CCNA v5.1 - Practice EXAM
Terms in this set (47)
Which term refers to a network that provides secure access to the corporate offices by suppliers, customs and collaborators?
A small business user looking for an ISP connection that provides high speed digital transmission over regular phone lines. What ISP connection type should be used?
Refer to the exhibit. An administrator is trying to configure the switch but receives the error message that is displayed in the exhibit. What is the problem? → Switch > config t - % invalid input detected at '^' marker.
The administrator must first enter privileged EXEC mode before issuing the command.
Which keys act as a hot key combination that is used to interrupt an IOS process?
Refer to exhibit. A network administrator is configuring access control to switch SW1. If the administrator uses Telnet to connect to the switch, which password is needed to acces user Exec mode?
A network administrator enters the service password-encryption command into the configuration mode of a router. What does this command accomplish?
This command prevents someone from viewing the running configuration passwords.
What is the purpose of the SVI on a Cisco switch?
The SVI provides a virtual interface for remote access to the switch.
Which message delivery option is used when all devices need to receive the same message simultaneously?
Which PDU is associated with the transport layer?
Which two protocols function at the internet layer? (Choose two)
What is done to an IP packet before it is transmitted over the physical medium?
It is encapsulated in a Layer 2 frame.
What type of communication medium is used with a wireless LAN connection?
In addition to the cable length, what two factors could interfere with the communication carried over UTP cables? (Choose two)
Crosstalk, electromagnetic interference
What are two sublayers of the OSI model data link layer? (Choose two)
A technician has been asked to develop a physical topology for a network that provides a high level of redundancy. Which physical topology requires that every node is attached to every other node on the network?
If data is being sent over a wireless network, then connects to an Ethernet network, an eventually connects to a DSL connection, which header will be replaced each time the data travels through a network infrastructure device?
What type of communication rule would best describe CSMA/CD?
What best describes the destination IPv4 address that is used by multicasting?
A single IP multicast address that is used by all destinations in a group
In an Ethernet network, when a device receives a frame of 1200 bytes, what will it do?
Process the frame as it is
What important information is examined in the Ethernet frame header by a Layer 2 device in order to forward the data onward?
Destination MAC address
What will a Layer 2 switch do when the destination MAC address of a received frame is no in the MAC table?
It forwards the frame out of all ports expect for the port at which the frame was received.
What are two features of ARP? (Choose two)
1. If a host is ready to send a packet to a local destination device and it has the IP address but not the MAC address of the destination, it generates an ARP broadcast. 2. If a device receiving an ARP request has the destinations IPv4 address, it responds with an ARP reply.
Which two services are required to enable a computer to receive dynamic IP addresses an access the internet using domain names? (Choose two)
What is a basic characteristic of the IP protocol?
Refer to the exhibt. A user issue the command netstat -r on a workstation. Which IPv6 address is one of the link-local addresses of the workstation?
Which two statements correctly describe a router memory type and its contents? (Choose two)
RAM is volatile and stores the IP routing table. ROM is nonvolatile and contains basic diagnostic software.
What is the valid most compressed format possible of the IPv6 address 2001:0DB8:0000:AB00:0000:0000:0000:1234?
At a minimum, which address is required on IPv6- enabled interfaces?
An IPv6 enabled device sends a data packet with the destination address of FF02::2. What os the target of this packet?
All IPv6 configured routers on the local link.
Which statement describes a characteristic of the traceroute utility?
It identifies the routers in the path from a source host to a destination host.
What is the usable number of host IP address on a network that has a /26 mask?
Refer to the exhibit. An administrator must send a message to everyone on the router A network. What is the broadcast address for network 172.16.0/22?
A network administrator is variable subnetting a given block of IPv4 addresses. Which combination of network addresses and prefix lengths will make the most efficient use of addresses when the need is for 2 subnets capable of supporting 10 hosts in 1 subnet that can support 6 hosts?
10.1.1.128/28, 10.1.1.144/28, 10.1.1.160/29
Given IPv6 address prefix 2001:db8::/48, what will be the last subnet that is created if the subnet prefix is changed to /52?
A technician with a PC using multiple applications while connected to the Internet. How is the PC able to keep track of the data flow between multiple application sessions and have each application receive the correct packet flows?
The data flow is being tracked based on the source port number utilized by each application.
What three Services are provided by the transport layer? (Choose three)
Flow control, connection establishment, error recovery
An Internet television transmission is using UDP. What happens when part of the transmission is not delivered to the destination?
The transmission continues without the missing portion
Which two OSI model layers are considered to be included in the top layer of the TCP/IP protocol stack? (Choose two)
An author is uploading one chapter document from a personal computer to a file server of a book publisher. What role is the personal computer assuming in this network model?
Which two automatic addressing assignments are supported by DHCP? (Choose two)
Subnet mask, default gateway address
When a network administrator is trying to manage network traffic on a growing network, when should traffic flow patterns be analyzed?
During times of peak utilization
What is the objective of the network reconnaissance attack?
Discovery and mapping of systems
What will be the result of failed login attempts if the following command is entered into a router? Login block-for 150 attempts 4 within 90.
All login attempts will be blocked for 150 seconds if there are 4 failed attempts within 90 seconds.
What is an advantage of storing configuration files to a USB flash drive instead of to a TFTP server?
The transfer of the files does not rely on network connectivity.
Match the requirements of a reliable network with the supporting network architecture.
1. security 2. Fault tolerance 4. Scalability
Match the descriptions to the terms.
2. users interact with the operating system by typing commands. 3. Enables the user to interact with the operating system by pointing and clicking. 4. The part of the operating system that interfaces with applications and the user. 5. The part of the OS that interacts directly with the device hardware.
Match the functions with the corresponding OSI layer.
1. HTTP an FTP 2. End user program functionality. 3. Compression 4. Common format 5. Dialog maintenance
YOU MIGHT ALSO LIKE...
Introduction to Business | Gaspar, Bierman, Kolari, Hise, Smith, Arreola-Risa
CCNA 5.1 Practice final
CCNA 1 Practice Final
Introduction to Networks (Version 6.00) - ITN Practice Final Exam
OTHER SETS BY THIS CREATOR
CCNA Final Exam v5.1
THIS SET IS OFTEN IN FOLDERS WITH...
Cisco Chapter 10
CCNA1 - Chapter 6
ccna 1 chapter 7
CCNA Final Practice