SlideShare uma empresa Scribd logo
1 de 19
CCNA Practice Quiz
1 Imagine that you have configured the enable secret command, followed by the enable
password command, from the console. You log out of the switch and log back in at the
console. Which command defines the password that you had to enter to access privileged
mode?
a. enable password
b. enable secret
c. Neither
d. The password command, if it’s configured
ANS
2 Which of the following protocols are examples of TCP/IP transport layer protocols? (Choose
two answers.)
a. Ethernet
b. HTTP
c. IP
d. UDP
e. SMTP
f. TCP
ANS
3 The process of a web server adding a TCP header to the contents of a web page, followed by
adding an IP header and then adding a data link header and trailer is an example of what?
a. Data encapsulation
b. Same-layer interaction
c. OSI model
d. All of these answers are correct.
ANS
4 Which of the following is true about the CSMA/CD algorithm?
a. The algorithm never allows collisions to occur.
b. Collisions can happen, but the algorithm defines how the computers should notice a
collision and how to recover.
c. The algorithm works with only two devices on the same Ethernet.
d. None of the other answers is correct.
ANS
5 Which of the following best describes the main function of OSI Layer 1 as used in WANs?
a. Framing
b. Delivery of bits from one device to another
c. Addressing
d. Error detection
6 Which of the following are functions of OSI Layer 3 protocols? (Choose two answers.)
a. Logical addressing
b. Physical addressing
c. Path selection
d. Arbitration
e. Error recovery
ANS
7 Which of the following does a router normally use when making a decision about routing
TCP/IP packets?
a. Destination MAC address
b. Source MAC address
c. Destination IP address
d. Source IP address
e. Destination MAC and IP address
ANS
8 Which of the following is not a feature of a protocol that is considered to match OSI Layer 4?
a. Error recovery
b. Flow control
c. Segmenting of application data
d. Conversion from binary to ASCII
ANS
9 When comparing VoIP with an HTTP-based mission-critical business application, which of the
following statements are accurate about the quality of service needed from the network?
(Choose two answers.)
a. VoIP needs better (lower) packet loss.
b. HTTP needs less bandwidth.
c. HTTP needs better (lower) jitter.
d. VoIP needs better (lower) delay.
ANS
10 Which of the following Ethernet standards support a maximum cable length of longer than
100 meters? (Choose two answers.)
a. 100BASE-T
b. 1000BASE-LX
c. 1000BASE-T
d. 100BASE-FX
ANS
11 A Cisco LAN switch connects to three PCs (PC1, PC2, and PC3), each directly using a cable
that supports Ethernet UTP speeds up through 1000 Mbps (1 Gbps). PC1 uses a NIC that
supports only 10BASE-T, while PC2 has a 10/100 NIC, and PC3 has a 10/100/1000 NIC.
Assuming that the PCs and switch use IEEE autonegotiation, which PCs will use halfduplex?
a. PC1
b. PC2
c. PC3
d. None of the PCs will use half-duplex.
ANS
12 Which of the following statements describes part of the process of how a switch decides to
forward a frame destined for a known unicast MAC address?
a. It compares the unicast destination address to the bridging, or MAC address, table.
b. It compares the unicast source address to the bridging, or MAC address, table.
c. It forwards the frame out all interfaces in the same VLAN except for the incoming interface.
d. It compares the destination IP address to the destination MAC address.
e. It compares the frame’s incoming interface to the source MAC entry in the MAC address
table.
ANS
13 Which of the following statements describes part of the process of how a LAN switch decides
to forward a frame destined for a broadcast MAC address?
a. It compares the unicast destination address to the bridging, or MAC address, table.
b. It compares the unicast source address to the bridging, or MAC address, table.
c. It forwards the frame out all interfaces in the same VLAN except for the incoming interface.
d. It compares the destination IP address to the destination MAC address.
e. It compares the frame’s incoming interface to the source MAC entry in the MAC address
table.
ANS
14 In what modes can you execute the command show mac address-table? (Choose two
answers.)
a. User mode
b. Enable mode
c. Global configuration mode
d. Interface configuration mode
ANS
15 What command copies the configuration from RAM into NVRAM?
a. copy running-config tftp
b. copy tftp running-config
c. copy running-config startup-config
d. copy startup-config running-config
e. copy startup-config running-config
f. copy running-config startup-config
ANS
16 In which of the following modes of the CLI could you issue the command reload to reboot the
switch?
a. User mode
b. Enable mode
c. Global configuration mode
d. Interface configuration mode
ANS
17 What type of switch memory is used to store the configuration used by the switch when it is
up and working?
a. RAM
b. ROM
c. Flash
d. NVRAM
e. Bubble
ANS
18 A switch user is currently in console line configuration mode. Which of the following would
place the user in enable mode? (Choose two answers.)
a. Using the exit command once
b. Using the end command once
c. Pressing the Ctrl-Z key sequence once
d. Using the quit command
ANS
19 In which of the following modes of the CLI could you configure the duplex setting for
interface Fast Ethernet 0/5?
a. User mode
b. Enable mode
c. Global configuration mode
d. VLAN mode
e. Interface configuration mode
ANS
20 In a LAN, which of the following terms best equates to the term VLAN?
a. Collision domain
b. Broadcast domain
c. Subnet
d. Single switch
e. Trunk
ANS
21 For an 802.1Q trunk between two Ethernet switches, which answer most accurately defines
which frames do not include an 802.1Q header?
a. Frames in the native VLAN (only one)
b. Frames in extended VLANs
c. Frames in VLAN 1 (not configurable)
d. Frames in all native VLANs (multiple allowed)
ANS
22 Which of the following commands identify switch interfaces as being trunking interfaces:
interfaces that currently operate as VLAN trunks? (Choose two answers.)
a. show interfaces
b. show interfaces switchport
c. show interfaces trunk
d. show trunks
ANS
23 Imagine that a switch connects through an Ethernet cable to a router, and the router’s host
name is Hannah. Which of the following commands could tell you information about the IOS
version on Hannah without establishing a Telnet connection to Hannah? (Choose two
answers.)
a. show neighbors Hannah
b. show cdp
c. show cdp neighbors
d. show cdp neighbors Hannah
e. show cdp neighbors detail
ANS
24 On a Cisco Catalyst switch, you issue a show mac address-table command. Which of the
following answers list information you would likely see in most lines of output? (Choose two
answers.)
a. A MAC address
b. An IP address
c. A VLAN ID
d. Type (broadcast, multicast, or unicast)
ANS
25 The following line of output was taken from a show interfaces fa0/1 command:
Full-duplex, 100Mbps, media type is 10/100BaseTX
Which of the following are true about the interface? (Choose two answers.)
a. The speed was definitely configured with the speed 100 interface subcommand.
b. The speed might have been configured with the speed 100 interface subcommand.
c. The duplex was definitely configured with the duplex full interface subcommand.
d. The duplex might have been configured with the duplex full interface subcommand.
ANS
26 Which of the following are public IP networks? (Select three answers.)
a. 9.0.0.0
b. 172.30.0.0
c. 192.168.255.0
d. 192.1.168.0
e. 1.0.0.0
ANS
27 Before Class B network 172.16.0.0 is subnetted by a network engineer, what parts of the
structure of the IP addresses in this network already exist, with a specific size? (Select two
answers.)
a. Network
b. Subnet
c. Host
d. Broadcast
ANS
28 Which of the following are private IP networks? (Select two answers.)
a. 172.31.0.0
b. 172.32.0.0
c. 192.168.255.0
d. 192.1.168.0
e. 11.0.0.0
ANS
29 Why does the formula for the number of hosts per subnet (2H
– 2) require the subtraction of
two hosts?
a. To reserve two addresses for redundant default gateways (routers)
b. To reserve the two addresses required for DHCP operation
c. To reserve addresses for the subnet ID and default gateway (router)
d. To reserve addresses for the subnet broadcast address and subnet ID
ANS
30 Which of the following is a network broadcast address?
a. 10.1.255.255
b. 192.168.255.1
c. 224.1.1.255
d. 172.30.255.255
ANS
31 Which of the following are true about IP address 172.16.99.45’s IP network? (Select two
answers.)
a. The network ID is 172.0.0.0.
b. The network is a Class B network.
c. The default mask for the network is 255.255.255.0.
d. The number of host bits in the unsubnetted network is 16.
ANS
32 Which of the following answers lists the prefix (CIDR) format equivalent of 255.255.254.0?
a. /19
b. /20
c. /23
d. /24
e. /25
ANS
