CCNA-first Semester

66 Questions  I  By Alqubaity
Please take the quiz to rate it.

 CCNA-first semester
This Exam for the First semster in ccna certificate. ^_^

  
Changes are done, please start the quiz.


Questions and Answers

Removing question excerpt is a premium feature

Upgrade and get a lot more done!
  • 1. 
    Which three statements characterize the transport layer protocols? (Choose three.)
    • A. 

      TCP and UDP port numbers are used by application layer protocols.

    • B. 

      TCP uses port numbers to provide reliable transportation of IP packets.

    • C. 

      UDP uses windowing and acknowledgments for reliable transfer of data.

    • D. 

      TCP uses windowing and sequencing to provide reliable transfer of data.

    • E. 

      TCP is a connection-oriented protocol. UDP is a connectionless protocol.


  • 2. 
    Which OSI layer uses the header information to reassemble the data segments into streams?
    • A. 

      Application layer

    • B. 

      Network layer

    • C. 

      Presentation layer

    • D. 

      Session layer

    • E. 

      Transport layer


  • 3. 

    Refer to the exhibit. The diagram represents the process of sending email between clients. Select the list below that correctly identifies the component or protocol used at each numbered stage of the diagram.
    • A. 

      1.MUA 2.MDA 3.MTA 4.SMTP 5.MTA 6.POP 7.MDA 8.MUA

    • B. 

      1.MUA 2.POP 3.MDA 4.SMTP 5.MTA 6.MDA 7.SMTP 8.MUA

    • C. 

      1.MUA 2.POP 3.SMTP 4.MDA 5.MTA 6.SMTP 7.POP 8.MUA

    • D. 

      1.MDA 2.SMTP 3.MTA 4.SMTP 5.MTA 6.MUA 7.POP 8.MDA

    • E. 

      1.MUA 2.SMTP 3.MTA 4.SMTP 5.MTA 6.MDA 7.POP 8.MUA


  • 4. 
    The Layer 4 header contains which type of information to aid in the delivery of data?
    • A. 

      Service port number

    • B. 

      Host logical address

    • C. 

      Device physical address

    • D. 

      Virtual connection identifier


  • 5. 
    Which OSI layers offers reliable, connection-oriented data communication services?
    • A. 

      Application

    • B. 

      Presentation

    • C. 

      Session

    • D. 

      Transport

    • E. 

      Network


  • 6. 

    Refer to the exhibit. A web browser running on host PC1 sends a request for a web page to the web server with an IP address 192.168.1.254/24. What sequence of steps will follow in order to establish the session before data can be exchanged?
    • A. 

      The session will be initiated using UDP. No additional acknowledgment will be required to establish the session.

    • B. 

      The session will be initiated using TCP. No additional acknowledgment will be required to establish the session.

    • C. 

      The session will be initiated using UDP. The returned web page will serve as an acknowledgment for session establishment.

    • D. 

      The session will be initiated using TCP. A three-way handshake must be successfully completed before the session is established.


  • 7. 
    A host is transmitting a video over the network. How does the transport layer allow this host to use multiple applications to transmit other data at the same time as the video transmission?
    • A. 

      It uses error control mechanisms.

    • B. 

      It uses a connectionless protocol only for multiple simultaneous transmissions.

    • C. 

      It uses multiple Layer 2 source addresses.

    • D. 

      It uses multiple port numbers.


  • 8. 

    Refer to the exhibit. Host A uses router A as its default gateway. If host A sends an ICMP echo request to 172.16.10.0, what ICMP response will
    • A. 

      Echo reply

    • B. 

      Source quench

    • C. 

      Route redirection

    • D. 

      Destination unreachable


  • 9. 

    Refer to the exhibit. The headers added at each layer are shown. Which layer adds the destination and source process numbers to ensure that data is delivered to the correct application?
    • A. 

      Physical layer

    • B. 

      Data link layer

    • C. 

      Network layer

    • D. 

      Transport layer


  • 10. 
    Which range of port numbers is assigned dynamically to client applications when initiating a connection to the server?
    • A. 

      0 to 255

    • B. 

      0 to 1023

    • C. 

      1024 to 49151

    • D. 

      Greater than 65535


  • 11. 

    Refer to the exhibit. How will data files get retrieved from the server?
    • A. 

      The client establishes a two-way connection to the server on port 21 for file transfer.

    • B. 

      From the perspective of computer A, port 21 is used to signal a push to the server, and port 20 is used to signal a pull from the server.

    • C. 

      There is a connection established to send files from the client to the server and a second connection to get files from the server to the client.

