1.
Refer to the exhibit.All devices in the network use default configurations.How many logical address ranges are required in this topology?
Correct Answer
D. .5
Explanation
In this topology, there are five different logical address ranges required. Each router in the network requires a unique logical address range in order to communicate with other routers and devices. Therefore, there are a total of five logical address ranges needed in this topology.
2.
The network adminstrator wants to install a private application on a server.Which range of port numbers is normally assigned to this application to make it accessible by clients ?
Correct Answer
D. 0 to 1023
Explanation
The range of port numbers normally assigned to a private application to make it accessible by clients is 0 to 1023. These port numbers are known as well-known ports or system ports, and they are reserved for specific services and protocols. By using port numbers within this range, the network administrator ensures that the private application can be easily accessed by clients without any conflicts or compatibility issues.
3.
Which two types of media are useful for connecting two devices separated by distance of 500 metres? (choose two)
Correct Answer(s)
B. 1000 base-tx
E. 1000 base-sx
Explanation
The two types of media that are useful for connecting two devices separated by a distance of 500 meters are 1000 base-tx and 1000 base-sx. 1000 base-tx is a type of Ethernet cable that uses twisted pair wiring and is capable of transmitting data at a speed of 1000 Mbps. 1000 base-sx, on the other hand, is a type of fiber optic cable that can also transmit data at a speed of 1000 Mbps but is specifically designed for short distances, making it suitable for a 500-meter connection.
4.
42. Refer to the exhibit.Host A is accessing multiple servers .Which combination of port number and address will uniquely identify a particular process running on a specific server ?
Correct Answer
D. IP address of the server and port number of the service
Explanation
The combination of the IP address of the server and the port number of the service will uniquely identify a particular process running on a specific server. The IP address is used to identify the server, while the port number is used to identify the specific process or service running on that server. This combination allows for the accurate routing of network traffic to the correct process on the correct server.
5.
Refer to the exhibit.Host x is unable to communicate with Host Y. which command can be run at host X to determine which intermediary device is responsible for this failura?
Correct Answer
D. Tracert 192.168.1.1
Explanation
The correct answer is "tracert 192.168.1.1". The tracert command is used to trace the route that packets take from the source host to the destination host. By running this command at Host X, it will show the intermediary devices (routers) that the packets pass through on their way to Host Y. This can help determine which intermediary device is responsible for the communication failure between Host X and Host Y.
6.
What is the result of using the clock rate 56000 command at the serial interface of the router?
Correct Answer
A. The interface is configured as a DCE device
Explanation
By using the "clock rate 56000" command at the serial interface of the router, the interface is configured as a DCE (Data Communications Equipment) device. DCE devices are responsible for providing clocking signals to DTE (Data Terminal Equipment) devices, which allows for synchronization and proper communication between the devices. In this case, by configuring the interface as a DCE device, it ensures that the router can provide the necessary clocking signals to establish and maintain a connection with the connected DTE device.
7.
Refer to the exhibit.which logical topology describes the exhibited network?
Correct Answer
C. Point to point
Explanation
The exhibited network shows a direct connection between two devices without any intermediate devices. This indicates a point-to-point logical topology, where each device is connected to only one other device in a linear manner.
8.
Which statement is true about the running configuration file in a cisco IOS device ?
Correct Answer
A. It affects the operation of the device immediately when modified
Explanation
The running configuration file in a Cisco IOS device affects the operation of the device immediately when modified. This means that any changes made to the running configuration will take effect immediately without requiring a reboot or any other action.
9.
Refer to the exhibit.host c is able to ping 127.0.0.1 successfully ,but is unable to communicate with hosts A and B in the organisation. what is the likely cause of the problem ?
Correct Answer
C. The subnet mask on host C is improperly configured.
Explanation
The likely cause of the problem is that the subnet mask on host C is improperly configured. This means that host C is not able to correctly identify which hosts are on the same subnet as itself. As a result, it is unable to communicate with hosts A and B, which are likely on a different subnet.
10.
Refer to the exhibit. Host A wants to access the internet. Which combination of a Layer 2 address and layer 3 adress will enable this access from host A?
Correct Answer
C. Destination MAC:030.8517.44C4 default gateway 172.16.1.1
Explanation
The correct combination of a Layer 2 address and Layer 3 address that will enable access to the internet from Host A is the one with the destination MAC address of 030.8517.44C4 and the default gateway of 172.16.1.1. The destination MAC address is the Layer 2 address that identifies the specific network interface card (NIC) to which the data should be sent. The default gateway is the Layer 3 address of the router that connects the local network to the internet. Therefore, by using this combination, Host A can send data to the correct NIC and the router will forward the data to the internet.
