Take Assessment - CCNA Intro Cert Prac Exam #1 - CCNA 2 Router and Routing Basics (Version 3.1) Time Remaining: 1 Which statements correctly identify TCP or UDP characteristics? (Choose three.) A UDP destination port number represents the application or service on the remote host to which the data needs to be passed. TCP is the preferred protocol when a service requires lower overhead. UDP is encapsulated within an IP packet for transport across the network. The Source Port field is used only if information needs to return to the sending host. TCP Source Port identifies the sending host. TCP randomly selects the source port when establishing a session. 2 Refer to the exhibit. How many broadcast domains are present in the topology shown? 2 4 7 9 10 11 3 Refer to the exhibit. A network administrator is troubleshooting a problem with the network. On the basis of the command output in the exhibit, what are some possible causes? (Choose two.) A cable is not connected to the router. The interface is administratively down. Keepalives are not being sent and received. A transceiver is not functioning properly. The incorrect cable is being used on the router. There is an encapsulation mismatch. 4 Which terms correctly describe the network shown in the exhibit? (Choose two.) logical bus logical star logical ring physical bus physical star physical ring 5 Which addresses are valid host IP addresses given the subnet mask 255.255.255.248? (Choose three.) 192.168.200.87 194.10.10.104 223.168.210.100 220.100.100.154 200.152.2.160 196.123.142.190 6 Refer to the exhibit. A technician applies the configuration in the exhibit to a clean router. To verify the configuration, the technician issues the show running-config command in the CLI session with the router. What lines should the technician expect to see in the router output from the show running-config command? enable password classline console 0password ccna enable secret ciscoenable password classline console 0password ccna enable secret 5 $1$v0/3$QyQWmJyT7zCa/yaBRasJm0enable password classline console 0password ccna enable secret ciscoenable password 7 14141E0A1F17line console 0password 7 020507550A enable secret 5 $1$v0/3$QyQWmJyT7zCa/yaBRasJm0enable password 7 14141E0A1F17line console 0password 7 020507550A 7 Refer to the exhibit. A network administrator can successfully ping, using IP addresses, between router Jax and router Atlanta. However, when the command telnet Atlanta is entered from the Jax router, the Telnet connection fails. Which two reasons could be the cause of the failure? (Choose two.) The Jax router is not an entry in the host table of the Atlanta router. The Jax router does not have an entry for Atlanta in its host table. The hostname command is not configured correctly on the Atlanta router. The hostname command is not configured correctly on the Jax router. Access to a DNS server is not available. 8 Which three addresses are valid public addresses? (Choose three.) 172.32.255.240 192.168.1.245 10.15.250.5 205.255.16.250 192.15.301.240 172.11.250.212 9 How many collision domains exist in the network shown in the graphic? 1 2 3 6 7 10 What can be determined from the output of the ping command in the exhibit? (Choose two.) There was a destination unreachable error. The packet type was unknown. One packet timed out. The ping was interrupted. Four packets of data were successfully received. The packet TTL was exceeded. 11 What type of cable is used for connectivity between a model 2620 router and a model 2950 switch (point A), a model 2950 switch and a model 1900 switch (point B), and a model 2950 switch and a host (point C)? A – straight-through; B – rollover; C – straight-through A – crossover; B – straight-through; C – straight-through A – straight-through; B – straight-through; C – crossover A – crossover; B – straight-through; C – crossover A – straight-through; B – crossover; C – straight-through A – straight-through; B – crossover; C – crossover 12 Refer to the exhibit. The router named myhome has received a frame from the host 192.168.254.7. The contents of this frame are being sent to host 172.16.14.243. What is the Layer 2 destination address of the frame as it leaves the myhome router? 0008.a3b6.ce05 0009.1281.18a8 000a.8a47.e612 172.16.14.129 172.16.14.243 192.168.254.7 13 Refer to the exhibit. If host A sends an IP packet to host B, what will the destination address be in the frame when it leaves host A? DD:DD:DD:DD:DD:DD 172.168.10.99 CC:CC:CC:CC:CC:CC 172.168.10.65 BB:BB:BB:BB:BB:BB AA:AA:AA:AA:AA:AA 14 Which password is automatically encrypted when it is created? vty aux console enable secret enable password 15 Why are host tables often configured on Cisco routers? to create static routes to specific hosts to allow communication with other IP devices by name to provide a meaningful name for the local router to identify only the directly attached networks and associated hosts 16 Which three statements characterize UDP? (Choose three.) UDP provides connectionless, fast transmission of data at Layer 4. UDP provides connection-oriented, fast transmission of data at Layer 3. UDP relies on application layer protocols for error detection. UDP works well when an application does not need to guarantee delivery of data. UDP relies on IP for error detection and recovery. UDP provides windowing and flow control. 17 Which of the following can be modified by the system administrator to determine from where the Cisco IOS loads? (Choose two.) system ROM startup configuration file system image file configuration register bootloader image file 18 ABC company needs to connect its router to an ISP to access the Internet. What device is needed to connect the router to the ISP if the ISP supplies a T1 leased line for the connection? CSU/DSU modem DSL router NT1 device ISDN modem 19 What is the subnetwork number for the IP address 150.3.123.18 with a subnet mask of 255.255.224.0? 150.3.0.0 150.3.123.0 150.3.64.0 150.3.96.0 20 Which output represents a properly connected and configured router interface? 21 Refer to the exhibit. Four hosts are being added to the 172.16.112.0 network. Which IP address is invalid as a host address for this network? 172.16.113.55 172.16.112.255 172.16.127.255 172.16.112.89 172.16.120.96 22 A contractor is installing cable for a new hospital network. The cable specifications require that the network be protected from EMI and have a supported bandwidth of 1000 Mbps. Which cable type would meet both specifications? thinnet coaxial cable thicknet coaxial cable Category 5 UTP cable Category 5 STP cable fiber optic cable 23 Given a host with the IP address 192.168.65.54 and a subnet mask of 255.255.255.240, to which network does the host belong? 192.168.65.16 192.168.65.32 192.168.65.48 192.168.65.64 24 In what order must the configuration tasks be completed to configure an Ethernet interface on a router when starting from privileged EXEC?1 Enter interface configuration mode.2 Enable the interface.3 Enter the IP address and subnet mask.4 Enter global configuration mode. 1-4-3-2 4-1-3-2 2-4-1-3 4-2-1-3 25 If a router is booting with a configuration register setting of 0x2102 and its NVRAM lacks boot system commands, where will the router try to load the IOS from first? ROM RAM NVRAM Flash TFTP server 26 Refer to the exhibit. On what subnetwork does host A reside? 10.197.0.0 10.192.0.0 10.197.184.0 10.197.187.0 10.197.187.168 27 The devices in the graphic have been configured with static IP addresses from network 192.168.102.0. All hosts can communicate with each other but cannot communicate with the server. What is causing this problem? The IP address assigned to the server is outside of the subnet. The IP address assigned to the server is a broadcast address. The IP address assigned to the server is a network address. The switch that the server is connected to has not been assigned an IP address. The router connected to the 192.168.102.96 network is configured for the 192.168.102.64 network. 28 Why are port numbers included in the TCP header of a segment? to indicate the correct router interface that should be used to forward a segment to identify which switch ports should receive or forward the segment to determine which Layer 3 protocol should be used to encapsulate the data to enable a receiving host to forward the data to the appropriate application to allow the receiving host to assemble the packet in the proper order 29 A network administrator is consoled into a router and can connect to www.cisco.com, but cannot connect to the company web server located in a remote city. Which tool or command would help identify the specific Layer 3 device causing the connectivity problem? ping telnet ipconfig traceroute show tech-support 30 Which two items are required for initial configuration of Cisco routers? (Choose two.) crossover cable rollover cable RJ-15 to DB-9 adapter terminal emulation software router VTY port 31 From what location can a router load the Cisco IOS during the boot process? (Choose two.) RAM TFTP server NVRAM setup routine Flash memory terminal 32 Which statements describe the functions or characteristics of ROM in a router? (Choose two.) stores routing tables allows software to be updated without replacing pluggable chips on the motherboard maintains instructions for POST diagnostics holds ARP cache stores bootstrap program 33 Refer to the exhibit. From router R1, the command telnet 192.168.11.2 is entered from privileged mode and this message displays:00:06:45: %SYS-5-CONFIG_I: Configured from console by console 192.168.11.2Trying 192.168.11.2 . . . OpenPassword required, but none setIf the R2 interfaces are in the status shown in the exhibit, what is the most likely problem? The enable secret command is missing from R2. The enable password command is missing from R1. The login command is missing from the line configuration mode on R2. The password command is missing from the line configuration mode on R2. The login command is missing from the console mode on R2. The no shutdown command is missing from the Serial 0/0 interface mode on R1. 34 Which interfaces in the exhibit could be used for a leased line WAN connection? (Choose two.) 1 2 3 4 5 6 35 Refer to the exhibit. A network administrator is requesting a file from the Widgets.com server. As the data is sent from the server, each packet contains four addresses: source IP address, destination IP address, source MAC address, and destination MAC address. Which addresses change as the data travels from the Widgets.com server to the network administrator? Layer 4 Layer 3 Layer 2 Layer 1 36 What can be determined about the network from the exhibited output? (Choose two.) The MontegoBay router does not have any LAN interfaces configured. The Negril router is connected to the S0/1 interface of the MontegoBay router. There are only four devices in this network. Layer 3 is functioning properly on all routers. The MBSwitch is connected to the Negril, Lucia, and MontegoBay routers. Layer 2 is operational on three ports of the MontegoBay router. 37 Host A in the exhibit is assigned the IP address 10.118.197.55/20. How many more network devices can be added to this same subnetwork? 253 509 1021 2045 4093 38 The hosts are connected to the switch as shown. The switches are in their default configuration. Host A needs to communicate with host D, but host A does not have the MAC address for its default gateway. Which network hosts will receive the ARP request sent by host A? only host D only router R1 only hosts A, B, and C only hosts A, B, C, and D only hosts B and C only hosts B, C, and router R1 39 A small business has asked you for advice about what type of cable will be needed to connect their modular routers. You are required to identify the type of connectors used by the devices in this diagram. WIC-2T is a DB60 connector, WIC1T is a Smart Serial connector, and WIC-1ENET is an RJ45 connector. WIC-2T is an RJ45 connector, WIC1T is a DB60 connector, and WIC-1ENET is a Smart Serial connector. WIC-2T is a DB60 connector, WIC1T is a Smart Serial connector, and WIC-1ENET is an RJ45 connector. WIC-2T is a Token Ring connector, WIC1T is a DB25 connector, and WIC-1ENET is an RJ11 connector. WIC-2T is a Smart Serial connector, WIC1T is a DB60 connector, and WIC-1ENET is an RJ45 connector. 40 Which statements are true about TCP operation? (Choose three.) uses the destination port field to identify remote host uses positive acknowledgments to confirm data delivery uses windowing to control data flow uses sequence numbers to establish transmission priority uses the senders’ source port number to respond to data requested uses the SYN flag to terminate session

评论