CCNA 1 v5 ITN Practice Final Exam Answers 2016


CCNA 1 v5 ITN Practice Final Exam Answers 2016

Last update Apr. 2016

Introduction to Networks 

ITN Practice Final – Introduction to Networks (Version 5.0)

1
A network administrator is designing a new network infrastructure that includes both wired and wireless connectivity. Under which situation would a wireless connection be recommended?

The end-user device requires a dedicated connection because of performance requirements.
The end-user device area has a high concentration of RFI.
The end-user device needs mobility when connecting to the network.*
The end-user device only has an Ethernet NIC.

2
A user is attempting to do an http://www.cisco.com/ without success. Which two configuration values must be set on the host to allow this access? (Choose two.)

WINS server
HTTP server
Netbios
DNS server*
default gateway*

3
Which two statements are correct in a comparison of IPv4 and IPv6 packet headers? (Choose two.)

The Source Address field name from IPv4 is kept in IPv6.*
The Version field from IPv4 is not kept in IPv6.
The Destination Address field is new in IPv6.
The Header Checksum field name from IPv4 is kept in IPv6.
The Time-to-Live field from IPv4 has been replaced by the Hop Limit field in IPv6.*

4
A user calls the help desk to report that a Windows XP workstation is unable to connect to the network after startup and that a popup window says “This connection has limited or no connectivity.” The technician asks the user to issue the ipconfig /all command. The user reports the IP address is 169.254.69.196 with subnet mask of 255.255.0.0 and nothing is displayed for the DNS server IP address. What is the cause of the problem?

The DNS server IP address needs to be configured.
The subnet mask was configured incorrectly.
The workstation is unable to obtain an IP address from a DHCP server.*
The workstation NIC has malfunctioned.

5
A network administrator has been issued a network address of 192.31.7.64/26. How many subnets of equal size could be created from the assigned /26 network by using a /28 prefix?

16
8
3
6
4*
14

6
Why are port numbers included in the TCP header of a segment?

to allow the receiving host to assemble the packet in the proper order
to enable a receiving host to forward the data to the appropriate application*
to determine which Layer 3 protocol should be used to encapsulate the data
to identify which switch ports should receive or forward the segment
to indicate the correct router interface that should be used to forward a segment

7


Refer to the exhibit. Which layer of the OSI model would format data in this way?

data link*
application
transport
network
physical

8


Open the PT Activity. Perform the tasks in the activity instructions and then answer the question.

What is the secret keyword that is displayed on the web page?

cisco
switch
frame
packet*
router

9
Which two types of applications rely on their traffic having priority over other traffic types through the network? (Choose two.)

email
voice*
file transfer
instant messaging
video*

10
Fill in the blank.
In dotted decimal notation, the IP address “172.25.0.126” is the last host address for the network 172.25.0.64/26.

11
Which devices should be secured to mitigate against MAC address spoofing attacks?

Layer 2 devices*
Layer 7 devices
Layer 3 devices
Layer 4 devices

12
Which IPv6 address notation is valid?

ABCD:160D::4GAB:FFAB
2001:0DB8::ABCD::1234
2001:DB8:0:1111::200*
2001::ABCD::

13
To revert to a previous configuration, an administrator issues the command copy tftp startup-config on a router and enters the host address and file name when prompted. After the command is completed, why does the current configuration remain unchanged?

A TFTP server can only be used to restore the Cisco IOS, not the router configuration.
The command should have been copy startup-config tftp.
The configuration should have been copied to the running configuration instead.*
The configuration changes were copied into RAM and require a reboot to take effect.

