    hub
    +
    **Flash memory does not lose its contents during a reboot.
    -
    switch
    +
    7. Refer to the exhibit. After host 2 is connected to the switch on the LAN, host 2 is unable to communicate with host 1. What is the cause of this problem?
    -
    **router
    +
    **Host 1 and host 2 are on different networks.
    -
    wireless access point
    +
    8. Which are functions of a router? (Choose three.)
    -
    3.
    +
    **packet switching, segmentation of broadcast domains ,selection of best path based on logical addressing
    -
    +
    9. Refer to the exhibit. All routers have a route in its routing table to each network that is shown in the exhibit. Default routes have not been issued on these routers. What can be concluded about how packets are forwarded in this network? (Choose two.)
    -
    The host was disconnected from switch 2 and connected to switch 1. Which combination of IP address, subnet mask, and default gateway should be assigned to this host to allow it to function in the network?
    +
    **If RouterA receives a packet that is destined for 192.168.3.146, it will be forwarded out interface S0/0/1.
    -
    Refer to the exhibit. The host was disconnected from switch 2 and connected to switch 1. Which combination of IP address, subnet mask, and default gateway should be assigned to this host to allow it to function in the network?
    +
    **If RouterB receives a packet that is destined for 10.5.27.15, it will be forwarded out interface S0/0/1.
    -
    IP address: 10.10.9.37 Subnet mask: 255.255.255.240 Default gateway: 10.10.9.35
    +
    10. The serial connection shown in the graphic needs to be configured. Which configuration commands must be made on the Sydney router to establish connectivity with the Melbourne site? (Choose three.)
    -
    **IP address: 10.10.9.37 Subnet mask: 255.255.255.224 Default gateway: 10.10.9.35
    +
    **Sydney(config-if)# ip address 201.100.53.2 255.255.255.0
    -
    IP address: 10.10.9.29 Subnet mask: 255.255.255.248 Default gateway: 10.10.9.35
    +
    ** Sydney(config-if)# no shutdown
    -
    IP address: 10.10.9.32 Subnet mask: 255.255.255.224 Default gateway: 10.10.9.35
    +
    ** Sydney(config-if)# clock rate 56000
    -
    IP address: 10.10.9.37 Subnet mask: 255.255.255.224 Default gateway: 196.1.105.6
    +
    11. Refer to the exhibit. What can be concluded from the output of the running-configuration of a router?
    -
    IP address: 10.10.9.63 Subnet mask: 255.255.255.224 Default gateway: 10.10.9.35
    +
    ** The commands that are displayed determine the current operation of the router.
    -
    4. Which range of port numbers is assigned dynamically to client applications when initiating a connection to the server?
    +
    12. Refer to the exhibit. Host A pings host B. When R4 accepts the ping into the Ethernet interface, what two pieces of header information are included? (Choose two.)
    -
    0 to 255
    +
    ** destination IP address: 192.168.10.134
    -
    **49152 to 65535
    +
    ** destination MAC address: 9999.DADC.1234
    -
    1024 to 49151
    +
    13. What is the outcome of entering these commands?
    -
    0 to 1023
    +
    R1(config)# line vty 0 4 R1(config-line)# password check123
    -
    5.
    +
    R1(config-line)# login
    -
    +
    ** sets the password to be used for connecting to this router via Telnet
    -
    Refer to the exhibit. The diagram represents the process of sending e-mail between clients. Which list correctly identifies the component or protocol used at each numbered stage of the diagram?
    +
    14. Which of the following is the correct flow of routines for a router startup?
    -
    1.MUA 2.MDA 3.MTA 4.SMTP 5.MTA 6.POP 7.MDA 8.MUA
    +
    **load bootstrap, load IOS, apply configuration
    -
    1.MUA 2.POP 3.MDA 4.SMTP 5.MTA 6.MDA 7.SMTP 8.MUA
    +
    15. What three processes does a router execute when it receives a packet from one network that is destined for another network? (Choose three.)
    -
    1.MUA 2.POP 3.SMTP 4.MDA 5.MTA 6.SMTP 7.POP 8.MUA
    +
    **decapsulates the Layer 3 packet by stripping off the Layer 2 frame header
    -
    **1.MUA 2.SMTP 3.MTA 4.SMTP 5.MTA 6.MDA 7.POP 8.MUA
    +
    **uses the destination IP Address in the IP header to look up the next-hop address in the routing table
    -
     
