Jarkom CCNA Exam

Embed Size (px)

Citation preview

  • 7/28/2019 Jarkom CCNA Exam

    1/29

    1. What combination of IP address and wildcard

    mask should be used to specify only the last 8addresses in the subnet

    192.168.3.32/28? 192.168.3.32 0.0.0.7 192.168.3.32 0.0.0.15 192.168.3.40 0.0.0.7 192.168.3.40 0.0.0.15

    2. Excessive broadcasts are generally a symptom ofa problem at which layer?

    physical data link network transport

    3. Refer to the exhibit. Which three pieces ofinformation can be determined by analyzing the

    output shown? (Choose three.)

    A carrier detect signal is present. Keepalives are being received successfully. Default encapsulation is used on this serial

    link.

    Packets passing this interface cannot exceed1 KB in size.

    The reliability of this link is very low. The LCP negotiation phase is complete.

    4. A network administratorhas received

    complaints that users on a local LAN can retrieve

    e-mail from a remote e-mail server but are

    unable to open web pages on the same server.Services at which two layers of the OSI modelshould be investigated during the troubleshootingprocess? (Choose two.)

    physical layer data link layer network layer transport layer application layer

    6. Encapsulation errors from mismatched WAN

    protocols on a serial link between two routers

    indicate a problem at which OSI layer?physicaldata linknetworktransport

    9. Users are complaining of very long wait times toaccess resources on the network. The show

    interface command reveals collision counts farabove the network baseline. At which OSI layershould the administrator begin troubleshooting?

    application

    transportnetworkdata linkphysical

    10.

    Refer to the exhibit. Users on the Internal LAN areunable to connect to the www server. The networkadministrator pings the server and verifies that NATis functioning correctly. Which OSI layer should theadministrator begin to troubleshoot next?

    physical data link network application

    11. Which two statements are true concerninglogical networking models? (Choose two.)TCP/IP splits the lowest layer of the OSI model intotwo separate layers.

    The top layer of the TCP/IP modelcombines the functions of the top three OSIlayers.

    Troubleshooting with the TCP/IP modelrequires different techniques than with theOSI model.

    The network access layer is responsible forexchanging packets between devices on aTCP/IP network.

    The Internet layer provides communicationbetween applications, such as FTP, HTTP,and SMTP on separate hosts.

    The TCP/IP network access layercorresponds to the OSI physical and datalink layers.

    13. What is one example of a physical layerproblem?incorrect encapsulationincorrect STP configurationincorrect ARP mapping

    incorrect clock rate

    17. Which two pieces of information are typicallyfound on a logical network diagram? (Choose two.)cable typesconnector typesinterface identifiersDLCI for virtual circuitsoperating system versions

    18.

    http://ccnaanswers.com/wp-content/uploads/CCNA1FinalExamV4.0Answers2.jpghttp://ccnaanswers.com/wp-content/uploads/CCNAExploration4Chapter8Answers.jpghttp://ccnaanswers.com/wp-content/uploads/CCNA1FinalExamV4.0Answers2.jpghttp://ccnaanswers.com/wp-content/uploads/CCNAExploration4Chapter8Answers.jpg
  • 7/28/2019 Jarkom CCNA Exam

    2/29

    Refer to the exhibit. Each media link is labeled.

    What type of cable should be used to connect thedifferent devices?

    Connection 1rollover cableConnection 2straight-through cableConnection 3crossover cable

    Connection 1crossover cableConnection 2rollover cable

    Connection 3crossover cable

    Connection 1straight-through cableConnection 2crossover cableConnection 3crossover cable

    Connection 1straight-through cableConnection 2crossover cableConnection 3straight-through cable

    Connection 1crossover cableConnection 2straight-through cableConnection 3crossover cable

    5.

    Refer to the exhibit. What function does routerRT_A need to provide to allow Internet access forhosts in this network?address translationDHCP services

    ftpd

    web server

    6. When connectionless protocols are implementedat the lower layers of the OSI model, what is usuallyused to acknowledge that the data was received andto request the retransmission of missing data?

    IP UDP Ethernet a connectionless acknowledgement an upper-layer, connection-oriented protocol

    or service

    9. What is true regarding network layer addressing?(Choose three)

    uses a flat structure prevent broadcasts heirarchical uniquely identifies each host 48 bits in length contains a network portion

    15. Which combination of network id and subnet

    mask correctly identifies all IP addresses from172.16.128.0 through

    172.16.159.255? 172.16.128.0 255.255.255.224

    172.16.128.0 255.255.0.0 172.16.128.0 255.255.192.0 172.16.128.0 255.255.224.0 172.16.128.0 255.255.255.192

    Refer to the exhibit. The command that is shownwas issued on a PC. What does the IP address192.168.33.2 represent?

    IP address of the host default gateway of the host IP address of the homepage for the host primary domain name server for the host IP address of the website

    resolver1.mooki.local

    22. Which OSI layer does IP rely on to determinewhether packets have been lost and to requestretransmission?

    application presentation session transport

    24. The Layer 4 header contains which type ofinformation to aid in the delivery of data?

    service port number host logical address device physical address virtual connection identifier

    25. As network administrator, what is the subnetmask that allows 510 hosts given the IP address172.30.0.0?

    255.255.0.0255.255.248.0255.255.252.0

    255.255.254.0255.255.255.0

    26. Refer to the exhibit. What is required on host Afor a network technician to create the initialconfiguration on Router1?an FTP clienta Telnet clienta terminal emulation programa web browser

    http://ccnaanswers.com/wp-content/uploads/CCNA1FinalExamV4.0Answers15.jpghttp://ccnaanswers.com/wp-content/uploads/CCNA1FinalExamV4.0Answers15.jpghttp://ccnaanswers.com/wp-content/uploads/CCNA1FinalExamV4.0Answers11.jpghttp://ccnaanswers.com/wp-content/uploads/CCNA1FinalExamV4.0Answers3.jpghttp://ccnaanswers.com/wp-content/uploads/CCNA1FinalExamV4.0Answers15.jpghttp://ccnaanswers.com/wp-content/uploads/CCNA1FinalExamV4.0Answers11.jpghttp://ccnaanswers.com/wp-content/uploads/CCNA1FinalExamV4.0Answers3.jpghttp://ccnaanswers.com/wp-content/uploads/CCNA1FinalExamV4.0Answers15.jpghttp://ccnaanswers.com/wp-content/uploads/CCNA1FinalExamV4.0Answers11.jpghttp://ccnaanswers.com/wp-content/uploads/CCNA1FinalExamV4.0Answers3.jpg
  • 7/28/2019 Jarkom CCNA Exam

    3/29

  • 7/28/2019 Jarkom CCNA Exam

    4/29

    40. Which two functions of the OSI model occur at

    layer two? (Choose two.)

    physical addressing encoding routing cabling media access control

    42. Which range of port numbers are reserved for

    services that are commonly used by applications thatrun on servers?

    0 to 255 0 to 1023 1024 to 49151 49152 to 65535

    43.

    Refer to the exhibit. What three statements are trueabout the IP configuration that is shown? (Choosethree.)

    The address that is assigned to the computerrepresents private addressing.

    The computer is unable to communicateoutside of the local network.

    The network of this computer can have 126hosts.

    The prefix of the computer address is /27. The IP address that is assigned to the

    computer is routable on the Internet.

    The IP address that is assigned to thecomputer is a broadcast address.

    44.

    Refer to the exhibit. A network administratorremotely accesses the CLI of RouterB from PC1using Telnet. Which statement is true about thisconnection?

    The data is automatically encrypted. A Telnet server process is running on PC1. The connection is made through a VTY

    session on the router.

    A GET request was sent to RouterB toretrieve data during this session.

    45. Which three statements characterize thetransport layer protocols? (Choose three.)

    TCP and UDP port numbers are used by

    application layer protocols.

    TCP uses port numbers to provide reliabletransportation of IP packets.

    UDP uses windowing and acknowledgments forreliable transfer of data.TCP uses windowing and sequencing to providereliable transfer of data.TCP is a connection-oriented protocol. UDP is a

    connectionless protocol.

    46. Which of the following are the address ranges ofthe private IP addresses? (Choose three.)

    10.0.0.0 to 10.255.255.255 200.100.50.0 to 200.100.25.255 150.150.0.0 to 150.150.255.255 172.16.0.0 to 172.31.255.255 192.168.0.0 to 192.168.255.255 127.16.0.0 to 127.31.255.255

    47. Which OSI layers offers reliable, connection-oriented data communication services?

    application presentation session transport network

    48. Refer to the exhibit. Which logical topology bestdescribes the exhibited network?

    starring

    point-to-pointmultiaccessmesh

    49. During the encapsulation process, which

    identifiers are added at the transport layer?

    two networks routing the packets two applications communicating the data two hosts at either end of the

    communication

    two nodes on the local network exchangingthe frame

    50. What are two characteristics of the data linklayer? (Choose two.)

    It segments and reorders the data. It exchanges the frames between nodes. It defines the method by which network

    devices place data onto the media.

    It manages the transfer of data between theprocesses that run on each host.

    http://ccnaanswers.com/wp-content/uploads/CCNA1FinalExamV4.0Answers25.jpghttp://ccnaanswers.com/wp-content/uploads/CCNA1FinalExamV4.0Answers24.jpghttp://ccnaanswers.com/wp-content/uploads/CCNA1FinalExamV4.0Answers23.jpghttp://ccnaanswers.com/wp-content/uploads/CCNA1FinalExamV4.0Answers25.jpghttp://ccnaanswers.com/wp-content/uploads/CCNA1FinalExamV4.0Answers24.jpghttp://ccnaanswers.com/wp-content/uploads/CCNA1FinalExamV4.0Answers23.jpghttp://ccnaanswers.com/wp-content/uploads/CCNA1FinalExamV4.0Answers25.jpghttp://ccnaanswers.com/wp-content/uploads/CCNA1FinalExamV4.0Answers24.jpghttp://ccnaanswers.com/wp-content/uploads/CCNA1FinalExamV4.0Answers23.jpg
  • 7/28/2019 Jarkom CCNA Exam

    5/29

    It retrieves signals from the media andrestores them to their bit representations.

    1 .Which port numbers are commonly assigned forFTP use? (Choose two.) 19

    20 21

    22

    2 Which application layer protocol allows networkdevices to exchange management information? SMTP

    SNMP FTP TFTP EIGRP

    3 FTP provides a reliable, connection-orientedservice for transferring of files. Which transport

    layer protocol is used for data transfer when thisservice is being used? TFTP TCP DNS IP UDP

    4 TCP is referred to as connection-oriented. Whatdoes this mean? TCP uses only LAN connections.

    TCP requires devices to be directly connected. TCP negotiates a session for data transfer betweenhosts. TCP reassembles the data steams in the order thatit is received.

