CCNA1 Final Question and Answer
Set-1
1. When must a router serial interface be configured with the clock rate command?
when the interface is functioning as a DTE device
when the interface timers have been cleared
when the connected DTE device is shut down
when the interface is functioning as a DCE device
when the interface timers have been cleared
when the connected DTE device is shut down
when the interface is functioning as a DCE device
2. Due to a security violation, the router passwords must be changed. What information can be learned from the following configuration entries? (Choose two.)
Router(config)# line vty 0 3
Router(config-line)# password c13c0
Router(config-line)# login
Router(config)# line vty 0 3
Router(config-line)# password c13c0
Router(config-line)# login
The entries specify three Telnet lines for remote access.
The entries specify four Telnet lines for remote access.
The entries set the console and Telnet password to “c13c0″.
Telnet access will be denied because the Telnet configuration is incomplete.
Access will be permitted for Telnet using “c13c0″ as the password.
The entries specify four Telnet lines for remote access.
The entries set the console and Telnet password to “c13c0″.
Telnet access will be denied because the Telnet configuration is incomplete.
Access will be permitted for Telnet using “c13c0″ as the password.
3. Which of the following are the address ranges of the private IP addresses? (Choose three.)
10.0.0.0 to 10.255.255.255
200.100.50.0 to 200.100.25.255
150.150.0.0 to 150.150.255.255
172.16.0.0 to 172.31.255.255
192.168.0.0 to 192.168.255.255
127.16.0.0 to 127.31.255.255
10.0.0.0 to 10.255.255.255
200.100.50.0 to 200.100.25.255
150.150.0.0 to 150.150.255.255
172.16.0.0 to 172.31.255.255
192.168.0.0 to 192.168.255.255
127.16.0.0 to 127.31.255.255
4. Which password is automatically encrypted when it is created?
vty
aux
console
enable secret
enable password
aux
console
enable secret
enable password
5. Refer to the exhibit. A network technician is trying to determine the correct IP address configuration for Host A. What is a valid configuration for Host A?
IP address: 192.168.100.19; Subnet Mask: 255.255.255.248; Default Gateway: 192.16.1.2
IP address: 192.168.100.20; Subnet Mask: 255.255.255.240; Default Gateway: 192.168.100.17
IP address: 192.168.100.21; Subnet Mask: 255.255.255.248; Default Gateway: 192.168.100.18
IP address: 192.168.100.22; Subnet Mask: 255.255.255.240; Default Gateway: 10.1.1.5
IP address: 192.168.100.30; Subnet Mask: 255.255.255.240; Default Gateway: 192.168.1.1
IP address: 192.168.100.31; Subnet Mask: 255.255.255.240; Default Gateway: 192.168.100.18
IP address: 192.168.100.20; Subnet Mask: 255.255.255.240; Default Gateway: 192.168.100.17
IP address: 192.168.100.21; Subnet Mask: 255.255.255.248; Default Gateway: 192.168.100.18
IP address: 192.168.100.22; Subnet Mask: 255.255.255.240; Default Gateway: 10.1.1.5
IP address: 192.168.100.30; Subnet Mask: 255.255.255.240; Default Gateway: 192.168.1.1
IP address: 192.168.100.31; Subnet Mask: 255.255.255.240; Default Gateway: 192.168.100.18
6. Refer to the exhibit. What function does router RT_A need to provide to allow Internet access for hosts in this network?
address translation
DHCP services
ftpd
web server
DHCP services
ftpd
web server
7. Which prompt represents the appropriate mode used for the copy running-config startup-config command ?
Switch-6J>
Switch-6J#
Switch-6J(config)#
Switch-6J(config-if)#
Switch-6J(config-line)#
Switch-6J#
Switch-6J(config)#
Switch-6J(config-if)#
Switch-6J(config-line)#
8. Refer to the exhibit. A technician is working on a network problem that requires verification of the router LAN interface. What address should be pinged from this host to confirm that the router interface is operational?
127.0.0.1
192.168.64.196
192.168.254.1
192.168.254.9
192.168.254.254
192.168.64.196
192.168.254.1
192.168.254.9
192.168.254.254
9. Refer to the exhibit. The tracert command is initiated from PC1 to PC4. Which device will send a response to the initial tracert packet from PC1?
Athens
Ankara
London
Paris
PC4
Ankara
London
Paris
PC4
10. Which information is used by the router to determine the path between the source and destination hosts?
the host portion of the IP address
the network portion of the IP address
host default gateway address
the MAC address
the network portion of the IP address
host default gateway address
the MAC address
10. Refer to the exhibit. A PC is communicating with another PC on a remote network. The two networks are connected by three routers. Which action will help to identify the path between the hosts?
Use the ipconfig command at the host.
Use the ipconfig/all command at the destination.
Use the tracert command at the host.
Use the ping command at the destination.
Use the ipconfig/all command at the destination.
Use the tracert command at the host.
Use the ping command at the destination.
11. Refer to the exhibit. The diagram represents the process of sending e-mail between clients. Which list correctly identifies the component or protocol used at each numbered stage of the diagram?
1.MUA 2.MDA 3.MTA 4.SMTP 5.MTA 6.POP 7.MDA 8.MUA
1.MUA 2.POP 3.MDA 4.SMTP 5.MTA 6.MDA 7.SMTP 8.MUA
1.MUA 2.POP 3.SMTP 4.MDA 5.MTA 6.SMTP 7.POP 8.MUA
1.MUA 2.SMTP 3.MTA 4.SMTP 5.MTA 6.MDA 7.POP 8.MUA
1.MUA 2.POP 3.MDA 4.SMTP 5.MTA 6.MDA 7.SMTP 8.MUA
1.MUA 2.POP 3.SMTP 4.MDA 5.MTA 6.SMTP 7.POP 8.MUA
1.MUA 2.SMTP 3.MTA 4.SMTP 5.MTA 6.MDA 7.POP 8.MUA
12. Refer to the exhibit. The router of the company failed and was replaced. After the replacement, hosts C and D in the Education office are able to ping each other, but they are unable to access the hosts in the Accounts office. What is the likely cause of the problem?
The IP address at the fa0/0 interface of the router is incorrectly configured.
The subnet mask at the fa0/1 interface of the router is incorrectly entered.
The IP address at the serial interface of the router is incorrectly configured.
The hosts in the Accounts office are not on the same subnet as the hosts in the Education office.
The subnet mask at the fa0/1 interface of the router is incorrectly entered.
The IP address at the serial interface of the router is incorrectly configured.
The hosts in the Accounts office are not on the same subnet as the hosts in the Education office.
13. Refer to the exhibit. Host A and B are unable to communicate with each other. What is the reason for this?
Host A is assigned a network address.
Host B is assigned a multicast address.
Host A and host B belong to different networks.
The gateway addresses are network addresses.
Host B is assigned a multicast address.
Host A and host B belong to different networks.
The gateway addresses are network addresses.
14. Refer to the exhibit. Host B attempts to establish a TCP/IP session with host C. During this attempt, a frame was captured at the FastEthernet interface fa0/1 of the San Francisco router. The packet inside the captured frame has the source IP address 10.10.1.2, and the destination IP address is 10.31.1.20. What is the destination MAC address of the frame at the time of capture?
0060.7320.D632
0060.7320.D631
0040.8517.44C3
0009.B2E4.EE03
0010.C2B4.342
0060.7320.D631
0040.8517.44C3
0009.B2E4.EE03
0010.C2B4.342
15. Refer to the exhibit. While configuring a network, a technician wired each end of a Category 5e cable as shown. Which two statements are true about this setup? (Choose two.)
The cable is suitable for connecting a switch to a router Ethernet port.
The cable is suitable for connecting dissimilar types of devices.
The cable is unusable and must be rewired.
The cable is terminated in a way that the transmit pin is wired to the receive pin.
The cable simulates a point-to-point WAN link.
The cable is suitable for connecting dissimilar types of devices.
The cable is unusable and must be rewired.
The cable is terminated in a way that the transmit pin is wired to the receive pin.
The cable simulates a point-to-point WAN link.
16. Refer to the exhibit. Host A sends a frame with the destination MAC address as FFFF.FFFF.FFFF. What action will the switch take for this frame?
It will drop the frame.
It will send the frame back to host A.
It will send the frame to all hosts except host A.
It will forward the frame to the default gateway.
It will send the frame back to host A.
It will send the frame to all hosts except host A.
It will forward the frame to the default gateway.
17. Well-known services and applications use which range of TCP/UDP port numbers?
0 to 255
0 to 1023
1024 to 49151
49152 to 65535
0 to 1023
1024 to 49151
49152 to 65535
18. Which three IPv4 addresses represent subnet broadcast addresses? (Choose three.)
192.168.4.63 /26
192.168.4.129 /26
192.168.4.191 /26
192.168.4.51 /27
192.168.4.95 /27
192.168.4.221 /27
192.168.4.129 /26
192.168.4.191 /26
192.168.4.51 /27
192.168.4.95 /27
192.168.4.221 /27
19. Which three statements are true about network layer addressing? (Choose three.)
The addresses are 48 bits long.
Network layer addressing is used by Ethernet switches to make forwarding decisions.
It uses a hierarchical structure.
It does not support broadcasts.
It uniquely identifies each host.
