CCNA 1 v5 Pratice Final Exam
CCNA 1 v5 Pratice Final Exam
CCNA 1 v5 Pratice Final Exam
has limited or no connectivity. The technician asks the user to issue the ipconfig /all
command. The user reports the IP address is 169.254.69.196 with subnet mask of
255.255.0.0 and nothing is displayed for the DNS server IP address. What is the cause
of the problem?
The DNS server IP address needs to be configured.
The subnet mask was configured incorrectly.
The workstation is unable to obtain an IP address from a DHCP server.*
The workstation NIC has malfunctioned.
5
A network administrator has been issued a network address of 192.31.7.64/26. How
many subnets of equal size could be created from the assigned /26 network by using
a /28 prefix?
16
8
3
6
4*
14
6
Why are port numbers included in the TCP header of a segment?
to allow the receiving host to assemble the packet in the proper order
to enable a receiving host to forward the data to the appropriate application*
to determine which Layer 3 protocol should be used to encapsulate the data
to identify which switch ports should receive or forward the segment
to indicate the correct router interface that should be used to forward a segment
7
Refer to the exhibit. Which layer of the OSI model would format data in this way?
data link*
application
transport
network
physical
8
Open the PT Activity. Perform the tasks in the activity instructions and then answer
the question.
What is the secret keyword that is displayed on the web page?
cisco
switch
frame
packet*
router
9
Which two types of applications rely on their traffic having priority over other traffic
types through the network? (Choose two.)
email
voice*
file transfer
instant messaging
video*
10
Fill in the blank.
In dotted decimal notation, the IP address 172.25.0.126 is the last host address for the
network 172.25.0.64/26.
11
Which devices should be secured to mitigate against MAC address spoofing attacks?
Layer 2 devices*
Layer 7 devices
Layer 3 devices
Layer 4 devices
12
Which IPv6 address notation is valid?
ABCD:160D::4GAB:FFAB
2001:0DB8::ABCD::1234
2001:DB8:0:1111::200*
2001::ABCD::
13
To revert to a previous configuration, an administrator issues the command copy tftp
startup-config on a router and enters the host address and file name when prompted.
After the command is completed, why does the current configuration remain
unchanged?
A TFTP server can only be used to restore the Cisco IOS, not the router configuration.
The command should have been copy startup-config tftp.
The configuration should have been copied to the running configuration instead.*
The configuration changes were copied into RAM and require a reboot to take effect.
14
What are two characteristics of a scalable network? (Choose two.)
is not as reliable as a small network
grows in size without impacting existing users*
easily overloaded with increased traffic
suitable for modular devices that allow for expansion*
offers limited number of applications
15
Which two functions are primary functions of a router? (Choose two.)
packet switching*
microsegmentation
domain name resolution
flow control
path selection*
16
Using default settings, what is the next step in the router boot sequence after the IOS
loads from flash?
Perform the POST routine.
Search for a backup IOS in ROM.
Load the bootstrap program from ROM.
Load the running-config file from RAM.
Locate and load the startup-config file from NVRAM.*
17
A router boots and enters setup mode. What is the reason for this?
Cisco IOS is missing from flash memory.
The POST process has detected hardware failure.
The IOS image is corrupt.
The configuration file is missing from NVRAM.*
18
What is an ISP?
It is a networking device that combines the functionality of several different networking
devices in one.
It is an organization that enables individuals and businesses to connect to the
Internet.*
It is a protocol that establishes how computers within a local network communicate.
It is a standards body that develops cabling and wiring standards for networking.
19
Subnet 192.168.1.32/27 will have a valid host range from 192.168.1.33 192.168.1.62
with the broadcast address as 192.168.1.63
Subnet 192.168.1.64/27 will have a valid host range from 192.168.1.65 192.168.1.94
with the broadcast address as 192.168.1.95
Subnet 192.168.1.96/27 will have a valid host range from 192.168.1.97 192.168.1.126
with the broadcast address as 192.168.1.127
20
What information is added during encapsulation at OSI Layer 3?
source and destination port number
source and destination MAC
source and destination IP address*
source and destination application protocol
21
What are two ways that TCP uses the sequence numbers in a segment? (Choose
two.)
to limit the number of segments that can be sent out of an interface at one time
to determine if the packet changed during transit
to specify the order in which the segments travel from source to destination
to reassemble the segments at the remote location*
to identify missing segments at the destination*
22
Which statement describes a characteristic of the traceroute utility?
It is primarily used to test connectivity between two hosts.
It sends four Echo Request messages.
It identifies the routers in the path from a source host to a destination host.*
It utilizes the ICMP Source Quench messages.
23
Refer to the exhibit. HostA is attempting to contact ServerB. Which two statements
correctly describe the addressing that HostA will generate in the process? (Choose
two.)
A packet with the destination IP address of RouterA.
A frame with the destination MAC address of SwitchA.
A frame with the destination MAC address of RouterA.*
A packet with the destination IP address of RouterB.
A packet with the destination IP address of ServerB.*
A frame with the destination MAC address of ServerB.
