Wednesday, February 11, 2009

CCNA 1 - Module 1 Exam

CCNA 1 - Module 1 Exam Result
1 Why were TCP/IP protocols developed ?
To insure that error correction of each packet takes place.
*To allow cooperating computers to share resources across a network.
To allocate resources that are needed for operating a computer on a LAN.
To determine the "best path" decision making when forwarding packets of data.
2 Which of the following are functions of a web browser without the addition of plug-ins? (Choose three.)
updates IRQ's
*receives information
*requests information
*contacts web servers
displays flash animation
displays Quicktime movies
3 What is the numeric base of hexadecimal numbers ?
Base 2
Base 8
Base 10
*Base 16
Base 32
4 In an 8 bit binary number, what is the total number of combinations of the eight bits?
128254255
*25651210245
5. Convert the decimal number 231 into its binary equivalent. Select the correct answer from the list below.
111100101101101111110110
*1110011111100101111011106
Convert the hexadecimal number CD into its base 10 equivalent. Select the correct answer from the list below.197199201203*2052077 Convert the hexadecimal number 19 into its base 10 equivalent. Select the correct answer from the list below.199152* 2536638
Which of the following are popular web browsers? (Choose two.)Acrobat*Internet ExplorerMacromedia Flash*Netscape NavigatorQuicktimeWorld Wide Web9 Which of the following are valid hexadecimal numbers? (Choose three.)* DEF31G45*1F35DH3F* 453X35F10 What are the requirements for an Internet connection? (Choose three.)remote host* physical connection* logical connectionlocal connection* application11 Which of the following interprets the data and displays the information in an understandable form for the user to see?*applicationprotocol stackremote deviceslogical connectionphysical connection12 Which of the following are considered to be "always on" services? (Choose two.)* DSLISDN56kbps* cable modem13 Which of the following will test the internal loopback of a node?ping 10.10.10.1ping 192.168.1.1* ping 127.0.0.1ping 223.223.223.223ping 255.255.255.25514 If you perform a Boolean AND on the IP address 172.16.20.23 using the subnet mask of 255.255.248.0, which of the following is the subnetwork address?172.16.0.0*172.16.16.0172.16.20.0172.16.20.16172.16.24.015 Which specialized equipment is used to make a physical connection from a PC to a network? (Choose two.)router*modemCD Rom* network interface card16 When purchasing a NIC for a computer, which of the following factors need to be considered? (Choose three.)*protocols*system busbrand of PCweb browser*type of media used on the network17 Which of the following describes a network interface card?large circuit board that contains sockets for expansion cardsinterface card capable of transferring more than one bit simultaneously and is used to connect external devices*interface card inserted into a computer so that the computer can be connected to a networkinterface card that can be used for parallel communication in which only 1 bit is transmitted at a time18 Which statements best describe a physical connection? (Choose two.)internet standard is TCP/IP*could utilize modem or NICinterprets data and displays information*used to transfer data between PC and local network19 Which device connects a computer with a telephone line by providing modulation and demodulation of incoming and outgoing data?NICCSU/DSUrouter* modemtelco switch20 Which phrases describe a byte? (Choose two.)a single binary digit*a grouping of eight binary digits+5 volts of electricity*a single addressable storage locationthe value range from 0 to 12721 Convert the Base 10 number 116 into its eight bit binary equivalent. Choose the correct answer from the following list:0111101001110010*01110100011101100111011101010110

CCNA 1 Module 10 Exam Result
CCNA 3.1
Semester 1
Module 10 Exam Result (stared are correct, use ctrl+F for fast search)
1 At which layer of the OSI model does the device reside that is functioning as the default gateway for hosts on a network?Layer 32 A company is planning to subnet its network for a maximum of 27 hosts. Which subnet mask would provide the needed hosts and leave the fewest unused addresses in each subnet?255.255.255.2243 Refer to the exhibit. A network administrator is planning the addressing scheme for the LAN using 172.25.14.0/26. The hosts are to be assigned addresses 172.25.14.1 – 172.25.14.25. The LAN interface of the router is to be configured using 172.25.14.63 as the IP address. What would describe this addressing scheme?The router LAN interface is being assigned a broadcast address.4 Refer to the exhibit. A student in the Cisco network class has designed a small office network to enable hosts to access the Internet. What recommendation should the teacher provide to the student in regards to the network design?Replace the Layer 2 switch with a router.5 Which type of routing allows routers to adapt to network changes?dynamic routing6 Refer to the exhibit. Host A pings host B. When R4 accepts the ping into the Ethernet interface, what two pieces of header information are included? (Choose two.)destination IP address: 192.168.10.134destination MAC address: 9999.DADC.12347 Given a host with the IP address 172.32.65.13 and a default subnet mask, to which network does the host belong?172.32.0.08 What header address information does a router change in the information it receives from an attached Ethernet interface before information is transmitted out another interface?the Layer 2 source and destination address9 Host A is connected to the LAN, but it cannot connect to the Internet. The host configuration is shown in the exhibit. What are the two problems with this configuration? (Choose two.)The host subnet mask is incorrect.The default gateway is on a different network than the host.10 Refer to the exhibit. The network administrator has assigned the internetwork of LBMISS an address range of 192.168.10.0. This address range has been subnetted using a /29 mask. In order to accommodate a new building, the technician has decided to use the fifth subnet for configuring the new network. By company policies, the router interface is always assigned the first usable host address and the workgroup server is given the last usable host address. Which configuration should be entered into the IP server properties to get connectivity to the network through the router?IP address: 192.168.10.38 Subnet mask: 255.255.255.248 Default gateway: 92.168.10.3311 How does a router decide where the contents of a received frame should be forwarded?by matching destination IP addresses with networks in the routing table12 Refer to the exhibit. A newly hired technician is testing the connectivity of all hosts by issuing a ping command. The