Thứ Ba, 28 tháng 4, 2009

CCNA 2 - Module 1

download

download

CCNA 2 - Module 1

If a router cannot find a valid configuration file during the startup sequence, what will occur?
The router will prompt the user for a response to enter setup mode.


Refer to the exhibit. The network administrator has configured the router with the interface IP addresses shown for the directly connected networks. Pings from the router to hosts on the connected networks or pings between router interfaces are not working. What is the most likely problem?
The interfaces must be enabled with the no shutdown command.


Refer to the exhibit. What can be concluded from the routing table output in the exhibit? (Choose two.)
The FastEthernet0/0 and Serial0/0/0 interfaces of this router were configured with an IP address and the no shutdown command.
An IP packet received by this router with a destination address of 198.18.9.1 will be forwarded out of the Serial0/0/0 interface.


Refer to the exhibit. The frame shown in the exhibit was received by the router. The router interfaces are operational. How will the router process this frame? (Choose two.)
The router will change the frame type to one supported by the WAN link before forwarding the frame.
The frame was received on the Fa0/0 interface of the router and will be switched to the S0/0/0 interface.


Passwords can be used to restrict access to all or parts of the Cisco IOS. Select the modes and interfaces that can be protected with passwords. (Choose three.)
VTY interface
console interface
privileged EXEC mode


Which two statements correctly describe the components of a router? (Choose two.)
ROM contains diagnostics executed on hardware modules.
Flash memory does not lose its contents during a reboot.

Refer to the exhibit. After host 2 is connected to the switch on the LAN, host 2 is unable to communicate with host 1. What is the cause of this problem?
The subnet mask of host 2 is incorrect.
Host 1 and host 2 are on different networks.
The switch needs an IP address that is not configured.
The router LAN interface and host 1 are on different networks.
The IP address of host 1 is on a different network than is the LAN interface of the router.


Which are functions of a router? (Choose three.)
packet switching
segmentation of broadcast domains
selection of best path based on logical addressing


Refer to the exhibit. All routers have a route in its routing table to each network that is shown in the exhibit. Default routes have not been issued on these routers. What can be concluded about how packets are forwarded in this network? (Choose two.)
If RouterA receives a packet that is destined for 192.168.3.146, it will be forwarded out interface S0/0/1.
If RouterB receives a packet that is destined for 10.5.27.15, it will be forwarded out interface S0/0/1.


The serial connection shown in the graphic needs to be configured. Which configuration commands must be made on the Sydney router to establish connectivity with the Melbourne site? (Choose three.)
Sydney(config-if)# ip address 201.100.53.2 255.255.255.0
Sydney(config-if)# no shutdown

Sydney(config-if)# clock rate 56000


Refer to the exhibit. What can be concluded from the output of the running-configuration of a router?
The commands that are displayed determine the current operation of the router.


Refer to the exhibit. Host A pings host B. When R4 accepts the ping into the Ethernet interface, what two pieces of header information are included? (Choose two.)
destination IP address: 192.168.10.134
destination MAC address: 9999.DADC.1234


What is the outcome of entering these commands?
R1(config)# line vty 0 4
R1(config-line)# password check123
R1(config-line)# login
sets the password to be used for connecting to this router via Telnet


Which of the following is the correct flow of routines for a router startup?
load bootstrap, load IOS, apply configuration


What three processes does a router execute when it receives a packet from one network that is destined for another network? (Choose three.)
decapsulates the Layer 3 packet by stripping off the Layer 2 frame header
uses the destination IP Address in the IP header to look up the next-hop address in the routing table
encapsulates the Layer 3 packet into the new Layer 2 frame and forwards it out the exit interface


The network administrator needs to connect two routers directly via their FastEthernet ports. What cable should the network administrator use?
cross-over
Which two statements describe characteristics of load balancing? (Choose two.)
Load balancing allows a router to forward packets over multiple paths to the same destination network.
Unequal cost load balancing is supported by EIGRP.


What information about the router and its startup process can be gathered from the output of the show version command? (Choose three.)
the last restart method
the configuration register settings
the location from where the IOS loaded


Which interfaces in the exhibit could be used for a leased line WAN connection? (Choose two.)
1
4


From what location can a router load the Cisco IOS during the boot process? (Choose two.)
TFTP server
Flash memory


A network administrator has just entered new configurations into Router1. Which command should be executed to save configuration changes to NVRAM?
Router1# copy running-config startup-config


What is the default sequence for loading the configuration file?
NVRAM, TFTP, CONSOLE

What header address information does a router change in the information it receives from an attached Ethernet interface before information is transmitted out another interface?
the Layer 2 source and destination address
Read More

CCNA 2 - Module 2

download

download


CCNA 2 - Module 2

Which of the following are displayed by the Router# show cdp neighbors command? (Choose three.)
platform
holdtime
local interface


Why is it advisable to enter a next-hop IP address when creating a static route whose exit interface is an Ethernet network?
In a multi-access network, the router cannot determine the next-hop MAC address for the Ethernet frame without a next-hop address.


The output of the Router# show interfaces serial 0/1 command displays the following:
Serial0/1 is up, line protocol is down.
What is the most likely cause for the line protocol being down?
No clock rate has been set.


A static route that points to the next hop IP will have what administrative distance and metric in the routing table?
administrative distance of 1 and metric of 0


Refer to the exhibit. What two commands will change the next-hop address for the 10.0.0.0/8 network from 172.16.40.2 to 192.168.1.2? (Choose two.)
A(config)# no ip route 10.0.0.0 255.0.0.0 172.16.40.2
A(config)# ip route 10.0.0.0 255.0.0.0 192.168.1.2


Refer to the exhibit. A company network engineer is assigned to establish connectivity between the two Ethernet networks so that hosts on the 10.1.1.0/24 subnet can contact hosts on the 10.1.2.0/24 subnet. The engineer has been told to use only static routing for these company routers. Which set of commands will establish connectivity between the two Ethernet networks?
R1(config)# ip route 10.1.1.0 255.255.255.0 192.168.0.2R2(config)# ip route 10.1.2.0 255.255.255.0 192.168.0.1


Refer to the exhibit. Which static route should be configured on Router1 so that host A will be able to reach host B on the 172.16.0.0 network?
ip route 172.16.0.0 255.255.0.0 S0/0/0


What address can be used to summarize networks 172.16.1.0/24, 172.16.2.0/24, 172.16.3.0/24, and 172.16.4.0/24?
172.16.0.0/21


Refer to the exhibit. What is the significance of the /8 in the route to the 10.0.0.0 network?
It indicates the number of consecutive bits, from the left, in the destination IP address of a packet that must match 10.0.0.0 to use that route.


