9
Custom Search Home CCNA Exam Answers CCNA 1 Exam Answers CCNA 2 Exam Answers CCNA 4 Exam Answers CCNA 3 Exam Answers CCENT Practice Certification Exam TestInside ccna 640-802 About Packet tracer Pass4sure CCNA Sitemap CCNA Exploration 4.0, CCNA 640-802, CCNA Answers, CCNA Blog CCNA, CCNP,CCNSP ....CCIE... CCNA Answers You are here: Home / CCNA Exam Answers / CCENT Practice Certification Exam / CCENT Practice Certification Exam # 2 – CCNA Exploration: Accessing the WAN (Version 4.0) Recommend this on Google ----- Exchange Rates Transmission repair shop Running Shoes CCENT Practice Certification Exam # 2 – CCNA Exploration: Accessing the WAN (Version 4.0) July 22, 2009 by admin · Leave a Comment Our Sponsors CCENT Practice Certification Exam # 2 – CCNA Exploration: Accessing the WAN (Version 4.0) 1. Data is being sent from a source PC to a destination server. Which three statements correctly describe the function of TCP or UDP in this situation? (Choose three.) The UDP destination port number identifies the application or service on the server which will handle the data. TCP is the preferred protocol when a function requires lower network overhead. UDP segments are encapsulated within IP packets for transport across the network. The source port field identifies the running application or service that will handle data returning to the PC. The TCP source port number identifies the sending host on the network. The TCP process running on the PC randomly selects the destination port when establishing a session with the server. 2. In what two situations would UDP be the preferred transport protocol over TCP? (Choose two.) when applications need to guarantee that a packet arrives intact, in sequence, and unduplicated when a faster delivery mechanism is needed when delivery overhead is not an issue when applications do not need to guarantee delivery of the data when destination port numbers are dynamic Search CCENT Practice Certification Exam # 2 – CCNA Exploration: ... http://www.ccna4u.org/2009/07/ccent-practice-certification-ex... 1 of 9 11/23/13, 6:27 PM

CCENT Practice Certification Exam # 2 – CCNA Exploration: Accessing the WAN (Version 4.0) | CCNA Exploration 4.0, CCNA 640-802, CCNA Answers, CCNA Blog

Embed Size (px)

Citation preview

Page 1: CCENT Practice Certification Exam # 2 – CCNA Exploration: Accessing the WAN (Version 4.0) | CCNA Exploration 4.0, CCNA 640-802, CCNA Answers, CCNA Blog

Custom Search

HomeCCNA Exam Answers

CCNA 1 Exam AnswersCCNA 2 Exam AnswersCCNA 4 Exam AnswersCCNA 3 Exam AnswersCCENT Practice Certification ExamTestInside ccna 640-802

AboutPacket tracerPass4sure CCNA

Sitemap

CCNA Exploration 4.0, CCNA 640-802, CCNA Answers, CCNA Blog

CCNA, CCNP,CCNSP....CCIE... CCNA Answers

You are here: Home / CCNA Exam Answers / CCENT Practice Certification Exam / CCENT Practice Certification Exam # 2 – CCNA Exploration: Accessing the WAN(Version 4.0)

Recommend this on Google

-----

Exchange Rates Transmission repair shop Running Shoes

CCENT Practice Certification Exam # 2 – CCNA Exploration: Accessing theWAN (Version 4.0)July 22, 2009 by admin · Leave a Comment

Our Sponsors

CCENT Practice Certification Exam # 2 – CCNA Exploration: Accessing the WAN (Version 4.0)1. Data is being sent from a source PC to a destination server. Which three statements correctly describe the function of TCP or UDP in this situation?(Choose three.)

The UDP destination port number identifies the application or service on theserver which will handle the data.TCP is the preferred protocol when a function requires lower network overhead.UDP segments are encapsulated within IP packets for transport across thenetwork.The source port field identifies the running application or service that willhandle data returning to the PC.The TCP source port number identifies the sending host on the network.The TCP process running on the PC randomly selects the destination port whenestablishing a session with the server.

