<?xml version='1.0' encoding='UTF-8'?><?xml-stylesheet href="http://www.blogger.com/styles/atom.css" type="text/css"?><feed xmlns='http://www.w3.org/2005/Atom' xmlns:openSearch='http://a9.com/-/spec/opensearchrss/1.0/' xmlns:blogger='http://schemas.google.com/blogger/2008' xmlns:georss='http://www.georss.org/georss' xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr='http://purl.org/syndication/thread/1.0'><id>tag:blogger.com,1999:blog-565733589089419925</id><updated>2024-08-29T17:26:36.827-07:00</updated><category term="CCNA 1 Final Test"/><title type='text'>CCNA Exploration</title><subtitle type='html'></subtitle><link rel='http://schemas.google.com/g/2005#feed' type='application/atom+xml' href='http://crazyu-ccna-exploration.blogspot.com/feeds/posts/default'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/565733589089419925/posts/default?redirect=false'/><link rel='alternate' type='text/html' href='http://crazyu-ccna-exploration.blogspot.com/'/><link rel='hub' href='http://pubsubhubbub.appspot.com/'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><generator version='7.00' uri='http://www.blogger.com'>Blogger</generator><openSearch:totalResults>3</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><entry><id>tag:blogger.com,1999:blog-565733589089419925.post-2132057100583212153</id><published>2009-12-28T22:37:00.000-08:00</published><updated>2009-12-28T22:38:24.137-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="CCNA 1 Final Test"/><title type='text'>CCNA1 FINAL(Updated Jan 14 - 2009)</title><content type='html'>1 A PC can not connect to any remote websites, ping its default gateway, or ping a printer that is functioning properly on the local network segment. Which action will verify that the TCP/IP stack is functioning correctly on this PC?&lt;br /&gt;&lt;br /&gt;Use the ipconfig /all command at the host�s command prompt.&lt;br /&gt;----&gt; Use the ping 127.0.0.1 command at the command prompt.&lt;br /&gt;Use the traceroute command at the command prompt to identify any failures on the path to the gateway.&lt;br /&gt;Use FTP to check for connectivity to remote sites.&lt;br /&gt;Download a troubleshooting tool from the PC manufacturer&#39;s website.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;2 Refer to the exhibit. Which set of devices contains only intermediary devices?&lt;br /&gt;&lt;br /&gt;----&gt; A, B, D, G&lt;br /&gt;A, B, E, F&lt;br /&gt;C, D, G, I&lt;br /&gt;G, H, I, J&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;3 Refer to the exhibit. When computer A sends a frame to computer D, what computers receive the frame?&lt;br /&gt;&lt;br /&gt;----&gt; only computer D&lt;br /&gt;only computer A and computer D&lt;br /&gt;only computer B, computer C, and computer D&lt;br /&gt;all computers&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;4 Which password is automatically encrypted when it is created?&lt;br /&gt;&lt;br /&gt;vty&lt;br /&gt;aux&lt;br /&gt;console&lt;br /&gt;----&gt; enable secret&lt;br /&gt;enable password&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;5 Which three statements characterize the transport layer protocols? (Choose three.)&lt;br /&gt;&lt;br /&gt;----&gt; TCP and UDP port numbers are used by application layer protocols.&lt;br /&gt;TCP uses port numbers to provide reliable transportation of IP packets.&lt;br /&gt;UDP uses windowing and acknowledgments for reliable transfer of data.&lt;br /&gt;----&gt; TCP uses windowing and sequencing to provide reliable transfer of data.&lt;br /&gt;----&gt; TCP is a connection-oriented protocol. UDP is a connectionless protocol.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;6 Which type of media is immune to EMI and RFI? (Choose two.)&lt;br /&gt;&lt;br /&gt;10 Base-T&lt;br /&gt;10 Base-2&lt;br /&gt;10 Base-5&lt;br /&gt;----&gt; 100 Base-FX&lt;br /&gt;100 Base TX&lt;br /&gt;----&gt; 1000 Base LX&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;7 Refer to the exhibit. A technician is working on a network problem that requires verification of the router LAN interface. What address should be pinged from this host to confirm that the router interface is operational?&lt;br /&gt;&lt;br /&gt;127.0.0.1&lt;br /&gt;192.168.64.196&lt;br /&gt;----&gt; 192.168.254.1&lt;br /&gt;192.168.254.9&lt;br /&gt;192.168.254.254&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;8 Refer to the exhibit. The diagram represents the process of sending email between clients. Select the list below that correctly identifies the component or protocol used at each numbered stage of the diagram.&lt;br /&gt;&lt;br /&gt;1.MUA 2.MDA 3.MTA 4.SMTP 5.MTA 6.POP 7.MDA 8.MUA&lt;br /&gt;1.MUA 2.POP 3.MDA 4.SMTP 5.MTA 6.MDA 7.SMTP 8.MUA&lt;br /&gt;1.MUA 2.POP 3.SMTP 4.MDA 5.MTA 6.SMTP 7.POP 8.MUA&lt;br /&gt;1.MDA 2.SMTP 3.MTA 4.SMTP 5.MTA 6.MUA 7.POP 8.MDA&lt;br /&gt;----&gt; 1.MUA 2.SMTP 3.MTA 4.SMTP 5.MTA 6.MDA 7.POP 8.MUA&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;9 Refer to the exhibit. What function does router RT_A need to provide to allow Internet access for hosts in this network?&lt;br /&gt;&lt;br /&gt;----&gt; address translation&lt;br /&gt;DHCP services&lt;br /&gt;ftpd&lt;br /&gt;web server&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;10 Refer to the exhibit. The network containing router B is experiencing problems. A network associate has isolated the issue in this network to router B? What action can be preformed to correct the network issue?&lt;br /&gt;&lt;br /&gt;issue the ip address command on interface FastEthernet 0/0&lt;br /&gt;----&gt; issue the no shutdown command on interface FastEthernet 0/1&lt;br /&gt;issue the clock rate command on interface Serial 0/0/0&lt;br /&gt;issue the description command on interface Serial 0/0/1&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;11 Which three IPv4 addresses represent a broadcast for a subnet? (Choose three.)&lt;br /&gt;&lt;br /&gt;----&gt; 172.16.4.63 /26&lt;br /&gt;172.16.4.129 /26&lt;br /&gt;----&gt; 172.16.4.191 /26&lt;br /&gt;172.16.4.51 /27&lt;br /&gt;----&gt; 172.16.4.95 /27&lt;br /&gt;172.16.4.221 /27&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;12 What are three characteristics of CSMA/CD? (Choose three.)&lt;br /&gt;&lt;br /&gt;Devices can be configured with a higher transmission priority.&lt;br /&gt;A jam signal indicates that the collision has cleared and the media is not busy.&lt;br /&gt;----&gt; A device listens and waits until the media is not busy before transmitting.&lt;br /&gt;The device with the electronic token is the only one that can transmit after a collision.&lt;br /&gt;----&gt; All of the devices on a segment see data that passes on the network medium.&lt;br /&gt;----&gt; After detecting a collision, hosts can attempt to resume transmission after a random time delay has expired.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;13 In a Cisco IOS device, where is the startup-configuration file stored?&lt;br /&gt;&lt;br /&gt;Flash&lt;br /&gt;----&gt; NVRAM&lt;br /&gt;RAM&lt;br /&gt;ROM&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;14 A routing issue has occurred in you internetwork. Which of the following type of devices should be examined to isolate this error?&lt;br /&gt;&lt;br /&gt;access point&lt;br /&gt;host&lt;br /&gt;hub&lt;br /&gt;----&gt; router&lt;br /&gt;switch&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;15 Which OSI layer protocol does IP rely on to determine whether packets have been lost and to request retransmission?&lt;br /&gt;&lt;br /&gt;application&lt;br /&gt;presentation&lt;br /&gt;session&lt;br /&gt;----&gt; transport&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;16 Due to a security violation, the router passwords must be changed. What information can be learned from the following configuration entries? (Choose two.)&lt;br /&gt;&lt;br /&gt;Router(config)# line vty 0 3&lt;br /&gt;Router(config-line)# password c13c0&lt;br /&gt;Router(config-line)# login&lt;br /&gt;&lt;br /&gt;The entries specify three Telnet lines for remote access.&lt;br /&gt;----&gt; The entries specify four Telnet lines for remote access.&lt;br /&gt;The entries set the console and Telnet password to &quot;c13c0&quot;.&lt;br /&gt;Telnet access will be denied because the Telnet configuration is incomplete.&lt;br /&gt;----&gt; Access will be permitted for Telnet using &quot;c13c0&quot; as the password.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;17 Which prompt represents the appropriate mode used for the copy running-config startup-config command ?&lt;br /&gt;&lt;br /&gt;Switch-6J&gt;&lt;br /&gt;----&gt; Switch-6J#&lt;br /&gt;Switch-6J(config)#&lt;br /&gt;Switch-6J(config-if)#&lt;br /&gt;Switch-6J(config-line)#&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;18 Which combination of network id and subnet mask correctly identifies all IP addresses from 172.16.128.0 through 172.16.159.255?&lt;br /&gt;&lt;br /&gt;172.16.128.0 255.255.255.224&lt;br /&gt;172.16.128.0 255.255.0.0&lt;br /&gt;172.16.128.0 255.255.192.0&lt;br /&gt;----&gt; 172.16.128.0 255.255.224.0&lt;br /&gt;172.16.128.0 255.255.255.192&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;19 When must a router serial interface be configured with the clock rate command?&lt;br /&gt;&lt;br /&gt;when the interface is functioning as a DTE device&lt;br /&gt;when the interface timers have been cleared&lt;br /&gt;when the connected DTE device is shut down&lt;br /&gt;----&gt; when the interface is functioning as a DCE device&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;20 When connectionless protocols are implemented at the lower layers of the OSI model, what are usually used to acknowledge the data receipt and request the retransmission of missing data?&lt;br /&gt;&lt;br /&gt;connectionless acknowledgements&lt;br /&gt;----&gt; upper-layer connection-oriented protocols&lt;br /&gt;Network layer IP protocols&lt;br /&gt;Transport layer UDP protocols&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;21 A technician is asked to secure the privileged EXEC mode of a switch by requiring a password. Which type of password would require this login and be considered the most secure?&lt;br /&gt;&lt;br /&gt;console&lt;br /&gt;enable&lt;br /&gt;----&gt; enable secret&lt;br /&gt;VTY&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;22 Refer to the exhibit. What is required on host A for a network technician to create the initial configuration on RouterA?&lt;br /&gt;&lt;br /&gt;a FTP client&lt;br /&gt;a telnet client&lt;br /&gt;----&gt; a terminal emulation program&lt;br /&gt;a web browser&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;23 Refer to the exhibit. A network administrator remotely accesses the CLI of RouterB from PC1. Which two statements are true about the application layer protocol that is used to make this connection? (Choose two.)&lt;br /&gt;&lt;br /&gt;The data is encrypted.&lt;br /&gt;----&gt; The connection type is called a VTY session.&lt;br /&gt;A server process is running on PC1.&lt;br /&gt;A GET request is sent to RouterB.&lt;br /&gt;----&gt; The application name is the same for the service, protocol, and client.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;24 The Layer 4 header contains which type of information to aid in the delivery of data?&lt;br /&gt;&lt;br /&gt;----&gt; service port number&lt;br /&gt;host logical address&lt;br /&gt;device physical address&lt;br /&gt;virtual connection identifier&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;25 Refer to the exhibit. What two facts can be determined about the exhibited topology? (Choose two.)&lt;br /&gt;&lt;br /&gt;----&gt; A single broadcast domain is present&lt;br /&gt;Two logical address ranges are required.&lt;br /&gt;Three broadcast domains are shown.&lt;br /&gt;Four networks are needed.&lt;br /&gt;----&gt; Five collision domains exist.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;26 Refer to the exhibit. A network technician is trying to determine the correct IP address configuration for Host A. What is a valid configuration for Host A?&lt;br /&gt;&lt;br /&gt;IP address: 192.168.100.19; Subnet Mask: 255.255.255.248; Default Gateway: 192.16.1.2&lt;br /&gt;----&gt; IP address: 192.168.100.20; Subnet Mask: 255.255.255.240; Default Gateway: 192.168.100.17&lt;br /&gt;IP address: 192.168.100.21; Subnet Mask: 255.255.255.248; Default Gateway: 192.168.100.18&lt;br /&gt;IP address: 192.168.100.22; Subnet Mask: 255.255.255.240; Default Gateway: 10.1.1.5&lt;br /&gt;IP address: 192.168.100.30; Subnet Mask: 255.255.255.240; Default Gateway: 192.168.1.1&lt;br /&gt;IP address: 192.168.100.31; Subnet Mask: 255.255.255.240; Default Gateway: 192.168.100.18&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;27 Refer to the exhibit. Cable 1 and cable 2 have the ends wired for specific physical layer requirements. The table lists each segment by number and the cable which has been installed by the network technician between the network components on that segment. From the data given, which segments have the correct cable installed? (Choose three.)&lt;br /&gt;&lt;br /&gt;----&gt; segment1&lt;br /&gt;segment2&lt;br /&gt;----&gt; segment3&lt;br /&gt;----&gt; segment4&lt;br /&gt;segment5&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;28 What is true regarding network layer addressing? (Choose three.)&lt;br /&gt;&lt;br /&gt;uses a flat structure&lt;br /&gt;prevent broadcasts&lt;br /&gt;----&gt; heirarchical&lt;br /&gt;----&gt; uniquely identifies each host&lt;br /&gt;48 bits in length&lt;br /&gt;----&gt; contains a network portion&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;29 Refer to the exhibit. A router, whose table is shown, receives a packet that is destined for 192.168.1.4. How will router treat the packet?&lt;br /&gt;&lt;br /&gt;The packet will be dropped.&lt;br /&gt;The packet will be forwarded via FastEthernet 0/0.&lt;br /&gt;----&gt; The packet will be forwarded to the destination host.&lt;br /&gt;The packet will be forwarded to the 192.168.1.3 next-hop address.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;30 Refer to the exhibit. Which two statements describe the information that is represented in the header? (Choose two.)&lt;br /&gt;&lt;br /&gt;This is a server response.&lt;br /&gt;The UDP protocol is being used.&lt;br /&gt;----&gt; The destination port indicates a Telnet session.&lt;br /&gt;----&gt; The return segment will contain a source port of 23.&lt;br /&gt;The next session originated from the client of this session will use the source port number 13358.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;31 Refer to the exhibit. What is the correct destination socket number for a web page request from Host A to the web server?&lt;br /&gt;&lt;br /&gt;00-08-a3-b6-ce-46&lt;br /&gt;----&gt; 198.133.219.25:80&lt;br /&gt;http://www.cisco.com&lt;br /&gt;C 198.133.219.0/24 is directly connected, FastEthernet0/0&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;32 During the encapsulation process, which identifiers are added at the transport layer?&lt;br /&gt;&lt;br /&gt;two networks routing the packets&lt;br /&gt;----&gt; two applications communicating the data&lt;br /&gt;two hosts at either end of the communication&lt;br /&gt;two nodes on the local network exchanging the frame&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;33 Refer to the exhibit. A student has wired each end of a CAT 5e cable as shown. What is the result? (Choose two.)&lt;br /&gt;&lt;br /&gt;The cable is unusable and must be rewired.&lt;br /&gt;The cable is suitable for use as a Gigabit Ethernet straight-through.&lt;br /&gt;----&gt; The cable is suitable for use as a Fast Ethernet crossover.&lt;br /&gt;The cable is suitable for use as a rollover cable.&lt;br /&gt;The cable is suitable for use as a Gigabit Ethernet crossover.&lt;br /&gt;----&gt; The cable is suitable for use between two 100 Mbps Auto-MDIX capable switches.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;34 Refer to the exhibit. Assume all devices are using default configurations. How many subnets are required to address the topology that is shown?&lt;br /&gt;&lt;br /&gt;1&lt;br /&gt;----&gt; 3&lt;br /&gt;4&lt;br /&gt;5&lt;br /&gt;7&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;35 Refer to the exhibit. On the basis of the IP configuration that is shown, what is the reason that Host A and Host B are unable to communicate outside the local network?&lt;br /&gt;&lt;br /&gt;Host A was assigned a network address.&lt;br /&gt;Host B was assigned a multicast address.&lt;br /&gt;Host A and Host B belong to different networks.&lt;br /&gt;----&gt; The gateway address was assigned a broadcast address.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;36 Refer to the exhibit. Each media link is labeled. What type of cable should be used to connect the different devices?&lt;br /&gt;&lt;br /&gt;Connection 1 - rollover cable&lt;br /&gt;Connection 2 - straight-through cable&lt;br /&gt;Connection 3 - crossover cable&lt;br /&gt;&lt;br /&gt;Connection 1 - crossover cable&lt;br /&gt;Connection 2 - rollover cable&lt;br /&gt;Connection 3 - crossover cable&lt;br /&gt;&lt;br /&gt;Connection 1 - straight-through cable&lt;br /&gt;Connection 2 - crossover cable&lt;br /&gt;Connection 3 - crossover cable&lt;br /&gt;&lt;br /&gt;----&gt; Connection 1 - straight-through cable&lt;br /&gt;Connection 2 - crossover cable&lt;br /&gt;Connection 3 - straight-through cable&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Connection 1 - crossover cable&lt;br /&gt;Connection 2 - straight-through cable&lt;br /&gt;Connection 3 - crossover cable&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;37 Refer to the exhibit. What does the IP address 192.168.33.2 represent?&lt;br /&gt;&lt;br /&gt;The host&#39;s default gateway.&lt;br /&gt;The host&#39;s IP address.&lt;br /&gt;----&gt; The host&#39;s primary domain name server.&lt;br /&gt;The IP address of the website resolver1.mooki.local.&lt;br /&gt;The IP address of the host&#39;s homepage.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;38 Refer to the exhibit. What two facts can be determined from the information that is given? (Choose two.)&lt;br /&gt;&lt;br /&gt;This exchange is part of the three-way handshake.