Vous êtes sur la page 1sur 15

CCNA Intro Cert Prac Exam #1 - CCNA 2

点击数:3672 发布日期:2007-11-15 20:00:00


【收藏】 【评论】 【打印】 【编程爱好者论坛】 【关闭】
Tag:CCNA

Take Assessment - CCNA Intro Cert Prac Exam #1 - CCNA 2 Router and Routing Basics (Version 3.1)

01:44:51
Time Remaining:

1 Which statements correctly identify TCP or UDP characteristics? (Choose three.)


A UDP destination port number represents the application or service on the remote host to
which the data needs to be passed.
TCP is the preferred protocol when a service requires lower overhead.

UDP is encapsulated within an IP packet for transport across the network.

The Source Port field is used only if information needs to return to the sending host.

TCP Source Port identifies the sending host.

TCP randomly selects the source port when establishing a session.

Refer to the exhibit. How many broadcast domains are present in the topology shown?
2

10

11

3
Refer to the exhibit. A network administrator is troubleshooting a problem with the network. On the
basis of the command output in the exhibit, what are some possible causes? (Choose two.)
A cable is not connected to the router.

The interface is administratively down.

Keepalives are not being sent and received.

A transceiver is not functioning properly.


The incorrect cable is being used on the router.

There is an encapsulation mismatch.

Which terms correctly describe the network shown in the exhibit? (Choose two.)
logical bus

logical star
logical ring

physical bus

physical star

physical ring

5 Which addresses are valid host IP addresses given the subnet mask 255.255.255.248? (Choose
three.)
192.168.200.87

194.10.10.104

223.168.210.100

220.100.100.154

200.152.2.160
196.123.142.190

6
Refer to the exhibit. A technician applies the configuration in the exhibit to a clean router. To verify
the configuration, the technician issues the show running-config command in the CLI session with
the router. What lines should the technician expect to see in the router output from the show
running-config command?
enable password class
line console 0
password ccna
enable secret cisco
enable password class
line console 0
password ccna
enable secret 5 $1$v0/3$QyQWmJyT7zCa/yaBRasJm0
enable password class
line console 0
password ccna
enable secret cisco
enable password 7 14141E0A1F17
line console 0
password 7 020507550A
enable secret 5 $1$v0/3$QyQWmJyT7zCa/yaBRasJm0
enable password 7 14141E0A1F17
line console 0
password 7 020507550A

Refer to the exhibit. A network administrator can successfully ping, using IP addresses, between
router Jax and router Atlanta. However, when the command telnet Atlanta is entered from the Jax
router, the Telnet connection fails. Which two reasons could be the cause of the failure? (Choose
two.)
The Jax router is not an entry in the host table of the Atlanta router.

The Jax router does not have an entry for Atlanta in its host table.
The hostname command is not configured correctly on the Atlanta router.

The hostname command is not configured correctly on the Jax router.

Access to a DNS server is not available.

8 Which three addresses are valid public addresses? (Choose three.)


172.32.255.240
192.168.1.245

10.15.250.5

205.255.16.250

192.15.301.240

172.11.250.212

How many collision domains exist in the network shown in the graphic?
1

10

What can be determined from the output of the ping command in the exhibit? (Choose two.)
There was a destination unreachable error.

The packet type was unknown.

One packet timed out.

The ping was interrupted.

Four packets of data were successfully received.

The packet TTL was exceeded.


11

What type of cable is used for connectivity between a model 2620 router and a model 2950 switch
(point A), a model 2950 switch and a model 1900 switch (point B), and a model 2950 switch and a
host (point C)?
A – straight-through; B – rollover; C – straight-through

A – crossover; B – straight-through; C – straight-through

A – straight-through; B – straight-through; C – crossover

A – crossover; B – straight-through; C – crossover

A – straight-through; B – crossover; C – straight-through

A – straight-through; B – crossover; C – crossover

12

Refer to the exhibit. The router named myhome has received a frame from the host 192.168.254.7.
The contents of this frame are being sent to host 172.16.14.243. What is the Layer 2 destination
address of the frame as it leaves the myhome router?
0008.a3b6.ce05
0009.1281.18a8

