CISCO Exam Test Nr1

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Sumis34
S
Sumis34
Community Contributor
Quizzes Created: 2 | Total Attempts: 633
Questions: 50 | Attempts: 410

SettingsSettingsSettings
CISCO Exam Test Nr1 - Quiz

Tests NR1


Questions and Answers
  • 1. 

     Which of the following are the address ranges of the private IP addresses? (Choose three.)  

    • A.

      10.0.0.0 to 10.255.255.255

    • B.

      200.100.50.0 to 200.100.25.255

    • C.

      150.150.0.0 to 150.150.255.255

    • D.

      172.16.0.0 to 172.31.255.255

    • E.

      192.168.0.0 to 192.168.255.255

    • F.

      127.16.0.0 to 127.31.255.255

    Correct Answer(s)
    A. 10.0.0.0 to 10.255.255.255
    D. 172.16.0.0 to 172.31.255.255
    E. 192.168.0.0 to 192.168.255.255
    Explanation
    The address ranges 10.0.0.0 to 10.255.255.255, 172.16.0.0 to 172.31.255.255, and 192.168.0.0 to 192.168.255.255 are the private IP address ranges. These ranges are reserved for use within private networks and are not routable on the internet. They are commonly used in home and small office networks for devices such as computers, printers, and routers.

    Rate this question:

  • 2. 

    Which two functions of the OSI model occur at layer two? (Choose two.) 

    • A.

      Physical addressing

    • B.

      Encoding

    • C.

      Routing

    • D.

      Cabling

    • E.

      Media access control

    Correct Answer(s)
    A. pHysical addressing
    E. Media access control
    Explanation
    The two functions of the OSI model that occur at layer two are physical addressing and media access control. Physical addressing involves assigning unique addresses to devices on a network, such as MAC addresses. Media access control, on the other hand, is responsible for managing the access to the physical medium, ensuring that devices can transmit and receive data without interference.

    Rate this question:

  • 3. 

     Refer to the exhibit. What function does router RT_A need to provide to allow Internet access for hosts in this network? 

    • A.

      Address translation

    • B.

      DHCP services

    • C.

      Ftpd

    • D.

      Web server

    Correct Answer
    A. Address translation
    Explanation
    Router RT_A needs to provide address translation in order to allow Internet access for hosts in this network. Address translation, typically done through Network Address Translation (NAT), allows multiple devices in a private network to share a single public IP address for communication with the Internet. It translates the private IP addresses of the hosts in the network to the public IP address assigned to the router, allowing the hosts to communicate with external networks.

    Rate this question:

  • 4. 

    What is true regarding network layer addressing? (Choose three.)

    • A.

      Uses a flat structure

    • B.

      Prevent broadcasts

    • C.

      Heirarchical

    • D.

      Uniquely identifies each host

    • E.

      48 bits in length

    • F.

      Contains a network portion

    Correct Answer(s)
    C. Heirarchical
    D. Uniquely identifies each host
    F. Contains a network portion
    Explanation
    Network layer addressing is hierarchical, which means it is organized in a hierarchical structure with multiple levels such as network, subnetwork, and host. This allows for efficient routing and management of network resources. The addressing scheme also uniquely identifies each host on the network, ensuring that no two hosts have the same address. Additionally, network layer addressing contains a network portion, which helps in determining the network to which a host belongs and facilitates routing decisions.

    Rate this question:

  • 5. 

    Refer to the exhibit. Host A attempts to establish a TCP/IP session with host C. During this attempt, a frame was captured with the source MAC address 0050.7320.D632 and the destination MAC address 0030.8517.44C4. The packet inside the captured frame has an IP source address 192.168.7.5, and the destination IP address is 192.168.219.24. At which point in the network was this packet captured?    

    • A.

      Leaving host A

    • B.

      Leaving ATL

    • C.

      Leaving Dallas

    • D.

      Leaving NYC

    Correct Answer
    C. Leaving Dallas
    Explanation
    The packet was captured with the source MAC address 0050.7320.D632 and the destination MAC address 0030.8517.44C4. This indicates that the packet was captured while it was leaving Dallas, as the source MAC address belongs to a device in Dallas and the destination MAC address belongs to a device outside of Dallas.

    Rate this question:

  • 6. 

     Refer to the exhibit. Assume all devices are using default configurations. How many subnets are required to address the topology that is shown?  

    • A.

      1

    • B.

      3

    • C.

      4

    • D.

      5

    • E.