&lt;br /&gt;The source port indicates that a Telnet session has been initiated.&lt;br /&gt;The data is flowing from server to client.&lt;br /&gt;----&gt; The destination port indicates that an HTTP session has been initiated.&lt;br /&gt;X The data listed is associated with the transport layer.&lt;br /&gt;The source port does not support communication with the destination port that is listed.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;39 Which of the following are the address ranges of the private IP addresses? (Choose three.)&lt;br /&gt;&lt;br /&gt;----&gt; 10.0.0.0 to 10.255.255.255&lt;br /&gt;200.100.50.0 to 200.100.25.255&lt;br /&gt;150.150.0.0 to 150.150.255.255&lt;br /&gt;----&gt; 172.16.0.0 to 172.31.255.255&lt;br /&gt;----&gt; 192.168.0.0 to 192.168.255.255&lt;br /&gt;127.16.0.0 to 127.31.255.255&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;40 Which two functions of the OSI model occur at layer two? (Choose two.)&lt;br /&gt;&lt;br /&gt;----&gt; physical addressing&lt;br /&gt;encoding&lt;br /&gt;routing&lt;br /&gt;cabling&lt;br /&gt;----&gt; media access control&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;41 Which range of port numbers are reserved for services that are commonly used by applications that run on servers?&lt;br /&gt;&lt;br /&gt;0 to 255&lt;br /&gt;----&gt; 0 to 1023&lt;br /&gt;1024 to 49151&lt;br /&gt;49152 to 65535&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;42 As network administrator, what is the subnet mask that allows 510 hosts given the IP address 172.30.0.0?&lt;br /&gt;&lt;br /&gt;255.255.0.0&lt;br /&gt;255.255.248.0&lt;br /&gt;255.255.252.0&lt;br /&gt;----&gt; 255.255.254.0&lt;br /&gt;255.255.255.0&lt;br /&gt;255.255.255.128&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;43 Refer to the exhibit. The tracert command is initiated from PC1 to the destination PC4. Which device will send a response to the initial packet from PC1?&lt;br /&gt;&lt;br /&gt;----&gt; London&lt;br /&gt;Paris&lt;br /&gt;Athens&lt;br /&gt;Ankara&lt;br /&gt;PC4&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;44 Refer to the exhibit. Host A is transmitting data to host B. What addresses will host A use to for the destination IP and MAC addresses in this communication?&lt;br /&gt;&lt;br /&gt;Destination MAC: BBBB:BBBB:BBBB Destination IP: 172.22.0.62&lt;br /&gt;Destination MAC: DDDD:DDDD:DDDD Destination IP: 172.22.0.75&lt;br /&gt;Destination MAC: EEEE:EEEE:EEEE Destination IP: 172.22.0.62&lt;br /&gt;Destination MAC: BBBB:BBBB:BBBB Destination IP: 172.22.0.75&lt;br /&gt;----&gt; Destination MAC: EEEE:EEEE:EEEE Destination IP: 172.22.0.75&lt;br /&gt;Destination MAC: DDDD:DDDD:DDDD Destination IP: 172.22.0.94&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;45 Refer to the exhibit. Which logical topology best describes the exhibited network?&lt;br /&gt;&lt;br /&gt;star&lt;br /&gt;ring&lt;br /&gt;point-to-point&lt;br /&gt;----&gt; multiaccess&lt;br /&gt;mesh&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;46 Examine the graphic with current configurations. Host A in the Clerical offices failed and was replaced. Although a ping to 127.0.0.1 was successful, the replacement computer can not access the company network. What is the likely cause of the problem?&lt;br /&gt;&lt;br /&gt;IP address incorrectly entered&lt;br /&gt;network cables unplugged&lt;br /&gt;----&gt; subnet mask incorrectly entered&lt;br /&gt;network card failure&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;47 Refer to the exhibit. With the router running NAT, what IP addresses can be applied to the computer to allow access to the Internet? (Choose three.)&lt;br /&gt;&lt;br /&gt;192.168.18.38&lt;br /&gt;192.168.18.48&lt;br /&gt;----&gt; 192.168.18.49&lt;br /&gt;----&gt; 192.168.18.52&lt;br /&gt;----&gt; 192.168.18.59&lt;br /&gt;192.168.18.63&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;48 Refer to the exhibit. What three statements are true about the IP configuration that is shown? (Choose three.)&lt;br /&gt;&lt;br /&gt;----&gt; The address that is assigned to the computer represents private addressing.&lt;br /&gt;----&gt; The computer is unable to communicate outside of the local network.&lt;br /&gt;The network of this computer can have 126 hosts.&lt;br /&gt;----&gt; The prefix of the computer address is /27.&lt;br /&gt;The IP address that is assigned to the computer is routable on the Internet.&lt;br /&gt;The IP address that is assigned to the computer is a broadcast address.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;49 Refer to the exhibit. Host A attempts to establish a TCP/IP session with host C. During this attempt, a frame was captured with the source MAC address 0050.7320.D632 and the destination MAC address 0030.8517.44C4. The packet inside the captured frame has an IP source address 192.168.7.5, and the destination IP address is 192.168.219.24. At which point in the network was this packet captured?&lt;br /&gt;&lt;br /&gt;leaving host A&lt;br /&gt;leaving ATL&lt;br /&gt;----&gt; leaving Dallas&lt;br /&gt;leaving NYC&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;50 Which of the following OSI layers offers reliable, connection-oriented data communication services?&lt;br /&gt;&lt;br /&gt;application&lt;br /&gt;presentation&lt;br /&gt;session&lt;br /&gt;----&gt; transport&lt;br /&gt;network</content><link rel='replies' type='application/atom+xml' href='http://crazyu-ccna-exploration.blogspot.com/feeds/2132057100583212153/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://crazyu-ccna-exploration.blogspot.com/2009/12/ccna1-finalupdated-jan-14-2009.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/565733589089419925/posts/default/2132057100583212153'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/565733589089419925/posts/default/2132057100583212153'/><link rel='alternate' type='text/html' href='http://crazyu-ccna-exploration.blogspot.com/2009/12/ccna1-finalupdated-jan-14-2009.html' title='CCNA1 FINAL(Updated Jan 14 - 2009)'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-565733589089419925.post-1347162651031465019</id><published>2009-12-28T09:54:00.000-08:00</published><updated>2009-12-28T23:32:13.152-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="CCNA 1 Final Test"/><title type='text'>CCNA1 Final Test v2</title><content type='html'>&lt;meta equiv=&quot;Content-Type&quot; content=&quot;text/html; charset=utf-8&quot;&gt;&lt;meta name=&quot;ProgId&quot; content=&quot;Word.Document&quot;&gt;&lt;meta name=&quot;Generator&quot; content=&quot;Microsoft Word 12&quot;&gt;&lt;meta name=&quot;Originator&quot; content=&quot;Microsoft Word 12&quot;&gt;&lt;link rel=&quot;File-List&quot; href=&quot;file:///C:%5CUsers%5CCRAZYB%7E1%5CAppData%5CLocal%5CTemp%5Cmsohtmlclip1%5C01%5Cclip_filelist.xml&quot;&gt;&lt;link rel=&quot;themeData&quot; href=&quot;file:///C:%5CUsers%5CCRAZYB%7E1%5CAppData%5CLocal%5CTemp%5Cmsohtmlclip1%5C01%5Cclip_themedata.thmx&quot;&gt;&lt;link rel=&quot;colorSchemeMapping&quot; href=&quot;file:///C:%5CUsers%5CCRAZYB%7E1%5CAppData%5CLocal%5CTemp%5Cmsohtmlclip1%5C01%5Cclip_colorschememapping.xml&quot;&gt;&lt;!--[if gte mso 9]&gt;&lt;xml&gt;  &lt;w:worddocument&gt;   &lt;w:view&gt;Normal&lt;/w:View&gt;   &lt;w:zoom&gt;0&lt;/w:Zoom&gt;   &lt;w:trackmoves/&gt;   &lt;w:trackformatting/&gt;   &lt;w:punctuationkerning/&gt;   &lt;w:validateagainstschemas/&gt;   &lt;w:saveifxmlinvalid&gt;false&lt;/w:SaveIfXMLInvalid&gt;   &lt;w:ignoremixedcontent&gt;false&lt;/w:IgnoreMixedContent&gt;   &lt;w:alwaysshowplaceholdertext&gt;false&lt;/w:AlwaysShowPlaceholderText&gt;   &lt;w:donotpromoteqf/&gt;   &lt;w:lidthemeother&gt;EN-US&lt;/w:LidThemeOther&gt;   &lt;w:lidthemeasian&gt;ZH-CN&lt;/w:LidThemeAsian&gt;   &lt;w:lidthemecomplexscript&gt;X-NONE&lt;/w:LidThemeComplexScript&gt;   &lt;w:compatibility&gt;    &lt;w:breakwrappedtables/&gt;    &lt;w:snaptogridincell/&gt;    &lt;w:wraptextwithpunct/&gt;    &lt;w:useasianbreakrules/&gt;    &lt;w:dontgrowautofit/&gt;    &lt;w:splitpgbreakandparamark/&gt;    &lt;w:dontvertaligncellwithsp/&gt;    &lt;w:dontbreakconstrainedforcedtables/&gt;    &lt;w:dontvertalignintxbx/&gt;    &lt;w:word11kerningpairs/&gt;    &lt;w:cachedcolbalance/&gt;    &lt;w:usefelayout/&gt;   &lt;/w:Compatibility&gt;   &lt;w:browserlevel&gt;MicrosoftInternetExplorer4&lt;/w:BrowserLevel&gt;   &lt;m:mathpr&gt;    &lt;m:mathfont val=&quot;Cambria Math&quot;&gt;    &lt;m:brkbin val=&quot;before&quot;&gt;    &lt;m:brkbinsub val=&quot;&amp;#45;-&quot;&gt;    &lt;m:smallfrac val=&quot;off&quot;&gt;    &lt;m:dispdef/&gt;    &lt;m:lmargin val=&quot;0&quot;&gt;    &lt;m:rmargin val=&quot;0&quot;&gt;    &lt;m:defjc val=&quot;centerGroup&quot;&gt;    &lt;m:wrapindent val=&quot;1440&quot;&gt;    &lt;m:intlim val=&quot;subSup&quot;&gt;    &lt;m:narylim val=&quot;undOvr&quot;&gt;   &lt;/m:mathPr&gt;&lt;/w:WordDocument&gt; &lt;/xml&gt;&lt;![endif]--&gt;&lt;!--[if gte mso 9]&gt;&lt;xml&gt;  &lt;w:latentstyles deflockedstate=&quot;false&quot; defunhidewhenused=&quot;true&quot; defsemihidden=&quot;true&quot; defqformat=&quot;false&quot; defpriority=&quot;99&quot; latentstylecount=&quot;267&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;0&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; qformat=&quot;true&quot; name=&quot;Normal&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;9&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; qformat=&quot;true&quot; name=&quot;heading 1&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;9&quot; qformat=&quot;true&quot; name=&quot;heading 2&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;9&quot; qformat=&quot;true&quot; name=&quot;heading 3&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;9&quot; qformat=&quot;true&quot; name=&quot;heading 4&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;9&quot; qformat=&quot;true&quot; name=&quot;heading 5&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;9&quot; qformat=&quot;true&quot; name=&quot;heading 6&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;9&quot; qformat=&quot;true&quot; name=&quot;heading 7&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;9&quot; qformat=&quot;true&quot; name=&quot;heading 8&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;9&quot; qformat=&quot;true&quot; name=&quot;heading 9&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;39&quot; name=&quot;toc 1&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;39&quot; name=&quot;toc 2&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;39&quot; name=&quot;toc 3&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;39&quot; name=&quot;toc 4&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;39&quot; name=&quot;toc 5&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;39&quot; name=&quot;toc 6&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;39&quot; name=&quot;toc 7&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;39&quot; name=&quot;toc 8&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;39&quot; name=&quot;toc 9&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;35&quot; qformat=&quot;true&quot; name=&quot;caption&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;10&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; qformat=&quot;true&quot; name=&quot;Title&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;1&quot; name=&quot;Default Paragraph Font&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;11&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; qformat=&quot;true&quot; name=&quot;Subtitle&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;22&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; qformat=&quot;true&quot; name=&quot;Strong&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;20&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; qformat=&quot;true&quot; name=&quot;Emphasis&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;59&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Table Grid&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Placeholder Text&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;1&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; qformat=&quot;true&quot; name=&quot;No Spacing&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;60&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Light Shading&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;61&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Light List&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;62&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Light Grid&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;63&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Medium Shading 1&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;64&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Medium Shading 2&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;65&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Medium List 1&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;66&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Medium List 2&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;67&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Medium Grid 1&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;68&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Medium Grid 2&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;69&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Medium Grid 3&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;70&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Dark List&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;71&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Colorful Shading&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;72&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Colorful List&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;73&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Colorful Grid&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;60&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Light Shading Accent 1&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;61&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Light List Accent 1&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;62&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Light Grid Accent 1&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;63&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Medium Shading 1 Accent 1&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;64&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Medium Shading 2 Accent 1&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;65&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Medium List 1 Accent 1&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Revision&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;34&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; qformat=&quot;true&quot; name=&quot;List Paragraph&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;29&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; qformat=&quot;true&quot; name=&quot;Quote&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;30&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; qformat=&quot;true&quot; name=&quot;Intense Quote&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;66&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Medium List 2 Accent 1&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;67&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Medium Grid 1 Accent 1&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;68&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Medium Grid 2 Accent 1&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;69&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Medium Grid 3 Accent 1&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;70&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Dark List Accent 1&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;71&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Colorful Shading Accent 1&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;72&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Colorful List Accent 1&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;73&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Colorful Grid Accent 1&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;60&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Light Shading Accent 2&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;61&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Light List Accent 2&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;62&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Light Grid Accent 2&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;63&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Medium Shading 1 Accent 2&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;64&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Medium Shading 2 Accent 2&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;65&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Medium List 1 Accent 2&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;66&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Medium List 2 Accent 2&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;67&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Medium Grid 1 Accent 2&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;68&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Medium Grid 2 Accent 2&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;69&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Medium Grid 3 Accent 2&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;70&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Dark List Accent 2&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;71&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Colorful Shading Accent 2&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;72&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Colorful List Accent 2&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;73&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Colorful Grid Accent 2&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;60&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Light