The Unbeatable Quiz On CCNA 1 Final Exam

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Erinia
E
Erinia
Community Contributor
Quizzes Created: 1 | Total Attempts: 4,041
Questions: 44 | Attempts: 4,041

SettingsSettingsSettings
The Unbeatable Quiz On CCNA 1 Final Exam - Quiz

Do you thing that you have a proper understanding of all the topics that you covered at CCNA level 1? If you said a big yes to this then take up the totally unbeatable quiz below for the final exam and prove you are a genius when it comes to computing.


Questions and Answers
  • 1. 

    When connectionless protocols are implemented at the lower layers of the OSI model, what is usually used to acknowledge that the data was received and to request the retransmission of missing data?

    • A.

      IP

    • B.

      UDP

    • C.

      Ethernet

    • D.

      A connectionless acknowledgement

    • E.

      An upper-layer, connection-oriented protocol or service

    Correct Answer
    E. An upper-layer, connection-oriented protocol or service
    Explanation
    When connectionless protocols are implemented at the lower layers of the OSI model, an upper-layer, connection-oriented protocol or service is usually used to acknowledge that the data was received and to request the retransmission of missing data. This is because connectionless protocols do not provide any guarantee of delivery or sequencing of data, so a higher-layer protocol or service is needed to handle these functions.

    Rate this question:

  • 2. 

    Refer to the exhibit. Each media link is labeled. What type of cable should be used to connect the different devices?

    • A.

      Connection 1 - rollover cable Connection 2 - straight-through cable Connection 3 - crossover cable

    • B.

      Connection 1 - crossover cable Connection 2 - rollover cable Connection 3 - crossover cable

    • C.

      Connection 1 - straight-through cable Connection 2 - crossover cable Connection 3 - crossover cable

    • D.

      Connection 1 - straight-through cable Connection 2 - crossover cable Connection 3 - straight-through cable

    • E.

      Connection 1 - crossover cable Connection 2 - straight-through cable Connection 3 - crossover cable

    Correct Answer
    D. Connection 1 - straight-through cable Connection 2 - crossover cable Connection 3 - straight-through cable
    Explanation
    The exhibit shows three connections labeled as Connection 1, Connection 2, and Connection 3. To connect the different devices, a straight-through cable should be used for Connection 1, a crossover cable should be used for Connection 2, and a straight-through cable should be used for Connection 3.

    Rate this question:

  • 3. 

    Which OSI layer does IP rely on to determine whether packets have been lost and to request retransmission?

    • A.

      Application

    • B.

      Presentation

    • C.

      Session

    • D.

      Transport

    Correct Answer
    D. Transport
    Explanation
    IP relies on the transport layer to determine whether packets have been lost and to request retransmission. The transport layer protocols, such as TCP, provide reliable delivery of data by implementing mechanisms like acknowledgment and retransmission. These mechanisms allow IP to detect if packets have been lost during transmission and request the sender to retransmit them. Therefore, the transport layer plays a crucial role in ensuring the reliable delivery of packets in the IP network.

    Rate this question:

  • 4. 

    Refer to the exhibit. A technician is working on a network problem that requires verification of the router LAN interface. What address should be pinged from this host to confirm that the router interface Is operational?

    • A.

      127.0.0.1

    • B.

      192.168.64.196

    • C.

      192.168.254.1

    • D.

      192.168.254.9

    • E.

      192.168.254.254

    Correct Answer
    C. 192.168.254.1
    Explanation
    The correct answer is 192.168.254.1. This address should be pinged from the host to confirm that the router interface is operational.

    Rate this question:

  • 5. 

    Refer to the exhibit. What function does router RT_A need to provide to allow Internet access for hosts in this network

    • A.

      Address translation

    • B.

      DHCP services

    • C.

      Ftpd

    • D.

      Web server

    Correct Answer
    A. Address translation
    Explanation
    Router RT_A needs to provide address translation in order to allow Internet access for hosts in this network. Address translation, also known as Network Address Translation (NAT), is a process that allows multiple devices in a network to share a single public IP address. This allows the hosts in the network to communicate with the Internet using private IP addresses, while the router translates these private IP addresses to the public IP address when sending and receiving data.

    Rate this question:

  • 6. 

