Introduction to Networks CCNA v7 is designed as a portable desk reference to use anytime, anywhere …. Trust the best-selling Official Cert Guide series from Cisco Press to help you learn, prepare, and …. Skip to main content. Users can always make an informed choice as to whether they should proceed with certain services offered by Adobe Press.
If you choose to remove yourself from our mailing list s simply visit the following page and uncheck any communication you no longer want to receive: www. While Pearson does not sell personal information, as defined in Nevada law, Nevada residents may email a request for no sale of their personal information to NevadaDesignatedRequest pearson.
California residents should read our Supplemental privacy statement for California residents in conjunction with this Privacy Notice. The Supplemental privacy statement for California residents explains Pearson's commitment to comply with California law and applies to personal information of California residents collected in connection with this site and the Services.
This web site contains links to other sites. Please be aware that we are not responsible for the privacy practices of such other sites. We encourage our users to be aware when they leave our site and to read the privacy statements of each and every web site that collects Personal Information.
This privacy statement applies solely to information collected by this web site. Please contact us about this Privacy Notice or if you have any requests or questions relating to the privacy of your personal information.
We may revise this Privacy Notice through an updated posting. We will identify the effective date of the revision in the posting. Often, updates are made to provide greater clarity or to comply with changes in regulatory requirements. If the updates involve material changes to the collection, protection, use or disclosure of Personal Information, Pearson will provide notice of the change through a conspicuous notice on this site or other appropriate way. Continued use of the site after the effective date of a posted revision evidences acceptance.
Please contact us if you have questions or concerns about the Privacy Notice or any objection to any revisions. All rights reserved. Add To My Wish List. Part of the Exam Cram series. Book Sorry, this book is no longer in print. Not for Sale. Features more than questions organized according to the CCENT and CCNA exam objectives so you can easily assess your knowledge of each topic, no matter which exam you take. Each answer includes detailed explanations.
Our popular Cram Sheet, which includes tips, acronyms, and memory joggers, helps you review key facts before you enter the testing center. More than Questions on CD! More Information. This supplies you with a single subnetwork with 62 hosts. You need to have at least two subnets with 14 hosts in each subnet.
What custom subnet mask should you use? Identify three valid host addresses in any subnet of the You have an internal web server that has the IP address You need to enable this server to be accessed on TCP port 80 from the Internet; what would be the best solution for this situation?
Port NAT 6. Which of the following represent a private IP address? Which of the following terms does the IP address at position B in Figure 3. Outside Global 8. Which of the following terms does the IP address at position A in Figure 3. Which of the following terms does the IP address at position D in Figure 3. Outside Global You have been allocated the address space All devices in this network are required to use the same subnet mask, and all subnets are considered usable.
What is the most appropriate subnet mask for the network that is shown? What form of NAT maps multiple private IP addresses to a single public address by using different port numbers? Port load What two statements describe the IP address It is a private IP address.
The subnet address is The last usable host address is The lowest usable host address is The range of usable addresses is from After the routers shown in Figure 3. Further testing reveals additional connectivity issues. What is the most likely solution to this problem? Change the address of the Branch router LAN interface. Change the subnet mask of the Branch router LAN interface. Change the address of the Branch router WAN interface.
Change the address of the HQ router Internet interface. Change the subnet mask of the HQ router Internet interface. Which of the following statements describe the network shown in Figure 3. There are seven collision domains. There are eight collision domains. There are nine collision domains. There are ten collision domains. There is one broadcast domain.
There are two broadcast domains. There are three broadcast domains. What two statements accurately describe private IP addresses? Addresses that begin with RFC defines the private IP address ranges. Which of the following IP addresses are considered part of these ranges? You give your IT department a spreadsheet of IP addresses and their subnets. It represents the number of hosts possible on that subnetwork. It represents the number of subnetworks being used. It represents the class of IP address being used.
It represents the number of bits in the subnet mask that are set to 1. Based on Figure 3. The client is using a private address that was most likely statically assigned by a network administrator.
The client is using a public address that was most likely statically assigned by a network administrator. The client does not have an assigned IP default gateway. The client is using a private address that was most likely assigned using DHCP. The client is using a public address that was most likely assigned using DHCP. Based on the following output, what form of NAT is being used on this router? Using the following options, select the necessary IP addresses that would accurately complete the network depicted in Figure 3.
You have recently changed configuration settings on your DHCP server and network infrastructure. Some of the DHCP clients no longer have access to network resources. What would be the best option to troubleshoot this issue? Reboot the DHCP server. Use the tracert command to determine the location of the network outage. Verify the ARP cache on the clients by using the arp —a command.
It uses TCP as the transport layer protocol. It uses UDP as the transport layer protocol. It uses a reserved multicast MAC address. It uses a unicast data link and network layer address to reach the DHCP server. It is commonly ignored and discarded by the DHCP server.
How many valid host addresses are provided in the It is from the subnet The broadcast address of the subnet is The first valid IP address of the subnet is The last valid IP address of the subnet is You are a network technician at Acme, Inc.
