1.
1.-A PC can not connect to any remote websites, ping its default
gateway, or ping a printer that is functioning properly on the local network
segment. Which action will verify that the TCP/IP stack is functioning
correctly on this PC?
Correct Answer
B. Use the ping 127.0.0.1 command at the command prompt.
Explanation
Using the "ping 127.0.0.1" command at the command prompt will verify that the TCP/IP stack is functioning correctly on the PC. The IP address 127.0.0.1 is the loopback address, which means it is the address of the local host. By pinging this address, the PC is essentially sending a test packet to itself and checking if it receives a response. If the PC receives a response, it indicates that the TCP/IP stack is functioning correctly.
2.
2 Refer to the exhibit. Which set of devices contains only intermediary devices?
Correct Answer
A. A, B, D, G
Explanation
The devices A, B, D, G are considered intermediary devices because they are all networking devices that help facilitate communication between other devices on the network. These devices include switches (A, B), routers (D), and firewalls (G), which are all examples of intermediary devices.
3.
3 Refer to the exhibit. When computer A sends a frame to computer D, what computers receive the frame?
Correct Answer
A. Only computer D
Explanation
When computer A sends a frame to computer D, only computer D receives the frame. This is because the frame is specifically addressed to computer D, so only that computer will process and receive the frame. Computer A and the other computers (B and C) are not the intended recipients of the frame, so they will not receive it.
4.
4 Which password is automatically encrypted when it is created?
Correct Answer
D. Enable secret
Explanation
The correct answer is "enable secret". This password is automatically encrypted when it is created, providing an additional layer of security. Unlike the "enable password" option, which is stored in plain text, the "enable secret" password is hashed using a one-way encryption algorithm, making it more secure and less susceptible to unauthorized access.
5.
5 Which three statements characterize the transport layer protocols? (Choose three.)
Correct Answer(s)
A. TCP and UDP port numbers are used by application layer protocols
D. TCP uses windowing and sequencing to provide reliable transfer of data.
E. TCP is a connection-oriented protocol. UDP is a connectionless protocol.
Explanation
The three statements that characterize the transport layer protocols are:
1. TCP and UDP port numbers are used by application layer protocols: This means that the application layer protocols use TCP and UDP port numbers to establish communication with the transport layer.
2. TCP uses windowing and sequencing to provide reliable transfer of data: TCP uses a sliding window mechanism and sequence numbers to ensure that data is delivered reliably and in order.
3. TCP is a connection-oriented protocol. UDP is a connectionless protocol: TCP establishes a connection between the sender and receiver before data transfer, whereas UDP does not require a connection and simply sends data packets.
6.
6 Which type of media is immune to EMI and RFI? (Choose two.)
Correct Answer(s)
A. 1000 Base LX
D. 100 Base-FX
Explanation
The 1000 Base LX and 100 Base-FX are both fiber optic media types, which are immune to electromagnetic interference (EMI) and radio frequency interference (RFI) due to their use of light signals instead of electrical signals. Fiber optic cables are not affected by EMI and RFI, making them a reliable choice for areas with high levels of interference or in environments where EMI and RFI are a concern.
7.
7 Refer to the exhibit. A technician is working on a network problem that requires verification of the router LAN interface. What address should be pinged from this host to confirm that the router interface is operational?
Correct Answer
C. 192.168.254.1
Explanation
To confirm that the router interface is operational, the technician should ping the IP address of the router LAN interface. In this case, the IP address of the router LAN interface is 192.168.254.1.
8.
8 Refer to the exhibit. The diagram represents the process of sending email between clients. Select the list below that correctly identifies the component or protocol used at each numbered stage of the diagram.
Correct Answer
E. 1.MUA 2.SMTP 3.MTA 4.SMTP 5.MTA 6.MDA 7.POP 8.MUA
Explanation
This answer correctly identifies the component or protocol used at each numbered stage of the diagram. The process starts with the Mail User Agent (MUA) where the email is composed and sent. Then, the Simple Mail Transfer Protocol (SMTP) is used to send the email from the MUA to the Mail Transfer Agent (MTA). The MTA then forwards the email to another MTA using SMTP. The email is then received by the Mail Delivery Agent (MDA) using the Post Office Protocol (POP). Finally, the MDA delivers the email to the recipient's MUA.
