Download CCNA 1 Final examination practices 2025 Questions and answers and more Exams Mass Communication in PDF only on Docsity!
CCNA 1 Final examination practices 2025 Questions and answers
1. Which communication tool allows real-timecollaboration?
• wiki
• e-mail
• weblog
• instant messaging
2. A host is accessing a Web server on a remote network. Which three functions are performed by intermediary
network devices during this conversation? (Choose three.)
• regenerating data signals
• acting as a client or a server
• providing a channel over which messages travel
• applying security settings to control the flow of data
• notifying other devices when errors occur
• serving as the source or destination of the messages
3. A home user is looking for an ISP connection that provides high speed digital transmission over regular
phone lines. What ISP connection type should be used?
• DSL
• dial-up
• satellite
• cell modem
• cable modem
4. A company is expanding its business to other countries.All branch offices must remain connected to corporate
headquarters at all times. Which network technology is required to support this requirement?
• LAN
• MAN
• WAN
• WLAN
• Refer to the exhibit. From which location did this routerload the IOS?
• flash memory
• NVRAM?
• RAM
• ROM
• a TFTP server?
5. Which connection provides a secure CLI session withencryption to a Cisco network device?
• a console connection
• an AUX connection
• a Telnet connection
• an SSH connection
6. Refer to the exhibit. An administrator is trying to configure the switch but receives the error message that is
displayed in the exhibit. What is the problem? CCNA 1 Final Exam Answer 002 (v5.02, 2015)
• The entire command, configure terminal, must be used.
• The administrator is already in global configuration mode.
• The administrator must first enter privileged EXEC mode before issuing thecommand.
• The administrator must connect via the console port to access globalconfiguration mode.
7. An administrator uses the Ctrl-Shift- 6 key combinationon a switch after issuing the ping command. What is
the purpose of using these keystrokes?
• to restart the ping process
• to interrupt the ping process
• to exit to a different configuration mode
• to allow the user to complete the command
8. What function does pressing the Tab key have whenentering a command in IOS?
• It aborts the current command and returns to configuration mode.
• It exits configuration mode and returns to user EXEC mode.
• It moves the cursor to the beginning of the next line.
• It completes the remainder of a partially typed word in a command.
9. Refer to the exhibit. An administrator wants to changethe name of a brand new switch, using the hostname
command as shown. What prompt will display after the command is issued?? CCNA 1 Final Exam Answer 003 (v5.02, 2015)
• My Switch(config)#?
• Switch(config)#?
• MySwitch(config)#?
• My(config)#?
• Switch#
10. Refer to the exhibit. A network administrator is configuring access control to switch SW1. If the
administrator uses Telnet to connect to the switch, whichpassword is needed to access user EXEC mode?
• MAC address
• logical address
17. What is the protocol that is used to discover a physicaladdress from a known logical address and what
message type does it use?
• ARP, multicast
• DNS, unicast
• DNS, broadcast
• ARP, broadcast
• PING, multicast
• PING, broadcast
18. What will happen if the default gateway address isincorrectly configured on a host?
• The host cannot communicate with other hosts in the local network.
• The switch will not forward packets initiated by the host.
• The host will have to use ARP to determine the correct address of the defaultgateway.
• The host cannot communicate with hosts in other networks.
• A ping from the host to 127.0.0.1 would not be successful.
19. What is an important function of the physical layer ofthe OSI model?
• It accepts frames from the physical media.
• It encapsulates upper layer data into frames.
• It defines the media access method performed by the hardware interface.
• It encodes frames into electrical, optical, or radio wave signals.
20. Which procedure is used to reduce the effect ofcrosstalk in copper cables?
• requiring proper grounding connections
• twisting opposing circuit wire pairs together
• wrapping the bundle of wires with metallic shielding
• designing a cable infrastructure to avoid crosstalk interference
• avoiding sharp bends during installation
21. Which two statements describe the characteristics offiber-optic cabling? (Choose two.)
• Fiber-optic cabling does not conduct electricity.
• Fiber-optic cabling has high signal loss.
• Fiber-optic cabling is primarily used as backbone cabling.
• Multimode fiber-optic cabling carries signals from multiple sending devices.
