Software and Computer Tips for Everyone

Jul 31, 2009

CCNA 4 Final latest (7/31/2009)

By on 4:35 PM
Thanks Khaled ismael.
If you have CCNA final exam, please send to me at: nguyenhuuhai.it@gmail.com

1.
What are two main components of data confidentiality? (Choose two.)
 check sum
 digital certificates
 encapsulation
 encryption

 hashing

2.
While troubleshooting a problem with an e-mail server, an administrator observes that the switch port used by the server shows "up, line protocol up". The administrator cannot ping the server. At which layer of the OSI model is the problem most likely to be found?
application layer
network layer
data link layer
physical layer

3.
Which combination of authentication and Layer 2 protocol should be used to establish a link between a Cisco and a non-Cisco router without sending authentication information in plain text?
CHAP and HDLC
CHAP and PPP
PAP and HDLC
PAP and PPP

4.
An administrator is configuring a dual stack router with IPv6 and IPv4 using RIPng. The administrator receives an error message when trying to enter the IPv4 routes into RIPng. What is the cause of the problem?
When IPv4 and IPv6 are configured on the same interface, all IPv4 addresses are over-written in favor of the newer technology.
Incorrect IPv4 addresses are entered on the router interfaces.
RIPng is incompatible with dual-stack technology.
IPv4 is incompatible with RIPng.

5.
Which three statements accurately describe attributes of a security policy? (Choose three.)
It creates a basis for legal action if necessary.
It should not be altered once it is implemented.
It defines a process for managing security violations.
It focuses primarily on threats from outside of the organization.
It defines acceptable and unacceptable use of network resources.
It provides step-by-step procedures to harden routers and other network devices.

6.
A technician has been asked to run the Cisco SDM one-step lockdown on a customer router. What will be the result of this process?
It will guarantee that the network is secure.
It will implement all security configurations that Cisco AutoSecure offers.
It will automatically apply all recommended security-related configuration changes.
It will guarantee that all traffic is quarantined and checked for viruses before being forwarded.

7.
Which two functions are provided by the Local Management Interface (LMI) that is used in Frame Relay networks? (Choose two.)
simple flow control
error notification
congestion notification
mapping of DLCIs to network addresses
exchange of information about the status of virtual circuits

8.



Refer to the exhibit. Which statement correctly describes how Router1 processes an FTP request that enters interface s0/0/0 and is destined for an FTP server at IP address 192.168.1.5?
The router matches the incoming packet to the statement that was created by the access-list 201 deny icmp 192.168.1.0 0.0.0.255 any command, continues comparing the packet to the remaining statements in ACL 201 to ensure that no subsequent statements allow FTP, and then the router drops the packet.
The router reaches the end of ACL 101 without matching a condition and drops the packet because there is no statement that was created by the access-list 101 permit ip any any command.
The router matches the incoming packet to the statement that was created by the access-list 101 permit ip any 192.168.1.0 0.0.0.255 command and allows the packet into the router.
It matches the incoming packet to the statement that was created by the access-list 201 permit ip any any command and allows the packet into the router.

9.


Refer to the exhibit. Which statement is true about the CSU/DSU device?
It connects asynchronous devices to a LAN or WAN through network and terminal emulation software.
It uses a multiport internetworking device to switch traffic such as Frame Relay, ATM, or X.25 over the WAN.
It provides termination for the digital signal and ensures connection integrity through error correction and line monitoring.
It converts the digital signals produced by a computer into voice frequencies that can be transmitted over the analog lines of the public telephone network.

10.


Refer to the exhibit. From the output of the show interfaces and ping commands, at which layer of the OSI model is a fault indicated?
application
transport
network
data link
physical

11.


Refer to the exhibit. A network administrator is trying to backup the IOS software on R1 to the TFTP server. He receives the error message that is shown in the exhibit, and cannot ping the TFTP server from R1. What is an action that can help to isolate this problem?
Use correct source file name in the command.
Verify that the TFTP server software is running.
Make sure that there is enough room on the TFTP server for the backup.
Check that R1 has a route to the network where the TFTP server resides.

12.


Refer to the exhibit. Router1 is not able to communicate with its peer that is connected to this interface. Based on the output as shown, what is the most likely cause?
interface reset
unplugged cable
improper LMI type
PPP negotiation failure

13.
A technician is talking to a colleague at a rival company and comparing DSL transfer rates between the two companies. Both companies are in the same city, use the same service provider, and have the same rate/service plan. What is the explanation for why company 1 reports higher download speeds than company 2 reports?
Company 1 only uses microfilters at branch locations.
Company 1 has a lower volume of POTS traffic than company 2 has.
Company 2 is located farther from the service provider than company 1 is.
Company 2 shares the connection to the DSLAM with more clients than company 1 shares with.

14.


Refer to the exhibit. What is placed in the address field in the header of a frame that will travel from the DC router to the Orlando router?
DLCI 123
DLCI 321
10.10.10.25
10.10.10.26
MAC address of the Orlando router

15.
When NAT is in use, what is used to determine the addresses that can be translated on a Cisco router?
access control list
routing protocol
inbound interface
ARP cache

16.
A network administrator is tasked with maintaining two remote locations in the same city. Both locations use the same service provider and have the same service plan for DSL service. When comparing download rates, it is noticed that the location on the East side of town has a faster download rate than the location on the West
side of town. How can this be explained?
The West side has a high volume of POTS traffic.
The West side of town is downloading larger packets.
The service provider is closer to the location on the East side.
More clients share a connection to the DSLAM on the West side.

17.
What are the symptoms when the s0/0/0 interface on a router is attached to an operational CSU/DSU that is generating a clock signal, but the far end router on the point-to-point link has not been activated?
show controllers indicates cable type DCE V.35. show interfaces s0/0/0 indicates serial down, line protocol down. 
show controllers indicates cable type DCE V.35. show interfaces s0/0/0 indicates serial up, line protocol down.
show controllers indicates cable type DTE V.35. show interfaces s0/0/0 indicates serial up, line protocol down.
show controllers indicates cable type DTE V.35. show interfaces s0/0/0 indicates serial down, line protocol down.

18.
A technician has been asked to run Cisco SDM one-step lockdown on the router of a customer. What will be the result of this process?
Traffic is only forwarded from SDM-trusted Cisco routers.
Security testing is performed and the results are saved as a text file stored in NVRAM.
The router is tested for potential security problems and any necessary changes are made.
All traffic entering the router is quarantined and checked for viruses before being forwarded.

19.


Refer to the exhibit. Which statement is true about the Frame Relay connection?
The Frame Relay connection is in the process of negotiation.
A congestion control mechanism is enabled on the Frame Relay connection.
The “ACTIVE” status of the Frame Relay connection indicates that the network is experiencing congestion.
Only control FECN and BECN bits are sent over the Frame Relay connection. No data traffic traverses the link.

