okaeri nasai

J Welcome To My Blog / okaeri nasai J

mE



Free Widgets

Jam












The Widgipedia gallery
requires Adobe Flash
Player 7 or higher.

To view it, click here
to get the latest
Adobe Flash Player.




Minggu, 09 Desember 2012

CCNA 1 Final Version 4


1 Bottom-up troubleshooting begins at which layer of the OSI model?
#physical layer

2 Which two statements are true about local applications? (Choose two.)
#They are accessed from a remote computer.
#They run on the computer where they are installed.

3 Refer to the exhibit. What default gateway address will be assigned to PC1 if access to remote resources is needed?
#192.31.7.3

4 Which attribute must be the same for wireless devices on one network to be able to communicate with devices on a different network?
#default gateway

5 How do ISPs obtain public IP addresses?
#They obtain the addresses from the RFC.

6 Refer to the exhibit. The security policy of an organization allows employees to connect to the office intranet from their homes. Which type of security policy is this?
#remote access

7 Which wireless component allows wireless clients to gain access to a wired network?
#wireless bridge

8 Which network design layer provides a connection point for end user devices to the network?
#network

9 Which two transport layer protocols are used to transfer messages between hosts? (Choose two.)
#TCP
#UDP

10 An administrator is troubleshooting a network problem that involves the inability of users to reach Internet sites. During troubleshooting, the administrator is able to successfully ping web sites by their IP address, but pings to domain names are unsuccessful. Which service is most likely at fault?
#DNS

11 Refer to the graphic. Assume that the command output is from a wireless DHCP client that is connected to a Linksys integrated router. What can be deduced from the output?
#The wireless connection is good.

12 A company has a web server that must be accessible to both external and internal clients. Which security policy best practice should be followed to maximize security of the server?
#Keep the web server on the external network.

13 TCP/IP data transmission between the source and destination host is de-encapsulated in four steps:

A. The TCP header is removed.
B. Bits are decoded and the destination MAC address is recognized.
C. The IP header is removed and the contents are passed to the next layer.
D. The Ethernet header and trailer are removed.

What is the correct sequence of these steps?
#B, C, D, A

14 A computer joins the network and announces itself to all hosts on the LAN. What type of message does the computer send out?
#broadcast

15 What are two ways that a user can interact with an operating system shell? (Choose two.)
#CLI
#GUI

16 What are two examples of peripheral input devices? (Choose two.)
#barcode reader
#digital camera

17 What are three examples of logical configuration information used when planning a network implementation? (Choose three.)
#size of broadcast domains
#IP addressing scheme
#physical device location

18 Which wireless protocol is used for encryption?
#WEP

19 Which value represents the host portion of IP address 128.107.10.11 with a subnet mask of 255.255.0.0?
#.10.11

20 A home user is looking for an ISP connection that provides high speed digital transmission over regular phone lines. What ISP connection type should be used?
#DSL

21 What is the purpose of pop-up blocker software?
#It prevents the display of advertisement windows.

22 What are two advantages of purchasing a custom-built computer? (Choose two.)
#user can specify higher performance components
#supports higher-end graphics and gaming applications

23 Refer to the exhibit. PC1 is unable to access the web server at 209.165.200.226/27. Based on the provided output, what is the most likely cause of the problem?
#PC1 is configured with an incorrect IP address and default gateway.

24 What is the name for the contract between a customer and an ISP that specifies requirements for uptime and service response time?
#SLA

25 Which term is associated with logical addressing?
#IP addresses

26 Which Windows PC command line utility can be used to discover the path that a packet takes to reach a destination?
#tracert

27 Which statement accurately describes what network devices do in the distribution layer of the three layer design model?
#They interconnect local network segments.

28 Select three statements that correctly describe how DHCP services may be provided. (Choose three.)
#An integrated router can act as both DHCP server and DHCP client.
#Most home network integrated routers receive an IP configuration directly from their ISP.
#A variety of devices can act as DHCP servers, as long as they run DHCP service software.