A portion of the address is used to identify the network.
Network layer addressing is used by Ethernet switches to make forwarding decisions.
It uses a hierarchical structure.
It does not support broadcasts.
It uniquely identifies each host.
A portion of the address is used to identify the network.
20. Which OSI layer addressing is required to route packets between two networks?
Layer 1
Layer 2
Layer 3
Layer 4
Layer 2
Layer 3
Layer 4
21. What type of network is maintained if a server takes no dedicated role in the network?
mainframe
client/server
peer-to-peer
centralized
client/server
peer-to-peer
centralized
22. Refer to the exhibit. Host A is requesting a web page from the web server. Which option represents the socket to which the request is made?
80
www.cisco.com
10.0.0.130
10.0.0.130:80
www.cisco.com
10.0.0.130
10.0.0.130:80
23. A routing issue has occurred in your internetwork. Which of the following type of devices should be examined to isolate this error?
access point
host
hub
router
switch
host
hub
router
switch
24. Which statement describes the correct use of addresses to deliver an e-mail message from HostB to the e-mail service that is running on ServerA?
HostB uses the MAC address of ServerA as the destination.
Router B uses a Layer 3 network address to route the packet.
Router A uses the Layer 4 address to forward the packet to Router B.
Via the use of a Layer 3 address, ServerA assigns the message to the e-mail service.
Router B uses a Layer 3 network address to route the packet.
Router A uses the Layer 4 address to forward the packet to Router B.
Via the use of a Layer 3 address, ServerA assigns the message to the e-mail service.
25. Refer to the exhibit. Host A is configured with the correct IP address for the default gateway of the router R1 FastEthernet0/1 interface. How will a packet that is sent from host A to host B be handled by the devices on the network?
R1 will drop the packet because R1 does not have a specific route in its routing table to the 10.1.1.0/24 network.
R1 will forward the packet to its default gateway, the next hop router R2. R2 will forward the packet to the directly connected network 10.1.1.0/24.
R1 will forward the packet to its default gateway, the next hop router R2. R2 will drop the packet because it does not have a default route to network 10.1.1.0/24.
R1 will forward the packet to its default gateway, the next hop router R2. R2 will drop the packet because it does not have a route that is learned by a routing protocol to network 10.1.1.0/24.
R1 will forward the packet to its default gateway, the next hop router R2. R2 will forward the packet to the directly connected network 10.1.1.0/24.
R1 will forward the packet to its default gateway, the next hop router R2. R2 will drop the packet because it does not have a default route to network 10.1.1.0/24.
R1 will forward the packet to its default gateway, the next hop router R2. R2 will drop the packet because it does not have a route that is learned by a routing protocol to network 10.1.1.0/24.
26. Which option correctly identifies the interface or interfaces used to connect the router to a CSU/DSU for WAN connectivity?
This correct answer is image 4 ( last image ).
27. Refer to the exhibit. Host A is unable to reach host B on the remote network. A technician attempted to ping the local gateway and the ping was successful. To verify the host configuration, the technician issued the ipconfig command. What is the likely cause of the problem?
The local NIC is incorrectly configured.
The subnet mask on host A is incorrectly configured.
The IP address on host A is incorrectly configured.
The default gateway on host A is incorrectly configured.
The subnet mask on host A is incorrectly configured.
The IP address on host A is incorrectly configured.
The default gateway on host A is incorrectly configured.
28. A network administrator is configuring several switches for a network. The switches have similar configurations and only minor differences. The administrator wants to save all commands that are issued on the first switch to a text file for editing. Which transfer option should be selected in HyperTerminal?
Correct answer is image tree (3).
29. How many host addresses may be assigned when using the 128.107.0.0 network address with a subnet mask of 255.255.248.0?
30
256
2046
2048
4094
4096
256
2046
2048
4094
4096
30. Which application layer protocol allows administrators to log into a server from remote locations and control a server as though logged in locally?
DNS
FTP
DHCP
SMTP
Telnet
FTP
DHCP
SMTP
Telnet
31. During the encapsulation process, what is the PDU of the internet layer?
bit
data
frame
packet
segment
data
frame
packet
segment
32. Which service is used when the nslookup command is issued on a computer?
FTP
DNS
DHCP
Telnet
DNS
DHCP
Telnet
33. Refer to the exhibit. A network technician creates equal-sized subnets of network 192.168.2.0/24 using the subnet mask 255.255.255.224. If the technician wishes to calculate the number of host addresses in each subnet by using the formula that is shown in the exhibit, what value will be used for n?
1
2
3
4
5
2
3
4
5
34. What are the default terminal emulation software settings when configuring a Cisco device through a console port?
Bits per second: 19200
Data bits: 7
Parity: None
Stop bits: 0
Flow control: None
Data bits: 7
Parity: None
Stop bits: 0
Flow control: None
Bits per second: 9600
Data bits: 8
Parity: None
Stop bits: 1
Flow control: None
Data bits: 8
Parity: None
Stop bits: 1
Flow control: None
Bits per second: 19200
Data bits: 7
Parity: None
Stop bits: 0
Flow control: Hardware
Data bits: 7
Parity: None
Stop bits: 0
Flow control: Hardware
Bits per second: 9600
Data bits: 8
Parity: None
Stop bits: 1
Flow control: Hardware
Data bits: 8
Parity: None
Stop bits: 1
Flow control: Hardware
35. In a packet-switched data network, what is used to reassemble the packets in the correct order at the destination device?
source address
sequence number
priority assignment
destination address
sequence number
priority assignment
destination address
36. Refer to the exhibit. A network administrator tries to test the connectivity between routers R1 and R2, but the attempt to ping is unsuccessful. Based on the show ip interface brief command outputs, what could be the possible cause of the problem?
Interface S0/0/0 on router R1 is shut down.
Interface S0/0/0 on router R1 is configured with an incorrect IP address.
Interface S0/0/0 on router R2 is administratively down.
Interface S0/0/0 on router R2 does not have the clock rate settings configured.
Interface S0/0/0 on router R1 is configured with an incorrect IP address.
Interface S0/0/0 on router R2 is administratively down.
Interface S0/0/0 on router R2 does not have the clock rate settings configured.
37. Which router configuration mode will require user authentication if an administrator issues the enable secret command?
user executive mode
privileged executive mode
global configuration mode
service specific configuration mode
privileged executive mode
global configuration mode
service specific configuration mode
38. Which location of router memory is cleared with the erase startup-config command?
flash
RAM
ROM
NVRAM
RAM
ROM
NVRAM
39. Which subnet mask should be used for a Class B network that is divided into subnets and will accommodate between 800 hosts and 1000 hosts?
255.255.255.0
255.255.254.0
255.255.252.0
255.255.248.0
255.255.240.0
255.255.254.0
255.255.252.0
255.255.248.0
255.255.240.0
40. Which two programs can be used to accomplish terminal emulation for configuring a router from the CLI through the console port? (Choose two.)
HyperTerminal
Internet Explorer
Minicom
Secure Shell
Telnet
Internet Explorer
Minicom
Secure Shell
Telnet
41. Refer to the exhibit. The network containing router B is experiencing problems. A network associate has isolated the issue in this network to router B. What action can be preformed to correct the network issue?
issue the clock rate command on interface Serial 0/0/0
issue the description command on interface Serial 0/0/1
issue the ip address command on interface FastEthernet 0/0
issue the no shutdown command on interface FastEthernet 0/1
issue the description command on interface Serial 0/0/1
issue the ip address command on interface FastEthernet 0/0
issue the no shutdown command on interface FastEthernet 0/1
42. Refer to the exhibit. A web browser running on host PC1 sends a request for a web page to the web server with an IP address 192.168.1.254/24. What sequence of steps will follow in order to establish the session before data can be exchanged?
The session will be initiated using UDP. No additional acknowledgment will be required to establish the session.
The session will be initiated using TCP. No additional acknowledgment will be required to establish the session.
The session will be initiated using UDP. The returned web page will serve as an acknowledgment for session establishment.
The session will be initiated using TCP. A three-way handshake must be successfully completed before the session is established.
The session will be initiated using TCP. No additional acknowledgment will be required to establish the session.
The session will be initiated using UDP. The returned web page will serve as an acknowledgment for session establishment.
The session will be initiated using TCP. A three-way handshake must be successfully completed before the session is established.
43. Which prompt is associated with the privileged exec mode?
R1>
R1#
R1(config)#
R1(config-router)#
R1>
R1#
R1(config)#
R1(config-router)#
44. A user sees the command prompt: Router(config-if)# . What task can be performed at this mode?
Reload the device.
Perform basic tests.
Configure individual interfaces.
Configure individual terminal lines.
Reload the device.
Perform basic tests.
Configure individual interfaces.
Configure individual terminal lines.
45. Refer to the exhibit. Interface Fa0/0 on router A is generating excessive broadcast traffic. Which LAN segments will affected by the excessive broadcasts?
Only the 192.168.1.200/30 network will be affected.
Only the link between 192.168.1.201 and port Fa0/5 on SW1 will be affected.
Both the 192.168.1.200/30 and 192.168.1.204/30 networks will be affected.
Only the links between 192.168.1.201 and port Fa0/7 on SW2 will be affected.
Only the link between 192.168.1.201 and port Fa0/5 on SW1 will be affected.
