Sunteți pe pagina 1din 7

Ex Final CCNA 1 Varianta

1. Which devices shown in the graphic must have a MAC address?


only PC
only router
PC and router
PC, hub, and router
PC, printer, and router

2. Which protocols are TCP/IP application layer protocols? (Choose two.)


UDP
FTP
IP
SMTP
TCP

3. Based on the graphic above, which of the following occurs as each host system comes
on line in the topology?

The switch sends its MAC address to each host.


The switch adds MAC address to the bridge table as each host sends a frame.
Each host exchanges MAC addresses with each other.
The switch listens for data traffic to block since the switch lacks an IP address.

4. Which of the following increases the potential for a collision to occur?


the use of an active hub instead of an intelligent hub
the use of an intelligent hub instead of an active hub
a reduction in the number of devices attached to the hub
an increase in the number of devices attached to the hub

5. Refer to the exhibit. What must be configured on Host B to allow it to communicate


with the Host C? (Choose three.)

the MAC address of RTA router interface connected to Switch 1


a unique host IP address
the IP address of Switch 1
the default gateway address
the MAC address of Host C
the subnet mask for the LAN

6. Which of the following commands could be used on a Windows-based computer to


view the current IP configuration of the system? (Choose two.)
configip
ifconfig
ipconfig
winipcfg
winipconfig

7. Refer to the exhibit. Which type of UTP cable should be used to connect Host A to
Switch1?

rollover
console
crossover

1
Ex Final CCNA 1 Varianta
straight-through

8. Refer to the exhibit. How will the Fohi router dynamically learn routes to the
192.168.16.16/28, 192.168.16.32/28, and 192.168.16.48/28 subnetworks?

with a static route


with a routed protocol
with a routing protocol
with a directly connected route

9. What are three characteristics of the TCP protocol? (Choose three.)


has less overhead than UDP
is used for IP error messages
forces the retransmission undelivered packets
creates a virtual session between end-user applications
carries the IP address of destination host in the TCP header
is responsible for breaking messages into segments and reassembling them
at their destination

10. Which cable diagram displays the end to end pinout for a crossover cable used with
Cisco devices?

Cable A
Cable B
Cable C
Cable D

11. When using Category 5 UTP cable, which RJ-45 pin pairs are used to exchange data
between hosts on an Ethernet network?

1 and 2; 4 and 5
1 and 2; 3 and 6
3 and 6; 7 and 8
4 and 5; 7 and 8

12. Refer to the exhibit. What is the order of the TCP/IP Protocol Data Units as data is
moved as indicated through the OSI model?
data, segments, frames, packets, bits
data, packets, segments, frames, bits
data, segments, packets, frames, bits
data, packets, frames, segments, bits

13. Which type of address is 192.168.170.112/28?


host address
subnetwork address
broadcast address
multicast address

14. Refer to the exhibit. Host A wants to send a message to host B. Place the following
steps in the correct order so that the message can be sent.

A - add network layer addresses


B - transmit bits

2
Ex Final CCNA 1 Varianta
C - create application data
D - add data link layer addresses

B, A, D, C
D, A, C, B
A, D, A, B
C, A, D, B
C, D, A, B
C, B, A, D

15. Refer to the exhibit. Host A is sending data to Host B. Once R2 determines that data
from Host A must be forwarded to R1 to reach Host B, which layer of the OSI model will
R2 use to address and build the frames destined for R1?
physical
data link
network
transport
session
presentation

16. Refer to the exhibit. The internetwork in the exhibit has been assigned the IP address
172.20.0.0. What would be the appropriate subnet mask to maximize the number of
networks available for future growth?

***???255.255.224.0
255.255.240.0
255.255.248.0
255.255.252.0
255.255.254.0
255.255.255.0

17. What are important characteristics to consider when purchasing a network interface
card? (Choose two.)

security used on the network


media used on the network
system bus used on the computer
software installed on the network
diagnostic tools installed on the network

18. Which binary number is a representation of the decimal number 248?


11101000
11110100
11111000
11111010

19. What can be verified by successfully pinging the reserved loopback address on a
host?

Connectivity exists between two hosts on the LAN.


The TCP/IP stack of the local host is configured correctly.
A connection exists between a host and the default gateway.
The route a packet takes from the local host to a remote host is valid.

3
Ex Final CCNA 1 Varianta

20. Two peer hosts are exchanging data using TFTP. During the current session, a
datagram fails to arrive at the destination. Which statement is true regarding the
retransmission of the datagram?

Datagram retransmission requires user authentication.


Datagram retransmission is controlled by the application.
Datagram retransmission relies on the acknowledgements at transport layer.
Datagram retransmission occurs when the retransmission timer expires in the
source host.

