Your Ad Here

JAMES BLUNT-1973



Download audio


Lyrics
»»  read more

JENNIFER LOPEZ-DO IT WELL



Download audio


Lyrics

»»  read more

RIHANNA- DON'T STOP THE MUSIC (repost)



Download this video
Download audio



Lyrics


»»  read more

DAVID GUETTA- "LOVE IS GONE" Music Video




Download this video
Download mp3





Lyrics

»»  read more

RIHANNA FEAT NE-YO- "HATE THAT I LOVE" Music Video




Download this video
Download audio






Lyrics

»»  read more

50 CENT FEAT. AKON - "STILL WILL" Music Video








Music video by 50 Cent performing Still Will: Regular Version, Closed Captioned with Curtis Jackson, Curtis Jackson, K. Abdul Rahman, W. Stanberry, Kirk Robinson, A. Thiam, S. Carter, B. Honeycutt.


Lyrics
»»  read more

DUFFY - "MERCY " Music Video



Download this video




Duffy the hotly tipped of 2008 with her official music video "Mercy".

Lyrics


»»  read more

CISCO CCNA 1- Final Exam Answers

1. Which devices will create multiple collision domains in an Ethernet network? (Choose two.)
Switch router

2. How many collision domains are shown in the diagram?
Seven

3. Refer to the exhibit. The physical documentation shows a portion of the internetwork of the ABC Company. Which segments will be free of collisions?
segments 3, 4, and 5

4. Refer to the exhibit. Which diagram represents the network topology that an administrator would prefer, and why would the administrator prefer it?
Diagram A. It will better provide available bandwidth to the hosts.

5. After an unsuccessful ping to the local router, the technician decides to investigate the router. The technician observes that the lights and fan on the router are not operational. In which layer of the OSI model is the problem most likely occurring?
Physical

6. Refer to the exhibit. How many broadcast domains are shown?
Three

7. Refer to the exhibit. A network associate needs to establish an Ethernet connection between Host A and Host B. However, the distance between the two hosts is further than the cabling standards allow. Which two devices that operate at the physical layer of the OSI can be used to allow Host A and Host B to communicate? (Choose two.)
hub
repeater

8. Refer to the exhibit. What must be configured on Host B to allow it to communicate with the file server? (Choose three.)
a unique host IP address
the subnet mask for the LAN
the default gateway address

9. Refer to the exhibit. Host A pings Host B. What can be concluded about the source and destination addresses contained in the communication sent by Router R5 when it forwards the ping out the Ethernet interface to Host B? (Choose two.)
source MAC address: 5555.AAAA.6666
destination IP address: 192.168.10.134

10. What is the correct number of usable subnetworks and hosts for the IP network address 192.168.35.0 subnetted with a /28 mask?
14 networks / 14 hosts

11. Refer to the exhibit. The network administrator wants to create a subnet for the point-to-point connection between the two routers. Which subnetwork mask would provide enough addresses for the point-to-point link with the least number of wasted addresses?
255.255.255.252

12. Refer to the exhibit. A network technician is trying to determine the correct IP address configuration for Host A. What is a valid configuration for Host A?
IP address: 192.168.100.20; Subnet Mask: 255.255.255.240; Default Gateway: 192.168.100.17

13. Two peer hosts are exchanging data using TFTP. During the current session, a datagram fails to arrive at the destination. Which statement is true regarding the retransmission of the datagram?
Datagram retransmission is controlled by the application.

14. Which protocols are TCP/IP application layer protocols? (Choose two.)
TFTP
DNS

15. When using Category 5 UTP cable, which RJ-45 pin pairs are used to exchange data between hosts on an Ethernet network?
1 and 2; 3 and 6

16. In the exhibit, the connections between the devices are labeled A, B, C, D, and E. For each connection, what is the correct UTP cable to use?
A=rollover, B=straight, C=straight, D=crossover, E=crossover

17. Which cable diagram displays the end to end pinout for a crossover cable used with Cisco devices?
Cable C

18. Which subnet masks could be used when subnetting a Class B IP address? (Choose two.)
255.255.255.240
255.255.192.0

19. Which physical network topology is easy to monitor and troubleshoot, easy to add new devices to as the network expands, but subject to complete failure when a central hub or switch ceases to work?
Star

20. A computer technician is asked to make a network cable. One end of the cable is pinned as a 568A and the other as a 568B. For what purposes can this cable be used? (Choose two.)
to connect a switch to a switch
to connect a hub to a switch

21. Refer to the exhibit. Workstation 1 pings the Fa0/1 interface of Router 1. Which MAC address will workstation 1 obtain during the ARP request for this communication?
00-08-A3-B6-CE-02

22. Refer to the exhibit. A network administrator has configured a network after subnetting the network number 192.168.0.0/28. Workstation 1 is not able to communicate with Workstation 2. What is the cause of this loss in communications?
Workstation 1 is not on the same network that the Router 1 LAN interface is on.

23. Which network device creates the highest amount of latency?

Router

24. An Ethernet host receives a frame, calculates the FCS, and compares the calculated FCS to the FCS received in the frame. The host finds that the two FCS values do not match. What action will be taken by the host?
The host discards the frame.

25. A user initiates three simultaneous FTP connections from the local host to the same FTP server. Which OSI layer is responsible for establishing and managing these different FTP connections?

Session

26. A network administrator has installed a 24 port switch and connected 10 computers with 10/100 NICs. If the NICs are operating at 100 Mbps, how much bandwidth is available for each computer to receive data?

100 Mbps

27. Based on the graphic above, which of the following occurs as each host system comes on line in the topology?
The switch adds MAC address to the bridge table as each host sends a frame.

28. Consider the networks shown in the exhibit. Host A is sending packets to host B. Which layer of the OSI model is being used when the router is making the calculated decision to determine which interface to send the packet out?
Network

29. Why would a company install a switch instead of a hub when building or expanding a corporate network?
A switch provides more bandwidth by sending frames only out the port to which the destination device is attached. A hub sends the frame out all ports except the source port.

30. Refer to the exhibit. The hub and the switch are operating using factory default settings. Which hosts will receive the frame if host A transmits a broadcast frame?
Workstations B, C, D, E, and the router will receive the data.

31. Refer to the exhibit. What kind of Ethernet cable is represented?
straight-through cable

32. The ping command can be used to test connectivity between hosts. Which OSI model layers are verified by this test?
Layers 1, 2 and 3

33. A technician is testing connectivity between the devices using the ping command. Pings between Host B and Host A were successful. The technician could not ping the R3 address 172.16.3.2 from Host A. The technician issued ipconfig from Host A and saw the information displayed in the exhibit. What is the most likely problem?
The default gateway of Host A is incorrect.