000a.8a47.e612

172.16.14.129

172.16.14.243

192.168.254.7
13

Refer to the exhibit. If host A sends an IP packet to host B, what will the destination address be in the
frame when it leaves host A?
DD:DD:DD:DD:DD:DD

172.168.10.99

CC:CC:CC:CC:CC:CC

172.168.10.65

BB:BB:BB:BB:BB:BB

AA:AA:AA:AA:AA:AA

14 Which password is automatically encrypted when it is created?


vty

aux

console

enable secret

enable password

15 Why are host tables often configured on Cisco routers?


to create static routes to specific hosts

to allow communication with other IP devices by name

to provide a meaningful name for the local router

to identify only the directly attached networks and associated hosts

16 Which three statements characterize UDP? (Choose three.)


UDP provides connectionless, fast transmission of data at Layer 4.

UDP provides connection-oriented, fast transmission of data at Layer 3.

UDP relies on application layer protocols for error detection.

UDP works well when an application does not need to guarantee delivery of data.

UDP relies on IP for error detection and recovery.

UDP provides windowing and flow control.


17 Which of the following can be modified by the system administrator to determine from where the
Cisco IOS loads? (Choose two.)
system ROM

startup configuration file

system image file

configuration register

bootloader image file

18 ABC company needs to connect its router to an ISP to access the Internet. What device is needed
to connect the router to the ISP if the ISP supplies a T1 leased line for the connection?
CSU/DSU

modem

DSL router

NT1 device

ISDN modem

19 What is the subnetwork number for the IP address 150.3.123.18 with a subnet mask of
255.255.224.0?
150.3.0.0

150.3.123.0

150.3.64.0

150.3.96.0

20 Which output represents a properly connected and configured router interface?


21

Refer to the exhibit. Four hosts are being added to the 172.16.112.0 network. Which IP address is
invalid as a host address for this network?
172.16.113.55

172.16.112.255

172.16.127.255

172.16.112.89

172.16.120.96

22 A contractor is installing cable for a new hospital network. The cable specifications require that the
network be protected from EMI and have a supported bandwidth of 1000 Mbps. Which cable type
would meet both specifications?
thinnet coaxial cable

thicknet coaxial cable

Category 5 UTP cable

Category 5 STP cable

fiber optic cable

23 Given a host with the IP address 192.168.65.54 and a subnet mask of 255.255.255.240, to which
network does the host belong?
192.168.65.16

192.168.65.32

192.168.65.48

192.168.65.64

24 In what order must the configuration tasks be completed to configure an Ethernet interface on a
router when starting from privileged EXEC?

1 Enter interface configuration mode.


2 Enable the interface.
3 Enter the IP address and subnet mask.
4 Enter global configuration mode.
1-4-3-2

4-1-3-2

2-4-1-3

4-2-1-3

25 If a router is booting with a configuration register setting of 0x2102 and its NVRAM lacks boot
system commands, where will the router try to load the IOS from first?
ROM

RAM

NVRAM

Flash

TFTP server

26

Refer to the exhibit. On what subnetwork does host A reside?


10.197.0.0

10.192.0.0

10.197.184.0
10.197.187.0

10.197.187.168

27
The devices in the graphic have been configured with static IP addresses from network 192.168.102.0. All
hosts can communicate with each other but cannot communicate with the server. What is causing this
problem?
The IP address assigned to the server is outside of the subnet.

The IP address assigned to the server is a broadcast address.

The IP address assigned to the server is a network address.

The switch that the server is connected to has not been assigned an IP address.

The router connected to the 192.168.102.96 network is configured for the 192.168.102.64 network.

