1.
When connectionless protocols are implemented at the lower layers of the OSI model, what is usually used to acknowledge that the data was received and to request the retransmission of missing data?
Correct Answer
E. An upper-layer, connection-oriented protocol or service
Explanation
When connectionless protocols are implemented at the lower layers of the OSI model, an upper-layer, connection-oriented protocol or service is usually used to acknowledge that the data was received and to request the retransmission of missing data. This is because connectionless protocols do not provide any guarantee of delivery or sequencing of data, so a higher-layer protocol or service is needed to handle these functions.
2.
Refer to the exhibit. Each media link is labeled. What type of cable should be used to connect the different devices?
Correct Answer
D. Connection 1 - straight-through cable Connection 2 - crossover cable Connection 3 - straight-through cable
Explanation
The exhibit shows three connections labeled as Connection 1, Connection 2, and Connection 3. To connect the different devices, a straight-through cable should be used for Connection 1, a crossover cable should be used for Connection 2, and a straight-through cable should be used for Connection 3.
3.
Which OSI layer does IP rely on to determine whether packets have been lost and to request retransmission?
Correct Answer
D. Transport
Explanation
IP relies on the transport layer to determine whether packets have been lost and to request retransmission. The transport layer protocols, such as TCP, provide reliable delivery of data by implementing mechanisms like acknowledgment and retransmission. These mechanisms allow IP to detect if packets have been lost during transmission and request the sender to retransmit them. Therefore, the transport layer plays a crucial role in ensuring the reliable delivery of packets in the IP network.
4.
Refer to the exhibit. A technician is working on a network problem that requires
verification of the router LAN interface. What address should be pinged from this
host to confirm that the router interface Is operational?
Correct Answer
C. 192.168.254.1
Explanation
The correct answer is 192.168.254.1. This address should be pinged from the host to confirm that the router interface is operational.
5.
Refer to the exhibit. What function does router RT_A need to provide to allow Internet access for hosts in this network
Correct Answer
A. Address translation
Explanation
Router RT_A needs to provide address translation in order to allow Internet access for hosts in this network. Address translation, also known as Network Address Translation (NAT), is a process that allows multiple devices in a network to share a single public IP address. This allows the hosts in the network to communicate with the Internet using private IP addresses, while the router translates these private IP addresses to the public IP address when sending and receiving data.
6.
What are three characteristics of CSMA/CD? (Choose three.)
Correct Answer(s)
C. A device listens and waits until the media is not busy before Transmitting.
E. All of the devices on a segment see data that passes on the network medium.
F. After detecting a collision, hosts can attempt to resume transmission after a random time delay has expired
Explanation
CSMA/CD (Carrier Sense Multiple Access with Collision Detection) is a protocol used in Ethernet networks. The three characteristics of CSMA/CD are:
1) A device listens and waits until the media is not busy before transmitting. This ensures that there are no collisions on the network.
2) All devices on a segment see data that passes on the network medium. This means that all devices can access and receive the data transmitted on the network.
3) After detecting a collision, hosts can attempt to resume transmission after a random time delay has expired. This allows the devices to retransmit their data in a more organized manner, reducing the chances of future collisions.
7.
Due to a security violation, the router passwords must be changed.
What information can be learned from the following configuration
entries? (Choose two.)
Correct Answer(s)
D. The entries specify four Telnet lines for remote access.
G. Access will be permitted for Telnet using “c13c0″ as the password.
Explanation
The given configuration entries specify four Telnet lines for remote access. This can be inferred from the line "Router(config)# line vty 0 3", which indicates that there are four virtual terminal lines (vty 0, vty 1, vty 2, and vty 3) for Telnet access. Additionally, the entry "Router(config-line)# password c13c0" sets the password for these Telnet lines to "c13c0", indicating that access will be permitted using this password.
8.
Refer to the exhibit. A network administrator remotely accesses the CLI of RouterBfrom PC1. Which two statements are true about the application layer protocol that isused to make this connection? (Choose two.)
Correct Answer(s)
B. The connection type is called a VTY session.
E. The application name is the same for the service, protocol, and client.
Explanation
The connection type is called a VTY session because the network administrator is accessing the router remotely using the Virtual Terminal (VTY) lines. The application name is the same for the service, protocol, and client because the network administrator is using the Command Line Interface (CLI) to access the router.
9.
