正文

CCNA Intro Cert Prac Exam #1 - CCNA 22007-11-15 20:00:00

【评论】 【打印】 【字体: 】 本文链接:http://blog.pfan.cn/ccna/30929.html

分享到:

Take Assessment - CCNA Intro Cert Prac Exam #1 - CCNA 2 Router and Routing Basics (Version 3.1)

Time Remaining:
 
1
Which statements correctly identify TCP or UDP characteristics? (Choose three.)
A UDP destination port number represents the application or service on the remote host to which the data needs to be passed.
TCP is the preferred protocol when a service requires lower overhead.
UDP is encapsulated within an IP packet for transport across the network.
The Source Port field is used only if information needs to return to the sending host.
TCP Source Port identifies the sending host.
TCP randomly selects the source port when establishing a session.

2



Refer to the exhibit. How many broadcast domains are present in the topology shown?
2
4
7
9
10
11

3



Refer to the exhibit. A network administrator is troubleshooting a problem with the network. On the basis of the command output in the exhibit, what are some possible causes? (Choose two.)
A cable is not connected to the router.
The interface is administratively down.
Keepalives are not being sent and received.
A transceiver is not functioning properly.
The incorrect cable is being used on the router.
There is an encapsulation mismatch.

4



Which terms correctly describe the network shown in the exhibit? (Choose two.)
logical bus
logical star
logical ring
physical bus
physical star
physical ring

5
Which addresses are valid host IP addresses given the subnet mask 255.255.255.248? (Choose three.)
192.168.200.87
194.10.10.104
223.168.210.100
220.100.100.154
200.152.2.160
196.123.142.190

6



Refer to the exhibit. A technician applies the configuration in the exhibit to a clean router. To verify the configuration, the technician issues the show running-config command in the CLI session with the router. What lines should the technician expect to see in the router output from the show running-config command?
enable password class
line console 0
password ccna
enable secret cisco
enable password class
line console 0
password ccna
enable secret 5 $1$v0/3$QyQWmJyT7zCa/yaBRasJm0
enable password class
line console 0
password ccna
enable secret cisco
enable password 7 14141E0A1F17
line console 0
password 7 020507550A
enable secret 5 $1$v0/3$QyQWmJyT7zCa/yaBRasJm0
enable password 7 14141E0A1F17
line console 0
password 7 020507550A

7



Refer to the exhibit. A network administrator can successfully ping, using IP addresses, between router Jax and router Atlanta. However, when the command telnet Atlanta is entered from the Jax router, the Telnet connection fails. Which two reasons could be the cause of the failure? (Choose two.)
The Jax router is not an entry in the host table of the Atlanta router.
The Jax router does not have an entry for Atlanta in its host table.
The hostname command is not configured correctly on the Atlanta router.
The hostname command is not configured correctly on the Jax router.
Access to a DNS server is not available.

8
Which three addresses are valid public addresses? (Choose three.)
172.32.255.240
192.168.1.245
10.15.250.5
205.255.16.250
192.15.301.240
172.11.250.212

9



How many collision domains exist in the network shown in the graphic?
1
2
3
6
7

10



What can be determined from the output of the ping command in the exhibit? (Choose two.)
There was a destination unreachable error.
The packet type was unknown.
One packet timed out.
The ping was interrupted.
Four packets of data were successfully received.
The packet TTL was exceeded.

11



What type of cable is used for connectivity between a model 2620 router and a model 2950 switch (point A), a model 2950 switch and a model 1900 switch (point B), and a model 2950 switch and a host (point C)?
A – straight-through; B – rollover; C – straight-through
A – crossover; B – straight-through; C – straight-through
A – straight-through; B – straight-through; C – crossover
A – crossover; B – straight-through; C – crossover
A – straight-through; B – crossover; C – straight-through
A – straight-through; B – crossover; C – crossover

12



Refer to the exhibit. The router named myhome has received a frame from the host 192.168.254.7. The contents of this frame are being sent to host 172.16.14.243. What is the Layer 2 destination address of the frame as it leaves the myhome router?
0008.a3b6.ce05
0009.1281.18a8
000a.8a47.e612
172.16.14.129
172.16.14.243
192.168.254.7

