CCNA Final Exam Set-2

50 Questions | Total Attempts: 35

SettingsSettingsSettings
CCNA Final Exam Set-2


Questions and Answers
  • 1. 
    When must a router serial interface be configured with the clock rate command?
    • A. 

      When the interface is functioning as a DTE device

    • B. 

      When the interface timers have been cleared

    • C. 

      When the connected DTE device is shut down

    • D. 

      When the interface is functioning as a DCE device

  • 2. 
    Due to a security violation, the router passwords must be changed. What information can be learned from the following configuration entries? (Choose two.)Router(config)# line vty 0 3 Router(config-line)# password c13c0Router(config-line)# login
    • A. 

      The entries specify three Telnet lines for remote access.

    • B. 

      The entries specify four Telnet lines for remote access.

    • C. 

      The entries set the console and Telnet password to “c13c0″.

    • D. 

      Telnet access will be denied because the Telnet configuration is incomplete.

    • E. 

      Access will be permitted for Telnet using “c13c0″ as the password.

  • 3. 
    Which of the following are the address ranges of the private IP addresses? (Choose three.) 
    • A. 

      10.0.0.0 to 10.255.255.255

    • B. 

      200.100.50.0 to 200.100.25.255

    • C. 

      150.150.0.0 to 150.150.255.255

    • D. 

      172.16.0.0 to 172.31.255.255

    • E. 

      192.168.0.0 to 192.168.255.255

    • F. 

      127.16.0.0 to 127.31.255.255

  • 4. 
    Which password is automatically encrypted when it is created?
    • A. 

      Vty

    • B. 

      Aux

    • C. 

      Console

    • D. 

      Enable secret

    • E. 

      Enable password

  • 5. 
    Refer to the exhibit. A network technician is trying to determine the correct IP address configuration for Host A. What is a valid configuration for Host A?
    • A. 

      IP address: 192.168.100.19; Subnet Mask: 255.255.255.248; Default Gateway: 192.16.1.2

    • B. 

      IP address: 192.168.100.20; Subnet Mask: 255.255.255.240; Default Gateway: 192.168.100.17

    • C. 

      IP address: 192.168.100.21; Subnet Mask: 255.255.255.248; Default Gateway: 192.168.100.18

    • D. 

      IP address: 192.168.100.22; Subnet Mask: 255.255.255.240; Default Gateway: 10.1.1.5

    • E. 

      IP address: 192.168.100.30; Subnet Mask: 255.255.255.240; Default Gateway: 192.168.1.1

    • F. 

      IP address: 192.168.100.31; Subnet Mask: 255.255.255.240; Default Gateway: 192.168.100.18

  • 6. 
    Refer to the exhibit. What function does router RT_A need to provide toallow Internet access for hosts in this network?
    • A. 

      Address translation

    • B. 

      DHCP services

    • C. 

      Ftpd

    • D. 

      Web server

  • 7. 
    Which prompt represents the appropriate mode used for the copy running-config startup-config command ?
    • A. 

      Switch-6J>

    • B. 

      Switch-6J#

    • C. 

      Switch-6J(config)#

    • D. 

      Switch-6J(config-if)#

    • E. 

      Switch-6J(config-line)#

  • 8. 
    Refer to the exhibit. A technician is working on a network problem that requires verification of the router LAN interface. What address should be pinged from this host to confirm that the router interface is operational?
    • A. 

      127.0.0.1

    • B. 

      192.168.64.196

    • C. 

      192.168.254.1

    • D. 

      192.168.254.9

    • E. 

      192.168.254.254

  • 9. 
    Refer to the exhibit. The tracert command is initiated from PC1 to PC4. Which device will send a response to the initial tracert packet from PC1?
    • A. 

      Athens

    • B. 

      Ankara

    • C. 

      London

    • D. 

      Paris

    • E. 

      PC4

  • 10. 
    Which information is used by the router to determine the path between the source and destination hosts?
    • A. 

      The host portion of the IP address

    • B. 

      The network portion of the IP address

    • C. 

      Host default gateway address

    • D. 

      The MAC address

  • 11. 
    Refer to the exhibit. A PC is communicating with another PC on a remote network. The two networks are connected by three routers. Which action will help to identify the path between the hosts?
    • A. 

      Use the ipconfig command at the host.

    • B. 

      Use the ipconfig/all command at the destination.

    • C. 

      Use the tracert command at the host.

    • D. 

      Use the ping command at the destination.

  • 12. 
    Refer to the exhibit. The diagram represents the process of sending e-mail between clients. Which list correctly identifies the component or protocol used at each numbered stage of the diagram?
    • A. 

      1.MUA 2.MDA 3.MTA 4.SMTP 5.MTA 6.POP 7.MDA 8.MUA

    • B. 

      1.MUA 2.POP 3.MDA 4.SMTP 5.MTA 6.MDA 7.SMTP 8.MUA

    • C. 