11.
A host is transmitting a video over the network.How does the transport layer allow this host to use multiple applications to transmit other data at the same time as video transmission?
Correct Answer
B. It uses a connectionless protocol only for multiple simultaneous transmissions
Explanation
The transport layer allows the host to use multiple applications to transmit other data at the same time as video transmission by using a connectionless protocol. A connectionless protocol does not require a pre-established connection between the sender and receiver, allowing multiple transmissions to occur simultaneously without the need for a dedicated connection. This allows the host to transmit video data as well as other data from different applications concurrently, maximizing the utilization of the network resources.
12.
Which password restricts Telnet access to the router?
Correct Answer
A. Enable
Explanation
The correct answer is "enable" because the enable password is used to restrict Telnet access to the router. This password is required to gain access to privileged EXEC mode, which allows the user to configure and manage the router. By setting an enable password, only users who know the password can access the router via Telnet.
13.
Which device should be used for routing a packed to a remote network?
Correct Answer
D. Router
Explanation
A router should be used for routing a packet to a remote network. Routers are networking devices that forward data packets between computer networks. They determine the best path for the packet to reach its destination by using routing tables and protocols. Routers are specifically designed for this purpose and are capable of directing traffic between different networks, making them the appropriate choice for routing packets to remote networks.
14.
Which OSI layer uses a connection oriented protocol to ensure reliable delivery of data?
Correct Answer
D. Transport layer
Explanation
The transport layer of the OSI model is responsible for ensuring reliable delivery of data by using a connection-oriented protocol. This layer establishes a connection between the source and destination devices, breaks the data into smaller segments, and ensures that all segments are delivered in the correct order. It also handles error detection and correction, flow control, and congestion control to guarantee the reliable transmission of data.
15.
Refer to the exhibit.which list refers only to end devices?
Correct Answer
A. D,E,F,G
Explanation
The list D,E,F,G refers only to end devices because end devices are devices that are directly connected to the network and are the source or destination of data. In the given list, D,E,F,G are the only devices that fit this criteria. The other lists include devices like A,B,C,H which are not end devices as they are either intermediate devices or network infrastructure devices.
16.
Which OSI layer offers ordered data reconstruction services?
Correct Answer
E. Transport layer
Explanation
The transport layer offers ordered data reconstruction services. This layer is responsible for ensuring reliable delivery of data by providing error detection, flow control, and sequencing of packets. It guarantees that data is received in the correct order at the receiving end, even if packets arrive out of order. This is essential for applications that require the data to be reconstructed in the same order it was sent, such as streaming video or file transfer protocols.
17.
Refer to the exhibit.The network adminstrator wants to be remotely access the CLI of the router from PCI using modem 1 . which port of the router should be connected to modem 2 to enable this access ?
Correct Answer
C. Auxillary
Explanation
The correct answer is "auxiliary." The auxiliary port on the router is specifically designed for remote access, allowing the network administrator to connect a modem to it and establish a remote connection to the router's CLI (Command Line Interface) from PCI. The console port is typically used for local management, while the Ethernet and serial ports are used for data transfer and connectivity with other devices.
18.
What are two functions of the data link layer? (Choose two.)
Correct Answer(s)
A. • It segments and reorders the data.
C. • It controls how data is placed onto the media.
Explanation
The data link layer has two main functions: segmenting and reordering the data, and controlling how data is placed onto the media. Segmenting and reordering the data involves breaking the data into smaller units (segments) and arranging them in the correct order before transmitting them over the network. Controlling how data is placed onto the media refers to the process of converting the data into signals that can be transmitted over the physical media, such as converting digital data into analog signals. This ensures efficient and reliable transmission of data between devices.
19.
Refer to the exhibit. A technician has connected the PC to the switch using a Category 6 UTP cable. Which two statements are true about this connection? (Choose two.)
Correct Answer(s)
B. • The transmit pin of the cable is terminated to the receive pin.
D. • The maximum supported bandwidth is 1000 Mb/s.
Explanation
The Category 6 UTP cable used in this connection terminates the transmit pin to the receive pin, which is true for Ethernet connections. Additionally, Category 6 cables support a maximum bandwidth of 1000 Mb/s, making it suitable for high-speed data transmission. The statement about the cable being an Ethernet crossover cable is not true, as Category 6 cables are typically straight-through cables. The maximum distance between the switch and the PC is not mentioned in the exhibit, so we cannot determine its accuracy. The statement about the cable simulating a point-to-point WAN link and being unusable for this connection is not mentioned in the exhibit and cannot be confirmed.