14
What are two characteristics of a scalable network? (Choose two.)

is not as reliable as a small network
grows in size without impacting existing users*
easily overloaded with increased traffic
suitable for modular devices that allow for expansion*
offers limited number of applications

15
Which two functions are primary functions of a router? (Choose two.)

packet switching*
microsegmentation
domain name resolution
flow control
path selection*

16
Using default settings, what is the next step in the router boot sequence after the IOS loads from flash?

Perform the POST routine.
Search for a backup IOS in ROM.
Load the bootstrap program from ROM.
Load the running-config file from RAM.
Locate and load the startup-config file from NVRAM.*

17
A router boots and enters setup mode. What is the reason for this?

Cisco IOS is missing from flash memory.
The POST process has detected hardware failure.
The IOS image is corrupt.
The configuration file is missing from NVRAM.*

18
What is an ISP?

It is a networking device that combines the functionality of several different networking devices in one.
It is an organization that enables individuals and businesses to connect to the Internet.*
It is a protocol that establishes how computers within a local network communicate.
It is a standards body that develops cabling and wiring standards for networking.

19

Subnet 192.168.1.32/27 will have a valid host range from 192.168.1.33 – 192.168.1.62 with the broadcast address as 192.168.1.63
Subnet 192.168.1.64/27 will have a valid host range from 192.168.1.65 – 192.168.1.94 with the broadcast address as 192.168.1.95
Subnet 192.168.1.96/27 will have a valid host range from 192.168.1.97 – 192.168.1.126 with the broadcast address as 192.168.1.127

20
What information is added during encapsulation at OSI Layer 3?

source and destination port number
source and destination MAC
source and destination IP address*
source and destination application protocol

21
What are two ways that TCP uses the sequence numbers in a segment? (Choose two.)

to limit the number of segments that can be sent out of an interface at one time
to determine if the packet changed during transit
to specify the order in which the segments travel from source to destination
to reassemble the segments at the remote location*
to identify missing segments at the destination*

22
Which statement describes a characteristic of the traceroute utility?

It is primarily used to test connectivity between two hosts.
It sends four Echo Request messages.
It identifies the routers in the path from a source host to a destination host.*
It utilizes the ICMP Source Quench messages.

23


Refer to the exhibit. HostA is attempting to contact ServerB. Which two statements correctly describe the addressing that HostA will generate in the process? (Choose two.)

A packet with the destination IP address of RouterA.
A frame with the destination MAC address of SwitchA.
A frame with the destination MAC address of RouterA.*
A packet with the destination IP address of RouterB.
A packet with the destination IP address of ServerB.*
A frame with the destination MAC address of ServerB.

24
For which three reasons was a packet-switched connectionless data communications technology used when developing the Internet? (Choose three.)

It requires that a data circuit between the source and destination be established before data can be transferred.
It can rapidly adapt to the loss of data transmission facilities.*
It efficiently utilizes the network infrastructure to transfer data.*
It allows for billing of network use by the amount of time a connection is established.
Data packets can travel multiple paths through the network simultaneously.* 

25
A network administrator is troubleshooting connectivity issues on a server. Using a tester, the administrator notices that the signals generated by the server NIC are distorted and not usable. In which layer of the OSI model is the error categorized?

data link layer
physical layer*
network layer
presentation layer

26
What will a host on an Ethernet network do if it receives a frame with a destination MAC address that does not match its own MAC address?

It will remove the frame from the media.
It will discard the frame.*
It will forward the frame to the next host.
It will strip off the data-link frame to check the destination IP address.

27
What are the three parts of an IPv6 global unicast address? (Choose three.)

broadcast address
global routing prefix*
subnet mask
subnet ID*
interface ID*

28
A PC that is communicating with a web server is utilizing a window size of 6,000 bytes when sending data and a packet size of 1,500 bytes. What byte of information will the web server acknowledge after it has received four packets of data from the PC?

1,500
5
6,001*
1,501
6,000

29
What three primary functions does data link layer encapsulation provide? (Choose three.)

error detection*
port identification
addressing*
path determination
IP address resolution
frame delimiting*

30


Refer to the exhibit. A network engineer is attempting to connect to a new router to perform the initial configuration. The engineer connects a rollover cable from the serial port of a PC to the Aux port on the router, then configures HyperTerminal as shown. The engineer cannot get a login prompt in HyperTerminal. What would fix the problem?