    +
    **encapsulates the Layer 3 packet into the new Layer 2 frame and forwards it out the exit interface
    -
    6. Refer to the exhibit. While configuring a network, a technician wired each end of a Category 5e cable as shown. Which two statements are true about this setup? (Choose two.)
    +
    16. The network administrator needs to connect two routers directly via their FastEthernet ports. What cable should the network administrator use?
    -
    **The cable is suitable for connecting a switch to a router Ethernet port.
    +
    ** cross-over
    -
    **The cable is suitable for connecting dissimilar types of devices.
    +
    17. Which two statements describe characteristics of load balancing? (Choose two.)
    -
    The cable is unusable and must be rewired.
    +
    **Load balancing allows a router to forward packets over multiple paths to the same destination network.
    -
    The cable is terminated in a way that the transmit pin is wired to the receive pin.
    +
    **Unequal cost load balancing is supported by EIGRP.
    -
    The cable simulates a point-to-point WAN link.
    +
    18. What information about the router and its startup process can be gathered from the output of the show version command? (Choose three.)
    -
    7. Refer to the exhibit. Which two facts can be determined about the topology? (Choose two.)
    +
    **the last restart method
    -
    **Four collision domains are present.
    +
    **the configuration register settings
    -
    One logical network is represented.
    +
    **the location from where the IOS loaded
    -
    **Two broadcast domains are present.
    +
    19. Which interfaces in the exhibit could be used for a leased line WAN connection? (Choose two.)
    -
    Three networks are needed.
    +
    **1,4
    -
    Three logical address ranges are required.
    +
    20. From what location can a router load the Cisco IOS during the boot process? (Choose two.)
    -
    8.
    +
    ** TFTP server
    -
    +
    ** Flash memory
    -
    nslookup command on the PC
    +
    21. A network administrator has just entered new configurations into Router1. Which command should be executed to save configuration changes to NVRAM?
    -
    Refer to exhibit. A technician uses the nslookup command on the PC and views the output that is displayed in the exhibit. What is the IP address of the primary domain name server used by the host?
    +
    ** Router1# copy running-config startup-config
    -
     
    +
    22. What is the default sequence for loading the configuration file?
    -
    **10.10.10.32
    +
    ** NVRAM, TFTP, CONSOLE
    -
    192.168.1.5
    +
    23. What header address information does a router change in the information it receives from an attached Ethernet interface before information is transmitted out another interface?
    -
    192.168.1.99
    +
    ** the Layer 2 source and destination address
    -
    192.168.2.100
    +
    -
    9. Which subnet mask will allow 2040 hosts per subnet on the IP network 10.0.0.0?
    +
    -
    255.255.0.0
    +
    -
    255.255.254.0
    +
    -
    255.255.252.0
    +
    -
    **255.255.248.0
    +
    -
    255.255.240.0
    +
    -
    255.255.255.128
    +
    -
    10. Which three addresses belong to the category of private IP addresses? (Choose three.)
    +
    -
    **10.0.0.1
    +
    -
    127.0.0.1
    +
    -
    150.0.0.1
    +
    -
    **172.16.0.1
    +
    -
    **192.168.0.1
    +
    -
    200.100.50.1
    +
    -
    11.
    +
    -
    +
    -
    Host A is transmitting data to host B. Which address combination will be used as the data leaves the Router1 Fa0/1 interface?
    +
    -
    Refer to the exhibit. Host A is transmitting data to host B. Which address combination will be used as the data leaves the Router1 Fa0/1 interface?
    +
    -
    Destination IP: 192.168.72.2 Source MAC: 0007.C2B4.3421
    +
    -
    **Destination IP: 192.168.10.4 Source MAC: 0030.8596.DE81
    +
    -
    Destination IP: 192.168.10.4 Source MAC: 0007.C2B4.3421
    +
    -
    Destination IP: 192.168.72.2 Source MAC: 0030.8596.DE81
    +
    -
    12. Which memory contents will change as a result of using the Router# erase startup-config command on a router?
    +
    -
    RAM
    +
    -
    ROM
    +
    -
    flash
    +
    -
    **NVRAM
    +
    -
     
