1.
A PC can not connect to any remote websites, ping its default gateway, or ping a printer that is functioning properly on the local network segment. Which action will verify that the TCP/IP stack is functioning correctly on this PC?
Correct Answer
B. Use the ping 127.0.0.1 command at the command prompt.
Explanation
Using the ping 127.0.0.1 command at the command prompt will verify that the TCP/IP stack is functioning correctly on the PC. The IP address 127.0.0.1 is the loopback address, which means it refers to the local host or the PC itself. By pinging this address, the PC is essentially testing its own network connectivity and the functionality of the TCP/IP stack. If the ping is successful, it indicates that the PC's network stack is working properly.
2.
Refer to the exhibit. Which set of devices contains only intermediary devices?
Correct Answer
A. A, B, D, G
Explanation
The set of devices A, B, D, G contains only intermediary devices. Intermediary devices are networking devices that connect different networks together, such as switches and routers. In the given set, A and B are switches, D is a router, and G is a switch. These devices are responsible for forwarding data packets between networks and do not host end-user applications or services.
3.
Refer to the exhibit. When computer A sends a frame to computer D, what computers receive the frame?
Correct Answer
A. Only computer D
Explanation
When computer A sends a frame to computer D, only computer D receives the frame. This is because computer A is specifically sending the frame to computer D, so only computer D is the intended recipient. The other computers (B and C) are not involved in this communication and therefore do not receive the frame.
4.
Which three statements characterize the transport layer protocols?
Correct Answer(s)
A. TCP and UDP port numbers are used by application layer protocols
D. TCP uses windowing and sequencing to provide reliable transfer of data.
E. TCP is a connection-oriented protocol. UDP is a connectionless protocol.
5.
Which type of media is immune to EMI and RFI?
Correct Answer(s)
C. 100 Base-FX
E. 1000 Base LX
Explanation
100 Base-FX and 1000 Base LX are both types of fiber optic media, which are immune to electromagnetic interference (EMI) and radio frequency interference (RFI). Unlike other types of media such as 10 Base-T and 10 Base-2, which use copper wires and can be susceptible to EMI and RFI, fiber optic cables use light signals to transmit data and are not affected by these interferences. Therefore, 100 Base-FX and 1000 Base LX are the correct answers as they provide immunity to EMI and RFI.
6.
Refer to the exhibit. A technician is working on a network problem that requires verification of the router LAN interface. What address should be pinged from this host to confirm that the router interface is operational?
Correct Answer
C. 192.168.254.1
Explanation
The correct answer is 192.168.254.1 because this IP address belongs to the same subnet as the router LAN interface. By pinging this address, the technician can verify if the router interface is operational.
7.
Refer to the exhibit. The diagram represents the process of sending email between clients. Select the list below that correctly identifies the component or protocol used at each numbered stage of the diagram.
Correct Answer
E. 1.MUA 2.SMTP 3.MTA 4.SMTP 5.MTA 6.MDA 7.POP 8.MUA
Explanation
The diagram shows the process of sending an email between clients. At stage 1, the Mail User Agent (MUA) is used to compose the email. At stage 2, the Simple Mail Transfer Protocol (SMTP) is used to send the email from the client to the Mail Transfer Agent (MTA). At stage 3, the MTA is responsible for routing the email to the correct destination. At stage 4, SMTP is used again to send the email from the MTA to the Mail Delivery Agent (MDA). At stage 5, the MTA is used again to route the email to the recipient's MDA. At stage 6, the MDA receives the email and stores it for the recipient. At stage 7, the Post Office Protocol (POP) is used to retrieve the email from the MDA. Finally, at stage 8, the MUA is used to view and manage the email.
8.
Refer to the exhibit. What function does router RT_A need to provide to allow Internet access for hosts in this network?
Correct Answer
A. Address translation
Explanation
Router RT_A needs to provide address translation in order to allow Internet access for hosts in this network. Address translation, also known as Network Address Translation (NAT), allows the router to translate private IP addresses used by the hosts in the network into a public IP address that can be recognized and routed over the Internet. This enables the hosts to communicate with devices on the Internet using their private IP addresses.
9.
Refer to the exhibit. The network containing router B is experiencing problems. A network associate has isolated the issue in this network to router B? What action can be preformed to correct the network issue?
Correct Answer
B. issue the no shutdown command on interface FastEthernet 0/1
Explanation
The correct answer is to issue the "no shutdown" command on interface FastEthernet 0/1. This command will bring the interface out of the administratively down state and enable it to start forwarding traffic again.
10.
In a Cisco IOS device, where is the startup-configuration file stored?
