Quantcast
Channel: HeiseR Dev Zone » Son Trinh
Viewing all 24 articles
Browse latest View live

CCNA 1 v5.0 Introduction to Networks Practice Final – CLI command answers

$
0
0

Download File .PKA

You will practice and be assessed on the following skills:

  • Configuration of initial IOS device settings
  • Design and calculation of IPv4 addressing
  • Configuration of IOS device interfaces including IPv4 and IPv6 addressing when appropriate
  • Addressing of network hosts with IPv4 and IPv6 addresses
  • Enhancing device security, including configuration of the secure transport protocol for remote device configuration
  • Configuration of a switch management interface

Requirements by device:

  • Town Hall router:
  • Configuration of initial router settings
  • Interface configuration and IPv4 and IPv6 addressing
  • Device security enhancement or “device hardening”
  • Secure transport for remote configuration connections as covered in the labs.
  • Backup of the configuration file to a TFTP server
  • Administration Switch:
  • Enabling basic remote management by Telnet
  • PC and Server hosts:
  • IPv4 full addressing
  • IPv6 addressing

687x263xccna1 skill final.png.pagespeed.ic.5NilqW4yb7 CCNA 1 v5.0 Introduction to Networks Practice Final   CLI command answers

Device Interface IPv4 Address Subnet Mask IPv4 Default Gateway IPv6 Address IPv6 Default Gateway
Town Hall G0/0 N/A 2001:DB8:ACAD:A::1/64 N/A
G0/1 N/A 2001:DB8:ACAD:B::1/64 N/A
Administration Switch Vlan 1 N/A N/A
Reception Host NIC 2001:DB8:ACAD:A::FF
Operator Host NIC 2001:DB8:ACAD:A::15
IT Host NIC 2001:DB8:ACAD:B::FF
TFTP Server NIC 2001:DB8:ACAD:B::15

Step 1:

Design an IPv4 addressing scheme and complete the Addressing Table based on the following requirements. Use the table above to help you organize your work.

a. Subnet the 192.168.1.0/24 network to provide 30 host addresses per subnet while wasting the fewest addresses.

b. Assign the fourth subnet to the IT Department LAN.

c. Assign the last network host address (the highest) in this subnet to the G0/0 interface on Town Hall.

d. Starting with the fifth subnet, subnet the network again so that the new subnets will provide 14 host addresses per subnet while wasting the fewest addresses.

e. Assign the second of these new 14-host subnets to the Administration LAN.

f. Assign the last network host address (the highest) in the Administration LAN subnet to the G0/1 interface of the Town Hall router.

g. Assign the second to the last address (the second highest) in this subnet to the VLAN 1 interface of the Administration Switch.

h. Configure addresses on the hosts using any of the remaining addresses in their respective subnets.

Step 2: Configure the Town Hall Router.

a. Configure the Town Hall router with all initial configurations that you have learned in the course so far:

· Configure the router hostname: Middle

· Protect device configurations from unauthorized access with the encrypted password.

· Secure all of the ways to access the router using methods covered in the course and labs.

· Newly-entered passwords must have a minimum length of 10 characters.

· Prevent all passwords from being viewed in clear text in device configuration files.

· Configure the router to only accept in-band management connections over the protocol that is more secure than Telnet, as was done in the labs. Use the value 1024 for encryption key strength.

· Configure user authentication for in-band management connections.

b. Configure the two Gigabit Ethernet interfaces using the IPv4 addressing values you calculated and the IPv6 values provided in the addressing table.

· Reconfigure the link local addresses as was practiced in the labs. The IPv6 link-local Interface ID should match the IPv6 unicast Interface ID as is practiced in the labs.

· Document the interfaces in the configuration file.

Step 3: Configure the Administration Switch.

Configure Administration Switch for remote management.

Step 4: Configure and Verify Host Addressing.

a. Use the IPv4 addressing from Step 1 and the IPv6 addressing values provided in the addressing table to configure all host PCs with the correct addressing.

b. Use the router interface link-local addresses as the IPv6 default gateways on the hosts.

c. All hosts should be able to ping each other over IPv4.