2. In what two situations would UDP be the preferred transport protocol over TCP? (Choose two.)when applications need to guarantee that a packet arrives intact, in sequence, andunduplicatedwhen a faster delivery mechanism is neededwhen delivery overhead is not an issuewhen applications do not need to guarantee delivery of the datawhen destination port numbers are dynamic

Search

CCENT Practice Certification Exam # 2 – CCNA Exploration: ... http://www.ccna4u.org/2009/07/ccent-practice-certification-ex...

1 of 9 11/23/13, 6:27 PM

Page 2: CCENT Practice Certification Exam # 2 – CCNA Exploration: Accessing the WAN (Version 4.0) | CCNA Exploration 4.0, CCNA 640-802, CCNA Answers, CCNA Blog

3. Refer to the exhibit. Workstation A sends an IP packet to workstation B. Which two statements describe the encapsulation of the packet as it passesthrough the network?

The Layer 2 header is stripped from the packet by each router.The destination Layer 2 address of the packet does not change.The source Layer 3 address of the packet changes at each router.The Layer 2 header changes at each router.The Layer 3 header is stripped from the packet by each router.

4. Refer to the exhibit. A switch with a default configuration connects four hosts. The ARP table for host A is shown. What happens when host A wantsto send an IP packet to host D?

Host A sends an ARP request to the MAC address of host D.Host D sends an ARP request to host A.Host A sends out the packet to the switch. The switch sends the packet only to thehost D, which in turn responds.Host A sends out a broadcast of FF:FF:FF:FF:FF:FF. Every other hostconnected to the switch receives the broadcast and host D responds with itsMAC address.

5. What three services are provided by the transport layer? (Choose three.)flow controlencryption of datapath determinationconnection establishmenterror recoverybit transmissiondata representation

6. Which layer of the OSI model handles the process of identifying and discarding damaged frames?presentationsessiontransportnetworkdata linkphysical

7. Refer to the exhibit. Considering the information that follows and the exhibit, where is the data flowing?

Source IP address: 192.168.1.88

Destination IP address: 209.165.200.225

Source MAC address: 00-11-12-7a-41-10

Destination MAC address: 00-0d-cc-f4-ad-2c

Source Port: 1464

Destination Port: 23

A – from laptop to access pointB – from access point to attached switchC – from host to default gateway routerD – from router to ISP

8. Refer to the exhibit. If Host 1 needs to request its IP address from the server, what protocol would be used to process that request?

CSMA/CDCSMA/CADHCPICMPNATFTP

9. Refer to the exhibit. If Host 1 were to transfer a file to the server, what layers of the TCP/IP model would be used?

only application and Internet layersonly Internet and network access layersonly application, Internet, and network access layersapplication, transport, Internet, and network access layersonly application, transport, network, data link, and physical layersapplication, session, transport, network, data link, and physical layers

10. ABC company needs to connect its router to an ISP to access the Internet. What device is needed to connect the router to the ISP if the ISPsupplies a T1 leased line for the connection?

CSU/DSUmodemDSL routerNT1 deviceISDN modem

11. Refer to the exhibit. How many collision domains exist in the exhibited network?

CCENT Practice Certification Exam # 2 – CCNA Exploration: ... http://www.ccna4u.org/2009/07/ccent-practice-certification-ex...

2 of 9 11/23/13, 6:27 PM

Page 3: CCENT Practice Certification Exam # 2 – CCNA Exploration: Accessing the WAN (Version 4.0) | CCNA Exploration 4.0, CCNA 640-802, CCNA Answers, CCNA Blog

12367

12. What are two actions performed by a Cisco switch? (Choose two.)building a routing table that is based on the first IP address in the frame headerusing the source MAC addresses of frames to build and maintain a MACaddress tableforwarding frames with unknown destination IP addresses to the default gatewayutilizing the MAC address table to forward frames via the destination MACaddressexamining the destination MAC address to add new entries to the MAC addresstable

13. A network administrator wants to configure a Cisco 2960 switch so that access to each switch port is limited to one MAC address. What willaccomplish the administrator’s objective?

Cisco Discovery Protocolport securityInternet Control Message Protocolaccess listsflow control

14. When would you want to use the switchport port-security mac-address stickycommand?whenever you need to protect an unused switch portwhenever you want the port to only allow a single host device to connectwhenever you need the port to recognize the statically assigned MAC address in theMAC address tablewhenever multiple devices share the same port

15. Refer to the exhibit. SW_1 and SW_2 have been configured with VLAN10 and VLAN20. The two switches are connected by a trunking link. Duringtesting, workstations on the same VLAN can ping each other, but workstations on the opposite VLAN cannot ping each other. What needs to be doneto fix the problem?

