CCENT Practice

¡Supera tus tareas y exámenes ahora con Quizwiz!

The graphic shows the following output: A# show ip route <output ommited> Gateway of last resort is not set S 10.0.0.0/8 [1/0] via 172.16.40.2 64.0.0.0/16 is subnetted, 1 subnets C 64.100.0.0 is directly connected, Serial0/1 C 128.107.0.0/16 is directly connected, Loopback2 172.16.0.0/24 is subnetted, 1 subnetes C 172.16.40.0 is directly connected, Serial0/0 C 192.168.1.0/24 is directly connected, FastEthernet0/0 S 192.168.2.0/24 [1/0] via 172.16.40.2 C 198.133.219.0/24 is directly connected, Loopback0 Refer to the exhibit. Packets destined to which two networks will require the router to perform a recursive lookup? (Choose two.)

10.0.0.0/8 192.168.2.0/24

A network administrator has been allocated the IPv4 10.10.240.0/20 block of addresses for a LAN. Two devices on two different, but contiguous, subnets on the LAN have been assigned the addresses 10.10.247.1/21 and 10.10.248.10/24, respectively. The administrator has to create a third subnet from the remaining address range. To optimize the use of this address space, the new subnet will follow on directly from the existing subnets. What is the first available host address in the next available subnet?​

10.10.249.1 The complete address range of the subnet with the host 10.10.247.1/21 is 10.10.240.0/21 to 10.10.247.255/21. The complete address range of the subnet that contains the host 10.10.248.10/24 is 10.10.248.0/24 to 10.10.248.255/24. This means that the next subnet will have a network address of 10.10.249.0 with a prefix length between 24 and 30. The first useable host address on this new subnet is therefore 10.10.249.1.

A network administrator is designing an IPv4 addressing scheme and requires these subnets. 1 subnet of 100 hosts 2 subnets of 80 hosts 2 subnets of 30 hosts 4 subnets of 20 hosts Which combination of subnets and masks will provide the best addressing plan for these requirements?

3 subnets of 126 hosts with a 255.255.255.128 mask 6 subnets of 30 hosts with a 255.255.255.224 mask IPv4 subnets that require 100 and 80 hosts are provided by creating subnets of 126 usable addresses, each of which requires 7 host bits. The resulting mask is 255.255.255.128. Subnets that require 30 and 20 hosts are provided by creating subnets of 30 usable addresses, each of which requires 5 host bits. The resulting mask is 255.255.255.224. Creating nine subnets, each consisting of 126 usable addresses, would waste large numbers of addresses in the six smaller subnets.

How many /30 subnets can be created from one /27 subnet?

8 A /27 subnet contains 32 IP addresses, and a /30 subnet contains 4 IP addresses, so eight /30 subnets can be created from one /27 subnet.

The exhibit shows partial output of this router command: R1(config)# do show ip route <output omitted> Gateway of last resort is 0.0.0.0 to network 0.0.0.0 10.0.0.0/8 is variably subnetted, 2 subnets, 2 masks C 10.0.0.0/30 is directly connected, Serial0/0/0 L 10.0.0.1/32 is directly connected, Serial0/0/0 172.16.0.0/24 is subnetted, 1 subnets R 172.16.1.0/24 [120/1] via 10.0.0.2, 00:00:04, Serial0/0/0 192.168.10.0/24 is variably subnetted, 2 subnets, 2 masks C 192.168.10.0/24 is directly connected, GigabitEthernet0/1 L 192.168.10.1/32 is directly connected, GigabitEthernet0/1 192.168.11.0/24 is variably subnetted, 2 subnets, 2 masks C 192.168.11.0/24 is directly connected, GigabitEthernet0/0 L 192.168.11.1/32 is directly connected, GigabitEthernet0/0 S* 0.0.0.0/0 is directly connected, Serial0/0/0 Refer to the exhibit. Which static route would an IT technician enter to create a backup route to the 172.16.1.0 network that is only used if the primary RIP learned route fails? ip route 172.16.1.0 255.255.255.0 s0/0/0 121

A backup static route is called a floating static route. A floating static route has an administrative distance greater than the administrative distance of another static route or dynamic route.

