The Unbeatable Quiz On CCNA 1 Final Exam

44 Questions | Total Attempts: 2593

SettingsSettingsSettings
The Unbeatable Quiz On CCNA 1 Final Exam

Do you thing that you have a proper understanding of all the topics that you covered at CCNA level 1? If you said a big yes to this then take up the totally unbeatable quiz below for the final exam and prove you are a genius when it comes to computing.


Questions and Answers
  • 1. 
    • A. 

      IP

    • B. 

      UDP

    • C. 

      Ethernet

    • D. 

      A connectionless acknowledgement

    • E. 

      An upper-layer, connection-oriented protocol or service

  • 2. 
    Refer to the exhibit. Each media link is labeled. What type of cable should be used to connect the different devices?
    • A. 

      Connection 1 - rollover cable Connection 2 - straight-through cable Connection 3 - crossover cable

    • B. 

      Connection 1 - crossover cable Connection 2 - rollover cable Connection 3 - crossover cable

    • C. 

      Connection 1 - straight-through cable Connection 2 - crossover cable Connection 3 - crossover cable

    • D. 

      Connection 1 - straight-through cable Connection 2 - crossover cable Connection 3 - straight-through cable

    • E. 

      Connection 1 - crossover cable Connection 2 - straight-through cable Connection 3 - crossover cable

  • 3. 
    Which OSI layer does IP rely on to determine whether packets have been lost and to request retransmission?
    • A. 

      Application

    • B. 

      Presentation

    • C. 

      Session

    • D. 

      Transport

  • 4. 
    Refer to the exhibit. A technician is working on a network problem that requires verification of the router LAN interface. What address should be pinged from this host to confirm that the router interface Is operational?
    • A. 

      127.0.0.1

    • B. 

      192.168.64.196

    • C. 

      192.168.254.1

    • D. 

      192.168.254.9

    • E. 

      192.168.254.254

  • 5. 
    Refer to the exhibit. What function does router RT_A need to provide to allow Internet access for hosts in this network
    • A. 

      Address translation

    • B. 

      DHCP services

    • C. 

      Ftpd

    • D. 

      Web server

  • 6. 
    Refer to the exhibit. The network containing router B is experiencing problems. Anetwork associate has isolated the issue in this network to router B? What action canbe preformed to correct the network issue?
    • A. 

      Issue the ip address command on interface FastEthernet 0/0

    • B. 

      Issue the no shutdown command on interface FastEthernet 0/1

    • C. 

      Issue the clock rate command on interface Serial 0/0/0

    • D. 

      Issue thedes cription command on interface Serial 0/0/1

  • 7. 
    What are three characteristics of CSMA/CD? (Choose three.)
    • A. 

      Devices can be configured with a higher transmission priority

    • B. 

      A jam signal indicates that the collision has cleared and the media is not busy.

    • C. 

      A device listens and waits until the media is not busy before Transmitting.

    • D. 

      The device with the electronic token is the only one that can transmitafter a collision

    • E. 

      All of the devices on a segment see data that passes on the network medium.

    • F. 

      After detecting a collision, hosts can attempt to resume transmission after a random time delay has expired

  • 8. 
    Due to a security violation, the router passwords must be changed. What information can be learned from the following configuration entries? (Choose two.)
    • A. 

      Router(config)# line vty 0 3 Router(config

    • B. 

      Line)# password c13c0 Router(config-line)#login

    • C. 

      The entries specify three Telnet lines for remote access.

    • D. 

      The entries specify four Telnet lines for remote access.

    • E. 

      The entries set the console and Telnet password to “c13c0

    • F. 

      Telnet access will be denied because the Telnet configuration is incomplete.

    • G. 

      Access will be permitted for Telnet using “c13c0″ as the password.

  • 9. 
    Refer to the exhibit. A network administrator remotely accesses the CLI of RouterBfrom PC1. Which two statements are true about the application layer protocol that isused to make this connection? (Choose two.)
    • A. 

      The data is encrypted.

    • B. 

      The connection type is called a VTY session.

    • C. 

      A server process is running on PC1.

    • D. 

      A GET request is sent to RouterB.

    • E. 

      The application name is the same for the service, protocol, and client.

  • 10. 
    • A. 

      Two networks routing the packets

    • B. 

      Two applications communicating the data

    • C. 

      Two hosts at either end of the communication

    • D. 

      Two nodes on the local network exchanging the frame

  • 11. 
    Refer to the exhibit. A student has wired each end of a CAT 5e cable as shown. What is the result? (Choose two.)
    • A. 

      The cable is unusable and must be rewired.

    • B. 

      The cable is suitable for use as a Gigabit Ethernet straight-through

    • C. 

      The cable is suitable for use as a Fast Ethernet crossover.

    • D. 

      The cable is suitable for use as a rollover cable.

    • E. 

