CCNA 4 Final Exam Answers

1. Identify the factors that contribute to congestion on an Ethernet LAN. (Choose three.)
-- *** improper placement of enterprise level servers
-- *** addition of hosts to a physical segment
-- replacement of hubs with workgroup switches
-- *** increasing use of bandwidth intensive network applications
-- creation of new collision domains without first adding network hosts
-- migration to full-duplex Ethernet within the LAN

2. Which of the following are examples of TCP/IP application layer protocols? (Choose three.)
-- *** a terminal emulation protocol that supports remote console connections with various network devices
-- a protocol created by IBM that makes it easier for mainframes to connect to remote offices
-- *** a protocol responsible for transporting electronic mail on TCP/IP networks and the Internet
-- a protocol that controls the rate at which data is sent to another computer
-- *** a protocol that exchanges network management information between a network device and a management console

3. Which of the following eliminates switching loops?
-- hold-down timers
-- poison reverse
-- *** spanning tree protocol
-- time to live
-- split horizon protocol

4. The show cdp neighbors command is a very useful network troubleshooting tool. Using the output in the graphic, select the statements
that are true. (Choose two.)
-- CDP operates at the network layer of the OSI model.
-- *** The output of this command displays information about directly connected Cisco devices only.
-- The switch is attached to the SanJose1 FastEthernet0/21 interface.
-- SanJose1 is running CDP version 12.0.
-- SanJose1 has two fully operational, cdp-enabled Cisco switches directly connected to it.
-- *** SanJose2 is a 2600 series router running several routed protocols

5. A network administrator can ping the Denver router, but gets a 'Password Required but None Set' message when trying to connect
remotely via Telnet. Which command sequence must be applied to the Denver router to allow remote access?
-- Router(config)# line console 0
Router(config-line)# login
Router(config-line)# password cisco
-- *** Router(config)# line vty 0 4
*** Router(config-line)# login
*** Router(config-line)# password cisco
-- Router(config)# line virtual terminal
Router(config-line)# enable login

6. Router(config-line)# password cisco
-- Router(config)# line vty 0 4
Router(config-line)# enable secret
Router(config-line)# password cisco
-- Router(config)# enable secret cisco
Router(config)# enable cisco

7. Which of the following is associated with link-state routing protocols?
-- low processor overhead
-- poison reverse
-- routing loops
-- split horizon
-- *** shortest-path first calculations

8. A router does not load its configuration after a power failure. After running the show startup-configuration command, the adminstrator
finds that the original configuration is intact. What is the cause of this problem?
-- The configuration register is set for 0x2100.
-- The configuration register is set for 0x2101.
-- The configuration register is set for 0x2102.
-- *** The configuration register is set for 0x2142.
-- Boot system commands are not configured.
-- Flash memory is empty causing the router to bypass the configuration in NVRAM
-- Nederst på formularen

9. Which commands are used to verify the content and placement of access control lists? (Choose three.)
-- *** show ip interface
-- show ip route
-- show processes
-- *** show running-config
-- show cdp neighbor
-- *** show access-lists

10. Which of the following are required when creating a standard access control list? (Choose two.)
destination address and wildcard mask
-- *** source address and wildcard mask
-- subnet mask and wildcard mask
-- access list number between 100 and 199 or 2000 and 2699
-- *** access list number between 1 and 99 or 1300 to 1999

11. Which of the following are keywords that can be used in an access control list to replace a dotted decimal wildcard mask? (Choose two.)
-- most
-- *** host
-- all
-- *** any
-- some
-- sum

13. Refer to the diagram. All ports on Switch A are in the Sales VLAN and all ports on Switch B are in the Accounting VLAN. How many
broadcast domains and how many collision domains are shown? (Choose two).
-- 3 collision domains
-- *** 3 broadcast domains
-- 5 broadcast domains
-- *** 9 collision domains
-- 10 collision domains
-- 13 collision domains

