1. Using default settings, what is the next step in the switch boot sequence after the IOS loads from flash?
- Search for a backup IOS in ROM.
- Load the bootstrap program from ROM.
- Load the running-config file from RAM.
- Perform the POST routine.
- Locate and load the startup-config file from NVRAM.
2. Refer to the exhibit. A newly purchased client laptop has just connected to the local area network. The local area network is using a wireless router that is providing dynamic addressing as shown. Which IP address does the laptop use as a destination address when requesting a dynamically assigned address?
- 192.168.0.100
- 192.168.0.1
- 255.255.255.255
- 255.255.255.0
- 192.168.0.255
3. A user is configuring a wireless access point and wants to prevent any neighbors from discovering the network. What action does the user need to take?
- Enable WPA encryption.
- Configure DMZ settings.
- Configure a DNS server.
- Disable SSID broadcast.
4. What is an inherent security vulnerability of SSID broadcasting?
- It sends traffic unencrypted between the wireless access point and the client.
- It broadcasts the identity of the network.
- It allows unauthenticated access to the wireless network.
- It allows any host to join the wireless network.
5. A network administrator installs a network device that focuses on interconnecting independent local networks. At which layer of devices does this technology reside?
- access
- internet
- distribution
- core
6. What are three characteristics of multicast transmission? (Choose three.)
- Multicast transmission can be used by routers to exchange routing information.
- The range of 224.0.0.0 to 224.0.0.255 is reserved to reach multicast groups on a local network.
- The source address of a multicast transmission is in the range of 224.0.0.0 to 224.0.0.255.
- Multicast messages map lower layer addresses to upper layer addresses.
- Computers use multicast transmission to request IPv4 addresses.
- A single packet can be sent to a group of hosts.
7. What are two common media used in networks? (Choose two.)
- fiber
- wood
- nylon
- water
- copper
8. Refer to the exhibit. Which router port connects to the modem provided by the service provider?
- C
- A
- B
- D
9. A consumer places a smartphone close to a pay terminal at a store and the shopping charge is successfully paid. Which type of wireless technology was used?
- 3G
- Bluetooth
- NFC
- Wi-Fi
10. Match the router prompt to the configuration task.
11. What type of technology converts analog voice signals into digital data?
- SMTP
- VoIP
- POP3
- SNMP
12. What are two wiring schemes defined by the TIA/EIA organization for Ethernet installation in homes and businesses? (Choose two.)
- T568B
- RJ-45
- STP
- UTP
- T568A
13. Match each DHCP message type with its description. (Not all options are used.)
14. What is the effect of setting the security mode to WEP on a small wireless router?
- It translates an internal address or group of addresses into an outside, public address.
- It encrypts data between the wireless client and the access point.
- It allows the access point to inform clients of its presence.
- It translates IP addresses into easy-to-remember domain names.
- It identifies the wireless LAN.
15. A network administrator issues the Switch(config)# Interface FastEthernet 0/1 command on a Cisco switch. Which term is used to describe the “0/1” part in the command?
- command
- hot key
- keyword
- argument
16. What is the purpose of the subnet mask in conjunction with an IP address?
- to identify whether the address is public or private
- to mask the IP address to outsiders
- to uniquely identify a host on a network
- to determine the subnet to which the host belongs
17. If the default gateway is configured incorrectly on a host, what is the impact on communications?
- The host is unable to communicate on the local network.
- The host is unable to communicate with hosts on remote networks.
- The host is unable to communicate with hosts on both the local and remote networks.
- The host cannot get an IP address from the DHCP server.
18. What is a characteristic of a peer-to-peer application?
- The resources required for the application are centralized.
- Both devices initiate a three-way handshake to determine who is initiating the communication.
- Each device using the application provides a user interface and runs a background service.
- Each device can act both as a client and a server, but not simultaneously.
19. In software defined network architecture, what function is removed from network devices and performed by an SDN controller?
- application policies
- data plane
- security
- control plane
20. A data center has recently updated a physical server to host multiple operating systems on a single CPU. The data center can now provide each customer with a separate web server without having to allocate an actual discrete server for each customer. What is the networking trend that is being implemented by the data center in this situation?
- virtualization
- BYOD
- maintaining communication integrity
- online collaboration
21. Which network migration technique encapsulates IPv6 packets inside IPv4 packets to carry them over IPv4 network infrastructures?
- translation
- dual-stack
- tunneling
- encapsulation
22. Which two types of interference may affect the data throughput on UTP cables? (Choose two.)
- moisture
- EMI
- crosstalk
- temperature
- noise
23. Which three commands are used to set up secure access to a router through a connection to the console interface? (Choose three.)
