Exam 1-3
Exam 1-3
Exam 1-3
o an intranet
o the Internet
o an extranet
o a local area network
Answers Explanation & Hints:
Intranet is a term used to refer to a private connection of LANs and WANs that belongs to an organ
intranet is designed to be accessible only by the organization’s members, employees, or others with
authorization.
o fault tolerance
o scalability
o security
o Quality of Service (QoS)
o reliability
Answers Explanation & Hints:
Network security includes protecting the confidentiality of data that is on the network. In this case, b
confidential data has been made available to unauthorized users, the security characteristic of the ne
failed.
6. What two criteria are used to help select a network medium from
various network media? (Choose two.)
o email
o on-line purchasing
o video conferencing
o wiki
Answers Explanation & Hints:
Video conferencing utilizes real-time audio and video communications. Both of these are time-sensi
bandwidth-intensive forms of communication that require quality of service to be active on the netw
will ensure an uninterrupted user experience.
o implementing a firewall
o installing a wireless network
o installing antivirus software
o implementing an intrusion detection system
o adding a dedicated intrusion prevention device
Answers Explanation & Hints:
Technically complex security measures such as intrusion prevention and intrusion prevention system
associated with business networks rather than home networks. Installing antivirus software, antimal
software, and implementing a firewall will usually be the minimum requirements for home network
home wireless network will not improve network security, and will require further security actions t
o VTY interface
o console interface
o Ethernet interface
o boot IOS mode
o privileged EXEC mode
o router configuration mode
Answers Explanation & Hints:
Access to the VTY and console interfaces can be restricted using passwords. Out-of-band managem
router can be restricted in both user EXEC and privileged EXEC modes.
11.What function does pressing the Tab key have when entering a
command in IOS?
CCNA1
v7 – ITNv7 – Modules 1 – 3 Basic Network Connectivity and Communications Exam
Answers 02
o letmein
o secretin
o lineconin
o linevtyin
Answers Explanation & Hints:
Telnet accesses a network device through the virtual interface configured with the line VTY comma
password configured under this is required to access the user EXEC mode. The password configured
line console 0 command is required to gain entry through the console port, and the enable and enabl
passwords are used to allow entry into the privileged EXEC mode.
o Telnet access
o SVI
o password encryption
o physical switchport access
Answers Explanation & Hints:
For a switch to have an IP address, a switch virtual interface must be configured. This allows the sw
managed remotely over the network.
16.Which command or key combination allows a user to return to the
previous level in the command hierarchy?
o end
o exit
o Ctrl-Z
o Ctrl-C
Answers Explanation & Hints:
End and CTRL-Z return the user to the privileged EXEC mode. Ctrl-C ends a command in process.
command returns the user to the previous level.
18.Which two host names follow the guidelines for naming conventions
on Cisco IOS devices? (Choose two.)
o Branch2!
o RM-3-Switch-2A4
o Floor(15)
o HO Floor 17
o SwBranch799
Answers Explanation & Hints:
Some guidelines for naming conventions are that names should:Start with a letter
Contain no spaces
End with a letter or digit
Use only letters, digits, and dashes
Be less than 64 characters in length
o SSH makes connections over the network, whereas Telnet is for out-of-band
access.
o SSH provides security to remote sessions by encrypting messages and using user
authentication. Telnet is considered insecure and sends messages in plaintext.
o SSH requires the use of the PuTTY terminal emulation program. Tera Term must
be used to connect to devices through the use of Telnet.
o SSH must be configured over an active network connection, whereas Telnet is
used to connect to a device from a console connection.
Answers Explanation & Hints:
SSH is the preferred protocol for connecting to a device operating system over the network because
more secure than Telnet. Both SSH and Telnet are used to connect to devices over the network, and
used in-band. PuTTY and Terra Term can be used to make both SSH and Telnet connections.
o ipconfig
o ping
o traceroute
o show ip interface brief
Answers Explanation & Hints:
The show ip interface brief command is used to display a brief synopsis of the condition of the devi
The ipconfig command is used to verify TCP/IP properties on a host. The ping command is used to
3 connectivity. The traceroute command is used to trace the network path from source to destination
23.Match the description with the associated IOS mode. (Not all options
are used.)
o the command
o a keyword
o a variable
o a prompt
Answers Explanation & Hints:
The first part of the syntax, show , is the command, and the second part of the syntax, running-confi
keyword. The keyword specifies what should be displayed as the output of the show command.
o This command encrypts passwords as they are transmitted across serial WAN
links.
o This command prevents someone from viewing the running configuration
passwords.
o This command enables a strong encryption algorithm for the enable secret
password command.
o This command automatically encrypts passwords in configuration files that are
currently stored in NVRAM.
o This command provides an exclusive encrypted password for external service
personnel who are required to do router maintenance.
