Custom Search

Monday 8 June 2009

CCNA 1 Module Final Exam Answers(A) Version 3.1

CCNA 1 Module Final Exam Answers(A) Version 3.1
1. Which of the following OSI layers offers reliable, connection-oriented data communication services?
• application
• presentation
• session
• transport
• network

2. Router interface Ethernet 0 has been assigned the IP address 10.172.192.168 255.255.255.240. What is the network IP address of this interface?
• 10.0.0.0
• 10.172.0.0
• 10.172.192.0
• 10.172.192.160
• 10.172.192.168
• 10.172.192.175

3. Examine the graphic with current configurations. The New York Offices of ABC Company recently upgraded the computers in the administrative office. Shortly after the upgrade, Host A in the clerical office failed and was replaced with one of the retired administrative office computers. However, the computer can not access the company network in the new location. What is the likely cause of this network access issue for Host A?
• MAC address incorrectly entered
• default gateway incorrectly entered
• subnet mask incorrectly entered
• IP address incorrectly entered

4. Which of the following increases the potential for a collision to occur?
• the use of an active hub instead of an intelligent hub
• the use of an intelligent hub instead of an active hub
• a reduction in the number of devices attached to the hub
• an increase in the number of devices attached to the hub •

5. What is attenuation?
• opposition to the flow of current
• measurement of electrical signals relative to time
• degradation of a signal as it travels along the medium
• amount or volume of traffic that is flowing on the medium

6. Two peer hosts are running applications that exchange data using UDP. During the current session, a datagram fails to arrive at the destination. What is true concerning the retransmission of the datagram?
• Datagram retransmission occurs when the retransmission timer expires in the source host.
• Datagram retransmission occurs when the retransmission timer expires in the destination host.
• Datagram retransmission is controlled by the application layer protocol.
• Datagram retransmission involves only the data with sequence numbers equal to or higher than the sequence number of the current datagram.

7. What is significant about the ping 127.0.0.1 command?
• It verifies the operation of the TCP/IP protocol stack on a host and is called an internal loopback test.
• It verifies connection to the remote host with the IP address 127.0.0.1.
• It verifies whether the router that connects the local network to other networks can be reached.
• It verifies the route packets take between the local host and the host with the IP address 127.0.0.1.

8. Which LAN switching mode has the highest latency?
• fast forward
• fragment-free
• latency forwarding
• store-and-forward

9. Which of the following application layer protocols use UDP segments? (Choose two.)
• DNS
• FTP
• Telnet
• TFTP
• SMTP

10. Which cable specifications are indicated by 100BASE-T?
• 100-Mbps transmission speed, baseband signal, coaxial cable
• 100-Mbps transmission speed, broadband signal, twisted-pair cable
• 100-Mbps transmission speed, baseband signal, twisted-pair cable
• Equal to 10-Gbps transmission speed, baseband signal, twisted-pair cable

11. When is a crossover cable used in a network?
• when connecting a host to the router console port
• when connecting a host to a switch
• when connecting a host to a host
• when connecting a switch to a router

12. Refer to the graphic. What must be configured on Host A to allow it communicate with the e-mail server? (Choose three.)
• IP address •
• subnet mask •
• default gateway •
• router name
• switch name
• NetBIOS name address

13. Which cable diagram displays the end to end pinout for a crossover cable used with Cisco devices?
• Cable A
• Cable B
• Cable C
• Cable D

14. Which type of address is 192.168.17.134/29?
• host address
• network address
• broadcast address
• multicast address

15. How many collision domains are shown in the diagram?
• three
• four
• five
• six
• seven
• eight

16. When is a straight-through cable used in a network?
• when connecting a router through the console port
• when connecting one switch to another switch
• when connecting a host to a switch
• when connecting a router to another router

17. How does network cable length affect attenuation?
• Category 5 cable that is run in metal conduit has the highest attenuation in the shortest distance.
• Shorter cable lengths have greater signal attenuation.
• Longer cable lengths have greater signal attenuation.
• The length of the cable has no effect on signal attenuation.

