CCNA 1 Final v5.0 Exam Answers 2015 100
CCNA 1 Final v5.0 Exam Answers 2015 100
CCNA 1 Final v5.0 Exam Answers 2015 100
Net
wiki
e-mail
weblog
instant messaging
3. A home user is looking for an ISP connection that provides high speed
digital transmission over regular phone lines. What ISP connection type
should be used?
DSL
dial-up
satellite
cell modem
cable modem
LAN
MAN
WAN
WLAN
5. Refer to the exhibit. From which location did this router load the IOS?
CCNA 5 Page 1
CCNA 1 Final v5.0 Exam Answers 2015 100% WWW.CCNA-v5.Net
flash memory
NVRAM?
RAM
ROM
a TFTP server?
a console connection
an AUX connection
a Telnet connection
an SSH connection
CCNA 5 Page 2
CCNA 1 Final v5.0 Exam Answers 2015 100% WWW.CCNA-v5.Net
The administrator must first enter privileged EXEC mode before issuing the
command.
The administrator must connect via the console port to access global configuration
mode.
9. What function does pressing the Tab key have when entering a command in
IOS?
10. Refer to the exhibit. An administrator wants to change the name of a brand
new switch, using the hostname command as shown. What prompt will display
after the command is issued?
My Switch(config)#?
Switch(config)#?
MySwitch(config)#?
My(config)#?
Switch#
CCNA 5 Page 3
CCNA 1 Final v5.0 Exam Answers 2015 100% WWW.CCNA-v5.Net
letmein
secretin
lineconin
linevtyin
14. Which IPv4 address can be pinged to test the internal TCP/IP operation of a
host?
0.0.0.0
0.0.0.1
127.0.0.1
192.168.1.1
255.255.255.255
CCNA 5 Page 4
CCNA 1 Final v5.0 Exam Answers 2015 100% WWW.CCNA-v5.Net
15. What three application layer protocols are part of the TCP/IP protocol
suite? (Choose three.)
ARP
DHCP
DNS
FTP
NAT
PPP
16. Which two protocols function at the internet layer? (Choose two.)
ARP
BOOTP
ICMP
IP
PPP
IP address
default gateway address
MAC address
logical address
19. What is the protocol that is used to discover a physical address from a
known logical address and what message type does it use?
ARP, multicast
DNS, unicast
DNS, broadcast
ARP, broadcast
PING, multicast
PING, broadcast
20. What will happen if the default gateway address is incorrectly configured
on a host?
CCNA 5 Page 5
CCNA 1 Final v5.0 Exam Answers 2015 100% WWW.CCNA-v5.Net
The host cannot communicate with other hosts in the local network.
The switch will not forward packets initiated by the host.
The host will have to use ARP to determine the correct address of the default
gateway.
The host cannot communicate with hosts in other networks.
A ping from the host to 127.0.0.1 would not be successful.
21. What is an important function of the physical layer of the OSI model?
logical address
physical address
data
error detection
CCNA 5 Page 6
CCNA 1 Final v5.0 Exam Answers 2015 100% WWW.CCNA-v5.Net
26. Refer to the exhibit. A ping to PC3 is issued from PC0, PC1, and PC2 in this
exact order. Which MAC addresses will be contained in the S1 MAC address
table that is associated with the Fa0/1 port?
CCNA 5 Page 7
CCNA 1 Final v5.0 Exam Answers 2015 100% WWW.CCNA-v5.Net
ARP
DNS
NAT
SMB
DHCP
HTTP
30. Refer to the exhibit. Consider the IP address configuration shown from
PC1. What is a description of the default gateway address?
It is the IP address of the Router1 interface that connects the company to the
Internet.
It is the IP address of the Router1 interface that connects the PC1 LAN to Router1.
It is the IP address of Switch1 that connects PC1 to other devices on the same LAN.
It is the IP address of the ISP network device located in the cloud.