Step 5: Backup the Configuration of the Town Hall Router to TFTP.

a. Complete the configuration of the TFTP server using the IPv4 addressing values from Step 1 and the values in the addressing table.

b. Backup the running configuration of Town Hall to the TFTP Server. Use the default file name.

Answer

Router>
Router>enable
Router#configure terminal
Router(config)#interface g0/0
Router(config-if)#ip address 192.168.1.126 255.255.255.224
Router(config-if)#description IT Department LAN
Router(config-if)#no shutdown
Router(config-if)#exit
Router(config)#interface g0/1
Router(config-if)#ip address 192.168.1.158 255.255.255.240
Router(config-if)#description Administration LAN
Router(config-if)#no shutdown
Router(config-if)#exit
Router(config)#ipv6 unicast-routing
Router(config)#interface g0/0
Router(config-if)#ipv6 address 2001:db8:acad:A::1/64
Router(config-if)#ipv6 address FE80::1 link-local
Router(config-if)#no shutdown
Router(config-if)#exit
Router(config)#interface g0/1
Router(config-if)#ipv6 address 2001:db8:acad:B::1/64
Router(config-if)#ipv6 address FE80::1 link-local
Router(config-if)#no shutdown
Router(config-if)#exit

Router(config)#
Router(config)#hostname Middle
Middle(config)#Enable secret class12345
Middle(config)#line console 0
Middle(config-line)#password cisconet2014
Middle(config-line)#login
Middle(config-line)#exit
Middle(config)#line vty 0 15
Middle(config-line)#password cisconet2014
Middle(config-line)#login
Middle(config-line)#exit
Middle(config)#line aux 0
Middle(config-line)#password cisconet2014
Middle(config-line)#login
Middle(config-line)#exit
Middle(config)#
Middle(config)#Banner motd “Authorized Access Only”
Middle(config)#security password min-length 10
Middle(config)#service password-encryption
Middle(config)#ip domain-name ccna5.net
Middle(config)#username cisco secret cisconet2014
Middle(config)#crypto key generate rsa
The name for the keys will be: Middle.cisco.local
Choose the size of the key modulus in the range of 360 to 2048 for your
General Purpose Keys. Choosing a key modulus greater than 512 may take
a few minutes.

How many bits in the modulus [512]: 1024
% Generating 1024 bit RSA keys, keys will be non-exportable…[OK]

Middle(config)#line vty 0 15
Middle(config-line)#login local
Middle(config-line)#transport input ssh
Middle(config-line)#exit
Middle(config)#

—————————————–
Switch1 ip default gateway 192.168.1.158

—————————————–

Reception Host
default gateway FE80::1
default gateway 192.168.1.126

IP address 192.168.1.97/27
IPv6 address 2001:DB8:ACAD:A::FF/64

—————————————–

Operator Host

default gateway FE80::1
default gateway 192.168.1.126

IP address 192.168.1.98/27
IPv6 address 2001:DB8:ACAD:A::15/64

—————————————–

IT Host

default gateway FE80::1
default gateway 192.168.1.158

IP address 192.168.1.145/28
IPv6 address 2001:DB8:ACAD:B::FF/64

—————————————–

SERVER TFTP

default gateway FE80::1
default gateway 192.168.1.158

IP address 192.168.1.146/28
IPv6 address 2001:DB8:ACAD:B::15/64

—————————————–

Backup the Configuration of the Town Hall Router to TFTP.

Middle#copy running-config tftp
Address or name of remote host []? 192.168.1.146
Destination filename [Router-confg]? [Press Enter]

—————————————–

The post CCNA 1 v5.0 Introduction to Networks Practice Final – CLI command answers appeared first on HeiseR Dev Zone.


CCNA 1 Chapter 6 V5.0 Skill Assessment – Packet Tracer

$
0
0

ccna 1 v5 0 chapter 6 skill assessment 8211 packet tracer 1 CCNA 1 Chapter 6 V5.0 Skill Assessment   Packet Tracer

Science Router Configuration

Science>enable

Science#configure terminal

Science(config)#enable secret cisco

Science(config)#line console 0

Science(config-line)#password cisco

Science(config-line)#login

Science(config-line)#exit

Science(config)#line vty 0 4

Science(config-line)#password cisco

Science(config-line)#login

Science(config-line)#exit

Science(config)#line aux 0

Science(config-line)#password cisco

Science(config-line)#login

Science(config-line)#exit

Science(config)#service password-encryption

Science(config)#banner motd “Authorized Personnel Only”

