CCNA Final Exam Set-2

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Jeff_ery
J
Jeff_ery
Community Contributor
Quizzes Created: 2 | Total Attempts: 238
Questions: 50 | Attempts: 103

SettingsSettingsSettings
CCNA Final Exam Set-2 - Quiz


Questions and Answers
  • 1. 

    When must a router serial interface be configured with the clock rate command?

    • A.

      When the interface is functioning as a DTE device

    • B.

      When the interface timers have been cleared

    • C.

      When the connected DTE device is shut down

    • D.

      When the interface is functioning as a DCE device

    Correct Answer
    D. When the interface is functioning as a DCE device
    Explanation
    The clock rate command must be configured on a router serial interface when the interface is functioning as a DCE (Data Communications Equipment) device. This command is used to set the clocking rate for the interface, which is necessary for proper communication between the DCE and DTE (Data Terminal Equipment) devices. The DCE device provides clocking for the communication link, so the clock rate command is required to ensure synchronization and proper data transmission.

    Rate this question:

  • 2. 

    Due to a security violation, the router passwords must be changed. What information can be learned from the following configuration entries? (Choose two.)Router(config)# line vty 0 3 Router(config-line)# password c13c0Router(config-line)# login

    • A.

      The entries specify three Telnet lines for remote access.

    • B.

      The entries specify four Telnet lines for remote access.

    • C.

      The entries set the console and Telnet password to “c13c0″.

    • D.

      Telnet access will be denied because the Telnet configuration is incomplete.

    • E.

      Access will be permitted for Telnet using “c13c0″ as the password.

    Correct Answer(s)
    B. The entries specify four Telnet lines for remote access.
    E. Access will be permitted for Telnet using “c13c0″ as the password.
    Explanation
    The given configuration entries "line vty 0 3" indicate that there are four Telnet lines (0, 1, 2, and 3) specified for remote access. The "password c13c0" command sets the password for these Telnet lines to "c13c0". The "login" command enables login authentication for these Telnet lines. Therefore, access will be permitted for Telnet using the password "c13c0".

    Rate this question:

  • 3. 

    Which of the following are the address ranges of the private IP addresses? (Choose three.) 

    • A.

      10.0.0.0 to 10.255.255.255

    • B.

      200.100.50.0 to 200.100.25.255

    • C.

      150.150.0.0 to 150.150.255.255

    • D.

      172.16.0.0 to 172.31.255.255

    • E.

      192.168.0.0 to 192.168.255.255

    • F.

      127.16.0.0 to 127.31.255.255

    Correct Answer(s)
    A. 10.0.0.0 to 10.255.255.255
    D. 172.16.0.0 to 172.31.255.255
    E. 192.168.0.0 to 192.168.255.255
    Explanation
    The three address ranges that are considered private IP addresses are: 10.0.0.0 to 10.255.255.255, 172.16.0.0 to 172.31.255.255, and 192.168.0.0 to 192.168.255.255. These ranges are reserved for use within private networks and are not routable on the internet.

    Rate this question:

  • 4. 

    Which password is automatically encrypted when it is created?

    • A.

      Vty

    • B.

      Aux

    • C.

      Console

    • D.

      Enable secret

    • E.

      Enable password

    Correct Answer
    D. Enable secret
    Explanation
    The "enable secret" password is automatically encrypted when it is created. This password is used for securing privileged access to a Cisco device. When the "enable secret" command is used to set a password, the password is automatically encrypted using a strong cryptographic algorithm. This ensures that the password is stored securely in the device's configuration file and cannot be easily deciphered by unauthorized individuals.

    Rate this question:

  • 5. 

    Refer to the exhibit. A network technician is trying to determine the correct IP address configuration for Host A. What is a valid configuration for Host A?

    • A.

      IP address: 192.168.100.19; Subnet Mask: 255.255.255.248; Default Gateway: 192.16.1.2

    • B.

      IP address: 192.168.100.20; Subnet Mask: 255.255.255.240; Default Gateway: 192.168.100.17

    • C.

      IP address: 192.168.100.21; Subnet Mask: 255.255.255.248; Default Gateway: 192.168.100.18

    • D.

      IP address: 192.168.100.22; Subnet Mask: 255.255.255.240; Default Gateway: 10.1.1.5

    • E.

      IP address: 192.168.100.30; Subnet Mask: 255.255.255.240; Default Gateway: 192.168.1.1

    • F.

      IP address: 192.168.100.31; Subnet Mask: 255.255.255.240; Default Gateway: 192.168.100.18

    Correct Answer
    B. IP address: 192.168.100.20; Subnet Mask: 255.255.255.240; Default Gateway: 192.168.100.17
    Explanation
    The valid configuration for Host A is IP address: 192.168.100.20; Subnet Mask: 255.255.255.240; Default Gateway: 192.168.100.17. This configuration falls within the same IP subnet as the given IP address and subnet mask, and the default gateway is also within the same subnet. This ensures that Host A can communicate with other devices on the network and access resources outside of its subnet through the default gateway.