29 Which two causes of networking problems are related to the physical layer? (Choose two.)
#disconnected cables
#improper operation of cooling fans

30 Which installation option should be chosen when the current operating system is too damaged to work properly?
#clean install

31 What is an ISP?
#It is an organization that enables individuals and businesses to connect to the Internet.

32 What two pieces of information should a help desk technician document while troubleshooting connectivity issues with an end user? (Choose two.)
#if the user can ping the default gateway address
#whether the PC uses dynamic or static IP addressing

33 Refer to the graphic. What feature can be installed on the Linksys integrated router to convert private IP addresses to Internet-routable addresses?
#NAT

34 After attaching four PCs to the switch ports, configuring the SSID and setting authentication properties for a small office network, a technician successfully tests the connectivity of all PCs that are connected to the switch and WLAN. A firewall is then configured on the device prior to connecting it to the Internet. What type of network device includes all of the described features?
#firewall appliance

35 For the second time in a week, workstations on a LAN are not able to log into the server. The technician fixed the problem the first time, but cannot remember the steps taken to solve it. What aspect of the troubleshooting process has the technician neglected?
#documenting the troubleshooting process

36 What is the default subnet mask for an IP address of
#255.0.0.0

37 How does a crossover cable make it possible for two "like devices" (for example, two switches) to communicate?
#The transmit pins on one device are connected to the receive pins on the other device.

38 What will be one result of using a wireless infrastructure when designing the communications infrastructure for a new building?
#Wireless devices will be easy to add or relocate.

39 What does the term "attenuation" mean in data communication?
#loss of signal strength as distance increases

40 Which type of computer has an integrated mouse?
#laptop

41 Which Windows command is used to display the configured IP address, subnet mask, and default gateway?
#ipconfig

42 What must be identical on all devices in a WLAN for successful wireless communication between the devices?
#SSID

43 For devices that do not autosense, which connection requires a crossover cable?
#PC port to PC port

44 Refer to the exhibit. A user on Host1 requests a web page from the web server. Which diagram is accurate for the encapsulation of the traffic that is sent from the user to the web server?
#D

45 What describes the external IP address that is obtained by a router through a cable or DSL modem?
#a public address that is obtained through DHCP from the ISP

46 Which two components are configured via software in order for a PC to participate in a network environment? (Choose two.)
#IP address
#subnet mask

47 What destination IP address is used in a unicast packet?
#a specific host

48 Which part of the electromagnetic spectrum is commonly used to exchange data between a PDA and a computer?
#infrared

49 What two commands can be used to form a new binding if client information does not agree with the DHCP client table? (Choose two.)
#ipconfig /release
#ipconfig /renew

50 What are the two possible values for a digital bit? (Choose two.)
#0
#1

51 Which picture shows a USB port on a PC?
#I THINK YOU'ARE A SMART GUY

52 What is the purpose of a router?
#to forward broadcasts to all interfaces so that all hosts receive them

CCNA Final Version 3


1 What is the purpose of TCP?
*to assign the logical address and encapsulate the request into packets for routing to the destination

2 Which adapter card would be required for a PC to exchange information with other PCs on a LAN?
*NIC

3 Which type of computer has an integrated mouse?
*laptop

4 After attaching four PCs to the switch ports, configuring the SSID and setting authentication properties for a small office network, a technician successfully tests the connectivity of all PCs that are connected to the switch and WLAN. A firewall is then configured on the device prior to connecting it to the Internet. What type of network device includes all of the described features?
*firewall appliance

5 Which installation option should be chosen when the current operating system is too damaged to work properly?
*clean install

6 A computer joins the network and announces itself to all hosts on the LAN. What type of message does the computer send out?
*broadcast

7 What portion of the destination IP address is used as a packet is routed through the Internet?
*subnet mask

8 Which layer in the hierarchical Ethernet design model ensures that traffic between local networks will be allowed?
*access layer

9 What is the name for the contract between a customer and an ISP that specifies requirements for uptime and service response time?
*SLA

10 A network technician is required to provide access to the Internet for a large company. What is needed to accomplish this task?
*ISP

11 A user is not able to connect to the network. A PC technician replaces the network cable that connects the PC to the switch port. The user is now able to connect to the network. Which troubleshooting technique did the technician use?
*divide-and-conquer

12 What component of a personal computer is responsible for the processing of all data?
*CPU

13 Which two transport layer protocols are used to transfer messages between hosts? (Choose two.)
*TCP
*UDP

14 Which device is often configured to act as both a DHCP client and a DHCP server?
*ISP modem

15 Refer to the exhibit. Which pair of addresses would be appropriate to use for PC1 and PC2 to establish a workgroup using private addresses?
*172.16.4.2 and 172.16.4.3

16. What are two ways that a user can interact with an operating system shell? (Choose two.)
*CLI
*GUI

17 A company has a web server that must be accessible to both external and internal clients. Which security policy best practice should be followed to maximize security of the server?
*Keep the web server on the external network.


18 Which wireless component allows wireless clients to gain access to a wired network?
*wireless bridge

19 Which two statements are characteristics of DHCP services? (Choose two.)
*A DHCP client determines the lease time for using the IP address that is supplied by the DHCP server.
*The DHCP server maps the IP addresses to host names.