34. Why do vendors utilize the OSI model when designing networking products?
It ensures greater compatibility and interoperability with equipment from different vendors.

35. A router determines the path to deliver a packet. What layer of the OSI model does this fact represent?
Network

36. How does a switch learn the addresses of hosts connected to its ports?
The switch reads the source MAC address on incoming frames and records it in CAM.

37. Refer to the exhibit. The connections in the exhibit are labeled A through E. Which of these indicate LAN links? (Choose two.)
link A

link E

38. A large company has a network that is constantly changing. The routing tables in the routers need to be adjusted to reflect the changes in the routing paths. What type of routing would the network administrator implement?
dynamic routing protocols

39. A network administrator has added a new switch to the network. The new switch connects to an existing switch that is already installed. Which UTP cable correctly connects the new switch to the existing switch?
crossover

40. Refer to the exhibit. A newly hired technician has a task of terminating CAT 5 UTP cables. The network administrator visually examined the cables the technician terminated. Some of the cables have connectors as shown in the exhibit. What should the network administrator explain to the technician about the cables?
The cable in Graphic A will produce more crosstalk.

41. Refer to the exhibit. What is the order of the TCP/IP Protocol Data Units as data is moved as indicated through the OSI model?
bits, frames, packets, segments, data

42. Refer to the exhibit. Which type of UTP cable should be used to connect Host A to Switch1?
straight-through

43. Which technologies are considered to be LAN technologies? (Choose two.)
Token Ring

Ethernet

44. Refer to the topology in the graphic. Which characteristic does this type of topology possess? Communication continues in the event of a break in any one connection.

45. Which characteristics are common to both UDP and TCP? (Choose two.)
uses port numbers
classified as a transport layer protocol

46. A router interface has been assigned an IP address of 172.16.192.166 with a mask of 255.255.255.248. To which subnet does the IP address belong?
172.16.192.160

47. Which type of address is 192.168.170.112/28?
subnetwork address

48. What is the decimal representation of the binary number 11111000?
248

49. What are important characteristics to consider when purchasing a network interface card? (Choose two.)
media used on the network system
bus used on the computer

50. Which of the following statements are correct about CSMA/CD? (Choose three.)
It is a media access method used in LANs.
When a device needs to transmit, it checks to see if the media is available.
Only one device can successfully transmit at a time.


===============================================================

CCNA 3.1 Semester 1 Final Exam Result Correct 100% (Option 2)

1 Which devices segment collision domains? (Choose two.)
transceiver
* router
* switch
hub
media

2. Refer to the exhibit. How many collision domains are present in the topology?
3
5
6
* 7
8
9

3. Refer to the exhibit. An instructor in the network class has given the students the network diagram and asks the students to select the appropriate network devices. The goals are to provide a collision-free LAN environment and to provide Internet connectivity. What is the correct design?

Replace Box 1 with a hub and Box 2 with a router.
Replace Box 1 with a router and Box 2 with a bridge.
* Replace Box 1 with a Layer 2 switch and Box 2 with a router.
Replace Box 1 with a router and Box 2 with a Layer 2 switch.
Replace Box 1 with a bridge and Box 2 with a Layer 2 switch.

4. Refer to the exhibit. A network administrator attempts to increase the available bandwidth for workstation A by setting the NIC to full-duplex mode. After the configuration is changed, there are increased collisions and errors occurring. Why is this occurring in the network?

* The NIC is no longer detecting collisions.
The switch will not support full-duplex mode.
The hub will be continually producing a jam signal.
The cabling will not support bidirectional transmissions.

5. Refer to the exhibit. A network administrator is testing a connectivity issue in the network. The administrator discovers that host A cannot communicate with host B, host C, or RouterA. A ping command on host A to 127.0.0.1 succeeds. The NIC link indicator on host A is illuminated. Temporarily, the administrator removes the cable from host A and uses the LAN cable from host B to connect from host A to port 1 on the switch. While using the substitute cable, host A can communicate with host C and RouterA. At which layer of the OSI model was the problem occurring?

session
transport
network
data link
* physical


6. How many broadcast domains are shown in the diagram?

* three
four
five
six
seven
eight

7. A collision has occurred on an Ethernet network. Which three statements explain the CSMA/CD process? (Choose three.)

* After the jam signal, all transmission stops for a random period.
When the collision is detected, the hosts stop transmission immediately.
When the collision is detected, the hosts stop transmission after eight microseconds.
When the backoff period expires, the hosts involved in the collision have priority to transmit.
* When the backoff period expires, each host checks to see whether the networking media is idle and then attempts to transmit.
* When the collision is detected, the hosts continue to transmit using a jam pattern for a short time to ensure that all hosts detect the collision.

8. Which of the following devices extend a collision domain? (Choose two.)

switch
* hub
bridge
router
* repeater

9. What should a network administrator consider when migrating to Gigabit Ethernet architecture from Fast Ethernet? (Choose three.)

* Existing NICs might need to be upgraded.
* Existing switches might need to be upgraded.
Existing NICs must support half-duplex mode.
Existing UTP wiring must be replaced with fiber.
* Existing UTP must be tested for CAT 5e compatibility.
Existing network topology must support shared media.

10. Refer to the exhibit. What must be configured on Host B to allow it to communicate with the Host C? (Choose three.)

the MAC address of RTA router interface connected to Switch 1
* a unique host IP address
the IP address of Switch 1
* the default gateway address
the MAC address of Host C
* the subnet mask for the LAN

11. Which binary number is a representation of the decimal number 248?

11101000
11110100
* 11111000
11111010

12. Which type of address is 223.168.17.167/29?

host address
multicast address
* broadcast address
subnetwork address

13. Workstation A sends data to workstation B. What will have to be altered as the data passes through the router? (Choose two.)

* Layer 1 bit pattern
* Layer 2 frames
Layer 3 packets
Layer 4 segments
Layer 5 -7 data

14. Which combination of network id and subnet mask correctly identifies all IP addresses from 172.16.128.0 through 172.16.159.255?

172.16.128.0 255.255.255.224
172.16.128.0 255.255.0.0
172.16.128.0 255.255.192.0
* 172.16.128.0 255.255.224.0
172.16.128.0 255.255.255.192

15. What is the correct number of usable subnetworks and hosts for the IP network address 192.168.99.0 subnetted with a /29 mask?

6 networks / 32 hosts
14 networks / 14 hosts
* 30 networks / 6 hosts
62 networks / 2 hosts

16. Refer to the exhibit. The internetwork in the exhibit has been assigned the IP address 172.20.0.0. What would be the appropriate subnet mask to maximize the number of networks available for future growth?

