CCNA Final Exam 1

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Lazda1993
L
Lazda1993
Community Contributor
Quizzes Created: 1 | Total Attempts: 180
Questions: 50 | Attempts: 180

SettingsSettingsSettings
CCNA Quizzes & Trivia

1. TesTs gi gi gi


Questions and Answers
  • 1. 

    Which of the following are the address ranges of the private IP addresses? (Choose three.)

    • A.

      10.0.0.0 to 10.255.255.255

    • B.

      200.100.50.0 to 200.100.25.255

    • C.

      150.150.0.0 to 150.150.255.255

    • D.

      172.16.0.0 to 172.31.255.255

    • E.

      192.168.0.0 to 192.168.255.255

    • F.

      127.16.0.0 to 127.31.255.255

    Correct Answer(s)
    A. 10.0.0.0 to 10.255.255.255
    D. 172.16.0.0 to 172.31.255.255
    E. 192.168.0.0 to 192.168.255.255
    Explanation
    The address ranges 10.0.0.0 to 10.255.255.255, 172.16.0.0 to 172.31.255.255, and 192.168.0.0 to 192.168.255.255 are the private IP addresses. These address ranges are reserved for use within private networks and are not routable on the public internet.

    Rate this question:

  • 2. 

    Which two functions of the OSI model occur at layer two? (Choose two.)

    • A.

      Physical addressing

    • B.

      Encoding

    • C.

      Routing

    • D.

      Cabling

    • E.

      Media access control

    Correct Answer(s)
    A. pHysical addressing
    E. Media access control
    Explanation
    At layer two of the OSI model, two functions occur: physical addressing and media access control. Physical addressing involves assigning unique addresses to devices on a network, allowing them to be identified and reached. Media access control, on the other hand, is responsible for managing access to the physical transmission media, ensuring that multiple devices can share the same network without causing collisions or conflicts. Both of these functions are crucial for the proper functioning of a network at the data link layer.

    Rate this question:

  • 3. 

    Refer to the exhibit. What function does router RT_A need to provide to allow Internet access for hosts in this network?

    • A.

      Address translation

    • B.

      DHCP services

    • C.

      Ftpd

    • D.

      Web server

    Correct Answer
    A. Address translation
    Explanation
    Router RT_A needs to provide address translation in order to allow Internet access for hosts in this network. Address translation, also known as Network Address Translation (NAT), is a process that allows multiple devices with private IP addresses to share a single public IP address when accessing the Internet. This enables the hosts in the network to communicate with external networks and resources using the public IP address assigned to the router.

    Rate this question:

  • 4. 

    What is true regarding network layer addressing? (Choose three.)

    • A.

      Uses a flat structure

    • B.

      Prevent broadcasts

    • C.

      Heirarchical

    • D.

      Uniquely identifies each host

    • E.

      48 bits in length

    • F.

      Contains a network portion

    Correct Answer(s)
    C. Heirarchical
    D. Uniquely identifies each host
    F. Contains a network portion
    Explanation
    The network layer addressing is hierarchical, meaning it is organized in a hierarchical structure with different levels of addressing. It uniquely identifies each host, providing a unique address for every device on the network. Additionally, it contains a network portion, which helps in identifying the network to which the host belongs.

    Rate this question:

  • 5. 

     Refer to the exhibit. Host A attempts to establish a TCP/IP session with host C. During this attempt, a frame was captured with the source MAC address 0050.7320.D632 and the destination MAC address 0030.8517.44C4. The packet inside the captured frame has an IP source address 192.168.7.5, and the destination IP address is 192.168.219.24. At which point in the network was this packet captured?  

    • A.

      Leaving host A

    • B.

      Leaving ATL

    • C.

      Leaving Dallas

    • D.

      Leaving NYC

    Correct Answer
    C. Leaving Dallas
    Explanation
    Based on the information provided, the packet was captured while leaving Dallas. This can be determined by looking at the source and destination MAC addresses, as well as the source and destination IP addresses. The MAC addresses indicate the source and destination devices involved in the communication, while the IP addresses indicate the source and destination network addresses. Since the packet was captured with a source MAC address of 0050.7320.D632 and a destination MAC address of 0030.8517.44C4, and the source IP address is 192.168.7.5 and the destination IP address is 192.168.219.24, it can be inferred that the packet was captured while leaving Dallas.

    Rate this question:

  • 6. 