9.
9 Refer to the exhibit. What function does router RT_A need to provide to allow Internet access for hosts in this network?
Correct Answer
A. Address translation
Explanation
Router RT_A needs to provide address translation in order to allow Internet access for hosts in this network. Address translation, also known as Network Address Translation (NAT), is a process that allows multiple devices with private IP addresses to share a single public IP address when connecting to the Internet. This allows the hosts in the network to communicate with external devices on the Internet by translating their private IP addresses to the public IP address assigned to the router. This ensures that the hosts can access the Internet while maintaining the security of their private IP addresses.
10.
10 Refer to the exhibit. The network containing router B is experiencing problems. A network associate has isolated the issue in this network to router B? What action can be preformed to correct the network issue?
Correct Answer
B. Issue the no shutdown command on interface FastEthernet 0/1
Explanation
The correct answer is to issue the "no shutdown" command on interface FastEthernet 0/1. This command will bring up the interface and enable it to send and receive network traffic. By performing this action, the network issue can be resolved as it will ensure that the interface is not in a shutdown state, allowing it to function properly.
11.
11 Which three IPv4 addresses represent a broadcast for a subnet? (Choose three.)
Correct Answer(s)
A. 172.16.4.63 /26
C. 172.16.4.191 /26
E. 172.16.4.95 /27
Explanation
The broadcast address for a subnet is the last address in the range of addresses for that subnet. In this case, the subnet mask is /26, which means that the first 26 bits of the IP address are the network portion and the remaining 6 bits are the host portion. Therefore, the broadcast address for the subnet would have all the host bits set to 1.
For the given options, the IP addresses 172.16.4.63, 172.16.4.191, and 172.16.4.95 all have the host bits set to 1, making them the broadcast addresses for their respective subnets.
12.
12 What are three characteristics of CSMA/CD? (Choose three.)
Correct Answer(s)
B. A device listens and waits until the media is not busy before transmitting.
D. All of the devices on a segment see data that passes on the network medium.
E. After detecting a collision, hosts can attempt to resume transmission after a random time delay has expired.
Explanation
CSMA/CD (Carrier Sense Multiple Access with Collision Detection) is a protocol used in Ethernet networks. It has three main characteristics. Firstly, before transmitting, a device listens and waits until the media is not busy, ensuring that there is no collision. Secondly, all devices on a segment can see data that passes on the network medium, allowing for shared communication. Lastly, after detecting a collision, hosts can attempt to resume transmission after a random time delay has expired, reducing the chances of another collision occurring.
13.
13 In a Cisco IOS device, where is the startup-configuration file stored?
Correct Answer
B. NVRAM
Explanation
The startup-configuration file in a Cisco IOS device is stored in NVRAM (Non-Volatile Random Access Memory). NVRAM is a type of memory that retains its data even when the device is powered off or restarted. It is used to store important configuration files and settings that are necessary for the device to boot up and function properly.
14.
14 A routing issue has occurred in you internetwork. Which of the following type of devices should be examined to isolate this error?
Correct Answer
D. Router
Explanation
To isolate a routing issue in an internetwork, the router should be examined. Routers are responsible for directing network traffic between different networks, and any issue with routing can cause connectivity problems. By examining the router, one can identify and troubleshoot any misconfigurations, faulty hardware, or software errors that may be causing the routing problem. Access points, hosts, hubs, and switches are not directly involved in routing, so they would not be the primary devices to examine in this scenario.
15.
15 Which OSI layer protocol does IP rely on to determine whether packets have been lost and to request retransmission?
Correct Answer
D. Transport
Explanation
IP relies on the transport layer protocol to determine whether packets have been lost and to request retransmission. The transport layer protocols, such as TCP (Transmission Control Protocol), provide reliable and error-free delivery of packets by implementing mechanisms like acknowledgments, sequence numbers, and retransmission requests. These protocols ensure that the packets are delivered in the correct order and any lost or corrupted packets are retransmitted, ensuring the reliability of the communication.
16.