    Refer to the exhibit. The network containing router B is experiencing problems. Anetwork associate has isolated the issue in this network to router B? What action canbe preformed to correct the network issue?

    • A.

      Issue the ip address command on interface FastEthernet 0/0

    • B.

      Issue the no shutdown command on interface FastEthernet 0/1

    • C.

      Issue the clock rate command on interface Serial 0/0/0

    • D.

      Issue thedes cription command on interface Serial 0/0/1

    Correct Answer
    B. Issue the no shutdown command on interface FastEthernet 0/1
    Explanation
    The network issue can be corrected by issuing the "no shutdown" command on interface FastEthernet 0/1. This command will enable the interface and bring it up, allowing traffic to flow through router B.

    Rate this question:

  • 7. 

    What are three characteristics of CSMA/CD? (Choose three.)

    • A.

      Devices can be configured with a higher transmission priority

    • B.

      A jam signal indicates that the collision has cleared and the media is not busy.

    • C.

      A device listens and waits until the media is not busy before Transmitting.

    • D.

      The device with the electronic token is the only one that can transmitafter a collision

    • E.

      All of the devices on a segment see data that passes on the network medium.

    • F.

      After detecting a collision, hosts can attempt to resume transmission after a random time delay has expired

    Correct Answer(s)
    C. A device listens and waits until the media is not busy before Transmitting.
    E. All of the devices on a segment see data that passes on the network medium.
    F. After detecting a collision, hosts can attempt to resume transmission after a random time delay has expired
    Explanation
    CSMA/CD (Carrier Sense Multiple Access with Collision Detection) is a protocol used in Ethernet networks. The three characteristics of CSMA/CD are:
    1) A device listens and waits until the media is not busy before transmitting. This ensures that there are no collisions on the network.
    2) All devices on a segment see data that passes on the network medium. This means that all devices can access and receive the data transmitted on the network.
    3) After detecting a collision, hosts can attempt to resume transmission after a random time delay has expired. This allows the devices to retransmit their data in a more organized manner, reducing the chances of future collisions.

    Rate this question:

  • 8. 

    Due to a security violation, the router passwords must be changed. What information can be learned from the following configuration entries? (Choose two.)

    • A.

      Router(config)# line vty 0 3 Router(config

    • B.

      Line)# password c13c0 Router(config-line)#login

    • C.

      The entries specify three Telnet lines for remote access.

    • D.

      The entries specify four Telnet lines for remote access.

    • E.

      The entries set the console and Telnet password to “c13c0

    • F.

      Telnet access will be denied because the Telnet configuration is incomplete.

    • G.

      Access will be permitted for Telnet using “c13c0″ as the password.

    Correct Answer(s)
    D. The entries specify four Telnet lines for remote access.
    G. Access will be permitted for Telnet using “c13c0″ as the password.
    Explanation
    The given configuration entries specify four Telnet lines for remote access. This can be inferred from the line "Router(config)# line vty 0 3", which indicates that there are four virtual terminal lines (vty 0, vty 1, vty 2, and vty 3) for Telnet access. Additionally, the entry "Router(config-line)# password c13c0" sets the password for these Telnet lines to "c13c0", indicating that access will be permitted using this password.

    Rate this question:

  • 9. 

    Refer to the exhibit. A network administrator remotely accesses the CLI of RouterBfrom PC1. Which two statements are true about the application layer protocol that isused to make this connection? (Choose two.)

    • A.

      The data is encrypted.

    • B.

      The connection type is called a VTY session.

    • C.

      A server process is running on PC1.

    • D.

      A GET request is sent to RouterB.

    • E.

      The application name is the same for the service, protocol, and client.

    Correct Answer(s)
    B. The connection type is called a VTY session.
    E. The application name is the same for the service, protocol, and client.
    Explanation
    The connection type is called a VTY session because the network administrator is accessing the router remotely using the Virtual Terminal (VTY) lines. The application name is the same for the service, protocol, and client because the network administrator is using the Command Line Interface (CLI) to access the router.

    Rate this question:

  • 10. 

    During the encapsulation process, which identifiers are added at the transport layer?

    • A.

      Two networks routing the packets

    • B.

      Two applications communicating the data

    • C.

      Two hosts at either end of the communication

    • D.

