CCNA Quiz Exam: Hardest MCQ!

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Dlefinc
D
Dlefinc
Community Contributor
Quizzes Created: 3 | Total Attempts: 7,337
Questions: 76 | Attempts: 6,923

SettingsSettingsSettings
CCNA Quiz Exam: Hardest MCQ! - Quiz

.


Questions and Answers
  • 1. 

    When connectionless protocols are implemented at the lower layers of the OSI model, what is usually used to acknowledge that the data was received and to request the retransmission of missing data? 

    • A.

      IP

    • B.

      UDP

    • C.

      Ethernet

    • D.

      A connectionless acknowledgement

    • E.

      An upper-layer, connection-oriented protocol or service

    Correct Answer
    E. An upper-layer, connection-oriented protocol or service
    Explanation
    When connectionless protocols are implemented at the lower layers of the OSI model, an upper-layer, connection-oriented protocol or service is usually used to acknowledge that the data was received and to request the retransmission of missing data. This is because connectionless protocols, such as IP and UDP, do not provide built-in mechanisms for acknowledging the receipt of data or requesting retransmission. Instead, they rely on higher-layer protocols or services to handle these functions. These upper-layer protocols or services establish a connection between the sender and receiver, ensuring reliable delivery of data.

    Rate this question:

  • 2. 

    Refer to the exhibit. Each media link is labeled. What type of cable should be used to connect the different devices? 

    • A.

      Connection 1 - rollover cable Connection 2 - straight-through cable Connection 3 - crossover cable

    • B.

      Connection 1 - crossover cable Connection 2 - rollover cable Connection 3 - crossover cable

    • C.

      Connection 1 - straight-through cable Connection 2 - crossover cable Connection 3 - crossover cable

    • D.

      Connection 1 - straight-through cable Connection 2 - crossover cable Connection 3 - straight-through cable

    • E.

      Connection 1 - crossover cable Connection 2 - straight-through cable Connection 3 - crossover cable

    Correct Answer
    D. Connection 1 - straight-through cable Connection 2 - crossover cable Connection 3 - straight-through cable
    Explanation
    The correct answer is Connection 1 - straight-through cable, Connection 2 - crossover cable, Connection 3 - straight-through cable. This is because a straight-through cable is used to connect a host to a switch or hub, while a crossover cable is used to connect two hosts directly without a switch or hub in between. In this scenario, Connection 1 is between a host and a switch, so a straight-through cable is needed. Connection 2 is between two hosts, so a crossover cable is needed. Connection 3 is between a switch and a router, so a straight-through cable is needed.

    Rate this question:

  • 3. 

    Which OSI layer does IP rely on to determine whether packets have been lost and to request retransmission?

    • A.

      Application

    • B.

      Presentation

    • C.

      Session

    • D.

      Transport

    Correct Answer
    D. Transport
    Explanation
    IP relies on the transport layer to determine whether packets have been lost and to request retransmission. The transport layer protocols, such as TCP, provide mechanisms for error detection and correction, ensuring reliable delivery of data. TCP uses sequence numbers and acknowledgments to keep track of the packets sent and received, allowing it to detect lost packets and request their retransmission. Therefore, the correct answer is transport.

    Rate this question:

  • 4. 

    Refer to the exhibit. What is the correct destination socket number for a web page request from Host A to the web server?

    • A.

      00-08-a3-b6-ce-46

    • B.

      198.133.219.25:80

    • C.

      Http://cisco.com

    • D.

      C 198.133.219.0/24 is directly connected, FastEthernet0/0

    Correct Answer
    B. 198.133.219.25:80
    Explanation
    The correct destination socket number for a web page request from Host A to the web server is 198.133.219.25:80. This is indicated by the IP address 198.133.219.25 and the port number 80, which is the default port for HTTP communication.

    Rate this question:

  • 5. 

    Which type of media is immune to EMI and RFI?

    • A.

      10 Base-T

    • B.

      10 Base-2

    • C.

      10 Base-5

    • D.

      100 Base-FX

    • E.

      100 Base TX

    • F.

      1000 Base LX

    Correct Answer(s)
    D. 100 Base-FX
    F. 1000 Base LX
    Explanation
    The correct answer is 100 Base-FX and 1000 Base LX. These types of media, which are fiber optic cables, are immune to electromagnetic interference (EMI) and radio frequency interference (RFI) due to their design. Fiber optic cables use light signals to transmit data instead of electrical signals, making them resistant to EMI and RFI. This makes them ideal for environments with high levels of electromagnetic interference, such as industrial settings or areas with a lot of electrical equipment.

    Rate this question:

  • 6. 

    Refer to the exhibit. The command that is shown was issued on a PC. What does the IP address 192.168.33.2   represent? 

    • A.

      IP address of the host

    • B.

      Default gateway of the host

    • C.

      IP address of the homepage for the host

    • D.

      Primary domain name server for the host

    • E.

      IP address of the website resolver1.mooki.local

    Correct Answer
    D. Primary domain name server for the host
    Explanation
    The IP address 192.168.33.2 represents the primary domain name server for the host.

