CCNA 1 Final Study Material

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

Well-known services and applications use which range of TCP/UDP port numbers?

0 to 1023

Which range of port numbers are reserved for services that are commonly used by applications that run on servers?

0 to 1023

Which of the following are the address ranges of the private IP addresses? (Choose three.)

10.0.0.0 to 10.255.255.255 172.16.0.0 to 172.31.255.255 192.168.0.0 to 192.168.255.255

An organization has been assigned network ID 10.10.128.0 and subnet mask 255.255.224.0. Which IP address range can be used for this organization?

10.10.128.0 to 10.10.159.255

Which two types of media can provide bandwidth up to 1 Gb/s? (Choose two.)

1000 BASE-TX 1000 BASE-SX

Which three IPv4 addresses represent subnet broadcast addresses? (Choose three.)

192.168.4.63 /26 192.168.4.191 /26 192.168.4.95 /27

Which three addresses belong to the category of public IP addresses? (Choose three.)

196.1.105.6 132.11.9.99 46.1.1.97

How many host addresses may be assigned when using the 128.107.0.0 network address with a subnet mask of 255.255.248.0?

2046

Which subnet mask will allow 2040 hosts per subnet on the IP network 10.0.0.0?

255.255.248.0

Which subnet mask should be used for a Class B network that is divided into subnets and will accommodate between 800 hosts and 1000 hosts?

255.255.252.0

To send data through a network, what two flags are used to establish a session? (Choose two.)

ACK SYN

Which statement accurately describes file sharing in a peer-to-peer network?

Access control is decentralized.

What are the default terminal emulation software settings when configuring a Cisco device through a console port?

Bits per second: 9600 Data bits: 8 Parity: None Stop bits: 1 Flow control: None

A network administrator is configuring several switches for a network. The switches have similar configurations and only minor differences. The administrator wants to save all commands that are issued on the first switch to a text file for editing. Which transfer option should be selected in HyperTerminal?

Capture Text

A user sees the command prompt: Router(config-if)# . What task can be performed at this mode?

Configure individual interfaces.

What can the user do from the command prompt, Router(config-line)# ?

Configure one of the physical or virtual lines.

Which physical component is used to access and perform the initial configuration on a new unconfigured router?

Console

Which service is used when the nslookup command is issued on a computer?

DNS

An administrator needs management access to a switch from a remote offline location. Which three configurations are required on the switch to allow administrator to have remote access using either SSH or Telnet?

Default gateway Console Line Password Encrypted Password

What is the correct order for PDU encapsulation?

Frame Header Network Header Transport Header Data Frame Trailer

Which two programs can be used to accomplish terminal emulation for configuring a router from the CLI through the console port? (Choose two.)

HyperTerminal Minicom

A technician wishes to connect two computers to move data from one to the other before reloading the operating system. The NICs on both PCs do not support autosensing feature. Which procedure will satisfy the requirement?

Interconnect the two PCs with a crossover cable.

An administrator makes changes to the default configuration of a router and saves them to NVRAM. After testing, it is discovered that the configurations did not have the desired effect and must be removed. What steps must be taken to remove the changes and return the router to the default configuration?

Issue the erase startup-config command, and then reboot the router.

How can ARP be used to help document the network?

It can provide a list of physical addresses on the network.

Which statement identifies the DNS protocol?

It matches a resource name with the required network address.

Which statement is true about the TTL value of an IPv4 packet?

It specifies the remaining "life" of the packet.

Which three statements are true about network layer addressing? (Choose three.)

It uses a hierarchical structure. It uniquely identifies each host. A portion of the address is used to identify the network.

Which OSI layer addressing is required to route packets between two networks?

Layer 3

Which location of router memory is cleared with the erase startup-config command?

NVRAM

Which router component will have contents erased when the command erase startup-config is issued?

NVRAM

Which prompt is associated with the privileged exec mode?

R1#

A technician is setting up a workgroup for six users and wants to allow users to share files without setting up a server. Which application layer protocol will provide for peer-to-peer file sharing in a workgroup?

SMB

Which prompt represents the appropriate mode used for the copy running-config startup-config command ?

Switch-6J#

Which application layer protocol allows administrators to log into a server from remote locations and control a server as though logged in locally?

Telnet

A user enters http://www.cisco.com/web1.htm in the address line of a browser. Which statement is true about this transaction?

The "http" portion indicates the protocol that is being used.