Science(config)#interface g0/0

Science(config-if)#ip address 172.16.5.1 255.255.255.0

Science(config-if)#no shutdown

Science(config-if)#description Bio LAN

Science(config-if)#exit

Science(config)#interface g0/1

Science(config-if)#ip address 192.168.5.1 255.255.255.0

Science(config-if)#no shutdown

Science(config-if)#description Phys LAN

Science(config-if)#end

Science#write

Building configuration…

[OK]

Bio Switch Configuration

Switch>enable

Switch#configure terminal

Switch(config)#hostname Bio

Bio(config)#enable secret class

Bio(config)#line console 0

Bio(config-line)#password cisco

Bio(config-line)#login

Bio(config-line)#exit

Bio(config)#line vty 0 4

Bio(config-line)#password cisco

Bio(config-line)#login

Bio(config-line)#exit

Bio(config)#service password-encryption

Bio(config)#banner motd “Authorized Personnel Only”

Bio(config)#interface vlan 1

Bio(config-if)#ip address 172.16.5.2 255.255.255.0

Bio(config-if)#no shutdown

Bio(config-if)#description Bio – Science LAN

Bio(config-if)#exit

Bio(config)#ip default-gateway 172.16.5.1

Bio(config)#end

Bio#write

Building configuration…

[OK]

Phys Switch Configuration

Switch>enable

Switch#configure terminal

Switch(config)#hostname Phys

Phys(config)#enable secret class

Phys(config)#line console 0

Phys(config-line)#password cisco

Phys(config-line)#login

Phys(config-line)#exit

Phys(config)#line vty 0 4

Phys(config-line)#password cisco

Phys(config-line)#login

Phys(config-line)#exit

Phys(config)#service password-encryption

Phys(config)#banner motd “Authorized Personnel Only”

Phys(config)#interface vlan 1

Phys(config-if)#ip address 192.168.5.252 255.255.255.0

Phys(config-if)#no shutdown

Phys(config-if)#description Phys – Science LAN

Phys(config-if)#exit

Phys(config)#ip default-gateway 192.168.5.1

Phys(config)#end

Phys#write

Building configuration…

[OK]

Bio 1

172.16.5.10

255.255.255.0

172.16.5.1

Bio 2

172.16.5.11

255.255.255.0

172.16.5.1

Phys 1

192.168.5.10

255.255.255.0

192.168.5.1

Phys 2

192.168.5.11

255.255.255.0

192.168.5.1

The post CCNA 1 Chapter 6 V5.0 Skill Assessment – Packet Tracer appeared first on HeiseR Dev Zone.

CCNA 1 v5.0 Final Exam Answers 2014

$
0
0

1 Refer to the exhibit.

672x390xp1 ccna1 final.png.pagespeed.ic.mYz4z14REa CCNA 1 v5.0 Final Exam Answers 2014
The network administrator enters these commands into the R1 router:
R1# copy running-config tftp
Address or name of remote host [ ]?

When the router prompts for an address or remote host name, what IP address should the administrator enter at the prompt?
192.168.9.254

192.168.10.1

192.168.10.2

192.168.11.254

192.168.11.252
2 Which three statements characterize the transport layer protocols? (Choose three.)
TCP uses port numbers to provide reliable transportation of IP packets.

TCP and UDP port numbers are used by application layer protocols.

TCP uses windowing and sequencing to provide reliable transfer of data.

TCP is a connection-oriented protocol. UDP is a connectionless protocol.

UDP uses windowing and acknowledgments for reliable transfer of data.
3 What is the purpose of ICMP messages?
to inform routers about network topology changes

to ensure the delivery of an IP packet

to monitor the process of a domain name to IP address resolution

to provide feedback of IP packet transmissions
4 A technician uses the ping 127.0.0.1 command. What is the technician testing?
connectivity between a PC and the default gateway

connectivity between two adjacent Cisco devices

physical connectivity of a particular PC and the network

the TCP/IP stack on a network host

connectivity between two PCs on the same network
5 What will a Layer 2 switch do when the destination MAC address of a received frame is not in the MAC table?
It notifies the sending host that the frame cannot be delivered.

