Ответы netacad на экзамен

Last Updated on December 12, 2022 by

Cisco Netacad ITN Version 7.00 CCNA 1 v7 Final Exam Answers 2021 2022 2023 – Introduction to Networks


  • Recommend

ITN (Version 7.00 & v7.02) – ITNv7 Final Exam Answers 2021 2022 2023 Full 100%

  1. A client packet is received by a server. The packet has a destination port number of 143. What service is the client requesting?

    • Telnet
    • SSH
    • IMAP
    • FTP
  2. Which two functions are performed at the MAC sublayer of the OSI Data Link Layer to facilitate Ethernet communication? (Choose two.) —> Case A

      • handles communication between upper layer networking software and Ethernet NIC hardware
      • places information in the Ethernet frame that identifies which network layer protocol is being encapsulated by the frame
      • implements trailer with frame check sequence for error detection
      • adds Ethernet control information to network protocol data
      • applies delimiting of Ethernet frame fields to synchronize communication between nodes
    • Which two functions are performed at the MAC sublayer of the OSI Data Link Layer to facilitate Ethernet communication? (Choose two.) —> Case B

      • adds Ethernet control information to network protocol data
      • integrates Layer 2 flows between 10 Gigabit Ethernet over fiber and 1 Gigabit Ethernet over copper
      • handles communication between upper layer networking software and Ethernet NIC hardware
      • implements CSMA/CD over legacy shared half-duplex media
      • enables IPv4 and IPv6 to utilize the same physical medium
    • Which two functions are performed at the MAC sublayer of the OSI Data Link Layer to facilitate Ethernet communication? (Choose two.) —> Case C

      • implements trailer with frame check sequence for error detection
      • handles communication between upper layer networking software and Ethernet NIC hardware
      • adds Ethernet control information to network protocol data
      • places information in the Ethernet frame that identifies which network layer protocol is being encapsulated by the frame
      • implements a process to delimit fields within an Ethernet 2 frame
  3. A new network administrator has been asked to enter a banner message on a Cisco device. What is the fastest way a network administrator could test whether the banner is properly configured?

    • Enter CTRL-Z at the privileged mode prompt.
    • Power cycle the device.
    • Exit privileged EXEC mode and press Enter.
    • Exit global configuration mode.
    • Reboot the device.

      Answers Explanation & Hints:

      While at the privileged mode prompt such as Router#, type exit ,press Enter , and the banner message appears. Power cycling a network device that has had the banner motd command issued will also display the banner message, but this is not a quick way to test the configuration.

  4. What happens when the transport input ssh command is entered on the switch vty lines?

    • The switch requires a username/password combination for remote access.
    • The SSH client on the switch is enabled.
    • Communication between the switch and remote users is encrypted.
    • The switch requires remote connections via a proprietary client software.

      Answers Explanation & Hints:

      The transport input ssh command when entered on the switch vty (virtual terminal lines) will encrypt all inbound controlled telnet connections.

  5. What is the subnet ID associated with the IPv6 address 2001:DA48:FC5:A4:3D1B::1/64?

    • 2001:DA48::/64​
    • 2001::/64
    • 2001:DA48:FC5:A4::/64​
    • 2001:DA48:FC5::A4:/64​

      Explanation:

  6. A client is using SLAAC to obtain an IPv6 address for its interface. After an address has been generated and applied to the interface, what must the client do before it can begin to use this IPv6 address?

    • It must send an ICMPv6 Router Solicitation message to determine what default gateway it should use.
    • It must send a DHCPv6 INFORMATION-REQUEST message to request the address of the DNS server.
    • It must send a DHCPv6 REQUEST message to the DHCPv6 server to request permission to use this address.
    • It must send an ICMPv6 Neighbor Solicitation message to ensure that the address is not already in use on the network.

      Explanation:

      Stateless DHCPv6 or stateful DHCPv6 uses a DHCP server, but Stateless Address Autoconfiguration (SLAAC) does not. A SLAAC client can automatically generate an address that is based on information from local routers via Router Advertisement (RA) messages. Once an address has been assigned to an interface via SLAAC, the client must ensure via Duplicate Address Detection (DAD) that the address is not already in use. It does this by sending out an ICMPv6 Neighbor Solicitation message and listening for a response. If a response is received, then it means that another device is already using this address.

  7. Which range of link-local addresses can be assigned to an IPv6-enabled interface?​

    • FE80::/10
    • FDEE::/7​
    • FF00::/8​
    • FEC0::/10​

      Explanation:

      Link-local addresses are in the range of FE80::/10 to FEBF::/10. The original IPv6 specification defined site-local addresses and used the prefix range FEC0::/10, but these addresses were deprecated by the IETF in favor of unique local addresses. FDEE::/7 is a unique local address because it is in the range of FC00::/7 to FDFF::/7. IPv6 multicast addresses have the prefix FF00::/8.

  8. What mechanism is used by a router to prevent a received IPv4 packet from traveling endlessly on a network?

    • It checks the value of the TTL field and if it is 100, it discards the packet and sends a Destination Unreachable message to the source host.
    • It increments the value of the TTL field by 1 and if the result is 100, it discards the packet and sends a Parameter Problem message to the source host.
    • It checks the value of the TTL field and if it is 0, it discards the packet and sends a Destination Unreachable message to the source host.
    • It decrements the value of the TTL field by 1 and if the result is 0, it discards the packet and sends a Time Exceeded message to the source host.
  9. A network administrator is designing the layout of a new wireless network. Which three areas of concern should be accounted for when building a wireless network? (Choose three.)

    • mobility options
    • security
    • interference
    • coverage area
    • packet collision
    • extensive cabling

      Explanation:

      The three areas of concern for wireless networks focus on the size of the coverage area, any nearby interference, and providing network security. Extensive cabling is not a concern for wireless networks, as a wireless network will require minimal cabling for providing wireless access to hosts. Mobility options are not a component of the areas of concern for wireless networks.

  10. Refer to the exhibit. What is wrong with the displayed termination?

    CCNA1 v7 - ITNv7 - Final Exam Answers 07

    CCNA1 v7 – ITNv7 – Final Exam Answers 07
    • The untwisted length of each wire is too long.
    • The woven copper braid should not have been removed.
    • The wrong type of connector is being used.
    • The wires are too thick for the connector that is used.

      Answers Explanation & Hints:

      When a cable to an RJ-45 connector is terminated, it is important to ensure that the untwisted wires are not too long and that the flexible plastic sheath surrounding the wires is crimped down and not the bare wires. None of the colored wires should be visible from the bottom of the jack.

  11. A network administrator notices that some newly installed Ethernet cabling is carrying corrupt and distorted data signals. The new cabling was installed in the ceiling close to fluorescent lights and electrical equipment. Which two factors may interfere with the copper cabling and result in signal distortion and data corruption? (Choose two.)

    • EMI
    • signal attenuation
    • crosstalk
    • RFI
    • extended length of cabling

      Explanation:

      EMI and RFI signals can distort and corrupt data signals that are carried by copper media. These distortions usually come from radio waves and electromagnetic devices such as motors and florescent lights. Crosstalk is a disturbance that is caused by adjacent wires bundled too close together with the magnetic field of one wire affecting another. Signal attenuation is caused when an electrical signal begins to deteriorate over the length of a copper cable.

  12. Data is being sent from a source PC to a destination server. Which three statements correctly describe the function of TCP or UDP in this situation? (Choose three.)

    • TCP is the preferred protocol when a function requires lower network overhead.
    • The source port field identifies the running application or service that will handle data returning to the PC.
    • The TCP source port number identifies the sending host on the network.
    • UDP segments are encapsulated within IP packets for transport across the network.
    • The UDP destination port number identifies the application or service on the server which will handle the data.
    • The TCP process running on the PC randomly selects the destination port when establishing a session with the server.

      Explanation:

      Layer 4 port numbers identify the application or service which will handle the data. The source port number is added by the sending device and will be the destination port number when the requested information is returned. Layer 4 segments are encapsulated within IP packets. UDP, not TCP, is used when low overhead is needed. A source IP address, not a TCP source port number, identifies the sending host on the network. Destination port numbers are specific ports that a server application or service monitors for requests.

  13. Match the application protocols to the correct transport protocols.

    CCNA1 v7 - ITNv7 - Final Exam Answers 01

    CCNA1 v7 – ITNv7 – Final Exam Answers 01
  14. A group of Windows PCs in a new subnet has been added to an Ethernet network. When testing the connectivity, a technician finds that these PCs can access local network resources but not the Internet resources. To troubleshoot the problem, the technician wants to initially confirm the IP address and DNS configurations on the PCs, and also verify connectivity to the local router. Which three Windows CLI commands and utilities will provide the necessary information? (Choose three.)

    • netsh interface ipv6 show neighbor
    • arp -a
    • tracert
    • ping
    • ipconfig
    • nslookup
    • telnet

      Explanation:

      The ipconfig and nslookup commands will provide initial IP address and DNS configuration information to the technicians and determine if DHCP is assigning correct information to the PCs. The ping utility would be used to verify, or not, connectivity to the default gateway (router) using the configured default gateway address, or using the known correct default gateway address if these are found to be different. The arp -a or netsh interface ipv6 show neighbor commands could be used if the problem is then suspected to be an IP address to MAC address mapping issue. The telnet and tracert utilities could be used to determine where the problem was located in the network if the default gateway configuration was found to be correct.

  15. What two pieces of information are displayed in the output of the show ip interface brief command? (Choose two.)

    • speed and duplex settings
    • MAC addresses
    • next-hop addresses
    • interface descriptions
    • IP addresses
    • Layer 1 statuses

      Explanation:

      The command show ip interface brief shows the IP address of each interface, as well as the operational status of the interfaces at both Layer 1 and Layer 2. In order to see interface descriptions and speed and duplex settings, use the command show running-config interface. Next-hop addresses are displayed in the routing table with the command show ip route, and the MAC address of an interface can be seen with the command show interfaces.

  16. A network administrator is adding a new LAN to a branch office. The new LAN must support 25 connected devices. What is the smallest network mask that the network administrator can use for the new network?

    • 255.255.255.224
    • 255.255.255.192
    • 255.255.255.240
    • 255.255.255.128
  17. Which frame field is created by a source node and used by a destination node to ensure that a transmitted data signal has not been altered by interference, distortion, or signal loss?

    • transport layer error check field
    • error correction process field
    • flow control field
    • User Datagram Protocol field
    • frame check sequence field
  18. What is a function of the data link layer?

    • provides delivery of data between two applications
    • provides for the exchange of frames over a common local media
    • provides end-to-end delivery of data between hosts
    • provides the formatting of data
  19. What are three characteristics of the CSMA/CD process? (Choose three.)

    • After detecting a collision, hosts can attempt to resume transmission after a random time delay has expired.
    • A jam signal indicates that the collision has cleared and the media is not busy.
    • All of the devices on a segment see data that passes on the network medium.
    • The device with the electronic token is the only one that can transmit after a collision.
    • Devices can be configured with a higher transmission priority.
    • A device listens and waits until the media is not busy before transmitting.
  20. What characteristic describes a Trojan horse?

    • an attack that slows or crashes a device or network service
    • malicious software or code running on an end device
    • a network device that filters access and traffic coming into a network
    • the use of stolen credentials to access private data
  21. What three requirements are defined by the protocols used in network communcations to allow message transmission across a network? (Choose three.)

    • end-device installation
    • media selection
    • message encoding
    • delivery options
    • connector specifications
    • message size
  22. What are two features of ARP? (Choose two.)

    • If a device receiving an ARP request has the destination IPv4 address, it responds with an ARP reply.
    • When a host is encapsulating a packet into a frame, it refers to the MAC address table to determine the mapping of IP addresses to MAC addresses.
    • If no device responds to the ARP request, then the originating node will broadcast the data packet to all devices on the network segment.
    • An ARP request is sent to all devices on the Ethernet LAN and contains the IP address of the destination host and its multicast MAC address.
    • If a host is ready to send a packet to a local destination device and it has the IP address but not the MAC address of the destination, it generates an ARP broadcast.

      Explanation:

      When a node encapsulates a data packet into a frame, it needs the destination MAC address. First it determines if the destination device is on the local network or on a remote network. Then it checks the ARP table (not the MAC table) to see if a pair of IP address and MAC address exists for either the destination IP address (if the destination host is on the local network) or the default gateway IP address (if the destination host is on a remote network). If the match does not exist, it generates an ARP broadcast to seek the IP address to MAC address resolution. Because the destination MAC address is unknown, the ARP request is broadcast with the MAC address FFFF.FFFF.FFFF. Either the destination device or the default gateway will respond with its MAC address, which enables the sending node to assemble the frame. If no device responds to the ARP request, then the originating node will discard the packet because a frame cannot be created.

  23. Refer to the exhibit. An administrator is trying to configure the switch but receives the error message that is displayed in the exhibit. What is the problem?

    CCNA1 v7 - ITNv7 - Final Exam Answers 06

    CCNA1 v7 – ITNv7 – Final Exam Answers 06
    • The entire command, configure terminal , must be used.
    • The administrator must connect via the console port to access global configuration mode.
    • The administrator is already in global configuration mode.
    • The administrator must first enter privileged EXEC mode before issuing the command.

      Answers Explanation & Hints:

      In order to enter global configuration mode, the command configure terminal , or a shortened version such as config t , must be entered from privileged EXEC mode. In this scenario the administrator is in user EXEC mode, as indicated by the > symbol after the hostname. The administrator would need to use the enable command to move into privileged EXEC mode before entering the configure terminal command.

  24. Refer to the exhibit. On the basis of the output, which two statements about network connectivity are correct? (Choose two.)

    CCNA1 v7 - ITNv7 - Final Exam Answers 05

    CCNA1 v7 – ITNv7 – Final Exam Answers 05
    • This host does not have a default gateway configured.
    • There are 4 hops between this device and the device at 192.168.100.1.
    • The average transmission time between the two hosts is 2 milliseconds.
    • There is connectivity between this device and the device at 192.168.100.1.
    • The connectivity between these two hosts allows for videoconferencing calls.

      Explanation:

      The output displays a successful Layer 3 connection between a host computer and a host at 19.168.100.1. It can be determined that 4 hops exist between them and the average transmission time is 1 milliseconds. Layer 3 connectivity does not necessarily mean that an application can run between the hosts.

  25. What are two characteristics of IP? (Choose two.)

    • retransmits packets if errors occur
    • guarantees delivery of packets
    • does not require a dedicated end-to-end connection
    • operates independently of the network media
    • re-assembles out of order packets into the correct order at the receiver end

      Explanation:

      The Internet Protocol (IP) is a connectionless, best effort protocol. This means that IP requires no end-to-end connection nor does it guarantee delivery of packets. IP is also media independent, which means it operates independently of the network media carrying the packets.

  26. What will happen if the default gateway address is incorrectly configured on a host?

    • The host cannot communicate with hosts in other networks.
    • The host cannot communicate with other hosts in the local network.
    • A ping from the host to 127.0.0.1 would not be successful.
    • The switch will not forward packets initiated by the host.
    • The host will have to use ARP to determine the correct address of the default gateway.

      Answers Explanation & Hints:

      When a host needs to send a message to another host located on the same network, it can forward the message directly. However, when a host needs to send a message to a remote network, it must use the router, also known as the default gateway. This is because the data link frame address of the remote destination host cannot be used directly. Instead, the IP packet has to be sent to the router (default gateway) and the router will forward the packet toward its destination. Therefore, if the default gateway is incorrectly configured, the host can communicate with other hosts on the same network, but not with hosts on remote networks.

  27. Users report that the network access is slow. After questioning the employees, the network administrator learned that one employee downloaded a third-party scanning program for the printer. What type of malware might be introduced that causes slow performance of the network?

    • spam
    • virus
    • worm
    • phishing

      Explanation:

  28. A company has a file server that shares a folder named Public. The network security policy specifies that the Public folder is assigned Read-Only rights to anyone who can log into the server while the Edit rights are assigned only to the network admin group. Which component is addressed in the AAA network service framework?

    • automation
    • authorization
    • accounting
    • authentication

      Explanation:

      After a user is successfully authenticated (logged into the server), the authorization is the process of determining what network resources the user can access and what operations (such as read or edit) the user can perform.

  29. What are two common causes of signal degradation when using UTP cabling? (Choose two.)

    • loss of light over long distances
    • low-quality cable or connectors
    • low-quality shielding in cable
    • installing cables in conduit
    • improper termination
  30. Which scenario describes a function provided by the transport layer?

    • A student has two web browser windows open in order to access two web sites. The transport layer ensures the correct web page is delivered to the correct browser window.
    • A student is using a classroom VoIP phone to call home. The unique identifier burned into the phone is a transport layer address used to contact another network device on the same network.
    • A corporate worker is accessing a web server located on a corporate network. The transport layer formats the screen so the web page appears properly no matter what device is being used to view the web site.
    • A student is playing a short web-based movie with sound. The movie and sound are encoded within the transport layer header.

      Explanation:

      The source and destination port numbers are used to identify the correct application and window within that application.

  31. What is the consequence of configuring a router with the ipv6 unicast-routing global configuration command?

    • ​Each router interface will generate an IPv6 link-local address.​
    • The IPv6 enabled router interfaces begin sending ICMPv6 Router Advertisement messages.
    • It statically creates a global unicast address on this router.​
    • All router interfaces will be automatically activated.
  32. Which two protocols operate at the top layer of the TCP/IP protocol suite? (Choose two.)

