There is not enough information provided in the given 160 bytes of the Ethernet frame to find the embedded URL. An HTTP header would need to be fully decoded from the TCP/IP payload to find the URL.
3. Referring to the network diagram, the network administrator wants to configure the router
interfaces of RouterA and RouterB to allow communication between the LANs. Suggest the
appropriate subnet mask, IP address assignment and default gateway configuration for
HostA, HostB and the router interfaces. [10 marks]
RouterA:
- FastEthernet0/0: 192.168.1.1/24
RouterB:
- FastEthernet0/0: 192.168.2
There are 10 new questions on the CCNA 200-120 exam, focusing on topics like NAT, DHCP configuration, satellite internet characteristics, and subnetting. The document provides questions, answers, and explanations to help study for improved exam scores.
Router1 will forward the data packet out interface FastEthernet0/1. The document provides a Cisco CCNA exam questions and answers about networking fundamentals like TCP/IP, IP addressing, routing, switching, and WAN technologies. It contains 17 sections with multiple choice questions to help students study and prepare for the CCNA certification exam.
CISCO - CCNA 200-120
These notes will be the basis for more detailed revision.
These "CCNA 200-120" Revision Notes consist of concise summaries or outlines of topics covered, lists of essential information needed.
This document provides the answers to a CCNA 1 final exam with 50 multiple choice questions. It covers topics such as networking tools, network devices, network models, cabling, Ethernet, IP addressing, IPv6 addressing, routing, and network security. Some key points covered are the functions of switches, routers, and default gateways. It also addresses subnetting, private IP addresses, IPv6 addressing formats, and network protocols like TCP/IP, ICMP, DHCP, and DNS.
Cisco.actualtests.200 120.v2013-12-10.by.watson.314q (2 new q)keiko277
Router1 will forward the data packet out interface FastEthernet0/1 after replacing the source MAC address with its own MAC address 0000.0c36.6965 and the destination MAC address with the MAC address 0000.0c07.4320 of the next hop towards 192.168.40.5. The router performs these actions when it receives the data frame shown in the exhibit, as it must remove and replace the MAC addresses when routing traffic between different network segments.
This document contains a Cisco CCNA exam with 18 sections and 338 questions. It covers topics like TCP/IP, IP addressing, Cisco IOS, routing, security, switching, VLANs, IPv6, and WAN technologies. Sample questions test knowledge of routing protocols, encapsulation and addressing at different OSI layers, and configuration of routers, switches, and other network devices.
IPv4 addresses are 32 bits in length. The host portion of an IP address identifies a specific device on a network. Given a host with the IP address 172.32.65.13 and a default subnet mask, the host belongs to network 172.32.0.0. The default subnet mask 255.0.0.0 provides the most host bits. Private IP addresses include 10.1.1.1, 172.16.4.4, and 192.168.5.5.
There are 10 new questions on the CCNA 200-120 exam, focusing on topics like NAT, DHCP configuration, satellite internet characteristics, and subnetting. The document provides questions, answers, and explanations to help study for improved exam scores.
Router1 will forward the data packet out interface FastEthernet0/1. The document provides a Cisco CCNA exam questions and answers about networking fundamentals like TCP/IP, IP addressing, routing, switching, and WAN technologies. It contains 17 sections with multiple choice questions to help students study and prepare for the CCNA certification exam.
CISCO - CCNA 200-120
These notes will be the basis for more detailed revision.
These "CCNA 200-120" Revision Notes consist of concise summaries or outlines of topics covered, lists of essential information needed.
This document provides the answers to a CCNA 1 final exam with 50 multiple choice questions. It covers topics such as networking tools, network devices, network models, cabling, Ethernet, IP addressing, IPv6 addressing, routing, and network security. Some key points covered are the functions of switches, routers, and default gateways. It also addresses subnetting, private IP addresses, IPv6 addressing formats, and network protocols like TCP/IP, ICMP, DHCP, and DNS.
Cisco.actualtests.200 120.v2013-12-10.by.watson.314q (2 new q)keiko277
Router1 will forward the data packet out interface FastEthernet0/1 after replacing the source MAC address with its own MAC address 0000.0c36.6965 and the destination MAC address with the MAC address 0000.0c07.4320 of the next hop towards 192.168.40.5. The router performs these actions when it receives the data frame shown in the exhibit, as it must remove and replace the MAC addresses when routing traffic between different network segments.
This document contains a Cisco CCNA exam with 18 sections and 338 questions. It covers topics like TCP/IP, IP addressing, Cisco IOS, routing, security, switching, VLANs, IPv6, and WAN technologies. Sample questions test knowledge of routing protocols, encapsulation and addressing at different OSI layers, and configuration of routers, switches, and other network devices.
IPv4 addresses are 32 bits in length. The host portion of an IP address identifies a specific device on a network. Given a host with the IP address 172.32.65.13 and a default subnet mask, the host belongs to network 172.32.0.0. The default subnet mask 255.0.0.0 provides the most host bits. Private IP addresses include 10.1.1.1, 172.16.4.4, and 192.168.5.5.
This document contains a Cisco 200-120 exam with 12 multiple choice questions about IP data networks and network devices. The questions cover topics such as MAC address replacement by routers, IP subnetting, the OSI model, WAN device roles, ping TTL values, ARP cache entries, Ethernet port types, OSI encapsulation, and collision/broadcast domains. The questions are followed by explanations of the answers.
This document provides a 35 question multiple choice test on data communications and networks. The questions cover topics such as network devices, IP addressing, routing, switching, and TCP/IP protocols. The test is for the UCCN1003 Data Communications and Networks course in May 2010. It requests the student provide their ID, program of study, lab instructor, and lab time before beginning the multiple choice questions.
This document contains questions and answers related to the Cisco 200-120 CCNA exam. It includes 19 multiple choice questions about topics like routing, switching, VLANs, STP, the OSI model, and more. The questions are designed to test knowledge of networking concepts and Cisco technologies.
The document contains 10 questions about basic CCNA topics like networking, OSI model, TCP/IP model, and Cisco IOS commands. The questions cover concepts such as MAC addresses, broadcast domains, router flash memory size, MTU, half and full duplex Ethernet ports, collision and carrier detection, OSI layers, TCP/IP layers, router password encryption, securing VTY lines, and erasing flash memory before upgrading the IOS image.
An IP address is a numerical label assigned to each device connected to a computer network using the Internet Protocol. There are two main versions in use today - IPv4 uses 32-bit addresses while IPv6 uses 128-bit addresses due to the depletion of IPv4 addresses. IP addresses can be static or dynamically assigned using DHCP. Private IP address ranges are reserved for use within private networks and are not routed on the public internet.