Shading Accent 3&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;61&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Light List Accent 3&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;62&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Light Grid Accent 3&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;63&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Medium Shading 1 Accent 3&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;64&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Medium Shading 2 Accent 3&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;65&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Medium List 1 Accent 3&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;66&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Medium List 2 Accent 3&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;67&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Medium Grid 1 Accent 3&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;68&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Medium Grid 2 Accent 3&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;69&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Medium Grid 3 Accent 3&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;70&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Dark List Accent 3&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;71&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Colorful Shading Accent 3&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;72&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Colorful List Accent 3&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;73&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Colorful Grid Accent 3&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;60&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Light Shading Accent 4&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;61&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Light List Accent 4&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;62&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Light Grid Accent 4&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;63&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Medium Shading 1 Accent 4&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;64&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Medium Shading 2 Accent 4&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;65&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Medium List 1 Accent 4&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;66&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Medium List 2 Accent 4&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;67&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Medium Grid 1 Accent 4&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;68&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Medium Grid 2 Accent 4&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;69&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Medium Grid 3 Accent 4&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;70&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Dark List Accent 4&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;71&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Colorful Shading Accent 4&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;72&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Colorful List Accent 4&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;73&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Colorful Grid Accent 4&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;60&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Light Shading Accent 5&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;61&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Light List Accent 5&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;62&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Light Grid Accent 5&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;63&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Medium Shading 1 Accent 5&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;64&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Medium Shading 2 Accent 5&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;65&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Medium List 1 Accent 5&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;66&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Medium List 2 Accent 5&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;67&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Medium Grid 1 Accent 5&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;68&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Medium Grid 2 Accent 5&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;69&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Medium Grid 3 Accent 5&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;70&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Dark List Accent 5&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;71&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Colorful Shading Accent 5&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;72&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Colorful List Accent 5&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;73&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Colorful Grid Accent 5&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;60&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Light Shading Accent 6&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;61&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Light List Accent 6&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;62&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Light Grid Accent 6&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;63&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Medium Shading 1 Accent 6&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;64&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Medium Shading 2 Accent 6&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;65&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Medium List 1 Accent 6&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;66&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Medium List 2 Accent 6&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;67&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Medium Grid 1 Accent 6&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;68&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Medium Grid 2 Accent 6&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;69&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Medium Grid 3 Accent 6&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;70&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Dark List Accent 6&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;71&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Colorful Shading Accent 6&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;72&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Colorful List Accent 6&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;73&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Colorful Grid Accent 6&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;19&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; qformat=&quot;true&quot; name=&quot;Subtle Emphasis&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;21&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; qformat=&quot;true&quot; name=&quot;Intense Emphasis&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;31&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; qformat=&quot;true&quot; name=&quot;Subtle Reference&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;32&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; qformat=&quot;true&quot; name=&quot;Intense Reference&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;33&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; qformat=&quot;true&quot; name=&quot;Book Title&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;37&quot; name=&quot;Bibliography&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;39&quot; qformat=&quot;true&quot; name=&quot;TOC Heading&quot;&gt;  &lt;/w:LatentStyles&gt; &lt;/xml&gt;&lt;![endif]--&gt;&lt;style&gt; &lt;!--  /* Font Definitions */  @font-face 	{font-family:宋体; 	panose-1:2 1 6 0 3 1 1 1 1 1; 	mso-font-alt:SimSun; 	mso-font-charset:134; 	mso-generic-font-family:auto; 	mso-font-pitch:variable; 	mso-font-signature:3 680460288 22 0 262145 0;} @font-face 	{font-family:&quot;Cambria Math&quot;; 	panose-1:2 4 5 3 5 4 6 3 2 4; 	mso-font-charset:0; 	mso-generic-font-family:roman; 	mso-font-pitch:variable; 	mso-font-signature:-1610611985 1107304683 0 0 415 0;} @font-face 	{font-family:Calibri; 	panose-1:2 15 5 2 2 2 4 3 2 4; 	mso-font-charset:0; 	mso-generic-font-family:swiss; 	mso-font-pitch:variable; 	mso-font-signature:-520092929 1073786111 9 0 415 0;} @font-face 	{font-family:&quot;\@宋体&quot;; 	panose-1:2 1 6 0 3 1 1 1 1 1; 	mso-font-charset:134; 	mso-generic-font-family:auto; 	mso-font-pitch:variable; 	mso-font-signature:3 680460288 22 0 262145 0;}  /* Style Definitions */  p.MsoNormal, li.MsoNormal, div.MsoNormal 	{mso-style-unhide:no; 	mso-style-qformat:yes; 	mso-style-parent:&quot;&quot;; 	margin-top:0in; 	margin-right:0in; 	margin-bottom:10.0pt; 	margin-left:0in; 	line-height:115%; 	mso-pagination:widow-orphan; 	font-size:11.0pt; 	font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;; 	mso-ascii-font-family:Calibri; 	mso-ascii-theme-font:minor-latin; 	mso-fareast-font-family:宋体; 	mso-fareast-theme-font:minor-fareast; 	mso-hansi-font-family:Calibri; 	mso-hansi-theme-font:minor-latin; 	mso-bidi-font-family:&quot;Times New Roman&quot;; 	mso-bidi-theme-font:minor-bidi;} .MsoChpDefault 	{mso-style-type:export-only; 	mso-default-props:yes; 	mso-ascii-font-family:Calibri; 	mso-ascii-theme-font:minor-latin; 	mso-fareast-font-family:宋体; 	mso-fareast-theme-font:minor-fareast; 	mso-hansi-font-family:Calibri; 	mso-hansi-theme-font:minor-latin; 	mso-bidi-font-family:&quot;Times New Roman&quot;; 	mso-bidi-theme-font:minor-bidi;} .MsoPapDefault 	{mso-style-type:export-only; 	margin-bottom:10.0pt; 	line-height:115%;} @page Section1 	{size:8.5in 11.0in; 	margin:1.0in 1.25in 1.0in 1.25in; 	mso-header-margin:.5in; 	mso-footer-margin:.5in; 	mso-paper-source:0;} div.Section1 	{page:Section1;} --&gt; &lt;/style&gt;&lt;!--[if gte mso 10]&gt; &lt;style&gt;  /* Style Definitions */  table.MsoNormalTable 	{mso-style-name:&quot;Table Normal&quot;; 	mso-tstyle-rowband-size:0; 	mso-tstyle-colband-size:0; 	mso-style-noshow:yes; 	mso-style-priority:99; 	mso-style-qformat:yes; 	mso-style-parent:&quot;&quot;; 	mso-padding-alt:0in 5.4pt 0in 5.4pt; 	mso-para-margin-top:0in; 	mso-para-margin-right:0in; 	mso-para-margin-bottom:10.0pt; 	mso-para-margin-left:0in; 	line-height:115%; 	mso-pagination:widow-orphan; 	font-size:11.0pt; 	font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;; 	mso-ascii-font-family:Calibri; 	mso-ascii-theme-font:minor-latin; 	mso-hansi-font-family:Calibri; 	mso-hansi-theme-font:minor-latin; 	mso-bidi-font-family:&quot;Times New Roman&quot;; 	mso-bidi-theme-font:minor-bidi;} &lt;/style&gt; &lt;![endif]--&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;1. Which devices segment collision domains? (Choose two.)?&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;span style=&quot;font-family: 宋体;&quot; lang=&quot;ZH-CN&quot;&gt;•&lt;/span&gt;&lt;span style=&quot;&quot;&gt;             &lt;/span&gt;transceiver&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;span style=&quot;font-family: 宋体; color: red;&quot; lang=&quot;ZH-CN&quot;&gt;•&lt;/span&gt;&lt;span style=&quot;color: red;&quot;&gt;&lt;span style=&quot;&quot;&gt;             &lt;/span&gt;router &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;span style=&quot;font-family: 宋体; color: red;&quot; lang=&quot;ZH-CN&quot;&gt;•&lt;/span&gt;&lt;span style=&quot;color: red;&quot;&gt;&lt;span style=&quot;&quot;&gt;             &lt;/span&gt;switch &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;span style=&quot;font-family: 宋体;&quot; lang=&quot;ZH-CN&quot;&gt;•&lt;/span&gt;&lt;span style=&quot;&quot;&gt;             &lt;/span&gt;hub &lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;span style=&quot;font-family: 宋体;&quot; lang=&quot;ZH-CN&quot;&gt;•&lt;/span&gt;&lt;span style=&quot;&quot;&gt;             &lt;/span&gt;media&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;o:p&gt; &lt;/o:p&gt;&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;2. Refer to the exhibit. How many collision domains are present in the topology? &lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;span style=&quot;font-family: 宋体;&quot; lang=&quot;ZH-CN&quot;&gt;•&lt;/span&gt;&lt;span style=&quot;&quot;&gt;             &lt;/span&gt;3 &lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;span style=&quot;font-family: 宋体;&quot; lang=&quot;ZH-CN&quot;&gt;•&lt;/span&gt;&lt;span style=&quot;&quot;&gt;             &lt;/span&gt;5 &lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;span style=&quot;font-family: 宋体;&quot; lang=&quot;ZH-CN&quot;&gt;•&lt;/span&gt;&lt;span style=&quot;&quot;&gt;             &lt;/span&gt;6 &lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;span style=&quot;font-family: 宋体; color: red;&quot; lang=&quot;ZH-CN&quot;&gt;•&lt;/span&gt;&lt;span style=&quot;color: red;&quot;&gt;&lt;span style=&quot;&quot;&gt;             &lt;/span&gt;7 &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;span style=&quot;font-family: 宋体;&quot; lang=&quot;ZH-CN&quot;&gt;•&lt;/span&gt;&lt;span style=&quot;&quot;&gt;             &lt;/span&gt;8 &lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;span style=&quot;font-family: 宋体;&quot; lang=&quot;ZH-CN&quot;&gt;•&lt;/span&gt;&lt;span style=&quot;&quot;&gt;             &lt;/span&gt;9&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;o:p&gt; &lt;/o:p&gt;&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;3. Refer to the exhibit. An instructor in the network class has given the students the network diagram and asks the students to select the appropriate network devices. The goals are to provide a collision-free LAN environment and to provide Internet connectivity. What is the correct design? &lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;span style=&quot;font-family: 宋体;&quot; lang=&quot;ZH-CN&quot;&gt;•&lt;/span&gt;&lt;span style=&quot;&quot;&gt;             &lt;/span&gt;Replace Box 1 with a hub and Box 2 with a router. &lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;span style=&quot;font-family: 宋体;&quot; lang=&quot;ZH-CN&quot;&gt;•&lt;/span&gt;&lt;span style=&quot;&quot;&gt;             &lt;/span&gt;Replace Box 1 with a router and Box 2 with a bridge. &lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;span style=&quot;font-family: 宋体; color: red;&quot; lang=&quot;ZH-CN&quot;&gt;•&lt;/span&gt;&lt;span style=&quot;color: red;&quot;&gt;&lt;span style=&quot;&quot;&gt;             &lt;/span&gt;Replace Box 1 with a Layer 2 switch and Box 2 with a router. &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;span style=&quot;font-family: 宋体;&quot; lang=&quot;ZH-CN&quot;&gt;•&lt;/span&gt;&lt;span style=&quot;&quot;&gt;             &lt;/span&gt;Replace Box 1 with a router and Box 2 with a Layer 2 switch. &lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;span style=&quot;font-family: 宋体;&quot; lang=&quot;ZH-CN&quot;&gt;•&lt;/span&gt;&lt;span style=&quot;&quot;&gt;             &lt;/span&gt;Replace Box 1 with a bridge and Box 2 with a Layer 2 switch.&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;o:p&gt; &lt;/o:p&gt;&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;4. Refer to the exhibit. A network administrator attempts to increase the available bandwidth for workstation A by setting the NIC to full-duplex mode. After the configuration is changed, there are increased collisions and errors occurring. Why is this occurring in the network? &lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;span style=&quot;font-family: 宋体; color: red;&quot; lang=&quot;ZH-CN&quot;&gt;•&lt;/span&gt;&lt;span style=&quot;color: red;&quot;&gt;&lt;span style=&quot;&quot;&gt;             &lt;/span&gt;The NIC is no longer detecting collisions. &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;span style=&quot;font-family: 宋体;&quot; lang=&quot;ZH-CN&quot;&gt;•&lt;/span&gt;&lt;span style=&quot;&quot;&gt;             &lt;/span&gt;The switch will not support full-duplex mode. &lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;span style=&quot;font-family: 宋体;&quot; lang=&quot;ZH-CN&quot;&gt;•&lt;/span&gt;&lt;span style=&quot;&quot;&gt;             &lt;/span&gt;The hub will be continually producing a jam signal. &lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;span style=&quot;font-family: 宋体;&quot; lang=&quot;ZH-CN&quot;&gt;•&lt;/span&gt;&lt;span style=&quot;&quot;&gt;             &lt;/span&gt;The cabling will not support bidirectional transmissions. &lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;o:p&gt; &lt;/o:p&gt;&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;5. Refer to the exhibit. A network administrator is testing a connectivity issue in the network. The administrator discovers that host A cannot communicate with host B, host C, or RouterA. A ping command on host A to 127.0.0.1 succeeds. The NIC link indicator on host A is illuminated. Temporarily, the administrator removes the cable from host A and uses the LAN cable from host B to connect from host A to port 1 on the switch. While using the substitute cable, host A can communicate with host C and RouterA. At which layer of the OSI model was the problem occurring? &lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;span style=&quot;font-family: 宋体;&quot; lang=&quot;ZH-CN&quot;&gt;•&lt;/span&gt;&lt;span style=&quot;&quot;&gt;             &lt;/span&gt;session &lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;span style=&quot;font-family: 宋体;&quot; lang=&quot;ZH-CN&quot;&gt;•&lt;/span&gt;&lt;span style=&quot;&quot;&gt;             &lt;/span&gt;transport &lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;span style=&quot;font-family: 宋体;&quot; lang=&quot;ZH-CN&quot;&gt;•&lt;/span&gt;&lt;span style=&quot;&quot;&gt;             &lt;/span&gt;network &lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;span style=&quot;font-family: 宋体;&quot; lang=&quot;ZH-CN&quot;&gt;•&lt;/span&gt;&lt;span style=&quot;&quot;&gt;             &lt;/span&gt;data link &lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;span style=&quot;font-family: 宋体; color: red;&quot; lang=&quot;ZH-CN&quot;&gt;•&lt;/span&gt;&lt;span style=&quot;color: red;&quot;&gt;&lt;span style=&quot;&quot;&gt;             &lt;/span&gt;physical&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;o:p&gt; &lt;/o:p&gt;&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;6. How many broadcast domains are shown in the diagram?