1. What are the key functions of encapsulation? (Choose three.)
    • **identifies pieces of data as part of the same communication
    • **ensures that data pieces can be directed to the correct receiving end device
    • **enables the reassembly of complete messages
  2. Which two layers of the OSI model have the same functions as the TCP/IP model Network Access Layer? (Choose two.)
    **Physical**Data Link
  3. According to the OSI model, FTP, TFTP, Telnet, and HTTP are used to check connectivity up to which layer?
  4. What is true of data as it flows across the internetwork? (Choose three.)
    • **Overhead is used to notify devices on a network that errors have been detected in data transmission.
    • **Path selection is important for optimizing data flow and increasing performance.
    • **Managing data flow and regulating traffic types is handled by intermediary devices.
  5. Which devices connect individual hosts to the network and can connect
    multiple individual networks to form an internetwork? (Choose three.)
    • **communication server
    • **firewall
    • **router
  6. What are the primary functions of the header and trailer information resulting from encapsulation? (Choose three.)
    • **assist intermediary devices with processing and path selection
    • **uniquely identifies source and destination devices
    • **manage error recovery and data integrity
  7. What is true regarding information that travels from the source to the destination? (Choose two.)
    • **Headers are added to uniquely identify hosts.
    • **Protocols determine the type, structure and purpose of labels and addressing.
  8. Which statements correctly identify the role of intermediary devices in the network? (Choose three.)
    • **determine pathways for data
    • **retime and retransmit data signals
    • **manage data flows
  9. Select the statements that represent processes network protocols describe. (Choose three.)
    • **the process by which networking devices share information about network paths
    • **how and where error and system messages are passed between devices
    • **establishment and termination of data transfer sessions
  10. Select the statements that are correct concerning network protocols. (Choose three.)
    • **define the structure of layer specific PDU's
    • **outline the functions necessary for communications between layers
    • **require layer dependent encapsulations
  11. What are the benefits of using a layered approach to assist with network troubleshooting? (Choose three.)
    • **Prevent technology change at one layer from affecting technology at another layer of the model.
    • **To make network communication easier to understand.
    • **Allow competitors to design products at different layer of the model and have them work together.
  12. A
    network administrator is designing a network for a new branch office
    of twenty-five users. What are the advantages of using a client-server
    model? (Choose two.)
    • centralized administration
    • security is easier to enforce
  13. Which of the following are benefits of peer-to-peer networks? (Choose three.)
    • easy to create
    • no centralized equipment required centralized administrator not required
  14. Which two protocols are used to control the transfer of web resources from a web server to a client browser? (Choose two.)
    • HTTP
    • HTTPS
  15. Which statements are correct concerning the role of the MTA in handling email? (Choose three.)
    • receives email from the client's MUA
    • passes email to the MDA for final delivery
    • uses SMTP to route email between servers
  16. What is the automated service that matches resource names with the required IP address?
  17. What three protocols operate at the Application layer of the OSI model? (Choose three.)
    • DNS
    • SMTP
    • POP
  18. What are the two forms of application layer software? (Choose two.)
    • applications
    • services
  19. What are three properties of peer-to-peer applications? (Choose three.)
    • acts as both a client and server within the same communication.
    • hybrid mode includes a centralized directory of files.
    • can be used in client-server networks.
  20. Which application layer protocols correctly match a corresponding function? (Choose two.)
    • HTTP transfers data from a web server to a client
    • Telnet provides a virtual connection for remote access
  21. Which are valid DNS resource record types? (Choose three.)
    • A
    • NS
    • MX
  22. Which email components are used to forward mail between servers? (Choose two.)
    • MTA
    • SMTP
  23. What is the primary disadvantage of telnet?
    does not support encryption
  24. What are three common HTTP message types? (Choose three.)
    • GET
    • POST
    • PUT
  25. Which of the following are examples of TCP/IP application layer protocols? (Choose three.)
    • *a terminal emulation protocol that supports remote console connections with various network devices
    • *a protocol responsible for transporting electronic mail on TCP/IP networks and the Internet
    • *a protocol that exchanges network management information between a network device and a management console
  26. What is the purpose of the TCP three-way handshake?
    to synchronize sequence numbers prior to data transmission
  27. What are the features of the User Datagram Protocol (UDP). (Choose three.)
    • *no guaranteed delivery of datagrams
    • *reliability provided by the application layer *connectionless
  28. Which protocol is used by FTP to transfer files over the Internet?
  29. How does windowing ensure that a data packet will be delivered to the
    recipient in the same order, undamaged, and reliably? (Choose two.)
    • acknowledgements
    • window size adjustment
  30. The network administrator for ABC company needs to send large amounts of
    information to many destinations at one time and does not need any
    verification that the data has been received. Which transport protocol
    would the administrator use?
