ccna 1 final

61
Page 1 of 61 1. Which of the following are the address ranges of the private IP addresses? (Choose three.) 10.0.0.0 to 10.255.255.255 200.100.50.0 to 200.100.25.255 150.150.0.0 to 150.150.255.255 172.16.0.0 to 172.31.255.255 192.168.0.0 to 192.168.255.255 127.16.0.0 to 127.31.255.255 2 Which memory contents will change as a result of using the Router# erase startup-config command on a router? RAM ROM flash NVRAM 3 Which fiber connector supports full-duplex Ethernet?

Upload: tamer-abu-shraikh

Post on 24-Oct-2014

13.830 views

Category:

Documents


3 download

TRANSCRIPT

Page 1: Ccna 1 Final

Page 1 of 61

1. Which of the following are the address ranges of the private IP addresses? (Choose three.)

10.0.0.0 to 10.255.255.255

200.100.50.0 to 200.100.25.255

150.150.0.0 to 150.150.255.255

172.16.0.0 to 172.31.255.255

192.168.0.0 to 192.168.255.255

127.16.0.0 to 127.31.255.255

2 Which memory contents will change as a result of using the Router# erase startup-config command on a

router?

RAM

ROM

flash

NVRAM

3 Which fiber connector supports full-duplex Ethernet?

Page 2: Ccna 1 Final

Page 2 of 61

4 What are the default terminal emulation software settings when configuring a Cisco device through a console

port?

Bits per second: 19200

Data bits: 7

Parity: None

Stop bits: 0

Flow control: None

Bits per second: 9600

Data bits: 8

Parity: None

Stop bits: 1

Flow control: None

Bits per second: 19200

Data bits: 7

Parity: None

Stop bits: 0

Flow control: Hardware

Bits per second: 9600

Data bits: 8

Parity: None

Stop bits: 1

Flow control: Hardware

5

Refer to the exhibit. In a network, PC1 sends a message to PC2. The frame received at PC2 is shown. What

information in this frame determines the correct destination application?

timing and synchronization bits

destination and source physical addresses

Page 3: Ccna 1 Final

Page 3 of 61

destination and source logical network addresses

destination and source process numbers

6 Which type of network makes independent routing decisions at each router as a packet travels towards the

destination?

a circuit-switched network

a connection-oriented network

a packet-switched connectionless network

a circuit switched connection-oriented network

7 What type of cable is being used if a network administrator is connecting two Cisco routers and uses the

100BaseTX standard?

rollover cable

smart serial cable

crossover UTP

straight-through UTP

8 Which password is automatically encrypted when it is created?

vty

aux

console

enable secret

enable password

9

Page 4: Ccna 1 Final

Page 4 of 61

Refer to the exhibit. A student has wired each end of a CAT 5e cable as shown. What is the result? (Choose

two.)

The cable is unusable and must be rewired.

The cable is suitable for use as a rollover cable.

The cable is suitable for use as a Fast Ethernet crossover.

The cable is suitable for use as a Gigabit Ethernet straight-through.

The cable is suitable for use between two 100 Mbps Auto-MDIX capable switches.

10 What is the protocol data unit that is associated with the data link layer of the OSI reference model?

data

frame

packet

segment

11

Page 5: Ccna 1 Final

Page 5 of 61

Refer to the exhibit. Which list refers only to end devices?

D,E,F,G

A,H,B,C

A,D,E,F

A,D,E,G

12

Refer to the exhibit. The serial interface of the router was configured with the use of the commands that are

shown. The router cannot ping the router that is directly connected to interface serial 0/0/0. What should the

network technician do to solve this problem?

Configure the description at interface serial 0/0/0.

Configure an IP address on interface serial 0/0/0.

Remove the no shutdown command at interface serial 0/0/0

Reboot the router.

13 How many host addresses may be assigned when using the 128.107.0.0 network address with a subnet mask of

255.255.248.0?

30

Page 6: Ccna 1 Final

Page 6 of 61

256

2046

2048

4094

4096

14

Refer to the exhibit. Host A and B are unable to communicate with each other. What is the reason for this?

Host A is assigned a network address.

Host B is assigned a multicast address.

Host A and host B belong to different networks.

The gateway addresses are network addresses.

