Professional Documents
Culture Documents
Network Fundamental Final Answers123
Network Fundamental Final Answers123
Network Fundamental Final Answers123
2 Due to a security violation, the router passwords must be changed. What information can be learned
from the following configuration entries? (Choose two.)
Refer to the exhibit. A network technician is trying to determine the correct IP address configuration for
Host A. What is a valid configuration for Host A?
4 A PC can not connect to any remote websites, ping its default gateway, or ping a printer that is
functioning properly on the local network segment. Which action will verify that the TCP/IP stack is
functioning correctly on this PC?
Refer to the exhibit. When computer A sends a frame to computer D, what computers receive the
frame?
only computer D
only computer A and computer D
only computer B, computer C, and computer D
all computers
6 A technician is asked to secure the privileged EXEC mode of a switch by requiring a password. Which
type of password would require this login and be considered the most secure?
console
enable
enable secret
VTY
7 Which OSI layer does IP rely on to determine whether packets have been lost and to request
retransmission?
application
presentation
session
transport
Refer to the exhibit. A network administrator remotely accesses the CLI of Router B from PC1 using
Telnet. Which statement is true about this connection?
9 Which three IPv4 addresses represent valid host addresses for a subnet? (Choose three.)
10.1.12.79/28
10.1.12.113/28
10.1.12.32/28
10.1.11.5/27
10.1.11.97/27
10.1.11.128/27
10 What is the effect of using the Router# copy running-config startup-config command on a router?
11
Refer to the exhibit. A PC is communicating with another PC on a remote network. The two networks are
connected by three routers. Which action will help to identify the path between the hosts?
12
Refer to the exhibit. A PC is connected to a network. Which action will verify that the PC can
communicate with its default gateway?
13
Refer to the exhibit. Host C is able to ping 127.0.0.1 successfully, but is unable to communicate with
hosts A and B in the organization. What is the likely cause of the problem?
14
Refer to the exhibit. Host A and B are unable to communicate with each other. What is the reason for
this?
15
D,E,F,G
A,H,B,C
A,D,E,F
A,D,E,G
Observable Description Max Value
1 correctness of response 2 points for Option 1
0 points for any other option 2
16
Refer to the exhibit. PC1 is unable to access PC2. To troubleshoot this problem, the technician needs to
confirm that the next hop interface is operational. Which default gateway address should the technician
ping from PC1 to confirm this?
10.0.0.254
192.168.0.249
192.168.0.250
10.0.1.254
17
Refer to the exhibit. While configuring a network, a technician wired each end of a Category 5e cable as
shown. Which two statements are true about this setup? (Choose two.)
18
Refer to the exhibit. The serial interface of the router was configured with the use of the commands that
are shown. The router cannot ping the router that is directly connected to interface serial 0/0/0. What
should the network technician do to solve this problem?
19 Which subnet mask will allow 2040 hosts per subnet on the IP network 10.0.0.0?
255.255.0.0
255.255.254.0
255.255.252.0
255.255.248.0
255.255.240.0
255.255.255.128
20
Refer to the exhibit. The nslookup command that is shown was issued on a Windows PC host. What does
the 10.32.5.74 address represent?
21
Refer to the exhibit. What three statements are true about the IP configuration that is shown? (Choose
three.)
The prefix of the subnet mask is /26.
The network on which this computer resides can have 30 hosts.
The computer is unable to communicate outside of the local network.
The address that is assigned to the computer represents private addressing.
The IP address that is assigned to the computer is routable on the Internet.
The IP address that is assigned as the default gateway is valid for this host.
22 Which two actions could be taken by a router if a specific match is not made to a route in the routing
table? (Choose two.)
Refer to the exhibit. Which layered network model is shown in the diagram?
Cisco
IETF
OSI
TCP/IP
24 Which OSI layer addressing is required to route packets between two networks?
Layer 1
Layer 2
Layer 3
Layer 4
mainframe
client/server
peer-to-peer
centralized
26 A routing issue has occurred in your internetwork. Which of the following type of devices should be
examined to isolate this error?
access point
host
hub
router
switch
28 Which physical component is used to access and perform the initial configuration on a new
unconfigured router?
