1.
Which of the following are the address ranges of the private IP addresses? (Choose three.)
A. 
10.0.0.0 to 10.255.255.255
B. 
200.100.50.0 to 200.100.25.255
C. 
150.150.0.0 to 150.150.255.255
D. 
172.16.0.0 to 172.31.255.255
E. 
192.168.0.0 to 192.168.255.255
F. 
127.16.0.0 to 127.31.255.255
2.
Which two functions of the OSI model occur at layer two? (Choose two.)
A. 
B. 
C. 
D. 
E. 
3.
Refer to the exhibit. What function does router RT_A need to provide to allow Internet access for hosts in this network?
A. 
B. 
C. 
D. 
4.
What is true regarding network layer addressing? (Choose three.)
A. 
B. 
C. 
D. 
Uniquely identifies each host
E. 
F. 
Contains a network portion
5.
Refer to the exhibit. Host A attempts to establish a TCP/IP session with host C. During this attempt, a frame was captured with the source MAC address 0050.7320.D632 and the destination MAC address 0030.8517.44C4. The packet inside the captured frame has an IP source address 192.168.7.5, and the destination IP address is 192.168.219.24. At which point in the network was this packet captured?
A. 
B. 
C. 
D. 
6.
Refer to the exhibit. Assume all devices are using default configurations. How many subnets are required to address the topology that is shown?
A. 
B. 
C. 
D. 
7.
A technician is asked to secure the privileged EXEC mode of a switch by requiring a password. Which type of password would require this login and be considered the most secure?
A. 
B. 
C. 
D. 
8.
Refer to the exhibit. A technician is working on a network problem that requires verification of the router LAN interface. What address should be pinged from this host to confirm that the router interface is operational?
A. 
B. 
C. 
D. 
E. 
9.
Which OSI layer does IP rely on to determine whether packets have been lost and to request retransmission?
A. 
B. 
C. 
D. 
10.
When connectionless protocols are implemented at the lower layers of the OSI model, what is usually used to acknowledge that the data was received and to request the retransmission of missing data?
A. 
B. 
C. 
D. 
A connectionless acknowledgement
E. 
An upper-layer, connection-oriented protocol or service
11.
Refer to the exhibit. Host C is able to ping 127.0.0.1 successfully, but is unable to communicate with hosts A and B in the organization. What is the likely cause of the problem?
A. 
Hosts A and B are not on the same subnet as host C.
B. 
The IP addresses on the router serial interfaces are wrong.
C. 
The subnet mask on host C is improperly configured.
D. 
The FastEthernet interface fa0/0 of router 1 is wrongly configured.
12.
Refer to the exhibit. Which list refers only to end devices?
A. 
B. 
C. 
D. 
13.
Refer to the exhibit. Host A sends a frame with the destination MAC address as FFFF.FFFF.FFFF. What action will the switch take for this frame?
A. 
B. 
It will send the frame back to host A.
C. 
It will send the frame to all hosts except host A.
D. 
It will forward the frame to the default gateway.
14.
Which subnet mask will allow 2040 hosts per subnet on the IP network 10.0.0.0?
A. 
B. 
C. 
D. 
E. 
F. 
15.
Refer to the exhibit. RouterB is configured properly. The Ethernet interface Fa0/0 of RouterA is configured with the use of the commands that are shown. However, a ping from the Fa0/0 interface of RouterA to the Fa0/0 interface of RouterB is unsuccessful. What action should be taken on RouterA to solve this problem?
A. 
Use the description command on the FastEthernet interface Fa0/0.
B. 
Configure the clock rate of the FastEthernet interface Fa0/0.
C. 
Use the no shutdown command on the FastEthernet interface Fa0/0.
D. 
16.
To send data through a network, what two flags are used to establish a session? (Choose two.)
A. 
B. 
C. 
D. 
E. 
F. 
17.
Which statement is true about the TTL value of an IPv4 packet?
A. 
It determines the priority of a packet.
B. 
It specifies the remaining “life” of the packet.
C. 
It indicates that the packet has been fragmented.
D. 
It denotes the data payload type that the packet is carrying.
18.
Refer to the exhibit. Communication for hosts X and Y is restricted to the local network. What is the reason for this?
A. 
Host X is assigned a network address.
B. 
Host Y is assigned a multicast address.
C. 
Host X and host Y belong to different networks.
D. 
The gateway addresses are broadcast addresses.
19.
What type of network is maintained if a server takes no dedicated role in the network?
A. 
B. 
C. 
D. 
20.
A routing issue has occurred in your internetwork. Which of the following type of devices should be examined to isolate this error?
A. 
B. 
C. 
D. 
E. 
21.
Which physical component is used to access and perform the initial configuration on a new unconfigured router?
A. 
B. 
C. 
D. 
E. 
22.
A user sees the command prompt: Router(config-if)# . What task can be performed at this mode?
A. 
B. 
C. 
Configure individual interfaces.
D. 
Configure individual terminal lines.
23.
What is the correct order for PDU encapsulation?
A. 
B. 
C. 
D. 
E. 
24.
What information can be gathered by using the command netstat?
A. 
B. 
C. 
D. 
The locally configured subnet mask
25.
How can ARP be used to help document the network?
A. 
It can list each hop on the way to a destination host.
B. 
It can show the average latency of hosts on the network.
C. 
It can provide a list of physical addresses on the network.
D. 
It can indicate which hosts are not responding to network traffic.