CCNA Exam Practice Questions Complete

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

"Given an IP address 172.16.28.252 with a subnet mask of 255.255.240.0, what is the correct network address? A. 172.16.16.0 B. 172.16.24.0 C. 172.16.0.0 D. 172.16.28.0"

A

"Question 10 A Cisco router is booting and has just completed the POST process. It is now ready to find and load an IOS image. What function does the router perform next? A. It checks the configuration register B. It attempts to boot from a TFTP server C. It loads the first image file in flash memory D. It inspects the configuration file in NVRAM for boot instructions"

A

"Which command allows you to verify the encapsulation type (CISCO or IETF) for a frame relay link? A. show frame-relay map B. show frame-relay lmi C. show inter serial D. show frame-relay pvc"

A

"You are working in a data center environment and are assigned the address range 10.188.31.0/23. You are asked to develop an IP addressing plan to allow the maximum number of subnets with as many as 30 hosts each.Which IP address range meets these requirements? A. 10.188.31.0/27 B. 10.188.31.0/26 C. 10.188.31.0/29 D. 10.188.31.0/28 E. 10.188.31.0/25"

A

A network administrator creates a layer 3 EtherChannel, bundling four interfaces into channel group 1. On what interface is the IP address configured? A. the port-channel 1 interface B. the highest number member interface C. all member interfaces D. the lowest number member interface

A

A network administrator is verifying the configuration of a newly installed host by establishing an FTP connection to a remote server. What is the highest layer of the protocol stack that the network administrator is using for this operation? A. application B. presentation C. session D. transport E. internet F. data link

A

Assuming the default switch configuration which vlan range can be added modified and removed on a Cisco switch? A. 2 through 1001 B. 1 through 1001 C. 1 through 1002 D. 2 through 1005

A

At which layer of the OSI model does PPP perform? A. Layer 2 B. Layer 3 C. Layer 4 D. Layer 5

A

At which layer of the OSI model is RSTP used to prevent loops? A. data link B. network C. physical D. transport

A

On corporate network, hosts on the same VLAN can communicate with each other, but they are unable to communicate with hosts on different VLANs. What is needed to allow communication between the VLANs? A. a router with subinterfaces configured on the physical interface that is connected to the switch B. a router with an IP address on the physical interface connected to the switch C. a switch with an access link that is configured between the switches D. a switch with a trunk link that is configured between the switches

A

VLAN 3 is not yet configured on your switch. What happens if you set the switchport access vlan 3 command interface configuration mode? A. The command is accepted and the respective VLAN is added to vlan.dat. B. The command is rejected. C. The command is accepted and you must configure the VLAN manually. D. The port turns amber.

A

What is the function of the command switchport trunk native vlan 999 on a trunk port? A. It designates VLAN 999 for untagged traffic. B. It blocks VLAN 999 traffic from passing on the trunk. C. It creates a VLAN 999 interface. D. It designates VLAN 999 as the default for all unknown tagged traffic.

A

Which command shows your active Telnet connections? A. show sessions B. show cdp neighbors C. show users D. show queue

A

"Which two statements about static NAT translations are true? (choose two) A. They are always present in the NAT table. B. They allow connection to be initiated from the outside. C. They can be configured with access lists, to allow two or more connections to be initiated from the outside. D. They require no inside or outside interface markings because addresses are statically defined."

A B

Which two commands can be used to verify a trunk link configuration status on a Cisco switch? (choose two) A. show interfaces trunk B. show interfaces switchport C. show ip interface brief D. show interfaces vlan

A B

Which two benefits are provided by creating VLANs? (Choose two) A. added security B. dedicated bandwidth C. provides segmentation D. allows switches to route traffic between subinterfaces E. contains collisions

A C

Which two options are valid WAN connectivity methods? (Choose two) A. PPP B. WAP C. DSL D. L2TPv3 E. Ethernet

A C

Which three of these statements regarding 802.1Q trunking are correct? (Choose three) A. 802.1Q native VLAN frames are untagged by default. B. 802.1Q trunking ports can also be secure ports. C. 802.1Q trunks can use 10 Mb/s Ethernet interfaces. D. 802.1Q trunks require full-duplex, point-to-point connectivity. E. 802.1Q trunks should have native VLANs that are the same at both ends.