20.
Which two statements are true about creating and applying access lists? (Choose two.)
There is an implicit deny at the end of all access lists.
One access list per port, per protocol, per direction is permitted.

Access list entries should filter in the order from general to specific.
The term "inbound" refers to traffic that enters the network from the router interface where the ACL is applied.
Standard ACLs should be applied closest to the source while extended ACLs should be applied closest to the destination.

21.
A system administrator must provide Internet connectivity for ten hosts in a small remote office. The ISP has assigned two public IP addresses to this remote office. How can the system administrator configure the router to provide Internet access to all ten users at the same time?
Configure static NAT.
Configure dynamic NAT.
Configure static NAT with overload.
Configure dynamic NAT with overload.

22.
What are two effective measures for securing routers? (Choose two.)
Protect all active router interfaces by configuring them as passive interfaces.
Configure remote administration through VTY lines for Telnet access.
Use quotes or phrases to create pass phrases.
Disable the HTTP server service
.
Enable SNMP traps.

23.


Refer to the exhibit. A network administrator has issued the commands that are shown on Router1 and Router2. A later review of the routing tables reveals that neither router is learning the LAN network of the neighbor router. What is most likely the problem with the RIPng configuration?
The serial interfaces are in different subnets.
The RIPng process is not enabled on interfaces.
The RIPng processes do not match between Router1 and Router2.
The RIPng network command is missing from the IPv6 RIP configuration.

24.
Because of a remote-procedure call failure, a user is unable to access an NFS server. At what layer of the TCP/IP model does this problem occur?
network layer
data link layer
physical layer
application layer

25.
What will be the result of adding the command ip dhcp excluded-address 192.168.24.1 192.168.24.5 to the configuration of a local router that has been configured as a DHCP server?
Traffic that is destined for 192.168.24.1 and 192.168.24.5 will be dropped by the router.
Traffic will not be routed from clients with addresses between 192.168.24.1 and 192.168.24.5.
The DHCP server will not issue the addresses ranging from 192.168.24.1 to 192.168.24.5.
The router will ignore all traffic that comes from the DHCP servers with addresses 192.168.24.1 and 192.168.24.5.

26.


Refer to the exhibit. A network administrator is trying to configure a router to use SDM. After this configuration shown in the exhibit is applied, the SDM interface of the router is still not accessible. What is the cause of the problem?
The username and password are not configured correctly.
The authentication method is not configured correctly.
The HTTP timeout policy is not configured correctly.
The vtys are not configured correctly.

27.


Refer to the exhibit. A technician issues the show interface s0/0/0 command on R1 while troubleshooting a network problem. What two conclusions can be determined by from the output shown? (Choose two.)
The bandwidth has been set to the value of a T1 line.
This interface should be configured for PPP encapsulation.
There is no failure indicated in an OSI Layer 1 or Layer 2.
The physical connection between the two routers has failed.
The IP address of S0/0/0 is invalid, given the subnet mask being used.

28.


Refer to the exhibit. Which DHCP requests will R1 answer?
all DHCP requests that R1 receives
requests that are broadcast to 10.0.1.255
DNS requests with a destination of 10.0.1.3
requests that are received on the FastEthernet 0/0 interface
requests that come from any networks that are not listed as excluded

29.


Refer to the exhibit. Why are the routers unable to establish a PPP session?
The usernames are misconfigured.
The IP addresses are on different subnets.
The clock rate is configured on the wrong end of the link.
The CHAP passwords must be different on the two routers.
Interface serial 0/0/0 on Router1 must connect to interface serial 0/0/1 on Router2.

30.
A network administrator is instructing a technician on best practices for applying ACLs. Which suggestion should the administrator provide?
Named ACLs are less efficient than numbered ACLs.
Standard ACLs should be applied closest to the core layer.
ACLs applied to outbound interfaces are the most efficient.
Extended ACLs should be applied closest to the source that is specified by the ACL.

31.
Which variable is permitted or denied by a standard access control list?
protocol type
source IP address
source MAC address
destination IP address
destination MAC address

32.
What are two LCP options that can be configured for PPP? (Choose two.)
EAP
CHAP
IPCP
CDPCP
stacker

33.
What can a network administrator do to recover from a lost router password?
use the copy tftp: flash: command 
boot the router to bootROM mode and enter the b command to load the IOS manually
telnet from another router and issue the show running-config command to view the password
boot the router to ROM monitor mode and configure the router to ignore the startup configuration when it initializes

34.


Refer to the exhibit. An ACL called Managers already exists on this router. What happens if the network administrator issues the commands as shown in the exhibit?
The new ACL overwrites the existing ACL.
The network administrator will receive an error message.
The existing ACL is modified to include the new command.
A second Managers ACL is created that contains only the new command.

35.
Which statement is true about wildcard masks?
Inverting the subnet mask will always create the wildcard mask.
The wildcard mask performs the same function as a subnet mask.
A network or subnet bit is identified by a "1" in the wildcard mask.
IP address bits that must be checked are identified by a "0" in the wildcard mask.

36.


Refer to the exhibit. Branch A has a non-Cisco router that is using IETF encapsulation and Branch B has a Cisco router. After the commands that are shown are entered, R1 and R2 fail to establish the PVC. The R2 LMI is Cisco, and the R1 LMI is ANSI. The LMI is successfully established at both locations. Why is the PVC failing?
The PVC to R1 must be point-to-point.
LMI types must match on each end of a PVC.
The frame relay PVCs cannot be established between Cisco and non-Cisco routers.
The IETF parameter is missing from the frame-relay map ip 10.10.10.1 201 command.

37.
When configuring a Frame Relay connection, what is the purpose of Inverse ARP?
to assign a DLCI to a remote peer
to disable peer requests from determining local Layer 3 addresses
to negotiate LMI encapsulations between local and remote Frame Relay peers
to create a mapping of DLCI to Layer 3 addresses that belong to remote peers

38.


Refer to the exhibit. A network administrator is tasked with completing the Frame Relay topology that interconnects two remote sites. How should the point-to-point subinterfaces be configured on HQ to complete the topology?
frame-relay interface-dlci 103 on Serial 0/0/0.1
frame-relay interface-dlci 203 on Serial 0/0/0.2
frame-relay interface-dlci 301 on Serial 0/0/0.1 
frame-relay interface-dlci 302 on Serial 0/0/0.2

frame-relay map ip 192.168.1.1 103 broadcast on Serial 0/0/0.1 
frame-relay map ip 192.168.2.2 203 broadcast on Serial 0/0/0.2
frame-relay map ip 192.168.1.1 301 broadcast on Serial 0/0/0.1 
frame-relay map ip 192.168.2.2 302 broadcast on Serial 0/0/0.2

39.
A technician is editing and reapplying ACL 115 to a router, what is the result of adding the command access-list 115 permit tcp any 172.16.0.0 0.0.255.255 established to the ACL when it is reapplied to the router?
All traffic that comes from 172.16.0.0/16 will be allowed.
All TCP traffic that is destined for 172.16.0.0/16 is permitted.
Any SYN packets that are sent to 172.16.0.0/16 will be permitted.
Responses to traffic that originates from the 172.16.0.0/16 network are allowed.

