CCENT Practice test Questions

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Which layer in the Open Systems Interconnection (OSI) model enables coding and conversion functions for application layer data?

Presentation Layer

Which application uses the IMAP protocol to transfer information between a server and a host?

E-mail

The graphic shows the following output: A# show ip route <output ommited> Gateway of last resort is not set S 10.0.0.0/8 [1/0] via 172.16.40.2 64.0.0.0/16 is subnetted, 1 subnets C 64.100.0.0 is directly connected, Serial0/1 C 128.107.0.0/16 is directly connected, Loopback2 172.16.0.0/24 is subnetted, 1 subnetes C 172.16.40.0 is directly connected, Serial0/0 C 192.168.1.0/24 is directly connected, FastEthernet0/0 S 192.168.2.0/24 [1/0] via 172.16.40.2 C 198.133.219.0/24 is directly connected, Loopback0 Refer to the exhibit. Packets destined to which two networks will require the router to perform a recursive lookup? (Choose two.)

10.0.0.0/8 192.168.2.0/24

A network administrator has been allocated the IPv4 10.10.240.0/20 block of addresses for a LAN. Two devices on two different, but contiguous, subnets on the LAN have been assigned the addresses 10.10.247.1/21 and 10.10.248.10/24, respectively. The administrator has to create a third subnet from the remaining address range. To optimize the use of this address space, the new subnet will follow on directly from the existing subnets. What is the first available host address in the next available subnet?​

10.10.249.1 The complete address range of the subnet with the host 10.10.247.1/21 is 10.10.240.0/21 to 10.10.247.255/21. The complete address range of the subnet that contains the host 10.10.248.10/24 is 10.10.248.0/24 to 10.10.248.255/24. This means that the next subnet will have a network address of 10.10.249.0 with a prefix length between 24 and 30. The first useable host address on this new subnet is therefore 10.10.249.1.

The exhibit shows the following router command and its output: R1# show ip nat translations Pro Inside global Inside local Outside local Outside global tcp 209.165.200.225:1405 10.6.15.2:1405 209.165.202.141:80 209.165.202.141:80 tcp 209.165.200.225:1406 10.6.15.1:1406 198.51.100.3:80 198.51.100.3:80Refer to the exhibit. Which source address is being used by router R1 for packets being forwarded to the Internet?

209.165.200.225 The source address for packets forwarded by the router to the Internet will be the inside global address of 209.165.200.225. This is the address that the internal addresses from the 10.6.15.0 network will be translated to by NAT.

Which address prefix range is reserved for IPv4 multicast?

224.0.0.0 - 239.255.255.255 Multicast IPv4 addresses use the reserved class D address range of 224.0.0.0 to 239.255.255.255. 53

The exhibit consists of the following command and its output: Router1# show access-lists Standard IP access list TRAFFIC-CONTROL 10 permit 172.23.0.0, wildcard bits 0.0.255.255 20 deny any Refer to the exhibit. A network administrator needs to add an ACE to the TRAFFIC-CONTROL ACL that will deny IP traffic from the subnet 172.23.16.0/20. Which ACE will meet this requirement?

5 deny 172.23.16.0 0.0.15.255 The only filtering criteria specified for a standard access list is the source IPv4 address. The wild card mask is written to identify what parts of the address to match, with a 0 bit, and what parts of the address should be ignored, which a 1 bit. The router will parse the ACE entries from lowest sequence number to highest. If an ACE must be added to an existing access list, the sequence number should be specified so that the ACE is in the correct place during the ACL evaluation process.

With the following equipment list, which of the following network scenarios could be supported? Two IP subnets of 255.255.255.0 Seven 48-port switches Two router interfaces

300 workstations with 150 workstations in two broadcast domains and each workstation in its own collision domain

The exhibit consists of the following command and its output: Router1# show access-lists Standard IP access list TRAFFIC-CONTROL 10 permit 172.23.0.0, wildcard bits 0.0.255.255 20 deny any Refer to the exhibit. A network administrator needs to add an ACE to the TRAFFIC-CONTROL ACL that will deny IP traffic from the subnet 172.23.16.0/20. Which ACE will meet this requirement?

5 deny 172.23.16.0 0.0.15.255 The only filtering criteria specified for a standard access list is the source IPv4 address. The wild card mask is written to identify what parts of the address to match, with a 0 bit, and what parts of the address should be ignored, which a 1 bit. The router will parse the ACE entries from lowest sequence number to highest. If an ACE must be added to an existing access list, the sequence number should be specified so that the ACE is in the correct place during the ACL evaluation process.

How many /30 subnets can be created from one /27 subnet?

8 A /27 subnet contains 32 IP addresses, and a /30 subnet contains 4 IP addresses, so eight /30 subnets can be created from one /27 subnet.

