CCNA 1 Final Exam
Consider the following rang of address: 2001:0DB8:BC15:00A0:0000:: 2001:0DB8:BC15:00A1:0000:: 2001:0DB8:BC15:00A2:0000:: . . . 2001:0DB8:BC15:00AF:0000:: What is the prefix-length for the range of address?
/60
In IPv6, starting with /64, what are the next three nibble aligned subnet mask?
/68, /72, /76, /80
Protocol Data Unit (PDU): Data encapsulation
1. data 2. segment 3. packet/datagram 4. frame 5. bits
What are the characteristics of fiber optic cable?
1. fiber optic cable does not conduct electricity 2. fiber optic cabling is primarily used as backbone cabling
TCP/IP layers
1. network access 2. Internet 3. transport 4. application
What is the primary functions of a router?
1. packet switching 2. path selection
What is the default order a router searches for startup configuration information?
1. perform POST and load the bootstrap program. 2. locate and load Cisco IOS software. 3. locate and load the startup config file or enter setup mode
OSI layers
1. physical 2. data link 3. network 4. transport 5. session 6. presentation 7. application
Which IPv4 address can be pinged to test the internal TCP/IP operation of a host?
127.0.0.1 (Loopback)
How many bits make up the single IPv6 hextet :10CD:?
16 bits
What are the three private address ranges?
A. 10.0.0.0 - 10.255.255.255.255 B. 172.16.0.0 - 172.31.255.255 C. 192.168.0.0 - 192.168.255.255
A home user is looking for an ISP connection that provides high speed digital transmission over regular phone lines. What ISP connection type should be used?
Digital Subscriber Line (DSL)
What is the range of a valid IPv6 link local address?
FE80::/10
Name 4 TCP/IP application layer protocols.
HTTP, DHCP SMTP, FTP, DNS, POP, IMAP, BOOTP
Name 4 TCP/IP internet layer protocols.
IP, ICMP, NAT, OSPF, EIGRP
What technology provides a solution to IPv4 address depletion by allowing multiple devices to share on public IP address?
Network Address Translation (NAT)
What type of connection provides a secure CLI session with encryption to a Cisco network device?
Secure Shell (SSH)
Describe TFTP.
Trivial File Transport Protocol; simple, connectionless file transfer protocol/unacknowledged file delivery protocol/less-overhead than FTP.
What type of wireless security generates dynamic encryption keys each time a client associates with an AP?
Wi-Fi Protected Access (WPA)
A company is expanding its business to other countries. All branch offices must remain connected to corporate headquarters at all times. Which network technology is required to support this requirement?
Wide Area Network (WAN)
How does a Layer 3 switch differ from a Layer 2 switch?
an IP address can be assigned to a physical port of a Layer 3 switch. However, this is not supported in Layer 2 switches.
What is the function of the IPCONFIG /DISPLAYDNS command?
displays all the cached DNS entries on a Windows computer system
An administrator uses the Ctrl-Shift-6 key combination on a switch after issuing the PING command. What is the purpose of using these keystrokes?
interrupts an IOS process
What is the function of Address Resolution Protocol (ARP)?
provides dynamic address mapping between an IP address and a hardware address (MAC)
What is the function of the Internet Research Task Force (IRTF)?
research related to Internet and TCP/IP protocols, applications, architecture, and technologies
What is the auto-MDIX feature on a switch?
the automatic configuration of an interface for a straight-through or a crossover Ethernet cable
What will happen if the default gateway address is incorrectly configured on a host?
the host cannot communicate with hosts in other networks
What is the purpose of the network security accounting function?
to keep track of the actions of a user
Which procedure is used to reduce the effect of crosstalk in copper cables?
twisting opposing circuit wire pair together