Network Fundamental Final Answers123

You might also like

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 81

1 When must a router serial interface be configured with the clock rate command?

when the interface is functioning as a DTE device


when the interface timers have been cleared
when the connected DTE device is shut down
when the interface is functioning as a DCE device

Observable Description Max Value


1 correctness of response 2 points for Option 4
0 points for any other option 2

11.2.4 Configuring Interfaces

2 Due to a security violation, the router passwords must be changed. What information can be learned
from the following configuration entries? (Choose two.)

Router(config)# line vty 0 3


Router(config-line)# password c13c0
Router(config-line)# login

The entries specify three Telnet lines for remote access.


The entries specify four Telnet lines for remote access.
The entries set the console and Telnet password to "c13c0".
Telnet access will be denied because the Telnet configuration is incomplete.
Access will be permitted for Telnet using "c13c0" as the password.

Observable Description Max Value


1 correctness of response Option 2 and Option 5 are correct.
1 point for each correct option.
0 points if more options are selected than required. 2

11.2.2 Limiting Device Access - Configuring Passwords and Using Banners


3

Refer to the exhibit. A network technician is trying to determine the correct IP address configuration for
Host A. What is a valid configuration for Host A?

IP address: 192.168.100.19; Subnet Mask: 255.255.255.248; Default Gateway: 192.16.1.2


IP address: 192.168.100.20; Subnet Mask: 255.255.255.240; Default Gateway: 192.168.100.17
IP address: 192.168.100.21; Subnet Mask: 255.255.255.248; Default Gateway: 192.168.100.18
IP address: 192.168.100.22; Subnet Mask: 255.255.255.240; Default Gateway: 10.1.1.5
IP address: 192.168.100.30; Subnet Mask: 255.255.255.240; Default Gateway: 192.168.1.1
IP address: 192.168.100.31; Subnet Mask: 255.255.255.240; Default Gateway: 192.168.100.18

Observable Description Max Value


1 correctness of response 2 points for Option 2
0 points for any other option 2

6.3.3 Assigning Addresses to Other Devices

4 A PC can not connect to any remote websites, ping its default gateway, or ping a printer that is
functioning properly on the local network segment. Which action will verify that the TCP/IP stack is
functioning correctly on this PC?

Use the ipconfig /all command at the host’s command prompt.


Use the ping 127.0.0.1 command at the command prompt.
Use the traceroute command at the command prompt to identify any failures on the path to the
gateway.
Use FTP to check for connectivity to remote sites.
Download a troubleshooting tool from the PC manufacturer's website.

Observable Description Max Value


1 correctness of response 2 points for Option 2
0 points for any other option 2

6.6.1 Ping 127.0.0.1 - Testing the Local Stack


5

Refer to the exhibit. When computer A sends a frame to computer D, what computers receive the
frame?

only computer D
only computer A and computer D
only computer B, computer C, and computer D
all computers

Observable Description Max Value


1 correctness of response 2 points for Option 1
0 points for any other option 2

9.6.3 Switches - Selective Forwarding

6 A technician is asked to secure the privileged EXEC mode of a switch by requiring a password. Which
type of password would require this login and be considered the most secure?

console
enable
enable secret
VTY

Observable Description Max Value


1 correctness of response 2 points for Option 3
0 points for any other option 2

11.2.2 Limiting Device Access - Configuring Passwords and Using Banners

7 Which OSI layer does IP rely on to determine whether packets have been lost and to request
retransmission?
application
presentation
session
transport

Observable Description Max Value


1 correctness of response 2 points for Option 4
0 points for any other option 2

5.1.4 The IP v4 Protocol - Best Effort

Refer to the exhibit. A network administrator remotely accesses the CLI of Router B from PC1 using
Telnet. Which statement is true about this connection?

The data is automatically encrypted.


A Telnet server process is running on PC1.
The connection is made through a VTY session on the router.
A GET request was sent to RouterB to retrieve data during this session.

Observable Description Max Value


1 correctness of response 2 points for Option 3
0 points for any other option 2

11.1.1 Cisco IOS

9 Which three IPv4 addresses represent valid host addresses for a subnet? (Choose three.)

10.1.12.79/28
10.1.12.113/28
10.1.12.32/28
10.1.11.5/27
10.1.11.97/27
10.1.11.128/27

Observable Description Max Value


1 correctness of response Option 2, Option 4, and Option 5 are correct.
1 point for each correct option.
0 points if more options are selected than required. 3

6.2.1 Types of Addresses in an IPv4 Network

10 What is the effect of using the Router# copy running-config startup-config command on a router?

The contents of ROM will change.


The contents of RAM will change.
The contents of NVRAM will change.
The contents of flash will change.

Observable Description Max Value


1 correctness of response 2 points for Option 3
0 points for any other option 2

11.2.3 Managing Configuration Files

11

Refer to the exhibit. A PC is communicating with another PC on a remote network. The two networks are
connected by three routers. Which action will help to identify the path between the hosts?

Use the ipconfig command at the host.


Use the ipconfig/all command at the destination.
Use the tracert command at the host.
Use the ping command at the destination.
Observable Description Max Value
1 correctness of response 2 points for Option 3
0 points for any other option 2

6.6.4 Traceroute (tracert) - Testing the Path

12

Refer to the exhibit. A PC is connected to a network. Which action will verify that the PC can
communicate with its default gateway?

Use the ping 127.0.0.1 command.


Use the ipconfig command.
Use the ipconfig/all command.
Use the ping 10.0.0.254 command.

Observable Description Max Value


1 correctness of response 2 points for Option 4
0 points for any other option 2

6.6.2 Ping Gateway - Testing Connectivity to the Local LAN

13

Refer to the exhibit. Host C is able to ping 127.0.0.1 successfully, but is unable to communicate with
hosts A and B in the organization. What is the likely cause of the problem?

Hosts A and B are not on the same subnet as host C.


The IP addresses on the router serial interfaces are wrong.
The subnet mask on host C is improperly configured.
The FastEthernet interface fa0/0 of router 1 is wrongly configured.

Observable Description Max Value


1 correctness of response 2 points for Option 3
0 points for any other option 2

6.5.3 Subnetting - Subnetting a Subnet

14

Refer to the exhibit. Host A and B are unable to communicate with each other. What is the reason for
this?

Host A is assigned a network address.


Host B is assigned a multicast address.
Host A and host B belong to different networks.
The gateway addresses are network addresses.

Observable Description Max Value


1 correctness of response 2 points for Option 4
0 points for any other option 2

6.2.1 Types of Addresses in an IPv4 Network

15

Refer to the exhibit. Which list refers only to end devices?

D,E,F,G
A,H,B,C
A,D,E,F
A,D,E,G
Observable Description Max Value
1 correctness of response 2 points for Option 1
0 points for any other option 2

2.1.5 Intermediary Devices and their Role on the Network

16

Refer to the exhibit. PC1 is unable to access PC2. To troubleshoot this problem, the technician needs to
confirm that the next hop interface is operational. Which default gateway address should the technician
ping from PC1 to confirm this?

10.0.0.254
192.168.0.249
192.168.0.250
10.0.1.254

Observable Description Max Value


1 correctness of response 2 points for Option 1
0 points for any other option 2

11.3.4 Testing Gateway and Remote Connectivity

17

Refer to the exhibit. While configuring a network, a technician wired each end of a Category 5e cable as
shown. Which two statements are true about this setup? (Choose two.)

The cable is suitable for connecting a switch to a router Ethernet port.


