Friday, June 19, 2009

CCNA 1 Final Exam 640 - 802

www.ccna4u.net || www.ccna4u.info || www.ccna4u.org || www.9tut.info


This Test is 85% Correct

1. A PC can not connect to any remote websites, ping its default gateway, or ping a printer that is functioning properly on the local network segment. Which action will verify that the TCP/IP stack is functioning correctly on this PC?

--> Use the ping 127.0.0.1 command at the command prompt.


2. Refer to the exhibit. Which set of devices contains only intermediary devices?

--> A, B, D, G

3. Refer to the exhibit. When computer A sends a frame to computer D, what computers receive the frame?

--> only computer D






4. Which password is automatically encrypted when it is created?

--> enable secret

5. Which three statements characterize the transport layer protocols? (Choose three.)

--> TCP and UDP port numbers are used by application layer protocols.

--> TCP uses windowing and sequencing to provide reliable transfer of data.

--> TCP is a connection-oriented protocol. UDP is a connectionless protocol.


6. Which type of media is immune to EMI and RFI? (Choose two.)

--> 100 Base-FX

--> 1000 Base LX


7. Refer to the exhibit. A technician is working on a network problem that requires verification of the router LAN interface. What address should be pinged from this host to confirm that the router interface is operational?

--> 192.168.254.1


8. Refer to the exhibit. The diagram represents the process of sending email between clients.
Select the list below that correctly identifies the component or protocol used at each numbered stage of the diagram.

--> 1.MUA 2.SMTP 3.MTA 4.SMTP 5.MTA 6.MDA 7.POP 8.MUA

9. Refer to the exhibit. What function does router RT_A need to provide to allow Internet access for hosts in this network?

--> address translation

10. Refer to the exhibit. The network containing router B is experiencing problems. A network associate has isolated the issue in this network to router B? What action can be preformed to correct the network issue?

--> issue the no shutdown command on interface FastEthernet 0/1


11. Which three IPv4 addresses represent a broadcast for a subnet? (Choose three.)

--> 172.16.4.63 /26

--> 172.16.4.191 /26

--> 172.16.4.95 /27


12. What are three characteristics of CSMA/CD? (Choose three.)

--> A device listens and waits until the media is not busy before transmitting.

--> All of the devices on a segment see data that passes on the network medium.

--> After detecting a collision, hosts can attempt to resume transmission after a random time delay has expired.

13. In a Cisco IOS device, where is the startup-configuration file stored?

--> NVRAM

14. A routing issue has occurred in you internetwork. Which of the following type of devices should be examined to isolate this error?

--> router


15. Which OSI layer protocol does IP rely on to determine whether packets have been lost and to request retransmission?

--> transport


16. Due to a security violation, the router passwords must be changed. What information can be learned from the following configuration entries? (Choose two.)

--> The entries specify four Telnet lines for remote access.
The entries set the console and Telnet password to "c13c0".
Telnet access will be denied because the Telnet configuration is incomplete.
--> Access will be permitted for Telnet using "c13c0" as the password.

17. Which prompt represents the appropriate mode used for the copy running-config startup-config command ?

--> Switch-6J#


18. Which combination of network id and subnet mask correctly identifies all IP addresses from 172.16.128.0 through 172.16.159.255?

--> 172.16.128.0 255.255.224.0

19. When must a router serial interface be configured with the clock rate command?

--> when the interface is functioning as a DCE device

20. When connectionless protocols are implemented at the lower layers of the OSI model, what are usually used to acknowledge the data receipt and request the retransmission of missing data?

--> upper-layer connection-oriented protocols


21. A technician is asked to secure the privileged EXEC mode of a switch by requiring a password. Which type of password would require this login and be considered the most
secure?

--> enable secret


22. Refer to the exhibit. What is required on host A for a network technician to create the initial configuration on RouterA?

--> a terminal emulation program


23. Refer to the exhibit. A network administrator remotely accesses the CLI of RouterB from PC1. Which two statements are true about the application layer protocol that is used to make this connection? (Choose two.)

-->The connection type is called a VTY session.

--> The application name is the same for the service, protocol, and client.


24. The Layer 4 header contains which type of information to aid in the delivery of data?

--> service port number


25. Refer to the exhibit. What two facts can be determined about the exhibited topology? (Choose two.)

--> A single broadcast domain is present

--> Five collision domains exist.