18. Which of the following statements are correct about CSMA/CD? (Choose three.)
• It is a media access method used in LANs. •
• It is a media access method used in FDDI WANs.
• When a device needs to transmit, it checks to see if the media is available. •
• A device sends data without checking media availability because all devices have equal access.
• Multiple devices can successfully transmit simultaneously.
• Only one device can successfully transmit at a time.

19. Which of the following must be present for current to flow? (Choose three.)
• closed loop
• bit-generating device
• insulating material
• source of voltage
• load
• switch

20. If Host A pings Host B through a newly installed switch with no entries in the MAC address table, which stations will receive the ping packet?
• B only
• A and B
• B and switch
• A, B, and switch
• B, C, D, and switch •
• A, B, C, D, and switch

21. Which devices shown in the graphic must have a MAC address?
• only PC
• only router
• PC and router
• PC, hub, and router
• PC, printer, and router

22. What kind of connection is represented in the graphic?
• console connection
• Ethernet connection
• ISDN connection
• leased line connection

23. Which of the following is the decimal representation of the binary number 11010011?
• 203
• 204
• 211
• 212

24. Which type of cable is required to make a connection between a router console port and a PC COM port?
• straight-through cable
• crossover cable
• rollover cable
• DB-9 cable
• coaxial cable

25. Determine the number of useable networks and hosts for the IP address 192.168.50.0/27
• 4 networks / 62 hosts
• 6 networks / 64 hosts
• 32 networks / 8 hosts
• 6 networks / 30 hosts
• 8 networks / 32 hosts
• 2 networks / 8 hosts

26. A network administrator is placing an older router back in to service. The administrator discovered that the IOS and configuration files need to be updated to meet the LAN specifications. Which application layer protocol is used to transfer the new configuration files into the router memory?
• SNMP
• SMTP
• HTTP
• TFTP

27. Which of the following best describes Spanning Tree Protocol?
• It enables a network to span across multiple physical segments.
• It enables a switch to eliminate switching loops.
• It enables a switch to dynamically choose the best switch mode.
• It enables a switch to perform as a router.

28. Which of the following subnet masks could be used when subnetting a Class B IP address? (Choose two.)
• 255.0.0.0
• 255.255.0.0
• 255.192.255.0
• 255.224.0.0
• 255.255.252.0
• 255.255.255.128

29. How is data encapsulated as it is moved down the OSI model?
• data, segments, frames, packets, bits
• data, packets, segments, frames, bits
• data, segments, packets, frames, bits
• data, packets, frames, segments, bits

30. Which of the following describes latency?
• the noise generated from outside a cable
• the degradation of a signal as it travels along the media
• the time required for a NIC to place a frame on the network media
• the delay between the time a frame leaves its source device and reaches its destination

31. Which of the following is the binary representation of the decimal number 111?
• 01101111
• 01111101
• 11110111
• 11101101

32. Which LAN switching mode begins switching after reading only the first 64 bytes of the frame?
• fast forward
• fragment-free
• latency forwarding
• store-and-forward

33. When using Category 5 UTP cable, which RJ-45 pin pairs are used to exchange data between hosts on an Ethernet network?
• 1 and 2; 4 and 5
• 1 and 2; 3 and 6 •
• 3 and 6; 7 and 8
• 4 and 5; 7 and 8

34. Which of the following commands could be used on a Windows-based computer to view the current IP configuration of the system? (Choose two.)
• configip
• ifconfig
• ipconfig
• winipcfg
• winipconfig

35. Which type of address is 192.168.17.111/28?
• host address
• network address
• broadcast address
• multicast address

36. Which of the following networking devices increase the number of collision domains? (Choose three.)
• switch
• hub
• router
repeater
• bridge

37. What information can be determined from the MAC addresses of PC1, PC2, and PC3, as shown in the graphic? (Choose two.)
• PC1 and PC2 NICs need to be replaced because they have the same OUI identifier.
• PC2 and PC3 NICs need to be replaced because they have different OUI identifiers.
• PC1 and PC2 NICs are from the same vendor.
• PC1 and PC3 NICs need to be replaced because they have the same vendor-assigned address.
• PC2 and PC3 NICs are from different vendors.
• PC2 and PC3 NICs are from the same vendor.

