Skip to main content

Posts

CCNA2 Chapter 5 V4.1 (true 100%)

Chapter 5 With 100% Accurate Answers 1. In what two ways does SDM differ from the IOS CLI? (Choose two.) **SDM is used for in-band management only. The IOS CLI can be used for in-band and out-of-band management. SDM is accessed through a Telnet application. The IOS CLI is accessed through a web browser. SDM is available for all router platforms. The IOS CLI is available for a limited number of Cisco devices. **SDM utilizes GUI buttons and text boxes. The IOS CLI requires the use of text-based commands. SDM is used for advanced configuration tasks. The IOS CLI is preferred for initial basic device configuration. 2. Which mode will a configured router display at login? global configuration mode setup mode ROM monitor mode **user EXEC mode 3. Refer to the exhibit. Which password or passwords will be encrypted as a result of the configuration that is shown? virtual terminal only enable mode only console and virtual terminal only enable mode and virtual terminal only the service password **

CCNA2 Chapter 4 V4.1

1. In an 8 bit binary number, what is the total number of combinations of the eight bits? 128 254 255 **256 512 1024 2. Convert the decimal number 231 into its binary equivalent. Select the correct answer from the list below. 11110010 11011011 11110110 **11100111 11100101 11101110 3. How many usable hosts are available given a Class C IP address with the default subnet mask? **254 255 256 510 511 512 4. Which statement describes NAT overload or PAT? Each internal address is dynamically translated to an individual external IP address. A single internal address is always translated to the same unique external IP address. **Many internal addresses can be translated to a single IP address using different port assignments. Many internal addresses are statically assigned a single IP address and port to use for communications. 5. Which IPv4 class of addresses provides the most networks? Class A Class B **Class C Class D Class E 6. Which statement accurately describes public IP addresses? Publ

CCNA2 Chapter 3 V4.1 (100%)

Chapter 3 With 100% Accurate Answers 1. Which two benefits can be gained by locating network equipment in a telecommunications closet, rather than in a user area? (Choose two.) faster communication speeds **improved physical security more resistant to hacker attempts **centralized cable management less electrical usage 2. Which three issues should be noted on the technician's site survey report? (Choose three.) **unlabeled cables only two power outlets per wall in each room **poor physical security of network devices horizontal cabling runs under 100 meters **lack of UPS for critical devices two users sharing the same computer 3. Which two types of cable are used for initial router configuration? (Choose two.) serial cable **rollover cable straight-through cable crossover cable patch cable **console cable 4. In addition to the inventory sheet, what other information about the hosts and networking equipment should be documented by the on-site technician while performing the site su

CCNA 2 Chapter 2 v4.1 (100%)

(True 100%) 1. Which two functions are provided by the upper layers of the OSI model? (Choose two.) placing electrical signals on the medium for transmission **initiating the network communication process **encrypting and compressing data for transmission segmenting and identifying data for reassembly at the destination choosing the appropriate path for the data to take through the network 2. Which is a function of the transport layer of the OSI model? routes data between networks converts data to bits for transmission **delivers data reliably across the network using TCP formats and encodes data for transmission transmits data to the next directly connected device 3. Which common Layer 1 problem can cause a user to lose connectivity? incorrect subnet mask incorrect default gateway **loose network cable NIC improperly installed 4. Which three command line utilities are most commonly used to troubleshoot issues at Layer 3? (Choose three.) **ping a packet sniffer Telnet **ipconfig **Trac

CCNA2 Chapter 1

1. Which two things can be determined by using the ping command? (Choose two.) the number of routers between the source and destination device the IP address of the router nearest the destination device **the average time it takes a packet to reach the destination and for the response to return to the source **whether or not the destination device is reachable through the network the average time it takes each router in the path between source and destination to respond 2. What are three main types of high-bandwidth connection options used by medium- to large-sized businesses? (Choose three.) DSL cable modem Ethernet **metro Ethernet **T1 **T3 3. What is the maximum T1 transmission speed? 56 kbps 128 kbps **1.544 Mbps 2.4 Mbps 4. Which of the following start the test of destination reachability? **echo request issued by source echo reply issued by source echo request issued by destination echo reply issued by destination 5. Which statement describes a function of a Tier 1 ISP? **pe

CCNA 1 Module 5

1 In an IPv4 environment, what information is used by the router to forward data packets from one interface of a router to another? **destination network address source network address source MAC address well known port destination address 2 What information is added during encapsulation at OSI Layer 3? source and destination MAC source and destination application protocol source and destination port number **source and destination IP address 3 In a connectionless system, which of the following is correct? The destination is contacted before a packet is sent. **The destination is not contacted before a packet is sent. The destination sends an acknowledgement to the source that indicates the packet was received. The destination sends an acknowledgement to the source that requests the next packet to be sent. 4 Which IP packet field will prevent endless loops? type-of-service identification flags **time-to-live header checksum 5 Which portion of the network layer address does a router use

CCNA 1 Module 4

1 Refer to the exhibit. What two pieces of information can be determined from the output that is shown? (Choose two.) The local host is using well-known port numbers to identify the source ports. **A termination request has been sent to 192.135.250.10. **Communication with 64.100.173.42 is using HTTP Secure. The local computer is accepting HTTP requests. 192.168.1.101:1042 is performing the three-way handshake with 128.107.229.50:80. 2 After a web browser makes a request to a web server that is listening to the standard port, what will be the source port number in the TCP header of the response from the server? 13 53 **80 1024 1728 3 Which information is found in both the TCP and UDP header information? sequencing flow control acknowledgments **source and destination 4 Which is an important characteristic of UDP? acknowledgement of data delivery **minimal delays in data delivery high reliability of data delivery same order data delivery 5 Refer to the exhibit. Host A is using FTP to do