14. Refer to the graphic. Using the most efficient IP addressing scheme and VLSM, which address can be configured on one of the serial
interfaces?
-- 192.168.16.63/27
-- 192.168.16.158/27
-- 192.168.16.192/27
-- 192.168.16.113/30
-- 192.168.16.145/30
-- *** 192.168.16.193/30

15. What is the purpose of the Spanning Tree Protocol (STP)?

-- *** prevents Layer 2 loops
-- prevents routing loops on a router
-- creates smaller collision domains
-- creates smaller broadcast domains
-- allows Cisco devices to exchange routing table updates

16. What is the purpose of a loopback address when using the OSPF routing protocol?
-- activates the OSPF neighboring process
-- *** ensures a persistent router ID for the OSPF process
-- provides a backdoor for connectivity during the convergence process
-- streamlines and speeds up the convergence process

17. Which statement is true regarding states of the IEEE 802.1d Spanning Tree Protocol?
-- Ports are manually configured to be in the forwarding state.
-- *** Ports listen and learn before going into the forwarding state.
-- Ports must be blocked before they can be placed in the disabled state.
-- It takes 15 seconds for a port to go from blocking to forwarding

18. Which sequence of commands is used to configure a loopback address on a router?
-- Router1(config)# interface loopback 1
Router1(config-if)# ip address 192.168.1.1
-- Router1(config)# interface serial 0/0
Router1(config-if)# loopback 1
Router1(config-if)# ip address 192.168.1.1
-- Router1(config)# interface serial 0/0
Router1(config-if)# loopback 1
Router1(config-if)# ip address 192.168.1.1 255.255.255.0
-- *** Router1(config)# interface loopback 1
*** Router1(config-if)# ip address 192.168.1.1 255.255.255.255

19. Which routing protocols are classful and do not support VLSM? (Choose two.)
-- EIGRP
-- OSPF
-- *** RIP v1
-- RIP v2
-- *** IGRP

20. Refer to the graphic. Two switches are connected together through a trunk port. SW2 displays the message shown. Which of the
following will solve the duplex mismatch?
-- SW1(config)# interface fastethernet 0/1
-- SW1(config-if)# duplex full
-- SW1(config)# interface fastethernet 0/1
-- SW1(config-if)# full-duplex
-- *** SW2(config)# interface fastethernet 0/1
-- *** SW2(config-if)# duplex full
-- SW2(config)# interface fastethernet 0/1
-- SW2(config-if)# full-duplex

21. Refer to the graphic. Two routers have been configured to use EIGRP. Packets are not being forwarded between the two routers. What
could be the problem?
-- EIGRP does not support VLSM.
-- The routers were not configured to monitor neighbor adjacency changes.
-- The default bandwidth was used on the routers.
-- *** An incorrect IP address was configured on a router interface.
-- According to the the provided router output, which of the following statements is true regarding PPP operation?
-- Only the link-establishment phase completed successfully.
-- Only the network-layer phase completed successfully.
-- Neither the link-establishment phase nor the the network-layer phase completed successfully.
-- *** Both the link-establishment and network-layer phase completed successfully

22. Frame Relay is configured over a point-to-point connection between two routers. The output of the show frame-relay pvc command
indicates that the status of this PVC is inactive. Which of the following devices could be the source of the problem? (Choose two.)

-- local router
-- local Frame Relay switch
-- *** remote router
-- *** remote Frame Relay switch
-- R3 has the following configuration:
-- R3# show running-config
-- --some output text omitted--
-- interface serial0/0
-- bandwidth 128
-- ip address 192.168.11.2 255.255.255.0
-- encapsulation frame-relay
-- frame-relay map ip 192.168.11.2 30 broadcast

23. After the command R3# debug frame-relay packet is executed, a ping is issued from R3 to R1 but is unsuccessful. Based on the output of
the debug command shown in the graphic and the router configuration, what might be problem?
-- *** No clock rate assigned.
-- There is an incorrect DLCI number in the map statement.
-- An incorrect IP address exists in the map statement.
-- The encapsulation command is missing the broadcast keyword

