CCNA Exploration 1: Network Fundamentals v4.0 - Final Exam Answers - Full - 2013-2014
CCNA Exploration 1: Network Fundamentals v4.0 - Final Exam Answers - Full - 2013-2014
CCNA Exploration 1: Network Fundamentals v4.0 - Final Exam Answers - Full - 2013-2014
0 - Final
Exam Answers Full - 2013-2014
Posted by hai truong | at 7:55 PM 41 comments
1. Which of the following are the address ranges of the private IP addresses? (Choose three.)
10.0.0.0 to 10.255.255.255
200.100.50.0 to 200.100.25.255
150.150.0.0 to 150.150.255.255
172.16.0.0 to 172.31.255.255
192.168.0.0 to 192.168.255.255
127.16.0.0 to 127.31.255.255
2. Which two functions of the OSI model occur at layer two? (Choose two.)
physical addressing
encoding
routing
cabling
3.
Refer to the exhibit. What function does router RT_A need to provide to allow Internet access for hosts in
this network?
address translation
DHCP services
ftpd
web server
prevent broadcasts
heirarchical
48 bits in length
5.
Refer to the exhibit. Host A attempts to establish a TCP/IP session with host C. During this attempt, a frame
was captured with the source MAC address 0050.7320.D632 and the destination MAC address
0030.8517.44C4. The packet inside the captured frame has an IP source address 192.168.7.5, and the
destination IP address is 192.168.219.24. At which point in the network was this packet captured?
leaving host A
leaving ATL
leaving Dallas
leaving NYC
6.
Refer to the exhibit. Assume all devices are using default configurations. How many subnets are required to address
7. A technician is asked to secure the privileged EXEC mode of a switch by requiring a password. Which type
of password would require this login and be considered the most secure?
console
enable
enable secret
VTY
8.
Refer to the exhibit. A technician is working on a network problem that requires verification of the router LAN
interface. What address should be pinged from this host to confirm that the router interface is operational?
127.0.0.1
192.168.64.196
192.168.254.1
192.168.254.9
192.168.254.254
9. Which OSI layer does IP rely on to determine whether packets have been lost and to request
retransmission?
application
presentation
session
transport
10. When connectionless protocols are implemented at the lower layers of the OSI model, what is usually
used to acknowledge that the data was received and to request the retransmission of missing data?
IP
UDP
Ethernet
a connectionless acknowledgement
11.
Refer to the exhibit. Host C is able to ping 127.0.0.1 successfully, but is unable to communicate with hosts A
12.
Refer to the exhibit. Which list refers only to end devices?
D,E,F,G
A,H,B,C
A,D,E,F
A,D,E,G
13.
Refer to the exhibit. Host A sends a frame with the destination MAC address as FFFF.FFFF.FFFF. What action
14. Which subnet mask will allow 2040 hosts per subnet on the IP network 10.0.0.0?
255.255.0.0
255.255.254.0
255.255.252.0
255.255.248.0
255.255.240.0
255.255.255.128
15.
Refer to the exhibit. RouterB is configured properly. The Ethernet interface Fa0/0 of RouterA is configured
with the use of the commands that are shown. However, a ping from the Fa0/0 interface of RouterA to the
Fa0/0 interface of RouterB is unsuccessful. What action should be taken on RouterA to solve this problem?
16. To send data through a network, what two flags are used to establish a session? (Choose two.)
ACK
CRC
SYN
Ack #
Port #
Seq #
17. Which statement is true about the TTL value of an IPv4 packet?
18.
Refer to the exhibit. Communication for hosts X and Y is restricted to the local network. What is the reason
for this?
19. What type of network is maintained if a server takes no dedicated role in the network?
mainframe
client/server
peer-to-peer
centralized
20. A routing issue has occurred in your internetwork. Which of the following type of devices should be
access point
host
hub
router
switch
21. Which physical component is used to access and perform the initial configuration on a new unconfigured
router?
26. What is the protocol data unit that is associated with the data link layer of the OSI reference model?
data
frame
packet
segment
27. Which application layer protocol allows administrators to log into a server from remote locations and
DNS
FTP
DHCP
SMTP
Telnet
It requests and assigns an IP address, default gateway, and server addresses to hosts.