What two devices are responsible for converting the data from the WAN service provider into a form acceptable by the router? (Choose two).
a modem
a CSU/DSU device


A network administrator enters the following command into Router1: ip route 192.168.0.0 255.255.255.0 S0/1/0. Router1 then receives a packet that is destined for 192.168.0.22/24. After finding the recently configured static route in the routing table, what does Router1 do next to process the packet?
encapsulates the packet into a frame for the WAN link and forwards the packet out the S0/1/0 interface


Which piece of information is available from examining the output of the command show ip interface brief?
Interface IP address


Which of the following is true regarding CDP and the graphic shown?
By default, Router A will receive CDP advertisements from routers B and C.


Which two statements describe functions or characteristics of CDP? (Choose two.)
It starts up automatically and allows the device to detect directly connected neighbor devices that use CDP.
It allows systems to learn about each other even if different network layer protocols are configured.


Hosts on two separate subnets cannot communicate. The network administrator suspects a missing route in one of the routing tables. Which three commands can be used to help troubleshoot Layer 3 connectivity issues? (Choose three.)
ping
traceroute
show ip route


What happens to a static route entry in a routing table when the outgoing interface is not available?
The route is removed from the table.


The routers in the diagram use the subnet assignments shown. What is the most efficient route summary that can be configured on Router3 to advertise the internal networks to the cloud?
192.1.1.0/25


Refer to the exhibit. How will packets destined to the 172.16.0.0 network be forwarded?
Router1 will perform recursive lookup and packet will exit S0/0.


A router has one static route to each destination network. Which two scenarios would require an administrator to alter the static routes that are configured on that router? (Choose two.)
The destination network no longer exists.
A topology change occurs where the existing next-hop address or exit interface is not accessible.


Refer to the exhibit. Given the output in the exhibit, how would a clock rate be determined for this link?
The rate configured on the DCE determines the clock rate.


Refer to the exhibit. Which set of commands will configure static routes that will allow the WinterPark and the Altamonte routers to deliver packets from each LAN and direct all other traffic to the Internet?
WinterPark(config)# ip route 0.0.0.0 0.0.0.0 192.168.146.1Altamonte(config)# ip route 10.0.234.0 255.255.255.0 192.168.146.2Altamonte(config)# ip route 0.0.0.0 0.0.0.0 s0/1


Refer to the exhibit. What two commands are required to provide connectivity between the 192.168.1.0 and 10.0.0.0 networks without requiring recursive lookup? (Choose two.)
A(config)# ip route 10.0.0.0 255.0.0.0 s 0/1/0
B(config)# ip route 192.168.1.0 255.255.255.0 s 0/0/0
Read More

Thứ Hai, 27 tháng 4, 2009

CCNA 1 - Module 8

(Updated jan 12 2009 - 100/100)

CCNA 1 - Module 8

download update 27/12/08 100/100

1. Which OSI layer is responsible for binary transmission, cable specification, and physical aspects of network communication?
• Presentation
• Transport
• Data Link
• Physical


2. An installed fiber run can be checked for faults, integrity, and the performance of the media by using what device?
• light injector
• OTDR
• TDR
• multimeter

www.ccna4u.net
www.ccna4u.info

3. Which characteristics describe fiber optic cable? (Choose two.)
• It is not affected by EMI or RFI.
• Each pair of cables is wrapped in metallic foil.
• It combines the technique of cancellation, shielding and twisting to protect data.
• It has a maximum speed of 100 Mbps.
• It is the most expensive type of LAN cabling.

4. When is a straight-through cable used in a network?
• when connecting a router through the console port
• when connecting one switch to another switch
• when connecting a host to a switch
• when connecting a router to another router

5. Refer to the exhibit. Which type of Category 5 cable is used to make an Ethernet connection between Host A and Host B?
• coax cable
• rollover cable
• crossover cable
• straight-through cable

6. Which method of signal transmission uses radio waves to carry signals?
• electrical
• optical
• wireless
• acoustic

welcome to

www.ccna4u.net
www.ccna4u.info

7. In most business LANs, which connector is used with twisted-pair networking cable?
• BNC
• RJ-11
• RJ-45
• Type F

8. Which of the following is a characteristic of single-mode fiber-optic cable?
• generally uses LEDs as the light source
• relatively larger core with multiple light paths
• less expensive than multimode
• generally uses lasers as the light source


9. Which type of cable run is most often associated with fiber-optic cable?
• backbone cable
• horizontal cable
• patch cable
• work area cable

10. What are three measures of data transfer? (Choose three.)
• goodput
• frequency
• amplitude
• throughput
• crosstalk
• bandwidth


11. With the use of unshielded twisted-pair copper wire in a network, what causes crosstalk within the cable pairs?
• the magnetic field around the adjacent pairs of wire
• the use of braided wire to shield the adjacent wire pairs
• the reflection of the electrical wave back from the far end of the cable
• the collision caused by two nodes trying to use the media simultaneously

12. What is a primary role of the Physical layer in transmitting data on the network?
• create the signals that represent the bits in each frame on to the media
• provide physical addressing to the devices
• determine the path packets take through the network
• control data access to the media

13. In LAN installations where potential electrical hazards or electromagnetic interference may be present, what type of media is recommended for backbone cabling?
• coax
• fiber
• Cat5e UTP
• Cat6 UTP
• STP

14. What is a possible effect of improperly applying a connector to a network cable?
• Data will be forwarded to the wrong node.
• Data transmitted through that cable may experience signal loss.
• An improper signaling method will be implemented for data transmitted on that cable.
• The encoding method for data sent on that cable will change to compensate for the improper connection.


www.ccna4u.net
www.ccna4u.info

15. Which fiber connector supports full duplex Ethernet?
• Options three is right answer (
kolmas)

16. What is considered a benefit of wireless as a media choice?
• more host mobility
• lower security risks
• reduced susceptibility to interference
• less impact of the surroundings on the effective coverage area
17. What characteristic of UTP cable helps reduce the effects of interference?
• the metal braiding in the shielding
• the reflective cladding around core
• the twisting of the wires in the cable
• the insulating material in the outer jacket
Read More

CCNA 1 - Module 9

(Updated jan 12 2009 - 100/100)

CCNA 1 - Module 9

www.ccna4u.net
www.ccna4u.info

1. In the graphic, Host A has reached 50% completion in sending a 1 KB Ethernet frame to Host D when Host B wishes to transmit its own frame to Host C. What must Host B do?
• Host B can transmit immediately since it is connected on its own cable segment.
• Host B must wait to receive a CSMA transmission from the hub, to signal its turn.
• Host B must send a request signal to Host A by transmitting an interframe gap.
• Host B must wait until it is certain that Host A has completed sending its frame.