33 Which of the following answers lists the dotted-decimal notation (DDN) equivalent of /24?
a. 255.255.240.0
b. 255.255.252.0
c. 255.255.255.0
d. 255.255.255.192
e. 255.255.255.240
ANS
34 Working at the help desk, you receive a call and learn a user’s PC IP address and mask
(10.55.66.77, mask 255.255.255.0). When thinking about this using classful logic, you
determine the number of network (N), subnet (S), and host (H) bits. Which of the following is
true in this case?
a. N=12
b. S=12
c. H=8
d. S=8
e. N=24
ANS
35 Which of the following is the resident subnet for IP address 192.168.44.97/30?
a. 192.168.44.0
b. 192.168.44.64
c. 192.168.44.96
d. 192.168.44.128
ANS
36 Which of the following is the resident subnet ID for IP address 10.7.99.133/24?
a. 10.0.0.0
b. 10.7.0.0
c. 10.7.99.0
d. 10.7.99.128
ANS
37 A PC opens a command prompt and uses the ipconfig command to see that the PC’s IP
address and mask are 192.168.4.77 and 255.255.255.224. The user then runs a test using
the ping 192.168.4.117 command. Which of the following answers is the most likely to happen?
a. The PC sends packets directly to the host with address 192.168.4.117.
b. The PC sends packets to its default gateway.
c. The PC sends a DNS query for 192.168.4.117.
d. The PC sends an ARP looking for the MAC address of the DHCP server.
ANS
38 Which of the following routing protocols are considered to use link-state logic? (Choose two
answers.)
a. RIP-1
b. RIP-2
c. EIGRP
d. OSPF
e. Integrated IS-IS
ANS D and E
39 Which of the following routing protocols use a metric that is, by default, at least partially
affected by link bandwidth? (Choose two answers.)
a. RIP-1
b. RIP-2
c. EIGRP
d. OSPF
ANS
40 OSPF runs an algorithm to calculate the currently best route. Which of the following terms
refer to that algorithm? (Choose two answers.)
a. SPF
b. DUAL
c. Feasible successor
d. Dijkstra
e. Good old common sense
ANS
41 A PC connects to a LAN and uses DHCP to lease an IP address for the first time. Of the usual
four DHCP messages that flow between the PC and the DHCP server, which ones do the client
send? (Choose 2 answers.)
a. Acknowledgment
b. Discover
c. Offer
d. Request
ANS
42 PC1 uses manual (static) IPv4 configuration associated with its Ethernet NIC. Which of the
following IPv4 settings will the PC list in the IPv4 configuration? (Choose 2 answers.)
a. A DHCP server address
b. A DNS server address
c. A traceroute server address
d. The PC’s own IP address
ANS
43 The PC2 user issues the tracert 10.1.1.10 command. Which of the following IP addresses could
be shown in the command output? (Choose three answers.)
a. 10.1.1.10
b. 10.1.1.1
c. 10.1.13.1
d. 10.1.13.2
e. 172.16.2.4
ANS
44 Which of the following summarized subnets is the smallest (smallest range of addresses)
summary route that includes subnets 10.3.95.0, 10.3.96.0, and 10.3.97.0, mask
255.255.255.0?
a. 10.0.0.0 255.0.0.0
b. 10.3.0.0 255.255.0.0
c. 10.3.64.0 255.255.192.0
d. 10.3.64.0 255.255.224.0
ANS
45 Which of the following wildcard masks is most useful for matching all IP packets in subnet
10.1.128.0, mask 255.255.255.0?
a. 0.0.0.0
b. 0.0.0.31
c. 0.0.0.240
d. 0.0.0.255
e. 0.0.15.0
f. 0.0.248.255
ANS
46 Which of the following wildcard masks is most useful for matching all IP packets in subnet
10.1.128.0, mask 255.255.240.0?
a. 0.0.0.0
b. 0.0.0.31
c. 0.0.0.240
d. 0.0.0.255
e. 0.0.15.255
f. 0.0.248.255
ANS
47 Which of the following fields cannot be compared based on an extended IP ACL? (Choose two
answers.)
a. Protocol
b. Source IP address
c. Destination IP address
d. URL
e. Filename for FTP transfers
ANS
48 Which of the following access-list commands permit packets going from host 10.1.1.1 to all
web servers whose IP addresses begin with 172.16.5? (Choose two answers.)
a. access-list 101 permit tcp host 10.1.1.1 172.16.5.0 0.0.0.255 eq www
b. access-list 1951 permit ip host 10.1.1.1 172.16.5.0 0.0.0.255 eq www
c. access-list 2523 permit ip host 10.1.1.1 eq www 172.16.5.0 0.0.0.255
d. access-list 2523 permit tcp host 10.1.1.1 eq www 172.16.5.0 0.0.0.255
ANS
49 Which of the following distance vector features prevents routing loops by advertising an
infinite metric route when a route fails?
a. Dijkstra SPF
b. DUAL
c. Split horizon
d. Route poisoning
ANS
50 Which of the following affect the calculation of EIGRP metrics when all possible default values
are used? (Choose two answers.)
a. Bandwidth
b. Delay
c. Load
d. Reliability
e. MTU
f. Hop count
ANS
51 In the show ip route command, what code designation implies that a route was learned with
EIGRP?
a. E
b. I
c. G
d. D
ANS
52 Two routers have no initial configuration whatsoever. They are connected in a lab using a
DTE cable connected to R1 and a DCE cable connected to R2, with the DTE and DCE cables
then connected to each other. The engineer wants to create a working PPP link by configuring
both routers. Which of the following commands are required in the R1 configuration for the
link to reach a state in which R1 can ping R2’s serial IP address, assuming that the physical
backto-
back link physically works? (Choose two answers.)
a. encapsulation ppp
b. no encapsulation hdlc
c. clock rate
d. ip address
ANS
53 Consider the following excerpt from the output of a show command:
Serial0/0/1 is up, line protocol is up
Hardware is GT96K Serial
Internet address is 192.168.2.1/24
MTU 1500 bytes, BW 1544 Kbit, DLY 20000 usec,
reliability 255/255, txload 1/255, rxload 1/255
Encapsulation PPP, LCP Open
Open: CDPCP, IPCP, loopback not set
Which of the following are true about this router’s S0/0/1 interface? (Choose two answers.)
a. The interface is using HDLC.
b. The interface is using PPP.
c. The interface currently cannot pass IPv4 traffic.
d. The link should be able to pass PPP frames at the present time.
ANS
54 Which of the following is a protocol used between the Frame Relay DTE and the Frame Relay
switch?
a. VC
b. CIR
c. LMI
d. Q.921
e. DLCI
ANS
55 What does DLCI stand for?
a. Data link connection identifier
b. Data link connection indicator
c. Data link circuit identifier
d. Data link circuit indicator
ANS
56 Which of the following private WAN services operates primarily as a Layer 3 service,
delivering IP packets between two customer sites?
a. Leased line
b. MPLS
c. Ethernet WAN
d. Frame Relay
ANS
57 What of these steps happens first during the router boot process?
a. The router locates the configuration file.
b. The POST.
c. The router locates the Cisco IOS image.
d. The router initiates the bootstrap code from ROM.
ANS
58 After your Cisco router boots, what is a simple way to verify the Cisco IOS image that was
loaded and the location from which it was copied into RAM?
a. show running-config
b. show boot
c. show cisco ios
d. show version
ANS
59 What is the first step a typical Cisco router takes, during the boot process, when attempting
to locate an operating system to load?
a. The router looks for an image on a TFTP server.
b. The router checks its configuration register boot field.
c. The router boots to ROMMON.
d. The router looks in flash memory for an Cisco IOS image file.
ANS
60 You have forgotten your privileged mode password and cannot access global configuration
mode. During the password recovery process, how can you change the configuration register
if you cannot remember enough passwords to get into configuration mode of the router?
a. Using ROMMON mode
b. Using the Setup Utility
c. Using the GUI for configuring the device
d. Using password reset mode
ANS
61 You find that one of the serial interfaces on your router is not forwarding traffic. You have
given "show ip interfaces" command. In the response, you observed the following entries
against that interface:
Serial 0 is up, line protocol is down. What is the likely problem?
a.There is a problem at physical layer
b.There is a problem exchanging the routing information
c.The link was administratively down
d.There is a problem with the route both at physical and protocol layers
ANS
62 Two sub layers of OSI Data Link layer are which of the following?
A.Logical Link Control, Data Link Control
B.Media Access Control, Physical Layer Control
C.Logical Link Control, Media Access Control
D.Data Link Control, Physical Layer Control
ANS
63 Match the following:
A. Repeaters 1. Data Link Layer
B. Bridges 2. Network Layer
C. Routers 3. Physical Layer
a. A --->2, B--->3, C--->1
b. A--->3, B---->1, C---->2
c. A--->3, B----->2, C---->1
d. A---->1, B---->2, C---->3
ANS
64 Which of the following is true of a Switch?
a. Switches forward packets based on IP address.
b. Switches forward packets based on MAC address.
c. Switches forward packets based on IPX address.
d. Switches forward packets based on Layer3 protocol.
ANS
65 What two results would occur if the hub were to be replaced with a switch that is configured
with one Ethernet VLAN? (Choose two.)
A. The number of collision domains would remain the same.
B. The number of collision domains would decrease.
