Use the ipconfig /all command at the host�s command prompt.
Use the ping 127.0.0.1 command at the command prompt.
Use the traceroute command at the command prompt to identify any failures on the path to the gateway.
Use FTP to check for connectivity to remote sites.
Download a troubleshooting tool from the PC manufacturer's website.
A, B, D, G
A, B, E, F
C, D, G, I
G, H, I, J
Only computer D
Only computer A and computer D
Only computer B, computer C, and computer D
TCP and UDP port numbers are used by application layer protocols
TCP uses port numbers to provide reliable transportation of IP packets.
UDP uses windowing and acknowledgments for reliable transfer of data.
TCP uses windowing and sequencing to provide reliable transfer of data.
TCP is a connection-oriented protocol. UDP is a connectionless protocol.
1000 Base LX
100 Base TX
1.MUA 2.MDA 3.MTA 4.SMTP 5.MTA 6.POP 7.MDA 8.MUA
1.MUA 2.POP 3.MDA 4.SMTP 5.MTA 6.MDA 7.SMTP 8.MUA
1.MUA 2.POP 3.SMTP 4.MDA 5.MTA 6.SMTP 7.POP 8.MUA
1.MDA 2.SMTP 3.MTA 4.SMTP 5.MTA 6.MUA 7.POP 8.MDA
1.MUA 2.SMTP 3.MTA 4.SMTP 5.MTA 6.MDA 7.POP 8.MUA
Issue the ip address command on interface FastEthernet 0/0
Issue the no shutdown command on interface FastEthernet 0/1
Issue the clock rate command on interface Serial 0/0/0
Issue the description command on interface Serial 0/0/1
A jam signal indicates that the collision has cleared and the media is not busy.
A device listens and waits until the media is not busy before transmitting.
The device with the electronic token is the only one that can transmit after a collision.
All of the devices on a segment see data that passes on the network medium.
After detecting a collision, hosts can attempt to resume transmission after a random time delay has expired.
The entries specify three Telnet lines for remote access.
The entries specify four Telnet lines for remote access.
The entries set the console and Telnet password to "c13c0".
Telnet access will be denied because the Telnet configuration is incomplete.
Access will be permitted for Telnet using "c13c0" as the password.
When the interface is functioning as a DTE device
When the interface timers have been cleared
When the connected DTE device is shut down
When the interface is functioning as a DCE device
Upper-layer connection-oriented protocols
Network layer IP protocols
Transport layer UDP protocols
A FTP client
A telnet client
A terminal emulation program
A web browser
The data is encrypted.
The connection type is called a VTY session.
A server process is running on PC1.
A GET request is sent to RouterB.
The application name is the same for the service, protocol, and client.
Service port number
Host logical address
Device physical address
Virtual connection identifier
A single broadcast domain is present
Two logical address ranges are required.
Three broadcast domains are shown.
Four networks are needed.
Five collision domains exist.
IP address: 192.168.100.19; Subnet Mask: 255.255.255.248; Default Gateway: 220.127.116.11
IP address: 192.168.100.20; Subnet Mask: 255.255.255.240; Default Gateway: 192.168.100.17
IP address: 192.168.100.21; Subnet Mask: 255.255.255.248; Default Gateway: 192.168.100.18
IP address: 192.168.100.22; Subnet Mask: 255.255.255.240; Default Gateway: 10.1.1.5
IP address: 192.168.100.30; Subnet Mask: 255.255.255.240; Default Gateway: 192.168.1.1
Uses a flat structure
Uniquely identifies each host
Contains a network portion
The packet will be dropped.
The packet will be forwarded via FastEthernet 0/0.
The packet will be forwarded to the destination host.
The packet will be forwarded to the 192.168.1.3 next-hop address.
This is a server response.
The UDP protocol is being used.
The destination port indicates a Telnet session.
The return segment will contain a source port of 23.
The next session originated from the client of this session will use the source port number 13358.
C 18.104.22.168/24 is directly connected, FastEthernet0/0
Two networks routing the packets
Two applications communicating the data
Two hosts at either end of the communication
Two nodes on the local network exchanging the frame
The cable is unusable and must be rewired.
The cable is suitable for use as a Gigabit Ethernet straight-through.
The cable is suitable for use as a Fast Ethernet crossover.
The cable is suitable for use as a rollover cable.
The cable is suitable for use between two 100 Mbps Auto-MDIX capable switches.
Host A was assigned a network address.
Host B was assigned a multicast address.
Host A and Host B belong to different networks.
The gateway address was assigned a broadcast address.
Connection 1 - rollover cable Connection 2 - straight-through cable Connection 3 - crossover cable
Connection 1 - crossover cable Connection 2 - rollover cable Connection 3 - crossover cable
Connection 1 - straight-through cable Connection 2 - crossover cable Connection 3 - crossover cable
Connection 1 - straight-through cable Connection 2 - crossover cable Connection 3 - straight-through cable
Connection 1 - crossover cable Connection 2 - straight-through cable Connection 3 - crossover cable
10.0.0.0 to 10.255.255.255
22.214.171.124 to 126.96.36.199
188.8.131.52 to 184.108.40.206
172.16.0.0 to 172.31.255.255
192.168.0.0 to 192.168.255.255
Media access control
0 to 255
0 to 1023
1024 to 49151
49152 to 65535
Destination MAC: BBBB:BBBB:BBBB Destination IP: 172.22.0.62
Destination MAC: DDDD:DDDD:DDDD Destination IP: 172.22.0.75
Destination MAC: EEEE:EEEE:EEEE Destination IP: 172.22.0.62
Destination MAC: BBBB:BBBB:BBBB Destination IP: 172.22.0.75
Destination MAC: EEEE:EEEE:EEEE Destination IP: 172.22.0.75
IP address incorrectly entered
Network cables unplugged
Subnet mask incorrectly entered
Network card failure
The address that is assigned to the computer represents private addressing.
The computer is unable to communicate outside of the local network.
The network of this computer can have 126 hosts.
The prefix of the computer address is /27.
The IP address that is assigned to the computer is routable on the Internet.
Leaving host A