Answers Explanation & Hints:
The startup-config and running-config files display most passwords in plaintext. Use the service pas
encryption global config command to encrypt all plaintext passwords in these files.
o encapsulation
o flow control
o access method
o response timeout
Answers Explanation & Hints:
In order for two computers to be able to communicate effectively, there must be a mechanism that a
the source and destination to set the timing of the transmission and receipt of data. Flow control allo
by ensuring that data is not sent too fast for it to be received properly.
o Data is sent from the internet layer to the network access layer.
o Packets are sent from the network access layer to the transport layer.
o Segments are sent from the transport layer to the internet layer.
o Frames are sent from the network access layer to the internet layer.
Answers Explanation & Hints:
When the data is traveling from the PC to the network, the transport layer sends segments to the inte
The internet layer sends packets to the network access layer, which creates frames and then converts
to bits. The bits are released to the network media.
o ARP
o DHCP
o DNS
o FTP
o NAT
o PPP
Answers Explanation & Hints:
DNS, DHCP, and FTP are all application layer protocols in the TCP/IP protocol suite. ARP and PPP
access layer protocols, and NAT is an internet layer protocol in the TCP/IP protocol suite.
32.Match the description to the organization. (Not all options are used.)
CCNA1 v7 – ITNv7 – Modules 1 – 3 Basic Network Connectivity and Communications Exam
Answers 006
Answers Explanation & Hints:
The EIA is an international standards and trade organization for electronics organizations. It is best known for its
standards related to electrical wiring, connectors, and the 19-inch racks used to mount networking equipment.
o bits
o data
o frame
o packet
o segment
Answers Explanation & Hints:
Application data is passed down the protocol stack on its way to be transmitted across the network m
During the process, various protocols add information to it at each level. At each stage of the proces
(protocol data unit) has a different name to reflect its new functions. The PDUs are named according
protocols of the TCP/IP suite: Data – The general term for the PDU used at the application layer.
Segment – transport layer PDU
Packet – network layer PDU
Frame – data link layer PDU
Bits – A physical layer PDU used when physically transmitting data over the medium
o internet
o transport
o network access
o session
Answers Explanation & Hints:
The TCP/IP model consists of four layers: application, transport, internet, and network access. Of th
layers, it is the internet layer that is responsible for routing messages. The session layer is not part o
model but is rather part of the OSI model.
37.For the TCP/IP protocol suite, what is the correct order of events
when a Telnet message is being prepared to be sent over the
network?
o file
o frame
o packet
o segment
Answers Explanation & Hints:
When received at the physical layer of a host, the bits are formatted into a frame at the data link laye
is the PDU at the network layer. A segment is the PDU at the transport layer. A file is a data structu
be used at the application layer.
39.Refer to the exhibit. ServerB is attempting to contact HostA. Which
two statements correctly identify the addressing that ServerB will
generate in the process? (Choose two.)
CCNA1 v7 – ITNv7 –
Modules 1 – 3 Basic Network Connectivity and Communications Exam Answers 03
o ServerB will generate a packet with the destination IP address of RouterB.
o ServerB will generate a frame with the destination MAC address of SwitchB.
o ServerB will generate a packet with the destination IP address of RouterA.
o ServerB will generate a frame with the destination MAC address of RouterB.
o ServerB will generate a packet with the destination IP address of HostA.
o ServerB will generate a frame with the destination MAC address of RouterA.
Answers Explanation & Hints:
In order to send data to HostA, ServerB will generate a packet that contains the IP address of the de
device on the remote network and a frame that contains the MAC address of the default gateway dev
local network.
o encapsulation
o flow control
o access method
o response timeout
Answers Explanation & Hints:
If a computer makes a request and does not hear a response within an acceptable amount of time, th
assumes that no answer is coming and reacts accordingly.
