Skip to content
  • Home
  • CCNA Labs
    • CCNA 1 LAB Activities (v6 & v7)
    • CCNA 2 LAB Activities (v6 & v7)
    • CCNA 3 LAB Activities (v6 & v7)
    • CCNA 4 Lab Activities
  • Linux
    • Linux Unhatched
    • Linux Essentials 2.0
    • Linux Essentials
    • Introduction to Linux I
    • Introduction to Linux II
  • Programming
    • PCAP – Programming Essentials in Python
    • CLA – Programming Essentials in C
    • CPA Programming Essentials in C++
  • About
    • Contact Us
    • Privacy Policy

CCNA 7 Exam Answers 2023

Go with our CCIE, Passed 100%

  • ITE
    • ITE - IT Essentials v7.0
    • ITE - IT Essentials v6.0
      • IT Essentials Lab 2019
    • ITE v5.0 Exam
    • Virtual Activity Laptop
    • Virtual Activity Desktop
  • NE
    • MF
  • CCNA
    • CCNA1
      • CCNA1 v7.0 – ITN
      • CCNA1 v6.0
    • CCNA2
      • CCNA2 v7.0 – SRWE
      • CCNA2 v6.0
    • CCNA3
      • CCNA3 v7.0 – ENSA
      • CCNA3 v6.0
    • CCNA4
      • CCNA4 v6.0
  • Cyber-Security
    • ITC – Introduction to Cybersecurity 2.1 (Level 1)
    • CE – Cybersecurity Essentials 1.1 (Level 2)
    • CCNA CyberOps 1.1 (Level 3)
  • Security
    • CCNA Security v2
  • DevNet
  • CCNA PT Lab 2023

Networking Essentials Final Exam Online Full 100% 2019

Last Updated on May 20, 2021 by Admin

Networking Essentials Final Exam Online Full 100% 2019

NE -- Final Exam

Time limit: 0

Quiz-summary

0 of 35 questions completed

Questions:

  1. 1
  2. 2
  3. 3
  4. 4
  5. 5
  6. 6
  7. 7
  8. 8
  9. 9
  10. 10
  11. 11
  12. 12
  13. 13
  14. 14
  15. 15
  16. 16
  17. 17
  18. 18
  19. 19
  20. 20
  21. 21
  22. 22
  23. 23
  24. 24
  25. 25
  26. 26
  27. 27
  28. 28
  29. 29
  30. 30
  31. 31
  32. 32
  33. 33
  34. 34
  35. 35

Information

NE — Final Exam

You have already completed the quiz before. Hence you can not start it again.

Quiz is loading...

You must sign in or sign up to start the quiz.

You have to finish following quiz, to start this quiz:

Results

0 of 35 questions answered correctly

Your time:

Time has elapsed

You have reached 0 of 0 points, (0)

Average score
 
 
Your score
 
 

Categories

  1. Not categorized 0%
  1. 1
  2. 2
  3. 3
  4. 4
  5. 5
  6. 6
  7. 7
  8. 8
  9. 9
  10. 10
  11. 11
  12. 12
  13. 13
  14. 14
  15. 15
  16. 16
  17. 17
  18. 18
  19. 19
  20. 20
  21. 21
  22. 22
  23. 23
  24. 24
  25. 25
  26. 26
  27. 27
  28. 28
  29. 29
  30. 30
  31. 31
  32. 32
  33. 33
  34. 34
  35. 35
  1. Answered
  2. Review
  1. Question 1 of 35
    1. Question
    1 points
    What is a disadvantage of deploying a peer-to-peer network model?
    Correct

    Incorrect

    The simplest peer-to-peer network consists of two computers that are directly connected to each other through the use of a wired or wireless connection. The primary disadvantages of a peer-to-peer network are its lack of central administration, minimal security, and its lack of scalability.

