test me

Site Search:

CCENT Final Exam 3 -- 51 question set

Exam Source

1. Which devices segment collision domains? (Choose two.)

a. transceiver
#b. router
#c. switch
d. hub
e. media

02. Which form of NAT maps multiple private IP addresses to a single registered IP address by using different ports?
(A) static NAT
(B) dynamic NAT
#(C) overloading
(D) overlapping
(E) port loading

03. What should be part of a comprehensive network security plan?
(A) Allow users to develop their own approach to network security
#(B) Physically secure network equipment from potential access by unauthorized individuals
(C) Encourage users to use personal information in their passwords to minimize the likelihood of passwords being forgotten
(D) Delay deployment of software patches and updates until their effect on end-user equipment is well known and widely reported
(E) Minimize network overhead by deactivating automatic antivirus client updates

04. Which of the following commands will configure a default route to any destination network not found in the routing table?
(A) Router(config)# ip default-route s0
(B) Router(config)# ip route s0
(C) Router(config)# ip default-route s0
#(D) Router(config)# ip route s0
(E) Router(config)# ip route any any e0

05. For security reasons, information about RTA, including platform and IP addresses, should not be accessible from the Internet. This information should, however, be accessible to devices on the internal networks of RT A. Which command or series of commands will accomplish these objectives?
(A) RTA(config)#no cdp run
(B) RTA(config)#no cdp enable
(C) RTA(config)#interface s0/0
RTA(config-if)#no cdp run
#(D) RTA(config)#interface s0/0
RTA(config-if)#no cdp enable

06. What is the purpose of flow control?
(A) to ensure data is retransmitted if an acknowledgment is not received
(B) to reassemble segments in the correct order at the destination device
#(C) to provide a means for the receiver to govern the amount of data sent by the sender
(D) to regulate the size of each segment

7. A collision has occurred on an Ethernet network. Which three statements explain the CSMA/CD process? (Choose three.)

#a. After the jam signal, all transmission stops for a random period.

b. When the collision is detected, the hosts stop transmission immediately.

c. When the collision is detected, the hosts stop transmission after eight microseconds.

d. When the backoff period expires, the hosts involved in the collision have priority to transmit.

#e. When the backoff period expires, each host checks to see whether the networking media is idle and then attempts to transmit.

#f. When the collision is detected, the hosts continue to transmit using a jam pattern for a short time to ensure that all hosts detect the collision.

8. Which of the following devices extend a collision domain? (Choose two.)

a. switch

#b. hub

c. bridge

#d. router

e. repeater

9. What should a network administrator consider when migrating to Gigabit Ethernet architecture from Fast Ethernet? (Choose three.)

#a. Existing NICs might need to be upgraded.

#b. Existing switches might need to be upgraded.

c. Existing NICs must support half-duplex mode.

d. Existing UTP wiring must be replaced with fiber.

e. Existing UTP must be tested for CAT 5e compatibility.

f. Existing network topology must support shared media.

10. which prompt is the global configuration mode on a Cisco router identified?
(A) Router>
(B) Router#
#(C) Router(config)#
(D) Router(config-if)#
(E) Router(config-line)#c
(F) Router(config-router)#

11. Which binary number is a representation of the decimal number 248?

a. 11101000

b. 11110100

#c. 11111000

d. 11111010

12. Which type of address is

a. host address

b. multicast address

c. broadcast address

d. subnetwork address

13. Workstation A sends data to workstation B. What will have to be altered as the data passes through the router? (Choose two.)

#a. Layer 1 bit pattern

#b. Layer 2 frames

c. Layer 3 packets

d. Layer 4 segments

e. Layer 5 -7 data

14. Which combination of network id and subnet mask correctly identifies all IP addresses from through






15. What is the correct number of usable subnetworks and hosts for the IP network address subnetted with a /29 mask?

a. 6 networks / 32 hosts

b. 14 networks / 14 hosts

#c. 30 networks / 6 hosts

d. 62 networks / 2 hosts

16. Which command is used on a Cisco router to reach the global configuration mode?
(A) Router> enable
(B) Router# router
(C) Router# setup
(D) Router# interface
#(E) Router# configure terminal

