CCNA CISCO 1 Practice Final Exam (Partial)

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Refer to the exhibit. An administrator must send a message to everyone on the router A network. What is the broadcast address for network 172.16.16.0/22?

172.16.19.255

What is the usable number of host IP addresses on a network that has a /26 mask?

62

Which message delivery option is used when all devices need to receive the same message simultaneously?

broadcast

What is the objective of a network reconnaissance attack?

discovery and mapping of systems

Which two OSI model layers are considered to be included in the top layer of the TCP/IP protocol stack? (Choose two.)

presentation session

A small business user is looking for an ISP connection that provides high speed digital transmission over regular phone lines. What ISP connection type should be used?

DSL

Which two protocols function at the internet layer? (Choose two.)

IP ICMP

Which two statements correctly describe a router memory type and its contents? (Choose two.)

ROM is nonvolatile and contains basic diagnostic software. RAM is volatile and stores the IP routing table.

What is the purpose of ICMP messages?

to provide feedback of IP packet transmissions

Refer to the exhibit. A network administrator is configuring access control to switch SW1. If the administrator uses Telnet to connect to the switch, which password is needed to access user EXEC mode?

linevtyin

Which keys act as a hot key combination that is used to interrupt an IOS process?

Ctrl-Shift-6

What are two features of ARP? (Choose two.)

1. If a host is ready to send a packet to a local destination device and it has the IP address but not the MAC address of the destination, it generates an ARP broadcast. 2. If a device receiving an ARP request has the destination IPv4 address, it responds with an ARP reply.

A network administrator is variably subnetting a given block of IPv4 addresses. Which combination of network addresses and prefix lengths will make the most efficient use of addresses when the need is for 2 subnets capable of supporting 10 hosts and 1 subnet that can support 6 hosts?

10.1.1.128/28 10.1.1.144/28 10.1.1.160/29

What three blocks of addresses are defined by RFC 1918 for private network use? (Choose three.)

192.168.0.0/16 172.16.0.0/12 10.0.0.0/8

What is the valid most compressed format possible of the IPv6 address 2001:0DB8:0000:AB00:0000:0000:0000:1234?

2001:DB8:0:AB00::1234

What will be the result of failed login attempts if the following command is entered into a router? login block-for 150 attempts 4 within 90

All login attempts will be blocked for 150 seconds if there are 4 failed attempts within 90 seconds.

For Cisco IOS, which escape sequence allows terminating a traceroute operation?

Ctrl+c

What will a Layer 2 switch do when the destination MAC address of a received frame is not in the MAC table?

It forwards the frame out of all ports except for the port at which the frame was received.

Which statement describes a characteristic of the traceroute utility?

It identifies the routers in the path from a source host to a destination host.

A user reports a lack of network connectivity. The technician takes control of the user machine and attempts to ping other computers on the network and these pings fail. The technician pings the default gateway and that also fails. What can be determined for sure by the results of these tests?

Nothing can be determined for sure at this point.

A technician with a PC is using multiple applications while connected to the Internet. How is the PC able to keep track of the data flow between multiple application sessions and have each application receive the correct packet flows?

The data flow is being tracked based on the source port number utilized by each application.

A network administrator enters the service password-encryption command into the configuration mode of a router. What does this command accomplish?

This command prevents someone from viewing the running configuration passwords.

What type of communication rule would best describe CSMA/CD?

access method

What important information is examined in the Ethernet frame header by a Layer 2 device in order to forward the data onward?

destination MAC address

If data is being sent over a wireless network, then connects to an Ethernet network, and eventually connects to a DSL connection, which header will be replaced each time the data travels through a network infrastructure device?

data link

Which term refers to a network that provides secure access to the corporate offices by suppliers, customers and collaborators?

extranet

A technician has been asked to develop a physical topology for a network that provides a high level of redundancy. Which physical topology requires that every node is attached to every other node on the network?

mesh

What type of communication medium is used with a wireless LAN connection?

radio waves


संबंधित स्टडी सेट्स

Chapter 15: Assessing Head and Neck

View Set

Principles of Finance - Chapter 19 and Smartbook

View Set

Chapter 6: Disorders of the Breasts

View Set

TCI: History Alive: The Ancient World: Chapter 25

View Set

AP Geography: Where is Industry Distributed?

View Set

How the Brain Processes Visual Information

View Set

8.1 Studying and Encoding Memories

View Set

Chapter 15 Global Marketing and the Digital Revolution

View Set

Chapter 27: Security, Jarvis Chapter 27 The Complete Health Assessment, Chapter 27: Complete Health Assessment, Vital signs Chapter 26 questions, Chapter 26 Measuring Vital Sign

View Set

Chapter 16.6 Political Behavior in Organizations

View Set