finalover90 (796290), страница 3
Текст из файла (страница 3)
Which characteristic does this type of topology possess?As one router malfunctions, the entire communication goes down.All the devices on the network are connected to a common cable.As two routers malfunction, the entire communication goes down.Communication continues in the event of a break in any one connection. *******************************************************************************************45 Refer to the exhibit. What kind of Ethernet cable is represented?rollover cablestraight-through cable***********crossover cableconsole cable****************************************************************************46 Which cable diagram displays the end to end pinout for a crossover cable used with Cisco devices?Cable ACable BCable C***********Cable D**************************************************************47 Refer to the exhibit.
Workstation 1 pings the Fa0/1 interface of Router 1. Which MAC address willworkstation 1 obtain during the ARP request for this communication?00-06-5B-88-DF-C300-B0-D0-7F-F7-4600-0F-24-85-75-C000-0B-E5-64-BD-4400-08-A3-B6-CE-02***********00-08-A3-B6-CE-03*****************************************************************48 A technician is testing connectivity between the devices using the ping command. Pings between Host B andHost A were successful.
The technician could not ping the R3 address 172.16.3.2 from Host A. The technicianissued ipconfig from Host A and saw the information displayed in the exhibit. What is the most likely problem?The IP address of Host A is incorrect.The subnet mask of Host A is incorrect.The default gateway of Host A is incorrect. ***********Host A is properly configured. Some other problem exists in the internetwork.************************************************************************************49 Refer to the exhibit. The physical documentation shows a portion of the internetwork of the ABC Company.Which segments will be free of collisions?segments 1 and 2segments 1, 2, and 3segments 1, 2, 3, 4, and 5segments 2 and 3segments 3, 4, and 5***********segments 4, and 5*************************************************************50 The ping command can be used to test connectivity between hosts.
Which OSI model layers are verified bythis test?Layers 1 and 2 onlyLayers 1 and 3 onlyLayers 1, 2 and 3***********Layer 1 through Layer 7Layer 4 through Layer 7**************************************************************51 Which physical network topology is easy to monitor and troubleshoot, easy to add new devices to as thenetwork expands, but subject to complete failure when a central hub or switch ceases to work?busstar***********ringmesh*****************************************************************52 A network administrator has installed a 24 port switch and connected 10 computers with 10/100 NICs.
If theNICs are operating at 100 Mbps, how much bandwidth is available for each computer to receive data?0.24 Mbps4.17 Mbps10 Mbps24 Mbps100 Mbps***********200 Mbps************************************************************Version 3.1 (92.2% if u follow this answer:Trust me u have to make same mistake if want 92.2%)1.Which cable diagram displays the end to end pinout for a console cable used with Cisco devices?Cable A*Cable BCable CCable D***********************************************************************************************2.
How many broadcast domains are shown in the diagram?*threefourfivesixseveneight***************************************************************************************3. Refer to the exhibit. What device does Device X represent in the graphic to allow PC1 to ping PC4?hub*routerbridgeaccess pointLayer 2 switch******************************************************************************************4. Refer to the exhibit. How many collision domains are present in the topology?35*6789******************************************************************************************5 What can be verified by successfully pinging the reserved loopback address on a host?Connectivity exists between two hosts on the LAN.*The TCP/IP stack of the local host is installed correctly.A connection exists between a host and the default gateway.The route a packet takes from the local host to a remote host is valid.******************************************************************************************6 When using Category 5 UTP cable, which RJ-45 pin pairs are used to exchange data between hosts on anEthernet network?1 and 2; 4 and 5*1 and 2; 3 and 63 and 6; 7 and 84 and 5; 7 and 8******************************************************************************************7 A collision has occurred on an Ethernet network.
Which three statements explain the CSMA/CD process?(Choose three.)*After the jam signal, all transmission stops for a random period.When the collision is detected, the hosts stop transmission immediately.When the collision is detected, the hosts stop transmission after eight microseconds.When the backoff period expires, the hosts involved in the collision have priority to transmit.*When the backoff period expires, each host checks to see whether the networking media is idle and thenattempts to transmit.*When the collision is detected, the hosts continue to transmit using a jam pattern for a short time to ensure thatall hosts detect the collision.*****************************************************************************************8.A workstation is browsing a web server. What will be the partial contents of the segment sent from theworkstation to the web server?source port 1026, destination port 80, sequence number 1, ack number 0*******************************************************************************************9 Which protocols are TCP/IP application layer protocols? (Choose two.)UDP*FTPIP*SMTPTCP******************************************************************************************10 A company has the following addressing scheme requirements:-currently has 25 subnets-uses a Class B IP address-has a maximum of 300 computers on any network segment-needs to leave the fewest unused addresses in each subnetWhat subnet mask is appropriate to use in this company?255.255.240.0255.255.248.0*255.255.254.0255.255.255.0255.255.255.128255.255.255.248******************************************************************************************11.
Refer to the exhibit. Host A has been added to the network. However, host A cannot communicate with theserver B or the Internet. All cables have been tested and are functioning to standards. At which layer of the OSImodel is this problem occurring?Layer 1Layer 2*Layer 3Layer 4******************************************************************************************12 Refer to the exhibit. Workstation 1 pings the Fa0/1 interface of Router 1. Which MAC address willworkstation 1 obtain during the ARP request for this communication?00-06-5B-88-DF-C300-B0-D0-7F-F7-4600-0F-24-85-75-C000-0B-E5-64-BD-4400-08-A3-B6-CE-02*00-08-A3-B6-CE-03******************************************************************************************13 When the receiving workstation detects an error in the data it has received, it does not acknowledge receipt ofthe data.
The source workstation retransmits the unacknowledged data. Which layer of the OSI model supportsthis process of retransmission?networkapplicationsession*transport******************************************************************************************14 Which subnet masks would be valid for a subnetted Class B address? (Choose two.)255.0.0.0255.254.0.0255.224.0.0255.255.0.0*255.255.252.0*255.255.255.192******************************************************************************************15 A network user is using the FTP protocol to transfer data from the local host to an FTP server.
The local hostis also using the SNMP protocol to report the system status to the network management system. Which statementdescribes the communication from the host?FTP and SNMP will use the same port number.*FTP uses TCP to establish a session before any data is transferred.The UDP session will reorder the SNMP data as it is received by the network management system.The TCP protocol for the FTP transfer will use a random destination port number to the FTP server.******************************************************************************************16.A NIC of a computer has been assigned an IP address of 172.31.192.166 with a mask of 255.255.255.248. Towhich subnet does the IP address belong?172.31.0.0172.31.160.0172.31.192.0172.31.248.0*172.31.192.160172.31.192.248******************************************************************************************17 Which devices segment collision domains? (Choose two.)transceiver*router*switchhubmedia*****************************************************************************************18 Refer to the exhibit.
Which type of Category 5 cable is used to make an Ethernet connection between Host Aand Host B?coax cablerollover cable*crossover cablestraight-through cable******************************************************************************************19 Refer to the exhibit. In an attempt to use a uniform subnet mask, the administrator selects the mask255.255.255.240 for the exhibited networks. What is a possible problem with this addressing scheme?There will not be enough subnets to be able to address the serial links between the routers.There will too few addresses for the hosts on any of the Ethernet networks.Too many addresses will be reserved for hosts on the Ethernet networks.There will be too few addresses for the hosts on Net A and Net B.There will be too many addresses for the hosts on Net C.This question(no 19) don’t have in my final exam because its only 49 question.this 3.1 have 52 question.**********************************************************************20.















