Enetwork Final
-
Upload
kalpish-singhal -
Category
Documents
-
view
228 -
download
0
Transcript of Enetwork Final
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 130
1 A network administrator is asked to design a new addressing scheme for a corporate network There
are 60 users in the main office 40 users in the branch office 28 users in manufacturing 12 in thesales office and 4 users in the research office Which VLSM addressing scheme that uses the19216888024 network will fulfill the requirements while wasting the fewest addresses
19216888026 main192168883226 branch
192168886426 manufacturing192168889627 sales1921688812828 research19216888026 main192168886426 branch1921688812827 manufacturing1921688816028 sales1921688817629 research19216888027 main192168883227 branch192168886428 manufacturing
192168888029 sales192168888830 research19216888027 main192168886428 branch192168888028 manufacturing192168889629 sales1921688810430 research
2 Which application belongs to the category of the clientserver model
using Telnet to access a router
exchanging information via instant messagingprinting a document to a locally connected printer
scanning a document with a directly connected scanner
3 Which two types of media can provide bandwidth up to 1 Gbs (Choose two)
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 230
10 BASE-T
100 BASE-T
100 BASE-FX
1000 BASE-TX
1000 BASE-SX
4 An administrator has made changes to a device The changes did not have the desired effect What
can the administrator do to restore the configuration saved in NVRAMIssue the erase flash command
Issue the reload command and respond no to the prompt that follows
Issue the erase start-up config command
Issue the copy running-config start-up config command
5 Which option shows how a router will route packets to a remote network
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 330
6 Which configuration mode is used to set a password to authenticate users that are accessing andconfiguring the network device using a Telnet connection
VTY line mode
interface mode
console line mode
global configuration mode
7 To send data through a network what two flags are used to establish a session (Choose two)
ACK
CRC
SYN
Ack
Port
Seq
8 Which service is used when the nslookup command is issued on a computer
FTP
DNS
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 430
DHCP
Telnet
9
Refer to the exhibit Which list refers only to end devices
DEFG
AHBC
ADEF
ADEG
10 Which topology divides the collision domain and provides full media bandwidth to the hosts in thenetwork
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 530
11 During the encapsulation process what identifiers are added at the transport layer
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 630
source and destination IP addresses
source and destination MAC addresses
source and destination port numbers
source and destination channel identifiers
12
Refer to the exhibit The diagram represents the process of sending e-mail between clients Which listcorrectly identifies the component or protocol used at each numbered stage of the diagram
1MUA 2MDA 3MTA 4SMTP 5MTA 6POP 7MDA 8MUA
1MUA 2POP 3MDA 4SMTP 5MTA 6MDA 7SMTP 8MUA
1MUA 2POP 3SMTP 4MDA 5MTA 6SMTP 7POP 8MUA
1MUA 2SMTP 3MTA 4SMTP 5MTA 6MDA 7POP 8MUA
13
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 730
Refer to the exhibit While configuring a network a technician wired each end of a Category 5e cableas shown Which two statements are true about this setup (Choose two)
The cable is suitable for connecting a switch to a router Ethernet port
The cable is suitable for connecting dissimilar types of devices
The cable is unusable and must be rewired
The cable is terminated in a way that the transmit pin is wired to the receive pin
The cable simulates a point-to-point WAN link
14 Which combination of network id and subnet mask correctly identifies all IP addresses from172161280 through 17216159255
172161280 255255255224
172161280 25525500
172161280 2552551920
172161280 2552552240
172161280 255255255192
15
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 830
Refer to the exhibit Which two layers of the OSI model describe the same functions as the transportand internet layers of the TCPIP model (Choose two)
application layer
presentation layer
session layer
transport layer
network layer
data link layer
physical layer
16 Which of the following are the address ranges of the private IP addresses (Choose three)
10000 to 10255255255
200100500 to 20010025255
15015000 to 150150255255
1721600 to 17231255255
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 930
19216800 to 192168255255
1271600 to 12731255255
17 Which statement is true about the CSMACD access method that is used in Ethernet
When a device hears a carrier signal and transmits a collision cannot occur
A jamming signal causes only devices that caused the collision to execute a backoff algorithm
All network devices must listen before transmitting
Devices involved in a collision get priority to transmit after the backoff period
18 What happens when a node on an Ethernet network is creating a frame and it does not have thedestination MAC address
The node drops the frame
The node sends out a Layer 3 broadcast message
The node sends a message directly to the router for the address
The node sends out an ARP request with the destination IP address
19
Refer to the exhibit Communication for hosts X and Y is restricted to the local network What is thereason for this
Host X is assigned a network address
Host Y is assigned a multicast address
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 1030
Host X and host Y belong to different networks
The gateway addresses are broadcast addresses
20 Which statement is true about the ICMP protocol
It is an application layer protocol
It is designed to make IP a reliable protocol
It is often filtered out of networks for security purposes
If a host does not respond to an ICMP echo request the host is not functioning
21
Refer to the exhibit A host is connected to hub 1 Which combination of IP address subnet mask anddefault gateway can allow this host to function in the network
IP address 172163136 Subnet mask 255255255240 Default gateway 172163135
IP address 172163163 Subnet mask 255255255224 Default gateway 172163135
IP address 172163129 Subnet mask 255255255248 Default gateway 172163135
IP address 172163132 Subnet mask 255255255224 Default gateway 172163135
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 1130
IP address 172163129 Subnet mask 255255255240 Default gateway 17216301
IP address 172163137 Subnet mask 255255255224 Default gateway 172163135
22
Refer to the exhibit RouterB is configured properly The Ethernet interface Fa00 of RouterA isconfigured with the use of the commands that are shown However a ping from the Fa00 interface of
RouterA to the Fa00 interface of RouterB is unsuccessful What action should be taken on RouterA tosolve this problem
Use the description command on the FastEthernet interface Fa00
Configure the clock rate of the FastEthernet interface Fa00
Use the no shutdown command on the FastEthernet interface Fa00
Reboot the router
23
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 1230
Refer to the exhibit The tracert command is initiated from PC1 to PC4 Which device will send aresponse to the initial tracert packet from PC1
Athens
Ankara
London
Paris
PC4
24 Which physical component is used to access and perform the initial configuration on a newunconfigured router
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 1330
25 In a network design project a network designer needs to select a device to provide collision freeconnections to 40 hosts on the LAN Which device should be selected
hub
router
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 1430
switch
firewall
26
Refer to the exhibit Which option correctly identifies the network address range of host addressesand the broadcast address for the network that contains host A
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 1530
27
Refer to the exhibit A router the table of which is shown receives a packet that is destined for19216894 How will the router treat the packet
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 1630
It will drop the packet
It will forward the packet via FastEthernet 01
It will forward the packet to the next hop address
It will forward the packet to 1721620
28
Refer to the exhibit An administrator is trying to remotely modify the configuration of this switch byusing Telnet The management workstation is on the same subnet as the switch but the administratoris unable to access the switch from the workstation Based on the output that is provided what is the
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 1730
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 1830
80
wwwciscocom
1000130
100013080
30
Refer to the exhibit Host A attempts to establish a TCPIP session with host C During this attempt aframe was captured with the source MAC address 00507320D632 and the destination MAC address0030851744C4 The packet inside the captured frame has an IP source address 19216875 andthe destination IP address is 19216821924 At which point in the network was this packet captured
leaving host A
leaving ATL
leaving Dallas
leaving NYC
31 When connectionless protocols are implemented at the lower layers of the OSI model what is usuallyused to acknowledge that the data was received and to request the retransmission of missing data
IP
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 1930
UDP
Ethernet
a connectionless acknowledgement
an upper-layer connection-oriented protocol or service
32 Which device should be used for enabling a host to communicate with another host on a different
networkswitch
hub
router
host
33 To enhance security in a network the network administrator uses these commands
Router(config) line console 0
Router(config-line) password j1mdi2 Router(config-line) login
What two conclusions are evident from these commands (Choose two)
Users who attempt to connect to the console port of the router must enter a password
The entries permit access through the console by the use of j1mdi2 as the password
The entries eliminate the need for authentication
Access through the console will be denied because the console configuration is incomplete
The entries prevent passwords from being displayed as plain text
34 What happens when a host station receives a frame that contains its own MAC address in thedestination field
The Layer 2 information is removed and the frame is pushed up to Layer 3
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 2030
The host station will copy the information to its buffers and send it back out
The frame originated from the host and will be ignored
The Layer 3 information is added to the frame
35
Refer to the exhibit All devices in the network use default configurations How many broadcastdomains are there in this topology
3
5
7
911
36 What information can be gathered by using the command netstat
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 2130
the default gateway
the routing protocol
active TCP connections
the locally configured subnet mask
37
Refer to the exhibit A PC is connected to a network Which action will verify that the PC cancommunicate with its default gateway
Use the ping 127001 command
Use the ipconfig command
Use the ipconfigall command
Use the ping 1000254 command
38
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 2230
Refer to the exhibit A network administrator remotely accesses the CLI of RouterB from PC1 usingTelnet Which statement is true about this connection
The data is automatically encrypted
A Telnet server process is running on PC1
The connection is made through a VTY session on the router
A GET request was sent to RouterB to retrieve data during this session
39
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 2330
Refer to the exhibit Host C is able to ping 127001 successfully but is unable to communicate withhosts A and B in the organization What is the likely cause of the problem
Hosts A and B are not on the same subnet as host C
The IP addresses on the router serial interfaces are wrong
The subnet mask on host C is improperly configured
The FastEthernet interface fa00 of router 1 is wrongly configured
40 Which prompt represents the appropriate mode used for the copy running-config startup-config command
Switch-6Jgt
Switch-6J
Switch-6J(config)
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 2430
Switch-6J(config-if)
Switch-6J(config-line)
41 How can ARP be used to help document the network
It can list each hop on the way to a destination host
It can show the average latency of hosts on the network
It can provide a list of physical addresses on the networkIt can indicate which hosts are not responding to network traffic
42 What information is contained in the header of Layer 3 to help data delivery
port number
device physical address
destination host logical address
virtual connection identifier
43 Which router component will have contents erased when the command erase startup-config isissued
flash
RAM
ROM
NVRAM
44
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 2530
Refer to the exhibit When computer A sends a frame to computer D what computers receive theframe
only computer D
only computer A and computer D
only computer B computer C and computer D
all computers
45 Which option correctly identifies the interface or interfaces used to connect the router to a CSUDSUfor WAN connectivity
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 2630
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 2730
46
Refer to the exhibit A user wants to access the Internet from the PC A part of the runningconfiguration of the router is shown Which default gateway IP address should be configured at thePC to enable this access
1011921
1011922
10119254
1923171
47
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 2830
Refer to the exhibit Which Layer 2 protocol could be used inside nework A and network CIP
TCP
UDP
Ethernet
48 Which password is automatically encrypted when it is created
vty
auxconsole
enable secret
enable password
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 2930
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 3030
application
network access
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 230
10 BASE-T
100 BASE-T
100 BASE-FX
1000 BASE-TX
1000 BASE-SX
4 An administrator has made changes to a device The changes did not have the desired effect What
can the administrator do to restore the configuration saved in NVRAMIssue the erase flash command
Issue the reload command and respond no to the prompt that follows
Issue the erase start-up config command
Issue the copy running-config start-up config command
5 Which option shows how a router will route packets to a remote network
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 330
6 Which configuration mode is used to set a password to authenticate users that are accessing andconfiguring the network device using a Telnet connection
VTY line mode
interface mode
console line mode
global configuration mode
7 To send data through a network what two flags are used to establish a session (Choose two)
ACK
CRC
SYN
Ack
Port
Seq
8 Which service is used when the nslookup command is issued on a computer
FTP
DNS
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 430
DHCP
Telnet
9
Refer to the exhibit Which list refers only to end devices
DEFG
AHBC
ADEF
ADEG
10 Which topology divides the collision domain and provides full media bandwidth to the hosts in thenetwork
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 530
11 During the encapsulation process what identifiers are added at the transport layer
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 630
source and destination IP addresses
source and destination MAC addresses
source and destination port numbers
source and destination channel identifiers
12
Refer to the exhibit The diagram represents the process of sending e-mail between clients Which listcorrectly identifies the component or protocol used at each numbered stage of the diagram
1MUA 2MDA 3MTA 4SMTP 5MTA 6POP 7MDA 8MUA
1MUA 2POP 3MDA 4SMTP 5MTA 6MDA 7SMTP 8MUA
1MUA 2POP 3SMTP 4MDA 5MTA 6SMTP 7POP 8MUA
1MUA 2SMTP 3MTA 4SMTP 5MTA 6MDA 7POP 8MUA
13
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 730
Refer to the exhibit While configuring a network a technician wired each end of a Category 5e cableas shown Which two statements are true about this setup (Choose two)
The cable is suitable for connecting a switch to a router Ethernet port
The cable is suitable for connecting dissimilar types of devices
The cable is unusable and must be rewired
The cable is terminated in a way that the transmit pin is wired to the receive pin
The cable simulates a point-to-point WAN link
14 Which combination of network id and subnet mask correctly identifies all IP addresses from172161280 through 17216159255
172161280 255255255224
172161280 25525500
172161280 2552551920
172161280 2552552240
172161280 255255255192
15
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 830
Refer to the exhibit Which two layers of the OSI model describe the same functions as the transportand internet layers of the TCPIP model (Choose two)
application layer
presentation layer
session layer
transport layer
network layer
data link layer
physical layer
16 Which of the following are the address ranges of the private IP addresses (Choose three)
10000 to 10255255255
200100500 to 20010025255
15015000 to 150150255255
1721600 to 17231255255
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 930
19216800 to 192168255255
1271600 to 12731255255
17 Which statement is true about the CSMACD access method that is used in Ethernet
When a device hears a carrier signal and transmits a collision cannot occur
A jamming signal causes only devices that caused the collision to execute a backoff algorithm
All network devices must listen before transmitting
Devices involved in a collision get priority to transmit after the backoff period
18 What happens when a node on an Ethernet network is creating a frame and it does not have thedestination MAC address
The node drops the frame
The node sends out a Layer 3 broadcast message
The node sends a message directly to the router for the address
The node sends out an ARP request with the destination IP address
19
Refer to the exhibit Communication for hosts X and Y is restricted to the local network What is thereason for this
Host X is assigned a network address
Host Y is assigned a multicast address
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 1030
Host X and host Y belong to different networks
The gateway addresses are broadcast addresses
20 Which statement is true about the ICMP protocol
It is an application layer protocol
It is designed to make IP a reliable protocol
It is often filtered out of networks for security purposes
If a host does not respond to an ICMP echo request the host is not functioning
21
Refer to the exhibit A host is connected to hub 1 Which combination of IP address subnet mask anddefault gateway can allow this host to function in the network
IP address 172163136 Subnet mask 255255255240 Default gateway 172163135
IP address 172163163 Subnet mask 255255255224 Default gateway 172163135
IP address 172163129 Subnet mask 255255255248 Default gateway 172163135
IP address 172163132 Subnet mask 255255255224 Default gateway 172163135
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 1130
IP address 172163129 Subnet mask 255255255240 Default gateway 17216301
IP address 172163137 Subnet mask 255255255224 Default gateway 172163135
22
Refer to the exhibit RouterB is configured properly The Ethernet interface Fa00 of RouterA isconfigured with the use of the commands that are shown However a ping from the Fa00 interface of
RouterA to the Fa00 interface of RouterB is unsuccessful What action should be taken on RouterA tosolve this problem
Use the description command on the FastEthernet interface Fa00
Configure the clock rate of the FastEthernet interface Fa00
Use the no shutdown command on the FastEthernet interface Fa00
Reboot the router
23
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 1230
Refer to the exhibit The tracert command is initiated from PC1 to PC4 Which device will send aresponse to the initial tracert packet from PC1
Athens
Ankara
London
Paris
PC4
24 Which physical component is used to access and perform the initial configuration on a newunconfigured router
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 1330
25 In a network design project a network designer needs to select a device to provide collision freeconnections to 40 hosts on the LAN Which device should be selected
hub
router
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 1430
switch
firewall
26
Refer to the exhibit Which option correctly identifies the network address range of host addressesand the broadcast address for the network that contains host A
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 1530
27
Refer to the exhibit A router the table of which is shown receives a packet that is destined for19216894 How will the router treat the packet
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 1630
It will drop the packet
It will forward the packet via FastEthernet 01
It will forward the packet to the next hop address
It will forward the packet to 1721620
28
Refer to the exhibit An administrator is trying to remotely modify the configuration of this switch byusing Telnet The management workstation is on the same subnet as the switch but the administratoris unable to access the switch from the workstation Based on the output that is provided what is the
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 1730
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 1830
80
wwwciscocom
1000130
100013080
30
Refer to the exhibit Host A attempts to establish a TCPIP session with host C During this attempt aframe was captured with the source MAC address 00507320D632 and the destination MAC address0030851744C4 The packet inside the captured frame has an IP source address 19216875 andthe destination IP address is 19216821924 At which point in the network was this packet captured
leaving host A
leaving ATL
leaving Dallas
leaving NYC
31 When connectionless protocols are implemented at the lower layers of the OSI model what is usuallyused to acknowledge that the data was received and to request the retransmission of missing data
IP
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 1930
UDP
Ethernet
a connectionless acknowledgement
an upper-layer connection-oriented protocol or service
32 Which device should be used for enabling a host to communicate with another host on a different
networkswitch
hub
router
host
33 To enhance security in a network the network administrator uses these commands
Router(config) line console 0
Router(config-line) password j1mdi2 Router(config-line) login
What two conclusions are evident from these commands (Choose two)
Users who attempt to connect to the console port of the router must enter a password
The entries permit access through the console by the use of j1mdi2 as the password
The entries eliminate the need for authentication
Access through the console will be denied because the console configuration is incomplete
The entries prevent passwords from being displayed as plain text
34 What happens when a host station receives a frame that contains its own MAC address in thedestination field
The Layer 2 information is removed and the frame is pushed up to Layer 3
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 2030