      Two nodes on the local network exchanging the frame

    Correct Answer
    B. Two applications communicating the data
    Explanation
    During the encapsulation process at the transport layer, the identifiers that are added are related to the two applications communicating the data. These identifiers help in establishing a connection between the sender and receiver applications, ensuring that the correct data is sent and received. The transport layer protocols, such as TCP or UDP, add these identifiers to the data packets before they are sent over the network. This allows for reliable and efficient communication between the applications.

    Rate this question:

  • 11. 

    Refer to the exhibit. A student has wired each end of a CAT 5e cable as shown. What is the result? (Choose two.)

    • A.

      The cable is unusable and must be rewired.

    • B.

      The cable is suitable for use as a Gigabit Ethernet straight-through

    • C.

      The cable is suitable for use as a Fast Ethernet crossover.

    • D.

      The cable is suitable for use as a rollover cable.

    • E.

      The cable is suitable for use as a Gigabit Ethernet crossover

    • F.

      The cable is suitable for use between two 100 Mbps Auto-MDIX capable switches

    Correct Answer(s)
    C. The cable is suitable for use as a Fast Ethernet crossover.
    F. The cable is suitable for use between two 100 Mbps Auto-MDIX capable switches
    Explanation
    The given wiring configuration shows that the cable is wired as a crossover cable, which means that it can be used for connecting two devices of the same type (e.g., two computers) directly without the need for a switch or hub. This makes it suitable for use as a Fast Ethernet crossover. Additionally, the cable is also suitable for use between two 100 Mbps Auto-MDIX capable switches, as these switches have the capability to automatically detect and adjust the wiring configuration. Therefore, the cable can be used for both of these purposes.

    Rate this question:

  • 12. 

    Refer to the exhibit. What two facts can be determined from the information that is given? (Choose two.)

    • A.

      The source port indicates that a Telnet session has been initiated.

    • B.

      This exchange is part of the three-way handshake.

    • C.

      The data is flowing from server to client.

    • D.

      The destination port indicates that an HTTP session has been initiated.

    • E.

      The data listed is associated with the transport layer.

    • F.

      The source port does not support communication with the destination port that is listed

    Correct Answer(s)
    D. The destination port indicates that an HTTP session has been initiated.
    E. The data listed is associated with the transport layer.
    Explanation
    From the information given, it can be determined that the destination port indicates that an HTTP session has been initiated. Additionally, the data listed is associated with the transport layer.

    Rate this question:

  • 13. 

    Due to a security violation, the router passwords must be changed. What information can be learned from the following configuration entries? (Choose two.)   Router(config)# line vty 0 3 Router(config-line)# password c13c0 Router(config-line)# login

    • A.

      The entries specify three Telnet lines for remote access.

    • B.

      The entries specify four Telnet lines for remote access.

    • C.

      The entries set the console and Telnet password to "c13c0".

    • D.

      Telnet access will be denied because the Telnet configuration is incomplete.

    • E.

      Access will be permitted for Telnet using "c13c0" as the password.

    Correct Answer(s)
    B. The entries specify four Telnet lines for remote access.
    E. Access will be permitted for Telnet using "c13c0" as the password.
    Explanation
    The configuration entries "Router(config)# line vty 0 3" and "Router(config-line)# password c13c0" indicate that there are four Telnet lines (vty 0, vty 1, vty 2, and vty 3) specified for remote access. The entry "Router(config-line)# login" indicates that access will be permitted for Telnet using the password "c13c0". Therefore, the correct answers are: The entries specify four Telnet lines for remote access, and Access will be permitted for Telnet using "c13c0" as the password.

    Rate this question:

  • 14. 

    Refer to the exhibit. A network administrator remotely accesses the CLI of RouterB from PC1 using Telnet. Which statement is true about this connection?

    • A.

      The data is automatically encrypted.

    • B.

      A Telnet server process is running on PC1.

    • C.

      The connection is made through a VTY session on the router.

    • D.

      A GET request was sent to RouterB to retrieve data during this session.

    Correct Answer
    C. The connection is made through a VTY session on the router.
    Explanation
    The correct answer is that the connection is made through a VTY session on the router. This means that the network administrator is accessing the router remotely using the Virtual Terminal (VTY) lines. Telnet is a protocol used to establish remote connections, but it does not automatically encrypt data. The statement about a Telnet server process running on PC1 is not mentioned in the exhibit, so it cannot be determined. There is no information provided about a GET request being sent to RouterB during this session.

