A network administrator is verifying the configuration of a newly installed host by
establishing an FTP connection to a remote server. What is the highest layer of the protocol stack that the network administrator is using for this operation? a. application b. network c. data link d. physical Correct Answer: A 2. A Cisco router is booting and has just completed the POST process. It is now ready to find and load an IOS image. What function does the router perform next? a. It checks the configuration register b. It attempts to boot from a TFTP server c. It loads the first image file in flash memory d. It inspects the configuration file in NVRAM for boot instructions Correct Answer: A 3. Which subnet mask would be appropriate for a network address range to be subnetted for up to eight LANs, with each LAN containing 5 to 26 hosts? a. 0.0.0.240 b. 255.255.255.252 c. 255.255.255.240 d. 255.255.255.224 Correct Answer: D 4. Which two locations can be configured as a source for the IOS image in the boot system command? (Choose two.) a. RAM b. NVRAM c. flash memory d. TFTP server Correct Answer: CD 5.