The host station will copy the information to its buffers and send it back out
The frame originated from the host and will be ignored
The Layer 3 information is added to the frame
35
Refer to the exhibit All devices in the network use default configurations How many broadcastdomains are there in this topology
3
5
7
911
36 What information can be gathered by using the command netstat
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 2130
the default gateway
the routing protocol
active TCP connections
the locally configured subnet mask
37
Refer to the exhibit A PC is connected to a network Which action will verify that the PC cancommunicate with its default gateway
Use the ping 127001 command
Use the ipconfig command
Use the ipconfigall command
Use the ping 1000254 command
38
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 2230
Refer to the exhibit A network administrator remotely accesses the CLI of RouterB from PC1 usingTelnet Which statement is true about this connection
The data is automatically encrypted
A Telnet server process is running on PC1
The connection is made through a VTY session on the router
A GET request was sent to RouterB to retrieve data during this session
39
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 2330
Refer to the exhibit Host C is able to ping 127001 successfully but is unable to communicate withhosts A and B in the organization What is the likely cause of the problem
Hosts A and B are not on the same subnet as host C
The IP addresses on the router serial interfaces are wrong
The subnet mask on host C is improperly configured
The FastEthernet interface fa00 of router 1 is wrongly configured
40 Which prompt represents the appropriate mode used for the copy running-config startup-config command
Switch-6Jgt
Switch-6J
Switch-6J(config)
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 2430
Switch-6J(config-if)
Switch-6J(config-line)
41 How can ARP be used to help document the network
It can list each hop on the way to a destination host
It can show the average latency of hosts on the network
It can provide a list of physical addresses on the networkIt can indicate which hosts are not responding to network traffic
42 What information is contained in the header of Layer 3 to help data delivery
port number
device physical address
destination host logical address
virtual connection identifier
43 Which router component will have contents erased when the command erase startup-config isissued
flash
RAM
ROM
NVRAM
44
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 2530
Refer to the exhibit When computer A sends a frame to computer D what computers receive theframe
only computer D
only computer A and computer D
only computer B computer C and computer D
all computers
45 Which option correctly identifies the interface or interfaces used to connect the router to a CSUDSUfor WAN connectivity
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 2630
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 2730
46
Refer to the exhibit A user wants to access the Internet from the PC A part of the runningconfiguration of the router is shown Which default gateway IP address should be configured at thePC to enable this access
1011921
1011922
10119254
1923171
47
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 2830
Refer to the exhibit Which Layer 2 protocol could be used inside nework A and network CIP
TCP
UDP
Ethernet
48 Which password is automatically encrypted when it is created
vty
auxconsole
enable secret
enable password
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 2930
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 3030
application
network access
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 330
6 Which configuration mode is used to set a password to authenticate users that are accessing andconfiguring the network device using a Telnet connection
VTY line mode
interface mode
console line mode
global configuration mode
7 To send data through a network what two flags are used to establish a session (Choose two)
ACK
CRC
SYN
Ack
Port
Seq
8 Which service is used when the nslookup command is issued on a computer
FTP
DNS
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 430
DHCP
Telnet
9
Refer to the exhibit Which list refers only to end devices
DEFG
AHBC
ADEF
ADEG
10 Which topology divides the collision domain and provides full media bandwidth to the hosts in thenetwork
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 530
11 During the encapsulation process what identifiers are added at the transport layer
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 630
source and destination IP addresses
source and destination MAC addresses
source and destination port numbers
source and destination channel identifiers
12
Refer to the exhibit The diagram represents the process of sending e-mail between clients Which listcorrectly identifies the component or protocol used at each numbered stage of the diagram
1MUA 2MDA 3MTA 4SMTP 5MTA 6POP 7MDA 8MUA
1MUA 2POP 3MDA 4SMTP 5MTA 6MDA 7SMTP 8MUA
1MUA 2POP 3SMTP 4MDA 5MTA 6SMTP 7POP 8MUA
1MUA 2SMTP 3MTA 4SMTP 5MTA 6MDA 7POP 8MUA
13
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 730
Refer to the exhibit While configuring a network a technician wired each end of a Category 5e cableas shown Which two statements are true about this setup (Choose two)
The cable is suitable for connecting a switch to a router Ethernet port
The cable is suitable for connecting dissimilar types of devices
The cable is unusable and must be rewired
The cable is terminated in a way that the transmit pin is wired to the receive pin
The cable simulates a point-to-point WAN link
14 Which combination of network id and subnet mask correctly identifies all IP addresses from172161280 through 17216159255
172161280 255255255224
172161280 25525500
172161280 2552551920
172161280 2552552240
172161280 255255255192
15
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 830
Refer to the exhibit Which two layers of the OSI model describe the same functions as the transportand internet layers of the TCPIP model (Choose two)
application layer
presentation layer
session layer
transport layer
network layer
data link layer
physical layer
16 Which of the following are the address ranges of the private IP addresses (Choose three)
10000 to 10255255255
200100500 to 20010025255
15015000 to 150150255255
1721600 to 17231255255
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 930
19216800 to 192168255255
1271600 to 12731255255
17 Which statement is true about the CSMACD access method that is used in Ethernet
When a device hears a carrier signal and transmits a collision cannot occur
A jamming signal causes only devices that caused the collision to execute a backoff algorithm
All network devices must listen before transmitting
Devices involved in a collision get priority to transmit after the backoff period
18 What happens when a node on an Ethernet network is creating a frame and it does not have thedestination MAC address
The node drops the frame
The node sends out a Layer 3 broadcast message
The node sends a message directly to the router for the address
The node sends out an ARP request with the destination IP address
19
Refer to the exhibit Communication for hosts X and Y is restricted to the local network What is thereason for this
Host X is assigned a network address
Host Y is assigned a multicast address
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 1030
Host X and host Y belong to different networks
The gateway addresses are broadcast addresses
20 Which statement is true about the ICMP protocol
It is an application layer protocol
It is designed to make IP a reliable protocol
It is often filtered out of networks for security purposes
If a host does not respond to an ICMP echo request the host is not functioning
21
Refer to the exhibit A host is connected to hub 1 Which combination of IP address subnet mask anddefault gateway can allow this host to function in the network
IP address 172163136 Subnet mask 255255255240 Default gateway 172163135
IP address 172163163 Subnet mask 255255255224 Default gateway 172163135
IP address 172163129 Subnet mask 255255255248 Default gateway 172163135
IP address 172163132 Subnet mask 255255255224 Default gateway 172163135
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 1130
IP address 172163129 Subnet mask 255255255240 Default gateway 17216301
IP address 172163137 Subnet mask 255255255224 Default gateway 172163135
22
Refer to the exhibit RouterB is configured properly The Ethernet interface Fa00 of RouterA isconfigured with the use of the commands that are shown However a ping from the Fa00 interface of
RouterA to the Fa00 interface of RouterB is unsuccessful What action should be taken on RouterA tosolve this problem
Use the description command on the FastEthernet interface Fa00
Configure the clock rate of the FastEthernet interface Fa00
Use the no shutdown command on the FastEthernet interface Fa00
Reboot the router
23
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 1230
Refer to the exhibit The tracert command is initiated from PC1 to PC4 Which device will send aresponse to the initial tracert packet from PC1
Athens
Ankara
London
Paris
PC4
24 Which physical component is used to access and perform the initial configuration on a newunconfigured router
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 1330
25 In a network design project a network designer needs to select a device to provide collision freeconnections to 40 hosts on the LAN Which device should be selected
hub
router
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 1430
switch
firewall
26
Refer to the exhibit Which option correctly identifies the network address range of host addressesand the broadcast address for the network that contains host A
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 1530
27
Refer to the exhibit A router the table of which is shown receives a packet that is destined for19216894 How will the router treat the packet
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 1630
It will drop the packet
It will forward the packet via FastEthernet 01
It will forward the packet to the next hop address
It will forward the packet to 1721620
28
Refer to the exhibit An administrator is trying to remotely modify the configuration of this switch byusing Telnet The management workstation is on the same subnet as the switch but the administratoris unable to access the switch from the workstation Based on the output that is provided what is the
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 1730
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 1830
80
wwwciscocom
1000130
100013080
30
Refer to the exhibit Host A attempts to establish a TCPIP session with host C During this attempt aframe was captured with the source MAC address 00507320D632 and the destination MAC address0030851744C4 The packet inside the captured frame has an IP source address 19216875 andthe destination IP address is 19216821924 At which point in the network was this packet captured
leaving host A
leaving ATL
leaving Dallas
leaving NYC
31 When connectionless protocols are implemented at the lower layers of the OSI model what is usuallyused to acknowledge that the data was received and to request the retransmission of missing data
IP
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 1930
UDP
Ethernet
a connectionless acknowledgement
an upper-layer connection-oriented protocol or service
32 Which device should be used for enabling a host to communicate with another host on a different
networkswitch
hub
router
host
33 To enhance security in a network the network administrator uses these commands
Router(config) line console 0
Router(config-line) password j1mdi2 Router(config-line) login
What two conclusions are evident from these commands (Choose two)
Users who attempt to connect to the console port of the router must enter a password
The entries permit access through the console by the use of j1mdi2 as the password
The entries eliminate the need for authentication
Access through the console will be denied because the console configuration is incomplete
The entries prevent passwords from being displayed as plain text
34 What happens when a host station receives a frame that contains its own MAC address in thedestination field
The Layer 2 information is removed and the frame is pushed up to Layer 3
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 2030
The host station will copy the information to its buffers and send it back out
The frame originated from the host and will be ignored
The Layer 3 information is added to the frame
35
Refer to the exhibit All devices in the network use default configurations How many broadcastdomains are there in this topology
3
5
7
911
36 What information can be gathered by using the command netstat
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 2130
the default gateway
the routing protocol
active TCP connections
the locally configured subnet mask
37
Refer to the exhibit A PC is connected to a network Which action will verify that the PC cancommunicate with its default gateway
Use the ping 127001 command
Use the ipconfig command
Use the ipconfigall command
Use the ping 1000254 command
38
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 2230
Refer to the exhibit A network administrator remotely accesses the CLI of RouterB from PC1 usingTelnet Which statement is true about this connection
The data is automatically encrypted
A Telnet server process is running on PC1
The connection is made through a VTY session on the router
A GET request was sent to RouterB to retrieve data during this session
39
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 2330
Refer to the exhibit Host C is able to ping 127001 successfully but is unable to communicate withhosts A and B in the organization What is the likely cause of the problem
Hosts A and B are not on the same subnet as host C
The IP addresses on the router serial interfaces are wrong
The subnet mask on host C is improperly configured
The FastEthernet interface fa00 of router 1 is wrongly configured
40 Which prompt represents the appropriate mode used for the copy running-config startup-config command
Switch-6Jgt
Switch-6J
Switch-6J(config)
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 2430
Switch-6J(config-if)
Switch-6J(config-line)
41 How can ARP be used to help document the network
It can list each hop on the way to a destination host
It can show the average latency of hosts on the network
It can provide a list of physical addresses on the networkIt can indicate which hosts are not responding to network traffic
42 What information is contained in the header of Layer 3 to help data delivery
port number
device physical address
destination host logical address
virtual connection identifier
43 Which router component will have contents erased when the command erase startup-config isissued
flash
RAM
ROM
NVRAM
44
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 2530
Refer to the exhibit When computer A sends a frame to computer D what computers receive theframe
only computer D
only computer A and computer D
only computer B computer C and computer D
all computers
45 Which option correctly identifies the interface or interfaces used to connect the router to a CSUDSUfor WAN connectivity
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 2630
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 2730
46
Refer to the exhibit A user wants to access the Internet from the PC A part of the runningconfiguration of the router is shown Which default gateway IP address should be configured at thePC to enable this access
1011921
1011922
10119254
1923171
47
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 2830
Refer to the exhibit Which Layer 2 protocol could be used inside nework A and network CIP
TCP
UDP
Ethernet
48 Which password is automatically encrypted when it is created
vty
auxconsole
enable secret
enable password
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 2930
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 3030
application
network access
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 430
DHCP
Telnet
9
Refer to the exhibit Which list refers only to end devices
DEFG
AHBC
ADEF
ADEG
10 Which topology divides the collision domain and provides full media bandwidth to the hosts in thenetwork
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 530
11 During the encapsulation process what identifiers are added at the transport layer
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 630
source and destination IP addresses
source and destination MAC addresses
source and destination port numbers
source and destination channel identifiers
12
Refer to the exhibit The diagram represents the process of sending e-mail between clients Which listcorrectly identifies the component or protocol used at each numbered stage of the diagram
1MUA 2MDA 3MTA 4SMTP 5MTA 6POP 7MDA 8MUA
1MUA 2POP 3MDA 4SMTP 5MTA 6MDA 7SMTP 8MUA
1MUA 2POP 3SMTP 4MDA 5MTA 6SMTP 7POP 8MUA
1MUA 2SMTP 3MTA 4SMTP 5MTA 6MDA 7POP 8MUA
13
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 730
Refer to the exhibit While configuring a network a technician wired each end of a Category 5e cableas shown Which two statements are true about this setup (Choose two)
The cable is suitable for connecting a switch to a router Ethernet port
The cable is suitable for connecting dissimilar types of devices
The cable is unusable and must be rewired
The cable is terminated in a way that the transmit pin is wired to the receive pin
The cable simulates a point-to-point WAN link
14 Which combination of network id and subnet mask correctly identifies all IP addresses from172161280 through 17216159255
172161280 255255255224
172161280 25525500
172161280 2552551920
172161280 2552552240
172161280 255255255192
15
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 830
Refer to the exhibit Which two layers of the OSI model describe the same functions as the transportand internet layers of the TCPIP model (Choose two)
application layer
presentation layer
session layer
transport layer
network layer
data link layer
physical layer
16 Which of the following are the address ranges of the private IP addresses (Choose three)
10000 to 10255255255
200100500 to 20010025255
15015000 to 150150255255
1721600 to 17231255255
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 930
19216800 to 192168255255
1271600 to 12731255255
17 Which statement is true about the CSMACD access method that is used in Ethernet
When a device hears a carrier signal and transmits a collision cannot occur
A jamming signal causes only devices that caused the collision to execute a backoff algorithm
All network devices must listen before transmitting
Devices involved in a collision get priority to transmit after the backoff period
18 What happens when a node on an Ethernet network is creating a frame and it does not have thedestination MAC address
The node drops the frame
The node sends out a Layer 3 broadcast message
The node sends a message directly to the router for the address
The node sends out an ARP request with the destination IP address
19
Refer to the exhibit Communication for hosts X and Y is restricted to the local network What is thereason for this
Host X is assigned a network address
Host Y is assigned a multicast address
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 1030
Host X and host Y belong to different networks
The gateway addresses are broadcast addresses
20 Which statement is true about the ICMP protocol
It is an application layer protocol
It is designed to make IP a reliable protocol
It is often filtered out of networks for security purposes
If a host does not respond to an ICMP echo request the host is not functioning
21
Refer to the exhibit A host is connected to hub 1 Which combination of IP address subnet mask anddefault gateway can allow this host to function in the network
IP address 172163136 Subnet mask 255255255240 Default gateway 172163135
IP address 172163163 Subnet mask 255255255224 Default gateway 172163135
IP address 172163129 Subnet mask 255255255248 Default gateway 172163135
IP address 172163132 Subnet mask 255255255224 Default gateway 172163135
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 1130
IP address 172163129 Subnet mask 255255255240 Default gateway 17216301
IP address 172163137 Subnet mask 255255255224 Default gateway 172163135
22
Refer to the exhibit RouterB is configured properly The Ethernet interface Fa00 of RouterA isconfigured with the use of the commands that are shown However a ping from the Fa00 interface of
RouterA to the Fa00 interface of RouterB is unsuccessful What action should be taken on RouterA tosolve this problem
Use the description command on the FastEthernet interface Fa00
Configure the clock rate of the FastEthernet interface Fa00
Use the no shutdown command on the FastEthernet interface Fa00
Reboot the router
23
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 1230
Refer to the exhibit The tracert command is initiated from PC1 to PC4 Which device will send aresponse to the initial tracert packet from PC1
Athens
Ankara
London
Paris
PC4
24 Which physical component is used to access and perform the initial configuration on a newunconfigured router
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 1330
25 In a network design project a network designer needs to select a device to provide collision freeconnections to 40 hosts on the LAN Which device should be selected
hub
router
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 1430
switch
firewall
26
Refer to the exhibit Which option correctly identifies the network address range of host addressesand the broadcast address for the network that contains host A
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 1530
27
Refer to the exhibit A router the table of which is shown receives a packet that is destined for19216894 How will the router treat the packet
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 1630
It will drop the packet
It will forward the packet via FastEthernet 01
It will forward the packet to the next hop address
It will forward the packet to 1721620
28
Refer to the exhibit An administrator is trying to remotely modify the configuration of this switch byusing Telnet The management workstation is on the same subnet as the switch but the administratoris unable to access the switch from the workstation Based on the output that is provided what is the
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 1730
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 1830
80
wwwciscocom
1000130
100013080
30
Refer to the exhibit Host A attempts to establish a TCPIP session with host C During this attempt aframe was captured with the source MAC address 00507320D632 and the destination MAC address0030851744C4 The packet inside the captured frame has an IP source address 19216875 andthe destination IP address is 19216821924 At which point in the network was this packet captured
leaving host A
leaving ATL
leaving Dallas
leaving NYC
31 When connectionless protocols are implemented at the lower layers of the OSI model what is usuallyused to acknowledge that the data was received and to request the retransmission of missing data
IP
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 1930
UDP
Ethernet
a connectionless acknowledgement
an upper-layer connection-oriented protocol or service
32 Which device should be used for enabling a host to communicate with another host on a different
networkswitch
hub
router
host
