1. CCNA Practice Quiz
1 Imagine that you have configured the enable secret command, followed by the enable
password command, from the console. You log out of the switch and log back in at the
console. Which command defines the password that you had to enter to access privileged
mode?
a. enable password
b. enable secret
c. Neither
d. The password command, if it’s configured
ANS
2 Which of the following protocols are examples of TCP/IP transport layer protocols? (Choose
two answers.)
a. Ethernet
b. HTTP
c. IP
d. UDP
e. SMTP
f. TCP
ANS
3 The process of a web server adding a TCP header to the contents of a web page, followed by
adding an IP header and then adding a data link header and trailer is an example of what?
a. Data encapsulation
b. Same-layer interaction
c. OSI model
d. All of these answers are correct.
ANS
4 Which of the following is true about the CSMA/CD algorithm?
a. The algorithm never allows collisions to occur.
b. Collisions can happen, but the algorithm defines how the computers should notice a
collision and how to recover.
c. The algorithm works with only two devices on the same Ethernet.
d. None of the other answers is correct.
ANS
5 Which of the following best describes the main function of OSI Layer 1 as used in WANs?
a. Framing
b. Delivery of bits from one device to another
c. Addressing
d. Error detection
6 Which of the following are functions of OSI Layer 3 protocols? (Choose two answers.)
a. Logical addressing
b. Physical addressing
c. Path selection
2. d. Arbitration
e. Error recovery
ANS
7 Which of the following does a router normally use when making a decision about routing
TCP/IP packets?
a. Destination MAC address
b. Source MAC address
c. Destination IP address
d. Source IP address
e. Destination MAC and IP address
ANS
8 Which of the following is not a feature of a protocol that is considered to match OSI Layer 4?
a. Error recovery
b. Flow control
c. Segmenting of application data
d. Conversion from binary to ASCII
ANS
9 When comparing VoIP with an HTTP-based mission-critical business application, which of the
following statements are accurate about the quality of service needed from the network?
(Choose two answers.)
a. VoIP needs better (lower) packet loss.
b. HTTP needs less bandwidth.
c. HTTP needs better (lower) jitter.
d. VoIP needs better (lower) delay.
ANS
10 Which of the following Ethernet standards support a maximum cable length of longer than
100 meters? (Choose two answers.)
a. 100BASE-T
b. 1000BASE-LX
c. 1000BASE-T
d. 100BASE-FX
ANS
11 A Cisco LAN switch connects to three PCs (PC1, PC2, and PC3), each directly using a cable
that supports Ethernet UTP speeds up through 1000 Mbps (1 Gbps). PC1 uses a NIC that
supports only 10BASE-T, while PC2 has a 10/100 NIC, and PC3 has a 10/100/1000 NIC.
Assuming that the PCs and switch use IEEE autonegotiation, which PCs will use halfduplex?
a. PC1
b. PC2
c. PC3
d. None of the PCs will use half-duplex.
ANS
12 Which of the following statements describes part of the process of how a switch decides to
forward a frame destined for a known unicast MAC address?
a. It compares the unicast destination address to the bridging, or MAC address, table.
3. b. It compares the unicast source address to the bridging, or MAC address, table.
c. It forwards the frame out all interfaces in the same VLAN except for the incoming interface.
d. It compares the destination IP address to the destination MAC address.
e. It compares the frame’s incoming interface to the source MAC entry in the MAC address
table.
ANS
13 Which of the following statements describes part of the process of how a LAN switch decides
to forward a frame destined for a broadcast MAC address?
a. It compares the unicast destination address to the bridging, or MAC address, table.
b. It compares the unicast source address to the bridging, or MAC address, table.
c. It forwards the frame out all interfaces in the same VLAN except for the incoming interface.
d. It compares the destination IP address to the destination MAC address.
e. It compares the frame’s incoming interface to the source MAC entry in the MAC address
table.
