Top Banner

of 26

Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript

CCENT Practice Certification Exam # 1 CCNA Exploration: Accessing the WAN (Version4.0)CCENT Practice Certification Exam # 1 - CCNA Exploration: Accessing the WAN (Version 4.0)1. What are two ways that TCP uses the sequence numbers in a segment? (Choose two.)to identify missing segments at the destination

to reassemble the segments at the remote location

to specify the order in which the segments travel from source to destination

to limit the number of segments that can be sent out of an interface at one time

to determine if the packet changed during transit

2. Which three statements characterize UDP? (Choose three.)UDP provides connectionless, fast transport of data at Layer 4.

UDP provides connection-oriented, fast transport of data at Layer 3.

UDP relies on application layer protocols for error detection.

UDP works well when an application does not need to guarantee delivery of data.

UDP relies on IP for error detection and recovery.

UDP provides sophisticated flow control mechanisms.

http://www.ccna4u.org3. Refer to the exhibit. Host A sends a data packet to host B. What will be the addressing information of the data packet when it reaches host B? Refer to the exhibit. Host A sends a data packet to host B. What will be the addressing information of the data packet when it reaches host B?

4. Which layer of the OSI model defines logical addressing?application

presentation

session

transport

network

data link

5. Which device connects a local LAN to a geographically separate network?switch

hub

router

bridge

6. Refer to the exhibit. Router1 receives packets addressed as follows:Source IP address: 192.168.1.88Destination IP address: 172.16.0.3Source MAC address: 00-11-12-7a-41-10Destination MAC address: 00-11-5c-cc-a9-c0Source Port: 1464Destination Port: 23Assuming that Router1 has not been configured with NAT, what will happen to the packets?The packets will be sent to the server because it is a server-based port.

The packets will be sent to Switch2 and not leave the switch because the packets are local.

The packets will be sent to the laptop host.

The packets will be sent to Router1 and dropped because private addresses are not transmitted across the Internet.

The packets will be sent to Router2 and dropped because the server is not directly attached.

7. Refer to the exhibit. If host 1 was to send an HTTP request to the web server that connects to Router2, what type of Layer 2 frame would be sent between Router1 and the ISP?a frame with a header that contains the port number of 80

a frame with a header and trailer, but no MAC addresses

a frame with a header and a trailer that only contains IP addresses

a frame with the host 1 MAC address as the source and Router1 MAC address as the destination

a frame with the host 1 MAC address as the source and the server MAC address as the destination

8. A company needs to connect an office router to a service provider to access a WAN. What device is needed to connect the router to the ISP if the service provider supplies a T1 line for the connection?a CSU/DSU

a cable modem

a DSL router

a DTE device

an SLA device

9. Refer to the exhibit. A technician applies the configuration in the exhibit to an unconfigured router. To verify the configuration, the technician issues the show running-config command in the CLI session with the router. What lines should the technician expect to see in the router output from the show running-config command?enable password classline console 0password ccna

enable secret ciscoenable password classline console 0password ccna

enable secret 5 $1$v0/3$QyQWmJyT7zCa/yaBRasJm0enable password classline console 0password ccna

enable secret ciscoenable password 7 14141E0A1F17line console 0password 7 020507550A

enable secret 5 $1$v0/3$QyQWmJyT7zCa/yaBRasJm0enable password 7 14141E0A1F17line console 0password 7 020507550A

10. Refer to the exhibit. If host A sends an IP packet to host B, what will the destination address be in the frame when it leaves host A?DD:DD:DD:DD:DD:DD

172.168.10.99

CC:CC:CC:CC:CC:CC

172.168.10.65

BB:BB:BB:BB:BB:BB

AA:AA:AA:AA:AA:AA

11. Refer to the exhibit. What two facts can be determined from the output of the pingcommand? (Choose two.)There was a destination unreachable error.

The packet type was unknown.

One packet timed out.

The ping was interrupted.

Four packets of data were successfully received.

The packet TTL was exceeded.

