CCNA Exam 640-802 (part 1)

75 Questions
CCNA exam 640-802 (part 1)

Actual test for CCNA exam 640-802

Please wait...
Questions and Answers
  • 1. 
    Which one of the following characteristics is true regarding the use of hubs and switches?
    • A. 

      A. Hubs can have their ports be configured with VLANs

    • B. 

      B. Using hubs is costly with regard to bandwidth availability.

    • C. 

      C. Switches can not forward broadcasts.

    • D. 

      D. Switches are more efficient than hubs in processing frames.

    • E. 

      E. Switches increase the number of collision domains in the network.

  • 2. 
    When comparing and contrasting the similarities and differences between bridges and switches, which of the following are valid statements? Choose all the valid answer choices)
    • A. 

      Bridges are faster than switches because they have fewer ports.

    • B. 

      A switch is a multiport bridge,

    • C. 

      Bridges and switches learn MAC addresses by examining the source MAC address of each frame received.

    • D. 

      A bridge will forward a broadcast but a switch will not.

    • E. 

      Bridges and switches increase the size of a collision domain.

  • 3. 
    Which of the following correctly describe the various functions and virtues of a router? (Select all valid answer choices)
    • A. 

      Packet switching

    • B. 

      Collision prevention on a LAN segment.

    • C. 

      Packet filtering

    • D. 

      Broadcast domain enlargement

    • E. 

      Internetwork communication

  • 4. 
    • A. 

      A switch

    • B. 

      A router

    • C. 

      A network adapter card

    • D. 

      A hub

    • E. 

      A repeater

  • 5. 
    Cisco is the leader in the router market space. What basic functions do their routers perform in a network? (Choose two)
    • A. 

      The microsegmentation of broadcast domains

    • B. 

      Path selection

    • C. 

      Packet switching

    • D. 

      Bridging between LAN segments

    • E. 

      VLAN membership assignment

  • 6. 
    • A. 

      Switches are primarily software based while bridges are hardware based.

    • B. 

      Switches usually have a higher number of ports than most bridges.

    • C. 

      Bridges are frequently faster than switches.

    • D. 

      Both bridges and switches forward Layer 2 broadcasts.

    • E. 

      Both bridges and switches make forwarding decisions based on Layer 2 addresses.

  • 7. 
    Both switches and hubs are being utilized within the Certkiller network. Which of the following is true regarding the use of switches and hubs for network connectivity in this network?
    • A. 

      A. Switches take less time to process frames than hubs take

    • B. 

      B. Hubs can filter frames

    • C. 

      C. Switches do not forward broadcasts

    • D. 

      D. Switches increase the number of collision domains in the network

    • E. 

      E. Using hubs can increase the amount of bandwidth available to hosts

  • 8. 
    As a network administrator, you will need to decide on the appropriate network devices to use. Which of the following correctly describes the roles of devices in a WAN? (Choose three)
    • A. 

      A CSU/DSU terminates a digital local loop.

    • B. 

      A router is commonly considered a DCE device.

    • C. 

      A modem terminates an analog local loop.

    • D. 

      A router is commonly considered a DTE device.

    • E. 

      A modem terminates a digital local loop.

  • 9. 
    • A. 

      Allowing simultaneous frame transmissions

    • B. 

      Increasing the size of broadcast domains

    • C. 

      Increasing the maximum length of UTP cabling between devices

    • D. 

      Filtering frames based on MAC addresses

    • E. 

      Decreasing the number of collision domains

  • 10. 
    CDP is being used throughout the Certkiller network. What are two reasons why the Certkiller network administrator would use CDP? (Choose two)
    • A. 

      To determine the status of network services on a remote device

    • B. 

      To obtain the IP Address of a connected device in order to telnet to the device

    • C. 

      To verify the type of cable interconnecting two devices

    • D. 

      To verify Layer 2 connectivity between two devices when Layer 3 fails

    • E. 

      To obtain VLAN information from directly connected switches

  • 11. 
    CDP is running between two Certkiller devices. What information is supplied by CDP? (Select three)
    • A. 

      Device Identifiers

    • B. 

      Capabilities list

    • C. 

      Platform

    • D. 

      Route identifier

    • E. 

      Neighbor traffic data

  • 12. 
    • A. 

      Coaxial cable

    • B. 

      Fiber optic cable

    • C. 

      UTP cable

    • D. 

      STP cable

    • E. 

      None of the above

  • 13. 
    • A. 