    Rate this question:

  • 6. 

    Refer to the exhibit. What function does router RT_A need to provide toallow Internet access for hosts in this network?

    • A.

      Address translation

    • B.

      DHCP services

    • C.

      Ftpd

    • D.

      Web server

    Correct Answer
    A. Address translation
    Explanation
    Router RT_A needs to provide address translation in order to allow Internet access for hosts in this network. Address translation, also known as Network Address Translation (NAT), is a process that allows multiple devices in a network to share a single public IP address. It translates the private IP addresses of the hosts in the network to the public IP address assigned to the router, enabling communication with devices on the Internet. This ensures that the hosts can access the Internet and communicate with external networks while maintaining security and conserving IP addresses.

    Rate this question:

  • 7. 

    Which prompt represents the appropriate mode used for the copy running-config startup-config command ?

    • A.

      Switch-6J>

    • B.

      Switch-6J#

    • C.

      Switch-6J(config)#

    • D.

      Switch-6J(config-if)#

    • E.

      Switch-6J(config-line)#

    Correct Answer
    B. Switch-6J#
    Explanation
    The prompt "Switch-6J#" represents the appropriate mode used for the "copy running-config startup-config" command. This prompt indicates that the user is in privileged EXEC mode, which is the mode required to execute this command.

    Rate this question:

  • 8. 

    Refer to the exhibit. A technician is working on a network problem that requires verification of the router LAN interface. What address should be pinged from this host to confirm that the router interface is operational?

    • A.

      127.0.0.1

    • B.

      192.168.64.196

    • C.

      192.168.254.1

    • D.

      192.168.254.9

    • E.

      192.168.254.254

    Correct Answer
    C. 192.168.254.1
    Explanation
    The correct address that should be pinged from this host to confirm that the router interface is operational is 192.168.254.1. This is because the router LAN interface is typically assigned the first usable IP address in the subnet, which is usually the .1 address. Pinging this address will allow the technician to check if the router interface is responding and functioning properly.

    Rate this question:

  • 9. 

    Refer to the exhibit. The tracert command is initiated from PC1 to PC4. Which device will send a response to the initial tracert packet from PC1?

    • A.

      Athens

    • B.

      Ankara

    • C.

      London

    • D.

      Paris

    • E.

      PC4

    Correct Answer
    C. London
    Explanation
    The tracert command is used to trace the route that packets take from the source to the destination. In this scenario, PC1 is the source and PC4 is the destination. The tracert packet will travel through the network devices in between. The device that will send a response to the initial tracert packet from PC1 is London. This is because it is the next hop device in the network path towards PC4.

    Rate this question:

  • 10. 

    Which information is used by the router to determine the path between the source and destination hosts?

    • A.

      The host portion of the IP address

    • B.

      The network portion of the IP address

    • C.

      Host default gateway address

    • D.

      The MAC address

    Correct Answer
    B. The network portion of the IP address
    Explanation
    The router uses the network portion of the IP address to determine the path between the source and destination hosts. The network portion of the IP address helps the router identify the network to which the hosts belong. By examining the network portion, the router can make routing decisions and forward the packets to the appropriate network. The host portion of the IP address is used to identify individual hosts within a network, but it does not play a role in determining the path between hosts. The host default gateway address is used by individual hosts to send packets to the router, but it is not used by the router itself to determine the path. The MAC address is used at the data link layer for local network communication and is not relevant for determining the path between hosts on different networks.

    Rate this question:

  • 11. 

    Refer to the exhibit. A PC is communicating with another PC on a remote network. The two networks are connected by three routers. Which action will help to identify the path between the hosts?

    • A.

      Use the ipconfig command at the host.

    • B.

      Use the ipconfig/all command at the destination.

    • C.

      Use the tracert command at the host.

    • D.

      Use the ping command at the destination.

    Correct Answer
    C. Use the tracert command at the host.
    Explanation
    Using the tracert command at the host will help identify the path between the hosts. The tracert command (traceroute) is a network diagnostic tool that tracks the route taken by packets from the source host to the destination host. It provides a list of all the routers (hops) that the packets pass through, allowing the user to identify the path and any potential issues or delays along the way.

    Rate this question:

  • 12. 

    Refer to the exhibit. The diagram represents the process of sending e-mail between clients. Which list correctly identifies the component or protocol used at each numbered stage of the diagram?

    • A.

      1.MUA 2.MDA 3.MTA 4.SMTP 5.MTA 6.POP 7.MDA 8.MUA

    • B.

      1.MUA 2.POP 3.MDA 4.SMTP 5.MTA 6.MDA 7.SMTP 8.MUA

    • C.

      1.MUA 2.POP 3.SMTP 4.MDA 5.MTA 6.SMTP 7.POP 8.MUA

    • D.