Both the 192.168.1.200/30 and 192.168.1.204/30 networks will be affected.
Only the links between 192.168.1.201 and port Fa0/7 on SW2 will be affected.
46. What is the effect of using the Router# copy running-config startup-config command on a router?
The contents of ROM will change.
The contents of RAM will change.
The contents of NVRAM will change.
The contents of flash will change.
The contents of RAM will change.
The contents of NVRAM will change.
The contents of flash will change.
47. Which option represents a point-to-point logical topology diagram?
The correct answer is last image.
The correct answer is last image.
48. In a network design project, a network designer needs to select a device to provide collision free connections to 40 hosts on the LAN. Which device should be selected?
hub
router
switch
firewall
router
switch
firewall
49. Which communication tool allows real-time collaboration?
wiki
e-mail
weblog
instant messaging
weblog
instant messaging
Set-2
1. When must a router serial interface be configured with the clock rate command?
when the interface is functioning as a DTE device
when the interface timers have been cleared
when the connected DTE device is shut down
when the interface is functioning as a DCE device
when the interface timers have been cleared
when the connected DTE device is shut down
when the interface is functioning as a DCE device
2. Refer to the exhibit. A network technician is trying to determine the correct IP address configuration for Host A. What is a valid configuration for Host A?
IP address: 192.168.100.19; Subnet Mask: 255.255.255.248; Default Gateway: 192.16.1.2
IP address: 192.168.100.20; Subnet Mask: 255.255.255.240; Default Gateway: 192.168.100.17
IP address: 192.168.100.21; Subnet Mask: 255.255.255.248; Default Gateway: 192.168.100.18
IP address: 192.168.100.22; Subnet Mask: 255.255.255.240; Default Gateway: 10.1.1.5
IP address: 192.168.100.30; Subnet Mask: 255.255.255.240; Default Gateway: 192.168.1.1
IP address: 192.168.100.31; Subnet Mask: 255.255.255.240; Default Gateway: 192.168.100.18
3. Refer to the exhibit. What function does router RT_A need to provide to allow Internet access for hosts in this network?
IP address: 192.168.100.20; Subnet Mask: 255.255.255.240; Default Gateway: 192.168.100.17
IP address: 192.168.100.21; Subnet Mask: 255.255.255.248; Default Gateway: 192.168.100.18
IP address: 192.168.100.22; Subnet Mask: 255.255.255.240; Default Gateway: 10.1.1.5
IP address: 192.168.100.30; Subnet Mask: 255.255.255.240; Default Gateway: 192.168.1.1
IP address: 192.168.100.31; Subnet Mask: 255.255.255.240; Default Gateway: 192.168.100.18
3. Refer to the exhibit. What function does router RT_A need to provide to allow Internet access for hosts in this network?
address translation
DHCP services
ftpd
web server
DHCP services
ftpd
web server
4. Refer to the exhibit. Host A attempts to establish a TCP/IP session with host C. During this attempt, a frame was captured with the source MAC address0050.7320.D632 and the destination MAC address 0030.8517.44C4. The packet inside the captured frame has an IP source address 192.168.7.5, and the destination IP address is 192.168.219.24. At which point in the network was this packet captured?
leaving host A
leaving ATL
leaving Dallas
leaving NYC
5. Which range of port numbers are reserved for services that are commonly used by applications that run on servers?
leaving ATL
leaving Dallas
leaving NYC
5. Which range of port numbers are reserved for services that are commonly used by applications that run on servers?
0 to 255
0 to 1023
1024 to 49151
49152 to 65535
6. Which prompt represents the appropriate mode used for the copy running-config startup-config command ?
0 to 1023
1024 to 49151
49152 to 65535
6. Which prompt represents the appropriate mode used for the copy running-config startup-config command ?
Switch-6J>
Switch-6J#
Switch-6J(config)#
Switch-6J(config-if)#
Switch-6J(config-line)#
Switch-6J#
Switch-6J(config)#
Switch-6J(config-if)#
Switch-6J(config-line)#
7. Refer to the exhibit. A technician is working on a network problem that requires verification of the router LAN interface. What address should be pinged from this host to confirm that the router interface is operational?
127.0.0.1
192.168.64.196
192.168.254.1
192.168.254.9
192.168.254.254
192.168.64.196
192.168.254.1
192.168.254.9
192.168.254.254
8. Refer to the exhibit. Host A is unable to reach host B on the remote network. A technician attempted to ping the local gateway and the ping was successful. To verify the host configuration, the technician issued the ipconfig command. What is the likely cause of the problem?
The local NIC is incorrectly configured.
The subnet mask on host A is incorrectly configured.
The IP address on host A is incorrectly configured.
The default gateway on host A is incorrectly configured.
9. An organization has been assigned network ID 10.10.128.0 and subnet mask 255.255.224.0. Which IP address range can be used for this organization?
The subnet mask on host A is incorrectly configured.
The IP address on host A is incorrectly configured.
The default gateway on host A is incorrectly configured.
9. An organization has been assigned network ID 10.10.128.0 and subnet mask 255.255.224.0. Which IP address range can be used for this organization?
10.10.128.0 to 10.10.160.255
10.10.128.0 to 10.10.159.255
10.10.128.0 to 10.10.192.255
10.10.128.0 to 10.10.0.159
10.10.128.0 to 10.10.159.0
10.10.128.0 to 10.10.159.255
10.10.128.0 to 10.10.192.255
10.10.128.0 to 10.10.0.159
10.10.128.0 to 10.10.159.0
10. Refer to the exhibit. An employee wants to access the organization intranetfrom home. Which intermediary device should be used to connect the organization intranet to the Internet to enable this access?
hub
switch
router
wireless access point
11. Which OSI layer manages data segments?
switch
router
wireless access point
11. Which OSI layer manages data segments?
application layer
presentation layer
session layer
transport layer
12. Which two types of media can provide bandwidth up to 1 Gb/s? (Choose two.)
presentation layer
session layer
transport layer
12. Which two types of media can provide bandwidth up to 1 Gb/s? (Choose two.)
10 BASE-T
100 BASE-T
100 BASE-FX
1000 BASE-TX
1000 BASE-SX
13. To enhance security in a network, the network administrator uses these commands:
Router(config)# line console 0
Router(config-line)#password j1mdi2
Router(config-line)# login
What two conclusions are evident from these commands? (Choose two.)
100 BASE-T
100 BASE-FX
1000 BASE-TX
1000 BASE-SX
13. To enhance security in a network, the network administrator uses these commands:
Router(config)# line console 0
Router(config-line)#password j1mdi2
Router(config-line)# login
What two conclusions are evident from these commands? (Choose two.)
Users who attempt to connect to the console port of the router must enter a password.
The entries permit access through the console by the use of j1mdi2 as the password.
The entries eliminate the need for authentication.
Access through the console will be denied because the console configuration is incomplete.
The entries prevent passwords from being displayed as plain text.
14. Refer to the exhibit. RouterB is configured properly. The Ethernet interface Fa0/0 of RouterA is configured with the use of the commands that are shown. However, a ping from the Fa0/0 interface of RouterA to the Fa0/0 interface of RouterB is unsuccessful. What action should be taken on RouterA to solve this problem?
The entries permit access through the console by the use of j1mdi2 as the password.
The entries eliminate the need for authentication.
Access through the console will be denied because the console configuration is incomplete.
The entries prevent passwords from being displayed as plain text.
14. Refer to the exhibit. RouterB is configured properly. The Ethernet interface Fa0/0 of RouterA is configured with the use of the commands that are shown. However, a ping from the Fa0/0 interface of RouterA to the Fa0/0 interface of RouterB is unsuccessful. What action should be taken on RouterA to solve this problem?
Use the description command on the FastEthernet interface Fa0/0.
Configure the clock rate of the FastEthernet interface Fa0/0.
Use the no shutdown command on the FastEthernet interface Fa0/0.
Reboot the router.
15. Refer to the exhibit. When host A sends a frame addressed for host D, which hosts will receive the frame?
Configure the clock rate of the FastEthernet interface Fa0/0.
Use the no shutdown command on the FastEthernet interface Fa0/0.
Reboot the router.
15. Refer to the exhibit. When host A sends a frame addressed for host D, which hosts will receive the frame?
only host D
only hosts A and D
only hosts B, C, and D
all hosts
16. Refer to the exhibit. Communication for hosts X and Y is restricted to the local network. What is the reason for this?
only hosts A and D
only hosts B, C, and D
all hosts
16. Refer to the exhibit. Communication for hosts X and Y is restricted to the local network. What is the reason for this?
Host X is assigned a network address.
Host Y is assigned a multicast address.
Host X and host Y belong to different networks.
The gateway addresses are broadcast addresses.
17. A user enters http://www.cisco.com/web1.htm in the address line of a browser. Which statement is true about this transaction?
Host Y is assigned a multicast address.
Host X and host Y belong to different networks.
The gateway addresses are broadcast addresses.
17. A user enters http://www.cisco.com/web1.htm in the address line of a browser. Which statement is true about this transaction?
The “http” portion indicates the protocol that is being used.
The “web1.htm” portion is the specific service name.
The retrieved web page will be displayed in URL code.