The document contains a chapter quiz on networking concepts related to IP addressing, delivery methods, routing, and ICMP. It includes multiple choice questions about direct vs indirect delivery, connection-oriented vs connectionless delivery, address mapping using ARP and RARP, IP header fields, fragmentation, ICMP message types, and more. The quiz tests understanding of fundamental IP networking concepts.
IGMP is a group management protocol that helps multicast routers create and update lists of members for each router interface. It uses query and report messages to manage multicast group membership. The IP protocol field value for an IGMP packet is 2. IGMP packets are encapsulated in IP packets and use class D mapping to Ethernet addresses for delivery within local networks.
This document provides answers to exam questions for the CCNA 1 curriculum. It includes answers for the final exam as well as answers organized by chapter for chapters 1 through 8, covering introductory networking concepts like the OSI model, TCP/IP, network cables, Ethernet, and IP addressing.
This document provides information about the Networks Laboratory course offered at Anjalai Ammal Mahalingam Engineering College. It includes the syllabus, list of experiments, objectives and outcomes of the course. The course aims to teach students socket programming, simulation tools, and hands-on experience with networking protocols. Some key experiments include implementing stop-and-wait and sliding window protocols, socket programming, simulating ARP/RARP, PING and traceroute, and studying routing algorithms. The course is intended to help students use simulation tools, implement protocols, and analyze network performance and routing.
IPv6 addresses are 128 bits long. Port Address Translation (PAT) allows multiple users to share a single public IP address. Standard and extended ACLs are the two main types of access control lists. The "copy running-config startup-config" command is used to backup the router configuration. IEEE 802.11G standard allows up to 54Mbps wireless speeds in the 2.4GHz range.
This document discusses the Internet Group Management Protocol (IGMP), which allows hosts to report their multicast group memberships to neighboring multicast routers. It describes the different versions of IGMP, including IGMPv1, IGMPv2, and IGMPv3. It also covers IGMP messages like membership queries, reports, and leaves. IGMP snooping is defined as a switch feature that optimizes multicast traffic delivery by only forwarding traffic to ports with interested receivers. Multicast Listener Discovery (MLD) serves a similar purpose for IPv6 as IGMP does for IPv4.
This document contains a Cisco 200-120 exam with 10 multiple choice questions about IP data networks and the OSI model. The questions cover topics such as how routers process frames, subnet masks, the OSI layers, WAN device roles, TTL values, ARP caches, Ethernet port types, checksums, and OSI encapsulation. The explanations provide details on each question's concept and the reasoning behind the correct answers.
Here are the key steps to determine the subnet that this IP address belongs to:
1. The IP address is 172.16.192.166
2. A Class B address has a network portion of 172.16
3. Therefore, the network portion is 172.16
4. The remaining bits must be the host portion
5. Therefore, the subnet that this IP address belongs to is 172.16.0.0
The IP address 172.16.192.166 belongs to the 172.16.0.0 subnet.
This document contains 10 questions from the Cisco 640-802 exam. The questions cover topics such as possible causes for interface status issues, commands to check router memory and version, VLAN and inter-VLAN routing configuration, loopback address configuration, VTP modes, CDP usage, static and default routing configuration.
This document provides answers to exam questions for CCNA 1 chapters 2 through 11. It begins with multiple choice questions and answers from the CCNA 1 Final Exam, followed by questions and answers from chapters 1 through 11. The questions test knowledge of networking concepts covered in those chapters, including IP addressing, Ethernet, OSI model, TCP/IP model, cabling, routers, switches, and TCP and UDP ports.
This document provides an overview of IP subnetting and addressing. It begins by stating the learning objectives, which are to explain IP subnets, subnet masks, benefits of subnets over multiple address classes, variable length subnet masks (VLSM), and classless inter-domain routing (CIDR). It then covers key concepts such as IP subnets, natural masks, creating subnets using masks, default vs subnet masks, benefits of subnets vs multiple address classes, VLSM examples, CIDR introduction and addressing, and solutions to a quiz on the content.
This document contains 21 multiple choice questions and answers from the CCNA 1 Chapter 9 exam on network fundamentals. The questions cover topics like Ethernet protocols, data encapsulation, MAC addressing, collision detection using CSMA/CD, and Ethernet switching fundamentals.
Ann Enterprise needs to make adjusting journal entries at the end of 2006 for various accrual and deferral transactions. These include recording rent and insurance expenses for December, allocating revenue received in advance across multiple months, adjusting supplies and prepaid insurance, recording fees earned but unbilled, and depreciating office equipment. Yong also needs to make entries to write off additional bad debts based on percentages of outstanding debtors and set up a provision for doubtful debts account.
This short presentation - was delivered on the D-Lan LAN Party in Dunaújváros - discusses the basic security issues of wireless networks, and gives an overview about the hacking of vulnerable networks.
The document provides the trial balance and additional financial information for On-vest Software Enterprise as of January 31, 2009. It asks to prepare an income statement and balance sheet based on the information given. The income statement will show the company's revenues, expenses and net income for the year. The balance sheet will report the company's assets, liabilities and equity as of the specified date.
This document contains a Cisco 200-120 exam with 12 multiple choice questions about IP data networks and network devices. The questions cover topics such as MAC address replacement by routers, IP subnetting, the OSI model, WAN device roles, ping TTL values, ARP cache entries, Ethernet port types, OSI encapsulation, and collision/broadcast domains. The questions are followed by explanations of the answers.
This document provides a 35 question multiple choice test on data communications and networks. The questions cover topics such as network devices, IP addressing, routing, switching, and TCP/IP protocols. The test is for the UCCN1003 Data Communications and Networks course in May 2010. It requests the student provide their ID, program of study, lab instructor, and lab time before beginning the multiple choice questions.
This document contains questions and answers related to the Cisco 200-120 CCNA exam. It includes 19 multiple choice questions about topics like routing, switching, VLANs, STP, the OSI model, and more. The questions are designed to test knowledge of networking concepts and Cisco technologies.
The document contains 10 questions about basic CCNA topics like networking, OSI model, TCP/IP model, and Cisco IOS commands. The questions cover concepts such as MAC addresses, broadcast domains, router flash memory size, MTU, half and full duplex Ethernet ports, collision and carrier detection, OSI layers, TCP/IP layers, router password encryption, securing VTY lines, and erasing flash memory before upgrading the IOS image.
An IP address is a numerical label assigned to each device connected to a computer network using the Internet Protocol. There are two main versions in use today - IPv4 uses 32-bit addresses while IPv6 uses 128-bit addresses due to the depletion of IPv4 addresses. IP addresses can be static or dynamically assigned using DHCP. Private IP address ranges are reserved for use within private networks and are not routed on the public internet.