    Rate this question:

  • 15. 

    During the encapsulation process, which identifiers are added at the transport layer?

    • A.

      Two networks routing the packets

    • B.

      Two applications communicating the data

    • C.

      Two hosts at either end of the communication

    • D.

      Two nodes on the local network exchanging the frame

    Correct Answer
    B. Two applications communicating the data
    Explanation
    During the encapsulation process at the transport layer, the identifiers that are added are those of the two applications that are communicating the data. The transport layer is responsible for establishing a connection between two applications and ensuring reliable and error-free transmission of data between them. Therefore, the identifiers of these two applications are added during encapsulation to facilitate the proper delivery of the data.

    Rate this question:

  • 16. 

    Refer to the exhibit. What two facts can be determined about the exhibited topology? (Choose two.)

    • A.

      A single broadcast domain is present

    • B.

      Two logical address ranges are required.

    • C.

      Three broadcast domains are shown.

    • D.

      Four networks are needed.

    • E.

      Five collision domains exist.

    Correct Answer(s)
    A. A single broadcast domain is present
    E. Five collision domains exist.
    Explanation
    Based on the exhibit, we can determine that a single broadcast domain is present because all devices in the topology are connected to a single switch, which means they share the same broadcast domain. Additionally, we can determine that five collision domains exist because there are five separate physical segments or links in the topology, each of which represents a separate collision domain.

    Rate this question:

  • 17. 

    What are three characteristics of CSMA/CD? (Choose three.)

    • A.

      Devices can be configured with a higher transmission priority.

    • B.

      A jam signal indicates that the collision has cleared and the media is not busy.

    • C.

      A device listens and waits until the media is not busy before transmitting.

    • D.

      The device with the electronic token is the only one that can transmit after a collision.

    • E.

      All of the devices on a segment see data that passes on the network medium.

    • F.

      After detecting a collision, hosts can attempt to resume transmission after a random time delay has expired.

    Correct Answer(s)
    C. A device listens and waits until the media is not busy before transmitting.
    E. All of the devices on a segment see data that passes on the network medium.
    F. After detecting a collision, hosts can attempt to resume transmission after a random time delay has expired.
    Explanation
    CSMA/CD (Carrier Sense Multiple Access with Collision Detection) is a protocol used in Ethernet networks. Three characteristics of CSMA/CD are:
    1. A device listens and waits until the media is not busy before transmitting. This ensures that there is no collision with other devices already transmitting on the network.
    2. All devices on a segment see data that passes on the network medium. This means that all devices can access and receive the data transmitted on the network.
    3. After detecting a collision, hosts can attempt to resume transmission after a random time delay has expired. This random delay helps to prevent repeated collisions and allows devices to reattempt transmission in a more orderly manner.

    Rate this question:

  • 18. 

    Refer to the exhibit. While configuring a network, a technician wired each end of a Category 5e cable as shown. Which two statements are true about this setup? (Choose two.)

    • A.

      The cable is suitable for connecting a switch to a router Ethernet port.

    • B.

      The cable is suitable for connecting dissimilar types of devices.

    • C.

      The cable is unusable and must be rewired.

    • D.

      The cable is terminated in a way that the transmit pin is wired to the receive pin.

    • E.

      The cable simulates a point-to-point WAN link.

    Correct Answer(s)
    A. The cable is suitable for connecting a switch to a router Ethernet port.
    B. The cable is suitable for connecting dissimilar types of devices.
    Explanation
    The given correct answers are:
    1. The cable is suitable for connecting a switch to a router Ethernet port.
    2. The cable is suitable for connecting dissimilar types of devices.


    Based on the exhibit, the cable is wired using the T568B standard, which is commonly used for Ethernet connections. This standard ensures that the transmit pin on one end is connected to the receive pin on the other end, allowing for proper communication between devices. Therefore, the cable is suitable for connecting a switch to a router Ethernet port. Additionally, the cable can also be used to connect dissimilar types of devices, such as a computer to a printer or a computer to a switch.

    Rate this question:

  • 19. 

    Which topology divides the collision domain and provides full media bandwidth to the hosts in the network?

    • A.

      Pic 1

    • B.

      Pic 2

    • C.

      Pic 3

    • D.