    • D. 

      Computer A establishes a connection to the server on port 21 for control and uses a second connection on port 20 to download and upload files.


  • 12. 
    How does the transport layer allow a host to maintain multiple, simultaneous communication streams across different applications?
    • A. 

      It uses error control mechanisms.

    • B. 

      It uses a connectionless protocol only for multiple simultaneous transmissions.

    • C. 

      It uses multiple Layer 2 source addresses.

    • D. 

      It uses multiple ports.


  • 13. 
    Which device should be used for routing a packet to a remote network?
    • A. 

      Access switch

    • B. 

      DHCP server

    • C. 

      Hub

    • D. 

      Router


  • 14. 

    Refer to the exhibit. On the basis of the IP configuration that is shown, what is the reason that Host A and Host B are unable to communicate outside the local network?
    • A. 

      Host A was assigned a network address.

    • B. 

      Host B was assigned a multicast address.

    • C. 

      Host A and Host B belong to different networks.

    • D. 

      The gateway address was assigned a broadcast address.


  • 15. 

    Refer to the exhibit. What is the correct destination socket number for a web page request from Host A to the web server?
    • A. 

      00-08-a3-b6-ce-46

    • B. 

      198.133.219.25:80

    • C. 

      Http://www.cisco.com

    • D. 

      C 198.133.219.0/24 is directly connected, FastEthernet0/0


  • 16. 

    Refer to the exhibit. Which logical topology describes the exhibited network?
    • A. 

      Star

    • B. 

      Ring

    • C. 

      Point-to-point

    • D. 

      Multi-access


  • 17. 

    Refer to the exhibit. Which logical topology describes the exhibited network?
    • A. 

      Star

    • B. 

      Ring

    • C. 

      Point-to-point

    • D. 

      Multi-access


  • 18. 
    What information is used at each hop to determine where the packet will be forwarded next?
    • A. 

      The IP packet header

    • B. 

      The incoming interface

    • C. 

      The transport layer PDU

    • D. 

      The source MAC address


  • 19. 

    Refer to the exhibit. The PC, the routing table of which is displayed, is configured correctly. To which network device or interface does the IP address 192.168.1.254 belong?
    • A. 

      PC

    • B. 

      Switch

    • C. 

      Router interface fa0/0

    • D. 

      Router interface fa0/1


  • 20. 

    Examine the graphic with current configurations. Host A in the Clerical office failed and was replaced. Although a ping to 127.0.0.1 was successful, the replacement computer cannot access the company network. With proxy ARP disabled on the Fa0/0 interface of the New York router, what is the likely cause of the problem?
    • A. 

      Network card failure

    • B. 

      Network cables unplugged

    • C. 

      Network cables unplugged

    • D. 

      Subnet mask incorrectly entered


  • 21. 
    Which three addresses belong to the category of private IP addresses? (Choose three.)
    • A. 

      10.0.0.1

    • B. 

      127.0.0.1

    • C. 

      150.0.0.1

    • D. 

      172.16.0.1

    • E. 

      192.168.0.1


  • 22. 

    Refer to the exhibit. The NAT functionality of the router is enabled to provide Internet access to the PC. However, the PC is still unable to access the Internet. Which IP address should be changed to 209.165.201.1 to enable the PC to access the Internet?
    • A. 

      192.168.1.191

    • B. 

      192.168.1.101

    • C. 

      192.168.1.1

    • D. 

      192.168.1.254


  • 23. 
    As network administrator, what is the subnet mask that allows 510 hosts given the IP address 172.30.0.0?
    • A. 

      255.255.0.0

    • B. 

      255.255.248.0

    • C. 

      255.255.252.0

    • D. 

      255.255.254.0

    • E. 

      255.255.255.0


  • 24. 

    Refer to the exhibit. The host was disconnected from switch 2 and connected to switch 1. Which combination of IP address, subnet mask, and default gateway should be assigned to this host to allow it to function in the network?
    • A. 

      IP address: 10.10.9.37 Subnet mask: 255.255.255.240 Default gateway: 10.10.9.35

    • B. 

      IP address: 10.10.9.37 Subnet mask: 255.255.255.224 Default gateway: 10.10.9.35

    • C. 

      IP address: 10.10.9.29 Subnet mask: 255.255.255.248 Default gateway: 10.10.9.35

    • D. 

      IP address: 10.10.9.29 Subnet mask: 255.255.255.248 Default gateway: 10.10.9.35

    • E. 

      IP address: 10.10.9.37 Subnet mask: 255.255.255.224 Default gateway: 196.1.105.6


  • 25. 

