IT CertificationsComprehensive Study Set

Ccna 1 Module 1 3 Exam

123 questions across 0 topics. Use the find bar or section chips to jump to what you need.

Community-sourced. Answers may be wrong or out of date. Always verify with your official training portal before submitting. Not affiliated with any branch, agency, or vendor. Details.
QUESTION 1

During a routine inspection, a technician discovered that software that was installed on a computer was secretly collecting data about websites that were visited by users of the computer. Which type of threat is affecting this computer?

ANSWER

spyware

QUESTION 2

Which term refers to a network that provides secure access to the corporate offices by suppliers, customers and collaborators?

ANSWER

Extranet

QUESTION 3

A large corporation has modified its network to allow users to access network resources from their personal laptops and smart phones. Which networking trend does this describe?

ANSWER

BYOD Bring Your Own Device

QUESTION 4

What is an ISP?

ANSWER

It is an organization that enables individuals and businesses to connect to the Internet

QUESTION 5

Fault Tolerance example

ANSWER

Provide redundant links and devices

QUESTION 6

Scalability example

ANSWER

Expand the network without degrading the service for existing users.

QUESTION 7

Security example

ANSWER

Protect the network from unauthorized access.

QUESTION 8

An employee at a branch office is creating a quote for a customer. In order to do this, the employee needs to access confidential pricing information from internal servers at the Head Office. What type of network would the employee access?

ANSWER

an intranet

QUESTION 9

Which statement describes the use of powerline networking technology?

ANSWER

A device connects to an existing home LAN using an adapter and an existing electrical outlet.

QUESTION 10

A networking technician is working on the wireless network at a medical clinic. The technician accidentally sets up the wireless network so that patients can see the medical records data of other patients. Which of the four network characteristics has been violated in this situation?

ANSWER

security

QUESTION 11

Characteristic of DSL

ANSWER

high bandwidth connection that runs over a telephone line

QUESTION 12

Characteristic of dialup telephone

ANSWER

typically has very low bandwidth

QUESTION 13

Characteristic of satellite

ANSWER

not suited for heavily wooded areas

QUESTION 14

Characteristic of cable

ANSWER

uses coaxial cable as a medium

QUESTION 15

What two criteria are used to help select a network medium from various network media? (Choose two.)

ANSWER

the distance the selected medium can successfully carry a signal and the environment where the selected medium is to be installed

QUESTION 16

What type of network traffic requires QoS?

ANSWER

video conferencing

QUESTION 17

A user is implementing security on a small office network. Which two actions would provide the minimum security requirements for this network? (Choose two.)

ANSWER

implementing a firewall and installing antivirus software

QUESTION 18

Passwords can be used to restrict access to all or parts of the Cisco IOS. Select the modes and interfaces that can be protected with passwords. (Choose three.)

ANSWER

console interface and priveleged EXEC mode

QUESTION 19

Which interface allows remote management of a Layer 2 switch?

ANSWER

the switch virtual interface

QUESTION 20

What function does pressing the Tab key have when entering a command in IOS?

ANSWER

It completes the remainder of a partially typed word in a command.

QUESTION 21

While trying to solve a network issue, a technician made multiple changes to the current router configuration file. The changes did not solve the problem and were not saved. What action can the technician take to discard the changes and work with the file in NVRAM?

ANSWER

Issue the reload command without saving the running configuration.

QUESTION 22

An administrator uses the Ctrl-Shift-6 key combination on a switch after issuing the ping command. What is the purpose of using these keystrokes?

ANSWER

to interrupt the ping process

QUESTION 23

A network administrator is configuring access control to switch SW1. If the administrator uses a console connection to connect to the switch, which password is needed to access user EXEC mode?

ANSWER

Is password after line console 0 command. In this case lineconin

QUESTION 24

A technician configures a switch with these commands: SwitchA(config)# interface vlan 1 SwitchA(config-if)# ip address 192.168.1.1 255.255.255.0 SwitchA(config-if)# no shutdown What is the technician configuring?

ANSWER

SVI Switch Virtual Interface

QUESTION 25

Which command or key combination allows a user to return to the previous level in the command hierarchy?

ANSWER

exit

QUESTION 26

What are two characteristics of RAM on a Cisco device? (Choose two.)

ANSWER

The configuration that is actively running on the device is stored in RAM.*The contents of RAM are lost during a power cycle.

QUESTION 27

Guidelines for naming conventions on Cisco IOS devices? There are 5.

ANSWER

Start with a letter Contain no spaces End with a letter or digit Use only letters, digits, and dashes Be less than 64 characters in length

QUESTION 28

How is SSH different from Telnet?

ANSWER

SSH provides security to remote sessions by encrypting messages and using user authentication. Telnet is considered insecure and sends messages in plaintext.

QUESTION 29

An administrator is configuring a switch console port with a password. In what order will the administrator travel through the IOS modes of operation in order to reach the mode in which the configuration commands will be entered? 4 Steps. Explain.

ANSWER

The configuration mode that the administrator first encounters is user EXEC mode. After the enable command is entered, the next mode is privileged EXEC mode. From there, the configure terminal command is entered to move to global configuration mode. Finally, the administrator enters the line console 0 command to enter the mode in which the configuration will be entered.

QUESTION 30

What are three characteristics of an SVI?

ANSWER

It is not associated with any physical interface on a switch. It provides a means to remotely manage a switch. It is associated with VLAN1 by default.

QUESTION 31

What command is used to verify the condition of the switch interfaces, including the status of the interfaces and a configured IP address?

ANSWER

show ip interface brief

QUESTION 32

Two descriptions of user EXEC mode

ANSWER

limited number of basic monitoring commands and the first entrance to the CLI of an IOS device

QUESTION 33

Two descriptions of privileged EXEC mode

ANSWER

accessed by entering the enable command and identified by a prompt ending with the # character.

QUESTION 34

Two descriptions of global configuration mode

ANSWER

changes made affect the operation of the device as a whole and accessed by entering configure terminal command

QUESTION 35

Tab Hot Key

ANSWER

completes abbreviated commands and parameters

QUESTION 36

Space Bar Hot Key

ANSWER

displays the next screen

QUESTION 37

Up Arrow Hot Key

ANSWER

scrolls backwards through previously entered commands

QUESTION 38

? Hot Key

ANSWER

provides content specific help

QUESTION 39

Ctrl-Shift-6

ANSWER

Allows the user to interrupt an IOS process such as ping or traceroute

QUESTION 40

In the show running-config command, which part of the syntax is represented by running-config?

ANSWER

a keyword

QUESTION 41

After making configuration changes on a Cisco switch, a network administrator issues a copy running-config startup-config command. What is the result of issuing this command?

ANSWER

The new configuration will be loaded if the switch is restarted.

QUESTION 42

What command will prevent all unencrypted passwords from displaying in plain text in a configuration file?

ANSWER

(config)# service password-encryption

QUESTION 43

A network administrator enters the service password-encryption command into the configuration mode of a router. What does this command accomplish?

ANSWER

This command prevents someone from viewing the running configuration passwords.

QUESTION 44

What method can be used by two computers to ensure that packets are not dropped because too much data is being sent too quickly?

ANSWER

flow control

QUESTION 45

Which statement accurately describes a TCP/IP encapsulation process when a PC is sending data to the network?

ANSWER

Segments are sent from the transport layer to the internet layer.

QUESTION 46

What three application layer protocols are part of the TCP/IP protocol suite?

ANSWER

DHCP, DNS, FTP

QUESTION 47

Describe ISOC

ANSWER

This organization promotes the open development, evolution, and use of the internet throughout the world.

QUESTION 48

Describe ISO

ANSWER

This organization is the largest developer of international standards in the world for a wide variety of products and services. It is known for the Open Systems Interconnection (ISO) reference model.

QUESTION 49

Describe IANA

ANSWER

This organization is responsible for overseeing and managing IP address allocation, domain name management, and protocol identifiers.

QUESTION 50

Which name is assigned to the transport layer PDU?

ANSWER

segment

QUESTION 51

Which name is assigned to the application layer PDU?

ANSWER

data

QUESTION 52

Which name is assigned to the network layer PDU?

ANSWER

packet

QUESTION 53

Which name is assigned to the data link layer PDU?

ANSWER

frame

QUESTION 54

Which name is assigned to the physical layer PDU?

ANSWER

bits

QUESTION 55

PDU

ANSWER

Protocol Data Unit

QUESTION 56

When IPv4 addressing is manually configured on a web server, which property of the IPv4 configuration identifies the network and host portion for an IPv4 address?

ANSWER

subnet mask

QUESTION 57

What process involves placing one PDU inside of another PDU?

ANSWER

Encapsulation

QUESTION 58

What layer is responsible for routing messages through an internetwork in the TCP/IP model?

ANSWER

Internet

QUESTION 59

For the TCP/IP protocol suite, what is the correct order of events when a Telnet message is being prepared to be sent over the network?

ANSWER

The Telnet-formatted data is provided to the next layer. The TCP Header is added. The IP header is added. The Ethernet header is added.