    Rate this question:

  • 7. 

    Refer to the exhibit. The diagram represents the process of sending email between clients. Select the list below that   correctly identifies the component or protocol used at each numbered stage of the diagram. 

    • A.

      1.MUA 2.MDA 3.MTA 4.SMTP 5.MTA 6.POP 7.MDA 8.MUA

    • B.

      1.MUA 2.POP 3.MDA 4.SMTP 5.MTA 6.MDA 7.SMTP 8.MUA

    • C.

      1.MUA 2.POP 3.SMTP 4.MDA 5.MTA 6.SMTP 7.POP 8.MUA

    • D.

      1.MDA 2.SMTP 3.MTA 4.SMTP 5.MTA 6.MUA 7.POP 8.MDA

    • E.

      1.MUA 2.SMTP 3.MTA 4.SMTP 5.MTA 6.MDA 7.POP 8.MUA

    Correct Answer
    E. 1.MUA 2.SMTP 3.MTA 4.SMTP 5.MTA 6.MDA 7.POP 8.MUA
    Explanation
    The correct answer correctly identifies the component or protocol used at each numbered stage of the diagram. It states that the process starts with the Mail User Agent (MUA), followed by the Simple Mail Transfer Protocol (SMTP) for sending the email to the Mail Transfer Agent (MTA). The MTA then forwards the email to another MTA using SMTP. The email is then received by the Mail Delivery Agent (MDA) and stored. The user can access the email using the Post Office Protocol (POP). Finally, the email is retrieved by the MUA.

    Rate this question:

  • 8. 

    What is true regarding network layer addressing? 

    • A.

      Uses a flat structure

    • B.

      Prevent broadcasts

    • C.

      Heirarchical

    • D.

      Uniquely identifies each host

    • E.

      48 bits in length

    • F.

      Contains a network portion

    Correct Answer(s)
    C. Heirarchical
    D. Uniquely identifies each host
    F. Contains a network portion
    Explanation
    Network layer addressing is hierarchical, meaning it is organized in a hierarchical structure. This allows for efficient routing and management of network traffic. It also uniquely identifies each host on the network, ensuring that there are no duplicate addresses. Additionally, network layer addressing contains a network portion, which helps in identifying the specific network to which a host belongs.

    Rate this question:

  • 9. 

    Which OSI layers offer reliable, connection-oriented data communication services? 

    • A.

      Application

    • B.

      Presentation

    • C.

      Session

    • D.

      Transport

    • E.

      Network

    Correct Answer
    D. Transport
    Explanation
    The transport layer in the OSI model offers reliable, connection-oriented data communication services. This layer ensures that data is transmitted accurately and efficiently by establishing a connection between the sender and receiver and managing the flow control, error correction, and retransmission of data if necessary. It guarantees that data is delivered in the correct order and without errors, providing a reliable communication channel for applications.

    Rate this question:

  • 10. 

    Examine the graphic with current configurations. Host A in the Clerical offices failed and was replaced. Although a ping  to 127.0.0.1 was successful, the replacement computer can not access the company network. What is the likely cause   of the problem? 

    • A.

      IP address incorrectly entered

    • B.

      Network cables unplugged

    • C.

      Subnet mask incorrectly entered

    • D.

      Network card failure

    Correct Answer
    C. Subnet mask incorrectly entered
    Explanation
    The likely cause of the problem is that the subnet mask was incorrectly entered. The subnet mask is used to determine which portion of an IP address is the network address and which portion is the host address. If the subnet mask is incorrect, the replacement computer may not be able to properly communicate with the company network.

    Rate this question:

  • 11. 

    Refer to the exhibit. Host A attempts to establish a TCP/IP session with host C. During this attempt, a frame was   captured with the source MAC address 0050.7320.D632 and the destination MAC address 0030.8517.44C4. The   packet inside the captured frame has an IP source address 192.168.7.5, and the destination IP address is   192.168.219.24. At which point in the network was this packet captured? 

    • A.

      Leaving host A

    • B.

      Leaving ATL

    • C.

      Leaving Dallas

    • D.

      Leaving NYC

    Correct Answer
    C. Leaving Dallas
    Explanation
    The packet was captured while leaving Dallas because the source MAC address indicates that it originated from host A, and the destination MAC address indicates that it was heading towards host C. Since the packet was captured with these MAC addresses in Dallas, it suggests that it was intercepted at a point in the network while it was leaving Dallas.

    Rate this question:

  • 12. 

    Refer to the exhibit. What two facts can be determined from the information that is given? (Choose two.)

    • A.

      This exchange is part of the three-way handshake.

    • B.

      The source port indicates that a Telnet session has been initiated.

    • C.

      The data is flowing from server to client.

    • D.

      The destination port indicates that an HTTP session has been initiated.

    • E.

      The data listed is associated with the transport layer.

    • F.

      The source port does not support communication with the destination port that is listed.