33 To enhance security in a network the network administrator uses these commands
Router(config) line console 0
Router(config-line) password j1mdi2 Router(config-line) login
What two conclusions are evident from these commands (Choose two)
Users who attempt to connect to the console port of the router must enter a password
The entries permit access through the console by the use of j1mdi2 as the password
The entries eliminate the need for authentication
Access through the console will be denied because the console configuration is incomplete
The entries prevent passwords from being displayed as plain text
34 What happens when a host station receives a frame that contains its own MAC address in thedestination field
The Layer 2 information is removed and the frame is pushed up to Layer 3
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 2030
The host station will copy the information to its buffers and send it back out
The frame originated from the host and will be ignored
The Layer 3 information is added to the frame
35
Refer to the exhibit All devices in the network use default configurations How many broadcastdomains are there in this topology
3
5
7
911
36 What information can be gathered by using the command netstat
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 2130
the default gateway
the routing protocol
active TCP connections
the locally configured subnet mask
37
Refer to the exhibit A PC is connected to a network Which action will verify that the PC cancommunicate with its default gateway
Use the ping 127001 command
Use the ipconfig command
Use the ipconfigall command
Use the ping 1000254 command
38
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 2230
Refer to the exhibit A network administrator remotely accesses the CLI of RouterB from PC1 usingTelnet Which statement is true about this connection
The data is automatically encrypted
A Telnet server process is running on PC1
The connection is made through a VTY session on the router
A GET request was sent to RouterB to retrieve data during this session
39
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 2330
Refer to the exhibit Host C is able to ping 127001 successfully but is unable to communicate withhosts A and B in the organization What is the likely cause of the problem
Hosts A and B are not on the same subnet as host C
The IP addresses on the router serial interfaces are wrong
The subnet mask on host C is improperly configured
The FastEthernet interface fa00 of router 1 is wrongly configured
40 Which prompt represents the appropriate mode used for the copy running-config startup-config command
Switch-6Jgt
Switch-6J
Switch-6J(config)
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 2430
Switch-6J(config-if)
Switch-6J(config-line)
41 How can ARP be used to help document the network
It can list each hop on the way to a destination host
It can show the average latency of hosts on the network
It can provide a list of physical addresses on the networkIt can indicate which hosts are not responding to network traffic
42 What information is contained in the header of Layer 3 to help data delivery
port number
device physical address
destination host logical address
virtual connection identifier
43 Which router component will have contents erased when the command erase startup-config isissued
flash
RAM
ROM
NVRAM
44
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 2530
Refer to the exhibit When computer A sends a frame to computer D what computers receive theframe
only computer D
only computer A and computer D
only computer B computer C and computer D
all computers
45 Which option correctly identifies the interface or interfaces used to connect the router to a CSUDSUfor WAN connectivity
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 2630
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 2730
46
Refer to the exhibit A user wants to access the Internet from the PC A part of the runningconfiguration of the router is shown Which default gateway IP address should be configured at thePC to enable this access
1011921
1011922
10119254
1923171
47
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 2830
Refer to the exhibit Which Layer 2 protocol could be used inside nework A and network CIP
TCP
UDP
Ethernet
48 Which password is automatically encrypted when it is created
vty
auxconsole
enable secret
enable password
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 2930
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 3030
application
network access
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 530
11 During the encapsulation process what identifiers are added at the transport layer
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 630
source and destination IP addresses
source and destination MAC addresses
source and destination port numbers
source and destination channel identifiers
12
Refer to the exhibit The diagram represents the process of sending e-mail between clients Which listcorrectly identifies the component or protocol used at each numbered stage of the diagram
1MUA 2MDA 3MTA 4SMTP 5MTA 6POP 7MDA 8MUA
1MUA 2POP 3MDA 4SMTP 5MTA 6MDA 7SMTP 8MUA
1MUA 2POP 3SMTP 4MDA 5MTA 6SMTP 7POP 8MUA
1MUA 2SMTP 3MTA 4SMTP 5MTA 6MDA 7POP 8MUA
13
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 730
Refer to the exhibit While configuring a network a technician wired each end of a Category 5e cableas shown Which two statements are true about this setup (Choose two)
The cable is suitable for connecting a switch to a router Ethernet port
The cable is suitable for connecting dissimilar types of devices
The cable is unusable and must be rewired
The cable is terminated in a way that the transmit pin is wired to the receive pin
The cable simulates a point-to-point WAN link
14 Which combination of network id and subnet mask correctly identifies all IP addresses from172161280 through 17216159255
172161280 255255255224
172161280 25525500
172161280 2552551920
172161280 2552552240
172161280 255255255192
15
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 830
Refer to the exhibit Which two layers of the OSI model describe the same functions as the transportand internet layers of the TCPIP model (Choose two)
application layer
presentation layer
session layer
transport layer
network layer
data link layer
physical layer
16 Which of the following are the address ranges of the private IP addresses (Choose three)
10000 to 10255255255
200100500 to 20010025255
15015000 to 150150255255
1721600 to 17231255255
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 930
19216800 to 192168255255
1271600 to 12731255255
17 Which statement is true about the CSMACD access method that is used in Ethernet
When a device hears a carrier signal and transmits a collision cannot occur
A jamming signal causes only devices that caused the collision to execute a backoff algorithm
All network devices must listen before transmitting
Devices involved in a collision get priority to transmit after the backoff period
18 What happens when a node on an Ethernet network is creating a frame and it does not have thedestination MAC address
The node drops the frame
The node sends out a Layer 3 broadcast message
The node sends a message directly to the router for the address
The node sends out an ARP request with the destination IP address
19
Refer to the exhibit Communication for hosts X and Y is restricted to the local network What is thereason for this
Host X is assigned a network address
Host Y is assigned a multicast address
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 1030
Host X and host Y belong to different networks
The gateway addresses are broadcast addresses
20 Which statement is true about the ICMP protocol
It is an application layer protocol
It is designed to make IP a reliable protocol
It is often filtered out of networks for security purposes
If a host does not respond to an ICMP echo request the host is not functioning
21
Refer to the exhibit A host is connected to hub 1 Which combination of IP address subnet mask anddefault gateway can allow this host to function in the network
IP address 172163136 Subnet mask 255255255240 Default gateway 172163135
IP address 172163163 Subnet mask 255255255224 Default gateway 172163135
IP address 172163129 Subnet mask 255255255248 Default gateway 172163135
IP address 172163132 Subnet mask 255255255224 Default gateway 172163135
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 1130
IP address 172163129 Subnet mask 255255255240 Default gateway 17216301
IP address 172163137 Subnet mask 255255255224 Default gateway 172163135
22
Refer to the exhibit RouterB is configured properly The Ethernet interface Fa00 of RouterA isconfigured with the use of the commands that are shown However a ping from the Fa00 interface of
RouterA to the Fa00 interface of RouterB is unsuccessful What action should be taken on RouterA tosolve this problem
Use the description command on the FastEthernet interface Fa00
Configure the clock rate of the FastEthernet interface Fa00
Use the no shutdown command on the FastEthernet interface Fa00
Reboot the router
23
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 1230
Refer to the exhibit The tracert command is initiated from PC1 to PC4 Which device will send aresponse to the initial tracert packet from PC1
Athens
Ankara
London
Paris
PC4
24 Which physical component is used to access and perform the initial configuration on a newunconfigured router
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 1330
25 In a network design project a network designer needs to select a device to provide collision freeconnections to 40 hosts on the LAN Which device should be selected
hub
router
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 1430
switch
firewall
26
Refer to the exhibit Which option correctly identifies the network address range of host addressesand the broadcast address for the network that contains host A
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 1530
27
Refer to the exhibit A router the table of which is shown receives a packet that is destined for19216894 How will the router treat the packet
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 1630
It will drop the packet
It will forward the packet via FastEthernet 01
It will forward the packet to the next hop address
It will forward the packet to 1721620
28
Refer to the exhibit An administrator is trying to remotely modify the configuration of this switch byusing Telnet The management workstation is on the same subnet as the switch but the administratoris unable to access the switch from the workstation Based on the output that is provided what is the
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 1730
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 1830
80
wwwciscocom
1000130
100013080
30
Refer to the exhibit Host A attempts to establish a TCPIP session with host C During this attempt aframe was captured with the source MAC address 00507320D632 and the destination MAC address0030851744C4 The packet inside the captured frame has an IP source address 19216875 andthe destination IP address is 19216821924 At which point in the network was this packet captured
leaving host A
leaving ATL
leaving Dallas
leaving NYC
31 When connectionless protocols are implemented at the lower layers of the OSI model what is usuallyused to acknowledge that the data was received and to request the retransmission of missing data
IP
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 1930
UDP
Ethernet
a connectionless acknowledgement
an upper-layer connection-oriented protocol or service
32 Which device should be used for enabling a host to communicate with another host on a different
networkswitch
hub
router
host
33 To enhance security in a network the network administrator uses these commands
Router(config) line console 0
Router(config-line) password j1mdi2 Router(config-line) login
What two conclusions are evident from these commands (Choose two)
Users who attempt to connect to the console port of the router must enter a password
The entries permit access through the console by the use of j1mdi2 as the password
The entries eliminate the need for authentication
Access through the console will be denied because the console configuration is incomplete
The entries prevent passwords from being displayed as plain text
34 What happens when a host station receives a frame that contains its own MAC address in thedestination field
The Layer 2 information is removed and the frame is pushed up to Layer 3
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 2030
The host station will copy the information to its buffers and send it back out
The frame originated from the host and will be ignored
The Layer 3 information is added to the frame
35
Refer to the exhibit All devices in the network use default configurations How many broadcastdomains are there in this topology
3
5
7
911
36 What information can be gathered by using the command netstat
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 2130
the default gateway
the routing protocol
active TCP connections
the locally configured subnet mask
37
Refer to the exhibit A PC is connected to a network Which action will verify that the PC cancommunicate with its default gateway
Use the ping 127001 command
Use the ipconfig command
Use the ipconfigall command
Use the ping 1000254 command
38
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 2230
Refer to the exhibit A network administrator remotely accesses the CLI of RouterB from PC1 usingTelnet Which statement is true about this connection
The data is automatically encrypted
A Telnet server process is running on PC1
The connection is made through a VTY session on the router
A GET request was sent to RouterB to retrieve data during this session
39
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 2330
Refer to the exhibit Host C is able to ping 127001 successfully but is unable to communicate withhosts A and B in the organization What is the likely cause of the problem
Hosts A and B are not on the same subnet as host C
The IP addresses on the router serial interfaces are wrong
The subnet mask on host C is improperly configured
The FastEthernet interface fa00 of router 1 is wrongly configured
40 Which prompt represents the appropriate mode used for the copy running-config startup-config command
Switch-6Jgt
Switch-6J
Switch-6J(config)
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 2430
Switch-6J(config-if)
Switch-6J(config-line)
41 How can ARP be used to help document the network
It can list each hop on the way to a destination host
It can show the average latency of hosts on the network
It can provide a list of physical addresses on the networkIt can indicate which hosts are not responding to network traffic
42 What information is contained in the header of Layer 3 to help data delivery
port number
device physical address
destination host logical address
virtual connection identifier
43 Which router component will have contents erased when the command erase startup-config isissued
flash
RAM
ROM
NVRAM
44
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 2530
Refer to the exhibit When computer A sends a frame to computer D what computers receive theframe
only computer D
only computer A and computer D
only computer B computer C and computer D
all computers
45 Which option correctly identifies the interface or interfaces used to connect the router to a CSUDSUfor WAN connectivity
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 2630
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 2730
46
Refer to the exhibit A user wants to access the Internet from the PC A part of the runningconfiguration of the router is shown Which default gateway IP address should be configured at thePC to enable this access
1011921
1011922
10119254
1923171
47
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 2830
Refer to the exhibit Which Layer 2 protocol could be used inside nework A and network CIP
TCP
UDP
Ethernet
48 Which password is automatically encrypted when it is created
vty
auxconsole
enable secret
enable password
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 2930
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 3030
application
network access
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 630
source and destination IP addresses
source and destination MAC addresses
source and destination port numbers
source and destination channel identifiers
12
Refer to the exhibit The diagram represents the process of sending e-mail between clients Which listcorrectly identifies the component or protocol used at each numbered stage of the diagram
1MUA 2MDA 3MTA 4SMTP 5MTA 6POP 7MDA 8MUA
1MUA 2POP 3MDA 4SMTP 5MTA 6MDA 7SMTP 8MUA
1MUA 2POP 3SMTP 4MDA 5MTA 6SMTP 7POP 8MUA
1MUA 2SMTP 3MTA 4SMTP 5MTA 6MDA 7POP 8MUA
13
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 730
Refer to the exhibit While configuring a network a technician wired each end of a Category 5e cableas shown Which two statements are true about this setup (Choose two)
The cable is suitable for connecting a switch to a router Ethernet port
The cable is suitable for connecting dissimilar types of devices
The cable is unusable and must be rewired
The cable is terminated in a way that the transmit pin is wired to the receive pin
The cable simulates a point-to-point WAN link
14 Which combination of network id and subnet mask correctly identifies all IP addresses from172161280 through 17216159255
172161280 255255255224
172161280 25525500
172161280 2552551920
172161280 2552552240
172161280 255255255192
15
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 830
Refer to the exhibit Which two layers of the OSI model describe the same functions as the transportand internet layers of the TCPIP model (Choose two)
application layer
presentation layer
session layer
transport layer
network layer
data link layer
physical layer
16 Which of the following are the address ranges of the private IP addresses (Choose three)
10000 to 10255255255
200100500 to 20010025255
15015000 to 150150255255
1721600 to 17231255255
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 930
19216800 to 192168255255
1271600 to 12731255255
17 Which statement is true about the CSMACD access method that is used in Ethernet
When a device hears a carrier signal and transmits a collision cannot occur
A jamming signal causes only devices that caused the collision to execute a backoff algorithm
All network devices must listen before transmitting
Devices involved in a collision get priority to transmit after the backoff period
18 What happens when a node on an Ethernet network is creating a frame and it does not have thedestination MAC address
The node drops the frame
The node sends out a Layer 3 broadcast message
The node sends a message directly to the router for the address
The node sends out an ARP request with the destination IP address
19
Refer to the exhibit Communication for hosts X and Y is restricted to the local network What is thereason for this
Host X is assigned a network address
Host Y is assigned a multicast address
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 1030
Host X and host Y belong to different networks
The gateway addresses are broadcast addresses
20 Which statement is true about the ICMP protocol
It is an application layer protocol
It is designed to make IP a reliable protocol
It is often filtered out of networks for security purposes
If a host does not respond to an ICMP echo request the host is not functioning
21
Refer to the exhibit A host is connected to hub 1 Which combination of IP address subnet mask anddefault gateway can allow this host to function in the network
IP address 172163136 Subnet mask 255255255240 Default gateway 172163135
IP address 172163163 Subnet mask 255255255224 Default gateway 172163135
IP address 172163129 Subnet mask 255255255248 Default gateway 172163135
IP address 172163132 Subnet mask 255255255224 Default gateway 172163135
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 1130
IP address 172163129 Subnet mask 255255255240 Default gateway 17216301
IP address 172163137 Subnet mask 255255255224 Default gateway 172163135
22
Refer to the exhibit RouterB is configured properly The Ethernet interface Fa00 of RouterA isconfigured with the use of the commands that are shown However a ping from the Fa00 interface of
RouterA to the Fa00 interface of RouterB is unsuccessful What action should be taken on RouterA tosolve this problem
Use the description command on the FastEthernet interface Fa00
Configure the clock rate of the FastEthernet interface Fa00
Use the no shutdown command on the FastEthernet interface Fa00
Reboot the router
23
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 1230
Refer to the exhibit The tracert command is initiated from PC1 to PC4 Which device will send aresponse to the initial tracert packet from PC1
Athens
Ankara
London
Paris
PC4
24 Which physical component is used to access and perform the initial configuration on a newunconfigured router
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 1330
25 In a network design project a network designer needs to select a device to provide collision freeconnections to 40 hosts on the LAN Which device should be selected
hub
router
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 1430
switch
firewall
26
Refer to the exhibit Which option correctly identifies the network address range of host addressesand the broadcast address for the network that contains host A
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 1530
27
Refer to the exhibit A router the table of which is shown receives a packet that is destined for19216894 How will the router treat the packet
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 1630
It will drop the packet
It will forward the packet via FastEthernet 01
It will forward the packet to the next hop address
It will forward the packet to 1721620
28
Refer to the exhibit An administrator is trying to remotely modify the configuration of this switch byusing Telnet The management workstation is on the same subnet as the switch but the administratoris unable to access the switch from the workstation Based on the output that is provided what is the
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 1730
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 1830
80
wwwciscocom
1000130
100013080
30
Refer to the exhibit Host A attempts to establish a TCPIP session with host C During this attempt aframe was captured with the source MAC address 00507320D632 and the destination MAC address0030851744C4 The packet inside the captured frame has an IP source address 19216875 andthe destination IP address is 19216821924 At which point in the network was this packet captured
leaving host A
leaving ATL
leaving Dallas
leaving NYC
31 When connectionless protocols are implemented at the lower layers of the OSI model what is usuallyused to acknowledge that the data was received and to request the retransmission of missing data
IP
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 1930
UDP
Ethernet
a connectionless acknowledgement
an upper-layer connection-oriented protocol or service
32 Which device should be used for enabling a host to communicate with another host on a different
networkswitch
hub
router
host
33 To enhance security in a network the network administrator uses these commands
Router(config) line console 0
Router(config-line) password j1mdi2 Router(config-line) login
What two conclusions are evident from these commands (Choose two)
Users who attempt to connect to the console port of the router must enter a password
