CCNA 1 Pretest (v5.1 + v6.0) Exam Answers 2020 – 100% Full

How to find: Press “Ctrl + F” in the browser and fill in whatever wording is in the question to find that question/answer. If the question is not here, find it in Questions Bank.

NOTE: If you have the new question on this test, please comment Question and Multiple-Choice list in form below this article. We will update answers for you in the shortest time. Thank you! We truly value your contribution to the website.

1. Convert the decimal number 231 into its binary equivalent. Select the correct answer from the list below.

  • 11110010
  • 11011011
  • 11110110
  • 11100111
  • 11100101
  • 11101110

2. Convert the binary number 10111010 into its hexadecimal equivalent. Select the correct answer from the list below.

  • 85
  • 90
  • BA
  • A1
  • B3
  • 1C

3. The failure rate in a certain brand of network interface card has been determined to be 15%. How many cards could be expected to fail in a company that has 80 of the cards installed?

  • 8
  • 10
  • 12
  • 15

4. A local real estate company can have its 25 computer systems upgraded for $1000. If the company chooses only to upgrade 10 systems, how much will the upgrade cost if the same rate is used?

  • $100
  • $200
  • $400
  • $500
  • $600

5. Considering the average capacity of storage device media, drag the storage media on the left to the capacity list on the right.

6. Which two devices provide permanent data storage? (Choose two.)

  • Blu-Ray disc
  • hard drive
  • keyboard
  • monitor
  • RAM

7. If a technician uses an average of 2 cans of compressed air per week for cleaning, how many cans should be ordered for 8 technicians over the next 10 weeks?

  • 16
  • 20
  • 80
  • 160
  • 200

8. What is a function of the BIOS?

  • enables a computer to connect to a network
  • provides temporary data storage for the CPU
  • performs a power-on self test of internal components
  • provides graphic capabilities for games and applications

9. Match the form of network communication with its description. (Not all options are used.)
Question and Answer:

10. Refer to the exhibit. Match the port to the associated letter shown in the exhibit. (Not all options are used.)


11. Which is a characteristic of the Internet?

  • It is not centrally governed.
  • It uses only physical addresses.
  • It uses private IP addressing.
  • It is localized to specific geographic locations.

Explanation: The Internet is a global system of interconnected computer networks that has no central governance. It is not limited to geographic boundaries and uses static public IP addresses for communication.

12. Match the icon to its likely associated use. (Not all options are used.)

13. Which command can be used to test connectivity between two computers that are attached to a network?

  • ipconfig
  • ping
  • winipcfg
  • ifconfig
  • nbtstst -s

14. A person-hour is the amount of work that the average worker can do in one hour. It is anticipated that a company-wide system upgrade will take approximately 60 person-hours to complete. How long will it take five technicians to perform the refresh?

  • 5 hours
  • 8 hours
  • 10 hours
  • 12 hours

15. Match the application with the correct compressed files format. (Not all options are used.)
Match the application with the correct compressed files formatAnswer:

16. Which type of connector does a network interface card use?

  • DIN
  • PS-2
  • RJ-11
  • RJ-45

17. A user is having problems accessing the Internet. The command ping fails. However, pinging the IP address of with the command ping is successful. What is the problem?

  • The web server is down.
  • The default gateway is incorrect.
  • There is a problem with DNS.
  • The address of the ARP cache is incorrect.

18. Which option shows the proper notation for an IPv6 address?

  • 2001,0db8,3c55,0015,abcd,ff13
  • 2001-0db8-3c55-0015-abcd-ff13
  • 2001.0db8.3c55.0015.abcd.ff13
  • 2001:0db8:3c55:0015::abcd:ff13

19. What is the purpose of the routing process?

  • to encapsulate data that is used to communicate across a network
  • to select the paths that are used to direct traffic to destination networks
  • to convert a URL name into an IP address
  • to provide secure Internet file transfer
  • to forward traffic on the basis of MAC addresses

20. Which device should be used for enabling a host to communicate with another host on a different network?

  • switch
  • hub
  • router
  • host

21. A home user is looking for an ISP connection that provides high speed digital transmission over regular phone lines. What ISP connection type should be used?

  • DSL
  • dial-up
  • satellite
  • cell modem
  • cable modem

Explanation: DSL is the best technology to use over existing phone lines. A lot of ISPs have a lookup on their website where you can enter your phone number and see if they can offer you service.