    Correct Answer(s)
    D. The destination port indicates that an HTTP session has been initiated.
    E. The data listed is associated with the transport layer.
    Explanation
    From the given information, it can be determined that the destination port indicates that an HTTP session has been initiated. Additionally, the data listed is associated with the transport layer.

    Rate this question:

  • 13. 

    Refer to the exhibit. On the basis of the IP configuration that is shown, what is the reason that Host A and Host B are   unable to communicate outside the local network?

    • A.

      Host A was assigned a network address.

    • B.

      Host B was assigned a multicast address.

    • C.

      Host A and Host B belong to different networks.

    • D.

      The gateway address was assigned a broadcast address.

    Correct Answer
    D. The gateway address was assigned a broadcast address.
    Explanation
    The reason that Host A and Host B are unable to communicate outside the local network is because the gateway address was assigned a broadcast address. A broadcast address is used to send a message to all devices on a network, so assigning it as the gateway address means that the gateway is not able to properly route traffic between networks.

    Rate this question:

  • 14. 

    Which of the following are the address ranges of the private IP addresses?

    • A.

      10.0.0.0 to 10.255.255.255

    • B.

      200.100.50.0 to 200.100.25.255

    • C.

      150.150.0.0 to 150.150.255.255

    • D.

      172.16.0.0 to 172.31.255.255

    • E.

      192.168.0.0 to 192.168.255.255

    • F.

      127.16.0.0 to 127.31.255.255

    Correct Answer(s)
    A. 10.0.0.0 to 10.255.255.255
    D. 172.16.0.0 to 172.31.255.255
    E. 192.168.0.0 to 192.168.255.255
    Explanation
    The private IP address ranges are used for internal networks and are not routable on the internet. The address ranges 10.0.0.0 to 10.255.255.255, 172.16.0.0 to 172.31.255.255, and 192.168.0.0 to 192.168.255.255 are reserved for private use. These ranges are commonly used in home and small office networks. The other address ranges mentioned in the question are not private IP address ranges.

    Rate this question:

  • 15. 

    Which combination of network id and subnet mask correctly identifies all IP addresses from 172.16.128.0 through   172.16.159.255? 

    • A.

      172.16.128.0 255.255.255.224

    • B.

      172.16.128.0 255.255.0.0

    • C.

      172.16.128.0 255.255.192.0

    • D.

      172.16.128.0 255.255.224.0

    • E.

      172.16.128.0 255.255.255.192

    Correct Answer
    D. 172.16.128.0 255.255.224.0
    Explanation
    The subnet mask 255.255.224.0 allows for a range of IP addresses from 172.16.128.0 to 172.16.159.255. This is because the subnet mask has 19 bits set to 1, which means that the first 19 bits of the IP address are used to identify the network, while the remaining 13 bits can be used to identify individual hosts within that network. Since the IP addresses given in the question fall within the range defined by the subnet mask, it is the correct combination.

    Rate this question:

  • 16. 

    Which password is automatically encrypted when it is created? 

    • A.

      Vty

    • B.

      Aux

    • C.

      Console

    • D.

      Enable secret

    • E.

      Enable password

    Correct Answer
    D. Enable secret
    Explanation
    The "enable secret" password is automatically encrypted when it is created. This password is used to secure privileged access to a Cisco device. Unlike the "enable password" which is stored in plain text, the "enable secret" password is automatically encrypted using a strong encryption algorithm. This provides an additional layer of security as the encrypted password cannot be easily deciphered or hacked.

    Rate this question:

  • 17. 

    Which three statements characterize the transport layer protocols? (Choose three.)

    • A.

      TCP and UDP port numbers are used by application layer protocols.

    • B.

      TCP uses port numbers to provide reliable transportation of IP packets.

    • C.

      UDP uses windowing and acknowledgments for reliable transfer of data.

    • D.

      TCP uses windowing and sequencing to provide reliable transfer of data.

    • E.

      TCP is a connection-oriented protocol. UDP is a connectionless protocol.

    Correct Answer(s)
    A. TCP and UDP port numbers are used by application layer protocols.
    D. TCP uses windowing and sequencing to provide reliable transfer of data.
    E. TCP is a connection-oriented protocol. UDP is a connectionless protocol.
    Explanation
    The first statement is correct because both TCP and UDP port numbers are used by application layer protocols to identify specific processes or services. The second statement is incorrect because TCP uses sequencing and acknowledgments, not windowing, for reliable transfer of data. The third statement is correct because TCP is a connection-oriented protocol, meaning it establishes a dedicated connection between sender and receiver before data transfer. The fourth statement is incorrect because UDP is a connectionless protocol, meaning it does not establish a dedicated connection before data transfer.

    Rate this question:

  • 18. 

    When must a router serial interface be configured with the clock rate command? 

    • A.

      When the interface is functioning as a DTE device

    • B.

      When the interface timers have been cleared

    • C.

      When the connected DTE device is shut down

    • D.