C. The number of collision domains would increase.
D. The number of broadcast domains would remain the same.
E. The number of broadcast domains would decrease.
F. The number of broadcast domains would increase.
ANS
66 Based on the information given, which switch will be elected root bridge and why?
A. Switch A, because it has the lowest MAC address
B. Switch A, because it is the most centrally located switch
C. Switch B, because it has the highest MAC address
D. Switch C, because it is the most centrally located switch
E. Switch C, because it has the lowest priority
F. Switch D, because it has the highest priority
ANS
67 Which of the following statements describe the network shown in the graphic? (Choose two.)
A. There are two broadcast domains in the network.
B. There are four broadcast domains in the network.
C. There are six broadcast domains in the network.
D. There are four collision domains in the network.
E. There are five collision domains in the network.
F. There are seven collision domains in the network.
ANS
68 VLAN 3 is not yet configured on your switch. What happens if you set the switchport access
vlan 3 command in interface configuration mode?
A. The command is rejected.
B. The port turns amber.
C. The command is accepted and the respective VLAN is added to vlan.dat.
D. The command is accepted and you must configure the VLAN manually.
ANS
69 In a switched environment, what does the IEEE 802.1Q standard describe?
A. the operation of VTP
B. a method of VLAN trunking
C. an approach to wireless LAN communication
D. the process for root bridge selection
E. VLAN pruning
ANS
70 What is the function of the command switchport trunk native vlan 999 on a Cisco Catalyst
switch?
A. It creates a VLAN 999 interface.
B. It designates VLAN 999 for untagged traffic.
C. It blocks VLAN 999 traffic from passing on the trunk.
D. It designates VLAN 999 as the default for all unknown tagged traffic.
ANS
71 Which two protocols are used by bridges and/or switches to prevent loops in a layer 2
network?
(Choose two.)
A. 802.1d
B. VTP
C. 802.1q
D. STP
E. SAP
ANS
72 Which switch would STP choose to become the root bridge in the selection process?
A. 32768: 11-22-33-44-55-66
B. 32768: 22-33-44-55-66-77
C. 32769: 11-22-33-44-55-65
D. 32769: 22-33-44-55-66-78
ANS
73 A switch is configured with all ports assigned to VLAN 2 with full duplex FastEthernet to
segment existing departmental traffic. What is the effect of adding switch ports to a new VLAN
on the switch?
A. More collision domains will be created.
B. IP address utilization will be more efficient.
C. More bandwidth will be required than was needed previously.
D. An additional broadcast domain will be created.
ANS
74 Which two link protocols are used to carry multiple VLANs over a single link? (Choose two.)
A. VTP
B. 802.1q
C. IGP
D. ISL
E. 802.3u
ANS
75 Assuming the default switch configuration, which VLAN range can be added, modified, and
removed on a Cisco switch?Assuming the default switch configuration, which VLAN range can
be added, modified, and removed on a Cisco switch?
A. 1 through 1001
B. 2 through 1001
C. 1 through 1002
D. 2 through 1005
ANS
76 The technician wants to upload a new IOS in the router while keeping the existing IOS. What is
the maximum size of an IOS file that could be loaded if the original IOS is also kept in flash?
A. 3 MB
B. 4 MB
C. 5 MB
D. 7 MB
E. 8 MB
ANS
77 Which parameter would you tune to affect the selection of a static route as a backup, when a
dynamic protocol is also being used?
A. hop count
B. administrative distance
C. link bandwidth
D. link delay
E. link cost
ANS
78 A static route to the 10.5.6.0/24 network is to be configured on the HFD router. Which
commands will accomplish this? (Choose two.)
A. HFD(config)# ip route 10.5.6.0 0.0.0.255 fa0/0
B. HFD(config)# ip route 10.5.6.0 0.0.0.255 10.5.4.6
C. HFD(config)# ip route 10.5.6.0 255.255.255.0 fa0/0
D. HFD(config)# ip route 10.5.6.0 255.255.255.0 10.5.4.6
E. HFD(config)# ip route 10.5.4.6 0.0.0.255 10.5.6.0
F. HFD(config)# ip route 10.5.4.6 255.255.255.0 10.5.6.0
ANS
79 What is the default administrative distance of OSPF?
A. 90
B. 100
C. 110
D. 120
ANS
80 Which command would you configure globally on a Cisco router that would allow you to view
directly connected Cisco devices?
A. enable cdp
B. cdp enable
C. cdp run
D. run cdp
ANS
81 On which options are standard access lists based?
A. destination address and wildcard mask
B. destination address and subnet mask
C. source address and subnet mask
D. source address and wildcard mask
ANS
82 What is the default routing update period for RIPv2?
A. 15 seconds
B. 30 Seconds
C. 180 Seconds
D. 240 Seconds
ANS
83 What are two characteristics of RIPv2? (Choose two)
A. classful routing protocol
B. variable-length subnet masks
C. broadcast addressing
D. manual route summarization
E. uses SPF algorithm to compute path
ANS
84 Refer to the exhibit. Which (config-router) command will allow the network represented on the
interface to be advertised by RIP?
router rip
version 2
no auto summary
!
interface ethernet0
ip address 10.12.6.1 255.255.0.0
A. redistribute ethernet0
B. network ethernet0
C. redistribute 10.12.0.0
D. network 10.12.0.0
ANS
85 Refer to the exhibit. After a RIP route is marked invalid on Router_1, how much time will elapse
before that route is removed from the routing table?
Router_1# show ip protocols
Routing Protocol is “rip”
Sending updates every 30 seconds, next due in 8 seconds
Invalid after 180 seconds, hold down 180, flushed after 240
Outgoing update filter list foe all interfaces is not set
Incoming update filter list for all interfaces is not set
Router 1#
A. 30 seconds
B. 60 seconds
C. 90 seconds
D. 180 seconds
E. 240 seconds
ANS
86 What two things will a router do when running a distance vector routing protocol? (Choose
two)
A. Send periodic updates regardless of topology changes.
B. Send entire routing table to all routers in the routing domain.
C. Use the shortest-path algorithm to the determine best path.
D. Update the routing table based on updates from their neighbors.
E. Maintain the topology of the entire network in its database.
ANS
87 Which two protocols are used by bridges and/or switches to prevent loops in a layer 2
network? (Choose two)
A. 802.1d
B. VTP
C. 802.1q
D. STP
E. SAP
ANS
88 Which of the following are benefits of VLANs? (Choose three)
A. They increase the size of collision domains.
B. They allow logical grouping of users by function.
C. They can enhance network security.
D. They increase the size of broadcast domains while decreasing the number of collision
domains.
E. They increase the number of broadcast domains while decreasing the size of the broadcast
domains.
F. They simplify switch administration.
ANS
89 On which options are standard access lists based?
A. destination address and wildcard mask
B. destination address and subnet mask
C. source address and subnet mask
D. source address and wildcard mask
ANS
90 Which item represents the standard IP ACL?
A. access-list 50 deny 192.168.1.1 0.0.0.255
B. access-list 110 permit ip any any
C. access-list 2500 deny tcp any host 192.168.1.1 eq 22
D. access-list 101 deny tcp any host 192.168.1.1
ANS
91 Which type of cable is used to connect the COM port of a host to the COM port of a router or
switch?
A. crossover
B. straight-through
C. rolled
D. shielded twisted-pair
ANS
92 Which type of connection should a straight-through cable be used for?
A. switch to switch
B. switch to hub
C. switch to router
D. hub to hub
E. router to PC
ANS
93 What is the first 24 bits in a MAC address called?
A. NIC
B. BIA
C. OUI
D. VAI
ANS
94 When a host transmits data across a network to another host, which process does the data go
through?
A. standardization
B. conversion
C. encapsulation
D. synchronization
ANS
95 Which pairing reflects a correct protocol-and-metric relationship?
A. EIGRP and link cost
B. OSPF and number of hops and reliability
C. RIPv2 and number of hops
D. IS-IS and delay and reliability
ANS
96 What is the effect of using the service password-encryption command?
A. Only the enable password will be encrypted.
B. It will encrypt all current and future passwords.
C. It will encrypt the secret password and remove the enable secret password from the
configuration.
D. Only the enable secret password will be encrypted.
E. Only passwords configured after the command has been entered will be encrypted.
ANS
97 The enable secret command is used to secure access to which CLI mode?
A. global configuration mode
B. privileged EXEC mode
C. user EXEC mode
D. auxiliary setup mode
ANS
98 Assuming default setting, how can you erase the VTP database of VLANs on a CISCO IOS switch
running in VTP server mode?
A. Enable VTP pruning
B. From privileged mode .erase the startup configuration file .then reload
C. From privileged mode .erase the vlan date file, then reload.
D. Cycle the switch power.
ANS