It initiates an ARP request.

It forwards the frame out of all ports except for the port at which the frame was received.

It broadcasts the frame out of all ports on the switch.
6 What is a characteristic of the LLC sublayer?
It places information in the frame that allows multiple Layer 3 protocols to use the same network interface and media.

It provides delimitation of data according to the physical signaling requirements of the medium.

It defines software processes that provide services to the physical layer.

It provides the logical addressing required that identifies the device.
7
On which switch interface would an administrator configure an IP address so that the switch can be managed remotely?

VLAN 1

console 0

vty 0

FastEthernet0/1
8
A network engineer is measuring the transfer of bits across the company backbone for a mission critical database application. The engineer notices that the network throughput appears lower than the bandwidth expected. Which three factors could influence the differences in throughput? (Choose three.)

the reliability of the gigabit Ethernet infrastructure of the backbone

the amount of traffic that is currently crossing the network

the type of traffic that is crossing the network

the sophistication of the encapsulation method applied to the data

the bandwidth of the WAN connection to the Internet

the latency that is created by the number of network devices that the data is crossing
9
When applied to a router, which command would help mitigate brute-force password attacks against the router?

service password-encryption

login block-for 60 attempts 5 within 60

banner motd $Max failed logins = 5$

exec-timeout 30
10
Which two statements correctly describe a router memory type and its contents? (Choose two.)

ROM is nonvolatile and contains basic diagnostic software.

FLASH is nonvolatile and contains a limited portion of the IOS​.

ROM is nonvolatile and stores the running IOS.

RAM is volatile and stores the IP routing table.

NVRAM is nonvolatile and stores other system files.
11
Which two components are necessary for a wireless client to be installed on a WLAN? (Choose two.)

custom adapter

wireless bridge

media

wireless NIC

crossover cable

wireless client software
12 Launch PT - Hide and Save PT
971x574xp12 ccna1 final.png.pagespeed.ic.QeMasAiuuY CCNA 1 v5.0 Final Exam Answers 2014
Open the PT activity. Perform the tasks in the activity instructions and then fill in the blank.
The Server0 message is .​ ”   winner   ”
13
A host is accessing a Web server on a remote network. Which three functions are performed by intermediary network devices during this conversation? (Choose three.)

applying security settings to control the flow of data

notifying other devices when errors occur

regenerating data signals

acting as a client or a server

serving as the source or destination of the messages

providing a channel over which messages travel
14
607x574xp14 ccna1 final.png.pagespeed.ic.LMxJys5p45 CCNA 1 v5.0 Final Exam Answers 2014
15
584x521xp15 ccna1 final.png.pagespeed.ic.Fj7dG sBd0 CCNA 1 v5.0 Final Exam Answers 2014
16
Which address on a PC does not change, even if the PC is moved to a different network?

IP address

logical address

MAC address

default gateway address
17
What will happen if the default gateway address is incorrectly configured on a host?

A ping from the host to 127.0.0.1 would not be successful.

The host will have to use ARP to determine the correct address of the default gateway.

The host cannot communicate with other hosts in the local network.

The host cannot communicate with hosts in other networks.

The switch will not forward packets initiated by the host.
18
A host PC has just booted and is attempting to lease an address through DHCP. Which two messages will the client typically broadcast on the network? (Choose two.)

DHCPREQUEST

DHCPOFFER

DHCPDISCOVER

DHCPNACK

DHCPACK
19
472x93xp19 ccna1 final.png.pagespeed.ic.Aop 0hOjK7 CCNA 1 v5.0 Final Exam Answers 2014
Refer to the exhibit. An administrator wants to change the name of a brand new switch, using the hostname command as shown. What prompt will display after the command is issued?​
Switch#

My(config)#​

My Switch(config)#​

Switch(config)#​

MySwitch(config)#​
20
After making configuration changes, a network administrator issues a copy running-config startup-config command in a Cisco switch. What is the result of issuing this command?

The configuration changes will be removed and the original configuration will be restored.

The new configuration will be stored in flash memory.

The current IOS file will be replaced with the newly configured file.

