Minggu, 06 Januari 2008

dgfdsfdsf

A router determines the path to deliver a packet. What layer of the OSI model does this fact represent?

session

transport

network

data link

physical

2




Refer to the exhibit. A network administrator has configured a network after subnetting the network number 192.168.0.0/28. Workstation 1 is not able to communicate with Workstation 2. What is the cause of this loss in communications?

Workstation 1 and Workstation 2 are on the same subnet.

The serial connections are using addresses from the LAN subnets.

Workstation 1 is not on the same network that the Router 1 LAN interface is on.

If routers are used in the network, IP addresses do not need to be subnetted.

3

Which physical network topology is easy to monitor and troubleshoot, easy to add new devices to as the network expands, but subject to complete failure when a central hub or switch ceases to work?

bus

star

ring

mesh

4




Refer to the exhibit. Host A pings Host B. What can be concluded about the source and destination addresses contained in the communication sent by Router R5 when it forwards the ping out the Ethernet interface to Host B? (Choose two.)

source IP address: 192.168.10.129

source MAC address: BBBB.3333.5677

source MAC address: 5555.AAAA.6666

destination IP address: 192.168.10.33

destination IP address: 192.168.10.134

destination MAC address: 9999.DADC.1234

5

Which network device creates the highest amount of latency?

hub

router

switch

bridge

6




Refer to the exhibit. What must be configured on Host B to allow it to communicate with the file server? (Choose three.)

the MAC address of the file server

the MAC address of the PADI router interface connected to Switch A

the IP address of Switch A

a unique host IP address

the subnet mask for the LAN

the default gateway address

7

A computer technician is asked to make a network cable. One end of the cable is pinned as a 568A and the other as a 568B. For what purposes can this cable be used? (Choose two.)

to connect a router to a switch

to connect a switch to a switch

to connect a host to a switch

to connect a hub to a switch

to connect a router to a hub

to connect a host to a hub

8

When using Category 5 UTP cable, which RJ-45 pin pairs are used to exchange data between hosts on an Ethernet network?

1 and 2; 4 and 5

1 and 2; 3 and 6

3 and 6; 7 and 8

4 and 5; 7 and 8

9

What is the correct number of usable subnetworks and hosts for the IP network address 192.168.35.0 subnetted with a /28 mask?

6 networks / 64 hosts

14 networks / 32 hosts

14 networks / 14 hosts

30 networks / 64 hosts

10

Which devices will create multiple collision domains in an Ethernet network? (Choose two.)

NIC

hub

switch

router

repeater

11

What is the decimal representation of the binary number 11111000?

224

240

248

252

254

12

Which characteristics are common to both UDP and TCP? (Choose two.)

provides windowing

provides reliability

uses port numbers

acknowledges receipt of data

classified as a connectionless protocol

classified as a transport layer protocol

13

The ping command can be used to test connectivity between hosts. Which OSI model layers are verified by this test?

Layers 1 and 2 only

Layers 1 and 3 only

Layers 1, 2 and 3

Layer 1 through Layer 7

Layer 4 through Layer 7

14

Why do vendors utilize the OSI model when designing networking products?

It places requirements on all vendors that develop proprietary networking technologies for advance networking systems.

It ensures greater compatibility and interoperability with equipment from different vendors.

The International Organization for Standards develops all new products to be incorporated into the product.

It is mandated by the International Organization for Standardization that network products be compliant with the OSI model.

15

An Ethernet host receives a frame, calculates the FCS, and compares the calculated FCS to the FCS received in the frame. The host finds that the two FCS values do not match. What action will be taken by the host?

The host discards the frame.

The host processes the data frame normally.

The host initiates a request for retransmission of the frame.

The host sends the frame content to an upper layer protocol for error recovery.

16

Why would a company install a switch instead of a hub when building or expanding a corporate network?

A switch manages frames faster than a hub does.

A switch operates at 100 Mbps. A hub operates at a maximum of 10 Mbps.

A switch modifies the Ethernet frame to remove any errors. A hub forwards the frame exactly as it arrived.

A switch provides more bandwidth by sending frames only out the port to which the destination device is attached. A hub sends the frame out all ports except the source port.

