CCNA 1 Final Exam

44 Questions  I  By Erinia

  
Changes are done, please start the quiz.


Question Excerpt

Removing question excerpt is a premium feature

Upgrade and get a lot more done!
1.  What are three characteristics of CSMA/CD? (Choose three.)
A.
B.
C.
D.
E.
F.
2.  Refer to the exhibit. While configuring a network, a technician wired each end of a Category 5e cable as shown. Which two statements are true about this setup? (Choose two.)
A.
B.
C.
D.
E.
3.  A user sees the command prompt: Router(config-if)# . What task can be performed at this mode?
A.
B.
C.
D.
4.  Refer to the exhibit. A network administrator remotely accesses the CLI of RouterB from PC1 using Telnet. Which statement is true about this connection?
A.
B.
C.
D.
5.  Due to a security violation, the router passwords must be changed. What information can be learned from the following configuration entries? (Choose two.)
A.
B.
C.
D.
E.
F.
G.
6.  Refer to the exhibit. A network administrator remotely accesses the CLI of RouterBfrom PC1. Which two statements are true about the application layer protocol that isused to make this connection? (Choose two.)
A.
B.
C.
D.
E.
7.  What happens when a host station receives a frame that contains its own MAC address in the destination field?
A.
B.
C.
D.
8.  To enhance security in a network, the network administrator uses these commands:   Router(config)# line console 0 Router(config-line)# password j1mdi2 Router(config-line)# login   What two conclusions are evident from these commands? (Choose two.)
A.
B.
C.
D.
E.
9.  Refer to the exhibit. What two facts can be determined about the exhibited topology? (Choose two.)
A.
B.
C.
D.
E.
10.  Which configuration mode is used to set a password to authenticate users that are accessing and configuring the network device using Telnet connection?
A.
B.
C.
D.
11.  When connectionless protocols are implemented at the lower layers of the OSI model, what is usually used to acknowledge that the data was received and to request the retransmission of missing data?
A.
B.
C.
D.
E.
12.  Which statement is true about the ICMP protocol?
A.
B.
C.
D.
13.  How can ARP be used to help document the network?
A.
B.
C.
D.
14.  Refer to the exhibit. The network containing router B is experiencing problems. Anetwork associate has isolated the issue in this network to router B? What action canbe preformed to correct the network issue?
A.
B.
C.
D.
1 comment
15.  Which two types of media can provide bandwidth up to 1 Gb/s? (Choose two.)
A.
B.
C.
D.
E.
16.  In a network design project, a network designer needs to select a device to provide collision free connections to 40 hosts on the LAN. Which device should be selected?
A.
B.
C.
D.
17.  Which OSI layer does IP rely on to determine whether packets have been lost and to request retransmission?
A.
B.
C.
D.
18.  Refer to the exhibit. What two facts can be determined from the information that is given? (Choose two.)
A.
B.
C.
D.
E.
F.
1 comment
19.  During the encapsulation process, which identifiers are added at the transport layer?
A.
B.
C.
D.
20.  Which topology divides the collision domain and provides full media bandwidth to the hosts in the network?
A.
B.
C.
D.
21.  To make a server application accessible by clients, a network administrator wants to configure the port number that the application will use. From which range of numbers should the port number be assigned?
A.
B.
C.
D.
22.  Refer to the exhibit. Which option correctly identifies the network address, range of host addresses, and the broadcast address for the network that contains host A? 
A.
B.
C.
D.
23.  During the encapsulation process, which identifiers are added at the transport layer?
A.
B.
C.
D.
24.  Due to a security violation, the router passwords must be changed. What information can be learned from the following configuration entries? (Choose two.)   Router(config)# line vty 0 3 Router(config-line)# password c13c0 Router(config-line)# login
A.
B.
C.
D.
E.
25.  What are three characteristics of CSMA/CD? (Choose three.)
A.
B.
C.
D.
E.
F.
26.  Refer to the exhibit. A student has wired each end of a CAT 5e cable as shown. What is the result? (Choose two.)
A.
B.
C.
D.
E.
F.
27.  Which option shows how a router will route packets to a remote network?
A.
B.
C.
D.
28.  What information can be gathered by using the command netstat?
A.
B.
C.
D.
29.  Refer to the exhibit. Each media link is labeled. What type of cable should be used to connect the different devices?
A.
B.
C.
D.
E.
30.  Refer to the exhibit. Which Layer 2 protocol could be used inside nework A and network C?
A.
B.
C.
D.
31.  Refer to the exhibit. What function does router RT_A need to provide to allow Internet access for hosts in this network
A.
B.
C.
D.
32.  What information is contained in the header of Layer 3 to help data delivery?
A.
B.
C.
D.
33.  A network administrator is asked to design a new addressing scheme for a corporate network. There are 60 users in the main office, users in the branch office, 28 users in manufacturing, 12 in the sales office, and 4 users in the research office. Which VLSM addressing scheme that uses the 192.168.88.0/24 network will fulfill the requirements while wasting the fewest addresses?
A.
B.
C.
D.
34.  What happens when a node on an Ethernet network is creating a frame and it does not have the destination MAC address?
A.
B.
C.
D.
35.  Which physical component is used to access and perform the initial configuration on a new unconfigured router?
A.
B.
C.
D.
E.
36.  Refer to the exhibit. All devices in the network use default configurations. How many broadcast domains are there in this topology?
A.
B.
C.
D.
E.
37.  Which application belongs to the category of the client/server model?
A.
B.
C.
D.
38.  Which option correctly identifies the interface or interfaces used to connect the router to a CSU/DSU for WAN connectivity?
A.
B.
C.
D.
39.  An administrator has made changes to a device. The changes did not have the desired effect. What can the administrator do to restore the configuration saved in NVRAM?
A.
B.
C.
D.
40.  During the encapsulation process, what identifiers are added at the transport layer?
A.
B.
C.
D.
41.  To send data through a network, what two flags are used to establish a session? (Choose two.)
A.
B.
C.
D.
E.
F.
42.  Which service is used when the nslookup command is issued on a computer?
A.
B.
C.
D.
43.  Refer to the exhibit. A technician is working on a network problem that requires verification of the router LAN interface. What address should be pinged from this host to confirm that the router interface Is operational?
A.
B.
C.
D.
E.
44.  Refer to the exhibit. Which two layers of the OSI model describe the same functions as the transport and internet layers of the TCP/model? (Choose two.)
A.
B.
C.
D.
E.
F.
G.
Back to top


to post comments.

Removing ad is a premium feature

Upgrade and get a lot more done!
Take Another Quiz