CCNA Final Exam P2

Is this your test? Login to manage it. If not, you can generate an assessment just like it.

This is a non-interactive preview of the quiz content.

1.
1 point
http://blog.ddos-protection.eu/img/ex-ccna1-final-2/13.png
Which statement describes the correct use of addresses to deliver an e-mail message from HostB to the e-mail service that is running on ServerA?
2.
1 point
In a network design project, a network designer needs to select a device to provide collision free connections to 40 hosts on the LAN. Which device should be selected?
4.
1 point
Which of the following are the address ranges of the private IP addresses? (Choose three.)
5.
1 point
http://blog.ddos-protection.eu/img/ex-ccna1-final-2/11.jpg
Refer to the exhibit. Host A sends a frame with the destination MAC address as FFFF.FFFF.FFFF. What action will the switch take for this frame?
6.
1 point
Which service is used when the nslookup command is issued on a computer?
7.
1 point
During the encapsulation process, what is the PDU of the internet layer?
8.
1 point
http://blog.ddos-protection.eu/img/ex-ccna1-final-2/14.jpg
Refer to the exhibit. Host A is configured with the correct IP address for the default gateway of the router R1 FastEthernet0/1 interface. How will a packet that is sent from host A to host B be handled by the devices on the network?
9.
1 point
Which three statements are true about network layer addressing? (Choose three.)
10.
1 point
Which application layer protocol allows administrators to log into a server from remote locations and control a server as though logged in locally?
11.
1 point
http://blog.ddos-protection.eu/img/ex-ccna1-final-2/12.jpg
Refer to the exhibit. Host A is requesting a web page from the web server. Which option represents the socket to which the request is made?
12.
1 point
Which router configuration mode will require user authentication if an administrator issues the enable secret command?
13.
1 point
http://blog.ddos-protection.eu/img/ex-ccna1-final-2/8.jpg
Refer to the exhibit. Host A and B are unable to communicate with each other. What is the reason for this?
14.
1 point
A user sees the command prompt: Router(config-if)# . What task can be performed at this mode?
15.
1 point
http://blog.ddos-protection.eu/img/ex-ccna1-final-2/4.jpg
Refer to the exhibit. The tracert command is initiated from PC1 to PC4. Which device will send a response to the initial tracert packet from PC1?
16.
1 point
Which three IPv4 addresses represent subnet broadcast addresses? (Choose three.)
17.
1 point
In a packet-switched data network, what is used to reassemble the packets in the correct order at the destination device?
18.
1 point
Which prompt represents the appropriate mode used for the copy running-config startup-config command?
19.
1 point
http://blog.ddos-protection.eu/img/ex-ccna1-final-2/20.jpg
Refer to the exhibit. Interface Fa0/0 on router A is generating excessive broadcast traffic. Which LAN segments will affected by the excessive broadcasts?
20.
1 point
How many host addresses may be assigned when using the 128.107.0.0 network address with a subnet mask of 255.255.248.0?
21.
1 point
Well-known services and applications use which range of TCP/UDP port numbers?
22.
1 point
Which subnet mask should be used for a Class B network that is divided into subnets and will accommodate between 800 hosts and 1000 hosts?
23.
1 point
http://blog.ddos-protection.eu/img/ex-ccna1-final-2/19.jpg
Refer to the exhibit. A web browser running on host PC1 sends a request for a web page to the web server with an IP address 192.168.1.254/24. What sequence of steps will follow in order to establish the session before data can be exchanged?
24.
1 point
http://blog.ddos-protection.eu/img/ex-ccna1-final-2/18.jpg
Refer to the exhibit. The network containing router B is experiencing problems. A network associate has isolated the issue in this network to router B. What action can be preformed to correct the network issue?
25.
1 point
http://blog.ddos-protection.eu/img/ex-ccna1-final-2/1.jpg
Refer to the exhibit. A network technician is trying to determine the correct IP address configuration for Host A. What is a valid configuration for Host A?
26.
1 point
Which information is used by the router to determine the path between the source and destination hosts?
27.
1 point
Which password is automatically encrypted when it is created?
28.
1 point
What is the effect of using the Router# copy running-config startup-config command on a router?
29.
1 point