2. Ethernet operates at which layers of the OSI model? (Choose two.)
• Network layer
• Transport layer
• Physical layer
• Application layer
• Session layer
• Data-link layer


3. Which of the following describe interframe spacing? (Choose two.)
• the minimum interval, measured in bit-times, that any station must wait before sending another frame.
• the maximum interval, measured in bit-times, that any station must wait before sending another frame.
• the 96-bit payload padding inserted into a frame to achieve a legal frame size
• the 96-bit frame padding transmitted between frames to achieve proper synchronization
• the time allowed for slow stations to process a frame and prepare for the next frame.
• the maximum interval within which a station must send another frame to avoid being considered unreachable

4. What three primary functions does data link layer encapsulation provide? (Choose three.)
• addressing
• error detection
• frame delimiting
• port identification
• path determination
• IP address resolution

www.ccna4u.net
www.ccna4u.info

5. When a collision occurs in a network using CSMA/CD, how do hosts with data to transmit respond after the backoff period has expired?
• The hosts return to a listen-before-transmit mode. <—
• The hosts creating the collision have priority to send data.
• The hosts creating the collision retransmit the last 16 frames.
• The hosts extend their delay period to allow for rapid transmission.

6. What are three functions of the upper data link sublayer in the OSI model? (Choose three.)
• recognizes streams of bits
• identifies the network layer protocol.
• makes the connection with the upper layers.
• identifies the source and destination applications
• insulates network layer protocols from changes in physical equipment.
• determines the source of a transmission when multiple devices are transmitting

welcome to

www.ccna4u.net
www.ccna4u.info

7. What does the IEEE 802.2 standard represent in Ethernet technologies?
• MAC sublayer
• Physical layer
• Logical Link Control sublayer
• Network layer

8. Why do hosts on an Ethernet segment that experience a collision use a random delay before attempting to transmit a frame?
• A random delay is used to ensure a collision-free link.
• A random delay value for each device is assigned by the manufacturer.
• A standard delay value could not be agreed upon among networking device vendors.
• A random delay helps prevent the stations from experiencing another collision during the transmission.
9. Refer to the exhibit. Which option correctly matches the frame field type with the contents that frame field includes?
• header field - preamble and stop frame
• data field - network layer packet
• data field - physical addressing
• trailer field - FCS and SoF

10. Host A has an IP address of 172.16.225.93 and a mask of 255.255.248.0. Host A needs to communicate with a new host whose IP is 172.16.231.78. Host A performs the ANDing operation on the destination address. What two things will occur? (Choose two.)
• Host A will change the destination IP to the IP of the nearest router and forward the packet.
• Host A will broadcast an ARP request for the MAC of its default gateway.
• A result of 172.16.225.0 will be obtained.
• Host A will broadcast an ARP request for the MAC of the destination host.
• A result of 172.16.224.0 will be obtained.
• A result of 172.16.225.255 will be obtained.

11 Which of the following is a drawback of the CSMA/CD access method?
• Collisions can decrease network performance.
• It is more complex than non-deterministic protocols.
• Deterministic media access protocols slow network performance.
• CSMA/CD LAN technologies are only available at slower speeds than other LAN technologies.

12. Ethernet operates at which layer of the TCP/IP network model?
• application
• physical
• transport
• internet
• data link
• network access

13. What is the primary purpose of ARP?
• translate URLs to IP addresses
• resolve IPv4 addresses to MAC addresses
• provide dynamic IP configuration to network devices
• convert internal private addresses to external public addresses

14. Refer to the exhibit. The switch and workstation are administratively configured for full-duplex operation. Which statement accurately reflects the operation of this link?
• No collisions will occur on this link.
• Only one of the devices can transmit at a time.
• The switch will have priority for transmitting data.
• The devices will default back to half duplex if excessive collisions occur.


15. Refer to the exhibit. Host_A is attempting to contact Server_B. Which statements correctly describe the addressing Host_A will generate in the process? (Choose two.)
• A packet with the destination IP of Router_B.
• A frame with the destination MAC address of Switch_A.
• A packet with the destination IP of Router_A.
• A frame with the destination MAC address of Router_A.
• A packet with the destination IP of Server_B.
• A frame with the destination MAC address of Server_B.

16 Which statements correctly describe MAC addresses? (Choose three.)
• dynamically assigned
• copied into RAM during system startup
• layer 3 address
• contains a 3 byte OUI
• 6 bytes long
• 32 bits long

17. Which two features make switches preferable to hubs in Ethernet-based networks? (Choose two.)
• reduction in cross-talk
• minimizing of collisions
• support for UTP cabling
• division into broadcast domains
• increase in the throughput of communications

18. What are the two most commonly used media types in Ethernet networks today? (Choose two.)
• coaxial thicknet
• copper UTP
• coaxial thinnet
• optical fiber
• shielded twisted pair


19. Convert the binary number 10111010 into its hexadecimal equivalent. Select the correct answer from the list below.
• 85
• 90
• BA
• A1
• B3
• 1C

20. After an Ethernet collision, when the backoff algorithm is invoked, which device has priority to transmit data?
• the device involved in the collision with the lowest MAC address
• the device involved in the collision with the lowest IP address
• any device in the collision domain whose backoff timer expires first
• those that began transmitting at the same time

Read More

CCNA 1 - Module 10

(Updated jan 12 2009 - 100/100)

CCNA 1 - Module 10

(Update 16/10/2008)
I have updated the article 100% here 100/100 (27/12/08)
(Updated jan 12 2009 - 100/100)
1. Refer to the exhibit. A student working in the lab selects a cable that is wired as shown. Which connection types can successfully be made with this cable? (Choose two.)
• connecting a PC to a router’s console port
• connecting two routers together via their fast ethernet ports
• connecting two switches together at gigabit speeds
• connecting a PC to a switch at Gigabit Ethernet speeds
• connecting two devices with the same interface type at Fast Ethernet spee
2. Which option identifies the primary interface which would be used for initial configuration of a Cisco router?
• AUX interface
• Ethernet interface
• serial interface
• console interface


www.ccna4u.net



3. What makes fiber preferable to copper cabling for interconnecting buildings? (Choose three.)
• greater distances per cable run
• lower installation cost
• limited susceptibility to EMI/RFI
• durable connections
• greater bandwidth potential
• easily terminated