Page 7: Ccna 1 Final

Page 7 of 61

15

Refer to the exhibit. Host A is unable to reach host B on the remote network. A technician attempted to ping the

local gateway and the ping was successful. To verify the host configuration, the technician issued the ipconfig

command. What is the likely cause of the problem?

The local NIC is incorrectly configured.

The subnet mask on host A is incorrectly configured.

The IP address on host A is incorrectly configured.

The default gateway on host A is incorrectly configured.

16 A user sees the command prompt: Router(config-if)# . What task can be performed at this mode?

Reload the device.

Perform basic tests.

Configure individual interfaces.

Configure individual terminal lines.

17 Which command can be issued on a PC to determine which TCP/IP ports are in use?

tracert

netstat

nslookup

Page 8: Ccna 1 Final

Page 8 of 61

ipconfig /all

18

Refer to the exhibit. The diagram represents the process of sending e-mail between clients. Which list correctly

identifies the component or protocol used at each numbered stage of the diagram?

1.MUA 2.MDA 3.MTA 4.SMTP 5.MTA 6.POP 7.MDA 8.MUA

1.MUA 2.POP 3.MDA 4.SMTP 5.MTA 6.MDA 7.SMTP 8.MUA

1.MUA 2.POP 3.SMTP 4.MDA 5.MTA 6.SMTP 7.POP 8.MUA

1.MUA 2.SMTP 3.MTA 4.SMTP 5.MTA 6.MDA 7.POP 8.MUA

19 Which type of IP address is 192.168.88.207/28?

host address

network address

multicast address

broadcast address

20 What information is used at each hop to determine where the packet will be forwarded next?

the IP packet header

the incoming interface

the transport layer PDU

the source MAC address

Page 9: Ccna 1 Final

Page 9 of 61

21 Which topology divides the collision domain and provides full media bandwidth to the hosts in the network?

Page 10: Ccna 1 Final

Page 10 of 61

22

Refer to the exhibit. A PC is connected to a network. Which action will verify that the PC can communicate with

its default gateway?

Use the ping 127.0.0.1 command.

Use the ipconfig command.

Use the ipconfig/all command.

Use the ping 10.0.0.254 command.

Page 11: Ccna 1 Final

Page 11 of 61

23

Refer to the exhibit. Host A attempts to establish a TCP/IP session with host C. During this attempt, a frame was

Page 12: Ccna 1 Final

Page 12 of 61

captured with the source MAC address 0050.7320.D632 and the destination MAC address 0030.8517.44C4. The

packet inside the captured frame has an IP source address 192.168.7.5, and the destination IP address is

192.168.219.24. At which point in the network was this packet captured?

leaving host A

leaving ATL

leaving Dallas

leaving NYC

24

Refer to the exhibit. A network technician is trying to determine the correct IP address configuration for Host A.

What is a valid configuration for Host A?

IP address: 192.168.100.19; Subnet Mask: 255.255.255.248; Default Gateway: 192.16.1.2

IP address: 192.168.100.20; Subnet Mask: 255.255.255.240; Default Gateway: 192.168.100.17

IP address: 192.168.100.21; Subnet Mask: 255.255.255.248; Default Gateway: 192.168.100.18

IP address: 192.168.100.22; Subnet Mask: 255.255.255.240; Default Gateway: 10.1.1.5

IP address: 192.168.100.30; Subnet Mask: 255.255.255.240; Default Gateway: 192.168.1.1

IP address: 192.168.100.31; Subnet Mask: 255.255.255.240; Default Gateway: 192.168.100.18

Page 13: Ccna 1 Final

Page 13 of 61

25

Refer to the exhibit. Host A sends a frame to host C with a destination MAC address CC. The MAC address for

host C is not in the MAC table of switch SW1. How will SW1 handle the frame?

Switch SW1 will drop the frame.

Switch SW1 will forward the frame to host C.

Switch SW1 will flood the frame out all ports.

Switch SW1 will flood the frame out all ports except port Fa0/1.

26 Which statement is true about private IP addresses?

Hosts in different organizations should not use the same private space IP addresses.

Any private IP address can be used to test the functionality of the NIC card on the network devices.

Private IP addresses should be used for hosts that send traffic on the local network and do not require access

to the Internet.

Any private IP address can be automatically assigned to the local host by the operating system in

environments where no other IP configuration is available.