17




Refer to the exhibit. What is the order of the TCP/IP Protocol Data Units as data is moved as indicated through the OSI model?

bits, segments, frames, packets, data

bits, frames, packets, segments, data

bits, frames, segments, packets, data

bits, packets, frames, segments, data

18

After an unsuccessful ping to the local router, the technician decides to investigate the router. The technician observes that the lights and fan on the router are not operational. In which layer of the OSI model is the problem most likely occurring?

transport

network

data link

physical

19

Which of the following statements are correct about CSMA/CD? (Choose three.)

It is a media access method used in LANs.

It is a media access method used in FDDI WANs.

When a device needs to transmit, it checks to see if the media is available.

A device sends data without checking media availability because all devices have equal access.

Multiple devices can successfully transmit simultaneously.

Only one device can successfully transmit at a time.

20

A network administrator has installed a 24 port switch and connected 10 computers with 10/100 NICs. If the NICs are operating at 100 Mbps, how much bandwidth is available for each computer to receive data?

0.24 Mbps

4.17 Mbps

10 Mbps

24 Mbps

100 Mbps

200 Mbps

21




Refer to the exhibit. A newly hired technician has a task of terminating CAT 5 UTP cables. The network administrator visually examined the cables the technician terminated. Some of the cables have connectors as shown in the exhibit. What should the network administrator explain to the technician about the cables?

Both cables are acceptable.

The cable in Graphic A will produce more crosstalk.

The cable in Graphic A should be used in the more critical network segments.

The cable in Graphic A is preferred because it will be easier to crimp the connector.

22

Which technologies are considered to be LAN technologies? (Choose two.)

DSL

Token Ring

Frame Relay

ISDN

Ethernet

23




Refer to the exhibit. The connections in the exhibit are labeled A through E. Which of these indicate LAN links? (Choose two.)

link A

link B

link C

link D

link E

24




Consider the networks shown in the exhibit. Host A is sending packets to host B. Which layer of the OSI model is being used when the router is making the calculated decision to determine which interface to send the packet out?

physical

data link

network

transport

session

presentation

25

What are important characteristics to consider when purchasing a network interface card? (Choose two.)

security used on the network

media used on the network

system bus used on the computer

software installed on the network

diagnostic tools installed on the network

26



Refer to the exhibit. Which diagram represents the network topology that an administrator would prefer, and why would the administrator prefer it?

Diagram A. It provides the hosts with full-duplex connections.

Diagram A. It will better provide available bandwidth to the hosts.

Diagram B. It extends the collision domain.

Diagram B. It prevents the frames from looping.

Either network will perform equally well.

27




Refer to the exhibit. The physical documentation shows a portion of the internetwork of the ABC Company. Which segments will be free of collisions?

segments 1 and 2

segments 1, 2, and 3

segments 1, 2, 3, 4, and 5

segments 2 and 3

segments 3, 4, and 5

segments 4, and 5

28




Refer to the exhibit. The network administrator wants to create a subnet for the point-to-point connection between the two routers. Which subnetwork mask would provide enough addresses for the point-to-point link with the least number of wasted addresses?

255.255.255.192

255.255.255.224

255.255.255.240

255.255.255.248

255.255.255.252

29




Refer to the exhibit. What kind of Ethernet cable is represented?

rollover cable

straight-through cable

crossover cable

console cable

30




Based on the graphic above, which of the following occurs as each host system comes on line in the topology?

The switch sends its MAC address to each host.

The switch adds MAC address to the bridge table as each host sends a frame.

Each host exchanges MAC addresses with each other.

The switch listens for data traffic to block since the switch lacks an IP address.

31

Two peer hosts are exchanging data using TFTP. During the current session, a datagram fails to arrive at the destination. Which statement is true regarding the retransmission of the datagram?

Datagram retransmission requires user authentication.

Datagram retransmission is controlled by the application.

Datagram retransmission relies on the acknowledgements at transport layer.

Datagram retransmission occurs when the retransmission timer expires in the source host.

32

Which type of address is 192.168.170.112/28?

host address

subnetwork address

broadcast address

multicast address

33

How does a switch learn the addresses of hosts connected to its ports?

All source MAC addresses must be manually configured in CAM.

The switch reads the source MAC address on incoming frames and records it in CAM.

The switch reads the destination MAC address on incoming frames and records it in CAM.

If a switch port is full duplex, the switch reads both the source and destination MAC addresses on incoming frames and records them in CAM.

34

Which protocols are TCP/IP application layer protocols? (Choose two.)