    • POP
    • DNS
    • IP
    • TCP
    • Ethernet
    • UDP
  33. An employee of a large corporation remotely logs into the company using the appropriate username and password. The employee is attending an important video conference with a customer concerning a large sale. It is important for the video quality to be excellent during the meeting. The employee is unaware that after a successful login, the connection to the company ISP failed. The secondary connection, however, activated within seconds. The disruption was not noticed by the employee or other employees.
    What three network characteristics are described in this scenario? (Choose three.)

    • integrity
    • scalability
    • quality of service
    • fault tolerance
    • powerline networking
    • security
  34. Refer to the exhibit. If PC1 is sending a packet to PC2 and routing has been configured between the two routers, what will R1 do with the Ethernet frame header attached by PC1?

    CCNA1 v7 - ITNv7 - Final Exam Answers 04

    CCNA1 v7 – ITNv7 – Final Exam Answers 04
    • open the header and use it to determine whether the data is to be sent out S0/0/0
    • open the header and replace the destination MAC address with a new one
    • nothing, because the router has a route to the destination network
    • remove the Ethernet header and configure a new Layer 2 header before sending it out S0/0/0

      Explanation:

      When PC1 forms the various headers attached to the data one of those headers is the Layer 2 header. Because PC1 connects to an Ethernet network, an Ethernet header is used. The source MAC address will be the MAC address of PC1 and the destination MAC address will be that of G0/0 on R1. When R1 gets that information, the router removes the Layer 2 header and creates a new one for the type of network the data will be placed onto (the serial link).

  35. Which three layers of the OSI model map to the application layer of the TCP/IP model? (Choose three.)

    • transport
    • application
    • network
    • session
    • data link
    • presentation

      Explanation:

  36. Match each description with an appropriate IP address. (Not all options are used.)

    CCNA1 v7 - ITNv7 - Final Exam Answers 02

    CCNA1 v7 – ITNv7 – Final Exam Answers 02

    Explanation:

    Link-Local addresses are assigned automatically by the OS environment and are located in the block 169.254.0.0/16. The private addresses ranges are 10.0.0.0/8, 172.16.0.0/12, and 192.168.0.0/16. TEST-NET addresses belong to the range 192.0.2.0/24. The addresses in the block 240.0.0.0 to 255.255.255.254 are reserved as experimental addresses. Loopback addresses belong to the block 127.0.0.0/8.

  37. What does the term “attenuation” mean in data communication?

    • strengthening of a signal by a networking device
    • leakage of signals from one cable pair to another
    • loss of signal strength as distance increases
    • time for a signal to reach its destination

      Answers Explanation & Hints:

      Data is transmitted on copper cables as electrical pulses. A detector in the network interface of a destination device must receive a signal that can be successfully decoded to match the signal sent. However, the farther the signal travels, the more it deteriorates. This is referred to as signal attenuation.

  38. Which two statements describe how to assess traffic flow patterns and network traffic types using a protocol analyzer? (Choose two.)

    • Capture traffic during peak utilization times to get a good representation of the different traffic types.
    • Perform the capture on different network segments.
    • Only capture WAN traffic because traffic to the web is responsible for the largest amount of traffic on a network.
    • Only capture traffic in the areas of the network that receive most of the traffic such as the data center.
    • Capture traffic on the weekends when most employees are off work.

      Explanation:

      Traffic flow patterns should be gathered during peak utilization times to get a good representation of the different traffic types. The capture should also be performed on different network segments because some traffic will be local to a particular segment.

  39. Refer to the exhibit. Host B on subnet Teachers transmits a packet to host D on subnet Students. Which Layer 2 and Layer 3 addresses are contained in the PDUs that are transmitted from host B to the router?

    CCNA1 v7 - ITNv7 - Final Exam Answers 03

    CCNA1 v7 – ITNv7 – Final Exam Answers 03
    • Layer 2 destination address = 00-00-0c-94-36-dd
      Layer 2 source address = 00-00-0c-94-36-bb
      Layer 3 destination address = 172.16.20.200
      Layer 3 source address = 172.16.10.200
    • Layer 2 destination address = 00-00-0c-94-36-ab
      Layer 2 source address = 00-00-0c-94-36-bb
      Layer 3 destination address = 172.16.20.200
      Layer 3 source address = 172.16.100.200
    • Layer 2 destination address = 00-00-0c-94-36-ab
      Layer 2 source address = 00-00-0c-94-36-bb
      Layer 3 destination address = 172.16.20.200
      Layer 3 source address = 172.16.10.200
    • Layer 2 destination address = 00-00-0c-94-36-cd
      Layer 2 source address = 00-00-0c-94-36-bb
      Layer 3 destination address = 172.16.20.99
      Layer 3 source address = 172.16.10.200
  40. Which subnet would include the address 192.168.1.96 as a usable host address?

    • 192.168.1.32/27
    • 192.168.1.32/28
    • 192.168.1.64/29
    • 192.168.1.64/26

      Explanation:

      For the subnet of 192.168.1.64/26, there are 6 bits for host addresses, yielding 64 possible addresses. However, the first and last subnets are the network and broadcast addresses for this subnet. Therefore, the range of host addresses for this subnet is 192.168.1.65 to 192.168.1.126. The other subnets do not contain the address 192.168.1.96 as a valid host address.

  41. What are two problems that can be caused by a large number of ARP request and reply messages? (Choose two.)

    • A large number of ARP request and reply messages may slow down the switching process, leading the switch to make many changes in its MAC table.
    • The ARP request is sent as a broadcast, and will flood the entire subnet.
    • Switches become overloaded because they concentrate all the traffic from the attached subnets.
    • All ARP request messages must be processed by all nodes on the local network.
    • The network may become overloaded because ARP reply messages have a very large payload due to the 48-bit MAC address and 32-bit IP address that they contain.
  42. Why would a Layer 2 switch need an IP address?

    • to enable the switch to be managed remotely
    • to enable the switch to receive frames from attached PCs
    • to enable the switch to send broadcast frames to attached PCs
    • to enable the switch to function as a default gateway

      Answers Explanation & Hints:

      A switch, as a Layer 2 device, does not need an IP address to transmit frames to attached devices. However, when a switch is accessed remotely through the network, it must have a Layer 3 address. The IP address must be applied to a virtual interface rather than to a physical interface. Routers, not switches, function as default gateways.

  43. How does the service password-encryption command enhance password security on Cisco routers and switches?

    • It requires encrypted passwords to be used when connecting remotely to a router or switch with Telnet.
    • It encrypts passwords that are stored in router or switch configuration files.
    • It requires that a user type encrypted passwords to gain console access to a router or switch.
    • It encrypts passwords as they are sent across the network.

      Explanation:

      The service password-encryption command encrypts plaintext passwords in the configuration file so that they cannot be viewed by unauthorized users.

  44. Which two statements are correct in a comparison of IPv4 and IPv6 packet headers? (Choose two.)

    • The Destination Address field is new in IPv6.
    • The Source Address field name from IPv4 is kept in IPv6.
    • The Version field from IPv4 is not kept in IPv6.
    • The Time-to-Live field from IPv4 has been replaced by the Hop Limit field in IPv6.
    • The Header Checksum field name from IPv4 is kept in IPv6.
  45. Which two statements accurately describe an advantage or a disadvantage when deploying NAT for IPv4 in a network? (Choose two.)

    • NAT will impact negatively on switch performance.
    • NAT causes routing tables to include more information.
    • NAT improves packet handling.
    • NAT adds authentication capability to IPv4.
    • NAT provides a solution to slow down the IPv4 address depletion.
    • NAT introduces problems for some applications that require end-to-end connectivity.
  46. Match each item to the type of topology diagram on which it is typically identified. (Not all options are used.)

    CCNA1 v7 Final Exam Answers 003

    CCNA1 v7 Final Exam Answers 003

    Explanation:

    A logical topology diagram typically depicts the IP addressing scheme and groupings of devices and ports. A physical topology diagram shows how those devices are connected to each other and the network, focusing on the physical locations of intermediary devices, configured ports, and cabling.

  47. What service is provided by HTTP?

    • An application that allows real-time chatting among remote users.
    • Uses encryption to secure the exchange of text, graphic images, sound, and video on the web.
    • Allows for data transfers between a client and a file server.
    • A basic set of rules for exchanging text, graphic images, sound, video, and other multimedia files on the web.
  48. A client packet is received by a server. The packet has a destination port number of 67. What service is the client requesting?

    • Telnet
    • FTP
    • SSH
    • DHCP
  49. What are the two most effective ways to defend against malware? (Choose two.)

    • Implement strong passwords.
    • Update the operating system and other application software.
    • Install and update antivirus software.
    • Implement RAID.
    • Implement a VPN.
    • Implement network firewalls.

      Explanation:

  50. An administrator defined a local user account with a secret password on router R1 for use with SSH. Which three additional steps are required to configure R1 to accept only encrypted SSH connections? (Choose three.)

    • Configure the IP domain name on the router.
    • Enable inbound vty Telnet sessions.
    • Configure DNS on the router.
    • Generate the SSH keys.
    • Generate two-way pre-shared keys.
    • Enable inbound vty SSH sessions.

      Explanation:

      There are four steps to configure SSH support on a Cisco router:
      Step 1: Set the domain name.
      Step 2: Generate one-way secret keys.
      Step 3: Create a local username and password.
      Step 4: Enable SSH inbound on a vty line.

  51. A host is trying to send a packet to a device on a remote LAN segment, but there are currently no mappings in its ARP cache. How will the device obtain a destination MAC address?

    • It will send the frame and use its own MAC address as the destination.
    • It will send the frame with a broadcast MAC address.
    • It will send an ARP request for the MAC address of the destination device.
    • It will send a request to the DNS server for the destination MAC address.
    • It will send an ARP request for the MAC address of the default gateway.
  52. Match the header field with the appropriate layer of the OSI model. (Not all options are used.)

    CCNA1 v7 - ITNv7 - Final Exam Answers 03

    CCNA1 v7 – ITNv7 – Final Exam Answers 03
  53. When a switch configuration includes a user-defined error threshold on a per-port basis, to which switching method will the switch revert when the error threshold is reached?

    • fast-forward
    • cut-through
    • store-and-forward
    • fragment-free
  54. What are proprietary protocols?

    • protocols that can be freely used by any organization or vendor
    • protocols developed by private organizations to operate on any vendor hardware
    • a collection of protocols known as the TCP/IP protocol suite
    • protocols developed by organizations who have control over their definition and operation

      Explanation:

      Proprietary protocols have their definition and operation controlled by one company or vendor. Some of them can be used by different organizations with permission from the owner. The TCP/IP protocol suite is an open standard, not a proprietary protocol.

  55. What is an advantage to using a protocol that is defined by an open standard?

    • An open standard protocol is not controlled or regulated by standards organizations.
    • A company can monopolize the market.
    • It encourages competition and promotes choices.
    • The protocol can only be run on equipment from a specific vendor.

      Explanation:

      A monopoly by one company is not a good idea from a user point of view. If a protocol can only be run on one brand, it makes it difficult to have mixed equipment in a network. A proprietary protocol is not free to use. An open standard protocol will in general be implemented by a wide range of vendors.

  56. Which type of server relies on record types such as A, NS, AAAA, and MX in order to provide services?

    • email
    • file
    • web
    • DNS

      Explanation:

  57. Match a statement to the related network model. (Not all options are used.)

    ITN Chapter 10 Exam Answers 02

    ITN Chapter 10 Exam Answers 02

    Explanation:

    Peer-to-peer networks do not require the use of a dedicated server, and devices can assume both client and server roles simultaneously on a per request basis. Because they do not require formalized accounts or permissions, they are best used in limited situations. Peer-to-peer applications require a user interface and background service to be running, and can be used in more diverse situations.

  58. A network administrator wants to have the same network mask for all networks at a particular small site. The site has the following networks and number of devices:

    IP phones – 22 addresses
    PCs – 20 addresses needed
    Printers – 2 addresses needed
    Scanners – 2 addresses needed

    The network administrator has deemed that 192.168.10.0/24 is to be the network used at this site. Which single subnet mask would make the most efficient use of the available addresses to use for the four subnetworks?

    • 255.255.255.240
    • 255.255.255.0
    • 255.255.255.192
    • 255.255.255.224
    • 255.255.255.248
    • 255.255.255.252

      Explanation:

  59. Refer to the exhibit. The network administrator has assigned the LAN of LBMISS an address range of 192.168.10.0. This address range has been subnetted using a /29 prefix. In order to accommodate a new building, the technician has decided to use the fifth subnet for configuring the new network (subnet zero is the first subnet). By company policies, the router interface is always assigned the first usable host address and the workgroup server is given the last usable host address. Which configuration should be entered into the properties of the workgroup server to allow connectivity to the Internet?

    CCNA1 v7 - ITNv7 - Final Exam Answers 02

    CCNA1 v7 – ITNv7 – Final Exam Answers 02
    • IP address: 192.168.10.38 subnet mask: 255.255.255.248, default gateway: 192.168.10.33
    • IP address: 192.168.10.38 subnet mask: 255.255.255.240, default gateway: 192.168.10.33
    • IP address: 192.168.10.254 subnet mask: 255.255.255.0, default gateway: 192.168.10.1
    • IP address: 192.168.10.41 subnet mask: 255.255.255.248, default gateway: 192.168.10.46
    • IP address: 192.168.10.65 subnet mask: 255.255.255.240, default gateway: 192.168.10.76

      Explanation:

  60. Refer to the exhibit. A network engineer has been given the network address of 192.168.99.0 and a subnet mask of 255.255.255.192 to subnet across the four networks shown. How many total host addresses are unused across all four subnets?

    CCNA1 v7 - ITNv7 - Final Exam Answers 01

    CCNA1 v7 – ITNv7 – Final Exam Answers 01
    • 158
    • 200
    • 224
    • 88
    • 72

      Explanation:

  61. What would be the interface ID of an IPv6 enabled interface with a MAC address of 1C-6F-65-C2-BD-F8 when the interface ID is generated by using the EUI-64 process?

    • 1E6F:65FF:FEC2:BDF8
    • C16F:65FF:FEC2:BDF8
    • 0C6F:65FF:FEC2:BDF8
    • 106F:65FF:FEC2:BDF8
  62. Which information does the show startup-config command display?​

    • the IOS image copied into RAM
    • the bootstrap program in the ROM
    • the contents of the saved configuration file in the NVRAM
    • the contents of the current running configuration file in the RAM
  63. Match each type of frame field to its function. (Not all options are used.)

    CCNA1 v7 Final Exam Answers 004

    CCNA1 v7 Final Exam Answers 004
  64. What are two primary responsibilities of the Ethernet MAC sublayer? (Choose two.)

    • accessing the media
    • data encapsulation
    • logical addressing
    • error detection
    • frame delimiting
  65. Match the characteristic to the forwarding method. (Not all options are used.)

    CCNA1 v7 Final Exam Answers 005

    CCNA1 v7 Final Exam Answers 005
  66. Which switching method drops frames that fail the FCS check?

    • store-and-forward switching
    • ingress port buffering
    • cut-through switching
    • borderless switching
  67. What is an advantage for small organizations of adopting IMAP instead of POP?

    • IMAP sends and retrieves email, but POP only retrieves email.
    • POP only allows the client to store messages in a centralized way, while IMAP allows distributed storage.
    • Messages are kept in the mail servers until they are manually deleted from the email client.
    • When the user connects to a POP server, copies of the messages are kept in the mail server for a short time, but IMAP keeps them for a long time.

      Explanation:

  68. A wired laser printer is attached to a home computer. That printer has been shared so that other computers on the home network can also use the printer. What networking model is in use?

    • point-to-point
    • client-based
    • peer-to-peer (P2P)
    • master-slave

      Explanation:

  69. A network administrator is adding a new LAN to a branch office. The new LAN must support 200 connected devices. What is the smallest network mask that the network administrator can use for the new network?

    • 255.255.255.224
    • 255.255.255.240
    • 255.255.255.192
    • 255.255.255.0
  70. Which wireless technology has low-power and data rate requirements making it popular in home automation applications?

    • ZigBee
    • 5G
    • Wi-Fi
    • LoRaWAN
  71. What are two characteristics shared by TCP and UDP? (Choose two.)

    • ability to to carry digitized voice
    • 3-way handshake
    • default window size
    • connectionless communication
    • port numbering
    • use of checksum

      Explanation:

  72. A client packet is received by a server. The packet has a destination port number of 69. What service is the client requesting?

    • DHCP
    • SMTP
    • TFTP
    • DNS
  73. What service is provided by Internet Messenger?

    • An application that allows real-time chatting among remote users.
    • Resolves domain names, such as cisco.com, into IP addresses.
    • Uses encryption to provide secure remote access to network devices and servers.
    • Allows remote access to network devices and servers.
  74. What characteristic describes antispyware?