40.
Which encapsulation protocol when deployed on a Cisco router over a serial interface is only compatible with another Cisco router?
PPP
SLIP
HDLC
Frame Relay

41.


Refer to the exhibit. Partial results of the show access-lists and show ip interface FastEthernet 0/1 commands for router Router1 are shown. There are no other ACLs in effect. Host A is unable to telnet to host B. Which action will correct the problem but still restrict other traffic between the two networks?
Apply the ACL in the inbound direction.
Apply the ACL on the FastEthernet 0/0 interface.
Reverse the order of the TCP protocol statements in the ACL.
Modify the second entry in the list to permit tcp host 172.16.10.10 any eq telnet .

42.


Refer to the exhibit. Company ABC expanded its business and recently opened a new branch office in another country. IPv6 addresses have been used for the company network. The data servers Server1 and Server2 run applications which require end-to-end functionality, with unmodified packets that are forwarded from the source to the destination. The edge routers R1 and R2 support dual stack configuration. What solution should be deployed at the edge of the company network in order to successfully interconnect both offices?
a new WAN service supporting only IPv6
NAT overload to map inside IPv6 addresses to outside IPv4 address
a manually configured IPv6 tunnel between the edge routers R1 and R2
static NAT to map inside IPv6 addresses of the servers to an outside IPv4 address and dynamic NAT for
the rest of the inside IPv6 addresses

43.


Refer to the exhibit. Communication between two peers has failed. Based on the output that is shown, what is the most likely cause?
interface reset
unplugged cable
improper LMI type
PPP negotiation failure

44.


Refer to the exhibit. A host connected to Fa0/0 is unable to acquire an IP address from this DHCP server. The output of the debug ip dhcp server command shows "DHCPD: there is no address pool for 192.168.1.1". What is the problem?
The 192.168.1.1 address has not been excluded from the DHCP pool.
The pool of addresses for the 192 Network pool is incorrect.
The default router for the 192Network pool is incorrect.
The 192.168.1.1 address is already configured on Fa0/0.

45.
What are two major characteristics of a worm? (Choose two.)
 exploits known vulnerabilities
 attaches itself to another program
 executed by a predefined time or event
 masquerades as an accepted program
 copies itself to the host and selects new targets

46.
While configuring a Frame Relay connection, when should a static Frame Relay map be used?
the remote router is a non-Cisco router
the local router is configured with subinterfaces
broadcast traffic and multicast traffic over the PVC must be controlled
globally significant rather than locally significant DLCIs are being used

47.
What is the result when the command permit tcp 192.168.4.0 0.0.3.255 any eq 23 is entered in a named access control list and applied on the inbound interface of a router?
All traffic from 192.168.4.0/24 larger than 23 bytes is permitted.
FTP traffic from the 192.168.4.0/24 network is permitted.
TCP traffic destined to 192.168.4.0/24 network is permitted.
Telnet traffic originating from 192.168.4.0/22 is permitted out.

48.
Where does a service provider assume responsibility from a customer for a WAN connection?
local loop
DTE cable on router
demarcation point
demilitarized zone

49.


Refer to the exhibit. The network administrator creates a standard access control list on Router1 to prohibit traffic from the 172.16.1.0/24 network from reaching the 172.16.2.0/24 network while still permitting Internet access for all networks. On which router interface and in which direction should it be applied?
interface Fa0/0, inbound
interface Fa0/0, outbound
interface Fa0/1, inbound
interface Fa0/1, outbound

50.
A network administrator has changed the VLAN configurations on his network switches over the past weekend. How can the administrator determine if the additions and changes improved performance and availability on the company intranet?
Conduct a performance test and compare with the baseline that was established previously.
Interview departmental secretaries and determine if they think load time for web pages has improved.
Determine performance on the intranet by monitoring load times of company web pages from remote sites.
Compare the hit counts on the company web server for the current week to the values that were recorded in previous weeks.

51.


Refer to the exhibit. What can be concluded from the exhibited output of the debug ip nat command?
The 10.10.10.75 host is exchanging packets with the 192.168.0.10 host.
The native 10.1.200.254 address is being translated to 192.168.0.10.
The 192.168.0.0/24 network is the inside network.
Port address translation is in effect.

52.


Refer to the exhibit. RIPv2 has been configured on all routers in the network. Routers R1 and R3 do not receive RIP routing updates. On the basis of the provided configuration, what should be enabled on router R2 to remedy the problem?
proxy ARP
CDP updates
SNMP services
RIP authentication




Jul 28, 2009

Take Assessment - Final Exam - CCNA 3 Switching Basics and Intermediate Routing

By on 9:11 PM
CCNA3 Final latest version
Download here
good luck!
if you like this post, please bookmark this site. thanks

Jul 26, 2009

CCNA Semester 2 final exam latest version

By on 3:36 PM
1
Which two components are used to determine the router ID in the configuration of the OSPF routing process? (Choose two.)
the IP address of the first FastEthernet interface
the highest IP address of any logical interface
(true answer)the highest IP address of any physical interface
the default gateway IP address
(true answer)the priority value of 1 on any physical interface

2
Refer to the exhibit. R2 is configured correctly. The network administrator has configured R1 as shown. Which two facts are true about the forwarding of route information by R1? (Choose two.)
(true answer)R1 will forward the route information for subnet 192.168.100.0/30. (true answer) R1 will not forward route information for subnet 192.168.100.4/30.
R1 will forward the route information with an administrative distance set to 50.
R1 will forward the summarized route information for network 192.168.100.0/24.
R1 will forward route information for subnet 10.10.10.0/30 out the serial interface.

3
Refer to the exhibit. Which two statements are true based on the exhibited output? (Choose two.)
(true answer)All routes are stable.
Each route has one feasible successor.
The serial interface between the two routers is down.
The administrative distance of EIGRP has been set to 50.
(true answer)The show ip eigrp topology command has been run on R1.


4
A router has learned two equal cost paths to a remote network via the EIGRP and RIP protocols. Both protocols are using their default configurations. Which path to the remote network will be installed in the routing table?
(true answer)the path learned via EIGRP
the path learned via RIP
the path with the highest metric value
both paths with load balancing

5
Refer to the exhibit. Routers R1 and R3 use different routing protocols with default administrative distance values. All devices are properly configured and the destination network is advertised by both protocols. Which path will be used to transmit the data packets from PC1 to PC2?
(true answer)The packets will travel via R2-R1.
The packets will travel via R2-R3.
The traffic will be load-balanced between two paths via R2-R1 and via R2-R3.
The packets will travel via R2-R3, and the other path via R2-R1 will be retained as the backup path.

