Pdf-ccna-1-final-exam-answers-2019-v51v60-introduction-to-networks compress PDF

Title Pdf-ccna-1-final-exam-answers-2019-v51v60-introduction-to-networks compress
Course Network Fundamentals
Institution University of South Australia
Pages 102
File Size 7.6 MB
File Type PDF
Total Downloads 13
Total Views 126

Summary

sample exam...


Description



19/11/2019

CC N A 1 Final Exam A nsw ers 2019 (v5.1+v6.0) I ntroduction to N etw orks

IOS C Co ommands H He elp

Resources ces »

Download Download Cisco Cisco Packet Packet Tracer Tracer »

IP IP Subnet Subnet C C

Stop see

Donation Donations s

Why th Search the site

 CCNA v6 »

IT Essentials Esse ntials 7.0 »

CCNA CCNA Security Security v2.0 v2.0 »

CCNA Cyber Ops »

Linux » CCNA v6 » Linux »

IT Essential Essentials s 7.0 » IOS Commands Hel p

IP IP Subnet Subnet Calculators Calculators »

Donation

CCNA S Security ecurity v2.0 » Resources »

CCNA Cyber Ops »

Download Download Cisco Cisco Packet Packet Tracer Tracer »

Contact

CCNA 1 Final ExamAnswers ExamAnswers 2019 (v5.1+v6.0) Introduction to N Networks etworks Mar 7, 2 2016 016 | Last updated updated o on: n: Nov 13, 13, 2019 | CCNA 1 Ex Exam am Ans Answer wers, s, CCN CCNA A v6 | 153 Comments

Save Time, Edit Fast Fix misplaced commas, misused misused words, grammar grammar goofs, goofs, and more. Try now!



19/11/2019

CC N A 1 F inal Exam A nsw ers 2019 ( v5.1+v6.0) I ntroduction to N etw or ks

CCNA v5 + v6.0 Answers How to find:Press “Ctrl + F”in the browser and fill in whatever wording is in the question to find that question/answer.

CCNA 1

CCNA 2

CCNA 4

CCNA 1 EXAM A

NOTE: NOTE: If If you you have have the the new new question question on on this this test, test, please please comment Question and Multiple-Choice list in form below this article. We will update answers for you in the shortest time. Thank you! We truly value your contribution to the website.

FULL

CCNA 1 – Pretest CCNA CCNA 11 –– Chapter Chapter CCNA CCNA 11 –– Chapter Chapter CCNA CCNA 11 –– Chapter Chapter

Version 6.0:

CCNA CCNA 11 –– Chapter Chapter

1. 1. What What is is aa characteristic characteristic of of aa fault fault tolerant tolerant network? network?

CCNA CCNA 11 –– Chapter Chapter CCNA CCNA 11 –– Chapter Chapter

a network that protects confidential information from unauthorized unauthorized access access aa network network that that can can expand expand quickly quickly to to support support new new users users and and

CCNA CCNA 11 –– Chapter Chapter

applications applications without without impacting impacting the the performance performance of of the the service service delivered to existing users a network that supports a mechanism for managing congestion congestion and and ensuring ensuring reliable reliable delivery delivery of of content content to to all all users users a network that recovers quickly when a failure occurs and depends on redundancy to limit the impact of a failure*

CCNA CCNA 11 –– Chapter Chapter CCNA CCNA 11 –– Chapter Chapter

Explain: Fault tolerant networks limit the impact of a failure because the the networks networks are are built built in in aa way way that that allows allows for for quick quick recovery recovery when when such such aa failure failure occurs. occurs. These These networks networks depend depend on on multiple multiple or or redundant redundant paths paths between between the the source source and and destination of a message. AA scalable scalable network network can can expand expand quickly quickly to to support support new new users and and applications applications without without impacting impacting the the performance performance of of the the service service being being delivered delivered to to existing existing users. users. Quality of service (QoS) is a mechanism for managing congestion congestion and and ensuring ensuring reliable reliable delivery delivery of of content content to to all all users.