    Refer to the exhibit. Assume all devices are using default configurations. How many subnets are required to address the topology that is shown?

    • A.

      1

    • B.

      3

    • C.

      4

    • D.

      5

    • E.

      7

    Correct Answer
    B. 3
    Explanation
    The topology shown in the exhibit consists of three separate networks: one for each of the three routers. Each router requires its own subnet, so a total of three subnets are needed to address the entire topology.

    Rate this question:

  • 7. 

    A technician is asked to secure the privileged EXEC mode of a switch by requiring a password. Which type of password would require this login and be considered the most secure?

    • A.

      Console

    • B.

      Enable

    • C.

      Enable secret

    • D.

      VTY

    Correct Answer
    C. Enable secret
    Explanation
    The most secure type of password that would require login to secure the privileged EXEC mode of a switch is the "enable secret" password. This password is encrypted and stored in the switch's configuration file, providing a higher level of security compared to other password types. The "console" password is used to secure console line access, the "enable" password is used to secure privileged EXEC mode, and the "VTY" password is used to secure remote access to the switch. However, the "enable secret" password is the most secure option for securing privileged EXEC mode.

    Rate this question:

  • 8. 

    Refer to the exhibit. A technician is working on a network problem that requires verification of the router LAN interface. What address should be pinged from this host to confirm that the router interface is operational?

    • A.

      127.0.0.1

    • B.

      192.168.64.196

    • C.

      192.168.254.1

    • D.

      192.168.254.9

    • E.

      192.168.254.254

    Correct Answer
    C. 192.168.254.1
    Explanation
    To confirm that the router interface is operational, the technician should ping the IP address 192.168.254.1. This is because the IP address 192.168.254.1 is within the same subnet as the host, indicating that it is likely the IP address assigned to the LAN interface of the router. Pinging this address will help verify if the router interface is functioning properly.

    Rate this question:

  • 9. 

    Which OSI layer does IP rely on to determine whether packets have been lost and to request retransmission?

    • A.

      Application

    • B.

      Presentation

    • C.

      Session

    • D.

      Transport

    Correct Answer
    D. Transport
    Explanation
    IP relies on the transport layer to determine whether packets have been lost and to request retransmission. The transport layer is responsible for ensuring reliable communication between the source and destination devices. It uses protocols like TCP (Transmission Control Protocol) to establish a connection, break data into packets, and reassemble them at the destination. TCP also includes mechanisms for error detection, packet loss detection, and retransmission requests to ensure the reliable delivery of data. Therefore, the transport layer is crucial for IP to determine and handle packet loss.

    Rate this question:

  • 10. 

    When connectionless protocols are implemented at the lower layers of the OSI model, what is usually used to acknowledge that the data was received and to request the retransmission of missing data?

    • A.

      IP

    • B.

      UDP

    • C.

      Ethernet

    • D.

      A connectionless acknowledgement

    • E.

      An upper-layer, connection-oriented protocol or service

    Correct Answer
    E. An upper-layer, connection-oriented protocol or service
    Explanation
    When connectionless protocols are implemented at the lower layers of the OSI model, they do not provide any mechanism for acknowledging the receipt of data or requesting retransmission of missing data. Therefore, an upper-layer, connection-oriented protocol or service is usually used to handle these tasks. This higher-level protocol or service establishes a connection between the sender and receiver, ensuring reliable delivery of data by acknowledging its receipt and requesting retransmission if necessary.

    Rate this question:

  • 11. 

    Refer to the exhibit. Host C is able to ping 127.0.0.1 successfully, but is unable to communicate with hosts A and B in the organization. What is the likely cause of the problem?

    • A.

      Hosts A and B are not on the same subnet as host C.

    • B.

      The IP addresses on the router serial interfaces are wrong.

    • C.

      The subnet mask on host C is improperly configured.

    • D.

      The FastEthernet interface fa0/0 of router 1 is wrongly configured.

    Correct Answer
    C. The subnet mask on host C is improperly configured.
    Explanation
    The likely cause of the problem is that the subnet mask on host C is improperly configured. The subnet mask determines the network portion and host portion of an IP address. If the subnet mask is incorrect, host C may not be able to properly identify and communicate with hosts A and B, even though it can successfully ping its own loopback address.

    Rate this question:

  • 12. 

    Refer to the exhibit. Which list refers only to end devices?

    • A.

      D,E,F,G

    • B.

      A,H,B,C

    • C.