255.255.224.0
255.255.240.0
255.255.248.0
* 255.255.252.0
255.255.254.0
255.255.255.0

17. A NIC of a computer has been assigned an IP address of 172.31.192.166 with a mask of 255.255.255.248. To which subnet does the IP address belong?

172.31.0.0
172.31.160.0
172.31.192.0
172.31.248.0
* 172.31.192.160
172.31.192.248


18. What are three characteristics of the TCP protocol? (Choose three.)

exchanges datagrams unreliably
is used to send IP error messages
* forces the retransmission of unacknowledged packets
* creates a virtual session between end-user applications
carries the IP address of the destination host in the TCP header
* is responsible for breaking messages into segments and reassembling them at their destination


19. A network user is using the FTP protocol to transfer data from the local host to an FTP server. The local host is also using the SNMP protocol to report the system status to the network management system. Which statement describes the communication from the host?

FTP and SNMP will use the same port number.
* FTP uses TCP to establish a session before any data is transferred.
The UDP session will reorder the SNMP data as it is received by the network management system.
The TCP protocol for the FTP transfer will use a random destination port number to the FTP server.

20. Which protocols are TCP/IP application layer protocols? (Choose two.)

UDP
* FTP
IP
* SMTP
TCP


21. Which technologies are considered to be WAN technologies? (Choose two.)

Ethernet
* DSL
Token Ring
* Frame Relay
FDDI

22. Refer to the exhibit. What is the order of the TCP/IP Protocol Data Units as data is moved as indicated through the OSI model?

data, segments, frames, packets, bits
data, packets, segments, frames, bits
* data, segments, packets, frames, bits
data, packets, frames, segments, bits

23. Refer to the exhibit. A newly hired technician has a task of terminating CAT 5 UTP cables. The network administrator visually examined the cables the technician terminated. Some of the cables have connectors as shown in the exhibit. What should the network administrator explain to the technician about the cables?

Both cables are acceptable.
* The cable in Graphic A will produce more crosstalk.
The cable in Graphic A should be used in the more critical network segments.
The cable in Graphic A is preferred because it will be easier to crimp the connector.

24. Refer to the exhibit. Which type of UTP cable should be used to connect Switch1 to Switch2?
rollover
console
* crossover
straight-through

25. When using Category 5 UTP cable, which RJ-45 pin pairs are used to exchange data between hosts on an Ethernet network?

1 and 2; 4 and 5
* 1 and 2; 3 and 6
3 and 6; 7 and 8
4 and 5; 7 and 8

26. Refer to the exhibit. Which type of cabling should be used at each of the connection points shown?
A-crossoverB- straight-throughC-straight-throughD-fiberE-straight-through
A-crossoverB-crossoverC-straight-throughD-fiberE-crossover
* A-straight-throughB-crossoverC-straight-throughD-fiberE-straight-through
A-fiberB-crossoverC-straight-throughD-crossoverE-straight-through
A-straight-throughB-crossoverC-crossoverD-fiberE-straight-through
A-crossoverB-crossoverC-straight-throughD-fiberE-straight-through

27. Refer to the exhibit. What type of cable connects the two routers together without any intermediary device?

console
rollover
* crossover
straight-through

28. Which cable diagram displays the end to end pinout for a console cable used with Cisco devices?

Cable A
* Cable B
Cable C
Cable D

29. Which subnet masks would be valid for a subnetted Class B address? (Choose two.)

255.0.0.0
255.254.0.0
255.224.0.0
255.255.0.0
* 255.255.252.0
* 255.255.255.192


30. What type of routing is it when the network administrator manually configures a route?

* static
dynamic
interior
exterior

31. Which statement describes a star topology?

Each host in the network is connected to a backbone cable that is terminated at both ends.
* Each host is connected to a hub or switch, either of which acts as a central point for all network connections.
Each host is directly connected to two other hosts to form a long chain of hosts.
Each host has a connection to all other hosts in the network.

32. Refer to the exhibit. The connections in the exhibit are labeled A through E. Which of these indicate WAN links? (Choose three.)

link A
* link B
* link C
* link D
link E

33. A technician needs to connect a FastEthernet port from a router to a FastEthernet port on a switch. The graphic shows the RJ-45 cable ends for a patch cable. What result can be expected if this cable is used for the link?

* The cable will be able to pass traffic between the devices.
The cable has reversed-pairs, which will degrade the signal quality.
The cable has split-pairs, which will increase crosstalk and create an unreliable link.
The cable has all the wires reversed, which will prevent the link lights from indicating that there is link.

34. Refer to the received frame in the exhibit. In what two ways is the information from the received frame used by a switch? (Choose two.)

192.168.10.5 is used to create an ARP request.
192.168.10.5 is used to build the forwarding table.
1234.5678.1abc is stripped from the frame header.
* 192.168.10.11 is left intact as the frame is forwarded.
The switch compares 192.168.10.11 to the addresses in the routing table to make the forwarding decision.
* To make the forwarding decision, the switch looks in its switch table for address aaaa.bbbb.cccc.

35. Which layer of the OSI model defines the process of adding the source and destination IP address to a data packet?

transport
* network
data link
physical

36. Refer to the exhibit. Workstation 1 pings the Fa0/1 interface of Router 1. Which MAC address will workstation 1 obtain during the ARP request for this communication?

00-06-5B-88-DF-C3
00-B0-D0-7F-F7-46
00-0F-24-85-75-C0
00-0B-E5-64-BD-44
* 00-08-A3-B6-CE-02
00-08-A3-B6-CE-03

37. Refer to the exhibit. What device does Device X represent in the graphic to allow PC1 to ping PC4?

hub
* router
bridge
access point
Layer 2 switch

38. When the receiving workstation detects an error in the data it has received, it does not acknowledge receipt of the data. The source workstation retransmits the unacknowledged data. Which layer of the OSI model supports this process of retransmission?

network
application
session
* transport

39. A company has the following addressing scheme requirements: -currently has 25 subnets -uses a Class B IP address -has a maximum of 300 computers on any network segment -needs to leave the fewest unused addresses in each subnetWhat subnet mask is appropriate to use in this company?

255.255.240.0
255.255.248.0
* 255.255.254.0
255.255.255.0
255.255.255.128
255.255.255.248

40. What can be verified by successfully pinging the reserved loopback address on a host?

Connectivity exists between two hosts on the LAN.
* The TCP/IP stack of the local host is installed correctly.
A connection exists between a host and the default gateway.
The route a packet takes from the local host to a remote host is valid.

41. Refer to the exhibit. A company needs to attach workstation E at a point 150 meters from an existing hub. What device should be placed at location D to allow the new host to connect to the network with the least amount of latency?

router
switch
bridge
* repeater

42. Refer to the exhibit. Which type of Category 5 cable is used to make an Ethernet connection between Host A and Host B?

coax cable
rollover cable
* crossover cable
straight-through cable

43. A simplified CAM table for Switch1 is shown in the exhibit. If host A sends a frame with a destination MAC address of 66C, how does the switch process this frame?