The document contains a chapter quiz on networking concepts related to IP addressing, delivery methods, routing, and ICMP. It includes multiple choice questions about direct vs indirect delivery, connection-oriented vs connectionless delivery, address mapping using ARP and RARP, IP header fields, fragmentation, ICMP message types, and more. The quiz tests understanding of fundamental IP networking concepts.
IGMP is a group management protocol that helps multicast routers create and update lists of members for each router interface. It uses query and report messages to manage multicast group membership. The IP protocol field value for an IGMP packet is 2. IGMP packets are encapsulated in IP packets and use class D mapping to Ethernet addresses for delivery within local networks.
This document provides answers to exam questions for the CCNA 1 curriculum. It includes answers for the final exam as well as answers organized by chapter for chapters 1 through 8, covering introductory networking concepts like the OSI model, TCP/IP, network cables, Ethernet, and IP addressing.
This document provides information about the Networks Laboratory course offered at Anjalai Ammal Mahalingam Engineering College. It includes the syllabus, list of experiments, objectives and outcomes of the course. The course aims to teach students socket programming, simulation tools, and hands-on experience with networking protocols. Some key experiments include implementing stop-and-wait and sliding window protocols, socket programming, simulating ARP/RARP, PING and traceroute, and studying routing algorithms. The course is intended to help students use simulation tools, implement protocols, and analyze network performance and routing.
IPv6 addresses are 128 bits long. Port Address Translation (PAT) allows multiple users to share a single public IP address. Standard and extended ACLs are the two main types of access control lists. The "copy running-config startup-config" command is used to backup the router configuration. IEEE 802.11G standard allows up to 54Mbps wireless speeds in the 2.4GHz range.
This document discusses the Internet Group Management Protocol (IGMP), which allows hosts to report their multicast group memberships to neighboring multicast routers. It describes the different versions of IGMP, including IGMPv1, IGMPv2, and IGMPv3. It also covers IGMP messages like membership queries, reports, and leaves. IGMP snooping is defined as a switch feature that optimizes multicast traffic delivery by only forwarding traffic to ports with interested receivers. Multicast Listener Discovery (MLD) serves a similar purpose for IPv6 as IGMP does for IPv4.
This document contains a Cisco 200-120 exam with 10 multiple choice questions about IP data networks and the OSI model. The questions cover topics such as how routers process frames, subnet masks, the OSI layers, WAN device roles, TTL values, ARP caches, Ethernet port types, checksums, and OSI encapsulation. The explanations provide details on each question's concept and the reasoning behind the correct answers.
Here are the key steps to determine the subnet that this IP address belongs to:
1. The IP address is 172.16.192.166
2. A Class B address has a network portion of 172.16
3. Therefore, the network portion is 172.16
4. The remaining bits must be the host portion
5. Therefore, the subnet that this IP address belongs to is 172.16.0.0
The IP address 172.16.192.166 belongs to the 172.16.0.0 subnet.
This document contains 10 questions from the Cisco 640-802 exam. The questions cover topics such as possible causes for interface status issues, commands to check router memory and version, VLAN and inter-VLAN routing configuration, loopback address configuration, VTP modes, CDP usage, static and default routing configuration.
This document provides answers to exam questions for CCNA 1 chapters 2 through 11. It begins with multiple choice questions and answers from the CCNA 1 Final Exam, followed by questions and answers from chapters 1 through 11. The questions test knowledge of networking concepts covered in those chapters, including IP addressing, Ethernet, OSI model, TCP/IP model, cabling, routers, switches, and TCP and UDP ports.
This document provides an overview of IP subnetting and addressing. It begins by stating the learning objectives, which are to explain IP subnets, subnet masks, benefits of subnets over multiple address classes, variable length subnet masks (VLSM), and classless inter-domain routing (CIDR). It then covers key concepts such as IP subnets, natural masks, creating subnets using masks, default vs subnet masks, benefits of subnets vs multiple address classes, VLSM examples, CIDR introduction and addressing, and solutions to a quiz on the content.
This document contains 21 multiple choice questions and answers from the CCNA 1 Chapter 9 exam on network fundamentals. The questions cover topics like Ethernet protocols, data encapsulation, MAC addressing, collision detection using CSMA/CD, and Ethernet switching fundamentals.
Ann Enterprise needs to make adjusting journal entries at the end of 2006 for various accrual and deferral transactions. These include recording rent and insurance expenses for December, allocating revenue received in advance across multiple months, adjusting supplies and prepaid insurance, recording fees earned but unbilled, and depreciating office equipment. Yong also needs to make entries to write off additional bad debts based on percentages of outstanding debtors and set up a provision for doubtful debts account.
This short presentation - was delivered on the D-Lan LAN Party in Dunaújváros - discusses the basic security issues of wireless networks, and gives an overview about the hacking of vulnerable networks.
The document provides the trial balance and additional financial information for On-vest Software Enterprise as of January 31, 2009. It asks to prepare an income statement and balance sheet based on the information given. The income statement will show the company's revenues, expenses and net income for the year. The balance sheet will report the company's assets, liabilities and equity as of the specified date.
The document provides three examples of accounting for fixed assets using straight line depreciation. The first example is for a machine bought in 2000 and depreciated over 5 years. The second example is for a machine bought in 2001, depreciated at 20% per year, and sold in 2002. The third example involves two vehicles bought by a business owner in 2002, one sold in 2003, and a new one bought that year. Journal entries and annual accounts are to be prepared for depreciation, disposals, and new purchases for each example.
This document provides a series of transactions from August 2006 for a retailer named Jones. It includes details of initial contributions of assets and liabilities, purchases and sales on credit terms, cash receipts and payments, and ending stock values. The tasks are to: 1) Record the transactions in ledger accounts, 2) Prepare a trial balance as of August 31, 3) Prepare a trading and profit & loss statement for the month, and 4) Prepare a balance sheet as of August 31.
This lab introduces students to various networking commands, client software, and services through a series of exercises. Students will use commands like ipconfig, ping, nmap and nslookup to test network connectivity and identify services. They will use client software like web browsers, FTP, PuTTY, and telnet to access files and login remotely. Students will also use networking software like Apache web server to provide services to other clients on the network. The goal is for students to gain a better understanding of the interactions between clients, services, and networking. Students are instructed to document their results and answers to questions in a Word document for later assessment.
This document provides instructions for a lab exercise on networking devices in Packet Tracer. The exercises cover:
1. Using a hub and switch to observe the difference between layer 1 and layer 2 devices.
2. Using a repeater to extend the physical length of Ethernet communication.
3. Configuring wireless access points and connecting laptops to the wireless network.
4. Constructing a network with cable and DSL modems connecting clients to an ISP router, to demonstrate layer 1 connectivity over coaxial cables and phone lines.