The new configuration will be loaded if the switch is restarted.
21
886x359xp21 ccna1 final.png.pagespeed.ic.uAYJcJsV5S CCNA 1 v5.0 Final Exam Answers 2014
Refer to the exhibit.A TCP segment from a server has been captured by Wireshark, which is running on a host. What acknowledgement number will the host return for the TCP segment that has been received?
2921

250

2

306

21
22
Which technology provides a solution to IPv4 address depletion by allowing multiple devices to share one public IP address?

ARP

DNS

SMB

DHCP

HTTP

NAT
  23 What is the purpose of the routing process?
to encapsulate data that is used to communicate across a network

to select the paths that are used to direct traffic to destination networks

to convert a URL name into an IP address

to provide secure Internet file transfer

to forward traffic on the basis of MAC addresses
  24 Three bank employees are using the corporate network. The first employee uses a web browser to view a company web page in order to read some announcements. The second employee accesses the corporate database to perform some financial transactions. The third employee participates in an important live audio conference with other corporate managers in branch offices. If QoS is implemented on this network, what will be the priorities from highest to lowest of the different data types?
audio conference, financial transactions, web page

financial transactions, audio conference, web page

audio conference, web page, financial transactions

financial transactions, web page, audio conference
25
A home user is looking for an ISP connection that provides high speed digital transmission over regular phone lines. What ISP connection type should be used?

cell modem

dial-up

cable modem

satellite

DSL
26
Which connection provides a secure CLI session with encryption to a Cisco switch?

a Telnet connection

an SSH connection

a console connection

an AUX connection
27 What is the purpose of the network security accounting function?
to provide challenge and response questions

to require users to prove who they are

to determine which resources a user can access

to keep track of the actions of a user
28
618x302xp28 ccna1 final.png.pagespeed.ic.GbYUomRXXI CCNA 1 v5.0 Final Exam Answers 2014
Refer to the exhibit. A network administrator is configuring access control to switch SW1. If the administrator uses Telnet to connect to the switch, which password is needed to access user EXEC mode?

lineconin

linevtyin

letmein

secretin
29
Which publicly available resources describe protocols, processes, and technologies for the Internet but do not give implementation details?

IEEE standards

Request for Comments

IRTF research papers

protocol models
  30 A PC is configured to obtain an IP address automatically from network 192.168.1.0/24. The network administrator issues the arp –a command and notices an entry of 192.168.1.255 ff-ff-ff-ff-ff-ff. Which statement describes this entry?
This entry refers to the PC itself.

This entry maps to the default gateway.

This is a static map entry.

This is a dynamic map entry.
31 Which subnet would include the address 192.168.1.96 as a usable host address?
192.168.1.64/26

192.168.1.32/28

192.168.1.32/27

192.168.1.64/29
32
A particular website does not appear to be responding on a Windows 7 computer. What command could the technician use to show any cached DNS entries for this web page?

ipconfig /all

ipconfig /displaydns

arp -a

nslookup
33 Which type of wireless security generates dynamic encryption keys each time a client associates with an AP?
WPA

PSK

WEP

EAP
34
A frame is transmitted from one networking device to another. Why does the receiving device check the FCS field in the frame?

to compare the interface media type between the sending and receiving ends

to determine the physical address of the sending device

to verify that the frame destination matches the MAC address of the receiving device

to check the frame for possible transmission errors

to verify the network layer protocol information
35
680x397xp35 ccna1 final.png.pagespeed.ic.I4ujMCpCoK CCNA 1 v5.0 Final Exam Answers 2014

Refer to the exhibit. Which IP addressing scheme should be changed?
Site 1

Site 3

Site 4

Site 2
36
What is the effect of configuring the ipv6 unicast-routing command on a router?

to assign the router to the all-nodes multicast group

to permit only unicast packets on the router

to enable the router as an IPv6 router

to prevent the router from joining the all-routers multicast group
37
Which three IP addresses are private ? (Choose three.)

10.1.1.1

172.16.4.4

224.6.6.6

192.168.5.5

172.32.5.2

192.167.10.10
38
671x451xp38 ccna1 final.png.pagespeed.ic.StuuugtzUw CCNA 1 v5.0 Final Exam Answers 2014

Refer to the exhibit. Consider the IP address configuration shown from PC1. What is a description of the default gateway address?
It is the IP address of the Router1 interface that connects the company to the Internet.