Configure VTP on both switches so they can share VLAN information.Assign a management VLAN on each switch with IP addresses in the same subnet.Configure an access port on each switch.Add a Layer 3 device to the network.

16. When configuring a switch to use SSH for virtual terminal connections, what is the purpose of the crypto key generate rsa command?show SSH connected hostsdisconnect SSH connected hostscreate a public and private key pairshow active SSH ports on the switchaccess the SSH database configuration

17. Which three statements are true about full-duplex operation on an Ethernet network? (Choose three.)There are no collisions in full-duplex mode.A dedicated switch port is required for each node.Hub ports are preconfigured for full-duplex mode.The host network card must detect the availability of the media before transmitting.The host network card and the switch port must both be in full-duplex mode.

18. What are three characteristics of CSMA/CD? (Choose three.)Devices can be configured with a higher transmission priority.A jam signal indicates that the collision has cleared and the media is not busy.A device listens and waits until the media is not busy before transmitting.The device with the electronic token is the only one that can transmit after acollision.All of the devices on a segment see data that passes on the network medium.After detecting a collision, hosts can attempt to resume transmission after arandom time delay has expired.

19.20. Which three addresses are valid public addresses? (Choose three.)

198.133.219.17192.168.1.24510.15.250.5128.107.12.117192.15.301.24064.104.78.227

21. Refer to the exhibit. Four hosts are being added to the 172.16.112.0 network. Which IP address is invalid as a host address for this network?

172.16.113.55172.16.112.255172.16.127.255172.16.112.89172.16.120.96

22. Refer to the exhibit. Using PAT, RouterA is configured to translate all private inside addresses to a single public address. The network administratorwants to determine which port number is being used in the translation of the ComputerA inside private IP address. Which command could be used ifthe administrator sits at ComputerA but is not allowed remote access to RouterA?

CCENT Practice Certification Exam # 2 – CCNA Exploration: ... http://www.ccna4u.org/2009/07/ccent-practice-certification-ex...

3 of 9 11/23/13, 6:27 PM

Page 4: CCENT Practice Certification Exam # 2 – CCNA Exploration: Accessing the WAN (Version 4.0) | CCNA Exploration 4.0, CCNA 640-802, CCNA Answers, CCNA Blog

ipconfig /alltraceroutenetstattracert

23. What type of address is 172.16.134.64 with the subnet mask 255.255.255.224?This is a usable host address.This is a broadcast address.This is a network address.This is an Internet-routable address.

24. The router reads each bit to determine the class of an address. Which three series of binary numbers would the router identify as public Class Caddresses? (Choose three.)

10101100.00100000.00010001.0001011111000110.10000101.11011011.0101011111010001.10100101.11001000.1110110111000000.10101000.00100000.0100000011000000.00011111.00000111.10111011

25. Given a host with the IP address 192.168.65.54 and a subnet mask of 255.255.255.240, to which network does the host belong?192.168.65.16192.168.65.32192.168.65.48192.168.65.64

26. Refer to the exhibit. Which IP address can be assigned to the default gateway for host A?10.184.0.110.192.0.010.199.255.25410.200.255.254

27. Refer to the exhibit. What would be a valid network address for the new subnet on RTA?

10.16.10.16/2810.16.10.24/2810.16.10.30/2810.16.10.56/2810.16.10.72/28

28. Refer to the exhibit. The network shown is using classful subnetting. The serial link between routers A and B is configured with addresses from the172.16.6.0/23 subnet. How many valid IP addresses are wasted on this subnetwork?

252254256508510512

29. What are three valid host addresses given a subnet mask of 255.255.254.0? (Choose three.)64.100.2.255172.55.33.25564.104.129.0192.168.162.25510.165.55.255128.107.62.0

30. Refer to the exhibit. Which two interfaces could be used for a leased-line WAN connection? (Choose two.)

ABCDEF

31. What type of cable is used for connectivity between a model 2620 router and a model 2950 switch (point A), a model 2950 switch and a model1900 switch (point B), and a model 2950 switch and a host (point C)?