&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;span style=&quot;font-family: 宋体; color: red;&quot; lang=&quot;ZH-CN&quot;&gt;•&lt;/span&gt;&lt;span style=&quot;color: red;&quot;&gt;&lt;span style=&quot;&quot;&gt;             &lt;/span&gt;three &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;span style=&quot;font-family: 宋体;&quot; lang=&quot;ZH-CN&quot;&gt;•&lt;/span&gt;&lt;span style=&quot;&quot;&gt;             &lt;/span&gt;four &lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;span style=&quot;font-family: 宋体;&quot; lang=&quot;ZH-CN&quot;&gt;•&lt;/span&gt;&lt;span style=&quot;&quot;&gt;             &lt;/span&gt;five &lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;span style=&quot;font-family: 宋体;&quot; lang=&quot;ZH-CN&quot;&gt;•&lt;/span&gt;&lt;span style=&quot;&quot;&gt;             &lt;/span&gt;six &lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;span style=&quot;font-family: 宋体;&quot; lang=&quot;ZH-CN&quot;&gt;•&lt;/span&gt;&lt;span style=&quot;&quot;&gt;             &lt;/span&gt;seven &lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;span style=&quot;font-family: 宋体;&quot; lang=&quot;ZH-CN&quot;&gt;•&lt;/span&gt;&lt;span style=&quot;&quot;&gt;             &lt;/span&gt;eight&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;o:p&gt; &lt;/o:p&gt;&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;7. A collision has occurred on an Ethernet network. Which three statements explain the CSMA/CD process? (Choose three.) &lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;span style=&quot;font-family: 宋体; color: red;&quot; lang=&quot;ZH-CN&quot;&gt;•&lt;/span&gt;&lt;span style=&quot;color: red;&quot;&gt;&lt;span style=&quot;&quot;&gt;             &lt;/span&gt;After the jam signal, all transmission stops for a random period. &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;span style=&quot;font-family: 宋体;&quot; lang=&quot;ZH-CN&quot;&gt;•&lt;/span&gt;&lt;span style=&quot;&quot;&gt;             &lt;/span&gt;When the collision is detected, the hosts stop transmission immediately. &lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;span style=&quot;font-family: 宋体;&quot; lang=&quot;ZH-CN&quot;&gt;•&lt;/span&gt;&lt;span style=&quot;&quot;&gt;             &lt;/span&gt;When the collision is detected, the hosts stop transmission after eight microseconds&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;span style=&quot;font-family: 宋体;&quot; lang=&quot;ZH-CN&quot;&gt;•&lt;/span&gt;&lt;span style=&quot;&quot;&gt;             &lt;/span&gt;When the backoff period expires, the hosts involved in the collision have priority to transmit&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;span style=&quot;font-family: 宋体; color: red;&quot; lang=&quot;ZH-CN&quot;&gt;•&lt;/span&gt;&lt;span style=&quot;color: red;&quot;&gt;&lt;span style=&quot;&quot;&gt;             &lt;/span&gt;When the backoff period expires, each host checks to see whether the networking media is idle and then attempts to transmit. &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;span style=&quot;font-family: 宋体; color: red;&quot; lang=&quot;ZH-CN&quot;&gt;•&lt;/span&gt;&lt;span style=&quot;color: red;&quot;&gt;&lt;span style=&quot;&quot;&gt;             &lt;/span&gt;When the collision is detected, the hosts continue to transmit using a jam pattern for a short time to ensure that all hosts detect the collision. &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;o:p&gt; &lt;/o:p&gt;&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;8. Which of the following devices extend a collision domain? (Choose two.) &lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;span style=&quot;font-family: 宋体;&quot; lang=&quot;ZH-CN&quot;&gt;•&lt;/span&gt;&lt;span style=&quot;&quot;&gt;             &lt;/span&gt;switch &lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;span style=&quot;font-family: 宋体; color: red;&quot; lang=&quot;ZH-CN&quot;&gt;•&lt;/span&gt;&lt;span style=&quot;color: red;&quot;&gt;&lt;span style=&quot;&quot;&gt;             &lt;/span&gt;hub &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;span style=&quot;font-family: 宋体;&quot; lang=&quot;ZH-CN&quot;&gt;•&lt;/span&gt;&lt;span style=&quot;&quot;&gt;             &lt;/span&gt;bridge &lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;span style=&quot;font-family: 宋体;&quot; lang=&quot;ZH-CN&quot;&gt;•&lt;/span&gt;&lt;span style=&quot;&quot;&gt;             &lt;/span&gt;router &lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;span style=&quot;font-family: 宋体; color: red;&quot; lang=&quot;ZH-CN&quot;&gt;•&lt;/span&gt;&lt;span style=&quot;color: red;&quot;&gt;&lt;span style=&quot;&quot;&gt;             &lt;/span&gt;repeater&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;o:p&gt; &lt;/o:p&gt;&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;9. What should a network administrator consider when migrating to Gigabit Ethernet architecture from Fast Ethernet? (Choose three.) &lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;span style=&quot;font-family: 宋体; color: red;&quot; lang=&quot;ZH-CN&quot;&gt;•&lt;/span&gt;&lt;span style=&quot;color: red;&quot;&gt;&lt;span style=&quot;&quot;&gt;             &lt;/span&gt;Existing NICs might need to be upgraded. &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;span style=&quot;font-family: 宋体; color: red;&quot; lang=&quot;ZH-CN&quot;&gt;•&lt;/span&gt;&lt;span style=&quot;color: red;&quot;&gt;&lt;span style=&quot;&quot;&gt;             &lt;/span&gt;Existing switches might need to be upgraded. &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;span style=&quot;font-family: 宋体;&quot; lang=&quot;ZH-CN&quot;&gt;•&lt;/span&gt;&lt;span style=&quot;&quot;&gt;             &lt;/span&gt;Existing NICs must support half-duplex mode. &lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;span style=&quot;font-family: 宋体;&quot; lang=&quot;ZH-CN&quot;&gt;•&lt;/span&gt;&lt;span style=&quot;&quot;&gt;             &lt;/span&gt;Existing UTP wiring must be replaced with fiber. &lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;span style=&quot;font-family: 宋体; color: red;&quot; lang=&quot;ZH-CN&quot;&gt;•&lt;/span&gt;&lt;span style=&quot;color: red;&quot;&gt;&lt;span style=&quot;&quot;&gt;             &lt;/span&gt;Existing UTP must be tested for CAT 5e compatibility. &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;span style=&quot;font-family: 宋体;&quot; lang=&quot;ZH-CN&quot;&gt;•&lt;/span&gt;&lt;span style=&quot;&quot;&gt;             &lt;/span&gt;Existing network topology must support shared media. &lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;o:p&gt; &lt;/o:p&gt;&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;o:p&gt; &lt;/o:p&gt;&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;10. Refer to the exhibit. What must be configured on Host B to allow it to communicate with the Host C? (Choose three.) &lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;span style=&quot;font-family: 宋体;&quot; lang=&quot;ZH-CN&quot;&gt;•&lt;/span&gt;&lt;span style=&quot;&quot;&gt;             &lt;/span&gt;the MAC address of RTA router interface connected to Switch 1 &lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;span style=&quot;font-family: 宋体; color: red;&quot; lang=&quot;ZH-CN&quot;&gt;•&lt;/span&gt;&lt;span style=&quot;color: red;&quot;&gt;&lt;span style=&quot;&quot;&gt;             &lt;/span&gt;a unique host IP address &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;span style=&quot;font-family: 宋体;&quot; lang=&quot;ZH-CN&quot;&gt;•&lt;/span&gt;&lt;span style=&quot;&quot;&gt;             &lt;/span&gt;the IP address of Switch 1&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;span style=&quot;font-family: 宋体;&quot; lang=&quot;ZH-CN&quot;&gt;•&lt;/span&gt;&lt;span style=&quot;&quot;&gt;             &lt;/span&gt;the default gateway address &lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;span style=&quot;font-family: 宋体; color: red;&quot; lang=&quot;ZH-CN&quot;&gt;•&lt;/span&gt;&lt;span style=&quot;color: red;&quot;&gt;&lt;span style=&quot;&quot;&gt;             &lt;/span&gt;the MAC address of Host C &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;span style=&quot;font-family: 宋体; color: red;&quot; lang=&quot;ZH-CN&quot;&gt;•&lt;/span&gt;&lt;span style=&quot;color: red;&quot;&gt;&lt;span style=&quot;&quot;&gt;             &lt;/span&gt;the subnet mask for the LAN LAN&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;o:p&gt; &lt;/o:p&gt;&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;11. Which binary number is a representation of the decimal number 248? &lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;span style=&quot;font-family: 宋体;&quot; lang=&quot;ZH-CN&quot;&gt;•&lt;/span&gt;&lt;span style=&quot;&quot;&gt;             &lt;/span&gt;11101000 &lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;span style=&quot;font-family: 宋体;&quot; lang=&quot;ZH-CN&quot;&gt;•&lt;/span&gt;&lt;span style=&quot;&quot;&gt;             &lt;/span&gt;11110100 &lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;span style=&quot;font-family: 宋体; color: red;&quot; lang=&quot;ZH-CN&quot;&gt;•&lt;/span&gt;&lt;span style=&quot;color: red;&quot;&gt;&lt;span style=&quot;&quot;&gt;             &lt;/span&gt;11111000 &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;span style=&quot;font-family: 宋体;&quot; lang=&quot;ZH-CN&quot;&gt;•&lt;/span&gt;&lt;span style=&quot;&quot;&gt;             &lt;/span&gt;11111010&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;o:p&gt; &lt;/o:p&gt;&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;12. Which type of address is 223.168.17.167/29? 223.168.17.167/29&lt;span style=&quot;font-family: 宋体;&quot; lang=&quot;ZH-CN&quot;&gt;？&lt;/span&gt;&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;span style=&quot;font-family: 宋体;&quot; lang=&quot;ZH-CN&quot;&gt;•&lt;/span&gt;&lt;span style=&quot;&quot;&gt;             &lt;/span&gt;host address &lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;span style=&quot;font-family: 宋体;&quot; lang=&quot;ZH-CN&quot;&gt;•&lt;/span&gt;&lt;span style=&quot;&quot;&gt;             &lt;/span&gt;multicast address&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;span style=&quot;font-family: 宋体; color: red;&quot; lang=&quot;ZH-CN&quot;&gt;•&lt;/span&gt;&lt;span style=&quot;color: red;&quot;&gt;&lt;span style=&quot;&quot;&gt;             &lt;/span&gt;broadcast address&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;span style=&quot;font-family: 宋体;&quot; lang=&quot;ZH-CN&quot;&gt;•&lt;/span&gt;&lt;span style=&quot;&quot;&gt;             &lt;/span&gt;subnetwork address &lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;o:p&gt; &lt;/o:p&gt;&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;13. Workstation A sends data to workstation B. What will have to be altered as the data passes through the router? (Choose two.) &lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;span style=&quot;font-family: 宋体; color: red;&quot; lang=&quot;ZH-CN&quot;&gt;•&lt;/span&gt;&lt;span style=&quot;color: red;&quot;&gt;&lt;span style=&quot;&quot;&gt;             &lt;/span&gt;Layer 1 bit pattern &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;span style=&quot;font-family: 宋体; color: red;&quot; lang=&quot;ZH-CN&quot;&gt;•&lt;/span&gt;&lt;span style=&quot;color: red;&quot;&gt;&lt;span style=&quot;&quot;&gt;             &lt;/span&gt;Layer 2 frames &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;span style=&quot;font-family: 宋体;&quot; lang=&quot;ZH-CN&quot;&gt;•&lt;/span&gt;&lt;span style=&quot;&quot;&gt;             &lt;/span&gt;Layer 3 packets &lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;span style=&quot;font-family: 宋体;&quot; lang=&quot;ZH-CN&quot;&gt;•&lt;/span&gt;&lt;span style=&quot;&quot;&gt;             &lt;/span&gt;Layer 4 segments &lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;span style=&quot;font-family: 宋体;&quot; lang=&quot;ZH-CN&quot;&gt;•&lt;/span&gt;&lt;span style=&quot;&quot;&gt;             &lt;/span&gt;Layer 5 -7 data&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;o:p&gt; &lt;/o:p&gt;&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;14. Which combination of network id and subnet mask correctly identifies all IP addresses from 172.16.128.0 through 172.16.159.255? &lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;span style=&quot;font-family: 宋体;&quot; lang=&quot;ZH-CN&quot;&gt;•&lt;/span&gt;&lt;span style=&quot;&quot;&gt;             &lt;/span&gt;172.16.128.0 255.255.255.224 &lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;span style=&quot;font-family: 宋体;&quot; lang=&quot;ZH-CN&quot;&gt;•&lt;/span&gt;&lt;span style=&quot;&quot;&gt;             &lt;/span&gt;172.16.128.0 255.255.0.0 &lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;span style=&quot;font-family: 宋体;&quot; lang=&quot;ZH-CN&quot;&gt;•&lt;/span&gt;&lt;span style=&quot;&quot;&gt;             &lt;/span&gt;172.16.128.0 255.255.192.0 &lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;span style=&quot;font-family: 宋体; color: red;&quot; lang=&quot;ZH-CN&quot;&gt;•&lt;/span&gt;&lt;span style=&quot;color: red;&quot;&gt;&lt;span style=&quot;&quot;&gt;             &lt;/span&gt;172.16.128.0 255.255.224.0 &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;span style=&quot;font-family: 宋体;&quot; lang=&quot;ZH-CN&quot;&gt;•&lt;/span&gt;&lt;span style=&quot;&quot;&gt;             &lt;/span&gt;172.16.128.0 255.255.255.192&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;o:p&gt; &lt;/o:p&gt;&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;15. What is the correct number of usable subnetworks and hosts for the IP network address 192.168.99.0 subnetted with a /29 mask? &lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;span style=&quot;font-family: 宋体;&quot; lang=&quot;ZH-CN&quot;&gt;•&lt;/span&gt;&lt;span style=&quot;&quot;&gt;             &lt;/span&gt;6 networks / 32 hosts &lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;span style=&quot;font-family: 宋体;&quot; lang=&quot;ZH-CN&quot;&gt;•&lt;/span&gt;&lt;span style=&quot;&quot;&gt;             &lt;/span&gt;14 networks / 14 hosts &lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;span style=&quot;font-family: 宋体; color: red;&quot; lang=&quot;ZH-CN&quot;&gt;•&lt;/span&gt;&lt;span style=&quot;color: red;&quot;&gt;&lt;span style=&quot;&quot;&gt;             &lt;/span&gt;30 networks / 6 hosts &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;span style=&quot;font-family: 宋体;&quot; lang=&quot;ZH-CN&quot;&gt;•&lt;/span&gt;&lt;span style=&quot;&quot;&gt;             &lt;/span&gt;62 networks / 2 hosts&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;o:p&gt; &lt;/o:p&gt;&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;16. Refer to the exhibit. The internetwork in the exhibit has been assigned the IP address 172.20.0.0. What would be the appropriate subnet mask to maximize the number of networks available for future growth? &lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;span style=&quot;font-family: 宋体;&quot; lang=&quot;ZH-CN&quot;&gt;•&lt;/span&gt;&lt;span style=&quot;&quot;&gt;             &lt;/span&gt;255.255.224.0 &lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;span style=&quot;font-family: 宋体;&quot; lang=&quot;ZH-CN&quot;&gt;•&lt;/span&gt;&lt;span style=&quot;&quot;&gt;             &lt;/span&gt;255.255.240.0 &lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;span style=&quot;font-family: 宋体;&quot; lang=&quot;ZH-CN&quot;&gt;•&lt;/span&gt;&lt;span style=&quot;&quot;&gt;             &lt;/span&gt;255.255.248.0 &lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;span style=&quot;font-family: 宋体; color: red;&quot; lang=&quot;ZH-CN&quot;&gt;•&lt;/span&gt;&lt;span style=&quot;color: red;&quot;&gt;&lt;span style=&quot;&quot;&gt;             &lt;/span&gt;255.255.252.0 &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;span style=&quot;font-family: 宋体;&quot; lang=&quot;ZH-CN&quot;&gt;•&lt;/span&gt;&lt;span style=&quot;&quot;&gt;             &lt;/span&gt;255.255.254.0 &lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;span style=&quot;font-family: 宋体;&quot; lang=&quot;ZH-CN&quot;&gt;•&lt;/span&gt;&lt;span style=&quot;&quot;&gt;             &lt;/span&gt;255.255.255.0&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;o:p&gt; &lt;/o:p&gt;&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;17. A NIC of a computer has been assigned an IP address of 172.31.192.166 with a mask of 255.255.255.248. To which subnet does the IP address belong? &lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;span style=&quot;font-family: 宋体;&quot; lang=&quot;ZH-CN&quot;&gt;•&lt;/span&gt;&lt;span style=&quot;&quot;&gt;             &lt;/span&gt;172.31.0.0 &lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;span style=&quot;font-family: 宋体;&quot; lang=&quot;ZH-CN&quot;&gt;•&lt;/span&gt;&lt;span style=&quot;&quot;&gt;             &lt;/span&gt;172.31.160.0 &lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;span style=&quot;font-family: 宋体;&quot; lang=&quot;ZH-CN&quot;&gt;•&lt;/span&gt;&lt;span style=&quot;&quot;&gt;             &lt;/span&gt;172.31.192.0 &lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;span style=&quot;font-family: 宋体;&quot; lang=&quot;ZH-CN&quot;&gt;•&lt;/span&gt;&lt;span style=&quot;&quot;&gt;             &lt;/span&gt;172.31.248.0 &lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;span style=&quot;font-family: 宋体; color: red;&quot; lang=&quot;ZH-CN&quot;&gt;•&lt;/span&gt;&lt;span style=&quot;color: red;&quot;&gt;&lt;span style=&quot;&quot;&gt;             &lt;/span&gt;172.31.192.160 &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;span style=&quot;font-family: 宋体;&quot; lang=&quot;ZH-CN&quot;&gt;•&lt;/span&gt;&lt;span style=&quot;&quot;&gt;             &lt;/span&gt;172.31.192.248&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;o:p&gt; &lt;/o:p&gt;&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;18. What are three characteristics of the TCP protocol? (Choose three.) &lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;span style=&quot;&quot;&gt; &lt;/span&gt;exchanges datagrams unreliably &lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;span style=&quot;font-family: 宋体;&quot; lang=&quot;ZH-CN&quot;&gt;•&lt;/span&gt;&lt;span style=&quot;&quot;&gt;             &lt;/span&gt;is used to send IP error messages &lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;span style=&quot;font-family: 宋体; color: red;&quot; lang=&quot;ZH-CN&quot;&gt;•&lt;/span&gt;&lt;span style=&quot;color: red;&quot;&gt;&lt;span style=&quot;&quot;&gt;             &lt;/span&gt;forces the retransmission of unacknowledged packets &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;span style=&quot;font-family: 宋体; color: red;&quot; lang=&quot;ZH-CN&quot;&gt;•&lt;/span&gt;&lt;span style=&quot;color: red;&quot;&gt;&lt;span style=&quot;&quot;&gt;             &lt;/span&gt;creates a virtual session between end-user applications&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;span style=&quot;font-family: 宋体;&quot; lang=&quot;ZH-CN&quot;&gt;•&lt;/span&gt;&lt;span style=&quot;&quot;&gt;             &lt;/span&gt;carries the IP address of the destination host in the TCP header &lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;span style=&quot;font-family: 宋体; color: red;&quot; lang=&quot;ZH-CN&quot;&gt;•&lt;/span&gt;&lt;span style=&quot;color: red;&quot;&gt;&lt;span style=&quot;&quot;&gt;             &lt;/span&gt;is responsible for breaking messages into segments and reassembling them at their destination &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;o:p&gt; &lt;/o:p&gt;&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;19. A network user is using the FTP protocol to transfer data from the local host to an FTP server. The local host is also using the SNMP protocol to report the system status to the network management system. Which statement describes the communication from the host? &lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;span style=&quot;font-family: 宋体;&quot; lang=&quot;ZH-CN&quot;&gt;•&lt;/span&gt;&lt;span style=&quot;&quot;&gt;             &lt;/span&gt;FTP and SNMP will use the same port number. &lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;span style=&quot;font-family: 宋体; color: red;&quot; lang=&quot;ZH-CN&quot;&gt;•&lt;/span&gt;&lt;span style=&quot;color: red;&quot;&gt;&lt;span style=&quot;&quot;&gt;             &lt;/span&gt;FTP uses TCP to establish a session before any data is transferred. &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;span style=&quot;font-family: 宋体;&quot; lang=&quot;ZH-CN&quot;&gt;•&lt;/span&gt;&lt;span style=&quot;&quot;&gt;             &lt;/span&gt;The UDP session will reorder the SNMP data as it is received by the network management system. &lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;span style=&quot;font-family: 宋体;&quot; lang=&quot;ZH-CN&quot;&gt;•&lt;/span&gt;&lt;span style=&quot;&quot;&gt;             &lt;/span&gt;The TCP protocol for the FTP transfer will use a random destination port number to the FTP server. &lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;o:p&gt; &lt;/o:p&gt;&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;20. Which protocols are TCP/IP application layer protocols? (Choose two.)&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;span style=&quot;font-family: 宋体;&quot; lang=&quot;ZH-CN&quot;&gt;•&lt;/span&gt;&lt;span style=&quot;&quot;&gt;             &lt;/span&gt;UDP &lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;span style=&quot;font-family: 宋体; color: red;&quot; lang=&quot;ZH-CN&quot;&gt;•&lt;/span&gt;&lt;span style=&quot;color: red;&quot;&gt;&lt;span style=&quot;&quot;&gt;             &lt;/span&gt;FTP &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;span style=&quot;font-family: 宋体;&quot; lang=&quot;ZH-CN&quot;&gt;•&lt;/span&gt;&lt;span style=&quot;&quot;&gt;             &lt;/span&gt;IP &lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;span style=&quot;font-family: 宋体; color: red;&quot; lang=&quot;ZH-CN&quot;&gt;•&lt;/span&gt;&lt;span style=&quot;color: red;&quot;&gt;&lt;span style=&quot;&quot;&gt;             &lt;/span&gt;SMTP &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;span style=&quot;font-family: 宋体;&quot; lang=&quot;ZH-CN&quot;&gt;•&lt;/span&gt;&lt;span style=&quot;&quot;&gt;             &lt;/span&gt;TCP&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;o:p&gt; &lt;/o:p&gt;&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;21. Which technologies are considered to be WAN technologies? (Choose two.) &lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;span style=&quot;font-family: 宋体;&quot; lang=&quot;ZH-CN&quot;&gt;•&lt;/span&gt;&lt;span style=&quot;&quot;&gt;             &lt;/span&gt;Ethernet &lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;span style=&quot;font-family: 宋体; color: red;&quot; lang=&quot;ZH-CN&quot;&gt;•&lt;/span&gt;&lt;span style=&quot;color: red;&quot;&gt;&lt;span style=&quot;&quot;&gt;             &lt;/span&gt;DSL &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;span style=&quot;font-family: 宋体;&quot; lang=&quot;ZH-CN&quot;&gt;•&lt;/span&gt;&lt;span style=&quot;&quot;&gt;             &lt;/span&gt;Token Ring &lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;span style=&quot;font-family: 宋体; color: red;&quot; lang=&quot;ZH-CN&quot;&gt;•&lt;/span&gt;&lt;span style=&quot;color: red;&quot;&gt;&lt;span style=&quot;&quot;&gt;             &lt;/span&gt;Frame Relay &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;span style=&quot;font-family: 宋体;&quot; lang=&quot;ZH-CN&quot;&gt;•&lt;/span&gt;&lt;span style=&quot;&quot;&gt;             &lt;/span&gt;FDDI&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;o:p&gt; &lt;/o:p&gt;&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;22. Refer to the exhibit. What is the order of the TCP/IP Protocol Data Units as data is moved as indicated through the OSI model? &lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;span style=&quot;font-family: 宋体;&quot; lang=&quot;ZH-CN&quot;&gt;•&lt;/span&gt;&lt;span style=&quot;&quot;&gt;             &lt;/span&gt;data, segments, frames, packets, bits &lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;span style=&quot;font-family: 宋体;&quot; lang=&quot;ZH-CN&quot;&gt;•&lt;/span&gt;&lt;span style=&quot;&quot;&gt;             &lt;/span&gt;data, packets, segments, frames, bits &lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;span style=&quot;font-family: 宋体; color: red;&quot; lang=&quot;ZH-CN&quot;&gt;•&lt;/span&gt;&lt;span style=&quot;color: red;&quot;&gt;&lt;span style=&quot;&quot;&gt;             &lt;/span&gt;data, segments, packets, frames, bits &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;span style=&quot;font-family: 宋体;&quot; lang=&quot;ZH-CN&quot;&gt;•&lt;/span&gt;&lt;span style=&quot;&quot;&gt;             &lt;/span&gt;data, packets, frames, segments, bits&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;o:p&gt; &lt;/o:p&gt;&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;23. Refer to the exhibit. A newly hired technician has a task of terminating CAT 5 UTP cables. The network administrator visually examined the cables the technician terminated. Some of the cables have connectors as shown in the exhibit. What should the network administrator explain to the technician about the cables? &lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;span style=&quot;font-family: 宋体;&quot; lang=&quot;ZH-CN&quot;&gt;•&lt;/span&gt;&lt;span style=&quot;&quot;&gt;             &lt;/span&gt;Both cables are acceptable.&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;span style=&quot;font-family: 宋体; color: red;&quot; lang=&quot;ZH-CN&quot;&gt;•&lt;/span&gt;&lt;span style=&quot;color: red;&quot;&gt;&lt;span style=&quot;&quot;&gt;             &lt;/span&gt;The cable in Graphic A will produce more crosstalk. &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;span style=&quot;font-family: 宋体;&quot; lang=&quot;ZH-CN&quot;&gt;•&lt;/span&gt;&lt;span style=&quot;&quot;&gt;             &lt;/span&gt;The cable in Graphic A should be used in the more critical network segments. &lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;span style=&quot;font-family: 宋体;&quot; lang=&quot;ZH-CN&quot;&gt;•&lt;/span&gt;&lt;span style=&quot;&quot;&gt;             &lt;/span&gt;The cable in Graphic A is preferred because it will be easier to crimp the connector. &lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;o:p&gt; &lt;/o:p&gt;&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;24. Refer to the exhibit. Which type of UTP cable should be used to connect Switch1 to Switch2? &lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;span style=&quot;&quot;&gt; &lt;/span&gt;&lt;span style=&quot;font-family: 宋体;&quot; lang=&quot;ZH-CN&quot;&gt;•&lt;/span&gt;&lt;span style=&quot;&quot;&gt;           &lt;/span&gt;&lt;span style=&quot;&quot;&gt; &lt;/span&gt;rollover &lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;span style=&quot;font-family: 宋体;&quot; lang=&quot;ZH-CN&quot;&gt;•&lt;/span&gt;&lt;span style=&quot;&quot;&gt;             &lt;/span&gt;console &lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;span style=&quot;font-family: 宋体; color: red;&quot; lang=&quot;ZH-CN&quot;&gt;•&lt;/span&gt;&lt;span style=&quot;color: red;&quot;&gt;&lt;span style=&quot;&quot;&gt;             &lt;/span&gt;crossover &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;span style=&quot;font-family: 宋体;&quot; lang=&quot;ZH-CN&quot;&gt;•&lt;/span&gt;&lt;span style=&quot;&quot;&gt;             &lt;/span&gt;straight-through&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;o:p&gt; &lt;/o:p&gt;&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;25. When using Category 5 UTP cable, which RJ-45 pin pairs are used to exchange data between hosts on an Ethernet network? &lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;span style=&quot;font-family: 宋体;&quot; lang=&quot;ZH-CN&quot;&gt;•&lt;/span&gt;&lt;span style=&quot;&quot;&gt;             &lt;/span&gt;1 and 2; 4 and 5 &lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;span style=&quot;font-family: 宋体; color: red;&quot; lang=&quot;ZH-CN&quot;&gt;•&lt;/span&gt;&lt;span style=&quot;color: red;&quot;&gt;&lt;span style=&quot;&quot;&gt;             &lt;/span&gt;1 and 2; 3 and 6 &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;span style=&quot;font-family: 宋体;&quot; lang=&quot;ZH-CN&quot;&gt;•&lt;/span&gt;&lt;span style=&quot;&quot;&gt;             &lt;/span&gt;3 and 6; 7 and 8 &lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;span style=&quot;font-family: 宋体;&quot; lang=&quot;ZH-CN&quot;&gt;•&lt;/span&gt;&lt;span style=&quot;&quot;&gt;             &lt;/span&gt;4 and 5; 7 and 8&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;o:p&gt; &lt;/o:p&gt;&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;26. Refer to the exhibit. Which type of cabling should be used at each of the connection points shown? &lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;span style=&quot;font-family: 宋体;&quot; lang=&quot;ZH-CN&quot;&gt;•&lt;/span&gt;&lt;span style=&quot;&quot;&gt;             &lt;/span&gt;crossover B- straight-through C-straight-through D-fiber E-straight-through &lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;span style=&quot;font-family: 宋体;&quot; lang=&quot;ZH-CN&quot;&gt;•&lt;/span&gt;&lt;span style=&quot;&quot;&gt;             &lt;/span&gt;crossover B-crossover C-straight-through D-fiberE-crossover &lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;span style=&quot;font-family: 宋体; color: red;&quot; lang=&quot;ZH-CN&quot;&gt;•&lt;/span&gt;&lt;span style=&quot;color: red;&quot;&gt;&lt;span style=&quot;&quot;&gt;             &lt;/span&gt;straight-through B-crossover C-straight-through D-fiber E-straight-through &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;span style=&quot;font-family: 宋体;&quot; lang=&quot;ZH-CN&quot;&gt;•&lt;/span&gt;&lt;span style=&quot;&quot;&gt;             &lt;/span&gt;fiberB-crossoverC-straight-throughD-crossoverE-straight-through &lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;span style=&quot;font-family: 宋体;&quot; lang=&quot;ZH-CN&quot;&gt;•&lt;/span&gt;&lt;span style=&quot;&quot;&gt;             &lt;/span&gt;straight-throughB-crossoverC-crossoverD-fiberE-straight-through &lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;span style=&quot;font-family: 宋体;&quot; lang=&quot;ZH-CN&quot;&gt;•&lt;/span&gt;&lt;span style=&quot;&quot;&gt;             &lt;/span&gt;crossoverB-crossoverC-straight-throughD-fiberE-straight-through&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;o:p&gt; &lt;/o:p&gt;&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;27. Refer to the exhibit. What type of cable connects the two routers together without any intermediary device? &lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;span style=&quot;font-family: 宋体;&quot; lang=&quot;ZH-CN&quot;&gt;•&lt;/span&gt;&lt;span style=&quot;&quot;&gt;             &lt;/span&gt;console &lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;span style=&quot;font-family: 宋体;&quot; lang=&quot;ZH-CN&quot;&gt;•&lt;/span&gt;&lt;span style=&quot;&quot;&gt;             &lt;/span&gt;rollover &lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;span style=&quot;font-family: 宋体; color: red;&quot; lang=&quot;ZH-CN&quot;&gt;•&lt;/span&gt;&lt;span style=&quot;color: red;&quot;&gt;&lt;span style=&quot;&quot;&gt;             &lt;/span&gt;crossover &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;span style=&quot;font-family: 宋体;&quot; lang=&quot;ZH-CN&quot;&gt;•&lt;/span&gt;&lt;span style=&quot;&quot;&gt;             &lt;/span&gt;straight-through&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;o:p&gt; &lt;/o:p&gt;&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;28. Which cable diagram displays the end to end pinout for a console cable used with Cisco devices? &lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;span style=&quot;font-family: 宋体;&quot; lang=&quot;ZH-CN&quot;&gt;•&lt;/span&gt;&lt;span style=&quot;&quot;&gt;             &lt;/span&gt;Cable A &lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;span style=&quot;font-family: 宋体; color: red;&quot; lang=&quot;ZH-CN&quot;&gt;•&lt;/span&gt;&lt;span style=&quot;color: red;&quot;&gt;&lt;span style=&quot;&quot;&gt;             &lt;/span&gt;Cable B &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;span style=&quot;font-family: 宋体;&quot; lang=&quot;ZH-CN&quot;&gt;•&lt;/span&gt;&lt;span style=&quot;&quot;&gt;             &lt;/span&gt;Cable C &lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;span style=&quot;font-family: 宋体;&quot; lang=&quot;ZH-CN&quot;&gt;•&lt;/span&gt;&lt;span style=&quot;&quot;&gt;             &lt;/span&gt;Cable D&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;o:p&gt; &lt;/o:p&gt;&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;29. Which subnet masks would be valid for a subnetted Class B address? (Choose two.) &lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;span style=&quot;font-family: 宋体;&quot; lang=&quot;ZH-CN&quot;&gt;•&lt;/span&gt;&lt;span style=&quot;&quot;&gt;             &lt;/span&gt;255.0.0.0 &lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;span style=&quot;font-family: 宋体;&quot; lang=&quot;ZH-CN&quot;&gt;•&lt;/span&gt;&lt;span style=&quot;&quot;&gt;             &lt;/span&gt;255.254.0.0 &lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;span style=&quot;font-family: 宋体;&quot; lang=&quot;ZH-CN&quot;&gt;•&lt;/span&gt;&lt;span style=&quot;&quot;&gt;             &lt;/span&gt;255.224.0.0 &lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;span style=&quot;font-family: 宋体;&quot; lang=&quot;ZH-CN&quot;&gt;•&lt;/span&gt;&lt;span style=&quot;&quot;&gt;             &lt;/span&gt;255.255.0.0 &lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;span style=&quot;font-family: 宋体; color: red;&quot; lang=&quot;ZH-CN&quot;&gt;•&lt;/span&gt;&lt;span style=&quot;color: red;&quot;&gt;&lt;span style=&quot;&quot;&gt;             &lt;/span&gt;255.255.252.0 &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;span style=&quot;font-family: 宋体; color: red;&quot; lang=&quot;ZH-CN&quot;&gt;•&lt;/span&gt;&lt;span style=&quot;color: red;&quot;&gt;&lt;span style=&quot;&quot;&gt;             &lt;/span&gt;255.255.255.192&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;o:p&gt; &lt;/o:p&gt;&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;30. What type of routing is it when the network administrator manually configures a route? &lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;span style=&quot;font-family: 宋体; color: red;&quot; lang=&quot;ZH-CN&quot;&gt;•&lt;/span&gt;&lt;span style=&quot;color: red;&quot;&gt;&lt;span style=&quot;&quot;&gt;             &lt;/span&gt;static &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;span style=&quot;font-family: 宋体;&quot; lang=&quot;ZH-CN&quot;&gt;•&lt;/span&gt;&lt;span style=&quot;&quot;&gt;             &lt;/span&gt;dynamic &lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;span style=&quot;font-family: 宋体;&quot; lang=&quot;ZH-CN&quot;&gt;•&lt;/span&gt;&lt;span style=&quot;&quot;&gt;             &lt;/span&gt;interior &lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;span style=&quot;font-family: 宋体;&quot; lang=&quot;ZH-CN&quot;&gt;•&lt;/span&gt;&lt;span style=&quot;&quot;&gt;             &lt;/span&gt;exterior&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;o:p&gt; &lt;/o:p&gt;&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;31. Which statement describes