    Hint
    The simplest peer-to-peer network consists of two computers that are directly connected to each other through the use of a wired or wireless connection. The primary disadvantages of a peer-to-peer network are its lack of central administration, minimal security, and its lack of scalability.
  2. Question 2 of 35
    2. Question
    1 points
    What is a purpose of an IP address?
    Correct

    Incorrect

    Packets that are routed across the Internet contain source and destination IP addresses. These addresses are used to determine how the packets should be routed from source to destination by intermediate devices.

    Hint
    Packets that are routed across the Internet contain source and destination IP addresses. These addresses are used to determine how the packets should be routed from source to destination by intermediate devices.
  3. Question 3 of 35
    3. Question
    1 points
    A consumer places a smartphone close to a pay terminal at a store and the shopping charge is successfully paid. Which type of wireless technology was used?
    Correct

    Incorrect

    NFC is a wireless technology that allows data to be exchanged between devices that are in very close proximity to each other.

    Hint
    NFC is a wireless technology that allows data to be exchanged between devices that are in very close proximity to each other.
  4. Question 4 of 35
    4. Question
    1 points
    Which type of network cable is commonly used to connect office computers to the local network?
    Correct

    Incorrect

    Twisted-pair is a type of copper cable used to interconnect devices on a local network.

    Hint
    Twisted-pair is a type of copper cable used to interconnect devices on a local network.
  5. Question 5 of 35
    5. Question
    2 points
    What are two advantages of using fiber-optic cabling to interconnect devices? (Choose two.)
    Correct

    Incorrect

    Fiber-optic cables provide immunity to both EMI and RFI and a single cable can extend for several miles before regeneration is needed.

    Hint
    Fiber-optic cables provide immunity to both EMI and RFI and a single cable can extend for several miles before regeneration is needed.
  6. Question 6 of 35
    6. Question
    2 points
    The functions of which two layers of the OSI model are matched to the network access layer of the TCP/IP model? (Choose two.)
    Correct

    Incorrect

    The application layer of the TCP/IP model is composed of the application, presentation, and session layers of the OSI model and is used by network applications to complete specific tasks. The network access layer of the TCP/IP model is composed of the physical and data link layers of the OSI model and describes how a device accesses and sends data over the network media.

    Hint
    The application layer of the TCP/IP model is composed of the application, presentation, and session layers of the OSI model and is used by network applications to complete specific tasks. The network access layer of the TCP/IP model is composed of the physical and data link layers of the OSI model and describes how a device accesses and sends data over the network media.
  7. Question 7 of 35
    7. Question
    1 points
    What is the minimum size of a valid Ethernet frame?
    Correct

    Incorrect

    Ethernet standards define a frame with a minimum of 64 bytes and a maximum of 1518 bytes including fields of destination MAC address, source MAC, Length/Type, data payload, and FCS.

    Hint
    Ethernet standards define a frame with a minimum of 64 bytes and a maximum of 1518 bytes including fields of destination MAC address, source MAC, Length/Type, data payload, and FCS.
  8. Question 8 of 35
    8. Question
    1 points
    A network design engineer has been asked to design the IP addressing scheme for a customer network. The network will use IP addresses from the 192.168.30.0/24 network. The engineer allocates 254 IP addresses for the hosts on the network but excludes 192.168.30.0/24 and 192.168.30.255/24 IP addresses. Why must the engineer exclude these two IP addresses?
    Correct

    Incorrect

    The IPv4 addressing system is a hierarchical addressing system. An IPv4 address is made up of two parts, the network address and the host address. When the host portion is all “0s” in binary, it is designated as a network address. When the host portion is all “1s” in binary, it is designated as a broadcast address. These two addresses cannot be assigned to individual hosts.

