Cisco CCNA 3.1 Semester 4 – Skills Review Exam – Oktober 2006 1. A network administrator needs to address a network with 2 WAN links and 5 Ethernet links on a router. What is the most efficient way for the network administrator to address this network while wasting the fewest number of host addresses? VLSM 2. Which subnet mask matches the 172.18.20.100/19 IP address? 255.255.224.0 3. Refer to the exhibit. Which two IP addresses can a network administrator legitimately choose from to assign to the host on the subnet connected to the FastEthernet 0/0 interface of the router? (Choose two.) 172.16.10.122 172.16.10.125 4. Which addresses are considered network addresses of 200.199.48.0/29 when subnet zero is in effect? (Choose three.) 200.199.48.0 200.199.48.16 200.199.48.200 5. A client is communicating with a server on a different segment of the network. How does the server determine what service is being requested by the client? The server will determine the appropriate service from the destination port field. 6. There are a large number of networking protocols that exist at various layers of the OSI model. What is a protocol? a set of rules and conventions 7. Refer to the exhibit. If router JAX routes between VLANs including VLAN1, how many broadcast domains are present in the topology? 4 8. Which statements describe nondeterministic MAC protocols? (Choose two.) Hosts transmit using a first-come, first-served approach. NICs listen for the absence of a signal before transmitting. 9. A network technician is teaching a trainee to configure a router. The technician begins by explaining the different modes available during configuration. What router mode allows a limited set of monitoring commands that can be used to obtain but not alter basic configuration information? user mode 10. Refer to the exhibit. Which group of commands will configure the network with static routes? RTR-1(config)# ip route 192.168.20.0 255.255.255.0 198.65.14.2 RTR-2(config)# ip route 192.168.10.0 255.255.255.0 198.65.14.1 11. Refer to the exhibit. Which configuration commands must be made on the Sydney router to configure it for connectivity with the Melbourne site? (Choose three.) Sydney(config-if)# ip address 192.168.15.6 255.255.255.252 Sydney(config-if)# clock rate 56000 Sydney(config-if)# no shutdown 12. A technician is recovering the password on a router. The technician has entered ROMMON mode, changed the configuration register to 0x2142, and reset the router. The technician enters configuration mode on the router, changes the password, and enters the copy running-config startup-config command. After changing the configuration register to 0x2102, the technician reloads the router. When the router reloads, the technician finds that only the password is in the configuration. What could be the problem? The technician did not copy the startup configuration to the running configuration before changing the password. 13. A technician is asked to configure a privileged EXEC password that uses a strong MD5 algorithm for encryption. What command or commands should the technician use to configure the password? Router(config)# enable secret cisco 14. Which three statements describe the routing process? (Choose three.) A router must use information learned from other routers to reach remote routers. When static routing is used, the network administrator must configure the information about remote routers manually. A router makes forwarding decisions based upon the destination IP address of a packet. 15. Which statements describe the routing table? (Choose two.) The gateway of last resort must be configured to direct unknown traffic requests. Routers base packet forwarding decisions on information in the routing table. 16. A network administrator needs to select the appropriate routing protocol for a network. What information should the administrator obtain to select the appropriate routing protocol? (Choose three.) the size of the network bandwidth available on the links processing power of the routers 17. Which feature of distance vector routing protocols prevents a router from sending information learned about a route back to the router it received the information from? split-horizon 18. Which command or commands will correctly configure the bandwidth for OSPF cost calculation? Router(config)# interface s0/0 Router(config-if)# bandwidth 64000 19. As a packet is being moved across a routed network from host A to host B it must pass across a series of routers. What is true of the Layer 2 and Layer 3 addresses in the packet header as it moves from router to router? The Layer 2 destination address will be the Layer 2 address of the next hop router. 20. A technician is troubleshooting a loss of connectivity and suspects that an incorrectly configured ACL is the cause. Which commands can the technician use to verify that the ACL is incorrectly configured? (Choose two.) show running-config show access-lists 21. An administrator has been asked to explain ACLs to a trainee. What are some of the suggested uses for ACLs that the trainee should learn? (Choose three.) limit network traffic and increase performance provide traffic flow control provide a basic level of security for network access 22. A network administrator is writing a standard ACL that will deny any traffic from the 172.16.0.0/16 network, but permit all other traffic. Which of commands should be used? (Choose two.) Router(config)# access-list 95 deny 172.16.0.0 0.0.255.255 Router(config)# access-list 95 permit any 23. Once an ACL has been created, it must be applied in the proper location to have the desired effect. What rules should be observed when applying ACLs? (Choose two.) Outbound filters do not affect traffic that originates within the local router. Extended ACLs should be applied closest to the source. 24. A technician is testing connectivity between two hosts. What command can be used to test application layer connectivity between the two hosts? telnet 25. In the process of training a new technician, the network administrator begins by teaching the trainee about Layer 1 problems that can interrupt network connectivity. Which three issues represent Layer 1 problems? (Choose three.) device turned off broken cable incorrectly wired cable 26. Refer to the exhibit. What command would produce this output? debug ip icmp 27. The process of troubleshooting a network problem is accomplished by sequentially testing the OSI layers from the bottom upward. If the network cables and all connections have already been checked and the error still exists, what should be checked next? interface encapsulation and clockrate 28. What two pieces of information can be obtained from the show ip route command? (Choose two.) the IP address of the gateway of last resort the routing protocols that are enabled 29. What is the purpose of the show cdp neighbors detail command? (Choose two.) It displays information about a specific neighbor. It displays information about networks that are directly connected to the router. 30. Refer to the exhibit. A network administrator is troubleshooting a routing issue on RTR-2. RTR-1 is connected to RTR-2 via serial 0/0 but all routes to RTR-1 are sent via RTR-3. Based on the output from the show ip protocols command on RTR-1, what could be the problem? EIGRP has been configured with the passive-interface command on the serial 0/0 interface. 31. An administrator is teaching a new technician about Layer 2 problems that can interrupt network connectivity. Which three problems are Layer 2 problems? (Choose three.) improper encapsulation set NIC problems improper clockrate settings 32. What layer of the OSI model is being used when a technician is using the command ping to test connectivity between two hosts on different segments of a network? Network 33. A help desk technician is working with a customer to determine why a router does not use the configuration file stored in NVRAM when it boots. The technician suspects that the configuration register has been changed. What command should the technician tell the customer to use to determine the router register setting? show version www.Cisco-Antworten.tk