24. Which statements are true regarding the Frame Relay LMI? (Choose three.)
-- *** The LMI provides a virtual circuit (VC) status mechanism.
-- The LMI type must always be manually configured.
-- The available LMI types are NI1, DMS100 and 5ESS.
-- The LMI types supported by Cisco routers are CISCO and IETF.
-- *** The LMI type configured on the router must match the one used on the Frame Relay switch.
-- *** The LMI uses reserved DLCIs to exchange messages between the DTE and DCE

25. Which statement describes the process that occurs in Network Address Translation (NAT) overloading?
-- *** Multiple private IP addresses are mapped to one public IP address.
-- The number of usable addresses assigned to a company is divided into smaller manageable groups.
-- A pool of IP addresses are mapped to one or more MAC addresses.
-- The router acts as a DHCP server and assigns multiple public IP addresses for each private IP address configured

26. Which two statements are true about the committed information rate on a Frame Relay link? (Choose two.)
-- The sum of the CIRs for all PVCs must be less than the port speed.
-- The sum of the CIRs for all PVCs must equal the port speed.
-- *** The sum of the CIRs for all PVCs can be greater than the port speed.
-- *** The DE bit will be set on frames that are transmitted in excess of the CIR.
-- Frames that are transmitted at greater than the CIR will be discarded at the source.
-- It is impossible to transmit frames at a rate in excess of the CIR

27. Which of the following commands would be used to troubleshoot the processing of call control functions such as call setup, signaling,
and termination?
-- show interface bri0/0
-- show isdn active
-- debug isdn q921
-- *** debug isdn q931
-- debug ppp negotiation
-- debug ppp authentication

28. Which of the following statements are true regarding PPP? (Choose three.)
-- *** PPP can use synchronous and asynchronous physical media.
-- PPP can only be used between two Cisco devices.
-- PPP carries packets from several network layer protocols in LCPs.
-- *** PPP uses LCPs to establish, configure, and test the data link connection.
-- *** PPP uses LCPs to agree on format options such as authentication, compression, and error detection

29. A network administrator is evaluating authentication protocols for a PPP link. Which of the following reasons might lead to the selection
of CHAP over PAP as the authentication protocol? (Choose three.)
-- establishes identities with a two-way handshake
-- *** uses a three-way authentication periodically during the session to reconfirm identities
-- control by the remote host of the frequency and timing of login events
-- *** transmits login information in encrypted format
-- *** uses an unpredictable variable challenge value to prevent playback attacks
-- makes authorized network administrator intervention a requirement to establish each session

30. Why are static routes often used with ISDN DDR?
-- They are more stable than dynamic routing protocols.
-- They are more accurate than dynamic routing protocols because they are put in by a network administrator.
-- They are easier to modify when a faster technology is installed.
-- *** They prevent the unnecessary activation of the link

31. Assuming that four bits have been borrowed to make subnets, identify the subnet network addresses. (Choose three.)
-- 192.168.14.8
-- *** 192.168.14.16
-- 192.168.14.24
-- *** 192.168.14.32
-- 192.168.14.148
-- *** 192.168.14.208

32. A switch can be configured for three different forwarding modes based on how much of a frame is received before the forwarding
process begins. Each of the numbered arrows in the accompanying graphic signifies the point in a frame where a particular forwarding mode
will begin. Which one of the following groups reflects the sequence of forwarding modes signified by the numbered arrows?
-- *** 1) fast forward
*** 2) fragment free
*** 3) store-and-forward
-- store-and-forward
2) fragment free
3) fast forward
-- fragment free
2) fast forward
3) store-and-forward
-- fast forward
2) store-and-forward
3) fragment free

33. Which of the following commands will display a communication message on a router before the router prompt is shown?
-- *** banner motd * Property of TLC. UNAUTHORIZED USERS WILL BE PROSECUTED TO THE FULL EXTENT OF THE
LAW. *
-- message Property of TLC. UNAUTHORIZED USERS WILL BE PROSECUTED TO THE FULL EXTENT OF THE LAW.
-- banner * Property of TLC. UNAUTHORIZED USERS WILL BE PROSECUTED TO THE FULL EXTENT OF THE LAW. *
-- hostname (Property of TLC. UNAUTHORIZED USERS WILL BE PROSECUTED TO THE FULL EXTENT OF THE LAW.)
Øverst på formularen