You have subnetted the Your boss asks you how many usable subnetworks and usable host addresses per subnet this will provide. What should you tell her, assuming your router can use all possible subnets? You are configuring a subnet for the Acme, Inc.
You need to assign IP addresses to hosts in this subnet. You have been given the subnet mask of Which of these IP addresses would be valid? What is the most likely cause of the problem shown in Figure 3. DHCP server scope issues. DNS server is unreachable. A routing loop. You need to assign the IP address Place the numbers of the following commands in the correct order below. NOTE: Not all commands will be used. An administrator pings the IP address If he receives reply messages, what does this indicate?
The server has connected successfully to a device using IP. The server has connectivity with local devices. The server can reach the Internet. C, D B, F A, C C, F A, E, I E 59 60 Chapter 3 Answers and Explanations 1. This particular subnet mask allows for up to 62 hosts per network. Answer A is incorrect, as it allows for 65, hosts. Answer B is incorrect, as it allows up to hosts.
Answer D is incorrect, as it is not a valid subnet mask. The next valid IP host address in the Answer B is incorrect, as it is the network address for that particular subnetwork. Answer C is incorrect, as it is the same IP address as the router interface.
Answers E and F are incorrect as well, as they are on different subnets than the router interface. Answer G is incorrect because it represents the broadcast address for the The subnet mask Answer B is incorrect because it is your original subnet mask.
Answer C is incorrect, as it does not give you enough subnets. Answer E is incorrect, as it gives you enough subnets six , but you would have only six hosts per network.
A subnet mask of You simply check the fourth octet to ensure that all subnet and host parts are okay. The host bit portion cannot be or Answers A, C, and D are correct because 33 in decimal is , in decimal is , and in decimal is Answer B is incorrect, as in decimal is in binary. This is not a valid host address in this network.
All its host bits are zero. Answer E is incorrect, as in decimal is in binary. All host bits are ones. This is the local broadcast address and cannot be used as a host address. Answer F is incorrect, as in decimal is in binary. This is not a valid host address in this network, and all its host bits are zero.
Static NAT provides the best solution when you need a translation from a private address or port number to a public address or port number. Answer D is also incorrect.
Standard routing does not work because private addresses are blocked from traversing the Internet. The private address ranges are Answers B and D fall outside these ranges. Answers and Explanations 61 Refer to Figure 3. Inside Local Inside Global A Inside local addresses encompass any address on your internal network that is translated to the outside network via NAT. Answer B is incorrect because the inside global addresses are the IP addresses of the inside hosts as seen by the outside world after translation.
Answer C is incorrect because the outside local addresses are outside Internet addresses as they appear to the hosts behind a NAT device.
Answer D is incorrect because the outside global addresses are standard Internet-attached devices. Even though this IP address is assigned to the router, it still needs to be translated via NAT before being forwarded on to the Internet. Inside global addresses are the IP addresses of the inside hosts as seen by the outside world after translation. These are typically public IP addresses that are used to access the Internet. Answer A is incorrect because inside local addresses encompass any address on your internal network that is translated to the outside network via NAT.
Answer A is incorrect because you cannot move the subnet mask backward on a given network, which is known as supernetting.
Answer B is incorrect because this is the original subnet mask and only provides a single network. Answers C and D are incorrect because these masks only provide two or four subnets, respectively, which is short of the five needed. Answer F is incorrect because this subnet mask meets the network requirements, but only allows 14 usable host addresses per network.
NAT Overload allows multiple private addresses to share a single public address by using unique source port numbers for each request. Answer B is incorrect because Dynamic NAT translates one pool of addresses to another, also in fashion. Given the The first usable address from this range is Answer B is incorrect because the subnet address is Answer A is incorrect because the This IP address comes from the network range These IP addresses come from the network range Adjusting the IP address of the Branch office router to this range would solve the problem, provided the default gateway of all PCs in the Branch office pointed to this new IP address.
All other IP addresses and subnet masks in the network diagram are valid. Each active port on a switch is considered its own collision domain. Figure 3. The hub in the figure represents only a single collision domain, which is linked to the switch port to which it is connected. Likewise, every active interface of a router represents a broadcast domain. All other answers do not apply. Private IP addresses are prevented from routing on the Internet because they are duplicated in organizations around the world.
The private addressing scheme was designed to be used with NAT to provide Internet access while conserving public address space. Answer A is incorrect because private IP addresses are able to route; they are just unable to route on the Internet. Answer E is incorrect because addresses that begin with The range Answers and Explanations 63 These addresses are all part of the private ranges of Answer B is incorrect, as it does not fall into any of the RFC specified private ranges. Instead, it is a public IP address that is routable on the Internet.
Answer E is incorrect, as it is not a part of the private IP address range. It falls outside the Answer A is incorrect, as it does not show the number of hosts on a subnetwork. Answer B is incorrect, as it does not show the number of subnetworks in use.
The These IP address configurations never have default gateways assigned because they are not routable. Answers A, B, D, and E are incorrect because network administrators rarely, if ever, assign clients IP addresses from the Answer B is incorrect because there is no such thing as port-based NAT.