31. Which of the following are primary functions of a router? (Choose two.)
packet switching
CCNA 5 Page 8
CCNA 1 Final v5.0 Exam Answers 2015 100% WWW.CCNA-v5.Net
microsegmentation
domain name resolution
path selection
flow control
32. Which two statements correctly describe a router memory type and its
contents? (Choose two.)
33. In which default order will a router search for startup configuration
information?
34. What happens when part of an Internet VoIP transmission is not delivered
to the destination?
10.172.168.1
172.32.5.2
192.167.10.10
172.20.4.4
192.168.5.254
224.6.6.6
36. How many bits make up the single IPv6 hextet :10CD:?
4
8
16
CCNA 5 Page 9
CCNA 1 Final v5.0 Exam Answers 2015 100% WWW.CCNA-v5.Net
32
FEC0::/10?
FDFF::/7?
FEBF::/10?
FF00::/8
40. Refer to the exhibit. A technician has configured a user workstation with
the IP address and default subnet masks that are shown. Although the user
can access all local LAN resources, the user cannot access any Internet sites
by using either FQDN or IP addresses. Based upon the exhibit, what could
account for this failure?
CCNA 5 Page 10
CCNA 1 Final v5.0 Exam Answers 2015 100% WWW.CCNA-v5.Net
41. Which subnet would include the address 192.168.1.96 as a usable host
address?
192.168.1.64/26
192.168.1.32/27
192.168.1.32/28
192.168.1.64/29
CCNA 5 Page 11
CCNA 1 Final v5.0 Exam Answers 2015 100% WWW.CCNA-v5.Net
Site 1
Site 2
Site 3
Site 4
44. Which two notations are useable nibble boundaries when subnetting in
IPv6? (Choose two.)
/62
/64
/66
/68
/70
45. A host PC has just booted and is attempting to lease an address through
DHCP. Which two messages will the client typically broadcast on the network?
(Choose two.)
DHCPDISCOVER
DHCPOFFER
DHCPREQUEST
DHCPACK
DHCPNACK
CCNA 5 Page 12
CCNA 1 Final v5.0 Exam Answers 2015 100% WWW.CCNA-v5.Net
47. When applied to a router, which command would help mitigate brute-force
password attacks against the router?
exec-timeout 30
service password-encryption
banner motd $Max failed logins = 5$
login block-for 60 attempts 5 within 60
ipconfig /all
arp -a
ipconfig /displaydns
nslookup
49. Refer to the exhibit. The network administrator enters these commands
into the R1 router:
When the router prompts for an address or remote host name, what IP address
should the administrator enter at the prompt?
CCNA 5 Page 13
CCNA 1 Final v5.0 Exam Answers 2015 100% WWW.CCNA-v5.Net
192.168.9.254
192.168.10.1
192.168.10.2
192.168.11.252
192.168.11.254
50. Match the IPv6 address to the IPv6 address type. (Not all options are used.)
CCNA 5 Page 14
CCNA 1 Final v5.0 Exam Answers 2015 100% WWW.CCNA-v5.Net
broadcast SSID
MAC filtering enabled
WEP encryption enabled
PSK authentication required
default administrator password
52. Which type of wireless security generates dynamic encryption keys each
time a client associates with an AP?
EAP
PSK
WEP
WPA
54. Which two components are necessary for a wireless client to be installed
on a WLAN? (Choose two.)
media
wireless NIC
custom adapter
crossover cable
wireless bridge
wireless client software
2001:0DB8:BC15:00A0:0000::
2001:0DB8:BC15:00A1:0000::
2001:0DB8:BC15:00A2:0000::
2001:0DB8:BC15:00AF:0000::
The prefix-length for the range of addresses is /60 .
56. Match the phases to their correct stage in the router bootup process. (Not
all options are used.)
CCNA 5 Page 15
CCNA 1 Final v5.0 Exam Answers 2015 100% WWW.CCNA-v5.Net
59. On a school network, students are surfing the web, searching the library
database, and attending an audio conference with their sister school in Japan.
