Académique Documents
Professionnel Documents
Culture Documents
2010
1 Which of the following are the address ranges of the private IP addresses? (Choose three.)
10.0.0.0 to 10.255.255.255
200.100.50.0 to 200.100.25.255
150.150.0.0 to 150.150.255.255
172.16.0.0 to 172.31.255.255
192.168.0.0 to 192.168.255.255
127.16.0.0 to 127.31.255.255
vty
aux
console
enable secret
enable password
Refer to the exhibit. Which type of network design is shown?
client/server
wide area
dedicated server
peer-to-peer
Refer to the exhibit. Assume all devices are using default configurations. How many subnets are required to address the topology
that is shown?
1
3
4
5
7
Refer to the exhibit. A technician is working on a network problem that requires verification of the router LAN interface. What
address should be pinged from this host to confirm that the router interface is operational?
127.0.0.1
192.168.64.196
192.168.254.1
192.168.254.9
192.168.254.254
Refer to the exhibit. The tracert command is initiated from PC1 to PC4. Which device will send a response to the initial tracert
packet from PC1?
Athens
Ankara
London
Paris
PC4
Refer to the exhibit. Each media link is labeled. What type of cable should be used to connect the different devices?
application layer
network layer
presentation layer
session layer
transport layer
Refer to the exhibit. The diagram represents the process of sending e-mail between clients. Which list correctly identifies the
component or protocol used at each numbered stage of the diagram?
Refer to the exhibit. The router of the company failed and was replaced. After the replacement, hosts C and D in the Education
office are able to ping each other, but they are unable to access the hosts in the Accounts office. What is the likely cause of the
problem?
Refer to the exhibit. Host A wants to connect to host B on a different network. Which three IP addresses can be assigned to host
A to enable this connectivity? (Choose three.)
172.16.11.36
172.16.11.95
172.16.11.88
172.16.11.70
172.16.11.64
172.16.11.67
Refer to the exhibit. A host is connected to hub 1. Which combination of IP address, subnet mask, and default gateway can allow
this host to function in the network?
Refer to the exhibit. Host A is accessing multiple servers. Which combination of port number and address will uniquely identify
a particular process running on a specific server?
D,E,F,G
A,H,B,C
A,D,E,F
A,D,E,G
Refer to the exhibit. An employee wants to access the organization intranet from home. Which intermediary device should be
used to connect the organization intranet to the Internet to enable this access?
hub
switch
router
wireless access point
Refer to the exhibit. Host A sends a frame with the destination MAC address as FFFF.FFFF.FFFF. What action will the switch
take for this frame?
It will drop the frame.
It will send the frame back to host A.
It will send the frame to all hosts except host A.
It will forward the frame to the default gateway.
18 Which two types of media can provide bandwidth up to 1 Gb/s? (Choose two.)
10 BASE-T
100 BASE-T
100 BASE-FX
1000 BASE-TX
1000 BASE-SX
Refer to the exhibit. Which logical topology describes the exhibited network?
star
ring
point-to-point
multi-access
20 A routing issue has occurred in your internetwork. Which of the following type of devices should be examined to isolate this
error?
access point
host
hub
router
switch
21 Which physical component is used to access and perform the initial configuration on a new unconfigured router?
B
22 Which option shows how a router will route packets to a remote network?
D
Refer to the exhibit. A network technician has made several changes to R1 since the configuration has last been saved. The
modified configuration did not produce the desired changes. The technician wants to store a backup copy of the saved
configuration on a TFTP server before reloading. Which action will cause the unmodified data to be saved on the TFTP server?
B
28 A network administrator subnets the network 192.168.1.0/24 into four subnets. Which option correctly addresses Router1 and
host A into the second subnet created?
C
29 A network has grown too large for technicians to configure network addresses and hosts files for name resolution. Which two
application layer services should be added to the server to allow these needs to be satisfied dynamically? (Choose two.)
DNS
FTP
DHCP
HTTP
SMTP
30 What happens when a host station receives a frame that contains its own MAC address in the destination field?
Refer to the exhibit. An administrator made several changes to the configuration of the router but did not accomplish the desired
result. To undo the changes the reload command was used. What will happen if the administrator answers yes to the prompt?
The changes will be lost and the configuration file in RAM will be loaded.
The changes will be saved and the configuration file in RAM will be loaded.
The changes will be lost and the configuration file in NVRAM will be loaded.
The changes will be saved and the configuration file in NVRAM will be loaded.
Refer to the exhibit. A network administrator is troubleshooting a link that is down between Router1 and Router2. To correct the
problem, which wire pairs need to be switched on one of the Ethernet cable ends?
34 A network administrator is asked to design a new addressing scheme for a corporate network. There are 60 users in the main
office, 40 users in the branch office, 28 users in manufacturing, 12 in the sales office, and 4 users in the research office. Which
VLSM addressing scheme that uses the 192.168.88.0/24 network will fulfill the requirements while wasting the fewest
addresses?
192.168.88.0/26 main
192.168.88.32/26 branch
192.168.88.64/26 manufacturing
192.168.88.96/27 sales
192.168.88.128/28 research
192.168.88.0/26 main
192.168.88.64/26 branch
192.168.88.128/27 manufacturing
192.168.88.160/28 sales
192.168.88.176/29 research
192.168.88.0/27 main
192.168.88.32/27 branch
192.168.88.64/28 manufacturing
192.168.88.80/29 sales
192.168.88.88/30 research
192.168.88.0/27 main
192.168.88.64/28 branch
192.168.88.80/28 manufacturing
192.168.88.96/29 sales
192.168.88.104/30 research
Refer to the exhibit. Host A is able to access resources on the local LAN but is unable to access any resources on the Internet.
What is the likely cause of this problem?
36 An administrator is in the middle of entering a lengthy command when suddenly output from the IOS appears stating that an
interface has gone down and then up again. Consequently, the command that the administrator was typing is no longer legible on
the terminal. What CLI keystrokes can be entered to return to the line that the administrator was typing?
Ctrl-D
Ctrl-K
Ctrl-R
Ctrl-Z
37 Which requirement would cause a network designer to use a router instead of a switch in a network design?
38 Which application layer protocol allows administrators to log into a server from remote locations and control a server as
though logged in locally?
DNS
FTP
DHCP
SMTP
Telnet
39 Which TCP/IP model layer creates additional overhead on network resources due to acknowledgments, tracking, and
retransmission of data?
internet
transport
application
network access
40 Which password would allow a user to establish a Telnet session with a Cisco device?
VTY password
enable password
console password
enable secret password
41 A network technician has made a UTP cable that is terminated as T568A on one end and T568B on the opposite end. What
type of cable has been constructed?
patch
console
crossover
straight-through
42 Which identifier is contained in the header of the Layer 2 Ethernet frame?
Refer to the exhibit. Which two layers of the OSI model describe the same functions as the transport and internet layers of the
TCP/IP model? (Choose two.)
application layer
presentation layer
session layer
transport layer
network layer
data link layer
physical layer
R1>
R1#
R1(config)#
R1(config-router)#
45 Which location of router memory is cleared with the erase startup-config command?
flash
RAM
ROM
NVRAM
46 An administrator makes changes to the default configuration of a router and saves them to NVRAM. After testing, it is
discovered that the configurations did not have the desired effect and must be removed. What steps must be taken to remove the
changes and return the router to the default configuration?
Refer to the exhibit. Which two facts can be determined about the topology? (Choose two.)
50 Which answer lists the CLI mode hierarchy from least level of privilege to greatest?