Download - Jarkom CCNA Exam
-
7/28/2019 Jarkom CCNA Exam
1/29
1. What combination of IP address and wildcard
mask should be used to specify only the last 8addresses in the subnet
192.168.3.32/28? 192.168.3.32 0.0.0.7 192.168.3.32 0.0.0.15 192.168.3.40 0.0.0.7 192.168.3.40 0.0.0.15
2. Excessive broadcasts are generally a symptom ofa problem at which layer?
physical data link network transport
3. Refer to the exhibit. Which three pieces ofinformation can be determined by analyzing the
output shown? (Choose three.)
A carrier detect signal is present. Keepalives are being received successfully. Default encapsulation is used on this serial
link.
Packets passing this interface cannot exceed1 KB in size.
The reliability of this link is very low. The LCP negotiation phase is complete.
4. A network administratorhas received
complaints that users on a local LAN can retrieve
e-mail from a remote e-mail server but are
unable to open web pages on the same server.Services at which two layers of the OSI modelshould be investigated during the troubleshootingprocess? (Choose two.)
physical layer data link layer network layer transport layer application layer
6. Encapsulation errors from mismatched WAN
protocols on a serial link between two routers
indicate a problem at which OSI layer?physicaldata linknetworktransport
9. Users are complaining of very long wait times toaccess resources on the network. The show
interface command reveals collision counts farabove the network baseline. At which OSI layershould the administrator begin troubleshooting?
application
transportnetworkdata linkphysical
10.
Refer to the exhibit. Users on the Internal LAN areunable to connect to the www server. The networkadministrator pings the server and verifies that NATis functioning correctly. Which OSI layer should theadministrator begin to troubleshoot next?
physical data link network application
11. Which two statements are true concerninglogical networking models? (Choose two.)TCP/IP splits the lowest layer of the OSI model intotwo separate layers.
The top layer of the TCP/IP modelcombines the functions of the top three OSIlayers.
Troubleshooting with the TCP/IP modelrequires different techniques than with theOSI model.
The network access layer is responsible forexchanging packets between devices on aTCP/IP network.
The Internet layer provides communicationbetween applications, such as FTP, HTTP,and SMTP on separate hosts.
The TCP/IP network access layercorresponds to the OSI physical and datalink layers.
13. What is one example of a physical layerproblem?incorrect encapsulationincorrect STP configurationincorrect ARP mapping
incorrect clock rate
17. Which two pieces of information are typicallyfound on a logical network diagram? (Choose two.)cable typesconnector typesinterface identifiersDLCI for virtual circuitsoperating system versions
18.
http://ccnaanswers.com/wp-content/uploads/CCNA1FinalExamV4.0Answers2.jpghttp://ccnaanswers.com/wp-content/uploads/CCNAExploration4Chapter8Answers.jpghttp://ccnaanswers.com/wp-content/uploads/CCNA1FinalExamV4.0Answers2.jpghttp://ccnaanswers.com/wp-content/uploads/CCNAExploration4Chapter8Answers.jpg -
7/28/2019 Jarkom CCNA Exam
2/29
Refer to the exhibit. Each media link is labeled.
What type of cable should be used to connect thedifferent devices?
Connection 1rollover cableConnection 2straight-through cableConnection 3crossover cable
Connection 1crossover cableConnection 2rollover cable
Connection 3crossover cable
Connection 1straight-through cableConnection 2crossover cableConnection 3crossover cable
Connection 1straight-through cableConnection 2crossover cableConnection 3straight-through cable
Connection 1crossover cableConnection 2straight-through cableConnection 3crossover cable
5.
Refer to the exhibit. What function does routerRT_A need to provide to allow Internet access forhosts in this network?address translationDHCP services
ftpd
web server
6. When connectionless protocols are implementedat the lower layers of the OSI model, what is usuallyused to acknowledge that the data was received andto request the retransmission of missing data?
IP UDP Ethernet a connectionless acknowledgement an upper-layer, connection-oriented protocol
or service
9. What is true regarding network layer addressing?(Choose three)
uses a flat structure prevent broadcasts heirarchical uniquely identifies each host 48 bits in length contains a network portion
15. Which combination of network id and subnet
mask correctly identifies all IP addresses from172.16.128.0 through
172.16.159.255? 172.16.128.0 255.255.255.224
172.16.128.0 255.255.0.0 172.16.128.0 255.255.192.0 172.16.128.0 255.255.224.0 172.16.128.0 255.255.255.192
Refer to the exhibit. The command that is shownwas issued on a PC. What does the IP address192.168.33.2 represent?
IP address of the host default gateway of the host IP address of the homepage for the host primary domain name server for the host IP address of the website
resolver1.mooki.local
22. Which OSI layer does IP rely on to determinewhether packets have been lost and to requestretransmission?
application presentation session transport
24. The Layer 4 header contains which type ofinformation to aid in the delivery of data?
service port number host logical address device physical address virtual connection identifier
25. As network administrator, what is the subnetmask that allows 510 hosts given the IP address172.30.0.0?
255.255.0.0255.255.248.0255.255.252.0
255.255.254.0255.255.255.0
26. Refer to the exhibit. What is required on host Afor a network technician to create the initialconfiguration on Router1?an FTP clienta Telnet clienta terminal emulation programa web browser
http://ccnaanswers.com/wp-content/uploads/CCNA1FinalExamV4.0Answers15.jpghttp://ccnaanswers.com/wp-content/uploads/CCNA1FinalExamV4.0Answers15.jpghttp://ccnaanswers.com/wp-content/uploads/CCNA1FinalExamV4.0Answers11.jpghttp://ccnaanswers.com/wp-content/uploads/CCNA1FinalExamV4.0Answers3.jpghttp://ccnaanswers.com/wp-content/uploads/CCNA1FinalExamV4.0Answers15.jpghttp://ccnaanswers.com/wp-content/uploads/CCNA1FinalExamV4.0Answers11.jpghttp://ccnaanswers.com/wp-content/uploads/CCNA1FinalExamV4.0Answers3.jpghttp://ccnaanswers.com/wp-content/uploads/CCNA1FinalExamV4.0Answers15.jpghttp://ccnaanswers.com/wp-content/uploads/CCNA1FinalExamV4.0Answers11.jpghttp://ccnaanswers.com/wp-content/uploads/CCNA1FinalExamV4.0Answers3.jpg -
7/28/2019 Jarkom CCNA Exam
3/29
-
7/28/2019 Jarkom CCNA Exam
4/29
40. Which two functions of the OSI model occur at
layer two? (Choose two.)
physical addressing encoding routing cabling media access control
42. Which range of port numbers are reserved for
services that are commonly used by applications thatrun on servers?
0 to 255 0 to 1023 1024 to 49151 49152 to 65535
43.
Refer to the exhibit. What three statements are trueabout the IP configuration that is shown? (Choosethree.)
The address that is assigned to the computerrepresents private addressing.
The computer is unable to communicateoutside of the local network.
The network of this computer can have 126hosts.
The prefix of the computer address is /27. The IP address that is assigned to the
computer is routable on the Internet.
The IP address that is assigned to thecomputer is a broadcast address.
44.
Refer to the exhibit. A network administratorremotely accesses the CLI of RouterB from PC1using Telnet. Which statement is true about thisconnection?
The data is automatically encrypted. A Telnet server process is running on PC1. The connection is made through a VTY
session on the router.
A GET request was sent to RouterB toretrieve data during this session.
45. Which three statements characterize thetransport layer protocols? (Choose three.)
TCP and UDP port numbers are used by
application layer protocols.
TCP uses port numbers to provide reliabletransportation of IP packets.
UDP uses windowing and acknowledgments forreliable transfer of data.TCP uses windowing and sequencing to providereliable transfer of data.TCP is a connection-oriented protocol. UDP is a
connectionless protocol.
46. Which of the following are the address ranges ofthe private IP addresses? (Choose three.)
10.0.0.0 to 10.255.255.255 200.100.50.0 to 200.100.25.255 150.150.0.0 to 150.150.255.255 172.16.0.0 to 172.31.255.255 192.168.0.0 to 192.168.255.255 127.16.0.0 to 127.31.255.255
47. Which OSI layers offers reliable, connection-oriented data communication services?
application presentation session transport network
48. Refer to the exhibit. Which logical topology bestdescribes the exhibited network?
starring
point-to-pointmultiaccessmesh
49. During the encapsulation process, which
identifiers are added at the transport layer?
two networks routing the packets two applications communicating the data two hosts at either end of the
communication
two nodes on the local network exchangingthe frame
50. What are two characteristics of the data linklayer? (Choose two.)
It segments and reorders the data. It exchanges the frames between nodes. It defines the method by which network
devices place data onto the media.
It manages the transfer of data between theprocesses that run on each host.
http://ccnaanswers.com/wp-content/uploads/CCNA1FinalExamV4.0Answers25.jpghttp://ccnaanswers.com/wp-content/uploads/CCNA1FinalExamV4.0Answers24.jpghttp://ccnaanswers.com/wp-content/uploads/CCNA1FinalExamV4.0Answers23.jpghttp://ccnaanswers.com/wp-content/uploads/CCNA1FinalExamV4.0Answers25.jpghttp://ccnaanswers.com/wp-content/uploads/CCNA1FinalExamV4.0Answers24.jpghttp://ccnaanswers.com/wp-content/uploads/CCNA1FinalExamV4.0Answers23.jpghttp://ccnaanswers.com/wp-content/uploads/CCNA1FinalExamV4.0Answers25.jpghttp://ccnaanswers.com/wp-content/uploads/CCNA1FinalExamV4.0Answers24.jpghttp://ccnaanswers.com/wp-content/uploads/CCNA1FinalExamV4.0Answers23.jpg -
7/28/2019 Jarkom CCNA Exam
5/29
It retrieves signals from the media andrestores them to their bit representations.
