CCNA 1 v7.0 Final Exam Answers Full – Introduction to Networks Part 2
This flashcard set covers fundamental networking concepts and protocols, including TCP/IP layers, DNS services, proprietary vs. open protocols, RTP usage, and basic client-server models. It also introduces relevant commands and technologies such as ZigBee and IP configuration tools.
What method is used to manage contention-based access on a wireless network?
token passing
CSMA/CA
priority ordering
CSMA/CD
CSMA/CA
Key Terms
What method is used to manage contention-based access on a wireless network?
token passing
CSMA/CA
priority ordering
CSMA/CD
CSMA/CA
What is a function of the data link layer?
provides the formatting of data
provides end-to-end delivery of data between hosts
provides delivery of data between two applications
provides for the exchange of frames over a common local media
provides for the exchange of frames over a common local media
What is the purpose of the TCP sliding window?
to ensure that segments arrive in order at the destination
to end communication when data transmission is complete
to inform a source to retransmit data from a specific point forward
to request that a source decrease the rate at which it transmits data
to request that a source decrease the rate at which it transmits data
What characteristic describes spyware?
a network device that filters access and traffic coming into a network
software that is installed on a user device and collects information about the user
an attack that slows or crashes a device or network service
the use of stolen credentials to access private data
software that is installed on a user device and collects information about the user
Which switching method drops frames that fail the FCS check?
store-and-forward switching
borderless switching
ingress port buffering
cut-through switching
store-and-forward switching
Which range of link-local addresses can be assigned to an IPv6-enabled interface?
FEC0::/10
FDEE::/7
FE80::/10
FF00::/8
FE80::/10
Related Flashcard Decks
Study Tips
- Press F to enter focus mode for distraction-free studying
- Review cards regularly to improve retention
- Try to recall the answer before flipping the card
- Share this deck with friends to study together
Term | Definition |
---|---|
What method is used to manage contention-based access on a wireless network? token passing | CSMA/CA |
What is a function of the data link layer? provides the formatting of data | provides for the exchange of frames over a common local media |
What is the purpose of the TCP sliding window? to ensure that segments arrive in order at the destination | to request that a source decrease the rate at which it transmits data |
What characteristic describes spyware? a network device that filters access and traffic coming into a network | software that is installed on a user device and collects information about the user |
Which switching method drops frames that fail the FCS check? store-and-forward switching | store-and-forward switching |
Which range of link-local addresses can be assigned to an IPv6-enabled interface? FEC0::/10 | FE80::/10 |
What service is provided by FTP? A basic set of rules for exchanging text, graphic images, sound, video, and other multimedia files on the web. | Allows for data transfers between a client and a file server. |
A user is attempting to access http://www.cisco.com/ without success. Which two configuration values must be set on the host to allow this access? (Choose two.) DNS server | DNS server |
Which two statements accurately describe an advantage or a disadvantage when deploying NAT for IPv4 in a network? (Choose two.) NAT adds authentication capability to IPv4. | NAT introduces problems for some applications that require end-to-end connectivity. |
What would be the interface ID of an IPv6 enabled interface with a MAC address of 1C-6F-65-C2-BD-F8 when the interface ID is generated by using the EUI-64 process? 0C6F:65FF:FEC2:BDF8 | 1E6F:65FF:FEC2:BDF8 |
Refer to the exhibit. PC1 issues an ARP request because it needs to send a packet to PC2. In this scenario, what will happen next? SW1 will send an ARP reply with the SW1 Fa0/1 MAC address. | PC2 will send an ARP reply with the PC2 MAC address. |
What service is provided by BOOTP? Uses encryption to secure the exchange of text, graphic images, sound, and video on the web. | Legacy application that enables a diskless workstation to discover its own IP address and find a BOOTP server on the network. |
What characteristic describes adware? a network device that filters access and traffic coming into a network | software that is installed on a user device and collects information about the user |
When a switch configuration includes a user-defined error threshold on a per-port basis, to which switching method will the switch revert when the error threshold is reached? cut-through | store-and-forward |
Match a statement to the related network model. (Not all options are used.) requires a specific user interface no dedicated server is required a background service is required client and server roles are set on a per request basis devices can only function in one role at a time peer-to-peer network -peer-to-peer aplication - | order:peer-to-peer network |
What are two primary responsibilities of the Ethernet MAC sublayer? (Choose two.) error detection | accessing the media |
Refer to the exhibit. What three facts can be determined from the viewable output of the show ip interface brief command? (Choose three.) Two physical interfaces have been configured. | The switch can be remotely managed. |