The entries permit access through the console by the use of j1mdi2 as the password
The entries eliminate the need for authentication
Access through the console will be denied because the console configuration is incomplete
The entries prevent passwords from being displayed as plain text
34 What happens when a host station receives a frame that contains its own MAC address in thedestination field
The Layer 2 information is removed and the frame is pushed up to Layer 3
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 2030
The host station will copy the information to its buffers and send it back out
The frame originated from the host and will be ignored
The Layer 3 information is added to the frame
35
Refer to the exhibit All devices in the network use default configurations How many broadcastdomains are there in this topology
3
5
7
911
36 What information can be gathered by using the command netstat
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 2130
the default gateway
the routing protocol
active TCP connections
the locally configured subnet mask
37
Refer to the exhibit A PC is connected to a network Which action will verify that the PC cancommunicate with its default gateway
Use the ping 127001 command
Use the ipconfig command
Use the ipconfigall command
Use the ping 1000254 command
38
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 2230
Refer to the exhibit A network administrator remotely accesses the CLI of RouterB from PC1 usingTelnet Which statement is true about this connection
The data is automatically encrypted
A Telnet server process is running on PC1
The connection is made through a VTY session on the router
A GET request was sent to RouterB to retrieve data during this session
39
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 2330
Refer to the exhibit Host C is able to ping 127001 successfully but is unable to communicate withhosts A and B in the organization What is the likely cause of the problem
Hosts A and B are not on the same subnet as host C
The IP addresses on the router serial interfaces are wrong
The subnet mask on host C is improperly configured
The FastEthernet interface fa00 of router 1 is wrongly configured
40 Which prompt represents the appropriate mode used for the copy running-config startup-config command
Switch-6Jgt
Switch-6J
Switch-6J(config)
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 2430
Switch-6J(config-if)
Switch-6J(config-line)
41 How can ARP be used to help document the network
It can list each hop on the way to a destination host
It can show the average latency of hosts on the network
It can provide a list of physical addresses on the networkIt can indicate which hosts are not responding to network traffic
42 What information is contained in the header of Layer 3 to help data delivery
port number
device physical address
destination host logical address
virtual connection identifier
43 Which router component will have contents erased when the command erase startup-config isissued
flash
RAM
ROM
NVRAM
44
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 2530
Refer to the exhibit When computer A sends a frame to computer D what computers receive theframe
only computer D
only computer A and computer D
only computer B computer C and computer D
all computers
45 Which option correctly identifies the interface or interfaces used to connect the router to a CSUDSUfor WAN connectivity
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 2630
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 2730
46
Refer to the exhibit A user wants to access the Internet from the PC A part of the runningconfiguration of the router is shown Which default gateway IP address should be configured at thePC to enable this access
1011921
1011922
10119254
1923171
47
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 2830
Refer to the exhibit Which Layer 2 protocol could be used inside nework A and network CIP
TCP
UDP
Ethernet
48 Which password is automatically encrypted when it is created
vty
auxconsole
enable secret
enable password
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 2930
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 3030
application
network access
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 730
Refer to the exhibit While configuring a network a technician wired each end of a Category 5e cableas shown Which two statements are true about this setup (Choose two)
The cable is suitable for connecting a switch to a router Ethernet port
The cable is suitable for connecting dissimilar types of devices
The cable is unusable and must be rewired
The cable is terminated in a way that the transmit pin is wired to the receive pin
The cable simulates a point-to-point WAN link
14 Which combination of network id and subnet mask correctly identifies all IP addresses from172161280 through 17216159255
172161280 255255255224
172161280 25525500
172161280 2552551920
172161280 2552552240
172161280 255255255192
15
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 830
Refer to the exhibit Which two layers of the OSI model describe the same functions as the transportand internet layers of the TCPIP model (Choose two)
application layer
presentation layer
session layer
transport layer
network layer
data link layer
physical layer
16 Which of the following are the address ranges of the private IP addresses (Choose three)
10000 to 10255255255
200100500 to 20010025255
15015000 to 150150255255
1721600 to 17231255255
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 930
19216800 to 192168255255
1271600 to 12731255255
17 Which statement is true about the CSMACD access method that is used in Ethernet
When a device hears a carrier signal and transmits a collision cannot occur
A jamming signal causes only devices that caused the collision to execute a backoff algorithm
All network devices must listen before transmitting
Devices involved in a collision get priority to transmit after the backoff period
18 What happens when a node on an Ethernet network is creating a frame and it does not have thedestination MAC address
The node drops the frame
The node sends out a Layer 3 broadcast message
The node sends a message directly to the router for the address
The node sends out an ARP request with the destination IP address
19
Refer to the exhibit Communication for hosts X and Y is restricted to the local network What is thereason for this
Host X is assigned a network address
Host Y is assigned a multicast address
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 1030
Host X and host Y belong to different networks
The gateway addresses are broadcast addresses
20 Which statement is true about the ICMP protocol
It is an application layer protocol
It is designed to make IP a reliable protocol
It is often filtered out of networks for security purposes
If a host does not respond to an ICMP echo request the host is not functioning
21
Refer to the exhibit A host is connected to hub 1 Which combination of IP address subnet mask anddefault gateway can allow this host to function in the network
IP address 172163136 Subnet mask 255255255240 Default gateway 172163135
IP address 172163163 Subnet mask 255255255224 Default gateway 172163135
IP address 172163129 Subnet mask 255255255248 Default gateway 172163135
IP address 172163132 Subnet mask 255255255224 Default gateway 172163135
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 1130
IP address 172163129 Subnet mask 255255255240 Default gateway 17216301
IP address 172163137 Subnet mask 255255255224 Default gateway 172163135
22
Refer to the exhibit RouterB is configured properly The Ethernet interface Fa00 of RouterA isconfigured with the use of the commands that are shown However a ping from the Fa00 interface of
RouterA to the Fa00 interface of RouterB is unsuccessful What action should be taken on RouterA tosolve this problem
Use the description command on the FastEthernet interface Fa00
Configure the clock rate of the FastEthernet interface Fa00
Use the no shutdown command on the FastEthernet interface Fa00
Reboot the router
23
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 1230
Refer to the exhibit The tracert command is initiated from PC1 to PC4 Which device will send aresponse to the initial tracert packet from PC1
Athens
Ankara
London
Paris
PC4
24 Which physical component is used to access and perform the initial configuration on a newunconfigured router
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 1330
25 In a network design project a network designer needs to select a device to provide collision freeconnections to 40 hosts on the LAN Which device should be selected
hub
router
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 1430
switch
firewall
26
Refer to the exhibit Which option correctly identifies the network address range of host addressesand the broadcast address for the network that contains host A
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 1530
27
Refer to the exhibit A router the table of which is shown receives a packet that is destined for19216894 How will the router treat the packet
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 1630
It will drop the packet
It will forward the packet via FastEthernet 01
It will forward the packet to the next hop address
It will forward the packet to 1721620
28
Refer to the exhibit An administrator is trying to remotely modify the configuration of this switch byusing Telnet The management workstation is on the same subnet as the switch but the administratoris unable to access the switch from the workstation Based on the output that is provided what is the
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 1730
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 1830
80
wwwciscocom
1000130
100013080
30
Refer to the exhibit Host A attempts to establish a TCPIP session with host C During this attempt aframe was captured with the source MAC address 00507320D632 and the destination MAC address0030851744C4 The packet inside the captured frame has an IP source address 19216875 andthe destination IP address is 19216821924 At which point in the network was this packet captured
leaving host A
leaving ATL
leaving Dallas
leaving NYC
31 When connectionless protocols are implemented at the lower layers of the OSI model what is usuallyused to acknowledge that the data was received and to request the retransmission of missing data
IP
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 1930
UDP
Ethernet
a connectionless acknowledgement
an upper-layer connection-oriented protocol or service
32 Which device should be used for enabling a host to communicate with another host on a different
networkswitch
hub
router
host
33 To enhance security in a network the network administrator uses these commands
Router(config) line console 0
Router(config-line) password j1mdi2 Router(config-line) login
What two conclusions are evident from these commands (Choose two)
Users who attempt to connect to the console port of the router must enter a password
The entries permit access through the console by the use of j1mdi2 as the password
The entries eliminate the need for authentication
Access through the console will be denied because the console configuration is incomplete
The entries prevent passwords from being displayed as plain text
34 What happens when a host station receives a frame that contains its own MAC address in thedestination field
The Layer 2 information is removed and the frame is pushed up to Layer 3
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 2030
The host station will copy the information to its buffers and send it back out
The frame originated from the host and will be ignored
The Layer 3 information is added to the frame
35
Refer to the exhibit All devices in the network use default configurations How many broadcastdomains are there in this topology
3
5
7
911
36 What information can be gathered by using the command netstat
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 2130
the default gateway
the routing protocol
active TCP connections
the locally configured subnet mask
37
Refer to the exhibit A PC is connected to a network Which action will verify that the PC cancommunicate with its default gateway
Use the ping 127001 command
Use the ipconfig command
Use the ipconfigall command
Use the ping 1000254 command
38
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 2230
Refer to the exhibit A network administrator remotely accesses the CLI of RouterB from PC1 usingTelnet Which statement is true about this connection
The data is automatically encrypted
A Telnet server process is running on PC1
The connection is made through a VTY session on the router
A GET request was sent to RouterB to retrieve data during this session
39
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 2330
Refer to the exhibit Host C is able to ping 127001 successfully but is unable to communicate withhosts A and B in the organization What is the likely cause of the problem
Hosts A and B are not on the same subnet as host C
The IP addresses on the router serial interfaces are wrong
The subnet mask on host C is improperly configured
The FastEthernet interface fa00 of router 1 is wrongly configured
40 Which prompt represents the appropriate mode used for the copy running-config startup-config command
Switch-6Jgt
Switch-6J
Switch-6J(config)
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 2430
Switch-6J(config-if)
Switch-6J(config-line)
41 How can ARP be used to help document the network
It can list each hop on the way to a destination host
It can show the average latency of hosts on the network
It can provide a list of physical addresses on the networkIt can indicate which hosts are not responding to network traffic
42 What information is contained in the header of Layer 3 to help data delivery
port number
device physical address
destination host logical address
virtual connection identifier
43 Which router component will have contents erased when the command erase startup-config isissued
flash
RAM
ROM
NVRAM
44
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 2530
Refer to the exhibit When computer A sends a frame to computer D what computers receive theframe
only computer D
only computer A and computer D
only computer B computer C and computer D
all computers
45 Which option correctly identifies the interface or interfaces used to connect the router to a CSUDSUfor WAN connectivity
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 2630
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 2730
46
Refer to the exhibit A user wants to access the Internet from the PC A part of the runningconfiguration of the router is shown Which default gateway IP address should be configured at thePC to enable this access
1011921
1011922
10119254
1923171
47
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 2830
Refer to the exhibit Which Layer 2 protocol could be used inside nework A and network CIP
TCP
UDP
Ethernet
48 Which password is automatically encrypted when it is created
vty
auxconsole
enable secret
enable password
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 2930
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 3030
application
network access
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 830
Refer to the exhibit Which two layers of the OSI model describe the same functions as the transportand internet layers of the TCPIP model (Choose two)
application layer
presentation layer
session layer
transport layer
network layer
data link layer
physical layer
16 Which of the following are the address ranges of the private IP addresses (Choose three)
10000 to 10255255255
200100500 to 20010025255
15015000 to 150150255255
1721600 to 17231255255
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 930
19216800 to 192168255255
1271600 to 12731255255
17 Which statement is true about the CSMACD access method that is used in Ethernet
When a device hears a carrier signal and transmits a collision cannot occur
A jamming signal causes only devices that caused the collision to execute a backoff algorithm
All network devices must listen before transmitting
Devices involved in a collision get priority to transmit after the backoff period
18 What happens when a node on an Ethernet network is creating a frame and it does not have thedestination MAC address
The node drops the frame
The node sends out a Layer 3 broadcast message
The node sends a message directly to the router for the address
The node sends out an ARP request with the destination IP address
19
Refer to the exhibit Communication for hosts X and Y is restricted to the local network What is thereason for this
Host X is assigned a network address
Host Y is assigned a multicast address
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 1030
Host X and host Y belong to different networks
The gateway addresses are broadcast addresses
20 Which statement is true about the ICMP protocol
It is an application layer protocol
It is designed to make IP a reliable protocol
It is often filtered out of networks for security purposes
If a host does not respond to an ICMP echo request the host is not functioning
21
Refer to the exhibit A host is connected to hub 1 Which combination of IP address subnet mask anddefault gateway can allow this host to function in the network
IP address 172163136 Subnet mask 255255255240 Default gateway 172163135
IP address 172163163 Subnet mask 255255255224 Default gateway 172163135
IP address 172163129 Subnet mask 255255255248 Default gateway 172163135
IP address 172163132 Subnet mask 255255255224 Default gateway 172163135
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 1130
IP address 172163129 Subnet mask 255255255240 Default gateway 17216301
IP address 172163137 Subnet mask 255255255224 Default gateway 172163135
22
Refer to the exhibit RouterB is configured properly The Ethernet interface Fa00 of RouterA isconfigured with the use of the commands that are shown However a ping from the Fa00 interface of
RouterA to the Fa00 interface of RouterB is unsuccessful What action should be taken on RouterA tosolve this problem
Use the description command on the FastEthernet interface Fa00
Configure the clock rate of the FastEthernet interface Fa00
Use the no shutdown command on the FastEthernet interface Fa00
Reboot the router
23
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 1230
Refer to the exhibit The tracert command is initiated from PC1 to PC4 Which device will send aresponse to the initial tracert packet from PC1
Athens
Ankara
London
Paris
PC4
24 Which physical component is used to access and perform the initial configuration on a newunconfigured router
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 1330
25 In a network design project a network designer needs to select a device to provide collision freeconnections to 40 hosts on the LAN Which device should be selected
hub
router
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 1430
switch
firewall
26
Refer to the exhibit Which option correctly identifies the network address range of host addressesand the broadcast address for the network that contains host A
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 1530
27
Refer to the exhibit A router the table of which is shown receives a packet that is destined for19216894 How will the router treat the packet
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 1630
It will drop the packet
It will forward the packet via FastEthernet 01
It will forward the packet to the next hop address
It will forward the packet to 1721620
28
Refer to the exhibit An administrator is trying to remotely modify the configuration of this switch byusing Telnet The management workstation is on the same subnet as the switch but the administratoris unable to access the switch from the workstation Based on the output that is provided what is the
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 1730
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 1830
80
wwwciscocom
1000130
100013080
30
Refer to the exhibit Host A attempts to establish a TCPIP session with host C During this attempt aframe was captured with the source MAC address 00507320D632 and the destination MAC address0030851744C4 The packet inside the captured frame has an IP source address 19216875 andthe destination IP address is 19216821924 At which point in the network was this packet captured
leaving host A
leaving ATL
leaving Dallas
leaving NYC
31 When connectionless protocols are implemented at the lower layers of the OSI model what is usuallyused to acknowledge that the data was received and to request the retransmission of missing data
IP
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 1930
UDP
Ethernet
a connectionless acknowledgement
an upper-layer connection-oriented protocol or service
32 Which device should be used for enabling a host to communicate with another host on a different
networkswitch
hub
router
host
33 To enhance security in a network the network administrator uses these commands
Router(config) line console 0
Router(config-line) password j1mdi2 Router(config-line) login
What two conclusions are evident from these commands (Choose two)
Users who attempt to connect to the console port of the router must enter a password
The entries permit access through the console by the use of j1mdi2 as the password
The entries eliminate the need for authentication
Access through the console will be denied because the console configuration is incomplete
The entries prevent passwords from being displayed as plain text
34 What happens when a host station receives a frame that contains its own MAC address in thedestination field
The Layer 2 information is removed and the frame is pushed up to Layer 3
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 2030
The host station will copy the information to its buffers and send it back out
The frame originated from the host and will be ignored
The Layer 3 information is added to the frame
35
Refer to the exhibit All devices in the network use default configurations How many broadcastdomains are there in this topology
3
5
7
911
36 What information can be gathered by using the command netstat
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 2130
the default gateway
the routing protocol
active TCP connections
the locally configured subnet mask
37
Refer to the exhibit A PC is connected to a network Which action will verify that the PC cancommunicate with its default gateway
Use the ping 127001 command
Use the ipconfig command
Use the ipconfigall command
Use the ping 1000254 command
38
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 2230
Refer to the exhibit A network administrator remotely accesses the CLI of RouterB from PC1 usingTelnet Which statement is true about this connection
The data is automatically encrypted
A Telnet server process is running on PC1
The connection is made through a VTY session on the router
A GET request was sent to RouterB to retrieve data during this session
39
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 2330
Refer to the exhibit Host C is able to ping 127001 successfully but is unable to communicate withhosts A and B in the organization What is the likely cause of the problem
Hosts A and B are not on the same subnet as host C
The IP addresses on the router serial interfaces are wrong
The subnet mask on host C is improperly configured
The FastEthernet interface fa00 of router 1 is wrongly configured
40 Which prompt represents the appropriate mode used for the copy running-config startup-config command
Switch-6Jgt
Switch-6J
Switch-6J(config)