    • a tunneling protocol that provides remote users with secure access into the network of an organization
    • a network device that filters access and traffic coming into a network
    • applications that protect end devices from becoming infected with malicious software
    • software on a router that filters traffic based on IP addresses or applications
  75. A network administrator wants to have the same subnet mask for three subnetworks at a small site. The site has the following networks and numbers of devices:

    Subnetwork A: IP phones – 10 addresses
    Subnetwork B: PCs – 8 addresses
    Subnetwork C: Printers – 2 addresses
    What single subnet mask would be appropriate to use for the three subnetworks?

    • 255.255.255.240
    • 255.255.255.0
    • 255.255.255.248
    • 255.255.255.252

      Explanation:

  76. Refer to the exhibit. A company uses the address block of 128.107.0.0/16 for its network. What subnet mask would provide the maximum number of equal size subnets while providing enough host addresses for each subnet in the exhibit?

    CCNA1 v7 – ITNv7 – Final Exam Answers 08
    • 255.255.255.128
    • 255.255.255.224
    • 255.255.255.192
    • 255.255.255.0
    • 255.255.255.240
  77. Refer to the exhibit. Which protocol was responsible for building the table that is shown?

    CCNA1 v7 - ITNv7 - Final Exam Answers 09

    CCNA1 v7 – ITNv7 – Final Exam Answers 09
    • ARP
    • DNS
    • DHCP
    • ICMP
  78. Which two traffic types use the Real-Time Transport Protocol (RTP)? (Choose two.)

    • web
    • peer to peer
    • file transfer
    • video
    • voice
  79. Match the type of threat with the cause. (Not all options are used.)

    CCNA1 v7 Final Exam Answers 006

    CCNA1 v7 Final Exam Answers 006
  80. Refer to the exhibit. The switches are in their default configuration. Host A needs to communicate with host D, but host A does not have the MAC address for its default gateway. Which network hosts will receive the ARP request sent by host A?

    CCNA1 v7 - ITNv7 - Final Exam Answers 10

    CCNA1 v7 – ITNv7 – Final Exam Answers 10
    • only hosts A, B, C, and D
    • only router R1
    • only hosts A, B, and C
    • only hosts B and C
    • only hosts B, C, and router R1
    • only host D

      Explanation:

  81. Which value, that is contained in an IPv4 header field, is decremented by each router that receives a packet?

    • Differentiated Services
    • Fragment Offset
    • Header Length
    • Time-to-Live
  82. Refer to the exhibit. The IP address of which device interface should be used as the default gateway setting of host H1?

    CCNA1 v7 - ITNv7 - Final Exam Answers 11

    CCNA1 v7 – ITNv7 – Final Exam Answers 11
    • R2: S0/0/1
    • R1: G0/0
    • R2: S0/0/0
    • R1: S0/0/0
  83. Which two statements describe features of an IPv4 routing table on a router? (Choose two.)​

    • Directly connected interfaces will have two route source codes in the routing table: and .
    • The netstat -r command can be used to display the routing table of a router.​
    • If there are two or more possible routes to the same destination, the route associated with the higher metric value is included in the routing table.
    • The routing table lists the MAC addresses of each active interface.
    • If a default static route is configured in the router, an entry will be included in the routing table with source code .
    • It stores information about routes derived from the active router interfaces.
  84. Three bank employees are using the corporate network. The first employee uses a web browser to view a company web page in order to read some announcements. The second employee accesses the corporate database to perform some financial transactions. The third employee participates in an important live audio conference with other corporate managers in branch offices. If QoS is implemented on this network, what will be the priorities from highest to lowest of the different data types?

    • financial transactions, web page, audio conference
    • financial transactions, audio conference, web page
    • audio conference, financial transactions, web page
    • audio conference, web page, financial transactions

      Explanation:

  85. What is the consequence of configuring a router with the ipv6 unicast-routing global configuration command?​

    • All router interfaces will be automatically activated.
    • Each router interface will generate an IPv6 link-local address.​
    • The IPv6 enabled router interfaces begin sending ICMPv6 Router Advertisement messages.
    • It statically creates a global unicast address on this router.​
  86. Refer to the exhibit. If Host1 were to transfer a file to the server, what layers of the TCP/IP model would be used?

    CCNA1 v7 - ITNv7 - Final Exam Answers 12

    CCNA1 v7 – ITNv7 – Final Exam Answers 12
    • only application, Internet, and network access layers
    • only application, transport, network, data link, and physical layers
    • application, session, transport, network, data link, and physical layers
    • only application and Internet layers
    • application, transport, Internet, and network access layers
    • only Internet and network access layers

      Explanation:

  87. The global configuration command ip default-gateway 172.16.100.1 is applied to a switch. What is the effect of this command?

    • The switch can communicate with other hosts on the 172.16.100.0 network.
    • The switch can be remotely managed from a host on another network.
    • The switch will have a management interface with the address 172.16.100.1.
    • The switch is limited to sending and receiving frames to and from the gateway 172.16.100.1.

      Explanation:

  88. What characteristic describes adware?

    • a network device that filters access and traffic coming into a network
    • an attack that slows or crashes a device or network service
    • the use of stolen credentials to access private data
    • software that is installed on a user device and collects information about the user
  89. Match each description with the corresponding TCP mechanism. (Not all options are used.)

    CCNA1 v7 Final Exam Answers 007

    CCNA1 v7 Final Exam Answers 007
  90. What is the purpose of the TCP sliding window?

    • to ensure that segments arrive in order at the destination
    • to request that a source decrease the rate at which it transmits data
    • to inform a source to retransmit data from a specific point forward
    • to end communication when data transmission is complete
  91. What technique is used with UTP cable to help protect against signal interference from crosstalk?

    • terminating the cable with special grounded connectors
    • twisting the wires together into pairs
    • wrapping a foil shield around the wire pairs
    • encasing the cables within a flexible plastic sheath

      Explanation:

      To help prevent the effects of crosstalk, UTP cable wires are twisted together into pairs. Twisting the wires together causes the magnetic fields of each wire to cancel each other out.

  92. A network technician is researching the use of fiber optic cabling in a new technology center. Which two issues should be considered before implementing fiber optic media? (Choose two.)

    • Fiber optic cabling requires different termination and splicing expertise from what copper cabling requires.
    • Fiber optic cabling requires specific grounding to be immune to EMI.
    • Fiber optic cabling is susceptible to loss of signal due to RFI.
    • Fiber optic provides higher data capacity but is more expensive than copper cabling.
    • Fiber optic cable is able to withstand rough handling.
  93. Users are reporting longer delays in authentication and in accessing network resources during certain time periods of the week. What kind of information should network engineers check to find out if this situation is part of a normal network behavior?

    • syslog records and messages
    • debug output and packet captures
    • network configuration files
    • the network performance baseline
  94. A user is complaining that an external web page is taking longer than normal to load.The web page does eventually load on the user machine. Which tool should the technician use with administrator privileges in order to locate where the issue is in the network?

    • ipconfig /displaydns
    • nslookup
    • tracert
    • ping
  95. A client packet is received by a server. The packet has a destination port number of 53. What service is the client requesting?

    • SSH
    • FTP
    • Telnet
    • DNS
  96. Refer to the exhibit. PC1 issues an ARP request because it needs to send a packet to PC2. In this scenario, what will happen next?​

    CCNA1 v7 - ITNv7 - Final Exam Answers 13

    CCNA1 v7 – ITNv7 – Final Exam Answers 13
    • RT1 will send an ARP reply with its Fa0/0 MAC address.​
    • SW1 will send an ARP reply with the PC2 MAC address.​
    • RT1 will send an ARP reply with the PC2 MAC address.​
    • SW1 will send an ARP reply with its Fa0/1 MAC address.​
    • PC2 will send an ARP reply with its MAC address.

      Explanation:

      When a network device wants to communicate with another device on the same network, it sends a broadcast ARP request. In this case, the request will contain the IP address of PC2. The destination device (PC2) sends an ARP reply with its MAC address.

  97. Match the description to the IPv6 addressing component. (Not all options are used.)

    CCNA1 v7 Final Exam Answers 008

    CCNA1 v7 Final Exam Answers 008
  98. An IPv6 enabled device sends a data packet with the destination address of FF02::2. What is the target of this packet?​

    • all IPv6 enabled devices on the local link​
    • all IPv6 DHCP servers​
    • all IPv6 enabled devices across the network​
    • all IPv6 configured routers on the local link​
  99. What are the three parts of an IPv6 global unicast address? (Choose three.)

    • subnet ID
    • global routing prefix
    • interface ID
    • subnet mask
    • broadcast address
  100. What is one main characteristic of the data link layer?

    • It generates the electrical or optical signals that represent the 1 and 0 on the media.
    • It converts a stream of data bits into a predefined code.
    • It shields the upper layer protocol from being aware of the physical medium to be used in the communication.
    • It accepts Layer 3 packets and decides the path by which to forward the packet to a remote network.
  101. Which type of security threat would be responsible if a spreadsheet add-on disables the local software firewall?

    • Trojan horse
    • brute-force attack
    • DoS
    • buffer overflow

      Explanation:

      A Trojan horse is software that does something harmful, but is hidden in legitimate software code. A denial of service (DoS) attack results in interruption of network services to users, network devices, or applications. A brute-force attack commonly involves trying to access a network device. A buffer overflow occurs when a program attempts to store more data in a memory location than it can hold.

  102. What service is provided by HTTPS?

    • Allows remote access to network devices and servers.
    • Resolves domain names, such as cisco.com, into IP addresses.
    • Uses encryption to provide secure remote access to network devices and servers.
    • Uses encryption to secure the exchange of text, graphic images, sound, and video on the web.
  103. Match the characteristic to the category. (Not all options are used.)

    CCNA1 v7 Final Exam Answers 009

    CCNA1 v7 Final Exam Answers 009
  104. Refer to the exhibit. If host A sends an IP packet to host B, what will the destination address be in the frame when it leaves host A?

    CCNA1 v7 - ITNv7 - Final Exam Answers 14

    CCNA1 v7 – ITNv7 – Final Exam Answers 14
    • 172.168.10.65
    • 172.168.10.99
    • AA:AA:AA:AA:AA:AA
    • CC:CC:CC:CC:CC:CC
    • BB:BB:BB:BB:BB:BB
    • DD:DD:DD:DD:DD:DD
  105. Which two statements are correct about MAC and IP addresses during data transmission if NAT is not involved? (Choose two.)

    • Destination MAC addresses will never change in a frame that goes across seven routers.
    • A packet that has crossed four routers has changed the destination IP address four times.
    • Every time a frame is encapsulated with a new destination MAC address, a new destination IP address is needed.
    • Destination and source MAC addresses have local significance and change every time a frame goes from one LAN to another.
    • Destination IP addresses in a packet header remain constant along the entire path to a target host.
  106. Refer to the exhibit. What three facts can be determined from the viewable output of the show ip interface brief command? (Choose three.)

    CCNA1 v7 - ITNv7 - Final Exam Answers 15

    CCNA1 v7 – ITNv7 – Final Exam Answers 15
    • Two devices are attached to the switch.
    • The default SVI has been configured.
    • The switch can be remotely managed.
    • Two physical interfaces have been configured.
    • Passwords have been configured on the switch.
    • One device is attached to a physical interface.
  107. A user is executing a tracert to a remote device. At what point would a router, which is in the path to the destination device, stop forwarding the packet?

    • when the values of both the Echo Request and Echo Reply messages reach zero
    • when the value in the TTL field reaches zero
    • when the router receives an ICMP Time Exceeded message
    • when the host responds with an ICMP Echo Reply message
    • when the RTT value reaches zero

      Explanation:

      When a router receives a traceroute packet, the value in the TTL field is decremented by 1. When the value in the field reaches zero, the receiving router will not forward the packet, and will send an ICMP Time Exceeded message back to the source.

  108. What are two functions that are provided by the network layer? (Choose two.)

    • carrying data between processes that are running on source and destination hosts
    • directing data packets to destination hosts on other networks
    • providing dedicated end-to-end connections
    • placing data on the network medium
    • providing end devices with a unique network identifier
  109. A network administrator is adding a new LAN to a branch office. The new LAN must support 61 connected devices. What is the smallest network mask that the network administrator can use for the new network?

    • 255.255.255.224
    • 255.255.255.240
    • 255.255.255.192
    • 255.255.255.128
  110. What characteristic describes spyware?

    • a network device that filters access and traffic coming into a network
    • software that is installed on a user device and collects information about the user
    • an attack that slows or crashes a device or network service
    • the use of stolen credentials to access private data
  111. What are three commonly followed standards for constructing and installing cabling? (Choose three.)

    • pinouts
    • tensile strength of plastic insulator
    • cable lengths
    • connector types
    • cost per meter (foot)
    • connector color
  112. Which connector is used with twisted-pair cabling in an Ethernet LAN?

  113. What attribute of a NIC would place it at the data link layer of the OSI model?

    • attached Ethernet cable
    • TCP/IP protocol stack
    • IP address
    • RJ-45 port
    • MAC address
  114. A network administrator needs to keep the user ID, password, and session contents private when establishing remote CLI connectivity with a switch to manage it. Which access method should be chosen?

    • AUX
    • Telnet
    • SSH
    • Console
  115. A user sends an HTTP request to a web server on a remote network. During encapsulation for this request, what information is added to the address field of a frame to indicate the destination?

    • the network domain of the destination host
    • the MAC address of the default gateway
    • the IP address of the default gateway
    • the MAC address of the destination host
  116. Which two commands can be used on a Windows host to display the routing table? (Choose two.)

    • route print
    • show ip route
    • netstat -r
    • netstat -s
    • tracert

      Answers Explanation & Hints:

      On a Windows host, the route print or netstat -r commands can be used to display the host routing table. Both commands generate the same output. On a router, the show ip route command is used to display the routing table. The netstat –s command is used to display per-protocol statistics. The tracert command is used to display the path that a packet travels to its destination.

  117. Match each description with an appropriate IP address. (Not all options are used.)

    CCNA1 v7 & v7.02 - ITNv7 - Final Exam Answers 001

    CCNA1 v7 & v7.02 – ITNv7 – Final Exam Answers 001
  118. Refer to the exhibit. Match the network with the correct IP address and prefix that will satisfy the usable host addressing requirements for each network. (Not all options are used.)

    CCNA1 v7 & v7.02 - ITNv7 - Final Exam Answers 01

    CCNA1 v7 & v7.02 – ITNv7 – Final Exam Answers 01
    CCNA1 v7 & v7.02 - ITNv7 - Final Exam Answers 002
    CCNA1 v7 & v7.02 – ITNv7 – Final Exam Answers 002

    Explanation:

    Network A needs to use 192.168.0.0 /25 which yields 128 host addresses.
    Network B needs to use 192.168.0.128 /26 which yields 64 host addresses.
    Network C needs to use 192.168.0.192 /27 which yields 32 host addresses.
    Network D needs to use 192.168.0.224 /30 which yields 4 host addresses.

  119. A technician with a PC is using multiple applications while connected to the Internet. How is the PC able to keep track of the data flow between multiple application sessions and have each application receive the correct packet flows?

    • The data flow is being tracked based on the source port number that is used by each application.
    • The data flow is being tracked based on the destination IP address that is used by the PC of the technician.
    • The data flow is being tracked based on the source IP address that is used by the PC of the technician.
    • The data flow is being tracked based on the destination MAC address of the technician PC.

      Explanation:

      The source port number of an application is randomly generated and used to individually keep track of each session connecting out to the Internet. Each application will use a unique source port number to provide simultaneous communication from multiple applications through the Internet.

  120. A client packet is received by a server. The packet has a destination port number of 80. What service is the client requesting?

    • DNS
    • HTTP
    • DHCP
    • SMTP
  121. A user is attempting to access http://www.cisco.com/ without success. Which two configuration values must be set on the host to allow this access? (Choose two.)

    • source port number
    • HTTP server
    • source MAC address
    • DNS server
    • default gateway
  122. What method is used to manage contention-based access on a wireless network?

    • CSMA/CD
    • priority ordering
    • CSMA/CA
    • token passing
  123. What are two ICMPv6 messages that are not present in ICMP for IPv4? (Choose two.)

    • Router Advertisement
    • Destination Unreachable
    • Neighbor Solicitation
    • Route Redirection
    • Host Confirmation
    • Time Exceeded
  124. An organization is assigned an IPv6 address block of 2001:db8:0:ca00::/56. How many subnets can be created without using bits in the interface ID space?

    • 4096
    • 256
    • 512
    • 1024
  125. What subnet mask is needed if an IPv4 network has 40 devices that need IP addresses and address space is not to be wasted?

    • 255.255.255.224
    • 255.255.255.128
    • 255.255.255.240
    • 255.255.255.192
    • 255.255.255.0
  126. A host is trying to send a packet to a device on a remote LAN segment, but there are currently no mappings in the ARP cache. How will the device obtain a destination MAC address?

    • It will send an ARP request for the MAC address of the destination device.
    • It will send the frame with a broadcast MAC address.
    • It will send the frame and use the device MAC address as the destination.
    • It will send an ARP request for the MAC address of the default gateway.
    • It will send an ARP request to the DNS server for the destination MAC address.
  127. What characteristic describes a virus?

    • the use of stolen credentials to access private data
    • a network device that filters access and traffic coming into a network
    • malicious software or code running on an end device
    • an attack that slows or crashes a device or network service
  128. A disgruntled employee is using some free wireless networking tools to determine information about the enterprise wireless networks. This person is planning on using this information to hack the wireless network. What type of attack is this?

