Do you thing that you have a proper understanding of all the topics that you covered at CCNA level 1? If you said a big yes to this then take up the totally unbeatable quiz below for the final exam and prove you are a genius when it comes to computing.
Connection 1 - rollover cable Connection 2 - straight-through cable Connection 3 - crossover cable
Connection 1 - crossover cable Connection 2 - rollover cable Connection 3 - crossover cable
Connection 1 - straight-through cable Connection 2 - crossover cable Connection 3 - crossover cable
Connection 1 - straight-through cable Connection 2 - crossover cable Connection 3 - straight-through cable
Connection 1 - crossover cable Connection 2 - straight-through cable Connection 3 - crossover cable
Rate this question:
Application
Presentation
Session
Transport
Rate this question:
127.0.0.1
192.168.64.196
192.168.254.1
192.168.254.9
192.168.254.254
Rate this question:
Address translation
DHCP services
Ftpd
Web server
Rate this question:
Devices can be configured with a higher transmission priority
A jam signal indicates that the collision has cleared and the media is not busy.
A device listens and waits until the media is not busy before Transmitting.
The device with the electronic token is the only one that can transmitafter a collision
All of the devices on a segment see data that passes on the network medium.
After detecting a collision, hosts can attempt to resume transmission after a random time delay has expired
Rate this question:
Router(config)# line vty 0 3 Router(config
Line)# password c13c0 Router(config-line)#login
The entries specify three Telnet lines for remote access.
The entries specify four Telnet lines for remote access.
The entries set the console and Telnet password to “c13c0
Telnet access will be denied because the Telnet configuration is incomplete.
Access will be permitted for Telnet using “c13c0″ as the password.
Rate this question:
The data is encrypted.
The connection type is called a VTY session.
A server process is running on PC1.
A GET request is sent to RouterB.
The application name is the same for the service, protocol, and client.
Rate this question:
Two networks routing the packets
Two applications communicating the data
Two hosts at either end of the communication
Two nodes on the local network exchanging the frame
Rate this question:
The cable is unusable and must be rewired.
The cable is suitable for use as a Gigabit Ethernet straight-through
The cable is suitable for use as a Fast Ethernet crossover.
The cable is suitable for use as a rollover cable.
The cable is suitable for use as a Gigabit Ethernet crossover
The cable is suitable for use between two 100 Mbps Auto-MDIX capable switches
Rate this question:
The source port indicates that a Telnet session has been initiated.
This exchange is part of the three-way handshake.
The data is flowing from server to client.
The destination port indicates that an HTTP session has been initiated.
The data listed is associated with the transport layer.
The source port does not support communication with the destination port that is listed
Rate this question:
The entries specify three Telnet lines for remote access.
The entries specify four Telnet lines for remote access.
The entries set the console and Telnet password to "c13c0".
Telnet access will be denied because the Telnet configuration is incomplete.
Access will be permitted for Telnet using "c13c0" as the password.
Rate this question:
The data is automatically encrypted.
A Telnet server process is running on PC1.
The connection is made through a VTY session on the router.
A GET request was sent to RouterB to retrieve data during this session.
Rate this question:
Two networks routing the packets
Two applications communicating the data
Two hosts at either end of the communication
Two nodes on the local network exchanging the frame
Rate this question:
A single broadcast domain is present
Two logical address ranges are required.
Three broadcast domains are shown.
Four networks are needed.
Five collision domains exist.
Rate this question:
Devices can be configured with a higher transmission priority.
A jam signal indicates that the collision has cleared and the media is not busy.
A device listens and waits until the media is not busy before transmitting.
The device with the electronic token is the only one that can transmit after a collision.
All of the devices on a segment see data that passes on the network medium.
After detecting a collision, hosts can attempt to resume transmission after a random time delay has expired.
Rate this question:
The cable is suitable for connecting a switch to a router Ethernet port.
The cable is suitable for connecting dissimilar types of devices.
The cable is unusable and must be rewired.
