1. Which of the following are the address ranges of the private IP addresses? (Choose three.)
10.0.0.0 to 10.255.255.255
200.100.50.0 to 200.100.25.255
150.150.0.0 to 150.150.255.255
172.16.0.0 to 172.31.255.255
192.168.0.0 to 192.168.255.255
127.16.0.0 to 127.31.255.255
2. Which two functions of the OSI model occur at layer two? (Choose two.) physical addressing encoding routing cabling media access control
3. Refer to the exhibit. What function does router RT_A need to provide to allow Internet access for hosts in this network? address translation
DHCP services ftpd web server
4. What is true regarding network layer addressing? (Choose three.) uses a flat structure prevent broadcasts heirarchical uniquely identifies each host
48 bits in length contains a network portion
5. Refer to the exhibit. Host A attempts to establish a TCP/IP session with host C. During this attempt, a frame was captured with the source MAC address 0050.7320.D632 and the destination MAC address 0030.8517.44C4. The packet inside the captured frame has an IP source address 192.168.7.5, and the destination IP address is 192.168.219.24. At which point in the network was this packet captured? leaving host A leaving ATL leaving Dallas leaving NYC
6. Refer to the exhibit. Assume all devices are using default configurations. How many subnets are required to address the topology that is shown?
1
3
4
5
7
7. A technician is asked to secure the privileged EXEC mode of a switch by requiring a password. Which type of password would require this login and be considered the most secure? console enable enable secret
VTY
8. Refer to the exhibit. A technician is working on a network problem that requires verification of the router LAN interface. What address should be pinged from this host to confirm that the router interface is operational?
127.0.0.1