26. Refer to the exhibit. A network technician is trying to determine the correct IP address configuration for Host A. What is a valid configuration for Host A?

--> IP address: 192.168.100.20; Subnet Mask: 255.255.255.240; Default Gateway: 192.168.100.17


27. Refer to the exhibit. Cable 1 and cable 2 have the ends wired for specific physical layer requirements. The table lists each segment by number and the cable which has been installed by the network technician between the network components on that segment. From the data
given, which segments have the correct cable installed? (Choose three.)


--> segment1

--> segment3

--> segment4


28. What is true regarding network layer addressing? (Choose three.)

--> uses a flat structure

--> uniquely identifies each host

--> contains a network portion


29. Refer to the exhibit. A router, whose table is shown, receives a packet that is destined for 192.168.1.4. How will router treat the packet?


--> The packet will be forwarded to the destination host.



30. Refer to the exhibit. Which two statements describe the information that is represented in the header? (Choose two.)


--> The destination port indicates a Telnet session.

--> The return segment will contain a source port of 23.



31. Refer to the exhibit. What is the correct destination socket number for a web page request from Host A to the web server?


--> 198.133.219.25:80
http://www.cisco.com


32. During the encapsulation process, which identifiers are added at the transport layer?


--> two applications communicating the data



33. Refer to the exhibit. A student has wired each end of a CAT 5e cable as shown. What is the result? (Choose two.)


--> The cable is suitable for use as a Fast Ethernet crossover.

--> The cable is suitable for use between two 100 Mbps Auto-MDIX capable switches.


34. Refer to the exhibit. Assume all devices are using default configurations. How many subnets are required to address the topology that is shown?


--> 3



35. Refer to the exhibit. On the basis of the IP configuration that is shown, what is the reason that Host A and Host B are unable to communicate outside the local network?


--> The gateway address was assigned a broadcast address.



36. Refer to the exhibit. Each media link is labeled. What type of cable should be used to connect the different devices?

--> Connection 1 - straight-through cable , Connection 2 - crossover cable , Connection 3 - straight-through cable



37. Refer to the exhibit. What does the IP address 192.168.33.2 represent?

--> The host's primary domain name server.



38. Refer to the exhibit. What two facts can be determined from the information that is given? (Choose two.)


--> The destination port indicates that an HTTP session has been initiated.

--> The data listed is associated with the transport layer.


39. Which of the following are the address ranges of the private IP addresses? (Choose three.)

--> 10.0.0.0 to 10.255.255.255

--> 172.16.0.0 to 172.31.255.255

--> 192.168.0.0 to 192.168.255.255



40. Which two functions of the OSI model occur at layer two? (Choose two.)


--> physical addressing

--> media access control



41. Which range of port numbers are reserved for services that are commonly used by applications that run on servers?

--> 0 to 1023


42. As network administrator, what is the subnet mask that allows 510 hosts given the IP address 172.30.0.0?


--> 255.255.254.0



43. Refer to the exhibit. The tracert command is initiated from PC1 to the destination PC4. Which device will send a response to the initial packet from PC1?


--> Athens


44. Refer to the exhibit. Host A is transmitting data to host B. What addresses will host A use to for the destination IP and MAC addresses in this communication?


--> Destination MAC: EEEE:EEEE:EEEE Destination IP: 172.22.0.75


45. Refer to the exhibit. Which logical topology best describes the exhibited network?


--> star


46. Examine the graphic with current configurations. Host A in the Clerical offices failed and was replaced. Although a ping to 127.0.0.1 was successful, the replacement computer can not access the company network. What is the likely cause of the problem?


--> subnet mask incorrectly entered



47. Refer to the exhibit. With the router running NAT, what IP addresses can be applied to the computer to allow access to the Internet? (Choose three.)


--> 192.168.18.49

--> 192.168.18.52

-->192.168.18.59



48. Refer to the exhibit. What three statements are true about the IP configuration that is shown? (Choose three.)



--> The address that is assigned to the computer represents private addressing.

--> The computer is unable to communicate outside of the local network.

--> The prefix of the computer address is /27.