28 Why are port numbers included in the TCP header of a segment?


to indicate the correct router interface that should be used to forward a segment

to identify which switch ports should receive or forward the segment

to determine which Layer 3 protocol should be used to encapsulate the data

to enable a receiving host to forward the data to the appropriate application

to allow the receiving host to assemble the packet in the proper order

29 A network administrator is consoled into a router and can connect to www.cisco.com, but cannot
connect to the company web server located in a remote city. Which tool or command would help
identify the specific Layer 3 device causing the connectivity problem?
ping

telnet

ipconfig

traceroute

show tech-support

30 Which two items are required for initial configuration of Cisco routers? (Choose two.)
crossover cable

rollover cable

RJ-15 to DB-9 adapter

terminal emulation software


router VTY port

31 From what location can a router load the Cisco IOS during the boot process? (Choose two.)
RAM

TFTP server

NVRAM

setup routine

Flash memory

terminal

32 Which statements describe the functions or characteristics of ROM in a router? (Choose two.)
stores routing tables

allows software to be updated without replacing pluggable chips on the motherboard

maintains instructions for POST diagnostics

holds ARP cache

stores bootstrap program

33

Refer to the exhibit. From router R1, the command telnet 192.168.11.2 is entered from privileged
mode and this message displays:

00:06:45: %SYS-5-CONFIG_I: Configured from console by console 192.168.11.2


Trying 192.168.11.2 . . . Open

Password required, but none set

If the R2 interfaces are in the status shown in the exhibit, what is the most likely problem?
The enable secret command is missing from R2.

The enable password command is missing from R1.

The login command is missing from the line configuration mode on R2.

The password command is missing from the line configuration mode on R2.

The login command is missing from the console mode on R2.

The no shutdown command is missing from the Serial 0/0 interface mode on R1.
34

Which interfaces in the exhibit could be used for a leased line WAN connection? (Choose two.)
1

35

Refer to the exhibit. A network administrator is requesting a file from the Widgets.com server. As the
data is sent from the server, each packet contains four addresses: source IP address, destination IP
address, source MAC address, and destination MAC address. Which addresses change as the data
travels from the Widgets.com server to the network administrator?
Layer 4

Layer 3

Layer 2

Layer 1
36

What can be determined about the network from the exhibited output? (Choose two.)
The MontegoBay router does not have any LAN interfaces configured.

The Negril router is connected to the S0/1 interface of the MontegoBay router.

There are only four devices in this network.

Layer 3 is functioning properly on all routers.

The MBSwitch is connected to the Negril, Lucia, and MontegoBay routers.

Layer 2 is operational on three ports of the MontegoBay router.

37

Host A in the exhibit is assigned the IP address 10.118.197.55/20. How many more network
devices can be added to this same subnetwork?
253

509

1021

2045

4093

38
The hosts are connected to the switch as shown. The switches are in their default configuration.
Host A needs to communicate with host D, but host A does not have the MAC address for its default
gateway. Which network hosts will receive the ARP request sent by host A?
only host D

only router R1

only hosts A, B, and C

only hosts A, B, C, and D

only hosts B and C

only hosts B, C, and router R1

39

A small business has asked you for advice about what type of cable will be needed to connect their
modular routers. You are required to identify the type of connectors used by the devices in this
diagram.
WIC-2T is a DB60 connector, WIC1T is a Smart Serial connector, and WIC-1ENET is an
RJ45 connector.
WIC-2T is an RJ45 connector, WIC1T is a DB60 connector, and WIC-1ENET is a Smart
Serial connector.
WIC-2T is a DB60 connector, WIC1T is a Smart Serial connector, and WIC-1ENET is an
RJ45 connector.
WIC-2T is a Token Ring connector, WIC1T is a DB25 connector, and WIC-1ENET is an RJ11
connector.
WIC-2T is a Smart Serial connector, WIC1T is a DB60 connector, and WIC-1ENET is an
RJ45 connector.
40 Which statements are true about TCP operation? (Choose three.)
uses the destination port field to identify remote host

uses positive acknowledgments to confirm data delivery

uses windowing to control data flow

uses sequence numbers to establish transmission priority

uses the senders’ source port number to respond to data requested

uses the SYN flag to terminate session