CCNA Final Exam Version 4.0 (100/100) - (B)

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Villancikos
V
Villancikos
Community Contributor
Quizzes Created: 1 | Total Attempts: 1,820
Questions: 48 | Attempts: 1,820

SettingsSettingsSettings
CCNA Quizzes & Trivia

Es el final de cisco una de las 4 versiones. Aouraid. . . This quiz is made to you to me for me for you bla bla bla. . .


Questions and Answers
  • 1. 

    1.-A PC can not connect to any remote websites, ping its default gateway, or ping a printer that is functioning properly on the local network segment. Which action will verify that the TCP/IP stack is functioning correctly on this PC?

    • A.

      Use the ipconfig /all command at the host�s command prompt.

    • B.

      Use the ping 127.0.0.1 command at the command prompt.

    • C.

      Use the traceroute command at the command prompt to identify any failures on the path to the gateway.

    • D.

      Use FTP to check for connectivity to remote sites.

    • E.

      Download a troubleshooting tool from the PC manufacturer's website.

    Correct Answer
    B. Use the ping 127.0.0.1 command at the command prompt.
    Explanation
    Using the "ping 127.0.0.1" command at the command prompt will verify that the TCP/IP stack is functioning correctly on the PC. The IP address 127.0.0.1 is the loopback address, which means it is the address of the local host. By pinging this address, the PC is essentially sending a test packet to itself and checking if it receives a response. If the PC receives a response, it indicates that the TCP/IP stack is functioning correctly.

    Rate this question:

  • 2. 

    2 Refer to the exhibit. Which set of devices contains only intermediary devices?

    • A.

      A, B, D, G

    • B.

      A, B, E, F

    • C.

      C, D, G, I

    • D.

      G, H, I, J

    Correct Answer
    A. A, B, D, G
    Explanation
    The devices A, B, D, G are considered intermediary devices because they are all networking devices that help facilitate communication between other devices on the network. These devices include switches (A, B), routers (D), and firewalls (G), which are all examples of intermediary devices.

    Rate this question:

  • 3. 

    3 Refer to the exhibit. When computer A sends a frame to computer D, what computers receive the frame?

    • A.

      Only computer D

    • B.

      Only computer A and computer D

    • C.

      Only computer B, computer C, and computer D

    • D.

      All computers

    Correct Answer
    A. Only computer D
    Explanation
    When computer A sends a frame to computer D, only computer D receives the frame. This is because the frame is specifically addressed to computer D, so only that computer will process and receive the frame. Computer A and the other computers (B and C) are not the intended recipients of the frame, so they will not receive it.

    Rate this question:

  • 4. 

    4 Which password is automatically encrypted when it is created?

    • A.

      Vty

    • B.

      Aux

    • C.

      Console

    • D.

      Enable secret

    • E.

      Enable password

    Correct Answer
    D. Enable secret
    Explanation
    The correct answer is "enable secret". This password is automatically encrypted when it is created, providing an additional layer of security. Unlike the "enable password" option, which is stored in plain text, the "enable secret" password is hashed using a one-way encryption algorithm, making it more secure and less susceptible to unauthorized access.

    Rate this question:

  • 5. 

    5 Which three statements characterize the transport layer protocols? (Choose three.)

    • A.

      TCP and UDP port numbers are used by application layer protocols

    • B.

      TCP uses port numbers to provide reliable transportation of IP packets.

    • C.

      UDP uses windowing and acknowledgments for reliable transfer of data.

    • D.

      TCP uses windowing and sequencing to provide reliable transfer of data.

    • E.

      TCP is a connection-oriented protocol. UDP is a connectionless protocol.

    Correct Answer(s)
    A. TCP and UDP port numbers are used by application layer protocols
    D. TCP uses windowing and sequencing to provide reliable transfer of data.
    E. TCP is a connection-oriented protocol. UDP is a connectionless protocol.
    Explanation
    The three statements that characterize the transport layer protocols are:
    1. TCP and UDP port numbers are used by application layer protocols: This means that the application layer protocols use TCP and UDP port numbers to establish communication with the transport layer.
    2. TCP uses windowing and sequencing to provide reliable transfer of data: TCP uses a sliding window mechanism and sequence numbers to ensure that data is delivered reliably and in order.
    3. TCP is a connection-oriented protocol. UDP is a connectionless protocol: TCP establishes a connection between the sender and receiver before data transfer, whereas UDP does not require a connection and simply sends data packets.

    Rate this question:

  • 6. 

    6 Which type of media is immune to EMI and RFI? (Choose two.)

    • A.

      1000 Base LX

    • B.

      10 Base-2

    • C.

      10 Base-5

    • D.

      100 Base-FX

    • E.

