CCNA 1 - Introduction to Networks

CCNA 1 v7 Final Exam – Full 60 Q&A with explanations. Covers RTP, ZigBee, TCP/IP layers, DNS records, proprietary protocols & more. Ideal for mastering core networking concepts for CCNA prep.

Alice Edwards
Contributor
4.7
49
10 months ago
Preview (14 of 44 Pages)
100%
Log in to unlock

Page 1

CCNA 1 - Introduction to Networks - Page 1 preview image

Loading page ...

Explain:The OSI model network layer corresponds directly to theinternet layer of the TCP/IP model and is used to describeprotocols that address and route messages through aninternetwork.4. Which type of server relies on record typessuch as A, NS, AAAA, and MX in order to provideservices?DNS_emailfilewebExplain:A DNS server stores records that are used to resolve IPaddresses to host names. Some DNS record types include thefollowing:A - an end device IPv4 addressNS - an authoritative name serverAAAA - an end device IPv6 addressMX - a mail exchange record5. What are proprietary protocols?jprotocols developed by private organizations tooperate on any vendor hardwareprotocols that can be freely used by any organizationor vendorprotocols developed by organizationswho have control over their definitionand operationza collection of protocols known as the TCP/IPprotocol suiteCCNA 1 - Introduction to Networks (Version7.00) - ITNv7 Final Exam Answers FullNumber of questions: 60; Passed score: 80-100%1. Which two traffic types use the Real-TimeTransport Protocol (RTP)? (Choose two.)uvideouwebufile transfervoicepeer to peer2. Which wireless technology has low-power anddata rate requirements making it popular inhome automation applications?nZigBeenLoRaWANn5GWi-FiExplanation:ZigBee is an IEEE 802.15.4 wireless standarddesigned for creating personal-area networks. Low energy,power, and data rate requirements make Zigbee a popularprotocol for connecting home automation devices.3. Which layer of the TCP/IP model provides aroute to forward messages through aninternetwork?applicationnetwork accessinternetntransport

Page 2

CCNA 1 - Introduction to Networks - Page 2 preview image

Loading page ...

Explain:Proprietary protocols have their definition and operationcontrolled by one company or vendor. Some of them can beused by different organizations with permission from the owner.The TCP/IP protocol suite is an open standard, not aproprietary protocol.6. What service is provided by DNS?Resolves domain names, such ascisco.com, into IP addresses.A basic set of rules for exchanging text, graphicimages, sound, video, and other multimedia files onthe web.nAllows for data transfers between a client and a fileserver.Uses encryption to secure the exchange of text,graphic images, sound, and video on the web.7. A client packet is received by a server. Thepacket has a destination port number of 110.What service is the client requesting?nDNSDHCPSMTPnPOP38. What command can be used on a Windows PCto see the IP configuration of that computer?ushow ip interface briefupingushow interfacesipconfig9. A wired laser printer is attached to a homecomputer. That printer has been shared so thatother computers on the home network can alsouse the printer. What networking model is inuse?Jclient-based_master-slavepoint-to-pointjpeer-to-peer (P2P)Explanation:Peer-to-peer (P2P) networks have two or morenetwork devices that can share resources such as printers orfiles without having a dedicated server.10. What characteristic describes a virus?a network device that filters access and trafficcoming into a network“Ithe use of stolen credentials to access private data“Ian attack that slows or crashes a device or networkservicemalicious software or code running on anend device11. Three bank employees are using thecorporate network. The first employee uses aweb browser to view a company web page inorder to read some announcements. The secondemployee accesses the corporate database toperform some financial transactions. The thirdemployee participates in an important live audioconference with other corporate managers inbranch offices. If QoS is implemented on thisnetwork, what will be the priorities from highestto lowest of the different data types?Jfinancial transactions, web page, audio conferenceaudio conference, financial transactions,web pagefinancial transactions, audio conference, web pageaudio conference, web page, financial transactions

Page 3

CCNA 1 - Introduction to Networks - Page 3 preview image

Loading page ...