    +
    -
    13. What are two characteristics of the data link layer? (Choose two.)
    +
    -
    **It segments and reorders the data.
    +
    -
    It exchanges the frames between nodes.
    +
    -
    **It defines the method by which network devices place data onto the media.
    +
    -
    It manages the transfer of data between the processes that run on each host.
    +
    -
    It retrieves signals from the media and restores them to their bit representations.
    +
    -
    14. Refer to the exhibit. The NAT functionality of the router is enabled to provide the PC with Internet access. Which IP address can be assigned to router interface Fa0/0?
    +
    -
    10.0.0.1
    +
    -
    172.16.1.1
    +
    -
    **209.165.201.1
    +
    -
    192.168.1.1
    +
    -
    15.
    +
    -
    +
    -
    A user wants to access the Internet from the PC. A part of the running configuration of the router is shown
    +
    -
    Refer to the exhibit. A user wants to access the Internet from the PC. A part of the running configuration of the router is shown. Which default gateway IP address should be configured at the PC to enable this access?
    +
    -
    10.1.192.2
    +
    -
    10.1.192.54
    +
    -
    **10.1.192.1
    +
    -
    192.31.7.1
    +
    -
    16. Refer to the exhibit. A network technician wants to connect host A to the console of a Cisco switch to initialize the configuration. What type of cable is required for this connection?
    +
    -
    straight-through cable
    +
    -
    crossover cable
    +
    -
    **rollover cable
    +
    -
    serial cable
    +
    -
    17. A network administrator wants to restrict access to the router privileged EXEC mode. Which password should the administrator use?
    +
    -
    **enable
    +
    -
    aux
    +
    -
    console
    +
    -
    VTY
    +
    -
    18. What are three characteristics of CSMA/CD? (Choose three.)
    +
    -
    **Devices listen to the media and transmit data only when they cannot detect another signal on the media.
    +
    -
    **All devices on the media can hear all communications.
    +
    -
    Devices communicate based on a configured priority.
    +
    -
    After a collision occurs, the devices that caused the collision have first priority when attempting to retransmit.
    +
    -
    **When a collision occurs, all devices stop transmitting for a randomly generated period of time.
    +
    -
    CSMA/CD uses a token system to avoid collisions.
    +
    -
    19. Refer to the exhibit. The router of the company failed and was replaced. After the replacement, hosts C and D in the Education office are able to ping each other, but they are unable to access the hosts in the Accounts office. What is the likely cause of the problem?
    +
    -
    The IP address at the fa0/0 interface of the router is incorrectly configured.
    +
    -
    **The subnet mask at the fa0/1 interface of the router is incorrectly entered.
    +
    -
    The IP address at the serial interface of the router is incorrectly configured.
    +
    -
    The hosts in the Accounts office are not on the same subnet as the hosts in the Education office.
    +
    -
    20. Refer to the exhibit. Host A and B are unable to communicate with each other. What is the reason for this?
    +
    -
    Host A is assigned a network address.
    +
    -
    Host B is assigned a multicast address.
    +
    -
    Host A and host B belong to different networks.
    +
    -
    **The gateway addresses are network addresses.
    +
    -
     
    +
    -
    21. Refer to the exhibit. A user wants to view the current configuration. The output of the ipconfig/all command is displayed in the exhibit. What three facts can be determined from the output? (Choose three.)
    +
    -
    The IP address is obtained from the DHCP server.
    +
    -
    **This PC cannot communicate with other networks.
    +
    -
    **The network can have 14 hosts.
    +
    -
    The prefix of the computer address is /25.
    +
    -
    The IP address is routable on the Internet.
    +
    -
    **The assigned address is a private address.
    +
    -
     
    +
    -
    22. Which two types of media can provide bandwidth up to 1 Gb/s? (Choose two.)
    +
    -
    10 BASE-T
    +
    -
    100 BASE-T
    +
    -
    100 BASE-FX
    +
    -
    **1000 BASE-TX
    +
    -
    **1000 BASE-SX
    +
    -
     