      100 Base TX

    Correct Answer(s)
    A. 1000 Base LX
    D. 100 Base-FX
    Explanation
    The 1000 Base LX and 100 Base-FX are both fiber optic media types, which are immune to electromagnetic interference (EMI) and radio frequency interference (RFI) due to their use of light signals instead of electrical signals. Fiber optic cables are not affected by EMI and RFI, making them a reliable choice for areas with high levels of interference or in environments where EMI and RFI are a concern.

    Rate this question:

  • 7. 

    7 Refer to the exhibit. A technician is working on a network problem that requires verification of the router LAN interface. What address should be pinged from this host to confirm that the router interface is operational?

    • A.

      127.0.0.1

    • B.

      192.168.64.196

    • C.

      192.168.254.1

    • D.

      192.168.254.9

    • E.

      192.168.254.254

    Correct Answer
    C. 192.168.254.1
    Explanation
    To confirm that the router interface is operational, the technician should ping the IP address of the router LAN interface. In this case, the IP address of the router LAN interface is 192.168.254.1.

    Rate this question:

  • 8. 

    8 Refer to the exhibit. The diagram represents the process of sending email between clients. Select the list below that correctly identifies the component or protocol used at each numbered stage of the diagram.

    • A.

      1.MUA 2.MDA 3.MTA 4.SMTP 5.MTA 6.POP 7.MDA 8.MUA

    • B.

      1.MUA 2.POP 3.MDA 4.SMTP 5.MTA 6.MDA 7.SMTP 8.MUA

    • C.

      1.MUA 2.POP 3.SMTP 4.MDA 5.MTA 6.SMTP 7.POP 8.MUA

    • D.

      1.MDA 2.SMTP 3.MTA 4.SMTP 5.MTA 6.MUA 7.POP 8.MDA

    • E.

      1.MUA 2.SMTP 3.MTA 4.SMTP 5.MTA 6.MDA 7.POP 8.MUA

    Correct Answer
    E. 1.MUA 2.SMTP 3.MTA 4.SMTP 5.MTA 6.MDA 7.POP 8.MUA
    Explanation
    This answer correctly identifies the component or protocol used at each numbered stage of the diagram. The process starts with the Mail User Agent (MUA) where the email is composed and sent. Then, the Simple Mail Transfer Protocol (SMTP) is used to send the email from the MUA to the Mail Transfer Agent (MTA). The MTA then forwards the email to another MTA using SMTP. The email is then received by the Mail Delivery Agent (MDA) using the Post Office Protocol (POP). Finally, the MDA delivers the email to the recipient's MUA.

    Rate this question:

  • 9. 

    9 Refer to the exhibit. What function does router RT_A need to provide to allow Internet access for hosts in this network?

    • A.

      Address translation

    • B.

      DHCP services

    • C.

      Ftpd

    • D.

      Web server

    Correct Answer
    A. Address translation
    Explanation
    Router RT_A needs to provide address translation in order to allow Internet access for hosts in this network. Address translation, also known as Network Address Translation (NAT), is a process that allows multiple devices with private IP addresses to share a single public IP address when connecting to the Internet. This allows the hosts in the network to communicate with external devices on the Internet by translating their private IP addresses to the public IP address assigned to the router. This ensures that the hosts can access the Internet while maintaining the security of their private IP addresses.

    Rate this question:

  • 10. 

    10 Refer to the exhibit. The network containing router B is experiencing problems. A network associate has isolated the issue in this network to router B? What action can be preformed to correct the network issue?

    • A.

      Issue the ip address command on interface FastEthernet 0/0

    • B.

      Issue the no shutdown command on interface FastEthernet 0/1

    • C.

      Issue the clock rate command on interface Serial 0/0/0

    • D.

      Issue the description command on interface Serial 0/0/1

    Correct Answer
    B. Issue the no shutdown command on interface FastEthernet 0/1
    Explanation
    The correct answer is to issue the "no shutdown" command on interface FastEthernet 0/1. This command will bring up the interface and enable it to send and receive network traffic. By performing this action, the network issue can be resolved as it will ensure that the interface is not in a shutdown state, allowing it to function properly.

    Rate this question:

  • 11. 

    11 Which three IPv4 addresses represent a broadcast for a subnet? (Choose three.)

    • A.

      172.16.4.63 /26

    • B.

      172.16.4.129 /26

    • C.

      172.16.4.191 /26

    • D.

      172.16.4.51 /27

    • E.

      172.16.4.95 /27

    Correct Answer(s)
    A. 172.16.4.63 /26
    C. 172.16.4.191 /26
    E. 172.16.4.95 /27
    Explanation
    The broadcast address for a subnet is the last address in the range of addresses for that subnet. In this case, the subnet mask is /26, which means that the first 26 bits of the IP address are the network portion and the remaining 6 bits are the host portion. Therefore, the broadcast address for the subnet would have all the host bits set to 1.