TFTP

IP

TCP

UDP

DNS

35




Refer to the exhibit. How many broadcast domains are shown?

three

four

five

six

eight

ten

36




Refer to the exhibit. Which type of UTP cable should be used to connect Host A to Switch1?

rollover

console

crossover

straight-through

37

A user initiates three simultaneous FTP connections from the local host to the same FTP server. Which OSI layer is responsible for establishing and managing these different FTP connections?

application

session

transport

network

data link

38




In the exhibit, the connections between the devices are labeled A, B, C, D, and E. For each connection, what is the correct UTP cable to use?

A=straight, B=rollover, C=straight, D=crossover, E=crossover

A=rollover, B=crossover, C=crossover, D=straight, E=straight

A=rollover, B=straight, C=straight, D=crossover, E=straight

A=rollover, B=straight, C=straight, D=crossover, E=crossover

A=straight, B=crossover, C=rollover, D=straight, E=straight

39




Which cable diagram displays the end to end pinout for a crossover cable used with Cisco devices?

Cable A

Cable B

Cable C

Cable D

40




Refer to the exhibit. A network associate needs to establish an Ethernet connection between Host A and Host B. However, the distance between the two hosts is further than the cabling standards allow. Which two devices that operate at the physical layer of the OSI can be used to allow Host A and Host B to communicate? (Choose two.)

switch

hub

bridge

router

repeater

41




Refer to the exhibit. Workstation 1 pings the Fa0/1 interface of Router 1. Which MAC address will workstation 1 obtain during the ARP request for this communication?

00-06-5B-88-DF-C3

00-B0-D0-7F-F7-46

00-0F-24-85-75-C0

00-0B-E5-64-BD-44

00-08-A3-B6-CE-02

00-08-A3-B6-CE-03

42




Refer to the exhibit. A network technician is trying to determine the correct IP address configuration for Host A. What is a valid configuration for Host A?

IP address: 192.168.100.19; Subnet Mask: 255.255.255.248; Default Gateway: 192.16.1.2

IP address: 192.168.100.20; Subnet Mask: 255.255.255.240; Default Gateway: 192.168.100.17

IP address: 192.168.100.21; Subnet Mask: 255.255.255.248; Default Gateway: 192.168.100.18

IP address: 192.168.100.22; Subnet Mask: 255.255.255.240; Default Gateway: 10.1.1.5

IP address: 192.168.100.30; Subnet Mask: 255.255.255.240; Default Gateway: 192.168.1.1

IP address: 192.168.100.31; Subnet Mask: 255.255.255.240; Default Gateway: 192.168.100.18

43

Which subnet masks could be used when subnetting a Class B IP address? (Choose two.)

255.255.255.240

255.255.192.0

255.255.0.0

255.192.0.0

240.0.0.0

255.0.0.0

44

A network administrator has added a new switch to the network. The new switch connects to an existing switch that is already installed. Which UTP cable correctly connects the new switch to the existing switch?

crossover

rollover

straight-through

console

45




A technician is testing connectivity between the devices using the ping command. Pings between Host B and Host A were successful. The technician could not ping the R3 address 172.16.3.2 from Host A. The technician issued ipconfig from Host A and saw the information displayed in the exhibit. What is the most likely problem?

The IP address of Host A is incorrect.

The subnet mask of Host A is incorrect.

The default gateway of Host A is incorrect.

Host A is properly configured. Some other problem exists in the internetwork.

46

A router interface has been assigned an IP address of 172.16.192.166 with a mask of 255.255.255.248. To which subnet does the IP address belong?

172.16.0.0

172.16.192.0

172.16.192.128

172.16.192.160

172.16.192.168

172.16.192.176

47




How many collision domains are shown in the diagram?

three

four

five

six

seven

eight

48

A large company has a network that is constantly changing. The routing tables in the routers need to be adjusted to reflect the changes in the routing paths. What type of routing would the network administrator implement?

static routes

dynamic routing protocols

only default routes

none. No routing is necessary.

49




Refer to the exhibit. The hub and the switch are operating using factory default settings. Which hosts will receive the frame if host A transmits a broadcast frame?

Only workstation B and the router will receive the data.

Workstations B, C, D, E, and the router will receive the data.

Only workstations connected to the hub will receive the data.

Workstations B, C, D, E, and the router will receive the data and it will be forwarded into the Internet.

-----------------------------------------------------

Take Assessment - Practice Final - CCNA 1 Networking Basics (Version 3.1)



1

When a network administrator applies the subnet mask 255.255.255.248 to a Class A address, for any given subnet, how many IP addresses are available to be assigned to devices?

