What is the reason for this? Host X and host Y belong to different networks. Which three addresses belong to the category of public IP addresses? Which three statements are true about transport layer protocols? HeadshotRefer to the exhibit. Which logical topology describes the exhibited network? Host C is able to ping A host is transmitting a video over the network. How does the transport layer allow this host to use multiple applications to transmit other data at the same time as the video transmission?
It uses a connectionless protocol only for multiple simultaneous transmissions. PC1 is unable to access PC2. To troubleshoot this problem, the technician needs to confirm that the next hop interface is operational. Which default gateway address should the technician ping from PC1 to confirm this?
Cable 1 and Cable 2 are wired for specific physical layer requirements. Which three segments use Cable 2? Which three statements are true about the IP configuration that is displayed? The assigned address is a private address. Which device should be used for routing a packet to a remote network?
In a network, host A is sending data segments to host B. The flow control of the segments that are being exchanged is displayed. Which two statements are true about this communication? The initial window size is determined via the two-way handshake. Which OSI layer uses a connection-oriented protocol to ensure reliable delivery of data? What are two functions of the data link layer?
It segments and reorders the data. The diagram represents the process of sending e-mail between clients. Which list correctly identifies the component or protocol used at each numbered stage of the diagram? MUA 2. SMTP 3. MTA 4. SMTP 5. MTA 6. MDA 7. POP 8. Which two statements are true about this connection? The transmit pin of the cable is terminated to the receive pin.
A host is using NAT to connect to the Internet. Which three IP addresses enable this connection? An organization wants to create a subnet of the IP network This subnet will accommodate hosts. Which subnet mask should be assigned to this network?
A host is connected to hub 1. Which combination of IP address, subnet mask, and default gateway can allow this host to function in the network? IP address: A technician uses the nslookup command on the PC and views the output that is displayed in the exhibit. What is the IP address of the primary domain name server configured at the host? Which OSI layer offers ordered data reconstruction services? All devices in the network use default configurations.
How many logical address ranges are required in this topology? The network administrator wants to install a private application on a server. Which range of port numbers is normally assigned to this application to make it accessible by clients? Each media link is labeled. What type of cable should be used to connect the different devices?
Which information is used by the router to determine the path between the source and destination hosts? What two facts can be determined from the session information that is displayed? The destination port indicates that a Telnet session has been initiated. Host A is accessing multiple servers.
Which combination of port number and address will uniquely identify a particular process running on a specific server? In a network, PC1 sends a message to PC2. The frame received at PC2 is shown. What information in this frame determines the correct destination application? An organization has been assigned network ID Which IP address range can be used for this organization? Which three IPv4 addresses represent valid host addresses for a subnet? However, the PC is still unable to access the Internet.
Which IP address should be changed to Which three statements are true about network layer addressing? It uniquely identifies each host. It monitors the media for presence of a data signal.
The PC, the routing table of which is displayed, is configured correctly. To which network device or interface does the IP address The interface is configured as a DCE device. It affects the operation of the device immediately when modified. Which two facts can be determined about the topology? Two logical address ranges are required. Which password restricts Telnet access to the router? To create the initial configuration, a network technician connected host A to the router using the connection that is shown.
Which statement is true about this connection? It provides out-of-band console access. The serial interface of the router was configured with the use of the commands that are shown. What should the network technician do to solve this problem? Which port of the router should be connected to modem 2 to enable this access? Host B was powered off. What change will occur in the MAC table of the switch?
A PC is communicating with another PC on a remote network. The two networks are connected by three routers. Which action will help to identify the path between the hosts? Use the tracert command at the host. What information can be learned from these configuration entries?
Router config line vty 0 4 Router config-line password arj15 Router config-line login This configuration allows users to connect to the router via the use of the telnet command. Which prompt should the technician see when entering this command? Host X is unable communicate with host Y.