      A crossover cable connecting the switches

    • B. 

      A backbone switch connecting the switches with either fiber optic or straight-through cables

    • C. 

      A straight-through cable connecting the switches

    • D. 

      A CSU/DSU connected to the switches with straight-through cables

    • E. 

      A router connected to the switches with straight-through cables

  • 14. 
    As a CCNA candidate, you must know the various layers of the OSI model. At which layers of the OSI Model do Wide Area Networks operate in? (Choose two)
    • A. 

      Physical Layer

    • B. 

      Datalink Layer

    • C. 

      Network Layer

    • D. 

      Session Layer

    • E. 

      Transport Layer

  • 15. 
    While troubleshooting a connectivity problem on the network, you issue the ping command from your PC command prompt, but the output shows "request times out." At which OSI layer is this problem associated with?
    • A. 

      The data link layer

    • B. 

      The application layer

    • C. 

      The access layer

    • D. 

      The session layer

    • E. 

      The network layer

  • 16. 
    You download a file from an FTP site on the Internet. What is the highest layer in the OSI model used in this FTP operation?
    • A. 

      Application

    • B. 

      Presentation

    • C. 

      Session

    • D. 

      Transport

    • E. 

      Internet

  • 17. 
    A host computer has been correctly configured with a static IP address, but the default gateway is incorrectly set. Which layer of the OSI model will be first affected by this configuration error?
    • A. 

      Layer 1

    • B. 

      Layer 2

    • C. 

      Layer 3

    • D. 

      Layer 4

    • E. 

      Layer 5

  • 18. 
    • A. 

      Application

    • B. 

      Presentation

    • C. 

      Session

    • D. 

      Transport

    • E. 

      Network

  • 19. 
    At which OSI layer is a logical path created between two host systems named CK1 and CK2 on the Certkiller LAN?
    • A. 

      Physical

    • B. 

      Session

    • C. 

      Data link

    • D. 

      Transport

    • E. 

      Network

  • 20. 
    • A. 

      Layer 2

    • B. 

      Layer 3

    • C. 

      Layer 4

    • D. 

      Layer 5

    • E. 

      Layer 6

  • 21. 
    Which OSI layer header contains the address of a destination host that is on another network?
    • A. 

      Application

    • B. 

      Presentation

    • C. 

      Session

    • D. 

      Transport

    • E. 

      Network

  • 22. 
    • A. 

      The presentation layer translates bits into voltages for transmission across the physical link.

    • B. 

      The transport layer divides a data stream into segments and adds reliability and flow control information.

    • C. 

      Packets are created when the network layer adds Layer 3 addresses and control information to a segment.

    • D. 

      The data link layer adds physical source and destination addresses and an FCS to the segment.

    • E. 

      Packets are created when the network layer encapsulates a frame with source and destination host addresses and protocol-related control information.

  • 23. 
    • A. 

      The sequence number in the TCP header

    • B. 

      The Start Frame Delimiter in the 802.3 Preamble

    • C. 

      The TTL in the IP header

    • D. 

      The acknowledgement number in the segment header

    • E. 

      The frame check sequence in the Ethernet frame trailer

  • 24. 
    What data structure is described in the exhibit shown above?
    • A. 

      IP datagram

    • B. 

      TCP segment

    • C. 

      Ethernet frame

    • D. 

      UDP datagram

    • E. 

      FDDI frame

  • 25. 
    Part of the Certkiller network is displayed below:Study the exhibit shown above. Host Certkiller A has established a connection with the Certkiller II server attached to interface E0 of the Certkiller 2 router. Which of the following statements describe the information contained in protocol data units sent from Host Certkiller to Certkiller II? (Choose three)
    • A. 

      The destination port number in a segment header will have a value of 80

    • B. 

      The destination IP address of a packet will be the IP address of the E0 interface of the Certkiller 1 router

    • C. 

      The destination IP address of a packet will be the IP address of the network interface of the Certkiller II server

    • D. 

      The destination address of a frame will be the MAC address of the E0 interface of Certkiller 1 router

  • 26. 
    • A. 

      The keyword overload is missing from the command.

    • B. 

      The NAT pool must be defined first.

    • C. 

      An access list must be defined to create static NAT translations.

    • D. 

      The interfaces must be configured for NAT.

    • E. 

      None of the above

  • 27. 
    Which protocol below uses TCP port 443 at layer 4?
    • A. 

      HTML

    • B. 

      HTTPS

    • C. 

      TFTP

    • D. 

