jueves, 23 de julio de 2015

CCNA 1 Cisco v5.0 - Practice Final Exam

1. A network administrator has been issued a network address of How many subnets of equal size could be created from the assigned /26 network by using a /28 prefix?


A /26 prefix requires the first 2 bits of the last octet for the network portion. The last octet of the assigned network address (64) is 0100 0000 with the first 2 bits reserved for the network portion. Our beginning values go from through to If we now further subdivide that range using a /28 prefix, we need to borrow 2 more bits. Remember that to remain within the .64 to .127 range, the first two bits MUST remain as 01. Because we have only 2 more bits to work with, there are only 4 different combinations. – 0100 0000 – 0101 0000 – 0110 00000 – 0111 00000
Notice that the subnets increment by 16.

2.What will a host on an Ethernet network do if it receives a frame with a destination MAC address that does not match its own MAC address?

It will discard the frame.

3.A router boots and enters setup mode. What is the reason for this?

The configuration file is missing from NVRAM.

4.A user is attempting to do an http://www.cisco.com/ without success. Which two configuration values must be set on the host to allow this access? (Choose two.)

DNS server
default gateway

5.For which three reasons was a packet-switched connectionless data communications technology used when developing the Internet? (Choose three.)

1. It can rapidly adapt to the loss of data transmission facilities.
2. It efficiently utilizes the network infrastructure to transfer data.
3. Data packets can travel multiple paths through the network simultaneously.

6.Refer to the graphic. What is the effect of setting the security mode to WEP on the Linksys integrated router?

It encrypts data between the wireless client and the access point.


R1#config t
R1(config)# enable password Cisco123
R1(config)# enable secret Cisco123
R1(config)# service password-encryption
R1(config)# line con 0
R1(config-line)# password Cisco789
R1(config-line)# end
R1# copy running-config startup-config
R1# reload

Refer to the exhibit.
What will be the result of entering this configuration the next time a network administrator connects a console cable to the router and no additional commands have been entered?

The administrator will be presented with the R1> prompt.
Remember: Until both the password password and the login commands are entered in console line configuration mode, no password is required to gain access to enable mode.

8.Which statement describes a characteristic of the traceroute utility?

It identifies the routers in the path from a source host to a destination host.

9.The administrator of a branch office receives an IPv6 prefix of 2001:db8:3000::/52 from the corporate network manager. How many subnets can the administrator create


10.Which two functions are primary functions of a router? (Choose two.)

packet switching
path selection

11.Which router configuration mode would an administrator use to configure the router for SSH or Telnet login access?


12.Refer to the exhibit.

A network engineer is attempting to connect to a new router to perform the initial configuration. The engineer connects a rollover cable from the serial port of a PC to the Aux port on the router, then configures HyperTerminal as shown. The engineer cannot get a login prompt in HyperTerminal. What would fix the problem?
Move the cable to the router console port.

13.A network administrator is designing a new network infrastructure that includes both wired and wireless connectivity. Under which situation would a wireless connection be recommended?

The end-user device needs mobility when connecting to the network.

14.Which devices should be secured to mitigate against MAC address spoofing attacks?

Layer 2 devices

15.Using default settings, what is the next step in the router boot sequence after the IOS loads from flash?

Locate and load the startup-config file from NVRAM.

16.What information is added during encapsulation at OSI Layer 3?

source and destination IP address

17.A network team is comparing physical WAN topologies for connecting remote sites to a headquarters building. Which topology provides high availability and connects some, but not all, remote sites?

partial mesh

18.The ARP table in a switch maps which two types of address together?

Layer 3 address to a Layer 2 address

19.Match each item to the type of topology diagram on which it is typically identified:

A logical topology diagram typically depicts the IP addressing scheme and groupings of devices and ports. A physical topology diagram shows how those devices are connected to each other and the network, focusing on the physical locations of intermediary devices, configured ports, and cabling.

