7/23/2019 Ccna1 Final Exam v5.1 Ccna v5 http://slidepdf.com/reader/full/ccna1-final-exam-v51-ccna-v5 1/53 CCNA1 Final Exam (v5.1) Posted on August 24, 2015 by Admin CCNA1 Final Exam Answer 2015 v5.1 1. What is a characteristic of a fault tolerant network? a network that protects confidential information from unauthorized access a network that can expand quickly to support new users and applications without impacting the performance of the service delivered to existing users a network that supports a mechanism for managing congestion and ensuring reliable delivery of content to all users a network that recovers quickly when a failure occurs and depends on redundancy to limit the impact of a failure 2. Three bank employees are using the corporate network. The first employee uses a web browser to view a company web page in order to read some announcements. The second employee accesses the Search Find Us on Facebook Categories CCNA 1 v5.02 Routing and Switching 2015(100%) CCNA 1 v5.1 Introduction to Networks CCNA 2 v5.02 Routing and Switching 2015(100%) CCNA 2 V5.03 Routing and Switching Essentials CCNA 3 v5.02 Routing and Switching 2015(100%) CCNA 3 v5.03 Scaling Networks CCNA 4 v5.02 Routing and Switching 2015(100%) CCNA 4 v5.03 Connecting Networks CCNA Lab Exam CCNA Security Exam Answer v1.2 (100%) CCNA Security Exam Answer v2 Cisco Learning ITE v5.02 Exam 2015 100% Microsoft Learning Web Home ITE (v5.02) CCNA1 CCNA2 CCNA3 CCNA4 CCNA Security CCNA Lab 24 hours. Cisco Microsoft About
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
CCNA1 Final Exam(v5.1)Posted on August 24, 2015 by Admin
CCNA1 Final Exam Answer2015 v5.1
1. What is a characteristic of afault tolerant network?
a network that protects confidential
information from unauthorized
access
a network that can expand quickly to
support new users and applicationswithout impacting the performance of
the service delivered to existing
users
a network that supports a
mechanism for managing congestion
and ensuring reliable delivery of
content to all users
a network that recovers quickly
when a failure occurs and dependson redundancy to limit the impact of
a failure
2. Three bank employees areusing the corporate network.The first employee uses a webbrowser to view a companyweb page in order to readsome announcements. Thesecond employee accesses the
Search
Find Us on Facebook
Categories
CCNA 1 v5.02 Routing and Switching
2015(100%)
CCNA 1 v5.1 Introduction to Networks
CCNA 2 v5.02 Routing and Switching
2015(100%)
CCNA 2 V5.03 Routing and Switching
Essentials
CCNA 3 v5.02 Routing and Switching2015(100%)
CCNA 3 v5.03 Scaling Networks
CCNA 4 v5.02 Routing and Switching
2015(100%)
CCNA 4 v5.03 Connecting Networks
CCNA Lab Exam
CCNA Security Exam Answer v1.2
(100%)
CCNA Security Exam Answer v2Cisco Learning
ITE v5.02 Exam 2015 100%
Microsoft Learning
Web
Home ITE (v5.02) CCNA1 CCNA2 CCNA3 CCNA4 CCNA Security
corporate database to performsome financial transactions.The third employeeparticipates in an importantlive audio conference withother corporate managers inbranch offices. If QoS is
implemented on this network,what will be the prioritiesfrom highest to lowest of thedifferent data types?
audio conference, financial
transactions, web page
financial transactions, web page,
audio conference
audio conference, web page, financial
transactionsfinancial transactions, audio
conference, web page
3. What is a benefit of usingcloud computing innetworking?
5. Which connection provides asecure CLI session withencryption to a Cisco switch?
a console connection
an AUX connection
a Telnet connection
an SSH connection
6. A network technician isattempting to configure aninterface by entering thefollowing command:SanJose(config)# ip address192.168.2.1 255.255.255.0.The command is rejected bythe device. What is the reasonfor this?
The command is being entered from
the wrong mode of operation.
The command syntax is wrong.
The subnet mask information is
incorrect.
The interface is shutdown and must
be enabled before the switch will
accept the IP address.
7. An administrator uses theCtrl-Shift-6 key combination
on a switch after issuing theping command. What is thepurpose of using thesekeystrokes?
issues on a server. Using atester, the administratornotices that the signalsgenerated by the server NICare distorted and not usable.In which layer of the OSImodel is the error
categorized?presentation layer
network layer
physical layer
data link layer
16. A network administrator ismeasuring the transfer of bitsacross the company backbonefor a mission critical financial
application. The administratornotices that the networkthroughput appears lowerthan the bandwidth expected.Which three factors couldinfluence the differences inthroughput? (Choose three.)
the amount of traffic that is currently
crossing the network
the sophistication of theencapsulation method applied to the
data
the type of traffic that is crossing the
network
the latency that is created by the
number of network devices that the
data is crossing
the bandwidth of the WAN connection
to the Internetthe reliability of the gigabit Ethernet
18. What are two characteristicsof fiber-optic cable? (Choosetwo.)
It is not affected by EMI or RFI.