Move the cable to the router console port.*
Use a crossover cable instead of a rollover cable.
Connect to the Ethernet port on the PC.
Change connection settings to even parity.

31
The administrator of a branch office receives an IPv6 prefix of 2001:db8:3000::/52 from the corporate network manager. How many subnets can the administrator create?

1024
2048
4096*
8192
65536

32


Refer to the exhibit. Which two settings could be changed to improve security on the wireless network? (Choose two.)

wide channel
radio band
SSID*
network mode
SSID broadcast*
standard channel

33
Fill in the blank using a number.
The minimum Ethernet frame size is “64” bytes. Anything smaller than that should be considered a “runt frame.”

34


Refer to the exhibit. From global configuration mode, an administrator is attempting to create a message-of-the-day banner by using the command banner motd V Authorized access only! Violators will be prosecuted! V When users log in using Telnet, the banner does not appear correctly. What is the problem?

The symbol “!” signals the end of a banner message.
Message-of-the-day banners will only appear when a user logs in through the console port.
The banner message is too long.
The delimiting character appears in the banner message.*

35
Which router configuration mode would an administrator use to configure the router for SSH or Telnet login access?

interface
router
line*
privileged EXEC
global

36
Which service will translate private internal IP addresses into Internet routable public IP addresses?

NAT*
DNS
ARP
DHCP

37
What three statements describe features or functions of media access control? (Choose three.)

Ethernet utilizes CSMA/CD.*
802.11 utilizes CSMA/CD.
It uses contention-based access also known as deterministic access.
Data link layer protocols define the rules for access to different media.*
Controlled media access involves collision handling.
It is responsible for detecting transmission errors in transmitted data.*

38
Fill in the blank. Do not abbreviate. Use lower case.
Which interface configuration mode command puts a Layer 3 switch interface into Layer 3 mode?
no switchport ” ​

39


Open the PT activity. Perform the tasks in the activity instructions and then answer the question.

Which information is obtained from this command output?

10.20.20.3, non-authoritative answer*
10.20.20.4, non-authoritative answer
10.20.20.3, authoritative answer
10.20.20.4, authoritative answer

40
A small satellite office has been given the overall network number of 192.168.99.0/24 and the network technician can subdivide the network addresses as needed. The office needs network access for both wired and wireless devices. However, because of the security consideration, these two networks should be separate. The wired network will have 20 devices. The wireless network has a potential connection of 45 devices. Which addressing scheme would be most efficient for these two networks?

192.168.99.0/27
192.168.99.32/28

192.168.99.0/27
192.168.99.32/26

192.168.99.0/26
192.168.99.64/27 **************

192.168.99.0/28
192.168.99.64/26

192.168.99.0/28
192.168.99.16/28

41
What makes fiber preferable to copper cabling for interconnecting buildings? (Choose three.)

greater bandwidth potential*
limited susceptibility to EMI/RFI*
durable connections
easily terminated
greater distances per cable run*
lower installation cost

42
A network team is comparing physical WAN topologies for connecting remote sites to a headquarters building. Which topology provides high availability and connects some, but not all, remote sites?

point-to-point
mesh
partial mesh*
hub and spoke

43
What is the function of CSMA/CA in a WLAN?

It assures that clients are connected to the correct WLAN.
It describes the smallest building block of the WLAN.
It provides the mechanism for media access.*
It allows a host to move between cells without loss of signal.

44
A network administrator enters the service password-encryption command into the configuration mode of a router. What does this command accomplish?

This command provides an exclusive encrypted password for external service personnel who are required to do router maintenance.
This command enables a strong encryption algorithm for the enable secret password command.
This command encrypts passwords as they are transmitted across serial WAN links.
This command prevents someone from viewing the running configuration passwords.*
This command automatically encrypts passwords in configuration files that are currently stored in NVRAM.

