CCNA 1 v5.02 Answers 2015

CCNA 1 Chapter 10 Exam Answer v5 & v5.02 2015 (100%)

1. Which three layers of the OSI model provide similar network services to those provided by the application layer of the TCP/IP model? (Choose three.) physical layer session layer transport layer application layer presentation layer data link layer 2. Which two tasks are functions of the presentation layer? (Choose two.) compression addressing encryption session control authentication 3. Select three protocols that operate at the Application Layer of the OSI model. (Choose three.) ARP TCP DSL FTP POP3 DHCP 4. A manufacturing company subscribes to certain hosted services from their ISP. The services required include hosted world wide web, file transfer, and e-mail. Which protocols represent these three key applications? (Choose three.) FTP HTTP DNS SNMP DHCP SMTP 5. What are two characteristics of peer-to-peer networks? (Choose two.) scalable one way data flow decentralized resources centralized user accounts resource sharing without a dedicated server 6. What is an

CCNA 1 Chapter 9 Exam Answer v5 & v5.02 2015 (100%)

1. Refer to the exhibit. How many broadcast domains are there? CCNA 1 Chapter 9 Exam Answer 001 (v5.02, 2015) 1 2 3 4 2. How many usable host addresses are there in the subnet 32 30 64 16 62 3. How many host addresses are available on the network with a subnet mask of 510 512 1022 1024 2046 2048 4. A network administrator is variably subnetting a network. The smallest subnet has a mask of How many host addresses will this subnet provide?? 4 6 8 10 12 5. Refer to the exhibit. A company uses the address block of for its network. What subnet mask would provide the maximum number of equal size subnets while providing enough host addresses for each subnet in the exhibit? CCNA 1 Chapter 9 Exam Answer 002 (v5.02, 2015) 6. Refer to the exhibit. The network administrator has assigned the LAN of LBMISS an address range of 192.168.10

CCNA 1 Practice Final Exam Answer v5.02 2015 (100%)

1. A host is accessing a Web server on a remote network. Which three functions are performed by intermediary network devices during this conversation? (Choose three.) regenerating data signals acting as a client or a server providing a channel over which messages travel applying security settings to control the flow of data notifying other devices when errors occur serving as the source or destination of the messages 2. For which three reasons was a packet-switched connectionless data communications technology used when developing the Internet? (Choose three.) It can rapidly adapt to the loss of data transmission facilities. It efficiently utilizes the network infrastructure to transfer data. Data packets can travel multiple paths through the network simultaneously. It allows for billing of network use by the amount of time a connection is established. It requires that a data circuit between the source and destination be established before data can be transferred. 3. A medium

CCNA 1 Chapter 11 Exam Answer v5 & v5.02 2015 (100%)

1. Which network design consideration would be more important to a large corporation than to a small business? Internet router firewall low port density switch redundancy 2. Which protocol supports rapid delivery of streaming media? SNMP TCP PoE RTP 3. How should traffic flow be captured in order to best understand traffic patterns in a network? during low utilization times during peak utilization times when it is on the main network segment only when it is from a subset of users 4. A network administrator checks the security log and notices there was unauthorized access to an internal file server over the weekend. Upon further investigation of the file system log, the administrator notices several important documents were copied to a host located outside of the company. What kind of threat is represented in this scenario? data loss identity theft information theft disruption of service 5. Which two actions can be taken to prevent a successful attack on an email server account?

CCNA 1 Chapter 5 Exam Answer v5 & v5.02 2015 (100%)

1. Which statement is true about MAC addresses? MAC addresses are implemented by software. A NIC only needs a MAC address if connected to a WAN. The first three bytes are used by the vendor assigned OUI. The ISO is responsible for MAC addresses regulations. 2. What is a characteristic of a contention-based access method? It processes more overhead than the controlled access methods do. It has mechanisms to track the turns to access the media. It is a nondeterministic method. It scales very well under heavy media use. 3. Which two statements describe features or functions of the logical link control sublayer in Ethernet standards? (Choose two.) Logical link control is implemented in software. Logical link control is specified in the IEEE 802.3 standard. The LLC sublayer interacts directly with the NIC driver software. The data link layer uses LLC to communicate with the upper layers of the protocol suite. The LLC sublayer is responsible for the placement and retrieval of frames on