Mais conteúdo relacionado

Mais procurados

Www ccnav5 net_ccna_1_chapter_5_v5_0_exam_answers_2014
Www ccnav5 net_ccna_1_chapter_5_v5_0_exam_answers_2014Www ccnav5 net_ccna_1_chapter_5_v5_0_exam_answers_2014
Www ccnav5 net_ccna_1_chapter_5_v5_0_exam_answers_2014
Đồng Quốc Vương
 
Cisco discovery drs ent module 10 - v.4 in english.
Cisco discovery   drs ent module 10 - v.4 in english.Cisco discovery   drs ent module 10 - v.4 in english.
Cisco discovery drs ent module 10 - v.4 in english.
igede tirtanata
 
Ccna 1 practice final exam answer v5
Ccna 1 practice final exam answer v5Ccna 1 practice final exam answer v5
Ccna 1 practice final exam answer v5
friv4schoolgames
 
CCNP Routing
CCNP Routing CCNP Routing
CCNP Routing
Networkershome
 
CCNP Troubleshooting
CCNP TroubleshootingCCNP Troubleshooting
CCNP Troubleshooting
Networkershome
 

Mais procurados (20)

CCNAX 200 120 dumps
CCNAX 200 120 dumpsCCNAX 200 120 dumps
CCNAX 200 120 dumps
 
Ip essential with answers
Ip essential with answersIp essential with answers
Ip essential with answers
 
Prb#5
Prb#5Prb#5
Prb#5
 
Computer Networks Homework Help
Computer Networks Homework HelpComputer Networks Homework Help
Computer Networks Homework Help
 
Exercises TCP/IP Networking With Solutions
Exercises TCP/IP Networking With SolutionsExercises TCP/IP Networking With Solutions
Exercises TCP/IP Networking With Solutions
 
Www ccnav5 net_ccna_1_chapter_5_v5_0_exam_answers_2014
Www ccnav5 net_ccna_1_chapter_5_v5_0_exam_answers_2014Www ccnav5 net_ccna_1_chapter_5_v5_0_exam_answers_2014
Www ccnav5 net_ccna_1_chapter_5_v5_0_exam_answers_2014
 
Ccna 3 Final V4.0 Answers
Ccna 3 Final V4.0 AnswersCcna 3 Final V4.0 Answers
Ccna 3 Final V4.0 Answers
 
Cisco discovery drs ent module 10 - v.4 in english.
Cisco discovery   drs ent module 10 - v.4 in english.Cisco discovery   drs ent module 10 - v.4 in english.
Cisco discovery drs ent module 10 - v.4 in english.
 
CCNA 200-120 Exam Questions
CCNA 200-120 Exam QuestionsCCNA 200-120 Exam Questions
CCNA 200-120 Exam Questions
 
VLAN
VLANVLAN
VLAN
 
Ccna 1 practice final exam answer v5
Ccna 1 practice final exam answer v5Ccna 1 practice final exam answer v5
Ccna 1 practice final exam answer v5
 
ccna 1 v5.0 itn practice final exam answers
ccna 1 v5.0 itn practice final exam answersccna 1 v5.0 itn practice final exam answers
ccna 1 v5.0 itn practice final exam answers
 
Intro to Ethernet
Intro to EthernetIntro to Ethernet
Intro to Ethernet
 
Free CCNA workbook by networkers home pdf
Free CCNA workbook by networkers home pdfFree CCNA workbook by networkers home pdf
Free CCNA workbook by networkers home pdf
 
CCNA 1 Chapter 5 v5.0 2014
CCNA 1 Chapter 5 v5.0 2014CCNA 1 Chapter 5 v5.0 2014
CCNA 1 Chapter 5 v5.0 2014
 
Exam viewer2
Exam viewer2Exam viewer2
Exam viewer2
 
CCNA Quick Notes
CCNA Quick NotesCCNA Quick Notes
CCNA Quick Notes
 
CCNP Routing
CCNP Routing CCNP Routing
CCNP Routing
 
M odul1
M odul1M odul1
M odul1
 
CCNP Troubleshooting
CCNP TroubleshootingCCNP Troubleshooting
CCNP Troubleshooting
 

Destaque

Secure Data Center Solution with FP 9300 - BDM
Secure Data Center Solution with FP 9300 - BDMSecure Data Center Solution with FP 9300 - BDM
Secure Data Center Solution with FP 9300 - BDM
Bill McGee
 
Designing Secure Cisco Data Centers
Designing Secure Cisco Data CentersDesigning Secure Cisco Data Centers
Designing Secure Cisco Data Centers
Cisco Russia
 

Destaque (13)

Open Systems Interconnection (OSI) model
Open Systems Interconnection (OSI) modelOpen Systems Interconnection (OSI) model
Open Systems Interconnection (OSI) model
 
Chapter 08 - Single-Area OSPF
Chapter 08 - Single-Area OSPFChapter 08 - Single-Area OSPF
Chapter 08 - Single-Area OSPF
 
Case Study: Datotel Extended the Power of Infrastructure Management to the Ph...
Case Study: Datotel Extended the Power of Infrastructure Management to the Ph...Case Study: Datotel Extended the Power of Infrastructure Management to the Ph...
Case Study: Datotel Extended the Power of Infrastructure Management to the Ph...
 
Secure Data Center Solution with FP 9300 - BDM
Secure Data Center Solution with FP 9300 - BDMSecure Data Center Solution with FP 9300 - BDM
Secure Data Center Solution with FP 9300 - BDM
 
Solid state devices rajni tripathi
Solid state devices   rajni tripathiSolid state devices   rajni tripathi
Solid state devices rajni tripathi
 
Ch01 solid state electronic devices
Ch01 solid state electronic devicesCh01 solid state electronic devices
Ch01 solid state electronic devices
 
Chapter 10 - DHCP
Chapter 10 - DHCPChapter 10 - DHCP
Chapter 10 - DHCP
 
Chapter 10 - Application Layer
Chapter 10 - Application LayerChapter 10 - Application Layer
Chapter 10 - Application Layer
 
Simplifying the secure data center
Simplifying the secure data centerSimplifying the secure data center
Simplifying the secure data center
 
Cloud Security and Risk Management
Cloud Security and Risk ManagementCloud Security and Risk Management
Cloud Security and Risk Management
 
Designing Secure Cisco Data Centers
Designing Secure Cisco Data CentersDesigning Secure Cisco Data Centers
Designing Secure Cisco Data Centers
 
Chapter 08 - IP Addressing
Chapter 08 - IP AddressingChapter 08 - IP Addressing
Chapter 08 - IP Addressing
 
Crystal structures
Crystal structuresCrystal structures
Crystal structures
 

Semelhante a CCNA practice quiz student

Ccna exam 640 802
Ccna exam 640 802Ccna exam 640 802
Ccna exam 640 802
ccnaguide
 
Ccna final exam
Ccna final examCcna final exam
Ccna final exam
ccnaguide
 
Ccna exam dumps
Ccna exam dumpsCcna exam dumps
Ccna exam dumps
ccnaguide
 
Ccna discovery
Ccna discoveryCcna discovery
Ccna discovery
ccnaguide
 
Ccna certification
Ccna certificationCcna certification
Ccna certification
ccnaguide
 