Correct Answer
B. NVRAM
Explanation
The startup-configuration file in a Cisco IOS device is stored in NVRAM (non-volatile random access memory). NVRAM is a type of memory that retains its data even when the device is powered off or restarted. This ensures that the configuration file is preserved and can be loaded during the startup process. Flash memory is another storage option in Cisco devices, but it is typically used for storing the operating system and other files, not the startup configuration. RAM (random access memory) is volatile memory that is used for temporary storage while the device is powered on. ROM (read-only memory) contains the firmware and basic operating system of the device.
11.
A routing issue has occurred in you internetwork. Which of the following type of devices should be examined to isolate this error?
Correct Answer
D. Router
Explanation
If a routing issue has occurred in the internetwork, the device that should be examined to isolate the error is the router. Routers are responsible for directing network traffic between different networks, so if there is a problem with routing, it is likely that the router is causing the issue. The other devices listed (access point, host, hub, and switch) do not perform routing functions, so they are less likely to be the source of the problem.
12.
Which OSI layer protocol does IP rely on to determine whether packets have been lost and to request retransmission?
Correct Answer
D. Transport
Explanation
IP relies on the transport layer protocol to determine whether packets have been lost and to request retransmission. The transport layer protocols, such as TCP (Transmission Control Protocol), provide reliable delivery of data by implementing mechanisms like acknowledgments and retransmissions. These mechanisms allow IP to detect and recover from packet loss, ensuring that the data is successfully transmitted from the source to the destination.
13.
Which three IPv4 addresses represent a broadcast for a subnet?
Correct Answer(s)
A. 172.16.4.63 /26
C. 172.16.4.191 /26
E. 172.16.4.95 /27
Explanation
The correct answer is 172.16.4.63 /26, 172.16.4.191 /26, and 172.16.4.95 /27. In IPv4, the broadcast address for a subnet is the last address in the range of that subnet. In the given options, the subnet mask for the first two addresses is /26, which means they have a range of 64 addresses. The last address in this range is the broadcast address. Similarly, the subnet mask for the third address is /27, which means it has a range of 32 addresses. The last address in this range is the broadcast address. Therefore, these three addresses represent the broadcast for their respective subnets.
14.
What are the three characteristics of CSMA/CD?
Devices can be configured with a higher transmission priority.
A jam signal indicates that the collision has cleared and the media is not busy.
Correct Answer(s)
A. A device listens and waits until the media is not busy before transmitting.
C. All of the devices on a segment see data that passes on the network medium.
D. After detecting a collision, hosts can attempt to resume transmission after a random time delay has expired.
Explanation
The correct answer is "A device listens and waits until the media is not busy before transmitting." This is one of the characteristics of CSMA/CD, where a device must check if the network medium is busy before transmitting to avoid collisions. Another correct characteristic is "All of the devices on a segment see data that passes on the network medium." This means that all devices connected to the same segment can see the data being transmitted on the network. Additionally, "After detecting a collision, hosts can attempt to resume transmission after a random time delay has expired" is also a characteristic of CSMA/CD, where hosts wait for a random time period before attempting to transmit again after a collision.
15.
Due to a security violation, the router passwords must be changed. What information can be learned from the following configuration entries?
Correct Answer(s)
A. The entries specify four Telnet lines for remote access
D. Access will be permitted for Telnet using "c13c0" as the password.
Explanation
The given configuration entries indicate that there are four Telnet lines set up for remote access. Additionally, it states that the console and Telnet password is set to "c13c0". However, it also mentions that Telnet access will be denied because the Telnet configuration is incomplete. Despite this, access will still be permitted for Telnet using the password "c13c0".
16.
Which prompt represents the appropriate mode used for the copy running-config startup-config command?
Correct Answer
B. Switch-6J#
Explanation
The prompt "Switch-6J#" represents the appropriate mode used for the "copy running-config startup-config" command. The "#" symbol indicates that the user is in privileged EXEC mode, which is the mode required to execute this command.
17.
Which combination of network id and subnet mask correctly identifies all IP addresses from 172.16.128.0 through 172.16.159.255?
Correct Answer
D. 172.16.128.0 255.255.224.0
Explanation
The subnet mask 255.255.224.0 allows for a range of IP addresses from 172.16.128.0 to 172.16.255.255. This is because the subnet mask has 19 bits set to 1, which means the network portion of the IP address is 19 bits long. Therefore, the network ID is 172.16.128.0 and the subnet mask correctly identifies all IP addresses within the range 172.16.128.0 through 172.16.159.255.
18.
When must a router serial interface be configured with the clock rate command?
Correct Answer
D. when the interface is functioning as a DCE device
Explanation
The router serial interface must be configured with the clock rate command when it is functioning as a DCE device. This command is used to set the clock rate on the router's serial interface, which is necessary for proper communication between DCE and DTE devices. The clock rate is typically set on the DCE device, such as a CSU/DSU, and not on the DTE device. Therefore, when the router interface is functioning as a DCE device, it needs to be configured with the clock rate command.