1.
When connectionless protocols are implemented at the lower layers of the OSI model, what is usually used to acknowledge that the data was received and to request the retransmission of missing data?
Correct Answer
E. An upper-layer, connection-oriented protocol or service
Explanation
When connectionless protocols are implemented at the lower layers of the OSI model, an upper-layer, connection-oriented protocol or service is usually used to acknowledge that the data was received and to request the retransmission of missing data. This is because connectionless protocols, such as IP and UDP, do not provide built-in mechanisms for acknowledging the receipt of data or requesting retransmission. Instead, they rely on higher-layer protocols or services to handle these functions. These upper-layer protocols or services establish a connection between the sender and receiver, ensuring reliable delivery of data.
2.
Refer to the exhibit. Each media link is labeled. What type of cable should be used to connect the different devices?
Correct Answer
D. Connection 1 - straight-through cable
Connection 2 - crossover cable
Connection 3 - straight-through cable
Explanation
The correct answer is Connection 1 - straight-through cable, Connection 2 - crossover cable, Connection 3 - straight-through cable. This is because a straight-through cable is used to connect a host to a switch or hub, while a crossover cable is used to connect two hosts directly without a switch or hub in between. In this scenario, Connection 1 is between a host and a switch, so a straight-through cable is needed. Connection 2 is between two hosts, so a crossover cable is needed. Connection 3 is between a switch and a router, so a straight-through cable is needed.
3.
Which OSI layer does IP rely on to determine whether packets have been lost and to request retransmission?
Correct Answer
D. Transport
Explanation
IP relies on the transport layer to determine whether packets have been lost and to request retransmission. The transport layer protocols, such as TCP, provide mechanisms for error detection and correction, ensuring reliable delivery of data. TCP uses sequence numbers and acknowledgments to keep track of the packets sent and received, allowing it to detect lost packets and request their retransmission. Therefore, the correct answer is transport.
4.
Refer to the exhibit. What is the correct destination socket number for a web page request from Host A to the web server?
Correct Answer
B. 198.133.219.25:80
Explanation
The correct destination socket number for a web page request from Host A to the web server is 198.133.219.25:80. This is indicated by the IP address 198.133.219.25 and the port number 80, which is the default port for HTTP communication.
5.
Which type of media is immune to EMI and RFI?
Correct Answer(s)
D. 100 Base-FX
F. 1000 Base LX
Explanation
The correct answer is 100 Base-FX and 1000 Base LX. These types of media, which are fiber optic cables, are immune to electromagnetic interference (EMI) and radio frequency interference (RFI) due to their design. Fiber optic cables use light signals to transmit data instead of electrical signals, making them resistant to EMI and RFI. This makes them ideal for environments with high levels of electromagnetic interference, such as industrial settings or areas with a lot of electrical equipment.
6.
Refer to the exhibit. The command that is shown was issued on a PC. What does the IP address 192.168.33.2
represent?
Correct Answer
D. Primary domain name server for the host
Explanation
The IP address 192.168.33.2 represents the primary domain name server for the host.
7.
Refer to the exhibit. The diagram represents the process of sending email between clients. Select the list below that
correctly identifies the component or protocol used at each numbered stage of the diagram.
Correct Answer
E. 1.MUA 2.SMTP 3.MTA 4.SMTP 5.MTA 6.MDA 7.POP 8.MUA
Explanation
The correct answer correctly identifies the component or protocol used at each numbered stage of the diagram. It states that the process starts with the Mail User Agent (MUA), followed by the Simple Mail Transfer Protocol (SMTP) for sending the email to the Mail Transfer Agent (MTA). The MTA then forwards the email to another MTA using SMTP. The email is then received by the Mail Delivery Agent (MDA) and stored. The user can access the email using the Post Office Protocol (POP). Finally, the email is retrieved by the MUA.
8.
What is true regarding network layer addressing?
Correct Answer(s)
C. Heirarchical
D. Uniquely identifies each host
F. Contains a network portion
Explanation
Network layer addressing is hierarchical, meaning it is organized in a hierarchical structure. This allows for efficient routing and management of network traffic. It also uniquely identifies each host on the network, ensuring that there are no duplicate addresses. Additionally, network layer addressing contains a network portion, which helps in identifying the specific network to which a host belongs.