  31. With TCP/IP data encapsulation, which range of port numbers identifies all well-known applications?
    0 to 1023
  32. What is dynamically assigned by the source host when forwarding data?
    source port number
  33. Why are port numbers included in the TCP header of a segment?
    to enable a receiving host to forward the data to the appropriate application
  34. Which OSI model layer is responsible for regulating the flow of information
    from source to destination, reliably and accurately?
  35. Why is flow control used for TCP data transfer?
    to prevent the receiver from being overwhelmed by incoming data
  36. In an IPv4 environment, what information is used by the router to forward
    data packets from one interface of a router to another?
    destination network address
  37. Which two of the following statements accurately describe a default gateway? (Choose two.)
    • *A default gateway is the IP address assigned to the near-side router interface.
    • *A default gateway is used when a host transfers data to a host on another network segment.
  38. What information is added during encapsulation at OSI Layer 3?
    source and destination IP address
  39. In a connectionless system, which of the following is correct?
    The destination is not contacted before a packet is sent.
  40. Which statement below is talking about the network layer?
    Uses the Internet Protocol addressing scheme to determine the best way to move data from one place to another.
  41. Which IP packet field will prevent endless loops?
  42. Which portion of the network layer address does a router use to forward packets?
    network portion
  43. If the default gateway is configured incorrectly on the host, what is the impact on communications?
    The host can communicate with other hosts on the local network, but is unable to communicate with hosts on remote networks.
  44. What is the purpose of a default gateway?
    identifies the device that allows local network computers to communicate with devices on other networks
  45. What type of routing uses information that is manually entered into the routing table?
  46. What are the functions of a routing protocol? (Choose three.)
    • *provides the process for sharing route information between routers
    • *enables routers to maintain the routing tables
    • *enables routers to choose the best path to route the packet
  47. When the destination network is not listed in the routing table of a
    Cisco router, what are two possible actions that the router might take?
    (Choose two.)
    • *The router discards the packet.
    • *The router forwards the packet out the interface indicated by the default route entry
  48. Which statements are true regarding IP addressing? (Choose two.)
    • *Private addresses are blocked from public Internet by router.
    • *IP address can be used for a host to direct traffic to itself.
  49. Given the IP address and subnet mask of, which of the following would describe this address?
    This is a network address.
  50. Which of the following are features of IPv6? (Choose three.)
    • *larger address space
    • *data types and classes of service
    • *authentication and encryption
  51. A router interface has been assigned an IP address of
    with a mask of To which subnet does the IP address
  52. Which IPv4 subnetted addresses represent valid host addresses? (Choose three.)
    • /26
    • /26
    • /27
  53. What subnet mask would a network administrator assign to a network address of if it were possible to have up to 254 hosts?
  54. Which of the following network devices are recommended to be assigned static IP addresses? (Choose three.)
    • servers
    • network printers
    • routers
  55. Which three IP addresses are private? (Choose three.)
  56. Which process do routers use to determine the subnet network address based upon a given IP address and subnet mask?
    binary ANDing
  57. Which of the following is a characteristic of DHCP?
    provides an IP address dynamically to a device from a defined range of IP addresses
  58. Which IEEE specification defines Wi-Fi technology?
  59. What is true regarding media access control? (Choose three.)
    • *Ethernet utilizes CSMA/CD
    • *defined as placement of data frames on the media
    • *Data Link layer protocols define the rules for access to different media
  60. Which characteristics describe carrier sense multiple access collision detect (CSMA/CD)? (Choose three.)
    • nondeterministic
    • collision environment
    • first-come, first-served approach
  61. Which options are properties of contention-based media access for a shared media? (Choose three.)
    • non-deterministic
    • less overhead
    • collisions exist
  62. What determines the method of media access control? (Choose two.)
    • media sharing
    • logical topology
  63. What is true concerning physical and logical topologies?
    Logical topologies consist of virtual connections between nodes.
  64. Which of the following are sublayers of the Data Link layer?
    MAC, LLC
  65. Which features describe the concept of Carrier Sense Multiple Access with Collision Detection? (Choose two.)
    • non-deterministic
    • uses first-come, first-served approach
  66. What is the purpose of the preamble in an Ethernet frame?
    is used for timing synchronization with alternating patterns of ones and zeros
  67. What are three characteristics of valid Ethernet Layer 2 addresses? (Choose three.)
    • *They are 48 binary bits in length.
    • *They generally represented in hexadecimal format.
    • *They are considered physical addresses.
  68. A network administrator has been asked to provide a graphic
    representation of exactly where the company network wiring and equipment
    are located in the building. What is this type of drawing?
    physical topology
  69. Which three factors should be considered when implementing a Layer 2 protocol in a network?
    • *the geographic scope of the network
    • *the physical layer implementation
    • *the number of hosts to be interconnected
  70. Which three session options does PPP offer? (Choose three.)
    • multilink
    • compression
    • authentication
  71. Which statements describe the logical token-passing topology? (Choose two.)
    • *Computers are allowed to transmit data only when they possess a token.
    • *Electronic tokens are passed sequentially to each other.
Card Set
all of ccna 1 chapter questions