This document provides an introduction to macroeconomics. It discusses the key components and concerns of macroeconomics including inflation, output growth, unemployment, and income distribution. It also covers aggregate demand and supply, the circular flow model, and the roles of households, firms, government and the international sector in the macroeconomy. Government policies aim to achieve price stability, economic growth, full employment, and an equitable distribution of income.
And first-class of all, a threat to hone your competencies. It’s adequate if you experience in over your head. We all did sooner or later, this subsequent step is about pushing thru that worry and on the point of address something as hard because the 200-301. In case you get caught, reach out. In case you see others caught, assist them.
How is this newsletter going to help you? Apart from providing you with a brief glimpse of the test’s topics and shape, we are able to additionally assist you discover efficient education substances. Cisco’s internet site is a extraordinary starting point, but you shouldn’t restriction your self to it. Despite the fact that you would possibly have by no means heard approximately them, you have to attempt exam dumps as they may grow to be your secret tool to get a passing rating in 2 hundred-301 assessment. But now, let’s start with the exam details.
Do not permit yourself face your ccna two hundred-301 exam without proper guidance to remorse later when you fail in cisco licensed community associate real exam because many people had been there. Let assist you to your cisco two hundred-301 ccna real examination preparation. To help you put together on your cisco certified network partner (ccna) 200-301 exam.
This document contains 20 multiple choice questions about networking topics such as SDN controllers, Ethernet standards, wireless security protocols, wireless access point modes, routing protocols, and network health dashboards. It tests knowledge of concepts like southbound APIs, 1000BASE standards, WPA3 authentication improvements, CAPWAP protocol settings, and Cisco DNA Center health dashboards. The questions have a single correct answer that is identified as well.
Are you fed up of fake Q/A and dumps for the preparation of Architecting HP Flex Network Solutions. Visit us @ here https://www.selfexamengine.com/hp-hp0-y50.htm.
Question 1 (1 point)Which of the following must you do before .docxmakdul
Question 1 (1 point)
Which of the following must you do before IP source guard can be used on a switch port? (Select 2 choices.)
Question 1 options:
A)
Enable IP routing on the switch port.
B)
Enable DHCP snooping on the switch.
C)
Configure static IP bindings on the switch.
D)
Enable uRPF on the switch port.
Question 2 (1 point)
Which of the following technologies can you use to bundle redundant links to form a single robust link? (Select the best answer.)
Question 2 options:
A)
EtherChannel
B)
StackWise
C)
VTP
D)
HSRP
Question 3 (1 point)
You administer the network shown below.
Which of the following should you configure as the default gateway on HostA to enable HostA to access the Internet? (Select the best answer.)
Question 3 options:
A)
192.168.21.1/24
B)
172.16.11.1/24
C)
10.1.51.10/24
D)
172.16.41.1/24
E)
10.1.51.5/24
F)
172.16.31.1/30
Question 4 (1 point)
Which of the following are required for interVLAN routing? (Select 2 choices.)
Question 4 options:
A)
a Layer 3 switch connected via a trunk link to a router with SVIs configured
B)
a Layer 2 switch connected via a trunk link to a router with subinterfaces configured
C)
a Layer 2 switch with IP routing enabled and subinterfaces configured
D)
a Layer 3 switch with IP routing enabled and SVIs configured
Question 5 (1 point)
Which of the following commands should you issue to convert a switched interface to a routed interface? (Select the best answer.)
Question 5 options:
A)
switchport nonegotiate
B)
switchport mode trunk
C)
switchport mode access
D)
no switchport
Question 6 (1 point)
Which of the following statements are true regarding PVLANs? (Select 2 choices.)
Question 6 options:
A)
Primary VLANs must be configured as isolated or community VLANs.
B)
Routers, firewalls, and gateways should be connected to promiscuous ports.
C)
A switch must be configured for VTP transparent mode to support private VLANs.
D)
Community VLANs can communicate with both promiscuous and isolated ports.
E)
Promiscuous ports can service multiple primary VLANs.
Question 7 (1 point)
Refer to the exhibit.
The network you administer consists of the devices shown in the exhibit. Each link is 100 Mbps and is connected to a Fast Ethernet port. Switch S1 is the root bridge. You enable root guard on Fa0/0 on switch S2 and switch S3 by issuing the spanning-tree guard root command in interface configuration mode on both switch ports. You also enable the Uplinkfast feature on S2 and S3 by issuing the spanning-tree uplinkfast command in global configuration mode on both switches.
Which of the following statements best describes what will occur if the link between S1 and S2 is broken? (Select the best answer.)
Question 7 options:
A)
Spanning tree will be disabled.
B)
Only Fa0/0 on S2 will be put into the root-inconsistent (blocked) state.
C)
Traffic will follow its normal path from HostB to S1.
D)
The Fa0/0 port on ...
Exam H12-211-Huawei Network Technology and Device (HCDA-HNTD)KylieJonathan
Get Comprehensive questions with complete details for Huawei Network Technology and Device (HCDA-HNTD) exam.
With the help of these questions you can easily pass H12-211 Test.
Visit us: @ https://www.examarea.com/H12-211-exams.html
#beneficial #certifications #dumps
The document provides sample exam questions for CCNA Exploration 4.0 related to LAN switching and wireless networking. Specifically:
- The questions cover topics such as VLAN configuration, trunking, switch port security, the OSI model, hierarchical network design, and Ethernet switching functions.
- Multiple choice answers are provided for each question to test understanding of networking concepts and configuration.
So in summary, the document appears to be practice exam questions for a CCNA certification focusing on layer 2 switching and wireless LAN technologies.
This document contains sample questions and explanations from the Cisco 640-802 exam. The questions cover topics related to network devices, interfaces, protocols, and configurations including:
- Possible causes for an interface status being down
- Checks and commands needed before upgrading router IOS
- VLAN and inter-VLAN routing configurations
- Loopback interface purpose and effects
- VTP modes and operations
- IOS image source configurations
- CDP uses
- Static route configuration
00-105 Interconnecting Cisco Networking Devices Part 1 (ICND1.pdfFiona Phillips
This document contains a summary of a 100-105 Interconnecting Cisco Networking Devices Part 1 (ICND1) exam. It includes 13 multiple choice questions about networking concepts like the differences between switches and hubs, TCP and UDP protocols, ARP, default gateways, and network device types. The questions provide explanations and references for each answer. The exam covers topics such as network access, IP connectivity, IP services, security fundamentals, and automation and programmability.