9.
Which OSI layers offer reliable, connection-oriented data communication services?
Correct Answer
D. Transport
Explanation
The transport layer in the OSI model offers reliable, connection-oriented data communication services. This layer ensures that data is transmitted accurately and efficiently by establishing a connection between the sender and receiver and managing the flow control, error correction, and retransmission of data if necessary. It guarantees that data is delivered in the correct order and without errors, providing a reliable communication channel for applications.
10.
Examine the graphic with current configurations. Host A in the Clerical offices failed and was replaced. Although a ping
to 127.0.0.1 was successful, the replacement computer can not access the company network. What is the likely cause
of the problem?
Correct Answer
C. Subnet mask incorrectly entered
Explanation
The likely cause of the problem is that the subnet mask was incorrectly entered. The subnet mask is used to determine which portion of an IP address is the network address and which portion is the host address. If the subnet mask is incorrect, the replacement computer may not be able to properly communicate with the company network.
11.
Refer to the exhibit. Host A attempts to establish a TCP/IP session with host C. During this attempt, a frame was
captured with the source MAC address 0050.7320.D632 and the destination MAC address 0030.8517.44C4. The
packet inside the captured frame has an IP source address 192.168.7.5, and the destination IP address is
192.168.219.24. At which point in the network was this packet captured?
Correct Answer
C. Leaving Dallas
Explanation
The packet was captured while leaving Dallas because the source MAC address indicates that it originated from host A, and the destination MAC address indicates that it was heading towards host C. Since the packet was captured with these MAC addresses in Dallas, it suggests that it was intercepted at a point in the network while it was leaving Dallas.
12.
Refer to the exhibit. What two facts can be determined from the information that is given? (Choose two.)
Correct Answer(s)
D. The destination port indicates that an HTTP session has been initiated.
E. The data listed is associated with the transport layer.
Explanation
From the given information, it can be determined that the destination port indicates that an HTTP session has been initiated. Additionally, the data listed is associated with the transport layer.
13.
Refer to the exhibit. On the basis of the IP configuration that is shown, what is the reason that Host A and Host B are
unable to communicate outside the local network?
Correct Answer
D. The gateway address was assigned a broadcast address.
Explanation
The reason that Host A and Host B are unable to communicate outside the local network is because the gateway address was assigned a broadcast address. A broadcast address is used to send a message to all devices on a network, so assigning it as the gateway address means that the gateway is not able to properly route traffic between networks.
14.
Which of the following are the address ranges of the private IP addresses?
Correct Answer(s)
A. 10.0.0.0 to 10.255.255.255
D. 172.16.0.0 to 172.31.255.255
E. 192.168.0.0 to 192.168.255.255
Explanation
The private IP address ranges are used for internal networks and are not routable on the internet. The address ranges 10.0.0.0 to 10.255.255.255, 172.16.0.0 to 172.31.255.255, and 192.168.0.0 to 192.168.255.255 are reserved for private use. These ranges are commonly used in home and small office networks. The other address ranges mentioned in the question are not private IP address ranges.
15.
Which combination of network id and subnet mask correctly identifies all IP addresses from 172.16.128.0 through
172.16.159.255?
Correct Answer
D. 172.16.128.0 255.255.224.0
Explanation
The subnet mask 255.255.224.0 allows for a range of IP addresses from 172.16.128.0 to 172.16.159.255. This is because the subnet mask has 19 bits set to 1, which means that the first 19 bits of the IP address are used to identify the network, while the remaining 13 bits can be used to identify individual hosts within that network. Since the IP addresses given in the question fall within the range defined by the subnet mask, it is the correct combination.
16.
Which password is automatically encrypted when it is created?
Correct Answer
D. Enable secret
Explanation
The "enable secret" password is automatically encrypted when it is created. This password is used to secure privileged access to a Cisco device. Unlike the "enable password" which is stored in plain text, the "enable secret" password is automatically encrypted using a strong encryption algorithm. This provides an additional layer of security as the encrypted password cannot be easily deciphered or hacked.
17.
Which three statements characterize the transport layer protocols? (Choose three.)