1 .Which port numbers are commonly assigned forFTP use? (Choose two.) 19
20 21
22
2 Which application layer protocol allows networkdevices to exchange management information? SMTP
SNMP FTP TFTP EIGRP
3 FTP provides a reliable, connection-orientedservice for transferring of files. Which transport
layer protocol is used for data transfer when thisservice is being used? TFTP TCP DNS IP UDP
4 TCP is referred to as connection-oriented. Whatdoes this mean? TCP uses only LAN connections.
TCP requires devices to be directly connected. TCP negotiates a session for data transfer betweenhosts. TCP reassembles the data steams in the order thatit is received.
5 What three pieces of information does the
transport layer use to manage the communication ofseparate data streams between hosts? (Choosethree.) port numbers checksum values
authentication keys sequence numbers
encryption algorithms acknowledgment numbers
6 What does the http portion of the URLhttp://www.cisco.com/edu/ communicate to a web
browser? The web browser needs to locate the www server. The address is located on a site whose name is http. The web browser is notified as to which protocol touse.
The http portion represents the type of webbrowser that needs to be used.
7 When the receiving workstation detects an error in
the data it has received, it does not acknowledge
receipt of the data. The source workstationretransmits the unacknowledged data. Which layerof the OSI model supports this process ofretransmission? network application session
transport
8 What are the features of the User DatagramProtocol (UDP). (Choose three.) no guaranteed delivery of datagrams connection-oriented provides reliable full-duplex data transmission reliability provided by the application layer connectionless utilizes sliding windowing techniques
9 Which Application layer protocol is widely used tosupport resolving host names to IP addresses?
FTP SMTP SNMP DNS HTTP
WWW
10 What is the purpose of TCP/UDP port numbers? indicate the beginning of a three-way handshake reassemble the segments into the correct order
identify the number of data packets that may besent without acknowledgment
track different conversations crossing the networkat the same time
11 If an application uses a protocol that exchangesdata without using windowing or flow control and
must rely on higher layer protocols for reliability,which protocol and transfer methods are being used?
UDP, connection-oriented UDP, connectionless TCP, connection-oriented
TCP, connectionless
12 Which protocol is used to transfer files fromcomputer to computer but is consideredconnectionless? FTP TFTP SNMP TCP DHCP
13 Which layer of the OSI model can provide aconnection-oriented, reliable data transfer between
two hosts? Application Presentation Session
-
7/28/2019 Jarkom CCNA Exam
6/29
Transport
14 Which of the following are primary duties of theOSI transport layer? (Choose two.) path determination end-to-end connectivity flow control security control
data representation
encryption of data
15 Which protocol is used by e-mail servers tocommunicate with each other? FTP HTTP TFTP SMTP POPSNMP
. What are two facts about how ARP resolves an IPaddress to a MAC address? (Choose two.) The originating host dynamically issues an arp -acommand to obtain the destination MAC address. The originating host broadcasts an ARP requestpacket and each host in a local network receives thispacket. The originating host dynamically issues an icmpecho request command to obtain the destinationMAC address. The host with the specified destination IP addresssends an ARP reply packet containing its MAC
address back to the originating host. The host with the specified destination IP addresssends an icmp echo reply packet to the originatinghost with its MAC address.
2. Which TCP/IP model layer supports both LANand WAN technologies? network access layer
internet layer transport layer application layer
3. What is the primary responsibility of the transportlayer? allows access to the network media
provides data representation and encoding selects paths through the network for data to travel defines end-to-end connectivity between hostapplications
4. What is the network broadcast address for a ClassC address of 192.168.32.0 with the default subnet
mask? 192.168.0.0
192.168.0.255 192.168.32.0 192.168.32.254
192.168.32.255
5. Which two statements correctly describe the IPaddress 127.0.0.1? (Choose two.) It belongs to the Class A range of addresses. It belongs to the Class B range of addresses. It belongs to the Class C range of addresses. It is reserved for loopback testing. It is reserved for multicast group testing.
It is reserved for unicast testing.
6.
Refer to the exhibit.The small office LAN shown in the exhibit mayeventually be connected to the Internet. Accordingto Cisco best practice, which IP network addresses
should be used? 12.0.0.0 172.0.0.0 172.168.0.0
192.32.17.0 192.168.67.0 225.1.5.0
7. Why is IP considered a best-effort protocol?
IP detects lost packets. IP validates the content of the packets.
IP does not provide acknowledgment of the data
delivery. IP reorders the packet as they arrive at thedestination host.
8. Which three addresses are considered to beprivate addresses? (Choose three.) 10.45.09.23 15.87.234.87 172.32.45.90 172.17.78.98
192.169.89.56 192.168.45.23
9.
Refer to the exhibit. Based on the informationshown, which two statements are true? (Choose
two.) An ARP request must be used to obtain an addressthat is placed in the ARP table. Frames from other hosts in the network to this host
http://bp2.blogger.com/_TY4rWcZRSlU/RtBvdH34MzI/AAAAAAAAAD8/2p8bAg9yB5k/s1600-h/clip_image001.jpghttp://bp2.blogger.com/_TY4rWcZRSlU/RtBu2H34MyI/AAAAAAAAAD0/iumzl6CS0Gs/s1600-h/clip_image001.jpghttp://bp2.blogger.com/_TY4rWcZRSlU/RtBvdH34MzI/AAAAAAAAAD8/2p8bAg9yB5k/s1600-h/clip_image001.jpghttp://bp2.blogger.com/_TY4rWcZRSlU/RtBu2H34MyI/AAAAAAAAAD0/iumzl6CS0Gs/s1600-h/clip_image001.jpg -
7/28/2019 Jarkom CCNA Exam
7/29
will use a destination address of 00-06-25-25-6e-5d.
The only remote locations that can be reached fromthis host are 192.168.1.97 and 192.168.1.254. If a packet is sent to a network device other than192.168.1.97 and 192.168.1.254, an ARP requestmust be used. If the computer with the IP address of 192.168.1.94sends a packet to the device with the IP address
192.168.1.97, no ARP request is required.
10.
Refer to the exhibit. Which devices arerecommended to have the IP addresses manuallyconfigured? PC1 and PC2
all servers only PC2 Laptop all hosts and all servers
11. Why were private IP addresses developed?
to permit dynamic assignment of IP addresses to permit the duplication of public IP addresses
to minimize the utilization of reserved IP addresses
to permit public IP addresses to be used in privatenetworks to address the issue of not enough available publicIP addresses
12. Which subnet mask would be assigned to thenetwork address of 192.168.32.0 to provide 254useable host addresses per subnetwork? 255.255.0.0 255.255.255.0 255.255.254.0
255.255.248.0
13. When a host has an empty ARP cache, what isthe next step the host will take to find the destinationMAC address of a remote host? sends an ARP request as a unicast to the server sends an ARP request as a unicast to thedestination sends an ARP request as a broadcast to all hosts inthe local network sends an ARP request as a unicast to the defaultgateway
14.
Refer to the exhibit. What is the purpose of theObtain an IP address automatically option shown inthe exhibit? to configure the computer to use ARP to configure the computer to use DHCP to configure the computer to use a routing protocol
to configure the computer with a statically assignedIP address
15. How many usable hosts are available given aClass C IP address with the default subnet mask?
254 255 256 510 511
512
16. Which statement accurately describes public IPaddresses?
Public addresses cannot be used within a privatenetwork. Public IP addresses must be unique across the
entire Internet. Public addresses can be duplicated only within a
local network. Public IP addresses are only required to be uniquewithin the local network. Network administrators are free to select anypublic addresses to use for network devices that
access the Internet.
17. Which IPv4 class of addresses provides the mostnetworks? Class A Class B Class C Class D Class E
18. Which IPv4 class provides the highest number ofhost addresses per network? Class A
Class B Class C Class D Class E
http://bp0.blogger.com/_TY4rWcZRSlU/RtBwRn34M1I/AAAAAAAAAEM/jIKbKcKrZwU/s1600-h/clip_image001.jpghttp://bp2.blogger.com/_TY4rWcZRSlU/RtBvwH34M0I/AAAAAAAAAEE/DAgIoZlpX4w/s1600-h/clip_image001.jpghttp://bp0.blogger.com/_TY4rWcZRSlU/RtBwRn34M1I/AAAAAAAAAEM/jIKbKcKrZwU/s1600-h/clip_image001.jpghttp://bp2.blogger.com/_TY4rWcZRSlU/RtBvwH34M0I/AAAAAAAAAEE/DAgIoZlpX4w/s1600-h/clip_image001.jpg -
7/28/2019 Jarkom CCNA Exam
8/29
19. What is the purpose of a DHCP server on anetwork? to resolve MAC addresses to IP addresses to resolve IP addresses to MAC addresses to resolve host names to IP addresses to assign IP addresses dynamically to hosts to assign a MAC address to a host
20.
Refer to the exhibit. Which two statements are
correct in reference to the output shown? (Choosetwo.)
The LAN segment is subnetted to allow 254subnets. The DNS server for this host is on the same subnet
as the host. The host automatically obtained the IP addresses
192.168.1.100. The host received the IP address from the router onthe local LAN segment. The host is assigned an address of 00-50-8D-F1-EA-8D by the administrator.
1.What is characteristic of the operation of a Layer 2
switch? forwards data based on logical addressing
duplicates the electrical signal of each frame toevery port learns the port assigned to a host by examining the
destination MAC address
uses the destination MAC address to determine thespecific interface to forward a frame
2.Two newly hired technicians are discussing theimplementation of a new LAN. One technicianproposes installing a hub. The other technicianadvises installing a switch. Which statements aretrue about the differences between a hub and a
switch? (Choose two.) A hub operates at Layer 2 of the OSI model. A hub reduces the number of collisions on a LAN. A hub works at a higher OSI model layer than a
switch. A switch provides more throughput to hosts on aLAN
A switch provides a collision-free environment on
a LAN.
The number of collisions on a LAN are the samewhether a hub or a switch is used.
3.
Refer to the exhibit. Forty-eight workstations areconnected to a hub. The users are able to connect tothe network, but access is very slow. An entry-level
technician replaces the 10 Mbps hub with 100 Mbpshub but the problem still exists. What is the most
economical way to correct the problem? Replace the hub with a switch. Replace the hub with a router. Replace the hub with a 1 Gbps hub. Replace the hub with a 10 Mbps fiber hub.
4.
