Related Topics
Take Another Quiz

CCNA 1 Final Exam

44 Questions
CCNA 1 final exam

.

Questions and Answers
  • 1. 
    When connectionless protocols are implemented at the lower layers of the OSI model, what is usually used to acknowledge that the data was received and to request the retransmission of missing data?
    • A. 

      IP

    • B. 

      UDP

    • C. 

      Ethernet

    • D. 

      A connectionless acknowledgement

    • E. 

      An upper-layer, connection-oriented protocol or service

  • 2. 
    Refer to the exhibit. Each media link is labeled. What type of cable should be used to connect the different devices?
    • A. 

      Connection 1 - rollover cable Connection 2 - straight-through cable Connection 3 - crossover cable

    • B. 

      Connection 1 - crossover cable Connection 2 - rollover cable Connection 3 - crossover cable

    • C. 

      Connection 1 - straight-through cable Connection 2 - crossover cable Connection 3 - crossover cable

    • D. 

      Connection 1 - straight-through cable Connection 2 - crossover cable Connection 3 - straight-through cable

    • E. 

      Connection 1 - crossover cable Connection 2 - straight-through cable Connection 3 - crossover cable

  • 3. 
    Which OSI layer does IP rely on to determine whether packets have been lost and to request retransmission?
    • A. 

      Application

    • B. 

      Presentation

    • C. 

      Session

    • D. 

      Transport

  • 4. 
    Refer to the exhibit. A technician is working on a network problem that requires verification of the router LAN interface. What address should be pinged from this host to confirm that the router interface Is operational?
    • A. 

      127.0.0.1

    • B. 

      192.168.64.196

    • C. 

      192.168.254.1

    • D. 

      192.168.254.9

    • E. 

      192.168.254.254

  • 5. 
    Refer to the exhibit. What function does router RT_A need to provide to allow Internet access for hosts in this network
    • A. 

      Address translation

    • B. 

      DHCP services

    • C. 

      Ftpd

    • D. 

      Web server

  • 6. 
    • A. 

      Issue the ip address command on interface FastEthernet 0/0

    • B. 

      Issue the no shutdown command on interface FastEthernet 0/1

    • C. 

      Issue the clock rate command on interface Serial 0/0/0

    • D. 

      Issue thedes cription command on interface Serial 0/0/1

  • 7. 
    What are three characteristics of CSMA/CD? (Choose three.)
    • A. 

      Devices can be configured with a higher transmission priority

    • B. 

      A jam signal indicates that the collision has cleared and the media is not busy.

    • C. 

      A device listens and waits until the media is not busy before Transmitting.

    • D. 

      The device with the electronic token is the only one that can transmitafter a collision

    • E. 

      All of the devices on a segment see data that passes on the network medium.

    • F. 

      After detecting a collision, hosts can attempt to resume transmission after a random time delay has expired

  • 8. 
    • A. 

      Router(config)# line vty 0 3 Router(config

    • B. 

      Line)# password c13c0 Router(config-line)#login

    • C. 

      The entries specify three Telnet lines for remote access.

    • D. 

      The entries specify four Telnet lines for remote access.

    • E. 

      The entries set the console and Telnet password to “c13c0

    • F. 

      Telnet access will be denied because the Telnet configuration is incomplete.

    • G. 

      Access will be permitted for Telnet using “c13c0″ as the password.

  • 9. 
    Refer to the exhibit. A network administrator remotely accesses the CLI of RouterBfrom PC1. Which two statements are true about the application layer protocol that isused to make this connection? (Choose two.)
    • A. 

      The data is encrypted.

    • B. 

      The connection type is called a VTY session.

    • C. 

      A server process is running on PC1.

    • D. 

      A GET request is sent to RouterB.

    • E. 

      The application name is the same for the service, protocol, and client.

  • 10. 
    • A. 

      Two networks routing the packets

    • B. 

      Two applications communicating the data

    • C. 

      Two hosts at either end of the communication

    • D. 

      Two nodes on the local network exchanging the frame

  • 11. 
    • A. 

      The cable is unusable and must be rewired.

    • B. 

      The cable is suitable for use as a Gigabit Ethernet straight-through

    • C. 

      The cable is suitable for use as a Fast Ethernet crossover.

    • D. 

      The cable is suitable for use as a rollover cable.

    • E. 

      The cable is suitable for use as a Gigabit Ethernet crossover

    • F. 

      The cable is suitable for use between two 100 Mbps Auto-MDIX capable switches

  • 12. 
    • A. 

      The source port indicates that a Telnet session has been initiated.

    • B. 

      This exchange is part of the three-way handshake.

    • C. 

      The data is flowing from server to client.

    • D. 

      The destination port indicates that an HTTP session has been initiated.

    • E. 

      The data listed is associated with the transport layer.

    • F. 