49. Refer to the exhibit. Host A attempts to establish a TCP/IP session with host C. During this attempt, a frame was captured with the source MAC address 0050.7320.D632 and the destination MAC address 0030.8517.44C4. The packet inside the captured frame has an IP source address 192.168.7.5, and the destination IP address is 192.168.219.24. At which point in the network was this packet captured?

--> leaving Dallas


50. Which of the following OSI layers offers reliable, connection-oriented data communication services?


--> transport

8 comments:

  1. At question 28 answer
    --> uses a flat structure
    is wrong!!!
    Corect answer is:
    ----> heirarchical
    ----> uniquely identifies each host
    ----> contains a network portion

    ReplyDelete
  2. 94.8%

    1. Refer to the exhibit. All routers are running the same routing protocol. Based on the exhibit and its displayed commands, which statement is true?
    -The link to the ISP is not advertised by the routing protocol process.

    2. Refer to the exhibit. While trying to diagnose a routing problem in the network, the network administrator runs the debug ip rip command. What can be determined from the output of this command?
    The router will be unable to ping 192.168.1.2.

    3. Refer to the exhibit. Two routers are unable to establish an adjacency. What is the possible cause for this?
    The hello and dead intervals are different on the two routers.

    4. Refer to the exhibit. Routers R1 and R2 are directly connected via their serial interfaces and are both running the EIGRP routing protocol. R1 and R2 can ping the directly connected serial interface of their neighbor, but they cannot form an EIGRP neighbor adjacency.
    Configure both routers with the same EIGRP process ID.

    5. Refer to the exhibit. Routers R1 and R3 use different routing protocols with default administrative distance values. All devices are properly configured and the destination network is advertised by both protocols.
    Which path will be used to transmit the data packets from PC1 to PC2?
    -The packets will travel via R2-R1.

    6. Refer to the exhibit. What is the meaning of the highlighted value 2?
    It is the number of hops between R2 and the 192.168.8.0/24 network.

    7. What is the function of the OSPF LSR packet?
    ans:
    It is used by the receiving routers to request more information about any entry in the DBD.

    8. Which three statements are true regarding the encapsulation and de-encapsulation of packets when traveling through a router? (Choose three.)

    The router modifies the TTL field, decrementing it by one.
    The router maintains the same source and destination IP.
    The router changes the source physical address to the physical address of the exit interface.

    9. Refer to the exhibit. The routers are properly configured using a dynamic routing protocol with default settings, and the network is fully converged. Router A is forwarding data to router E. Which statement is true about the routing path?

    If the network uses the RIP protocol, router A will determine that all paths have equal cost.

    10. Refer to the exhibit. A network administrator has run the show interface command. The output of this command is displayed. What is the first step that is required to make this interface operational?

    Issue the no shutdown command on the interface.

    11. Refer to the exhibit. Both routers are using the RIPv2 routing protocol and static routes are undefined. R1 can ping 192.168.2.1 and 10.1.1.2, but is unable to ping 192.168.4.1.
    What is the reason for the ping failure?

    The 192.168.4.0 network is not included in the RIP configuration of R2.

    12. Refer to the exhibit. R2 is configured correctly. The network administrator has configured R1 as shown. Which two facts are true about the forwarding of route information by R1? (Choose two.)
    R1 will forward the route information for subnet 192.168.100.0/30.
    R1 will forward the route information with an administrative distance set to 50.

    13. Refer to the exhibit. The network has three connected routers: R1, R2, and R3. The routes of all three routers are displayed. All routers are operational and pings are not blocked on this network. Which ping will fail?
    from R1 to 192.168.3.1

    ReplyDelete
  3. 14. Refer to the exhibit. A network administrator has configured R1 as shown, and all interfaces are functioning correctly. A ping from R1 to 172.16.1.1 fails. What could be the cause of this problem?
    The default route is configured incorrectly.

    15. Which two router component and operation pair are correctly described? (Choose two.)
    NVRAM - stores the configuration file
    POST - runs diagnostics on hardware modules

    16. A network administrator uses the RIP routing protocol to implement routing within an autonomous system. What are two characteristics of this protocol? (Choose two.):
    It uses the Bellman-Ford algorithm to determine the best path.
    It periodically sends complete routing tables to all connected devices.

    17. Refer to the exhibit. Host A is unable to access the Internet. What is the reason for this?
    -The Fa0/1 interfaces of the two routers are configured for different subnets.