a star topology? &lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;span style=&quot;font-family: 宋体;&quot; lang=&quot;ZH-CN&quot;&gt;•&lt;/span&gt;&lt;span style=&quot;&quot;&gt;             &lt;/span&gt;Each host in the network is connected to a backbone cable that is terminated at both ends. &lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;span style=&quot;font-family: 宋体; color: red;&quot; lang=&quot;ZH-CN&quot;&gt;•&lt;/span&gt;&lt;span style=&quot;color: red;&quot;&gt;&lt;span style=&quot;&quot;&gt;             &lt;/span&gt;Each host is connected to a hub or switch, either of which acts as a central point for all network connections. &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;span style=&quot;font-family: 宋体;&quot; lang=&quot;ZH-CN&quot;&gt;•&lt;/span&gt;&lt;span style=&quot;&quot;&gt;             &lt;/span&gt;Each host is directly connected to two other hosts to form a long chain of hosts. &lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;span style=&quot;font-family: 宋体;&quot; lang=&quot;ZH-CN&quot;&gt;•&lt;/span&gt;&lt;span style=&quot;&quot;&gt;             &lt;/span&gt;Each host has a connection to all other hosts in the network. &lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;o:p&gt; &lt;/o:p&gt;&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;32. Refer to the exhibit. The connections in the exhibit are labeled A through E. Which of these indicate WAN links? (Choose three.) &lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;span style=&quot;font-family: 宋体;&quot; lang=&quot;ZH-CN&quot;&gt;•&lt;/span&gt;&lt;span style=&quot;&quot;&gt;             &lt;/span&gt;link A &lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;span style=&quot;font-family: 宋体; color: red;&quot; lang=&quot;ZH-CN&quot;&gt;•&lt;/span&gt;&lt;span style=&quot;color: red;&quot;&gt;&lt;span style=&quot;&quot;&gt;             &lt;/span&gt;link B &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;span style=&quot;font-family: 宋体; color: red;&quot; lang=&quot;ZH-CN&quot;&gt;•&lt;/span&gt;&lt;span style=&quot;color: red;&quot;&gt;&lt;span style=&quot;&quot;&gt;             &lt;/span&gt;link C &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;span style=&quot;font-family: 宋体; color: red;&quot; lang=&quot;ZH-CN&quot;&gt;•&lt;/span&gt;&lt;span style=&quot;color: red;&quot;&gt;&lt;span style=&quot;&quot;&gt;             &lt;/span&gt;link D &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;span style=&quot;font-family: 宋体;&quot; lang=&quot;ZH-CN&quot;&gt;•&lt;/span&gt;&lt;span style=&quot;&quot;&gt;             &lt;/span&gt;link E&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;o:p&gt; &lt;/o:p&gt;&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;33. A technician needs to connect a FastEthernet port from a router to a FastEthernet port on a switch. The graphic shows the RJ-45 cable ends for a patch cable. What result can be expected if this cable is used for the link? &lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;span style=&quot;font-family: 宋体; color: red;&quot; lang=&quot;ZH-CN&quot;&gt;•&lt;/span&gt;&lt;span style=&quot;color: red;&quot;&gt;&lt;span style=&quot;&quot;&gt;             &lt;/span&gt;The cable will be able to pass traffic between the devices. &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;span style=&quot;font-family: 宋体;&quot; lang=&quot;ZH-CN&quot;&gt;•&lt;/span&gt;&lt;span style=&quot;&quot;&gt;             &lt;/span&gt;The cable has reversed-pairs, which will degrade the signal quality. &lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;span style=&quot;font-family: 宋体;&quot; lang=&quot;ZH-CN&quot;&gt;•&lt;/span&gt;&lt;span style=&quot;&quot;&gt;             &lt;/span&gt;The cable has split-pairs, which will increase crosstalk and create an unreliable link. &lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;span style=&quot;font-family: 宋体;&quot; lang=&quot;ZH-CN&quot;&gt;•&lt;/span&gt;&lt;span style=&quot;&quot;&gt;             &lt;/span&gt;The cable has all the wires reversed, which will prevent the link lights from indicating that there is link. &lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;o:p&gt; &lt;/o:p&gt;&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;34. Refer to the received frame in the exhibit. In what two ways is the information from the received frame used by a switch? (Choose two.)&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;span style=&quot;font-family: 宋体;&quot; lang=&quot;ZH-CN&quot;&gt;•&lt;/span&gt;&lt;span style=&quot;&quot;&gt;             &lt;/span&gt;192.168.10.5 is used to create an ARP request. &lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;span style=&quot;font-family: 宋体; color: red;&quot; lang=&quot;ZH-CN&quot;&gt;•&lt;/span&gt;&lt;span style=&quot;color: red;&quot;&gt;&lt;span style=&quot;&quot;&gt;             &lt;/span&gt;192.168.10.5 is used to build the forwarding table. &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;span style=&quot;font-family: 宋体;&quot; lang=&quot;ZH-CN&quot;&gt;•&lt;/span&gt;&lt;span style=&quot;&quot;&gt;             &lt;/span&gt;1234.5678.1abc is stripped from the frame header. &lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;span style=&quot;font-family: 宋体;&quot; lang=&quot;ZH-CN&quot;&gt;•&lt;/span&gt;&lt;span style=&quot;&quot;&gt;             &lt;/span&gt;192.168.10.11 is left intact as the frame is forwarded. &lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;span style=&quot;font-family: 宋体;&quot; lang=&quot;ZH-CN&quot;&gt;•&lt;/span&gt;&lt;span style=&quot;&quot;&gt;             &lt;/span&gt;The switch compares 192.168.10.11 to the addresses in the routing table to make the forwarding decision. &lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;span style=&quot;font-family: 宋体; color: red;&quot; lang=&quot;ZH-CN&quot;&gt;•&lt;/span&gt;&lt;span style=&quot;color: red;&quot;&gt;&lt;span style=&quot;&quot;&gt;             &lt;/span&gt;To make the forwarding decision, the switch looks in its switch table for address aaaa.bbbb.cccc. &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;o:p&gt; &lt;/o:p&gt;&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;35. Which layer of the OSI model defines the process of adding the source and destination IP address to a data packet? &lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;span style=&quot;font-family: 宋体;&quot; lang=&quot;ZH-CN&quot;&gt;•&lt;/span&gt;&lt;span style=&quot;&quot;&gt;             &lt;/span&gt;transport &lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;span style=&quot;font-family: 宋体; color: red;&quot; lang=&quot;ZH-CN&quot;&gt;•&lt;/span&gt;&lt;span style=&quot;color: red;&quot;&gt;&lt;span style=&quot;&quot;&gt;             &lt;/span&gt;network &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;span style=&quot;font-family: 宋体;&quot; lang=&quot;ZH-CN&quot;&gt;•&lt;/span&gt;&lt;span style=&quot;&quot;&gt;             &lt;/span&gt;data link &lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;span style=&quot;font-family: 宋体;&quot; lang=&quot;ZH-CN&quot;&gt;•&lt;/span&gt;&lt;span style=&quot;&quot;&gt;             &lt;/span&gt;physical&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;o:p&gt; &lt;/o:p&gt;&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;36. Refer to the exhibit. Workstation 1 pings the Fa0/1 interface of Router 1. Which MAC address will workstation 1 obtain during the ARP request for this communication?&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;span style=&quot;font-family: 宋体;&quot; lang=&quot;ZH-CN&quot;&gt;•&lt;/span&gt;&lt;span style=&quot;&quot;&gt;             &lt;/span&gt;00-06-5B-88-DF-C3 &lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;span style=&quot;font-family: 宋体;&quot; lang=&quot;ZH-CN&quot;&gt;•&lt;/span&gt;&lt;span style=&quot;&quot;&gt;             &lt;/span&gt;B0-D0-7F-F7-46 &lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;span style=&quot;font-family: 宋体;&quot; lang=&quot;ZH-CN&quot;&gt;•&lt;/span&gt;&lt;span style=&quot;&quot;&gt;             &lt;/span&gt;00-0F-24-85-75-C0 &lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;span style=&quot;font-family: 宋体;&quot; lang=&quot;ZH-CN&quot;&gt;•&lt;/span&gt;&lt;span style=&quot;&quot;&gt;             &lt;/span&gt;00-0B-E5-64-BD-44 &lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;span style=&quot;font-family: 宋体; color: red;&quot; lang=&quot;ZH-CN&quot;&gt;•&lt;/span&gt;&lt;span style=&quot;color: red;&quot;&gt;&lt;span style=&quot;&quot;&gt;             &lt;/span&gt;00-08-A3-B6-CE-02 &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;span style=&quot;font-family: 宋体;&quot; lang=&quot;ZH-CN&quot;&gt;•&lt;/span&gt;&lt;span style=&quot;&quot;&gt;             &lt;/span&gt;00-08-A3-B6-CE-03&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;o:p&gt; &lt;/o:p&gt;&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;37. Refer to the exhibit. What device does Device X represent in the graphic to allow PC1 to ping PC4? &lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;span style=&quot;font-family: 宋体;&quot; lang=&quot;ZH-CN&quot;&gt;•&lt;/span&gt;&lt;span style=&quot;&quot;&gt;             &lt;/span&gt;hub &lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;span style=&quot;font-family: 宋体; color: red;&quot; lang=&quot;ZH-CN&quot;&gt;•&lt;/span&gt;&lt;span style=&quot;color: red;&quot;&gt;&lt;span style=&quot;&quot;&gt;             &lt;/span&gt;router &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;span style=&quot;font-family: 宋体;&quot; lang=&quot;ZH-CN&quot;&gt;•&lt;/span&gt;&lt;span style=&quot;&quot;&gt;             &lt;/span&gt;bridge &lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;span style=&quot;font-family: 宋体;&quot; lang=&quot;ZH-CN&quot;&gt;•&lt;/span&gt;&lt;span style=&quot;&quot;&gt;             &lt;/span&gt;access point &lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;span style=&quot;font-family: 宋体;&quot; lang=&quot;ZH-CN&quot;&gt;•&lt;/span&gt;&lt;span style=&quot;&quot;&gt;             &lt;/span&gt;Layer 2 switch&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;o:p&gt; &lt;/o:p&gt;&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;38. When the receiving workstation detects an error in the data it has received, it does not acknowledge receipt of the data. The source workstation retransmits the unacknowledged data. Which layer of the OSI model supports this process of retransmission? &lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;span style=&quot;font-family: 宋体;&quot; lang=&quot;ZH-CN&quot;&gt;•&lt;/span&gt;&lt;span style=&quot;&quot;&gt;             &lt;/span&gt;network &lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;span style=&quot;font-family: 宋体;&quot; lang=&quot;ZH-CN&quot;&gt;•&lt;/span&gt;&lt;span style=&quot;&quot;&gt;             &lt;/span&gt;application &lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;span style=&quot;font-family: 宋体;&quot; lang=&quot;ZH-CN&quot;&gt;•&lt;/span&gt;&lt;span style=&quot;&quot;&gt;             &lt;/span&gt;session &lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;span style=&quot;font-family: 宋体; color: red;&quot; lang=&quot;ZH-CN&quot;&gt;•&lt;/span&gt;&lt;span style=&quot;color: red;&quot;&gt;&lt;span style=&quot;&quot;&gt;             &lt;/span&gt;transport&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;o:p&gt; &lt;/o:p&gt;&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;39.A company has the following addressing scheme requirements: -currently has 25 subnets -uses a Class B IP address -has a maximum of 300 computers on any network segment -needs to leave the fewest unused addresses in each subnetWhat subnet mask is appropriate to use in this company?&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;span style=&quot;font-family: 宋体;&quot; lang=&quot;ZH-CN&quot;&gt;•&lt;/span&gt;&lt;span style=&quot;&quot;&gt;             &lt;/span&gt;255.255.240.0 &lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;span style=&quot;font-family: 宋体;&quot; lang=&quot;ZH-CN&quot;&gt;•&lt;/span&gt;&lt;span style=&quot;&quot;&gt;             &lt;/span&gt;255.255.248.0 &lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;span style=&quot;font-family: 宋体; color: red;&quot; lang=&quot;ZH-CN&quot;&gt;•&lt;/span&gt;&lt;span style=&quot;color: red;&quot;&gt;&lt;span style=&quot;&quot;&gt;             &lt;/span&gt;255.255.254.0 &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;span style=&quot;font-family: 宋体;&quot; lang=&quot;ZH-CN&quot;&gt;•&lt;/span&gt;&lt;span style=&quot;&quot;&gt;             &lt;/span&gt;255.255.255.0 &lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;span style=&quot;font-family: 宋体;&quot; lang=&quot;ZH-CN&quot;&gt;•&lt;/span&gt;&lt;span style=&quot;&quot;&gt;             &lt;/span&gt;255.255.255.128 &lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;span style=&quot;font-family: 宋体;&quot; lang=&quot;ZH-CN&quot;&gt;•&lt;/span&gt;&lt;span style=&quot;&quot;&gt;             &lt;/span&gt;255.255.255.248&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;o:p&gt; &lt;/o:p&gt;&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;40. What can be verified by successfully pinging the reserved loopback address on a host?&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;span style=&quot;font-family: 宋体;&quot; lang=&quot;ZH-CN&quot;&gt;•&lt;/span&gt;&lt;span style=&quot;&quot;&gt;             &lt;/span&gt;Connectivity exists between two hosts on the LAN. LAN&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;span style=&quot;font-family: 宋体; color: red;&quot; lang=&quot;ZH-CN&quot;&gt;•&lt;/span&gt;&lt;span style=&quot;color: red;&quot;&gt;&lt;span style=&quot;&quot;&gt;             &lt;/span&gt;The TCP/IP stack of the local host is installed correctly. &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;span style=&quot;font-family: 宋体;&quot; lang=&quot;ZH-CN&quot;&gt;•&lt;/span&gt;&lt;span style=&quot;&quot;&gt;             &lt;/span&gt;A connection exists between a host and the default gateway. &lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;span style=&quot;font-family: 宋体;&quot; lang=&quot;ZH-CN&quot;&gt;•&lt;/span&gt;&lt;span style=&quot;&quot;&gt;             &lt;/span&gt;The route a packet takes from the local host to a remote host is valid. &lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;o:p&gt; &lt;/o:p&gt;&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;41. Refer to the exhibit. A company needs to attach workstation E at a point 150 meters from an existing hub. What device should be placed at location D to allow the new host to connect to the network with the least amount of latency? &lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;span style=&quot;font-family: 宋体;&quot; lang=&quot;ZH-CN&quot;&gt;•&lt;/span&gt;&lt;span style=&quot;&quot;&gt;             &lt;/span&gt;router &lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;span style=&quot;font-family: 宋体;&quot; lang=&quot;ZH-CN&quot;&gt;•&lt;/span&gt;&lt;span style=&quot;&quot;&gt;             &lt;/span&gt;switch &lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;span style=&quot;font-family: 宋体;&quot; lang=&quot;ZH-CN&quot;&gt;•&lt;/span&gt;&lt;span style=&quot;&quot;&gt;             &lt;/span&gt;bridge &lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;span style=&quot;font-family: 宋体; color: red;&quot; lang=&quot;ZH-CN&quot;&gt;•&lt;/span&gt;&lt;span style=&quot;color: red;&quot;&gt;&lt;span style=&quot;&quot;&gt;             &lt;/span&gt;repeater&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;o:p&gt; &lt;/o:p&gt;&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;42. Refer to the exhibit. Which type of Category 5 cable is used to make an Ethernet connection between Host A and Host B? &lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;span style=&quot;font-family: 宋体;&quot; lang=&quot;ZH-CN&quot;&gt;•&lt;/span&gt;&lt;span style=&quot;&quot;&gt;             &lt;/span&gt;coax cable &lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;span style=&quot;font-family: 宋体;&quot; lang=&quot;ZH-CN&quot;&gt;•&lt;/span&gt;&lt;span style=&quot;&quot;&gt;             &lt;/span&gt;rollover cable &lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;span style=&quot;font-family: 宋体; color: red;&quot; lang=&quot;ZH-CN&quot;&gt;•&lt;/span&gt;&lt;span style=&quot;color: red;&quot;&gt;&lt;span style=&quot;&quot;&gt;             &lt;/span&gt;crossover cable &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;span style=&quot;font-family: 宋体;&quot; lang=&quot;ZH-CN&quot;&gt;•&lt;/span&gt;&lt;span style=&quot;&quot;&gt;             &lt;/span&gt;straight-through cable&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;o:p&gt; &lt;/o:p&gt;&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;43. A simplified CAM table for Switch1 is shown in the exhibit. If host A sends a frame with a destination MAC address of 66C, how does the switch process this frame? &lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;span style=&quot;font-family: 宋体;&quot; lang=&quot;ZH-CN&quot;&gt;•&lt;/span&gt;&lt;span style=&quot;&quot;&gt;             &lt;/span&gt;The switch drops the frame. &lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;span style=&quot;font-family: 宋体;&quot; lang=&quot;ZH-CN&quot;&gt;•&lt;/span&gt;&lt;span style=&quot;&quot;&gt;             &lt;/span&gt;The switch sends the frame out port 3. &lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;span style=&quot;font-family: 宋体;&quot; lang=&quot;ZH-CN&quot;&gt;•&lt;/span&gt;&lt;span style=&quot;&quot;&gt;             &lt;/span&gt;The switch sends the frame out ports 1, 2, and 4. &lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;span style=&quot;font-family: 宋体; color: red;&quot; lang=&quot;ZH-CN&quot;&gt;•&lt;/span&gt;&lt;span style=&quot;color: red;&quot;&gt;&lt;span style=&quot;&quot;&gt;             &lt;/span&gt;The switch sends the frame out ports 2, 3, and 4. &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;span style=&quot;font-family: 宋体;&quot; lang=&quot;ZH-CN&quot;&gt;•&lt;/span&gt;&lt;span style=&quot;&quot;&gt;             &lt;/span&gt;The switch sends the frame out ports 1, 2, 3, and 4. &lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;o:p&gt; &lt;/o:p&gt;&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;44. Which of the following increases the potential for a collision to occur? &lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;span style=&quot;font-family: 宋体;&quot; lang=&quot;ZH-CN&quot;&gt;•&lt;/span&gt;&lt;span style=&quot;&quot;&gt;             &lt;/span&gt;the use of an active hub instead of an intelligent hub &lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;span style=&quot;font-family: 宋体;&quot; lang=&quot;ZH-CN&quot;&gt;•&lt;/span&gt;&lt;span style=&quot;&quot;&gt;             &lt;/span&gt;the use of an intelligent hub instead of an active hub&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;span style=&quot;font-family: 宋体;&quot; lang=&quot;ZH-CN&quot;&gt;•&lt;/span&gt;&lt;span style=&quot;&quot;&gt;             &lt;/span&gt;a reduction in the number of devices attached to the hub &lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;span style=&quot;font-family: 宋体; color: red;&quot; lang=&quot;ZH-CN&quot;&gt;•&lt;/span&gt;&lt;span style=&quot;color: red;&quot;&gt;&lt;span style=&quot;&quot;&gt;             &lt;/span&gt;an increase in the number of devices attached to the hub &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;o:p&gt; &lt;/o:p&gt;&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;45. Refer to the exhibit. Host A has been added to the network. However, host A cannot communicate with the server B or the Internet. All cables have been tested and are functioning to standards. At which layer of the OSI model is this problem occurring? &lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;span style=&quot;font-family: 宋体;&quot; lang=&quot;ZH-CN&quot;&gt;•&lt;/span&gt;&lt;span style=&quot;&quot;&gt;             &lt;/span&gt;Layer 1 &lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;span style=&quot;font-family: 宋体;&quot; lang=&quot;ZH-CN&quot;&gt;•&lt;/span&gt;&lt;span style=&quot;&quot;&gt;             &lt;/span&gt;Layer 2 &lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;span style=&quot;font-family: 宋体; color: red;&quot; lang=&quot;ZH-CN&quot;&gt;•&lt;/span&gt;&lt;span style=&quot;color: red;&quot;&gt;&lt;span style=&quot;&quot;&gt;             &lt;/span&gt;Layer 3 &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;span style=&quot;font-family: 宋体;&quot; lang=&quot;ZH-CN&quot;&gt;•&lt;/span&gt;&lt;span style=&quot;&quot;&gt;             &lt;/span&gt;Layer 4&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;o:p&gt; &lt;/o:p&gt;&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;46. A workstation is browsing a web server. What will be the partial contents of the segment sent from the workstation to the web server?