During the encapsulation process, which identifiers are added at the transport layer?
Correct Answer
B. Two applications communicating the data
Explanation
During the encapsulation process at the transport layer, the identifiers that are added are related to the two applications communicating the data. These identifiers help in establishing a connection between the sender and receiver applications, ensuring that the correct data is sent and received. The transport layer protocols, such as TCP or UDP, add these identifiers to the data packets before they are sent over the network. This allows for reliable and efficient communication between the applications.
10.
Refer to the exhibit. A student has wired each end of a CAT 5e cable as shown. What is the result? (Choose two.)
Correct Answer(s)
C. The cable is suitable for use as a Fast Ethernet crossover.
F. The cable is suitable for use between two 100 Mbps Auto-MDIX capable switches
Explanation
The given wiring configuration shows that the cable is wired as a crossover cable, which means that it can be used for connecting two devices of the same type (e.g., two computers) directly without the need for a switch or hub. This makes it suitable for use as a Fast Ethernet crossover. Additionally, the cable is also suitable for use between two 100 Mbps Auto-MDIX capable switches, as these switches have the capability to automatically detect and adjust the wiring configuration. Therefore, the cable can be used for both of these purposes.
11.
Refer to the exhibit. What two facts can be determined from the information that is given? (Choose two.)
Correct Answer(s)
D. The destination port indicates that an HTTP session has been initiated.
E. The data listed is associated with the transport layer.
Explanation
From the information given, it can be determined that the destination port indicates that an HTTP session has been initiated. Additionally, the data listed is associated with the transport layer.
12.
Due to a security violation, the router passwords must be changed. What information can be learned from the
following configuration entries? (Choose two.)
Router(config)# line vty 0 3
Router(config-line)# password c13c0
Router(config-line)# login
Correct Answer(s)
B. The entries specify four Telnet lines for remote access.
E. Access will be permitted for Telnet using "c13c0" as the password.
Explanation
The configuration entries "Router(config)# line vty 0 3" and "Router(config-line)# password c13c0" indicate that there are four Telnet lines (vty 0, vty 1, vty 2, and vty 3) specified for remote access. The entry "Router(config-line)# login" indicates that access will be permitted for Telnet using the password "c13c0". Therefore, the correct answers are: The entries specify four Telnet lines for remote access, and Access will be permitted for Telnet using "c13c0" as the password.
13.
Refer to the exhibit. A network administrator remotely accesses the CLI of RouterB from PC1 using Telnet. Which
statement is true about this connection?
Correct Answer
C. The connection is made through a VTY session on the router.
Explanation
The correct answer is that the connection is made through a VTY session on the router. This means that the network administrator is accessing the router remotely using the Virtual Terminal (VTY) lines. Telnet is a protocol used to establish remote connections, but it does not automatically encrypt data. The statement about a Telnet server process running on PC1 is not mentioned in the exhibit, so it cannot be determined. There is no information provided about a GET request being sent to RouterB during this session.
14.
During the encapsulation process, which identifiers are added at the transport layer?
Correct Answer
B. Two applications communicating the data
Explanation
During the encapsulation process at the transport layer, the identifiers that are added are those of the two applications that are communicating the data. The transport layer is responsible for establishing a connection between two applications and ensuring reliable and error-free transmission of data between them. Therefore, the identifiers of these two applications are added during encapsulation to facilitate the proper delivery of the data.
15.
Refer to the exhibit. What two facts can be determined about the exhibited topology? (Choose two.)
Correct Answer(s)
A. A single broadcast domain is present
E. Five collision domains exist.
Explanation
Based on the exhibit, we can determine that a single broadcast domain is present because all devices in the topology are connected to a single switch, which means they share the same broadcast domain. Additionally, we can determine that five collision domains exist because there are five separate physical segments or links in the topology, each of which represents a separate collision domain.
16.
What are three characteristics of CSMA/CD? (Choose three.)
Correct Answer(s)
C. A device listens and waits until the media is not busy before transmitting.
E. All of the devices on a segment see data that passes on the network medium.
F. After detecting a collision, hosts can attempt to resume transmission after a random time delay has expired.
Explanation
CSMA/CD (Carrier Sense Multiple Access with Collision Detection) is a protocol used in Ethernet networks. Three characteristics of CSMA/CD are:
1. A device listens and waits until the media is not busy before transmitting. This ensures that there is no collision with other devices already transmitting on the network.