      Telnet

    • E. 

      SMTP

  • 28. 
    As a CCNA candidate, you will be expected to know the OSI model very well. Which of the following are associated with the application layer (layer 7) of the OSI model? (Choose two)
    • A. 

      TCP

    • B. 

      Telnet

    • C. 

      FTP

    • D. 

      Ping

    • E. 

      IP

  • 29. 
    As the Certkiller network administrator, you are required to have a firm understanding of the OSI model. Why does the data communication industry use the layered OSI reference model? (Choose two)
    • A. 

      It enables equipment from different vendors to use the same electronic components, thus saving research and development funds

    • B. 

      It encourages industry standardization by defining what functions occur at each layer of the model

    • C. 

      It divides the network communication process into smaller and simpler components; thus aiding component development, design and troubleshooting

    • D. 

      It provides a means by which changes in functionality in one layer require changes in other layers

    • E. 

      It supports the evolution of multiple competing standards and thus provides business opportunities for equipment manufacturers

  • 30. 
    You need to describe the various types of flow control to your co-workers. Which of the following are types of flow control that can be used in a network? (Choose three)
    • A. 

      Congestion avoidance

    • B. 

      Windowing

    • C. 

      Cut-through

    • D. 

      Buffering

    • E. 

      Load Balacing

  • 31. 
    • A. 

      TFTP

    • B. 

      SMTP

    • C. 

      FTP

    • D. 

      HTTP

    • E. 

      HTTPS

  • 32. 
    • A. 

      This is a UDP header

    • B. 

      This is an OSI layer 4 header.

    • C. 

      This is traffic from an FTP server.

    • D. 

      This is traffic from an Telnet client.

    • E. 

      The last PDU received in this session had a sequence number of 292735.

  • 33. 
    • A. 

      Source Port

    • B. 

      Acknowledgement Number

    • C. 

      Request Number

    • D. 

      Destination Address

    • E. 

      Window

  • 34. 
    Acknowledgements, sequencing, and flow control are functions that are handled by which layer of the OSI model?
    • A. 

      Layer 5

    • B. 

      Layer 4

    • C. 

      Layer 7

    • D. 

      Layer 6

    • E. 

      Layer 3

  • 35. 
    • A. 

      Start a new session using UDP

    • B. 

      Obtain a new IP address from the DHCP server

    • C. 

      Use a different source port for the session

    • D. 

      Decrease the sequence number

    • E. 

      Decrease the window size

  • 36. 
    You have set up an Internet based FTP server, where people can upload and download files. In terms of the OSI model, what is the highest layer used during the FTP sessions.
    • A. 

      Application

    • B. 

      Presentation

    • C. 

      Session

    • D. 

      Transport

    • E. 

      Internet

  • 37. 
    • A. 

      They acknowledge receipt of TCP segments.

    • B. 

      They guarantee datagram delivery.

    • C. 

      They can provide hosts with information about network problems.

    • D. 

      They are encapsulated within IP datagrams.

    • E. 

      They are encapsulated within UDP datagrams.

  • 38. 
    Which of the following services use TCP? (Choose three)
    • A. 

      DHCP

    • B. 

      SMTP

    • C. 

      SNMP

    • D. 

      FTP

    • E. 

      HTTP

  • 39. 
    Which of the following are types of flow control? (Choose three)
    • A. 

      Buffering

    • B. 

      Cut-through

    • C. 

      Windowing

    • D. 

      Congestion avoidance

    • E. 

      Load balancing

  • 40. 
    Which Layer 4 protocol is used for a Telnet connection between two Certkiller routers?
    • A. 

      IP

    • B. 

      ICMP

    • C. 

      DNS

    • D. 

      TCP

    • E. 

      UDP

  • 41. 
    FTP, Telnet, DNS, and SMTP are all protocols being used in the Certkiller network. Of these, which uses both TCP and UDP ports?
    • A. 

      Telnet

    • B. 

      FTP

    • C. 

      DNS

    • D. 

      SMTP

    • E. 

      None of the above

  • 42. 
    Certkiller is installing IP phones in a new office. The phones and office computers connect to the same device. To ensure maximum throughout for the phone data sessions, the company needs to make sure that the phone traffic is on a different network from that of the office computer data traffic. What is the best network device to which to directly connect the phones and computers and what technology should be implemented on this device? (Choose two)
    • A. 

      VLAN

    • B. 

      Subinterface

    • C. 

      STP

    • D. 

