Skip to content
November 30, 2009 / ccnav4

CCNA1 Practice Final H(98%)

Practice Final (98%)

1.
Refer to the exhibit. A network technician wants to connect host A to the console
of a Cisco switch to initialize the configuration.
What type of cable is required for this connection?

straight-through cable

crossover cable

rollover cable

serial cable

2
Which device should be used for routing a packet to a remote network?

access switch

DHCP server

hub

router

3

Refer to the exhibit. What is required on host A for a network technician to create the initial configuration on Router1?

an FTP client

a Telnet client

a terminal emulation program

a web browser

http://www.ccna4u.org

4

Refer to the exhibit. Which statement is true about e-mail transmission between computer A and the server?

The server will use HTTP to push messages to computer A.

Computer A will connect to the server and retrieve inbound messages by using POP.

The e-mail client on computer A uses SMTP to pull inbound messages from the server and push outbound messages to the server.

A connection is established from computer A to the server on port 21 and the client software uses FTP to transmit messages as discreet files.

5

Refer to the exhibit. The PC, the routing table of which is displayed, is configured correctly. To which network device or interface does the IP address 192.168.1.254 belong?

PC

switch

router interface fa0/0

router interface fa0/1

6

Refer to the exhibit. Which two statements describe the information that is represented in the header? (Choose two.)

This is a server response.

The UDP protocol is being used.

The destination port indicates a Telnet session.

The return segment will contain a source port of 23.

The next session originated from the client of this session will use the source port number 13358.

7

Refer to the exhibit. What is the correct destination socket number for a web page request from Host A to the web server?

00-08-a3-b6-ce-46

198.133.219.25:80

http://www.cisco.com

C 198.133.219.0/24 is directly connected, FastEthernet0/0

8
In a Cisco IOS device, where is the startup-configuration file stored?

Flash

NVRAM

RAM

ROM

9

Refer to the exhibit. The network containing router B is experiencing problems. A network associate has isolated the issue in this network to router B. What action can be preformed to correct the network issue?

issue the clock rate command on interface Serial 0/0/0

issue the description command on interface Serial 0/0/1

issue the ip address command on interface FastEthernet 0/0

issue the no shutdown command on interface FastEthernet 0/1

10

Refer to the exhibit. Each media link is labeled. What type of cable should be used to connect the different devices?

Connection 1 – rollover cable Connection 2 – straight-through cable Connection 3 – crossover cable

Connection 1 – straight-through cable Connection 2 – crossover cable Connection 3 – rollover cable

Connection 1 – crossover cable Connection 2 – rollover cable Connection 3 – straight-through cable

Connection 1 – crossover cable Connection 2 – straight-through cable Connection 3 – rollover cable

Connection 1 – straight-through cable Connection 2 – straight-through cable Connection 3 – straight-through cable

11
Because of a security violation, the router password must be changed. What information can be learned from these configuration entries? (Choose two.)

Router(config)# line vty 0 4
Router(config-line)# password arj15
Router(config-line)# login

This configuration allows users to connect by using a modem.

Users must specify which line, 0 or 4, they wish to connect to when making a connection.

This configuration allows users to connect to the router via the use of the telnet command.

This configuration allows five users to make simultaneous connections to this router.

The configured password is automatically encrypted on the router.

12

Refer to the exhibit. Which option correctly describes the purpose for the IP address that is assigned to VLAN 100?

provides remote switch management

identifies the subnet for hosts in VLAN 100

serves as default gateway to hosts in VLAN 100

creates a routing table entry for packets to network 192.168.0.0

13
During the encapsulation process of the TCP/IP model, which layer will attach the IP header to the data?

application

transport

internet

network access

14

Refer to the exhibit. The NAT functionality of the router is enabled to provide Internet access to the PC. However, the PC is still unable to access the Internet. Which IP address should be changed to 209.165.201.1 to enable the PC to access the Internet?

192.168.1.191

192.168.1.101

192.168.1.1

192.168.1.254

15
Which OSI layer uses a connection-oriented protocol to ensure reliable delivery of data?

application layer

presentation layer

session layer

transport layer

16

The source port indicates that the session is an http session.

The connection is not successful.

The source port of the host is 3166.

The destination port is 80.

The source port does not support communication with the destination port that is listed.

The source port indicates that a UDP session has been initiated.

17
An administrator has made changes to a device. The changes did not have the desired effect. What can the administrator do to restore the configuration saved in NVRAM?

Issue the erase flash command.

Issue the reload command and respond no to the prompt that follows.

Issue the erase start-up config command.

Issue the copy running-config start-up config command.

18
Which statement is true about the running configuration file in a Cisco IOS device?

It affects the operation of the device immediately when modified.

