
















CCNA 2 - Module 1
1. If a router cannot find a valid configuration file during the startup sequence, what will occur?
The router will prompt the user for a response to enter setup mode.
2. Refer to the exhibit. The network administrator has configured the router with the interface IP addresses shown for the directly connected networks. Pings from the router to hosts on the connected networks or pings between router interfaces are not working. What is the most likely problem?
The interfaces must be enabled with the no shutdown command.
3. Refer to the exhibit. What can be concluded from the routing table output in the exhibit? (Choose two.)
The FastEthernet0/0 and Serial0/0/0 interfaces of this router were configured with an IP address and the no shutdown command.
An IP packet received by this router with a destination address of 198.18.9.1 will be forwarded out of the Serial0/0/0 interface.
4. Refer to the exhibit. The frame shown in the exhibit was received by the router. The router interfaces are operational. How will the router process this frame? (Choose two.)
The router will change the frame type to one supported by the WAN link before forwarding the frame.
The frame was received on the Fa0/0 interface of the router and will be switched to the S0/0/0 interface.
5. Passwords can be used to restrict access to all or parts of the Cisco IOS. Select the modes and interfaces that can be protected with passwords. (Choose three.)
VTY interface
console interface
privileged EXEC mode
6. Which two statements correctly describe the components of a router? (Choose two.)
ROM contains diagnostics executed on hardware modules.
Flash memory does not lose its contents during a reboot.
7. Refer to the exhibit. After host 2 is connected to the switch on the LAN, host 2 is unable to communicate with host 1. What is the cause of this problem?
The subnet mask of host 2 is incorrect.
Host 1 and host 2 are on different networks.
8. Which are functions of a router? (Choose three.)
packet switching
segmentation of broadcast domains
selection of best path based on logical addressing
9. Refer to the exhibit. All routers have a route in its routing table to each network that is shown in the exhibit. Default routes have not been issued on these routers. What can be concluded about how packets are forwarded in this network? (Choose two.)
If RouterA receives a packet that is destined for 192.168.3.146, it will be forwarded out interface S0/0/1.
If RouterB receives a packet that is destined for 10.5.27.15, it will be forwarded out interface S0/0/1.
10. The serial connection shown in the graphic needs to be configured. Which configuration commands must be made on the Sydney router to establish connectivity with the Melbourne site? (Choose three.)
Sydney(config-if)# ip address 201.100.53.2 255.255.255.0
Sydney(config-if)# no shutdown
Sydney(config-if)# clock rate 56000
11. Refer to the exhibit. What can be concluded from the output of the running-configuration of a router?
The commands that are displayed determine the current operation of the router.
12. Refer to the exhibit. Host A pings host B. When R4 accepts the ping into the Ethernet interface, what two pieces of header information are included? (Choose two.)
destination IP address: 192.168.10.134
destination MAC address: 9999.DADC.1234
13. What is the outcome of entering these commands?
R1(config)# line vty 0 4
R1(config-line)# password check123
R1(config-line)# login
sets the password to be used for connecting to this router via Telnet
14. Which of the following is the correct flow of routines for a router startup?
load bootstrap, load IOS, apply configuration
15. What three processes does a router execute when it receives a packet from one network that is destined for another network? (Choose three.)
decapsulates the Layer 3 packet by stripping off the Layer 2 frame header
uses the destination IP Address in the IP header to look up the next-hop address in the routing table
encapsulates the Layer 3 packet into the new Layer 2 frame and forwards it out the exit interface
16. The network administrator needs to connect two routers directly via their FastEthernet ports. What cable should the network administrator use?
cross-over
17. Which two statements describe characteristics of load balancing? (Choose two.)
Load balancing allows a router to forward packets over multiple paths to the same destination network.
Unequal cost load balancing is supported by EIGRP.
18. What information about the router and its startup process can be gathered from the output of the show version command? (Choose three.)
the last restart method
the configuration register settings
the location from where the IOS loaded
19. Which interfaces in the exhibit could be used for a leased line WAN connection? (Choose two.)
1
4
20. From what location can a router load the Cisco IOS during the boot process? (Choose two.)
TFTP server
Flash memory
21. A network administrator has just entered new configurations into Router1. Which command should be executed to save configuration changes to NVRAM?