The cable is terminated in a way that the transmit pin is wired to the receive pin.
The cable simulates a point-to-point WAN link.
Rate this question:
Pic 1
Pic 2
Pic 3
Pic 4
Rate this question:
0 to 255
0 to 1023
1024 to 49151
49152 to 65535
Rate this question:
VTY line mode
Interface mode
Console line mode
Global configuration mode
Rate this question:
Pic 1
Pic 2
Pic 3
Pic 4
Reload the device.
Perform basic tests.
Configure individual interfaces.
Configure individual terminal lines.
Rate this question:
Pic 1
Pic 2
Pic 3
Pic 4
ACK
CRC
SYN
Ack #
Port #
Seq #
Rate this question:
The node drops the frame.
The node sends out a Layer 3 broadcast message.
The node sends a message directly to the router for the address.
The node sends out an ARP request with the destination IP address.
Rate this question:
Application layer
Presentation layer
Session layer
Transport layer
Network layer
Data link layer
Physical layer
Rate this question:
10 BASE-T
100 BASE-T
100 BASE-FX
1000 BASE-TX
1000 BASE-SX
Rate this question:
3
5
7
9
11
Rate this question:
Users who attempt to connect to the console port of the router must enter a password.
The entries permit access through the console by the use of j1mdi2 as the password.
The entries eliminate the need for authentication.
Access through the console will be denied because the console configuration is incomplete.
The entries prevent passwords from being displayed as plain text.
Rate this question:
Issue the erase flash command.
Issue the reload command and respond no to the prompt that follows.
Issue the erase start-up config command.
Issue the copy running-config start-up config command.
Rate this question:
The default gateway
The routing protocol
Active TCP connections
The locally configured subnet mask
Rate this question:
FTP
DNS
DHCP
Telnet
Rate this question:
Pic 1
Pic 2
Pic 3
Pic 4
Using Telnet to access a router
Exchanging information via instant messaging
Printing a document to a locally connected printer
Scanning a document with a directly connected scanner
Rate this question:
IP
TCP
UDP
Ethernet
Rate this question:
It can list each hop on the way to a destination host.
It can show the average latency of hosts on the network.
It can provide a list of physical addresses on the network.
It can indicate which hosts are not responding to network traffic.
Rate this question:
Hub
Router
Switch
Firewall
Rate this question:
Port number
Device physical address
Destination host logical address
Virtual connection identifier
Rate this question:
Source and destination IP addresses
Source and destination MAC addresses
Source and destination port numbers
Source and destination channel identifiers
Rate this question:
It is an application layer protocol.
It is designed to make IP a reliable protocol.
It is often filtered out of networks for security purposes.
If a host does not respond to an ICMP echo request, the host is not functioning.
Rate this question:
Pic 1
Pic 2
Pic 3
Pic 4
Pic 5
The Layer 2 information is removed and the frame is pushed up to Layer 3.
The host station will copy the information to its buffers and send it back out.
The frame originated from the host and will be ignored.
The Layer 3 information is added to the frame.
Rate this question:
192.168.88.0/26 main 192.168.88.32/26 branch 192.168.88.64/26 manufacturing 192.168.88.96/27 sales 192.168.88.128/28 research
192.168.88.0/26 main 192.168.88.64/26 branch 192.168.88.128/27 manufacturing 192.168.88.160/28 sales 192.168.88.176/29 research
192.168.88.0/27 main 192.168.88.32/27 branch 192.168.88.64/28 manufacturing 192.168.88.80/29 sales 192.168.88.88/30 research
192.168.88.0/27 main 192.168.88.64/28 branch 192.168.88.80/28 manufacturing 192.168.88.96/29 sales 192.168.88.104/30 research
Rate this question:
Application Layer
Session Layer
Transport Layer
Network Layer
Rate this question:
Quiz Review Timeline (Updated): Aug 8, 2024 +
Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.
Wait!
Here's an interesting quiz for you.