4. A network administrator is required to use media in the network that can run up to 100 meters in cable length without using repeaters. The chosen media must be inexpensive and easily installed. The installation will be in a pre-existing building with limited cabling space. Which type of media would best meet these requirements?
• STP
• UTP
• coaxial
• single-mode fiber
• multimode fiber
5. What does the term “attenuation” mean in data communication?
• loss of signal strength as distance increases
• time for a signal to reach its destination
• leakage of signals from one cable pair to another
• strengthening of a signal by a networking device
6. How many host addresses may be assigned on each subnetwork when using the 130.68.0.0 network address with a subnet mask of 255.255.248.0?
• 30
• 256
• 2046
• 2048
• 4094
• 4096
7. Which subnet mask would be assigned to the network address of 192.168.32.0 to provide 254 useable host addresses per subnetwork?
• 255.255.0.0
• 255.255.255.0
• 255.255.254.0
• 255.255.248.0
8. A company is planning to subnet its network for a maximum of 27 hosts. Which subnet mask would provide the needed hosts and leave the fewest unused addresses in each subnet?
• 255.255.255.0
• 255.255.255.192
• 255.255.255.224
• 255.255.255.240
• 255.255.255.248

9. What type of network cable is used between a terminal and a console port?
• cross-over
• straight-through
• rollover
• patch cable
welcome to www.ccna-4.blogspot.com
10. Which device is used to create or divide broadcast domains?
• hub
• switch
• bridge
• router
• repeater

11. Refer to the exhibit. What destination IP address will PC1 place in the header for a packet destined for PC2?
• 192.168.1.1
• 192.168.2.1
• 192.168.2.2
• 192.168.3.1
• 192.168.3.54

12. Refer to the exhibit. Based on the IP configuration shown, what would be the result of Host A and Host B attempting to communicate outside the network segment?
• both host A and B would be successful
• host A would be successful, host B would fail
• host B would be successful, host A would fail
• both Host A and B would fail
13. Which three types of connectors are commonly associated with Cisco’s V.35 serial cables? (Choose three.)
• RJ 11
• DB 60
• Winchester 15 pin

• DB 9
• smart serial
• RJ 45

14. Refer to the exhibit. How many subnets are required to support the network that is shown?
• 2
• 3
• 4
• 5

15. What are three common methods for setting a UTP Ethernet port to MDI or MDIX operation? (Choose three.)
• direct configuration of the device
• cable color code association
• cable selection and configuration
• use of cable testers to determine pinouts
• the enabling of the mechanism to electrically swap the transmit and receive pairs
• the automatic detection and negotiating of MDI/MDIX operation of the port

16. Which three statements are true about the role of routers in the network? (Choose three.)
• They propagate broadcasts.
• They enlarge collision domains.
• They segment broadcast domains.
• They interconnect different network technologies.
• Each router interface requires a separate network or subnet.
• They maintain a common frame format between LAN and WAN interfaces.

17. Refer to the exhibit. A network administrator has decided to use packet capture software to evaluate all traffic from the student subnet on the way to the Internet. To ensure that all packets are captured, what network device should be used to connect the monitoring station to the network between R1 and R2?
• router
• hub
• switch
• wireless access point
18. Refer to the exhibit. Assume that all devices are using default settings. How many subnets are required to address the topology that is shown?
• 1
• 3
• 4
• 5
• 7

19. Refer to the exhibit. Which three statements are true about the exhibited topology? (Choose three.)
• Hosts B and C are in the same subnet.
• Five broadcast domains are present.
• Host B is using a crossover cable to connect to the router.
• Four broadcast domains are present.
• Five networks are shown.
• Host B is using a rollover cable to connect to the router.
20. To establish a console connection from a computer to a Cisco router, which cable wiring option would be used?
• crossover cable
• straight through cable
• rollover cable
• V.35 cable

21. Refer to the exhibit. Which three statements identify the type of cabling that would be used in the segments that are shown? (Choose three.)
• Segment 1 uses backbone cabling.
• Segment 1 uses a patch cable.
• Segment 3 uses patch cabling.
• Segment 3 uses vertical cabling.
• Segment 3 uses horizontal cabling.
• Segment 4 uses vertical cabling.

22. Refer to the exhibit. A network technician has been allocated the 192.168.1.0/24 private IP address range for use in the network that shown in the exhibit. Which subnet mask would be used to meet the host requirements for segment A of this internetwork?
• 255.255.255.128
• 255.255.255.192
• 255.255.255.224
• 255.255.255.240
• 255.255.255.248


www.ccna4u.net
Read More

CCNA 1 - Module 11

(Updated jan 12 2009 - 100/100)
(Update 27/12/2008)

I have updated the article 100% here













(Updated jan 12 2009 - 100/100)

1. Users in the network are experiencing slow response time when doing file transfers to a remote server. What command could be issued to determine if the router has experienced any input or output errors?
• show running-config
• show startup-config
• show interfaces
• show ip route
• show version
• show memory

www.ccna4u.net
www.ccna4u.info
2. Refer to the exhibit. A technician applies the configuration in the exhibit to a clean router. To verify the configuration, the technician issues the show running-config command in the CLI session with the router. What lines should the technician expect to see in the router output from the show running-config command?
• enable password classline console 0password ccna
• enable secret ciscoenable password classline console 0password ccna
• enable secret 5 $1$v0/3$QyQWmJyT7zCa/yaBRasJm0enable password classline console 0password ccna
• enable secret ciscoenable password 7 14141E0A1F17line console 0password 7 020507550A
• enable secret 5 $1$v0/3$QyQWmJyT7zCa/yaBRasJm0enable password 7 14141E0A1F17line console 0password 7 020507550A