Explanation:QoS mechanisms enable the establishment ofqueue management strategies that enforce priorities fordifferent categories of application data. Thus, this queuingenables voice data to have priority over transaction data, whichhas priority over web data.model would be used?12. Match the description to the IPv6 addressingcomponent. (Not all options are used.)only application and Internet layersonly Internet and network access layersonly application, Internet, and network access layersapplication, transport, Internet, andnetwork access layersonly application, transport, network, data link, andphysical layersapplication, session, transport, network, data link,and physical layersExplanation:The TCP/IP model contains the application,transport, internet, and network access layers. A file transferuses the FTP application layer protocol. The data would movefrom the application layer through all of the layers of the modeland across the network to the file server.14. Match the characteristic to the forwardingmethod. (Not all options are used.)13. Refer to the exhibit. If Host1 were to transfera file to the server, what layers of the TCP/IP

Page 4

CCNA 1 - Introduction to Networks - Page 4 preview image

Loading page ...

gateway setting of host Hl?Rl: S0/0/0tR2: SO/O/1nRLGO/OnR2: SO/O/OExplanation:The default gateway for host Hl is the routerinterface that is attached to the LAN that Hl is a member of. Inthis case, that is the G0/0 interface of Rl. Hl should beconfigured with the IP address of that interface in its addressingsettings. Rl will provide routing services to packets from Hlthat need to be forwarded to remote networks.Explanation:A storc-and-forward switch always stores theentire frame before forwarding, and checks its CRC and framelength. A cut-through switch can forward frames beforereceiving the destination address field, thus presenting lesslatency than a store-and-forward switch. Because the framecan begin to be forwarded before it is completely received, theswitch may transmit a corrupt or runt frame. All forwardingmethods require a Layer 2 switch to forward broadcast frames.15. Refer to the exhibit. The IP address of whichdevice interface should be used as the default16. What service is provided by InternetMessenger?An application that allows real-timechatting among remote users.Allows remote access to network devices andservers.

Page 5

CCNA 1 - Introduction to Networks - Page 5 preview image

Loading page ...

Resolves domain names, such as cisco.com, into IPaddresses.uUses encryption to provide secure remote access tonetwork devices and servers.17. Refer to the exhibit. Match the network withthe correct IP address and prefix that will satisfythe usable host addressing requirements foreach network.Explanation:Network A needs to use 192.168.0.128 /25,which yields 128 host addresses.Network B needs to use 192.168.0.0 /26, which yields 64 hostaddresses.Network C needs to use 192.168.0.96 Z27, which yields 32 hostaddresses.Network D needs to use 192.168.0.80/30, which yields 4 hostaddresses.

Page 6

CCNA 1 - Introduction to Networks - Page 6 preview image

Loading page ...

18. Refer to the exhibit. Which protocol wasresponsible for building the table that is shown?EMIjsignal attenuation20. A host is trying to send a packet to a deviceon a remote LAN segment, but there arecurrently no mappings in its ARP cache. How willthe device obtain a destination MAC address?(A host is trying to send a packet to a device on a remote LANsegment, but there are currently no mappings in the ARPcache. How will the device obtain a destination MAC address?)nIt will send the frame and use its own MAC addressas the destination.JIt will send an ARP request for the MAC address ofthe destination device.It will send the frame with a broadcast MAC address.It will send a request to the DNS server for thedestination MAC address.It will send an ARP request for the MACaddress of the default gateway.22. A client packet is received by a server. Thepacket has a destination port number of 53.What service is the client requesting?JDNSNetBIOS (NetBT)POP3IMAP23. A network administrator is adding a new LANto a branch office. The new LAN must support 25connected devices. What is the smallest networkmask that the network administrator can use forthe new network?t255.255.255.128I255.255.255.192j255.255.255.224255.255.255.240ARPDNSICMPExplanation:The table that is shown corresponds to theoutput of the arp -a command, a command that is used on aWindows PC to display the ARP table.19. A network administrator notices that somenewly installed Ethernet cabling is carryingcorrupt and distorted data signals. The newcabling was installed in the ceiling close tofluorescent lights and electrical equipment.Which two factors may interfere with the coppercabling and result in signal distortion and datacorruption? (Choose two.)ucrosstalkextended length of cablingRFI

Page 7

CCNA 1 - Introduction to Networks - Page 7 preview image

Loading page ...