      7

    Correct Answer
    B. 3
    Explanation
    The given topology consists of three routers and three networks. Each router needs to be assigned a separate subnet, and each network also needs to be assigned a separate subnet. Therefore, a total of three subnets are required to address the topology.

    Rate this question:

  • 7. 

    A technician is asked to secure the privileged EXEC mode of a switch by requiring a password. Which type of password would require this login and be considered the most secure?

    • A.

      Console

    • B.

      Enable

    • C.

      Enable secret

    • D.

      VTY

    Correct Answer
    C. Enable secret
    Explanation
    The most secure type of password that can be used to secure the privileged EXEC mode of a switch is the "enable secret" password. This password is encrypted and stored in the switch's configuration file, providing an extra layer of security compared to other types of passwords such as the console or enable passwords. By using the "enable secret" password, unauthorized users will not be able to easily view or access the password, making it the most secure option.

    Rate this question:

  • 8. 

    Refer to the exhibit. A technician is working on a network problem that requires verification of the router LAN interface. What address should be pinged from this host to confirm that the router interface is operational?  

    • A.

      127.0.0.1

    • B.

      192.168.64.196

    • C.

      192.168.254.1

    • D.

      192.168.254.9

    • E.

      192.168.254.254

    Correct Answer
    C. 192.168.254.1
    Explanation
    The address that should be pinged from this host to confirm that the router interface is operational is 192.168.254.1.

    Rate this question:

  • 9. 

     Which OSI layer does IP rely on to determine whether packets have been lost and to request retransmission?  

    • A.

      Application

    • B.

      Presentation

    • C.

      Session

    • D.

      Transport

    Correct Answer
    D. Transport
    Explanation
    IP relies on the transport layer to determine whether packets have been lost and to request retransmission. The transport layer is responsible for breaking the data into smaller units called segments and adding sequence numbers to each segment. IP uses these sequence numbers to determine if any segments are missing and requests retransmission of those missing segments. The transport layer also handles error detection and correction, ensuring that the data is delivered accurately and in the correct order. Therefore, the correct answer is transport.

    Rate this question:

  • 10. 

    When connectionless protocols are implemented at the lower layers of the OSI model, what is usually used to acknowledge that the data was received and to request the retransmission of missing data?  

    • A.

      IP

    • B.

      UDP

    • C.

      Ethernet

    • D.

      A connectionless acknowledgement

    • E.

      An upper-layer, connection-oriented protocol or service

    Correct Answer
    E. An upper-layer, connection-oriented protocol or service
    Explanation
    When connectionless protocols are implemented at the lower layers of the OSI model, an upper-layer, connection-oriented protocol or service is usually used to acknowledge that the data was received and to request the retransmission of missing data. This is because connectionless protocols do not provide acknowledgment or retransmission mechanisms themselves, so a higher layer protocol or service is needed to handle these functions.

    Rate this question:

  • 11. 

    Refer to the exhibit. Host C is able to ping 127.0.0.1 successfully, but is unable to communicate with hosts A and B in the organization. What is the likely cause of the problem?  

    • A.

      Hosts A and B are not on the same subnet as host C

    • B.

      The IP addresses on the router serial interfaces are wrong.

    • C.

      The subnet mask on host C is improperly configured.

    • D.

      The FastEthernet interface fa0/0 of router 1 is wrongly configured.

    Correct Answer
    C. The subnet mask on host C is improperly configured.
    Explanation
    The likely cause of the problem is that the subnet mask on host C is improperly configured. This means that host C is not able to correctly determine which network it belongs to and therefore cannot communicate with hosts A and B. The subnet mask is used to divide an IP address into network and host portions, and if it is configured incorrectly, it can lead to communication issues between devices on different subnets.

    Rate this question:

  • 12. 

    Refer to the exhibit. Which list refers only to end devices?  

    • A.

      D,E,F,G

    • B.

      A,H,B,C

    • C.

      A,D,E,F

    • D.

      A,D,E,G

    Correct Answer
    A. D,E,F,G
    Explanation
    The list D,E,F,G refers only to end devices because they are the only options that do not include any intermediate devices such as routers or switches. End devices are the final destination or source of data in a network, and examples include computers, laptops, smartphones, and printers. In contrast, routers and switches are network infrastructure devices used to connect and direct traffic between different networks or devices. Therefore, the list D,E,F,G consists solely of end devices.

    Rate this question:

  • 13. 

    Refer to the exhibit. Host A sends a frame with the destination MAC address as FFFF.FFFF.FFFF. What action will the switch take for this frame?  

    • A.

      It will drop the frame.

    • B.

      It will send the frame back to host A.

    • C.