Ccna certification course
Ccna certification courseCcna certification course
Ccna certification course
ccnaguide
 
Ccna 10 exam
Ccna 10 examCcna 10 exam
Ccna 10 exam
ccnaguide
 
Ccna network simulator
Ccna network simulatorCcna network simulator
Ccna network simulator
ccnaguide
 

Semelhante a CCNA practice quiz student (20)

00-105 Interconnecting Cisco Networking Devices Part 1 (ICND1.pdf
00-105 Interconnecting Cisco Networking Devices Part 1 (ICND1.pdf00-105 Interconnecting Cisco Networking Devices Part 1 (ICND1.pdf
00-105 Interconnecting Cisco Networking Devices Part 1 (ICND1.pdf
 
Ccna guide
Ccna guideCcna guide
Ccna guide
 
Ccna exam 640 802
Ccna exam 640 802Ccna exam 640 802
Ccna exam 640 802
 
Ccna final exam
Ccna final examCcna final exam
Ccna final exam
 
200-301-demo.pdf
200-301-demo.pdf200-301-demo.pdf
200-301-demo.pdf
 
Cisco 200-301 Exam Dumps
Cisco 200-301 Exam DumpsCisco 200-301 Exam Dumps
Cisco 200-301 Exam Dumps
 
Cisco 200-301 Exam Dumps
Cisco 200-301 Exam DumpsCisco 200-301 Exam Dumps
Cisco 200-301 Exam Dumps
 
On tap ccent
On tap ccentOn tap ccent
On tap ccent
 
Connecting Networks
Connecting NetworksConnecting Networks
Connecting Networks
 
Ccna study
Ccna studyCcna study
Ccna study
 
Ccna exam dumps
Ccna exam dumpsCcna exam dumps
Ccna exam dumps
 
Ccna discovery
Ccna discoveryCcna discovery
Ccna discovery
 
Ccna dumps
Ccna dumpsCcna dumps
Ccna dumps
 
Ccna certification
Ccna certificationCcna certification
Ccna certification
 
Ccna certification course
Ccna certification courseCcna certification course
Ccna certification course
 
Ccna pdf
Ccna pdfCcna pdf
Ccna pdf
 
Ccna 10 exam
Ccna 10 examCcna 10 exam
Ccna 10 exam
 
lecciones ccna3
lecciones ccna3lecciones ccna3
lecciones ccna3
 
Ccna network simulator
Ccna network simulatorCcna network simulator
Ccna network simulator
 
Connecting network
Connecting networkConnecting network
Connecting network
 

Mais de Yaser Rahmati

Mais de Yaser Rahmati (20)

Cisco WLAN - Chapter. 08 : Applications, Design, and Site Survey Preparation
Cisco WLAN - Chapter. 08 : Applications, Design, and Site Survey  PreparationCisco WLAN - Chapter. 08 : Applications, Design, and Site Survey  Preparation
Cisco WLAN - Chapter. 08 : Applications, Design, and Site Survey Preparation
 
Cisco WLAN - Chapter. 07 : Antennas
Cisco WLAN - Chapter. 07 : AntennasCisco WLAN - Chapter. 07 : Antennas
Cisco WLAN - Chapter. 07 : Antennas
 
Cisco WLAN - Chapter. 06 : bridges
Cisco WLAN - Chapter. 06 : bridgesCisco WLAN - Chapter. 06 : bridges
Cisco WLAN - Chapter. 06 : bridges
 
Cisco WLAN - Chapter. 05 : Access Points
Cisco WLAN - Chapter. 05 : Access PointsCisco WLAN - Chapter. 05 : Access Points
Cisco WLAN - Chapter. 05 : Access Points
 
Cisco WLAN - Chapter. 03 : wireless radio technology
Cisco WLAN - Chapter. 03 : wireless radio technologyCisco WLAN - Chapter. 03 : wireless radio technology
Cisco WLAN - Chapter. 03 : wireless radio technology
 
Cisco WLAN - Chapter. 04 : wireless topologies
Cisco WLAN - Chapter. 04 : wireless topologiesCisco WLAN - Chapter. 04 : wireless topologies
Cisco WLAN - Chapter. 04 : wireless topologies
 
Cisco WLAN - Chapter. 02 : Part 3 – 802.11 phy
Cisco WLAN -  Chapter. 02 : Part 3 – 802.11 phyCisco WLAN -  Chapter. 02 : Part 3 – 802.11 phy
Cisco WLAN - Chapter. 02 : Part 3 – 802.11 phy
 
Cisco WLAN - Chapter. 02 : Part 2 – 802.11 MAC
Cisco WLAN -  Chapter. 02 : Part 2 – 802.11 MACCisco WLAN -  Chapter. 02 : Part 2 – 802.11 MAC
Cisco WLAN - Chapter. 02 : Part 2 – 802.11 MAC
 
Cisco WLAN - Chapter. 02 : Part 1 – 802.11 MAC and Cisco Client Adapters
Cisco WLAN -  Chapter. 02 :  Part 1 – 802.11 MAC and Cisco Client AdaptersCisco WLAN -  Chapter. 02 :  Part 1 – 802.11 MAC and Cisco Client Adapters
Cisco WLAN - Chapter. 02 : Part 1 – 802.11 MAC and Cisco Client Adapters
 
Cisco WLAN - Chapter. 01 : Overview of Wireless LANs
Cisco WLAN -  Chapter. 01 : Overview of Wireless LANsCisco WLAN -  Chapter. 01 : Overview of Wireless LANs
Cisco WLAN - Chapter. 01 : Overview of Wireless LANs
 
MTCNA - MikroTik Certified Network Associate - v2
MTCNA - MikroTik Certified Network Associate - v2MTCNA - MikroTik Certified Network Associate - v2
MTCNA - MikroTik Certified Network Associate - v2
 
Chapter 07 - Routing Dynamically
Chapter 07 - Routing DynamicallyChapter 07 - Routing Dynamically
Chapter 07 - Routing Dynamically
 
Chapter 11 - Network Address Translation for IPv4
Chapter 11 - Network Address Translation for IPv4Chapter 11 - Network Address Translation for IPv4
Chapter 11 - Network Address Translation for IPv4
 
Chapter 09 - Access Control Lists
Chapter 09 - Access Control ListsChapter 09 - Access Control Lists
Chapter 09 - Access Control Lists
 
Chapter 06 - Static Routing
Chapter 06 - Static RoutingChapter 06 - Static Routing
Chapter 06 - Static Routing
 
Chapter 04 - Routing Concepts
Chapter 04 - Routing ConceptsChapter 04 - Routing Concepts
Chapter 04 - Routing Concepts
 
Chapter 05 - Inter-VLAN Routing
Chapter 05 - Inter-VLAN RoutingChapter 05 - Inter-VLAN Routing
Chapter 05 - Inter-VLAN Routing
 
Chapter 02 - Introduction to Switched Networks
Chapter 02 - Introduction to Switched NetworksChapter 02 - Introduction to Switched Networks
Chapter 02 - Introduction to Switched Networks
 
Chapter 03 - VLANs
Chapter 03 - VLANsChapter 03 - VLANs
Chapter 03 - VLANs
 
Chapter 01 - Introduction to Switched Networks
Chapter 01 - Introduction to Switched NetworksChapter 01 - Introduction to Switched Networks
Chapter 01 - Introduction to Switched Networks
 

Último

Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Christo Ananth
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Christo Ananth
 
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night StandCall Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
amitlee9823
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
ankushspencer015
 
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
dollysharma2066
 

Último (20)

Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - V
 
Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
 
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night StandCall Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdf
 
chapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringchapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineering
 
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELLPVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)
 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
 
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
 
Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank  Design by Working Stress - IS Method.pdfIntze Overhead Water Tank  Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
 
