match the application with the correct compressed file format

1. Convert the quantitative number 231 into its binary equivalent. Prime the correct answer from the list to a lower place.

11110010

11011011

11110110

11100111*

11100101

11101110

2. Convert the binary number 10111010 into its hex equivalent. Blue-ribbon the correct answer from the list down the stairs.

85

90

BA*

A1

B3

1C

3. The nonstarter charge per unit in a certain brand of network interface card has been determined to be 15%. How many card game could be anticipated to fail in a company that has 80 of the cards installed?

8

10

12*

15

4. A local real estate company can have its 25 computer systems upgraded for $1000. If the company chooses only to upgrade 10 systems, how much will the upgrade cost if the same rate is used?

$100

$200

$400*

$500

$600

5. Which two devices provide permanent data storage? (Choose two.)

Blu-Beam disc*

hard drive*

keyboard

monitor

Random-access memory

6. If a technician uses an average of 2 cans of compressed flying per calendar week for cleansing, how many cans should be orderly for 8 technicians over the next 10 weeks?

16

20

80

160*

200

7. What is a function of the BIOS?

enables a data processor to connect to a network

provides pro tempore data storage for the CPU

performs a power-along someone test of intrinsic components*

provides graphic capabilities for games and applications

8. Which is a distinguishing of the Internet?

It is not centrally governed.*

It uses only physical addresses.

It uses private Informatics addressing.

It is localized to specific geographic locations.

9. Which overtop hind end be used to test connectivity between two computers that are attached to a network?

ipconfig

knock*

winipcfg

ifconfig

nbtstst -s

10. A person-hour is the sum of run that the average worker can perform in incomparable hr. It is anticipated that a fellowship-sweeping system upgrade will take around 60 individual-hours to complete. How long will information technology take five technicians to perform the refresh?

5 hours

8 hours

10 hours

12 hours*

11. Considering the fair capacity of entrepot gimmick media, drag the store media on the left to the electrical capacity list on the right.

12. Come to to the demo. Match the port to the related letter shown in the exhibit. (Not all options are victimized.)

13. Match the icon to its liable associated use. (Not all options are ill-used.)

14. Match the form of network communication with its description. (Not all options are exploited.)

15. Match the application with the correct compressed register format. (Non all options are in use.)

16. A substance abuser is having problems accessing the Net. The command ping www.cisco.com fails. However, pinging the IP address of Coregonus artedi.com with the overlook ping 198.133.219.25 is successful. What is the trouble?

The vane server is down.

The default gateway is improper.

There is a problem with DNS.*

The savoir-faire of the ARP cache is incorrect.

17. Which selection shows the proper notation for an IPv6 direct?

2001,0db8,3c55,0015,abcd,ff13

2001-0db8-3c55-0015-abcd-ff13

2001.0db8.3c55.0015.abcd.ff13

2001:0db8:3c55:0015::abcd:ff13*

18. What is the purpose of the routing process?

to encapsulate data that is used to communicate across a network

to select the paths that are accustomed direct traffic to destination networks*

to convert a URL name into an Information science address

to provide established Net file transfer

to forward traffic along the basis of MAC addresses

19. Which device should equal victimized for enabling a master of ceremonies to communicate with other host on a different network?

switch

hub

router*

legion

20. A base user is looking for an ISP connection that provides postgraduate speed digital transmission over regular phone lines. What ISP connection type should be used?

DSL*

dial-up

satellite

cell modem

cable modem

21. A troupe is expanding its business to other countries. All branch offices must persist connected to corporate headquarters at altogether times. Which network technology is required to support this requirement?

LAN

MAN

WAN*

Wireless fidelity

22. Wherefore would a network administrator use the tracert utility?

to mold the active TCP connections along a PC

to check information about a DNS name in the DNS server

to identify where a packet was squandered operating theater delayed on a network*

to display the IP address, default gateway, and DNS server address for a PC

23. Refer to the exhibit. Consider the IP address configuration shown from PC1. What is a verbal description of the default gateway address?

It is the IP address of the Router1 interface that connects the company to the Cyberspace.

It is the IP address of the Router1 user interface that connects the PC1 LAN to Router1.*

It is the IP address of Switch1 that connects PC1 to other devices happening the same LAN.

Information technology is the Information processing address of the ISP network device located in the cloud.

24. Which subnet would admit the name and address 192.168.1.96 as a operational host address?

192.168.1.64/26*

192.168.1.32/27

192.168.1.32/28

192.168.1.64/29

25. A technician uses the ping 127.0.0.1 bidding. What is the technician testing?

the TCP/IP pile on a network host*

connectivity between two adjacent Cisco devices

connectivity between a PC and the default gateway

connectivity 'tween two PCs happening the indistinguishable mesh

natural science connectivity of a particular PC and the mesh

26. What is the purpose of ICMP messages?

to inform routers about electronic network topology changes

to ensure the delivery of an IP packet boat

to leave feedback of IP packet transmissions*

to reminder the process of a domain name to IP name and address resolution

27. What is the general term that is secondhand to describe a firearm of data at any layer of a networking model?

frame

packet

protocol data unit of measurement*

section

28. How does a networked server manage requests from multiple clients for distinguishable services?

The server sends all requests through a nonremittal gateway.

Each request is assigned source and name and address port numbers pool.*

The host uses IP addresses to identify different services.

Each request is caterpillar-tracked through the physical address of the client.

29. Which communications protocol translates a website name such American Samoa WWW.cisco.com into a network address?

HTTP

FTP

DHCP

DNS*

30. A network technician is attempting to configure an interface by entering the following program line: SanJose(config)# ip handle 192.168.2.1 255.255.255.0. The command is disapproved by the device. What is the reason for this?

The command is being entered from the wrong mode of operation.*

The command syntax is unsuitable.

The subnet masquerade information is improper.

The interface is shutdown and must be enabled before the shift will accept the Information processing call.

31. What protocol is trustworthy for controlling the size of segments and the rate at which segments are changed between a web client and a web server?

TCP*

IP

HTTP

Ethernet

32. A network administrator is troubleshooting connectivity issues on a server. Victimisation a tester, the executive notices that the signals generated past the server NIC are contorted and not disposable. In which layer of the OSI worthy is the error categorized?

display layer

electronic network layer

physical bed*

data link bed

33. Which statement is true approximately variable-length subnet masking?

For each one subnet is the same size.

The size up of each subnet May be polar, depending on requirements.*

Subnets may only equal subnetted one additional time.

Bits are returned, sooner than borrowed, to create additional subnets.

34. A radio receiver host necessarily to call for an IP dea. What communications protocol would glucinium used to process the call for?

FTP

Hypertext transfer protocol

DHCP*

ICMP

SNMP

35. What will a host on an Ethernet network do if it receives a frame with a destination MAC address that does non friction match its own MAC cover?

It will discard the frame.*

Information technology testament forrard the frame to the next host.

It will remove the frame from the media.

IT leave disrobe off the data-link frame to check the destination IP address.

36. Which connection provides a plug CLI session with encryption to a Lake herring switch?

a console joining

an AUX joining

a Telnet connection

an SSH connection*

37. What are the three ranges of IP addresses that are reserved for internal private usage? (Choose three.)

10.0.0.0/8*

64.100.0.0/14

127.16.0.0/12

172.16.0.0/12*

192.31.7.0/24

192.168.0.0/16*

38. What statement describes the function of the Address Resolution Protocol?

ARP is wont to see the IP speak of any horde on a different net.

ARP is misused to key out the IP address of whatsoever innkeeper on the local network.

ARP is wont to discover the Macintosh computer address of some host on a divers network.

Jean Arp is used to get word the MAC call of some host on the local network.*

39. What is the desig of having a converged network?

to allow for high quicken connectivity to completely ending devices

to make a point that every last types of data packets will live treated equally

to achieve fault tolerance and high availability of data network infrastructure devices

to reduce the cost of deploying and maintaining the communication infrastructure*

40. Consult to the exhibit. Match the packets with their destination IP address to the exiting interfaces on the router. (Not every last targets are victimised.)

ch62

from hypertext transfer protocol://web.ccna5.net/

match the application with the correct compressed file format

Source: http://ccnav502.blogspot.com/2016/04/ccna1-v51-pretest-exam-2015-2016.html

Post a Comment

Lebih baru Lebih lama