34. A router needs to be added to OSPF area 0. Which commands should be used to enable OSPF on the router? (Choose two.)
-- RouterA(config)# router ospf
-- *** RouterA(config)# router ospf 1
-- RouterA(config-router)# network 192.168.2.0 0.0.0.255 0
-- *** RouterA(config-router)# network 192.168.2.0 0.0.0.255 area 0
-- RouterA(config-router)# network 192.168.2.0 255.255.255.0 0

35. Refer to the graphic. Which of the following commands will configure router A for OSPF?
-- router ospf 1
network 192.168.10.0
-- *** router ospf 1
*** network 192.168.10.64 0.0.0.63 area 0
*** network 192.168.10.192 0.0.0.3 area 0
-- router ospf 1
network 192.168.10.64 255.255.255.192
network 192.168.10.192 255.255.255.252
-- router ospf 1
network 192.168.10.0 area 0

36. Which of the following protocols would exchange information between routers to share network addresses and their metrics?
-- TCP
-- *** RIP
-- CSMA/CD
-- Ethernet

37. Which ISDN device can be directly connected to a two-wire local loop in a North American city?
-- a router with a serial interface
-- a router with an S/T interface
-- *** a router with a U interface
-- an ISDN terminal adapter

38. The output of the show ip interfaces brief command indicates that Serial0 is up but the line protocol is down. Which of the following are
possible causes for the line protocol being in the down state? (Choose two.)
-- The clock rate is not set on the DTE.
-- An incorrect default gateway is set on the router.
-- A network is missing from the routing protocol configuration.
-- *** The encapsulation on the Serial0 interface is incorrect.
-- *** Keepalives are not being sent by the remote device

39. Which of the following is a characteristics of TCP? (Choose two.)
-- *** data transport reliability
-- best path determination
-- *** establishing, maintaining, and terminating virtual circuits
-- encapsulation of packets in a data frame with source and destination MAC addresses
-- best-effort datagram delivery

40. Which statement is true regarding the command ip route 192.168.7.24 255.255.255.248 192.168.7.9? (Choose two.)
-- *** A packet destined for host 192.168.7.30 will be forwarded to address 192.168.7.9.
-- 192.168.7.9 is the destination network for this route.
-- 192.168.7.24 is the next-hop router in this command.
-- This command is issued from the interface configuration mode.
-- *** This command is used to define a static route

41. Which of the following application layer protocols use TCP? (Choose three.)
-- *** SMTP
-- *** FTP
-- SNMP
-- *** HTTP
-- TFTP
-- DHCP

42. Which terms refer to Frame Relay congestion management mechanisms? (Choose three.)
-- *** BECN
-- DLCI
-- *** DE
-- *** FECN
-- LMI
-- Inverse ARP

43. Which of the following router commands will verify that a path exists to a destination network?
-- Router# show ip interfaces brief
-- *** Router# show ip route
-- Router# show cdp neighbors
-- Router# show running-config
-- Router# show protocols

44. When EIGRP is configured on a router, which table of DUAL information is used to calculate the best route to each destination router?
-- router table
-- *** topology table
-- DUAL table
-- CAM table
-- ARP table

45. Refer to the graphic. Routers A and B have EIGRP configured and automatic summarization has been disabled on both routers. Which of
the following commands is used on router A to summarize the attached routes, and to which interface is this command applied? (Choose two)
-- *** ip summary-address eigrp 1 192.168.10.64 255.255.255.192
-- ip area-range eigrp 1 192.168.10.80 255.255.255.224
-- summary-address 192.168.10.80 0.0.0.31
-- ip summary-address eigrp 1 192.168.10.64 0.0.0.63
-- *** serial interface on router A
-- serial interface on router B