      It will send the frame to all hosts except host A.

    • D.

      It will forward the frame to the default gateway.

    Correct Answer
    C. It will send the frame to all hosts except host A.
    Explanation
    When a frame with a destination MAC address of FFFF.FFFF.FFFF is received by a switch, it will be flooded out to all ports except the port from which it was received. This is because the FFFF.FFFF.FFFF MAC address is the broadcast address, and the switch will send the frame to all hosts on the network to ensure that it reaches its intended destination. Therefore, the switch will send the frame to all hosts except host A.

    Rate this question:

  • 14. 

     Which subnet mask will allow 2040 hosts per subnet on the IP network 10.0.0.0?

    • A.

      255.255.0.0

    • B.

      255.255.254.0

    • C.

      255.255.252.0

    • D.

      255.255.248.0

    • E.

      255.255.255.128

    • F.

      255.255.240.0

    Correct Answer
    D. 255.255.248.0
    Explanation
    The subnet mask 255.255.248.0 will allow 2040 hosts per subnet on the IP network 10.0.0.0. This is because the subnet mask 255.255.248.0 provides a total of 11 bits for host addresses, which allows for 2048 possible host addresses (2^11 - 2). However, 2 addresses are reserved for network and broadcast addresses, leaving 2046 usable host addresses. Since 2046 is greater than 2040, this subnet mask will meet the requirement.

    Rate this question:

  • 15. 

      Refer to the exhibit. RouterB is configured properly. The Ethernet interface Fa0/0 of RouterA is configured with the use of the commands that are shown. However, a ping from the Fa0/0 interface of RouterA to the Fa0/0 interface of RouterB is unsuccessful. What action should be taken on RouterA to solve this problem? 

    • A.

      Use the description command on the FastEthernet interface Fa0/0.

    • B.

      Configure the clock rate of the FastEthernet interface Fa0/0

    • C.

      Use the no shutdown command on the FastEthernet interface Fa0/0.

    • D.

      Reboot the router.

    Correct Answer
    C. Use the no shutdown command on the FastEthernet interface Fa0/0.
    Explanation
    The correct answer is to use the "no shutdown" command on the FastEthernet interface Fa0/0. This command will enable the interface, allowing it to send and receive traffic. By default, interfaces on Cisco routers are in a shutdown state, so they need to be explicitly enabled using the "no shutdown" command. In this case, since the ping from RouterA to RouterB is unsuccessful, it indicates that the interface is likely in a shutdown state and needs to be brought up.

    Rate this question:

  • 16. 

    To send data through a network, what two flags are used to establish a session? (Choose two.)  

    • A.

      ACK

    • B.

      CRC

    • C.

      SYN

    • D.

      Ack#

    • E.

      Port#

    • F.

      Seq#

    Correct Answer(s)
    A. ACK
    C. SYN
    Explanation
    To establish a session and send data through a network, the two flags used are ACK and SYN. ACK stands for Acknowledgment and is used to confirm the receipt of data. SYN stands for Synchronize and is used to initiate a connection and synchronize sequence numbers between the sender and receiver. These two flags work together to establish a reliable and synchronized session for data transmission over the network.

    Rate this question:

  • 17. 

     Which statement is true about the TTL value of an IPv4 packet? 

    • A.

      It determines the priority of a packet.

    • B.

      It specifies the remaining “life” of the packet.

    • C.

      It indicates that the packet has been fragmented.

    • D.

      It denotes the data payload type that the packet is carrying.

    Correct Answer
    B. It specifies the remaining “life” of the packet.
    Explanation
    The TTL (Time to Live) value of an IPv4 packet specifies the remaining "life" of the packet. It is a field in the IP header that is decremented by each router the packet passes through. When the TTL value reaches 0, the packet is discarded. This mechanism prevents packets from circulating indefinitely in the network.

    Rate this question:

  • 18. 

    Refer to the exhibit. Communication for hosts X and Y is restricted to the local network. What is the reason for this?  

    • A.

      Host X is assigned a network address.

    • B.

      Host Y is assigned a multicast address.

    • C.

      Host X and host Y belong to different networks.

    • D.

      The gateway addresses are broadcast addresses.

    Correct Answer
    D. The gateway addresses are broadcast addresses.
    Explanation
    The reason for the communication restriction between hosts X and Y to the local network is that the gateway addresses are broadcast addresses. This means that the gateway is broadcasting the network packets to all devices on the local network, rather than forwarding them to a specific destination. As a result, communication is limited to the local network and cannot be extended to other networks.

    Rate this question:

  • 19. 

