Showing posts with label CCNA1 Chapter 6. Show all posts
Showing posts with label CCNA1 Chapter 6. Show all posts

Sunday, October 11, 2009

CCNA Semester 1 chapter 6

0 nhận xét
There are two version CCNA Semester 1 chapter 6
hope it can help you get 100/100.
good luck!

You can download here

Version 1 =>
 


Version 2 =>
 
more.

Thursday, September 3, 2009

CCNA 1 Chapter 6

0 nhận xét
1) A user types http://www.cisco.com into a web browser address textbox. What does http://www.cisco.com represent?
* the IP address of a web server
a physical network address
the closest router interface to the source
the source IP address in the data transmission

2) What type of server would use IMAP?
DNS
DHCP
* e-mail
FTP
Telnet
web

3) Which type of server would most likely be used first by a network client in a corporate environment?
DNS
* DHCP
e-mail
FTP
Telnet
web

4) Which protocol is used by FTP to transfer files over the Internet?
* TCP
SMTP
UDP
SNMP

5) Which protocols are TCP/IP application layer protocols? (Choose two.)
UDP
* FTP
IP
* SMTP
TCP

6) Which of the following are layers of the TCP/IP model? (Choose three.)
* Application
Physical
* Internet
* Network Access
Presentation

7) You are creating a network-based video game. What influences your decision about which transport protocol to use for the application?
* UDP will not disrupt the game to retransmit dropped packets.
TCP provides extra acknowledgements that will ensure smooth video delivery.
Both TCP and UDP can be used simultaneously to ensure speed and guaranteed delivery.
Both TCP and UDP may slow transmission and disrupt game operation, so no transport protocol should be used.

8) Whenever e-mail clients send letters, what device is used to translate the domain names into their associated IP addresses?
Uniform Resource Locator
Network redirector server
SNMP server
* DNS server

9) Which application is most likely used to translate http://www.cisco.com to 198.133.219.25?
DHCP
* DNS
FTP
HTTP
POP
SMTP

10)

Refer to the graphic. Which protocol is used to access this website?
IM
FTP
* HTTP
SNMP
VoIP

11) Which port number is used by SMTP?
20
21
* 25
26
110

12) Which protocol is used by e-mail servers to communicate with each other?
FTP
HTTP
TFTP
* SMTP
POP
SNMP

13) What client software enables logged in users to communicate with other logged in users in real time?
blog
e-mail
web mail
* instant messaging

14) An Internet server is running both FTP and HTTP services. How does the server know which of these applications should handle an incoming segment?
The packet header identifies it as an HTTP or FTP packet.
The data in the segment is specially formatted for either HTTP or FTP.
* The segment destination port number identifies the application that should handle it.
The source port number is associated with one of these well known server applications.

15) What term is used to describe how TCP/IP protocols are layered and interact to format, address, and transmit information across a network?
protocol hierarchy
protocol modeling
* protocol stack
protocol layering

16) hat three items are contained in an Ethernet frame? (Choose three.)
source IP address
* source MAC address
destination IP address
* destination MAC address
* error-checking information

17) What information is contained in an IP header?
* source and destination IP addresses
source and destination MAC addresses
only destination IP and MAC addresses
both source and destination IP and MAC addresses

18) Cabling issues are associated with which OSI layer?
4
2
* 1
3

19) A device receives an Ethernet frame and recognizes the MAC address as its own. What does the device do to the message to get to the encapsulated data?
removes the IP header
removes the TCP header
passes data to the application layer
* removes the Ethernet header and trailer

20) A client has decoded a frame and started the de-encapsulation process. In which order does the de-encapsulation process occur?
1) remove IP header
2) remove Ethernet header and trailer
3) remove TCP header
4) pass data to the application

1) add TCP header to data
2) add an IP header
3) add frame header and trailer
4) encode the frame into bits

* 1) remove Ethernet header and trailer
2) remove IP header
3) remove TCP header
4) pass data to the application

1) add TCP header to data
2) add Ethernet header and trailer
3) add an IP header
4) encode the frame into bits

21) What is an advantage of the use of layers in the OSI reference model?
It breaks network communications into larger parts.
It increases complexity.
* It prevents changes in one layer from affecting other layers.
It requires the use of single-vendor equipment for hardware and software communications.