      A,D,E,F

    • D.

      A,D,E,G

    Correct Answer
    A. D,E,F,G
    Explanation
    The list D,E,F,G refers only to end devices because end devices are the devices that are connected to a network and are used by end users to access information or communicate with others. In the given list, D,E,F,G are all devices that can be considered end devices, such as computers, smartphones, and tablets. The other lists include devices that are not necessarily end devices, such as routers (A) and switches (C).

    Rate this question:

  • 13. 

    Refer to the exhibit. Host A sends a frame with the destination MAC address as FFFF.FFFF.FFFF. What action will the switch take for this frame?

    • A.

      It will drop the frame.

    • B.

      It will send the frame back to host A.

    • C.

      It will send the frame to all hosts except host A.

    • D.

      It will forward the frame to the default gateway.

    Correct Answer
    C. It will send the frame to all hosts except host A.
    Explanation
    When a frame is sent with the destination MAC address as FFFF.FFFF.FFFF, it is a broadcast frame. A broadcast frame is intended to be received by all hosts on the network. Therefore, the switch will forward the frame to all hosts except host A.

    Rate this question:

  • 14. 

     Which subnet mask will allow 2040 hosts per subnet on the IP network 10.0.0.0?

    • A.

      255.255.0.0

    • B.

      255.255.254.0

    • C.

      255.255.252.0

    • D.

      255.255.248.0

    • E.

      255.255.240.0

    • F.

      255.255.255.128

    Correct Answer
    D. 255.255.248.0
    Explanation
    The subnet mask 255.255.248.0 will allow 2040 hosts per subnet on the IP network 10.0.0.0 because it provides a total of 11 bits for host addresses. This means that there are 2^11 - 2 = 2046 possible host addresses in each subnet, with 2 addresses reserved for the network address and the broadcast address. Therefore, this subnet mask allows for 2040 usable host addresses per subnet, which meets the requirement.

    Rate this question:

  • 15. 

    Refer to the exhibit. RouterB is configured properly. The Ethernet interface Fa0/0 of RouterA is configured with the use of the commands that are shown. However, a ping from the Fa0/0 interface of RouterA to the Fa0/0 interface of RouterB is unsuccessful. What action should be taken on RouterA to solve this problem?

    • A.

      Use the description command on the FastEthernet interface Fa0/0.

    • B.

      Configure the clock rate of the FastEthernet interface Fa0/0.

    • C.

      Use the no shutdown command on the FastEthernet interface Fa0/0.

    • D.

      Reboot the router.

    Correct Answer
    C. Use the no shutdown command on the FastEthernet interface Fa0/0.
    Explanation
    The correct answer is to use the "no shutdown" command on the FastEthernet interface Fa0/0.

    This is because the interface Fa0/0 on RouterA is currently in a shutdown state, which means it is not operational. By using the "no shutdown" command, the interface will be enabled and able to send and receive traffic. This will allow the ping from RouterA to RouterB to be successful.

    Rate this question:

  • 16. 

    To send data through a network, what two flags are used to establish a session? (Choose two.)

    • A.

      ACK

    • B.

      CRC

    • C.

      SYN

    • D.

      Ack#

    • E.

      Port#

    • F.

      Seq#

    Correct Answer(s)
    A. ACK
    C. SYN
    Explanation
    The two flags used to establish a session when sending data through a network are ACK and SYN. ACK stands for acknowledgment and is used to confirm the receipt of data, while SYN stands for synchronize and is used to initiate a connection between two devices. Together, these flags help establish a reliable and synchronized session for data transmission.

    Rate this question:

  • 17. 

    Which statement is true about the TTL value of an IPv4 packet?

    • A.

      It determines the priority of a packet

    • B.

      It specifies the remaining “life” of the packet.

    • C.

      It indicates that the packet has been fragmented.

    • D.

      It denotes the data payload type that the packet is carrying.

    Correct Answer
    B. It specifies the remaining “life” of the packet.
    Explanation
    The TTL (Time to Live) value of an IPv4 packet specifies the remaining "life" of the packet. It is a field in the packet header that indicates the maximum number of hops (routers) the packet can pass through before it is discarded. Each time the packet passes through a router, the TTL value is decremented by one. If the TTL value reaches zero, the packet is discarded. This mechanism helps prevent packets from circulating endlessly in a network.

    Rate this question:

  • 18. 

