A few things to keep in mind while completing this activity:

Similar documents
MiPDF.COM. 1. Convert the decimal number 231 into its binary equivalent. Select the correct answer from the list below.

CCNA 1 v5.1 + v6.0 Practice Final Exam Answers 100% Full

CCNA 1 v5.0 R&S ITN Final Exam 2014

1. Which OSI layers offers reliable, connection-oriented data communication services?

CCENT Practice Certification Exam # 2 - CCNA Exploration: Accessing the WAN (Version 4.0)

CCNA 1 Chapter 2 v5.0 Exam Answers %

2. Which two functions of the OSI model occur at layer two? (Choose two.) physical addressing encoding routing cabling media access control

CCNA 1 Chapter 2 v5.0 Exam Answers 2013

CCNA 1 Final Exam Answers UPDATE 2012 eg.1

CISCO EXAM QUESTIONS & ANSWERS

Chapter 6: Network Layer

CCNA 1 Chapter 6 v5.0 Exam Answers 2013

CCNA 1 Final Exam Answers UPDATE 2012 eg.2

OSI Model with Protocols. Layer Name PDU Address Protocols Device

MiPDF.COM. 3. Which procedure is used to access a Cisco 2960 switch when performing an initial configuration in a secure environment?

Lab Using the CLI to Gather Network Device Information Topology

Mobile MOUSe ROUTING AND SWITCHING FUNDAMENTALS ONLINE COURSE OUTLINE

Chapter 2. Switch Concepts and Configuration. Part I

Cisco CCNA (ICND1, ICND2) Bootcamp

Exam E1 Copyright 2010 Thaar AL_Taiey

Cisco Exam Questions & Answers

Interconnecting Cisco Networking Devices Part1 ( ICND1) Exam.

exam. Number: Passing Score: 800 Time Limit: 120 min CISCO Interconnecting Cisco Networking Devices Part 1 (ICND)

EXAM - HP0-Y52. Applying HP FlexNetwork Fundamentals. Buy Full Product.

Before you start the lab exercises see the lab administrator or EEE3080F tutor to get assigned to your routers.

Cisco Cisco Certified Network Associate (CCNA)

This document is exclusive property of Cisco Systems, Inc. Permission is granted to print and copy this document for non-commercial distribution and

Lab 2.8.2: Challenge Static Route Configuration

CCNA 4 - Final Exam (B)

Lab : Challenge OSPF Configuration Lab. Topology Diagram. Addressing Table. Default Gateway. Device Interface IP Address Subnet Mask

CISCO SYSTEM ADMINISTRATION (41)

Skills Assessment Student Training Exam

Cisco 1: Networking Fundamentals

Q&As. Interconnecting Cisco Networking Devices Part 1. Pass Cisco Exam with 100% Guarantee

CCNA 1 Chapter 10 v5.0 Exam Answers 2013

Cisco.BrainDump v by.MuTe

Chapter 14: Introduction to Networking

Interconnecting Cisco Networking Devices Part 1 ICND1

Cisco 2: Routing Technologies

Guide to Networking Essentials, 6 th Edition. Chapter 5: Network Protocols

SEMESTER 2 Chapter 1 Planning and Cabling a Network V 4.0

Chapter 3 - Implement an IP Addressing Scheme and IP Services to Meet Network Requirements for a Small Branch Office

31270 Networking Essentials Focus, Pre-Quiz, and Sample Exam Answers

Interconnecting Cisco Networking Devices Part 1 (ICND1) Course Overview

Chapter 11: It s a Network. Introduction to Networking

CCNA Semester 2 labs. Labs for chapters 2 10

CCNA. Course Catalog

Lab 5.6.2: Challenge RIP Configuration

Pass4sures. Latest Exam Guide & Learning Materials

1. IPv6 is the latest version of the TCP/IP protocol. What are some of the important IPv6 requirements?

Actual4Test. Actual4test - actual test exam dumps-pass for IT exams

Module 11. OSI Model, Network Devices, and Network Standards

Skills Assessment Student Practice

IT114 NETWORK+ Learning Unit 1 Objectives: 1, 2 Time In-Class Time Out-Of-Class Hours 2-3. Lectures: Course Introduction and Overview

Chapter 11: Networks

Interconnecting Cisco Network Devices Part 1 v2.0 (ICND 1)

Interconnecting Cisco Networking Devices Part 1 ( )

Introduction to Routing and Packet Forwarding

CCNA MCQS with Answers Set-1

Introduction p. 1 Self-Assessment p. 9 Networking Fundamentals p. 17 Introduction p. 18 Components and Terms p. 18 Topologies p. 18 LAN Technologies

CCNA 1 Chapter 5 v5.0 Exam Answers 2013

Objective: Select the appropriate media, cables, ports, and connectors to connect switches to other network devices and hosts

Cisco EXAM CCNA Cisco Certified Network Associate. Buy Full Product.

