ICND1 Practice Questions
Which command will assign a static MAC for an interface on the switch? a) Switch_A(config)#mac address-table static xxxx.yyyy.zzz vlan 1 int fa0/3 b) Switch_A(config)#mac address-table fixed xxxx.yyyy.zzz vlan 1 int fa0/3 c) Switch_A(config)#mac address static xxxx.yyyy.zzz vlan 1 int fa0/3 d) Switch_A(config)#mac address fixed xxxx.yyyy.zzz vlan 1 int fa0/3
Correct Answer: A
Which of these is a Routed Protocol? a) IP b) SNMP c) BGP d) IGRP
Correct Answer: A
You configure two routers and when you issue command to check the interface status: Router#sh int f0/2 FastEthernet0/2 is administratively down How do you bring this interface up, which is the valid command? a) No shutdown b) Interface up c) Port up d) Interface admin up
Correct Answer: A
___________________ algorithm is used on the Ethernet Network to avoid collisions ( CSMA/ CD) a) Jamming b) Forward delay c) Backoff d) Backtree
Correct Answer: A
____________________ command shows the path a packet takes to reach a remote destination. This command is helpful for troubleshooting. a) Traceroute b) ping c) whois d) netstat
Correct Answer: A
____________________ is a device that operates on Data Link Layer. a) Switch b) Router c) Hub d) Repeater
Correct Answer: A
_____________________ is used in switches for solution to loop avoidance. a) STP (Spanning Tree Protocol) b) VTP (Vlan Trunking Protocol) c) DTP (Dynamic Trunking Protocol) d) Loop Avoidance Protocol
Correct Answer: A
NTP is used for clock synchronization on routers. Clock Synchronization is important for? (Choose best two) a) Track events in the network in correct order b) For digital certificates c) Displaying time d) For routing updates
Correct Answer: A B
Which of the below are advantages of using a Layer 2 Switch? Choose all that apply. a) Low Latency b) Hardware Based bridging (ASICs) c) Low Cost d) Wire speed
Correct Answer: A B C D
The DOD (Department of Defense) Model's Application or Process Layer corresponds to which Layer of OSI Model (Choose 3) a) Application b) Session c) Data Link d) Presentation e) Network
Correct Answer: A B D
To form neighbor relationship in OSPF, the routers must have which of these matching? Choose all that apply a) Area ID b) Router ID c) Hello and Dead Intervals d) Authentication Password
Correct Answer: A C D
Which of the below work on the Application or Process Layer? a) HTTP b) SQL c) TCP d) DNS
Correct Answer: A D
The default subnet mask of a Class C network is _______________ a) 255.255.255.255 b) 255.254.0.0 c) 255.255.255.0 d) 255.255.0.0
Correct Answer: C
The router at CLI show the below prompt, what is this mode called: Router> a) Privileged mode b) Global Configuration mode c) User exec Mode d) Interface mode
Correct Answer: C
This portion of a MAC address is assigned by the IEEE to an organization. a) FCS b) I/G bit c) OUI d) U/L bit
Correct Answer: C
What is the use of IP address 127.0.0.1 used for? a) Connecting to remote computer b) Used as gateway IP on computer c) Test the IP stack on the local computer d) To assign Dynamic IP address
Correct Answer: C
_______________ protocol is used to collect information of locally attached devices. a) PPP b) HDLC c) CDP d) RIP
Correct Answer: C
____________________ is used on routers to reduce routing table size and save memory. Hint: Gives one address for multiple addresses. a) Access list b) IP filtering c) Subnetting d) Summarization
Correct Answer: D
____________________ protocol which helps devices share the bandwidth evenly while preventing two devices from transmitting simultaneously on the same network medium. a) TCP b) 3-way handshake c) EIGRP d) CSMA /CD
Correct Answer: D
____________ command displays IP - to -MAC address mappings on a Cisco Router a) arp -a b) show ip arp c) show arp d) arp -s
Correct Answer: B
______________ prevents a sending host on one side of the connection from overflowing the buffers in the receiving host a) Flow control b) Collision domain c) 3-way handshake d) None of the above
Correct Answer: B
___________________ protocol gathers data by polling the devices on the network from a network management station (NMS) at fixed or random intervals a) FTP b) SNMP c) Ping d) DNS
Correct Answer: B
Which of the below is a Routing Protocol? (Choose 2) a) DHCP b) RIP c) EIGRP d) IP
Correct Answer: B C
Which of these are Dynamic routing protocols? (Choose which all apply) a) IP b) RIP v1 c) OSPF d) EIGRP
Correct Answer: B C D
When OSPF is connected to same broadcast network a __________________ is elected to minimize the number of adjacencies formed and distribute received routing information to and from other routers in the same broadcast network. a) Router ID b) Designated Router c) Feasible Router d) Area Border Router
