Documente Academic
Documente Profesional
Documente Cultură
3. Based on the graphic above, which of the following occurs as each host system comes
on line in the topology?
7. Refer to the exhibit. Which type of UTP cable should be used to connect Host A to
Switch1?
rollover
console
crossover
1
Ex Final CCNA 1 Varianta
straight-through
8. Refer to the exhibit. How will the Fohi router dynamically learn routes to the
192.168.16.16/28, 192.168.16.32/28, and 192.168.16.48/28 subnetworks?
10. Which cable diagram displays the end to end pinout for a crossover cable used with
Cisco devices?
Cable A
Cable B
Cable C
Cable D
11. When using Category 5 UTP cable, which RJ-45 pin pairs are used to exchange data
between hosts on an Ethernet network?
1 and 2; 4 and 5
1 and 2; 3 and 6
3 and 6; 7 and 8
4 and 5; 7 and 8
12. Refer to the exhibit. What is the order of the TCP/IP Protocol Data Units as data is
moved as indicated through the OSI model?
data, segments, frames, packets, bits
data, packets, segments, frames, bits
data, segments, packets, frames, bits
data, packets, frames, segments, bits
14. Refer to the exhibit. Host A wants to send a message to host B. Place the following
steps in the correct order so that the message can be sent.
2
Ex Final CCNA 1 Varianta
C - create application data
D - add data link layer addresses
B, A, D, C
D, A, C, B
A, D, A, B
C, A, D, B
C, D, A, B
C, B, A, D
15. Refer to the exhibit. Host A is sending data to Host B. Once R2 determines that data
from Host A must be forwarded to R1 to reach Host B, which layer of the OSI model will
R2 use to address and build the frames destined for R1?
physical
data link
network
transport
session
presentation
16. Refer to the exhibit. The internetwork in the exhibit has been assigned the IP address
172.20.0.0. What would be the appropriate subnet mask to maximize the number of
networks available for future growth?
***???255.255.224.0
255.255.240.0
255.255.248.0
255.255.252.0
255.255.254.0
255.255.255.0
17. What are important characteristics to consider when purchasing a network interface
card? (Choose two.)
19. What can be verified by successfully pinging the reserved loopback address on a
host?
3
Ex Final CCNA 1 Varianta
20. Two peer hosts are exchanging data using TFTP. During the current session, a
datagram fails to arrive at the destination. Which statement is true regarding the
retransmission of the datagram?
21. Refer to the exhibit. A network associate needs to establish an Ethernet connection
between Host A and Host B. However, the distance between the two hosts is further than
the cabling standards allow. Which two devices that operate at the physical layer of the
OSI can be used to allow Host A and Host B to communicate?
switch
hub
bridge
router
repeater
23. For which Ethernet installations would fiber optic rather than Cat5 UTP be a better
media choice? (Choose two.)
24. Which application layer protocols use UDP at the transport layer? (Choose two.)
FTP
SNMP
Telnet
DHCP
SMTP
25. Which of the following statements are correct about CSMA/CD? (Choose three.)
It is a media access method used in LANs.
It is a media access method used in FDDI WANs.
When a device needs to transmit, it checks to see if the media is available.
A device sends data without checking media availability because all devices
have equal access.
Multiple devices can successfully transmit simultaneously.
4
Ex Final CCNA 1 Varianta
Only one device can successfully transmit at a time.
26. Refer to the exhibit. Which type of Category 5 cable is used to make an Ethernet
connection between Host A and Host B?
coax cable
rollover cable
crossover cable
straight-through cable
27. Which subnet masks would be valid for a subnetted Class B address? (Choose two.)
255.0.0.0
255.254.0.0
255.224.0.0
255.255.0.0
255.255.252.0
255.255.255.192
29. What is the correct number of usable subnetworks and hosts for the IP network
address 192.168.35.0 subnetted with a /28 mask?
6 networks / 64 hosts
14 networks / 32 hosts
14 networks / 14 hosts
30 networks / 64 hosts
31. Which statements describe the logical token-passing topology? (Choose two.)
Network usage is on a first come, first serve basis.
Computers are allowed to transmit data only when they possess a token.
Data from a host is received by all other hosts.
Electronic tokens are passed sequentially to each other.
Token passing networks have problems with high collision rates.
5
Ex Final CCNA 1 Varianta
six
seven
eight
33. Which devices segment collision domains? (Choose two.)
transceiver
router
switch
hub
media
34. Which technologies are considered to be LAN technologies? (Choose two.)
DSL
Token Ring
Frame Relay
ISDN
Ethernet
35. Which statement describes a star topology?
Each host in the network is connected to a backbone cable that is terminated at
both ends.
Each host is connected to a hub or switch, either of which acts as a central
point for all network connections.
Each host is directly connected to two other hosts to form a long chain of hosts.
Each host has a connection to all other hosts in the network.
36. After an unsuccessful ping to the local router, the technician decides to investigate
the router. The technician observes that the lights and fan on the router are not
operational. In which layer of the OSI model is the problem most likely occurring?
transport
network
data link
physical
37. Host A is assigned the IP address 10.18.97.55 /21. How many more network devices
can be assigned to this subnetwork if Host A is the only one that has an IP address
assigned so far?
254
509
1021
2045
4094
8190
38. A router interface has been assigned an IP address of 172.16.192.166 with a mask of
255.255.255.248. To which subnet does the IP address belong?
172.16.0.0
172.16.192.0
172.16.192.128
172.16.192.160
172.16.192.168
172.16.192.176
39. Which term describes the delay in time that occurs when a frame leaves its source
device and reaches its destination?
collision
backoff
6
Ex Final CCNA 1 Varianta
attenuation
latency
broadcast
40. Refer to the exhibit. The network administrator wants to create a subnet for the point-
to-point connection between the two routers. Which subnetwork mask would provide
enough addresses for the point-to-point link with the least number of wasted addresses?
255.255.255.192
255.255.255.224
255.255.255.240
255.255.255.248
255.255.255.252
43. What is the maximum length of a media segment used for 100BASE-TX?
100 meters
185 meters
400 meters
500 meters
44. Which combination of network id and subnet mask correctly identifies all IP
addresses from 172.16.128.0 through 172.16.159.255?
172.16.128.0 255.255.255.224
172.16.128.0 255.255.0.0
172.16.128.0 255.255.192.0
172.16.128.0 255.255.224.0
172.16.128.0 255.255.255.192