Exhibited is a portion of ABC Companyinternetwork. Which of the connections can be fullduplex? segments 1 and 2 segment 2 segments 3 and 4 segments 2, 3, and 4 segments 1, 2, 3, and 4
5.
Refer to the exhibit. The switch and the hub havedefault configurations, and the switch has built its
CAM table. Which of the hosts will receive the datawhen workstation A sends a unicast packet to
workstation C? workstation C
http://bp1.blogger.com/_TY4rWcZRSlU/Rs-xCH34MxI/AAAAAAAAADs/A7XzPbelCa0/s1600-h/9237[1].jpghttp://bp2.blogger.com/_TY4rWcZRSlU/Rs-vUX34MuI/AAAAAAAAADU/R2jsyLeLevQ/s1600-h/8836[1].jpghttp://bp1.blogger.com/_TY4rWcZRSlU/Rs-wdH34MwI/AAAAAAAAADk/5E9t7yIBMhA/s1600-h/9612[1].jpghttp://bp0.blogger.com/_TY4rWcZRSlU/RtByQn34M2I/AAAAAAAAAEU/PudjmJMvNQs/s1600-h/11600[1].jpghttp://bp1.blogger.com/_TY4rWcZRSlU/Rs-xCH34MxI/AAAAAAAAADs/A7XzPbelCa0/s1600-h/9237[1].jpghttp://bp2.blogger.com/_TY4rWcZRSlU/Rs-vUX34MuI/AAAAAAAAADU/R2jsyLeLevQ/s1600-h/8836[1].jpghttp://bp1.blogger.com/_TY4rWcZRSlU/Rs-wdH34MwI/AAAAAAAAADk/5E9t7yIBMhA/s1600-h/9612[1].jpghttp://bp0.blogger.com/_TY4rWcZRSlU/RtByQn34M2I/AAAAAAAAAEU/PudjmJMvNQs/s1600-h/11600[1].jpghttp://bp1.blogger.com/_TY4rWcZRSlU/Rs-xCH34MxI/AAAAAAAAADs/A7XzPbelCa0/s1600-h/9237[1].jpghttp://bp2.blogger.com/_TY4rWcZRSlU/Rs-vUX34MuI/AAAAAAAAADU/R2jsyLeLevQ/s1600-h/8836[1].jpghttp://bp1.blogger.com/_TY4rWcZRSlU/Rs-wdH34MwI/AAAAAAAAADk/5E9t7yIBMhA/s1600-h/9612[1].jpghttp://bp0.blogger.com/_TY4rWcZRSlU/RtByQn34M2I/AAAAAAAAAEU/PudjmJMvNQs/s1600-h/11600[1].jpghttp://bp1.blogger.com/_TY4rWcZRSlU/Rs-xCH34MxI/AAAAAAAAADs/A7XzPbelCa0/s1600-h/9237[1].jpghttp://bp2.blogger.com/_TY4rWcZRSlU/Rs-vUX34MuI/AAAAAAAAADU/R2jsyLeLevQ/s1600-h/8836[1].jpghttp://bp1.blogger.com/_TY4rWcZRSlU/Rs-wdH34MwI/AAAAAAAAADk/5E9t7yIBMhA/s1600-h/9612[1].jpghttp://bp0.blogger.com/_TY4rWcZRSlU/RtByQn34M2I/AAAAAAAAAEU/PudjmJMvNQs/s1600-h/11600[1].jpg -
7/28/2019 Jarkom CCNA Exam
9/29
workstations B and C
workstations B, C, and the E0 interface of therouter workstations B, C, D, E, F, and the E0 interface ofthe router
6. An administrator would like to connect tenworkstations on a 192.168.0.0/24 network. The
device selected by the administrator must allow
connectivity between hosts without sharingbandwidth. Which device would be appropriate? hub router switch repeater
7. Which networking devices use the MAC addressto make forwarding decisions? (Choose two.) NIC bridge hub
switch repeater
8. Which devices are primarily used to extend cablesegments within a collision domain by regenerating
the data signals? (Choose two.)switch repeater router bridge
hub
9. Which devices will create multiple collisiondomains in an Ethernet network? (Choose two.) NIC hub switch
routerrepeater
10.
Refer to the exhibit. How many broadcast domainsexist in classroom 240? 1 2
5 12 13 15
11. A PC receives a frame. Which situation willcause the NIC on the receiving host to pass theframe contents up the OSI layers to be processed bythe PC? The frame is a runt frame. The destination MAC address of the frame isFFFF.FFFF.FFFF.
The transmitting host generated a jam signal during
the frame transmission. The recalculated checksum forthe frame does notmatch the FCS on the frame.
12. A network administrator has a multi-floor LANto monitor and maintain. Through carefulmonitoring, the administrator has noticed a largeamount of broadcast traffic slowing the network.Which device would you use to best solve thisproblem? bridge hub
router transceiver
13. What will a bridge do if it receives a frame witha MAC address that is not within the table?
discard frame ignore frame send frame to appropriate port send frame to all ports except source port
14. Which networking device reduces the size ofboth collision domains and broadcast domains?
hub Layer 2 switch router bridge repeater
15. What is used to prevent Layer 2 switching
loops? bridging segmentation
Address Resolution Protocol
Spanning-Tree Protocol
1.Which Ethernet standard does the IEEE 802.3
standard recommend for backbone installations? 10BASE-T 100BASE-T 100BASE-FX 1000BASE-LX
2. Which statements describe Gigabit Ethernet
technology? (Choose two.) operates at 100 Mbps
typically used for backbone cabling requires shielded twisted-pair cabling can be implemented over copper and fiber
primarily used between workstations option
http://bp2.blogger.com/_TY4rWcZRSlU/Rs-vuX34MvI/AAAAAAAAADc/cMs2RQg1QOw/s1600-h/5954[1].jpg -
7/28/2019 Jarkom CCNA Exam
10/29
3. Which of the following are Fast Ethernettechnologies? (Choose two.) 100BASE-5 100BASE2 1000BASE-F 100BASE-FX 100BASE-TX
4. To make sure timing limitations are not violatedwhen implementing a 10 Mbps Ethernet networkinvolving hubs or repeaters, a technician shouldadhere to which rule? the 4-5-3 rule the 6-4-2 rule the 3-4-5 rule the 5-4-3 rule
5. At which OSI layer do the differences betweenstandard Ethernet, Fast Ethernet and GigabitEthernet occur?
physical layer data link layer network layer transport layer
6. How does 1000BASE-T use the UTP wire pairs toaccomplish transmission? two pairs are used to transmit and two pairs areused to receive one pair is used to transmit, one pair is used to
receive, one pair is used for clocking, and one pair isused for error correction
all four pairs are used in parallel by both hosts totransmit and receive simultaneously two pairs of wires are used as in 10BASE-T and100BASE-TX
7. What RJ-45 pins are unused when transmittingand receiving data in an Ethernet 100BASE-T
Category 5 UTP cable? (Choose two.) 1 and 2 3 and 6
4 and 5
7 and 8
8. What is the maximum distance that 10BASE-Twill transmit data before signal attenuation affectsthe data delivery? 100 meters 185 meters 300 meters 500 meters
9. Which media types can be used in animplementation of a 10BASE-T network? (Choose
three.) Category 5 UTP Category 5e UTP Category 3 UTP
coaxial cable
multi-mode fiber single mode fiber
10. Which of the following Ethernet technologiesare considered legacy Ethernet? (Choose three.) 10BASE2 10BASE5
10BASE-T
100BASE-T 100BASE-FX 100BASE-TX
1. Which of the following are specified by IEEEstandards as sublayers of the OSI data link layer?
(Choose two.) Logical Link Control Logical Layer Control Media Access Control Logical Link Communication Media Access Communication Physical Access Communication
2.
Refer to the exhibit. Host A is communicatingwith host F. What happens to a frame sent fromhost A to host F as it travels over the Ethernetsegments?
The frame format is modified as it passes
through each switch. The frame format remains the same across eachEthernet segment. The frame format is modified as the mediaspeed changed at switch B and switch E. The frame format is modified as the mediamaterial changes between copper and fiber atswitch C and switch D.
3. In which two layers of the OSI model doesEthernet function? (Choose two.) application session transport
network data link physical
4. Where does the MAC address originate?
DHCP server database configured by the administrator burned into ROM on the NIC card network configuration on the computer
included in the creation of the processor chip
5. At what layer of the OSI model does a MACaddress reside?
http://bp0.blogger.com/_TY4rWcZRSlU/Rs6uHH34MqI/AAAAAAAAAC0/mEsWfNvQ6aQ/s1600-h/9191[1].jpg -
7/28/2019 Jarkom CCNA Exam
11/29
1
2 3 4 7
6. A router has an Ethernet, Token Ring, serial,and ISDN interface. Which interfaces will have a
MAC address?
serial and ISDN interfaces Ethernet and Token Ring interfaces Ethernet and ISDN interfaces Token Ring and serial interfaces
7. Which two devices can provide full-duplexEthernet connections? (Choose two.) hub modem repeater NIC Layer 2
Refer to the exhibit. The small office network shownin the exhibit consists of four computers connectedthrough a hub. Which configuration would causecollisions and errors on the network? autonegotiation FastEthernet
peer-to-peer shared resources administratively configured full duplex
Refer to the exhibit. The switch and workstation areadministratively configured for full-duplexoperation. Which statement accurately reflects the
operation of this link? No collisions will occur on this link.
Only one of the devices can transmit at a time. The switch will have priority for transmitting data.
The devices will default back to half duplex ifexcessive collisions occur.
10. What are three functions of a NIC in a PC?
(Choose three.)
A NIC connects the PC to the network media. A NIC detects collisions on the Ethernet segment. A NIC checks the formatting of data before it istransmitted. A NIC passes the contents of selected frames to theupper OSI layers. A NIC acknowledges and retransmits data that was
not received properly.
A NIC discards frames when the destination IPaddress does not match the local host.
11. In an Ethernet LAN, how does the NIC knowwhen it can transmit data? An Ethernet NIC transmits data as soon as theframe is received. An Ethernet NIC transmits data as soon as the NICreceives a token. An Ethernet NIC transmits data when it senses acollision. An Ethernet NIC transmits data after listening for
the absence of a signal on the media.