technician notices that a default gateway is not configured on all the hosts, but all hosts have connectivity between hosts, a fact which seems to confuse the technician. How would you explain the connectivity to the technician?The hosts are all in one LAN, so default gateway information is not needed.13 What do switches and routers use to make forwarding decisions?Switches use MAC addresses. Routers use IP addresses.14 Refer to the exhibit. Host A is connected to the LAN, but it cannot get access to any resources on the Internet. The configuration of the host is shown in the exhibit. What could be the cause of the problem?The default gateway is on a different subnet from the host.15 How does subnetting provide some level of security in a network?The broadcasts are contained within a subnet.16 Refer to the exhibit. After host 2 is connected to the switch on the LAN, host 2 is unable to communicate with host 1. What is the cause of this problem?Host 1 and host 2 are on different networks.17 What is the purpose of a subnet mask in a network?A subnet mask is used to determine in which subnet an IP address belongs.18 Refer to the exhibit. A technician is planning an addressing scheme for a branch office as shown in the exhibit. What is the status of the intended network?The addresses on the router LAN interfaces are on the same subnetwork.19 What is the primary purpose of the routing process?to find paths from one network or subnet to another20 Which statements describe Layer 2 and Layer 3 packet address changes as the packet traverses from router to router? (Choose two.)Layer 3 source and destination addresses do not change when the packet traverse.Layer 2 frame header and trailer are removed and replaced at every Layer 3 device.21 Which type of routing uses manual entry of information and does not scale well in large internetworks?static22 Company XYZ uses a network address of 192.168.4.0. It uses the mask of 255.255.255.224 to create subnets. What is the maximum number of usable hosts in each subnet?3023 A company is using a Class B IP addressing scheme and expects to need as many as 100 networks. What is the correct subnet mask to use with the network configuration?255.255.254.024 Which device would add security to a network by not forwarding broadcasts?router25 An IP network address has been subnetted so that every subnetwork has 14 usable host IP addresses. What is the appropriate subnet mask for the newly created subnetworks?255.255.255.240
Diposkan oleh whandie di 19:05 0 komentar
Label: CCNA 1
CCNA 1 Final Exam Result
There is two Posseblelity of Final exam test, i got this hard way .... enjoy itCCNA 3.1 Semester 1 Final Exam Result Correct 100% (Option 1)1. Which devices will create multiple collision domains in an Ethernet network? (Choose two.)Switch router2. How many collision domains are shown in the diagram?Seven3. Refer to the exhibit. The physical documentation shows a portion of the internetwork of the ABC Company. Which segments will be free of collisions?segments 3, 4, and 54. Refer to the exhibit. Which diagram represents the network topology that an administrator would prefer, and why would the administrator prefer it?Diagram A. It will better provide available bandwidth to the hosts.5. After an unsuccessful ping to the local router, the technician decides to investigate the router. The technician observes that the lights and fan on the router are not operational. In which layer of the OSI model is the problem most likely occurring?Physical6. Refer to the exhibit. How many broadcast domains are shown?Three7. Refer to the exhibit. A network associate needs to establish an Ethernet connection between Host A and Host B. However, the distance between the two hosts is further than the cabling standards allow. Which two devices that operate at the physical layer of the OSI can be used to allow Host A and Host B to communicate? (Choose two.)hub repeater8. Refer to the exhibit. What must be configured on Host B to allow it to communicate with the file server? (Choose three.)a unique host IP address the subnet mask for the LANthe default gateway address9. Refer to the exhibit. Host A pings Host B. What can be concluded about the source and destination addresses contained in the communication sent by Router R5 when it forwards the ping out the Ethernet interface to Host B? (Choose two.)source MAC address: 5555.AAAA.6666 destination IP address: 192.168.10.13410. What is the correct number of usable subnetworks and hosts for the IP network address 192.168.35.0 subnetted with a /28 mask?14 networks / 14 hosts11. Refer to the exhibit. The network administrator wants to create a subnet for the point-to-point connection between the two routers. Which subnetwork mask would provide enough addresses for the point-to-point link with the least number of wasted addresses?255.255.255.25212. Refer to the exhibit. A network technician is trying to determine the correct IP address configuration for Host A. What is a valid configuration for Host A?IP address: 192.168.100.20; Subnet Mask: 255.255.255.240; Default Gateway: 192.168.100.1713. Two peer hosts are exchanging data using TFTP. During the current session, a datagram fails to arrive at the destination. Which statement is true regarding the retransmission of the datagram?Datagram retransmission is controlled by the application.14. Which protocols are TCP/IP application layer protocols? (Choose two.)TFTP DNS15. When using Category 5 UTP cable, which RJ-45 pin pairs are used to exchange data between hosts on an Ethernet network?1 and 2; 3 and 616. In the exhibit, the connections between the devices are labeled A, B, C, D, and E. For each connection, what is the correct UTP cable to use?A=rollover, B=straight, C=straight, D=crossover, E=crossover17. Which cable diagram displays the end to end pinout for a crossover cable used with Cisco devices?Cable C18. Which subnet masks could be used when subnetting a Class B IP address? (Choose two.)255.255.255.240 255.255.192.019. Which physical network topology is easy to monitor and troubleshoot, easy to add new devices to as the network expands, but subject to complete failure when a central hub or switch ceases to work?Star20. A computer technician is asked to make a network cable. One end of the cable is pinned as a 568A and the other as a 568B. For what purposes can this cable be used? (Choose two.)to connect a switch to a switch to connect a hub to a switch21. Refer to the exhibit. Workstation 1 pings the Fa0/1 interface of Router 1. Which MAC address will workstation 1 obtain during the ARP request for this communication?00-08-A3-B6-CE-0222. Refer to the exhibit. A network administrator has configured a network after subnetting the network number 192.168.0.0/28. Workstation 1 is not able