    Hint
    The IPv4 addressing system is a hierarchical addressing system. An IPv4 address is made up of two parts, the network address and the host address. When the host portion is all “0s” in binary, it is designated as a network address. When the host portion is all “1s” in binary, it is designated as a broadcast address. These two addresses cannot be assigned to individual hosts.
  9. Question 9 of 35
    9. Question
    1 points
    Which protocol is used to automatically assign IP addresses to hosts?
    Correct

    Incorrect

    DHCP, or Dynamic Host Configuration Protocol, is used to automatically assign IP addresses to hosts that are configured as DHCP clients.​

    Hint
    DHCP, or Dynamic Host Configuration Protocol, is used to automatically assign IP addresses to hosts that are configured as DHCP clients.​
  10. Question 10 of 35
    10. Question
    3 points
    What are three advantages of using private IP addresses and NAT? (Choose three.)
    Correct

    Incorrect

    Private IP addresses are designed to be exclusively used for internal networks and they cannot be used on the Internet. Thus they are not visible directly from the Internet and they can be used freely by network administrators for internal networks. In order for the internal hosts to access the Internet, NAT is used to translate between private and public IP addresses. NAT takes an internal private IP address and translates it to a global public IP address before the packet is forwarded.

    Hint
    Private IP addresses are designed to be exclusively used for internal networks and they cannot be used on the Internet. Thus they are not visible directly from the Internet and they can be used freely by network administrators for internal networks. In order for the internal hosts to access the Internet, NAT is used to translate between private and public IP addresses. NAT takes an internal private IP address and translates it to a global public IP address before the packet is forwarded.
  11. Question 11 of 35
    11. Question
    1 points
    What was the reason for the creation and implementation of IPv6?
    Correct

    Incorrect

    IPv4 addressing space is exhausted by the rapid growth of the Internet and the devices connected to the Internet. IPv6 expands the IP addressing space by increasing the address length from the 32 bits to 128 bits, which should provide sufficient addresses for future Internet growth needs for many years to come.

    Hint
    IPv4 addressing space is exhausted by the rapid growth of the Internet and the devices connected to the Internet. IPv6 expands the IP addressing space by increasing the address length from the 32 bits to 128 bits, which should provide sufficient addresses for future Internet growth needs for many years to come.
  12. Question 12 of 35
    12. Question
    3 points
    Which three pieces of information are identified by a URL? (Choose three.)
    Correct

    Incorrect

    URLs are used to access specific content on a web server through a web browser. The URL identifies the protocol that is being used such as HTTP or FTP, the domain of the server, and the location of the resource on the server.

    Hint
    URLs are used to access specific content on a web server through a web browser. The URL identifies the protocol that is being used such as HTTP or FTP, the domain of the server, and the location of the resource on the server.
  13. Question 13 of 35
    13. Question
    1 points
    Which protocol is used by web servers to serve up a web page?
    Correct

    Incorrect

    Hypertext Transfer Protocol (HTTP) is a protocol that is used by web servers to serve up a web page.​

    Hint
    Hypertext Transfer Protocol (HTTP) is a protocol that is used by web servers to serve up a web page.​
  14. Question 14 of 35
    14. Question
    1 points
    Why do streaming audio and video applications use UDP instead of TCP?
    Correct

    Incorrect

    UDP is a ‘best effort’ delivery system that does not require acknowledgment of receipt and is the preferred transport service for streaming audio and video. UDP provides low overhead and does not implement as much delay as TCP. Streaming audio and video cannot tolerate network traffic congestion and long delays.

    Hint
    UDP is a ‘best effort’ delivery system that does not require acknowledgment of receipt and is the preferred transport service for streaming audio and video. UDP provides low overhead and does not implement as much delay as TCP. Streaming audio and video cannot tolerate network traffic congestion and long delays.
  15. Question 15 of 35
    15. Question
    1 points
    At which layer of the TCP/IP model does TCP operate?
    Correct

    Incorrect

    TCP is the Transmission Control Protocol and it operates at the transport layer of the TCP/IP model. TCP ensures that IP packets are delivered reliably.

    Hint

    TCP is the Transmission Control Protocol and it operates at the transport layer of the TCP/IP model. TCP ensures that IP packets are delivered reliably.

  16. Question 16 of 35
    16. Question
    1 points
    Which protocol is used to transfer web pages from a server to a client device?
    Correct

    Incorrect

    The Hypertext Transfer Protocol (HTTP) provides services between a web browser requesting web pages and a web server responding to the requests. HTML (Hypertext Markup Language) is a markup language to instruct a web browser how to interpret and display a web page.

