CCNA1 Practice Final Exam:: Q20-39

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

33. Fill in the blank using a number. The minimum Ethernet frame size is "____" bytes. Anything smaller than that should be considered a "___ ____."

64 runt frame

30. [[[COMPLICATED CONFIGURATION IMAGE FOR COM4]]]]]] Refer to the exhibit. A network engineer is attempting to connect to a new router to perform the initial configuration. The engineer connects a rollover cable from the serial port of a PC to the Aux port on the router, then configures HyperTerminal as shown. The engineer cannot get a login prompt in HyperTerminal. What would fix the problem? a. Move the cable to the router console port. b. Use a crossover cable instead of a rollover cable. c. Connect to the Ethernet port on the PC. d. Change connection settings to even parity.

a

36. Which service will translate private internal IP addresses into Internet routable public IP addresses? a. NAT b. DNS c. ARP d. DHCP

a

39. Packet tracer diagram. Open the PT activity. Perform the tasks in the activity instructions and then answer the question. Which information is obtained from this command output? a. 10.20.20.3, non-authoritative answer b. 10.20.20.4, non-authoritative answer c. 10.20.20.3, authoritative answer d. 10.20.20.4, authoritative answer

a

29. What three primary functions does data link layer encapsulation provide? (Choose three.) a. error detection b. port identification c. addressing d. path determination e. IP address resolution f. frame delimiting

acf

37. What three statements describe features or functions of media access control? (Choose three.) a. Ethernet utilizes CSMA/CD.* b. 802.11 utilizes CSMA/CD. c. It uses contention-based access also known as deterministic access. d. Data link layer protocols define the rules for access to different media. e. Controlled media access involves collision handling. f. It is responsible for detecting transmission errors in transmitted data.

adf

25. A network administrator is troubleshooting connectivity issues on a server. Using a tester, the administrator notices that the signals generated by the server NIC are distorted and not usable. In which layer of the OSI model is the error categorized? a. data link layer b. physical layer c. network layer d. presentation layer

b

26. What will a host on an Ethernet network do if it receives a frame with a destination MAC address that does not match its own MAC address? a. It will remove the frame from the media. b. It will discard the frame. c. It will forward the frame to the next host. d. It will strip off the data-link frame to check the destination IP address.

b

24. For which three reasons was a packet-switched connectionless data communications technology used when developing the Internet? (Choose three.) a. It requires that a data circuit between the source and destination be established before data can be transferred. b. It can rapidly adapt to the loss of data transmission facilities. c. It efficiently utilizes the network infrastructure to transfer data. d. It allows for billing of network use by the amount of time a connection is established. e. Data packets can travel multiple paths through the network simultaneously.*

bce

27. What are the three parts of an IPv6 global unicast address? (Choose three.) a. broadcast address b. global routing prefix c. subnet mask d. subnet ID e. interface ID

bde

20. What information is added during encapsulation at OSI Layer 3? a. source and destination port number b. source and destination MAC c. source and destination IP address* d. source and destination application protocol

c

22. Which statement describes a characteristic of the traceroute utility? a. It is primarily used to test connectivity between two hosts. b. It sends four Echo Request messages. c. It identifies the routers in the path from a source host to a destination host. d. It utilizes the ICMP Source Quench messages.

c

31. The administrator of a branch office receives an IPv6 prefix of 2001:db8:3000::/52 from the corporate network manager. How many subnets can the administrator create? a. 1024 b. 2048 c. 4096 d. 8192 e. 65536

c

35. Which router configuration mode would an administrator use to configure the router for SSH or Telnet login access? a. interface b. router c. line d. privileged EXEC e. global

c

23. [[[[[DIAGRAM CONNECTING TWO ROUTERS WITH A SWITCH AND HOST UNDER EACH]]]] Refer to the exhibit. HostA is attempting to contact ServerB. Which two statements correctly describe the addressing that HostA will generate in the process? (Choose two.) a. A packet with the destination IP address of RouterA. b. A frame with the destination MAC address of SwitchA. c. A frame with the destination MAC address of RouterA. d. A packet with the destination IP address of RouterB. e. A packet with the destination IP address of ServerB. f. A frame with the destination MAC address of ServerB.

ce

32. [[[[CONFIGURATION IMAGE]]]] Refer to the exhibit. Which two settings could be changed to improve security on the wireless network? (Choose two.) a. wide channel b. radio band c. SSID d. network mode e. SSID broadcast f. standard channel

ce

34. Image:: " Authorized access only! Router> " Refer to the exhibit. From global configuration mode, an administrator is attempting to create a message-of-the-day banner by using the command banner motd V Authorized access only! Violators will be prosecuted! V When users log in using Telnet, the banner does not appear correctly. What is the problem? a. The symbol "!" signals the end of a banner message. b. Message-of-the-day banners will only appear when a user logs in through the console port. c. The banner message is too long. d. The delimiting character appears in the banner message.

d

21. What are two ways that TCP uses the sequence numbers in a segment? (Choose two.) a. to limit the number of segments that can be sent out of an interface at one time b. to determine if the packet changed during transit c. to specify the order in which the segments travel from source to destination d. to reassemble the segments at the remote location e. to identify missing segments at the destination

de

28. A PC that is communicating with a web server is utilizing a window size of 6,000 bytes when sending data and a packet size of 1,500 bytes. What byte of information will the web server acknowledge after it has received four packets of data from the PC? a. 5 b. 1,500 c. 1,501 d. 6,000 e. 6,001

e

38. Fill in the blank. Do not abbreviate. Use lower case. Which interface configuration mode command puts a Layer 3 switch interface into Layer 3 mode? " _______ " ​

no switchport


Kaugnay na mga set ng pag-aaral

Data Communications and Network Services

View Set

AP Psychology Unit 4 Practice Test

View Set

Introduction to Management Exam #2 (Ch. 3 - 5)

View Set

FIS 201 Exam 2 - Emailed Study Guide

View Set

Intermediate Accounting I Exam 1

View Set

General Psychology Post Test Study Guide

View Set

Financial Analysis Test #1 Practice Q's, Fina 470 - Ch: 3 - Analyzing Activities, finance 3, FINA 470 - Exam 1, FINA 470 Test 1 Discussion Questions, Financial Statement Analysis Exam 1, Chapter 3: Analyzing Financing Activities, Ch. 3 & 4, Finance 4...

View Set