45
Fill in the blank.

A nibble consists of “4” bits.

46

Place the options in the following order:
[+] cables connecting rooms to wiring closets
[+] desktop PC in a classroom
[#] IP address of a server
[#] a switch located in a classroom

[+] Order does not matter within this group.
[#] Order does not matter within this group.

47
Why are the paired wires twisted in a CAT5 cable?

to improve the mechanical strength
to provide eletromagnetic noise cancellation*
to facilitate cable termination in the connector
to extend the signaling length

48
A medium-sized business is researching available options for connecting to the Internet. The company is looking for a high speed option with dedicated, symmetric access. Which connection type should the company choose?

cable modem
DSL
satellite
leased line*
dialup

49


Refer to the exhibit. What will be the result of entering this configuration the next time a network administrator connects a console cable to the router and no additional commands have been entered?

The administrator will be presented with the R1> prompt.*
The administrator will be required to enter Cisco789.
The administrator will be required to enter Cisco234.
The administrator will be required to enter Cisco123.

50
The ARP table in a switch maps which two types of address together?

Layer 2 address to a Layer 4 address
Layer 3 address to a Layer 2 address*
Layer 4 address to a Layer 2 address
Layer 3 address to a Layer 4 address

51
Which is a function of the show ip route command when used as a tool for troubleshooting network connectivity?

shows the IP address of the next hop router for each route*
lists the IP addresses of all hops the traffic will pass through to reach the destination network
shows the incoming and outgoing interfaces the traffic will go through in order to reach the destination network
indicates the point of failure in the connection

52


Refer to the graphic. What is the effect of setting the security mode to WEP on the Linksys integrated router?

It encrypts data between the wireless client and the access point.*
It identifies the wireless LAN.
It allows the access point to inform clients of its presence.
It translates an internal address or group of addresses into an outside, public address.
It translates IP addresses into easy-to-remember domain names.

53

54
What are two actions performed by a Cisco switch? (Choose two.)

building a routing table that is based on the first IP address in the frame header
utilizing the MAC address table to forward frames via the destination MAC address*
forwarding frames with unknown destination IP addresses to the default gateway
using the source MAC addresses of frames to build and maintain a MAC address table*
examining the destination MAC address to add new entries to the MAC address table

55


Refer to the exhibit. Using VLSM, what is the largest and smallest subnet mask required on this network in order to minimize address waste?

255.255.254.0 and 255.255.255.252*
255.255.255.128 and 255.255.255.224
255.255.254.0 and 255.255.255.224
255.255.255.0 and 255.255.255.252

56


Refer to the exhibit. An administrator is testing connectivity to a remote device with the IP address 10.1.1.1. What does the output of this command indicate?

The connection timed out while waiting for a reply from the remote device.
A ping packet is being blocked by a security device along the path.
A router along the path did not have a route to the destination.*
Connectivity to the remote device was successful.

57
What is one purpose of the TCP three-way handshake?

synchronizing sequence numbers between source and destination in preparation for data transfer*
determining the IP address of the destination host in preparation for data transfer
sending echo requests from the source to the destination host to establish the presence of the destination
requesting the destination to transfer a binary file to the source

NEW
58. A particular email site does not appear to be responding on a Windows 7 computer. What command could the technician use to show any cached DNS entries for this web page?
ipconfig /all
arp -a
ipconfig /displaydns*
nslookup

59. A frame is transmitted from one networking device to another. Why does the receiving device check the FCS field in the frame?
to determine the physical address of the sending device
to verify the network layer protocol information
to check the frame for possible transmission errors*
to compare the interface media type between the sending and receiving ends
to verify that the frame destination matches the MAC address of the receiving device

60. Which type of wireless security is easily compromised?
EAP
PSK
WEP*
WPA

61. Refer to the exhibit.

IMAGE:
Router# sh r
%ambiguous command: ‘sh r’

An administrator is trying to view the current configuration on this switch but receives the error message that is displayed. What does this error indicate?
The command does not exist.
One or more required keywords or arguments were omitted.
Not enough characters were entered for the interpreter to recognize the command.*
The administrator does not have the required level of access to use this command.