20.What makes fiber preferable to copper cabling for interconnecting buildings? (Choose three.)

greater distances per cable run
limited susceptibility to EMI/RFI
greater bandwidth potential

21.What are two characteristics of a scalable network? (Choose two.)

1. grows in size without impacting existing users
2. suitable for modular devices that allow for expansion

22.Switch# ping

Type escape sequence to abort.
Sending , 100-byte ICMP Echos to, timeout is 2 seconds: UUUU
Success rate is 0 percent (0/5)

Refer to the exhibit. An administrator is testing connectivity to a remote device with the IP address What does the output of this command indicate

A router along the path did not have a route to the destination.

In the output of the ping command, an exclamation mark (!) indicates a response was successfully received, a period (.) indicates that the connection timed out while waiting for a reply, and the letter “U” indicates that a router along the path did not have a route to the destination and sent an ICMP destination unreachable message back to the source.

23.Fill in the blank using a number.

The minimum Ethernet frame size is______ bytes. Anything smaller than that should be considered a “runt frame.”


Ethernet II and IEEE 802.3 standards define the minimum frame as 64 bytes and the maximum as 1518 bytes.

24.Fill in the blank. Do not abbreviate. Use lower case.

Which interface configuration mode command puts a Layer 3 switch interface into Layer 3 mode?

no switchport

25.To revert to a previous configuration, an administrator issues the command copy tftp startup-config on a router and enters the host address and file name when prompted. After the command is completed, why does the current configuration remain unchanged?

The configuration should have been copied to the running configuration instead.

26.Which is a function of the show ip route command when used as a tool for troubleshooting network connectivity?

shows the IP address of the next hop router for each route

27.A small satellite office has been given the overall network number of and the network technician can subdivide the network addresses as needed. The office needs network access for both wired and wireless devices. However, because of the security consideration, these two networks should be separate. The wired network will have 20 devices. The wireless network has a potential connection of 45 devices. Which addressing scheme would be most efficient for these two networks?

Always calculate the biggest number of host devices first. To accommodate 45 devices, 6 host bits must be left because 26 = 64 (but two addresses cannot be used). The network number for the 45-device network is The broadcast address is Keep in mind that addresses through are for devices. The next network number is for the 20-device wired network. To accommodate 20 devices, 5 bits must be left for host bits because 25 = 32 (but two addresses cannot be used. The mask would be /27 or

28.What is one purpose of the TCP three-way handshake?

synchronizing sequence numbers between source and destination in preparation for data transfer

29.A network administrator is troubleshooting connectivity issues on a server. Using a tester, the administrator notices that the signals generated by the server NIC are distorted and not usable. In which layer of the OSI model is the error categorized?

physical layer

30.A nibble consists of ______ bits.


31.What are two actions performed by a Cisco switch? (Choose two.)

1. using the source MAC addresses of frames to build and maintain a MAC address table
2. utilizing the MAC address table to forward frames via the destination MAC address

32.Why are the paired wires twisted in a CAT5 cable?

to provide eletromagnetic noise cancellation

33.Match the subnetwork to host address that would be included within the subnetwork

Subnet will have a valid host range from – with the broadcast address as
Subnet will have a valid host range from – with the broadcast address as
Subnet will have a valid host range from – with the broadcast address as

34.Open the PT Activity. Perform the tasks in the activity instructions and then answer the question.
What is the secret keyword that is displayed on the web page?


35.Which two statements are correct in a comparison of IPv4 and IPv6 packet headers? (Choose two.)

1. The Source Address field name from IPv4 is kept in IPv6.
2. The Time-to-Live field from IPv4 has been replaced by the Hop Limit field in IPv6.

Remember:The IPv6 packet header fields are as follows: Version, Traffic Class, Flow Label, Payload Length, Next Header, Hop Limit, Source Address, and Destination Address. The IPv4 packet header fields include the following: Version, Differentiated Services, Time-to-Live, Protocol, Source IP Address, and Destination IP Address. Both versions have a 4-bit Version field. Both versions have a Source (IP) Address field. IPv4 addresses are 32 bits; IPv6 addresses are 128 bits. The Time-to-Live or TTL field in IPv4 is now called Hop Limit in IPv6, but this field serves the same purpose in both versions. The value in this 8-bit field decrements each time a packet passes through any router. When this value is 0, the packet is discarded and is not forwarded to any other router.

