CCNA 1 Pretest Exam
Considering the average capacity of storage device media, drag the storage media on the left to the capacity list on the right. DVD 1st largest compacity Hard drive 2nd Largest compacity floppy disk 3rd largest compacity CD 4th largest compacity
1. Hard drive, 2. DVD, 3. CD, 4. floppy disk
Compressed video formats 1. 2. Compressed image formats 1. 2. HTML QuickTime GIF JPEG MPEG
1. QuickTime, 2. MPEG, 1. GIF, 2. JPEG
Match the icon to its likely associated use. (Not all options are used.) 1. search for a file on disk 2. resume work on an open business letter 3. access a site on the world wide web 4. resume reading an open pdf document 5. safely remove a flash drive internet explorer pdf file explorer usb word power point
1. file explorer, 2. microsoft word, 3. internet explorer, 4. pdf, 5. usb
Match the form of network communication with its description. (Not all options are used.) 1. interactive websites where people create and share user-generated content with friends and family 2. web pages that groups of people can edit and view together 3. an audio-based medium that allows people to deliver their recordings to a wide audience 4. real-time communication between two or more people instant messaging social media weblog wiki podcast
1. social media, 2. wiki, 3. podcast, 4. instant messaging
What are the three ranges of IP addresses that are reserved for internal private use? (Choose three.) 10.0.0.0/8 64.100.0.0/14 127.16.0.0/12 172.16.0.0/12 192.31.7.0/24 192.168.0.0/16
10.0.0.0/8, 172.16.0.0/12, 192.168.0.0/16
Which three IP addresses are private ? (Choose three.) 10.1.1.1 172.32.5.2 192.167.10.10 172.16.4.4 192.168.5.5 224.6.6.6
10.1.1.1, 172.16.4.4, 192.168.5.5
Convert the decimal number 231 into its binary equivalent. Select the correct answer from the list below. 11110010 11011011 11110110 11100111 11100101 11101110
11100111
The failure rate in a certain brand of network interface card has been determined to be 15%. How many cards could be expected to fail in a company that has 80 of the cards installed? 8 10 12 15
12
A person-hour is the amount of work that the average worker can do in one hour. It is anticipated that a company-wide system upgrade will take approximately 60 person-hours to complete. How long will it take five technicians to perform the refresh? 5 hours 8 hours 10 hours 12 hours
12 hours
if a technician uses an average of 2 cans of compressed air per week for cleaning, how many cans should be ordered for 8 technicians over the next 10 weeks? 16 20 80 160 200
160
Refer to the exhibit. Using the network in the exhibit, what would be the default gateway address for host A in the 192.133.219.0 network? 192.135.250.1 192.31.7.1 192.133.219.0 192.133.219.1
192.133.219.1
Which subnet would include the address 192.168.1.96 as a usable host address? 192.168.1.64/26 192.168.1.32/27 192.168.1.32/28 192.168.1.64/29
192.168.1.64/26
Which option shows the proper notation for an IPv6 address? 2001,0db8,3c55,0015,abcd,ff13 2001-0db8-3c55-0015-abcd-ff13 2001.0db8.3c55.0015.abcd.ff13 2001:0db8:3c55:0015::abcd:ff13
2001:0db8:3c55:0015::abcd:ff13
A local real estate company can have its 25 computer systems upgraded for $1000. If the company chooses only to upgrade 10 systems, how much will the upgrade cost if the same rate is used? $100 $200 $400 $500 $600
400
What statement describes the function of the Address Resolution Protocol? ARP is used to discover the IP address of any host on a different network. ARP is used to discover the IP address of any host on the local network. ARP is used to discover the MAC address of any host on a different network. ARP is used to discover the MAC address of any host on the local network
ARP is used to discover the MAC address of any host on the local network
Convert the binary number 10111010 into its hexadecimal equivalent. Select the correct answer from the list below. 85 90 BA A1 B3 1C
BA
Which two devices provide permanent data storage? (Choose two.) Blu-Ray disc hard drive keyboard monitor RAM
Blu-Ray disc, hard drive
A wireless host needs to request an IP address. What protocol would be used to process the request? FTP HTTP DHCP ICMP SNMP
DHCP
Which protocol translates a website name such as www.cisco.com into a network address? HTTP FTP DHCP DNS
DNS
A home user is looking for an ISP connection that provides high speed digital transmission over regular phone lines. What ISP connection type should be used? DSL dial-up satellite cell modem cable modem
DSL
Which wireless security procedure should be used to hide the WLAN ID from wireless clients? Configure WEP only on the access point. Install WAP on the wireless clients. Configure MAC address filtering on the access point. Disable the broadcast of the SSID on the access point Decrease the antenna spectrum on each wireless client.
Disable the broadcast of the SSID on the access point
How does a networked server manage requests from multiple clients for different services? The server sends all requests through a default gateway. Each request is assigned source and destination port numbers The server uses IP addresses to identify different services. Each request is tracked through the physical address of the client.
Each request is assigned source and destination port numbers
Which is a characteristic of the Internet? It is not centrally governed. It uses only physical addresses. It uses private IP addressing. It is localized to specific geographic locations.
It is not centrally governed
Refer to the exhibit. Consider the IP address configuration shown from PC1. What is a description of the default gateway address? It is the IP address of the Router1 interface that connects the company to the Internet. It is the IP address of the Router1 interface that connects the PC1 LAN to Router1 It is the IP address of Switch1 that connects PC1 to other devices on the same LAN. It is the IP address of the ISP network device located in the cloud.
It is the IP address of the Router1 interface that connects the PC1 LAN to Router1
What will a host on an Ethernet network do if it receives a frame with a destination MAC address that does not match its own MAC address? It will discard the frame It will forward the frame to the next host. It will remove the frame from the media. It will strip off the data-link frame to check the destination IP address.
It will discard the frame
Which technology provides a solution to IPv4 address depletion by allowing multiple devices to share one public IP address? ARP DNS NAT SMB DHCP HTTP
NAT
Which type of connector does a network interface card use? DIN PS-2 RJ-11 RJ-45
RJ-45
What protocol is responsible for controlling the size of segments and the rate at which segments are exchanged between a web client and a web server? TCP IP HTTP Ethernet
TCP
A network technician is attempting to configure an interface by entering the following command: SanJose(config)# ip address 192.168.2.1 255.255.255.0. The command is rejected by the device. What is the reason for this? The command is being entered from the wrong mode of operation The command syntax is wrong. The subnet mask information is incorrect. The interface is shutdown and must be enabled before the switch will accept the IP address.
The command is being entered from the wrong mode of operation
Refer to the exhibit. Host_A is preparing to send data to Server_B. How will Host_A address the packets and frames that will carry this data? (Choose two.) The packet destination will be addressed with the IP address of the Router_B interface that is attached to Router_A. The frame destination will be addressed with the MAC address of Switch_A. The packet destination will be addressed with the IP address of the Router_A LAN interface. The frame destination will be addressed with the MAC address of the Router_A LAN interface. The packet destination will be addressed with the IP address of Server_B. The frame destination will be addressed with the MAC address of Server_B.
The frame destination will be addressed with the MAC address of the Router_A LAN interface, The packet destination will be addressed with the IP address of Server_B
Which statement is true about variable-length subnet masking? Each subnet is the same size. The size of each subnet may be different, depending on requirements Subnets may only be subnetted one additional time. Bits are returned, rather than borrowed, to create additional subnets.
The size of each subnet may be different, depending on requirements
A user is having problems accessing the Internet. The command ping www.cisco.com fails. However, pinging the IP address of cisco.com with the command ping 198.133.219.25 is successful. What is the problem? The web server is down. The default gateway is incorrect. There is a problem with DNS. The address of the ARP cache is incorrect.
There is a problem with DNS
A company is expanding its business to other countries. All branch offices must remain connected to corporate headquarters at all times. Which network technology is required to support this requirement? LAN MAN WAN WLAN
WAN
Which connection provides a secure CLI session with encryption to a Cisco switch? a console connection an AUX connection a Telnet connection an SSH connection
an SSH connection
Which function is provided by TCP? data encapsulation detection of missing packets communication session control path determination for data packets
detection of missing packets
What is an advantage of using IPv6 ? more addresses for networks and hosts faster connectivity higher bandwidth more frequencies
more addresses for networks and hosts
What is a function of the BIOS? enables a computer to connect to a network provides temporary data storage for the CPU performs a power-on self test of internal components provides graphic capabilities for games and applications
performs a power-on self test of internal components
A network administrator is troubleshooting connectivity issues on a server. Using a tester, the administrator notices that the signals generated by the server NIC are distorted and not usable. In which layer of the OSI model is the error categorized? presentation layer network layer physical layer data link layer
physical layer
Which command can be used to test connectivity between two computers that are attached to a network? ipconfig ping winipcfg ifconfig nbtstst -s
ping
What is the general term that is used to describe a piece of data at any layer of a networking model? frame packet protocol data unit segment
protocol data unit
Which device should be used for enabling a host to communicate with another host on a different network? switch hub router host
router
Which basic process is used to select the best path for forwarding data? routing switching addressing encapsulation
routing
A technician uses the ping 127.0.0.1 command. What is the technician testing? the TCP/IP stack on a network host connectivity between two adjacent Cisco devices connectivity between a PC and the default gateway connectivity between two PCs on the same network physical connectivity of a particular PC and the network
the TCP/IP stack on a network host
Why would a network administrator use the tracert utility? to determine the active TCP connections on a PC to check information about a DNS name in the DNS server to identify where a packet was lost or delayed on a network to display the IP address, default gateway, and DNS server address for a PC
to identify where a packet was lost or delayed on a network
What is the purpose of ICMP messages? to inform routers about network topology changes to ensure the delivery of an IP packet to provide feedback of IP packet transmissions to monitor the process of a domain name to IP address resolution
to provide feedback of IP packet transmissions
What is the purpose of having a converged network? to provide high speed connectivity to all end devices to make sure that all types of data packets will be treated equally to achieve fault tolerance and high availability of data network infrastructure devices to reduce the cost of deploying and maintaining the communication infrastructure
to reduce the cost of deploying and maintaining the communication infrastructure
What is the purpose of the routing process? to encapsulate data that is used to communicate across a network to select the paths that are used to direct traffic to destination networks to convert a URL name into an IP address to provide secure Internet file transfer to forward traffic on the basis of MAC addresses
to select the paths that are used to direct traffic to destination networks