      1.MUA 2.SMTP 3.MTA 4.SMTP 5.MTA 6.MDA 7.POP 8.MUA

    Correct Answer
    D. 1.MUA 2.SMTP 3.MTA 4.SMTP 5.MTA 6.MDA 7.POP 8.MUA
    Explanation
    The correct answer is 1.MUA 2.SMTP 3.MTA 4.SMTP 5.MTA 6.MDA 7.POP 8.MUA. This answer correctly identifies the components or protocols used at each stage of the diagram. The process starts with the Mail User Agent (MUA) composing the email. The email is then sent to the Mail Transfer Agent (MTA) using the Simple Mail Transfer Protocol (SMTP). The MTA then forwards the email to another MTA using SMTP. The email is then received by the Mail Delivery Agent (MDA) and stored. The recipient can access the email using the Post Office Protocol (POP). Finally, the email is retrieved by the MUA for the recipient to read.

    Rate this question:

  • 13. 

    Refer to the exhibit. The router of the company failed and was replaced. After the replacement, hosts C and D in the Education office are able to ping each other, but they are unable to access the hosts in the Accounts office. What is the likely cause of the problem?

    • A.

      The IP address at the fa0/0 interface of the router is incorrectly configured.

    • B.

      The subnet mask at the fa0/1 interface of the router is incorrectly entered.

    • C.

      The IP address at the serial interface of the router is incorrectly configured.

    • D.

      The hosts in the Accounts office are not on the same subnet as the hosts in the Education office.

    Correct Answer
    B. The subnet mask at the fa0/1 interface of the router is incorrectly entered.
    Explanation
    The likely cause of the problem is that the subnet mask at the fa0/1 interface of the router is incorrectly entered. This means that the hosts in the Accounts office and the hosts in the Education office are not on the same subnet. As a result, they are unable to communicate with each other.

    Rate this question:

  • 14. 

    Refer to the exhibit. Host A and B are unable to communicate with each other. What is the reason for this?

    • A.

      Host A is assigned a network address.

    • B.

      Host B is assigned a multicast address.

    • C.

      Host A and host B belong to different networks.

    • D.

      The gateway addresses are network addresses.

    Correct Answer
    D. The gateway addresses are network addresses.
    Explanation
    The reason Host A and Host B are unable to communicate with each other is that the gateway addresses are network addresses. In order for hosts on different networks to communicate, they need to use the gateway to route the traffic between the networks. However, if the gateway addresses are also network addresses, it means that there is no specific gateway assigned for routing the traffic. As a result, Host A and Host B are unable to establish a connection and communicate with each other.

    Rate this question:

  • 15. 

    Refer to the exhibit. Host B attempts to establish a TCP/IP session with host C. During this attempt, a frame was captured at the FastEthernet interface fa0/1 of the San Francisco router. The packet inside the captured frame has the source IP address 10.10.1.2, and the destination IP address is 10.31.1.20. What is the destination MAC address of the frame at the time of capture?

    • A.

      0060.7320.D632

    • B.

      0060.7320.D631

    • C.

      0040.8517.44C3

    • D.

      0009.B2E4.EE03

    • E.

      0010.C2B4.342

    Correct Answer
    B. 0060.7320.D631
    Explanation
    The destination MAC address of the frame at the time of capture is 0060.7320.D631.

    Rate this question:

  • 16. 

    Refer to the exhibit. While configuring a network, a technician wired each end of a Category 5e cable as shown. Which two statements are true about this setup? (Choose two.)

    • A.

      The cable is suitable for connecting a switch to a router Ethernet port.

    • B.

      The cable is suitable for connecting dissimilar types of devices.

    • C.

      The cable is unusable and must be rewired.

    • D.

      The cable is terminated in a way that the transmit pin is wired to the receive pin.

    • E.

      The cable simulates a point-to-point WAN link.

    Correct Answer(s)
    A. The cable is suitable for connecting a switch to a router Ethernet port.
    B. The cable is suitable for connecting dissimilar types of devices.
    Explanation
    The given exhibit shows a straight-through wiring configuration for a Category 5e cable. This type of wiring is suitable for connecting a switch to a router Ethernet port, as both devices use the same wiring standard. Additionally, this type of cable can also be used to connect dissimilar types of devices, such as a switch to a computer or a router to a server. Therefore, the statements "The cable is suitable for connecting a switch to a router Ethernet port" and "The cable is suitable for connecting dissimilar types of devices" are both true.

    Rate this question:

  • 17. 

    Refer to the exhibit. Host A sends a frame with the destination MAC address as FFFF.FFFF.FFFF. What action will the switch take for this frame?

    • A.

      It will drop the frame.

    • B.

      It will send the frame back to host A.

    • C.

      It will send the frame to all hosts except host A.

    • D.

      It will forward the frame to the default gateway.

