Study with the several resources on Docsity
Earn points by helping other students or get them with a premium plan
Prepare for your exams
Study with the several resources on Docsity
Earn points to download
Earn points by helping other students or get them with a premium plan
Community
Ask the community for help and clear up your study doubts
Discover the best universities in your country according to Docsity users
Free resources
Download our free guides on studying techniques, anxiety management strategies, and thesis advice from Docsity tutors
A list of CCNA practice exam questions and answers related to networking concepts such as subnet masks, name servers, attenuation, CSMA/CA, DHCP, spam filter software, binary format, POP3, UTP cabling, network modes, operating systems, and more. The questions are designed to test the knowledge of students preparing for the CCNA certification exam.
Typology: Exams
1 / 23
1
What is the default subnet mask for an IP address of 64.100.19.14? - correct answer ✅255.0.0.0.
A network administrator has been notified that users have experienced problems gaining access to network resources. What utility could be used to directly query a name server for information on a destination domain? - correct answer ✅lookup.
What does the term "attenuation" mean in data communication? - correct answer ✅loss of signal strength as distance increases.
What is the function of CSMA/CA on a wireless Ethernet network? - correct answer ✅to prevent collisions.
2
The area covered by a single AP is known as what? - correct answer ✅basic
service set.
The help desk at a large packaging company receives a call from a user who
is concerned about lost data files on the local PC. The help desk technician
3
learns that the user clicked on an icon that appeared to be a program
update, but no updates were scheduled for that program. What type of
attack has likely occurred? - correct answer ✅worm.
Which installation option enables a single physical resource to function
simultaneously as multiple logical resources? - correct answer ✅multi-
boot.
Which part of the electromagnetic spectrum is commonly used to exchange
data between a PDA and a computer? - correct answer ✅infrared
A company has a web server that must be accessible to both external and
internal clients. Which security policy best practice should be followed to
maximize security of the server? - correct answer ✅Place the web server in
a DMZ
What is specified by the host bits in an IP address? - correct answer
✅identity of the computer on the network.
4
For an IP address, what component decides the number of bits that is used
to represent the host ID? - correct answer ✅subnet mask.
What advantage does a peer-to-peer network have over a client-server
network? - correct answer ✅It increases scalability.
Refer to the exhibit. If H4 sends a message to H1 and the destination MAC
address is in the MAC table for both Switch1 and Switch2, which host
devices will receive the message? - correct answer ✅only H1.
Refer to the graphic. Assume that the exhibited output is from a host that is
connected to a Linksys integrated router. What is one of the first things you
should check? - correct answer ✅link status LED on the front of the router
Which of the following are the address ranges of the private IP addresses?
(Choose three.) - correct answer ✅10.0.0.0 to 10.255.255.255, 172.16.0.
to 172.31.255.255, 192.168.0.0 to 192.168.255.
5
When acting as a DHCP server, an integrated router can provide what three
types of information to a client? (Choose three.) - correct answer ✅default
gateway, dynamic IP address, DNS server address
What is the purpose of spam filter software? - correct answer ✅It examines
incoming e-mail messages to identify the unsolicited ones.
A network engineer wants to represent confidential data in binary format.
What are the two possible values that the engineer can use? (Choose two.) -
correct answer ✅0, 1
Which protocol in its default configuration downloads e-mail messages to
the client computer and deletes them from the server? - correct answer
✅POP
Refer to the exhibit. A user on host A sends an e-mail to the user on host B.