The document contains a practice exam for the Huawei Certified Network Associate certification. It includes 37 multiple choice questions covering topics such as network access configuration, authentication methods, ACL configuration, network troubleshooting tools, Ethernet networking fundamentals, IP protocols, and ICMP.
This document contains a summary of topics covered by instructor Ho Vu Anh Tuan including OSI, network basics, IP addressing, routing, and wireless networking. Key points from each section are discussed such as the layers of the OSI model, components of a basic network including hubs, switches and routers, private and public IP addressing, routing protocols like RIP v1 and v2, wireless standards 802.11a/b/g, and wireless security methods like WEP, WPA, and WPA2. Practice questions are also provided to test knowledge of each subject area.
Get actual exam material for ADVDESIGN exam. With the help of valid study dumps you can easily get prepared for your exam
Visit us: @ https://www.examarea.com/352-001-exams.html and pass 352-001 test with best grades
The document provides answers to exam questions for CCNA 1 chapters 3 through 9. It includes questions from Cisco exams and brief multiple choice answers. The summaries focus on key topics covered in the chapters, including IP addressing, OSI model, Ethernet, cabling, routers, and TCP/IP protocols.
This document contains a Cisco CCNA exam with 18 sections and 338 questions. It covers topics like TCP/IP, IP addressing, Cisco IOS, routing, security, switching, VLANs, IPv6, and WAN technologies. Sample questions test knowledge of routing protocols, encapsulation and addressing at different OSI layers, and configuration of routers, switches, and other network devices.
The document describes an exam for a diploma in computer networks. The exam has two parts, Part A and Part B. Part A contains 20 multiple choice questions covering topics like WAN infrastructure services, factors influencing WAN link selection, PPP protocols, VPN connections, and network troubleshooting tools. Part B requires descriptive answers and covers additional topics such as the differences between LANs and WANs, common WAN topologies, WAN terms, network security, monitoring, and VPN types. Calculators are not allowed and the exam duration is three hours.
We are confident in the abilities of our exams, and we want you to feel confident as well dumps available for 400-351 Exam-CCIE Wireless visit@ https://www.troytec.com/400-351-exams.html
The document contains a 17 question CCNA exam covering topics like networking hardware configuration, IP addressing, subnetting, VLANs, routing protocols, and router configuration. The exam tests knowledge of Cisco switches, routers, protocols, and commands.
The document provides an overview of cryptography concepts including encryption, decryption, symmetric cryptosystems, block ciphers, substitution ciphers, the one-time pad, and algorithms such as DES, Triple DES, AES, and others. Key points covered include Kerckhoffs's principle of keeping algorithms public and keys private, how symmetric encryption works between two parties with a shared key, methods of encrypting plaintext in blocks or as a bit stream, techniques like substitution and transposition ciphers, weaknesses of approaches like the Hill cipher, and the history and operation of standard block ciphers.
The document defines information security and discusses its history and key concepts. It outlines the evolution of information security from physical security controls to modern approaches addressing confidentiality, integrity, and availability of information. Key aspects covered include definitions of security, the CIA triad/diamond models, cryptography, access control models, and digital signatures.
The document provides an overview of aggregate demand and aggregate supply models in economics. It defines aggregate demand and supply curves, and explains how each curve is derived. The aggregate demand curve slopes downward, as the price level and real GDP are inversely related due to interest rate, wealth, and trade effects. The aggregate supply curve slopes upward in the short-run due to sticky wages and prices. Shifts in aggregate demand and supply curves can occur due to changes in consumption, investment, government spending, net exports, technology or costs.
This chapter discusses fiscal and monetary policy. It defines the multiplier effect as the ratio of change in output to a change in autonomous spending. An expansionary fiscal policy increases government spending or cuts taxes to stimulate the economy, while a contractionary policy decreases spending or raises taxes to curb inflation. Monetary policy involves changing interest rates and the money supply. An expansionary policy raises the money supply to boost output, while a contractionary policy lowers the money supply to reduce inflation. The chapter also discusses crowding-out, where higher government spending raises interest rates and lowers private investment.
The document defines key macroeconomic concepts including aggregate expenditure, output, income, consumption, saving, investment, government spending, taxes, imports, exports, and equilibrium. It also discusses the consumption function, marginal propensity to consume, marginal propensity to save, and the multiplier effect.
The document provides an overview of key economic concepts related to measuring national output and income. It defines Gross Domestic Product (GDP) as the total market value of all final goods and services produced within a country in a given period. GDP can be calculated using the expenditure approach (summing consumption, investment, government spending, and net exports) or the income approach (summing compensation, profits, rents, and other incomes). It also defines Gross National Product (GNP) and related terms and discusses limitations of using GDP as a measure.
This document provides an overview of key concepts in market structure, including monopolistic competition and oligopoly. It discusses the characteristics of monopolistic competition, including differentiated products, free entry and exit, and firms as price takers. It also covers the short-run and long-run equilibrium of firms under monopolistic competition. For oligopoly, it defines the structure and discusses interdependent behavior among a small number of large firms, barriers to entry, and the use of game theory to analyze strategic interactions.
The document summarizes key concepts about monopoly market structure:
1) A monopoly is characterized by a single seller, significant barriers to entry, and no close substitutes for the product. It faces a downward-sloping demand curve and can influence prices.
2) In the short-run, a monopoly will produce where marginal revenue equals marginal cost to maximize profits, earning normal profits, supernormal profits, or losses.
3) In the long-run, the monopoly may adjust its scale of production to maximize profits or minimize losses. It can earn economic profits but also imposes social costs like deadweight loss.
4) The document also discusses price discrimination, where a monopoly charges different prices for
This chapter discusses perfect competition and profit maximization in perfect competition. It contains the following key points:
1. Under perfect competition, there are many small firms and buyers/sellers, homogeneous products, free entry and exit, and perfect information. Firms are price takers and maximize profits by producing where MR=MC.
2. In the short run, firms will shut down if P<AVC or operate to minimize losses if ATC>P>AVC. In the long run, zero economic profits are achieved through free entry and exit of firms.
3. External changes like shifting demand curves or new technology can impact market equilibrium prices and quantities in the short and long run through adjustments to
1. The document discusses the production process of firms, including the concepts of production, costs, and profit maximization.
2. It explains that production involves transforming inputs into outputs using factors of production, with the goal of firms being to maximize profits.
3. The production process involves decisions about how much output to supply, which production technology to use, and how much of each input to demand.
The document provides an overview of market efficiency and elasticity concepts. It defines key terms like equilibrium, supply and demand, market failure due to imperfect competition, public goods, externalities and imperfect information. It also discusses government intervention through price ceilings, price floors, rationing and other restrictions. It explains the concepts of consumer surplus, producer surplus and deadweight loss. Finally, it defines different types of elasticity including price elasticity of demand, income elasticity of demand, cross price elasticity of demand and price elasticity of supply.