24
For which three reasons was a packet-switched connectionless data
communications technology used when developing the Internet? (Choose three.)
It requires that a data circuit between the source and destination be established before data
can be transferred.
It can rapidly adapt to the loss of data transmission facilities.*
It efficiently utilizes the network infrastructure to transfer data.*
It allows for billing of network use by the amount of time a connection is established.
Data packets can travel multiple paths through the network simultaneously.*
25
A network administrator is troubleshooting connectivity issues on a server. Using a
tester, the administrator notices that the signals generated by the server NIC are
distorted and not usable. In which layer of the OSI model is the error categorized?
data link layer
physical layer*
network layer
presentation layer
26
What will a host on an Ethernet network do if it receives a frame with a destination
MAC address that does not match its own MAC address?
It will remove the frame from the media.
It will discard the frame.*
It will forward the frame to the next host.
It will strip off the data-link frame to check the destination IP address.
27
What are the three parts of an IPv6 global unicast address? (Choose three.)
broadcast address
global routing prefix*
subnet mask
subnet ID*
interface ID*
28
A PC that is communicating with a web server is utilizing a window size of 6,000
bytes when sending data and a packet size of 1,500 bytes. What byte of information
will the web server acknowledge after it has received four packets of data from the
PC?
1,500
5
6,001*
1,501
6,000
29
What three primary functions does data link layer encapsulation provide? (Choose
three.)
error detection*
port identification
addressing*
path determination
IP address resolution
frame delimiting*
30
1024
2048
4096*
8192
65536
32
Refer to the exhibit. Which two settings could be changed to improve security on the
wireless network? (Choose two.)
wide channel
radio band
SSID*
network mode
SSID broadcast*
standard channel
33
Fill in the blank using a number.
The minimum Ethernet frame size is 64 bytes. Anything smaller than that should be
considered a runt frame.
34
37
What three statements describe features or functions of media access control?
(Choose three.)
Ethernet utilizes CSMA/CD.*
802.11 utilizes CSMA/CD.
It uses contention-based access also known as deterministic access.
Data link layer protocols define the rules for access to different media.*
Controlled media access involves collision handling.
It is responsible for detecting transmission errors in transmitted data.*
38
Fill in the blank. Do not abbreviate. Use lower case.
Which interface configuration mode command puts a Layer 3 switch interface into Layer 3
mode?
no switchport
39
Open the PT activity. Perform the tasks in the activity instructions and then answer
the question.
Which information is obtained from this command output?
10.20.20.3, non-authoritative answer*
10.20.20.4, non-authoritative answer
10.20.20.3, authoritative answer
10.20.20.4, authoritative answer
40
A small satellite office has been given the overall network number of 192.168.99.0/24
and the network technician can subdivide the network addresses as needed. The
office needs network access for both wired and wireless devices. However, because
of the security consideration, these two networks should be separate. The wired
network will have 20 devices. The wireless network has a potential connection of 45
devices. Which addressing scheme would be most efficient for these two networks?
192.168.99.0/27
192.168.99.32/28
192.168.99.0/27
192.168.99.32/26
192.168.99.0/26
192.168.99.64/27 **************
192.168.99.0/28
192.168.99.64/26
192.168.99.0/28
192.168.99.16/28
41
What makes fiber preferable to copper cabling for interconnecting buildings?
(Choose three.)
greater bandwidth potential*
limited susceptibility to EMI/RFI*
durable connections
easily terminated
greater distances per cable run*
lower installation cost
42
A network team is comparing physical WAN topologies for connecting remote sites
to a headquarters building. Which topology provides high availability and connects
some, but not all, remote sites?
point-to-point
mesh
partial mesh*
hub and spoke
43
What is the function of CSMA/CA in a WLAN?
It assures that clients are connected to the correct WLAN.
It describes the smallest building block of the WLAN.
It provides the mechanism for media access.*
It allows a host to move between cells without loss of signal.
44
A network administrator enters the service password-encryption command into the
configuration mode of a router. What does this command accomplish?
This command provides an exclusive encrypted password for external service personnel
who are required to do router maintenance.
This command enables a strong encryption algorithm for the enable secret password
command.
This command encrypts passwords as they are transmitted across serial WAN links.
This command prevents someone from viewing the running configuration
passwords.*
This command automatically encrypts passwords in configuration files that are currently
stored in NVRAM.
45
Fill in the blank.
A nibble consists of 4 bits.
46
leased line*
dialup
49
Refer to the exhibit. What will be the result of entering this configuration the next
time a network administrator connects a console cable to the router and no
additional commands have been entered?
The administrator will be presented with the R1> prompt.*
The administrator will be required to enter Cisco789.
The administrator will be required to enter Cisco234.
The administrator will be required to enter Cisco123.
50
The ARP table in a switch maps which two types of address together?