    Refer to the exhibit. A host is using NAT to connect to the Internet. Which three IP addresses enable this
    • A. 

      10.1.1.63

    • B. 

      10.1.1.37

    • C. 

      10.1.1.39

    • D. 

      10.1.1.32

    • E. 

      10.1.1.60


  • 26. 
    Which three statements are true about network layer addressing? (Choose three.)
    • A. 

      It uniquely identifies each host.

    • B. 

      It assists in forwarding packets across internetworks.

    • C. 

      It uses a logical 32-bit IPv4 address.

    • D. 

      It is not a configurable address.

    • E. 

      It is a physical address.


  • 27. 
    In a Cisco IOS device, where is the startup-configuration file stored?
    • A. 

      Flash

    • B. 

      NVRAM

    • C. 

      RAM

    • D. 

      ROM


  • 28. 
    While configuring a router, a network technician wants to name the router. Which prompt should the technician see when entering the hostname command?
    • A. 

      Router>

    • B. 

      Router(config)#

    • C. 

      Router#

    • D. 

      Router(config-line)#


  • 29. 
    What is the result of using the clock rate 56000 command at the serial interface of the router?
    • A. 

      The interface is configured as a DCE device.

    • B. 

      The interface timers are cleared.

    • C. 

      The FastEthernet interface is made to emulate a serial interface by assigning it a timing signal.

    • D. 

      The IP address for the serial interface is configured.


  • 30. 
    What purpose does a hostname serve on a router?
    • A. 

      Uniquely identifies a router on the internet

    • B. 

      Used by routing protocols to identify peer routers

    • C. 

      Provides device identification to users logging on remotely

    • D. 

      Determines the hosts that are allowed to connect to the device


  • 31. 

    Refer to the exhibit. Which two statements describe the information that is represented in the header? (Choose two.)
    • A. 

      This is a server response.

    • B. 

      The UDP protocol is being used.

    • C. 

      The destination port indicates a Telnet session.

    • D. 

      The return segment will contain a source port of 23.

    • E. 

      The next session originated from the client of this session will use the source port number 13358


  • 32. 
    Because of a security violation, the router password must be changed. What information can be learned from these configuration entries? (Choose two.) Router(config)# line vty 0 4Router(config-line)# password arj15Router(config-line)# login
    • A. 

      This configuration allows users to connect by using a modem.

    • B. 

      Users must specify which line, 0 or 4, they wish to connect to when making a connection.

    • C. 

      This configuration allows users to connect to the router via the use of the telnet command.

    • D. 

      This configuration allows five users to make simultaneous connections to this router.

    • E. 

      The configured password is automatically encrypted on the router.


  • 33. 
    An administrator has made changes to a device. The changes did not have the desired effect. What can the administrator do to restore the configuration saved in NVRAM?
    • A. 

      Issue the erase flash command.

    • B. 

      Issue the reload command and respond no to the prompt that follows.

    • C. 

      Issue the erase start-up config command.

    • D. 

      Issue the copy running-config start-up config command.


  • 34. 
    A user types the enable command. What task can be performed at the privileged EXEC mode?
    • A. 

      Configure the device.

    • B. 

      Configure individual interfaces.

    • C. 

      Configure individual terminal lines.

    • D. 

      Issue show and debug commands.


  • 35. 

    Refer to the exhibit. A technician uses the nslookup command on the PC and views the output that is displayed in the exhibit. What is the IP address of the primary domain name server used by the host?
    • A. 

      10.10.10.32

    • B. 

      192.168.1.5

    • C. 

      192.168.1.99

    • D. 

      192.168.2.100


  • 36. 

    Refer to the exhibit. Which set of devices contains only intermediary devices?
    • A. 

      A, B, D, G

    • B. 

      A, B, E, F

    • C. 

      C, D, G, I

    • D. 

      G, H, I, J


  • 37. 

    Refer to the exhibit. The network containing router B is experiencing problems. A network associate has isolated the issue in this network to router B. What action can be preformed to correct the network issue?
    • A. 

      Issue the clock rate command on interface Serial 0/0/0

    • B. 

      Issue the description command on interface Serial 0/0/1

    • C. 

      Issue the ip address command on interface FastEthernet 0/0

    • D. 

      Issue the no shutdown command on interface FastEthernet 0/1


  • 38. 

    Refer to the exhibit. What is required on host A for a network technician to create the initial configuration on Router1?
    • A. 

      An FTP client

    • B. 

      A Telnet client

    • C. 

      A terminal emulation program

    • D. 

