1. Refer to the exhibit. The exhibit shows simplified protocol data units from different OSI model layers. Which three statements are true about the PDUs and the encapsulation process? (Choose three.)
2. Which three application layer protocols use TCP? (Choose three.)
3. Which two application layer protocols use the UDP protocol? (Choose two.)
4. What are two functions that occur at the Internet layer of the TCP/IP model? (Choose two.)
5. Refer to the exhibit. All ports on switch A are in the sales VLAN and all ports on switch B are in the accounting VLAN. How many broadcast domains and how many collision domains exist in the exhibited network? (Choose two.)
6. A high-end Catalyst switch that supports both ISL and 802.1Q is to be connected by a link that will carry all VLAN traffic to a Catalyst 2960 LAN switch. What two commands are required to configure an interface on the high-end Catalyst switch to carry traffic from all VLANs to the Catalyst 2960 switch? (Choose two.)
7. Refer to the exhibit. Based on the exhibited configuration and output, what would be the result of this command:
Sw1# telnet 192.168.1.10
8. Refer to the partial device configuration that is exhibited. For which network topology is the configuration appropriate?
RtrA(config)# interface fastethernet 0/0
RtrA(config-if)# no shutdown
RtrA(config-if)# interface fastethernet 0/0.18
RtrA(config-subif)# encapsulation dot1q 18
RtrA(config-subif)# ip address 10.1.18.1 255.255.255.0
RtrA(config-subif)# interface fastethernet 0/0.44
RtrA(config-subif)# encapsulation dot1q 44
RtrA(config-subif)# ip address 10.1.44.1 255.255.255.0
RtrA(config-subif)# interface fastethernet 0/0.22
RtrA(config-subif)# encapsulation dot1q 22
RtrA(config-subif)# ip address 10.1.22.1 255.255.255.0
9. Refer to the exhibit and the following error message from the SwA switch.
00:22:43: %SPANTREE-7-RECV_1Q_NON_TRUNK: Received 802.1Q BPDU on non trunk FastEthernet0/1 VLAN1.
00:22:43: %SPANTREE-7-BLOCK_PORT_TYPE: Blocking FastEthernet0/1 on VLAN0001. Inconsistent port type.
Considering that the link between the two switches is good and the correct type, what could cause this error message?
10. A network administrator is configuring a switch when an error message appears. The configuration commands and error message appear as follows:
Switch(config)# interface fastethernet 0/1
Switch(config-if)# switchport mode trunk
Command rejected: An interface whose trunk encapsulation is "Auto" can not be configured to "trunk" mode.
What is the problem?
11. Of the protocols that are listed, which one needs to be functioning on a link in order for VTP to operate?
12. Refer to the exhibit. RT_1 is configured correctly with IP addresses and passwords but none of the computers can ping or telnet to RT_1. Which series of commands would correct the problem?
13. Refer to the exhibit. Which commands are needed to complete the switch configuration so that SSH can be used to telnet from host A to SW_1? (Choose two.)
14. What three factors contribute to congestion on an Ethernet LAN? (Choose three.)
15. Refer to the exhibit. What protocol should be configured on SW-A Port 0/1 if it is to send traffic from multiple VLANs to switch SW-B?
16. Which three STP states were replaced with the RSTP discarding state? (Choose three.)
17. Refer to the exhibit. What is the role of the SW3 switch?
18. Refer to the exhibit. A switch can be configured for three different forwarding modes based on how much of a frame is received before the forwarding process begins. Each of the numbered arrows in the accompanying graphic signifies the point in a frame where a particular forwarding mode will begin. Which group of labels reflects the sequence of forwarding modes signified by the numbered arrows?
19. What eliminates switching loops?
20.
21. Refer to the exhibit. Using the most efficient IP addressing scheme and VLSM, which address can be configured on one of the serial interfaces?
22. Consider this router output:
Router# confug
Translating "confug"...domain server (255.255.255.255)
Translating "confug"...domain server (255.255.255.255)
(255.255.255.255)% Unknown command or computer name, or unable to find computer address
What command could help with this situation?
23. Refer to the exhibit. With VLSM, which bit mask should be used to most efficiently provide for the number of host addresses that are required on router B?
24. What are the three ranges of IP addresses that are reserved for internal private use? (Choose three.)
25. Refer to the exhibit. The network administrator is unable to access the TFTP server attached to the Memphis router. What are two causes of this problem? (Choose two.)
26. The ISP of the XYZ Company is moving to IPv6 but XYZ wants to continue to use only IPv4 for another year. Which IPv4-to-IPv6 transition method would allow the company to continue using only IPv4 addresses?
27. Given the IP address and subnet mask of 172.16.134.56 255.255.255.224, on which subnetwork does this address reside?
28. What is associated with link-state routing protocols?
29. Refer to the exhibit. Which sequence of commands should be used to configure router A for OSPF?
30. What is one reason to use the ip ospf priority command when the OSPF routing protocol is in use?
31. The output of the show ip interface brief command indicates that Serial0 is up but the line protocol is down. What are two possible causes for the line protocol being in the down state? (Choose two.)
32. Which router command will verify that the router has a path to a destination network?
33. Refer to the exhibit. When troubleshooting a network, it is important to interpret the output of various router commands. On the basis of the exhibit, which three statements are true? (Choose three.)
34. Refer to the exhibit. From the command prompt on the host, the command telnet 192.168.1.10 is typed. The response that is given is this:
Trying 192.168.1.10….Open
Password required, but none set
What is the most likely problem?
35. Refer to the exhibit. If router B is to be configured for EIGRP AS 100, which configuration must be entered?
36. After several configuration changes are made to a router, the copy running-configuration startup-configuration command is issued. Where will the changes be stored?
37. Refer to the exhibit. Two routers have been configured to use EIGRP. Packets are not being forwarded between the two routers. What could be the problem?
38. What are two features of a link-state routing protocol? (Choose two.)
39. Refer to the exhibit. Routers A and B have EIGRP configured and automatic summarization has been disabled on both routers. Which router command is used to summarize the attached routes, and to which interface is this command applied? (Choose two.)
40. A router has learned about network 192.168.168.0 through static and dynamic routing processes. Which route will appear in the routing table for this network if the router has learned multiple routes?
41. Which sequence of commands is used to configure a loopback address on a router?
42.
43. Which encryption standard would most likely be used in an 802.11 standards-based wireless network environment?
44.
45.
46. Which two commands can be used to verify the content and placement of access control lists? (Choose two.)
47. Which two keywords can be used in an access control list to replace a wildcard mask or address and wildcard mask pair? (Choose two.)
48. Refer to the exhibit. NAT with overload is configured on router R1 and uses the NAT pool of addresses 209.165.201.9 through 209.165.201.10. What type of route would the ISP need in order for communication to occur between hosts in Company ABC and the Internet?
49. What is the effect of the access control list wildcard mask 0.0.0.15? (Choose two.)
50. Which three values or sets of values are included when creating an extended access control list statement? (Choose three.)
51. Refer to the exhibit. Which statement describes the status of the PPP connection?
52. Which three statements are true regarding the Frame Relay LMI? (Choose three.)
53. A network administrator is evaluating authentication protocols for a PPP link. Which three factors might lead to the selection of CHAP over PAP as the authentication protocol? (Choose three.)
54. Which three statements are true about PPP? (Choose three.)