29. Which password would allow a user to establish a Telnet session with a Cisco device?
VTY password
enable password
console password
30. Which identifier is contained in the header of the Layer 2 Ethernet frame?
31. What happens when a node on an Ethernet network is creating a frame and it does not have the
The node sends a message directly to the router for the address.
The node sends out an ARP request with the destination IP address.
32. An administrator makes changes to the default configuration of a router and saves them to NVRAM. After
testing, it is discovered that the configurations did not have the desired effect and must be removed. What
steps must be taken to remove the changes and return the router to the default configuration?
Issue the erase startup-config command, and then reboot the router.
Issue the erase running-config command, and then reboot the router.
33. A network administrator is tasked with connecting two workgroups that are configured to use different
subnets. Which device should be selected to allow connectivity between users on the two networks?
hub
switch
router
34. Which two programs can be used to accomplish terminal emulation for configuring a router from the CLI
HyperTerminal
Internet Explorer
Minicom
Secure Shell
Telnet
Files are typically stored on the most powerful peer in the network.
Peers can either make requests, or respond to requests, but not both.
36. What are two primary responsibilities of the Ethernet MAC sublayer? (Choose two.)
frame delimiting
data encapsulation
logical addressing
error detection
37. Which router configuration mode would an administrator use to configure the router for SSH or Telnet
login access?
line
router
global
interface
privileged EXEC
38.
Refer to the exhibit. Which device should be included in the network topology to provide Layer 2 connectivity
for all LAN devices, provide multiple collision domains, and also provide a connection to the rest of the
network?
server
hub
switch
PC
39.
Refer to the exhibit. A technician has been asked to test connectivity from PC1 to a remote network. Which
R1>
R1#
R1(config)#
R1(config-router)#
42. A technician wishes to connect two computers to move data from one to the other before reloading the
operating system. The NICs on both PCs do not support autosensing feature. Which procedure will satisfy
the requirement?
Interconnect the two PCs with two rollover cables and a hub.
Interconnest the two PCs with two crossover cables and a hub.
43.
Refer to the exhibit. Interface Fa0/0 on router A is generating excessive broadcast traffic. Which LAN
Only the link between 192.168.1.201 and port Fa0/5 on SW1 will be affected.
Only the links between 192.168.1.201 and port Fa0/7 on SW2 will be affected.
44. Two routers are connected via their serial ports in a lab environment. The routers are configured with
valid IP addresses, but they cannot ping each other. The show interface serial0/0 command shows that the
serial0/0 interface is up but the line protocol is down. What could be the cause of this problem?
The clock rate command has not been entered on the DCE interface.
45.
Refer to the exhibit. Which layered network model is shown in the diagram?
Cisco
IETF
OSI
TCP/IP
46.
Refer to the exhibit. Host A is unable to reach host B on the remote network. A technician attempted to ping
the local gateway and the ping was successful. To verify the host configuration, the technician issued the
47. Which option shows how a router will route packets to a remote network?
10.10.128.0 to 10.10.160.255
10.10.128.0 to 10.10.159.255
10.10.128.0 to 10.10.192.255
10.10.128.0 to 10.10.0.159
10.10.128.0 to 10.10.159.0
49. A network administrator is configuring several switches for a network. The switches have similar
configurations and only minor differences. The administrator wants to save all commands that are issued on
the first switch to a text file for editing. Which transfer option should be selected in HyperTerminal?
Router(config-line)# login
vty
aux
console
enable secret
enable password
53.
Refer to the exhibit. A network technician is trying to determine the correct IP address configuration for Host
54. Which prompt represents the appropriate mode used for the copy running-config startup-config
command ?
Switch-6J>
Switch-6J#
Switch-6J(config)#
Switch-6J(config-if)#
Switch-6J(config-line)#
55.
Refer to the exhibit. The tracert command is initiated from PC1 to PC4. Which device will send a response to
Athens
Ankara
London
Paris
PC4
56. Which information is used by the router to determine the path between the source and destination hosts?
57.
Refer to the exhibit. A PC is communicating with another PC on a remote network. The two networks are
connected by three routers. Which action will help to identify the path between the hosts?
58.
11. Refer to the exhibit. The diagram represents the process of sending e-mail between clients. Which list
correctly identifies the component or protocol used at each numbered stage of the diagram?
59.