    5 What three pieces of information does the

    transport layer use to manage the communication ofseparate data streams between hosts? (Choosethree.) port numbers checksum values

    authentication keys sequence numbers

    encryption algorithms acknowledgment numbers

    6 What does the http portion of the URLhttp://www.cisco.com/edu/ communicate to a web

    browser? The web browser needs to locate the www server. The address is located on a site whose name is http. The web browser is notified as to which protocol touse.

    The http portion represents the type of webbrowser that needs to be used.

    7 When the receiving workstation detects an error in

    the data it has received, it does not acknowledge

    receipt of the data. The source workstationretransmits the unacknowledged data. Which layerof the OSI model supports this process ofretransmission? network application session

    transport

    8 What are the features of the User DatagramProtocol (UDP). (Choose three.) no guaranteed delivery of datagrams connection-oriented provides reliable full-duplex data transmission reliability provided by the application layer connectionless utilizes sliding windowing techniques

    9 Which Application layer protocol is widely used tosupport resolving host names to IP addresses?

    FTP SMTP SNMP DNS HTTP

    WWW

    10 What is the purpose of TCP/UDP port numbers? indicate the beginning of a three-way handshake reassemble the segments into the correct order

    identify the number of data packets that may besent without acknowledgment

    track different conversations crossing the networkat the same time

    11 If an application uses a protocol that exchangesdata without using windowing or flow control and

    must rely on higher layer protocols for reliability,which protocol and transfer methods are being used?

    UDP, connection-oriented UDP, connectionless TCP, connection-oriented

    TCP, connectionless

    12 Which protocol is used to transfer files fromcomputer to computer but is consideredconnectionless? FTP TFTP SNMP TCP DHCP

    13 Which layer of the OSI model can provide aconnection-oriented, reliable data transfer between

    two hosts? Application Presentation Session

  • 7/28/2019 Jarkom CCNA Exam

    6/29

    Transport

    14 Which of the following are primary duties of theOSI transport layer? (Choose two.) path determination end-to-end connectivity flow control security control

    data representation

    encryption of data

    15 Which protocol is used by e-mail servers tocommunicate with each other? FTP HTTP TFTP SMTP POPSNMP

    . What are two facts about how ARP resolves an IPaddress to a MAC address? (Choose two.) The originating host dynamically issues an arp -acommand to obtain the destination MAC address. The originating host broadcasts an ARP requestpacket and each host in a local network receives thispacket. The originating host dynamically issues an icmpecho request command to obtain the destinationMAC address. The host with the specified destination IP addresssends an ARP reply packet containing its MAC

    address back to the originating host. The host with the specified destination IP addresssends an icmp echo reply packet to the originatinghost with its MAC address.

    2. Which TCP/IP model layer supports both LANand WAN technologies? network access layer

    internet layer transport layer application layer

    3. What is the primary responsibility of the transportlayer? allows access to the network media

    provides data representation and encoding selects paths through the network for data to travel defines end-to-end connectivity between hostapplications

    4. What is the network broadcast address for a ClassC address of 192.168.32.0 with the default subnet

    mask? 192.168.0.0

    192.168.0.255 192.168.32.0 192.168.32.254

    192.168.32.255

    5. Which two statements correctly describe the IPaddress 127.0.0.1? (Choose two.) It belongs to the Class A range of addresses. It belongs to the Class B range of addresses. It belongs to the Class C range of addresses. It is reserved for loopback testing. It is reserved for multicast group testing.

    It is reserved for unicast testing.

    6.

    Refer to the exhibit.The small office LAN shown in the exhibit mayeventually be connected to the Internet. Accordingto Cisco best practice, which IP network addresses

    should be used? 12.0.0.0 172.0.0.0 172.168.0.0

    192.32.17.0 192.168.67.0 225.1.5.0

    7. Why is IP considered a best-effort protocol?

    IP detects lost packets. IP validates the content of the packets.

    IP does not provide acknowledgment of the data

    delivery. IP reorders the packet as they arrive at thedestination host.

    8. Which three addresses are considered to beprivate addresses? (Choose three.) 10.45.09.23 15.87.234.87 172.32.45.90 172.17.78.98

    192.169.89.56 192.168.45.23

    9.

    Refer to the exhibit. Based on the informationshown, which two statements are true? (Choose

    two.) An ARP request must be used to obtain an addressthat is placed in the ARP table. Frames from other hosts in the network to this host

    http://bp2.blogger.com/_TY4rWcZRSlU/RtBvdH34MzI/AAAAAAAAAD8/2p8bAg9yB5k/s1600-h/clip_image001.jpghttp://bp2.blogger.com/_TY4rWcZRSlU/RtBu2H34MyI/AAAAAAAAAD0/iumzl6CS0Gs/s1600-h/clip_image001.jpghttp://bp2.blogger.com/_TY4rWcZRSlU/RtBvdH34MzI/AAAAAAAAAD8/2p8bAg9yB5k/s1600-h/clip_image001.jpghttp://bp2.blogger.com/_TY4rWcZRSlU/RtBu2H34MyI/AAAAAAAAAD0/iumzl6CS0Gs/s1600-h/clip_image001.jpg
  • 7/28/2019 Jarkom CCNA Exam

    7/29

    will use a destination address of 00-06-25-25-6e-5d.

    The only remote locations that can be reached fromthis host are 192.168.1.97 and 192.168.1.254. If a packet is sent to a network device other than192.168.1.97 and 192.168.1.254, an ARP requestmust be used. If the computer with the IP address of 192.168.1.94sends a packet to the device with the IP address

    192.168.1.97, no ARP request is required.

    10.

    Refer to the exhibit. Which devices arerecommended to have the IP addresses manuallyconfigured? PC1 and PC2

    all servers only PC2 Laptop all hosts and all servers

    11. Why were private IP addresses developed?

    to permit dynamic assignment of IP addresses to permit the duplication of public IP addresses

    to minimize the utilization of reserved IP addresses

    to permit public IP addresses to be used in privatenetworks to address the issue of not enough available publicIP addresses

    12. Which subnet mask would be assigned to thenetwork address of 192.168.32.0 to provide 254useable host addresses per subnetwork? 255.255.0.0 255.255.255.0 255.255.254.0

    255.255.248.0

    13. When a host has an empty ARP cache, what isthe next step the host will take to find the destinationMAC address of a remote host? sends an ARP request as a unicast to the server sends an ARP request as a unicast to thedestination sends an ARP request as a broadcast to all hosts inthe local network sends an ARP request as a unicast to the defaultgateway

    14.

    Refer to the exhibit. What is the purpose of theObtain an IP address automatically option shown inthe exhibit? to configure the computer to use ARP to configure the computer to use DHCP to configure the computer to use a routing protocol

    to configure the computer with a statically assignedIP address

    15. How many usable hosts are available given aClass C IP address with the default subnet mask?

    254 255 256 510 511

    512

    16. Which statement accurately describes public IPaddresses?

    Public addresses cannot be used within a privatenetwork. Public IP addresses must be unique across the

    entire Internet. Public addresses can be duplicated only within a

    local network. Public IP addresses are only required to be uniquewithin the local network. Network administrators are free to select anypublic addresses to use for network devices that

    access the Internet.

    17. Which IPv4 class of addresses provides the mostnetworks? Class A Class B Class C Class D Class E

    18. Which IPv4 class provides the highest number ofhost addresses per network? Class A

    Class B Class C Class D Class E

    http://bp0.blogger.com/_TY4rWcZRSlU/RtBwRn34M1I/AAAAAAAAAEM/jIKbKcKrZwU/s1600-h/clip_image001.jpghttp://bp2.blogger.com/_TY4rWcZRSlU/RtBvwH34M0I/AAAAAAAAAEE/DAgIoZlpX4w/s1600-h/clip_image001.jpghttp://bp0.blogger.com/_TY4rWcZRSlU/RtBwRn34M1I/AAAAAAAAAEM/jIKbKcKrZwU/s1600-h/clip_image001.jpghttp://bp2.blogger.com/_TY4rWcZRSlU/RtBvwH34M0I/AAAAAAAAAEE/DAgIoZlpX4w/s1600-h/clip_image001.jpg
  • 7/28/2019 Jarkom CCNA Exam

    8/29

    19. What is the purpose of a DHCP server on anetwork? to resolve MAC addresses to IP addresses to resolve IP addresses to MAC addresses to resolve host names to IP addresses to assign IP addresses dynamically to hosts to assign a MAC address to a host

    20.

    Refer to the exhibit. Which two statements are

    correct in reference to the output shown? (Choosetwo.)

    The LAN segment is subnetted to allow 254subnets. The DNS server for this host is on the same subnet

    as the host. The host automatically obtained the IP addresses

    192.168.1.100. The host received the IP address from the router onthe local LAN segment. The host is assigned an address of 00-50-8D-F1-EA-8D by the administrator.

    1.What is characteristic of the operation of a Layer 2

    switch? forwards data based on logical addressing

    duplicates the electrical signal of each frame toevery port learns the port assigned to a host by examining the

    destination MAC address

    uses the destination MAC address to determine thespecific interface to forward a frame

    2.Two newly hired technicians are discussing theimplementation of a new LAN. One technicianproposes installing a hub. The other technicianadvises installing a switch. Which statements aretrue about the differences between a hub and a

    switch? (Choose two.) A hub operates at Layer 2 of the OSI model. A hub reduces the number of collisions on a LAN. A hub works at a higher OSI model layer than a

    switch. A switch provides more throughput to hosts on aLAN

    A switch provides a collision-free environment on

    a LAN.

    The number of collisions on a LAN are the samewhether a hub or a switch is used.

    3.

    Refer to the exhibit. Forty-eight workstations areconnected to a hub. The users are able to connect tothe network, but access is very slow. An entry-level

    technician replaces the 10 Mbps hub with 100 Mbpshub but the problem still exists. What is the most

    economical way to correct the problem? Replace the hub with a switch. Replace the hub with a router. Replace the hub with a 1 Gbps hub. Replace the hub with a 10 Mbps fiber hub.

    4.

    Exhibited is a portion of ABC Companyinternetwork. Which of the connections can be fullduplex? segments 1 and 2 segment 2 segments 3 and 4 segments 2, 3, and 4 segments 1, 2, 3, and 4

    5.

