CCNA1 Practice Final Exam & Answer
Soal Beserta jawaban Latihan CCNA 1
Practice Final
STMIK Nusa Mandiri Jakarta
1. Which two statements correctly describe a router memory type and
its contents? (Choose two.)
ROM
is nonvolatile and stores the running IOS.
FLASH
is nonvolatile and contains a limited portion of the IOS.
RAM
is volatile and stores the IP routing table.
NVRAM
is nonvolatile and stores a full version of the IOS.
ROM
is nonvolatile and contains basic diagnostic software.
2. At a minimum, which address is required on IPv6-enabled
interfaces?
link-local
global
unicast
site
local
unique
local
3. An Internet television transmission is using UDP. What happens
when part of the transmission is not delivered to the destination?
The
transmission continues without the missing portion.
The
entire transmission is re-sent.
The
part of the television transmission that was lost is re-sent.
A
delivery failure message is sent to the source host.
4. What PDU is associated with the transport layer?
bits
packet
frame
segment
5. An IPv6 enabled device sends a data packet with the destination
address of FF02::2. What is the target of this packet?
all
IPv6 configured routers on the local link
all
IPv6 enabled devices on the local link
all
IPv6 enabled devices across the network
all
IPv6 DHCP servers
6
A graphic shows the partial configuration of a switch. The
commands displayed are as follows:
SW1# configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
SW1(config)# enable password letmein
SW1(config)# enable secret secretin
SW1(config)# line console 0
SW1(config-line)# password lineconin
SW1(config-line)# login
SW1(config-line)# exit
SW1(config)# line vty 0 15
SW1(config-line)# password linevtyin
SW1(config-line)# login
SW1(config-line)# end
SW1#
SW1# configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
SW1(config)# enable password letmein
SW1(config)# enable secret secretin
SW1(config)# line console 0
SW1(config-line)# password lineconin
SW1(config-line)# login
SW1(config-line)# exit
SW1(config)# line vty 0 15
SW1(config-line)# password linevtyin
SW1(config-line)# login
SW1(config-line)# end
SW1#
Refer to the exhibit. A network administrator is configuring
access control to switch SW1. If the administrator uses Telnet to connect to
the switch, which password is needed to access user EXEC mode?
letmein
secretin
lineconin
linevtyin
7. A small business user is looking for an ISP connection that provides
high speed digital transmission over regular phone lines. What ISP connection
type should be used?
DSL
dial-up
satellite
cell
modem
cable
modem
8. What is done to an IP packet before it is transmitted over the
physical medium?
It
is segmented into smaller individual pieces.
It
is tagged with information guaranteeing reliable delivery.
It
is encapsulated into a TCP segment.
It
is encapsulated in a Layer 2 frame.
9. What will be the result of failed login attempts if the
following command is entered into a router?
login block-for 150 attempts 4 within 90
All
login attempts will be blocked for 4 hours if there are 90 failed attempts
within 150 seconds.
All
login attempts will be blocked for 90 seconds if there are 4 failed attempts within
150 seconds.
All
login attempts will be blocked for 1.5 hours if there are 4 failed attempts
within 150 seconds.
All
login attempts will be blocked for 150 seconds if there are 4 failed attempts
within 90 seconds.
10. A technician with a PC is using multiple applications while
connected to the Internet. How is the PC able to keep track of the data flow
between multiple application sessions and have each application receive the
correct packet flows?
The
data flow is being tracked based on the destination IP address that is used by
the PC of the technician.
The
data flow is being tracked based on the source port number that is used by each
application.
The
data flow is being tracked based on the destination MAC address of the
technician PC.
The
data flow is being tracked based on the source IP address that is used by the
PC of the technician.
