CCENT Practice Certification Exam # 1.doc

(1844 KB) Pobierz

CCENT Practice Certification Exam # 1 - CCNA Exploration: Accessing the WAN (Version 4.0)

1. What are two ways that TCP uses the sequence numbers in a segment? (Choose two.)

to identify missing segments at the destination

to reassemble the segments at the remote location

to specify the order in which the segments travel from source to destination

to limit the number of segments that can be sent out of an interface at one time

to determine if the packet changed during transit

 

2. Which three statements characterize UDP? (Choose three.)

UDP provides connectionless, fast transport of data at Layer 4.

UDP provides connection-oriented, fast transport of data at Layer 3.

UDP relies on application layer protocols for error detection.

UDP works well when an application does not need to guarantee delivery of data.

UDP relies on IP for error detection and recovery.

UDP provides sophisticated flow control mechanisms.

 

3. Refer to the exhibit. Host A sends a data packet to host B. What will be the addressing information of the data packet when it reaches host B? Refer to the exhibit. Host A sends a data packet to host B. What will be the addressing information of the data packet when it reaches host B?



 



 



 



 

 

4. Which layer of the OSI model defines logical addressing?

application

presentation

session

transport

network

data link

 

5. Which device connects a local LAN to a geographically separate network?

switch

hub

router

bridge

 

6. Refer to the exhibit. Router1 receives packets addressed as follows:
Source IP address: 192.168.1.88
Destination IP address: 172.16.0.3
Source MAC address: 00-11-12-7a-41-10
Destination MAC address: 00-11-5c-cc-a9-c0
Source Port: 1464
Destination Port: 23
Assuming that Router1 has not been configured with NAT, what will happen to the packets?

The packets will be sent to the server because it is a server-based port.

The packets will be sent to Switch2 and not leave the switch because the packets are local.

The packets will be sent to the laptop host.

The packets will be sent to Router1 and dropped because private addresses are not transmitted across the Internet.

The packets will be sent to Router2 and dropped because the server is not directly attached.

 

7. Refer to the exhibit. If host 1 was to send an HTTP request to the web server that connects to Router2, what type of Layer 2 frame would be sent between Router1 and the ISP?

a frame with a header that contains the port number of 80

a frame with a header and trailer, but no MAC addresses

a frame with a header and a trailer that only contains IP addresses

a frame with the host 1 MAC address as the source and Router1 MAC address as the destination

a frame with the host 1 MAC address as the source and the server MAC address as the destination

 

8. A company needs to connect an office router to a service provider to access a WAN. What device is needed to connect the router to the ISP if the service provider supplies a T1 line for the connection?

a CSU/DSU

a cable modem

a DSL router

a DTE device

an SLA device

 

9. Refer to the exhibit. A technician applies the configuration in the exhibit to an unconfigured router. To verify the configuration, the technician issues the show running-config command in the CLI session with the router. What lines should the technician expect to see in the router output from the show running-config command?

enable password class
line console 0
password ccna

enable secret cisco
enable password class
line console 0
password ccna

enable secret 5 $1$v0/3$QyQWmJyT7zCa/yaBRasJm0
enable password class
line console 0
password ccna

enable secret cisco
enable password 7 14141E0A1F17
line console 0
password 7 020507550A

enable secret 5 $1$v0/3$QyQWmJyT7zCa/yaBRasJm0
enable password 7 14141E0A1F17
line console 0
password 7 020507550A

 

10. Refer to the exhibit. If host A sends an IP packet to host B, what will the destination address be in the frame when it leaves host A?

DD:DD:DD:DD:DD:DD

172.168.10.99

CC:CC:CC:CC:CC:CC

172.168.10.65

BB:BB:BB:BB:BB:BB

AA:AA:AA:AA:AA:AA

 

11. Refer to the exhibit. What two facts can be determined from the output of the ping command? (Choose two.)

There was a destination unreachable error.

The packet type was unknown.

One packet timed out.

The ping was interrupted.

Four packets of data were successfully received.

The packet TTL was exceeded.

 

12. Refer to the exhibit. The switches are in their default configuration. Host A needs to communicate with host D, but host A does not have the MAC address for its default gateway. Which network hosts will receive the ARP request sent by host A?

only host D

only router R1

only hosts A, B, and C

only hosts A, B, C, and D

only hosts B and C

only hosts B, C, and router R1

 

13. Refer to the exhibit. Which password will the administrator need to use on this device to enter privileged EXEC mode?

Cisco

class

password

cisco

 

14. Refer to the exhibit. Switch1 has only the following commands added to a default Cisco 2960 configuration:
enable secret cisco
line vty 0 4
password Kn0ckkn-cK
login
interface vlan 1
ip address 10.0.1.8 255.255.255.0
no shutdown
Assume that routing between networks is functioning properly and that Switch2 has been properly configured for remote access. What would the result be if the telnet 10.0.2.2 command is issued from Switch1 privileged mode?

The following prompt would appear:
User Access Verification
Password:

Switch2 would return a destination unreachable message to Switch1.

Router1 would return a destination unreachable message to Switch1.

The packet would be dropped.

 

15. What caused the following error message to appear?
01:11:12: %PM-4-ERR_DISABLE: psecure-violation error detected on Fa0/8, putting Fa0/8 in err-disable state
01:11:12: %PORT_SECURITY-2-PSECURE_VIOLATION: Security violation occurred, caused by MAC address 0011.a0d4.12a0 on port FastEthernet0/8.
01:11:13: %LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthernet0/8, changed state to down
01:11:14: %LINK-3-UPDOWN: Interface FastEthernet0/8, changed state to down

Another switch was connected to this switch port with the wrong cable.

An unauthorized user tried to telnet to the switch through switch port Fa0/8.

NAT was enabled on a router, and a private IP address arrived on switch port Fa0/8.

A host with an invalid IP address was connected to a switch port that was previously unused.

Port security was enabled on the switch port, and an unauthorized connection was made on switch port Fa0/8.

 

16. When configuring a switch to use SSH for virtual terminal connections, what is the purpose of the crypto key generate rsa command?

show SSH connected hosts

disconnect SSH connected hosts

create a public and private key pair

show active SSH ports on the switch

access the SSH database configuration

 

17. Which three statements are true about full-duplex operation on an Ethernet network? (Choose three.)

There are no collisions in full-duplex mode.

A dedicated switch port is required for each node.

Hub ports are preconfigured for full-duplex mode.

The host network card must detect the availability of the media before transmitting.

The host network card and the switch port must both be in full-duplex mode.

 

18. Refer to the exhibit. If all the switches have a default configuration, how many broadcast domains are in the network?

1

2

3

4

5

14

 

19.

 

...

Zgłoś jeśli naruszono regulamin