1.
Which of the following are the address ranges of the private IP addresses? (Choose three.)
Correct Answer(s)
A. 10.0.0.0 to 10.255.255.255
D. 172.16.0.0 to 172.31.255.255
E. 192.168.0.0 to 192.168.255.255
Explanation
The address ranges 10.0.0.0 to 10.255.255.255, 172.16.0.0 to 172.31.255.255, and 192.168.0.0 to 192.168.255.255 are the private IP addresses. These address ranges are reserved for use within private networks and are not routable on the public internet.
2.
Which two functions of the OSI model occur at layer two? (Choose two.)
Correct Answer(s)
A. pHysical addressing
E. Media access control
Explanation
At layer two of the OSI model, two functions occur: physical addressing and media access control. Physical addressing involves assigning unique addresses to devices on a network, allowing them to be identified and reached. Media access control, on the other hand, is responsible for managing access to the physical transmission media, ensuring that multiple devices can share the same network without causing collisions or conflicts. Both of these functions are crucial for the proper functioning of a network at the data link layer.
3.
Refer to the exhibit. What function does router RT_A need to provide to allow Internet access for hosts in this network?
Correct Answer
A. Address translation
Explanation
Router RT_A needs to provide address translation in order to allow Internet access for hosts in this network. Address translation, also known as Network Address Translation (NAT), is a process that allows multiple devices with private IP addresses to share a single public IP address when accessing the Internet. This enables the hosts in the network to communicate with external networks and resources using the public IP address assigned to the router.
4.
What is true regarding network layer addressing? (Choose three.)
Correct Answer(s)
C. Heirarchical
D. Uniquely identifies each host
F. Contains a network portion
Explanation
The network layer addressing is hierarchical, meaning it is organized in a hierarchical structure with different levels of addressing. It uniquely identifies each host, providing a unique address for every device on the network. Additionally, it contains a network portion, which helps in identifying the network to which the host belongs.
5.
Refer to the exhibit. Host A attempts to establish a TCP/IP session with host C. During this attempt, a frame was captured with the source MAC address 0050.7320.D632 and the destination MAC address 0030.8517.44C4. The packet inside the captured frame has an IP source address 192.168.7.5, and the destination IP address is 192.168.219.24. At which point in the network was this packet captured?
Correct Answer
C. Leaving Dallas
Explanation
Based on the information provided, the packet was captured while leaving Dallas. This can be determined by looking at the source and destination MAC addresses, as well as the source and destination IP addresses. The MAC addresses indicate the source and destination devices involved in the communication, while the IP addresses indicate the source and destination network addresses. Since the packet was captured with a source MAC address of 0050.7320.D632 and a destination MAC address of 0030.8517.44C4, and the source IP address is 192.168.7.5 and the destination IP address is 192.168.219.24, it can be inferred that the packet was captured while leaving Dallas.
6.
Refer to the exhibit. Assume all devices are using default configurations. How many subnets are required to address the topology that is shown?
Correct Answer
B. 3
Explanation
The topology shown in the exhibit consists of three separate networks: one for each of the three routers. Each router requires its own subnet, so a total of three subnets are needed to address the entire topology.
7.
A technician is asked to secure the privileged EXEC mode of a switch by requiring a password. Which type of password would require this login and be considered the most secure?
Correct Answer
C. Enable secret
Explanation
The most secure type of password that would require login to secure the privileged EXEC mode of a switch is the "enable secret" password. This password is encrypted and stored in the switch's configuration file, providing a higher level of security compared to other password types. The "console" password is used to secure console line access, the "enable" password is used to secure privileged EXEC mode, and the "VTY" password is used to secure remote access to the switch. However, the "enable secret" password is the most secure option for securing privileged EXEC mode.
8.
Refer to the exhibit. A technician is working on a network problem that requires verification of the router LAN interface. What address should be pinged from this host to confirm that the router interface is operational?