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leap
 

CCNA practice quiz student

  • 1. CCNA Practice Quiz 1 Imagine that you have configured the enable secret command, followed by the enable password command, from the console. You log out of the switch and log back in at the console. Which command defines the password that you had to enter to access privileged mode? a. enable password b. enable secret c. Neither d. The password command, if it’s configured ANS 2 Which of the following protocols are examples of TCP/IP transport layer protocols? (Choose two answers.) a. Ethernet b. HTTP c. IP d. UDP e. SMTP f. TCP ANS 3 The process of a web server adding a TCP header to the contents of a web page, followed by adding an IP header and then adding a data link header and trailer is an example of what? a. Data encapsulation b. Same-layer interaction c. OSI model d. All of these answers are correct. ANS 4 Which of the following is true about the CSMA/CD algorithm? a. The algorithm never allows collisions to occur. b. Collisions can happen, but the algorithm defines how the computers should notice a collision and how to recover. c. The algorithm works with only two devices on the same Ethernet. d. None of the other answers is correct. ANS 5 Which of the following best describes the main function of OSI Layer 1 as used in WANs? a. Framing b. Delivery of bits from one device to another c. Addressing d. Error detection 6 Which of the following are functions of OSI Layer 3 protocols? (Choose two answers.) a. Logical addressing b. Physical addressing c. Path selection
  • 2. d. Arbitration e. Error recovery ANS 7 Which of the following does a router normally use when making a decision about routing TCP/IP packets? a. Destination MAC address b. Source MAC address c. Destination IP address d. Source IP address e. Destination MAC and IP address ANS 8 Which of the following is not a feature of a protocol that is considered to match OSI Layer 4? a. Error recovery b. Flow control c. Segmenting of application data d. Conversion from binary to ASCII ANS 9 When comparing VoIP with an HTTP-based mission-critical business application, which of the following statements are accurate about the quality of service needed from the network? (Choose two answers.) a. VoIP needs better (lower) packet loss. b. HTTP needs less bandwidth. c. HTTP needs better (lower) jitter. d. VoIP needs better (lower) delay. ANS 10 Which of the following Ethernet standards support a maximum cable length of longer than 100 meters? (Choose two answers.) a. 100BASE-T b. 1000BASE-LX c. 1000BASE-T d. 100BASE-FX ANS 11 A Cisco LAN switch connects to three PCs (PC1, PC2, and PC3), each directly using a cable that supports Ethernet UTP speeds up through 1000 Mbps (1 Gbps). PC1 uses a NIC that supports only 10BASE-T, while PC2 has a 10/100 NIC, and PC3 has a 10/100/1000 NIC. Assuming that the PCs and switch use IEEE autonegotiation, which PCs will use halfduplex? a. PC1 b. PC2 c. PC3 d. None of the PCs will use half-duplex. ANS 12 Which of the following statements describes part of the process of how a switch decides to forward a frame destined for a known unicast MAC address? a. It compares the unicast destination address to the bridging, or MAC address, table.
  • 3. b. It compares the unicast source address to the bridging, or MAC address, table. c. It forwards the frame out all interfaces in the same VLAN except for the incoming interface. d. It compares the destination IP address to the destination MAC address. e. It compares the frame’s incoming interface to the source MAC entry in the MAC address table. ANS 13 Which of the following statements describes part of the process of how a LAN switch decides to forward a frame destined for a broadcast MAC address? a. It compares the unicast destination address to the bridging, or MAC address, table. b. It compares the unicast source address to the bridging, or MAC address, table. c. It forwards the frame out all interfaces in the same VLAN except for the incoming interface. d. It compares the destination IP address to the destination MAC address. e. It compares the frame’s incoming interface to the source MAC entry in the MAC address table. ANS 14 In what modes can you execute the command show mac address-table? (Choose two answers.) a. User mode b. Enable mode c. Global configuration mode d. Interface configuration mode ANS 15 What command copies the configuration from RAM into NVRAM? a. copy running-config tftp b. copy tftp running-config c. copy running-config startup-config d. copy startup-config running-config e. copy startup-config running-config f. copy running-config startup-config ANS 16 In which of the following modes of the CLI could you issue the command reload to reboot the switch? a. User mode b. Enable mode c. Global configuration mode d. Interface configuration mode ANS 17 What type of switch memory is used to store the configuration used by the switch when it is up and working? a. RAM b. ROM c. Flash d. NVRAM e. Bubble
  • 4. ANS 18 A switch user is currently in console line configuration mode. Which of the following would place the user in enable mode? (Choose two answers.) a. Using the exit command once b. Using the end command once c. Pressing the Ctrl-Z key sequence once d. Using the quit command ANS 19 In which of the following modes of the CLI could you configure the duplex setting for interface Fast Ethernet 0/5? a. User mode b. Enable mode c. Global configuration mode d. VLAN mode e. Interface configuration mode ANS 20 In a LAN, which of the following terms best equates to the term VLAN? a. Collision domain b. Broadcast domain c. Subnet d. Single switch e. Trunk ANS 21 For an 802.1Q trunk between two Ethernet switches, which answer most accurately defines which frames do not include an 802.1Q header? a. Frames in the native VLAN (only one) b. Frames in extended VLANs c. Frames in VLAN 1 (not configurable) d. Frames in all native VLANs (multiple allowed) ANS 22 Which of the following commands identify switch interfaces as being trunking interfaces: interfaces that currently operate as VLAN trunks? (Choose two answers.) a. show interfaces b. show interfaces switchport c. show interfaces trunk d. show trunks ANS 23 Imagine that a switch connects through an Ethernet cable to a router, and the router’s host name is Hannah. Which of the following commands could tell you information about the IOS version on Hannah without establishing a Telnet connection to Hannah? (Choose two answers.) a. show neighbors Hannah b. show cdp c. show cdp neighbors
  • 5. d. show cdp neighbors Hannah e. show cdp neighbors detail ANS 24 On a Cisco Catalyst switch, you issue a show mac address-table command. Which of the following answers list information you would likely see in most lines of output? (Choose two answers.) a. A MAC address b. An IP address c. A VLAN ID d. Type (broadcast, multicast, or unicast) ANS 25 The following line of output was taken from a show interfaces fa0/1 command: Full-duplex, 100Mbps, media type is 10/100BaseTX Which of the following are true about the interface? (Choose two answers.) a. The speed was definitely configured with the speed 100 interface subcommand. b. The speed might have been configured with the speed 100 interface subcommand. c. The duplex was definitely configured with the duplex full interface subcommand. d. The duplex might have been configured with the duplex full interface subcommand. ANS 26 Which of the following are public IP networks? (Select three answers.) a. 9.0.0.0 b. 172.30.0.0 c. 192.168.255.0 d. 192.1.168.0 e. 1.0.0.0 ANS 27 Before Class B network 172.16.0.0 is subnetted by a network engineer, what parts of the structure of the IP addresses in this network already exist, with a specific size? (Select two answers.) a. Network b. Subnet c. Host d. Broadcast ANS 28 Which of the following are private IP networks? (Select two answers.) a. 172.31.0.0 b. 172.32.0.0 c. 192.168.255.0 d. 192.1.168.0 e. 11.0.0.0 ANS 29 Why does the formula for the number of hosts per subnet (2H – 2) require the subtraction of two hosts? a. To reserve two addresses for redundant default gateways (routers)
  • 6. b. To reserve the two addresses required for DHCP operation c. To reserve addresses for the subnet ID and default gateway (router) d. To reserve addresses for the subnet broadcast address and subnet ID ANS 30 Which of the following is a network broadcast address? a. 10.1.255.255 b. 192.168.255.1 c. 224.1.1.255 d. 172.30.255.255 ANS 31 Which of the following are true about IP address 172.16.99.45’s IP network? (Select two answers.) a. The network ID is 172.0.0.0. b. The network is a Class B network. c. The default mask for the network is 255.255.255.0. d. The number of host bits in the unsubnetted network is 16. ANS 32 Which of the following answers lists the prefix (CIDR) format equivalent of 255.255.254.0? a. /19 b. /20 c. /23 d. /24 e. /25 ANS 33 Which of the following answers lists the dotted-decimal notation (DDN) equivalent of /24? a. 255.255.240.0 b. 255.255.252.0 c. 255.255.255.0 d. 255.255.255.192 e. 255.255.255.240 ANS 34 Working at the help desk, you receive a call and learn a user’s PC IP address and mask (10.55.66.77, mask 255.255.255.0). When thinking about this using classful logic, you determine the number of network (N), subnet (S), and host (H) bits. Which of the following is true in this case? a. N=12 b. S=12 c. H=8 d. S=8 e. N=24 ANS 35 Which of the following is the resident subnet for IP address 192.168.44.97/30? a. 192.168.44.0 b. 192.168.44.64