It is the IP address of the ISP network device located in the cloud.

It is the IP address of Switch1 that connects PC1 to other devices on the same LAN.

It is the IP address of the Router1 interface that connects the PC1 LAN to Router1.
39 During normal operation, from which location do most Cisco switches and routers run the IOS?
flash

RAM

NVRAM

disk drive
40
What is an important function of the physical layer of the OSI model?

It encodes frames into electrical, optical, or radio wave signals.

It accepts frames from the physical media.

It encapsulates upper layer data into frames.

It defines the media access method performed by the hardware interface.
41
Which procedure is used to reduce the effect of crosstalk in copper cables?

wrapping the bundle of wires with metallic shielding

avoiding sharp bends during installation

requiring proper grounding connections

designing a cable infrastructure to avoid crosstalk interference

twisting opposing circuit wire pairs together
42
What are the three primary functions provided by Layer 2 data encapsulation? (Choose three.)

placement and removal of frames from the media

detection of errors through CRC calculations

conversion of bits into data signals

delimiting groups of bits into frames

data link layer addressing

error correction through a collision detection method

session control using port numbers
43
What method is used to manage contention-based access on a wireless network?

token passing

CSMA/CD

CSMA/CA

priority ordering
44
What happens when part of an Internet radio transmission is not delivered to the destination?

A delivery failure message is sent to the source host.

The part of the radio transmission that was lost is re-sent.

The transmission continues without the missing portion.

The entire transmission is re-sent.
45
What is the auto-MDIX feature on a switch?

the automatic configuration of full-duplex operation over a single Ethernet copper or optical cable

the automatic configuration of an interface for a straight-through or a crossover Ethernet cable connection

the ability to turn a switch interface on or off accordingly if an active connection is detected

the automatic configuration of an interface for 10/100/1000 Mb/s operation
46
Which function is provided by TCP?

detection of missing packets

communication session control

path determination for data packets

data encapsulation
47
How does a Layer 3 switch differ from a Layer 2 switch?

A Layer 3 switch learns the MAC addresses that are associated with each of its ports. However, a Layer 2 switch does not.

A Layer 3 switch maintains an IP address table instead of a MAC address table.

A Layer 3 switch supports VLANs, but a Layer 2 switch does not.

An IP address can be assigned to a physical port of a Layer 3 switch. However, this is not supported in Layer 2 switches.
48
Which two notations are useable nibble boundaries when subnetting in IPv6? (Choose two.)

/68

/62

/66

/64

/70
49
What is the purpose of having a converged network?

to reduce the cost of deploying and maintaining the communication infrastructure

to provide high speed connectivity to all end devices

to make sure that all types of data packets will be treated equally

to achieve fault tolerance and high availability of data network infrastructure devices
50
671x267xp50 ccna1 final.png.pagespeed.ic.iAFFNE1L4  CCNA 1 v5.0 Final Exam Answers 2014
Refer to the exhibit. A ping to PC3 is issued from PC0, PC1, and PC2 in this exact order. Which MAC addresses will be contained in the S1 MAC address table that is associated with the Fa0/1 port?

just the PC0 MAC address

PC0, PC1, and PC2 MAC addresses

just the PC2 MAC address​

just PC0 and PC1 MAC addresses

just the PC1 MAC address
51
Which field in an IPv4 packet header will typically stay the same during its transmission?

Packet Length

Destination Address

Flag

Time-to-Live
52
What two preconfigured settings that affect security are found on most new wireless routers? (Choose two.)

MAC filtering enabled

default administrator password

WEP encryption enabled

PSK authentication required

broadcast SSID
53
Which parameter does the router use to choose the path to the destination when there are multiple routes available?

the higher metric value that is associated with the destination network

the lower metric value that is associated with the destination network

the higher gateway IP address to get to the destination network

the lower gateway IP address to get to the destination network
54
655x190xp54 ccna1 final.png.pagespeed.ic.iM2xgFFsEF CCNA 1 v5.0 Final Exam Answers 2014

Refer to the exhibit. What is the significance of the asterisk (*) in the exhibited output?
An asterisk designates that the file system has at least one file that uses that file system.

