CCNA Final Exam P1

Is this your test? Login to manage it. If not, you can generate an exam just like it.

This is a non-interactive preview of the quiz content.

2.
1 point
Refer to the exhibit. A network technician wants to connect host A to the console of a Cisco switch to initialize the configuration. What type of cable is required for this connection?
3.
1 point
Which router component will have contents erased when the command erase startup-config is issued?
4.
1 point
http://ccna4u.net/2012/CCNA%201%20Final%20Exam%202012%20e.g.%203%20%7C%20DDoS-Protection%20-%20DoS_DDoS%20Attack%20Protection%20-%20Blog_files/3.jpg
Refer to the exhibit. What function does router RT_A need to provide to allow Internet access for hosts in this network?
5.
1 point
A user enters http://www.cisco.com/web1.htm in the address line of a browser. Which statement is true about this transaction?
6.
1 point
Which application layer protocol allows administrators to log into a server from remote locations and control a server as though logged in locally?
7.
1 point
Which two factors contribute to the increased throughput when all nodes of a LAN are connected to a switch instead of a hub? (Choose two.)
8.
1 point
A technician is setting up a workgroup for six users and wants to allow users to share files without setting up a server. Which application layerprotocol will provide for peer-to-peer file sharing in a workgroup?
10.
1 point
What is described by the network access layer of the TCP/IP model?
11.
1 point
http://ccna4u.net/2012/CCNA%201%20Final%20Exam%202012%20e.g.%203%20%7C%20DDoS-Protection%20-%20DoS_DDoS%20Attack%20Protection%20-%20Blog_files/23.jpg
Refer to the exhibit. The ping 127.0.0.1 command is issued on the local host. What do the ping results indicate?
12.
1 point
http://ccna4u.net/2012/CCNA%201%20Final%20Exam%202012%20e.g.%203%20%7C%20DDoS-Protection%20-%20DoS_DDoS%20Attack%20Protection%20-%20Blog_files/38.jpg
Refer to the exhibit. For connecting two routers with an Ethernet crossover cable, which interface should be used?
13.
1 point
http://ccna4u.net/2012/CCNA%201%20Final%20Exam%202012%20e.g.%203%20%7C%20DDoS-Protection%20-%20DoS_DDoS%20Attack%20Protection%20-%20Blog_files/14.jpg
Refer to the exhibit. RouterB is configured properly. The Ethernet interface Fa0/0 of RouterA is configured with the use of the commands that are shown. However, a ping from the Fa0/0 interface of RouterA to the Fa0/0 interface of RouterB is unsuccessful. What action should be taken on RouterA to solve this problem?
14.
1 point
Which prompt is associated with the privileged exec mode?
15.
1 point
An organization has been assigned network ID 10.10.128.0 and subnet mask 255.255.224.0. Which IP address range can be used for this organization?
16.
1 point
A routing issue has occurred in your internetwork. Which of the following type of devices should be examined to isolate this error?
17.
1 point
http://ccna4u.net/2012/CCNA%201%20Final%20Exam%202012%20e.g.%203%20%7C%20DDoS-Protection%20-%20DoS_DDoS%20Attack%20Protection%20-%20Blog_files/36.jpg
Refer to the exhibit. Which two layers of the OSI model describe the same functions as the transport and internet layers of the TCP/IP model? (Choose two.)
18.
1 point
http://ccna4u.net/2012/CCNA%201%20Final%20Exam%202012%20e.g.%203%20%7C%20DDoS-Protection%20-%20DoS_DDoS%20Attack%20Protection%20-%20Blog_files/7.jpg
Refer to the exhibit. A technician is working on a network problem that requires verification of the router LAN interface. What address should be pinged from this host to confirm that the router interface is operational?
19.
1 point
What is the effect of the command copy running-config tftp?
20.
1 point
http://ccna4u.net/2012/CCNA%201%20Final%20Exam%202012%20e.g.%203%20%7C%20DDoS-Protection%20-%20DoS_DDoS%20Attack%20Protection%20-%20Blog_files/30.jpg
Refer to the exhibit. Host A is able to access resources on the local LAN but is unable to access any resources on the Internet. What is the likely cause of this problem?
21.
1 point
http://ccna4u.net/2012/CCNA%201%20Final%20Exam%202012%20e.g.%203%20%7C%20DDoS-Protection%20-%20DoS_DDoS%20Attack%20Protection%20-%20Blog_files/18.JPG
The tracert 10.1.3.2 command was issued on computer A. Computer A can ping other addresses on the local subnet. Computer A sent the first ICMP packet toward computer B with a TTL value of 1. A protocol analyzer that wasrunning on computer B showed that the packet never reached its destination. Why did the packet not reach the destination?
22.
1 point
Which three addresses belong to the category of public IP addresses? (Choose three.)
23.
1 point
http://ccna4u.net/2012/CCNA%201%20Final%20Exam%202012%20e.g.%203%20%7C%20DDoS-Protection%20-%20DoS_DDoS%20Attack%20Protection%20-%20Blog_files/43.jpg
