Close Window Assessment System 1. Assessment Selection 2. Assessment Settings 3. Take Assessment Take Assessment - ENetwork Practice Final Exam - CCNA Exploration: Network Fundamentals (Version 4.0) Time Remaining: 1 Top of Form What are two characteristics of the data link layer? (Choose two.) It segments and reorders the data. It exchanges the frames between nodes. It defines the method by which network devices place data onto the media. It manages the transfer of data between the processes that run on each host. It retrieves signals from the media and restores them to their bit representations. 2 Top of Form
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Close Window
Assessment System
1. Assessment Selection 2. Assessment Settings 3. Take Assessment
Take Assessment - ENetwork Practice Final Exam - CCNA Exploration: Network Fundamentals (Version 4.0)
Time Remaining:
1 Top of FormWhat are two characteristics of the data link layer? (Choose two.)
It segments and reorders the data.
It exchanges the frames between nodes.
It defines the method by which network devices place data onto the media.
It manages the transfer of data between the processes that run on each host.
It retrieves signals from the media and restores them to their bit representations.
Refer to the exhibit. A web browser is running on host PC1 with an IP address 10.10.2.2/24. A dynamic port number of 49152 is assigned to the browser. The browser sends a request for a web page to the web server with an IP address 192.168.1.254/24. Which statement is true?
The session is established using TCP, and the socket number for the web server is 192.168.1.254: 80.
The session is established using TCP, and the socket number for the web server is 192.168.1.254: 49152.
The session is established using UDP, and the socket number for the web server is 192.168.1.254: 80.
The session is established using UDP, and the socket number for the web server is 192.168.1.254: 49152.
3 Top of Form
Refer to the exhibit. Which logical topology describes the exhibited network?
Refer to the exhibit. Host A sends a frame to host C with a destination MAC address CC. The MAC address for host C is not in the MAC table of switch SW1. How will SW1 handle the frame?
Switch SW1 will drop the frame.
Switch SW1 will forward the frame to host C.
Switch SW1 will flood the frame out all ports.
Switch SW1 will flood the frame out all ports except port Fa0/1.
5 Top of Form
Refer to the exhibit. The NAT functionality of the router is enabled to provide Internet access to the PC. However, the PC is still unable to access the Internet. Which IP address should be changed to 209.165.201.1 to enable the PC to access the Internet?
Refer to the exhibit. Host A wants to access the Internet. Which combination of a Layer 2 address and a Layer 3 address will enable this access from host A?
Refer to the exhibit. The PC, the routing table of which is displayed, is configured correctly. To which network device or interface does the IP address 192.168.1.254 belong?
Refer to the exhibit. The host was disconnected from switch 2 and connected to switch 1. Which combination of IP address, subnet mask, and default gateway should be assigned to this host to allow it to function in the network?
IP address: 10.10.9.37 Subnet mask: 255.255.255.240 Default gateway: 10.10.9.35
IP address: 10.10.9.37 Subnet mask: 255.255.255.224 Default gateway: 10.10.9.35
IP address: 10.10.9.29 Subnet mask: 255.255.255.248 Default gateway: 10.10.9.35
IP address: 10.10.9.32 Subnet mask: 255.255.255.224 Default gateway: 10.10.9.35
IP address: 10.10.9.37 Subnet mask: 255.255.255.224 Default gateway: 196.1.105.6
IP address: 10.10.9.63 Subnet mask: 255.255.255.224 Default gateway: 10.10.9.35
9 Top of FormWhich physical connector type is used for a serial V.35 connection to the CSU/DSU?
What is the result of using the clock rate 56000 command at the serial interface of the router?
The interface is configured as a DCE device.
The interface timers are cleared.
The FastEthernet interface is made to emulate a serial interface by assigning it a timing signal.
The IP address for the serial interface is configured.
11 Top of Form
Refer to the exhibit. An administrator on PC1 wants to view some HTML code from a web page housed on the web server. Which client application will allow this request to be started?
Refer to the exhibit. The serial interface of the router was configured with the use of the commands that are shown. The router cannot ping the router that is directly connected to interface serial 0/0/0. What should the network technician do to solve this problem?
Configure the description at interface serial 0/0/0.
Configure an IP address on interface serial 0/0/0.
Remove the no shutdown command at interface serial 0/0/0
Reboot the router.
13 Top of Form
Refer to the exhibit. A PC is connected to a network. Which action will verify that the PC can communicate with its default gateway?
Refer to the exhibit. A technician uses the nslookup command on the PC and views the output that is displayed in the exhibit. What is the IP address of the primary domain name server used by the host?
10.10.10.32
192.168.1.5
192.168.1.99
192.168.2.100
15 Top of FormAs network administrator, what is the subnet mask that allows 510 hosts given the IP address 172.30.0.0?
All contents copyright 1992-2011 Cisco Systems, Inc. Privacy Statement and Trademarks.
Close Window
Assessment System
1. Assessment Selection 2. Assessment Settings 3. Take Assessment
Take Assessment - ENetwork Practice Final Exam - CCNA Exploration: Network Fundamentals (Version 4.0)
Time Remaining:
16 Top of FormA network administrator is asked to design a new addressing scheme for a corporate network. There are 60 users in the main office, 40 users in the branch office, 28 users in manufacturing, 12 in the sales office, and 4 users in the research office. Which VLSM addressing scheme that uses the 192.168.88.0/24 network will fulfill the requirements while wasting the fewest addresses?
Refer to the exhibit. What is required on host A for a network technician to create the initial configuration on Router1?
an FTP client
a Telnet client
a terminal emulation program
a web browser
21Top of Form
A network technician is tasked with setting up a network for six users, but the users should be able to use their accounts to log on from any of the six computers. What type of network should be used?
