Docsity
Docsity

Prepare for your exams
Prepare for your exams

Study with the several resources on Docsity


Earn points to download
Earn points to download

Earn points by helping other students or get them with a premium plan


Guidelines and tips
Guidelines and tips

CCNA Practice Final Exam 1 Questions and Answers (Verified Answers)2 combined latest versi, Exams of Communication

A list of CCNA practice exam questions and answers related to networking concepts such as subnet masks, name servers, attenuation, CSMA/CA, DHCP, spam filter software, binary format, POP3, UTP cabling, network modes, operating systems, and more. The questions are designed to test the knowledge of students preparing for the CCNA certification exam.

Typology: Exams

2022/2023

Available from 07/20/2023

coursehero
coursehero 🇺🇸

4

(62)

1.6K documents

1 / 23

Toggle sidebar

Related documents


Partial preview of the text

Download CCNA Practice Final Exam 1 Questions and Answers (Verified Answers)2 combined latest versi and more Exams Communication in PDF only on Docsity!

1

CCNA Practice Final Exam 1 Questions and

Answers

(Verified Answers)2 combined latest versions

Version 1

What is the default subnet mask for an IP address of 64.100.19.14? - correct answer ✅255.0.0.0.

A network administrator has been notified that users have experienced problems gaining access to network resources. What utility could be used to directly query a name server for information on a destination domain? - correct answer ✅lookup.

What does the term "attenuation" mean in data communication? - correct answer ✅loss of signal strength as distance increases.

What is the function of CSMA/CA on a wireless Ethernet network? - correct answer ✅to prevent collisions.

2

The area covered by a single AP is known as what? - correct answer ✅basic

service set.

The help desk at a large packaging company receives a call from a user who

is concerned about lost data files on the local PC. The help desk technician

3

learns that the user clicked on an icon that appeared to be a program

update, but no updates were scheduled for that program. What type of

attack has likely occurred? - correct answer ✅worm.

Which installation option enables a single physical resource to function

simultaneously as multiple logical resources? - correct answer ✅multi-

boot.

Which part of the electromagnetic spectrum is commonly used to exchange

data between a PDA and a computer? - correct answer ✅infrared

A company has a web server that must be accessible to both external and

internal clients. Which security policy best practice should be followed to

maximize security of the server? - correct answer ✅Place the web server in

a DMZ

What is specified by the host bits in an IP address? - correct answer

✅identity of the computer on the network.

4

For an IP address, what component decides the number of bits that is used

to represent the host ID? - correct answer ✅subnet mask.

What advantage does a peer-to-peer network have over a client-server

network? - correct answer ✅It increases scalability.

Refer to the exhibit. If H4 sends a message to H1 and the destination MAC

address is in the MAC table for both Switch1 and Switch2, which host

devices will receive the message? - correct answer ✅only H1.

Refer to the graphic. Assume that the exhibited output is from a host that is

connected to a Linksys integrated router. What is one of the first things you

should check? - correct answer ✅link status LED on the front of the router

Which of the following are the address ranges of the private IP addresses?

(Choose three.) - correct answer ✅10.0.0.0 to 10.255.255.255, 172.16.0.

to 172.31.255.255, 192.168.0.0 to 192.168.255.

5

When acting as a DHCP server, an integrated router can provide what three

types of information to a client? (Choose three.) - correct answer ✅default

gateway, dynamic IP address, DNS server address

What is the purpose of spam filter software? - correct answer ✅It examines

incoming e-mail messages to identify the unsolicited ones.

A network engineer wants to represent confidential data in binary format.

What are the two possible values that the engineer can use? (Choose two.) -

correct answer ✅0, 1

Which protocol in its default configuration downloads e-mail messages to

the client computer and deletes them from the server? - correct answer

✅POP

Refer to the exhibit. A user on host A sends an e-mail to the user on host B.

Which type of message does host A send? - correct answer ✅Unicast

6

What are two best practices that are used when configuring a small home

WLAN? (Choose two.) - correct answer ✅the encryption of the SSID, the

use of pre-shared keys

What type of message is sent to a specific group of hosts? - correct answer

✅Broadcast

Refer to the exhibit. Why would a network administrator use the network

mode that is shown? - correct answer ✅to support hosts that use different

802.11 standards

A network technician is required to provide access to the Internet for a large

company. What is needed to accomplish this task? - correct answer ✅ISP

Which type of computer uses an integrated monitor and keyboard? - correct

answer ✅Laptop

Which transport layer protocol is used when an application requires

acknowledgment that data has been delivered? - correct answer ✅TCP

7

Refer to the exhibit. What cabling fault does the exhibit represent? - correct

answer ✅split pair

Which two statements are true about local applications? (Choose two.) -

correct answer ✅They are stored on the local hard disk, They run on the

computer where they are installed

Where do ISPs get the public addresses that they assign to end users? -

correct answer ✅ISPs obtain address blocks from registry organizations

Which two transport layer protocols enable hosts to communicate and

transfer data? (Choose two.) - correct answer ✅TCP, UDP

Which part of a data packet is used by a router to determine the destination

network? - correct answer ✅destination IP address

When terminating UTP cabling, why is it important to untwist only a small

amount of each wire pair? - correct answer ✅minimizes crosstalk

8

A learner wants to interact with the operating system of a computer. Which

two methods can be used for this? (Choose two.) - correct answer ✅CLI,

GUI

What is the purpose of the ipconfig /release command? - correct answer

✅It forces a client to give up its current IP address.

What is the purpose of creating a DMZ during network firewall

implementation? - correct answer ✅to allow for a publicly accessible zone

without compromising the internal network

A user is unable to send e-mail. While troubleshooting this problem, the

network technician first verifies the physical connectivity of cables. Which

troubleshooting approach is being followed? - correct answer ✅bottom-up

What is the function of the DNS server? - correct answer ✅It translates a

computer or domain name to the associated IP address

9

What layer is the first point of entry for a host into the network? - correct

answer ✅access layer

Your school network blocks all websites related to online gaming. What type

of security policy is being applied? - correct answer ✅acceptable use

A host sent a message that all other hosts on the switched local network

received and processed. What type of domain are all these hosts a part of? -

correct answer ✅Broadcast domain

What are two examples of storage peripheral devices? (Choose two.) -

correct answer ✅Flash drive, external DVD

What type of cable would be required to connect a Linksys router to a wired

PC? - correct answer ✅crossover cable

Refer to the exhibit. What is the effect of setting the security mode to WEP

on the Linksys integrated router? - correct answer ✅The WEP security

10

mode encrypts network traffic during transmission between the AP and the

wireless client

In an attempt to verify connectivity, a user issues the ping command to a

device that is not on the local network. The ping is unsuccessful. What can

be determined from this result? - correct answer ✅Further troubleshooting

will be required to reach a definite conclusion

Which two causes of networking problems are related to the physical layer?

(Choose two.) - correct answer ✅disconnected cables, improper operation

of cooling fans

What is an advantage of selecting an operating system that has a commercial

license over one with a GPL license? - correct answer ✅The commercial

license-based operating system provides structured support.

Refer to the exhibit. Assume that the command output is from a wireless

DHCP client that is connected to a Linksys integrated router. What can be

deduced from the output? - correct answer ✅The wireless connection is

operational

Refer to the exhibit. What is the purpose of assigning a network name of

College? - correct answer ✅It identifies the wireless LAN

Because of an increasing number of users, bandwidth per user on a WLAN has decreased to a point where users are complaining about poor performance. What can be done to improve the user experience? - correct answer ✅Reduce the number of devices using each channel

A network technician suspects that malware on a user PC is opening multiple TCP connections to a specific foreign host address. Which Windows command line utility can be used to confirm the multiple TCP connections? - correct answer ✅Ping

Version 2

CCNA 1 Final Exam ALL Questions and Answers (Verified

Answers)

Which communication tool allows real-time collaboration? - correct answer ✅instant messaging.

A host is accessing a Web server on a remote network. Which three functions are performed by intermediary network devices during this conversation? (Choose three.) - correct answer ✅regenerating data signals

applying security settings to control the flow of data notifying other devices when errors occur

A home user is looking for an ISP connection that provides high speed digital transmission over regular phone lines. What ISP connection type should be

used? - correct answer ✅DSL

A company is expanding its business to other countries. All branch offices must remain connected to corporate headquarters at all times. Which network technology is required to support this requirement? - correct answer ✅WAN.

Refer to the exhibit. From which location did this router load the IOS? - correct answer ✅flash memory

Which connection provides a secure CLI session with encryption to a Cisco

network device? - correct answer ✅an SSH connection.

Refer to the exhibit. An administrator is trying to configure the switch but receives the error message that is displayed in the exhibit. What is the

problem? - correct answer ✅The administrator must first enter privileged EXEC mode before issuing the command.

An administrator uses the Ctrl-Shift-6 key combination on a switch after issuing the ping command. What is the purpose of using these keystrokes? -

correct answer ✅to interrupt the ping process.

What function does pressing the Tab key have when entering a command in

IOS? - correct answer ✅It completes the remainder of a partially typed word in a command.

Refer to the exhibit. An administrator wants to change the name of a brand- new switch, using the hostname command as shown. What prompt will display after the command is issued?

Switch(config) # hostname My Switch - correct answer ✅Switch(config)#?

Refer to the exhibit. A network administrator is configuring access control to switch SW1. If the administrator uses Telnet to connect to the switch, which

password is needed to access user EXEC mode? - correct answer ✅linevtyin

After making configuration changes, a network administrator issues a copy running-config startup-config command in a Cisco switch. What is the result

of issuing this command? - correct answer ✅The new configuration will be loaded if the switch is restarted.

Refer to the exhibit. Which action will be successful? - correct answer ✅PC2 can send a ping to 192.168.1.1.

Which IPv4 address can be pinged to test the internal TCP/IP operation of a host? - correct answer ✅127.0.0.

What three application layer protocols are part of the TCP/IP protocol suite? (Choose three.) - correct answer ✅DCHP

DNS

FTP

Which two protocols function at the internet layer? (Choose two.) - correct

answer ✅ICMP

IP

Which publicly available resources describe protocols, processes, and technologies for the Internet but do not give implementation details? - correct answer ✅Request for Comments

Which address on a PC does not change, even if the PC is moved to a different network? - correct answer ✅MAC Address

What is the protocol that is used to discover a physical address from a known logical address and what message type does it use? - correct answer

✅ARP, broadcast

What will happen if the default gateway address is incorrectly configured on a host? - correct answer ✅The host cannot communicate with hosts in other networks.

What is an important function of the physical layer of the OSI model? -

correct answer ✅It encodes frames into electrical, optical, or radio wave signals.

Which procedure is used to reduce the effect of crosstalk in copper cables? - correct answer ✅twisting opposing circuit wire pairs together

Which two statements describe the characteristics of fiber-optic cabling? (Choose two.) - correct answer ✅Fiber-optic cabling does not conduct electricity.

Fiber-optic cabling is primarily used as backbone cabling.

What is contained in the trailer of a data-link frame? - correct answer

✅error detection

What is the auto-MDIX feature on a switch? - correct answer ✅crossover Ethernet cable connection

Refer to the exhibit. A ping to PC3 is issued from PC0, PC1, and PC2 in this exact order. Which MAC addresses will be contained in the S1 MAC address

table that is associated with the Fa0/1 port? - correct answer ✅just PC and PC1 MAC addresses

How does a Layer 3 switch differ from a Layer 2 switch? - correct answer ✅An IP address can be assigned to a physical port of a Layer 3 switch. However, this is not supported in Layer 2 switches.

What is the purpose of the routing process? - correct answer ✅to select the paths that are used to direct traffic to destination networks

Which technology provides a solution to IPv4 address depletion by allowing

multiple devices to share one public IP address? - correct answer ✅NAT

Refer to the exhibit. Consider the IP address configuration shown from PC1.

What is a description of the default gateway address? - correct answer ✅It is the IP address of the Router1 interface that connects the PC1 LAN to Router1.

Which of the following are primary functions of a router? (Choose two.) - correct answer ✅packet switching

path selection

Which two statements correctly describe a router memory type and its

contents? (Choose two.) - correct answer ✅RAM is volatile and stores the running configuration.

ROM is nonvolatile and stores bootup information.

In which default order will a router search for startup configuration information? - correct answer ✅NVRAM, TFTP, setup mode

What happens when part of an Internet VoIP transmission is not delivered to

the destination? - correct answer ✅The transmission continues without the missing portion.

Which three IP addresses are private? (Choose three.) - correct answer ✅10.172.168.

172.20.4.

192.168.5.

