Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Sumis34
S
Sumis34
Community Contributor
Quizzes Created: 2 | Total Attempts: 692
| Attempts: 467 | Questions: 50
Please wait...
Question 1 / 50
0 %
0/100
Score 0/100
1. Refer to the exhibit. Which device should be included in the network topology to provide Layer 2 connectivity for all LAN devices, provide multiple collision domains, and also provide a connection to the rest of the network?  

Explanation

A switch should be included in the network topology to provide Layer 2 connectivity for all LAN devices, provide multiple collision domains, and also provide a connection to the rest of the network. A switch is designed to connect multiple devices within a local area network (LAN) and can efficiently manage network traffic by creating separate collision domains for each port. This allows for simultaneous communication between devices without collisions. Additionally, a switch can also connect to other network devices, such as routers or servers, to provide connectivity to the rest of the network.

Submit
Please wait...
About This Quiz
CISCO Exam Test Nr1 - Quiz

This CISCO exam test NR1 assesses knowledge on private IP ranges, OSI model functions, and network addressing. It evaluates skills in router functions and subnetting within a network, crucial for networking professionals.

Tell us your name to personalize your report, certificate & get on the leaderboard!
2. Refer to the exhibit. Which list refers only to end devices?  

Explanation

The list D,E,F,G refers only to end devices because they are the only options that do not include any intermediate devices such as routers or switches. End devices are the final destination or source of data in a network, and examples include computers, laptops, smartphones, and printers. In contrast, routers and switches are network infrastructure devices used to connect and direct traffic between different networks or devices. Therefore, the list D,E,F,G consists solely of end devices.

Submit
3. A network administrator is configuring several switches for a network. The switches have similar configurations and only minor differences. The administrator wants to save all commands that are issued on the first switch to a text file for editing. Which transfer option should be selected in HyperTerminal? 

Explanation

The correct answer is "capture text". When the network administrator selects the "capture text" option in HyperTerminal, it will save all the commands that are issued on the first switch to a text file. This allows the administrator to easily access and edit the commands later on if needed.

Submit
4.  Which OSI layer does IP rely on to determine whether packets have been lost and to request retransmission?  

Explanation

IP relies on the transport layer to determine whether packets have been lost and to request retransmission. The transport layer is responsible for breaking the data into smaller units called segments and adding sequence numbers to each segment. IP uses these sequence numbers to determine if any segments are missing and requests retransmission of those missing segments. The transport layer also handles error detection and correction, ensuring that the data is delivered accurately and in the correct order. Therefore, the correct answer is transport.

Submit
5. What type of network is maintained if a server takes no dedicated role in the network? 

Explanation

If a server takes no dedicated role in the network, it means that it does not have any specific function or authority over other devices. In a peer-to-peer network, all devices are considered equal and can act as both clients and servers. They can share resources and communicate directly with each other without the need for a central server. Therefore, the correct answer is peer-to-peer.

Submit
6. Which physical component is used to access and perform the initial configuration on a new unconfigured router?  a

Explanation

not-available-via-ai

Submit
7. Refer to the exhibit. A technician has been asked to test connectivity from PC1 to a remote network. Which action will indicate if there is remote connectivity?

Explanation

To test remote connectivity from PC1 to a remote network, the technician should use the "ping 172.16.4.1" command. This command will send ICMP echo requests to the IP address 172.16.4.1 and wait for a response. If there is a response, it indicates that there is connectivity between PC1 and the remote network.

Submit
8. Refer to the exhibit. Which layered network model is shown in the diagram? 

Explanation

The correct answer is TCP/IP. The exhibit shows a diagram of a layered network model, and based on the options given, TCP/IP is the most commonly used and widely adopted layered network model. It is used for communication between devices on the internet and is comprised of four layers: the Network Interface layer, Internet layer, Transport layer, and Application layer.

Submit
9. Refer to the exhibit. Communication for hosts X and Y is restricted to the local network. What is the reason for this?  

Explanation

The reason for the communication restriction between hosts X and Y to the local network is that the gateway addresses are broadcast addresses. This means that the gateway is broadcasting the network packets to all devices on the local network, rather than forwarding them to a specific destination. As a result, communication is limited to the local network and cannot be extended to other networks.

Submit
10. Which application layer protocol allows administrators to log into a server from remote locations and control a server as though logged in locally? 