2. All devices on a segment see data that passes on the network medium. This means that all devices can access and receive the data transmitted on the network.
3. After detecting a collision, hosts can attempt to resume transmission after a random time delay has expired. This random delay helps to prevent repeated collisions and allows devices to reattempt transmission in a more orderly manner.
17.
Refer to the exhibit. While configuring a network, a technician wired each end of a Category 5e cable as shown. Which two statements are true about this setup? (Choose two.)
Correct Answer(s)
A. The cable is suitable for connecting a switch to a router Ethernet port.
B. The cable is suitable for connecting dissimilar types of devices.
Explanation
The given correct answers are:
1. The cable is suitable for connecting a switch to a router Ethernet port.
2. The cable is suitable for connecting dissimilar types of devices.
Based on the exhibit, the cable is wired using the T568B standard, which is commonly used for Ethernet connections. This standard ensures that the transmit pin on one end is connected to the receive pin on the other end, allowing for proper communication between devices. Therefore, the cable is suitable for connecting a switch to a router Ethernet port. Additionally, the cable can also be used to connect dissimilar types of devices, such as a computer to a printer or a computer to a switch.
18.
Which topology divides the collision domain and provides full media bandwidth to the hosts in the network?
Correct Answer
C. Pic 3
Explanation
Pic 3 likely represents a star topology. In a star topology, each host is connected directly to a central device, such as a switch or hub. This central device acts as a point of connection and communication for all the hosts in the network. This arrangement allows for the division of the collision domain, as each host has its own dedicated connection to the central device. Additionally, since each host has its own connection, the full media bandwidth is available to each host, ensuring efficient and reliable communication.
19.
To make a server application accessible by clients, a network administrator wants to configure the port number that the application will use. From which range of numbers should the port number be assigned?
Correct Answer
C. 1024 to 49151
Explanation
To make a server application accessible by clients, a network administrator should assign a port number from the range 1024 to 49151. This range includes the registered and dynamic ports used for general purposes and various applications. Ports 0 to 1023 are well-known ports reserved for specific system services, while ports 49152 to 65535 are private or dynamic ports primarily used for temporary or private connections.
20.
Which configuration mode is used to set a password to authenticate users that are accessing and configuring the network device using Telnet connection?
Correct Answer
A. VTY line mode
Explanation
VTY line mode is used to set a password to authenticate users that are accessing and configuring the network device using Telnet connection. In VTY line mode, administrators can configure password authentication and other security measures to control access to the device via Telnet. This mode allows administrators to configure multiple virtual terminal lines for remote access, and setting a password in this mode ensures that only authorized users can access and configure the network device through a Telnet connection.
21.
Which option shows how a router will route packets to a remote network?
Correct Answer
D. Pic 4
22.
A user sees the command prompt: Router(config-if)# . What task can be performed at this mode?
Correct Answer
C. Configure individual interfaces.
Explanation
At the Router(config-if)# mode, a user can configure individual interfaces. This mode allows the user to make specific configurations and settings for a particular interface on the router. It is used to define parameters such as IP address, subnet mask, and other interface-specific settings.
23.
Which option correctly identifies the interface or interfaces used to connect the router to a CSU/DSU for WAN connectivity?
Correct Answer
D. Pic 4
24.
To send data through a network, what two flags are used to establish a session? (Choose two.)
Correct Answer(s)
A. ACK
C. SYN
Explanation
To establish a session and send data through a network, two flags are used: ACK and SYN. ACK stands for acknowledgment and is used to confirm the receipt of data. SYN stands for synchronization and is used to initiate a connection between two devices. By using these two flags, a session can be established and data can be successfully transmitted over the network.
25.
What happens when a node on an Ethernet network is creating a frame and it does not have the destination MAC address?
Correct Answer
D. The node sends out an ARP request with the destination IP address.
Explanation
When a node on an Ethernet network is creating a frame and it does not have the destination MAC address, it sends out an ARP request with the destination IP address. This is because the node needs to determine the MAC address of the device with the corresponding IP address in order to successfully deliver the frame. The ARP request is a broadcast message that allows the node to obtain the MAC address, ensuring the frame can be properly sent to the intended destination.
26.
Refer to the exhibit. Which two layers of the OSI model describe the same functions as the transport and internet layers of the TCP/model? (Choose two.)
