Sell your lecture notes and other study documents.
Offer multiple documents together as a bundle and sell more.
Work as a tutor and help students with their studies.
View requests and send a proposal how you can help.
CCNA 1 Final Exam Answers 2017 (v5.1+v6.0) Introduction to Networks
CCNA 1 Final Exam Answers 2017 (v5.1+v6.0) Introduction to Networks
1. What is a characteristic of a fault tolerant network?
a network that protects confidential information from unauthorized access a network that can expand quickly to support new users and applications without
impacting the performance of the service delivered to existing users
a network that supports a mechanism for managing congestion and ensuring reliable
delivery of content to all users
a network that recovers quickly when a failure occurs and depends on redundancy
to limit the impact of a failure*
2. Three bank employees are using the corporate network. The first employee uses a web
browser to view a company web page in order to read some announcements. The second employee accesses the corporate database to perform some financial transactions. The third employee participates in an important live audio conference with other corporate managers in branch offices. If QoS is implemented on this network, what will be the priorities from highest to lowest of the different data types?
financial transactions, audio conference, web page audio conference, financial transactions, web page* audio conference, web page, financial transactions financial transactions, web page, audio conference
3. What is a benefit of using cloud computing in networking?
End users have the freedom to use personal tools to access information and
communicate across a business network.
Network capabilities are extended without requiring investment in new
infrastructure, personnel, or software.*
Technology is integrated into every-day appliances allowing them to interconnect with
other devices, making them more ‘smart’ or automated.
Home networking uses existing electrical wiring to connect devices to the network
wherever there is an electrical outlet, saving the cost of installing data cables.
4. What is the function of the shell in an OS?
It interacts with the device hardware. It interfaces between the users and the kernel.* It provides dedicated firewall services. It provides the intrusion protection services for the device.
5. Which connection provides a secure CLI session with encryption to a Cisco switch?
a console connection an AUX connection a Telnet connection an SSH connection*
6. A network technician is attempting to configure an interface by entering the following
command: SanJose(config)# ip address 192.168.2.1 255.255.255.0. The command is rejected by the device. What is the reason for this?
The command is being entered from the wrong mode of operation.* The command syntax is wrong. The subnet mask information is incorrect.
The interface is shutdown and must be enabled before the switch will accept the IP
7. An administrator uses the Ctrl-Shift-6 key combination on a switch after issuing the ping
command. What is the purpose of using these keystrokes?
to restart the ping process to interrupt the ping process* to exit to a different configuration mode to allow the user to complete the command
8. Refer to the exhibit. A network administrator is configuring access control to switch
SW1. If the administrator uses a console connection to connect to the switch, which password is needed to access user EXEC mode?
letmein secretin linevtyin lineconin*
9. On which switch interface would an administrator configure an IP address so that the
switch can be managed remotely?
FastEthernet0/1 VLAN 1* vty 0 console 0
10. What protocol is responsible for controlling the size of segments and the rate at which
segments are exchanged between a web client and a web server?
TCP* IP HTTP Ethernet
11. What is an advantage to using a protocol that is defined by an open standard?
A company can monopolize the market. The protocol can only be run on equipment from a specific vendor. An open standard protocol is not controlled or regulated by standards organizations. It encourages competition and promotes choices.*
12. What are two benefits of using a layered network model? (Choose two.)
It assists in protocol design. * It speeds up packet delivery.
It prevents designers from creating their own model. It prevents technology in one layer from affecting other layers.* It ensures a device at one layer can function at the next higher layer.
13. Which two OSI model layers have the same functionality as two layers of the TCP/IP
model? (Choose two.)
data link network* physical session transport*
14. Which name is assigned to the transport layer PDU?
bits data frame packet segment*
15. A network engineer is measuring the transfer of bits across the company backbone for a
mission critical database application. The engineer notices that the network throughput appears lower than the bandwidth expected. Which three factors could influence the differences in throughput? (Choose three.)
the amount of traffic that is currently crossing the network* the sophistication of the encapsulation method applied to the data the type of traffic that is crossing the network* the latency that is created by the number of network devices that the data is
the bandwidth of the WAN connection to the Internet the reliability of the gigabit Ethernet infrastructure of the backbone
16. A network administrator is troubleshooting connectivity issues on a server. Using a
tester, the administrator notices that the signals generated by the server NIC are distorted and not usable. In which layer of the OSI model is the error categorized?
presentation layer network layer physical layer* data link layer
17. Which type of UTP cable is used to connect a PC to a switch port?
console rollover crossover straight-through**
18. A network administrator is measuring the transfer of bits across the company backbone
for a mission critical financial application. The administrator notices that the network throughput appears lower than the bandwidth expected. Which three factors could influence the differences in throughput? (Choose three.)
the amount of traffic that is currently crossing the network* the sophistication of the encapsulation method applied to the data the type of traffic that is crossing the network * the latency that is created by the number of network devices that the data is
the bandwidth of the WAN connection to the Internet
Download all 58 pages for € 8,99
811 documents uploaded
2 documents sold
Help in all Courses Dq's,Assignments and MCQS,Midterm & Final Exams(Expert in Commerce field )
Experience: 10 Years in online teaching field.
Do you make summaries or do you have any completed assignments? Upload your documents to Knoowy and earn money.
Upon registration you agree to our privacy statement and terms and conditions .
At Knoowy you buy and sell the best studies documents directly from students. Upload at least one item, please help other students and get € 2.50 credit.