11
The graphic shows the output of the command netstat -rissued
on a workstation:
C:\Windows\system32> netstat -r
<output omitted>
IPv6 Route Table
=======================================================
Active Routes:
If Metric Network Destination Gateway
9 306 ::/0 On-link
1 306 ::1/128 On-link
9 306 2001::/32 On-link
9 306 2001:0:9d38:6ab8:30d0:115:3f57:fe4c/128 On-link
4 281 fe80::/64 On-link
9 306 fe80::/64 On-link
4 281 fe80::1c20:5d8b:4b44:bd40/128 On-link
9 306 fe80::30d0:115:3f57:fe4c/128 On-link
1 306 ff00::/8 On-link
4 281 ff00::/8 On-link
9 306 ff00::/8 On-link
=======================================================
C:\Windows\system32> netstat -r
<output omitted>
IPv6 Route Table
=======================================================
Active Routes:
If Metric Network Destination Gateway
9 306 ::/0 On-link
1 306 ::1/128 On-link
9 306 2001::/32 On-link
9 306 2001:0:9d38:6ab8:30d0:115:3f57:fe4c/128 On-link
4 281 fe80::/64 On-link
9 306 fe80::/64 On-link
4 281 fe80::1c20:5d8b:4b44:bd40/128 On-link
9 306 fe80::30d0:115:3f57:fe4c/128 On-link
1 306 ff00::/8 On-link
4 281 ff00::/8 On-link
9 306 ff00::/8 On-link
=======================================================
Refer to the exhibit. A user issues the command netstat
–r on a workstation. Which IPv6 address is one of the link-local
addresses of the workstation?
fe80::30d0:115:3f57:fe4c/128
fe80::/64
::1/128
2001:0:9d38:6ab8:30d0:115:3f57:fe4c/128
12. In an Ethernet network, when a device receives a frame of 1200
bytes, what will it do?
drop
the frame
process
the frame as it is
send
an error message to the sending device
add
random data bytes to make the frame 1518 bytes long and then forward it
13. In addition to the cable length, what two factors could
interfere with the communication carried over UTP cables? (Choose two.)
electromagnetic
interference
signal
modulation technique
size
of the network
bandwidth
crosstalk
14. What is the objective of a network reconnaissance attack?
unauthorized
manipulation of data
disabling
network systems or services
denying
access to resources by legitimate users
discovery
and mapping of systems
15. An author is uploading one chapter document from a personal
computer to a file server of a book publisher. What role is the personal
computer assuming in this network model?
transient
client
slave
master
server
16. If data is being sent over a wireless network, then connects to
an Ethernet network, and eventually connects to a DSL connection, which header
will be replaced each time the data travels through a network infrastructure
device?
data
link
Layer
3
Layer
4
physical
17. A network administrator is variably subnetting a given block of
IPv4 addresses. Which combination of network addresses and prefix lengths will
make the most efficient use of addresses when the need is for 2 subnets capable
of supporting 10 hosts and 1 subnet that can support 6 hosts?
10.1.1.128/26
10.1.1.144/26
10.1.1.160/26
10.1.1.144/26
10.1.1.160/26
10.1.1.128/28
10.1.1.144/28
10.1.1.160/28
10.1.1.144/28
10.1.1.160/28
10.1.1.128/28
10.1.1.140/28
10.1.1.158/26
10.1.1.140/28
10.1.1.158/26
10.1.1.128/26
10.1.1.140/26
10.1.1.158/28
10.1.1.140/26
10.1.1.158/28
10.1.1.128/28
10.1.1.144/28
10.1.1.160/29
10.1.1.144/28
10.1.1.160/29
18. What is the purpose of ICMP messages?
to
inform routers about network topology changes
to
ensure the delivery of an IP packet
to
provide feedback of IP packet transmissions
to
monitor the process of a domain name to IP address resolution
19. A network administrator enters the service password-encryption command
into the configuration mode of a router. What does this command accomplish?
This
command enables a strong encryption algorithm for the enable secret
password command.
This
command automatically encrypts passwords in configuration files that are
currently stored in NVRAM.
This
command provides an exclusive encrypted password for external service personnel
who are required to do router maintenance.