46. A router with two LAN interfaces, two WAN interfaces, and two loopback interfaces configured is operating with OSPF as its routing
protocol. What is used by the OSPF process to assign the router ID?
-- the IP address of the interface configured with priority 0
-- the OSPF area ID configured on the interface with the highest IP address
-- *** the loopback with the highest IP address configured
-- the highest IP address on the LAN interfaces
-- the highest IP address configured on the WAN interfaces

47. Given the IP address and subnet mask of 172.16.134.56 255.255.255.224, on which subnetwork does this address reside?
-- 172.0.0.0
-- 172.16.134.0
-- *** 172.16.134.32
-- 172.16.134.48
-- 172.16.134.47
-- 172.16.134.63

48. Which commands show when the last IGRP routing update was received? (Choose two.)
-- *** Router# show ip protocols
-- Router# show version
-- Router# show interfaces
-- Router# show ip updates
-- *** Router# show ip route

49. When using access control lists to filter traffic, which of the following is used to track multiple sessions occurring between hosts?
-- IP addresses
-- subnet masks
-- *** port numbers
-- routed protocols
-- routing protocols
-- interfaces

50. Given the IP address and subnet mask of 172.16.134.64 255.255.255.224, which of the following would describe this address?
-- This is a useable host address.
-- This is a broadcast address.
-- *** This is a network address.
-- This is not a valid address

51. The company network shown in the drawing has to be subnetted. The company has leased the Class C IP address of 200.1.2.0. Which of the following network addresses and masks would be appropriate for one of the subnetworks?
-- 200.1.2.96 255.255.255.192
-- *** 200.1.2.160 255.255.255.224
-- 200.1.2.80 255.255.255.224
-- 200.1.2.32 255.255.255.240

52. When connectionless protocols are implemented at the lower layers of the OSI model, what is usually used to acknowledge that was received and to request the retransmission of missing data?
-- IP
-- UDP
-- Ethernet
-- A connectionless acknowledgement
-- ****An upper-layer, connection-oriented protocol or service

54. Refer to the exhibit. Each media link is labeled. What type of cable should be used to connect the different devices?
-- Connection 1 – rollover cable
Connection 2 – straight-through cable
Connection 3 – crossover cable
-- Connection 1 – crossover cable
Connection 2 – rollover cable
Connection 3 – crossover cable
-- Connection 1 – straight-through cable
Connection 2 – crossover cable
Connection 3 – crossover cable
-- ****Connection 1 – straight-through cable
Connection 2 – crossover cable
Connection 3 – straight-through cable
-- Connection 1 – crossover cable
Connection 2 – straight-through cable
Connection 3 – crossover cable

54. Which OSI layer does IP rely on to determine whether packets have been lost and to request retransmission?
-- Application
-- Presentation
-- Session
-- ****Transport

55. What is true regarding network layer addressing? (Choose three.)
-- Uses a flat structure
-- Prevent broadcasts
-- ****Hierarchical
-- ****Uniquely identifies each host
-- 48 bits in length
-- ****Contains a network portion

56. A PC can not connect to any remote websites, ping its default gateway, or ping a printer that is functioning properly on the location segment. Which action will verify that the TCP/IP stack is functioning correctly on this PC?
-- Use the ipconfig /all command at the host’s command prompt.
-- ****Use the ping 127.0.0.1 command at the command prompt.
-- Use the traceroute command at the command prompt to identify any failures on the path to the gateway.
-- Use FTP to check for connectivity to remote sites.
-- Download a troubleshooting tool from the PC manufacturer’s website.

