CCNA Internetworking Pretest Exam

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Which three IP addresses are public? (Choose three.) A. 64.104.7.7 B. 192.168.5.5 C. 10.1.1.1 D. 172.16.4.4 E. 192.31.7.10 F. 128.107.0.7

A. 64.104.7.7 E. 192.31.7.10 F. 128.107.0.7

Refer to the exhibit. PC1 is configured to obtain a dynamic IP address from the DHCP server. PC1 has been shut down for two weeks. When PC1 boots and tries to request an available IP address, which destination IP address will PC1 place in the IP header? A. 255.255.255.255 B. 192.168.1.255 C. 192.168.1.8 D. 192.168.1.1

A. 255.255.255.255

Refer to the exhibit. How many broadcast and collision domains exist in the topology? A. 5 broadcast domains and 10 collision domains B. 16 broadcast domains and 11 collision domains C. 10 broadcast domains and 5 collision domains D. 5 broadcast domains and 11 collision domains

A. 5 broadcast domains and 10 collision domains

What does the cost of an OSPF link indicate? A. A lower cost indicates a better path to the destination than a higher cost does. B. Cost equals bandwidth. C. A higher cost for an OSPF link indicates a faster path to the destination. D. Link cost indicates a proportion of the accumulated value of the route to the destination.

A. A lower cost indicates a better path to the destination than a higher cost does.

Which media access method requires that an end device send a notification across the media before sending data? A. CSMA/CA​ B. CSMA/CD​ C. deterministic D. token passing

A. CSMA/CA​

Refer to the exhibit. What is the correct order for PDU encapsulation?

A. Fame Header, Network Header, Transport Header, Data, Frame Trailer

What is the purpose of a routing protocol? A. It allows a router to share information about known networks with other routers. B. It is used to build and maintain ARP tables. C. It allows an administrator to devise an addressing scheme for the network. D. It provides a procedure for encoding and decoding data into bits for packet forwarding. E. It provides a method for segmenting and reassembling data packets.

A. It allows a router to share information about known networks with other routers.

What are two functions of a router? (Choose two.) A. It connects multiple IP networks. B. It controls the flow of data via the use of Layer 2 addresses. C. It determines the best path to send packets. D. It increases the size of the broadcast domain. E. It manages the VLAN database.

A. It connects multiple IP networks. C. It determines the best path to send packets.

What are two characteristics of link-state protocols compared to distance vector protocols? (Choose two.) A. They require a lot of hardware resources. B. They flood the routing table periodically. C. They compute their own knowledge of the network topology. D. They use hop counts to compute the network topology. E. They know of the network topology from the perspective of their neighbors.

A. They require a lot of hardware resources. C. They compute their own knowledge of the network topology.

A host is accessing an FTP server on a remote network. Which three functions are performed by intermediary network devices during this conversation? (Choose three.) A. applying security settings to control the flow of data B. notifying other devices when errors occur C. providing a channel over which messages travel D. regenerating data signals E. acting as a client or a server F. serving as the source or destination of the messages

A. applying security settings to control the flow of data B. notifying other devices when errors occur D. regenerating data signals

Refer to the exhibit. A network administrator is configuring access control to switch SW1. If the administrator uses Telnet to connect to the switch, which password is needed to access user EXEC mode? A. inevtyin B. secretin C. lineconin D. letmein

A. inevtyin

Which two factors are important when deciding which interior gateway routing protocol to use? (Choose two.) A. speed of convergence B. the autonomous system that is used C. campus backbone architecture D. ISP selection E. scalability

A. speed of convergence E. scalability

Open the PT Activity. Perform the tasks in the activity instructions and then answer the question. Which IPv6 address is assigned to the Serial0/0/0 interface on RT2? A. 2001:db8:abc:1::1 B. 2001:db8:abc:5::1 C. 2001:db8:abc:5::2 D. 2001:db8:abc:10::15

B. 2001:db8:abc:5::1

Refer to the exhibit. A TCP segment from a server has been captured by Wireshark, which is running on a host. What acknowledgement number will the host return for the TCP segment that has been received? A. 250 B. 306 C. 21 D. 2921 E. 2

