Upload
mainamayasam5387
View
125
Download
0
Embed Size (px)
Citation preview
CCNA Intro Cert Prac Exam #1
uz opravene takze asi na 88.4% 38/43
aby si mal aspon 80% musis mat aspon 35 otazok dobre
poznamka: Vsetky otazky su za 1 bod aj tie v ktorych treba oznacit viac moznosti
(c) Maty
1
Which of the following can be modified by the system administrator to determine from where the Cisco IOS loads? (Choose two.)
system ROM
*** startup configuration file
system image file
*** configuration register
bootloader image file
2
The devices in the graphic have been configured with static IP addresses from network 192.168.102.0. All hosts can communicate with each other but cannot communicate with the server. What is causing this problem?
*** The IP address assigned to the server is outside of the subnet.
The IP address assigned to the server is a broadcast address.
The IP address assigned to the server is a network address.
The switch that the server is connected to has not been assigned an IP address.
The router connected to the 192.168.102.96 network is configured for the 192.168.102.64 network.
3
Which two items are required for initial configuration of Cisco routers? (Choose two.)
crossover cable
*** rollover cable
*** RJ-15 to DB-9 adapter
terminal emulation software
router VTY port
4
A contractor is installing cable for a new hospital network. The cable specifications require that the network be protected from EMI and have a supported bandwidth of 1000 Mbps. Which cable type would meet both specifications?
thinnet coaxial cable
thicknet coaxial cable
Category 5 UTP cable
Category 5 STP cable
*** fiber optic cable
5
Refer to the exhibit. On what subnetwork does host A reside?
10.197.0.0
*** 10.192.0.0
10.197.184.0
10.197.187.0
10.197.187.168
6
Which three statements characterize UDP? (Choose three.)
*** UDP provides connectionless, fast transmission of data at Layer 4.
UDP provides connection-oriented, fast transmission of data at Layer 3.
*** UDP relies on application layer protocols for error detection.
*** UDP works well when an application does not need to guarantee delivery of data.
UDP relies on IP for error detection and recovery.
UDP provides windowing and flow control.
7
Why are port numbers included in the TCP header of a segment?
to indicate the correct router interface that should be used to forward a segment
to identify which switch ports should receive or forward the segment
to determine which Layer 3 protocol should be used to encapsulate the data
*** to enable a receiving host to forward the data to the appropriate application
to allow the receiving host to assemble the packet in the proper order
8
Refer to the exhibit. From router R1, the command telnet 192.168.11.2 is entered from privileged mode and this message displays:
00:06:45: %SYS-5-CONFIG_I: Configured from console by console 192.168.11.2
Trying 192.168.11.2 . . . Open
Password required, but none set
If the R2 interfaces are in the status shown in the exhibit, what is the most likely problem?
The enable secret command is missing from R2.
The enable password command is missing from R1.
The login command is missing from the line configuration mode on R2.
*** The password command is missing from the line configuration mode on R2.
The login command is missing from the console mode on R2.
The no shutdown command is missing from the Serial 0/0 interface mode on R1.
9
Refer to the exhibit. How many broadcast domains are present in the topology shown?
*** 2
4
7
9
10
11
10
Which output represents a properly connected and configured router interface?
*** prve
11
Refer to the exhibit. Host A is using FTP to download a large file from Server 1. During the download process, Server 1 does not receive an acknowledgment from Host A for several bytes of transferred data. What action will Server 1 take as a result?
create a Layer 1 jam signal
*** resend all the data
send a RESET bit to the host
change the window size in the Layer 4 header
12
Which statements are true about TCP operation? (Choose three.)
uses the destination port field to identify remote host
*** uses positive acknowledgments to confirm data delivery
*** uses windowing to control data flow
*** uses sequence numbers to establish transmission priority
uses the senders’ source port number to respond to data requested
uses the SYN flag to terminate session
13
Which password is automatically encrypted when it is created?
vty
aux
console
*** enable secret
enable password
14
What can be determined about the network from the exhibited output? (Choose two.)
The MontegoBay router does not have any LAN interfaces configured.
*** The Negril router is connected to the S0/1 interface of the MontegoBay router.
There are only four devices in this network.
Layer 3 is functioning properly on all routers.
The MBSwitch is connected to the Negril, Lucia, and MontegoBay routers.