    Correct Answer
    C. It will send the frame to all hosts except host A.
    Explanation
    When the switch receives a frame with the destination MAC address as FFFF.FFFF.FFFF, it recognizes this as a broadcast address. In this case, the switch will forward the frame to all hosts connected to it, except for the host that originally sent the frame (host A). This is because broadcast frames are meant to be received by all hosts on the network.

    Rate this question:

  • 18. 

    Well-known services and applications use which range of TCP/UDP port numbers?

    • A.

      0 to 255

    • B.

      0 to 1023

    • C.

      1024 to 49151

    • D.

      49152 to 65535

    Correct Answer
    B. 0 to 1023
    Explanation
    Well-known services and applications typically use the range of TCP/UDP port numbers from 0 to 1023. These ports are also known as "well-known ports" and are reserved for specific services such as HTTP (port 80), HTTPS (port 443), FTP (port 21), SSH (port 22), and many others. These ports are commonly used by widely recognized protocols and applications, making them easily identifiable and accessible.

    Rate this question:

  • 19. 

    Which three IPv4 addresses represent subnet broadcast addresses? (Choose three.)

    • A.

      192.168.4.63 /26

    • B.

      192.168.4.129 /26

    • C.

      192.168.4.191 /26

    • D.

      192.168.4.51 /27

    • E.

      192.168.4.95 /27

    • F.

      192.168.4.221 /27

    Correct Answer(s)
    A. 192.168.4.63 /26
    C. 192.168.4.191 /26
    E. 192.168.4.95 /27
    Explanation
    The subnet broadcast address is the highest address in a subnet, which is used to send a broadcast message to all devices within that subnet. In this case, the subnet mask is /26 and /27. The three addresses that represent subnet broadcast addresses are 192.168.4.63, 192.168.4.191, and 192.168.4.95. These addresses have all the host bits set to 1, indicating that they are broadcast addresses within their respective subnets.

    Rate this question:

  • 20. 

    Which three statements are true about network layer addressing? (Choose three.)

    • A.

      The addresses are 48 bits long.

    • B.

      Network layer addressing is used by Ethernet switches to make forwarding decisions.

    • C.

      It uses a hierarchical structure.

    • D.

      It does not support broadcasts.

    • E.

      It uniquely identifies each host.

    • F.

      A portion of the address is used to identify the network.

    Correct Answer(s)
    C. It uses a hierarchical structure.
    E. It uniquely identifies each host.
    F. A portion of the address is used to identify the network.
    Explanation
    Network layer addressing uses a hierarchical structure, where addresses are divided into network and host portions. This allows for efficient routing and organization of networks. Additionally, network layer addressing uniquely identifies each host, ensuring that there are no duplicate addresses within a network. A portion of the address is also used to identify the network, allowing for proper routing and delivery of data packets.

    Rate this question:

  • 21. 

    Which OSI layer addressing is required to route packets between two networks?

    • A.

      Layer 1

    • B.

      Layer 2

    • C.

      Layer 3

    • D.

      Layer 4

    Correct Answer
    C. Layer 3
    Explanation
    Layer 3 addressing is required to route packets between two networks. This layer is known as the network layer in the OSI model and is responsible for logical addressing and routing of packets. It uses IP (Internet Protocol) addresses to identify and route packets across different networks. Layer 3 devices, such as routers, use this addressing information to determine the best path for forwarding packets from the source network to the destination network.

    Rate this question:

  • 22. 

    What type of network is maintained if a server takes no dedicated role in the network?

    • A.

      Mainframe

    • B.

      Client/server

    • C.

      Peer-to-peer

    • D.

      Centralized

    Correct Answer
    C. Peer-to-peer
    Explanation
    If a server takes no dedicated role in the network, it implies that it is not acting as a central point of control or authority. In a peer-to-peer network, all devices or nodes have equal roles and can act as both clients and servers. This means that each device can share resources and communicate directly with other devices without the need for a central server. Therefore, the correct answer is peer-to-peer.

    Rate this question:

  • 23. 

    Refer to the exhibit. Host A is requesting a web page from the web server. Which option represents the socket to which the request is made?

    • A.

      80

    • B.

      Www.cisco.com

    • C.

      10.0.0.130

    • D.

      10.0.0.130:80

    Correct Answer
    D. 10.0.0.130:80
    Explanation
    The correct answer is 10.0.0.130:80. In this scenario, the web server is located at IP address 10.0.0.130 and is listening on port 80. When Host A requests a web page, it will send the request to the specific IP address and port number combination, which in this case is 10.0.0.130:80. This allows the request to be properly routed to the correct destination on the network.

    Rate this question:

  • 24. 

    A routing issue has occurred in your internetwork. Which of the following type of devices should be examined to isolate this error?

    • A.

      Access point

    • B.

      Host

    • C.

      Hub

    • D.

      Router

    • E.

