CCNA 1 Final Exam

44 Questions  I  By Erinia on May 16, 2011

  
Changes are done, please start the quiz.


Question Excerpt

Removing question excerpt is a premium feature

Upgrade and get a lot more done!
1.  Refer to the exhibit. A student has wired each end of a CAT 5e cable as shown. What is the result? (Choose two.)
A.
B.
C.
D.
E.
F.
2.  Refer to the exhibit. Which option correctly identifies the network address, range of host addresses, and the broadcast address for the network that contains host A? 
A.
B.
C.
D.
3.  Refer to the exhibit. While configuring a network, a technician wired each end of a Category 5e cable as shown. Which two statements are true about this setup? (Choose two.)
A.
B.
C.
D.
E.
4.  Which physical component is used to access and perform the initial configuration on a new unconfigured router?
A.
B.
C.
D.
E.
5.  Refer to the exhibit. The network containing router B is experiencing problems. Anetwork associate has isolated the issue in this network to router B? What action canbe preformed to correct the network issue?
A.
B.
C.
D.
1 comment
6.  Refer to the exhibit. Which Layer 2 protocol could be used inside nework A and network C?
A.
B.
C.
D.
7.  Which topology divides the collision domain and provides full media bandwidth to the hosts in the network?
A.
B.
C.
D.
8.  What information is contained in the header of Layer 3 to help data delivery?
A.
B.
C.
D.
9.  Which option shows how a router will route packets to a remote network?
A.
B.
C.
D.
10.  Which OSI layer does IP rely on to determine whether packets have been lost and to request retransmission?
A.
B.
C.
D.
11.  Refer to the exhibit. Which two layers of the OSI model describe the same functions as the transport and internet layers of the TCP/model? (Choose two.)
A.
B.
C.
D.
E.
F.
G.
12.  Which two types of media can provide bandwidth up to 1 Gb/s? (Choose two.)
A.
B.
C.
D.
E.
13.  What are three characteristics of CSMA/CD? (Choose three.)
A.
B.
C.
D.
E.
F.
14.  Due to a security violation, the router passwords must be changed. What information can be learned from the following configuration entries? (Choose two.)   Router(config)# line vty 0 3 Router(config-line)# password c13c0 Router(config-line)# login
A.
B.
C.
D.
E.
15.  What happens when a host station receives a frame that contains its own MAC address in the destination field?
A.
B.
C.
D.
16.  During the encapsulation process, which identifiers are added at the transport layer?
A.
B.
C.
D.
17.  A network administrator is asked to design a new addressing scheme for a corporate network. There are 60 users in the main office, users in the branch office, 28 users in manufacturing, 12 in the sales office, and 4 users in the research office. Which VLSM addressing scheme that uses the 192.168.88.0/24 network will fulfill the requirements while wasting the fewest addresses?
A.
B.
C.
D.
18.  In a network design project, a network designer needs to select a device to provide collision free connections to 40 hosts on the LAN. Which device should be selected?
A.
B.
C.
D.
19.  Refer to the exhibit. What two facts can be determined about the exhibited topology? (Choose two.)
A.
B.
C.
D.
E.
20.  Refer to the exhibit. A technician is working on a network problem that requires verification of the router LAN interface. What address should be pinged from this host to confirm that the router interface Is operational?
A.
B.
C.
D.
E.
21.  During the encapsulation process, what identifiers are added at the transport layer?
A.
B.
C.
D.
22.  To make a server application accessible by clients, a network administrator wants to configure the port number that the application will use. From which range of numbers should the port number be assigned?
A.
B.
C.
D.
23.  Refer to the exhibit. All devices in the network use default configurations. How many broadcast domains are there in this topology?
A.
B.
C.
D.
E.
24.  Refer to the exhibit. Each media link is labeled. What type of cable should be used to connect the different devices?
A.
B.
C.
D.
E.
25.  When connectionless protocols are implemented at the lower layers of the OSI model, what is usually used to acknowledge that the data was received and to request the retransmission of missing data?
A.
B.
C.
D.
E.
26.  Which statement is true about the ICMP protocol?
A.
B.
C.
D.
27.  To enhance security in a network, the network administrator uses these commands:   Router(config)# line console 0 Router(config-line)# password j1mdi2 Router(config-line)# login   What two conclusions are evident from these commands? (Choose two.)
A.
B.
C.
D.
E.
28.  Refer to the exhibit. What two facts can be determined from the information that is given? (Choose two.)
A.
B.
C.
D.
E.
F.
1 comment
29.  Due to a security violation, the router passwords must be changed. What information can be learned from the following configuration entries? (Choose two.)
A.
B.
C.
D.
E.
F.
G.
30.  Which service is used when the nslookup command is issued on a computer?
A.
B.
C.
D.
31.  What are three characteristics of CSMA/CD? (Choose three.)
A.
B.
C.
D.
E.
F.
32.  During the encapsulation process, which identifiers are added at the transport layer?
A.
B.
C.
D.
33.  Which option correctly identifies the interface or interfaces used to connect the router to a CSU/DSU for WAN connectivity?
A.
B.
C.
D.
34.  Refer to the exhibit. A network administrator remotely accesses the CLI of RouterB from PC1 using Telnet. Which statement is true about this connection?
A.
B.
C.
D.
35.  Which application belongs to the category of the client/server model?
A.
B.
C.
D.
36.  To send data through a network, what two flags are used to establish a session? (Choose two.)
A.
B.
C.
D.
E.
F.
37.  Refer to the exhibit. What function does router RT_A need to provide to allow Internet access for hosts in this network
A.
B.
C.
D.
38.  What happens when a node on an Ethernet network is creating a frame and it does not have the destination MAC address?
A.
B.
C.
D.
39.  How can ARP be used to help document the network?
A.
B.
C.
D.
40.  What information can be gathered by using the command netstat?
A.
B.
C.
D.
41.  A user sees the command prompt: Router(config-if)# . What task can be performed at this mode?
A.
B.
C.
D.
42.  Refer to the exhibit. A network administrator remotely accesses the CLI of RouterBfrom PC1. Which two statements are true about the application layer protocol that isused to make this connection? (Choose two.)
A.
B.
C.
D.
E.
43.  Which configuration mode is used to set a password to authenticate users that are accessing and configuring the network device using Telnet connection?
A.
B.
C.
D.
44.  An administrator has made changes to a device. The changes did not have the desired effect. What can the administrator do to restore the configuration saved in NVRAM?
A.
B.
C.
D.
Back to top


to post comments.

Removing ad is a premium feature

Upgrade and get a lot more done!
Take Another Quiz