&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;o:p&gt; &lt;/o:p&gt;&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;span style=&quot;&quot;&gt;                                                &lt;/span&gt;&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;span style=&quot;&quot;&gt;                                                &lt;/span&gt;&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;span style=&quot;&quot;&gt;                                                &lt;/span&gt;&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;47. Refer to the exhibit. What is the purpose of the highlighted address? &lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;span style=&quot;font-family: 宋体; color: red;&quot; lang=&quot;ZH-CN&quot;&gt;•&lt;/span&gt;&lt;span style=&quot;color: red;&quot;&gt;&lt;span style=&quot;&quot;&gt;             &lt;/span&gt;It allows the NIC to communicate with other devices on the same network. &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;span style=&quot;font-family: 宋体;&quot; lang=&quot;ZH-CN&quot;&gt;•&lt;/span&gt;&lt;span style=&quot;&quot;&gt;             &lt;/span&gt;It identifies which part of the IP address is to be considered the network portion. &lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;span style=&quot;font-family: 宋体;&quot; lang=&quot;ZH-CN&quot;&gt;•&lt;/span&gt;&lt;span style=&quot;&quot;&gt;             &lt;/span&gt;It provides an address to which all packets that do not have a specific route are sent. &lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;span style=&quot;font-family: 宋体;&quot; lang=&quot;ZH-CN&quot;&gt;•&lt;/span&gt;&lt;span style=&quot;&quot;&gt;             &lt;/span&gt;It uniquely identifies the NIC to the free token that is passed on the Ethernet network. &lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;o:p&gt; &lt;/o:p&gt;&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;48. Refer to the exhibit. Host A is being manually configured for connectivity to the LAN. Which two addressing scheme combinations are possible configurations that can be applied to the host for connectivity? (Choose two.) &lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;span style=&quot;font-family: 宋体;&quot; lang=&quot;ZH-CN&quot;&gt;•&lt;/span&gt;&lt;span style=&quot;&quot;&gt;             &lt;/span&gt;Address - 192.168.1.14 Gateway - 192.168.1.33 &lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;span style=&quot;font-family: 宋体;&quot; lang=&quot;ZH-CN&quot;&gt;•&lt;/span&gt;&lt;span style=&quot;&quot;&gt;             &lt;/span&gt;Address - 192.168.1.45 Gateway - 192.168.1.33 &lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;span style=&quot;font-family: 宋体;&quot; lang=&quot;ZH-CN&quot;&gt;•&lt;/span&gt;&lt;span style=&quot;&quot;&gt;             &lt;/span&gt;Address - 192.168.1.32 Gateway - 192.168.1.33 &lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;span style=&quot;font-family: 宋体; color: red;&quot; lang=&quot;ZH-CN&quot;&gt;•&lt;/span&gt;&lt;span style=&quot;color: red;&quot;&gt;&lt;span style=&quot;&quot;&gt;             &lt;/span&gt;Address - 192.168.1.82 Gateway - 192.168.1.65 &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;span style=&quot;font-family: 宋体;&quot; lang=&quot;ZH-CN&quot;&gt;•&lt;/span&gt;&lt;span style=&quot;&quot;&gt;             &lt;/span&gt;Address - 192.168.1.63 Gateway - 192.168.1.65 &lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;span style=&quot;font-family: 宋体; color: red;&quot; lang=&quot;ZH-CN&quot;&gt;•&lt;/span&gt;&lt;span style=&quot;color: red;&quot;&gt;&lt;span style=&quot;&quot;&gt;             &lt;/span&gt;Address - 192.168.1.70 Gateway - 192.168.1.65&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;o:p&gt; &lt;/o:p&gt;&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;49. A user initiates three simultaneous FTP connections from the local host to the same FTP server. Which OSI layer is responsible for establishing and managing these different FTP connections? &lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;span style=&quot;font-family: 宋体;&quot; lang=&quot;ZH-CN&quot;&gt;•&lt;/span&gt;&lt;span style=&quot;&quot;&gt;             &lt;/span&gt;application &lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;span style=&quot;font-family: 宋体; color: red;&quot; lang=&quot;ZH-CN&quot;&gt;•&lt;/span&gt;&lt;span style=&quot;color: red;&quot;&gt;&lt;span style=&quot;&quot;&gt;             &lt;/span&gt;session &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;span style=&quot;font-family: 宋体;&quot; lang=&quot;ZH-CN&quot;&gt;•&lt;/span&gt;&lt;span style=&quot;&quot;&gt;             &lt;/span&gt;transport &lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;span style=&quot;font-family: 宋体;&quot; lang=&quot;ZH-CN&quot;&gt;•&lt;/span&gt;&lt;span style=&quot;&quot;&gt;             &lt;/span&gt;network &lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;span style=&quot;font-family: 宋体;&quot; lang=&quot;ZH-CN&quot;&gt;•&lt;/span&gt;&lt;span style=&quot;&quot;&gt;             &lt;/span&gt;data link&lt;/p&gt;  </content><link rel='replies' type='application/atom+xml' href='http://crazyu-ccna-exploration.blogspot.com/feeds/1347162651031465019/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://crazyu-ccna-exploration.blogspot.com/2009/12/ccna1-final-test-b.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/565733589089419925/posts/default/1347162651031465019'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/565733589089419925/posts/default/1347162651031465019'/><link rel='alternate' type='text/html' href='http://crazyu-ccna-exploration.blogspot.com/2009/12/ccna1-final-test-b.html' title='CCNA1 Final Test v2'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-565733589089419925.post-230702986015504816</id><published>2009-12-28T09:32:00.000-08:00</published><updated>2009-12-28T09:42:15.950-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="CCNA 1 Final Test"/><title type='text'>CCNA Exploration 1 – FINAL Exam Answers Version 4.0</title><content type='html'>&lt;p&gt;&lt;span style=&quot;font-family:verdana;&quot;&gt;CCNA1 Final Test&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-family:verdana;&quot;&gt;1. Refer to the exhibit. Host B attempts to establish a TCP/IP session with host C. During this attempt, a frame was captured at the FastEthernet interface fa0/1 of the San Francisco router. The packet inside the captured frame has the source IP address 10.10.1.2, and the destination IP address is 10.31.1.20. What is the destination MAC address of the frame at the time of capture?&lt;br /&gt;&lt;span style=&quot;color:red;&quot;&gt;• 0060.7320.D632&lt;/span&gt;&lt;br /&gt;• 0060.7320.D631&lt;br /&gt;• 0040.8517.44C3&lt;br /&gt;• 0009.B2E4.EE03&lt;br /&gt;• 0010.C2B4.3421&lt;/span&gt;&lt;/p&gt; &lt;p&gt;2. What are three characteristics of CSMA/CD? (Choose three.)&lt;br /&gt;&lt;span style=&quot;color:red;&quot;&gt;• It monitors the media for presence of a data signal.&lt;br /&gt;• After detecting a collision, hosts can resume transmission after a random timer has expired.&lt;br /&gt;• A jam signal is used to ensure that all hosts are aware that a collision has occurred.&lt;/span&gt;&lt;br /&gt;• Devices can be configured with a higher transmission priority.&lt;br /&gt;• Data is transmitted only when the data signal is present.&lt;br /&gt;• It uses a token system to avoid collisions.&lt;br /&gt;&lt;span class=&quot;fullpost&quot;&gt;&lt;br /&gt;&lt;span style=&quot;font-family:verdana;&quot;&gt;3. Refer to the exhibit. The PC, the routing table of which is displayed, is configured correctly. To which network device or interface does the IP address 192.168.1.254 belong?&lt;br /&gt;• PC&lt;br /&gt;• switch&lt;br /&gt;&lt;span style=&quot;color:red;&quot;&gt;• router interface fa0/0&lt;br /&gt;&lt;/span&gt;• router interface fa0/1&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family:verdana;&quot;&gt;4. Refer to the exhibit. Host A wants to access the Internet. Which combination of a Layer 2 address and a Layer 3 address will enable this access from host A?&lt;br /&gt;• Destination MAC: 0030.8596.DE83 Default gateway: 209.165.202.130&lt;br /&gt;• Destination MAC: 0030.8596.DE82 Default gateway: 172.16.9.2&lt;br /&gt;&lt;span style=&quot;color:red;&quot;&gt;• Destination MAC: 0030.8517.44C4 Default gateway: 172.16.1.1&lt;br /&gt;&lt;/span&gt;• Destination MAC: 0030.8517.44C4 Default gateway: 209.165.202.130&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family:verdana;&quot;&gt;5. Refer to the exhibit. Communication between hosts X and Y is restricted to the local network. What is the reason for this?&lt;br /&gt;• The gateway addresses are broadcast addresses.&lt;br /&gt;• Host Y is assigned a multicast address.&lt;br /&gt;&lt;span style=&quot;color:red;&quot;&gt;• Host X and host Y belong to different networks&lt;/span&gt;.&lt;br /&gt;• Host X is assigned a network address.&lt;/span&gt;&lt;/span&gt;&lt;/p&gt; &lt;p&gt;&lt;span style=&quot;font-family:verdana;&quot;&gt;6. What is the result of using the clock rate 56000 command at the serial interface of the router?&lt;br /&gt;&lt;span style=&quot;color:red;&quot;&gt;• The interface is configured as a DCE device.&lt;br /&gt;&lt;/span&gt;• The interface timers are cleared.&lt;br /&gt;• The FastEthernet interface is made to emulate a serial interface by assigning it a timing signal.&lt;br /&gt;• The IP address for the serial interface is configured.&lt;/span&gt;&lt;/p&gt; &lt;p&gt;&lt;span style=&quot;font-family:verdana;&quot;&gt;7. Which three addresses belong to the category of public IP addresses? (Choose three.)&lt;br /&gt;• 127.0.0.1&lt;br /&gt;&lt;span style=&quot;color:red;&quot;&gt;• 196.1.105.6&lt;br /&gt;• 132.11.9.99&lt;br /&gt;&lt;/span&gt;• 10.0.0.1&lt;br /&gt;• 172.16.9.10&lt;br /&gt;&lt;span style=&quot;color:red;&quot;&gt;• 46.1.1.97&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family:verdana;&quot;&gt;&lt;span style=&quot;color:red;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt; &lt;div&gt;&lt;span style=&quot;font-family:verdana;&quot;&gt;8. Which three statements are true about transport layer protocols? (Choose three.)&lt;br /&gt;&lt;span style=&quot;color:red;&quot;&gt;• TCP and UDP manage communication between multiple applications.&lt;br /&gt;&lt;/span&gt;• TCP retransmits the packets for which the acknowledgment is not received.&lt;br /&gt;&lt;span style=&quot;color:red;&quot;&gt;• TCP acknowledges received data.&lt;br /&gt;&lt;/span&gt;• UDP exchanges frames between the nodes of the network.&lt;br /&gt;• TCP has no mechanism to acknowledge transmission errors.&lt;br /&gt;&lt;span style=&quot;color:red;&quot;&gt;• UDP uses windowing and sequencing to provide reliable transfer of data.&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family:verdana;&quot;&gt;9. Refer to the exhibit. Which logical topology describes the exhibited network?&lt;br /&gt;• star&lt;br /&gt;• ring&lt;br /&gt;&lt;span style=&quot;color:red;&quot;&gt;• point-to-point&lt;br /&gt;&lt;/span&gt;• multi-access &lt;/span&gt;&lt;span style=&quot;font-family:verdana;&quot;&gt; &lt;/span&gt;&lt;/div&gt; &lt;p&gt;&lt;span id=&quot;more-175&quot;&gt;&lt;/span&gt;&lt;/p&gt; &lt;div&gt;&lt;span style=&quot;font-family:verdana;&quot;&gt;10. Which statement is true about the running configuration file in a Cisco IOS device?&lt;br /&gt;&lt;span style=&quot;color:red;&quot;&gt;• It affects the operation of the device immediately when modified.&lt;br /&gt;&lt;/span&gt;• It is stored in NVRAM.&lt;br /&gt;• It should be deleted using the erase running-config command.&lt;br /&gt;• It is automatically saved when the router reboots.&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family:verdana;&quot;&gt;11. Refer to the exhibit. Host C is able to ping 127.0.0.1 successfully, but is unable to communicate with hosts A and B in the organization. What is the likely cause of the problem?&lt;br /&gt;• Hosts A and B are not on the same subnet as host C.&lt;br /&gt;• The IP addresses on the router serial interfaces are wrong.&lt;br /&gt;&lt;span style=&quot;color:red;&quot;&gt;• The subnet mask on host C is improperly configured.&lt;br /&gt;&lt;/span&gt;• The FastEthernet interface fa0/0 of router 1 is wrongly configured.&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family:verdana;&quot;&gt;12. A host is transmitting a video over the network. How does the transport layer allow this host to use multiple applications to transmit other data at the same time as the video transmission?&lt;br /&gt;• It uses error control mechanisms.&lt;br /&gt;&lt;span style=&quot;color:red;&quot;&gt;• It uses a connectionless protocol only for multiple simultaneous transmissions.&lt;br /&gt;&lt;/span&gt;• It uses multiple Layer 2 source addresses.&lt;br /&gt;• It uses multiple port numbers.&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family:verdana;&quot;&gt;13. Refer to the exhibit. PC1 is unable to access PC2. To troubleshoot this problem, the technician needs to confirm that the next hop interface is operational. Which default gateway address should the technician ping from PC1 to confirm this?&lt;br /&gt;• 10.0.0.254&lt;br /&gt;• 192.168.0.249&lt;br /&gt;&lt;span style=&quot;color:red;&quot;&gt;• 192.168.0.250&lt;/span&gt;&lt;br /&gt;• 10.0.1.254 &lt;/span&gt;&lt;/div&gt; &lt;div&gt;&lt;span style=&quot;font-family:verdana;&quot;&gt;14. Refer to the exhibit. Cable 1 and Cable 2 are wired for specific physical layer requirements. Which three segments use Cable 2? (Choose three.)&lt;br /&gt;• Segment 1&lt;br /&gt;&lt;span style=&quot;color:red;&quot;&gt;• Segment 2&lt;br /&gt;&lt;/span&gt;• Segment 3&lt;br /&gt;• Segment 4&lt;br /&gt;&lt;span style=&quot;color:red;&quot;&gt;• Segment 5&lt;br /&gt;• Segment 6&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;font-family:verdana;&quot;&gt;15. Refer to the exhibit. Which two facts can be determined about the topology? (Choose two.)&lt;br /&gt;• Three networks are needed.&lt;br /&gt;&lt;span style=&quot;color:red;&quot;&gt;• Two logical address ranges are required.&lt;br /&gt;• A single broadcast domain is present.&lt;br /&gt;&lt;/span&gt;• Three collision domains are present.&lt;br /&gt;• Four networks are needed.&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family:verdana;&quot;&gt;16. Refer to the exhibit. Which three statements are true about the IP configuration that is displayed? (Choose three.)&lt;br /&gt;&lt;span style=&quot;color:red;&quot;&gt;• The assigned address is a private address.&lt;br /&gt;&lt;/span&gt;• The PC cannot communicate with the DNS server.&lt;br /&gt;• The network can have 126 hosts.&lt;br /&gt;&lt;span style=&quot;color:red;&quot;&gt;• The prefix of the computer address is /26.&lt;/span&gt;&lt;br /&gt;• The IP address is routable on the Internet.&lt;br /&gt;• The IP address is a multicast address. &lt;/span&gt;&lt;span style=&quot;font-family:verdana;&quot;&gt;17. Which password restricts Telnet access to the router?&lt;br /&gt;&lt;span style=&quot;color:red;&quot;&gt;• enable&lt;/span&gt;&lt;br /&gt;• enable secret&lt;br /&gt;• console&lt;br /&gt;• VTY&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family:verdana;&quot;&gt;18. Refer to the exhibit. To create the initial configuration, a network technician connected host A to the router using the connection that is shown. Which statement is true about this connection?&lt;br /&gt;• It terminates at the Ethernet port of the router.