The asterisk designates which file system is the default file system.

An asterisk indicates that the file system is bootable.

The asterisk shows which file system was used to boot the system.
55
933x486xp55 ccna1 final.png.pagespeed.ic.lDq2u0syPr CCNA 1 v5.0 Final Exam Answers 2014

56
Fill in the blank.
During data communications, a host may need to send a single message to a specific group of destination hosts simultaneously. This message is in the form of a    ”  multicast    ”    message.
57
An administrator uses the Ctrl-Shift-6 key combination on a switch after issuing the ping command. What is the purpose of using these keystrokes?
to interrupt the ping process

to restart the ping process

to allow the user to complete the command

to exit to a different configuration mode
58
595x444xp58 ccna1 final.png.pagespeed.ic.e  8Ps0LWY CCNA 1 v5.0 Final Exam Answers 2014
Refer to the exhibit. Which area would most likely be an extranet for the company network that is shown?

area A

area D

area C

area B
59

634x574xp59 ccna1 final.png.pagespeed.ic.E9 7PSpwek CCNA 1 v5.0 Final Exam Answers 2014
60
639x574xp60 ccna1 final.png.pagespeed.ic.yiv0B7hUOJ CCNA 1 v5.0 Final Exam Answers 2014
61
In which default order will a router search for startup configuration information?

setup mode, NVRAM, TFTP

NVRAM, TFTP, setup mode

NVRAM, RAM, TFTP

TFTP, ROM, NVRAM

flash, ROM, setup mode
62
1017x574xp62 ccna1 final.png.pagespeed.ic.7ph298g2eI CCNA 1 v5.0 Final Exam Answers 2014
Launch PT - Hide and Save PT
Open the PT Activity. Perform the tasks in the activity instructions and then answer the question.
Which IPv6 address is assigned to the Serial0/0/0 interface on RT2?

2001:db8:abc:1::1

2001:db8:abc:5::1

2001:db8:abc:5::2

2001:db8:abc:10::15

 

63 
What is contained in the trailer of a data-link frame?

physical address

data

error detection*

logical address

64

966x547xp64 ccna1 final.png.pagespeed.ic.fzOZWmqr0R CCNA 1 v5.0 Final Exam Answers 2014

 

The post CCNA 1 v5.0 Final Exam Answers 2014 appeared first on HeiseR Dev Zone.

CCNA 1 v5.0 Final Exam 2 Answers 2014

$
0
0

Your school network blocks all websites related to online gaming. What type of security policy is being applied?

acceptable use

What are two examples of storage peripheral devices?

flash drive
external DVD

What layer is the first point of entry for a host into the network?

access layer

Which part of the electromagnetic spectrum is commonly used to exchange data between a PDA and a computer?

infrared

The area covered by a single AP is known as what?

basic service set

When acting as a DHCP server, an integrated router can provide what three types of information to a client?

default gateway
dynamic IP address
DNS server address

Refer to the graphic. Assume that the exhibited output is from a host that is connected to a Linksys integrated router. What is one of the first things you should check?

link status LED on the front of the router

A host sent a message that all other hosts on the switched local network received and processed. What type of domain are all these hosts a part of?

broadcast domain

Refer to the exhibit. A user on host A sends an e-mail to the user on host B. Which type of message does host A send?

unicast

Which type of computer uses an integrated monitor and keyboard?

laptop

Refer to the exhibit. What cabling fault does the exhibit represent?

split pair

What is the purpose of the ipconfig /release command?

It forces a client to give up its current IP address.

What is the function of the DNS server?

It translates a computer or domain name to the associated IP address.

Which part of a data packet is used by a router to determine the destination network?

destination IP address

A network engineer wants to represent confidential data in binary format.

What are the two possible values that the engineer can use? (Choose two.)

0
1

What is the purpose of spam filter software?

It examines incoming e-mail messages to identify the unsolicited ones.

A user is unable to send e-mail. While troubleshooting this problem, the network technician first verifies the physical connectivity of cables. Which troubleshooting approach is being followed?

bottom-up

Which two causes of networking problems are related to the physical layer? (Choose two.)

disconnected cables
improper operation of cooling fans

What is an advantage of selecting an operating system that has a commercial license over one with a GPL license?