3. Refer to the exhibit. A network administrator on HostA has problems accessing the FTP server. Layer three connectivity testing was successful from HostA to the S1 interface of RouterB. Which set of commands will allow the network administrator to telnet to RouterB and run debug commands?
• RouterB(config)# enable secret class
RouterB(config)# line vty 0 4
RouterB(config-if)# login
• RouterB(config)# enable secret class
RouterB(config)# line vty 0 2
RouterB(config-vty)# password cisco
RouterB(config-vty)# login
• RouterB(config)# enable secret class
RouterB(config)# line vty 0
RouterB(config-line)# password cisco
RouterB(config-line)# login
• RouterB(config)# enable secret class
RouterB(config)# line aux 0
RouterB(config-line)# password cisco
RouterB(config-line)# login
• RouterB(config)# enable secret class
RouterB(config)# line aux 0
RouterB(config-vty)# password cisco
RouterB(config-vty)# login
4. Refer to the exhibit. The output is shown for the show ip route command executed on Router A. What does the IP address 192.168.2.2 represent?
• Gateway for the 192.168.1.0 network
• Gateway for the 192.168.3.0 network
• IP assigned to the serial port on Router A
• IP assigned to the serial port on Router B

5. What command is used to change the default router name to Fontana?
• Router# name Fontana
• Router# hostname Fontana
• Router(config)# name Fontana
• Router(config)# hostname Fontana

6. The serial connection shown in the graphic needs to be configured. Which configuration commands must be made on the Sydney router to establish connectivity with the Melbourne site? (Choose three.)
• Sydney(config-if)# ip address 201.100.53.2 255.255.255.0
• Sydney(config-if)# no shutdown
• Sydney(config-if)# ip address 201.100.53.1 255.255.255.224
• Sydney(config-if)# clock rate 56000
• Sydney(config-if)# ip host Melbourne 201.100.53.2
7. Refer to the exhibit. What additional command is required to allow remote access to this switch?
• NA-SW1(config-if)# no shutdown
• NA-SW1(config)# enable password password
• NA-SW1(config)# ip default-gateway address
• NA-SW1(config-if)# description description
8. When network services fail, which port is most often used to access a router for management purposes?
AUX
Ethernet
• Console
Telnet
SSH

9. A network administrator needs to keep the user ID, password, and session contents private when establishing remote CLI connectivity with a router to manage it. Which access method should be chosen?
• Telnet
• Console
• AUX
• SSH
welcome to

www.ccna4u.net
www.ccna4u.info
10. In a Cisco router, when do changes made to the running-configuration take effect?
• after a system restart
• as the commands are entered
• when logging off the system
• when the configuration is saved to the startup-configuration
11. Refer to the exhibit. Which names correctly identify the CLI mode represented by the prompt for Switch-East4#? (Choose two.)
• line configuration mode
• user executive mode
• global configuration mode
• privileged executive mode
• interface configuration mode
• enable mode

12. Which three terms correctly define the forms of help available within the Cisco IOS? (Choose three.)
• hot keys
• context-check
• context-sensitive
• structured check
• command override
• command syntax check
13. Which combination of keys would be used at the CLI prompt to interrupt a ping or traceroute process?
• Ctrl-C
• Ctrl-P
• Ctrl-R
• Ctrl-Shift-6
• Ctrl-Z

14. Refer to the exhibit. What command will place the router into the correct mode to configure an appropriate interface to connect to a LAN?
• UBAMA# configure terminal
• UBAMA(config)# line vty 0 4
• UBAMA(config)# line console 0
• UBAMA(config)# interface Serial 0/0/0
• UBAMA(config)# interface FastEthernet 0/1

15. On a Cisco router, which interface would be used to make the initial configuration?
• Console Port

16. Refer to the exhibit. A student is responsible for the IP addressing, configuration and connectivity testing of the network shown in the graphic. A ping from host B to host C results in a destination unreachable but a ping from host B to host A was successful. What two reasons could account for this failure based on the graphic and partial router output for the Dallas router? (Choose two.)
• The host A is turned off.
• The Fa0/0 interface on Dallas is shutdown.
• The LAN cable is disconnected from host B.
• The S0/0/1 IP address of Dallas is improperly configured.
• The Fa0/0 interface on Dallas is in a different subnet than host B.
• The clock rate is missing on the serial link between Dallas and NYC.

Read More

Chủ Nhật, 26 tháng 4, 2009

CCNA v4 - E4 - Module 4 (100%)

1. What is the best defense for protecting a network from phishing exploits?

Schedule training for all users.

2. What are three characteristics of a good security policy? (Choose three.)

It defines acceptable and unacceptable use of network resources.
It communicates consensus and defines roles.
It defines how to handle security incidents.
www.ccna4u.net
www.ccna4u.info
3. The Cisco IOS image naming convention allows identification of different versions and capabilities of the IOS. What information can be gained from the filename c2600-d-mz.121-4? (Choose two.)

The software is version 12.1, 4th revision.
The IOS is for the Cisco 2600 series hardware platform.

4. Refer to the exhibit. What is accomplished when both commands are configured on the router?

The commands disable the services such as echo, discard, and chargen on the router to prevent security vulnerabilities.

5. Which two conditions should the network administrator verify before attempting to upgrade a Cisco IOS image using a TFTP server? (Choose two.)

Verify connectivity between the router and TFTP server using the ping command.
Verify that there is enough flash memory for the new Cisco IOS image using the show flash command.

6. Which two statements regarding preventing network attacks are true? (Choose two.)

Physical security threat mitigation consists of controlling access to device console ports, labeling critical cable runs, installing UPS systems, and providing climate control.
Changing default usernames and passwords and disabling or uninstalling unnecessary services are aspects of device hardening.
www.ccna4u.net
www.ccna4u.info
7. An IT director has begun a campaign to remind users to avoid opening e-mail messages from suspicious sources. Which type of attack is the IT director trying to protect users from?

virus

8. Users are unable to access a company server. The system logs show that the server is operating slowly because it is receiving a high level of fake requests for service. Which type of attack is occurring?

DoS

9. Refer to the exhibit. What is the purpose of the "ip ospf message-digest-key 1 md5 cisco" statement in the configuration?
to specify a key that is used to authenticate routing updates

10. Which two statements define the security risk when DNS services are enabled on the network? (Choose two.)

The basic DNS protocol does not provide authentication or integrity assurance.
The router configuration does not provide an option to set up main and backup DNS servers.
www.ccna4u.net
www.ccna4u.info
11. Which two statements are true about network attacks? (Choose two.)

A brute-force attack searches to try every possible password from a combination of characters.
Devices in the DMZ should not be fully trusted by internal devices, and communication between the DMZ and internal devices should be authenticated to prevent attacks such as port redirection.

12. Refer to the exhibit. A network administrator is trying to configure a router to use SDM, but it is not functioning correctly. What could be the problem?