17. A NIC of a computer has been assigned an IP address of with a mask of To which subnet does the IP address belong?







18. What are three characteristics of the TCP protocol? (Choose three.)

#a. exchanges datagrams unreliably

#b. is used to send IP error messages

c. forces the retransmission of unacknowledged packets

d. creates a virtual session between end-user applications

#e. carries the IP address of the destination host in the TCP header

f. is responsible for breaking messages into segments and reassembling them at their destination

19. A network user is using the FTP protocol to transfer data from the local host to an FTP server. The local host is also using the SNMP protocol to report the system status to the network management system. Which statement describes the communication from the host?

a. FTP and SNMP will use the same port number.

#b. FTP uses TCP to establish a session before any data is transferred.

c. The UDP session will reorder the SNMP data as it is received by the network management system.

d. The TCP protocol for the FTP transfer will use a random destination port number to the FTP server.

20. Which protocols are TCP/IP application layer protocols? (Choose two.)

a. UDP

#b. FTP

c. IP

#d. SMTP

e. TCP

21. Which technologies are considered to be WAN technologies? (Choose two.)

a. Ethernet

#b. DSL

c. Token Ring

#d. Frame Relay


22. Serial0/0 does not respond to a ping request from a host on the FastEthernet0/0 LAN. How can this problem be corrected?
#(A) Enable the Serial 0/0 interface
(B) Correct the IP address for Serial 0/0
(C) Correct the IP address for FastEthernet 0/0
(D) Change the encapsulation type on Serial 0/0
(E) Enable autoconfiguration on the Serial 0/0 interface
23. Why would a network administrator configure port security on a switch?
(A) to prevent unauthorized Telnet access to a switch port
(B) to limit the number of Layer 2 broadcasts on a particular switch port
#(C) to prevent unauthorized hosts from accessing the LAN
(D) to protect the IP and MAC address of the switch and associated ports
(E) to block unauthorized access to the switch management interfaces over common TCP ports

24. Host A has established a communication session with host B for the first time. What enabled R1 to forward this traffic in the appropriate direction to reach the nework to which host B is attached?
(D) a Layer 4 protocol
#(E) a routing protocol
(F) a default gateway

25. When using Category 5 UTP cable, which RJ-45 pin pairs are used to exchange data between hosts on an Ethernet network?

a. 1 and 2; 4 and 5

#b. 1 and 2; 3 and 6

c. 3 and 6; 7 and 8

d. 4 and 5; 7 and 8

26. What does the “Inside Global” address represent in the configuration of NAT?
(A) the summarized address for all of the internal subnetted addresses
(B) the MAC address of the router used by inside hosts to connect to the Internet
(C) a globally unique, private IP address assigned to a host on the inside network
#(D) a registered address that represents an inside host to an outside network
27. How many simultaneous Telnet sessions does a Cisco router support by default?
(A) 1
(B) 2
(C) 3
(D) 4
#(E) 5
(F) 6

28. Which cable diagram displays the end to end pinout for a console cable used with Cisco devices?

a. Cable A

#b. Cable B

c. Cable C

d. Cable D

29. Which subnet masks would be valid for a subnetted Class B address? (Choose two.)







30. What type of routing is it when the network administrator manually configures a route?

#a. static

b. dynamic

c. interior

d. exterior

31. Which statement describes a star topology?

a. Each host in the network is connected to a backbone cable that is terminated at both ends.

#b. Each host is connected to a hub or switch, either of which acts as a central point for all network connections.

c. Each host is directly connected to two other hosts to form a long chain of hosts.

d. Each host has a connection to all other hosts in the network.

32. Host A is communicating with the server. What will be the source MAC address of the frames received by Host A from the server?
#(A) the MAC address of router interface e0
(B) the MAC address of router interface e1
(C) the MAC address of the server network interface
(D) the MAC address of host A

33. A technician needs to connect a FastEthernet port from a router to a FastEthernet port on a switch. The graphic shows the RJ-45 cable ends for a patch cable. What result can be expected if this cable is used for the link?