16 Due to a security violation, the router passwords must be changed. What information can be learned from the following configuration entries? (Choose two.)Router(config)# line vty 0 3
Router(config-line)# password c13c0
Router(config-line)# login
Correct Answer(s)
B. The entries specify four Telnet lines for remote access.
E. Access will be permitted for Telnet using "c13c0" as the password.
Explanation
The given configuration entries indicate that there are four Telnet lines specified for remote access. Additionally, the password for these Telnet lines is set to "c13c0". Therefore, access will be permitted for Telnet using "c13c0" as the password.
17.
17 Which prompt represents the appropriate mode used for the copy running-config startup-config command ?
Correct Answer
B. Switch-6J#
Explanation
The prompt "Switch-6J#" represents the appropriate mode used for the "copy running-config startup-config" command. This prompt indicates that the user is in privileged EXEC mode, which is the mode required to execute this command.
18.
18 Which combination of network id and subnet mask correctly identifies all IP addresses from 172.16.128.0 through 172.16.159.255?
Correct Answer
D. 172.16.128.0 255.255.224.0
Explanation
The subnet mask 255.255.224.0 has a binary representation of 11111111.11111111.11100000.00000000. This means that the first 19 bits of the IP address are used for the network ID, and the remaining 13 bits are available for host addresses. The IP addresses from 172.16.128.0 through 172.16.159.255 fall within this range, so the combination of network ID 172.16.128.0 and subnet mask 255.255.224.0 correctly identifies all these IP addresses.
19.
19 When must a router serial interface be configured with the clock rate command?
Correct Answer
D. When the interface is functioning as a DCE device
Explanation
The router serial interface must be configured with the clock rate command when it is functioning as a DCE (Data Communications Equipment) device. In this scenario, the router is responsible for providing the clock signal to the connected DTE (Data Terminal Equipment) device. The clock rate command is used to set the clocking speed on the interface, ensuring proper synchronization between the devices.
20.
20 When connectionless protocols are implemented at the lower layers of the OSI model, what are usually used to acknowledge the data receipt and request the retransmission of missing data?
Correct Answer
B. Upper-layer connection-oriented protocols
Explanation
When connectionless protocols are implemented at the lower layers of the OSI model, upper-layer connection-oriented protocols are usually used to acknowledge the data receipt and request the retransmission of missing data. This is because connectionless protocols do not establish a dedicated connection between the sender and receiver, so they do not provide reliable delivery of data. In order to ensure data reliability, upper-layer connection-oriented protocols are used to manage the acknowledgment and retransmission process. These protocols establish a connection between the sender and receiver and provide mechanisms for acknowledging received data and requesting retransmission of missing data.
21.
21 A technician is asked to secure the privileged EXEC mode of a switch by requiring a password. Which type of password would require this login and be considered the most secure?
Correct Answer
C. Enable secret
Explanation
The most secure password to secure the privileged EXEC mode of a switch is the "enable secret" password. This password is encrypted and stored in the switch's configuration file, providing an additional layer of security. The "console" password is used to secure console access, the "enable" password is used to secure privileged EXEC mode but is not as secure as the "enable secret" password, and "VTY" is used to secure remote access to the switch.
22.
22 Refer to the exhibit. What is required on host A for a network technician to create the initial configuration on RouterA?
Correct Answer
C. A terminal emulation program
Explanation
To create the initial configuration on RouterA, a network technician would need a terminal emulation program on host A. This program allows the technician to establish a console connection with RouterA and configure it using command-line interface (CLI) commands. FTP client, telnet client, and web browser are not required for this specific task.
23.
23 Refer to the exhibit. A network administrator remotely accesses the CLI of RouterB from PC1. Which two statements are true about the application layer protocol that is used to make this connection? (Choose two.)
Correct Answer(s)
B. The connection type is called a VTY session.
E. The application name is the same for the service, protocol, and client.
Explanation
The connection type is called a VTY session because the network administrator is remotely accessing the CLI of RouterB from PC1 using a virtual terminal line. The application name is the same for the service, protocol, and client because the network administrator is using a specific application or protocol to establish the remote connection between PC1 and RouterB.
24.