ANS
14 In what modes can you execute the command show mac address-table? (Choose two
answers.)
a. User mode
b. Enable mode
c. Global configuration mode
d. Interface configuration mode
ANS
15 What command copies the configuration from RAM into NVRAM?
a. copy running-config tftp
b. copy tftp running-config
c. copy running-config startup-config
d. copy startup-config running-config
e. copy startup-config running-config
f. copy running-config startup-config
ANS
16 In which of the following modes of the CLI could you issue the command reload to reboot the
switch?
a. User mode
b. Enable mode
c. Global configuration mode
d. Interface configuration mode
ANS
17 What type of switch memory is used to store the configuration used by the switch when it is
up and working?
a. RAM
b. ROM
c. Flash
d. NVRAM
e. Bubble
4. ANS
18 A switch user is currently in console line configuration mode. Which of the following would
place the user in enable mode? (Choose two answers.)
a. Using the exit command once
b. Using the end command once
c. Pressing the Ctrl-Z key sequence once
d. Using the quit command
ANS
19 In which of the following modes of the CLI could you configure the duplex setting for
interface Fast Ethernet 0/5?
a. User mode
b. Enable mode
c. Global configuration mode
d. VLAN mode
e. Interface configuration mode
ANS
20 In a LAN, which of the following terms best equates to the term VLAN?
a. Collision domain
b. Broadcast domain
c. Subnet
d. Single switch
e. Trunk
ANS
21 For an 802.1Q trunk between two Ethernet switches, which answer most accurately defines
which frames do not include an 802.1Q header?
a. Frames in the native VLAN (only one)
b. Frames in extended VLANs
c. Frames in VLAN 1 (not configurable)
d. Frames in all native VLANs (multiple allowed)
ANS
22 Which of the following commands identify switch interfaces as being trunking interfaces:
interfaces that currently operate as VLAN trunks? (Choose two answers.)
a. show interfaces
b. show interfaces switchport
c. show interfaces trunk
d. show trunks
ANS
23 Imagine that a switch connects through an Ethernet cable to a router, and the router’s host
name is Hannah. Which of the following commands could tell you information about the IOS
version on Hannah without establishing a Telnet connection to Hannah? (Choose two
answers.)
a. show neighbors Hannah
b. show cdp
c. show cdp neighbors
5. d. show cdp neighbors Hannah
e. show cdp neighbors detail
ANS
24 On a Cisco Catalyst switch, you issue a show mac address-table command. Which of the
following answers list information you would likely see in most lines of output? (Choose two
answers.)
a. A MAC address
b. An IP address
c. A VLAN ID
d. Type (broadcast, multicast, or unicast)
ANS
25 The following line of output was taken from a show interfaces fa0/1 command:
Full-duplex, 100Mbps, media type is 10/100BaseTX
Which of the following are true about the interface? (Choose two answers.)
a. The speed was definitely configured with the speed 100 interface subcommand.
b. The speed might have been configured with the speed 100 interface subcommand.
c. The duplex was definitely configured with the duplex full interface subcommand.
d. The duplex might have been configured with the duplex full interface subcommand.
ANS
26 Which of the following are public IP networks? (Select three answers.)
a. 9.0.0.0
b. 172.30.0.0
c. 192.168.255.0
d. 192.1.168.0
e. 1.0.0.0
ANS
27 Before Class B network 172.16.0.0 is subnetted by a network engineer, what parts of the
structure of the IP addresses in this network already exist, with a specific size? (Select two
answers.)
a. Network
b. Subnet
c. Host
d. Broadcast
ANS
28 Which of the following are private IP networks? (Select two answers.)
a. 172.31.0.0
b. 172.32.0.0
c. 192.168.255.0
d. 192.1.168.0
e. 11.0.0.0
ANS
29 Why does the formula for the number of hosts per subnet (2H
– 2) require the subtraction of
two hosts?
a. To reserve two addresses for redundant default gateways (routers)
6. b. To reserve the two addresses required for DHCP operation
c. To reserve addresses for the subnet ID and default gateway (router)
d. To reserve addresses for the subnet broadcast address and subnet ID
ANS
30 Which of the following is a network broadcast address?
a. 10.1.255.255
b. 192.168.255.1
c. 224.1.1.255
d. 172.30.255.255
ANS
31 Which of the following are true about IP address 172.16.99.45’s IP network? (Select two
answers.)
a. The network ID is 172.0.0.0.
b. The network is a Class B network.
c. The default mask for the network is 255.255.255.0.
d. The number of host bits in the unsubnetted network is 16.