The graphic shows the following network devices and connections: A NAT router G0/0 interface with IP address 10.1.0.1/16 connects the to the web server with IP address 10.1.0.13/16. The NAT router also connects by a serial interface with IP address 209.165.201.1/29 to router R2 with IP address 209.165.201.2/29. R2 interface G0/0 with IP address 10.0.54.1/28 connects to PC 1 with IP address 10.0.54.5/28. Also shown is the incomplete command on the NAT router of NAT (config) #ip nat inside source static. Then there is an "A" and a "B" where the addresses should go to complete the command. Refer to the exhibit. Static NAT is being configured to allow PC 1 access to the web server on the internal network. What two addresses are needed in place of A and B to complete the static NAT configuration? (Choose two.)

A = 10.1.0.13 B = 209.165.201.1 Static NAT is a one-to-one mapping between an inside local address and an inside global address. By using static NAT, external devices can initiate connections to internal devices by using the inside global addresses. The NAT devices will translate the inside global address to the inside local address of the target host.

What type of installation is needed to view syslog messages?

A syslog server must be installed on a workstation. A syslog server needs to be installed on a workstation in order to gather the messages that are sent from the managed network devices.

What are three characteristics of the CSMA/CD process?

All of the devices on a segment see data that passes on the network medium. A device listens and waits until the media is not busy before transmitting. After detecting a collision, hosts can attempt to resume transmission after a random time delay has expired. The Carrier Sense Multiple Access/Collision Detection (CSMA/CD) process is a contention-based media access control mechanism used on shared media access networks, such as Ethernet. When a device needs to transmit data, it listens and waits until the media is available (quiet), then it will send data. If two devices transmit at the same time, a collision will occur. Both devices will detect the collision on the network. When a device detects a collision, it will stop the data transmission process, wait for a random amount of time, then try again.

Which type of Category 5 unshielded twisted-pair (UTP) cable is used to work as a trunk between two switches?

An RJ-45 crossover cable connects two switches

What effect does the default-information originate command have on a Cisco router that is configured for RIP?

Any default static route that is configured on the router will propagate to other adjacent routers. The default-information originate command instructs the router to propagate the default static route to other routers by including that route in the routing updates.

How will a router handle static routing differently if Cisco Express Forwarding is disabled?

Ethernet multi-access interfaces will require fully specified static routes to avoid routing inconsistencies In most platforms running IOS 12.0 or later, Cisco Express Forwarding is enabled by default. Cisco Express Forwarding eliminates the need for the recursive lookup. If Cisco Express Forwarding is disabled, multi-access network interfaces require fully specified static routes in order to avoid inconsistencies in their routing tables. Point-to-point interfaces do not have this problem, because multiple end points are not present. With or without Cisco Express Forwarding enabled, using an exit interface when configuring a static route is a viable option.

What is the purpose of the overload keyword in the ip nat inside source list 1 pool NAT_POOL overload command?

It allows many inside hosts to share one or a few inside global addresses. Dynamic NAT uses a pool of inside global addresses that are assigned to outgoing sessions. If there are more internal hosts than public addresses in the pool, then an administrator can enable port address translation with the addition of the overload keyword. With port address translation, many internal hosts can share a single inside global address because the NAT device will track the individual sessions by Layer 4 port number.

Which layer in the Open Systems Interconnection (OSI) model defines an Internet Protocol (IP) address that helps in selecting the route to the destination?

Network Layer

After a license has been purchased and installed, what is the next step that is required before it is activated

Reboot the router After the license is installed, the device needs to be reloaded to activate the license.

R1#show ip route <output omitted> Gateway of last resort is 0.0.0.0 to network 0.0.0.0 10.0.0.0/8 is variably subnetted, 2 subnets, 2 masks C 10.0.0.0/30 is directly connected, Serial0/0/0 L 10.0.0.1/32 is directly connected, Serial0/0/0 192.168.10.0/24 is variably subnetted, 2 subnets, 2 masks C 192.168.10.0/24 is directly connected, GigabitEthernet0/1 L 192.168.10.1/32 is directly connected, GigabitEthernet0/1 192.168.11.0/24 is variably subnetted, 2 subnets, 2 masks C 192.168.11.0/24 is directly connected, GigabitEthernet0/0 L 192.168.11.1/32 is directly connected, GigabitEthernet0/0 S* 0.0.0.0/0 is directly connected, Serial0/0/0 Refer to the exhibit. When a packet arrives on interface Serial0/0/0 on R1, with a destination IP address of PC1, which two events occur? (Choose two)

Router R1 will forward the packet out Gig0/1. Router R1 will de-encapsulate the packet and encapsulate it in an Ethernet frame. A router will look in the routing table for a destination network and locate an exit interface to forward a packet to a destination. After the exit interface is determined, the router will encapsulate a packet into the correct frame type.