      Switch

    Correct Answer
    D. Router
    Explanation
    To isolate a routing issue in an internetwork, the device that should be examined is a router. Routers are responsible for directing network traffic between different networks, and if there is a routing issue, it is likely that the problem lies within the router's configuration or functionality. By examining the router, one can identify any misconfigurations or malfunctions that are causing the routing issue and take appropriate actions to resolve it.

    Rate this question:

  • 25. 

    Which statement describes the correct use of addresses to deliver an e-mail message from HostB to the e-mail service that is running on ServerA?

    • A.

      HostB uses the MAC address of ServerA as the destination.

    • B.

      Router B uses a Layer 3 network address to route the packet.

    • C.

      Router A uses the Layer 4 address to forward the packet to Router B.

    • D.

      Via the use of a Layer 3 address, ServerA assigns the message to the e-mail service.

    Correct Answer
    B. Router B uses a Layer 3 network address to route the packet.
    Explanation
    In order to deliver an email message from HostB to the email service running on ServerA, Router B uses a Layer 3 network address to route the packet. Layer 3 addresses, such as IP addresses, are used for routing packets across networks. The MAC address is used at the data link layer for communication within a local network. Router A does not forward the packet to Router B, so the statement about using the Layer 4 address is incorrect. The statement about ServerA assigning the message to the email service via a Layer 3 address is not mentioned in the question.

    Rate this question:

  • 26. 

    Refer to the exhibit. Host A is configured with the correct IP address for the default gateway of the router R1 FastEthernet0/1 interface. How will a packet that is sent from host A to host B be handled by the devices on the network?

    • A.

      R1 will drop the packet because R1 does not have a specific route in its routing table to the 10.1.1.0/24 network.

    • B.

      R1 will forward the packet to its default gateway, the next hop router R2. R2 will forward the packet to the directly connected network 10.1.1.0/24.

    • C.

      R1 will forward the packet to its default gateway, the next hop router R2. R2 will drop the packet because it does not have a default route to network 10.1.1.0/24.

    • D.

      R1 will forward the packet to its default gateway, the next hop router R2. R2 will drop the packet because it does not have a route that is learned by a routing protocol to network 10.1.1.0/24.

    Correct Answer
    B. R1 will forward the packet to its default gateway, the next hop router R2. R2 will forward the packet to the directly connected network 10.1.1.0/24.
    Explanation
    The correct answer states that R1 will forward the packet to its default gateway, which is the next hop router R2. R2 will then forward the packet to the directly connected network 10.1.1.0/24. This means that R1 does not have a specific route in its routing table to the 10.1.1.0/24 network, but it knows that its default gateway is R2. R1 will send the packet to R2, and R2 will know how to reach the destination network since it is directly connected to it. Therefore, the packet will be successfully delivered to host B.

    Rate this question:

  • 27. 

    Which option correctly identifies the interface or interfaces used to connect the router to a CSU/DSU for WAN connectivity?

    Correct Answer
    D.
    Explanation
    The correct answer is "Serial interface." Serial interfaces are commonly used to connect routers to CSU/DSU (Channel Service Unit/Data Service Unit) for WAN (Wide Area Network) connectivity. CSU/DSU is responsible for converting digital data from the router into a format suitable for transmission over the WAN. By connecting the router to the CSU/DSU via a serial interface, the router can communicate with the CSU/DSU and establish a connection to the WAN.

    Rate this question:

  • 28. 

    Refer to the exhibit. Host A is unable to reach host B on the remote network. A technician attempted to ping the local gateway and the ping was successful. To verify the host configuration, the technician issued the ipconfig command. What is the likely cause of the problem?

    • A.

      The local NIC is incorrectly configured.

    • B.

      The subnet mask on host A is incorrectly configured.

    • C.

      The IP address on host A is incorrectly configured.

    • D.

      The default gateway on host A is incorrectly configured.

    Correct Answer
    D. The default gateway on host A is incorrectly configured.
    Explanation
    The likely cause of the problem is that the default gateway on host A is incorrectly configured. The fact that the technician was able to ping the local gateway successfully indicates that the local network configuration is correct. However, since host A is unable to reach host B on the remote network, it suggests that the issue lies with the default gateway. The default gateway is responsible for routing traffic from the local network to remote networks, so if it is configured incorrectly, host A will not be able to reach host B on the remote network.

    Rate this question:

  • 29. 

    A network administrator is configuring several switches for a network. The switches have similar configurations and only minor differences. The administrator wants to save all commands that are issued on the first switch to a text file for editing. Which transfer option should be selected in HyperTerminal?

    Correct Answer
    C.
    Explanation
    The transfer option that should be selected in HyperTerminal is "Capture Text". This option allows the network administrator to save all commands that are issued on the first switch to a text file, which can then be edited. By selecting this option, the administrator can easily transfer the commands to the text file for future reference or troubleshooting purposes.

    Rate this question:

  • 30. 

    How many host addresses may be assigned when using the 128.107.0.0 network address with a subnet mask of 255.255.248.0?

    • A.

      30

    • B.