How many bits make up the single IPv6 hextet :10CD:? - correct answer

✅ 16

What is the effect of configuring the ipv6 unicast-routing command on a router? - correct answer ✅to enable the router as an IPv6 router

Which group of IPv6 addresses cannot be allocated as a host source address? - correct answer ✅FF00::/

What is the purpose of ICMP messages? - correct answer ✅to provide feedback of IP packet transmissions

Refer to the exhibit. A technician has configured a user workstation with the IP address and default subnet masks that are shown. Although the user can access all local LAN resources, the user cannot access any Internet sites by using either FQDN or IP addresses. Based upon the exhibit, what could

account for this failure? - correct answer ✅The default gateway address in incorrect.

Which subnet would include the address 192.168.1.96 as a usable host address? - correct answer ✅192.168.1.64/

A network administrator needs to monitor network traffic to and from servers in a data center. Which features of an IP addressing scheme should be applied to these devices? - correct answer ✅predictable static IP addresses for easier identification

Refer to the exhibit. Which IP addressing scheme should be changed? - correct answer ✅Site 2

Which two notations are useable nibble boundaries when subnetting in IPv6? (Choose two.) - correct answer ✅/

A host PC has just booted and is attempting to lease an address through DHCP. Which two messages will the client typically broadcast on the

network? (Choose two.) - correct answer ✅DHCPDISCOVER

DHCPREQUEST

What is the purpose of the network security accounting function? - correct

answer ✅to keep track of the actions of a user

When applied to a router, which command would help mitigate brute-force

password attacks against the router? - correct answer ✅login block-for 60 attempts 5 within 60

A particular website does not appear to be responding on a Windows 7 computer. What command could the technician use to show any cached DNS entries for this web page? - correct answer ✅ipconfig /displaydns

Refer to the exhibit. The network administrator enters these commands into the R1 router:

R1# copy running-config tftp

Address or name of remote host [ ]?

When the router prompts for an address or remote host name, what IP address should the administrator enter at the prompt? - correct answer ✅192.168.11.

Match the IPv6 address to the IPv6 address type. (Not all options are used.) -

correct answer

What two preconfigured settings that affect security are found on most new

wireless routers? (Choose two.) - correct answer ✅Broadcast SSID, default administrator password

Which type of wireless security generates dynamic encryption keys each

time a client associates with an AP? - correct answer ✅WPA

Fill In the Blank - correct answer ✅TFTP is a best-effort, connectionless application layer protocol that is used to transfer files.

Which two components are necessary for a wireless client to be installed on a WLAN? (Choose two.) - correct answer ✅wireless NIC

wireless client software

Consider the following range of addresses:

2001:0DB8:BC15:00A0:0000::

2001:0DB8:BC15:00A1:0000::

2001:0DB8:BC15:00A2:0000::

...

2001:0DB8:BC15:00AF:0000::

The prefix-length for the range of addresses is - correct answer ✅/60

Match the phases to their correct stage in the router bootup process. (Not all options are used.) - correct answer ✅Stage 1 - perform the post

Stage 2 - load the bootstrap program

Stage 3 - Locate and load the Cisco IOS

Stage 4 - locate and load the configuration file

A host is accessing an FTP server on a remote network. Which three functions are performed by intermediary network devices during this

conversation? (Choose three.) - correct answer ✅regenerating data signals

applying security settings to control the flow of data

notifying other devices when errors occur

When is a dial-up connection used to connect to an ISP? - correct answer ✅when a regular telephone line is used

On a school network, students are surfing the web, searching the library database, and attending an audio conference with their sister school in Japan. If network traffic is prioritized with QoS, how will the traffic be

classified from highest priority to lowest priority? - correct answer ✅audio conference, database, HTTP

During normal operation, from which location do most Cisco routers run the IOS? - correct answer ✅RAM

Which connection provides a secure CLI session with encryption to a Cisco switch? - correct answer ✅A SSH connection

Which keys act as a hot key combination that is used to interrupt an IOS

process? - correct answer ✅Ctrl-Shift-6

Refer to the exhibit. An administrator wants to change the name of a brand new switch, using the hostname command as shown. What prompt will display after the command is issued?

Switch(config) # hostname HR Switch - correct answer ✅Switch(config)#?

After making configuration changes on a Cisco switch, a network administrator issues a copy running-config startup-config command. What is

the result of issuing this command? - correct answer ✅The new configuration will be loaded if the switch is restarted.

On which switch interface would an administrator configure an IP address so

that the switch can be managed remotely? - correct answer ✅VLAN 1

A technician uses the ping 127.0.0.1 command. What is the technician testing? - correct answer ✅the TCP/IP stack on a network host

What is the correct order for PDU encapsulation? - correct answer