12. Refer to the exhibit. The switches are in their default configuration. Host A needs to communicate with host D, but host A does not have the MAC address for its default gateway. Which network hosts will receive the ARP request sent by host A?only host D

only router R1

only hosts A, B, and C

only hosts A, B, C, and D

only hosts B and C

only hosts B, C, and router R1

13. Refer to the exhibit. Which password will the administrator need to use on this device to enter privileged EXEC mode?Cisco

class

password

cisco

14. Refer to the exhibit. Switch1 has only the following commands added to a default Cisco 2960 configuration:enable secret ciscoline vty 0 4password Kn0ckkn-cKlogininterface vlan 1ip address 10.0.1.8 255.255.255.0no shutdownAssume that routing between networks is functioning properly and that Switch2 has been properly configured for remote access. What would the result be if the telnet 10.0.2.2command is issued from Switch1 privileged mode?The following prompt would appear:User Access VerificationPassword:

Switch2 would return a destination unreachable message to Switch1.

Router1 would return a destination unreachable message to Switch1.

The packet would be dropped.

15. What caused the following error message to appear?01:11:12: %PM-4-ERR_DISABLE: psecure-violation error detected on Fa0/8, putting Fa0/8 in err-disable state01:11:12: %PORT_SECURITY-2-PSECURE_VIOLATION: Security violation occurred, caused by MAC address 0011.a0d4.12a0 on port FastEthernet0/8.01:11:13: %LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthernet0/8, changed state to down01:11:14: %LINK-3-UPDOWN: Interface FastEthernet0/8, changed state to downAnother switch was connected to this switch port with the wrong cable.

An unauthorized user tried to telnet to the switch through switch port Fa0/8.

NAT was enabled on a router, and a private IP address arrived on switch port Fa0/8.

A host with an invalid IP address was connected to a switch port that was previously unused.

Port security was enabled on the switch port, and an unauthorized connection was made on switch port Fa0/8.

16. When configuring a switch to use SSH for virtual terminal connections, what is the purpose of the crypto key generate rsa command?show SSH connected hosts

disconnect SSH connected hosts

create a public and private key pair

show active SSH ports on the switch

access the SSH database configuration

17. Which three statements are true about full-duplex operation on an Ethernet network? (Choose three.)There are no collisions in full-duplex mode.

A dedicated switch port is required for each node.

Hub ports are preconfigured for full-duplex mode.

The host network card must detect the availability of the media before transmitting.

The host network card and the switch port must both be in full-duplex mode.

18. Refer to the exhibit. If all the switches have a default configuration, how many broadcast domains are in the network?1

2

3

4

5

14

19.20. Refer to the exhibit. The devices have been configured with static IP addresses as shown. All hosts can communicate with each other but none of the hosts can communicate with the server. What is the cause of this problem?The IP address that is assigned to the server is in an incorrect subnet.

The IP address that is assigned to the server is a broadcast address.

The IP address that is assigned to the server is a network address.

The switch to which the server is connected has not been assigned an IP address.

The RouterB LAN interface is incorrectly addressed in the RouterA LAN subnet.

21. A network host has the IP address 10.250.206.55/20. How many more network devices can be added to this same subnetwork?253

509

1021

2045

4093

22. Which type of Network Address Translation allows a host on a public network consistent access to a specified private inside host?port-based NAT

static NAT

dynamic NAT

NAT overload

23. Refer to the exhibit. Which two addresses are inside global addresses? (Choose two.)192.31.7.3

64.40.1.5

198.133.219.35

192.31.7.2

198.133.219.44

64.40.1.4

192.31.7.1

24. Which addresses are valid host IP addresses given the subnet mask 255.255.255.248? (Choose three.)192.168.200.87

194.10.10.104

223.168.210.100

220.100.100.154

200.152.2.160

196.123.142.190

25. The router receives a packet with the destination address of 172.16.30.79/22. To which subnetwork does this packet belong?172.16.30.0/22

172.16.30.64/22

172.16.30.76/22

172.16.28.0/22

172.16.28.56/22

172.16.0.0/22

26. Refer to the exhibit. What is the broadcast address for the subnetwork on which host A resides?10.255.255.255

10.144.255.255

10.149.255.255

10.149.191.255

10.159.255.255

27.28. What can a network administrator modify on a router to specify the location from which the Cisco IOS loads? (Choose two.)system ROM

the startup configuration file

the system image file

the configuration register value

the NVRAM file system

29. Which two items are required for initial configuration of Cisco routers if the IOS command-line interface is used? (Choose two.)a crossover cable

a rollover cable

an RJ-15 to DB-9 adapter

terminal emulation software

router VTY port

30. Refer to the exhibit. The router named myhome has received a frame from the host 192.168.254.7. The contents of this frame are being sent to host 172.16.14.243. What is the Layer 2 destination address of the frame as it leaves the myhome router?0008.a3b6.ce05

0009.1281.18a8

000a.8a47.e612

172.16.14.129

172.16.14.243

192.168.254.7

31. Refer to the exhibit. What two facts can be determined about the network from the exhibited output? (Choose two.)The MontegoBay router does not have any LAN interfaces configured.