Router1# copy running-config startup-config
22. What is the default sequence for loading the configuration file?
NVRAM, TFTP, CONSOLE
23. What header address information does a router change in the information it receives from an attached Ethernet interface before information is transmitted out another interface?
the Layer 2 source and destination address
Being open source helps open the doors to all sorts of goodies in the form of extensions, plugins, and addons. Firefox’s success today comes from the fact that any feature you can imagine has been implemented as an extension.
Chromium, Google Chrome’s open source project was opened shortly after the beta release. Here’s a couple of tidbits you might be interested in. Chromium uses Subversion as it’s version control system and it was written in C++ using Visual Studio 2005.
Holy crap, Chrome is fast. The UI is responsive, pages load quickly, and the Javascript is blazing fast. CNET compiled a nice set of benchmarks comparing Chrome to the other major browsers and the end results speak for themselves.
Chrome won’t be holding the top spot for long if Tracemonkey lives up to its reputation. According to a press release from Mozilla, Firefox 3.1’s Javascript engine will be faster than Chrome’s V8.
It’s not that I like WebKit. It has quirks just like every other rendering engine. What I like is that Google decided to use an existing engine to power Chrome instead of rolling their own. Every site we build here at SOTC goes through the gambit of browsers - Firefox, IE6, IE7, Safari, and Opera. It’s challenging enough making a site work across the board and the last thing web developers need is another browser to add to the list. In most cases, a site made to work in Safari will work in Chrome without any problems.
Every tab you create in Chrome spawns a new process (unless two tabs are visiting sites with the same top-level domain). This prevents a single tab from crashing the browser or making it unresponsive by consuming too many resources. Javascript being executed in one tab does not affect any other tab. Flash, however, still does. In fact a Flash animation can render the entire browser unusable if it’s using the entire processor. It’s something all browsers suffer from and hopefully Adobe will address it in the future.
Every tab and every plugin are displayed in Chrome’s task manager. This helpful little utility makes finding the site or plugin that is hosing the processor much easier than it used to be.
Ok, so I don’t know the technical term for this feature, but when you search for text (control-F), Chrome will highlight on the scrollbar places in the document where that term is found. It’s a simple feature, but one that is extremely useful.
Chrome’s Omnibar is pretty close to Firefox’s Awesome Bar, with a few exceptions. First of all, the Omnibar will suggest other sites for you that you haven’t even visited yet. It’s also a replacement for the search box. Just type something in the box and if it’s not a website, it will search for the term using the search engine of your choice (defaults to Google, of course).
I’ve been using Chrome on two different computers with two different operating systems exclusively for two straight days and I have yet to make it crash. Firefox 3 didn’t fair so well when it first came out. If the announcement comic is correct, they perform some serious testing on each build of the browser.
In Chrome, you can grab a tab, dislodge it from it’s current window and either drop it on the desktop to create a new window, or drop it inside another Chrome window as a new tab. I don’t know if I’ll ever actually use the feature myself, but it’s really fun to play with.
In Chrome, you can create a new window, called an Incognito window, that doesn’t save any information about where you’ve been or what you’ve done. According to Google, you might want something like this if you’re buying a gift for someone that shares your computer, and you don’t want them to know what you’ve been looking at. Various bloggers and reviewers, however, have a different use in mind.
Solve it
4 criminals are caught and are to be punished. The Judge allows them to be freed if they can solve a puzzle. If they do not, they will be hung. They agreed.
The 4 criminals are lined up on some steps (shown in picture). They are all facing in the same direction. A wall separates the fourth man from the other three.
So to summarize:-
Man 1 can see men 2 and 3.
Man 2 can see man 3.
Man 3 can see none of the others.
Man 4 can see none of the others.
The criminals are wearing hats. They are told that there are two white hats and two black hats. The men initially don't know what colour hat they are wearing. They are told to shout out the color of the hat that they are wearing as soon as they know for certain what colour it is.
They are not allowed to turn round or move.
They are not allowed to talk to each other.
They are not allowed to take their hats off.
Who is the first person to shout out and why? J