    For the given options, the IP addresses 172.16.4.63, 172.16.4.191, and 172.16.4.95 all have the host bits set to 1, making them the broadcast addresses for their respective subnets.

    Rate this question:

  • 12. 

    12 What are three characteristics of CSMA/CD? (Choose three.)

    • A.

      A jam signal indicates that the collision has cleared and the media is not busy.

    • B.

      A device listens and waits until the media is not busy before transmitting.

    • C.

      The device with the electronic token is the only one that can transmit after a collision.

    • D.

      All of the devices on a segment see data that passes on the network medium.

    • E.

      After detecting a collision, hosts can attempt to resume transmission after a random time delay has expired.

    Correct Answer(s)
    B. A device listens and waits until the media is not busy before transmitting.
    D. All of the devices on a segment see data that passes on the network medium.
    E. After detecting a collision, hosts can attempt to resume transmission after a random time delay has expired.
    Explanation
    CSMA/CD (Carrier Sense Multiple Access with Collision Detection) is a protocol used in Ethernet networks. It has three main characteristics. Firstly, before transmitting, a device listens and waits until the media is not busy, ensuring that there is no collision. Secondly, all devices on a segment can see data that passes on the network medium, allowing for shared communication. Lastly, after detecting a collision, hosts can attempt to resume transmission after a random time delay has expired, reducing the chances of another collision occurring.

    Rate this question:

  • 13. 

    13 In a Cisco IOS device, where is the startup-configuration file stored?

    • A.

      Flash

    • B.

      NVRAM

    • C.

      RAM

    • D.

      ROM

    Correct Answer
    B. NVRAM
    Explanation
    The startup-configuration file in a Cisco IOS device is stored in NVRAM (Non-Volatile Random Access Memory). NVRAM is a type of memory that retains its data even when the device is powered off or restarted. It is used to store important configuration files and settings that are necessary for the device to boot up and function properly.

    Rate this question:

  • 14. 

    14 A routing issue has occurred in you internetwork. Which of the following type of devices should be examined to isolate this error?

    • A.

      Access point

    • B.

      Host

    • C.

      Hub

    • D.

      Router

    • E.

      Switch

    Correct Answer
    D. Router
    Explanation
    To isolate a routing issue in an internetwork, the router should be examined. Routers are responsible for directing network traffic between different networks, and any issue with routing can cause connectivity problems. By examining the router, one can identify and troubleshoot any misconfigurations, faulty hardware, or software errors that may be causing the routing problem. Access points, hosts, hubs, and switches are not directly involved in routing, so they would not be the primary devices to examine in this scenario.

    Rate this question:

  • 15. 

    15 Which OSI layer protocol does IP rely on to determine whether packets have been lost and to request retransmission?

    • A.

      Application

    • B.

      Presentation

    • C.

      Session

    • D.

      Transport

    Correct Answer
    D. Transport
    Explanation
    IP relies on the transport layer protocol to determine whether packets have been lost and to request retransmission. The transport layer protocols, such as TCP (Transmission Control Protocol), provide reliable and error-free delivery of packets by implementing mechanisms like acknowledgments, sequence numbers, and retransmission requests. These protocols ensure that the packets are delivered in the correct order and any lost or corrupted packets are retransmitted, ensuring the reliability of the communication.

    Rate this question:

  • 16. 

    16 Due to a security violation, the router passwords must be changed. What information can be learned from the following configuration entries? (Choose two.)Router(config)# line vty 0 3 Router(config-line)# password c13c0 Router(config-line)# login

    • A.

      The entries specify three Telnet lines for remote access.

    • B.

      The entries specify four Telnet lines for remote access.

    • C.

      The entries set the console and Telnet password to "c13c0".

    • D.

      Telnet access will be denied because the Telnet configuration is incomplete.

    • E.

      Access will be permitted for Telnet using "c13c0" as the password.

    Correct Answer(s)
    B. The entries specify four Telnet lines for remote access.
    E. Access will be permitted for Telnet using "c13c0" as the password.
    Explanation
    The given configuration entries indicate that there are four Telnet lines specified for remote access. Additionally, the password for these Telnet lines is set to "c13c0". Therefore, access will be permitted for Telnet using "c13c0" as the password.

    Rate this question:

  • 17. 

    17 Which prompt represents the appropriate mode used for the copy running-config startup-config command ?

    • A.

      Switch-6J>

    • B.

      Switch-6J#

    • C.

      Switch-6J(config)#

    • D.

      Switch-6J(config-if)#

    • E.

      Switch-6J(config-line)#

    Correct Answer
    B. Switch-6J#
    Explanation
    The prompt "Switch-6J#" represents the appropriate mode used for the "copy running-config startup-config" command. This prompt indicates that the user is in privileged EXEC mode, which is the mode required to execute this command.

    Rate this question:

  • 18. 

    18 Which combination of network id and subnet mask correctly identifies all IP addresses from 172.16.128.0 through 172.16.159.255?