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 2430
Switch-6J(config-if)
Switch-6J(config-line)
41 How can ARP be used to help document the network
It can list each hop on the way to a destination host
It can show the average latency of hosts on the network
It can provide a list of physical addresses on the networkIt can indicate which hosts are not responding to network traffic
42 What information is contained in the header of Layer 3 to help data delivery
port number
device physical address
destination host logical address
virtual connection identifier
43 Which router component will have contents erased when the command erase startup-config isissued
flash
RAM
ROM
NVRAM
44
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 2530
Refer to the exhibit When computer A sends a frame to computer D what computers receive theframe
only computer D
only computer A and computer D
only computer B computer C and computer D
all computers
45 Which option correctly identifies the interface or interfaces used to connect the router to a CSUDSUfor WAN connectivity
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 2630
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 2730
46
Refer to the exhibit A user wants to access the Internet from the PC A part of the runningconfiguration of the router is shown Which default gateway IP address should be configured at thePC to enable this access
1011921
1011922
10119254
1923171
47
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 2830
Refer to the exhibit Which Layer 2 protocol could be used inside nework A and network CIP
TCP
UDP
Ethernet
48 Which password is automatically encrypted when it is created
vty
auxconsole
enable secret
enable password
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 2930
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 3030
application
network access
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 930
19216800 to 192168255255
1271600 to 12731255255
17 Which statement is true about the CSMACD access method that is used in Ethernet
When a device hears a carrier signal and transmits a collision cannot occur
A jamming signal causes only devices that caused the collision to execute a backoff algorithm
All network devices must listen before transmitting
Devices involved in a collision get priority to transmit after the backoff period
18 What happens when a node on an Ethernet network is creating a frame and it does not have thedestination MAC address
The node drops the frame
The node sends out a Layer 3 broadcast message
The node sends a message directly to the router for the address
The node sends out an ARP request with the destination IP address
19
Refer to the exhibit Communication for hosts X and Y is restricted to the local network What is thereason for this
Host X is assigned a network address
Host Y is assigned a multicast address
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 1030
Host X and host Y belong to different networks
The gateway addresses are broadcast addresses
20 Which statement is true about the ICMP protocol
It is an application layer protocol
It is designed to make IP a reliable protocol
It is often filtered out of networks for security purposes
If a host does not respond to an ICMP echo request the host is not functioning
21
Refer to the exhibit A host is connected to hub 1 Which combination of IP address subnet mask anddefault gateway can allow this host to function in the network
IP address 172163136 Subnet mask 255255255240 Default gateway 172163135
IP address 172163163 Subnet mask 255255255224 Default gateway 172163135
IP address 172163129 Subnet mask 255255255248 Default gateway 172163135
IP address 172163132 Subnet mask 255255255224 Default gateway 172163135
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 1130
IP address 172163129 Subnet mask 255255255240 Default gateway 17216301
IP address 172163137 Subnet mask 255255255224 Default gateway 172163135
22
Refer to the exhibit RouterB is configured properly The Ethernet interface Fa00 of RouterA isconfigured with the use of the commands that are shown However a ping from the Fa00 interface of
RouterA to the Fa00 interface of RouterB is unsuccessful What action should be taken on RouterA tosolve this problem
Use the description command on the FastEthernet interface Fa00
Configure the clock rate of the FastEthernet interface Fa00
Use the no shutdown command on the FastEthernet interface Fa00
Reboot the router
23
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 1230
Refer to the exhibit The tracert command is initiated from PC1 to PC4 Which device will send aresponse to the initial tracert packet from PC1
Athens
Ankara
London
Paris
PC4
24 Which physical component is used to access and perform the initial configuration on a newunconfigured router
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 1330
25 In a network design project a network designer needs to select a device to provide collision freeconnections to 40 hosts on the LAN Which device should be selected
hub
router
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 1430
switch
firewall
26
Refer to the exhibit Which option correctly identifies the network address range of host addressesand the broadcast address for the network that contains host A
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 1530
27
Refer to the exhibit A router the table of which is shown receives a packet that is destined for19216894 How will the router treat the packet
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 1630
It will drop the packet
It will forward the packet via FastEthernet 01
It will forward the packet to the next hop address
It will forward the packet to 1721620
28
Refer to the exhibit An administrator is trying to remotely modify the configuration of this switch byusing Telnet The management workstation is on the same subnet as the switch but the administratoris unable to access the switch from the workstation Based on the output that is provided what is the
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 1730
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 1830
80
wwwciscocom
1000130
100013080
30
Refer to the exhibit Host A attempts to establish a TCPIP session with host C During this attempt aframe was captured with the source MAC address 00507320D632 and the destination MAC address0030851744C4 The packet inside the captured frame has an IP source address 19216875 andthe destination IP address is 19216821924 At which point in the network was this packet captured
leaving host A
leaving ATL
leaving Dallas
leaving NYC
31 When connectionless protocols are implemented at the lower layers of the OSI model what is usuallyused to acknowledge that the data was received and to request the retransmission of missing data
IP
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 1930
UDP
Ethernet
a connectionless acknowledgement
an upper-layer connection-oriented protocol or service
32 Which device should be used for enabling a host to communicate with another host on a different
networkswitch
hub
router
host
33 To enhance security in a network the network administrator uses these commands
Router(config) line console 0
Router(config-line) password j1mdi2 Router(config-line) login
What two conclusions are evident from these commands (Choose two)
Users who attempt to connect to the console port of the router must enter a password
The entries permit access through the console by the use of j1mdi2 as the password
The entries eliminate the need for authentication
Access through the console will be denied because the console configuration is incomplete
The entries prevent passwords from being displayed as plain text
34 What happens when a host station receives a frame that contains its own MAC address in thedestination field
The Layer 2 information is removed and the frame is pushed up to Layer 3
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 2030
The host station will copy the information to its buffers and send it back out
The frame originated from the host and will be ignored
The Layer 3 information is added to the frame
35
Refer to the exhibit All devices in the network use default configurations How many broadcastdomains are there in this topology
3
5
7
911
36 What information can be gathered by using the command netstat
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 2130
the default gateway
the routing protocol
active TCP connections
the locally configured subnet mask
37
Refer to the exhibit A PC is connected to a network Which action will verify that the PC cancommunicate with its default gateway
Use the ping 127001 command
Use the ipconfig command
Use the ipconfigall command
Use the ping 1000254 command
38
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 2230
Refer to the exhibit A network administrator remotely accesses the CLI of RouterB from PC1 usingTelnet Which statement is true about this connection
The data is automatically encrypted
A Telnet server process is running on PC1
The connection is made through a VTY session on the router
A GET request was sent to RouterB to retrieve data during this session
39
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 2330
Refer to the exhibit Host C is able to ping 127001 successfully but is unable to communicate withhosts A and B in the organization What is the likely cause of the problem
Hosts A and B are not on the same subnet as host C
The IP addresses on the router serial interfaces are wrong
The subnet mask on host C is improperly configured
The FastEthernet interface fa00 of router 1 is wrongly configured
40 Which prompt represents the appropriate mode used for the copy running-config startup-config command
Switch-6Jgt
Switch-6J
Switch-6J(config)
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 2430
Switch-6J(config-if)
Switch-6J(config-line)
41 How can ARP be used to help document the network
It can list each hop on the way to a destination host
It can show the average latency of hosts on the network
It can provide a list of physical addresses on the networkIt can indicate which hosts are not responding to network traffic
42 What information is contained in the header of Layer 3 to help data delivery
port number
device physical address
destination host logical address
virtual connection identifier
43 Which router component will have contents erased when the command erase startup-config isissued
flash
RAM
ROM
NVRAM
44
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 2530
Refer to the exhibit When computer A sends a frame to computer D what computers receive theframe
only computer D
only computer A and computer D
only computer B computer C and computer D
all computers
45 Which option correctly identifies the interface or interfaces used to connect the router to a CSUDSUfor WAN connectivity
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 2630
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 2730
46
Refer to the exhibit A user wants to access the Internet from the PC A part of the runningconfiguration of the router is shown Which default gateway IP address should be configured at thePC to enable this access
1011921
1011922
10119254
1923171
47
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 2830
Refer to the exhibit Which Layer 2 protocol could be used inside nework A and network CIP
TCP
UDP
Ethernet
48 Which password is automatically encrypted when it is created
vty
auxconsole
enable secret
enable password
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 2930
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 3030
application
network access
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 1030
Host X and host Y belong to different networks
The gateway addresses are broadcast addresses
20 Which statement is true about the ICMP protocol
It is an application layer protocol
It is designed to make IP a reliable protocol
It is often filtered out of networks for security purposes
If a host does not respond to an ICMP echo request the host is not functioning
21
Refer to the exhibit A host is connected to hub 1 Which combination of IP address subnet mask anddefault gateway can allow this host to function in the network
IP address 172163136 Subnet mask 255255255240 Default gateway 172163135
IP address 172163163 Subnet mask 255255255224 Default gateway 172163135
IP address 172163129 Subnet mask 255255255248 Default gateway 172163135
IP address 172163132 Subnet mask 255255255224 Default gateway 172163135
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 1130
IP address 172163129 Subnet mask 255255255240 Default gateway 17216301
IP address 172163137 Subnet mask 255255255224 Default gateway 172163135
22
Refer to the exhibit RouterB is configured properly The Ethernet interface Fa00 of RouterA isconfigured with the use of the commands that are shown However a ping from the Fa00 interface of
RouterA to the Fa00 interface of RouterB is unsuccessful What action should be taken on RouterA tosolve this problem
Use the description command on the FastEthernet interface Fa00
Configure the clock rate of the FastEthernet interface Fa00
Use the no shutdown command on the FastEthernet interface Fa00
Reboot the router
23
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 1230
Refer to the exhibit The tracert command is initiated from PC1 to PC4 Which device will send aresponse to the initial tracert packet from PC1
Athens
Ankara
London
Paris
PC4
24 Which physical component is used to access and perform the initial configuration on a newunconfigured router
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 1330
25 In a network design project a network designer needs to select a device to provide collision freeconnections to 40 hosts on the LAN Which device should be selected
hub
router
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 1430
switch
firewall
26
Refer to the exhibit Which option correctly identifies the network address range of host addressesand the broadcast address for the network that contains host A
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 1530
27
Refer to the exhibit A router the table of which is shown receives a packet that is destined for19216894 How will the router treat the packet
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 1630
It will drop the packet
It will forward the packet via FastEthernet 01
It will forward the packet to the next hop address
It will forward the packet to 1721620
28
Refer to the exhibit An administrator is trying to remotely modify the configuration of this switch byusing Telnet The management workstation is on the same subnet as the switch but the administratoris unable to access the switch from the workstation Based on the output that is provided what is the
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 1730
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 1830
80
wwwciscocom
1000130
100013080
30
Refer to the exhibit Host A attempts to establish a TCPIP session with host C During this attempt aframe was captured with the source MAC address 00507320D632 and the destination MAC address0030851744C4 The packet inside the captured frame has an IP source address 19216875 andthe destination IP address is 19216821924 At which point in the network was this packet captured
leaving host A
leaving ATL
leaving Dallas
leaving NYC
31 When connectionless protocols are implemented at the lower layers of the OSI model what is usuallyused to acknowledge that the data was received and to request the retransmission of missing data
IP
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 1930
UDP
Ethernet
a connectionless acknowledgement
an upper-layer connection-oriented protocol or service
32 Which device should be used for enabling a host to communicate with another host on a different
networkswitch
hub
router
host
33 To enhance security in a network the network administrator uses these commands
Router(config) line console 0
Router(config-line) password j1mdi2 Router(config-line) login
What two conclusions are evident from these commands (Choose two)
Users who attempt to connect to the console port of the router must enter a password
The entries permit access through the console by the use of j1mdi2 as the password
The entries eliminate the need for authentication
Access through the console will be denied because the console configuration is incomplete
The entries prevent passwords from being displayed as plain text
34 What happens when a host station receives a frame that contains its own MAC address in thedestination field
The Layer 2 information is removed and the frame is pushed up to Layer 3
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 2030
The host station will copy the information to its buffers and send it back out
The frame originated from the host and will be ignored
The Layer 3 information is added to the frame
35
Refer to the exhibit All devices in the network use default configurations How many broadcastdomains are there in this topology
3
5
7
911
36 What information can be gathered by using the command netstat
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 2130
the default gateway
the routing protocol
active TCP connections
the locally configured subnet mask
37
Refer to the exhibit A PC is connected to a network Which action will verify that the PC cancommunicate with its default gateway
Use the ping 127001 command
Use the ipconfig command
Use the ipconfigall command
Use the ping 1000254 command
38
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 2230
Refer to the exhibit A network administrator remotely accesses the CLI of RouterB from PC1 usingTelnet Which statement is true about this connection
The data is automatically encrypted
A Telnet server process is running on PC1
The connection is made through a VTY session on the router
A GET request was sent to RouterB to retrieve data during this session
39
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 2330
Refer to the exhibit Host C is able to ping 127001 successfully but is unable to communicate withhosts A and B in the organization What is the likely cause of the problem
Hosts A and B are not on the same subnet as host C
The IP addresses on the router serial interfaces are wrong
The subnet mask on host C is improperly configured
The FastEthernet interface fa00 of router 1 is wrongly configured
40 Which prompt represents the appropriate mode used for the copy running-config startup-config command
Switch-6Jgt
Switch-6J
Switch-6J(config)
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 2430
Switch-6J(config-if)
Switch-6J(config-line)
41 How can ARP be used to help document the network
It can list each hop on the way to a destination host
It can show the average latency of hosts on the network
It can provide a list of physical addresses on the networkIt can indicate which hosts are not responding to network traffic
42 What information is contained in the header of Layer 3 to help data delivery
port number
device physical address
destination host logical address
virtual connection identifier
43 Which router component will have contents erased when the command erase startup-config isissued
flash
RAM
ROM
NVRAM
44
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 2530
Refer to the exhibit When computer A sends a frame to computer D what computers receive theframe
only computer D
only computer A and computer D
only computer B computer C and computer D
all computers
45 Which option correctly identifies the interface or interfaces used to connect the router to a CSUDSUfor WAN connectivity
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 2630
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 2730
46
Refer to the exhibit A user wants to access the Internet from the PC A part of the runningconfiguration of the router is shown Which default gateway IP address should be configured at thePC to enable this access
1011921
1011922
10119254
1923171
47
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 2830
Refer to the exhibit Which Layer 2 protocol could be used inside nework A and network CIP
TCP
UDP
Ethernet
48 Which password is automatically encrypted when it is created
vty
auxconsole
enable secret
enable password
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 2930
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 3030
application
network access
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 1130
IP address 172163129 Subnet mask 255255255240 Default gateway 17216301
IP address 172163137 Subnet mask 255255255224 Default gateway 172163135
22
Refer to the exhibit RouterB is configured properly The Ethernet interface Fa00 of RouterA isconfigured with the use of the commands that are shown However a ping from the Fa00 interface of
RouterA to the Fa00 interface of RouterB is unsuccessful What action should be taken on RouterA tosolve this problem
Use the description command on the FastEthernet interface Fa00
Configure the clock rate of the FastEthernet interface Fa00
Use the no shutdown command on the FastEthernet interface Fa00
Reboot the router
23
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 1230
Refer to the exhibit The tracert command is initiated from PC1 to PC4 Which device will send aresponse to the initial tracert packet from PC1
Athens
Ankara
London
Paris
PC4
24 Which physical component is used to access and perform the initial configuration on a newunconfigured router
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 1330
25 In a network design project a network designer needs to select a device to provide collision freeconnections to 40 hosts on the LAN Which device should be selected
hub
router
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 1430
switch
firewall
26
Refer to the exhibit Which option correctly identifies the network address range of host addressesand the broadcast address for the network that contains host A
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 1530
27
Refer to the exhibit A router the table of which is shown receives a packet that is destined for19216894 How will the router treat the packet
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 1630
It will drop the packet
It will forward the packet via FastEthernet 01
It will forward the packet to the next hop address
It will forward the packet to 1721620
28
Refer to the exhibit An administrator is trying to remotely modify the configuration of this switch byusing Telnet The management workstation is on the same subnet as the switch but the administratoris unable to access the switch from the workstation Based on the output that is provided what is the
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 1730
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 1830
80
wwwciscocom
1000130
100013080
30
Refer to the exhibit Host A attempts to establish a TCPIP session with host C During this attempt aframe was captured with the source MAC address 00507320D632 and the destination MAC address0030851744C4 The packet inside the captured frame has an IP source address 19216875 andthe destination IP address is 19216821924 At which point in the network was this packet captured
leaving host A
leaving ATL
leaving Dallas
leaving NYC
31 When connectionless protocols are implemented at the lower layers of the OSI model what is usuallyused to acknowledge that the data was received and to request the retransmission of missing data
IP
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 1930
UDP
Ethernet
a connectionless acknowledgement
an upper-layer connection-oriented protocol or service
32 Which device should be used for enabling a host to communicate with another host on a different
networkswitch
hub