1022

510

254

126

30

6

2

What is the maximum distance that 10BASE-T will transmit data before signal attenuation affects the data delivery?

100 meters

185 meters

300 meters

500 meters

3

What are features of the TCP/IP Transport layer? (Choose two.)

path determination

handles representation, encoding and dialog control

uses TCP and UDP protocols

packet switching

reliability, flow control and error correction

4

"CompA" is trying to locate a new computer named "CompB" on the network. Which of the following does "CompA" broadcast to find the MAC address of "CompB"?

MAC request

ARP request

ping

Telnet

proxy ARP

5

Which term describes an ARP response by a router on behalf of a requesting host?

ARP

RARP

Proxy ARP

Proxy RARP

6

Which type of institution does the domain suffix .org represent?

government

education

network

non-profit

7

Using the data transfer calculation T=S/BW, how long would it take a 4MB file to be sent over a 1.5Mbps connection?

52.2 seconds

21.3 seconds

6.4 seconds

2 seconds

0.075 seconds

0.0375 seconds

8

Which of the following are features of the Internet Protocol (IP)? (Choose two.)

It is the most widely implemented global addressing scheme.

It allows two hosts to share a single address on a local area network.

It is a hierarchical addressing scheme allowing addresses to be grouped.

It is only locally significant, used primarily on local area networks.

9

Which of the following are small, discrete components found within a personal computer? (Choose three.)

transistor

microprocessor

power supply

capacitor

light emitting diode

hard disk

10

Which part of an IP address identifies a specific device on a network?

first two octets

third and fourth octets

network portion

host portion

only the fourth octet

11

In a new network installation, the network administrator has decided to use a medium that is not affected by electrical noise. Which cable type will best meet this standard?

coaxial

screened twisted pair

shielded twisted pair

unshielded twisted pair

fiber optic

12

Which OSI layer defines the functions of a router?

physical

data link

network

transport

session

13

Which part of the URL http://www.awsb.ca/teacher gives the name of the domain?

www

http://

/teacher

awsb.ca

14

Which layer of the OSI model covers physical media?

Layer 1

Layer 2

Layer 3

Layer 4

Layer 5

Layer 6

15

To make sure timing limitations are not violated when implementing a 10 Mbps Ethernet network involving hubs or repeaters, a technician should adhere to which rule?

the 4-5-3 rule

the 6-4-2 rule

the 3-4-5 rule

the 5-4-3 rule

16

Which of these workstation installation and setup tasks are concerned with network access layer functions? (Choose two.)

configuring the e-mail client

installing NIC drivers

configuring IP network settings

connecting the network cable

using FTP to download application software updates

17

During cable testing, which of the following are used to calculate the information carrying capacity of a data cable? (Choose two.)

bit speed

attenuation

wire map

saturation limit

analog bandwidth

18

A small company has a class C network license and needs to create five usable subnets, each subnet capable of accommodating at least 20 hosts. Which of the following is the appropriate subnet mask?

255.255.255.0

255.255.255.192

255.255.255.224

255.255.255.240

19

Which of the following describes the use of Spanning Tree Protocol (STP)?

resolve routing loops

eliminate Split Horizon errors

limit collisions

resolve switching loops

20

What is important to remember about the data link layer of the OSI model when considering Peer to Peer communication? (Choose three.)

It links data to the transport layer.

It encapsulates frames into packets.

It provides a service to the network layer.

It encapsulates the network layer information into a frame.

Its header contains a physical address which is required to complete the data link functions.

It encodes the data link frame into a pattern of 1s and 0s (bits) for transmission on the medium.

21

Which protocol functions at the internet layer of the TCP/IP protocol suite?

File Transfer Protocol (FTP)

Trivial File Transfer Protocol (TFTP)

Transmission Control Protocol (TCP)

Internet Protocol (IP)

User Datagram Protocol (UDP)

Simple Mail Transport Protocol (SMTP)

22

What is the recommended maximum number of workstations configured on a peer-to-peer network?

25

15

10

5

2

23

What type of network cable is used between a terminal and a console port?

cross-over

straight-through

rollover

patch cable

24

Which OSI layer encapsulates data into packets?

session

transport

network

data link

25

The highest capacity Ethernet technologies should be implemented in which areas of a network? (Choose three.)

between workstation and backbone switch

between individual workstations

between backbone switches

between enterprise server and switch

on aggregate access links

26

Select the necessary information that is required to compute the estimated time it would take to transfer data from one location to another. (Choose two.)

file size

data format

network in use

type of medium

bandwidth of the link

27

Which of the following services is used to translate a web address into an IP address?