This document provides an overview of demand, supply, and market equilibrium concepts. It defines key terms like demand curve, supply curve, equilibrium price and quantity. It explains how shifts in demand or supply curves affect equilibrium. Specifically:
1) The law of demand and supply are introduced, which state that quantity demanded increases with lower price and quantity supplied increases with higher price.
2) Market equilibrium exists when quantity demanded equals quantity supplied. Disequilibrium can cause surplus or shortage.
3) A shift of the demand or supply curve changes the equilibrium price and quantity in the market. Both curves shifting can have varying effects depending on the direction and magnitude of the shifts.
The document provides an overview of key economic concepts including:
1) Economics is defined as the study of how people use limited resources to fulfill unlimited wants. It involves choices under scarcity.
2) Microeconomics studies individual units like households and firms. Macroeconomics looks at the whole economy in terms of outputs, prices, and employment.
3) The production possibilities frontier (PPF) curve shows the maximum combinations of two goods an economy can produce with full employment of resources. Points inside the curve are attainable but inefficient, while points outside are unattainable.
This document summarizes key concepts in international trade and exchange rates discussed in Chapter 13. It covers absolute and comparative advantage, types of trade barriers, components of the balance of payments, and exchange rate systems. Country A has an absolute advantage in cars and Country B has an advantage in rice, but Country B has a lower opportunity cost of cars, so it should specialize in car production. The current account records trade in goods, services, income, and transfers. Exchange rates can be fixed, flexible, or managed to balance trade and stability.
This document provides an overview of international trade and exchange rates. It discusses absolute and comparative advantage, types of trade barriers, components of the balance of payments, and exchange rate systems. Absolute advantage refers to the ability to produce more of a good using fewer resources, while comparative advantage means a good can be produced at lower opportunity cost. Trade barriers include tariffs, quotas, export subsidies, and embargoes. The balance of payments records transactions in goods, services, and assets between a country and the rest of the world. Exchange rates can be fixed, flexible, or managed floating.
This chapter discusses fiscal and monetary policy. It defines the multiplier effect as the ratio of change in output to a change in autonomous spending. An expansionary fiscal policy increases government spending or cuts taxes to boost output, while a contractionary policy decreases spending or raises taxes. Monetary policy involves changing interest rates and the money supply via tools like open market operations. Both expansionary and contractionary monetary policies aim to respectively increase or decrease output. The crowding-out effect refers to how increased government spending may raise interest rates and reduce private investment.
The document defines key macroeconomic concepts including aggregate expenditure, output, income, consumption, saving, investment, government spending, taxes, imports, exports, and equilibrium. It also discusses the consumption function, marginal propensity to consume, marginal propensity to save, and the multiplier effect.
The document provides an overview of key economic concepts related to measuring national output and income, including:
1) It defines Gross Domestic Product (GDP) as the total market value of all final goods and services produced within a country in a given period. GDP is calculated using the expenditure and income approaches.
2) The expenditure approach sums consumer spending (C), private investment (I), government spending (G), and net exports (X-M). The income approach sums wages, rents, profits, and other factor incomes.
3) Gross National Product (GNP) differs from GDP by including income from domestic factors working abroad, less income to foreign factors working domestically.
4) Real
This document provides an overview of market structures including monopolistic competition and oligopoly. It discusses key characteristics of each structure such as product differentiation, barriers to entry, and interdependence between firms. The document also covers concepts like profit maximization, loss minimization, long-run equilibrium, price rigidity, game theory, and Nash equilibrium which are important for understanding firm behavior under different market conditions.
The document summarizes key concepts about monopoly market structure:
1) A monopoly is characterized by a single seller, significant barriers to entry, and no close substitutes for the product. It faces a downward-sloping demand curve and sets price to maximize profit.
2) In the short-run, a monopoly will produce where marginal revenue equals marginal cost to maximize profits, earning normal profits, supernormal profits, or losses.
3) In the long-run, the monopoly may adjust its scale of production to maximize profits or minimize losses. It can potentially earn economic profits in the long-run through barriers to entry.
4) A monopoly also creates deadweight loss and may engage in rent
1. UCCN1003 Data Communications and Networks
May 2010
Mid-Term Test 02 [Total: 100 marks]
Student ID : ______________________
Program : ______________________
Lab Instructor : ______________________
Practical Group # : ______________________
Multiple Choice Questions (Choose all that apply, including none of the above)
[22 questions, 2 marks each, Total = 44 marks]
1. All of the host in the above network are connected with each other via the managed switch.
Which of the following statements correctly describe the scheme of the network?
A) Subnet mask = 255.255.255.128
B) Subnet mask = 255.255.255.240
C) IP address 172.16.1.205 can be assigned to PCs in VLAN1
D) IP address 172.16.1.25 can be assigned to PCs in VLAN1
E) LAN Ethernet port of the router is configured with one IP address
F) LAN Ethernet port of the router is configured with multiple IP addresses
Answer:
2. A new switch is installed into an existing LAN and a new trunk is configured with an
existing switch. Which VLANs will be allowed on this new trunk?
A) All defined VLANs are allowed on the trunk by default.
B) Each VLAN, or VLAN range, that is specified with the switchport mode command.
1
2. C) Each VLAN, or VLAN range, that is specified with the dot1q command.
D) Each VLAN, or VLAN range, that is specified with the vlan database command.
Answer:
3. What are some of the characteristics of a typical VLAN arrangement?
A) VLANs logically divide a switch into multiple, independent switches at Layer 2.
B) Trunk links can carry traffic for multiple VLANs.
C) VLAN implementation significantly increases traffic due to added trunking information.
D) A VLAN can span multiple switches.
E) VLANs typically increase the number of switches needed.
F) VLANs typically decrease the number of switches needed.
Answer:
4. How could a large corporation with many specialized divisions benefit from using VLANs
on their networks?
A) VLANs allow access to network services based on department, not physical location.
B) VLANs utilize packet filtering to enhance network security
C) VLANs provide a low-latency, high bandwidth internetworking alternative
D) VLANs provide a method of communication between IP addresses in large networks
E) VLANs establish segmented broadcast domains in switched networks
F) VLANs can greatly simplify adding, moving, or changing hosts on the network
Answer:
5. A college has a small campus where 25 lecturers are located. The faculty offices and student
computers are currently on the same subnet. The faculty is concerned about students being
able to capture packets going across the network and obtain sensitive material. What could a
network administrator do to protect faculty network traffic from student connections?
