CCNA1 v5 + v5.02 Final Exam Answers: LAN MAN Wlan
CCNA1 v5 + v5.02 Final Exam Answers: LAN MAN Wlan
CCNA1 v5 + v5.02 Final Exam Answers: LAN MAN Wlan
LAN
WAN
MAN
WLAN
2. Which connection provides a secure CLI session with encryption to a Cisco network
device?
a console connection
an SSH connection
an AUX connection
a Telnet connection
3. Refer to the exhibit. From which location did this router load the IOS?
NVRAM?
ROM
flash memory
RAM
a TFTP server?
4. Refer to the exhibit. An administrator is trying to configure the switch but receives
the error message that is displayed in the exhibit. What is the problem?
The entire command, configure terminal, must be used.
The administrator must first enter privileged EXEC mode before issuing the
command.
The administrator must connect via the console port to access global configuration
mode.
The administrator is already in global configuration mode.
5. An administrator uses the Ctrl-Shift-6 key combination on a switch after issuing the
ping command. What is the purpose of using these keystrokes?
6. Refer to the exhibit. An administrator wants to change the name of a brand new
switch, using the hostname command as shown. What prompt will display after the
command is issued?
Switch(config)#
My Switch(config)#
MySwitch(config)#
My(config)#
Switch#
lineconin
secretin
letmein
linevtyin
9. What function does pressing the Tab key have when entering a command in IOS?
e-mail
instant messaging
weblog
wiki
11. A home user is looking for an ISP connection that provides high speed digital
transmission over regular phone lines. What ISP connection type should be used?
dial-up
cell modem
satellite
DSL
cable modem
12. A host is accessing a Web server on a remote network. Which three functions are
performed by intermediary network devices during this conversation? (Choose three.)
14. Which IPv4 address can be pinged to test the internal TCP/IP operation of a host?
0.0.0.0
0.0.0.1
127.0.0.1
192.168.1.1
255.255.255.255
15. What is the protocol that is used to discover a physical address from a known logical
address and what message type does it use?
ARP, multicast
ARP, broadcast
DNS, unicast
DNS, broadcast
PING, broadcast
PING, multicast
16. Which publicly available resources describe protocols, processes, and technologies
for the Internet but do not give implementation details?
17. What will happen if the default gateway address is incorrectly configured on a host?
The host cannot communicate with hosts in other networks.
The host cannot communicate with other hosts in the local network.
The switch will not forward packets initiated by the host.
The host will have to use ARP to determine the correct address of the default gateway.
A ping from the host to 127.0.0.1 would not be successful.
18. What is an important function of the physical layer of the OSI model?
19. Which two statements describe the characteristics of fiber-optic cabling? (Choose
two.)
20. Which procedure is used to reduce the effect of crosstalk in copper cables?
21. What three application layer protocols are part of the TCP/IP protocol suite?
(Choose three.)
ARP
NAT
DHCP
PPP
DNS
FTP
22. Which two protocols function at the internet layer? (Choose two.)
ICMP
ARP
BOOTP
IP
PPP
23. Which address on a PC does not change, even if the PC is moved to a different
network?
IP address
default gateway address
logical address
MAC address
24. Refer to the exhibit. A ping to PC3 is issued from PC0, PC1, and PC2 in this exact
order. Which MAC addresses will be contained in the S1 MAC address table that is
associated with the Fa0/1 port?
ARP
NAT
DNS
DHCP
SMB
HTTP
29. Refer to the exhibit. Consider the IP address configuration shown from PC1. What is
a description of the default gateway address?
It is the IP address of the Router1 interface that connects the company to the Internet.
It is the IP address of the Router1 interface that connects the PC1 LAN to
Router1.
It is the IP address of Switch1 that connects PC1 to other devices on the same LAN.
It is the IP address of the ISP network device located in the cloud.
30. What is contained in the trailer of a data-link frame?
error detection
logical address
physical address
data
31. How many bits make up the single IPv6 hextet :10CD:?
4
8
16
32
172.32.5.2
192.167.10.10
172.20.4.4
10.172.168.1
192.168.5.254
224.6.6.6
33. What is the effect of configuring the ipv6 unicast-routing command on a router?
35. Which group of IPv6 addresses cannot be allocated as a host source address?
FDFF::/7
FF00::/8
FEC0::/10
FEBF::/10
36. Refer to the exhibit. A technician has configured a user workstation with the IP
address and default subnet masks that are shown. Although the user can access all local
LAN resources, the user cannot access any Internet sites by using either FQDN or IP
addresses. Based upon the exhibit, what could account for this failure?