      When the interface is functioning as a DCE device

    Correct Answer
    D. When the interface is functioning as a DCE device
    Explanation
    A router serial interface must be configured with the clock rate command when it is functioning as a DCE (Data Communications Equipment) device. In a network, a DCE device provides clocking signals to a DTE (Data Terminal Equipment) device, which is typically a router or a switch. The clock rate command is used to set the clocking speed on the DCE device, allowing it to synchronize with the connected DTE device. This synchronization is necessary for proper communication between the devices.

    Rate this question:

  • 19. 

    Which two functions of the OSI model occur at layer two? 

    • A.

      Physical addressing

    • B.

      Encoding

    • C.

      Routing

    • D.

      Cabling

    • E.

      Media access control

    Correct Answer(s)
    A. pHysical addressing
    E. Media access control
    Explanation
    The OSI model is a conceptual framework that defines the functions of a communication system. Layer two of the OSI model is the Data Link layer, which is responsible for transferring data between adjacent network nodes. Two functions that occur at this layer are physical addressing and media access control. Physical addressing involves assigning unique addresses to devices on a network, such as MAC addresses. Media access control manages how devices access and transmit data over a shared network medium, such as Ethernet. Therefore, physical addressing and media access control are the correct answers for this question.

    Rate this question:

  • 20. 

    A routing issue has occurred in your internet work. Which of the following type of devices should be examined to   isolate this error? 

    • A.

      Access point

    • B.

      Host

    • C.

      Hub

    • D.

      Router

    • E.

      Switch

    Correct Answer
    D. Router
    Explanation
    If a routing issue has occurred in your internet work, the device that should be examined to isolate this error is the router. A router is responsible for directing network traffic between different networks. It determines the best path for data packets to reach their destination. If there is a problem with routing, such as incorrect routing tables or misconfigured routing protocols, it can cause connectivity issues. Therefore, examining the router would be the logical step to identify and resolve the routing issue.

    Rate this question:

  • 21. 

    Refer to the exhibit. With the router running NAT, what IP addresses can be applied to the computer to allow access to the Internet? (Choose three.) 

    • A.

      192.168.18.38

    • B.

      192.168.18.48

    • C.

      192.168.18.60

    • D.

      192.168.18.70

    • E.

      192.168.18.59

    • F.

      192.168.18.63

    Correct Answer(s)
    C. 192.168.18.60
    E. 192.168.18.59
    F. 192.168.18.63
    Explanation
    To access the internet with the router running NAT, the computer must use an IP address within the usable range of the given subnet (192.168.18.56/28). The usable IP range is from 192.168.18.57 to 192.168.18.70. Thus, valid IP addresses include 192.168.18.59, 192.168.18.60, and 192.168.18.63. These addresses avoid the network address (192.168.18.56) and broadcast address (192.168.18.71).

    Rate this question:

  • 22. 

    Due to a security violation, the router passwords must be changed. What information can be learned from the  following configuration entries? (Choose two.) Router(config)# line vty 0 3 Router(config-line)# password c13c0 Router(config-line)# login

    • A.

      The entries specify three Telnet lines for remote access.

    • B.

      The entries specify four Telnet lines for remote access.

    • C.

      The entries set the console and Telnet password to "c13c0".

    • D.

      Telnet access will be denied because the Telnet configuration is incomplete.

    • E.

      Access will be permitted for Telnet using "c13c0" as the password.

    Correct Answer(s)
    B. The entries specify four Telnet lines for remote access.
    E. Access will be permitted for Telnet using "c13c0" as the password.
    Explanation
    The configuration entries "Router(config)# line vty 0 3" and "Router(config-line)# password c13c0" indicate that four Telnet lines are being configured for remote access. Additionally, the entry "Router(config-line)# login" suggests that access will be permitted for Telnet using the password "c13c0".

    Rate this question:

  • 23. 

    As a network administrator, what is the subnet mask that allows 510 hosts given the IP address 172.30.0.0? 

    • A.

      255.255.0.0

    • B.

      255.255.248.0

    • C.

      255.255.252.0

    • D.

      255.255.254.0

    • E.

      255.255.255.0

    • F.

      255.255.255.128

    Correct Answer
    D. 255.255.254.0
    Explanation
    The IP address 172.30.0.0 is a Class B address, which has a default subnet mask of 255.255.0.0. However, we need a subnet mask that allows for 510 hosts. To determine the required subnet mask, we need to find the smallest subnet that can accommodate at least 510 hosts.

    The subnet mask 255.255.254.0 provides a subnet with 9 bits for host addresses, which allows for 2^9 - 2 = 510 usable host addresses. Therefore, this subnet mask is the correct choice to accommodate 510 hosts within the given IP address range.

    Rate this question:

  • 24. 

    Refer to the exhibit. A network administrator remotely accesses the CLI of RouterB from PC1 using Telnet. Which statement is true about this connection? 

    • A.

      The data is automatically encrypted.

    • B.

      A Telnet server process is running on PC1.

    • C.

      The connection is made through a VTY session on the router.

    • D.

      A GET request was sent to RouterB to retrieve data during this session.

