0% found this document useful (0 votes)
157 views10 pages

Networking Devices and Initial Configuration

Uploaded by

wei chen
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
157 views10 pages

Networking Devices and Initial Configuration

Uploaded by

wei chen
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 10

Course Final Exam

Scroll to begin

Welcome to the Networking Devices and Initial Configuration Course Final Exam.

This assessment covers the core concepts and skills presented in the Networking
Devices and Initial Configuration course.

There are 30 questions in total. You must achieve 70% to pass this exam.

You have unlimited attempts to pass the exam. Feedback is provided to direct you to
areas that may require additional attention.

Cisco Networking Academy content is copyrighted and the unauthorized posting,


distribution or sharing of this exam content is prohibited.

© 2022, Cisco Systems, Inc.


Incomplete Question 1

Question 1
Multiple choice question

A data center has recently updated a physical server to host multiple operating systems
on a single CPU. The data center can now provide each customer with a separate web
server without having to allocate an actual discrete server for each customer. What is
the networking trend that is being implemented by the data center in this situation?

online collaboration
BYOD
virtualization
maintaining communication integrity
Incomplete Question 2

Question 2
Multiple choice question

What is an example of cloud computing?

a service that offers on-demand access to shared resources


a continuous interaction between people, processes, data, and things
a network infrastructure that spans a large geographic area
an architectural style of the World Wide Web
Incomplete Question 3

Question 3
This question component requires you to select the matching option. When you have selected your answers select the submit button.
Match the definition to the type of cloud.

intended for a specific organization or entity, such as the government


intended for exclusive use by multiple organizations with shared functional needs
made up of two or more distinct cloud infrastructures bound together by technology
services made available to the general population
community
public cloud
hybrid cloud
private cloud
Incomplete Question 4

Question 4
Multiple choice question

Which two scenarios would benefit the user the most by adding quality of service (QoS)
to the network? (Choose two.)

A student is sending emails to a friend.


Students are updating information about their sport activities on the class Facebook
page.
A student is communicating via Skype with a friend in another country.
Students are watching a lecture from a YouTube site.
Incomplete Question 5

Question 5
Multiple choice question

An employee of a large corporation remotely logs into the company using the
appropriate username and password. The employee is attending an important video
conference with a customer concerning a large sale. It is important for the video quality
to be excellent during the meeting. The employee is unaware that after a successful
login, the connection to the company ISP failed. The secondary connection, however,
activated within seconds. The disruption was not noticed by the employee or other
employees.
What three network characteristics are described in this scenario? (Choose three.)

powerline networking
fault tolerance
security
scalability
integrity
quality of service
Incomplete Question 6

Question 6
Multiple choice question

Which three statements describe the functions of the Cisco hierarchical network design
model? (Choose three.)

The distribution layer is responsible for traffic filtering and isolating failures from the
core.
The distribution layer distributes network traffic directly to end users.
Route summarization is not necessary at the core and distribution layers.
The access layer provides a means of connecting end devices to the network.
The goal of the core layer is maximizing throughput.
The core layer usually employs a star topology.
Incomplete Question 7

Question 7
Multiple choice question

What is the key difference between a type 1 hypervisor and a type 2 hypervisor?

A type 1 hypervisor supports all server OS virtualization and a type 2 hypervisor


supports Linux and Mac virtualization.
A type 1 hypervisor runs on specialized systems and a type 2 hypervisor runs on
desktop computers.
A type 1 hypervisor supports server virtualizations and a type 2 hypervisor only supports
workstation virtualization.
A type 1 hypervisor runs directly on the system hardware and a type 2 hypervisor
requires a host OS to run.
Incomplete Question 8

Question 8
Multiple choice question
Refer to the exhibit. PC1 sends a frame with the destination MAC address
3c97.0e07.a1b2. Switch S1 looks up the destination MAC address in its CAM table but
the address is not there. What will the switch do?