12.
Refer to the exhibit. All hosts are in listen mode.
Host 1 and Host 4 both transmit data at the same
time. How do the hosts respond on the network?(Choose two.) Hosts 1 and 4 may be operating full duplex so nocollision will exist. The hub will block the port connected to Host 4 toprevent a collision. After the end of the jam signal, Hosts 1, 2, 3, and 4invoke a backoff algorithm. When the four hosts detect the collision, Hosts 1,2, 3, and 4 generate a jam signal. Hosts 1 and 4 are assigned shorter backoff valuesto provide them priority to access the media. If a host has data to transmit after the backoffperiod of that host, the host checks to determine if
the line is idle, before transmitting.
13. Which statement describes how CSMA/CD on
an Ethernet segment manages the retransmission offrames after a collision occurs?
The first device to detect the collision has thepriority for retransmission. The device with the lowest MAC addressdetermines the retransmission priority.
The devices on the network segment hold anelection for priority to retransmit data The devices transmitting when the collision occursDO NOT have priority for retransmission.
http://bp2.blogger.com/_TY4rWcZRSlU/Rs6vWn34MsI/AAAAAAAAADE/RSXvl2BsjSI/s1600-h/11362[1].jpghttp://bp0.blogger.com/_TY4rWcZRSlU/Rs6vuH34MtI/AAAAAAAAADM/CrZG7DHnuy0/s1600-h/8452[1].jpghttp://bp2.blogger.com/_TY4rWcZRSlU/Rs6uhn34MrI/AAAAAAAAAC8/8Ph-kY-2qds/s1600-h/8451[1].jpghttp://bp2.blogger.com/_TY4rWcZRSlU/Rs6vWn34MsI/AAAAAAAAADE/RSXvl2BsjSI/s1600-h/11362[1].jpghttp://bp0.blogger.com/_TY4rWcZRSlU/Rs6vuH34MtI/AAAAAAAAADM/CrZG7DHnuy0/s1600-h/8452[1].jpghttp://bp2.blogger.com/_TY4rWcZRSlU/Rs6uhn34MrI/AAAAAAAAAC8/8Ph-kY-2qds/s1600-h/8451[1].jpghttp://bp2.blogger.com/_TY4rWcZRSlU/Rs6vWn34MsI/AAAAAAAAADE/RSXvl2BsjSI/s1600-h/11362[1].jpghttp://bp0.blogger.com/_TY4rWcZRSlU/Rs6vuH34MtI/AAAAAAAAADM/CrZG7DHnuy0/s1600-h/8452[1].jpghttp://bp2.blogger.com/_TY4rWcZRSlU/Rs6uhn34MrI/AAAAAAAAAC8/8Ph-kY-2qds/s1600-h/8451[1].jpg -
7/28/2019 Jarkom CCNA Exam
12/29
14. What is the maximum distance that 10BASE-Twill transmit data before signal attenuation affectsthe data delivery? 100 meters 185 meters 300 meters 500 meters
15. Which of the following are Fast Ethernettechnologies? (Choose two.) 100BASE-5 100BASE2 1000BASE-F 100BASE-FX 100BASE-TX
16. At which OSI layer do the differences betweenstandard Ethernet, Fast Ethernet and GigabitEthernet occur? physical layer
data link layer network layer transport layer
17. How does 1000BASE-T use the UTP wire pairs
to accomplish transmission? two pairs are used to transmit and two pairs areused to receive one pair is used to transmit, one pair is used toreceive, one pair is used for clocking, and one pair is
used for error correction all four pairs are used in parallel by both hosts to
transmit and receive simultaneously two pairs of wires are used as in 10BASE-T and100BASE-TX
18. Which statements describe Gigabit Ethernet
technology? (Choose two.) operates at 100 Mbps
typically used for backbone cabling requires shielded twisted-pair cabling can be implemented over copper and fiber
primarily used between workstations option
19. Which media types can be used in animplementation of a 10BASE-T network? (Choosethree.) Category 5 UTP Category 5e UTP Category 3 UTP coaxial cable multi-mode fiber single mode fiber
20. Which of the following Ethernet technologies
are considered legacy Ethernet? (Choose three.) 10BASE2 10BASE5 10BASE-T
100BASE-T
100BASE-FX 100BASE-TX
Refer to the exhibit. Host A is communicating withhost F. What happens to a frame sent from host A tohost F as it travels over the Ethernet segments? The frame format is modified as it passes througheach switch.
The frame format remains the same across eachEthernet segment. The frame format is modified as the media speedchanged at switch B and switch E. The frame format is modified as the media materialchanges between copper and fiber at switch C andswitch D.
2. How many hexadecimal digits are in a MACaddress? 2 8 1216 32
3. What are three functions of a NIC in a PC?(Choose three.) A NIC connects the PC to the network media. A NIC detects collisions on the Ethernet segment.
A NIC checks the formatting of data before it istransmitted. A NIC passes the contents of selected frames to theupper OSI layers. A NIC acknowledges and retransmits data that was
not received properly. A NIC discards frames when the destination IPaddress does not match the local host.
4. At what layer of the OSI model does a MAC
address reside? 1
2 3 4 7
5. A router has an Ethernet, Token Ring, serial, andISDN interface. Which interfaces will have a MACaddress? serial and ISDN interfaces Ethernet and Token Ring interfaces Ethernet and ISDN interfaces Token Ring and serial interfaces
6. In an Ethernet LAN, how does the NIC knowwhen it can transmit data? An Ethernet NIC transmits data as soon as the
http://bp0.blogger.com/_TY4rWcZRSlU/Rstxf334MnI/AAAAAAAAACc/J24Olv7rtU0/s1600-h/9191[1].jpg -
7/28/2019 Jarkom CCNA Exam
13/29
frame is received.
An Ethernet NIC transmits data as soon as the NICreceives a token. An Ethernet NIC transmits data when it senses acollision. An Ethernet NIC transmits data after listening forthe absence of a signal on the media.
7. Which characteristics describe carrier sense
multiple access collision detect (CSMA/CD)?(Choose three.) reliable point-to-point nondeterministic connection-oriented collision environment first-come, first-served approach
8. Which two devices can provide full-duplexEthernet connections? (Choose two.) hub
modem repeater NIC Layer 2 switch
9. On a local area network, one workstation can senddata on the line while it is receiving data. What typeof data transfer does this describe? hybrid half duplex
full duplex multilink
10.
Refer to the exhibit. The small office network shownin the exhibit consists of four computers connectedthrough a hub. Which configuration would cause
collisions and errors on the network?
autonegotiation FastEthernet peer-to-peer shared resources administratively configured full duplex
11.
Refer to the exhibit. The switch and workstation areadministratively configured for full-duplexoperation. Which statement accurately reflects theoperation of this link?
No collisions will occur on this link.
Only one of the devices can transmit at a time. The switch will have priority for transmitting data. The devices will default back to half duplex ifexcessive collisions occur.
12.
Refer to the exhibit. All hosts are in listen mode.Host 1 and Host 4 both transmit data at the sametime. How do the hosts respond on the network?
(Choose two.) Hosts 1 and 4 may be operating full duplex so no
collision will exist. The hub will block the port connected to Host 4 toprevent a collision. After the end of the jam signal, Hosts 1, 2, 3, and 4invoke a backoff algorithm. Hosts 1 and 4 are assigned shorter backoff valuesto provide them priority to access the media. If a host has data to transmit afterthe backoffperiod of that host, the host checks to determine ifthe line is idle, before transmitting.
13. When a collision occurs in a network using
CSMA/CD, how do hosts with data to transmitrespond after the backoff period has expired? The hosts return to a listen-before-transmit mode. The hosts creating the collision have priority to
send data. The hosts creating the collision retransmit the last
16 frames. The hosts extend their delay period to allow forrapid transmission.
14. Which statement describes how CSMA/CD on
an Ethernet segment manages the retransmission offrames after a collision occurs?
The first device to detect the collision has thepriority for retransmission. The device with the lowest MAC addressdetermines the retransmission priority. The devices on the network segment hold an
election for priority to retransmit data The devices transmitting when the collision occursDO NOT have priority for retransmission.
15.
http://bp0.blogger.com/_TY4rWcZRSlU/Rstvd334MlI/AAAAAAAAACM/zZdFjzXnYBY/s1600-h/11362[1].jpghttp://bp0.blogger.com/_TY4rWcZRSlU/Rstzw334MoI/AAAAAAAAACk/VO8lDTymkBk/s1600-h/8452[1].jpghttp://bp2.blogger.com/_TY4rWcZRSlU/RstwUX34MmI/AAAAAAAAACU/5bu4ayB4ylA/s1600-h/8451[1].jpghttp://bp0.blogger.com/_TY4rWcZRSlU/Rstvd334MlI/AAAAAAAAACM/zZdFjzXnYBY/s1600-h/11362[1].jpghttp://bp0.blogger.com/_TY4rWcZRSlU/Rstzw334MoI/AAAAAAAAACk/VO8lDTymkBk/s1600-h/8452[1].jpghttp://bp2.blogger.com/_TY4rWcZRSlU/RstwUX34MmI/AAAAAAAAACU/5bu4ayB4ylA/s1600-h/8451[1].jpghttp://bp0.blogger.com/_TY4rWcZRSlU/Rstvd334MlI/AAAAAAAAACM/zZdFjzXnYBY/s1600-h/11362[1].jpghttp://bp0.blogger.com/_TY4rWcZRSlU/Rstzw334MoI/AAAAAAAAACk/VO8lDTymkBk/s1600-h/8452[1].jpghttp://bp2.blogger.com/_TY4rWcZRSlU/RstwUX34MmI/AAAAAAAAACU/5bu4ayB4ylA/s1600-h/8451[1].jpg -
7/28/2019 Jarkom CCNA Exam
14/29
Refer to the exhibit. A technician wants to increase
the available bandwidth for the workstation byallowing the switch and the NIC on the workstation
to transmit and receive simultaneously. What willpermit this? CSMA/CD
full-duplex FastEthernet
crossover cable
16. Why do hosts on an Ethernet segment thatexperience a collision use a random delay beforeattempting to transmit a frame?