    What type of network is maintained if a server takes no dedicated role in the network? 

    • A.

      Mainframe

    • B.

      Client/server

    • C.

      Peer-to-peer

    • D.

      Centralized

    Correct Answer
    C. Peer-to-peer
    Explanation
    If a server takes no dedicated role in the network, it means that it does not have any specific function or authority over other devices. In a peer-to-peer network, all devices are considered equal and can act as both clients and servers. They can share resources and communicate directly with each other without the need for a central server. Therefore, the correct answer is peer-to-peer.

    Rate this question:

  • 20. 

    A routing issue has occurred in your internetwork. Which of the following type of devices should be examined to isolate this error?  

    • A.

      Access point

    • B.

      Host

    • C.

      Hub

    • D.

      Router

    • E.

      Switch

    Correct Answer
    D. Router
    Explanation
    To isolate a routing issue in an internetwork, the device that should be examined is a router. Routers are responsible for directing network traffic between different networks, making routing decisions based on network protocols and IP addresses. If there is a problem with routing, such as incorrect routing tables or misconfigured routing protocols, examining the router would be necessary to identify and resolve the issue.

    Rate this question:

  • 21. 

    Which physical component is used to access and perform the initial configuration on a new unconfigured router?  a

    • A.

      Picture 1

    • B.

      Picture 2

    • C.

      Picture 3

    • D.

      Picture 4

    • E.

      Picture 5

    Correct Answer
    B. Picture 2
  • 22. 

     A user sees the command prompt: Router(config-if)# . What task can be performed at this mode?  

    • A.

      Reload the device.

    • B.

      Perform basic tests.

    • C.

      Configure individual interfaces.

    • D.

      Configure individual terminal lines.

    Correct Answer
    C. Configure individual interfaces.
    Explanation
    At the "Router(config-if)#" mode, a user can configure individual interfaces. This mode allows the user to make specific configurations for a particular interface on the router, such as setting IP addresses, enabling protocols, or adjusting interface settings.

    Rate this question:

  • 23. 

    What is the correct order for PDU encapsulation?  

    • A.

      Frame Header, Network Header, Transport header, data, frame trailer

    • B.

      Network Header, Transport header,Frame Header,data, frame trailer

    • C.

      Transport header,Network Header,Frame Header,data, frame trailer

    • D.

      Transport header,Frame Header,Network Header,data, frame trailer

    Correct Answer
    A. Frame Header, Network Header, Transport header, data, frame trailer
    Explanation
    The correct order for PDU encapsulation is Frame Header, Network Header, Transport header, data, frame trailer. This order ensures that the frame header is placed first to provide information about the frame, followed by the network header which contains information about the network layer protocol. The transport header comes next, containing information about the transport layer protocol. The data is then encapsulated, and finally, the frame trailer is added to mark the end of the frame.

    Rate this question:

  • 24. 

     What information can be gathered by using the command netstat? 

    • A.

      The default gateway

    • B.

      The routing protocol

    • C.

      Active TCP connections

    • D.

      The locally configured subnet mask

    Correct Answer
    C. Active TCP connections
    Explanation
    The netstat command is used to display active TCP connections on a system. It provides information about the current connections established with other devices over the TCP/IP network. This includes details such as the local and remote IP addresses, port numbers, and the status of the connection. By using netstat, one can gather information about the active TCP connections on a system, helping in troubleshooting network issues or monitoring network activity.

    Rate this question:

  • 25. 

    How can ARP be used to help document the network? 

    • A.

      It can list each hop on the way to a destination host.

    • B.

      It can show the average latency of hosts on the network.

    • C.

      It can provide a list of physical addresses on the network.

    • D.

      It can indicate which hosts are not responding to network traffic.

    Correct Answer
    C. It can provide a list of pHysical addresses on the network.
    Explanation
    ARP (Address Resolution Protocol) can be used to help document the network by providing a list of physical addresses on the network. ARP is responsible for mapping an IP address to a physical MAC address. By using ARP, a device can determine the MAC address of another device on the network. This information can be helpful in documenting the network, as it allows for the identification and tracking of devices based on their physical addresses.

    Rate this question:

  • 26. 

    What is the protocol data unit that is associated with the data link layer of the OSI reference model? 

    • A.

      Data

    • B.

      Frame

    • C.

      Packet

    • D.

      Segment

    Correct Answer
    B. Frame
    Explanation
    The correct answer is "frame." In the OSI reference model, the data link layer is responsible for the reliable transfer of data between adjacent network nodes. A frame is the protocol data unit (PDU) used at this layer. It encapsulates the network layer packet and adds header and trailer information for synchronization, error detection, and flow control. Frames are used by protocols such as Ethernet to transmit data over a local area network.