    • A.

      172.16.128.0 255.255.255.224

    • B.

      172.16.128.0 255.255.0.0

    • C.

      172.16.128.0 255.255.192.0

    • D.

      172.16.128.0 255.255.224.0

    • E.

      172.16.128.0 255.255.255.192

    Correct Answer
    D. 172.16.128.0 255.255.224.0
    Explanation
    The subnet mask 255.255.224.0 has a binary representation of 11111111.11111111.11100000.00000000. This means that the first 19 bits of the IP address are used for the network ID, and the remaining 13 bits are available for host addresses. The IP addresses from 172.16.128.0 through 172.16.159.255 fall within this range, so the combination of network ID 172.16.128.0 and subnet mask 255.255.224.0 correctly identifies all these IP addresses.

    Rate this question:

  • 19. 

    19 When must a router serial interface be configured with the clock rate command?

    • A.

      When the interface is functioning as a DTE device

    • B.

      When the interface timers have been cleared

    • C.

      When the connected DTE device is shut down

    • D.

      When the interface is functioning as a DCE device

    Correct Answer
    D. When the interface is functioning as a DCE device
    Explanation
    The router serial interface must be configured with the clock rate command when it is functioning as a DCE (Data Communications Equipment) device. In this scenario, the router is responsible for providing the clock signal to the connected DTE (Data Terminal Equipment) device. The clock rate command is used to set the clocking speed on the interface, ensuring proper synchronization between the devices.

    Rate this question:

  • 20. 

    20 When connectionless protocols are implemented at the lower layers of the OSI model, what are usually used to acknowledge the data receipt and request the retransmission of missing data?

    • A.

      Connectionless acknowledgements

    • B.

      Upper-layer connection-oriented protocols

    • C.

      Network layer IP protocols

    • D.

      Transport layer UDP protocols

    Correct Answer
    B. Upper-layer connection-oriented protocols
    Explanation
    When connectionless protocols are implemented at the lower layers of the OSI model, upper-layer connection-oriented protocols are usually used to acknowledge the data receipt and request the retransmission of missing data. This is because connectionless protocols do not establish a dedicated connection between the sender and receiver, so they do not provide reliable delivery of data. In order to ensure data reliability, upper-layer connection-oriented protocols are used to manage the acknowledgment and retransmission process. These protocols establish a connection between the sender and receiver and provide mechanisms for acknowledging received data and requesting retransmission of missing data.

    Rate this question:

  • 21. 

    21 A technician is asked to secure the privileged EXEC mode of a switch by requiring a password. Which type of password would require this login and be considered the most secure?

    • A.

      Console

    • B.

      Enable

    • C.

      Enable secret

    • D.

      VTY

    Correct Answer
    C. Enable secret
    Explanation
    The most secure password to secure the privileged EXEC mode of a switch is the "enable secret" password. This password is encrypted and stored in the switch's configuration file, providing an additional layer of security. The "console" password is used to secure console access, the "enable" password is used to secure privileged EXEC mode but is not as secure as the "enable secret" password, and "VTY" is used to secure remote access to the switch.

    Rate this question:

  • 22. 

    22 Refer to the exhibit. What is required on host A for a network technician to create the initial configuration on RouterA?

    • A.

      A FTP client

    • B.

      A telnet client

    • C.

      A terminal emulation program

    • D.

      A web browser

    Correct Answer
    C. A terminal emulation program
    Explanation
    To create the initial configuration on RouterA, a network technician would need a terminal emulation program on host A. This program allows the technician to establish a console connection with RouterA and configure it using command-line interface (CLI) commands. FTP client, telnet client, and web browser are not required for this specific task.

    Rate this question:

  • 23. 

    23 Refer to the exhibit. A network administrator remotely accesses the CLI of RouterB from PC1. Which two statements are true about the application layer protocol that is used to make this connection? (Choose two.)

    • A.

      The data is encrypted.

    • B.

      The connection type is called a VTY session.

    • C.

      A server process is running on PC1.

    • D.

      A GET request is sent to RouterB.

    • E.

      The application name is the same for the service, protocol, and client.

    Correct Answer(s)
    B. The connection type is called a VTY session.
    E. The application name is the same for the service, protocol, and client.
    Explanation
    The connection type is called a VTY session because the network administrator is remotely accessing the CLI of RouterB from PC1 using a virtual terminal line. The application name is the same for the service, protocol, and client because the network administrator is using a specific application or protocol to establish the remote connection between PC1 and RouterB.

    Rate this question:

  • 24. 

    24 The Layer 4 header contains which type of information to aid in the delivery of data?

    • A.

      Service port number

    • B.

      Host logical address

    • C.

      Device physical address

    • D.