Correct Answer
C. 192.168.254.1
Explanation
To confirm that the router interface is operational, the technician should ping the IP address 192.168.254.1. This is because the IP address 192.168.254.1 is within the same subnet as the host, indicating that it is likely the IP address assigned to the LAN interface of the router. Pinging this address will help verify if the router interface is functioning properly.
9.
Which OSI layer does IP rely on to determine whether packets have been lost and to request retransmission?
Correct Answer
D. Transport
Explanation
IP relies on the transport layer to determine whether packets have been lost and to request retransmission. The transport layer is responsible for ensuring reliable communication between the source and destination devices. It uses protocols like TCP (Transmission Control Protocol) to establish a connection, break data into packets, and reassemble them at the destination. TCP also includes mechanisms for error detection, packet loss detection, and retransmission requests to ensure the reliable delivery of data. Therefore, the transport layer is crucial for IP to determine and handle packet loss.
10.
When connectionless protocols are implemented at the lower layers of the OSI model, what is usually used to acknowledge that the data was received and to request the retransmission of missing data?
Correct Answer
E. An upper-layer, connection-oriented protocol or service
Explanation
When connectionless protocols are implemented at the lower layers of the OSI model, they do not provide any mechanism for acknowledging the receipt of data or requesting retransmission of missing data. Therefore, an upper-layer, connection-oriented protocol or service is usually used to handle these tasks. This higher-level protocol or service establishes a connection between the sender and receiver, ensuring reliable delivery of data by acknowledging its receipt and requesting retransmission if necessary.
11.
Refer to the exhibit. Host C is able to ping 127.0.0.1 successfully, but is unable to communicate with hosts A and B in the organization. What is the likely cause of the problem?
Correct Answer
C. The subnet mask on host C is improperly configured.
Explanation
The likely cause of the problem is that the subnet mask on host C is improperly configured. The subnet mask determines the network portion and host portion of an IP address. If the subnet mask is incorrect, host C may not be able to properly identify and communicate with hosts A and B, even though it can successfully ping its own loopback address.
12.
Refer to the exhibit. Which list refers only to end devices?
Correct Answer
A. D,E,F,G
Explanation
The list D,E,F,G refers only to end devices because end devices are the devices that are connected to a network and are used by end users to access information or communicate with others. In the given list, D,E,F,G are all devices that can be considered end devices, such as computers, smartphones, and tablets. The other lists include devices that are not necessarily end devices, such as routers (A) and switches (C).
13.
Refer to the exhibit. Host A sends a frame with the destination MAC address as FFFF.FFFF.FFFF. What action will the switch take for this frame?
Correct Answer
C. It will send the frame to all hosts except host A.
Explanation
When a frame is sent with the destination MAC address as FFFF.FFFF.FFFF, it is a broadcast frame. A broadcast frame is intended to be received by all hosts on the network. Therefore, the switch will forward the frame to all hosts except host A.
14.
Which subnet mask will allow 2040 hosts per subnet on the IP network 10.0.0.0?
Correct Answer
D. 255.255.248.0
Explanation
The subnet mask 255.255.248.0 will allow 2040 hosts per subnet on the IP network 10.0.0.0 because it provides a total of 11 bits for host addresses. This means that there are 2^11 - 2 = 2046 possible host addresses in each subnet, with 2 addresses reserved for the network address and the broadcast address. Therefore, this subnet mask allows for 2040 usable host addresses per subnet, which meets the requirement.
15.
Refer to the exhibit. RouterB is configured properly. The Ethernet interface Fa0/0 of RouterA is configured with the use of the commands that are shown. However, a ping from the Fa0/0 interface of RouterA to the Fa0/0 interface of RouterB is unsuccessful. What action should be taken on RouterA to solve this problem?
Correct Answer
C. Use the no shutdown command on the FastEthernet interface Fa0/0.
Explanation
The correct answer is to use the "no shutdown" command on the FastEthernet interface Fa0/0.