A) Install anti-virus software on student computers
B) Put the faculty computers in a separate VLAN
C) Power down the switches that connect to faculty computers when they are not in use.
D) Remove the student computers from the network and put them on a peer-to-peer network
E) Create an access list that blocks the students from the Internet where the hacking tools are
located.
Answer:
6. What are three valid reasons to assign ports on VLANs on a switch?
A) to make VTP easier to implement
B) to isolate broadcast traffic
2
3. C) to increase the size of the collision domain
D) to allow more devices to connect to the network
E) to logically group hosts according to function
F) to increase network security
Answer:
7. A managed switch is configured with all ports assigned to VLAN 2. In addition, all ports are
configured as full-duplex FastEthernet. What is the effect of adding switch ports to a new
VLAN on this switch?
A) The additions will create more collisions domains
B) IP address utilization will be more efficient
C) More bandwidth will be required than was needed previously
D) An additional broadcast domain will be created
E) An additional broadcast domain will be created
F) The possibility that switching loops will occur will increase dramatically
Answer:
8. Refering to the above network, which of the follow statements correctly describe the switch
port configuration and the router port configurations?
A) The Router1 serial port is configured as a trunking port
B) The Router1 port connected to Switch1 is configured using sub-interfaces
C) The Router1 port connected to Switch1 is configured as 10Mbps
D) The Switch1 port connected to Router1 is configured as a trunking port
E) The Switch1 port connected to Host B is configured as an access port
F) The Switch1 port connected to Hub1 is configured as full duplex
Answer:
3
4. 9. Which of the following are true statements on the use of VLANs to segment a network?
A) They increase the size of collision domains.
B) They allow logical grouping of users by function.
C) They can enhance network security
D) They increase the size of the broadcast domain while decreasing the number of collision
domains.
E) They increase the number of broadcast domains while decreasing the size of the broadcast
domains.
F) They simplify switch administration
Answer:
10. In the above network, 802.1Q trunk is configured between a switch and a router. Which of
the following are valid configuration for the host shown in the network?
A) host A IP address: 192.1.1.65
B) host A subnet mask: 255.255.255.224
C) host B IP address: 192.1.1.125
D) host B default gateway: 192.1.1.65
E) host C IP address: 192.1.1.166
F) host C subnet mask: 255.255.255.224
4
5. Answer:
11. Which is the following statements are the benefits associated with access control lists (ACLs)?
A) ACL monitor the number of bytes in the packets
B) ACL filter viruses and spam
C) ACL impede unnecessary services
D) ACL classifies and organizes network traffic
E) ACL provide high network availability
F) ACL provide IP route filtering
Answer:
12. When are packets being processed in an inbound access list?
A) Before the packets are routed to an outbound interface
B) After the packets are routed for outbound traffic
C) After the packets are routed to an outbound interface while queuing
D) Before and after the packets are routed on to an outbound interface
E) Depends on the configuration of the interface.
F) None of the above
Answer:
13. Which one of the ACL below will deny all telnet connections to subnet 10.10.1.0/24?
A) access-list 15 deny telnet any 10.10.1.0 0.0.0.255 eq 23
B) access-list 115 deny udp any 10.10.1.0 eq telnet
C) access-list 15 deny tcp 10.10.1.0 255.255.255.0 eq telnet
D) access-list 115 deny tcp any 10.10.1.0 0.0.0.255 eq 23
E) access-list 15 deny udp any 10.10.1.0 255.255.255.0 eq 23
Answer:
14. Which of the following statements are correct for named access list?
A) You can erase individual statements in a named access list
B) Named access lists required a list number range of 1000 to 1099
C) Name access lists must be specified as standard or extended
D) One can use the ip access-list command to create name access lists
E) One can’t erase individual statements in a named access list
F) You can use the ip name-group command to apply named access lists.
Answer:
5
6. 15. In the above network, the Hong Kong router needs an access list that will accomplish the
following:
I) Allow a Telnet connection to the HR server via the Internet
II) Allow Internet HTTP traffic to access the Web Server
III) Block any other traffic from the Internet to everything else
Which of the following access list can perform the above goals?
A) access-list 101 permit tcp any 172.17.18.252 0.0.0.0 eq www
B) access-list 1 permit tcp any 172.17.17.252 0.0.0.0 eq telnet
C) access-list 101 permit tcp any 172.17.17.252 0.0.0.0 any eq telnet
D) access-list 101 deny tcp any 172.17.17.252 0.0.0.0 eq telnet
E) access-list 101 deny tcp any 172.17.18.252 0.0.0.0 eq www
F) access-list 101 permit tcp any 172.17.17.252 0.0.0.0 eq telnet
Answer:
16. You need an access list that will deny access to all hosts that lie in the range of
192.168.160.0 to 192.168.191.0. Hosts in the 192.168.195.0 network will be granted full
access. Which one of the following fulfills the requirement?
A) access-list 1 deny 192.168.163.0 0.0.0.255
B) access-list 1 deny 192.168.128.0 0.0.127.255
C) access-list 1 deny 192.168.160.0 0.0.255.255
D) access-list 1 deny 192.168.160.0 0.0.31.255
Answer:
17. You are the system administrator, and you create the following access list.
access-list 101 deny tcp 5.1.1.10 0.0.0.0 5.1.3.0 0.0.0.255 eq telnet
6
7. access-list 101 permit any nay
You then enter the command “ip access-group 101 in” at the Ethernet port of Router0. Which
of the following telnet sessions will be blocked as a result of your access lists?
A) Telnet sessions from host A to host 5.1.1.10
B) Telnet sessions from host A to host 5.1.3.10
C) Telnet sessions from host B to host 5.1.2.10
D) Telnet sessions from host B to host 5.1.3.8
E) Telnet sessions from host C to host 5.1.3.10
F) Telnet sessions from host F to host 5.1.1.10
Answer:
18. Which of the following statements regarding the use of multiple access lists are valid when
configuring a single interface on a Cisco router?
A) Application of up to three access lists per protocol to a single interface
B) No more than two access lists per interface
C) One access list may be configured per direction for each layer 3 protocol configured on an
interface
D) The maximum number allowed varies due to RAM availability in the router
E) An infinite number of access list that can be applied to an interface, from most specific to
most general
F) Cisco IOS allows only one access list to an interface
Answer:
19. The following access list below was applied outbound on the fa0/0 interface connected to the
192.169.1.8/29 subnet.
access-list 135 deny tcp any 192.169.1.8 0.0.0.7 eq 20
access-list 135 deny tcp any 192.169.1.8 0.0.0.7 eq 21
How will the above access lists affect traffic?
