CCNA 1: Introduction to Networking (V6.0)

CCNA 1 Final Exam V6.0 Answers

1. Refer to the exhibit. If host A sends an IP packet to host B, what will the destination address be in the frame when it leaves host A?

what will the destination address be in the frame when it leaves host A?

172.168.10.99

172.168.10.65

DD:DD:DD:DD:DD:DD

AA:AA:AA:AA:AA:AA

BB:BB:BB:BB:BB:BB

CC:CC:CC:CC:CC:CC

 

2. Which example of malicious code would be classified as a Trojan horse?

malware that was written to look like a video game

malware that requires manual user intervention to spread between systems

malware that can automatically spread from one system to another by exploiting a vulnerability in the target

malware that attaches itself to a legitimate program and spreads to other programs when launched

CCNA 1 Chapter 11 V6.0 Answers

1. Which two actions can be taken to prevent a successful network attack on an email server account? (Choose two.)

Limit the number of unsuccessful attempts to log in to the server.

Never use passwords that need the Shift key.

Never send the password through the network in a clear text.

Distribute servers throughout the building, placing them close to the stakeholders.

Use servers from different vendors.

 

2. What is the purpose of issuing the commands cd nvram: then dir at the privilege exec mode of a router?

to direct all new files to the NVRAM

to clear the content of the NVRAM

to list the content of the NVRAM

to copy the directories from the NVRAM

CCNA 1 Chapter 10 V6.0 Answers

1. When retrieving email messages, which protocol allows for easy, centralized storage and backup of emails that would be desirable for a small- to medium-sized business?

IMAP

POP

HTTPS

SMTP

 

2. Which application layer protocol uses message types such as GET, PUT, and POST?

DHCP

DNS

POP3

SMTP

HTTP

CCNA 1 Chapter 9 V6.0 Answers

1. Which two flags in the TCP header are used in a TCP three-way handshake to establish connectivity between two network devices? (Choose two.)

SYN

FIN

PSH

URG

RST

ACK

 

2. What happens if part of an FTP message is not delivered to the destination?

The message is lost because FTP does not use a reliable delivery method.

The FTP source host sends a query to the destination host.

The entire FTP message is re-sent.

The part of the FTP message that was lost is re-sent.

CCNA 1 Chapter 8 V6.0 Answers

1. A company has a network address of 192.168.1.64 with a subnet mask of 255.255.255.192. The company wants to create two subnetworks that would contain 10 hosts and 18 hosts respectively. Which two networks would achieve that? (Choose two.)

192.168.1.64/27

192.168.1.96/28

192.168.1.16/28

192.168.1.128/27

192.168.1.192/28

 

2. What is a result of connecting two or more switches together?

The size of the collision domain is increased.

The number of collision domains is reduced.

The size of the broadcast domain is increased.

The number of broadcast domains is increased.

CCNA 1 Chapter 7 V6.0 Answers

1. Which three IP addresses are private ? (Choose three.)

192.167.10.10

224.6.6.6

192.168.5.5

172.16.4.4

172.32.5.2

10.1.1.1

 

2. Match each description with an appropriate IP address. (Not all options are used.)

Match each description with an appropriate IP address

169.254.1.5 -> a link-local address

192.0.2.123 -> a TEST-NET address

240.2.6.255 -> an experimental address

172.19.20.5 -> a private address

127.0.0.1 -> a loopback address

CCNA 1 Chapter 6 V6.0 Answers

1. What is the purpose of the startup configuration file on a Cisco router?

To provide a limited backup version of the IOS, in case the router cannot load the full featured IOS

to facilitate the basic operation of the hardware components of a device

to contain the configuration commands that the router IOS is currently using

to contain the commands that are used to initially configure a router on startup

 

2. Which three commands are used to set up secure access to a router through a connection to the console interface? (Choose three.)

password cisco

line vty 0 4

login

line console 0

interface fastethernet 0/0

enable secret cisco

CCNA 1 Chapter 5 V6.0 Answers

1. Refer to the exhibit. A switch with a default configuration connects four hosts. The ARP table for host A is shown. What happens when host A wants to send an IP packet to host D?

A switch with a default configuration connects four hosts

Host A sends out a broadcast of FF:FF:FF:FF:FF:FF. Every other host connected to the switch receives the broadcast and host D responds with its MAC address.

Host D sends an ARP request to host A.

Host A sends out the packet to the switch. The switch sends the packet only to the host D, which in turn responds.

Host A sends an ARP request to the MAC address of host D.

 

2. Which destination address is used in an ARP request frame?

0.0.0.0

255.255.255.255

FFFF.FFFF.FFFF

01-00-5E-00-AA-23

127.0.0.1

CCNA 1 Chapter 4 V6.0 Answers

1. Refer to the exhibit. What is wrong with the displayed termination?

What is wrong with the displayed termination?

The wires are too thick for the connector that is used.

The untwisted length of each wire is too long.

The woven copper braid should not have been removed.

The wrong type of connector is being used.

 

2. Why are two strands of fiber used for a single fiber optic connection?

They prevent crosstalk from causing interference on the connection.

They increase the speed at which the data can travel.

The two strands allow the data to travel for longer distances without degrading.

They allow for full-duplex connectivity.

CCNA 1 Chapter 3 V6.0 Answers

1. At which layer of the OSI model would a logical address be encapsulated?

network layer

data link layer

physical layer

transport layer

 

2. What are proprietary protocols?

protocols developed by private organizations to operate on any vendor hardware

protocols developed by organizations who have control over their definition and operation

a collection of protocols known as the TCP/IP protocol suite

protocols that can be freely used by any organization or vendor