to communicate with Workstation 2. What is the cause of this loss in communications?Workstation 1 is not on the same network that the Router 1 LAN interface is on.23. Which network device creates the highest amount of latency?Router24. An Ethernet host receives a frame, calculates the FCS, and compares the calculated FCS to the FCS received in the frame. The host finds that the two FCS values do not match. What action will be taken by the host?The host discards the frame.25. A user initiates three simultaneous FTP connections from the local host to the same FTP server. Which OSI layer is responsible for establishing and managing these different FTP connections?Session26. A network administrator has installed a 24 port switch and connected 10 computers with 10/100 NICs. If the NICs are operating at 100 Mbps, how much bandwidth is available for each computer to receive data?100 Mbps27. Based on the graphic above, which of the following occurs as each host system comes on line in the topology?The switch adds MAC address to the bridge table as each host sends a frame.28. Consider the networks shown in the exhibit. Host A is sending packets to host B. Which layer of the OSI model is being used when the router is making the calculated decision to determine which interface to send the packet out?Network29. Why would a company install a switch instead of a hub when building or expanding a corporate network?A switch provides more bandwidth by sending frames only out the port to which the destination device is attached. A hub sends the frame out all ports except the source port.30. Refer to the exhibit. The hub and the switch are operating using factory default settings. Which hosts will receive the frame if host A transmits a broadcast frame?Workstations B, C, D, E, and the router will receive the data.31. Refer to the exhibit. What kind of Ethernet cable is represented?straight-through cable32. The ping command can be used to test connectivity between hosts. Which OSI model layers are verified by this test?Layers 1, 2 and 333. A technician is testing connectivity between the devices using the ping command. Pings between Host B and Host A were successful. The technician could not ping the R3 address 172.16.3.2 from Host A. The technician issued ipconfig from Host A and saw the information displayed in the exhibit. What is the most likely problem?The default gateway of Host A is incorrect.34. Why do vendors utilize the OSI model when designing networking products?It ensures greater compatibility and interoperability with equipment from different vendors.35. A router determines the path to deliver a packet. What layer of the OSI model does this fact represent?Network36. How does a switch learn the addresses of hosts connected to its ports?The switch reads the source MAC address on incoming frames and records it in CAM.37. Refer to the exhibit. The connections in the exhibit are labeled A through E. Which of these indicate LAN links? (Choose two.)link A link E38. A large company has a network that is constantly changing. The routing tables in the routers need to be adjusted to reflect the changes in the routing paths. What type of routing would the network administrator implement?dynamic routing protocols39. A network administrator has added a new switch to the network. The new switch connects to an existing switch that is already installed. Which UTP cable correctly connects the new switch to the existing switch?crossover40. Refer to the exhibit. A newly hired technician has a task of terminating CAT 5 UTP cables. The network administrator visually examined the cables the technician terminated. Some of the cables have connectors as shown in the exhibit. What should the network administrator explain to the technician about the cables?The cable in Graphic A will produce more crosstalk.41. Refer to the exhibit. What is the order of the TCP/IP Protocol Data Units as data is moved as indicated through the OSI model?bits, frames, packets, segments, data42. Refer to the exhibit. Which type of UTP cable should be used to connect Host A to Switch1?straight-through43. Which technologies are considered to be LAN technologies? (Choose two.)Token Ring Ethernet44. Refer to the topology in the graphic. Which characteristic does this type of topology possess? Communication continues in the event of a break in any one connection.45. Which characteristics are common to both UDP and TCP? (Choose two.)uses port numbers classified as a transport layer protocol46. A router interface has been assigned an IP address of 172.16.192.166 with a mask of 255.255.255.248. To which subnet does the IP address belong?172.16.192.16047. Which type of address is 192.168.170.112/28?subnetwork address48. What is the decimal representation of the binary number 11111000?24849. What are important characteristics to consider when purchasing a network interface card? (Choose two.)media used on the network system bus used on the computer50. Which of the following statements are correct about CSMA/CD? (Choose three.)It is a media access method used in LANs.When a device needs to transmit, it checks to see if the media is available.Only one device can successfully transmit at a time.
Diposkan oleh whandie di 19:04 0 komentar
Label: CCNA 1
CCNA 1 Module 11 Exam Result
CCNA 3.1 Semester 1 Module 11 Exam Result (stared are correct, use ctrl+F for faster search)1 .Which port numbers are commonly assigned for FTP use? (Choose two.)19* 20* 21222 Which application layer protocol allows network devices to exchange management information?SMTP* SNMPFTPTFTPEIGRP3 FTP provides a reliable, connection-oriented service for transferring of files. Which transport layer protocol is used for data transfer when this service is being used?TFTP* TCPDNSIPUDP4 TCP is referred to as connection-oriented. What does this mean?TCP uses only LAN connections.TCP requires devices to be directly connected.* TCP negotiates a session for data transfer between hosts.TCP reassembles the data steams in the order that it is received.5 What three pieces of information does the transport layer use to manage the communication of separate data streams between hosts? (Choose three.)* port numberschecksum valuesauthentication keys* sequence numbersencryption algorithms* acknowledgment numbers6 What does the http portion of the URL http://www.cisco.com/edu/ communicate to a web browser?The web browser needs to locate the www server.The address is located on a site whose name is http.* The web browser is notified as to which protocol to use.The http portion represents the type of web browser that needs to be used.7 When the receiving workstation detects an error in the data it has received, it does not acknowledge receipt of the data. The source workstation retransmits the unacknowledged data. Which layer of the OSI model supports this process of retransmission?networkapplicationsession* transport8 What are the features of the User Datagram Protocol (UDP). (Choose three.)