Match each type of frame field to its function. (Not all options are used.) addressing error detection type frame start This field checks if the frame has been This field identifies special flow control This field helps to direct the frame This field identifies the beginning of a This field is used by the LLC to identify | This field checks if the frame has been This field helps to direct the frame This field identifies the beginning of a This field is used by the LLC to identify |
What is the subnet ID associated with the IPv6 address 2001:DA48:FC5:A4:3D1B::1/64? 2001:DA48::/64 | 2001:DA48:FC5:A4::/64 |
Match the firewall function to the type of threat protection it provides to the network. (Not all options are used.) packet filtering – prevents access based on IP or MAC address URL filtering – prevents access to websites network address translator – (none) stateful packet inspection – prevents unsolicited incoming sessions application filtering – prevents access by port number | packet filtering – prevents access based on IP or MAC address |
Users are reporting longer delays in authentication and in accessing network resources during certain time periods of the week. What kind of information should network engineers check to find out if this situation is part of a normal network behavior? syslog records and messages | the network performance baseline |
How does the service password-encryption command enhance password security on Cisco routers and switches? It requires encrypted passwords to be used when connecting remotely to a router or switch with Telnet. | It encrypts passwords that are stored in router or switch configuration files. |
Which two statements are correct in a comparison of IPv4 and IPv6 packet headers? (Choose two.) The Source Address field name from IPv4 is kept in IPv6. | The Source Address field name from IPv4 is kept in IPv6. |
A network administrator wants to have the same network mask for all networks at a particular small site. The site has the following networks and number of devices: The network administrator has deemed that 192.168.10.0/24 is to be the network used at this site. Which single subnet mask would make the most efficient use of the available addresses to use for the four subnetworks? 255.255.255.192 | 255.255.255.224 |
What characteristic describes identity theft? the use of stolen credentials to access private data | the use of stolen credentials to access private data |
A network administrator is adding a new LAN to a branch office. The new LAN must support 200 connected devices. What is the smallest network mask that the network administrator can use for the new network? 255.255.255.240 | 255.255.255.0 |
What are three commonly followed standards for constructing and installing cabling? (Choose three.) cost per meter (foot) | cable lengths |
Refer to the exhibit. What is wrong with the displayed termination? The woven copper braid should not have been removed. | The untwisted length of each wire is too long. |
A client packet is received by a server. The packet has a destination port number of 143. What service is the client requesting? IMAP | IMAP |
What are two characteristics shared by TCP and UDP? (Choose two.) default window size | port numbering |
Match the characteristic to the category. (Not all options are used.) contained in the Layer 3 header contained in the Layer 2 header separated into OUI and a unique identifier separated into a network portion and a unique identifier 32 or 128 bits 48 bits 64 bits IP address Target Target Target MAC address Target Target Target | IP address contained in the Layer 3 header MAC address contained in the Layer 2 header |
Refer to the exhibit. Which two network addresses can be assigned to the network containing 10 hosts? Your answers should waste the fewest addresses, not reuse addresses that are already assigned, and stay within the 10.18.10.0/24 range of addresses. (Choose two.) 10.18.10.200/28 | 10.18.10.208/28 |
A client packet is received by a server. The packet has a destination port number of 21. What service is the client requesting? FTP | FTP |
What attribute of a NIC would place it at the data link layer of the OSI model? attached Ethernet cable | MAC address |
A network administrator is adding a new LAN to a branch office. The new LAN must support 10 connected devices. What is the smallest network mask that the network administrator can use for the new network? 255.255.255.192 | 255.255.255.240 |
What technique is used with UTP cable to help protect against signal interference from crosstalk? wrapping a foil shield around the wire pairs | twisting the wires together into pairs |
Refer to the exhibit. The network administrator has assigned the LAN of LBMISS an address range of 192.168.10.0. This address range has been subnetted using a /29 prefix. In order to accommodate a new building, the technician has decided to use the fifth subnet for configuring the new network (subnet zero is the first subnet). By company policies, the router interface is always assigned the first usable host address and the workgroup server is given the last usable host address. Which configuration should be entered into the properties of the workgroup server to allow connectivity to the Internet? IP address: 192.168.10.65 subnet mask: 255.255.255.240, default gateway: 192.168.10.76 | IP address: 192.168.10.38 subnet mask: 255.255.255.248, default gateway: 192.168.10.33 |