QUESTION 60

Which PDU format is used when bits are received from the network medium by the NIC of a host?

ANSWER

frame

QUESTION 61

ServerB is attempting to contact HostA. Which two statements correctly identify the addressing that ServerB will generate in the process? (Choose two.) Host to switch to router to router to switch to server.

ANSWER

ServerB will generate a frame with the destination MAC address of RouterB.*ServerB will generate a packet with the destination IP address of HostA.

QUESTION 62

Which method allows a computer to react accordingly when it requests data from a server and the server takes too long to respond?

ANSWER

response timeout

QUESTION 63

A web client is receiving a response for a web page from a web server. From the perspective of the client, what is the correct order of the protocol stack that is used to decode the received transmission?

ANSWER

Ethernet, IP, TCP, HTTP

QUESTION 64

Which two OSI model layers have the same functionality as a single layer of the TCP/IP model? (Choose two.)

ANSWER

data link and physical

QUESTION 65

At which layer of the OSI model would a logical address be added during encapsulation?

ANSWER

network layer

QUESTION 66

What is a characteristic of multicast messages?

ANSWER

They are sent to a select group of hosts.

QUESTION 67

Which statement is correct about network protocols?

ANSWER

They define how messages are exchanged between the source and the destination.

QUESTION 68

What is an advantage of network devices using open standard protocols?

ANSWER

A client host and a server running different operating systems can successfully exchange data.

QUESTION 69

Which device performs the function of determining the path that messages should take through internetworks?

ANSWER

a router

QUESTION 70

Why would a Layer 2 switch need an IP address?

ANSWER

to enable the switch to be managed remotely

QUESTION 71

An administrator is trying to configure the switch but receives the error message that is displayed in the exhibit. What is the problem? switch1> config t % Invalid input detected at '^' marker.

ANSWER

The administrator must first enter privileged EXEC mode before issuing the command

QUESTION 72

What term describes a network owned by one organization that provides safe and secure access to individuals who work for a different organization?

ANSWER

Extranet

QUESTION 73

What term describes storing personal files on servers over the internet to provide access anywhere, anytime, and on any device?

ANSWER

Cloud

QUESTION 74

What term describes a network where one computer can be both client and server?

ANSWER

peer-to-peer

QUESTION 75

What term describes a type of network used by people who work from home or from a small remote office?

ANSWER

SOHO network

QUESTION 76

What term describes a computing model where server software runs on dedicated computers?

ANSWER

client/server

QUESTION 77

What term describes a technology that allows devices to connect to the LAN using an electrical outlet?

ANSWER

powerline networking

QUESTION 78

What term describes a policy that allows network devices to manage the flow of data to give priority to voice and video?

ANSWER

quality of service

QUESTION 79

What term describes a private collection of LANs and WANs that belongs to an organization?

ANSWER

Intranet

QUESTION 80

What term describes the ability to use personal devices across a business or campus network?

ANSWER

BYOD

QUESTION 81

At which OSI layer is a source IP address added to a PDU during the encapsulation process?

ANSWER

network layer

QUESTION 82

At which OSI layer is a destination port number added to a PDU during the encapsulation process?

ANSWER

transport layer

QUESTION 83

At which OSI layer is data added to a PDU during the encapsulation process?

ANSWER

application layer

QUESTION 84

At which OSI layer is a source MAC address added to a PDU during the encapsulation process?

ANSWER

data link layer

QUESTION 85

At which OSI layer is a source port number added to a PDU during the encapsulation process?

ANSWER

transport layer

QUESTION 86

At which OSI layer is a destination MAC address added to a PDU during the encapsulation process?

ANSWER

data link layer

QUESTION 87

In which scenario would the use of a WISP be recommended?

ANSWER

a farm in a rural area without wired broadband access

QUESTION 88

What characteristic of a network enables it to quickly grow to support new users and applications without impacting the performance of the service being delivered to existing users?

ANSWER

scalability

QUESTION 89

A college is building a new dormitory on its campus. Workers are digging in the ground to install a new water pipe for the dormitory. A worker accidentally damages a fiber optic cable that connects two of the existing dormitories to the campus data center. Although the cable has been cut, students in the dormitories only experience a very short interruption of network services. What characteristic of the network is shown here?

ANSWER

fault tolerance

QUESTION 90

What are two characteristics of a scalable network? (Choose two.)

ANSWER

grows in size without impacting existing users and suitable for modular devices that allow for expansion.

QUESTION 91

Which two Internet connection options do not require that physical cables be run to the building? (Choose two.)