20 What is the correct sequence of steps in the encapsulation of TCP/IP data as it passes from a source to a destination host?
A. converts data to bits for transmission
B. packages the data for end to end transport
C. adds the data-link header and trailer
D. adds the network IP address to the header of the packet
(langkah-langkah yang tepat)
*B,D,C,A

21 Refer to the exhibit. Assume that the exhibited output is from a host that is connected to a Linksys integrated router. What is the first thing that should be checked while using a bottom-up troubleshooting approach?
*the link status LED on the front of the router

22 Which firewall resource could include the capability of recognizing and filtering DoS attacks?
*Layer 4 packet filtering

23 Which type of network attack occurs when an unauthorized person tries to persuade a user to share a network user ID and password?
*social engineering

24 Which type of network supports DHCP and DNS services for network users in a network domain?
*ad hoc

25 What is the purpose of pop-up blocker software?
*It prevents the display of advertisement windows.

26 What are two best practices that are used when configuring a small home WLAN? (Choose two.)
the use of EAP
the encryption of the SSID
the use of pre-shared keys
the use of open authentication
the disabling of SSID broadcasting

27 What is a service pack?
*a collection of patches and updates released by a vendor

28 Why would a corporate web server be assigned a public IP address instead of a private IP address?
*The public address can be routed on the Internet.

29 When would a LAN switch use flooding to forward a frame?
when the MAC address table is empty
when retransmissions are required after a collision
after all hosts on the network are added to the MAC table
when a frame is received from a port that is connected to a hub

30 Refer to the exhibit. The network is experiencing excessive broadcast traffic from multiple hosts. What can be done to reduce the broadcast traffic that each host receives without compromising connectivity to the corporate servers?
Separate the switches with a router.
Create a separate VLAN for the servers and hosts.
Change from Ethernet switches to FastEthernet switches.
Increase the number of switches to reduce the number of PCs that are connected to each switch.

31 What are two characteristics of a MAC address? (Choose two.)
*It indicates the physical location of the host within the network.
*It is displayed in HEX characters.

32 What is an advantage of purchasing a custom-built computer?
*The user can specify high-performance components to meet specific needs.

33 What are two examples of peripheral input devices? (Choose two.)
*barcode reader
*plotter

34 A home user is looking for an ISP connection that provides high speed digital transmission over regular phone lines. What ISP connection type should be used?
*DSL

35 Which protocol in its default configuration downloads e-mail messages to the client computer and deletes them from the server?
*POP3

36 Which two statements are true about local applications? (Choose two.)
*They are accessed from a remote computer.
*They run on the computer where they are installed.

37 What is the purpose of the ipconfig /release command?
*It forces a client to give up its current IP address.

38 Which attribute must be the same for wireless devices on one network to be able to communicate with devices on a different network?
*default gateway

39 A user has reported a failure to connect to the network. Based on similar calls from other users in the same location, the network technician starts troubleshooting by entering the ipconfig command on the user computer. Which troubleshooting technique is the technician using?
*bottom-up

40 Which statement accurately describes what network devices do in the distribution layer of the three layer design model?
They interconnect individual hosts.
They interconnect multiple companies.
They interconnect local network segments.
They interconnect the company network to the ISP.

41 Refer to the graphic. Based on the information that is shown, what statement is true?
*All wireless devices that are connected to this access point must have an assigned SSID of Academy.

42 What wireless technology has the ability to communicate with many devices at the same time, makes use of the 2.4 GHz band, and is limited to low-speed, short-range communications?
*RF

43 Which of the following statements best describes DNS?
*DNS servers are used to map a name to an IP address.

44 Refer to the exhibit. An educational institution needs to connect PC systems that use private IP addressing to the Internet. They have multiple systems that need to access the Internet, but were only able to purchase one public IP address. What should be activated on the Linksys integrated router to achieve this goal?
*NAT

45 What procedure will help prevent users from detecting a wireless network?
Enable WEP.
Enable MAC filtering.
Disable SSID broadcasts.
Change the default administrator password on the AP

CCNA1 Final Version 1


  1 Refer to the exhibit. The security policy of an organization allows employees to connect to the office intranet from their homes. Which type of security policy is this?
  #remote access

2 What two commands can be used to form a new binding if client information does not agree with the DHCP client table? (Choose two.)
  #ipconfig /release
  #ipconfig /renew

3 For devices that do not autosense, which connection requires a crossover cable?
  #PC port to PC port

4 Which adapter card would be required for a PC to exchange information with other PCs on a LAN?
  #NIC

5 Which wireless technology provides mutual two-way authentication?
  #EAP

6 What component of a personal computer is responsible for the processing of all data?
  #CPU

7 What statement describes the filtering of traffic via the use of Stateful Packet Inspection?
  #It permits incoming packets that are legitimate responses to requests from internal hosts.