      Virtual connection identifier

    Correct Answer
    A. Service port number
    Explanation
    The Layer 4 header contains the service port number to aid in the delivery of data. The service port number is used to identify the specific application or service that the data is intended for. By including this information in the Layer 4 header, the receiving device can determine how to process the data and deliver it to the correct application or service. This helps ensure that the data reaches its intended destination and is properly handled.

    Rate this question:

  • 25. 

    25 Refer to the exhibit. What two facts can be determined about the exhibited topology? (Choose two.)

    • A.

      A single broadcast domain is present

    • B.

      Two logical address ranges are required.

    • C.

      Three broadcast domains are shown.

    • D.

      Four networks are needed.

    • E.

      Five collision domains exist.

    Correct Answer(s)
    A. A single broadcast domain is present
    E. Five collision domains exist.
    Explanation
    Based on the exhibited topology, it can be determined that a single broadcast domain is present because all devices are connected to the same switch, which means they are in the same broadcast domain. Additionally, five collision domains exist because each port on the switch represents a separate collision domain, and there are five ports in total.

    Rate this question:

  • 26. 

    26 Refer to the exhibit. A network technician is trying to determine the correct IP address configuration for Host A. What is a valid configuration for Host A?

    • A.

      IP address: 192.168.100.19; Subnet Mask: 255.255.255.248; Default Gateway: 192.16.1.2

    • B.

      IP address: 192.168.100.20; Subnet Mask: 255.255.255.240; Default Gateway: 192.168.100.17

    • C.

      IP address: 192.168.100.21; Subnet Mask: 255.255.255.248; Default Gateway: 192.168.100.18

    • D.

      IP address: 192.168.100.22; Subnet Mask: 255.255.255.240; Default Gateway: 10.1.1.5

    • E.

      IP address: 192.168.100.30; Subnet Mask: 255.255.255.240; Default Gateway: 192.168.1.1

    Correct Answer
    B. IP address: 192.168.100.20; Subnet Mask: 255.255.255.240; Default Gateway: 192.168.100.17
    Explanation
    The correct configuration for Host A is IP address: 192.168.100.20; Subnet Mask: 255.255.255.240; Default Gateway: 192.168.100.17. This is because the IP address falls within the same network range as the default gateway and the subnet mask is correct for the given IP address and default gateway.

    Rate this question:

  • 27. 

    27 Refer to the exhibit. Cable 1 and cable 2 have the ends wired for specific physical layer requirements. The table lists each segment by number and the cable which has been installed by the network technician between the network components on that segment. From the data given, which segments have the correct cable installed? (Choose three.)

    • A.

      Segment1

    • B.

      Segment2

    • C.

      Segment3

    • D.

      Segment4

    • E.

      Segment5

    Correct Answer(s)
    A. Segment1
    C. Segment3
    D. Segment4
    Explanation
    The correct cables are installed in segment1, segment3, and segment4. This can be determined by comparing the cable requirements for each segment with the cables listed in the table. The exhibit does not provide information on the cable requirements or the specific cables installed, so it is not possible to determine the correct answer.

    Rate this question:

  • 28. 

    28 What is true regarding network layer addressing? (Choose three.)

    • A.

      Uses a flat structure

    • B.

      Prevent broadcasts

    • C.

      Heirarchical

    • D.

      Uniquely identifies each host

    • E.

      Contains a network portion

    Correct Answer(s)
    C. Heirarchical
    D. Uniquely identifies each host
    E. Contains a network portion
    Explanation
    The network layer addressing uses a hierarchical structure, where addresses are organized in a hierarchical manner to facilitate routing and management of networks. It uniquely identifies each host by assigning a unique address to each device on the network. Additionally, the network layer addressing contains a network portion, which helps in identifying the network to which the host belongs.

    Rate this question:

  • 29. 

    29 Refer to the exhibit. A router, whose table is shown, receives a packet that is destined for 192.168.1.4. How will router treat the packet?

    • A.

      The packet will be dropped.

    • B.

      The packet will be forwarded via FastEthernet 0/0.

    • C.

      The packet will be forwarded to the destination host.

    • D.

      The packet will be forwarded to the 192.168.1.3 next-hop address.

    Correct Answer
    C. The packet will be forwarded to the destination host.
    Explanation
    Based on the router table shown in the exhibit, we can see that there is a specific entry for the destination IP address 192.168.1.4. This means that the router knows how to reach this destination and will forward the packet directly to the destination host. Therefore, the correct answer is that the packet will be forwarded to the destination host.

    Rate this question:

  • 30. 

    30 Refer to the exhibit. Which two statements describe the information that is represented in the header? (Choose two.)

    • A.

      This is a server response.

    • B.

      The UDP protocol is being used.

    • C.

      The destination port indicates a Telnet session.

    • D.

      The return segment will contain a source port of 23.

    • E.

      The next session originated from the client of this session will use the source port number 13358.