Refer to the exhibit. What two facts can be determined from the session information that is displayed? (Choose two.)
25.
1 point
Which range of port numbers are reserved for services that are commonly used by applications that run on servers?
26.
1 point
http://ccna4u.net/2012/CCNA%201%20Final%20Exam%202012%20e.g.%203%20%7C%20DDoS-Protection%20-%20DoS_DDoS%20Attack%20Protection%20-%20Blog_files/10.jpg
Refer to the exhibit. An employee wants to access the organization intranetfrom home. Which intermediary device should be used to connect the organization intranet to the Internet to enable this access?
27.
1 point
http://ccna4u.net/2012/CCNA%201%20Final%20Exam%202012%20e.g.%203%20%7C%20DDoS-Protection%20-%20DoS_DDoS%20Attack%20Protection%20-%20Blog_files/4.jpg
Refer to the exhibit. Host A attempts to establish a TCP/IP session with host C. During this attempt, a frame was captured with the source MAC address0050.7320.D632 and the destination MAC address 0030.8517.44C4. The packet inside the captured frame has an IP source address 192.168.7.5, and the destination IP address is 192.168.219.24. At which point in the network was this packet captured?
28.
30.
1 point
Which OSI layer manages data segments?
31.
1 point
http://ccna4u.net/2012/CCNA%201%20Final%20Exam%202012%20e.g.%203%20%7C%20DDoS-Protection%20-%20DoS_DDoS%20Attack%20Protection%20-%20Blog_files/16.jpg
Refer to the exhibit. Communication for hosts X and Y is restricted to the local network. What is the reason for this?
34.
1 point
Which two types of media can provide bandwidth up to 1 Gb/s? (Choose two.)
35.
1 point
A technician is asked to secure the privileged EXEC mode of a switch by requiring a password. Which type of password would require this login and be considered the most secure?
36.
1 point
Which prompt represents the appropriate mode used for the copy running-config startup-config command ?
37.
1 point
A technician makes several changes to the running configuration on a router, but the desired results are not achieved. The technician issues the reload command. What action will be taken by the router?
38.
1 point
What can the user do from the command prompt, Router(config-line)# ?
39.
1 point
Which application belongs to the category of the client/server model?
40.
1 point
A network technician has made a UTP cable that is terminated as T568A on one end and T568B on the opposite end. What type of cable has been constructed?
41.
1 point
http://ccna4u.net/2012/CCNA%201%20Final%20Exam%202012%20e.g.%203%20%7C%20DDoS-Protection%20-%20DoS_DDoS%20Attack%20Protection%20-%20Blog_files/8.jpg
Refer to the exhibit. Host A is unable to reach host B on the remote network. A technician attempted to ping the local gateway and the ping was successful. To verify the host configuration, the technician issued the ipconfig command. What is the likely cause of the problem?
42.
1 point
http://ccna4u.net/2012/CCNA%201%20Final%20Exam%202012%20e.g.%203%20%7C%20DDoS-Protection%20-%20DoS_DDoS%20Attack%20Protection%20-%20Blog_files/48.jpg
Refer to the exhibit. A network administrator remotely accesses the CLI of RouterB from PC1 using Telnet. Which statement is true about this connection?
43.
1 point
http://ccna4u.net/2012/CCNA%201%20Final%20Exam%202012%20e.g.%203%20%7C%20DDoS-Protection%20-%20DoS_DDoS%20Attack%20Protection%20-%20Blog_files/28.jpg
Refer to the exhibit. Host1 is in the process of setting up a TCP session with Host2. Host1 has sent a SYN message to begin session establishment. What happens next?
44.
1 point
When must a router serial interface be configured with the clock rate command?
45.
1 point
To enhance security in a network, the network administrator uses these commands:
Router(config)# line console 0
Router(config-line)#password j1mdi2
Router(config-line)# login
What two conclusions are evident from these commands? (Choose two.)
46.
1 point
What command can be used to troubleshoot domain name resolution issues?
47.
1 point
http://ccna4u.net/2012/CCNA%201%20Final%20Exam%202012%20e.g.%203%20%7C%20DDoS-Protection%20-%20DoS_DDoS%20Attack%20Protection%20-%20Blog_files/15.jpg
Refer to the exhibit. When host A sends a frame addressed for host D, which hosts will receive the frame?
48.
1 point
How many host addresses may be assigned when using the 128.107.0.0 network address with a subnet mask of 255.255.248.0?
49.
1 point
http://ccna4u.net/2012/CCNA%201%20Final%20Exam%202012%20e.g.%203%20%7C%20DDoS-Protection%20-%20DoS_DDoS%20Attack%20Protection%20-%20Blog_files/2.jpg
Refer to the exhibit. A network technician is trying to determine the correct IP address configuration for Host A. What is a valid configuration for Host A?
50.
1 point
Which communication tool allows real-time collaboration?