The Negril router is connected to the S0/1 interface of the MontegoBay router.

There are only four devices in this network.

Layer 3 is functioning properly on all routers.

The MBSwitch is connected to the Negril, Lucia, and MontegoBay routers.

Layer 2 is operational on three ports of the MontegoBay router.

32. Which set of commands is used to name a router and save the configuration?Router(config)# hostname SouthSouth(config)# copy running-config startup-config

Router(config)# hostname SouthSouth(config)# exitSouth# copy running-config startup-config

Router(config)# ip host SouthSouth(config)# copy running-config startup-config

Router(config)# ip host SouthSouth(config)# exitSouth# copy running-config startup-config

33. Which command is used to create an encrypted password that restricts access to the privileged EXEC mode of a Cisco router?RouterA(config)# encrypted password cisco

RouterA(config)# password encrypted cisco

RouterA(config)# enable password cisco

RouterA(config)# enable secret cisco

RouterA(config)# service-password encryption cisco

34. Refer to the exhibit. A network administrator working at HostA has problems accessing the FTP server. Layer 3 connectivity testing was successful from HostA to the S0/0/1 interface of RouterB. Which set of commands will allow the network administrator to telnet to RouterB to check its status?RouterB(config)# enable secret classRouterB(config)# line vty 0 4RouterB(config-if)# login

RouterB(config)# enable secret classRouterB(config)# line vty 0RouterB(config-line)# password ciscoRouterB(config-line)# login

RouterB(config)# enable secret classRouterB(config)# line aux 0RouterB(config-line)# password ciscoRouterB(config-line)# login

RouterB(config)# enable secret classRouterB(config)# line aux 0RouterB(config-vty)# password ciscoRouterB(config-vty)# login

35. What is the purpose of using SSH to connect to a router?It allows a router to be configured using a graphical interface.

It allows a secure remote connection to the router command line interface.

It allows the router to be monitored through a network management application.

It allows secure transfer of the IOS software image from an unsecure workstation or server.

36. Which two statements describe the command ip route 192.168.7.24 255.255.255.248 192.168.7.9? (Choose two.)A packet that is destined for host 192.168.7.30 will be forwarded to address 192.168.7.9.

The address 192.168.7.9 is the destination network for this route.

The address 192.168.7.24 is the next-hop router in this command.

This command is issued from the interface configuration mode.

This command is used to define a static route.

37. Which protocol is described as an enhanced distance vector routing protocol?RIP v1

RIP v2

EIGRP

OSPF

38. Refer to the exhibit. A network administrator can successfully ping, using IP addresses, between router Jax and router Atlanta. However, when the command telnet Atlanta is entered from the Jax router, the Telnet connection fails. Which two reasons could be the cause of the failure? (Choose two.)The Jax router is not an entry in the host table of the Atlanta router.

The Jax router does not have an entry for Atlanta in its host table.

The hostname command is not configured correctly on the Atlanta router.

The hostname command is not configured correctly on the Jax router.

Access to a DNS server is not available.

39. From what two locations can a router load the Cisco IOS during the boot process? (Choose two.)RAM

TFTP server

NVRAM

setup routine

Flash memory

terminal

40. Which two statements describe the functions or characteristics of ROM in a router? (Choose two.)stores routing tables

allows software to be updated without replacing pluggable chips on the motherboard

maintains instructions for POST diagnostics

holds ARP cache

stores bootstrap program

41. Which two statements correctly identify the function of router memory components? (Choose two.)RAM permanently stores the configuration file used during the boot sequence.

ROM contains diagnostic self test procedures executed on hardware modules.

NVRAM stores a backup copy of the IOS used during the boot sequence.

Flash memory does not lose its contents when a router is powered off.

ROM contains the most current and most complete version of the IOS.

Flash contains boot system commands to identify the location of the IOS.