    Correct Answer
    C. The connection is made through a VTY session on the router.
    Explanation
    The correct answer is "The connection is made through a VTY session on the router." This means that the network administrator is accessing the CLI of RouterB using Telnet, which establishes a virtual terminal session on the router. This allows the administrator to remotely manage and configure the router. The other statements are not true because Telnet does not automatically encrypt data, a Telnet server process is not running on PC1, and a GET request is not sent to RouterB during a Telnet session.

    Rate this question:

  • 25. 

    Refer to the exhibit. Cable 1 and cable 2 have the ends wired for specific physical layer requirements. The table lists each segment by number and the cable which has been installed by the network technician between the network components on that segment. From the data given, which segments have the correct cable installed? (Choose three.) segment1 segment2

    • A.

      Segment. From the data given, which segments have the correct cable installed? (Choose three.) segment1

    • B.

      Segment2

    • C.

      Segment3

    • D.

      Segment4

    • E.

      Segment5

    Correct Answer(s)
    A. Segment. From the data given, which segments have the correct cable installed? (Choose three.) segment1
    C. Segment3
    D. Segment4
    Explanation
    The correct cables installed are segment1, segment3, and segment4. This can be determined by analyzing the given information in the exhibit, which is unfortunately not provided in the question.

    Rate this question:

  • 26. 

    Refer to the exhibit. What three statements are true about the IP configuration that is shown? (Choose three.)

    • A.

      The address that is assigned to the computer represents private addressing.

    • B.

      The computer is unable to communicate outside of the local network.

    • C.

      The network of this computer can have 126 hosts.

    • D.

      The prefix of the computer address is /27.

    • E.

      The IP address that is assigned to the computer is routable on the Internet.

    • F.

      The IP address that is assigned to the computer is a broadcast address.

    Correct Answer(s)
    A. The address that is assigned to the computer represents private addressing.
    B. The computer is unable to communicate outside of the local network.
    D. The prefix of the computer address is /27.
    Explanation
    The first statement is true because the IP address assigned to the computer falls within the private IP address range (10.0.0.0 - 10.255.255.255, 172.16.0.0 - 172.31.255.255, 192.168.0.0 - 192.168.255.255). The second statement is true because private IP addresses are not routable on the internet, so the computer cannot communicate outside of the local network. The third statement is true because a /27 prefix allows for 30 usable host addresses (32 - 2 for network and broadcast addresses).

    Rate this question:

  • 27. 

    Which three IPv4 addresses represent a broadcast for a subnet? 

    • A.

      172.16.4.63 /26

    • B.

      172.16.4.129 /26

    • C.

      172.16.4.191 /26

    • D.

      14 172.16.4.51 /27

    • E.

      172.16.4.95 /27

    • F.

      172.16.4.221 /27

    Correct Answer(s)
    A. 172.16.4.63 /26
    C. 172.16.4.191 /26
    E. 172.16.4.95 /27
    Explanation
    The three IPv4 addresses that represent a broadcast for a subnet are 172.16.4.63 /26, 172.16.4.191 /26, and 172.16.4.95 /27. These addresses have the highest possible host bits in their respective subnet masks, indicating that they are used for broadcasting messages to all devices within the subnet.

    Rate this question:

  • 28. 

    Refer to the exhibit. A network technician is trying to determine the correct IP address configuration for Host A. What is a valid configuration for Host A?

    • A.

      IP address: 192.168.100.19; Subnet Mask: 255.255.255.248; Default Gateway: 192.16.1.2

    • B.

      IP address: 192.168.100.20; Subnet Mask: 255.255.255.240; Default Gateway: 192.168.100.17

    • C.

      IP address: 192.168.100.21; Subnet Mask: 255.255.255.248; Default Gateway: 192.168.100.18

    • D.

      IP address: 192.168.100.22; Subnet Mask: 255.255.255.240; Default Gateway: 10.1.1.5

    • E.

      IP address: 192.168.100.30; Subnet Mask: 255.255.255.240; Default Gateway: 192.168.1.1

    • F.

      IP address: 192.168.100.31; Subnet Mask: 255.255.255.240; Default Gateway: 192.168.100.18

    Correct Answer
    B. IP address: 192.168.100.20; Subnet Mask: 255.255.255.240; Default Gateway: 192.168.100.17
    Explanation
    The valid configuration for Host A is IP address: 192.168.100.20; Subnet Mask: 255.255.255.240; Default Gateway: 192.168.100.17. This configuration falls within the same IP address range as the other options, but it has a different default gateway. The default gateway is the IP address of the router that connects the local network to external networks. In this case, the correct default gateway is 192.168.100.17, which is within the same subnet as the IP address of Host A.

    Rate this question:

  • 29. 

    The Layer 4 header contains which type of information to aid in the delivery of data?

    • A.

      Service port number

    • B.

      Host logical address

    • C.

      Device physical address

    • D.

      Virtual connection identifier

    Correct Answer
    A. Service port number
    Explanation
    The Layer 4 header contains the service port number to aid in the delivery of data. The service port number helps identify the specific service or application that the data is intended for. This information is crucial for the proper routing and delivery of data packets to the correct destination.

