CCNA Final Exam

Card Set Information

Author:
easytoremember@sbcglobal.net
ID:
297657
Filename:
CCNA Final Exam
Updated:
2015-03-05 13:56:31
Tags:
CCNA
Folders:

Description:
Test questions for CCNA Intro to networks
Show Answers:

Home > Flashcards > Print Preview

The flashcards below were created by user easytoremember@sbcglobal.net on FreezingBlue Flashcards. What would you like to do?


  1. Refer to the exhibit.  What is the maximum TIL value that is used to reach the destination www.cisco.com
    13
  2. Which IPv4 address cna be pinged to test the internal TCP/IP opereation of a host
    192.168.1.1
    0.0.0.0
    0.0.1
    255.255.255.255
    127.0.0.1
    127.0.0.1
  3. A host is accessing a Telnet server on a remote network.  Which three functions are performed by intermediary network devices during this conversation.  Choose 3
    1. regenerating data signals
    2. acting as a client or a server
    providing a channel over which messages travel
    3.applying security settings to control the flow of data
    4 notifying other devices when errors occur
    5. serving as the source or destination of the messages
    • 1. regenerating data signals
    • 3. applying security setting to control the flow of date
    • 4 notifying other devices when errors occur
  4. Which statement is true about DHCP operation?
    When a device that is configured to use DHCP boots, the client broadcasts a DHCPDISCOVER message to identify any available DHCP servers on the network
  5. Which type of wireless security is easily compromised
    EAP
    PSK
    WEP
    WPA
    WEP
  6. What types of addresses make up the majority of addresses within the /8 block 1Pv4 bit space?
    multicast addresses
    private addresses
    public addresses
    experimental addresses
    public addresses
  7. Which protocol supports rapid delivery of streaming media
    Video of Internet protocol
    real time transport protocol
    transmission control protocol
    sercure file transfer protocol
    Transmission Control Protocol   TCP
  8. A network administrator notices tha the throughput on the network appears lower than expected when compared to the end to end network bandwidth.  Which three factors can explain this difference
    1.  Amt of traffic
    2. type of data encapsulationn in use
    3.type of traffic
    4. number oand type of network devices that the data is crossing
    5.the bandwidth of the connection to the ISP
    6. the reliability of the network backbone
    • 1.  Amt of traffic
    • 3.type of traffic
    • 4. number oand type of network devices that the data is crossing
  9. Which group of IPv6 addresses can not be allocated as a host source address

    FECO::/10
    FEBF::/10
    FF00::/8
    FDFF::/7
    FF00::/8
  10. A host PC is attempting to lease an addess thru DHCP.  What message is sent by the server to the client now it is able to use the provided IP information
    DHCPDISCOVER
    dhcpoffer
    dhcpprequest
    dhcpprequest
    dhcpack
    dhcpnack
  11. DHCPOFFER
  12. The network administrator enters these commands into the R1 router:

    R1# copy running-config tftp
    Address or name of remote host[]?

    When the router prompts for an address or remote host name, what IP address should the administrator enter at the prompt?
    Address of the TFTP application computer

    192.168.11.252
  13. Which 3 statements characterize the transport layer protocols?

    1.  TCP uses port numbers to provide reliable transportation of IP Packets

    2.  TCP and UDP port numbers are used by application layer protocols

    3.  TCP uses windowing and sequencing to provide reliable transfer of data

    4.  TCP is a connection oriented protocol.  UDP is a connectionless protocol

    5.  UDP uses windowing and acknowledgesments for reliable transfer of data
    • 2.  TCP and UDP port numbers are used by application layer protocols
    • 3.  TCP uses windowing and sequencing to provide reliable transfer of data
    • 4.  TCP is a connection oriented protocol.  UDP is a connectionless protocol
  14. What is the purpose of ICMP messages

    to inform routers about network topology changes

    to ensure the delivery of an ip packet

    to monitor the process of a domain name to ip address resolution

    to provide feedback of ip packet transmissions
    to provide feedback of ip packet transmissions
  15. A technician uses the ping 127.0.0.1 command.  What is the technician testing?

    connectivity between a pc and the default gateway

    connectivity between 2 adjacent cisco devices

    physical connectivity of a particular pc and the network

    the TCP/IP stack on a network

    hostconnectivity between two pcs on the same network
    the TCP/IP stack on a network
  16. What will a Layer 2 switch do when the dest MAC address of a received frame is not in the MAC table?