Correct Answer(s)
A. TCP and UDP port numbers are used by application layer protocols.
D. TCP uses windowing and sequencing to provide reliable transfer of data.
E. TCP is a connection-oriented protocol. UDP is a connectionless protocol.
Explanation
The first statement is correct because both TCP and UDP port numbers are used by application layer protocols to identify specific processes or services. The second statement is incorrect because TCP uses sequencing and acknowledgments, not windowing, for reliable transfer of data. The third statement is correct because TCP is a connection-oriented protocol, meaning it establishes a dedicated connection between sender and receiver before data transfer. The fourth statement is incorrect because UDP is a connectionless protocol, meaning it does not establish a dedicated connection before data transfer.
18.
When must a router serial interface be configured with the clock rate command?
Correct Answer
D. When the interface is functioning as a DCE device
Explanation
A router serial interface must be configured with the clock rate command when it is functioning as a DCE (Data Communications Equipment) device. In a network, a DCE device provides clocking signals to a DTE (Data Terminal Equipment) device, which is typically a router or a switch. The clock rate command is used to set the clocking speed on the DCE device, allowing it to synchronize with the connected DTE device. This synchronization is necessary for proper communication between the devices.
19.
Which two functions of the OSI model occur at layer two?
Correct Answer(s)
A. pHysical addressing
E. Media access control
Explanation
The OSI model is a conceptual framework that defines the functions of a communication system. Layer two of the OSI model is the Data Link layer, which is responsible for transferring data between adjacent network nodes. Two functions that occur at this layer are physical addressing and media access control. Physical addressing involves assigning unique addresses to devices on a network, such as MAC addresses. Media access control manages how devices access and transmit data over a shared network medium, such as Ethernet. Therefore, physical addressing and media access control are the correct answers for this question.
20.
A routing issue has occurred in your internet work. Which of the following type of devices should be examined to
isolate this error?
Correct Answer
D. Router
Explanation
If a routing issue has occurred in your internet work, the device that should be examined to isolate this error is the router. A router is responsible for directing network traffic between different networks. It determines the best path for data packets to reach their destination. If there is a problem with routing, such as incorrect routing tables or misconfigured routing protocols, it can cause connectivity issues. Therefore, examining the router would be the logical step to identify and resolve the routing issue.
21.
Refer to the exhibit. With the router running NAT, what IP addresses can be applied to the computer to allow access to the Internet? (Choose three.)
Correct Answer(s)
C. 192.168.18.60
E. 192.168.18.59
F. 192.168.18.63
Explanation
To access the internet with the router running NAT, the computer must use an IP address within the usable range of the given subnet (192.168.18.56/28). The usable IP range is from 192.168.18.57 to 192.168.18.70. Thus, valid IP addresses include 192.168.18.59, 192.168.18.60, and 192.168.18.63. These addresses avoid the network address (192.168.18.56) and broadcast address (192.168.18.71).
22.
Due to a security violation, the router passwords must be changed. What information can be learned from the
following configuration entries? (Choose two.)
Router(config)# line vty 0 3
Router(config-line)# password c13c0
Router(config-line)# login
Correct Answer(s)
B. The entries specify four Telnet lines for remote access.
E. Access will be permitted for Telnet using "c13c0" as the password.
Explanation
The configuration entries "Router(config)# line vty 0 3" and "Router(config-line)# password c13c0" indicate that four Telnet lines are being configured for remote access. Additionally, the entry "Router(config-line)# login" suggests that access will be permitted for Telnet using the password "c13c0".
23.
As a network administrator, what is the subnet mask that allows 510 hosts given the IP address 172.30.0.0?
Correct Answer
D. 255.255.254.0
Explanation
The IP address 172.30.0.0 is a Class B address, which has a default subnet mask of 255.255.0.0. However, we need a subnet mask that allows for 510 hosts. To determine the required subnet mask, we need to find the smallest subnet that can accommodate at least 510 hosts.
The subnet mask 255.255.254.0 provides a subnet with 9 bits for host addresses, which allows for 2^9 - 2 = 510 usable host addresses. Therefore, this subnet mask is the correct choice to accommodate 510 hosts within the given IP address range.
24.
Refer to the exhibit. A network administrator remotely accesses the CLI of RouterB from PC1 using Telnet. Which
statement is true about this connection?