41.A web client is receiving a response for a web page from a web
server. From the perspective of the client, what is the correct order of
the protocol stack that is used to decode the received transmission?
42.Which two OSI model layers have the same functionality as a single
layer of the TCP/IP model? (Choose two.)
o data link
o network
o physical
o session
o transport
Answers Explanation & Hints:
The OSI data link and physical layers together are equivalent to the TCP/IP network access layer. T
transport layer is functionally equivalent to the TCP/IP transport layer, and the OSI network layer is
to the TCP/IP internet layer. The OSI application, presentation, and session layers are functionally e
the application layer within the TCP/IP model.
43.At which layer of the OSI model would a logical address be added
during encapsulation?
o physical layer
o data link layer
o network layer
o transport layer
Answers Explanation & Hints:
Logical addresses, also known as IP addresses, are added at the network layer. Physical addresses ar
the data link layer. Port addresses are added at the transport layer. No addresses are added at the phy
o Network protocols define the type of hardware that is used and how it is mounted
in racks.
o They define how messages are exchanged between the source and the destination.
o They all function in the network access layer of TCP/IP.
o They are only required for exchange of messages between devices on remote
networks.
Answers Explanation & Hints:
Network protocols are implemented in hardware, or software, or both. They interact with each other
different layers of a protocol stack. Protocols have nothing to do with the installation of the network
Network protocols are required to exchange information between source and destination devices in
and remote networks.
o a router
o a firewall
o a web server
o a DSL modem
Answers Explanation & Hints:
A router is used to determine the path that the messages should take through the network. A firewal
filter incoming and outgoing traffic. A DSL modem is used to provide Internet connection for a hom
organization.
o 192.168.5.10
o 192.168.10.5
o 192.168.10.1
o 192.168.5.0
Answers Explanation & Hints:
After the enable command is issued, the show running-configuration command or the show ip interf
command will display the IP address of the switch virtual interface (SVI).
o extranet
o cloud
o BYOD
o quality of service
52.What term describes storing personal files on servers over the
internet to provide access anywhere, anytime, and on any device?
o cloud
o BYOD
o quality of service
o converged network
53.What term describes a network where one computer can be both
client and server?
o peer-to-peer
o cloud
o BYOD
o quality of service
54.What term describes a type of network used by people who work
from home or from a small remote office?
o SOHO network
o BYOD
o quality of service
o converged network
55.What term describes a computing model where server software runs
on dedicated computers?
o client/server
o internet
o intranet
o extranet
56.What term describes a type of network used by people who work
from home or from a small remote office?
o SOHO network
o internet
o intranet
o extranet
57.What term describes a technology that allows devices to connect to
the LAN using an electrical outlet?
o powerline networking
o internet
o intranet
o extranet
58.What term describes a policy that allows network devices to manage
the flow of data to give priority to voice and video?
o quality of service
o internet
o intranet
o extranet
59.What term describes a private collection of LANs and WANs that
belongs to an organization?
o intranet
o internet
o extranet
o peer-to-peer
60.What term describes the ability to use personal devices across a
business or campus network?
o BYOD
o internet
o intranet
o extranet
61.At which OSI layer is a source IP address added to a PDU during the
encapsulation process?
o network layer
o data link layer
o transport layer
o application layer
62.At which OSI layer is a destination port number added to a PDU
during the encapsulation process?
o transport layer
o data link layer
o network layer
o application layer
63.At which OSI layer is data added to a PDU during the encapsulation
process?
o application layer
o data link layer
o network layer
o transport layer
64.At which OSI layer is a source IP address added to a PDU during the
encapsulation process?
o network layer
o data link layer
o application layer
o presentation layer
65.At which OSI layer is data added to a PDU during the encapsulation
process?
o application layer
o transport layer
o network layer
o presentation layer
66.At which OSI layer is a destination IP address added to a PDU
during the encapsulation process?
o network layer
o application layer
o transport layer
o presentation layer
67.At which OSI layer is a source MAC address added to a PDU during
the encapsulation process?
o transport layer
o application layer
o network layer
o presentation layer
69.At which OSI layer is a destination MAC address added to a PDU
during the encapsulation process?
o transport layer
o network layer
o application layer
o data link layer