ccna1 practice final exam
TRANSCRIPT
Which two transport layer protocols enable hosts to communicate and transfer data? (Choose two.)
DHCP
ICMP
IP
TCP
UDP
What is a function of the distribution layer in the hierarchical design model?
to provide latency free switching
to organize end devices in small manageable groups
to provide connectivity using the high-speed backbone
to provide connectivity between smaller local networks
For the TCP/IP model for internetwork communication, which statement describes the process for the transition of data from the internet layer to the network access layer?
An IP packet is encapsulated in a frame.
A TCP segment is placed in an IP packet.
HTML data is encapsulated in a TCP segment.
A frame is placed on the network media as encoded bits.
What is the function of the DNS server?
It maps the IP address to the MAC address.
It translates a computer or domain name to the associated IP address.
It manages the domain that clients are assigned to.
It accepts HTTP requests from clients.
In IP telephony, what is the purpose of a gateway to the PSTN?
to connect IP voice clients to Internet phone service
to create a peer-to-peer connection between two IP voice clients
to map unique names of IP voice endpoints to a client list on a voice server
to allow IP voice clients to communicate with regular analog telephones.
Which three types of information are provided to a host by an integrated router that is acting as a DHCP server? (Choose three.)
host ID
IP addresses of DNS servers
IP address
MAC address
hostname
subnet mask
A host wants to send information simultaneously to all the other hosts in the same network. Which domain will support this type of communication?
broadcast
unicast
local
multicast
What are two functions of MAC addresses in a LAN? (Choose two.)
to allow the transfer of frames from source to destination
to determine which host has priority to transfer data
to indicate the best path between separate networks
to associate with a specific network IP address
to uniquely identify a node on a network
Refer to the exhibit. How many additional hosts can be added to the local network?
124
126
252
254
255
256
What are two advantages of purchasing a preassembled computer? (Choose two.)
The cost is comparatively lower.
High-performance graphics and gaming applications are supported.
There is a negligible waiting period for assembly.
This type of computer is useful for knowledgeable consumers with special needs.
The user can specify high-performance components.
When is the use of a DSL modem necessary?
when a cellular telephone provides the service
when a high-speed connection is provided over a cable TV network
when a high-speed digital connection is required over the regular telephone line
when a satellite dish is used
A home user was successfully browsing the Internet earlier in the day but is now unable to connect. A ping command from a wireless laptop to a wired PC in the LAN is successful, but the nslookup command fails to resolve a website address. The user decides to analyze the LEDs on the Linksys router to verify connectivity. Which LED should be of main concern in this situation?
WLAN LED
power LED
Internet LED
1-4 Ethernet LEDs
What is the most common reason that ISPs provide symmetrical transfer services?
to address data transfer needs of home users
to download significantly more than upload
to host servers on the Internet
to work with applications that require less bandwidth
What is one purpose of using logical addresses in an IP network?
They identify a specific NIC on a host device by assigning a permanent logical address.
They are used to determine which host device accepts the frame.
They provide vendor-specific information about the host.
They are used to determine the network that the host is located on.
They are used by switches to make forwarding decisions.
A network designer is working with a small company to determine the network type best suited to the needs of the company. Which two characteristics could the designer use to describe a peer-to-peer network to the owner of the company? (Choose two.)
central administration
easy to install
low cost
scalable
secure
Which part of a data packet is used by a router to determine the destination network?
source IP address
user data
destination IP address
control information
destination MAC address
What is the purpose of a router?
to forward broadcasts to all interfaces so that all hosts receive them
to maintain a table of individual host addresses
to select the best path to reach remote networks
to physically connect multiple hosts that belong to the same network
Refer to the exhibit. PC1 sends a data packet to PC4. When the router forwards the data out Fa0/1, what destination MAC address will the router place in the frame?
0050.0FA9.CB47
0050.E208.A761
0200.5455.4E01
0200.545D.25F7
Refer to the exhibit. A local area network is built with four PCs, a switch, and a hub. PC1 sends a packet to PC4 which collides with a packet sent from PC3 to PC1. Which devices will receive the damaged frame?