Refer to the exhibit. The router of the company failed and was replaced. After the replacement, hosts C and D
in the Education office are able to ping each other, but they are unable to access the hosts in the Accounts
The subnet mask at the fa0/1 interface of the router is incorrectly entered.
The hosts in the Accounts office are not on the same subnet as the hosts in the Education office.
60.
Refer to the exhibit. Host A and B are unable to communicate with each other. What is the reason for this?
61.
Refer to the exhibit. Host B attempts to establish a TCP/IP session with host C. During this attempt, a frame
was captured at the FastEthernet interface fa0/1 of the San Francisco router. The packet inside the captured
frame has the source IP address 10.10.1.2, and the destination IP address is 10.31.1.20. What is the
0060.7320.D632
0060.7320.D631 0040.8517.44C3
0009.B2E4.EE03
0010.C2B4.342
62.
Refer to the exhibit. While configuring a network, a technician wired each end of a Category 5e cable as
shown. Which two statements are true about this setup? (Choose two.)
The cable is terminated in a way that the transmit pin is wired to the receive pin.
63. Well-known services and applications use which range of TCP/UDP port numbers?
0 to 255
0 to 1023
1024 to 49151
49152 to 65535
64. Which three IPv4 addresses represent subnet broadcast addresses? (Choose three.)
192.168.4.63 /26
192.168.4.129 /26
192.168.4.191 /26
192.168.4.51 /27
192.168.4.95 /27
192.168.4.221 /27
65. Which three statements are true about network layer addressing? (Choose three.)
66. Which OSI layer addressing is required to route packets between two networks?
Layer 1
Layer 2
Layer 3
Layer 4
67.
Refer to the exhibit. Host A is requesting a web page from the web server. Which option represents the
80
www.cisco.com
10.0.0.130
10.0.0.130:80
68.
Which statement describes the correct use of addresses to deliver an e-mail message from HostB to the e-
Via the use of a Layer 3 address, ServerA assigns the message to the e-mail service.
69.
Refer to the exhibit. Host A is configured with the correct IP address for the default gateway of the router R1
FastEthernet0/1 interface. How will a packet that is sent from host A to host B be handled by the devices on
the network?
R1 will drop the packet because R1 does not have a specific route in its routing table to the 10.1.1.0/24 network.
R1 will forward the packet to its default gateway, the next hop router R2. R2 will forward the packet to the
R1 will forward the packet to its default gateway, the next hop router R2. R2 will drop the packet because it does not
R1 will forward the packet to its default gateway, the next hop router R2. R2 will drop the packet because it does not
70. Which option correctly identifies the interface or interfaces used to connect the router to a CSU/DSU for
WAN connectivity?
mask of 255.255.248.0?
30
256
2046
2048
4094
4096
72. During the encapsulation process, what is the PDU of the internet layer?
bit
data
frame
packet
segment
73. Which service is used when the nslookup command is issued on a computer?
FTP
DNS
DHCP
Telnet
74.
Refer to the exhibit. A network technician creates equal-sized subnets of network 192.168.2.0/24 using the
subnet mask 255.255.255.224. If the technician wishes to calculate the number of host addresses in each
subnet by using the formula that is shown in the exhibit, what value will be used for n?
75. What are the default terminal emulation software settings when configuring a Cisco device through a
console port?
Data bits: 7
Parity: None
Stop bits: 0
Data bits: 8
Parity: None
Stop bits: 1
Data bits: 7
Parity: None
Stop bits: 0
Data bits: 8
Parity: None
Stop bits: 1
76. In a packet-switched data network, what is used to reassemble the packets in the correct order at the
destination device?
source address
sequence number
priority assignment
destination address
77.
Refer to the exhibit. A network administrator tries to test the connectivity between routers R1 and R2, but the
attempt to ping is unsuccessful. Based on the show ip interface brief command outputs, what could be the
Interface S0/0/0 on router R2 does not have the clock rate settings configured.
78. Which router configuration mode will require user authentication if an administrator issues the enable
secret command?
79. Which location of router memory is cleared with the erase startup-config command?
flash
RAM
ROM
NVRAM
80. Which subnet mask should be used for a Class B network that is divided into subnets and will
255.255.255.0
255.255.254.0
255.255.252.0
255.255.248.0
255.255.240.0
81.
Refer to the exhibit. The network containing router B is experiencing problems. A network associate has
isolated the issue in this network to router B. What action can be preformed to correct the network issue?