24 The Layer 4 header contains which type of information to aid in the delivery of data?
Correct Answer
A. Service port number
Explanation
The Layer 4 header contains the service port number to aid in the delivery of data. The service port number is used to identify the specific application or service that the data is intended for. By including this information in the Layer 4 header, the receiving device can determine how to process the data and deliver it to the correct application or service. This helps ensure that the data reaches its intended destination and is properly handled.
25.
25 Refer to the exhibit. What two facts can be determined about the exhibited topology? (Choose two.)
Correct Answer(s)
A. A single broadcast domain is present
E. Five collision domains exist.
Explanation
Based on the exhibited topology, it can be determined that a single broadcast domain is present because all devices are connected to the same switch, which means they are in the same broadcast domain. Additionally, five collision domains exist because each port on the switch represents a separate collision domain, and there are five ports in total.
26.
26 Refer to the exhibit. A network technician is trying to determine the correct IP address configuration for Host A. What is a valid configuration for Host A?
Correct Answer
B. IP address: 192.168.100.20; Subnet Mask: 255.255.255.240; Default Gateway: 192.168.100.17
Explanation
The correct configuration for Host A is IP address: 192.168.100.20; Subnet Mask: 255.255.255.240; Default Gateway: 192.168.100.17. This is because the IP address falls within the same network range as the default gateway and the subnet mask is correct for the given IP address and default gateway.
27.
27 Refer to the exhibit. Cable 1 and cable 2 have the ends wired for specific physical layer requirements. The table lists each segment by number and the cable which has been installed by the network technician between the network components on that segment. From the data given, which segments have the correct cable installed? (Choose three.)
Correct Answer(s)
A. Segment1
C. Segment3
D. Segment4
Explanation
The correct cables are installed in segment1, segment3, and segment4. This can be determined by comparing the cable requirements for each segment with the cables listed in the table. The exhibit does not provide information on the cable requirements or the specific cables installed, so it is not possible to determine the correct answer.
28.
28 What is true regarding network layer addressing? (Choose three.)
Correct Answer(s)
C. Heirarchical
D. Uniquely identifies each host
E. Contains a network portion
Explanation
The network layer addressing uses a hierarchical structure, where addresses are organized in a hierarchical manner to facilitate routing and management of networks. It uniquely identifies each host by assigning a unique address to each device on the network. Additionally, the network layer addressing contains a network portion, which helps in identifying the network to which the host belongs.
29.
29 Refer to the exhibit. A router, whose table is shown, receives a packet that is destined for 192.168.1.4. How will router treat the packet?
Correct Answer
C. The packet will be forwarded to the destination host.
Explanation
Based on the router table shown in the exhibit, we can see that there is a specific entry for the destination IP address 192.168.1.4. This means that the router knows how to reach this destination and will forward the packet directly to the destination host. Therefore, the correct answer is that the packet will be forwarded to the destination host.
30.
30 Refer to the exhibit. Which two statements describe the information that is represented in the header? (Choose two.)
Correct Answer(s)
C. The destination port indicates a Telnet session.
D. The return segment will contain a source port of 23.
Explanation
The information represented in the header is that the destination port indicates a Telnet session and the return segment will contain a source port of 23.
31.
31 Refer to the exhibit. What is the correct destination socket number for a web page request from Host A to the web server?
Correct Answer
B. 198.133.219.25:80
Explanation
The correct destination socket number for a web page request from Host A to the web server is 198.133.219.25:80. This is because the given IP address and port number (198.133.219.25:80) represent the specific destination where the web server is located and the port (80) that is used for web page requests.
32.
32 During the encapsulation process, which identifiers are added at the transport layer?
Correct Answer
B. Two applications communicating the data
Explanation
During the encapsulation process at the transport layer, the identifiers that are added are specific to the two applications that are communicating the data. These identifiers help in establishing a connection between the two applications and enable the transport layer to properly deliver the data from the source application to the destination application. The transport layer protocols, such as TCP and UDP, use these identifiers to ensure reliable and efficient data transfer between the applications.
33.
