Tīkli2

Is this your test? Login to manage it. If not, you can make a test just like it.

This is a non-interactive preview of the quiz content.

1.
1 point
124. A PC can not connect to any remote websites, ping its default gateway, or ping a printer that is functioning properly on the local network segment. Which action will verify that the TCP/IP stack is functioning correctly on this PC?
2.
1 point
23. What is the correct order for PDU encapsulation?
3.
1 point
126. An administrator needs management access to a switch from a remote offsite location. Which three configurations are required on the switch to allow the administrator to have remote access using either SSH or Telnet? (Choose three.)
4.
1 point
99. Which topology divides the collision domain and provides full media bandwidth to the hosts in the network?
5.
1 point
115. What is the effect of the command copy running-config tftp?
6.
1 point
132. A network administrator needs to provide administrative access for certain users. Which mode will allow users access to both the show and debug commands?
7.
1 point
131. Which three addresses are private IP addresses? (Choose three.)
8.
1 point
125. What are two purposes for configuring a banner on a router? (Choose two.)
9.
1 point
119. Refer to the exhibit. The network administrator for a small advertising company has chosen to use the 192.168.5.96/27 network for internal LAN addressing. As shown in the exhibit, a static IP address is assigned to the company web server. However, the web server cannot access the Internet. The administrator verifies that local workstations with IP addresses that are assigned by a DHCP server can access the Internet, and the web server is able to ping local workstations. Which component is incorrectly configured?

http://3.bp.blogspot.com/-rFWwovCPkv8/UeZ_NaTHMBI/AAAAAAAAF7w/6uPN4DEieVY/s1600/df.png
10.
1 point
130. What action is taken by a host on an Ethernet network when the host attempts to contact a remote host on another network?
11.
1 point
122. Which scenario describes a typical peer-to-peer network environment?
12.
1 point
137. What is the Cisco IOS?
13.
1 point
Refer to the exhibit. For connecting two routers with an Ethernet crossover cable, which interface should be used?
http://ccna4u.net/2012/CCNA%201%20Final%20Exam%202012%20e.g.%203%20%7C%20DDoS-Protection%20-%20DoS_DDoS%20Attack%20Protection%20-%20Blog_files/38.jpg
14.
1 point
14. Which subnet mask will allow 2040 hosts per subnet on the IP network 10.0.0.0?
15.
1 point
106. Which two factors contribute to the increased throughput when all nodes of a LAN are connected to a switch instead of a hub? (Choose two.)
16.
1 point
118. Refer to the exhibit. A network technician wants to connect host A to the console of a Cisco switch to initialize the configuration. What type of cable is required for this connection?
17.
1 point
135. A network technician wants to configure an IP address on a router interface by using the ip address 192.168.1.1 255.255.255.0 command. Which prompt should the technician see when entering this command?
18.
1 point
Refer to the exhibit. Host A is able to access resources on the local LAN but is unable to access any resources on the Internet. What is the likely cause of this problem?
http://ccna4u.net/2012/CCNA%201%20Final%20Exam%202012%20e.g.%203%20%7C%20DDoS-Protection%20-%20DoS_DDoS%20Attack%20Protection%20-%20Blog_files/30.jpg
19.
1 point
17. Which statement is true about the TTL value of an IPv4 packet?
20.
1 point
129. During the encapsulation process, what identifiers are added at the transport layer?
21.
1 point
Refer to the exhibit. A network administrator remotely accesses the CLI of RouterB from PC1 using Telnet. Which statement is true about this connection?
22.
1 point
2. Which two functions of the OSI model occur at layer two? (Choose two.)
23.
1 point
9. Which OSI layer does IP rely on to determine whether packets have been lost and to request retransmission?
24.
1 point
7. A technician is asked to secure the privileged EXEC mode of a switch by requiring a password. Which type of password would require this login and be considered the most secure?
25.
1 point
101. A technician is setting up a workgroup for six users and wants to allow users to share files without setting up a server. Which application layer protocol will provide for peer-to-peer file sharing in a workgroup?
26.
1 point
107. A network technician has made a UTP cable that is terminated as T568A on one end and T568B on the opposite end. What type of cable has been constructed?
27.
1 point
Refer to the exhibit. Which option correctly identifies the network address, range of host addresses, and the broadcast address for the network that contains host A?
28.
1 point
16. To send data through a network, what two flags are used to establish a session? (Choose two.)
29.
1 point
121. Refer to the exhibit. Each media link is labeled. What type of cable should be used to connect the different devices?
http://2.bp.blogspot.com/-73JxcBQsAQ4/UeaAokwUTjI/AAAAAAAAF8A/HPDP0IRVMNs/s1600/16479.jpg
30.
1 point
108. Which application belongs to the category of the client/server model?
31.
1 point
Refer to the exhibit. What two facts can be determined from the session information that is displayed? (Choose two.)
http://ccna4u.net/2012/CCNA%201%20Final%20Exam%202012%20e.g.%203%20%7C%20DDoS-Protection%20-%20DoS_DDoS%20Attack%20Protection%20-%20Blog_files/43.jpg
32.
1 point
4. What is true regarding network layer addressing? (Choose three.)
33.
1 point
123. What type of cable is being used if a network administrator is connecting two Cisco routers and uses the 100BaseTX standard?
34.
1 point
Refer to the exhibit. Which two layers of the OSI model describe the same functions as the transport and internet layers of the TCP/IP model? (Choose two.)
35.
1 point
138. Refer to the exhibit. What is the total amount of RAM on the router?
36.
1 point
102. Which router component will have contents erased when the command erase startup-config is issued?
37.
1 point
24. What information can be gathered by using the command netstat?
38.
1 point
120. A technician makes several changes to the running configuration on a router, but the desired results are not achieved. The technician issues the reload command. What action will be taken by the router?
39.
1 point
134. Which statement is true about Layer 3 addresses?
40.
1 point
133. A network has grown too large for technicians to configure network addresses and hosts files for name resolution. Which two application layer services should be added to the server to allow these needs to be satisfied dynamically? (Choose two.)
41.
1 point
105. What is described by the network access layer of the TCP/IP model?
42.
1 point
19. What type of network is maintained if a server takes no dedicated role in the network?
43.
1 point
127. Which three commands will change the current configuration mode of a router? (Choose three.)
44.
1 point
97. Which option shows the PDU that contains the Layer 3 source and destination addressing for a packet?
45.
1 point
110. What command can be used to troubleshoot domain name resolution issues?
46.
1 point
136. UDP is the transport layer protocol for which application?
47.
1 point
112. Which three addresses belong to the category of public IP addresses? (Choose three.)
48.
1 point
128. Which device should be used for enabling a host to communicate with another host on a different network?
49.
1 point
Refer to the exhibit. The ping 127.0.0.1 command is issued on the local host. What do the ping results indicate?
http://ccna4u.net/2012/CCNA%201%20Final%20Exam%202012%20e.g.%203%20%7C%20DDoS-Protection%20-%20DoS_DDoS%20Attack%20Protection%20-%20Blog_files/23.jpg
50.
1 point
10. When connectionless protocols are implemented at the lower layers of the OSI model, what is usually used to acknowledge that the data was received and to request the retransmission of missing data?