    +
    -
    23. Refer to the exhibit. RouterB is configured properly.
    +
    -
    The Ethernet interface Fa0/0 of RouterA is configured with the use of the commands that are shown However, a ping from the Fa0/0 interface of RouterA to the Fa0/0 interface of RouterB is unsuccessful. What action should be taken on RouterA to solve this problem?
    +
    -
    Use the description command on the FastEthernet interface Fa0/0.
    +
    -
    Configure the clock rate of the FastEthernet interface Fa0/0.
    +
    -
    **Use the no shutdown command on the FastEthernet interface Fa0/0.
    +
    -
    Reboot the router.
    +
    -
    24. Refer to the exhibit. Host A wants to connect to host B on a different network. Which three IP addresses can be assigned to host A to enable this connectivity? (Choose three.)
    +
    -
    172.16.11.36
    +
    -
    172.16.11.95
    +
    -
    **172.16.11.88
    +
    -
    **172.16.11.70
    +
    -
    172.16.11.64
    +
    -
    **172.16.11.67
    +
    -
     
    +
    -
    25. Refer to the exhibit. Host A wants to access e-mail. Which destination socket number will be used to communicate this request?
    +
    -
    10.10.1.2:53
    +
    -
    0007.A7B8.0008:25
    +
    -
    10.10.1.3:23
    +
    -
    **10.10.1.3:25
    +
    -
    26. A network administrator uses the copy startup-config running-config command on a router to make configuration changes. Which component is affected by this command?
    +
    -
    ROM
    +
    -
    **NVRAM
    +
    -
    RAM
    +
    -
    flash
    +
    -
    27. Refer to the exhibit. In a network, Hosts A and B are exchanging segments at the transport layer. Which two statements are true about this exchange? (Choose two.)
    +
    -
    Host A is transferring files to host B using FTP.
    +
    -
    **Host A will send the next segment containing data for this session starting with byte number 11
    +
    -
    The segment from the destination host indicates that 11 bytes have been received successfully
    +
    -
    **Host A is initiating a Telnet session to host B
    +
    -
    Host B can send the next segment of the data starting with byte number 2
    +
    -
    28. How does the transport layer allow a host to maintain multiple, simultaneous communication streams across different applications?
    +
    -
    It uses error control mechanisms.
    +
    -
    **It uses a connectionless protocol only for multiple simultaneous transmissions.
    +
    -
    It uses multiple Layer 2 source addresses.
    +
    -
    It uses multiple ports.
    +
    -
    29. What information is contained in the header of Layer 3 to help data delivery?
    +
    -
    port number
    +
    -
    device physical address
    +
    -
    **destination host logical address
    +
    -
    virtual connection identifier
    +
    -
    30. Refer to the exhibit. The tracert command used from host X to host Y was successful. What is the correct sequence of intermediary network devices that will be present in the trace list?
    +
    -
    switch A, switch D, switch G, host Y
    +
    -
    **router B, router E, router F, host Y
    +
    -
    switch A, router B, switch D, router E, router F, switch G, host Y
    +
    -
    switch A, router B, router F, switch G, host Y
    +
    -
    31. While configuring a router, a network technician wants to name the router. Which prompt should the technician see when entering the hostname command?
    +
    -
    Router>
    +
    -
    Router#
    +
    -
    **Router(config)#
    +
    -
    Router(config-line)#
    +
    -
    32. An organization has decided to use IP addresses in the range 172.20.128.0 to 172.20.143.255. Which combination of network ID and subnet mask identifies all IP addresses in this range?
    +
    -
    Network ID: 172.20.128.0 Subnet mask: 255.255.255.0
    +
    -
    Network ID: 172.20.128.0 Subnet mask: 255.255.0.0
    +
    -
    Network ID: 172.20.128.0 Subnet mask: 255.255.224.0
    +
    -
    **Network ID: 172.20.128.0 Subnet mask: 255.255.240.0
    +
    -
    Network ID: 172.20.128.0 Subnet mask: 255.255.255.240
    +
    -
    33. Refer to the exhibit. Which logical topology describes the exhibited network?
    +
    -
    star
    +
    -
    **ring
    +
    -
    point-to-point
    +
    -
    multi-access
    +
    -
    34. Refer to the exhibit. All devices in the network use default configurations. How many broadcast domains are there in this topology?
    +
    -
    3
    +
    -
    **5
    +
    -
    7
    +
    -
    9
    +
    -
    11
    +
    -
    35. Which three IPv4 addresses represent valid network addresses for a subnet? (Choose three.)
    +
    -
    192.168.9.64/28
    +
    -
    **192.168.9.146/28
    +
    -
    192.168.9.96/28
    +
    -
    **192.168.9.129/26
    +
    -
    **192.168.9.51/26
    +
    -
    192.168.9.64/26
    +
    -
    36. Two routers are connected via their serial ports in a lab environment. The routers are configured with valid IP addresses, but they cannot ping each other. The show interface serial0/0 command shows that the serial0/0 interface is up but the line protocol is down. What could be the cause of this problem?
    +
    -
    The no shutdown command has not been applied to the interfaces.
    +
    -
    **The clock rate command has not been entered on the DCE interface.
    +
    -
    The interface timers are not cleared.
    +
    -
    The FastEthernet interface is emulating a serial interface by assigning it a timing signal.
    +
    -
    37. Which device should be used for enabling a host to communicate with another host on a different network?
    +
    -
    switch
    +
    -
    hub
    +
    -
    **router
    +
    -
    host
    +
    -
    38. Refer to the exhibit. The network administrator uses the netstat command to display the open, active, and running TCP connections on a networked host. The exhibit displays the output of this command. Which two facts can be determined from this output for accessing www.cisco.com? (Choose two.)
    +
    -
    **The source port indicates that the session is an http session.
    +
    -
    The connection is not successful.
    +
    -
    **The source port of the host is 3166.
    +
    -
    The destination port is 80.
    +
    -
    The source port does not support communication with the destination port that is listed.
    +
    -
    The source port indicates that a UDP session has been initiated.
    +
    -
    39. Which OSI layer uses the header information to reassemble the data segments into streams?
    +
    -
    application layer
    +
    -
    network layer
    +
    -
    presentation layer
    +
    -
    session layer
    +
    -
    **transport layer
    +
    -
     