      256

    • C.

      2046

    • D.

      2048

    • E.

      4094

    • F.

      4096

    Correct Answer
    C. 2046
    Explanation
    The given network address is 128.107.0.0 with a subnet mask of 255.255.248.0. This subnet mask allows for 11 bits to be used for host addresses. With 11 bits, there are 2^11 - 2 = 2046 possible host addresses. The subtraction of 2 is because the first address is reserved for the network address and the last address is reserved for the broadcast address. Therefore, 2046 host addresses may be assigned in this network.

    Rate this question:

  • 31. 

    Which application layer protocol allows administrators to log into a server from remote locations and control a server as though logged in locally?

    • A.

      DNS

    • B.

      FTP

    • C.

      DHCP

    • D.

      SMTP

    • E.

      Telnet

    Correct Answer
    E. Telnet
    Explanation
    Telnet is the correct answer because it is an application layer protocol that allows administrators to remotely log into a server and control it as if they were physically present. It provides a command-line interface for managing the server, allowing administrators to execute commands and perform administrative tasks from a remote location. Telnet is commonly used for remote administration and troubleshooting purposes.

    Rate this question:

  • 32. 

    During the encapsulation process, what is the PDU of the internet layer?

    • A.

      Bit

    • B.

      Data

    • C.

      Frame

    • D.

      Packet

    • E.

      Segment

    Correct Answer
    D. Packet
    Explanation
    During the encapsulation process, the PDU (Protocol Data Unit) of the internet layer is a packet. A packet is a unit of data that is transmitted over a network and contains the necessary information for routing and delivery. It includes the data being transmitted along with the necessary header and footer information. The internet layer is responsible for addressing and routing packets across different networks, and the encapsulation process involves adding the necessary headers and trailers to the data to form a packet.

    Rate this question:

  • 33. 

    Which service is used when the nslookup command is issued on a computer?

    • A.

      FTP

    • B.

      DNS

    • C.

      DHCP

    • D.

      Telnet

    Correct Answer
    B. DNS
    Explanation
    When the nslookup command is issued on a computer, it is used to query the DNS (Domain Name System) service. The nslookup command allows the user to retrieve information about domain names, such as IP addresses associated with a domain name or the mail exchange servers for a domain. Therefore, the correct answer is DNS.

    Rate this question:

  • 34. 

    Refer to the exhibit. A network technician creates equal-sized subnets of network 192.168.2.0/24 using the subnet mask 255.255.255.224. If the technician wishes to calculate the number of host addresses in each subnet by using the formula that is shown in the exhibit, what value will be used for n?

    • A.

      1

    • B.

      2

    • C.

      3

    • D.

      4

    • E.

      5

    Correct Answer
    E. 5
    Explanation
    The formula shown in the exhibit is "2^n - 2". This formula is used to calculate the number of host addresses in each subnet. Since the network technician wants to calculate the number of host addresses in each subnet of network 192.168.2.0/24, they will use the formula "2^n - 2". In this case, the value of n is 5, which means that the formula will be "2^5 - 2". Hence, the correct answer is 5.

    Rate this question:

  • 35. 

    What are the default terminal emulation software settings when configuring a Cisco device through a console port?

    • A.

      Bits per second: 19200 Data bits: 7 Parity: None Stop bits: 0 Flow control: None

    • B.

      Bits per second: 9600 Data bits: 8 Parity: None Stop bits: 1 Flow control: None

    • C.

      Bits per second: 19200 Data bits: 7 Parity: None Stop bits: 0 Flow control: Hardware

    • D.

      Bits per second: 9600 Data bits: 8 Parity: None Stop bits: 1 Flow control: Hardware

    Correct Answer
    B. Bits per second: 9600 Data bits: 8 Parity: None Stop bits: 1 Flow control: None
    Explanation
    The correct answer is Bits per second: 9600, Data bits: 8, Parity: None, Stop bits: 1, Flow control: None. This is the default terminal emulation software settings when configuring a Cisco device through a console port.

    Rate this question:

  • 36. 

    In a packet-switched data network, what is used to reassemble the packets in the correct order at the destination device?

    • A.

      Source address

    • B.

      Sequence number

    • C.

      Priority assignment

    • D.

      Destination address

    Correct Answer
    B. Sequence number
    Explanation
    In a packet-switched data network, sequence numbers are used to reassemble the packets in the correct order at the destination device. Each packet is assigned a unique sequence number, allowing the receiving device to arrange the packets in the correct order based on these numbers. This ensures that the data is reconstructed accurately and in the intended order at the destination device.

    Rate this question:

  • 37. 

    Refer to the exhibit. A network administrator tries to test the connectivity between routers R1 and R2, but the attempt to ping is unsuccessful. Based on the show ip interface brief command outputs, what could be the possible cause of the problem?

    • A.

      Interface S0/0/0 on router R1 is shut down.

    • B.