The privilege level of the user is not configured correctly.
www.ccna4u.net
www.ccna4u.info
13. Refer to the exhibit. The network administrator is trying to back up the Cisco IOS router software and receives the output shown. What are two possible reasons for this output? (Choose two.)

The router cannot connect to the TFTP server.
The TFTP server software has not been started.
www.ccna4u.net
www.ccna4u.info
14
Which two statements are true regarding network security? (Choose two.)

Both experienced hackers who are capable of writing their own exploit code and inexperienced individuals who download exploits from the Internet pose a serious threat to network security.
Protecting network devices from physical damage caused by water or electricity is a necessary part of the security policy.

15. The password recovery process begins in which operating mode and using what type of connection? (Choose two.)

ROM monitor
direct connection through the console port

16. Which two objectives must a security policy accomplish? (Choose two.)

document the resources to be protected
identify the security objectives of the organization

17. Which statement is true about Cisco Security Device Manager (SDM)?

SDM can be run from router memory or from a PC.
www.ccna4u.net
www.ccna4u.info
18. Which step is required to recover a lost enable password for a router?

Set the configuration register to bypass the startup configuration.

19. Refer to the exhibit. Security Device Manager (SDM) is installed on router R1. What is the result of opening a web browser on PC1 and entering the URL https://192.168.10.1?

The SDM page of R1 appears with a dialog box that requests a username and password.

20. Intrusion detection occurs at which stage of the Security Wheel?

monitoring

21. Refer to the exhibit. Security Device Manager (SDM) has been used to configure a required level of security on the router. What would be accomplished when the SDM applies the next step on the security problems that are identified on the router?

SDM will reconfigure the services that are marked in the exhibit as “fix it” to apply the suggested security changes.

22
What are two benefits of using Cisco AutoSecure? (Choose two.)

It gives the administrator detailed control over which services are enabled or disabled.
It allows the administrator to configure security policies without having to understand all of the Cisco IOS software features.


www.ccna4u.net
Read More

CCNA v4 - E4 - Module 3 (100%)

1. Which best describes the benefit of using Frame Relay as opposed to a leased line or ISDN service?

Customers only pay for the local loop and the bandwidth they purchase from the network provider.

2. Which statement about Frame Relay subinterfaces is correct?

Point-to-point subinterfaces act like leased lines and eliminate split-horizon routing issues.

3. What best describes the use of a data-link connection identifier (DLCI)?

locally significant address used to identify a virtual circuit

www.ccna4u.net
www.ccna4u.info
4. What is created between two DTEs in a Frame Relay network?

virtual circuit

5. Which two items allow the router to map data link layer addresses to network layer addresses in a Frame Relay network? (Choose two.)

Inverse ARP
LMI status messages

6. Refer to the exhibit. What can be known about the configuration of router R1 from the output?

The command encapsulation frame-relay ietf has been used on the Serial 0/0/0 interface.

7. Refer to the exhibit. Which two outcomes occur from the configuration shown? (Choose two.)

The router will use DLCI 22 to forward data to 10.1.1.1.
Frames arriving on interface serial 0/0/0 of RT_1 will have a data link layer address of 22.
www.ccna4u.net
www.ccna4u.info
8. Refer to the exhibit. What effect does the point-to-point configuration on subinterface S0/0.110 have on the operation of the router?

It eliminates split horizon issues without increasing the likelihood of routing loops.

9. Refer to the exhibit. You are a network administrator who has been tasked with completing the Frame Relay topology that interconnects two remote sites. Router HQ belongs to both the 172.16.1.0/24 and 172.16.2.0/24 subnets with IP addresses of 172.16.1.3 and 172.16.2.3 respectively. Traffic between R1 and R2 must travel through HQ first. How should the serial interface on HQ be configured to complete the topology?

two point-to-point subinterfaces

10. Refer to the exhibit. What can be determined about the configuration of router R1 from the exhibited output?

The LMI type for the Serial 0/0/0 interface has been left to its default configuration.

11. Refer to the exhibit. What can be determined about the Frame Relay switch from the output shown?

It is experiencing congestion.

12. Refer to the exhibit. Which two statements are true given the output shown? (Choose two.)

The local DLCI number is 401.
Inverse ARP is being used on this connection.

13. Refer to the exhibit. A ping is sent to address 192.168.50.10 from the Peanut router. Which DLCI will be used to send the ping?

110
www.ccna4u.net
www.ccna4u.info
14. Refer to the exhibit. Router R1 has been configured for Frame Relay connectivity to routers R2 and R3. Which set of configuration options for routers R2 and R3 would provide each router connectivity to R1?

R2(config)# interface serial0/0/1.201 point-to-point
R2(config-if)# frame-relay interface-dlci 201
R3(config)# interface serial0/0/1.301 point-to-point
R3(config-if)# frame-relay interface-dlci 301

15. Refer to the exhibit. Which statement explains why the Frame Relay connection between R1 and R2 is failing?

The frame-relay map commands are using incorrect DLCIs.

16. Refer to the exhibit. Router R2 is part of a Frame Relay network that uses OSPF for IP routing. After the commands that are shown are entered, R2 will not exchange OSPF information correctly. What is the likely cause?

The frame-relay map command requires the broadcast keyword.

17. Refer to the exhibit. When troubleshooting a Frame Relay connection, an administrator entered the show interfaces s0/0 command and received the output shown in the exhibit. What are two probable reasons for this problem? (Choose two.)

The router is not configured for the same Frame Relay PVC as the switch.
The LMI type on the Frame Relay switch is NOT ANSI.

18. Refer to the exhibit. What can be determined from the output?

Serial 0/0/0 has been configured with an DLCI of 201.

19. What consideration must be taken into account if RIP is used on Frame Relay multiaccess networks?

To forward routing updates, address-to-DLCI mapping must be done via the use of the frame-relay map command coupled with the broadcast keyword.

20. Which three actions does a Frame Relay switch perform when it detects an excessive build-up of frames in its queue? (Choose three.)

drops frames from the queue that have the DE bit set
sets the FECN bit on all frames it receives on the congested link
sets the BECN bit on all frames it places on the congested link

21. What two methods does Frame Relay technology use to process frames that contain errors? (Choose two.)

Frame Relay services depend on the upper layer protocols to handle error recovery.
The receiving device drops any frames that contain errors without notifying the sender.

22. Refer to the exhibit. Router R1 has been configured for Frame Relay connectivity to routers R2 and R3. What configuration option should be configured on the R2 and R3 serial interfaces in order for all routers to ping each other successfully?

R2(config-if)# frame-relay map ip 10.1.1.1 201 broadcast
R2(config-if)# frame-relay map ip 10.1.1.3 201 broadcast
R3(config-if)# frame-relay map ip 10.1.1.1 301 broadcast
R3(config-if)# frame-relay map ip 10.1.1.2 301 broadcast

www.ccna4u.net
Read More

CCNA v4 - E4 - Module 1 (100%)

1. Which statement about WAN protocols is correct?

Most WAN protocols use HDLC or a variant of HDLC as a framing mechanism.

2. Which statement is true of the functionality of the layers in the hierarchical network model?

The distribution layer aggregates WAN connections at the edge of the campus.

3. Which WAN technology uses a fixed payload of 48 bytes and is transported across both switched and permanent virtual circuits?

ATM
www.ccna4u.net

4. A U.S. company requires a WAN connection used only to transfer sales data from individual stores to the home office. All transfers will occur after business hours. The required bandwidth for this connection is estimated to be less than 38 kbps. Which type of connection requires the least investment for this company?

analog dialup

5. What is an advantage of packet-switched technology over circuit-switched technology?

Packet-switched networks can efficiently use multiple routes inside a service provider network.

6. Which statement is true about data connectivity between a customer and a service provider?

The segment between the demarcation point and the central office is known as the "last mile."

7. What are two advantages of an analog PSTN WAN connection? (Choose two.)

low cost
availability

8. What can cause a reduction in available bandwidth on a cable broadband connection?

number of subscribers

9. For digital lines, which device is used to establish the communications link between the customer equipment and the local loop?

CSU/DSU

10. At which two layers of the OSI model does a WAN operate? (Choose two.)

Physical Layer
Data Link Layer

11. A company needs a WAN connection that is capable of transferring voice, video, and data at a minimum data rate of 155 Mbps. Which WAN connection is the best choice?

ATM

12. Which statement is true about the differences between a WAN and a LAN?

A WAN often relies on the services of carriers, such as telephone or cable companies, but a LAN does not.

13. Which networking device is typically used to concentrate the dial-in and dial-out traffic of multiple users to and from a network?

access server

14. Why is the call setup time of a circuit-switched WAN implementation considered a drawback?

Data cannot be transferred until a circuit has been established.

15. What three terms are associated with ISDN PRI? (Choose three.)

circuit switching
data bearer channels
time-division multiplexing

16. Which three features are identified with Frame Relay connections? (Choose three.)
CIR
DLCI
PVC

17. Which two devices are commonly used as data communications equipment? (Choose two.)

modem
CSU/DSU

18. Which packet-switched WAN technology offers high-bandwidth connectivity capable of managing data, voice, and video all on the same infrastructure?

metro Ethernet

19. Which three WAN devices can be found in the cloud? (Choose three.)

ATM switches
core routers
Frame Relay switches

20. Which switching type will allow the communication devices in the provider network to be shared and only allocated to an individual subscriber during data transfer?

dedicated switched lines

21. What type of connectivity is established when VPNs are used from the remote site to the private network?

tunnels

22. Which term describes a device that will put data on the local loop?

DCE


www.ccna4u.net
Read More

CCNA v4 - E4 - Module 7 (100%)

1. Refer to the exhibit. IPv6 address 2006:1::1/64 eui-64 has been configured on the router FastEthernet0/0 interface. Which statement accurately describes the EUI-64 identifier configuration?

The configuration will derive the interface portion of the IPv6 address from the MAC address of the interface.

www.ccna4u.net

2. Refer to the exhibit. Which address or addresses represent the inside global address?

209.165.20.25

3. Your organization is issued the IPv6 prefix of 2001:0000:130F::/48 by your service provider. With this prefix, how many bits are available for your organization to create subnetworks?

16

4. What are two benefits of NAT? (Choose two.)

It saves public IP addresses.
It adds a degree of privacy and security to a network.

5. What is true regarding the differences between NAT and PAT?

PAT uses unique source port numbers to distinguish between translations.

6. A network administrator wants to connect two IPv6 islands. The easiest way is through a public network that uses only IPv4 equipment. What simple solution solves the problem?

Use tunneling to encapsulate the IPv6 traffic in the IPv4 protocol.

7. Refer to the exhibit. Which two addresses could be assigned to traffic leaving S0 as a result of the statement ip nat pool Tampa 179.9.8.96 179.9.8.111 netmask 255.255.255.240? (Choose two.)

179.9.8.98
179.9.8.101

8. Refer to the exhibit. The FTP server has an RFC 1918 private address. Users on the Internet need to connect to the FTP server on the Fa0/0 LAN of R1. Which three configurations must be completed on R1? (Choose three.)

open port 20
open port 21
NAT with port forwarding

9. After activating IPv6 routing on a Cisco router and programming IPv6 addresses on multiple interfaces, what is the remaining step to activate RIPng?

Enter the interface programming mode for each IPv6 interface and enable IPng RIP.

10. Refer to the exhibit. How many IPv6 broadcast domains exist in this topology?

0

11. Refer to the exhibit. Traffic exiting R1 is failing translation. What part of the configuration is most likely incorrect?

access-list statement

12. Refer to the exhibit. According to the output, how many addresses have been successfully assigned by this DHCP server?

8

www.ccna4u.net
www.ccna4u.info
13. Refer to the exhibit. What is the purpose of the command marked with an arrow shown in the partial configuration output of a Cisco broadband router?

defines which addresses can be translated

14. A technician has been told by a supervisor to always clear any dynamic translations before attempting to troubleshoot a failed NAT connection. Why has the supervisor issued these instructions?

Because entries can be cached for long periods of time, the supervisor wants to prevent decisions being made based on old data.

15. Refer to the exhibit. Which two statements about the configuration are true? (Choose two.)

Traffic from the 10.1.1.0 network will be translated.
Permitted traffic gets translated to a single inside global IP address.

16. Refer to the exhibit. R1 is performing NAT for the 10.1.1.0/24 network, and R2 is performing NAT for the 192.168.1.2/24 network. What would be valid destination IP address for HostA to put in its IP header when communicating with the web server?

172.30.20.2

17. What type of NAT should a network administrator use to ensure that a web server on the inside network is always available to the outside network?

static NAT

18. How many bits of an IPv6 address are used to identify the interface ID?

64

19. Refer to the exhibit. A technician used SDM to enter the NAT configuration for a Cisco router. Which statement correctly describes the result of the configuration?

A user on the outside network sees a request addressed from 192.168.1.3 using port 80.