38. Which of the following are considered WAN technologies? (Choose two.)
• DSL
• Ethernet
• Wireless Ethernet
• T1-Carrier
• Token Ring

39. which one of the router connectors shown in the graphic would be used for a LAN connection?
• Connector A
• Connector B
• Connector C
• Connector D

40. How is full-duplex capability typically achieved in fiber-optic cable?
• Two fibers are encased in separate sheaths.
• Light is bounced at different rates in opposite directions.
• Transmit speeds are so high that half-duplex is acceptable.
• Colors of the light spectrum are separated into transmit and receive streams.

41. Which of the following are characteristics of IP? (Choose three.)
• connection-oriented protocol
• connectionless protocol•
• reliable protocol
• unreliable protocol •
• routed protocol •
• routing protocol

42. Which of the following describe the token-passing logical topology? (Choose two.)
• FDDI is an example of a token-passing network.
• Token-passing logical topologies must also be physical ring topologies.
• One of the disadvantages of the token-passing logical topology is the high collision rate.
• Computers transmit data after "listening" to the wire to detect other traffic.
• Computers are allowed to transmit data only when they possess a token.

43. What is the maximum length of a media segment used for 100BASE-TX?
• 100 meters
• 185 meters
• 400 meters
• 500 meters

44. which of the following networking devices divide a network into separate collision domains? (Choose two.)
• repeater
• bridge
• switch
• AUI
• hub

45. Which of the following are characteristics of UTP cable? (Choose three.)
• Each wire is covered by insulating material.
• It is not affected by EMI or RFI.
• It is a four-pair wire medium.•
• It is difficult to terminate the cable.
• It relies on the cancellation effect produced by the twisted wire pairs.
• It is more expensive than any other type of LAN cabling.

46. Examine the graphic with current configurations. Host A in the Clerical offices failed and was replaced. Although a ping to 127.0.0.1 was successful, the replacement computer can not access the company network. What is the likely cause of the problem?
IP address incorrectly entered
network cables unplugged
• subnet mask incorrectly entered
network card failure

47. Which of the following describes a physical full-mesh topology?
• It requires termination at both ends of the cable.
• It uses a hub or a switch as a central point to connect all wires.
• It provides maximum connectivity between all network systems.
• It links all computers to a main computer that controls all traffic on the network.

48. Which two statements describe the TFTP protocol? (Choose two.)
• uses authenticated file transfer procedure
• provides connection-oriented service
• provides connectionless service
• provides more features that FTP
• lacks most of the features of FTP

49. Which of the following are transport layer protocols of the TCP/IP model? (Choose two.)
• FTP
• UDP
• SMTP
• TFTP
• TCP

50. Which type of UTP network cable connects two Cisco switches?
• straight-through
• crossover
• rollover
• patch

51. How will the MAIN router dynamically learn a route to the 10.16.10.48/28 subnetwork in the diagram?
• with a routed protocol
• with a routing protocol
• with a static route
• with a directly connected route

52. Which of the following describes the RIP version 1 routing protocol?
• Cisco proprietary hybrid protocol
• distance vector protocol that uses hop count as the only metric •
• link state protocol supporting multiple routed protocols
• distance vector protocol that uses delay, bandwidth, load, and reliability metrics

53. How many broadcast domains are shown in the diagram?
• three
• four
• five
• six
• seven
• eight

54. Which of the following are advantages of UTP cable? (Choose three.)
• less expensive than fiber optic
• flexible and easy to run in a building
• distance between signal boosts is longer than it is for coaxial
• transmits data at a faster rate than any copper-based media
• receives less RMF and EMI interference than other types

Which of the following devices extend a collision domain? (choose 2)
• -hub
• -repeater

0 comments:

Post a Comment

Comment Here

More Post