    Refer to the exhibit. The switch and the hub havedefault configurations, and the switch has built its

    CAM table. Which of the hosts will receive the datawhen workstation A sends a unicast packet to

    workstation C? workstation C

    http://bp1.blogger.com/_TY4rWcZRSlU/Rs-xCH34MxI/AAAAAAAAADs/A7XzPbelCa0/s1600-h/9237[1].jpghttp://bp2.blogger.com/_TY4rWcZRSlU/Rs-vUX34MuI/AAAAAAAAADU/R2jsyLeLevQ/s1600-h/8836[1].jpghttp://bp1.blogger.com/_TY4rWcZRSlU/Rs-wdH34MwI/AAAAAAAAADk/5E9t7yIBMhA/s1600-h/9612[1].jpghttp://bp0.blogger.com/_TY4rWcZRSlU/RtByQn34M2I/AAAAAAAAAEU/PudjmJMvNQs/s1600-h/11600[1].jpghttp://bp1.blogger.com/_TY4rWcZRSlU/Rs-xCH34MxI/AAAAAAAAADs/A7XzPbelCa0/s1600-h/9237[1].jpghttp://bp2.blogger.com/_TY4rWcZRSlU/Rs-vUX34MuI/AAAAAAAAADU/R2jsyLeLevQ/s1600-h/8836[1].jpghttp://bp1.blogger.com/_TY4rWcZRSlU/Rs-wdH34MwI/AAAAAAAAADk/5E9t7yIBMhA/s1600-h/9612[1].jpghttp://bp0.blogger.com/_TY4rWcZRSlU/RtByQn34M2I/AAAAAAAAAEU/PudjmJMvNQs/s1600-h/11600[1].jpghttp://bp1.blogger.com/_TY4rWcZRSlU/Rs-xCH34MxI/AAAAAAAAADs/A7XzPbelCa0/s1600-h/9237[1].jpghttp://bp2.blogger.com/_TY4rWcZRSlU/Rs-vUX34MuI/AAAAAAAAADU/R2jsyLeLevQ/s1600-h/8836[1].jpghttp://bp1.blogger.com/_TY4rWcZRSlU/Rs-wdH34MwI/AAAAAAAAADk/5E9t7yIBMhA/s1600-h/9612[1].jpghttp://bp0.blogger.com/_TY4rWcZRSlU/RtByQn34M2I/AAAAAAAAAEU/PudjmJMvNQs/s1600-h/11600[1].jpghttp://bp1.blogger.com/_TY4rWcZRSlU/Rs-xCH34MxI/AAAAAAAAADs/A7XzPbelCa0/s1600-h/9237[1].jpghttp://bp2.blogger.com/_TY4rWcZRSlU/Rs-vUX34MuI/AAAAAAAAADU/R2jsyLeLevQ/s1600-h/8836[1].jpghttp://bp1.blogger.com/_TY4rWcZRSlU/Rs-wdH34MwI/AAAAAAAAADk/5E9t7yIBMhA/s1600-h/9612[1].jpghttp://bp0.blogger.com/_TY4rWcZRSlU/RtByQn34M2I/AAAAAAAAAEU/PudjmJMvNQs/s1600-h/11600[1].jpg
  • 7/28/2019 Jarkom CCNA Exam

    9/29

    workstations B and C

    workstations B, C, and the E0 interface of therouter workstations B, C, D, E, F, and the E0 interface ofthe router

    6. An administrator would like to connect tenworkstations on a 192.168.0.0/24 network. The

    device selected by the administrator must allow

    connectivity between hosts without sharingbandwidth. Which device would be appropriate? hub router switch repeater

    7. Which networking devices use the MAC addressto make forwarding decisions? (Choose two.) NIC bridge hub

    switch repeater

    8. Which devices are primarily used to extend cablesegments within a collision domain by regenerating

    the data signals? (Choose two.)switch repeater router bridge

    hub

    9. Which devices will create multiple collisiondomains in an Ethernet network? (Choose two.) NIC hub switch

    routerrepeater

    10.

    Refer to the exhibit. How many broadcast domainsexist in classroom 240? 1 2

    5 12 13 15

    11. A PC receives a frame. Which situation willcause the NIC on the receiving host to pass theframe contents up the OSI layers to be processed bythe PC? The frame is a runt frame. The destination MAC address of the frame isFFFF.FFFF.FFFF.

    The transmitting host generated a jam signal during

    the frame transmission. The recalculated checksum forthe frame does notmatch the FCS on the frame.

    12. A network administrator has a multi-floor LANto monitor and maintain. Through carefulmonitoring, the administrator has noticed a largeamount of broadcast traffic slowing the network.Which device would you use to best solve thisproblem? bridge hub

    router transceiver

    13. What will a bridge do if it receives a frame witha MAC address that is not within the table?

    discard frame ignore frame send frame to appropriate port send frame to all ports except source port

    14. Which networking device reduces the size ofboth collision domains and broadcast domains?

    hub Layer 2 switch router bridge repeater

    15. What is used to prevent Layer 2 switching

    loops? bridging segmentation

    Address Resolution Protocol

    Spanning-Tree Protocol

    1.Which Ethernet standard does the IEEE 802.3

    standard recommend for backbone installations? 10BASE-T 100BASE-T 100BASE-FX 1000BASE-LX

    2. Which statements describe Gigabit Ethernet

    technology? (Choose two.) operates at 100 Mbps

    typically used for backbone cabling requires shielded twisted-pair cabling can be implemented over copper and fiber

    primarily used between workstations option

    http://bp2.blogger.com/_TY4rWcZRSlU/Rs-vuX34MvI/AAAAAAAAADc/cMs2RQg1QOw/s1600-h/5954[1].jpg
  • 7/28/2019 Jarkom CCNA Exam

    10/29

    3. Which of the following are Fast Ethernettechnologies? (Choose two.) 100BASE-5 100BASE2 1000BASE-F 100BASE-FX 100BASE-TX

    4. To make sure timing limitations are not violatedwhen implementing a 10 Mbps Ethernet networkinvolving hubs or repeaters, a technician shouldadhere to which rule? the 4-5-3 rule the 6-4-2 rule the 3-4-5 rule the 5-4-3 rule

    5. At which OSI layer do the differences betweenstandard Ethernet, Fast Ethernet and GigabitEthernet occur?

    physical layer data link layer network layer transport layer

    6. How does 1000BASE-T use the UTP wire pairs toaccomplish transmission? two pairs are used to transmit and two pairs areused to receive one pair is used to transmit, one pair is used to

    receive, one pair is used for clocking, and one pair isused for error correction

    all four pairs are used in parallel by both hosts totransmit and receive simultaneously two pairs of wires are used as in 10BASE-T and100BASE-TX

    7. What RJ-45 pins are unused when transmittingand receiving data in an Ethernet 100BASE-T

    Category 5 UTP cable? (Choose two.) 1 and 2 3 and 6

    4 and 5

    7 and 8

    8. What is the maximum distance that 10BASE-Twill transmit data before signal attenuation affectsthe data delivery? 100 meters 185 meters 300 meters 500 meters

    9. Which media types can be used in animplementation of a 10BASE-T network? (Choose

    three.) Category 5 UTP Category 5e UTP Category 3 UTP

    coaxial cable

    multi-mode fiber single mode fiber

    10. Which of the following Ethernet technologiesare considered legacy Ethernet? (Choose three.) 10BASE2 10BASE5

    10BASE-T

    100BASE-T 100BASE-FX 100BASE-TX

    1. Which of the following are specified by IEEEstandards as sublayers of the OSI data link layer?

    (Choose two.) Logical Link Control Logical Layer Control Media Access Control Logical Link Communication Media Access Communication Physical Access Communication

    2.

    Refer to the exhibit. Host A is communicatingwith host F. What happens to a frame sent fromhost A to host F as it travels over the Ethernetsegments?

    The frame format is modified as it passes

    through each switch. The frame format remains the same across eachEthernet segment. The frame format is modified as the mediaspeed changed at switch B and switch E. The frame format is modified as the mediamaterial changes between copper and fiber atswitch C and switch D.

    3. In which two layers of the OSI model doesEthernet function? (Choose two.) application session transport

    network data link physical

    4. Where does the MAC address originate?

    DHCP server database configured by the administrator burned into ROM on the NIC card network configuration on the computer

    included in the creation of the processor chip

    5. At what layer of the OSI model does a MACaddress reside?

    http://bp0.blogger.com/_TY4rWcZRSlU/Rs6uHH34MqI/AAAAAAAAAC0/mEsWfNvQ6aQ/s1600-h/9191[1].jpg
  • 7/28/2019 Jarkom CCNA Exam

    11/29

    1

    2 3 4 7

    6. A router has an Ethernet, Token Ring, serial,and ISDN interface. Which interfaces will have a

    MAC address?

    serial and ISDN interfaces Ethernet and Token Ring interfaces Ethernet and ISDN interfaces Token Ring and serial interfaces

    7. Which two devices can provide full-duplexEthernet connections? (Choose two.) hub modem repeater NIC Layer 2

    Refer to the exhibit. The small office network shownin the exhibit consists of four computers connectedthrough a hub. Which configuration would causecollisions and errors on the network? autonegotiation FastEthernet

    peer-to-peer shared resources administratively configured full duplex

    Refer to the exhibit. The switch and workstation areadministratively configured for full-duplexoperation. Which statement accurately reflects the

    operation of this link? No collisions will occur on this link.

    Only one of the devices can transmit at a time. The switch will have priority for transmitting data.

    The devices will default back to half duplex ifexcessive collisions occur.

    10. What are three functions of a NIC in a PC?

    (Choose three.)

    A NIC connects the PC to the network media. A NIC detects collisions on the Ethernet segment. A NIC checks the formatting of data before it istransmitted. A NIC passes the contents of selected frames to theupper OSI layers. A NIC acknowledges and retransmits data that was

    not received properly.

    A NIC discards frames when the destination IPaddress does not match the local host.

    11. In an Ethernet LAN, how does the NIC knowwhen it can transmit data? An Ethernet NIC transmits data as soon as theframe is received. An Ethernet NIC transmits data as soon as the NICreceives a token. An Ethernet NIC transmits data when it senses acollision. An Ethernet NIC transmits data after listening for

    the absence of a signal on the media.

    12.

    Refer to the exhibit. All hosts are in listen mode.