- line console 0
- login
- enable secret cisco
- password cisco
- interface fastethernet 0/0
- line vty 0 4
24. Match the type of malware with the definition.
25. Which statement correctly describes data transmission at the transport layer?
- Segmentation is provided by the window size field when the TCP protocol is used.
- Segmentation is provided by sequence numbers when UDP is used.
- Retransmission of lost packets is provided by both TCP and UDP.
- A single datagram can include both a TCP and a UDP header.
- Both UDP and TCP use port numbers.
26. What are two benefits of using a layered network model? (Choose two.)
- It speeds up packet delivery.
- It prevents technology in one layer from affecting other layers.
- It ensures a device at one layer can function at the next higher layer.
- It assists in protocol design.
- It prevents designers from creating their own model.
27. Which two devices are considered end devices? (Choose two.)
- switch
- hub
- laptop
- printer
- router
28. Which three attacks exploit human behavior? (Choose three.)
- pretexting
- brute force
- phishing
- zombies
- vishing
- malware
29. A user is setting up a home wireless network. Which type of device must the user have in order to establish the wireless network and provide access to the internet for multiple home devices?
- hub
- wireless router
- switch
- patch panel
30. Match the protocol with the function.
31. What are two features of protocols used within the TCP/IP protocol stack? (Choose two.)
- The Internet Layer IP protocol has built in mechanisms for ensuring the reliable transmission and receipt of data.
- The same Transport Layer source port is used for all of the tabs opened at the same time within a web browser.
- UDP is used when an application must be delivered as quickly as possible and some loss of data can be tolerated.
- TCP and UDP destination port numbers are dynamically generated by the sending device in order to track the responses to requests.
- TCP mechanisms retransmit data when an acknowledgment is not received from the destination system within a set period of time.
32. A small accounting office is setting up a wireless network to connect end devices and to provide internet access. In which two scenarios does a wireless router perform Network Address Translation (NAT)? (Choose two.)
- when a host is sending packets to the ISP in order to request a speed increase for Internet services
- when a host is sending packets to a remote site owned by the manufacturer of the wireless router in order to request a digital copy of the device manual
- when a host is sending HTTP packets to the wireless router in order to update the network addressing of the LAN
- when a host is sending a print job to a network printer on the LAN
- when a host is sending packets to a local server in order to update the network media settings and music playlists
33. Which command can an administrator execute to determine what interface a router will use to reach remote networks?
- show protocols
- show interfaces
- show ip route
- show arp
34. While a network security product is being deployed, a customizable list of allowable protocols is shown. Which three protocols should be allowed to provide for the use of email on a network? (Choose three.)
- POP3
- Telnet
- IMAP4
- TFTP
- SMTP
- HTTP
- DNS
35. At which layer of the OSI model would a logical address be added during encapsulation?
- transport layer
- network layer
- physical layer
- data link layer
36. A client device on an Ethernet segment needs an IP address in order to communicate on the network. A DHCP server with IP address 192.168.1.1 has been configured and enabled on the network. How will a client device obtain a usable IP address for this network?
- Send a DHCPACK packet to the default gateway address.
- Use a statically configured IP address from the pool of IP addresses that is offered by the DHCP server.
- Send a DHCPDISCOVER message to physical address FF-FF-FF-FF-FF-FF.
- Send a DHCPREQUEST packet to IP address 255.255.255.255.
37. Which two files, if found, are copied into RAM as a router with the default configuration register setting boots up? (Choose two.)
- IOS image file
- running configuration
- POST diagnostics
- startup configuration
38. Which wireless RF band do IEEE 802.11b/g devices use?
- 5 GHz
- 2.4 GHz
- 60 GHz
- 900 MHz
39. A network administrator establishes a connection to a switch via SSH. What characteristic uniquely describes the SSH connection?
- on-site access to a switch through the use of a directly connected PC and a console cable
- remote access to the switch through the use of a telephone dialup connection
- direct access to the switch through the use of a terminal emulation program
- remote access to a switch where data is encrypted during the session
- out-of-band access to a switch through the use of a virtual terminal with password authentication
40. Using a systematic troubleshooting approach, a help desk technician suspects a problem at Layer 3 of the OSI model. In gathering information, which two questions are associated with Layer 3? (Choose two.)
- Does a browser connection to www.cisco.com work?
- Is there a link light on the network card?
- Is the PC configured for DHCP?
- Is the network cable plugged in?
- From the PC, is the default gateway reachable using the ping command?
41. During a move, employee workstations were disconnected from the network and reconnected in new offices. However, after the move a few workstations cannot get a valid IP address. What should be checked first to identify the root cause of the problem?
- Install all software updates.
- Check the operation status of the DHCP server.
- Make sure the cables are functional and properly plugged.
- Test if these workstations can ping the default gateway.