The cable is suitable for connecting dissimilar types of devices.
The cable is unusable and must be rewired.
The cable is terminated in a way that the transmit pin is wired to the receive pin.
The cable simulates a point-to-point WAN link.
Observable Description Max Value
1 correctness of response Option 1 and Option 2 are correct.
1 point for each correct option.
0 points if more options are selected than required. 2

10.2.2 Making LAN Connections

18

Refer to the exhibit. The serial interface of the router was configured with the use of the commands that
are shown. The router cannot ping the router that is directly connected to interface serial 0/0/0. What
should the network technician do to solve this problem?

Configure the description at interface serial 0/0/0.


Configure an IP address on interface serial 0/0/0.
Remove the no shutdown command at interface serial 0/0/0
Reboot the router.

Observable Description Max Value


1 correctness of response 2 points for Option 2
0 points for any other option 2

11.3.2 Testing the Interface Assignment

19 Which subnet mask will allow 2040 hosts per subnet on the IP network 10.0.0.0?

255.255.0.0
255.255.254.0
255.255.252.0
255.255.248.0
255.255.240.0
255.255.255.128

Observable Description Max Value


1 correctness of response 2 points for Option 4
0 points for any other option 2

6.5.5 Calculating the Number of Hosts

20

Refer to the exhibit. The nslookup command that is shown was issued on a Windows PC host. What does
the 10.32.5.74 address represent?

the IP address of the host


the default gateway for the host
the primary DNS server for the host
the home page address for the host

Observable Description Max Value


1 correctness of response 2 points for Option 3
0 points for any other option 2

3.3.1 DNS Services and Protocol

21

Refer to the exhibit. What three statements are true about the IP configuration that is shown? (Choose
three.)
The prefix of the subnet mask is /26.
The network on which this computer resides can have 30 hosts.
The computer is unable to communicate outside of the local network.
The address that is assigned to the computer represents private addressing.
The IP address that is assigned to the computer is routable on the Internet.
The IP address that is assigned as the default gateway is valid for this host.

Observable Description Max Value


1 correctness of response Option 2, Option 3, and Option 4 are correct.
1 point for each correct option.
0 points if more options are selected than required. 3

6.2.7 Legacy IPv4 Addressing


6.5.1 Basic subnetting

22 Which two actions could be taken by a router if a specific match is not made to a route in the routing
table? (Choose two.)

The packet will be discarded.


The packet will be sent back to the source.
The packet will be flooded out all interfaces.
Neighboring routers are polled to find the best path.
The packet will be forwarded to a default route if one is present.

Observable Description Max Value


1 correctness of response Option 1 and Option 5 are correct.
1 point for each correct option.
0 points if more options are selected than required. 2

5.3.4 A Route - The Path to a Network


23

Refer to the exhibit. Which layered network model is shown in the diagram?

Cisco
IETF
OSI
TCP/IP

Observable Description Max Value


1 correctness of response 2 points for Option 4
0 points for any other option 2

2.4.2 Protocol and Reference Models

24 Which OSI layer addressing is required to route packets between two networks?

Layer 1
Layer 2
Layer 3
Layer 4

Observable Description Max Value


1 correctness of response 2 points for Option 3
0 points for any other option 2

2.5.3 Getting the Data through the Internetwork


25 What type of network is maintained if a server takes no dedicated role in the network?

mainframe
client/server
peer-to-peer
centralized

Observable Description Max Value


1 correctness of response 2 points for Option 3
0 points for any other option 2

3.2.4 Peer-to-Peer Networking and Applications (P2P)

26 A routing issue has occurred in your internetwork. Which of the following type of devices should be
examined to isolate this error?

access point
host
hub
router
switch

Observable Description Max Value


1 correctness of response 2 points for Option 4
0 points for any other option 2

5.3.4 A Route - The Path to a Network

27 Which statement is true about Layer 3 addresses?


They are physical addresses.
They are used in routing decisions.
They are only used on local networks.
They are altered each time a packet crosses a router.

Observable Description Max Value


1 correctness of response 2 points for Option 2
0 points for any other option 2

2.5.3 Getting the Data through the Internetwork

28 Which physical component is used to access and perform the initial configuration on a new
unconfigured router?

Observable Description Max Value


1 correctness of response 2 points for Option 2
0 points for any other option 2
11.1.1 Cisco IOS

29 Which option shows how a router will route packets to a remote network?

Observable Description Max Value


1 correctness of response 2 points for Option 4
0 points for any other option 2

5.3.4 A Route - The Path to a Network

30 What is the Cisco IOS?

system software for Cisco devices


Read Only Memory in Cisco devices
non-volatile storage for device configurations
an initial operating system that is used for boot functions
Observable Description Max Value
1 correctness of response 2 points for Option 1
0 points for any other option 2

11.1.1 Cisco IOS

31

Refer to the exhibit. Host A is configured with the correct IP address for the default gateway of the
router R1 FastEthernet0/1 interface. How will a packet that is sent from host A to host B be handled by
the devices on the network?

R1 will drop the packet because R1 does not have a specific route in its routing table to the 10.1.1.0/24
network.
R1 will forward the packet to its default gateway, the next hop router R2. R2 will forward the packet to
the directly connected network 10.1.1.0/24.
R1 will forward the packet to its default gateway, the next hop router R2. R2 will drop the packet
because it does not have a default route to network 10.1.1.0/24.
R1 will forward the packet to its default gateway, the next hop router R2. R2 will drop the packet
because it does not have a route that is learned by a routing protocol to network 10.1.1.0/24.

Observable Description Max Value


1 correctness of response 2 points for Option 2
0 points for any other option 2

5.3.5 The Destination Network

32 What can the user do from the command prompt, Router(config-line)# ?

Configure one of the network interfaces.


Configure one of the physical or virtual lines.
Verify the running configuration on the device.
Configure the parameters for one of the routing protocols.

Observable Description Max Value


1 correctness of response 2 points for Option 2
0 points for any other option 2

11.1.7 IOS Configuration Modes

33 Which table accurately associates the RFC 1918 private IP addresses with the correct network mask?

Observable Description Max Value


1 correctness of response 2 points for Option 3
0 points for any other option 2

6.2.5 Public and Private Addresses

34
Refer to the exhibit. A network technician has made several changes to R1 since the configuration has
last been saved. The modified configuration did not produce the desired changes. The technician wants
to store a backup copy of the saved configuration on a TFTP server before reloading. Which action will
cause the unmodified data to be saved on the TFTP server?

Observable Description Max Value


1 correctness of response 2 points for Option 2
0 points for any other option 2

11.2.3 Managing Configuration Files

35 What happens when a host station receives a frame that contains its own MAC address in the
destination field?

The Layer 2 information is removed and the frame is pushed up to Layer 3.


The host station will copy the information to its buffers and send it back out.
The frame originated from the host and will be ignored.
The Layer 3 information is added to the frame.
Observable Description Max Value
1 correctness of response 2 points for Option 1
0 points for any other option 2

2.5.2 Getting the Data to the End Device

36 What information can be gathered by using the command netstat?

the default gateway


the routing protocol
active TCP connections
the locally configured subnet mask

Observable Description Max Value


1 correctness of response 2 points for Option 3
0 points for any other option 2

4.1.5 Port Addressing

37 Which option represents a point-to-point logical topology diagram?


Observable Description Max Value
1 correctness of response 2 points for Option 4
0 points for any other option 2

7.2.4 Logical Topology vs Physical Topology

38 How many host addresses may be assigned when using the 128.107.0.0 network address with a
subnet mask of 255.255.248.0?