#a. The cable will be able to pass traffic between the devices.

b. The cable has reversed-pairs, which will degrade the signal quality.

c. The cable has split-pairs, which will increase crosstalk and create an unreliable link.

d. The cable has all the wires reversed, which will prevent the link lights from indicating that there is link.

34. Which IP address is a private address?

35. Which layer of the OSI model defines the process of adding the source and destination IP address to a data packet?

a. transport

#b. network

c. data link

d. physical

36. Which encryption type does WPA2 use?
(B) PPK via IV

37. Which of the following protocols uses both TCP and UDP ports?
(C) Telnet
#(D) DNS

38. When the receiving workstation detects an error in the data it has received, it does not acknowledge receipt of the data. The source workstation retransmits the unacknowledged data. Which layer of the OSI model supports this process of retransmission?

a. network

b. application

c. session

#d. transport

39. A company has the following addressing scheme requirements: -currently has 25 subnets -uses a Class B IP address -has a maximum of 300 computers on any network segment -needs to leave the fewest unused addresses in each subnetWhat subnet mask is appropriate to use in this company?







40. What can be verified by successfully pinging the reserved loopback address on a host?

a. Connectivity exists between two hosts on the LAN.

#b. The TCP/IP stack of the local host is installed correctly.

c. A connection exists between a host and the default gateway.

d. The route a packet takes from the local host to a remote host is valid.

41. Three access points have been installed and configured to cover a small office. What term defines the wireless topology?
#(C) ESS

42. Which command will set the default gateway to on a Cisco switch?
(A) Switch(config)# ip default-network
(B) Switch(config)# ip route-default
#(C) Switch(config)# ip default-gateway
(D) Switch(config)# ip route

43. A simplified CAM table for Switch1 is shown in the exhibit. If host A sends a frame with a destination MAC address of 66C, how does the switch process this frame?

a. The switch drops the frame.

b. The switch sends the frame out port 3.

c. The switch sends the frame out ports 1, 2, and 4.

#d. The switch sends the frame out ports 2, 3, and 4.

e. The switch sends the frame out ports 1, 2, 3, and 4.

44. Which of the following increases the potential for a collision to occur?

a. the use of an active hub instead of an intelligent hub

b. the use of an intelligent hub instead of an active hub

c. a reduction in the number of devices attached to the hub

#d. an increase in the number of devices attached to the hub

45. What is the effect of using the service password-encryption command?
(A) Only the enable password will be encrypted
(B) Only the enable secret password will be encrypted
(C) Only passwords configured after the command has been entered will be encrypted
(D) It will encrypt the secret password and remove the enable secret password from the configuration
#(E) It will encrypt all current and future passwords

46. A workstation is browsing a web server. What will be the partial contents of the segment sent from the workstation to the web server?

#a. Gambar 1

b. Gambar 2

c. Gambar 3

d. Gambar 4

47. What is the purpose of a default route?
(A) It is a route to be used when the routing protocol fails
(B) It is a route configured by an ISP that sends traffic into a corporate network
#(C) It is a route used when a packet is destined for a remote network that is not listed in the routing table.
(D) It is a route manually configured for a specific remote network for which a routing protocol is not configured.
(E) It is used to send traffic to a stub network.
48. Workstation A must be able to telnet to switch SW-A through router RTA for management purposes. What must be configured for this connection to be successful?
(A) VLAN 1 on RTA
#(B) default gateway on SW-A
(C) IP routing on SW-A
(D) cross-over cable connecting SW-A and RTA

49. A user initiates three simultaneous FTP connections from the local host to the same FTP server. Which OSI layer is responsible for establishing and managing these different FTP connections?

a. application

#b. session

c. transport

d. network

e. data link

50. At which layer of the OSI model does the protocol that provides the information displayed by the show cdp neighbors command operate?
(A) physical
#(B) data link
(C) network
(D) transport
(E) application

51. Serial0/0 does not respond to a ping request from a host on the FastEthernet0/0 LAN. How can this problem be corrected?
#(A) Enable the Serial 0/0 interface
(B) Correct the IP address for Serial 0/0
(C) Correct the IP address for FastEthernet 0/0
(D) Change the encapsulation type on Serial 0/0
(E) Enable autoconfiguration on the Serial 0/0 interface