42. Which router component holds the routing table, ARP cache, and running configuration file?RAM

Flash

NVRAM

ROM

43. Refer to the exhibit. A network administrator can ping the Denver router, but gets a Password Required but None Set message when trying to connect remotely via Telnet. Which command or sequence of commands must be applied to the Denver router to allow remote access?Router(config)# line console 0Router(config-line)# loginRouter(config-line)# password cisco

Router(config)# line vty 0 4Router(config-line)# loginRouter(config-line)# password cisco

Router(config)# line virtual terminalRouter(config-line)# enable loginRouter(config-line)# password cisco

Router(config)# line vty 0 4Router(config-line)# enable secretRouter(config-line)# password cisco

Router(config)# enable secret cisco

Router(config)# enable cisco

44.45. Which security method uses the Advanced Encryption Standard (AES)?MAC address filtering

WEP

WPA

WPA2

46. What is the purpose of WEP?It encrypts data.

It uniquely identifies a wireless network.

It coordinates and accepts transmissions from wireless hosts.

It provides information about a directly connected Cisco network device.

47. A company has an 802.11b wireless access point installed. Which type of wireless NIC is a valid standards-based one but will not work in this environment?802.11a

802.11b

802.11g

802.11n

48.49. A company has a sales team that travels with laptops. On Fridays, the sales members come into assigned cubicles and connect their laptop to the wired network. The company is concerned that unauthorized users could also connect to the network. What can be done to ensure that unauthorized laptops are not connected to the wired network?Implement SSH.

Install WEP or WPA.

Use switch port security.

Clearly label the cubicle network port and the switch port.

Configure usernames and passwords on the switch ports assigned to each cubicle.

50. Refer to the exhibit. For security reasons, information about the HQ R1 router model and IP address should not be accessible from the Site 2 R2 router. What security measure should be implemented?Install an IDS between R1 and R2.

Install an IPS between R1 and R2.

Install a firewall between R1 and R2.

Disable CDP on the R1 interface that connects to R2.

Disable any routing protocol used between R1 and R2 and install static routes.

What are three characteristics of CSMA/CD? (Choose three.) 1. A device listens and waits until the media is not busy before transmitting.

2. All of the devices on a segment see data that passes on the network medium.

3. After detecting a collision, hosts can attempt to resume transmission after a random time delay has expired. Which feature on a Cisco router permits the forwarding of traffic for which there is no specific route? gateway of last resort An organization is assigned an IPv6 address block of 2001:db8:0:ca00::/56. How many subnets can be created without using bits in the interface ID space? 256 Open the PT Activity. Perform the tasks in the activity instructions and then answer the question.

Which code is displayed on the web browser? It works! Data is being sent from a source PC to a destination server. Which three statements correctly describe the function of TCP or UDP in this situation? (Choose three.) 1. The UDP destination port number identifies the application or service on the server which will handle the data.

2. UDP segments are encapsulated within IP packets for transport across the network.

3. The source port field identifies the running application or service that will handle data returning to the PC. What are two actions performed by a Cisco switch? (Choose two.) 1. using the source MAC addresses of frames to build and maintain a MAC address table

2. utilizing the MAC address table to forward frames via the destination MAC address A network administrator is issuing the login block-for 180 attempts 2 within 30 command on a router. Which threat is the network administrator trying to prevent? a user who is trying to guess a password to access the router How will a router handle static routing differently if Cisco Express Forwarding is disabled? Ethernet multiaccess interfaces will require fully specified static routes to avoid routing inconsistencies. A network administrator is designing an IPv4 addressing scheme and requires these subnets.

1 subnet of 100 hosts2 subnets of 80 hosts2 subnets of 30 hosts4 subnets of 20 hosts

Which combination of subnets and masks will provide the best addressing plan for these requirements? 3 subnets of 126 hosts with a 255.255.255.128 mask6 subnets of 30 hosts with a 255.255.255.224 mask Match the description to the various trunking modes for Cisco 2960 Catalyst switches. Not all options are used.

A. The interface becomes a nontrunk interface regardless of whether the neighboring interface is a trunk interface.

B. The interface becomes a trunk interface if the neighboring interface is set to trunk or desirable mode.

C. The interface becomes a trunk interface even if the neighboring interface is not a trunk interface. 1. switchport nonegotiate

