1.
You are designing a network which needs to support 200 users. You don't plan to extend the segment beyond the current number of users. Which subnet mask would best meet your needs? Select the best answer.
Correct Answer
B. 255.255.255.0
Explanation
The subnet mask 255.255.255.0 would best meet the needs of supporting 200 users. This subnet mask allows for a maximum of 254 hosts on the network, which is more than enough for the 200 users. The other subnet masks listed would either not provide enough available hosts or would allow for significantly more hosts than necessary.
2.
Which command does not show that two devices are failing to route packets between them successfully?
Correct Answer
A. Show interface
Explanation
The "show interface" command displays information about the status and configuration of network interfaces on a device, such as their operational state, IP address, and packet statistics. However, it does not directly indicate whether two devices are failing to route packets between them successfully. This command primarily focuses on providing interface-specific details rather than overall network connectivity. To determine if devices are failing to route packets, other commands like "trace," "telnet," or "ping" would be more appropriate.
3.
What would be the proper command to set a DCE clock rate of 56k for a serial interface?
Correct Answer
C. Router (config-if) #clock rate 56000
Explanation
The proper command to set a DCE clock rate of 56k for a serial interface is "Router (config-if) #clock rate 56000".
4.
. Which statement is true regarding the user exec and privileged exec mode
Correct Answer
B. User exec is a subset of the privileged exec
Explanation
The statement that "User exec is a subset of the privileged exec" is true. User exec mode is the default mode when a user logs into a Cisco device, and it provides limited access to basic monitoring and troubleshooting commands. On the other hand, privileged exec mode provides full access to all commands and configuration options. Therefore, privileged exec mode includes all the commands and capabilities of user exec mode, making user exec mode a subset of privileged exec mode.
5.
Which topology used in Ethernet
Correct Answer
A. Bus
Explanation
Ethernet uses a Bus topology. In this topology, all devices are connected to a single cable called the bus. Each device on the network can send data to all other devices on the network. However, only one device can transmit data at a time, and collisions can occur if multiple devices try to transmit simultaneously. This topology is simple and cost-effective, but it can have performance issues as the network grows larger.
6.
. ………. messages are never sent in response to datagrams with a broadcast or a multicast destination address.
Correct Answer
A. ICMP
Explanation
ICMP messages are never sent in response to datagrams with a broadcast or a multicast destination address because ICMP is primarily used for error reporting and diagnostic purposes in IP networks. Broadcast and multicast addresses are used to send messages to multiple hosts simultaneously, and ICMP messages are not designed to handle such scenarios. ICMP messages are typically sent to a specific host or router to report errors, request information, or perform network diagnostics.
7.
When the IP layer of a receiving host receives a datagram, …..
Correct Answer
B. A transport layer protocol takes over
Explanation
When the IP layer of a receiving host receives a datagram, a transport layer protocol takes over. The transport layer protocol is responsible for ensuring the reliable delivery of data between the source and destination hosts. It breaks down the data received from the IP layer into smaller segments, adds necessary headers, and manages the flow control and error recovery mechanisms. The transport layer protocol then passes these segments to the appropriate application layer protocol for further processing.
8.
A port address in TCP/IP is ………bits long.
Correct Answer
C. 16
Explanation
A port address in TCP/IP is 16 bits long. In TCP/IP, a port number is used to identify a specific process or service running on a device. The port number is a 16-bit value, allowing for a total of 65,536 possible port addresses. This allows for a wide range of services to be uniquely identified and accessed within the TCP/IP protocol suite.
9.
Which methods are commonly used in Server Socket class?
Correct Answer
B. Public Socket accept ()
Explanation
The correct answer is "Public Socket accept ()". This method is commonly used in the ServerSocket class to accept incoming client connections. It waits until a client connects to the server and then returns a new Socket object that represents the connection. This allows the server to establish communication with the client and handle the incoming requests. The other methods mentioned in the options are also available in the ServerSocket class, but they are not commonly used for the purpose of accepting incoming client connections.
10.
Which constructor of Datagram Socket class is used to create a datagram socket and binds it with the given Port Number?
Correct Answer
B. Datagram Socket(int port, Int Address address)
Explanation
The correct answer is "Datagram Socket(int port, Int Address address)". This constructor is used to create a datagram socket and binds it with the given Port Number. It takes two parameters - the port number and the IP address. This constructor allows the user to specify both the port number and the IP address to bind the socket to a specific address and port.
11.