Synchronous Optical NETwork (SONET)

SONET

Which topology is used in Wide Area Networks (WANs)?

SONET

A switch is used to provide dedicated bandwidth to each node by eliminating the possibility of collisions on the switch port where the node resides. Switches work at Layer 2 in the Open System Interconnection (OSI) model and perform the function of separating collision domains.

Switch

The graphic displays the following text: R1(config)# do show ip route <output omitted> Gateway of last resort is 0.0.0.0 to network 0.0.0.0 10.0.0.0/8 is variably subnetted, 2 subnets, 2 masks C 10.0.0.0/30 is directly connected, Serial0/0/0 L 10.0.0.1/32 is directly connected, Serial0/0/0 172.16.0.0/24 is subnetted, 1 subnets R 172.16.1.0/24 [120/1] via 10.0.0.2, 00:00:04, Serial0/0/0 192.168.10.0/24 is variably subnetted, 2 subnets, 2 masks C 192.168.10.0/24 is directly connected, GigabitEthernet0/1 L 192.168.10.1/32 is directly connected, GigabitEthernet0/1 192.168.11.0/24 is variably subnetted, 2 subnets, 2 masks C 192.168.11.0/24 is directly connected, GigabitEthernet0/0 L 192.168.11.1/32 is directly connected, GigabitEthernet0/0 S* 0.0.0.0/0 is directly connected, Serial0/0/0 R1(config)# ip route 172.16.1.0 255.255.255.0 s0/0/0 Refer to the exhibit. What would happen after the IT administrator enters the new static route?

The 172.16.1.0 route learned from RIP would be replaced with the 172.16.1.0 static route. A route will be installed in a routing table if there is not another routing source with a lower administrative distance. If a route with a lower administrative distance to the same destination network as a current route is entered, the route with the lower administrative distance will replace the route with a higher administrative distance.

A technician is programming switch SW3 to manage voice and data traffic through port Fa0/20. What, if anything, is wrong with the configuration?

The command used to assign the voice VLAN to the switch port is incorrect. The voice VLAN should be configured with the switchport voice vlan 150 command. A switch interface can be configured to support one data VLAN and one voice VLAN. The mls qos trust cos associates with the interface. Voice traffic must be trusted so that fields within the voice packet can be used to classify it for QoS.

R1# show ipv6 route <output omitted> S ::/0 [1/0] via Serial0/0/0, directly connected C 2001:DB8:CAFE:1::/64 [0/0] via GigabitEthernet0/1, directly connected L 2001:DB8:CAFE:1::1/128 [0/0] via GigabitEthernet0/1, receive C 2001:DB8:CAFE:2::/64 [0/0] via GigabitEthernet0/0, directly connected L 2001:DB8:CAFE:2::1/128 [0/0] via GigabitEthernet0/0, receive C 2001:DB8:CAFE:3::/64 [0/0] via Serial0/0/0, directly connected L 2001:DB8:CAFE:3::1/128 [0/0] via Serial0/0/0, receive S 2001:DB8:CAFE:4::1/128 [1/0] via Serial0/0/0, directly connected L FF00::/8 [0/0] via Null0, receive Refer to the exhibit. How was the host route 2001:DB8:CAFE:4::1/128 installed in the routing table?

The route was manually entered by an administrator. A host route is an IPv6 route with a 128-bit mask. A host route can be installed in a routing table automatically when an IP address is configured on a router interface or manually if a static route is created.

Data is being sent from a source PC to a destination server. Which three statements correctly describe the function of TCP or UDP in this situation? (Choose three.)

The source port field identifies the running application or service that will handle data returning to the PC. UDP segments are encapsulated within IP packets for transport across the network. The UDP destination port number identifies the application or service on the server which will handle the data. Layer 4 port numbers identify the application or service which will handle the data. The source port number is added by the sending device and will be the destination port number when the requested information is returned. Layer 4 segments are encapsulated within IP packets. UDP, not TCP, is used when low overhead is needed. A source IP address, not a TCP source port number, identifies the sending host on the network. Destination port numbers are specific ports that a server application or service monitors for requests.

The exhibit displays the following information: R1(config)# logging 192.168.1.5 R1(config)# logging trap 3 R1(config)# logging source-interface GigabitEthernet 0/1 Refer to the exhibit. Which three events will occur as a result of the configuration shown on R1? (Choose three.

The syslog messages will contain the IP address the GigabitEthernet 0/1 interface. Messages that are sent to the syslog server will use 192.168.1.5 as the destination IP address. Messages that are sent to the syslog server will be limited to levels 3 or lower. The logging 192.168.1.5 command specifies the address of the syslog server where the messages are to be sent. The logging trap 3 command specifies that messages sent to the syslog server will be limited to severity levels of 3 and lower. The logging source-interface GigabitEthernet 0/1 command will set the source address of all syslog messages to be the address of interface GigabitEthernet 0/1.