The switch drops the frame.
The switch sends the frame out port 3.
The switch sends the frame out ports 1, 2, and 4.
* The switch sends the frame out ports 2, 3, and 4.
The switch sends the frame out ports 1, 2, 3, and 4.

44. Which of the following increases the potential for a collision to occur?

the use of an active hub instead of an intelligent hub
the use of an intelligent hub instead of an active hub
a reduction in the number of devices attached to the hub
* an increase in the number of devices attached to the hub
2 points for Option 4

45. Refer to the exhibit. Host A has been added to the network. However, host A cannot communicate with the server B or the Internet. All cables have been tested and are functioning to standards. At which layer of the OSI model is this problem occurring?

Layer 1
Layer 2
* Layer 3
Layer 4

46. A workstation is browsing a web server. What will be the partial contents of the segment sent from the workstation to the web server?

* a

47. Refer to the exhibit. What is the purpose of the highlighted address?

* It allows the NIC to communicate with other devices on the same network.
It identifies which part of the IP address is to be considered the network portion.
It provides an address to which all packets that do not have a specific route are sent.
It uniquely identifies the NIC to the free token that is passed on the Ethernet network.

48. Refer to the exhibit. Host A is being manually configured for connectivity to the LAN. Which two addressing scheme combinations are possible configurations that can be applied to the host for connectivity? (Choose two.)

Address - 192.168.1.14 Gateway - 192.168.1.33
Address - 192.168.1.45 Gateway - 192.168.1.33
Address - 192.168.1.32 Gateway - 192.168.1.33
* Address - 192.168.1.82 Gateway - 192.168.1.65
Address - 192.168.1.63 Gateway - 192.168.1.65
* Address - 192.168.1.70 Gateway - 192.168.1.65

49. A user initiates three simultaneous FTP connections from the local host to the same FTP server. Which OSI layer is responsible for establishing and managing these different FTP connections?

application
* session
transport
network
data link


»»  read more

CISCO CCNA 1 - Practice Final


Which of the following does 1000BASE-T use to accomplish gigabit speeds on Cat 5e cable?

the use of four conductors in full-duplex mode
the use of two multiplexed pairs of wires, simultaneously
the use of three pairs of wires for data and the fourth for stabilization and forward error correction
* the use of all four pairs of wires in full-duplex mode, simultaneously

When a network administrator applies the subnet mask 255.255.255.248 to a Class A address, for any given subnet, how many IP addresses are available to be assigned to devices?
1022
510
254
126
30
* 6

Which of the following is the Layer 4 PDU?
bit
frame
packet
* segment

In a new network installation, the network administrator has decided to use a medium that is not affected by electrical noise. Which cable type will best meet this standard?
coaxial
screened twisted pair
shielded twisted pair
unshielded twisted pair
* fiber optic

Which of the following describes the use of Spanning Tree Protocol (STP)?
resolve routing loops
eliminate Split Horizon errors
limit collisions
* resolve switching loops

What is the maximum distance that 10BASE-T will transmit data before signal attenuation affects the data delivery?
* 100 meters
185 meters
300 meters
500 meters

The highest capacity Ethernet technologies should be implemented in which areas of a network? (Choose three.)
between workstation and backbone switch
between individual workstations
* between backbone switches
* between enterprise server and switch
* on aggregate access links

Convert the binary number 10111010 into its hexadecimal equivalent. Select the correct answer from the list below.
85
90
* BA
A1
B3
1C

What is important to remember about the data link layer of the OSI model when considering Peer to Peer communication? (Choose three.)
It links data to the transport layer.
It encapsulates frames into packets.
* It provides a service to the network layer.
* It encapsulates the network layer information into a frame.
* Its header contains a physical address which is required to complete the data link functions.
It encodes the data link frame into a pattern of 1s and 0s (bits) for transmission on the medium.

A small company has a class C network license and needs to create five usable subnets, each subnet capable of accommodating at least 20 hosts. Which of the following is the appropriate subnet mask?
255.255.255.0
255.255.255.192
* 255.255.255.224
255.255.255.240

Which of the following is a term associated with replacing hubs with switches to increase the number of collision domains?
encapsulation
latency
* segmentation
layered model
broadcast domain
extended

How is a MAC address represented?
four groups of eight binary digits separated by a decimal point
four Base10 digits separated by a decimal point
six hexadecimal digits
* twelve hexadecimal digits
twenty-four Base10 digits

Which layer of the OSI model covers physical media?
* Layer 1
Layer 2
Layer 3
Layer 4
Layer 5
Layer 6

Which of the following wireless standards increased transmission capabilities to 11 Mbps?
802.11a
* 802.11b
802.11c
802.11d

Which of these workstation installation and setup tasks are concerned with network access layer functions? (Choose two.)
configuring the e-mail client
* installing NIC drivers
configuring IP network settings
* connecting the network cable
using FTP to download application software updates

What type of network cable is used between a terminal and a console port?
cross-over
straight-through
* rollover
patch cable

What is the recommended maximum number of workstations configured on a peer-to-peer network?
25
15
* 10
5
2

A company with a Class B license needs to have a minimum of 1,000 subnets with each subnet capable of accommodating 50 hosts. Which mask below is the appropriate one?
255.255.0.0
255.255.240.0
255.255.255.0
* 255.255.255.192
255.255.255.224

If a network administrator needed to download files from a remote server, which protocols could the administrator use to remotely access those files? (Choose two.)
ASCII
* TFTP
IMAP
* FTP
UDP

"CompA" is trying to locate a new computer named "CompB" on the network. Which of the following does "CompA" broadcast to find the MAC address of "CompB"?
MAC request
* ARP request
ping
Telnet
proxy ARP

What type of wiring problem is depicted in this sample of a cable tester?
a fault
a short
* an open
a split
a good map

Which part of an IP address identifies a specific device on a network?
first two octets
third and fourth octets
network portion
* host portion
only the fourth octet

Which of the following are small, discrete components found within a personal computer? (Choose three.)
* transistor
microprocessor
power supply
* capacitor
* light emitting diode
hard disk

Which of the following are useable Class A IP addresses with a default subnet mask? (Choose three.)
127.0.39.1
* 111.9.28.30
* 123.1.2.132
128.50.38.2
* 105.1.34.1
0.23.92.3

Which of the following items are common to all 100BASE technologies? (Choose three.)
* frame format
media
connectors
* timing
* multi-part encoding

Select the necessary information that is required to compute the estimated time it would take to transfer data from one location to another. (Choose two.)
* file size
data format
network in use
type of medium
* bandwidth of the link

What does the "10" in 10Base2 indicate about this version of Ethernet?
The version uses Base10 numbering within the frames.
* The version operates at a transmission rate of 10 Mbps.
Frames can travel 10 meters unrepeated.
The maximum frame length is 10 octets.

