Bagi yang masuk ke blog ini melalui Search Engin dan tidak menemukan artikel yang di cari pada halaman ini maka dapat mencari pada arsip blog atau mengunakan fasilitas search yang ada di blog ini. terimakasih atas kunjungnnya.
bagi yang ingin bertanya sebaiknya langsng melalui YM apabila lagi online atau inggalkan coment di artikel yang bersangutan.

Promo : Transfer Pulsa Indosat (IM3/Mentari/StarOne) pulsa 100rb Harga 82rb (bisa untuk BB)

bagi yang berminat dapat hubungin YM : ivandriyandra atau sms ke no 085624060651. atau data update dapat liat di halaman ini http://indosat.yandra.web.id/

30 Mei 2009

CCNA2-final

1 What is accomplished by segmenting a LAN with a bridge?
  • *increase large collision domains
  • reduce large collision domains
  • reduce small broadcast domains
  • increase small broadcast domains

2 How many Telnet sessions can take place simultaneously on a router running a standard edition of the IOS?
  • 4
  • *5
  • 8
  • 10

3 What is a disadvantage of cut-through switching?
  • *no error checking
  • a decrease in error checking
  • decrease in number of collision domains
  • decrease in bandwidth
  • increased latency

4 Which of the following are data link layer encapsulation details? (Choose two.)
  • *Packets are put into frames.
  • Data is packaged into a packet.
  • Data is segmented into segments.
  • Data is converted for Internet travel.
  • *An address is added to identify the directly connected device.

5 Select the characteristics specified by 10BaseT. (Choose three.)
  • *twisted pair cable
  • T style connectors
  • *baseband transmission
  • 10 gigabits per second data rate
  • *10 megabits per second data rate
  • decimal encoded data transmission

6 A LAN is to be added to an unused router Ethernet interface. What steps must be performed to configure this interface to allow connectivity to the hosts on this
LAN? (Choose two.)
  • *Enter the command no shutdown.
  • A password must be set on the interface.
  • The interface DCE clock rate must be set.
  • The interface must be configured for virtual terminal access.
  • *The interface must be configured with an IP address and subnet mask.
  • The router must be put in setup mode in order for the interface to be configured

7 Which media types can be used in an implementation of a 10BASE-T network? (Choose three.)
  • Category 5 UTP *
  • Category 5e UTP *
  • Category 3 UTP *
  • coaxial cable
  • multi-mode fiber
  • single mode fiber

8 If 4 bits are borrowed from the host field of a Class C address to create subnets, what will the range of usable host addresses be in the last subnet?
  • .224 to .239
  • .225 to .239
  • .225 to .254
  • .241 to .254
  • .241 to .255
  • *.240 to .255

9 Which of the following describe how a device on a LAN builds a table of MAC addresses? (Choose two.)
  • *by monitoring the traffic that occurs on the local network segment
  • via FTP from the nearest router
  • by sending a request to the nearest domain name server
  • *by broadcasting an ARP request

10 Which of the following best describes how the Gigabit Ethernet, Media Access Control method views the link?
  • ring
  • shared bus
  • point-to-point *
  • star
  • extended star
11 What is the purpose of Positive Acknowledgment and Retransmission (PAR)?
  • PAR allows the presentation layer to request that data be resent in a format the
  • destination host can process.
  • PAR provides a mechanism for the receiving device to request that all segments be retransmitted if one segment is corrupt.
  • *PAR helps ensure that a number of data segments sent by one host are received by another host before additional data segments are sent.
  • PAR is used to renegotiate the window size during the synchronization process.

12 Which criteria identify a Class B address? (Choose two.)
  • decimal number in first octet between 127-191
  • decimal number in first octect between 128-192
  • *decimal number in first octect between 128-191
  • first bit of binary IP address is 0
  • *first two bits of binary IP address are 10
  • first three bits of IP binary address are 110

13 An administrator has made routing protocol changes to a router's configuration. To ensure that the changes are implemented, the active configuration is saved and the router is reloaded. After the router has initialized, the output on the screen displays "Would you like to enter the initial configuration dialog?[yes/no]:" Why did this dialog appear?
  • There was a POST failure.
  • The incorrect IOS loaded.
  • There was an error in the startup configuration file.
  • *The configuration register was set to ignore NVRAM.

14 What operations are performed during router initialization? (Choose three.)
  • *The IOS is loaded into RAM.
  • *The generic bootstrap loader tests all interfaces.
  • All directly connected network devices are identified.
  • *A valid configuration file is loaded from NVRAM if specified by the configuration register.
  • A question driven setup menu is presented if a valid configuration file cannot be loaded.