      The source port does not support communication with the destination port that is listed

  • 13. 
    Due to a security violation, the router passwords must be changed. What information can be learned from the following configuration entries? (Choose two.)   Router(config)# line vty 0 3 Router(config-line)# password c13c0 Router(config-line)# login
    • A. 

      The entries specify three Telnet lines for remote access.

    • B. 

      The entries specify four Telnet lines for remote access.

    • C. 

      The entries set the console and Telnet password to "c13c0".

    • D. 

      Telnet access will be denied because the Telnet configuration is incomplete.

    • E. 

      Access will be permitted for Telnet using "c13c0" as the password.

  • 14. 
    Refer to the exhibit. A network administrator remotely accesses the CLI of RouterB from PC1 using Telnet. Which statement is true about this connection?
    • A. 

      The data is automatically encrypted.

    • B. 

      A Telnet server process is running on PC1.

    • C. 

      The connection is made through a VTY session on the router.

    • D. 

      A GET request was sent to RouterB to retrieve data during this session.

  • 15. 
    • A. 

      Two networks routing the packets

    • B. 

      Two applications communicating the data

    • C. 

      Two hosts at either end of the communication

    • D. 

      Two nodes on the local network exchanging the frame

  • 16. 
    Refer to the exhibit. What two facts can be determined about the exhibited topology? (Choose two.)
    • A. 

      A single broadcast domain is present

    • B. 

      Two logical address ranges are required.

    • C. 

      Three broadcast domains are shown.

    • D. 

      Four networks are needed.

    • E. 

      Five collision domains exist.

  • 17. 
    What are three characteristics of CSMA/CD? (Choose three.)
    • A. 

      Devices can be configured with a higher transmission priority.

    • B. 

      A jam signal indicates that the collision has cleared and the media is not busy.

    • C. 

      A device listens and waits until the media is not busy before transmitting.

    • D. 

      The device with the electronic token is the only one that can transmit after a collision.

    • E. 

      All of the devices on a segment see data that passes on the network medium.

    • F. 

      After detecting a collision, hosts can attempt to resume transmission after a random time delay has expired.

  • 18. 
    Refer to the exhibit. While configuring a network, a technician wired each end of a Category 5e cable as shown. Which two statements are true about this setup? (Choose two.)
    • A. 

      The cable is suitable for connecting a switch to a router Ethernet port.

    • B. 

      The cable is suitable for connecting dissimilar types of devices.

    • C. 

      The cable is unusable and must be rewired.

    • D. 

      The cable is terminated in a way that the transmit pin is wired to the receive pin.

    • E. 

      The cable simulates a point-to-point WAN link.

  • 19. 
    Which topology divides the collision domain and provides full media bandwidth to the hosts in the network?
    • A. 

      Pic 1

    • B. 

      Pic 2

    • C. 

      Pic 3

    • D. 

      Pic 4

  • 20. 
    • A. 

      0 to 255

    • B. 

      0 to 1023

    • C. 

      1024 to 49151

    • D. 

      49152 to 65535

  • 21. 
    Which configuration mode is used to set a password to authenticate users that are accessing and configuring the network device using Telnet connection?
    • A. 

      VTY line mode

    • B. 

      Interface mode

    • C. 

      Console line mode

    • D. 

      Global configuration mode

  • 22. 
    • A. 

      Pic 1

    • B. 

      Pic 2

    • C. 

      Pic 3

    • D. 

      Pic 4

  • 23. 
    • A. 

      Reload the device.

    • B. 

      Perform basic tests.

    • C. 

      Configure individual interfaces.

    • D. 

      Configure individual terminal lines.

  • 24. 
    Which option correctly identifies the interface or interfaces used to connect the router to a CSU/DSU for WAN connectivity?
    • A. 

      Pic 1

    • B. 

      Pic 2

    • C. 

      Pic 3

    • D. 

      Pic 4

  • 25. 
    To send data through a network, what two flags are used to establish a session? (Choose two.)
    • A. 

      ACK

    • B. 

      CRC

    • C. 

      SYN

    • D. 

      Ack #

    • E. 

      Port #

    • F. 

      Seq #

  • 26. 
    • A. 

      The node drops the frame.

    • B. 

      The node sends out a Layer 3 broadcast message.

    • C. 

      The node sends a message directly to the router for the address.

    • D. 

      The node sends out an ARP request with the destination IP address.

  • 27. 
    Refer to the exhibit. Which two layers of the OSI model describe the same functions as the transport and internet layers of the TCP/model? (Choose two.)
    • A. 

      Application layer

    • B. 

      Presentation layer

    • C. 

      Session layer

    • D. 

      Transport layer

    • E. 

      Network layer

    • F. 

      Data link layer

    • G. 

      Physical layer

  • 28. 
    • A. 

      10 BASE-T

    • B. 

      100 BASE-T

    • C. 

      100 BASE-FX

    • D. 

      1000 BASE-TX

    • E. 

      1000 BASE-SX

  • 29. 
    • A. 

      3

    • B. 

      5

    • C. 

      7

    • D. 

      9

    • E. 

      11

  • 30. 
    To enhance security in a network, the network administrator uses these commands:   Router(config)# line console 0 Router(config-line)# password j1mdi2 Router(config-line)# login   What two conclusions are evident from these commands? (Choose two.)
    • A. 

      Users who attempt to connect to the console port of the router must enter a password.

    • B. 

      The entries permit access through the console by the use of j1mdi2 as the password.

    • C. 

      The entries eliminate the need for authentication.

    • D. 

      Access through the console will be denied because the console configuration is incomplete.

    • E. 

      The entries prevent passwords from being displayed as plain text.

  • 31. 
    • A. 

      Issue the erase flash command.

    • B. 

      Issue the reload command and respond no to the prompt that follows.

    • C. 

      Issue the erase start-up config command.

    • D. 

      Issue the copy running-config start-up config command.

  • 32. 
    What information can be gathered by using the command netstat?
    • A. 

      The default gateway

    • B. 

      The routing protocol

    • C. 

      Active TCP connections

    • D. 

      The locally configured subnet mask

  • 33. 
    Which service is used when the nslookup command is issued on a computer?
    • A. 

      FTP

    • B. 

      DNS

    • C. 

      DHCP

    • D. 

      Telnet

  • 34. 
    • A. 

      Pic 1

    • B. 

      Pic 2

    • C. 

      Pic 3

    • D. 

      Pic 4

  • 35. 
    Which application belongs to the category of the client/server model?
    • A. 

      Using Telnet to access a router

    • B. 

      Exchanging information via instant messaging

    • C. 

      Printing a document to a locally connected printer

    • D. 

      Scanning a document with a directly connected scanner

  • 36. 
    • A. 

      IP

    • B. 

      TCP

    • C. 

      UDP

    • D. 

      Ethernet

  • 37. 
    How can ARP be used to help document the network?
    • A. 

      It can list each hop on the way to a destination host.

    • B. 

      It can show the average latency of hosts on the network.

    • C. 

      It can provide a list of physical addresses on the network.

    • D. 

      It can indicate which hosts are not responding to network traffic.

  • 38. 
    In a network design project, a network designer needs to select a device to provide collision free connections to 40 hosts on the LAN. Which device should be selected?
    • A. 

      Hub

    • B. 

      Router

    • C. 

      Switch

    • D. 

      Firewall

  • 39. 
    • A. 

      Port number

    • B. 

      Device physical address

    • C. 

      Destination host logical address

    • D. 

      Virtual connection identifier

  • 40. 
    • A. 

      Source and destination IP addresses

    • B. 

      Source and destination MAC addresses

    • C. 

      Source and destination port numbers

    • D. 

      Source and destination channel identifiers

  • 41. 
    • A. 

      It is an application layer protocol.

    • B. 

      It is designed to make IP a reliable protocol.

    • C. 

      It is often filtered out of networks for security purposes.

    • D. 

      If a host does not respond to an ICMP echo request, the host is not functioning.

  • 42. 
    Which physical component is used to access and perform the initial configuration on a new unconfigured router?
    • A. 

      Pic 1

    • B. 

      Pic 2

    • C. 

      Pic 3

    • D. 

      Pic 4

    • E. 

      Pic 5

  • 43. 
    • A. 

      The Layer 2 information is removed and the frame is pushed up to Layer 3.

    • B. 

      The host station will copy the information to its buffers and send it back out.

    • C. 

      The frame originated from the host and will be ignored.

    • D. 

      The Layer 3 information is added to the frame.

  • 44. 
    A network administrator is asked to design a new addressing scheme for a corporate network. There are 60 users in the main office, users in the branch office, 28 users in manufacturing, 12 in the sales office, and 4 users in the research office. Which VLSM addressing scheme that uses the 192.168.88.0/24 network will fulfill the requirements while wasting the fewest addresses?
    • A. 

      192.168.88.0/26 main 192.168.88.32/26 branch 192.168.88.64/26 manufacturing 192.168.88.96/27 sales 192.168.88.128/28 research

    • B. 

      192.168.88.0/26 main 192.168.88.64/26 branch 192.168.88.128/27 manufacturing 192.168.88.160/28 sales 192.168.88.176/29 research

    • C. 

      192.168.88.0/27 main 192.168.88.32/27 branch 192.168.88.64/28 manufacturing 192.168.88.80/29 sales 192.168.88.88/30 research

    • D. 

      192.168.88.0/27 main 192.168.88.64/28 branch 192.168.88.80/28 manufacturing 192.168.88.96/29 sales 192.168.88.104/30 research