CCNA 1 Practice Final Exam V5.0 Answers

1.

What will be the result of entering this configuration the next time a network administrator connects

Refer to the exhibit. What will be the result of entering this configuration the next time a network administrator connects a console cable to the router and no additional commands have been entered?

The administrator will be required to enter Cisco123.

The administrator will be required to enter Cisco234.

The administrator will be required to enter Cisco789.

The administrator will be presented with the R1> prompt.

 

2. Why are port numbers included in the TCP header of a segment?

to indicate the correct router interface that should be used to forward a segment

to identify which switch ports should receive or forward the segment

to determine which Layer 3 protocol should be used to encapsulate the data

to enable a receiving host to forward the data to the appropriate application

to allow the receiving host to assemble the packet in the proper order

 

3. What are two characteristics of a scalable network? (Choose two.)

easily overloaded with increased traffic

grows in size without impacting existing users

is not as reliable as a small network

suitable for modular devices that allow for expansion

offers limited number of applications

 

4. What three statements describe features or functions of media access control? (Choose three.)

Controlled media access involves collision handling.

It is responsible for detecting transmission errors in transmitted data.

It uses contention-based access also known as deterministic access.

802.11 utilizes CSMA/CD.

Data link layer protocols define the rules for access to different media.

Ethernet utilizes CSMA/CD.

 

5. A user is attempting to do an http://www.cisco.com/ without success. Which two configuration values must be set on the host to allow this access? (Choose two.)

DNS server

WINS server

HTTP server

default gateway

Netbios

 

6. Which two functions are primary functions of a router? (Choose two.)

packet switching

microsegmentation

domain name resolution

path selection

flow control

 

7. Open the PT activity. Perform the tasks in the activity instructions and then answer the question.

Which information is obtained from this command output?

10.20.20.3, authoritative answer

10.20.20.3, non-authoritative answer

10.20.20.4, authoritative answer

10.20.20.4, non-authoritative answer

 

8. A PC that is communicating with a web server is utilizing a window size of 6,000 bytes when sending data and a packet size of 1,500 bytes. What byte of information will the web server acknowledge after it has received four packets of data from the PC?

5

1,500

1,501

6,000

6,001

 

9. Why are the paired wires twisted in a CAT5 cable?

to facilitate cable termination in the connector

to extend the signaling length

to improve the mechanical strength

to provide eletromagnetic noise cancellation

 

10. What are two ways that TCP uses the sequence numbers in a segment? (Choose two.)

to identify missing segments at the destination

to reassemble the segments at the remote location

to specify the order in which the segments travel from source to destination

to limit the number of segments that can be sent out of an interface at one time

to determine if the packet changed during transit

 

11.

Match the subnetwork to a host address

Correct Answer: 

Match the subnetwork to a host address (Answer)

 

12. The administrator of a branch office receives an IPv6 prefix of 2001:db8:3000::/52 from the corporate network manager. How many subnets can the administrator create?

1024

2048

4096

8192

65536

 

13. What makes fiber preferable to copper cabling for interconnecting buildings? (Choose three.)

greater distances per cable run

lower installation cost

limited susceptibility to EMI/RFI

durable connections

greater bandwidth potential

easily terminated

 

14. Which is a function of the show ip route command when used as a tool for troubleshooting network connectivity?

indicates the point of failure in the connection

shows the IP address of the next hop router for each route

lists the IP addresses of all hops the traffic will pass through to reach the destination network

shows the incoming and outgoing interfaces the traffic will go through in order to reach the destination network

 

15. Which service will translate private internal IP addresses into Internet routable public IP addresses?

ARP

DHCP

DNS

NAT

 

16. Which two statements are correct in a comparison of IPv4 and IPv6 packet headers? (Choose two.)

The Header Checksum field name from IPv4 is kept in IPv6.

The Destination Address field is new in IPv6.

The Source Address field name from IPv4 is kept in IPv6.

The Version field from IPv4 is not kept in IPv6.

The Time-to-Live field from IPv4 has been replaced by the Hop Limit field in IPv6.

 

17. Which statement describes a characteristic of the traceroute utility?

It sends four Echo Request messages.

It utilizes the ICMP Source Quench messages.

It is primarily used to test connectivity between two hosts.

It identifies the routers in the path from a source host to a destination host.

 

18.

what is the largest and smallest subnet mask required on this network in order

Refer to the exhibit. Using VLSM, what is the largest and smallest subnet mask required on this network in order to minimize address waste?

255.255.254.0 and 255.255.255.224

255.255.254.0 and 255.255.255.252

255.255.255.128 and 255.255.255.224

255.255.255.0 and 255.255.255.252

 

19.

What is the effect of setting the security mode to WEP on the Linksys integrated router

Refer to the graphic. What is the effect of setting the security mode to WEP on the Linksys integrated router?

It identifies the wireless LAN.

It allows the access point to inform clients of its presence.

It translates IP addresses into easy-to-remember domain names.

It encrypts data between the wireless client and the access point.