57. Which type of meia is immune to EMI and RFI? (Choose two.)
-- 10 Base-T
-- 10 Base-2
-- 10 Base-5
-- ****100 Base-FX
-- 100 Base TX
-- ****1000 Base LX

58. Refer to the exhibit. The command that is shown was issued on a PC. What does the IP address 192.168.33.2 represent?
-- IP address of the host
-- Default gateway of the host
-- IP address of the homepage for the host
-- ****Primary domain name server for the host
-- IP address of the website resolver1.mooki.local

59. Refer to the exhibit. The diagram represents the process of sending email between clients. Select the one that correctly identifies the
component or protocol used at each numbered stage of the diagram.
-- 1.MUA 2.MDA 3.MTA 4.SMTP 5.MTA 6.POP 7.MDA 8.MUA
-- 1.MUA 2.POP 3.MDA 4.SMTP 5.MTA 6.MDA 7.SMTP 8.MUA
-- 1.MUA 2.POP 3.SMTP 4.MDA 5.MTA 6.SMTP 7.POP 8.MUA
-- 1.MDA 2.SMTP 3.MTA 4.SMTP 5.MTA 6.MUA 7.POP 8.MDA
-- ****1.MUA 2.SMTP 3.MTA 4.SMTP 5.MTA 6.MDA 7.POP 8.MUA

60. Which three statements characterize the transport layer protocols? (Choose three.)
-- ****TCP and UDP port numbers are used by application layer protocols.
-- TCP uses port numbers to provide reliable transportation of IP packets.
-- UDP uses windowing and acknowledgments for reliable transfer of data.
-- ****TCP uses windowing and sequencing to provide reliable transfer of data.
-- ****TCP is a connection-oriented protocol, UDP is a connectionless protocol.

61. Which OSI layers offers reliable, connection-oriented data communication services?
-- application
-- presentation
-- session
-- ****transport
-- network

62. Examine the graphic with current configurations. Host A in the Clerical office failed and was replaced. Although a ping to 127.0.0.1 was
successful, the replacement computer cannot access the company network. With proxy ARP disabled on the Fa0/0 interface of the New York
router, what is the likely cause of the problem?
-- Network card failure
-- Network cables unplugged
-- IP address incorrectly entered
-- ****Subnet mask incorrectly entered

63. Refer to the exhibit. A network technician is trying to determine the correct IP address configuration for Host A. What is a valid
configuration for Host A?
-- IP address: 192.168.100.19; Subnet Mask: 255.255.255.248; Default Gateway: 192.16.1.2
-- ****IP address: 192.168.100.20; Subnet Mask: 255.255.255.240; Default Gateway: 192.168.100.17
-- IP address: 192.168.100.21; Subnet Mask: 255.255.255.248; Default Gateway: 192.168.100.18
-- IP address: 192.168.100.22; Subnet Mask: 255.255.255.240; Default Gateway: 10.1.1.5
-- IP address: 192.168.100.30; Subnet Mask: 255.255.255.240; Default Gateway: 192.168.1.1
-- IP address: 192.168.100.31; Subnet Mask: 255.255.255.240; Default Gateway: 192.168.100.18

64. As network administrator, what is the subnet mask that allows 510 hosts given the IP address 172.30.0.0?
-- 255.255.0.0
-- 255.255.248.0
-- 255.255.252.0
-- ****255.255.254.0
-- 255.255.255.0
-- 255.255.255.128

65. What are three characteristics of CSMA/CD? (Choose three.)
-- Devices can be configure with a higher transmission priority.
-- A jam signal indicates that the collision has cleared and the media is not busy.
-- ****A device listens and waits until the media is not busy before transmitting.
-- The device with the electronic token is the only one that can transmit after a collision.
-- ****All of the devices on a segment see data that passes on the network medium.
-- ****After detecting a collision, hosts can attempt to resume transmission after a random time delay has expired.