CCNA Semester 1 labs. Part 2 of 2 Labs for chapters 8 11

CHAPTER 2 ACTIVITY

MTA_98-366_Vindicator930

IT220 Network Standards & Protocols. Unit 8: Chapter 8 The Internet Protocol (IP)

Lab 9.6.2: Challenge EIGRP Configuration Lab

Upon completion of this chapter, you will be able to answer the following questions:

CCNA2 Chapter 1 Practice

ICND1 v2.0 Interconnecting Cisco Networking Devices Part 1 CCENT & Part of CCNA Rout/Switch

Entry Level Assessment Blueprint Computer Networking Fundamentals

CCRI Networking Technology I CSCO-1850 Spring 2014

SYSTEMS ADMINISTRATION USING CISCO (315)

CCNA Exploration Network Fundamentals

Objectives. Hexadecimal Numbering and Addressing. Ethernet / IEEE LAN Technology. Ethernet

Networking Fundamentals Tom Brett

2. What is a characteristic of a contention-based access method?

SYLLABUS. Departmental Syllabus. Applied Networking I. Departmental Syllabus. Departmental Syllabus. Departmental Syllabus. Departmental Syllabus

Networking interview questions

Lab - Troubleshooting Standard IPv4 ACL Configuration and Placement Topology

Scope and Sequence: CCNA Exploration v4.0

Course: CCNA Bootcamp (Intensive CCNA)

KillTest ᦝ䬺 䬽䭶䭱䮱䮍䭪䎃䎃䎃ᦝ䬺 䬽䭼䯃䮚䮀 㗴 㓸 NZZV ]]] QORRZKYZ PV ٶ瀂䐘މ悹伥濴瀦濮瀃瀆ݕ 濴瀦

TCP/IP Networking. Training Details. About Training. About Training. What You'll Learn. Training Time : 9 Hours. Capacity : 12

Understanding Networking Fundamentals

Lab 1.3.2: Review of Concepts from Exploration 1 - Challenge

Lab 1.4.6B Implementing Port Security

~ 1 ~ Ankara University Department of Computer Engineering COM LAB 1 Part 1

Chapter 4: Routing Concepts. Routing & Switching

PASS4TEST IT 인증시험덤프전문사이트

Chapter 11. Configuring and Testing Your Network

Lab Capturing and Analyzing Network Traffic

TestOut Network Pro - English 5.0.x COURSE OUTLINE. Modified

Lab - Configuring IPv6 Addresses on Network Devices

Identify the features of network and client operating systems (Windows, NetWare, Linux, Mac OS)

Imi :... Data:... Nazwisko:... Stron:...

CCNA Exploration Network Fundamentals. Chapter 06 Addressing the Network IPv4

Network+ Guide to Networks 6 th Edition. Chapter 4 Introduction to TCP/IP Protocols

Computer Networking Fundamentals

Transcription:

CCNA Routing and Switching Introduction to Networks ITN Practice Skills Assessment Packet Tracer A few things to keep in mind while completing this activity: 1. Do not use the browser Back button or close or reload any exam windows during the exam. 2. Do not close Packet Tracer when you are done. It will close automatically. 3. Click the Submit Assessment button in the browser window to submit your work. Introduction In this assessment, you will configure devices in an IPv4/IPv6 network. For the sake of time, you will not be asked to perform all configurations on all network devices as you may be required to do in a real network or other assessment. Instead, you will use the skills and knowledge that you have learned in the labs in this course to configure the CS Department router. In addition, you will address the hosts on two LANs with IPv4 and IPv6 addresses, activate and address the management interface of the LAB 214-A Switch, and back up a device configuration to a TFTP server. You will receive one of several topologies. You are not required to configure the LAB 124-C Switch, and you will not be able to access it in this practice skills assessment activity. All IOS device configurations should be completed from a direct terminal connection to the device console. In addition, many values that are required to complete the configurations have not been given to you. In those cases, create the values that you need to complete the requirements. For values that have been supplied to you, they must be entered exactly as they appear in order for you to get full credit for your configuration. You will practice and be assessed on the following skills: Configuration of initial IOS device settings Design and calculation of IPv4 addressing Configuration of IOS device interfaces including IPv4 and IPv6 addressing when appropriate Addressing of network hosts with IPv4 and IPv6 addresses Enhancing device security, including configuration of the secure transport protocol for remote device configuration Configuration of a switch management interface Requirements by device: CS Department router: Configuration of initial router settings Interface configuration and IPv4 and IPv6 addressing