30
256
2046
2048
4094
4096

Observable Description Max Value


1 correctness of response 2 points for Option 3
0 points for any other option 2

6.5.1 Basic subnetting

39 Which three addresses are private IP addresses? (Choose three.)

10.0.0.1
46.1.1.88
172.31.31.10
172.32.16.10
192.168.8.8
Observable Description Max Value
1 correctness of response Option 1, Option 3, and Option 5 are correct.
1 point for each correct option.
0 points if more options are selected than required. 3

6.2.5 Public and Private Addresses

40 An administrator is in the middle of entering a lengthy command when suddenly output from the IOS
appears stating that an interface has gone down and then up again. Consequently, the command that
the administrator was typing is no longer legible on the terminal. What CLI keystrokes can be entered to
return to the line that the administrator was typing?

Ctrl-D
Ctrl-K
Ctrl-R
Ctrl-Z

Observable Description Max Value


1 correctness of response 2 points for Option 3
0 points for any other option 2

11.1.5 Using CLI Help

41 Which TCP/IP model layer creates additional overhead on network resources due to
acknowledgments, tracking, and retransmission of data?

internet
transport
application
network access

Observable Description Max Value


1 correctness of response 2 points for Option 2
0 points for any other option 2

4.1.3 Supporting Reliable Communication

42 What is the consequence of issuing the erase startup-config command in privileged EXEC mode on a
Cisco router?

Data stored in RAM will be removed.


Data stored in NVRAM will be erased.
Information in flash memory will be removed.
Flags in the configuration register will be set to 0.
Both the startup-config and the running-config will be erased.

Observable Description Max Value


1 correctness of response 2 points for Option 2
0 points for any other option 2

11.2.3 Managing Configuration Files

43 Which service is used when the nslookup command is issued on a computer?

FTP
DNS
DHCP
Telnet
Observable Description Max Value
1 correctness of response 2 points for Option 2
0 points for any other option 2

3.3.1 DNS Services and Protocol

44

Refer to the exhibit. Which two layers of the OSI model describe the same functions as the transport and
internet layers of the TCP/IP model? (Choose two.)

application layer
presentation layer
session layer
transport layer
network layer
data link layer
physical layer

Observable Description Max Value


1 correctness of response Option 4 and Option 5 are correct.
1 point for each correct option.
0 points if more options are selected than required. 2

2.4.8 Comparing the OSI Model with the TCP/IP Model

45 In a network design project, a network designer needs to select a device to provide collision free
connections to 40 hosts on the LAN. Which device should be selected?

hub
router
switch
firewall

Observable Description Max Value


1 correctness of response 2 points for Option 3
0 points for any other option 2

9.6.2 Ethernet - Using Switches

46 Which command or commands will require authentication to access the privileged exec mode?

RTRA(config)# enable secret cisco


RTRA(config)# service password encryption
RTRA(config)# line con 0
RTRA(config-line)# login
RTRA(config-line)# password cisco
RTRA(config)# line vty 0 4
RTRA(config-line)# login
RTRA(config-line)# password cisco

Observable Description Max Value


1 correctness of response 2 points for Option 1
0 points for any other option 2

11.1.3 Cisco IOS Modes

47 An administrator makes changes to the default configuration of a router and saves them to NVRAM.
After testing, it is discovered that the configurations did not have the desired effect and must be
removed. What steps must be taken to remove the changes and return the router to the default
configuration?

Reboot the router.


Use no version of the commands that are issued.
Issue the erase startup-config command, and then reboot the router.
Issue the erase running-config command, and then reboot the router.

Observable Description Max Value


1 correctness of response 2 points for Option 3
0 points for any other option 2

11.2.3 Managing Configuration Files

48

Refer to the exhibit. The network administrator remotely accesses the CLI of RouterB from PC1 using a
secure connection. Which statement is true about this connection?

The Telnet server process is running on PC1.


Only the exchange of the Telnet username and password is encrypted.
The GET request is sent to RouterA to retrieve data.
The SSH service is used to connect PC1 to RouterB.

Observable Description Max Value


1 correctness of response 2 points for Option 4
0 points for any other option 2

11.1.1 Cisco IOS

49
Refer to the exhibit. An administrator on PC1 wants to view some HTML code from a web page housed
on the web server. Which client application will allow this request to be started?

Observable Description Max Value


1 correctness of response 2 points for Option 1
0 points for any other option 2

3.2.1 The Client-Server Model

50 Which router configuration mode will require user authentication if an administrator issues the
enable secret command?

user executive mode


privileged executive mode
global configuration mode
service specific configuration mode

Observable Description Max Value


1 correctness of response 2 points for Option 2
0 points for any other option 2

1 Which of the following are the address ranges of the private IP addresses? (Choose three.)

10.0.0.0 to 10.255.255.255
200.100.50.0 to 200.100.25.255
150.150.0.0 to 150.150.255.255
172.16.0.0 to 172.31.255.255
192.168.0.0 to 192.168.255.255
127.16.0.0 to 127.31.255.255

Observable Description Max Value


1 correctness of response Option 1, Option 4, and Option 5 are correct.
1 point for each correct option.
0 points if more options are selected than required. 3

6.2.5 Public and Private Addresses

2 What are three characteristics of CSMA/CD? (Choose three.)

Devices can be configured with a higher transmission priority.


A jam signal indicates that the collision has cleared and the media is not busy.
A device listens and waits until the media is not busy before transmitting.
The device with the electronic token is the only one that can transmit after a collision.
All of the devices on a segment see data that passes on the network medium.
After detecting a collision, hosts can attempt to resume transmission after a random time delay has
expired.

Observable Description Max Value


1 correctness of response Option 3, Option 5, and Option 6 are correct.
1 point for each correct option.
0 points if more options are selected than required. 3
9.4.2 CSMA/CD - The Process

3 Which password is automatically encrypted when it is created?

vty
aux
console
enable secret
enable password

Observable Description Max Value


1 correctness of response 2 points for Option 4
0 points for any other option 2

11.2.2 Limiting Device Access - Configuring Passwords and Using Banners

Refer to the exhibit. Which type of network design is shown?

client/server
wide area
dedicated server
peer-to-peer

Observable Description Max Value


1 correctness of response 2 points for Option 4
0 points for any other option 2
3.2.4 Peer-to-Peer Networking and Applications (P2P)

Refer to the exhibit. Assume all devices are using default configurations. How many subnets are
required to address the topology that is shown?

1
3
4
5
7

Observable Description Max Value


1 correctness of response 2 points for Option 2
0 points for any other option 2

10.3.2 How Many Networks?

Refer to the exhibit. A technician is working on a network problem that requires verification of the
router LAN interface. What address should be pinged from this host to confirm that the router interface
is operational?

127.0.0.1
192.168.64.196
192.168.254.1
192.168.254.9
192.168.254.254
Observable Description Max Value
1 correctness of response 2 points for Option 3
0 points for any other option 2

11.3.4 Testing Gateway and Remote Connectivity

Refer to the exhibit. The tracert command is initiated from PC1 to PC4. Which device will send a
response to the initial tracert packet from PC1?

Athens
Ankara
London
Paris
PC4

Observable Description Max Value


1 correctness of response 2 points for Option 3
0 points for any other option 2

6.6.4 Traceroute (tracert) - Testing the Path

Refer to the exhibit. Each media link is labeled. What type of cable should be used to connect the
different devices?

Connection 1 - rollover cable


Connection 2 - straight-through cable
Connection 3 - crossover cable
Connection 1 - crossover cable
Connection 2 - rollover cable
Connection 3 - crossover cable
Connection 1 - straight-through cable
Connection 2 - crossover cable
Connection 3 - crossover cable
Connection 1 - straight-through cable
Connection 2 - crossover cable
Connection 3 - straight-through cable
Connection 1 - crossover cable
Connection 2 - straight-through cable
Connection 3 - crossover cable

Observable Description Max Value


1 correctness of response 2 points for Option 4
0 points for any other option 2

8.3.3 Unshielded Twisted Pair (UTP) Cable

9 Which OSI layer offers ordered data reconstruction services?

application layer
network layer
presentation layer
session layer
transport layer

Observable Description Max Value


1 correctness of response 2 points for Option 5
0 points for any other option 2

4.1.2 Controlling the Conversations


10

Refer to the exhibit. The diagram represents the process of sending e-mail between clients. Which list
correctly identifies the component or protocol used at each numbered stage of the diagram?