    Rate this question:

  • 27. 

    Which application layer protocol allows administrators to log into a server from remote locations and control a server as though logged in locally? 

    • A.

      DNS

    • B.

      FTP

    • C.

      DHCP

    • D.

      SMTP

    • E.

      Telnet

    Correct Answer
    E. Telnet
    Explanation
    Telnet is the correct answer because it is an application layer protocol that enables administrators to remotely log into a server and control it as if they were locally logged in. Telnet allows for the establishment of a command-line interface session on a remote server, providing remote access and control over the server's resources and configurations.

    Rate this question:

  • 28. 

     Which statement identifies the DNS protocol?

    • A.

      It transmits information using TCP port 25.

    • B.

      It transfers and conveys information using HTML pages.

    • C.

      It matches a resource name with the required network address.

    • D.

      It requests and assigns an IP address, default gateway, and server addresses to hosts.

    Correct Answer
    C. It matches a resource name with the required network address.
    Explanation
    The correct answer is "It matches a resource name with the required network address." This statement accurately describes the DNS (Domain Name System) protocol. DNS is responsible for translating human-readable domain names (such as www.example.com) into the corresponding IP addresses that computers use to communicate on the internet. By matching a resource name (domain name) with the required network address (IP address), DNS enables users to access websites and other resources using familiar domain names instead of having to remember and enter IP addresses.

    Rate this question:

  • 29. 

    Which password would allow a user to establish a Telnet session with a Cisco device?  

    • A.

      VTY password

    • B.

      Enable password

    • C.

      Console password

    • D.

      Enable secret password

    Correct Answer
    A. VTY password
    Explanation
    A VTY password would allow a user to establish a Telnet session with a Cisco device. VTY (Virtual Terminal) lines are used to establish Telnet or SSH connections to a Cisco device. By setting a VTY password, the user will be prompted to enter this password when attempting to establish a Telnet session. The other options mentioned (enable password, console password, and enable secret password) are used for different purposes, such as accessing privileged EXEC mode, securing console access, and setting an encrypted password for privileged mode, respectively.

    Rate this question:

  • 30. 

    Which identifier is contained in the header of the Layer 2 Ethernet frame? 

    • A.

      Timing and synchronization of bits

    • B.

      Source and destination port numbers

    • C.

      Logical source and destination addresses

    • D.

      Physical source and destination addresses

    Correct Answer
    D. pHysical source and destination addresses
    Explanation
    The correct answer is physical source and destination addresses. In the header of the Layer 2 Ethernet frame, the physical source and destination addresses are contained. These addresses are used to identify the specific devices (MAC addresses) that are sending and receiving the frame. The physical addresses are crucial for the Ethernet switches to forward the frame to the correct destination device on the network.

    Rate this question:

  • 31. 

    What happens when a node on an Ethernet network is creating a frame and it does not have the destination MAC address? 

    • A.

      The node drops the frame.

    • B.

      The node sends out a Layer 3 broadcast message.

    • C.

      The node sends a message directly to the router for the address

    • D.

      The node sends out an ARP request with the destination IP address.

    Correct Answer
    D. The node sends out an ARP request with the destination IP address.
    Explanation
    When a node on an Ethernet network is creating a frame and it does not have the destination MAC address, it sends out an ARP request with the destination IP address. This is because the node needs to determine the MAC address of the destination device in order to properly send the frame. The ARP request is used to ask the network for the MAC address associated with the given IP address. Once the node receives the MAC address, it can then properly address the frame and send it to the correct destination.

    Rate this question:

  • 32. 

    An administrator makes changes to the default configuration of a router and saves them to NVRAM. After testing, it is discovered that the configurations did not have the desired effect and must be removed. What steps must be taken to remove the changes and return the router to the default configuration?  

    • A.

      Reboot the router.

    • B.

      Use no version of the commands that are issued.

    • C.

      Issue the erase startup-config command, and then reboot the router.

    • D.

      Issue the erase running-config command, and then reboot the router.

    Correct Answer
    C. Issue the erase startup-config command, and then reboot the router.
    Explanation
    To remove the changes and return the router to the default configuration, the administrator should issue the "erase startup-config" command. This command will delete the startup configuration file from NVRAM, which contains the saved changes. After executing this command, the router should be rebooted to apply the default configuration. The "erase running-config" command, on the other hand, only clears the current running configuration, which may not revert the router back to the default settings.