Two routers are connected via their serial ports in a lab environment. The routers are configured with valid IP addresses, but they cannot ping each other. The show interface serial0/0 command shows that the serial0/0 interface is up but the line protocol is down. What could be the cause of this problem?

The clock rate command has not been entered on the DCE interface.

What is the effect of using the Router# copy running-config startup-config command on a router?

The contents of NVRAM will change.

Due to a security violation, the router passwords must be changed. What information can be learned from the following configuration entries? (Choose two.) Router(config)# line vty 0 3 Router(config-line)# password c13c0 Router(config-line)# login

The entries specify four Telnet lines for remote access. Access will be permitted for Telnet using "c13c0″ as the password.

What happens when a node on an Ethernet network is creating a frame and it does not have the destination MAC address?

The node sends out an ARP request with the destination IP address.

A technician makes several changes to the running configuration on a router, but the desired results are not achieved. The technician issues the reload command. What action will be taken by the router?

The user will be prompted to save changes before the router restarts.

To enhance security in a network, the network administrator uses these commands: Router(config)# line console 0 Router(config-line)#password j1mdi2 Router(config-line)# login What two conclusions are evident from these commands? (Choose two.)

Users who attempt to connect to the console port of the router must enter a password. The entries permit access through the console by the use of j1mdi2 as the password.

Which password would allow a user to establish a Telnet session with a Cisco device?

VTY password

What information can be gathered by using the command netstat?

active TCP connections

When connectionless protocols are implemented at the lower layers of the OSI model, what is usually used to acknowledge that the data was received and to request the retransmission of missing data?

an upper-layer, connection-oriented protocol or service

What is the effect of the command copy running-config tftp?

copies the configuration currently in RAM to a remote machine

A network technician has made a UTP cable that is terminated as T568A on one end and T568B on the opposite end. What type of cable has been constructed?

crossover

What are two primary responsibilities of the Ethernet MAC sublayer? (Choose two.)

data encapsulation accessing the media

A technician is asked to secure the privileged EXEC mode of a switch by requiring a password. Which type of password would require this login and be considered the most secure?

enable secret

Which password is automatically encrypted when it is created?

enable secret

What is the protocol data unit that is associated with the data link layer of the OSI reference model?

frame

Which two factors contribute to the increased throughput when all nodes of a LAN are connected to a switch instead of a hub? (Choose two.)

full-duplex operation collision-free environment

Which communication tool allows real-time collaboration?

instant messaging

Which router configuration mode would an administrator use to configure the router for SSH or Telnet login access?

line

What command can be used to troubleshoot domain name resolution issues?

nslookup

During the encapsulation process, what is the PDU of the internet layer?

packet

What type of network is maintained if a server takes no dedicated role in the network?

peer-to-peer

Which two functions of the OSI model occur at layer two? (Choose two.)

physical addressing media access control

Which identifier is contained in the header of the Layer 2 Ethernet frame?

physical source and destination addresses

Which router configuration mode will require user authentication if an administrator issues the enable secret command?

privileged executive mode

What purpose does a hostname serve on a router?

provides device identification to users logging on remotely

A network administrator is tasked with connecting two workgroups that are configured to use different subnets. Which device should be selected to allow connectivity between users on the two networks?

router

A routing issue has occurred in your internetwork. Which of the following type of devices should be examined to isolate this error?

router

What is described by the network access layer of the TCP/IP model?

rules for the handoff from the internet layer to the network access protocols

In a packet-switched data network, what is used to reassemble the packets in the correct order at the destination device?

sequence number

In a network design project, a network designer needs to select a device to provide collision free connections to 40 hosts on the LAN. Which device should be selected?

switch

Which information is used by the router to determine the path between the source and destination hosts?

the network portion of the IP address

What are two purposes for configuring a banner on a router?

to announce system downtime .to assist in legal prosecution for unauthorized access

Which OSI layer does IP rely on to determine whether packets have been lost and to request retransmission?

transport layer

Which OSI layer manages data segments?

transport layer

Which application belongs to the category of the client/server model?

using Telnet to access a router

When must a router serial interface be configured with the clock rate command?

when the interface is functioning as a DCE device


Kaugnay na mga set ng pag-aaral

life Policy Provisions & Options

View Set

Saunders: Pharmacology/Cardiovascular

View Set

Unit 8 Quiz (The Reproductive System)

View Set

CH 39 EAQ Management of Nutritional Problems

View Set

Astronomy Chapter 14 Module 14 HW4

View Set