router
host
33 To enhance security in a network the network administrator uses these commands
Router(config) line console 0
Router(config-line) password j1mdi2 Router(config-line) login
What two conclusions are evident from these commands (Choose two)
Users who attempt to connect to the console port of the router must enter a password
The entries permit access through the console by the use of j1mdi2 as the password
The entries eliminate the need for authentication
Access through the console will be denied because the console configuration is incomplete
The entries prevent passwords from being displayed as plain text
34 What happens when a host station receives a frame that contains its own MAC address in thedestination field
The Layer 2 information is removed and the frame is pushed up to Layer 3
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 2030
The host station will copy the information to its buffers and send it back out
The frame originated from the host and will be ignored
The Layer 3 information is added to the frame
35
Refer to the exhibit All devices in the network use default configurations How many broadcastdomains are there in this topology
3
5
7
911
36 What information can be gathered by using the command netstat
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 2130
the default gateway
the routing protocol
active TCP connections
the locally configured subnet mask
37
Refer to the exhibit A PC is connected to a network Which action will verify that the PC cancommunicate with its default gateway
Use the ping 127001 command
Use the ipconfig command
Use the ipconfigall command
Use the ping 1000254 command
38
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 2230
Refer to the exhibit A network administrator remotely accesses the CLI of RouterB from PC1 usingTelnet Which statement is true about this connection
The data is automatically encrypted
A Telnet server process is running on PC1
The connection is made through a VTY session on the router
A GET request was sent to RouterB to retrieve data during this session
39
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 2330
Refer to the exhibit Host C is able to ping 127001 successfully but is unable to communicate withhosts A and B in the organization What is the likely cause of the problem
Hosts A and B are not on the same subnet as host C
The IP addresses on the router serial interfaces are wrong
The subnet mask on host C is improperly configured
The FastEthernet interface fa00 of router 1 is wrongly configured
40 Which prompt represents the appropriate mode used for the copy running-config startup-config command
Switch-6Jgt
Switch-6J
Switch-6J(config)
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 2430
Switch-6J(config-if)
Switch-6J(config-line)
41 How can ARP be used to help document the network
It can list each hop on the way to a destination host
It can show the average latency of hosts on the network
It can provide a list of physical addresses on the networkIt can indicate which hosts are not responding to network traffic
42 What information is contained in the header of Layer 3 to help data delivery
port number
device physical address
destination host logical address
virtual connection identifier
43 Which router component will have contents erased when the command erase startup-config isissued
flash
RAM
ROM
NVRAM
44
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 2530
Refer to the exhibit When computer A sends a frame to computer D what computers receive theframe
only computer D
only computer A and computer D
only computer B computer C and computer D
all computers
45 Which option correctly identifies the interface or interfaces used to connect the router to a CSUDSUfor WAN connectivity
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 2630
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 2730
46
Refer to the exhibit A user wants to access the Internet from the PC A part of the runningconfiguration of the router is shown Which default gateway IP address should be configured at thePC to enable this access
1011921
1011922
10119254
1923171
47
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 2830
Refer to the exhibit Which Layer 2 protocol could be used inside nework A and network CIP
TCP
UDP
Ethernet
48 Which password is automatically encrypted when it is created
vty
auxconsole
enable secret
enable password
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 2930
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 3030
application
network access
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 1230
Refer to the exhibit The tracert command is initiated from PC1 to PC4 Which device will send aresponse to the initial tracert packet from PC1
Athens
Ankara
London
Paris
PC4
24 Which physical component is used to access and perform the initial configuration on a newunconfigured router
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 1330
25 In a network design project a network designer needs to select a device to provide collision freeconnections to 40 hosts on the LAN Which device should be selected
hub
router
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 1430
switch
firewall
26
Refer to the exhibit Which option correctly identifies the network address range of host addressesand the broadcast address for the network that contains host A
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 1530
27
Refer to the exhibit A router the table of which is shown receives a packet that is destined for19216894 How will the router treat the packet
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 1630
It will drop the packet
It will forward the packet via FastEthernet 01
It will forward the packet to the next hop address
It will forward the packet to 1721620
28
Refer to the exhibit An administrator is trying to remotely modify the configuration of this switch byusing Telnet The management workstation is on the same subnet as the switch but the administratoris unable to access the switch from the workstation Based on the output that is provided what is the
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 1730
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 1830
80
wwwciscocom
1000130
100013080
30
Refer to the exhibit Host A attempts to establish a TCPIP session with host C During this attempt aframe was captured with the source MAC address 00507320D632 and the destination MAC address0030851744C4 The packet inside the captured frame has an IP source address 19216875 andthe destination IP address is 19216821924 At which point in the network was this packet captured
leaving host A
leaving ATL
leaving Dallas
leaving NYC
31 When connectionless protocols are implemented at the lower layers of the OSI model what is usuallyused to acknowledge that the data was received and to request the retransmission of missing data
IP
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 1930
UDP
Ethernet
a connectionless acknowledgement
an upper-layer connection-oriented protocol or service
32 Which device should be used for enabling a host to communicate with another host on a different
networkswitch
hub
router
host
33 To enhance security in a network the network administrator uses these commands
Router(config) line console 0
Router(config-line) password j1mdi2 Router(config-line) login
What two conclusions are evident from these commands (Choose two)
Users who attempt to connect to the console port of the router must enter a password
The entries permit access through the console by the use of j1mdi2 as the password
The entries eliminate the need for authentication
Access through the console will be denied because the console configuration is incomplete
The entries prevent passwords from being displayed as plain text
34 What happens when a host station receives a frame that contains its own MAC address in thedestination field
The Layer 2 information is removed and the frame is pushed up to Layer 3
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 2030
The host station will copy the information to its buffers and send it back out
The frame originated from the host and will be ignored
The Layer 3 information is added to the frame
35
Refer to the exhibit All devices in the network use default configurations How many broadcastdomains are there in this topology
3
5
7
911
36 What information can be gathered by using the command netstat
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 2130
the default gateway
the routing protocol
active TCP connections
the locally configured subnet mask
37
Refer to the exhibit A PC is connected to a network Which action will verify that the PC cancommunicate with its default gateway
Use the ping 127001 command
Use the ipconfig command
Use the ipconfigall command
Use the ping 1000254 command
38
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 2230
Refer to the exhibit A network administrator remotely accesses the CLI of RouterB from PC1 usingTelnet Which statement is true about this connection
The data is automatically encrypted
A Telnet server process is running on PC1
The connection is made through a VTY session on the router
A GET request was sent to RouterB to retrieve data during this session
39
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 2330
Refer to the exhibit Host C is able to ping 127001 successfully but is unable to communicate withhosts A and B in the organization What is the likely cause of the problem
Hosts A and B are not on the same subnet as host C
The IP addresses on the router serial interfaces are wrong
The subnet mask on host C is improperly configured
The FastEthernet interface fa00 of router 1 is wrongly configured
40 Which prompt represents the appropriate mode used for the copy running-config startup-config command
Switch-6Jgt
Switch-6J
Switch-6J(config)
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 2430
Switch-6J(config-if)
Switch-6J(config-line)
41 How can ARP be used to help document the network
It can list each hop on the way to a destination host
It can show the average latency of hosts on the network
It can provide a list of physical addresses on the networkIt can indicate which hosts are not responding to network traffic
42 What information is contained in the header of Layer 3 to help data delivery
port number
device physical address
destination host logical address
virtual connection identifier
43 Which router component will have contents erased when the command erase startup-config isissued
flash
RAM
ROM
NVRAM
44
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 2530
Refer to the exhibit When computer A sends a frame to computer D what computers receive theframe
only computer D
only computer A and computer D
only computer B computer C and computer D
all computers
45 Which option correctly identifies the interface or interfaces used to connect the router to a CSUDSUfor WAN connectivity
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 2630
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 2730
46
Refer to the exhibit A user wants to access the Internet from the PC A part of the runningconfiguration of the router is shown Which default gateway IP address should be configured at thePC to enable this access
1011921
1011922
10119254
1923171
47
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 2830
Refer to the exhibit Which Layer 2 protocol could be used inside nework A and network CIP
TCP
UDP
Ethernet
48 Which password is automatically encrypted when it is created
vty
auxconsole
enable secret
enable password
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 2930
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 3030
application
network access
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 1330
25 In a network design project a network designer needs to select a device to provide collision freeconnections to 40 hosts on the LAN Which device should be selected
hub
router
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 1430
switch
firewall
26
Refer to the exhibit Which option correctly identifies the network address range of host addressesand the broadcast address for the network that contains host A
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 1530
27
Refer to the exhibit A router the table of which is shown receives a packet that is destined for19216894 How will the router treat the packet
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 1630
It will drop the packet
It will forward the packet via FastEthernet 01
It will forward the packet to the next hop address
It will forward the packet to 1721620
28
Refer to the exhibit An administrator is trying to remotely modify the configuration of this switch byusing Telnet The management workstation is on the same subnet as the switch but the administratoris unable to access the switch from the workstation Based on the output that is provided what is the
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 1730
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 1830
80
wwwciscocom
1000130
100013080
30
Refer to the exhibit Host A attempts to establish a TCPIP session with host C During this attempt aframe was captured with the source MAC address 00507320D632 and the destination MAC address0030851744C4 The packet inside the captured frame has an IP source address 19216875 andthe destination IP address is 19216821924 At which point in the network was this packet captured
leaving host A
leaving ATL
leaving Dallas
leaving NYC
31 When connectionless protocols are implemented at the lower layers of the OSI model what is usuallyused to acknowledge that the data was received and to request the retransmission of missing data
IP
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 1930
UDP
Ethernet
a connectionless acknowledgement
an upper-layer connection-oriented protocol or service
32 Which device should be used for enabling a host to communicate with another host on a different
networkswitch
hub
router
host
33 To enhance security in a network the network administrator uses these commands
Router(config) line console 0
Router(config-line) password j1mdi2 Router(config-line) login
What two conclusions are evident from these commands (Choose two)
Users who attempt to connect to the console port of the router must enter a password
The entries permit access through the console by the use of j1mdi2 as the password
The entries eliminate the need for authentication
Access through the console will be denied because the console configuration is incomplete
The entries prevent passwords from being displayed as plain text
34 What happens when a host station receives a frame that contains its own MAC address in thedestination field
The Layer 2 information is removed and the frame is pushed up to Layer 3
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 2030
The host station will copy the information to its buffers and send it back out
The frame originated from the host and will be ignored
The Layer 3 information is added to the frame
35
Refer to the exhibit All devices in the network use default configurations How many broadcastdomains are there in this topology
3
5
7
911
36 What information can be gathered by using the command netstat
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 2130
the default gateway
the routing protocol
active TCP connections
the locally configured subnet mask
37
Refer to the exhibit A PC is connected to a network Which action will verify that the PC cancommunicate with its default gateway
Use the ping 127001 command
Use the ipconfig command
Use the ipconfigall command
Use the ping 1000254 command
38
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 2230
Refer to the exhibit A network administrator remotely accesses the CLI of RouterB from PC1 usingTelnet Which statement is true about this connection
The data is automatically encrypted
A Telnet server process is running on PC1
The connection is made through a VTY session on the router
A GET request was sent to RouterB to retrieve data during this session
39
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 2330
Refer to the exhibit Host C is able to ping 127001 successfully but is unable to communicate withhosts A and B in the organization What is the likely cause of the problem
Hosts A and B are not on the same subnet as host C
The IP addresses on the router serial interfaces are wrong
The subnet mask on host C is improperly configured
The FastEthernet interface fa00 of router 1 is wrongly configured
40 Which prompt represents the appropriate mode used for the copy running-config startup-config command
Switch-6Jgt
Switch-6J
Switch-6J(config)
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 2430
Switch-6J(config-if)
Switch-6J(config-line)
41 How can ARP be used to help document the network
It can list each hop on the way to a destination host
It can show the average latency of hosts on the network
It can provide a list of physical addresses on the networkIt can indicate which hosts are not responding to network traffic
42 What information is contained in the header of Layer 3 to help data delivery
port number
device physical address
destination host logical address
virtual connection identifier
43 Which router component will have contents erased when the command erase startup-config isissued
flash
RAM
ROM
NVRAM
44
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 2530
Refer to the exhibit When computer A sends a frame to computer D what computers receive theframe
only computer D
only computer A and computer D
only computer B computer C and computer D
all computers
45 Which option correctly identifies the interface or interfaces used to connect the router to a CSUDSUfor WAN connectivity
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 2630
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 2730
46
Refer to the exhibit A user wants to access the Internet from the PC A part of the runningconfiguration of the router is shown Which default gateway IP address should be configured at thePC to enable this access
1011921
1011922
10119254
1923171
47
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 2830
Refer to the exhibit Which Layer 2 protocol could be used inside nework A and network CIP
TCP
UDP
Ethernet
48 Which password is automatically encrypted when it is created
vty
auxconsole
enable secret
enable password
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 2930
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 3030
application
network access
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 1430
switch
firewall
26
Refer to the exhibit Which option correctly identifies the network address range of host addressesand the broadcast address for the network that contains host A
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 1530
27
Refer to the exhibit A router the table of which is shown receives a packet that is destined for19216894 How will the router treat the packet
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 1630
It will drop the packet
It will forward the packet via FastEthernet 01
It will forward the packet to the next hop address
It will forward the packet to 1721620
28
Refer to the exhibit An administrator is trying to remotely modify the configuration of this switch byusing Telnet The management workstation is on the same subnet as the switch but the administratoris unable to access the switch from the workstation Based on the output that is provided what is the
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 1730
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 1830
80
wwwciscocom
1000130
100013080
30
Refer to the exhibit Host A attempts to establish a TCPIP session with host C During this attempt aframe was captured with the source MAC address 00507320D632 and the destination MAC address0030851744C4 The packet inside the captured frame has an IP source address 19216875 andthe destination IP address is 19216821924 At which point in the network was this packet captured
leaving host A
leaving ATL
leaving Dallas
leaving NYC
31 When connectionless protocols are implemented at the lower layers of the OSI model what is usuallyused to acknowledge that the data was received and to request the retransmission of missing data
IP
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 1930
UDP
Ethernet
a connectionless acknowledgement
an upper-layer connection-oriented protocol or service
32 Which device should be used for enabling a host to communicate with another host on a different
networkswitch
hub
router
host
33 To enhance security in a network the network administrator uses these commands
Router(config) line console 0
Router(config-line) password j1mdi2 Router(config-line) login
What two conclusions are evident from these commands (Choose two)
Users who attempt to connect to the console port of the router must enter a password
The entries permit access through the console by the use of j1mdi2 as the password
The entries eliminate the need for authentication
Access through the console will be denied because the console configuration is incomplete
The entries prevent passwords from being displayed as plain text
34 What happens when a host station receives a frame that contains its own MAC address in thedestination field
The Layer 2 information is removed and the frame is pushed up to Layer 3
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 2030
The host station will copy the information to its buffers and send it back out
The frame originated from the host and will be ignored
The Layer 3 information is added to the frame
35
Refer to the exhibit All devices in the network use default configurations How many broadcastdomains are there in this topology
3
5
7
911
36 What information can be gathered by using the command netstat
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 2130
the default gateway
the routing protocol
active TCP connections
the locally configured subnet mask
37
Refer to the exhibit A PC is connected to a network Which action will verify that the PC cancommunicate with its default gateway
Use the ping 127001 command
Use the ipconfig command
Use the ipconfigall command
Use the ping 1000254 command
38
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 2230
Refer to the exhibit A network administrator remotely accesses the CLI of RouterB from PC1 usingTelnet Which statement is true about this connection
The data is automatically encrypted
A Telnet server process is running on PC1
The connection is made through a VTY session on the router
A GET request was sent to RouterB to retrieve data during this session
39
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 2330
Refer to the exhibit Host C is able to ping 127001 successfully but is unable to communicate withhosts A and B in the organization What is the likely cause of the problem
Hosts A and B are not on the same subnet as host C
The IP addresses on the router serial interfaces are wrong
The subnet mask on host C is improperly configured
The FastEthernet interface fa00 of router 1 is wrongly configured
40 Which prompt represents the appropriate mode used for the copy running-config startup-config command
Switch-6Jgt
Switch-6J
Switch-6J(config)
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 2430
Switch-6J(config-if)
Switch-6J(config-line)
41 How can ARP be used to help document the network
It can list each hop on the way to a destination host
It can show the average latency of hosts on the network
It can provide a list of physical addresses on the networkIt can indicate which hosts are not responding to network traffic
42 What information is contained in the header of Layer 3 to help data delivery
