CCNA1 Practice Final Exam:: Q40-57

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Match each description to the appropriate type of threat. (Not all options are used). a. Brownouts b. Physical damage to routers c. Poor cabling of the networking infrastructure 1. hardware threat 2. electrical threat 3. environmental threat 4. maintenance threat

1c 2a 3b

45. Fill in the blank. A nibble consists of "__" bits.

4

46. F*** explaining this diagram. Respond with OK Place the options in the following order: [+] cables connecting rooms to wiring closets [+] desktop PC in a classroom [#] IP address of a server [#] a switch located in a classroom [+] Physical topology system [#] Logical topology system

OK

51. Which is a function of the show ip route command when used as a tool for troubleshooting network connectivity? a. shows the IP address of the next hop router for each route b. lists the IP addresses of all hops the traffic will pass through to reach the destination network c. shows the incoming and outgoing interfaces the traffic will go through in order to reach the destination network d. indicates the point of failure in the connection

a

52. Refer to the graphic. What is the effect of setting the security mode to WEP on the Linksys integrated router? a. It encrypts data between the wireless client and the access point. b. It identifies the wireless LAN. c. It allows the access point to inform clients of its presence. d. It translates an internal address or group of addresses into an outside, public address. e. It translates IP addresses into easy-to-remember domain names.

a

55. [[[COMPLICATED IMAGE]]]] Refer to the exhibit. Using VLSM, what is the largest and smallest subnet mask required on this network in order to minimize address waste? a. 255.255.254.0 and 255.255.255.252 b. 255.255.255.128 and 255.255.255.224 c. 255.255.254.0 and 255.255.255.224 d. 255.255.255.0 and 255.255.255.252

a

57. What is one purpose of the TCP three-way handshake? a. synchronizing sequence numbers between source and destination in preparation for data transfer b. determining the IP address of the destination host in preparation for data transfer c. sending echo requests from the source to the destination host to establish the presence of the destination d. requesting the destination to transfer a binary file to the source

a

a. [[[[PACKET TRACER CMD LINE IMAGE. Last command is R1# reload]]]]] Refer to the exhibit. What will be the result of entering this configuration the next time a network administrator connects a console cable to the router and no additional commands have been entered? a. The administrator will be presented with the R1> prompt.* b. The administrator will be required to enter Cisco789. c. The administrator will be required to enter Cisco234. d. The administrator will be required to enter Cisco123.

a

41. What makes fiber preferable to copper cabling for interconnecting buildings? (Choose three.) a. greater bandwidth potential b. limited susceptibility to EMI/RFI c. durable connections d. easily terminated e. greater distances per cable run flower installation cost

abe

54. What are two actions performed by a Cisco switch? (Choose two.) a. building a routing table that is based on the first IP address in the frame header b. utilizing the MAC address table to forward frames via the destination MAC address c. forwarding frames with unknown destination IP addresses to the default gateway d. using the source MAC addresses of frames to build and maintain a MAC address table e. examining the destination MAC address to add new entries to the MAC address table

ad

47. Why are the paired wires twisted in a CAT5 cable? a. to improve the mechanical strength b. to provide eletromagnetic noise cancellation c. to facilitate cable termination in the connector d. to extend the signaling length

b

50. The ARP table in a switch maps which two types of address together? a. Layer 2 address to a Layer 4 address b. Layer 3 address to a Layer 2 address* c. Layer 4 address to a Layer 2 address d. Layer 3 address to a Layer 4 address

b

40. A small satellite office has been given the overall network number of 192.168.99.0/24 and the network technician can subdivide the network addresses as needed. The office needs network access for both wired and wireless devices. However, because of the security consideration, these two networks should be separate. The wired network will have 20 devices. The wireless network has a potential connection of 45 devices. Which addressing scheme would be most efficient for these two networks? a. 192.168.99.0/27 192.168.99.32/28 b. 192.168.99.0/27 192.168.99.32/26 c. 192.168.99.0/26 192.168.99.64/27 d. 192.168.99.0/28 192.168.99.64/26 e. 192.168.99.0/28 192.168.99.16/28

c

42. A network team is comparing physical WAN topologies for connecting remote sites to a headquarters building. Which topology provides high availability and connects some, but not all, remote sites? a. point-to-point b. mesh c. partial mesh d. hub and spoke

c

43. What is the function of CSMA/CA in a WLAN? a. It assures that clients are connected to the correct WLAN. b. It describes the smallest building block of the WLAN. c. It provides the mechanism for media access. d. It allows a host to move between cells without loss of signal.

c

56. [[[SWITCH CONFIG IMAGE. Basically the output of the command is that the success rate is 0 percent]]]] Refer to the exhibit. An administrator is testing connectivity to a remote device with the IP address 10.1.1.1. What does the output of this command indicate? a. The connection timed out while waiting for a reply from the remote device. b. A ping packet is being blocked by a security device along the path. c. A router along the path did not have a route to the destination. d. Connectivity to the remote device was successful.

c

44. A network administrator enters the service password-encryption command into the configuration mode of a router. What does this command accomplish? a. This command provides an exclusive encrypted password for external service personnel who are required to do router maintenance. b. This command enables a strong encryption algorithm for the enable secret password command. c. This command encrypts passwords as they are transmitted across serial WAN links. d. This command prevents someone from viewing the running configuration passwords. e. This command automatically encrypts passwords in configuration files that are currently stored in NVRAM.

d

48. A medium-sized business is researching available options for connecting to the Internet. The company is looking for a high speed option with dedicated, symmetric access. Which connection type should the company choose? a. cable modem b. DSL c. satellite d. leased line e. dialup

d


Set pelajaran terkait

Mental Health Unit 3 Exam: Eating Disorders & Schizophrenia

View Set

Small Parts: Scrotum (Notes pg. 68 - 81)

View Set

Information Storage and Management v5

View Set

Ap Lit poetic devices and romantic poetry

View Set