ANS
32 Which of the following answers lists the prefix (CIDR) format equivalent of 255.255.254.0?
a. /19
b. /20
c. /23
d. /24
e. /25
ANS
33 Which of the following answers lists the dotted-decimal notation (DDN) equivalent of /24?
a. 255.255.240.0
b. 255.255.252.0
c. 255.255.255.0
d. 255.255.255.192
e. 255.255.255.240
ANS
34 Working at the help desk, you receive a call and learn a user’s PC IP address and mask
(10.55.66.77, mask 255.255.255.0). When thinking about this using classful logic, you
determine the number of network (N), subnet (S), and host (H) bits. Which of the following is
true in this case?
a. N=12
b. S=12
c. H=8
d. S=8
e. N=24
ANS
35 Which of the following is the resident subnet for IP address 192.168.44.97/30?
a. 192.168.44.0
b. 192.168.44.64
7. c. 192.168.44.96
d. 192.168.44.128
ANS
36 Which of the following is the resident subnet ID for IP address 10.7.99.133/24?
a. 10.0.0.0
b. 10.7.0.0
c. 10.7.99.0
d. 10.7.99.128
ANS
37 A PC opens a command prompt and uses the ipconfig command to see that the PC’s IP
address and mask are 192.168.4.77 and 255.255.255.224. The user then runs a test using
the ping 192.168.4.117 command. Which of the following answers is the most likely to happen?
a. The PC sends packets directly to the host with address 192.168.4.117.
b. The PC sends packets to its default gateway.
c. The PC sends a DNS query for 192.168.4.117.
d. The PC sends an ARP looking for the MAC address of the DHCP server.
ANS
38 Which of the following routing protocols are considered to use link-state logic? (Choose two
answers.)
a. RIP-1
b. RIP-2
c. EIGRP
d. OSPF
e. Integrated IS-IS
ANS D and E
39 Which of the following routing protocols use a metric that is, by default, at least partially
affected by link bandwidth? (Choose two answers.)
a. RIP-1
b. RIP-2
c. EIGRP
d. OSPF
ANS
40 OSPF runs an algorithm to calculate the currently best route. Which of the following terms
refer to that algorithm? (Choose two answers.)
a. SPF
b. DUAL
c. Feasible successor
d. Dijkstra
e. Good old common sense
ANS
41 A PC connects to a LAN and uses DHCP to lease an IP address for the first time. Of the usual
four DHCP messages that flow between the PC and the DHCP server, which ones do the client
send? (Choose 2 answers.)
a. Acknowledgment
8. b. Discover
c. Offer
d. Request
ANS
42 PC1 uses manual (static) IPv4 configuration associated with its Ethernet NIC. Which of the
following IPv4 settings will the PC list in the IPv4 configuration? (Choose 2 answers.)
a. A DHCP server address
b. A DNS server address
c. A traceroute server address
d. The PC’s own IP address
ANS
43 The PC2 user issues the tracert 10.1.1.10 command. Which of the following IP addresses could
be shown in the command output? (Choose three answers.)
a. 10.1.1.10
b. 10.1.1.1
c. 10.1.13.1
d. 10.1.13.2
e. 172.16.2.4
ANS
44 Which of the following summarized subnets is the smallest (smallest range of addresses)
summary route that includes subnets 10.3.95.0, 10.3.96.0, and 10.3.97.0, mask
255.255.255.0?
a. 10.0.0.0 255.0.0.0
b. 10.3.0.0 255.255.0.0
c. 10.3.64.0 255.255.192.0
d. 10.3.64.0 255.255.224.0
ANS
45 Which of the following wildcard masks is most useful for matching all IP packets in subnet
10.1.128.0, mask 255.255.255.0?
a. 0.0.0.0
b. 0.0.0.31
c. 0.0.0.240
d. 0.0.0.255
e. 0.0.15.0
f. 0.0.248.255
ANS
46 Which of the following wildcard masks is most useful for matching all IP packets in subnet
9. 10.1.128.0, mask 255.255.240.0?
a. 0.0.0.0
b. 0.0.0.31
c. 0.0.0.240
d. 0.0.0.255
e. 0.0.15.255
f. 0.0.248.255
ANS
47 Which of the following fields cannot be compared based on an extended IP ACL? (Choose two
answers.)
a. Protocol
b. Source IP address
c. Destination IP address
d. URL
e. Filename for FTP transfers
ANS
48 Which of the following access-list commands permit packets going from host 10.1.1.1 to all
web servers whose IP addresses begin with 172.16.5? (Choose two answers.)
a. access-list 101 permit tcp host 10.1.1.1 172.16.5.0 0.0.0.255 eq www
b. access-list 1951 permit ip host 10.1.1.1 172.16.5.0 0.0.0.255 eq www
c. access-list 2523 permit ip host 10.1.1.1 eq www 172.16.5.0 0.0.0.255
d. access-list 2523 permit tcp host 10.1.1.1 eq www 172.16.5.0 0.0.0.255
ANS
49 Which of the following distance vector features prevents routing loops by advertising an
infinite metric route when a route fails?