Device security enhancement or â œdevice hardeningâ Secure transport for remote configuration connections as covered in the labs Backup of the configuration file to a TFTP server LAB 214-A Switch: Enabling basic remote management by Telnet PC and Server hosts: IPv4 full addressing IPv6 addressing Addressing Table Device Interface IPv4 Address Subnet Mask IPv4 Default Gateway IPv6 Address IPv6 Default Gateway CS Department G0/0 N/A 2001:DB8:ACAD:A::1/64 N/A G0/1 N/A 2001:DB8:ACAD:B::1/64 N/A Link Local FE80::1 N/A LAB 214-A Switch Vlan 1 N/A N/A N/A 124-1 NIC 2001:DB8:ACAD:A::FF 124-5 NIC 2001:DB8:ACAD:A::15 214-1 NIC 2001:DB8:ACAD:B::FF TFTP Server NIC 2001:DB8:ACAD:B::15 Instructions Step 1: Determine the IP Addressing Scheme. Design an IPv4 addressing scheme and complete the Addressing Table based on the following requirements. Use the table to help you organize your work. Subnet Number Beginning Address Ending Address Mask Assignment 1 192.168.1.0 2 3 4 LAB 124-C LAN Subnet 5 6 LAB 214-A LAN Subnet a. Subnet the 192.168.1.0/24 network to provide 30 host addresses per subnet while wasting the fewest addresses. b. Assign the fourth subnet to the LAB 124-C LAN.

c. Assign the last network host address (the highest) in this subnet to the G0/0 interface on CS Department. d. Starting with the fifth subnet, subnet the network again so that the new subnets will provide 14 host addresses per subnet while wasting the fewest addresses. e. Assign the second of these new 14-host subnets to the LAB 214-A LAN. f. Assign the last network host address (the highest) in the LAB 214-A LAN subnet to the G0/1 interface of the CS Department router. g. Assign the second to the last address (the second highest) in this subnet to the VLAN 1 interface of the LAB 214-A Switch. h. Configure addresses on the hosts using any of the remaining addresses in their respective subnets. Step 2: Configure the CS Department Router. a. Configure the CS Department router with all initial configurations that you have learned in the course so far: Configure the router hostname: Middle Protect device configurations from unauthorized access with the encrypted privileged exec password. Secure all access lines into the router using methods covered in the course and labs. Require newly-entered passwords must have a minimum length of 10 characters. Prevent all passwords from being viewed in clear text in device configuration files. Configure the router to only accept in-band management connections over the protocol that is more secure than Telnet, as was done in the labs. Use the value 1024 for encryption key strength. Configure local user authentication for in-band management connections. Create a user with the name netadmin and a secret password of Cisco_CCNA5 Give the user the highest administrative privileges. Your answer must match these values exactly. b. Configure the two Gigabit Ethernet interfaces using the IPv4 addressing values you calculated and the IPv6 values provided in the addressing table. Reconfigure the link local addresses to the value shown in the table. Document the interfaces in the configuration file. Step 3: Configure the LAB 214-A Switch. Configure LAB 214-A Switch for remote management over Telnet.

Step 4: Configure and Verify Host Addressing. a. Use the IPv4 addressing from Step 1 and the IPv6 addressing values provided in the addressing table to configure all host PCs with the correct addressing. b. Use the router interface link-local address as the IPv6 default gateways on the hosts. Step 5: Backup the Configuration of the CS Department Router to TFTP. a. Complete the configuration of the TFTP server using the IPv4 addressing values from Step 1 and the values in the addressing table. b. Backup the running configuration of CS Department to the TFTP Server. Use the default file name. CCNA 1 v5.0 ITN Practice Final Exam Answers Introduction to Networks ITN Practice Final Introduction to Networks (Version 5.0) 1 A network administrator is designing a new network infrastructure that includes both wired and wireless connectivity. Under which situation would a wireless connection be recommended? The end-user device requires a dedicated connection because of performance requirements. The end-user device area has a high concentration of RFI. The end-user device needs mobility when connecting to the network.* The end-user device only has an Ethernet NIC. 2 A user is attempting to do an http://www.cisco.com/ without success. Which two configuration values must be set on the host to allow this access? (Choose two.) WINS server HTTP server Netbios DNS server* default gateway* 3 Which two statements are correct in a comparison of IPv4 and IPv6 packet headers? (Choose two.)