82.
Refer to the exhibit. A web browser running on host PC1 sends a request for a web page to the web server
with an IP address 192.168.1.254/24. What sequence of steps will follow in order to establish the session
The session will be initiated using UDP. No additional acknowledgment will be required to establish the session.
The session will be initiated using TCP. No additional acknowledgment will be required to establish the session.
The session will be initiated using UDP. The returned web page will serve as an acknowledgment for session
establishment.
The session will be initiated using TCP. A three-way handshake must be successfully completed before the
session is established.
R1>
R1#
R1(config)#
R1(config-router)#
84. What is the effect of using the Router# copy running-config startup-config command on a router?
85. In a network design project, a network designer needs to select a device to provide collision free
hub
router
switch
firewall
wiki
weblog
instant messaging
87. Which range of port numbers are reserved for services that are commonly used by applications that run
on servers?
0 to 255
0 to 1023
1024 to 49151
49152 to 65535
88.
Refer to the exhibit. An employee wants to access the organization intranet from home. Which intermediary
device should be used to connect the organization intranet to the Internet to enable this access?
hub
switch
router
application layer
presentation layer
session layer
transport layer
90. Which two types of media can provide bandwidth up to 1 Gb/s? (Choose two.)
10 BASE-T
100 BASE-T
100 BASE-FX
1000 BASE-TX
1000 BASE-SX
91. To enhance security in a network, the network administrator uses these commands:
Router(config-line)# login
92. What two conclusions are evident from these commands? (Choose two.)
Users who attempt to connect to the console port of the router must enter a password.
The entries permit access through the console by the use of j1mdi2 as the password.
Access through the console will be denied because the console configuration is incomplete.
93.
Refer to the exhibit. When host A sends a frame addressed for host D, which hosts will receive the frame?
only host D
all hosts
94. A user enters http://www.cisco.com/web1.htm in the address line of a browser. Which statement is true
The www.cisco.com is the name of the web page file that is called
95.
The tracert 10.1.3.2 command was issued on computer A. Computer A can ping other addresses on the local
subnet. Computer A sent the first ICMP packet toward computer B with a TTL value of 1. A protocol analyzer
that was running on computer B showed that the packet never reached its destination. Why did the packet
96. What can the user do from the command prompt, Router(config-line)# ?
98.
Refer to the exhibit. The ping 127.0.0.1 command is issued on the local host. What do the ping results
indicate?
99. Which topology divides the collision domain and provides full media bandwidth to the hosts in the
network?
100.
Refer to the exhibit. Which option correctly identifies the network address, range of host addresses, and the
101. A technician is setting up a workgroup for six users and wants to allow users to share files without
setting up a server. Which application layer protocol will provide for peer-to-peer file sharing in a
workgroup?
DNS
SMB
HTTP
DHCP
102. Which router component will have contents erased when the command erase startup-config is issued?
flash
RAM
ROM
NVRAM
103.
Refer to the exhibit. Host1 is in the process of setting up a TCP session with Host2. Host1 has sent a SYN
Host1 sends a segment with the ACK flag = 0, SYN flag = 0 to Host2.
Host1 sends a segment with the ACK flag = 1, SYN flag = 0 to Host2.
Host1 sends a segment with the ACK flag = 1, SYN flag = 1 to Host2.
Host2 sends a segment with the ACK flag = 0, SYN flag = 1 to Host1.
Host2 sends a segment with the ACK flag = 1, SYN flag = 0 to Host1.
Host2 sends a segment with the ACK flag = 1, SYN flag = 1 to Host1.
104.
Refer to the exhibit. Host A is able to access resources on the local LAN but is unable to access any
105. What is described by the network access layer of the TCP/IP model?
rules for the handoff from the internet layer to the network access protocols
rules for how source and destination hosts exchange data between programs
rules for determining which processes can be used to route messages through an internetwork
106. Which two factors contribute to the increased throughput when all nodes of a LAN are connected to a
full-duplex operation
collision-free environment
logical bus media access
broadcast-free environment
point-to-multipoint topology
107. A network technician has made a UTP cable that is terminated as T568A on one end and T568B on the
patch
console
crossover
straight-through
109.
Refer to the exhibit. Which two layers of the OSI model describe the same functions as the transport and
presentation layer
session layer
transport layer
network layer
physical layer
110. What command can be used to troubleshoot domain name resolution issues?
get
arp -a
tracert
nslookup
111.