8 Which protocol in its default configuration downloads e-mail messages to the client computer and deletes them from the server?
  #POP3

9 Which protocol is used to transfer files among network devices and perform file-management functions?
  #FTP

10 What is true about a wireless access point that is equipped with an omnidirectional antenna?
   #radiates the signal equally in all directions

11 Refer to the exhibit. Which statement is true based on the information that is shown in the exhibit?
   #All wireless devices that are connected to this AP must have an assigned SSID of College.

12 Which of the following statements best describes DNS?
   #DNS servers are used to map a name to an IP address.

13 What is specified by the network number in an IP address?
   the network to which the host belongs

14 Which two causes of networking problems are related to the physical layer? (Choose two.)
   #damaged cables and connectors
   #overheated components

15 What wireless technology has the ability to communicate with many devices at the same time, makes use of the 2.4 GHz band, and is limited to low-speed, short-range communications?
   #RF


16 The help desk at a large packaging company receives a call from a user who is concerned about lost data files on the local PC. The help desk technician learns that the user clicked on an icon that appeared to be a program update, but no updates were scheduled for that program. What type of attack has likely occurred?
   #worm

17 What are two examples of peripheral input devices? (Choose two.)
   #barcode reader
   #digital camera

18 Refer to the exhibit. Assume that the command output is from a wireless DHCP client that is connected to a Linksys integrated router. What can be deduced from the output?
   #The wireless connection is operational.

19 What does it mean when a problem is being escalated by a helpdesk?
   #The helpdesk is moving the problem to a higher level support staff.

20 Which three statements describe an IP address? (Choose three.)
   #An IP address is known as a logical address.
   #An IP address is found in the Layer 2 header during transmission.
   #An IP address is unique within the same local network.

21 What advantage does a peer-to-peer network have over a client-server network?
   #It eliminates the need for centralized administration.

22 A wireless DHCP client cannot connect to the Internet through a Linksys integrated router. When you type ipconfig on the host, no IP address, subnet mask, or default gateway shows. What are two of the first things you will check? (Choose two.)
   #if the wireless client is configured for DHCP
   #if the correct default gateway is configured on the integrated router

23 Refer to the exhibit. If H4 sends a message to H1 and the destination MAC address is in the MAC table for both Switch1 and Switch2, which host devices will receive the message?
   #all hosts that are connected to Switch1 and Switch2

24 What is the purpose of pop-up blocker software?
   #It prevents the display of advertisement windows.

25 A host wants to send information simultaneously to all the other hosts in the same network. Which domain will support this type of communication?
   #broadcast

26 Which portion of the packet does a router use to forward the packet to the destination?
   #destination IP address

27 What measurement is commonly used to describe communication speed when transferring data?
   #bps

28 What procedure will help prevent users from detecting a wireless network?
   #Disable SSID broadcasts.

29 How does a crossover cable connect two routers?
   #It connects the pins that are used for transmitting on one router to the pins that are used for receiving on the other router.

30 Which Windows PC command line utility can be used to discover the path that a packet takes to reach a destination?
   #tracert


31 What destination IP address is used in a unicast packet?
   #a specific host

32 Which two automatic addressing assignments are supported by DHCP? (Choose two.)
   #subnet mask
   #default gateway address

33 Which network design layer provides hosts with initial connectivity to the network?
   #distribution

34 Which installation option should be chosen when the current operating system is too damaged to work properly?
   #clean install

35 What are two advantages of purchasing a custom-built computer? (Choose two.)
   #user can specify higher performance components
   #supports higher-end graphics and gaming applications

36 When would infrared be used to connect network devices?
   #when synchronizing a PC with a PDA that is in line of sight

37 For the second time in a week, workstations on a LAN are not able to log into the server. The technician fixed the problem the first time, but cannot remember the steps taken to solve it. What aspect of the troubleshooting process has the technician neglected?
   #identifying the problem

38 What are two characteristics of IPv4 addresses? (Choose two.)
   #They consist of two parts.
   #They are Layer 2 addresses and are different for every computer.

39 Which two statements are true about local applications? (Choose two.)
   #They are stored on the local hard disk.
   #They run on the computer where they are installed.