port number
device physical address
destination host logical address
virtual connection identifier
43 Which router component will have contents erased when the command erase startup-config isissued
flash
RAM
ROM
NVRAM
44
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 2530
Refer to the exhibit When computer A sends a frame to computer D what computers receive theframe
only computer D
only computer A and computer D
only computer B computer C and computer D
all computers
45 Which option correctly identifies the interface or interfaces used to connect the router to a CSUDSUfor WAN connectivity
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 2630
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 2730
46
Refer to the exhibit A user wants to access the Internet from the PC A part of the runningconfiguration of the router is shown Which default gateway IP address should be configured at thePC to enable this access
1011921
1011922
10119254
1923171
47
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 2830
Refer to the exhibit Which Layer 2 protocol could be used inside nework A and network CIP
TCP
UDP
Ethernet
48 Which password is automatically encrypted when it is created
vty
auxconsole
enable secret
enable password
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 2930
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 3030
application
network access
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 1530
27
Refer to the exhibit A router the table of which is shown receives a packet that is destined for19216894 How will the router treat the packet
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 1630
It will drop the packet
It will forward the packet via FastEthernet 01
It will forward the packet to the next hop address
It will forward the packet to 1721620
28
Refer to the exhibit An administrator is trying to remotely modify the configuration of this switch byusing Telnet The management workstation is on the same subnet as the switch but the administratoris unable to access the switch from the workstation Based on the output that is provided what is the
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 1730
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 1830
80
wwwciscocom
1000130
100013080
30
Refer to the exhibit Host A attempts to establish a TCPIP session with host C During this attempt aframe was captured with the source MAC address 00507320D632 and the destination MAC address0030851744C4 The packet inside the captured frame has an IP source address 19216875 andthe destination IP address is 19216821924 At which point in the network was this packet captured
leaving host A
leaving ATL
leaving Dallas
leaving NYC
31 When connectionless protocols are implemented at the lower layers of the OSI model what is usuallyused to acknowledge that the data was received and to request the retransmission of missing data
IP
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 1930
UDP
Ethernet
a connectionless acknowledgement
an upper-layer connection-oriented protocol or service
32 Which device should be used for enabling a host to communicate with another host on a different
networkswitch
hub
router
host
33 To enhance security in a network the network administrator uses these commands
Router(config) line console 0
Router(config-line) password j1mdi2 Router(config-line) login
What two conclusions are evident from these commands (Choose two)
Users who attempt to connect to the console port of the router must enter a password
The entries permit access through the console by the use of j1mdi2 as the password
The entries eliminate the need for authentication
Access through the console will be denied because the console configuration is incomplete
The entries prevent passwords from being displayed as plain text
34 What happens when a host station receives a frame that contains its own MAC address in thedestination field
The Layer 2 information is removed and the frame is pushed up to Layer 3
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 2030
The host station will copy the information to its buffers and send it back out
The frame originated from the host and will be ignored
The Layer 3 information is added to the frame
35
Refer to the exhibit All devices in the network use default configurations How many broadcastdomains are there in this topology
3
5
7
911
36 What information can be gathered by using the command netstat
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 2130
the default gateway
the routing protocol
active TCP connections
the locally configured subnet mask
37
Refer to the exhibit A PC is connected to a network Which action will verify that the PC cancommunicate with its default gateway
Use the ping 127001 command
Use the ipconfig command
Use the ipconfigall command
Use the ping 1000254 command
38
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 2230
Refer to the exhibit A network administrator remotely accesses the CLI of RouterB from PC1 usingTelnet Which statement is true about this connection
The data is automatically encrypted
A Telnet server process is running on PC1
The connection is made through a VTY session on the router
A GET request was sent to RouterB to retrieve data during this session
39
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 2330
Refer to the exhibit Host C is able to ping 127001 successfully but is unable to communicate withhosts A and B in the organization What is the likely cause of the problem
Hosts A and B are not on the same subnet as host C
The IP addresses on the router serial interfaces are wrong
The subnet mask on host C is improperly configured
The FastEthernet interface fa00 of router 1 is wrongly configured
40 Which prompt represents the appropriate mode used for the copy running-config startup-config command
Switch-6Jgt
Switch-6J
Switch-6J(config)
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 2430
Switch-6J(config-if)
Switch-6J(config-line)
41 How can ARP be used to help document the network
It can list each hop on the way to a destination host
It can show the average latency of hosts on the network
It can provide a list of physical addresses on the networkIt can indicate which hosts are not responding to network traffic
42 What information is contained in the header of Layer 3 to help data delivery
port number
device physical address
destination host logical address
virtual connection identifier
43 Which router component will have contents erased when the command erase startup-config isissued
flash
RAM
ROM
NVRAM
44
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 2530
Refer to the exhibit When computer A sends a frame to computer D what computers receive theframe
only computer D
only computer A and computer D
only computer B computer C and computer D
all computers
45 Which option correctly identifies the interface or interfaces used to connect the router to a CSUDSUfor WAN connectivity
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 2630
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 2730
46
Refer to the exhibit A user wants to access the Internet from the PC A part of the runningconfiguration of the router is shown Which default gateway IP address should be configured at thePC to enable this access
1011921
1011922
10119254
1923171
47
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 2830
Refer to the exhibit Which Layer 2 protocol could be used inside nework A and network CIP
TCP
UDP
Ethernet
48 Which password is automatically encrypted when it is created
vty
auxconsole
enable secret
enable password
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 2930
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 3030
application
network access
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 1630
It will drop the packet
It will forward the packet via FastEthernet 01
It will forward the packet to the next hop address
It will forward the packet to 1721620
28
Refer to the exhibit An administrator is trying to remotely modify the configuration of this switch byusing Telnet The management workstation is on the same subnet as the switch but the administratoris unable to access the switch from the workstation Based on the output that is provided what is the
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 1730
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 1830
80
wwwciscocom
1000130
100013080
30
Refer to the exhibit Host A attempts to establish a TCPIP session with host C During this attempt aframe was captured with the source MAC address 00507320D632 and the destination MAC address0030851744C4 The packet inside the captured frame has an IP source address 19216875 andthe destination IP address is 19216821924 At which point in the network was this packet captured
leaving host A
leaving ATL
leaving Dallas
leaving NYC
31 When connectionless protocols are implemented at the lower layers of the OSI model what is usuallyused to acknowledge that the data was received and to request the retransmission of missing data
IP
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 1930
UDP
Ethernet
a connectionless acknowledgement
an upper-layer connection-oriented protocol or service
32 Which device should be used for enabling a host to communicate with another host on a different
networkswitch
hub
router
host
33 To enhance security in a network the network administrator uses these commands
Router(config) line console 0
Router(config-line) password j1mdi2 Router(config-line) login
What two conclusions are evident from these commands (Choose two)
Users who attempt to connect to the console port of the router must enter a password
The entries permit access through the console by the use of j1mdi2 as the password
The entries eliminate the need for authentication
Access through the console will be denied because the console configuration is incomplete
The entries prevent passwords from being displayed as plain text
34 What happens when a host station receives a frame that contains its own MAC address in thedestination field
The Layer 2 information is removed and the frame is pushed up to Layer 3
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 2030
The host station will copy the information to its buffers and send it back out
The frame originated from the host and will be ignored
The Layer 3 information is added to the frame
35
Refer to the exhibit All devices in the network use default configurations How many broadcastdomains are there in this topology
3
5
7
911
36 What information can be gathered by using the command netstat
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 2130
the default gateway
the routing protocol
active TCP connections
the locally configured subnet mask
37
Refer to the exhibit A PC is connected to a network Which action will verify that the PC cancommunicate with its default gateway
Use the ping 127001 command
Use the ipconfig command
Use the ipconfigall command
Use the ping 1000254 command
38
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 2230
Refer to the exhibit A network administrator remotely accesses the CLI of RouterB from PC1 usingTelnet Which statement is true about this connection
The data is automatically encrypted
A Telnet server process is running on PC1
The connection is made through a VTY session on the router
A GET request was sent to RouterB to retrieve data during this session
39
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 2330
Refer to the exhibit Host C is able to ping 127001 successfully but is unable to communicate withhosts A and B in the organization What is the likely cause of the problem
Hosts A and B are not on the same subnet as host C
The IP addresses on the router serial interfaces are wrong
The subnet mask on host C is improperly configured
The FastEthernet interface fa00 of router 1 is wrongly configured
40 Which prompt represents the appropriate mode used for the copy running-config startup-config command
Switch-6Jgt
Switch-6J
Switch-6J(config)
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 2430
Switch-6J(config-if)
Switch-6J(config-line)
41 How can ARP be used to help document the network
It can list each hop on the way to a destination host
It can show the average latency of hosts on the network
It can provide a list of physical addresses on the networkIt can indicate which hosts are not responding to network traffic
42 What information is contained in the header of Layer 3 to help data delivery
port number
device physical address
destination host logical address
virtual connection identifier
43 Which router component will have contents erased when the command erase startup-config isissued
flash
RAM
ROM
NVRAM
44
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 2530
Refer to the exhibit When computer A sends a frame to computer D what computers receive theframe
only computer D
only computer A and computer D
only computer B computer C and computer D
all computers
45 Which option correctly identifies the interface or interfaces used to connect the router to a CSUDSUfor WAN connectivity
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 2630
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 2730
46
Refer to the exhibit A user wants to access the Internet from the PC A part of the runningconfiguration of the router is shown Which default gateway IP address should be configured at thePC to enable this access
1011921
1011922
10119254
1923171
47
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 2830
Refer to the exhibit Which Layer 2 protocol could be used inside nework A and network CIP
TCP
UDP
Ethernet
48 Which password is automatically encrypted when it is created
vty
auxconsole
enable secret
enable password
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 2930
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 3030
application
network access
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 1730
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 1830
80
wwwciscocom
1000130
100013080
30
Refer to the exhibit Host A attempts to establish a TCPIP session with host C During this attempt aframe was captured with the source MAC address 00507320D632 and the destination MAC address0030851744C4 The packet inside the captured frame has an IP source address 19216875 andthe destination IP address is 19216821924 At which point in the network was this packet captured
leaving host A
leaving ATL
leaving Dallas
leaving NYC
31 When connectionless protocols are implemented at the lower layers of the OSI model what is usuallyused to acknowledge that the data was received and to request the retransmission of missing data
IP
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 1930
UDP
Ethernet
a connectionless acknowledgement
an upper-layer connection-oriented protocol or service
32 Which device should be used for enabling a host to communicate with another host on a different
networkswitch
hub
router
host
33 To enhance security in a network the network administrator uses these commands
Router(config) line console 0
Router(config-line) password j1mdi2 Router(config-line) login
What two conclusions are evident from these commands (Choose two)
Users who attempt to connect to the console port of the router must enter a password
The entries permit access through the console by the use of j1mdi2 as the password
The entries eliminate the need for authentication
Access through the console will be denied because the console configuration is incomplete
The entries prevent passwords from being displayed as plain text
34 What happens when a host station receives a frame that contains its own MAC address in thedestination field
The Layer 2 information is removed and the frame is pushed up to Layer 3
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 2030
The host station will copy the information to its buffers and send it back out
The frame originated from the host and will be ignored
The Layer 3 information is added to the frame
35
Refer to the exhibit All devices in the network use default configurations How many broadcastdomains are there in this topology
3
5
7
911
36 What information can be gathered by using the command netstat
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 2130
the default gateway
the routing protocol
active TCP connections
the locally configured subnet mask
37
Refer to the exhibit A PC is connected to a network Which action will verify that the PC cancommunicate with its default gateway
Use the ping 127001 command
Use the ipconfig command
Use the ipconfigall command
Use the ping 1000254 command
38
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 2230
Refer to the exhibit A network administrator remotely accesses the CLI of RouterB from PC1 usingTelnet Which statement is true about this connection
The data is automatically encrypted
A Telnet server process is running on PC1
The connection is made through a VTY session on the router
A GET request was sent to RouterB to retrieve data during this session
39
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 2330
Refer to the exhibit Host C is able to ping 127001 successfully but is unable to communicate withhosts A and B in the organization What is the likely cause of the problem
Hosts A and B are not on the same subnet as host C
The IP addresses on the router serial interfaces are wrong
The subnet mask on host C is improperly configured
The FastEthernet interface fa00 of router 1 is wrongly configured
40 Which prompt represents the appropriate mode used for the copy running-config startup-config command
Switch-6Jgt
Switch-6J
Switch-6J(config)
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 2430
Switch-6J(config-if)
Switch-6J(config-line)
41 How can ARP be used to help document the network
It can list each hop on the way to a destination host
It can show the average latency of hosts on the network
It can provide a list of physical addresses on the networkIt can indicate which hosts are not responding to network traffic
42 What information is contained in the header of Layer 3 to help data delivery
port number
device physical address
destination host logical address
virtual connection identifier
43 Which router component will have contents erased when the command erase startup-config isissued
flash
RAM
ROM
NVRAM
44
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 2530
Refer to the exhibit When computer A sends a frame to computer D what computers receive theframe
only computer D
only computer A and computer D
only computer B computer C and computer D
all computers
45 Which option correctly identifies the interface or interfaces used to connect the router to a CSUDSUfor WAN connectivity
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 2630
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 2730
46
Refer to the exhibit A user wants to access the Internet from the PC A part of the runningconfiguration of the router is shown Which default gateway IP address should be configured at thePC to enable this access
1011921
1011922
10119254
1923171
47
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 2830
Refer to the exhibit Which Layer 2 protocol could be used inside nework A and network CIP
TCP
UDP
Ethernet
48 Which password is automatically encrypted when it is created
vty
auxconsole
enable secret
enable password
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 2930
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 3030
application
network access
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 1830
80
wwwciscocom
1000130
100013080
30
Refer to the exhibit Host A attempts to establish a TCPIP session with host C During this attempt aframe was captured with the source MAC address 00507320D632 and the destination MAC address0030851744C4 The packet inside the captured frame has an IP source address 19216875 andthe destination IP address is 19216821924 At which point in the network was this packet captured
leaving host A
leaving ATL
leaving Dallas
leaving NYC
31 When connectionless protocols are implemented at the lower layers of the OSI model what is usuallyused to acknowledge that the data was received and to request the retransmission of missing data
IP
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 1930
UDP
Ethernet
a connectionless acknowledgement
an upper-layer connection-oriented protocol or service
32 Which device should be used for enabling a host to communicate with another host on a different
networkswitch
hub
router
host
33 To enhance security in a network the network administrator uses these commands
Router(config) line console 0
Router(config-line) password j1mdi2 Router(config-line) login
What two conclusions are evident from these commands (Choose two)
Users who attempt to connect to the console port of the router must enter a password
The entries permit access through the console by the use of j1mdi2 as the password
The entries eliminate the need for authentication
Access through the console will be denied because the console configuration is incomplete
The entries prevent passwords from being displayed as plain text
34 What happens when a host station receives a frame that contains its own MAC address in thedestination field
The Layer 2 information is removed and the frame is pushed up to Layer 3
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 2030
The host station will copy the information to its buffers and send it back out
The frame originated from the host and will be ignored
The Layer 3 information is added to the frame
35
Refer to the exhibit All devices in the network use default configurations How many broadcastdomains are there in this topology
3
5
7
911
36 What information can be gathered by using the command netstat
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 2130
the default gateway
the routing protocol
active TCP connections
the locally configured subnet mask
37
Refer to the exhibit A PC is connected to a network Which action will verify that the PC cancommunicate with its default gateway
Use the ping 127001 command
Use the ipconfig command
Use the ipconfigall command
Use the ping 1000254 command
38
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 2230
Refer to the exhibit A network administrator remotely accesses the CLI of RouterB from PC1 usingTelnet Which statement is true about this connection
The data is automatically encrypted
A Telnet server process is running on PC1
The connection is made through a VTY session on the router
A GET request was sent to RouterB to retrieve data during this session
39
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 2330
Refer to the exhibit Host C is able to ping 127001 successfully but is unable to communicate withhosts A and B in the organization What is the likely cause of the problem
Hosts A and B are not on the same subnet as host C
The IP addresses on the router serial interfaces are wrong
The subnet mask on host C is improperly configured
The FastEthernet interface fa00 of router 1 is wrongly configured
40 Which prompt represents the appropriate mode used for the copy running-config startup-config command
Switch-6Jgt
Switch-6J
Switch-6J(config)
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 2430
Switch-6J(config-if)
Switch-6J(config-line)
41 How can ARP be used to help document the network
It can list each hop on the way to a destination host
It can show the average latency of hosts on the network
It can provide a list of physical addresses on the networkIt can indicate which hosts are not responding to network traffic
42 What information is contained in the header of Layer 3 to help data delivery
port number
device physical address