A) FTP traffic from 192.169.1.22 will be denied
B) No traffic, except from FTP traffic will be allowed to exit fa0/0
C) FTP traffic from 192.169.1.9 to any host will be denied
D) All traffic exiting fa0/0 will be denied
E) All FTP traffic to network 192.169.1.9/29 will be denied
F) Telnet sessions from host F to host 5.1.1.10
Answer:
7
8. 20. What are some general guidelines for the placement of ACL?
A) Standard ACLs should be placed as close as possible to the source of traffic to be denied
B) Extended ACLs should be placed as close as possible to the source of traffic to be denied
C) Standard ACLs should be placed as close as possible to the destination of traffic to be
denied
D) Extended ACLs should be placed as close as possible to the destination of traffic to be
denied
Answer:
21. A network administrator has configured an ACL 172 to prevent telnet and ICMP traffic from
reaching a server with an IP of 192.168.13.26. Which command can the administrator issue
to verify that the access list is working properly?
A) Router#ping 192.168.13.26.
B) Router#debug access-list 172
C) Router#show open ports 192.168.13.26
D) Router#show access-list
E) Router#show ip interface
Answer:
22. The following ACL needs to be applied to one of the routers shown in the above network.
access-list 101 permit tcp 192.168.1.16 0.0.0.15 192.168.2.16 0.0.0.15 eq 23
What can be concluded for this ACL?
A) Telnet traffic from 192.168.1.16 0.0.0.15 to 192.168.2.16 0.0.0.15 is allowed
B) SMTP traffic from 192.168.2.16 0.0.0.15 to 192.168.1.16 0.0.0.15 is allowed
C) The ACL is configured to allow traffic from one specific host to another
D) The ACL should be applied inbound to the Ethernet port of RouterA
E) The ACL should be applied outbound to the Ethernet port of RouterA
Answer:
8
9. Problems [8 questions, total = 56 marks]
1. Based on the partial pathping result of Table 1, estimate the distance between 172.16.10.1
and 218.100.16.21 using the following criteria: [5 marks]
• The speed of signal traveled through the Internet medium is 2*108 m/s.
• Both 172.16.10.1 and 219.93.218.176 are in the same city. (negligible distance)
• There is router latency in 219.93.218.176 for both ways (to and fro).
• 218.100.16.21 is an efficient router (negligible latency).
c:>pathping 218.93.216.145
Computing statistics for 175 seconds…
Hop RTT Lost/Sent = Pct Lost/Send = Pct Address
0 acl127 [172.16.10.17]
0/ 100 = 0% |
1 0ms 0/ 100 = 0% 0/ 100 = 0% 172.16.10.1
0/ 100 = 0% |
2 0ms 0/ 100 = 0% 0/ 100 = 0% 218.93.190.45
0/ 100 = 0% |
3 28ms 0/ 100 = 0% 0/ 100 = 0% 219.93.218.176
0/ 100 = 0% |
4 46ms 0/ 100 = 0% 0/ 100 = 0% 218.100.16.21
0/ 100 = 0% |
...
Table 1
Answer:
9
10. 2. The following is the beginning 160 bytes of an Ethernet frame. Within this frame contains
part of an HTTP header. Please find the embedded URL inside the frame (Answer example:
http://www.cnn.com/news.html). [6 marks]
00 0e d7 ec 76 80 00 20 ed 78 85 31 08 00 45 00
01 d0 52 10 40 00 80 06 19 a7 c0 a8 09 1f c0 a8
03 01 11 fa 1f 90 09 a2 40 e9 57 b5 d9 e1 50 18
43 dd 8c c1 00 00 47 45 54 20 68 74 74 70 3a 2f
2f 77 77 77 2e 67 6c 6f 62 61 6c 72 65 73 65 61
72 63 68 2e 63 61 2f 33 63 6f 6c 5f 6c 65 66 74
4e 61 76 2e 63 73 73 20 48 54 54 50 2f 31 2e 31
0d 0a 48 6f 73 74 3a 20 77 77 77 2e 67 6c 6f 62
61 6c 72 65 73 65 61 72 63 68 2e 63 61 0d 0a 55
73 65 72 2d 41 67 65 6e 74 3a 20 4d 6f 7a 69 6c
.......
Answer:
3. The following Ethernet frame contains a TFTP option acknowledgement. What is the tsize
and blksize? (Hint: A little research in the Internet will be useful) [7 marks]
00 0d 87 df 79 dc 00 50 ba c2 e0 d4 08 00 45 00
00 39 35 b5 40 00 40 11 70 56 ac 10 1e 46 ac 10
1e 42 80 12 04 4d 00 25 3b d6 00 06 74 73 69 7a
65 00 35 38 39 33 37 36 00 62 6c 6b 73 69 7a 65
00 31 32 32 35 30 00
Answer:
10
11. 4. Fill in the appropriate number for the blanks in “Seq =” and “Ack =” for the following TCP
flow graph. Start with Seq=0 and Ack=0 for the first line (SYN). [16 marks]
11
12. 5. Write one signal formula, based on the following frequency domain display. [4 marks]
Amplitude/volts
3
8 18
f/Hz
Answer:
6. Based on Figure 1(a).1 and Figure1(a).2, list all the IP addresses that can be assigned to PC0,
so that PC0 can ping either PC1 or PC2. [8 marks]
Figure 1(a).1
!
hostname Router0
!
interface FastEthernet0/0
ip address 10.1.1.254 255.255.255.0
no shutdown
!
interface FastEthernet0/1
ip address 192.168.1.254 255.255.255.0
12
13. ip access-group 10 out
no shutdown
!
interface FastEthernet1/0
ip address 172.16.1.254 255.255.255.0
ip access-group 11 out
no shutdown
!
access-list 11 permit 10.1.1.0 0.0.0.52
access-list 10 permit 10.1.1.2 0.0.0.73
!
Figure 1(a).2
Answer:
For PC0 to PC1:
For PC0 to PC2:
7. What is the maximum transmission efficiency for an Ethernet frame that contains an UDP
segment, assuming the Ethernet frame overhead as 16 bytes. (Hint: transmission efficiency =
[Data/(Data+Overheads)]) [6 marks]
Answer:
13
14. 8. There are 8 lines in the following HTTP message. State the line (e.g. first line, second line,
etc) that contain an error and briefly describe the error. [4 marks]
GET http://www.google.com.my/images/nav_logo.gif HTTP/1.1rn
Content-Length: 3357
Date: Tue, 27 Feb 2007 11:02:41 GMTrn
Age: 668rn
Content-type: image/gifrn
Server: Netscape-Enterprise/6.0rn
Last-modified: Mon, 27 Dec 2004 14:49:47 GMTrn
Accept-ranges: bytesrn
rn
Answer:
14