Sie sind auf Seite 1von 13

Take Assessment - Final Exam - CCNA 1 Networking Basics (Version 3.

1)

1 Which cable specifications are indicated by 100BASE-T?

100-Mbps transmission speed, baseband signal, coaxial cable


100-Mbps transmission speed, broadband signal, twisted-pair cable
100-Mbps transmission speed, baseband signal, twisted-pair cable
Equal to 10-Gbps transmission speed, baseband signal, twisted-pair cable

2 Which LAN switching mode has the highest latency?

fast forward
fragment-free
latency forwarding
store-and-forward

3 Which of the following must be present for current to flow? (Choose three.)

closed loop
bit-generating device
insulating material
source of voltage
load
switch

4 Which of the following is the binary representation of the decimal number 111?

01101111
01111101
11110111
11101101

5 Which of the following describes a physical full-mesh topology?

It requires termination at both ends of the cable.


It uses a hub or a switch as a central point to connect all wires.
It provides maximum connectivity between all network systems.
It links all computers to a main computer that controls all traffic on the network.

6 What is attenuation?

opposition to the flow of current


measurement of electrical signals relative to time
degradation of a signal as it travels along the medium
amount or volume of traffic that is flowing on the medium

7 Determine the number of useable networks and hosts for the IP address 192.168.50.0/27

4 networks / 62 hosts
6 networks / 64 hosts
32 networks / 8 hosts
6 networks / 30 hosts
8 networks / 32 hosts
2 networks / 8 hosts

8.

Which cable diagram displays the end to end pinout for a crossover cable used with Cisco
devices?

Cable A
Cable B
Cable C
Cable D

9 Which of the following describe the token-passing logical topology? (Choose two.)

FDDI is an example of a token-passing network.


Token-passing logical topologies must also be physical ring topologies.
One of the disadvantages of the token-passing logical topology is the high collision rate.
Computers transmit data after "listening" to the wire to detect other traffic.
Computers are allowed to transmit data only when they possess a token.

10 Which of the following commands could be used on a Windows-based computer to view the
current IP configuration of the system? (Choose two.)

configip
ifconfig
ipconfig
winipcfg
winipconfig

11 How is data encapsulated as it is moved down the OSI model?

data, segments, frames, packets, bits


data, packets, segments, frames, bits
data, segments, packets, frames, bits
data, packets, frames, segments, bits
12 Which of the following are characteristics of IP? (Choose three.)

connection-oriented protocol
connectionless protocol
reliable protocol
unreliable protocol
routed protocol
routing protocol

13 Which of the following devices extend a collision domain? (Choose two.)

switch
hub
bridge
router
repeater

14 How is full-duplex capability typically achieved in fiber-optic cable?

Two fibers are encased in separate sheaths.


Light is bounced at different rates in opposite directions.
Transmit speeds are so high that half-duplex is acceptable.
Colors of the light spectrum are separated into transmit and receive streams.

15 Which of the following is the decimal representation of the binary number 11010011?

203
204
211
212

16 What is verified by the ping 127.0.0.1 command?

the TCP/IP network configuration and is called an internal loopback test


connection to the remote host with the IP address 127.0.0.1
whether the router that connects the local network to other networks can be reached
the route packets take between the local host and the host with the IP address 127.0.0.1

17 When using Category 5 UTP cable, which RJ-45 pin pairs are used to exchange data between
hosts on an Ethernet network?

1 and 2; 4 and 5
1 and 2; 3 and 6
3 and 6; 7 and 8
4 and 5; 7 and 8

18
Which one of the router connectors shown in the graphic would be used for a LAN connection?

Connector A
Connector B
Connector C
Connector D

19 Which of the following increases the potential for a collision to occur?

the use of an active hub instead of an intelligent hub


the use of an intelligent hub instead of an active hub
a reduction in the number of devices attached to the hub
an increase in the number of devices attached to the hub

20

How many collision domains are shown in the diagram?

three
four
five
six
seven
eight
21 Which of the following networking devices divide a network into separate collision domains?
(Choose two.)

repeater
bridge
switch
AUI
hub

22 Which of the following statements are correct about CSMA/CD? (Choose three.)

It is a media access method used in LANs.


It is a media access method used in FDDI WANs.
When a device needs to transmit, it checks to see if the media is available.
A device sends data without checking media availability because all devices have equal access.
Multiple devices can successfully transmit simultaneously.
Only one device can successfully transmit at a time.

23

Examine the graphic with current configurations. The New York Offices of ABC Company recently
upgraded the computers in the administrative office. Shortly after the upgrade, Host A in the
clerical office failed and was replaced with one of the retired administrative office computers.
However, the computer can not access the company network in the new location. What is the
likely cause of this network access issue for Host A?

MAC address incorrectly entered


default gateway incorrectly entered
subnet mask incorrectly entered
IP address incorrectly entered

24 Which of the following are transport layer protocols of the TCP/IP model? (Choose two.)
FTP
UDP
SMTP
TFTP
TCP

25

What information can be determined from the MAC addresses of PC1, PC2, and PC3, as shown
in the graphic? (Choose two.)

PC1 and PC2 NICs need to be replaced because they have the same OUI identifier.
PC2 and PC3 NICs need to be replaced because they have different OUI identifiers.
PC1 and PC2 NICs are from the same vendor.
PC1 and PC3 NICs need to be replaced because they have the same vendor-assigned address.
PC2 and PC3 NICs are from different vendors.
PC2 and PC3 NICs are from the same vendor.

26 A network administrator is placing an older router back in to service. The administrator


discovered that the IOS (internet operation system ) and configuration files need to be updated to
meet the LAN specifications. Which application layer protocol is used to transfer the new
configuration files into the router memory?