Which three statements characterize UDP?

UDP provides basic connectionless transport layer functions. UDP relies on application layer protocols for error detection. UDP is a low overhead protocol that does not provide sequencing or flow control mechanisms. UDP is a simple protocol that provides the basic transport layer functions. It has much lower overhead than TCP because it is not connection-oriented and does not offer the sophisticated retransmission, sequencing, and flow control mechanisms that provide reliability.

When creating an IPv6 static route, when must a next-hop IPv6 address and an exit interface both be specified?

When the next hop is a link-local address Link-local addresses are only unique on a given link, and the same address could exist out multiple interfaces. For that reason, any time a static route specifies a link-local address as the next hop, it must also specify the exit interface. This is called a fully specified static route.

Which type of IPv6 address refers to any unicast address that is assigned to multiple hosts?

anycast The IPv6 specifications include anycast addresses. An anycast address is any unicast IPv6 address that is assigned to multiple devices.

characteristic of the core layer in the Cisco three-layer hierarchical model?

emphasis on high speed

The exhibit shows partial output of this router command: R1(config)# do show ip route <output omitted> Gateway of last resort is 0.0.0.0 to network 0.0.0.0 10.0.0.0/8 is variably subnetted, 2 subnets, 2 masks C 10.0.0.0/30 is directly connected, Serial0/0/0 L 10.0.0.1/32 is directly connected, Serial0/0/0 172.16.0.0/24 is subnetted, 1 subnets R 172.16.1.0/24 [120/1] via 10.0.0.2, 00:00:04, Serial0/0/0 192.168.10.0/24 is variably subnetted, 2 subnets, 2 masks C 192.168.10.0/24 is directly connected, GigabitEthernet0/1 L 192.168.10.1/32 is directly connected, GigabitEthernet0/1 192.168.11.0/24 is variably subnetted, 2 subnets, 2 masks C 192.168.11.0/24 is directly connected, GigabitEthernet0/0 L 192.168.11.1/32 is directly connected, GigabitEthernet0/0 S* 0.0.0.0/0 is directly connected, Serial0/0/0 Refer to the exhibit. Which static route would an IT technician enter to create a backup route to the 172.16.1.0 network that is only used if the primary RIP learned route fails?

ip route 172.16.1.0 255.255.255.0 s0/0/0 121 A backup static route is called a floating static route. A floating static route has an administrative distance greater than the administrative distance of another static route or dynamic route.

Which ACE would permit traffic from hosts only on the 192.168.8.0/22 subnet?

permit 192.168.8.0 0.0.3.255 The only filtering criteria specified for a standard access list is the source IPv4 address. The wild card mask is written to identify what parts of the address to match, with a 0 bit, and what parts of the address should be ignored, which a 1 bit.

37 What information can be verified through the show ip dhcp binding command?

the IPv4 addresses that are assigned to hosts by the DHCP server The show ip dhcp binding command shows a list of IPv4 addresses and the MAC addresses of the hosts to which they are assigned. Using this information an administrator can determine which host interfaces have been assigned to specific hosts.

What information can be verified through the show ip dhcp binding command?

the IPv4 addresses that are assigned to hosts by the DHCP server The show ip dhcp binding command shows a list of IPv4 addresses and the MAC addresses of the hosts to which they are assigned. Using this information an administrator can determine which host interfaces have been assigned to specific hosts.

A user sends an HTTP request to a web server on a remote network. During encapsulation for this request, what information is added to the address field of a frame to indicate the destination?

the MAC address of the default gateway A frame is encapsulated with source and destination MAC addresses. The source device will not know the MAC address of the remote host. An ARP request will be sent by the source and will be responded to by the router. The router will respond with the MAC address of its interface, the one which is connected to the same network as the source.

Which two things should a network administrator modify on a router to perform password recovery? (Choose two.)

the configuration register value the startup configuration file The factory setting for the configuration register is 0x2102. For password recovery, the administrator should perform this procedure: Step 1. Enter the ROMMON mode. Step 2. Change the configuration register to 0x2142 to ignore the startup config file. Step 3. Make necessary changes to the original startup config file. Step 4. Save the new configuration.


संबंधित स्टडी सेट्स

CA HA 7 LOWER appendicular skeleton

View Set

Child Development and Stages (Infant/Toddler/Pre-schooler/School-Age/Adolescent)

View Set

Quiz 5 - cropping, resizing, and rotating

View Set

Bushong 1-1 Nature of our Surroundings

View Set

Pharmacology - Cardiovascular Medications

View Set