This is because the interface Fa0/0 on RouterA is currently in a shutdown state, which means it is not operational. By using the "no shutdown" command, the interface will be enabled and able to send and receive traffic. This will allow the ping from RouterA to RouterB to be successful.
16.
To send data through a network, what two flags are used to establish a session? (Choose two.)
Correct Answer(s)
A. ACK
C. SYN
Explanation
The two flags used to establish a session when sending data through a network are ACK and SYN. ACK stands for acknowledgment and is used to confirm the receipt of data, while SYN stands for synchronize and is used to initiate a connection between two devices. Together, these flags help establish a reliable and synchronized session for data transmission.
17.
Which statement is true about the TTL value of an IPv4 packet?
Correct Answer
B. It specifies the remaining “life” of the packet.
Explanation
The TTL (Time to Live) value of an IPv4 packet specifies the remaining "life" of the packet. It is a field in the packet header that indicates the maximum number of hops (routers) the packet can pass through before it is discarded. Each time the packet passes through a router, the TTL value is decremented by one. If the TTL value reaches zero, the packet is discarded. This mechanism helps prevent packets from circulating endlessly in a network.
18.
Refer to the exhibit. Communication for hosts X and Y is restricted to the local network. What is the reason for this?
Correct Answer
D. The gateway addresses are broadcast addresses.
Explanation
The reason for the communication restriction between hosts X and Y being limited to the local network is because the gateway addresses are broadcast addresses. This means that the gateway is only capable of forwarding packets within the local network and cannot route them to other networks. As a result, communication between hosts X and Y, which belong to different networks, cannot be established beyond the local network.
19.
What type of network is maintained if a server takes no dedicated role in the network?
Correct Answer
C. Peer-to-peer
Explanation
If a server takes no dedicated role in the network, it suggests that there is no central authority or hierarchy in the network. Instead, all devices in the network have equal capabilities and can act as both clients and servers. This type of network is known as a peer-to-peer network, where devices can directly communicate and share resources with each other without relying on a central server.
20.
A routing issue has occurred in your internetwork. Which of the following type of devices should be examined to isolate this error?
Correct Answer
D. Router
Explanation
A routing issue in an internetwork refers to a problem with the way data packets are being directed and forwarded between different networks. In order to isolate this error, the device that should be examined is the router. Routers are responsible for directing traffic between different networks based on their IP addresses. By examining the router, one can identify any misconfigurations or faults in the routing tables that may be causing the issue. The other devices mentioned in the options, such as access points, hosts, hubs, and switches, do not have the same level of control over network routing and are therefore less likely to be the cause of the routing issue.
21.
Which physical component is used to access and perform the initial configuration on a new unconfigured router?
Correct Answer
B. Picture 2
22.
A user sees the command prompt: Router(config-if)# . What task can be performed at this mode?
Correct Answer
C. Configure individual interfaces.
Explanation
At the "Router(config-if)#" mode, the user can configure individual interfaces. This mode allows the user to make specific configurations and settings for each interface on the router, such as assigning IP addresses, enabling or disabling features, setting bandwidth limits, and configuring security settings. It is a specific configuration mode that focuses on the individual interfaces rather than the overall device configuration.
23.
What is the correct order for PDU encapsulation?
Correct Answer
B. Picture 2
24.
What information can be gathered by using the command netstat?
Correct Answer
C. Active TCP connections
Explanation
The command "netstat" is used to display active TCP connections on a computer. It provides information about the current network connections, including the local and remote IP addresses, the state of the connection, and the port numbers being used. By using this command, one can gather information about the active TCP connections on the system, which can be useful for troubleshooting network issues, monitoring network activity, or identifying potential security threats.
25.
How can ARP be used to help document the network?
Correct Answer
C. It can provide a list of pHysical addresses on the network.
Explanation
ARP (Address Resolution Protocol) can be used to help document the network by providing a list of physical addresses on the network. ARP is responsible for mapping IP addresses to MAC addresses, allowing devices to communicate with each other on a local network. By using ARP, one can gather information about the physical addresses (MAC addresses) of devices connected to the network, which can be useful for network documentation and troubleshooting purposes.
