Sponsor

CCNA 1 R&S ITN Chapter 10 v5.0 Exam Answers 2014

Thứ Năm, 20 tháng 2, 2014

CCNA 1 R&S ITN Chapter 10 v5.0 Exam Answers 2014


Which three layers of the OSI model provide similar network services to those provided by the application layer of the TCP/IP model? (Choose three.)
physical layer
session layer*
transport layer
application layer* 
presentation layer*
data link layer

Which two tasks are functions of the presentation layer? (Choose two.)
compression*
addressing
encryption*
session control
authentication

Select three protocols that operate at the Application Layer of the OSI model. (Choose three.)
ARP
TCP
DSL
FTP* 
POP3* 
DHCP*

A manufacturing company subscribes to certain hosted services from their ISP. The services required include hosted world wide web, file transfer, and e-mail. Which protocols represent these three key applications? (Choose three.)
FTP* 
HTTP*
DNS
SNMP
DHCP
SMTP*

What are two characteristics of peer-to-peer networks? (Choose two.)
scalable
one way data flow
decentralized resources*
centralized user accounts
resource sharing without a dedicated server*
6
What is an example of network communication that uses the client-server model?
A user uses eMule to download a file that is shared by a friend after the file location is determined.
A workstation initiates an ARP to find the MAC address of a receiving host.
A user prints a document by using a printer that is attached to a workstation of a coworker.
A workstation initiates a DNS request when the user types www.cisco.com in the address bar of a web browser.*
7
What is an advantage for small organizations of adopting IMAP instead of POP?
Messages are kept in the mail servers until the client manually deletes them.*
When the user connects to a POP server, copies of the messages are kept in the mail server for a short time, but IMAP keeps them for a long time.
IMAP sends and retrieves email, but POP only retrieves email.
POP only allows the client to store messages in a centralized way, while IMAP allows distributed storage.

Which two actions are taken by SMTP if the destination email server is busy when email messages are sent? (Choose two.)
SMTP sends an error message back to the sender and closes the connection.
SMTP tries to send the messages at a later time.*
SMTP will discard the message if it is still not delivered after a predetermined expiration time.
SMTP periodically checks the queue for messages and attempts to send them again.*
SMTP sends the messages to another mail server for delivery.

Which application layer protocol uses message types such as GET, PUT, and POST?
DNS
DHCP
SMTP
HTTP*
POP3
10 
A DHCP-enabled client PC has just booted. During which two steps will the client PC use broadcast messages when communicating with a DHCP server? (Choose two.)
DHCPDISCOVER*
DHCPACK
DHCPOFFER
DHCPREQUEST*
DHCPNAK
11 
A user accessed the game site www.nogamename.com last week. The night before the user accesses the game site again, the site administrator changes the site IP address. What will be the consequence of that action for the user?
The user will not be able to access the site.
The user will access the site without problems.*
The user will have to modify the DNS server address on the local PC in order to access the site.
The user will have to issue a ping to this new IP address to be sure that the domain name remained the same.
12 
Which DNS server in the DNS hierarchy would be considered authoritative for the domain name records of a company named netacad?
.com
netacad.com*
mx.netacad.com
www.netacad.com
13 
Which three statements describe a DHCP Discover message? (Choose three.)
The source MAC address is 48 ones (FF-FF-FF-FF-FF-FF).
The destination IP address is 255.255.255.255.*
The message comes from a server offering an IP address.
The message comes from a client seeking an IP address. *
All hosts receive the message, but only a DHCP server replies.*
Only the DHCP server receives the message.
14 
Which phrase describes an FTP daemon?
a diagnostic FTP program
a program that is running on an FTP server*
a program that is running on an FTP client
an application that is used to request data from an FTP server
15 
What is true about the Server Message Block protocol?
Different SMB message types have a different format.
Clients establish a long term connection to servers.*
SMB messages cannot authenticate a session.
SMB uses the FTP protocol for communication.
16 
When would it be more efficient to use SMB to transfer files instead of FTP?
when downloading large files with a variety of formats from different servers
when a peer-to-peer application is required
when the host devices on the network use the Windows operating system
when downloading large numbers of files from the same server*
when uploading the same file to multiple remote servers
17 
Fill in the blank.
What is the acronym for the protocol that is used when securely communicating with a web server?     “ HTTPS “​
Hypertext Transfer Protocol Secure (HTTPS)
is the protocol that is used for accessing or
posting web server information using a secure communication channel.
18
Fill in the blank.
Refer to the exhibit. What command was used to resolve  a given host name by querying the name servers?   “nslookup ”
A user can manually query the name servers to resolve
a given host name using the nslookup command.​
Nslookup is both a command and a utility.​
19 
Question as presented:
Place the options in the following order:
end device address
- not scored -
authoritative name server
canonical name
mail exchange record
20 
Question as presented:
Place the options in the following order:
a message that is used to identify the explicit server and lease offer to accept
a message that is used to locate any available DHCP server on a network
- not scored -
a message that is used to suggest a lease to a client
a message that is used to acknowledge that the lease is successful
21 
Question as presented:
Place the options in the following order:
[+] no dedicated server is required 
[+] client and server roles are set on a per request basis 
[#] requires a specific user interface 
[#] a background service is required
[+] Order does not matter within this group.
[#] Order does not matter within this group.
22 
Open the PT Activity.