Refer to the exhibit. The switches are in their default configuration. Host A needs to communicate with host D, but host A does not have the MAC address for its default gateway. Which network hosts will receive the ARP request sent by host A? only host D | only hosts B, C, and router R1 |
Match a statement to the related network model. (Not all options are used.) requires a specific user interface no dedicated server is required a background service is required client and server roles are set on a per request basis devices can only function in one role at a time peer-to-peer network -peer-to-peer aplication - | Place the options in the following order: |
Refer to the exhibit. A network engineer has been given the network address of 192.168.99.0 and a subnet mask of 255.255.255.192 to subnet across the four networks shown. How many total host addresses are unused across all four subnets? 88 | 200 |
Which connector is used with twisted-pair cabling in an Ethernet LAN? LC conector | RJ 45 (true answer) |
A client packet is received by a server. The packet has a destination port number of 22. What service is the client requesting? SSH | SSH |
What characteristic describes an IPS? a tunneling protocol that provides remote users with secure access into the network of an organization | a network device that filters access and traffic coming into a network |
What service is provided by DHCP? An application that allows real-time chatting among remote users. | Dynamically assigns IP addresses to end and intermediary devices. |
Match the header field with the appropriate layer of the OSI model. (Not all options are used.) Source IP Address Layer 2 -Layer 3 -Layer 4 - | Layer 2 802.2 header FCS (Frame Check Sequence) Destination MAC Address Layer 3 TTL Source IP Address Layer 4 Acknowledgment Number Destination Port Number |
Refer to the exhibit. The switches have a default configuration. Host A needs to communicate with host D, but host A does not have the MAC address for the default gateway. Which network devices will receive the ARP request sent by host A? only host D | only hosts B, C, and router R1 |
Which wireless technology has low-power and low-data rate requirements making it popular in IoT environments? Bluetooth | Zigbee |
What two ICMPv6 message types must be permitted through IPv6 access control lists to allow resolution of Layer 3 addresses to Layer 2 MAC addresses? (Choose two.) neighbor solicitations | neighbor solicitations |
A client is using SLAAC to obtain an IPv6 address for its interface. After an address has been generated and applied to the interface, what must the client do before it can begin to use this IPv6 address? It must send a DHCPv6 INFORMATION-REQUEST message to request the address of the DNS server. | It must send an ICMPv6 Neighbor Solicitation message to ensure that the address is not already in use on the network. |
Two pings were issued from a host on a local network. The first ping was issued to the IP address of the default gateway of the host and it failed. The second ping was issued to the IP address of a host outside the local network and it was successful. What is a possible cause for the failed ping? The default gateway is not operational. | Security rules are applied to the default gateway device, preventing it from processing ping requests. |
An organization is assigned an IPv6 address block of 2001:db8:0:ca00::/56. How many subnets can be created without using bits in the interface ID space? 256 | 256 |
What subnet mask is needed if an IPv4 network has 40 devices that need IP addresses and address space is not to be wasted? 255.255.255.0 | 255.255.255.192 |
Refer to the exhibit. If host A sends an IP packet to host B, what will the destination address be in the frame when it leaves host A? DD:DD:DD:DD:DD:DD | BB:BB:BB:BB:BB:BB |
What is a benefit of using cloud computing in networking? Technology is integrated into every-day appliances allowing them to interconnect with other devices, making them more ‘smart’ or automated. | Network capabilities are extended without requiring investment in new infrastructure, personnel, or software. |
Which two statements are correct about MAC and IP addresses during data transmission if NAT is not involved? (Choose two.) Destination IP addresses in a packet header remain constant along the entire path to a target host. | Destination IP addresses in a packet header remain constant along the entire path to a target host. |
What is one main characteristic of the data link layer? It generates the electrical or optical signals that represent the 1 and 0 on the media. | It shields the upper layer protocol from being aware of the physical medium to be used in the communication. |
What are three characteristics of the CSMA/CD process? (Choose three.) The device with the electronic token is the only one that can transmit after a collision. | A device listens and waits until the media is not busy before transmitting. |
Which information does the show startup-config command display? the IOS image copied into RAM | the contents of the saved configuration file in the NVRAM |
Which two commands can be used on a Windows host to display the routing table? (Choose two.) netstat -s | route print |
What are two functions that are provided by the network layer? (Choose two.) directing data packets to destination hosts on other networks | directing data packets to destination hosts on other networks |