Layer 2 address to a Layer 4 address
Layer 3 address to a Layer 2 address*
Layer 4 address to a Layer 2 address
Layer 3 address to a Layer 4 address
51
Which is a function of the show ip route command when used as a tool for
troubleshooting network connectivity?
shows the IP address of the next hop router for each route*
lists the IP addresses of all hops the traffic will pass through to reach the destination
network
shows the incoming and outgoing interfaces the traffic will go through in order to reach the
destination network
indicates the point of failure in the connection
52
Refer to the graphic. What is the effect of setting the security mode to WEP on the
Linksys integrated router?
It encrypts data between the wireless client and the access point.*
It identifies the wireless LAN.
It allows the access point to inform clients of its presence.
It translates an internal address or group of addresses into an outside, public address.
It translates IP addresses into easy-to-remember domain names.
53
54
What are two actions performed by a Cisco switch? (Choose two.)
building a routing table that is based on the first IP address in the frame header
utilizing the MAC address table to forward frames via the destination MAC address*
forwarding frames with unknown destination IP addresses to the default gateway
using the source MAC addresses of frames to build and maintain a MAC address
table*
examining the destination MAC address to add new entries to the MAC address table
55
Refer to the exhibit. Using VLSM, what is the largest and smallest subnet mask
required on this network in order to minimize address waste?
255.255.254.0 and 255.255.255.252*
255.255.255.128 and 255.255.255.224
255.255.254.0 and 255.255.255.224
255.255.255.0 and 255.255.255.252
56
The old IOS should be backed up to NVRAM so that it is not lost during a power failure.
The new IOS might require more RAM to function properly.
The old IOS must be removed first.
9. What will happen if the default gateway address is incorrectly configured on a
host?
The host cannot communicate with other hosts in the local network.
The switch will not forward packets initiated by the host.
The host will have to use ARP to determine the correct address of the default gateway.
The host cannot communicate with hosts in other networks.
A ping from the host to 127.0.0.1 would not be successful.
10. Which connection provides a secure CLI session with encryption to a Cisco
router?
a console connection
an AUX connection
a Telnet connection
an SSH connection
11. A high school in New York (school A) is using videoconferencing technology to
establish student interactions with another high school (school B) in Russia. The
videoconferencing is conducted between two end devices through the Internet. The
network administrator of school A configures the end device with the IP address
192.168.25.10. The administrator sends a request for the IP address for the end
device in school B and the response is 192.168.25.10. The administrator knows
immediately that this IP will not work. Why?
This is a loopback address.
This is a link-local address.
There is an IP address conflict.
This is a private IP address.*
A host is accessing a Web server on a remote network. Which three functions are
performed by intermediary network devices during this conversation? (Choose
three.)
Correct
Response Your
Response
regenerating data signals
What will a Layer 2 switch do when the destination MAC address of a received frame
is not in the MAC table?
It broadcasts the frame out of all ports on the switch.
It initiates an ARP request.*
It forwards the frame out of all ports except for the port at which the frame was received.
It notifies the sending host that the frame cannot be delivered.
with answer It forwards the frame out of all ports except for the port at which the frame was
received.
.com*
http
index
A user issues the ipconfig /displaydns command on the workstation. What is the
function of this command?
Answers:
to show all of the cached DNS entries*
to show the local DNS server parameters
to show the result of last name resolution request
to show the DNS configuration for the workstation
Consider the following range of addresses:
2001:0DB8:BC15:00A0:0000::
2001:0DB8:BC15:00A1:0000::
2001:0DB8:BC15:00A2:0000::
2001:0DB8:BC15:00AF:0000::
The prefix-length for the range of addresses is ** 64 **
Which publicly available resources describe protocols, processes, and technologies
for the Internet but do not give implementation details?
protocol models
Request for Comments
IRTF research papers
IEEE standards
What information does the loopback test provide?
The device has the correct IP address on the network.
The Ethernet cable is working correctly.
The device has end-to-end connectivity.
DHCP is working correctly.
The TCP/IP stack on the device is working correctly.
A small business user is looking for an ISP connection that provides high speed
digital transmission over regular phone lines. What ISP connection type should be
used?
DSL
dial-up
satellite
cell modem
cable modem
What are the two main components of Cisco Express Forwarding (CEF)? (Choose
two.)
adjacency tables
ARP tables
routing tables
forwarding information base (FIB)
MAC-address tables
Which subnet would include the address 192.168.1.96 as a usable host address?
192.168.1.64/26
192.168.1.32/27
192.168.1.32/28
192.168.1.64/29
When applied to a router, which command would help mitigate brute-force password
attacks against the router?
exec-timeout 30
banner motd $Max failed logins = 5$
login block-for 60 attempts 5 within 60
service password-encryption
Which statement best describes the operation of the File Transfer Protocol?
An FTP client uses a source port number of 21 and a randomly generated destination port
number during the establishment of control traffic with an FTP Server.
An FTP client uses a source port number of 20 and a randomly generated destination port
number during the establishment of data traffic with an FTP Server.
An FTP server uses a source port number of 20 and a randomly generated destination port
number during the establishment of control traffic with an FTP client.
An FTP server uses a source port number of 21 and a randomly generated destination port
number during the establishment of control traffic with an FTP client.