The “www.cisco.com” is the name of the web page file that is called
18. The tracert 10.1.3.2 command was issued on computer A. Computer A can ping other addresses on the local subnet. Computer A sent the first ICMP packet toward computer B with a TTL value of 1. A protocol analyzer that wasrunning on computer B showed that the packet never reached its destination. Why did the packet not reach the destination?
The “web1.htm” portion is the specific service name.
The retrieved web page will be displayed in URL code.
The “www.cisco.com” is the name of the web page file that is called
18. The tracert 10.1.3.2 command was issued on computer A. Computer A can ping other addresses on the local subnet. Computer A sent the first ICMP packet toward computer B with a TTL value of 1. A protocol analyzer that wasrunning on computer B showed that the packet never reached its destination. Why did the packet not reach the destination?
There is a TCP/IP problem on computer A.
There is a routing loop between R1 and R2.
R1 does not have a route for the destination network.
The TTL for the packet was decreased to zero by R1.
There is a routing loop between R1 and R2.
R1 does not have a route for the destination network.
The TTL for the packet was decreased to zero by R1.
19. A routing issue has occurred in your internetwork. Which of the following type of devices should be examined to isolate this error?
access point
host
hub
router
switch
host
hub
router
switch
20. Which physical component is used to access and perform the initialconfiguration on a new unconfigured router?
Correct answer is option 2.
Correct answer is option 2.
21. What can the user do from the command prompt, Router(config-line)# ?
Configure one of the network interfaces.
Configure one of the physical or virtual lines.
Verify the running configuration on the device.
Configure the parameters for one of the routing protocols.
Configure one of the physical or virtual lines.
Verify the running configuration on the device.
Configure the parameters for one of the routing protocols.
22. Which option shows the PDU that contains the Layer 3 source and destination addressing for a packet?
Correct answer is option (image) 3.
Correct answer is option (image) 3.
23. Refer to the exhibit. The ping 127.0.0.1 command is issued on the local host. What do the ping results indicate?
The local host can send packets on the local network.
The TCP/IP stack on the local host operates properly.
The local host has full connectivity to the default gateway.
The local host has full connectivity to the remote network.
24. Which topology divides the collision domain and provides full media bandwidth to the hosts in the network?
Correct answer is option (image) 3.
The TCP/IP stack on the local host operates properly.
The local host has full connectivity to the default gateway.
The local host has full connectivity to the remote network.
24. Which topology divides the collision domain and provides full media bandwidth to the hosts in the network?
Correct answer is option (image) 3.
25. Refer to the exhibit. Which option correctly identifies the network address, range of host addresses, and the broadcast address for the network that contains host A?
Correct answer is option (image) 3.
26. A technician is setting up a workgroup for six users and wants to allow users to share files without setting up a server. Which application layerprotocol will provide for peer-to-peer file sharing in a workgroup?
DNS
SMB
HTTP
DHCP
27. Which router component will have contents erased when the command erase startup-config is issued?
SMB
HTTP
DHCP
27. Which router component will have contents erased when the command erase startup-config is issued?
flash
RAM
ROM
NVRAM
RAM
ROM
NVRAM
28. Refer to the exhibit. Host1 is in the process of setting up a TCP session with Host2. Host1 has sent a SYN message to begin session establishment. What happens next?
Host1 sends a segment with the ACK flag = 0, SYN flag = 0 to Host2.
Host1 sends a segment with the ACK flag = 1, SYN flag = 0 to Host2.
Host1 sends a segment with the ACK flag = 1, SYN flag = 1 to Host2.
Host2 sends a segment with the ACK flag = 0, SYN flag = 1 to Host1.
Host2 sends a segment with the ACK flag = 1, SYN flag = 0 to Host1.
Host2 sends a segment with the ACK flag = 1, SYN flag = 1 to Host1.
29. How many host addresses may be assigned when using the 128.107.0.0 network address with a subnet mask of 255.255.248.0?
Host1 sends a segment with the ACK flag = 1, SYN flag = 0 to Host2.
Host1 sends a segment with the ACK flag = 1, SYN flag = 1 to Host2.
Host2 sends a segment with the ACK flag = 0, SYN flag = 1 to Host1.
Host2 sends a segment with the ACK flag = 1, SYN flag = 0 to Host1.
Host2 sends a segment with the ACK flag = 1, SYN flag = 1 to Host1.
29. How many host addresses may be assigned when using the 128.107.0.0 network address with a subnet mask of 255.255.248.0?
30
256
2046
2048
4094
4096
30. Refer to the exhibit. Host A is able to access resources on the local LAN but is unable to access any resources on the Internet. What is the likely cause of this problem?
256
2046
2048
4094
4096
30. Refer to the exhibit. Host A is able to access resources on the local LAN but is unable to access any resources on the Internet. What is the likely cause of this problem?
The host subnet mask in incorrect.
The network uses private addresses.
The host address is a network address.
The default gateway is on a different subnet from the host.
The network uses private addresses.
The host address is a network address.
The default gateway is on a different subnet from the host.
31. What is described by the network access layer of the TCP/IP model?
rules for packet acknowledgment, error recovery, and sequencing
rules for the handoff from the internet layer to the network access protocols
rules for how source and destination hosts exchange data between programs
rules for determining which processes can be used to route messages through an internetwork
rules for packet acknowledgment, error recovery, and sequencing
rules for the handoff from the internet layer to the network access protocols
rules for how source and destination hosts exchange data between programs
rules for determining which processes can be used to route messages through an internetwork
32. Which two factors contribute to the increased throughput when all nodes of a LAN are connected to a switch instead of a hub? (Choose two.)
full-duplex operation
collision-free environment
logical bus media access
broadcast-free environment
point-to-multipoint topology
full-duplex operation
collision-free environment
logical bus media access
broadcast-free environment
point-to-multipoint topology
33. Which application layer protocol allows administrators to log into a server from remote locations and control a server as though logged in locally?
DNS
FTP
DHCP
SMTP
Telnet
DNS
FTP
DHCP
SMTP
Telnet
34. A network technician has made a UTP cable that is terminated as T568A on one end and T568B on the opposite end. What type of cable has been constructed?
patch
console
crossover
straight-through
35. Which application belongs to the category of the client/server model?
patch
console
crossover
straight-through
35. Which application belongs to the category of the client/server model?
using Telnet to access a router
exchanging information via instant messaging
printing a document to a locally connected printer
scanning a document with a directly connected scanner
exchanging information via instant messaging
printing a document to a locally connected printer
scanning a document with a directly connected scanner
36. Refer to the exhibit. Which two layers of the OSI model describe the same functions as the transport and internet layers of the TCP/IP model? (Choose two.)
application layer
presentation layer
session layer
transport layer
network layer
data link layer
physical layer
37. What command can be used to troubleshoot domain name resolution issues?
get
arp -a
tracert
nslookup
38. Refer to the exhibit. For connecting two routers with an Ethernet crossover cable, which interface should be used?
arp -a
tracert
nslookup
38. Refer to the exhibit. For connecting two routers with an Ethernet crossover cable, which interface should be used?
A
B
C
D
39. A technician is asked to secure the privileged EXEC mode of a switch by requiring a password. Which type of password would require this login and be considered the most secure?
console
enable
enable secret
VTY
40. Which three addresses belong to the category of public IP addresses? (Choose three.)
B
C
D
39. A technician is asked to secure the privileged EXEC mode of a switch by requiring a password. Which type of password would require this login and be considered the most secure?
console
enable
enable secret
VTY
40. Which three addresses belong to the category of public IP addresses? (Choose three.)
127.0.0.1
196.1.105.6
132.11.9.99
10.0.0.1
172.16.9.10
46.1.1.97
41. A network administrator is configuring several switches for a network. The switches have similar configurations and only minor differences. The administrator wants to save all commands that are issued on the first switch to a text file for editing. Which transfer option should be selected in HyperTerminal?
Correct answer is option (image) 3.
196.1.105.6
132.11.9.99
10.0.0.1
172.16.9.10
46.1.1.97
41. A network administrator is configuring several switches for a network. The switches have similar configurations and only minor differences. The administrator wants to save all commands that are issued on the first switch to a text file for editing. Which transfer option should be selected in HyperTerminal?
Correct answer is option (image) 3.
42. Which option represents a point-to-point logical topology diagram?
Correct answer is option (image) 4.
Correct answer is option (image) 4.
43. Refer to the exhibit. What two facts can be determined from the session information that is displayed? (Choose two.)
The protocol is a connection-oriented protocol.
This exchange is part of the three-way handshake.
The SYN flag is representing the initial establishment of a session.
The destination port indicates that an FTP session has been initiated.
The source port does not support communication with the destination port that is listed.
44. Which communication tool allows real-time collaboration?
wiki
e-mail
weblog
instant messaging
weblog
instant messaging
45. Which prompt is associated with the privileged exec mode?
R1>
R1#
R1(config)#
R1(config-router)#
R1>
R1#
R1(config)#
R1(config-router)#
46. What is the effect of the command copy running-config tftp?
copies the configuration from a remote machine into RAM
copies the configuration from a remote machine into NVRAM
copies the configuration currently in RAM to a remote machine
copies the configuration currently in NVRAM to a remote machine
copies the configuration from a remote machine into RAM
copies the configuration from a remote machine into NVRAM
copies the configuration currently in RAM to a remote machine
copies the configuration currently in NVRAM to a remote machine
47. Refer to the exhibit. Which type of network design is shown?
client/server
wide area
dedicated server
peer-to-peer
wide area
dedicated server
peer-to-peer
48. Refer to the exhibit. A network administrator remotely accesses the CLI of RouterB from PC1 using Telnet. Which statement is true about this connection?
