You are on page 1of 22

1. Refer to the exhibit. Cable 1 and cable 2 have the ends wired for specific physical layer requirements.

The table lists each segment by number and the cable which has been installed by the network technician between the network components on that segment. rom the data given! which segments have the correct cable installed" #Choose three.$ % segment1 & segment2 C segment' ( segment) * segment+ 2. % ,C can not connect to any remote websites! ping its default gateway! or ping a printer that is functioning properly on the local network segment. -hich action will verify that the TC,./, stack is functioning correctly on this ,C" % 0se the ipconfig .all command at the host1s command prompt. & 0se the ping command at the command prompt. C 0se the traceroute command at the command prompt to identify any failures on the path to the gateway. ( 0se T, to check for connectivity to remote sites. * (ownload a troubleshooting tool from the ,C manufacturer4s website. '. -hich of the following are the address ranges of the private /, addresses" #Choose three.$ % to 13.2++.2++.2++ & 233.133.+3.3 to 233.133.2+.2++ C 1+3.1+3.3.3 to 1+3.1+3.2++.2++ ( to 122.'1.2++.2++ * to 162.157.2++.2++ to 122.'1.2++.2++ ). Refer to the exhibit. % network technician is trying to determine the correct /, address configuration for 8ost %. -hat is a valid configuration for 8ost %" % /, address9 ;ubnet <ask9 2++.2++.2++.2)7: (efault =ateway9 & /, address9 ;ubnet <ask9 2++.2++.2++.2)3: (efault =ateway9 C /, address9 ;ubnet <ask9 2++.2++.2++.2)7: (efault =ateway9 ( /, address9 ;ubnet <ask9 2++.2++.2++.2)3: (efault =ateway9 13.1.1.+ * /, address9 162.157.133.'3: ;ubnet <ask9 2++.2++.2++.2)3: (efault =ateway9

/, address9 162.157.133.'1: ;ubnet <ask9 2++.2++.2++.2)3: (efault =ateway9 +. Refer to the exhibit. 8ost % is transmitting data to host &. -hat addresses will host % use to for the destination /, and <%C addresses in this communication" % (estination <%C9 &&&&9&&&&9&&&& (estination /,9 & (estination <%C9 ((((9((((9(((( (estination /,9 C (estination <%C9 ****9****9**** (estination /,9 ( (estination <%C9 &&&&9&&&&9&&&& (estination /,9 * (estination <%C9 ****9****9**** (estination /,9 (estination <%C9 ((((9((((9(((( (estination /,9 5. Refer to the exhibit. % student has wired each end of a C%T +e cable as shown. -hat is the result" #Choose two.$ % The cable is unusable and must be rewired. & The cable is suitable for use as a =igabit *thernet straight>through. C The cable is suitable for use as a ast *thernet crossover. ( The cable is suitable for use as a rollover cable. * The cable is suitable for use as a =igabit *thernet crossover. The cable is suitable for use between two 133 <bps %uto><(/? capable switches. 2. *xamine the graphic with current configurations. 8ost % in the Clerical offices failed and was replaced. %lthough a ping to was successful! the replacement computer can not access the company network. -hat is the likely cause of the problem" % /, address incorrectly entered & network cables unplugged C subnet mask incorrectly entered ( network card failure 7. Refer to the exhibit. The diagram represents the process of sending email between clients. ;elect the list below that correctly identifies the component or protocol used at each numbered stage of the diagram. % 1.<0% 2.<(% '.<T% ).;<T, +.<T% 5.,@, 2.<(% 7.<0% & 1.<0% 2.,@, '.<(% ).;<T, +.<T% 5.<(% 2.;<T, 7.<0% C 1.<0% 2.,@, '.;<T, ).<(% +.<T% 5.;<T, 2.,@, 7.<0% ( 1.<(% 2.;<T, '.<T% ).;<T, +.<T% 5.<0% 2.,@, 7.<(% * 1.<0% 2.;<T, '.<T% ).;<T, +.<T% 5.<(% 2.,@, 7.<0%