Refer to the exhibit. For connecting two routers with an Ethernet crossover cable, which interface should be
used?
112. Which three addresses belong to the category of public IP addresses? (Choose three.)
127.0.0.1
196.1.105.6
132.11.9.99
10.0.0.1
172.16.9.10
46.1.1.97
Refer to the exhibit. What two facts can be determined from the session information that is displayed?
(Choose two.)
The destination port indicates that an FTP session has been initiated.
The source port does not support communication with the destination port that is listed.
116.
Refer to the exhibit. Which type of network design is shown?
client/server
wide area
dedicated server
peer-to-peer
117.
Refer to the exhibit. A network administrator remotely accesses the CLI of RouterB from PC1 using Telnet.
A GET request was sent to RouterB to retrieve data during this session.
118. Refer to the exhibit. A network technician wants to connect host A to the console of a Cisco switch to
initialize the configuration. What type of cable is required for this connection?
straight-through cable
crossover cable
rollover cable
serial cable
119. Refer to the exhibit. The network administrator for a small advertising company has chosen to use the
192.168.5.96/27 network for internal LAN addressing. As shown in the exhibit, a static IP address is assigned
to the company web server. However, the web server cannot access the Internet. The administrator verifies
that local workstations with IP addresses that are assigned by a DHCP server can access the Internet, and
the web server is able to ping local workstations. Which component is incorrectly configured?
host IP address
DNS address
subnet mask
120. A technician makes several changes to the running configuration on a router, but the desired results are
not achieved. The technician issues the reload command. What action will be taken by the router?
All changes will be lost and the router will restart immediately.
Changes will be saved automatically and the router will restart.
The user will be prompted to save changes before the router restarts.
The router will detect changes to the running configuration and will reload using the configuration stored in RAM.
121. Refer to the exhibit. Each media link is labeled. What type of cable should be used to connect the
different devices?
An employee edits and reviews web pages on a web server that is located in the server farm.
A teleworker logs into a core router of the corporate network and makes a configuration change.
A user on one office PC sends output to a printer that is attached to the USB port of another PC in an
adjacent office.
123. What type of cable is being used if a network administrator is connecting two Cisco routers and uses
rollover cable
crossover UTP
straight-through UTP
124. A PC can not connect to any remote websites, ping its default gateway, or ping a printer that is
functioning properly on the local network segment. Which action will verify that the TCP/IP stack is
Use the traceroute command at the command prompt to identify any failures on the path to the gateway.
125. What are two purposes for configuring a banner on a router? (Choose two.)
126. An administrator needs management access to a switch from a remote offsite location. Which three
configurations are required on the switch to allow the administrator to have remote access using either SSH
default gateway
banner message
VLAN IP address
encrypted passwords
127. Which three commands will change the current configuration mode of a router? (Choose three.)
router rip
line vty 0 4
password class
hostname RouterA
128. Which device should be used for enabling a host to communicate with another host on a different
network?
switch
hub
router
host
129. During the encapsulation process, what identifiers are added at the transport layer?
130. What action is taken by a host on an Ethernet network when the host attempts to contact a remote host
on another network?
The PDU is sent using the IP and MAC address of the destination host.
The PDU is sent using the IP address and MAC address of the default gateway.
The PDU is sent using the IP address of the destination host and MAC address of the default gateway.
The PDU is sent using the IP address of the default gateway and the MAC address of the destination host.
131. Which three addresses are private IP addresses? (Choose three.)
10.0.0.1
46.1.1.88
172.31.31.10
172.32.16.10
192.168.8.8
132. A network administrator needs to provide administrative access for certain users. Which mode will allow
133. A network has grown too large for technicians to configure network addresses and hosts files for name
resolution. Which two application layer services should be added to the server to allow these needs to be
DNS
FTP
DHCP
HTTP
SMTP
135. A network technician wants to configure an IP address on a router interface by using the ip address
192.168.1.1 255.255.255.0 command. Which prompt should the technician see when entering this command?
Router>
Router(config-if)#
Router#
Router(config)#
SMTP
Telnet
TFTP
FTP-data control
web browser
138. Refer to the exhibit. What is the total amount of RAM on the router?
16384 KB
31360 KB
114688 KB
131072 KB