Correct Answer
C. The connection is made through a VTY session on the router.
Explanation
The correct answer is "The connection is made through a VTY session on the router." This means that the network administrator is accessing the CLI of RouterB using Telnet, which establishes a virtual terminal session on the router. This allows the administrator to remotely manage and configure the router. The other statements are not true because Telnet does not automatically encrypt data, a Telnet server process is not running on PC1, and a GET request is not sent to RouterB during a Telnet session.
25.
Refer to the exhibit. Cable 1 and cable 2 have the ends wired for specific physical layer requirements. The table lists
each segment by number and the cable which has been installed by the network technician between the network
components on that segment. From the data given, which segments have the correct cable installed? (Choose three.)
segment1
segment2
Correct Answer(s)
A. Segment. From the data given, which segments have the correct cable installed? (Choose three.) segment1
C. Segment3
D. Segment4
Explanation
The correct cables installed are segment1, segment3, and segment4. This can be determined by analyzing the given information in the exhibit, which is unfortunately not provided in the question.
26.
Refer to the exhibit. What three statements are true about the IP configuration that is shown? (Choose three.)
Correct Answer(s)
A. The address that is assigned to the computer represents private addressing.
B. The computer is unable to communicate outside of the local network.
D. The prefix of the computer address is /27.
Explanation
The first statement is true because the IP address assigned to the computer falls within the private IP address range (10.0.0.0 - 10.255.255.255, 172.16.0.0 - 172.31.255.255, 192.168.0.0 - 192.168.255.255). The second statement is true because private IP addresses are not routable on the internet, so the computer cannot communicate outside of the local network. The third statement is true because a /27 prefix allows for 30 usable host addresses (32 - 2 for network and broadcast addresses).
27.
Which three IPv4 addresses represent a broadcast for a subnet?
Correct Answer(s)
A. 172.16.4.63 /26
C. 172.16.4.191 /26
E. 172.16.4.95 /27
Explanation
The three IPv4 addresses that represent a broadcast for a subnet are 172.16.4.63 /26, 172.16.4.191 /26, and 172.16.4.95 /27. These addresses have the highest possible host bits in their respective subnet masks, indicating that they are used for broadcasting messages to all devices within the subnet.
28.
Refer to the exhibit. A network technician is trying to determine the correct IP address configuration for Host A.
What is a valid configuration for Host A?
Correct Answer
B. IP address: 192.168.100.20; Subnet Mask: 255.255.255.240; Default Gateway: 192.168.100.17
Explanation
The valid configuration for Host A is IP address: 192.168.100.20; Subnet Mask: 255.255.255.240; Default Gateway: 192.168.100.17. This configuration falls within the same IP address range as the other options, but it has a different default gateway. The default gateway is the IP address of the router that connects the local network to external networks. In this case, the correct default gateway is 192.168.100.17, which is within the same subnet as the IP address of Host A.
29.
The Layer 4 header contains which type of information to aid in the delivery of data?
Correct Answer
A. Service port number
Explanation
The Layer 4 header contains the service port number to aid in the delivery of data. The service port number helps identify the specific service or application that the data is intended for. This information is crucial for the proper routing and delivery of data packets to the correct destination.
30.
During the encapsulation process, which identifiers are added at the transport layer?
Correct Answer
B. Two applications communicating the data
Explanation
During the encapsulation process at the transport layer, the identifiers that are added are related to the two applications communicating the data. These identifiers help in distinguishing the specific applications involved in the communication and ensure that the data is correctly delivered to the intended recipients. The transport layer is responsible for establishing a reliable connection between the applications and managing the flow of data between them.
31.
Refer to the exhibit. Assume all devices are using default configurations. How many subnets are required to address
the topology that is shown?
Correct Answer
B. 3
Explanation
Based on the given exhibit, there are three distinct networks that need to be addressed. Each network requires a separate subnet. Therefore, three subnets are required to address the topology shown.
32.
Refer to the exhibit. Which logical topology best describes the exhibited network?
Correct Answer
D. Multiaccess
Explanation
The exhibited network can be described as a multiaccess topology because it shows multiple devices connected to a central point or hub, allowing them to communicate with each other simultaneously. In a multiaccess topology, all devices have equal access to the network and can transmit data to any other device on the network without the need for a central controller or coordinator. This is different from other topologies like star, ring, or point-to-point, which have specific limitations or restrictions on how devices can communicate with each other.