36.Match each description with the appropriate type of threat

Electrical threats: brownouts
Hardware threat: physical damage to routers
Maintenance threat: poor cabling of the network infrastructure

37.Fill in the blank.

In dotted decimal notation, the IP address ___________ is the last host address for the network

38.Which service will translate private internal IP addresses into Internet routable public IP addresses?


39.A network administrator enters the service password-encryption command into the configuration mode of a router. What does this command accomplish?

This command prevents someone from viewing the running configuration passwords.

40.Which two types of applications rely on their traffic having priority over other traffic types through the network? (Choose two.)


41.What are the three parts of an IPv6 global unicast address? (Choose three.)

global routing prefix
subnet ID
interface ID

42.What three primary functions does data link layer encapsulation provide? (Choose three.)

error detection
frame delimiting

43.A PC that is communicating with a web server is utilizing a window size of 6,000 bytes when sending data and a packet size of 1,500 bytes. What byte of information will the web server acknowledge after it has received four packets of data from the PC?


44.Refer to the exhibit. Which layer of the OSI model would format data in this way?

data link

45.A user calls the help desk to report that a Windows XP workstation is unable to connect to the network after startup and that a popup window says “This connection has limited or no connectivity.” The technician asks the user to issue the ipconfig /all command. The user reports the IP address is with subnet mask of and nothing is displayed for the DNS server IP address. What is the cause of the problem?

The workstation is unable to obtain an IP address from a DHCP server.

46.Refer to the exhibit. Which two settings could be changed to improve security on the wireless network? (Choose two.)

SSID broadcast

47.Which IPv6 address notation is valid?


48.What are two ways that TCP uses the sequence numbers in a segment? (Choose two.)

to identify missing segments at the destination
to reassemble the segments at the remote location

49.What three statements describe features or functions of media access control? (Choose three.)

It is responsible for detecting transmission errors in transmitted data.
Data link layer protocols define the rules for access to different media.
Ethernet utilizes CSMA/CD.

50.Authorized access only!

Refer to the exhibit. From global configuration mode, an administrator is attempting to create a message-of-the-day banner by using the command banner motd V Authorized access only! Violators will be prosecuted! V When users log in using Telnet, the banner does not appear correctly. What is the problem?

The delimiting character appears in the banner message.

51.Why are port numbers included in the TCP header of a segment?

to enable a receiving host to forward the data to the appropriate application

52.What is an ISP?

It is an organization that enables individuals and businesses to connect to the Internet.

53.Refer to the exhibit. HostA is attempting to contact ServerB. Which two statements correctly describe the addressing that HostA will generate in the process? (Choose two.)

A frame with the destination MAC address of RouterA.
A packet with the destination IP address of ServerB.

Remember:In order to send data to ServerB, HostA will generate a packet that contains the IP address of the destination device on the remote network and a frame that contains the MAC address of the default gateway device on the local network.

54.Refer to the exhibit. Using VLSM, what is the largest and smallest subnet mask required on this network in order to minimize address waste? and

55.Open the PT activity. Perform the tasks in the activity instructions and then answer the question.
Which information is obtained from this command output?, non-authoritative answer

56.What is the function of CSMA/CA in a WLAN?

It provides the mechanism for media access.

57.A medium-sized business is researching available options for connecting to the Internet. The company is looking for a high speed option with dedicated, symmetric access. Which connection type should the company choose?

leased line

Descargar el exámen

Espero haber ayudado en algo. Hasta la próxima oportunidad!