A random delay is used to ensure a collision-freelink.
A random delay value for each device is assignedby the manufacturer. A standard delay value could not be agreed uponamong networking device vendors. A random delay helps prevent the stations fromexperiencing another collision during thetransmission.
17. In which two layers of the OSI model doesEthernet function? (Choose two.) application
session
transport network data link physical
18. Which of the following are specified by IEEEstandards as sublayers of the OSI data link layer?(Choose two.) Logical Link Control Logical Layer Control Media Access Control
Logical LinkCommunication
Media Access Communication Physical Access Communication
19. Where does the MAC address originate? DHCP server database configured by the administrator
burned into ROM on the NIC card network configuration on the computer included in the creation of the processor chip
1
Refer to the exhibit. What is the appropriate cable touse at each of the numbered network connections? 1-crossover; 2-straight-through; 3-crossover; 4-
straight-through 1-straight-through; 2-crossover; 3-straight-through;
4-straight-through 1-straight-through; 2-crossover; 3-crossover; 4-straight-through 1-rollover; 2-crossover; 3-straight-through; 4-straight-through
1-rollover; 2-straight-through; 3-straight-through;4-straight-through
2. Which two devices are considered OSI Layer 1devices? (Choose two.) hubs routers
bridges switches repeaters
3. What device is used to connect hosts to an
Ethernet LAN and requires a straight-through UTPcable between the hosts and this device? NIC router switch server
4. What is the most common type of cabling used inLANs? STP UTP coax
fiber
5. In which situations would a crossover cable be
used to connect devices in a network? (Choose two.) switch to PC switch to hub switch to router switch to server
switch to switch
6.Refer to the exhibit. How many collision domainsexist in the network? 1 2
http://bp1.blogger.com/_TY4rWcZRSlU/Rsra_X34MkI/AAAAAAAAACE/9BIozeMHSC8/s1600-h/9248[1].jpghttp://bp1.blogger.com/_TY4rWcZRSlU/Rsra_X34MkI/AAAAAAAAACE/9BIozeMHSC8/s1600-h/9248[1].jpghttp://bp0.blogger.com/_TY4rWcZRSlU/RsrZ4H34MhI/AAAAAAAAABs/sW0mhUzNxZE/s1600-h/8190[1].jpghttp://bp0.blogger.com/_TY4rWcZRSlU/Rst2N334MpI/AAAAAAAAACs/SvyoANI0XoA/s1600-h/8454[1].jpghttp://bp1.blogger.com/_TY4rWcZRSlU/Rsra_X34MkI/AAAAAAAAACE/9BIozeMHSC8/s1600-h/9248[1].jpghttp://bp0.blogger.com/_TY4rWcZRSlU/RsrZ4H34MhI/AAAAAAAAABs/sW0mhUzNxZE/s1600-h/8190[1].jpghttp://bp0.blogger.com/_TY4rWcZRSlU/Rst2N334MpI/AAAAAAAAACs/SvyoANI0XoA/s1600-h/8454[1].jpghttp://bp1.blogger.com/_TY4rWcZRSlU/Rsra_X34MkI/AAAAAAAAACE/9BIozeMHSC8/s1600-h/9248[1].jpghttp://bp0.blogger.com/_TY4rWcZRSlU/RsrZ4H34MhI/AAAAAAAAABs/sW0mhUzNxZE/s1600-h/8190[1].jpghttp://bp0.blogger.com/_TY4rWcZRSlU/Rst2N334MpI/AAAAAAAAACs/SvyoANI0XoA/s1600-h/8454[1].jpg -
7/28/2019 Jarkom CCNA Exam
15/29
4
7 8
7. What type of cable would be used to make theconnection between the console port of a router anda workstation? crossover
rollover
straight-through patch
8.
Which function is a unique responsibility of theDCE devices shown in the exhibit? transmission of data reception of data
clocking for the synchronous link noise cancellation in transmitted data
9. Which address does a bridge use to make filteringand switching decisions?
source MAC source IP destination MAC destination IP network IP address
10. What is characteristic of how a hub operates?
A hub selectively drops packets that representpotential security risks. A hub forwards data out all interfaces except theinbound interface. A hub dynamically learns the interfaces to which
all devices are attached. At start up, a hub queries the devices on all
interfaces in order to learn the MAC addresses of theattached devices. A hub transmits a frame to a specific interface
based on the destination MAC address.
11. Users with systems that are attached to a hub arecomplaining about poor response time. What devicecould replace the hub and provide immediateresponse time improvement? router switch bridge repeater
12. Which of the following are benefits of peer-to-peer networks? (Choose three.) centralized security easy to create very scalable no centralized equipment required
centralized administrator not required
centralized control of assets
13. Which statement is accurate about a WAN link? The link transmits data serially. The link uses a maximum distance of 100 meters. The link uses the same transmission rate as allother WAN links use.
The link uses the same standardized connector
style that is used for all WAN technologies.
14.
Which items in the exhibit are DTE devices?
A and B B and C C and D
A and D A, B, C, and D
15. At which layer of the OSI model does the MACaddress of a NIC reside? physical application network transport data link session
16.
Refer to the exhibit. A technician measured thelengths of the CAT 5e structured cable runs in theexhibit. How should the technician evaluate thecabling shown in the diagram to the networkadministrator?
All cabling to work areas are within specifications. Station A and B may experience intermittent
problems because the length exceeds therecommended standard. Station B may experience intermittent problems
because the length exceeds the recommended
standard. Station C may experience intermittent networkconnectivity because the length is less than therecommended standard.
http://bp0.blogger.com/_TY4rWcZRSlU/RsrUdH34MeI/AAAAAAAAABU/CxFF8QzWX7U/s1600-h/9188[1].jpghttp://bp1.blogger.com/_TY4rWcZRSlU/RsrWJX34MfI/AAAAAAAAABc/kjgKRDypZT8/s1600-h/8327[1].jpghttp://bp1.blogger.com/_TY4rWcZRSlU/RsraKX34MiI/AAAAAAAAAB0/fWX2-V2OgPc/s1600-h/8328[1].jpghttp://bp0.blogger.com/_TY4rWcZRSlU/RsrUdH34MeI/AAAAAAAAABU/CxFF8QzWX7U/s1600-h/9188[1].jpghttp://bp1.blogger.com/_TY4rWcZRSlU/RsrWJX34MfI/AAAAAAAAABc/kjgKRDypZT8/s1600-h/8327[1].jpghttp://bp1.blogger.com/_TY4rWcZRSlU/RsraKX34MiI/AAAAAAAAAB0/fWX2-V2OgPc/s1600-h/8328[1].jpghttp://bp0.blogger.com/_TY4rWcZRSlU/RsrUdH34MeI/AAAAAAAAABU/CxFF8QzWX7U/s1600-h/9188[1].jpghttp://bp1.blogger.com/_TY4rWcZRSlU/RsrWJX34MfI/AAAAAAAAABc/kjgKRDypZT8/s1600-h/8327[1].jpghttp://bp1.blogger.com/_TY4rWcZRSlU/RsraKX34MiI/AAAAAAAAAB0/fWX2-V2OgPc/s1600-h/8328[1].jpg -
7/28/2019 Jarkom CCNA Exam
16/29
Station A and B will have intermittent problems
because the length exceeds the recommendedstandard. Station C will not have network connectivitybecause the length is less than the recommendedstandard.
17. Which statement describes a typical use of
Gigabit Ethernet?
to provide high-speed desktop connectivity foraverage users to provide connectivity to low to medium volumeapplications to provide medium volume connectivity toworkgroup servers to provide high-speed connectivity for backbonesand cross connects
18. Orange putih-orange-ijo putih-biru-biru putih-ijo-cokput-cok
The ends of a UTP cable are shown in the exhibit.
Which cable configuration is shown? crossover rollover reversed-pair straight-through
split-pair console
19.ijo putih-ijo-ornge putih-biru-biru putih-orange-cokput-cok
The ends of a UTP cable are shown in the exhibit.Which cable configuration is shown?
console crossover rollover
reversed-pair split-pair straight-through
20. Which of the following are benefits of a wireless
network? (Choose two.) higher data speeds better security mobility
less expensive NIC cards no need to run cables to hosts
1. To ensure reliable LAN communications, what
should a technician be looking for when attachingconnectors to the ends of UTP cable? that the white-orange/orange pair is attached first That the wire pairs remain twisted as much aspossible that one end of the shield is properly ground butnot the other
that 50 ohm termination resistors are on both ends
2. Which of the following describes frequency? length of each wave height of each wave number of cycles each second amount of time between each wave
3. How are binary ones and zeros represented infiber optic installations? (Choose two.) +5 volts/-5 volts 0 volts/5 volts light/no light
high to low electrical transition low to high electrical transition increasing/decreasing light intensity
4. What is expected when crosstalk is present in
networks with higher transmission frequencies?(Choose two.) jitter increase in crosstalk higher signal attenuation
increases in cancellation effect destruction of more of the data signal
5. A small company is experiencing difficulties onits LAN. After performing some tests, a technicianhas determined that the copper media supporting theLAN is experiencing abnormal attenuation. What
are two possible causes of the problem? (Choosetwo.)
defective connectors excessively long cable lengths use of higher grade cabling
low frequency signals used in the media
networkcable runs isolated from other cables
6. What factors need to be considered to limit theamount of signal attenuation in Ethernet cable runs?(Choose two.) type of users number of users length of cable type of electrical equipment installation of connectors on the cable
7. What conditions are described when transmission
signals from one wire pair affects another wire pair?(Choose two.) noise resistance mismatch
http://bp1.blogger.com/_TY4rWcZRSlU/RsraiX34MjI/AAAAAAAAAB8/pV7PQWsY4Vw/s1600-h/8022[1].jpghttp://bp2.blogger.com/_TY4rWcZRSlU/RsrZAn34MgI/AAAAAAAAABk/jZBqyoIYP6k/s1600-h/8020[1].jpghttp://bp1.blogger.com/_TY4rWcZRSlU/RsraiX34MjI/AAAAAAAAAB8/pV7PQWsY4Vw/s1600-h/8022[1].jpghttp://bp2.blogger.com/_TY4rWcZRSlU/RsrZAn34MgI/AAAAAAAAABk/jZBqyoIYP6k/s1600-h/8020[1].jpg -
7/28/2019 Jarkom CCNA Exam
17/29
jitter
crosstalk attenuation
8. What is a cause of crosstalk in UTP cable? cable pairs that are shorted cable pairs crossed during termination cabling runs installed in separate conduit
cable pairs that are untwisted because of poor
termination of the cable
9. Which of the following are detected by the wiremap test? (Choose three.) near-end crosstalk (NEXT) opens propagation delay return loss reversed-pair faults short circuits
10. A company needs to extend the LAN to six
separate buildings. To limit the amount of signalattenuation on the LAN media, what type of mediawould be the best to use between the buildings? air (wireless) coaxial cable
fiber shielded twisted pair unshielded twisted pair
10. Which OSI layer addressing is required to routepackets between two networks?
Layer 1
Layer 2 Layer 3 Layer 4
13. Which subnet mask will allow 2040 hosts persubnet on the IP network 10.0.0.0?
255.255.0.0 255.255.254.0 255.255.252.0 255.255.248.0 255.255.240.0 255.255.255.128
16.
