Networking Fundamentals & Troubleshooting

OSI Model and Protocols

Connectionless Protocols

When connectionless protocols are implemented at lower layers of the OSI model, which layers are used to acknowledge receipt of data and solicit retransmission of missing data? B

IP Protocol and Retransmission

What OSI layer protocol does IP depend on to determine whether packets are lost and to request retransmission? E

Routing at the Network Layer

Which of the following statements are true regarding routing at the network layer? C, D, F

TCP/IP Stack Functionality

A PC cannot connect to any remote website, ping its default gateway, or ping a printer that is functioning correctly on the local network segment. How can the user verify if the TCP/IP stack is functioning correctly on this PC? B

Media Types and Interference

What types of media are immune to EMI and RFI? D, F

Email Sending Process

(Refer to the presentation diagram) The diagram represents the process of sending an email. Select from the lists below to correctly identify the component or protocol used at each numbered stage of the diagram. E

Transport Layer Protocols

What are three statements that characterize transport layer protocols? A, D, E

Reliable and Connection-Oriented Services

Which of the following OSI layers provides reliable and connection-oriented communication services? D

IP Addressing and Subnetting

Troubleshooting Host Connectivity

Review the chart with current settings. Host A in the administrative offices failed and was replaced. A ping to 127.0.0.1 was successful, but the replacement equipment cannot access the company network. What is the likely cause of the problem? C

Valid IP Configuration

(Refer to the presentation diagram) A network technician is trying to determine the correct IP address settings for Host A. What is a valid configuration for Host A? B

Subnet Mask Calculation

As a network administrator, what subnet mask allows for 510 hosts, given the IP address 172.30.0.0? D

CSMA/CD Characteristics

What are three characteristics of CSMA/CD? C, E, F

Private IP Address Ranges

Which of the following are valid ranges of private IP addresses? A, C, E

Network ID and Subnet Mask

Which combination of network ID and subnet mask correctly identifies all IP addresses from 172.16.128.0 to 172.16.159.255? D

Router Configuration and Security

Encrypted Passwords

What password is automatically encrypted when created? D

Router Configuration Entries

Due to a security violation, passwords need to be changed on the router. What can you tell from the following configuration entries? B, E

Clock Command on Serial Interface

When do you configure a router’s serial interface with the clock command? D

Network Troubleshooting and Analysis

OSI Layer 2 Functions

What two functions of the OSI model occur at Layer 2? A, E

Troubleshooting Routing Issues

There has been a routing problem in your inter-network. Which of the following types of devices should be examined to identify this error? D

NAT and Internet Access

(Refer to the presentation diagram) The router is running NAT (Network Address Translation). Which of the following addresses can be applied to the computer to allow Internet access? C, D, E

Topology Analysis

(Refer to the presentation diagram) What two facts can be determined from the information provided? D, E

Cable Segment Installation

(Refer to the presentation diagram) Cables 1 and 2 have their ends connected to meet specific application layer requirements. The table lists each segment by number and the cable the network technician has installed between network components on that segment. From the data provided, which segments have the correct cable installed? A, C, D

Logical Topology Identification

(Refer to the presentation diagram) Which logical topology best describes the network presented? D

Host Communication and Addressing

(Refer to the presentation diagram) Host A transmits data to Host B. Which destination IP and MAC addresses will Host A use in this communication? E

Router Packet Handling

(Refer to the presentation diagram) A router, whose routing table is shown, receives a packet destined for 192.168.1.4. How will the router handle the packet? C

Identifying Intermediary Devices

(Refer to the presentation diagram) Which set of devices contains only intermediary devices? A

Verifying Router Interface Operation

(Refer to the presentation diagram) A technician is trying to troubleshoot a network problem that requires verification of the router’s LAN interface. What address should be pinged from this host to confirm the operation of the router interface? C

Saving Running Configuration

What command entry represents the corresponding node using the command copy running-config startup-config? B

EXEC Mode Privileges and Security

A technician is asked to secure EXEC mode privileges on a switch by requiring a password. What type of password is needed for this type of login, and which approach might be more secure? C

Reserved Port Numbers

What is the range of reserved port numbers for services commonly used by applications that run on servers? B

Startup Configuration File Storage

On a Cisco device, where is the startup configuration file stored? B

Topology Facts

(Refer to the presentation diagram) What are two facts that can be determined about the topology presented? E

Subnet Requirements

(Refer to the presentation diagram) Assume that all devices use default settings. How many subnets are required to address the topology shown? B

Initial Router Configuration

(Refer to the presentation diagram) What does a network technician at Host A need to do to create the initial configuration on Router1? C

Frame Transmission and Reception

(Refer to the presentation diagram) When Computer A sends a frame to Computer D, which computers receive the frame? A

Router Functionality for Internet Access

(Refer to the presentation diagram) Which function does Router RT_A provide to allow Internet access for hosts on this network? A

Network Problem Correction

(Refer to the presentation diagram) The network containing Router B is experiencing problems. A network partner has isolated the problem in this network to Router B. What action can be taken to correct the network problem? B

Troubleshooting Host Communication

(Refer to the presentation diagram) According to the IP configuration shown, what is the reason that Host A and Host B cannot communicate outside the LAN? D

Transport Layer and Encapsulation

Layer 4 Header Information

What type of information is contained in the Layer 4 header to assist in sending data? A

Encapsulation and Transport Layer Identifiers

During the encapsulation process, which identifiers are added at the transport layer? B

Destination Socket for Web Page Request

(Refer to the presentation diagram) What is the correct destination socket number for a web page request from Host A to the web server? B

Packet Capture Analysis

(Refer to the presentation diagram) Host A attempts to establish a TCP/IP session with Host C. During this attempt, a frame is captured with a source MAC address of 0050.7320.D632 and a destination MAC address of 0030.8517.44C4. The packet found inside the captured frame has a source IP address of 192.168.7.5 and a destination IP address of 192.168.219.24. At what point in the network was the packet captured? C

Application Layer Protocol Analysis

(Refer to the presentation diagram) A network administrator remotely accesses the CLI of RouterB from PC1. What are two true statements about the application layer protocol used to establish this connection? B, D

IP Configuration Analysis

(Refer to the presentation diagram) What are three true statements about the IP configuration shown? A, B, D

IPv4 Broadcast Addresses

Which three IPv4 addresses represent a broadcast address for a subnet? A, C, E