6. Refer to the exhibit. @n the basis of the /, configuration that is shown! what is the reason that 8ost % and 8ost & are unable to communicate outside the local network" % 8ost % was assigned a network address. & 8ost & was assigned a multicast address. C 8ost % and 8ost & belong to different networks. ( The gateway address was assigned a broadcast address. 13. -hat are three characteristics of C;<%.C(" #Choose three.$ % (evices can be configured with a higher transmission priority. & % Aam signal indicates that the collision has cleared and the media is not busy. C % device listens and waits until the media is not busy before transmitting. ( The device with the electronic token is the only one that can transmit after a collision. * %ll of the devices on a segment see data that passes on the network medium. %fter detecting a collision! hosts can attempt to resume transmission after a random time delay has expired. 11. Refer to the exhibit. % network administrator remotely accesses the CB/ of Router& from ,C1. -hich two statements are true about the application layer protocol that is used to make this connection" #Choose two.$ % The data is encrypted. & The connection type is called a CTD session. C % server process is running on ,C1. ( % =*T request is sent to Router&. * The application name is the same for the service! protocol! and client. 12. % routing issue has occurred in you internetwork. -hich of the following type of devices should be examined to isolate this error" % access point & host C hub ( router * switch 1'. -hich two functions of the @;/ model occur at layer two" #Choose two.$ % physical addressing & encoding C routing ( cabling * media access control

1). Refer to the exhibit. -hen computer % sends a frame to computer (! what computers receive the frame" % only computer ( & only computer % and computer ( C only computer &! computer C! and computer ( ( all computers 1+. Refer to the exhibit. -hat two facts can be determined about the exhibited topology" #Choose two.$ % % single broadcast domain is present & Two logical address ranges are required. C Three broadcast domains are shown. ( our networks are needed. * ive collision domains exist. 15. -hich three statements characteriEe the transport layer protocols" #Choose three.$ % TC, and 0(, port numbers are used by application layer protocols. & TC, uses port numbers to provide reliable transportation of /, packets. C 0(, uses windowing and acknowledgments for reliable transfer of data. ( TC, uses windowing and sequencing to provide reliable transfer of data. * TC, is a connection>oriented protocol. 0(, is a connectionless protocol. 12.-hich range of port numbers are reserved for services that are commonly used by applications that run on servers" % 3 to 2++ & 3 to 132' C 132) to )61+1 ( )61+2 to 5++'+ 17. %s network administrator! what is the subnet mask that allows +13 hosts given the /, address 122.'3.3.3" 2++.2++.3.3 2++.2++.2)7.3 2++.2++.2+).3 2++.2++.2++.127 16. Refer to the exhibit. -hat does the /, address 162.157.''.2 represent" % The host4s default gateway. & The host4s /, address. C The host4s primary domain name server. ( The /, address of the website resolver1.mooki.local. * The /, address of the host4s homepage.

23. Refer to the exhibit. -hich set of devices contains only intermediary devices" % %! &! (! = & %! &! *! C C! (! =! / ( =! 8! /! F 21. Refer to the exhibit. -hich two statements describe the information that is represented in the header" #Choose two.$ % This is a server response. & The 0(, protocol is being used. C The destination port indicates a Telnet session. ( The return segment will contain a source port of 2'. * The next session originated from the client of this session will use the source port number 1''+7. 22. Refer to the exhibit. -ith the router running G%T! what /, addresses can be applied to the computer to allow access to the /nternet" #Choose three.$ % 162.157.17.'7 & 162.157.17.)7 C 162.157.17.)6 ( 162.157.17.+2 * 162.157.17.+6' 2'. -hich combination of network id and subnet mask correctly identifies all /, addresses from through 122.15.1+6.2++" % 2++.2++.2++.22) & 2++.2++.3.3 C 2++.2++.162.3 ( 2++.2++.22).3 * 2++.2++.2++.162 2). Refer to the exhibit. % technician is working on a network problem that requires verification of the router B%G interface. -hat address should be pinged from this host to confirm that the router interface is operational" % & 162.157.5).165 C 162.157.2+).1 ( 162.157.2+).6 * 162.157.2+).2+)

2+. -hat is true regarding network layer addressing" #Choose three.$ % uses a flat structure & prevent broadcasts C heirarchical ( uniquely identifies each host * )7 bits in length contains a network portion 25. The Bayer ) header contains which type of information to aid in the delivery of data" % service port number & host logical address C device physical address ( virtual connection identifier 22. Refer to the exhibit. -hat three statements are true about the /, configuration that is shown" #Choose three.$ % The address that is assigned to the computer represents private addressing. & The computer is unable to communicate outside of the local network. C The network of this computer can have 125 hosts. ( The prefix of the computer address is .22. * The /,address that is assigned to the computer is routable on the /nternet. The /, address that is assigned to the computer is a broadcast address. 27. Refer to the exhibit. -hich logical topology best describes the exhibited network" % star & ring C point>to>point ( multiaccess * mesh 26. -hich @;/ layer protocol does /, rely on to determine whether packets have been lost and to request retransmission" % application & presentation C session ( transport