40 Which picture shows a USB port on a PC?
(YOU CAN ANSWER IT)


41 Why would a corporate web server be assigned a public IP address instead of a private IP address?
   #The public address can be routed on the Internet.

42 Refer to the exhibit. An educational institution needs to connect PC systems that use private IP addressing to the Internet. They have multiple systems that need to access the Internet, but were only able to purchase one public IP address. What should be activated on the Linksys integrated router to achieve this goal?
   #NAT

43 What type of computer would most likely use a docking station?
   #laptop

44 What is the default subnet mask for the IP address 128.107.23.10?
   #255.255.0.0

45 What are two characteristics of a MAC address? (Choose two.)
   #It is displayed in HEX characters.
   #It is a physical address.

46 Which three addresses belong to the category of private IP addresses? (Choose three.)
   #10.0.0.1
   #172.16.0.1
   #192.168.31.19

47 Refer to the exhibit. A network technician is statically assigning an IP address to a PC. The default gateway is correct. What would be a valid IP address to assign to the host?
   #128.107.255.1

48 What is an ISP?
   #It is an organization that enables individuals and businesses to connect to the Internet.

49 Which attribute must be the same for wireless devices on one network to be able to communicate with devices on a different network?
   #default gateway

50 Which statement accurately describes a recommended strategy for end users to employ when they interact with a help desk technician?
   #Provide as much information about the problem as possible.

51 Refer to the exhibit. Which option correctly represents the encapsulation of a packet that is sent by Host1 to the web server?
   #D

52 Which Windows command is used to display the configured IP address, subnet mask, and default gateway?

CCNA 1 Final version2


1 How does a crossover cable connect two routers?
  #It connects the pins that are used for transmitting on one router to the pins that are used for receiving on the other router.

2 Which statement correctly describes the function of ARP?
  #ARP is used by hosts to resolve an IP address to a MAC address for the destination host.

3 Which installation option should be chosen when the current operating system is too damaged to work properly?
  #clean install

4 A network engineer wants to represent confidential data in binary format. What are the two possible values that the engineer can use? (Choose two.)
  #0
5 Why does a router maintain an ARP table?
  #to determine addressing of frames for delivery on a local network segment

6 What is the purpose of TCP?
  #to manage data links and physical network transmissions

7 Which three address ranges can be used to depict private IP addresses? (Choose three.)
  #10.0.0.0 to 10.0.0.255
  #172.16.1.0 to 172.16.1.255
  #192.168.22.0 to 192.168.22.255

8 Which two causes of networking problems are related to the physical layer? (Choose two.)
  #disconnected cables
  #improper operation of cooling fans

9 Refer to the exhibit. PC1 sends a data packet to PC4. When the router forwards the data out Fa0/1, what destination MAC address will the router place in the frame?
  #0200.545D.25F7

10 What are two ways that a user can interact with an operating system shell? (Choose two.)
   #CLI
   #GUI

11 What is a service pack?
   #a collection of patches and updates released by a vendor

12 What component of a personal computer is responsible for the processing of all data?
   #CPU

13 What is a major characteristic of asymmetric Internet service?
   #Download speeds are faster than upload speeds.

14 What is the function of CSMA/CA in a WLAN?
   #It assures that clients are connected to the correct WLAN.

15 For the second time in a week, workstations on a LAN are not able to log into the server. The technician fixed the problem the first time, but cannot remember the steps taken to solve it. What aspect of the troubleshooting process has the technician neglected?
   #identifying the problem


16 What are two best practices that are used when configuring a small home WLAN? (Choose two.)
   #the encryption of the SSID
   #the use of pre-shared keys

17 Which portion of the packet does a router use to forward the packet to the destination?
   #destination IP address

18 For devices that do not autosense, which connection requires a crossover cable?
   #PC port to PC port

19 A user in a small office is unable to connect to the Internet. The user examines the physical connections to the ISR, a Linksys WRT300N, and notices a solid green LED on the port that is wired to the computer. What does the LED indicate about the current state of the port?
   #The computer is plugged in but no traffic is flowing.

20 Refer to the graphic. Based on the information that is shown, what statement is true?
   #All wireless devices that are connected to this access point must have an assigned SSID of Academy.

21 Refer to the exhibit. A home network is configured with the information in the graphic. A user tries to manually create a new connection to the network using the SSID Ciscoclass. However, a connection cannot be made. What could be the problem?
   #The SSID is case-sensitive.