    Rate this question:

  • 30. 

    During the encapsulation process, which identifiers are added at the transport layer?

    • A.

      Two networks routing the packets

    • B.

      Two applications communicating the data

    • C.

      Two hosts at either end of the communication

    • D.

      Two nodes on the local network exchanging the frame

    Correct Answer
    B. Two applications communicating the data
    Explanation
    During the encapsulation process at the transport layer, the identifiers that are added are related to the two applications communicating the data. These identifiers help in distinguishing the specific applications involved in the communication and ensure that the data is correctly delivered to the intended recipients. The transport layer is responsible for establishing a reliable connection between the applications and managing the flow of data between them.

    Rate this question:

  • 31. 

    Refer to the exhibit. Assume all devices are using default configurations. How many subnets are required to address the topology that is shown?

    • A.

      1

    • B.

      3

    • C.

      4

    • D.

      5

    • E.

      7

    Correct Answer
    B. 3
    Explanation
    Based on the given exhibit, there are three distinct networks that need to be addressed. Each network requires a separate subnet. Therefore, three subnets are required to address the topology shown.

    Rate this question:

  • 32. 

    Refer to the exhibit. Which logical topology best describes the exhibited network?

    • A.

      Star

    • B.

      Ring

    • C.

      Point-to-point

    • D.

      Multiaccess

    • E.

      Mesh

    Correct Answer
    D. Multiaccess
    Explanation
    The exhibited network can be described as a multiaccess topology because it shows multiple devices connected to a central point or hub, allowing them to communicate with each other simultaneously. In a multiaccess topology, all devices have equal access to the network and can transmit data to any other device on the network without the need for a central controller or coordinator. This is different from other topologies like star, ring, or point-to-point, which have specific limitations or restrictions on how devices can communicate with each other.

    Rate this question:

  • 33. 

    Refer to the exhibit. Host A is transmitting data to host B. What addresses will host A use to for the destination IP and MAC addresses in this communication?

    • A.

      Destination MAC: BBBB:BBBB:BBBB Destination IP: 172.22.0.62

    • B.

      Destination MAC: DDDD:DDDD:DDDD Destination IP: 172.22.0.75

    • C.

      Destination MAC: EEEE:EEEE:EEEE Destination IP: 172.22.0.62

    • D.

      Destination MAC: BBBB:BBBB:BBBB Destination IP: 172.22.0.75

    • E.

      Destination MAC: EEEE:EEEE:EEEE Destination IP: 172.22.0.75

    • F.

      Destination MAC: DDDD:DDDD:DDDD Destination IP: 172.22.0.94

    Correct Answer
    E. Destination MAC: EEEE:EEEE:EEEE Destination IP: 172.22.0.75
    Explanation
    Host A will use the destination MAC address "EEEE:EEEE:EEEE" and the destination IP address "172.22.0.75" in this communication.

    Rate this question:

  • 34. 

    Refer to the exhibit. A router, whose table is shown, receives a packet that is destined for 192.168.1.4. How will router treat the packet?

    • A.

      The packet will be dropped.

    • B.

      The packet will be forwarded via FastEthernet 0/0.

    • C.

      The packet will be forwarded to the destination host.

    • D.

      The packet will be forwarded to the 192.168.1.3 next-hop address.

    Correct Answer
    C. The packet will be forwarded to the destination host.
    Explanation
    The router will treat the packet by forwarding it to the destination host. This is because the router's table shows a directly connected network with the destination IP address 192.168.1.4. Therefore, the router knows that the packet belongs to its own network and will forward it to the destination host.

    Rate this question:

  • 35. 

    Refer to the exhibit. Which set of devices contains only intermediary devices?

    • A.

      A, B, D, G

    • B.

      A, B, E, F

    • C.

      C, D, G, I

    • D.

      G, H, I, J

    Correct Answer
    A. A, B, D, G
    Explanation
    The set of devices A, B, D, and G contains only intermediary devices. Intermediary devices are network devices that facilitate communication between other devices. In the exhibit, devices A, B, D, and G are all switches, which are examples of intermediary devices. Device A is a distribution switch, device B is an access switch, device D is a core switch, and device G is an aggregation switch. These devices are responsible for forwarding data packets between different networks and ensuring efficient communication between devices.

    Rate this question:

  • 36. 

    Refer to the exhibit. A technician is working on a network problem that requires verification of the router LAN interface. What address should be pinged from this host to confirm that the router interface is operational?

    • A.

      127.0.0.1

    • B.

      192.168.64.196

    • C.

      192.168.254.1

    • D.

      192.168.254.9

    • E.

      192.168.254.254

    Correct Answer
    C. 192.168.254.1
    Explanation
    The correct answer is 192.168.254.1. This address should be pinged from the host to confirm that the router interface is operational.

    Rate this question:

  • 37. 

    Which prompt represents the appropriate mode used for the copy running-config startup-config command?

    • A.

      Switch-6J>

    • B.

      Switch-6J#

    • C.

      Switch-6J(config)#

    • D.

      Switch-6J(config-if)#

    • E.

      Switch-6J(config-line)#

    Correct Answer
    B. Switch-6J#
    Explanation
    The prompt "Switch-6J#" represents the appropriate mode used for the "copy running-config startup-config" command. This prompt indicates that the user is in privileged EXEC mode, which allows them to execute privileged commands such as copying the running configuration to the startup configuration.

    Rate this question:

  • 38. 

    A technician is asked to secure the privileged EXEC mode of a switch by requiring a password. Which type of password would require this login and be considered the most secure?

    • A.

      Console

    • B.

      Enable

    • C.

      Enable secret

    • D.

      VTY

    Correct Answer
    C. Enable secret
    Explanation
    The most secure type of password that can be used to secure the privileged EXEC mode of a switch is the "enable secret" password. This password is encrypted and stored in the switch's configuration file, providing an additional layer of security compared to other types of passwords. The "console" password is used to secure access to the console port, while the "enable" password is used to secure access to privileged mode. The "VTY" password is used to secure access to virtual terminal lines.

    Rate this question:

  • 39. 

    Which range of port numbers are reserved for services commonly used by applications that run on servers?

    • A.

      0 to 255

    • B.

      0 to 1023

    • C.

      1024 to 49151

    • D.

      49152 to 65535

    Correct Answer
    B. 0 to 1023
    Explanation
    The range of port numbers from 0 to 1023 is reserved for services commonly used by applications that run on servers. These ports are known as well-known ports or system ports. They are assigned to specific services such as HTTP (port 80), FTP (port 21), and SSH (port 22). These ports are typically used by server applications to listen for incoming connections from client applications.

    Rate this question:

  • 40. 

    Refer to the exhibit. Which two statements describe the information that is represented in the header? (Choose two.)

    • A.

      This is a server response.

    • B.

      The UDP protocol is being used.

    • C.

      The destination port indicates a Telnet session.

    • D.

      The return segment will contain a source port of 23.

    • E.

      The next session originated from the client of this session will use the source port number 13358.

    Correct Answer(s)
    C. The destination port indicates a Telnet session.
    D. The return segment will contain a source port of 23.
    Explanation
    The information represented in the header includes the destination port indicating a Telnet session, and the return segment containing a source port of 23.

    Rate this question:

  • 41. 

    In a Cisco IOS device, where is the startup-configuration file stored?

    • A.

      Flash

    • B.

      NVRAM

    • C.

      RAM

    • D.

      ROM

    Correct Answer
    B. NVRAM
    Explanation
    The startup-configuration file is stored in NVRAM (Non-Volatile Random Access Memory) in a Cisco IOS device. NVRAM is a type of memory that retains its data even when the device is powered off or restarted. This allows the device to retain its configuration settings and load them during the startup process. Flash memory is used to store the operating system image, while RAM is used for temporary storage during device operation. ROM (Read-Only Memory) contains the firmware and bootstrap code for the device.

    Rate this question:

  • 42. 

    Refer to the exhibit. What two facts can be determined about the exhibited topology? 

    • A.

      A single broadcast domain is present

    • B.

      Two logical address ranges are required.

    • C.

      Three broadcast domains are shown.

    • D.

      Four networks are needed.

    • E.

      Five collision domains exist.

    Correct Answer(s)
    A. A single broadcast domain is present
    E. Five collision domains exist.
    Explanation
    Based on the information provided in the exhibit, it can be determined that a single broadcast domain is present because there is only one router connecting all the devices. Additionally, five collision domains exist because there are five separate segments connected by hubs, which means that each segment has its own collision domain.

    Rate this question:

  • 43. 

    What are the three characteristics of CSMA/CD? 

    • A.

      Devices can be configured with a higher transmission priority.

    • B.

      A jam signal indicates that the collision has cleared and the media is not busy.

    • C.

      A device listens and waits until the media is not busy before transmitting.

    • D.

      The device with the electronic token is the only one that can transmit after a collision.

    • E.

      All of the devices on a segment see data that passes on the network medium.

    • F.

      After detecting a collision, hosts can attempt to resume transmission after a random time delay has expired.

    Correct Answer(s)
    C. A device listens and waits until the media is not busy before transmitting.
    E. All of the devices on a segment see data that passes on the network medium.
    F. After detecting a collision, hosts can attempt to resume transmission after a random time delay has expired.
    Explanation
    CSMA/CD (Carrier Sense Multiple Access with Collision Detection) is a protocol used in Ethernet networks to control access to the network medium. The three characteristics of CSMA/CD mentioned in the answer are: a device listens and waits until the media is not busy before transmitting, all devices on a segment can see data that passes on the network medium, and after detecting a collision, hosts can attempt to resume transmission after a random time delay has expired. These characteristics ensure that multiple devices can share the network medium without causing excessive collisions and congestion.

    Rate this question:

  • 44. 

    Refer to the exhibit. What is required on host A for a network technician to create the initial configuration on Router1?

    • A.

      An FTP client

    • B.

      A Telnet client

    • C.

      A terminal emulation program

    • D.