CCNA CCNA 11 –– Chapter Chapter CCNA CCNA 11 –– Chapter Chapter

CCNA CCNA 11 –– Chapter Chapter CCNA CCNA 11 PT PT Practic Practic CCNA CCNA 11 –– Practice Practice CCNA 1 – Final E

Donation by Amount:

Donate!

Recent Comme Buddy on CCNA 1 Answers Answers 2019 2019 (v5. (v5. Introduction Introduction to to Netw Netw



19/11/2019

CC N A 1 F inal Exam A nsw ers 2019 ( v5.1+v6.0) I ntroduction to N etw or ks

network, what will be the priorities from highest to lowest of the different data types?

financial financial transactions, transactions, audio audio conference, conference, web web page page audio conference, financial transactions, web page* audio conference, web page, financial transactions financial financial transactions, transactions, web web page, page, audio audio conference Explain: QoS QoS mechanisms mechanisms enable enable the the establishment establishment of of queue queue

management management strategies strategies that that enforce enforce priorities priorities for for different different categories categories of of application application data. data. Thus, Thus, this this queuing queuing enables enables voice data to have priority over transaction transaction data, data, which which has has priority over web data.

3. What is a benefit of using cloud computing in networking?

End End users users have have the the freedom freedom to to use use personal personal tools tools to to access access information information and and communicate communicate across across aa business business network. network. Network capabilities are extended without requiring investment in new infrastructure, personnel, or software.* Technology Technology is is integrated integrated into into every-day every-day appliances appliances allowing allowing them to interconnect with other devices, making them more ‘smart’ or automated. Home Home networking networking uses uses existing existing electrical electrical wiring wiring tto o connect devices devices to to the the network network wherever wherever there there is an electrical outlet, saving the cost of installing data cables. Explain: Cloud Cloud computing computing extends extends IT’s IT’s capabilities capabilities without without requiring requiring investment investment in in new new infrastructure, infrastructure, training training new new personnel, personnel, or or licensing licensing new new software. software. These These services services are are available available onondemand demand and and delivered delivered economically economically to to any any device anywhere

in in the the world world without without compromising compromising security security or or function. function. BYOD BYOD is about end users having the freedom to to use personal personal tools to to access access information information and andcommunicate communicate across across aa business business or or campus campus network. network. Smart Smart home home technology technology is is integrated integrated into into every-day every-day appliances appliances allowing allowing them them to to interconnect interconnect with with other other devices, making them more ‘smart’ or automated. Powerline networking is a trend for home home networking networking that that uses uses existing existing ll tt ii ll ii ii tt tt dd ii tt th th tt kk h

CCNA CCNA Questions Questions A A CCNA CCNA 44 Final Final Exam Exam (v5.0.3+v6.0) (v5.0.3+v6.0) –– Con Co Networks

[Cert] CCNA 20



19/11/2019

CC N A 1 F inal Exam A nsw ers 2019 ( v5.1+v6.0) I ntroduction to N etw or ks

It provides dedicated firewall services. ItIt provides provides the the intrusion intrusion protection protection services services for for the device. Explain: Most Most operating operating systems systems contain contain aa shell shell and and a kernel. The kernel kernel interacts interacts with with the the hardware hardware and and the the shell interfaces between the kernel and the users.

5. Which connection provides a secure CLI session with encryption to a Cisco switch?

a console connection connection an AUX connection a Telnet connection an SSH connection* Explain: AA CLI CLI session session using using Secure Secure Shell Shell (SSH) (SSH) provides provides enhanced enhanced security security because becauseSSH SSH supports supports strong strongpasswords passwords and and encryption encryption during during the the transport transport of of session session data. data. The other

methods methods support support authentication authentication but but not not encryption. encryption.

6. A network technician is attempting to configure an interface by entering the following command: SanJose(config)# SanJose(config)# ip ip address address 192.168.2.1 192.168.2.1 255.255.255.0. 255.255.255.0. The The command is rejected by the device. What is the reason for this? The command is being entered from the wrong mode of operation.* The The command command syntax syntax is is wrong. wrong.

