Tīkli

Is this your test? Login to manage it. If not, you can generate an exam just like it.

This is a non-interactive preview of the quiz content.

1.
1 point
66. Which OSI layer addressing is required to route packets between two networks?
2.
1 point
The tracert 10.1.3.2 command was issued on computer A. Computer A can ping other addresses on the local subnet. Computer A sent the first ICMP packet toward computer B with a TTL value of 1. A protocol analyzer that was running on computer B showed that the packet never reached its destination. Why did the packet not reach the destination?
http://ccna4u.net/2012/CCNA%201%20Final%20Exam%202012%20e.g.%203%20%7C%20DDoS-Protection%20-%20DoS_DDoS%20Attack%20Protection%20-%20Blog_files/18.JPG
3.
1 point
Refer to the exhibit. Host A is configured with the correct IP address for the default gateway of the router R1 FastEthernet0/1 interface. How will a packet that is sent from host A to host B be handled by the devices on the network? http://ccna4u.net/2012/CCNA%201%20Final%20Exam%20Answers%20-%20UPDATE%202012%20-%20e.g.%202%20%7C%20DDoS-Protection%20-%20DoS_DDoS%20Attack%20Protection%20-%20Blog_files/14.jpg
4.
1 point
37. Which router configuration mode would an administrator use to configure the router for SSH or Telnet login access?
5.
1 point
52. Which password is automatically encrypted when it is created?
6.
1 point
75. What are the default terminal emulation software settings when configuring a Cisco device through a console port?
7.
1 point
Refer to the exhibit. A network technician creates equal-sized subnets of network 192.168.2.0/24 using the subnet mask 255.255.255.224. If the technician wishes to calculate the number of host addresses in each subnet by using the formula that is shown in the exhibit, what value will be used for n?
http://ccna4u.net/2012/CCNA%201%20Final%20Exam%20Answers%20-%20UPDATE%202012%20-%20e.g.%202%20%7C%20DDoS-Protection%20-%20DoS_DDoS%20Attack%20Protection%20-%20Blog_files/16.jpg
8.
1 point
Which statement describes the correct use of addresses to deliver an e-mail message from HostB to the e-mail service that is running on ServerA?
9.
1 point
11. Refer to the exhibit. The diagram represents the process of sending e-mail between clients. Which list correctly identifies the component or protocol used at each numbered stage of the diagram?
10.
1 point
73. Which service is used when the nslookup command is issued on a computer?
11.
1 point
64. Which three IPv4 addresses represent subnet broadcast addresses? (Choose three.)
12.
1 point
80. Which subnet mask should be used for a Class B network that is divided into subnets and will accommodate between 800 hosts and 1000 hosts?
13.
1 point
49. A network administrator is configuring several switches for a network. The switches have similar configurations and only minor differences. The administrator wants to save all commands that are issued on the first switch to a text file for editing. Which transfer option should be selected in HyperTerminal?
14.
1 point
Refer to the exhibit. An employee wants to access the organization intranet from home. Which intermediary device should be used to connect the organization intranet to the Internet to enable this access?
http://ccna4u.net/2012/CCNA%201%20Final%20Exam%202012%20e.g.%203%20%7C%20DDoS-Protection%20-%20DoS_DDoS%20Attack%20Protection%20-%20Blog_files/10.jpg
15.
1 point
Refer to the exhibit. Interface Fa0/0 on router A is generating excessive broadcast traffic. Which LAN segments will affected by the excessive broadcasts?
16.
1 point
56. Which information is used by the router to determine the path between the source and destination hosts?
17.
1 point
78. Which router configuration mode will require user authentication if an administrator issues the enable secret command?
18.
1 point
41. Which prompt is associated with the privileged exec mode?
19.
1 point
89. Which OSI layer manages data segments?
20.
1 point
72. During the encapsulation process, what is the PDU of the internet layer?
21.
1 point
54. Which prompt represents the appropriate mode used for the copy running-config startup-config command ?
22.
1 point
Refer to the exhibit. A web browser running on host PC1 sends a request for a web page to the web server with an IP address 192.168.1.254/24. What sequence of steps will follow in order to establish the session before data can be exchanged?
http://ccna4u.net/2012/CCNA%201%20Final%20Exam%20Answers%20-%20UPDATE%202012%20-%20e.g.%202%20%7C%20DDoS-Protection%20-%20DoS_DDoS%20Attack%20Protection%20-%20Blog_files/19.jpg
23.
1 point
85. In a network design project, a network designer needs to select a device to provide collision free connections to 40 hosts on the LAN. Which device should be selected?
24.
1 point
84. What is the effect of using the Router# copy running-config startup-config command on a router?
25.
1 point
Refer to the exhibit. A technician has been asked to test connectivity from PC1 to a remote network. Which action will indicate if there is remote connectivity?
26.
1 point
44. Two routers are connected via their serial ports in a lab environment. The routers are configured with valid IP addresses, but they cannot ping each other. The show interface serial0/0 command shows that the serial0/0 interface is up but the line protocol is down. What could be the cause of this problem?
27.
1 point
Refer to the exhibit. Which device should be included in the network topology to provide Layer 2 connectivity for all LAN devices, provide multiple collision domains, and also provide a connection to the rest of the network?
28.
1 point
91. To enhance security in a network, the network administrator uses these commands:
Router(config)# line console 0
Router(config-line)#password j1mdi2
Router(config-line)# login