Which type of message does host A send? - correct answer ✅Unicast
6
What are two best practices that are used when configuring a small home
WLAN? (Choose two.) - correct answer ✅the encryption of the SSID, the
use of pre-shared keys
What type of message is sent to a specific group of hosts? - correct answer
✅Broadcast
Refer to the exhibit. Why would a network administrator use the network
mode that is shown? - correct answer ✅to support hosts that use different
802.11 standards
A network technician is required to provide access to the Internet for a large
company. What is needed to accomplish this task? - correct answer ✅ISP
Which type of computer uses an integrated monitor and keyboard? - correct
answer ✅Laptop
Which transport layer protocol is used when an application requires
acknowledgment that data has been delivered? - correct answer ✅TCP
7
Refer to the exhibit. What cabling fault does the exhibit represent? - correct
answer ✅split pair
Which two statements are true about local applications? (Choose two.) -
correct answer ✅They are stored on the local hard disk, They run on the
computer where they are installed
Where do ISPs get the public addresses that they assign to end users? -
correct answer ✅ISPs obtain address blocks from registry organizations
Which two transport layer protocols enable hosts to communicate and
transfer data? (Choose two.) - correct answer ✅TCP, UDP
Which part of a data packet is used by a router to determine the destination
network? - correct answer ✅destination IP address
When terminating UTP cabling, why is it important to untwist only a small
amount of each wire pair? - correct answer ✅minimizes crosstalk
8
A learner wants to interact with the operating system of a computer. Which
two methods can be used for this? (Choose two.) - correct answer ✅CLI,
GUI
What is the purpose of the ipconfig /release command? - correct answer
✅It forces a client to give up its current IP address.
What is the purpose of creating a DMZ during network firewall
implementation? - correct answer ✅to allow for a publicly accessible zone
without compromising the internal network
A user is unable to send e-mail. While troubleshooting this problem, the
network technician first verifies the physical connectivity of cables. Which
troubleshooting approach is being followed? - correct answer ✅bottom-up
What is the function of the DNS server? - correct answer ✅It translates a
computer or domain name to the associated IP address
9
What layer is the first point of entry for a host into the network? - correct
answer ✅access layer
Your school network blocks all websites related to online gaming. What type
of security policy is being applied? - correct answer ✅acceptable use
A host sent a message that all other hosts on the switched local network
received and processed. What type of domain are all these hosts a part of? -
correct answer ✅Broadcast domain
What are two examples of storage peripheral devices? (Choose two.) -
correct answer ✅Flash drive, external DVD
What type of cable would be required to connect a Linksys router to a wired
PC? - correct answer ✅crossover cable
Refer to the exhibit. What is the effect of setting the security mode to WEP
on the Linksys integrated router? - correct answer ✅The WEP security
10
mode encrypts network traffic during transmission between the AP and the
wireless client
In an attempt to verify connectivity, a user issues the ping command to a
device that is not on the local network. The ping is unsuccessful. What can
be determined from this result? - correct answer ✅Further troubleshooting
will be required to reach a definite conclusion
Which two causes of networking problems are related to the physical layer?
(Choose two.) - correct answer ✅disconnected cables, improper operation
of cooling fans
What is an advantage of selecting an operating system that has a commercial
license over one with a GPL license? - correct answer ✅The commercial
license-based operating system provides structured support.
Refer to the exhibit. Assume that the command output is from a wireless
DHCP client that is connected to a Linksys integrated router. What can be
deduced from the output? - correct answer ✅The wireless connection is
operational
Refer to the exhibit. What is the purpose of assigning a network name of
College? - correct answer ✅It identifies the wireless LAN
Because of an increasing number of users, bandwidth per user on a WLAN has decreased to a point where users are complaining about poor performance. What can be done to improve the user experience? - correct answer ✅Reduce the number of devices using each channel
A network technician suspects that malware on a user PC is opening multiple TCP connections to a specific foreign host address. Which Windows command line utility can be used to confirm the multiple TCP connections? - correct answer ✅Ping
Which communication tool allows real-time collaboration? - correct answer ✅instant messaging.
A host is accessing a Web server on a remote network. Which three functions are performed by intermediary network devices during this conversation? (Choose three.) - correct answer ✅regenerating data signals
applying security settings to control the flow of data notifying other devices when errors occur
A home user is looking for an ISP connection that provides high speed digital transmission over regular phone lines. What ISP connection type should be
used? - correct answer ✅DSL
A company is expanding its business to other countries. All branch offices must remain connected to corporate headquarters at all times. Which network technology is required to support this requirement? - correct answer ✅WAN.
Refer to the exhibit. From which location did this router load the IOS? - correct answer ✅flash memory
Which connection provides a secure CLI session with encryption to a Cisco
network device? - correct answer ✅an SSH connection.
Refer to the exhibit. An administrator is trying to configure the switch but receives the error message that is displayed in the exhibit. What is the
problem? - correct answer ✅The administrator must first enter privileged EXEC mode before issuing the command.