A C E

Which three elements must be used when you configure a router interface for vlan trunking? (Choose three) A. one IP network or subnetwork for each subinterface B. subinterface numbering that matches vlan tages C. subinterface encapsulation identifiers that match vlan tags D. a management domain for each subinterface G E. one physical interface for each subinterface F. one subinterface per vlan

A C F

Which of the following correctly describe steps in the OSI data encapsulation process? (Choose two) A. The transport layer divides a data stream into segments and may add reliability and flow control information. B. The data link layer adds physical source and destination addresses and an FCS to the segment. C. Packets are created when the network layer encapsulates a frame with source and destination host addresses and protocol-related control information. D. Packets are created when the network layer adds Layer 3 addresses and control information to a segment. E. The presentation layer translates bits into voltages for transmission across the physical link.

A D

Which two protocols are used by bridges and/or switches to prevent loops in a layer 2 network? (Choose two) A. 802.1d B. VTP C. 802.1q D. STP E. SAP

A D

Which of the following describes the roles of devices in a WAN? (Choose three.) A. A CSU/DSU terminates a digital local loop B. A modem terminates a digital local loop C. A CSU/DSU terminates an analog local loop D. A modem terminates an analog local loop E. A router is commonly considered a DTE device F. A router is commonly considered a DCE device

A D E

Which three statements accurately describe layer 2 Ethernet switches? (choose three) A. Microsegmentation decreases the number of collisions on the network. B. If a switch receives a frame for an unknown destination.it uses ARP to resolve the address. C. Spanning Tree Protocol allows switches to automatically share vlan information. D. In a properly functioning network with redundant switched paths, each switched segment will contain one root bridge with all its ports in the forwarding state. All other switches in that broadcast domain will have only one root port. E. Establishing vlans increases the number of broadcast domains. F. Switches that are configured with vlans make forwarding decisions based on both layer 2 and layer 3 address information.

A D E

Which router IOS commands can be used to troubleshoot LAN connectivity problems? (Choose three) A. ping B. tracert C. ipconfig D. show ip route E. winipcfg F. show interfaces

A D F

"Question 7 For what two purposes does the Ethernet protocol use physical addresses? (Choose two) A. to uniquely identify devices at Layer 2 B. to allow communication with devices on a different network C. to differentiate a Layer 2 frame from a Layer 3 packet D. to establish a priority system to determine which device gets to transmit first E. to allow communication between different devices on the same network F. to allow detection of a remote device when its physical address is unknown"

A E

"What are two benefits of using NAT? (choose two) A. NAT protects network security because private networks are not advertised. B. NAT accelerates the routing process because no modifications are made on the packets. C. Dynamic NAT facilitates connections from the outside of the network. D. NAT facilitates end-to-end communication when IPsec is enable. E. NAT eliminates the need to re-address all host that require external access. F. NAT conserves addresses through host MAC-level multiplexing."

A E

"Which two are advantages of static routing when compared to dynamic routing? (choose two) A. Security increases because only the network administrator may change the routing tables. B. Configuration complexity decreases as network size increases. C. Routing updates are automatically sent to neighbors. D. Route summarization is computed automatically by the router. E. Routing traffic load is reduced when used in stub network links. F. An efficient algorithm is used to build routing tables using automatic updates. G. Routing tables adapt automatically to topology changes."

A E

"Which two benefits are provided by using a hierarchical addressing network addressing scheme? (Choose two) A. reduces routing table entries B. auto-negotiation of media rates C. efficient utilization of MAC addresses D. dedicated communications between devices E. ease of management and troubleshooting"

A E

What are three advantages of VLANs? (Choose three) A. VLANs establish broadcast domains in switched networks. B. VLANs utilize packet filtering to enhance network security. C. VLANs provide a method of conserving IP addresses in large networks. D. VLANs provide a low-latency internetworking alternative to routed networks. E. VLANs allow access to network services based on department, not physical location. F. VLANs can greatly simplify adding, moving, or changing hosts on the network.

