Vous êtes sur la page 1sur 3

1.

While troubleshooting a connectivity issue between two directly connected routers, the
network administrator checks the encapsulation settings on the serial interfaces of both
routers. Which layer of the OSI model is the administrator troubleshooting?

A. application layer
B. network layer
C. data link layer
D. physical layer

2. How many host addresses can be assigned in each subnetwork when using network
address 172.16.0.0 with subnet mask 255.255.252.0?

A. 256
B. 510
C. 512
D. 1022
E. 024

3. What will a router do with a packet that is destined for a host with the IP address
192.168.1.5/24 if no entry for the 192.168.21.0/24 network exists in the routing table?

A. It will broadcast the packet out of all of its active interfaces that received the packet.
B. It will send the packet back to the source address.
C. It will drop the packet.
D. It will broadcast the packet out of all of its active interfaces.

4. Which statement correctly describes the difference between HTTP and HTTPS?

A. The maximum number of simultaneous connections that a server can support for
HTTPS is more than for HTTP.
B. HTTPS and HTTP use different client request-server response processes.
C. HTTPS authenticates and encrypts the data being transferred between the client and
the web server.
D. HTTPS specifies the rules for passing data between the physical layer and the data
layer.

5. Which statement is true about FTP implementations?

A. The protocol interpreter (PI) function engages once the data transfer process (DTP)
function is complete.
B. The DTP function is responsible for the login sequence.
C. FTP requires two connections, one for control and one for data.
D. Both the PI and the DTP close automatically when the transfer is complete.

6. What is an example of a dedicated point-to-point WAN link?

A. ISDN
B. Frame Relay
C. dialup
D. T1/E1
7. A building has experienced a power outage. When the power returns, none of the
devices on one floor can access the Internet. The network administrator checks the
switch in the IDF that these devices are connected to and notes that the SYST LED on the
front of the switch is amber.

What is a possible cause of this problem?

A. The switch is functioning properly.


B. The switch has failed POST.
C. The switch configuration file was not saved to NVRAM.
D. The connection between the switch and the server did not autonegoitate speed and
duplex properly.

8. When does a router enter the setup mode?

A. When the Cisco IOS is missing in flash


B. When the configuration is missing in NVRAM
C. When the setup command is run from the user mode
D. When the boot system command is missing in the configuration

8. Which two parameters are stored in the routing table? (Choose two.)

A. the best route to reach remote networks


B. the interfaces used to forward packets
C. the ARP requests from connected routers
D. the number of times a route has been used by the router
C. the packets that are placed in the buffer before being forwarded

9. What is the effect of issuing the hostname RouterA command on a router?

A. A description will be configured on the router interfaces identifying them as belonging


to RouterA.
B. The router will attempt to establish a connection to the host with the name RouterA.
C. The router will map an IP address to the domain name RouterA.
D. The router prompt will change from Router(config)# to RouterA(config)#

10. If the start-up configuration is not found in NVRAM, where will the router look for it
next by default?

A. flash
B. ROM
C. RAM
D. TFTP server

11. Which address does a switch use for implementing port security?

A. The source IP address


B. The source MAC address
C. The destination IP address
D. The destination MAC address
12. What are three features of the TCP protocol? (Choose three.)

A. It provides retransmission of data packets if they are lost during transmission.


B. It is a connectionless protocol.
C. It uses a three-way handshake between the sending and receiving systems to
establish each conversation.
D. It specifies how messages are reassembled at the destination host.
E. It requires only 8 bytes of overhead.
F. It breaks the data packet into datagrams.

13. Which two services are required to enable a computer to receive dynamic IP
addresses and access the internet usingn domain names? (Choose two.)

A. DNS
B. WINS
C. HTTP
D. DHCP
E. SMTP

14. Which routing protocol excludes the subnet information from routing updates?

A. EIGRP
B. OSPF
C. RIPv1
D. BGP

Vous aimerez peut-être aussi