Top of Form
Top of Form
Top of Form
to select the paths that are used to direct traffic to destination networks
2 Top of Form
What is the purpose of having a converged network?
to provide high speed connectivity to all end devices
to make sure that all types of data packets will be treated equally
to achieve fault tolerance and high availability of data network infrastructure devices
3 Top of Form
Three office workers are using the corporate network. The first employee uses a web
browser to view a company web page in order to read some announcements. The second
employee accesses the corporate database to perform some financial transactions. The third
employee participates in an important live audio conference with other office workers in
branch offices. If QoS is implemented on this network, what will be the priorities from highest
to lowest of the different data types?
audio conference, financial transactions, web page
4 Top of Form
Refe
r to the exhibit. From which location did this router load the IOS?
flash memory
NVRAM
RAM
ROM
a TFTP server
5 Top of Form
During normal operation, from which location do most Cisco routers run the IOS?
RAM
flash
NVRAM
disk drive
6 Top of Form
Which connection provides a secure CLI session with encryption to a Cisco switch?
a console connection
an AUX connection
a Telnet connection
an SSH connection
7 Top of Form
Which keys act as a hot key combination that is used to interrupt an IOS process?
Ctrl-Shift-X
Ctrl-Shift-6
Ctrl-Z
Ctrl-C
8 Top of Form
Switch(config)#
MySwitch(config)#
My(config)#
Switch#
9 Top of Form
After making configuration changes, a network administrator issues a copy running-config
startup-config command in a Cisco switch. What is the result of issuing this command?
The new configuration will be stored in flash memory.
The current IOS file will be replaced with the newly configured file.
The configuration changes will be removed and the original configuration will be restored.
10 Top of Form
A technician uses the ping 127.0.0.1 command. What is the technician testing?
the TCP/IP stack on a network host
11 Top of Form
Which two protocols function at the internet layer? (Choose two.)
POP
BOOTP
ICMP
IP
PPP
12 Top of Form
Which address on a PC does not change, even if the PC is moved to a different network?
IP address
default gateway address
MAC address
logical address
13 Top of Form
A network engineer is measuring the transfer of bits across the company backbone for a
mission critical database application. The engineer notices that the network throughput
appears lower than the bandwidth expected. Which three factors could influence the
differences in throughput? (Choose three.)
the amount of traffic that is currently crossing the network
the latency that is created by the number of network devices that the data is crossing
14 Top of Form
What is a possible hazard that can be caused by network cables in a fire?
The cable insulation could be flammable.
15 Top of Form
What device is commonly used to verify a UTP cable?
a multimeter
a cable tester
an ohmmeter
16 Top of Form
What needs to be checked when testing a UTP network cable?
capacitance
wire map
inductance
flexibility
17 Top of Form
What are two features of a physical, star network topology? (Choose two.)
It is straightforward to troubleshoot.
18 Top of Form
What happens when a switch receives a frame and the calculated CRC value is different
than the value that is in the FCS field?
The switch places the new CRC value in the FCS field and forwards the frame.
The switch floods the frame to all ports except the port through which the frame arrived to notify the hosts of the error.
19 Top of Form
20 Top of Form
Which function is provided by TCP?
data encapsulation
21 Top of Form
Which technology provides a solution to IPv4 address depletion by allowing multiple devices
to share one public IP address?
ARP
DNS
NAT
SMB
DHCP
HTTP
22 Top of Form
Refer to the
exhibit. Consider the IP address configuration shown from PC1. What is a description of the
default gateway address?
It is the IP address of the Router1 interface that connects the company to the Internet.
It is the IP address of the Router1 interface that connects the PC1 LAN to Router1.
It is the IP address of Switch1 that connects PC1 to other devices on the same LAN.
23 Top of Form
What does a router use to determine where to send data it receives from the network?
an ARP table
a routing table
a switching table
24 Top of Form
Which router interface should be used for direct remote access to the router via a modem?
an inband router interface
a console port
an AUX port
25 Top of Form
Which two statements correctly describe a router memory type and its contents? (Choose
two.)
ROM is nonvolatile and stores a limited version of the IOS.
26 Top of Form
A technician is configuring a router to allow for all forms of management access. As part of
each different type of access, the technician is trying to type the command login. Which
configuration mode should be entered to do this task?
user executive mode
27 Top of Form
Which three statements characterize the transport layer protocols? (Choose three.)
TCP and UDP port numbers are used by application layer protocols.
28 Top of Form
Refe
r to the exhibit. A TCP segment from a server has been captured by Wireshark, which is
running on a host. What acknowledgement number will the host return for the TCP segment
that has been received?