33 Refer to the exhibit. A student has wired each end of a CAT 5e cable as shown. What is the result? (Choose two.)
Correct Answer(s)
C. The cable is suitable for use as a Fast Ethernet crossover.
E. The cable is suitable for use between two 100 Mbps Auto-MDIX capable switches.
Explanation
The wiring configuration shown in the exhibit corresponds to a Fast Ethernet crossover cable. This type of cable is used to connect two Ethernet devices of the same type (e.g., switch to switch) without the need for a crossover adapter. Additionally, the cable is suitable for use between two 100 Mbps Auto-MDIX capable switches, which means that the switches will automatically detect and adjust for the correct cable type. Therefore, the cable is usable and does not need to be rewired.
34.
34 Refer to the exhibit. Assume all devices are using default configurations. How many subnets are required to address the topology that is shown?
Correct Answer
B. 3
Explanation
The given exhibit shows a network topology with three different subnets, each containing a different set of devices. Therefore, to address this topology, three subnets are required.
35.
35 Refer to the exhibit. On the basis of the IP configuration that is shown, what is the reason that Host A and Host B are unable to communicate outside the local network?
Correct Answer
D. The gateway address was assigned a broadcast address.
Explanation
The reason that Host A and Host B are unable to communicate outside the local network is because the gateway address was assigned a broadcast address. A broadcast address is used to send data to all devices on a network, so assigning it as the gateway address means that any communication sent to the gateway will be broadcasted to all devices instead of being routed to the appropriate destination. Therefore, the gateway is unable to properly route the traffic between Host A, Host B, and the external network.
36.
36 Refer to the exhibit. Each media link is labeled. What type of cable should be used to connect the different devices?
Correct Answer
D. Connection 1 - straight-through cable
Connection 2 - crossover cable
Connection 3 - straight-through cable
Explanation
The correct answer is Connection 1 - straight-through cable, Connection 2 - crossover cable, Connection 3 - straight-through cable. This is because a straight-through cable is used to connect a host device to a switch or router, which is the case for Connection 1 and Connection 3. A crossover cable is used to connect two similar devices, such as two switches or two routers, which is the case for Connection 2.
37.
37 Refer to the exhibit. What does the IP address 192.168.33.2 represent?
Correct Answer(s)
A. 10.0.0.0 to 10.255.255.255
D. 172.16.0.0 to 172.31.255.255
E. 192.168.0.0 to 192.168.255.255
Explanation
The IP address 192.168.33.2 falls within the range of 192.168.0.0 to 192.168.255.255, which is a private IP address range commonly used for local area networks (LANs). This range allows for a large number of devices to be connected within a single network.
38.
40 Which two functions of the OSI model occur at layer two? (Choose two.)
Correct Answer(s)
A. pHysical addressing
E. Media access control
Explanation
The functions of physical addressing and media access control occur at layer two of the OSI model. Physical addressing involves assigning unique addresses to devices on a network, such as MAC addresses. Media access control, on the other hand, is responsible for managing access to the physical medium, ensuring that multiple devices can communicate on the same network without interference.
39.
41 Which range of port numbers are reserved for services that are commonly used by applications that run on servers?
Correct Answer
C. 1024 to 49151
Explanation
The range of port numbers 1024 to 49151 is reserved for services commonly used by applications that run on servers. These ports are known as registered ports and are used for specific services such as email, web browsing, and file transfer. Ports in this range are assigned by the Internet Assigned Numbers Authority (IANA) to ensure that different applications do not conflict with each other. The lower range of ports (0 to 1023) is reserved for well-known ports used by standard services, while the higher range (49152 to 65535) is used for dynamic or private ports.
40.
42 As network administrator, what is the subnet mask that allows 510 hosts given the IP address 172.30.0.0?
Correct Answer
C. 255.255.254.0
Explanation
The IP address 172.30.0.0 is a Class B address, which means the default subnet mask is 255.255.0.0. However, this subnet mask only allows for 65,534 hosts. To accommodate 510 hosts, a smaller subnet mask is needed. The subnet mask 255.255.254.0 provides a range of 512 addresses, which is sufficient to accommodate 510 hosts.
41.
43 Refer to the exhibit. The tracert command is initiated from PC1 to the destination PC4. Which device will send a response to the initial packet from PC1?