      Pic 4

    Correct Answer
    C. Pic 3
    Explanation
    Pic 3 likely represents a star topology. In a star topology, each host is connected directly to a central device, such as a switch or hub. This central device acts as a point of connection and communication for all the hosts in the network. This arrangement allows for the division of the collision domain, as each host has its own dedicated connection to the central device. Additionally, since each host has its own connection, the full media bandwidth is available to each host, ensuring efficient and reliable communication.

    Rate this question:

  • 20. 

    To make a server application accessible by clients, a network administrator wants to configure the port number that the application will use. From which range of numbers should the port number be assigned?

    • A.

      0 to 255

    • B.

      0 to 1023

    • C.

      1024 to 49151

    • D.

      49152 to 65535

    Correct Answer
    D. 49152 to 65535
    Explanation
    Port numbers are used to identify specific processes or services running on a server. The range of port numbers from 49152 to 65535 is known as the "dynamic" or "private" port range. These port numbers are typically used by client applications for temporary connections to servers. Assigning the server application a port number from this range ensures that it does not conflict with well-known ports (0 to 1023) or registered ports (1024 to 49151) which are commonly used by standard services.

    Rate this question:

  • 21. 

    Which configuration mode is used to set a password to authenticate users that are accessing and configuring the network device using Telnet connection?

    • A.

      VTY line mode

    • B.

      Interface mode

    • C.

      Console line mode

    • D.

      Global configuration mode

    Correct Answer
    A. VTY line mode
    Explanation
    VTY line mode is used to set a password to authenticate users that are accessing and configuring the network device using Telnet connection. In VTY line mode, administrators can configure password authentication and other security measures to control access to the device via Telnet. This mode allows administrators to configure multiple virtual terminal lines for remote access, and setting a password in this mode ensures that only authorized users can access and configure the network device through a Telnet connection.

    Rate this question:

  • 22. 

    Which option shows how a router will route packets to a remote network?

    • A.

      Pic 1

    • B.

      Pic 2

    • C.

      Pic 3

    • D.

      Pic 4

    Correct Answer
    D. Pic 4
  • 23. 

    A user sees the command prompt: Router(config-if)# . What task can be performed at this mode?

    • A.

      Reload the device.

    • B.

      Perform basic tests.

    • C.

      Configure individual interfaces.

    • D.

      Configure individual terminal lines.

    Correct Answer
    C. Configure individual interfaces.
    Explanation
    At the Router(config-if)# mode, a user can configure individual interfaces. This mode allows the user to make specific configurations and settings for a particular interface on the router. It is used to define parameters such as IP address, subnet mask, and other interface-specific settings.

    Rate this question:

  • 24. 

    Which option correctly identifies the interface or interfaces used to connect the router to a CSU/DSU for WAN connectivity?

    • A.

      Pic 1

    • B.

      Pic 2

    • C.

      Pic 3

    • D.

      Pic 4

    Correct Answer
    D. Pic 4
  • 25. 

    To send data through a network, what two flags are used to establish a session? (Choose two.)

    • A.

      ACK

    • B.

      CRC

    • C.

      SYN

    • D.

      Ack #

    • E.

      Port #

    • F.

      Seq #

    Correct Answer(s)
    A. ACK
    C. SYN
    Explanation
    To establish a session and send data through a network, two flags are used: ACK and SYN. ACK stands for acknowledgment and is used to confirm the receipt of data. SYN stands for synchronization and is used to initiate a connection between two devices. By using these two flags, a session can be established and data can be successfully transmitted over the network.

    Rate this question:

  • 26. 

    What happens when a node on an Ethernet network is creating a frame and it does not have the destination MAC address?

    • A.

      The node drops the frame.

    • B.

      The node sends out a Layer 3 broadcast message.

    • C.

      The node sends a message directly to the router for the address.

    • D.

      The node sends out an ARP request with the destination IP address.

    Correct Answer
    D. The node sends out an ARP request with the destination IP address.
    Explanation
    When a node on an Ethernet network is creating a frame and it does not have the destination MAC address, it sends out an ARP request with the destination IP address. This is because the node needs to determine the MAC address of the device with the corresponding IP address in order to successfully deliver the frame. The ARP request is a broadcast message that allows the node to obtain the MAC address, ensuring the frame can be properly sent to the intended destination.