Perform the tasks in the activity instructions and then answer the question.
Which PC or PCs are sending FTP packets to the server?
PC_3
PC_1
PC_2*
PC_1 and PC_3
Read more ...

CCNA 1 R&S ITN Chapter 9 v5.0 Exam Answers 2014

Thứ Năm, 20 tháng 2, 2014

CCNA 1 R&S ITN Chapter 9 v5.0 Exam Answers 2014


Refer to the exhibit.

How many broadcast domains are there?
1
2
3
4*

How many usable host addresses are there in the subnet 192.168.1.32/27?
32
30*
64
16
62

How many host addresses are available on the network 172.16.128.0 with a subnet mask of 255.255.252.0?
510
512
1022*
1024
2046
2048

A network administrator is variably subnetting a network. The smallest subnet has a mask of 255.255.255.248. How many host addresses will this subnet provide?​
4
6*
8
10
12
5

Refer to the exhibit.
A company uses the address block of 128.107.0.0/16 for its network. What subnet mask would provide the maximum number of equal size subnets while providing enough host addresses for each subnet in the exhibit?
255.255.255.0
255.255.255.128*
255.255.255.192
255.255.255.224
255.255.255.240

Refer to the exhibit.
The network administrator has assigned the LAN of LBMISS an address range of 192.168.10.0. This address range has been subnetted using a /29 prefix. In order to accommodate a new building, the technician has decided to use the fifth subnet for configuring the new network (subnet zero is the first subnet). By company policies, the router interface is always assigned the first usable host address and the workgroup server is given the last usable host address. Which configuration should be entered into the properties of the workgroup server to allow connectivity to the Internet?
IP address: 192.168.10.65 subnet mask: 255.255.255.240, default gateway: 192.168.10.76
IP address: 192.168.10.38 subnet mask: 255.255.255.240, default gateway: 192.168.10.33
*IP address: 192.168.10.38 subnet mask: 255.255.255.248, default gateway: 192.168.10.33*
IP address: 192.168.10.41 subnet mask: 255.255.255.248, default gateway: 192.168.10.46
IP address: 192.168.10.254 subnet mask: 255.255.255.0, default gateway: 192.168.10.1

How many bits must be borrowed from the host portion of an address to accommodate a router with five connected networks?
two
three*
four
five

A company has a network address of 192.168.1.64 with a subnet mask of 255.255.255.192. The company wants to create two subnetworks that would contain 10 hosts and 18 hosts respectively. Which two networks would achieve that? (Choose two.)
192.168.1.16/28
192.168.1.64/27*
192.168.1.128/27
192.168.1.96/28*
192.168.1.192/28