2. switchport mode trunk - C

3. switchport mode dynamic desirable

4. switchport mode dynamic auto - B

5. switchport mode access - A How many /30 subnets can be created from one /27 subnet? 8 Which layer of the OSI model handles the process of identifying and discarding damaged frames? data link Refer to the exhibit. Which password will the administrator need to use on this device to enter privileged EXEC mode? cisco In which memory location are the VLAN configurations of normal range VLANs stored on a Catalyst switch? flash A user calls the help desk to report that a Windows XP workstation is unable to connect to the network after startup and that a popup window says "This connection has limited or no connectivity." The technician asks the user to issue the ipconfig /all command. The user reports the IP address is 169.254.69.196 with subnet mask of 255.255.0.0 and nothing is displayed for the DNS server IP address. What is the cause of the problem? The workstation is unable to obtain an IP address from a DHCP server. What will be the result of adding the command ip dhcp excluded-address 172.16.4.1 172.16.4.5 to the configuration of a local router that has been configured as a DHCP server? The DHCP server function of the router will not issue the addresses from 172.16.4.1 through 172.16.4.5 inclusive. Refer to the exhibit. After the configuration that is shown in the exhibit is applied to the SVI, the switch fails to respond to Telnet attempts from a host in the same subnet. What is the cause of the problem? The interface is administratively down. Refer to the exhibit. Match the packets with their destination IP address to the exiting interfaces on the router. (Not all targets are used.)

A. Packets with a destination of 172.17.10.5

B. Packets with a destination of 172.17.12.10

C. Packets with a destination of 172.17.14.8

D. Packets with a destination of 172.17.8.20

E. Packets with a destination of 172.17.6.15 1. FastEthernet0/0 - E

2. FastEthernet0/1 - C

3. FastEthernet1/0 - B

4. FastEthernet1/1 - A

5. Serial0/0/0 - D

6. The packet is dropped. A network administrator is using the router-on-a-stick model to configure a switch and a router for inter-VLAN routing. What configuration should be made on the switch port that connects to the router? Configure the port as an 802.1q trunk port. Which three statements accurately describe duplex and speed settings on Cisco 2960 switches? (Choose three.) 1. When the speed is set to 1000 Mb/s, the switch ports will operate in full-duplex mode.

2. The duplex and speed settings of each switch port can be manually configured.

3. An autonegotiation failure can result in connectivity issues. Refer to the exhibit. A network administrator has configured R2 for PAT. Why is the configuration incorrect? NAT-POOL2 is bound to the wrong ACL. Which address type is not supported in IPv6? broadcast Which device connects a local LAN to a geographically separate network? router What is the purpose of the SVI on a Cisco switch? The SVI provides a virtual interface for remote access to the switch. Refer to the exhibit. Interfaces Fa0/5, Fa0/7, and Fa0/9 are the only connected ports on the switch CiscoSwitch. All other ports are unused. Which security best practice did the administrator forget to configure? Configure all unused ports to a 'black-hole' VLAN that is not used for anything on the network. Refer to the exhibit. Routers R1 and R2 are connected via a serial link. One router is configured as the NTP master, and the other is an NTP client. Which two pieces of information can be obtained from the partial output of the show ntp associations detail command on R2? (Choose two.) 1. Router R1 is the master, and R2 is the client.

2. The IP address of R1 is 192. 168. 1. 2. Given IPv6 address prefix 2001:db8::/48, what will be the last subnet that is created if the subnet prefix is changed to /52? 2001:db8:0:f000::/52 What is the purpose of deploying dual stack devices? Dual stack allows companies to migrate to IPv6 over time. Which two devices allow hosts on different VLANs to communicate with each other? (Choose two.) 1. router

2. Layer 3 switch Refer to the exhibit. Fill in the blank.There are collision domains in the topology. 12 Refer to the exhibit. A switch with a default configuration connects four hosts. The ARP table for host A is shown. What happens when host A wants to send an IP packet to host D? Host A sends out a broadcast of FF:FF:FF:FF:FF:FF. Every other host connected to the switch receives the broadcast and host D responds with its MAC address. What is the most compressed representation of the IPv6 address 2001:0000:0000:abcd:0000:0000:0000:0001? 2001:0:0:abcd::1 Which three statements are true about full-duplex operation on an Ethernet network? (Choose three.) 1. A dedicated switch port is required for each node.