  • 7. c. 192.168.44.96 d. 192.168.44.128 ANS 36 Which of the following is the resident subnet ID for IP address 10.7.99.133/24? a. 10.0.0.0 b. 10.7.0.0 c. 10.7.99.0 d. 10.7.99.128 ANS 37 A PC opens a command prompt and uses the ipconfig command to see that the PC’s IP address and mask are 192.168.4.77 and 255.255.255.224. The user then runs a test using the ping 192.168.4.117 command. Which of the following answers is the most likely to happen? a. The PC sends packets directly to the host with address 192.168.4.117. b. The PC sends packets to its default gateway. c. The PC sends a DNS query for 192.168.4.117. d. The PC sends an ARP looking for the MAC address of the DHCP server. ANS 38 Which of the following routing protocols are considered to use link-state logic? (Choose two answers.) a. RIP-1 b. RIP-2 c. EIGRP d. OSPF e. Integrated IS-IS ANS D and E 39 Which of the following routing protocols use a metric that is, by default, at least partially affected by link bandwidth? (Choose two answers.) a. RIP-1 b. RIP-2 c. EIGRP d. OSPF ANS 40 OSPF runs an algorithm to calculate the currently best route. Which of the following terms refer to that algorithm? (Choose two answers.) a. SPF b. DUAL c. Feasible successor d. Dijkstra e. Good old common sense ANS 41 A PC connects to a LAN and uses DHCP to lease an IP address for the first time. Of the usual four DHCP messages that flow between the PC and the DHCP server, which ones do the client send? (Choose 2 answers.) a. Acknowledgment
  • 8. b. Discover c. Offer d. Request ANS 42 PC1 uses manual (static) IPv4 configuration associated with its Ethernet NIC. Which of the following IPv4 settings will the PC list in the IPv4 configuration? (Choose 2 answers.) a. A DHCP server address b. A DNS server address c. A traceroute server address d. The PC’s own IP address ANS 43 The PC2 user issues the tracert 10.1.1.10 command. Which of the following IP addresses could be shown in the command output? (Choose three answers.) a. 10.1.1.10 b. 10.1.1.1 c. 10.1.13.1 d. 10.1.13.2 e. 172.16.2.4 ANS 44 Which of the following summarized subnets is the smallest (smallest range of addresses) summary route that includes subnets 10.3.95.0, 10.3.96.0, and 10.3.97.0, mask 255.255.255.0? a. 10.0.0.0 255.0.0.0 b. 10.3.0.0 255.255.0.0 c. 10.3.64.0 255.255.192.0 d. 10.3.64.0 255.255.224.0 ANS 45 Which of the following wildcard masks is most useful for matching all IP packets in subnet 10.1.128.0, mask 255.255.255.0? a. 0.0.0.0 b. 0.0.0.31 c. 0.0.0.240 d. 0.0.0.255 e. 0.0.15.0 f. 0.0.248.255 ANS 46 Which of the following wildcard masks is most useful for matching all IP packets in subnet
  • 9. 10.1.128.0, mask 255.255.240.0? a. 0.0.0.0 b. 0.0.0.31 c. 0.0.0.240 d. 0.0.0.255 e. 0.0.15.255 f. 0.0.248.255 ANS 47 Which of the following fields cannot be compared based on an extended IP ACL? (Choose two answers.) a. Protocol b. Source IP address c. Destination IP address d. URL e. Filename for FTP transfers ANS 48 Which of the following access-list commands permit packets going from host 10.1.1.1 to all web servers whose IP addresses begin with 172.16.5? (Choose two answers.) a. access-list 101 permit tcp host 10.1.1.1 172.16.5.0 0.0.0.255 eq www b. access-list 1951 permit ip host 10.1.1.1 172.16.5.0 0.0.0.255 eq www c. access-list 2523 permit ip host 10.1.1.1 eq www 172.16.5.0 0.0.0.255 d. access-list 2523 permit tcp host 10.1.1.1 eq www 172.16.5.0 0.0.0.255 ANS 49 Which of the following distance vector features prevents routing loops by advertising an infinite metric route when a route fails? a. Dijkstra SPF b. DUAL c. Split horizon d. Route poisoning ANS 50 Which of the following affect the calculation of EIGRP metrics when all possible default values are used? (Choose two answers.) a. Bandwidth b. Delay c. Load d. Reliability e. MTU f. Hop count ANS 51 In the show ip route command, what code designation implies that a route was learned with EIGRP? a. E b. I c. G
  • 10. d. D ANS 52 Two routers have no initial configuration whatsoever. They are connected in a lab using a DTE cable connected to R1 and a DCE cable connected to R2, with the DTE and DCE cables then connected to each other. The engineer wants to create a working PPP link by configuring both routers. Which of the following commands are required in the R1 configuration for the link to reach a state in which R1 can ping R2’s serial IP address, assuming that the physical backto- back link physically works? (Choose two answers.) a. encapsulation ppp b. no encapsulation hdlc c. clock rate d. ip address ANS 53 Consider the following excerpt from the output of a show command: Serial0/0/1 is up, line protocol is up Hardware is GT96K Serial Internet address is 192.168.2.1/24 MTU 1500 bytes, BW 1544 Kbit, DLY 20000 usec, reliability 255/255, txload 1/255, rxload 1/255 Encapsulation PPP, LCP Open Open: CDPCP, IPCP, loopback not set Which of the following are true about this router’s S0/0/1 interface? (Choose two answers.) a. The interface is using HDLC. b. The interface is using PPP. c. The interface currently cannot pass IPv4 traffic. d. The link should be able to pass PPP frames at the present time. ANS 54 Which of the following is a protocol used between the Frame Relay DTE and the Frame Relay switch? a. VC b. CIR c. LMI d. Q.921 e. DLCI ANS 55 What does DLCI stand for? a. Data link connection identifier b. Data link connection indicator c. Data link circuit identifier d. Data link circuit indicator ANS
  • 11. 56 Which of the following private WAN services operates primarily as a Layer 3 service, delivering IP packets between two customer sites? a. Leased line b. MPLS c. Ethernet WAN d. Frame Relay ANS 57 What of these steps happens first during the router boot process? a. The router locates the configuration file. b. The POST. c. The router locates the Cisco IOS image. d. The router initiates the bootstrap code from ROM. ANS 58 After your Cisco router boots, what is a simple way to verify the Cisco IOS image that was loaded and the location from which it was copied into RAM? a. show running-config b. show boot c. show cisco ios d. show version ANS 59 What is the first step a typical Cisco router takes, during the boot process, when attempting to locate an operating system to load? a. The router looks for an image on a TFTP server. b. The router checks its configuration register boot field. c. The router boots to ROMMON. d. The router looks in flash memory for an Cisco IOS image file. ANS 60 You have forgotten your privileged mode password and cannot access global configuration mode. During the password recovery process, how can you change the configuration register if you cannot remember enough passwords to get into configuration mode of the router? a. Using ROMMON mode b. Using the Setup Utility c. Using the GUI for configuring the device d. Using password reset mode ANS 61 You find that one of the serial interfaces on your router is not forwarding traffic. You have given "show ip interfaces" command. In the response, you observed the following entries against that interface: Serial 0 is up, line protocol is down. What is the likely problem? a.There is a problem at physical layer b.There is a problem exchanging the routing information c.The link was administratively down d.There is a problem with the route both at physical and protocol layers
  • 12. ANS 62 Two sub layers of OSI Data Link layer are which of the following? A.Logical Link Control, Data Link Control B.Media Access Control, Physical Layer Control C.Logical Link Control, Media Access Control D.Data Link Control, Physical Layer Control ANS 63 Match the following: A. Repeaters 1. Data Link Layer B. Bridges 2. Network Layer C. Routers 3. Physical Layer a. A --->2, B--->3, C--->1 b. A--->3, B---->1, C---->2 c. A--->3, B----->2, C---->1 d. A---->1, B---->2, C---->3 ANS 64 Which of the following is true of a Switch? a. Switches forward packets based on IP address. b. Switches forward packets based on MAC address. c. Switches forward packets based on IPX address. d. Switches forward packets based on Layer3 protocol. ANS 65 What two results would occur if the hub were to be replaced with a switch that is configured with one Ethernet VLAN? (Choose two.) A. The number of collision domains would remain the same. B. The number of collision domains would decrease. C. The number of collision domains would increase. D. The number of broadcast domains would remain the same. E. The number of broadcast domains would decrease. F. The number of broadcast domains would increase. ANS 66 Based on the information given, which switch will be elected root bridge and why?