      A web browser

    Correct Answer
    C. A terminal emulation program
    Explanation
    To create the initial configuration on Router1, a network technician would need a terminal emulation program on host A. A terminal emulation program allows the technician to access and configure the router remotely through the console port. This program provides a text-based interface that emulates a physical terminal, allowing the technician to enter commands and configure the router's settings.

    Rate this question:

  • 45. 

    Refer to the exhibit. The tracert command is initiated from PC1 to PC4. Which device will send a response to the initial tracert packet from PC1?

    • A.

      Athens

    • B.

      Ankara

    • C.

      London

    • D.

      Paris

    • E.

      PC4

    Correct Answer
    C. London
    Explanation
    The tracert command is used to trace the route that packets take from the source to the destination. In this scenario, PC1 is the source and PC4 is the destination. The question asks which device will send a response to the initial tracert packet from PC1. Since the tracert command works by sending packets with increasing TTL (Time to Live) values, each device along the route will decrement the TTL and send back an ICMP Time Exceeded message to the source. Therefore, London, being a device along the route between PC1 and PC4, will send a response to the initial tracert packet from PC1.

    Rate this question:

  • 46. 

    Refer to the exhibit. When computer A sends a frame to computer D, what computers receive the frame?

    • A.

      Only computer D

    • B.

      Only computer A and computer D

    • C.

      Only computer B, computer C, and computer D

    • D.

      All computers

    Correct Answer
    A. Only computer D
    Explanation
    When computer A sends a frame to computer D, only computer D receives the frame. This is because the frame is specifically addressed to computer D, so only computer D will process and receive the frame. The other computers (A, B, and C) will not receive the frame as it is not intended for them.

    Rate this question:

  • 47. 

    Refer to the exhibit. What function does router RT_A need to provide to allow Internet access for hosts in this network?

    • A.

      Address translation

    • B.

      DHCP services

    • C.

      Ftpd

    • D.

      Web server

    Correct Answer
    A. Address translation
    Explanation
    Router RT_A needs to provide address translation in order to allow Internet access for hosts in this network. Address translation, also known as Network Address Translation (NAT), is a process that allows multiple devices in a private network to share a single public IP address. This is necessary because the private IP addresses used within the network are not routable on the Internet. By performing address translation, RT_A can map the private IP addresses of the hosts to the public IP address assigned to the router, enabling communication with the Internet.

    Rate this question:

  • 48. 

    Refer to the exhibit. The network containing router B is experiencing problems. A network associate has isolated the issue in this network to router B. What action can be preformed to correct the network issue?

    • A.

      Issue the clock rate command on interface Serial 0/0/0

    • B.

      Issue the description command on interface Serial 0/0/1

    • C.

      Issue the ip address command on interface FastEthernet 0/0

    • D.

      Issue the no shutdown command on interface FastEthernet 0/1

    Correct Answer
    D. Issue the no shutdown command on interface FastEthernet 0/1
    Explanation
    The correct action to correct the network issue is to issue the "no shutdown" command on interface FastEthernet 0/1. This command will bring up the interface and enable it to transmit and receive data. By performing this action, the network associate can resolve the problem with router B and restore network connectivity.

    Rate this question:

  • 49. 

    Which two actions could be taken by a router if a specific match is not made to a  route in the routing table? 

    • A.

      The packet will be discarded.

    • B.

      The packet will be sent back to the source.

    • C.

      The packet will be flooded out all interfaces.

    • D.

      Neighboring routers are polled to find the best path.

    • E.

      The packet will be forwarded to a default route if one is present.

    Correct Answer(s)
    D. Neighboring routers are polled to find the best path.
    E. The packet will be forwarded to a default route if one is present.
    Explanation
    If a specific match is not made to a route in the routing table, the router will first poll neighboring routers to find the best path. This is done to ensure that the router is not missing any potential routes that may not be present in its own routing table. If a suitable route is still not found, the router will then forward the packet to a default route if one is present. This default route acts as a fallback option for packets that do not have a specific matching route in the routing table.

    Rate this question:

  • 50. 

    Refer to the exhibit. The network administrator remotely accesses the CLI of RouterB from PC1 using a secure connection. Which statement is true about this connection?

    • A.

      The Telnet server process is running on PC1.

    • B.

      Only the exchange of the Telnet username and password is encrypted.

    • C.

      The GET request is sent to RouterA to retrieve data.

    • D.

      The SSH service is used to connect PC1 to RouterB.

    Correct Answer
    B. Only the exchange of the Telnet username and password is encrypted.
    Explanation
    The correct answer is "Only the exchange of the Telnet username and password is encrypted." This means that while the Telnet connection between PC1 and RouterB is established, only the username and password information is encrypted. The rest of the data exchanged between the two devices is not encrypted, making it potentially vulnerable to interception and unauthorized access. It is recommended to use SSH instead of Telnet for secure remote access.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Jun 26, 2024
    Quiz Edited by
    ProProfs Editorial Team
  • Dec 02, 2012
    Quiz Created by
    Dlefinc
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.