      The cable is suitable for use as a Gigabit Ethernet crossover

    • F. 

      The cable is suitable for use between two 100 Mbps Auto-MDIX capable switches

  • 12. 
    Refer to the exhibit. What two facts can be determined from the information that is given? (Choose two.)
    • A. 

      The source port indicates that a Telnet session has been initiated.

    • B. 

      This exchange is part of the three-way handshake.

    • C. 

      The data is flowing from server to client.

    • D. 

      The destination port indicates that an HTTP session has been initiated.

    • E. 

      The data listed is associated with the transport layer.

    • F. 

      The source port does not support communication with the destination port that is listed

  • 13. 
    Due to a security violation, the router passwords must be changed. What information can be learned from the following configuration entries? (Choose two.)   Router(config)# line vty 0 3 Router(config-line)# password c13c0 Router(config-line)# login
    • A. 

      The entries specify three Telnet lines for remote access.

    • B. 

      The entries specify four Telnet lines for remote access.

    • C. 

      The entries set the console and Telnet password to "c13c0".

    • D. 

      Telnet access will be denied because the Telnet configuration is incomplete.

    • E. 

      Access will be permitted for Telnet using "c13c0" as the password.

  • 14. 
    Refer to the exhibit. A network administrator remotely accesses the CLI of RouterB from PC1 using Telnet. Which statement is true about this connection?
    • A. 

      The data is automatically encrypted.

    • B. 

      A Telnet server process is running on PC1.

    • C. 

      The connection is made through a VTY session on the router.

    • D. 

      A GET request was sent to RouterB to retrieve data during this session.

  • 15. 
    During the encapsulation process, which identifiers are added at the transport layer?
    • A. 

      Two networks routing the packets

    • B. 

      Two applications communicating the data

    • C. 

      Two hosts at either end of the communication

    • D. 

      Two nodes on the local network exchanging the frame

  • 16. 
    • A. 

      A single broadcast domain is present

    • B. 

      Two logical address ranges are required.

    • C. 

      Three broadcast domains are shown.

    • D. 

      Four networks are needed.

    • E. 

      Five collision domains exist.

  • 17. 
    • A. 

      Devices can be configured with a higher transmission priority.

    • B. 

      A jam signal indicates that the collision has cleared and the media is not busy.

    • C. 

      A device listens and waits until the media is not busy before transmitting.

    • D. 

      The device with the electronic token is the only one that can transmit after a collision.

    • E. 

      All of the devices on a segment see data that passes on the network medium.

    • F. 

      After detecting a collision, hosts can attempt to resume transmission after a random time delay has expired.

  • 18. 
    Refer to the exhibit. While configuring a network, a technician wired each end of a Category 5e cable as shown. Which two statements are true about this setup? (Choose two.)
    • A. 

      The cable is suitable for connecting a switch to a router Ethernet port.

    • B. 

      The cable is suitable for connecting dissimilar types of devices.

    • C. 

      The cable is unusable and must be rewired.

    • D. 

      The cable is terminated in a way that the transmit pin is wired to the receive pin.

    • E. 

      The cable simulates a point-to-point WAN link.

  • 19. 
    Which topology divides the collision domain and provides full media bandwidth to the hosts in the network?
    • A. 

      Pic 1

    • B. 

      Pic 2

    • C. 

      Pic 3

    • D. 

      Pic 4

  • 20. 
    To make a server application accessible by clients, a network administrator wants to configure the port number that the application will use. From which range of numbers should the port number be assigned?
    • A. 

      0 to 255

    • B. 

      0 to 1023

    • C. 

      1024 to 49151

    • D. 

      49152 to 65535

  • 21. 
    Which configuration mode is used to set a password to authenticate users that are accessing and configuring the network device using Telnet connection?
    • A. 

      VTY line mode

    • B. 

      Interface mode

    • C. 

      Console line mode

    • D. 

      Global configuration mode

  • 22. 
    Which option shows how a router will route packets to a remote network?
    • A. 

      Pic 1

    • B. 

      Pic 2

    • C. 

      Pic 3

    • D. 

      Pic 4

  • 23. 
    A user sees the command prompt: Router(config-if)# . What task can be performed at this mode?
    • A. 

      Reload the device.

    • B. 

      Perform basic tests.

    • C. 

      Configure individual interfaces.

    • D. 

      Configure individual terminal lines.

  • 24. 
    Which option correctly identifies the interface or interfaces used to connect the router to a CSU/DSU for WAN connectivity?
    • A. 

      Pic 1

    • B. 

      Pic 2

    • C. 

      Pic 3

    • D. 

      Pic 4

  • 25. 
    To send data through a network, what two flags are used to establish a session? (Choose two.)
    • A. 

      ACK

    • B. 

      CRC

    • C. 

      SYN

    • D. 

      Ack #

    • E. 

      Port #

    • F. 

      Seq #