Четверг, 25.04.2024, 22:37 Приветствую Вас Гость |
Админский бубен Ярослава Стаценко |
Главная | Ответы на экзамены | Регистрация | Вход | RSS |
|
CCNA1 Final ответы на тестыАвтор: SHARK в Ответы на тесты CISCO CCNA 1 v4 | Блог Связиста | Четверг 22 июля 20101.Which three IPv4 addresses represent valid network addresses for a subnet? (Choose three.) =>192.168.9.64/28 192.168.9.146/28 =>192.168.9.96/28 192.168.9.129/26 192.168.9.51/26 =>192.168.9.64/26 3.Refer to the exhibit. Which two facts can be determined about the topology? (Choose two.) =>Four collision domains are present. One logical network is represented. =>Two broadcast domains are present. Three networks are needed. Three logical address ranges are required. 4 star point-to-point multi-access 5 =>Layer 1 Layer 2 Layer 3 Layer 4 6 This is a server response. The UDP protocol is being used. =>The destination port indicates a Telnet session. =>The return segment will contain a source port of 23. The next session originated from the client of this session will use the source port number 13358. 7 The table will remain unaffected. =>The switch will remove the MAC address at Fa0/19. The switch will retain the MAC address until host B is powered on again. The switch will rebuild the MAC table by assigning the FFFF.FFFF.FFFF address to port Fa0/19. 8 =>port number device physical address destination host logical address virtual connection identifier 9 =>The IP address of host A is properly assigned to the local NIC. Host A can send packets to any host on the local network only. Host A can send packets to any host on the local and remote network. Host A can ping successfully the default gateway address of 192.168.1.1. 10 255.255.0.0 255.255.248.0 255.255.252.0 =>255.255.254.0 255.255.255.0 255.255.255.128 11 The Telnet server process is running on PC1. Only the exchange of the Telnet username and password is encrypted. The GET request is sent to RouterA to retrieve data. =>The SSH service is used to connect PC1 to RouterB. 12 =>enable aux console VTY 13 provides remote switch management =>identifies the subnet for hosts in VLAN 100 serves as default gateway to hosts in VLAN 100 creates a routing table entry for packets to network 192.168.0.0 14 10 Base-T 10 Base-2 10 Base-5 =>100 Base-FX 100 Base TX =>1000 Base LX 15 access switch DHCP server hub =>router 16 It terminates at the Ethernet port of the router. =>It provides out-of-band console access. It terminates at the serial interface of the router. It requires a Telnet client on host A to access the router. 17 =>172.16.4.63 /26 172.16.4.129 /26 =>172.16.4.191 /26 172.16.4.51 /27 =>172.16.4.95 /27 172.16.4.221 /27 18 Host A was assigned a network address. Host B was assigned a multicast address. Host A and Host B belong to different networks. =>The gateway address was assigned a broadcast address. 19 Router(config)# line vty 0 4 This configuration allows users to connect by using a modem. Users must specify which line, 0 or 4, they wish to connect to when making a connection. =>This configuration allows users to connect to the router via the use of the telnet command. =>This configuration allows five users to make simultaneous connections to this router. 20Refer to the exhibit. Which statement is true about e-mail transmission between computer A and the server? =>The server will use HTTP to push messages to computer A. Computer A will connect to the server and retrieve inbound messages by using POP. The e-mail client on computer A uses SMTP to pull inbound messages from the server and push outbound messages to the server. A connection is established from computer A to the server on port 21 and the client software uses FTP to transmit messages as discreet files. 21 application layer presentation layer session layer =>transport layer 22.Refer to the exhibit. The network administrator wants to remotely access the CLI of the router from PC1 using modem 1. Which port of the router should be connected to modem 2 to enable this access? console Ethernet =>auxiliary serial 23 Flash
RAM ROM 24 =>It affects the operation of the device immediately when modified. It is stored in NVRAM. It should be deleted using the erase running-config command. It is automatically saved when the router reboots. 25Refer to the exhibit. What is the correct destination socket number for a web page request from Host A to the web server? 00-08-a3-b6-ce-46 =>198.133.219.25:80 C 198.133.219.0/24 is directly connected, FastEthernet0/0 26 It uses error control mechanisms. =>It uses a connectionless protocol only for multiple simultaneous transmissions. It uses multiple Layer 2 source addresses. It uses multiple port numbers. 