      Hub

    • E. 

      Switch

  • 43. 
    • A. 

      UDP will send an ICMP Information Request to the source host.

    • B. 

      UDP will pass the information in the datagrams up to the next OSI layer in the order that they arrive.

    • C. 

      UDP will drop the datagrams.

    • D. 

      UDP will use the sequence numbers in the datagram headers to reassemble the data in the correct order.

    • E. 

      UDP will not acknowledge the datagrams and wait for a retransmission of the datagrams.

  • 44. 
    Part of the Certkiller network is shown below:You work as a network technician for Certkiller and are responsible for this network. Based on the diagram shown above, how many collision domains are there?
    • A. 

      Six

    • B. 

      Fourteen

    • C. 

      Four

    • D. 

      Two

    • E. 

      Three

  • 45. 
    • A. 

      Design Certkiller A

    • B. 

      Design Certkiller B

    • C. 

      Design Certkiller C

    • D. 

      Design Certkiller D

  • 46. 
    You work as a network technician at Certkiller .com. You have been assigned the task of designing a new Certkiller internetwork. The main priority is the achieve the highest reliability available, however not at all costs. Certkiller .com is willing to spend more dollars to avoid downtime caused by link failure. Which of the following four designs would provide some redundancy and increase reliability for all four sites, but would cost less than a fully redundant topology?
    • A. 

      Design Certkiller A

    • B. 

      Design Certkiller B

    • C. 

      Design Certkiller C

    • D. 

      Design Certkiller D

  • 47. 
    • A. 

      Design Certkiller A

    • B. 

      Design Certkiller B

    • C. 

      Design Certkiller C

    • D. 

      Design Certkiller D

  • 48. 
    • A. 

      Network 1: 192.168.10.0/26Network 2: 192.168.10.64/26Network 3: 192.168.10.128/26Serial link 1: 192.168.20.0/24Serial link 2: 192.168.30.0/24

    • B. 

      Network 1: 192.168.10.0/26Network 2: 192.168.10.64/28Network 3: 192.168.10.80/29Serial link 1: 192.168.10.88/30Serial link 2: 192.168.10.96/30

    • C. 

      Network 1: 192.168.10.0/26Network 2: 192.168.10.64/27Network 3: 192.168.10.96/28Serial link 1: 192.168.10.112/30Serial link 2: 192.168.10.116/30

    • D. 

      Network 1: 192.168.10.0/27Network 2: 192.168.10.64/28Network 3: 192.168.10.96/29Serial link 1: 192.168.10.112/30Serial link 2: 192.168.10.116/30

  • 49. 
    • A. 

      Interface S0/0 on the router is down.

    • B. 

      Interface Fa0/1 on the router is down.

    • C. 

      Interface Fa0/5 on Certkiller 3 is down.

    • D. 

      Interface Fa0/4 on Certkiller 3 is down.

    • E. 

      Certkiller 2 is turned off.

  • 50. 
    Refer to the graphic shown below:
    • A. 

      Picture A

    • B. 

      Picture B

    • C. 

      Picture C

    • D. 

      Picture D

  • 51. 
    • A. 

      A

    • B. 

      B

    • C. 

      C

    • D. 

      D

    • E. 

      E

  • 52. 
    • A. 

      The path of the packets will be Certkiller 3 to Certkiller 2 to Certkiller 1

    • B. 

      The path of the packets will be Certkiller 3 to Certkiller 1 to Certkiller 2

    • C. 

      The path of the packets will be both Certkiller 3 to Certkiller 2 to Certkiller 1 AND Certkiller 3 to Certkiller 1

    • D. 

      The path of the packets will be Certkiller 3 to Certkiller 1

    • E. 

      None of the above

  • 53. 
    Refer to the following exhibit:
    • A. 

      Destination MAC: 0011.43da.2c98 Source MAC: 0070.0e8f.088a Destination IP: 192.168.60.5 Source IP: 192.168.60.1

    • B. 

      Destination MAC: 0011.43da.2c98 Source MAC: 0070.0e8f.088a Destination IP: 192.168.60.5 Source IP: 192.168.24.5

    • C. 

      Destination MAC: 0011.43da.2c98 Source MAC: 00b0.d0ef.5f6a Destination IP: 192.168.60.5 Source IP: 192.168.24.5

    • D. 

      Destination MAC: 0011.43da.2c98 Source MAC: 0070.0e97.af4e Destination IP: 192.168.60.5 Source IP: 192.168.60.2

    • E. 