    Host 1 and Host 4 both transmit data at the same

    time. How do the hosts respond on the network?(Choose two.) Hosts 1 and 4 may be operating full duplex so nocollision will exist. The hub will block the port connected to Host 4 toprevent a collision. After the end of the jam signal, Hosts 1, 2, 3, and 4invoke a backoff algorithm. When the four hosts detect the collision, Hosts 1,2, 3, and 4 generate a jam signal. Hosts 1 and 4 are assigned shorter backoff valuesto provide them priority to access the media. If a host has data to transmit after the backoffperiod of that host, the host checks to determine if

    the line is idle, before transmitting.

    13. Which statement describes how CSMA/CD on

    an Ethernet segment manages the retransmission offrames after a collision occurs?

    The first device to detect the collision has thepriority for retransmission. The device with the lowest MAC addressdetermines the retransmission priority.

    The devices on the network segment hold anelection for priority to retransmit data The devices transmitting when the collision occursDO NOT have priority for retransmission.

    http://bp2.blogger.com/_TY4rWcZRSlU/Rs6vWn34MsI/AAAAAAAAADE/RSXvl2BsjSI/s1600-h/11362[1].jpghttp://bp0.blogger.com/_TY4rWcZRSlU/Rs6vuH34MtI/AAAAAAAAADM/CrZG7DHnuy0/s1600-h/8452[1].jpghttp://bp2.blogger.com/_TY4rWcZRSlU/Rs6uhn34MrI/AAAAAAAAAC8/8Ph-kY-2qds/s1600-h/8451[1].jpghttp://bp2.blogger.com/_TY4rWcZRSlU/Rs6vWn34MsI/AAAAAAAAADE/RSXvl2BsjSI/s1600-h/11362[1].jpghttp://bp0.blogger.com/_TY4rWcZRSlU/Rs6vuH34MtI/AAAAAAAAADM/CrZG7DHnuy0/s1600-h/8452[1].jpghttp://bp2.blogger.com/_TY4rWcZRSlU/Rs6uhn34MrI/AAAAAAAAAC8/8Ph-kY-2qds/s1600-h/8451[1].jpghttp://bp2.blogger.com/_TY4rWcZRSlU/Rs6vWn34MsI/AAAAAAAAADE/RSXvl2BsjSI/s1600-h/11362[1].jpghttp://bp0.blogger.com/_TY4rWcZRSlU/Rs6vuH34MtI/AAAAAAAAADM/CrZG7DHnuy0/s1600-h/8452[1].jpghttp://bp2.blogger.com/_TY4rWcZRSlU/Rs6uhn34MrI/AAAAAAAAAC8/8Ph-kY-2qds/s1600-h/8451[1].jpg
  • 7/28/2019 Jarkom CCNA Exam

    12/29

    14. What is the maximum distance that 10BASE-Twill transmit data before signal attenuation affectsthe data delivery? 100 meters 185 meters 300 meters 500 meters

    15. Which of the following are Fast Ethernettechnologies? (Choose two.) 100BASE-5 100BASE2 1000BASE-F 100BASE-FX 100BASE-TX

    16. At which OSI layer do the differences betweenstandard Ethernet, Fast Ethernet and GigabitEthernet occur? physical layer

    data link layer network layer transport layer

    17. How does 1000BASE-T use the UTP wire pairs

    to accomplish transmission? two pairs are used to transmit and two pairs areused to receive one pair is used to transmit, one pair is used toreceive, one pair is used for clocking, and one pair is

    used for error correction all four pairs are used in parallel by both hosts to

    transmit and receive simultaneously two pairs of wires are used as in 10BASE-T and100BASE-TX

    18. Which statements describe Gigabit Ethernet

    technology? (Choose two.) operates at 100 Mbps

    typically used for backbone cabling requires shielded twisted-pair cabling can be implemented over copper and fiber

    primarily used between workstations option

    19. Which media types can be used in animplementation of a 10BASE-T network? (Choosethree.) Category 5 UTP Category 5e UTP Category 3 UTP coaxial cable multi-mode fiber single mode fiber

    20. Which of the following Ethernet technologies

    are considered legacy Ethernet? (Choose three.) 10BASE2 10BASE5 10BASE-T

    100BASE-T

    100BASE-FX 100BASE-TX

    Refer to the exhibit. Host A is communicating withhost F. What happens to a frame sent from host A tohost F as it travels over the Ethernet segments? The frame format is modified as it passes througheach switch.

    The frame format remains the same across eachEthernet segment. The frame format is modified as the media speedchanged at switch B and switch E. The frame format is modified as the media materialchanges between copper and fiber at switch C andswitch D.

    2. How many hexadecimal digits are in a MACaddress? 2 8 1216 32

    3. What are three functions of a NIC in a PC?(Choose three.) A NIC connects the PC to the network media. A NIC detects collisions on the Ethernet segment.

    A NIC checks the formatting of data before it istransmitted. A NIC passes the contents of selected frames to theupper OSI layers. A NIC acknowledges and retransmits data that was

    not received properly. A NIC discards frames when the destination IPaddress does not match the local host.

    4. At what layer of the OSI model does a MAC

    address reside? 1

    2 3 4 7

    5. A router has an Ethernet, Token Ring, serial, andISDN interface. Which interfaces will have a MACaddress? serial and ISDN interfaces Ethernet and Token Ring interfaces Ethernet and ISDN interfaces Token Ring and serial interfaces

    6. In an Ethernet LAN, how does the NIC knowwhen it can transmit data? An Ethernet NIC transmits data as soon as the

    http://bp0.blogger.com/_TY4rWcZRSlU/Rstxf334MnI/AAAAAAAAACc/J24Olv7rtU0/s1600-h/9191[1].jpg
  • 7/28/2019 Jarkom CCNA Exam

    13/29

    frame is received.

    An Ethernet NIC transmits data as soon as the NICreceives a token. An Ethernet NIC transmits data when it senses acollision. An Ethernet NIC transmits data after listening forthe absence of a signal on the media.

    7. Which characteristics describe carrier sense

    multiple access collision detect (CSMA/CD)?(Choose three.) reliable point-to-point nondeterministic connection-oriented collision environment first-come, first-served approach

    8. Which two devices can provide full-duplexEthernet connections? (Choose two.) hub

    modem repeater NIC Layer 2 switch

    9. On a local area network, one workstation can senddata on the line while it is receiving data. What typeof data transfer does this describe? hybrid half duplex

    full duplex multilink

    10.

    Refer to the exhibit. The small office network shownin the exhibit consists of four computers connectedthrough a hub. Which configuration would cause

    collisions and errors on the network?

    autonegotiation FastEthernet peer-to-peer shared resources administratively configured full duplex

    11.

    Refer to the exhibit. The switch and workstation areadministratively configured for full-duplexoperation. Which statement accurately reflects theoperation of this link?

    No collisions will occur on this link.

    Only one of the devices can transmit at a time. The switch will have priority for transmitting data. The devices will default back to half duplex ifexcessive collisions occur.

    12.

    Refer to the exhibit. All hosts are in listen mode.Host 1 and Host 4 both transmit data at the sametime. How do the hosts respond on the network?

    (Choose two.) Hosts 1 and 4 may be operating full duplex so no

    collision will exist. The hub will block the port connected to Host 4 toprevent a collision. After the end of the jam signal, Hosts 1, 2, 3, and 4invoke a backoff algorithm. Hosts 1 and 4 are assigned shorter backoff valuesto provide them priority to access the media. If a host has data to transmit afterthe backoffperiod of that host, the host checks to determine ifthe line is idle, before transmitting.

    13. When a collision occurs in a network using

    CSMA/CD, how do hosts with data to transmitrespond after the backoff period has expired? The hosts return to a listen-before-transmit mode. The hosts creating the collision have priority to

    send data. The hosts creating the collision retransmit the last

    16 frames. The hosts extend their delay period to allow forrapid transmission.

    14. Which statement describes how CSMA/CD on

    an Ethernet segment manages the retransmission offrames after a collision occurs?

    The first device to detect the collision has thepriority for retransmission. The device with the lowest MAC addressdetermines the retransmission priority. The devices on the network segment hold an

    election for priority to retransmit data The devices transmitting when the collision occursDO NOT have priority for retransmission.

    15.

    http://bp0.blogger.com/_TY4rWcZRSlU/Rstvd334MlI/AAAAAAAAACM/zZdFjzXnYBY/s1600-h/11362[1].jpghttp://bp0.blogger.com/_TY4rWcZRSlU/Rstzw334MoI/AAAAAAAAACk/VO8lDTymkBk/s1600-h/8452[1].jpghttp://bp2.blogger.com/_TY4rWcZRSlU/RstwUX34MmI/AAAAAAAAACU/5bu4ayB4ylA/s1600-h/8451[1].jpghttp://bp0.blogger.com/_TY4rWcZRSlU/Rstvd334MlI/AAAAAAAAACM/zZdFjzXnYBY/s1600-h/11362[1].jpghttp://bp0.blogger.com/_TY4rWcZRSlU/Rstzw334MoI/AAAAAAAAACk/VO8lDTymkBk/s1600-h/8452[1].jpghttp://bp2.blogger.com/_TY4rWcZRSlU/RstwUX34MmI/AAAAAAAAACU/5bu4ayB4ylA/s1600-h/8451[1].jpghttp://bp0.blogger.com/_TY4rWcZRSlU/Rstvd334MlI/AAAAAAAAACM/zZdFjzXnYBY/s1600-h/11362[1].jpghttp://bp0.blogger.com/_TY4rWcZRSlU/Rstzw334MoI/AAAAAAAAACk/VO8lDTymkBk/s1600-h/8452[1].jpghttp://bp2.blogger.com/_TY4rWcZRSlU/RstwUX34MmI/AAAAAAAAACU/5bu4ayB4ylA/s1600-h/8451[1].jpg
  • 7/28/2019 Jarkom CCNA Exam

    14/29

    Refer to the exhibit. A technician wants to increase

    the available bandwidth for the workstation byallowing the switch and the NIC on the workstation

    to transmit and receive simultaneously. What willpermit this? CSMA/CD

    full-duplex FastEthernet

    crossover cable

    16. Why do hosts on an Ethernet segment thatexperience a collision use a random delay beforeattempting to transmit a frame?

    A random delay is used to ensure a collision-freelink.

    A random delay value for each device is assignedby the manufacturer. A standard delay value could not be agreed uponamong networking device vendors. A random delay helps prevent the stations fromexperiencing another collision during thetransmission.