The data is automatically encrypted.
A Telnet server process is running on PC1.
The connection is made through a VTY session on the router.
A GET request was sent to RouterB to retrieve data during this session.
49. Refer to the exhibit. A network technician wants to connect host A to the console of a Cisco switch to initialize the configuration. What type of cable is required for this connection?
straight-through cable
crossover cable
rollover cable
serial cable
crossover cable
rollover cable
serial cable
50. A technician makes several changes to the running configuration on a router, but the desired results are not achieved. The technician issues the reload command. What action will be taken by the router?
All changes will be lost and the router will restart immediately.
Changes will be saved automatically and the router will restart.
The user will be prompted to save changes before the router restarts.
The router will detect changes to the running configuration and will reload using the configuration stored in RAM.
Changes will be saved automatically and the router will restart.
The user will be prompted to save changes before the router restarts.
The router will detect changes to the running configuration and will reload using the configuration stored in RAM.
Set-3
1. When must a router serial interface be configured with the clock rate command?
when the interface is functioning as a DTE device
when the interface timers have been cleared
when the connected DTE device is shut down
when the interface is functioning as a DCE device
when the interface timers have been cleared
when the connected DTE device is shut down
when the interface is functioning as a DCE device
2. Due to a security violation, the router passwords must be changed. What information can be learned from the following configuration entries? (Choose two.)
Router(config)# line vty 0 3
Router(config-line)# password c13c0
Router(config-line)# login
Router(config)# line vty 0 3
Router(config-line)# password c13c0
Router(config-line)# login
The entries specify three Telnet lines for remote access.
The entries specify four Telnet lines for remote access.
The entries set the console and Telnet password to “c13c0″.
Telnet access will be denied because the Telnet configuration is incomplete.
Access will be permitted for Telnet using “c13c0″ as the password.
The entries specify four Telnet lines for remote access.
The entries set the console and Telnet password to “c13c0″.
Telnet access will be denied because the Telnet configuration is incomplete.
Access will be permitted for Telnet using “c13c0″ as the password.
3. Which of the following are the address ranges of the private IP addresses? (Choose three.)
10.0.0.0 to 10.255.255.255
200.100.50.0 to 200.100.25.255
150.150.0.0 to 150.150.255.255
172.16.0.0 to 172.31.255.255
192.168.0.0 to 192.168.255.255
127.16.0.0 to 127.31.255.255
10.0.0.0 to 10.255.255.255
200.100.50.0 to 200.100.25.255
150.150.0.0 to 150.150.255.255
172.16.0.0 to 172.31.255.255
192.168.0.0 to 192.168.255.255
127.16.0.0 to 127.31.255.255
4. Which password is automatically encrypted when it is created?
vty
aux
console
enable secret
enable password
aux
console
enable secret
enable password
5. Refer to the exhibit. A network technician is trying to determine the correct IP address configuration for Host A. What is a valid configuration for Host A?
IP address: 192.168.100.19; Subnet Mask: 255.255.255.248; Default Gateway: 192.16.1.2
IP address: 192.168.100.20; Subnet Mask: 255.255.255.240; Default Gateway: 192.168.100.17
IP address: 192.168.100.21; Subnet Mask: 255.255.255.248; Default Gateway: 192.168.100.18
IP address: 192.168.100.22; Subnet Mask: 255.255.255.240; Default Gateway: 10.1.1.5
IP address: 192.168.100.30; Subnet Mask: 255.255.255.240; Default Gateway: 192.168.1.1
IP address: 192.168.100.31; Subnet Mask: 255.255.255.240; Default Gateway: 192.168.100.18
IP address: 192.168.100.20; Subnet Mask: 255.255.255.240; Default Gateway: 192.168.100.17
IP address: 192.168.100.21; Subnet Mask: 255.255.255.248; Default Gateway: 192.168.100.18
IP address: 192.168.100.22; Subnet Mask: 255.255.255.240; Default Gateway: 10.1.1.5
IP address: 192.168.100.30; Subnet Mask: 255.255.255.240; Default Gateway: 192.168.1.1
IP address: 192.168.100.31; Subnet Mask: 255.255.255.240; Default Gateway: 192.168.100.18
6. Refer to the exhibit. What function does router RT_A need to provide to allow Internet access for hosts in this network?
address translation
DHCP services
ftpd
web server
DHCP services
ftpd
web server
7. Which prompt represents the appropriate mode used for the copy running-config startup-config command ?
Switch-6J>
Switch-6J#
Switch-6J(config)#
Switch-6J(config-if)#
Switch-6J(config-line)#
Switch-6J#
Switch-6J(config)#
Switch-6J(config-if)#
Switch-6J(config-line)#
8. Refer to the exhibit. A technician is working on a network problem that requires verification of the router LAN interface. What address should be pinged from this host to confirm that the router interface is operational?
127.0.0.1
192.168.64.196
192.168.254.1
192.168.254.9
192.168.254.254
192.168.64.196
192.168.254.1
192.168.254.9
192.168.254.254
9. Refer to the exhibit. The tracert command is initiated from PC1 to PC4. Which device will send a response to the initial tracert packet from PC1?
Athens
Ankara
London
Paris
PC4
Ankara
London
Paris
PC4
10. Which information is used by the router to determine the path between the source and destination hosts?
the host portion of the IP address
the network portion of the IP address
host default gateway address
the MAC address
the network portion of the IP address
host default gateway address
the MAC address
10. Refer to the exhibit. A PC is communicating with another PC on a remote network. The two networks are connected by three routers. Which action will help to identify the path between the hosts?
Use the ipconfig command at the host.
Use the ipconfig/all command at the destination.
Use the tracert command at the host.
Use the ping command at the destination.
Use the ipconfig/all command at the destination.
Use the tracert command at the host.
Use the ping command at the destination.
11. Refer to the exhibit. The diagram represents the process of sending e-mail between clients. Which list correctly identifies the component or protocol used at each numbered stage of the diagram?
1.MUA 2.MDA 3.MTA 4.SMTP 5.MTA 6.POP 7.MDA 8.MUA
1.MUA 2.POP 3.MDA 4.SMTP 5.MTA 6.MDA 7.SMTP 8.MUA
1.MUA 2.POP 3.SMTP 4.MDA 5.MTA 6.SMTP 7.POP 8.MUA
1.MUA 2.SMTP 3.MTA 4.SMTP 5.MTA 6.MDA 7.POP 8.MUA
1.MUA 2.POP 3.MDA 4.SMTP 5.MTA 6.MDA 7.SMTP 8.MUA
1.MUA 2.POP 3.SMTP 4.MDA 5.MTA 6.SMTP 7.POP 8.MUA
1.MUA 2.SMTP 3.MTA 4.SMTP 5.MTA 6.MDA 7.POP 8.MUA
12. Refer to the exhibit. The router of the company failed and was replaced. After the replacement, hosts C and D in the Education office are able to ping each other, but they are unable to access the hosts in the Accounts office. What is the likely cause of the problem?
The IP address at the fa0/0 interface of the router is incorrectly configured.
The subnet mask at the fa0/1 interface of the router is incorrectly entered.
The IP address at the serial interface of the router is incorrectly configured.
The hosts in the Accounts office are not on the same subnet as the hosts in the Education office.
The subnet mask at the fa0/1 interface of the router is incorrectly entered.
The IP address at the serial interface of the router is incorrectly configured.
The hosts in the Accounts office are not on the same subnet as the hosts in the Education office.
13. Refer to the exhibit. Host A and B are unable to communicate with each other. What is the reason for this?
Host A is assigned a network address.
Host B is assigned a multicast address.
Host A and host B belong to different networks.
The gateway addresses are network addresses.
Host B is assigned a multicast address.
Host A and host B belong to different networks.
The gateway addresses are network addresses.
14. Refer to the exhibit. Host B attempts to establish a TCP/IP session with host C. During this attempt, a frame was captured at the FastEthernet interface fa0/1 of the San Francisco router. The packet inside the captured frame has the source IP address 10.10.1.2, and the destination IP address is 10.31.1.20. What is the destination MAC address of the frame at the time of capture?
0060.7320.D632
0060.7320.D631
0040.8517.44C3
0009.B2E4.EE03
0010.C2B4.342
0060.7320.D631
0040.8517.44C3
0009.B2E4.EE03
0010.C2B4.342
15. Refer to the exhibit. While configuring a network, a technician wired each end of a Category 5e cable as shown. Which two statements are true about this setup? (Choose two.)
The cable is suitable for connecting a switch to a router Ethernet port.
The cable is suitable for connecting dissimilar types of devices.
The cable is unusable and must be rewired.
The cable is terminated in a way that the transmit pin is wired to the receive pin.
The cable simulates a point-to-point WAN link.
The cable is suitable for connecting dissimilar types of devices.
The cable is unusable and must be rewired.
The cable is terminated in a way that the transmit pin is wired to the receive pin.
The cable simulates a point-to-point WAN link.