    • access
    • DoS
    • Trojan horse
    • reconnaissance
  129. What service is provided by POP3?

    • Uses encryption to provide secure remote access to network devices and servers.
    • Retrieves email from the server by downloading the email to the local mail application of the client.
    • Allows remote access to network devices and servers.
    • An application that allows real-time chatting among remote users.
  130. What command can be used on a Windows PC to see the IP configuration of that computer?

    • ipconfig
    • show interfaces
    • ping
    • show ip interface brief
  131. Refer to the exhibit. Which two network addresses can be assigned to the network containing 10 hosts? Your answers should waste the fewest addresses, not reuse addresses that are already assigned, and stay within the 10.18.10.0/24 range of addresses. (Choose two.)

    CCNA1 v7 & v7.02 - ITNv7 - Final Exam Answers 02

    CCNA1 v7 & v7.02 – ITNv7 – Final Exam Answers 02
    • 10.18.10.224/27
    • 10.18.10.208/28
    • 10.18.10.200/27
    • 10.18.10.200/28
    • 10.18.10.224/28

      Answers Explanation & Hints:

      Addresses 10.18.10.0 through 10.18.10.63 are taken for the leftmost network. Addresses 192 through 199 are used by the center network. Because 4 host bits are needed to accommodate 10 hosts, a /28 mask is needed. 10.18.10.200/28 is not a valid network number. Two subnets that can be used are 10.18.10.208/28 and 10.18.10.224/28.

  132. A client packet is received by a server. The packet has a destination port number of 110. What service is the client requesting?

    • DNS
    • DHCP
    • POP3
    • SMTP
  133. Which layer of the TCP/IP model provides a route to forward messages through an internetwork?

    • transport
    • application
    • network access
    • internet
  134. What characteristic describes identity theft?

    • a tunneling protocol that provides remote users with secure access into the network of an organization
    • the use of stolen credentials to access private data
    • software that identifies fast-spreading threats
    • software on a router that filters traffic based on IP addresses or applications
  135. What two security solutions are most likely to be used only in a corporate environment? (Choose two.)

    • intrusion prevention systems
    • antivirus software
    • antispyware
    • strong passwords
    • virtual private networks
  136. What service is provided by DNS?

    • Allows for data transfers between a client and a file server.
    • Uses encryption to secure the exchange of text, graphic images, sound, and video on the web.
    • A basic set of rules for exchanging text, graphic images, sound, video, and other multimedia files on the web.
    • Resolves domain names, such as cisco.com, into IP addresses.
  137. Which wireless technology has low-power and low-data rate requirements making it popular in IoT environments?

    • Bluetooth
    • Zigbee
    • WiMAX
    • Wi-Fi

      Answers Explanation & Hints:

      Zigbee is a specification used for low-data rate, low-power communications. It is intended for applications that require short-range, low data-rates and long battery life. Zigbee is typically used for industrial and Internet of Things (IoT) environments such as wireless light switches and medical device data collection.

  138. What characteristic describes a VPN?

    • software on a router that filters traffic based on IP addresses or applications
    • a tunneling protocol that provides remote users with secure access into the network of an organization
    • a network device that filters access and traffic coming into a network
    • software that identifies fast-spreading threats
  139. A network administrator is adding a new LAN to a branch office. The new LAN must support 4 connected devices. What is the smallest network mask that the network administrator can use for the new network?

    • 255.255.255.192
    • 255.255.255.248
    • 255.255.255.240
    • 255.255.255.224
  140. During the process of forwarding traffic, what will the router do immediately after matching the destination IP address to a network on a directly connected routing table entry?

    • switch the packet to the directly connected interface
    • discard the traffic after consulting the route table
    • look up the next-hop address for the packet
    • analyze the destination IP address
  141. What service is provided by BOOTP?

    • Allows for data transfers between a client and a file server.
    • Legacy application that enables a diskless workstation to discover its own IP address and find a BOOTP server on the network.
    • Uses encryption to secure the exchange of text, graphic images, sound, and video on the web.
    • A basic set of rules for exchanging text, graphic images, sound, video, and other multimedia files on the web.
  142. A client packet is received by a server. The packet has a destination port number of 21. What service is the client requesting?

    • DHCP
    • FTP
    • TFTP
    • DNS
  143. Match each description to its corresponding term. (Not all options are used.)

    CCNA1 v7 & v7.02 - ITNv7 - Final Exam Answers 003

    CCNA1 v7 & v7.02 – ITNv7 – Final Exam Answers 003
  144. A technician can ping the IP address of the web server of a remote company but cannot successfully ping the URL address of the same web server. Which software utility can the technician use to diagnose the problem?

    • tracert
    • netstat
    • nslookup
    • ipconfig

      Explanation:

  145. What two ICMPv6 message types must be permitted through IPv6 access control lists to allow resolution of Layer 3 addresses to Layer 2 MAC addresses? (Choose two.)

    • echo requests
    • router solicitations
    • router advertisements
    • neighbor advertisements
    • echo replies
    • neighbor solicitations
  146. Refer to the exhibit. The switches have a default configuration. Host A needs to communicate with host D, but host A does not have the MAC address for the default gateway. Which network devices will receive the ARP request sent by host A?

    CCNA1 v7 & v7.02 - ITNv7 - Final Exam Answers 03

    CCNA1 v7 & v7.02 – ITNv7 – Final Exam Answers 03
    • only hosts A, B, C, and D
    • only hosts A, B, and C
    • only host D
    • only hosts B, C, and router R1
    • only router R1
    • only hosts B and C
  147. Which two functions are performed at the LLC sublayer of the OSI Data Link Layer to facilitate Ethernet communication? (Choose two.)

    • integrates Layer 2 flows between 10 Gigabit Ethernet over fiber and 1 Gigabit Ethernet over copper
    • places information in the Ethernet frame that identifies which network layer protocol is being encapsulated by the frame
    • implements trailer with frame check sequence for error detection
    • applies source and destination MAC addresses to Ethernet frame
    • enables IPv4 and IPv6 to utilize the same physical medium
  148. Two pings were issued from a host on a local network. The first ping was issued to the IP address of the default gateway of the host and it failed. The second ping was issued to the IP address of a host outside the local network and it was successful. What is a possible cause for the failed ping?

    • The default gateway is not operational.
    • The default gateway device is configured with the wrong IP address.
    • The TCP/IP stack on the default gateway is not working properly.
    • Security rules are applied to the default gateway device, preventing it from processing ping requests.
  149. What is a benefit of using cloud computing in networking?

    • Technology is integrated into every-day appliances allowing them to interconnect with other devices, making them more ‘smart’ or automated.
    • Network capabilities are extended without requiring investment in new infrastructure, personnel, or software.
    • Home networking uses existing electrical wiring to connect devices to the network wherever there is an electrical outlet, saving the cost of installing data cables.
    • End users have the freedom to use personal tools to access information and communicate across a business network.

      Answers Explanation & Hints:

  150. Match the firewall function to the type of threat protection it provides to the network. (Not all options are used.)

    CCNA1 v7 & v7.02 - ITNv7 - Final Exam Answers 004

    CCNA1 v7 & v7.02 – ITNv7 – Final Exam Answers 004

    Answers Explanation & Hints:

    Application filters prevent access based on Layer 4 port numbers.
    Packet filters prevent access based on IP or MAC address.
    URL filters prevent access to web site URLs or content.
    Stateful packet inspection prevents unsolicited incoming sessions.
    Network address translators translate internal IP addresses to to outside IP addresses and do not prevent network attacks.

  151. What service is provided by SMTP?

    • Allows remote access to network devices and servers.
    • Uses encryption to provide secure remote access to network devices and servers.
    • Allows clients to send email to a mail server and the servers to send email to other servers.
    • An application that allows real-time chatting among remote users.
  152. A client packet is received by a server. The packet has a destination port number of 22. What service is the client requesting?

    • SSH
    • DNS
    • DHCP
    • TFTP

  • Recommend

4.4
43
votes

Article Rating

Recently Recipes

Grilled Giardiniera-Stuffed Steak Sandwich image

Grilled Giardiniera-Stuffed Steak Sandwich

This rolled flank steak is inspired by the Italian beef sandwich, a Chicago delicacy typically consisting of chopped thin slices of roast beef stuffed…

Provided by Food Network Kitchen

Mapo Potato image

Mapo Potato

Let’s be clear: Nothing surpasses the hearty deliciousness of a traditional mapo tofu. But for those days when you find yourself without soft tofu in the…

Provided by Hetty McKinnon

Chili image

Chili

This is a spicy, smoky and hearty pot of chili. It’s the kind of chili you need after a long day skiing — or hibernating. To create a rich and thick sauce,…

Provided by Ali Slagle

Banket image

Banket

This recipe is from my mother. It is the one she taught me with a slight tweak. In my home on the holidays one way to show someone or a family they were…

Provided by Jena Lewis

Moroccan Nachos image

Moroccan Nachos

This Moroccan twist on the much-loved appetizer features kefta, a ground beef (or lamb) mixture seasoned with parsley, cilantro, mint, paprika and cumin,…

Provided by Nargisse Benkabbou

Peanut Butter Brownie Cups image

Peanut Butter Brownie Cups

I’m not a chocolate fan (atleast not the kind made in the U.S.), but I LOVE peanut butter and chocolate and this hit the spot. I found the recipe in 2007…

Provided by AmyZoe

Banana Cream Pudding image

Banana Cream Pudding

This fabulous version of the favorite Southern dessert boosts the banana flavor by infusing it into the homemade vanilla pudding, in addition to the traditional…

Provided by Martha Stewart

Lemon Russian Tea Cakes image

Lemon Russian Tea Cakes

I love lemon desserts,these are a simple cookie I can make quickly. The recipe is based on the pecan Russian tea cakes.I don’t like lemon extract,instead…

Provided by Stephanie L. @nurseladycooks

Easy Churros with Mexican Chocolate Sauce image

Easy Churros with Mexican Chocolate Sauce

Forgo the traditional frying — and mixing up the batter! — for this Latin American treat. Instead, bake store-bought puff pastry for churros that are…

Provided by Martha Stewart

Easy Lasagna image

Easy Lasagna

Everyone loves lasagna. It’s perfect for feeding a big crowd and a hit at potlucks. But most people reserve it for a weekend cooking project since it can…

Provided by Food Network Kitchen

Grilled Vegetables Korean-Style image

Grilled Vegetables Korean-Style

Who doesn’t love grilled vegetables — the sauce just takes them over the top.

Provided by Daily Inspiration S @DailyInspiration

Outrageous Chocolate Cookies image

Outrageous Chocolate Cookies

From Martha Stewart. I’m putting this here for safe keeping. This is a chocolate cookie with chocolate chunks. Yum! Do not over cook this cookie since…

Provided by C. Taylor

CERTO® Citrus Jelly image

CERTO® Citrus Jelly

A blend of freshly squeezed orange and lemon juices puts the citrusy deliciousness in this CERTO Citrus Jelly.

Provided by My Food and Family

Previous

Next

People also searched

More about «netacad final exam answers food»

FOOD HANDLERS PRACTICE TEST 2023 (CANADA) ANSWERS WITH …

food-handlers-practice-test-2023-canada-answers-with image

WebFood Handlers Practice Test 2023. In Canada, Food Handler Certification is a legal requirement for many food workers. When you study online with …
From gotestprep.com
Estimated Reading Time 3 mins

Food Handlers Practice Test 2023. In Canada, Food Handler Certification is a legal requirement for many food workers. When you study online with …»>
See details


CCNA1 V7 — ITNV7 — FINAL EXAM ANSWERS 2021 2022 2023 …

ccna1-v7-itnv7-final-exam-answers-2021-2022-2023 image

WebDec 12, 2022 CCNA1 v7 – ITNv7 – Final Exam Answers 07 The untwisted length of each wire is too long. The woven copper braid should not have been removed. The wrong type of connector is being used. The …
From infraexam.com

Dec 12, 2022 CCNA1 v7 ITNv7 – Final Exam Answers 07 The untwisted length of each wire is too long. The woven copper braid should not have been removed. The wrong type of connector is being used. The …»>
See details


NETWORKING ESSENTIALS (VERSION 2.0) FINAL EXAM ANSWERS …

networking-essentials-version-20-final-exam-answers image

WebFeb 7, 2021 Networking Essentials (Version 2) – Networking Essentials 2.0 Final Exam Answers How to find: Press “Ctrl + F” in the browser and fill in whatever wording is in the question to find that question/answer. If the …
From itexamanswers.net

Feb 7, 2021 Networking Essentials (Version 2) – Networking Essentials 2.0 Final Exam Answers How to find: Press “Ctrl + F” in the browser and fill in whatever wording is in the question to find that question/answer. If the …»>
See details


CCNA 1 V7.0 FINAL EXAM ANSWERS FULL — INTRODUCTION TO …

ccna-1-v70-final-exam-answers-full-introduction-to image

WebDec 20, 2019 CCNA 1 – Introduction to Networks (Version 7.00) – ITNv7 Final Exam Answers Full Number of questions: 60; Passed score: 80-100% 1. Which two traffic types use the Real-Time Transport Protocol …
From itexamanswers.net

Dec 20, 2019 CCNA 1 – Introduction to Networks (Version 7.00) – ITNv7 Final Exam Answers Full Number of questions: 60; Passed score: 80-100% 1. Which two traffic types use the Real-Time Transport Protocol …»>
See details


NETACAD FINAL EXAM ANSWERS — AFFILIATES.MYPTHUB.NET

WebNetacad Final Exam Answers Netacad Final Exam Answers Hulu Plus Canada The Essential Guide To Getting Hulu. Us Bank Certification Exam Answers fullexams com. …
From affiliates.mypthub.net

Netacad Final Exam Answers Netacad Final Exam Answers Hulu Plus Canada The Essential Guide To Getting Hulu. Us Bank Certification Exam Answers fullexams com. …»>
See details


READ BOOK CISCO NETACAD FINAL EXAM ANSWERS READ PDF FREE

Webstatistics mathematics premier food safety final exam answers examstalk net pcap python essentials pe final test exam answers … Read Book Cisco Netacad Final Exam …
From new.msexchange.org

statistics mathematics premier food safety final exam answers examstalk net pcap python essentials pe final test exam answers … Read Book Cisco Netacad Final Exam …»>
See details


REMOTE PROCTORING FOR NETACAD FINAL EXAMS — NETWORKING ACADEMY

WebRemote Proctoring for Netacad Final Exams — Networking Academy
From netacad.com

Remote Proctoring for Netacad Final Exams — Networking Academy»>
See details


CHAPTER 1-9 NETACAD IT ESSENTIALS FINAL EXAM FLASHCARDS

Web1. In which situation would an ESD strike potentially cause harm to the PC? when replacing a mechanical hard drive with an M.2 SSD. 2. A person has started a new technical job. In …
From quizlet.com

1. In which situation would an ESD strike potentially cause harm to the PC? when replacing a mechanical hard drive with an M.2 SSD. 2. A person has started a new technical job. In …»>
See details


HI, I HAVE TO COMPLETE MY ONLINE FINAL EXAM BY THE END OF …

WebI can suppose you are referring to a NetAcad course. Here are the recommendations of the NetAcad support: — Clear your browser’s cache and history (close the browser after …
From learningnetwork.cisco.com

I can suppose you are referring to a NetAcad course. Here are the recommendations of the NetAcad support: — Clear your browser’s cache and history (close the browser after …»>
See details


CISCO NETACAD — INFRAEXAM 2023

WebJan 24, 2023 Cisco Netacad | Final Module Quiz Exam Answers | Packet Tracer Lab 2023 ITE 8 – Bridge IT Essentials 8 IT Essentials 7 & 7.02 Networking Essentials 2.0 …
From infraexam.com

Jan 24, 2023 Cisco Netacad | Final Module Quiz Exam Answers | Packet Tracer Lab 2023 ITE 8 – Bridge IT Essentials 8 IT Essentials 7 & 7.02 Networking Essentials 2.0 …»>
See details


CYBER SECURITY ESSENTIALS FROM CISCO FINAL EXAM PART1 QUIZ …

WebCyber Security Essentials From CISCO Final exam part1 Quiz Answer| CISCO | NETACAD——…
From youtube.com

Cyber Security Essentials From CISCO Final exam part1 Quiz Answer| CISCO | NETACAD——…»>
See details


SUPPORT & FAQS | NETWORKING ACADEMY

WebGo to www.NetAcad.com In the top right corner, click “Log In” Select “Resend Activation Email” Enter the email address and select “Resend Activation Email” Note: Links in the …
From netacad.com

Go to www.NetAcad.com In the top right corner, click “Log In” Select “Resend Activation Email” Enter the email address and select “Resend Activation Email” Note: Links in the …»>
See details


NETACAD FINAL EXAM | 135 QUESTIONS WITH 100% CORRECT ANSWERS

WebNov 12, 2022 Netacad a network that recovers quickly when a failure occurs and depends on redundancy to limit the impact of a failure — What is a characteristic of a fault tolerant …
From stuvia.com

Nov 12, 2022 Netacad a network that recovers quickly when a failure occurs and depends on redundancy to limit the impact of a failure — What is a characteristic of a fault tolerant …»>
See details


