Question 1
What are the three primary functions provided by Layer 2 data encapsulation? (Choose three.)
Error correction through a collision detection method
Session control using port numbers
Data link layer addressing
Placement and removal of frames from the media
Detection of errors through CRC calculations
Delimiting groups of bits into frames
Conversion of bits into data signals
Question 2
What will a host on an Ethernet network do if it receives a frame with a destination MAC address that does not match its own MAC address?
It will discard the frame.
It will forward the frame to the next host.
It will remove the frame from the media.
It will strip off the data-link frame to check the destination IP address.
Question 3
What are two actions performed by a Cisco switch? (Choose two.)
Building a routing table that is based on the first IP address in the frame header
Using the source MAC addresses of frames to build and maintain a MAC address table
Forwarding frames with unknown destination IP addresses to the default gateway
Utilizing the MAC address table to forward frames via the destination MAC address
Examining the destination MAC address to add new entries to the MAC address table
Question 4
What are two examples of the cut-through switching method? (Choose two.)
Store-and-forward switching
Fast-forward switching
CRC switching
Fragment-free switching
QOS switching
Question 5
What information is added during encapsulation at OSI Layer 3?
Source and destination MAC
Source and destination application protocol
Source and destination port number
Source and destination IP address
Question 6
Why does a Layer 3 device perform the ANDing process on a destination IP address and subnet mask?
To identify the broadcast address of the destination network
To identify the host address of the destination host
To identify faulty frames
To identify the network address of the destination network
Question 7
What are the three ranges of IP addresses that are reserved for internal private use? (Choose three.)
10.0.0.0/8
64.100.0.0/14
127.16.0.0/12
172.16.0.0/12
172.16.0.0/12
192.168.0.0/16
Question 8
Refer to the exhibit. The network administrator for a small advertising company has chosen to use the 192.168.5.96/27 network for internal LAN addressing. As shown in the exhibit, a static IP address is assigned to the company web server. However, the web
Subnet mask
DNS address
Host IP address
Default gateway address
Question 9
Which three addresses are valid public addresses? (Choose three.)
198.133.219.17
192.168.1.245
10.15.250.5
128.107.12.117
192.15.301.240
64.104.78.227
Question 10
What type of IPv6 address is FE80::1?
Loopback
Link-local
Multicast
Multicast
Question 11
Refer to the exhibit. On the basis of the output, which two statements about network connectivity are correct? (Choose two.)
There is connectivity between this device and the device at 192.168.100.1.
The connectivity between these two hosts allows for videoconferencing calls.
There are 4 hops between this device and the device at 192.168.100.1.
The average transmission time between the two hosts is 2 milliseconds.
This host does not have a default gateway configured.
Question 12
Which subnet would include the address 192.168.1.96 as a usable host address?
192.168.1.64/26
192.168.1.32/27
192.168.1.32/28
192.168.1.64/29
Question 13
How many hosts are addressable on a network that has a mask of 255.255.255.248?
2
6
8
14
16
254
Question 14
Which statement is true about variable-length subnet masking?
Each subnet is the same size.
The size of each subnet may be different, depending on requirements.
Subnets may only be subnetted one additional time.
Bits are returned, rather than borrowed, to create additional subnets.
Question 15
In what two situations would UDP be the preferred transport protocol over TCP? (Choose two.)
When applications need to guarantee that a packet arrives intact, in sequence, and unduplicated
When a faster delivery mechanism is needed
When delivery overhead is not an issue
When applications do not need to guarantee delivery of the data
When destination port numbers are dynamic
Question 16
Refer to the exhibit. Consider the IP address of 192.168.10.0/24 that has been assigned to a high school building. The largest network in this building has 100 devices. If 192.168.10.0 is the network number for the largest network, what would be the netwo
192.168.10.0
192.168.10.128
192.168.10.192
192.168.10.224
192.168.10.240
Question 17
What important information is added to the TCP/IP transport layer header to ensure communication and connectivity with a remote network device?
Timing and synchronization
Destination and source port numbers
Destination and source physical addresses
Destination and source logical network addresses
Question 18
What is the TCP mechanism used in congestion avoidance?
Three-way handshake
Socket pair
Two-way handshake
Sliding window
Question 19
What is the function of the HTTP GET message?
To request an HTML page from a web server
To send error information from a web server to a web client
To upload content to a web server from a web client
To retrieve client email from an email server using TCP port 110
Question 20
Which three statements characterize UDP? (Choose three.)
UDP provides basic connectionless transport layer functions.
UDP provides connection-oriented, fast transport of data at Layer 3.
UDP relies on application layer protocols for error detection.
UDP is a low overhead protocol that does not provide sequencing or flow control mechanisms.
UDP relies on IP for error detection and recovery.
UDP provides sophisticated flow control mechanisms.
Question 21
Which two roles can a computer assume in a peer-to-peer network where a file is being shared between two computers? (Choose two.)
DNS
Ethernet
IP
POP
TCP
UDP
Question 22
Which two roles can a computer assume in a peer-to-peer network where a file is being shared between two computers? (Choose two.)
Client
Master
Server
Slave
Transient
Question 23
When planning for network growth, where in the network should packet captures take place to assess network traffic?
On as many different network segments as possible
Only at the edge of the network
Between hosts and the default gateway
Only on the busiest network segment
Question 24
Refer to the exhibit. An administrator is testing connectivity to a remote device with the IP address 10.1.1.1. What does the output of this command indicate?
Connectivity to the remote device was successful.
A router along the path did not have a route to the destination.
A ping packet is being blocked by a security device along the path.
The connection timed out while waiting for a reply from the remote device.
Comments