CCNA 1 Chapter 3 V5.0 Answers

CCNA 1 Chapter 3 V5.0 Answers

1. A user is viewing an HTML document located on a web server. What protocol segments the messages and manages the segments in the individual conversation between the web server and the web client?






2. What method can be used by two computers to ensure that packets are not dropped because too much data is being sent too quickly?


flow control

access method

response timeout

CCNA 1 Chapter 2 V5.0 Answers

CCNA 1 Chapter 2 V5.0 Answers

1. A new network administrator has been asked to enter a banner message on a Cisco device. What is the fastest way a network administrator could test whether the banner is properly configured?

Reboot the device.

Enter CTRL-Z at the privileged mode prompt.

Exit global configuration mode.

Power cycle the device.

Exit privileged EXEC mode and press Enter.


2. Why would a Layer 2 switch need an IP address?

to enable the switch to send broadcast frames to attached PCs

to enable the switch to function as a default gateway

to enable the switch to be managed remotely

to enable the switch to receive frames from attached PCs

CCNA 1 Chapter 1 V5.0 Answers

CCNA 1 Chapter 1 V5.0 Answers

1. What two criteria are used to help select network media? (Choose two.)

the types of data that need to be prioritized

the cost of the end devices utilized in the network

the distance the media can successfully carry a signal

the number of intermediary devices installed in the network

the environment where the media is to be installed


2. Which device performs the function of determining the path that messages should take through internetworks?

a router

a firewall

a web server

a DSL modem

CCNA Discovery 2 Final V4.1 Answers


Which statement is true based on the exhibited information

Refer to the exhibit. Which statement is true based on the exhibited information?

The router is using a link-state routing protocol.

The router will get routing updates on the FastEthernet0/0 interface.

The router will not forward routing updates from the Serial0/0/0 interface.

The network for Fa0/1 will be included in the routing updates that are sent from this router.


2. Which two tasks should be part of a disaster recovery plan? (Choose two.)

backing up data

installing intrusion detection systems

protecting information from malicious attack

ensuring that traffic from clients to servers is encrypted

identifying offsite locations where services and operations can be moved

CCNA 2 Practice Final Exam V4.0 Answers


R1 and R2 are adjacent routers both running RIP

Refer to the exhibit. R1 and R2 are adjacent routers both running RIP. All interfaces on both routers are correctly configured and operational. Both routers are configured to include all connected interfaces in routing updates. R2 is not showing any routes from R1 in the routing table. What is the likely cause?

The adjacent interfaces are passive.

The distance of 120 exceeds 15 hops.

R2 will not accept version 1 updates from R1.

Routes are being summarized by R1 but not by R2.



Refer to the exhibit. Two routers are unable to establish an adjacency. What is the possible cause for this?

The two routers are connected on a multiaccess network.

The hello and dead intervals are different on the two routers.

They have different OSPF router IDs.

They have different process IDs.

CCNA 4 Final Exam V4.0 Answers (July 2012)

CCNA 4 Final Exam V4.0 Answers (July 2012)

1. An administrator is unable to receive e-mail. While troubleshooting the problem, the administrator is able to ping the local mail server IP address successfully from a remote network and can successfully resolve the mail server name to an IP address via the use of the nslookup command. At what OSI layer is the problem most likely to be found?

physical layer

data link layer

network layer

application layer


2. When implementing a dynamic ACL, why is it necessary to include an extended ACL as part of the configuration process?

to disable the router vty lines

to reduce the dynamic ACL filtering load

to override any previous ACL that might be applied to the router

to provide a controlled situation of allowing traffic through a router

IT Essentials Final Exam V5.0 Answers

1. A user believes that a data file on a Windows XP computer has been corrupted. Which utility can provide the best information about the data file?






2. How is DSL able to carry telephone and data signals at the same time?

Each signal uses a different frequency.

Each connection is dialed separately.

DSL uses low frequency transmissions.

DSL uses digital signals to carry both the telephone and data traffic.

IT Essentials Practice Final Exam V5.0 Answers

1. A technician is asked to configure the time that the system must be idle before the hard disk spins down on all the Windows-based laptops in the company. The technician configured the power options in Windows but it appears to have no effect. Where should the technician look to enable power management?

Administrative Tools

Command Prompt


Safe mode

System Registry


2. What is an accurate description of asymmetric encryption technology?

It is an encryption protocol that is used to encrypt data as the data is sent over the VPN.

It is an encryption process that uses identical keys on both ends to establish the VPN.

It is an encryption process that uses a public and private key pair to encrypt/decrypt data.

Asymmetric encryption is an encryption process that compares traffic on both ends to make sure the traffic has not been altered.

IT Essentials Chapter 12 V5.0 Answers

1. A technician replaces a laptop keyboard that was no longer functioning, and has verified that the newly replaced keyboard functions properly. What is the final step the technician should take as part of the troubleshooting process?

Ask a list of closed-ended questions.

Research the problem.

Document all findings, actions, and outcomes.

Implement preventive measures.


2. A technician is replacing an internal hard drive used as a secondary drive on a PC. After connecting the new hardware and powering up the computer, an "OS not found" error message is displayed. What is the most probable cause for that error message?

The power supply is faulty.

The hard drive jumper is set incorrectly.

The motherboard needs replacing to be able to support the new hard drive.

The USB port has too many attached devices to supply adequate power.

The BIOS needs updating.

IT Essentials Chapter 11 V5.0 Answers

1. Which two data storage locations contain persistent data that can be used by computer forensics specialists? (Choose two.)

solid state drives

CPU registers


hard disk drives



2. Which two actions should a technician take if illegal content, such as child pornography, is discovered on the hard drive of a customer computer? (Choose two.)

Contact a first responder.

Confront the customer immediately.

Shut down the computer until authorities arrive.

Document as much information as possible.

Remove and destroy the hard drive.