33.
Refer to the exhibit. Host A is transmitting data to host B. What addresses will host A use to for the destination IP
and MAC addresses in this communication?
Correct Answer
E. Destination MAC: EEEE:EEEE:EEEE Destination IP: 172.22.0.75
Explanation
Host A will use the destination MAC address "EEEE:EEEE:EEEE" and the destination IP address "172.22.0.75" in this communication.
34.
Refer to the exhibit. A router, whose table is shown, receives a packet that is destined for 192.168.1.4. How will
router treat the packet?
Correct Answer
C. The packet will be forwarded to the destination host.
Explanation
The router will treat the packet by forwarding it to the destination host. This is because the router's table shows a directly connected network with the destination IP address 192.168.1.4. Therefore, the router knows that the packet belongs to its own network and will forward it to the destination host.
35.
Refer to the exhibit. Which set of devices contains only intermediary devices?
Correct Answer
A. A, B, D, G
Explanation
The set of devices A, B, D, and G contains only intermediary devices. Intermediary devices are network devices that facilitate communication between other devices. In the exhibit, devices A, B, D, and G are all switches, which are examples of intermediary devices. Device A is a distribution switch, device B is an access switch, device D is a core switch, and device G is an aggregation switch. These devices are responsible for forwarding data packets between different networks and ensuring efficient communication between devices.
36.
Refer to the exhibit. A technician is working on a network problem that requires verification of the router LAN interface.
What address should be pinged from this host to confirm that the router interface is operational?
Correct Answer
C. 192.168.254.1
Explanation
The correct answer is 192.168.254.1. This address should be pinged from the host to confirm that the router interface is operational.
37.
Which prompt represents the appropriate mode used for the copy running-config startup-config command?
Correct Answer
B. Switch-6J#
Explanation
The prompt "Switch-6J#" represents the appropriate mode used for the "copy running-config startup-config" command. This prompt indicates that the user is in privileged EXEC mode, which allows them to execute privileged commands such as copying the running configuration to the startup configuration.
38.
A technician is asked to secure the privileged EXEC mode of a switch by requiring a password. Which type of password would require this login and be considered the most secure?
Correct Answer
C. Enable secret
Explanation
The most secure type of password that can be used to secure the privileged EXEC mode of a switch is the "enable secret" password. This password is encrypted and stored in the switch's configuration file, providing an additional layer of security compared to other types of passwords. The "console" password is used to secure access to the console port, while the "enable" password is used to secure access to privileged mode. The "VTY" password is used to secure access to virtual terminal lines.
39.
Which range of port numbers are reserved for services commonly used by applications that run on servers?
Correct Answer
B. 0 to 1023
Explanation
The range of port numbers from 0 to 1023 is reserved for services commonly used by applications that run on servers. These ports are known as well-known ports or system ports. They are assigned to specific services such as HTTP (port 80), FTP (port 21), and SSH (port 22). These ports are typically used by server applications to listen for incoming connections from client applications.
40.
Refer to the exhibit. Which two statements describe the information that is represented in the header? (Choose two.)
Correct Answer(s)
C. The destination port indicates a Telnet session.
D. The return segment will contain a source port of 23.
Explanation
The information represented in the header includes the destination port indicating a Telnet session, and the return segment containing a source port of 23.
41.
In a Cisco IOS device, where is the startup-configuration file stored?
Correct Answer
B. NVRAM
Explanation
The startup-configuration file is stored in NVRAM (Non-Volatile Random Access Memory) in a Cisco IOS device. NVRAM is a type of memory that retains its data even when the device is powered off or restarted. This allows the device to retain its configuration settings and load them during the startup process. Flash memory is used to store the operating system image, while RAM is used for temporary storage during device operation. ROM (Read-Only Memory) contains the firmware and bootstrap code for the device.
42.
Refer to the exhibit. What two facts can be determined about the exhibited topology?
Correct Answer(s)
A. A single broadcast domain is present
E. Five collision domains exist.
Explanation
Based on the information provided in the exhibit, it can be determined that a single broadcast domain is present because there is only one router connecting all the devices. Additionally, five collision domains exist because there are five separate segments connected by hubs, which means that each segment has its own collision domain.
43.