21. Refer to the exhibit. A network associate needs to establish an Ethernet connection
between Host A and Host B. However, the distance between the two hosts is further than
the cabling standards allow. Which two devices that operate at the physical layer of the
OSI can be used to allow Host A and Host B to communicate?

switch
hub
bridge
router
repeater

22. How many collision domains are shown in the diagram?


three
four
five
six
seven
eight

23. For which Ethernet installations would fiber optic rather than Cat5 UTP be a better
media choice? (Choose two.)

a 3 meter connection between two 10BASE-T hubs


an environment with many potential sources of EMI and RFI
a peer to peer connection between two NICs with RJ45 connectors
an installation between two buildings that are located 500 meters apart
a single building installation where installation costs are the major concern

24. Which application layer protocols use UDP at the transport layer? (Choose two.)
FTP
SNMP
Telnet
DHCP
SMTP

25. Which of the following statements are correct about CSMA/CD? (Choose three.)
It is a media access method used in LANs.
It is a media access method used in FDDI WANs.
When a device needs to transmit, it checks to see if the media is available.
A device sends data without checking media availability because all devices
have equal access.
Multiple devices can successfully transmit simultaneously.

4
Ex Final CCNA 1 Varianta
Only one device can successfully transmit at a time.

26. Refer to the exhibit. Which type of Category 5 cable is used to make an Ethernet
connection between Host A and Host B?
coax cable
rollover cable
crossover cable
straight-through cable

27. Which subnet masks would be valid for a subnetted Class B address? (Choose two.)
255.0.0.0
255.254.0.0
255.224.0.0
255.255.0.0
255.255.252.0
255.255.255.192

28. Which protocol is used to eliminate switching loops?


Transmission Control Protocol
Routing Information Protocol
Spanning Tree Protocol
Interior Gateway Routing Protocol
Internetworking Protocol

29. What is the correct number of usable subnetworks and hosts for the IP network
address 192.168.35.0 subnetted with a /28 mask?

6 networks / 64 hosts
14 networks / 32 hosts
14 networks / 14 hosts
30 networks / 64 hosts

30. How does network cable length affect attenuation?


Category 5 cable that is run in metal conduit has the highest attenuation in the
shortest distance.
Shorter cable lengths have greater signal attenuation.
Longer cable lengths have greater signal attenuation.
The length of the cable has no effect on signal attenuation.

31. Which statements describe the logical token-passing topology? (Choose two.)
Network usage is on a first come, first serve basis.
Computers are allowed to transmit data only when they possess a token.
Data from a host is received by all other hosts.
Electronic tokens are passed sequentially to each other.
Token passing networks have problems with high collision rates.

32. How many broadcast domains are shown in the diagram?


three
four
five

5
Ex Final CCNA 1 Varianta
six
seven
eight
33. Which devices segment collision domains? (Choose two.)
transceiver
router
switch
hub
media
34. Which technologies are considered to be LAN technologies? (Choose two.)
DSL
Token Ring
Frame Relay
ISDN
Ethernet
35. Which statement describes a star topology?
Each host in the network is connected to a backbone cable that is terminated at
both ends.
Each host is connected to a hub or switch, either of which acts as a central
point for all network connections.
Each host is directly connected to two other hosts to form a long chain of hosts.
Each host has a connection to all other hosts in the network.

36. After an unsuccessful ping to the local router, the technician decides to investigate
the router. The technician observes that the lights and fan on the router are not
operational. In which layer of the OSI model is the problem most likely occurring?
transport
network
data link
physical

37. Host A is assigned the IP address 10.18.97.55 /21. How many more network devices
can be assigned to this subnetwork if Host A is the only one that has an IP address
assigned so far?
254
509
1021
2045
4094
8190
38. A router interface has been assigned an IP address of 172.16.192.166 with a mask of
255.255.255.248. To which subnet does the IP address belong?
172.16.0.0
172.16.192.0
172.16.192.128
172.16.192.160
172.16.192.168
172.16.192.176

39. Which term describes the delay in time that occurs when a frame leaves its source
device and reaches its destination?

collision
backoff

6
Ex Final CCNA 1 Varianta
attenuation
latency
broadcast

40. Refer to the exhibit. The network administrator wants to create a subnet for the point-
to-point connection between the two routers. Which subnetwork mask would provide
enough addresses for the point-to-point link with the least number of wasted addresses?
255.255.255.192
255.255.255.224
255.255.255.240
255.255.255.248
255.255.255.252

41. What is attenuation?


opposition to the flow of current
measurement of electrical signals relative to time
degradation of a signal as it travels along the medium
amount or volume of traffic that is flowing on the medium

42. Which type of address is 223.168.17.167/29?


host address
multicast address
broadcast address
subnetwork address

43. What is the maximum length of a media segment used for 100BASE-TX?
100 meters
185 meters
400 meters
500 meters

44. Which combination of network id and subnet mask correctly identifies all IP
addresses from 172.16.128.0 through 172.16.159.255?

172.16.128.0 255.255.255.224
172.16.128.0 255.255.0.0
172.16.128.0 255.255.192.0
172.16.128.0 255.255.224.0
172.16.128.0 255.255.255.192

45. Which cable specifications are indicated by 10BASE-T?


10 Mbps transmission speed, baseband signal, 500 meter cable length, coaxial cable
10 Mbps transmission speed, broadband signal, 100 meter cable length, coaxial cable
10 Mbps transmission speed, baseband signal, 100 meter cable length,
twisted-pair cable
10 Gbps transmission speed, broadband signal, 500 meter cable length, twisted-
pair cable

S-ar putea să vă placă și