* no guaranteed delivery of datagramsconnection-orientedprovides reliable full-duplex data transmission*reliability provided by the application layer* connectionlessutilizes sliding windowing techniques9 Which Application layer protocol is widely used to support resolving host names to IP addresses?FTPSMTPSNMP* DNSHTTPWWW10 What is the purpose of TCP/UDP port numbers?indicate the beginning of a three-way handshakereassemble the segments into the correct orderidentify the number of data packets that may be sent without acknowledgment* track different conversations crossing the network at the same time11 If an application uses a protocol that exchanges data without using windowing or flow control and must rely on higher layer protocols for reliability, which protocol and transfer methods are being used?UDP, connection-oriented* UDP, connectionlessTCP, connection-orientedTCP, connectionless12 Which protocol is used to transfer files from computer to computer but is considered connectionless?FTP* TFTPSNMPTCPDHCP13 Which layer of the OSI model can provide a connection-oriented, reliable data transfer between two hosts?ApplicationPresentationSession* Transport14 Which of the following are primary duties of the OSI transport layer? (Choose two.)path determination* end-to-end connectivity* flow controlsecurity controldata representationencryption of data15 Which protocol is used by e-mail servers to communicate with each other?FTPHTTPTFTP* SMTPPOPSNMP
Diposkan oleh whandie di 19:04 0 komentar
Label: CCNA 1
CCNA 1 Module 9/10 Exam Result
CISCO CCNA 3.1 Semester 1 Module 9/10 Exam ResultENGLISH [25 questions]correct answers are marked with *1 What is the primary responsibility of the transport layer?allows access to the network mediaprovides data representation and encodingselects paths through the network for data to travel* defines end-to-end connectivity between host applications2 Why is IP considered a best-effort protocol?IP detects lost packets.IP validates the content of the packets.* IP does not provide acknowledgment of the data delivery.IP reorders the packet as they arrive at the destination host.3 Which two statements correctly describe the IP address 127.0.0.1? (Choose two.)* It belongs to the Class A range of addresses.It belongs to the Class B range of addresses.It belongs to the Class C range of addresses.* It is reserved for loopback testing. It is reserved for multicast group testing.It is reserved for unicast testing.4 [some graphics here: a white rectangle with some console dump]Refer to the exhibit. Which two statements are correct in reference to the output shown? (Choose two.)The LAN segment is subnetted to allow 254 subnets.The DNS server for this host is on the same subnet as the host.The host automatically obtained the IP addresses 192.168.1.100.* The host received the IP address from the router on the local LAN segment.* The host is assigned an address of 00-50-8D-F1-EA-8D by the administrator.5 Which three addresses are considered to be private addresses? (Choose three.)* 10.45.09.2315.87.234.87172.32.45.90* 172.17.78.98192.169.89.56* 192.168.45.236 What is the purpose of a DHCP server on a network?to resolve MAC addresses to IP addressesto resolve IP addresses to MAC addressesto resolve host names to IP addresses* to assign IP addresses dynamically to hoststo assign a MAC address to a host7 Refer to the exhibit. The small office LAN shown in the exhibit may eventually be connected to the Internet. According to Cisco best practice, which IP network addresses should be used?12.0.0.0172.0.0.0172.168.0.0192.32.17.0* 192.168.67.0225.1.5.08 Refer to the exhibit. Which devices are recommended to have the IP addresses manually configured?PC1 and PC2* all serversonly PC2 Laptopall hosts and all servers9 Refer to the exhibit. Based on the information shown, which two statements are true? (Choose two.)An ARP request must be used to obtain an address that is placed in the ARP table.Frames from other hosts in the network to this host will use a destination address of 00-06-25-25-6e-5d.The only remote locations that can be reached from this host are 192.168.1.97 and 192.168.1.254.* If a packet is sent to a network device other than 192.168.1.97 and 192.168.1.254, an ARP request must be used.* If the computer with the IP address of 192.168.1.94 sends a packet to the device with the IP address 192.168.1.97, no ARP request is required.10 Which TCP/IP model layer supports both LAN and WAN technologies?* network access layerinternet layertransport layerapplication layer11 Which subnet mask would be assigned to the network address of 192.168.32.0 to provide 254 useable host addresses per subnetwork?255.255.0.0* 255.255.255.0255.255.254.0255.255.248.012 Refer to the exhibit. Host A pings host B. When R4 accepts the ping into the Ethernet interface, what two pieces of header information are included? (Choose two.)source IP address: 192.168.10.129source IP address: BBBB.3333.5677source MAC address: 5555.AAAA.6666destination IP address: 192.168.10.33* destination IP address: 192.168.10.134* destination MAC address: 9999.DADC.123413 What header address information does a router change in the information it receives from an attached Ethernet interface before information is transmitted out another interface?only the Layer 2 source addressonly the Layer 2 destination addressonly the Layer 3 source addressonly the Layer 3 destination address* the Layer 2 source and destination addressthe Layer 3 source and destination address14 Host A is connected to the LAN, but it cannot connect to the Internet. The host configuration is shown in the exhibit. What are the two problems with this configuration? (Choose two.)* The host subnet mask is incorrect.The host is not configured for subnetting.The default gateway is a network address.