16. Refer to the exhibit. Host A sends a frame with the destination MACaddress as FFFF.FFFF.FFFF. What action will the switch take for this frame?
It will drop the frame.
It will send the frame back to host A.
It will send the frame to all hosts except host A.
It will forward the frame to the default gateway.
It will send the frame back to host A.
It will send the frame to all hosts except host A.
It will forward the frame to the default gateway.
17. Well-known services and applications use which range of TCP/UDP port numbers?
0 to 255
0 to 1023
1024 to 49151
49152 to 65535
0 to 1023
1024 to 49151
49152 to 65535
18. Which three IPv4 addresses represent subnet broadcast addresses? (Choose three.)
192.168.4.63 /26
192.168.4.129 /26
192.168.4.191 /26
192.168.4.51 /27
192.168.4.95 /27
192.168.4.221 /27
192.168.4.129 /26
192.168.4.191 /26
192.168.4.51 /27
192.168.4.95 /27
192.168.4.221 /27
19. Which three statements are true about network layer addressing? (Choose three.)
The addresses are 48 bits long.
Network layer addressing is used by Ethernet switches to make forwarding decisions.
It uses a hierarchical structure.
It does not support broadcasts.
It uniquely identifies each host.
A portion of the address is used to identify the network.
Network layer addressing is used by Ethernet switches to make forwarding decisions.
It uses a hierarchical structure.
It does not support broadcasts.
It uniquely identifies each host.
A portion of the address is used to identify the network.
20. Which OSI layer addressing is required to route packets between two networks?
Layer 1
Layer 2
Layer 3
Layer 4
Layer 2
Layer 3
Layer 4
21. What type of network is maintained if a server takes no dedicated role in the network?
mainframe
client/server
peer-to-peer
centralized
client/server
peer-to-peer
centralized
22. Refer to the exhibit. Host A is requesting a web page from the web server. Which option represents the socket to which the request is made?
80
www.cisco.com
10.0.0.130
10.0.0.130:80
www.cisco.com
10.0.0.130
10.0.0.130:80
23. A routing issue has occurred in your internetwork. Which of the following type of devices should be examined to isolate this error?
access point
host
hub
router
switch
host
hub
router
switch
24. Which statement describes the correct use of addresses to deliver an e-mail message from HostB to the e-mail service that is running on ServerA?
HostB uses the MAC address of ServerA as the destination.
Router B uses a Layer 3 network address to route the packet.
Router A uses the Layer 4 address to forward the packet to Router B.
Via the use of a Layer 3 address, ServerA assigns the message to the e-mail service.
Router B uses a Layer 3 network address to route the packet.
Router A uses the Layer 4 address to forward the packet to Router B.
Via the use of a Layer 3 address, ServerA assigns the message to the e-mail service.
25. Refer to the exhibit. Host A is configured with the correct IP address for the default gateway of the router R1 FastEthernet0/1 interface. How will a packet that is sent from host A to host B be handled by the devices on the network?
R1 will drop the packet because R1 does not have a specific route in its routing table to the 10.1.1.0/24 network.
R1 will forward the packet to its default gateway, the next hop router R2. R2 will forward the packet to the directly connected network 10.1.1.0/24.
R1 will forward the packet to its default gateway, the next hop router R2. R2 will drop the packet because it does not have a default route to network 10.1.1.0/24.
R1 will forward the packet to its default gateway, the next hop router R2. R2 will drop the packet because it does not have a route that is learned by a routing protocol to network 10.1.1.0/24.
R1 will forward the packet to its default gateway, the next hop router R2. R2 will forward the packet to the directly connected network 10.1.1.0/24.
R1 will forward the packet to its default gateway, the next hop router R2. R2 will drop the packet because it does not have a default route to network 10.1.1.0/24.
R1 will forward the packet to its default gateway, the next hop router R2. R2 will drop the packet because it does not have a route that is learned by a routing protocol to network 10.1.1.0/24.
26. Which option correctly identifies the interface or interfaces used to connect the router to a CSU/DSU for WAN connectivity?
This correct answer is image 4 ( last image ).
27. Refer to the exhibit. Host A is unable to reach host B on the remote network. A technician attempted to ping the local gateway and the ping was successful. To verify the host configuration, the technician issued the ipconfig command. What is the likely cause of the problem?
The local NIC is incorrectly configured.
The subnet mask on host A is incorrectly configured.
The IP address on host A is incorrectly configured.
The default gateway on host A is incorrectly configured.
The subnet mask on host A is incorrectly configured.
The IP address on host A is incorrectly configured.
The default gateway on host A is incorrectly configured.
28. A network administrator is configuring several switches for a network. The switches have similar configurations and only minor differences. The administrator wants to save all commands that are issued on the first switch to a text file for editing. Which transfer option should be selected in HyperTerminal?
Correct answer is image tree (3).
29. How many host addresses may be assigned when using the 128.107.0.0 network address with a subnet mask of 255.255.248.0?
30
256
2046
2048
4094
4096
256
2046
2048
4094
4096
30. Which application layer protocol allows administrators to log into a server from remote locations and control a server as though logged in locally?
DNS
FTP
DHCP
SMTP
Telnet
FTP
DHCP
SMTP
Telnet
31. During the encapsulation process, what is the PDU of the internet layer?
bit
data
frame
packet
segment
data
frame
packet
segment
32. Which service is used when the nslookup command is issued on a computer?
FTP
DNS
DHCP
Telnet
DNS
DHCP
Telnet
33. Refer to the exhibit. A network technician creates equal-sized subnets of network 192.168.2.0/24 using the subnet mask 255.255.255.224. If the technician wishes to calculate the number of host addresses in each subnet by using the formula that is shown in the exhibit, what value will be used for n?
1
2
3
4
5
2
3
4
5
34. What are the default terminal emulation software settings when configuring a Cisco device through a console port?
Bits per second: 19200
Data bits: 7
Parity: None
Stop bits: 0
Flow control: None
Data bits: 7
Parity: None
Stop bits: 0
Flow control: None
Bits per second: 9600
Data bits: 8
Parity: None
Stop bits: 1
Flow control: None
Data bits: 8
Parity: None
Stop bits: 1
Flow control: None
Bits per second: 19200
Data bits: 7
Parity: None
Stop bits: 0
Flow control: Hardware
Data bits: 7
Parity: None
Stop bits: 0
Flow control: Hardware
Bits per second: 9600
Data bits: 8
Parity: None
Stop bits: 1
Flow control: Hardware
Data bits: 8
Parity: None
Stop bits: 1
Flow control: Hardware
35. In a packet-switched data network, what is used to reassemble the packets in the correct order at the destination device?
source address
sequence number
priority assignment
destination address
sequence number
priority assignment
destination address
36. Refer to the exhibit. A network administrator tries to test the connectivity between routers R1 and R2, but the attempt to ping is unsuccessful. Based on the show ip interface brief command outputs, what could be the possible cause of the problem?
Interface S0/0/0 on router R1 is shut down.
Interface S0/0/0 on router R1 is configured with an incorrect IP address.
Interface S0/0/0 on router R2 is administratively down.
Interface S0/0/0 on router R2 does not have the clock rate settings configured.
Interface S0/0/0 on router R1 is configured with an incorrect IP address.
Interface S0/0/0 on router R2 is administratively down.
Interface S0/0/0 on router R2 does not have the clock rate settings configured.
37. Which router configuration mode will require user authentication if an administrator issues the enable secret command?
user executive mode
privileged executive mode
global configuration mode
service specific configuration mode
privileged executive mode
global configuration mode
service specific configuration mode
38. Which location of router memory is cleared with the erase startup-config command?
flash
RAM
ROM
NVRAM
RAM
ROM
NVRAM
39. Which subnet mask should be used for a Class B network that is divided into subnets and will accommodate between 800 hosts and 1000 hosts?
255.255.255.0
255.255.254.0
255.255.252.0
255.255.248.0
255.255.240.0
255.255.254.0
255.255.252.0
255.255.248.0
255.255.240.0
40. Which two programs can be used to accomplish terminal emulation for configuring a router from the CLI through the console port? (Choose two.)
HyperTerminal
Internet Explorer
Minicom
Secure Shell
Telnet
Internet Explorer
Minicom
Secure Shell
Telnet
41. Refer to the exhibit. The network containing router B is experiencing problems. A network associate has isolated the issue in this network to router B. What action can be preformed to correct the network issue?
issue the clock rate command on interface Serial 0/0/0
issue the description command on interface Serial 0/0/1
issue the ip address command on interface FastEthernet 0/0
issue the no shutdown command on interface FastEthernet 0/1
issue the description command on interface Serial 0/0/1
issue the ip address command on interface FastEthernet 0/0
issue the no shutdown command on interface FastEthernet 0/1
42. Refer to the exhibit. A web browser running on host PC1 sends a request for a web page to the web server with an IP address 192.168.1.254/24. What sequence of steps will follow in order to establish the session before data can be exchanged?
The session will be initiated using UDP. No additional acknowledgment will be required to establish the session.
The session will be initiated using TCP. No additional acknowledgment will be required to establish the session.
The session will be initiated using UDP. The returned web page will serve as an acknowledgment for session establishment.
The session will be initiated using TCP. A three-way handshake must be successfully completed before the session is established.