20. Refer to the exhibit. A network technician determines DHCP clients are not working properly. The clients are receiving IP configuration information from a DHCP server configured on the router but cannot access the Internet. From the output in the graphic, what is the most likely problem?

The pool does not have a default router defined for the clients.

21. Refer to the exhibit. On the basis of the configuration shown, how should the pool of the excluded addresses be assigned to key hosts on the network, such as router interfaces, printers, and servers?

The addresses are statically assigned by the network administrator.

www.ccna4u.net
Read More

CCNA 1 - Module 6

(Updated jan 12 2009 - 100/100)

CCNA 1 - Module 6

1. Refer to the exhibit. Which network prefix will work with the IP addressing scheme shown in the graphic.

• /24
• /16
• /20
/27
• /25
• /28

2. Which IPv4 subnetted addresses represent valid host addresses? (Choose three.)
172.16.4.127 /26
172.16.4.155 /26
172.16.4.193 /26
172.16.4.95 /27
172.16.4.159 /27
172.16.4.207 /27


www.ccna4u.net
www.ccna4u.info

3. Which statements are true regarding IP addressing? (Choose two.)
NAT translates public addresses to private addresses destined for the Internet.
Only one company is allowed to use a specific private network address space.
Private addresses are blocked from public Internet by router.
Network 172.32.0.0 is part of the private address space.
IP address 127.0.0.1 can be used for a host to direct traffic to itself.

4. Which process do routers use to determine the subnet network address based
upon a given IP address and subnet mask?
binary adding
hexadecimal anding
binary division
binary multiplication
binary ANDing

5. Refer to the exhibit. Host A is connected to the LAN, but it cannot get access to any resources on the Internet. The configuration of the host is shown in the exhibit. What could be the cause of the problem?
The host subnet mask is incorrect.
The default gateway is a network address.
The default gateway is a broadcast address.
The default gateway is on a different subnet from the host.

6. What subnet mask would a network administrator assign to a network address of 172.30.1.0 if it were possible to have up to 254 hosts?
255.255.0.0
255.255.255.0
255.255.254.0
255.255.248.0
welcome to www.ccna-4.blogspot.com

7. Which three IP addresses are private? (Choose three.)

172.168.33.1
10.35.66.70
192.168.99.5
172.18.88.90
192.33.55.89
172.35.16.5

8. Given the IP address and subnet mask of 172.16.134.64 255.255.255.224, which of the following would describe this address?
This is a useable host address.
This is a broadcast address.
This is a network address.
This is not a valid address.

9. A router interface has been assigned an IP address of 172.16.192.166 with a mask of 255.255.255.248. To which subnet does the IP address belong?
172.16.0.0
172.16.192.0
172.16.192.128
172.16.192.160
172.16.192.168
172.16.192.176

10. Refer to the exhibit. The network administrator has assigned the internetwork of LBMISS an address range of 192.168.10.0. This address range has been subnetted using a /29 mask. In order to accommodate a new building, the technician has decided to use the fifth subnet for configuring the new network (subnet zero is the first subnet). By company policies, the router interface is always assigned the first usable host address and the workgroup server is given the last usable host address. Which configuration should be entered into the workgroup server’s properties to allow connectivity to the network?

IP address: 192.168.10.38 subnet mask: 255.255.255.240 default gateway: 192.168.10.39
IP address: 192.168.10.38 subnet mask: 255.255.255.240 default gateway: 192.168.10.33
IP address: 192.168.10.38 subnet mask: 255.255.255.248 default gateway: 192.168.10.33
IP address: 192.168.10.39 subnet mask: 255.255.255.248 default gateway: 192.168.10.31
IP address: 192.168.10.254 subnet mask: 255.255.255.0 default gateway: 192.168.10.1

11. Which of the following network devices are recommended to be assigned static IP addresses? (Choose three.)
LAN workstations
servers
network printers
routers
remote workstations
laptops

12. hich of the following are features of IPv6? (Choose three.)

larger address space
faster routing protocols
data types and classes of service
authentication and encryption
improved host naming conventions
same addressing scheme as IPv4

13. What is the primary reason for development of IPv6?
security
header format simplification
expanded addressing capabilities
addressing simplification

14. What two things will happen if a router receives an ICMP packet which has a TTL value of 1 and the destination host is several hops away? (Choose two.)

The router will discard the packet.
The router will decrement the TTL value and forward the packet to the next router on the path to the destination host.
The router will send a time exceeded message to the source host.
The router will increment the TTL value and forward the packet to the next router on the path to the destination host.
The router will send an ICMP Redirect Message to the source host.

15. Refer to the exhibit. Why would the response shown be displayed after issuing the command ping 127.0.0.1 on a PC?
The IP settings are not properly configured on the host.
Internet Protocol is not properly installed on the host.
There is a problem at the physical or data link layer.
The default gateway device is not operating.
A router on the path to the destination host has gone down.


www.ccna4u.net
www.ccna4u.info

16. How many bits make up an IPv4 address?

128
64
48
32

17. Refer to the exhibit. A network administrator discovers that host A is having trouble with Internet connectivity, but the server farm has full connectivity. In addition, host A has full connectivity to the server farm. What is a possible cause of this problem?

The router has an incorrect gateway.
Host A has an overlapping network address.
Host A has an incorrect default gateway configured.
Host A has an incorrect subnet mask.
NAT is required for the host A network.

18. What three facts are true about the network portion of an IPv4 address? (Choose three.)
identifies an individual device
is identical for all hosts in a broadcast domain
is altered as packet is forwarded
varies in length
is used to forward packets
uses flat addressing

19. What is a group of hosts called that have identical bit patterns in the high order bits of their addresses?

an internet
a network
an octet
a radix
Bottom of Form
Top of Form
Bottom of Form

20. What is the network address of the host 172.25.67.99 /23 in binary?

10101100. 00011001.01000011.00000000
10101100. 00011001.01000011.11111111
10101100. 00011001.01000010.00000000
10101100. 00011001.01000010.01100011
10101100. 00010001.01000011. 01100010
10101100. 00011001.00000000.00000000

21. Refer to the exhibit. A network administrator has to develop an IP addressing scheme that uses the 192.168.1.0 /24 address space. The network that contains the serial link has already been addressed out of a separate range. Each network will be allocated the same number of host addresses. Which network mask will be appropriate to address the remaining networks?

255.255.255.248
255.255.255.224
255.255.255.192
255.255.255.240
255.255.255.128
255.255.255.252
Read More