The DNS server addresses are incorrect.
The wrong subnet mask was assigned to the workstation.
The workstation is not in the same network as the DNS servers.
The default gateway address in incorrect.
37. A network administrator needs to monitor network traffic to and from servers in a
data center. Which features of an IP addressing scheme should be applied to these
devices?
38. Which two statements correctly describe a router memory type and its contents?
(Choose two.)
39. Which of the following are primary functions of a router? (Choose two.)
microsegmentation
domain name resolution
path selection
packet switching
flow control
40. In which default order will a router search for startup configuration information?
41. What happens when part of an Internet VoIP transmission is not delivered to the
destination?
Site 1
Site 2
Site 3
Site 4
43. Which two notations are useable nibble boundaries when subnetting in IPv6?
(Choose two.)
/62
/64
/66
/68
/70
44. Which subnet would include the address 192.168.1.96 as a usable host address?
192.168.1.64/26
192.168.1.32/27
192.168.1.32/28
192.168.1.64/29
45. Refer to the exhibit. The network administrator enters these commands into the R1
router:
R1# copy running-config tftp
Address or name of remote host [ ]?
When the router prompts for an address or remote host name, what IP address should
the administrator enter at the prompt?
192.168.9.254
192.168.10.1
192.168.10.2
192.168.11.252
192.168.11.254
46. A host PC has just booted and is attempting to lease an address through DHCP.
Which two messages will the client typically broadcast on the network? (Choose two.)
DHCPDISCOVER
DHCPOFFER
DHCPREQUEST
DHCPACK
DHCPNACK
48. Match the IPv6 address to the IPv6 address type. (Not all options are used.)
49. What two preconfigured settings that affect security are found on most new wireless
routers? (Choose two.)
broadcast SSID
MAC filtering enabled
WEP encryption enabled
PSK authentication required
default administrator password
50. Which type of wireless security generates dynamic encryption keys each time a client
associates with an AP?
EAP
PSK
WEP
WPA
51. Fill in the blank.
TFTP is a best-effort, connectionless application layer protocol that is used to
transfer files.
53. Which two components are necessary for a wireless client to be installed on a
WLAN? (Choose two.)
media
wireless NIC
custom adapter
crossover cable
wireless bridge
wireless client software
56. A host is accessing an FTP server on a remote network. Which three functions are
performed by intermediary network devices during this conversation? (Choose three.)
58. When applied to a router, which command would help mitigate brute-force
password attacks against the router?
exec-timeout 30
service password-encryption
banner motd $Max failed logins = 5$
login block-for 60 attempts 5 within 60
ipconfig /all
arp -a
ipconfig /displaydns
nslookup
60. On a school network, students are surfing the web, searching the library database,
and attending an audio conference with their sister school in Japan. If network traffic is
prioritized with QoS, how will the traffic be classified from highest priority to lowest
priority?
61. During normal operation, from which location do most Cisco routers run the IOS?
RAM
flash
NVRAM
disk drive
62. A technician uses the ping 127.0.0.1 command. What is the technician testing?
switch
hub
router
host
65. A network technician is measuring the transfer of bits across the company backbone
for a mission critical application. The technician notices that the network throughput
appears lower than the bandwidth expected. Which three factors could influence the
differences in throughput? (Choose three.)
67. Which two statements describe the functions or characteristics of ROM in a router?
(Choose two.)
stores routing tables
allows software to be updated without replacing pluggable chips on the motherboard
maintains instructions for POST diagnostics
holds ARP cache
stores bootstrap program
68. Which statement describes a characteristic of the Cisco router management ports?
69. What happens when part of an Internet radio transmission is not delivered to the
destination?
192.0.2.199
198.51.100.201
203.0.113.211
209.165.201.223
71. Which keys act as a hot key combination that is used to interrupt an IOS process?
Ctrl-Shift-X
Ctrl-Shift-6
Ctrl-Z
Ctrl-C
72. Refer to the exhibit. An administrator wants to change the name of a brand new
switch, using the hostname command as shown. What prompt will display after the
command is issued??