It is stored in NVRAM.

It should be deleted using the erase running-config command.

It is automatically saved when the router reboots.

19

Refer to the exhibit. The headers added at each layer are shown. Which layer adds the destination and source process numbers to ensure that data is delivered to the correct application?

physical layer

data link layer

network layer

transport layer

20
What information is contained in the header of Layer 3 to help data delivery?

port number

device physical address

destination host logical address

virtual connection identifier

21
Which type of media is immune to EMI and RFI? (Choose two.)

10 Base-T

10 Base-2

10 Base-5

100 Base-FX

100 Base TX

1000 Base LX

22

Refer to the exhibit. Which two facts can be determined about the topology? (Choose two.)

Four collision domains are present.

One logical network is represented.

Two broadcast domains are present.

Three networks are needed.

Three logical address ranges are required.

23
While configuring a router, a network technician wants to name the router. Which prompt should the technician see when entering the hostname command?

Router>

Router#

Router(config)#

Router(config-line)#

24

Refer to the exhibit. The host was disconnected from switch 2 and connected to switch 1. Which combination of IP address, subnet mask, and default gateway should be assigned to this host to allow it to function in the network?

IP address: 10.10.9.37 Subnet mask: 255.255.255.240 Default gateway: 10.10.9.35

IP address: 10.10.9.37 Subnet mask: 255.255.255.224 Default gateway: 10.10.9.35

IP address: 10.10.9.29 Subnet mask: 255.255.255.248 Default gateway: 10.10.9.35

IP address: 10.10.9.32 Subnet mask: 255.255.255.224 Default gateway: 10.10.9.35

IP address: 10.10.9.37 Subnet mask: 255.255.255.224 Default gateway: 196.1.105.6

IP address: 10.10.9.63 Subnet mask: 255.255.255.224 Default gateway: 10.10.9.35

25

Refer to the exhibit. The network administrator remotely accesses the CLI of RouterB from PC1 using a secure connection. Which statement is true about this connection?

The Telnet server process is running on PC1.

Only the exchange of the Telnet username and password is encrypted.

The GET request is sent to RouterA to retrieve data.

The SSH service is used to connect PC1 to RouterB.

26

Refer to the exhibit. A router, the table of which is shown, receives a packet that is destined for 192.168.9.4. How will the router treat the packet?

It will drop the packet.

It will forward the packet via FastEthernet 0/1.

It will forward the packet to the next hop address.

It will forward the packet to 172.16.2.0

27
Which three statements characterize the transport layer protocols? (Choose three.)

TCP and UDP port numbers are used by application layer protocols.

TCP uses port numbers to provide reliable transportation of IP packets.

UDP uses windowing and acknowledgments for reliable transfer of data.

TCP uses windowing and sequencing to provide reliable transfer of data.

TCP is a connection-oriented protocol. UDP is a connectionless protocol.

28

Refer to the exhibit. Host B was powered off. What change will occur in the MAC table of the switch?

The table will remain unaffected.

The switch will remove the MAC address at Fa0/19.

The switch will retain the MAC address until host B is powered on again.

The switch will rebuild the MAC table by assigning the FFFF.FFFF.FFFF address to port Fa0/19.

29

Refer to the exhibit. At which OSI layer is serial interface 0/0/1 experiencing problems?

Layer 1

Layer 2

Layer 3

Layer 4

30

Refer to the exhibit. To create the initial configuration, a network technician connected host A to the router using the connection that is shown. Which statement is true about this connection?

It terminates at the Ethernet port of the router.

It provides out-of-band console access.

It terminates at the serial interface of the router.

It requires a Telnet client on host A to access the router.

31

Refer to the exhibit. All devices in the network use default configurations. How many broadcast domains are there in this topology?

3

5

7

9

11

32

Refer to the exhibit. A user wants to view the current configuration. The output of the ipconfig/all command is displayed in the exhibit. What three facts can be determined from the output? (Choose three.)

The IP address is obtained from the DHCP server.

This PC cannot communicate with other networks.

The network can have 14 hosts.

The prefix of the computer address is /25.

The IP address is routable on the Internet.

The assigned address is a private address.

33

Refer to the exhibit. On the basis of the IP configuration that is shown, what is the reason that Host A and Host B are unable to communicate outside the local network?

Host A was assigned a network address.

Host B was assigned a multicast address.

Host A and Host B belong to different networks.

The gateway address was assigned a broadcast address.