     Refer to the exhibit. Communication for hosts X and Y is restricted to the local network. What is the reason for this?

    • A.

      Host X is assigned a network address.

    • B.

      Host Y is assigned a multicast address.

    • C.

      Host X and host Y belong to different networks.

    • D.

      The gateway addresses are broadcast addresses.

    Correct Answer
    D. The gateway addresses are broadcast addresses.
    Explanation
    The reason for the communication restriction between hosts X and Y being limited to the local network is because the gateway addresses are broadcast addresses. This means that the gateway is only capable of forwarding packets within the local network and cannot route them to other networks. As a result, communication between hosts X and Y, which belong to different networks, cannot be established beyond the local network.

    Rate this question:

  • 19. 

    What type of network is maintained if a server takes no dedicated role in the network?

    • A.

      Mainframe

    • B.

      Client/server

    • C.

      Peer-to-peer

    • D.

      Centralized

    Correct Answer
    C. Peer-to-peer
    Explanation
    If a server takes no dedicated role in the network, it suggests that there is no central authority or hierarchy in the network. Instead, all devices in the network have equal capabilities and can act as both clients and servers. This type of network is known as a peer-to-peer network, where devices can directly communicate and share resources with each other without relying on a central server.

    Rate this question:

  • 20. 

    A routing issue has occurred in your internetwork. Which of the following type of devices should be examined to isolate this error?

    • A.

      Access point

    • B.

      Host

    • C.

      Hub

    • D.

      Router

    • E.

      Switch

    Correct Answer
    D. Router
    Explanation
    A routing issue in an internetwork refers to a problem with the way data packets are being directed and forwarded between different networks. In order to isolate this error, the device that should be examined is the router. Routers are responsible for directing traffic between different networks based on their IP addresses. By examining the router, one can identify any misconfigurations or faults in the routing tables that may be causing the issue. The other devices mentioned in the options, such as access points, hosts, hubs, and switches, do not have the same level of control over network routing and are therefore less likely to be the cause of the routing issue.

    Rate this question:

  • 21. 

    Which physical component is used to access and perform the initial configuration on a new unconfigured router?

    • A.

      Picture 1

    • B.

      Picture 2

    • C.

      Picture 3

    • D.

      Picture 4

    • E.

      Picture 5

    Correct Answer
    B. Picture 2
  • 22. 

     A user sees the command prompt: Router(config-if)# . What task can be performed at this mode?

    • A.

      Reload the device.

    • B.

      Perform basic tests.

    • C.

      Configure individual interfaces.

    • D.

      Configure individual terminal lines.

    Correct Answer
    C. Configure individual interfaces.
    Explanation
    At the "Router(config-if)#" mode, the user can configure individual interfaces. This mode allows the user to make specific configurations and settings for each interface on the router, such as assigning IP addresses, enabling or disabling features, setting bandwidth limits, and configuring security settings. It is a specific configuration mode that focuses on the individual interfaces rather than the overall device configuration.

    Rate this question:

  • 23. 

    What is the correct order for PDU encapsulation?

    • A.

      Picture 1

    • B.

      Picture 2

    • C.

      Picture 3

    • D.

      Picture 4

    Correct Answer
    B. Picture 2
  • 24. 

     What information can be gathered by using the command netstat?

    • A.

      The default gateway

    • B.

      The routing protocol

    • C.

      Active TCP connections

    • D.

      The locally configured subnet mask

    Correct Answer
    C. Active TCP connections
    Explanation
    The command "netstat" is used to display active TCP connections on a computer. It provides information about the current network connections, including the local and remote IP addresses, the state of the connection, and the port numbers being used. By using this command, one can gather information about the active TCP connections on the system, which can be useful for troubleshooting network issues, monitoring network activity, or identifying potential security threats.

    Rate this question:

  • 25. 

    How can ARP be used to help document the network?

    • A.

      It can list each hop on the way to a destination host.

    • B.

      It can show the average latency of hosts on the network.

    • C.

      It can provide a list of physical addresses on the network.

    • D.

      It can indicate which hosts are not responding to network traffic

    Correct Answer
    C. It can provide a list of pHysical addresses on the network.
    Explanation
    ARP (Address Resolution Protocol) can be used to help document the network by providing a list of physical addresses on the network. ARP is responsible for mapping IP addresses to MAC addresses, allowing devices to communicate with each other on a local network. By using ARP, one can gather information about the physical addresses (MAC addresses) of devices connected to the network, which can be useful for network documentation and troubleshooting purposes.