The session will be initiated using TCP. No additional acknowledgment will be required to establish the session.
The session will be initiated using UDP. The returned web page will serve as an acknowledgment for session establishment.
The session will be initiated using TCP. A three-way handshake must be successfully completed before the session is established.
43. Which prompt is associated with the privileged exec mode?
R1>
R1#
R1(config)#
R1(config-router)#
R1>
R1#
R1(config)#
R1(config-router)#
44. A user sees the command prompt: Router(config-if)# . What task can be performed at this mode?
Reload the device.
Perform basic tests.
Configure individual interfaces.
Configure individual terminal lines.
Reload the device.
Perform basic tests.
Configure individual interfaces.
Configure individual terminal lines.
45. Refer to the exhibit. Interface Fa0/0 on router A is generating excessive broadcast traffic. Which LAN segments will affected by the excessive broadcasts?
Only the 192.168.1.200/30 network will be affected.
Only the link between 192.168.1.201 and port Fa0/5 on SW1 will be affected.
Both the 192.168.1.200/30 and 192.168.1.204/30 networks will be affected.
Only the links between 192.168.1.201 and port Fa0/7 on SW2 will be affected.
Only the link between 192.168.1.201 and port Fa0/5 on SW1 will be affected.
Both the 192.168.1.200/30 and 192.168.1.204/30 networks will be affected.
Only the links between 192.168.1.201 and port Fa0/7 on SW2 will be affected.
46. What is the effect of using the Router# copy running-config startup-config command on a router?
The contents of ROM will change.
The contents of RAM will change.
The contents of NVRAM will change.
The contents of flash will change.
The contents of RAM will change.
The contents of NVRAM will change.
The contents of flash will change.
47. Which option represents a point-to-point logical topology diagram?
The correct answer is last image.
The correct answer is last image.
48. In a network design project, a network designer needs to select a device to provide collision free connections to 40 hosts on the LAN. Which device should be selected?
hub
router
switch
firewall
router
switch
firewall
49. Which communication tool allows real-time collaboration?
wiki
e-mail
weblog
instant messaging
weblog
instant messaging
Set-4
Shihab ki Kobor exam er...
ReplyDeletephn dis.
Hi is this exam for 5th dec??
ReplyDeletecan anyone confirm these questions are still valid as of december 2012?
ReplyDeleteI'll have me final today, so I'll confirm it later
ReplyDeletewas thsi valid as of dec, 2012?
ReplyDeleteI just took the test today, about 35 questions are from these examples. Got around 80%. So brace yourself when you write it...
ReplyDelete^thanks, you're a life saver.
ReplyDeleteIs it for today too?
ReplyDeleteAnyone to confirm are they still valid?
ReplyDeleteare these still valid?
ReplyDeletei take exam today and this questions still work
ReplyDeletevai help korun ccna 1 expolartion4 exam 26 date ekon ki korte pari.
ReplyDeleteit is very helpful
ReplyDeleteI think, that in second example- 40. question is wrong...
ReplyDeleteI think, that a successful answers are:
196.1.105.6
172.16.9.10
10.0.0.1
Nothing from this:
132.11.9.99
127.0.0.1
46.1.1.97
Excuse my english, I'm from other country...
no you're wrong.. the answers that were stated above were correct
Delete172.16.9.10 -private (wrong)
10.0.0.1 - private (wrong)
196.1.105.6 is one of you're correct answer
the other two correct answers are:
132.11.9.99
46.1.1.97
tomorrow i will have my CCNA 1 exam, if the questions will be the same as here then i will tell you guys.
ReplyDeleteis it still the same as this? i'll have my exam tommorow. pls help
Deleteand you have taken the test))? is it still the same as this?
Deleteplease till how it was ?
DeleteAre these questions still valid?
ReplyDeletei got a re exam of ccna 1 final exam are those questions also in the re exam?
ReplyDeleteAre the same questions for this month?
ReplyDeleteI will have final exam cisco CCNA 1 on 27th, are these questions valid ?
ReplyDeleteThis comment has been removed by the author.
ReplyDeleteare these questions still valid?
ReplyDeleteonly a handful of these questions really come back on the test but make sure you guys finish up before June 30,2013 because Cisco is moving to net space where the exams will be a lot harder.
ReplyDeleteare these still valid ?
ReplyDeleteAre these questions valid for July tests??
ReplyDelete70 to 80% of the questions are the same. I did 88%, most wrong answers I had was at the new questions.
ReplyDeletejust finished the exam today and failed it. None of the questions above was in the exam
ReplyDeleteTHANK U. I LIKE IT
ReplyDeletehey
ReplyDeletehelo
ReplyDeleteIs this still valid for now? ty in advance
ReplyDeleteWrote CCNA 1 final exam today. 80% of the questions were from set 2 and set 3 questions. I managed to score 84%
ReplyDeleteI take the exam in January so did someone take the exam lately so can you pelase tell me are these questions still work (Decembar 2013)
ReplyDeleteThanks
Hi I've got the exam this month (January 2014) .... Can some one please let me know wether the questions are still valid..
ReplyDeleteThanks
yeah did my exam today, i had 82%, thanks a lot :D
ReplyDeleteThis comment has been removed by the author.
ReplyDeleteI need some help regarding CCNA 1 exam through Packet tracer
ReplyDeleteMax Points: 104
ReplyDeleteEarned Points: 93
Percentage: 89.4%
Domain Knowledge - Binary Score
Max Points: 50
Earned Points: 43
Percentage: 86.0%
Thank you so much.
ReplyDeleteI think I need more practice.
ReplyDeleteCCNA.CCNA SECURITY & CCNP ONLINE TRAINING & DISCOUNT VOUCHERS AVAILIBLE. CERTINLESS@GMAIL.COM
ReplyDeleteSKYPE:CERTCRY
Is this still valid for now?
ReplyDeleteare this questions still valid now?
ReplyDelete70 a 80% sim
ReplyDeleteBayInfotech partners with Cisco online for providing the learning services and enhancing
ReplyDeleteyour experience with Cisco Certification and Product training. We have a team of
extolled Cisco Certified System Instructors with profound industry experience delivering
highest quality training.
thnks i really appreciate this
ReplyDelete"http://www.studentwhiz.com/Online-Classes/MKT-421/FINAL/63/98/" title="MKT 421 Final" rel="dofollow">MKT 421 Final Exam
Cisco training by smart mind online training has created the certification process to give administrators a set of skills and to equip prospective employers with a way to measure skills or match certain criteria. Becoming a Cisco Certified can be a crucial step of a successful journey toward a new, highly rewarding and sustainable career. In example, the CCNA program was created to provide a solid introduction not only to the Cisco Internetwork Operating System (IOS) and Cisco ccna online training hardware, but also to internetworking in general, making it helpful to you in areas that are not exclusively Cisco's. During the years the Cisco ccna online training
ReplyDeletecertification evolve and now there are lowest levels of certification but the CCNA level is the first important and well recognizable step. Currently there are eight different tracks in the Associate level based on the different technologies. However, the CCNA Routing and Switching is still the most valuable and it is a prerequisite if you would like to specialize in Voice
www.smartmindonlinetraining.com/cisco-ccna-online-training/
The CertBlaster practice test helps you get ready for preparing for your certification exam, this is robust and complete practice test offering. Click Here to check out our various IT certification exams.
ReplyDeleteThanks for nice information, regards Cisco Training Courses and Certifications
ReplyDeleteIt was very nice article and it is very useful to
ReplyDeleteCCNA learners.We also provide CCNA online training
This comment has been removed by the author.
ReplyDeleteThank You Dear Admin!
ReplyDeleteYour site is really useful. I have found some new information from your blog. I really Appreciate your help.
I have found some other site also for CCNA help. Student can also be helped form cisco online course
All the best!
Thank a lot for sharing the same. This is apparently an important and helpful post.
ReplyDeleteCISCO Store - Computer Enhancements NZ Ltd
Thanks for great post,Hub4Tech.com is provied CCNA Tutorial & CCNA Syllabus.CCNA Route & Switch Syllabus is Operation of IP Data Networks,LAN Switching Technologies,IP addressing (IPv4 /IPv6),IP Routing Technologies,IP Services,Network Device,Security,WAN Technologies.CCNA Online Test Paper.
ReplyDeleteGood set..
ReplyDeleteCCNP Interview Questions
CCNA Interview Questions
I am very interested for this post.Its very useful for me.Keep it up
ReplyDeleteccna training in mumbai
Great post..Thank you so much.
ReplyDeleteI would like to share some useful links for CCNA Interview Questions, CCNP Interview Questions and CCNA Tutorial.
Your services are too good but i am looking for CCNA jobs London
ReplyDeleteServices....
Have you any service about CCNA jobs London
This comment has been removed by the author.
ReplyDeleteTruly a very good article on how to handle the future technology. After reading your post,thanks for taking the time to discuss this, I feel happy about and I love learning more about this topic. Torusinfotech is one of the best seo company in delhi and low cost SEO service providers. Our low cost SEO service is a great way to start with our service and experience the change in your business...SEO Training Institute in Delhi
ReplyDeleteThank you a lot for providing individuals with a very spectacular possibility to read critical reviews from this site.
ReplyDeleteClick here:
python training in marathahalli
Click here:
python training in btm
It is amazing and wonderful to visit your site.Thanks for sharing this information,this is useful to me...