      A web browser


  • 39. 

    Refer to the exhibit. Host X is unable to communicate with host Y. Which command can be run at host X to determine which intermediary device is responsible for this failure?
    • A. 

      Telnet 192.168.1.1

    • B. 

      Ping 192.168.1.1

    • C. 

      Ftp 192.168.1.1

    • D. 

      Tracert 192.168.1.1


  • 40. 
    Which type of media is immune to EMI and RFI? (Choose two.)
    • A. 

      10 Base-T

    • B. 

      100 Base-FX

    • C. 

      10 Base-5

    • D. 

      100 Base TX

    • E. 

      1000 Base LX


  • 41. 

    Refer to the exhibit. Each media link is labeled. What type of cable should be used to connect the different devices?
    • A. 

      Connection 1 - rollover cable Connection 2 - straight-through cable Connection 3 - crossover cable

    • B. 

      Connection 1 - straight-through cable Connection 2 - crossover cable Connection 3 - rollover cable

    • C. 

      Connection 1 - crossover cable Connection 2 - rollover cable Connection 3 - straight-through cable

    • D. 

      Connection 1 - crossover cable Connection 2 - straight-through cable Connection 3 - rollover cable

    • E. 

      Connection 1 - straight-through cable Connection 2 - straight-through cable Connection 3 - straight-through cable


  • 42. 

    Refer to the exhibit. Host A wants to access the Internet. Which combination of a Layer 2 address and a Layer 3 address will enable this access from host A?
    • A. 

      Destination MAC: 0030.8596.DE83 Default gateway: 209.165.202.130

    • B. 

      Destination MAC: 0030.8596.DE82 Default gateway: 172.16.9.2

    • C. 

      Destination MAC: 0030.8517.44C4 Default gateway: 172.16.1.1

    • D. 

      Destination MAC: 0030.8517.44C4 Default gateway: 209.165.202.130


  • 43. 

    Refer to the exhibit. A network technician wants to connect host A to the console of a Cisco switch to initialize the configuration. What type of cable is required for this connection?
    • A. 

      Straight-through cable

    • B. 

      Crossover cable

    • C. 

      Rollover cable

    • D. 

      Serial cable


  • 44. 

    Refer to the exhibit. Cable 1 and cable 2 have the ends wired for specific physical layer requirements. The table lists each segment by number and the cable which has been installed by the network technician between the network components on that segment. From the data given, which segments have the correct cable installed? (Choose three.)
    • A. 

      Segment1

    • B. 

      Segment2

    • C. 

      Segment3

    • D. 

      Segment4

    • E. 

      Segment5


  • 45. 
    Which OSI layer manages data segments?
    • A. 

      Application layer

    • B. 

      Presentation layer

    • C. 

      Session layer

    • D. 

      Transport layer


  • 46. 
    A user enters http://www.cisco.com/web1.htm in the address line of a browser. Which statement is true about this transaction?
    • A. 

      The "http" portion indicates the protocol that is being used.

    • B. 

      The "web1.htm" portion is the specific service name.

    • C. 

      The retrieved web page will be displayed in URL code.

    • D. 

      The "www.cisco.com" is the name of the web page file that is called.


  • 47. 
    Which range of port numbers are reserved for services that are commonly used by applications that run on servers?
    • A. 

      0 to 255

    • B. 

      0 to 1023

    • C. 

      1024 to 49151

    • D. 

      49152 to 65535


  • 48. 
    Which information is used by the router to determine the path between the source and destination hosts?
    • A. 

      The host portion of the IP address

    • B. 

      The network portion of the IP address

    • C. 

      Host default gateway address

    • D. 

      The MAC address


  • 49. 
    A network has grown too large for technicians to configure network addresses and hosts files for name resolution. Which two application layer services should be added to the server to allow these needs to be satisfied dynamically? (Choose two.)
    • A. 

      DNS

    • B. 

      FTP

    • C. 

      DHCP

    • D. 

      HTTP

    • E. 

      SMTP


  • 50. 

    Refer to the exhibit. Which Layer 2 protocol could be used inside nework A and network C?
    • A. 

      IP

    • B. 

      TCP

    • C. 

      UDP

    • D. 

      Ethernet


  • 51. 

    Which option shows the PDU that contains the Layer 3 source and destination addressing for a packet?
    • A. 

      Pic1

    • B. 

      Pic2

    • C. 

      Pic3

    • D. 

      Pic4


  • 52. 
    A technician is setting up a workgroup for six users and wants to allow users to share files without setting up a server. Which application layer protocol will provide for peer-to-peer file sharing in a workgroup?
    • A. 