Which command can be run at host X to determine which intermediary device is responsible for this failure? When must a router serial interface be configured with the clock rate command? A network technician is trying to determine the correct IP address configuration for Host A. What is a valid configuration for Host A? During this attempt, a frame was captured with the source MAC address D and the destination MAC address The packet inside the captured frame has an IP source address At which point in the network was this packet captured?
Which range of port numbers are reserved for services that are commonly used by applications that run on servers?
Which prompt represents the appropriate mode used for the copy running-config startup-config command? A technician is working on a network problem that requires verification of the router LAN interface. What address should be pinged from this host to confirm that the router interface is operational?
Host A is unable to reach host B on the remote network. A technician attempted to ping the local gateway and the ping was successful. To verify the host configuration, the technician issued the ipconfig command. What is the likely cause of the problem? The default gateway on host A is incorrectly configured. An employee wants to access the organization intranet from home.
Which intermediary device should be used to connect the organization intranet to the Internet to enable this access? Which OSI layer manages data segments? To enhance security in a network, the network administrator uses these commands: Router config line console 0 Router config-line password j1mdi2 Router config-line login What two conclusions are evident from these commands?
Users who attempt to connect to the console port of the router must enter a password. The entries permit access through the console by the use of j1mdi2 as the password. RouterB is configured properly. What action should be taken on RouterA to solve this problem?
When host A sends a frame addressed for host D, which hosts will receive the frame? Communication for hosts X and Y is restricted to the local network. The gateway addresses are broadcast addresses. Which statement is true about this transaction? The tracert Computer A can ping other addresses on the local subnet. A protocol analyzer that was running on computer B showed that the packet never reached its destination.
Why did the packet not reach the destination? The TTL for the packet was decreased to zero by R1. A routing issue has occurred in your internetwork. Which of the following type of devices should be examined to isolate this error? What can the user do from the command prompt, Router config-line? Which option shows the PDU that contains the Layer 3 source and destination addressing for a packet?
Correct answer is option image 3. The ping What do the ping results indicate? Which topology divides the collision domain and provides full media bandwidth to the hosts in the network? Which option correctly identifies the network address, range of host addresses, and the broadcast address for the network that contains host A? A technician is setting up a workgroup for six users and wants to allow users to share files without setting up a server.
Which application layerprotocol will provide for peer-to-peer file sharing in a workgroup? Which router component will have contents erased when the command erase startup-config is issued? How many host addresses may be assigned when using the Host A is able to access resources on the local LAN but is unable to access any resources on the Internet. What is the likely cause of this problem?
The default gateway is on a different subnet from the host. How many host addresses may be assigned on each subnetwork when using the A company is planning to subnet its network for a maximum of 27 hosts. Which subnet mask would provide the needed hosts and leave the fewest unused addresses in each subnet?
Which router component will have contents erased when the command erase startup-config is issued? Passwords can be used to restrict access to all or parts of the Cisco IOS. Select the modes and interfaces that can be protected with passwords. Which physical component is used to access and perform the initial configuration on a new unconfigured router?
A routing issue has occurred in your internetwork. Assuming that the net work in the exhibit is converged meaning the routing tables and ARP tables are complete,which MAC address will Host A place in the destination address field of Ether net frames destined for www. The logical topology is always the same as the physical topology. Physical topologies are concerned with how a net work transfers frames. Physical signal paths are defined by Data Link layer protocols. Logical topologies consist of virtual connections between nodes.
Choose two. Network usage is on a first come, first serve basis. Computers are allowed to transmit data only when they possess a token. Data from a host is received by all other hosts. Electronic tokens are passed sequentially to each other. Token passing net works have problems with high collision rates. What is this type of drawing? Layer 2 may identify devices by a physical address burned into the net work card11Layer 2 identifies the applications that are communicatingLayer 3 represents a hierarchical addressing schemeLayer 4 directs communication to the proper destination net workLayer 4 addresses are used by intermediary devices to forward data.
Which statement describes the media access control methods that are used by the net works in the exhibit?
0コメント