Preparacion certificacion cisco


of 71
All materials on our website are shared by users. If you have any questions about copyright issues, please report us to resolve them. We are always happy to assist you.
1. Por favor no olviden dar el clk en la publicidad de google pues de esto vive mi página. CCNA…
  • 1. Por favor no olviden dar el clk en la publicidad de google pues de esto vive mi página. CCNA Exploration 4.0: (I) Network Fundamentals Chapter 2: Communications over the Networks 1 Which two layers of the OSI model have the same functions as the TCP/IP model Network Access Layer? (Choose two.) Network Transport * Physical * Data Link Session 2 What is a primary function of the trailer information added by the data link layer encapsulation? * supports error detection ensures ordered arrival of data provides delivery to correct destination identifies the devices on the local network assists intermediary devices with processing and path selection 3 During the encapsulation process, what occurs at the data link layer? No address is added. The logical address is added. * The physical address is added. The process port number is added. 4 What device is considered an intermediary device? file server IP phone laptop printer * switch
  • 2. Por favor no olviden dar el clk en la publicidad de google pues de esto vive mi página. 5 Which layer encapsulates the segment into packets? physical * data link network transport 6 Which statements correctly identify the role of intermediary devices in the network? (Choose three.) * determine pathways for data initiate data communications * retime and retransmit data signals originate the flow of data * manage data flows final termination point for data flow 7 What can be identified by examining the network layer header? the destination device on the local media * the path to use to reach the destination host the bits that will be transferred over the media the source application or process creating the data 8 What is the proper order of the layers of the OSI model from the highest layer to the lowest layer? physical, network, application, data link, presentation, session, transport application, physical, session, transport, network, data link, presentation application, presentation, physical, session, data link, transport, network * application, presentation, session, transport, network, data link, physical presentation, data link, session, transport, network, physical, application 9 Refer to the exhibit. Which three labels correctly identify the network types for the network segments that are shown? (Choose three.) Network A -- WAN
  • 3. Por favor no olviden dar el clk en la publicidad de google pues de esto vive mi página. * Network B -- WAN * Network C -- LAN Network B -- MAN Network C -- WAN * Network A -- LAN 10 What are the key functions of encapsulation? (Choose three.) allows modification of the original data before transmission * identifies pieces of data as part of the same communication enables consistent network paths for communication * ensures that data pieces can be directed to the correct receiving end device * enables the reassembly of complete messages tracks delay between end devices 11 Refer to the exhibit. Which networking term describes the data interleaving process represented in the graphic? piping PDU streaming multiplexing * encapsulation 12 What is a PDU? corruption of a frame during transmission data reassembled at the destination retransmitted packets due to lost communication * a layer specific encapsulation 13 Refer to the exhibit. "Cell A" at IP address has established an IP session with "IP Phone 1" at IP address Based upon the graphic, which device type best describes the function of wireless device "Cell A?" the destination device * an end device an intermediate device
  • 4. Por favor no olviden dar el clk en la publicidad de google pues de esto vive mi página. a media device 14 Refer to the exhibit. Which set of devices contains only end devices? A, C, D B, E, G, H C, D, G, H, I, J D, E, F, H, I, J * E, F, H, I, J 15 Refer to the exhibit. Which term correctly identifies the device type that is included in the green area? source end transfer * intermediary 16 Which three statements best describe a Local Area Network (LAN)? (Choose three.) * A LAN is usually in a single geographical area. * The network is administered by a single organization. The connection between segments in the LAN is usually through a leased connection. The security and access control of the network are controlled by a service provider. * A LAN provides network services and access to applications for users within a common organization. Each end of the network is generally connected to a Telecommunication Service Provider (TSP). 17 Refer to the exhibit. What type of network is shown? WAN MAN * LAN WLAN 18 What is the purpose of the TCP/IP Network Access layer?