Each pair of cables is wrapped in
metallic foil.
It combines the technique of
cancellation, shielding, and twisting
to protect data.
It typically contains 4 pairs of fiber-
optic wires.
It is more expensive than UTP
cabling is.
19. What is a characteristic of theLLC sublayer?
It provides the logical addressingrequired that identifies the device.
It provides delimitation of data
according to the physical signaling
requirements of the medium.
It places information in the frame
allowing multiple Layer 3 protocols to
use the same network interface and
media.
It defines software processes thatprovide services to the physical
layer.
20. A network team is comparingphysical WAN topologies forconnecting remote sites to aheadquarters building. Whichtopology provides highavailability and connectssome, but not all, remotesites?
mesh
partial mesh
hub and spoke
point-to-point
21. What method is used tomanage contention-basedaccess on a wireless network?
be the result of entering thisconfiguration the next time anetwork administratorconnects a console cable tothe router and no additionalcommands have beenentered?
The administrator will be required to
enter Cisco123.
The administrator will be required to
enter Cisco234.
The administrator will be required to
enter Cisco789.
The administrator will be presented
with the R1> prompt.
30. What is the dotted decimalrepresentation of the IPv4address
11001011.00000000.01110001.11010011?
192.0.2.199
198.51.100.201
203.0.113.211
209.165.201.223
31. What are three characteristicsof multicast transmission?(Choose three.)
35. Which range of link-localaddresses can be assigned toan IPv6-enabled interface?
FEC0::/10
FDEE::/7
FE80::/10
FF00::/8
36. How many valid hostaddresses are available on anIPv4 subnet that is configuredwith a /26 mask?
254
190
19262
64
37. A site administrator has beentold that a particular networkat the site must accommodate126 hosts. Which subnet maskwould be used that containsthe required number of hostbits?
255.255.255.0
255.255.255.128
255.255.255.224
255.255.255.240
38. Which subnet would includethe address 192.168.1.96 as ausable host address?
192.168.1.64/26
192.168.1.32/27
192.168.1.32/28
192.168.1.64/29
39. Which statement is true aboutvariable-length subnetmasking?
41. A user opens three browserson the same PC to accesswww.cisco.com to search for
certification courseinformation. The Cisco webserver sends a datagram as areply to the request from oneof the web browsers. Whichinformation is used by theTCP/IP protocol stack in thePC to identify which of thethree web browsers should
connected to corporateheadquarters at all times.Which network technology isrequired to support thisrequirement?
LAN
MAN
WAN
WLAN
54. A home user is looking for anISP connection that provideshigh speed digitaltransmission over regularphone lines. What ISPconnection type should beused?
DSL
dial-up
satellite
cell modem
cable modem
55. How does quality of servicehelp a network support a widerange of applications andservices?
by limiting the impact of a network
failure
by allowing quick recovery from
network failures
by providing mechanisms to manage
congested network traffic
by providing the ability for the
network to grow to accommodate
new users56. On which switch interface
would an administratorconfigure an IP address sothat the switch can bemanaged remotely?
57. After making configurationchanges on a Cisco switch, anetwork administrator issuesa copy running-config startup-config command. What is theresult of issuing this
command?The new configuration will be stored
in flash memory.
The new configuration will be loaded
if the switch is restarted.
The current IOS file will be replaced
with the newly configured file.
The configuration changes will be
removed and the original
configuration will be restored.
58. Refer to the exhibit. Anetwork administrator isconfiguring access control toswitch SW1. If theadministrator has alreadylogged into a Telnet sessionon the switch, whichpassword is needed to access
secure CLI session withencryption to a Cisco switch?
a console connection
an AUX connection
a Telnet connection
an SSH connection
60. A network technician isattempting to configure aninterface by entering thefollowing command:SanJose(config)# ip address192.168.2.1 255.255.255.0.The command is rejected bythe device. What is the reasonfor this?
a console connection
an AUX connection
a Telnet connection
an SSH connection
61. A network technician isattempting to configure aninterface by entering thefollowing command:SanJose(config)# ip address192.168.2.1 255.255.255.0.
The command is rejected bythe device. What is the reasonfor this?
The command is being entered from
the wrong mode of operation.
The command syntax is wrong.
The subnet mask information is
incorrect.