If network traffic is prioritized with QoS, how will the traffic be classified from
highest priority to lowest priority?
60. During normal operation, from which location do most Cisco routers run
the IOS?
RAM
flash
CCNA 5 Page 16
CCNA 1 Final v5.0 Exam Answers 2015 100% WWW.CCNA-v5.Net
NVRAM
disk drive
a console connection
an AUX connection
a Telnet connection
an SSH connection
62. Which keys act as a hot key combination that is used to interrupt an IOS
process?
Ctrl-Shift-X
Ctrl-Shift-6
Ctrl-Z
Ctrl-C
63. Refer to the exhibit. An administrator wants to change the name of a brand
new switch, using the hostname command as shown. What prompt will display
after the command is issued??
HR Switch(config)#?
Switch(config)#?
HRSwitch(config)#?
HR(config)#?
Switch#
CCNA 5 Page 17
CCNA 1 Final v5.0 Exam Answers 2015 100% WWW.CCNA-v5.Net
FastEthernet0/1
VLAN 1
vty 0
console 0
66. A technician uses the ping 127.0.0.1 command. What is the technician
testing?
switch
hub
router
host
69. A network technician is measuring the transfer of bits across the company
backbone for a mission critical application. The technician notices that the
network throughput appears lower than the bandwidth expected. Which three
factors could influence the differences in throughput? (Choose three.)
CCNA 5 Page 18
CCNA 1 Final v5.0 Exam Answers 2015 100% WWW.CCNA-v5.Net
71. What are two features of a physical, star network topology? (Choose two.)
It is straightforward to troubleshoot.
End devices are connected together by a bus.
It is easy to add and remove end devices.
All end devices are connected in a chain to each other.
Each end system is connected to its respective neighbor.
72. A frame is transmitted from one networking device to another. Why does
the receiving device check the FCS field in the frame?
73. What will a Layer 2 switch do when the destination MAC address of a
received frame is not in the MAC table?
cut-through
store-and-forward
CCNA 5 Page 19
CCNA 1 Final v5.0 Exam Answers 2015 100% WWW.CCNA-v5.Net
fragment-free
fast-forward
75. Which parameter does the router use to choose the path to the destination
when there are multiple routes available?
the lower metric value that is associated with the destination network
the lower gateway IP address to get to the destination network
the higher metric value that is associated with the destination network
the higher gateway IP address to get to the destination network
78. What happens when part of an Internet radio transmission is not delivered
to the destination?
192.0.2.199
198.51.100.201
203.0.113.211
209.165.201.223
CCNA 5 Page 20
CCNA 1 Final v5.0 Exam Answers 2015 100% WWW.CCNA-v5.Net
10.20.30.1
172.32.5.2
192.167.10.10
172.30.5.3
192.168.5.5
224.6.6.6
81. What types of addresses make up the majority of addresses within the /8
block IPv4 bit space?
private addresses
public addresses
multicast addresses
experimental addresses
82. Refer to the exhibit. What is the maximum TTL value that is used to reach
the destination www.cisco.com??
11
12
13
14
CCNA 5 Page 21
CCNA 1 Final v5.0 Exam Answers 2015 100% WWW.CCNA-v5.Net
192.168.1.64/27
192.168.1.128/27
192.168.1.96/28
192.168.1.192/28
84. In a network that uses IPv4, what prefix would best fit a subnet containing
100 hosts?
/23
/24
/25
/26
87. Refer to the exhibit. What is the significance of the asterisk (*) in the
exhibited output?
The asterisk shows which file system was used to boot the system.
The asterisk designates which file system is the default file system.
An asterisk indicates that the file system is bootable.
An asterisk designates that the file system has at least one file that uses that file
system.
CCNA 5 Page 22
CCNA 1 Final v5.0 Exam Answers 2015 100% WWW.CCNA-v5.Net
88. Which WLAN security protocol generates a new dynamic key each time a
client establishes a connection with the AP?
EAP
PSK
WEP
WPA
90. Match each characteristic to the appropriate email protocol. (Not all
options are used.)