    Rate this question:

  • 26. 

    What is the protocol data unit that is associated with the data link layer of the OSI reference model?

    • A.

      Data

    • B.

      Frame

    • C.

      Packet

    • D.

      Segment

    Correct Answer
    B. Frame
    Explanation
    In the data link layer of the OSI reference model, the protocol data unit (PDU) associated with it is a frame. A frame is a unit of data that includes both the data being transmitted and the necessary control information, such as source and destination addresses, error detection, and flow control. Frames are used to encapsulate data from the network layer and are responsible for reliable transmission of data over the physical medium.

    Rate this question:

  • 27. 

    Which application layer protocol allows administrators to log into a server from remote locations and control a server as though logged in locally?

    • A.

      DNS

    • B.

      FTP

    • C.

      DHCP

    • D.

      SMTP

    • E.

      Telnet

    Correct Answer
    E. Telnet
    Explanation
    Telnet is the correct answer because it is an application layer protocol that allows administrators to remotely log into a server and control it as if they were physically present. Telnet provides a command-line interface to the server, enabling remote administration and management. It is commonly used for tasks such as configuration, troubleshooting, and remote maintenance of servers.

    Rate this question:

  • 28. 

     Which statement identifies the DNS protocol?

    • A.

      It transmits information using TCP port 25.

    • B.

      It transfers and conveys information using HTML pages.

    • C.

      It matches a resource name with the required network address.

    • D.

      It requests and assigns an IP address, default gateway, and server addresses to hosts.

    Correct Answer
    C. It matches a resource name with the required network address.
    Explanation
    The correct answer is "It matches a resource name with the required network address." The DNS (Domain Name System) protocol is responsible for mapping domain names to their corresponding IP addresses. When a user enters a domain name in a web browser, the DNS protocol is used to translate that domain name into the corresponding IP address of the server hosting the website. This allows users to access websites by using human-readable domain names instead of having to remember the numerical IP addresses.

    Rate this question:

  • 29. 

    Which password would allow a user to establish a Telnet session with a Cisco device?

    • A.

      VTY password

    • B.

      Enable password

    • C.

      Console password

    • D.

      Enable secret password

    Correct Answer
    A. VTY password
    Explanation
    The VTY password would allow a user to establish a Telnet session with a Cisco device. VTY stands for Virtual Terminal Line, and it is used to establish remote connections to a device. By setting a VTY password, the user can authenticate themselves and gain access to the device remotely using Telnet. The other options, such as enable password, console password, and enable secret password, are used for different purposes and do not directly relate to establishing a Telnet session.

    Rate this question:

  • 30. 

    Which identifier is contained in the header of the Layer 2 Ethernet frame?

    • A.

      Timing and synchronization of bits

    • B.

      Source and destination port numbers

    • C.

      Logical source and destination addresses

    • D.

      Physical source and destination addresses

    Correct Answer
    D. pHysical source and destination addresses
    Explanation
    The identifier that is contained in the header of the Layer 2 Ethernet frame is the physical source and destination addresses. These addresses are used to identify the specific devices that are sending and receiving the data. The physical addresses, also known as MAC addresses, are unique to each network interface card (NIC) and are used to ensure that the data is delivered to the correct destination.

    Rate this question:

  • 31. 

     What happens when a node on an Ethernet network is creating a frame and it does not have the destination MAC address?

    • A.

      The node drops the frame.

    • B.

      The node sends out a Layer 3 broadcast message.

    • C.

      The node sends a message directly to the router for the address.

    • D.

      The node sends out an ARP request with the destination IP address.

    Correct Answer
    D. The node sends out an ARP request with the destination IP address.
    Explanation
    When a node on an Ethernet network is creating a frame and it does not have the destination MAC address, it will send out an ARP request with the destination IP address. This is because the node needs to determine the MAC address of the destination device in order to properly transmit the frame. The ARP request is used to query the network for the MAC address associated with the given IP address. Once the node receives the MAC address, it can then properly address the frame and send it to the correct destination.

    Rate this question:

  • 32. 

     An administrator makes changes to the default configuration of a router and saves them to NVRAM. After testing, it is discovered that the configurations did not have the desired effect and must be removed. What steps must be taken to remove the changes and return the router to the default configuration?

    • A.

      Reboot the router.

    • B.