The Source Address field name from IPv4 is kept in IPv6.* The Version field from IPv4 is not kept in IPv6. The Destination Address field is new in IPv6. The Header Checksum field name from IPv4 is kept in IPv6. The Time-to-Live field from IPv4 has been replaced by the Hop Limit field in IPv6.* 4 A user calls the help desk to report that a Windows XP workstation is unable to connect to the network after startup and that a popup window says This connection has limited or no connectivity. The technician asks the user to issue the ipconfig /all command. The user reports the IP address is 169.254.69.196 with subnet mask of 255.255.0.0 and nothing is displayed for the DNS server IP address. What is the cause of the problem? The DNS server IP address needs to be configured. The subnet mask was configured incorrectly. The workstation is unable to obtain an IP address from a DHCP server.* The workstation NIC has malfunctioned. 5 A network administrator has been issued a network address of 192.31.7.64/26. How many subnets of equal size could be created from the assigned /26 network by using a /28 prefix? 16 8 3 6 4* 14 6 Why are port numbers included in the TCP header of a segment? to allow the receiving host to assemble the packet in the proper order to enable a receiving host to forward the data to the appropriate application* to determine which Layer 3 protocol should be used to encapsulate the data to identify which switch ports should receive or forward the segment to indicate the correct router interface that should be used to forward a segment 7

Refer to the exhibit. Which layer of the OSI model would format data in this way? data link* application transport network physical 8 Open the PT Activity. Perform the tasks in the activity instructions and then answer the question. What is the secret keyword that is displayed on the web page? cisco switch frame

packet* router 9 Which two types of applications rely on their traffic having priority over other traffic types through the network? (Choose two.) email voice* file transfer instant messaging video* 10 Fill in the blank. In dotted decimal notation, the IP address 172.25.0.126 is the last host address for the network 172.25.0.64/26. 11 Which devices should be secured to mitigate against MAC address spoofing attacks? Layer 2 devices* Layer 7 devices Layer 3 devices Layer 4 devices 12 Which IPv6 address notation is valid? ABCD:160D::4GAB:FFAB 2001:0DB8::ABCD::1234 2001:DB8:0:1111::200* 2001::ABCD:: 13 To revert to a previous configuration, an administrator issues the command copy tftp startup-config on a router and enters the host address and file name when prompted. After the command is completed, why does the current configuration remain unchanged? A TFTP server can only be used to restore the Cisco IOS, not the router configuration. The command should have been copy startup-config tftp. The configuration should have been copied to the running configuration instead.* The configuration changes were copied into RAM and require a reboot to take effect. 14 What are two characteristics of a scalable network? (Choose two.)

is not as reliable as a small network grows in size without impacting existing users* easily overloaded with increased traffic suitable for modular devices that allow for expansion* offers limited number of applications 15 Which two functions are primary functions of a router? (Choose two.) packet switching* microsegmentation domain name resolution flow control path selection* 16 Using default settings, what is the next step in the router boot sequence after the IOS loads from flash? Perform the POST routine. Search for a backup IOS in ROM. Load the bootstrap program from ROM. Load the running-config file from RAM. Locate and load the startup-config file from NVRAM.* 17 A router boots and enters setup mode. What is the reason for this? Cisco IOS is missing from flash memory. The POST process has detected hardware failure. The IOS image is corrupt. The configuration file is missing from NVRAM.* 18 What is an ISP? It is a networking device that combines the functionality of several different networking devices in one. It is an organization that enables individuals and businesses to connect to the Internet.* It is a protocol that establishes how computers within a local network communicate. It is a standards body that develops cabling and wiring standards for networking. 19

Subnet 192.168.1.32/27 will have a valid host range from 192.168.1.33 192.168.1.62 with the broadcast address as 192.168.1.63 Subnet 192.168.1.64/27 will have a valid host range from 192.168.1.65 192.168.1.94 with the broadcast address as 192.168.1.95 Subnet 192.168.1.96/27 will have a valid host range from 192.168.1.97 192.168.1.126 with the broadcast address as 192.168.1.127 20 What information is added during encapsulation at OSI Layer 3? source and destination port number source and destination MAC source and destination IP address* source and destination application protocol 21 What are two ways that TCP uses the sequence numbers in a segment? (Choose two.) to limit the number of segments that can be sent out of an interface at one time to determine if the packet changed during transit to specify the order in which the segments travel from source to destination to reassemble the segments at the remote location* to identify missing segments at the destination* 22 Which statement describes a characteristic of the traceroute utility? It is primarily used to test connectivity between two hosts. It sends four Echo Request messages. It identifies the routers in the path from a source host to a destination host.* It utilizes the ICMP Source Quench messages. 23