6
Which statement is true about the RIPv1 protocol?
It is a link-state routing protocol.
(true answer)It excludes subnet information from the routing updates.
It uses the DUAL algorithm to insert backup routes into the topology table.
It uses classless routing as the default method on the router.

7
What is the function of the OSPF LSR packet?
It is used to confirm the receipt of LSUs.
It is used to establish and maintain adjacency with other OSPF routers.
(true answer)It is used by the receiving routers to request more information about any entry in the DBD.
It is used to check the database synchronization between routers

8
Refer to the exhibit. A network administrator is accessing router R1 from the console port. Once the administrator is connected to the router, which password should the administrator enter at the R1> prompt to access the privileged EXEC mode?
Cisco001
Cisco123
(true answer)Cisco789
Cisco901

9
Which two technologies can be used in distance vector routing protocols to prevent routing loops? (Choose two.)
authentication
link-state advertisements
(true answer)hold-down timers
Spanning Tree Protocol
(true answer)split horizon

10
Refer to the exhibit. An administrator is adding a new subnet of 50 hosts to R3. Which subnet address should be used for the new subnet that provides enough addresses while wasting a minimum of addresses?

192.168.1.0/24
192.168.1.48 /28
192.168.1.32/27
(true answer)192.168.1.64/26

11
Refer to the exhibit. Host A is unable to access the Internet. What is the reason for this?
(true answer)192.168.1.64/26
The IP address of host A is incorrect.
The default gateway of host A is incorrect.
(true answer)The Fa0/1 interfaces of the two routers are configured for different subnets.
The subnet mask for the Fa0/0 interface of R1 is incorrect.

12
A network administrator uses the RIP routing protocol to implement routing within an autonomous system. What are two characteristics of this protocol? (Choose two.)
(true answer)It uses the Bellman-Ford algorithm to determine the best path.
It displays an actual map of the network topology.
It offers rapid convergence in large networks.
(true answer)It periodically sends complete routing tables to all connected devices.
It is beneficial in complex and hierarchically designed networks.

13
Refer to the exhibit. What is the meaning of the highlighted value 2?
It is the administrative distance of the routing protocol.
(true answer)It is the number of hops between R2 and the 192.168.8.0/24 network.
It is the value used by the DUAL algorithm to determine the bandwidth for the link.
It is the convergence time measured in seconds.

14
Refer to the exhibit. Packets destined to which two networks will require the router to perform a recursive lookup? (Choose two.)
(true answer)10.0.0.0/8
64.100.0.0/16
128.107.0.0/16
172.16.40.0/24
192.168.1.0/24
(true answer)192.168.2.0/24

15
Refer to the exhibit. The 10.4.0.0 network fails. What mechanism prevents R2 from receiving false update information regarding the 10.4.0.0 network?
(true answer)split horizon
hold-down timers
route poisoning
triggered updates

16
Refer to the exhibit. The routers are properly configured using a dynamic routing protocol with default settings, and the network is fully converged. Router A is forwarding data to router E. Which statement is true about the routing path?
(true answer)If the network uses the RIP protocol, router A will determine that all paths have equal cost.
If the network uses the RIP protocol, router A will update only the A-C-E path in its routing table.
If the network uses the EIGRP routing protocol, router A will determine that path A-D-E has the lowest cost.
If both RIP and EIGRP protocols are configured on router A, the router will use the route information that is
learned by the RIP routing protocol.

17
Refer to the exhibit. All routers are running the same routing protocol. Based on the exhibit and its displayed commands, which statement is true?
The wildcard mask is incorrectly configured.
A default route must be configured on every router.
Routers B, C, and D have no access to the Internet.
(true answer)The link to the ISP is not advertised by the routing protocol process.

18
Refer to the exhibit. A ping between host A and host B is successful, but pings from host A to operational hosts on the Internet fail. What is the reason for this problem?
The FastEthernet interface of R1 is disabled.
(true answer)One of the default routes is configured incorrectly.
A routing protocol is not configured on both routers.
The default gateway has not been configured on host A.

19
Refer to the exhibit. While trying to diagnose a routing problem in the network, the network administrator runs the debug ip rip command. What can be determined from the output of this command?
The router is broadcasting RIP updates.
The router will be unable to ping 192.168.1.2.
The router is directly connected to network 172.16.1.0 /24.
(true answer)The router has two interfaces that participate in the RIP process.

20
A router boots and enters setup mode. What is the reason for this?
The IOS image is corrupt.
Cisco IOS is missing from flash memory.
(true answer)The configuration file is missing from NVRAM.
The POST process has detected hardware failure.

21
Refer to the exhibit. Which three statements are true of the routing table for Router1? (Choose three.)
The route to network 172.16.0.0 has an AD of 156160.
Network 192.168.0.16 can best be reached using FastEthernet0/0.
(true answer)The AD of EIGRP routes has been manually changed to a value other than the default value.
(true answer)Router1 is running both the EIGRP and OSPF routing process. (true answer) Network 172.17.0.0 can only be reached using a default route. (true answer) 
(true answer)No default route has been configured.

22
A network administrator has enabled RIP on routers B and C in the network diagram. Which of the following commands will prevent RIP updates from being sent to Router A?
A(config)# router rip
A(config-router)# passive-interface S0/0
B(config)# router rip
B(config-router)# network 192.168.25.48
B(config-router)# network 192.168.25.64
A(config)# router rip
A(config-router)# no network 192.168.25.32
(true answer)B(config)# router rip
(true answer)B(config-router)# passive-interface S0/0
(true answer) A(config)# no router rip

23
Refer to the exhibit. The show cdp neighbors command was run at R1. Which two facts about the newly detected device can be determined from the output? (Choose two.)
(true answer)ABCD is a router that is connected to R1.
ABCD is a non-CISCO device that is connected to R1.
(true answer)The device is connected at the Serial0/0/1 interface of R1.
R1 is connected at the S0/0/1 interface of device ABCD.
ABCD does not support switching capability.


24
Which statement is true about the metrics used by routing protocols?
(true answer)A metric is a value used by a particular routing protocol to compare paths to remote networks.
(true answer) A common metric is used by all routing protocols.
The metric with the highest value is installed in the routing table.
The router may use only one parameter at a time to calculate the metric.

25
Refer to the exhibit. What action will R2 take for a packet that is destined for 192.168.2.0?
It will drop the packet.
It will forward the packet via the S0/0/0 interface.
It will forward the packet via the Fa0/0 interface.
(true answer)It will forward the packet to R1.