CCNA 5 Page 23
CCNA 1 Final v5.0 Exam Answers 2015 100% WWW.CCNA-v5.Net
92. Refer to the exhibit. Which area would most likely be an extranet for the
company network that is shown?
area A
area B
area C
area D
94. Three office workers are using the corporate network. The first employee
uses a web browser to view a company web page in order to read some
announcements. The second employee accesses the corporate database to
perform some financial transactions. The third employee participates in an
important live audio conference with other office workers in branch offices. If
QoS is implemented on this network, what will be the priorities from highest to
lowest of the different data types?
CCNA 5 Page 24
CCNA 1 Final v5.0 Exam Answers 2015 100% WWW.CCNA-v5.Net
95. During normal operation, from which location do most Cisco switches and
routers run the IOS?
RAM
flash
NVRAM
disk drive
CSMA/CD
priority ordering
CSMA/CA
token passing
CCNA 5 Page 25
CCNA 1 Final v5.0 Exam Answers 2015 100% WWW.CCNA-v5.Net
100. What happens when a switch receives a frame and the calculated CRC
value is different than the value that is in the FCS field?
The switch places the new CRC value in the FCS field and forwards the frame.
The switch notifies the source of the bad frame.
The switch drops the frame.
The switch floods the frame to all ports except the port through which the frame
arrived to notify the hosts of the error.
0.0.0.0
255.255.255.255
FFFF.FFFF.FFFF
127.0.0.1
01-00-5E-00-AA-23
103. Which frame forwarding method receives the entire frame and performs a
CRC check to detect errors before forwarding the frame?
cut-through switching
store-and-forward switching
fragment-free switching
fast-forward switching
104. What are the two main components of Cisco Express Forwarding (CEF)?
(Choose two.)
adjacency tables
MAC-address tables
routing tables
ARP tables
forwarding information base (FIB)
CCNA 5 Page 26
CCNA 1 Final v5.0 Exam Answers 2015 100% WWW.CCNA-v5.Net
ARP
DNS
NAT
SMB
DHCP
HTTP
107. Refer to the exhibit. Router R1 has two interfaces that were configured
with correct IP addresses and subnet masks. Why does the show ip route
command output not display any information about the directly connected
networks??
CCNA 5 Page 27
CCNA 1 Final v5.0 Exam Answers 2015 100% WWW.CCNA-v5.Net
TCP and UDP port numbers are used by application layer protocols.
TCP uses port numbers to provide reliable transportation of IP packets.
UDP uses windowing and acknowledgments for reliable transfer of data.
TCP uses windowing and sequencing to provide reliable transfer of data.
TCP is a connection-oriented protocol. UDP is a connectionless protocol.
111. Which statement is true regarding the UDP client process during a
session with a server?
Datagrams that arrive in a different order than that in which they were sent are not
placed in order.
A session must be established before datagrams can be exchanged.
A three-way handshake takes place before the transmission of data begins.
Application servers have to use port numbers above 1024 in order to be UDP
capable.
112. Which two components are configured via software in order for a PC to
participate in a network environment? (Choose two.)
MAC address
IP address
CCNA 5 Page 28
CCNA 1 Final v5.0 Exam Answers 2015 100% WWW.CCNA-v5.Net
kernel
shell
subnet mask
114. Which two reasons generally make DHCP the preferred method of
assigning IP addresses to hosts on large networks? (Choose two.)
2001:DB8:BC15::0
2001:DB8:BC15:A::0
2001:DB8:BC15:A:1::1
2001:DB8:BC15:A:12::0
116. Which two tasks are functions of the presentation layer? (Choose two.)
compression
addressing
encryption
session control
authentication
CCNA 5 Page 29
CCNA 1 Final v5.0 Exam Answers 2015 100% WWW.CCNA-v5.Net
118. Which type of wireless security makes use of dynamic encryption keys
each time a client associates with an AP?
EAP
PSK
WEP
WPA
120. Match the description with the associated IOS mode. (Not all options are
used.)