During cable testing, which of the following are used to calculate the information carrying capacity of a data cable? (Choose two.)
bit speed
* attenuation
wire map
saturation limit
* analog bandwidth

Which combinations of charges will be repelled by electric force? (Choose two.)
neutral and neutral
neutral and positive
neutral and negative
* positive and positive
positive and negative
* negative and negative

Which of the following will test the internal loopback of a node?
ping 10.10.10.1
ping 192.168.1.1
* ping 127.0.0.1
ping 223.223.223.223
ping 255.255.255.255

Which of the following services is used to translate a web address into an IP address?
* DNS
WINS
DHCP
Telnet

An ISDN Basic Rate Interface (BRI) is composed of how many signaling channels?
* 1
2
3
4

John has been hired as the network administrator of a local company and has decided to add more hubs to the company's existing network. Which of the following has been caused by John's inexperience?
* collision domain extended
an increased number of collision domains
increased network performance
increased bandwidth
extended bandwidth

The accumulation of traffic from which of the following can cause a network condition called broadcast radiation? (Choose three.)
anonymous FTP servers
telnet sessions
* video over IP applications
NAS services
* ARP requests
* RIP updates

What device must be used between an AUI port of a networking device and the media to which it is being connected?
a transducer
a transmitter
* a transceiver
a transponder
a port replicator

What is established during a connection-oriented file transfer between computers? (Choose two.)

a temporary connection to establish authentication of hosts
* a connection used for ASCII or binary mode data transfer
a connection used to provide the tunnel through which file headers are transported
a command connection which allows the transfer of multiple commands directly to the remote server system
* a control connection between the client and server

Convert the Hexadecimal number A2 into its Base 10 equivalent. Select the correct answer from the list below.
156
158
160
* 162
164
166

Using the data transfer calculation T=S/BW, how long would it take a 4MB file to be sent over a 1.5Mbps connection?
52.2 seconds
* 21.3 seconds
6.4 seconds
2 seconds
0.075 seconds
0.0375 seconds

Which protocol functions at the internet layer of the TCP/IP protocol suite?
File Transfer Protocol (FTP)
Trivial File Transfer Protocol (TFTP)
Transmission Control Protocol (TCP)
* Internet Protocol (IP)
User Datagram Protocol (UDP)
Simple Mail Transport Protocol (SMTP)

Which part of the URL http://www.awsb.ca/teacher gives the name of the domain?
www
http://
/teacher
* awsb.ca

What are features of the TCP/IP Transport layer? (Choose two.)
path determination
handles representation, encoding and dialog control
* uses TCP and UDP protocols
packet switching
* reliability, flow control and error correction

Which of the following protocols are used for e-mail transfer between clients and servers? (Choose three.)
TFTP
SNMP
* POP3
* SMTP
* IMAP4
postoffice

Which of the following are considered the best electrical conductors for use in data network communications? (Choose three.)
glass fibers
* copper
* gold
plastic
silicon
* silver

Which of the following are features of the Internet Protocol (IP)? (Choose two.)
* It is the most widely implemented global addressing scheme.
It allows two hosts to share a single address on a local area network.
* It is a hierarchical addressing scheme allowing addresses to be grouped.
It is only locally significant, used primarily on local area networks.

Which OSI layer encapsulates data into packets?
session
transport
* network
data link

Which type of institution does the domain suffix .org represent?
government
education
network
* non-profit

Which OSI layer defines the functions of a router?
physical
data link
* network
transport
session

For which of the following is Ethernet considered the standard? (Choose three.)
* inter-building connection
mid-length voice
video conferencing
* vertical wiring
* horizontal wiring
diagonal wiring

To make sure timing limitations are not violated when implementing a 10 Mbps Ethernet network involving hubs or repeaters, a technician should adhere to which rule?
the 4-5-3 rule
the 6-4-2 rule
the 3-4-5 rule
* the 5-4-3 rule

Which term describes an ARP response by a router on behalf of a requesting host?
ARP
RARP
* Proxy ARP
Proxy RARP


»»  read more

CISCO CCNA 2 - Practice Final

1
An administrator has made routing protocol changes to a router's configuration. To ensure that the changes are implemented, the active configuration is saved and the router is reloaded. After the router has initialized, the output on the screen displays "Would you like to enter the initial configuration dialog?[yes/no]:" Why did this dialog appear?

There was a POST failure.

The incorrect IOS loaded.

There was an error in the startup configuration file.

*The configuration register was set to ignore NVRAM.



2
What are the major characteristics of a wide area network? (Choose three.)

*connect devices separated by wide geographical areas

*includes technologies of FDDI and Ethernet

uses serial connections to access bandwidth

*common carriers are needed for connections

type of connection between a router and a switch



3
If the config-register on a router is set to 0x2102, where is the first place the router will look for boot system commands?

RAM

ROM

Flash

*NVRAM



4


Which of the following are valid static IP routes? (Choose three.)

RouterB(config)# ip route 192.168.5.0 255.255.255.0 S1

*RouterC(config)# ip route 192.168.1.0 255.255.255.0 S1

*RouterA(config)# ip route 192.168.3.0 255.255.255.0 192.168.2.2

RouterB(config)# ip route 192.168.1.0 255.255.255.0 192.168.2.2

*RouterC(config)# ip route 192.168.2.0 255.255.255.0 192.168.4.1

RouterA(config)# ip route 192.168.4.0 255.255.255.0 192.168.2.1



5


Refer to the network and routing table entries shown in the graphic. What will happen when a packet destined for network 192.66.7.0 is received by Router A?

*It will be forwarded through interface S1.

It will be forwarded to the default route.

It will be directed toward the Internet.

It will be discarded.



6


A network administrator trying to deny Telnet traffic from the 192.5.5.0 network to the 201.100.11.0 network entered the commands shown in the graphic. When monitoring the network, the administrator noticed that Telnet packets were still passing between those networks. What is the cause?

The router ignored this type of traffic because it required a standard access list to be configured instead of an extended one.

The wrong port was configured for the ACL so Telnet traffic was still allowed.

*The access list has not been assigned to an interface.

The permit ip any any allowed all traffic to pass regardless of the other statements listed in this ACL.



