096.55555.69
096.888.6300
0915.183535
0915.363436

CCNA 5.0 (CCNA R&S) – Network Basics Final Exam P2

CCNA 5.0 (CCNA R&S) – Network Basics Final Exam P2

26

Which two statements correctly describe a router memory type and its contents? (Choose two.)

ROM is nonvolatile and stores the running IOS.

FLASH is nonvolatile and contains a limited portion of the IOS​.

RAM is volatile and stores the IP routing table.

NVRAM is nonvolatile and stores other system files.

ROM is nonvolatile and contains basic diagnostic software.

27

 

In which default order will a router search for startup configuration information?

NVRAM, RAM, TFTP

NVRAM, TFTP, setup mode

setup mode, NVRAM, TFTP

TFTP, ROM, NVRAM

flash, ROM, setup mode

28

Which IP address is a valid host address?

172.16.4.32/27

172.16.4.79/28

172.16.4.255/22

172.16.5.255/23

29

Which three IP addresses are private ? (Choose three.)

10.1.1.1

172.32.5.2

192.167.10.10

172.16.4.4

192.168.5.5

224.6.6.6

30

What is the purpose of ICMP messages?

to inform routers about network topology changes

to ensure the delivery of an IP packet

to provide feedback of IP packet transmissions

to monitor the process of a domain name to IP address resolution

31

 

What is the range of host IP addresses for the subnet 172.16.1.32/29?

172.16.1.33 – 172.16.1.38

172.16.1.33 – 172.16.1.46

172.16.1.33 – 172.16.1.62

172.16.1.32 – 172.16.1.39

172.16.1.32 – 172.16.1.47

32

ccna 5.0 - 32

ccna 5.0 – 32

Refer to the exhibit. A user is configuring a PC with the IP settings as displayed, but the operating system will not accept them. What is the problem?

The subnet mask is wrong.

The IP address is not a usable host address.

The DNS settings are not configured.

The gateway address is not configured.

33

 

Which subnet would include the address 192.168.1.96 as a usable host address?

192.168.1.64/26

192.168.1.32/27

192.168.1.32/28

192.168.1.64/29

34

ccna 5.0 - 34

ccna 5.0 – 34

Refer to the exhibit. Which IP addressing scheme should be changed?

Site 1

Site 2

Site 3

Site 4

35

An organization has received the IPv6 network prefix of 2001:db8:1234::/48 from their ISP. How many subnets can be created from this prefix without borrowing bits from the interface ID?

1024

4096

8192

65536

36

What is a characteristic of the LLC sublayer?

It provides the logical addressing required that identifies the device.

It provides delimitation of data according to the physical signaling requirements of the medium.

It places information in the frame that allows multiple Layer 3 protocols to use the same network interface and media.

It defines software processes that provide services to the physical layer.

37

Which media access method requires that an end device send a notification across the media before sending data?

CSMA/CA​

CSMA/CD​

deterministic

token passing

38

A frame is transmitted from one networking device to another. Why does the receiving device check the FCS field in the frame?

to determine the physical address of the sending device

to verify the network layer protocol information

to compare the interface media type between the sending and receiving ends

to check the frame for possible transmission errors

to verify that the frame destination matches the MAC address of the receiving device

39

What is an important function of the physical layer of the OSI model?

It accepts frames from the physical media.

It encapsulates upper layer data into frames.

It defines the media access method performed by the hardware interface.

It encodes frames into electrical, optical, or radio wave signals.

40

Which procedure is used to reduce the effect of crosstalk in copper cables?

requiring proper grounding connections

twisting opposing circuit wire pairs together

wrapping the bundle of wires with metallic shielding

designing a cable infrastructure to avoid crosstalk interference

avoiding sharp bends during installation

41

What are the three primary functions provided by Layer 2 data encapsulation? (Choose three.)

error correction through a collision detection method

session control using port numbers

data link layer addressing

placement and removal of frames from the media

detection of errors through CRC calculations

delimiting groups of bits into frames

conversion of bits into data signals

42

A PC is configured to obtain an IP address automatically from network 192.168.1.0/24. The network administrator issues the arp –a command and notices an entry of 192.168.1.255 ff-ff-ff-ff-ff-ff. Which statement describes this entry?

This is a static map entry.

This is a dynamic map entry.