20.
Refer to the exhibit. The serial interface of the router was configured with the use of the commands that are shown. The router cannot ping the router that is directly connected to interface serial 0/0/0. What should the network technician do to solve this problem?
Correct Answer
B. Configure an IP address on interface serial 0/0/0.
Explanation
The router is unable to ping the directly connected router because there is no IP address configured on the interface serial 0/0/0. To solve this problem, the network technician should configure an IP address on the interface serial 0/0/0.
21.
Refer to the exhibit. In a network, host A is sending data segments to host B. The flow control of the segments that are being exchanged is displayed. Which two statements are true about this communication? (Choose two.)
Correct Answer(s)
A. The initial window size is determined via the two-way handshake.
C. Acknowledgment number 3001 indicates that host A will send the next segment with sequence number 3001
Explanation
The initial window size is determined via the two-way handshake. This means that during the establishment of the TCP connection between host A and host B, the initial window size is negotiated and agreed upon by both hosts.
Acknowledgment number 3001 indicates that host A will send the next segment with sequence number 3001. This means that host B has received and acknowledged the segment with sequence number 3000, and is expecting the next segment to have a sequence number of 3001.
22.
Refer to the exhibit. A PC is communicating with another PC on a remote network. The two networks are connected by three routers. Which action will help to identify the path between the hosts?
Correct Answer
C. Use the tracert command at the host.
Explanation
Using the tracert command at the host will help to identify the path between the hosts. Tracert (short for trace route) is a command-line tool that traces the route that packets take from the source host to the destination host. It shows the IP addresses of the routers along the path, helping to identify the network hops between the two hosts. This information can be useful for troubleshooting network connectivity issues and determining the network path that packets are taking.
23.
Refer to the exhibit. A technician uses the nslookup command on the PC and views the output that is displayed in the exhibit. What is the IP address of the primary domain name server configured at the host? (Choose two.)
Correct Answer(s)
C. 10.10.10.32
D. 192.168.1.5
Explanation
The nslookup command is used to query DNS servers to obtain IP addresses associated with domain names. In the exhibit, the output shows two IP addresses: 10.10.10.32 and 192.168.1.5. These are the IP addresses of the primary domain name servers configured at the host. Therefore, the correct answer is 10.10.10.32 and 192.168.1.5.
24.
Refer to the exhibit. Host B attempts to establish a TCP/IP session with host C. During this attempt, a frame was captured at the FastEthernet interface fa0/1 of the San Francisco router. The packet inside the captured frame has the source IP address 10.10.1.2, and the destination IP address is 10.31.1.20. What is the destination MAC address of the frame at the time of capture?
Correct Answer
A. 0060.7320.D632
Explanation
The destination MAC address of the frame at the time of capture is 0060.7320.D632.
25.
50. Which three statements are true about network layer addressing? (Choose three.)
Correct Answer(s)
A. It uniquely identifies each host.
B. It assists in forwarding packets across internetworks.
C. It uses a logical 32-bit IPv4 address.
Explanation
The three true statements about network layer addressing are: it uniquely identifies each host, it assists in forwarding packets across internetworks, and it uses a logical 32-bit IPv4 address.
26.
What are three characteristics of CSMA/CD? (Choose three.)
Correct Answer(s)
A. It monitors the media for presence of a data signal.
B. After detecting a collision, hosts can resume transmission after a random timer has expired.
C. A jam signal is used to ensure that all hosts are aware that a collision has occurred.
E. Data is transmitted only when the data signal is present
Explanation
CSMA/CD (Carrier Sense Multiple Access with Collision Detection) is a protocol used in Ethernet networks. It has three characteristics:
1. It monitors the media for the presence of a data signal: Before transmitting, devices check if the media is free to avoid collisions.
2. After detecting a collision, hosts can resume transmission after a random timer has expired: When a collision occurs, hosts wait for a random amount of time before retransmitting to avoid further collisions.
3. A jam signal is used to ensure that all hosts are aware that a collision has occurred: A jam signal is sent to notify all devices on the network that a collision has happened, allowing them to take appropriate action.
Additionally, the statement "Data is transmitted only when the data signal is present" is incorrect and not a characteristic of CSMA/CD.