It translates an internal address or group of addresses into an outside, public address.

 

20.

When users log in using Telnet

Refer to the exhibit. From global configuration mode, an administrator is attempting to create a message-of-the-day banner by using the command banner motd V Authorized access only! Violators will be prosecuted! V When users log in using Telnet, the banner does not appear correctly. What is the problem?

The banner message is too long.

The delimiting character appears in the banner message.

The symbol "!" signals the end of a banner message.

Message-of-the-day banners will only appear when a user logs in through the console port.

 

21. Which two types of applications rely on their traffic having priority over other traffic types through the network? (Choose two.)

email

file transfer

instant messaging

video

voice

 

22.

An administrator is testing connectivity to a remote device with the IP address

Refer to the exhibit. An administrator is testing connectivity to a remote device with the IP address 10.1.1.1. What does the output of this command indicate?

Connectivity to the remote device was successful.

A router along the path did not have a route to the destination.

A ping packet is being blocked by a security device along the path.

The connection timed out while waiting for a reply from the remote device.

 

23. Fill in the blank.

A nibble consists of.............bits.

Correct Answer: 4

 

24. What three primary functions does data link layer encapsulation provide? (Choose three.)

addressing

error detection

frame delimiting

port identification

path determination

IP address resolution

 

25. A small satellite office has been given the overall network number of 192.168.99.0/24 and the network technician can subdivide the network addresses as needed. The office needs network access for both wired and wireless devices. However, because of the security consideration, these two networks should be separate. The wired network will have 20 devices. The wireless network has a potential connection of 45 devices. Which addressing scheme would be most efficient for these two networks?

192.168.99.0/26
192.168.99.64/27

192.168.99.0/27
192.168.99.32/26

192.168.99.0/27
192.168.99.32/28

192.168.99.0/28
192.168.99.16/28

192.168.99.0/28
192.168.99.64/26

 

26. Using default settings, what is the next step in the router boot sequence after the IOS loads from flash?

Perform the POST routine.

Search for a backup IOS in ROM.

Load the bootstrap program from ROM.

Load the running-config file from RAM.

Locate and load the startup-config file from NVRAM.

 

27. Fill in the blank. Do not abbreviate. Use lower case.

Which interface configuration mode command puts a Layer 3 switch interface into Layer 3 mode?

Correct Answer: no switchport

 

28. What is an ISP?

It is a standards body that develops cabling and wiring standards for networking.

It is a protocol that establishes how computers within a local network communicate.

It is an organization that enables individuals and businesses to connect to the Internet.

It is a networking device that combines the functionality of several different networking devices in one.

 

29. A network administrator has been issued a network address of 192.31.7.64/26. How many subnets of equal size could be created from the assigned /26 network by using a /28 prefix?

3

4

6

8

14

16

 

30. What are the three parts of an IPv6 global unicast address? (Choose three.)

broadcast address

global routing prefix

subnet mask

subnet ID

interface ID

 

31. Fill in the blank.

In dotted decimal notation, the IP address ...............is the last host address for the network 172.25.0.64/26.

Correct Answer: 172.25.0.126

 

32.

Match each description with the appropriate type of threat

Correct Answer:

Match each description with the appropriate type of threat (Answer)

 

33.

HostA is attempting to contact ServerB

Refer to the exhibit. HostA is attempting to contact ServerB. Which two statements correctly describe the addressing that HostA will generate in the process? (Choose two.)

A packet with the destination IP address of RouterB.

A frame with the destination MAC address of SwitchA.

A packet with the destination IP address of RouterA.

A frame with the destination MAC address of RouterA.

A packet with the destination IP address of ServerB.

A frame with the destination MAC address of ServerB.

 

34. What will a host on an Ethernet network do if it receives a frame with a destination MAC address that does not match its own MAC address?

It will discard the frame.

It will forward the frame to the next host.

It will remove the frame from the media.

It will strip off the data-link frame to check the destination IP address.

 

35. A network administrator enters the service password-encryption command into the configuration mode of a router. What does this command accomplish?

This command encrypts passwords as they are transmitted across serial WAN links.

This command prevents someone from viewing the running configuration passwords.

This command enables a strong encryption algorithm for the enable secret password command.

This command automatically encrypts passwords in configuration files that are currently stored in NVRAM.

This command provides an exclusive encrypted password for external service personnel who are required to do router maintenance.

 

36. What is one purpose of the TCP three-way handshake?

sending echo requests from the source to the destination host to establish the presence of the destination

determining the IP address of the destination host in preparation for data transfer

requesting the destination to transfer a binary file to the source

synchronizing sequence numbers between source and destination in preparation for data transfer

 

37. For which three reasons was a packet-switched connectionless data communications technology used when developing the Internet? (Choose three.)

It can rapidly adapt to the loss of data transmission facilities.

It efficiently utilizes the network infrastructure to transfer data.

Data packets can travel multiple paths through the network simultaneously.

It allows for billing of network use by the amount of time a connection is established.