22) What is the correct order of the layers of the OSI reference model, starting at the lowest layer and working up the model?
data link, physical, transport, network, presentation, session, application
physical, data link, network, session, transport, presentation, application
physical, data link, network, transport, presentation, session, application
* physical, data link, network, transport, session, presentation, application
application, session, presentation, transport, data link, network, physical
more.

Saturday, December 6, 2008

CCNA 1 - Module 6

1 nhận xét


89,4%

1

How many bits make up an IPv4 address?



128

64

48

32



2

Refer to the exhibit. A network administrator has to develop an IP addressing scheme that uses the 192.168.1.0 /24 address space. The network that contains the serial link has already been addressed out of a separate range. Each network will be allocated the same number of host addresses. Which network mask will be appropriate to address the remaining networks?



255.255.255.248

255.255.255.224

255.255.255.192

255.255.255.240

255.255.255.128

255.255.255.252





3

Refer to the exhibit. The network administrator has assigned the internetwork of LBMISS an address range of 192.168.10.0. This address range has been subnetted using a /29 mask. In order to accommodate a new building, the technician has decided to use the fifth subnet for configuring the new network (subnet zero is the first subnet). By company policies, the router interface is always assigned the first usable host address and the workgroup server is given the last usable host address. Which configuration should be entered into the workgroup server's properties to allow connectivity to the network?



IP address: 192.168.10.38 subnet mask: 255.255.255.240 default gateway: 192.168.10.39

IP address: 192.168.10.38 subnet mask: 255.255.255.240 default gateway: 192.168.10.33

IP address: 192.168.10.38 subnet mask: 255.255.255.248 default gateway: 192.168.10.33

IP address: 192.168.10.39 subnet mask: 255.255.255.248 default gateway: 192.168.10.31

IP address: 192.168.10.254 subnet mask: 255.255.255.0 default gateway: 192.168.10.1





4

Refer to the exhibit. Which network prefix will work with the IP addressing scheme shown in the graphic.



/24

/16

/20

/27

/25

/28





5

Refer to the exhibit. A network administrator discovers that host A is having trouble with Internet connectivity, but the server farm has full connectivity. In addition, host A has full connectivity to the server farm. What is a possible cause of this problem?



The router has an incorrect gateway.

Host A has an overlapping network address.

Host A has an incorrect default gateway configured.

Host A has an incorrect subnet mask.

NAT is required for the host A network.





6

What subnet mask would a network administrator assign to a network address of 172.30.1.0 if it were possible to have up to 254 hosts?



255.255.0.0

255.255.255.0

255.255.254.0

255.255.248.0





7

Given the IP address and subnet mask of 172.16.134.64 255.255.255.224, which of the following would describe this address?



This is a useable host address.

This is a broadcast address.

This is a network address.

This is not a valid address.





8

What three facts are true about the network portion of an IPv4 address? (Choose three.)



identifies an individual device

is identical for all hosts in a broadcast domain

is altered as packet is forwarded

varies in length

is used to forward packets

uses flat addressing





9

What is the network address of the host 172.25.67.99 /23 in binary?



10101100. 00011001.01000011.00000000

10101100. 00011001.01000011.11111111

10101100. 00011001.01000010.00000000

10101100. 00011001.01000010.01100011

10101100. 00010001.01000011. 01100010

10101100. 00011001.00000000.00000000





10

A router interface has been assigned an IP address of 172.16.192.166 with a mask of 255.255.255.248. To which subnet does the IP address belong?



172.16.0.0

172.16.192.0

172.16.192.128

172.16.192.160

172.16.192.168

172.16.192.176





11

Refer to the exhibit. Why would the response shown be displayed after issuing the command ping 127.0.0.1 on a PC?



The IP settings are not properly configured on the host.

Internet Protocol is not properly installed on the host.

There is a problem at the physical or data link layer.

The default gateway device is not operating.

A router on the path to the destination host has gone down.





12

What two things will happen if a router receives an ICMP packet which has a TTL value of 1 and the destination host is several hops away? (Choose two.)



The router will discard the packet.

The router will decrement the TTL value and forward the packet to the next router on the path to the destination host.

The router will send a time exceeded message to the source host.

The router will increment the TTL value and forward the packet to the next router on the path to the destination host.

The router will send an ICMP Redirect Message to the source host.