    +
    -
    40. Which three statements are true about transport layer protocols? (Choose three.)
    +
    -
    The UDP transport layer protocol provides for low overhead data delivery.
    +
    -
    **The TCP transport layer protocol uses windowing and acknowledgments for reliable transfer of data.
    +
    -
    **The TCP and UDP port numbers are used by application layer protocols.
    +
    -
    **The TCP transport layer protocol provides services to direct the data packets to their destination hosts.
    +
    -
    The UDP transport layer protocol is a connection-oriented protocol.
    +
    -
    The UDP transport layer protocol keeps track of all the data segments in each conversation.
    +
    -
    41. To enhance security in a network, the network administrator uses these commands:
    +
    -
    Router(config)# line console 0
    +
    -
    Router(config-line)# password j1mdi2
    +
    -
    Router(config-line)# login
    +
    -
    What two conclusions are evident from these commands? (Choose two.)
    +
    -
    **Users who attempt to connect to the console port of the router must enter a password.
    +
    -
    **The entries permit access through the console by the use of j1mdi2 as the password.
    +
    -
    The entries eliminate the need for authentication.
    +
    -
    Access through the console will be denied because the console configuration is incomplete.
    +
    -
    The entries prevent passwords from being displayed as plain text.
    +
    -
    42. Refer to the exhibit. Each media link is labeled. What type of cable should be used to connect the different devices?
    +
    -
    Connection 1 - straight-through cable Connection 2 - straight-through cable Connection 3 - crossover cable
    +
    -
    Connection 1 - straight-through cable Connection 2 - crossover cable Connection 3 - rollover cable
    +
    -
    Connection 1 - crossover cable Connection 2 - rollover cable Connection 3 - straight-through cable
    +
    -
    **Connection 1 - crossover cable Connection 2 - straight-through cable Connection 3 - crossover cable
    +
    -
    Connection 1 - straight-through cable Connection 2 - rollover cable Connection 3 - crossover cable
    +
    -
    43. Refer to the exhibit. The headers added at each layer are shown.
    +
    -
    Which layer adds the destination and source process numbers to ensure that data is delivered to the correct application?
    +
    -
    physical layer
    +
    -
    data link layer
    +
    -
    network layer
    +
    -
    **transport layer
    +
    -
     
    +
    -
    44. Which three statements are true about network layer addressing? (Choose three.)
    +
    -
    It uses the last octet of the IP address to identify the network.
    +
    -
    **It supports data communications between networks.
    +
    -
    **It is configured by the network technician.
    +
    -
    It is a 16-bit IPv4 address.
    +
    -
    It prevents broadcasts.
    +
    -
    **It uniquely identifies each host.
    +
    -
     