62. Which range of link-local addresses can be assigned to an IPv6-enabled interface?​
FEC0::/10​
FEBF::/10*
FDEE::/7​
FF00::/8​

63. On a point-to-point network, which communication type is used when two devices can both transmit and receive but not at the same time?
half-duplex*
deterministic
controlled access
full-duplex

64. What is the purpose of ICMP messages?
to inform routers about network topology changes
to ensure the delivery of an IP packet
to provide feedback of IP packet transmissions*
to monitor the process of a domain name to IP address resolution

65. An administrator needs to upgrade the IOS in a router to a version that supports new features. Which factor should the administrator consider before performing the upgrade?
NVRAM must be erased before the new IOS can be installed.
The old IOS should be backed up to NVRAM so that it is not lost during a power failure.
The new IOS might require more RAM to function properly.*
The old IOS must be removed first.

66. What will happen if the default gateway address is incorrectly configured on a host?
The host cannot communicate with other hosts in the local network.
The switch will not forward packets initiated by the host.
The host will have to use ARP to determine the correct address of the default gateway.
The host cannot communicate with hosts in other networks.*
A ping from the host to 127.0.0.1 would not be successful.

67. Which connection provides a secure CLI session with encryption to a Cisco router?
a console connection
an AUX connection
a Telnet connection
an SSH connection*

68. A high school in New York (school A) is using videoconferencing technology to establish student interactions with another high school (school B) in Russia. The videoconferencing is conducted between two end devices through the Internet. The network administrator of school A configures the end device with the IP address 192.168.25.10. The administrator sends a request for the IP address for the end device in school B and the response is 192.168.25.10. The administrator knows immediately that this IP will not work. Why?
This is a loopback address.
This is a link-local address.
There is an IP address conflict.
This is a private IP address.*

69. A host is accessing a Web server on a remote network. Which three functions are performed by intermediary network devices during this conversation? (Choose three.)

applying security settings to control the flow of data*
notifying other devices when errors occur*
regenerating data signals*
acting as a client or a server
serving as the source or destination of the messages
providing a channel over which messages travel

70. Which two statements describe the characteristics of fiber-optic cabling? (Choose two.)

Fiber-optic cabling does not conduct electricity.*
Fiber-optic cabling has high signal loss.
Fiber-optic cabling is primarily used as backbone cabling.*
Multimode fiber-optic cabling carries signals from multiple sending devices.
Fiber-optic cabling uses LEDs for single-mode cab​les and laser technology for multimode cables.

71. What will a Layer 2 switch do when the destination MAC address of a received frame is not in the MAC table?

It broadcasts the frame out of all ports on the switch.

It initiates an ARP request.

It forwards the frame out of all ports except for the port at which the frame was received.*

It notifies the sending host that the frame cannot be delivered.

with answer It forwards the frame out of all ports except for the port at which the frame was received.
72. A host PC is attempting to lease an address through DHCP. What message is sent by the server to let the client know it is able to use the provided IP information?

DHCPDISCOVER
DHCPOFFER
DHCPREQUEST
DHCPACK*
DHCPNACK

73. What part of the URL, http://www.cisco.com/index.html, represents the top-level DNS domain?
www
.com*
http
index

74. A user issues the ipconfig /displaydns command on the workstation. What is the function of this command?
Answers:
to show all of the cached DNS entries*
to show the local DNS server parameters
to show the result of last name resolution request
to show the DNS configuration for the workstation

75. Consider the following range of addresses:
2001:0DB8:BC15:00A0:0000::
2001:0DB8:BC15:00A1:0000::
2001:0DB8:BC15:00A2:0000::

2001:0DB8:BC15:00AF:0000::
The prefix-length for the range of addresses is __60__

76. Which publicly available resources describe protocols, processes, and technologies for the Internet but do not give implementation details?

protocol models
Request for Comments*
IRTF research papers
IEEE standards

77. What information does the loopback test provide?

The device has the correct IP address on the network.
The Ethernet cable is working correctly.
The device has end-to-end connectivity.
DHCP is working correctly.
The TCP/IP stack on the device is working correctly.*

78. A small business user is looking for an ISP connection that provides high speed digital transmission over regular phone lines. What ISP connection type should be used?