This entry refers to the PC itself.

This entry maps to the default gateway.

43

 

What will a Layer 2 switch do when the destination MAC address of a received frame is not in the MAC table?

It initiates an ARP request.

It broadcasts the frame out of all ports on the switch.

It notifies the sending host that the frame cannot be delivered.

It forwards the frame out of all ports except for the port at which the frame was received.

44

What is the auto-MDIX feature on a switch?

the automatic configuration of an interface for 10/100/1000 Mb/s operation

the automatic configuration of an interface for a straight-through or a crossover Ethernet cable connection

the automatic configuration of full-duplex operation over a single Ethernet copper or optical cable

the ability to turn a switch interface on or off accordingly if an active connection is detected

45

ccna 5.0 - 45

ccna 5.0 – 45

Refer to the exhibit. A ping to PC3 is issued from PC0, PC1, and PC2 in this exact order. Which MAC addresses will be contained in the S1 MAC address table that is associated with the Fa0/1 port?

just PC0 and PC1 MAC addresses

just the PC0 MAC address

PC0, PC1, and PC2 MAC addresses

just the PC1 MAC address

just the PC2 MAC address​

46

In performing a protocol analysis of a network, when should traffic be captured to ensure the most accurate representation of the different traffic types on the network?

during software upgrades

during times of moderate network use

during hours of peak network use

during weekends and holidays when network use is light

47

How does a Layer 3 switch differ from a Layer 2 switch?

A Layer 3 switch supports VLANs, but a Layer 2 switch does not.

An IP address can be assigned to a physical port of a Layer 3 switch. However, this is not supported in Layer 2 switches.

A Layer 3 switch maintains an IP address table instead of a MAC address table.

A Layer 3 switch learns the MAC addresses that are associated with each of its ports. However, a Layer 2 switch does not.

48

 

A network administrator is checking the system logs and notices unusual connectivity tests to multiple well-known ports on a server. What kind of potential network attack could this indicate?

access

reconnaissance

denial of service

information theft

49

 

What is the most effective way to mitigate worm and virus attacks?

Secure all Layer 2 devices.

Ensure that users change their passwords often.

Deploy packet filtering firewalls at the network edge.

Install security updates to patch vulnerable systems.

50

When applied to a router, which command would help mitigate brute-force password attacks against the router?

exec-timeout 30

service password-encryption

banner motd $Max failed logins = 5$

login block-for 60 attempts 5 within 60

51

A particular website does not appear to be responding on a Windows 7 computer. What command could the technician use to show any cached DNS entries for this web page?

ipconfig /all

arp -a

ipconfig /displaydns

nslookup

52

ccna 5.0 - 52

ccna 5.0 – 52

Refer to the exhibit. What is the significance of the asterisk (*) in the exhibited output?

The asterisk shows which file system was used to boot the system.

The asterisk designates which file system is the default file system.

An asterisk indicates that the file system is bootable.

An asterisk designates that the file system has at least one file that uses that file system.

53

ccna 5.0 - 53

ccna 5.0 – 53

Refer to the exhibit. The network administrator enters these commands into the R1 router:

 

R1# copy running-config tftp

Address or name of remote host [ ]?

 

When the router prompts for an address or remote host name, what IP address should the administrator enter at the prompt?

 

 

192.168.9.254

192.168.10.1

192.168.10.2

192.168.11.252

192.168.11.254

54

Fill in the blank.

During data communications, a host may need to send a single message to a specific group of destination hosts simultaneously. This message is in the form of a …………………………. message.

55

Fill in the blank. Use the acronym.

A VoIP call uses ………………… as the Layer 4 protocol.

56

ccna 5.0 - 56

ccna 5.0 – 56

57

 

ccna 5.0 - 57

ccna 5.0 – 57

58

ccna 5.0 - 58

ccna 5.0 – 58

59

Open the PT activity. Perform the tasks in the activity instructions and then fill in the blank.

The Server0 message is …………….

60

Open the PT Activity. Perform the tasks in the activity instructions and then answer the question.

Which IPv6 address is assigned to the Serial0/0/0 interface on RT2?

2001:db8:abc:1::1

2001:db8:abc:5::1

2001:db8:abc:5::2

2001:db8:abc:10::15

 

P1

 

 

 

 

 

 

Tags:
Nhắn tin qua Facebook