CISCO Netacad CCNA 1 Final

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

What are three parts of an IPv6 global unicast address? (Choose three.)

a global routing prefix that is used to identify the network portion of the address that has been provided by an ISP a subnet ID that is used to identify networks inside the local enterprise site an interface ID that is used to identify the local host on the network

Which layer in the TCP/IP model is used for formatting, compressing, and encrypting data?

application

The application layer of the TCP/IP model performs the functions of what three layers of the OSI model? (Choose three.)

application presentation session

Which three layers of the OSI model are comparable in function to the application layer of the TCP/IP model? (Choose three.)

application session presentation

Match the protocol function to the description while taking into consideration that a network client is visiting a web site. (Not all options are used.)

application protocol - governing the way a web server and a web client interact internet protocol - taking the segments from the transport protocol, encapsulating them into packets, and assigning them with appropriate addresses network time protocol - None transport protocol - managing the individual conversations between web servers and web clients

Refer to the exhibit. If Host1 were to transfer a file to the server, what layers of the TCP/IP model would be used?

application, transport, Internet, and network access layers

Why does HTTP use TCP as the transport layer protocol?

because HTTP requires reliable delivery

What type of communication will send a message to all devices on a local area network?

broadcast

What are two characteristics of the application layer of the TCP/IP model? (Choose two.)

closest to the end user the creation and maintenance of dialogue between source and destination applications

Which layer of the OSI model is responsible for specifying the encapsulation method used for specific types of media?

data link

Which address does a NIC use when deciding whether to accept a frame?

destination MAC address

What type of information is included in the transport header?

destination and source port numbers

Which two functions are provided to users by the context-sensitive help feature of the Cisco IOS CLI? (Choose two.)

determining which option, keyword, or argument is available for the entered command displaying a list of all available commands within the current mode

A message is sent to all hosts on a remote network. Which type of message is it?

directed broadcast

What type of route is indicated by the code C in an IPv4 routing table on a Cisco router?

directly connected route

Match each description with an appropriate IP address. (Not all options are used.) (a) 64.102.90.23 (b) 169.254.1.5 (c) 192.0.2.123 (d) 240.2.6.255 (e) 172.19.20.5 (f) 127.0.0.1

(a) None (b) a link-local address (c) a TEST-NET address (d) a experimental address (e) a private address (f) a loopback address

Match the functions to the name of the application. (Not all options are used.) (a) Telnet (b) DHCP (c) DNS (d) IMAP (e) HTTP (f) SMTP (g) FTP

(a) None (b) dynamically assigns IP addresses to clients (c) maps URLs to numerical addresses (d) allows viewing of messages on email clients (e) displays web pages (f) sends email messages (g) None

Match a statement to the related network model. (Not all options are used.)

(a) peer- to-peer network no dedicated server is required client and server roles are set on a per request basis (b) peer-to-peer application requires a specific user interface a background services is required

What part of the URL, http://www.cisco.com/index.html, represents the top-level DNS domain?

.com

Consider the following range of addresses: 2001:0DB8:BC15:00A0:0000:: 2001:0DB8:BC15:00A1:0000:: 2001:0DB8:BC15:00A2:0000:: ... 2001:0DB8:BC15:00AF:0000:: The prefix-length for the range of address is __________.

/60

What is the complete range of TCP and UDP well-known ports?

0 to 1023

Refer to the exhibit. The PC is connected to the console port of the switch. All the other connections are made through FastEthernet links. Which types of UTP cables can be used to connect the devices?

1 - rollover, 2 - straight-through, 3 - crossover

A PC is downloading a large file from a server. The TCP window is 1000 bytes. The server is sending the file using 100-byte segments. How many segments will the server send before it requires an acknowledgment from the PC?

10 segments

Which three IP addresses are private? (Choose three.)

10.1.1.1 172.16.4.4 192.168.5.5

Refer to the exhibit. Considering the addresses already used and having to remain within the 10.16.10.0/24 network range, which subnet address could be assigned to the network containing 2 hosts?

10.16.10.64/27

How many host addresses are available on the network 172.16.128.0 with a subnet mask of 255.255.252.0?

1022

What is the binary equivalent of the decimal number 232?

11101000

If a network device has a mask of /28, how many IP addresses are available for hosts on this network?

14

What is the decimal equivalent of the binary number 10010101?