A, E, I. The best way to approach this type of problem is to reverse-engineer the given IP addresses on the diagram to determine their network range. Because Answers B and C are incorrect because they are from other subnets.
Answer E is correct because it is from the same subnet as the router Answer F is not correct because it is the broadcast address, and answers D and G are not correct because they are from different subnets. Finally, for the HQ Router Internet interface, you can find the network range to be This makes answers H and J incorrect. This will allow them to get any new scope options that were implemented, such as new IP addresses, DNS server settings, or a default gateway.
Answer A is incorrect because DHCP servers should not have to be rebooted anytime configuration settings are changed. Answer B is incorrect because tracert is typically used to find router issues in a communication path. Every broadcast message that uses the IP protocol suite will use UDP as a transport layer protocol because TCP requires a three-way handshake to establish communication, making answer A incorrect.
This forces the Layer 2 switch to send the message out all ports. Keep in mind that you will not have access to a calculator on any Cisco exam, so it may be beneficial to become familiar with common exponential values.
By reverse-engineering the subnet mask, you can find the original network range for this address as Because the first and last addresses in the range are reserved, the first usable address becomes Answer A is incorrect because this address is from the Answer C is incorrect because the broadcast address is Answer E is incorrect because the last valid address for the subnet is You also find that there are two available hosts per subnet using the 2n — 2 formula, where n equals the number of bits borrowed for the hosts.
Because all subnets are usable, you do not need to subtract 2 from the subnetworks. Answer C is incorrect, as there would never be 32 hosts per subnet; you always have to subtract 2 from the 2n formula because of the network ID and the directed broadcast address on each subnetwork.
Answer D is incorrect, as you would never have 16 hosts per subnet; you always have to subtract 2 from the 2n formula because of the network ID and the directed broadcast address on each subnetwork. Answers and Explanations 65 B, C, and D.
These three are valid host addresses when using a Answer A is incorrect, as it is a broadcast address on the Answer E is incorrect, as it is a broadcast address on the Answer F is incorrect, as it is the network address for Based on the information given, the most likely cause of the problem is DNSrelated. However, when the client attempts to ping by using the hostname, the ping request fails in indicating that it could not find the host www. Answer B is incorrect because the question indicates the organization is using a private IP address scheme.
Answer D is incorrect because successful pings to the Internet eliminate routing issues. The correct order of the commands is as follows: a. Being able to successfully ping the loopback address does not indicate any connectivity capabilities outside the local system, making answers A, B, and C incorrect.
Describe basic routing concepts including packet for- warding, router lookup process. Select the appropriate media, cables, ports, and connec- tors to connect routers to other network devices and hosts. Configure, verify, and troubleshoot RIPv2. Access and utilize the router CLI to set basic parameters. Connect, configure, and verify operation status of a device interface. Verify device configuration and network connectivity using ping, traceroute, Telnet, SSH, or other utilities.
Perform and verify routing configuration tasks for a static or default route given specific routing requirements. Manage IOS configuration files including save, edit, upgrade, restore. Manage Cisco IOS. Implement password and physical security. Which of the following access methods meet your requirements?
FTP session 2. You are logged in to a router and want to view the IP address of neighboring Cisco routers. What IOS command gives this information for the directly connected neighbors? In Figure 4. Not all modes will be used.
You suspect that the IOS has become corrupt. Which router component should you examine to verify your suspicions? TFTP server connectivity 5. You connect to a router console port and press the Enter key. The router returns the following prompt: Quick Answer: 87 Detailed Answer: 89 Router config-line What function is typically accomplished from this mode? Configuring logging to an external server 6. When working in the Cisco IOS, which commands move your cursor to the beginning of the line and end of the line, respectively?
You are troubleshooting a Cisco router at one of your offices. The router seems to lose its configuration each time it is rebooted.
You study the output shown below. What is the cause of the problem? Quick Answer: 87 Detailed Answer: 89 Cisco revision 5. The configuration register is incorrect. The router has an insufficient DRAM configuration. Boot register settings should be modified to reflect this. Open Password required, but none set [Connection to CiscoWest closed by foreign host] Which of the following is true?
Your router does not currently have a Telnet password set. The CiscoWest router does not currently have a Telnet password set. Your router does not currently have an enable secret password set.
The CiscoWest router does not currently have an enable secret password set. Where does the router store its current configuration file while in operation? ROM A junior administrator at the company wants to know the sequence of events that occur when you power on a router. What is your reply? Nevertheless, to completely prepare yourself for any Cisco test, we recommend that you begin by taking the Self-Assessment that is included in this book, immediately following this introduction.
The Self-Assessment tool will help you evaluate your knowledge base against the requirements for a CCNA under both ideal and real circumstances. Based on what you learn from the Self-Assessment, you might decide to begin your studies with some classroom training, some practice with the Cisco IOS, or some background reading. On the other hand, you might decide to pick up and read one of the many study guides available from Cisco or third-party vendors on certain topics, including the CCNA Exam Prep from Que Publishing.
0コメント