Friday, April 11, 2014

CCNA 1 Chapter 1-2014

1. Which of the following descriptions are true regarding the management connections on a Cisco router? (Choose three.)
They are non-network connections.
They are used for initial router configuration.
They are asynchronous serial ports.

2. The console port can be used for which of the following? (Choose three.)
debugging.
password recovery.
troubleshooting.

3. Which of the following describes the function of a WAN?
provides connectivity over a large geographic area.

4. An internetwork must include which of the following? (Choose three.)
switching.
dynamic or static routing.
consistent end-to-end addressing.

CCNA 1 Chapter 2 -2014

1. Which statements correctly identify the role of intermediary devices in the network? (Choose three.)
determine pathways for data
retime and retransmit data signals
manage data flows

2. Select the statements that are correct concerning network protocols. (Choose three.)
define the structure of layer specific PDU’s
outline the functions necessary for communications between layers
require layer dependent encapsulations

3. What are two functions of encapsulation? (Choose two.)
identifies pieces of data as part of the same communication
ensures that data pieces can be directed to the correct receiving end device

4. What is a primary function of the trailer information added by the data link layer encapsulation?
supports error detection

CCNA 1 Chapter 3 -2014

1. What application layer protocol is commonly used to support for file transfers between a client and a server?
FTP

2. What are two forms of application layer software? (Choose two.)
applications
services

3. A network administrator is designing a network for a new branch office of twenty-five users. What are the advantages of using a client-server model? (Choose two.)
centralized administration
security is easier to enforce

4. What is the purpose of resource records in DNS?
used by the server to resolve names

CCNA 1 Chapter 4 -2014

1. Refer to the exhibit. What two pieces of information can be determined from the output that is shown? (Choose two.)
The local host is using three client sessions.
The local host is using web sessions to a remote server.

2. After a web browser makes a request to a web server that is listening to the standard port, what will be the source port number in the TCP header of the response from the server?
80

3. Which information is found in both the TCP and UDP header information?
source and destination

4. Which is an important characteristic of UDP?
minimal delays in data delivery

CCNA 1 Chapter 5 -2014

1. In an IPv4 environment, what information is used by the router to forward data packets from one interface of a router to another?
destination network address

2. What information is added during encapsulation at OSI Layer 3?
source and destination IP address

3. In a connectionless system, which of the following is correct?
The destination is not contacted before a packet is sent.

4. Which IP packet field will prevent endless loops?
time-to-live

CCNA 1 Chapter 6 -2014

1. How many bits make up an IPv4 address?
32

2. Refer to the exhibit. A network administrator has to develop an IP addressing scheme that uses the 192.168.1.0 /24 address space. The network that contains the serial link has already been addressed out of a separate range. Each network will be allocated the same number of host addresses. Which network mask will be appropriate to address the remaining networks?
255.255.255.192

3. Refer to the exhibit. The network administrator has assigned the internetwork of LBMISS an address range of 192.168.10.0. This address range has been subnetted using a /29 mask. In order to accommodate a new building, the technician has decided to use the fifth subnet for configuring the new network (subnet zero is the first subnet). By company policies, the router interface is always assigned the first usable host address and the workgroup server is given the last usable host address. Which configuration should be entered into the workgroup server’s properties to allow connectivity to the network?
IP address: 192.168.10.38 subnet mask: 255.255.255.248 default gateway: 192.168.10.33

4. Refer to the exhibit. Which network prefix will work with the IP addressing scheme shown in the graphic.
/27

CCNA 1 Chapter 7 -2014

1. Which options are properties of contention-based media access for a shared media? (Choose three.)
non-deterministic
less overhead
collisions exist

2. What is a primary purpose of encapsulating packets into frames?
facilitate the entry and exit of data on media

3. Refer to the exhibit. How many unique CRC calculations will take place as traffic routes from the PC to the laptop?
8

4. What is true concerning physical and logical topologies?
Logical topologies consist of virtual connections between nodes.