2
21
250
306
2921
29 Top of Form
Which statement is true about an interface that is configured with the IPv6
addresscommand?
IPv6 traffic-forwarding is enabled on the interface.
Any IPv4 addresses that are assigned to the interface are replaced with an IPv6 address.
30 Top of Form
What is the dotted decimal representation of the IPv4 address
11001011.00000000.01110001.11010011?
192.0.2.199
198.51.100.201
203.0.113.211
209.165.201.223
31 Top of Form
Refer to the exhibit. The network
administrator for a small advertising company has chosen to use the 192.168.5.96/27
network for internal LAN addressing. As shown in the exhibit, a static IP address is assigned
to the company web server. However, the web server cannot access the Internet. The
administrator verifies that local workstations with IP addresses that are assigned by a DHCP
server can access the Internet, and the web server is able to ping local workstations. Which
component is incorrectly configured?
subnet mask
DNS address
host IP address
32 Top of Form
172.16.20.255
172.16.19.255
172.16.23.255
172.16.255.255
33 Top of Form
What are three characteristics of multicast transmission? (Choose three.)
The source address of a multicast transmission is in the range of 224.0.0.0 to 224.0.0.255.
Routers will not forward multicast addresses in the range of 224.0.0.0 to 224.0.0.255.
34 Top of Form
A network administrator is variably subnetting a given block of IPv4 addresses. Which
combination of network addresses and prefix lengths will make the most efficient use of
addresses when the need is for 2 subnets capable of supporting 10 hosts and 1 subnet that
can support 6 hosts?
10.1.1.128/28
10.1.1.144/28
10.1.1.160/29
10.1.1.128/28
10.1.1.144/28
10.1.1.160/28
10.1.1.128/28
10.1.1.140/28
10.1.1.158/26
10.1.1.128/26
10.1.1.144/26
10.1.1.160/26
10.1.1.128/26
10.1.1.140/26
10.1.1.158/28
35 Top of Form
Which three IP addresses are private ? (Choose three.)
10.172.168.1
172.32.5.2
192.167.10.10
172.20.4.4
192.168.5.254
224.6.6.6
36 Top of Form
What is the effect of configuring the ipv6 unicast-routing command on a router?
to assign the router to the all-nodes multicast group
37 Top of Form
Which group of IPv6 addresses cannot be allocated as a host source address?
FEC0::/10
FDFF::/7
FEBF::/10
FF00::/8
38 Top of Form
What is the purpose of ICMP messages?
to inform routers about network topology changes
39 Top of Form
12
13
14
40 Top of Form
Which subnet would include the address 192.168.1.96 as a usable host address?
192.168.1.64/26
192.168.1.32/27
192.168.1.32/28
192.168.1.64/29
41 Top of Form
How many additional bits should be borrowed from a /26 subnet mask in order to create
subnets for WAN links that need only 2 useable addresses?
2
42 Top of Form
Which statement is true about variable-length subnet masking?
Each subnet is the same size.
43 Top of Form
Refer to the
exhibit. Which IP addressing scheme should be changed?
Site 1
Site 2
Site 3
Site 4
44 Top of Form
Which two notations are useable nibble boundaries when subnetting in IPv6? (Choose two.)
/62
/64
/66
/68
/70
45 Top of Form
What is the purpose of the network security authentication function?
to require users to prove who they are
46 Top of Form
Which firewall technique blocks incoming packets unless they are responses to internal
requests?
port filtering
URL filtering
application filtering
47 Top of Form
When applied to a router, which command would help mitigate brute-force password attacks
against the router?
exec-timeout 30
service password-encryption
48 Top of Form
Why would a network administrator use the tracert utility?
to determine the active TCP connections on a PC
to display the IP address, default gateway, and DNS server address for a PC
49 Top of Form
A particular website does not appear to be responding on a Windows 7 computer. What
command could the technician use to show any cached DNS entries for this web page?
ipconfig /all
arp -a
ipconfig /displaydns
nslookup
50 Top of Form
When the router prompts for an address or remote host name, what IP address should the
administrator enter at the prompt?
192.168.9.254
192.168.10.1
192.168.10.2
192.168.11.252
192.168.11.254
51 Top of Form
Which two components are necessary for a wireless client to be installed on a WLAN?
(Choose two.)
media
wireless NIC
custom adapter
crossover cable
wireless bridge
wireless client software
52 Top of Form
Fill in the blank.
Point-to-point communications where both devices can transmit and receive on the medium at the same time are known as
.
53 Top of Form
Fill in the blank.
During data communications, a host may need to send a single message to a specific group of destination hosts simultaneously. This