ASSESSMENT.NETACAD.NET

Webassessment.netacad.net
From assessment.netacad.net

assessment.netacad.net»>
See details


|| INTRODUCTION TO IOT FINAL EXAM ANSWERS FROM CISCO || CISCO

WebApr 27, 2021 || Introduction To IOT Final Assessment Answers from Cisco || CISCO || NETACADKeywords=====#IOT#عالم_التكنولوجيا #Final_Exam#Cyber Securi…
From youtube.com

Apr 27, 2021 || Introduction To IOT Final Assessment Answers from Cisco || CISCO || NETACADKeywords=====#IOT#عالم_التكنولوجيا #Final_Exam#Cyber Securi…»>
See details


CISCO NETACAD FINAL EXAM ANSWERS 2023 — LIST EXAMS

WebCcna V7 Final Exam Answers University. Use Cisco IOS commands to complete configuration, management and troubleshooting tasks for small to medium sized …
From listexams.com

Ccna V7 Final Exam Answers University. Use Cisco IOS commands to complete configuration, management and troubleshooting tasks for small to medium sized …»>
See details


Related Search

Grilled Giardiniera-Stuffed Steak Sandwich image

Grilled Giardiniera-Stuffed Steak Sandwich

This rolled flank steak is inspired by the Italian beef sandwich, a Chicago delicacy typically consisting of chopped thin slices of roast beef stuffed…

Provided by Food Network Kitchen

Mapo Potato image

Mapo Potato

Let’s be clear: Nothing surpasses the hearty deliciousness of a traditional mapo tofu. But for those days when you find yourself without soft tofu in the…

Provided by Hetty McKinnon

Chili image

Chili

This is a spicy, smoky and hearty pot of chili. It’s the kind of chili you need after a long day skiing — or hibernating. To create a rich and thick sauce,…

Provided by Ali Slagle

Banket image

Banket

This recipe is from my mother. It is the one she taught me with a slight tweak. In my home on the holidays one way to show someone or a family they were…

Provided by Jena Lewis

Moroccan Nachos image

Moroccan Nachos

This Moroccan twist on the much-loved appetizer features kefta, a ground beef (or lamb) mixture seasoned with parsley, cilantro, mint, paprika and cumin,…

Provided by Nargisse Benkabbou

Peanut Butter Brownie Cups image

Peanut Butter Brownie Cups

I’m not a chocolate fan (atleast not the kind made in the U.S.), but I LOVE peanut butter and chocolate and this hit the spot. I found the recipe in 2007…

Provided by AmyZoe

Banana Cream Pudding image

Banana Cream Pudding

This fabulous version of the favorite Southern dessert boosts the banana flavor by infusing it into the homemade vanilla pudding, in addition to the traditional…

Provided by Martha Stewart

Lemon Russian Tea Cakes image

Lemon Russian Tea Cakes

I love lemon desserts,these are a simple cookie I can make quickly. The recipe is based on the pecan Russian tea cakes.I don’t like lemon extract,instead…

Provided by Stephanie L. @nurseladycooks

Easy Churros with Mexican Chocolate Sauce image

Easy Churros with Mexican Chocolate Sauce

Forgo the traditional frying — and mixing up the batter! — for this Latin American treat. Instead, bake store-bought puff pastry for churros that are…

Provided by Martha Stewart

Easy Lasagna image

Easy Lasagna

Everyone loves lasagna. It’s perfect for feeding a big crowd and a hit at potlucks. But most people reserve it for a weekend cooking project since it can…

Provided by Food Network Kitchen

Grilled Vegetables Korean-Style image

Grilled Vegetables Korean-Style

Who doesn’t love grilled vegetables — the sauce just takes them over the top.

Provided by Daily Inspiration S @DailyInspiration

Outrageous Chocolate Cookies image

Outrageous Chocolate Cookies

From Martha Stewart. I’m putting this here for safe keeping. This is a chocolate cookie with chocolate chunks. Yum! Do not over cook this cookie since…

Provided by C. Taylor

CERTO® Citrus Jelly image

CERTO® Citrus Jelly

A blend of freshly squeezed orange and lemon juices puts the citrusy deliciousness in this CERTO Citrus Jelly.

Provided by My Food and Family

Previous

Next

CCNA 1 V7.0 FINAL EXAM ANSWERS FULL — INTRODUCTION TO …

ccna-1-v70-final-exam-answers-full-introduction-to image

WebDec 20, 2019 CCNA 1 – Introduction to Networks (Version 7.00) – ITNv7 Final Exam Answers Full Number of questions: 60; Passed score: 80-100% 1. Which two traffic types use the Real-Time Transport Protocol …
From itexamanswers.net

Dec 20, 2019 CCNA 1 – Introduction to Networks (Version 7.00) – ITNv7 Final Exam Answers Full Number of questions: 60; Passed score: 80-100% 1. Which two traffic types use the Real-Time Transport Protocol …»>
See details


CCNA1 V7 — ITNV7 — FINAL EXAM ANSWERS 2021 2022 2023 …

ccna1-v7-itnv7-final-exam-answers-2021-2022-2023 image

WebDec 12, 2022 CCNA1 v7 – ITNv7 – Final Exam Answers 07 The untwisted length of each wire is too long. The woven copper braid should not have been removed. The wrong type of connector is being used. The …
From infraexam.com

Dec 12, 2022 CCNA1 v7 ITNv7 – Final Exam Answers 07 The untwisted length of each wire is too long. The woven copper braid should not have been removed. The wrong type of connector is being used. The …»>
See details


NETWORKING ESSENTIALS (VERSION 2.0) FINAL EXAM ANSWERS …

networking-essentials-version-20-final-exam-answers image

WebFeb 7, 2021 Networking Essentials (Version 2) – Networking Essentials 2.0 Final Exam Answers How to find: Press “Ctrl + F” in the browser and fill in whatever wording is in the question to find that question/answer. If the …
From itexamanswers.net

Feb 7, 2021 Networking Essentials (Version 2) – Networking Essentials 2.0 Final Exam Answers How to find: Press “Ctrl + F” in the browser and fill in whatever wording is in the question to find that question/answer. If the …»>
See details


NETACAD FINAL EXAM FLASHCARDS | QUIZLET

Webto prevent malicious software from infecting the device. In what two situations is a virtual printer used? (Choose two.) a user sends a printed document to a remote destination …
From quizlet.com

to prevent malicious software from infecting the device. In what two situations is a virtual printer used? (Choose two.) a user sends a printed document to a remote destination …»>
See details


ASSESSMENT.NETACAD.NET

Webassessment.netacad.net
From assessment.netacad.net

assessment.netacad.net»>
See details


CYBER SECURITY ESSENTIALS FROM CISCO FINAL EXAM PART1 QUIZ …

WebCyber Security Essentials From CISCO Final exam part1 Quiz Answer| CISCO | NETACAD——…
From youtube.com

Cyber Security Essentials From CISCO Final exam part1 Quiz Answer| CISCO | NETACAD——…»>
See details


NETACAD FINAL EXAM | 135 QUESTIONS WITH 100% CORRECT ANSWERS

WebNov 12, 2022 Netacad a network that recovers quickly when a failure occurs and depends on redundancy to limit the impact of a failure — What is a characteristic of a fault tolerant …
From stuvia.com

Nov 12, 2022 Netacad a network that recovers quickly when a failure occurs and depends on redundancy to limit the impact of a failure — What is a characteristic of a fault tolerant …»>
See details


EXAM PROBLEM IN NETACAD.COM !! PLEASE HELP I HAVE DEAD …

WebI have a problem entering the final exam at netacad.com. when I try to enter the final exam there is a message appears: I tried to open the site from another laptop and more than …
From learningnetwork.cisco.com

I have a problem entering the final exam at netacad.com. when I try to enter the final exam there is a message appears: I tried to open the site from another laptop and more than …»>
See details


NETACAD FINAL EXAM FLASHCARDS | QUIZLET

WebNetacad Final Exam. Flashcards. Learn. Test. Match. … Verified answer. other. Easy-to-sew patterns. Look through a pattern catalog and select patterns that beginning sewers …
From quizlet.com

Netacad Final Exam. Flashcards. Learn. Test. Match. … Verified answer. other. Easy-to-sew patterns. Look through a pattern catalog and select patterns that beginning sewers …»>
See details


NETACAD FINAL EXAM FLASHCARDS | QUIZLET

WebStudy with Quizlet and memorize flashcards containing terms like a network that recovers quickly when a failure occurs and depends on redundancy to limit the impact of a failure, …
From quizlet.com

Study with Quizlet and memorize flashcards containing terms like a network that recovers quickly when a failure occurs and depends on redundancy to limit the impact of a failure, …»>
See details


FINAL EXAMS ANSWERS (NO NETACAD) : R/CCNA — REDDIT.COM

Webr/cissp. Join. • 28 days ago. Thank You To Everyone on This r/CISSP Forum Did this one for you, other CISSP instructors, and all CISSP professionals in this community! This is me …
From reddit.com


|| INTRODUCTION TO IOT FINAL EXAM ANSWERS FROM CISCO || CISCO

WebApr 27, 2021 || Introduction To IOT Final Assessment Answers from Cisco || CISCO || NETACADKeywords=====#IOT#عالم_التكنولوجيا #Final_Exam#Cyber Securi…
From youtube.com

Apr 27, 2021 || Introduction To IOT Final Assessment Answers from Cisco || CISCO || NETACADKeywords=====#IOT#عالم_التكنولوجيا #Final_Exam#Cyber Securi…»>
See details


IS NETACAD ALONE ENOUGH FOR CCNA? — LEARNINGNETWORK.CISCO.COM

WebOur final exam for module 2 is next week. My NetAcad exam average is just above 85%, I have full scores on the labs and assignments, and the subject matter poses no real …
From learningnetwork.cisco.com

Our final exam for module 2 is next week. My NetAcad exam average is just above 85%, I have full scores on the labs and assignments, and the subject matter poses no real …»>
See details


{EBOOK} CISCO NETACAD FINAL EXAM ANSWERS 2014

WebCisco Netacad Final Exam Answers 2014 below. Networking Basics — Wendell Odom 2006 The completely revised and only authorized textbook for the Cisco Networking Academy …
From dev.pulitzercenter.org

Cisco Netacad Final Exam Answers 2014 below. Networking Basics — Wendell Odom 2006 The completely revised and only authorized textbook for the Cisco Networking Academy …»>
See details


CISCO NETACAD FINAL EXAM ANSWERS 2023 — LIST EXAMS

WebCisco Netacad Exam Answers University The command will output a list of the files in the packages. The command will display the full filename of the original package. The …
From listexams.com

Cisco Netacad Exam Answers University The command will output a list of the files in the packages. The command will display the full filename of the original package. The …»>
See details


CISCO NETACAD — INFRAEXAM 2023

WebJan 24, 2023 Cisco Netacad | Final Module Quiz Exam Answers | Packet Tracer Lab 2023 ITE 8 – Bridge IT Essentials 8 IT Essentials 7 & 7.02 Networking Essentials 2.0 …
From infraexam.com

Jan 24, 2023 Cisco Netacad | Final Module Quiz Exam Answers | Packet Tracer Lab 2023 ITE 8 – Bridge IT Essentials 8 IT Essentials 7 & 7.02 Networking Essentials 2.0 …»>
See details


CHAPTER 1-9 NETACAD IT ESSENTIALS FINAL EXAM FLASHCARDS

Web1. In which situation would an ESD strike potentially cause harm to the PC? when replacing a mechanical hard drive with an M.2 SSD. 2. A person has started a new technical job. In …
From quizlet.com

1. In which situation would an ESD strike potentially cause harm to the PC? when replacing a mechanical hard drive with an M.2 SSD. 2. A person has started a new technical job. In …»>
See details


CCNA1 V7 — ITNV7 — PRACTICE FINAL — ITN ANSWERS 2022 2023 100%

WebDec 14, 2022 203.0.113.3. 192.168.234.114. Match the command with the device mode at which the command is entered. (Not all options are used.) CCNA1 v7 – ITNv7 – Practice …
From infraexam.com

Dec 14, 2022 203.0.113.3. 192.168.234.114. Match the command with the device mode at which the command is entered. (Not all options are used.) CCNA1 v7 – ITNv7 – Practice …»>
See details


CISCO NETACAD FINAL EXAM ANSWERS 2023 EXAM — LIST EXAMS

WebNetacad Chapter 9 Exam Answers V7 Utilize the Exchange to build more advanced and more capable networks with intent-based networking, multi-domain solutions, and APIs …
From listexams.com

Netacad Chapter 9 Exam Answers V7 Utilize the Exchange to build more advanced and more capable networks with intent-based networking, multi-domain solutions, and APIs …»>
See details


READ BOOK CISCO NETACAD FINAL EXAM ANSWERS READ PDF FREE

Webstatistics mathematics premier food safety final exam answers examstalk net pcap python essentials pe final test exam answers … Read Book Cisco Netacad Final Exam …
From new.msexchange.org

statistics mathematics premier food safety final exam answers examstalk net pcap python essentials pe final test exam answers … Read Book Cisco Netacad Final Exam …»>
See details


Last Updated on February 1, 2021 by

Cisco Netacad ITN Version 7.00 CCNA 1 v7 Modules 1 – 3: Basic Network Connectivity and Communications Exam Answers 2020 2021 – Introduction to Networks

  1. Match the requirements of a reliable network with the supporting network architecture. (Not all options are used.)

    CCNA1 v7 – ITNv7 – Modules 1 – 3 Basic Network Connectivity and Communications Exam Answers 001

    CCNA1 v7 – ITNv7 – Modules 1 – 3 Basic Network Connectivity and Communications Exam Answers 001

  2. An employee at a branch office is creating a quote for a customer. In order to do this, the employee needs to access confidential pricing information from internal servers at the Head Office. What type of network would the employee access?

    • an intranet
    • the Internet
    • an extranet
    • a local area network
      Answers Explanation & Hints:

      Intranet is a term used to refer to a private connection of LANs and WANs that belongs to an organization. An intranet is designed to be accessible only by the organization’s members, employees, or others with authorization.

  3. Which statement describes the use of powerline networking technology?

    • New “smart” electrical cabling is used to extend an existing home LAN.
    • A home LAN is installed without the use of physical cabling.
    • A device connects to an existing home LAN using an adapter and an existing electrical outlet.
    • Wireless access points use powerline adapters to distribute data  through the home LAN.
      Answers Explanation & Hints:

      Powerline networking adds the ability to connect a device to the network using an adapter wherever there is an electrical outlet.​ The network uses existing electrical wiring to send data. It is not a replacement for physical cabling, but it can add functionality in places where wireless access points cannot be used or cannot reach devices.​

  4. A networking technician is working on the wireless network at a medical clinic. The technician accidentally sets up the wireless network so that patients can see the medical records data of other patients. Which of the four network characteristics has been violated in this situation?

    • fault tolerance
    • scalability
    • security
    • Quality of Service (QoS)
    • reliability
      Answers Explanation & Hints:

      Network security includes protecting the confidentiality of data that is on the network. In this case, because confidential data has been made available to unauthorized users, the security characteristic of the network has failed.

  5. Match each characteristic to its corresponding Internet connectivity type. (Not all options are used.)

    CCNA1 v7 – ITNv7 – Modules 1 – 3 Basic Network Connectivity and Communications Exam Answers 002

    CCNA1 v7 – ITNv7 – Modules 1 – 3 Basic Network Connectivity and Communications Exam Answers 002

    Answers Explanation & Hints:

    DSL is an always-on, high bandwidth connection that runs over telephone lines. Cable uses the same coaxial cable that carries television signals into the home to provide Internet access. Dialup telephone is much slower than either DSL or cable, but is the least expensive option for home users because it can use any telephone line and a simple modem. Satellite requires a clear line of sight and is affected by trees and other obstructions. None of these typical home options use dedicated leased lines such as T1/E1 and T3/E3.

  6. What two criteria are used to help select a network medium from various network media? (Choose two.)

    • the types of data that need to be prioritized
    • the cost of the end devices utilized in the network
    • the distance the selected medium can successfully carry a signal
    • the number of intermediate devices installed in the network
    • the environment where the selected medium is to be installed
      Answers Explanation & Hints:

      Criteria for choosing a network medium are the distance the selected medium can successfully carry a signal, the environment in which the selected medium is to be installed, the amount of data and the speed at which the data must be transmitted, and the cost of the medium and its installation.

  7. What type of network traffic requires QoS?

    • email
    • on-line purchasing
    • video conferencing
    • wiki
      Answers Explanation & Hints:

      Video conferencing utilizes real-time audio and video communications. Both of these are time-sensitive and bandwidth-intensive forms of communication that require quality of service to be active on the network. QoS will ensure an uninterrupted user experience.

  8. A user is implementing security on a small office network. Which two actions would provide the minimum security requirements for this network? (Choose two.)

    • implementing a firewall
    • installing a wireless network
    • installing antivirus software
    • implementing an intrusion detection system
    • adding a dedicated intrusion prevention device
      Answers Explanation & Hints:

      Technically complex security measures such as intrusion prevention and intrusion prevention systems are usually associated with business networks rather than home networks. Installing antivirus software, antimalware software, and implementing a firewall will usually be the minimum requirements for home networks. Installing a home wireless network will not improve network security, and will require further security actions to be taken.