      None of the above

  • 54. 
    • A. 

      A

    • B. 

      B

    • C. 

      C

    • D. 

      D

    • E. 

      E

  • 55. 
    The Certkiller network is shown below:
    • A. 

      The IP address of Certkiller 1

    • B. 

      The IP address of Certkiller A Fa0/0

    • C. 

      The IP address of Host B

    • D. 

      The MAC address of Certkiller 1

    • E. 

      The MAC address of Certkiller A Fa0/0

  • 56. 
    Which IOS user EXEC command will allow a network technician to determine which router in the path to an unreachable network host should be examined more closely for the cause of the network failure?
    • A. 

      Certkiller B> telnet

    • B. 

      Certkiller B > ping

    • C. 

      Certkiller B > trace

    • D. 

      Certkiller B > show ip route

    • E. 

      Certkiller B > show interface

  • 57. 
    • A. 

      The MAC address of Certkiller A

    • B. 

      The MAC address of switch Certkiller 1

    • C. 

      The MAC address of the E0 interface of the Certkiller 3 router.

    • D. 

      The MAC address of the E1 interface of the Certkiller 3 router.

    • E. 

      The MAC address of switch Certkiller 2

  • 58. 
    The Certkiller network topology is shown below:
    • A. 

      The destination port number in a segment header will have a value of 80.

    • B. 

      The destination port number in a segment header will have a unique value greater than or equal to 1023.

    • C. 

      The destination address of a frame will be the MAC address of the HTTP server interface.

    • D. 

      The destination address of a frame will be the MAC address of the E0 interface of the Certkiller A router.

    • E. 

      The destination address of a packet will be the IP address of the HTTP-Server

  • 59. 
    • A. 

      Router Certkiller D will strip off the source MAC address and replace it with the MAC address on the forwarding Fast Ethernet interface

    • B. 

      Router Certkiller D will strip off the source IP address and replace it with the IP address on the forwarding Fast Ethernet interface

    • C. 

      Router Certkiller D will strip off the destination MAC address and replace it with the MAC address of Host Certkiller 2

    • D. 

      Router Certkiller D will strip off the destination IP address and replace it with the IP address of Host B

    • E. 

      Router Certkiller D will forward the data frame out interface FastEthernet0/2

  • 60. 
    • A. 

      Source MAC=000A.8A47.E612 Destination MAC=000B.DC04.12F4 Source IP=192.168.23.4 Destination IP=192.168.23.1

    • B. 

      Source MAC=000A.8A47.E612 Destination MAC=0010.7BE7.FAEF Source IP=192.168.23.4 Destination IP=192.168.127.7

    • C. 

      Source MAC=000A.8A47.E612 Destination MAC=000B.DC04.12F4 Source IP=192.168.23.4 Destination IP=192.168.127.7

    • D. 

      Source MAC=000A.8A47.E612 Destination MAC=0010.7BE7.FAEF Source IP=192.168.23.4 Destination IP=192.168.23.1

    • E. 

      None of the above

  • 61. 
    Exhibit:
    • A. 

      B2:B2:B2:B2:B2:B2

    • B. 

      A1:A1:A1:A1:A1:A1

    • C. 

      10.168.10.99

    • D. 

      10.168.11.65

    • E. 

      C3:C3:C3:C3:C3:C3

  • 62. 
    • A. 

      A1:A1:A1:A1:A1:A1

    • B. 

      D4:D4:D4:D4:D4:D4

    • C. 

      B2:B2:B2:B2:B2:B2

    • D. 

      10.168.11.88

    • E. 

      C3:C3:C3:C3:C3:C3

  • 63. 
    • A. 

      192.168.7.17

    • B. 

      Abcd.1123.0045

    • C. 

      Aabb.555.2222

    • D. 

      192.168.1.1

    • E. 

      Abcd.2246.0035

  • 64. 
    • A. 

      The MAC address of Host Certkiller 1

    • B. 

      The MAC address of E0 of the router Certkiller C

    • C. 

      The MAC address of Switch Certkiller B

    • D. 

      The MAC address of E1 of the router Certkiller C

    • E. 

      The MAC address of Switch Certkiller A

  • 65. 
    Part of the Certkiller network is shown below:
    • A. 

      192.168.60.5 and 0007.0e56.ab2e

    • B. 

      192.168.24.2 and 0007.0e84.acef

    • C. 

      192.168.24.1 and 0007.0e56.ab2e

    • D. 