It requires that a data circuit between the source and destination be established before data can be transferred.

 

38. What is the function of CSMA/CA in a WLAN?

It provides the mechanism for media access.

It describes the smallest building block of the WLAN.

It assures that clients are connected to the correct WLAN.

It allows a host to move between cells without loss of signal.

 

39.

Which two settings could be changed to improve security on the wireless network

Refer to the exhibit. Which two settings could be changed to improve security on the wireless network? (Choose two.)

network mode

SSID

radio band

wide channel

standard channel

SSID broadcast

 

40. Fill in the blank using a number.

The minimum Ethernet frame size is............. bytes. Anything smaller than that should be considered a "runt frame."

Correct Answer: 64

 

41.

A network engineer is attempting to connect to a new router to perform the initial configuration

Refer to the exhibit. A network engineer is attempting to connect to a new router to perform the initial configuration. The engineer connects a rollover cable from the serial port of a PC to the Aux port on the router, then configures HyperTerminal as shown. The engineer cannot get a login prompt in HyperTerminal. What would fix the problem?

Connect to the Ethernet port on the PC.

Change connection settings to even parity.

Move the cable to the router console port.

Use a crossover cable instead of a rollover cable.

 

42. A router boots and enters setup mode. What is the reason for this?

The IOS image is corrupt.

Cisco IOS is missing from flash memory.

The configuration file is missing from NVRAM.

The POST process has detected hardware failure.

 

43.

Math each item to the type of topology

Correct Answer: 

Math each item to the type of topology (Answer)

 

44. A network administrator is designing a new network infrastructure that includes both wired and wireless connectivity. Under which situation would a wireless connection be recommended?

The end-user device only has an Ethernet NIC.

The end-user device requires a dedicated connection because of performance requirements.

The end-user device needs mobility when connecting to the network.

The end-user device area has a high concentration of RFI.

 

45. Which devices should be secured to mitigate against MAC address spoofing attacks?

Layer 7 devices

Layer 4 devices

Layer 2 devices

Layer 3 devices

 

46. To revert to a previous configuration, an administrator issues the command copy tftp startup-config on a router and enters the host address and file name when prompted. After the command is completed, why does the current configuration remain unchanged?

The command should have been copy startup-config tftp.

The configuration should have been copied to the running configuration instead.

The configuration changes were copied into RAM and require a reboot to take effect.

A TFTP server can only be used to restore the Cisco IOS, not the router configuration.

 

47. A network team is comparing physical WAN topologies for connecting remote sites to a headquarters building. Which topology provides high availability and connects some, but not all, remote sites?

mesh

partial mesh

hub and spoke

point-to-point

 

48. A medium-sized business is researching available options for connecting to the Internet. The company is looking for a high speed option with dedicated, symmetric access. Which connection type should the company choose?

DSL

dialup

satellite

leased line

cable modem

 

49. What are two actions performed by a Cisco switch? (Choose two.)

building a routing table that is based on the first IP address in the frame header

using the source MAC addresses of frames to build and maintain a MAC address table

forwarding frames with unknown destination IP addresses to the default gateway

utilizing the MAC address table to forward frames via the destination MAC address

examining the destination MAC address to add new entries to the MAC address table

 

50. Which router configuration mode would an administrator use to configure the router for SSH or Telnet login access?

line

router

global

interface

privileged EXEC

 

51. What information is added during encapsulation at OSI Layer 3?

source and destination MAC

source and destination application protocol

source and destination port number

source and destination IP address

 

52.

Which layer of the OSI model would format data in this way

Refer to the exhibit. Which layer of the OSI model would format data in this way?

physical

network

data link

transport

application

 

53. Which IPv6 address notation is valid?

2001:0DB8::ABCD::1234

ABCD:160D::4GAB:FFAB

2001:DB8:0:1111::200

2001::ABCD::

 

54. Open the PT Activity. Perform the tasks in the activity instructions and then answer the question.

What is the secret keyword that is displayed on the web page?

router

switch

frame

packet

cisco

 

55. The ARP table in a switch maps which two types of address together?

Layer 3 address to a Layer 2 address

Layer 3 address to a Layer 4 address

Layer 4 address to a Layer 2 address

Layer 2 address to a Layer 4 address

 

56. A network administrator is troubleshooting connectivity issues on a server. Using a tester, the administrator notices that the signals generated by the server NIC are distorted and not usable. In which layer of the OSI model is the error categorized?

presentation layer

network layer

physical layer

data link layer

 

57. A user calls the help desk to report that a Windows XP workstation is unable to connect to the network after startup and that a popup window says "This connection has limited or no connectivity." The technician asks the user to issue the ipconfig /all command. The user reports the IP address is 169.254.69.196 with subnet mask of 255.255.0.0 and nothing is displayed for the DNS server IP address. What is the cause of the problem?

The workstation NIC has malfunctioned.

The subnet mask was configured incorrectly.

The DNS server IP address needs to be configured.

The workstation is unable to obtain an IP address from a DHCP server.

Leave a Reply