No hay comentarios:

Publicar un comentario



Academy (23) Accediendo a datos con ADO .NET (31) Acceso a la red (30) Algoritmo (34) Algoritmos en JAVA (2) Ampliación de clases (2) APRENDA A PROGRAMAR COMO SI ESTUVIERA EN PRIMERO - Autores : IKER AGUINAGA (3) APRENDA A PROGRAMAR COMO SI ESTUVIERA EN PRIMERO - Autores : IKER AGUINAGA (10) Aprendiendo a desarrollar en Windows 8 (5) Aprendiendo UML en 24 Horas (Autor : Joseph Schmuller ) (30) Arquitectura (29) Arquitectura del Computador (3) Arquitectura del Computador - Historia de la informática (1) Asignación de direcciones IP (18) Aspectos fundamentales de bases de datos (5) Auditoría de la dirección (2) Auditoría de Sistemas (3) Auditoría Informática - Un enfoque práctico - Mario G . Piattini y Emilio del Peso (7) Avanzado (23) Base de Datos (67) Básico (23) Bios (29) Business Productivity Online Suite - BPOS (3) Capa de Red (22) Capa de Transporte (16) Capítulo 1 - Documentos HTML5 (6) Capítulo 10. API Web Storage (2) Capítulo 11. API IndexedDB (4) Capítulo 12. API File (1) Capítulo 2. Estilos CSS y modelos de caja (7) Capítulo 3. Propiedades CSS3 (4) Capítulo 4. Javascript (6) Capítulo 5. Video y audio (6) Capítulo 6. Formularios y API Forms (8) Capítulo 7. API Canvas (5) Capítulo 8. API Drag and Drop (2) Capítulo 9. API Geolocation (2) CCNA1 v5.0 (195) CCNA1 v6.0 (23) CCNA2 v5.0 (26) CCNA3 v5.0 (25) CCNA4 v5.0 (23) CD-ROM (3) Chapter 1 How does Xamarin.Forms fit in? (7) Chapter 2 Anatomy of an app (5) Cisco (297) Cloud Computing (3) CNNA v5.0 Routing & Switching (216) CNNA v6.0 Routing & Switching (2) Codigo (2) Computadora (32) Configuración (29) Configuración de un sistema operativo de red (21) Control (29) Creación de tipos de datos y tablas (3) Creación y Administración de bases de datos (3) Creando la Interface de la Aplicación Windows (50) Creating Mobile Apps with Xamarin.Forms (13) Cuenta (29) Curso (32) Curso Aprendiendo a Programar (25) Datos (3) Desarrollando en Windows 8 - AVANZADO (2) Desarrollando en Windows 8 - BÁSICO (3) Desarrollando en Windows 8 - INTERMEDIO (2) Desarrollo (2) Desarrollo .Net (21) Desarrollo avanzado de Windows Store Apps usando C# (1) Desarrollo basado en conceptos de Ingeniería de Software para Visual Studio (2) DESARROLLO DE APLICACIONES WINDOWS CON MICROSOFT .NET (37) DESARROLLO DE APLICACIONES WINDOWS CON MICROSOFT .NET (Autor: Luis Dueñas Huaroto) (29) Desarrollo en Microsoft Visual Studio (44) Desarrollo en Microsoft Visual Studio - AVANZADO (15) Desarrollo en Microsoft Visual Studio - BÁSICO (14) Desarrollo en Microsoft Visual Studio - INTERMEDIO (18) Desarrollo en Windows Phone 8 (13) Diagnostico (4) Diagrama (3) Diagramas de actividades (2) Diagramas de colaboraciones (2) Diagramas de secuencias (2) Digital (2) Diplomado (2) Disco (29) Disco Duro (4) Diseño de aplicaciones de Windows 8 en HTML 5 (7) Dispositivos Electrónicos (11) Doctorado (2) Ejemplos (3) Ejemplos de algoritmos (27) El camino hacia el CSS3 (3) El diseño web flexible (6) El elemento de diseño Canvas (3) El enfoque de los sistemas (3) El flujo de un programa (2) El gran libro de HTML5 - CSS3 y Javascript - Autor: Juan Diego Gauchat (55) El principio de organicidad (7) Electrónica (2) Elementos de un