    18. Refer to the exhibit. All interfaces are addressed and functioning correctly. The network administrator runs the tracert command on host A. Which two facts could be responsible for the output of this command? (Choose two.)

    The entry for 192.168.2.0/24 is missing from the routing table of R1.
    The entry for 192.168.2.0/24 is missing from the routing table of R2.

    19. What are two functions of a router? (Choose two.)

    It forwards data packets toward their destination.
    It acts as an intersection between multiple IP networks.

    20. Which statement is true about the RIPv1 protocol?
    It excludes subnet information from the routing updates.

    21. Refer to the exhibit. To implement the RIPv2 protocol, the network administrator runs the commands as displayed. However, the show ip protocol command fails to display any output. How can the administrator solve the problem that is indicated by the lack of output from this command?
    Specify the network for which RIP routing has to be enabled.

    22. Refer to the exhibit. An administrator is adding a new subnet of 50 hosts to R3. Which subnet address should be used for the new subnet that provides enough addresses while wasting a minimum of addresses?
    192.168.1.64/26

    23. Refer to the exhibit. R1 and R2 are unable to establish an adjacency. What two configuration changes will correct the problem? (Choose two.)
    Configure the routers in the same area.
    Match the hello and dead timers on both routers.

    24. What two routing protocols use a hierarchal network topology? (Choose two.)
    IS-IS
    OSPF

    25. Refer to the exhibit. Router R2 is configured properly and all interfaces are functional. Router R1 has been installed recently. Host A is unable to ping host B.
    Which procedure can resolve this problem?
    Configure a static route on R1 using the IP address of S0/0/0 on R2.

    26. All routers in a network are configured in a single OSPF area with the same priority value. No loopback interface has been set on any of the routers. Which secondary value will the routers use to determine the router ID?
    The highest IP address among the active interfaces will be used.

    ReplyDelete
  4. 27. Which two statements are true for link-state routing protocols? (Choose two.)
    Routers that run a link-state protocol can establish a complete topology of the network.
    The shortest path first algorithm is used.

    28. A router boots and enters setup mode. What is the reason for this?
    The configuration file is missing from NVRAM.

    29. Refer to the exhibit. The show cdp neighbors command was run at R1. Which two facts about the newly detected device can be determined from the output? (Choose two.)
    ABCD is a router that is connected to R1.
    The device is connected at the Serial0/0/1 interface of R1.

    30. What are two tasks that must be completed before two routers can use OSPF to form a neighbor adjacency? (Choose two.)
    The routers must agree on the network type.
    The routers must use the same dead interval.

    31. Refer to the exhibit. A ping between host A and host B is successful, but pings from host A to operational hosts on the Internet fail. What is the reason for this problem?
    One of the default routes is configured incorrectly.

    32. What two routing protocols will produce a shortest path first tree? (Choose two.)
    IS-IS
    OSPF

    33. Refer to the exhibit. Which three statements are true of the routing table for Router1? (Choose three.)
    The AD of EIGRP routes has been manually changed to a value other than the default value.
    Router1 is running both the EIGRP and OSPF routing process.
    No default route has been configured.

    34. Refer to the exhibit. What action will R2 take for a packet that is destined for 192.168.2.0?
    It will forward the packet to R1.

    35. Refer to the exhibit. A router learns a route to the 192.168.6.0 network, as shown in the output of the show ip rip database command. However, upon running the show ip route command, the network administrator sees that the router has installed a different route to the 192.168.6.0 network learned via EIGRP. What could be the reason for the missing RIP route?
    Compared to RIP, EIGRP has a lower administrative distance.

    36. Which two components are used to determine the router ID in the configuration of the OSPF routing process? (Choose two.)
    ans:
    the highest IP address of any logical interface
    the highest IP address of any physical interface

    37. Refer to the exhibit. A network administrator is accessing router R1 from the console port. Once the administrator is connected to the router, which password should the administrator enter at the R1> prompt to access the privileged EXEC mode?
    ans:
    Cisco789

    38. Which routing protocol maintains a topology table separate from the routing table?
    ans:
    EIGRP

    39. Refer to the exhibit. Which summarization should R1 use to advertise its networks to R2?
    ans:
    192.168.0.0/22

    40. Refer to the exhibit. All routers are running RIPv1. The two networks 10.1.1.0/29 and 10.1.1.16/29 are unable to access each other. What can be the cause of this problem?
    ans:
    RIPv1 does not support discontiguous networks.