Correct Answer(s)
D. Transport layer
E. Network layer
Explanation
The transport layer of the OSI model is responsible for providing reliable and error-free communication between two hosts. Similarly, the internet layer of the TCP/IP model is responsible for routing packets across different networks. Both layers handle the transportation of data, ensuring its delivery and managing the addressing and routing of packets. Therefore, the transport layer and network layer of the OSI model perform the same functions as the transport and internet layers of the TCP/IP model.
27.
Which two types of media can provide bandwidth up to 1 Gb/s? (Choose two.)
Correct Answer(s)
D. 1000 BASE-TX
E. 1000 BASE-SX
Explanation
The 1000 BASE-TX and 1000 BASE-SX media types can provide bandwidth up to 1 Gb/s. 10 BASE-T and 100 BASE-T media types provide lower bandwidths, while 100 BASE-FX provides a maximum bandwidth of 100 Mb/s.
28.
Refer to the exhibit. All devices in the network use default configurations. How many broadcast domains are there in this topology?
Correct Answer
B. 5
Explanation
In the given exhibit, there are five broadcast domains in the topology. A broadcast domain is a logical division of a computer network in which all devices can reach each other by broadcast at the data link layer. In this topology, each switch represents a separate broadcast domain, and there are five switches present. Therefore, the correct answer is 5.
29.
To enhance security in a network, the network administrator uses these commands:
Router(config)# line console 0
Router(config-line)# password j1mdi2
Router(config-line)# login
What two conclusions are evident from these commands? (Choose two.)
Correct Answer(s)
A. Users who attempt to connect to the console port of the router must enter a password.
B. The entries permit access through the console by the use of j1mdi2 as the password.
Explanation
The commands configure the console line of the router to require a password before granting access. The password j1mdi2 command sets the password to j1mdi2, and the login command enables password checking on the console line. Therefore, anyone attempting to connect to the console port must enter the password j1mdi2 to gain access. This does not prevent passwords from being displayed as plain text or eliminate the need for authentication.
30.
An administrator has made changes to a device. The changes did not have the desired effect. What can the administrator do to restore the configuration saved in NVRAM?
Correct Answer
C. Issue the erase start-up config command.
Explanation
The correct answer is to issue the "erase start-up config" command. This command will delete the startup configuration file stored in NVRAM, which contains the saved configuration. By erasing this file, the administrator can restore the device to its default configuration, effectively reverting any changes that were made.
31.
What information can be gathered by using the command netstat?
Correct Answer
C. Active TCP connections
Explanation
The command netstat allows users to gather information about active TCP connections. By using this command, users can view details such as the local and foreign addresses, state of the connection, and the process ID associated with each connection. This information can be useful for troubleshooting network connectivity issues, monitoring network activity, and identifying any unauthorized or suspicious connections.
32.
Which service is used when the nslookup command is issued on a computer?
Correct Answer
B. DNS
Explanation
When the nslookup command is issued on a computer, it is used to query the DNS (Domain Name System) service. DNS is responsible for translating domain names into IP addresses, allowing computers to locate and connect to specific websites or services on the internet. By using the nslookup command, users can retrieve information about a specific domain name, such as its IP address, hostname, or other DNS records.
33.
Refer to the exhibit. Which option correctly identifies the network address, range of host addresses, and the broadcast address for the network that contains host A?
Correct Answer
C. Pic 3
34.
Which application belongs to the category of the client/server model?
Correct Answer
A. Using Telnet to access a router
Explanation
Using Telnet to access a router belongs to the category of the client/server model because Telnet is a client/server protocol. In this scenario, the router acts as the server, providing access to its resources and services, while the device running Telnet (client) connects to the router to send commands and retrieve information. This follows the client/server model where the client requests services from the server.
35.
Refer to the exhibit. Which Layer 2 protocol could be used inside nework A and network C?
Correct Answer
D. Ethernet
Explanation
Ethernet is the correct answer because it is a Layer 2 protocol that is commonly used for local area networks (LANs). It provides the means for devices within the same network to communicate with each other by defining how data is transmitted over the physical network. In this case, both network A and network C are local networks, so Ethernet would be the appropriate Layer 2 protocol to use for communication between devices within each network.
36.
How can ARP be used to help document the network?