13



Refer to the exhibit. If host A sends an IP packet to host B, what will the destination address be in the frame when it leaves host A?
DD:DD:DD:DD:DD:DD
172.168.10.99
CC:CC:CC:CC:CC:CC
172.168.10.65
BB:BB:BB:BB:BB:BB
AA:AA:AA:AA:AA:AA

14
Which password is automatically encrypted when it is created?
vty
aux
console
enable secret
enable password

15
Why are host tables often configured on Cisco routers?
to create static routes to specific hosts
to allow communication with other IP devices by name
to provide a meaningful name for the local router
to identify only the directly attached networks and associated hosts
16
Which three statements characterize UDP? (Choose three.)
UDP provides connectionless, fast transmission of data at Layer 4.
UDP provides connection-oriented, fast transmission of data at Layer 3.
UDP relies on application layer protocols for error detection.
UDP works well when an application does not need to guarantee delivery of data.
UDP relies on IP for error detection and recovery.
UDP provides windowing and flow control.

17
Which of the following can be modified by the system administrator to determine from where the Cisco IOS loads? (Choose two.)
system ROM
startup configuration file
system image file
configuration register
bootloader image file

18
ABC company needs to connect its router to an ISP to access the Internet. What device is needed to connect the router to the ISP if the ISP supplies a T1 leased line for the connection?
CSU/DSU
modem
DSL router
NT1 device
ISDN modem

19
What is the subnetwork number for the IP address 150.3.123.18 with a subnet mask of 255.255.224.0?
150.3.0.0
150.3.123.0
150.3.64.0
150.3.96.0

20
Which output represents a properly connected and configured router interface?













21



Refer to the exhibit. Four hosts are being added to the 172.16.112.0 network. Which IP address is invalid as a host address for this network?
172.16.113.55
172.16.112.255
172.16.127.255
172.16.112.89
172.16.120.96

22
A contractor is installing cable for a new hospital network. The cable specifications require that the network be protected from EMI and have a supported bandwidth of 1000 Mbps. Which cable type would meet both specifications?
thinnet coaxial cable
thicknet coaxial cable
Category 5 UTP cable
Category 5 STP cable
fiber optic cable

23
Given a host with the IP address 192.168.65.54 and a subnet mask of 255.255.255.240, to which network does the host belong?
192.168.65.16
192.168.65.32
192.168.65.48
192.168.65.64

24
In what order must the configuration tasks be completed to configure an Ethernet interface on a router when starting from privileged EXEC?

1 Enter interface configuration mode.
2 Enable the interface.
3 Enter the IP address and subnet mask.
4 Enter global configuration mode.

1-4-3-2
4-1-3-2
2-4-1-3
4-2-1-3

25
If a router is booting with a configuration register setting of 0x2102 and its NVRAM lacks boot system commands, where will the router try to load the IOS from first?
ROM
RAM
NVRAM
Flash
TFTP server

26



Refer to the exhibit. On what subnetwork does host A reside?
10.197.0.0
10.192.0.0
10.197.184.0
10.197.187.0
10.197.187.168

27



The devices in the graphic have been configured with static IP addresses from network 192.168.102.0. All hosts can communicate with each other but cannot communicate with the server. What is causing this problem?
The IP address assigned to the server is outside of the subnet.
The IP address assigned to the server is a broadcast address.
The IP address assigned to the server is a network address.
The switch that the server is connected to has not been assigned an IP address.
The router connected to the 192.168.102.96 network is configured for the 192.168.102.64 network.