The The subnet subnet mask mask information information ismust incorrect. incorrect. The interface is shutdown andis be enabled before the switch will accept the IP address. Explain: The wrong mode of operation is being used. The CLI prompt indicates that the mode of operation is global configuration. IP addresses addresses must must be beconfigured configuredfrom frominterface interface configuration configuration



19/11/2019

CC N A 1 F inal Exam A nsw ers 2019 ( v5.1+v6.0) I ntroduction to N etw or ks

to exit to a different configuration mode to allow the user to complete the command Explain: To interrupt interrupt an IOS IOS process such such as ping or traceroute, a user enters the Ctrl-Shift-6 key combination. T Tab ab completes the remainder of parameters or arguments within a command. T To o exit from configuration mode to privileged mode use the CtrlZZ keystroke. keystroke. CTRL-R CTRL-R will will redisplay redisplay the the line line just just typed, typed, thus thus

making making itit easier easier for for the the user user to to press press Enter Enter and and reissue reissue the the ping command.

8. Refer to the exhibit. A network administrator is configuring access access control control to to switch switch SW1. SW1. If If the the administrator administrator uses uses aa console connection to connect to the switch, which password is needed to access user EXEC mode?

letmein secretin linevtyin lineconin* Explain: Telnet elnet accesses accesses aa network network device through the virtual interface configured configured with with the the line line VTY VTY command. command. The The password password configured configured under under this this is is required required to to access access the user EXEC mode. mode. The The password password configured configured under under the the line line console console 00 command is required to gain entry through the console port,



19/11/2019

CC N A 1 F inal Exam A nsw ers 2019 ( v5.1+v6.0) I ntroduction to N etw or ks

VLAN 1* vty 0 console 0 Explain: Interface VLAN 1 is a virtual interface on a switch, called SVI (switch (switch virtual virtual interface). interface). Configuring Configuring an an IP IP address address on on tthe he default SVI, interface VLAN 1, will allow a switch to be accessed remotely remotely.. The VTY line must also be configured to

allow remote access, but an IP address address cannot cannot be be configured configured on this line.

10. What protocol is responsible for controlling the size of segments and the rate at which which segments are exchanged between a web client and a web server? TCP* IP HTTP Ethernet Explain: TCP TCP is is aa Layer Layer 44 protocol protocol of of the the OSI OSI model. model. TCP TCP has has several several responsibilities responsibilities in in the the network network communication communication process. process. ItIt divides divides large large messages messages into into smaller smaller segments segments which which are are more more efficient efficient to to send send across across the the network. network. ItIt also also controls controls the the size and rate of segments segments exchanged exchanged between between clients clients and and servers.

11. What is an advantage to using a protocol that is defined by an open standard?

A A company company can can monopolize monopolize the the market. market. The The protocol protocol can can only only be be run run on on equipment equipment from from aa specific specific vendor. An open standard protocol is not controlled or regulated by standards organizations. It encourages competition and promotes choices.*



19/11/2019

CC N A 1 F inal Exam A nsw ers 2019 ( v5.1+v6.0) I ntroduction to N etw or ks

12. What are two benefits of using a layered network model? (Choose two.) It assists in protocol design. * It speeds up packet delivery delivery.. ItIt prevents prevents designers designers from from creating creating their own model. It prevents technology in one layer from affecting other layers.* ItIt ensures ensures aa device device at at one one layer layer can can function function at at the the next next

higher layer. Explain: Some Some vendors vendors have have developed developed their their own own reference reference models models and and protocols. protocols. Today, Today, ifif aa device device is is to to communicate communicate on on the the Internet, the device must use the TCP/IP model. The benefits of using a layered model are as follows: assists in protocol design fosters fosters competition competition between between vendors vendors prevents prevents aa technology technology that that functions functions at at one one layer layer from from affecting any other layer provides provides aa common common language language for for describing describing network network

functionality helps helps in in visualizing visualizing the the interaction interaction between between each each layer layer and and protocols protocols between between each each layer layer

13. 13. Which Which two two OSI OSI model model layers layers have have the the same same functionality functionality as two layers of the TCP/IP model? (Choose two.)

data link network* physical session transport* Explain: The OSI transport layer is ffunctionally unctionally equivalen equivalentt to the TCP/IP TCP/IP transport transport layer, layer, and and the the OSI OSI network network layer layer is is equivalent to the the TCP/IP internet layer. The OSI data link and physical physical layers layers together together are are equivalent equivalent to to the the TCP/IP TCP/IP network network