26
Which two router component and operation pair are correctly described? (Choose two.)
DRAM - loads the bootstrap
RAM - stores the operating system
Flash - executes diagnostics at bootup
(true answer)NVRAM - stores the configuration file
ROM - stores the backup configuration file
(true answer)POST - runs diagnostics on hardware modules

27
Which two statements are true about the EIGRP successor route? (Choose two.)
It is saved in the topology table for use if the primary route fails.
(true answer)It may be backed up by a feasible successor route. (true answer) 
(true answer)It is used by EIGRP to forward traffic to the destination.
It is flagged as active in the routing table.
After the discovery process has occurred, the successor route is stored in the neighbor table.

28
Refer to the exhibit. Which two facts can be derived from this output? (Choose two.)
(true answer)Three network devices are directly connected to Router2.
(true answer) The serial interface between Router2 and Router3 is up.
Router1 and Router3 are directly connected.
Six devices are up and running on the network.
Layer 3 functionality between routers is configured properly.

29
In a lab test environment, a router has learned about network 172.16.1.0 through four different dynamic routing processes. Which route will be used to reach this network?
(true answer)D 172.16.1.0/24 [90/2195456] via 192.168.200.1, 00:00:09, Serial0/0/0
O 172.16.1.0/24 [110/1012] via 192.168.200.1, 00:00:22, Serial0/0/0
R 172.16.1.0/24 [120/1] via 192.168.200.1, 00:00:17, Serial0/0/0
I 172.16.1.0/24 [100/1192] via 192.168.200.1, 00:00:09, Serial0/0/0

30
Which three statements are true regarding the encapsulation and de-encapsulation of packets when traveling through a router? (Choose three.)
(true answer)The router modifies the TTL field, decrementing it by one.
The router changes the source IP to the IP of the exit interface.
(true answer)The router maintains the same source and destination IP.
(true answer) The router changes the source physical address to the physical address of the exit interface.
The router changes the destination IP to the IP of the exit interface.
The router sends the packet out all other interfaces, besides the one it entered the router on.

31
Refer to the exhibit. Both routers are using the RIPv2 routing protocol and static routes are undefined. R1 can ping 192.168.2.1 and 10.1.1.2, but is unable to ping 192.168.4.1. What is the reason for the ping failure?
The serial interface between two routers is down.
R2 is not forwarding the routing updates.
(true answer)The 192.168.4.0 network is not included in the RIP configuration of R2.RIPv1 needs to be configured.

32
Refer to the exhibit. Two routers are unable to establish an adjacency. What is the possible cause for this?
The two routers are connected on a multiaccess network.
(true answer)The hello and dead intervals are different on the two routers. (true answer) They have different OSPF router IDs.
They have different process IDs.

33
Refer to the exhibit. Routers R1 and R2 are directly connected via their serial interfaces and are both running the EIGRP routing protocol. R1 and R2 can ping the directly connected serial interface of their neighbor, but they cannot form an EIGRP neighbor adjacency. What action should be taken to solve this problem?
Enable the serial interfaces of both routers.
Configure EIGRP to send periodic updates.
Configure the same hello interval between the routers.
(true answer)Configure both routers with the same EIGRP process ID.

34
Refer to the exhibit. R1 and R2 are unable to establish an adjacency. What two configuration changes will correct the problem? (Choose two.)
Set a lower priority on R2.
(true answer)Configure the routers in the same area.
Set a lower cost on R2 compared to R1.
Add a backup designated router to the network.
(true answer)Match the hello and dead timers on both routers.

35
Refer to the exhibit. All routers are properly configured to use the EIGRP routing protocol with default settings, and the network is fully converged. Which statement correctly describes the path that the traffic will use from the 10.1.1.0/24 network to the 10.1.2.0/24 network?
It will use the A-D path only.
It will use the path A-D, and the paths A-C-D and A-B-D will be retained as the backup paths.
It will use all the paths equally in a round-robin fashion.
(true answer)The traffic will be load-balanced between A-B-D and A-C-D.

36
Refer to the exhibit. Which router is advertising subnet 172.16.1.32/28?
Router1
Router2
Router3
(true answer)Router4

37
Refer to the exhibit. The hosts that are connected to R2 are unable to ping the hosts that are connected to R1. How can this problem be resolved?
Configure the router ID on both routers.
(true answer)Configure the R2 router interfaces for area 0.
Configure a loopback interface on both routers.
Configure the proper subnet masks on the router interfaces.

38
Refer to the exhibit. The network has three connected routers: R1, R2, and R3. The routes of all three routers are displayed. All routers are operational and pings are not blocked on this network. Which ping will fail?
from R1 to 172.16.1.1
(true answer)from R1 to 192.168.3.1
from R2 to 192.168.1.1
from R2 to 192.168.3.1

39
Refer to the exhibit. Router R2 is configured properly and all interfaces are functional. Router R1 has been installed recently. Host A is unable to ping host B. Which procedure can resolve this problem?
Configure a static route on R1 using the IP address of the serial interface on R1.
Configure a default route on R1 with the exit interface Fa0/0 on R1.
(true answer)Configure a static route on R1 using the IP address of S0/0/0 on R2.
Configure a default route on R1 using the IP address of Fa0/0 on R2.

40
Refer to the exhibit. To implement the RIPv2 protocol, the network administrator runs the commands as displayed. However, the show ip protocol command fails to display any output. How can the administrator solve the problem that is indicated by the lack of output from this command?
Include the default-information originate command.
Include the no auto-summary command.
(true answer)Specify the network for which RIP routing has to be enabled.
Implement RIPv2 authentication in the network.

41
Refer to the exhibit. A router learns a route to the 192.168.6.0 network, as shown in the output of the show ip rip database command. However, upon running the show ip route command, the network administrator sees that the router has installed a different route to the 192.168.6.0 network learned via EIGRP. What could be the reason for the missing RIP route?
(true answer)Compared to RIP, EIGRP has a lower administrative distance.
Compared to EIGRP, RIP has a higher metric value for the route.
Compared to RIP, the EIGRP route has fewer hops.
Compared to RIP, EIGRP has a faster update timer.

42
Refer to the exhibit. A network administrator has configured R1 as shown, and all interfaces are functioning correctly. A
ping from R1 to 172.16.1.1 fails. What could be the cause of this problem?
The serial interface on R1 is configured incorrectly.
(true answer)The default route is configured incorrectly.
The default-information originate command must be issued on R1.
Autosummarization must be disabled on R1.

43
Refer to the exhibit. A network administrator wants to reduce the size of the routing table of R1. Which partial routing table entry in R1 represents the route summary for R2, without including any additional subnets?
10.0.0.0/16 is subnetted, 1 subnets
D 10.5.0.0[90/205891] via 192.168.1.2, S0/0/0
10.0.0.0/24 is subnetted, 4 subnets
D 10.5.0.0[90/205198] via 192.168.1.2, S0/0/0
(true answer)10.0.0.0/22 is subnetted, 1 subnets
(true answer)D 10.5.0.0[90/205901] via 192.168.1.2, S0/0/0
10.0.0.0/8 is subnetted, 4 subnets
D 10.5.0.0[90/205001] via 192.168.1.2, S0/0/0

44
Which two statements are true for link-state routing protocols? (Choose two.)
(true answer)Routers that run a link-state protocol can establish a complete topology of the network.
Routers in a multipoint network that run a link-state protocol can exchange routing tables.
Routers use only hop count for routing decisions.
(true answer)The shortest path first algorithm is used.
Split horizon is used to avoid routing loops.

