CCNA 1 Final Exam

44 Questions
CCNA 1 final exam

.

Please wait...
Questions and Answers
  • 1. 
    • A. 

      IP

    • B. 

      UDP

    • C. 

      Ethernet

    • D. 

      A connectionless acknowledgement

    • E. 

      An upper-layer, connection-oriented protocol or service

  • 2. 
    Refer to the exhibit. Each media link is labeled. What type of cable should be used to connect the different devices?
    • A. 

      Connection 1 - rollover cable Connection 2 - straight-through cable Connection 3 - crossover cable

    • B. 

      Connection 1 - crossover cable Connection 2 - rollover cable Connection 3 - crossover cable

    • C. 

      Connection 1 - straight-through cable Connection 2 - crossover cable Connection 3 - crossover cable

    • D. 

      Connection 1 - straight-through cable Connection 2 - crossover cable Connection 3 - straight-through cable

    • E. 

      Connection 1 - crossover cable Connection 2 - straight-through cable Connection 3 - crossover cable

  • 3. 
    Which OSI layer does IP rely on to determine whether packets have been lost and to request retransmission?
    • A. 

      Application

    • B. 

      Presentation

    • C. 

      Session

    • D. 

      Transport

  • 4. 
    Refer to the exhibit. A technician is working on a network problem that requires verification of the router LAN interface. What address should be pinged from this host to confirm that the router interface Is operational?
    • A. 

      127.0.0.1

    • B. 

      192.168.64.196

    • C. 

      192.168.254.1

    • D. 

      192.168.254.9

    • E. 

      192.168.254.254

  • 5. 
    Refer to the exhibit. What function does router RT_A need to provide to allow Internet access for hosts in this network
    • A. 

      Address translation

    • B. 

      DHCP services

    • C. 

      Ftpd

    • D. 

      Web server

  • 6. 
    • A. 

      Issue the ip address command on interface FastEthernet 0/0

    • B. 

      Issue the no shutdown command on interface FastEthernet 0/1

    • C. 

      Issue the clock rate command on interface Serial 0/0/0

    • D. 

      Issue thedes cription command on interface Serial 0/0/1

  • 7. 
    • A. 

      Devices can be configured with a higher transmission priority

    • B. 

      A jam signal indicates that the collision has cleared and the media is not busy.

    • C. 

      A device listens and waits until the media is not busy before Transmitting.

    • D. 

      The device with the electronic token is the only one that can transmitafter a collision

    • E. 

      All of the devices on a segment see data that passes on the network medium.

    • F. 

      After detecting a collision, hosts can attempt to resume transmission after a random time delay has expired

  • 8. 
    Due to a security violation, the router passwords must be changed. What information can be learned from the following configuration entries? (Choose two.)
    • A. 

      Router(config)# line vty 0 3 Router(config

    • B. 

      Line)# password c13c0 Router(config-line)#login

    • C. 

      The entries specify three Telnet lines for remote access.

    • D. 

      The entries specify four Telnet lines for remote access.

    • E. 

      The entries set the console and Telnet password to “c13c0

    • F. 

      Telnet access will be denied because the Telnet configuration is incomplete.

    • G. 

      Access will be permitted for Telnet using “c13c0″ as the password.

  • 9. 
    Refer to the exhibit. A network administrator remotely accesses the CLI of RouterBfrom PC1. Which two statements are true about the application layer protocol that isused to make this connection? (Choose two.)
    • A. 

      The data is encrypted.

    • B. 

      The connection type is called a VTY session.

    • C. 

      A server process is running on PC1.

    • D. 

      A GET request is sent to RouterB.

    • E. 

      The application name is the same for the service, protocol, and client.

  • 10. 
    During the encapsulation process, which identifiers are added at the transport layer?
    • A. 

      Two networks routing the packets

    • B. 

      Two applications communicating the data

    • C. 

      Two hosts at either end of the communication

    • D. 

      Two nodes on the local network exchanging the frame

  • 11. 
    Refer to the exhibit. A student has wired each end of a CAT 5e cable as shown. What is the result? (Choose two.)
    • A. 

      The cable is unusable and must be rewired.

    • B. 

      The cable is suitable for use as a Gigabit Ethernet straight-through

    • C. 

      The cable is suitable for use as a Fast Ethernet crossover.

    • D. 

      The cable is suitable for use as a rollover cable.

    • E. 

      The cable is suitable for use as a Gigabit Ethernet crossover

    • F. 

      The cable is suitable for use between two 100 Mbps Auto-MDIX capable switches

  • 12. 
    Refer to the exhibit. What two facts can be determined from the information that is given? (Choose two.)
    • A. 

      The source port indicates that a Telnet session has been initiated.

    • B. 

      This exchange is part of the three-way handshake.

    • C. 

      The data is flowing from server to client.

    • D. 

      The destination port indicates that an HTTP session has been initiated.

    • E. 

      The data listed is associated with the transport layer.

    • F. 

      The source port does not support communication with the destination port that is listed

  • 13. 
    • A. 

      The entries specify three Telnet lines for remote access.