15 For a network manager planning the installation of a new network, which of the following will be needed to implement a typical 10BASE-T network installation? (Choose three.)
  • RJ-11
  • BNC connectors
  • RJ-48 patch cables
  • RJ-45 connectors *
  • Category 5 UTP cables *
  • hubs or switches *

16 A company with a Class B license needs to have a minimum of 1,000 subnets with each subnet capable of accommodating 50 hosts. Which mask below is the appropriate one?
  • 255.255.0.0
  • 255.255.240.0
  • 255.255.255.0
  • *255.255.255.192
  • 255.255.255.224

17 A network administrator can establish a remote session to a host using the Router> telnet 192.168.1.1 command but is unsuccessful when using the Router> telnet Boston command to connect to the same interface. Which of the following could bethe problem? (Choose two.)
  • *The ip host table on the router is not configured.
  • The command telnet Boston was issued from the wrong router prompt.
  • The routing table is missing.
  • *Domain name services are not available.

18 Which of the following network components would be considered Layer 1 devices? (Choose three.)
  • *hub
  • router
  • bridge
  • switch
  • *repeater
  • *transceiver

19 What is the maximum distance that 10BASE-T will transmit data before signal attenuation affects the data delivery?
  • *100 meters
  • 185 meters
  • 300 meters
  • 500 meters

20 What is the result of executing the erase startup-config command?
  • It deletes the active configuration file from RAM.
  • *It deletes the backup configuration file in NVRAM.
  • It deletes the saved configuration file from ROM.
  • It deletes the saved configuration file from the C: drive.

21 Which of the following imposes boundaries on broadcast traffic?
  • Bridge
  • Repeater
  • *Router
  • Transceiver
22 Which utility shows the route a packet takes to reach its destination?
  • netstat
  • ping
  • Telnet
  • *traceroute

23 Which device is considered a multi-port bridge?
  • hub
  • router
  • *switch
  • gateway
  • transceiver
  • repeater

24 What organization developed the TCP/IP reference model?
  • Internet Engineering Task Force (IETF)
  • National Intstitute of Standards and Technology (NIST)
  • Department of the Navy (DoN)
  • Department of Defense (DoD) *
  • Massachusetts Institute of Technology (MIT)
  • Stanford University

25 Which of the following is true regarding CDP and the graphic shown?
  • CDP running on Router D will gather information about routers A, B, C, and E.
  • *By default, Router A will receive CDP advertisements from routers B and C.
  • If routers D and E are running different routing protocols, they will not exchange CDP information.
  • Router E can use CDP to identify the IOS running on Router B.

26 How would an administrator configure a static route for use if a primary route failed?
  • configure the route with a metric greater than the default value
  • configure the route and the router will activate it as needed
  • configure the route to activate by using the redistribute static command
  • *configure the route with an administrative distance greater than the default value

27 Convert the Hexadecimal number A2 into its Base 10 equivalent. Select the correct answer from the list below.
  • 156
  • 158
  • 160
  • *162
  • 164
  • 166

28 What happens on an Ethernet network after a collision occurs? (Choose three.)
  • *A backoff algorithm is invoked and transmission is stopped.
  • Devices involved in the collision have a random period of time for priority retransmission of the damaged packet.
  • The devices involved in the collision release a token indicating the time each station may begin retransmitting.
  • *The devices involved in the collision do not have priority to transmit data.
  • *The devices with data to transmit return to a listen-before-transmit mode.
  • Transmit work will restart with the reissuance of all data.

29 Which of the following types of networks pass a token sequentially to each host?(Choose two.)
  • Ethernet
  • *Token Ring
  • *FDDI
  • Frame Relay
  • ISDN

30 What is the length of a MAC address?
  • 8 bits
  • 8 bytes
  • 24 bits
  • 24 bytes
  • *48 bits
  • 48 bytes

31 Which of the following are TCP services? (Choose three.)
  • address resolution
  • *end-to-end communication
  • *flow control
  • *reliability of data delivery
  • path determination
  • data representation

32 Routers have different types of memory. Choose the answer that describes RAM.
  • *provides working storage
  • stores a fully functional IOS image
  • stores the startup configuration file
  • initializes the code used in router startup

33 Which command will display routing table information about all known networks and subnetworks?
  • Router# show ip interfaces
  • Router# show ip connections
  • *Router# show ip route
  • Router# show ip networks

34 Which of the following statements describe distance vector routing updates? (Choose three.)
  • Topology changes are transmitted to all routers at once.
  • *Routers send their entire routing tables in distance vector updates.
  • *Path cost metrics for each route are included in the updates.
  • Periodic updates are sent directly to every router in the network.
  • *Routing updates are sent periodically to adjacent routers.
  • Routers send only the state of their own links in distance vector updates.

35 Which ICMP message type notifies source hosts that a receiving host or network i
s not available?
  • time exceeded
  • redirect
  • *destination unreachable
  • source quench
  • parameter problem
  • echo reply

36
How many total subnets are created by applying the subnet mask 255.255.252.0 to a Class B network?
  • 4
  • 6
  • *64
  • 252
  • 255
  • 1024

37 Which of the following conditions will cause a router using holddown timers to ignore an update?
  • an update from a different router with a better metric
  • an update from a different router with a poorer metric
  • an update from the same router with a better metric
  • *an update from the same router with a poorer metric

38 Which IP packet field will prevent endless loops?
  • type-of-service
  • identification
  • flags
  • *time-to-live
  • header checksum

39 Which of the following is a network type that is widely used in dialup networking?
  • shared media
  • *point-to-point
  • extended shared media
  • point-to-multipoint

40 When a network administrator applies the subnet mask 255.255.255.248 to a Class A address, for any given subnet, how many IP addresses are available to be assigned to devices?
  • 1022
  • 510
  • 254
  • 126
  • 30
  • *6

41 Cisco Discovery Protocol (CDP) operates at which OSI Layer?
  • physical layer
  • network layer
  • *data link layer
  • presentation layer

42 Which protocol can be used to load or retrieve Cisco IOS images to or from a router?
  • SNMP
  • *TFTP
  • UDP
  • TCP

43 Which of the following is a transport layer protocol of the TCP/IP model?
  • FTP
  • *UDP
  • IP
  • TFTP

44 Which of the following is created with switched full-duplex transmission?
  • more collision domains
  • fewer collision domains
  • *no collision domains
  • no increase in broadcast domains
  • more broadcast domains

45 Which of the following IP addresses are broadcast addresses if the subnet mask is 255.255.255.240? (Choose three.)
  • *75.32.75.15
  • 205.16.35.11
  • *199.254.129.111
  • *129.130.17.143
  • 135.22.55.93
  • 105.33.62.213

46 What type of routing uses information that is manually entered into the routing table?
  • dynamic
  • interior
  • *static
  • standard

47 What is used to resolve known IP addresses to unknown MAC addresses?
  • *ARP
  • DNS
  • DHCP
  • RARP

48 Which of the following OSI layers offers reliable, connection-oriented data communication services?
  • session
  • *transport
  • network
  • data link

49
Which of the following are benefits of creating a subnetwork structure in an IP network? (Choose three.)
  • permits network address duplication
  • *allows for address flexibility
  • *prevents address replication
  • provides broadcast containment
  • *adds low-level security
  • allows for more network hosts available

50 How many IP addresses can be assigned to host devices on each subnet of a Class B network with a subnet mask of 255.255.255.248?
  • 3
  • 5
  • *6
  • 8
  • 30
  • 8190

51 After a Telnet session has been suspended, which actions will restart the session? (Choose two.)
  • *pressing Enter to restart the most recent session
  • *using the resume command followed by a session ID
  • typing the session ID followed by pressing Enter
  • using the resume command followed by the IP address

52 Which layer of the OSI model covers physical media?
  • *Layer 1
  • Layer 2
  • Layer 3
  • Layer 4
  • Layer 5
  • Layer 6

53 Which protocol is used by FTP to transfer files over the Internet?
  • *TCP
  • SMTP
  • UDP
  • SNMP

54 Which of the following factors should be considered when selecting a routing protocol to be implemented in an enterprise network? (Choose three.)
  • *bandwidth consumption
  • *router memory requirements
  • router location
  • spanning tree size
  • *router processor capability
  • flow control capability

55 A ping 192.1.1.20 command is issued on workstation A to determine if workstationB can be reached. What events will occur if this command is successful? (Choose two.)
  • The router will block the ping request message.
  • The router will reply to the echo request with a proxy ping response.
  • Workstation A will send a UDP ping request message to workstation B.
  • Workstation B will send a UDP ping reply message to workstation A.
  • *Workstation A will send an ICMP echo request message to workstation B.
  • *Workstation B will send an ICMP echo reply message to workstation A.

56 Which mode will a router enter if it is unable to locate a valid startup configuration file during the boot process?
  • Boot mode
  • Config mode
  • *Setup mode
  • Startup mode

57 Which protocol of the TCP/IP model internet layer provides connectionless, best-effort-delivery of datagrams?
  • ARP
  • ICMP
  • *IP
  • RARP
  • TCP
  • DNS

58 Which of the following does a router use to make a forwarding decision?
  • *destination IP address
  • MAC address
  • source IP address
  • encapsulation address
  • default gateway

59 Routers have different types of memory. Choose the answer that describes NVRAM.
  • provides working storage
  • stores a fully functional IOS image
  • *stores the startup configuration file
  • initializes the code that is used to boot the router

60 Which statement is correct concerning routing and routed protocols? A routed protocol allows the routers to communicate with other routers and maintain tables for a routing protocol.
  • *A routing protocol allows routers to communicate with other routers and maintai
  • n tables for a routed protocol.
  • Routers only need to use routing protocols to work properly.
  • There is no difference between routed and routing protocols.

Tidak ada komentar:

Posting Komentar

SMS Gratis