* The default gateway is on a different network than the host.The host IP address is on a different network from the Serial interface of the router.15 An IP network address has been subnetted so that every subnetwork has 14 usable host IP addresses. What is the appropriate subnet mask for the newly created subnetworks?255.255.255.128255.255.255.224* 255.255.255.240255.255.255.248255.255.255.25216 A company is using a Class B IP addressing scheme and expects to need as many as 100 networks. What is the correct subnet mask to use with the network configuration?255.255.0.0255.255.240.0* 255.255.254.0255.255.255.0255.255.255.128255.255.255.19217 Refer to the exhibit. The network administrator has assigned the internetwork of LBMISS an address range of 192.168.10.0. This address range has been subnetted using a /29 mask. In order to accommodate a new building, the technician has decided to use the fifth subnet for configuring the new network. By company policies, the router interface is always assigned the first usable host address and the workgroup server is given the last usable host address. Which configuration should be entered into the IP server properties to get connectivity to the network through the router?IP address: 192.168.10.38 Subnet mask: 255.255.255.240 Default gateway: 192.168.10.39IP address: 192.168.10.38 Subnet mask: 255.255.255.240 Default gateway: 192.168.10.33* IP address: 192.168.10.38 Subnet mask: 255.255.255.248 Default gateway: 192.168.10.33IP address: 192.168.10.39 Subnet mask: 255.255.255.248 Default gateway: 192.168.10.31IP address: 192.168.10.254 Subnet mask: 255.255.255.0 Default gateway: 192.168.10.118 Refer to the exhibit. A technician is planning an addressing scheme for a branch office as shown in the exhibit. What is the status of the intended network?The configuration will work as planned.The subnetwork mask of host A is incorrect.The default gateway of host A is a network address.* The addresses on the router LAN interfaces are on the same subnetwork.The IP address of host A is on a different subnetwork than the subnetwork that the Ethernet router interface is on.19 Refer to the exhibit. After host 2 is connected to the switch on the LAN, host 2 is unable to communicate with host 1. What is the cause of this problem?The subnet mask of host 2 is incorrect.* Host 1 and host 2 are on different networks.The switch needs an IP address that is not configured.The router LAN interface and host 1 are on different networks.The IP address of host 1 is on a different network than is the LAN interface of the router.20 Refer to the exhibit. A network administrator is planning the addressing scheme for the LAN using 172.25.14.0/26. The hosts are to be assigned addresses 172.25.14.1 – 172.25.14.25. The LAN interface of the router is to be configured using 172.25.14.63 as the IP address. What would describe this addressing scheme?The LAN is being addressed properly.The subnet that is being assigned is not a usable subnet address.* The router LAN interface is being assigned a broadcast address.The subnet mask does not allow enough host addresses in a single subnet.21 Which type of routing allows routers to adapt to network changes?static routes* dynamic routingonly default routesNo routing is necessary.22 How does a router decide where the contents of a received frame should be forwarded?* by matching destination IP addresses with networks in the routing tableby matching the destination IP address with IP addresses listed in the ARP tableby matching the destination MAC address with MAC addresses listed in the CAM tableby forwarding the frame to all interfaces except the interface on which the frame was received23 What do switches and routers use to make forwarding decisions?Switches and routers both use IP addresses.Switches and routers use both MAC and IP addresses.Switches use IP addresses. Routers use MAC addresses.* Switches use MAC addresses. Routers use IP addresses.Switches use MAC and IP addresses. Routers use IP addresses.24 Refer to the exhibit. A newly hired technician is testing the connectivity of all hosts by issuing a ping command. The technician notices that a default gateway is not configured on all the hosts, but all hosts have connectivity between hosts, a fact which seems to confuse the technician. How would you explain the connectivity to the technician?The hosts are detecting the default gateway configured on the hub.* The hosts are all in one LAN, so default gateway information is not needed.The hosts in the network only require that one host has a gateway configured.The hosts in the network would only need a gateway if a switch replaces the hub.The hosts are using broadcast to reach each other since no gateway is configured.25 Given a host with the IP address 172.32.65.13 and a default subnet mask, to which network does the host belong?172.32.65.0172.32.65.32* 172.32.0.0172.32.32.0
Diposkan oleh whandie di 19:03 0 komentar
Label: CCNA 1
CCNA 1 Module 8 Exam Result
CCNA 3.1 Semester 1 Module 8 Exam Result met 87.6% (use ctrl+f for faster search)1. What is characteristic of the operation of a Layer 2 switch?*uses the destination MAC address to determine the specific interface to forward a frame2 Two newly hired technicians are discussing the implementation of a new LAN. One technician proposes installing a hub. The other technician advises installing a switch. Which statements are true about the differences between a hub and a switch? (Choose two.)*A switch provides more throughput to hosts on a LAN*A switch provides a collision-free environment on a LAN.3. Refer to the exhibit. Forty-eight workstations are connected to a hub. The users are able to connect to the network, but access is very slow. An entry-level technician replaces the 10 Mbps hub with 100 Mbps hub but the problem still exists. What is the most economical way to correct the problem?*Replace the hub with a switch.4. Exhibited is a portion of ABC Company internetwork. Which of the connections can be full duplex?*segments 2, 3, and 45 Refer to the exhibit. The switch and the hub have default configurations, and the switch has built its CAM table. Which of the hosts will receive the data when workstation A sends a unicast packet to workstation C?*workstation C6 An administrator would like to connect ten workstations on a 192.168.0.0/24 network. The device selected by the administrator must allow connectivity between hosts without sharing bandwidth. Which device would be appropriate?*switch7 Which networking devices use the MAC address to make forwarding decisions? (Choose two.)*bridge*switch8 Which devices are primarily used to extend cable segments within a collision domain by regenerating the data signals? (Choose two.)*repeater*hub 9 Which devices will create multiple collision domains in an Ethernet network? (Choose two.)*switch*router10 Refer to the exhibit. How many broadcast domains exist in classroom 240?*1 11 A PC receives a frame. Which situation will cause the NIC on the receiving host to pass the frame contents up the OSI layers to be processed by the PC?*The destination MAC address of the frame is FFFF.FFFF.FFFF.12 A network administrator has a multi-floor LAN to monitor and maintain. Through careful monitoring, the administrator has noticed a large amount of broadcast traffic slowing the network. Which device would you use to best solve this problem?*router13 What will a bridge do if it receives a frame with a MAC address that is not within the table?*send frame to all ports except source port14 Which networking device reduces the size of both collision domains and broadcast domains?*router15 What is used to prevent Layer 2 switching loops?*Spanning-Tree Protocol
Diposkan oleh whandie di 19:02 0 komentar
Label: CCNA 1
CCNA 1 Module 6 Exam Result
CCNA 3.1 Semester 1 Module 6 Exam Result met 100 % (use ctrl+F for faster search)1 Refer to the exhibit. Host A is communicating with host F. What happens to a frame sent from host A to host F as it travels over the Ethernet segments?*The frame format remains the same across each Ethernet segment. 2 How many hexadecimal digits are in a MAC address?*12 3 What are three functions of a NIC in a PC? (Choose three.)*A NIC connects the PC to the network media.*A NIC detects collisions on the Ethernet segment.*A NIC passes the contents of selected frames to the upper OSI layers.4 At what layer of the OSI model does a MAC address reside?*25 A router has an Ethernet, Token Ring, serial, and ISDN interface. Which interfaces will have a MAC address?*Ethernet and Token Ring interfaces 6 In an Ethernet LAN, how does the NIC know when it can transmit data?*An Ethernet NIC transmits data after listening for the absence of a signal on the media.7 Which characteristics describe carrier sense multiple access collision detect (CSMA/CD)? (Choose three.)*nondeterministic*collision environment*first-come, first-served approach8 Which two devices can provide full-duplex Ethernet connections? (Choose two.)*NIC*Layer 2 switch9 On a local area network, one workstation can send data on the line while it is receiving data. What type of data transfer does this describe?*full duplex10 Refer to the exhibit. The small office network shown in the exhibit consists of four computers connected through a hub. Which configuration would cause collisions and errors on the network? *administratively configured full duplex11 Refer to the exhibit. The switch and workstation are administratively configured for full-duplex operation. Which statement accurately reflects the operation of this link?*No collisions will occur on this link.12. Refer to the exhibit. All hosts are in listen mode. Host 1 and Host 4 both transmit data at the same time. How do the hosts respond on the network? (Choose two.)*After the end of the jam signal, Hosts 1, 2, 3, and 4 invoke a backoff algorithm.*If a host has data to transmit after the backoff period of that host, the host checks to determine if the line is idle, before transmitting.13. When a collision occurs in a network using CSMA/CD, how do hosts with data to transmit respond after the backoff period has expired?*The hosts return to a listen-before-transmit mode.14 Which statement describes how CSMA/CD on an Ethernet segment manages the retransmission of frames after a collision occurs?*The devices transmitting when the collision occurs DO NOT have priority for retransmission.15 Refer to the exhibit. A technician wants to increase the available bandwidth for the workstation by allowing the switch and the NIC on the workstation to transmit and receive simultaneously. What will permit this?*full-duplex16 Why do hosts on an Ethernet segment that experience a collision use a random delay before attempting to transmit a frame?*A random delay helps prevent the stations from experiencing another collision during the transmission.17 In which two layers of the OSI model does Ethernet function? (Choose two.)*data link*physical18 Which of the following are specified by IEEE standards as sublayers of the OSI data link layer? (Choose two.)*Logical Link Control*Media Access Control19 Where does the MAC address originate?*burned into ROM on the NIC card
Diposkan oleh whandie di 19:01 0 komentar
Label: CCNA 1
CCNA 1 Module 7 Exam Result
CCNA 3.1 Semester 1 Module 7 Exam Result met 100% (use ctrl+f for faster search)1 Which Ethernet standard does the IEEE 802.3 standard recommend for backbone installations?*1000BASE-LX2 Which statements describe Gigabit Ethernet technology? (Choose two.)*typically used for backbone cabling*can be implemented over copper and fiber3 Which of the following are Fast Ethernet technologies? (Choose two.)*100BASE-FX*100BASE-TX4 To make sure timing limitations are not violated when implementing a 10 Mbps Ethernet network involving hubs or repeaters, a technician should adhere to which rule?*the 5-4-3 rule5 At which OSI layer do the differences between standard Ethernet, Fast Ethernet and Gigabit Ethernet occur?*physical layer6 How does 1000BASE-T use the UTP wire pairs to accomplish transmission?*all four pairs are used in parallel by both hosts to transmit and receive simultaneously7 What RJ-45 pins are unused when transmitting and receiving data in an Ethernet 100BASE-T Category 5 UTP cable? (Choose two.)*4 and 5*7 and 88 What is the maximum distance that 10BASE-T will transmit data before signal attenuation affects the data delivery?*100 meters9 Which media types can be used in an implementation of a 10BASE-T network? (Choose three.)*Category 5 UTP*Category 5e UTP*Category 3 UTP10 Which of the following Ethernet technologies are considered legacy Ethernet? (Choose three.) *10BASE2*10BASE5*10BASE-T
Diposkan oleh whandie di 19:01 0 komentar
Label: CCNA 1
CCNA 1 Module 5 Exam Result
CCNA 3.1 Semester 1 Module 5 Exam Result 100 % (use ctrl+F for faster search)1 Refer to the exhibit. What is the appropriate cable to use at each of the numbered network connections?1-crossover; 2-straight-through; 3-crossover; 4-straight-through1-straight-through; 2-crossover; 3-straight-through; 4-straight-through1-straight-through; 2-crossover; 3-crossover; 4-straight-through*1-rollover; 2-crossover; 3-straight-through; 4-straight-through1-rollover; 2-straight-through; 3-straight-through; 4-straight-through2 Which two devices are considered OSI Layer 1 devices? (Choose two.)*hubsroutersbridgesswitches*repeaters3 What device is used to connect hosts to an Ethernet LAN and requires a straight-through UTP cable between the hosts and this device?NICrouter*switchserver4 What is the most common type of cabling used in LANs?STP*UTPcoaxfiber5 In which situations would a crossover cable be used to connect devices in a network? (Choose two.)switch to PC*switch to hubswitch to routerswitch to server*switch to switch6 Refer to the exhibit. How many collision domains exist in the network?1*24787 What type of cable would be used to make the connection between the console port of a router and a workstation?crossover*rolloverstraight-throughpatch8 Which function is a unique responsibility of the DCE devices shown in the exhibit?transmission of datareception of data*clocking for the synchronous linknoise cancellation in transmitted data9 Which address does a bridge use to make filtering and switching decisions?source MACsource IP*destination MACdestination IPnetwork IP address10 What is characteristic of the operation of a hub?selectively drops packets that represent potential security risks*forwards a frame out all interfaces except the inbound interfacebased on IP address, dynamically learns the interfaces to which all devices are attachedupon power on, queries the devices on all interface to learn the MAC addresses of the attached devicestransmits a frame to the specific interface to which the device with the MAC destination address is attached11 Users with systems that are attached to a hub are complaining about poor response time. What device could replace the hub and provide immediate response time improvement?router*switchbridgerepeater12 Which of the following are benefits of peer-to-peer networks? (Choose three.)centralized security*easy to createvery scalable*no centralized equipment required*centralized administrator not requiredcentralized control of assets13 Which statement is accurate about a WAN link?