In a network that uses IPv4, what prefix would best fit a subnet containing 100 hosts?
/23
/24
/25*
/26
10 
Refer to the exhibit.
Given the network address of 192.168.5.0 and a subnet mask of 255.255.255.224, how many addresses are wasted in total by subnetting each network with a subnet mask of 255.255.255.224?
56
60
64
68
72*
11 
When developing an IP addressing scheme for an enterprise network, which devices are recommended to be grouped into their own subnet or logical addressing group?
end-user clients
workstation clients
mobile and laptop hosts
hosts accessible from the Internet*
12 
A network administrator needs to monitor network traffic to and from servers in a data center. Which features of an IP addressing scheme should be applied to these devices?
random static addresses to improve security
addresses from different subnets for redundancy
predictable static IP addresses for easier identification*
dynamic addresses to reduce the probability of duplicate addresses
13 
Which two reasons generally make DHCP the preferred method of assigning IP addresses to hosts on large networks? (Choose two.)
It eliminates most address configuration errors.*
It ensures that addresses are only applied to devices that require a permanent address.
It guarantees that every device that needs an address will get one.
It provides an address only to devices that are authorized to be connected to the network.
It reduces the burden on network support staff.*
14 
Refer to the exhibit.

A computer that is configured with the IPv6 address as shown in the exhibit is unable to access the internet. What is the problem?
The DNS address is wrong.
There should not be an alternative DNS address.
The gateway address is in the wrong subnet.*
The settings were not validated.
15 
When subnetting a /64 IPv6 network prefix, which is the preferred new prefix?
/66
/70
/72*
/74
16 
What is the subnet address for the address 2001:DB8:BC15:A:12AB::1/64?
2001:DB8:BC15::0
2001:DB8:BC15:A::0*
2001:DB8:BC15:A:1::1
2001:DB8:BC15:A:12::0
17 
Which two notations are useable nibble boundaries when subnetting in IPv6? (Choose two.)
/62
/64*
/66
/68*
/70
18 
Fill in the blank.
In dotted decimal notation, the IP address      ”172.25.0.126”     is the last host address for the network 172.25.0.64/26.
The binary representation of the network
address 172.25.0.64 is 10101100.00011001.00000000.01000000,
where the last six zeros represent the host part of the address.
The last address on that subnet would have the host part equal to 111111,
and the last host address would end in 111110. This results in a binary
representation of the last host of the IP address as 10101100.00011001.00000000.01111110,
which translates in decimal to 172.25.0.126.
19 
Fill in the blank.
In dotted decimal notation, the subnet mask      ”255.255.254.0”     will accommodate 500 hosts per subnet.
If the network has to accommodate 500 hosts per subnet, then we need 9 host bits
(2^9 – 2 = 510 hosts). The Class B subnet mask has 16 bits available and if
we use 9 bits for hosts, we will have 7 network bits remaining.The subnet mask
with 9 host bits is 11111111.11111111.11111110.00000000, which corresponds
to 255.255.254.0.
20 
Consider the following range of addresses:
2001:0DB8:BC15:00A0:0000::
2001:0DB8:BC15:00A1:0000::
2001:0DB8:BC15:00A2:0000::

2001:0DB8:BC15:00AF:0000::
The prefix for the range of addresses is   “60”    .
All the addresses have the part 2001:0DB8:BC15:00A
in common. Each number or letter in the address
represents 4 bits, so the prefix is /60.
21 
Fill in the blank.
A nibble consists of    ”4”    bits.
A nibble is half of a byte or 4 bits. This is significant because
subnetting in IPv6 is usually done on a nibble boundary.
22
Question as presented:
Place the options in the following order:
- not scored -
192.168.1.64/27
- not scored -
192.168.1.32/27
192.168.1.96/27
23
Question as presented:
Place the options in the following order:
- not scored -
Network C
- not scored -
Network A
Network D
Network B
24 
Open the PT Activity.