CCNA 1 Chapter 1 Exam Answer v5 & v5.02 2015 (100%)

1. What two criteria are used to help select network media? (Choose two.) the types of data that need to be prioritized the cost of the end devices utilized in the network the distance the media can successfully carry a signal the number of intermediary devices installed in the network the environment where the media is to be installed 2. What are two functions of intermediary devices on a network? (Choose two.) They are the primary source and providers of information and services to end devices. They run applications that support collaboration for business. They form the interface between the human network and the underlying communication network. They direct data along alternate pathways when there is a link failure. They filter the flow of data, based on security settings. 3. Which device performs the function of determining the path that messages should take through internetworks? a router a firewall a web server a DSL modem 4. Refer to the exhibit. Which set of devices

CCNA 1 Chapter 4 Exam Answer v5 & v5.02 2015 (100%)

1. Which layer of the OSI model is responsible for specifying the encapsulation method used for specific types of media? application transport data link physical 2. Which statement describes signaling at the physical layer? Sending the signals asynchronously means that they are transmitted without a clock signal. In signaling, a 1 always represents voltage and a 0 always represents the absence of voltage. Wireless encoding includes sending a series of clicks to delimit the frames. Signaling is a method of converting a stream of data into a predefined code 3. What are two reasons for physical layer protocols to use frame encoding techniques? (Choose two.) to reduce the number of collisions on the media to distinguish data bits from control bits to provide better media error correction to identify where the frame starts and ends to increase the media throughput 4. The throughput of a FastEthernet network is 80 Mb/s. The traffic overhead for establishing sessions, acknowledgments,

CCNA 1 Chapter and Final Exam Answer 2015 (100%)

Welcome to the CCNA1 Introduction to Networks answers. The goal of this course is to introduce you to fundamental networking concepts and technologies. These online course materials will assist you in developing the skills necessary to plan and implement small networks across a range of applications. The specific skills covered in each chapter are described at the start of each chapter.   CCNA 1 Chapter 1 Exam Answer v5 & v5.02 2015 (100%) CCNA 1 Chapter 10 Exam Answer v5 & v5.02 2015 (100%) CCNA 1 Chapter 11 Exam Answer v5 & v5.02 2015 (100%) CCNA 1 Chapter 2 Exam Answer v5 & v5.02 2015 (100%) CCNA 1 Chapter 3 Exam Answer v5 & v5.02 2015 (100%) CCNA 1 Chapter 4 Exam Answer v5 &…Read More...

CCNA 1 Chapter 6 Exam Answer v5 & v5.02 2015 (100%)

1. When connectionless protocols are implemented at the lower layers of the OSI model, what are usually used to acknowledge the data receipt and request the retransmission of missing data? connectionless acknowledgements upper-layer connection-oriented protocols Network layer IP protocols Transport layer UDP protocols 2. Which IPv4 header field is responsible for defining the priority of the packet?? flow label flags differentiated services traffic class 3. Why is NAT not needed in IPv6?? Because IPv6 has integrated security, there is no need to hide the IPv6 addresses of internal networks.? Any host or user can get a public IPv6 network address because the number of available IPv6 addresses is extremely large.? The problems that are induced by NAT applications are solved because the IPv6 header improves packet handling by intermediate routers.? The end-to-end connectivity problems that are caused by NAT are solved because the number of routes increases with the number of nodes

CCNA 1 Chapter 2 Exam Answer v5 & v5.02 2015 (100%)

1. Which two features are characteristics of flash memory? (Choose two.) Flash provides nonvolatile storage. Flash receives a copy of the IOS from RAM when a device is powered on. The contents of flash may be lost during a power cycle. Flash is a component in Cisco switches but not in Cisco routers. The contents of flash may be overwritten. 2. A network administrator is planning an IOS upgrade on several of the head office routers and switches. Which three questions must be answered before continuing with the IOS selection and upgrade? (Choose three.) Are the devices on the same LAN? Do the devices have enough NVRAM to store the IOS image? What models of routers and switches require upgrades? What ports are installed on the routers and switches? Do the routers and switches have enough RAM and flash memory for the proposed IOS versions? What features are required for the devices? 3. Which procedure is used to access a Cisco 2960 switch when performing an initial configuration