42. Which solution allows external users to access only an internal FTP server on a private network?
- dynamic NAT
- port forwarding
- NAT with overload
- static NAT
43. Which type of address does a switch use to build the MAC address table?
- destination MAC address
- source MAC address
- source IP address
- destination IP address
44. Which two criteria are used to help select a network medium for a network? (Choose two.)
- the cost of the end devices that are used in the network
- the types of data that need to be prioritized
- the distance the selected medium can successfully carry a signal
- the environment where the selected medium is to be installed
- the number of intermediate devices that are installed in the network
45. Which factor does not influence throughput?
- the amount of data that is being sent and received on the connection
- the type of data that is being transmitted
- the operating system that is used by end devices
- the latency that is created by the number of network devices encountered between source and destination
46. A DHCP server is used to assign IP addresses dynamically to the hosts on a network. The address pool is configured with 192.168.10.0/24. There are 3 printers on this network that need to use reserved static IP addresses from the pool. How many IP addresses in the pool are left to be assigned to other hosts?
- 252
- 254
- 253
- 251
47. What is an advantage of using standards to develop and implement protocols?
- Different manufacturers are free to apply different requirements when implementing a protocol.
- A particular protocol can only be implemented by one manufacturer.
- Standards provide flexibility for manufacturers to create devices that comply with unique requirements.
- Products from different manufacturers can interoperate successfully.
48. An intruder tries a large number of possibilities in rapid succession to guess a password. As a result, other users on the network are locked out. What type of attack has occurred?
- brute force
- DDoS
- SYN flooding
- ping of death
49. Match the commands to the correct actions.
50. Which type of access is secured on a Cisco router or switch with the enable secret command?
- console line
- virtual terminal
- AUX port
- privileged EXEC
51. Which type of device filtering can be enabled on some wireless access points or wireless routers?
- IP address
- user ID
- authentication
- MAC address
52. A host needs to reach another host on a remote network, but the ARP cache has no mapping entries. To what destination address will the host send an ARP request?
- the broadcast MAC address
- the subnet broadcast IP address
- the unicast IP address of the remote host
- the unicast MAC address of the remote host
53. When configuring SSH on a router to implement secure network management, a network engineer has issued the login local and transport input ssh line vty commands. What three additional configuration actions have to be performed to complete the SSH configuration? (Choose three.)
- Configure the correct IP domain name.
- Manually enable SSH after the RSA keys are generated.
- Generate the asymmetric RSA keys.
- Create a valid local username and password database.
- Configure role-based CLI access.
- Set the user privilege levels.
54. A computer has to send a packet to a destination host in the same LAN. How will the packet be sent?
- The packet will be sent to the default gateway first, and then, depending on the response from the gateway, it may be sent to the destination host.
- The packet will be sent directly to the destination host.
- The packet will first be sent to the default gateway, and then from the default gateway it will be sent directly to the destination host.
- The packet will be sent only to the default gateway.
55. Refer to the exhibit. What three facts can be determined from the viewable output of the show ip interface brief command? (Choose three.)
- Two devices are attached to the switch.
- The switch can be remotely managed.
- One device is attached to a physical interface.
- The default SVI has been configured.
- Two physical interfaces have been configured.
- Passwords have been configured on the switch.
56. Which two statements describe characteristics of network addresses? (Choose two.)
- DHCP is used to dynamically assign both MAC and IP addresses to devices connected to the network.
- The MAC address of a device will change when that device moves from one Ethernet network to another.
- A MAC address is also referred to as a physical address because it is permanently embedded on the NIC.
- A statically assigned IP address will be valid on any network to which the device connects.
- A valid public IPv4 or IPv6 address is needed in order for devices to communicate over the internet.
57. When troubleshooting network problems, where would a network administrator find the configuration information, such as the computer names and the IP addresses that are used?
- DNS server
- physical topology diagram
- DHCP server
- logical topology diagram
58. A student is uploading files from a phone to a server on another network. Which layer of the TCP/IP model is responsible for providing an addressing scheme to transmit the data between the devices?
- network access
- internet
- transport
- application
59. If the default gateway is configured incorrectly on the host, what is the impact on communications?
- The host can communicate with other hosts on the local network, but is unable to communicate with hosts on remote networks.
- The host can communicate with other hosts on remote networks, but is unable to communicate with hosts on the local network.
- The host is unable to communicate on the local network.
- There is no impact on communications.
60. A customer calls the help line to report a computer problem. The help line technician responds and works with the customer for some time. However, the technician cannot identify the root cause of the problem. What should the technician do to help the customer?
- Suggest that the customer visit the support website for more detailed information.
- Tell the customer that a replacement computer will be shipped immediately.
- Ask for the email address of the customer in order to send all the support documents for the computer.
- Tell the customer that a ticket is created and another technician will contact the user soon.