Link for download - http://adf.ly/1apGWF
In a network design project, a network designer needs to select a device to provide collision free connections to 40 hosts on the LAN. Which device should be selected?
In a network design project, a network designer needs to select a device to provide collision free connections to 40 hosts on the LAN. Which device should be selected?
Switch
Which password is automatically encrypted when
it is created?
enable
secret
A network administrator subnets the network
192.168.1.0/24 into four subnets which option correctly addresses router1 and
hosta into the second subnet created?
network
192.168.1.65/26
host
A 192.168.1.126 255.255.255.192
How many host addresses may be assigned when
using the 128.107.0.0 network address with a subnet mask of 255.255.248.0?
2046
Which of the following are the address ranges
of the private IP addresses? (Choose three.)
10.0.0.0
to 10.255.255.255***
172.16.0.0
to 172.31.255.255***
192.168.0.0
to 192.168.255.255***
Refer to the exhibit. A web browser running on
host PC1 sends a request for a web page to the web server with an IP address
192.168.1.254/24. What sequence of steps will follow in order to establish the
session before data can be exchanged?
The
session will be initiated using TCP. A three-way handshake must be successfully
completed before the session is established.
What is the effect of using the Router# copy
running-config startup-config command on a router?
A:
The contents of NVRAM will change.
Which physical connector type is used for a
serial V.35 connection to the CSU/DSU?
Answer
is Option 4***
Which OSI layer addressing is required to route
packets between two networks?
Layer
3***
Which topology divides the collision domain and
provides full media bandwidth to the hosts in the network?
Image
3 The two switches
Refer to the exhibit. While configuring a
network, a technician wired each end of a Category 5e cable as shown. Which two
statements are true about this setup? (Choose two.)
The
cable is suitable for connecting a switch to a router Ethernet port.
The
cable is suitable for connecting dissimilar types of devices.
Two routers are connected via their serial
ports in a lab environment. The routers are configured with valid IP addresses,
but they cannot ping each other. The show interface serial0/0 command shows
that the serial0/0 interface is up but the line protocol is down. What could be
the cause of this problem?
The
clock rate command has not been entered on the DCE interface.***
which
device should be used for enabling a host to communicate with another host on a
different network.
Router
Refer to the exhibit. What function does router
RT_A need to provide to allow Internet access for hosts in this network?
Address
translation
what is the first thing that happens when a
collision occurs in an ethernet network
The
transmitting devices invoke the backoff algorithm
which two programs can be used to accomplish
terminal emulation for configuring a router from the CLI through the console
port?
HyperTerminal
Secure Shell
refer to the exhibit. which layer network model
is shown in the diagram
TCP/IP
A user enters http://www.cisco.com/web1.htm in
the address line of a browser. Which statement is true about this transaction?
The
“http” portion indicates the protocol that is being used.
Refer to the exhibit. When computer A sends a
frame to computer D, what computers receive the frame?
only
computer D
Which statement describes the correct use of
addresses to deliver an e-mail message from HostB to the e-mail service that is
running on ServerA?
Router
B uses a Layer 3 network address to route the packet
A user sees the command prompt:
Router(config-if)# . What task can be performed at this mode?
Configure
individual interfaces.
Refer to the exhibit. A network technician is
trying to determine the correct IP address
configuration for Host A. What is a valid
configuration for Host A?
IP
address: 192.168.100.20; Subnet Mask: 255.255.255.240; Default Gateway:
192.168.100.17
which answer lists the cli mode hierarchy from
least to most specific
global,user,provileged,specific
Refer to the exhibit. The ping 127.0.0.1
command is issued on the local host. What do the ping results indicate?
The
TCP/IP stack on the local host operates properly.
A network technician is tasked with setting up
a network for six users, but the users should be able to use their accounts to
log on from any of the six computers. What type of network should be used.
client-server
network
a routing issue has occurred in your
internetwork. which of the following type of devices should be be examined to
isolate this error.
Router
What is the broadcast address for the network
172.16.70.32/28.
172.16.70.47
Cable A is plugged into the console port on
switch S1. What is required on the PC for a network technician to enter the
initial configuration on S1?
a
terminal emulation program
Refer to the exhibit. The network administrator
remotely accesses the CLI of RouterB from PC1 using a secure connection. Which
statement is true about this connection?
The
SSH service is used to connect PC1 to RouterB.
Udp is the transport layer protocol for which
application
TFTP
what command can be used to troubleshoot domain
name resolution issues?
NSLOOKUP
which three ipv4 addresses represent subnet
broadcast addresses (choose three.)
192.168.4.63
/26
192.168.4.191
/26
192.168.4.95
/27
Refer to the exhibit. The diagram represents
the process of sending e-mail between clients. Which list correctly identifies
the component or protocol used at each numbered stage of the diagram?
1.MUA
2.SMTP 3.MTA 4.SMTP 5.MTA 6.MDA 7.POP 8.MUA
Refer to the exhibit. The nslookup command that
is shown was issued on a Windows PC host. What does the 10.32.5.74 address
represent?
the
primary DNS server for the host
hich application layer protocol allows
administrators to log into a server from remote locations and control a server
as though logged in locally?
Telnet
which router cli mode will require user
authentication if an administrator issues the enable secret command
Global
which two statements accurately describe the
use of destination port numbers by clients on a network
The
netstat command can be used to verify what connections are open and active.
A
socket can be created by appending a well-known port number to a destination
address.
What are the default terminal emulation
software settings when configuring a Cisco device through a console port?
Bits per second: 9600
Data bits: 8
Parity: None
Stop bits: 1
Flow control: None
Bits per second: 9600
Data bits: 8
Parity: None
Stop bits: 1
Flow control: None
which option shows how a router will route
packets to a remote network
D
C C D
which configuration mode is used to set a
password to authenticate users that are accessing and configuring the network
device using a Telnet connection
VTY line mode
Good Luck
UDP is the transport layer protocol for which application?
BeantwoordenVerwijderenUdp is the transport layer protocol for which application
BeantwoordenVerwijderenTFTP