    41. Refer to the exhibit. All routers are properly configured to use the EIGRP routing protocol with default settings, and the network is fully converged. Which statement correctly describes the path that the traffic will use from the 10.1.1.0/24 network to the 10.1.2.0/24 network?
    ans:
    The traffic will be load-balanced between A-B-D and A-C-D.

    ReplyDelete
  5. 42. A network administrator has enabled RIP on routers B and C in the network diagram. Which of the following commands will prevent RIP updates from being sent to Router A?
    ans:
    B(config)# router rip
    B(config-router)# passive-interface S0/0

    43. Which two statements are correct about the split horizon with poison reverse method of routing loop prevention? (Choose two.)
    ans:
    It assigns a value that represents an infinite metric to the poisoned route.
    It sends back the poisoned route update to the same interface from where it was received.

    44. Refer to the exhibit. The 10.4.0.0 network fails. What mechanism prevents R2 from receiving false update information regarding the 10.4.0.0 network?
    ans:
    split horizon

    45. Refer to the exhibit. How many routes are ultimate routes?
    ans:
    5

    46. Refer to the exhibit. Which two statements are true based on the exhibited output? (Choose two.)
    ans:
    All routes are stable.
    The show ip eigrp topology command has been run on R1.

    47. A router has learned two equal cost paths to a remote network via the EIGRP and RIP protocols. Both protocols are using their default configurations. Which path to the remote network will be installed in the routing table?
    ans:
    the path learned via EIGRP

    48. Which two statements are true about the EIGRP successor route? (Choose two.)
    ans:
    It may be backed up by a feasible successor route.
    It is used by EIGRP to forward traffic to the destination.

    49. Refer to the exhibit. The output of the show ip route command for router R1 is displayed. What action will the router take for a packet that is destined for 192.168.1.5?
    ans:
    It will forward the packet to the default gateway.

    50. Refer to the exhibit. The hosts that are connected to R2 are unable to ping the hosts that are connected to R1. How can this problem be resolved?
    ans:
    Configure the R2 router interfaces for area 0.

    51. In a lab test environment, a router has learned about network 172.16.1.0 through four different dynamic routing processes. Which route will be used to reach this network?
    ans:
    D 172.16.1.0/24 [90/2195456] via 192.168.200.1, 00:00:09, Serial0/0/0

    52. Refer to the exhibit. Which two facts can be derived from this output? (Choose two.)
    ans:
    Three network devices are directly connected to Router2.
    The serial interface between Router2 and Router3 is up.

    53. How does route poisoning prevent routing loops?
    ans:
    Failed routes are advertised with a metric of infinity.

    54. Refer to the exhibit. A network administrator wants to reduce the size of the routing table of R1. Which partial routing table entry in R1 represents the route summary for R2, without including any additional subnets?
    ans:
    10.0.0.0/22 is subnetted, 1 subnets
    D 10.5.0.0[90/205901] via 192.168.1.2, S0/0/0

    55. Refer to the exhibit. Packets destined to which two networks will require the router to perform a recursive lookup? (Choose two.)
    ans:
    10.0.0.0/8
    192.168.2.0/24

    56. Refer to the exhibit. Although R2 is configured correctly, host A is unable to access the Internet. What are two static routes that can be configured on R1, either of which would enable Internet connectivity for host A? (Choose two.)
    ans:
    ip route 0.0.0.0 0.0.0.0 Fa0/1
    ip route 0.0.0.0 0.0.0.0 10.1.1.2

    57. Refer to the exhibit. Which router is advertising subnet 172.16.1.32/28?
    ans:
    Router4

    58. Which statement is true about the metrics used by routing protocols?
    ans:
    A metric is a value used by a particular routing protocol to compare paths to remote networks.

    59. Refer to the exhibit. Which two components are required to complete the configuration? (Choose two.)
    ans:
    a DTE device
    a V.35 cable

    ReplyDelete
  6. Hi,

    thank you for your post.

    Are these questions the current questions of the final ccna exam sem. 1?

    Kind regards

    ReplyDelete
  7. the answers are still correct ?

    ReplyDelete
  8. 2010/08/ccna-1-final-exam-640802html

    ReplyDelete

quocvuong_it@yahoo.com