Which two statements describe features of an IPv4 routing table on a router? (Choose two.) Directly connected interfaces will have two route source codes in the routing table: C and S . | It stores information about routes derived from the active router interfaces. |
What characteristic describes a VPN? software on a router that filters traffic based on IP addresses or applications | a tunneling protocol that provides remote users with secure access into the network of an organization |
Why would a Layer 2 switch need an IP address? to enable the switch to send broadcast frames to attached PCs | to enable the switch to be managed remotely |
Match each description to its corresponding term. (Not all options are used.) message encoding message sizing message encapsulation the process of determining when to the process of converting information the process of placing one message the process of unpacking one the process of breaking up a long | the process of determining when to the process of converting information the process of placing one message the process of unpacking one the process of breaking up a long |
A user sends an HTTP request to a web server on a remote network. During encapsulation for this request, what information is added to the address field of a frame to indicate the destination? the network domain of the destination host | the MAC address of the default gateway |
What is an advantage to using a protocol that is defined by an open standard? A company can monopolize the market. | It encourages competition and promotes choices. |
Data is being sent from a source PC to a destination server. Which three statements correctly describe the function of TCP or UDP in this situation? (Choose three.) The source port field identifies the running application or service that will handle data returning to the PC. | The source port field identifies the running application or service that will handle data returning to the PC. |
Match each description with the corresponding TCP mechanism. (Not all options are used.) number of bytes a destination device can accept and process at one time used to identify missing segments of data method of managing segments of data loss received by a sender before transmitting more segments in a session | acknowledgment - received by a sender before transmitting more segments in a session retransmission - method of managing segments of data loss FCS sequence numbers - used to identify missing segments of data window size - number of bytes a destination device can accept and process at one time |
Refer to the exhibit. A company uses the address block of 128.107.0.0/16 for its network. What subnet mask would provide the maximum number of equal size subnets while providing enough host addresses for each subnet in the exhibit? 255.255.255.192 | 255.255.255.128 |
A network administrator wants to have the same subnet mask for three subnetworks at a small site. The site has the following networks and numbers of devices: Subnetwork A: IP phones – 10 addresses What single subnet mask would be appropriate to use for the three subnetworks? 255.255.255.0 | 255.255.255.240 |
Match each item to the type of topology diagram on which it is typically identified. (Not all options are used.) IP address of a server location of a desktop PC in a classroom USB port on a desktop PC in a classroom path of cables that connect rooms to wiring closets physical topology diagram Target Target logical topology diagram Target | physical topology diagram location of a desktop PC in a classroom path of cables that connect rooms to wiring closets logical topology diagram IP address of a server |
What two pieces of information are displayed in the output of the show ip interface brief command? (Choose two.) IP addresses | IP addresses |
A user is complaining that an external web page is taking longer than normal to load.The web page does eventually load on the user machine. Which tool should the technician use with administrator privileges in order to locate where the issue is in the network? ping | tracert |
Which value, that is contained in an IPv4 header field, is decremented by each router that receives a packet? Header Length | Time-to-Live |
A network technician is researching the use of fiber optic cabling in a new technology center. Which two issues should be considered before implementing fiber optic media? (Choose two.) Fiber optic cabling requires different termination and splicing expertise from what copper cabling requires. | Fiber optic cabling requires different termination and splicing expertise from what copper cabling requires. |
Match each description with an appropriate IP address. (Not all options are used.) a link-local address a public address an experimental address a loopback address 127.0.0.1 | 127.0.0.1 - a loopback address 172.18.45.9 240.2.6.255 - an experimental address 198.133.219.2 - a public address 169.254.1.5 - a link-local address |
A user is executing a tracert to a remote device. At what point would a router, which is in the path to the destination device, stop forwarding the packet? when the router receives an ICMP Time Exceeded message | when the value in the TTL field reaches zero |
Users report that the network access is slow. After questioning the employees, the network administrator learned that one employee downloaded a third-party scanning program for the printer. What type of malware might be introduced that causes slow performance of the network? virus | worm |