DSL*
dial-up
satellite
cell modem
cable modem

79. What are the two main components of Cisco Express Forwarding (CEF)? (Choose two.)

adjacency tables*
ARP tables
routing tables
forwarding information base (FIB)*
MAC-address tables

80. Which subnet would include the address 192.168.1.96 as a usable host address?

192.168.1.64/26*
192.168.1.32/27
192.168.1.32/28
192.168.1.64/29

81. When applied to a router, which command would help mitigate brute-force password attacks against the router?

exec-timeout 30
banner motd $Max failed logins = 5$
login block-for 60 attempts 5 within 60*
service password-encryption

82. Which statement best describes the operation of the File Transfer Protocol?
An FTP client uses a source port number of 21 and a randomly generated destination port number during the establishment of control traffic with an FTP Server.
An FTP client uses a source port number of 20 and a randomly generated destination port number during the establishment of data traffic with an FTP Server.*
An FTP server uses a source port number of 20 and a randomly generated destination port number during the establishment of control traffic with an FTP client.
An FTP server uses a source port number of 21 and a randomly generated destination port number during the establishment of control traffic with an FTP client.

83. Refer to the exhibit. A network administrator is configuring access control to switch SW1. If the administrator uses a console connection to connect to the switch, which password is needed to access user EXEC mode?
letmein
secretin
lineconin*
linevtyin


Comments

  • nick
    Reply

    Number 53 is wrong the correct order is as follows

    Physical damage to routers
    Brownouts
    Not used
    Poor cabiling of the network infrastructure

  • gabytzu
    Reply

    At the 53rd question the correct answers are:
    burnouts – > electrical threat
    physical damage to routers – > hardware threat
    poor cabling …. – > maintenance threat

    • ryjfair

      You are correct.

      Hardware threats: The threat of physical damage to the router or switch hardware. Mission-critical network equipment should be located in locked room with restricted access to only authorized personnel.

      Environmental threats: Threats such as temperature extremes (too hot or too cold) or humidity extremes (too wet or too dry). The room should have dependable temperature and humidity control systems. If possible, remotely monitor and alarm the environmental parameters of the room.

      Electrical threats – Threats such as voltage spikes, unconditioned power (noise), insufficient voltage (brownouts) and total power loss. Network equipment should be utilize redundant power supplies, be placed on uninterruptible power supply (UPS) for mission critical systems and monitored.

      Maintenance threats: Maintenance threats include poor handling of equipment (ESD), lack of spares, poor cabling. Clearly label all equipment cabling and secure the cabling to equipment racks to prevent accidental damage, disconnection, or incorrect termination. Do not leave a console connected to and logged into any console port. Always log off administrative interfaces when leaving a station.

  • Aficio81
    Reply

    At the 55th question the right answer is:
    255.255.254.0 and 255.255.255.224

    • Josh

      The answer provided would be correct because you would use 255.255.255.252 for subnets with 2 hosts from router to router.