CCNA 1 Final Exam Answer v5 & v5.02 2015 (100%)

1. Which communication tool allows real-time collaboration? wiki e-mail weblog instant messaging 2. A host is accessing a Web server on a remote network. Which three functions are performed by intermediary network devices during this conversation? (Choose three.) regenerating data signals acting as a client or a server providing a channel over which messages travel applying security settings to control the flow of data notifying other devices when errors occur serving as the source or destination of the messages 3. A home user is looking for an ISP connection that provides high speed digital transmission over regular phone lines. What ISP connection type should be used? DSL dial-up satellite cell modem cable modem 4. A company is expanding its business to other countries. All branch offices must remain connected to corporate headquarters at all times. Which network technology is required to support this requirement? LAN MAN WAN WLAN 5. Refer to the exhibit. From which location

CCNA 1 Pretest Exam Answer v5 & v5.02 2015 (100%)

1. Convert the decimal number 231 into its binary equivalent. Select the correct answer from the list below. 11110010 11011011 11110110 11100111 11100101 11101110 2. Convert the binary number 10111010 into its hexadecimal equivalent. Select the correct answer from the list below. 85 90 BA A1 B3 1C 3. The failure rate in a certain brand of network interface card has been determined to be 15%. How many cards could be expected to fail in a company that has 80 of the cards installed? 8 10 12 15 4. A local real estate company can have its 25 computer systems upgraded for $1000. If the company chooses only to upgrade 10 systems, how much will the upgrade cost if the same rate is used? $100…Read More...

CCNA 1 Chapter 7 Exam Answer v5 & v5.02 2015 (100%)

1. What is a socket? the combination of the source and destination IP address and source and destination Ethernet address the combination of a source IP address and port number or a destination IP address and port number the combination of the source and destination sequence and acknowledgment numbers the combination of the source and destination sequence numbers and port numbers 2. A host device needs to send a large video file across the network while providing data communication to other users. Which feature will allow different communication streams to occur at the same time, without having a single data stream using all available bandwidth? window size multiplexing port numbers acknowledgments 3. A host device sends a data packet to a web server via the HTTP protocol. What is used by the transport layer to pass the data stream to the proper application on the server? sequence number acknowledgment source port number destination port number 4. What is a beneficial feature of

CCNA 1 Chapter 3 Exam Answer v5 & v5.02 2015 (100%)

1. A computer in a given network is communicating with a specific group of computers. What type of communication is this? broadcast multicast unicast ARP HTTP 2. What method can be used by two computers to ensure that packets are not dropped because too much data is being sent too quickly? encapsulation flow control access method response timeout 3. Which protocol is responsible for controlling the size and rate of the HTTP messages exchanged between server and client? HTTP ARP TCP DHCP 4. A user is viewing an HTML document located on a web server. What protocol segments the messages and manages the segments in the individual conversation between the web server and the web client? DHCP TCP HTTP ARP 5. A web client is sending a request for a webpage to a web server. From the perspective of the client, what is the correct order of the protocol stack that is used to prepare the request for transmission? HTTP, IP, TCP, Ethernet HTTP, TCP, IP, Ethernet Ethernet, TCP, IP, HTTP

CCNA 1 Chapter 8 Exam Answer v5 & v5.02 2015 (100%)

1. How many bits are in an IPv4 address? 32 64 128 256 2. Which two parts are components of an IPv4 address? (Choose two.) subnet portion network portion logical portion host portion physical portion broadcast portion 3. What is the prefix length notation for the subnet mask /25 /26 /27 /28 4. A message is sent to all hosts on a remote network. Which type of message is it? limited broadcast multicast directed broadcast unicast 5. What two statements describe characteristics of Layer 3 broadcasts? (Choose two.) Broadcasts are a threat and users must avoid using protocols that implement them. Routers create broadcast domains. Some IPv6 protocols use broadcasts. There is a broadcast domain on each switch interface. A limited broadcast packet has a destination IP address of A router will not forward any type of Layer 3 broadcast packet. 6. A DHCP server is used to assign IP addresses dynamically to the hosts on a network. The address pool is

About Us

CCNA v5 Answers, CCNA v5 Blog, CCNA 5 Blog, CCNA Blog


Our Contacts