HR Switch(config)#?
Switch(config)#?
HRSwitch(config)#?
HR(config)#?
Switch#
73. After making configuration changes on a Cisco switch, a network administrator
issues a copy running-config startup-config command. What is the result of issuing this
command?
FastEthernet0/1
VLAN 1
vty 0
console 0
75. Which connection provides a secure CLI session with encryption to a Cisco switch?
a console connection
an AUX connection
a Telnet connection
an SSH connection
76. What are two features of a physical, star network topology? (Choose two.)
It is straightforward to troubleshoot.
End devices are connected together by a bus.
It is easy to add and remove end devices.
All end devices are connected in a chain to each other.
Each end system is connected to its respective neighbor.
77. A frame is transmitted from one networking device to another. Why does the
receiving device check the FCS field in the frame?
78. What will a Layer 2 switch do when the destination MAC address of a received
frame is not in the MAC table?
cut-through
store-and-forward
fragment-free
fast-forward
80. Which parameter does the router use to choose the path to the destination when
there are multiple routes available?
the lower metric value that is associated with the destination network
the lower gateway IP address to get to the destination network
the higher metric value that is associated with the destination network
the higher gateway IP address to get to the destination network
81. Refer to the exhibit. What is the maximum TTL value that is used to reach the
destination www.cisco.com??
11
12
13
14
82. Refer to the exhibit. What is the significance of the asterisk (*) in the exhibited
output?
The asterisk shows which file system was used to boot the system.
The asterisk designates which file system is the default file system.
An asterisk indicates that the file system is bootable.
An asterisk designates that the file system has at least one file that uses that file
system.
83. Which WLAN security protocol generates a new dynamic key each time a client
establishes a connection with the AP?
EAP
PSK
WEP
WPA
86. A host is accessing a Telnet server on a remote network. Which three functions are
performed by intermediary network devices during this conversation? (Choose three.)
regenerating data signals
acting as a client or a server
providing a channel over which messages travel
applying security settings to control the flow of data
notifying other devices when errors occur
serving as the source or destination of the messages
87. Refer to the exhibit. Which area would most likely be an extranet for the company
network that is shown?
area A
area B
area C
area D
89. Three office workers are using the corporate network. The first employee uses a web
browser to view a company web page in order to read some announcements. The second
employee accesses the corporate database to perform some financial transactions. The
third employee participates in an important live audio conference with other office
workers in branch offices. If QoS is implemented on this network, what will be the
priorities from highest to lowest of the different data types?
192.168.1.16/28
192.168.1.64/27
192.168.1.128/27
192.168.1.96/28
192.168.1.192/28
91. In a network that uses IPv4, what prefix would best fit a subnet containing 100
hosts?
/23
/24
/25
/26
10.20.30.1
172.32.5.2
192.167.10.10
172.30.5.3
192.168.5.5
224.6.6.6
95. What types of addresses make up the majority of addresses within the /8 block IPv4
bit space?
private addresses
public addresses
multicast addresses
experimental addresses
96. During normal operation, from which location do most Cisco switches and routers
run the IOS?
RAM
flash
NVRAM
disk drive
CSMA/CD
priority ordering
CSMA/CA
token passing
98. What happens when a switch receives a frame and the calculated CRC value is
different than the value that is in the FCS field?
The switch places the new CRC value in the FCS field and forwards the frame.
The switch notifies the source of the bad frame.
The switch drops the frame.
The switch floods the frame to all ports except the port through which the frame
arrived to notify the hosts of the error.
0.0.0.0
255.255.255.255
FFFF.FFFF.FFFF
127.0.0.1
01-00-5E-00-AA-23
adjacency tables
MAC-address tables
routing tables
ARP tables
forwarding information base (FIB)
102. Which frame forwarding method receives the entire frame and performs a CRC
check to detect errors before forwarding the frame?
cut-through switching
store-and-forward switching
fragment-free switching
fast-forward switching
103. Which statement describes the sequence of processes executed by a router when it
receives a packet from a host to be delivered to a host on another network?
ARP
DNS
NAT
SMB
DHCP
107. Refer to the exhibit. Router R1 has two interfaces that were configured with correct
IP addresses and subnet masks. Why does the show ip route command output not
display any information about the directly connected networks??
108. What happens when part of an Internet television transmission is not delivered to
the destination?