45
Refer to the exhibit. Which two components are required to complete the configuration? (Choose two.)
a crossover cable
a DCE device
(true answer)a DTE device
a modem
(true answer)a V.35 cable


46

Refer to the exhibit. The output of the show ip route command for router R1 is displayed. What action will the router take
for a packet that is destined for 192.168.1.5?
(true answer)It will drop the packet.
It will forward the packet to interface Serial0/0/0.
It will determine the route for the packet through a routing protocol.
It will forward the packet to the default gateway.

47
Refer to the exhibit. A network administrator has run the show interface command. The output of this command is displayed. What is the first step that is required to make this interface operational?
Switch the cable with a known working cable.
(true answer)Issue the no shutdown command on the interface.
Configure the interface as a loopback interface.
Set the encapsulation for the interface.

48
What are two tasks that must be completed before two routers can use OSPF to form a neighbor adjacency? (Choose two.)
The routers must elect a designated router.
(true answer)The routers must agree on the network type.
(true answer) The routers must use the same dead interval.
The routers must exchange link state requests.
The routers must exchange database description packets.

49
Refer to the exhibit. All interfaces are addressed and functioning correctly. The network administrator runs the tracert command on host A. Which two facts could be responsible for the output of this command? (Choose two.)
The gateway for Host A is missing or improperly configured.
The gateway for Host B is missing or improperly configured.
The entry for 192.168.1.0/24 is missing from the routing table of R1.
(true answer)The entry for 192.168.1.0/24 is missing from the routing table of R2. (true answer) 
(true answer)The entry for 192.168.2.0/24 is missing from the routing table of R1. The entry for 192.168.2.0/24 is missing from the routing table of R2.

50
Refer to the exhibit. How many routes are ultimate routes?
(true answer)3
4
5
7

51
Refer to the exhibit. Which summarization should R1 use to advertise its networks to R2?
192.168.1.0/24
192.168.0.0/24
(true answer)192.168.0.0/22
192.168.1.0/22

52
How does route poisoning prevent routing loops?
New routing updates are ignored until the network has converged.
(true answer)Failed routes are advertised with a metric of infinity.
A route is marked as unavailable when its Time to Live is exceeded.
The unreachable route is cleared from the routing table after the invalid timer expires.

53
What are two functions of a router? (Choose two.)
(true answer)It forwards data packets toward their destination.
It forwards the packet to the destination if the TTL value is 0.
It changes the destination IP address of data packets before forwarding them to an exit interface.
It determines the best path based on the destination MAC address.
(true answer)It acts as an intersection between multiple IP networks.




54
Which routing protocol maintains a topology table separate from the routing table?
IGRP
RIPv1
RIPv2
(true answer)EIGRP

55
Refer to the exhibit. All routers are running RIPv1. The two networks 10.1.1.0/29 and 10.1.1.16/29 are unable to access each other. What can be the cause of this problem?
Because RIPv1 is a classless protocol, it does not support this access.
(true answer)RIPv1 does not support discontiguous networks.
RIPv1 does not support load balancing.
RIPv1 does not support automatic summarization.

56
Which two statements are correct about the split horizon with poison reverse method of routing loop prevention? (Choose two.)
It is enabled by default on all Cisco IOS implementations.
(true answer)It assigns a value that represents an infinite metric to the poisoned route.
It sends back the poisoned route update to the same interface from where it was received.
It instructs routers to hold all changes that might affect routes, for a specified period of time.
(true answer)It limits the number of hops a packet can traverse through the network before it is discarded.

57
What are two reasons for the occurrence of a routing loop? (Choose two.)
slow convergence
(true answer)incorrectly configured static routes
routes that are learned via two routing protocols
(true answer)static and dynamic routing being used on the same router
lack of a default route on the router that connects to the Internet

58
All routers in a network are configured in a single OSPF area with the same priority value. No loopback interface has been set on any of the routers. Which secondary value will the routers use to determine the router ID?
The highest MAC address among the active interfaces of the network will be used.
There will be no router ID until a loopback interface is configured.
The highest IP address among the active FastEthernet interfaces that are running OSPF will be used.
(true answer)The highest IP address among the active interfaces will be used.

59
Refer to the exhibit. Although R2 is configured correctly, host A is unable to access the Internet. What are two static routes that can be configured on R1, either of which would enable Internet connectivity for host A? (Choose two.)

ip route 0.0.0.0 0.0.0.0 Fa0/0
(true answer)ip route 0.0.0.0 0.0.0.0 Fa0/1
ip route 0.0.0.0 0.0.0.0 10.1.1.1
(true answer)ip route 0.0.0.0 0.0.0.0 10.1.1.2
ip route 209.165.202.0 255.255.255.0 10.1.1.1

CCNA 1 Final (Latest version 100%)

By on 2:49 PM
1  
Refer to the exhibit. A router, the table of which is shown, receives a packet that is destined for
192.168.9.4. How will the router treat the packet?
  It will drop the packet.
  It will forward the packet via FastEthernet 0/1.
  It will forward the packet to the next hop address.
  It will forward the packet to 172.16.2.0
2
Refer to the exhibit. The diagram represents the process of sending e-mail between clients. Which list
correctly identifies the component or protocol used at each numbered stage of the diagram?
  1.MUA 2.MDA 3.MTA 4.SMTP 5.MTA 6.POP 7.MDA 8.MUA
  1.MUA 2.POP 3.MDA 4.SMTP 5.MTA 6.MDA 7.SMTP 8.MUA
  1.MUA 2.POP 3.SMTP 4.MDA 5.MTA 6.SMTP 7.POP 8.MUA
  1.MUA 2.SMTP 3.MTA 4.SMTP 5.MTA 6.MDA 7.POP 8.MUA
3  
During the encapsulation process, what identifiers are added at the transport layer?
  source and destination IP addresses
  source and destination MAC addresses
  source and destination port numbers
  source and destination channel identifiers