      SMB

    • B. 

      DNS

    • C. 

      DHCP

    • D. 

      HTTP


  • 53. 
    Which device should be used for enabling a host to communicate with another host on a different network?
    • A. 

      Switch

    • B. 

      Hub

    • C. 

      Router

    • D. 

      Host


  • 54. 

    Refer to the exhibit. Assume all devices are using default configurations. How many subnets are required to address the topology that is shown?
    • A. 

      1

    • B. 

      2

    • C. 

      3

    • D. 

      4

    • E. 

      5


  • 55. 

    Refer to the exhibit. When computer A sends a frame to computer D, what computers receive the frame?
    • A. 

      Only computer B, computer C, and computer D

    • B. 

      Only computer D

    • C. 

      All computers

    • D. 

      Only computer A and computer D


  • 56. 

    Which topology represents a collision-free environment?
    • A. 

      Pic1

    • B. 

      Pic2

    • C. 

      Pic3

    • D. 

      Pic4


  • 57. 

    Refer to the exhibit. Communication for hosts X and Y is restricted to the local network. What is the reason for this?
    • A. 

      Host X is assigned a network address.

    • B. 

      Host Y is assigned a multicast address.

    • C. 

      The gateway addresses are broadcast addresses.

    • D. 

      Host X and host Y belong to different networks.


  • 58. 

    Which option shows how a router will route packets to a remote network?
    • A. 

      Pic1

    • B. 

      Pic2

    • C. 

      Pic3

    • D. 

      Pic4


  • 59. 

    Refer to the exhibit. What two facts can be determined about the exhibited topology? (Choose two.)
    • A. 

      A single broadcast domain is present

    • B. 

      Four networks are needed.

    • C. 

      Three broadcast domains are shown.

    • D. 

      Two logical address ranges are required.

    • E. 

      Five collision domains exist.


  • 60. 

    Refer to the exhibit. Host B attempts to establish a TCP/IP session with host C. During this attempt, a frame was captured at the FastEthernet interface fa0/1 of the San Francisco router. The packet inside the captured frame has the source IP address 10.10.1.2, and the destination IP address is 10.31.1.20. What is the destination MAC address of the frame at the time of capture?
    • A. 

      0060.7320.D632

    • B. 

      0040.8517.44C3

    • C. 

      0060.7320.D631

    • D. 

      0010.C2B4.3421


  • 61. 

    Refer to the exhibit. A router, whose table is shown, receives a packet that is destined for 192.168.1.4. How will router treat the packet?
    • A. 

      The packet will be dropped.

    • B. 

      The packet will be forwarded via FastEthernet 0/0.

    • C. 

      The packet will be forwarded to the destination host.

    • D. 

      The packet will be forwarded to the 192.168.1.3 next-hop address.


  • 62. 

    Refer to the exhibit. A user wants to access the Internet from the PC. A part of the running configuration of the router is shown. Which default gateway IP address should be configured at the PC to enable this access?
    • A. 

      10.1.192.2

    • B. 

      10.1.192.1

    • C. 

      10.1.192.54

    • D. 

      192.31.7.1


  • 63. 

    A network administrator subnets the network 192.168.1.0/24 into four subnets. Which option correctly addresses Router1 and host A into the second subnet created?
    • A. 

      Pic1

    • B. 

      Pic2

    • C. 

      Pic3

    • D. 

      Pic4


  • 64. 
    Which subnet mask will allow 2040 hosts per subnet on the IP network 10.0.0.0?
    • A. 

      255.255.254.0

    • B. 

      255.255.248.0

    • C. 

      255.255.252.0

    • D. 

      255.255.255.128

    • E. 

      255.255.0.0


  • 65. 
    An organization has been assigned network ID 10.10.128.0 and subnet mask 255.255.224.0. Which IP address range can be used for this organization?
    • A. 

      10.10.128.0 to 10.10.160.255

    • B. 

      10.10.128.0 to 10.10.159.255

    • C. 

      10.10.128.0 to 10.10.192.255

    • D. 

      10.10.128.0 to 10.10.0.159

    • E. 

      10.10.128.0 to 10.10.159.0


  • 66. 
    What is true regarding network layer addressing? (Choose three.)
    • A. 

      Heirarchical

    • B. 

      Uniquely identifies each host

    • C. 

      48 bits in length

    • D. 

      Contains a network portion

    • E. 

      Uses a flat structure


Back to top

Removing ad is a premium feature

Upgrade and get a lot more done!
Take Another Quiz
We have sent an email with your new password.