A – straight-through; B – rollover; C – straight-throughA – crossover; B – straight-through; C – straight-throughA – straight-through; B – straight-through; C – crossoverA – crossover; B – straight-through; C – crossoverA – straight-through; B – crossover; C – straight-throughA – straight-through; B – crossover; C – crossover

32. Refer to the exhibit. A small business has asked for advice about what type of cable will be needed to connect their modular routers. What type ofconnector is used by each device that is shown?

WIC-2T is a DB60 connector, WIC1T is a Smart Serial connector, and WIC-1ENETis an RJ45 connector.WIC-2T is an RJ45 connector, WIC1T is a DB60 connector, and WIC-1ENET is aSmart Serial connector.WIC-2T is a DB60 connector, WIC1T is a Smart Serial connector, and WIC-1ENETis an RJ45 connector.

CCENT Practice Certification Exam # 2 – CCNA Exploration: ... http://www.ccna4u.org/2009/07/ccent-practice-certification-ex...

4 of 9 11/23/13, 6:27 PM

Page 5: CCENT Practice Certification Exam # 2 – CCNA Exploration: Accessing the WAN (Version 4.0) | CCNA Exploration 4.0, CCNA 640-802, CCNA Answers, CCNA Blog

WIC-2T is a Token Ring connector, WIC1T is a DB25 connector, and WIC-1ENET isan RJ11 connector.WIC-2T is a Smart Serial connector, WIC1T is a DB60 connector, andWIC-1ENET is an RJ45 connector.

33. Refer to the exhibit. The router that is named myhome has received a frame from the host 192.168.254.7. The contents of this frame are beingsent to host 172.16.14.243. What is the Layer 2 destination address of the frame as it leaves the myhome router?

0008.a3b6.ce050009.1281.18a8000a.8a47.e612172.16.14.129172.16.14.243192.168.254.7

34. Why is it important for the router to maintain an accurate routing table?to provide Layer 2 addressing information for the next hopto prevent broadcasts from occurring on the LANto determine the best path to the destination networkto identify all of the routers in a network

35. Refer to the exhibit. Based on the exhibited router output, what two conclusions can be made? (Choose two.)

The enable password has been encrypted.The service password-encryption command has not been added to theconfiguration.The passwords that are shown restrict access to the router console.The password that will gain access to privileged mode is sys#op.The passwords that are shown will be required to enter privileged EXEC modeon this router.

36. What would be a common reason to upgrade from RIPv1 to RIPv2?RIPv2 takes less router memory than RIPv1 takes.RIPv2 supports a larger network (more routers) than RIPv1 supports.RIPv2 supports discontiguous networks and RIPv1 does not.RIPv2 supports classless routing. RIPv1 is classful.

37. Refer to the exhibit. Which two statements are true of the output shown? (Choose two.)

The protocol that communicated this information operates at Layer 3 of the OSImodel.The output of this command displays information about directly connectedCisco devices only.The switch is attached to the SanJose1 FastEthernet0/21 interface.SanJose1 is running CDP version 12.0.SanJose1 has two fully operational, CDP-enabled Cisco switches directly connectedto it.SanJose2 is a 2600 series router running several routed protocols.

38. Which two statements describe the command ip route 192.168.7.24 255.255.255.248 192.168.7.9? (Choose two.)A packet that is destined for host 192.168.7.30 will be forwarded to address192.168.7.9.The address 192.168.7.9 is the destination network for this route.The address 192.168.7.24 is the next-hop router in this command.This command is issued from the interface configuration mode.This command is used to define a static route.

39. Which group of commands allows a router to be administered remotely?line con 0

password class

login

interface fa0/1

ip address 192.168.10.1 255.255.255.0

access-class 1 in

line vty 0 4

password cisco

login

interface vlan 1

ip address 192.168.10.1 255.255.255.0

no shutdown

40. Which protocol is described as an enhanced distance vector routing protocol?

CCENT Practice Certification Exam # 2 – CCNA Exploration: ... http://www.ccna4u.org/2009/07/ccent-practice-certification-ex...