PC1 and PC2
PC1, PC2, PC3, and PC4
PC1, PC2, and the switch
PC1, PC2, PC3, PC4, and the switch
Refer to the exhibit. Host2 attempts to establish communications with Server1. What action will switch SW1 take prior to forwarding the frame?
flood the frame out all interfaces
learn the MAC address that is associated with Host2
assign a MAC address to Host2 from the MAC table
poll all interfaces to learn their assigned IP addresses
Refer to the exhibit. Which statement is true based on the information that is shown in the exhibit?
All wireless devices that are connected to this AP must have an assigned SSID of University.
Any wireless client that is attached to this AP must have the same IP address and SSID.
The AP is not physically wired to the local LAN.
This configuration is found only in an ad hoc wireless network.
Where do ISPs get the public addresses that they assign to end users?
ISPs create the addresses themselves.
ISPs are assigned addresses through the RFC.
ISPs obtain their addresses automatically.
ISPs obtain address blocks from registry organizations.
For an IP address, what component decides the number of bits that is used to represent the host ID?
default-gateway
host number
network number
subnet mask
What describes the external IP address that is obtained by a router through a cable or DSL modem?
a public address that is obtained from ICANN
a private address that is manually configured by the administrator
a public address that is obtained through DHCP from the ISP
a private address that converts to a public address on the internal LAN
Which three address ranges can be used to depict private IP addresses? (Choose three.)
10.0.0.0 to 10.0.0.255
127.16.0.0 to 127.16.255.255
150.150.0.0 to 150.150.255.255
172.16.1.0 to 172.16.1.255
192.168.22.0 to 192.168.22.255
200.100.50.0 to 200.100.50.255
Your school network blocks all websites related to online gaming. What type of security policy is being applied?
identification and authentication
remote access
acceptable use
incident handling
Which part of the electromagnetic spectrum is commonly used by wireless LANs?
Bluetooth
infrared
Industrial Scientific and Medical (ISM)
radio frequency (RF)
Which type of attack involves flooding a server port with SYN messages?
phishing
brute force
denial of service
data manipulation
What is the source of the majority of reported network security incidents?
adware
hackers
internal users
spammers
Refer to the graphic. What feature can be installed on the Linksys integrated router to convert private IP addresses to Internet-routable addresses?
authentication
DHCP
encryption
firewall
NAT
WEP
Before implementing a stateful firewall on an ISR router, a network engineer is asked to explain to upper management in simple terms what a stateful firewall is. Which description should the engineer use?
A stateful firewall is only available on a firewall appliance.
A stateful firewall blocks or permits access based only on applications.
A stateful firewall bases its analysis only on IP address, port number, and MAC address.
A stateful firewall can be configured to allow incoming packets only from sessions that are initiated from inside.
What is the purpose of creating a DMZ during network firewall implementation?
to create a server security zone accessible only to internal clients
to create a dirty zone that allows all inbound and outbound traffic
to allow for a publicly accessible zone without compromising the internal network
to specify a higher security level than normally required for the internal production network
How does a straight-through cable connect two unlike devices?
It connects the receive pins on the first device to the receive pins on the second device.
It connects the transmit pins on the first device to the receive pins on the second device.
It disconnects the transmit pins and uses only the receive pins.
It uses the same pins for transmitting and receiving.
What is an advantage of selecting an operating system that has a commercial license over one with a GPL license?
The commercial license-based operating system ensures full access to the source code for everyone.
The commercial license-based operating system ensures that everyone can participate in the enhancement of the product.
The commercial license-based operating system provides structured support.
The commercial license-based operating system is released free of charge.
Which installation option enables a single physical resource to function simultaneously as multiple logical resources?
clean install
multi-boot
upgrade
virtualization
For devices that do not autosense, which connection requires a crossover cable?
hub port to router port
PC to hub port
PC to switch port
PC port to PC port
When terminating UTP cabling, why is it important to untwist only a small amount of each wire pair?
minimizes crosstalk
makes installation faster
ensures wires are in correct order
makes it easier to fit wires into connector
What are two examples of storage peripheral devices? (Choose two.)
printer
flash drive
headphones
external DVD
barcode reader
Within a local network, which two items must be unique on a computer for it to successfully connect to the network? (Choose two.)