  • 13. A. Switch A, because it has the lowest MAC address B. Switch A, because it is the most centrally located switch C. Switch B, because it has the highest MAC address D. Switch C, because it is the most centrally located switch E. Switch C, because it has the lowest priority F. Switch D, because it has the highest priority ANS 67 Which of the following statements describe the network shown in the graphic? (Choose two.) A. There are two broadcast domains in the network. B. There are four broadcast domains in the network. C. There are six broadcast domains in the network. D. There are four collision domains in the network. E. There are five collision domains in the network. F. There are seven collision domains in the network. ANS 68 VLAN 3 is not yet configured on your switch. What happens if you set the switchport access vlan 3 command in interface configuration mode? A. The command is rejected. B. The port turns amber. C. The command is accepted and the respective VLAN is added to vlan.dat. D. The command is accepted and you must configure the VLAN manually. ANS 69 In a switched environment, what does the IEEE 802.1Q standard describe? A. the operation of VTP B. a method of VLAN trunking C. an approach to wireless LAN communication D. the process for root bridge selection E. VLAN pruning
  • 14. ANS 70 What is the function of the command switchport trunk native vlan 999 on a Cisco Catalyst switch? A. It creates a VLAN 999 interface. B. It designates VLAN 999 for untagged traffic. C. It blocks VLAN 999 traffic from passing on the trunk. D. It designates VLAN 999 as the default for all unknown tagged traffic. ANS 71 Which two protocols are used by bridges and/or switches to prevent loops in a layer 2 network? (Choose two.) A. 802.1d B. VTP C. 802.1q D. STP E. SAP ANS 72 Which switch would STP choose to become the root bridge in the selection process? A. 32768: 11-22-33-44-55-66 B. 32768: 22-33-44-55-66-77 C. 32769: 11-22-33-44-55-65 D. 32769: 22-33-44-55-66-78 ANS 73 A switch is configured with all ports assigned to VLAN 2 with full duplex FastEthernet to segment existing departmental traffic. What is the effect of adding switch ports to a new VLAN on the switch? A. More collision domains will be created. B. IP address utilization will be more efficient. C. More bandwidth will be required than was needed previously. D. An additional broadcast domain will be created. ANS 74 Which two link protocols are used to carry multiple VLANs over a single link? (Choose two.) A. VTP B. 802.1q C. IGP D. ISL E. 802.3u ANS 75 Assuming the default switch configuration, which VLAN range can be added, modified, and removed on a Cisco switch?Assuming the default switch configuration, which VLAN range can be added, modified, and removed on a Cisco switch? A. 1 through 1001 B. 2 through 1001 C. 1 through 1002 D. 2 through 1005 ANS 76 The technician wants to upload a new IOS in the router while keeping the existing IOS. What is
  • 15. the maximum size of an IOS file that could be loaded if the original IOS is also kept in flash? A. 3 MB B. 4 MB C. 5 MB D. 7 MB E. 8 MB ANS 77 Which parameter would you tune to affect the selection of a static route as a backup, when a dynamic protocol is also being used? A. hop count B. administrative distance C. link bandwidth D. link delay E. link cost ANS 78 A static route to the 10.5.6.0/24 network is to be configured on the HFD router. Which commands will accomplish this? (Choose two.) A. HFD(config)# ip route 10.5.6.0 0.0.0.255 fa0/0 B. HFD(config)# ip route 10.5.6.0 0.0.0.255 10.5.4.6 C. HFD(config)# ip route 10.5.6.0 255.255.255.0 fa0/0 D. HFD(config)# ip route 10.5.6.0 255.255.255.0 10.5.4.6 E. HFD(config)# ip route 10.5.4.6 0.0.0.255 10.5.6.0 F. HFD(config)# ip route 10.5.4.6 255.255.255.0 10.5.6.0 ANS 79 What is the default administrative distance of OSPF? A. 90 B. 100 C. 110 D. 120 ANS 80 Which command would you configure globally on a Cisco router that would allow you to view directly connected Cisco devices?
  • 16. A. enable cdp B. cdp enable C. cdp run D. run cdp ANS 81 On which options are standard access lists based? A. destination address and wildcard mask B. destination address and subnet mask C. source address and subnet mask D. source address and wildcard mask ANS 82 What is the default routing update period for RIPv2? A. 15 seconds B. 30 Seconds C. 180 Seconds D. 240 Seconds ANS 83 What are two characteristics of RIPv2? (Choose two) A. classful routing protocol B. variable-length subnet masks C. broadcast addressing D. manual route summarization E. uses SPF algorithm to compute path ANS 84 Refer to the exhibit. Which (config-router) command will allow the network represented on the interface to be advertised by RIP? router rip version 2 no auto summary ! interface ethernet0 ip address 10.12.6.1 255.255.0.0 A. redistribute ethernet0 B. network ethernet0 C. redistribute 10.12.0.0 D. network 10.12.0.0 ANS 85 Refer to the exhibit. After a RIP route is marked invalid on Router_1, how much time will elapse before that route is removed from the routing table? Router_1# show ip protocols Routing Protocol is “rip” Sending updates every 30 seconds, next due in 8 seconds Invalid after 180 seconds, hold down 180, flushed after 240 Outgoing update filter list foe all interfaces is not set Incoming update filter list for all interfaces is not set Router 1#
  • 17. A. 30 seconds B. 60 seconds C. 90 seconds D. 180 seconds E. 240 seconds ANS 86 What two things will a router do when running a distance vector routing protocol? (Choose two) A. Send periodic updates regardless of topology changes. B. Send entire routing table to all routers in the routing domain. C. Use the shortest-path algorithm to the determine best path. D. Update the routing table based on updates from their neighbors. E. Maintain the topology of the entire network in its database. ANS 87 Which two protocols are used by bridges and/or switches to prevent loops in a layer 2 network? (Choose two) A. 802.1d B. VTP C. 802.1q D. STP E. SAP ANS 88 Which of the following are benefits of VLANs? (Choose three) A. They increase the size of collision domains. B. They allow logical grouping of users by function. C. They can enhance network security. D. They increase the size of broadcast domains while decreasing the number of collision domains. E. They increase the number of broadcast domains while decreasing the size of the broadcast domains. F. They simplify switch administration. ANS 89 On which options are standard access lists based? A. destination address and wildcard mask B. destination address and subnet mask C. source address and subnet mask D. source address and wildcard mask ANS 90 Which item represents the standard IP ACL? A. access-list 50 deny 192.168.1.1 0.0.0.255 B. access-list 110 permit ip any any C. access-list 2500 deny tcp any host 192.168.1.1 eq 22 D. access-list 101 deny tcp any host 192.168.1.1 ANS 91 Which type of cable is used to connect the COM port of a host to the COM port of a router or switch?
  • 18. A. crossover B. straight-through C. rolled D. shielded twisted-pair ANS 92 Which type of connection should a straight-through cable be used for? A. switch to switch B. switch to hub C. switch to router D. hub to hub E. router to PC ANS 93 What is the first 24 bits in a MAC address called? A. NIC B. BIA C. OUI D. VAI ANS 94 When a host transmits data across a network to another host, which process does the data go through? A. standardization B. conversion C. encapsulation D. synchronization ANS 95 Which pairing reflects a correct protocol-and-metric relationship? A. EIGRP and link cost B. OSPF and number of hops and reliability C. RIPv2 and number of hops D. IS-IS and delay and reliability ANS 96 What is the effect of using the service password-encryption command? A. Only the enable password will be encrypted. B. It will encrypt all current and future passwords. C. It will encrypt the secret password and remove the enable secret password from the configuration. D. Only the enable secret password will be encrypted. E. Only passwords configured after the command has been entered will be encrypted. ANS 97 The enable secret command is used to secure access to which CLI mode? A. global configuration mode B. privileged EXEC mode C. user EXEC mode D. auxiliary setup mode ANS 98 Assuming default setting, how can you erase the VTP database of VLANs on a CISCO IOS switch running in VTP server mode?
  • 19. A. Enable VTP pruning B. From privileged mode .erase the startup configuration file .then reload C. From privileged mode .erase the vlan date file, then reload. D. Cycle the switch power. ANS