22. A company is expanding its business to other countries. All branch offices must remain connected to corporate headquarters at all times. Which network technology is required to support this requirement?

  • LAN
  • MAN
  • WAN
  • WLAN

Explanation: A WAN connects multiple LANs that are in geographically separated locations. A MAN connects multiple LANs in a large campus or in a city. WLAN is a wireless LAN that covers a rather small geographic area.

23. Why would a network administrator use the tracert utility?

  • to determine the active TCP connections on a PC
  • to check information about a DNS name in the DNS server
  • to identify where a packet was lost or delayed on a network
  • to display the IP address, default gateway, and DNS server address for a PC

24. Which basic process is used to select the best path for forwarding data?

  • routing
  • switching
  • addressing
  • encapsulation

25. Which wireless security procedure should be used to hide the WLAN ID from wireless clients?

  • Configure WEP only on the access point.
  • Install WAP on the wireless clients.
  • Configure MAC address filtering on the access point.
  • Disable the broadcast of the SSID on the access point.
  • Decrease the antenna spectrum on each wireless client.

26. What is the purpose of having a converged network?

  • to provide high speed connectivity to all end devices
  • to make sure that all types of data packets will be treated equally
  • to achieve fault tolerance and high availability of data network infrastructure devices
  • to reduce the cost of deploying and maintaining the communication infrastructure

27. Refer to the exhibit. Consider the IP address configuration shown from PC1. What is a description of the default gateway address?

  • It is the IP address of the Router1 interface that connects the company to the Internet.
  • It is the IP address of the Router1 interface that connects the PC1 LAN to Router1.
  • It is the IP address of Switch1 that connects PC1 to other devices on the same LAN.
  • It is the IP address of the ISP network device located in the cloud.

Explanation: The default gateway is used to route packets destined for remote networks. The default gateway IP address is the address of the first Layer 3 device (the router interface) that connects to the same network.

28. Which technology provides a solution to IPv4 address depletion by allowing multiple devices to share one public IP address?

  • ARP
  • DNS
  • NAT
  • SMB
  • DHCP
  • HTTP

Explanation: Network Address Translation (NAT) is a technology implemented within IPv4 networks. One application of NAT is to use a few public IP addresses to be shared by many internal network hosts which use private IP addresses. NAT removes the need for public addresses for every internal host. It therefore provides a solution to slow down the IPv4 address depletion.

29. Which subnet would include the address as a usable host address?


30. A technician uses the ping command. What is the technician testing?

  • the TCP/IP stack on a network host
  • connectivity between two adjacent Cisco devices
  • connectivity between a PC and the default gateway
  • connectivity between two PCs on the same network
  • physical connectivity of a particular PC and the network

31. Which function is provided by TCP?

  • data encapsulation
  • detection of missing packets
  • communication session control
  • path determination for data packets

32. What is the purpose of ICMP messages?

  • to inform routers about network topology changes
  • to ensure the delivery of an IP packet
  • to provide feedback of IP packet transmissions
  • to monitor the process of a domain name to IP address resolution

33. What statement describes the function of the Address Resolution Protocol?

  • ARP is used to discover the IP address of any host on a different network.
  • ARP is used to discover the IP address of any host on the local network.
  • ARP is used to discover the MAC address of any host on a different network.
  • ARP is used to discover the MAC address of any host on the local network.

Explanation: When a PC wants to send data on the network, it always knows the IP address of the destination. However, it also needs to discover the MAC address of the destination. ARP is the protocol that is used to discover the MAC address of a host that belongs to the same network.

34. What is the general term that is used to describe a piece of data at any layer of a networking model?

  • frame
  • packet
  • protocol data unit
  • segment

35. Which three IP addresses are private ? (Choose three.)


36. How does a networked server manage requests from multiple clients for different services?

  • The server sends all requests through a default gateway.
  • Each request is assigned source and destination port numbers.
  • The server uses IP addresses to identify different services.
  • Each request is tracked through the physical address of the client.

37. Which protocol translates a website name such as into a network address?

  • HTTP
  • FTP
  • DHCP
  • DNS

Explanation: Domain Name Service translates names into numerical addresses, and associates the two. DHCP provides IP addresses dynamically to pools of devices. HTTP delivers web pages to users. FTP manages file transfers.

38. What is an advantage of using IPv6 ?

  • more addresses for networks and hosts
  • faster connectivity
  • higher bandwidth
  • more frequencies

Explanation: An IPv6 address is comprised of 128 bits as opposed to 32 bits in an IPv4 address. Thus it offers far more addresses for networks and hosts than an IPv4 address does.

39. Refer to the exhibit. Using the network in the exhibit, what would be the default gateway address for host A in the network?


40. Refer to the exhibit. Host_A is preparing to send data to Server_B. How will Host_A address the packets and frames that will carry this data? (Choose two.)

  • The packet destination will be addressed with the IP address of the Router_B interface that is attached to Router_A.
  • The frame destination will be addressed with the MAC address of Switch_A.
  • The packet destination will be addressed with the IP address of the Router_A LAN interface.
  • The frame destination will be addressed with the MAC address of the Router_A LAN interface.
  • The packet destination will be addressed with the IP address of Server_B.
  • The frame destination will be addressed with the MAC address of Server_B..

41. A network technician is attempting to configure an interface by entering the following command: SanJose(config)# ip address The command is rejected by the device. What is the reason for this?

  • The command is being entered from the wrong mode of operation.
  • The command syntax is wrong.
  • The subnet mask information is incorrect.
  • The interface is shutdown and must be enabled before the switch will accept the IP address.

42. What protocol is responsible for controlling the size of segments and the rate at which segments are exchanged between a web client and a web server?

  • TCP
  • IP
  • HTTP
  • Ethernet

43. A network administrator is troubleshooting connectivity issues on a server. Using a tester, the administrator notices that the signals generated by the server NIC are distorted and not usable. In which layer of the OSI model is the error categorized?

  • presentation layer
  • network layer
  • physical layer
  • data link layer

44. Which statement is true about variable-length subnet masking?

  • Each subnet is the same size.
  • The size of each subnet may be different, depending on requirements.
  • Subnets may only be subnetted one additional time.
  • Bits are returned, rather than borrowed, to create additional subnets.

45. A wireless host needs to request an IP address. What protocol would be used to process the request?

  • FTP
  • HTTP
  • DHCP
  • ICMP
  • SNMP

46. What will a host on an Ethernet network do if it receives a frame with a destination MAC address that does not match its own MAC address?

  • It will discard the frame.
  • It will forward the frame to the next host.
  • It will remove the frame from the media.
  • It will strip off the data-link frame to check the destination IP address.

47. Which connection provides a secure CLI session with encryption to a Cisco switch?

  • a console connection
  • an AUX connection
  • a Telnet connection
  • an SSH connection

Explanation: A CLI session using Secure Shell (SSH) provides enhanced security because SSH supports strong passwords and encryption during the transport of session data. The other methods support authentication but not encryption.

48. What are the three ranges of IP addresses that are reserved for internal private use? (Choose three.)


49. Refer to the exhibit. Match the packets with their destination IP address to the exiting interfaces on the router. (Not all targets are used.)



Notify of

Inline Feedbacks
View all comments
2 months ago

What id the application layar service being requested tron server0 by PC0?

4 months ago

it would be better if the answer is hidden and only appears when we hoover by mouse on the correct answer.

5 months ago

Helpful site

Thokozani Solomoni Markey
Thokozani Solomoni Markey
7 months ago


8 months ago

Which statement is correct about network protocols?

Andrzej Duda to się uda
Andrzej Duda to się uda
1 year ago

Zajebiście kurwa ten

3 years ago

I need module 4to7 online test

3 years ago

i am new to CCNA, can anybody explain the Question no. 27 and 39

3 years ago


Abdur Rauf
Abdur Rauf
4 years ago

Thanks this so help me to pass my exam… THANKS!!!

4 years ago

It is very much interesting topic.

4 years ago

Many many thanks for sharing this knowledge
I hope it will help me to pass for my exam.

5 years ago

Hey, is their anything like this one on the Network + Cert course out there?

ulfat noreen
ulfat noreen
5 years ago

Which type of connector does a network interface card use?

6 years ago

fantastic topic

mohamed Hashi
mohamed Hashi
6 years ago

it is very interesting topic

7 years ago

This is CCNA1 pretest (look the link)