  • 5. Por favor no olviden dar el clk en la publicidad de google pues de esto vive mi página. path determination and packet switching * data representation, encoding, and control reliability, flow control, and error detection detailing the components that make up the physical link and how to access it the division of segments into packets 19 Which characteristic correctly refers to end devices in a network? manage data flows originate data flow * retime and retransmit data signals determine pathways for data 20 What is the primary purpose of Layer 4 port assignment? to identify devices on the local media to identify the hops between source and destination to identify to the intermediary devices the best path through the network to identify the source and destination end devices that are communicating * to identify the processes or services that are communicating within the end devices 21 Select the statements that are correct concerning network protocols. (Choose three.) * define the structure of layer specific PDU's dictate how to accomplish layer functions * outline the functions necessary for communications between layers limit hardware compatibility * require layer dependent encapsulations eliminate standardization among vendors Chapter 3: OSI Application Layer Functionality 1 A network administrator is designing a network for a new branch office of twenty-five users. What are the advantages of using a client-server model? (Choose two.) * centralized administration does not require specialized software * security is easier to enforce
  • 6. Por favor no olviden dar el clk en la publicidad de google pues de esto vive mi página. lower cost implementation provides a single point of failure 2 Which of the following are benefits of peer-to-peer networks? (Choose three.) centralized security * easy to create very scalable * no centralized equipment required * centralized administrator not required centralized control of assets 3 Which two protocols are used to control the transfer of web resources from a web server to a client browser? (Choose two.) ASP FTP HTML * HTTP * HTTPS IP 4 Which statements are correct concerning the role of the MTA in handling email? (Choose three.) routes email to the MDA on other servers * receives email from the client's MUA receives email via the POP3 protocol * passes email to the MDA for final delivery * uses SMTP to route email between servers delivers email to clients via the POP3 protocol 5 What is the automated service that matches resource names with the required IP address? HTTP SSH FQDN * DNS Telnet SMTP
  • 7. Por favor no olviden dar el clk en la publicidad de google pues de esto vive mi página. 6 What three protocols operate at the Application layer of the OSI model? (Choose three.) ARP * DNS PPP * SMTP * POP ICMP 7 What are the two forms of application layer software? (Choose two.) * applications processes * services dialogs syntax daemons 8 What are three properties of peer-to-peer applications? (Choose three.) * acts as both a client and server within the same communication requires centralized account administration * hybrid mode includes a centralized directory of files * can be used in client-server networks does not require specialized software centralized authentication is required 9 Which application layer protocols correctly match a corresponding function? (Choose two.) DNS dynamically allocates IP addresses to hosts * HTTP transfers data from a web server to a client POP delivers email from the client to the server email server SMTP supports file sharing Telnet provides a virtual connection for remote access 10 Which are valid DNS resource record types? (Choose three.) *A * NS MTA * MX
  • 8. Por favor no olviden dar el clk en la publicidad de google pues de esto vive mi página. FQDN MAU 11 Which email components are used to forward mail between servers? (Choose two.) MDA IMAP * MTA POP * SMTP MUA 12 What is the primary disadvantage of telnet? does not support authentication consumes network bandwidth utilizes client resources not widely available * does not support encryption requires remote access 13 What are three common HTTP message types? (Choose three.) * GET PUSH * POST HTML UPLOAD * PUT 14 Which of the following are examples of TCP/IP application layer protocols? (Choose three.) * a terminal emulation protocol that supports remote console connections with various network devices a protocol created by IBM that makes it easier for mainframes to connect to remote offices * a protocol responsible for transporting electronic mail on TCP/IP networks and the Internet a protocol that controls the rate at which data is sent to another computer * a protocol that exchanges network management information between a network device and a management console
  • 9. Por favor no olviden dar el clk en la publicidad de google pues de esto vive mi página. Chapter 4: OSI Transport Layer 1 Refer to the exhibit. What two pieces of information can be determined from the output that is shown? (Choose two.) The local host is using well-known port numbers to identify the source ports. * A termination request has been sent to Communication with is using HTTP Secure. * The local computer is accepting HTTP requests. is performing the three-way handshake with 2 After a web browser makes a request to a web server that is listening to the standard port, what will be the source port number in the TCP header of the response from the server? 13 53 * 80 1024 1728 3 Which information is found in both the TCP and UDP header information? sequencing flow control * acknowledgments source and destination 4 Which is an important characteristic of UDP? acknowledgement of data delivery * minimal delays in data delivery high reliability of data delivery same order data delivery 5 Refer to the exhibit. Host A is using FTP to download a large file from Server 1. During
  • 10. Por favor no olviden dar el clk en la publicidad de google pues de esto vive mi página. the download process, Server 1 does not receive an acknowledgment from Host A for several bytes of transferred data. What action will Server 1 take as a result? create a Layer 1 jam signal * reach a timeout and resend the data that needs to be acknowledged send a RESET bit to the host change the window size in the Layer 4 header 6 Refer to the exhibit. In line 7 of this Wireshark capture, what TCP operation is being performed? * session establishment segment retransmit data transfer session disconnect 7 Refer to the exhibit. The initial TCP exchange of data between two hosts is shown in the exhibit. Assuming an initial sequence number of 0, what sequence number will be included in Acknowledgment 2 if Segment 6 is lost? 2 3 6 * 1850 3431 3475 8 Why is flow control used for TCP data transfer? to synchronize equipment speed for sent data to synchronize and order sequence numbers so data is sent in complete numerical order * to prevent the receiver from being overwhelmed by incoming data to synchronize window size on the server to simplify data transfer to multiple hosts 9 During a TCP communication session, if the packets arrive to the destination out of order, what will happen to the original message? The packets will not be delivered.