24. What characteristic describes a Trojan horse?umalicious software or code running on anend deviceuan attack that slows or crashes a device or networkservicethe use of stolen credentials to access private dataa network device that filters access and trafficcoming into a network25. What service is provided by HTTPS?nUses encryption to provide secure remote access tonetwork devices and servers.uResolves domain names, such as cisco.com, into IPaddresses.Uses encryption to secure the exchangeof text, graphic images, sound, and videoon the web.Allows remote access to network devices andservers.26. A technician with a PC is using multipleapplications while connected to the Internet.How is the PC able to keep track of the data flowbetween multiple application sessions and haveeach application receive the correct packetflows?The data flow is being tracked based on thedestination MAC address of the technician PC.The data flow is being tracked based onthe source port number that is used byeach application.nThe data flow is being tracked based on the sourceIP address that is used by the PC of the technician.The data flow is being tracked based on thedestination IP address that is used by the PC of thetechnician.Explanation:The source port number of an application is randomlygenerated and used to individually keep track of each sessionconnecting out to the Internet. Each application will use aunique source port number to provide simultaneouscommunication from multiple applications through the Internet.27. A network administrator is adding a new LANto a branch office. The new LAN must support 61connected devices. What is the smallest networkmask that the network administrator can use forthe new network?255.255.255.240-255.255.255.2241255.255.255.192-255.255.255.12828. Refer to the exhibit. Match the network withthe correct IP address and prefix that will satisfythe usable host addressing requirements for

Page 8

CCNA 1 - Introduction to Networks - Page 8 preview image

Loading page ...

each network. (Not all options are used.)Nwwrttt w w u ;11(2.168.0192X27tatvnft DSw-xkC192168.0 2M.732(IJExamAnswers192 1680 0 7 1192 n u m«JMw.tl1*2 I$$4n2#taoWMgtBITN (Version 7.00) - ITNv7 Final ExamExplanation:Network A needs to use 192.168.0.0/25 which yields 128 hostaddresses.Network B needs to use 192.168.0.128 /26 which yields 64 hostaddresses.Network C needs to use 192.168.0.192 /27 which yields 32 hostaddresses.

Page 9

CCNA 1 - Introduction to Networks - Page 9 preview image

Loading page ...

Network D needs to use 192.168.0.224 /30 which yields 4 hostaddresses.Allows remote access to network devices andservers.jUses encryption to provide secure remote access tonetwork devices and servers.An application that allows real-time chatting amongremote users.32. Which scenario describes a function providedby the transport layer?“IA student is using a classroom VoIP phone to callhome. The unique identifier burned into the phone isa transport layer address used to contact anothernetwork device on the same network.-A student is playing a short web-based movie withsound. The movie and sound are encoded within thetransport layer header.A student has two web browser windowsopen in order to access two web sites.The transport layer ensures the correctweb page is delivered to the correctbrowser window.A corporate worker is accessing a web serverlocated on a corporate network. The transport layerformats the screen so the web page appearsproperly no matter what device is being used to viewthe web site.Explain:The source and destination port numbers arc used to identifythe correct application and window within that application.33.Refer to the exhibit. Host B on subnetTeachers transmits a packet to host D on subnetStudents. Which Layer 2 and Layer 3 addressesare contained in the PDUs that are transmittedfrom host B to the router?29. What characteristic describes a DoS attack?nthe use of stolen credentials to access private datana network device that filters access and trafficcoming into a networkusoftware that is installed on a user device andcollects information about the useran attack that slows or crashes a deviceor network service30. Match the application protocols to the correcttransport protocols31. What service is provided by SMTP?uAllows clients to send email to a mailserver and the servers to send email toother servers.

Page 10

CCNA 1 - Introduction to Networks - Page 10 preview image

Loading page ...

loss of signal strength as distanceincreasesExplanation:Data is transmitted on copper cables aselectrical pulses. A detector in the network interface of adestination device must receive a signal that can besuccessfully decoded to match the signal sent. However, thefarther the signal travels, the more it deteriorates. This isreferred to as signal attenuation.35. Refer to the exhibit. An administrator istrying to configure the switch but receives theerror message that is displayed in the exhibit.What is the problem?The entire command, configure terminal, must beused.1The administrator is already in global configurationmode.The administrator must first enterprivileged EXEC mode before issuing thecommand.The administrator must connect via the console portto access global configuration mode.36. Which two protocols operate at the top layerof the TCP/IP protocol suite? (Choose two.)zTCPIP-UDPzPOPDNSEthernetLayer 2 source address = 00-00-0c-94-36-bbLayer 3 destination address = 172.16.20.200Layer 3 source address = 172.16.10.200Layer 2 destination address = 00-00-0c-94-36-ddLayer 2 source address = 00-00-0c-94-36-bbLayer 3 destination address = 172.16.20.200Layer 3 source address = 172.16.10.200Layer 2 destination address = 00-00-0c-94-36-cdLayer 2 source address = 00-00-0c-94-36-bbLayer 3 destination address = 172.16.20.99Layer 3 source address = 172.16.10.200Layer 2 destination address = 00-00-0c-94-36-abLayer 2 source address = 00-00-0c-94-36-bbLayer 3 destination address = 172.16.20.200Layer 3 source address = 172.16.100.20034. What does the term "attenuation" mean indata communication?ustrengthening of a signal by a networking deviceuleakage of signals from one cable pair to anothertime for a signal to reach its destination

Page 11

CCNA 1 - Introduction to Networks - Page 11 preview image

Loading page ...