Refer to the exhibit. HostA is attempting to contact ServerB. Which two statements correctly describe the addressing that HostA will generate in the process? (Choose two.) A packet with the destination IP address of RouterA. A frame with the destination MAC address of SwitchA. A frame with the destination MAC address of RouterA.* A packet with the destination IP address of RouterB. A packet with the destination IP address of ServerB.* A frame with the destination MAC address of ServerB. 24 For which three reasons was a packet-switched connectionless data communications technology used when developing the Internet? (Choose three.) It requires that a data circuit between the source and destination be established before data can be transferred. It can rapidly adapt to the loss of data transmission facilities.* It efficiently utilizes the network infrastructure to transfer data.* It allows for billing of network use by the amount of time a connection is established. Data packets can travel multiple paths through the network simultaneously.* 25 A network administrator is troubleshooting connectivity issues on a server. Using a tester, the administrator notices that the signals generated by the server NIC are distorted and not usable. In which layer of the OSI model is the error categorized?

data link layer physical layer* network layer presentation layer 26 What will a host on an Ethernet network do if it receives a frame with a destination MAC address that does not match its own MAC address? It will remove the frame from the media. It will discard the frame.* It will forward the frame to the next host. It will strip off the data-link frame to check the destination IP address. 27 What are the three parts of an IPv6 global unicast address? (Choose three.) broadcast address global routing prefix* subnet mask subnet ID* interface ID* 28 A PC that is communicating with a web server is utilizing a window size of 6,000 bytes when sending data and a packet size of 1,500 bytes. What byte of information will the web server acknowledge after it has received four packets of data from the PC? 1,500 5 6,001* 1,501 6,000 29 What three primary functions does data link layer encapsulation provide? (Choose three.) error detection* port identification addressing* path determination IP address resolution frame delimiting* 30

Refer to the exhibit. A network engineer is attempting to connect to a new router to perform the initial configuration. The engineer connects a rollover cable from the serial port of a PC to the Aux port on the router, then configures HyperTerminal as shown. The engineer cannot get a login prompt in HyperTerminal. What would fix the problem? Move the cable to the router console port.* Use a crossover cable instead of a rollover cable. Connect to the Ethernet port on the PC. Change connection settings to even parity. 31 The administrator of a branch office receives an IPv6 prefix of 2001:db8:3000::/52 from the corporate network manager. How many subnets can the administrator create? 1024 2048 4096* 8192 65536

32 Refer to the exhibit. Which two settings could be changed to improve security on the wireless network? (Choose two.) wide channel radio band SSID* network mode SSID broadcast* standard channel 33 Fill in the blank using a number. The minimum Ethernet frame size is 64 bytes. Anything smaller than that should be considered a runt frame. 34 Refer to the exhibit. From global configuration mode, an administrator is attempting to create a message-of-the-day banner by using the command banner

motd V Authorized access only! Violators will be prosecuted! V When users log in using Telnet, the banner does not appear correctly. What is the problem? The symbol! signals the end of a banner message. Message-of-the-day banners will only appear when a user logs in through the console port. The banner message is too long. The delimiting character appears in the banner message.* 35 Which router configuration mode would an administrator use to configure the router for SSH or Telnet login access? interface router line* privileged EXEC global 36 Which service will translate private internal IP addresses into Internet routable public IP addresses? NAT* DNS ARP DHCP 37 What three statements describe features or functions of media access control? (Choose three.) Ethernet utilizes CSMA/CD.* 802.11 utilizes CSMA/CD. It uses contention-based access also known as deterministic access. Data link layer protocols define the rules for access to different media.* Controlled media access involves collision handling. It is responsible for detecting transmission errors in transmitted data.* 38 Fill in the blank. Do not abbreviate. Use lower case. Which interface configuration mode command puts a Layer 3 switch interface into Layer 3 mode? no switchport 39

Open the PT activity. Perform the tasks in the activity instructions and then answer the question. Which information is obtained from this command output? 10.20.20.3, non-authoritative answer* 10.20.20.4, non-authoritative answer 10.20.20.3, authoritative answer 10.20.20.4, authoritative answer 40 A small satellite office has been given the overall network number of 192.168.99.0/24 and the network technician can subdivide the network addresses as needed. The office needs network access for both wired and wireless devices. However, because of the security consideration, these two networks should be separate. The wired network will have 20 devices. The wireless network has a potential connection of 45 devices. Which addressing scheme would be most efficient for these two networks? 192.168.99.0/27 192.168.99.32/28 192.168.99.0/27 192.168.99.32/26