    Hint
    The Hypertext Transfer Protocol (HTTP) provides services between a web browser requesting web pages and a web server responding to the requests. HTML (Hypertext Markup Language) is a markup language to instruct a web browser how to interpret and display a web page.
  17. Question 17 of 35
    17. Question
    1 points
    Which type of device filtering can be enabled on some wireless access points or wireless routers?
    Correct

    Incorrect

    On wireless access points, MAC addresses can be manually entered to filter which devices are allowed on the wireless network.

    Hint
    On wireless access points, MAC addresses can be manually entered to filter which devices are allowed on the wireless network.
  18. Question 18 of 35
    18. Question
    1 points

    Which technology is used to uniquely identify a WLAN network?

    Correct

    Incorrect

    When a wireless AP or router is being set up, an SSID is configured to uniquely identify the WLAN that is managed by the device.

    Hint
    When a wireless AP or router is being set up, an SSID is configured to uniquely identify the WLAN that is managed by the device.
  19. Question 19 of 35
    19. Question
    1 points
    What type of Internet connection would be best for a residence in a remote area without mobile phone coverage or wired connectivity?
    Correct

    Incorrect

    Satellite Internet service provides the best option for a home user that would otherwise have no Internet connectivity at all. Cellular Internet is only available in areas with mobile phone coverage.

    Hint
    Satellite Internet service provides the best option for a home user that would otherwise have no Internet connectivity at all. Cellular Internet is only available in areas with mobile phone coverage.
  20. Question 20 of 35
    20. Question
    1 points
    Which advanced wireless security measure allows a network administrator to keep sensitive data secure as it travels over the air in a wireless network?
    Correct

    Incorrect

    Encryption is used to secure plaintext data that would be viewable traveling over a wireless network.

    Hint
    Encryption is used to secure plaintext data that would be viewable traveling over a wireless network.
  21. Question 21 of 35
    21. Question
    3 points
    Which three steps must be completed to manually connect an Android or IOS device to a secured wireless network? (Choose three.)
    Correct

    Incorrect

    In order to connect an Android or IOS device to a Wi-Fi network manually, perform these steps:

    • Enter the network SSID of the wireless network.
    • Choose the security type used by the wireless network.
    • Input the password to authenticate successfully.
    Hint

    In order to connect an Android or IOS device to a Wi-Fi network manually, perform these steps:

    • Enter the network SSID of the wireless network.
    • Choose the security type used by the wireless network.
    • Input the password to authenticate successfully.
  22. Question 22 of 35
    22. Question
    3 points

    Which three attacks exploit human behavior? (Choose three.)

    Correct

    Incorrect

    Attacks aimed at exploiting human behavior such as pretexting, phishing, and vishing are commonly used by hackers to obtain information directly from authorized users.​​

    Hint
    Attacks aimed at exploiting human behavior such as pretexting, phishing, and vishing are commonly used by hackers to obtain information directly from authorized users.​​
  23. Question 23 of 35
    23. Question
    1 points
    Which address prefix range is reserved for IPv4 multicast?
    Correct

    Incorrect

    Multicast IPv4 addresses use the reserved class D address range of 224.0.0.0 to 239.255.255.255.

    Hint
    Multicast IPv4 addresses use the reserved class D address range of 224.0.0.0 to 239.255.255.255.
  24. Question 24 of 35
    24. Question
    1 points
    An intruder tries a large number of possibilities in rapid succession to guess a password. As a result, other users on the network are locked out. What type of attack has occurred?
    Correct

    Incorrect

    In a brute force attack, an unauthorized person will try to gain access to a system by sending as many passwords as possible as rapidly as possible.

