Cloned from: CCNA1



keywords:
Bookmark and Share



Front Back
A user enters http://www.cisco.com/web1.htm in the address line of a browser. Which statement is true about this transaction?
-The "http" portion indicates the protocol that is being used.
-The "web1.htm" portion is the specific service name
-The retrieved web page will be displayed in URL code.
-The "www.cisco.com" is the name of the web page file that is called.
The "http" portion indicates the protocol that is being used.
Which statement identifies the DNS protocol?
-It transmits information using TCP port 25.
-It transfers and conveys information using HTML pages
-It matches a resource name with the required network address
-It requests and assigns an IP address, default gateway, and server addresses to hosts
It matches a resource name with the required network address.
Which statement is true about Layer 3 addresses?
-They are physical addresses
-They are used in routing decisions
-They are only used on local networks.
-They are altered each time a packet crosses a router
They are used in routing decisions
Which OSI layer uses a connection-oriented protocol to ensure reliable delivery of data?
-application layer
-presentation layer
-session layer
-transport layer
transport layer
Which OSI layer manages data segments?
-application layer
-presentation layer
-session layer
-transport layer
transport layer
Which information is used by the router to determine the path between the source and destination hosts?
-the host portion of the IP address
-the network portion of the IP address
-host default gateway address
-the MAC address
the network portion of the IP address
What are two functions of the Ethernet data link layer protocol? (Choose two.)
-to determine best path selection
-to encapsulate traffic into frames
-to acknowledge received segments
-to uniquely identify network interfaces
-to identify sessions via the use of individual port numbers
to encapsulate traffic into frames

to uniquely identify network interfaces
What are three characteristics of CSMA/CD? (Choose three.)
-It monitors the media for presence of a data signal.
-After detecting a collision, hosts can resume transmission after a random timer has expired
-A jam signal is used to ensure that all hosts are aware that a collision has occurred.
-Devices can be configured with a higher transmission priority
-Data is transmitted only when the data signal is present.
-It uses a token system to avoid collisions
It monitors the media for presence of a data signal.

After detecting a collision, hosts can resume transmission after a random timer has expired

A jam signal is used to ensure that all hosts are aware that a collision has occurred.
What is the correct destination socket number for a web page request from Host A to the web server?
-00-08-a3-b6-ce-46
-98.133.219.25:80
-http://www.cisco.com
-C 198.133.219.0/24 is directly connected, FastEthernet0/0
98.133.219.25:80
Which two actions could be taken by a router if a specific match is not made to a route in the routing table? (Choose two.)
-The packet will be discarded.
-The packet will be sent back to the source
-The packet will be flooded out all interfaces.
-Neighboring routers are polled to find the best path.
-The packet will be forwarded to a default route if one is present.
The packet will be discarded

The packet will be forwarded to a default route if one is present.
Which two factors contribute to the increased throughput when all nodes of a LAN are connected to a switch instead of a hub? (Choose two.)
-full-duplex operation
-collision-free environment
-logical bus media access
-roadcast-free environment
-point-to-multipoint topology
full-duplex operation

collision-free environment
Which requirement would cause a network designer to use a router instead of a switch in a network design?
-creating smaller collision domains
-providing both UTP and fiber ports
-connecting end-user devices to the network core
-interconnecting several networks using different technologies
interconnecting several networks using different technologies
As network administrator, what is the subnet mask that allows 510 hosts given the IP address 172.30.0.0?
-255.255.0.0
-255.255.248.0
-255.255.252.0
-255.255.254.0
-255.255.255.0
-255.255.255.128
255.255.254.0
Which three IPv4 addresses represent a broadcast for a subnet?
-172.16.4.63 /26
-172.16.4.129 /26
-172.16.4.191 /26
-172.16.4.51 /27
-172.16.4.95 /27
-172.16.4.221 /27
172.16.4.63 /26

172.16.4.191 /26

172.16.4.95 /27
A network technician creates equal-sized subnets of network 192.168.2.0/24 using the subnet mask 255.255.255.224. If the technician wishes to calculate the number of host addresses in each subnet by using the formula 2n-2. what value will be used for n?
-1
-2
-3
-4
-5
5
Which three addresses belong to the category of private IP addresses?
-10.0.0.1
-127.0.0.1
-150.0.0.1
-172.16.0.1
-192.168.0.1
-200.100.50.1
10.0.0.1

172.16.0.1

192.168.0.1
x of y cards