192.168.99.0/26 192.168.99.64/27 ************** 192.168.99.0/28 192.168.99.64/26 192.168.99.0/28 192.168.99.16/28 41 What makes fiber preferable to copper cabling for interconnecting buildings? (Choose three.) greater bandwidth potential* limited susceptibility to EMI/RFI* durable connections easily terminated greater distances per cable run* lower installation cost 42 A network team is comparing physical WAN topologies for connecting remote sites to a headquarters building. Which topology provides high availability and connects some, but not all, remote sites? point-to-point mesh partial mesh* hub and spoke 43 What is the function of CSMA/CA in a WLAN? It assures that clients are connected to the correct WLAN. It describes the smallest building block of the WLAN. It provides the mechanism for media access.* It allows a host to move between cells without loss of signal. 44 A network administrator enters the service password-encryption command into the configuration mode of a router. What does this command accomplish? This command provides an exclusive encrypted password for external service personnel who are required to do router maintenance. This command enables a strong encryption algorithm for the enable secret password command. This command encrypts passwords as they are transmitted across serial WAN links. This command prevents someone from viewing the running configuration passwords.*

This command automatically encrypts passwords in configuration files that are currently stored in NVRAM. 45 Fill in the blank. A nibble consists of 4 bits. 46 Place the options in the following order: [+] cables connecting rooms to wiring closets [+] desktop PC in a classroom [#] IP address of a server [#] a switch located in a classroom [+] Order does not matter within this group. [#] Order does not matter within this group. 47 Why are the paired wires twisted in a CAT5 cable? to improve the mechanical strength to provide eletromagnetic noise cancellation* to facilitate cable termination in the connector to extend the signaling length 48 A medium-sized business is researching available options for connecting to the Internet. The company is looking for a high speed option with dedicated, symmetric access. Which connection type should the company choose? cable modem DSL satellite leased line* dialup 49

Refer to the exhibit. What will be the result of entering this configuration the next time a network administrator connects a console cable to the router and no additional commands have been entered? The administrator will be presented with the R1> prompt.* The administrator will be required to enter Cisco789. The administrator will be required to enter Cisco234. The administrator will be required to enter Cisco123. 50 The ARP table in a switch maps which two types of address together? Layer 2 address to a Layer 4 address Layer 3 address to a Layer 2 address* Layer 4 address to a Layer 2 address Layer 3 address to a Layer 4 address 51 Which is a function of the show ip route command when used as a tool for troubleshooting network connectivity? shows the IP address of the next hop router for each route* lists the IP addresses of all hops the traffic will pass through to reach the destination network shows the incoming and outgoing interfaces the traffic will go through in order to reach the destination network indicates the point of failure in the connection 52

Refer to the graphic. What is the effect of setting the security mode to WEP on the Linksys integrated router? It encrypts data between the wireless client and the access point.* It identifies the wireless LAN. It allows the access point to inform clients of its presence. It translates an internal address or group of addresses into an outside, public address. It translates IP addresses into easy-to-remember domain names. 53 54 What are two actions performed by a Cisco switch? (Choose two.) building a routing table that is based on the first IP address in the frame header utilizing the MAC address table to forward frames via the destination MAC address* forwarding frames with unknown destination IP addresses to the default gateway using the source MAC addresses of frames to build and maintain a MAC address table* examining the destination MAC address to add new entries to the MAC address table 55

Refer to the exhibit. Using VLSM, what is the largest and smallest subnet mask required on this network in order to minimize address waste? 255.255.254.0 and 255.255.255.252* 255.255.255.128 and 255.255.255.224 255.255.254.0 and 255.255.255.224 255.255.255.0 and 255.255.255.252 56 Refer to the exhibit. An administrator is testing connectivity to a remote device with the IP address 10.1.1.1. What does the output of this command indicate? The connection timed out while waiting for a reply from the remote device. A ping packet is being blocked by a security device along the path. A router along the path did not have a route to the destination.* Connectivity to the remote device was successful. 57 What is one purpose of the TCP three-way handshake? synchronizing sequence numbers between source and destination in preparation for data transfer*

determining the IP address of the destination host in preparation for data transfer sending echo requests from the source to the destination host to establish the presence of the destination requesting the destination to transfer a binary file to the source NEW 1. A particular email site does not appear to be responding on a Windows 7 computer. What command could the technician use to show any cached DNS entries for this web page? ipconfig /all arp -a ipconfig /displaydns* nslookup 2. A frame is transmitted from one networking device to another. Why does the receiving device check the FCS field in the frame? to determine the physical address of the sending device to verify the network layer protocol information to check the frame for possible transmission errors* to compare the interface media type between the sending and receiving ends to verify that the frame destination matches the MAC address of the receiving device 3. Which type of wireless security is easily compromised? EAP PSK WEP WPA IMAGE: Router# sh r %ambiguous command: sh r 4. Refer to the exhibit. An administrator is trying to view the current configuration on this switch but receives the error message that is displayed. What does this error indicate? The command does not exist. The administrator does not have the required level of access to use this command. Not enough characters were entered for the interpreter to recognize the command. 5. Which range of link-local addresses can be assigned to an IPv6-enabled interface? FEC0::/10 FEBF::/10* FDEE::/7 FF00::/8 6. On a point-to-point network, which communication type is used when two devices can both transmit and receive but not at the same time? half-duplex deterministic

