Ccna_1_finals_example_4

32 Questions | Attempts: 230
Share

SettingsSettingsSettings
Ccna_1_finals_example_4 - Quiz

4/4


Questions and Answers
  • 1. 

    Which two functions of the OSI model occur at layer two? (Choose two.)

    • A.

      Physical addressing

    • B.

      encoding

    • C.

      Routing

    • D.

      cabling

    • E.

      media access control

    Correct Answer(s)
    A. Physical addressing
    E. media access control
  • 2. 

    What is true regarding network layer addressing? (Choose three.)

    • A.

      Uses a flat structure

    • B.

      prevent broadcasts

    • C.

      heirarchical

    • D.

      uniquely identifies each host

    • E.

      48 bits in length

    • F.

      contains a network portion

    Correct Answer(s)
    C. heirarchical
    D. uniquely identifies each host
    F. contains a network portion
  • 3. 

    Refer to the exhibit. Host A attempts to establish a TCP/IP session with host C. During this attempt, a frame was captured with the source MAC address 0050.7320.D632 and the destination MAC address 0030.8517.44C4. The packet inside the captured frame has an IP source address 192.168.7.5, and the destination IP address is 192.168.219.24. At which point in the network was this packet captured?

    • A.

      Leaving host A

    • B.

      leaving ATL

    • C.

      leaving Dallas

    • D.

      leaving NYC

    Correct Answer
    C. leaving Dallas
  • 4. 

    Refer to the exhibit. Assume all devices are using default configurations. How many subnets are required to address the topology that is shown?

    • A.

      1

    • B.

      3

    • C.

      4

    • D.

      5

    • E.

      7

    Correct Answer
    B. 3
  • 5. 

    Which OSI layer does IP rely on to determine whether packets have been lost and to request retransmission?

    • A.

      Application

    • B.

      presentation

    • C.

      session

    • D.

      transport

    Correct Answer
    D. transport
  • 6. 

    When connectionless protocols are implemented at the lower layers of the OSI model, what is usually used to acknowledge that the data was received and to request the retransmission of missing data?

    • A.

      IP

    • B.

      UDP

    • C.

      Ethernet

    • D.

      a connectionless acknowledgement

    • E.

      an upper-layer, connection-oriented protocol or service

    Correct Answer
    E. an upper-layer, connection-oriented protocol or service
  • 7. 

    Refer to the exhibit. Host C is able to ping 127.0.0.1 successfully, but is unable to communicate with hosts A and B in the organization. What is the likely cause of the problem?

    • A.

      Hosts A and B are not on the same subnet as host C.

    • B.

      The IP addresses on the router serial interfaces are wrong.

    • C.

      The subnet mask on host C is improperly configured.

    • D.

      The FastEthernet interface fa0/0 of router 1 is wrongly configured.

    Correct Answer
    C. The subnet mask on host C is improperly configured.
  • 8. 

    Refer to the exhibit. Which list refers only to end devices?

    • A.

      D,E,F,G

    • B.

      A,H,B,C

    • C.

      A,D,E,F

    • D.

      A,D,E,G

    Correct Answer
    A. D,E,F,G
  • 9. 

    Which subnet mask will allow 2040 hosts per subnet on the IP network 10.0.0.0?

    • A.

      255.255.0.0

    • B.

      255.255.254.0

    • C.

      255.255.252.0

    • D.

      255.255.248.0

    • E.

      255.255.240.0

    • F.

      255.255.255.128

    Correct Answer
    D. 255.255.248.0
  • 10. 

    To send data through a network, what two flags are used to establish a session? (Choose two.)

    • A.

      ACK

    • B.

      CRC

    • C.

      SYN

    • D.

      Ack #

    • E.

      Port #

    • F.

      Seq #

    Correct Answer(s)
    A. ACK
    C. SYN
  • 11. 

    Which statement is true about the TTL value of an IPv4 packet?

    • A.

      It determines the priority of a packet.

    • B.

      It specifies the remaining “life” of the packet.

    • C.

      It indicates that the packet has been fragmented.

    • D.

      It denotes the data payload type that the packet is carrying.

    Correct Answer
    B. It specifies the remaining “life” of the packet.
  • 12. 

    Which physical component is used to access and perform the initial configuration on a new unconfigured router?

    Correct Answer
    B.
  • 13. 

    What is the correct order for PDU encapsulation?

    Correct Answer
    A.
  • 14. 

    What information can be gathered by using the command netstat?

    • A.

      The default gateway

    • B.

      the routing protocol

    • C.

      active TCP connections

    • D.

      the locally configured subnet mask

    Correct Answer
    C. active TCP connections
  • 15. 

    How can ARP be used to help document the network?

    • A.

      It can list each hop on the way to a destination host.

    • B.

      It can show the average latency of hosts on the network.

    • C.

      It can provide a list of physical addresses on the network.

    • D.

      It can indicate which hosts are not responding to network traffic.

    Correct Answer
    C. It can provide a list of physical addresses on the network.
  • 16. 

    What is the protocol data unit that is associated with the data link layer of the OSI reference model?

    • A.

      Data

    • B.

      frame

    • C.

      packet

    • D.

      segment

    Correct Answer
    B. frame
  • 17. 

    Which statement identifies the DNS protocol?

    • A.

      It transmits information using TCP port 25.

    • B.

      It transfers and conveys information using HTML pages.

    • C.

      It matches a resource name with the required network address.

    • D.

      It requests and assigns an IP address, default gateway, and server addresses to hosts.

    Correct Answer
    C. It matches a resource name with the required network address.
  • 18. 

    Which password would allow a user to establish a Telnet session with a Cisco device?

    • A.

      VTY password

    • B.

      enable password

    • C.

      console password

    • D.

      enable secret password

    Correct Answer
    A. VTY password
  • 19. 

    Which identifier is contained in the header of the Layer 2 Ethernet frame?

    • A.

      Timing and synchronization of bits

    • B.

      source and destination port numbers

    • C.

      logical source and destination addresses

    • D.

      physical source and destination addresses

    Correct Answer
    D. physical source and destination addresses
  • 20. 

    What happens when a node on an Ethernet network is creating a frame and it does not have the destination MAC address?

    • A.

      The node drops the frame.

    • B.

      The node sends out a Layer 3 broadcast message.

    • C.

      The node sends a message directly to the router for the address.

    • D.

      The node sends out an ARP request with the destination IP address.

    Correct Answer
    D. The node sends out an ARP request with the destination IP address.
  • 21. 

    An administrator makes changes to the default configuration of a router and saves them to NVRAM. After testing, it is discovered that the configurations did not have the desired effect and must be removed. What steps must be taken to remove the changes and return the router to the default configuration?

    • A.

      Reboot the router.

    • B.

      Use no version of the commands that are issued.

    • C.

      Issue the erase startup-config command, and then reboot the router.

    • D.

      Issue the erase running-config command, and then reboot the router.

    Correct Answer
    C. Issue the erase startup-config command, and then reboot the router.
  • 22. 

    A network administrator is tasked with connecting two workgroups that are configured to use different subnets. Which device should be selected to allow connectivity between users on the two networks?

    • A.

      Hub

    • B.

      switch

    • C.

      Router

    • D.

      wireless access point

    Correct Answer
    C. Router
  • 23. 

    Which statement accurately describes file sharing in a peer-to-peer network?

    • A.

      A dedicated server is required.

    • B.

      Access control is decentralized.

    • C.

      Files are typically stored on the most powerful peer in the network.

    • D.

      Peers can either make requests, or respond to requests, but not both.

    Correct Answer
    B. Access control is decentralized.
  • 24. 

    What are two primary responsibilities of the Ethernet MAC sublayer? (Choose two.)

    • A.

      Frame delimiting

    • B.

      data encapsulation

    • C.

      logical addressing

    • D.

      error detection

    • E.

      accessing the media

    Correct Answer(s)
    B. data encapsulation
    E. accessing the media
  • 25. 

    Which router configuration mode would an administrator use to configure the router for SSH or Telnet login access?

    • A.

      Line

    • B.

      router

    • C.

      global

    • D.

      Interface

    • E.

      privileged EXEC

    Correct Answer
    A. Line
  • 26. 

    Refer to the exhibit. Which device should be included in the network topology to provide Layer 2 connectivity for all LAN devices, provide multiple collision domains, and also provide a connection to the rest of the network?

    • A.

      Server

    • B.

      hub

    • C.

      switch

    • D.

      PC

    Correct Answer
    C. switch
  • 27. 

    Refer to the exhibit. A technician has been asked to test connectivity from PC1 to a remote network. Which action will indicate if there is remote connectivity?

    Correct Answer
    A.
  • 28. 

    What purpose does a hostname serve on a router?

    • A.

      Uniquely identifies a router on the internet

    • B.

      used by routing protocols to identify peer routers

    • C.

      provides device identification to users logging on remotely

    • D.

      determines the hosts that are allowed to connect to the device

    Correct Answer
    C. provides device identification to users logging on remotely
  • 29. 

    A technician wishes to connect two computers to move data from one to the other before reloading the operating system. The NICs on both PCs do not support autosensing feature. Which procedure will satisfy the requirement?

    • A.

      Interconnect the two PCs with a rollover cable.

    • B.

      Interconnect the two PCs with two rollover cables and a hub.

    • C.

      Interconnect the two PCs with a crossover cable.

    • D.

      Interconnest the two PCs with two crossover cables and a hub.

    Correct Answer
    C. Interconnect the two PCs with a crossover cable.
  • 30. 

    Two routers are connected via their serial ports in a lab environment. The routers are configured with valid IP addresses, but they cannot ping each other. The show interface serial0/0 command shows that the serial0/0 interface is up but the line protocol is down. What could be the cause of this problem?

    • A.

      The no shutdown command has not been applied to the interfaces.

    • B.

      The clock rate command has not been entered on the DCE interface.

    • C.

      The interface timers are not cleared.

    • D.

      The FastEthernet interface is emulating a serial interface by assigning it a timing signal.

    Correct Answer
    B. The clock rate command has not been entered on the DCE interface.
  • 31. 

    Refer to the exhibit. Which layered network model is shown in the diagram?

    • A.

      Cisco

    • B.

      IETF

    • C.

      OSI

    • D.

      TCP/IP

    Correct Answer
    D. TCP/IP
  • 32. 

    Which option shows how a router will route packets to a remote network?

    Correct Answer
    D.

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Apr 26, 2019
    Quiz Edited by
    ProProfs Editorial Team
  • Jan 13, 2013
    Quiz Created by
    Lukas_schweigler
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.