Selasa, 29 Mei 2012

CCNA 1FINAL EXAM ANSWER


1
What type of cable is being used if a network administrator is connecting two Cisco routers and uses the 100BaseTX standard?
rollover cable
smart serial cable
crossover UTP
straight-through UTP

2
Which statement is true about the TTL value of an IPv4 packet?
It determines the priority of a packet.
It specifies the remaining "life" of the packet.
It indicates that the packet has been fragmented.
It denotes the data payload type that the packet is carrying.

3


Refer to the exhibit. Which device should be included in the network topology to provide Layer 2 connectivity for all LAN devices, provide multiple collision domains, and also provide a connection to the rest of the network?
server
hub
switch
PC

4


Refer to the exhibit. Host A is able to access resources on the local LAN but is unable to access any resources on the Internet. What is the likely cause of this problem?
The host subnet mask in incorrect.
The network uses private addresses.
The host address is a network address.
The default gateway is on a different subnet from the host.

5
Which statement is true about Layer 3 addresses?
They are physical addresses.
They are used in routing decisions.
They are only used on local networks.
They are altered each time a packet crosses a router.

6
Which of the following are the address ranges of the private IP addresses? (Choose three.)
10.0.0.0 to 10.255.255.255
200.100.50.0 to 200.100.25.255
150.150.0.0 to 150.150.255.255
172.16.0.0 to 172.31.255.255
192.168.0.0 to 192.168.255.255
127.16.0.0 to 127.31.255.255

7
How many host addresses may be assigned when using the 128.107.0.0 network address with a subnet mask of 255.255.248.0?
30
256
2046
2048
4094
4096

8


Refer to the exhibit. Assume all devices are using default configurations. How many subnets are required to address the topology that is shown?
1
3
4
5
7

9
Which device should be used for enabling a host to communicate with another host on a different network?
switch
hub
router
host

10


Refer to the exhibit. Communication for hosts X and Y is restricted to the local network. What is the reason for this?
Host X is assigned a network address.
Host Y is assigned a multicast address.
Host X and host Y belong to different networks.
The gateway addresses are broadcast addresses.

11


Refer to the exhibit. Which type of network design is shown?
client/server
wide area
dedicated server
peer-to-peer

12


Refer to the exhibit. A technician is working on a network problem that requires verification of the router LAN interface. What address should be pinged from this host to confirm that the router interface is operational?
127.0.0.1
192.168.64.196
192.168.254.1
192.168.254.9
192.168.254.254

13


Refer to the exhibit. Which two layers of the OSI model describe the same functions as the transport and internet layers of the TCP/IP model? (Choose two.)
application layer
presentation layer
session layer
transport layer
network layer
data link layer
physical layer

14


Refer to the exhibit. Each media link is labeled. What type of cable should be used to connect the different devices?
Connection 1 - rollover cable
Connection 2 - straight-through cable
Connection 3 - crossover cable
Connection 1 - crossover cable
Connection 2 - rollover cable
Connection 3 - crossover cable
Connection 1 - straight-through cable
Connection 2 - crossover cable
Connection 3 - crossover cable
Connection 1 - straight-through cable
Connection 2 - crossover cable
Connection 3 - straight-through cable
Connection 1 - crossover cable
Connection 2 - straight-through cable
Connection 3 - crossover cable

15
Which application layer protocol allows administrators to log into a server from remote locations and control a server as though logged in locally?
DNS
FTP
DHCP
SMTP
Telnet

16
A network has grown too large for technicians to configure network addresses and hosts files for name resolution. Which two application layer services should be added to the server to allow these needs to be satisfied dynamically? (Choose two.)
DNS
FTP
DHCP
HTTP
SMTP

17
Which three commands will change the current configuration mode of a router? (Choose three.)
router rip
line vty 0 4
password class
hostname RouterA
enable secret class
interface fastethernet 0/1

18
Which three addresses are private IP addresses? (Choose three.)
10.0.0.1
46.1.1.88
172.31.31.10
172.32.16.10
192.168.8.8

19
Which scenario describes a typical peer-to-peer network environment?
An employee downloads a file that is stored on a departmental file server.
An employee edits and reviews web pages on a web server that is located in the server farm.
A teleworker logs into a core router of the corporate network and makes a configuration change.
A user on one office PC sends output to a printer that is attached to the USB port of another PC in an adjacent office.