92. What two conclusions are evident from these commands? (Choose two.)
29.
1 point
Refer to the exhibit. While configuring a network, a technician wired each end of a Category 5e cable as shown. Which two statements are true about this setup? (Choose two.)
30.
1 point
Refer to the exhibit. Which layered network model is shown in the diagram?
31.
1 point
51. Due to a security violation, the router passwords must be changed. What information can be learned from the following configuration entries? (Choose two.)
Router(config)# line vty 0 3
Router(config-line)# password c13c0
Router(config-line)# login
32.
1 point
83. Which prompt is associated with the privileged exec mode?
33.
1 point
65. Which three statements are true about network layer addressing? (Choose three.)
34.
1 point
Refer to the exhibit. Host A is unable to reach host B on the remote network. A technician attempted to ping the local gateway and the ping was successful. To verify the host configuration, the technician issued the ipconfig command. What is the likely cause of the problem?
35.
1 point
Refer to the exhibit. The network containing router B is experiencing problems. A network associate has isolated the issue in this network to router B. What action can be preformed to correct the network issue?
http://ccna4u.net/2012/CCNA%201%20Final%20Exam%20Answers%20-%20UPDATE%202012%20-%20e.g.%202%20%7C%20DDoS-Protection%20-%20DoS_DDoS%20Attack%20Protection%20-%20Blog_files/18.jpg
36.
1 point
40. What purpose does a hostname serve on a router?
37.
1 point
96. What can the user do from the command prompt, Router(config-line)# ?
38.
1 point
Refer to the exhibit. The router of the company failed and was replaced. After the replacement, hosts C and D in the Education office are able to ping each other, but they are unable to access the hosts in the Accounts office. What is the likely cause of the problem?
39.
1 point
Refer to the exhibit. A network administrator tries to test the connectivity between routers R1 and R2, but the attempt to ping is unsuccessful. Based on the show ip interface brief command outputs, what could be the possible cause of the problem?
http://ccna4u.net/2012/CCNA%201%20Final%20Exam%20Answers%20-%20UPDATE%202012%20-%20e.g.%202%20%7C%20DDoS-Protection%20-%20DoS_DDoS%20Attack%20Protection%20-%20Blog_files/17.jpg
40.
1 point
76. In a packet-switched data network, what is used to reassemble the packets in the correct order at the destination device?
41.
1 point
42. A technician wishes to connect two computers to move data from one to the other before reloading the operating system. The NICs on both PCs do not support autosensing feature. Which procedure will satisfy the requirement?
42.
1 point
94. A user enters http://www.cisco.com/web1.htm in the address line of a browser. Which statement is true about this transaction?
43.
1 point
70. Which option correctly identifies the interface or interfaces used to connect the router to a CSU/DSU for WAN connectivity?
44.
1 point
35. Which statement accurately describes file sharing in a peer-to-peer network?
45.
1 point

48. An organization has been assigned network ID 10.10.128.0 and subnet mask 255.255.224.0. Which IP address range can be used for this organization?
46.
1 point
79. Which location of router memory is cleared with the erase startup-config command?
47.
1 point
50. When must a router serial interface be configured with the clock rate command?
48.
1 point
71. How many host addresses may be assigned when using the 128.107.0.0 network address with a subnet mask of 255.255.248.0?
49.
1 point
36. What are two primary responsibilities of the Ethernet MAC sublayer? (Choose two.)
50.
1 point
86. Which communication tool allows real-time collaboration?