  9. Passwords can be used to restrict access to all or parts of the Cisco IOS. Select the modes and interfaces that can be protected with passwords. (Choose three.)

    • VTY interface
    • console interface
    • Ethernet interface
    • boot IOS mode
    • privileged EXEC mode
    • router configuration mode
      Answers Explanation & Hints:

      Access to the VTY and console interfaces can be restricted using passwords. Out-of-band management of the router can be restricted in both user EXEC and privileged EXEC modes.

  10. Which interface allows remote management of a Layer 2 switch?

    • the AUX interface
    • the console port interface
    • the switch virtual interface
    • the first Ethernet port interface
      Answers Explanation & Hints:

      In a Layer 2 switch, there is a switch virtual interface (SVI) that provides a means for remotely managing the device.

  11. What function does pressing the Tab key have when entering a command in IOS?

    • It aborts the current command and returns to configuration mode.
    • It exits configuration mode and returns to user EXEC mode.
    • It moves the cursor to the beginning of the next line.
    • It completes the remainder of a partially typed word in a command.
      Answers Explanation & Hints:

      Pressing the Tab key after a command has been partially typed will cause the IOS to complete the rest of the command.

  12. While trying to solve a network issue, a technician made multiple changes to the current router configuration file. The changes did not solve the problem and were not saved. What action can the technician take to discard the changes and work with the file in NVRAM?

    • Issue the reload command without saving the running configuration.
    • Delete the vlan.dat file and reboot the device.
    • Close and reopen the terminal emulation software.
    • Issue the copy startup-config running-config command.
      Answers Explanation & Hints:

      The technician does not want to make any mistakes trying to remove all the changes that were done to the running configuration file. The solution is to reboot the router without saving the running configuration. The copy startup-config running-config command does not overwrite the running configuration file with the configuration file stored in NVRAM, but rather it just has an additive effect.

  13. An administrator uses the Ctrl-Shift-6 key combination on a switch after issuing the ping command. What is the purpose of using these keystrokes?

    • to restart the ping process
    • to interrupt the ping process
    • to exit to a different configuration mode
    • to allow the user to complete the command
      Answers Explanation & Hints:

      To interrupt an IOS process such as ping or traceroute , a user enters the Ctrl-Shift-6 key combination. Tab completes the remainder of parameters or arguments within a command. To exit from configuration mode to privileged mode use the Ctrl-Z keystroke. CTRL-R will redisplay the line just typed, thus making it easier for the user to press Enter and reissue the ping command.

  14. Refer to the exhibit. A network administrator is configuring access control to switch SW1. If the administrator uses a console connection to connect to the switch, which password is needed to access user EXEC mode?

    CCNA1 v7 – ITNv7 – Modules 1 – 3 Basic Network Connectivity and Communications Exam Answers 02

    CCNA1 v7 – ITNv7 – Modules 1 – 3 Basic Network Connectivity and Communications Exam Answers 02

    • letmein
    • secretin
    • lineconin
    • linevtyin
      Answers Explanation & Hints:

      Telnet accesses a network device through the virtual interface configured with the line VTY command. The password configured under this is required to access the user EXEC mode. The password configured under the line console 0 command is required to gain entry through the console port, and the enable and enable secret passwords are used to allow entry into the privileged EXEC mode.

  15. A technician configures a switch with these commands:

    SwitchA(config)# interface vlan 1
    SwitchA(config-if)# ip address 192.168.1.1 255.255.255.0
    SwitchA(config-if)# no shutdown

    What is the technician configuring?

    • Telnet access
    • SVI
    • password encryption
    • physical switchport access
      Answers Explanation & Hints:

      For a switch to have an IP address, a switch virtual interface must be configured. This allows the switch to be managed remotely over the network.

  16. Which command or key combination allows a user to return to the previous level in the command hierarchy?

    • end
    • exit
    • Ctrl-Z
    • Ctrl-C
      Answers Explanation & Hints:

      End and CTRL-Z return the user to the privileged EXEC mode. Ctrl-C ends a command in process. The exit command returns the user to the previous level.

  17. What are two characteristics of RAM on a Cisco device? (Choose two.)

    • RAM provides nonvolatile storage.
    • The configuration that is actively running on the device is stored in RAM.
    • The contents of RAM are lost during a power cycle.
    • RAM is a component in Cisco switches but not in Cisco routers.
    • RAM is able to store multiple versions of IOS and configuration files.
      Answers Explanation & Hints:

      RAM stores data that is used by the device to support network operations. The running configuration is stored in RAM. This type of memory is considered volatile memory because data is lost during a power cycle. Flash memory stores the IOS and delivers a copy of the IOS into RAM when a device is powered on. Flash memory is nonvolatile since it retains stored contents during a loss of power.

  18. Which two host names follow the guidelines for naming conventions on Cisco IOS devices? (Choose two.)

    • Branch2!
    • RM-3-Switch-2A4
    • Floor(15)
    • HO Floor 17
    • SwBranch799
      Answers Explanation & Hints:

      Some guidelines for naming conventions are that names should:Start with a letter
      Contain no spaces
      End with a letter or digit
      Use only letters, digits, and dashes
      Be less than 64 characters in length

  19. How is SSH different from Telnet?

    • SSH makes connections over the network, whereas Telnet is for out-of-band access.
    • SSH provides security to remote sessions by encrypting messages and using user authentication. Telnet is considered insecure and sends messages in plaintext.
    • SSH requires the use of the PuTTY terminal emulation program. Tera Term must be used to connect to devices through the use of Telnet.
    • SSH must be configured over an active network connection, whereas Telnet is used to connect to a device from a console connection.
      Answers Explanation & Hints:

      SSH is the preferred protocol for connecting to a device operating system over the network because it is much more secure than Telnet. Both SSH and Telnet are used to connect to devices over the network, and so are both used in-band. PuTTY and Terra Term can be used to make both SSH and Telnet connections.

  20. An administrator is configuring a switch console port with a password. In what order will the administrator travel through the IOS modes of operation in order to reach the mode in which the configuration commands will be entered? (Not all options are used.)

    CCNA1 v7 – ITNv7 – Modules 1 – 3 Basic Network Connectivity and Communications Exam Answers 003

    CCNA1 v7 – ITNv7 – Modules 1 – 3 Basic Network Connectivity and Communications Exam Answers 003

    Answers Explanation & Hints:

    The configuration mode that the administrator first encounters is user EXEC mode. After the enable command is entered, the next mode is privileged EXEC mode. From there, the configure terminal command is entered to move to global configuration mode. Finally, the administrator enters the line console 0 command to enter the mode in which the configuration will be entered.

  21. What are three characteristics of an SVI? (Choose three.)

    • It is designed as a security protocol to protect switch ports.
    • It is not associated with any physical interface on a switch.
    • It is a special interface that allows connectivity by different types of media.
    • It is required to allow connectivity by any device at any location.
    • It provides a means to remotely manage a switch.
    • It is associated with VLAN1 by default.
      Answers Explanation & Hints:

      Switches have one or more switch virtual interfaces (SVIs). SVIs are created in software since there is no physical hardware associated with them. Virtual interfaces provide a means to remotely manage a switch over a network that is using IP. Each switch comes with one SVI appearing in the default configuration “out-of-the-box.” The default SVI interface is VLAN1.

  22. What command is used to verify the condition of the switch interfaces, including the status of the interfaces and a configured IP address?

    • ipconfig
    • ping
    • traceroute
    • show ip interface brief
      Answers Explanation & Hints:

      The show ip interface brief command is used to display a brief synopsis of the condition of the device interfaces. The ipconfig command is used to verify TCP/IP properties on a host. The ping command is used to verify Layer 3 connectivity. The traceroute command is used to trace the network path from source to destination.

  23. Match the description with the associated IOS mode. (Not all options are used.)

    CCNA1 v7 – ITNv7 – Modules 1 – 3 Basic Network Connectivity and Communications Exam Answers 004

    CCNA1 v7 – ITNv7 – Modules 1 – 3 Basic Network Connectivity and Communications Exam Answers 004

  24. Match the definitions to their respective CLI hot keys and shortcuts. (Not all options are used.)

    CCNA1 v7 – ITNv7 – Modules 1 – 3 Basic Network Connectivity and Communications Exam Answers 005

    CCNA1 v7 – ITNv7 – Modules 1 – 3 Basic Network Connectivity and Communications Exam Answers 005

    Answers Explanation & Hints:

    The shortcuts with their functions are as follows:
    – Tab – Completes the remainder of a partially typed command or keyword
    – Space bar – displays the next screen
    – ? – provides context-sensitive help
    – Up Arrow – Allows user to scroll backward through former commands
    – Ctrl-C – cancels any command currently being entered and returns directly to privileged EXEC mode
    – Ctrl-Shift-6 – Allows the user to interrupt an IOS process such as ping or traceroute

  25. In the show running-config command, which part of the syntax is represented by running-config?

    • the command
    • a keyword
    • a variable
    • a prompt
      Answers Explanation & Hints:

      The first part of the syntax, show , is the command, and the second part of the syntax, running-config, is the keyword. The keyword specifies what should be displayed as the output of the show command.

  26. After making configuration changes on a Cisco switch, a network administrator issues a copy running-config startup-config command. What is the result of issuing this command?

    • The new configuration will be stored in flash memory.
    • The new configuration will be loaded if the switch is restarted.
    • The current IOS file will be replaced with the newly configured file.
    • The configuration changes will be removed and the original configuration will be restored.
      Answers Explanation & Hints:

      With the copy running-config startup-config command, the content of the current operating configuration replaces the startup configuration file stored in NVRAM. The configuration file saved in NVRAM will be loaded when the device is restarted.

  27. What command will prevent all unencrypted passwords from displaying in plain text in a configuration file?

    • (config)# enable password secret
    • (config)# enable secret Secret_Password
    • (config-line)# password secret
    • (config)# service password-encryption
    • (config)# enable secret Encrypted_Password
      Answers Explanation & Hints:

      To prevent all configured passwords from appearing in plain text in configuration files, an administrator can execute the service password-encryption command. This command encrypts all configured passwords in the configuration file.

  28. A network administrator enters the service password-encryption command into the configuration mode of a router. What does this command accomplish?

    • This command encrypts passwords as they are transmitted across serial WAN links.
    • This command prevents someone from viewing the running configuration passwords.
    • This command enables a strong encryption algorithm for the enable secret password command.
    • This command automatically encrypts passwords in configuration files that are currently stored in NVRAM.
    • This command provides an exclusive encrypted password for external service personnel who are required to do router maintenance.
      Answers Explanation & Hints:

      The startup-config and running-config files display most passwords in plaintext. Use the service password-encryption global config command to encrypt all plaintext passwords in these files.

  29. What method can be used by two computers to ensure that packets are not dropped because too much data is being sent too quickly?

    • encapsulation
    • flow control
    • access method
    • response timeout
      Answers Explanation & Hints:

      In order for two computers to be able to communicate effectively, there must be a mechanism that allows both the source and destination to set the timing of the transmission and receipt of data. Flow control allows for this by ensuring that data is not sent too fast for it to be received properly.

  30. Which statement accurately describes a TCP/IP encapsulation process when a PC is sending data to the network?

    • Data is sent from the internet layer to the network access layer.
    • Packets are sent from the network access layer to the transport layer.
    • Segments are sent from the transport layer to the internet layer.
    • Frames are sent from the network access layer to the internet layer.
      Answers Explanation & Hints:

      When the data is traveling from the PC to the network, the transport layer sends segments to the internet layer. The internet layer sends packets to the network access layer, which creates frames and then converts the frames to bits. The bits are released to the network media.

  31. What three application layer protocols are part of the TCP/IP protocol suite? (Choose three.)

    • ARP
    • DHCP
    • DNS
    • FTP
    • NAT
    • PPP
      Answers Explanation & Hints:

      DNS, DHCP, and FTP are all application layer protocols in the TCP/IP protocol suite. ARP and PPP are network access layer protocols, and NAT is an internet layer protocol in the TCP/IP protocol suite.

  32. Match the description to the organization. (Not all options are used.)

    CCNA1 v7 – ITNv7 – Modules 1 – 3 Basic Network Connectivity and Communications Exam Answers 006

    CCNA1 v7 – ITNv7 – Modules 1 – 3 Basic Network Connectivity and Communications Exam Answers 006

    Answers Explanation & Hints:

    The EIA is an international standards and trade organization for electronics organizations. It is best known for its standards related to electrical wiring, connectors, and the 19-inch racks used to mount networking equipment.

  33. Which name is assigned to the transport layer PDU?

    • bits
    • data
    • frame
    • packet
    • segment
      Answers Explanation & Hints:

      Application data is passed down the protocol stack on its way to be transmitted across the network media. During the process, various protocols add information to it at each level. At each stage of the process, a PDU (protocol data unit) has a different name to reflect its new functions. The PDUs are named according to the protocols of the TCP/IP suite: Data – The general term for the PDU used at the application layer.
      Segment – transport layer PDU
      Packet – network layer PDU
      Frame – data link layer PDU
      Bits – A physical layer PDU used when physically transmitting data over the medium

  34. When IPv4 addressing is manually configured on a web server, which property of the IPv4 configuration identifies the network and host portion for an IPv4 address?

    • DNS server address
    • subnet mask
    • default gateway
    • DHCP server address
      Answers Explanation & Hints:

      There are several components that need to be entered when configuring IPv4 for an end device: IPv4 address – uniquely identifies an end device on the network
      Subnet mask – determines the network address portion and host portion for an IPv4 address
      Default gateway – the IP address of the router interface used for communicating with hosts in another network
      DNS server addres s – the IP address of the Domain Name System (DNS) server
      DHCP server address (if DHCP is used) is not configured manually on end devices. It will be provided by a DHCP server when an end device requests an IP address.

  35. What process involves placing one PDU inside of another PDU?

    • encapsulation
    • encoding
    • segmentation
    • flow control
      Answers Explanation & Hints:

      When a message is placed inside of another message, this is known as encapsulation. On networks, encapsulation takes place when one protocol data unit is carried inside of the data field of the next lower protocol data unit.

  36. What layer is responsible for routing messages through an internetwork in the TCP/IP model?

    • internet
    • transport
    • network access
    • session
      Answers Explanation & Hints:

      The TCP/IP model consists of four layers: application, transport, internet, and network access. Of these four layers, it is the internet layer that is responsible for routing messages. The session layer is not part of the TCP/IP model but is rather part of the OSI model.

  37. For the TCP/IP protocol suite, what is the correct order of events when a Telnet message is being prepared to be sent over the network?

    CCNA1 v7 – ITNv7 – Modules 1 – 3 Basic Network Connectivity and Communications Exam Answers 007

    CCNA1 v7 – ITNv7 – Modules 1 – 3 Basic Network Connectivity and Communications Exam Answers 007

  38. Which PDU format is used when bits are received from the network medium by the NIC of a host?

    • file
    • frame
    • packet
    • segment
      Answers Explanation & Hints:

      When received at the physical layer of a host, the bits are formatted into a frame at the data link layer. A packet is the PDU at the network layer. A segment is the PDU at the transport layer. A file is a data structure that may be used at the application layer.

  39. Refer to the exhibit. ServerB is attempting to contact HostA. Which two statements correctly identify the addressing that ServerB will generate in the process? (Choose two.)

    CCNA1 v7 – ITNv7 – Modules 1 – 3 Basic Network Connectivity and Communications Exam Answers 03

    CCNA1 v7 – ITNv7 – Modules 1 – 3 Basic Network Connectivity and Communications Exam Answers 03

    • ServerB will generate a packet with the destination IP address of RouterB.
    • ServerB will generate a frame with the destination MAC address of SwitchB.
    • ServerB will generate a packet with the destination IP address of RouterA.
    • ServerB will generate a frame with the destination MAC address of RouterB.
    • ServerB will generate a packet with the destination IP address of HostA.
    • ServerB will generate a frame with the destination MAC address of RouterA.
      Answers Explanation & Hints:

      In order to send data to HostA, ServerB will generate a packet that contains the IP address of the destination device on the remote network and a frame that contains the MAC address of the default gateway device on the local network.

  40. Which method allows a computer to react accordingly when it requests data from a server and the server takes too long to respond?

    • encapsulation
    • flow control
    • access method
    • response timeout 
      Answers Explanation & Hints:

      If a computer makes a request and does not hear a response within an acceptable amount of time, the computer assumes that no answer is coming and reacts accordingly.

  41. A web client is receiving a response for a web page from a web server. From the perspective of the client, what is the correct order of the protocol stack that is used to decode the received transmission?

    • Ethernet, IP, TCP, HTTP
    • HTTP, TCP, IP, Ethernet
    • Ethernet, TCP, IP, HTTP
    • HTTP, Ethernet, IP, TCP
      Answers Explanation & Hints:

      1. HTTP governs the way that a web server and client interact.
      2. TCP manages individual conversations between web servers and clients.
      3. IP is responsible for delivery across the best path to the destination.
      4. Ethernet takes the packet from IP and formats it for transmission.

