CCNA 2 Chapter 1 Exam Answers 1. A network administrator enters the command copy running-config startup-config. Which type of memory will the startup configuration be placed into? flash RAM NVRAM* ROM 2. Which packet-forwarding method does a router use to make switching decisions when it is using a forwarding information base and an adjacency table? fast switching Cisco Express Forwarding process switching flow process 3. Fill in the blank. When a router receives a packet, it examines the destination address of the packet and looks in the ———- table to determine the best path to use to forward the packet.…
Author: adminccna
CCNA 1 Practice Final Exam Answers Which term refers to a network that provides secure access to the corporate offices by suppliers, customers and collaborators? Internet intranet extranet* extendednet A small business user is looking for an ISP connection that provides high speed digital transmission over regular phone lines. What ISP connection type should be used? DSL* dial-up satellite cell modem cable modem Refer to the exhibit. An administrator is trying to configure the switch but receives the error message that is displayed in the exhibit. What is the problem? The entire command, configure terminal, must be used. The administrator…
CCNA 1 Chapter 11 Exam Answers What is the purpose of using SSH to connect to a router? It allows a router to be configured using a graphical interface. It allows a secure remote connection to the router command line interface.* It allows the router to be monitored through a network management application. It allows secure transfer of the IOS software image from an unsecure workstation or server. Which two traffic types require delay sensitive delivery? (Choose two.) email web FTP voice * video * A network administrator for a small company is contemplating how to scale the network over…
CCNA 1 Chapter 10 Exam Answers Which application layer protocol uses message types such as GET, PUT, and POST? DNS DHCP SMTP HTTP* POP3 Which layer in the TCP/IP model is used for formatting, compressing, and encrypting data? internetwork session presentation application* network access Which three statements describe a DHCP Discover message? (Choose three.) The source MAC address is 48 ones (FF-FF-FF-FF-FF-FF). The destination IP address is 255.255.255.255.* The message comes from a server offering an IP address. The message comes from a client seeking an IP address. * All hosts receive the message, but only a DHCP server replies.*…
CCNA 1 Chapter 9 Exam Answers A host device needs to send a large video file across the network while providing data communication to other users. Which feature will allow different communication streams to occur at the same time, without having a single data stream using all available bandwidth? window size multiplexing* port numbers acknowledgments What is the complete range of TCP and UDP well-known ports? 0 to 255 0 to 1023* 256 – 1023 1024 – 49151 A PC is downloading a large file from a server. The TCP window is 1000 bytes. The server is sending the file…
CCNA 1 Chapter 8 Exam Answers A company has a network address of 192.168.1.64 with a subnet mask of 255.255.255.192. The company wants to create two subnetworks that would contain 10 hosts and 18 hosts respectively. Which two networks would achieve that? (Choose two.) 192.168.1.16/28 192.168.1.64/27* 192.168.1.128/27 192.168.1.96/28* 192.168.1.192/28 Refer to the exhibit. A company uses the address block of 128.107.0.0/16 for its network. What subnet mask would provide the maximum number of equal size subnets while providing enough host addresses for each subnet in the exhibit? 255.255.255.0 255.255.255.128* 255.255.255.192 255.255.255.224 255.255.255.240 A network administrator is variably subnetting a network.…
CCNA 1 Chapter 7 Exam Answers What are two types of IPv6 unicast addresses? (Choose two.) multicast loopback* link-local* anycast broadcast What does the IP address 172.17.4.250/24 represent? network address multicast address host address* broadcast address What is the purpose of the subnet mask in conjunction with an IP address? to uniquely identify a host on a network to identify whether the address is public or private to determine the subnet to which the host belongs* to mask the IP address to outsiders What subnet mask is represented by the slash notation /20? 255.255.255.248 255.255.224.0 255.255.240.0* 255.255.255.0 255.255.255.192 A message…
CCNA 1 Chapter 6 Exam Answers When a connectionless protocol is in use at a lower layer of the OSI model, how is missing data detected and retransmitted if necessary? Connectionless acknowledgements are used to request retransmission. Upper-layer connection-oriented protocols keep track of the data received and can request retransmission from the upper-level protocols on the sending host.* Network layer IP protocols manage the communication sessions if connection-oriented transport services are not available. The best-effort delivery process guarantees that all packets that are sent are received. Which field in the IPv4 header is used to prevent a packet from traversing…
CCNA 1 Chapter 5 Exam Answers Refer to the exhibit. PC1 issues an ARP request because it needs to send a packet to PC2. In this scenario, what will happen next? PC2 will send an ARP reply with its MAC address. RT1 will send an ARP reply with its Fa0/0 MAC address. RT1 will send an ARP reply with the PC2 MAC address. SW1 will send an ARP reply with the PC2 MAC address. SW1 will send an ARP reply with its Fa0/1 MAC address. What statement describes Ethernet? It defines the most common LAN type in the world. It…
CCNA 1 Chapter 4 Exam Answers What is contained in the trailer of a data-link frame? logical address physical address data error detection Which method of data transfer allows information to be sent and received at the same time? full duplex half duplex multiplex simplex Which statement describes an extended star topology? End devices connect to a central intermediate device, which in turn connects to other central intermediate devices. End devices are connected together by a bus and each bus connects to a central intermediate device. Each end system is connected to its respective neighbor via an intermediate device. All…
CCNA 1 Chapter 3 Exam Answers Refer to the exhibit. HostA is attempting to contact ServerB. Which two statements correctly describe the addressing that HostA will generate in the process? (Choose two.) A packet with the destination IP address of RouterB. A frame with the destination MAC address of SwitchA. A packet with the destination IP address of RouterA. A frame with the destination MAC address of RouterA. * A packet with the destination IP address of ServerB.* A frame with the destination MAC address of ServerB. Which address does a NIC use when deciding whether to accept a frame?…
CCNA 1 Chapter 2 Exam Answers A network administrator needs to keep the user ID, password, and session contents private when establishing remote CLI connectivity with a switch to manage it. Which access method should be chosen? Telnet Console AUX SSH* A technician is adding a new PC to a LAN. After unpacking the components and making all the connections, the technician starts the PC. After the OS loads, the technician opens a browser, and verifies that the PC can reach the Internet. Why was the PC able to connect to the network with no additional configuration? The PC does…