29 Which option shows how a router will route packets to a remote network?
31
Refer to the exhibit. Host A is configured with the correct IP address for the default gateway of the
router R1 FastEthernet0/1 interface. How will a packet that is sent from host A to host B be handled by
the devices on the network?
R1 will drop the packet because R1 does not have a specific route in its routing table to the 10.1.1.0/24
network.
R1 will forward the packet to its default gateway, the next hop router R2. R2 will forward the packet to
the directly connected network 10.1.1.0/24.
R1 will forward the packet to its default gateway, the next hop router R2. R2 will drop the packet
because it does not have a default route to network 10.1.1.0/24.
R1 will forward the packet to its default gateway, the next hop router R2. R2 will drop the packet
because it does not have a route that is learned by a routing protocol to network 10.1.1.0/24.
33 Which table accurately associates the RFC 1918 private IP addresses with the correct network mask?
34
Refer to the exhibit. A network technician has made several changes to R1 since the configuration has
last been saved. The modified configuration did not produce the desired changes. The technician wants
to store a backup copy of the saved configuration on a TFTP server before reloading. Which action will
cause the unmodified data to be saved on the TFTP server?
35 What happens when a host station receives a frame that contains its own MAC address in the
destination field?
38 How many host addresses may be assigned when using the 128.107.0.0 network address with a
subnet mask of 255.255.248.0?
30
256
2046
2048
4094
4096
10.0.0.1
46.1.1.88
172.31.31.10
172.32.16.10
192.168.8.8
Observable Description Max Value
1 correctness of response Option 1, Option 3, and Option 5 are correct.
1 point for each correct option.
0 points if more options are selected than required. 3
40 An administrator is in the middle of entering a lengthy command when suddenly output from the IOS
appears stating that an interface has gone down and then up again. Consequently, the command that
the administrator was typing is no longer legible on the terminal. What CLI keystrokes can be entered to
return to the line that the administrator was typing?
Ctrl-D
Ctrl-K
Ctrl-R
Ctrl-Z
41 Which TCP/IP model layer creates additional overhead on network resources due to
acknowledgments, tracking, and retransmission of data?
internet
transport
application
network access
42 What is the consequence of issuing the erase startup-config command in privileged EXEC mode on a
Cisco router?
FTP
DNS
DHCP
Telnet
Observable Description Max Value
1 correctness of response 2 points for Option 2
0 points for any other option 2
44
Refer to the exhibit. Which two layers of the OSI model describe the same functions as the transport and
internet layers of the TCP/IP model? (Choose two.)
application layer
presentation layer
session layer
transport layer
network layer
data link layer
physical layer
45 In a network design project, a network designer needs to select a device to provide collision free
connections to 40 hosts on the LAN. Which device should be selected?
hub
router
switch
firewall
46 Which command or commands will require authentication to access the privileged exec mode?
47 An administrator makes changes to the default configuration of a router and saves them to NVRAM.
After testing, it is discovered that the configurations did not have the desired effect and must be
removed. What steps must be taken to remove the changes and return the router to the default
configuration?
48
Refer to the exhibit. The network administrator remotely accesses the CLI of RouterB from PC1 using a
secure connection. Which statement is true about this connection?
49
Refer to the exhibit. An administrator on PC1 wants to view some HTML code from a web page housed
on the web server. Which client application will allow this request to be started?
50 Which router configuration mode will require user authentication if an administrator issues the
enable secret command?
1 Which of the following are the address ranges of the private IP addresses? (Choose three.)
10.0.0.0 to 10.255.255.255
200.100.50.0 to 200.100.25.255
150.150.0.0 to 150.150.255.255
172.16.0.0 to 172.31.255.255
192.168.0.0 to 192.168.255.255
127.16.0.0 to 127.31.255.255
vty
aux
console
enable secret
enable password
client/server
wide area
dedicated server
peer-to-peer
Refer to the exhibit. Assume all devices are using default configurations. How many subnets are
required to address the topology that is shown?
1
3
4
5
7
Refer to the exhibit. A technician is working on a network problem that requires verification of the
router LAN interface. What address should be pinged from this host to confirm that the router interface
is operational?
127.0.0.1
192.168.64.196
192.168.254.1
192.168.254.9
192.168.254.254
Observable Description Max Value
1 correctness of response 2 points for Option 3
0 points for any other option 2
Refer to the exhibit. The tracert command is initiated from PC1 to PC4. Which device will send a
response to the initial tracert packet from PC1?