CCNA 5 Page 30
CCNA 1 Final v5.0 Exam Answers 2015 100% WWW.CCNA-v5.Net
Open the PT activity. Perform the tasks in the activity instructions and then fill in the
blank.
The Server0 message is . winner
123. Which field in an IPv4 packet header will typically stay the same during its
transmission?
Packet Length
Destination Address*
Flag
Time-to-Live
CCNA 5 Page 31
CCNA 1 Final v5.0 Exam Answers 2015 100% WWW.CCNA-v5.Net
Open the PT Activity. Perform the tasks in the activity instructions and then
answer the question.
1. Three bank employees are using the corporate network. The first employee
uses a web browser to view a company web page in order to read some
announcements. The second employee accesses the corporate database to
perform some financial transactions. The third employee participates in an
important live audio conference with other corporate managers in branch
offices. If QoS is implemented on this network, what will be the priorities from
highest to lowest of the different data types?
CCNA 5 Page 32
CCNA 1 Final v5.0 Exam Answers 2015 100% WWW.CCNA-v5.Net
o letmein
o secretin
o lineconin
o linevtyin
3.
4. What are the three primary functions provided by Layer 2 data encapsulation?
(Choose three.)
CCNA 5 Page 33
CCNA 1 Final v5.0 Exam Answers 2015 100% WWW.CCNA-v5.Net
o It manages the data transport between the processes running on each host.
o In the encapsulation process, it adds source and destination port numbers to the IP
header.
o When a packet arrives at the destination host, its IP header is checked by the
network layer to determine where the packet has to be routed.
o Its protocols specify the packet structure and processing used to carry the data from
one host to another.
10. Why does HTTP use TCP as the transport layer protocol?
o to ensure the fastest possible download speed
o because HTTP is a best-effort protocol
o because transmission errors can be tolerated easily
o because HTTP requires reliable delivery
CCNA 5 Page 34
CCNA 1 Final v5.0 Exam Answers 2015 100% WWW.CCNA-v5.Net
o 11010101
o 11001010
o 11011010
12. What is the valid most compressed format possible of the IPv6 address
2001:0DB8:0000:AB00:0000:0000:0000:1234?
o 2001:DB8:0:AB00::1234
o 2001:DB8:0:AB::1234
o 2001:DB8::AB00::1234
o 2001:DB8:0:AB:0:1234
13. Refer to the exhibit. What is the maximum TTL value that is used to reach the
destination www.cisco.com?
o 11
o 12
o 13
o 14
14. What field content is used by ICMPv6 to determine that a packet has expired?
o TTL field
o CRC field
o Hop Limit field
o Time Exceeded field
CCNA 5 Page 35
CCNA 1 Final v5.0 Exam Answers 2015 100% WWW.CCNA-v5.Net
16. Which firewall technique blocks incoming packets unless they are responses
to internal requests?
o port filtering
o stateful packet inspection
o URL filtering
o application filtering
19. A network engineer is measuring the transfer of bits across the company
backbone for a mission critical database application. The engineer notices that
the network throughput appears lower than the bandwidth expected. Which
three factors could influence the differences in throughput? (Choose three.)
o the amount of traffic that is currently crossing the network
o the sophistication of the encapsulation method applied to the data
o the type of traffic that is crossing the network
o the latency that is created by the number of network devices that the data is crossing
o the bandwidth of the WAN connection to the Internet
o the reliability of the gigabit Ethernet infrastructure of the backbone
20. What is a possible hazard that can be caused by network cables in a fire?
o The cable insulation could be flammable.
o Users could be exposed to excessive voltage.
o Network cables could be exposed to water.
o The network cable could explode.
CCNA 5 Page 36
CCNA 1 Final v5.0 Exam Answers 2015 100% WWW.CCNA-v5.Net
o an ohmmeter
23. Refer to the exhibit. A ping to PC2 is issued from PC0, PC1, and PC3 in this
exact order. Which MAC addresses will be contained in the S1 MAC address
table that is associated with the Fa0/1 port?
25. What does a router use to determine where to send data it receives from the
network?
o an ARP table
o a routing table
o the destination PC physical address
o a switching table
CCNA 5 Page 37
CCNA 1 Final v5.0 Exam Answers 2015 100% WWW.CCNA-v5.Net
26. Which router interface should be used for direct remote access to the router
via a modem?
o an inband router interface
o a console port
o a serial WAN interface
o an AUX port
28. Which three statements characterize the transport layer protocols? (Choose
three.)
o TCP and UDP port numbers are used by application layer protocols.
o TCP uses port numbers to provide reliable transportation of IP packets.
o UDP uses windowing and acknowledgments for reliable transfer of data.
o TCP uses windowing and sequencing to provide reliable transfer of data.
o TCP is a connection-oriented protocol. UDP is a connectionless protocol.
29. Refer to the exhibit. A TCP segment from a server has been captured by
Wireshark, which is running on a host. What acknowledgement number will
the host return for the TCP segment that has been received?
CCNA 5 Page 38
CCNA 1 Final v5.0 Exam Answers 2015 100% WWW.CCNA-v5.Net
o 2
o 21
o 250
o 306
o 2921
30. Which statement is true about an interface that is configured with the IPv6
address command?
o IPv6 traffic-forwarding is enabled on the interface.
o A link-local IPv6 address is automatically configured on the interface.
o A global unicast IPv6 address is dynamically configured on the interface.
o Any IPv4 addresses that are assigned to the interface are replaced with an IPv6
address.
31. Refer to the exhibit. The network administrator for a small advertising
company has chosen to use the 192.168.5.96/27 network for internal LAN
addressing. As shown in the exhibit, a static IP address is assigned to the
company web server. However, the web server cannot access the Internet. The
administrator verifies that local workstations with IP addresses that are
assigned by a DHCP server can access the Internet, and the web server is able
to ping local workstations. Which component is incorrectly configured?
o subnet mask
o DNS address
o host IP address
CCNA 5 Page 39
CCNA 1 Final v5.0 Exam Answers 2015 100% WWW.CCNA-v5.Net
32. Refer to the exhibit. An administrator must send a message to everyone on the
router A network. What is the broadcast address for network 172.16.16.0/22?
o 172.16.16.255
o 172.16.20.255
o 172.16.19.255
o 172.16.23.255
o 172.16.255.255
CCNA 5 Page 40
CCNA 1 Final v5.0 Exam Answers 2015 100% WWW.CCNA-v5.Net
o 10.1.1.128/26
10.1.1.140/26
10.1.1.158/28
34. How many additional bits should be borrowed from a /26 subnet mask in order
to create subnets for WAN links that need only 2 useable addresses?
o 2
o 3
o 4
o 5
o 6
36. Refer to the exhibit. The administrator configured the access to the console
and the vty lines of a router. Which conclusion can be drawn from this
configuration?
CCNA 5 Page 41
CCNA 1 Final v5.0 Exam Answers 2015 100% WWW.CCNA-v5.Net
o Unauthorized individuals can connect to the router via Telnet without entering a
password.
o Because the IOS includes the login command on the vty lines by default, access to
the device via Telnet will require authentication.
o Access to the vty lines will not be allowed via Telnet by anyone.
o Because the login command was omitted, the password cisco command is not
applied to the vty lines.
40. What are two examples of the cut-through switching method? (Choose two.)
o store-and-forward switching
o fast-forward switching
o CRC switching
o fragment-free switching
o QOS switching
CCNA 5 Page 42
CCNA 1 Final v5.0 Exam Answers 2015 100% WWW.CCNA-v5.Net
42. Why does a Layer 3 device perform the ANDing process on a destination IP
address and subnet mask?
o to identify the broadcast address of the destination network
o to identify the host address of the destination host
o to identify faulty frames
o to identify the network address of the destination network
43. Given the binary address of 11101100 00010001 00001100 00001010, which
address does this represent in dotted decimal format?
o 234.17.10.9
o 234.16.12.10
o 236.17.12.6
o 236.17.12.10
CCNA 5 Page 43
CCNA 1 Final v5.0 Exam Answers 2015 100% WWW.CCNA-v5.Net
11
12
13*
14
The DHCPDISCOVER message contains the IP address and sub net masK to be
assigned, the IP address of the DNS server, and the IP address of the default
gateway.
If the client receives several DHCPOFFER messages from different servers, it sends
a unicast DHCPREOUEST message to the server from which it chooses to obtain
the IP information.
CCNA 5 Page 44
CCNA 1 Final v5.0 Exam Answers 2015 100% WWW.CCNA-v5.Net
letmein
secretin
lineconin*
linevtyin
52. How many bits would need to be borrowed if a network admin were given
the IP addressing scheme of 172.16.0.0/16 and needed no more than 16 subnet
with equal number of hosts?
10
12
CCNA 5 Page 45
CCNA 1 Final v5.0 Exam Answers 2015 100% WWW.CCNA-v5.Net
2
4*
8
54.
55. Which statement best describes the operation of the File Transfer
Protocol?
CCNA 5 Page 46
CCNA 1 Final v5.0 Exam Answers 2015 100% WWW.CCNA-v5.Net
57. Why does layer 3 device perform the ANDing process on a destination IP
and subnet Mask?
to identify host address and destination host;
to identify network address of destination host;*
to identify faulty frames;
to identify broadcast address of destination network;
58. There was also a question about if you activated service password
encryption in the past and you prompt no service password encryption what
password are modified ?
no password at all;*
password of the lines are in clear;
login password;
?
CCNA 5 Page 47
CCNA 1 Final v5.0 Exam Answers 2015 100% WWW.CCNA-v5.Net
64. How could a faulty network device create a source of hazard for a user?
(Choose two.)
It could stop functioning.*
It could apply dangerous voltage to other pieces of equipment.
It could explode.*
It could produce an unsafe electromagnetic field.
It could apply dangerous voltage to itself.
65. What are three important considerations when planning the structure of an
IP addressing scheme? (Choose three.)
preventing duplication of addresses*
providing and controlling access*
documenting the network
monitoring security and performance
conserving addresses*
implementing new services
66. What is the metric value that is used to reach the 10.1.1.0 network in the
following routing table entry?
D 10.1.1.0/24 [90/2170112] via 209.165.200.226, 00:00:05, Serial0/0/0
CCNA 5 Page 48
CCNA 1 Final v5.0 Exam Answers 2015 100% WWW.CCNA-v5.Net
24
90
05
2170112*
67. Which two services or protocols use the preferred UDP protocol for fast
transmission and low overhead? (Choose two)
VoIP*
DNS*
HTTP
FTP
POP3
68. What action does a DHCPv4 client take if it receives more than one
DHCPOFFER from multiple DHCP servers?
It sends a DHCPREQUEST that identifies which lease offer the client is
accepting.*
It sends a DHCPNAK and begins the DHCP process over again.
It discards both offers and sends a new DHCPDISCOVER.
It accepts both DHCPOFFER messages and sends a DHCPACK.
69. To what legacy address class does the address 10.0.0.0 belong?
Class B
Class D
Class A*
Class C
Class E
71. Which method of IPv6 prefix assignment relies on the prefix contained in
RA messages?
EUI-64
static
SLAAC*
stateful DHCPv6
CCNA 5 Page 49
CCNA 1 Final v5.0 Exam Answers 2015 100% WWW.CCNA-v5.Net
DNS servers are programmed to drop requests for name translations that are not
within their zone.
All DNS servers must maintain mappings for the entire DNS structure.
2001:DB8:BC15:A*
2001:DB8:BC15:A:1
2001:DB8:BC15:A:12
74. What are two services provided by the OSI network layer? (Choose two.)
collision detection
CCNA 5 Page 50