Correct Answer: B
Convert the binary IP address to decimal: 11000100. 10101010. 10010100. 00001001 a) 196. 170.148.9 b) 192.168.148.9 c) 196.168.148.9 d) 191.170.147.8
Correct Answer: A
If hosts and the DHCP server are NOT in the same network and the server need to assign IP addresses to the clients, which concept or technology can be used? a) DHCP Relay b) DHCP binding c) DHCP pool d) DHCP broadcast
Correct Answer: A
In OSPF grouping of contiguous networks and routers is called _____________. a) Area b) Region c) Local Group d) Periphery
Correct Answer: A
In OSPF, the Hello packets are address to which Multicast IP address? a) 224.0.0.5 b) 224.0.0.10 c) 224.0.0.9 d) 224.0.0.15
Correct Answer: A
The binary value for decimal 248 is: a) 11111000 b) 11111111 c) 11000000 d) 11100101
Correct Answer: A
Which of these does not fall under the classes of Routing Protocols? a) Distance Vector b) Dynamic routing c) Link state d) Hybrid
Correct Answer: B
Which of these is not a feature of RIPv1 routing protocol? a) Distance Vector Routing Protocol b) Classless routing c) Send routing table update every 30 seconds d) Administrative distance is 120
Correct Answer: B
You have logged in to Router R1 and from router R1 you telnet to Router R2 (10.10.10.2). Router1# telnet 10.10.10.2 Router2> Now you want to go back to Router1, without exiting from router2, which combination will you use? a) Alt +Shift+6 and then X b) Ctrl+Shift+6 and then X c) Ctrl +Shift+ 5 and then X d) Alt +Shift+ 5 and then Y
Correct Answer: B
90 is the administrative distance of RIP? True or False A) True B) False
Correct Answer: B
If we have an IP address 8.252.141.171/12 configured on the router interface, what will be the broadcast address used by the host on the LAN? a) 8.255.255.254 b) 8.255.255.255 c) 8.255.0.255 d) 8.0.255.255
Correct Answer: B
In a WAN connection the _________________ is used to provide clocking to a router. a) DTE b) DCE c) DSU d) CSU
Correct Answer: B
In a switch if the destination hardware address is known and present in the database, switch only sends the frame to the appropriate exit interface and not to all ports, this process is called ____________________ a) Port blocking b) Frame filtering c) Frame Blocking d) Port filtering
Correct Answer: B
The below command is an example of which type of routing? ip route 0.0.0.0 0.0.0.0 172.16.10.15 a) Static routing b) Default Routing c) Dynamic routing d) Packet Routing
Correct Answer: B
The quantity of data segments, measured in bytes that the transmitting machine is allowed to send without receiving an acknowledgment is called a______________. a) Handshake b) Window c) Congestion Avoidance d) Segmentation
Correct Answer: B
What is the administrative distance of OSPF? A) 90 B) 110 C) 120 D) 155
Correct Answer: B
OSPF uses the _________________ algorithm. a) Path Vector Algorithm b) Bellman-Ford Algorithm c) Dijkstra Algorithm d) IP forwarding Algorithm
Correct Answer: C
Traceroute uses TTL time-outs. TTL stands for ____________________________ a) Trace To Location b) Trace To Learn c) Time to Learn d) Time To Live
Correct Answer: D
What is the disadvantage of using redundant switches in the network? a) IP conflict b) Load Balancing c) Fault Tolerance d) Broadcast storm
Correct Answer: D
What is the first valid host Address for the given IP address: 215.164.117.37/29? a) 215.164.117.37 b) 215.164.117.32 c) 215.164.117.38 d) 215.164.117.33
Correct Answer: D
Which command is used to set or change the time on a Cisco router? a) Set time b) Time c) Set clock d) Clock set
Correct Answer: D
Which of the below is the default subnet mask for Class B network? a) 255.255.255.0 b) 255.255.255.255 c) 255.0.0.0 d) 255.255.0.0
Correct Answer: D
Which of these addresses is not part of the reserved Private IP address? a) 172.16. 10.10 b) 10.25.20.35 c) 192.168.5.50 d) 200.10.10.25
Correct Answer: D
Which short cut key is used to erase or delete a word in the CLI while editing? a) Ctrl+D b) Alt+W c) Alt+D d) Ctrl+W
Correct Answer: D
If you configure the address 192.168.10.5 255.255.255.248 on a router's interface and get the error: Bad mask for /29 for address 192.168.10.5 What is causing this error? a) The IP address is not allowed on WAN Link because it is Class C b) IP is not supported by the router c) Only broadcast IP is allowed on router interface d) The router does not have ip subnet-zero enabled
Correct Answer: D
TCP and UDP operate at the _________________ Layer a) Physical b) Session c) Network d) Transport
Correct Answer: D