27 It will drop the packet. It will forward the packet via FastEthernet 0/1. =>It will forward the packet to the next hop address. It will forward the packet to 172.16.2.0 28Refer to the exhibit. The host was disconnected from switch 2 and connected to switch 1. Which combination of IP address, subnet mask, and default gateway should be assigned to this host to allow it to function in the network? IP address: 10.10.9.37 Subnet mask: 255.255.255.240 Default gateway: 10.10.9.35 =>IP address: 10.10.9.37 Subnet mask: 255.255.255.224 Default gateway: 10.10.9.35 IP address: 10.10.9.29 Subnet mask: 255.255.255.248 Default gateway: 10.10.9.35 IP address: 10.10.9.32 Subnet mask: 255.255.255.224 Default gateway: 10.10.9.35 IP address: 10.10.9.37 Subnet mask: 255.255.255.224 Default gateway: 196.1.105.6 IP address: 10.10.9.63 Subnet mask: 255.255.255.224 Default gateway: 10.10.9.35 29 Configure the device. Configure individual interfaces. Configure individual terminal lines. =>Issue show and debug commands. 30 =>It monitors the media for presence of a data signal. =>After detecting a collision, hosts can resume transmission after a random timer has expired. =>A jam signal is used to ensure that all hosts are aware that a collision has occurred. Devices can be configured with a higher transmission priority. Data is transmitted only when the data signal is present. It uses a token system to avoid collisions. 31 =>TCP and UDP port numbers are used by application layer protocols. TCP uses port numbers to provide reliable transportation of IP packets. UDP uses windowing and acknowledgments for reliable transfer of data. =>TCP uses windowing and sequencing to provide reliable transfer of data. TCP is a connection-oriented protocol. UDP is a connectionless protocol. 32 physical layer data link layer network layer =>transport layer 33 Host A is transferring files to host B using FTP. =>Host A will send the next segment containing data for this session starting with byte number 11. The segment from the destination host indicates that 11 bytes have been received successfully. =>Host A is initiating a Telnet session to host B. Host B can send the next segment of the data starting with byte number 2. 34 application transport =>internet network access 35 =>issue the clock rate command on interface Serial 0/0/0 issue the description command on interface Serial 0/0/1 issue the ip address command on interface FastEthernet 0/0 issue the no shutdown command on interface FastEthernet 0/1 36 source and destination IP addresses source and destination MAC addresses source and destination port numbers source and destination channel identifiers 37 straight-through cable crossover cable
serial cable 38 It uses error control mechanisms. =>It uses a connectionless protocol only for multiple simultaneous transmissions. It uses multiple Layer 2 source addresses. It uses multiple ports. 39 Router> Router# =>Router(config)# Router(config-line)# 40 192.168.1.191 192.168.1.101 192.168.1.1 =>192.168.1.254 41 Rtr1_Bldg201 =>Building_201 Router 1 1st_Floor_Router_409_West_State_Street 42 Issue the erase flash command. =>Issue the reload command and respond no to the prompt that follows. Issue the erase start-up config command. Issue the copy running-config start-up config command. 43 Connection 1 – rollover cable Connection 2 – straight-through cable Connection 3 – crossover cable Connection 1 – straight-through cable Connection 2 – crossover cable Connection 3 – rollover cable Connection 1 – crossover cable Connection 2 – rollover cable Connection 3 – straight-through cable Connection 1 – crossover cable Connection 2 – straight-through cable Connection 3 – rollover cable =>Connection 1 – straight-through cable Connection 2 – straight-through cable Connection 3 – straight-through cable 44 Refer to the exhibit. Host A wants to access the Internet. Which combination of a Layer 2 address and a Layer 3 address will enable this access from host A? Destination MAC: 0030.8596.DE83 Default gateway: 209.165.202.130 Destination MAC: 0030.8596.DE82 Default gateway: 172.16.9.2 =>Destination MAC: 0030.8517.44C4 Default gateway: 172.16.1.1 Destination MAC: 0030.8517.44C4 Default gateway: 209.165.202.130 45 =>segment1 segment2 =>segment3 =>segment4 segment5 46 star =>ring point-to-point multi-access 47 PC switch =>router interface fa0/0 router interface fa0/1 48 The source port indicates that the session is an http session. The connection is not successful. =>The source port of the host is 3166. =>The destination port is 80. The source port does not support communication with the destination port that is listed. The source port indicates that a UDP session has been initiated. 49 0 to 255 =>0 to 1023 1024 to 49151 49152 to 65535 50 The IP address is obtained from the DHCP server. =>This PC cannot communicate with other networks. =>The network can have 14 hosts. The prefix of the computer address is /25. The IP address is routable on the Internet. The assigned address is a private address. 51 an FTP client a Telnet client =>a terminal emulation program a web browser |
|
Copyright MyCorp © 2024 |
Сайт создан в системе uCoz |