Explanation

Telnet is the correct answer because it is an application layer protocol that enables administrators to remotely log into a server and control it as if they were locally logged in. Telnet allows for the establishment of a command-line interface session on a remote server, providing remote access and control over the server's resources and configurations.

Submit
11. Which option shows how a router will route packets to a remote network?

Explanation

not-available-via-ai

Submit
12. What is the correct order for PDU encapsulation?  

Explanation

The correct order for PDU encapsulation is Frame Header, Network Header, Transport header, data, frame trailer. This order ensures that the frame header is placed first to provide information about the frame, followed by the network header which contains information about the network layer protocol. The transport header comes next, containing information about the transport layer protocol. The data is then encapsulated, and finally, the frame trailer is added to mark the end of the frame.

Submit
13. Refer to the exhibit. Host A attempts to establish a TCP/IP session with host C. During this attempt, a frame was captured with the source MAC address 0050.7320.D632 and the destination MAC address 0030.8517.44C4. The packet inside the captured frame has an IP source address 192.168.7.5, and the destination IP address is 192.168.219.24. At which point in the network was this packet captured?    

Explanation

The packet was captured with the source MAC address 0050.7320.D632 and the destination MAC address 0030.8517.44C4. This indicates that the packet was captured while it was leaving Dallas, as the source MAC address belongs to a device in Dallas and the destination MAC address belongs to a device outside of Dallas.

Submit
14. A routing issue has occurred in your internetwork. Which of the following type of devices should be examined to isolate this error?  

Explanation

To isolate a routing issue in an internetwork, the device that should be examined is a router. Routers are responsible for directing network traffic between different networks, making routing decisions based on network protocols and IP addresses. If there is a problem with routing, such as incorrect routing tables or misconfigured routing protocols, examining the router would be necessary to identify and resolve the issue.

Submit
15. Which prompt is associated with the privileged exec mode? 

Explanation

The prompt "R1#" is associated with the privileged exec mode. This mode allows the user to access and configure the router's settings and perform administrative tasks. The "#" symbol indicates that the user has elevated privileges and can execute privileged commands. The other prompts mentioned (R1>, R1(config)#, R1(config-router)#) are associated with different modes of the router's command-line interface.

Submit
16. Refer to the exhibit. A technician is working on a network problem that requires verification of the router LAN interface. What address should be pinged from this host to confirm that the router interface is operational?  

Explanation

The address that should be pinged from this host to confirm that the router interface is operational is 192.168.254.1.

Submit
17. Refer to the exhibit. Host A sends a frame with the destination MAC address as FFFF.FFFF.FFFF. What action will the switch take for this frame?  

Explanation

When a frame with a destination MAC address of FFFF.FFFF.FFFF is received by a switch, it will be flooded out to all ports except the port from which it was received. This is because the FFFF.FFFF.FFFF MAC address is the broadcast address, and the switch will send the frame to all hosts on the network to ensure that it reaches its intended destination. Therefore, the switch will send the frame to all hosts except host A.

Submit
18. To send data through a network, what two flags are used to establish a session? (Choose two.)  

Explanation

To establish a session and send data through a network, the two flags used are ACK and SYN. ACK stands for Acknowledgment and is used to confirm the receipt of data. SYN stands for Synchronize and is used to initiate a connection and synchronize sequence numbers between the sender and receiver. These two flags work together to establish a reliable and synchronized session for data transmission over the network.

Submit
19. A technician is asked to secure the privileged EXEC mode of a switch by requiring a password. Which type of password would require this login and be considered the most secure?

Explanation

The most secure type of password that can be used to secure the privileged EXEC mode of a switch is the "enable secret" password. This password is encrypted and stored in the switch's configuration file, providing an extra layer of security compared to other types of passwords such as the console or enable passwords. By using the "enable secret" password, unauthorized users will not be able to easily view or access the password, making it the most secure option.

Submit
20.  A user sees the command prompt: Router(config-if)# . What task can be performed at this mode?  

Explanation

At the "Router(config-if)#" mode, a user can configure individual interfaces. This mode allows the user to make specific configurations for a particular interface on the router, such as setting IP addresses, enabling protocols, or adjusting interface settings.

Submit
21. Which identifier is contained in the header of the Layer 2 Ethernet frame? 