26.
What is the protocol data unit that is associated with the data link layer of the OSI reference model?
Correct Answer
B. Frame
Explanation
In the data link layer of the OSI reference model, the protocol data unit (PDU) associated with it is a frame. A frame is a unit of data that includes both the data being transmitted and the necessary control information, such as source and destination addresses, error detection, and flow control. Frames are used to encapsulate data from the network layer and are responsible for reliable transmission of data over the physical medium.
27.
Which application layer protocol allows administrators to log into a server from remote locations and control a server as though logged in locally?
Correct Answer
E. Telnet
Explanation
Telnet is the correct answer because it is an application layer protocol that allows administrators to remotely log into a server and control it as if they were physically present. Telnet provides a command-line interface to the server, enabling remote administration and management. It is commonly used for tasks such as configuration, troubleshooting, and remote maintenance of servers.
28.
Which statement identifies the DNS protocol?
Correct Answer
C. It matches a resource name with the required network address.
Explanation
The correct answer is "It matches a resource name with the required network address." The DNS (Domain Name System) protocol is responsible for mapping domain names to their corresponding IP addresses. When a user enters a domain name in a web browser, the DNS protocol is used to translate that domain name into the corresponding IP address of the server hosting the website. This allows users to access websites by using human-readable domain names instead of having to remember the numerical IP addresses.
29.
Which password would allow a user to establish a Telnet session with a Cisco device?
Correct Answer
A. VTY password
Explanation
The VTY password would allow a user to establish a Telnet session with a Cisco device. VTY stands for Virtual Terminal Line, and it is used to establish remote connections to a device. By setting a VTY password, the user can authenticate themselves and gain access to the device remotely using Telnet. The other options, such as enable password, console password, and enable secret password, are used for different purposes and do not directly relate to establishing a Telnet session.
30.
Which identifier is contained in the header of the Layer 2 Ethernet frame?
Correct Answer
D. pHysical source and destination addresses
Explanation
The identifier that is contained in the header of the Layer 2 Ethernet frame is the physical source and destination addresses. These addresses are used to identify the specific devices that are sending and receiving the data. The physical addresses, also known as MAC addresses, are unique to each network interface card (NIC) and are used to ensure that the data is delivered to the correct destination.
31.
What happens when a node on an Ethernet network is creating a frame and it does not have the destination MAC address?
Correct Answer
D. The node sends out an ARP request with the destination IP address.
Explanation
When a node on an Ethernet network is creating a frame and it does not have the destination MAC address, it will send out an ARP request with the destination IP address. This is because the node needs to determine the MAC address of the destination device in order to properly transmit the frame. The ARP request is used to query the network for the MAC address associated with the given IP address. Once the node receives the MAC address, it can then properly address the frame and send it to the correct destination.
32.
An administrator makes changes to the default configuration of a router and saves them to NVRAM. After testing, it is discovered that the configurations did not have the desired effect and must be removed. What steps must be taken to remove the changes and return the router to the default configuration?
Correct Answer
C. Issue the erase startup-config command, and then reboot the router.
Explanation
To remove the changes made to the default configuration of a router and return it to its default state, the administrator should issue the "erase startup-config" command. This command will erase the configuration stored in the NVRAM, which is where the startup configuration is stored. After issuing this command, the router needs to be rebooted for the changes to take effect. By doing this, the router will load the default configuration from its ROM (Read-Only Memory) during the boot process, returning it to its original settings.
33.
A network administrator is tasked with connecting two workgroups that are configured to use different subnets. Which device should be selected to allow connectivity between users on the two networks?
Correct Answer
C. Router
Explanation
A router should be selected to allow connectivity between users on the two networks because it can route traffic between different subnets. A hub and switch are used to connect devices within the same network, while a wireless access point is used to provide wireless connectivity. However, a router is specifically designed to connect different networks and can handle routing traffic between them.
34.