34
During the encapsulation process, what identifiers are added at the transport layer?

source and destination IP addresses

source and destination MAC addresses

source and destination port numbers

source and destination channel identifiers

35

Refer to the exhibit. The network administrator wants to remotely access the CLI of the router from PC1 using modem 1. Which port of the router should be connected to modem 2 to enable this access?

console

Ethernet

auxiliary

serial

36
A network administrator wants to restrict access to the router privileged EXEC mode. Which password should the administrator use?

enable

aux

console

VTY

37

Refer to the exhibit. Which logical topology describes the exhibited network?

star

ring

point-to-point

multi-access

38

Refer to the exhibit. In a network, Hosts A and B are exchanging segments at the transport layer. Which two statements are true about this exchange? (Choose two.)

Host A is transferring files to host B using FTP.

Host A will send the next segment containing data for this session starting with byte number 11.

The segment from the destination host indicates that 11 bytes have been received successfully.

Host A is initiating a Telnet session to host B.

Host B can send the next segment of the data starting with byte number 2.

39

Refer to the exhibit. Cable 1 and cable 2 have the ends wired for specific physical layer requirements. The table lists each segment by number and the cable which has been installed by the network technician between the network components on that segment. From the data given, which segments have the correct cable installed? (Choose three.)

segment1

segment2

segment3

segment4

segment5

40
Which three IPv4 addresses represent valid network addresses for a subnet? (Choose three.)

192.168.9.64/28

192.168.9.146/28

192.168.9.96/28

192.168.9.129/26

192.168.9.51/26

192.168.9.64/26

41

Refer to the exhibit. Host A wants to access the Internet. Which combination of a Layer 2 address and a Layer 3 address will enable this access from host A?

Destination MAC: 0030.8596.DE83 Default gateway: 209.165.202.130

Destination MAC: 0030.8596.DE82 Default gateway: 172.16.9.2

Destination MAC: 0030.8517.44C4 Default gateway: 172.16.1.1

Destination MAC: 0030.8517.44C4 Default gateway: 209.165.202.130

42
How does the transport layer allow a host to maintain multiple,
simultaneous communication streams across different applications?

It uses error control mechanisms.

It uses a connectionless protocol only for multiple simultaneous transmissions.

It uses multiple Layer 2 source addresses.

It uses multiple ports.

43

Refer to the exhibit. Which logical topology describes the exhibited network?

star

ring

point-to-point

multi-access

44
Which option would be a valid router hostname according to Cisco naming convention guidelines?

Rtr1_Bldg201

Building_201

Router 1

1st_Floor_Router_409_West_State_Street

45

Refer to the exhibit. On the basis of the provided configuration, which statement is true?

The IP address of host A is properly assigned to the local NIC.

Host A can send packets to any host on the local network only.

Host A can send packets to any host on the local and remote network.

Host A can ping successfully the default gateway address of 192.168.1.1.

46
A user types the enable command. What task can be performed at the privileged EXEC mode?

Configure the device.

Configure individual interfaces.

Configure individual terminal lines.

Issue show and debug commands.

47
As network administrator, what is the subnet mask that allows 510 hosts given the IP address 172.30.0.0?

255.255.0.0

255.255.248.0

255.255.252.0

255.255.254.0

255.255.255.0

255.255.255.128

48
What are three characteristics of CSMA/CD? (Choose three.)

It monitors the media for presence of a data signal.

After detecting a collision, hosts can resume transmission after a random timer has expired.

A jam signal is used to ensure that all hosts are aware that a collision has occurred.

Devices can be configured with a higher transmission priority.

Data is transmitted only when the data signal is present.

It uses a token system to avoid collisions.

49
A host is transmitting a video over the network. How does the transport layer allow this host to use multiple applications to transmit other data at the same time as the video transmission?

It uses error control mechanisms.

It uses a connectionless protocol only for multiple simultaneous transmissions.

It uses multiple Layer 2 source addresses.

It uses multiple port numbers.

50
Which three IPv4 addresses represent a broadcast for a subnet? (Choose three.)

172.16.4.63 /26

172.16.4.129 /26

172.16.4.191 /26

172.16.4.51 /27

172.16.4.95 /27

172.16.4.221 /27

51
The network administrator wants to configure the port number used by an application on a server to make it accessible by clients. Which range of port numbers would normally be assigned for this application?

0 to 255

0 to 1023

1024 to 49151

49152 to 65535

http://www.ccna4u.org

About these ads

4 Comments

Leave a Comment
  1. Anonymous / Sep 20 2009 2:16 pm

    thank you :)

  2. Anonymous / Nov 21 2010 4:45 am

    THANK YOUUUUUU!!!!

  3. Anonymous / Jan 14 2011 2:03 pm

    oooooh yeah go cisco ur da best…

  4. Anonymous / Feb 11 2011 3:23 am

    Pls help
    I cant the exhibit

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

Follow

Get every new post delivered to your Inbox.

%d bloggers like this: