CCNA 1 Alternative Final Exam Questions

CCNA 1 Final Exam v5 Introduction to Networks

CCNA 1 Final Exam v5 Introduction to Networks Routing and Switching 2014
What layer is the first point of entry for a host into the network?
  • access layer

Which part of the electromagnetic spectrum is commonly used to exchange data between a PDA and a computer?
  • infrared

Your school network blocks all websites related to online gaming. What type of security policy is being applied?
  • acceptable use

What are two examples of storage peripheral devices?
  • flash drive
  • external DVD

The area covered by a single AP is known as what?
  • basic service set

When acting as a DHCP server, an integrated router can provide what three types of information to a client?
  • default gateway
  • dynamic IP address
  • DNS server address

Refer to the graphic. Assume that the exhibited output is from a host that is connected to a Linksys integrated router. What is one of the first things you should check?
  • link status LED on the front of the router

A host sent a message that all other hosts on the switched local network received and processed. What type of domain are all these hosts a part of?
  • broadcast domain

Refer to the exhibit. A user on host A sends an e-mail to the user on host B. Which type of message does host A send?
  • unicast

Which type of computer uses an integrated monitor and keyboard?
  • laptop

Refer to the exhibit. What cabling fault does the exhibit represent?
  • split pair

What is the purpose of the ipconfig /release command?
  • It forces a client to give up its current IP address.

What is the function of the DNS server?
  • It translates a computer or domain name to the associated IP address.

Which part of a data packet is used by a router to determine the destination network?
  • destination IP address

A network engineer wants to represent confidential data in binary format. What are the two possible values that the engineer can use? (Choose two.)
  • 0
  • 1

What is the purpose of spam filter software?
  • It examines incoming e-mail messages to identify the unsolicited ones.

A user is unable to send e-mail. While troubleshooting this problem, the network technician first verifies the physical connectivity of cables. Which troubleshooting approach is being followed?
  • bottom-up

Which two causes of networking problems are related to the physical layer? (Choose two.)
  • disconnected cables
  • improper operation of cooling fans

What is an advantage of selecting an operating system that has a commercial license over one with a GPL license?
  • The commercial license-based operating system provides structured support.

Refer to the exhibit. What is the purpose of assigning a network name of College?
  • It identifies the wireless LAN.

Refer to the exhibit. What is the effect of setting the security mode to WEP on the Linksys integrated router?
  • The WEP security mode encrypts network traffic during transmission between the AP and the wireless client.

A network technician is required to provide access to the Internet for a large company. What is needed to accomplish this task?
  • ISP

Refer to the exhibit. Assume that the command output is from a wireless DHCP client that is connected to a Linksys integrated router. What can be deduced from the output?
  • The wireless connection is operational.

What is specified by the host bits in an IP address?
  • identity of the computer on the network

What is the default subnet mask for an IP address of 64.100.19.14?
  • 255.0.0.0

Which two transport layer protocols enable hosts to communicate and transfer data? (Choose two.)
  • TCP
  • UDP

A learner wants to interact with the operating system of a computer. Which two methods can be used for this? (Choose two.)
  • CLI
  • GUI

Which installation option enables a single physical resource to function simultaneously as multiple logical resources?
  • upgrade

Which two statements are true about local applications? (Choose two.)
  • They are stored on the local hard disk.
  • They run on the computer where they are installed.

For an IP address, what component decides the number of bits that is used to represent the host ID?
  • network number

What type of cable would be required to connect a Linksys router to a wired PC?
  • straight-through cable

Refer to the exhibit. If H4 sends a message to H1 and the destination MAC address is in the MAC table for both Switch1 and Switch2, which host devices will receive the message?
  • only H1

Because of an increasing number of users, bandwidth per user on a WLAN has decreased to a point where users are complaining about poor performance. What can be done to improve the user experience?
  • Reduce the number of devices using each channel.

What are two best practices that are used when configuring a small home WLAN? (Choose two.)
  • the use of pre-shared keys
  • the disabling of SSID broadcasting

Which protocol in its default configuration downloads e-mail messages to the client computer and deletes them from the server?
  • POP3

What is the purpose of creating a DMZ during network firewall implementation?
  • to allow for a publicly accessible zone without compromising the internal network

Which of the following are the address ranges of the private IP addresses? (Choose three.)
  • 10.0.0.0 to 10.255.255.255
  • 172.16.0.0 to 172.31.255.255
  • 192.168.0.0 to 192.168.255.255

What does the term “attenuation” mean in data communication?
  • loss of signal strength as distance increases

What advantage does a peer-to-peer network have over a client-server network?
  • It eliminates the need for centralized administration.

In an attempt to verify connectivity, a user issues the ping command to a device that is not on the local network. The ping is unsuccessful. What can be determined from this result?
  • The router between the host and destination is faulty.

A company has a web server that must be accessible to both external and internal clients. Which security policy best practice should be followed to maximize security of the server?
  • Place the web server in a DMZ.

The help desk at a large packaging company receives a call from a user who is concerned about lost data files on the local PC. The help desk technician learns that the user clicked on an icon that appeared to be a program update, but no updates were scheduled for that program. What type of attack has likely occurred?
  • Trojan horse

Where do ISPs get the public addresses that they assign to end users?
  • ISPs obtain address blocks from registry organizations.

Which transport layer protocol is used when an application requires acknowledgment that data has been delivered?
  • TCP

What type of message is sent to a specific group of hosts?
  • multicast

A network administrator has been notified that users have experienced problems gaining access to network resources. What utility could be used to directly query a name server for information on a destination domain?
  • nslookup

What is the function of CSMA/CA on a wireless Ethernet network?
  • to prevent collisions

Refer to the exhibit. Why would a network administrator use the network mode that is shown?
  • to support hosts that use different 802.11 standards

When terminating UTP cabling, why is it important to untwist only a small amount of each wire pair?
  • minimizes crosstalk

A network technician suspects that malware on a user PC is opening multiple TCP connections to a specific foreign host address. Which Windows command line utility can be used to confirm the multiple TCP connections?
  • netstat

What are two examples of storage peripheral devices? (Choose two.)
  • flash drive
  • external DVD

When acting as a DHCP server, an integrated router can provide what three types of information to a client? (Choose three.)
  • default gateway
  • dynamic IP address
  • DNS server address