The switch will drop the frame.


It willl add the destination MAC address to the CAM table.
It will send a destination unreachable message back to PC1.
It will forward the frame out port Fa0/2 towards the router.
It will forward the frame out all ports except Fa0/1.
Incomplete Question 9

Question 9
Matching. Select from lists and then submit.

Match field names to the IP header where they would be found.

Flags
IP v4 header
Traffic Class
IP v6 header
Total Length
IP v4 header
Flow Label
IP v6 header
Incomplete Question 10

Question 10
Multiple choice question

Which three IPv4 header fields have no equivalent in an IPv6 header? (Choose three.)

version
identification
TTL
protocol
fragment offset
flag
Incomplete Question 11

Question 11
Multiple choice question
Refer to the exhibit. Host A has sent a packet to host B. What will be the source MAC
and IP addresses on the packet when it arrives at host B?

Source MAC: 00E0.FE10.17A3


Source IP: 192.168.1.1
Source MAC: 00E0.FE91.7799
Source IP: 10.1.1.1
Source MAC: 00E0.FE91.7799
Source IP: 10.1.1.10
Source MAC: 00E0.FE91.7799
Source IP: 192.168.1.1
Source MAC: 00E0.FE10.17A3
Source IP: 10.1.1.10
Incomplete Question 12

Question 12
Multiple choice question

Which forwarding action does a switch take when the destination MAC address of an
Ethernet frame is an unknown unicast?

The switch forwards the frame the same way it does for broadcast and multicast MAC
addresses.
The switch forwards the frame out a specified port for this type of address.
The switch forwards the frame to the default gateway.
The switch drops the frame.
Incomplete Question 13

Question 13
Multiple choice question

Which two items are used by a host device when performing an ANDing operation to
determine if a destination address is on the same local network? (Choose two.)

subnet mask
network number
destination MAC address
destination IP address
source MAC address
Incomplete Question 14

Question 14
Multiple choice question

What is the dotted decimal representation of the IPv4


address11001011.00000000.01110001.11010011?

192.0.2.199
198.51.100.201
203.0.113.211
209.165.201.223
Incomplete Question 15

Question 15
Multiple choice question
Which two statements are correct in a comparison of IPv4 and IPv6 packet headers?
(Choose two.)

The Destination Address field is new in IPv6.


The Version field from IPv4 is not kept in IPv6.
The Source Address field name from IPv4 is kept in IPv6.
The Time-to-Live field from IPv4 has been replaced by the Hop Limit field in IPv6.
The Header Checksum field name from IPv4 is kept in IPv6.
Incomplete Question 16

Question 16
Multiple choice question

What are two potential network problems that can result from ARP operation? (Choose
two.)

Multiple ARP replies result in the switch MAC address table containing entries that
match the MAC addresses of hosts that are connected to the relevant switch port.
Manually configuring static ARP associations could facilitate ARP poisoning or MAC
address spoofing.
On large networks with low bandwidth, multiple ARP broadcasts could cause data
communication delays.
Large numbers of ARP request broadcasts could cause the host MAC address table to
overflow and prevent the host from communicating on the network.
Network attackers could manipulate MAC address and IP address mappings in ARP
messages with the intent of intercepting network traffic.
Incomplete Question 17

Question 17
This question component requires you to select the matching option. When you have selected your answers select the submit button.

Match the TCP flag to the correct step in the session establishment sequence.

step 2
step 1
step 3
ACK
SYN
SYN + ACK
Incomplete Question 18

Question 18
Matching. Select from lists and then submit.

Match the characteristic to the protocol category.

Window size
TCP
Connectionless
UDP
Checksum
Both UDP and TCP
3-way handshake
TCP
Best for VoIP
UDP
Port number
Both UDP and TCP
Incomplete Question 19

Question 19
Multiple choice question

The ARP table in a switch maps which two types of address together?