    Rate this question:

  • 27. 

    Refer to the exhibit. Which two layers of the OSI model describe the same functions as the transport and internet layers of the TCP/model? (Choose two.)

    • A.

      Application layer

    • B.

      Presentation layer

    • C.

      Session layer

    • D.

      Transport layer

    • E.

      Network layer

    • F.

      Data link layer

    • G.

      Physical layer

    Correct Answer(s)
    D. Transport layer
    E. Network layer
    Explanation
    The transport layer of the OSI model is responsible for providing reliable and error-free communication between two hosts. Similarly, the internet layer of the TCP/IP model is responsible for routing packets across different networks. Both layers handle the transportation of data, ensuring its delivery and managing the addressing and routing of packets. Therefore, the transport layer and network layer of the OSI model perform the same functions as the transport and internet layers of the TCP/IP model.

    Rate this question:

  • 28. 

    Which two types of media can provide bandwidth up to 1 Gb/s? (Choose two.)

    • A.

      10 BASE-T

    • B.

      100 BASE-T

    • C.

      100 BASE-FX

    • D.

      1000 BASE-TX

    • E.

      1000 BASE-SX

    Correct Answer(s)
    D. 1000 BASE-TX
    E. 1000 BASE-SX
    Explanation
    The 1000 BASE-TX and 1000 BASE-SX media types can provide bandwidth up to 1 Gb/s. 10 BASE-T and 100 BASE-T media types provide lower bandwidths, while 100 BASE-FX provides a maximum bandwidth of 100 Mb/s.

    Rate this question:

  • 29. 

    Refer to the exhibit. All devices in the network use default configurations. How many broadcast domains are there in this topology?

    • A.

      3

    • B.

      5

    • C.

      7

    • D.

      9

    • E.

      11

    Correct Answer
    B. 5
    Explanation
    In the given exhibit, there are five broadcast domains in the topology. A broadcast domain is a logical division of a computer network in which all devices can reach each other by broadcast at the data link layer. In this topology, each switch represents a separate broadcast domain, and there are five switches present. Therefore, the correct answer is 5.

    Rate this question:

  • 30. 

    To enhance security in a network, the network administrator uses these commands:   Router(config)# line console 0 Router(config-line)# password j1mdi2 Router(config-line)# login   What two conclusions are evident from these commands? (Choose two.)

    • A.

      Users who attempt to connect to the console port of the router must enter a password.

    • B.

      The entries permit access through the console by the use of j1mdi2 as the password.

    • C.

      The entries eliminate the need for authentication.

    • D.

      Access through the console will be denied because the console configuration is incomplete.

    • E.

      The entries prevent passwords from being displayed as plain text.

    Correct Answer(s)
    A. Users who attempt to connect to the console port of the router must enter a password.
    B. The entries permit access through the console by the use of j1mdi2 as the password.
    Explanation
    The first conclusion is that users who attempt to connect to the console port of the router must enter a password. This is evident from the command "password j1mdi2" which sets the password for the console line.

    The second conclusion is that the entries permit access through the console by the use of "j1mdi2" as the password. This is evident from the command "login" which enables login authentication for the console line and uses the previously set password for authentication.

    Rate this question:

  • 31. 

    An administrator has made changes to a device. The changes did not have the desired effect. What can the administrator do to restore the configuration saved in NVRAM?

    • A.

      Issue the erase flash command.

    • B.

      Issue the reload command and respond no to the prompt that follows.

    • C.

      Issue the erase start-up config command.

    • D.

      Issue the copy running-config start-up config command.

    Correct Answer
    C. Issue the erase start-up config command.
    Explanation
    The correct answer is to issue the "erase start-up config" command. This command will delete the startup configuration file stored in NVRAM, which contains the saved configuration. By erasing this file, the administrator can restore the device to its default configuration, effectively reverting any changes that were made.

    Rate this question:

  • 32. 

    What information can be gathered by using the command netstat?

    • A.

      The default gateway

    • B.

      The routing protocol

    • C.

      Active TCP connections

    • D.

      The locally configured subnet mask

    Correct Answer
    C. Active TCP connections
    Explanation
    The command netstat allows users to gather information about active TCP connections. By using this command, users can view details such as the local and foreign addresses, state of the connection, and the process ID associated with each connection. This information can be useful for troubleshooting network connectivity issues, monitoring network activity, and identifying any unauthorized or suspicious connections.