Correct Answer
A. London
Explanation
The correct answer is London because the tracert command is used to trace the route that packets take from the source to the destination. In this case, PC1 is the source and PC4 is the destination. The tracert command sends packets with increasing TTL (Time to Live) values, and each router along the path decrements the TTL value. When the TTL reaches 0, the router discards the packet and sends an ICMP Time Exceeded message back to the source. Therefore, the device that will send a response to the initial packet from PC1 is London, which is the first router in the path.
42.
44 Refer to the exhibit. Host A is transmitting data to host B. What addresses will host A use to for the destination IP and MAC addresses in this communication?
Correct Answer
E. Destination MAC: EEEE:EEEE:EEEE Destination IP: 172.22.0.75
Explanation
Host A will use the destination MAC address EEEE:EEEE:EEEE and the destination IP address 172.22.0.75 for the communication. The MAC address is used to identify the specific network interface card (NIC) of the destination host, while the IP address is used to identify the destination host within the network. Therefore, in this scenario, host A will send the data to the NIC with the MAC address EEEE:EEEE:EEEE and the IP address 172.22.0.75.
43.
45 Refer to the exhibit. Which logical topology best describes the exhibited network?
Correct Answer
D. Multiaccess
Explanation
The exhibited network in the exhibit shows multiple devices connected to a central device. This indicates a multiaccess topology, where multiple devices have access to the same communication medium. In a multiaccess topology, all devices can communicate with each other without the need for a central controller or node.
44.
46 Examine the graphic with current configurations. Host A in the Clerical offices failed and was replaced. Although a ping to 127.0.0.1 was successful, the replacement computer can not access the company network. What is the likely cause of the problem?
Correct Answer
C. Subnet mask incorrectly entered
Explanation
The likely cause of the problem is that the subnet mask was incorrectly entered. The subnet mask is used to determine which part of an IP address belongs to the network and which part belongs to the host. If the subnet mask is entered incorrectly, it can result in the replacement computer not being able to access the company network even though a ping to the loopback address (127.0.0.1) is successful.
45.
47 Refer to the exhibit. With the router running NAT, what IP addresses can be applied to the computer to allow access to the Internet? (Choose three.)
Correct Answer(s)
C. 192.168.18.49
D. 192.168.18.52
E. 192.168.18.59
Explanation
The given IP addresses can be applied to the computer to allow access to the Internet because they are within the same subnet as the router's LAN interface IP address (192.168.18.0/24). This means that they are on the same network and can communicate with each other. Therefore, the computer can use these IP addresses to access the Internet through the router's NAT configuration.
46.
48 Refer to the exhibit. What three statements are true about the IP configuration that is shown? (Choose three.)
Correct Answer(s)
A. The address that is assigned to the computer represents private addressing.
B. The computer is unable to communicate outside of the local network.
D. The prefix of the computer address is /27.
Explanation
The IP configuration shown in the exhibit indicates that the address assigned to the computer represents private addressing, as it falls within the range of private IP addresses. The computer is also unable to communicate outside of the local network, as private addresses are not routable on the Internet. Additionally, the prefix of the computer address is /27, which indicates that the network can have 30 usable hosts (32 - 2).
47.
49 Refer to the exhibit. Host A attempts to establish a TCP/IP session with host C. During this attempt, a frame was captured with the source MAC address 0050.7320.D632 and the destination MAC address 0030.8517.44C4. The packet inside the captured frame has an IP source address 192.168.7.5, and the destination IP address is 192.168.219.24. At which point in the network was this packet captured?
Correct Answer
C. Leaving Dallas
Explanation
The packet was captured at the point in the network where it was leaving Dallas. This is indicated by the source MAC address 0050.7320.D632, which belongs to a device in Dallas, and the destination MAC address 0030.8517.44C4, which is the MAC address of the device that the packet is being sent to.
48.
50 Which of the following OSI layers offers reliable, connection-oriented data communication services?
Correct Answer
D. Transport
Explanation
The transport layer of the OSI model offers reliable, connection-oriented data communication services. This layer is responsible for ensuring that data is delivered accurately and efficiently between devices. It establishes connections, manages flow control, and provides error recovery mechanisms. It also handles segmentation and reassembly of data packets.