The graphic shows the following text: R1# show ipv6 route <output omitted> S ::/0 [1/0] via Serial0/0/0, directly connected C 2001:DB8:CAFE:1::/64 [0/0] via GigabitEthernet0/1, directly connected L 2001:DB8:CAFE:1::1/128 [0/0] via GigabitEthernet0/1, receive C 2001:DB8:CAFE:2::/64 [0/0] via GigabitEthernet0/0, directly connected L 2001:DB8:CAFE:2::1/128 [0/0] via GigabitEthernet0/0, receive C 2001:DB8:CAFE:3::/64 [0/0] via Serial0/0/0, directly connected L 2001:DB8:CAFE:3::1/128 [0/0] via Serial0/0/0, receive S 2001:DB8:CAFE:4::1/128 [1/0] via Serial0/0/0, directly connected L FF00::/8 [0/0] via Null0, receive Refer to the exhibit. How was the host route 2001:DB8:CAFE:4::1/128 installed in the routing table? The route was manually entered by an administrator.

A host route is an IPv6 route with a 128-bit mask. A host route can be installed in a routing table automatically when an IP address is configured on a router interface or manually if a static route is created

The graphic displays the following text: R1(config)# do show ip route <output omitted> Gateway of last resort is 0.0.0.0 to network 0.0.0.0 10.0.0.0/8 is variably subnetted, 2 subnets, 2 masks C 10.0.0.0/30 is directly connected, Serial0/0/0 L 10.0.0.1/32 is directly connected, Serial0/0/0 172.16.0.0/24 is subnetted, 1 subnets R 172.16.1.0/24 [120/1] via 10.0.0.2, 00:00:04, Serial0/0/0 192.168.10.0/24 is variably subnetted, 2 subnets, 2 masks C 192.168.10.0/24 is directly connected, GigabitEthernet0/1 L 192.168.10.1/32 is directly connected, GigabitEthernet0/1 192.168.11.0/24 is variably subnetted, 2 subnets, 2 masks C 192.168.11.0/24 is directly connected, GigabitEthernet0/0 L 192.168.11.1/32 is directly connected, GigabitEthernet0/0 S* 0.0.0.0/0 is directly connected, Serial0/0/0 R1(config)# ip route 172.16.1.0 255.255.255.0 s0/0/0 Refer to the exhibit. What would happen after the IT administrator enters the new static route? The 172.16.1.0 route learned from RIP would be replaced with the 172.16.1.0 static route.

A route will be installed in a routing table if there is not another routing source with a lower administrative distance. If a route with a lower administrative distance to the same destination network as a current route is entered, the route with the lower administrative distance will replace the route with a higher administrative distance.

In this graphic there are two routers, two switches, and two PCs. Router R2 is connected on interface S0/0/1 to interface S0/0/0 on Router R1 via a serial link with the network 10.0.0.0/30. The letters PPP are above the serial link. Router R1 is connected on Gig0/0 to switch SW2 and switch SW2 is connected to PC2. PC2 has an IP address of 192.168.11.2/24. Router R1 is connected via Gig0/1 to switch SW1 and switch SW1 is connected to PC1. PC1 has an IP address of 192.168.10.2/24 Below the graphic is the following output: R1#show ip route <output omitted> Gateway of last resort is 0.0.0.0 to network 0.0.0.0 10.0.0.0/8 is variably subnetted, 2 subnets, 2 masks C 10.0.0.0/30 is directly connected, Serial0/0/0 L 10.0.0.1/32 is directly connected, Serial0/0/0 192.168.10.0/24 is variably subnetted, 2 subnets, 2 masks C 192.168.10.0/24 is directly connected, GigabitEthernet0/1 L 192.168.10.1/32 is directly connected, GigabitEthernet0/1 192.168.11.0/24 is variably subnetted, 2 subnets, 2 masks C 192.168.11.0/24 is directly connected, GigabitEthernet0/0 L 192.168.11.1/32 is directly connected, GigabitEthernet0/0 S* 0.0.0.0/0 is directly connected, Serial0/0/0 Refer to the exhibit. When a packet arrives on interface Serial0/0/0 on R1, with a destination IP address of PC1, which two events occur? (Choose two) Router R1 will forward the packet out Gig0/1. Router R1 will de-encapsulate the packet and encapsulate it in an Ethernet frame.

A router will look in the routing table for a destination network and locate an exit interface to forward a packet to a destination. After the exit interface is determined, the router will encapsulate a packet into the correct frame type.

What type of installation is needed to view syslog messages?