      Use no version of the commands that are issued.

    • C.

      Issue the erase startup-config command, and then reboot the router.

    • D.

      Issue the erase running-config command, and then reboot the router.

    Correct Answer
    C. Issue the erase startup-config command, and then reboot the router.
    Explanation
    To remove the changes made to the default configuration of a router and return it to its default state, the administrator should issue the "erase startup-config" command. This command will erase the configuration stored in the NVRAM, which is where the startup configuration is stored. After issuing this command, the router needs to be rebooted for the changes to take effect. By doing this, the router will load the default configuration from its ROM (Read-Only Memory) during the boot process, returning it to its original settings.

    Rate this question:

  • 33. 

     A network administrator is tasked with connecting two workgroups that are configured to use different subnets. Which device should be selected to allow connectivity between users on the two networks?

    • A.

      Hub

    • B.

      Switch

    • C.

      Router

    • D.

      Wireless access point

    Correct Answer
    C. Router
    Explanation
    A router should be selected to allow connectivity between users on the two networks because it can route traffic between different subnets. A hub and switch are used to connect devices within the same network, while a wireless access point is used to provide wireless connectivity. However, a router is specifically designed to connect different networks and can handle routing traffic between them.

    Rate this question:

  • 34. 

    Which two programs can be used to accomplish terminal emulation for configuring a router from the CLI through the console port? (Choose two.)

    • A.

      HyperTerminal

    • B.

      Internet Explorer

    • C.

      Minicom

    • D.

      Secure Shell

    • E.

      Telnet

    Correct Answer(s)
    A. HyperTerminal
    C. Minicom
    Explanation
    HyperTerminal and Minicom can be used to accomplish terminal emulation for configuring a router from the CLI through the console port. HyperTerminal is a program that allows users to connect to other computers, devices, and networks through various communication protocols. It can be used to establish a connection with a router's console port and configure it using the command-line interface (CLI). Minicom, on the other hand, is a text-based terminal emulator that is commonly used in Unix-like operating systems. It can also be used to connect to a router's console port and configure it through the CLI.

    Rate this question:

  • 35. 

    Which statement accurately describes file sharing in a peer-to-peer network?

    • A.

      A dedicated server is required.

    • B.

      Access control is decentralized.

    • C.

      Files are typically stored on the most powerful peer in the network.

    • D.

      Peers can either make requests, or respond to requests, but not both.

    Correct Answer
    B. Access control is decentralized.
    Explanation
    In a peer-to-peer network, access control is decentralized. This means that each peer in the network has control over its own files and can decide who can access them. Unlike a client-server network where a dedicated server is required to manage access control, in a peer-to-peer network, each peer acts as both a client and a server, allowing for more flexibility and autonomy in file sharing.

    Rate this question:

  • 36. 

    What are two primary responsibilities of the Ethernet MAC sublayer? (Choose two.)

    • A.

      Frame delimiting

    • B.

      Data encapsulation

    • C.

      Logical addressing

    • D.

      Error detection

    • E.

      Accessing the media

    Correct Answer(s)
    B. Data encapsulation
    E. Accessing the media
    Explanation
    The Ethernet MAC sublayer has two primary responsibilities. Firstly, it is responsible for data encapsulation, which involves adding the necessary headers and trailers to the data being transmitted over the Ethernet network. This ensures that the data can be properly transmitted and received by the recipient. Secondly, the MAC sublayer is responsible for accessing the media. It determines when the network is available for transmitting data and coordinates the transmission process to avoid collisions with other devices on the network.

    Rate this question:

  • 37. 

     Which router configuration mode would an administrator use to configure the router for SSH or Telnet login access?

    • A.

      Line

    • B.

      Router

    • C.

      Global

    • D.

      Interface

    • E.

      Privileged EXEC

    Correct Answer
    A. Line
    Explanation
    The correct answer is "line". In router configuration mode, an administrator would use the "line" configuration mode to configure the router for SSH or Telnet login access. This mode allows the administrator to configure settings for specific lines, such as console lines or virtual terminal lines, which are used for remote access to the router. By configuring the line settings, the administrator can enable SSH or Telnet access and set authentication and encryption options for secure login.

    Rate this question:

  • 38. 

    Refer to the exhibit. Which device should be included in the network topology to provide Layer 2 connectivity for all LAN devices, provide multiple collision domains, and also provide a connection to the rest of the network?

    • A.