  • Noni Mus
    Reply

    the 53 is
    Physical damage to routers -> Hardware threat
    Brownout -> Electrical threat
    Poor Cabling of the network infrastructure -> Maintenance threat

  • Anonymous
    Reply

    Aficio81: Nope, you have to consider the router connections. Considering it, you have a /30 subnet which is the smallest one.
    So the right answer is:

    255.255.254.0 and 255.255.255.252

  • ben
    Reply

    yes
    Aficio81, the rigth answer of 55th question is really 255.255.254.0 and 255.255.255.224

    • klw

      255.255.254.0 and 255.255.255.224 is not the correct one. Take in account the links between the routers also. So the right answer will be 255.255.254.0 and 255.255.255.252

  • elie
    Reply

    guys i have exam on thursday. any help with pretest or whatever..will be thankful

  • coke
    Reply

    yes, the right answer of 55 question is
    255.255.254.0 and 255.255.255.224.
    500 hosts -> 32-9= /23–> 255.255.254.0,
    25 hosts –> 32-5= /27 –> 255.255.255.224

  • xxx
    Reply

    Not at all ! The smallest subnet is 2 ! –
    The right answer is .252

  • David
    Reply

    new:
    A particular email site does not appear to be responding on a Windows 7 computer. What command could the technician use to show any cached DNS entries for this web page?
    ipconfig /all
    arp -a
    ipconfig /displaydns
    nslookup

    A frame is transmitted from one networking device to another. Why does the receiving device check the FCS field in the frame?
    to determine the physical address of the sending device
    to verify the network layer protocol information
    to check the frame for possible transmission errors
    to compare the interface media type between the sending and receiving ends
    to verify that the frame destination matches the MAC address of the receiving device

    16
    Which type of wireless security is easily compromised?
    EAP
    PSK
    WEP
    WPA

    IMAGE:
    Router# sh r
    %ambiguous command: ‘sh r’

    Refer to the exhibit. An administrator is trying to view the current configuration on this switch but receives the error message that is displayed. What does this error indicate?
    The command does not exist.
    The administrator does not have the required level of access to use this command.
    Not enough characters were entered for the interpreter to recognize the command.

    Which range of link-local addresses can be assigned to an IPv6-enabled interface?​
    FEC0::/10​
    FEBF::/10
    FDEE::/7​
    FF00::/8​

    On a point-to-point network, which communication type is used when two devices can both transmit and receive but not at the same time?
    half-duplex
    deterministic
    controlled access
    full-duplex

    What is the purpose of ICMP messages?
    to inform routers about network topology changes
    to ensure the delivery of an IP packet
    to provide feedback of IP packet transmissions
    to monitor the process of a domain name to IP address resolution

    An administrator needs to upgrade the IOS in a router to a version that supports new features. Which factor should the administrator consider before performing the upgrade?
    NVRAM must be erased before the new IOS can be installed.
    The old IOS should be backed up to NVRAM so that it is not lost during a power failure.
    The new IOS might require more RAM to function properly.
    The old IOS must be removed first.

    What will happen if the default gateway address is incorrectly configured on a host?
    The host cannot communicate with other hosts in the local network.
    The switch will not forward packets initiated by the host.
    The host will have to use ARP to determine the correct address of the default gateway.
    The host cannot communicate with hosts in other networks.
    A ping from the host to 127.0.0.1 would not be successful.

    Which connection provides a secure CLI session with encryption to a Cisco router?
    a console connection
    an AUX connection
    a Telnet connection
    an SSH connection

    A high school in New York (school A) is using videoconferencing technology to establish student interactions with another high school (school B) in Russia. The videoconferencing is conducted between two end devices through the Internet. The network administrator of school A configures the end device with the IP address 192.168.25.10. The administrator sends a request for the IP address for the end device in school B and the response is 192.168.25.10. The administrator knows immediately that this IP will not work. Why?
    This is a loopback address.
    This is a link-local address.
    There is an IP address conflict.
    This is a private IP address.

    • EnerGizer

      Match each characteristic to the appropriate email protocol
      [+] = POP
      [#] = IMAP

      [+] does not require a centralized backup solution
      [+] mail is deleted as it is downloaded
      [+] desirable for an ISP or large business
      [#] downloads copies of email messages to the client
      [#] original messages must be manually deleted
      [#] requires a larger amount of disk space

      [+] Order does not matter within this group.
      [#] Order does not matter within this group.

  • SaRgel
    Reply

    Don’t forget about inter-routers links. they are distinct broadcast domains and need to have distinct networks that contain only 2 hosts. For these networks we must use an /30 mask or 255.255.255.252. Thus the correct answer is 255.255.254.0 and 255.255.255.252

  • vik
    Reply

    nice

  • I have a name
    Reply

    Awesome! Thx for everything!

  • jorgen
    Reply

    A /27 net uses three bits of the last octet 128+64+32=224. Leaving 16+8+4+2+1=31 which is the last usable bits for hosts. The sum equals up to 255 which is a network with no hosts. And a /27 net gives us 32 usable hosts and then we have to take away two hosts for network and the broadcast. So now we have 30 hosts we can use and the smallest net required 25 host addresses so it will suffice. So the answer of 55th question is really 255.255.254.0 and 255.255.255.224.

  • jorgen
    Reply

    Sorry have to korrect myself i forgott the network between routers who has the smallest network who uses two host addresses. And thus we have a /30 network as SaRgel said and the answer is therefor as he said 255.255.254.0 and 255.255.255.252.

  • Bram
    Reply

    NEW!!!

    1=ipconfig/displaydns
    2=to check the frame for possible transmission errors
    3=WEP
    4=Not enough characters were entered for the interpreter to recognize the command.
    5=FF00::/8​
    6=Half-duplex
    7=to provide feedback of IP packet transmissions
    8=The new IOS might require more RAM to function properly.
    9=The host cannot communicate with hosts in other networks.
    10=an SSH connection
    11=This is a private IP address.

  • meow
    Reply

    A particular email site does not appear to be responding on a Windows 7 computer. What command could the technician use to show any cached DNS entries for this web page?

    ipconfig /all
    arp -a
    ipconfig /displaydns*******
    nslookup

  • Geo
    Reply

    5 FEBF::/10

  • me
    Reply

    A frame is transmitted from one networking device to another. Why does the receiving device check the FCS field in the frame?

    I think this is correct:
    to check the frame for possible transmission errors*

  • Andrei
    Reply

    What will a Layer 2 switch do when the destination MAC address of a received frame is not in the MAC table?

    It broadcasts the frame out of all ports on the switch.

    It initiates an ARP request.

    It forwards the frame out of all ports except for the port at which the frame was received.

    It notifies the sending host that the frame cannot be delivered.

    with answer It forwards the frame out of all ports except for the port at which the frame was received.

  • Andrei
    Reply

    A host is accessing a Web server on a remote network. Which three functions are performed by intermediary network devices during this conversation? (Choose three.)
    Correct
    Response Your
    Response
    regenerating data signals

    applying security settings to control the flow of data

    notifying other devices when errors occur

    15 Which two statements describe the characteristics of fiber-optic cabling? (Choose two.)
    Correct
    Response Your
    Response
    Fiber-optic cabling does not conduct electricity.

    Fiber-optic cabling is primarily used as backbone cabling.

  • Sultan
    Reply

    Bram

    good work .
    all answer of new question are correct

  • grappa4ever
    Reply

    A NEW QUESTION
    A host PC is attempting to lease an address through DHCP. What message is sent by the server to let the client know it is able to use the provided IP information?
    POSSIBLE ANSWER:
    DHCPDISCOVER
    DHCPOFFER
    DHCPREQUEST
    DHCPACK
    DHCPNACK

    CORRECT ANSWER
    DHCPACK

  • Imran Abbasi
    Reply

    What part of the URL, http://www.cisco.com/index.html, represents the top-level DNS domain?
    www
    .com
    http
    index

    Corrent Ans :-
    .com

  • John Doe
    Reply

    Here’s the only one that I didn’t see as part of this list of answers while I took this test.
    https://i.imgur.com/631VTuk.png

Time limit is exhausted. Please reload the CAPTCHA.