English FormJ-1a ENetwork v4.0 Final
A routing issue has occurred in your internetwork. Which of the following type of devices should be examined to isolate this error?
Which device should be used for enabling a host to communicate with another host on a different network?
Refer to the exhibit. Which set of devices contains only intermediary devices?
A, B, D, G
Refer to the exhibit. An employee wants to access the organization intranet from home. Which intermediary device should be used to connect the organization intranet to the Internet to enable this access?
Refer to the exhibit. A technician uses the nslookup command on the PC and views the output that is displayed in the exhibit. What is the IP address of the primary domain name server used by the host?
Refer to the exhibit. On the basis of the IP configuration that is shown, what is the reason that Host A and Host B are unable to communicate outside the local network?
The gateway address was assigned a broadcast address.
Which password is automatically encrypted when it is created?
A technician is asked to secure the privileged EXEC mode of a switch by requiring a password. Which type of password would require this login and be considered the most secure?
Which physical component is used to access and perform the initial configuration on a new unconfigured router?
Which topology divides the collision domain and provides full media bandwidth to the hosts in the network?
What is the effect of using the Router# copy running-config startup-config command on a router?
The contents of NVRAM will change.
Refer to the exhibit. When computer A sends a frame to computer D, what computers receive the frame?
only computer D
Refer to the exhibit. A technician is working on a network problem that requires verification of the router LAN interface. What address should be pinged from this host to confirm that the router interface is operational?
A user sees the command prompt: Router(config-if)# . What task can be performed at this mode?
Configure individual interfaces.
Refer to the exhibit. A PC is connected to a network. Which action will verify that the PC can communicate with its default gateway?
Use the ping 10.0.0.254 command.
Refer to the exhibit. A PC is communicating with another PC on a remote network. The two networks are connected by three routers. Which action will help to identify the path between the hosts?
Use the tracert command at the host.
Refer to the exhibit. The diagram represents the process of sending email between clients. Select the list below that correctly identifies the component or protocol used at each numbered stage of the diagram.
1.MUA 2.SMTP 3.MTA 4.SMTP 5.MTA 6.MDA 7.POP 8.MUA
Refer to the exhibit. The serial interface of the router was configured with the use of the commands that are shown. The router cannot ping the router that is directly connected to interface serial 0/0/0. What should the network technician do to solve this problem?
Configure an IP address on interface serial 0/0/0.
Refer to the exhibit. Assume all devices are using default configurations. How many subnets are required to address the topology that is shown?
A PC can not connect to any remote websites, ping its default gateway, or ping a printer that is functioning properly on the local network segment. Which action will verify that the TCP/IP stack is functioning correctly on this PC?
Use the ping 127.0.0.1 command at the command prompt.
Refer to the exhibit. Host X is unable to communicate with host Y. Which command can be run at host X to determine which intermediary device is responsible for this failure?
Which three addresses belong to the category of private IP addresses? (Choose three.)
Which two types of media can provide bandwidth up to 1 Gb/s? (Choose two.)
Refer to the exhibit. A network administrator remotely accesses the CLI of RouterB from PC1 using Telnet. Which statement is true about this connection?
The connection is made through a VTY session on the router.
|What type of network is maintained if a server takes no dedicated role in the network?|
Which exhibit shows the interface that is configured by the command, router(config)# interface serial 0/0/1?
Which OSI layer uses the header information to reassemble the data segments into streams?
When connectionless protocols are implemented at the lower layers of the OSI model, what is usually used to acknowledge that the data was received and to request the retransmission of missing data?
an upper-layer, connection-oriented protocol or service
Two routers are connected via their serial ports in a lab environment. The routers are configured with valid IP addresses, but they cannot ping each other. The show interface serial0/0 command shows that the serial0/0 interface is up but the line protocol is down. What could be the cause of this problem?
The clock rate command has not been entered on the DCE interface.
Which option shows how a router will route packets to a remote network?
2 points for Option 4
Refer to the exhibit. Host A uses router A as its default gateway. If host A sends an ICMP echo request to 172.16.10.0, what ICMP response will host A receive.
Which information is used by the router to determine the path between the source and destination hosts?
the network portion of the IP address
Refer to the exhibit. Host A is unable to reach host B on the remote network. A technician attempted to ping the local gateway and the ping was successful. To verify the host configuration, the technician issued the ipconfig command. What is the likely cause of the problem?
The default gateway on host A is incorrectly configured.
Refer to the exhibit. A web browser running on host PC1 sends a request for a web page to the web server with an IP address 192.168.1.254/24. What sequence of steps will follow in order to establish the session before data can be exchanged?
The session will be initiated using TCP. A three-way handshake must be successfully completed before the session is established.
What information can be gathered by using the command netstat?
active TCP connections
Refer to the exhibit. Host C is able to ping 127.0.0.1 successfully, but is unable to communicate with hosts A and B in the organization. What is the likely cause of the problem?
The subnet mask on host C is improperly configured.
Refer to the exhibit. Host A is trying to send data to host E. When host A sends out an ARP request, what response should be received?
Which statement describes the correct use of addresses to deliver an e-mail message from HostB to the e-mail service that is running on ServerA?
Router B uses a Layer 3 network address to route the packet.
Refer to the exhibit. What two facts can be determined about the exhibited topology? (Choose two.)
A single broadcast domain is present
Five collision domains exist.
Refer to the exhibit. Which option correctly identifies the network address, range of host addresses, and the broadcast address for the network that contains host A?
Refer to the exhibit. Host A is requesting a web page from the web server. Which option represents the socket to which the request is made?
Due to a security violation, the router passwords must be changed. What information can be learned from the following configuration entries? (Choose two.)
Router(config)# line vty 0 3
Router(config-line)# password c13c0
The entries specify four Telnet lines for remote access.
Access will be permitted for Telnet using “c13c0″ as the password.
Which two functions of the OSI model occur at layer two? (Choose two.)
media access control
What happens when a host station receives a frame that contains its own MAC address in the destination field?
The Layer 2 information is removed and the frame is pushed up to Layer 3.
Which range of port numbers is assigned dynamically to client applications when initiating a connection to the server?
1024 to 49151
Which option correctly identifies the interface or interfaces used to connect the router to a CSU/DSU for WAN connectivity?
What can the user do from the command prompt, Router(config-line)# ?
Configure one of the physical or virtual lines.
The tracert 10.1.3.2 command was issued on computer A. Computer A can ping other addresses on the local subnet. Computer A sent the first ICMP packet toward computer B with a TTL value of 1. A protocol analyzer that was running on computer B showed that the packet never reached its destination. Why did the packet not reach the destination?
The TTL for the packet was decreased to zero by R1.
Refer to the exhibit. Which option shows the correct topology given the configuration of Router1?
R1 (DCE) S0/0/0 172.16.1.1/22
What three statements are true about network layer addressing? (Choose three.)
Network layer addressing uses a hierarchy.
It uses a method by which the network portion of an address can be identified.
Network layer addressing identifies each host distinctly.
Refer to the exhibit. Host A attempts to establish a TCP/IP session with host C. During this attempt, a frame was captured at the FastEthernet interface fa0/1 of router Y. The packet inside the captured frame has the IP source address 172.16.1.5, and the destination IP address is 172.16.7.24. What is the source MAC address of the frame at the time of capture?