      Interface S0/0/0 on router R1 is configured with an incorrect IP address.

    • C.

      Interface S0/0/0 on router R2 is administratively down.

    • D.

      Interface S0/0/0 on router R2 does not have the clock rate settings configured.

    Correct Answer
    B. Interface S0/0/0 on router R1 is configured with an incorrect IP address.
    Explanation
    The possible cause of the problem is that the interface S0/0/0 on router R1 is configured with an incorrect IP address. This could result in the unsuccessful ping attempt as the routers would not be able to communicate with each other due to the mismatch in IP addresses.

    Rate this question:

  • 38. 

    Which router configuration mode will require user authentication if an administrator issues the enable secret command?

    • A.

      User executive mode

    • B.

      Privileged executive mode

    • C.

      Global configuration mode

    • D.

      Service specific configuration mode

    Correct Answer
    B. Privileged executive mode
    Explanation
    Privileged executive mode is the correct answer because this mode allows access to all router commands and features. When the enable secret command is issued in this mode, it sets a password that is required to enter privileged mode, ensuring user authentication. In contrast, user executive mode only allows access to basic monitoring and troubleshooting commands, global configuration mode is used for configuring global settings, and service-specific configuration mode is used for configuring specific services on the router.

    Rate this question:

  • 39. 

    Which location of router memory is cleared with the erase startup-config command?

    • A.

      Flash

    • B.

      RAM

    • C.

      ROM

    • D.

      NVRAM

    Correct Answer
    D. NVRAM
    Explanation
    The erase startup-config command clears the configuration file stored in NVRAM (non-volatile random-access memory) of a router. NVRAM is a type of memory that retains its data even when the power is turned off. By erasing the startup-config file in NVRAM, all the configuration settings of the router are reset to their default values. This allows the router to start with a clean slate and removes any previous configurations that may have been causing issues or conflicts.

    Rate this question:

  • 40. 

    Which subnet mask should be used for a Class B network that is divided into subnets and will accommodate between 800 hosts and 1000 hosts?

    • A.

      255.255.255.0

    • B.

      255.255.254.0

    • C.

      255.255.252.0

    • D.

      255.255.248.0

    • E.

      255.255.240.0

    Correct Answer
    C. 255.255.252.0
    Explanation
    The subnet mask 255.255.252.0 should be used for a Class B network that is divided into subnets and will accommodate between 800 hosts and 1000 hosts. This subnet mask provides a total of 1024 IP addresses, which is sufficient to accommodate the required number of hosts.

    Rate this question:

  • 41. 

    Which two programs can be used to accomplish terminal emulation for configuring a router from the CLI through the console port? (Choose two.)

    • A.

      HyperTerminal

    • B.

      Internet Explorer

    • C.

      Minicom

    • D.

      Secure Shell

    • E.

      Telnet

    Correct Answer(s)
    A. HyperTerminal
    C. Minicom
    Explanation
    HyperTerminal and Minicom can be used to accomplish terminal emulation for configuring a router from the CLI through the console port. HyperTerminal is a Windows-based program that allows users to connect to other computers, devices, or network equipment using various communication protocols. It provides a terminal emulation feature that allows users to access the command-line interface (CLI) of a router through the console port. Minicom, on the other hand, is a Linux-based program that also provides terminal emulation capabilities. It allows users to connect to routers and other devices through the console port and access the CLI for configuration purposes.

    Rate this question:

  • 42. 

    Refer to the exhibit. The network containing router B is experiencing problems. A network associate has isolated the issue in this network to router B. What action can be preformed to correct the network issue?

    • A.

      Issue the clock rate command on interface Serial 0/0/0

    • B.

      Issue the description command on interface Serial 0/0/1

    • C.

      Issue the ip address command on interface FastEthernet 0/0

    • D.

      Issue the no shutdown command on interface FastEthernet 0/1

    Correct Answer
    D. Issue the no shutdown command on interface FastEthernet 0/1
    Explanation
    The correct answer is to issue the "no shutdown" command on interface FastEthernet 0/1. This command will enable the interface and bring it out of the administratively down state, which could be causing the network issue. By enabling the interface, it allows for communication and connectivity to be restored.

    Rate this question:

  • 43. 

    Refer to the exhibit. A web browser running on host PC1 sends a request for a web page to the web server with an IP address 192.168.1.254/24. What sequence of steps will follow in order to establish the session before data can be exchanged?

    • A.

      The session will be initiated using UDP. No additional acknowledgment will be required to establish the session.

    • B.

      The session will be initiated using TCP. No additional acknowledgment will be required to establish the session.

    • C.

      The session will be initiated using UDP. The returned web page will serve as an acknowledgment for session establishment.

    • D.

      The session will be initiated using TCP. A three-way handshake must be successfully completed before the session is established.