This
command encrypts passwords as they are transmitted across serial WAN links.
This
command prevents someone from viewing the running configuration passwords.
20. What is the purpose of the SVI on a Cisco switch?
The
SVI adds Layer 4 connectivity between VLANs.
The
SVI provides a virtual interface for remote access to the switch.
The
SVI provides a faster method for switching traffic between ports on the switch.
The
SVI provides a physical interface for remote access to the switch.
21
Two routers that are labeled A and B connect via a serial link,
and each router has a switch that is attached through an Ethernet link. Beside
the router A LAN are the words 172.16.16.0 /22.
Refer to the exhibit. An administrator must send a message to
everyone on the router A network. What is the broadcast address for network
172.16.16.0/22?
172.16.19.255
172.16.20.255
172.16.255.255
172.16.16.255
172.16.23.255
22. Option 2: dialog
maintenance, is matched with description 3: Session layer. 1 options can be
matched with this description, with 1 currently matching. Press spacebar to
enter matching mode.
Match the functions with the corresponding OSI layer. (Not all
options are used.)
Application layer
HTTP and FTP
end user program functionality
Presentation layer
compression
common format
Session layer
dialog maintenance
23. What is a basic characteristic of the IP protocol?
user
data segmentation
reliable
end-to-end delivery
media
dependent
connectionless
24. What will a Layer 2 switch do when the destination MAC address
of a received frame is not in the MAC table?
It
initiates an ARP request.
It
forwards the frame out of all ports except for the port at which the frame was
received.
It
notifies the sending host that the frame cannot be delivered.
It
broadcasts the frame out of all ports on the switch.
25. What are two features of ARP? (Choose two.)
When
a host is encapsulating a packet into a frame, it refers to the MAC address
table to determine the mapping of IP addresses to MAC addresses.
If
a host is ready to send a packet to a local destination device and it has the
IP address but not the MAC address of the destination, it generates an ARP
broadcast.
If
a device receiving an ARP request has the destination IPv4 address, it responds
with an ARP reply.
An
ARP request is sent to all devices on the Ethernet LAN and contains the IP
address of the destination host and its multicast MAC address.
If
no device responds to the ARP request, then the originating node will broadcast
the data packet to all devices on the network segment.
26. What best describes the destination IPv4 address that is used by
multicasting?
a
single IP multicast address that is used by all destinations in a group
a
group address that shares the last 23 bits with the source IPv4 address
an
IP address that is unique for each destination in the group
a
48 bit address that is determined by the number of members in the
multicast group
27. Which message delivery option is used when all devices need to
receive the same message simultaneously?
unicast
multicast
duplex
broadcast
28. What important information is examined in the Ethernet frame
header by a Layer 2 device in order to forward the data onward?
destination
MAC address
source
MAC address
source
IP address
Ethernet
type
destination
IP address
29. Which two automatic addressing assignments are supported by
DHCPv4? (Choose two.)
local
server address
physical
address of the recipient
physical
address of the sender
default
gateway address
subnet
mask
30. What is the usable number of host IP addresses on a network that
has a /26 mask?
254
256
64
16
32
62
31. Which keys act as a hot key combination that is used to
interrupt an IOS process?
Ctrl-Shift-X
Ctrl-Shift-6
Ctrl-Z
Ctrl-C
32. A technician has been asked to develop a physical topology for a
network that provides a high level of redundancy. Which physical topology
requires that every node is attached to every other node on the network?
bus
hierarchical
star
ring
mesh
33. Option 3: t he part of
the OS that interacts directly with the device hardware. Press spacebar to
enter matching mode.
Match the descriptions to the terms. (Not all options are used.)