controlled access full-duplex 7. What is the purpose of ICMP messages? to inform routers about network topology changes to ensure the delivery of an IP packet to provide feedback of IP packet transmissions to monitor the process of a domain name to IP address resolution 8. An administrator needs to upgrade the IOS in a router to a version that supports new features. Which factor should the administrator consider before performing the upgrade? NVRAM must be erased before the new IOS can be installed. The old IOS should be backed up to NVRAM so that it is not lost during a power failure. The new IOS might require more RAM to function properly. The old IOS must be removed first. 9. What will happen if the default gateway address is incorrectly configured on a host? The host cannot communicate with other hosts in the local network. The switch will not forward packets initiated by the host. The host will have to use ARP to determine the correct address of the default gateway. The host cannot communicate with hosts in other networks. A ping from the host to 127.0.0.1 would not be successful. 10. Which connection provides a secure CLI session with encryption to a Cisco router? a console connection an AUX connection a Telnet connection an SSH connection 11. A high school in New York (school A) is using videoconferencing technology to establish student interactions with another high school (school B) in Russia. The videoconferencing is conducted between two end devices through the Internet. The network administrator of school A configures the end device with the IP address 192.168.25.10. The administrator sends a request for the IP address for the end device in school B and the response is 192.168.25.10. The administrator knows immediately that this IP will not work. Why? This is a loopback address. This is a link-local address. There is an IP address conflict. This is a private IP address. A host is accessing a Web server on a remote network. Which three functions are performed by intermediary network devices during this conversation? (Choose three.) Correct

Response Your Response regenerating data signals applying security settings to control the flow of data notifying other devices when errors occur Which two statements describe the characteristics of fiber-optic cabling? (Choose two.) Correct Response Your Response Fiber-optic cabling does not conduct electricity. Fiber-optic cabling is primarily used as backbone cabling. What will a Layer 2 switch do when the destination MAC address of a received frame is not in the MAC table? It broadcasts the frame out of all ports on the switch. It initiates an ARP request. It forwards the frame out of all ports except for the port at which the frame was received. It notifies the sending host that the frame cannot be delivered. with answer It forwards the frame out of all ports except for the port at which the frame was received. A host PC is attempting to lease an address through DHCP. What message is sent by the server to let the client know it is able to use the provided IP information? DHCPDISCOVER DHCPOFFER DHCPREQUEST DHCPACK* DHCPNACK CCNA 1 v5.0 Pretest Exam Answers 2014

1 2 The failure rate in a certain brand of network interface card has been determined to be 15%. How many cards could be expected to fail in a company that has 80 of the cards installed? 10 12* 15 8 3 If a technician uses an average of 2 cans of compressed air per week for cleaning, how many cans should be ordered for 8 technicians over the next 10 weeks? 16 20

200 80 160* 4 A local real estate company can have its 25 computer systems upgraded for $1000. If the company chooses only to upgrade 10 systems, how much will the upgrade cost if the same rate is used? $100 $200 $400* $600 $500 5 Convert the decimal number 231 into its binary equivalent. Select the correct answer from the list below. 11100111* 11100101 11101110 11110110 11011011 11110010 6 Which is a characteristic of the Internet? It is not centrally governed.* It is localized to specific geographic locations. It uses only physical addresses. It uses private IP addressing. 7 Which command can be used to test connectivity between two computers that are attached to a network? nbtstst -s ifconfig winipcfg ping* ipconfig 8 Which two devices provide permanent data storage? (Choose two.) hard drive* keyboard Blu-Ray disc*

RAM monitor 9 10 Convert the binary number 10111010 into its hexadecimal equivalent. Select the correct answer from the list below. A1 BA* 85 B3 1C 90 11 What is a function of the BIOS?

provides graphic capabilities for games and applications provides temporary data storage for the CPU enables a computer to connect to a network performs a power-on self test of internal components* 12 A person-hour is the amount of work that the average worker can do in one hour. It is anticipated that a company-wide system upgrade will take approximately 60 person-hours to complete. How long will it take five technicians to perform the refresh? 8 hours 10 hours 5 hours 12 hours* 13