  42. Which two OSI model layers have the same functionality as a single layer of the TCP/IP model? (Choose two.)

    • data link
    • network
    • physical
    • session
    • transport
      Answers Explanation & Hints:

      The OSI data link and physical layers together are equivalent to the TCP/IP network access layer. The OSI transport layer is functionally equivalent to the TCP/IP transport layer, and the OSI network layer is equivalent to the TCP/IP internet layer. The OSI application, presentation, and session layers are functionally equivalent to the application layer within the TCP/IP model.

  43. At which layer of the OSI model would a logical address be added during encapsulation?

    • physical layer
    • data link layer
    • network layer
    • transport layer
      Answers Explanation & Hints:

      Logical addresses, also known as IP addresses, are added at the network layer. Physical addresses are edded at the data link layer. Port addresses are added at the transport layer. No addresses are added at the physical layer.

  44. What is a characteristic of multicast messages?

    • They are sent to a select group of hosts.
    • They are sent to all hosts on a network.
    • They must be acknowledged.
    • They are sent to a single destination.
      Answers Explanation & Hints:

      Multicast is a one-to-many type of communication. Multicast messages are addressed to a specific multicast group.

  45. Which statement is correct about network protocols?

    • Network protocols define the type of hardware that is used and how it is mounted in racks.
    • They define how messages are exchanged between the source and the destination.
    • They all function in the network access layer of TCP/IP.
    • They are only required for exchange of messages between devices on remote networks.
      Answers Explanation & Hints:

      Network protocols are implemented in hardware, or software, or both. They interact with each other within different layers of a protocol stack. Protocols have nothing to do with the installation of the network equipment. Network protocols are required to exchange information between source and destination devices in both local and remote networks.

  46. What is an advantage of network devices using open standard protocols?

    • Network communications is confined to data transfers between devices from the same vendor.
    • A client host and a server running different operating systems can successfully exchange data.
    • Internet access can be controlled by a single ISP in each market.
    • Competition and innovation are limited to specific types of products.
      Answers Explanation & Hints:

      An advantage of network devices implementing open standard protocols, such as from the TCP/IP suite, is that clients and servers running different operating systems can communicate with each other. Open standard protocols facilitate innovation and competition between vendors and across markets, and can reduce the occurrence of monopolies in networking markets.

  47. Which device performs the function of determining the path that messages should take through internetworks?

    • a router
    • a firewall
    • a web server
    • a DSL modem
      Answers Explanation & Hints:

      A router is used to determine the path that the messages should take through the network. A firewall is used to filter incoming and outgoing traffic. A DSL modem is used to provide Internet connection for a home or an organization.

  48. Open the PT Activity. Perform the tasks in the activity instructions and then answer the question.

    What is the IP address of the switch virtual interface (SVI) on Switch0?

    • 192.168.5.10
    • 192.168.10.5
    • 192.168.10.1
    • 192.168.5.0
      Answers Explanation & Hints:

      After the enable command is issued, the show running-configuration command or the show ip interfaces brief command will display the IP address of the switch virtual interface (SVI).

  49. Why would a Layer 2 switch need an IP address?

    • to enable the switch to send broadcast frames to attached PCs
    • to enable the switch to function as a default gateway
    • to enable the switch to be managed remotely
    • to enable the switch to receive frames from attached PCs
      Answers Explanation & Hints:

      A switch, as a Layer 2 device, does not need an IP address to transmit frames to attached devices. However, when a switch is accessed remotely through the network, it must have a Layer 3 address. The IP address must be applied to a virtual interface rather than to a physical interface. Routers, not switches, function as default gateways.

  50. Refer to the exhibit. An administrator is trying to configure the switch but receives the error message that is displayed in the exhibit. What is the problem?

    CCNA1 v7 – ITNv7 – Modules 1 – 3 Basic Network Connectivity and Communications Exam Answers 01

    CCNA1 v7 – ITNv7 – Modules 1 – 3 Basic Network Connectivity and Communications Exam Answers 01

    • The entire command, configure terminal, must be used.
    • The administrator is already in global configuration mode.
    • The administrator must first enter privileged EXEC mode before issuing the command.
    • The administrator must connect via the console port to access global configuration mode.
      Answers Explanation & Hints:

      In order to enter global configuration mode, the command configure terminal , or a shortened version such as config t , must be entered from privileged EXEC mode. In this scenario the administrator is in user EXEC mode, as indicated by the > symbol after the hostname. The administrator would need to use the enable command to move into privileged EXEC mode before entering the configure terminal command.

  51. What term describes a network owned by one organization that provides safe and secure access to individuals who work for a different organization?

    • extranet
    • cloud
    • BYOD
    • quality of service
  52. What term describes storing personal files on servers over the internet to provide access anywhere, anytime, and on any device?

    • cloud
    • BYOD
    • quality of service
    • converged network
  53. What term describes a network where one computer can be both client and server?

    • peer-to-peer
    • cloud
    • BYOD
    • quality of service
  54. What term describes a type of network used by people who work from home or from a small remote office?

    • SOHO network
    • BYOD
    • quality of service
    • converged network
  55. What term describes a computing model where server software runs on dedicated computers?

    • client/server
    • internet
    • intranet
    • extranet
  56. What term describes a type of network used by people who work from home or from a small remote office?

    • SOHO network
    • internet
    • intranet
    • extranet
  57. What term describes a technology that allows devices to connect to the LAN using an electrical outlet?

    • powerline networking
    • internet
    • intranet
    • extranet
  58. What term describes a policy that allows network devices to manage the flow of data to give priority to voice and video?

    • quality of service
    • internet
    • intranet
    • extranet
  59. What term describes a private collection of LANs and WANs that belongs to an organization?

    • intranet
    • internet
    • extranet
    • peer-to-peer
  60. What term describes the ability to use personal devices across a business or campus network?

    • BYOD
    • internet
    • intranet
    • extranet
  61. At which OSI layer is a source IP address added to a PDU during the encapsulation process?

    • network layer
    • data link layer
    • transport layer
    • application layer
  62. At which OSI layer is a destination port number added to a PDU during the encapsulation process?

    • transport layer
    • data link layer
    • network layer
    • application layer
  63. At which OSI layer is data added to a PDU during the encapsulation process?

    • application layer
    • data link layer
    • network layer
    • transport layer
  64. At which OSI layer is a source IP address added to a PDU during the encapsulation process?

    • network layer
    • data link layer
    • application layer
    • presentation layer
  65. At which OSI layer is data added to a PDU during the encapsulation process?

    • application layer
    • transport layer
    • network layer
    • presentation layer
  66. At which OSI layer is a destination IP address added to a PDU during the encapsulation process?

    • network layer
    • application layer
    • transport layer
    • presentation layer
  67. At which OSI layer is a source MAC address added to a PDU during the encapsulation process?

    • data link layer
    • application layer
    • transport layer
    • presentation layer
  68. At which OSI layer is a source port number added to a PDU during the encapsulation process?

    • transport layer
    • application layer
    • network layer
    • presentation layer
  69. At which OSI layer is a destination MAC address added to a PDU during the encapsulation process?

    • data link layer
    • transport layer
    • application layer
    • network layer
  70. At which OSI layer is a source port number added to a PDU during the encapsulation process?

    • transport layer
    • network layer
    • application layer
    • data link layer

Category: CCNA v7.0

14.6.10 Check Your Understanding – IBN and Cisco DNA Center Answers

14.6.10 Check Your Understanding – IBN and Cisco DNA Center Answers

1. Which IBN feature is responsible for continuous validation and verification that the network is meeting the expressed intent? Translation Activation Assurance Network Infrastructure 2. Which IBN feature enables the network administrator to express the expected networking behavior that will best support the business intent? Translation Activation Assurance …

14.5.6 Check Your Understanding – Configuration Management Answers

14.5.6 Check Your Understanding – Configuration Management Answers

1. Which of the following are not typically used as configuration tools? (Choose two.) API Ansible Chef Puppet SaltStack SNMP 2. Identify the term for the following definition in relationship to configuration management tools: Programmatically performing a task on a system such as configuring an interface or deploying …

14.4.7 Check Your Understanding – REST Answers

14.4.7 Check Your Understanding – REST Answers

1. An API in considered RESTful if it has which of the following features? (Choose three.) Stateful Stateless Cacheable Cacheless Client-Server Server-Server 2. Which of the following is a URL? https://www.cisco.com/c/en/us/solutions/design-zone.html#~all-guides https://www.cisco.com/c/en/us/solutions/design-zone.html www.cisco.com/c/en/us/solutions/design-zone.html #~all-guides 3. Which of the following is a URN? https://www.cisco.com/c/en/us/solutions/design-zone.html#~all-guides https://www.cisco.com/c/en/us/solutions/design-zone.html www.cisco.com/c/en/us/solutions/design-zone.html #~all-guides 4. Which …

14.3.6 Check Your Understanding – APIs Answers

14.3.6 Check Your Understanding – APIs Answers

1. True or False: An API is a set of rules describing how one application can interact with another, and the instructions to allow the interaction to occur. True False 2. Which of the following APIs would be used exclusively between Google and Cisco? Open or Public API …

14.2.9 Check Your Understanding – Data Formats Answers

14.2.9 Check Your Understanding – Data Formats Answers

1. Which of the following data formats is typically used to display web pages? HTML XML JSON YAML 2. Which of the following describes a key/value pair? A key is a string and a value is a list A key/value pair is another name for an array. A …

14.1.4 Check Your Understanding – Benefits of Automation Answers

14.1.4 Check Your Understanding – Benefits of Automation Answers

1. You use online banking to pay a bill. Automation Not automation 2. Production levels are automatically tied to demand, eliminating unneeded product and reducing the impact on the environment. Automation Not automation 3. Your GPS recalculates the best route to a destination based on current traffic congestion. …

13.5.8 Check Your Understanding – Controllers Answers

13.5.8 Check Your Understanding – Controllers Answers

1. This is a table that matches incoming packets to a particular flow and specifies the functions that are to be performed on the packet. neighbor table routing table flow table ARP table meter table 2. This is a table that triggers a variety of performance-related actions on …

13.4.5 Check Your Understanding – Software-Defined Networking Answers

13.4.5 Check Your Understanding – Software-Defined Networking Answers

1. Which characteristic best describes the control plane of a networking device? (Choose three.) Information sent to this plane is processed by the CPU. This plane is also called the forwarding plane. This plane makes forwarding decisions. This plane contains router protocol neighbor and topology tables. This plane …

13.3.4 Check Your Understanding – Virtual Network Infrastructure Answers

13.3.4 Check Your Understanding – Virtual Network Infrastructure Answers

1. True or False. A Type 1 hypervisor is installed on top of the existing OS and is called the hosted approach. True False 2. True of False. A Type 1 hypervisor requires a management console to manage the hypervisor. True False 3. True or False. Management consoles …

13.2.7 Check Your Understanding – Virtualization Answers

13.2.7 Check Your Understanding – Virtualization Answers

1. What technology separates the OS from the hardware? web application virtualization dedicate servers firmware 2. What device uses all the RAM, processing power, and hard drive space devoted to one service? virtual machine Type 1 hypervisor dedicated server virtualized server 3. Which technology is a program, firmware, …

Network Essentials Final Exam Answers 100%

  1. What is a disadvantage of deploying a peer-to-peer network model?

    •  difficulty of setup
    •  lack of centralized administration
    •  high degree of complexity
    •  high cost
    Explanation:

    The simplest peer-to-peer network consists of two computers that are directly connected to each other through the use of a wired or wireless connection. The primary disadvantages of a peer-to-peer network are its lack of central administration, minimal security, and its lack of scalability.

  2. What is a purpose of an IP address?

    •  It identifies the physical location of a data center.
    •  It identifies a location in memory from which a program runs.
    •  It identifies a return address for replying to email messages.
    •  It identifies the source and destination of data packets.
    Explanation:

    Packets that are routed across the Internet contain source and destination IP addresses. These addresses are used to determine how the packets should be routed from source to destination by intermediate devices.

  3. A consumer places a smartphone close to a pay terminal at a store and the shopping charge is successfully paid. Which type of wireless technology was used?

    •  Bluetooth
    •  NFC
    •  Wi-Fi
    •  3G
    Explanation:

    NFC is a wireless technology that allows data to be exchanged between devices that are in very close proximity to each other.

  4. Which type of network cable is commonly used to connect office computers to the local network?

    •  coaxial cable
    •  twisted-pair cable
    •  glass fiber-optic cable
    •  plastic fiber-optic cable
    Explanation:

    Twisted-pair is a type of copper cable used to interconnect devices on a local network.

  5. What are two advantages of using fiber-optic cabling to interconnect devices? (Choose two.)

    •  Fiber-optic cable is immune from EMI and RFI.
    •  Fiber-optic cables can extend several miles.
    •  Fiber-optic cables use extra shielding to protect copper wires.
    •  Fiber-optic cables are easy to install..
    •  Fiber-optic cables are commonly found in both homes and small businesses.
    Explanation:

    Fiber-optic cables provide immunity to both EMI and RFI and a single cable can extend for several miles before regeneration is needed.

  6. The functions of which two layers of the OSI model are matched to the network access layer of the TCP/IP model? (Choose two.)

    •  application
    •  physical
    •  transport
    •  network
    •  data link
    Explanation:

    The application layer of the TCP/IP model is composed of the application, presentation, and session layers of the OSI model and is used by network applications to complete specific tasks. The network access layer of the TCP/IP model is composed of the physical and data link layers of the OSI model and describes how a device accesses and sends data over the network media.

  7. What is the minimum size of a valid Ethernet frame?

    •  48 bytes
    •  64 bytes
    •  96 bytes
    •  128 bytes
    Explanation:

    Ethernet standards define a frame with a minimum of 64 bytes and a maximum of 1518 bytes including fields of destination MAC address, source MAC, Length/Type, data payload, and FCS.

  8. A network design engineer has been asked to design the IP addressing scheme for a customer network. The network will use IP addresses from the 192.168.30.0/24 network. The engineer allocates 254 IP addresses for the hosts on the network but excludes 192.168.30.0/24 and 192.168.30.255/24 IP addresses. Why must the engineer exclude these two IP addresses?

    •  192.168.30.0/24 and 192.168.30.255/24 IP addresses are reserved for the email and DNS servers.
    •  192.168.30.0/24 and 192.168.30.255/24 IP addresses are reserved for outside Internet connectivity.
    •  192.168.30.0/24 is the network IP address and 192.168.30.255/24 is the IP broadcast address.
    •  192.168.30.0/24 is the IP address reserved for the default gateway, and 192.168.30.255/24 is the IP address reserved for the DHCP server.
    Explanation:

    The IPv4 addressing system is a hierarchical addressing system. An IPv4 address is made up of two parts, the network address and the host address. When the host portion is all “0s” in binary, it is designated as a network address. When the host portion is all “1s” in binary, it is designated as a broadcast address. These two addresses cannot be assigned to individual hosts.

  9. Which protocol is used to automatically assign IP addresses to hosts?

    •  DNS
    •  NAT
    •  DHCP
    •  HTTP
    Explanation:

    DHCP, or Dynamic Host Configuration Protocol, is used to automatically assign IP addresses to hosts that are configured as DHCP clients.​

  10. What are three advantages of using private IP addresses and NAT? (Choose three.)

    •  conserves registered public IP addresses
    •  reduces CPU usage on customer routers
    •  creates multiple public IP addresses
    •  hides private LAN addressing from outside devices that are connected to the Internet
    •  permits LAN expansion without additional public IP addresses
    •  improves the performance of the router that is connected to the Internet
    Explanation:

    Private IP addresses are designed to be exclusively used for internal networks and they cannot be used on the Internet. Thus they are not visible directly from the Internet and they can be used freely by network administrators for internal networks. In order for the internal hosts to access the Internet, NAT is used to translate between private and public IP addresses. NAT takes an internal private IP address and translates it to a global public IP address before the packet is forwarded.

  11. What was the reason for the creation and implementation of IPv6?

    •  to make reading a 32-bit address easier
    •  to relieve IPv4 address depletion
    •  to provide more address space in the Internet Names Registry
    •  to allow NAT support for private addressing
    Explanation:

    IPv4 addressing space is exhausted by the rapid growth of the Internet and the devices connected to the Internet. IPv6 expands the IP addressing space by increasing the address length from the 32 bits to 128 bits, which should provide sufficient addresses for future Internet growth needs for many years to come.

  12. Which three pieces of information are identified by a URL? (Choose three.)

    •  the MAC address of the web server
    •  the protocol that is being used
    •  the domain name that is being accessed
    •  the IP address of the gateway
    •  the version of the browser
    •  the location of the resource
    Explanation:

    URLs are used to access specific content on a web server through a web browser. The URL identifies the protocol that is being used such as HTTP or FTP, the domain of the server, and the location of the resource on the server.

  13. Which protocol is used by web servers to serve up a web page?

    •  FTP
    •  HTTP
    •  IMAP
    •  POP
    Explanation:

    Hypertext Transfer Protocol (HTTP) is a protocol that is used by web servers to serve up a web page.​

  14. Why do streaming audio and video applications use UDP instead of TCP?

    •  Streaming audio and video applications require receipt of all packets regardless of delay.
    •  The three-way handshake used in UDP speeds up the audio and video streams.
    •  Streaming audio and video applications cannot tolerate the delay caused by retransmission.
    •  UDP provides guaranteed segment delivery to provide reliable audio and video streams.
    Explanation:

    UDP is a ‘best effort’ delivery system that does not require acknowledgment of receipt and is the preferred transport service for streaming audio and video. UDP provides low overhead and does not implement as much delay as TCP. Streaming audio and video cannot tolerate network traffic congestion and long delays.