19/11/2019

CC N A 1 F inal Exam A nsw ers 2019 ( v5.1+v6.0) I ntroduction to N etw or ks

packet segment* Explain: Application Application data data is is passed passed down down the the protocol protocol stack stack on on its way to to be be transmitted transmitted across across the the network network media. media. During During the the process, process, various various protocols protocols add add information information to to itit at each level. At At each each stage stage of of the the process, process, aa PDU PDU (protocol (protocol data data unit) unit) has has a different name to reflect its new functions. The PDUs are

named according to the protocols of the TCP/IP suite: Data Data –– The The general general term term for for the the PDU used at at the the application application layer. Segment – transport layer layer PDU Packet – network network layer PDU PDU Frame – data link layer PDU Bits Bits –– AA physical physical layer layer PDU PDU used used when when physically physically transmitting transmitting data over the medium

15. A network engineer is measuring the transfer of bits across the company backbone for a mission critical database application. The engineer notices that the network throughput appears lower than the bandwidth expected. Which three factors could influence the differences in throughput? (Choose three.) the amount of traffic that is currently crossing the network* the the sophistication sophistication of of the the encapsulation encapsulation method method applied applied to to the the data the type of traffic that is crossing the network* the latency that is created by the number of network devices that the data is crossing*

the thegigabit WAN connection to the Internet the bandwidth reliability ofofthe Ethernet infrastructure of the backbone Explain: Throughput Throughput usually usually does does not not match match the the specified specified bandwidth bandwidth of physical links due to multiple factors. These factors include include the the amount amount of of traffic traffic type type of of traffic traffic and and latency latency



19/11/2019

CC N A 1 F inal Exam A nsw ers 2019 ( v5.1+v6.0) I ntroduction to N etw or ks

presentation layer network layer physical layer* data link layer Explain: The The NIC NIC has has responsibilities responsibilities in in both both Layer Layer 11 and and Layer 2. The NIC NIC encodes encodes the the frame frame as as aa series series of of signals signals that that are are transmitted onto the local media. This is the responsibility of

the physical layer of the OSI model. The signal could be in the form of electrical, optical, or radio waves.

17. Which type of of UTP UTP cable cable is is used used to to connect a PC to to aa switch port?

console rollover crossover straight-through**

Explain: AA rollover rollover cable cable is is aa Cisco Cisco proprietary proprietary cable cable used used to connect to to aa router router or or switch switch console console port. port. A A straight-through straight-through (also (also called called patch) patch) cable cable is is usually usually used used to to interconnect interconnect aa host to a switch and a switch to aa router. router. A A crossover crossover cable cable is is used used to to interconnect interconnect similar similar devices devices together, together, for for example, example, between between two two switches, switches, two two routers, routers, and and two two hosts. hosts.

18. A network administrator is measuring the transfer of bits across the company backbone for a mission critical financial application. The administrator notices that the network throughput appears lower than the bandwidth expected. Which three factors could influence the differences in throughput? (Choose three.) the amount of traffic that is currently crossing the network* the the sophistication sophistication of of the the encapsulation encapsulation method method applied applied to to the the data



19/11/2019

CC N A 1 F inal Exam A nsw ers 2019 ( v5.1+v6.0) I ntroduction to N etw or ks

Explain: Throughput Throughput usually usually does does not not match match the the specified specified bandwidth bandwidth of physical links due to multiple factors. These factors include, include, the the amount amount of of traffic, traffic, type type of of traffic, traffic, and and latency latency created created by by the the network network devices devices the the data data has has to to cross. cross.

19. What is a characteristic of UTP cabling? cancellation* cladding immunity to electrical hazards woven copper copper braid braid or metallic foil Explain: Cladding Cladding and and immunization immunization from from electrical electrical hazards hazards are characteristics characteristics for forfiber-optic fiber-optic cabling. cabling. AAwoven woven copper copper braid braid or or metallic foil is used as a shield shield for for the inner inner coaxial cable cable conductor conduc...


Similar Free PDFs