    Correct Answer(s)
    C. The destination port indicates a Telnet session.
    D. The return segment will contain a source port of 23.
    Explanation
    The information represented in the header is that the destination port indicates a Telnet session and the return segment will contain a source port of 23.

    Rate this question:

  • 31. 

    31 Refer to the exhibit. What is the correct destination socket number for a web page request from Host A to the web server?

    • A.

      00-08-a3-b6-ce-46

    • B.

      198.133.219.25:80

    • C.

      Http://www.cisco.com

    • D.

      C 198.133.219.0/24 is directly connected, FastEthernet0/0

    Correct Answer
    B. 198.133.219.25:80
    Explanation
    The correct destination socket number for a web page request from Host A to the web server is 198.133.219.25:80. This is because the given IP address and port number (198.133.219.25:80) represent the specific destination where the web server is located and the port (80) that is used for web page requests.

    Rate this question:

  • 32. 

    32 During the encapsulation process, which identifiers are added at the transport layer?

    • A.

      Two networks routing the packets

    • B.

      Two applications communicating the data

    • C.

      Two hosts at either end of the communication

    • D.

      Two nodes on the local network exchanging the frame

    Correct Answer
    B. Two applications communicating the data
    Explanation
    During the encapsulation process at the transport layer, the identifiers that are added are specific to the two applications that are communicating the data. These identifiers help in establishing a connection between the two applications and enable the transport layer to properly deliver the data from the source application to the destination application. The transport layer protocols, such as TCP and UDP, use these identifiers to ensure reliable and efficient data transfer between the applications.

    Rate this question:

  • 33. 

    33 Refer to the exhibit. A student has wired each end of a CAT 5e cable as shown. What is the result? (Choose two.)

    • A.

      The cable is unusable and must be rewired.

    • B.

      The cable is suitable for use as a Gigabit Ethernet straight-through.

    • C.

      The cable is suitable for use as a Fast Ethernet crossover.

    • D.

      The cable is suitable for use as a rollover cable.

    • E.

      The cable is suitable for use between two 100 Mbps Auto-MDIX capable switches.

    Correct Answer(s)
    C. The cable is suitable for use as a Fast Ethernet crossover.
    E. The cable is suitable for use between two 100 Mbps Auto-MDIX capable switches.
    Explanation
    The wiring configuration shown in the exhibit corresponds to a Fast Ethernet crossover cable. This type of cable is used to connect two Ethernet devices of the same type (e.g., switch to switch) without the need for a crossover adapter. Additionally, the cable is suitable for use between two 100 Mbps Auto-MDIX capable switches, which means that the switches will automatically detect and adjust for the correct cable type. Therefore, the cable is usable and does not need to be rewired.

    Rate this question:

  • 34. 

    34 Refer to the exhibit. Assume all devices are using default configurations. How many subnets are required to address the topology that is shown?

    • A.

      1

    • B.

      3

    • C.

      4

    • D.

      5

    • E.

      7

    Correct Answer
    B. 3
    Explanation
    The given exhibit shows a network topology with three different subnets, each containing a different set of devices. Therefore, to address this topology, three subnets are required.

    Rate this question:

  • 35. 

    35 Refer to the exhibit. On the basis of the IP configuration that is shown, what is the reason that Host A and Host B are unable to communicate outside the local network?

    • A.

      Host A was assigned a network address.

    • B.

      Host B was assigned a multicast address.

    • C.

      Host A and Host B belong to different networks.

    • D.

      The gateway address was assigned a broadcast address.

    Correct Answer
    D. The gateway address was assigned a broadcast address.
    Explanation
    The reason that Host A and Host B are unable to communicate outside the local network is because the gateway address was assigned a broadcast address. A broadcast address is used to send data to all devices on a network, so assigning it as the gateway address means that any communication sent to the gateway will be broadcasted to all devices instead of being routed to the appropriate destination. Therefore, the gateway is unable to properly route the traffic between Host A, Host B, and the external network.

    Rate this question:

  • 36. 

    36 Refer to the exhibit. Each media link is labeled. What type of cable should be used to connect the different devices?

    • A.

      Connection 1 - rollover cable Connection 2 - straight-through cable Connection 3 - crossover cable

    • B.

      Connection 1 - crossover cable Connection 2 - rollover cable Connection 3 - crossover cable

    • C.

      Connection 1 - straight-through cable Connection 2 - crossover cable Connection 3 - crossover cable

    • D.

      Connection 1 - straight-through cable Connection 2 - crossover cable Connection 3 - straight-through cable

    • E.

      Connection 1 - crossover cable Connection 2 - straight-through cable Connection 3 - crossover cable

    Correct Answer
    D. Connection 1 - straight-through cable Connection 2 - crossover cable Connection 3 - straight-through cable
    Explanation
    The correct answer is Connection 1 - straight-through cable, Connection 2 - crossover cable, Connection 3 - straight-through cable. This is because a straight-through cable is used to connect a host device to a switch or router, which is the case for Connection 1 and Connection 3. A crossover cable is used to connect two similar devices, such as two switches or two routers, which is the case for Connection 2.