20
Which option correctly identifies the interface or interfaces used to connect the router to a CSU/DSU for WAN connectivity?





21


Refer to the exhibit. The router of the company failed and was replaced. After the replacement, hosts C and D in the Education office are able to ping each other, but they are unable to access the hosts in the Accounts office. What is the likely cause of the problem?
The IP address at the fa0/0 interface of the router is incorrectly configured.
The subnet mask at the fa0/1 interface of the router is incorrectly entered.
The IP address at the serial interface of the router is incorrectly configured.
The hosts in the Accounts office are not on the same subnet as the hosts in the Education office.

22
During the encapsulation process, what identifiers are added at the transport layer?
source and destination IP addresses
source and destination MAC addresses
source and destination port numbers
source and destination channel identifiers

23


Refer to the exhibit. A network administrator remotely accesses the CLI of RouterB from PC1 using Telnet. Which statement is true about this connection?
The data is automatically encrypted.
A Telnet server process is running on PC1.
The connection is made through a VTY session on the router.
A GET request was sent to RouterB to retrieve data during this session.

24
An administrator needs management access to a switch from a remote offsite location. Which three configurations are required on the switch to allow the administrator to have remote access using either SSH or Telnet? (Choose three.)
default gateway
banner message
VLAN IP address
vty line password
encrypted passwords
console line password

25
Which OSI layer does IP rely on to determine whether packets have been lost and to request retransmission?
application
presentation
session
transport

26
What is the result of using the clock rate 56000 command at the serial interface of the router?
The interface is configured as a DCE device.
The interface timers are cleared.
The FastEthernet interface is made to emulate a serial interface by assigning it a timing signal.
The IP address for the serial interface is configured.

27
In a packet-switched data network, what is used to reassemble the packets in the correct order at the destination device?
source address
sequence number
priority assignment
destination address

28
What is the correct order for PDU encapsulation?





29


Refer to the exhibit. Host A attempts to establish a TCP/IP session with host C. During this attempt, a frame was captured with the source MAC address 0050.7320.D632 and the destination MAC address 0030.8517.44C4. The packet inside the captured frame has an IP source address 192.168.7.5, and the destination IP address is 192.168.219.24. At which point in the network was this packet captured?
leaving host A
leaving ATL
leaving Dallas
leaving NYC

30
What happens when a node on an Ethernet network is creating a frame and it does not have the destination MAC address?
The node drops the frame.
The node sends out a Layer 3 broadcast message.
The node sends a message directly to the router for the address.
The node sends out an ARP request with the destination IP address.

31
Which subnet mask will allow 2040 hosts per subnet on the IP network 10.0.0.0?
255.255.0.0
255.255.254.0
255.255.252.0
255.255.248.0
255.255.240.0
255.255.255.128

32


Refer to the exhibit. Which list refers only to end devices?
D,E,F,G
A,H,B,C
A,D,E,F
A,D,E,G

33
A routing issue has occurred in your internetwork. Which of the following type of devices should be examined to isolate this error?
access point
host
hub
router
switch

34


Refer to the exhibit. The diagram represents the process of sending e-mail between clients. Which list correctly identifies the component or protocol used at each numbered stage of the diagram?
1.MUA 2.MDA 3.MTA 4.SMTP 5.MTA 6.POP 7.MDA 8.MUA
1.MUA 2.POP 3.MDA 4.SMTP 5.MTA 6.MDA 7.SMTP 8.MUA
1.MUA 2.POP 3.SMTP 4.MDA 5.MTA 6.SMTP 7.POP 8.MUA
1.MUA 2.SMTP 3.MTA 4.SMTP 5.MTA 6.MDA 7.POP 8.MUA

35
An organization has been assigned network ID 10.10.128.0 and subnet mask 255.255.224.0. Which IP address range can be used for this organization?
10.10.128.0 to 10.10.160.255
10.10.128.0 to 10.10.159.255
10.10.128.0 to 10.10.192.255
10.10.128.0 to 10.10.0.159
10.10.128.0 to 10.10.159.0

36
An administrator makes changes to the default configuration of a router and saves them to NVRAM. After testing, it is discovered that the configurations did not have the desired effect and must be removed. What steps must be taken to remove the changes and return the router to the default configuration?
Reboot the router.
Use no version of the commands that are issued.
Issue the erase startup-config command, and then reboot the router.
Issue the erase running-config command, and then reboot the router.