• Fiber-optic cabling uses LEDs for single-mode cab?les and laser technology formultimode cables.
22. What is contained in the trailer of a data-link frame?
• logical address
• physical address
• data
• error detection
23. What is the auto-MDIX feature on a switch?
• the automatic configuration of an interface for 10/100/1000 Mb/s operation
• the automatic configuration of an interface for a straight-through or a
• crossover Ethernet cable connection
• the automatic configuration of full-duplex operation over a single Ethernet copperor optical cable
• the ability to turn a switch interface on or off accordingly if an active connection isdetected
• DNS
• NAT
• SMB
• DHCP
• HTTP
28. Refer to the exhibit. Consider the IP address configuration shown from PC1. What is a description of thedefault
gateway address? CCNA 1 Final Exam Answer 006 (v5.02, 2015)
• It is the IP address of the Router1 interface that connects the company to theInternet.
• It is the IP address of the Router1 interface that connects the PC1 LAN toRouter1.
• It is the IP address of Switch1 that connects PC1 to other devices on the sameLAN.
• It is the IP address of the ISP network device located in the cloud.
29. Which of the following are primary functions of arouter? (Choose two.)
• packet switching
• microsegmentation
• domain name resolution
• path selection
• flow control
30. Which two statements correctly describe a routermemory type and its contents? (Choose two.)
• ROM is nonvolatile and stores the running IOS.
• FLASH is nonvolatile and contains a limited portion of the IOS?.
• RAM is volatile and stores the running configuration.
• NVRAM is nonvolatile and stores a full version of the IOS.
• ROM is nonvolatile and stores bootup information.
31. In which default order will a router search for startupconfiguration information?
• NVRAM, RAM, TFTP
• NVRAM, TFTP, setup mode
• setup mode, NVRAM, TFTP
• TFTP, ROM, NVRAM
• flash, ROM, setup mode
32. What happens when part of an Internet VoIP transmission is not delivered to the
destination?
• A delivery failure message is sent to the source host.
• The part of the VoIP transmission that was lost is re-sent.
• The entire transmission is re-sent.
• The transmission continues without the missing portion.
33. Which three IP addresses are private? (Choose three.)
34. How many bits make up the single IPv6 hextet :10CD:?
35. What is the effect of configuring the ipv6 unicast-routing command on a router?
• to assign the router to the all-nodes multicast group
• to enable the router as an IPv6 router
• to permit only unicast packets on the router
CCNA 1 Final Exam Answer 008 (v5.02, 2015)
• Site 4
42. Which two notations are useable nibble boundarieswhen subnetting in IPv6? (Choose two.)
43. A host PC has just booted and is attempting to lease anaddress through DHCP. Which two messages will the
clienttypically broadcast on the network? (Choose two.)
• DHCPDISCOVER
• DHCPOFFER
• DHCPREQUEST
• DHCPACK
• DHCPNACK
44. What is the purpose of the network security accountingfunction?
• to require users to prove who they are
• to determine which resources a user can access
• to keep track of the actions of a user
• to provide challenge and response questions
45. When applied to a router, which command would helpmitigate brute-force password attacks against the
router?
• exec-timeout 30
• service password-encryption
• banner motd $Max failed logins = 5$
• login block-for 60 attempts 5 within 60
46. A particular website does not appear to be respondingon a Windows 7 computer. What command could the
technician use to show any cached DNS entries for this web page?
• ipconfig /all
• arp - a
• ipconfig /displaydns
• nslookup
CCNA 1 Final Exam Answer 010 (v5.02, 2015)
49. What two preconfigured settings that affect security arefound on most new wireless routers? (Choose two.)
• broadcast SSID
• MAC filtering enabled
• WEP encryption enabled
• PSK authentication required
• default administrator password
50. Which type of wireless security generates dynamic encryption keys each time a client associates with an
AP?
• EAP
• PSK
• WEP
• WPA
51. Fill in the blank.
TFTP is a best-effort, connectionless application layer protocol that is used to transfer files.
52. Which two components are necessary for a wirelessclient to be installed on a WLAN? (Choose two.)
• media
• wireless NIC
• custom adapter
• crossover cable
• wireless bridge
• wireless client software
53. Consider the following range of addresses:2001:0DB8:BC15:00A0:0000::
2001:0DB8:BC15:00A1:0000:: 2001:0DB8:BC15:00A2:0000::
… 2001:0DB8:BC15:00AF:0000::
The prefix-length for the range of addresses is / .