*The link transmits data serially.The link uses a maximum distance of 100 meters.The link uses the same transmission rate as all other WAN links use.The link uses the same standardized connector style that is used for all WAN technologies.14 Which items in the exhibit are DTE devices?A and BB and CC and D*A and DA, B, C, and D15 At which layer of the OSI model does the MAC address of a NIC reside?physicalapplicationnetworktransport*data linksession16 Refer to the exhibit. A technician measured the lengths of the CAT 5e structured cable runs in the exhibit. How should the technician evaluate the cabling shown in the diagram to the network administrator?All cabling to work areas are within specifications.Station A and B may experience intermittent problems because the length exceeds the recommended standard.*Station B may experience intermittent problems because the length exceeds the recommended standard.Station C may experience intermittent network connectivity because the length is less than the recommended standard.Station A and B will have intermittent problems because the length exceeds the recommended standard.Station C will not have network connectivity because the length is less than the recommended standard.17 Which statement describes a typical use of Gigabit Ethernet?to provide high-speed desktop connectivity for average usersto provide connectivity to low to medium volume applicationsto provide medium volume connectivity to workgroup servers*to provide high-speed connectivity for backbones and cross connects18 The ends of a UTP cable are shown in the exhibit. Which cable configuration is shown?crossoverrolloverreversed-pair*straight-throughsplit-pairconsole19 The ends of a UTP cable are shown in the exhibit. Which cable configuration is shown?console*crossoverrolloverreversed-pairsplit-pairstraight-through20 Which of the following are benefits of a wireless network? (Choose two.)higher data speedsbetter security*mobilityless expensive NIC cards*no need to run cables to hosts
Diposkan oleh whandie di 19:00 0 komentar
Label: CCNA 1
CCNA 1 Module 2 Exam Result
CCNA 3.1 Semester 1 Module 2 Exam Result at 89.7% (use ctrl+F to faster the searching)1. What makes it easier for different networking vendors to design software and hardware that will interoperate?*OSI modelproprietary designsIP addressing schemestandard logical topologiesstandard physical topologies2. Refer to the exhibit. Identify the devices labeled A, B, C, and D in the network physical documentation.A=bridge, B=switch, C=router, D=hub*A=bridge, B=hub, C=router, D=switchA=bridge, B=router, C=hub, D=switchA=hub, B=bridge, C=router, D=switch3. Refer to the exhibit. Which column shows the correct sequence of OSI model layers?ABC*D4. Which two features apply to WAN connections? (Choose two.)*operate using serial interfacesmake network connection using a hublimited to operation over small geographic areastypically operate under local administrative control*provide lower bandwidth services compared to LANs5. Which layer of the OSI model provides network services to processes in electronic mail and file transfer programs?data linktransportnetwork*application6. Which of the following are ways that bandwidth is commonly measured? (Choose three.)GHzps*kbps*MbpsNbpsMHzps*Gbps7. Which of the following are factors that determine throughput? (Choose two.)types of passwords used on serverstype of Layer 3 protocol used*network topologywidth of the network cable*number of users on the network8. Which term describes the process of adding headers to data as it moves down OSI layers?divisionencodingseparationsegmentation*encapsulation9. Which best describes the function of the physical layer?*Defines the electrical and functional specifications for the link between end systems.Provides reliable transit of data across a physical link.Provides connectivity and path selection between two end systems.Concerned with physical addressing, network topology and media access.10. Refer to the following list. Choose the correct order of data encapsulation when a device sends information.segmentsbitspacketsdataframes1 - 3 - 5 - 4 - 22 - 1 - 3 - 5 - 42 - 4 - 3 - 5 - 14 - 3 - 1 - 2 - 5* 4 - 1 - 3 - 5 - 23 - 5 - 1 - 2 - 411. The central hub has malfunctioned in the network. As a result, the entire network is down. Which type of physical network topology is implemented?bus*starringmesh12 What is the term used to describe the transport layer protocol data unit?bitspackets*segmentsframesdata streams13 Which three features apply to LAN connections? (Choose three.)operate using serial interfaces*make network connection using a hub*limited to operation over small geographic areasprovide part-time connectivity to remote services*typically operate under local administrative controlprovide lower bandwidth services compared to WANs14 A switch has failed in the network. As a result, only one segment of the network is down. Which type of physical network topology is implemented?busringstar*extended star15 Which layer of the OSI model provides connectivity and path selection between two end systems where routing occurs?physical layerdata link layer*network layertransport layer16 What is one advantage of defining network communication by the seven layers of the OSI model?It increases the bandwidth of a network.*It makes networking easier to learn and understand.It eliminates many protocol restrictions.It increases the throughput of a network.It reduces the need for testing network connectivity.17 Which of the following are layers of the TCP/IP model? (Choose three.)*ApplicationPhysical*Internet*Network AccessPresentation18 Which of the following are data link layer encapsulation details? (Choose two.)*A header and trailer are added.Data is converted into packets.*Packets are packaged into frames.Frames are divided into segments.Packets are changed into bits for Internet travel.