    Rate this question:

  • 33. 

    A network administrator is tasked with connecting two workgroups that are configured to use different subnets. Which device should be selected to allow connectivity between users on the two networks? 

    • A.

      Hub

    • B.

      Switch

    • C.

      Router

    • D.

      Wireless access point

    Correct Answer
    B. Switch
    Explanation
    A switch should be selected to allow connectivity between users on the two networks. A switch is a networking device that operates at the data link layer of the OSI model and can connect multiple devices together within a local area network (LAN). It uses MAC addresses to forward data packets to the appropriate destination. Unlike a hub, which simply broadcasts data to all connected devices, a switch can intelligently direct traffic only to the devices that need to receive it. A router, on the other hand, operates at the network layer and is used to connect different networks together. A wireless access point is used to provide wireless connectivity, but it does not directly connect different subnets.

    Rate this question:

  • 34. 

     Which two programs can be used to accomplish terminal emulation for configuring a router from the CLI through the console port? (Choose two.)  

    • A.

      HyperTerminal

    • B.

      Internet Explorer

    • C.

      Minicom

    • D.

      Secure Shell

    • E.

      Telnet

    Correct Answer(s)
    A. HyperTerminal
    C. Minicom
    Explanation
    HyperTerminal and Minicom can both be used to accomplish terminal emulation for configuring a router from the CLI through the console port. HyperTerminal is a program that comes pre-installed on Windows operating systems and allows users to connect to other devices using a serial connection. Minicom, on the other hand, is a terminal emulator program that is commonly used on Linux systems to connect to other devices through a serial port. Both programs provide a user interface that allows users to interact with the router's command-line interface (CLI) and configure it as needed.

    Rate this question:

  • 35. 

    Which statement accurately describes file sharing in a peer-to-peer network?  

    • A.

      A dedicated server is required.

    • B.

      Access control is decentralized.

    • C.

      Files are typically stored on the most powerful peer in the network.

    • D.

      Peers can either make requests, or respond to requests, but not both.

    Correct Answer
    B. Access control is decentralized.
    Explanation
    In a peer-to-peer network, access control is decentralized, meaning that there is no central authority controlling the access to shared files. Instead, each peer in the network has control over its own files and can choose which files to share and with whom. This allows for a more distributed and flexible system, where peers can directly communicate and share files with each other without relying on a dedicated server.

    Rate this question:

  • 36. 

    What are two primary responsibilities of the Ethernet MAC sublayer? (Choose two.)  

    • A.

      Frame delimiting

    • B.

      Data encapsulation

    • C.

      Logical addressing

    • D.

      Error detection

    • E.

      Accessing the media

    Correct Answer(s)
    B. Data encapsulation
    E. Accessing the media
    Explanation
    The Ethernet MAC sublayer has two primary responsibilities. The first responsibility is data encapsulation, which involves adding a header and trailer to the data received from the network layer. This encapsulated data is then ready to be transmitted over the network. The second responsibility is accessing the media, which involves determining when the network is available for transmission and sending the encapsulated data onto the network. These two responsibilities ensure that data is properly packaged and transmitted over the Ethernet network.

    Rate this question:

  • 37. 

     Which router configuration mode would an administrator use to configure the router for SSH or Telnet login access? 

    • A.

      Line

    • B.

      Router

    • C.

      Global

    • D.

      Interface

    • E.

      Privileged EXEC

    Correct Answer
    A. Line
    Explanation
    An administrator would use the "line" configuration mode to configure the router for SSH or Telnet login access. This mode allows the administrator to configure various settings related to line access, including authentication methods, login prompts, and timeout settings. By configuring the line settings, the administrator can enable SSH or Telnet access and define the necessary parameters for remote login.

    Rate this question:

  • 38. 

    Refer to the exhibit. Which device should be included in the network topology to provide Layer 2 connectivity for all LAN devices, provide multiple collision domains, and also provide a connection to the rest of the network?  

    • A.

      Server

    • B.

      Hub

    • C.

      Switch

    • D.

      PC

    Correct Answer
    C. Switch
    Explanation
    A switch should be included in the network topology to provide Layer 2 connectivity for all LAN devices, provide multiple collision domains, and also provide a connection to the rest of the network. A switch is designed to connect multiple devices within a local area network (LAN) and can efficiently manage network traffic by creating separate collision domains for each port. This allows for simultaneous communication between devices without collisions. Additionally, a switch can also connect to other network devices, such as routers or servers, to provide connectivity to the rest of the network.

    Rate this question:

  • 39. 