27 What is the correct order for PDU encapsulation?

Page 14: Ccna 1 Final

Page 14 of 61

28

Refer to the exhibit. The router of the company failed and was replaced. After the replacement, hosts C and D in

the Education office are able to ping each other, but they are unable to access the hosts in the Accounts office.

What is the likely cause of the problem?

The IP address at the fa0/0 interface of the router is incorrectly configured.

The subnet mask at the fa0/1 interface of the router is incorrectly entered.

The IP address at the serial interface of the router is incorrectly configured.

The hosts in the Accounts office are not on the same subnet as the hosts in the Education office.

29

Page 15: Ccna 1 Final

Page 15 of 61

Refer to the exhibit. Which two layers of the OSI model describe the same functions as the transport and

intenrnet layers of the TCP/IP model? (Choose two.)

application layer

presentation layer

session layer

transport layer

network layer

data link layer

physical layer

30 Which type of media is immune to EMI and RFI? (Choose two.)

10 Base-T

10 Base-2

10 Base-5

100 Base-FX

100 Base TX

1000 Base LX

Which statement is true about the TTL value of an IPv4 packet?

It determines the priority of a packet.

It specifies the remaining "life" of the packet.

It indicates that the packet has been fragmented.

Page 16: Ccna 1 Final

Page 16 of 61

It denotes the data payload type that the packet is carrying.

32 What type of network is maintained if a server takes no dedicated role in the network?

mainframe

client/server

peer-to-peer

centralized

33

Refer to the exhibit. At which OSI layer is serial interface 0/0/1 experiencing problems?

Layer 1

Layer 2

Layer 3

Layer 4

Page 17: Ccna 1 Final

Page 17 of 61

34 A network administrator subnets the network 192.168.1.0/24 into four subnets. Which option correctly

addressses Router1 and host A into the second subnet created?

35 Which device should be used for enabling a host to communicate with another host on a different network?

switch

hub

Page 18: Ccna 1 Final

Page 18 of 61

router

host

36 A user types the enable command. What task can be performed at the privileged EXEC mode?

Configure the device.

Configure individual interfaces.

Configure individual terminal lines.

Issue show and debug commands.

37 To enhance security in a network, the network administrator uses these commands:

Router(config)# line console 0

Router(config-line)# password j1mdi2

Router(config-line)# login

What two conclusions are evident from these commands? (Choose two.)

Users who attempt to connect to the console port of the router must enter a password.

The entries permit access through the console by the use of j1mdi2 as the password.

The entries eliminate the need for authentication.

Access through the console will be denied because the console configuration is incomplete.

The entries prevent passwords from being displayed as plain text.

38 Which option represents a point-to-point logical topology diagram?

Page 19: Ccna 1 Final

Page 19 of 61

39 What purpose does a hostname serve on a router?

uniquely identifies a router on the internet

used by routing protocols to identify peer routers

provides device identification to users logging on remotely

determines the hosts that are allowed to connect to the device

Page 20: Ccna 1 Final

Page 20 of 61

40

Refer to the exhibit. The ping 127.0.0.1 command is issued on the local host. What do the ping results

indicaaate?

The local host can send packets on the local network.

The TCP/IP stack on the local host operates properly.

The local host has full connectivity to the default gateway.

The local host has full connectivity to the remote network.

41

Which statement describes the correct use of addresses to deliver an e-mail message from HostB to the e-mail

Page 21: Ccna 1 Final

Page 21 of 61

service that is running on ServerA?

HostB uses the MAC address of ServerA as the destination.

Router B uses a Layer 3 network address to route the packet.

Router A uses the Layer 4 address to forward the packet to Router B.

Via the use of a Layer 3 address, ServerA assigns the message to the e-mail service.

42 In which scenario would a crossover cable be required between Ethernet ports on the devices?

computer to hub

computer to router

computer to switch

switch to router

43 Which OSI layer does IP rely on to determine whether packets have been lost and to request retransmission?

application

presentation

session

transport

44

Page 22: Ccna 1 Final

Page 22 of 61

Refer to the exhibit. A PC is communicating with another PC on a remote network. The two networks are

connected by three routers. Which action will help to identify the path between the hosts?

Use the ipconfig command at the host.

Use the ipconfig/all command at the destination.

Use the tracert command at the host.

Use the ping command at the destination.

45 Which statement is true about the operations of the IPv4 protocol?

IPv4 includes additional fields in the IP header, which are required for reliable delivery of the packet.

IPv4 operates independently of the media that carry the data at lower layers of the protocol stack.

IPv4 provides error control and tracking for the data delivery, and retransmits the packet if it is corrupted.

IPv4 is a connection-oriented protocol that requires some control data to be exchanged to establish the

connection before data transmission.

What three statements are true about network layer addressing? (Choose three.)

Network layer addressing uses a hierarchy.

It uses addresses that are 48 bits in length.

It is used by Ethernet switches to make forwarding decisions.

It does not support broadcasts.

It uses a method by which the network portion of an address can be identified.

Network layer addressing identifies each host distinctly.

Page 23: Ccna 1 Final

Page 23 of 61

47 A network administrator is asked to design a new addressing scheme for a corporate network. There are 60 users

in the main office, 40 users in the branch office, 28 users in manufacturing, 12 in the sales office, and 4 users in

the research office. Which VLSM addressing scheme that uses the 192.168.88.0/24 network will fulfill the

requirements while wasting the fewest addresses?

192.168.88.0/26 main

192.168.88.32/26 branch

192.168.88.64/26 manufacturing

192.168.88.96/27 sales

192.168.88.128/28 research

192.168.88.0/26 main

192.168.88.64/26 branch

192.168.88.128/27 manufacturing

192.168.88.160/28 sales

192.168.88.176/29 research

192.168.88.0/27 main

192.168.88.32/27 branch

192.168.88.64/28 manufacturing

192.168.88.80/29 sales

192.168.88.88/30 research

192.168.88.0/27 main

192.168.88.64/28 branch

192.168.88.80/28 manufacturing

192.168.88.96/29 sales

192.168.88.104/30 research

48 Which exhibit shows the interface that is configured by the command, router(config)# interface serial 0/0/1?

Page 25: Ccna 1 Final

Page 25 of 61

Refer to the exhibit. Which service is needed in order for the hosts to access the Internet?

NAT

RIP

FTP

DHCP

50 When must a router serial interface be configured with the clock rate command?

when the interface is functioning as a DTE device

when the interface timers have been cleared

when the connected DTE device is shut down

when the interface is functioning as a DCE device

51

Page 26: Ccna 1 Final

Page 26 of 61

Refer to the exhibit. Which layered network model is shown in the diagram?

Cisco

IETF

OSI

TCP/IP

52

Page 27: Ccna 1 Final

Page 27 of 61

Refer to the exhibit. How will data files get retrieved from the server?

The client establishes a two-way connection to the server on port 21 for file transfer.

From the perspective of computer A, port 21 is used to signal a push to the server, and port 20 is used to

signal a pull from the server.

There is a connection established to send files from the client to the server and a second connection to get

files from the server to the client.

Computer A establishes a connection to the server on port 21 for control and uses a second connection on

port 20 to download and upload files.

Refer to the exhibit. A user wants to access the Internet from the PC. A part of the running configuration of the

router is shown. Which default gateway IP address should be configured at the PC to enable this access?

10.1.192.1

10.1.192.2

Page 28: Ccna 1 Final

Page 28 of 61

10.1.192.54

192.31.7.1

32

Refer to the exhibit. Host A uses router A as its default gateway. If host A sends an ICMP echo request to

172.16.10.0, what ICMP response will host A receive.

echo reply

source quench

route redirection

destination unreachable

34 Which topology represents a collision-free environment?

Page 29: Ccna 1 Final

Page 29 of 61

35

Refer to the exhibit. A host is using NAT to connect to the Internet. Which three IP addresses enable this

connection? (Choose three.)

10.1.1.63

10.1.1.37

10.1.1.39

10.1.1.32

10.1.1.60

10.1.1.2

36 What action is taken by a host on an Ethernet network when the host attempts to contact a remote host on

another network?

The packet is sent using the IP and MAC address of the destination host.

Page 30: Ccna 1 Final

Page 30 of 61

The packet is sent using the IP address and MAC address of the default gateway.

The packet is sent using the IP address of the destination host and MAC address of the default gateway.

The packet is sent using the IP address of the default gateway and the MAC address of the destination host.

37 Which OSI layer uses the header information to reassemble the data segments into streams?

application layer

network layer

presentation layer

session layer

transport layer

38 Well-known services and applications use which range of TCP/UDP port numbers?

0 to 255

0 to 1023

1024 to 49151

49152 to 65535

39 Which password would allow a user to establish a Telnet session with a Cisco device?

VTY password

enable password

console password

enable secret password

40 Which application layer protocol allows administrators to log into a server from remote locations and control a

server as though logged in locally?

DNS

FTP

DHCP

SMTP

Telnet

Page 31: Ccna 1 Final

Page 31 of 61

41

Refer to the exhibit. Each media link is labeled. What type of cable should be used to connect the different

devices?

Connection 1 - rollover cable

Connection 2 - straight-through cable

Connection 3 - crossover cable

Connection 1 - crossover cable

Connection 2 - rollover cable

Connection 3 - crossover cable

Connection 1 - straight-through cable

Connection 2 - crossover cable

Connection 3 - crossover cable

Connection 1 - straight-through cable

Connection 2 - crossover cable

Connection 3 - straight-through cable

Connection 1 - crossover cable

Connection 2 - straight-through cable

Connection 3 - crossover cable

43

Refer to the exhibit. Which type of network design is shown?

client/server

wide area

dedicated server

peer-to-peer

44 Which service is used when the nslookup command is issued on a computer?

Page 32: Ccna 1 Final

Page 32 of 61

FTP

DNS

DHCP

Telnet

45 Which two functions of the OSI model occur at layer two? (Choose two.)

physical addressing

encoding

routing

cabling

media access control

46 What information is contained in the header of Layer 3 to help data delivery?

port number

device physical address

destination host logical address

virtual connection identifier

49 A network technician has made a UTP cable that is terminated as T568A on one end and T568B on the

opposite end. What type of cable has been constructed?

patch

console

crossover

straight-through

50 Which OSI layer addressing is required to route packets between two networks?

Layer 1

Layer 2

Layer 3

Layer 4

What is the Cisco IOS?

system software for Cisco devices

Page 33: Ccna 1 Final

Page 33 of 61

Read Only Memory in Cisco devices

non-volatile storage for device configurations

an initial operating system that is used for boot functions

17

Refer to the exhibit. Which list refers only to end devices?

D,E,F,G

A,H,B,C

A,D,E,F

A,D,E,G

18 Which three IPv4 addresses represent subnet broadcast addresses? (Choose three.)

192.168.4.63 /26

192.168.4.129 /26

192.168.4.191 /26

192.168.4.51 /27

192.168.4.95 /27

192.168.4.221 /27

19 Which TCP/IP model layer creates additional overhead on network resources due to acknowledgments, tracking,

and retransmission of data?

internet

Page 34: Ccna 1 Final

Page 34 of 61

transport

application

network access

20

Refer to the exhibit. Which option shows the correct topology given the configuration of Router1?

Page 35: Ccna 1 Final

Page 35 of 61

22 Which device should be used for enabling a host to communicate with another host on a different network?

switch

hub

router

host

23

Refer to the exhibit. Cable A is plugged into the console port on switch S1. What is required on the PC for a

network technician to enter the initial configuration on S1?

a terminal emulation program

a web browser

a Telnet client

an FTP client

24

Page 36: Ccna 1 Final

Page 36 of 61

Refer to the exhibit. Host A is transmitting data to host B. Which address combination will be used as the data

leaves the Router1 Fa0/1 interface?

Destination IP: 192.168.72.2 Source MAC: 0007.C2B4.3421

Destination IP: 192.168.10.4 Source MAC: 0030.8596.DE81

Destination IP: 192.168.10.4 Source MAC: 0007.C2B4.3421

Destination IP: 192.168.72.2 Source MAC: 0030.8596.DE81

26

Refer to the exhibit. An employee wants to access the organization intranet from home. Which intermediary

device should be used to connect the organization intranet to the Internet to enable this access?

hub

switch

router

Page 37: Ccna 1 Final

Page 37 of 61

wireless access point

27

Refer to the exhibit. All routers in the network are configured with the correct IP addresses and routing protocol.

Host A sends a packet to host B. Which exhibited steps will be executed on each of the routers in the network?

Routers R1 and R2 execute all six steps.

Routers R1 and R2 execute steps 1, 2, 3, 4, and 6.

Router R1 executes steps 1,2,3,4, and 6. Router R2 executes all six steps.

Router R1 executes all six steps. Router R2 executes steps 1,2,3,4, and 6.

29 Which connection has a logical point-to-point topology but not a physical one?

a fiber optic cable that connects two buildings on an enterprise campus

a circuit that connects two routers through a service provider network

a Category 5 cable that connects a PC to an Ethernet switch

a wireless connection between a laptop and an AP

30

Page 38: Ccna 1 Final

Page 38 of 61

Refer to the exhibit. What function does router RT_A need to provide to allow Internet access for hosts in this

network?

address translation

DHCP services

ftpd

web server

An organization has been assigned network ID 10.10.128.0 and subnet mask 255.255.224.0. Which IP address

range can be used for this organization?

10.10.128.0 to 10.10.160.255

10.10.128.0 to 10.10.159.255

10.10.128.0 to 10.10.192.255

10.10.128.0 to 10.10.0.159

10.10.128.0 to 10.10.159.0

2

Page 39: Ccna 1 Final

Page 39 of 61

Refer to the exhibit. Host A sends a frame with the destination MAC address as FFFF.FFFF.FFFF. What action

will the switch take for this frame?

It will drop the frame.

It will send the frame back to host A.

It will send the frame to all hosts except host A.

It will forward the frame to the default gateway.

3

Refer to the exhibit. Host A is configured with the correct IP address for the default gateway of the router R11

FastEthernet0/1 interface. How will a packet that is sent from host A to host B be handled by the devices on the

network?

Page 40: Ccna 1 Final

Page 40 of 61

R1 will drop the packet because R1 does not have a specific route in its routing table to the 10.1.1.0/24

network.

R1 will forward the packet to its default gateway, the next hop router R2. R2 will forward the packet to the

directly connected network 10.1.1.0/24.

R1 will forward the packet to its default gateway, the next hop router R2. R2 will drop the packet because it

does not have a default route to network 10.1.1.0/24.

R1 will forward the packet to its default gateway, the next hop router R2. R2 will drop the packet because it

does not have a route that is learned by a routing protocol to network 10.1.1.0/24.

4 A network technician is tasked with setting up a network for six users, but the users should be able to use their

accounts to log on from any of the six computers. What type of network should be used?

workgroup

P2P applications

peer-to-peer network

client-server network

5

Refer to the exhibit. Assume all devices are using default configurations. How many subnets are required to

address the topology that is shown?

1

3

4

5

7

6

Page 41: Ccna 1 Final

Page 41 of 61

Refer to the exhibit. What three statements are true about the IP configuration that is shown? (Choose three.)

The address that is assigned to the computer represents private addressing.

The computer is unable to communicate outside of the local network.

The network of this computer can have 126 hosts.

The prefix of the computer address is /27.

The IP address that is assigned to the computer is routable on the Internet.

The IP address that is assigned to the computer is a broadcast address.

7 A network has grown too large for technicians to configure network addresses and hosts files for name

resolution. Which two application layer services should be added to the server to allow these needs to be

satisfied dynamically? (Choose two.)

DNS

FTP

DHCP

HTTP

SMTP

Page 42: Ccna 1 Final

Page 42 of 61

9 Which physical component is used to access and perform the initial configuration on a new unconfigured router?

10

Page 43: Ccna 1 Final

Page 43 of 61

Refer to the exhibit. Host A is able to access resources on the local LAN but is unable to access any resources on

the Internet. What is the likely cause of this problem?

The host subnet mask in incorrect.

The network uses private addresses.

The host address is a network address.

The default gateway is on a different subnet from the host.

11

Page 44: Ccna 1 Final

Page 44 of 61

Refer to the exhibit. Host A is trying to send data to host E. When host A sends out an ARP request, what

response should be received?

00-08-a3-d6-ab-17

00-10-7b-e7-fa-ef

00-0d-88-c7-9a-24

Destination Unreachable from RouterA

12 What is the effect of using the Router# copy running-config startup-config command on a router?

The contents of ROM will change.

The contents of RAM will change.

The contents of NVRAM will change.

The contents of flash will change.

13

Page 45: Ccna 1 Final

Page 45 of 61

Refer to the exhibit. When host A sends a frame addressed for host D, which hosts will receive the frame?

only host D

only hosts A and D

only hosts B, C, and D

all hosts

14 What is the consequence of issuing the erase startup-config command in privileged EXEC mode on a Cisco

router?

Data stored in RAM will be removed.

Data stored in NVRAM will be erased.

Information in flash memory will be removed.

Flags in the configuration register will be set to 0.

Page 46: Ccna 1 Final

Page 46 of 61

Both the startup-config and the running-config will be erased.

15

PC1 cannot reach the file server. A network administrator tests the connectivity using the tracert command on

PC1. Based on the provided output, which network segment causes the failure of connectivity?

the network between PC1 and switch SW1

the network between SW1 and router R1

the network between routers R1 and R2

the network between router R2 and the file server

17

Page 47: Ccna 1 Final

Page 47 of 61

Refer to the exhibit. Which Layer 2 protocol could be used inside nework A and network C?

IP

TCP

UDP

Ethernet

Page 48: Ccna 1 Final

Page 48 of 61

Refer to the exhibit. The tracert command is initiated from PC1 to PC4. Which device will send

a response to the initial tracert packet from PC1?

Athens

Ankara

London

Paris

PC4

5 Two routers are connected via their serial ports in a lab environment. The routers are configured with valid IP

addresses, but they cannot ping each other. The show interface serial0/0 command shows that the serial0/0

interface is up but the line protocol is down. What could be the cause of this problem?

The no shutdown command has not been applied to the interfaces.

The clock rate command has not been entered on the DCE interface.

The interface timers are not cleared.

The FastEthernet interface is emulating a serial interface by assigning it a timing signal.

7 When connectionless protocols are implemented at the lower layers of the OSI model, what is usually used to

acknowledge that the data was received and to request the retransmission of missing data?

IP

UDP

Ethernet

a connectionless acknowledgement

an upper-layer, connection-oriented protocol or service

Page 49: Ccna 1 Final

Page 49 of 61

Refer to the exhibit. Host A is requesting a web page from the web server. Which option represents the

socket to which the request is made?

80

www.cisco.com

10.0.0.130

10.0.0.130:80

Page 50: Ccna 1 Final

Page 50 of 61

Refer to the exhibit. Which option correctly identifies the network address, range of host

addresses, and the broadcast address for the network that contains host A?

In a network design project, a network designer needs to select a device to provide collision free

connections to 40 hosts on the LAN. Which device should be selected?

Page 51: Ccna 1 Final

Page 51 of 61

hub

router

switch

firewall

A technician is tasked with networking five users. The five users will be in the same broadcast domain

and the chance of collisions must be minimized. Which device should be selected to accomplish the

design?

hub

switch

router

firewall

21 Which option correctly identifies the interface or interfaces used to connect the router to a CSU/DSU for WAN

connectivity?

Page 52: Ccna 1 Final

Page 52 of 61

Page 53: Ccna 1 Final

Page 53 of 61

22 To send data through a network, what two flags are used to establish a session? (Choose two.)

ACK

CRC

SYN

Ack #

Port #

Seq #

Refer to the exhibit. A host is connected to hub 1. Which combination of IP address, subnet mask, and

default gateway can allow this host to function in the network?

IP address: 172.16.31.36 Subnet mask: 255.255.255.240 Default gateway: 172.16.31.35

IP address: 172.16.31.63 Subnet mask: 255.255.255.224 Default gateway: 172.16.31.35

IP address: 172.16.31.29 Subnet mask: 255.255.255.248 Default gateway: 172.16.31.35

IP address: 172.16.31.32 Subnet mask: 255.255.255.224 Default gateway: 172.16.31.35

IP address: 172.16.31.29 Subnet mask: 255.255.255.240 Default gateway: 172.16.30.1

Page 54: Ccna 1 Final

Page 54 of 61

IP address: 172.16.31.37 Subnet mask: 255.255.255.224 Default gateway: 172.16.31.35

What happens when a node on an Ethernet network is creating a frame and it does not have the

destination MAC address?

The node drops the frame.

The node sends out a Layer 3 broadcast message.

The node sends a message directly to the router for the address.

The node sends out an ARP request with the destination IP address.

Refer to the exhibit. A router, the table of which is shown, receives a packet that is destined for

192.168.9.4. How will the router treat the packet?

It will drop the packet.

It will forward the packet via FastEthernet 0/1

. It will forward the packet to the next hop address.