13

Refer to the exhibit. An administrator is designing security rules for the 192.168.22.0 /24 network. Each security rule requires an address and mask pair to represent the machines that will be affected by the rule. Which two address and mask pairs will be the most precise way to reference the servers and hosts separately. (Choose two.)



192.168.22.40 255.255.255.248

192.168.22.40 255.255.255.252

192.168.22.100 255.255.255.128

192.168.22.100 255.255.255.254

192.168.22.1 255.255.255.192

192.168.22.101 255.255.255.224





14

Which of the following are features of IPv6? (Choose three.)



larger address space

faster routing protocols

data types and classes of service

authentication and encryption

improved host naming conventions

same addressing scheme as IPv4





15

Which process do routers use to determine the subnet network address based upon a given IP address and subnet mask?



binary adding

hexadecimal anding

binary division

binary multiplication

binary ANDing





16

What is the primary reason for development of IPv6?



security

header format simplification

expanded addressing capabilities

addressing simplification





17

Which three IP addresses are private? (Choose three.)



172.168.33.1

10.35.66.70

192.168.99.5

172.18.88.90

192.33.55.89

172.35.16.5





18

Which statements are true regarding IP addressing? (Choose two.)



NAT translates public addresses to private addresses destined for the Internet.

Only one company is allowed to use a specific private network address space.

Private addresses are blocked from public Internet by router.

Network 172.32.0.0 is part of the private address space.

IP address 127.0.0.1 can be used for a host to direct traffic to itself.





19

Which IPv4 subnetted addresses represent valid host addresses? (Choose three.)



172.16.4.127 /26

172.16.4.155 /26

172.16.4.193 /26

172.16.4.95 /27

172.16.4.159 /27

172.16.4.207 /27





20

What is a group of hosts called that have identical bit patterns in the high order bits of their addresses?



an internet

a network

an octet

a radi





21

Refer to the exhibit. Host A is connected to the LAN, but it cannot get access to any resources on the Internet. The configuration of the host is shown in the exhibit. What could be the cause of the problem?



The host subnet mask is incorrect.

The default gateway is a network address.

The default gateway is a broadcast address.

The default gateway is on a different subnet from the host.





22

Which of the following network devices are recommended to be assigned static IP addresses? (Choose three.)



LAN workstations

servers

network printers

routers

remote workstations

laptops







more.

CCNA 1 - Module 6

0 nhận xét


89,4%

1

How many bits make up an IPv4 address?



128

64

48

32



2

Refer to the exhibit. A network administrator has to develop an IP addressing scheme that uses the 192.168.1.0 /24 address space. The network that contains the serial link has already been addressed out of a separate range. Each network will be allocated the same number of host addresses. Which network mask will be appropriate to address the remaining networks?



255.255.255.248

255.255.255.224

255.255.255.192

255.255.255.240

255.255.255.128

255.255.255.252





3

Refer to the exhibit. The network administrator has assigned the internetwork of LBMISS an address range of 192.168.10.0. This address range has been subnetted using a /29 mask. In order to accommodate a new building, the technician has decided to use the fifth subnet for configuring the new network (subnet zero is the first subnet). By company policies, the router interface is always assigned the first usable host address and the workgroup server is given the last usable host address. Which configuration should be entered into the workgroup server's properties to allow connectivity to the network?



IP address: 192.168.10.38 subnet mask: 255.255.255.240 default gateway: 192.168.10.39

IP address: 192.168.10.38 subnet mask: 255.255.255.240 default gateway: 192.168.10.33

IP address: 192.168.10.38 subnet mask: 255.255.255.248 default gateway: 192.168.10.33

IP address: 192.168.10.39 subnet mask: 255.255.255.248 default gateway: 192.168.10.31

IP address: 192.168.10.254 subnet mask: 255.255.255.0 default gateway: 192.168.10.1





4

Refer to the exhibit. Which network prefix will work with the IP addressing scheme shown in the graphic.



/24

/16

/20

/27

/25

/28





5

Refer to the exhibit. A network administrator discovers that host A is having trouble with Internet connectivity, but the server farm has full connectivity. In addition, host A has full connectivity to the server farm. What is a possible cause of this problem?



The router has an incorrect gateway.

Host A has an overlapping network address.

Host A has an incorrect default gateway configured.

Host A has an incorrect subnet mask.