      1.MUA 2.POP 3.SMTP 4.MDA 5.MTA 6.SMTP 7.POP 8.MUA

    • D. 

      1.MUA 2.SMTP 3.MTA 4.SMTP 5.MTA 6.MDA 7.POP 8.MUA

  • 13. 
    Refer to the exhibit. The router of the company failed and was replaced. After the replacement, hosts C and D in the Education office are able to ping each other, but they are unable to access the hosts in the Accounts office. What is the likely cause of the problem?
    • A. 

      The IP address at the fa0/0 interface of the router is incorrectly configured.

    • B. 

      The subnet mask at the fa0/1 interface of the router is incorrectly entered.

    • C. 

      The IP address at the serial interface of the router is incorrectly configured.

    • D. 

      The hosts in the Accounts office are not on the same subnet as the hosts in the Education office.

  • 14. 
    Refer to the exhibit. Host A and B are unable to communicate with each other. What is the reason for this?
    • A. 

      Host A is assigned a network address.

    • B. 

      Host B is assigned a multicast address.

    • C. 

      Host A and host B belong to different networks.

    • D. 

      The gateway addresses are network addresses.

  • 15. 
    Refer to the exhibit. Host B attempts to establish a TCP/IP session with host C. During this attempt, a frame was captured at the FastEthernet interface fa0/1 of the San Francisco router. The packet inside the captured frame has the source IP address 10.10.1.2, and the destination IP address is 10.31.1.20. What is the destination MAC address of the frame at the time of capture?
    • A. 

      0060.7320.D632

    • B. 

      0060.7320.D631

    • C. 

      0040.8517.44C3

    • D. 

      0009.B2E4.EE03

    • E. 

      0010.C2B4.342

  • 16. 
    Refer to the exhibit. While configuring a network, a technician wired each end of a Category 5e cable as shown. Which two statements are true about this setup? (Choose two.)
    • A. 

      The cable is suitable for connecting a switch to a router Ethernet port.

    • B. 

      The cable is suitable for connecting dissimilar types of devices.

    • C. 

      The cable is unusable and must be rewired.

    • D. 

      The cable is terminated in a way that the transmit pin is wired to the receive pin.

    • E. 

      The cable simulates a point-to-point WAN link.

  • 17. 
    Refer to the exhibit. Host A sends a frame with the destination MAC address as FFFF.FFFF.FFFF. What action will the switch take for this frame?
    • A. 

      It will drop the frame.

    • B. 

      It will send the frame back to host A.

    • C. 

      It will send the frame to all hosts except host A.

    • D. 

      It will forward the frame to the default gateway.

  • 18. 
    Well-known services and applications use which range of TCP/UDP port numbers?
    • A. 

      0 to 255

    • B. 

      0 to 1023

    • C. 

      1024 to 49151

    • D. 

      49152 to 65535

  • 19. 
    Which three IPv4 addresses represent subnet broadcast addresses? (Choose three.)
    • A. 

      192.168.4.63 /26

    • B. 

      192.168.4.129 /26

    • C. 

      192.168.4.191 /26

    • D. 

      192.168.4.51 /27

    • E. 

      192.168.4.95 /27

    • F. 

      192.168.4.221 /27

  • 20. 
    Which three statements are true about network layer addressing? (Choose three.)
    • A. 

      The addresses are 48 bits long.

    • B. 

      Network layer addressing is used by Ethernet switches to make forwarding decisions.

    • C. 

      It uses a hierarchical structure.

    • D. 

      It does not support broadcasts.

    • E. 

      It uniquely identifies each host.

    • F. 

      A portion of the address is used to identify the network.

  • 21. 
    Which OSI layer addressing is required to route packets between two networks?
    • A. 

      Layer 1

    • B. 

      Layer 2

    • C. 

      Layer 3

    • D. 

      Layer 4

  • 22. 
    What type of network is maintained if a server takes no dedicated role in the network?
    • A. 

      Mainframe

    • B. 

      Client/server

    • C. 

      Peer-to-peer

    • D. 

      Centralized

  • 23. 
    Refer to the exhibit. Host A is requesting a web page from the web server. Which option represents the socket to which the request is made?
    • A. 

      80

    • B. 

      Www.cisco.com

    • C. 

      10.0.0.130

    • D. 

      10.0.0.130:80

  • 24. 
    A routing issue has occurred in your internetwork. Which of the following type of devices should be examined to isolate this error?
    • A. 

      Access point

    • B. 

      Host

    • C. 

      Hub

    • D. 

      Router

    • E. 

      Switch

  • 25. 
    Which statement describes the correct use of addresses to deliver an e-mail message from HostB to the e-mail service that is running on ServerA?
    • A. 

      HostB uses the MAC address of ServerA as the destination.

    • B. 

      Router B uses a Layer 3 network address to route the packet.

    • C. 

      Router A uses the Layer 4 address to forward the packet to Router B.

    • D. 

      Via the use of a Layer 3 address, ServerA assigns the message to the e-mail service.

Related Topics
Back to Top Back to top