  • 11. Por favor no olviden dar el clk en la publicidad de google pues de esto vive mi página. The packets will be retransmitted from the source. * The packets will be delivered and reassembled at the destination. The packets will be delivered and not reassembled at the destination. 10 With TCP/IP data encapsulation, which range of port numbers identifies all well-known applications? 0 to 255 256 to 1022 * 0 to 1023 1024 to 2047 49153 to 65535 11 Which transport layer protocol provides low overhead and would be used for applications which do not require reliable data delivery? TCP IP * UDP HTTP DNS 12 What are two features of the User Datagram Protocol (UDP)? (Choose two.) * flow control * low overhead connectionless connection-oriented sequence and acknowledgements 13 What mechanism is used by TCP to provide flow control as segments travel from source to destination? sequence numbers session establishment * window size acknowledgments
  • 12. Por favor no olviden dar el clk en la publicidad de google pues de esto vive mi página. 14 What is dynamically selected by the source host when forwarding data? destination logical address source physical address default gateway address * source port 15 Why are port numbers included in the TCP header of a segment? to indicate the correct router interface that should be used to forward a segment to identify which switch ports should receive or forward the segment to determine which Layer 3 protocol should be used to encapsulate the data * to enable a receiving host to forward the data to the appropriate application to allow the receiving host to assemble the packet in the proper order 16 Which two options represent Layer 4 addressing? (Choose two.) identifies the destination network * identifies source and destination hosts identifies the communicating applications * identifies multiple conversations between the hosts identifies the devices communicating over the local media 17 Which three features allow TCP to reliably and accurately track the transmission of data from source to destination? * encapsulation flow control connectionless services * session establishment * numbering and sequencing best effort delivery 18 Which OSI model layer is responsible for regulating the flow of information from source to destination, reliably and accurately? application presentation
  • 13. Por favor no olviden dar el clk en la publicidad de google pues de esto vive mi página. session * transport network 19 Based on the transport layer header shown in the diagram, which of the following statements describe the established session? (Choose two.) This is a UDP header. * This contains a Telnet request. This contains a TFTP data transfer. The return packet from this remote host will have an Acknowledgement Number of 43693. * This is a TCP header. 20 Which event occurs during the transport layer three-way handshake? The two applications exchange data. TCP initializes the sequence numbers for the sessions. * UDP establishes the maximum number of bytes to be sent. The server acknowledges the bytes of data received from the client. Chapter 5: OSI Network Layer 1 In an IPv4 environment, what information is used by the router to forward data packets from one interface of a router to another? * destination network address source network address source MAC address well known port destination address 2 What information is added during encapsulation at OSI Layer 3? source and destination MAC source and destination application protocol source and destination port number *source and destination IP address
  • 14. Por favor no olviden dar el clk en la publicidad de google pues de esto vive mi página. 3 In a connectionless system, which of the following is correct? The destination is contacted before a packet is sent. * The destination is not contacted before a packet is sent. The destination sends an acknowledgement to the source that indicates the packet was received. The destination sends an acknowledgement to the source that requests the next packet to be sent. 4 Which IP packet field will prevent endless loops? type-of-service identification flags * time-to-live header checksum 5 Which portion of the network layer address does a router use to forward packets? host portion broadcast address * network portion gateway address 6 Refer to the exhibit. Using the network in the exhibit, what would be the default
  • 15. Por favor no olviden dar el clk en la publicidad de google pues de esto vive mi página. gateway address for host A in the network? * 7 If the default gateway is configured incorrectly on the host, what is the impact on communications? The host is unable to communicate on the local network. * The host can communicate with other hosts on the local network, but is unable to communicate with hosts on remote networks. The host can communicate with other hosts on remote networks, but is unable to communicate with hosts on the local network. There is no impact on communications. 8 What is the purpose of a default gateway? physically connects a computer to a network provides a permanent address to a computer identifies the network to which a computer is connected identifies the logical address of a networked computer and uniquely identifies it to the rest of the network * identifies the device that allows local network computers to communicate with devices on other networks 9 What type of routing uses information that is manually entered into the routing table? dynamic interior * static standard 10 When the destination network is not listed in the routing table of a Cisco router, what are two possible actions that the router might take? (Choose two.) The router sends an ARP request to determine the required next hop address. * The router discards the packet.
  • 16. Por favor no olviden dar el clk en la publicidad de google pues de esto vive mi página. The router forwards the packet toward the next hop indicated in the ARP table. The router forwards the packet to the interface indicated by the source address. * The router forwards the packet out the interface indicated by the default route entry. 11 What are the key factors to consider when grouping hosts into a common network? (Choose three.) gateways * purpose physical addressing software version * geographic location * ownership 12 What is a component of a routing table entry? the MAC address of the interface of the router the destination Layer 4 port number the destination host address *the next-hop address 13 Which intermediary devices could be used to implement security between networks? (Choose two.) * router hub switch * firewall access point bridge 14 What are three common problems wi
  • Related Search
    We Need Your Support
    Thank you for visiting our website and your interest in our free products and services. We are nonprofit website to share and download documents. To the running of this website, we need your help to support us.

    Thanks to everyone for your continued support.

    No, Thanks