Athens
Ankara
London
Paris
PC4
Refer to the exhibit. Each media link is labeled. What type of cable should be used to connect the
different devices?
application layer
network layer
presentation layer
session layer
transport layer
Refer to the exhibit. The diagram represents the process of sending e-mail between clients. Which list
correctly identifies the component or protocol used at each numbered stage of the diagram?
11
Refer to the exhibit. The router of the company failed and was replaced. After the replacement, hosts C
and D in the Education office are able to ping each other, but they are unable to access the hosts in the
Accounts office. What is the likely cause of the problem?
12
Refer to the exhibit. Host A wants to connect to host B on a different network. Which three IP addresses
can be assigned to host A to enable this connectivity? (Choose three.)
172.16.11.36
172.16.11.95
172.16.11.88
172.16.11.70
172.16.11.64
172.16.11.67
13
Refer to the exhibit. A host is connected to hub 1. Which combination of IP address, subnet mask, and
default gateway can allow this host to function in the network?
14
Refer to the exhibit. Host A is accessing multiple servers. Which combination of port number and
address will uniquely identify a particular process running on a specific server?
15
D,E,F,G
A,H,B,C
A,D,E,F
A,D,E,G
Observable Description Max Value
1 correctness of response 2 points for Option 1
0 points for any other option 2
16
Refer to the exhibit. An employee wants to access the organization intranet from home. Which
intermediary device should be used to connect the organization intranet to the Internet to enable this
access?
hub
switch
router
wireless access point
17
Refer to the exhibit. Host A sends a frame with the destination MAC address as FFFF.FFFF.FFFF. What
action will the switch take for this frame?
18 Which two types of media can provide bandwidth up to 1 Gb/s? (Choose two.)
10 BASE-T
100 BASE-T
100 BASE-FX
1000 BASE-TX
1000 BASE-SX
19
Refer to the exhibit. Which logical topology describes the exhibited network?
star
ring
point-to-point
multi-access
20 A routing issue has occurred in your internetwork. Which of the following type of devices should be
examined to isolate this error?
access point
host
hub
router
switch
21 Which physical component is used to access and perform the initial configuration on a new
unconfigured router?
Observable Description Max Value
1 correctness of response 2 points for Option 2
0 points for any other option 2
22 Which option shows how a router will route packets to a remote network?
Observable Description Max Value
1 correctness of response 2 points for Option 4
0 points for any other option 2
25 Which option correctly identifies the interface or interfaces used to connect the router to a CSU/DSU
for WAN connectivity?
26 Which physical connector type is used for a serial V.35 connection to the CSU/DSU?
Observable Description Max Value
1 correctness of response 2 points for Option 4
0 points for any other option 2
27
Refer to the exhibit. A network technician has made several changes to R1 since the configuration has
last been saved. The modified configuration did not produce the desired changes. The technician wants
to store a backup copy of the saved configuration on a TFTP server before reloading. Which action will
cause the unmodified data to be saved on the TFTP server?
Observable Description Max Value
1 correctness of response 2 points for Option 2
0 points for any other option 2
28 A network administrator subnets the network 192.168.1.0/24 into four subnets. Which option
correctly addresses Router1 and host A into the second subnet created?
29 A network has grown too large for technicians to configure network addresses and hosts files for
name resolution. Which two application layer services should be added to the server to allow these
needs to be satisfied dynamically? (Choose two.)
DNS
FTP
DHCP
HTTP
SMTP
30 What happens when a host station receives a frame that contains its own MAC address in the
destination field?
31
Refer to the exhibit. An administrator made several changes to the configuration of the router but did
not accomplish the desired result. To undo the changes the reload command was used. What will
happen if the administrator answers yes to the prompt?
The changes will be lost and the configuration file in RAM will be loaded.
The changes will be saved and the configuration file in RAM will be loaded.
The changes will be lost and the configuration file in NVRAM will be loaded.
The changes will be saved and the configuration file in NVRAM will be loaded.
33
Refer to the exhibit. A network administrator is troubleshooting a link that is down between Router1
and Router2. To correct the problem, which wire pairs need to be switched on one of the Ethernet cable
ends?
34 A network administrator is asked to design a new addressing scheme for a corporate network. There
are 60 users in the main office, 40 users in the branch office, 28 users in manufacturing, 12 in the sales
office, and 4 users in the research office. Which VLSM addressing scheme that uses the 192.168.88.0/24
network will fulfill the requirements while wasting the fewest addresses?
192.168.88.0/26 main
192.168.88.32/26 branch
192.168.88.64/26 manufacturing
192.168.88.96/27 sales
192.168.88.128/28 research
192.168.88.0/26 main
192.168.88.64/26 branch
192.168.88.128/27 manufacturing
192.168.88.160/28 sales
192.168.88.176/29 research
192.168.88.0/27 main
192.168.88.32/27 branch
192.168.88.64/28 manufacturing
192.168.88.80/29 sales
192.168.88.88/30 research
192.168.88.0/27 main
192.168.88.64/28 branch
192.168.88.80/28 manufacturing
192.168.88.96/29 sales
192.168.88.104/30 research
35
Refer to the exhibit. Host A is able to access resources on the local LAN but is unable to access any
resources on the Internet. What is the likely cause of this problem?
36 An administrator is in the middle of entering a lengthy command when suddenly output from the IOS
appears stating that an interface has gone down and then up again. Consequently, the command that
the administrator was typing is no longer legible on the terminal. What CLI keystrokes can be entered to
return to the line that the administrator was typing?
Ctrl-D
Ctrl-K
Ctrl-R
Ctrl-Z
37 Which requirement would cause a network designer to use a router instead of a switch in a network
design?
38 Which application layer protocol allows administrators to log into a server from remote locations and
control a server as though logged in locally?
DNS
FTP
DHCP
SMTP
Telnet
39 Which TCP/IP model layer creates additional overhead on network resources due to
acknowledgments, tracking, and retransmission of data?
internet
transport
application
network access
40 Which password would allow a user to establish a Telnet session with a Cisco device?
VTY password
enable password
console password
enable secret password
41 A network technician has made a UTP cable that is terminated as T568A on one end and T568B on
the opposite end. What type of cable has been constructed?
patch
console
crossover
straight-through
43
Refer to the exhibit. Which two layers of the OSI model describe the same functions as the transport and
internet layers of the TCP/IP model? (Choose two.)
application layer
presentation layer
session layer
transport layer
network layer
data link layer
physical layer
R1>
R1#
R1(config)#
R1(config-router)#
45 Which location of router memory is cleared with the erase startup-config command?
flash
RAM
ROM
NVRAM
46 An administrator makes changes to the default configuration of a router and saves them to NVRAM.
After testing, it is discovered that the configurations did not have the desired effect and must be
removed. What steps must be taken to remove the changes and return the router to the default
configuration?
47 A technician wishes to connect two computers to move data from one to the other before reloading
the operating system. The NICs on both PCs do not support autosensing feature. Which procedure will
satisfy the requirement?
48
Refer to the exhibit. From global configuration mode, an administrator is attempting to create a
message-of-the-day banner by using the command banner motd V Authorized access only! Violators will
be prosecuted! V When users log in using Telnet, the banner does not appear correctly. What is the
problem?
The banner message is too long.
The delimiting character appears in the banner message.
The symbol “!” signals the end of a banner message.
Message-of-the-day banners will only appear when a user logs in through the console port.
49
Refer to the exhibit. Which two facts can be determined about the topology? (Choose two.)
50 Which answer lists the CLI mode hierarchy from least level of privilege to greatest?
global, privileged, user, specific
global, user, privileged, specific
user, global, privileged, specific
user, privileged, global, specific
vty
aux
console
enable secret
enable password
Refer to the exhibit. A network technician is trying to determine the correct IP address configuration for
Host A. What is a valid configuration for Host A?
Refer to the exhibit. With the router running NAT, what IP addresses can be applied to the computer to
allow access to the Internet? (Choose three.)