    +
    -
    45. Refer to the exhibit. A PC is connected to a network. Which action will verify that the PC can communicate with its default gateway?
    +
    -
    Use the ping 127.0.0.1 command.
    +
    -
    Use the ipconfig command.
    +
    -
    Use the ipconfig/all command.
    +
    -
    **Use the ping 10.0.0.254 command.
    +
    -
     
    +
    -
    46. Refer to the exhibit. Host A sends a frame with the destination MAC address as FFFF.FFFF.FFFF. What action will the switch take for this frame?
    +
    -
    It will drop the frame.
    +
    -
    It will send the frame back to host A.
    +
    -
    **It will send the frame to all hosts except host A.
    +
    -
    It will forward the frame to the default gateway.
    +
    -
    47. Refer to the exhibit. The network administrator remotely accesses the CLI of RouterB from PC1 using a secure connection. Which statement is true about this connection?
    +
    -
    The Telnet server process is running on PC1.
    +
    -
    Only the exchange of the Telnet username and password is encrypted.
    +
    -
    The GET request is sent to RouterA to retrieve data.
    +
    -
    **The SSH service is used to connect PC1 to RouterB.
    +
    -
     
    +
    -
    48. Which OSI layer uses the header information to reassemble the data segments into streams?
    +
    -
    application layer
    +
    -
    network layer
    +
    -
    presentation layer
    +
    -
    session layer
    +
    -
    **transport layer
    +
    -
     
    +
    -
    49. Refer to the exhibit. A router, the table of which is shown, receives a packet that is destined for 192.168.9.4. How will the router treat the packet?
    +
    -
    It will drop the packet.
    +
    -
    It will forward the packet via FastEthernet 0/1.
    +
    -
    **It will forward the packet to the next hop address.
    +
    -
    It will forward the packet to 172.16.2.0
    +
    -
    50. Refer to the exhibit. Cable 1 and Cable 2 are wired for specific physical layer requirements. The table lists each segment by number and the cable that connects the network components on that segment. Which three segments have the correct cables installed? (Choose three.)
    +
    -
    **segment 1
    +
    -
    segment 2
    +
    -
    segment 3
    +
    -
    **segment 4
    +
    -
    **segment 5
    +
    -
    segment 6
    +
    -
    1. Which OSI layer does IP rely on to determine whether packets have been lost and to request retransmission?
    +
    -
    -transport
    +
    -
    2. Refer to the exhibit. Which layered network model is shown in the
    +
    -
    -TCP/IP
    +
    -
    3. Refer to the exhibit. The diagram represents the process of sending e-mail between clients. Which list correctly identifies the component or protocol used at each numbered stage of the diagram?
    +
    -
    -MUA 2.SMTP 3.MTA 4.SMTP 5.MTA 6.MDA 7.POP 8.MUA
    +
    -
    4. A user enters http://www.cisco.com/web1.htm in the address line of a browser. Which statement is true about this transaction?
    +
    -
    -The "http" portion indicates the protocol that is being used.
    +
    -
    5. Which range of port numbers are reserved for services that are commonly used by applications that run on servers?
    +
    -
    -0 to 1023
    +
    -
    6. Which OSI layer addressing is required to route packets between two networks?
    +
    -
    -Layer 3
    +
    -
    7. When connectionless protocols are implemented at the lower layers of the OSI model, what is usually used to acknowledge that the data was received and to request the retransmission of missing data?
    +
    -
    -an upper-layer, connection-oriented protocol or service
    +
    -
    8. Which statement is true about Layer 3
    +
    -
    -They are used in routing decisions.
    +
    -
    10. Refer to the exhibit. Host A sends 1000 bytes of Telnet data to host B. What does host B send back if it only receives the first 500 bytes?
    +
    -
    -Source 23 Destination 49321 Seq 1000 Ack 501
    +
    -
    11. Refer to the exhibit. In a network, PC1 sends a message to PC2. The frame received at PC2 is shown. What information in this frame determines the correct destination application?
    +
    -
    -destination and source process numbers
    +
    -
    What three statements are true about network layer addressing? (Choose three.)
    +
    -
    -Network layer addressing uses a hierarchy
    +
    -
    -It uses a method by which the network portion of an address can be identified.
    +
    -
    -Network layer addressing identifies each host distinctly.
    +
    -
    13. Which device should be used for enabling a host to communicate with another host on a different network?
    +
    -
    -router
    +
    -
    Refer to the exhibit. Host A attempts to establish a TCP/IP session with host C. During this attempt, a frame was captured with the source MAC address 0050.7320.D632 and the destination MAC address 0030.8517.44C4. The packet inside the captured frame has an IP source address 192.168.7.5, and the destination IP address is 192.168.219.24. At which point in the network was this packet captured?
    +
    -
    -leaving Dallas
    +
    -
    Refer to the exhibit. When computer A sends a frame to computer D, what computers receive the frame?
    +
    -
    -only computer D
    +
    -
    16.
    +
    -
    What type of network is maintained if a server takes no dedicated role in the network?
    +
    -
    -peer-to-peer
    +
    -
    Refer to the exhibit. Assume all devices are using default configurations. How many
    +
    -
    subnets are required to address the topology that is shown?
    +
    -
    -3
    +
    -
    Refer to the exhibit. Host A is accessing multiple servers. Which combination of port number and address will uniquely identify a particular process running on a specific server?
    +
    -
    -address of the server and port number of the service
    +
    -
    20.
    +
    -
     