54. Match the phases to their correct stage in the routerbootup process. (Not all options are used.)
CCNA 1 Final Exam Answer 011 (v5.02, 2015)
55. A host is accessing an FTP server on a remote network.Which three functions are performed by intermediary
network devices during this conversation? (Choose three.)
• regenerating data signals
• acting as a client or a server
• providing a channel over which messages travel
• applying security settings to control the flow of data
• notifying other devices when errors occur
• serving as the source or destination of the messages
56. When is a dial-up connection used to connect to anISP?
• when a cellular telephone provides the service
• when a high-speed connection is provided over a cable TV network
• when a satellite dish is used
• HR(config)#?
• Switch#
62. After making configuration changes on a Cisco switch,a network administrator issues a copy running-config
startup-config command. What is the result of issuing thiscommand?
• The new configuration will be stored in flash memory.
• The new configuration will be loaded if the switch is restarted.
• The current IOS file will be replaced with the newly configured file.
• The configuration changes will be removed and the original configuration will berestored.
63. On which switch interface would an administrator configure an IP address so that the switch can be managed
remotely?
• FastEthernet0/
• VLAN 1
• vty 0
• console 0
64. A technician uses the ping 127.0.0.1 command. What isthe technician testing?
• the TCP/IP stack on a network host
• connectivity between two adjacent Cisco devices
• connectivity between a PC and the default gateway
• connectivity between two PCs on the same network
• physical connectivity of a particular PC and the network
65. What is the correct order for PDU encapsulation?
CCNA 1 Final Exam Answer 013 (v5.02, 2015)
66. Which device should be used for enabling a host tocommunicate with another host on a different
network?
• switch
• hub
• router
• host
67. A network technician is measuring the transfer of bitsacross the company backbone for a mission critical
application. The technician notices that the network throughput appears lower than the bandwidth expected. Which three factors could influence the differences in throughput? (Choose three.)
• the amount of traffic that is currently crossing the network
• the sophistication of the encapsulation method applied to the data
• the type of traffic that is crossing the network
• the latency that is created by the number of network devices that the data iscrossing
• the bandwidth of the WAN connection to the Internet
• the reliability of the gigabit Ethernet infrastructure of the backbone
68. Which characteristics describe fiber optic cable?(Choose two.)
• It is not affected by EMI or RFI.
• Each pair of cables is wrapped in metallic foil.
• It combines the technique of cancellation, shielding and twisting to protect data.
74. Which two statements describe the functions orcharacteristics of ROM in a router? (Choose
two.)
• stores routing tables
• allows software to be updated without replacing pluggable chips on themotherboard
• maintains instructions for POST diagnostics
• holds ARP cache
• stores bootstrap program
75. Which statement describes a characteristic of theCisco router management ports?
• A console port is used for remote management of the router.
• A console port is not used for packet forwarding.
• Serial and DSL interfaces are types of management ports.
• Each Cisco router has a LED indicator to provide information about the status ofthe management ports.
76. What happens when part of an Internet radiotransmission is not delivered to the
destination?
• A delivery failure message is sent to the source host.
• The part of the radio transmission that was lost is re-sent.
• The entire transmission is re-sent.
• The transmission continues without the missing portion.
77. What is the dotted decimal representation of the IPv4address 11001011.00000000.01110001.11010011?
78. Which three IP addresses are private? (Choose three.)
79. What types of addresses make up the majority ofaddresses within the /8 block IPv4 bit space?
• private addresses
• public addresses
• multicast addresses
• experimental addresses
80. Refer to the exhibit. What is the maximum TTL valuethat is used to reach the destination
www.cisco.com?? CCNA 1 Final Exam Answer 014 (v5.02, 2015)
81. A company has a network address of 192.168.1.64 witha subnet mask of 255.255.255.192. The company wants
to create two subnetworks that would contain 10 hosts and 18 hosts respectively. Which two networks would achievethat? (Choose two.)
82. In a network that uses IPv4, what prefix would best fit asubnet containing 100 hosts?