An administrator uses the Ctrl-Shift-6 key combination on a switch after issuing the ping command. What is the purpose of using these keystrokes? -
correct answer ✅to interrupt the ping process.
What function does pressing the Tab key have when entering a command in
IOS? - correct answer ✅It completes the remainder of a partially typed word in a command.
Refer to the exhibit. An administrator wants to change the name of a brand- new switch, using the hostname command as shown. What prompt will display after the command is issued?
Switch(config) # hostname My Switch - correct answer ✅Switch(config)#?
Refer to the exhibit. A network administrator is configuring access control to switch SW1. If the administrator uses Telnet to connect to the switch, which
password is needed to access user EXEC mode? - correct answer ✅linevtyin
After making configuration changes, a network administrator issues a copy running-config startup-config command in a Cisco switch. What is the result
of issuing this command? - correct answer ✅The new configuration will be loaded if the switch is restarted.
Refer to the exhibit. Which action will be successful? - correct answer ✅PC2 can send a ping to 192.168.1.1.
Which IPv4 address can be pinged to test the internal TCP/IP operation of a host? - correct answer ✅127.0.0.
What three application layer protocols are part of the TCP/IP protocol suite? (Choose three.) - correct answer ✅DCHP
Which two protocols function at the internet layer? (Choose two.) - correct
answer ✅ICMP
Which publicly available resources describe protocols, processes, and technologies for the Internet but do not give implementation details? - correct answer ✅Request for Comments
Which address on a PC does not change, even if the PC is moved to a different network? - correct answer ✅MAC Address
What is the protocol that is used to discover a physical address from a known logical address and what message type does it use? - correct answer
✅ARP, broadcast
What will happen if the default gateway address is incorrectly configured on a host? - correct answer ✅The host cannot communicate with hosts in other networks.
What is an important function of the physical layer of the OSI model? -
correct answer ✅It encodes frames into electrical, optical, or radio wave signals.
Which procedure is used to reduce the effect of crosstalk in copper cables? - correct answer ✅twisting opposing circuit wire pairs together
Which two statements describe the characteristics of fiber-optic cabling? (Choose two.) - correct answer ✅Fiber-optic cabling does not conduct electricity.
Fiber-optic cabling is primarily used as backbone cabling.
What is contained in the trailer of a data-link frame? - correct answer
✅error detection
What is the auto-MDIX feature on a switch? - correct answer ✅crossover Ethernet cable connection
Refer to the exhibit. A ping to PC3 is issued from PC0, PC1, and PC2 in this exact order. Which MAC addresses will be contained in the S1 MAC address
table that is associated with the Fa0/1 port? - correct answer ✅just PC and PC1 MAC addresses
How does a Layer 3 switch differ from a Layer 2 switch? - correct answer ✅An IP address can be assigned to a physical port of a Layer 3 switch. However, this is not supported in Layer 2 switches.
What is the purpose of the routing process? - correct answer ✅to select the paths that are used to direct traffic to destination networks
Which technology provides a solution to IPv4 address depletion by allowing
multiple devices to share one public IP address? - correct answer ✅NAT
Refer to the exhibit. Consider the IP address configuration shown from PC1.
What is a description of the default gateway address? - correct answer ✅It is the IP address of the Router1 interface that connects the PC1 LAN to Router1.
Which of the following are primary functions of a router? (Choose two.) - correct answer ✅packet switching
path selection
Which two statements correctly describe a router memory type and its
contents? (Choose two.) - correct answer ✅RAM is volatile and stores the running configuration.
ROM is nonvolatile and stores bootup information.
In which default order will a router search for startup configuration information? - correct answer ✅NVRAM, TFTP, setup mode
What happens when part of an Internet VoIP transmission is not delivered to
the destination? - correct answer ✅The transmission continues without the missing portion.
Which three IP addresses are private? (Choose three.) - correct answer ✅10.172.168.