'3. Refer to the exhibit. 8ost % attempts to establish a TC,./, session with host C. (uring this attempt! a frame was captured with the source <%C address 33+3.2'23.(5'2 and the destination <%C address 33'3.7+12.))C). The packet inside the captured frame has an /, source address 162.157.2.+! and the destination /, address is %t which point in the network was this packet captured" % leaving host % & leaving %TB C leaving (allas ( leaving GDC '1. Refer to the exhibit. %ssume all devices are using default configurations. 8ow many subnets are required to address the topology that is shown"

%1 B3 C) (+ *2 '2. -hich of the following @;/ layers offers reliable! connection>oriented data communication services" % application & presentation C session D transport * network ''. Refer to the exhibit. *ach media link is labeled. -hat type of cable should be used to connect the different devices"

% Connection 1 > rollover cable Connection 2 > straight>through cable Connection ' > crossover cable & Connection 1 > crossover cable Connection 2 > rollover cable Connection ' > crossover cable C Connection 1 > straight>through cable Connection 2 > crossover cable Connection ' > crossover cable D Connection 1 - straight-through cable Connection 2 - crossover cable Connection 3 - straight-through cable * Connection 1 > crossover cable Connection 2 > straight>through cable Connection ' > crossover cable '). Refer to the exhibit. -hat is the correct destination socket number for a web page request from 8ost % to the web server"

% 33>37>a'>b5>ce>)5 B C ( C 167.1''.216.3.2) is directly connected! ast*thernet3.3 '+. Refer to the exhibit. -hat two facts can be determined from the information that is given" #Choose two.$

% This exchange is part of the three>way handshake. & The source port indicates that a Telnet session has been initiated. C The data is flowing from server to client. D The estination port in icates that an !TT" session has been initiate . # The ata liste is associate $ith the transport la%er. The source port does not support communication with the destination port that is listed. '5. -hich of the following protocols are examples of TC,./, transport layer protocols" % *thernet & 8TT, C /, D &D" * ;<T, ' TC" '2. -hich of the following protocols are examples of TC,./, Getwork access layer ( #thernet & 8TT, C /, ( 0(, * ;<T,

) """

'7. -hich of the following terms is used speciHcally to identify the entity that is created when encapsulating data inside data link layer headers and trailers" % (ata & Trunk C ;egment D 'ra*e * ,acket = Gone of these -hich @;/ layer deHnes the functions of logical network>wide addressing and routing" % Bayer 1 & Bayer 2 C +a%er 3 ( Bayer ) * Bayer + Bayer 5 = Bayer 2

)3. -hich @;/ layer deHnes the standards for cabling and connectors" ( +a%er 1 & Bayer 2 C Bayer ' ( Bayer ) * Bayer + Bayer 5 = Bayer 2 -hich @;/ layer deHnes the standards for data formats and encryption" % Bayer 1 & Bayer 2 C Bayer ' ( Bayer ) * Bayer + ' +a%er , = Bayer 2

)2. -hich of the following terms are not valid terms for the names of the seven @;/ layers" % %pplication & (ata link

C Transport ( ,resentation # -nternet ;ession )'. -hat are two advantages of Bayer 2 *thernet switches over hubs" #Choose two.$ % (ecreasing the number of collision domains B 'iltering .ra*es base on /(C a resses C (llo$ing si*ultaneous .ra*e trans*issions
( /ncreasing the siEe of broadcast domains * /ncreasing the maximum length of 0T, cabling between devices

Refer to the exhibit. &oth switches are using a default configuration. -hich two destination addresses will host ) use to send data to host 1" #Choose two.$

( The -" a ress o. host 1 & The /, address of host ) C The <%C address of host 1 ( The <%C address of host ) * The <%C address of the a3.3 interface of the R1 router ' The /(C a ress o. the 'a001 inter.ace o. the 11 router )+. -hat are two characteristics of Telnet" #Choose two.$ ( -t sen s ata in clear te2t .or*at. & /t is no longer supported on Cisco network devices. C /t is more secure than ;;8. ( /t requires an enterprise license in order to be implemented. # -t re3uires that the estination evice be con.igure to support Telnet connections. )5. % host is attempting to send data to another host on a different network. -hat is the first action that the sending host will take"

% (rop the data. B 4en the ata .ra*es to the e.ault gate$a%. C Create an %R, request to get a <%C address for the receiving host. ( ;end a TC, ;DG and wait for the ;DG %CI with the /, address of the receiving host. )2. -hich of the following correctly describe steps in the @;/ data encapsulation process" #Choose two.$ ( The transport la%er ivi es a ata strea* into seg*ents an *a% a
reliabilit% an .lo$ control in.or*ation.