4   

Refer to the exhibit. Host C is able to ping 127.0.0.1 successfully, but is unable to communicate with hosts A and B in the organization. What is the likely cause of the problem?
  Hosts A and B are not on the same subnet as host C.
  The IP addresses on the router serial interfaces are wrong.
  The subnet mask on host C is improperly configured.
  The FastEthernet interface fa0/0 of router 1 is wrongly configured.
5  
A routing issue has occurred in your internetwork. Which of the following type of devices should be examined to isolate this error?
  access point
  host
  hub
  router
  switch
6  
Refer to the exhibit. Host A attempts to establish a TCP/IP session with host C. During this attempt, a frame was captured with the source MAC address 0050.7320.D632 and the destination MAC address 0030.8517.44C4. The packet inside the captured frame has an IP source address 192.168.7.5, and the destination IP address is 192.168.219.24. At which point in the network was this packet captured?
  leaving host A
  leaving ATL
  leaving Dallas
  leaving NYC
7
Refer to the exhibit. Host A wants to connect to host B on a different network. Which three IP addresses can be assigned to host A to enable this connectivity? (Choose three.)
  172.16.11.36
  172.16.11.95
  172.16.11.88
  172.16.11.70
  172.16.11.64
  172.16.11.67
8  
Which statement is true about the running configuration file in a Cisco IOS device?
  It affects the operation of the device immediately when modified.
  It is stored in NVRAM.
  It should be deleted using the erase running-config command.
  It is automatically saved when the router reboots.
9  
What three statements are true about network layer addressing? (Choose three.)
  Network layer addressing uses a hierarchy.
  It uses addresses that are 48 bits in length.
  It is used by Ethernet switches to make forwarding decisions.
  It does not support broadcasts.
  It uses a method by which the network portion of an address can be identified.
  Network layer addressing identifies each host distinctly.
10  
Which option represents a point-to-point logical topology diagram?
  