  15. At which layer of the TCP/IP model does TCP operate?

    •  transport
    •  application
    •  internetwork
    •  network access
    Explanation:

    TCP is the Transmission Control Protocol and it operates at the transport layer of the TCP/IP model. TCP ensures that IP packets are delivered reliably.

  16. Which protocol is used to transfer web pages from a server to a client device?

    •  HTML
    •  SMTP
    •  HTTP
    •  SSH
    •  POP
    Explanation:

    The Hypertext Transfer Protocol (HTTP) provides services between a web browser requesting web pages and a web server responding to the requests. HTML (Hypertext Markup Language) is a markup language to instruct a web browser how to interpret and display a web page.

  17. Which type of device filtering can be enabled on some wireless access points or wireless routers?

    •  authentication
    •  IP address
    •  user ID
    •  MAC address
    Explanation:

    On wireless access points, MAC addresses can be manually entered to filter which devices are allowed on the wireless network.

  18. Which technology is used to uniquely identify a WLAN network?

    •  MAC address table
    •  SSID
    •  WEP
    •  WPA
    Explanation:

    When a wireless AP or router is being set up, an SSID is configured to uniquely identify the WLAN that is managed by the device.

  19. What type of Internet connection would be best for a residence in a remote area without mobile phone coverage or wired connectivity?

    •  dial-up
    •  cellular
    •  satellite
    •  DSL
    Explanation:

    Satellite Internet service provides the best option for a home user that would otherwise have no Internet connectivity at all. Cellular Internet is only available in areas with mobile phone coverage.

  20. Which advanced wireless security measure allows a network administrator to keep sensitive data secure as it travels over the air in a wireless network?

    •  encryption
    •  authentication
    •  traffic filtering
    •  MAC address filtering
    Explanation:

    Encryption is used to secure plaintext data that would be viewable traveling over a wireless network.

  21. Which three steps must be completed to manually connect an Android or IOS device to a secured wireless network? (Choose three.)

    •  Input the authentication password.
    •  Enter the network SSID.
    •  Choose the correct security type.
    •  Set the IP address.
    •  Activate the Bluetooth antenna.
    •  Change the MAC address.
    Explanation:

    In order to connect an Android or IOS device to a Wi-Fi network manually, perform these steps:

    • Enter the network SSID of the wireless network.
    • Choose the security type used by the wireless network.
    • Input the password to authenticate successfully.
  22. Which three attacks exploit human behavior? (Choose three.)

    •  pretexting
    •  brute force
    •  phishing
    •  zombies
    •  vishing
    •  malware
    Explanation:

    Attacks aimed at exploiting human behavior such as pretexting, phishing, and vishing are commonly used by hackers to obtain information directly from authorized users.​​

  23. Which address prefix range is reserved for IPv4 multicast?

    •  240.0.0.0 – 254.255.255.255
    •  224.0.0.0 – 239.255.255.255
    •  169.254.0.0 – 169.254.255.255
    •  127.0.0.0 – 127.255.255.255
    Explanation:

    Multicast IPv4 addresses use the reserved class D address range of 224.0.0.0 to 239.255.255.255.

  24. An intruder tries a large number of possibilities in rapid succession to guess a password. As a result, other users on the network are locked out. What type of attack has occurred?

    •  DDoS
    •  brute force
    •  ping of death
    •  SYN flooding
    Explanation:

    In a brute force attack, an unauthorized person will try to gain access to a system by sending as many passwords as possible as rapidly as possible.

  25. What type of DoS attack originates from a malicious host that has an invalid source IP address and that requests a client connection?​

    •  ping of death
    •  SYN flooding
    •  phishing
    •  brute force
    Explanation:

    SYN flooding is a type of denial of services attack where the attacker sends fake session requests to a target host in an attempt to prevent the host from responding to legitimate session requests.​

  26. Which two ports can be used for the initial configuration of a Cisco router? (Choose two.)

    •  AUX
    •  console
    •  flash slot
    •  LAN interface
    •  WAN interface
    Explanation:

    The AUX and console ports on a Cisco 1941 router can be used to perform initial setup. The initial setup does not require that the router be connected to a network. A network administrator uses a computer to connect to the console ports directly. A network administrator can also access the router remotely through a dialup phone line and a modem connected to the AUX port. LAN and WAN interfaces are used to connect to networks. The flash slots expand storage capability through the use of a compact flash card.

  27. When is an IP address required to be configured on a Cisco LAN switch?

    •  when the switch is connected to another switch
    •  when the switch must forward LAN traffic
    •  when the switch needs to be managed through an in-band connection
    •  when the switch is configured from a computer connected to the console port
    Explanation:

    A LAN switch uses Layer 2 addresses to determine how to forward packets. An IP address is only necessary if the switch needs to be remotely managed through an in-band connection on the network.

  28. What advantage does SSH offer over Telnet?

    •  encryption
    •  more connection lines
    •  connection-oriented services
    •  username and password authentication
    Explanation:

    Both Telnet and SSH are used to remotely connect to a network device for management tasks. However, Telnet uses plaintext communications, whereas SSH provides security for remote connections by providing encryption of all transmitted data between devices.

  29. Refer to the exhibit. A network technician is statically assigning an IP address to a PC. The default gateway is correct. What would be a valid IP address to assign to the host?

    Network Essentials Final Exam Answers 001

    Network Essentials Final Exam Answers 001

    •  128.106.10.100
    •  128.107.255.1
    •  128.107.255.254
    •  128.108.100.10
    Explanation:

    In data communication, the default gateway device is involved only when a host needs to communicate with other hosts on another network. The default gateway address identifies a network device used by hosts to communicate with devices on remote networks. The IP address of the host and the default gateway address must be in the same network. With the default subnet mask, valid host IP addresses range from 128.107.0.1 to 128.107.255.254.

  30. Which three items should be documented after troubleshooting an internal web server crash? (Choose three.)

    •  when the problem occurred
    •  the dialogue with the user
    •  the configuration of all networking devices on the LAN at the time of the crash
    •  the configuration of all hosts on the LAN at the time of the crash
    •  steps that were performed to identify the cause of the problem
    •  steps that were performed that failed to identify the cause of the problem
    Explanation:

    Proper documentation is a very important step in troubleshooting. The proper documentation can help troubleshoot the same or similar problems in the future. The documentation should include as much information as possible about the following:

    • the problem encountered
    • steps taken to determine the cause of the problem
    • steps to correct the problem and ensure that it will not reoccur
  31. Which step should be taken next once a problem is resolved during a troubleshooting process?

    •  Consult an FAQ.
    •  Escalate the problem.
    •  Update the documentation.
    •  Run remote access software.
    Explanation:

    Proper documentation can help troubleshoot the same or similar problems in the future. Proper documentation should include the type of error encountered, the steps taken to determine the cause of the problem, and the steps taken to correct the problem.

  32. Which three pieces of information are revealed by the ipconfig command (without the /all switch)? (Choose three.)

    •  IP address
    •  DHCP server
    •  subnet mask
    •  default gateway
    •  DNS server
    •  MAC address
    Explanation:

    The ipconfig command is used to display the current TCP/IP network configuration values of the device. This includes the IP address; the subnet mask and the default gateway addresses. Using the ipconfig /all switch displays additional information like the physical address of the device and the DHCP server address among other things.

  33. Fill in the blank.

    A          zombie         is a computer that is infected with malicious software and instructed to join a botnet.​

    Explanation:

    Zombies are computer systems that are infected with bot software which, once activated, instructs infected machines to function as a botnet.​

  34. Match the router prompt to the configuration task.

    Network Essentials Final Exam Answers 001

    Network Essentials Final Exam Answers 001

  35. Match the command to the function.

    Network Essentials Final Exam Answers 002

    Network Essentials Final Exam Answers 002

CCNA Exam Questions and Answers 2019-2020

  • CCNA 1 Exam Answers 2020
  • CCNA 2 Exam Answers 2020
  • CCNA 3 Exam Answers 2020
  • CCNA 4 Exam Answers 2020

CCNA 1 v6.0 Introduction to Networks

This course introduces the architecture, structure, functions, components, and models of the Internet and other computer networks. The principles and structure of IP addressing and the fundamentals of Ethernet concepts, media, and operations are introduced to provide a foundation for the curriculum. By the end of the course, students will be able to build simple LANs, perform basic configurations for routers and switches, and implement IP addressing schemes.

CCNA 1 Exam Answers 2020

  • CCNA 1 Pretest Exam Answers
  • CCNA 1 Chapter 1 Exam Answers: Explore the Network
  • CCNA 1 Chapter 2 Exam Answers: Configure a Network Operating System
  • CCNA 1 Chapter 3 Exam Answers: Network Protocols and Communications
  • CCNA 1 Chapter 4 Exam Answers: Network Access
  • CCNA 1 Chapter 5 Exam Answers: Ethernet
  • CCNA 1 Chapter 6 Exam Answers: Network Layer
  • CCNA 1 Chapter 6 Network Layer PT Practice Skills Assessment
  • CCNA 1 Chapter 7 Exam Answers: Transport Layer
  • CCNA 1 Chapter 8 Exam Answers: IP Addressing
  • CCNA 1 Chapter 9 Exam Answers: Subnetting IP Networks
  • CCNA 1 Chapter 10 Exam Answers: Application Layer
  • CCNA 1 Chapter 11 Exam Answers: Build a Small Network
  • CCNA 1 Pt Practice Skills Exam Answers
  • CCNA 1 Practice Final Exam Answers
  • CCNA 1 Final Exam Answers

Students who complete Introduction to Networks will be able to perform the following functions:

  • Explain network technologies.
  • Explain how devices access local and remote network resources.
  • Implement basic network connectivity between devices.
  • Design an IP addressing scheme to provide network connectivity for a small to medium-sized business network.
  • Describe router hardware.
  • Explain how switching operates in a small to medium-sized business network.
  • Configure monitoring tools available for small to medium-sized business networks.
  • Configure initial settings on a network device.

CCNA 2 v6.0: Routing and Switching Essentials

This course describes the architecture, components, and operations of routers and switches in a small network.
Students learn how to configure a router and a switch for basic functionality. By the end of this course, students will be able to configure and troubleshoot routers and switches and resolve common issues with virtual LANs and interVLAN routing in both IPv4 and IPv6 networks.

CCNA 2 Exam Answers 2020

  • CCNA 2 Pretest Exam Answers
  • CCNA 2 Chapter 1 Exam Answers: Routing Concepts
  • CCNA 2 Chapter 2 Exam Answers: Static Routing
  • CCNA 2 RSE Chapter 2 SIC Practice Skills Assessment
  • CCNA 2 Chapter 3 Exam Answers: Dynamic Routing
  • CCNA 2 Chapter 4 Exam Answers: Switched Networks
  • CCNA 2 Chapter 5 Exam Answers: Switch Configuration
  • CCNA 2 Chapter 6 Exam Answers: VLANs
  • CCNA 2 RSE Chapter 6 SIC Practice Skills Assessment
  • CCNA 2 Chapter 7 Exam Answers: Access Control Lists
  • CCNA 2 RSE Chapter 7 Access Control Lists Practice Skills Assessment
  • CCNA 2 Chapter 8 Exam Answers: DHCP
  • CCNA 2 Chapter 9 Exam Answers: Network Address Translation for IPv4
  • CCNA 2 Chapter 10 Exam Answers: Device Discovery, Management, and Maintenance
  • RSE Practice Skills Part 1
  • RSE Practice Skills Part 2
  • CCNA 2 Practice Final Exam Answers
  • CCNA 2 Final Exam Answers
  • CCNA 2 Pt Practice Skills Exam Answers

Students who complete the Routing and Switching Essentials course will be able to perform the following functions:

  • Implement DHCP on a router.
  • Implement network address translation (NAT).
  • Implement access control lists (ACLs) to filter traffic.
  • Determine how a router will forward traffic based on the contents of a routing table.
  • Implement static routing.
  • Explain how switching operates in a small to the medium-sized business network.
  • Configure Ethernet switch ports.
  • Implement VLANs.
  • Use monitoring tools and network management protocols to troubleshoot data networks.
  • Configure monitoring tools available for small to medium-sized business networks.
  • Configure initial settings on a network device.

CCNA 3 v6.0 Scaling Networks

This course describes the architecture, components, and operations of routers and switches in larger and more
complex networks. Students learn how to configure routers and switches for advanced functionality. By the end of
this course, students will be able to configure and troubleshoot routers and switches and resolve common issues
with OSPF, EIGRP, and STP in both IPv4 and IPv6 networks. Students will also develop the knowledge and skills
needed to implement a WLAN in a small-to-medium network.

CCNA 3 Exam Answers 2020

  • CCNA 3 Pretest Exam Answers
  • CCNA 3 Chapter 1 Exam Answers: Introduction to Scaling Networks
  • CCNA 3 Chapter 2 Exam Answers: LAN Redundancy
  • CCNA 3 Chapter 3 Exam Answers: Link Aggregation
  • CCNA 3 Chapter 4 Exam Answers: Wireless LANs
  • CCNA 3 Chapter 5 Exam Answers: Adjust and Troubleshoot Single-Area OSPF
  • CCNA 3 Chapter 6 Exam Answers: Multiarea OSPF
  • CCNA 3 Chapter 7 Exam Answers: EIGRP
  • CCNA 3 Chapter 8 Exam Answers: EIGRP Advanced Configurations and Troubleshooting
  • CCNA 3 Chapter 9 Exam Answers: IOS Images and Licensing
  • CCNA 3 Practice Final Exam Answers
  • CCNA 3 Final Exam Answers
  • EIGRP Practice Skills Assessment
  • OSPF Practice Skills Assessment

Students who complete the Scaling Networks course will be able to perform the following functions:

  • Configure, verify and troubleshoot VLANs spanning multiple switches: VTP, DTP and EtherChannel
  • Configure, verify and troubleshoot STP protocols: Rapid Spanning Tree Protocol (RSTP), Per VLAN Spanning Tree Plus Protocol (PVST+) and Rapid Per VLAN Spanning Tree Plus Protocol (RPVST+)
  • Understand, configure, and troubleshoot first hop redundancy protocols (HSRP)
  • Understand and describe dynamic routing protocols, distance vector routing protocols, and link-state routing protocols
  • Configure, verify and troubleshoot routers in a complex routed IPv4 or IPv6 network using single-area OSPF, multi-area OSPF, and Enhanced Interior Gateway Routing Protocol (EIGRP)

CCNA 4 v6.0 Connecting Networks

This course discusses the WAN technologies and network services required by converged applications in a complex network. The course enables students to understand the selection criteria of network devices and WAN technologies to meet network requirements. Students learn how to configure and troubleshoot network devices and resolve common issues with data link protocols. Students will also develop the knowledge and skills needed to implement virtual private network (VPN) operations in a complex network.

CCNA 4 Exam Answers 2020

  • CCNA 4 Chapter 1 Exam Answers: Hierarchical Network Design
  • CCNA 4 Chapter 2 Exam Answers: Connecting to the WAN
  • CCNA 4 Chapter 3 Exam Answers: Point-to-Point Connections
  • CCNA 4 Chapter 3 Skills Assessment
  • CCNA 4 Chapter 4 Exam Answers: Frame Relay
  • CCNA 4 Chapter 5 Exam Answers: Network Address Translation for IPv4
  • CCNA 4 Chapter 5 Skills Assessment
  • CCNA 4 Chapter 6 Exam Answers: Broadband Solutions
  • CCNA 4 Chapter 7 Exam Answers: Securing Site-to-Site Connectivity
  • CCNA 4 Chapter 8 Exam Answers: Monitoring the Network
  • CCNA 4 Chapter 9 Exam Answers: Troubleshooting the Network
  • CCNA 4 Practice Final Exam Answers
  • CCNA 4 Final Exam Answers
  • CCNA 4 Pt Practice Skills Exam Answers

Students who complete the Connecting Networks course will be able to perform the following functions:

  • Understand and describe different WAN technologies and their benefits
  • Configure, verify and troubleshoot serial connections: HDLC and PPP
  • Understand and describe the operations and benefits of virtual private networks (VPNs) and tunneling
  • Configure, verify and troubleshoot tunneling operations
  • Configure, verify and troubleshoot eBGP in a single-homed remote access network.
  • Configure, verify and troubleshoot IPv4 and IPv6 ACLs
  • Configure SNMP to monitor network operations in a small to medium-sized business network
  • Troubleshoot a network problem using SPAN
  • Describe basic QoS concepts: network transmission characteristics, queueing algorithms and QoS mechanisms
  • Describe Cloud Computing and Network Programmability in an enterprise network architecture
  • Describe the pillars and the values of the Internet of Everything
  • Troubleshoot end-to-end connectivity in a small to medium-sized business network, using a systematic approach

Понравилась статья? Поделить с друзьями:
  • Ответы 1 финальный экзамен ccna 1
  • Ответственный человек это сочинение
  • Ответственный за электрохозяйство экзамен в ростехнадзоре
  • Ответственный за тепловое хозяйство экзамен
  • Ответственный за бдд экзамен в угадн