Explanation

The correct answer is physical source and destination addresses. In the header of the Layer 2 Ethernet frame, the physical source and destination addresses are contained. These addresses are used to identify the specific devices (MAC addresses) that are sending and receiving the frame. The physical addresses are crucial for the Ethernet switches to forward the frame to the correct destination device on the network.

Submit
22.  Which statement is true about the TTL value of an IPv4 packet? 

Explanation

The TTL (Time to Live) value of an IPv4 packet specifies the remaining "life" of the packet. It is a field in the IP header that is decremented by each router the packet passes through. When the TTL value reaches 0, the packet is discarded. This mechanism prevents packets from circulating indefinitely in the network.

Submit
23.  Refer to the exhibit. What function does router RT_A need to provide to allow Internet access for hosts in this network? 

Explanation

Router RT_A needs to provide address translation in order to allow Internet access for hosts in this network. Address translation, typically done through Network Address Translation (NAT), allows multiple devices in a private network to share a single public IP address for communication with the Internet. It translates the private IP addresses of the hosts in the network to the public IP address assigned to the router, allowing the hosts to communicate with external networks.

Submit
24.  Refer to the exhibit. Assume all devices are using default configurations. How many subnets are required to address the topology that is shown?  

Explanation

The given topology consists of three routers and three networks. Each router needs to be assigned a separate subnet, and each network also needs to be assigned a separate subnet. Therefore, a total of three subnets are required to address the topology.

Submit
25.   Refer to the exhibit. RouterB is configured properly. The Ethernet interface Fa0/0 of RouterA is configured with the use of the commands that are shown. However, a ping from the Fa0/0 interface of RouterA to the Fa0/0 interface of RouterB is unsuccessful. What action should be taken on RouterA to solve this problem? 

Explanation

The correct answer is to use the "no shutdown" command on the FastEthernet interface Fa0/0. This command will enable the interface, allowing it to send and receive traffic. By default, interfaces on Cisco routers are in a shutdown state, so they need to be explicitly enabled using the "no shutdown" command. In this case, since the ping from RouterA to RouterB is unsuccessful, it indicates that the interface is likely in a shutdown state and needs to be brought up.

Submit
26. Refer to the exhibit. Interface Fa0/0 on router A is generating excessive broadcast traffic. Which LAN segments will affected by the excessive broadcasts?  

Explanation

The correct answer is "Only the 192.168.1.200/30 network will be affected." This is because the excessive broadcast traffic is being generated by Interface Fa0/0 on router A. This interface is connected to the 192.168.1.200/30 network, so only this network will be affected by the excessive broadcasts. The other networks mentioned in the options are not directly connected to Interface Fa0/0 on router A, so they will not be affected.

Submit
27. What is the protocol data unit that is associated with the data link layer of the OSI reference model? 

Explanation

The correct answer is "frame." In the OSI reference model, the data link layer is responsible for the reliable transfer of data between adjacent network nodes. A frame is the protocol data unit (PDU) used at this layer. It encapsulates the network layer packet and adds header and trailer information for synchronization, error detection, and flow control. Frames are used by protocols such as Ethernet to transmit data over a local area network.

Submit
28. Refer to the exhibit. Host A is unable to reach host B on the remote network. A technician attempted to ping the local gateway and the ping was successful. To verify the host configuration, the technician issued the ipconfig command. What is the likely cause of the problem?  

Explanation

The likely cause of the problem is that the default gateway on host A is incorrectly configured. This means that host A does not know where to send packets that are destined for the remote network, resulting in the inability to reach host B. The successful ping to the local gateway indicates that the local network configuration is correct, ruling out the other options as the cause of the problem.

Submit
29. Which password would allow a user to establish a Telnet session with a Cisco device?  

Explanation

A VTY password would allow a user to establish a Telnet session with a Cisco device. VTY (Virtual Terminal) lines are used to establish Telnet or SSH connections to a Cisco device. By setting a VTY password, the user will be prompted to enter this password when attempting to establish a Telnet session. The other options mentioned (enable password, console password, and enable secret password) are used for different purposes, such as accessing privileged EXEC mode, securing console access, and setting an encrypted password for privileged mode, respectively.

Submit
30.  A technician wishes to connect two computers to move data from one to the other before reloading the operating system. The NICs on both PCs do not support autosensing feature. Which procedure will satisfy the requirement? 