5 of 9 11/23/13, 6:27 PM

Page 6: CCENT Practice Certification Exam # 2 – CCNA Exploration: Accessing the WAN (Version 4.0) | CCNA Exploration 4.0, CCNA 640-802, CCNA Answers, CCNA Blog

RIP v1RIP v2EIGRPOSPF

41. Why is the ip host command used to create host tables on Cisco routers?to create static routes to specific hoststo allow communication with other IP devices by nameto provide a meaningful name for the local routerto identify only the directly attached networks and associated hoststo define the host devices with which the router is allowed to connect

42. Refer to the exhibit. From router R1, the command telnet 192.168.11.2 is entered from privileged mode and this message displays:

00:06:45: %SYS-5-CONFIG_I: Configured from console by console 192.168.11.2

Trying 192.168.11.2 . . . Open

Password required, but none set

If the R2 interfaces are in the status shown in the exhibit, what is the most likely problem?

The enable secret command is missing from R2.The enable password command is missing from R1.The login command is missing from the line configuration mode on R2.The password command is missing from the line configuration mode on R2.The login command is missing from the console mode on R2.The no shutdown command is missing from the Serial 0/0 interface mode on R1.

43. Which two items can be modified by the system administrator to determine from where the Cisco IOS loads? (Choose two.)system ROMstartup configuration filesystem image fileconfiguration register valuebootloader image file

44. What are two requirements for establishing a console communication session between a computer and a router? (Choose two.)A console cable must be used from the console port of the router to the NIC of thecomputer.A rollover cable must be used from the console port of the router to the serialport of the computer.A default gateway must be configured on the computer.The IP addresses assigned to the router and computer must be on the samesubnetwork.There must be a terminal emulator application on the computer.

45.46. What is the outcome when a wireless host has a different SSID configured than the access point to which it is attempting to connect?

The access point will send the host a rejection message.The host will be prompted for a userid and password.The access point will send the host a challenge message.The host will only be allowed access to the Internet.The access point will send the host a re-authentication request message.The host will not be allowed access to the wireless network.

47. A wireless network has one access point installed. Users at some locations in the office complain that their wireless access is slow, while otherssay that the wireless network performance is fine. What should be done to remedy this situation?

Replace the access point.Install another access point at another location within the office.Upgrade the wireless NICs in the hosts that are slow.Limit the number of wireless hosts that attach to the access point at one time.Convert back to a wired network.

48. Which technology is primarily used for security in a wireless network environment?SSHWPASSIDCSMA/CACSMA/CD

49.50. Which technology is primarily used in a WAN?

ARPCDPPPPWEPCSMA/CD

www.ccna4u.net

Filed Under: CCENT Practice Certification Exam, CCNA Exam Answers · Tagged With: CCENT Practice Certification, CCENT Practice Certification Exam 2,

CCENT Practice Certification Exam # 2 – CCNA Exploration: ... http://www.ccna4u.org/2009/07/ccent-practice-certification-ex...

6 of 9 11/23/13, 6:27 PM

Page 7: CCENT Practice Certification Exam # 2 – CCNA Exploration: Accessing the WAN (Version 4.0) | CCNA Exploration 4.0, CCNA 640-802, CCNA Answers, CCNA Blog

CCNA Exploration: Accessing the WAN (Version 4.0)

Virus protection software Exchange Rates Transmission repair shop

Running Shoes Transmission repair cost Transmission Repair

Transmission repair cost Transmission Repair Auto Mechanic Shares

Speak Your Mind

Name *

Email *

Website

Post Comment

Sharing Classes Virus protection software Exchange Rates

Transmission repair shop Running Shoes Transmission repair cost

Our Sponsor

Get Update

Enter your email and be the first to receive all the best posts on CCNA4U.ORG!

► CCNA Exploration► CCNA Answers► Wireless Wan

► Wireless Wan► Certification A► A Exam Practice Test

► A Exam Practice Test► C Certification► CCNA Class

CCENT Practice Certification Exam # 2 – CCNA Exploration: ... http://www.ccna4u.org/2009/07/ccent-practice-certification-ex...