*** Layer 2 is operational on three ports of the MontegoBay router.
15
Which interfaces in the exhibit could be used for a leased line WAN connection? (Choose two.)
*** 1
2
3
*** 4
5
6
16
Refer to the exhibit. Host A sends a data packet to Host B. What will be the correct frame format when host B receives the data packet?
*** prve
17
Refer to the exhibit. A technician applies the configuration in the exhibit to a clean router. To verify the configuration, the technician issues the show running-config command in the CLI session with the router. What lines should the technician expect to see in the router output from the show running-config command?
enable password class
line console 0
password ccna
enable secret cisco
enable password class
line console 0
password ccna
enable secret 5 $1$v0/3$QyQWmJyT7zCa/yaBRasJm0
enable password class
line console 0
password ccna
enable secret cisco
enable password 7 14141E0A1F17
line console 0
password 7 020507550A
*** enable secret 5 $1$v0/3$QyQWmJyT7zCa/yaBRasJm0
enable password 7 14141E0A1F17
line console 0
password 7 020507550A
18
Refer to the exhibit. If host A sends an IP packet to host B, what will the destination address be in the frame when it leaves host A?
DD:DD:DD:DD:DD:DD
172.168.10.99
CC:CC:CC:CC:CC:CC
172.168.10.65
*** BB:BB:BB:BB:BB:BB
AA:AA:AA:AA:AA:AA
19
A network administrator is consoled into a router and can connect to www.cisco.com, but cannot connect to the company web server located in a remote city. Which tool or command would help identify the specific Layer 3 device causing the connectivity problem?
ping
telnet
ipconfig
*** traceroute
show tech-support
20
Refer to the exhibit. A network administrator can successfully ping, using IP addresses, between router Jax and router Atlanta. However, when the command telnet Atlanta is entered from the Jax router, the Telnet connection fails. Which two reasons could be the cause of the failure? (Choose two.)
The Jax router is not an entry in the host table of the Atlanta router.
*** The Jax router does not have an entry for Atlanta in its host table.
The hostname command is not configured correctly on the Atlanta router.
The hostname command is not configured correctly on the Jax router.
*** Access to a DNS server is not available.
21
If a router is booting with a configuration register setting of 0x2102 and its NVRAM lacks boot system commands, where will the router try to load the IOS from first?
ROM
RAM
NVRAM
*** Flash
TFTP server
22
Refer to the exhibit. Four hosts are being added to the 172.16.112.0 network. Which IP address is invalid as a host address for this network?
172.16.113.55
172.16.112.255
*** 172.16.127.255
172.16.112.89
172.16.120.96
23
Which three addresses are valid public addresses? (Choose three.)
*** 172.32.255.240
192.168.1.245
10.15.250.5
*** 205.255.16.250
192.15.301.240
*** 172.11.250.212
24
Host A in the exhibit is assigned the IP address 10.118.197.55/20. How many more network devices can be added to this same subnetwork?
253
509
1021
2045
*** 4093
25
What command is used to change the default router name to Fontana?
Router# host Fontana
Router# name Fontana
Router# hostname Fontana
Router(config)# host Fontana
Router(config)# name Fontana
*** Router (config)# hostname Fontana
26
Which terms correctly describe the network shown in the exhibit? (Choose two.)
logical bus
logical star
logical ring
physical bus
*** physical star
physical ring
27
Which addresses are valid host IP addresses given the subnet mask 255.255.255.248? (Choose three.)
192.168.200.87
194.10.10.104
*** 223.168.210.100
*** 220.100.100.154
200.152.2.160
*** 196.123.142.190
28
ABC company needs to connect its router to an ISP to access the Internet. What device is needed to connect the router to the ISP if the ISP supplies a T1 leased line for the connection?
*** CSU/DSU
modem
DSL router
NT1 device
ISDN modem
29
What type of cable is used for connectivity between a model 2620 router and a model 2950 switch (point A), a model 2950 switch and a model 1900 switch (point B), and a model 2950 switch and a host (point C)?
A – straight-through; B – rollover; C – straight-through
A – crossover; B – straight-through; C – straight-through
A – straight-through; B – straight-through; C – crossover
A – crossover; B – straight-through; C – crossover
*** A – straight-through; B – crossover; C – straight-through
A – straight-through; B – crossover; C – crossover
30
Why are host tables often configured on Cisco routers?
to create static routes to specific hosts
*** to allow communication with other IP devices by name
to provide a meaningful name for the local router
to identify only the directly attached networks and associated hosts
31
In what order must the configuration tasks be completed to configure an Ethernet interface on a router when starting from privileged EXEC?
