Escolar Documentos
Profissional Documentos
Cultura Documentos
Assessment System
T
1240235
o
p
Time Remaining:
o
f 00:20:41
F
o
r Bottom of Form
m
1 Top of Form
An administrator is in the middle of entering a lengthy command when suddenly output from the IOS appears stating that an interfac
has gone down and then up again. Consequently, the command that the administrator was typing is no longer legible on the termina
What CLI keystrokes can be entered to return to the line that the administrator was typing?
Ctrl-D
Ctrl-K
Ctrl-R
Ctrl-Z
Bottom of Form
2 Top of Form
A network technician has made a UTP cable that is terminated as T568A on one end and T568B on the opposite end. What type of
cable has been constructed?
patch
console
crossover
straight-through
Bottom of Form
3 Top of Form
Refer to the exhibit. Which two layers of the OSI model describe the same functions as the transport and internet layers of the TCP/
model? (Choose two.)
application layer
presentation layer
session layer
transport layer
network layer
physical layer
Bottom of Form
4 Top of Form
Which application layer protocol allows administrators to log into a server from remote locations and control a server as though logg
locally?
DNS
FTP
DHCP
SMTP
Telnet
Bottom of Form
5 Top of Form
Which option correctly identifies the interface or interfaces used to connect the router to a CSU/DSU for WAN connectivity?
Bottom of Form
6 Top of Form
Which answer lists the CLI mode hierarchy from least level of privilege to greatest?
Bottom of Form
7 Top of Form
What are three characteristics of CSMA/CD? (Choose three.)
A jam signal indicates that the collision has cleared and the media is not busy.
A device listens and waits until the media is not busy before transmitting.
The device with the electronic token is the only one that can transmit after a collision.
All of the devices on a segment see data that passes on the network medium.
After detecting a collision, hosts can attempt to resume transmission after a random time delay has expired.
Bottom of Form
8 Top of Form
Refer to the exhibit. Each media link is labeled. What type of cable should be used to connect the different devices?
Connection 1 - rollover cable
Connection 2 - straight-through cable
Connection 3 - crossover cable
Connection 1 - crossover cable
Connection 2 - rollover cable
Connection 3 - crossover cable
Connection 1 - straight-through cable
Connection 2 - crossover cable
Connection 3 - crossover cable
Connection 1 - straight-through cable
Connection 2 - crossover cable
Connection 3 - straight-through cable
Connection 1 - crossover cable
Connection 2 - straight-through cable
Connection 3 - crossover cable
Bottom of Form
9 Top of Form
Which OSI layer offers ordered data reconstruction services?
application layer
network layer
presentation layer
session layer
transport layer
Bottom of Form
10 Top of Form
What can the user do from the command prompt, Router(config-line)# ?
Bottom of Form
11 Top of Form
Refer to the exhibit. The router of the company failed and was replaced. After the replacement, hosts C and D in the Education offic
able to ping each other, but they are unable to access the hosts in the Accounts office. What is the likely cause of the problem?
The subnet mask at the fa0/1 interface of the router is incorrectly entered.
The hosts in the Accounts office are not on the same subnet as the hosts in the Education office.
Bottom of Form
12 Top of Form
Refer to the exhibit. Host A wants to connect to host B on a different network. Which three IP addresses can be assigned to host A
enable this connectivity? (Choose three.)
172.16.11.36
172.16.11.95
172.16.11.88
172.16.11.70
172.16.11.64
172.16.11.67
Bottom of Form
13 Top of Form
Refer to the exhibit. Which logical topology describes the exhibited network?
star
ring
point-to-point
multi-access
Bottom of Form
14 Top of Form
Refer to the exhibit. Assume all devices are using default configurations. How many subnets are required to address the topology th
shown?
Bottom of Form
15 Top of Form
A network administrator is asked to design a new addressing scheme for a corporate network. There are 60 users in the main office
users in the branch office, 28 users in manufacturing, 12 in the sales office, and 4 users in the research office. Which VLSM addres
scheme that uses the 192.168.88.0/24 network will fulfill the requirements while wasting the fewest addresses?