    1. it notifies the sending host that the frame can not be delivered

    2.  It initiates an ARP request

    3.  It forwards the frame out of all ports except for the port at which the frame was received.

    4  It broadcasts the frame out of all ports on the switch.
    3.  It forwards the frame out of all ports except for the port at which the frame was received.
  17. What is a characteristic of the LLC sublayer?

    1.  It places information in the frame that allows multiple Layer 3 protocols to use the same network interface and media

    2.  It provides delimitation of data according to the physical signaling requirements of the medium

    3.  It defines software processes that provide services to the physical layer

    4.  It provides the logical addressing required that identifies the device
    1.  It places information in the frame that allows multiple Layer 3 protocols to use the same network interface and media
  18. On which switch interface would an administrator configure an IP address so that the switch can be managed remotely
    VLAN 1
  19. When applied to a router, which command would help nitigate brute-force password attacks against the router
    login block-for 60 attempts 5 within 60
  20. Which two statements correctly describe a router memory type and its contents

    1.  ROM is nonvolatile and contains basic diagnostic software
    2.  FLASH is nonvolatile and contains a limited portion of he IOS.
    3.  ROM is nonvolatile and stores the running IOS
    4.  RAM is volatile and stores the IP routing table
    5.  NVRAM is nonvolatile and stores other system files
    1.  ROM is nonvolatile and contains basic diagnostic software

    4.  RAM is volatile and stores the IP routing table
  21. Which two components are necessary for a wireless client to be installed on a WLAN

    custom adapter
    wireless bridge
    media
    wireless NIC
    crossover cable
    wireless client software
    • wireless NIC
    • wireless client software
  22. find a message on a server by using adding IPV6 adress to router 2001:db8:8765::1
    Message is winner
  23. A host is accessing a web server on a remote network.  Which three functions are performed by intermediary network devices during this conversation?

    1.  applying security settings to control the flow of data

    2.  notifying other devices when errors occur

    3.  regenerating data signals

    4.  acting as a client or a server

    5.  serving as the source or destination of the messages

    6.  providing a channel over which messages travel
    • 1.  applying security settings to control the flow of data
    • 2.  notifying other devices when errors occur
    • 3.  regenerating data signals
  24. Match the situation with the appropriate use of network media

    1. backbone cabling in an enterprise
    2. guest access in a coffee shop
    3. horizontal cabling structure
    4. waiting rooms in a hospital
    5. desktop PC's  in an enterprise office
    6. long haul networks
    • 1. backbone cabling in an enterprise - fiber
    • 2. guest access in a coffee shop - wireless
    • 3. horizontal cabling structure - copper
    • 4. waiting rooms in a hospital - wireless
    • 5. desktop PC's  in an enterprise office - copp
    • 6. long haul networks - fiber
  25. What is the correct order for PDU encapsulation
    Transport-network-Frame-Data-frame trailer
    transport-frame-netword-data-frame trailer
    frame-network-transport-data-frame trailer
    network-transport-frame-data-frame trailer
    frame-network-transport-data-frame trailer
  26. Which address on a pc does not change, even if the PC is moved to a different network

    IP address
    logical address
    MAC address
    default gateway address
    MAC address
  27. What will happen if the default gateway address is incorrectly configured on a host
    The host can not communicate with hosts in other networks
  28. A host pc has just booted and is attempting to lease an address through DHCP.  Which to messages will the client typically broadcast on the network?