Page 55: Ccna 1 Final

Page 55 of 61

It will forward the packet to 172.16.2.0

Refer to the exhibit. A network administrator remotely accesses the CLI of RouterB from PC1 using

Telnet. Which statement is true about this connection?

The data is automatically encrypted.

A Telnet server process is running on PC1.

The connection is made through a VTY session on the router.

A GET request was sent to RouterB to retrieve data during this session.

Which option shows how a router will route packets to a remote network?

Page 56: Ccna 1 Final

Page 56 of 61

Which combination of network id and subnet mask correctly identifies all IP addresses from

172.16.128.0 through 172.16.159.255?

172.16.128.0 255.255.255.224

172.16.128.0 255.255.0.0

172.16.128.0 255.255.192.0

172.16.128.0 255.255.224.0

Page 57: Ccna 1 Final

Page 57 of 61

172.16.128.0 255.255.255.192

How can ARP be used to help document the network?

It can list each hop on the way to a destination host.

It can show the average latency of hosts on the network.

It can provide a list of physical addresses on the network.

It can indicate which hosts are not responding to network traffic.

Which prompt represents the appropriate mode used for the copy running-config startup-

config command ?

Switch-6J>

Switch-6J#

Switch-6J(config)#

Switch-6J(config-if)#

Switch-6J(config-line)#

Which application belongs to the category of the client/server model?

using Telnet to access a router

exchanging information via instant messaging

printing a document to a locally connected printer

scanning a document with a directly connected scanner

What information can be gathered by using the command netstat?

the default gateway

the routing protocol

active TCP connections

the locally configured subnet mask

Page 58: Ccna 1 Final

Page 58 of 61

Refer to the exhibit. When computer A sends a frame to computer D, what computers receive the

frame?

only computer D

only computer A and computer D

only computer B, computer C, and computer D

all computers

Which two types of media can provide bandwidth up to 1 Gb/s? (Choose two.)

10 BASE-T

100 BASE-T

100 BASE-FX

1000 BASE-TX

1000 BASE-SX

Page 59: Ccna 1 Final

Page 59 of 61

Refer to the exhibit. RouterB is configured properly. The Ethernet interface Fa0/0 of RouterA is configured

with the use of the commands that are shown. However, a ping from the Fa0/0 interface of RouterA to the

Fa0/0 interface of RouterB is unsuccessful. What action should be taken on RouterA to solve this problem?

Use the description command on the FastEthernet interface Fa0/0.

Configure the clock rate of the FastEthernet interface Fa0/0.

Use the no shutdown command on the FastEthernet interface Fa0/0.

Reboot the router.

44 What happens when a host station receives a frame that contains its own MAC address in the destination field?

The Layer 2 information is removed and the frame is pushed up to Layer 3.

The host station will copy the information to its buffers and send it back out.

The frame originated from the host and will be ignored.

The Layer 3 information is added to the frame.

Refer to the exhibit. Host A sends data to host B. Which destination MAC and IP addresses will

be encapsulated in the frames when they leave host A?

Page 60: Ccna 1 Final

Page 60 of 61

172.16.5.3

2b-53-72-00-1a-2b

172.16.5.3

00-1c-00-5b-3c-2a

192.168.3.1

2b-53-72-00-1a-2b

192.168.3.1

00-1c-00-5b-3c-2a

What two processes are specified by the transport layer? (Choose two.)

signaling

routing

encryption

segmentation

windowing

If the first octet of an IP address begins with binary 101, what class is the address?

Class A

Class B

Class C

Class D

Refer to the exhibit. A user on PC1 wants to access a web server on the Internet. An ARP request

has been initiated from PC1. Which MAC address will be encapsulated as a destination address

in the header of the Ethernet frame when the web request packet is sent out?

the MAC address of Fa0/10 interface on SW1

Page 61: Ccna 1 Final

Page 61 of 61

the MAC address of Fa0/0 interface on R1

the MAC address of Fa0/1 interface on R2

the MAC address of the web server

Which statement is true about the CSMA/CD access method that is used in Ethernet?

When a device hears a carrier signal and transmits, a collision cannot occur.

A jamming signal causes only devices that caused the collision to execute a backoff algorithm.

All network devices must listen before transmitting.

Devices involved in a collision get priority to transmit after the backoff period.