The interface is shutdown and must
be enabled before the switch will
accept the IP address.
62. What function does pressingthe Tab key have whenentering a command in IOS?
67. A network administrator istroubleshooting connectivityissues on a server. Using atester, the administratornotices that the signals
generated by the server NICare distorted and not usable.In which layer of the OSImodel is the errorcategorized?
presentation layer
network layer
physical layer
data link layer
68. A network administrator ismeasuring the transfer of bitsacross the company backbonefor a mission critical financialapplication. The administratornotices that the networkthroughput appears lowerthan the bandwidth expected.Which three factors could
influence the differences inthroughput? (Choose three.)
the amount of traffic that is currently
crossing the network
the sophistication of the
encapsulation method applied to the
data
the type of traffic that is crossing the
network
the latency that is created by thenumber of network devices that the
data is crossing
the bandwidth of the WAN connection
to the Internet
the reliability of the gigabit Ethernet
infrastructure of the backbone
69. Which procedure is used toreduce the effect of crosstalk
dynamic global IPv6addressing to end deviceswithout using a server thatkeeps a record of availableIPv6 addresses?
stateful DHCPv6
SLAAC
static IPv6 addressing
stateless DHCPv6
86. What is the purpose of the
command ping ::1?
It tests the internal configuration of
an IPv6 host.
It tests the broadcast capability of all
hosts on the subnet.
It tests the multicast connectivity toall hosts on the subnet.
It tests the reachability of the default
gateway for the network.
87. How many usable IPaddresses are available on the192.168.1.0/27 network?
256
254
6230
16
32
88. Which subnet would includethe address 192.168.1.96 as ausable host address?
192.168.1.64/26
192.168.1.32/27
192.168.1.32/28
192.168.1.64/29
89. A network administratorwants to have the samesubnet mask for threesubnetworks at a small site.The site has the followingnetworks and numbers of devices:
105. A medium-sized business isresearching available optionsfor connecting to the Internet.The company is looking for ahigh speed option withdedicated, symmetric access.
Which connection type shouldthe company choose?
DSL
dialup
satellite
leased line
cable modem
106. What is the purpose of havinga converged network?
to provide high speed connectivity to
all end devices
to make sure that all types of data
packets will be treated equally
to achieve fault tolerance and high
availability of data network
infrastructure devices
to reduce the cost of deploying and
maintaining the communicationinfrastructure
107. What characteristic of anetwork enables it to quicklygrow to support new usersand applications withoutimpacting the performance of the service being delivered toexisting users?
administrator is attempting tocreate a message-of-the-daybanner by using the commandbanner motd V Authorizedaccess only! Violators will beprosecuted! V When users login using Telnet, the banner
does not appear correctly.What is the problem?
CCNA1 Final Exam v5.1 013
The banner message is too long.
The delimiting character appears in
the banner message.
The symbol “!” signals the end of a
banner message.
Message-of-the-day banners will
only appear when a user logs in
through the console port.112. What are three characteristics
a data stream into smallerpieces before transmission?
segmentation
encapsulation
encoding
flow control
118.When IPv4 addressing ismanually configured on a webserver, which property of theIPv4 configuration identifiesthe network and host portionfor an IPv4 address?
DNS server address
subnet mask
default gateway
DHCP server address119. A network administrator is
troubleshooting connectivityissues on a server. Using atester, the administratornotices that the signalsgenerated by the server NICare distorted and not usable.In which layer of the OSImodel is the error
categorized?
presentation layer
network layer
physical layer
data link layer
120. A network engineer ismeasuring the transfer of bitsacross the company backbonefor a mission critical databaseapplication. The engineernotices that the networkthroughput appears lowerthan the bandwidth expected.Which three factors couldinfluence the differences inthroughput? (Choose three.)
131. Refer to the exhibit. Thenetwork administrator for asmall advertising companyhas chosen to use the192.168.5.96/27 network forinternal LAN addressing. Asshown in the exhibit, a staticIP address is assigned to thecompany web server.
However, the web servercannot access the Internet.The administrator verifies thatlocal workstations with IPaddresses that are assignedby a DHCP server can accessthe Internet, and the webserver is able to ping localworkstations. Whichcomponent is incorrectly
140. Refer to the exhibit. Considerthe IP address of 192.168.10.0/24 that hasbeen assigned to a high schoolbuilding. The largest networkin this building has 100devices. If 192.168.10.0 is thenetwork number for the
largest network, what wouldbe the network number for thenext largest network, whichhas 40 devices?
CCNA1 Final Exam v5.1 009
192.168.10.0
192.168.10.128
192.168.10.192
192.168.10.224
192.168.10.240
141. In what two situations wouldUDP be the preferredtransport protocol over TCP?