Diposkan oleh whandie di 18:57 0 komentar
Label: CCNA 1
CCNA 1 Module 3 Exam Result
CCNA 3.1 Semester 1 Module 3 Exam Result at 100% (use ctrl+F to faster the searching)1 What are two advantages of using UTP cable in a networking environment? (Choose two.)is stiffer than STP*is less expensive than fiber*is easier to install than coaxialprovides longer distances than coaxial providesis less susceptible to outside noise sources than fiber is2 What are two advantages of using fiber-optic cabling instead of UTP? (Choose two.)lower cost easer to install*allows longer distances*less effected by external signalseasier to terminate the cable ends3 What is the difference between a wireless NIC and an Ethernet NIC?The Ethernet NIC operates at 100 Mbps, whereas a wireless NIC operates at 10 Mbps.The Ethernet NIC uses a PCI expansion slot, and a wireless NIC cannot use an expansion slot.The wireless NIC uses CSMA/CA, whereas a Ethernet NIC uses token passing as an access method.*The wireless NIC associates to an access point, and an Ethernet NIC attaches to a hub or switch using a cable.The Ethernet NIC attaches to a hub or a switch using only fiber cabling, and a wireless NIC attaches to a wireless antenna using air as a network medium.4 Refer to the exhibit. The JacksCo is a small start-up company that took over an office space from another small company that closed. The older company left a room of network equipment behind. An inventory list is shown. As the newly hired network technician, you have been asked to determine which components in the storeroom would be best to use to install a small wireless LAN that currently only needs the employees to be able to share data. Note that the wireless LAN also needs to connect to an existing wired LAN. Which components should you choose?access point and wireless NICs*wireless NICs, access point, straight-through cables, and a switchhub, wireless NICs, two wireless bridges, crossover cables, and an access pointwireless NICs, Ethernet NICs, a switch, an external modem, two wireless bridgesEthernet NICs, wireless NICs, switch, hub, two wireless bridges, straight-through cables, crossover cables, and a router5 A company is converting a cabled LAN to a wireless Ethernet LAN. What must be changed on every host on the network?No changes are required.Each host will require a new IP address.*Each host will require an appropriate NIC or adapter.Each host will require that the operating system be upgraded.6 Refer to the exhibit. Which answer correctly identifies the pinout of the UTP cables labeled Cable A, Cable B, and Cable C?A=straight, B=rollover, C=crossoverA=rollover, B=crossover, C=straightA=crossover, B=straight, C=straight*A=crossover, B=straight, C=rolloverA=straight, B=crossover, C=rolloverA=rollover, B=straight, C=crossover7 What factors should be considered when selecting the appropriate cable for connecting a PC to a network? (Choose two.)type of system busmotherboard model*distance of cable run*speed of transmissioncomputer manufacturer8 Select the characteristics specified by 10BaseT. (Choose three.)*twisted pair cableT style connectors*baseband transmission10 gigabits per second data rate*10 megabits per second data ratedecimal encoded data transmission9 When is a straight-through cable used in a network?when configuring a routerwhen connecting a host to a host*when connecting a switch to a routerwhen connecting one switch to another switch10 What type of cable is used to make an Ethernet connection between a host and a LAN switch?consolerollovercrossover*straight-through11 Which of the following are used for data communication signals? (Choose three.)*light patterns*electrical voltagescontrolled air pulsesmixed media impulsesmagnetized fluid wave*modulated electromagnetic waves12 What does UTP cable rely on to reduce signal degradation caused by EMI and RFI?shieldingmagnetism*cancellationinsulationproperly grounded connectionsRJ-45 connectors13 Refer to the exhibit. What type of cable connects the two routers together without any intermediary device?consolerollover*crossoverstraight-through14 Which Ethernet implementation requires the signal on the media to be boosted at a maximum distance of 100 meters?10BASE210BASE5*100BASE-T100BASE-FX1000BASE-CX15 Which cable connectors are used to connect a cable from a router's console port to a PC? (Choose two.)RJ-11RJ-12*RJ-45DB-8*DB-9DB-10
Diposkan oleh whandie di 18:57 0 komentar
Label: CCNA 1
CCNA 1 Module 4 Exam Result
CCNA 3.1 Semester 1 Module 4 Exam Result at 100% (Use ctrl+F for faster search)1 A company needs to extend the LAN to six separate buildings. To limit the amount of signal attenuation on the LAN media, what type of media would be the best to use between the buildings?air (wireless)coaxial cable*fibershielded twisted pairunshielded twisted pair2 Which of the following are detected by the wire map test? (Choose three.)near-end crosstalk (NEXT)*openspropagation delayreturn loss*reversed-pair faults*short circuits3 What is a cause of crosstalk in UTP cable?cable pairs that are shortedcable pairs crossed during terminationcabling runs installed in separate conduit*cable pairs that are untwisted because of poor termination of the cable4 A small company is experiencing difficulties on its LAN. After performing some tests, a technician has determined that the copper media supporting the LAN is experiencing abnormal attenuation. What are two possible causes of the problem? (Choose two.)*defective connectors*excessively long cable lengthsuse of higher grade cablinglow frequency signals used in the medianetwork cable runs isolated from other cables5 How are binary ones and zeros represented in fiber optic installations? (Choose two.)+5 volts/-5 volts0 volts/5 volts*light/no lighthigh to low electrical transitionlow to high electrical transition*increasing/decreasing light intensity6 What factors need to be considered to limit the amount of signal attenuation in Ethernet cable runs? (Choose two.)type of usersnumber of users*length of cabletype of electrical equipment*installation of connectors on the cable7 To ensure reliable LAN communications, what should a technician be looking for when attaching connectors to the ends of UTP cable?that the white-orange/orange pair is attached first*that the wire pairs remain twisted as much as possiblethat one end of the shield is properly ground but not the otherthat 50 ohm termination resistors are on both ends8 Which of the following describes frequency?length of each waveheight of each wave*number of cycles each secondamount of time between each wave9 What conditions are described when transmission signals from one wire pair affects another wire pair? (Choose two.)*noiseresistance mismatchjitter*crosstalkattenuation10 What is expected when crosstalk is present in networks with higher transmission frequencies? (Choose two.)jitter*increase in crosstalkhigher signal attenuationincreases in cancellation effect*destruction of more of the data signal

No comments: