CCNA 1 Final Exam

44 Questions  I  By Erinia

  
Changes are done, please start the quiz.


Question Excerpt

Removing question excerpt is a premium feature

Upgrade and get a lot more done!
1.  Which two types of media can provide bandwidth up to 1 Gb/s? (Choose two.)
A.
B.
C.
D.
E.
2.  Which configuration mode is used to set a password to authenticate users that are accessing and configuring the network device using Telnet connection?
A.
B.
C.
D.
3.  During the encapsulation process, which identifiers are added at the transport layer?
A.
B.
C.
D.
4.  Refer to the exhibit. Which two layers of the OSI model describe the same functions as the transport and internet layers of the TCP/model? (Choose two.)
A.
B.
C.
D.
E.
F.
G.
5.  What information is contained in the header of Layer 3 to help data delivery?
A.
B.
C.
D.
6.  Refer to the exhibit. What two facts can be determined about the exhibited topology? (Choose two.)
A.
B.
C.
D.
E.
7.  Which OSI layer does IP rely on to determine whether packets have been lost and to request retransmission?
A.
B.
C.
D.
8.  How can ARP be used to help document the network?
A.
B.
C.
D.
9.  A network administrator is asked to design a new addressing scheme for a corporate network. There are 60 users in the main office, users in the branch office, 28 users in manufacturing, 12 in the sales office, and 4 users in the research office. Which VLSM addressing scheme that uses the 192.168.88.0/24 network will fulfill the requirements while wasting the fewest addresses?
A.
B.
C.
D.
10.  Which physical component is used to access and perform the initial configuration on a new unconfigured router?
A.
B.
C.
D.
E.
11.  Refer to the exhibit. What two facts can be determined from the information that is given? (Choose two.)
A.
B.
C.
D.
E.
F.
1 comment
12.  Due to a security violation, the router passwords must be changed. What information can be learned from the following configuration entries? (Choose two.)
A.
B.
C.
D.
E.
F.
G.
13.  Which service is used when the nslookup command is issued on a computer?
A.
B.
C.
D.
14.  Which topology divides the collision domain and provides full media bandwidth to the hosts in the network?
A.
B.
C.
D.
15.  To send data through a network, what two flags are used to establish a session? (Choose two.)
A.
B.
C.
D.
E.
F.
16.  Which statement is true about the ICMP protocol?
A.
B.
C.
D.
17.  To make a server application accessible by clients, a network administrator wants to configure the port number that the application will use. From which range of numbers should the port number be assigned?
A.
B.
C.
D.
18.  Refer to the exhibit. Which Layer 2 protocol could be used inside nework A and network C?
A.
B.
C.
D.
19.  What happens when a node on an Ethernet network is creating a frame and it does not have the destination MAC address?
A.
B.
C.
D.
20.  When connectionless protocols are implemented at the lower layers of the OSI model, what is usually used to acknowledge that the data was received and to request the retransmission of missing data?
A.
B.
C.
D.
E.
21.  Refer to the exhibit. What function does router RT_A need to provide to allow Internet access for hosts in this network
A.
B.
C.
D.
22.  Which option correctly identifies the interface or interfaces used to connect the router to a CSU/DSU for WAN connectivity?
A.
B.
C.
D.
23.  Refer to the exhibit. A student has wired each end of a CAT 5e cable as shown. What is the result? (Choose two.)
A.
B.
C.
D.
E.
F.
24.  Refer to the exhibit. A network administrator remotely accesses the CLI of RouterB from PC1 using Telnet. Which statement is true about this connection?
A.
B.
C.
D.
25.  In a network design project, a network designer needs to select a device to provide collision free connections to 40 hosts on the LAN. Which device should be selected?
A.
B.
C.
D.
26.  An administrator has made changes to a device. The changes did not have the desired effect. What can the administrator do to restore the configuration saved in NVRAM?
A.
B.
C.
D.
27.  Refer to the exhibit. A technician is working on a network problem that requires verification of the router LAN interface. What address should be pinged from this host to confirm that the router interface Is operational?
A.
B.
C.
D.
E.
28.  What information can be gathered by using the command netstat?
A.
B.
C.
D.
29.  Refer to the exhibit. A network administrator remotely accesses the CLI of RouterBfrom PC1. Which two statements are true about the application layer protocol that isused to make this connection? (Choose two.)
A.
B.
C.
D.
E.
30.  Refer to the exhibit. The network containing router B is experiencing problems. Anetwork associate has isolated the issue in this network to router B? What action canbe preformed to correct the network issue?
A.
B.
C.
D.
1 comment
31.  What are three characteristics of CSMA/CD? (Choose three.)
A.
B.
C.
D.
E.
F.
32.  Which application belongs to the category of the client/server model?
A.
B.
C.
D.
33.  A user sees the command prompt: Router(config-if)# . What task can be performed at this mode?
A.
B.
C.
D.
34.  To enhance security in a network, the network administrator uses these commands:   Router(config)# line console 0 Router(config-line)# password j1mdi2 Router(config-line)# login   What two conclusions are evident from these commands? (Choose two.)
A.
B.
C.
D.
E.
35.  Refer to the exhibit. Each media link is labeled. What type of cable should be used to connect the different devices?
A.
B.
C.
D.
E.
36.  What happens when a host station receives a frame that contains its own MAC address in the destination field?
A.
B.
C.
D.
37.  Refer to the exhibit. While configuring a network, a technician wired each end of a Category 5e cable as shown. Which two statements are true about this setup? (Choose two.)
A.
B.
C.
D.
E.
38.  What are three characteristics of CSMA/CD? (Choose three.)
A.
B.
C.
D.
E.
F.
39.  Due to a security violation, the router passwords must be changed. What information can be learned from the following configuration entries? (Choose two.)   Router(config)# line vty 0 3 Router(config-line)# password c13c0 Router(config-line)# login
A.
B.
C.
D.
E.
40.  During the encapsulation process, which identifiers are added at the transport layer?
A.
B.
C.
D.
41.  Refer to the exhibit. Which option correctly identifies the network address, range of host addresses, and the broadcast address for the network that contains host A? 
A.
B.
C.
D.
42.  During the encapsulation process, what identifiers are added at the transport layer?
A.
B.
C.
D.
43.  Refer to the exhibit. All devices in the network use default configurations. How many broadcast domains are there in this topology?
A.
B.
C.
D.
E.
44.  Which option shows how a router will route packets to a remote network?
A.
B.
C.
D.
Back to top


to post comments.

Removing ad is a premium feature

Upgrade and get a lot more done!
Upgrade
Take Another Quiz