Copy of CCENT Practice Certification Exam

9
CCENT Practice Certific ation Exam # 2 - CCNA Exploration: Accessing the WAN (Version 4.0) 1. Data is being sent from a source PC to a destination server. Which three statements correctly describe the function of TCP or UDP in this situation? (Choose three.) The UDP destination port number identifies the application or service on the server which will handle the data. TCP is the preferred protocol when a function requires lower network overhead. UDP segments are encapsulated within IP packets for transport across the network. The source port field identifies the running application or service that will handle data returning to the PC. The TCP source port number identifies the sending host on the network. The TCP process running on the PC randomly selects the destination port when establishing a session with the server. 2. In what two situations would UDP be the preferred transport protocol over TCP? (Choose two.) when applications need to guarantee that a packet arrives intact, in sequence, and unduplicated when a faster delivery mechanism is needed when delivery overhead is not an issue when applications do not need to guarantee delivery of the data when destination port numbers are dynamic 3. Refer to the exhibit. Workstation A sends an IP packet to workstation B. Which two statements describe the encapsulation of the  packet as it passes through the network? The Layer 2 header is stripped from the packet by each router. The destination Layer 2 address of the packet does not change. The source Layer 3 address of the packet changes at each router. The Layer 2 header changes at each router. The Layer 3 header is stripped from the packet by each router. 4. Refer to the exhibit. A switch with a default configuration connects four hosts. The ARP table for host A is shown. What happens when host A wants to send an IP packet to host D?

Transcript of Copy of CCENT Practice Certification Exam

8/6/2019 Copy of CCENT Practice Certification Exam

http://slidepdf.com/reader/full/copy-of-ccent-practice-certification-exam 1/9

CCENT Practice Certification Exam # 2 - CCNA Exploration: Accessing the WAN (Version 4.0)1. Data is being sent from a source PC to a destination server. Which three statements correctly describe the function of TCP or UDP

in this situation? (Choose three.)

The UDP destination port number identifies the application or service on the server which will handle the data.TCP is the preferred protocol when a function requires lower network overhead.

UDP segments are encapsulated within IP packets for transport across the network.

The source port field identifies the running application or service that will handle data returning to the PC.

The TCP source port number identifies the sending host on the network.

The TCP process running on the PC randomly selects the destination port when establishing a session with the server.2. In what two situations would UDP be the preferred transport protocol over TCP? (Choose two.)

when applications need to guarantee that a packet arrives intact, in sequence, and unduplicated

when a faster delivery mechanism is needed

when delivery overhead is not an issue

when applications do not need to guarantee delivery of the datawhen destination port numbers are dynamic

3. Refer to the exhibit. Workstation A sends an IP packet to workstation B. Which two statements describe the encapsulation of the

 packet as it passes through the network?

The Layer 2 header is stripped from the packet by each router.

The destination Layer 2 address of the packet does not change.The source Layer 3 address of the packet changes at each router.

The Layer 2 header changes at each router.

The Layer 3 header is stripped from the packet by each router.

4. Refer to the exhibit. A switch with a default configuration connects four hosts. The ARP table for host A is shown. What happens

when host A wants to send an IP packet tohost D?

8/6/2019 Copy of CCENT Practice Certification Exam

http://slidepdf.com/reader/full/copy-of-ccent-practice-certification-exam 2/9

Host A sends an ARP request to the MAC address of host D.

Host D sends an ARP request to host A.

Host A sends out the packet to the switch. The switch sends the packet only to the host D, which in turn responds.

Host A sends out a broadcast of FF:FF:FF:FF:FF:FF. Every other host connected to the switch receives the broadcast and host Dresponds with its MACaddress.

5. What three services are provided by the transport layer? (Choose three.)

flow control

encryption of data

 path determinationconnection establishment

error recovery

 bit transmission

data representation

6. Which layer of the OSI model handles the process of identifying and discarding damaged frames?

 presentation

session

transport

network 

data link 

 physical

7. Refer to the exhibit. Considering the information that follows and the exhibit, where is the data flowing?

Source IP address: 192.168.1.88

8/6/2019 Copy of CCENT Practice Certification Exam

http://slidepdf.com/reader/full/copy-of-ccent-practice-certification-exam 3/9

Destination IP address: 209.165.200.225

Source MAC address: 00-11-12-7a-41-10

Destination MAC address: 00-0d-cc-f4-ad-2c

Source Port: 1464

Destination Port: 23

A – from laptop to access point

B – from access point to attached switch

C – from host to default gateway router 

D – from router to ISP8. Refer to the exhibit. If Host 1 needs to request its IP address from the server, what protocol would be used to process that request?