      192.168.60.5 and 0011.43da.2c98

    • E. 

      None of the above

  • 66. 
    • A. 

      Hub Certkiller 0

    • B. 

      Switch Certkiller 1

    • C. 

      Router Certkiller 5

    • D. 

      Switch Certkiller 2

    • E. 

      Switch Certkiller 3

  • 67. 
    • A. 

      BGP on both the routers.

    • B. 

      RIP on both the routers.

    • C. 

      Default routes on both routers.

    • D. 

      BGP on the ISP router and a static route on CK1 .

    • E. 

      A default route on CK1 and a static route on the ISP router.

  • 68. 
    A Certkiller technician is troubleshooting connectivity problems between two routers that are directly connected through the serial line. The technician notices that the serial line is up but cannot see any neighbors displayed in the output of the show cdp neighbors command. In which OSI layer is the problem most likely occurring?
    • A. 

      Physical

    • B. 

      Data link

    • C. 

      Network layer

    • D. 

      Transport layer

    • E. 

      Application layer

  • 69. 
    A new point to point circuit is installed, connecting Certkiller 1 to Certkiller 2 as shown below:
    • A. 

      Certkiller 1(config)# ip route 172.16.4.2 0.0.0.0 0.0.0.0

    • B. 

      Certkiller 1(config)# ip route 0.0.0.0 0.0.0.0 S1

    • C. 

      Certkiller 1(config)# ip route 172.16.4.1 0.0.0.0 0.0.0.0

    • D. 

      Certkiller 1(config)# ip route S0 0.0.0.0 0.0.0.0

    • E. 

      Certkiller 1(config)# ip route 0.0.0.0 0.0.0.0 172.16.4.2

  • 70. 
    • A. 

      Core(config-router)# default-information originate Core(config-router)# network 10.0.0.00.255.255.255 area 0 Core(config-router)# exit Core(config)# ip route 0.0.0.00.0.0.010.10.2.14

    • B. 

      Core(config-router)# default-information originate Core(config-router)# network 10.10.2.32 0.0.0.31 area 0 Core(config-router)# exit Core(config)# ip route 0.0.0.00.0.0.0 10.10.2.14

    • C. 

      Core(config-router)# default-information originate Core(config-router)# network 10.10.2.13 0.0.0.242 area 0 Core(config-router)# exit Core(config)# ip route 0.0.0.00.0.0.010.10.2.14

    • D. 

      Core(config-router)# default-information originate Core(config-router)# network 10.10.2.16 0.0.0.15 area 0 Core(config-router)# exit Core(config)# ip route 0.0.0.00.0.0.010.10.2.14

  • 71. 
    • A. 

      Gateway(config)# ip route 0.0.0.0 0.0.0.0 207.134.6.1.

    • B. 

      Gateway(config)# router rip Gateway(config-router)# network 207.134.6.0 default

    • C. 

      Gateway(config)# ip route 207.134.6.0 255.255.255.0 Serial0/0

    • D. 

      Gateway(config)# router OSPF Gateway(config-router)# network 207.134.6.0

    • E. 

      Gateway(config)# ip default-network 207.13

  • 72. 
    Router Certkiller 2 is connected to an ISP as shown below:
    • A. 

      Multiplexer

    • B. 

      WAN switch

    • C. 

      ATM switch

    • D. 

      CSU/DSU

    • E. 

      Modem

  • 73. 
    • A. 

      Communication between VLAN3 and the other VLANs would be disabled

    • B. 

      Host Certkiller B would not be able to access the server in VLAN9 until the cable is reconnected

    • C. 

      For less than a minute, Host Certkiller B would not be able to access the server in VLAN9. Then normal network function would resume

    • D. 

      The transfer of files from Host Certkiller B to the server in VLAN9 would be significantly slower

    • E. 

      None of the above

  • 74. 
    • A. 

      show ip links

    • B. 

      Show cdp neighbor

    • C. 

      show cdp neighbor detail

    • D. 

      show ip clients

    • E. 

      Show ip route

  • 75. 
    While troubleshooting a network connectivity problem, a Certkiller technician observes steady link lights on both the workstation NIC and the switch port to which the workstation is connected. However, when the ping command is issued from the workstation, the output message "Request timed out." is displayed. At which layer of the 7-layer OSI model does the problem most likely exist?
    • A. 

      The data link layer

    • B. 

      The application layer

    • C. 

      The protocol layer

    • D. 

      The access layer

    • E. 

      The network layer