    Rate this question:

  • 33. 

    Which service is used when the nslookup command is issued on a computer?

    • A.

      FTP

    • B.

      DNS

    • C.

      DHCP

    • D.

      Telnet

    Correct Answer
    B. DNS
    Explanation
    When the nslookup command is issued on a computer, it is used to query the DNS (Domain Name System) service. DNS is responsible for translating domain names into IP addresses, allowing computers to locate and connect to specific websites or services on the internet. By using the nslookup command, users can retrieve information about a specific domain name, such as its IP address, hostname, or other DNS records.

    Rate this question:

  • 34. 

    Refer to the exhibit. Which option correctly identifies the network address, range of host addresses, and the broadcast address for the network that contains host A? 

    • A.

      Pic 1

    • B.

      Pic 2

    • C.

      Pic 3

    • D.

      Pic 4

    Correct Answer
    C. Pic 3
  • 35. 

    Which application belongs to the category of the client/server model?

    • A.

      Using Telnet to access a router

    • B.

      Exchanging information via instant messaging

    • C.

      Printing a document to a locally connected printer

    • D.

      Scanning a document with a directly connected scanner

    Correct Answer
    A. Using Telnet to access a router
    Explanation
    Using Telnet to access a router belongs to the category of the client/server model because Telnet is a client/server protocol. In this scenario, the router acts as the server, providing access to its resources and services, while the device running Telnet (client) connects to the router to send commands and retrieve information. This follows the client/server model where the client requests services from the server.

    Rate this question:

  • 36. 

    Refer to the exhibit. Which Layer 2 protocol could be used inside nework A and network C?

    • A.

      IP

    • B.

      TCP

    • C.

      UDP

    • D.

      Ethernet

    Correct Answer
    D. Ethernet
    Explanation
    Ethernet is the correct answer because it is a Layer 2 protocol that is commonly used for local area networks (LANs). It provides the means for devices within the same network to communicate with each other by defining how data is transmitted over the physical network. In this case, both network A and network C are local networks, so Ethernet would be the appropriate Layer 2 protocol to use for communication between devices within each network.

    Rate this question:

  • 37. 

    How can ARP be used to help document the network?

    • A.

      It can list each hop on the way to a destination host.

    • B.

      It can show the average latency of hosts on the network.

    • C.

      It can provide a list of physical addresses on the network.

    • D.

      It can indicate which hosts are not responding to network traffic.

    Correct Answer
    C. It can provide a list of physical addresses on the network.
    Explanation
    ARP (Address Resolution Protocol) can be used to help document the network by providing a list of physical addresses on the network. ARP is responsible for mapping IP addresses to MAC addresses, which are the physical addresses of devices on a network. By using ARP, one can gather a comprehensive list of the physical addresses of all the devices connected to the network, which can be useful for network documentation purposes.

    Rate this question:

  • 38. 

    In a network design project, a network designer needs to select a device to provide collision free connections to 40 hosts on the LAN. Which device should be selected?

    • A.

      Hub

    • B.

      Router

    • C.

      Switch

    • D.

      Firewall

    Correct Answer
    C. Switch
    Explanation
    A switch should be selected to provide collision-free connections to 40 hosts on the LAN. Unlike a hub, which broadcasts data to all connected devices, a switch creates a dedicated connection between the sender and receiver, reducing collisions and improving network performance. A router is used to connect multiple networks, while a firewall is used for network security purposes. Therefore, a switch is the most suitable device for this scenario.

    Rate this question:

  • 39. 

    What information is contained in the header of Layer 3 to help data delivery?

    • A.

      Port number

    • B.

      Device physical address

    • C.

      Destination host logical address

    • D.

      Virtual connection identifier

    Correct Answer
    C. Destination host logical address
    Explanation
    The header of Layer 3 contains the destination host logical address. This address helps in data delivery by specifying the logical address of the intended recipient of the data. By including this information in the header, Layer 3 can ensure that the data is correctly routed to the destination host.

    Rate this question:

  • 40. 

    During the encapsulation process, what identifiers are added at the transport layer?

    • A.

      Source and destination IP addresses

    • B.

      Source and destination MAC addresses

    • C.