a. Dijkstra SPF
b. DUAL
c. Split horizon
d. Route poisoning
ANS
50 Which of the following affect the calculation of EIGRP metrics when all possible default values
are used? (Choose two answers.)
a. Bandwidth
b. Delay
c. Load
d. Reliability
e. MTU
f. Hop count
ANS
51 In the show ip route command, what code designation implies that a route was learned with
EIGRP?
a. E
b. I
c. G
10. d. D
ANS
52 Two routers have no initial configuration whatsoever. They are connected in a lab using a
DTE cable connected to R1 and a DCE cable connected to R2, with the DTE and DCE cables
then connected to each other. The engineer wants to create a working PPP link by configuring
both routers. Which of the following commands are required in the R1 configuration for the
link to reach a state in which R1 can ping R2’s serial IP address, assuming that the physical
backto-
back link physically works? (Choose two answers.)
a. encapsulation ppp
b. no encapsulation hdlc
c. clock rate
d. ip address
ANS
53 Consider the following excerpt from the output of a show command:
Serial0/0/1 is up, line protocol is up
Hardware is GT96K Serial
Internet address is 192.168.2.1/24
MTU 1500 bytes, BW 1544 Kbit, DLY 20000 usec,
reliability 255/255, txload 1/255, rxload 1/255
Encapsulation PPP, LCP Open
Open: CDPCP, IPCP, loopback not set
Which of the following are true about this router’s S0/0/1 interface? (Choose two answers.)
a. The interface is using HDLC.
b. The interface is using PPP.
c. The interface currently cannot pass IPv4 traffic.
d. The link should be able to pass PPP frames at the present time.
ANS
54 Which of the following is a protocol used between the Frame Relay DTE and the Frame Relay
switch?
a. VC
b. CIR
c. LMI
d. Q.921
e. DLCI
ANS
55 What does DLCI stand for?
a. Data link connection identifier
b. Data link connection indicator
c. Data link circuit identifier
d. Data link circuit indicator
ANS
11. 56 Which of the following private WAN services operates primarily as a Layer 3 service,
delivering IP packets between two customer sites?
a. Leased line
b. MPLS
c. Ethernet WAN
d. Frame Relay
ANS
57 What of these steps happens first during the router boot process?
a. The router locates the configuration file.
b. The POST.
c. The router locates the Cisco IOS image.
d. The router initiates the bootstrap code from ROM.
ANS
58 After your Cisco router boots, what is a simple way to verify the Cisco IOS image that was
loaded and the location from which it was copied into RAM?
a. show running-config
b. show boot
c. show cisco ios
d. show version
ANS
59 What is the first step a typical Cisco router takes, during the boot process, when attempting
to locate an operating system to load?
a. The router looks for an image on a TFTP server.
b. The router checks its configuration register boot field.
c. The router boots to ROMMON.
d. The router looks in flash memory for an Cisco IOS image file.
ANS
60 You have forgotten your privileged mode password and cannot access global configuration
mode. During the password recovery process, how can you change the configuration register
if you cannot remember enough passwords to get into configuration mode of the router?
a. Using ROMMON mode
b. Using the Setup Utility
c. Using the GUI for configuring the device
d. Using password reset mode
ANS
61 You find that one of the serial interfaces on your router is not forwarding traffic. You have
given "show ip interfaces" command. In the response, you observed the following entries
against that interface:
Serial 0 is up, line protocol is down. What is the likely problem?
a.There is a problem at physical layer
b.There is a problem exchanging the routing information
c.The link was administratively down
d.There is a problem with the route both at physical and protocol layers
12. ANS
62 Two sub layers of OSI Data Link layer are which of the following?
A.Logical Link Control, Data Link Control
B.Media Access Control, Physical Layer Control
C.Logical Link Control, Media Access Control
D.Data Link Control, Physical Layer Control
ANS
63 Match the following:
A. Repeaters 1. Data Link Layer
B. Bridges 2. Network Layer
C. Routers 3. Physical Layer
a. A --->2, B--->3, C--->1
b. A--->3, B---->1, C---->2
c. A--->3, B----->2, C---->1
d. A---->1, B---->2, C---->3
ANS
64 Which of the following is true of a Switch?
a. Switches forward packets based on IP address.
b. Switches forward packets based on MAC address.
c. Switches forward packets based on IPX address.
d. Switches forward packets based on Layer3 protocol.
ANS
65 What two results would occur if the hub were to be replaced with a switch that is configured
with one Ethernet VLAN? (Choose two.)