192.168.88.0/26 main
192.168.88.32/26 branch
192.168.88.64/26 manufacturing
192.168.88.96/27 sales
192.168.88.128/28 research
192.168.88.0/26 main
192.168.88.64/26 branch
192.168.88.128/27 manufacturing
192.168.88.160/28 sales
192.168.88.176/29 research
192.168.88.0/27 main
192.168.88.32/27 branch
192.168.88.64/28 manufacturing
192.168.88.80/29 sales
192.168.88.88/30 research
192.168.88.0/27 main
192.168.88.64/28 branch
192.168.88.80/28 manufacturing
192.168.88.96/29 sales
192.168.88.104/30 research
Bottom of Form
Top of Form
1
Showing 1 of 4 <Prev Next>
Page:
Bottom of Form
Close Window
All contents copyright 1992-2010 Cisco Systems, Inc. Privacy Statement and Trademarks.
Top of Form
1
Close Window
Assessment System
T
1047830
o
p
Time Remaining:
o
f 00:17:28
F
o
r Bottom of Form
m
16 Top of Form
Refer to the exhibit. An employee wants to access the organization intranet from home. Which intermediary device should be used
connect the organization intranet to the Internet to enable this access?
hub
switch
router
Bottom of Form
17 Top of Form
Refer to the exhibit. Host A sends a frame with the destination MAC address as FFFF.FFFF.FFFF. What action will the switch take
this frame?
Bottom of Form
18 Top of Form
How can ARP be used to help document the network?
Bottom of Form
19 Top of Form
A routing issue has occurred in your internetwork. Which of the following type of devices should be examined to isolate this error?
access point
host
hub
router
switch
Bottom of Form
20 Top of Form
client/server
wide area
dedicated server
peer-to-peer
Bottom of Form
21 Top of Form
Which physical component is used to access and perform the initial configuration on a new unconfigured router?
Bottom of Form
22 Top of Form
What happens when a host station receives a frame that contains its own MAC address in the destination field?
The host station will copy the information to its buffers and send it back out.
Bottom of Form
23 Top of Form
What is the Cisco IOS?
Bottom of Form
24 Top of Form
Which two types of media can provide bandwidth up to 1 Gb/s? (Choose two.)
10 BASE-T
100 BASE-T
100 BASE-FX
1000 BASE-TX
1000 BASE-SX
Bottom of Form
25 Top of Form
Refer to the exhibit. PC1 can ping all PCs on the LAN, but a ping to the Fa0/1 interface of router R1 fails. What could be the cause o
problem?
Bottom of Form
26 Top of Form
A network administrator is designing an IP address scheme for a site. To comply with company policy, the address scheme must
support up to 500 hosts and must be RFC 1918 compliant. Which IP address and prefix meets these requirements?
64.100.0.0/16
128.107.0.0/16
172.30.0.0/21
192.18.0.0/16
192.168.0.0/24
Bottom of Form
27 Top of Form
An administrator makes changes to the default configuration of a router and saves them to NVRAM. After testing, it is discovered th
the configurations did not have the desired effect and must be removed. What steps must be taken to remove the changes and retu
the router to the default configuration?
Issue the erase startup-config command, and then reboot the router.
Issue the erase running-config command, and then reboot the router.
Bottom of Form
28 Top of Form
Which physical connector type is used for a serial V.35 connection to the CSU/DSU?
Bottom of Form
29 Top of Form
Refer to the exhibit. The diagram represents the process of sending e-mail between clients. Which list correctly identifies the compo
or protocol used at each numbered stage of the diagram?
Bottom of Form
30 Top of Form
A network administrator subnets the network 192.168.1.0/24 into four subnets. Which option correctly addresses Router1 and host
into the second subnet created?
Bottom of Form
Top of Form
2
Showing 2 of 4 <Prev Next>
Page:
Bottom of Form
Close Window
All contents copyright 1992-2010 Cisco Systems, Inc. Privacy Statement and Trademarks.
Top of Form
2
Close Window
Assessment System
31 Top of Form
Refer to the exhibit. Which two facts can be determined about the topology? (Choose two.)
Bottom of Form
32 Top of Form
A network has grown too large for technicians to configure network addresses and hosts files for name resolution. Which two applic
layer services should be added to the server to allow these needs to be satisfied dynamically? (Choose two.)
DNS
FTP
DHCP
HTTP
SMTP
Bottom of Form
33 Top of Form
Refer to the exhibit. An administrator made several changes to the configuration of the router but did not accomplish the desired res
To undo the changes the reload command was used. What will happen if the administrator answers yes to the prompt?
The changes will be lost and the configuration file in RAM will be loaded.
The changes will be saved and the configuration file in RAM will be loaded.
The changes will be lost and the configuration file in NVRAM will be loaded.
The changes will be saved and the configuration file in NVRAM will be loaded.