      Source and destination port numbers

    • D.

      Source and destination channel identifiers

    Correct Answer
    C. Source and destination port numbers
    Explanation
    During the encapsulation process at the transport layer, source and destination port numbers are added as identifiers. Port numbers are used to differentiate between different applications or services running on a device. They allow the transport layer to multiplex and demultiplex data packets, ensuring that the correct data is delivered to the correct application or service on the receiving device.

    Rate this question:

  • 41. 

    Which statement is true about the ICMP protocol?

    • A.

      It is an application layer protocol.

    • B.

      It is designed to make IP a reliable protocol.

    • C.

      It is often filtered out of networks for security purposes.

    • D.

      If a host does not respond to an ICMP echo request, the host is not functioning.

    Correct Answer
    C. It is often filtered out of networks for security purposes.
    Explanation
    ICMP (Internet Control Message Protocol) is often filtered in networks for security to prevent potential abuse like ICMP-based attacks. Filtering ICMP can enhance network security by limiting information exposure and reducing the risk of certain attacks that may exploit ICMP. However, some ICMP messages, like echo requests and replies, are essential for network troubleshooting. Striking a balance in ICMP filtering is crucial for maintaining network functionality while mitigating security risks.

    Rate this question:

  • 42. 

    Which physical component is used to access and perform the initial configuration on a new unconfigured router?

    • A.

      Pic 1

    • B.

      Pic 2

    • C.

      Pic 3

    • D.

      Pic 4

    • E.

      Pic 5

    Correct Answer
    B. Pic 2
  • 43. 

    What happens when a host station receives a frame that contains its own MAC address in the destination field?

    • A.

      The Layer 2 information is removed and the frame is pushed up to Layer 3.

    • B.

      The host station will copy the information to its buffers and send it back out.

    • C.

      The frame originated from the host and will be ignored.

    • D.

      The Layer 3 information is added to the frame.

    Correct Answer
    A. The Layer 2 information is removed and the frame is pushed up to Layer 3.
    Explanation
    When a host station receives a frame that contains its own MAC address in the destination field, the Layer 2 information is removed and the frame is pushed up to Layer 3. This means that the host station will process the frame at the network layer, where it will be further analyzed and forwarded to the appropriate destination based on the Layer 3 information.

    Rate this question:

  • 44. 

    A network administrator is asked to design a new addressing scheme for a corporate network. There are 60 users in the main office, users in the branch office, 28 users in manufacturing, 12 in the sales office, and 4 users in the research office. Which VLSM addressing scheme that uses the 192.168.88.0/24 network will fulfill the requirements while wasting the fewest addresses?

    • A.

      192.168.88.0/26 main 192.168.88.32/26 branch 192.168.88.64/26 manufacturing 192.168.88.96/27 sales 192.168.88.128/28 research

    • B.

      192.168.88.0/26 main 192.168.88.64/26 branch 192.168.88.128/27 manufacturing 192.168.88.160/28 sales 192.168.88.176/29 research

    • C.

      192.168.88.0/27 main 192.168.88.32/27 branch 192.168.88.64/28 manufacturing 192.168.88.80/29 sales 192.168.88.88/30 research

    • D.

      192.168.88.0/27 main 192.168.88.64/28 branch 192.168.88.80/28 manufacturing 192.168.88.96/29 sales 192.168.88.104/30 research

    Correct Answer
    B. 192.168.88.0/26 main 192.168.88.64/26 branch 192.168.88.128/27 manufacturing 192.168.88.160/28 sales 192.168.88.176/29 research
    Explanation
    The given VLSM addressing scheme uses subnet masks of different lengths to allocate IP addresses to different network segments. By using a /26 subnet mask for the main office, a total of 64 IP addresses can be assigned, which is sufficient for the 60 users in the main office. Similarly, the branch office is allocated a /26 subnet mask, providing 64 IP addresses for the users in that office. The manufacturing office is allocated a /27 subnet mask, which provides 32 IP addresses, enough for the 28 users in that office. The sales office is allocated a /28 subnet mask, providing 16 IP addresses for the 12 users in that office. Lastly, the research office is allocated a /29 subnet mask, which provides 8 IP addresses for the 4 users in that office. This addressing scheme efficiently allocates IP addresses while minimizing wastage.

    Rate this question:

Related Topics

Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.