192.168.18.38
192.168.18.48
192.168.18.49
192.168.18.52
192.168.18.59
192.168.18.63
5 Which two functions of the OSI model occur at layer two? (Choose two.)
physical addressing
encoding
routing
cabling
media access control
7.1.1 Data Link Layer - Supporting and Connecting to Upper Layer Services
6 What is true regarding network layer addressing? (Choose three.)
Refer to the exhibit. Host A attempts to establish a TCP/IP session with host C. During this attempt, a
frame was captured with the source MAC address 0050.7320.D632 and the destination MAC address
0030.8517.44C4. The packet inside the captured frame has an IP source address 192.168.7.5, and the
destination IP address is 192.168.219.24. At which point in the network was this packet captured?
leaving host A
leaving ATL
leaving Dallas
leaving NYC
Refer to the exhibit. A router, whose table is shown, receives a packet that is destined for 192.168.1.4.
How will router treat the packet?
9 Which prompt represents the appropriate mode used for the copy running-config startup-config
command ?
Switch-6J>
Switch-6J#
Switch-6J(config)#
Switch-6J(config-if)#
Switch-6J(config-line)#
10
Refer to the exhibit. A PC is communicating with another PC on a remote network. The two networks are
connected by three routers. Which action will help to identify the path between the hosts?
11
Refer to the exhibit. Host C is able to ping 127.0.0.1 successfully, but is unable to communicate with
hosts A and B in the organization. What is the likely cause of the problem?
12
Refer to the exhibit. While configuring a network, a technician wired each end of a Category 5e cable as
shown. Which two statements are true about this setup? (Choose two.)
What two conclusions are evident from these commands? (Choose two.)
Users who attempt to connect to the console port of the router must enter a password.
The entries permit access through the console by the use of j1mdi2 as the password.
The entries eliminate the need for authentication.
Access through the console will be denied because the console configuration is incomplete.
The entries prevent passwords from being displayed as plain text.
14
Refer to the exhibit. RouterB is configured properly. The Ethernet interface Fa0/0 of RouterA is
configured with the use of the commands that are shown. However, a ping from the Fa0/0 interface of
RouterA to the Fa0/0 interface of RouterB is unsuccessful. What action should be taken on RouterA to
solve this problem?
15 Two routers are connected via their serial ports in a lab environment. The routers are configured with
valid IP addresses, but they cannot ping each other. The show interface serial0/0 command shows that
the serial0/0 interface is up but the line protocol is down. What could be the cause of this problem?
16 Which memory contents will change as a result of using the Router# erase startup-config command
on a router?
RAM
ROM
flash
NVRAM
17 In which scenario would a crossover cable be required between Ethernet ports on the devices?
computer to hub
computer to router
computer to switch
switch to router
18
Refer to the exhibit. A user wants to access the Internet from the PC. A part of the running configuration
of the router is shown. Which default gateway IP address should be configured at the PC to enable this
access?
10.1.192.1
10.1.192.2
10.1.192.54
192.31.7.1
19
Refer to the exhibit. Communication for hosts X and Y is restricted to the local network. What is the
reason for this?
20
Refer to the exhibit. Which layered network model is shown in the diagram?
Cisco
IETF
OSI
TCP/IP
21 A routing issue has occurred in your internetwork. Which of the following type of devices should be
examined to isolate this error?
access point
host
hub
router
switch
23 Which option shows how a router will route packets to a remote network?
25
Refer to the exhibit. Host A is configured with the correct IP address for the default gateway of the
router R1 FastEthernet0/1 interface. How will a packet that is sent from host A to host B be handled by
the devices on the network?
R1 will drop the packet because R1 does not have a specific route in its routing table to the 10.1.1.0/24
network.
R1 will forward the packet to its default gateway, the next hop router R2. R2 will forward the packet to
the directly connected network 10.1.1.0/24.
R1 will forward the packet to its default gateway, the next hop router R2. R2 will drop the packet
because it does not have a default route to network 10.1.1.0/24.
R1 will forward the packet to its default gateway, the next hop router R2. R2 will drop the packet
because it does not have a route that is learned by a routing protocol to network 10.1.1.0/24.
26 Which option shows the PDU that contains the Layer 3 source and destination addressing for a
packet?
Observable Description Max Value
1 correctness of response 2 points for Option 3
0 points for any other option 2
27
Refer to the exhibit. Host A is unable to reach the remote network. On the basis of the provided output,
what is the cause of the problem?
Refer to the exhibit. The ping 127.0.0.1 command is issued on the local host. What do the ping results
indicate?