Perform the tasks in the activity instructions and then answer the question.
What issue is causing Host A to be unable to communicate with Host B?
The subnet mask of host A is incorrect.
Host A has an incorrect default gateway.
Host A and host B are on overlapping subnets.*
The IP address of host B is not in the same subnet as the default gateway is on.
Read more ...

CCNA 1 R&S ITN Chapter 8 v5.0 Exam Answers 2014

Thứ Năm, 20 tháng 2, 2014

CCNA 1 R&S ITN Chapter 8 v5.0 Exam Answers 2014


Fill in the blank.
The decimal equivalent of the binary number 10010101 is    ”149” .
2

Place the options in the following order:
[+] 192.168.100.161/25
[+] 203.0.113.100/24
[+] 10.0.50.10/30
[#] 192.168.1.80/29
[#] 172.110.12.64/28
[#] 10.10.10.128/25
[*] 10.0.0.159/27
[*] 192.168.1.191/26
[+] Order does not matter within this group.
[#] Order does not matter within this group.
[*] Order does not matter within this group.

What is indicated by a successful ping to the ::1 IPv6 address?
The link-local address is correctly configured.
The default gateway address is correctly configured.
The host is cabled properly.
All hosts on the local link are available.
IP is properly installed on the host.*
4
Launch PT - Hide and Save PT
Open the PT Activity. Perform the tasks in the activity instructions and then answer the question.
Which message is displayed on the web server?
Correct configuration!*
IPv6 address configured!
You did it right!
Successful configuration!

Which two ICMP messages are used by both IPv4 and IPv6 protocols? (Choose two.)​
router solicitation
protocol unreachable*
neighbor solicitation
route redirection*
router advertisement

A message is sent to all hosts on a remote network. Which type of message is it?
unicast
directed broadcast*
limited broadcast
multicast

Which two things can be determined by using the ping command? (Choose two.)
the average time it takes each router in the path between source and destination to respond
the average time it takes a packet to reach the destination and for the response to return to the source*
whether or not the destination device is reachable through the network*
the IP address of the router nearest the destination device
the number of routers between the source and destination device

A DHCP server is used to assign IP addresses dynamically to the hosts on a network. The address pool is configured with 192.168.10.0/24. There are 3 printers on this network that need to use reserved static IP addresses from the pool. How many IP addresses in the pool are left to be assigned to other hosts?
253
252
251*
254

Which two parts are components of an IPv4 address? (Choose two.)
logical portion
network portion*
physical portion
broadcast portion
host portion*
subnet portion
10 
Which IPv6 address is most compressed for the full FE80:0:0:0:2AA:FF:FE9A:4CA3 address?​
FE80::2AA:FF:FE9A:4CA3*
FE80::0:2AA:FF:FE9A:4CA3​
FE80:::0:2AA:FF:FE9A:4CA3​
FE8::2AA:FF:FE9A:4CA3​
11

12 
What are three parts of an IPv6 global unicast address? (Choose three.)
an interface ID that is used to identify the local host on the network*
an interface ID that is used to identify the local network for a particular host
a subnet ID that is used to identify networks inside of the local enterprise site*
a global routing prefix that is used to identify the network portion of the address that has been provided by an ISP*
a global routing prefix that is used to identify the portion of the network address provided by a local administrator
13
14 
Which network migration technique encapsulates IPv6 packets inside IPv4 packets to carry them over IPv4 network infrastructures?
encapsulation
translation
dual-stack
tunneling*
15 
When an IPv6 enabled host needs to discover the MAC address of an intended IPv6 destination, which destination address is used by the source host in the NS message?
global unicast address of the receiver
solicited-node multicast address*
all-node multicast address
link-local address of the receiver
16 
When a Cisco router is being moved from an IPv4 network to a complete IPv6 environment, which series of commands would correctly enable IPv6 forwarding and interface addressing?
Router# configure terminal
Router(config)# interface fastethernet 0/0
Router(config-if)# ip address 192.168.1.254 255.255.255.0
Router(config-if)# no shutdown
Router(config-if)# exit
Router(config)# ipv6 unicast-routing
Router# configure terminal
Router(config)# interface fastethernet 0/0
Router(config-if)# ipv6 address 2001:db8:bced:1::9/64
Router(config-if)# no shutdown
Router(config-if)# exit
Router(config)# ipv6 unicast-routing ***********
Router# configure terminal
Router(config)# interface fastethernet 0/0
Router(config-if)# ipv6 address 2001:db8:bced:1::9/64
Router(config-if)# no shutdown
Router# configure terminal
Router(config)# interface fastethernet 0/0
Router(config-if)# ip address 2001:db8:bced:1::9/64
Router(config-if)# ip address 192.168.1.254 255.255.255.0
Router(config-if)# no shutdown
17 
What two statements describe characteristics of Layer 3 broadcasts? (Choose two.)
There is a broadcast domain on each switch interface.
Routers create broadcast domains.*
A router will not forward any type of Layer 3 broadcast packet.
Broadcasts are a threat and users must avoid using protocols that implement them.
A limited broadcast packet has a destination IP address of 255.255.255.255.*
Some IPv6 protocols use broadcasts.
18 
Which two statements are correct about IPv4 and IPv6 addresses? (Choose two.)
IPv6 addresses are represented by hexadecimal numbers.*
IPv6 addresses are 32 bits in length.
IPv4 addresses are 128 bits in length.
IPv4 addresses are represented by hexadecimal numbers.
IPv4 addresses are 32 bits in length.*
IPv6 addresses are 64 bits in length.
19 
What is the prefix length notation for the subnet mask 255.255.255.224?
/26
/28
/27*
/25
20 
Fill in the blank.
What is the decimal equivalent of the hex number 0x3F?   “63
21 
What are two types of IPv6 unicast addresses? (Choose two.)
anycast
link-local*
multicast
loopback*
broadcast
22 
When will a router drop a traceroute packet?
when the router receives an ICMP Time Exceeded message
when the host responds with an ICMP Echo Reply message
when the value in the TTL field reaches zero*
when the values of both the Echo Request and Echo Reply messages reach zero
when the RTT value reaches zero
23 
An IPv6 enabled device sends a data packet with the destination address of FF02::1. What is the target of this packet?
all IPv6 configured routers across the network
all IPv6 configured routers on the local link
all IPv6 enabled nodes on the local link*
all IPv6 DHCP servers
24 
How many bits are in an IPv4 address?
256
128
64
32*
Read more ...

CCNA 1 R&S ITN Chapter 7 v5.0 Exam Answers 2014

Thứ Năm, 20 tháng 2, 2014

CCNA 1 R&S ITN Chapter 7 v5.0 Exam Answers 2014


A PC is downloading a large file from a server. The TCP window is 1000 bytes. The server is sending the file using 100-byte segments. How many segments will the server send before it requires an acknowledgment from the PC?
1 segment
10 segments*
100 segments
1000 segments

A host device needs to send a large video file across the network while providing data communication to other users. Which feature will allow different communication streams to occur at the same time, without having a single data stream using all available bandwidth?
multiplexing *
window size
acknowledgments
port numbers

A technician wishes to use TFTP to transfer a large file from a file server to a remote router. Which statement is correct about this scenario?
The file is segmented and then reassembled in the correct order by TCP.
The file is not segmented, because UDP is the transport layer protocol that is used by TFTP.
Large files must be sent by FTP not TFTP.
The file is segmented and then reassembled in the correct order at the destination, if necessary, by the upper-layer protocol.*
4

Which scenario describes a function provided by the transport layer?
A student is using a classroom VoIP phone to call home. The unique identifier burned into the phone is a transport layer address used to contact another network device on the same network.
A corporate worker is accessing a web server located on a corporate network. The transport layer formats the screen so the web page appears properly no matter what device is being used to view the web site.
A student has two web browser windows open in order to access two web sites. The transport layer ensures the correct web page is delivered to the correct browser window.*
A student is playing a short web-based movie with sound. The movie and sound are encoded within the transport layer header.