What are the three characteristics of CSMA/CD?
Correct Answer(s)
C. A device listens and waits until the media is not busy before transmitting.
E. All of the devices on a segment see data that passes on the network medium.
F. After detecting a collision, hosts can attempt to resume transmission after a random time delay has expired.
Explanation
CSMA/CD (Carrier Sense Multiple Access with Collision Detection) is a protocol used in Ethernet networks to control access to the network medium. The three characteristics of CSMA/CD mentioned in the answer are: a device listens and waits until the media is not busy before transmitting, all devices on a segment can see data that passes on the network medium, and after detecting a collision, hosts can attempt to resume transmission after a random time delay has expired. These characteristics ensure that multiple devices can share the network medium without causing excessive collisions and congestion.
44.
Refer to the exhibit. What is required on host A for a network technician to create the initial configuration on Router1?
Correct Answer
C. A terminal emulation program
Explanation
To create the initial configuration on Router1, a network technician would need a terminal emulation program on host A. A terminal emulation program allows the technician to access and configure the router remotely through the console port. This program provides a text-based interface that emulates a physical terminal, allowing the technician to enter commands and configure the router's settings.
45.
Refer to the exhibit. The tracert command is initiated from PC1 to PC4. Which device will send a response to the
initial tracert packet from PC1?
Correct Answer
C. London
Explanation
The tracert command is used to trace the route that packets take from the source to the destination. In this scenario, PC1 is the source and PC4 is the destination. The question asks which device will send a response to the initial tracert packet from PC1. Since the tracert command works by sending packets with increasing TTL (Time to Live) values, each device along the route will decrement the TTL and send back an ICMP Time Exceeded message to the source. Therefore, London, being a device along the route between PC1 and PC4, will send a response to the initial tracert packet from PC1.
46.
Refer to the exhibit. When computer A sends a frame to computer D, what computers receive the frame?
Correct Answer
A. Only computer D
Explanation
When computer A sends a frame to computer D, only computer D receives the frame. This is because the frame is specifically addressed to computer D, so only computer D will process and receive the frame. The other computers (A, B, and C) will not receive the frame as it is not intended for them.
47.
Refer to the exhibit. What function does router RT_A need to provide to allow Internet access for hosts in this network?
Correct Answer
A. Address translation
Explanation
Router RT_A needs to provide address translation in order to allow Internet access for hosts in this network. Address translation, also known as Network Address Translation (NAT), is a process that allows multiple devices in a private network to share a single public IP address. This is necessary because the private IP addresses used within the network are not routable on the Internet. By performing address translation, RT_A can map the private IP addresses of the hosts to the public IP address assigned to the router, enabling communication with the Internet.
48.
Refer to the exhibit. The network containing router B is experiencing problems. A network associate has isolated the
issue in this network to router B. What action can be preformed to correct the network issue?
Correct Answer
D. Issue the no shutdown command on interface FastEthernet 0/1
Explanation
The correct action to correct the network issue is to issue the "no shutdown" command on interface FastEthernet 0/1. This command will bring up the interface and enable it to transmit and receive data. By performing this action, the network associate can resolve the problem with router B and restore network connectivity.
49.
Which two actions could be taken by a router if a specific match is not made to a route in the routing table?
Correct Answer(s)
D. Neighboring routers are polled to find the best path.
E. The packet will be forwarded to a default route if one is present.
Explanation
If a specific match is not made to a route in the routing table, the router will first poll neighboring routers to find the best path. This is done to ensure that the router is not missing any potential routes that may not be present in its own routing table. If a suitable route is still not found, the router will then forward the packet to a default route if one is present. This default route acts as a fallback option for packets that do not have a specific matching route in the routing table.
50.
Refer to the exhibit. The network administrator remotely accesses the CLI of RouterB
from PC1 using a secure connection. Which statement is true about this connection?
Correct Answer
B. Only the exchange of the Telnet username and password is encrypted.
Explanation
The correct answer is "Only the exchange of the Telnet username and password is encrypted." This means that while the Telnet connection between PC1 and RouterB is established, only the username and password information is encrypted. The rest of the data exchanged between the two devices is not encrypted, making it potentially vulnerable to interception and unauthorized access. It is recommended to use SSH instead of Telnet for secure remote access.