NAT is required for the host A network.





6

What subnet mask would a network administrator assign to a network address of 172.30.1.0 if it were possible to have up to 254 hosts?



255.255.0.0

255.255.255.0

255.255.254.0

255.255.248.0





7

Given the IP address and subnet mask of 172.16.134.64 255.255.255.224, which of the following would describe this address?



This is a useable host address.

This is a broadcast address.

This is a network address.

This is not a valid address.





8

What three facts are true about the network portion of an IPv4 address? (Choose three.)



identifies an individual device

is identical for all hosts in a broadcast domain

is altered as packet is forwarded

varies in length

is used to forward packets

uses flat addressing





9

What is the network address of the host 172.25.67.99 /23 in binary?



10101100. 00011001.01000011.00000000

10101100. 00011001.01000011.11111111

10101100. 00011001.01000010.00000000

10101100. 00011001.01000010.01100011

10101100. 00010001.01000011. 01100010

10101100. 00011001.00000000.00000000





10

A router interface has been assigned an IP address of 172.16.192.166 with a mask of 255.255.255.248. To which subnet does the IP address belong?



172.16.0.0

172.16.192.0

172.16.192.128

172.16.192.160

172.16.192.168

172.16.192.176





11

Refer to the exhibit. Why would the response shown be displayed after issuing the command ping 127.0.0.1 on a PC?



The IP settings are not properly configured on the host.

Internet Protocol is not properly installed on the host.

There is a problem at the physical or data link layer.

The default gateway device is not operating.

A router on the path to the destination host has gone down.





12

What two things will happen if a router receives an ICMP packet which has a TTL value of 1 and the destination host is several hops away? (Choose two.)



The router will discard the packet.

The router will decrement the TTL value and forward the packet to the next router on the path to the destination host.

The router will send a time exceeded message to the source host.

The router will increment the TTL value and forward the packet to the next router on the path to the destination host.

The router will send an ICMP Redirect Message to the source host.





13

Refer to the exhibit. An administrator is designing security rules for the 192.168.22.0 /24 network. Each security rule requires an address and mask pair to represent the machines that will be affected by the rule. Which two address and mask pairs will be the most precise way to reference the servers and hosts separately. (Choose two.)



192.168.22.40 255.255.255.248

192.168.22.40 255.255.255.252

192.168.22.100 255.255.255.128

192.168.22.100 255.255.255.254

192.168.22.1 255.255.255.192

192.168.22.101 255.255.255.224





14

Which of the following are features of IPv6? (Choose three.)



larger address space

faster routing protocols

data types and classes of service

authentication and encryption

improved host naming conventions

same addressing scheme as IPv4





15

Which process do routers use to determine the subnet network address based upon a given IP address and subnet mask?



binary adding

hexadecimal anding

binary division

binary multiplication

binary ANDing





16

What is the primary reason for development of IPv6?



security

header format simplification

expanded addressing capabilities

addressing simplification





17

Which three IP addresses are private? (Choose three.)



172.168.33.1

10.35.66.70

192.168.99.5

172.18.88.90

192.33.55.89

172.35.16.5





18

Which statements are true regarding IP addressing? (Choose two.)



NAT translates public addresses to private addresses destined for the Internet.

Only one company is allowed to use a specific private network address space.

Private addresses are blocked from public Internet by router.

Network 172.32.0.0 is part of the private address space.

IP address 127.0.0.1 can be used for a host to direct traffic to itself.





19

Which IPv4 subnetted addresses represent valid host addresses? (Choose three.)



172.16.4.127 /26

172.16.4.155 /26

172.16.4.193 /26

172.16.4.95 /27

172.16.4.159 /27

172.16.4.207 /27





20

What is a group of hosts called that have identical bit patterns in the high order bits of their addresses?



an internet

a network

an octet

a radi





21

Refer to the exhibit. Host A is connected to the LAN, but it cannot get access to any resources on the Internet. The configuration of the host is shown in the exhibit. What could be the cause of the problem?



The host subnet mask is incorrect.

The default gateway is a network address.

The default gateway is a broadcast address.

The default gateway is on a different subnet from the host.





22

Which of the following network devices are recommended to be assigned static IP addresses? (Choose three.)



LAN workstations

servers

network printers

routers

remote workstations

laptops







more.

Popular Posts