149

Refer to the exhibit. A company is deploying an IPv6 addressing scheme for its network. The company design document indicates that the subnet portion of the IPv6 addresses is used for the new hierarchical network design, with the site subsection to represent multiple geographical sites of the company, the sub-site section to represent multiple campuses at each site, and the subnet section to indicate each network segment separated by routers. With such a scheme, what is the maximum number of subnets achieved per sub-site?

16

Refer to the exhibit. Match the network with the correct IP address and prefix that will satisfy the usable host addressing requirements for each network. (Not all options are used.)

192.168.0.0 /24 - None 192.168.0.192 /27 - Network C 192.168.0.228 /32 - None 192.168.0.0 /25 - Network A 192.168.0.224 /30 - Network D 192.168.0.128 /26 - Network B

Refer to the exhibit. Consider a datagram that originates on the PC and that is destined for the web server. Match the IP addresses and port numbers that are in that datagram to the description. (Not all options are used.)

192.168.1.1 - None 192.168.1.2 - source IP address 192.168.2.2 - destination IP address 25 - None 2578 - source port number 80 - destination port number

Match the subnetwork to a host address that would be included within the subnetwork. (Not all options are used.)

192.168.1.63 - None 192.168.1.68 - 192.168.1.64/27 192.168.1.128 - None 192.168.1.48 - 192.168.1.32/27 192.168.1.121 - 192.168.1.96/27

A company has a network address of 192.168.1.64 with a subnet mask of 255.255.255.192. The company wants to create two subnetworks that would contain 10 hosts and 18 hosts respectively. Which two networks would achieve that? (Choose two.)

192.168.1.64/27 192.168.1.96/28

What is the prefix for the host address 2001:DB8:BC15:A:12AB::1/64?

2001:DB8:BC15:A

A DHCP server is used to assign IP addresses dynamically to the hosts on a network. The address pool is configured with 192.168.10.0/24. There are 3 printers on this network that need to use reserved static IP addresses from the pool. How many IP addresses in the pool are left to be assigned to other hosts?

251

What subnet mask is represented by the slash notation /20?

255.255.240.0

Refer to the exhibit. A company uses the address block of 128.107.0.0/16 for its network. What subnet mask would provide the maximum number of equal size subnets while providing enough host addresses for each subnet in the exhibit?

255.255.255.128

A network administrator wants to have the same network mask for all networks at a particular small site. The site has the following networks and number of devices: IP phones - 22 addresses PCs - 20 addresses needed Printers - 2 addresses needed Scanners - 2 addresses needed The network administrator has deemed that 192.168.10.0/24 is to be the network used at this site. Which single subnet mask would make the most efficient use of the available addresses to use for the four subnetworks?

255.255.255.224

Which subnet mask would be used if 5 host bits are available?

255.255.255.224

How many bits are in an IPv4 address?

32

Which of these addresses is the shortest abbreviation for the IP address: 3FFE:1044:0000:0000:00AB:0000:0000:0057?

3FFE:1044:0:0:AB:57

Refer to the exhibit. How many broadcast domains are there?

4

A network administrator is variably subnetting a network. The smallest subnet has a mask of 255.255.255.248. How many usable host addresses will this subnet provide?

6

What is the decimal equivalent of the hx number 0x3F?

63

Refer to the exhibit. Given the network of 192.168.5.0 and a subnet mask of 255.255.255.224 for all subnets, how many total addresses are unused in the assigned subnets?

72

What is an advantage of network devices using open standard protocols?

A client host and a server running different operating systems can successfully exchange data.

Which two IPv4 to IPv6 transition techniques manage the interconnection of IPv6 domains? (Choose two.)

dual stack tunneling

What are two reasons a network administrator might want to create subnets? (Choose two.)

easier to implement security policies improves network performance

What is one advantage that the IPv6 simplified header offers over IPv4?

efficient packet handling

Refer to the exhibit. HostA is attempting to contact ServerB. Which two statements correctly describe the addressing that HostA will generate in the process? (Choose two.)

A packet with the destination IP address of ServerB. A frame with the destination MAC address of RouterA.

What is an example of network communication that uses the client-server model?

A workstation initiates a DNS request when the user types www.cisco.com in the address bar of a web browser.

Which flag in the TCP header is used in response to a received FIN in order to terminate connectivity between two network devices?

ACK

What process is used to place one message inside another message for transfer from the source to the destination?

encapsulation

What do the client/server and peer-to-peer network models have in common?

Both models support devices in server and client roles.

Which two pieces of information are in the RAM of a Cisco router during normal operations? (Choose two.)

Cisco IOS IP routing table

What is true about the Server Message Block protocol?

Clients establish a long term connection to servers.

What is contained in the trailer of a data-link frame?

error detection

What three application layer protocols are part of the TCP/IP protocol suite? (Choose three.)

DHCP DNS FTP

Which command or key combination allows a user to return to the previous level in the command hierarchy?

exit

Which two definitions accurately describe the associated application layer protocol? (Choose two.)

DNS - resolves Internet names to IP addresses Telnet - provides remote access to servers and networking devices

Which two characteristics are associated with UDP sessions? (Choose two.)

Destination devices receive traffic with minimal delay. Received data is unacknowledged.

A network administrator notices that some newly installed Ethernet cabling is carrying corrupt and distorted data signals. The new cabling was installed in the ceiling close to fluorescent lights and electrical equipment. Which two factors may interfere with the copper cabling and result in signal distortion and data corruption? (Choose two.)

EMI RFI

Which statement describes an extended star topology?

End devices connect to a central intermediate device, which in turn connects to other central intermediate devices.

A manufacturing company subscribes to certain hosted services from its ISP. The services that are required include hosted world wide web, file transfer, and e-mail. Which protocols represent these three key applications? (Choose three.)

FTP HTTP SMTP

What message type is used by an HTTP client to request data from a web server

GET

Which application layer protocol uses message types such as GET, PUT, and POST?

HTTP

Which three application layer protocols use TCP? (Choose three.)

HTTP FTP SMTP

A web client is sending a request for a webpage to a web server. From the perspective of the client, what is the correct order of the protocol stack that is used to prepare the request for transmission?

HTTP, TCP, IP, Ethernet

Which protocol is used by a client to communicate securely with a web browser?

HTTPS

What field content is used by ICMPv6 to determine that a packet has expired?

Hop Limit field

Which protocol supports Stateless Address Autoconfiguration (SLAAC) for dynamic assignment of IPv6 address to a host?

ICMPv6

When retrieving email messages, which protocol allows for easy, centralized storage and backup of emails that would be desirable for a small- to medium-sized business?

IMAP

What method can be used by two computers to ensure that packets are not dropped because too much data is being sent too quickly?

flow control

Refer to the exhibit. The network administrator has assigned the LAN of LBMISS an address range of 192.168.10.0. This address range has been subnetted using a /29 prefix. In order to accommodate a new building, the technician has decided to use the fifth subnet for configuring the new network (subnet zero is the first subnet). By company policies, the router interface is always assigned the first usable host address and the workgroup server is given the last usable host address. Which configuration should be entered into the properties of the workgroup server to allow connectivity to the Internet?

IP address: 192.168.10.38 subnet mask: 255.255.255.248, default gateway: 192.168.10.33

What is indicated by a successful pin to the ::1 IPv6 address?

IP is properly installed on the host.

Match the description to the organization. (Not all options are used.)

ISOC - This organization promotes the open development, evolution, and use of the Internet throughout the world. ISO - This organization is the largest developer of international standards in the world for a wide variety of products and services. It is known for its Open Systems Interconnection (OSI) reference model. EIA - None IANA - This organization is responsible for overseeing and managing IP address allocation, domain name management, and protocol identifiers

Which two tasks can be performed by a local DNS server? (Choose two.)

forwarding name resolution requests between servers mapping name-to-IP addresses for internal hosts

While trying to solve a network issues, a technician made multiple changes to the current router configuration file. The changes did not solve the problem and were not saved. What action can the technician take to discard the changes and work with the file in NVRAM?

Issue the reload command without saving the running configuration.

What are two services performed by the data link layer of the OSI model? (Choose two.)

It accepts Layer 3 packets and encapsulates them into frames. It provides media access control and performs error detection.

Which statement is true about the running configuration file in a Cisco IOS device?

It affects the operation of the device immediately when modified.

How does the service password-encryption command enhance password security on Cisco routers and switches?

It encrypts passwords that are stored in router or switch configuration files.

Which statement describes a hardware feature of a Cisco 1941 router that has the default hardware configuration?

It has two types of ports that can be used to access the console.

Which PDU format is used when bits are received from the network medium by the NIC of a host?

frame

What is one advantage of using fiber optic cabling rather than copper cabling?

It is able to carry signals much farther than copper cabling.

What does a client do when it has UDP datagrams to send?

It just send the datagrams.

Which two reasons generally make DHCP the preferred method of assigning IP addresses to hosts on large networks? (Choose two.)

It reduces the burden on network support staff. It eliminates most address configuration errors.

Following the default settings, what is the next step in the router boot sequence after the IOS loads from flash?

Locate and load the startup-config file from NVRAM.

What is true concerning physical and logical topologies?

Logical topologies refer to how a network transfers data between devices.

What is an advantage for small organizations of adopting IMAP instead of POP?

Messages are kept in the mail servers until they are manually deleted from the email client.

Which method of data transfer allows information to be sent and received at the same time?

full duplex

What are three characteristics of multicast transmission? (Choose three.)

Multicast transmission an be used by routers to exchange routing information. The range of 224.0.0.0 to 224.0.0.255 is reserved to reach multicast groups on a local network. A single packet can be sent to a group of hosts.

Match the characteristics to the correct type of fiber. (Not all options are used.)

Multimode Fiber -- (1) LED as light source (2) several paths of light into the fiber (3) generally used with LANs Single-mode Fiber (1) only one ray of light into the fiber (2) generally used for campus backbone (3) laser as light source

Refer to the exhibit. Which route from the PC1 routing table will be used to reach PC2?

Network Destination: 192.168.10.0 Netmask: 255.255.255.0 Gateway: On-link Interface: 192.168.10.10 Metric 281

Open the PT Activity. Perform the tasks in the activity instructions and then answer the question. Which PC or PCs are sending FTP packets to the server?

PC_2

What is an advantage of using standards to develop and implement protocols?

Products from different manufacturers can interoperate successfully.

What IPv4 header field identifies the upper layer protocol carried in the packet?

Protocol

Match the command with the devie mode at which the command is entered. (Not all options are used.)

R1(config)# - service password-encryption R1> - enable R1(config-router)# - none R1# - copy running-config startup-config R1(config-line)# - login R1(config-if)# - ip address 192.168.4.4 255.255.255.0

Which type of connector does a network interface card use?

RJ-45

Which application layer protocol is used to provide file-sharing and print services to Microsoft applications?

SMB

A network administrator needs to keep the user ID, password, and session contents private when establishing remote CLI connectivity with a switch to manage it. Which access method should be chosen?

SSH

The PT initialization was skipped. You will not be able to view the PT activity. Open the PT Activity. The enable password on SW1 is cisco. Perform the tasks in the activity instructions and then answer the question. For what reason is the failure occurring?

SW1 does not have a default gateway configured.

Which wo flags in the TCP header are used in a TCP three-way handshake to establish connectivity between two network devices? (Choose two.)

SYN ACK

Refer to the exhibit. R1 receives a packet destined for the IP address 192.168.2.10. Out which interface will R1 forward the packet?

Serial0/0/1

Which two host names follow the guidelines for naming conventions on Cisco IOS devices (Choose two.)

SwBranch799 RM-3-Switch-2A4

Match the definitions to their respective CLI hot keys and shortcuts. (Not all options are used.)

Tab - completes abbreviated commands and parameters space bar - displays the next screen Up Arrow - scrolls backwards through previously entered commands Ctrl-C - NONE ? - provides context-sensitive help Ctrl-Shift-6 - aborts commands such as trace and ping

Which characteristic describes an IPv6 enhancement over IPv4?

The IPv6 header is simpler than the IPv4 header is, which improves packet handling

A technician is adding a new PC to a LAN. After unpacking the components and making all the connections, the technician starts the PC. After the OS loads, the technician opens a browser, and verifies that the PC can reach the Internet. Why was the PC able to connect to the network with no additional configuration?

The PC was preconfigured to use DHCP.

Which statement is true about the TCP/IP and OSI models?

The TCP/IP transport layer and OSI Layer 4 provide similar services and functions.

What happens if the first packet of a TFTP transfer is lost?

The TFTP application will retry the request if a reply is not received.

Which statement is true about FTP?

The client can download data from or upload data to the server.

A router boots and enters setup mode. What is the reason for this?

The configuration file is missing from NVRAM.

What are two characteristics of RAM on a Cisco device? (Choose two.)

The contents of RAM are lost during a power cycle. The configuration that is actively running on the device is stored in RAM.

Refer to the exhibit. What three facts can be determined from the viewable output of the show ip interface brief command? (Choose three.)

The default SVI has been configured. The switch can be remotely managed. One device is attached to a physical interface.

Which three statements describe a DHCP Discover message? (Choose three.)

The destination IP address is 255.255.255.255. The message comes from a client seeking an IP address. All hosts receive the message, but only a DHCP server replies.

A host device is receiving live streaming video. How does the device account for video data that is lost during transmission?

The device will continue receiving the streaming video, but there may be a momentary disruption.

What will happen if the default gateway address is incorrectly configured on a host?

The host cannot communicate with hosts in other networks.

What is the function of the kernel of an operating system?

The kernel provisions hardware resources to meet software requirements.

What happens if part of an FTP message is not delivered to the destination?

The part of the FTP message that was lost is re-sent.

What does the IP address 172.17.4.250/24 represent?

host address

Which two parts are components of an IPv4 address? (Choose two.)

host portion network portion

What is a result of connecting two or more switches together?

The size of the broadcast domain is increased.

What does TCP do if the sending source detects network congestion on the path to the destination?

The source will decrease the amount of data that it sends before it must receive acknowledgements from the destination.

As data travels on the media in a steam of 1s and 0s how does a receiving node identify the beginning and end of a frame?

The transmitting node inserts start and stop bits into the frame.

Refer to the exhibit. What is wrong with the displayed termination?

The untwisted length of each wire is too long.

What is a characteristic of a TCP server process?

There can be many ports open simultaneously on a server, one for each active server

Why are two strands of fiber used for a single fiber optic connection?

They allow for full-duplex connectivity.

Which statement is correct about network protocols?

They define how messages are exchanged between the source and the destination.

Which field in the IPv4 header is used to prevent a packet from traversing a network endlessly

Time-to-Live

What is a user trying to determine when using a ping 10.1.1.1 command on a PC?

if there is connectivity with the destination device

What is a characteristic of UDP?

UDP reassembles the received datagrams in the order they were received.

When a connectionless protocol is in use at a lower layer of the OSI model, how is missing data detected and retransmitted if necessary?

Upper-layer connection-oriented protocols keep track of the data received and can request retransmission from the upper-level protocols on the sending host.

Which procedure is used to access a Cisco 2960 switch when performing an initial configuration in a secure environment?

Use the console port to locally access the switch from a serial or USB interface of the PC.

Which interface is the default SVI on a Cisco switch?

VLAN 1

What are two types of router interfaces?

WAN LAN

An administrator is configuring a switch console port with a password. In what order will the administrator travel through the IOS modes of operation in order to reach the mode in configuration commands will be entered? (Not all options are used.)

interface configuration mode - NONE privileged EXEC mode - second mode line configuration mode - final mode global configuration mode - third mode user EXEC mode - first mode

What command can be used on a Windows PC to see the IP configuration of that computer?

ipconfig

What type of address is automatically assigned to an interface when IPv6 is enabled on that interface?

link-local

What three commands are used to set up secure access to a router through a connection to the console interface? (Choose three.)

login line console 0 password cisco

What are two types of IPv6 unicast addresses? (Choose two.)

loopback link-local

A host device needs to send a large video file across the network while providing data communication to other users. Which feature will allow different communication streams to occur at the same time, without having a single data stream using all available bandwidth?

multiplexing

At which layer of the OSI model would a logical address be added during encapsulation?

network layer

Refer to the exhibit. A network technician is testing connectivity in a new network. Based on the test results shown in the exhibit, which device does the technician have connectivity with and which device does the technician not have connectivity with? (Choose two.)

no connectivity: PC-C connectivity: switch 2

What are two characteristics of IP? (Choose two.)

operates independently of the network media does not require a dedicated end-to-end connection

What are two examples of hybrid topologies? (Choose two.)

partial mesh extended star

Two students are working on a network design project. One student is doing the drawing, while the other student is writing the proposal. The drawing is finished and the student wants to share the folder that contains the drawing so that the other student can access the file and copy it to a USB drive. Which networking model is being used?

peer-to-peer

A network administrator needs to monitor network traffic to and from servers in a data center. Which features of an IP addressing scheme should be applied to these devices?

predictable static IP addresses for easier identification

What are proprietary protocols?

protocols developed by organizations who have control over their definition and operation

What kind of port must be requested form IANA in order to be used with a specific application?

registered port

What routing table entry has a next hop address associated with a destination network?

remote routes

A network administrator is deigning the layout of a new wireless network. Which three areas of concern should be accounted for when building a wireless network? (Choose three.)

security coverage area interference

Which PDU is processed when a host computer is de-encapsulating a message at the transport layer of the TCP/IP model?

segment

What information is used by TCP to reassemble and reorder received segments?

sequence numbers

An administrator wants to configure hosts to automatically assign IPv6 addresses to themselves by the use of Router Advertisement messages, but also to obtain the DNS server address from a DHCPv6 server. Which address assignment method should be configured?

stateless DHCPv6

Which characteristic of the network layer in the OSI model allows carrying packets for multiple types of communications among many hosts?

the ability to operate without regard to the data that is carried in each packet

What is the definition of bandwidth?

the amount of data that can flow from one place to another in a given amount of time

Which factor determines TCP window size?

the amount of data the destination can process at one time

What is a socket?

the combination of a source IP address and port number or a destination IP address and port number

Which information does the show startup-config command display?

the contents of the save configuration file in the NVRAM

Which two things can be determined by using the ping command? (Choose two.)

the destination device is reachable through the network the average time it takes a packet to reach the destination and for the response to return to the source

Which characteristic describes crosstalk?

the distortion of the transmitted messages from signals carried in adjacent wires

What characteristic describes the default gateway of a host computer?

the logical address of the router interface on the same network as the host computer

What is indicated by the term throughput?

the measure of the bits transferred across the media over a given period of time

During a TCP session, a destination device sends an acknowledgement number to the source device. What does the acknowledgement number represent?

the next byte that the destination expects to receive

Match each description to its corresponding term. (Not all options are used.)

the process of determining when to begin sending messages on a network - None the process of converting information from one format into another acceptable for transmission - message encoding the process of placing one message format inside another message format - message encapsulation the process of unpacking one message format from another message format - None the process of breaking up a long message into individual pieces before being sent over the network - message sizing

Which interface allows remote management of Layer 2 switch?

the switch virtual interface

How many bits must be borrowed from the host portion of an address to accommodate a router with five connected networks?

three

What is the purpose of the startup configuration file on a Cisco router?

to contain the commands that are used to initially configure a router on startup

What is the purpose of the subnet mask in conjunction with an IP address?

to determine the subnet to which the host belongs

Refer to the exhibit A. A network administrator is configuring the MOTD on switch SW1. What is the purpose of this command?

to display a message when a user accesses the switch

Why would a Layer 2 switch need an IP address?

to enable the switch to be managed remotely

Why is it important to configure a hostname on a device?

to identify the device during remote access (SSH or telnet)

What are two reasons for physical layer protocols to use frame encoding techniques? (Choose two.)

to identify where the frame starts and ends to distinguish data from control information

What is the function of the Nslookup utility?

to manually query the name servers to resolve a given host name

What is a role of the Logical Link Control sublayer?

to mark frames to identify the network layer protocol being carried

What is the purpose of ICMP messages?

to provide feedback of IP packet transmissions

What is the function of the CRC value that is found in the FCS field of a frame?

to verify the integrity of the received frame

What technique is used with UTP cable to help protect against signal interference from crosstalk?

twisting the wires together into pairs

A router with a valid operating system contains a configuration file stored in NVRAM. The configuration file has an enable secret password but no console password. When the router boots up, which mode will display?

user EXEC mode

When is UDP preferred to TCP?

when an application can tolerate some loss of data during transmission

A user is executing a tracert to a remote device. At what point would a router, which is the path to the destination device, stop forwarding the packet?

when the value of the TTL field reaches zero


Ensembles d'études connexes

AP Government and Politics Exam Vocab Deck

View Set

Pennsylvania Property and Casualty Law Supplement

View Set

Chapter 2: Planning Business Messages

View Set

Texas Real Estate Agency: Chapter 4

View Set