CCNA 1 Final Exam

 

What is a characteristic of a fault tolerant network?

 

2

Three bank employees are using the corporate network.

The first employee uses a web browser to view a company

web page in order to read some announcements. The

second employee accesses the corporate database to

perform some financial transactions. The third employee

participates in an important live audio conference with

other corporate managers in branch offices. If QoS is

implemented on this network, what will be the priorities

from highest to lowest of the different data types?

 

3

What is a benefit of using cloud computing in

networking?

 

4

What is the function of the shell in an OS?

 

5

Which connection provides a secure CLI session with

encryption to a Cisco switch?

 

6

A network technician is attempting to configure an

interface by entering the following command:

SanJose(config)# ip address 192.168.2.1 255.255.255.0. The

command is rejected by the device. What is the reason for

this?

 

7

An administrator uses the Ctrl-Shift-6 key combination

on a switch after issuing the ping command. What is the

purpose of using these keystrokes?

 

8

Refer to the exhibit. A network administrator is

configuring access control to switch SW1. If the

administrator uses a console connection to connect to the

switch, which password is needed to access user EXEC

mode?

 

8

Refer to the exhibit. A network administrator is

configuring access control to switch SW1. If the

administrator uses a console connection to connect to the

switch, which password is needed to access user EXEC

mode?

 

10

What protocol is responsible for controlling the size of

segments and the rate at which segments are exchanged

between a web client and a web server?

 

11

What is an advantage to using a protocol that is defined

by an open standard?

 

12

What are two benefits of using a layered network

model? (Choose two.)

 

13

Which two OSI model layers have the same

functionality as two layers of the TCP/IP model? (Choose

two.)

 

14

Which name is assigned to the transport layer PDU?

 

15

A network engineer is measuring the transfer of bits

across the company backbone for a mission critical  

database application. The engineer notices that the

network throughput appears lower than the bandwidth

expected. Which three factors could influence the

differences in throughput? (Choose three.)

 

16

A network administrator is troubleshooting

connectivity issues on a server

. Using a tester

, the

administrator notices that the signals generated by the

server NIC are distorted and not usable. In which layer of

the OSI model is the error categorized?

 

17

Which type of UTP cable is used to connect a PC to a

switch port?

 

18

A network administrator is measuring the transfer of

bits across the company backbone for a mission critical

financial application. The administrator notices that the

network throughput appears lower than the bandwidth

expected. Which three factors could influence the

differences in throughput? (Choose three.)

 

19

What is a characteristic of UTP cabling?

 

20

What are two characteristics of fiber-optic cable?

(Choose two.)

 

21

What is a characteristic of the LLC sublayer?

 

22

A network team is comparing physical W

AN topologies

for connecting remote sites to a headquarters building.

Which topology provides high availability and connects

some, but not all, remote sites?

 

23

What method is used to manage contention-based

access on a wireless network?

 

24

What are the three primary functions provided by Layer

2 data encapsulation? (Choose three.)

 

25

What will a host on an Ethernet network do if it receives

a frame with a destination MAC address that does not

match its own MAC address?

 

26

What are two examples of the cut-through switching

method? (Choose two.)

 

27

What are two actions performed by a Cisco switch?

(Choose two.)

 

28

Which frame forwarding method receives the entire

frame and performs a CRC check to detect errors before

forwarding the frame?

 

29

Refer to the exhibit. If host A sends an IP packet to host

B, what will the destination address be in the frame when it

leaves host A?

 

30

What addresses are mapped by ARP?

 

168

In what networking model would eDonkey

, eMule,

BitT

orrent, Bitcoin, and LionShare be used?

 

Looking for a Similar Assignment? Let us take care of your classwork while you enjoy your free time! All papers are written from scratch and are 100% Original. Try us today!