1.MUA 2.MDA 3.MTA 4.SMTP 5.MTA 6.POP 7.MDA 8.MUA


1.MUA 2.POP 3.MDA 4.SMTP 5.MTA 6.MDA 7.SMTP 8.MUA
1.MUA 2.POP 3.SMTP 4.MDA 5.MTA 6.SMTP 7.POP 8.MUA
1.MUA 2.SMTP 3.MTA 4.SMTP 5.MTA 6.MDA 7.POP 8.MUA

Observable Description Max Value


1 correctness of response 2 points for Option 4
0 points for any other option 2

3.3.3 E-mail Services and SMTP/POP Protocols

11

Refer to the exhibit. The router of the company failed and was replaced. After the replacement, hosts C
and D in the Education office are able to ping each other, but they are unable to access the hosts in the
Accounts office. What is the likely cause of the problem?

The IP address at the fa0/0 interface of the router is incorrectly configured.


The subnet mask at the fa0/1 interface of the router is incorrectly entered.
The IP address at the serial interface of the router is incorrectly configured.
The hosts in the Accounts office are not on the same subnet as the hosts in the Education office.

Observable Description Max Value


1 correctness of response 2 points for Option 2
0 points for any other option 2
6.5.3 Subnetting - Subnetting a Subnet

12

Refer to the exhibit. Host A wants to connect to host B on a different network. Which three IP addresses
can be assigned to host A to enable this connectivity? (Choose three.)

172.16.11.36
172.16.11.95
172.16.11.88
172.16.11.70
172.16.11.64
172.16.11.67

Observable Description Max Value


1 correctness of response Option 3, Option 4, and Option 6 are correct.
1 point for each correct option.
0 points if more options are selected than required. 3

6.3.1 Planning to Address the Network

13

Refer to the exhibit. A host is connected to hub 1. Which combination of IP address, subnet mask, and
default gateway can allow this host to function in the network?

IP address: 172.16.31.36 Subnet mask: 255.255.255.240 Default gateway: 172.16.31.35


IP address: 172.16.31.63 Subnet mask: 255.255.255.224 Default gateway: 172.16.31.35
IP address: 172.16.31.29 Subnet mask: 255.255.255.248 Default gateway: 172.16.31.35
IP address: 172.16.31.32 Subnet mask: 255.255.255.224 Default gateway: 172.16.31.35
IP address: 172.16.31.29 Subnet mask: 255.255.255.240 Default gateway: 172.16.30.1
IP address: 172.16.31.37 Subnet mask: 255.255.255.224 Default gateway: 172.16.31.35
Observable Description Max Value
1 correctness of response 2 points for Option 6
0 points for any other option 2

6.5.7 Assigning Addresses

14

Refer to the exhibit. Host A is accessing multiple servers. Which combination of port number and
address will uniquely identify a particular process running on a specific server?

MAC address of the server and port number of the service


IP address of the host and port number of the service
MAC address of the host and port number of the service
IP address of the server and port number of the service

Observable Description Max Value


1 correctness of response 2 points for Option 4
0 points for any other option 2

4.1.5 Port Addressing

15

Refer to the exhibit. Which list refers only to end devices?

D,E,F,G
A,H,B,C
A,D,E,F
A,D,E,G
Observable Description Max Value
1 correctness of response 2 points for Option 1
0 points for any other option 2

2.1.5 Intermediary Devices and their Role on the Network

16

Refer to the exhibit. An employee wants to access the organization intranet from home. Which
intermediary device should be used to connect the organization intranet to the Internet to enable this
access?

hub
switch
router
wireless access point

Observable Description Max Value


1 correctness of response 2 points for Option 3
0 points for any other option 2

1.5.1 Where Is It All Going?

17

Refer to the exhibit. Host A sends a frame with the destination MAC address as FFFF.FFFF.FFFF. What
action will the switch take for this frame?

It will drop the frame.


It will send the frame back to host A.
It will send the frame to all hosts except host A.
It will forward the frame to the default gateway.

Observable Description Max Value


1 correctness of response 2 points for Option 3
0 points for any other option 2

9.6.3 Switches - Selective Forwarding

18 Which two types of media can provide bandwidth up to 1 Gb/s? (Choose two.)

10 BASE-T
100 BASE-T
100 BASE-FX
1000 BASE-TX
1000 BASE-SX

Observable Description Max Value


1 correctness of response Option 4 and Option 5 are correct.
1 point for each correct option.
0 points if more options are selected than required. 2

10.2.1 LAN and WAN - Getting Connected

19

Refer to the exhibit. Which logical topology describes the exhibited network?

star
ring
point-to-point
multi-access

Observable Description Max Value


1 correctness of response 2 points for Option 2
0 points for any other option 2

2.4.1 The Benefits of Using a Layered Model

20 A routing issue has occurred in your internetwork. Which of the following type of devices should be
examined to isolate this error?

access point
host
hub
router
switch

Observable Description Max Value


1 correctness of response 2 points for Option 4
0 points for any other option 2

5.3.4 A Route - The Path to a Network

21 Which physical component is used to access and perform the initial configuration on a new
unconfigured router?
Observable Description Max Value
1 correctness of response 2 points for Option 2
0 points for any other option 2

11.1.1 Cisco IOS

22 Which option shows how a router will route packets to a remote network?
Observable Description Max Value
1 correctness of response 2 points for Option 4
0 points for any other option 2

5.3.4 A Route - The Path to a Network

23 What is the Cisco IOS?

system software for Cisco devices


Read Only Memory in Cisco devices
non-volatile storage for device configurations
an initial operating system that is used for boot functions

Observable Description Max Value


1 correctness of response 2 points for Option 1
0 points for any other option 2

11.1.1 Cisco IOS

24 What can the user do from the command prompt, Router(config-line)# ?

Configure one of the network interfaces.


Configure one of the physical or virtual lines.
Verify the running configuration on the device.
Configure the parameters for one of the routing protocols.

Observable Description Max Value


1 correctness of response 2 points for Option 2
0 points for any other option 2

11.1.7 IOS Configuration Modes

25 Which option correctly identifies the interface or interfaces used to connect the router to a CSU/DSU
for WAN connectivity?

Observable Description Max Value


1 correctness of response 2 points for Option 4
0 points for any other option 2

10.2.3 Making WAN Connections

26 Which physical connector type is used for a serial V.35 connection to the CSU/DSU?
Observable Description Max Value
1 correctness of response 2 points for Option 4
0 points for any other option 2

10.2.3 Making WAN Connections

27

Refer to the exhibit. A network technician has made several changes to R1 since the configuration has
last been saved. The modified configuration did not produce the desired changes. The technician wants
to store a backup copy of the saved configuration on a TFTP server before reloading. Which action will
cause the unmodified data to be saved on the TFTP server?
Observable Description Max Value
1 correctness of response 2 points for Option 2
0 points for any other option 2

11.2.3 Managing Configuration Files

28 A network administrator subnets the network 192.168.1.0/24 into four subnets. Which option
correctly addresses Router1 and host A into the second subnet created?