Refer to the exhibit. Which Layer 2 protocol could be used inside nework A and network C?
IP
TCP
UDP
Ethernet
23Top of Form
What are three characteristics of CSMA/CD? (Choose three.)
It monitors the media for presence of a data signal.
After detecting a collision, hosts can resume transmission after a random timer has expired.
A jam signal is used to ensure that all hosts are aware that a collision has occurred.
Devices can be configured with a higher transmission priority.
Data is transmitted only when the data signal is present.
It uses a token system to avoid collisions.
24 Top of FormBy using the ipconfig command, a network administrator determines that a workstation has the address 192.168.3.38 with 29 bits set in the subnet mask. To what network does the workstation belong?
Refer to the exhibit. Which set of devices contains only intermediary devices?
A, B, D, G
A, B, E, F
C, D, G, I
G, H, I, J
26 Top of FormA network has grown too large for technicians to configure network addresses and hosts files for name resolution. Which two application layer services should be added to the server to allow these needs to be satisfied dynamically? (Choose two.)
DNS
FTP
DHCP
HTTP
SMTP
27Top of Form
Which three IPv4 addresses represent a broadcast for a subnet? (Choose three.)
172.16.4.63 /26
172.16.4.129 /26
172.16.4.191 /26
172.16.4.51 /27
172.16.4.95 /27
172.16.4.221 /27
28 Top of FormWhich statement is true about router hostnames?
A router hostname is configured in privileged executive mode.
A router hostname must be created before any other configurations can be added to the device.
29Top of Form
Refer to the exhibit. Which option shows the correct topology given the configuration of Router1?
30 Top of FormWhile configuring a router, a network technician wants to name the router. Which prompt should the technician see when entering the hostname command?
Refer to the exhibit. Host X is unable to communicate with host Y. Which command can be run at host X to determine which intermediary device is responsible for this failure?
Refer to the exhibit. Which two facts can be determined about the topology? (Choose two.)
Four collision domains are present.
One logical network is represented.
Two broadcast domains are present.
Three networks are needed.
Three logical address ranges are required.
34Top of Form
Refer to the exhibit. A user wants to access the Internet from the PC. A part of the running configuration of the router is shown. Which default gateway IP address should be configured at the PC to enable this access?
Refer to the exhibit. A network administrator is troubleshooting a link that is down between Router1 and Router2. To correct the problem, which wire pairs need to be switched on one of the Ethernet cable ends?
pair 1 and pair 2
pair 1 and pair 3
pair 2 and pair 3
pair 2 and pair 4
43 Top of FormWhich statement is true about the ICMP protocol?
It is an application layer protocol.
It is designed to make IP a reliable protocol.
It is often filtered out of networks for security purposes.
If a host does not respond to an ICMP echo request, the host is not functioning.
44Top of Form
If an administrator wished to return a router to the default state, what additional step must be taken after issuing the command erase start-up config?
Reload the device.
Issue the command copy running-config start-up config.
Perform a show running-config to verify that the file was removed.
Enter the interface commands to allow the device to connect to the network.
Refer to the exhibit. The diagram represents the process of sending email between clients. Select the list below that correctly identifies the component or protocol used at each numbered stage of the diagram.
1.MUA 2.MDA 3.MTA 4.SMTP 5.MTA 6.POP 7.MDA 8.MUA
1.MUA 2.POP 3.MDA 4.SMTP 5.MTA 6.MDA 7.SMTP 8.MUA
1.MUA 2.POP 3.SMTP 4.MDA 5.MTA 6.SMTP 7.POP 8.MUA
1.MDA 2.SMTP 3.MTA 4.SMTP 5.MTA 6.MUA 7.POP 8.MDA
1.MUA 2.SMTP 3.MTA 4.SMTP 5.MTA 6.MDA 7.POP 8.MUA
Top of Form
Showing 3 of 4 <Prev Page: Next>
Bottom of Form
Close Window
All contents copyright 1992-2011 Cisco Systems, Inc. Privacy Statement and Trademarks.
Close Window
Assessment System
1. Assessment Selection 2. Assessment Settings 3. Take Assessment
Take Assessment - ENetwork Practice Final Exam - CCNA Exploration: Network Fundamentals (Version 4.0)
Time Remaining:
46 Top of Form
Refer to the exhibit. The headers added at each layer are shown. Which layer adds the destination and source process numbers to ensure that data is delivered to the correct application?
physical layer
data link layer
network layer
transport layer
47Top of Form
A network administrator wants to restrict access to the router privileged EXEC mode. Which password should the administrator use?
Examine the graphic with current configurations. Host A in the Clerical office failed and was replaced. Although a ping to 127.0.0.1 was successful, the replacement computer cannot access the company network. With proxy ARP disabled on the Fa0/0 interface of the New York router, what is the likely cause of the problem?
network card failure
network cables unplugged
IP address incorrectly entered
subnet mask incorrectly entered
49Top of Form
What is the Cisco IOS?
system software for Cisco devices
Read Only Memory in Cisco devices
non-volatile storage for device configurations
an initial operating system that is used for boot functions
Refer to the exhibit. A network technician has made several changes to R1 since the configuration has last been saved. The modified configuration did not produce the desired changes. The technician wants to store a backup copy of the saved configuration on a TFTP server before reloading. Which action will cause the unmodified data to be saved on the TFTP server?
Top of Form
Showing 4 of 4 <Prev Page: Next>
Bottom of Form
Close Window
All contents copyright 1992-2011 Cisco Systems, Inc. Privacy Statement and Trademarks.