ReplyDeleteBlueprism online training
Blue Prism Training in Pune
Blueprism training in tambaram
Blueprism training in annanagar
This is most informative and also this post most user friendly and super navigation to all posts... Thank you so much for giving this information to me..
ReplyDeleteDevops Training in Chennai
Devops Training in Bangalore
Thanks for your informative article, Your post helped me to understand the future and career prospects & Keep on updating your blog with such awesome article.
ReplyDeleteData Science Course in Indira nagar
Data Science Course in Electronic city
Python course in Kalyan nagar
Data Science course in Indira nagar
This is most informative and also this post most user friendly and super navigation to all posts... Thank you so much for giving this information to me..
ReplyDeletejava training in chennai | java training in USA
java training in indira nagar
Wonderful bloggers like yourself who would positively reply encouraged me to be more open and engaging in commenting.So know it's helpful.
ReplyDeleteangularjs online Training
angularjs Training in marathahalli
angularjs interview questions and answers
angularjs Training in bangalore
angularjs Training in bangalore
angularjs Training in chennai
Hello! This is my first visit to your blog! We are a team of volunteers and starting a new initiative in a community in the same niche. Your blog provided us useful information to work on. You have done an outstanding job.
ReplyDeleteAWS Training in Bangalore |Best AWS Training Institute in BTM ,Marathahalli
AWS Training in Rajaji Nagar | Amazon Web Services Training in Rajaji Nagar
Best AWS Training Institute in BTM Layout Bangalore ,AWS Coursesin BTM
Best AWS Training in Marathahalli | AWS Training in Marathahalli
This is my 1st visit to your web... But I'm so impressed with your content. Good Job!
ReplyDeleteangularjs online training
apache spark online training
informatica mdm online training
devops online training
aws online training
And indeed, I’m just always astounded concerning the remarkable things served by you. Some four facts on this page are undeniably the most effective I’ve had.
ReplyDeleteSLAJOBS REVIEWS AND COMPLAINTS
slajobs reviews and complaints
slajobs reviews and complaints
slajobs reviews and complaints
slajobs reviews and complaints
slajobs reviews and complaints
slajobs reviews and complaints
Smm panel
ReplyDeleteSmm panel
iş ilanları
İnstagram Takipçi Satın Al
hirdavatciburada.com
beyazesyateknikservisi.com.tr
servis
TİKTOK HİLE
Good content. You write beautiful things.
ReplyDeletetaksi
mrbahis
hacklink
vbet
mrbahis
sportsbet
hacklink
sportsbet
korsan taksi
Success Write content success. Thanks.
ReplyDeletecanlı slot siteleri
canlı poker siteleri
kralbet
betturkey
deneme bonusu
kıbrıs bahis siteleri
betmatik
salt likit
ReplyDeletesalt likit
dr mood likit
big boss likit
dl likit
dark likit
2M2
Muğla
ReplyDeleteSamsun
Eskişehir
Sakarya
Kars
7İC4
amasya
ReplyDeletesinop
çorum
sakarya
van
QULTNJ
görüntülü show
ReplyDeleteücretlishow
GWGO
görüntülü.show
ReplyDeletewhatsapp ücretli show
QKN0AF
ankara parça eşya taşıma
ReplyDeletetakipçi satın al
antalya rent a car
antalya rent a car
ankara parça eşya taşıma
07YH
Çorlu Lojistik
ReplyDeleteManisa Lojistik
Eskişehir Lojistik
Afyon Lojistik
Konya Lojistik
337L
istanbul evden eve nakliyat
ReplyDeletebalıkesir evden eve nakliyat
şırnak evden eve nakliyat
kocaeli evden eve nakliyat
bayburt evden eve nakliyat
E1U
muş evden eve nakliyat
ReplyDeleteçanakkale evden eve nakliyat
uşak evden eve nakliyat
ardahan evden eve nakliyat
eskişehir evden eve nakliyat
34XBT
hatay evden eve nakliyat
ReplyDeleteısparta evden eve nakliyat
erzincan evden eve nakliyat
muğla evden eve nakliyat
karaman evden eve nakliyat
WBY
urfa evden eve nakliyat
ReplyDeletemalatya evden eve nakliyat
burdur evden eve nakliyat
kırıkkale evden eve nakliyat
kars evden eve nakliyat
HD4G
düzce evden eve nakliyat
ReplyDeletedenizli evden eve nakliyat
kırşehir evden eve nakliyat
çorum evden eve nakliyat
afyon evden eve nakliyat
RDR
BE235
ReplyDeleteKilis Evden Eve Nakliyat
Afyon Evden Eve Nakliyat
Tekirdağ Parke Ustası
Kastamonu Evden Eve Nakliyat
Çerkezköy Boya Ustası
AF192
ReplyDeleteTekirdağ Cam Balkon
Batman Evden Eve Nakliyat
Nevşehir Evden Eve Nakliyat
Siirt Evden Eve Nakliyat
Çankırı Evden Eve Nakliyat
ADE4A
ReplyDeleteGölbaşı Fayans Ustası
Niğde Evden Eve Nakliyat
Muğla Şehirler Arası Nakliyat
Hexa Coin Hangi Borsada
Çerkezköy Organizasyon
Şırnak Lojistik
Hatay Lojistik
Çerkezköy Evden Eve Nakliyat
Raca Coin Hangi Borsada
942C7
ReplyDeleteBatman Evden Eve Nakliyat
İstanbul Parça Eşya Taşıma
Bilecik Şehir İçi Nakliyat
Ünye Televizyon Tamircisi
Eryaman Boya Ustası
Keçiören Parke Ustası
Ordu Şehir İçi Nakliyat
Referans Kimliği Nedir
Ankara Fayans Ustası
66176
ReplyDeleteVan Evden Eve Nakliyat
Eskişehir Evden Eve Nakliyat
Keçiören Fayans Ustası
Samsun Şehirler Arası Nakliyat
Tunceli Lojistik
Etimesgut Fayans Ustası
Ünye Televizyon Tamircisi
Gölbaşı Parke Ustası
Çerkezköy Asma Tavan
DD029
ReplyDeleteÇerkezköy Çilingir
Kocaeli Lojistik
Trabzon Parça Eşya Taşıma
Çerkezköy Petek Temizleme
Uşak Şehir İçi Nakliyat
Ordu Şehirler Arası Nakliyat
Arg Coin Hangi Borsada
Tekirdağ Parke Ustası
Bartın Şehirler Arası Nakliyat
F83DA
ReplyDeleteIğdır Şehirler Arası Nakliyat
Ünye Oto Elektrik
Erzincan Parça Eşya Taşıma
Ordu Evden Eve Nakliyat
Karapürçek Boya Ustası
Kars Evden Eve Nakliyat
Bilecik Parça Eşya Taşıma
Giresun Şehirler Arası Nakliyat
Etlik Fayans Ustası
310A2
ReplyDeleteTekirdağ Evden Eve Nakliyat
Kucoin Güvenilir mi
Çerkezköy Çatı Ustası
Binance Güvenilir mi
Batıkent Boya Ustası
Ünye Organizasyon
Ankara Fayans Ustası
Vindax Güvenilir mi
Malatya Evden Eve Nakliyat
66BEA
ReplyDeleteReferans Kimliği Nedir
Ünye Oto Elektrik
Mexc Güvenilir mi
Ankara Evden Eve Nakliyat
Çerkezköy Çatı Ustası
Mardin Evden Eve Nakliyat
Silivri Boya Ustası
Çerkezköy Marangoz
Ardahan Evden Eve Nakliyat
37FA2
ReplyDeleteresimli Magnet
D6F7C
ReplyDeletereferans kimliği nedir
resimli magnet
binance referans kodu
binance referans kodu
resimli magnet
resimli magnet
binance referans kodu
referans kimliği nedir
binance referans kodu
A1907
ReplyDeletesightcare
8B82D
ReplyDeleteSiirt Ucretsiz Sohbet
telefonda canlı sohbet
parasız görüntülü sohbet uygulamaları
sesli mobil sohbet
eskişehir sesli sohbet sitesi
kadınlarla görüntülü sohbet
sinop kızlarla canlı sohbet
trabzon sesli sohbet odası
karaman nanytoo sohbet
CA9E1
ReplyDeleteAlya Coin Hangi Borsada
Parasız Görüntülü Sohbet
Luffy Coin Hangi Borsada
Görüntülü Sohbet
Kripto Para Üretme Siteleri
Binance Hangi Ülkenin
Lunc Coin Hangi Borsada
Telegram Görüntüleme Satın Al
Periscope Takipçi Satın Al
13DB3
ReplyDeleteClubhouse Takipçi Hilesi
Bitcoin Üretme Siteleri
Coin Nedir
Facebook Beğeni Satın Al
Kripto Para Kazma Siteleri
Tiktok İzlenme Satın Al
Bitcoin Para Kazanma
Ort Coin Hangi Borsada
Bone Coin Hangi Borsada
شركة مكافحة حشرات بالهفوف kevsrdgWDT
ReplyDeleteشركة تنظيف بالدمام PrL3xRsYZh
ReplyDeleteشركة مكافحة بق الفراش بالجبيل Dpcq8wBn3r
ReplyDelete