IP address
subnet mask
computer name
default gateway address
operating system version
Refer to the exhibit. A ping command that was initiated from the local PC to the file server at IP address 209.165.201.5 succeeded. However, a ping that was initiated from the file server to the local PC was unsuccessful. What could cause the ping command that was initiated from file server to fail?
The file server is down.
The integrated router has failed.
NAT has been enabled on the integrated router.
A security measure is blocking access that initiates from the server.
The DSL modem failed to provide an IP address for the local PC.
Refer to the exhibit. Which statement is true based on the configuration shown?
Multiple modes of encryption are configured on this device.
Both 802.11b and 802.11g hosts can connect to this device.
All APs in the WLAN will allow wireless connections via channel 6.
The network name must be entered on a host computer before the host connects to this network.
Refer to the exhibit. What is the effect of setting the security mode to WEP on the Linksys integrated router?
The WEP security mode enables the AP to inform clients of its presence.
The WEP security mode encrypts network traffic during transmission between the AP and the wireless client. The WEP security mode generates a dynamic key each time a client establishes a connection with the AP.
The WEP security mode identifies the WLAN.
A network administrator is planning an inexpensive WLAN implementation at a small business site. Which two strategies should be included in the site survey? (Choose two.)
Identify the locations of sources of interference.
Hire a WLAN analysis firm to survey the site.
Deploy all APs and move them if necessary to improve coverage.
Use a wireless laptop to verify WLAN coverage in the work areas.
Employ sophisticated specialized equipment to measure signal strengths and interference.
While conducting a site survey for a new wireless LAN design, a network technician determines that several wireless phones in the company use the 2.4GHz band and could interfere with the operation of the wireless LAN. Based on this, which two wireless LAN standards could be implemented to avoid this interference? (Choose two.)
original 802.11
802.11a
802.11b
802.11g
802.11n
Refer to the exhibit. A small office uses an ISR to provide connectivity for both wired and wireless computers. One day, a sales person who is using a laptop cannot connect to Server1 through the wireless network. A network technician attempts to determine if the problem is on the wireless or the wired network. The technician pings successfully from the wireless laptop to the default gateway IP address on the ISR. What should be the next troubleshooting step?
Ping from the laptop to PC1.
Ping from Server1 to PC1.
Ping from Server1 to its gateway IP address.
Ping from the laptop to the Ethernet port on the cable modem.
A user is unable to send e-mail. To begin troubleshooting this problem, the network technician uses the browser on the PC and tries to access some popular Internet websites. Which troubleshooting approach is being followed?
bottom-up
divide-and-conquer
top-down
trial and error
For the second time in a week, workstations on a LAN are not able to log into the server. The technician fixed the problem the first time, but cannot remember the steps taken to solve it. What aspect of the troubleshooting process has the technician neglected?
identifying the problem
asking end-users questions
documenting the troubleshooting process
using structured techniques to solve a problem
Refer to the exhibit. When www.cisco.com is entered in a browser window on a PC, the web page is unavailable. While troubleshooting this problem, the network technician executes the nslookup command as well as the ping command to the web server. What is the likely reason that the web server home page cannot be displayed?
The DNS server service needs to be installed on the PC.
A DNS server is not available to resolve the name.
The reason that the web server is unable to display the web page is that the web server is unavailable.
The increased response time displayed in the ping may indicate a delay in server response time.
What is the meaning of the term crosstalk?
interference of signals between wire pairs
loss of signal strength as distance increases
damage of the signal when two bare wires touch
strengthening of a signal by a networking device
A user in a small office is unable to connect to the Internet. The user examines the physical connections to the ISR, a Linksys WRT300N, and notices a solid green LED on the port that is wired to the computer. What does the LED indicate about the current state of the port?
The ISR is making adjustments to the port.
The device is plugged in and traffic is flowing.
The computer is plugged in but no traffic is flowing.
The ISR does not detect that the computer is plugged in.