22 How do ISPs obtain public IP addresses?
   #They obtain the addresses from the RFC.

23 What two pieces of information should a help desk technician document while troubleshooting connectivity issues with an end user? (Choose two.)
   #if the user can ping the default gateway address
   #whether the PC uses dynamic or static IP addressing

24 Refer to the exhibit. A network technician is statically assigning an IP address to a PC. The default gateway is correct. What would be a valid IP address to assign to the host?
   #128.107.255.1

25 Refer to the exhibit. With NAT overload configured on router R2, what is the inside global host address for packets that travel from host H1 to the Internet?
   #192.168.1.254

26 A network technician is required to provide access to the Internet for a large company. What is needed to accomplish this task?
   #ISP

27 Which type of computer has an integrated mouse?
   #laptop

28 An administrator is troubleshooting a network problem that involves the inability of users to reach Internet sites. During troubleshooting, the administrator is able to successfully ping web sites by their IP address, but pings to domain names are unsuccessful. Which service is most likely at fault?
   #DNS

29 What is the purpose of pop-up blocker software?
   #It prevents the display of advertisement windows.


30 When would infrared be used to connect network devices?
   #when synchronizing a PC with a PDA that is in line of sight


31 Which two protocols are responsible for encrypting data on a wireless network? (Choose two.)
   #WEP
   #WPA

32 Which type of attack involves flooding a server port with SYN messages?
   #data manipulation

33 Which of the following are transport layer protocols of the TCP/IP model? (Choose two.)
   #UDP
   #TCP

34 A home user is looking for an ISP connection that provides high speed digital transmission over regular phone lines. What ISP connection type should be used?
   #dial-up

35 Which picture shows a USB port on a PC?
   #UCAN ANSWER IT BY YOURSELF

36 What type of message is sent to a specific group of hosts?
   #unicast

37 What is an advantage of purchasing a custom-built computer?
   #The cost is lower compared to a computer that has been preassembled.

38 Which device is often configured to act as both a DHCP client and a DHCP server?
   #wireless-enabled laptop

39 Refer to the exhibit. Assume that the exhibited output is from a host that is connected to a Linksys integrated router. What is the first thing that should be checked while using a bottom-up troubleshooting approach?
   #the IP address on the router

40 Which two automatic addressing assignments are supported by DHCP? (Choose two.)
   #subnet mask
   #default gateway address

41 A local PC has the correct configuration that is required to access the network. A ping command that is sourced at the PC does not receive a response from a remote device. Which operating system command might be used to determine where the connection failed?
   #tracert

42 What is a weakness of WEP that is solved by WPA?
   #WEP uses a fixed length key for every connection whereas WPA uses a different key length for each connection.

43 Which Windows PC command line utility can be used to discover the path that a packet takes to reach a destination?
   #tracert

44 What is the purpose of the ipconfig /release command?
   #It forces the client to clear all the MAC address to IP address associations it has learned.

45 Refer to the exhibit. Which option correctly represents the encapsulation of a packet that is sent by Host1 to the web server?
   #DESTINATION IP ADDRESS : 172.16.1.1
    SOURCE IP ADDRESS : 172.16.1.10
    DESTINATION PORT : 80
    SOURCE PORT : 1048


46 When would a LAN switch use flooding to forward a frame?
   #when retransmissions are required after a collision

47 Which type of network supports DHCP and DNS services for network users in a network domain?
   #client/server

48 What is the default subnet mask for an IP address of 64.100.19.14?
   #255.0.0.0

49 Two switches are interconnected in the same wiring closet. What type of cable is typically used for this connection?
   #UTP crossover

50 Which two statements are true about local applications? (Choose two.)
   #They are stored on the local hard disk.
   #They run on the computer where they are installed.

51 Which IP address type is intended for a specific host?
   #unicast

52 What are two examples of peripheral output devices? (Choose two.)
   #headphones
   #printer

Selasa, 04 Desember 2012

Setting router dengan banyak PC


 1. Pertama buatlah seperti gambar seperti di bawah ini :













2. Berilah Ip address, subnet mask dan default gateway
Nama
Ip address
Subnet mask
Default gateway
PC 0
192.5.5.2
255.255.255.0
192.5.5.1
PC 1
192.5.5.3
255.255.255.0
192.5.5.1
PC 2
219.17.100.2
255.255.255.0
219.17.100.1
PC 3
219.17.100.3
255.255.255.0
219.17.100.1
PC 4
223.8.151.2
255.255.255.0
223.8.151.1
PC 5
223.8.151.3
255.255.255.0
223.8.151.1
PC 6
210.93.105.3
255.255.255.0
210.93.105.1
PC 7
210.93.105.5
255.255.255.0
210.93.105.2
PC 8
205.7.5.2
255.255.255.0
205.7.5.1
PC 9
205.7.5.3
255.255.255.0
205.7.5.1