11  
The Layer 4 header contains which type of information to aid in the delivery of data?
  service port number
  host logical address
  device physical address
  virtual connection identifier
12  
Refer to the exhibit. While configuring a network, a technician wired each end of a Category 5e cable as shown. Which two statements are true about this setup? (Choose two.)
  The cable is suitable for connecting a switch to a router Ethernet port.
  The cable is suitable for connecting dissimilar types of devices.
  The cable is unusable and must be rewired.
  The cable is terminated in a way that the transmit pin is wired to the receive pin.
  The cable simulates a point-to-point WAN link.
13  
Which combination of network id and subnet mask correctly identifies all IP addresses from 172.16.128.0 through 172.16.159.255?
  172.16.128.0 255.255.255.224
  172.16.128.0 255.255.0.0
  172.16.128.0 255.255.192.0
  172.16.128.0 255.255.224.0
  172.16.128.0 255.255.255.192
14  
Which OSI layer manages data segments?
  application layer
  presentation layer
  session layer
  transport layer
15  
Refer to the exhibit. A user wants to access the Internet from the PC. A part of the running configuration of the router is shown. Which default gateway IP address should be configured at the PC to enable this access?
  10.1.192.1
  10.1.192.2
  10.1.192.54
  192.31.7.1
16  
Due to a security violation, the router passwords must be changed. What information can be learned from the following configuration entries? (Choose two.)
Router(config)# line vty 0 3
Router(config-line)# password c13c0
Router(config-line)# login
  The entries specify three Telnet lines for remote access.
  The entries specify four Telnet lines for remote access.
  The entries set the console and Telnet password to "c13c0".
  Telnet access will be denied because the Telnet configuration is incomplete.
  Access will be permitted for Telnet using "c13c0" as the password.
17  
Refer to the exhibit. In a network, Hosts A and B are exchanging segments at the transport layer. Which two statements are true about this exchange? (Choose two.)
  Host A is transferring files to host B using FTP.
  Host A will send the next segment containing data for this session starting with byte number 11.
  The segment from the destination host indicates that 11 bytes have been received successfully.
  Host A is initiating a Telnet session to host B.
  Host B can send the next segment of the data starting with byte number 2.
18  
Which three IPv4 addresses represent valid network addresses for a subnet? (Choose three.)
  192.168.9.64/28
  192.168.9.146/28
  192.168.9.96/28
  192.168.9.129/26
  192.168.9.51/26
  192.168.9.64/26
19
Refer to the exhibit. Assume all devices are using default configurations. How many subnets are required to address the topology that is shown?
  1
  3
  4
  5
  7
20  
Refer to the exhibit. Which logical topology best describes the exhibited network?
  star (kalau physical topology baru iki jawabannya) 
  ring
  point-to-point
  bus
  mesh
21  
Refer to the exhibit. The serial interface of the router was configured with the use of the commands that are shown. The router cannot ping the router that is directly connected to interface serial 0/0/0. What should the network technician do to solve this problem?
  Configure the description at interface serial 0/0/0.
  Configure an IP address on interface serial 0/0/0.
  Remove the no shutdown command at interface serial 0/0/0
  Reboot the router.
22
Refer to the exhibit. A host is connected to hub 1. Which combination of IP address, subnet mask, and default gateway can allow this host to function in the network?
  IP address: 172.16.31.36 Subnet mask: 255.255.255.240 Default gateway: 172.16.31.35
  IP address: 172.16.31.63 Subnet mask: 255.255.255.224 Default gateway: 172.16.31.35
  IP address: 172.16.31.29 Subnet mask: 255.255.255.248 Default gateway: 172.16.31.35
  IP address: 172.16.31.32 Subnet mask: 255.255.255.224 Default gateway: 172.16.31.35
  IP address: 172.16.31.29 Subnet mask: 255.255.255.240 Default gateway: 172.16.30.1
  IP address: 172.16.31.37 Subnet mask: 255.255.255.224 Default gateway: 172.16.31.35
23  
Refer to the exhibit. What three statements are true about the IP configuration that is shown? (Choose three.)
  The address that is assigned to the computer represents private addressing.
  The computer is unable to communicate outside of the local network.
  The network of this computer can have 126 hosts.
  The prefix of the computer address is /27.
  The IP address that is assigned to the computer is routable on the Internet.
  The IP address that is assigned to the computer is a broadcast address.
24  
Which OSI layers offers reliable, connection-oriented data communication services?
  application
  presentation
  session
  transport
  network
25  
Which three statements are true about network layer addressing? (Choose three.)
  It uniquely identifies each host.
  It assists in forwarding packets across internetworks.
  It uses a logical 32-bit IPv4 address.
  It is not a configurable address.
  It is a physical address.
  It identifies the host from the first part of the address.
26  
As network administrator, what is the subnet mask that allows 510 hosts given the IP address 172.30.0.0?
  255.255.0.0
  255.255.248.0
  255.255.252.0
  255.255.254.0
  255.255.255.0
  255.255.255.128
27  
Which password is automatically encrypted when it is created?
  vty
  aux
  console
  enable secret
  enable password
28  
Which three statements characterize the transport layer protocols? (Choose three.)
  TCP and UDP port numbers are used by application layer protocols.
  TCP uses port numbers to provide reliable transportation of IP packets.
  UDP uses windowing and acknowledgments for reliable transfer of data.
  TCP uses windowing and sequencing to provide reliable transfer of data.
  TCP is a connection-oriented protocol. UDP is a connectionless protocol.
29  
Which option would be a valid router hostname according to Cisco naming convention guidelines?
  Rtr1_Bldg201
  Building_201
  Router 1
  1st_Floor_Router_409_West_State_Street
 30  
Refer to the exhibit. The NAT functionality of the router is enabled to provide Internet access to the
PC. However, the PC is still unable to access the Internet. Which IP address should be changed to
209.165.201.1 to enable the PC to access the Internet?
  192.168.1.191
  192.168.1.101
  192.168.1.1
  192.168.1.254
31  
Refer to the exhibit. On the basis of the IP configuration that is shown, what is the reason that Host A and Host B are unable to communicate outside the local network?
  Host A was assigned a network address.
  Host B was assigned a multicast address.
  Host A and Host B belong to different networks.
  The gateway address was assigned a broadcast address.
32  
When connectionless protocols are implemented at the lower layers of the OSI model, what is usually used to acknowledge that the data was received and to request the retransmission of missing data?
  IP
  UDP
  Ethernet
  a connectionless acknowledgement
  an upper-layer, connection-oriented protocol or service
33  
Which three addresses belong to the category of public IP addresses? (Choose three.)
  127.0.0.1
  196.1.105.6
  132.11.9.99
  10.0.0.1
  172.16.9.10
  46.1.1.97
34  
Which type of media is immune to EMI and RFI? (Choose two.)
  10 Base-T
  10 Base-2
  10 Base-5
  100 Base-FX
  100 Base TX
  1000 Base LX
35  
Refer to the exhibit. What is required on host A for a network technician to create the initial configuration on Router1?
  an FTP client
  a Telnet client
  a terminal emulation program
  a web browser
36  
Refer to the exhibit. The command that is shown was issued on a PC. What does the IP address 192.168.33.2 represent?
  IP address of the host
  default gateway of the host
  IP address of the homepage for the host
  primary domain name server for the host
  IP address of the website resolver1.mooki.local
37  
Refer to the exhibit. Host X is unable to communicate with host Y. Which command can be run at host X to determine which intermediary device is responsible for this failure?
  telnet 192.168.1.1
  ping 192.168.1.1
  ftp 192.168.1.1
  tracert 192.168.1.1
38  
Refer to the exhibit. Host A sends a frame with the destination MAC address as FFFF.FFFF.FFFF. What action will the switch take for this frame?
  It will drop the frame.
  It will send the frame back to host A.
  It will send the frame to all hosts except host A.
  It will forward the frame to the default gateway.
39  
Refer to the exhibit. What two facts can be determined from the session information that is displayed?(Choose two.)
  The protocol is a connection-oriented protocol.
  This exchange is part of the three-way handshake.
  The SYN flag is representing the initial establishment of a session.
  The destination port indicates that a Telnet session has been initiated.
  The source port does not support communication with the destination port that is listed.
40  
Refer to the exhibit. Each media link is labeled. What type of cable should be used to connect the different devices?
  Connection 1 - straight-through cable Connection 2 - straight-through cable Connection 3 - crossover cable
  Connection 1 - straight-through cable Connection 2 - crossover cable Connection 3 - rollover cable
  Connection 1 - crossover cable Connection 2 - rollover cable Connection 3 - straight-through cable
  Connection 1 - crossover cable Connection 2 - straight-through cable Connection 3 - crossover cable
  Connection 1 - straight-through cable Connection 2 - rollover cable Connection 3 - crossover cable
41  
Refer to the exhibit. Host A wants to access e-mail. Which destination socket number will be used to communicate this request?
  10.10.1.2:53
  0007.A7B8.0008:25
  10.10.1.3:23
  10.10.1.3:25
(Socket number= ip + port addres)
42  
Refer to the exhibit. Host A wants to access the Internet. Which combination of a Layer 2 address and a Layer 3 address will enable this access from host A?
  Destination MAC: 0030.8596.DE83 Default gateway: 209.165.202.130
  Destination MAC: 0030.8596.DE82 Default gateway: 172.16.9.2
  Destination MAC: 0030.8517.44C4 Default gateway: 172.16.1.1
  Destination MAC: 0030.8517.44C4 Default gateway: 209.165.202.130
43  
A technician is asked to secure the privileged EXEC mode of a switch by requiring a password. Which type of password would require this login and be considered the most secure?
  console
  enable
  enable secret
  VTY
44  
What are three characteristics of CSMA/CD? (Choose three.)
  Devices listen to the media and transmit data only when they cannot detect another signal on the media.
  All devices on the media can hear all communications.
  Devices communicate based on a configured priority.
  After a collision occurs, the devices that caused the collision have first priority when attempting to retransmit.
  When a collision occurs, all devices stop transmitting for a randomly generated period of time.
  CSMA/CD uses a token system to avoid collisions.
45  
Refer to the exhibit. A PC is connected to a network. Which action will verify that the PC can communicate with its default gateway?
  Use the ping 127.0.0.1 command.
  Use the ipconfig command.
  Use the ipconfig/all command.
  Use the ping 10.0.0.254 command.
46  
Refer to the exhibit. A network administrator remotely accesses the CLI of RouterB from PC1 using Telnet. Which statement is true about this connection?
  The data is automatically encrypted.
  A Telnet server process is running on PC1.
  The connection is made through a VTY session on the router.
  A GET request was sent to RouterB to retrieve data during this session.
47  
Refer to the exhibit. A technician is working on a network problem that requires verification of the router LAN interface. What address should be pinged from this host to confirm that the router interface is operational?
  127.0.0.1
  192.168.64.196
  192.168.254.1
  192.168.254.9
  192.168.254.254
48  
Refer to the exhibit. Which two facts can be determined about the topology? (Choose two.)
  Three networks are needed.
  Two logical address ranges are required.
  A single broadcast domain is present.
  Three collision domains are present.
  Four networks are needed.
49  
Which range of port numbers is assigned dynamically to client applications when initiating a connection to the server?
  0 to 255
  0 to 1023
  1024 to 49151
  greater than 65535
50  
What are two functions of the data link layer? (Choose two.)
  It segments and reorders the data.
  It exchanges data between programs that are running on the source and destination hosts.
  It controls how data is placed onto the media.
  It generates signals to represent the bits in each frame.
  It encapsulates each packet with a header and a trailer to transfer it across the local media.
51  
A network technician wants to configure an IP address on a router interface by using the ip address 192.168.1.0 255.255.255.0 command. Which prompt should the technician see when entering this command?
  Router> 
  Router(config-if)#
  Router#
  Router(config)#
52  
What is the result of using the clock rate 56000 command at the serial interface of the router?
  The interface is configured as a DCE device.
  The interface timers are cleared.
  The FastEthernet interface is made to emulate a serial interface by assigning it a timing signal.
  The IP address for the serial interface is configured.