Which two programs can be used to accomplish terminal emulation for configuring a router from the CLI through the console port? (Choose two.)
Correct Answer(s)
A. HyperTerminal
C. Minicom
Explanation
HyperTerminal and Minicom can be used to accomplish terminal emulation for configuring a router from the CLI through the console port. HyperTerminal is a program that allows users to connect to other computers, devices, and networks through various communication protocols. It can be used to establish a connection with a router's console port and configure it using the command-line interface (CLI). Minicom, on the other hand, is a text-based terminal emulator that is commonly used in Unix-like operating systems. It can also be used to connect to a router's console port and configure it through the CLI.
35.
Which statement accurately describes file sharing in a peer-to-peer network?
Correct Answer
B. Access control is decentralized.
Explanation
In a peer-to-peer network, access control is decentralized. This means that each peer in the network has control over its own files and can decide who can access them. Unlike a client-server network where a dedicated server is required to manage access control, in a peer-to-peer network, each peer acts as both a client and a server, allowing for more flexibility and autonomy in file sharing.
36.
What are two primary responsibilities of the Ethernet MAC sublayer? (Choose two.)
Correct Answer(s)
B. Data encapsulation
E. Accessing the media
Explanation
The Ethernet MAC sublayer has two primary responsibilities. Firstly, it is responsible for data encapsulation, which involves adding the necessary headers and trailers to the data being transmitted over the Ethernet network. This ensures that the data can be properly transmitted and received by the recipient. Secondly, the MAC sublayer is responsible for accessing the media. It determines when the network is available for transmitting data and coordinates the transmission process to avoid collisions with other devices on the network.
37.
Which router configuration mode would an administrator use to configure the router for SSH or Telnet login access?
Correct Answer
A. Line
Explanation
The correct answer is "line". In router configuration mode, an administrator would use the "line" configuration mode to configure the router for SSH or Telnet login access. This mode allows the administrator to configure settings for specific lines, such as console lines or virtual terminal lines, which are used for remote access to the router. By configuring the line settings, the administrator can enable SSH or Telnet access and set authentication and encryption options for secure login.
38.
Refer to the exhibit. Which device should be included in the network topology to provide Layer 2 connectivity for all LAN devices, provide multiple collision domains, and also provide a connection to the rest of the network?
Correct Answer
C. Switch
Explanation
A switch should be included in the network topology to provide Layer 2 connectivity for all LAN devices, provide multiple collision domains, and also provide a connection to the rest of the network. Unlike a hub, a switch can intelligently direct network traffic to the intended recipient, reducing collisions and improving overall network performance. A server is not designed for this purpose, and a PC does not have the capability to provide connectivity for other devices.
39.
Refer to the exhibit. A technician has been asked to test connectivity from PC1 to a remote network. Which action will indicate if there is remote connectivity?
Correct Answer
A. Picture 1
Explanation
Picture 1 is the correct answer because it shows a successful ping from PC1 to a remote network. This indicates that there is remote connectivity between PC1 and the remote network.
40.
What purpose does a hostname serve on a router?
Correct Answer
C. Provides device identification to users logging on remotely
Explanation
A hostname on a router serves the purpose of providing device identification to users logging on remotely. This means that when users connect to the router remotely, they can identify the specific device they are connecting to by its hostname.
41.
Which prompt is associated with the privileged exec mode?
Correct Answer
B. R1#
Explanation
The prompt "R1#" is associated with the privileged exec mode. This mode is accessed by entering the command "enable" from the user exec mode. In the privileged exec mode, users have access to all router commands and can make configuration changes, view system information, and perform administrative tasks. The "#" symbol at the end of the prompt indicates that the user has administrative privileges.
42.
A technician wishes to connect two computers to move data from one to the other before reloading the operating system. The NICs on both PCs do not support autosensing feature. Which procedure will satisfy the requirement?