Observable Description Max Value


1 correctness of response 2 points for Option 3
0 points for any other option 2

6.5.1 Basic subnetting

29 A network has grown too large for technicians to configure network addresses and hosts files for
name resolution. Which two application layer services should be added to the server to allow these
needs to be satisfied dynamically? (Choose two.)
DNS
FTP
DHCP
HTTP
SMTP

Observable Description Max Value


1 correctness of response Option 1 and Option 3 are correct.
1 point for each correct option.
0 points if more options are selected than required. 2

3.3.1 DNS Services and Protocol


3.3.5 DHCP

30 What happens when a host station receives a frame that contains its own MAC address in the
destination field?

The Layer 2 information is removed and the frame is pushed up to Layer 3.


The host station will copy the information to its buffers and send it back out.
The frame originated from the host and will be ignored.
The Layer 3 information is added to the frame.

Observable Description Max Value


1 correctness of response 2 points for Option 1
0 points for any other option 2

2.5.2 Getting the Data to the End Device

31
Refer to the exhibit. An administrator made several changes to the configuration of the router but did
not accomplish the desired result. To undo the changes the reload command was used. What will
happen if the administrator answers yes to the prompt?

The changes will be lost and the configuration file in RAM will be loaded.
The changes will be saved and the configuration file in RAM will be loaded.
The changes will be lost and the configuration file in NVRAM will be loaded.
The changes will be saved and the configuration file in NVRAM will be loaded.

Observable Description Max Value


1 correctness of response 2 points for Option 4
0 points for any other option 2

11.2.3 Managing Configuration Files

32 How can ARP be used to help document the network?

It can list each hop on the way to a destination host.


It can show the average latency of hosts on the network.
It can provide a list of physical addresses on the network.
It can indicate which hosts are not responding to network traffic.

Observable Description Max Value


1 correctness of response 2 points for Option 3
0 points for any other option 2

11.4.3 Learning About the Nodes on the Network

33
Refer to the exhibit. A network administrator is troubleshooting a link that is down between Router1
and Router2. To correct the problem, which wire pairs need to be switched on one of the Ethernet cable
ends?

pair 1 and pair 2


pair 1 and pair 3
pair 2 and pair 3
pair 2 and pair 4

Observable Description Max Value


1 correctness of response 2 points for Option 3
0 points for any other option 2

8.3.3 Unshielded Twisted Pair (UTP) Cable

34 A network administrator is asked to design a new addressing scheme for a corporate network. There
are 60 users in the main office, 40 users in the branch office, 28 users in manufacturing, 12 in the sales
office, and 4 users in the research office. Which VLSM addressing scheme that uses the 192.168.88.0/24
network will fulfill the requirements while wasting the fewest addresses?

192.168.88.0/26 main
192.168.88.32/26 branch
192.168.88.64/26 manufacturing
192.168.88.96/27 sales
192.168.88.128/28 research
192.168.88.0/26 main
192.168.88.64/26 branch
192.168.88.128/27 manufacturing
192.168.88.160/28 sales
192.168.88.176/29 research
192.168.88.0/27 main
192.168.88.32/27 branch
192.168.88.64/28 manufacturing
192.168.88.80/29 sales
192.168.88.88/30 research
192.168.88.0/27 main
192.168.88.64/28 branch
192.168.88.80/28 manufacturing
192.168.88.96/29 sales
192.168.88.104/30 research

Observable Description Max Value


1 correctness of response 2 points for Option 2
0 points for any other option 2

6.5.3 Subnetting - Subnetting a Subnet

35

Refer to the exhibit. Host A is able to access resources on the local LAN but is unable to access any
resources on the Internet. What is the likely cause of this problem?

The host subnet mask in incorrect.


The network uses private addresses.
The host address is a network address.
The default gateway is on a different subnet from the host.

Observable Description Max Value


1 correctness of response 2 points for Option 4
0 points for any other option 2

6.6.2 Ping Gateway - Testing Connectivity to the Local LAN

36 An administrator is in the middle of entering a lengthy command when suddenly output from the IOS
appears stating that an interface has gone down and then up again. Consequently, the command that
the administrator was typing is no longer legible on the terminal. What CLI keystrokes can be entered to
return to the line that the administrator was typing?

Ctrl-D
Ctrl-K
Ctrl-R
Ctrl-Z

Observable Description Max Value


1 correctness of response 2 points for Option 3
0 points for any other option 2

11.1.5 Using CLI Help

37 Which requirement would cause a network designer to use a router instead of a switch in a network
design?

creating smaller collision domains


providing both UTP and fiber ports
connecting end-user devices to the network core
interconnecting several networks using different technologies

Observable Description Max Value


1 correctness of response 2 points for Option 4
0 points for any other option 2

10.1.1 Choosing the Appropriate LAN Device

38 Which application layer protocol allows administrators to log into a server from remote locations and
control a server as though logged in locally?
DNS
FTP
DHCP
SMTP
Telnet

Observable Description Max Value


1 correctness of response 2 points for Option 5
0 points for any other option 2

3.1.1 OSI and TCP/IP Model

39 Which TCP/IP model layer creates additional overhead on network resources due to
acknowledgments, tracking, and retransmission of data?

internet
transport
application
network access

Observable Description Max Value


1 correctness of response 2 points for Option 2
0 points for any other option 2

4.1.3 Supporting Reliable Communication

40 Which password would allow a user to establish a Telnet session with a Cisco device?

VTY password
enable password
console password
enable secret password

Observable Description Max Value


1 correctness of response 2 points for Option 1
0 points for any other option 2

11.2.2 Limiting Device Access - Configuring Passwords and Using Banners

41 A network technician has made a UTP cable that is terminated as T568A on one end and T568B on
the opposite end. What type of cable has been constructed?

patch
console
crossover
straight-through

Observable Description Max Value


1 correctness of response 2 points for Option 3
0 points for any other option 2

10.2.2 Making LAN Connections

42 Which identifier is contained in the header of the Layer 2 Ethernet frame?

timing and synchronization of bits


source and destination port numbers
logical source and destination addresses
physical source and destination addresses
Observable Description Max Value
1 correctness of response 2 points for Option 4
0 points for any other option 2

2.5.1 Addressing in the Network

43

Refer to the exhibit. Which two layers of the OSI model describe the same functions as the transport and
internet layers of the TCP/IP model? (Choose two.)

application layer
presentation layer
session layer
transport layer
network layer
data link layer
physical layer

Observable Description Max Value


1 correctness of response Option 4 and Option 5 are correct.
1 point for each correct option.
0 points if more options are selected than required. 2

2.4.8 Comparing the OSI Model with the TCP/IP Model

44 Which prompt is associated with the privileged exec mode?

R1>
R1#
R1(config)#
R1(config-router)#

Observable Description Max Value


1 correctness of response 2 points for Option 2
0 points for any other option 2

11.1.3 Cisco IOS Modes

45 Which location of router memory is cleared with the erase startup-config command?

flash
RAM
ROM
NVRAM

Observable Description Max Value


1 correctness of response 2 points for Option 4
0 points for any other option 2

11.2.3 Managing Configuration Files

46 An administrator makes changes to the default configuration of a router and saves them to NVRAM.
After testing, it is discovered that the configurations did not have the desired effect and must be
removed. What steps must be taken to remove the changes and return the router to the default
configuration?

Reboot the router.


Use no version of the commands that are issued.
Issue the erase startup-config command, and then reboot the router.
Issue the erase running-config command, and then reboot the router.

Observable Description Max Value


1 correctness of response 2 points for Option 3
0 points for any other option 2

11.2.3 Managing Configuration Files

47 A technician wishes to connect two computers to move data from one to the other before reloading
the operating system. The NICs on both PCs do not support autosensing feature. Which procedure will
satisfy the requirement?

Interconnect the two PCs with a rollover cable.


Interconnect the two PCs with two rollover cables and a hub.
Interconnect the two PCs with a crossover cable.
Interconnest the two PCs with two crossover cables and a hub.