29
Refer to the exhibit. Which option correctly identifies the network address, range of host addresses, and
the broadcast address for the network that contains host A?
Observable Description Max Value
1 correctness of response 2 points for Option 3
0 points for any other option 2
30
Refer to the exhibit. An administrator made several changes to the configuration of the router but did
not accomplish the desired result. To undo the changes the reload command was used. What will
happen if the administrator answers yes to the prompt?
The changes will be lost and the configuration file in RAM will be loaded.
The changes will be saved and the configuration file in RAM will be loaded.
The changes will be lost and the configuration file in NVRAM will be loaded.
The changes will be saved and the configuration file in NVRAM will be loaded.
31 Which router component will have contents erased when the command erase startup-config is
issued?
flash
RAM
ROM
NVRAM
Observable Description Max Value
1 correctness of response 2 points for Option 4
0 points for any other option 2
32 How many host addresses may be assigned when using the 128.107.0.0 network address with a
subnet mask of 255.255.248.0?
30
256
2046
2048
4094
4096
33 A network administrator is asked to design a new addressing scheme for a corporate network. There
are 60 users in the main office, 40 users in the branch office, 28 users in manufacturing, 12 in the sales
office, and 4 users in the research office. Which VLSM addressing scheme that uses the 192.168.88.0/24
network will fulfill the requirements while wasting the fewest addresses?
192.168.88.0/26 main
192.168.88.32/26 branch
192.168.88.64/26 manufacturing
192.168.88.96/27 sales
192.168.88.128/28 research
192.168.88.0/26 main
192.168.88.64/26 branch
192.168.88.128/27 manufacturing
192.168.88.160/28 sales
192.168.88.176/29 research
192.168.88.0/27 main
192.168.88.32/27 branch
192.168.88.64/28 manufacturing
192.168.88.80/29 sales
192.168.88.88/30 research
192.168.88.0/27 main
192.168.88.64/28 branch
192.168.88.80/28 manufacturing
192.168.88.96/29 sales
192.168.88.104/30 research
34
Refer to the exhibit. Host A is able to access resources on the local LAN but is unable to access any
resources on the Internet. What is the likely cause of this problem?
35 Which TCP/IP model layer creates additional overhead on network resources due to
acknowledgments, tracking, and retransmission of data?
internet
transport
application
network access
36 Which password would allow a user to establish a Telnet session with a Cisco device?
VTY password
enable password
console password
enable secret password
37 A network technician has made a UTP cable that is terminated as T568A on one end and T568B on
the opposite end. What type of cable has been constructed?
patch
console
crossover
straight-through
39 What happens when a node on an Ethernet network is creating a frame and it does not have the
destination MAC address?
40 What are the default terminal emulation software settings when configuring a Cisco device through a
console port?
41 A network technician has been monitoring traffic with Wireshark and notices an excessive number of
broadcasts. Which device could be installed to reduce the size of the broadcast domain?
bridge
hub
router
switch
wiki
e-mail
weblog
instant messaging
43
Refer to the exhibit. A network administrator tries to test the connectivity between routers R1 and R2,
but the attempt to ping is unsuccessful. Based on the show ip interface brief command outputs, what
could be the possible cause of the problem?
Refer to the exhibit. A ping test between PC1 and PC2 failed. To troubleshoot the case, a network
administrator issued the ipconfig command on PC1 and the show ip interface brief command on R1.
Based on the outputs provided, what could be the possible cause of the problem?
45 An administrator makes changes to the default configuration of a router and saves them to NVRAM.
After testing, it is discovered that the configurations did not have the desired effect and must be
removed. What steps must be taken to remove the changes and return the router to the default
configuration?
46 A network administrator needs to provide administrative access for certain users. Which mode will
allow users access to both the show and debug commands?
47 By using the ipconfig command, a network administrator determines that a workstation has the
address 192.168.3.38 with 29 bits set in the subnet mask. To what network does the workstation
belong?
192.168.3.8
192.168.3.16
192.168.3.24
192.168.3.32
48 A network administrator is tasked with connecting two workgroups that are configured to use
different subnets. Which device should be selected to allow connectivity between users on the two
networks?
hub
switch
router
wireless access point
49 Which statement is true about the running configuration file in a Cisco IOS device?