31.A company has a file server that shares afolder named Public. The network security policyspecifies that the Public folder is assigned Read-Only rights to anyone who can log into the serverwhile the Edit rights are assigned only to thenetwork admin group. Which component isaddressed in the AAA network serviceframework?automationnaccountingnauthenticationauthorizationAfter a user is successfully authenticated (logged into theserver), the authorization is the process of determining whatnetwork resources the user can access and what operations(such as read or edit) the user can perform.38. What three requirements are defined by theprotocols used in network communcations toallow message transmission across a network?(Choose three.)message sizemessage encodingconnector specificationsmedia selectionndelivery optionsnend-device installation39. What are two characteristics of IP? (Choosetwo.)udoes not require a dedicated end-to-endconnectionoperates independently of the networkmediaretransmits packets if errors occurre-assembles out of order packets into the correctorder at the receiver endjguarantees delivery of packetsExplain:The Internet Protocol (IP) is a connectionless, best effortprotocol. This means that IP requires no end-to-end connectionnor does it guarantee delivery of packets. IP is also mediaindependent, which means it operates independently of thenetwork media carrying the packets.40. An employee of a large corporation remotelylogs into the company using the appropriateusername and password. The employee isattending an important video conference with acustomer concerning a large sale. It is importantfor the video quality to be excellent during themeeting. The employee is unaware that after asuccessful login, the connection to the companyISP failed. The secondary connection, however,activated within seconds. The disruption was notnoticed by the employee or other employees.What three network characteristics are describedin this scenario? (Choose three.)securityquality of service1scalabilitypowerline networkingintegrityJfault tolerance41. What are two common causes of signaldegradation when using UTP cabling? (Choosetwo.)improper terminationlow-quality shielding in cable

Page 12

CCNA 1 - Introduction to Networks - Page 12 preview image

Loading page ...

installing cables in conduitulow-quality cable or connectorsuloss of light over long distancesExplanation:When terminated improperly, each cable is apotential source of physical layer performance degradation.There is connectivity between this deviceand the device at 192.168.100.1.JThe connectivity between these two hosts allows forvideoconferencing calls.The average transmission time between the twohosts is 2 milliseconds.Explain:The output displays a successful Layer 3 connection between ahost computer and a host at 19.168.100.1. It can be determinedthat 4 hops exist between them and the average transmissiontime is 1 milliseconds. Layer 3 connectivity does not necessarilymean that an application can run between the hosts.44. Which two statements describe how to assesstraffic flow patterns and network traffic typesusing a protocol analyzer? (Choose two.)_Capture traffic on the weekends when mostemployees are off work.Capture traffic during peak utilizationtimes to get a good representation of thedifferent traffic types.Only capture traffic in the areas of the network thatreceive most of the traffic such as the data center.“IPerform the capture on different networksegments.1Only capture WAN traffic because traffic to the webis responsible for the largest amount of traffic on anetwork.Explanation:Traffic flow patterns should be gathered duringpeak utilization times to get a good representation of thedifferent traffic types. The capture should also be performed ondifferent network segments because some traffic will be local toa particular segment.42. Which subnet would include the address192.168.1.96 as a usable host address?u192.168.1.64/26192.168.1.32/27192.168.1.32/28192.168.1.64/29Explanation:For the subnet of 192.168.1.64/26, there are 6bits for host addresses, yielding 64 possible addresses.However, the first and last subnets are the network andbroadcast addresses for this subnet. Therefore, the range ofhost addresses for this subnet is 192.168.1.65 to192.168.1.126. The other subnets do not contain the address192.168.1.96 as a valid host address.43. Refer to the exhibit. On the basis of theoutput, which two statements about networkconnectivity are correct? (Choose two.): :Vsy152. Ififi. 1 0 0 . 1rxL-j-ji-,-l i j ' . iC.O i c - 2 . 1 6 2 . i i : . L jv±x-ux.i.xx....’3 2 xiCS---1.i .jaJJC.i:j10. ; . .i2r;u2 tj.nx122. i o - . 1 . 2 231r j-rjr.rta12h2H’ I n -;n,1 -r-1.75,.53rrf7.“>s17-1 5 3 .11 9 . 1 1 0 , 1uThis host does not have a default gatewayconfigured.There are 4 hops between this deviceand the device at 192.168.100.1.