37


Refer to the exhibit. What is the total amount of RAM on the router?
16384 KB
31360 KB
114688 KB
131072 KB

38
What are two purposes for configuring a banner on a router? (Choose two.)
to announce system downtime
to prevent unauthorized access to the router
to provide a description of interface connections
to assist in legal prosecution for unauthorized access
to provide a welcome message to users who access the router

39


Refer to the exhibit. RouterB is configured properly. The Ethernet interface Fa0/0 of RouterA is configured with the use of the commands that are shown. However, a ping from the Fa0/0 interface of RouterA to the Fa0/0 interface of RouterB is unsuccessful. What action should be taken on RouterA to solve this problem?
Use the description command on the FastEthernet interface Fa0/0.
Configure the clock rate of the FastEthernet interface Fa0/0.
Use the no shutdown command on the FastEthernet interface Fa0/0.
Reboot the router.

40
What is the Cisco IOS?
system software for Cisco devices
Read Only Memory in Cisco devices
non-volatile storage for device configurations
an initial operating system that is used for boot functions

41


Refer to the exhibit. What function does router RT_A need to provide to allow Internet access for hosts in this network?
address translation
DHCP services
ftpd
web server

42


Refer to the exhibit. A PC is communicating with another PC on a remote network. The two networks are connected by three routers. Which action will help to identify the path between the hosts?
Use the ipconfig command at the host.
Use the ipconfig/all command at the destination.
Use the tracert command at the host.
Use the ping command at the destination.

43


Refer to the exhibit. Host A sends a frame with the destination MAC address as FFFF.FFFF.FFFF. What action will the switch take for this frame?
It will drop the frame.
It will send the frame back to host A.
It will send the frame to all hosts except host A.
It will forward the frame to the default gateway.

44
A technician is asked to secure the privileged EXEC mode of a switch by requiring a password. Which type of password would require this login and be considered the most secure?
console
enable
enable secret
VTY

45
What is the effect of using the Router# copy running-config startup-config command on a router?
The contents of ROM will change.
The contents of RAM will change.
The contents of NVRAM will change.
The contents of flash will change.

46
Which prompt represents the appropriate mode used for the copy running-config startup-config command ?
Switch-6J>
Switch-6J#
Switch-6J(config)#
Switch-6J(config-if)#
Switch-6J(config-line)#

47
A network administrator needs to provide administrative access for certain users. Which mode will allow users access to both theshow and debug commands?
user executive mode
privileged executive mode
global configuration mode
router configuration mode

48
Which statement identifies the DNS protocol?
It transmits information using TCP port 25.
It transfers and conveys information using HTML pages.
It matches a resource name with the required network address.
It requests and assigns an IP address, default gateway, and server addresses to hosts.

49
What action is taken by a host on an Ethernet network when the host attempts to contact a remote host on another network?
The packet is sent using the IP and MAC address of the destination host.
The packet is sent using the IP address and MAC address of the default gateway.
The packet is sent using the IP address of the destination host and MAC address of the default gateway.
The packet is sent using the IP address of the default gateway and the MAC address of the destination host.

50
A PC can not connect to any remote websites, ping its default gateway, or ping a printer that is functioning properly on the local network segment. Which action will verify that the TCP/IP stack is functioning correctly on this PC?
Use the ipconfig /all command at the host’s command prompt.
Use the ping 127.0.0.1 command at the command prompt.
Use the traceroute command at the command prompt to identify any failures on the path to the gateway.
Use FTP to check for connectivity to remote sites.
Download a troubleshooting tool from the PC manufacturer's website.

Tidak ada komentar:

Poskan Komentar