28
Why are port numbers included in the TCP header of a segment?
to indicate the correct router interface that should be used to forward a segment
to identify which switch ports should receive or forward the segment
to determine which Layer 3 protocol should be used to encapsulate the data
to enable a receiving host to forward the data to the appropriate application
to allow the receiving host to assemble the packet in the proper order

29
A network administrator is consoled into a router and can connect to www.cisco.com, but cannot connect to the company web server located in a remote city. Which tool or command would help identify the specific Layer 3 device causing the connectivity problem?
ping
telnet
ipconfig
traceroute
show tech-support

30
Which two items are required for initial configuration of Cisco routers? (Choose two.)
crossover cable
rollover cable
RJ-15 to DB-9 adapter
terminal emulation software
router VTY port
31
From what location can a router load the Cisco IOS during the boot process? (Choose two.)
RAM
TFTP server
NVRAM
setup routine
Flash memory
terminal

32
Which statements describe the functions or characteristics of ROM in a router? (Choose two.)
stores routing tables
allows software to be updated without replacing pluggable chips on the motherboard
maintains instructions for POST diagnostics
holds ARP cache
stores bootstrap program

33



Refer to the exhibit. From router R1, the command telnet 192.168.11.2 is entered from privileged mode and this message displays:

00:06:45: %SYS-5-CONFIG_I: Configured from console by console 192.168.11.2
Trying 192.168.11.2 . . . Open

Password required, but none set

If the R2 interfaces are in the status shown in the exhibit, what is the most likely problem?
The enable secret command is missing from R2.
The enable password command is missing from R1.
The login command is missing from the line configuration mode on R2.
The password command is missing from the line configuration mode on R2.
The login command is missing from the console mode on R2.
The no shutdown command is missing from the Serial 0/0 interface mode on R1.

34



Which interfaces in the exhibit could be used for a leased line WAN connection? (Choose two.)
1
2
3
4
5
6

35



Refer to the exhibit. A network administrator is requesting a file from the Widgets.com server. As the data is sent from the server, each packet contains four addresses: source IP address, destination IP address, source MAC address, and destination MAC address. Which addresses change as the data travels from the Widgets.com server to the network administrator?
Layer 4
Layer 3
Layer 2
Layer 1

36



What can be determined about the network from the exhibited output? (Choose two.)
The MontegoBay router does not have any LAN interfaces configured.
The Negril router is connected to the S0/1 interface of the MontegoBay router.
There are only four devices in this network.
Layer 3 is functioning properly on all routers.
The MBSwitch is connected to the Negril, Lucia, and MontegoBay routers.
Layer 2 is operational on three ports of the MontegoBay router.

37



Host A in the exhibit is assigned the IP address 10.118.197.55/20. How many more network devices can be added to this same subnetwork?
253
509
1021
2045
4093

38



The hosts are connected to the switch as shown. The switches are in their default configuration. Host A needs to communicate with host D, but host A does not have the MAC address for its default gateway. Which network hosts will receive the ARP request sent by host A?
only host D
only router R1
only hosts A, B, and C
only hosts A, B, C, and D
only hosts B and C
only hosts B, C, and router R1

39



A small business has asked you for advice about what type of cable will be needed to connect their modular routers. You are required to identify the type of connectors used by the devices in this diagram.
WIC-2T is a DB60 connector, WIC1T is a Smart Serial connector, and WIC-1ENET is an RJ45 connector.
WIC-2T is an RJ45 connector, WIC1T is a DB60 connector, and WIC-1ENET is a Smart Serial connector.
WIC-2T is a DB60 connector, WIC1T is a Smart Serial connector, and WIC-1ENET is an RJ45 connector.
WIC-2T is a Token Ring connector, WIC1T is a DB25 connector, and WIC-1ENET is an RJ11 connector.
WIC-2T is a Smart Serial connector, WIC1T is a DB60 connector, and WIC-1ENET is an RJ45 connector.

40
Which statements are true about TCP operation? (Choose three.)
uses the destination port field to identify remote host
uses positive acknowledgments to confirm data delivery
uses windowing to control data flow
uses sequence numbers to establish transmission priority
uses the senders’ source port number to respond to data requested
uses the SYN flag to terminate session

阅读(15034) | 评论(5)


版权声明:编程爱好者网站为此博客服务提供商,如本文牵涉到版权问题,编程爱好者网站不承担相关责任,如有版权问题请直接与本文作者联系解决。谢谢!

评论

loading...
您需要登录后才能评论,请 登录 或者 注册