7
Which of the following is the correct flow of routines for a router startup?

*load bootstrap, load IOS, apply configuration

load bootstrap, apply configuration, load IOS

load IOS, load bootstrap, apply configuration, check hardware

check hardware, apply configuration, load bootstrap, load IOS



8
Which of the following would cause the "Message Of The Day" banner to appear? (Choose three.)

*telnetting into the router

initiating a debug session

configuring a router for the first time

using the Aux port to check the current configuration

*using the console port to check the current configuration



9
When must a router serial interface be configured with the clock rate command?

*when the interface is functioning as a DTE device

when the interface timers have been cleared

when the connected DTE device is shut down

when the interface is functioning as a DCE device



10


The internetwork needs to communicate between the hosts connected to the E0 interface of the Utah router and hosts connected to the E0 interface of the Idaho router. The hosts should also have connectivity to the Internet. Which commands must be configured in order to enable this communication? (Choose three.)

Idaho(config)# ip route 172.31.1.0 255.255.255.0 172.31.2.1

*Idaho(config)# ip route 0.0.0.0 0.0.0.0 s0

*Idaho(config)# ip route 172.31.2.0 255.255.255.0 172.31.2.2

Utah(config)# ip route 172.31.3.0 255.255.255.0 172.31.2.1

*Utah(config)# ip route 172.31.3.0 255.255.255.0 s1

Utah(config)# ip route 0.0.0.0 0.0.0.0 s0



11


The network shown in the graphic is using RIP as the routing protocol. Which of the following are true regarding the network discovery process that will occur for this network? (Choose three.)

*The Palm Beach router will show networks 192.168.7.0 and 192.168.8.0 as directly connected networks.

All of the routers will have direct knowledge of the exact topology of the entire network.

*The Key West router will forward routing table information to the Miami and Palm Beach routers.

The Miami router will learn about network 192.168.1.0 from the Key West router.

*If network 192.168.4.0 becomes unavailable, the Key West router will notify the other routers of this fact in the next update.



12
Which of the following are necessary for basic network communication to occur between hosts that will run such applications as Telnet, web browsers, and e-mail? (Choose three.)

*TCP/IP must be installed and properly configured on each device.

Multiple subnets must be configured on the router to ensure accurate delivery.

*A default gateway must be configured for datagrams to travel outside of the LAN.

The hosts must be directly connected to a switch to travel outside of the LAN.

*To ensure accurate delivery, a router must be configured and accessible by hosts on the network.



13
When would the ROM monitor mode be used? (Choose two.)

maintaining routing configuration settings

*modifying the IOS image stored in Flash

running a limited IOS feature set

*performing the bootstrap process



14
Why is it useful to have an interface description?

A user can telnet to the router using the interface description.

The interface description is a shortcut way to edit the running-config.

*The interface description helps identify distant network connections.

The interface will remain inactive until an interface description is applied.



15
After issuing the show interfaces command, a technician notices the line "Serial1 is down, line protocol is down" in the output. Which of the following are possible reasons for this message output? (Choose three.)

There is a mismatch in the encapsulation type on both ends of the link.

*A Layer 1 issue exists.

*An interface problem exists.

The clockrate was not set during configuration.

*There is no usable media for the protocol.

Keepalive messages are not being sent.




16
The following line was displayed in the output of the show ip route command.

R 192.168.3.0/24 [120/3] via 192.168.2.2, 00:00:30, Serial0/0

What is the value of the routing metric?

*3

12

20

30

120



17
Which of the following WAN connection services typically use synchronous communications? (Choose two.)

circuit-switched

leased line

packet-switched

*Ethernet

analog modem services



18


Router B received an interface configuration change. Suddenly, it transmits a new update. Which of the following could have triggered this update? (Choose two.)

Router B received a configuration change.

*Router A sent a message requesting an update.

Router C came online after Router B sent the RIP update.

*Router B received an error message indicating the last update was not received.



19


Refer to the above graphic. When using RIP as the routing protocol, how would Chicago use load balancing to route packets to New York? (Choose two.)

*by forwarding packets over paths of equal cost

by forwarding packets according to hop count and speed of the link

*by determining which interface has the least traffic and sending to it first

by first determining the speed of the links and then cycling packets through the fastest links first

by cycling packets through interfaces and routes following the same pattern (Router 1, 2, 3) each time



20


Which command will produce the output shown in the graphic?

show cdp

*show cdp neighbors

show cdp neighbors detail

show cdp detail



21
Which of the following are true regarding the setup configuration mode? (Choose three.)

To abort the setup mode, use the CTRL+SHIFT+6 keys.

To abort the setup mode, use the CTRL+C keys.

*Setup mode allows a complete configuration of the router.

*To enter setup mode, use the privileged mode setup command.

A router that does not find a valid IOS during the boot process will start the system configuration dialog.

*A router that does not find a valid configuration file during the boot process will start the system configuration dialog.



22
Which statement about datagram life is true?

Each router increments the TTL value of the datagram until the maximum hop count of the routing protocol is reached. The packet is then returned to the source.

The packet is dropped when the router count and the TTL value match. The source is notified that transmission has failed.

*Each router decreases the TTL value by one until it reaches zero. The datagram is then discarded and a time exceeded for message is sent to the source.

The destination device discards the datagram if the TTL value is zero on arrival. An ICMP destination unreachable message is sent back to the source.



23


Assume OSPF is being used on all routers. What happens when the link between Router1 and Router2 goes down? (Choose two.)

Updates start broadcasting every 30 seconds.

Updates start broadcasting every 90 seconds.

Link-state advertisements are flooded.

*Link-state advertisements are sent only to neighboring routers.

*All routers note the change and adjust routes.

All routers ignore the change until the route becomes active again.



24
Why would an administrator use the Telnet application when troubleshooting a network? (Choose three.)

*It can be used to verify the operation of application layer software between the source and destination.

Telnet can use the ICMP protocol to verify a hardware connection and network layer address.

*It is the most complete testing mechanism available.

*Remote networks may be accessed via a Telnet session for troubleshooting.

Time to Live values are used by Telnet to identify a failure of device between source and destination.



25
A network administrator can establish a remote session to a host using the Router> telnet 192.168.1.1 command but is unsuccessful when using the Router> telnet Boston command to connect to the same interface. Which of the following could be the problem? (Choose two.)

*The ip host table on the router is not configured.

The command telnet Boston was issued from the wrong router prompt.

The routing table is missing.

*Domain name services are not available.



26
Which of the following are functions of a router? (Choose three.)

*packet switching

*extension of network segments

segmentation of local area networks

*selection of best path based on a logical addressing

selection of best path based on a physical addressing



27
Which two statements are true about route metrics? (Choose two.)

*The more factors that make up a metric, the greater the flexibility to tailor network operations.

The larger the metric number, the better the path.

Routing protocols use metrics to send routing updates to directly connected neighbors.

Bandwidth and delay are static metrics used by RIP v1.

*Ticks, delay, and cost are metrics used by routing protocols.



