CCNA test 4

Average rating : Published by Edelwess on February 13th, 2019

Related quizes

Question 1
How many usable IP addresses are available on the 192.168.1.0/27 network

256
254
62
30
16
32
Question 2
Which subnet would include the address 192.168.1.96 as a usable host address?

192.168.1.64/26
192.168.1.32/27
192.168.1.32/28
192.168.1.64/29
Question 3

What single subnet mask would be appropriate to use for the three subnetworks? • 255.255.255.0 • 255.255.255.240 •

255.255.255.0
255.255.255.240
255.255.255.248
255.255.255.252
Question 4
Which statement is true about variable-length subnet masking?

Each subnet is the same size.
The size of each subnet may be different, depending on requirements.
Subnets may only be subnetted one additional time.
Bits are returned, rather than borrowed, to create additional subnets.
Question 5
Which subnet would include the address 192.168.1.96 as a usable host address?

255.255.255.0
255.255.255.128
255.255.255.192
255.255.255.224
255.255.255.240
Question 6
What are two characteristics shared by TCP and UDP? (Choose two.)

Default window size
Connectionless communication
Port numbering
3-way handshake
Ability to to carry digitized voice
Use of checksum
Question 7
Why are port numbers included in the TCP header of a segment?

To indicate the correct router interface that should be used to forward a segment
To identify which switch ports should receive or forward the segment
To determine which Layer 3 protocol should be used to encapsulate the data
To enable a receiving host to forward the data to the appropriate application
To allow the receiving host to assemble the packet in the proper order
Question 8
Which two protocols operate at the highest layer of the TCP/IP protocol stack? (Choose two.)

DNS
Ethernet
IP
POP
TCP
UDP
Question 9
What is one difference between the client-server and peer-topeer network models?

Only in the client-server model can file transfers occur.
Every device in a peer-to-peer network can function as a client or a server.
A peer-to-peer network transfers data faster than a transfer using a client-server network.
A data transfer that uses a device serving in a client role requires that a dedicated server be present.
Question 10
Which networking model is being used when an author uploads one chapter document to a file server of a book publisher?

Peer-to-peer
Master-slave
Client/server
Point-to-point
Question 11
What network service resolves the URL entered on a PC to the IP address of the destination server?

DNS
DHCP
FTP
SNMP
Question 12
A network engineer is analyzing reports from a recently performed network baseline. Which situation would depict a possible latency issue?

A change in the bandwidth according to the show interfaces output
A next-hop timeout from a traceroute
An increase in host-to-host ping response times
A change in the amount of RAM according to the show version output
Question 13
Which firewall feature is used to ensure that packets coming into a network are legitimate responses to requests initiated from internal hosts?

Stateful packet inspection
URL filtering
Application filtering
Packet filtering
Question 14
A medium-sized business is researching available options for connecting to the Internet. The company is looking for a high speed option with dedicated, symmetric access. Which connection type should the company choose?

DSL
Dialup
Satellite
Leased line
Cable modem
Question 15
What is the purpose of having a converged network?

To provide high speed connectivity to all end devices
To make sure that all types of data packets will be treated equally
To achieve fault tolerance and high availability of data network infrastructure devices
To reduce the cost of deploying and maintaining the communication infrastructure
Question 16
What characteristic of a network enables it to quickly grow to support new users and applications without impacting the performance of the service being delivered to existing users?

Reliability
Scalability
Quality of service
Accessibility
Question 17
Which connection provides a secure CLI session with encryption to a Cisco switch?

A console connection
An AUX connection
A Telnet connection
An SSH connection
Question 18
A network technician is attempting to configure an interface by entering the following command: SanJose(config)# ip address 192.168.2.1 255.255.255.0. The command is rejected by the device. What is the reason for this?

The command is being entered from the wrong mode of operation.
The command syntax is wrong.
The subnet mask information is incorrect.
The interface is shutdown and must be enabled before the switch will accept the IP address.
Question 19
After several configuration changes are made to a router, the copy running-configuration startup-configuration command is issued. Where will the changes be stored?

Flash
ROM
NVRAM
RAM
The configuration register
A TFTP server
Question 20



The banner message is too long.
The delimiting character appears in the banner message.
The symbol “!” signals the end of a banner message.
Message-of-the-day banners will only appear when a user logs in through the console port.
Question 21
What are three characteristics of an SVI? (Choose three.)

It is designed as a security protocol to protect switch ports.
It is not associated with any physical interface on a switch.
It is a special interface that allows connectivity by different types of media.
It is required to allow connectivity by any device at any location.
It provides a means to remotely manage a switch.
It is associated with VLAN1 by default.
Question 22
A technician configures a switch with these commands:SwitchA(config)# interface vlan 1 SwitchA(config-if)# ip address 192.168.1.1 255.255.255.0 SwitchA(config-if)# no shutdownWhat is the technician configuring?

Telnet access
SVI
Password encryption
Physical switchport access
Question 23
In computer communication, what is the purpose of message encoding?

To convert information to the appropriate form for transmission
To interpret information
To break large messages into smaller frames
To negotiate correct timing for successful communication
Question 24
What protocol is responsible for controlling the size of segments and the rate at which segments are exchanged between a web client and a web server?

TCP
IP
HTTP
Ethernet
Question 25
What is the process of dividing a data stream into smaller pieces before transmission?

Segmentation
Encapsulation
Encoding
Flow control
Question 26
When IPv4 addressing is manually configured on a web server, which property of the IPv4 configuration identifies the network and host portion for an IPv4 address?

DNS server address
Subnet mask
Default gateway
DHCP server address
Question 27
A network administrator is troubleshooting connectivity issues on a server. Using a tester, the administrator notices that the signals generated by the server NIC are distorted and not usable. In which layer of the OSI model is the error categorized?

Presentation layer
Network layer
Physical layer
Data link layer
Question 28

A network engineer is measuring the transfer of bits across the company backbone for a mission critical database application. The engineer notices that the network throughput appears lower than the bandwidth expected. Which three factors could influence t

The amount of traffic that is currently crossing the network
The sophistication of the encapsulation method applied to the data
The type of traffic that is crossing the network
The latency that is created by the number of network devices that the data is crossing
The bandwidth of the WAN connection to the Internet
The reliability of the gigabit Ethernet infrastructure of the backbone
Question 29
Which type of UTP cable is used to connect a PC to a switch port?

Console
Rollover
Crossover
Straight-through
Question 30
What is a characteristic of the LLC sublayer?

It provides the logical addressing required that identifies the device.
It provides delimitation of data according to the physical signaling requirements of the medium.
It places information in the frame allowing multiple Layer 3 protocols to use the same network interface and media.
It defines software processes that provide services to the physical layer.

Comments

    The author deactivated comments on this page.

    Quiz information

    Author : Edelwess
    Difficulty : MediumPlayed :
    ShareFavoritesReport
    Embed this quiz on your website

    Ranking

    Average score : %

    1.marsmouth80.6 %
    2.
    3.
    4.
    5.
    6.
    7.
    8.
    9.
    10.

    They played it

    Communauty

    Follow us on Facebook to be updated about the latest good quizes !

    More quizes !

    Cookies and privacy

    By browsing this website, you accept our cookie and privacy policy explained here.