1 Enter interface configuration mode.
2 Enable the interface.
3 Enter the IP address and subnet mask.
4 Enter global configuration mode.
1-4-3-2
*** 4-1-3-2
2-4-1-3
4-2-1-3
32
A small business has asked you for advice about what type of cable will be needed to connect their modular routers. You are required to identify the type of connectors used by the devices in this diagram.
WIC-2T is a DB60 connector, WIC1T is a Smart Serial connector, and WIC-1ENET is an RJ45 connector.
WIC-2T is an RJ45 connector, WIC1T is a DB60 connector, and WIC-1ENET is a Smart Serial connector.
WIC-2T is a DB60 connector, WIC1T is a Smart Serial connector, and WIC-1ENET is an RJ45 connector.
WIC-2T is a Token Ring connector, WIC1T is a DB25 connector, and WIC-1ENET is an RJ11 connector.
*** WIC-2T is a Smart Serial connector, WIC1T is a DB60 connector, and WIC-1ENET is an RJ45 connector.
33
What is the subnetwork number for the IP address 150.3.123.18 with a subnet mask of 255.255.224.0?
150.3.0.0
150.3.123.0
150.3.64.0
*** 150.3.96.0
34
Which statements describe the functions or characteristics of ROM in a router? (Choose two.)
stores routing tables
allows software to be updated without replacing pluggable chips on the motherboard
*** maintains instructions for POST diagnostics
holds ARP cache
*** stores bootstrap program
35
The hosts are connected to the switch as shown. The switches are in their default configuration. Host A needs to communicate with host D, but host A does not have the MAC address for its default gateway. Which network hosts will receive the ARP request sent by host A?
only host D
only router R1
only hosts A, B, and C
only hosts A, B, C, and D
*** only hosts A, B, C, and router R1
36
What can be determined from the output of the ping command in the exhibit? (Choose two.)
There was a destination unreachable error.
The packet type was unknown.
*** One packet timed out.
The ping was interrupted.
*** Four packets of data were successfully received.
The packet TTL was exceeded.
37
How many collision domains exist in the network shown in the graphic?
1
2
3
*** 6
7
38
With CSMA/CD, how are collisions detected and handled? (Choose two.)
Nodes detect collisions when the frequency of the signals on the wire decreases.
*** An increase in the amplitude of the signals on the wire indicates that a collision has occurred.
After a collision, the station that caused the collision has first priority to resend the lost data.
*** After the backoff delay period has expired, all stations have equal priority to transmit data.
After a collision, all stations run an identical backoff algorithm and then synchronize with each other prior to transmitting data.
39
Given a host with the IP address 192.168.65.54 and a subnet mask of 255.255.255.240, to which network does the host belong?
192.168.65.16
192.168.65.32
*** 192.168.65.48
192.168.65.64
40
Which statements correctly identify TCP or UDP characteristics? (Choose three.)
*** A UDP destination port number represents the application or service on the remote host to which the data needs to be passed.
TCP is the preferred protocol when a service requires lower overhead.
*** UDP is encapsulated within an IP packet for transport across the network.
The Source Port field is used only if information needs to return to the sending host.
TCP Source Port identifies the sending host.
*** TCP randomly selects the source port when establishing a session.
41
Refer to the exhibit. The router named myhome has received a frame from the host 192.168.254.7. The contents of this frame are being sent to host 172.16.14.243. What is the Layer 2 destination address of the frame as it leaves the myhome router?
*** 0008.a3b6.ce05
0009.1281.18a8
000a.8a47.e612
172.16.14.129
172.16.14.243
192.168.254.7
42
Refer to the exhibit. A network administrator is troubleshooting a problem with the network. On the basis of the command output in the exhibit, what are some possible causes? (Choose two.)
A cable is not connected to the router.
The interface is administratively down.
Keepalives are not being sent and received.
*** A transceiver is not functioning properly.
*** The incorrect cable is being used on the router.
There is an encapsulation mismatch.
43
From what location can a router load the Cisco IOS during the boot process? (Choose two.)
RAM
*** TFTP server
NVRAM
setup routine
*** Flash memory
terminal