    DHCPREQUEST
    DHCPOFFER
    DHCPDISCOVER
    DHCPNACK
    DHCPACK
    • DHCPREQUEST
    • DHCPDISCOVER
  29. Switch(config)# hostname My Switch

    what will be displayed next
    Switch(config)#
  30. After making configuration changes, a network administrator issues a copy r s command in a cisco switch.  What is the result of issuing this command?
    The new configuration will be loaded if the switch is restarted.
  31. Refer to the exhibit.  A TCP segment from a server has been captured by Wireshark. which is runnng on a host.  What acknowledgement number will the host return for the TCP segment that has been received?
    306

    TCP segment data (306 bytes)
  32. Which technology provides a solution to IPv4 address depletion by allowing multiple devices to share one public IP address

    ARP
    DNS
    SMB
    DHCP
    HTTP
    NAT
    NAT
  33. What is the purpose of the routing process
    to select the paths that are used to direct traffic to destination networks
  34. Three bank employees are using the corporate network.  The first employee uses a web browser to view a company web page in order to read some announcements.  The second employee accesses the corporate database to perform some financial transactions.  The third employee participates in an important live audio conference.  If QoS is implemented on this network, what will be the prioritioes form hightest to lowest of the different data types
    audio conference, financial transactions, web page
  35. A home user is looking for an ISP connectin that provides high speed digital transmission over regular phone lines.  What ISP connection type should be used
    DSL
  36. Which connection provides a secure CLI session with encryption to a cisco switch

    a telnet connection
    SSH coonnection
    console connection
    AUX connection
    SSH
  37. What is the purpose of the network security accounting function?

    to provide challenge and response questions
    to require users to prove who they are
    to determine which resources a user can access
    to keep track of the actions of a user
    to keep track of the actions of a user
  38. If an administrator uses telnet to connect to the switch, which password is needed to access user EXEC mode?
    linevtyin  from 

    • line vty 0 15
    • password linevtyin
  39. Which publicly available resources describe protocols, processes, and technologies for the internet but do not give implementatiuon details?

    IEEE standards
    Request for comments
    IRTF research papers
    protocol models
    Request for comments
  40. A pc is configured to obtain an ip address automatically from network 192.168.1.255 ff-ff-ff-ff-ff-ff.  Which statement describes this entry

    Tis entry refers to the PC itself
    This entry maps to the default gateway
    This is a static map entry
    this is a dynamic map entry
    This is a static map entry
  41. Which subnet would include the address 192.168.1.96 as a usable host address
    192.168.1.64/26

    b/c the other addresses the .96 will all be network addresses
  42. A particular website does not appear to be responding on a windows 7 computer.   What command could the technician use to show any cached DNS entries for this web page

    ipconfig /all
    ipconfig /displaydns
    arp -a
    nslookup
    ipconfig /displaydns
  43. What type of wireless security generates dynamic encryption keys each time a client associates with an AP
    WPA
  44. A frame is transmitted from one networking debice to another.  Why does the receiving device check the FCS field in the frame?
    to check the frame for possible transmission errors
  45. Which IP addessing scheme should be changed.
    70-40-15 hosts  Site 2
  46. What is the effect of configuring the IPv6 unicast-routing command on a router
    to enable the router as an IPv6 router
  47. What 3 IP addresses are private
    10.1.1.1
    172.16.4.4
    224.6.6.6
    192.168.5.5
    172.32.5.2
    192.167.10.10
    • 172.16.4.4
    • 192.168.5.5
    • ?
  48. Condsider the IP address configuration show from PC1.  What is a description of the default gateway address
    It is the IP address of the Router1 interface that connects the PC1 LAN to Router 1
  49. During normal operation, from which location do most cisco switches and routers run IOS

    Flash
    RAM
    NVRAM
    disk drive
    RAM
  50. What is an important function of teh physical layer of the OSI model

    It encodes frames into electrical, optical or radio wave signals

    It accepts frames from the physical media

    It encapsulates upper layer data into frames

    it defines teh media access method performed by the hardware interface
    It encodes frames into electrical, optical, or radio wave signals
  51. Which procedure is used to reduce the effect of crosstalk in copper cables
    twisting opposing circuit wire pairs together
  52. What are the 3 primary functions provided by layer 2 data encapsulation?