    • B. 

      The entries specify four Telnet lines for remote access.

    • C. 

      The entries set the console and Telnet password to "c13c0".

    • D. 

      Telnet access will be denied because the Telnet configuration is incomplete.

    • E. 

      Access will be permitted for Telnet using "c13c0" as the password.

  • 14. 
    Refer to the exhibit. A network administrator remotely accesses the CLI of RouterB from PC1 using Telnet. Which statement is true about this connection?
    • A. 

      The data is automatically encrypted.

    • B. 

      A Telnet server process is running on PC1.

    • C. 

      The connection is made through a VTY session on the router.

    • D. 

      A GET request was sent to RouterB to retrieve data during this session.

  • 15. 
    During the encapsulation process, which identifiers are added at the transport layer?
    • A. 

      Two networks routing the packets

    • B. 

      Two applications communicating the data

    • C. 

      Two hosts at either end of the communication

    • D. 

      Two nodes on the local network exchanging the frame

  • 16. 
    • A. 

      A single broadcast domain is present

    • B. 

      Two logical address ranges are required.

    • C. 

      Three broadcast domains are shown.

    • D. 

      Four networks are needed.

    • E. 

      Five collision domains exist.

  • 17. 
    What are three characteristics of CSMA/CD? (Choose three.)
    • A. 

      Devices can be configured with a higher transmission priority.

    • B. 

      A jam signal indicates that the collision has cleared and the media is not busy.

    • C. 

      A device listens and waits until the media is not busy before transmitting.

    • D. 

      The device with the electronic token is the only one that can transmit after a collision.

    • E. 

      All of the devices on a segment see data that passes on the network medium.

    • F. 

      After detecting a collision, hosts can attempt to resume transmission after a random time delay has expired.

  • 18. 
    Refer to the exhibit. While configuring a network, a technician wired each end of a Category 5e cable as shown. Which two statements are true about this setup? (Choose two.)
    • A. 

      The cable is suitable for connecting a switch to a router Ethernet port.

    • B. 

      The cable is suitable for connecting dissimilar types of devices.

    • C. 

      The cable is unusable and must be rewired.

    • D. 

      The cable is terminated in a way that the transmit pin is wired to the receive pin.

    • E. 

      The cable simulates a point-to-point WAN link.

  • 19. 
    Which topology divides the collision domain and provides full media bandwidth to the hosts in the network?
    • A. 

      Pic 1

    • B. 

      Pic 2

    • C. 

      Pic 3

    • D. 

      Pic 4

  • 20. 
    To make a server application accessible by clients, a network administrator wants to configure the port number that the application will use. From which range of numbers should the port number be assigned?
    • A. 

      0 to 255

    • B. 

      0 to 1023

    • C. 

      1024 to 49151

    • D. 

      49152 to 65535

  • 21. 
    Which configuration mode is used to set a password to authenticate users that are accessing and configuring the network device using Telnet connection?
    • A. 

      VTY line mode

    • B. 

      Interface mode

    • C. 

      Console line mode

    • D. 

      Global configuration mode

  • 22. 
    Which option shows how a router will route packets to a remote network?
    • A. 

      Pic 1

    • B. 

      Pic 2

    • C. 

      Pic 3

    • D. 

      Pic 4

  • 23. 
    A user sees the command prompt: Router(config-if)# . What task can be performed at this mode?
    • A. 

      Reload the device.

    • B. 

      Perform basic tests.

    • C. 

      Configure individual interfaces.

    • D. 

      Configure individual terminal lines.

  • 24. 
    Which option correctly identifies the interface or interfaces used to connect the router to a CSU/DSU for WAN connectivity?
    • A. 

      Pic 1

    • B. 

      Pic 2

    • C. 

      Pic 3

    • D. 

      Pic 4

  • 25. 
    To send data through a network, what two flags are used to establish a session? (Choose two.)
    • A. 

      ACK

    • B. 

      CRC

    • C. 

      SYN

    • D. 

      Ack #

    • E. 

      Port #

    • F. 

      Seq #

  • 26. 
    What happens when a node on an Ethernet network is creating a frame and it does not have the destination MAC address?
    • A. 

      The node drops the frame.

    • B. 

      The node sends out a Layer 3 broadcast message.

    • C. 

      The node sends a message directly to the router for the address.

    • D. 

      The node sends out an ARP request with the destination IP address.

  • 27. 
    Refer to the exhibit. Which two layers of the OSI model describe the same functions as the transport and internet layers of the TCP/model? (Choose two.)
    • A. 

      Application layer

    • B. 

      Presentation layer

    • C. 

      Session layer

    • D. 

      Transport layer

    • E. 

      Network layer

    • F. 

      Data link layer

    • G. 

      Physical layer

  • 28. 
    Which two types of media can provide bandwidth up to 1 Gb/s? (Choose two.)
    • A. 

      10 BASE-T

    • B. 

      100 BASE-T

    • C. 

      100 BASE-FX

    • D. 

      1000 BASE-TX

    • E. 