What type of network is maintained if a server takes no dedicated role in the network?
30.
1 point
http://blog.ddos-protection.eu/img/ex-ccna1-final-2/5.jpg
Refer to the exhibit. A PC is communicating with another PC on a remote network. The two networks are connected by three routers. Which action will help to identify the path between the hosts?
31.
1 point
http://blog.ddos-protection.eu/img/ex-ccna1-final-2/10.jpg
Refer to the exhibit. While configuring a network, a technician wired each end of a Category 5e cable as shown. Which two statements are true about this setup? (Choose two.)
32.
1 point
Which two programs can be used to accomplish terminal emulation for configuring a router from the CLI through the console port? (Choose two.)
33.
1 point
A routing issue has occurred in your internetwork. Which of the following type of devices should be examined to isolate this error?
34.
1 point
http://blog.ddos-protection.eu/img/ex-ccna1-final-2/6.jpg
Refer to the exhibit. The diagram represents the process of sending e-mail between clients. Which list correctly identifies the component or protocol used at each numbered stage of the diagram?
35.
1 point
Which location of router memory is cleared with the erase startup-config command?
36.
1 point
http://blog.ddos-protection.eu/img/ex-ccna1-final-2/2.jpg
Refer to the exhibit. What function does router RT_A need to provide to allow Internet access for hosts in this network?
37.
1 point
Which communication tool allows real-time collaboration?
38.
1 point
Which OSI layer addressing is required to route packets between two networks?
39.
1 point
What are the default terminal emulation software settings when configuring a Cisco device through a console port?
40.
1 point
http://blog.ddos-protection.eu/img/ex-ccna1-final-2/16.jpg'
Refer to the exhibit. A network technician creates equal-sized subnets of network 192.168.2.0/24 using the subnet mask 255.255.255.224. If the technician wishes to calculate the number of host addresses in each subnet by using the formula that is shown in the exhibit, what value will be used for n?
41.
1 point
http://blog.ddos-protection.eu/img/ex-ccna1-final-2/3.jpg
Refer to the exhibit. A technician is working on a network problem that requires verification of the router LAN interface. What address should be pinged from this host to confirm that the router interface is operational?
43.
1 point
http://blog.ddos-protection.eu/img/ex-ccna1-final-2/15.jpg
Refer to the exhibit. Host A is unable to reach host B on the remote network. A technician attempted to ping the local gateway and the ping was successful. To verify the host configuration, the technician issued the ipconfig command. What is the likely cause of the problem?
44.
1 point
When must a router serial interface be configured with the clock rate command?
45.
1 point
http://blog.ddos-protection.eu/img/ex-ccna1-final-2/7.jpg
Refer to the exhibit. The router of the company failed and was replaced. After the replacement, hosts C and D in the Education office are able to ping each other, but they are unable to access the hosts in the Accounts office. What is the likely cause of the problem?
46.
1 point
http://blog.ddos-protection.eu/img/ex-ccna1-final-2/17.jpg
Refer to the exhibit. A network administrator tries to test the connectivity between routers R1 and R2, but the attempt to ping is unsuccessful. Based on the show ip interface brief command outputs, what could be the possible cause of the problem?
47.
1 point
http://blog.ddos-protection.eu/img/ex-ccna1-final-2/9.jpg
Refer to the exhibit. Host B attempts to establish a TCP/IP session with host C. During this attempt, a frame was captured at the FastEthernet interface fa0/1 of the San Francisco router. The packet inside the captured frame has the source IP address 10.10.1.2, and the destination IP address is 10.31.1.20. What is the destination MAC address of the frame at the time of capture?
48.
1 point
A network administrator is configuring several switches for a network. The switches have similar configurations and only minor differences. The administrator wants to save all commands that are issued on the first switch to a text file for editing. Which transfer option should be selected in HyperTerminal?
49.
1 point
Due to a security violation, the router passwords must be changed. What information can be learned from the following configuration entries? (Choose two.)
Router(config)# line vty 0 3
Router(config-line)# password c13c0
Router(config-line)# login
50.
1 point
Which prompt is associated with the privileged exec mode?