A syslog server must be installed on a workstation. A syslog server needs to be installed on a workstation in order to gather the messages that are sent from the managed network devices.

What are three characteristics of the CSMA/CD process? (Choose three.)

All of the devices on a segment see data that passes on the network medium. A device listens and waits until the media is not busy before transmitting. After detecting a collision, hosts can attempt to resume transmission after a random time delay has expired. The Carrier Sense Multiple Access/Collision Detection (CSMA/CD) process is a contention-based media access control mechanism used on shared media access networks, such as Ethernet. When a device needs to transmit data, it listens and waits until the media is available (quiet), then it will send data. If two devices transmit at the same time, a collision will occur. Both devices will detect the collision on the network. When a device detects a collision, it will stop the data transmission process, wait for a random amount of time, then try again.

The graphic shows the output of the show lldp neighbors command: A1# show lldp neighbors <output omitted> Device ID Local Intf Hold-time Capability Port ID B1 Fa0/5 99 R Fa0/1 C1 Fa0/4 120 B Fa0/3Refer to the exhibit. A network administrator issues the show lldp neighbors command to display information about neighboring devices. What can be determined based on the information?

Device C1 is a switch. In the display of show lldp neighbors command, the letter B represents a bridge. It also means a switch. The letter R represents a router. If a neighboring device is a WLAN access point, the letter W is used. Device A1 is connected to the port Fa0/1 on device B1. Device A1 is connected to the port Fa0/3 on device C1, and for that reason device C1 cannot connect to device B1 through the same port, Fa0/3.

What is defined by the ip nat pool command when configuring dynamic NAT? the pool of global address

Dynamic NAT uses a pool of inside global addresses that are assigned to outgoing sessions. Creating the pool of inside global addresses is accomplished using the ip nat pool command.

What is the purpose of the overload keyword in the ip nat inside source list 1 pool NAT_POOL overload command? It allows many inside hosts to share one or a few inside global addresses.

Dynamic NAT uses a pool of inside global addresses that are assigned to outgoing sessions. If there are more internal hosts than public addresses in the pool, then an administrator can enable port address translation with the addition of the overload keyword. With port address translation, many internal hosts can share a single inside global address because the NAT device will track the individual sessions by Layer 4 port number

How will a router handle static routing differently if Cisco Express Forwarding is disabled?

Ethernet multiaccess interfaces will require fully specified static routes to avoid routing inconsistencies *In most platforms running IOS 12.0 or later, Cisco Express Forwarding is enabled by default. Cisco Express Forwarding eliminates the need for the recursive lookup. If Cisco Express Forwarding is disabled, multiaccess network interfaces require fully specified static routes in order to avoid inconsistencies in their routing tables. Point-to-point interfaces do not have this problem, because multiple end points are not present. With or without Cisco Express Forwarding enabled, using an exit interface when configuring a static route is a viable option.

SW1# show vlan VLAN Name Status Ports ---- --------------- ------- ------------------- 1 default active Fa0/16, Fa0/17, Fa0/18, Fa0/19, Fa0/21, Fa0/22, Fa0/23, Gig0/1, Gig0/2 10 Office1 active Fa0/1, Fa0/2, Fa0/3, Fa0/4, Fa0/5, Fa0/6, Fa0/7, Fa0/8, Fa0/9, Fa0/10 20 Management active Fa0/24 30 Administration active Fa0/11, Fa0/12, Fa0/13, Fa0/14, Fa0/15 <output omitted> Refer to the exhibit. A network technician issues the command show vlan to verify the VLAN configuration. Based on the output, which port should be assigned with native VLAN?

Fa0/20 From the output, the port F0/20 is not shown, which means it is configured as a trunk port. A native VLAN can only be assigned to a trunk port.

Which statement describes the Cisco License Manager?

It is a free, standalone software application for deploying Cisco software licenses across the network. Cisco License Manager (CLM) is available as a free download from the Cisco website and is a standalone application that helps network administrators deploy licenses across entire networks.

Which address prefix range is reserved for IPv4 multicast? 224.0.0.0 - 239.255.255.255

Multicast IPv4 addresses use the reserved class D address range of 224.0.0.0 to 239.255.255.255.