&lt;br /&gt;&lt;span style=&quot;color:red;&quot;&gt;• It provides out-of-band console access.&lt;br /&gt;&lt;/span&gt;• It terminates at the serial interface of the router.&lt;br /&gt;• It requires a Telnet client on host A to access the router. &lt;/span&gt;&lt;span style=&quot;font-family:verdana;&quot;&gt;19. Which device should be used for routing a packet to a remote network?&lt;br /&gt;• access switch&lt;br /&gt;• DHCP server&lt;br /&gt;• hub&lt;br /&gt;&lt;span style=&quot;color:red;&quot;&gt;• router&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt; &lt;div&gt;&lt;span style=&quot;font-family:verdana;&quot;&gt;20. Refer to the exhibit. The serial interface of the router was configured with the use of the commands that are shown. The router cannot ping the router that is directly connected to interface serial 0/0/0. What should the network technician do to solve this problem?&lt;br /&gt;• Configure the description at interface serial 0/0/0.&lt;br /&gt;&lt;span style=&quot;color:red;&quot;&gt;• Configure an IP address on interface serial 0/0/0.&lt;br /&gt;&lt;/span&gt;• Remove the no shutdown command at interface serial 0/0/0&lt;br /&gt;• Reboot the router.&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family:verdana;&quot;&gt;21. Refer to the exhibit. In a network, host A is sending data segments to host B. The flow control of the segments that are being exchanged is displayed. Which two statements are true about this communication? (Choose two.)&lt;br /&gt;&lt;span style=&quot;color:red;&quot;&gt;• The initial window size is determined via the two-way handshake.&lt;br /&gt;&lt;/span&gt;• The window size for the TCP session that is represented is initially set to 3000 bytes.&lt;br /&gt;&lt;span style=&quot;color:red;&quot;&gt;• Acknowledgment number 3001 indicates that host A will send the next segment with sequence number 3001.&lt;br /&gt;&lt;/span&gt;• Host B expects that the next received segment number will be 3000.&lt;br /&gt;• No more acknowledgments will be exchanged. &lt;/span&gt;&lt;/div&gt; &lt;div&gt;&lt;span style=&quot;font-family:verdana;&quot;&gt;22. Refer to the exhibit. The network administrator wants to remotely access the CLI of the router from PC1 using modem 1. Which port of the router should be connected to modem 2 to enable this access?&lt;br /&gt;• console&lt;br /&gt;• Ethernet&lt;br /&gt;&lt;span style=&quot;color:red;&quot;&gt;• auxiliary&lt;br /&gt;&lt;/span&gt;• serial &lt;/span&gt;&lt;span style=&quot;font-family:verdana;&quot;&gt;23. Which OSI layer uses a connection-oriented protocol to ensure reliable delivery of data?&lt;br /&gt;• application layer&lt;br /&gt;• presentation layer&lt;br /&gt;• session layer&lt;br /&gt;&lt;span style=&quot;color:red;&quot;&gt;• transport layer&lt;/span&gt; &lt;/span&gt;&lt;span style=&quot;font-family:verdana;&quot;&gt;24. What are two functions of the data link layer? (Choose two.)&lt;br /&gt;&lt;span style=&quot;color:red;&quot;&gt;• It segments and reorders the data.&lt;br /&gt;&lt;/span&gt;• It exchanges data between programs that are running on the source and destination hosts.&lt;br /&gt;&lt;span style=&quot;color:red;&quot;&gt;• It controls how data is placed onto the media.&lt;br /&gt;&lt;/span&gt;• It generates signals to represent the bits in each frame.&lt;br /&gt;• It encapsulates each packet with a header and a trailer to transfer it across the local media. &lt;/span&gt;&lt;span style=&quot;font-family:verdana;&quot;&gt;25. Refer to the exhibit. Which list refers only to end devices?&lt;br /&gt;&lt;span style=&quot;color:red;&quot;&gt;• D,E,F,G&lt;br /&gt;&lt;/span&gt;• A,H,B,C&lt;br /&gt;• A,D,E,F&lt;br /&gt;• A,D,E,G&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family:verdana;&quot;&gt;26. Refer to the exhibit. The diagram represents the process of sending e-mail between clients. Which list correctly identifies the component or protocol used at each numbered stage of the diagram?&lt;br /&gt;• 1.MUA 2.MDA 3.MTA 4.SMTP 5.MTA 6.POP 7.MDA 8.MUA&lt;br /&gt;• 1.MUA 2.POP 3.MDA 4.SMTP 5.MTA 6.MDA 7.SMTP 8.MUA&lt;br /&gt;• 1.MUA 2.POP 3.SMTP 4.MDA 5.MTA 6.SMTP 7.POP 8.MUA&lt;br /&gt;&lt;span style=&quot;color:red;&quot;&gt;• 1.MUA 2.SMTP 3.MTA 4.SMTP 5.MTA 6.MDA 7.POP 8.MUA&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family:verdana;&quot;&gt;27. Refer to the exhibit. Host B was powered off. What change will occur in the MAC table of the switch?&lt;br /&gt;The table will remain unaffected.&lt;br /&gt;&lt;span style=&quot;color:red;&quot;&gt;• The switch will remove the MAC address at Fa0/19 immediately.&lt;br /&gt;&lt;/span&gt;• The switch will retain the MAC address until host B is powered on again.&lt;br /&gt;• The switch will rebuild the MAC table by assigning the FFFF.FFFF.FFFF address to port Fa0/19.&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family:verdana;&quot;&gt;28. Refer to the exhibit. A technician has connected the PC to the switch using a Category 6 UTP cable. Which two statements are true about this connection? (Choose two.)&lt;br /&gt;• The cable that is used is an Ethernet crossover cable.&lt;br /&gt;&lt;span style=&quot;color:red;&quot;&gt;• The transmit pin of the cable is terminated to the receive pin.&lt;br /&gt;&lt;/span&gt;• The maximum distance between the switch and the PC can be 100 m.&lt;br /&gt;&lt;span style=&quot;color:red;&quot;&gt;• The maximum supported bandwidth is 1000 Mb/s.&lt;br /&gt;&lt;/span&gt;• The Category 6 cable simulates a point-to-point WAN link and is unusable for this type of connection.&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family:verdana;&quot;&gt;29. Refer to the exhibit. A host is using NAT to connect to the Internet. Which three IP addresses enable this connection? (Choose three.)&lt;br /&gt;• 10.1.1.63&lt;br /&gt;&lt;span style=&quot;color:red;&quot;&gt;• 10.1.1.37&lt;br /&gt;• 10.1.1.39&lt;br /&gt;&lt;/span&gt;• 10.1.1.32&lt;br /&gt;&lt;span style=&quot;color:red;&quot;&gt;• 10.1.1.60&lt;br /&gt;&lt;/span&gt;• 10.1.1.2 &lt;/span&gt;&lt;span style=&quot;font-family:verdana;&quot;&gt;30. Refer to the exhibit. A PC is communicating with another PC on a remote network. The two networks are connected by three routers. Which action will help to identify the path between the hosts?&lt;br /&gt;• Use the ipconfig command at the host.&lt;br /&gt;• Use the ipconfig/all command at the destination.&lt;br /&gt;&lt;span style=&quot;color:red;&quot;&gt;• Use the tracert command at the host.&lt;/span&gt;&lt;br /&gt;• Use the ping command at the destination.&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family:verdana;&quot;&gt;31. An organization wants to create a subnet of the IP network 172.16.0.0. This subnet will accommodate 1000 hosts. Which subnet mask should be assigned to this network?&lt;br /&gt;• 255.255.0.0&lt;br /&gt;&lt;span style=&quot;color:red;&quot;&gt;• 255.255.248.0&lt;/span&gt;&lt;br /&gt;• 255.255.252.0&lt;br /&gt;• 255.255.254.0&lt;br /&gt;• 255.255.255.0&lt;br /&gt;• 255.255.255.128&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family:verdana;&quot;&gt;32. Refer to the exhibit. A host is connected to hub 1. Which combination of IP address, subnet mask, and default gateway can allow this host to function in the network?&lt;br /&gt;• IP address: 172.16.31.36 Subnet mask: 255.255.255.240 Default gateway: 172.16.31.35&lt;br /&gt;• IP address: 172.16.31.63 Subnet mask: 255.255.255.224 Default gateway: 172.16.31.35&lt;br /&gt;IP address: 172.16.31.29 Subnet mask: 255.255.255.248 Default gateway: 172.16.31.35&lt;br /&gt;• IP address: 172.16.31.32 Subnet mask: 255.255.255.224 Default gateway: 172.16.31.35&lt;br /&gt;• IP address: 172.16.31.29 Subnet mask: 255.255.255.240 Default gateway: 172.16.30.1&lt;br /&gt;&lt;span style=&quot;color:red;&quot;&gt;• IP address: 172.16.31.37 Subnet mask: 255.255.255.224 Default gateway: 172.16.31.35&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family:verdana;&quot;&gt;33. Refer to the exhibit. A technician uses the nslookup command on the PC and views the output that is displayed in the exhibit. What is the IP address of the primary domain name server configured at the host? (Choose two.)&lt;br /&gt;• 192.168.1.99&lt;br /&gt;• 192.168.2.100&lt;br /&gt;&lt;span style=&quot;color:red;&quot;&gt;• 10.10.10.32&lt;br /&gt;• 192.168.1.5&lt;br /&gt;&lt;/span&gt;• the IP address of the website resolver1.xyz.local&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family:verdana;&quot;&gt;34. Which OSI layer offers ordered data reconstruction services?&lt;br /&gt;• application layer&lt;br /&gt;• network layer&lt;br /&gt;• presentation layer&lt;br /&gt;• session layer&lt;br /&gt;&lt;span style=&quot;color:red;&quot;&gt;• transport layer&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt; &lt;div&gt;&lt;span style=&quot;font-family:verdana;&quot;&gt;35. Refer to the exhibit. All devices in the network use default configurations. How many logical address ranges are required in this topology?&lt;br /&gt;• 2&lt;br /&gt;• 3&lt;br /&gt;• 4&lt;br /&gt;&lt;span style=&quot;color:red;&quot;&gt;• 5&lt;br /&gt;&lt;/span&gt;• 6&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family:verdana;&quot;&gt;36. The network administrator wants to install a private application on a server. Which range of port numbers is normally assigned to this application to make it accessible by clients?&lt;br /&gt;• 0 to 255&lt;br /&gt;• 49152 to 65535&lt;br /&gt;• 1024 to 49151&lt;br /&gt;&lt;span style=&quot;color:red;&quot;&gt;• 0 to 1023&lt;/span&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family:verdana;&quot;&gt;37. Because of a security violation, the router password must be changed. What information can be learned from these configuration entries? (Choose two.) &lt;/span&gt;&lt;/div&gt; &lt;div&gt;&lt;span style=&quot;;font-family:verdana;font-size:85%;&quot;  &gt;• Router(config)# line vty 0 4&lt;/span&gt;&lt;/div&gt; &lt;div&gt;&lt;span style=&quot;;font-family:verdana;font-size:85%;&quot;  &gt; Router(config-line)# password arj15&lt;/span&gt;&lt;/div&gt; &lt;div&gt;&lt;span style=&quot;font-family:verdana;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt; Router(config-line)# login&lt;/span&gt;&lt;br /&gt;• This configuration allows users to connect by using a modem.&lt;br /&gt;• Users must specify which line, 0 or 4, they wish to connect to when making a connection.&lt;br /&gt;&lt;span style=&quot;color:red;&quot;&gt;• This configuration allows users to connect to the router via the use of the telnet command.&lt;br /&gt;• This configuration allows five users to make simultaneous connections to this router.&lt;br /&gt;&lt;/span&gt;• The configured password is automatically encrypted on the router.&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family:verdana;&quot;&gt;38. Refer to the exhibit. Each media link is labeled. What type of cable should be used to connect the different devices?&lt;br /&gt;• Connection 1 – rollover cable Connection 2 – straight-through cable Connection 3 – crossover cable&lt;br /&gt;• Connection 1 – straight-through cable Connection 2 – crossover cable Connection 3 – rollover cable&lt;br /&gt;• Connection 1 – crossover cable Connection 2 – rollover cable Connection 3 – straight-through cable&lt;br /&gt;• Connection 1 – crossover cable Connection 2 – straight-through cable Connection 3 – rollover cable&lt;br /&gt;&lt;span style=&quot;color:red;&quot;&gt;• Connection 1 – straight-through cable Connection 2 – straight-through cable Connection 3 – straight-through cable&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;font-family:verdana;&quot;&gt;39. Which two types of media are useful for connecting two devices separated by a distance of 500 meters? (Choose two.)&lt;br /&gt;• 10 BASE-T&lt;br /&gt;&lt;span style=&quot;color:red;&quot;&gt;• 1000 BASE-TX&lt;br /&gt;&lt;/span&gt;• 10 BASE-2&lt;br /&gt;• 1000 BASE LX&lt;br /&gt;&lt;span style=&quot;color:red;&quot;&gt;• 1000 BASE-SX&lt;/span&gt; &lt;/span&gt;&lt;span style=&quot;font-family:verdana;&quot;&gt;40. Which information is used by the router to determine the path between the source and destination hosts?&lt;br /&gt;• the host portion of the IP address&lt;br /&gt;&lt;span style=&quot;color:red;&quot;&gt;• the network portion of the IP address&lt;br /&gt;&lt;/span&gt;• host default gateway address&lt;br /&gt;• the MAC address&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family:verdana;&quot;&gt;41. Refer to the exhibit. What two facts can be determined from the session information that is displayed? (Choose two.)&lt;br /&gt;• This exchange is part of the three-way handshake.&lt;br /&gt;&lt;span style=&quot;color:red;&quot;&gt;• The destination port indicates that a Telnet session has been initiated.&lt;br /&gt;&lt;/span&gt;• The source port does not support communication with the destination port that is listed.&lt;br /&gt;• The destination port indicates that an SMTP session has been initiated.&lt;br /&gt;&lt;span style=&quot;color:red;&quot;&gt;• The protocol is a connection-oriented protocol.&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family:verdana;&quot;&gt;42. Refer to the exhibit. Host A is accessing multiple servers. Which combination of port number and address will uniquely identify a particular process running on a specific server?&lt;br /&gt;• MAC address of the server and port number of the service&lt;br /&gt;• IP address of the host and port number of the service&lt;br /&gt;• MAC address of the host and port number of the service&lt;br /&gt;&lt;span style=&quot;color:red;&quot;&gt;• IP address of the server and port number of the service&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family:verdana;&quot;&gt;43. A network technician wants to configure an IP address on a router interface by using the ip address 192.168.1.0 255.255.255.0 command. Which prompt should the technician see when entering this command?&lt;br /&gt;• Router&gt;&lt;br /&gt;&lt;span style=&quot;color:red;&quot;&gt;• Router(config-if)#&lt;br /&gt;&lt;/span&gt;• Router#&lt;br /&gt;• Router(config)# &lt;/span&gt;&lt;span style=&quot;font-family:verdana;&quot;&gt;44. Refer to the exhibit. Host X is unable to communicate with host Y. Which command can be run at host X to determine which intermediary device is responsible for this failure?&lt;br /&gt;• telnet 192.168.1.1&lt;br /&gt;• ping 192.168.1.1&lt;br /&gt;• ftp 192.168.1.1&lt;br /&gt;&lt;span style=&quot;color:red;&quot;&gt;• tracert 192.168.1.1&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt; &lt;div&gt;&lt;span style=&quot;font-family:verdana;&quot;&gt;45. Refer to the exhibit. In a network, PC1 sends a message to PC2. The frame received at PC2 is shown. What information in this frame determines the correct destination application?&lt;br /&gt;• timing and synchronization bits&lt;br /&gt;• destination and source physical addresses&lt;br /&gt;• destination and source logical network addresses&lt;br /&gt;&lt;span style=&quot;color:red;&quot;&gt;• destination and source process numbers&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-family:verdana;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;font-family:verdana;&quot;&gt;46. An organization has been assigned network ID 10.10.128.0 and subnet mask 255.255.224.0. Which IP address range can be used for this organization?&lt;br /&gt;• 10.10.128.0 to 10.10.160.255&lt;br /&gt;&lt;span style=&quot;color:red;&quot;&gt;• 10.10.128.0 to 10.10.159.255&lt;br /&gt;&lt;/span&gt;• 10.10.128.0 to 10.10.192.255&lt;br /&gt;• 10.10.128.0 to 10.10.0.159&lt;br /&gt;• 10.10.128.0 to 10.10.159.0&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family:verdana;&quot;&gt;47. What is the effect of using the Router# copy running-config startup-config command on a router?&lt;br /&gt;• The contents of ROM will change.&lt;br /&gt;• The contents of RAM will change.&lt;br /&gt;&lt;span style=&quot;color:red;&quot;&gt;• The contents of NVRAM will change.&lt;br /&gt;&lt;/span&gt;• The contents of flash will change. &lt;/span&gt;&lt;/div&gt; &lt;div&gt;&lt;span style=&quot;font-family:verdana;&quot;&gt;48. Which three IPv4 addresses represent valid host addresses for a subnet? (Choose three.)&lt;br /&gt;• 10.1.12.79/28&lt;br /&gt;&lt;span style=&quot;color:red;&quot;&gt;• 10.1.12.113/28&lt;br /&gt;&lt;/span&gt;• 10.1.12.32/28&lt;br /&gt;&lt;span style=&quot;color:red;&quot;&gt;• 10.1.11.5/27&lt;br /&gt;• 10.1.11.97/27&lt;br /&gt;&lt;/span&gt;• 10.1.11.128/27 &lt;/span&gt;&lt;/div&gt; &lt;p&gt;&lt;span style=&quot;font-family:verdana;&quot;&gt;49. Refer to the exhibit. The NAT functionality of the router is enabled to provide Internet access to the PC. However, the PC is still unable to access the Internet. Which IP address should be changed to 209.165.201.1 to enable the PC to access the Internet?&lt;br /&gt;• 192.168.1.191&lt;br /&gt;• 192.168.1.101&lt;br /&gt;• 192.168.1.1&lt;br /&gt;&lt;span style=&quot;color:red;&quot;&gt;• 192.168.1.254&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;font-family:verdana;&quot;&gt;50. Which three statements are true about network layer addressing? (Choose three.)&lt;br /&gt;&lt;span style=&quot;color:red;&quot;&gt;• It uniquely identifies each host.&lt;br /&gt;• It assists in forwarding packets across internetworks.&lt;br /&gt;• It uses a logical 32-bit IPv4 address.&lt;br /&gt;&lt;/span&gt;• It is not a configurable address.&lt;br /&gt;• It is a physical address.&lt;br /&gt;• It identifies the host from the first part of the address.&lt;/span&gt;&lt;/p&gt;</content><link rel='replies' type='application/atom+xml' href='http://crazyu-ccna-exploration.blogspot.com/feeds/230702986015504816/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://crazyu-ccna-exploration.blogspot.com/2009/12/ccna-exploration-1-final-exam-answers.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/565733589089419925/posts/default/230702986015504816'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/565733589089419925/posts/default/230702986015504816'/><link rel='alternate' type='text/html' href='http://crazyu-ccna-exploration.blogspot.com/2009/12/ccna-exploration-1-final-exam-answers.html' title='CCNA Exploration 1 – FINAL Exam Answers Version 4.0'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry></feed>