Correct Answer
C. It can provide a list of pHysical addresses on the network.
Explanation
ARP (Address Resolution Protocol) can be used to help document the network by providing a list of physical addresses on the network. ARP is responsible for mapping IP addresses to MAC addresses, which are the physical addresses of devices on a network. By using ARP, one can gather a comprehensive list of the physical addresses of all the devices connected to the network, which can be useful for network documentation purposes.
37.
In a network design project, a network designer needs to select a device to provide collision free connections to 40 hosts on the LAN. Which device should be selected?
Correct Answer
C. Switch
Explanation
A switch should be selected to provide collision-free connections to 40 hosts on the LAN. Unlike a hub, which broadcasts data to all connected devices, a switch creates a dedicated connection between the sender and receiver, reducing collisions and improving network performance. A router is used to connect multiple networks, while a firewall is used for network security purposes. Therefore, a switch is the most suitable device for this scenario.
38.
What information is contained in the header of Layer 3 to help data delivery?
Correct Answer
C. Destination host logical address
Explanation
The header of Layer 3 contains the destination host logical address. This address helps in data delivery by specifying the logical address of the intended recipient of the data. By including this information in the header, Layer 3 can ensure that the data is correctly routed to the destination host.
39.
During the encapsulation process, what identifiers are added at the transport layer?
Correct Answer
C. Source and destination port numbers
Explanation
During the encapsulation process at the transport layer, source and destination port numbers are added as identifiers. Port numbers are used to differentiate between different applications or services running on a device. They allow the transport layer to multiplex and demultiplex data packets, ensuring that the correct data is delivered to the correct application or service on the receiving device.
40.
Which statement is true about the ICMP protocol?
Correct Answer
C. It is often filtered out of networks for security purposes.
Explanation
ICMP (Internet Control Message Protocol) is often filtered in networks for security to prevent potential abuse like ICMP-based attacks. Filtering ICMP can enhance network security by limiting information exposure and reducing the risk of certain attacks that may exploit ICMP. However, some ICMP messages, like echo requests and replies, are essential for network troubleshooting. Striking a balance in ICMP filtering is crucial for maintaining network functionality while mitigating security risks.
41.
Which physical component is used to access and perform the initial configuration on a new unconfigured router?
Correct Answer
B. Pic 2
42.
What happens when a host station receives a frame that contains its own MAC address in the destination field?
Correct Answer
A. The Layer 2 information is removed and the frame is pushed up to Layer 3.
Explanation
When a host station receives a frame that contains its own MAC address in the destination field, the Layer 2 information is removed and the frame is pushed up to Layer 3. This means that the host station will process the frame at the network layer, where it will be further analyzed and forwarded to the appropriate destination based on the Layer 3 information.
43.
A network administrator is asked to design a new addressing scheme for a corporate network. There are 60 users in the main office, users in the branch office, 28 users in manufacturing, 12 in the sales office, and 4 users in the research office. Which VLSM addressing scheme that uses the 192.168.88.0/24 network will fulfill the requirements while wasting the fewest addresses?
Correct Answer
B. 192.168.88.0/26 main 192.168.88.64/26 branch 192.168.88.128/27 manufacturing 192.168.88.160/28 sales 192.168.88.176/29 research
Explanation
The given VLSM addressing scheme uses subnet masks of different lengths to allocate IP addresses to different network segments. By using a /26 subnet mask for the main office, a total of 64 IP addresses can be assigned, which is sufficient for the 60 users in the main office. Similarly, the branch office is allocated a /26 subnet mask, providing 64 IP addresses for the users in that office. The manufacturing office is allocated a /27 subnet mask, which provides 32 IP addresses, enough for the 28 users in that office. The sales office is allocated a /28 subnet mask, providing 16 IP addresses for the 12 users in that office. Lastly, the research office is allocated a /29 subnet mask, which provides 8 IP addresses for the 4 users in that office. This addressing scheme efficiently allocates IP addresses while minimizing wastage.
44.
Which layer of the OSI model is responsible for establishing, managing, and terminating connections between applications?
Correct Answer
B. Session Layer
Explanation
Application Layer: This layer provides network services directly to the user's applications.
Session Layer: This layer is responsible for establishing, managing, and terminating sessions between two communicating hosts. It controls the dialogues (connections) between computers.
Transport Layer: This layer provides end-to-end communication services for applications, including error recovery and flow control.
Network Layer: This layer is responsible for data routing, packet forwarding, and addressing.