• wonderlic tests
  • EXAM REVIEW
  • NCCCO Examination
  • Summary
  • Class notes
  • QUESTIONS & ANSWERS
  • NCLEX EXAM
  • Exam (elaborations)
  • Study guide
  • Latest nclex materials
  • HESI EXAMS
  • EXAMS AND CERTIFICATIONS
  • HESI ENTRANCE EXAM
  • ATI EXAM
  • NR AND NUR Exams
  • Gizmos
  • PORTAGE LEARNING
  • Ihuman Case Study
  • LETRS
  • NURS EXAM
  • NSG Exam
  • Testbanks
  • Vsim
  • Latest WGU
  • AQA PAPERS AND MARK SCHEME
  • DMV
  • WGU EXAM
  • exam bundles
  • Study Material
  • Study Notes
  • Test Prep

CCNA 1: INTRODUCTION TO NETWORKS V7.0 EXAM

Class notes Jan 8, 2026
Preview Mode - Purchase to view full document
Loading...

Loading study material viewer...

Page 0 of 0

Document Text

PDF Download

CCNA 1: INTRODUCTION TO NETWORKS V7.0 EXAM

QUESTIONS

Actual Qs and Ans Expert-Verified Explanation

This Exam contains:

-Guarantee passing score -92 Questions and Answers -format set of multiple-choice -Expert-Verified Explanation Question 1: What technique is used with UTP cable to help protect against signal interference from crosstalk?

  • wrapping a foil shield around the wire pairs
  • twisting the wires together into pairs
  • terminating the cable with special grounded connectors
  • encasing the cables within a flexible plastic sheath

Answer:

twisting the wires together into pairs To help prevent the effects of crosstalk, UTP cable wires are twisted together into pairs.Twisting the wires together causes the magnetic fields of each wire to cancel each other out.Question 2: Match each item to the type of topology diagram on which it is typically identified.

Need to know the topology for the following items:

1) IP address of a server 2) location of a desktop PC in a classroom 3) USB port on a desktop PC in a classroom 4) path of cables that connect rooms to wiring closets

Answer:

Not all options are used.

Question 3: What characteristic describes spyware?

  • a network device that filters access and traffic coming into a network
  • * software that is installed on a user device and collects information about the user

  • an attack that slows or crashes a device or network service
  • the use of stolen credentials to access private data

Answer:

software that is installed on a user device and collects information about the user

Question 4: What are two characteristics of IP?

  • does not require a dedicated end-to-end connection
  • operates independently of the network media
  • retransmits packets if errors occur
  • re-assembles out of order packets into the correct order at the receiver end
  • guarantees delivery of packets

Answer:

1) does not require a dedicated end-to-end connection

2) operates independently of the network media The Internet Protocol (IP) is a connectionless, best effort protocol.This means that IP requires no end-to-end connection nor does it guarantee delivery of packets.IP is also media independent, which means it operates independently of the network media carrying the packets.

Question 5: The global configuration command

ip default-gateway 172.16.100.1 is applied to a switch.What is the effect of this command?

  • The switch can communicate with other hosts on the 172.16.100.0 network.
  • The switch can be remotely managed from a host on another network.
  • The switch is limited to sending and receiving frames to and from the gateway 172.16.100.1.
  • The switch will have a management interface with the address 172.16.100.1.

Answer:

The switch can be remotely managed from a host on another network.A default gateway address is typically configured on all devices to allow them to communicate beyond just their local network.In a switch this is achieved using the command ip default-gateway

Question 6: A disgruntled employee is using some free wireless networking tools to determine information about the enterprise wireless networks.This person is planning on using this information to hack the wireless network.What type of attack is this?

  • DoS
  • access
  • reconnaissance
  • Trojan horse

Answer:

reconnaissance

Question 7: A company has a file server that shares a folder named Public.

The network security policy specifies that the Public folder is assigned Read-Only rights to anyone who can log into the server while the Edit rights are assigned only to the network admin group.Which component is addressed in the AAA network service framework?

  • automation
  • accounting
  • authentication
  • authorization

Answer:

authorization After a user is successfully authenticated (logged into the server), the authorization is the process of determining what network resources the user can access and what operations (such as read or edit) the user can perform.Question 8: Which two statements describe features of an IPv4 routing table on a router?

  • Directly connected interfaces will have two route source codes in the routing table: C and S.
  • If there are two or more possible routes to the same destination, the route associated with the
  • higher metric value is included in the routing table.

  • The netstat -r command can be used to display the routing table of a router.
  • The routing table lists the MAC addresses of each active interface.
  • It stores information about routes derived from the active router interfaces.
  • If a default static route is configured in the router, an entry will be included in the routing table
  • with source code S.

Answer:

1) Directly connected interfaces will have two route source codes in the routing table: C and S.

2) If a default static route is configured in the router, an entry will be included in the routing table with source code S.

Question 9: What happens when the

transport input ssh command is entered on the switch vty lines?

  • The SSH client on the switch is enabled.
  • The switch requires a username/password combination for remote access.
  • Communication between the switch and remote users is encrypted.
  • The switch requires remote connections via a proprietary client software.

Answer:

Communication between the switch and remote users is encrypted.The transport input ssh command when entered on the switch vty (virtual terminal lines) will encrypt all inbound controlled telnet connections.Question 10: What would be the interface ID of an IPv6 enabled interface with a MAC address of 1C-6F-65-C2-BD-F8 when the interface ID is generated by using the EUI-64 process?

0C6F:65FF:FEC2:BDF8

1E6F:65FF:FEC2:BDF8

C16F:65FF:FEC2:BDF8

106F:65FF:FEC2:BDF8

Answer:

1E6F:65FF:FEC2:BDF8

To derive the EUI-64 interface ID by using the MAC address 1C-6F-65-C2-BD-F8, three steps are taken.Change the seventh bit of the MAC address from a binary 0 to a binary 1 which changes the hex C, into a hex E.Insert hex digits FFFE into the middle of the address.Rewrite the address in IPv6 format.The three steps, when complete, give the interface ID of

1E6F:65FF:FEC2:BDF8

.Question 11: An administrator defined a local user account with a secret password on router R1 for use with SSH.Which three additional steps are required to configure R1 to accept only encrypted SSH connections?

  • Configure DNS on the router.
  • Generate two-way pre-shared keys.
  • Configure the IP domain name on the router.
  • Generate the SSH keys.
  • Enable inbound vty SSH sessions.
  • Enable inbound vty Telnet sessions.

Download Study Material

Buy This Study Material

$11.99
Buy Now
  • Immediate download after payment
  • Available in the pdf format
  • 100% satisfaction guarantee

Study Material Information

Category: Class notes
Description:

PDF Download CCNA 1: INTRODUCTION TO NETWORKS V7.0 EXAM QUESTIONS Actual Qs and Ans Expert-Verified Explanation This Exam contains: -Guarantee passing score -92 Questions and Answers -format set of...

UNLOCK ACCESS $11.99