& The data link layer adds physical source and destination addresses and an C; to the segment. C ,ackets are created when the network layer encapsulates a frame with source and destination host addresses and protocol>related control information. D "ac5ets are create $hen the net$or5 la%er a s +a%er 3 a resses an control in.or*ation to a seg*ent. * The presentation layer translates bits into voltages for transmission across the physical link. )7. or which type of connection should a straight>through cable be used" % ;witch to switch & ;witch to hub C 4$itch to router ( 8ub to hub * Router to ,C )6. -hich type of cable is used to connect the C@< port of a host to the C@< port of a router or switch" % Crossover & ;traight>through C 1olle -over ( ;hielded twisted>pair +3. -hich layer of the @;/ reference model uses the hardware address of a device to ensure message delivery to the proper host on a B%G" % ,hysical B Data lin5 C Getwork ( Transport +1. -hich layer of the @;/ reference model uses flow control! sequencing! and acknowledgements to ensure that reliable networking occurs" % (ata link

& Getwork C Transport ( ,resentation * ,hysical +2. -hich /, address can be assigned to an /nternet interface" % 13.173.)7.22) B C' ( +'. -hat will happen if a private /, address is assigned to a public interface connected to an /;," ( ( resses in a private range $ill be not route on the -nternet bac5bone. & @nly the /;, router will have the capability to access the public network. C The G%T process will be used to translate this address in a valid /, address. ( ;everal automated methods will be necessary on the private network. * % conflict of /, addresses happens! because other public routers can use the same range. +). -hen is it necessary to use a public /, address on a routing interface" % Connect a router on a local network. & Connect a router to another router. C %llow distribution of routes between networks. ( Translate a private /, address. # Connect a net$or5 to the -nternet. ++. -hat is the first 2) bits in a <%C address called" % G/C & &/% C 6&( C%/ +5. /n an *thernet network! under what two scenarios can devices transmit" #Choose two.$ % -hen they receive a special token & -hen there is a carrier C 7hen the% etect no other evices are sen ing D 7hen the *e iu* is i le * -hen the server grants access +2. -hich two benefits are provided by using a hierarchical addressing network addressing scheme" #Choose two.$

( 1e uces routing table entries & auto>negotiation of media rates C efficient utiliEation of <%C addresses ( dedicated communications between devices # #ase o. *anage*ent an troubleshooting +7. @n the network 1'1.1.12'.3.22! what is the last /, address that can be assigned to a host" ( & 1'1.1.12'.'1 C 1'1.1.12'.'2 ( 1'1.1.12'.'' +6. or the network'! which option is a valid /, address that can be assigned to a host" % B C 162.3.'.2++ ( 162.3.).3 53. 8ow many addresses for hosts will the network 12).12.).3.22 provide" % +13 B 1022 C 132) ( 23)7 51. -hen a (8C, server is configured! which two /, addresses should never be assignable to hosts" #Choose two.$ ( 8et$or5 or subnet$or5 -" a ress B Broa cast a ress on the net$or5 C /, address leased to the B%G ( /, address used by the interfaces * <anually assigned address to the clients (esignated /, address to the (8C, server 52. -hich network protocol does (G; use" % T, & T T, C TC, D &D" * ;C,

5'. -hen two hosts are trying to communicate across a network! how does the host originating the communication determine the hardware address of the host that it wants to JtalkJ to" % R%R, request & ;how Getwork %ddress request C ,roxy %R, request D (1" re3uest * ;how 8ardware %ddress request 5). -hen a host transmits data across a network to another host! which process does the data go through" % ;tandardiEation & Conversion C *ncapsulation D 4%nchroni9ation 5+. %n administrator attempts a traceroute but receives a J(estination 0nreadableJ message. -hich protocol is responsible for that message" % R%R, & R0(, C -C/" ( ;G<, 55. The network default gateway applying to a host by (8C, is 162.157.+.''.27. -hich option is the valid /, address of this host" % 162.157.+.++ & 162.157.+.)2 C 192.1,8.5.:0 ( 162.157.+.'2 * 162.157.+.1) 52. -hich two addresses can be assigned to a host with a subnet mask of 2++.2++.2+).3" #Choose two.$ % 11'.13.).3 B 18,.5:.3.0 C 12+.''.'.2++ D 2,.35.2.255 * 12.'+.'5.3 57. The network administrator has asked you to check the status of the workstation4s /, stack by pinging the loopback address. -hich address would you ping to perform this task" %