    Correct Answer
    D. The session will be initiated using TCP. A three-way handshake must be successfully completed before the session is established.
    Explanation
    The correct answer is that the session will be initiated using TCP, and a three-way handshake must be successfully completed before the session is established. This means that the web browser on host PC1 will send a SYN (synchronize) packet to the web server with the IP address 192.168.1.254/24. The web server will then respond with a SYN-ACK (synchronize-acknowledgment) packet to acknowledge the request. Finally, the web browser will send an ACK (acknowledgment) packet to confirm the establishment of the session. This three-way handshake ensures that both the client and server agree to establish a reliable connection before any data can be exchanged.

    Rate this question:

  • 44. 

    Which prompt is associated with the privileged exec mode?

    • A.

      R1>

    • B.

      R1#

    • C.

      R1(config)#

    • D.

      R1(config-router)#

    Correct Answer
    B. R1#
    Explanation
    The prompt "R1#" is associated with the privileged exec mode. This mode allows the user to access all the available commands on the device and make configuration changes. The "#" symbol indicates that the user has administrative privileges and can execute privileged commands.

    Rate this question:

  • 45. 

    A user sees the command prompt: Router(config-if)# . What task can be performed at this mode?

    • A.

      Reload the device.

    • B.

      Perform basic tests.

    • C.

      Configure individual interfaces.

    • D.

      Configure individual terminal lines.

    Correct Answer
    C. Configure individual interfaces.
    Explanation
    At the "Router(config-if)#" mode, the user can configure individual interfaces. This mode allows the user to make specific changes and settings to each interface on the router. It is used to configure parameters such as IP address, subnet mask, and other interface-specific settings. The "config-if" mode is specifically designed for interface configuration, making it the correct task that can be performed at this mode.

    Rate this question:

  • 46. 

    Refer to the exhibit. Interface Fa0/0 on router A is generating excessive broadcast traffic. Which LAN segments will affected by the excessive broadcasts?

    • A.

      Only the 192.168.1.200/30 network will be affected.

    • B.

      Only the link between 192.168.1.201 and port Fa0/5 on SW1 will be affected.

    • C.

      Both the 192.168.1.200/30 and 192.168.1.204/30 networks will be affected.

    • D.

      Only the links between 192.168.1.201 and port Fa0/7 on SW2 will be affected.

    Correct Answer
    A. Only the 192.168.1.200/30 network will be affected.
    Explanation
    The excessive broadcast traffic generated by Interface Fa0/0 on router A will only affect the 192.168.1.200/30 network.

    Rate this question:

  • 47. 

    What is the effect of using the Router# copy running-config startup-config command on a router?

    • A.

      The contents of ROM will change.

    • B.

      The contents of RAM will change.

    • C.

      The contents of NVRAM will change.

    • D.

      The contents of flash will change.

    Correct Answer
    C. The contents of NVRAM will change.
    Explanation
    The "copy running-config startup-config" command is used to save the current running configuration of a router to non-volatile RAM (NVRAM), which is a type of memory that retains data even when the router is powered off or restarted. By using this command, the configuration changes made in the running-config are permanently saved in NVRAM, ensuring that the router will boot up with the same configuration in the future. Therefore, the correct answer is that the contents of NVRAM will change.

    Rate this question:

  • 48. 

    Which option represents a point-to-point logical topology diagram?

    Correct Answer
    D.
    Explanation
    A point-to-point logical topology diagram represents a network configuration where each device is connected directly to another device using a dedicated link. This type of diagram is commonly used in telecommunications and computer networks to illustrate connections between devices such as routers, switches, and servers. It shows a direct link between two endpoints without any intermediate devices or connections. This diagram is useful for visualizing the direct communication paths in a network and understanding the flow of data between devices.

    Rate this question:

  • 49. 

    In a network design project, a network designer needs to select a device to provide collision free connections to 40 hosts on the LAN. Which device should be selected?

    • A.

      Hub

    • B.

      Router

    • C.

      Switch

    • D.

      Firewall

    Correct Answer
    C. Switch
    Explanation
    A switch should be selected to provide collision free connections to 40 hosts on the LAN. Unlike a hub, a switch can create separate collision domains for each connected device, thereby reducing collisions and improving network performance. A router is used to connect different networks, while a firewall is used for network security. Therefore, a switch is the most suitable device for this scenario.

    Rate this question:

  • 50. 

    Which communication tool allows real-time collaboration?

    • A.

      Wiki

    • B.

      E-mail

    • C.

      Weblog

    • D.

      Instant messaging

    Correct Answer
    D. Instant messaging
    Explanation
    Instant messaging allows real-time collaboration because it allows users to send and receive messages instantly, facilitating quick and immediate communication between individuals or groups. Unlike other communication tools like email or weblogs, instant messaging provides a platform for instant back-and-forth communication, enabling real-time discussions, file sharing, and even video calls. This makes it an effective tool for collaboration, especially in situations where quick decision-making and immediate responses are required.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 21, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Sep 05, 2014
    Quiz Created by
    Jeff_ery
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.