PDF Download
CCNA 1: INTRODUCTION TO NETWORKS V7.0 EXAM
QUESTIONS
Actual Qs and Ans Expert-Verified Explanation
This Exam contains:
-Guarantee passing score -92 Questions and Answers -format set of multiple-choice -Expert-Verified Explanation Question 1: What technique is used with UTP cable to help protect against signal interference from crosstalk?
- wrapping a foil shield around the wire pairs
- twisting the wires together into pairs
- terminating the cable with special grounded connectors
- encasing the cables within a flexible plastic sheath
Answer:
twisting the wires together into pairs To help prevent the effects of crosstalk, UTP cable wires are twisted together into pairs.Twisting the wires together causes the magnetic fields of each wire to cancel each other out.Question 2: Match each item to the type of topology diagram on which it is typically identified.
Need to know the topology for the following items:
1) IP address of a server 2) location of a desktop PC in a classroom 3) USB port on a desktop PC in a classroom 4) path of cables that connect rooms to wiring closets
Answer:
Not all options are used.
Question 3: What characteristic describes spyware?
- a network device that filters access and traffic coming into a network
- an attack that slows or crashes a device or network service
- the use of stolen credentials to access private data
* software that is installed on a user device and collects information about the user
Answer:
software that is installed on a user device and collects information about the user
Question 4: What are two characteristics of IP?
- does not require a dedicated end-to-end connection
- operates independently of the network media
- retransmits packets if errors occur
- re-assembles out of order packets into the correct order at the receiver end
- guarantees delivery of packets
Answer:
1) does not require a dedicated end-to-end connection
2) operates independently of the network media The Internet Protocol (IP) is a connectionless, best effort protocol.This means that IP requires no end-to-end connection nor does it guarantee delivery of packets.IP is also media independent, which means it operates independently of the network media carrying the packets.
Question 5: The global configuration command
ip default-gateway 172.16.100.1 is applied to a switch.What is the effect of this command?
- The switch can communicate with other hosts on the 172.16.100.0 network.
- The switch can be remotely managed from a host on another network.
- The switch is limited to sending and receiving frames to and from the gateway 172.16.100.1.
- The switch will have a management interface with the address 172.16.100.1.
Answer:
The switch can be remotely managed from a host on another network.A default gateway address is typically configured on all devices to allow them to communicate beyond just their local network.In a switch this is achieved using the command ip default-gateway
Question 6: A disgruntled employee is using some free wireless networking tools to determine information about the enterprise wireless networks.This person is planning on using this information to hack the wireless network.What type of attack is this?
- DoS
- access
- reconnaissance
- Trojan horse
Answer:
reconnaissance
Question 7: A company has a file server that shares a folder named Public.
The network security policy specifies that the Public folder is assigned Read-Only rights to anyone who can log into the server while the Edit rights are assigned only to the network admin group.Which component is addressed in the AAA network service framework?
- automation
- accounting
- authentication
- authorization
Answer:
authorization After a user is successfully authenticated (logged into the server), the authorization is the process of determining what network resources the user can access and what operations (such as read or edit) the user can perform.Question 8: Which two statements describe features of an IPv4 routing table on a router?
- Directly connected interfaces will have two route source codes in the routing table: C and S.
- If there are two or more possible routes to the same destination, the route associated with the
- The netstat -r command can be used to display the routing table of a router.
- The routing table lists the MAC addresses of each active interface.
- It stores information about routes derived from the active router interfaces.
- If a default static route is configured in the router, an entry will be included in the routing table
higher metric value is included in the routing table.
with source code S.
Answer:
1) Directly connected interfaces will have two route source codes in the routing table: C and S.
2) If a default static route is configured in the router, an entry will be included in the routing table with source code S.
Question 9: What happens when the
transport input ssh command is entered on the switch vty lines?
- The SSH client on the switch is enabled.
- The switch requires a username/password combination for remote access.
- Communication between the switch and remote users is encrypted.
- The switch requires remote connections via a proprietary client software.
Answer:
Communication between the switch and remote users is encrypted.The transport input ssh command when entered on the switch vty (virtual terminal lines) will encrypt all inbound controlled telnet connections.Question 10: What would be the interface ID of an IPv6 enabled interface with a MAC address of 1C-6F-65-C2-BD-F8 when the interface ID is generated by using the EUI-64 process?
0C6F:65FF:FEC2:BDF8
1E6F:65FF:FEC2:BDF8
C16F:65FF:FEC2:BDF8
106F:65FF:FEC2:BDF8
Answer:
1E6F:65FF:FEC2:BDF8
To derive the EUI-64 interface ID by using the MAC address 1C-6F-65-C2-BD-F8, three steps are taken.Change the seventh bit of the MAC address from a binary 0 to a binary 1 which changes the hex C, into a hex E.Insert hex digits FFFE into the middle of the address.Rewrite the address in IPv6 format.The three steps, when complete, give the interface ID of
1E6F:65FF:FEC2:BDF8
.Question 11: An administrator defined a local user account with a secret password on router R1 for use with SSH.Which three additional steps are required to configure R1 to accept only encrypted SSH connections?
- Configure DNS on the router.
- Generate two-way pre-shared keys.
- Configure the IP domain name on the router.
- Generate the SSH keys.
- Enable inbound vty SSH sessions.
- Enable inbound vty Telnet sessions.