28


The administrator knows that port E0 on router B connects to a small LAN without any routers. Which command can be executed on router B to conserve bandwidth on port E0?

no update timers

holdown-timer 96

poison reverse E0

*passive-interface E0

no triggered updates



29
Which of the following are true statements about creating and applying access lists? (Choose three.)

Access list entries should filter in the order from general to specific.

*One access list per port per protocol per direction is permitted.

*Standard ACLs should be applied closest to the source while extended ACLs should be applied closest to the destination.

There is an implicit deny at the end of all access lists.

*Statements are processed sequentially from top to bottom until a match is found.

The inbound keyword refers to traffic entering the network from the router interface where the ACL is applied.



30
What can be determined from the partial output of the show ip route command displayed below? (Choose two.)

R 200.200.200.0/24 [120/1] via 192.168.10.2, 00:00:14, Serial0/0
C 192.168.10.0/24 is directly connected, Serial0/0

*The next update will be in 76 seconds.

*The next update will be in 16 seconds.

The administrative distance is 120 and the metric is 1.

The metric is 120 and the administrative distance is 1.

200.200.200.0 is configured on Serial0/0.

192.168.10.2 is configured on Serial0/0.




31
How many Telnet sessions can take place simultaneously on a router running a standard edition of the IOS?

4

*5

8

10



32
In the configuration register value 0x2104, which value represents the boot field setting?

x

2

1

0

*4



33
Host name resolution allows for the use of an alphanumeric name to identify network devices. Select the answer that displays the correct configuration syntax for creating a host name.

Router# ip host Fontana 200.100.50.5

*Router(config)# ip host Fontana 200.100.50.5

Router(config-if)# ip host Fontana 200.100.50.5

Router(config)# ip host Fontana 200.100.50.5/24



34


Refer to the network graphic. A packet needs to travel from Router F to Router A. Which path would be selected by the RIP routing protocol if the default metrics are used?

F, G, E, D, B, A

F, E, D, C, A

*F, E, D, A

F, E, D, B, A



35
Which of the following will add a TFTP server as a fallback source for a router to load an IOS image?

Router# boot system tftp 163.150.9.31 c2500-d-l.120-9
Router# copy run start

Router# boot system tftp c2500-d-l.120-9.bin 163.150.9.31
Router# copy run start

Router# config t
Router(config)# boot system tftp c2500-d-l.120-9.bin 163.150.9.31
Router(config)# exit
Router# copy run start

*Router# config t
Router(config)# boot system tftp 163.150.9.31 c2500-d-l.120-9.bin
Router(config)# exit
Router# copy run start



36
Which of the following are characteristics of the Open Shortest Path First (OSPF) routing protocol? (Choose two.)

*functions as a link-state routing protocol

discards packets when the hop count is greater than 15

calculates the shortest path to a destination using the Diffused Update Algorithm (DUAL)

created as a proprietary routing protocol

*floods updates as topology changes occur

broadcasts routing updates every 90 seconds or as triggered by topology changes



37


The following access list has been created to prevent traffic from host 204.204.7.122 from accessing the 201.100.11.0 network.

access-list 22 deny host 204.204.7.122
access-list 22 permit any

Which group of commands will properly place this access list so that this host is denied access only to the 201.100.11.0 network?

RouterA(config)# interface s0/0
RouterA(config-if)# ip access-group 22 in

RouterA(config)# interface s0/0
RouterA(config-if)# ip access-group 22 out

RouterA(config)# interface fa0/0
RouterA(config-if)# ip access-group 22 in

RouterB(config)# interface fa0/0
RouterB(config-if)# ip access-group 22 in

RouterB(config)# interface s0/0
RouterB(config-if)# ip access-group 22 in

*RouterB(config)# interface fa0/0
RouterB(config-if)# ip access-group 22 out



38
What types of messages are sent periodically by devices configured for CDP?

probes

beacons

signals

*advertisements

routing updates

unicast



39
ACL statements operate in sequential, logical order. If a condition match is true, the rest of the ACL statements are not checked. If all of the ACL statements are unmatched, what happens to the packet?

The packets will be placed in a buffer and forwarded when the ACL is removed.

The packets will be sent to the source with an error notification message.

The implicit permit any statement placed at the end of the list will allow the packets to flow through uninhibited.

*The implicit deny any statement placed at the end of the list will cause the packets to be dropped.



40
Which statements are true regarding VTY passwords? (Choose two.)

VTY passwords must be encrypted.

All VTY lines do not need to use the same password.

*A VTY password is required to establish telnet sessions.

The VTY password is set with the command line console 0.

*The VTY password must be identical with the enable secret password.



41


Refer to the output from the show ip route command. What can be concluded from the output of this router command?

A preferred route to the destination has not been set.

*There are two equal cost paths to network 1.0.0.0.

Both interfaces are being used equally to route traffic.

A variance must be set to load-balance across multiple paths.



42


Refer to the exhibit. An ACL has been created that will deny the host 192.168.7.89 access to an FTP server located at 10.6.13.254.

access-list 111 deny tcp 192.168.7.89 0.0.0.0 10.6.13.254 0.0.0.0 eq 21
access-list 111 deny tcp 192.168.7.89 0.0.0.0 10.6.13.254 0.0.0.0 eq 20
access-list 111 permit ip any any

Which group of commands will place this ACL in the proper location?

Router2(config)#interface s0/0
Router2(config-if)#ip access-group 111 in

*Router2(config)#interface fa0/0
Router2(config-if)#ip access-group 111 out

Router3(config)#interface s0/1
Router3(config-if)#ip access-group 111 out

Router3(config)#interface fa0/0
Router3(config-if)#ip access-group 111 in

Router2(config)#interface fa0/0
Router2(config-if)#ip access-group 111 in



43
Which command is used to redirect debug information to a device that is connected though a Telnet session?

Router# monitor

Router# terminal redirect vty 0

Router# terminal monitor

*Router# monitor output vty 0



44


Given the above topology, which of the following statements are true? (Choose two.)

If RouterC receives a packet destined for 10.5.183.46, it will be forwarded out interface Serial 1.

*If RouterA receives a packet destined for 192.168.3.146, it will be forwarded out interface Ethernet 0.

*If RouterA receives a packet destined for 10.5.27.15, it will be forwarded out interface Serial 1.

If RouterB receives a packet destined for 10.5.27.83, it will be forwarded out interface Serial 0.

If RouterA receives a packet destined for 172.16.55.101, it will be forwarded out interface Serial 1.