    1.  placement and removal of frames from the media
    2.  detection of errors through CRC calculations
    3.  delimiting groups of bits into frames
    4.  data link layer addressing
    5  error correction through a collision detection method
    6.  session control using port numbers
    • 2.  detection of errors through CRC calculations
    • 3.  delimiting groups of bits into frames
    • 4. data link layer addressing
  53. What method is used to manage contention-based access on a wireless network?
    token passing
    CSMA/CD
    CSMA/CA
    priority ordering
    CSMA/CA
  54. What happens when part of an internet radio transmission is not delivered to the destination
    The transmission continues without the missing portion
  55. What is the auto-MDIX feature on a switch
    the automatic configuration of an interface for a straight through or a crossover ethernet cable connection
  56. Which function is provided by TCP

    detection of missing packets
    communication session control
    path determination for data packets
    data encapsulation
    detection of missing packets
  57. How does a layer 3 switch differ from a layer 2 switch
    An ip address can be assigned to a physical port of a layer 3 switch
  58. Which two notations are useable nibble boundaries when subnetting in IPv6

    /68
    /62
    /66
    /64
    /70
    • /68
    • /64
  59. What is the purpose of having a converged network
    to reduce the cost of deploying and maintaining the communication infrastructure
  60. A ping to PC3 is issued from PC0, Pc1, and PC2 in this exact order.  Which MAC addresses will be contained inthe S1 MAC address table that is associated with the Fa0/1 Port
    Just the Pc0 and PC1 MAC addressed and they had to go through the Fa0/1 port on the switch
  61. Which field in an IPv4 packet header will typically stay the same during its transmission

    Packet Length
    Destination Address
    Flag
    Time to live
    Destination Address
  62. What two preconfigured settings that affect security are found on most new wireless routers

    MAC filtering enabled
    default admin. password
    WEP encryption enabled
    PSK authentication required
    broadcast SSID
    • default administrator password
    • broadcast SSID
  63. Which parameter does the router use to choose the path to the destination when there are multiple routes available

    1.the higher metric value assoc. w/ dest. network

    2. the lower metric value assoc. w/ dest network

    3.  the higher gateway ip address to get to the dest network

    4.  the lower gateway ip add to get to the destination network
    the lower metric value that is associated with the destination network
  64. What is the significance of teh astrerisk in the exhibited output?
    The asterisk designates which file system is the default file system
  65. Match the phases to their correct stage in the router bootup porcess

    locate and load the config file
    format the flash
    locate and load the cisco ios
    load the bootstrap program
    perform the post
    ???
  66. During data communications, a host may need to send a sigle message to a specific group of destination hosts simultaneously.   This message is in the form of a __________ message
    multicast
  67. An administrator uses the Ctrl-Shift-6 key combination on a switch after issuing the ping command.  What is the purpose of using these keystrokes
    To interrupt the ping process
  68. Which area would most likely by an extranet for the company network that is shown
    area c Inventory and web services
  69. Match the IPv6 address to the IPv6 address type   
    Link Local     Multicast    or  Global Unicast

    FF:02:2
    FE:80:1
    2001:DB8:A1:0b:c78::1
    FE80:0:50:BA:FEEE:A064:47FF:FE36:5328
    2001:DB8:10::12
    FE02::1::FF3A:2509
    • Link Local
    • FE80:0:50:BA:FEEE:A064:47FF:FE36:5328
    • FE:80:1

    • Multicast
    • FF:02:2
    • FE02::1::FF3A:2509

    • Global Unicast
    • 2001:DB8:A1:0b:c78::1
    • 2001:DB8:10::12
  70. Match the desc with the associated IOS mode
    user exec, priv exec, global config

    1. accessed by entering the enable command
    2 changes made affect the operation of the device as a whole
    3.limited number of basic monitoring commands
    4. accessed by entering the config t command
    5. identifiedd by a prompt ending with teh # character
    6. The first entrance into the CLI of the IOS device
    • User exec
    •  - limited number of basic monitoring commands
    •  - The first entrance into the CLI of the IOS device