8/6/2019 Copy of CCENT Practice Certification Exam

http://slidepdf.com/reader/full/copy-of-ccent-practice-certification-exam 4/9

CSMA/CDCSMA/CA

DHCP

ICMP

 NAT

8/6/2019 Copy of CCENT Practice Certification Exam

http://slidepdf.com/reader/full/copy-of-ccent-practice-certification-exam 5/9

FTP

9. Refer to the exhibit. If Host 1 were to transfer a file to the server, what layers of the TCP/IP model would be used?

8/6/2019 Copy of CCENT Practice Certification Exam

http://slidepdf.com/reader/full/copy-of-ccent-practice-certification-exam 6/9

only application and Internet layers

only Internet and network access layers

only application, Internet, and network access layers

application, transport, Internet, and network access layers

only application, transport, network, data link, and physical layersapplication, session, transport, network, data link, and physical layers

10. ABC company needs to connect its router to an ISP to access the Internet. What device is needed to connect the router to the ISP if the ISP supplies a T1 leased line for the

connection?

CSU/DSUmodem

DSL router 

 NT1 device

ISDN modem

11. Refer to the exhibit. How many collision domains exist in the exhibited network?12367 

12. What are two actions performed by a Cisco switch? (Choose two.)

 building a routing table that is based on the first IP address in the frame header 

using the source MAC addresses of frames to build and maintain a MAC address table

forwarding frames with unknown destination IP addresses to the default gatewayutilizing the MAC address table to forward frames via the destination MAC address

examining the destination MAC address to add new entries to the MAC address table

8/6/2019 Copy of CCENT Practice Certification Exam

http://slidepdf.com/reader/full/copy-of-ccent-practice-certification-exam 7/9

13. A network administrator wants to configure a Cisco 2960 switch so that access to each switch port is limited to one MAC address.

What will accomplish the administrator’s

objective?

Cisco Discovery Protocol

 port security

Internet Control Message Protocol

access lists

flow control

14. When would you want to use the switchport port-security mac-address sticky command?

whenever you need to protect an unused switch port

whenever you want the port to only allow a single host device to connect

whenever you need the port to recognize the statically assigned MAC address in the MAC address table

whenever multiple devices share the same port

15. Refer to the exhibit. SW_1 and SW_2 have been configured with VLAN10 and VLAN20. The two switches are connected by a

trunking link. During testing, workstations onthe same VLAN can ping each other, but workstations on the opposite VLAN cannot ping each other. What needs to be done to fix the

 problem?

Configure VTP on both switches so they can share VLAN information.

Assign a management VLAN on each switch with IP addresses in the same subnet.

Configure an access port on each switch.

8/6/2019 Copy of CCENT Practice Certification Exam

http://slidepdf.com/reader/full/copy-of-ccent-practice-certification-exam 8/9

Add a Layer 3 device to the network.

16. When configuring a switch to use SSH for virtual terminal connections, what is the purpose of the crypto key generate rsa command?

show SSH connected hosts

disconnect SSH connected hosts

create a public and private key pair 

show active SSH ports on the switchaccess the SSH database configuration

17. Which three statements are true about full-duplex operation on an Ethernet network? (Choose three.)

There are no collisions in full-duplex mode.

A dedicated switch port is required for each node.

Hub ports are preconfigured for full-duplex mode.The host network card must detect the availability of the media before transmitting.

The host network card and the switch port must both be in full-duplex mode.

18. What are three characteristics of CSMA/CD? (Choose three.)

Devices can be configured with a higher transmission priority.

A jam signal indicates that the collision has cleared and the media is not busy.

A device listens and waits until the media is not busy before transmitting.

The device with the electronic token is the only one that can transmit after a collision.All of the devices on a segment see data that passes on the network medium.

After detecting a collision, hosts can attempt to resume transmission after a random time delay has expired.

19.

20. Which three addresses are valid public addresses? (Choose three.)

198.133.219.17192.168.1.245

10.15.250.5

128.107.12.117

192.15.301.240

64.104.78.22721. Refer to the exhibit. Four hosts are being added to the 172.16.112.0 network. Which IP address isinvalid as a host address for this

network?

172.16.113.55

8/6/2019 Copy of CCENT Practice Certification Exam

http://slidepdf.com/reader/full/copy-of-ccent-practice-certification-exam 9/9

172.16.112.255

172.16.127.255172.16.112.89

172.16.120.96

22. Refer to the exhibit. Using PAT, RouterA is configured to translate all private inside addresses to a single public address. The

network administrator wants to determine

which port number is being used in the translation of the ComputerA inside private IP address. Which command could be used if the

administrator sits at ComputerA but is not

allowed remote access to RouterA?

ipconfig /all

traceroutenetstat

tracert

23. What type of address is 172.16.134.64 with the subnet mask 255.255.255.224?

This is a usable host address.

This is a broadcast address.

This is a network address.This is an Internet-routable address.

24. The router reads each bit to determine the class of an address. Which three series of binary numbers would the router identify

aspublic Class C addresses? (Choose

three.)10101100.00100000.00010001.00010111

11000110.10000101.11011011.01010111

11010001.10100101.11001000.11101101

11000000.10101000.00100000.01000000