• Revision as of 09:45, ngày 5 tháng 8 năm 2012 by Lt10ct111 (Thảo luận | đóng góp)
    (khác) ← Bản trước | xem bản hiện nay (khác) | Bản sau → (khác)

    1/Refer to the exhibit. Which list refers only to end devices? /D,E,F,G 2/Refer to the exhibit. What function does router RT_A need to provide to allow Internet access for hosts in this network? -address translation 3/What information can be gathered by using the command netstat? -active TCP connections 4/Refer to the exhibit. Host1 is in the process of setting up a TCP session with Host2. Host1 has sent a SYN message to begin session establishment. What happens next? -Host2 sends a segment with the ACK flag = 1, SYN flag = 1 to Host1. 5/Which OSI layer addressing is required to route packets between two networks? -Layer 3 6/Refer to the exhibit. All devices in the network use default configurations. How many logical address ranges are required in this topology? -4 7/Refer to the exhibit. Host A is transmitting data to host B. Which address combination will be used as the data leaves the Router1 Fa0/1 interface? -Destination IP: 192.168.10.4 Source MAC: 0030.8596.DE81 8/A user enters http://www.cisco.com/web1.htm in the address line of a browser. Which statement is true about this transaction? -The "http" portion indicates the protocol that is being used. 9/Refer to the exhibit. Which layered network model is shown in the diagram? -TCP/IP 10/Which statement is true about Layer 3 addresses? They are used in routing decisions. 11/Refer to the exhibit. Which Layer 2 protocol could be used inside nework A and network C? -Ethernet 12/Refer to the exhibit. A technician is working on a network problem that requires verification of the router LAN interface. What address should be pinged from this host to confirm that the router interface is operational? -192.168.254.1 13/Refer to the exhibit. While configuring a network, a technician wired each end of a Category 5e cable as shown. Which two statements are true about this setup? (Choose two.) -The cable is suitable for connecting dissimilar types of devices. -The cable is suitable for connecting a switch to a router Ethernet port. 14/What information is used at each hop to determine where the packet will be forwarded next? -the IP packet header 15/Refer to the exhibit. Host A and B are unable to communicate with each other. What is the reason for this? 16/The gateway addresses are network addresses. Which OSI layers offers reliable, connection-oriented data communication services? ransport 17/What is the result of using the clock rate 56000 command at the serial interface of the router?

    -The interface is configured as a DCE device.
    

    18/The Layer 4 header contains which type of information to aid in the delivery of data? -service port number 19/A routing issue has occurred in your internetwork. Which of the following type of devices should be examined to isolate this error -router 20/A user sees the command prompt: Router(config-if)# . What task can be performed at this mode?- Configure individual interfaces 21/Refer to the exhibit. The network containing router B is experiencing problems. A network associate has isolated the issue in this network to router B. What action can be preformed to correct the network issue? -issue the no shutdown command on interface FastEthernet 0/1 22/Refer to the exhibit. A PC is communicating with another PC on a remote network. The two networks are connected by three routers. Which action will help to identify the path between the hosts? -Use the tracert command at the host. 23/Which password is automatically encrypted when it is created? -enable secret 24/A technician is asked to secure the privileged EXEC mode of a switch by requiring a password. Which type of password would require this login and be considered the most secure? -enable secret 25/Refer to the exhibit. Which type of network design is shown?

    -peer-to-peer 
    

    26/Due to a security violation, the router passwords must be changed. What information can be learned from the following configuration entries? (Choose two.)

    Router(config)# line vty 0 3 Router(config-line)# password c13c0 Router(config-line)# login -The entries specify four Telnet lines for remote access. -Access will be permitted for Telnet using "c13c0" as the password. 27/Refer to the exhibit. An employee wants to access the organization intranet from home. Which intermediary device should be used to connect the organization intranet to the Internet to enable this access? -router 28/Refer to the exhibit. The router of the company failed and was replaced. After the replacement, hosts C and D in the Education office are able to ping each other, but they are unable to access the hosts in the Accounts office. What is the likely cause of the problem -The subnet mask at the fa0/1 interface of the router is incorrectly entered. 29/Which memory contents will change as a result of using the Router# erase startup-config command on a router? -NVRAM 30/Which router component will have contents erased when the command erase startup-config is issued? -NVRAM 31/FastEthernet interface fa0/1 of the San Francisco router. The packet inside the captured frame has the source IP address 10.10.1.2, and the destination IP address is 10.31.1.20. What is the destination MAC address of the frame at the time of capture? -0060.7320.D631 32/Refer to the exhibit. Host A is unable to reach the remote network. On the basis of the provided output, what is the cause of the problem? There is no path to the remote network in the routing table of --- router R1. 33/Refer to the exhibit. When computer A sends a frame to computer D, what computers receive the frame? -only computer D 34/Which OSI layer does IP rely on to determine whether packets have been lost and to request retransmission? transport 35/Refer to the exhibit. A web browser running on host PC1 sends a request for a web page to the web server with an IP address 192.168.1.254/24. What sequence of steps will follow in order to establish the session before data can be exchanged? The session will be initiated using TCP. A three-way handshake must be successfully completed before the session is established. 36/If an administrator wished to return a router to the default state, what additional step must be taken after issuing the command erase start-up config? -Reload the device. 37/Refer to the exhibit. How will data files get retrieved from the server? -The client establishes a two-way connection to the server on port 21 for file transfer. 38/Which device should be used for enabling a host to communicate with another host on a different network? -router 39/Refer to the exhibit. Host A sends 1000 bytes of Telnet data to host B. What does host B send back if it only receives the first 500 bytes? -Source 23 Destination 49321 Seq 500 Ack 1000 40/Refer to the exhibit. An administrator made several changes to the configuration of the router but did not accomplish the desired result. To undo the changes the reload command was used. What will happen if the administrator answers yes to the prompt? -The changes will be saved and the configuration file in NVRAM will be loaded. 42/Which of the following are the address ranges of the private IP addresses? (Choose three.) -10.0.0.0 to 10.255.255.255 -172.16.0.0 to 172.31.255.255 -192.168.0.0 to 192.168.255.255 43/Refer to the exhibit. A technician uses the nslookup command on the PC and views the output that is displayed in the exhibit. What is the IP address of the primary domain name server used by the host? -10.10.10.32 44/What three statements are true about network layer addressing? (Choose three.) -Network layer addressing uses a hierarchy. -It is used by Ethernet switches to make forwarding decisions. -Network layer addressing identifies each host distinctly. 45/Refer to the exhibit. What two facts can be determined about the exhibited topology? (Choose two.) -A single broadcast domain is present -Five collision domains exist. 46/Refer to the exhibit. A network administrator remotely accesses the CLI of RouterB from PC1 using Telnet. Which statement is true about this connection? -The connection is made through a VTY session on the router. 47/Which range of port numbers are reserved for services that are commonly used by applications that run on servers? -0 to 1023

    tác giả


    Tìm thêm với Google.com :

    NHÀ TÀI TRỢ
Mời bạn chọn bộ gõ Anh Việt
Bạn còn lại 350 ký tự.
X