What does the java.net.InetAddress class represent?
Correct Answer
B. IP Address
Explanation
The java.net.InetAddress class represents an IP Address. It is used to represent and manipulate IP addresses and host names. It provides methods to get the host name and IP address of a given host, as well as to check if a particular IP address is reachable. This class is commonly used in network programming to establish network connections and perform various network-related operations.
12.
Refer to the exhibit. What information can be gathered from the output?
RouterA#debug ip rip
RIP protocol debugging is on00:34:32: RIP: sending v2 flash update to 224.0.0.9 via FastEthernet8/0 (172.16.1.1)
00:34:32: RIP: build flash update entries
00:34:32: 10.10.1.0/24 via 0.0.0.6, metric 1, tag 0
00:34:32: RIP: sending v2 flash update to 224.0.0.9 via Loopback (10.10.1.1)
00:34:32: RIP: build flash update entries
00:34:32: 10.0.0.0/8 via 0.6.0.0, metric 2, tag 0
00:34:32: 172.16.1.0/24 via 0.0.0.0, metric 1, tag 0
00:34:32: RIP: ignored v2 packet from 16.10.1.1 (sourced from one of our addresses)
06:34:33: RIP: received v2 update from 172.16.1.2 on FastEthernet0/6
66:34:33: 16.6.0.0/8 via 6.0.6.6 in 1 hops
66:34:44: RIP: sending v2 update to 224.6.6.9 via FastEthernet0/0 (172.16.1.1)
66:34:44: RIP: build update entries
66:34:44: 10.10.1.0/24 via 0.0.0.0, metric 1, tag 0
Correct Answer
D. Network 10.10.1.0 is reachable
Explanation
From the output, it can be gathered that the network 10.10.1.0 is reachable. This is indicated by the line "10.10.1.0/24 via 0.0.0.6, metric 1, tag 0" which shows that the network 10.10.1.0 is being advertised with a metric of 1. This means that the network is directly connected to the router and can be reached through the interface with the IP address 0.0.0.6.
13.
. What thing will a router do when running a distance vector routing protocol?
Correct Answer
A. Send periodic updates regardless of topology changes
Explanation
When running a distance vector routing protocol, a router will send periodic updates regardless of topology changes. This means that the router will regularly send updates about its routing table to other routers in the network, even if there have been no changes in the network's topology. This helps ensure that all routers have the most up-to-date information about the network's routing paths.
14.
. Refer to the exhibit. Router A has interfaces with addresses 192.168.1.1 and 172.16.1.1. Router B, which is connected to router A over a serial link, has interfaces with address 172.16.1.2 and 10.1.1.2.
Which sequence of commands will configure RIPv2 on router B?
Correct Answer
A. B( config)# router rip
B(config-router)#version 2
B(config-router)# network 172.16.0.0
B(config-router)# network 10.0.0.0
B(config-router)# end
Explanation
This sequence of commands will configure RIPv2 on router B. The first command "router rip" enters the RIP configuration mode. The second command "version 2" sets the RIP version to 2. The third and fourth commands "network 172.16.0.0" and "network 10.0.0.0" specify the network addresses to be included in the RIP routing process. The final command "end" exits the RIP configuration mode.
15.
What can be determined from the line of show ip route output shown in the exhibit?
R 10.10.10.8 [120/2] via 10.10.10.6,00:00:25, Serial0/1
Correct Answer
D. The 10.10.10.8 network is two hops away from this router.
Explanation
The line of show ip route output indicates that the network 10.10.10.8 is reachable via the next hop 10.10.10.6, which is connected to the router's Serial0/1 interface. The [120/2] metric suggests that the route was learned through an interior gateway protocol (IGP) and has a cost of 2. Since the next hop is one hop away from the router, and the network 10.10.10.8 is reachable through that next hop, it can be inferred that the 10.10.10.8 network is two hops away from this router.
16.
. Refer to the exhibit. Which (config-router) command will allow the network represented on the interface to be advertised by RIP?
router rip
version 2
no auto summary
!
interface ethernet0
ip address 10.12.6.1 255.255.0.0
Correct Answer
A. Redistribute ethernet0
Explanation
The "redistribute ethernet0" command will allow the network represented on the interface to be advertised by RIP. This command redistributes routes learned from another routing protocol or from directly connected networks into the RIP routing table. In this case, it will redistribute the routes learned from the ethernet0 interface into the RIP routing table, allowing them to be advertised to other routers in the network.