A E F

"A router has learned three possible routes that could be used to reach a destination network. One route is from EIGRP and has a composite metric of 20514560. Another route is from OSPF with a metric of 782. The last is from RIPv2 and has a metric of 4. Which route or routes will the router install in the routing table? A. the OSPF route B. the EIGRP route C. the RIPv2 route D. all three routes E. the OSPF and RIPv2 routes"

B

"Which encapsulation type is a Frame Relay encapsulation type that is supported by Cisco routers? A. Q933-A Annex A B. IETF C. ANSI Annex D D. HDLC"

B

"You have been asked to come up with a subnet mask that will allow all three web servers to be on the same network while providing the maximum number of subnets. Which network address and subnet mask meet this requirement? A. 192.168.252.0 255.255.255.252 B. 192.168.252.8 255.255.255.248 C. 192.168.252.8 255.255.255.252 D. 192.168.252.16 255.255.255.240 E. 192.168.252.16 255.255.255.252"

B

Which of the following are benefits of VLANs? (Choose three) A. They increase the size of collision domains. B. They allow logical grouping of users by function. C. They can enhance network security. D. They increase the size of broadcast domains while decreasing the number of collision domains. E. They increase the number of broadcast domains while decreasing the size of the broadcast domains. F. They simplify switch administration.

B C E

A network administrator needs to configure a serial link between the main office and a remote location. The router at the remote office is a non-Cisco router. How should the network administrator configure the serial interface of the main office router to make the connection? A. Main(config)# interface serial 0/0 Main(config-if)# ip address 172.16.1.1 255.255.255.252 Main(config-if)# no shut B. Main(config)# interface serial 0/0 Main(config-if)# ip address 172.16.1.1 255.255.255.252 Main(config-if)# encapsulation ppp Main(config-if)# no shut C. Main(config)# interface serial 0/0 Main(config-if)# ip address 172.16.1.1 255.255.255.252 Main(config-if)# encapsulation frame-relay Main(config-if)# authentication chap Main(config-if)# no shut D. Main(config)# interface serial 0/0 Main(config-if)#ip address 172.16.1.1 255.255.255.252 Main(config-if)#encapsulation ietf Main(config-if)# no shut

B

A technician has installed SwitchB and needs to configure it for remote access from the management workstation connected SwitchA. Which set of commands is required to accomplish this task? A. SwitchB(config)#interface FastEthernet 0/1 SwitchB(config)#ip address 192.168.8.252 255.255.255.0 SwitchB(config)#no shutdown B. SwitchB(config)#ip default-gateway 192.168.8.254 SwitchB(config)#interface vlan 1 SwitchB(config)#ip address 192.168.8.252 255.255.255.0 SwitchB(config)#no shutdown C. SwitchB(config)#interface vlan 1 SwitchB(config)#ip address 192.168.8.252 255.255.255.0 SwitchB(config)#ip default-gateway 192.168.8.254 255.255.255.0 SwitchB(config)#no shutdown D. SwitchB(config)#ip default-network 192.168.8.254 SwitchB(config)#interface vlan 1 SwitchB(config)#ip address 192.168.8.252 255.255.255.0 SwitchB(config)#no shutdown

B

C-router is to be used as a ―router-on-a-stick‖ to route between the VLANs. All the interfaces have been properly configured and IP routing is operational. The hosts in the VLANs have been configured with the appropriate default gateway. What can be said about this configuration? A. These commands need to be added to the configuration: C-router(config)# router eigrp 123 C-router(config-router)# network 172.19.0.0 B. No further routing configuration is required. C. These commands need to be added to the configuration: C-router(config)# router ospf 1 C-router(config-router)# network 172.19.0.0 0.0.3.255 area 0 D. These commands need to be added to the configuration: C-router(config)# router rip C-router(config-router)# network 172.19.0.0

B

How does using the service password encryption command on a router provide additional security? A. by encrypting all passwords passing through the router B. by encrypting passwords in the plain text configuration file C. by requiring entry of encrypted passwords for access to the device D. by configuring an MD5 encrypted key to be used by routing protocols to validate routing exchanges E. by automatically suggesting encrypted passwords for use in configuring the router

B

In a switched environment, what does the IEEE 802.1Q standard describe? A. the operation of VTP B. a method of VLAN trunking C. an approach to wireless LAN communication D. the process for root bridge selection E. VLAN pruning

B

In which circumstance are multiple copies of the same unicast frame likely to be transmitted in a switched LAN? A. after broken links are re-established B. in an improperly implemented redundant topology C. when upper-layer protocols require high reliability D. during high traffic periods E. when a dual ring topology is in use

B

Question 1 Where does routing occur within the DoD TCP/IP reference model? A. application B. internet C. network D. transport

B

The network administrator normally establishes a Telnet session with the switch from host A. The administrator's attempt to establish a connect via Telnet to the switch from host B fails, but pings from host B to other two hosts are successful. What is the issue for this problem? A. Host B and the switch need to be in the same subnet. B. The switch needs an appropriate default gateway assigned. C. The switch interface connected to the router is down. D. Host B need to be assigned an IP address in vlan 1.

B

What parameter can be different on ports within an EtherChannel? A. speed B. DTP negotiation settings C. trunk encapsulation D. duplex

B

Which Layer 2 protocol encapsulation type supports synchronous and asynchronous circuits and has built-in security mechanisms? A. HDLC B. PPP C. X.25 D. Frame Relay

B

Which statement about vlan operation on Cisco Catalyst switches is true? A. when a packet is received from an 802.1Q trunk, the vlan id can be determined from the source MAC address table. B. unknown unicast frames are retransmitted only to the ports that belong to the same vlan. C. ports between switches should be configured in access mode so that vlans can span across the ports. D. broadcast and multicast frames are retransmitted to ports that are configured on different vlan.

B

"What are two characteristics of Frame Relay point-to-point subinterfaces? (Choose two) A. They create split-horizon issues. B. They require a unique subnet within a routing domain. C. They emulate leased lines. D. They are ideal for full-mesh topologies. E. They require the use of NBMA options when using OSPF."

B C

Which two statements about using the CHAP authentication mechanism in a PPP link are true? (Choose two) A. CHAP uses a two-way handshake. B. CHAP uses a three-way handshake. C. CHAP authentication periodically occurs after link establishment. D. CHAP authentication passwords are sent in plaintext. E. CHAP authentication is performed only upon link establishment. F. CHAP has no protection from playback attacks.

B C

"It has become necessary to configure an existing serial interface to accept a second Frame Relay virtual circuit. Which of the following are required to solve this? (Choose three) A. configure static frame relay map entries for each subinterface network. B. remove the ip address from the physical interface C. create the virtual interfaces with the interface command D. configure each subinterface with its own IP address E. disable split horizon to prevent routing loops between the subinterface networks F. encapsulate the physical interface with multipoint PPP"

B C D

As a network technician, do you know which are valid modes for a switch port used as a VLAN trunk? (Choose three) A. transparent B. auto C. on D. desirable E. blocking F. forwarding

B C D

What are the possible trunking modes for a switch port? (Choose three) A. transparent B. auto C. on D. desirable E. client F. forwarding

B C D

Question 3 Before installing a new, upgraded version of the IOS, what should be checked on the router, and which command should be used to gather this information? (Choose two) A. the amount of available ROM B. the amount of available flash and RAM memory C. the version of the bootstrap software present on the router D. show version E. show processes F. show running-config

B D

Which two link protocols are used to carry multiple VLANs over a single link? (Choose two) A. VTP B. 802.1q C. IGP D. ISL E. 802.3u

B D

"A national retail chain needs to design an IP addressing scheme to support a nationwide network. The company needs a minimum of 300 sub-networks and a maximum of 50 host addresses per subnet. Working with only one Class B address, which of the following subnet masks will support an appropriate addressing scheme? (Choose two) A. 255.255.255.0 B. 255.255.255.128 C. 255.255.252.0 D. 255.255.255.224 E. 255.255.255.192 F. 255.255.248.0"

B E

"An administrator must assign static IP addresses to the servers in a network. For network 192.168.20.24/29, the router is assigned the first usable host address while the sales server is given the last usable host address. Which of the following should be entered into the IP properties box for the sales server? A. IP address: 192.168.20.14 Subnet Mask: 255.255.255.248 Default Gateway: 192.168.20.9 B. IP address: 192.168.20.254 Subnet Mask: 255.255.255.0 Default Gateway: 192.168.20.1 C. IP address: 192.168.20.30 Subnet Mask: 255.255.255.248 Default Gateway: 192.168.20.25 D. IP address: 192.168.20.30 Subnet Mask: 255.255.255.240 Default Gateway: 192.168.20.17 E. IP address: 192.168.20.30 Subnet Mask: 255.255.255.240 Default Gateway: 192.168.20.25"

C

"Question 1 What is the first 24 bits in a MAC address called? A. NIC B. BIA C. OUI D. VAI"

C

"Question 5 A network interface port has collision detection and carrier sensing enabled on a shared twisted pair network. From this statement, what is known about the network interface port? A. This is a 10 Mb/s switch port. B. This is a 100 Mb/s switch port. C. This is an Ethernet port operating at half duplex. D. This is an Ethernet port operating at full duplex. E. This is a port on a network interface card in a PC."

C

"The network administrator needs to address seven LANs. RIP version 1 is the only routing protocol in use on the network and subnet 0 is not being used. What is the maximum number of usable IP addresses that can be supported on each LAN if the organization is using one class C address block? A. 6 B. 8 C. 14 D. 16 E. 30 F. 32"

C

"What command is used to verify the DLCI destination address in a Frame Relay static configuration? A show frame-relay pvc B. show frame-relay lmi C. show frame-relay map D. show frame relay end-to-end"

C

A frame from VLAN1 of switch S1 is sent to switch S2 where the frame received on VLAN2. What causes this behavior? A. trunk mode mismatches B. vlans that do not correspond to a unique IP subnet C. native vlan mismatches D. allowing only vlan 2 on the destination.

C

A network administrator needs to allow only one Telnet connection to a router. For anyone viewing the confguration and issuing the show run command, the password for Telnet access should be encrypted. Which set of commands will accomplish this task? A. service password-encryption access-list 1 permit 192.168.1.0 0.0.0.255 line vty 0 4 login password cisco access-class 1 B. enable password secret line vty 0 login password cisco C. service password-encryption line vty 1 login password cisco D. service password-encryption line vty 0 4 login password cisco

C

Cisco Catalyst switches CAT1 and CAT2 have a connection between them using ports Fa0/13. An 802.1Q trunk is configured between the two switches. On CAT1, VLAN 10 is chosen as native, but on CAT2 the native VLAN is not specified. What will happen in this scenario? A. 802.1Q giants frames could saturate the link. B. VLAN 10 on CAT1 and VLAN 1 on CAT2 will send untagged frames. C. A native VLAN mismatch error message will appear. D. VLAN 10 on CAT1 and VLAN 1 on CAT2 will send tagged frames.

C

Refer to the exhibit. Why is flash memory erased prior to upgrading the IOS image from the TFTP server? Router# copy tftp flash Address or name of remote host []? 192.168.2.167 Source filename []? c1600-k8sy-mz.123-16a.bin Destination filename [c1600-k8sy-mz.123-16a.bin]? Accessing tftp://192.168.2.167/ c1600-k8sy-mz.l23-16a.bin... Erasing flash before copying? [confirm] Erasing the flash filesystem will remove all files! continue? [confirm] Erasing device Eeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeee Eeeeeeeeeeeeeeeeeeeeeeeeeeeeeee ...erased Erase of flash: complete Loading c1600-k8sy-mz.l23-16a.bin from 192.168.2.167 (via Ethernet0): !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! [OK -