66. Which of the following are the address ranges of the private IP addresses? (Choose three.)
-- ****10.0.0.0 to 10.255.255.255
-- 200.100.50.0 to 200.100.25.255
-- 150.150.0.0 to 150.150.255.255
-- ****172.16.0.0 to 172.31.255.255
-- ****192.168.0.0 to 192.168.255.255
-- 127.16.0.0 to 127.31.255.255

67. Which combination of network id and subnet mask correctly identifies all IP addresses from 172.16.128.0 through 172.16.159.2?
-- 172.16.128.0 255.255.255.224
-- 172.16.128.0. 255.255.0.0
-- 172.16.128.0 255.255.192.0
-- ****172.16.128.0 255.255.224.0
-- 172.16.128.0 255.255.255.192

68. Which password is automatically encrypted when it is created?
-- Vty
-- Aux
-- Console
-- ****Enable secret
-- Enable password

69. Due to a security violation, the router passwords must be changed. What information can be learned from the following configuration
entries? (Choose two.)
Router(config)# line vty 0 3
Router(config-line)# password c13c0
Router(config-line)# login
-- The entries specify three Telnet lines for remote access.
-- ****The entries specify four Telnet lines for remote access.
-- The entries set the console and Telnet password to “c13c0”.
-- Telnet access will be denied because the Telnet configuration is incomplete.
-- ****Access will be permitted for Telnet using “c13c0” as the password.

70. When must a router serial interface be configured with the clock rate command?
-- When the interface is functioning as a DTE device
-- When the interface timers have been cleared
-- When the connected DTE device is shut down
-- ****When the interface is functioning as a DCE device

71. Which two functions of the OSI model occur at layer two? (Choose two.)
-- ****Physical addressing
-- Encoding
-- Routing
-- Cabling
-- ****Media access control

72. A routing issue has occurred in you internetwork. Which of the following type of devices should be examined to isolate this error?
-- Access point
-- Host
-- Hub
-- ****Router
-- Switch

73. Refer to the exhibit. With the router running NAT, what IP addresses can be applied to the computer to allow access to the Internet?
(Choose three.)
-- 192.168.18.38
-- 192.168.18.48
-- ****192.168.18.49
-- ****192.168.18.52
-- ****192.168.18.59
-- 192.168.18.63

74. Refer to the exhibit. What two facts can be determined from the information that is given? (Choose two.)
-- This exchange is part of the three-way handshake.
-- The source port indicates that a Telnet session has been initiated.
-- The data is flowing from server to client.
-- The destination port indicates that an HTTP session has been initiated.
-- ****The data listed is associated with the transport layer.
-- ****The source port does not support communication with the destination port that is listed.

75. Refer to the exhibit. Host A attempts to establish a TCP/IP session with host C. during this attempt, a frame was captured with the source
MAC address 0050.7320.D632 and the destination MAC address 0030.8517.44C4. The packet inside the captured frame has an IP source
address 192.168.7.5, and the destination IP address is 192.168.219.24. At which point in the network was this packet captured?
-- Leaving host A
-- Leaving ATL
-- ****Leaving Dallas
-- Leaving NYC

76. Refer to the exhibit. Cable 1 and cable 2 have the ends wired for specific physical layer requirements. The table lists each segment
number and the cable which has been installed by the network technician between the network components on that segment. Referring to the
data given, which segments have the correct cable installed? (Choose three.)
-- ****Segment1
-- Segment2
-- ****Segment3
-- ****Segment4
-- Segment5

77. Refer to the exhibit. What three statements are true about the IP configuration that is shown? (Choose three.)
-- ****The address that is assigned to the computer represents private addressing.
-- ****The computer is unable to communicate outside of the local network.
-- The network of this computer can have 126 hosts.
-- ****The prefix of the computer address is /27.
-- The IP address that is assigned to the computer is routable on the Internet.
-- The IP address that is assigned to the computer is a broadcast address.

78. Which three IPv4 addresses represent a broadcast for a subnet? (Choose three.)
-- ****172.16.4.63 /26
-- 172.16.4.129 /26
-- ****172.16.4.191 /26
-- 172.16.4.51 /27
-- ****172.16.4.95 /27
-- 172.16.4.221 /27

79. Refer to the exhibit. On the basis of the IP configuration that is shown, what is the reason that Host A and Host B are unable to
communicate outside the local network?
-- Host A was assigned a network address.
-- Host B was assigned a multicast address.
-- Host A and Host B belong to different networks.
-- ****The gateway address was assigned a broadcast address.

No comments:

Post a Comment