CCNA 1 Final Exam v5 Introduction to Networks
CCNA 1 Final Exam v5 Introduction to Networks Routing and Switching 2014
What layer is the first point of entry for a host into the network?
- access layer
Which part of the electromagnetic spectrum is commonly used to exchange data between a PDA and a computer?
- infrared
Your school network blocks all websites related to online gaming. What type of security policy is being applied?
- acceptable use
What are two examples of storage peripheral devices?
- flash drive
- external DVD
The area covered by a single AP is known as what?
- basic service set
When acting as a DHCP server, an integrated router can provide what three types of information to a client?
- default gateway
- dynamic IP address
- DNS server address
Refer to the graphic. Assume that the exhibited output is from a host that is connected to a Linksys integrated router. What is one of the first things you should check?
- link status LED on the front of the router
A host sent a message that all other hosts on the switched local network received and processed. What type of domain are all these hosts a part of?
- broadcast domain
Refer to the exhibit. A user on host A sends an e-mail to the user on host B. Which type of message does host A send?
- unicast
Which type of computer uses an integrated monitor and keyboard?
- laptop
Refer to the exhibit. What cabling fault does the exhibit represent?
- split pair
What is the purpose of the ipconfig /release command?
- It forces a client to give up its current IP address.
What is the function of the DNS server?
- It translates a computer or domain name to the associated IP address.
Which part of a data packet is used by a router to determine the destination network?
- destination IP address
A network engineer wants to represent confidential data in binary format. What are the two possible values that the engineer can use? (Choose two.)
- 0
- 1
What is the purpose of spam filter software?
- It examines incoming e-mail messages to identify the unsolicited ones.
A user is unable to send e-mail. While troubleshooting this problem, the network technician first verifies the physical connectivity of cables. Which troubleshooting approach is being followed?
- bottom-up
Which two causes of networking problems are related to the physical layer? (Choose two.)
- disconnected cables
- improper operation of cooling fans
What is an advantage of selecting an operating system that has a commercial license over one with a GPL license?
- The commercial license-based operating system provides structured support.
Refer to the exhibit. What is the purpose of assigning a network name of College?
- It identifies the wireless LAN.
Refer to the exhibit. What is the effect of setting the security mode to WEP on the Linksys integrated router?
- The WEP security mode encrypts network traffic during transmission between the AP and the wireless client.
A network technician is required to provide access to the Internet for a large company. What is needed to accomplish this task?
- ISP
Refer to the exhibit. Assume that the command output is from a wireless DHCP client that is connected to a Linksys integrated router. What can be deduced from the output?
- The wireless connection is operational.
What is specified by the host bits in an IP address?
- identity of the computer on the network
What is the default subnet mask for an IP address of 64.100.19.14?
- 255.0.0.0
Which two transport layer protocols enable hosts to communicate and transfer data? (Choose two.)
- TCP
- UDP
A learner wants to interact with the operating system of a computer. Which two methods can be used for this? (Choose two.)
- CLI
- GUI
Which installation option enables a single physical resource to function simultaneously as multiple logical resources?
- upgrade
Which two statements are true about local applications? (Choose two.)
- They are stored on the local hard disk.
- They run on the computer where they are installed.
For an IP address, what component decides the number of bits that is used to represent the host ID?
- network number
What type of cable would be required to connect a Linksys router to a wired PC?
- straight-through cable
Refer to the exhibit. If H4 sends a message to H1 and the destination MAC address is in the MAC table for both Switch1 and Switch2, which host devices will receive the message?
- only H1
Because of an increasing number of users, bandwidth per user on a WLAN has decreased to a point where users are complaining about poor performance. What can be done to improve the user experience?
- Reduce the number of devices using each channel.
What are two best practices that are used when configuring a small home WLAN? (Choose two.)
- the use of pre-shared keys
- the disabling of SSID broadcasting
Which protocol in its default configuration downloads e-mail messages to the client computer and deletes them from the server?
- POP3
What is the purpose of creating a DMZ during network firewall implementation?
- to allow for a publicly accessible zone without compromising the internal network
Which of the following are the address ranges of the private IP addresses? (Choose three.)
- 10.0.0.0 to 10.255.255.255
- 172.16.0.0 to 172.31.255.255
- 192.168.0.0 to 192.168.255.255
What does the term “attenuation” mean in data communication?
- loss of signal strength as distance increases
What advantage does a peer-to-peer network have over a client-server network?
- It eliminates the need for centralized administration.
In an attempt to verify connectivity, a user issues the ping command to a device that is not on the local network. The ping is unsuccessful. What can be determined from this result?
- The router between the host and destination is faulty.
A company has a web server that must be accessible to both external and internal clients. Which security policy best practice should be followed to maximize security of the server?
- Place the web server in a DMZ.
The help desk at a large packaging company receives a call from a user who is concerned about lost data files on the local PC. The help desk technician learns that the user clicked on an icon that appeared to be a program update, but no updates were scheduled for that program. What type of attack has likely occurred?
- Trojan horse
Where do ISPs get the public addresses that they assign to end users?
- ISPs obtain address blocks from registry organizations.
Which transport layer protocol is used when an application requires acknowledgment that data has been delivered?
- TCP
What type of message is sent to a specific group of hosts?
- multicast
A network administrator has been notified that users have experienced problems gaining access to network resources. What utility could be used to directly query a name server for information on a destination domain?
- nslookup
What is the function of CSMA/CA on a wireless Ethernet network?
- to prevent collisions
Refer to the exhibit. Why would a network administrator use the network mode that is shown?
- to support hosts that use different 802.11 standards
When terminating UTP cabling, why is it important to untwist only a small amount of each wire pair?
- minimizes crosstalk
A network technician suspects that malware on a user PC is opening multiple TCP connections to a specific foreign host address. Which Windows command line utility can be used to confirm the multiple TCP connections?
- netstat
What are two examples of storage peripheral devices? (Choose two.)
- flash drive
- external DVD
When acting as a DHCP server, an integrated router can provide what three types of information to a client? (Choose three.)
- default gateway
- dynamic IP address
- DNS server address