Observable Description Max Value


1 correctness of response 2 points for Option 3
0 points for any other option 2

10.2.2 Making LAN Connections

48

Refer to the exhibit. From global configuration mode, an administrator is attempting to create a
message-of-the-day banner by using the command banner motd V Authorized access only! Violators will
be prosecuted! V When users log in using Telnet, the banner does not appear correctly. What is the
problem?
The banner message is too long.
The delimiting character appears in the banner message.
The symbol “!” signals the end of a banner message.
Message-of-the-day banners will only appear when a user logs in through the console port.

Observable Description Max Value


1 correctness of response 2 points for Option 2
0 points for any other option 2

11.2.2 Limiting Device Access - Configuring Passwords and Using Banners

49

Refer to the exhibit. Which two facts can be determined about the topology? (Choose two.)

Three networks are needed.


Two logical address ranges are required.
Three broadcast domains are present.
Three collision domains are present.
Four networks are needed.

Observable Description Max Value


1 correctness of response Option 2 and Option 4 are correct.
1 point for each correct option.
0 points if more options are selected than required. 2

5.2.2 Why Separate Hosts Into Networks? - Performance


10.1.1 Choosing the Appropriate LAN Device

50 Which answer lists the CLI mode hierarchy from least level of privilege to greatest?
global, privileged, user, specific
global, user, privileged, specific
user, global, privileged, specific
user, privileged, global, specific

Observable Description Max Value


1 correctness of response 2 points for Option 4
0 points for any other option 2

1 What are three characteristics of CSMA/CD? (Choose three.)

Devices can be configured with a higher transmission priority.


A jam signal indicates that the collision has cleared and the media is not busy.
A device listens and waits until the media is not busy before transmitting.
The device with the electronic token is the only one that can transmit after a collision.
All of the devices on a segment see data that passes on the network medium.
After detecting a collision, hosts can attempt to resume transmission after a random time delay has
expired.

Observable Description Max Value


1 correctness of response Option 3, Option 5, and Option 6 are correct.
1 point for each correct option.
0 points if more options are selected than required. 3

9.4.2 CSMA/CD - The Process

2 Which password is automatically encrypted when it is created?

vty
aux
console
enable secret
enable password

Observable Description Max Value


1 correctness of response 2 points for Option 4
0 points for any other option 2

11.2.2 Limiting Device Access - Configuring Passwords and Using Banners

Refer to the exhibit. A network technician is trying to determine the correct IP address configuration for
Host A. What is a valid configuration for Host A?

IP address: 192.168.100.19; Subnet Mask: 255.255.255.248; Default Gateway: 192.16.1.2


IP address: 192.168.100.20; Subnet Mask: 255.255.255.240; Default Gateway: 192.168.100.17
IP address: 192.168.100.21; Subnet Mask: 255.255.255.248; Default Gateway: 192.168.100.18
IP address: 192.168.100.22; Subnet Mask: 255.255.255.240; Default Gateway: 10.1.1.5
IP address: 192.168.100.30; Subnet Mask: 255.255.255.240; Default Gateway: 192.168.1.1
IP address: 192.168.100.31; Subnet Mask: 255.255.255.240; Default Gateway: 192.168.100.18

Observable Description Max Value


1 correctness of response 2 points for Option 2
0 points for any other option 2

6.3.3 Assigning Addresses to Other Devices

Refer to the exhibit. With the router running NAT, what IP addresses can be applied to the computer to
allow access to the Internet? (Choose three.)
192.168.18.38
192.168.18.48
192.168.18.49
192.168.18.52
192.168.18.59
192.168.18.63

Observable Description Max Value


1 correctness of response Option 3, Option 4, and Option 5 are correct.
1 point for each correct option.
0 points if more options are selected than required. 3

6.4.2 ANDing - What Is In Our Network?

5 Which two functions of the OSI model occur at layer two? (Choose two.)

physical addressing
encoding
routing
cabling
media access control

Observable Description Max Value


1 correctness of response Option 1 and Option 5 are correct.
1 point for each correct option.
0 points if more options are selected than required. 2

7.1.1 Data Link Layer - Supporting and Connecting to Upper Layer Services
6 What is true regarding network layer addressing? (Choose three.)

uses a flat structure


prevent broadcasts
heirarchical
uniquely identifies each host
48 bits in length
contains a network portion

Observable Description Max Value


1 correctness of response Option 3, Option 4, and Option 6 are correct.
1 point for each correct option.
0 points if more options are selected than required. 3

5.2.5 How Do We Separate Hosts Into Networks? - Hierarchical Addressing

Refer to the exhibit. Host A attempts to establish a TCP/IP session with host C. During this attempt, a
frame was captured with the source MAC address 0050.7320.D632 and the destination MAC address
0030.8517.44C4. The packet inside the captured frame has an IP source address 192.168.7.5, and the
destination IP address is 192.168.219.24. At which point in the network was this packet captured?

leaving host A
leaving ATL
leaving Dallas
leaving NYC

Observable Description Max Value


1 correctness of response 2 points for Option 3
0 points for any other option 2
7.4.1 Follow Data Through an Internetwork

Refer to the exhibit. A router, whose table is shown, receives a packet that is destined for 192.168.1.4.
How will router treat the packet?

The packet will be dropped.


The packet will be forwarded via FastEthernet 0/0.
The packet will be forwarded to the destination host.
The packet will be forwarded to the 192.168.1.3 next-hop address.

Observable Description Max Value


1 correctness of response 2 points for Option 3
0 points for any other option 2

5.3.7 Packet Forwarding - Moving the Packet Toward its Destination

9 Which prompt represents the appropriate mode used for the copy running-config startup-config
command ?

Switch-6J>
Switch-6J#
Switch-6J(config)#
Switch-6J(config-if)#
Switch-6J(config-line)#

Observable Description Max Value


1 correctness of response 2 points for Option 2
0 points for any other option 2
11.3.2 Testing the Interface Assignment

10

Refer to the exhibit. A PC is communicating with another PC on a remote network. The two networks are
connected by three routers. Which action will help to identify the path between the hosts?

Use the ipconfig command at the host.


Use the ipconfig/all command at the destination.
Use the tracert command at the host.
Use the ping command at the destination.

Observable Description Max Value


1 correctness of response 2 points for Option 3
0 points for any other option 2

6.6.4 Traceroute (tracert) - Testing the Path

11

Refer to the exhibit. Host C is able to ping 127.0.0.1 successfully, but is unable to communicate with
hosts A and B in the organization. What is the likely cause of the problem?

Hosts A and B are not on the same subnet as host C.


The IP addresses on the router serial interfaces are wrong.
The subnet mask on host C is improperly configured.
The FastEthernet interface fa0/0 of router 1 is wrongly configured.

Observable Description Max Value


1 correctness of response 2 points for Option 3
0 points for any other option 2

6.5.3 Subnetting - Subnetting a Subnet

12

Refer to the exhibit. While configuring a network, a technician wired each end of a Category 5e cable as
shown. Which two statements are true about this setup? (Choose two.)

The cable is suitable for connecting a switch to a router Ethernet port.


The cable is suitable for connecting dissimilar types of devices.
The cable is unusable and must be rewired.
The cable is terminated in a way that the transmit pin is wired to the receive pin.
The cable simulates a point-to-point WAN link.

Observable Description Max Value


1 correctness of response Option 1 and Option 2 are correct.
1 point for each correct option.
0 points if more options are selected than required. 2

10.2.2 Making LAN Connections

13 To enhance security in a network, the network administrator uses these commands:

Router(config)# line console 0


Router(config-line)# password j1mdi2
Router(config-line)# login

What two conclusions are evident from these commands? (Choose two.)