Correct Answer
C. Interconnect the two PCs with a crossover cable.
Explanation
To move data from one computer to another, the technician should interconnect the two PCs with a crossover cable. A crossover cable is specifically designed to connect two devices directly without the need for a hub or switch. In this case, since the NICs on both PCs do not support autosensing, a crossover cable is necessary to ensure the correct transmission of data between the two computers.
43.
Refer to the exhibit. Interface Fa0/0 on router A is generating excessive broadcast traffic. Which LAN segments will affected by the excessive broadcasts?
Correct Answer
A. Only the 192.168.1.200/30 network will be affected.
Explanation
The excessive broadcast traffic generated by Interface Fa0/0 on router A will only affect the 192.168.1.200/30 network.
44.
Two routers are connected via their serial ports in a lab environment. The routers are configured with valid IP addresses, but they cannot ping each other. The show interface serial0/0 command shows that the serial0/0 interface is up but the line protocol is down. What could be the cause of this problem?
Correct Answer
B. The clock rate command has not been entered on the DCE interface.
Explanation
The line protocol being down indicates a problem with the data link layer. In this case, the issue is likely with the clock rate command not being entered on the DCE (Data Communications Equipment) interface. The clock rate command is used to specify the clocking rate for a serial interface, and it is necessary for proper communication between the routers. Without the clock rate command, the routers will not be able to synchronize their transmission and reception of data, resulting in the inability to ping each other.
45.
Refer to the exhibit. Which layered network model is shown in the diagram?
Correct Answer
D. TCP/IP
Explanation
The diagram shows the TCP/IP layered network model. The TCP/IP model is a conceptual framework used to understand and describe how network protocols and technologies work together to provide network communication. It consists of four layers: the Network Interface layer, Internet layer, Transport layer, and Application layer. This model is widely used in modern networking and is the basis for the internet protocol suite.
46.
Refer to the exhibit. Host A is unable to reach host B on the remote network. A technician attempted to ping the local gateway and the ping was successful. To verify the host configuration, the technician issued the ipconfig command. What is the likely cause of the problem?
Correct Answer
D. The default gateway on host A is incorrectly configured.
Explanation
The likely cause of the problem is that the default gateway on host A is incorrectly configured. The fact that host A was able to successfully ping the local gateway indicates that the local NIC and IP address are correctly configured. The issue lies in the communication between host A and host B on the remote network, which is handled by the default gateway.
47.
Which option shows how a router will route packets to a remote network?
Correct Answer
D. Picture 4
48.
An organization has been assigned network ID 10.10.128.0 and subnet mask 255.255.224.0. Which IP address range can be used for this organization?
Correct Answer
B. 10.10.128.0 to 10.10.159.255
Explanation
The subnet mask 255.255.224.0 allows for 11 bits to be used for the host portion of the IP address. This means that the network can have 2^11 or 2048 hosts. The network ID 10.10.128.0 falls within the range of 10.10.128.0 to 10.10.159.255, which includes a total of 2048 addresses. Therefore, this IP address range can be used for this organization.
49.
A network administrator is configuring several switches for a network. The switches have similar configurations and only minor differences. The administrator wants to save all commands that are issued on the first switch to a text file for editing. Which transfer option should be selected in HyperTerminal?
Correct Answer
C. Picture 3
Explanation
The correct answer is Picture 3. In HyperTerminal, selecting Picture 3, which is the "Capture Text" option, allows the network administrator to save all commands that are issued on the first switch to a text file for editing. This option captures the text output from the terminal session and saves it to a file, which can then be accessed and edited as needed.
50.
Which information is used by the router to determine the path between the source and destination hosts?
Correct Answer
B. The network portion of the IP address
Explanation
Routers use the network portion of the IP address to determine the path between the source and destination hosts. The network portion of the IP address identifies the network to which the host belongs. Routers maintain a routing table that contains information about different networks and the paths to reach them. By examining the network portion of the IP address, routers can look up the appropriate entry in the routing table and determine the next hop to forward the packet towards the destination host. The MAC address is used at the data link layer for communication within a local network, but it is not directly used by routers for determining the path between hosts on different networks.