Computer Networking > QUESTIONS & ANSWERS > CCNA 1 Final Exam Questions with 100% accurate answers, rated A+. (All)

CCNA 1 Final Exam Questions with 100% accurate answers, rated A+.

Document Content and Description Below

Which of the following are the address ranges of the private IP addresses? (Choose three.) - ??10.0.0.0 to 10.255.255.255 ; 172.16.0.0 to 172.31.255.255; 192.168.0.0 to 192.168.255.255 Which two ... functions of the OSI model occur at layer two? (Choose two.) - ??physical addressing ; media access control Refer to the exhibit. What function does router RT_A need to provide to allow Internet access for hosts in this network? - ??address translation What is true regarding network layer addressing? (Choose three.) - ??It uses a hierarchical structure.; uniquely identifies each host; A portion of the address is used to identify the network. Refer to the exhibit. Host A attempts to establish a TCP/IP session with host C. During this attempt, a frame was captured with the source MAC address 0050.7320.D632 and the destination MAC address 0030.8517.44C4. The packet inside the captured frame has an IP source address 192.168.7.5, and the destination IP address is 192.168.219.24. At which point in the network was this packet captured? - ??Leaving Dallas Refer to the exhibit. Assume all devices are using default configurations. How many subnets are required to address the topology that is shown? - ??3 A technician is asked to secure the privileged EXEC mode of a switch by requiring a password. Which type of password would require this login and be considered the most secure? - ??enable secret Refer to the exhibit. A technician is working on a network problem that requires verification of the router LAN interface. What address should be pinged from this host to confirm that the router interface is operational? - ??192.168.254.1 Which OSI layer does IP rely on to determine whether packets have been lost and to request retransmission? - ??transport When connectionless protocols are implemented at the lower layers of the OSI model, what is usually used to acknowledge that the data was received and to request the retransmission of missing data? - ??an upper-layer, connection-oriented protocol or service Refer to the exhibit. Host C is able to ping 127.0.0.1 successfully, but is unable to communicate with hosts A and B in the organization. What is the likely cause of the problem? - ??The subnet mask on host C is improperly configured. Refer to the exhibit. Which list refers only to end devices? - ??D,E,F,G Refer to the exhibit. Host A sends a frame with the destination MAC address as FFFF.FFFF.FFFF. What action will the switch take for this frame? - ??It will send the frame to all hosts except host A. Which subnet mask will allow 2040 hosts per subnet on the IP network 10.0.0.0? - ??255.255.248.0 Refer to the exhibit. RouterB is configured properly. The Ethernet interface Fa0/0 of RouterA is configured with the use of the commands that are shown. However, a ping from the Fa0/0 interface of RouterA to the Fa0/0 interface of RouterB is unsuccessful. What action should be taken on RouterA to solve this problem? - ??Use the no shutdown command on the FastEthernet interface Fa0/0. To send data through a network, what two flags are used to establish a session? (Choose two.) - ??ACK; SYN Which statement is true about the TTL value of an IPv4 packet? - ??It specifies the remaining "life" of the packet. Refer to the exhibit. Communication for hosts X and Y is restricted to the local network. What is the reason for this? - ??The gateway addresses are broadcast addresses. What type of network is maintained if a server takes no dedicated role in the network? - ??peer-to-peer A routing issue has occurred in your internetwork. Which of the following type of devices should be examined to isolate this error? - ??Router Which physical component is used to access and perform the initial configuration on a new unconfigured router? - ??Image 2, *CONSOLE* A user sees the command prompt: Router(config-if)# . What task can be performed at this mode? - ??Configure individual interfaces. What is the correct order for PDU encapsulation? - ??Frame Header, Network Header, Transport Header, Data, Frame Trailer What information can be gathered by using the command netstat? - ??active TCP connections How can ARP be used to help document the network? - ??It can provide a list of physical addresses on the network. What is the protocol data unit that is associated with the data link layer of the OSI reference model? - ??Frame Which application layer protocol allows administrators to log into a server from remote locations and control a server as though logged in locally? - ??Telnet Which statement identifies the DNS protocol? - ??It matches a resource name with the required network address. Which password would allow a user to establish a Telnet session with a Cisco device? - ??VTY password Which identifier is contained in the header of the Layer 2 Ethernet frame? - ??physical source and destination addresses What happens when a node on an Ethernet network is creating a frame and it does not have the destination MAC address? - ??The node sends out an ARP request with the destination IP address. An administrator makes changes to the default configuration of a router and saves them to NVRAM. After testing, it is discovered that the configurations did not have the desired effect and must be removed. What steps must be taken to remove the changes and return the router to the default configuration? - ??Issue the erase startup-config command, and then reboot the router. A network administrator is tasked with connecting two workgroups that are configured to use different subnets. Which device should be selected to allow connectivity between users on the two networks? - ??Router Which two programs can be used to accomplish terminal emulation for configuring a router from the CLI through the console port? (Choose two.) - ??HyperTerminal; Minicom Which statement accurately describes file sharing in a peer-to-peer network? - ??Access control is decentralized. What are two primary responsibilities of the Ethernet MAC sublayer? (Choose two.) - ??data encapsulation; accessing the media Which router configuration mode would an administrator use to configure the router for SSH or Telnet login access? - ??Line [Show More]

Last updated: 1 year ago

Preview 1 out of 8 pages

Reviews( 0 )

$10.00

Add to cart

Instant download

Can't find what you want? Try our AI powered Search

OR

GET ASSIGNMENT HELP
158
0

Document information


Connected school, study & course


About the document


Uploaded On

Aug 08, 2022

Number of pages

8

Written in

Seller


seller-icon
bundleHub Solution guider

Member since 2 years

308 Documents Sold


Additional information

This document has been written for:

Uploaded

Aug 08, 2022

Downloads

 0

Views

 158

Document Keyword Tags

More From bundleHub Solution guider

View all bundleHub Solution guider's documents »

Recommended For You


$10.00
What is Browsegrades

In Browsegrades, a student can earn by offering help to other student. Students can help other students with materials by upploading their notes and earn money.

We are here to help

We're available through e-mail, Twitter, Facebook, and live chat.
 FAQ
 Questions? Leave a message!

Follow us on
 Twitter

Copyright © Browsegrades · High quality services·