Bottom of Form
34 Top of Form
Which password is automatically encrypted when it is created?
vty
aux
console
enable secret
enable password
Bottom of Form
35 Top of Form
Refer to the exhibit. A network administrator is troubleshooting a link that is down between Router1 and Router2. To correct the pro
which wire pairs need to be switched on one of the Ethernet cable ends?
Bottom of Form
36 Top of Form
A technician wishes to connect two computers to move data from one to the other before reloading the operating system. The NICs
both PCs do not support autosensing feature. Which procedure will satisfy the requirement?
Interconnect the two PCs with two rollover cables and a hub.
Interconnest the two PCs with two crossover cables and a hub.
Bottom of Form
37 Top of Form
Refer to the exhibit. Host A is able to access resources on the local LAN but is unable to access any resources on the Internet. Wha
the likely cause of this problem?
Bottom of Form
38 Top of Form
Refer to the exhibit. A technician is working on a network problem that requires verification of the router LAN interface. What addres
should be pinged from this host to confirm that the router interface is operational?
127.0.0.1
192.168.64.196
192.168.254.1
192.168.254.9
192.168.254.254
Bottom of Form
39 Top of Form
Which requirement would cause a network designer to use a router instead of a switch in a network design?
40 Top of Form
Refer to the exhibit. A host is connected to hub 1. Which combination of IP address, subnet mask, and default gateway can allow th
host to function in the network?
Bottom of Form
41 Top of Form
Refer to the exhibit. Which list refers only to end devices?
D,E,F,G
A,H,B,C
A,D,E,F
A,D,E,G
Bottom of Form
42 Top of Form
Which password would allow a user to establish a Telnet session with a Cisco device?
VTY password
enable password
console password
Bottom of Form
43 Top of Form
Which option shows how a router will route packets to a remote network?
Bottom of Form
44 Top of Form
Which identifier is contained in the header of the Layer 2 Ethernet frame?
Bottom of Form
45 Top of Form
Refer to the exhibit. The tracert command is initiated from PC1 to PC4. Which device will send a response to the initial tracert pack
from PC1?
Athens
Ankara
London
Paris
PC4
Bottom of Form
Top of Form
3
Showing 3 of 4 <Prev Next>
Page:
Bottom of Form
Close Window
All contents copyright 1992-2010 Cisco Systems, Inc. Privacy Statement and Trademarks.
Top of Form
3
Close Window
Assessment System
T
861879
o
p
Time Remaining:
o
f 00:14:22
F
o
r Bottom of Form
m
46 Top of Form
Which prompt is associated with the privileged exec mode?
R1>
R1#
R1(config)#
R1(config-router)#
Bottom of Form
47 Top of Form
Which location of router memory is cleared with the erase startup-config command?
flash
RAM
ROM
NVRAM
Bottom of Form
48 Top of Form
Refer to the exhibit. A network technician has made several changes to R1 since the configuration has last been saved. The modifie
configuration did not produce the desired changes. The technician wants to store a backup copy of the saved configuration on a TF
server before reloading. Which action will cause the unmodified data to be saved on the TFTP server?
Bottom of Form
49 Top of Form
Which TCP/IP model layer creates additional overhead on network resources due to acknowledgments, tracking, and retransmissio
data?
internet
transport
application
network access
Bottom of Form
50 Top of Form
Refer to the exhibit. From global configuration mode, an administrator is attempting to create a message-of-the-day banner by using
command banner motd V Authorized access only! Violators will be prosecuted! V When users log in using Telnet, the banner
not appear correctly. What is the problem?
Message-of-the-day banners will only appear when a user logs in through the console port.
Bottom of Form
51 Top of Form
Which of the following are the address ranges of the private IP addresses? (Choose three.)
10.0.0.0 to 10.255.255.255
200.100.50.0 to 200.100.25.255
150.150.0.0 to 150.150.255.255
172.16.0.0 to 172.31.255.255
192.168.0.0 to 192.168.255.255
127.16.0.0 to 127.31.255.255
Bottom of Form
52 Top of Form
Refer to the exhibit. Host A is accessing multiple servers. Which combination of port number and address will uniquely identify a
particular process running on a specific server?
Bottom of Form
Top of Form
4
Showing 4 of 4 <Prev Next>
Page:
Bottom of Form
Close Window
All contents copyright 1992-2010 Cisco Systems, Inc. Privacy Statement and Trademarks.
Top of Form
4
Bottom of Form
Bottom of Form
Bottom of Form
Bottom of Form