    Refer to the exhibit. A technician has been asked to test connectivity from PC1 to a remote network. Which action will indicate if there is remote connectivity?

    • A.

      Ping 172.16.4.1

    • B.

      Ping 192.168.3.1

    • C.

      Ping 192.168.3.2

    • D.

      Ping 192.168.3.254

    Correct Answer
    A. Ping 172.16.4.1
    Explanation
    To test remote connectivity from PC1 to a remote network, the technician should use the "ping 172.16.4.1" command. This command will send ICMP echo requests to the IP address 172.16.4.1 and wait for a response. If there is a response, it indicates that there is connectivity between PC1 and the remote network.

    Rate this question:

  • 40. 

    What purpose does a hostname serve on a router? 

    • A.

      Uniquely identifies a router on the internet

    • B.

      Used by routing protocols to identify peer routers

    • C.

      Provides device identification to users logging on remotely

    • D.

      Determines the hosts that are allowed to connect to the device

    Correct Answer
    C. Provides device identification to users logging on remotely
    Explanation
    A hostname on a router serves the purpose of providing device identification to users logging on remotely. This means that when users connect to the router remotely, they can identify the specific device they are connecting to by its hostname. This helps in distinguishing and managing multiple routers in a network, allowing users to access the intended router for remote management or configuration purposes.

    Rate this question:

  • 41. 

    Which prompt is associated with the privileged exec mode? 

    • A.

      R1>

    • B.

      R1#

    • C.

      R1(config)#

    • D.

      R1(config-router)#

    Correct Answer
    B. R1#
    Explanation
    The prompt "R1#" is associated with the privileged exec mode. This mode allows the user to access and configure the router's settings and perform administrative tasks. The "#" symbol indicates that the user has elevated privileges and can execute privileged commands. The other prompts mentioned (R1>, R1(config)#, R1(config-router)#) are associated with different modes of the router's command-line interface.

    Rate this question:

  • 42. 

     A technician wishes to connect two computers to move data from one to the other before reloading the operating system. The NICs on both PCs do not support autosensing feature. Which procedure will satisfy the requirement? 

    • A.

      Interconnect the two PCs with a rollover cable.

    • B.

      Interconnect the two PCs with two rollover cables and a hub.

    • C.

      Interconnect the two PCs with a crossover cable.

    • D.

      Interconnest the two PCs with two crossover cables and a hub.

    Correct Answer
    C. Interconnect the two PCs with a crossover cable.
    Explanation
    The technician should interconnect the two PCs with a crossover cable. A crossover cable is specifically designed to connect two devices of the same type, such as two computers, without the need for a hub or switch. In this case, since the NICs on both PCs do not support autosensing, a crossover cable is required to properly establish a network connection between the two computers and allow for data transfer. Using a rollover cable or a combination of rollover cables and a hub would not be appropriate in this scenario.

    Rate this question:

  • 43. 

    Refer to the exhibit. Interface Fa0/0 on router A is generating excessive broadcast traffic. Which LAN segments will affected by the excessive broadcasts?  

    • A.

      Only the 192.168.1.200/30 network will be affected.

    • B.

      Only the link between 192.168.1.201 and port Fa0/5 on SW1 will be affected.

    • C.

      Both the 192.168.1.200/30 and 192.168.1.204/30 networks will be affected.

    • D.

      Only the links between 192.168.1.201 and port Fa0/7 on SW2 will be affected.

    Correct Answer
    A. Only the 192.168.1.200/30 network will be affected.
    Explanation
    The correct answer is "Only the 192.168.1.200/30 network will be affected." This is because the excessive broadcast traffic is being generated by Interface Fa0/0 on router A. This interface is connected to the 192.168.1.200/30 network, so only this network will be affected by the excessive broadcasts. The other networks mentioned in the options are not directly connected to Interface Fa0/0 on router A, so they will not be affected.

    Rate this question:

  • 44. 

     Two routers are connected via their serial ports in a lab environment. The routers are configured with valid IP addresses, but they cannot ping each other. The show interface serial0/0 command shows that the serial0/0 interface is up but the line protocol is down. What could be the cause of this problem? 

    • A.

      The no shutdown command has not been applied to the interfaces.

    • B.

      The clock rate command has not been entered on the DCE interface.

    • C.

      The interface timers are not cleared.

    • D.

      The FastEthernet interface is emulating a serial interface by assigning it a timing signal.