    17. In which two layers of the OSI model doesEthernet function? (Choose two.) application

    session

    transport network data link physical

    18. Which of the following are specified by IEEEstandards as sublayers of the OSI data link layer?(Choose two.) Logical Link Control Logical Layer Control Media Access Control

    Logical LinkCommunication

    Media Access Communication Physical Access Communication

    19. Where does the MAC address originate? DHCP server database configured by the administrator

    burned into ROM on the NIC card network configuration on the computer included in the creation of the processor chip

    1

    Refer to the exhibit. What is the appropriate cable touse at each of the numbered network connections? 1-crossover; 2-straight-through; 3-crossover; 4-

    straight-through 1-straight-through; 2-crossover; 3-straight-through;

    4-straight-through 1-straight-through; 2-crossover; 3-crossover; 4-straight-through 1-rollover; 2-crossover; 3-straight-through; 4-straight-through

    1-rollover; 2-straight-through; 3-straight-through;4-straight-through

    2. Which two devices are considered OSI Layer 1devices? (Choose two.) hubs routers

    bridges switches repeaters

    3. What device is used to connect hosts to an

    Ethernet LAN and requires a straight-through UTPcable between the hosts and this device? NIC router switch server

    4. What is the most common type of cabling used inLANs? STP UTP coax

    fiber

    5. In which situations would a crossover cable be

    used to connect devices in a network? (Choose two.) switch to PC switch to hub switch to router switch to server

    switch to switch

    6.Refer to the exhibit. How many collision domainsexist in the network? 1 2

    http://bp1.blogger.com/_TY4rWcZRSlU/Rsra_X34MkI/AAAAAAAAACE/9BIozeMHSC8/s1600-h/9248[1].jpghttp://bp1.blogger.com/_TY4rWcZRSlU/Rsra_X34MkI/AAAAAAAAACE/9BIozeMHSC8/s1600-h/9248[1].jpghttp://bp0.blogger.com/_TY4rWcZRSlU/RsrZ4H34MhI/AAAAAAAAABs/sW0mhUzNxZE/s1600-h/8190[1].jpghttp://bp0.blogger.com/_TY4rWcZRSlU/Rst2N334MpI/AAAAAAAAACs/SvyoANI0XoA/s1600-h/8454[1].jpghttp://bp1.blogger.com/_TY4rWcZRSlU/Rsra_X34MkI/AAAAAAAAACE/9BIozeMHSC8/s1600-h/9248[1].jpghttp://bp0.blogger.com/_TY4rWcZRSlU/RsrZ4H34MhI/AAAAAAAAABs/sW0mhUzNxZE/s1600-h/8190[1].jpghttp://bp0.blogger.com/_TY4rWcZRSlU/Rst2N334MpI/AAAAAAAAACs/SvyoANI0XoA/s1600-h/8454[1].jpghttp://bp1.blogger.com/_TY4rWcZRSlU/Rsra_X34MkI/AAAAAAAAACE/9BIozeMHSC8/s1600-h/9248[1].jpghttp://bp0.blogger.com/_TY4rWcZRSlU/RsrZ4H34MhI/AAAAAAAAABs/sW0mhUzNxZE/s1600-h/8190[1].jpghttp://bp0.blogger.com/_TY4rWcZRSlU/Rst2N334MpI/AAAAAAAAACs/SvyoANI0XoA/s1600-h/8454[1].jpg
  • 7/28/2019 Jarkom CCNA Exam

    15/29

    4

    7 8

    7. What type of cable would be used to make theconnection between the console port of a router anda workstation? crossover

    rollover

    straight-through patch

    8.

    Which function is a unique responsibility of theDCE devices shown in the exhibit? transmission of data reception of data

    clocking for the synchronous link noise cancellation in transmitted data

    9. Which address does a bridge use to make filteringand switching decisions?

    source MAC source IP destination MAC destination IP network IP address

    10. What is characteristic of how a hub operates?

    A hub selectively drops packets that representpotential security risks. A hub forwards data out all interfaces except theinbound interface. A hub dynamically learns the interfaces to which

    all devices are attached. At start up, a hub queries the devices on all

    interfaces in order to learn the MAC addresses of theattached devices. A hub transmits a frame to a specific interface

    based on the destination MAC address.

    11. Users with systems that are attached to a hub arecomplaining about poor response time. What devicecould replace the hub and provide immediateresponse time improvement? router switch bridge repeater

    12. Which of the following are benefits of peer-to-peer networks? (Choose three.) centralized security easy to create very scalable no centralized equipment required

    centralized administrator not required

    centralized control of assets

    13. Which statement is accurate about a WAN link? The link transmits data serially. The link uses a maximum distance of 100 meters. The link uses the same transmission rate as allother WAN links use.

    The link uses the same standardized connector

    style that is used for all WAN technologies.

    14.

    Which items in the exhibit are DTE devices?

    A and B B and C C and D

    A and D A, B, C, and D

    15. At which layer of the OSI model does the MACaddress of a NIC reside? physical application network transport data link session

    16.

    Refer to the exhibit. A technician measured thelengths of the CAT 5e structured cable runs in theexhibit. How should the technician evaluate thecabling shown in the diagram to the networkadministrator?

    All cabling to work areas are within specifications. Station A and B may experience intermittent

    problems because the length exceeds therecommended standard. Station B may experience intermittent problems

    because the length exceeds the recommended

    standard. Station C may experience intermittent networkconnectivity because the length is less than therecommended standard.

    http://bp0.blogger.com/_TY4rWcZRSlU/RsrUdH34MeI/AAAAAAAAABU/CxFF8QzWX7U/s1600-h/9188[1].jpghttp://bp1.blogger.com/_TY4rWcZRSlU/RsrWJX34MfI/AAAAAAAAABc/kjgKRDypZT8/s1600-h/8327[1].jpghttp://bp1.blogger.com/_TY4rWcZRSlU/RsraKX34MiI/AAAAAAAAAB0/fWX2-V2OgPc/s1600-h/8328[1].jpghttp://bp0.blogger.com/_TY4rWcZRSlU/RsrUdH34MeI/AAAAAAAAABU/CxFF8QzWX7U/s1600-h/9188[1].jpghttp://bp1.blogger.com/_TY4rWcZRSlU/RsrWJX34MfI/AAAAAAAAABc/kjgKRDypZT8/s1600-h/8327[1].jpghttp://bp1.blogger.com/_TY4rWcZRSlU/RsraKX34MiI/AAAAAAAAAB0/fWX2-V2OgPc/s1600-h/8328[1].jpghttp://bp0.blogger.com/_TY4rWcZRSlU/RsrUdH34MeI/AAAAAAAAABU/CxFF8QzWX7U/s1600-h/9188[1].jpghttp://bp1.blogger.com/_TY4rWcZRSlU/RsrWJX34MfI/AAAAAAAAABc/kjgKRDypZT8/s1600-h/8327[1].jpghttp://bp1.blogger.com/_TY4rWcZRSlU/RsraKX34MiI/AAAAAAAAAB0/fWX2-V2OgPc/s1600-h/8328[1].jpg
  • 7/28/2019 Jarkom CCNA Exam

    16/29

    Station A and B will have intermittent problems

    because the length exceeds the recommendedstandard. Station C will not have network connectivitybecause the length is less than the recommendedstandard.

    17. Which statement describes a typical use of

    Gigabit Ethernet?

    to provide high-speed desktop connectivity foraverage users to provide connectivity to low to medium volumeapplications to provide medium volume connectivity toworkgroup servers to provide high-speed connectivity for backbonesand cross connects

    18. Orange putih-orange-ijo putih-biru-biru putih-ijo-cokput-cok

    The ends of a UTP cable are shown in the exhibit.

    Which cable configuration is shown? crossover rollover reversed-pair straight-through

    split-pair console

    19.ijo putih-ijo-ornge putih-biru-biru putih-orange-cokput-cok

    The ends of a UTP cable are shown in the exhibit.Which cable configuration is shown?

    console crossover rollover

    reversed-pair split-pair straight-through

    20. Which of the following are benefits of a wireless

    network? (Choose two.) higher data speeds better security mobility

    less expensive NIC cards no need to run cables to hosts

    1. To ensure reliable LAN communications, what

    should a technician be looking for when attachingconnectors to the ends of UTP cable? that the white-orange/orange pair is attached first That the wire pairs remain twisted as much aspossible that one end of the shield is properly ground butnot the other

    that 50 ohm termination resistors are on both ends

    2. Which of the following describes frequency? length of each wave height of each wave number of cycles each second amount of time between each wave

    3. How are binary ones and zeros represented infiber optic installations? (Choose two.) +5 volts/-5 volts 0 volts/5 volts light/no light

    high to low electrical transition low to high electrical transition increasing/decreasing light intensity

    4. What is expected when crosstalk is present in

    networks with higher transmission frequencies?(Choose two.) jitter increase in crosstalk higher signal attenuation

    increases in cancellation effect destruction of more of the data signal

    5. A small company is experiencing difficulties onits LAN. After performing some tests, a technicianhas determined that the copper media supporting theLAN is experiencing abnormal attenuation. What

    are two possible causes of the problem? (Choosetwo.)

    defective connectors excessively long cable lengths use of higher grade cabling

    low frequency signals used in the media

    networkcable runs isolated from other cables

    6. What factors need to be considered to limit theamount of signal attenuation in Ethernet cable runs?(Choose two.) type of users number of users length of cable type of electrical equipment installation of connectors on the cable

    7. What conditions are described when transmission

    signals from one wire pair affects another wire pair?(Choose two.) noise resistance mismatch

    http://bp1.blogger.com/_TY4rWcZRSlU/RsraiX34MjI/AAAAAAAAAB8/pV7PQWsY4Vw/s1600-h/8022[1].jpghttp://bp2.blogger.com/_TY4rWcZRSlU/RsrZAn34MgI/AAAAAAAAABk/jZBqyoIYP6k/s1600-h/8020[1].jpghttp://bp1.blogger.com/_TY4rWcZRSlU/RsraiX34MjI/AAAAAAAAAB8/pV7PQWsY4Vw/s1600-h/8022[1].jpghttp://bp2.blogger.com/_TY4rWcZRSlU/RsrZAn34MgI/AAAAAAAAABk/jZBqyoIYP6k/s1600-h/8020[1].jpg
  • 7/28/2019 Jarkom CCNA Exam

    17/29

    jitter

    crosstalk attenuation

    8. What is a cause of crosstalk in UTP cable? cable pairs that are shorted cable pairs crossed during termination cabling runs installed in separate conduit

    cable pairs that are untwisted because of poor

    termination of the cable

    9. Which of the following are detected by the wiremap test? (Choose three.) near-end crosstalk (NEXT) opens propagation delay return loss reversed-pair faults short circuits

    10. A company needs to extend the LAN to six

    separate buildings. To limit the amount of signalattenuation on the LAN media, what type of mediawould be the best to use between the buildings? air (wireless) coaxial cable

    fiber shielded twisted pair unshielded twisted pair

    10. Which OSI layer addressing is required to routepackets between two networks?

    Layer 1

    Layer 2 Layer 3 Layer 4

    13. Which subnet mask will allow 2040 hosts persubnet on the IP network 10.0.0.0?

    255.255.0.0 255.255.254.0 255.255.252.0 255.255.248.0 255.255.240.0 255.255.255.128

    16.