Explanation

The technician should interconnect the two PCs with a crossover cable. A crossover cable is specifically designed to connect two devices of the same type, such as two computers, without the need for a hub or switch. In this case, since the NICs on both PCs do not support autosensing, a crossover cable is required to properly establish a network connection between the two computers and allow for data transfer. Using a rollover cable or a combination of rollover cables and a hub would not be appropriate in this scenario.

Submit
31. When connectionless protocols are implemented at the lower layers of the OSI model, what is usually used to acknowledge that the data was received and to request the retransmission of missing data?  

Explanation

When connectionless protocols are implemented at the lower layers of the OSI model, an upper-layer, connection-oriented protocol or service is usually used to acknowledge that the data was received and to request the retransmission of missing data. This is because connectionless protocols do not provide acknowledgment or retransmission mechanisms themselves, so a higher layer protocol or service is needed to handle these functions.

Submit
32. How can ARP be used to help document the network? 

Explanation

ARP (Address Resolution Protocol) can be used to help document the network by providing a list of physical addresses on the network. ARP is responsible for mapping an IP address to a physical MAC address. By using ARP, a device can determine the MAC address of another device on the network. This information can be helpful in documenting the network, as it allows for the identification and tracking of devices based on their physical addresses.

Submit
33. What happens when a node on an Ethernet network is creating a frame and it does not have the destination MAC address? 

Explanation

When a node on an Ethernet network is creating a frame and it does not have the destination MAC address, it sends out an ARP request with the destination IP address. This is because the node needs to determine the MAC address of the destination device in order to properly send the frame. The ARP request is used to ask the network for the MAC address associated with the given IP address. Once the node receives the MAC address, it can then properly address the frame and send it to the correct destination.

Submit
34.  What information can be gathered by using the command netstat? 

Explanation

The netstat command is used to display active TCP connections on a system. It provides information about the current connections established with other devices over the TCP/IP network. This includes details such as the local and remote IP addresses, port numbers, and the status of the connection. By using netstat, one can gather information about the active TCP connections on a system, helping in troubleshooting network issues or monitoring network activity.

Submit
35.  Which statement identifies the DNS protocol?

Explanation

The correct answer is "It matches a resource name with the required network address." This statement accurately describes the DNS (Domain Name System) protocol. DNS is responsible for translating human-readable domain names (such as www.example.com) into the corresponding IP addresses that computers use to communicate on the internet. By matching a resource name (domain name) with the required network address (IP address), DNS enables users to access websites and other resources using familiar domain names instead of having to remember and enter IP addresses.

Submit
36. An administrator makes changes to the default configuration of a router and saves them to NVRAM. After testing, it is discovered that the configurations did not have the desired effect and must be removed. What steps must be taken to remove the changes and return the router to the default configuration?  

Explanation

To remove the changes and return the router to the default configuration, the administrator should issue the "erase startup-config" command. This command will delete the startup configuration file from NVRAM, which contains the saved changes. After executing this command, the router should be rebooted to apply the default configuration. The "erase running-config" command, on the other hand, only clears the current running configuration, which may not revert the router back to the default settings.

Submit
37. Which two functions of the OSI model occur at layer two? (Choose two.) 

Explanation

The two functions of the OSI model that occur at layer two are physical addressing and media access control. Physical addressing involves assigning unique addresses to devices on a network, such as MAC addresses. Media access control, on the other hand, is responsible for managing the access to the physical medium, ensuring that devices can transmit and receive data without interference.

Submit
38.  Which two programs can be used to accomplish terminal emulation for configuring a router from the CLI through the console port? (Choose two.)  

Explanation

HyperTerminal and Minicom can both be used to accomplish terminal emulation for configuring a router from the CLI through the console port. HyperTerminal is a program that comes pre-installed on Windows operating systems and allows users to connect to other devices using a serial connection. Minicom, on the other hand, is a terminal emulator program that is commonly used on Linux systems to connect to other devices through a serial port. Both programs provide a user interface that allows users to interact with the router's command-line interface (CLI) and configure it as needed.

Submit
39. What is true regarding network layer addressing? (Choose three.)