    Hint
    In a brute force attack, an unauthorized person will try to gain access to a system by sending as many passwords as possible as rapidly as possible.
  25. Question 25 of 35
    25. Question
    1 points
    What type of DoS attack originates from a malicious host that has an invalid source IP address and that requests a client connection?​
    Correct

    Incorrect

    SYN flooding is a type of denial of services attack where the attacker sends fake session requests to a target host in an attempt to prevent the host from responding to legitimate session requests.​

    Hint
    SYN flooding is a type of denial of services attack where the attacker sends fake session requests to a target host in an attempt to prevent the host from responding to legitimate session requests.​
  26. Question 26 of 35
    26. Question
    2 points
    Which two ports can be used for the initial configuration of a Cisco router? (Choose two.)
    Correct

    Incorrect

    The AUX and console ports on a Cisco 1941 router can be used to perform initial setup. The initial setup does not require that the router be connected to a network. A network administrator uses a computer to connect to the console ports directly. A network administrator can also access the router remotely through a dialup phone line and a modem connected to the AUX port. LAN and WAN interfaces are used to connect to networks. The flash slots expand storage capability through the use of a compact flash card.

    Hint
    The AUX and console ports on a Cisco 1941 router can be used to perform initial setup. The initial setup does not require that the router be connected to a network. A network administrator uses a computer to connect to the console ports directly. A network administrator can also access the router remotely through a dialup phone line and a modem connected to the AUX port. LAN and WAN interfaces are used to connect to networks. The flash slots expand storage capability through the use of a compact flash card.
  27. Question 27 of 35
    27. Question
    1 points
    When is an IP address required to be configured on a Cisco LAN switch?
    Correct

    Incorrect

    A LAN switch uses Layer 2 addresses to determine how to forward packets. An IP address is only necessary if the switch needs to be remotely managed through an in-band connection on the network.

    Hint
    A LAN switch uses Layer 2 addresses to determine how to forward packets. An IP address is only necessary if the switch needs to be remotely managed through an in-band connection on the network.
  28. Question 28 of 35
    28. Question
    1 points
    What advantage does SSH offer over Telnet?
    Correct

    Incorrect

    Both Telnet and SSH are used to remotely connect to a network device for management tasks. However, Telnet uses plaintext communications, whereas SSH provides security for remote connections by providing encryption of all transmitted data between devices.

    Hint
    Both Telnet and SSH are used to remotely connect to a network device for management tasks. However, Telnet uses plaintext communications, whereas SSH provides security for remote connections by providing encryption of all transmitted data between devices.
  29. Question 29 of 35
    29. Question
    1 points

    Refer to the exhibit. A network technician is statically assigning an IP address to a PC. The default gateway is correct. What would be a valid IP address to assign to the host?

    Networking Essentials Final Exam Answers 01
    Networking Essentials Final Exam Answers 01

    Correct

    Incorrect

    In data communication, the default gateway device is involved only when a host needs to communicate with other hosts on another network. The default gateway address identifies a network device used by hosts to communicate with devices on remote networks. The IP address of the host and the default gateway address must be in the same network. With the default subnet mask, valid host IP addresses range from 128.107.0.1 to 128.107.255.254.

    Hint
    In data communication, the default gateway device is involved only when a host needs to communicate with other hosts on another network. The default gateway address identifies a network device used by hosts to communicate with devices on remote networks. The IP address of the host and the default gateway address must be in the same network. With the default subnet mask, valid host IP addresses range from 128.107.0.1 to 128.107.255.254.
  30. Question 30 of 35
    30. Question
    3 points
    Which three items should be documented after troubleshooting an internal web server crash? (Choose three.)
    Correct

    Incorrect

    Proper documentation is a very important step in troubleshooting. The proper documentation can help troubleshoot the same or similar problems in the future. The documentation should include as much information as possible about the following:

    • the problem encountered
    • steps taken to determine the cause of the problem
    • steps to correct the problem and ensure that it will not reoccur
    Hint

    Proper documentation is a very important step in troubleshooting. The proper documentation can help troubleshoot the same or similar problems in the future. The documentation should include as much information as possible about the following:

    • the problem encountered
    • steps taken to determine the cause of the problem
    • steps to correct the problem and ensure that it will not reoccur
  31. Question 31 of 35
    31. Question
    1 points
    Which step should be taken next once a problem is resolved during a troubleshooting process?
    Correct

    Incorrect

    Proper documentation can help troubleshoot the same or similar problems in the future. Proper documentation should include the type of error encountered, the steps taken to determine the cause of the problem, and the steps taken to correct the problem.

    Hint
    Proper documentation can help troubleshoot the same or similar problems in the future. Proper documentation should include the type of error encountered, the steps taken to determine the cause of the problem, and the steps taken to correct the problem.
  32. Question 32 of 35
    32. Question
    3 points
    Which three pieces of information are revealed by the ipconfig command (without the /all switch)? (Choose three.)
    Correct

    Incorrect

    The ipconfig command is used to display the current TCP/IP network configuration values of the device. This includes the IP address; the subnet mask and the default gateway addresses. Using the ipconfig /all switch displays additional information like the physical address of the device and the DHCP server address among other things.

    Hint
    The ipconfig command is used to display the current TCP/IP network configuration values of the device. This includes the IP address; the subnet mask and the default gateway addresses. Using the ipconfig /all switch displays additional information like the physical address of the device and the DHCP server address among other things.
  33. Question 33 of 35
    33. Question
    1 points

    Fill in the blank.
    A …………………is a computer that is infected with malicious software and instructed to join a botnet.​

    Correct

    Incorrect

    Zombies are computer systems that are infected with bot software which, once activated, instructs infected machines to function as a botnet.​

    Hint
    Zombies are computer systems that are infected with bot software which, once activated, instructs infected machines to function as a botnet.​
  34. Question 34 of 35
    34. Question
    4 points

    Match the router prompt to the configuration task.

    Sort elements
    • RouterA(config-line)#
    • RouterA(config-if)#
    • RouterA#
    • RouterA(config)#
    • configure vty lines
      • configure a WAN interface
        • enter configuration mode
          • add a password required to access the privileged EXEC mode
            Correct

            Incorrect

          • Question 35 of 35
            35. Question
            5 points

            Match the command to the function.

            Sort elements
            • ipconfig
            • netstat
            • ping
            • tracert
            • nslookup
            • displays IP settings on host
              • displays network connections
                • tests end-to-end connectivity between hosts
                  • displays the route that is taken to the destination
                    • asks the name server for information on the destination domain
                      Correct

                      Incorrect

                    • CCNA1 v7
                    • CCNA2 v7
                    • CCNA3 v7
                    System Test Exam Answers
                    Modules 1 – 3 Exam Answers
                    Modules 4 – 7 Exam Answers
                    Modules 8 – 10 Exam Answers
                    Modules 11 – 13 Exam Answers
                    Modules 14 – 15 Exam Answers
                    Modules 16 – 17 Exam Answers
                    Practice Final – ITN Answers
                    Course Feedback
                    ITN Practice PT Skills Assessment (PTSA)
                    Final Exam Answers
                    Modules 1 – 4 Exam Answers
                    Modules 5 – 6 Exam Answers
                    Modules 7 – 9 Exam Answers
                    Modules 10 – 13 Exam Answers
                    Modules 14 – 16 Exam Answers
                    ITN Practice Skills Assessment – PT Answers
                    SRWE Practice Skills Assessment – PT Part 1 Answers
                    SRWE Practice Skills Assessment – PT Part 2 Answers
                    SRWE Hands On Skills Exam Answers
                    SRWE Practice Final Exam Answers
                    SRWE Final Exam Answers 
                    Modules 1 – 2 Exam Answers
                    Modules 3 – 5 Exam Answers
                    Modules 6 – 8 Exam Answers
                    Modules 9 – 12 Exam Answers
                    Modules 13 – 14 Exam Answers
                    ITN Practice PT Skills Assessment (PTSA) Answers
                    SRWE Practice PT Skills Assessment (PTSA) – Part 1 Answers
                    SRWE Practice PT Skills Assessment (PTSA) – Part 2 Answers
                    ENSA Practice PT Skills Assessment (PTSA) Answers
                    ENSA Hands On Skills Exam Answers
                    Practice Final – ENSA Answers
                    ENSA Final Exam Answers
                    CCNA Certification Practice Exam Answers

                    Copyright © 2023 PressExam.