CCNA 1 Chapter 8 -2014

1. Which type of cable run is most often associated with fiber-optic cable?
backbone cable

2. In most business LANs, which connector is used with twisted-pair networking cable?
RJ-45

3. When is a straight-through cable used in a network?
when connecting a host to a switch

4. With the use of unshielded twisted-pair copper wire in a network, what causes crosstalk within the cable pairs?
the magnetic field around the adjacent pairs of wire

CCNA 1 Chapter 9 -2014

1. In the graphic, Host A has reached 50% completion in sending a 1 KB Ethernet frame to Host D when Host B wishes to transmit its own frame to Host C. What must Host B do?
Host B must wait until it is certain that Host A has completed sending its frame.

2. Ethernet operates at which layers of the OSI model? (Choose two.)
Physical layer
Data-link layer

3. Which of the following describe interframe spacing? (Choose two.)
the minimum interval, measured in bit-times, that any station must wait before sending another frame
the time allowed for slow stations to process a frame and prepare for the next frame

4. What three primary functions does data link layer encapsulation provide? (Choose three.)
addressing
error detection
frame delimiting

CCNA 1 Chapter 10 -2014

1. Refer to the exhibit. A student working in the lab selects a cable that is wired as shown. Which connection types can successfully be made with this cable? (Choose two.)
connecting two routers together via their fast ethernet ports
connecting two devices with the same interface type at Fast Ethernet speeds

2. Which three statements are true about the role of routers in the network? (Choose three.)
They propagate broadcasts.
They segment broadcast domains.
They interconnect different network technologies.
Each router interface requires a separate network or subnet.

3. Refer to the exhibit. A network administrator has decided to use packet capture software to evaluate all traffic from the student subnet on the way to the Internet. To ensure that all packets are captured, what network device should be used to connect the monitoring station to the network between R1 and R2?
hub

4. A network administrator is required to use media in the network that can run up to 100 meters in cable length without using repeaters. The chosen media must be inexpensive and easily installed. The installation will be in a pre-existing building with limited cabling space. Which type of media would best meet these requirements?
UTP

CCNA 1 Chapter 11 -2014

1.Refer to the exhibit. What command will place the router into the correct mode to configure an appropriate interface to connect to a LAN?
UBAMA(config)# interface FastEthernet 0/1

2. In a Cisco router, when do changes made to the running-configuration take effect?
after a system restart
as the commands are entered

3. Refer to the exhibit. A technician applies the configuration in the exhibit to a clean router. To verify the configuration, the technician issues the show running-config command in the CLI session with the router. What lines should the technician expect to see in the router output from the show running-config command?
enable secret 5 $1$v0/3$QyQWmJyT7zCa/yaBRasJm0
enable password 7 14141E0A1F17
line console 0
password 7 020507550A

4. When network services fail, which port is most often used to access a router for management purposes?
Console

CCNA 1 Final Exam Answers -2014

1. Due to a security violation, the router passwords must be changed. What information can be learned from the following configuration entries? (Choose two.)
Router(config)# line vty 0 3
Router(config-line)# password c13c0
Router(config-line)# login
The entries specify four Telnet lines for remote access.
Access will be permitted for Telnet using "c13c0" as the password.

2. Which two actions could be taken by a router if a specific match is not made to a route in the routing table? (Choose two.)
Neighboring routers are polled to find the best path.
The packet will be forwarded to a default route if one is present.

3. Refer to the exhibit. The network administrator remotely accesses the CLI of RouterB from PC1 using a secure connection. Which statement is true about this connection?
Only the exchange of the Telnet username and password is encrypted.

4. Refer to the exhibit. What three statements are true about the IP configuration that is shown? (Choose three.)
The network on which this computer resides can have 30 hosts.
The address that is assigned to the computer represents private addressing.
The IP address that is assigned as the default gateway is valid for this host.