Which transport layer feature is used to guarantee session establishment?
UDP ACK flag
TCP 3-way handshake*
UDP sequence number
TCP port number

What is the complete range of TCP and UDP well-known ports?
0 to 255
256 – 1023
0 to 1023*
1024 – 49151

Which two TCP header fields are used to confirm receipt of data?
checksum
acknowledgment number*
FIN flag
sequence number*
SYN flag

​What is a beneficial feature of the UDP transport protocol?
acknowledgment of received data
tracking of data segments using sequence numbers
fewer delays in transmission*
the ability to retransmit lost data
10 
Which two flags in the TCP header are used in a TCP three-way handshake to establish connectivity between two network devices? (Choose two.)
RST
FIN
SYN*
ACK*
URG
PSH
11 
What happens if the first packet of a TFTP transfer is lost?
The TFTP application will retry the request if a reply is not received.*
The next-hop router or the default gateway will provide a reply with an error code.
The client will wait indefinitely for the reply.
The transport layer will retry the query if a reply is not received.
12 
Compared to UDP, what factor causes additional network overhead for TCP communication?
the identification of applications based on destination port numbers
the checksum error detection
the encapsulation into IP packets
network traffic that is caused by retransmissions*
13
14 
Which factor determines TCP window size?
the amount of data the destination can process at one time*
the number of services included in the TCP segment
the amount of data the source is capable of sending at one time
the amount of data to be transmitted
15
16 
During a TCP session, a destination device sends an acknowledgment number to the source device. What does the acknowledgment number represent?
the last sequence number that was sent by the source
one number more than the sequence number
the next byte that the destination expects to receive*
the total number of bytes that have been received
17 
What is a socket?
the combination of the source and destination sequence numbers and port numbers
the combination of the source and destination sequence and acknowledgment numbers
the combination of a source IP address and port number or a destination IP address and port number*
the combination of the source and destination IP address and source and destination Ethernet address
18 
Fill in the blank.
During a TCP session, the    ”SYN”   field is used by the client to request communication with the server.
19 
Fill in the blank using a number.
A total of   “4”    messages are exchanged during the TCP session termination process between the client and the server.
20 
A host device sends a data packet to a web server via the HTTP protocol. What is used by the transport layer to pass the data stream to the proper application on the server?
source port number
destination port number*
sequence number
acknowledgment
21 
What does a client do when it has UDP datagrams to send?
It just sends the datagrams.*
It queries the server to see if it is ready to receive data.
It sends a simplified three-way handshake to the server.
It sends to the server a segment with the SYN flag set to synchronize the conversation.
22 
What does a client application select for a TCP or UDP source port number?
a predefined value in the dynamic port range
a predefined value in the range of the registered ports
a predefined value in the well-known port range
a random value in the dynamic port range
a random value in the range of the registered ports*
a random value in the well-known port range
Read more ...

CCNA 1 R&S ITN Chapter 6 v5.0 Exam Answers 2014

Thứ Năm, 20 tháng 2, 2014

CCNA 1 R&S ITN Chapter 6 v5.0 Exam Answers 2014


After troubleshooting a router, the network administrator wants to save the router configuration so that it will be used automatically the next time that the router reboots. What command should be issued?
copy startup-config flash
copy running-config flash
reload
copy startup-config running-config
copy running-config startup-config*

Which IPv4 header field is responsible for defining the priority of the packet?​
traffic class
flow label
flags
differentiated services*

When connectionless protocols are implemented at the lower layers of the OSI model, what are usually used to acknowledge the data receipt and request the retransmission of missing data?
Transport layer UDP protocols
upper-layer connection-oriented protocols*
connectionless acknowledgements
Network layer IP protocols

Why is NAT not needed in IPv6?​
Any host or user can get a public IPv6 network address because the number of available IPv6 addresses is extremely large.​*
The end-to-end connectivity problems that are caused by NAT are solved because the number of routes increases with the number of nodes that are connected to the Internet.
Because IPv6 has integrated security, there is no need to hide the IPv6 addresses of internal networks.​
The problems that are induced by NAT applications are solved because the IPv6 header improves packet handling by intermediate routers.​
5