109. Which two reasons generally make DHCP the preferred method of assigning IP
addresses to hosts on large networks? (Choose two.)
It eliminates most address configuration errors.
It ensures that addresses are only applied to devices that require a permanent address.
It guarantees that every device that needs an address will get one.
It provides an address only to devices that are authorized to be connected to the
network.
It reduces the burden on network support staff.
110. Which two components are configured via software in order for a PC to participate
in a network environment? (Choose two.)
MAC address
IP address
kernel
shell
subnet mask
2001:DB8:BC15::0
2001:DB8:BC15:A::0
2001:DB8:BC15:A:1::1
2001:DB8:BC15:A:12::0
113. Which two tasks are functions of the presentation layer? (Choose two.)
compression
addressing
encryption
session control
authentication
EAP
PSK
WEP
WPA
118. Three bank employees are using the corporate network. The first employee uses a
web browser to view a company web page in order to read some announcements. The
second employee accesses the corporate database to perform some financial
transactions. The third employee participates in an important live audio conference with
other corporate managers in branch offices. If QoS is implemented on this network,
what will be the priorities from highest to lowest of the different data types?
letmein
secretin
lineconin
linevtyin
120. What are the three primary functions provided by Layer 2 data encapsulation?
(Choose three.)
121. What must be configured to enable Cisco Express Forwarding (CEF) on most Cisco
devices that perform Layer 3 switching?
122. What is the purpose of adjacency tables as used in Cisco Express Forwarding
(CEF)?
It manages the data transport between the processes running on each host.
In the encapsulation process, it adds source and destination port numbers to the IP
header.
When a packet arrives at the destination host, its IP header is checked by the network
layer to determine where the packet has to be routed.
Its protocols specify the packet structure and processing used to carry the data
from one host to another.
124. A user gets an IP address of 192.168.0.1 from the company network administrator.
A friend of the user at a different company gets the same IP address on another PC.
How can two PCs use the same IP address and still reach the Internet, send and receive
email, and search the web?
link-local
unique local
site local
global unicast
126. Which three statements characterize the transport layer protocols? (Choose three.)
TCP and UDP port numbers are used by application layer protocols.
TCP uses port numbers to provide reliable transportation of IP packets.
UDP uses windowing and acknowledgments for reliable transfer of data.
TCP uses windowing and sequencing to provide reliable transfer of data.
TCP is a connection-oriented protocol. UDP is a connectionless protocol.
127. A user opens three browsers on the same PC to access www.cisco.com to search for
certification course information. The Cisco web server sends a datagram as a reply to
the request from one of the web browsers. Which information is used by the TCP/IP
protocol stack in the PC to identify the destination web browser?
128. Which statement is true regarding the UDP client process during a session with a
server?
Datagrams that arrive in a different order than that in which they were sent are
not placed in order.
A session must be established before datagrams can be exchanged.
A three-way handshake takes place before the transmission of data begins.
Application servers have to use port numbers above 1024 in order to be UDP capable.
129. Why does HTTP use TCP as the transport layer protocol?
10111010
11010101
11001010
11011010
131. What is the valid most compressed format possible of the IPv6 address
2001:0DB8:0000:AB00:0000:0000:0000:1234?
2001:DB8:0:AB00::1234
2001:DB8:0:AB::1234
2001:DB8::AB00::1234
2001:DB8:0:AB:0:1234
132. Refer to the exhibit. What is the maximum TTL value that is used to reach the
destination www.cisco.com?
11
12
13
14
133. What field content is used by ICMPv6 to determine that a packet has expired?
TTL field
CRC field
Hop Limit field
Time Exceeded field
trace 10.1.1.5
traceroute 10.1.1.5
tracert 10.1.1.5
ping 10.1.1.5
136. A network engineer is measuring the transfer of bits across the company backbone
for a mission critical database application. The engineer notices that the network
throughput appears lower than the bandwidth expected. Which three factors could
influence the differences in throughput? (Choose three.)
137. What is a possible hazard that can be caused by network cables in a fire?
a multimeter
an Optical Time Domain Reflectometer
a cable tester
an ohmmeter
139. Which statement is true about variable-length subnet masking?
140. Which firewall technique blocks incoming packets unless they are responses to
internal requests?
port filtering
stateful packet inspection
URL filtering
application filtering
capacitance
wire map
inductance
flexibility
data encapsulation
detection of missing packets
communication session control
path determination for data packets
143. What does a router use to determine where to send data it receives from the
network?
an ARP table
a routing table
the destination PC physical address
a switching table
144. Which router interface should be used for direct remote access to the router via a
modem?