Refer to the exhibit. Match the packets with their destination IP address to the exiting interfaces on the router. (Not all targets are used.) Place the options in the following order: FastEthernet0/0 packets with destination of 172.17.6.15 FastEthernet0/1 packets with destination of 172.17.14.8 FastEthernet1/0 packets with destination of 172.17.12.10 FastEthernet1/1 packets with destination of 172.17.10.5 Serial0/0/0 packets with destination of 172.17.8.20 The packet is dropped.

Packets with a destination of 172.17.6.15 are forwarded through Fa0/0. Packets with a destination of 172.17.10.5 are forwarded through Fa1/1. Packets with a destination of 172.17.12.10 are forwarded through Fa1/0. Packets with a destination of 172.17.14.8 are forwarded through Fa0/1. Because network 172.17.8.0 has no entry in the routing table, it will take the gateway of last resort, which means that packets with a destination of 172.17.8.20 are forwarded through Serial0/0/0. Because a gateway of last resort exists, no packets will be dropped.

After a license has been purchased and installed, what is the next step that is required before it is activated?

Reboot the router After the license is installed, the device needs to be reloaded to activate the license.

The graphic shows the following network devices and connections: A NAT router G0/0 interface with IP address 10.1.0.1/16 connects the to the web server with IP address 10.1.0.13/16. The NAT router also connects by a serial interface with IP address 209.165.201.1/29 to router R2 with IP address 209.165.201.2/29. R2 interface G0/0 with IP address 10.0.54.1/28 connects to PC 1 with IP address 10.0.54.5/28. Also shown is the incomplete command on the NAT router of NAT (config) #ip nat inside source static. Then there is an "A" and a "B" where the addresses should go to complete the command. Refer to the exhibit. Static NAT is being configured to allow PC 1 access to the web server on the internal network. What two addresses are needed in place of A and B to complete the static NAT configuration? (Choose two.) A = 10.1.0.13 B = 209.165.201.1

Static NAT is a one-to-one mapping between an inside local address and an inside global address. By using static NAT, external devices can initiate connections to internal devices by using the inside global addresses. The NAT devices will translate the inside global address to the inside local address of the target host.

Which type of IPv6 address refers to any unicast address that is assigned to multiple hosts? anycast

The IPv6 specifications include anycast addresses. An anycast address is any unicast IPv6 address that is assigned to multiple devices

The exhibit shows configuration commands from switch SW3 as follows: SW3(config)# vlan 35 SW3(config-vlan)# name marketing SW3(config-vlan)# vlan 150 SW3(config-vlan)# name voice SW3(config-vlan)# int fa0/20 SW3(config-if)# switchport mode access SW3(config-if)# switchport access vlan 35 SW3(config-if)# mls qos trust cos SW3(config-if)# switchport access vlan 150 SW3(config-if)# end Refer to the exhibit. A technician is programming switch SW3 to manage voice and data traffic through port Fa0/20. What, if anything, is wrong with the configuration?

The command used to assign the voice VLAN to the switch port is incorrect. The command used to assign the voice VLAN to the switch port is incorrect. Interface Fa0/20 can only have one VLAN assigned. There is nothing wrong with the configuration. The voice VLAN should be configured with the switchport voice vlan 150 command. A switch interface can be configured to support one data VLAN and one voice VLAN. The mls qos trust cos associates with the interface. Voice traffic must be trusted so that fields within the voice packet can be used to classify it for QoS.

What effect does the default-information originate command have on a Cisco router that is configured for RIP? Any default static route that is configured on the router will propagate to other adjacent routers.

The default-information originate command instructs the router to propagate the default static route to other routers by including that route in the routing updates.

Which two things should a network administrator modify on a router to perform password recovery? (Choose two.) the configuration register value the startup configuration file

The factory setting for the configuration register is 0x2102. For password recovery, the administrator should perform this procedure: Step 1. Enter the ROMMON mode. Step 2. Change the configuration register to 0x2142 to ignore the startup config file. Step 3. Make necessary changes to the original startup config file. Step 4. Save the new configuration

The graphic shows a network with devices connected as follows: Router R1, interface G0/1 is connected to router R2, interface G0/1. G0/1 on R1 has IP address 10.0.01/30 and G0/1 on R2 has IP address 10.0.0.2/30. The DHCPv4 server is connected to R2 on interface G0/0. R2 interface G0/0 has IP address 10.2.0.254/16 and the DHCPv4 server has IPv4 address 10.2.0.250. The new subnet is connected to router R1 on interface G0/0, which has IP address 10.1.0.254/16.Refer to the exhibit. A network administrator has added a new subnet to the network and needs hosts on that subnet to receive IPv4 addresses from the DHCPv4 server. What two commands will allow hosts on the new subnet to receive addresses from the DHCP4 server? (Choose two.) R1(config)# interface G0/0 R1(config-if)# ip helper-address 10.2.0.250

The ip helper-address command is used to configure a router to be a DHCPv4 relay. The command should be placed on the interface facing the DHCPv4 clients. When the command is applied on the router interface, the interface will receive DHCPv4 broadcast messages and forward them as unicast to the IP address of the DHCPv4 server.