sistema (5) Empresas (2) Entrada y salida (4) Entropía y neguentropía (7) Estrategia (2) Estructura de un programa Java (12) Estructuras de almacenamiento (10) Estructuras de control (6) Estructuras de las tablas en SQL Server (2) Estructuras fundamentales de los datos (2) Ethernet (21) Evolución y Familias de los Microprocesadores (15) Exámen (23) Exploración de la red (23) Extensión de clases (4) Facebook (4) Familia Intel (15) Forefront (8) Función (3) Funciones de una red (12) Funciones de una red informática (1) Fundamentos de C# para absolutos principiantes (17) Fundamentos de programación en Java (50) Generaciones de la computadora (5) Gestión (3) Gestión de riesgos - Auditoría de Sistemas (1) GONZALO MARTÍNEZ (1) Grupos Facebook (1) Harvard (29) Historia de las computadoras (11) HTML5 y CSS3 - Autor: Christophe Aubry (99) HTML5 y CSS3 aplicadal texto (7) HTML5 y CSS3 para los formularios (15) Imágenes (2) Implementación de Windows 7 (11) Información (31) Informática (29) Ingeniería (4) Instalar (29) Inteligencia (2) Inteligencia de Negocios con SQL Server (3) Intermedio (23) Internet (29) Internet Explorer 9 (3) Introducción a ASP.NET 5 (8) Introducción a Java (7) Introducción a jQuery (8) Introducción a la Auditoría de Sistemas (2) Introducción a la teoría general de sistemas (Oscar Johansen Bertoglio) (39) Introducción a Networking (2) Introducción a Window Forms (5) Introducción al acceso a datos con ADO .NET (9) Investigación de Operaciones (12) Java (52) Jump Start de consultas en las bases de datos de Microsoft SQL Server 2012 (8) La definición de un Sistema (6) La evolución del HTML y del CSS (3) La nueva sintaxis HTML5 (12) LA QUINTA DISCIPLINA en la práctica (Autor : Peter Senge) (28) Las animaciones en CSS3 (5) Las transformaciones CSS3 (11) Las transiciones con CSS3 (8) Licenciamiento Microsoft (3) Local Area Network (LAN) - Red de Area Local (2) Lógico (2) Los elementos de la estructura en html5 (9) Los elementos multimedia: audio y vídeo (2) Los estilos de caja en CSS3 (13) Los nuevos selectores de CSS3 (6) Maestría (2) Mantenimiento de Mouse y Teclado (2) Manual de Microsoft SQL Server - Full Transact SQL (68) Manual de soporte técnico para escuelas sobre windows 7 (42) Marco Teorico de Investigación de Operaciones (6) Medios de Almacenamiento (11) Medios de Networking (2) Mejorando la Interface de las Aplicaciones Windows (26) Memoria Tipos y Clases (5) Método (2) Metodología (1) Microsoft (324) Microsoft Lync 2010 (7) Microsoft Silverlight 4.0 (2) Microsoft Virtual Academy (356) Modelo (2) Modelo OSI y TCP-IP (2) Modelos con poco grado de dificultad de Programación Lineal - Investigación de Operaciones (13) Modelos con razonable grado de dificultad de Programación Lineal - Investigación de Operaciones (10) Modelos de desafio de Programación Lineal - Investigación de Operaciones (5) Modelos difíciles de Programación Lineal - Investigación de Operaciones (5) Modelos Fáciles de Programación Lineal - Investigación de Operaciones (13) Modelos lineales con solver (3) Modulo (23) Movimiento (2) Mozilla (29) MS SQL Server (77) MS Virtualization para Profesionales VMware - Gestión (3) MS Virtualization para Profesionales VMware- Plataforma (4) MVA (263) Negocio (2) Nivel Avanzado Desarrollo .Net (6) Nivel Básico Desarrollo .Net (11) Nivel Intermedio Desarrollo .Net (8) Normas técnicas peruanas y su evolución - Auditoría de Sistemas (1) Nube Privada - Avanzado (6) Nube Privada - Básico (6) Nube Privada - Intermedio (6) Office 365 (3) Optimización de Escritorio (10) Optimización de Escritorio - Avanzado (4) Optimización de Escritorio - Básico (3) Optimización de Escritorio - Intermedio (3) ORACLE 10g - ADMINISTRACIÓN Y ANÁLISIS (3) Oracle 10g y el Grid Computing (3) Organización aleatoria y secuencial (1) Partes principales de la Mainboard (12) Perceptron (2) Perfil (2) Periféricos de Entrada / Salida (15) Pesi (2) PHP y MySQL - Manual de aprendizaje para crear un sitio web - Autor : Olivier ROLLET (79) Plan (2) Plataforma (29) PMBOK (24) PMBOK - Guía de los fundamentos para la dirección de proyectos (24) PMBOK - INFLUENCIA DE LA ORGANIZACIÓN Y CICLO DE VIDA DEL PROYECTO (6) PMBOK - Introducción (11) PMBOK - PROCESOS DE LA DIRECCIÓN DE PROYECTOS (5) Prevención - Herramientas e Instrumentos de Medida (9) Principios básicos de enrutamiento y switching (169) Proceso (2) Proceso de auditoría de sistemas informáticos (2) Programación en Android - Auor : Salvador Gómez Oliver (46) Programación paso a paso de C# - Autor : Nacho Cabanes (16) Protocolos y comunicaciones de red (17) Proyecto (2) Qué es un sistema (4) Red de Área Local Inalámbrica (WLAN) (4) Redes (30) Redes inalámbricas - WIRELESS - Conocimiento general (15) Redes neuronales (2) Redes y Comunicaciones (45) Reparación de Fuentes - UPS - Estabilizadores (10) Reparación de Impresoras (9) Reparación de Monitores (16) Router (29) Seguridad en la Nube (3) Seminario (23) Server (24) Sharepoint 2010 - Nivel Básico (6) Sharepoint 2010 - Niveles Avanzados (18) Sharepoint 2010 - Niveles Avanzados - Básico (8) Sharepoint 2010 - Niveles Avanzados - Intermedio (9) Sinergia y recursividad (4) Sistema (33) Sistema de Cableado Estructurado (9) Software (30) SOLUCIÓN GRÁFICA DE MODELOS DE PROGRAMACIÓN LINEALES - INVOPE (8) Soporte a Infraestructura (3) SQL (38) SQL Azure - Introducción (3) Subsistemas de control (4) Tablas (4) Tarjeta Principal del Sistema (10) Tarjetas de Interfaces (7) Tecnología (31) Tecnologías LAN (1) TEORÍA GENERAL DE SISTEMAS (1) Tic (2) Tipo (2) TML5 y CSS3 - Autor: Christophe Aubry (12) Trabajando con el Formulario (7) Un diseño HTML5/CSS3: dConstruct 2011 (3) Un diseño HTML5/CSS3: FlipThru (2) Un diseño HTML5/CSS3: The Cat Template (2) Usando Controles Windows Forms (12) Usando Herramientas de Datos de Visual Studio (6) Ventas (2) Virtualización Hyper - V Nivel Básico (5) Virtualización Hyper - V Nivel Intermedio (5) What’s New in Windows 8.1 Security (4) Window (29) Windows 7 Segunda Fase - AVANZADO (4) Windows 7 Segunda Fase - BÁSICO (6) Windows 7 Segunda Fase - INTERMEDIO (4) Windows 8 - Vista Previa (4) Windows 8.1 To Go (2) Windows Azure (3) Windows Phone 7 (2) Windows Server 2008 R2 (3) Windows Server 2012 - Gestión y Automatización (3) Windows Server 2012 R2 Essentials (7) Windows Server 2012: Almacenamiento (5) Windows Server 2012: Identidad y Acceso (4) Windows Server 2012: Revisión Técnica (7) Xamarin (1)

Páginas vistas en total según Google