DNS

WINS

DHCP

Telnet

28

Which of the following does 1000BASE-T use to accomplish gigabit speeds on Cat 5e cable?

the use of four conductors in full-duplex mode

the use of two multiplexed pairs of wires, simultaneously

the use of three pairs of wires for data and the fourth for stabilization and forward error correction

the use of all four pairs of wires in full-duplex mode, simultaneously

29

John has been hired as the network administrator of a local company and has decided to add more hubs to the company's existing network. Which of the following has been caused by John's inexperience?

collision domain extended

an increased number of collision domains

increased network performance

increased bandwidth

extended bandwidth

30

If a network administrator needed to download files from a remote server, which protocols could the administrator use to remotely access those files? (Choose two.)

ASCII

TFTP

IMAP

FTP

UDP

31

What does the "10" in 10Base2 indicate about this version of Ethernet?

The version uses Base10 numbering within the frames.

The version operates at a transmission rate of 10 Mbps.

Frames can travel 10 meters unrepeated.

The maximum frame length is 10 octets.

32

Which of the following protocols are used for e-mail transfer between clients and servers? (Choose three.)

TFTP

SNMP

POP3

SMTP

IMAP4

postoffice

33

Convert the Hexadecimal number A2 into its Base 10 equivalent. Select the correct answer from the list below.

156

158

160

162

164

166

34

Convert the binary number 10111010 into its hexadecimal equivalent. Select the correct answer from the list below.

85

90

BA

A1

B3

1C

35

An ISDN Basic Rate Interface (BRI) is composed of how many signaling channels?

1

2

3

4

36

Which combinations of charges will be repelled by electric force? (Choose two.)

neutral and neutral

neutral and positive

neutral and negative

positive and positive

positive and negative

negative and negative

37

What device must be used between an AUI port of a networking device and the media to which it is being connected?

a transducer

a transmitter

a transceiver

a transponder

a port replicator

38

For which of the following is Ethernet considered the standard? (Choose three.)

inter-building connection

mid-length voice

video conferencing

vertical wiring

horizontal wiring

diagonal wiring

39

Which of the following is a term associated with replacing hubs with switches to increase the number of collision domains?

encapsulation

latency

segmentation

layered model

broadcast domain

extended

40

What is established during a connection-oriented file transfer between computers? (Choose two.)

a temporary connection to establish authentication of hosts

a connection used for ASCII or binary mode data transfer

a connection used to provide the tunnel through which file headers are transported

a command connection which allows the transfer of multiple commands directly to the remote server system

a control connection between the client and server

41

A company with a Class B license needs to have a minimum of 1,000 subnets with each subnet capable of accommodating 50 hosts. Which mask below is the appropriate one?

255.255.0.0

255.255.240.0

255.255.255.0

255.255.255.192

255.255.255.224

42

The accumulation of traffic from which of the following can cause a network condition called broadcast radiation? (Choose three.)

anonymous FTP servers

telnet sessions

video over IP applications

NAS services

ARP requests

RIP updates

43

How is a MAC address represented?

four groups of eight binary digits separated by a decimal point

four Base10 digits separated by a decimal point

six hexadecimal digits

twelve hexadecimal digits

twenty-four Base10 digits

44

Which of the following items are common to all 100BASE technologies? (Choose three.)

frame format

media

connectors

timing

multi-part encoding

45

Which of the following wireless standards increased transmission capabilities to 11 Mbps?

802.11a

802.11b

802.11c

802.11d

46




What type of wiring problem is depicted in this sample of a cable tester?

a fault

a short

an open

a split

a good map

47

Which of the following will test the internal loopback of a node?

ping 10.10.10.1

ping 192.168.1.1

ping 127.0.0.1

ping 223.223.223.223

ping 255.255.255.255

48

Which of the following is the Layer 4 PDU?

bit

frame

packet

segment

49

Which of the following are useable Class A IP addresses with a default subnet mask? (Choose three.)

127.0.39.1

111.9.28.30

123.1.2.132

128.50.38.2

105.1.34.1

0.23.92.3

50

Which of the following are considered the best electrical conductors for use in data network communications? (Choose three.)

glass fibers

copper

gold

plastic

silicon

silver

Tidak ada komentar: