IT CertificationsAnswer Key

Cisco Ccna 1

23 community-sourced questions and answers. Free — no login.

Community-sourced. Answers may be wrong or out of date. Always verify with your official training portal before submitting. Not affiliated with any branch, agency, or vendor. Details.
QUESTION 1

characteristics of fault tolerant network

ANSWER

Redundancy

QUESTION 2

Qos mechanisms for priorities

ANSWER

With a QoS policy in place, the router can manage the flow of data and voice traffic, giving priority to voice communications if the network experiences congestion.

QUESTION 3

Benefits of using cloud computing

ANSWER

can be accessed from anywhere, less space, cheaper, lower overhead

QUESTION 4

function of the shell in an OS

ANSWER

to act as an intermediary between user and OS through GUI or CLI

QUESTION 5

SSH

ANSWER

Secure Shell (SSH) - SSH is a method for remotely establishing a secure CLI connection through a virtual interface, over a network. Unlike a console connection, SSH connections require active networking services on the device including an active interface configured with an address. SSH is the recommended method for remote management because it provides a secure connection. SSH provides encrypted password authentication and transport of session data. This keeps the user ID, password, and the details of the management session private. Most versions of Cisco IOS include an SSH server and an SSH client that can be used to establish SSH sessions with other devices.

QUESTION 6

modes of operation

ANSWER

User EXEC Mode ">" This mode has limited capabilities but is useful for basic operations. It allows only a limited number of basic monitoring commands but does not allow the execution of any commands that might change the configuration of the device. The user EXEC mode is identified by the CLI prompt that ends with the > symbol. Privileged EXEC Mode "#" To execute configuration commands, a network administrator must access privileged EXEC mode. Higher configuration modes, like global configuration mode, can only be reached from privileged EXEC mode. The privileged EXEC mode can be identified by the prompt ending with the # symbol.

QUESTION 7

Ctrl-Shft-6 key command

ANSWER

All purpose break sequence. used to abort DNS lookups, traceroutes and pings.

QUESTION 8

interface VLAN1

ANSWER

Cisco IOS Layer 2 switches have physical ports for devices to connect. These ports do not support Layer 3 IP addresses. Therefore, switches have one or more switch virtual interfaces (SVIs). These are virtual interfaces because there is no physical hardware on the device associated with it. An SVI is created in software. The virtual interface provides a means to remotely manage a switch over a network using IPv4. Each switch comes with one SVI appearing in the default configuration "out-of-the-box." The default SVI is interface VLAN1.

QUESTION 9

TCP - Layer 4 protocol, responsibilities in the network communication process

ANSWER

encourages competition and promotes choices

QUESTION 10

advantages of open protocol

ANSWER

assists in protocol design prevents technology in one layer from affecting other layers

QUESTION 11

benefits of layered model

ANSWER

segment

QUESTION 12

OSI model Vs TCP/IP Model layers

ANSWER

cancellation

QUESTION 13

name of the transport layer PDU

ANSWER

not affected by EMI or RFI more expensive than UTP

QUESTION 14

NIC has responsibilities in both layer 1 and 2 - purpose of the physical layer

ANSWER

provides high availability and connects some, but not all, remote sites

QUESTION 15

factors that cause throughput mismatch the specified bandwidth of physical links

ANSWER

data link layer addressing detection of errors through CRC calc delimiting groups of bits into frames

QUESTION 16

characteristic of UTP cabling

ANSWER

receives entire frame and performs CRC check to detect errors before forwarding frame

QUESTION 17

characteristic of of LLC sublayer

ANSWER

retain contents when power is removed store the startup configuration file

QUESTION 18

characteristic of fiber-optic cable

ANSWER

*a single packet can be sent to a group of hosts *multicast transmissions can be used by routers to exchange routing information *routers will not forward multicast addresses in the range of 224.0.0.0 to 224.0.0.255

QUESTION 19

WAN topologies - partial mesh topologies

ANSWER

10.0.0.0 127. 192.168.0.0

QUESTION 20

LAN topologies - carrier sense multiple access with collision avoidance (CSMA/CA)

ANSWER

converts ipv6 to ipv4

QUESTION 21

three primary functions provided by Layer 2 data encapsulation

ANSWER

FE80::1/10

QUESTION 22

ethernet MAC address

ANSWER

255.255.255.128

QUESTION 23

store and forward switching

ANSWER

* .com

Looking for a different version?

CBTs get updated every year. Search for the exact version you're taking (e.g. "cyber awareness 2025").

Search all study materials