Layer 2 address to a Layer 4 address


Layer 3 address to a Layer 4 address
Layer 3 address to a Layer 2 address
Layer 4 address to a Layer 2 address
Incomplete Question 20

Question 20
This question component requires you to select the matching option. When you have selected your answers select the submit button.

Match each DHCP message type with its description.

DHCPACK
DHCPOFFER
DHCPREQUEST
DHCPDISCOVER
a client initiating a message to find a DHCP server
a DHCP server responding to the initial request by a client
the client accepting the IP address provided by the DHCP server
the DHCP server confirming that the address lease has been accepted
Incomplete Question 21

Question 21
Multiple choice question

Which statement is true regarding the UDP client process during a session with a
server?

A session must be established before datagrams can be exchanged.


Application servers have to use port numbers above 1024 in order to be UDP capable.
Datagrams that arrive in a different order than that in which they were sent are not
placed in order.
A three-way handshake takes place before the transmission of data begins.
Incomplete Question 22

Question 22
Multiple choice question
Refer to the exhibit. A web designer calls to report that the web server web-
s1.cisco.com is not reachable through a web browser. The technician uses command
line utilities to verify the problem and to begin the troubleshooting process. Which two
things can be determined about the problem? (Choose two.)

There is a problem with the web server software on web-s1.cisco.com.


The default gateway between the source host and the server at 192.168.0.10 is down.
A router is down between the source host and the server web-s1.cisco.com.
The web server at 192.168.0.10 is reachable from the source host.
DNS cannot resolve the IP address for the server web-s1.cisco.com.
Incomplete Question 23

Question 23
Multiple choice question

While troubleshooting a network problem, a network administrator issues the show


version command on a router. What information can be found by using this command?

the amount of NVRAM, DRAM, and flash memory installed on the router
the bandwidth, encapsulation, and I/O statistics on the interfaces
the version of the routing protocol that is running on the router
differences between the backup configuration and the current running configuration
Incomplete Question 24

Question 24
This question component requires you to select the matching option. When you have selected your answers select the submit button.

Match the router prompt to the configuration task.

RouterA(config-line)#
RouterA(config-if)#
RouterA(config)#
RouterA#
configure vty lines
configure a WAN interface
enter configuration mode
add a password required to access the privileged EXEC mode
Incomplete Question 25

Question 25
Multiple choice question

Which three commands are used to set up secure access to a router through a
connection to the console interface? (Choose three.)

enable secret cisco


password cisco
line console 0
login
line vty 0 4
interface fastethernet 0/0
Incomplete Question 26

Question 26
Multiple choice question

What three configuration steps must be performed to implement SSH access to a


router? (Choose three.)

an enable mode password


an IP domain name
a unique hostname
a password on the console line
an encrypted password
a user account
Incomplete Question 27

Question 27
Multiple choice question

A network administrator issues the Switch# show running-config command on a Cisco


switch. Which term is used to describe the part "running-config" in the command?

command
keyword
argument
hot key
Incomplete Question 28

Question 28
Multiple choice question

What is the purpose of assigning an IP address to the VLAN1 interface on a Cisco


Layer 2 switch?

to enable the switch to route packets between networks


to create a new IP local network on the switch
to permit IP packets to be forwarded by the switch
to enable remote access to the switch to manage it
Incomplete Question 29

Question 29
Multiple choice question

What is the difference between the terms keyword and argument in the IOS command
structure?

A keyword is required to complete a command. An argument is not.


A keyword is a specific parameter. An argument is not a predefined variable.
A keyword is entered with a predefined length. An argument can be any length.
A keyword always appears directly after a command. An argument does not.
Incomplete Question 30

Question 30
Multiple choice question

Refer to the exhibit. What is the maximum TTL value that is used to reach the
destination www.cisco.com?

14
11
12
13
Click 'Submit' if you are ready to receive your quiz score.
There is incomplete content above. You must complete this before you can proceed through the course.
Submit

You might also like