How many bits make up the single IPv6 hextet :10CD:? - correct answer
✅ 16
What is the effect of configuring the ipv6 unicast-routing command on a router? - correct answer ✅to enable the router as an IPv6 router
Which group of IPv6 addresses cannot be allocated as a host source address? - correct answer ✅FF00::/
What is the purpose of ICMP messages? - correct answer ✅to provide feedback of IP packet transmissions
Refer to the exhibit. A technician has configured a user workstation with the IP address and default subnet masks that are shown. Although the user can access all local LAN resources, the user cannot access any Internet sites by using either FQDN or IP addresses. Based upon the exhibit, what could
account for this failure? - correct answer ✅The default gateway address in incorrect.
Which subnet would include the address 192.168.1.96 as a usable host address? - correct answer ✅192.168.1.64/
A network administrator needs to monitor network traffic to and from servers in a data center. Which features of an IP addressing scheme should be applied to these devices? - correct answer ✅predictable static IP addresses for easier identification
Refer to the exhibit. Which IP addressing scheme should be changed? - correct answer ✅Site 2
Which two notations are useable nibble boundaries when subnetting in IPv6? (Choose two.) - correct answer ✅/
A host PC has just booted and is attempting to lease an address through DHCP. Which two messages will the client typically broadcast on the
network? (Choose two.) - correct answer ✅DHCPDISCOVER
What is the purpose of the network security accounting function? - correct
answer ✅to keep track of the actions of a user
When applied to a router, which command would help mitigate brute-force
password attacks against the router? - correct answer ✅login block-for 60 attempts 5 within 60
A particular website does not appear to be responding on a Windows 7 computer. What command could the technician use to show any cached DNS entries for this web page? - correct answer ✅ipconfig /displaydns
Refer to the exhibit. The network administrator enters these commands into the R1 router:
R1# copy running-config tftp
Address or name of remote host [ ]?
When the router prompts for an address or remote host name, what IP address should the administrator enter at the prompt? - correct answer ✅192.168.11.
Match the IPv6 address to the IPv6 address type. (Not all options are used.) -
correct answer ✅
What two preconfigured settings that affect security are found on most new
wireless routers? (Choose two.) - correct answer ✅Broadcast SSID, default administrator password
Which type of wireless security generates dynamic encryption keys each
time a client associates with an AP? - correct answer ✅WPA
Fill In the Blank - correct answer ✅TFTP is a best-effort, connectionless application layer protocol that is used to transfer files.
Which two components are necessary for a wireless client to be installed on a WLAN? (Choose two.) - correct answer ✅wireless NIC
wireless client software
Consider the following range of addresses:
The prefix-length for the range of addresses is - correct answer ✅/60
Match the phases to their correct stage in the router bootup process. (Not all options are used.) - correct answer ✅Stage 1 - perform the post
Stage 2 - load the bootstrap program
Stage 3 - Locate and load the Cisco IOS
Stage 4 - locate and load the configuration file
A host is accessing an FTP server on a remote network. Which three functions are performed by intermediary network devices during this
conversation? (Choose three.) - correct answer ✅regenerating data signals
applying security settings to control the flow of data
notifying other devices when errors occur
When is a dial-up connection used to connect to an ISP? - correct answer ✅when a regular telephone line is used
On a school network, students are surfing the web, searching the library database, and attending an audio conference with their sister school in Japan. If network traffic is prioritized with QoS, how will the traffic be
classified from highest priority to lowest priority? - correct answer ✅audio conference, database, HTTP
During normal operation, from which location do most Cisco routers run the IOS? - correct answer ✅RAM
Which connection provides a secure CLI session with encryption to a Cisco switch? - correct answer ✅A SSH connection
Which keys act as a hot key combination that is used to interrupt an IOS
process? - correct answer ✅Ctrl-Shift-6
Refer to the exhibit. An administrator wants to change the name of a brand new switch, using the hostname command as shown. What prompt will display after the command is issued?
Switch(config) # hostname HR Switch - correct answer ✅Switch(config)#?
After making configuration changes on a Cisco switch, a network administrator issues a copy running-config startup-config command. What is
the result of issuing this command? - correct answer ✅The new configuration will be loaded if the switch is restarted.
On which switch interface would an administrator configure an IP address so
that the switch can be managed remotely? - correct answer ✅VLAN 1
A technician uses the ping 127.0.0.1 command. What is the technician testing? - correct answer ✅the TCP/IP stack on a network host
What is the correct order for PDU encapsulation? - correct answer ✅