2. There are no collisions in full-duplex mode.

3. The host network card and the switch port must both be in full-duplex mode. Refer to the exhibit. A network administrator is investigating a lag in network performance and issues the show interfaces fastethernet 0/0 command. Based on the output that is displayed, what two items should the administrator check next? (Choose two.) 1. duplex settings

2. cable lengths What is the purpose of using SSH to connect to a router? It allows a secure remote connection to the router command line interface. When creating an IPv6 static route, when must a next-hop IPv6 address and an exit interface both be specified? when the next hop is a link-local address Which series of commands will cause access list 15 to restrict Telnet access on a router? R1(config)# line vty 0 4 R1(config-line)# access-class 15 in Refer to the exhibit. Host A sends a data packet to host B. What will be the addressing information of the data packet when it reaches host B? Source af:3c:dc:4c:55:66Destination a0:4c:5f:21:33:77Source 172.16.1.10Destination 172.16.2.10Data A network engineer is configuring PAT on a router and has issued the command:ip nat source list 1 interface serial 0/1/0 overload Which additional command is required to specify addresses from the 192.168.128.0/18 network as the inside local addresses? access-list 1 permit 192.168.128.0 0.0.63.255 Refer to the exhibit. How will R1 generate the interface ID portion of the IPv6 address on interface FastEthernet 0/0? by using the interface MAC address with a 16-bit filler Refer to the exhibit. A network administrator is reviewing port and VLAN assignments on switch S2 and notices that interfaces Gi0/1 and Gi0/2 are not included in the output. Why would the interfaces be missing from the output? They are configured as trunk interfaces. A network administrator has been allocated the IPv4 10.10.240.0/20 block of addresses for a LAN. Two devices on two different, but contiguous, subnets on the LAN have been assigned the addresses 10.10.247.1/21 and 10.10.248.10/24, respectively. The administrator has to create a third subnet from the remaining address range. To optimize the use of this address space, the new subnet will follow on directly from the existing subnets. What is the first available host address in the next available subnet? 10.10.249.1 Refer to the exhibit. Interfaces Fa0/2, Fa0/4, and Fa0/6 are connected to users on the data network of a switch named CiscoSwitch. Interface Fa0/24 is connected to a file server on the management network. All other ports are unused. Which security best practice did the administrator forget to configure? Disable autonegotiation on interfaces that are not being utilized as a trunk. Which combination of DTP modes will form a link to allow multiple VLANs? dynamic auto-dynamic desirable A network administrator has recently implemented OSPFv2 across the entire network topology. Which command can be implemented to prevent the forwarding of OSPF messages to Layer 2 switches and hosts on interface Fast Ethernet 0/1, while maintaining network connectivity? R1(config-router)# passive-interface FastEthernet 0/1 A network technician is configuring port security on a LAN switch interface. The security policy requires host MAC addresses to be learned dynamically, stored in the address table, and saved to the switch running configuration. Which command does the technician need to add to the following configuration to implement this policy?

Switch(config)# interface fa0/1 Switch(config-if)# switchport mode access Switch(config-if)# switchport port-security Switch(config-if)# switchport port-security mac-address sticky Match the order of precedence to the process logic that an OSPFv3 network router goes through in choosing a router ID. (Not all options are used.)A. priority 1

B. priority 2

C. priority 3

D. priority 4 1. The router displays a console message to configure the router ID manually. - D

2. The router uses the highest configured IPv4 address of an active interface. - C

3. The router chooses the highest IPv6 address that is configured on the router.

4. The router uses the highest configured IPv4 address of a loopback interface. - B

5. The router uses the explicitly configured router ID if any. - A Refer to the exhibit. OSPFv2 has been configured on router R1, and the router-id command has not been manually configured. When the network administrator reboots router R1, what will be the value of the OSPF router ID? 172.16.1.1 A network administrator has enabled single-area OSPFv3 on a router via the ipv6 router ospf 100 command. Which command will enable this OSPFv3 process on an interface of that router? R1(config-if)# ipv6 ospf 100 area 0 What can a network administrator modify on a router to specify the location from which the Cisco IOS loads? (Choose two.) 1. the startup configuration file

2. the configuration register value Which three statements characterize UDP? (Choose three.) 1. UDP provides connectionless, fast transport of data at Layer 4.

2. UDP relies on application layer protocols for error detection.

3. UDP works well when an application does not need to guarantee delivery of data. Fill in the blank.

A late collision occurs after bits of a frame have been transmitted. 512 Which three statements describe a DHCP Discover message? (Choose three.) 1. The message comes from a client seeking an IP address.

2. The destination IP address is 255.255.255.255.

3. All hosts receive the message, but only a DHCP server replies. Play audio for this termWhich two issues might cause excessive runt and giant frames in an Ethernet network? (Choose two.) 1. a malfunctioning NIC

2. excessive collisions Refer to the exhibit. Which two statements are correct based on the output as shown in the exhibit? (Choose two.) 1. The output is the result of the show ip nat translations command.

2. The host with the address 209.165.200.235 will respond to requests by using a source address of 192.168.10.10.