45
Of the eight network users on the Human Resources department LAN, one cannot connect to the file server. The user's PC has successfully booted but can not see the network. What should be checked first?

the PC power cord

the file server

*the PC network interface card LEDs

the LAN switch in the wiring closet

the configuration of the router interface attached to the LAN



»»  read more

SUBSCRIBE VIA EMAIL

Enter your email address:

Delivered by FeedBurner



Video of the Month

Labels

50 Cent ADELE AKON ALAINA WHITAKER Alanis Morissette Album Alexandra Burke Alicia Keys AMERICAN IDOL PERFORMANCE Amerie ANDRE 3000 ANTHONY HAMILTON ASHANTI Assessment Cisco Program Edit audio AVRIL LAVIGNE BACKSTREET BOYS Benisour Benzino Beyonce Birdman Black Eyed Peas Blondie BRANDY Brian Mcknight Britney Spears Brooke Hogan BROOKE VALENTINE Bun B Butta creme CASSIE CCNA 1 CCNA 2 ccna 3 ccna 3 version 4 CCNA 3 version 4 CHAPTER 1 ccna 3 version 4 CHAPTER 2 CCNA 4 - Module 6 Exam Answers CCNA Discovery 4.0 Curriculum CCNA Exploration 4.0: Routing Protocols and Concepts Chamillionaire Chapter 1 Exam Answers Chapter 10 Exam Answers Chapter 3 Exam Answers Chapter 4 Exam Answers Chapter 5 Exam Answers Chapter 6 Exam Answers Chapter 8 Exam Answers Chapter 9 Exam Answers Cherisme CHICK COREA AND JOHN MCLAUGHLIN Chis Brown Chpater 2 Exam Answers CHRIS BROWN Chrisette Michelle CHRISTINA AGUILERA ciara CISCO CCNA 1 CISCO CCNA 1 - Module 1 Exam Answers CISCO CCNA 1 - Module 2 Exam Answers CISCO CCNA 1 - Module 3 Exam Answers CISCO CCNA 1 - Module 4 Exam Answers CISCO CCNA 1 - Module 5 Exam Answers CISCO CCNA 1 - Module 6 Exam Answers CISCO CCNA 1 - Module 6/7 Exam Answers CISCO CCNA 1 - Module 7 Exam Answers CISCO CCNA 1 - Module 8 Exam Answers CISCO CCNA 1 - Module 9 Exam Answers CISCO CCNA 1 - Module 9/10 Exam Answers CISCO CCNA 1 - Practice Final CISCO CCNA 1- Final Exam Result CISCO CCNA 2 CISCO CCNA 2 - Module 10 Exam Answers CISCO CCNA 2 - Practice Final CISCO CCNA 2 - Voucher Exam CISCO CCNA 3 CISCO CCNA 3 - Final Exam CISCO CCNA 3 - Module 1 Exam Answers CISCO CCNA 3 - Module 2 Exam Answers CISCO CCNA 3 - Module 3 Exam Answers CISCO CCNA 3 - Module 4 Exam Answers CISCO CCNA 3 - Module 5 Exam Answers CISCO CCNA 3 - Module 6 Exam Answers CISCO CCNA 3 - Module 7 Exam Answers CISCO CCNA 3 - Module 8 Exam Answers CISCO CCNA 3 - Module 9 Exam Answers CISCO CCNA 3- PRACTICE FINAL Cisco CCNA 4 CISCO CCNA 4 - Module 1 Exam Answers CISCO CCNA 4 - Voucher Exam Cisco CCNA 4 Exam 2 Answer Cisco CCNA 4 Exam 3 Answer Cisco CCNA 4 Exam 4 Answer Cisco CCNA 4 Exam 5 Answer Cisco CCNA 4 Final Exam Answer COLBY O DONIS Common CRAIG DAVID DANITY KANE DAVID ARCHULETA DAVID BANNER David Guetta DAY 26 Discovery 1 Discovery 1 - Final Exam Discovery 1 - Module 1 Discovery 1 - Module 2 Discovery 1 - Module 3 Discovery 1 - Module 4 Discovery 1 - Module 5 Discovery 1 - Module 6 Discovery 1 - Module 7 Discovery 1 - Module 8 Discovery 1 - Module 9 Discovery 2 Discovery 2 - FINAL EXAM Discovery 2 - Module 1 Discovery 2 - Module 2 Discovery 2 - Module 3 Discovery 2 - Module 4 Discovery 2 - Module 5 Discovery 2 - Module 6 Discovery 2 - Module 8 Discovery 4.0 Disk Defragmenter Utility Dizzy Dondria Donell Jones Downloads Drake Duffy EDUARDO CRUZ Eminem ENRIQUE IGLESIAS Eric Benet ESTELLE Ester Dean Etta James Fabolous FAT JOE FERGIE FLO RIDA Fly C FREEWAY game GIRLICIOUS GIT FRESH Gucci Mane J. HOLIDAY James Blunt JAMIE FOXX JANET JACKSON Jazmine Sullivan Jennifer Hudson Jennifer Lopez Jesse McCartney Joe Budden JOE THOMAS John Austin JOHN LEGEND John Mayer Jojo Jordin Sparks Jordyn Taylor justin timberlake KANYE WEST KAT DELUNA Kelis Keri Hilson KERI HISON Kesha Keshia Chanté keyshia cole Khia Kid Cudi KINGSTON Kree KYLIE MINOGUE Lady Gaga LAST GOODNIGHT LEELAND LEONA LEWIS Letoya Luckett Lil Jon lil kim LIL MAMA lil mo LIL WAYNE Lindsay Lohan LINKIN PARK ll cool LL COOL J LLOYD Ludacris Lyrics M.I MADONNA Marc Anthony MARIAH CAREY MARIO maroon 5 Marquez Mary Mary MATT POKORA Mayweather Mccall MEL B Melanie Fiona MICHAEL JACKSON MICHELLE WILLIAMS Missy Elliot Mo'Cheddah MOBY Module Final Exam Monica Ms Porsh MYA N.E.R.D. NAS NATASHA BEDINGFIELD Ne-yo NEO News Nicole Scherzinger Nina Sky Nipsey Hussle Paris Hilton PAULA ABDUL PITBULL Pleasure P Pretty Ricky Pussycat Dolls R. KELLY Remix Rhea Rick Ross RICK ROSS AND DRE Rihanna RL Robin Routing Protocols and Concepts RYAN LESLIE Sandra Sean Kingston Sean Paul September SHAGGY SHAKIRA Shawty SNOOP DOGG solange SOULJA BOY TELL'EM Sugarbabes T-Pain T.I. TAMIA TANK TEAIRRA MARI THE DREAM The Game Tiffany Evans TIMBALAND Timberland Toni Braxton Trey Songz TUPAC Twista Tyga USHER VIDEO Wale WESTLIFE Whitney Houston Young Joc
 

Copyright © 2009 by Purely Arribuh