B. 306

Which two components are configured via software in order for a PC to participate in a network environment? (Choose two.) A. shell B. IP address C. subnet mask C. kernel D. MAC address

B. IP address C. subnet mask

What is the most likely scenario in which the WAN interface of a router would be configured as a DHCP client to be assigned a dynamic IP address from an ISP? A. The router is also the gateway for a LAN. B. It is a SOHO or home broadband router. C. There is a web server for public access on the LAN that is attached to the router. D. The router is configured as a DHCP server.

B. It is a SOHO or home broadband router.

Which three advantages are provided by static routing? (Choose three.) A. Static routes scale well as the network grows. B. Static routing does not advertise over the network, thus providing better security. C. The path a static route uses to send data is known. D. No intervention is required to maintain changing route information. E. Static routing typically uses less network bandwidth and fewer CPU operations than dynamic routing does. F. Configuration of static routes is error-free.

B. Static routing does not advertise over the network, thus providing better security C. The path a static route uses to send data is known. E. Static routing typically uses less network bandwidth and fewer CPU operations than dynamic routing does.

What happens when part of an Internet television transmission is not delivered to the destination? A. A delivery failure message is sent to the source host. B. The transmission continues without the missing portion. C. The entire transmission is re-sent. D. The part of the television transmission that was lost is re-sent.

B. The transmission continues without the missing portion.

ACLs are used primarily to filter traffic. What are two additional uses of ACLs? (Choose two.) A. filtering VTP packets B. specifying internal hosts for NAT C. reorganizing traffic into VLANs D. specifying source addresses for authentication E. identifying traffic for QoS

B. specifying internal hosts for NAT E. identifying traffic for QoS

Which IP address is a valid network address? A. 172.16.4.255/22 B. 172.16.4.79/28 C. 172.16.4.32/27 D. 172.16.5.255/23

C. 172.16.4.32/27

What is the most effective way to mitigate worm and virus attacks? A. Deploy packet filtering firewalls at the network edge. B. Ensure that users change their passwords often. C. Install security updates to patch vulnerable systems. D. Secure all Layer 2 devices.

C. Install security updates to patch vulnerable systems.

A network contains multiple VLANs spanning multiple switches. What happens when a device in VLAN 20 sends a broadcast Ethernet frame? A. All devices in all VLANs see the frame. B. Devices in VLAN 20 and the management VLAN see the frame. C. Only devices in VLAN 20 see the frame. D. Only devices that are connected to the local switch see the frame.

C. Only devices in VLAN 20 see the frame.

Which technology provides a solution to IPv4 address depletion by allowing multiple devices to share one public IP address? A. DNS B. SMB C. PAT D. ARP E. HTTP F. DHCP

C. PAT

Refer to the exhibit. What will the router do with a packet that has a destination IP address of 192.168.12.227? A. Send the packet out the GigabitEthernet0/0 interface. B. Drop the packet. C. Send the packet out the Serial0/0/0 interface. D. Send the packet out the GigabitEthernet0/1 interface.

C. Send the packet out the Serial0/0/0

Refer to the exhibit. Which IP addressing scheme should be changed? A. Site 3 B. Site 1 C. Site 2 D. Site 4

C. Site 2

In performing a protocol analysis of a network, when should traffic be captured to ensure the most accurate representation of the different traffic types on the network? A. during software upgrades B. during times of moderate network use C. during hours of peak network use D. during weekends and holidays when network use is light

C. during hours of peak network use

A small car dealership has a scanner that is attached to the PC of the sales manager. When salesmen need to scan a document, they place the document in the scanner and use their own PCs to control the scanner through software on the PC of the manager. After the document is scanned, they can attach it to an email or upload it into the sales software. What type of network model does this scenario describe? A. packet-switched B. client/server C. peer-to-peer D. centralized E. hierarchical

C. peer-to-peer

A small-sized company has 30 workstations and 2 servers. The company has been assigned a group of IPv4 addresses 209.165.200.224/29 from its ISP. The two servers must be assigned public IP addresses so they are reachable from the outside world. What technology should the company implement in order to allow all workstations to access services over the Internet simultaneously? A. dynamic NAT B. static NAT C. port address translation D. DHCP

C. port address translation

A network administrator is checking the system logs and notices unusual connectivity tests to multiple well-known ports on a server. What kind of potential network attack could this indicate? A. denial of service B. information theft C. reconnaissance D. access

C. reconnaissance

Which information does a switch use to keep the MAC address table information current? A. the destination MAC address and the incoming port B. the source and destination MAC addresses and the outgoing port C. the source MAC address and the incoming port D. the source and destination MAC addresses and the incoming port E. the destination MAC address and the outgoing port F. the source MAC address and the outgoing port

C. the source MAC address and the incoming port

An organization has received the IPv6 network prefix of 2001:db8:1234::/52 from their ISP. How many subnets can be created from this prefix without borrowing bits from the interface ID? A. 65536 B. 1024 C. 8192 D. 4096

D. 4096

Which statement is true about IPv6 addresses? A. Link-local addresses must be unique. B. A loopback address is represented by ::/128.​ C. Unique local addresses are used to communicate with other devices on the same link. D. Global unicast addresses are globally unique and can be routed through the Internet.

D. Global unicast addresses are globally unique and can be routed through the Internet.

Which statement describes a route that has been learned dynamically? A. It has an administrative distance of 1. B. It is unaffected by changes in the topology of the network. C. It is identified by the prefix C in the routing table. D. It is automatically updated and maintained by routing protocols.

D. It is automatically updated and maintained by routing protocols.

To revert to a previous configuration, an administrator issues the command copy tftp startup-config on a router and enters the host address and file name when prompted. After the command is completed, why does the current configuration remain unchanged? A. The command should have been copy startup-config tftp. B. The configuration changes were copied into RAM and require a reboot to take effect. C. A TFTP server can only be used to restore the Cisco IOS, not the router configuration. D. The configuration should have been copied to the running configuration instead.

D. The configuration should have been copied to the running configuration instead.

Refer to the exhibit. What is the link-local IPv6 address of the local computer shown based on the output of the netstat -r command? A. 2001:db8:9d38:953c:1c53:2271:9c9a:c62c/128 B. 2001::/32 C. fe80::/64 D. fe80::13e:4586:5807:95f7/128 E. ::1/128

D. fe80::13e:4586:5807:95f7/128

A particular website does not appear to be responding on a Windows 7 computer. What command could the technician use to show any cached DNS entries for this web page? A. nslookup B. ipconfig /all C. arp -a D. ipconfig /displaydns

D. ipconfig /displaydns

What is the range of host IP addresses for the subnet 172.16.1.32/28? A. 172.16.1.32 - 172.16.1.47 B. 172.16.1.33 - 172.16.1.38 C. 172.16.1.33 - 172.16.1.62 D. 172.16.1.32 - 172.16.1.39 E. 172.16.1.33 - 172.16.1.46

E. 172.16.1.33 - 172.16.1.46

Open the PT Activity. Perform the tasks in the activity instructions and then answer the question. What is the secret keyword that is displayed on the web page? A. cisco B. router C. switch D. frame E. packet

E. packet

Match the application protocols to the correct transport protocols.

TCP - FTP, HTTP, SMTP UDP - DHCP, TFTP

Open the PT Activity. Perform the tasks in the activity instructions and then answer the question. Fill in the blank. Do not use abbreviations.What is the missing command on S1?

The ip address 192.168.99.2 255.255.255.0 command is missing on interface vlan 99, the management VLAN.​


Ensembles d'études connexes

Chapter 18: Patient billing, posting patient payments, and collecting fees

View Set

Perspectives on the World Christian Movement - Midterm Review

View Set

Honors Chemistry First Semester Test Review

View Set

Unit two: ch. 5-9 *skipped ch. 7

View Set