Users who attempt to connect to the console port of the router must enter a password.
The entries permit access through the console by the use of j1mdi2 as the password.
The entries eliminate the need for authentication.
Access through the console will be denied because the console configuration is incomplete.
The entries prevent passwords from being displayed as plain text.

Observable Description Max Value


1 correctness of response Option 1 and Option 2 are correct.
1 point for each correct option.
0 points if more options are selected than required. 2

11.2.2 Limiting Device Access - Configuring Passwords and Using Banners

14

Refer to the exhibit. RouterB is configured properly. The Ethernet interface Fa0/0 of RouterA is
configured with the use of the commands that are shown. However, a ping from the Fa0/0 interface of
RouterA to the Fa0/0 interface of RouterB is unsuccessful. What action should be taken on RouterA to
solve this problem?

Use the description command on the FastEthernet interface Fa0/0.


Configure the clock rate of the FastEthernet interface Fa0/0.
Use the no shutdown command on the FastEthernet interface Fa0/0.
Reboot the router.

Observable Description Max Value


1 correctness of response 2 points for Option 3
0 points for any other option 2

11.3.2 Testing the Interface Assignment

15 Two routers are connected via their serial ports in a lab environment. The routers are configured with
valid IP addresses, but they cannot ping each other. The show interface serial0/0 command shows that
the serial0/0 interface is up but the line protocol is down. What could be the cause of this problem?

The no shutdown command has not been applied to the interfaces.


The clock rate command has not been entered on the DCE interface.
The interface timers are not cleared.
The FastEthernet interface is emulating a serial interface by assigning it a timing signal.

Observable Description Max Value


1 correctness of response 2 points for Option 2
0 points for any other option 2

11.4.2 Capturing and Interpreting Trace Information

16 Which memory contents will change as a result of using the Router# erase startup-config command
on a router?

RAM
ROM
flash
NVRAM

Observable Description Max Value


1 correctness of response 2 points for Option 4
0 points for any other option 2

11.2.3 Managing Configuration Files

17 In which scenario would a crossover cable be required between Ethernet ports on the devices?

computer to hub
computer to router
computer to switch
switch to router

Observable Description Max Value


1 correctness of response 2 points for Option 2
0 points for any other option 2

10.2.2 Making LAN Connections

18

Refer to the exhibit. A user wants to access the Internet from the PC. A part of the running configuration
of the router is shown. Which default gateway IP address should be configured at the PC to enable this
access?

10.1.192.1
10.1.192.2
10.1.192.54
192.31.7.1

Observable Description Max Value


1 correctness of response 2 points for Option 1
0 points for any other option 2

11.3.4 Testing Gateway and Remote Connectivity

19

Refer to the exhibit. Communication for hosts X and Y is restricted to the local network. What is the
reason for this?

Host X is assigned a network address.


Host Y is assigned a multicast address.
Host X and host Y belong to different networks.
The gateway addresses are broadcast addresses.

Observable Description Max Value


1 correctness of response 2 points for Option 4
0 points for any other option 2

6.2.1 Types of Addresses in an IPv4 Network

20

Refer to the exhibit. Which layered network model is shown in the diagram?

Cisco
IETF
OSI
TCP/IP

Observable Description Max Value


1 correctness of response 2 points for Option 4
0 points for any other option 2

2.4.2 Protocol and Reference Models

21 A routing issue has occurred in your internetwork. Which of the following type of devices should be
examined to isolate this error?
access point
host
hub
router
switch

Observable Description Max Value


1 correctness of response 2 points for Option 4
0 points for any other option 2

5.3.4 A Route - The Path to a Network

22 Which topology represents a collision-free environment?

Observable Description Max Value


1 correctness of response 2 points for Option 3
0 points for any other option 2
9.6.2 Ethernet - Using Switches

23 Which option shows how a router will route packets to a remote network?

Observable Description Max Value


1 correctness of response 2 points for Option 4
0 points for any other option 2

5.3.4 A Route - The Path to a Network

24 What is the Cisco IOS?

system software for Cisco devices


Read Only Memory in Cisco devices
non-volatile storage for device configurations
an initial operating system that is used for boot functions

Observable Description Max Value


1 correctness of response 2 points for Option 1
0 points for any other option 2

11.1.1 Cisco IOS

25

Refer to the exhibit. Host A is configured with the correct IP address for the default gateway of the
router R1 FastEthernet0/1 interface. How will a packet that is sent from host A to host B be handled by
the devices on the network?

R1 will drop the packet because R1 does not have a specific route in its routing table to the 10.1.1.0/24
network.
R1 will forward the packet to its default gateway, the next hop router R2. R2 will forward the packet to
the directly connected network 10.1.1.0/24.
R1 will forward the packet to its default gateway, the next hop router R2. R2 will drop the packet
because it does not have a default route to network 10.1.1.0/24.
R1 will forward the packet to its default gateway, the next hop router R2. R2 will drop the packet
because it does not have a route that is learned by a routing protocol to network 10.1.1.0/24.

Observable Description Max Value


1 correctness of response 2 points for Option 2
0 points for any other option 2

5.3.5 The Destination Network

26 Which option shows the PDU that contains the Layer 3 source and destination addressing for a
packet?
Observable Description Max Value
1 correctness of response 2 points for Option 3
0 points for any other option 2

5.1.7 IP v4 Packet Header

27

Refer to the exhibit. Host A is unable to reach the remote network. On the basis of the provided output,
what is the cause of the problem?

Host A is configured with an incorrect IP address.


Host A is configured with an incorrect default gateway IP address.
There is no path to the remote network in the routing table of router R1.
Given that the destination network has a subnet mask of /16, host A and interface Fa0/1 of R1 are both
configured with an incorrect subnet mask.

Observable Description Max Value


1 correctness of response 2 points for Option 3
0 points for any other option 2

11.3.5 Tracing and Interpreting Trace Results


28

Refer to the exhibit. The ping 127.0.0.1 command is issued on the local host. What do the ping results
indicate?

The local host can send packets on the local network.


The TCP/IP stack on the local host operates properly.
The local host has full connectivity to the default gateway.
The local host has full connectivity to the remote network.

Observable Description Max Value


1 correctness of response 2 points for Option 2
0 points for any other option 2

11.3.1 Test the Stack

29

Refer to the exhibit. Which option correctly identifies the network address, range of host addresses, and
the broadcast address for the network that contains host A?
Observable Description Max Value
1 correctness of response 2 points for Option 3
0 points for any other option 2

6.5.1 Basic subnetting

30

Refer to the exhibit. An administrator made several changes to the configuration of the router but did
not accomplish the desired result. To undo the changes the reload command was used. What will
happen if the administrator answers yes to the prompt?

The changes will be lost and the configuration file in RAM will be loaded.
The changes will be saved and the configuration file in RAM will be loaded.
The changes will be lost and the configuration file in NVRAM will be loaded.
The changes will be saved and the configuration file in NVRAM will be loaded.

Observable Description Max Value


1 correctness of response 2 points for Option 4
0 points for any other option 2

11.2.3 Managing Configuration Files

31 Which router component will have contents erased when the command erase startup-config is
issued?

flash
RAM
ROM
NVRAM
Observable Description Max Value
1 correctness of response 2 points for Option 4
0 points for any other option 2

11.2.3 Managing Configuration Files

32 How many host addresses may be assigned when using the 128.107.0.0 network address with a
subnet mask of 255.255.248.0?