    Rate this question:

  • 37. 

    37 Refer to the exhibit. What does the IP address 192.168.33.2 represent?

    • A.

      10.0.0.0 to 10.255.255.255

    • B.

      200.100.50.0 to 200.100.25.255

    • C.

      150.150.0.0 to 150.150.255.255

    • D.

      172.16.0.0 to 172.31.255.255

    • E.

      192.168.0.0 to 192.168.255.255

    Correct Answer(s)
    A. 10.0.0.0 to 10.255.255.255
    D. 172.16.0.0 to 172.31.255.255
    E. 192.168.0.0 to 192.168.255.255
    Explanation
    The IP address 192.168.33.2 falls within the range of 192.168.0.0 to 192.168.255.255, which is a private IP address range commonly used for local area networks (LANs). This range allows for a large number of devices to be connected within a single network.

    Rate this question:

  • 38. 

    40 Which two functions of the OSI model occur at layer two? (Choose two.)

    • A.

      Physical addressing

    • B.

      Encoding

    • C.

      Routing

    • D.

      Cabling

    • E.

      Media access control

    Correct Answer(s)
    A. pHysical addressing
    E. Media access control
    Explanation
    The functions of physical addressing and media access control occur at layer two of the OSI model. Physical addressing involves assigning unique addresses to devices on a network, such as MAC addresses. Media access control, on the other hand, is responsible for managing access to the physical medium, ensuring that multiple devices can communicate on the same network without interference.

    Rate this question:

  • 39. 

    41 Which range of port numbers are reserved for services that are commonly used by applications that run on servers?

    • A.

      0 to 255

    • B.

      0 to 1023

    • C.

      1024 to 49151

    • D.

      49152 to 65535

    Correct Answer
    C. 1024 to 49151
    Explanation
    The range of port numbers 1024 to 49151 is reserved for services commonly used by applications that run on servers. These ports are known as registered ports and are used for specific services such as email, web browsing, and file transfer. Ports in this range are assigned by the Internet Assigned Numbers Authority (IANA) to ensure that different applications do not conflict with each other. The lower range of ports (0 to 1023) is reserved for well-known ports used by standard services, while the higher range (49152 to 65535) is used for dynamic or private ports.

    Rate this question:

  • 40. 

    42 As network administrator, what is the subnet mask that allows 510 hosts given the IP address 172.30.0.0?

    • A.

      255.255.0.0

    • B.

      255.255.248.0

    • C.

      255.255.254.0

    • D.

      255.255.255.0

    • E.

      255.255.255.128

    Correct Answer
    C. 255.255.254.0
    Explanation
    The IP address 172.30.0.0 is a Class B address, which means the default subnet mask is 255.255.0.0. However, this subnet mask only allows for 65,534 hosts. To accommodate 510 hosts, a smaller subnet mask is needed. The subnet mask 255.255.254.0 provides a range of 512 addresses, which is sufficient to accommodate 510 hosts.

    Rate this question:

  • 41. 

    43 Refer to the exhibit. The tracert command is initiated from PC1 to the destination PC4. Which device will send a response to the initial packet from PC1?

    • A.

      London

    • B.

      Paris

    • C.

      Athens

    • D.

      Ankara

    • E.

      PC4

    Correct Answer
    A. London
    Explanation
    The correct answer is London because the tracert command is used to trace the route that packets take from the source to the destination. In this case, PC1 is the source and PC4 is the destination. The tracert command sends packets with increasing TTL (Time to Live) values, and each router along the path decrements the TTL value. When the TTL reaches 0, the router discards the packet and sends an ICMP Time Exceeded message back to the source. Therefore, the device that will send a response to the initial packet from PC1 is London, which is the first router in the path.

    Rate this question:

  • 42. 

    44 Refer to the exhibit. Host A is transmitting data to host B. What addresses will host A use to for the destination IP and MAC addresses in this communication?

    • A.

      Destination MAC: BBBB:BBBB:BBBB Destination IP: 172.22.0.62

    • B.

      Destination MAC: DDDD:DDDD:DDDD Destination IP: 172.22.0.75

    • C.

      Destination MAC: EEEE:EEEE:EEEE Destination IP: 172.22.0.62

    • D.

      Destination MAC: BBBB:BBBB:BBBB Destination IP: 172.22.0.75

    • E.