    Refer to the exhibit. Which layered network model

    is shown in the diagram?CiscoIETFOSI

    TCP/IP

    Refer to the exhibit. Which two layers of the OSImodel describe the same functions as the transportand internet layers of the TCP/IP model? (Choosetwo.)application layerpresentation layer

    session layer

    transport layernetwork layerdata link layerphysical layer

    30. What happens when a host station receives aframe that contains its own MAC address in thedestination field?The Layer 2 information is removed and the frame ispushed up to Layer 3.The host station will copy the information to itsbuffers and send it back out.

    The frame originated from the host and will beignored.The Layer 3 information is added to the frame.32. What type of network is maintained if a servertakes no dedicated role in the network?

    mainframe client/server peer-to-peer centralized

    33. In a network design project, a network designer

    needs to select a device to provide collision freeconnections to 40 hosts on the LAN. Which deviceshould be selected?

    hub router switch firewall

    34. Which TCP/IP model layer creates additionaloverhead on network resources due toacknowledgments, tracking, and retransmission ofdata?

    internet transport application network access

    35. How many host addresses may be assigned when

    using the 128.107.0.0 network address with a subnetmask of 255.255.248.0?

    30 256 2046 2048 4094 4096

    http://ccnaanswers.com/wp-content/uploads/NetworkFundamentalsFinalExamAnswers.jpg
  • 7/28/2019 Jarkom CCNA Exam

    18/29

    36. Which service is used when the nslookup

    command is issued on a computer?

    FTP DNS DHCP Telnet

    37. Which process provides the means to send andreceive data when running multiple applications at

    the same time on a computer? interleaving sequencing segmentation acknowledgement

    38. Which three IPv4 addresses represent valid hostaddresses for a subnet? (Choose three.)

    10.1.12.79/28 10.1.12.113/28 10.1.12.32/28 10.1.11.5/27 10.1.11.97/27 10.1.11.128/27

    39. What is the consequence of issuing the erase

    startup-config command in privileged EXEC modeon a Cisco router?Data stored in RAM will be removed.Data stored in NVRAM will be erased.Information in flash memory will be removed.

    Flags in the configuration register will be set to 0.Both the startup-config and the running-config willbe erased.

    40.

    Refer to the exhibit. A network technician is trying

    to determine the correct IP address configuration forHost A. What is a valid configuration for Host A?

    IP address: 192.168.100.19; Subnet Mask:255.255.255.248; Default Gateway:192.16.1.2

    IP address: 192.168.100.20; Subnet Mask:255.255.255.240; Default Gateway:

    192.168.100.17

    IP address: 192.168.100.21; Subnet Mask:255.255.255.248; Default Gateway:192.168.100.18

    IP address: 192.168.100.22; Subnet Mask:255.255.255.240; Default Gateway: 10.1.1.5

    IP address: 192.168.100.30; Subnet Mask:255.255.255.240; Default Gateway:192.168.1.1

    IP address: 192.168.100.31; Subnet Mask:255.255.255.240; Default Gateway:

    192.168.100.18

    44. A routing issue has occurred in yourinternetwork. Which of the following type ofdevices should be examined to isolate this error?

    access point host hub router switch

    45. Which statement is true about Layer 3addresses?

    They are physical addresses. They are used in routing decisions. They are only used on local networks. They are altered each time a packet crosses

    a router.

    47. Which OSI layer does IP rely on to determinewhether packets have been lost and to requestretransmission?

    application presentation session transport

    50. Which option represents a point-to-point logicaltopology diagram?

    1. Arouterdetermines the path to deliver a packet.What layer of the OSI model does this factrepresent?

    sessiontransportnetworkdata link

    http://ccnaanswers.com/http://ccnaanswers.com/http://ccnaanswers.com/http://ccnaanswers.com/wp-content/uploads/Computer.jpghttp://ccnaanswers.com/wp-content/uploads/Exam2011.jpghttp://ccnaanswers.com/wp-content/uploads/Computer.jpghttp://ccnaanswers.com/wp-content/uploads/Exam2011.jpghttp://ccnaanswers.com/
  • 7/28/2019 Jarkom CCNA Exam

    19/29

  • 7/28/2019 Jarkom CCNA Exam

    20/29

    NIC hub switch router repeater

    11. What is the decimal representation of the binarynumber 11111000?

    224 240 248 252 254

    12. Which characteristics are common to both UDPand TCP? (Choose two.)

    provides windowing provides reliability uses port numbers acknowledges receipt of data classified as a connectionless protocol classified as a transport layer protocol

    13. The ping command can be used to testconnectivity between hosts. Which OSI model

    layers are verified by this test?

    Layers 1 and 2 only Layers 1 and 3 only Layers 1, 2 and 3 Layer 1 through Layer 7 Layer 4 through Layer 7

    14. Why do vendors utilize the OSI model whendesigning networking products?

    It places requirements on all vendors thatdevelop proprietary networking

    technologies for advance networkingsystems.

    It ensures greater compatibility andinteroperability with equipment from

    different vendors.

    The International Organization forStandards develops all new products to be

    incorporated into the product. It is mandated by the International

    Organization for Standardization thatnetwork products be compliant with the OSI

    model.

    15. An Ethernet host receives a frame, calculates theFCS, and compares the calculated FCS to the FCSreceived in the frame. The host finds that the twoFCS values do not match. What action will be takenby the host?

    The host discards the frame.

    The host processes the data frame normally. The host initiates a request for

    retransmission of the frame.

    The host sends the frame content to an upperlayer protocol for error recovery.

    16. Why would a company install a switch instead ofa hub when building or expanding a corporatenetwork?

    A switch manages frames faster than a hubdoes.

    A switch operates at 100 Mbps. A huboperates at a maximum of 10 Mbps.

    A switch modifies the Ethernet frame toremove any errors. A hub forwards theframe exactly as it arrived.

    A switch provides more bandwidth bysending frames only out the port to whichthe destination device is attached. A hubsends the frame out all ports except thesource port.

    17.

    Refer to the exhibit. What is the order of the TCP/IP

    Protocol Data Units as data is moved as indicatedthrough the OSI model?

    bits, segments, frames, packets, data bits, frames, packets, segments, data bits, frames, segments, packets, data bits, packets, frames, segments, data

    18. After an unsuccessful ping to the local router,the technician decides to investigate the router. Thetechnician observes that the lights and fan on therouter are not operational. In which layer of the OSI

    model is the problem most likely occurring?

    transport network data link physical

    19. Which of the following statements are correctabout CSMA/CD? (Choose three.)

    It is a media access method used in LANs. It is a media access method used in FDDI

    WANs.

    When a device needs to transmit, it checksto see if the media is available.

    A device sends data without checking mediaavailability because all devices have equalaccess.

    http://ccnaanswers.com/wp-content/uploads/CCNA1FinalExamAnswersV3.14.jpg
  • 7/28/2019 Jarkom CCNA Exam

    21/29

    Multiple devices can successfully transmitsimultaneously.

    Only one device can successfully transmit ata time.

    20. A network administrator has installed a 24 port

    switch and connected 10 computers with 10/100NICs. If the NICs are operating at 100 Mbps, how

    much bandwidth is available for each computer to

    receive data? 0.24 Mbps 4.17 Mbps 10 Mbps 24 Mbps 100 Mbps 200 Mbps

    21.

    Refer to the exhibit. A newly hired technician has a

    task of terminating CAT 5 UTP cables. The networkadministrator visually examined the cables thetechnician terminated. Some of the cables have

    connectors as shown in the exhibit. What should thenetwork administrator explain to the technician

    about the cables?

    Both cables are acceptable. The cable in Graphic A will produce more

    crosstalk.

    The cable in Graphic A should be used inthe more critical network segments.

    The cable in Graphic A is preferred becauseit will be easier to crimp the connector.

    22. Which technologies are considered to be LANtechnologies? (Choose two.)

    DSL Token Ring Frame Relay ISDN Ethernet

    Refer to the exhibit. The connections in the exhibitare labeled A through E. Which of these indicateLAN links? (Choose two.)

    link A link B link C link D link E

    24.

    Consider the networks shown in the exhibit. Host Ais sending packets to host B. Which layer of the OSImodel is being used when the router is making the

    calculated decision to determine which interface tosend the packet out?physical

    data linknetworktransportsessionpresentation

    25. What are important characteristics to considerwhen purchasing a network interface card? (Choose

    two.)security used on the network

    media used on the network system bus used on the computer software installed on the network diagnostic tools installed on the network

    26.

    http://ccnaanswers.com/wp-content/uploads/CCNA1FinalExamAnswersV3.17.jpghttp://ccnaanswers.com/wp-content/uploads/CCNA1FinalExamAnswersV3.16.jpghttp://ccnaanswers.com/wp-content/uploads/CCNA1FinalExamAnswersV3.15.jpghttp://ccnaanswers.com/wp-content/uploads/CCNA1FinalExamAnswersV3.17.jpghttp://ccnaanswers.com/wp-content/uploads/CCNA1FinalExamAnswersV3.16.jpghttp://ccnaanswers.com/wp-content/uploads/CCNA1FinalExamAnswersV3.15.jpghttp://ccnaanswers.com/wp-content/uploads/CCNA1FinalExamAnswersV3.17.jpghttp://ccnaanswers.com/wp-content/uploads/CCNA1FinalExamAnswersV3.16.jpghttp://ccnaanswers.com/wp-content/uploads/CCNA1FinalExamAnswersV3.15.jpg
  • 7/28/2019 Jarkom CCNA Exam

    22/29

    Refer to the exhibit. Which diagram represents thenetwork topology that an administrator wouldprefer, and why would the administrator prefer it?