14 15

16 A company is expanding its business to other countries. All branch offices must remain connected to corporate headquarters at all times. Which network technology is required to support this requirement? MAN WAN* WLAN LAN 17 Which subnet would include the address 192.168.1.96 as a usable host address? 192.168.1.64/29 192.168.1.64/26* 192.168.1.32/28 192.168.1.32/27 18 What is the purpose of having a converged network? to achieve fault tolerance and high availability of data network infrastructure devices to reduce the cost of deploying and maintaining the communication infrastructure*

to provide high speed connectivity to all end devices to make sure that all types of data packets will be treated equally 19 A user is having problems accessing the Internet. The command ping www.cisco.com fails. However, pinging the IP address of cisco.com with the command ping 198.133.219.25 is successful. What is the problem? The default gateway is incorrect. There is a problem with DNS.* The address of the ARP cache is incorrect. The web server is down. 20 Refer to the exhibit. Host_A is preparing to send data to Server_B. How will Host_A address the packets and frames that will carry this data? (Choose two.) The packet destination will be addressed with the IP address of the Router_B interface that is attached to Router_A. The frame destination will be addressed with the MAC address of Server_B. The packet destination will be addressed with the IP address of Server_B.* The frame destination will be addressed with the MAC address of Switch_A. The packet destination will be addressed with the IP address of the Router_A LAN interface. The frame destination will be addressed with the MAC address of the Router_A LAN interface.* 21 Which three IP addresses are private? (Choose three.)

10.1.1.1* 224.6.6.6 172.32.5.2 172.16.4.4* 192.167.10.10 192.168.5.5* 22 What is the general term that is used to describe a piece of data at any layer of a networking model? segment frame protocol data unit* packet 23 Which function is provided by TCP? detection of missing packets* path determination for data packets communication session control data encapsulation 24 Which option shows the proper notation for an IPv6 address? 2001.0db8.3c55.0015.abcd.ff13 2001-0db8-3c55-0015-abcd-ff13 2001,0db8,3c55,0015,abcd,ff13 2001:0db8:3c55:0015::abcd:ff13* 25

Refer to the exhibit. Using the network in the exhibit, what would be the default gateway address for host A in the 192.133.219.0 network? 192.133.219.1* 192.133.219.0 192.135.250.1 192.31.7.1 26 Which technology provides a solution to IPv4 address depletion by allowing multiple devices to share one public IP address? NAT* DHCP SMB HTTP ARP DNS 27 A technician uses the ping 127.0.0.1 command. What is the technician testing? the TCP/IP stack on a network host* connectivity between two adjacent Cisco devices connectivity between two PCs on the same network physical connectivity of a particular PC and the network connectivity between a PC and the default gateway

28 What is the purpose of ICMP messages? to ensure the delivery of an IP packet to inform routers about network topology changes to provide feedback of IP packet transmissions* to monitor the process of a domain name to IP address resolution 29 Which basic process is used to select the best path for forwarding data? encapsulation addressing routing* switching 30 Which wireless security procedure should be used to hide the WLAN ID from wireless clients? Configure WEP only on the access point. Configure MAC address filtering on the access point. Decrease the antenna spectrum on each wireless client. Install WAP on the wireless clients. Disable the broadcast of the SSID on the access point.* 31 What statement describes the function of the Address Resolution Protocol? ARP is used to discover the MAC address of any host on the local network.* ARP is used to discover the IP address of any host on the local network. ARP is used to discover the IP address of any host on a different network. ARP is used to discover the MAC address of any host on a different network. 32 A home user is looking for an ISP connection that provides high speed digital transmission over regular phone lines. What ISP connection type should be used? dial-up cell modem satellite DSL* cable modem 33 What is an advantage of using IPv6? higher bandwidth more addresses for networks and hosts*

more frequencies faster connectivity 34 Which device should be used for enabling a host to communicate with another host on a different network? router* hub switch host 35 What is the purpose of the routing process? to encapsulate data that is used to communicate across a network to select the paths that are used to direct traffic to destination networks* to convert a URL name into an IP address to provide secure Internet file transfer to forward traffic on the basis of MAC addresses 36 Which type of connector does a network interface card use? DIN RJ-11 RJ-45* PS-2 37 Why would a network administrator use the tracert utility? to display the IP address, default gateway, and DNS server address for a PC to check information about a DNS name in the DNS server to determine the active TCP connections on a PC to identify where a packet was lost or delayed on a network* 38 How does a networked server manage requests from multiple clients for different services? The server uses IP addresses to identify different services. Each request is tracked through the physical address of the client. The server sends all requests through a default gateway. Each request is assigned source and destination port numbers.* 39 Which protocol translates a website name such as www.cisco.com into a network address?

FTP DHCP HTTP DNS* 40 Refer to the exhibit. Consider the IP address configuration shown from PC1. What is a description of the default gateway address? It is the IP address of the Router1 interface that connects the PC1 LAN to Router1.* It is the IP address of Switch1 that connects PC1 to other devices on the same LAN. It is the IP address of the Router1 interface that connects the company to the Internet. It is the IP address of the ISP network device located in the cloud.