A. The number of collision domains would remain the same.
B. The number of collision domains would decrease.
C. The number of collision domains would increase.
D. The number of broadcast domains would remain the same.
E. The number of broadcast domains would decrease.
F. The number of broadcast domains would increase.
ANS
66 Based on the information given, which switch will be elected root bridge and why?
13. A. Switch A, because it has the lowest MAC address
B. Switch A, because it is the most centrally located switch
C. Switch B, because it has the highest MAC address
D. Switch C, because it is the most centrally located switch
E. Switch C, because it has the lowest priority
F. Switch D, because it has the highest priority
ANS
67 Which of the following statements describe the network shown in the graphic? (Choose two.)
A. There are two broadcast domains in the network.
B. There are four broadcast domains in the network.
C. There are six broadcast domains in the network.
D. There are four collision domains in the network.
E. There are five collision domains in the network.
F. There are seven collision domains in the network.
ANS
68 VLAN 3 is not yet configured on your switch. What happens if you set the switchport access
vlan 3 command in interface configuration mode?
A. The command is rejected.
B. The port turns amber.
C. The command is accepted and the respective VLAN is added to vlan.dat.
D. The command is accepted and you must configure the VLAN manually.
ANS
69 In a switched environment, what does the IEEE 802.1Q standard describe?
A. the operation of VTP
B. a method of VLAN trunking
C. an approach to wireless LAN communication
D. the process for root bridge selection
E. VLAN pruning
14. ANS
70 What is the function of the command switchport trunk native vlan 999 on a Cisco Catalyst
switch?
A. It creates a VLAN 999 interface.
B. It designates VLAN 999 for untagged traffic.
C. It blocks VLAN 999 traffic from passing on the trunk.
D. It designates VLAN 999 as the default for all unknown tagged traffic.
ANS
71 Which two protocols are used by bridges and/or switches to prevent loops in a layer 2
network?
(Choose two.)
A. 802.1d
B. VTP
C. 802.1q
D. STP
E. SAP
ANS
72 Which switch would STP choose to become the root bridge in the selection process?
A. 32768: 11-22-33-44-55-66
B. 32768: 22-33-44-55-66-77
C. 32769: 11-22-33-44-55-65
D. 32769: 22-33-44-55-66-78
ANS
73 A switch is configured with all ports assigned to VLAN 2 with full duplex FastEthernet to
segment existing departmental traffic. What is the effect of adding switch ports to a new VLAN
on the switch?
A. More collision domains will be created.
B. IP address utilization will be more efficient.
C. More bandwidth will be required than was needed previously.
D. An additional broadcast domain will be created.
ANS
74 Which two link protocols are used to carry multiple VLANs over a single link? (Choose two.)
A. VTP
B. 802.1q
C. IGP
D. ISL
E. 802.3u
ANS
75 Assuming the default switch configuration, which VLAN range can be added, modified, and
removed on a Cisco switch?Assuming the default switch configuration, which VLAN range can
be added, modified, and removed on a Cisco switch?
A. 1 through 1001
B. 2 through 1001
C. 1 through 1002
D. 2 through 1005
ANS
76 The technician wants to upload a new IOS in the router while keeping the existing IOS. What is
15. the maximum size of an IOS file that could be loaded if the original IOS is also kept in flash?
A. 3 MB
B. 4 MB
C. 5 MB
D. 7 MB
E. 8 MB
ANS
77 Which parameter would you tune to affect the selection of a static route as a backup, when a
dynamic protocol is also being used?
A. hop count
B. administrative distance
C. link bandwidth
D. link delay
E. link cost
ANS
78 A static route to the 10.5.6.0/24 network is to be configured on the HFD router. Which
commands will accomplish this? (Choose two.)
A. HFD(config)# ip route 10.5.6.0 0.0.0.255 fa0/0
B. HFD(config)# ip route 10.5.6.0 0.0.0.255 10.5.4.6
C. HFD(config)# ip route 10.5.6.0 255.255.255.0 fa0/0
D. HFD(config)# ip route 10.5.6.0 255.255.255.0 10.5.4.6
E. HFD(config)# ip route 10.5.4.6 0.0.0.255 10.5.6.0
F. HFD(config)# ip route 10.5.4.6 255.255.255.0 10.5.6.0
ANS
79 What is the default administrative distance of OSPF?
A. 90
B. 100
C. 110
D. 120
ANS
80 Which command would you configure globally on a Cisco router that would allow you to view
directly connected Cisco devices?
16. A. enable cdp
B. cdp enable
C. cdp run
D. run cdp
ANS
81 On which options are standard access lists based?
A. destination address and wildcard mask
B. destination address and subnet mask
C. source address and subnet mask
D. source address and wildcard mask
ANS
82 What is the default routing update period for RIPv2?
A. 15 seconds
B. 30 Seconds
C. 180 Seconds
D. 240 Seconds
ANS
83 What are two characteristics of RIPv2? (Choose two)
A. classful routing protocol
B. variable-length subnet masks
C. broadcast addressing
D. manual route summarization
E. uses SPF algorithm to compute path
ANS
84 Refer to the exhibit. Which (config-router) command will allow the network represented on the
interface to be advertised by RIP?
router rip
version 2
no auto summary
!
interface ethernet0
ip address 10.12.6.1 255.255.0.0
A. redistribute ethernet0
B. network ethernet0
C. redistribute 10.12.0.0
D. network 10.12.0.0
ANS
85 Refer to the exhibit. After a RIP route is marked invalid on Router_1, how much time will elapse
before that route is removed from the routing table?
Router_1# show ip protocols
Routing Protocol is “rip”
Sending updates every 30 seconds, next due in 8 seconds
Invalid after 180 seconds, hold down 180, flushed after 240
Outgoing update filter list foe all interfaces is not set
Incoming update filter list for all interfaces is not set
Router 1#
17. A. 30 seconds
B. 60 seconds
C. 90 seconds
D. 180 seconds
E. 240 seconds
ANS
86 What two things will a router do when running a distance vector routing protocol? (Choose
two)
A. Send periodic updates regardless of topology changes.
B. Send entire routing table to all routers in the routing domain.
C. Use the shortest-path algorithm to the determine best path.
D. Update the routing table based on updates from their neighbors.
E. Maintain the topology of the entire network in its database.
ANS
87 Which two protocols are used by bridges and/or switches to prevent loops in a layer 2
network? (Choose two)
A. 802.1d
B. VTP
C. 802.1q
D. STP
E. SAP
ANS
88 Which of the following are benefits of VLANs? (Choose three)
A. They increase the size of collision domains.
B. They allow logical grouping of users by function.
C. They can enhance network security.
D. They increase the size of broadcast domains while decreasing the number of collision
domains.
E. They increase the number of broadcast domains while decreasing the size of the broadcast
domains.
F. They simplify switch administration.
ANS
89 On which options are standard access lists based?
A. destination address and wildcard mask
B. destination address and subnet mask
C. source address and subnet mask
D. source address and wildcard mask
ANS
90 Which item represents the standard IP ACL?
A. access-list 50 deny 192.168.1.1 0.0.0.255
B. access-list 110 permit ip any any
C. access-list 2500 deny tcp any host 192.168.1.1 eq 22
D. access-list 101 deny tcp any host 192.168.1.1
ANS
91 Which type of cable is used to connect the COM port of a host to the COM port of a router or
switch?
18. A. crossover
B. straight-through
C. rolled
D. shielded twisted-pair
ANS
92 Which type of connection should a straight-through cable be used for?
A. switch to switch
B. switch to hub
C. switch to router
D. hub to hub
E. router to PC
ANS
93 What is the first 24 bits in a MAC address called?
A. NIC
B. BIA
C. OUI
D. VAI
ANS
94 When a host transmits data across a network to another host, which process does the data go
through?
A. standardization
B. conversion
C. encapsulation
D. synchronization
ANS
95 Which pairing reflects a correct protocol-and-metric relationship?
A. EIGRP and link cost
B. OSPF and number of hops and reliability
C. RIPv2 and number of hops
D. IS-IS and delay and reliability
ANS
96 What is the effect of using the service password-encryption command?
A. Only the enable password will be encrypted.
B. It will encrypt all current and future passwords.
C. It will encrypt the secret password and remove the enable secret password from the
configuration.
D. Only the enable secret password will be encrypted.
E. Only passwords configured after the command has been entered will be encrypted.
ANS
97 The enable secret command is used to secure access to which CLI mode?
A. global configuration mode
B. privileged EXEC mode
C. user EXEC mode
D. auxiliary setup mode
ANS
98 Assuming default setting, how can you erase the VTP database of VLANs on a CISCO IOS switch
running in VTP server mode?
19. A. Enable VTP pruning
B. From privileged mode .erase the startup configuration file .then reload
C. From privileged mode .erase the vlan date file, then reload.
D. Cycle the switch power.
ANS