ANSWER

cellular and satellite

QUESTION 92

What type of network must a home user access in order to do online shopping?

ANSWER

the Internet

QUESTION 93

How does BYOD change the way in which businesses implement networks?

ANSWER

BYOD provides flexibility in where and how users can access network resources.

QUESTION 94

An employee wants to access the network of the organization remotely, in the safest possible way. What network feature would allow an employee to gain secure remote access to a company network?

ANSWER

VPN

QUESTION 95

What is the Internet?

ANSWER

It provides connections through interconnected global networks.

QUESTION 96

What are two functions of end devices on a network? (Choose two.)

ANSWER

They originate the data that flows through the network and They are the interface between humans and the communication network

QUESTION 97

Which statement is true about the running configuration file in a Cisco IOS device?

ANSWER

It affects the operation of the device immediately when modified

QUESTION 98

Which two statements are true regarding the user EXEC mode?

ANSWER

The device prompt for this mode ends with the ">" symbol. Only some aspects of the router configuration can be viewed

QUESTION 99

Which type of access is secured on a Cisco router or switch with the enable secret command?

ANSWER

privileged EXEC

QUESTION 100

What is the default SVI on a Cisco switch?

ANSWER

VLAN1

QUESTION 101

What is the function of the shell in an OS?

ANSWER

It interfaces between the users and the kernel.

QUESTION 102

A router with a valid operating system contains a configuration file stored in NVRAM. The configuration file has an enable secret password but no console password. When the router boots up, which mode will display?

ANSWER

user EXEC mode

QUESTION 103

An administrator has just changed the IP address of an interface on an IOS device. What else must be done in order to apply those changes to the device?

ANSWER

Nothing must be done. Changes to the configuration on an IOS device take effect as soon as the command is typed correctly and the Enter key has been pressed.

QUESTION 104

Which memory location on a Cisco router or switch will lose all content when the device is restarted?

ANSWER

RAM

QUESTION 105

Why would a technician enter the command copy startup-config running-config?

ANSWER

to copy an existing configuration into RAM

QUESTION 106

Which functionality is provided by DHCP?

ANSWER

automatic assignment of an IP address to each host

QUESTION 107

Which two functions are provided to users by the context-sensitive help feature of the Cisco IOS CLI?

ANSWER

displaying a list of all available commands within the current mode and determining which option, keyword, or argument is available for the entered command

QUESTION 108

Which memory location on a Cisco router or switch stores the startup configuration file?

ANSWER

NVRAM

QUESTION 109

To what subnet does the IP address 10.1.100.50 belong if a subnet mask of 255.255.0.0 is used?

ANSWER

10.1.0.0

QUESTION 110

What type of communication will send a message to all devices on a local area network?

ANSWER

Broadcast

QUESTION 111

In computer communication, what is the purpose of message encoding?

ANSWER

to convert information to the appropriate form for transmission

QUESTION 112

Which message delivery option is used when all devices need to receive the same message simultaneously?

ANSWER

broadcast

QUESTION 113

`What are two benefits of using a layered network model? (Choose two.)

ANSWER

It assists in protocol design and It prevents technology in one layer from affecting other layers

QUESTION 114

What is the purpose of protocols in data communications?

ANSWER

providing the rules required for a specific type of communication to occur

QUESTION 115

Which logical address is used for delivery of data to a remote network?

ANSWER

destination IP address

QUESTION 116

What is the general term that is used to describe a piece of data at any layer of a networking model?

ANSWER

protocol data unit

QUESTION 117

Which two protocols function at the internet layer?

ANSWER

ICMP and IP

QUESTION 118

Which layer of the OSI model defines services to segment and reassemble data for individual communications between end devices?

ANSWER

transport

QUESTION 119

Which type of communication will send a message to a group of host destinations simultaneously?

ANSWER

multicast

QUESTION 120

What process is used to receive transmitted data and convert it into a readable message?

ANSWER

decoding

QUESTION 121

What is done to an IP packet before it is transmitted over the physical medium?

ANSWER

It is encapsulated in a Layer 2 frame.

QUESTION 122

What process is used to place one message inside another message for transfer from the source to the destination?

ANSWER

encapsulation

QUESTION 123

A web client is sending a request for a webpage to a web server. From the perspective of the client, what is the correct order of the protocol stack that is used to prepare the request for transmission?

ANSWER

HTTP, TCP, IP, Ethernet

Looking for a different version?

CBTs get updated every year. Search for the exact version you're taking (e.g. "cyber awareness 2025").

Search all study materials