The commercial license-based operating system provides structured support.

Refer to the exhibit. What is the purpose of assigning a network name of College?

It identifies the wireless LAN.

Refer to the exhibit. What is the effect of setting the security mode to WEP on the Linksys integrated router?

The WEP security mode encrypts network traffic during transmission between the AP and the wireless client.

A network technician is required to provide access to the Internet for a large company. What is needed to accomplish this task?

ISP

Refer to the exhibit. Assume that the command output is from a wireless DHCP client that is connected to a Linksys integrated router. What can be deduced from the output?

The wireless connection is operational.

What is specified by the host bits in an IP address?

identity of the computer on the network

What is the default subnet mask for an IP address of 64.100.19.14?

255.0.0.0

Which two transport layer protocols enable hosts to communicate and transfer data? (Choose two.)

TCP
UDP

A learner wants to interact with the operating system of a computer.

Which two methods can be used for this? (Choose two.)

CLI
GUI

Which installation option enables a single physical resource to function simultaneously as multiple logical resources?

upgrade

Which two statements are true about local applications? (Choose two.)

They are stored on the local hard disk.
They run on the computer where they are installed.

For an IP address, what component decides the number of bits that is used to represent the host ID?

network number

What type of cable would be required to connect a Linksys router to a wired PC?

straight-through cable

Refer to the exhibit. If H4 sends a message to H1 and the destination MAC address is in the MAC table for both Switch1 and Switch2, which host devices will receive the message?

only H1

Because of an increasing number of users, bandwidth per user on a WLAN has decreased to a point where users are complaining about poor performance. What can be done to improve the user experience?

Reduce the number of devices using each channel.

What are two best practices that are used when configuring a small home WLAN? (Choose two.)

the use of pre-shared keys
the disabling of SSID broadcasting

Which protocol in its default configuration downloads e-mail messages to the client computer and deletes them from the server?

POP3

What is the purpose of creating a DMZ during network firewall implementation?

to allow for a publicly accessible zone without compromising the internal network

Which of the following are the address ranges of the private IP addresses? (Choose three.)

10.0.0.0 to 10.255.255.255
172.16.0.0 to 172.31.255.255
192.168.0.0 to 192.168.255.255

What does the term “attenuation” mean in data communication?

loss of signal strength as distance increases

What advantage does a peer-to-peer network have over a client-server network?

It eliminates the need for centralized administration.

In an attempt to verify connectivity, a user issues the ping command to a device that is not on the local network. The ping is unsuccessful. What can be determined from this result?

The router between the host and destination is faulty.

A company has a web server that must be accessible to both external and internal clients. Which security policy best practice should be followed to maximize security of the server?

Place the web server in a DMZ.

The help desk at a large packaging company receives a call from a user who is concerned about lost data files on the local PC. The help desk technician learns that the user clicked on an icon that appeared to be a program update, but no updates were scheduled for that program. What type of attack has likely occurred?

Trojan horse

Where do ISPs get the public addresses that they assign to end users?

ISPs obtain address blocks from registry organizations.
Which transport layer protocol is used when an application requires acknowledgment that data has been delivered?

TCP

What type of message is sent to a specific group of hosts?

multicast

A network administrator has been notified that users have experienced problems gaining access to network resources. What utility could be used to directly query a name server for information on a destination domain?

nslookup

What is the function of CSMA/CA on a wireless Ethernet network?

to prevent collisions

Refer to the exhibit. Why would a network administrator use the network mode that is shown?

to support hosts that use different 802.11 standards

When terminating UTP cabling, why is it important to untwist only a small amount of each wire pair?

minimizes crosstalk

A network technician suspects that malware on a user PC is opening multiple TCP connections to a specific foreign host address. Which Windows command line utility can be used to confirm the multiple TCP connections?

netstat
What are two examples of storage peripheral devices? (Choose two.)

flash drive
external DVD
When acting as a DHCP server, an integrated router can provide what three types of information to a client? (Choose three.)

default gateway
dynamic IP address
DNS server address

The post CCNA 1 v5.0 Final Exam 2 Answers 2014 appeared first on HeiseR Dev Zone.

Viewing all 24 articles
Browse latest View live


Latest Images