Refer to the exhibit. Which layered network model
is shown in the diagram?CiscoIETFOSI
TCP/IP
Refer to the exhibit. Which two layers of the OSImodel describe the same functions as the transportand internet layers of the TCP/IP model? (Choosetwo.)application layerpresentation layer
session layer
transport layernetwork layerdata link layerphysical layer
30. What happens when a host station receives aframe that contains its own MAC address in thedestination field?The Layer 2 information is removed and the frame ispushed up to Layer 3.The host station will copy the information to itsbuffers and send it back out.
The frame originated from the host and will beignored.The Layer 3 information is added to the frame.32. What type of network is maintained if a servertakes no dedicated role in the network?
mainframe client/server peer-to-peer centralized
33. In a network design project, a network designer
needs to select a device to provide collision freeconnections to 40 hosts on the LAN. Which deviceshould be selected?
hub router switch firewall
34. Which TCP/IP model layer creates additionaloverhead on network resources due toacknowledgments, tracking, and retransmission ofdata?
internet transport application network access
35. How many host addresses may be assigned when
using the 128.107.0.0 network address with a subnetmask of 255.255.248.0?
30 256 2046 2048 4094 4096
http://ccnaanswers.com/wp-content/uploads/NetworkFundamentalsFinalExamAnswers.jpg -
7/28/2019 Jarkom CCNA Exam
18/29
36. Which service is used when the nslookup
command is issued on a computer?
FTP DNS DHCP Telnet
37. Which process provides the means to send andreceive data when running multiple applications at
the same time on a computer? interleaving sequencing segmentation acknowledgement
38. Which three IPv4 addresses represent valid hostaddresses for a subnet? (Choose three.)
10.1.12.79/28 10.1.12.113/28 10.1.12.32/28 10.1.11.5/27 10.1.11.97/27 10.1.11.128/27
39. What is the consequence of issuing the erase
startup-config command in privileged EXEC modeon a Cisco router?Data stored in RAM will be removed.Data stored in NVRAM will be erased.Information in flash memory will be removed.
Flags in the configuration register will be set to 0.Both the startup-config and the running-config willbe erased.
40.
Refer to the exhibit. A network technician is trying
to determine the correct IP address configuration forHost A. What is a valid configuration for Host A?
IP address: 192.168.100.19; Subnet Mask:255.255.255.248; Default Gateway:192.16.1.2
IP address: 192.168.100.20; Subnet Mask:255.255.255.240; Default Gateway:
192.168.100.17
IP address: 192.168.100.21; Subnet Mask:255.255.255.248; Default Gateway:192.168.100.18
IP address: 192.168.100.22; Subnet Mask:255.255.255.240; Default Gateway: 10.1.1.5
IP address: 192.168.100.30; Subnet Mask:255.255.255.240; Default Gateway:192.168.1.1
IP address: 192.168.100.31; Subnet Mask:255.255.255.240; Default Gateway:
192.168.100.18
44. A routing issue has occurred in yourinternetwork. Which of the following type ofdevices should be examined to isolate this error?
access point host hub router switch
45. Which statement is true about Layer 3addresses?
They are physical addresses. They are used in routing decisions. They are only used on local networks. They are altered each time a packet crosses
a router.
47. Which OSI layer does IP rely on to determinewhether packets have been lost and to requestretransmission?
application presentation session transport
50. Which option represents a point-to-point logicaltopology diagram?
1. Arouterdetermines the path to deliver a packet.What layer of the OSI model does this factrepresent?
sessiontransportnetworkdata link
http://ccnaanswers.com/http://ccnaanswers.com/http://ccnaanswers.com/http://ccnaanswers.com/wp-content/uploads/Computer.jpghttp://ccnaanswers.com/wp-content/uploads/Exam2011.jpghttp://ccnaanswers.com/wp-content/uploads/Computer.jpghttp://ccnaanswers.com/wp-content/uploads/Exam2011.jpghttp://ccnaanswers.com/ -
7/28/2019 Jarkom CCNA Exam
19/29
-
7/28/2019 Jarkom CCNA Exam
20/29
NIC hub switch router repeater
11. What is the decimal representation of the binarynumber 11111000?
224 240 248 252 254
12. Which characteristics are common to both UDPand TCP? (Choose two.)
provides windowing provides reliability uses port numbers acknowledges receipt of data classified as a connectionless protocol classified as a transport layer protocol
13. The ping command can be used to testconnectivity between hosts. Which OSI model
layers are verified by this test?
Layers 1 and 2 only Layers 1 and 3 only Layers 1, 2 and 3 Layer 1 through Layer 7 Layer 4 through Layer 7
14. Why do vendors utilize the OSI model whendesigning networking products?
It places requirements on all vendors thatdevelop proprietary networking
technologies for advance networkingsystems.
It ensures greater compatibility andinteroperability with equipment from
different vendors.
The International Organization forStandards develops all new products to be
incorporated into the product. It is mandated by the International
Organization for Standardization thatnetwork products be compliant with the OSI
model.
15. An Ethernet host receives a frame, calculates theFCS, and compares the calculated FCS to the FCSreceived in the frame. The host finds that the twoFCS values do not match. What action will be takenby the host?
The host discards the frame.
The host processes the data frame normally. The host initiates a request for
retransmission of the frame.
The host sends the frame content to an upperlayer protocol for error recovery.
16. Why would a company install a switch instead ofa hub when building or expanding a corporatenetwork?
A switch manages frames faster than a hubdoes.
A switch operates at 100 Mbps. A huboperates at a maximum of 10 Mbps.
A switch modifies the Ethernet frame toremove any errors. A hub forwards theframe exactly as it arrived.
A switch provides more bandwidth bysending frames only out the port to whichthe destination device is attached. A hubsends the frame out all ports except thesource port.
17.
Refer to the exhibit. What is the order of the TCP/IP
Protocol Data Units as data is moved as indicatedthrough the OSI model?
bits, segments, frames, packets, data bits, frames, packets, segments, data bits, frames, segments, packets, data bits, packets, frames, segments, data
18. After an unsuccessful ping to the local router,the technician decides to investigate the router. Thetechnician observes that the lights and fan on therouter are not operational. In which layer of the OSI
model is the problem most likely occurring?
transport network data link physical
19. Which of the following statements are correctabout CSMA/CD? (Choose three.)
It is a media access method used in LANs. It is a media access method used in FDDI
WANs.
When a device needs to transmit, it checksto see if the media is available.
A device sends data without checking mediaavailability because all devices have equalaccess.
http://ccnaanswers.com/wp-content/uploads/CCNA1FinalExamAnswersV3.14.jpg -
7/28/2019 Jarkom CCNA Exam
21/29
Multiple devices can successfully transmitsimultaneously.
Only one device can successfully transmit ata time.
20. A network administrator has installed a 24 port
switch and connected 10 computers with 10/100NICs. If the NICs are operating at 100 Mbps, how
much bandwidth is available for each computer to
receive data? 0.24 Mbps 4.17 Mbps 10 Mbps 24 Mbps 100 Mbps 200 Mbps
21.
Refer to the exhibit. A newly hired technician has a
task of terminating CAT 5 UTP cables. The networkadministrator visually examined the cables thetechnician terminated. Some of the cables have
connectors as shown in the exhibit. What should thenetwork administrator explain to the technician
about the cables?
Both cables are acceptable. The cable in Graphic A will produce more
crosstalk.
The cable in Graphic A should be used inthe more critical network segments.
The cable in Graphic A is preferred becauseit will be easier to crimp the connector.
22. Which technologies are considered to be LANtechnologies? (Choose two.)
DSL Token Ring Frame Relay ISDN Ethernet
Refer to the exhibit. The connections in the exhibitare labeled A through E. Which of these indicateLAN links? (Choose two.)
link A link B link C link D link E
24.
Consider the networks shown in the exhibit. Host Ais sending packets to host B. Which layer of the OSImodel is being used when the router is making the
calculated decision to determine which interface tosend the packet out?physical
data linknetworktransportsessionpresentation
25. What are important characteristics to considerwhen purchasing a network interface card? (Choose
two.)security used on the network
media used on the network system bus used on the computer software installed on the network diagnostic tools installed on the network
26.
http://ccnaanswers.com/wp-content/uploads/CCNA1FinalExamAnswersV3.17.jpghttp://ccnaanswers.com/wp-content/uploads/CCNA1FinalExamAnswersV3.16.jpghttp://ccnaanswers.com/wp-content/uploads/CCNA1FinalExamAnswersV3.15.jpghttp://ccnaanswers.com/wp-content/uploads/CCNA1FinalExamAnswersV3.17.jpghttp://ccnaanswers.com/wp-content/uploads/CCNA1FinalExamAnswersV3.16.jpghttp://ccnaanswers.com/wp-content/uploads/CCNA1FinalExamAnswersV3.15.jpghttp://ccnaanswers.com/wp-content/uploads/CCNA1FinalExamAnswersV3.17.jpghttp://ccnaanswers.com/wp-content/uploads/CCNA1FinalExamAnswersV3.16.jpghttp://ccnaanswers.com/wp-content/uploads/CCNA1FinalExamAnswersV3.15.jpg -
7/28/2019 Jarkom CCNA Exam
22/29
Refer to the exhibit. Which diagram represents thenetwork topology that an administrator wouldprefer, and why would the administrator prefer it?
Diagram A. It provides the hosts with full-duplex connections.
Diagram A. It will better provide availablebandwidth to the hosts.
Diagram B. It extends the collision domain. Diagram B. It prevents the frames from
looping.
Either network will perform equally well.27.
Refer to the exhibit. The physical documentationshows a portion of the internetwork of the ABCCompany. Which segments will be free of
collisions?
segments 1 and 2 segments 1, 2, and 3 segments 1, 2, 3, 4, and 5 segments 2 and 3 segments 3, 4, and 5 segments 4, and 5
28.
Refer to the exhibit. The network administratorwants to create a subnet for the point-to-pointconnection between the two routers. Which
subnetwork mask would provide enough addressesfor the point-to-point link with the least number ofwasted addresses?
255.255.255.192
255.255.255.224 255.255.255.240 255.255.255.248
255.255.255.25229.sama 22nya
Refer to the exhibit. What kind of Ethernet cable isrepresented?
rollover cable straight-through cable crossover cable console cable
30.
Based on the graphic above, which of the followingoccurs as each host system comes on line in thetopology?
The switch sends its MAC address to eachhost.
The switch adds MAC address to the bridgetable as each host sends a frame.
Each host exchanges MAC addresses witheach other.
The switch listens for data traffic to blocksince the switch lacks an IP address.
31. Two peer hosts are exchanging data using TFTP.During the current session, a datagram fails to arriveat the destination. Which statement is true regardingthe retransmission of the datagram?
Datagram retransmission requires userauthentication.
Datagram retransmission is controlled bythe application.
Datagram retransmission relies on theacknowledgements at transport layer.
Datagram retransmission occurs when theretransmission timer expires in the sourcehost.
32. Which type of address is 192.168.170.112/28?
host address subnetwork address broadcast address multicast address
http://ccnaanswers.com/wp-content/uploads/CCNA1FinalExamAnswersV3.112.jpghttp://ccnaanswers.com/wp-content/uploads/CCNA1FinalExamAnswersV3.111.jpghttp://ccnaanswers.com/wp-content/uploads/CCNA1FinalExamAnswersV3.110.jpghttp://ccnaanswers.com/wp-content/uploads/CCNA1FinalExamAnswersV3.19.jpghttp://ccnaanswers.com/wp-content/uploads/CCNA1FinalExamAnswersV3.18.jpghttp://ccnaanswers.com/wp-content/uploads/CCNA1FinalExamAnswersV3.112.jpghttp://ccnaanswers.com/wp-content/uploads/CCNA1FinalExamAnswersV3.111.jpghttp://ccnaanswers.com/wp-content/uploads/CCNA1FinalExamAnswersV3.110.jpghttp://ccnaanswers.com/wp-content/uploads/CCNA1FinalExamAnswersV3.19.jpghttp://ccnaanswers.com/wp-content/uploads/CCNA1FinalExamAnswersV3.18.jpghttp://ccnaanswers.com/wp-content/uploads/CCNA1FinalExamAnswersV3.112.jpghttp://ccnaanswers.com/wp-content/uploads/CCNA1FinalExamAnswersV3.111.jpghttp://ccnaanswers.com/wp-content/uploads/CCNA1FinalExamAnswersV3.110.jpghttp://ccnaanswers.com/wp-content/uploads/CCNA1FinalExamAnswersV3.19.jpghttp://ccnaanswers.com/wp-content/uploads/CCNA1FinalExamAnswersV3.18.jpghttp://ccnaanswers.com/wp-content/uploads/CCNA1FinalExamAnswersV3.112.jpghttp://ccnaanswers.com/wp-content/uploads/CCNA1FinalExamAnswersV3.111.jpghttp://ccnaanswers.com/wp-content/uploads/CCNA1FinalExamAnswersV3.110.jpghttp://ccnaanswers.com/wp-content/uploads/CCNA1FinalExamAnswersV3.19.jpghttp://ccnaanswers.com/wp-content/uploads/CCNA1FinalExamAnswersV3.18.jpghttp://ccnaanswers.com/wp-content/uploads/CCNA1FinalExamAnswersV3.112.jpghttp://ccnaanswers.com/wp-content/uploads/CCNA1FinalExamAnswersV3.111.jpghttp://ccnaanswers.com/wp-content/uploads/CCNA1FinalExamAnswersV3.110.jpghttp://ccnaanswers.com/wp-content/uploads/CCNA1FinalExamAnswersV3.19.jpghttp://ccnaanswers.com/wp-content/uploads/CCNA1FinalExamAnswersV3.18.jpg -
7/28/2019 Jarkom CCNA Exam
23/29
-
7/28/2019 Jarkom CCNA Exam
24/29
and Host B. However, the distance between the two
hosts is further than the cabling standards allow.Which two devices that operate at the physical layerof the OSI can be used to allow Host A and Host Bto communicate? (Choose two.)
switch hub bridge router repeater
41.
Refer to the exhibit. Workstation 1 pings the Fa0/1interface of Router 1. Which MAC address will
workstation 1 obtain during the ARP request for thiscommunication?
00-06-5B-88-DF-C3 00-B0-D0-7F-F7-46 00-0F-24-85-75-C0 00-0B-E5-64-BD-44 00-08-A3-B6-CE-02 00-08-A3-B6-CE-03
42.
Refer to the exhibit. A network technician is tryingto determine the correct IP address configuration forHost A. What is a valid configuration for Host A?
IP address: 192.168.100.19; Subnet Mask:255.255.255.248; Default Gateway:192.16.1.2
IP address: 192.168.100.20; Subnet Mask:255.255.255.240; Default Gateway:192.168.100.17
IP address: 192.168.100.21; Subnet Mask:255.255.255.248; Default Gateway:192.168.100.18
IP address: 192.168.100.22; Subnet Mask:255.255.255.240; Default Gateway: 10.1.1.5
IP address: 192.168.100.30; Subnet Mask:255.255.255.240; Default Gateway:192.168.1.1
IP address: 192.168.100.31; Subnet Mask:255.255.255.240; Default Gateway:192.168.100.18
43. Which subnet masks could be used when
subnetting a Class B IP address? (Choose two.)
255.255.255.240 255.255.192.0 255.255.0.0 255.192.0.0 240.0.0.0 255.0.0.0
44. A network administrator has added a new switchto the network. The new switch connects to anexisting switch that is already installed. Which UTPcable correctly connects the new switch to theexisting switch?
crossover rollover straight-through console
45.
A technician is testing connectivity between thedevices using the ping command. Pings betweenHost B and Host A were successful. The techniciancould not ping the R3 address 172.16.3.2 from HostA. The technician issued ipconfig from Host A andsaw the information displayed in the exhibit. What is
the most likely problem?
The IP address of Host A is incorrect. The subnet mask of Host A is incorrect. The default gateway of Host A is incorrect. Host A is properly configured. Some other
problem exists in the internetwork.
46. A router interface has been assigned an IPaddress of 172.16.192.166 with a mask of
255.255.255.248. To which subnet does the IPaddress belong?
172.16.0.0 172.16.192.0 172.16.192.128 172.16.192.160 172.16.192.168 172.16.192.176
47.
http://ccnaanswers.com/wp-content/uploads/CCNA1FinalExamAnswersV3.120.jpghttp://ccnaanswers.com/wp-content/uploads/CCNA1FinalExamAnswersV3.119.jpghttp://ccnaanswers.com/wp-content/uploads/CCNA1FinalExamAnswersV3.118.jpghttp://ccnaanswers.com/wp-content/uploads/CCNA1FinalExamAnswersV3.120.jpghttp://ccnaanswers.com/wp-content/uploads/CCNA1FinalExamAnswersV3.119.jpghttp://ccnaanswers.com/wp-content/uploads/CCNA1FinalExamAnswersV3.118.jpghttp://ccnaanswers.com/wp-content/uploads/CCNA1FinalExamAnswersV3.120.jpghttp://ccnaanswers.com/wp-content/uploads/CCNA1FinalExamAnswersV3.119.jpghttp://ccnaanswers.com/wp-content/uploads/CCNA1FinalExamAnswersV3.118.jpg -
7/28/2019 Jarkom CCNA Exam
25/29
How many collision domains are shown in thediagram?
three four five six seven eight
48. A large company has a network that is constantlychanging. The routing tables in the routers need tobe adjusted to reflect the changes in the routingpaths. What type of routing would the networkadministrator implement?
static routes dynamic routing protocols only default routes none. No routing is necessary.
1. Which of the following protocols are examples of
TCP/IP transport layer protocols?
a. Ethernet
b. HTTP
c. IPd. UDP
e. SMTP
f. TCP
2. Which of the following protocols are examples of
TCP/IP network access layer
protocols?
a. Ethernet
b. HTTP
c. IPd. UDP
e. SMTP
f. TCP
g. PPP
3. The process of HTTP asking TCP to send some
data and make sure that it is received
correctly is an example of what?
a. Same-layer interaction
b. Adjacent-layer interaction
c. The OSI model
d. All the other answers are correct.
4. The process of TCP on one computer marking a
segment as segment 1, and the
receiving computer then acknowledging the receipt
of segment 1, is an example of
what?
a. Data encapsulation
b. Same-layer interaction
c. Adjacent-layer interaction
d. The OSI model
e. None of these answers are correct.
5. The process of a web server adding a TCP header
to a web page, followed by adding
an IP header, and then a data link header and trailer
is an example of what?
a. Data encapsulation
b. Same-layer interaction
c. The OSI model
d. All of these answers are correct.
6. Which of the following terms is used specifically
to identify the entity that is created
when encapsulating data inside data link layer
headers and trailers?
a. Data
b. Chunk
c. Segment
d. Frame
e. Packetf. None of thesethere is no encapsulation by the
data link layer.
