Refer to the exhibit. Communication for hosts X and Y is restricted to the local network. What is the reason for this?
The gateway addresses are broadcast addresses.
What is the effect of the command copy running-config tftp?
copies the configuration currently in RAM to a remote machine
Refer to the exhibit. What function does router RT_A need to provide to allow Internet access for hosts in this network?
Refer to the exhibit. Host A is able to access resources on the local LAN but is unable to access any resources on the Internet. What is the likely cause of this problem?
The default gateway is on a different subnet from the host.
A small design company connects to the Internet through a DSL connection. The telephone company suggests assigning 192.168.1.0/24 to the internal network. What additional feature must be available to give the workstations on the internal network access to the Internet?
The company needs an internal DHCP server.
Which range of port numbers are reserved for services that are commonly used by applications that run on servers?
0 to 1023
When must a router serial interface be configured with the clock rate command?
when the interface is functioning as a DCE device
To enhance security in a network, the network administrator uses these commands:
Router(config)# line console 0
Router(config-line)# password j1mdi2
What two conclusions are evident from these commands? (Choose two.)
Users who attempt to connect to the console port of the router must enter a password.
The entries permit access through the console by the use of j1mdi2 as the password.
Which prompt is associated with the privileged exec mode?
What is described by the network access layer of the TCP/IP model?
rules for the handoff from the internet layer to the network access protocols
Refer to the exhibit. The ping 127.0.0.1 command is issued on the local host. What do the ping results indicate?
The TCP/IP stack on the local host operates properly.
A technician is setting up a workgroup for six users and wants to allow users to share files without setting up a server. Which application layer protocol will provide for peer-to-peer file sharing in a workgroup?
Which application layer protocol allows administrators to log into a server from remote locations and control a server as though logged in locally?
Which router component will have contents erased when the command erase startup-config is issued?
What are the three operations that the transport layer uses to ensure reliability? (Choose three.)
tracking transmitted data
providing routable addressing
retransmitting of any unacknowledged data
A technician is asked to secure the privileged EXEC mode of a switch by requiring a password. Which type of password would require this login and be considered the most secure?
Refer to the exhibit. Host1 is in the process of setting up a TCP session with Host2. Host1 has sent a SYN message to begin session establishment. What happens next?
Host2 sends a segment with the ACK flag = 1, SYN flag = 1 to Host1.
The tracert 10.1.3.2 command was issued on computer A. Computer A can ping other addresses on the local subnet. Computer A sent the first ICMP packet toward computer B with a TTL value of 1. A protocol analyzer that was running on computer B showed that the packet never reached its destination. Why did the packet not reach the destination?
The TTL for the packet was decreased to zero by R1.
Refer to the exhibit. Which type of network design is shown?
Refer to the exhibit. Which two layers of the OSI model describe the same functions as the transport and internet layers of the TCP/IP model? (Choose two.)
Refer to the exhibit. When host A sends a frame addressed for host D, which hosts will receive the frame?
only host D
Which communication tool allows real-time collaboration?
Which OSI layer manages data segments?
An organization has been assigned network ID 10.10.128.0 and subnet mask 255.255.224.0. Which IP address range can be used for this organization?
10.10.128.0 to 10.10.192.255
A routing issue has occurred in your internetwork. Which of the following type of devices should be examined to isolate this error?
Which three addresses belong to the category of public IP addresses? (Choose three.)
A user enters http://www.cisco.com/web1.htm in the address line of a browser. Which statement is true about this transaction?
The "http" portion indicates the protocol that is being used.
Refer to the exhibit. A technician is working on a network problem that requires verification of the router LAN interface. What address should be pinged from this host to confirm that the router interface is operational?
How many host addresses may be assigned when using the 126.96.36.199 network address with a subnet mask of 255.255.248.0?
Refer to the exhibit. RouterB is configured properly. The Ethernet interface Fa0/0 of RouterA is configured with the use of the commands that are shown. However, a ping from the Fa0/0 interface of RouterA to the Fa0/0 interface of RouterB is unsuccessful. What action should be taken on RouterA to solve this problem?
Use the no shutdown command on the FastEthernet interface Fa0/0.
Refer to the exhibit. Host A is unable to reach host B on the remote network. A technician attempted to ping the local gateway and the ping was successful. To verify the host configuration, the technician issued the ipconfig command. What is the likely cause of the problem?
The default gateway on host A is incorrectly configured.
A network administrator is configuring several switches for a network. The switches have similar configurations and only minor differences. The administrator wants to save all commands that are issued on the first switch to a text file for editing. Which transfer option should be selected in HyperTerminal?
What can the user do from the command prompt, Router(config-line)# ?
Configure one of the physical or virtual lines.
Which topology divides the collision domain and provides full media bandwidth to the hosts in the network?
Which two factors contribute to the increased throughput when all nodes of a LAN are connected to a switch instead of a hub? (Choose two.)
Which two types of media can provide bandwidth up to 1 Gb/s? (Choose two.)
Which application belongs to the category of the client/server model?
using Telnet to access a router
Which option represents a point-to-point logical topology diagram?
Which prompt represents the appropriate mode used for the copy running-config startup-config command ?
Refer to the exhibit. A network administrator remotely accesses the CLI of RouterB from PC1 using Telnet. Which statement is true about this connection?
The connection is made through a VTY session on the router.
Which option shows the PDU that contains the Layer 3 source and destination addressing for a packet?
Refer to the exhibit. Which option correctly identifies the network address, range of host addresses, and the broadcast address for the network that contains host A?
Which physical component is used to access and perform the initial configuration on a new unconfigured router?
What command can be used to troubleshoot domain name resolution issues?
Refer to the exhibit. What two facts can be determined from the session information that is displayed? (Choose two.)
The protocol is a connection-oriented protocol.
This exchange is part of the three-way handshake.
Refer to the exhibit. A network technician wants to connect host A to the console of a Cisco switch to initialize the configuration. What type of cable is required for this connection?
A network technician has made a UTP cable that is terminated as T568A on one end and T568B on the opposite end. What type of cable has been constructed?
Refer to the exhibit. An employee wants to access the organization intranet from home. Which intermediary device should be used to connect the organization intranet to the Internet to enable this access?
A technician makes several changes to the running configuration on a router, but the desired results are not achieved. The technician issues the reload command. What action will be taken by the router?
The user will be prompted to save changes before the router restarts.
Refer to the exhibit. Host A attempts to establish a TCP/IP session with host C. During this attempt, a frame was captured with the source MAC address 0050.7320.D632 and the destination MAC address 0030.8517.44C4. The packet inside the captured frame has an IP source address 192.168.7.5, and the destination IP address is 192.168.219.24. At which point in the network was this packet captured?
Refer to the exhibit. For connecting two routers with an Ethernet crossover cable, which interface should be used?
Refer to the exhibit. A network technician is trying to determine the correct IP address configuration for Host A. What is a valid configuration for Host A?
IP address: 192.168.100.20; Subnet Mask: 255.255.255.240; Default Gateway: 192.168.100.17