destination host logical address
virtual connection identifier
43 Which router component will have contents erased when the command erase startup-config isissued
flash
RAM
ROM
NVRAM
44
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 2530
Refer to the exhibit When computer A sends a frame to computer D what computers receive theframe
only computer D
only computer A and computer D
only computer B computer C and computer D
all computers
45 Which option correctly identifies the interface or interfaces used to connect the router to a CSUDSUfor WAN connectivity
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 2630
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 2730
46
Refer to the exhibit A user wants to access the Internet from the PC A part of the runningconfiguration of the router is shown Which default gateway IP address should be configured at thePC to enable this access
1011921
1011922
10119254
1923171
47
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 2830
Refer to the exhibit Which Layer 2 protocol could be used inside nework A and network CIP
TCP
UDP
Ethernet
48 Which password is automatically encrypted when it is created
vty
auxconsole
enable secret
enable password
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 2930
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 3030
application
network access
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 1930
UDP
Ethernet
a connectionless acknowledgement
an upper-layer connection-oriented protocol or service
32 Which device should be used for enabling a host to communicate with another host on a different
networkswitch
hub
router
host
33 To enhance security in a network the network administrator uses these commands
Router(config) line console 0
Router(config-line) password j1mdi2 Router(config-line) login
What two conclusions are evident from these commands (Choose two)
Users who attempt to connect to the console port of the router must enter a password
The entries permit access through the console by the use of j1mdi2 as the password
The entries eliminate the need for authentication
Access through the console will be denied because the console configuration is incomplete
The entries prevent passwords from being displayed as plain text
34 What happens when a host station receives a frame that contains its own MAC address in thedestination field
The Layer 2 information is removed and the frame is pushed up to Layer 3
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 2030
The host station will copy the information to its buffers and send it back out
The frame originated from the host and will be ignored
The Layer 3 information is added to the frame
35
Refer to the exhibit All devices in the network use default configurations How many broadcastdomains are there in this topology
3
5
7
911
36 What information can be gathered by using the command netstat
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 2130
the default gateway
the routing protocol
active TCP connections
the locally configured subnet mask
37
Refer to the exhibit A PC is connected to a network Which action will verify that the PC cancommunicate with its default gateway
Use the ping 127001 command
Use the ipconfig command
Use the ipconfigall command
Use the ping 1000254 command
38
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 2230
Refer to the exhibit A network administrator remotely accesses the CLI of RouterB from PC1 usingTelnet Which statement is true about this connection
The data is automatically encrypted
A Telnet server process is running on PC1
The connection is made through a VTY session on the router
A GET request was sent to RouterB to retrieve data during this session
39
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 2330
Refer to the exhibit Host C is able to ping 127001 successfully but is unable to communicate withhosts A and B in the organization What is the likely cause of the problem
Hosts A and B are not on the same subnet as host C
The IP addresses on the router serial interfaces are wrong
The subnet mask on host C is improperly configured
The FastEthernet interface fa00 of router 1 is wrongly configured
40 Which prompt represents the appropriate mode used for the copy running-config startup-config command
Switch-6Jgt
Switch-6J
Switch-6J(config)
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 2430
Switch-6J(config-if)
Switch-6J(config-line)
41 How can ARP be used to help document the network
It can list each hop on the way to a destination host
It can show the average latency of hosts on the network
It can provide a list of physical addresses on the networkIt can indicate which hosts are not responding to network traffic
42 What information is contained in the header of Layer 3 to help data delivery
port number
device physical address
destination host logical address
virtual connection identifier
43 Which router component will have contents erased when the command erase startup-config isissued
flash
RAM
ROM
NVRAM
44
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 2530
Refer to the exhibit When computer A sends a frame to computer D what computers receive theframe
only computer D
only computer A and computer D
only computer B computer C and computer D
all computers
45 Which option correctly identifies the interface or interfaces used to connect the router to a CSUDSUfor WAN connectivity
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 2630
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 2730
46
Refer to the exhibit A user wants to access the Internet from the PC A part of the runningconfiguration of the router is shown Which default gateway IP address should be configured at thePC to enable this access
1011921
1011922
10119254
1923171
47
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 2830
Refer to the exhibit Which Layer 2 protocol could be used inside nework A and network CIP
TCP
UDP
Ethernet
48 Which password is automatically encrypted when it is created
vty
auxconsole
enable secret
enable password
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 2930
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 3030
application
network access
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 2030
The host station will copy the information to its buffers and send it back out
The frame originated from the host and will be ignored
The Layer 3 information is added to the frame
35
Refer to the exhibit All devices in the network use default configurations How many broadcastdomains are there in this topology
3
5
7
911
36 What information can be gathered by using the command netstat
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 2130
the default gateway
the routing protocol
active TCP connections
the locally configured subnet mask
37
Refer to the exhibit A PC is connected to a network Which action will verify that the PC cancommunicate with its default gateway
Use the ping 127001 command
Use the ipconfig command
Use the ipconfigall command
Use the ping 1000254 command
38
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 2230
Refer to the exhibit A network administrator remotely accesses the CLI of RouterB from PC1 usingTelnet Which statement is true about this connection
The data is automatically encrypted
A Telnet server process is running on PC1
The connection is made through a VTY session on the router
A GET request was sent to RouterB to retrieve data during this session
39
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 2330
Refer to the exhibit Host C is able to ping 127001 successfully but is unable to communicate withhosts A and B in the organization What is the likely cause of the problem
Hosts A and B are not on the same subnet as host C
The IP addresses on the router serial interfaces are wrong
The subnet mask on host C is improperly configured
The FastEthernet interface fa00 of router 1 is wrongly configured
40 Which prompt represents the appropriate mode used for the copy running-config startup-config command
Switch-6Jgt
Switch-6J
Switch-6J(config)
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 2430
Switch-6J(config-if)
Switch-6J(config-line)
41 How can ARP be used to help document the network
It can list each hop on the way to a destination host
It can show the average latency of hosts on the network
It can provide a list of physical addresses on the networkIt can indicate which hosts are not responding to network traffic
42 What information is contained in the header of Layer 3 to help data delivery
port number
device physical address
destination host logical address
virtual connection identifier
43 Which router component will have contents erased when the command erase startup-config isissued
flash
RAM
ROM
NVRAM
44
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 2530
Refer to the exhibit When computer A sends a frame to computer D what computers receive theframe
only computer D
only computer A and computer D
only computer B computer C and computer D
all computers
45 Which option correctly identifies the interface or interfaces used to connect the router to a CSUDSUfor WAN connectivity
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 2630
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 2730
46
Refer to the exhibit A user wants to access the Internet from the PC A part of the runningconfiguration of the router is shown Which default gateway IP address should be configured at thePC to enable this access
1011921
1011922
10119254
1923171
47
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 2830
Refer to the exhibit Which Layer 2 protocol could be used inside nework A and network CIP
TCP
UDP
Ethernet
48 Which password is automatically encrypted when it is created
vty
auxconsole
enable secret
enable password
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 2930
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 3030
application
network access
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 2130
the default gateway
the routing protocol
active TCP connections
the locally configured subnet mask
37
Refer to the exhibit A PC is connected to a network Which action will verify that the PC cancommunicate with its default gateway
Use the ping 127001 command
Use the ipconfig command
Use the ipconfigall command
Use the ping 1000254 command
38
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 2230
Refer to the exhibit A network administrator remotely accesses the CLI of RouterB from PC1 usingTelnet Which statement is true about this connection
The data is automatically encrypted
A Telnet server process is running on PC1
The connection is made through a VTY session on the router
A GET request was sent to RouterB to retrieve data during this session
39
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 2330
Refer to the exhibit Host C is able to ping 127001 successfully but is unable to communicate withhosts A and B in the organization What is the likely cause of the problem
Hosts A and B are not on the same subnet as host C
The IP addresses on the router serial interfaces are wrong
The subnet mask on host C is improperly configured
The FastEthernet interface fa00 of router 1 is wrongly configured
40 Which prompt represents the appropriate mode used for the copy running-config startup-config command
Switch-6Jgt
Switch-6J
Switch-6J(config)
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 2430
Switch-6J(config-if)
Switch-6J(config-line)
41 How can ARP be used to help document the network
It can list each hop on the way to a destination host
It can show the average latency of hosts on the network
It can provide a list of physical addresses on the networkIt can indicate which hosts are not responding to network traffic
42 What information is contained in the header of Layer 3 to help data delivery
port number
device physical address
destination host logical address
virtual connection identifier
43 Which router component will have contents erased when the command erase startup-config isissued
flash
RAM
ROM
NVRAM
44
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 2530
Refer to the exhibit When computer A sends a frame to computer D what computers receive theframe
only computer D
only computer A and computer D
only computer B computer C and computer D
all computers
45 Which option correctly identifies the interface or interfaces used to connect the router to a CSUDSUfor WAN connectivity
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 2630
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 2730
46
Refer to the exhibit A user wants to access the Internet from the PC A part of the runningconfiguration of the router is shown Which default gateway IP address should be configured at thePC to enable this access
1011921
1011922
10119254
1923171
47
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 2830
Refer to the exhibit Which Layer 2 protocol could be used inside nework A and network CIP
TCP
UDP
Ethernet
48 Which password is automatically encrypted when it is created
vty
auxconsole
enable secret
enable password
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 2930
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 3030
application
network access
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 2230
Refer to the exhibit A network administrator remotely accesses the CLI of RouterB from PC1 usingTelnet Which statement is true about this connection
The data is automatically encrypted
A Telnet server process is running on PC1
The connection is made through a VTY session on the router
A GET request was sent to RouterB to retrieve data during this session
39
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 2330
Refer to the exhibit Host C is able to ping 127001 successfully but is unable to communicate withhosts A and B in the organization What is the likely cause of the problem
Hosts A and B are not on the same subnet as host C
The IP addresses on the router serial interfaces are wrong
The subnet mask on host C is improperly configured
The FastEthernet interface fa00 of router 1 is wrongly configured
40 Which prompt represents the appropriate mode used for the copy running-config startup-config command
Switch-6Jgt
Switch-6J
Switch-6J(config)
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 2430
Switch-6J(config-if)
Switch-6J(config-line)
41 How can ARP be used to help document the network
It can list each hop on the way to a destination host
It can show the average latency of hosts on the network
It can provide a list of physical addresses on the networkIt can indicate which hosts are not responding to network traffic
42 What information is contained in the header of Layer 3 to help data delivery
port number
device physical address
destination host logical address
virtual connection identifier
43 Which router component will have contents erased when the command erase startup-config isissued
flash
RAM
ROM
NVRAM
44
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 2530
Refer to the exhibit When computer A sends a frame to computer D what computers receive theframe
only computer D
only computer A and computer D
only computer B computer C and computer D
all computers
45 Which option correctly identifies the interface or interfaces used to connect the router to a CSUDSUfor WAN connectivity
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 2630
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 2730
46
Refer to the exhibit A user wants to access the Internet from the PC A part of the runningconfiguration of the router is shown Which default gateway IP address should be configured at thePC to enable this access
1011921
1011922
10119254
1923171
47
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 2830
Refer to the exhibit Which Layer 2 protocol could be used inside nework A and network CIP
TCP
UDP
Ethernet
48 Which password is automatically encrypted when it is created
vty
auxconsole
enable secret
enable password
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 2930
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 3030
application
network access
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 2330
Refer to the exhibit Host C is able to ping 127001 successfully but is unable to communicate withhosts A and B in the organization What is the likely cause of the problem
Hosts A and B are not on the same subnet as host C
The IP addresses on the router serial interfaces are wrong
The subnet mask on host C is improperly configured
The FastEthernet interface fa00 of router 1 is wrongly configured
40 Which prompt represents the appropriate mode used for the copy running-config startup-config command
Switch-6Jgt
Switch-6J
Switch-6J(config)
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 2430
Switch-6J(config-if)
Switch-6J(config-line)
41 How can ARP be used to help document the network
It can list each hop on the way to a destination host
It can show the average latency of hosts on the network
It can provide a list of physical addresses on the networkIt can indicate which hosts are not responding to network traffic
42 What information is contained in the header of Layer 3 to help data delivery
port number
device physical address
destination host logical address
virtual connection identifier
43 Which router component will have contents erased when the command erase startup-config isissued
flash
RAM
ROM
NVRAM
44
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 2530
Refer to the exhibit When computer A sends a frame to computer D what computers receive theframe
only computer D
only computer A and computer D
only computer B computer C and computer D
all computers
45 Which option correctly identifies the interface or interfaces used to connect the router to a CSUDSUfor WAN connectivity
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 2630
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 2730
46
Refer to the exhibit A user wants to access the Internet from the PC A part of the runningconfiguration of the router is shown Which default gateway IP address should be configured at thePC to enable this access
1011921
1011922
10119254
1923171
47
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 2830
Refer to the exhibit Which Layer 2 protocol could be used inside nework A and network CIP
TCP
UDP
Ethernet
48 Which password is automatically encrypted when it is created
vty
auxconsole
enable secret
enable password
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 2930
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 3030
application
network access
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 2430
Switch-6J(config-if)
Switch-6J(config-line)
41 How can ARP be used to help document the network
It can list each hop on the way to a destination host
It can show the average latency of hosts on the network
It can provide a list of physical addresses on the networkIt can indicate which hosts are not responding to network traffic
42 What information is contained in the header of Layer 3 to help data delivery
port number
device physical address
destination host logical address
virtual connection identifier
43 Which router component will have contents erased when the command erase startup-config isissued
flash
RAM
ROM
NVRAM
44
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 2530
Refer to the exhibit When computer A sends a frame to computer D what computers receive theframe
only computer D
only computer A and computer D
only computer B computer C and computer D
all computers
45 Which option correctly identifies the interface or interfaces used to connect the router to a CSUDSUfor WAN connectivity
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 2630
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 2730
46
Refer to the exhibit A user wants to access the Internet from the PC A part of the runningconfiguration of the router is shown Which default gateway IP address should be configured at thePC to enable this access
1011921
1011922
10119254
1923171
47
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 2830
Refer to the exhibit Which Layer 2 protocol could be used inside nework A and network CIP
TCP
UDP
Ethernet
48 Which password is automatically encrypted when it is created
vty
auxconsole
enable secret
enable password
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 2930
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 3030
application
network access
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 2530
Refer to the exhibit When computer A sends a frame to computer D what computers receive theframe
only computer D
only computer A and computer D
only computer B computer C and computer D
all computers
45 Which option correctly identifies the interface or interfaces used to connect the router to a CSUDSUfor WAN connectivity
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 2630
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 2730
46
Refer to the exhibit A user wants to access the Internet from the PC A part of the runningconfiguration of the router is shown Which default gateway IP address should be configured at thePC to enable this access
1011921
1011922
10119254
1923171
47
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 2830
Refer to the exhibit Which Layer 2 protocol could be used inside nework A and network CIP
TCP
UDP
Ethernet
48 Which password is automatically encrypted when it is created
vty
auxconsole
enable secret
enable password
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 2930
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 3030
application
network access
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 2630
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 2730
46
Refer to the exhibit A user wants to access the Internet from the PC A part of the runningconfiguration of the router is shown Which default gateway IP address should be configured at thePC to enable this access
1011921
1011922
10119254
1923171
47
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 2830
Refer to the exhibit Which Layer 2 protocol could be used inside nework A and network CIP
TCP
UDP
Ethernet
48 Which password is automatically encrypted when it is created
vty
auxconsole
enable secret
enable password
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 2930
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 3030
application
network access
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 2730
46
Refer to the exhibit A user wants to access the Internet from the PC A part of the runningconfiguration of the router is shown Which default gateway IP address should be configured at thePC to enable this access
1011921
1011922
10119254
1923171
47
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 2830
Refer to the exhibit Which Layer 2 protocol could be used inside nework A and network CIP
TCP
UDP
Ethernet
48 Which password is automatically encrypted when it is created
vty
auxconsole
enable secret
enable password
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 2930
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 3030
application
network access
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 2830
Refer to the exhibit Which Layer 2 protocol could be used inside nework A and network CIP
TCP
UDP
Ethernet
48 Which password is automatically encrypted when it is created
vty
auxconsole
enable secret
enable password
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 2930
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 3030
application
network access
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 2930
832019 Enetwork Final
httpslidepdfcomreaderfullenetwork-final 3030
application
network access