Cisco Final Exam part 2
255.255.255.240
A network administrator wants to have the same subnet mask for three subnetworks at a small site. The site has the following networks and numbers of devices: Subnetwork A: IP phones - 10 addresses Subnetwork B: PCs - 8 addresses Subnetwork C: Printers - 2 addresses What single subnet mask would be appropriate to use for the three subnetworks?
https://ccnav6.com/wp-content/uploads/2016/03/CCNA1-Final-Exam-v5.1-005-Answer.png
Match each item to the type of topology diagram on which it is typically identified. (https://ccnav6.com/wp-content/uploads/2016/03/CCNA1-Final-Exam-v5.1-005-Question.png)
https://ccnav6.com/wp-content/uploads/2017/05/2017-05-28_192437.png
Match the description with the associated IOS mode. (https://ccnav6.com/wp-content/uploads/2017/07/2017-05-2ds%C4%918_192437.jpg)
secretin
Refer to the exhibit. A network administrator is configuring access control to switch SW1. If the administrator has already logged into a Telnet session on the switch, which password is needed to access privileged EXEC mode? (https://ccnav6.com/wp-content/uploads/2017/07/i223580v1n1_208237.jpg)
lineconin
Refer to the exhibit. A network administrator is configuring access control to switch SW1. If the administrator uses a console connection to connect to the switch, which password is needed to access user EXEC mode? (https://ccnav6.com/wp-content/uploads/2017/05/2017-05-28_200126.png)
A router along the path did not have a route to the destination.
Refer to the exhibit. An administrator is testing connectivity to a remote device with the IP address 10.1.1.1. What does the output of this command indicate? (https://ccnav6.com/wp-content/uploads/2017/07/i204753v1n2_Question-9.jpg)
192.168.10.128
Refer to the exhibit. Consider the IP address of 192.168.10.0/24 that has been assigned to a high school building. The largest network in this building has 100 devices. If 192.168.10.0 is the network number for the largest network, what would be the network number for the next largest network, which has 40 devices? (https://ccnav6.com/wp-content/uploads/2017/07/i245561v1n1_245561.jpg)
The delimiting character appears in the banner message.
Refer to the exhibit. From global configuration mode, an administrator is attempting to create a message-of-the-day banner by using the command banner motd V Authorized access only! Violators will be prosecuted! V When users log in using Telnet, the banner does not appear correctly. What is the problem? (https://ccnav6.com/wp-content/uploads/2017/07/36489.jpg)
BB:BB:BB:BB:BB:BB
Refer to the exhibit. If host A sends an IP packet to host B, what will the destination address be in the frame when it leaves host A? (https://ccnav6.com/wp-content/uploads/2017/05/2017-05-28_195511.png)
https://ccnav6.com/wp-content/uploads/2016/03/CCNA1-Final-Exam-v5.1-004-Question.png
Refer to the exhibit. Match the packets with their destination IP address to the exiting interfaces on the router. (https://ccnav6.com/wp-content/uploads/2017/07/i206417v1n2_2064172.jpg)(https://ccnav6.com/wp-content/uploads/2016/03/CCNA1-Final-Exam-v5.1-004-Question-01.png)
There is connectivity between this device and the device at 192.168.100.1. & There are 4 hops b**etween this device and the device at 192.168.100.1.
Refer to the exhibit. On the basis of the output, which two statements about network connectivity are correct? (https://ccnav6.com/wp-content/uploads/2017/07/i275429v1n1_chapter-9-WAN-images2.jpg)
default gateway address
Refer to the exhibit. The network administrator for a small advertising company has chosen to use the 192.168.5.96/27 network for internal LAN addressing. As shown in the exhibit, a static IP address is assigned to the company web server. However, the web server cannot access the Internet. The administrator verifies that local workstations with IP addresses that are assigned by a DHCP server can access the Internet, and the web server is able to ping local workstations. Which component is incorrectly configured? (https://ccnav6.com/wp-content/uploads/2017/07/i274685v1n1_38117.jpg)
The administrator will be presented with the R1> prompt.
Refer to the exhibit. What will be the result of entering this configuration the next time a network administrator connects a console cable to the router and no additional commands have been entered? (https://ccnav6.com/wp-content/uploads/2017/05/2017-05-28_195821.png)
malware that was written to look like a video game
Which example of malicious code would be classified as a Trojan horse? malware that was written to look like a video game malware that requires manual user intervention to spread between systems malware that attaches itself to a legitimate program and spreads to other programs when launched malware that can automatically spread from one system to another by exploiting a vulnerability in the target
A student has two web browser windows open in order to access two web sites. The transport layer ensures the correct web page is delivered to the correct browser window.
Which scenario describes a function provided by the transport layer? A student is using a classroom VoIP phone to call home. The unique identifier burned into the phone is a transport layer address used to contact another network device on the same network. A student is playing a short web-based movie with sound. The movie and sound are encoded within the transport layer header. A student has two web browser windows open in order to access two web sites. The transport layer ensures the correct web page is delivered to the correct browser window. A corporate worker is accessing a web server located on a corporate network. The transport layer formats the screen so the web page appears properly no matter what device is being used to view the web site.
The size of each subnet may be different, depending on requirements.
Which statement is true about variable-length subnet masking? Each subnet is the same size. The size of each subnet may be different, depending on requirements. Subnets may only be subnetted one additional time. Bits are returned, rather than borrowed, to create additional subnets.
198.133.219.17 & 128.107.12.117 & 64.104.78.227
Which three addresses are valid public addresses? 198.133.219.17 192.168.1.245 10.15.250.5 128.107.12.117 192.15.301.240 64.104.78.227
UDP provides basic connectionless transport layer functions. & UDP relies on application layer protocols for error detection. & UDP is a low overhead protocol that does not provide sequencing or flow control mechanisms.
Which three statements characterize UDP? UDP provides basic connectionless transport layer functions. UDP provides connection-oriented, fast transport of data at Layer 3. UDP relies on application layer protocols for error detection. UDP is a low overhead protocol that does not provide sequencing or flow control mechanisms. UDP relies on IP for error detection and recovery. UDP provides sophisticated flow control mechanisms.