Page 13

CCNA 1 - Introduction to Networks - Page 13 preview image

Loading page ...

45. What is the consequence of configuring arouter with theipv6 unicast-routingglobalconfiguration command?uAll router interfaces will be automatically activated.The IPv6 enabled router interfaces beginsending ICMPv6 Router Advertisementmessages.Each router interface will generate an IPv6 link-localaddress.nIt statically creates a global unicast address on thisrouter.46. Which three layers of the OSI model map tothe application layer of the TCP/IP model?(Choose three.)uapplicationnetworkdata linksessionpresentationntransportExplanation:The TCP/IP model consists of four layers:application, transport, internet, and network access. The OSImodel consists of seven layers: application, presentation,session, transport, network, data link, and physical. The topthree layers of the OSI model: application, presentation, andsession map to the application layer of the TCP/IP model.47. Refer to the exhibit. If PCI is sending apacket to PC2 and routing has been configuredbetween the two routers, what will R1 do withthe Ethernet frame header attached by PCI?192.16B.1i?.5.'24192.163.11.5/24nothing, because the router has a route to thedestination networkjopen the header and use it to determine whether thedata is to be sent out SO/O/Oopen the header and replace the destination MACaddress with a new oneremove the Ethernet header andconfigure a new Layer 2 header beforesending it out SO/O/OExplanation:When PC1 forms the various headers attachedto the data one of those headers is the Layer 2 header.Because PC1 connects to an Ethernet network, an Ethernetheader is used. The source MAC address will be the MACaddress of PCI and the destination MAC address will be that ofG0/0 on Rl. When R1 gets that information, the router removesthe Layer 2 header and creates a new one for the type ofnetwork the data will be placed onto (the serial link).48. What will happen if the default gatewayaddress is incorrectly configured on a host?

Page 14

CCNA 1 - Introduction to Networks - Page 14 preview image

Loading page ...

The host cannot communicate with other hosts in thelocal network.uThe host cannot communicate with hostsin other networks.nA ping from the host to 127.0.0.1 would not besuccessful.The host will have to use ARP to determine thecorrect address of the default gateway.nThe switch will not forward packets initiated by thehost.49. What are two features of ARP? (Choose two.)uWhen a host is encapsulating a packet into a frame,it refers to the MAC address table to determine themapping of IP addresses to MAC addresses.An ARP request is sent to all devices on the EthernetLAN and contains the IP address of the destinationhost and its multicast MAC address.nIf a host is ready to send a packet to alocal destination device and it has the IPaddress but not the MAC address of thedestination, it generates an ARPbroadcast.uIf no device responds to the ARP request, then theoriginating node will broadcast the data packet to alldevices on the network segment.If a device receiving an ARP request hasthe destination IPv4 address, it respondswith an ARP reply.50. A network administrator is adding a new LANto a branch office. The new LAN must support 90connected devices. What is the smallest networkmask that the network administrator can use forthe new network?u255.255.255.128255.255.255.240J255.255.255.248255.255.255.22451. What are two ICMPv6 messages that are notpresent in ICMP for IPv4? (Choose two.)jNeighbor Solicitation-Destination UnreachableHost ConfirmationTime ExceededtRouter Advertisement“IRoute Redirection52. A client packet is received by a server. Thepacket has a destination port number of 80.What service is the client requesting?DHCPSMTPDNSHTTP53. What is an advantage for small organizationsof adopting IMAP instead of POP?“IPOP only allows the client to store messages in acentralized way, while IMAP allows distributedstorage.Messages are kept in the mail serversuntil they are manually deleted from theemail client.When the user connects to a POP server, copies ofthe messages are kept in the mail server for a shorttime, but IMAP keeps them for a long time.“I IMAP sends and retrieves email, but POP onlyretrieves email.Explanation:IMAP and POP are protocols that are used toretrieve email messages. The advantage of using IMAP instead
Preview Mode

This document has 44 pages. Sign in to access the full document!