Telnet
CLI
users interact with
the operating system by typing commands
GUI
enables the user to
interact with the operating system by pointing and clicking
kernel
the part of the OS
that interacts directly with the device hardware
shell
the part of the operating system that
interfaces with applications and the user
34. When a network administrator is trying to manage network traffic
on a growing network, when should traffic flow patterns be analyzed?
during
off-peak hours
during
employee holidays and weekends
during
times of peak utilization
during
randomly selected times
35
A CLI output that says the following:
Switch1> config t
^
% Invalid input detected at '^' marker.
The ^ is under the "f" in the word "config"
Switch1> config t
^
% Invalid input detected at '^' marker.
The ^ is under the "f" in the word "config"
Refer to the exhibit. An administrator is trying to configure
the switch but receives the error message that is displayed in the exhibit.
What is the problem?
The
administrator is already in global configuration mode.
The
administrator must connect via the console port to access global configuration
mode.
The
entire command, configure terminal, must be used.
The
administrator must first enter privileged EXEC mode before issuing the command.
36. What type of communication medium is used with a wireless LAN
connection?
radio
waves
microwave
UTP
fiber
37. Which two services are required to enable a computer to receive
dynamic IP addresses and access the Internet using domain names? (Choose two.)
HTTP
DHCP
NS
WINS
SMTP
38. What type of communication rule would best describe CSMA/CD?
message
encoding
flow
control
access
method
message
encapsulation
39. Given IPv6 address prefix 2001:db8::/48, what will be the last
subnet that is created if the subnet prefix is changed to /52?
2001:db8:0:f::/52
2001:db8:0:f00::/52
2001:db8:0:f000::/52
2001:db8:0:8000::/52
40. Option 3: security.
Press spacebar to enter matching mode.
Match the requirements of a reliable network with the supporting
network architecture. (Not all options are used.)
fault tolerance
scalability
security
Protect the network from unauthorized access.
security
Provide redundant links and devices.
fault tolerance
Match the type of communication with a
specific priority.
Expand the network without degrading the
service for existing users.
scalability
Ensure
that streaming data is provided over high speed links.
41. What three services are provided by the transport layer? (Choose
three.)
bit
transmission
data
representation
connection
establishment
error
recovery
path
determination
encryption
of data
flow
control
42. For Cisco IOS, which escape sequence allows terminating a
traceroute operation?
Ctrl+x
Ctrl+c
Ctrl+Shift+6
Ctrl+Esc
43. Which two OSI model layers are considered to be included in the
top layer of the TCP/IP protocol stack? (Choose two.)
internet
transport
network
presentation
session
44. What are the two sublayers of the OSI model data link layer?
(Choose two.)
physical
network
access
internet
LLC
MAC
transport
46. Which two protocols function at the internet layer? (Choose
two.)
POP
ICMP
BOOTP
IP
PPP
47. What three blocks of addresses are defined by RFC 1918 for
private network use? (Choose three.)
239.0.0.0/8
100.64.0.0/14
172.16.0.0/12
192.168.0.0/16
169.254.0.0/16
10.0.0.0/8
48. Which statement describes a characteristic of the traceroute
utility?
It
is primarily used to test connectivity between two hosts.
It
utilizes the ICMP Source Quench messages.
It
identifies the routers in the path from a source host to a destination host.
It
sends four Echo Request messages.
49. Which term refers to a network that provides secure access to
the corporate offices by suppliers, customers and collaborators?
intranet
extendednet
Internet
extranet
50. What is the valid most compressed format possible of the IPv6 address
2001:0DB8:0000:AB00:0000:0000:0000:1234?
2001:DB8::AB00::1234
2001:DB8:0:AB::1234
2001:DB8:0:AB00::1234
2001:DB8:0:AB:0:1234
51. A user reports a lack of network connectivity. The technician
takes control of the user machine and attempts to ping other computers on the
network and these pings fail. The technician pings the default gateway and that
also fails. What can be determined for sure by the results of these tests?
Nothing
can be determined for sure at this point.
The
router that is attached to the same network as the workstation is down.
The
NIC in the PC is bad.
The
TCP/IP protocol is not enabled.
0 komentar: