Skip to main content

Posts

CCNA2 Chapter 3 V4.1 (100%)

Chapter 3 With 100% Accurate Answers 1. Which two benefits can be gained by locating network equipment in a telecommunications closet, rather than in a user area? (Choose two.) faster communication speeds **improved physical security more resistant to hacker attempts **centralized cable management less electrical usage 2. Which three issues should be noted on the technician's site survey report? (Choose three.) **unlabeled cables only two power outlets per wall in each room **poor physical security of network devices horizontal cabling runs under 100 meters **lack of UPS for critical devices two users sharing the same computer 3. Which two types of cable are used for initial router configuration? (Choose two.) serial cable **rollover cable straight-through cable crossover cable patch cable **console cable 4. In addition to the inventory sheet, what other information about the hosts and networking equipment should be documented by the on-site technician while performing the site su

CCNA 2 Chapter 2 v4.1 (100%)

(True 100%) 1. Which two functions are provided by the upper layers of the OSI model? (Choose two.) placing electrical signals on the medium for transmission **initiating the network communication process **encrypting and compressing data for transmission segmenting and identifying data for reassembly at the destination choosing the appropriate path for the data to take through the network 2. Which is a function of the transport layer of the OSI model? routes data between networks converts data to bits for transmission **delivers data reliably across the network using TCP formats and encodes data for transmission transmits data to the next directly connected device 3. Which common Layer 1 problem can cause a user to lose connectivity? incorrect subnet mask incorrect default gateway **loose network cable NIC improperly installed 4. Which three command line utilities are most commonly used to troubleshoot issues at Layer 3? (Choose three.) **ping a packet sniffer Telnet **ipconfig **Trac

CCNA2 Chapter 1

1. Which two things can be determined by using the ping command? (Choose two.) the number of routers between the source and destination device the IP address of the router nearest the destination device **the average time it takes a packet to reach the destination and for the response to return to the source **whether or not the destination device is reachable through the network the average time it takes each router in the path between source and destination to respond 2. What are three main types of high-bandwidth connection options used by medium- to large-sized businesses? (Choose three.) DSL cable modem Ethernet **metro Ethernet **T1 **T3 3. What is the maximum T1 transmission speed? 56 kbps 128 kbps **1.544 Mbps 2.4 Mbps 4. Which of the following start the test of destination reachability? **echo request issued by source echo reply issued by source echo request issued by destination echo reply issued by destination 5. Which statement describes a function of a Tier 1 ISP? **pe

CCNA 1 Module 5

1 In an IPv4 environment, what information is used by the router to forward data packets from one interface of a router to another? **destination network address source network address source MAC address well known port destination address 2 What information is added during encapsulation at OSI Layer 3? source and destination MAC source and destination application protocol source and destination port number **source and destination IP address 3 In a connectionless system, which of the following is correct? The destination is contacted before a packet is sent. **The destination is not contacted before a packet is sent. The destination sends an acknowledgement to the source that indicates the packet was received. The destination sends an acknowledgement to the source that requests the next packet to be sent. 4 Which IP packet field will prevent endless loops? type-of-service identification flags **time-to-live header checksum 5 Which portion of the network layer address does a router use

CCNA 1 Module 4

1 Refer to the exhibit. What two pieces of information can be determined from the output that is shown? (Choose two.) The local host is using well-known port numbers to identify the source ports. **A termination request has been sent to 192.135.250.10. **Communication with 64.100.173.42 is using HTTP Secure. The local computer is accepting HTTP requests. 192.168.1.101:1042 is performing the three-way handshake with 128.107.229.50:80. 2 After a web browser makes a request to a web server that is listening to the standard port, what will be the source port number in the TCP header of the response from the server? 13 53 **80 1024 1728 3 Which information is found in both the TCP and UDP header information? sequencing flow control acknowledgments **source and destination 4 Which is an important characteristic of UDP? acknowledgement of data delivery **minimal delays in data delivery high reliability of data delivery same order data delivery 5 Refer to the exhibit. Host A is using FTP to do

CCNA 1 Chapter 3

1. What application layer protocol is commonly used to support for file transfers between a client and a server? HTML HTTP ** FTP Telnet 2. What are two forms of application layer software? (Choose two.) ** applications dialogs requests ** services syntax 3. A network administrator is designing a network for a new branch office of twenty-five users. What are the advantages of using a client-server model? (Choose two.) ** centralized administration does not require specialized software ** security is easier to enforce lower cost implementation provides a single point of failure 4. What is the purpose of resource records in DNS? temporarily holds resolved entries ** used by the server to resolve names sent by the client to during a query passes authentication information between the server and client 5. What is the automated service that matches resource names with the required IP address? HTTP SSH FQDN ** DNS Telnet SMTP 6. What three protocols operate at the Application layer of the OS

CCNA 1 Module 2

1. Which two layers of the OSI model have the same functions as the TCP/IP model Network Access Layer? (Choose two.) Network Transport Physical** Data Link** Session 2. What is a primary function of the trailer information added by the data link layer encapsulation? supports error detection** ensures ordered arrival of data provides delivery to correct destination identifies the devices on the local network assists intermediary devices with processing and path selection 3. During the encapsulation process, what occurs at the data link layer? No address is added. The logical address is added. The physical address is added.** The process port number is added. 4. What device is considered an intermediary device? file server IP phone laptop printer switch** 5. Which layer encapsulates the segment into packets? physical data link network** transport 6. Which statements correctly identify the role of intermediary devices in the network? (Choose three.) determine pathways for data** initiate