      Destination MAC: EEEE:EEEE:EEEE Destination IP: 172.22.0.75

    Correct Answer
    E. Destination MAC: EEEE:EEEE:EEEE Destination IP: 172.22.0.75
    Explanation
    Host A will use the destination MAC address EEEE:EEEE:EEEE and the destination IP address 172.22.0.75 for the communication. The MAC address is used to identify the specific network interface card (NIC) of the destination host, while the IP address is used to identify the destination host within the network. Therefore, in this scenario, host A will send the data to the NIC with the MAC address EEEE:EEEE:EEEE and the IP address 172.22.0.75.

    Rate this question:

  • 43. 

    45 Refer to the exhibit. Which logical topology best describes the exhibited network?

    • A.

      Star

    • B.

      Ring

    • C.

      Point-to-point

    • D.

      Multiaccess

    • E.

      Mesh

    Correct Answer
    D. Multiaccess
    Explanation
    The exhibited network in the exhibit shows multiple devices connected to a central device. This indicates a multiaccess topology, where multiple devices have access to the same communication medium. In a multiaccess topology, all devices can communicate with each other without the need for a central controller or node.

    Rate this question:

  • 44. 

    46 Examine the graphic with current configurations. Host A in the Clerical offices failed and was replaced. Although a ping to 127.0.0.1 was successful, the replacement computer can not access the company network. What is the likely cause of the problem?

    • A.

      IP address incorrectly entered

    • B.

      Network cables unplugged

    • C.

      Subnet mask incorrectly entered

    • D.

      Network card failure

    Correct Answer
    C. Subnet mask incorrectly entered
    Explanation
    The likely cause of the problem is that the subnet mask was incorrectly entered. The subnet mask is used to determine which part of an IP address belongs to the network and which part belongs to the host. If the subnet mask is entered incorrectly, it can result in the replacement computer not being able to access the company network even though a ping to the loopback address (127.0.0.1) is successful.

    Rate this question:

  • 45. 

    47 Refer to the exhibit. With the router running NAT, what IP addresses can be applied to the computer to allow access to the Internet? (Choose three.)

    • A.

      192.168.18.38

    • B.

      192.168.18.48

    • C.

      192.168.18.49

    • D.

      192.168.18.52

    • E.

      192.168.18.59

    Correct Answer(s)
    C. 192.168.18.49
    D. 192.168.18.52
    E. 192.168.18.59
    Explanation
    The given IP addresses can be applied to the computer to allow access to the Internet because they are within the same subnet as the router's LAN interface IP address (192.168.18.0/24). This means that they are on the same network and can communicate with each other. Therefore, the computer can use these IP addresses to access the Internet through the router's NAT configuration.

    Rate this question:

  • 46. 

    48 Refer to the exhibit. What three statements are true about the IP configuration that is shown? (Choose three.)

    • A.

      The address that is assigned to the computer represents private addressing.

    • B.

      The computer is unable to communicate outside of the local network.

    • C.

      The network of this computer can have 126 hosts.

    • D.

      The prefix of the computer address is /27.

    • E.

      The IP address that is assigned to the computer is routable on the Internet.

    Correct Answer(s)
    A. The address that is assigned to the computer represents private addressing.
    B. The computer is unable to communicate outside of the local network.
    D. The prefix of the computer address is /27.
    Explanation
    The IP configuration shown in the exhibit indicates that the address assigned to the computer represents private addressing, as it falls within the range of private IP addresses. The computer is also unable to communicate outside of the local network, as private addresses are not routable on the Internet. Additionally, the prefix of the computer address is /27, which indicates that the network can have 30 usable hosts (32 - 2).

    Rate this question:

  • 47. 

    49 Refer to the exhibit. Host A attempts to establish a TCP/IP session with host C. During this attempt, a frame was captured with the source MAC address 0050.7320.D632 and the destination MAC address 0030.8517.44C4. The packet inside the captured frame has an IP source address 192.168.7.5, and the destination IP address is 192.168.219.24. At which point in the network was this packet captured?

    • A.

      Leaving host A

    • B.

      Leaving ATL

    • C.

      Leaving Dallas

    • D.

      Leaving NYC

    Correct Answer
    C. Leaving Dallas
    Explanation
    The packet was captured at the point in the network where it was leaving Dallas. This is indicated by the source MAC address 0050.7320.D632, which belongs to a device in Dallas, and the destination MAC address 0030.8517.44C4, which is the MAC address of the device that the packet is being sent to.

    Rate this question:

  • 48. 

    50 Which of the following OSI layers offers reliable, connection-oriented data communication services?

    • A.

      Application

    • B.

      Presentation

    • C.

      Session

    • D.

      Transport

    • E.

      Network

    Correct Answer
    D. Transport
    Explanation
    The transport layer of the OSI model offers reliable, connection-oriented data communication services. This layer is responsible for ensuring that data is delivered accurately and efficiently between devices. It establishes connections, manages flow control, and provides error recovery mechanisms. It also handles segmentation and reassembly of data packets.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 20, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Nov 27, 2009
    Quiz Created by
    Villancikos
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.