Refer to the exhibit. Fill in the blank.
A packet leaving PC-1 has to traverse “three” hops to reach PC-4.​

Which two interfaces will allow access via the VTY lines to configure the router? (Choose two.)
console interfaces
USB interfaces
WAN interfaces*
LAN interfaces*
aux interfaces

A technician is manually configuring a computer with the necessary IP parameters to communicate over the corporate network. The computer already has an IP address, a subnet mask, and a DNS server. What else has to be configured for Internet access?
the default gateway address*
the MAC address
the domain name of the organization
the WINS server address

Which three commands are used to set up a password for a person who attaches a cable to a new router so that an initial configuration can be performed? (Choose three.)
password cisco *
line vty 0 4
line console 0 *
interface fastethernet 0/0
enable secret cisco
login * 
9
10
11 
Which statement about router interfaces is true?
Commands that apply an IP address and subnet mask to an interface are entered in global configuration mode.
Once the no shutdown command is given, a router interface is active and operational.
Router LAN interfaces are not activated by default, but router WAN interfaces are.
A configured and activated router interface must be connected to another device in order to operate.*
12 
A technician is configuring a router that is actively running on the network. Suddenly, power to the router is lost. If the technician has not saved the configuration, which two types of information will be lost? (Choose two.)
routing table*
ARP cache*
Cisco IOS image file
startup configuration
bootstrap file
13
14 
How do hosts ensure that their packets are directed to the correct network destination?
They always direct their packets to the default gateway, which will be responsible for the packet delivery.
They send a query packet to the default gateway asking for the best route.
They search in their own local routing table for a route to the network destination address and pass this information to the default gateway.
They have to keep their own local routing table that contains a route to the loopback interface, a local network route, and a remote default route.​* 
15 
What is a service provided by the Flow Label field of the IPv6 header?
It identifies the total length of the IPv6 packet.
It limits the lifetime of a packet.
It informs network devices to maintain the same path for real-time application packets.*
It classifies packets for traffic congestion control.
16 
During the process of forwarding traffic, what will the router do immediately after matching the destination IP address to a network on a directly connected routing table entry?
look up the next-hop address for the packet
discard the traffic after consulting the route table
switch the packet to the directly connected interface*
analyze the destination IP address
17 
Fill in the blank.
In a router, “ROM ” is the nonvolatile memory where the diagnostic software, the bootup instructions, and a limited IOS are stored.
18 
Which two commands can be used on a Windows host to display the routing table? (Choose two.)
netstat -s
route print*
netstat -r*
tracert
show ip route
19 
A computer has to send a packet to a destination host in the same LAN. How will the packet be sent?
The packet will be sent directly to the destination host.*
The packet will be sent only to the default gateway.
The packet will be sent to the default gateway first, and then, depending on the response from the gateway, it may be sent to the destination host.
The packet will first be sent to the default gateway, and then from the default gateway it will be sent directly to the destination host.
20 
Which command displays a summary chart of all router interfaces, their IP addresses, and their current operational status?
show interfaces
show version
show ip route
show ip interface brief *
21 
Which two files, if found, are copied into RAM as a router with the default configuration register setting boots up? (Choose two.)
POST diagnostics
running configuration
startup configuration*
IOS image file*
22

Open the PT Activity. Perform the tasks in the activity instructions and then answer the question or complete the task.
Does the router have enough RAM and flash memory to support the new IOS?
The router needs more RAM and more flash memory for the IOS upgrade.
The router has enough RAM, but needs more flash memory for the IOS upgrade.
The router has enough RAM and flash memory for the IOS upgrade.*
The router has enough flash memory, but needs more RAM for the IOS upgrade.
23 
When would the Cisco IOS image held in ROM be used to boot the router?
when the running configuration directs the router to do this
during a normal boot process
when the full IOS cannot be found*
during a file transfer operation
Read more ...

Advertisment