3.Settinglah routernya


Lab A

Router>en
Router#conf t
Enter configuration commands, one per line.  End with CNTL/Z.
Router(config)#int fa0/0
Router(config-if)#ip address 192.5.5.1 255.255.255.0
Router(config-if)#no shut
Router(config-if)#exit
Router(config)#int fa1/0
Router(config-if)#ip address 205.7.5.1 255.255.255.0
Router(config-if)#no shut
Router(config-if)#exit
Router(config)#int s2/0
Router(config-if)#ip address 201.100.11.1 255.255.255.0
Router(config-if)#clock r 64000
Router(config-if)#no shut
Router(config-if)#exit
Router(config)#
Router#
Router#conf term
Router(config)#router rip
Router(config-router)#version 2
Router(config-router)#network 192.5.5.0
Router(config-router)#network 201.100.11.0
Router(config-router)#network 205.7.5.0

Lab B
Router>en
Router#conf t
Router(config)#int fa0/0
Router(config-if)#ip address 219.17.100.1 255.255.255.0
Router(config-if)#no shut
Router(config-if)#exit
Router(config)#int s2/0
Router(config-if)#ip address 199.6.13.1 255.255.255.0
Router(config-if)#clock r 64000
Router(config-if)#no shut
Router(config-if)#exit
Router(config)#int s3/0
Router(config-if)#ip address 201.100.11.2 255.255.255.0
Router(config-if)#no shut
Router(config-if)#exit
Router(config)#exit
Router#conf term
Router(config)#router rip
Router(config-router)#version 2
Router(config-router)#network 201.100.11.0
Router(config-router)#network 219.17.100.0
Router(config-router)#network 199.6.13.0
Router(config-router)#

Lab C


Router>en
Router#conf t
Router(config)#int fa0/0
Router(config-if)#ip address 223.8.151.1 255.255.255.0
Router(config-if)#no shut
Router(config-if)#exit
Router(config)#int s2/0
Router(config-if)#ip address 204.204.7.1 255.255.255.0
Router(config-if)#clock r 64000
Router(config-if)#no shut
Router(config-if)#exit
Router(config)#int s3/0
Router(config-if)#ip address 199.6.13.2 255.255.255.0
Router(config-if)#no shut
Router(config-if)#exit
Router(config)#exit
Router#conf term
Router(config)#router rip
Router(config-router)#version 2
Router(config-router)#network 199.6.13.0
Router(config-router)#network 223.8.151.0
Router(config-router)#network 204.204.7.0
Router(config-router)#

Lab D
Router>en
Router#conf t
Enter configuration commands, one per line.  End with CNTL/Z.
Router(config)#int fa0/0
Router(config-if)#ip address 210.93.105.1 255.255.255.0
Router(config-if)#no shut
Router(config-if)#exit
Router(config)#int s3/0
Router(config-if)#ip address 204.204.7.2 255.255.255.0
Router(config-if)#no shut
Router(config-if)#exit
Router(config)#exit

Lab E 




Router>en
Router#conf t
Enter configuration commands, one per line.  End with CNTL/Z.
Router(config)#int fa 0/0
Router(config-if)#ip address 210.93.105.2 255.255.255.0
Router(config-if)#no shut
Router(config-if)#exit
Router(config)# 

 Router Rip Lab D dan Lab E
Router>en

Router#conf term
Router(config)#router rip
Router(config-router)#version 2
Router(config-router)#network 210.93.105.0
Router(config-router)#network 204.204.7.0

4.Cek masing masing PC 



4. Hasil Terakhir






Rabu, 24 Oktober 2012

cara menghuhungkan 2 router dalam packet tracer

Kali ini saya akan kasih tutorial menghubungkan 2 Router dengan menggunakan packet tracer.

Dalam tutorial ini kita membutuhkan :
- 2 Router
- 3 PC
- 3 Switch
- kabel straight
- kabel console
- kabel DCE

langkah-langkahnya sebagai berikut :
1. Susunlah Komponen2 jaringan seperti di bawah ini

2. - Sambungkan kabel console dari PC0 ke Router0(RS 232 ---> Console)
    - Sambungkan kabel console dari PC2 ke Router1(RS 232 ---> Console)
    - Sambungkan kabel Straight dari PC0 ke Switch0(FastEthernet ---> FastEthernet0/1)
    - Sambungkan kabel Straight dari PC1 ke Switch1(FastEthernet ---> FastEthernet0/1)
    - Sambungkan kabel Straight dari PC2 ke Switch2(FastEthernet ---> FastEthernet0/1)
    - Sambungkan kabel Straight dari Switch0 ke Router0(FastEthernet1/1 ---> FastEthernet0/0)
    - Sambungkan kabel Straight dari Switch1 ke Router0(FastEthernet1/1 ---> FastEthernet1/0)
    - Sambungkan kabel Straight dari Switch2 ke Router1(FastEthernet1/1 ---> FastEthernet0/0) 
    - Sambungkan kabel Serial DCE dari Router0 ke Router1(Serial2/0 ---> Serial3/0)

3. Atur lah ip address 3 PC dengan ketetntuan :
   

Nama PC
Ip Address
Subnet Mask
Default Gateway
PC0
10.0.0.2
255.0.0.0
10.0.0.1
PC1
192.168.1.2
255.255.255.0
192.168.1.1
PC2
172.16.0.2
255.255.0.0
172.16.0.1


4. Masuk Ke Terminal dari PC0 untuk mengatur ip address dan ip route.


untuk mengaturnya ikuti command di bawah ini:

Command Router0:
Router>enable
Router#conf t
Enter configuration commands, one per line.  End with CNTL/Z.
Router(config)#int fa 0/0
Router(config-if)#ip add 10.0.0.1 255.0.0.0
Router(config-if)#no shut

%LINK-5-CHANGED: Interface FastEthernet0/0, changed state to up

%LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthernet0/0, changed state to up

Router(config-if)#int fa 1/0
Router(config-if)#exit
Router(config)#int fa1/0
Router(config-if)#ip add 192.168.1.1 255.255.255.0
Router(config-if)#no shut

%LINK-5-CHANGED: Interface FastEthernet1/0, changed state to up

%LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthernet1/0, changed state to up

Router(config-if)#exit
Router(config)#int serial2/0
Router(config-if)#ip add 202.1.1.1 255.255.255.0
Router(config-if)#no shut

%LINK-5-CHANGED: Interface Serial2/0, changed state to down
Router(config-if)#exit
Router(config)#
%LINK-5-CHANGED: Interface Serial2/0, changed state to up

Router(config)#int serial2/0
Router(config-if)#clock rate ?
Speed (bits per second
  1200          
  2400          
  4800          
  9600          
  19200         
  38400         
  56000         
  64000         
  72000         
  125000        
  128000        
  148000        
  250000        
  500000        
  800000        
  1000000       
  1300000       
  2000000       
  4000000       
  <300-4000000>  Choose clockrate from list above
Router(config-if)#clock rate 128000
Router(config-if)#
%LINEPROTO-5-UPDOWN: Line protocol on Interface Serial2/0, changed state to up

Router(config-if)#no shut
Router(config-if)#exit
Router(config)#ip route 172.16.0.0 255.255.0.0
% Incomplete command.
Router(config)#ip route 172.16.0.0 255.255.0.0 202.1.1.2
Router(config)#

5.  Masuk Ke Terminal dari PC2 untuk mengatur ip address dan ip route.

untuk mengaturnya ikuti command di bawah ini:

Command Router1:
Router>ena
Router#conf t
Enter configuration commands, one per line.  End with CNTL/Z.
Router(config)#int fa0/0
Router(config-if)#ip add 172.16.0.1 255.255.0.0
Router(config-if)#no shut

%LINK-5-CHANGED: Interface FastEthernet0/0, changed state to up

%LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthernet0/0, changed state to up

Router(config-if)#exit
Router(config)#int serial3/0
Router(config-if)#ip add 202.1.1.2 255.255.255.0
Router(config-if)#no shut

Router(config-if)#
%LINK-5-CHANGED: Interface Serial3/0, changed state to up

Router(config-if)#exit
Router(config)#
%LINEPROTO-5-UPDOWN: Line protocol on Interface Serial3/0, changed state to up

Router(config)#ip route 10.0.0.0 255.0.0.0 202.1.1.1
Router(config)#ip route 192.168.1.0 255.255.255.0 202.1.1.1
Router(config)#

6. Untuk mengetahui kalau telah terkoneksi coba lakukan "PING" di command prompt. Buka Command Prompt PC0.






7. Untuk mengetahui kalau telah terkoneksi coba lakukan "PING" di command prompt. Buka Command Prompt PC2.






Ya, begitulah cara sederhana untuk mengkoneksikan 2 router dengan menggunakan packet tracer.