PDF Download
CCNA 1 V7 FINAL EXAM ANSWERS
Actual Qs and Ans Expert-Verified Explanation
This Exam contains:
-Guarantee passing score -100 Questions and Answers -format set of multiple-choice -Expert-Verified Explanation Question 1: Match a statement to the related network model. (Not all options are used.)
https://i.imgur.com/TTGkXT3.png
Answer:
https://i.imgur.com/wt1IbKM.png
Place the options in the following order:peer-to-peer network
[+] no dedicated server is required [+] client and server roles are set on a per request basis peer-to-peer aplication [#] requires a specific user interface [#] a background service is required Question 2: What mechanism is used by a router to prevent a received IPv4 packet from traveling endlessly on a network?-It checks the value of the TTL field and if it is 0, it discards the packet and sends a Destination Unreachable message to the source host.-It checks the value of the TTL field and if it is 100, it discards the packet and sends a Destination Unreachable message to the source host.-It decrements the value of the TTL field by 1 and if the result is 0, it discards the packet and sends a Time Exceeded message to the source host.-It increments the value of the TTL field by 1 and if the result is 100, it discards the packet and sends a Parameter Problem message to the source host.
Answer:
It decrements the value of the TTL field by 1 and if the result is 0, it discards the packet and sends a
Time Exceeded message to the source host.Question 3: A group of Windows PCs in a new subnet has been added to an Ethernet network.When testing the connectivity, a technician finds that these PCs can access local network resources but not the Internet resources. To troubleshoot the problem, the technician wants to initially confirm the IP address and DNS configurations on the PCs, and also verify connectivity to the local router. Which three Windows CLI commands and utilities will provide the necessary information? (Choose three.) -netsh interface ipv6 show neighbor -arp -a -tracert -ping -ipconfig -nslookup -telnet
Answer:
-ping -ipconfig -nslookup Question 4: What are two primary responsibilities of the Ethernet MAC sublayer? (Choose two.) -error detection -frame delimiting -accessing the media -data encapsulation -logical addressing
Answer:
-accessing the media -data encapsulation Question 5: What two security solutions are most likely to be used only in a corporate environment? (Choose two.) -antispyware -virtual private networks -intrusion prevention systems -strong passwords -antivirus software
Answer:
-virtual private networks -intrusion prevention systems
Question 6: Which two traffic types use the Real-Time Transport Protocol (RTP)? (Choose two.) -video -web -file transfer -voice -peer to peer
Answer:
-video -voice Question 7: What is an advantage for small organizations of adopting IMAP instead of POP?-POP only allows the client to store messages in a centralized way, while IMAP allows distributed storage.-Messages are kept in the mail servers until they are manually deleted from the email client.-When the user connects to a POP server, copies of the messages are kept in the mail server for a short time, but IMAP keeps them for a long time.-IMAP sends and retrieves email, but POP only retrieves email.
Answer:
Messages are kept in the mail servers until they are manually deleted from the email client.Question 8: A network administrator is adding a new LAN to a branch office. The new LAN must support 61 connected devices. What is the smallest network mask that the network administrator can use for the new network?
-255.255.255.240
-255.255.255.224
-255.255.255.192
-255.255.255.128
Answer:
255.255.255.192
Question 9: What is a function of the data link layer?
-provides the formatting of data -provides end-to-end delivery of data between hosts -provides delivery of data between two applications -provides for the exchange of frames over a common local media
Answer:
provides for the exchange of frames over a common local media
Question 10: A disgruntled employee is using some free wireless networking tools to determine information about the enterprise wireless networks. This person is planning on using this information to hack the wireless network. What type of attack is this?-DoS -access -reconnaissance -Trojan horse
Answer:
reconnaissance Question 11: A network administrator is adding a new LAN to a branch office. The new LAN must support 90 connected devices. What is the smallest network mask that the network administrator can use for the new network?
-255.255.255.128
-255.255.255.240
-255.255.255.248
-255.255.255.224
Answer:
255.255.255.128
Question 12: What characteristic describes antivirus software?
-applications that protect end devices from becoming infected with malicious software -a network device that filters access and traffic coming into a network -a tunneling protocol that provides remote users with secure access into the network of an organization -software on a router that filters traffic based on IP addresses or applications
Answer:
applications that protect end devices from becoming infected with malicious software Question 13: During the process of forwarding traffic, what will the router do immediately after matching the destination IP address to a network on a directly connected routing table entry?-analyze the destination IP address -switch the packet to the directly connected interface -look up the next-hop address for the packet -discard the traffic after consulting the route table
Answer:
switch the packet to the directly connected interface