    +
    -
    A network technician is tasked with setting up a network for six users, but the users should be able to use their accounts to log on from any of the six computers. What type of network should be used?
    +
    -
    -server network
    +
    -
    21.
    +
    -
     
    +
    -
    What are three characteristics of CSMA/CD? (Choose three.)
    +
    -
    -device listens and waits until the media is not busy before transmitting.
    +
    -
    -All of the devices on a segment see data that passes on the network medium.
    +
    -
    -After detecting a collision, hosts can attempt to resume transmission after a random time delay has expired.
    +
    -
     
    +
    -
    Which of the following are the address ranges of the private IP addresses? (Choose three.)
    +
    -
    10.0.0.0 to 10.255.255.255
    +
    -
    172.16.0.0 to 172.31.255.255 192.168.0.0 to 192.168.255.255
    +
    -
     
    +
    -
    Refer to the exhibit. What function does router RT_A need to provide to allow Internet access for hosts in this network?
    +
    -
     
    +
    -
    -address translation
    +
    -
     
    +
    -
    Refer to the exhibit. A network technician
    +
    -
    is trying to determine the correct IP address
    +
    -
    configuration for Host A. What is a valid configuration for Host A?
    +
    -
    -IP address: 192.168.100.20;
    +
    -
    Subnet
    +
    -
    Mask:
    +
    -
    255.255.255.240;
    +
    -
    Default Gateway:
    +
    -
    192.168.100.17
    +
    -
     
    +
    -
    Refer to the exhibit. Host C is able to ping 127.0.0.1 successfully, but is unable to communicate with hosts A and B in the organization. What is the likely cause of the problem?
    +
    -
    The subnet mask on host C is improperly configured.
    +
    -
    What happens when a host station receives a frame that contains its own MAC address in the destination field?
    +
    -
     
    +
    -
    -The Layer 2 information is removed and the frame is pushed up to Layer 3.
    +
    -
    Refer to the exhibit. A network administrator is troubleshooting a link that is down between Router1 and Router2. To correct the problem, which wire pairs need to be switched on one of the Ethernet cable ends?
    +
    -
     
    +
    -
    pair 2 and pair 3Refer to the exhibit. A network administrator is troubleshooting a link that is down between Router1 and Router2. To correct the problem, which wire pairs need to be switched on one of the Ethernet cable ends?
    +
    -
     
    +
    -
    pair 2 and pair 3
    +

    00:55, ngày 2 tháng 1 năm 2013

    1. If a router cannot find a valid configuration file during the startup sequence, what will occur?

      • The router will prompt the user for a response to enter setup mode.

    2. Refer to the exhibit. The network administrator has configured the router with the interface IP addresses shown for the directly connected networks. Pings from the router to hosts on the connected networks or pings between router interfaces are not working. What is the most likely problem? The destination networks do not exist.

      • The interfaces must be enabled with the no shutdown command.

    3. Refer to the exhibit. What can be concluded from the routing table output in the exhibit? (Choose two.)

      • The FastEthernet0/0 and Serial0/0/0 interfaces of this router were configured with an IP address and the no shutdown command.
      • An IP packet received by this router with a destination address of 198.18.9.1 will beforwarded out of the Serial0/0/0 interface.

    4. Refer to the exhibit. The frame shown in the exhibit was received by the router. The router interfaces are operational. How will the router process this frame? (Choose two.

      • The router will change the frame type to one supported by the WAN link before forwarding the frame.

    5. Passwords can be used to restrict access to all or parts of the Cisco IOS. Select the modes and interfaces that can be protected with passwords. (Choose three.)

      • VTY interface
      • console interface
      • privileged EXEC mode

    6. Which two statements correctly describe the components of a router? (Choose two.)

      • ROM contains diagnostics executed on hardware modules.
      • Flash memory does not lose its contents during a reboot.

    7. Refer to the exhibit. After host 2 is connected to the switch on the LAN, host 2 is unable to communicate with host 1. What is the cause of this problem?

      • Host 1 and host 2 are on different networks.

    8. Which are functions of a router? (Choose three.)

      • packet switching, segmentation of broadcast domains ,selection of best path based on logical addressing

    9. Refer to the exhibit. All routers have a route in its routing table to each network that is shown in the exhibit. Default routes have not been issued on these routers. What can be concluded about how packets are forwarded in this network? (Choose two.)

      • If RouterA receives a packet that is destined for 192.168.3.146, it will be forwarded out interface S0/0/1.
      • If RouterB receives a packet that is destined for 10.5.27.15, it will be forwarded out interface S0/0/1.

    10. The serial connection shown in the graphic needs to be configured. Which configuration commands must be made on the Sydney router to establish connectivity with the Melbourne site? (Choose three.)

      • Sydney(config-if)# ip address 201.100.53.2 255.255.255.0
      • Sydney(config-if)# no shutdown
      • Sydney(config-if)# clock rate 56000

    11. Refer to the exhibit. What can be concluded from the output of the running-configuration of a router?

      • The commands that are displayed determine the current operation of the router.

    12. Refer to the exhibit. Host A pings host B. When R4 accepts the ping into the Ethernet interface, what two pieces of header information are included? (Choose two.)

      • destination IP address: 192.168.10.134
      • destination MAC address: 9999.DADC.1234

    13. What is the outcome of entering these commands? R1(config)# line vty 0 4 R1(config-line)# password check123 R1(config-line)# login

      • sets the password to be used for connecting to this router via Telnet

    14. Which of the following is the correct flow of routines for a router startup?

      • load bootstrap, load IOS, apply configuration

    15. What three processes does a router execute when it receives a packet from one network that is destined for another network? (Choose three.)

      • decapsulates the Layer 3 packet by stripping off the Layer 2 frame header
      • uses the destination IP Address in the IP header to look up the next-hop address in the routing table
      • encapsulates the Layer 3 packet into the new Layer 2 frame and forwards it out the exit interface

    16. The network administrator needs to connect two routers directly via their FastEthernet ports. What cable should the network administrator use?

      • cross-over

    17. Which two statements describe characteristics of load balancing? (Choose two.)

      • Load balancing allows a router to forward packets over multiple paths to the same destination network.
      • Unequal cost load balancing is supported by EIGRP.

    18. What information about the router and its startup process can be gathered from the output of the show version command? (Choose three.)

      • the last restart method
      • the configuration register settings
      • the location from where the IOS loaded

    19. Which interfaces in the exhibit could be used for a leased line WAN connection? (Choose two.)

      • 1,4

    20. From what location can a router load the Cisco IOS during the boot process? (Choose two.)

      • TFTP server
      • Flash memory

    21. A network administrator has just entered new configurations into Router1. Which command should be executed to save configuration changes to NVRAM?

      • Router1# copy running-config startup-config

    22. What is the default sequence for loading the configuration file?

      • NVRAM, TFTP, CONSOLE

    23. What header address information does a router change in the information it receives from an attached Ethernet interface before information is transmitted out another interface?

      • the Layer 2 source and destination address

    (200 trước) (200 sau)

    Các bài trong Từ điển "Toán & tin"

    Có 200 bài trong từ điển này.

    .

    1

    3

    8

    A

    A tiếp

    A tiếp

    (200 trước) (200 sau)

    tác giả


    Tìm thêm với Google.com :

    NHÀ TÀI TRỢ
Mời bạn chọn bộ gõ Anh Việt
Bạn còn lại 350 ký tự.
X