SNMP
SMTP
HTTP
TFTP

27 Router interface Ethernet 0 has been assigned the IP address 10.172.192.168


255.255.255.240. What is the address of the subnet to which this address belongs?

10.0.0.0
10.172.0.0
10.172.192.0
10.172.192.160
10.172.192.168
10.172.192.175

28 Which of the following best describes Spanning Tree Protocol?

It enables a network to span across multiple physical segments.


It enables a switch to eliminate switching loops.
It enables a switch to dynamically choose the best switch mode.
It enables a switch to perform as a router.
29 Which type of UTP network cable connects two Cisco switches?

straight-through
crossover
rollover
patch

30 Which of the following subnet masks could be used when subnetting a Class B IP address?
(Choose two.)

255.0.0.0
255.255.0.0
255.192.255.0
255.224.0.0
255.255.252.0
255.255.255.128

31

Refer to the graphic. What must be configured on Host A to allow it communicate with the e-mail
server? (Choose three.)
0
IP address
subnet mask
default gateway
router name
switch name
NetBIOS name address

32
How many broadcast domains are shown in the diagram?

three
four
five
six
seven
eight

33 Which type of address is 192.168.17.134/29?

host address
network address
broadcast address
multicast address

34 Which of the following networking devices increase the number of collision domains? (Choose
three.)

switch
hub
bridge
router
repeater

35 Which type of address is 192.168.17.111/28?

host address
network address
broadcast address
multicast address

36 Which LAN switching mode begins switching after reading only the first 64 bytes of the frame?

fast forward
fragment-free
latency forwarding
store-and-forward

37 What is the maximum length of a media segment used for 100BASE-TX?

100 meters
185 meters
400 meters
500 meters

38 Which of the following describes latency?

the noise generated from outside a cable


the degradation of a signal as it travels along the media
the time required for a NIC to place a frame on the network media
the delay between the time a frame leaves its source device and reaches its destination

39 Which of the following are advantages of UTP cable installation? (Choose three.)

less expensive than fiber optic media


flexible and easy to install in a building
must change termination connection points when upgrading hardware
considered the fastest copper-based media
receives less RFI and EMI interference than fiber optic media
allows for easy WAN hardware upgrades

40 Which of the following OSI layers offers reliable, connection-oriented data communication
services?

application
presentation
session
transport
network

41 How does network cable length affect attenuation?

Category 5 cable that is run in metal conduit has the highest attenuation in the shortest distance.
Shorter cable lengths have greater signal attenuation.
Longer cable lengths have greater signal attenuation.
The length of the cable has no effect on signal attenuation.

42 Which type of cable is required to make a connection between a router console port and a PC
COM port?

straight-through cable
crossover cable
rollover cable
DB-9 cable
coaxial cable
43 Which of the following are considered WAN technologies? (Choose two.)

DSL
Ethernet
Wireless Ethernet
T1-Carrier
Token Ring

44

Based on the graphic above, which of the following occurs as each host system comes on line in
the topology?

The switch sends its MAC address to each host.


The switch adds MAC address to the bridge table as each host sends a frame.
Each host exchanges MAC addresses with each other.
The switch listens for data traffic to block since the switch lacks an IP address.

45 Two peer hosts are running applications that exchange data using UDP. During the current
session, a datagram fails to arrive at the destination. What is true concerning the retransmission
of the datagram?

Datagram retransmission occurs when the retransmission timer expires in the source host.
Datagram retransmission occurs when the retransmission timer expires in the destination host.
Datagram retransmission is controlled by the application layer protocol.
Datagram retransmission involves only the data with sequence numbers equal to or higher than
the sequence number of the current datagram.

46 Which two statements describe the TFTP protocol? (Choose two.)

uses authenticated file transfer procedure


provides connection-oriented service
provides connectionless service
provides more features that FTP
lacks most of the features of FTP

47 Which of the following describes the RIP version 1 routing protocol?

Cisco proprietary hybrid protocol


distance vector protocol that uses hop count as the only metric
link state protocol supporting multiple routed protocols
distance vector protocol that uses delay, bandwidth, load, and reliability metrics

48

Which devices shown in the graphic must have a MAC address?

only PC
only router
PC and router
PC, hub, and router
PC, printer, and router

49

How will the MAIN router dynamically learn a route to the 10.16.10.48/28 subnetwork in the
diagram?

with a routed protocol


with a routing protocol
with a static route
with a directly connected route

50
What kind of connection is represented in the graphic?

console connection
Ethernet connection
ISDN connection
leased line connection

51 When is a straight-through cable used in a network?

when connecting a router through the console port


when connecting one switch to another switch
when connecting a host to a switch
when connecting a router to another router : rollover

52 When is a crossover cable used in a network?

when connecting a host to the router console port : rollover


when connecting a host to a switch
when connecting a host to a host
when connecting a switch to a router

53

Examine the graphic with current configurations. Host A in the Clerical offices failed and was
replaced. Although a ping to 127.0.0.1 was successful, the replacement computer can not access
the company network. What is the likely cause of the problem?

IP address incorrectly entered


network cables unplugged
subnet mask incorrectly entered
network card failure

54 Which of the following application layer protocols use UDP segments? (Choose two.)

DNS
FTP
Telnet
TFTP
SMTP
55 Which of the following are characteristics of UTP cable? (Choose three.)

Each wire is covered by insulating material.


It is not affected by EMI or RFI.
It is a four-pair wire medium.
It is difficult to terminate the cable.
It relies on the cancellation effect produced by the twisted wire pairs.
It is more expensive than any other type of LAN cabling.

Das könnte Ihnen auch gefallen