B 12;.0.0.1 C ( 2' 56. -orkstation % has been assigned an /, address of -orkstation & has been assigned an /, address of The two workstations are connected with a straight>through cable. %ttempts to ping between the hosts are unsuccessful. -hat two things can be done to allow communications between the hosts" #Choose two.$ ( 1eplace the straight-through cable $ith a crossover cable. B Change the subnet *as5 o. the hosts to 025. C Change the subnet mask of the hosts to .25. ( Change the address of -orkstation % to * Change the address of -orkstation & to 23. Dour /;, has given you the address 22'.+.1).5.26 to assign to your router4s interface. They have also given you the default gateway address of 22'.+.1).2. %fter you have configured the address! the router is unable to ping any remote devices. -hat is preventing the router from pinging remote devices" % The default gateway is not an address on this subnet. B The e.ault gate$a% is the broa cast a ress .or this subnet. C The /, address is the broadcast address for this subnet. ( The /, address is an invalid class ( multicast address. 21. -hich protocols are found in the network layer of the @;/ reference model and are responsible for path determination and traffic switching" % B%G B 1outing C -%G ( Getwork 22. Refer to the exhibit. -hich value will be configured for (efault =ateway of the Bocal %rea Connection"

% B C 162.22'.126.3 ( 162.22'.126.2+) 2'. Refer to the exhibit. The user at -orkstation & reports that ;erver % cannot be reached. -hat is preventing -orkstation & from reaching ;erver %"

% The /, address for ;erver % is a broadcast address. & The /, address for -orkstation & is a subnet address. C The gateway for -orkstation & is not on the same subnet. D The gate$a% .or 4erver ( is not on the sa*e subnet. 2). =iven a subnet mask of 2++.2++.2++.22)! which of the following addresses can be assigned to network hosts" #Choose three.$ % 1+.2').117.5' B 92.11.1;8.93 C 13:.1;8.18.5, D 192.1,8.1,.8; * 231.)+.115.1+6 212.5'.12.162

2+. -hich two topologies are using the correct type of twisted>pair cables" #Choose two.$


# 25. =iven the address! which of the following are valid host addresses on this subnet" #Choose two.$ ( 192.1,8.20.29 & C D 192.1,8.20.31 *

22. %n inbound access list has been configured on a serial interface to deny packet entry for TC, and 0(, ports 21! 2' and 2+. -hat types of packets will be permitted by this %CB" #Choose three.$ ( 'T" B Telnet C 4/T" ( (G; * 8TT, ,@,' 27. -hich destination addresses will be used by 8ost % to send data to 8ost C" #Choose two.$ K

% The /, address of ;witch 1 & The <%C address of ;witch 1 C The -" a ress o. !ost C ( The <%C address of 8ost C * The /, address of the router4s *3 interface ' The /(C a ress o. the router<s #0 inter.ace 26. % network administrator issues the ping 162.157.2.+ command and successfully tests connectivity to a host that has been newly connected to the network. -hich protocols were used during the test" #Choose two.$ ( (1" & C(, C (8C, ( (G; # -C/" 73. %cknowldgement! ;equencing! and which @;/ layer" low control are characteristics of

% Bayer 2 & Bayer ' C +a%er : ( Bayer + * Bayer 5

Bayer 2

<atch the items on the left with appropriate @;/ layer on the right. #Got all options are used.$

72. % TC,./, Transfer is diagrammed in the exhibit. % window siEe of three has been negotiated for this
transfer. -hich message will be returned from the receiver to the sender as part of this TC,./, transfer"

% ;end %CI 1>' & ;end %CI ' C 4en (C= : ( ;end %CI )>5

* ;end %CI 5 ;end %CI 2 7'. =iven an /, address with a subnet mask of 2++.2++.2)3.3! what is the correct network addres" ( 1;2.1,.1,.0 & 122.15.2).3 C ( 7). -hich of the following protocols uses both TC, and 0(, ports" % ;<T, & Telnet C 'T" ( (G;