      Server

    • B.

      Hub

    • C.

      Switch

    • D.

      PC

    Correct Answer
    C. Switch
    Explanation
    A switch should be included in the network topology to provide Layer 2 connectivity for all LAN devices, provide multiple collision domains, and also provide a connection to the rest of the network. Unlike a hub, a switch can intelligently direct network traffic to the intended recipient, reducing collisions and improving overall network performance. A server is not designed for this purpose, and a PC does not have the capability to provide connectivity for other devices.

    Rate this question:

  • 39. 

    Refer to the exhibit. A technician has been asked to test connectivity from PC1 to a remote network. Which action will indicate if there is remote connectivity?

    • A.

      Picture 1

    • B.

      Picture 2

    • C.

      Picture 3

    • D.

      Picture 4

    Correct Answer
    A. Picture 1
    Explanation
    Picture 1 is the correct answer because it shows a successful ping from PC1 to a remote network. This indicates that there is remote connectivity between PC1 and the remote network.

    Rate this question:

  • 40. 

    What purpose does a hostname serve on a router?

    • A.

      Uniquely identifies a router on the internet

    • B.

      Used by routing protocols to identify peer routers

    • C.

      Provides device identification to users logging on remotely

    • D.

      Determines the hosts that are allowed to connect to the device

    Correct Answer
    C. Provides device identification to users logging on remotely
    Explanation
    A hostname on a router serves the purpose of providing device identification to users logging on remotely. This means that when users connect to the router remotely, they can identify the specific device they are connecting to by its hostname.

    Rate this question:

  • 41. 

    Which prompt is associated with the privileged exec mode?

    • A.

      R1>

    • B.

      R1#

    • C.

      R1(config)#

    • D.

      R1(config-router)#

    Correct Answer
    B. R1#
    Explanation
    The prompt "R1#" is associated with the privileged exec mode. This mode is accessed by entering the command "enable" from the user exec mode. In the privileged exec mode, users have access to all router commands and can make configuration changes, view system information, and perform administrative tasks. The "#" symbol at the end of the prompt indicates that the user has administrative privileges.

    Rate this question:

  • 42. 

    A technician wishes to connect two computers to move data from one to the other before reloading the operating system. The NICs on both PCs do not support autosensing feature. Which procedure will satisfy the requirement?

    • A.

      Interconnect the two PCs with a rollover cable.

    • B.

      Interconnect the two PCs with two rollover cables and a hub.

    • C.

      Interconnect the two PCs with a crossover cable.

    • D.

      Interconnest the two PCs with two crossover cables and a hub.

    Correct Answer
    C. Interconnect the two PCs with a crossover cable.
    Explanation
    To move data from one computer to another, the technician should interconnect the two PCs with a crossover cable. A crossover cable is specifically designed to connect two devices directly without the need for a hub or switch. In this case, since the NICs on both PCs do not support autosensing, a crossover cable is necessary to ensure the correct transmission of data between the two computers.

    Rate this question:

  • 43. 

    Refer to the exhibit. Interface Fa0/0 on router A is generating excessive broadcast traffic. Which LAN segments will affected by the excessive broadcasts?

    • A.

      Only the 192.168.1.200/30 network will be affected.

    • B.

      Only the link between 192.168.1.201 and port Fa0/5 on SW1 will be affected.

    • C.

      Both the 192.168.1.200/30 and 192.168.1.204/30 networks will be affected.

    • D.

      Only the links between 192.168.1.201 and port Fa0/7 on SW2 will be affected.

    Correct Answer
    A. Only the 192.168.1.200/30 network will be affected.
    Explanation
    The excessive broadcast traffic generated by Interface Fa0/0 on router A will only affect the 192.168.1.200/30 network.

    Rate this question:

  • 44. 

     Two routers are connected via their serial ports in a lab environment. The routers are configured with valid IP addresses, but they cannot ping each other. The show interface serial0/0 command shows that the serial0/0 interface is up but the line protocol is down. What could be the cause of this problem?

    • A.

      The no shutdown command has not been applied to the interfaces.

    • B.

      The clock rate command has not been entered on the DCE interface.

    • C.

      The interface timers are not cleared.

    • D.

      The FastEthernet interface is emulating a serial interface by assigning it a timing signal.