145. Refer to the exhibit. A ping to PC2 is issued from PC0, PC1, and PC3 in this exact
order. Which MAC addresses will be contained in the S1 MAC address table that is
associated with the Fa0/1 port?
just PC0 and PC1 MAC addresses
just the PC0 MAC address
PC0, PC1, and PC2 MAC addresses
just the PC1 MAC address
just the PC2 MAC address
146. A technician is configuring a router to allow for all forms of management access. As part
of each different type of access, the technician is trying to type the command login. Which
configuration mode should be entered to do this task?
147. Which three statements characterize the transport layer protocols? (Choose three.)
TCP and UDP port numbers are used by application layer protocols.
TCP uses port numbers to provide reliable transportation of IP packets.
UDP uses windowing and acknowledgments for reliable transfer of data.
TCP uses windowing and sequencing to provide reliable transfer of data.
TCP is a connection-oriented protocol. UDP is a connectionless protocol.
148. Refer to the exhibit. A TCP segment from a server has been captured by
Wireshark, which is running on a host. What acknowledgement number will the host
return for the TCP segment that has been received?
2
21
250
306
2921
149. Which statement is true about an interface that is configured with the IPv6 address
command?
subnet mask
DNS address
host IP address
default gateway address
153. Refer to the exhibit. An administrator must send a message to everyone on the router A
network. What is the broadcast address for network 172.16.16.0/22?
172.16.16.255
172.16.20.255
172.16.19.255
172.16.23.255
172.16.255.255
10.1.1.128/28
10.1.1.144/28
10.1.1.160/29
10.1.1.128/28
10.1.1.144/28
10.1.1.160/28
10.1.1.128/28
10.1.1.140/28
10.1.1.158/26
10.1.1.128/26
10.1.1.144/26
10.1.1.160/26
10.1.1.128/26
10.1.1.140/26
10.1.1.158/28
155. How many additional bits should be borrowed from a /26 subnet mask in order to
create subnets for WAN links that need only 2 useable addresses?
2
3
4
5
6
154. A network administrator requires access to manage routers and switches locally
and remotely. Match the description to the access method. (Not all options are used.)
155. Refer to the exhibit. The administrator configured the access to the console and the
vty lines of a router. Which conclusion can be drawn from this configuration?
Unauthorized individuals can connect to the router via Telnet without entering a
password.
Because the IOS includes the login command on the vty lines by default, access to
the device via Telnet will require authentication.
Access to the vty lines will not be allowed via Telnet by anyone.
Because the login command was omitted, the password cisco command is not applied
to the vty lines.
If a host is ready to send a packet to a local destination device and it has the IP
address but not the MAC address of the destination, it generates an ARP
broadcast.
An ARP request is sent to all devices on the Ethernet LAN and contains the IP address
of the destination host and its multicast MAC address.
When a host is encapsulating a packet into a frame, it refers to the MAC address table
to determine the mapping of IP addresses to MAC addresses.
If no device responds to the ARP request, then the originating node will broadcast the
data packet to all devices on the network segment.
If a device receiving an ARP request has the destination IPv4 address, it responds
with an ARP reply.
157. What are two examples of the cut-through switching method? (Choose two.)
store-and-forward switching
fast-forward switching
CRC switching
fragment-free switching
QOS switching
Data sent with a service that uses TCP is received in the order the data was sent.
A port is considered to be open when it has an active server application that is
assigned to it.
An individual server can have two services that are assigned to the same port number.
An individual server cannot have multiple services running at the same time.
Server security can be improved by closing ports that are associated with unused
services.
159. Why does a Layer 3 device perform the ANDing process on a destination IP address
and subnet mask?
161. Given the binary address of 11101100 00010001 00001100 00001010, which address
does this represent in dotted decimal format?
234.17.10.9
234.16.12.10
236.17.12.6
236.17.12.10
162. A particular telnet site does not appear to be responding on a Windows 7 computer.
What command could the technician use to show any cached DNS entries for this web
page?
ipconfig /all
arp -a
ipconfig /displaydns
nslookup