    Diagram A. It provides the hosts with full-duplex connections.

    Diagram A. It will better provide availablebandwidth to the hosts.

    Diagram B. It extends the collision domain. Diagram B. It prevents the frames from

    looping.

    Either network will perform equally well.27.

    Refer to the exhibit. The physical documentationshows a portion of the internetwork of the ABCCompany. Which segments will be free of

    collisions?

    segments 1 and 2 segments 1, 2, and 3 segments 1, 2, 3, 4, and 5 segments 2 and 3 segments 3, 4, and 5 segments 4, and 5

    28.

    Refer to the exhibit. The network administratorwants to create a subnet for the point-to-pointconnection between the two routers. Which

    subnetwork mask would provide enough addressesfor the point-to-point link with the least number ofwasted addresses?

    255.255.255.192

    255.255.255.224 255.255.255.240 255.255.255.248

    255.255.255.25229.sama 22nya

    Refer to the exhibit. What kind of Ethernet cable isrepresented?

    rollover cable straight-through cable crossover cable console cable

    30.

    Based on the graphic above, which of the followingoccurs as each host system comes on line in thetopology?

    The switch sends its MAC address to eachhost.

    The switch adds MAC address to the bridgetable as each host sends a frame.

    Each host exchanges MAC addresses witheach other.

    The switch listens for data traffic to blocksince the switch lacks an IP address.

    31. Two peer hosts are exchanging data using TFTP.During the current session, a datagram fails to arriveat the destination. Which statement is true regardingthe retransmission of the datagram?

    Datagram retransmission requires userauthentication.

    Datagram retransmission is controlled bythe application.

    Datagram retransmission relies on theacknowledgements at transport layer.

    Datagram retransmission occurs when theretransmission timer expires in the sourcehost.

    32. Which type of address is 192.168.170.112/28?

    host address subnetwork address broadcast address multicast address

    http://ccnaanswers.com/wp-content/uploads/CCNA1FinalExamAnswersV3.112.jpghttp://ccnaanswers.com/wp-content/uploads/CCNA1FinalExamAnswersV3.111.jpghttp://ccnaanswers.com/wp-content/uploads/CCNA1FinalExamAnswersV3.110.jpghttp://ccnaanswers.com/wp-content/uploads/CCNA1FinalExamAnswersV3.19.jpghttp://ccnaanswers.com/wp-content/uploads/CCNA1FinalExamAnswersV3.18.jpghttp://ccnaanswers.com/wp-content/uploads/CCNA1FinalExamAnswersV3.112.jpghttp://ccnaanswers.com/wp-content/uploads/CCNA1FinalExamAnswersV3.111.jpghttp://ccnaanswers.com/wp-content/uploads/CCNA1FinalExamAnswersV3.110.jpghttp://ccnaanswers.com/wp-content/uploads/CCNA1FinalExamAnswersV3.19.jpghttp://ccnaanswers.com/wp-content/uploads/CCNA1FinalExamAnswersV3.18.jpghttp://ccnaanswers.com/wp-content/uploads/CCNA1FinalExamAnswersV3.112.jpghttp://ccnaanswers.com/wp-content/uploads/CCNA1FinalExamAnswersV3.111.jpghttp://ccnaanswers.com/wp-content/uploads/CCNA1FinalExamAnswersV3.110.jpghttp://ccnaanswers.com/wp-content/uploads/CCNA1FinalExamAnswersV3.19.jpghttp://ccnaanswers.com/wp-content/uploads/CCNA1FinalExamAnswersV3.18.jpghttp://ccnaanswers.com/wp-content/uploads/CCNA1FinalExamAnswersV3.112.jpghttp://ccnaanswers.com/wp-content/uploads/CCNA1FinalExamAnswersV3.111.jpghttp://ccnaanswers.com/wp-content/uploads/CCNA1FinalExamAnswersV3.110.jpghttp://ccnaanswers.com/wp-content/uploads/CCNA1FinalExamAnswersV3.19.jpghttp://ccnaanswers.com/wp-content/uploads/CCNA1FinalExamAnswersV3.18.jpghttp://ccnaanswers.com/wp-content/uploads/CCNA1FinalExamAnswersV3.112.jpghttp://ccnaanswers.com/wp-content/uploads/CCNA1FinalExamAnswersV3.111.jpghttp://ccnaanswers.com/wp-content/uploads/CCNA1FinalExamAnswersV3.110.jpghttp://ccnaanswers.com/wp-content/uploads/CCNA1FinalExamAnswersV3.19.jpghttp://ccnaanswers.com/wp-content/uploads/CCNA1FinalExamAnswersV3.18.jpg
  • 7/28/2019 Jarkom CCNA Exam

    23/29

  • 7/28/2019 Jarkom CCNA Exam

    24/29

    and Host B. However, the distance between the two

    hosts is further than the cabling standards allow.Which two devices that operate at the physical layerof the OSI can be used to allow Host A and Host Bto communicate? (Choose two.)

    switch hub bridge router repeater

    41.

    Refer to the exhibit. Workstation 1 pings the Fa0/1interface of Router 1. Which MAC address will

    workstation 1 obtain during the ARP request for thiscommunication?

    00-06-5B-88-DF-C3 00-B0-D0-7F-F7-46 00-0F-24-85-75-C0 00-0B-E5-64-BD-44 00-08-A3-B6-CE-02 00-08-A3-B6-CE-03

    42.

    Refer to the exhibit. A network technician is tryingto determine the correct IP address configuration forHost A. What is a valid configuration for Host A?

    IP address: 192.168.100.19; Subnet Mask:255.255.255.248; Default Gateway:192.16.1.2

    IP address: 192.168.100.20; Subnet Mask:255.255.255.240; Default Gateway:192.168.100.17

    IP address: 192.168.100.21; Subnet Mask:255.255.255.248; Default Gateway:192.168.100.18

    IP address: 192.168.100.22; Subnet Mask:255.255.255.240; Default Gateway: 10.1.1.5

    IP address: 192.168.100.30; Subnet Mask:255.255.255.240; Default Gateway:192.168.1.1

    IP address: 192.168.100.31; Subnet Mask:255.255.255.240; Default Gateway:192.168.100.18

    43. Which subnet masks could be used when

    subnetting a Class B IP address? (Choose two.)

    255.255.255.240 255.255.192.0 255.255.0.0 255.192.0.0 240.0.0.0 255.0.0.0

    44. A network administrator has added a new switchto the network. The new switch connects to anexisting switch that is already installed. Which UTPcable correctly connects the new switch to theexisting switch?

    crossover rollover straight-through console

    45.

    A technician is testing connectivity between thedevices using the ping command. Pings betweenHost B and Host A were successful. The techniciancould not ping the R3 address 172.16.3.2 from HostA. The technician issued ipconfig from Host A andsaw the information displayed in the exhibit. What is

    the most likely problem?

    The IP address of Host A is incorrect. The subnet mask of Host A is incorrect. The default gateway of Host A is incorrect. Host A is properly configured. Some other

    problem exists in the internetwork.

    46. A router interface has been assigned an IPaddress of 172.16.192.166 with a mask of

    255.255.255.248. To which subnet does the IPaddress belong?

    172.16.0.0 172.16.192.0 172.16.192.128 172.16.192.160 172.16.192.168 172.16.192.176

    47.

    http://ccnaanswers.com/wp-content/uploads/CCNA1FinalExamAnswersV3.120.jpghttp://ccnaanswers.com/wp-content/uploads/CCNA1FinalExamAnswersV3.119.jpghttp://ccnaanswers.com/wp-content/uploads/CCNA1FinalExamAnswersV3.118.jpghttp://ccnaanswers.com/wp-content/uploads/CCNA1FinalExamAnswersV3.120.jpghttp://ccnaanswers.com/wp-content/uploads/CCNA1FinalExamAnswersV3.119.jpghttp://ccnaanswers.com/wp-content/uploads/CCNA1FinalExamAnswersV3.118.jpghttp://ccnaanswers.com/wp-content/uploads/CCNA1FinalExamAnswersV3.120.jpghttp://ccnaanswers.com/wp-content/uploads/CCNA1FinalExamAnswersV3.119.jpghttp://ccnaanswers.com/wp-content/uploads/CCNA1FinalExamAnswersV3.118.jpg
  • 7/28/2019 Jarkom CCNA Exam

    25/29

    How many collision domains are shown in thediagram?

    three four five six seven eight

    48. A large company has a network that is constantlychanging. The routing tables in the routers need tobe adjusted to reflect the changes in the routingpaths. What type of routing would the networkadministrator implement?

    static routes dynamic routing protocols only default routes none. No routing is necessary.

    1. Which of the following protocols are examples of

    TCP/IP transport layer protocols?

    a. Ethernet

    b. HTTP

    c. IPd. UDP

    e. SMTP

    f. TCP

    2. Which of the following protocols are examples of

    TCP/IP network access layer

    protocols?

    a. Ethernet

    b. HTTP

    c. IPd. UDP

    e. SMTP

    f. TCP

    g. PPP

    3. The process of HTTP asking TCP to send some

    data and make sure that it is received

    correctly is an example of what?

    a. Same-layer interaction

    b. Adjacent-layer interaction

    c. The OSI model

    d. All the other answers are correct.

    4. The process of TCP on one computer marking a

    segment as segment 1, and the

    receiving computer then acknowledging the receipt

    of segment 1, is an example of

    what?

    a. Data encapsulation

    b. Same-layer interaction

    c. Adjacent-layer interaction

    d. The OSI model

    e. None of these answers are correct.

    5. The process of a web server adding a TCP header

    to a web page, followed by adding

    an IP header, and then a data link header and trailer

    is an example of what?

    a. Data encapsulation

    b. Same-layer interaction

    c. The OSI model

    d. All of these answers are correct.

    6. Which of the following terms is used specifically

    to identify the entity that is created

    when encapsulating data inside data link layer

    headers and trailers?

    a. Data

    b. Chunk

    c. Segment

    d. Frame

    e. Packetf. None of thesethere is no encapsulation by the

    data link layer.