7. Which OSI layer defines the functions of logical
network-wide addressing and routing?
a. Layer 1
b. Layer 2
c. Layer 3
d. Layer 4
e. Layer 5
f. Layer 6
g. Layer 7
8. Which OSI layer defines the standards for cabling
and connectors?
a. Layer 1
b. Layer 2
c. Layer 3
d. Layer 4
e. Layer 5
f. Layer 6
g. Layer 7
http://ccnaanswers.com/wp-content/uploads/CCNA1FinalExamAnswersV3.121.jpg -
7/28/2019 Jarkom CCNA Exam
26/29
9. Which OSI layer defines the standards for data
formats and encryption?
a. Layer 1
b. Layer 2
c. Layer 3
d. Layer 4
e. Layer 5
f. Layer 6
g. Layer 7
10. Which of the following terms are not valid terms
for the names of the seven OSI layers?
a. Application
b. Data link
c. Transmission
d. Presentation
e. Internet
f. Session
1. Which of the following is true about the cabling
of a typical modern Ethernet LAN?
a. Connect each device in series using coaxial
cabling
b. Connect each device in series using UTP cabling
c. Connect each device to a centralized LAN hub
using UTP cabling
d. Connect each device to a centralized LAN
switch using UTP cabling
2. Which of the following is true about the cabling
of a 10BASE2 Ethernet LAN?
a. Connect each device in series using coaxial
cabling
b. Connect each device in series using UTP cabling
c. Connect each device to a centralized LAN hub
using UTP cabling
d. Connect each device to a centralized LAN switch
using UTP cabling
3. Which of the following is true about Ethernet
crossover cables?
a. Pins 1 and 2 are reversed on the other end of the
cable.
b. Pins 1 and 2 on one end of the cable connect to
pins 3 and 6 on the other end of the cable.
c. Pins 1 and 2 on one end of the cable connect to
pins 3 and 4 on the other end of the cable.
d. The cable can be up to 1000 meters long to cross
over between buildings.
e. None of the other answers is correct.
4. Each answer lists two types of devices used in a
100BASE-TX network. If these
devices were connected with UTP Ethernet cables,
which pairs of devices would
require a straight-through cable?
a. PC and router
b. PC and switch
c. Hub and switch
d. Router and hub
e. Wireless access point (Ethernet port) and
switch
5. Which of the following is true about the
CSMA/CD algorithm?
a. The algorithm never allows collisions to occur.
b. Collisions can happen, but the algorithm
defines how the computers should notice a
collision and how to recover.
c. The algorithm works with only two devices on thesame Ethernet.
d. None of the other answers is correct.
6. Which of the following is a collision domain?
a. All devices connected to an Ethernet hub
b. All devices connected to an Ethernet switch
c. Two PCs, with one cabled to a router Ethernet
port with a crossover cable and the
other PC cabled to another router Ethernet port with
a crossover cabled. None of the other answers is correct.
7. Which of the following describe a shortcoming of
using hubs that is improved by
instead using switches?
a. Hubs create a single electrical bus to which all
devices connect, causing the devices to share the
bandwidth.
b. Hubs limit the maximum cable length of
individual cables (relative to switches)
c. Hubs allow collisions to occur when two
attached devices send data at the same
time.
d. Hubs restrict the number of physical ports to at
most eight.
8. Which of the following terms describe Ethernet
addresses that can be used to
communicate with more than one device at a time?
a. Burned-in address
b. Unicast address
c. Broadcast address
d. Multicast address
-
7/28/2019 Jarkom CCNA Exam
27/29
9. Which of the following is one of the functions of
OSI Layer 2 protocols?
a. Framing
b. Delivery of bits from one device to another
c. Error recovery
d. Defining the size and shape of Ethernet cards
10. Which of the following are true about the format
of Ethernet addresses?
a. Each manufacturer puts a unique code into the
first 2 bytes of the address.
b. Each manufacturer puts a unique code into the
first 3 bytes of the address.
c. Each manufacturer puts a unique code into the
first half of the address.
d. The part of the address that holds this
manufacturers code is called the MAC.
e. The part of the address that holds thismanufacturers code is called the OUI.
f. The part of the address that holds this
manufacturers code has no specific name.
11. Which of the following is true about the Ethernet
FCS field?
a. It is used for error recovery.
b. It is 2 bytes long.
c. It resides in the Ethernet trailer, not the
Ethernet header.d. It is used for encryption.
e. None of the other answers is correct.
1. Which of the following best describes the main
function of OSI Layer 1 protocols?
a. Framing
b. Delivery of bits from one device to another
c. Addressing
d. Local Management Interface (LMI)
e. DLCI
2. Which of the following typically connects to a
four-wire line provided by a telco?
a. Router serial interface
b. CSU/DSU
c. Transceiver
d. Switch serial interface
3. Which of the following typically connects to a
V.35 or RS-232 end of a cable when
cabling a leased line?
a. Router serial interface
b. CSU/DSU
c. Transceiver
d. Switch serial interface
4. On a point-to-point WAN link using a leased line
between two routers located
hundreds of miles apart, what devices are considered
to be the DTE devices?
a. Routers
b. CSU/DSU
c. The central office equipment
d. A chip on the processor of each router
e. None of these answers are correct.
5. Which of the following functions of OSI Layer 2
is specified by the protocol standard
for PPP, but is implemented with a Cisco proprietary
header field for HDLC?
a. Framing
b. Arbitrationc. Addressing
d. Error detection
e. Identifying the type of protocol that is inside
the frame
6. Imagine that Router1 has three point-to-point
serial links, one link each to three remote
routers. Which of the following is true about the
required HDLC addressing at
Router1?a. Router1 must use HDLC addresses 1, 2, and 3.
b. Router1 must use any three unique addresses
between 1 and 1023.
c. Router1 must use any three unique addresses
between 16 and 1000.
d. Router1 must use three sequential unique
addresses between 1 and 1023.
e. None of these answers are correct.
7. What is the name of the Frame Relay field used to
identify Frame Relay virtual
circuits?
a. Data-link connection identifier
b. Data-link circuit identifier
c. Data-link connection indicator
d. Data-link circuit indicator
e. None of these answers are correct.
8. Which of the following is true about Frame Relay
virtual circuits (VCs)?
a. Each VC requires a separate access link.
b. Multiple VCs can share the same access link.
-
7/28/2019 Jarkom CCNA Exam
28/29
c. All VCs sharing the same access link must
connect to the same router on the
other side of the VC.
d. All VCs on the same access link must use the
same DLCI.
1. Which of the following are functions of OSI
Layer 3 protocols?
a. Logical addressing
b. Physical addressing
c. Path selection
d. Arbitration
e. Error recovery
2. Imagine that PC1 needs to send some data to PC2,
and PC1 and PC2 are separated by
several routers. What are the largest entities that
make it from PC1 to PC2?
a. Frameb. Segment
c. Packet
d. L5 PDU
e. L3 PDU
f. L1 PDU
3. Imagine a network with two routers that are
connected with a point-to-point HDLC serial link.
Each router has an Ethernet, with PC1 sharing the
Ethernet with Router1, and PC2 sharing the Ethernet
with Router2. When PC1 sends data to PC2, whichof the following is true?
a. Router1 strips the Ethernet header and trailer
off the frame received from PC1, never to be used
again.
b. Router1 encapsulates the Ethernet frame inside an
HDLC header and sends the frame to Router2,
which extracts the Ethernet frame for forwarding to
PC2.
c. Router1 strips the Ethernet header and trailer off
the frame received from PC1, which is exactly re-
created by R2 before forwarding data to PC2.
d. Router1 removes the Ethernet, IP, and TCP
headers and rebuilds the appropriate headers before
forwarding the packet to Router2.
4. Which of the following are valid Class C IP
addresses that can be assigned to hosts?
a. 1.1.1.1
b. 200.1.1.1
c. 128.128.128.128
d. 224.1.1.1
e. 223.223.223.255
5. What is the range of values for the first octet for
Class A IP networks?
a. 0 to 127
b. 0 to 126
c. 1 to 127
d. 1 to 126
e. 128 to 191
f. 128 to 192
6. PC1 and PC2 are on two different Ethernets that
are separated by an IP router. PC1s
IP address is 10.1.1.1, and no subnetting is used.
Which of the following addresses
could be used for PC2?
a. 10.1.1.2
b. 10.2.2.2
c. 10.200.200.1
d. 9.1.1.1
e. 225.1.1.1f. 1.1.1.1
7. Each Class B network contains how many IP
addresses that can be assigned to hosts?
a. 16,777,214
b. 16,777,216
c. 65,536
d. 65,534
e. 65,532
f. 32,768g. 32,766
8. Each Class C network contains how many IP
addresses that can be assigned to hosts?
a. 65,534
b. 65,532
c. 32,768
d. 32,766
e. 256
f. 254
9. Which of the following does a router normally use
when making a decision about
routing TCP/IP packets?
a. Destination MAC address
b. Source MAC address
c. Destination IP address
d. Source IP address
e. Destination MAC and IP address
10. Which of the following are true about a LAN-
connected TCP/IP host and its IP routing
(forwarding) choices?
-
7/28/2019 Jarkom CCNA Exam
29/29
a. The host always sends packets to its default
gateway.
b. The host sends packets to its default gateway if
the destination IP address is in a different class of
IP network than the host.
c. The host sends packets to its default gateway if
the destination IP address is in a different subnet
than the host.
d. The host sends packets to its default gateway if
the destination IP address is in the same subnet as
the host.
11. Which of the following are functions of a routing
protocol?
a. Advertising known routes to neighboring
routers.
b. Learning routes for subnets directly connected to
the router.
c. Learning routes, and putting those routes intothe routing table, for routes adver-tised to the
router by its neighboring routers.
d. To forward IP packets based on a packets
destination IP address.
12. Which of the following protocols allows a client
PC to discover the IP address of another computer
based on that other computers name?
a. ARP
b. RARPc. DNS
d. DHCP
13. Which of the following protocols allows a client
PC to request assignment of an IP address as well as
learn its default gateway?
a. ARP
b. RARP
c. DNS
d. DHCP