    • Priv exec
    • - accessed by entering the enable command
    • - identifiedd by a prompt ending with teh # character

    • Global config
    • - changes made affect the operation of the device as a whole
    • - accessed by entering the config t command
  71. Which IPv6 address is assigned to the serial0/0/0 interface on RT2?
    2001:db8:abc:5::1
  72. What is contained in the trailer of a data-link frame?
    Physical address
    data
    error detection
    logical address
    error detection
  73. used to identify missing segments of data
    acknowledgment
  74. received by a sender before transmitting more segments in a session
    retransmission
  75. method of managing segments of a data loss
    FCS
  76. number of bytes a destination device can accept and process at one time
    sequence numbers
  77. What is the protocol that is used to discover a physical address from a known logical address and what message type does it you
    -ARP   broadcast
  78. which group of IPv6 addresses can not be allocated as a host source address
    FF00::/8   Multicast
  79. A network administrator is configuring access control to switch SW1.  If the administrator uses console line to connect to the switch, which password is needed to access user EXEC mode
    lineconin
  80. A _______ topology influences the type of network framing and media access control that will be used
    logical
  81. Which two statements describe the characteristics of fiber optic cabling
    • Fiber optic cabling does not conduct electricity
    • Fiber optic cabling is primarily used as backbone cabling
  82. Which firewall technique blocks incoming packets unless they are responses to internal requests
    1.URL filtering
    2. port filtering
    3.Application filtering
    4. stateful packet inspection
    4. Stateful packet inspection
  83. What three application layer protocols are part of the TCP/IP protocol suite
    FTP
    ARP
    NAT
    DHCP
    PPP
    DNS
    • FTP
    • DHCP
    • DNS
  84. Which communication tool allows real time collaboration
    weblog
    wiki
    email
    instant messaging
    instant messaging
  85. Which of the following are primary functions of a router  choose 2

    packet switching
    microsegmentation
    flow control
    path selection
    domain name resolution
    packet switching

    path selection
  86. ________ is a best effort, connectionless application layer protocol that is used to transfer files
    TFTP
  87. What are 3 characteristics of multicast transmission

    1.The source address of a multicast transmission is in the range of 224.0.0.0 to 224.0.0.225

    2. Computers use multicast transmission to request IPv4 addresses

    3. Multicast transmission can be used by routers to exchange routing information

    4. Multicast messages map lower layer addresses to upper layer addresses

    5. A Single packet can be sent to a group of hosts
    • -Multicast transmission can be used by routers to exchange routing information
    • - Multicast messages map lower layer addresses to upper layer addresses
    • -  A Single packet can be sent to a group of hosts
  88. At a minimum, which address is required on IPv6 enabled interfaces

    global unicast
    link-local
    site local
    unique local
    link-local
  89. Which frame forwarding method receives the entire frame and performs a CRC check tto getect errors before forwarding the frame

    fragment-free switching
    fast-forward switching
    store and forward switching
    cut through switching
    store and forward switching
  90. A ________ topology influences the type of network framing and media access control that will be used
    logical
  91. Which two protocols function at the internet layer
    ARP
    ICMP
    BOOTP
    PPP
    IP
    IP   ICMP
  92. Which communication tool allows real time collaboration
    weblog
    wiki
    email
    instant messaging
    instant messaging
  93. ___________  is a best effort connectionless application layer protocol that is used to transfer files
    UDP
  94. What are 3 char of multicast transmisison

    - A single packet can be sent to a group of shots

    - Multicast messages map lower layer addresses to upper layer addresses

    -Multicast transmission can be used by routers to exchange routing info

    - computers use multicast transmission to request IPv4 addresses

    -the source addreess of a multicast transmission is inthe range os 224.0.0.0 to 224.0.0.225
    • - A single packet can be sent to a group of shots
    • - Multicast messages map lower layer addresses to upper layer addresses
    • -Multicast transmission can be used by routers to exchange routing info

What would you like to do?

Home > Flashcards > Print Preview