    Correct Answer
    B. The clock rate command has not been entered on the DCE interface.
    Explanation
    The line protocol being down indicates a problem with the data link layer. In this case, the issue is likely with the clock rate command not being entered on the DCE (Data Communications Equipment) interface. The clock rate command is used to specify the clocking rate for a serial interface, and it is necessary for proper communication between the routers. Without the clock rate command, the routers will not be able to synchronize their transmission and reception of data, resulting in the inability to ping each other.

    Rate this question:

  • 45. 

    Refer to the exhibit. Which layered network model is shown in the diagram? 

    • A.

      Cisco

    • B.

      IETF

    • C.

      OSI

    • D.

      TCP/IP

    Correct Answer
    D. TCP/IP
    Explanation
    The diagram shows the TCP/IP layered network model. The TCP/IP model is a conceptual framework used to understand and describe how network protocols and technologies work together to provide network communication. It consists of four layers: the Network Interface layer, Internet layer, Transport layer, and Application layer. This model is widely used in modern networking and is the basis for the internet protocol suite.

    Rate this question:

  • 46. 

    Refer to the exhibit. Host A is unable to reach host B on the remote network. A technician attempted to ping the local gateway and the ping was successful. To verify the host configuration, the technician issued the ipconfig command. What is the likely cause of the problem?

    • A.

      The local NIC is incorrectly configured.

    • B.

      The subnet mask on host A is incorrectly configured.

    • C.

      The IP address on host A is incorrectly configured

    • D.

      The default gateway on host A is incorrectly configured.

    Correct Answer
    D. The default gateway on host A is incorrectly configured.
    Explanation
    The likely cause of the problem is that the default gateway on host A is incorrectly configured. The fact that host A was able to successfully ping the local gateway indicates that the local NIC and IP address are correctly configured. The issue lies in the communication between host A and host B on the remote network, which is handled by the default gateway.

    Rate this question:

  • 47. 

    Which option shows how a router will route packets to a remote network?

    • A.

      Picture 1

    • B.

      Picture 2

    • C.

      Picture 3

    • D.

      Picture 4

    Correct Answer
    D. Picture 4
  • 48. 

    An organization has been assigned network ID 10.10.128.0 and subnet mask 255.255.224.0. Which IP address range can be used for this organization?

    • A.

      10.10.128.0 to 10.10.160.255

    • B.

      10.10.128.0 to 10.10.159.255

    • C.

      10.10.128.0 to 10.10.0.255

    • D.

      10.10.128.0 to 10.10.0.159

    • E.

      10.10.128.0 to 10.10.159.0

    Correct Answer
    B. 10.10.128.0 to 10.10.159.255
    Explanation
    The subnet mask 255.255.224.0 allows for 11 bits to be used for the host portion of the IP address. This means that the network can have 2^11 or 2048 hosts. The network ID 10.10.128.0 falls within the range of 10.10.128.0 to 10.10.159.255, which includes a total of 2048 addresses. Therefore, this IP address range can be used for this organization.

    Rate this question:

  • 49. 

    A network administrator is configuring several switches for a network. The switches have similar configurations and only minor differences. The administrator wants to save all commands that are issued on the first switch to a text file for editing. Which transfer option should be selected in HyperTerminal?

    • A.

      Picture 1

    • B.

      Picture 2

    • C.

      Picture 3

    • D.

      Picture 4

    Correct Answer
    C. Picture 3
    Explanation
    The correct answer is Picture 3. In HyperTerminal, selecting Picture 3, which is the "Capture Text" option, allows the network administrator to save all commands that are issued on the first switch to a text file for editing. This option captures the text output from the terminal session and saves it to a file, which can then be accessed and edited as needed.

    Rate this question:

  • 50. 

     Which information is used by the router to determine the path between the source and destination hosts?

    • A.

      The host portion of the IP address

    • B.

      The network portion of the IP address

    • C.

      Host default gateway address

    • D.

      The MAC address

    Correct Answer
    B. The network portion of the IP address
    Explanation
    Routers use the network portion of the IP address to determine the path between the source and destination hosts. The network portion of the IP address identifies the network to which the host belongs. Routers maintain a routing table that contains information about different networks and the paths to reach them. By examining the network portion of the IP address, routers can look up the appropriate entry in the routing table and determine the next hop to forward the packet towards the destination host. The MAC address is used at the data link layer for communication within a local network, but it is not directly used by routers for determining the path between hosts on different networks.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 21, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Jan 05, 2013
    Quiz Created by
    Lazda1993
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.