CCNA 1 advent to Networks v7.0 – ITNv7 Practice final Exam Answers

1. A customer packet is obtained by a server. The packet has actually a location port variety of 22. What organization is the customer requesting?

SSH*TFTPDHCPDNS

2. Describe the exhibit.

You are watching: What is a user trying to determine when issuing a ping 10.1.1.1 command on a pc?


*
*
*
*
*

CCNA 1 v7 ITN Practice last Exam answer p40


A user problems the command netstat –r on a workstation. I beg your pardon IPv6 resolve is one of the link-local addresses of the workstation?

::1/128fe80::30d0:115:3f57:fe4c/128*fe80::/642001:0:9d38:6ab8:30d0:115:3f57:fe4c/128


Explanation: In the IPv6 resolve scheme, the network that fe80::/10 is booked for link-local addresses. The resolve fe80::/64 is a network address that indicates, in this workstation, fe80::/64 is actually offered for link-local addresses. Hence the address fe80::30d0:115:3f57:fe4c/128 is a valid IPv6 link-local address.


41. What type of IPv6 deal with is represented by ::1/128?

EUI-64 created link-localglobal unicastunspecifiedloopback*

42. I m sorry statement defines network security?

It supports development over time in accordance v approved network style procedures.It synchronizes web traffic flows making use of timestamps.It ensures sensitive corporate data is available for authorized users.*It prioritizes data flows in order to offer priority come delay-sensitive traffic.

43. I m sorry two devices would be described as intermediary devices? (Choose two.)

wireless LAN controller*serverassembly line robots*IPSgaming consoleretail scanner

44. What characteristic explains spyware?

software the is installed on a user an equipment and collection information around the user*the usage of stolen credentials to accessibility private dataan assault that slowly or crashes a device or network servicea network an equipment that filters access and web traffic coming into a network

45. Refer to the exhibit.


The exhibit shows a tiny switched network and also the contents of the MAC address table that the switch. PC1 has sent a structure addressed to PC3. What will the switch perform with the frame?

The switch will discard the frame.The switch will forward the framework to every ports.The switch will certainly forward the frame only to harbor 2.The switch will certainly forward the framework only to ports 1 and also 3.The switch will forward the frame to all ports except port 4.*

46. Which destination deal with is offered in one ARP request frame?

0.0.0.0255.255.255.255the physical address of the location hostFFFF.FFFF.FFFF*AAAA.AAAA.AAAA

47. Describe the exhibit.


PC1 concerns an ARP request since it demands to send a packet come PC3. In this scenario, what will take place next?

SW1 will certainly send an ARP reply with its Fa0/1 MAC address.RT1 will certainly send an ARP reply through its own Fa0/0 MAC address.*RT1 will certainly forward the ARP request to PC3.RT1 will certainly send one ARP reply through the PC3 MAC address.RT1 will send an ARP reply through its own Fa0/1 MAC address.

48. A network administrator is issuing the login block-for 180 do the efforts 2 within 30 command top top a router. Which danger is the network administrator trying come prevent?

a user that is trying to guess a password to access the router*a worm the is attempting to accessibility another part of the networkan unidentified individual who is trying to accessibility the network equipment rooma device that is make the efforts to examine the web traffic on a link


Explanation: The login block-for 180 make the efforts 2 in ~ 30 command will reason the machine to block authentication ~ 2 unsuccessful attempts in ~ 30 seconds for a expression of 180 seconds. A maker inspecting the web traffic on a attach has naught to perform with the router. The router configuration cannot prevent unauthorized accessibility to the devices room. A worm would certainly not attempt to access the router to propagate come another part of the network.


49. I beg your pardon statement explains the attributes of packet-filtering and stateful firewalls as they relate to the OSI model?

A packet-filtering firewall supplies session layer information to track the state the a connection, whereas a stateful firewall uses application layer info to track the state that a connection.*Both stateful and packet-filtering firewalls can filter in ~ the applications layer.A packet-filtering firewall typically can filter as much as the carry layer, conversely, a stateful firewall deserve to filter up to the conference layer.A stateful firewall can filter application layer information, vice versa, a packet-filtering firewall cannot filter past the network layer.

50. What space two ways to defend a computer system from malware? (Choose two.)

Empty the internet browser cache.Use antivirus software.*Delete unused software.Keep software application up to date.*Defragment the hard disk.


Explanation: At a minimum, a computer should use antivirus software and have all software application up to day to defend versus malware.


51. The employees and also residents of Ciscoville cannot accessibility the web or any type of remote web-based services. It workers easily determine that the city firewall is gift flooded with so much traffic that a malfunction of connectivity to the internet is occurring. Which type of strike is being launched at Ciscoville?

accessTrojan horsereconnaissanceDoS*

52. Which two statements explain the attributes of fiber-optic cabling? (Choose two.)

Fiber-optic cabling does not conduct electricity.*Multimode fiber-optic cabling carries signal from multiple sending out devices.Fiber-optic cabling is generally used together backbone cabling.*Fiber-optic cabling offers LEDs because that single-mode cab​les and also laser an innovation for multimode cables.Fiber-optic cabling has actually high signal loss.

See more: How Did Moseley Establish A More Accurate Periodic Table? How Did Moseley Establish A More Accurate

53. What OSI physical layer term explains the measure of the deliver of bits throughout a tool over a given duration of time?

latencygoodputthroughput*bandwidth

54. Describe the exhibit.


What is the maximum feasible throughput between the PC and also the server?

10 Mb/s1000 Mb/s128 kb/s*100 Mb/s