Explanation

Network layer addressing is hierarchical, which means it is organized in a hierarchical structure with multiple levels such as network, subnetwork, and host. This allows for efficient routing and management of network resources. The addressing scheme also uniquely identifies each host on the network, ensuring that no two hosts have the same address. Additionally, network layer addressing contains a network portion, which helps in determining the network to which a host belongs and facilitates routing decisions.

Submit
40. Refer to the exhibit. Host C is able to ping 127.0.0.1 successfully, but is unable to communicate with hosts A and B in the organization. What is the likely cause of the problem?  

Explanation

The likely cause of the problem is that the subnet mask on host C is improperly configured. This means that host C is not able to correctly determine which network it belongs to and therefore cannot communicate with hosts A and B. The subnet mask is used to divide an IP address into network and host portions, and if it is configured incorrectly, it can lead to communication issues between devices on different subnets.

Submit
41.  Which subnet mask will allow 2040 hosts per subnet on the IP network 10.0.0.0?

Explanation

The subnet mask 255.255.248.0 will allow 2040 hosts per subnet on the IP network 10.0.0.0. This is because the subnet mask 255.255.248.0 provides a total of 11 bits for host addresses, which allows for 2048 possible host addresses (2^11 - 2). However, 2 addresses are reserved for network and broadcast addresses, leaving 2046 usable host addresses. Since 2046 is greater than 2040, this subnet mask will meet the requirement.

Submit
42.  Which of the following are the address ranges of the private IP addresses? (Choose three.)  

Explanation

The address ranges 10.0.0.0 to 10.255.255.255, 172.16.0.0 to 172.31.255.255, and 192.168.0.0 to 192.168.255.255 are the private IP address ranges. These ranges are reserved for use within private networks and are not routable on the internet. They are commonly used in home and small office networks for devices such as computers, printers, and routers.

Submit
43. Which statement accurately describes file sharing in a peer-to-peer network?  

Explanation

In a peer-to-peer network, access control is decentralized, meaning that there is no central authority controlling the access to shared files. Instead, each peer in the network has control over its own files and can choose which files to share and with whom. This allows for a more distributed and flexible system, where peers can directly communicate and share files with each other without relying on a dedicated server.

Submit
44.  Which router configuration mode would an administrator use to configure the router for SSH or Telnet login access? 

Explanation

An administrator would use the "line" configuration mode to configure the router for SSH or Telnet login access. This mode allows the administrator to configure various settings related to line access, including authentication methods, login prompts, and timeout settings. By configuring the line settings, the administrator can enable SSH or Telnet access and define the necessary parameters for remote login.

Submit
45. What purpose does a hostname serve on a router? 

Explanation

A hostname on a router serves the purpose of providing device identification to users logging on remotely. This means that when users connect to the router remotely, they can identify the specific device they are connecting to by its hostname. This helps in distinguishing and managing multiple routers in a network, allowing users to access the intended router for remote management or configuration purposes.

Submit
46. An organization has been assigned network ID 10.10.128.0 and subnet mask 255.255.224.0. Which IP address range can be used for this organization? 

Explanation

The given organization has a network ID of 10.10.128.0 and a subnet mask of 255.255.224.0. This subnet mask allows for a total of 8192 IP addresses. The range of IP addresses that can be used by the organization would start from the network ID, which is 10.10.128.0, and go up to the last address in the range, which is 10.10.159.255. Therefore, the correct answer is 10.10.128.0 to 10.10.159.255.

Submit
47.  Two routers are connected via their serial ports in a lab environment. The routers are configured with valid IP addresses, but they cannot ping each other. The show interface serial0/0 command shows that the serial0/0 interface is up but the line protocol is down. What could be the cause of this problem? 

Explanation

The cause of the problem could be that the clock rate command has not been entered on the DCE interface. The clock rate command is used to set the clock rate for a serial interface in a lab environment. The DCE (Data Circuit-terminating Equipment) interface is responsible for providing clocking to the DTE (Data Terminal Equipment) interface. If the clock rate command is not entered on the DCE interface, the line protocol will remain down and the routers will not be able to communicate with each other.

Submit
48. A network administrator is tasked with connecting two workgroups that are configured to use different subnets. Which device should be selected to allow connectivity between users on the two networks? 

Explanation

A switch should be selected to allow connectivity between users on the two networks. A switch is a networking device that operates at the data link layer of the OSI model and can connect multiple devices together within a local area network (LAN). It uses MAC addresses to forward data packets to the appropriate destination. Unlike a hub, which simply broadcasts data to all connected devices, a switch can intelligently direct traffic only to the devices that need to receive it. A router, on the other hand, operates at the network layer and is used to connect different networks together. A wireless access point is used to provide wireless connectivity, but it does not directly connect different subnets.

Submit
49. What are two primary responsibilities of the Ethernet MAC sublayer? (Choose two.)  

Explanation

The Ethernet MAC sublayer has two primary responsibilities. The first responsibility is data encapsulation, which involves adding a header and trailer to the data received from the network layer. This encapsulated data is then ready to be transmitted over the network. The second responsibility is accessing the media, which involves determining when the network is available for transmission and sending the encapsulated data onto the network. These two responsibilities ensure that data is properly packaged and transmitted over the Ethernet network.

Submit
50.  Due to a security violation, the router passwords must be changed. What information can be learned from the following configuration entries? (Choose two.) Router(config)# line vty 0 3   Router(config-line)# password c13c0 Router(config-line)# login    

Explanation

The given configuration entries specify four Telnet lines for remote access because the "line vty 0 3" command is used, which creates four virtual terminal lines. Additionally, access will be permitted for Telnet using the password "c13c0" because the "password c13c0" command sets the password for the virtual terminal lines.

Submit
View My Results

Quiz Review Timeline (Updated): Mar 19, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 19, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Dec 28, 2012
    Quiz Created by
    Sumis34
Cancel
  • All
    All (50)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
Refer to the exhibit. Which device should be included in the network...
Refer to the exhibit. Which list refers only to end devices?  
A network administrator is configuring several switches for a network....
 Which OSI layer does IP rely on to determine whether packets...
What type of network is maintained if a server takes no dedicated role...
Which physical component is used to access and perform the initial...
Refer to the exhibit. A technician has been asked to test connectivity...
Refer to the exhibit. Which layered network model is shown in the...
Refer to the exhibit. Communication for hosts X and Y is restricted to...
Which application layer protocol allows administrators to log into a...
Which option shows how a router will route packets to a remote...
What is the correct order for PDU encapsulation?  
Refer to the exhibit. Host A attempts to establish a TCP/IP session...
A routing issue has occurred in your internetwork. Which of the...
Which prompt is associated with the privileged exec mode? 
Refer to the exhibit. A technician is working on a network problem...
Refer to the exhibit. Host A sends a frame with the destination MAC...
To send data through a network, what two flags are used to establish a...
A technician is asked to secure the privileged EXEC mode of a switch...
 A user sees the command prompt: Router(config-if)# . What task...
Which identifier is contained in the header of the Layer 2 Ethernet...
 Which statement is true about the TTL value of an IPv4...
 Refer to the exhibit. What function does router RT_A need to...
 Refer to the exhibit. Assume all devices are using default...
 ...
Refer to the exhibit. Interface Fa0/0 on router A is generating...
What is the protocol data unit that is associated with the data link...
Refer to the exhibit. Host A is unable to reach host B on the remote...
Which password would allow a user to establish a Telnet session with a...
 A technician wishes to connect two computers to move data from...
When connectionless protocols are implemented at the lower layers of...
How can ARP be used to help document the network? 
What happens when a node on an Ethernet network is creating a frame...
 What information can be gathered by using the command...
 Which statement identifies the DNS protocol?
An administrator makes changes to the default configuration of a...
Which two functions of the OSI model occur at layer two? (Choose...
 Which two programs can be used to accomplish terminal emulation...
What is true regarding network layer addressing? (Choose three.)
Refer to the exhibit. Host C is able to ping 127.0.0.1 successfully,...
 Which subnet mask will allow 2040 hosts per subnet on the IP...
 Which of the following are the address ranges of the private IP...
Which statement accurately describes file sharing in a peer-to-peer...
 Which router configuration mode would an administrator use to...
What purpose does a hostname serve on a router? 
An organization has been assigned network ID 10.10.128.0 and subnet...
 Two routers are connected via their serial ports in a lab...
A network administrator is tasked with connecting two workgroups that...
What are two primary responsibilities of the Ethernet MAC sublayer?...
 Due to a security violation, the router passwords must be...
Alert!

Advertisement