      1000 BASE-SX

  • 29. 
    Refer to the exhibit. All devices in the network use default configurations. How many broadcast domains are there in this topology?
    • A. 

      3

    • B. 

      5

    • C. 

      7

    • D. 

      9

    • E. 

      11

  • 30. 
    To enhance security in a network, the network administrator uses these commands:   Router(config)# line console 0 Router(config-line)# password j1mdi2 Router(config-line)# login   What two conclusions are evident from these commands? (Choose two.)
    • A. 

      Users who attempt to connect to the console port of the router must enter a password.

    • B. 

      The entries permit access through the console by the use of j1mdi2 as the password.

    • C. 

      The entries eliminate the need for authentication.

    • D. 

      Access through the console will be denied because the console configuration is incomplete.

    • E. 

      The entries prevent passwords from being displayed as plain text.

  • 31. 
    An administrator has made changes to a device. The changes did not have the desired effect. What can the administrator do to restore the configuration saved in NVRAM?
    • A. 

      Issue the erase flash command.

    • B. 

      Issue the reload command and respond no to the prompt that follows.

    • C. 

      Issue the erase start-up config command.

    • D. 

      Issue the copy running-config start-up config command.

  • 32. 
    What information can be gathered by using the command netstat?
    • A. 

      The default gateway

    • B. 

      The routing protocol

    • C. 

      Active TCP connections

    • D. 

      The locally configured subnet mask

  • 33. 
    Which service is used when the nslookup command is issued on a computer?
    • A. 

      FTP

    • B. 

      DNS

    • C. 

      DHCP

    • D. 

      Telnet

  • 34. 
    Refer to the exhibit. Which option correctly identifies the network address, range of host addresses, and the broadcast address for the network that contains host A? 
    • A. 

      Pic 1

    • B. 

      Pic 2

    • C. 

      Pic 3

    • D. 

      Pic 4

  • 35. 
    Which application belongs to the category of the client/server model?
    • A. 

      Using Telnet to access a router

    • B. 

      Exchanging information via instant messaging

    • C. 

      Printing a document to a locally connected printer

    • D. 

      Scanning a document with a directly connected scanner

  • 36. 
    Refer to the exhibit. Which Layer 2 protocol could be used inside nework A and network C?
    • A. 

      IP

    • B. 

      TCP

    • C. 

      UDP

    • D. 

      Ethernet

  • 37. 
    How can ARP be used to help document the network?
    • A. 

      It can list each hop on the way to a destination host.

    • B. 

      It can show the average latency of hosts on the network.

    • C. 

      It can provide a list of physical addresses on the network.

    • D. 

      It can indicate which hosts are not responding to network traffic.

  • 38. 
    In a network design project, a network designer needs to select a device to provide collision free connections to 40 hosts on the LAN. Which device should be selected?
    • A. 

      Hub

    • B. 

      Router

    • C. 

      Switch

    • D. 

      Firewall

  • 39. 
    What information is contained in the header of Layer 3 to help data delivery?
    • A. 

      Port number

    • B. 

      Device physical address

    • C. 

      Destination host logical address

    • D. 

      Virtual connection identifier

  • 40. 
    During the encapsulation process, what identifiers are added at the transport layer?
    • A. 

      Source and destination IP addresses

    • B. 

      Source and destination MAC addresses

    • C. 

      Source and destination port numbers

    • D. 

      Source and destination channel identifiers

  • 41. 
    Which statement is true about the ICMP protocol?
    • A. 

      It is an application layer protocol.

    • B. 

      It is designed to make IP a reliable protocol.

    • C. 

      It is often filtered out of networks for security purposes.

    • D. 

      If a host does not respond to an ICMP echo request, the host is not functioning.

  • 42. 
    Which physical component is used to access and perform the initial configuration on a new unconfigured router?
    • A. 

      Pic 1

    • B. 

      Pic 2

    • C. 

      Pic 3

    • D. 

      Pic 4

    • E. 

      Pic 5

  • 43. 
    What happens when a host station receives a frame that contains its own MAC address in the destination field?
    • A. 

      The Layer 2 information is removed and the frame is pushed up to Layer 3.

    • B. 

      The host station will copy the information to its buffers and send it back out.

    • C. 

      The frame originated from the host and will be ignored.

    • D. 

      The Layer 3 information is added to the frame.

  • 44. 
    • A. 

      192.168.88.0/26 main 192.168.88.32/26 branch 192.168.88.64/26 manufacturing 192.168.88.96/27 sales 192.168.88.128/28 research

    • B. 

      192.168.88.0/26 main 192.168.88.64/26 branch 192.168.88.128/27 manufacturing 192.168.88.160/28 sales 192.168.88.176/29 research

    • C. 

      192.168.88.0/27 main 192.168.88.32/27 branch 192.168.88.64/28 manufacturing 192.168.88.80/29 sales 192.168.88.88/30 research

    • D. 

      192.168.88.0/27 main 192.168.88.64/28 branch 192.168.88.80/28 manufacturing 192.168.88.96/29 sales 192.168.88.104/30 research