7 of 9 11/23/13, 6:27 PM

Page 8: CCENT Practice Certification Exam # 2 – CCNA Exploration: Accessing the WAN (Version 4.0) | CCNA Exploration 4.0, CCNA 640-802, CCNA Answers, CCNA Blog

Email

http://twitter.com/ccna

Recent Posts

CCNA 3 Final 2012 Exam Answers Updated July 2012CCNA 2 Final 2012 Exam Answers – V3CCNA 2 Final 2012 Exam Answers – V2CCNA 2 Final 2012 Exam Answers – V1CCNA 1 Final 2012 Exam Answers – eg.3CCNA 1 Final 2012 Exam Answers – eg.2CCNA 1 Final 2012 Exam Answers – eg.1Packet Tracer Version 5.3.3 Software Downloads Update 08.02.2012ccna 4 final 2012If you can not access to ccna4u.orgPanasonic ToughBook CF-30CCNA4 Module 1 to module 8 (Spanish Version)CCNA1 Final v2CCNA 4 Final Exam (A)CCNA 1 Module 4

Recent Comments

LT on CCNA 2 Chapter 8 2011 V4.0 Answers 100%LT on CCNA 2 Chapter 7 2011 V4.0 Answers 100%LT on CCNA 2 Chapter 6 2011 V4.0 Answers 100%LT on CCNA 2 Chapter 5 2011 V4.0 Answers 100%LT on CCNA 2 Chapter 4 2011 V4.0 Answers 100%LT on CCNA 2 Chapter 3 2011 V4.0 Answers 100%LT on CCNA 2 Chapter 2 2011 V4.0 Answers 100%LT on CCNA 2 Chapter 1 2011 V4.0 Answers 100%foued on CCNA 2 Chapter 3 2011 V4.0 Answers 100%Max on CCNA 2 Chapter 9 2011 V4.0 Answers 100%chevi on CCNA 3 Final 2012 Exam Answers Updated July 2012Yepi Games on CCNA1 FINAL 100% (Updated Jan 14 – 2009)philip langat on CCNA 1 Chapter 2 V4.0 Answers 100% updated 2011coptar on CCNA 1 Final 2012 Exam Answers – eg.1dane on CCNA 4 Chapter 5 2011 V4.0 Answers 100%

Online

Tags

ccna 1 2011 ccna 1 answers CCNA 1 Final CCNA 1 v4.0 answers ccna 2 ccna 2 2011 ccna 2 exam ccna 2 exploration 4.0 ccna 2 final 2011 ccna 2 final exam 2011 ccna 3 CCNA4 ccna 4 final ccna 4 final 2011 CCNA 4 Final Exam 2011 CCNA 4 v4.0 answers CCNA4U answers CCNA4Ubusiness CCNA4u RouterCCNA4U source CCNA answers 4.0 ccna discovery ccna exploration 4.0 CCNA Exploration 4.0 Answers ccna final CCNA security Answers CCNA

Technology Cisco Exploration CCNA Cisco Exploration CCNA network data default design download Ebook enterprise exhibit final graphic

internet LAN Switching and Wireless Final Exam Answers mac networks Tech user wireless

Link Exchange

packet tracer 5.3.2ccna answersccna finalpacket tracer 5.3.1

CCENT Practice Certification Exam # 2 – CCNA Exploration: ... http://www.ccna4u.org/2009/07/ccent-practice-certification-ex...

8 of 9 11/23/13, 6:27 PM

Page 9: CCENT Practice Certification Exam # 2 – CCNA Exploration: Accessing the WAN (Version 4.0) | CCNA Exploration 4.0, CCNA 640-802, CCNA Answers, CCNA Blog

packet tracer 5.3.1packet tracerCisco ebooksccna4uccna keyscisco exampacket tracerpacket tracer downloadpacket tracerfriv11.com

Categories

AboutCCNA Discovery 4.1 AnswersCCNA Exam Answers

CCENT Practice Certification ExamCCNA 1 Exam AnswersCCNA 2 Exam AnswersCCNA 3 Exam AnswersCCNA 4 Exam AnswersCCNA Practice Certification Exam

Packet tracerPass4sure CCNATestInside ccna 640-802

Please don’t copy my content!

Transmission Repair Auto Mechanic Shares Sharing Classes Virus protection software Exchange Rates

Return to top of page

Copyright © 2013 · Nomadic Theme on Genesis Framework · WordPress · Log in

Transmission repair shop Running Shoes Transmission repair cost Transmission Repair Auto Mechanic Shares Sharing Classes

CCENT Practice Certification Exam # 2 – CCNA Exploration: ... http://www.ccna4u.org/2009/07/ccent-practice-certification-ex...

9 of 9 11/23/13, 6:27 PM