    Correct Answer
    B. The clock rate command has not been entered on the DCE interface.
    Explanation
    The cause of the problem could be that the clock rate command has not been entered on the DCE interface. The clock rate command is used to set the clock rate for a serial interface in a lab environment. The DCE (Data Circuit-terminating Equipment) interface is responsible for providing clocking to the DTE (Data Terminal Equipment) interface. If the clock rate command is not entered on the DCE interface, the line protocol will remain down and the routers will not be able to communicate with each other.

    Rate this question:

  • 45. 

    Refer to the exhibit. Which layered network model is shown in the diagram? 

    • A.

      Cisco

    • B.

      IETF

    • C.

      OSI

    • D.

      TCP/IP

    Correct Answer
    D. TCP/IP
    Explanation
    The correct answer is TCP/IP. The exhibit shows a diagram of a layered network model, and based on the options given, TCP/IP is the most commonly used and widely adopted layered network model. It is used for communication between devices on the internet and is comprised of four layers: the Network Interface layer, Internet layer, Transport layer, and Application layer.

    Rate this question:

  • 46. 

    Refer to the exhibit. Host A is unable to reach host B on the remote network. A technician attempted to ping the local gateway and the ping was successful. To verify the host configuration, the technician issued the ipconfig command. What is the likely cause of the problem?  

    • A.

      The local NIC is incorrectly configured.

    • B.

      The subnet mask on host A is incorrectly configured.

    • C.

      The IP address on host A is incorrectly configured.

    • D.

      The default gateway on host A is incorrectly configured.

    Correct Answer
    D. The default gateway on host A is incorrectly configured.
    Explanation
    The likely cause of the problem is that the default gateway on host A is incorrectly configured. This means that host A does not know where to send packets that are destined for the remote network, resulting in the inability to reach host B. The successful ping to the local gateway indicates that the local network configuration is correct, ruling out the other options as the cause of the problem.

    Rate this question:

  • 47. 

    Which option shows how a router will route packets to a remote network?

    • A.

      Image 1

    • B.

      Image 2

    • C.

      Image 3

    • D.

      Image 4

    Correct Answer
    D. Image 4
  • 48. 

    An organization has been assigned network ID 10.10.128.0 and subnet mask 255.255.224.0. Which IP address range can be used for this organization? 

    • A.

      10.10.128.0 to 10.10.160.255

    • B.

      10.10.128.0 to 10.10.159.255

    • C.

      10.10.128.0 to 10.10.192.255

    • D.

      10.10.128.0 to 10.10.0.159

    • E.

      10.10.128.0 to 10.10.159.0

    Correct Answer
    B. 10.10.128.0 to 10.10.159.255
    Explanation
    The given organization has a network ID of 10.10.128.0 and a subnet mask of 255.255.224.0. This subnet mask allows for a total of 8192 IP addresses. The range of IP addresses that can be used by the organization would start from the network ID, which is 10.10.128.0, and go up to the last address in the range, which is 10.10.159.255. Therefore, the correct answer is 10.10.128.0 to 10.10.159.255.

    Rate this question:

  • 49. 

    A network administrator is configuring several switches for a network. The switches have similar configurations and only minor differences. The administrator wants to save all commands that are issued on the first switch to a text file for editing. Which transfer option should be selected in HyperTerminal? 

    • A.

      Capture text

    • B.

      Send Text file

    • C.

      Send file

    • D.

      Receive file

    Correct Answer
    A. Capture text
    Explanation
    The correct answer is "capture text". When the network administrator selects the "capture text" option in HyperTerminal, it will save all the commands that are issued on the first switch to a text file. This allows the administrator to easily access and edit the commands later on if needed.

    Rate this question:

  • 50. 

     Due to a security violation, the router passwords must be changed. What information can be learned from the following configuration entries? (Choose two.) Router(config)# line vty 0 3   Router(config-line)# password c13c0 Router(config-line)# login    

    • A.

      The entries specify three Telnet lines for remote access.

    • B.

      The entries specify four Telnet lines for remote access.

    • C.

      The entries set the console and Telnet password to “c13c0″.

    • D.

      Telnet access will be denied because the Telnet configuration is incomplete.

    • E.

      Access will be permitted for Telnet using “c13c0″ as the password.

    Correct Answer(s)
    B. The entries specify four Telnet lines for remote access.
    E. Access will be permitted for Telnet using “c13c0″ as the password.
    Explanation
    The given configuration entries specify four Telnet lines for remote access because the "line vty 0 3" command is used, which creates four virtual terminal lines. Additionally, access will be permitted for Telnet using the password "c13c0" because the "password c13c0" command sets the password for the virtual terminal lines.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 19, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Dec 28, 2012
    Quiz Created by
    Sumis34
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.