Which ACE would permit traffic from hosts only on the 192.168.8.0/22 subnet? permit 192.168.8.0 0.0.3.255

The only filtering criteria specified for a standard access list is the source IPv4 address. The wild card mask is written to identify what parts of the address to match, with a 0 bit, and what parts of the address should be ignored, which a 1 bit.

The exhibit consists of the following command and its output: Router1# show access-lists Standard IP access list TRAFFIC-CONTROL 10 permit 172.23.0.0, wildcard bits 0.0.255.255 20 deny any Refer to the exhibit. A network administrator needs to add an ACE to the TRAFFIC-CONTROL ACL that will deny IP traffic from the subnet 172.23.16.0/20. Which ACE will meet this requirement? 5 deny 172.23.16.0 0.0.15.255

The only filtering criteria specified for a standard access list is the source IPv4 address. The wild card mask is written to identify what parts of the address to match, with a 0 bit, and what parts of the address should be ignored, which a 1 bit. The router will parse the ACE entries from lowest sequence number to highest. If an ACE must be added to an existing access list, the sequence number should be specified so that the ACE is in the correct place during the ACL evaluation process.

The exhibit shows the following router command and some partial output: R1# show ipv6 route <output omitted> S ::/0 [1/0] via Serial0/0/0, directly connected C 2001:DB8:CAFE:1::/64 [0/0] via GigabitEthernet0/1, directly connected L 2001:DB8:CAFE:1::1/128 [0/0] via GigabitEthernet0/1, receive C 2001:DB8:CAFE:2::/64 [0/0] via GigabitEthernet0/0, directly connected L 2001:DB8:CAFE:2::1/128 [0/0] via GigabitEthernet0/0, receive C 2001:DB8:CAFE:3::/64 [0/0] via Serial0/0/0, directly connected L 2001:DB8:CAFE:3::1/128 [0/0] via Serial0/0/0, receive S 2001:DB8:CAFE:4::1/128 [1/0] via Serial0/0/0, directly connected L FF00::/8 [0/0] via Null0, receive Refer to the exhibit. What will router R1 do with a packet that has a destination IPv6 address of 2001:db8:cafe:5::1? forward the packet out Serial0/0/0

The route ::/0 is the compressed form of the 0000:0000:0000:0000:0000:0000:0000:0000/0 default route. The default route is used if a more specific route is not found in the routing table.

What information can be verified through the show ip dhcp binding command? the IPv4 addresses that are assigned to hosts by the DHCP server

The show ip dhcp binding command shows a list of IPv4 addresses and the MAC addresses of the hosts to which they are assigned. Using this information an administrator can determine which host interfaces have been assigned to specific hosts.

The exhibit shows the following router command and its output: R1# show ip nat translations Pro Inside global Inside local Outside local Outside global tcp 209.165.200.225:1405 10.6.15.2:1405 209.165.202.141:80 209.165.202.141:80 tcp 209.165.200.225:1406 10.6.15.1:1406 198.51.100.3:80 198.51.100.3:80Refer to the exhibit. Which source address is being used by router R1 for packets being forwarded to the Internet? 209.165.200.225

The source address for packets forwarded by the router to the Internet will be the inside global address of 209.165.200.225. This is the address that the internal addresses from the 10.6.15.0 network will be translated to by NAT.

Data is being sent from a source PC to a destination server. Which three statements correctly describe the function of TCP or UDP in this situation? (Choose three.)

The source port field identifies the running application or service that will handle data returning to the PC. UDP segments are encapsulated within IP packets for transport across the network. The UDP destination port number identifies the application or service on the server which will handle the data. Layer 4 port numbers identify the application or service which will handle the data. The source port number is added by the sending device and will be the destination port number when the requested information is returned. Layer 4 segments are encapsulated within IP packets. UDP, not TCP, is used when low overhead is needed. A source IP address, not a TCP source port number, identifies the sending host on the network. Destination port numbers are specific ports that a server application or service monitors for requests.

The exhibit displays the following information: R1(config)# logging 192.168.1.5 R1(config)# logging trap 3 R1(config)# logging source-interface GigabitEthernet 0/1 Refer to the exhibit. Which three events will occur as a result of the configuration shown on R1? (Choose three.)

The syslog messages will contain the IP address the GigabitEthernet 0/1 interface. Messages that are sent to the syslog server will use 192.168.1.5 as the destination IP address. Messages that are sent to the syslog server will be limited to levels 3 or lower. The logging 192.168.1.5 command specifies the address of the syslog server where the messages are to be sent. The logging trap 3 command specifies that messages sent to the syslog server will be limited to severity levels of 3 and lower. The logging source-interface GigabitEthernet 0/1 command will set the source address of all syslog messages to be the address of interface GigabitEthernet 0/1.

1 default active Fa0/1, Fa0/2, Fa0/3, Fa0/4 Fa0/5, Fa0/6, Fa0/7, Fa0/8 Fa0/9, Fa0/10, Fa0/11, Fa0/12 Fa0/13, Fa0/14, Fa0/15, Fa0/16 Fa0/17, Fa0/18, Fa0/19, Fa0/20 20 Student active Fa0/21, Fa0/22, Fa0/23, Fa0/24 1002 fddi-default act/unsup 1003 token-ring-default act/unsup 1004 fddinet-default act/unsup 1005 trnet-default act/unsup Refer to the exhibit. A network administrator is reviewing port and VLAN assignments on switch S2 and notices that interfaces Gi0/1 and Gi0/2 are not included in the output. Why would the interfaces be missing from the output?

They are configured as trunk interfaces. Interfaces that are configured as trunks do not belong to a VLAN and therefore will not show in the output of the show vlan brief commands.

Which three statements characterize UDP? (Choose three.)

UDP provides basic connectionless transport layer functions. UDP is a low overhead protocol that does not provide sequencing or flow control mechanisms. UDP relies on application layer protocols for error detection. UDP is a simple protocol that provides the basic transport layer functions. It has much lower overhead than TCP because it is not connection-oriented and does not offer the sophisticated retransmission, sequencing, and flow control mechanisms that provide reliability.

Which two issues might cause excessive runt and giant frames in an Ethernet network? (Choose two.)

a malfunctioning NIC excessive collisions In an Ethernet network, a runt is a frame that is shorter than 64 bytes and a giant is a frame that is longer than the maximum allowed length. Both are often caused by NIC malfunctioning, but can also be caused by excessive collisions. CRC errors usually indicate a media or cable error caused by electrical interference, loose or damaged connections, or using the incorrect cabling type.

An administrator wants to replace the configuration file on a Cisco router by loading a new configuration file from a TFTP server. What two things does the administrator need to know before performing this task? (Choose two.

name of the configuration file that is stored on the TFTP server TFTP server IP address In order to identify the exact location of the desired configuration file, the IP address of the TFTP server and the name of the configuration file are essential information. Because the file is a new configuration, the name of the current configuration file is not necessary.

A user sends an HTTP request to a web server on a remote network. During encapsulation for this request, what information is added to the address field of a frame to indicate the destination?

the MAC address of the default gateway A frame is encapsulated with source and destination MAC addresses. The source device will not know the MAC address of the remote host. An ARP request will be sent by the source and will be responded to by the router. The router will respond with the MAC address of its interface, the one which is connected to the same network as the source.

When creating an IPv6 static route, when must a next-hop IPv6 address and an exit interface both be specified?

when the next hop is a link-local address Link-local addresses are only unique on a given link, and the same address could exist out multiple interfaces. For that reason, any time a static route specifies a link-local address as the next hop, it must also specify the exit interface. This is called a fully specified static route.


Conjuntos de estudio relacionados

Chemistry Chapter 5 Ionization Energy

View Set

Ch. 4 - Movement of Solutes and Water Across Cell Membranes

View Set

Chapter 20: Caring for Clients with Upper Respiratory Disorders - PREP U

View Set

Social Psychology Ch10 Prosocial behavior

View Set

VS Science Test - Currents and Climates

View Set