    7. Which OSI layer defines the functions of logical

    network-wide addressing and routing?

    a. Layer 1

    b. Layer 2

    c. Layer 3

    d. Layer 4

    e. Layer 5

    f. Layer 6

    g. Layer 7

    8. Which OSI layer defines the standards for cabling

    and connectors?

    a. Layer 1

    b. Layer 2

    c. Layer 3

    d. Layer 4

    e. Layer 5

    f. Layer 6

    g. Layer 7

    http://ccnaanswers.com/wp-content/uploads/CCNA1FinalExamAnswersV3.121.jpg
  • 7/28/2019 Jarkom CCNA Exam

    26/29

    9. Which OSI layer defines the standards for data

    formats and encryption?

    a. Layer 1

    b. Layer 2

    c. Layer 3

    d. Layer 4

    e. Layer 5

    f. Layer 6

    g. Layer 7

    10. Which of the following terms are not valid terms

    for the names of the seven OSI layers?

    a. Application

    b. Data link

    c. Transmission

    d. Presentation

    e. Internet

    f. Session

    1. Which of the following is true about the cabling

    of a typical modern Ethernet LAN?

    a. Connect each device in series using coaxial

    cabling

    b. Connect each device in series using UTP cabling

    c. Connect each device to a centralized LAN hub

    using UTP cabling

    d. Connect each device to a centralized LAN

    switch using UTP cabling

    2. Which of the following is true about the cabling

    of a 10BASE2 Ethernet LAN?

    a. Connect each device in series using coaxial

    cabling

    b. Connect each device in series using UTP cabling

    c. Connect each device to a centralized LAN hub

    using UTP cabling

    d. Connect each device to a centralized LAN switch

    using UTP cabling

    3. Which of the following is true about Ethernet

    crossover cables?

    a. Pins 1 and 2 are reversed on the other end of the

    cable.

    b. Pins 1 and 2 on one end of the cable connect to

    pins 3 and 6 on the other end of the cable.

    c. Pins 1 and 2 on one end of the cable connect to

    pins 3 and 4 on the other end of the cable.

    d. The cable can be up to 1000 meters long to cross

    over between buildings.

    e. None of the other answers is correct.

    4. Each answer lists two types of devices used in a

    100BASE-TX network. If these

    devices were connected with UTP Ethernet cables,

    which pairs of devices would

    require a straight-through cable?

    a. PC and router

    b. PC and switch

    c. Hub and switch

    d. Router and hub

    e. Wireless access point (Ethernet port) and

    switch

    5. Which of the following is true about the

    CSMA/CD algorithm?

    a. The algorithm never allows collisions to occur.

    b. Collisions can happen, but the algorithm

    defines how the computers should notice a

    collision and how to recover.

    c. The algorithm works with only two devices on thesame Ethernet.

    d. None of the other answers is correct.

    6. Which of the following is a collision domain?

    a. All devices connected to an Ethernet hub

    b. All devices connected to an Ethernet switch

    c. Two PCs, with one cabled to a router Ethernet

    port with a crossover cable and the

    other PC cabled to another router Ethernet port with

    a crossover cabled. None of the other answers is correct.

    7. Which of the following describe a shortcoming of

    using hubs that is improved by

    instead using switches?

    a. Hubs create a single electrical bus to which all

    devices connect, causing the devices to share the

    bandwidth.

    b. Hubs limit the maximum cable length of

    individual cables (relative to switches)

    c. Hubs allow collisions to occur when two

    attached devices send data at the same

    time.

    d. Hubs restrict the number of physical ports to at

    most eight.

    8. Which of the following terms describe Ethernet

    addresses that can be used to

    communicate with more than one device at a time?

    a. Burned-in address

    b. Unicast address

    c. Broadcast address

    d. Multicast address

  • 7/28/2019 Jarkom CCNA Exam

    27/29

    9. Which of the following is one of the functions of

    OSI Layer 2 protocols?

    a. Framing

    b. Delivery of bits from one device to another

    c. Error recovery

    d. Defining the size and shape of Ethernet cards

    10. Which of the following are true about the format

    of Ethernet addresses?

    a. Each manufacturer puts a unique code into the

    first 2 bytes of the address.

    b. Each manufacturer puts a unique code into the

    first 3 bytes of the address.

    c. Each manufacturer puts a unique code into the

    first half of the address.

    d. The part of the address that holds this

    manufacturers code is called the MAC.

    e. The part of the address that holds thismanufacturers code is called the OUI.

    f. The part of the address that holds this

    manufacturers code has no specific name.

    11. Which of the following is true about the Ethernet

    FCS field?

    a. It is used for error recovery.

    b. It is 2 bytes long.

    c. It resides in the Ethernet trailer, not the

    Ethernet header.d. It is used for encryption.

    e. None of the other answers is correct.

    1. Which of the following best describes the main

    function of OSI Layer 1 protocols?

    a. Framing

    b. Delivery of bits from one device to another

    c. Addressing

    d. Local Management Interface (LMI)

    e. DLCI

    2. Which of the following typically connects to a

    four-wire line provided by a telco?

    a. Router serial interface

    b. CSU/DSU

    c. Transceiver

    d. Switch serial interface

    3. Which of the following typically connects to a

    V.35 or RS-232 end of a cable when

    cabling a leased line?

    a. Router serial interface

    b. CSU/DSU

    c. Transceiver

    d. Switch serial interface

    4. On a point-to-point WAN link using a leased line

    between two routers located

    hundreds of miles apart, what devices are considered

    to be the DTE devices?

    a. Routers

    b. CSU/DSU

    c. The central office equipment

    d. A chip on the processor of each router

    e. None of these answers are correct.

    5. Which of the following functions of OSI Layer 2

    is specified by the protocol standard

    for PPP, but is implemented with a Cisco proprietary

    header field for HDLC?

    a. Framing

    b. Arbitrationc. Addressing

    d. Error detection

    e. Identifying the type of protocol that is inside

    the frame

    6. Imagine that Router1 has three point-to-point

    serial links, one link each to three remote

    routers. Which of the following is true about the

    required HDLC addressing at

    Router1?a. Router1 must use HDLC addresses 1, 2, and 3.

    b. Router1 must use any three unique addresses

    between 1 and 1023.

    c. Router1 must use any three unique addresses

    between 16 and 1000.

    d. Router1 must use three sequential unique

    addresses between 1 and 1023.

    e. None of these answers are correct.

    7. What is the name of the Frame Relay field used to

    identify Frame Relay virtual

    circuits?

    a. Data-link connection identifier

    b. Data-link circuit identifier

    c. Data-link connection indicator

    d. Data-link circuit indicator

    e. None of these answers are correct.

    8. Which of the following is true about Frame Relay

    virtual circuits (VCs)?

    a. Each VC requires a separate access link.

    b. Multiple VCs can share the same access link.

  • 7/28/2019 Jarkom CCNA Exam

    28/29

    c. All VCs sharing the same access link must

    connect to the same router on the

    other side of the VC.

    d. All VCs on the same access link must use the

    same DLCI.

    1. Which of the following are functions of OSI

    Layer 3 protocols?

    a. Logical addressing

    b. Physical addressing

    c. Path selection

    d. Arbitration

    e. Error recovery

    2. Imagine that PC1 needs to send some data to PC2,

    and PC1 and PC2 are separated by

    several routers. What are the largest entities that

    make it from PC1 to PC2?

    a. Frameb. Segment

    c. Packet

    d. L5 PDU

    e. L3 PDU

    f. L1 PDU

    3. Imagine a network with two routers that are

    connected with a point-to-point HDLC serial link.

    Each router has an Ethernet, with PC1 sharing the

    Ethernet with Router1, and PC2 sharing the Ethernet

    with Router2. When PC1 sends data to PC2, whichof the following is true?

    a. Router1 strips the Ethernet header and trailer

    off the frame received from PC1, never to be used

    again.

    b. Router1 encapsulates the Ethernet frame inside an

    HDLC header and sends the frame to Router2,

    which extracts the Ethernet frame for forwarding to

    PC2.

    c. Router1 strips the Ethernet header and trailer off

    the frame received from PC1, which is exactly re-

    created by R2 before forwarding data to PC2.

    d. Router1 removes the Ethernet, IP, and TCP

    headers and rebuilds the appropriate headers before

    forwarding the packet to Router2.

    4. Which of the following are valid Class C IP

    addresses that can be assigned to hosts?

    a. 1.1.1.1

    b. 200.1.1.1

    c. 128.128.128.128

    d. 224.1.1.1

    e. 223.223.223.255

    5. What is the range of values for the first octet for

    Class A IP networks?

    a. 0 to 127

    b. 0 to 126

    c. 1 to 127

    d. 1 to 126

    e. 128 to 191

    f. 128 to 192

    6. PC1 and PC2 are on two different Ethernets that

    are separated by an IP router. PC1s

    IP address is 10.1.1.1, and no subnetting is used.

    Which of the following addresses

    could be used for PC2?

    a. 10.1.1.2

    b. 10.2.2.2

    c. 10.200.200.1

    d. 9.1.1.1

    e. 225.1.1.1f. 1.1.1.1

    7. Each Class B network contains how many IP

    addresses that can be assigned to hosts?

    a. 16,777,214

    b. 16,777,216

    c. 65,536

    d. 65,534

    e. 65,532

    f. 32,768g. 32,766

    8. Each Class C network contains how many IP

    addresses that can be assigned to hosts?

    a. 65,534

    b. 65,532

    c. 32,768

    d. 32,766

    e. 256

    f. 254

    9. Which of the following does a router normally use

    when making a decision about

    routing TCP/IP packets?

    a. Destination MAC address

    b. Source MAC address

    c. Destination IP address

    d. Source IP address

    e. Destination MAC and IP address

    10. Which of the following are true about a LAN-

    connected TCP/IP host and its IP routing

    (forwarding) choices?

  • 7/28/2019 Jarkom CCNA Exam

    29/29

    a. The host always sends packets to its default

    gateway.

    b. The host sends packets to its default gateway if

    the destination IP address is in a different class of

    IP network than the host.

    c. The host sends packets to its default gateway if

    the destination IP address is in a different subnet

    than the host.

    d. The host sends packets to its default gateway if

    the destination IP address is in the same subnet as

    the host.

    11. Which of the following are functions of a routing

    protocol?

    a. Advertising known routes to neighboring

    routers.

    b. Learning routes for subnets directly connected to

    the router.

    c. Learning routes, and putting those routes intothe routing table, for routes adver-tised to the

    router by its neighboring routers.

    d. To forward IP packets based on a packets

    destination IP address.

    12. Which of the following protocols allows a client

    PC to discover the IP address of another computer

    based on that other computers name?

    a. ARP

    b. RARPc. DNS

    d. DHCP

    13. Which of the following protocols allows a client

    PC to request assignment of an IP address as well as

    learn its default gateway?

    a. ARP

    b. RARP

    c. DNS

    d. DHCP