30
256
2046
2048
4094
4096

Observable Description Max Value


1 correctness of response 2 points for Option 3
0 points for any other option 2

6.5.1 Basic subnetting

33 A network administrator is asked to design a new addressing scheme for a corporate network. There
are 60 users in the main office, 40 users in the branch office, 28 users in manufacturing, 12 in the sales
office, and 4 users in the research office. Which VLSM addressing scheme that uses the 192.168.88.0/24
network will fulfill the requirements while wasting the fewest addresses?

192.168.88.0/26 main
192.168.88.32/26 branch
192.168.88.64/26 manufacturing
192.168.88.96/27 sales
192.168.88.128/28 research
192.168.88.0/26 main
192.168.88.64/26 branch
192.168.88.128/27 manufacturing
192.168.88.160/28 sales
192.168.88.176/29 research
192.168.88.0/27 main
192.168.88.32/27 branch
192.168.88.64/28 manufacturing
192.168.88.80/29 sales
192.168.88.88/30 research
192.168.88.0/27 main
192.168.88.64/28 branch
192.168.88.80/28 manufacturing
192.168.88.96/29 sales
192.168.88.104/30 research

Observable Description Max Value


1 correctness of response 2 points for Option 2
0 points for any other option 2

6.5.3 Subnetting - Subnetting a Subnet

34

Refer to the exhibit. Host A is able to access resources on the local LAN but is unable to access any
resources on the Internet. What is the likely cause of this problem?

The host subnet mask in incorrect.


The network uses private addresses.
The host address is a network address.
The default gateway is on a different subnet from the host.
Observable Description Max Value
1 correctness of response 2 points for Option 4
0 points for any other option 2

6.6.2 Ping Gateway - Testing Connectivity to the Local LAN

35 Which TCP/IP model layer creates additional overhead on network resources due to
acknowledgments, tracking, and retransmission of data?

internet
transport
application
network access

Observable Description Max Value


1 correctness of response 2 points for Option 2
0 points for any other option 2

4.1.3 Supporting Reliable Communication

36 Which password would allow a user to establish a Telnet session with a Cisco device?

VTY password
enable password
console password
enable secret password

Observable Description Max Value


1 correctness of response 2 points for Option 1
0 points for any other option 2

11.2.2 Limiting Device Access - Configuring Passwords and Using Banners

37 A network technician has made a UTP cable that is terminated as T568A on one end and T568B on
the opposite end. What type of cable has been constructed?

patch
console
crossover
straight-through

Observable Description Max Value


1 correctness of response 2 points for Option 3
0 points for any other option 2

10.2.2 Making LAN Connections

38 Which application belongs to the category of the client/server model?

using Telnet to access a router


exchanging information via instant messaging
printing a document to a locally connected printer
scanning a document with a directly connected scanner

Observable Description Max Value


1 correctness of response 2 points for Option 1
0 points for any other option 2
3.2.1 The Client-Server Model

39 What happens when a node on an Ethernet network is creating a frame and it does not have the
destination MAC address?

The node drops the frame.


The node sends out a Layer 3 broadcast message.
The node sends a message directly to the router for the address.
The node sends out an ARP request with the destination IP address.

Observable Description Max Value


1 correctness of response 2 points for Option 4
0 points for any other option 2

9.7.1 The ARP Process - Mapping IP to MAC Addresses

40 What are the default terminal emulation software settings when configuring a Cisco device through a
console port?

Bits per second: 19200


Data bits: 7
Parity: None
Stop bits: 0
Flow control: None

Bits per second: 9600


Data bits: 8
Parity: None
Stop bits: 1
Flow control: None

Bits per second: 19200


Data bits: 7
Parity: None
Stop bits: 0
Flow control: Hardware

Bits per second: 9600


Data bits: 8
Parity: None
Stop bits: 1
Flow control: Hardware

Observable Description Max Value


1 correctness of response 2 points for Option 2
0 points for any other option 2

10.5.2 Making the Device Management Connection

41 A network technician has been monitoring traffic with Wireshark and notices an excessive number of
broadcasts. Which device could be installed to reduce the size of the broadcast domain?

bridge
hub
router
switch

Observable Description Max Value


1 correctness of response 2 points for Option 3
0 points for any other option 2

10.1.1 Choosing the Appropriate LAN Device


42 Which communication tool allows real-time collaboration?

wiki
e-mail
weblog
instant messaging

Observable Description Max Value


1 correctness of response 2 points for Option 4
0 points for any other option 2

1.1.2 Examples of Today's Popular Communication Tools

43

Refer to the exhibit. A network administrator tries to test the connectivity between routers R1 and R2,
but the attempt to ping is unsuccessful. Based on the show ip interface brief command outputs, what
could be the possible cause of the problem?

Interface S0/0/0 on router R1 is shut down.


Interface S0/0/0 on router R1 is configured with an incorrect IP address.
Interface S0/0/0 on router R2 is administratively down.
Interface S0/0/0 on router R2 does not have the clock rate settings configured.

Observable Description Max Value


1 correctness of response 2 points for Option 2
0 points for any other option 2

11.3.2 Testing the Interface Assignment


44

Refer to the exhibit. A ping test between PC1 and PC2 failed. To troubleshoot the case, a network
administrator issued the ipconfig command on PC1 and the show ip interface brief command on R1.
Based on the outputs provided, what could be the possible cause of the problem?

Interface Fa0/0 on router R1 is administratively down.


Interface Fa0/0 on router R1 is configured with an incorrect IP address.
The NIC interface on PC1 is configured with an incorrect IP address.
The default gateway on PC1 is configured with an incorrect IP address.

Observable Description Max Value


1 correctness of response 2 points for Option 4
0 points for any other option 2

11.3.2 Testing the Interface Assignment


11.3.4 Testing Gateway and Remote Connectivity

45 An administrator makes changes to the default configuration of a router and saves them to NVRAM.
After testing, it is discovered that the configurations did not have the desired effect and must be
removed. What steps must be taken to remove the changes and return the router to the default
configuration?

Reboot the router.


Use no version of the commands that are issued.
Issue the erase startup-config command, and then reboot the router.
Issue the erase running-config command, and then reboot the router.

Observable Description Max Value


1 correctness of response 2 points for Option 3
0 points for any other option 2
11.2.3 Managing Configuration Files

46 A network administrator needs to provide administrative access for certain users. Which mode will
allow users access to both the show and debug commands?

user executive mode


privileged executive mode
global configuration mode
router configuration mode

Observable Description Max Value


1 correctness of response 2 points for Option 2
0 points for any other option 2

11.1.3 Cisco IOS Modes

47 By using the ipconfig command, a network administrator determines that a workstation has the
address 192.168.3.38 with 29 bits set in the subnet mask. To what network does the workstation
belong?

192.168.3.8
192.168.3.16
192.168.3.24
192.168.3.32

Observable Description Max Value


1 correctness of response 2 points for Option 4
0 points for any other option 2
6.4.1 The Subnet Mask - Defining the Network and Host Portions

48 A network administrator is tasked with connecting two workgroups that are configured to use
different subnets. Which device should be selected to allow connectivity between users on the two
networks?

hub
switch
router
wireless access point

Observable Description Max Value


1 correctness of response 2 points for Option 3
0 points for any other option 2

10.1.1 Choosing the Appropriate LAN Device

49 Which statement is true about the running configuration file in a Cisco IOS device?

It affects the operation of the device immediately when modified.


It is stored in NVRAM.
It should be deleted using the erase running-config command.
It is automatically saved when the router reboots.

Observable Description Max Value


1 correctness of response 2 points for Option 1
0 points for any other option 2

11.1.2 Configuration Files


50 Which two types of cables are required in order to establish a console connection between a console
port on a router and a computer with a USB interface? (Choose two.)

Observable Description Max Value


1 correctness of response Option 4 and Option 5 are correct.
1 point for each correct option.
0 points if more options are selected than required. 2

You might also like