C

The network administrator cannot connect to Switch1 over a Telnet session, although the hosts attached to Switch1 can ping the interface Fa0/0 of the router. Given the information in the graphic and assuming that the router and Switch2 are configured properly, which of the following commands should be issued on Switch1 to correct this problem? A. Switch1 (config)# line con0 Switch1 (config-line)# password cisco Switch1 (config-line)#login B. Switch1 (config)# interface fa0/1 Switch 1(config-if)# ip address 192.168.24.3 255.255.255.0 C. Switch1 (config)# ip default-gateway 192.168.24.1 D. Switch1 (config)# interface fa0/1 Switch 1(config-if)# duplex full Switch 1(config-if)# speed 100 E. Switch1 (config)# interface fa0/1 Switch 1(config-if)# switchport mode trunk

C

What is one benefit of PVST+? A. PVST+ reduces the CPU cycles for all the switches in the network. B. PVST+ automatically selects the root bridge location, to provide optimization. C. PVST+ allows the root switch location to be optimized per vlan. D. PVST+ supports Layer 3 load balancing without loops.

C

Which IEEE standard protocol is initiated as a result of successful DTP completion in a switch over FastEthernet? A. 802.3ad B. 802.1w C. 802.1Q D. 802.1d

C

Which command encrypts all plaintext passwords? A. Router# service password-encryption B. Router(config)# password-encryption C. Router(config)# service password-encryption D. Router# password-encryption

C

Which command is used to enable CHAP authentication with PAP as the fallback method on a serial interface? A. (config-if)# authentication ppp chap fallback ppp B. (config-if)# authentication ppp chap pap C. (config-if)# ppp authentication chap pap D. (config-if)# ppp authentication chap fallback ppp

C

Which command would you configure globally on a Cisco router that would allow you to view directly connected Cisco devices? A. enable cdp B. cdp enable C. cdp run D. run cdp

C

Which port state is introduced by Rapid-PVST? A. learning B. listening C. discarding D. forwarding

C

Why will a switch never learn a broadcast address? A. Broadcast frames are never sent to switches. B. Broadcast addresses use an incorrect format for the switching table. C. A broadcast address will never be the source address of a frame. D. Broadcasts only use network layer addressing. E. A broadcast frame is never forwarded by a switch.

C

"Question 6 In an Ethernet network, under what two scenarios can devices transmit? (Choose two) A. when they receive a special token B. when there is a carrier C. when they detect no other devices are sending D. when the medium is idle E. when the server grants access"

C D

What two results would occur if the hub were to be replaced with a switch that is configured with one Ethernet VLAN? (Choose two) A. The number of collision domains would remain the same. B. The number of collision domains would decrease. C. The number of collision domains would increase. D. The number of broadcast domains would remain the same. E. The number of broadcast domains would decrease. F. The number of broadcast domains would increase.

C D

"If IP routing is enabled, which two commands set the gateway of last resort to the default gateway? (Choose two) A. ip default-gateway 0.0.0.0 B. ip route 172.16.2.1 0.0.0.0 0.0.0.0 C. ip default-network 0.0.0.0 D. ip default-route 0.0.0.0 0.0.0.0 172.16.2.1 E. ip route 0.0.0.0 0.0.0.0 172.16.2.1"

C E

"Question 8 Which two locations can be configured as a source for the IOS image in the boot system command? (Choose two) A. RAM B. NVRAM C. flash memory D. HTTP server E. TFTP server F. Telnet server"

C E

What are three benefits of implementing VLANs? (Choose three) A. A more efficient use of bandwidth can be achieved allowing many physical groups to use the same network infrastructure B. Broadcast storms can be mitigated by decreasing the number of broadcast domains,thus increasing their size. C. A higher level of network security can be reached by separating sensitive data traffic from other network traffic. D. Port-based vlans increase switch-port use efficient,thanks to 802.1Q trunks E. A more efficient use of bandwidth can be achieved allowing many logical networks to use the same network infrastructure. F. Broadcast storms can be mitigated by increasing the number of broadcast domains,thus reducing their size. G. VLANs make it easier for IT staff to configure new logical groups,because the vlans all belong to the same broadcast domain.

C E F

"Question 9 What is the difference between a CSU/DSU and a modem? A. A CSU/DSU converts analog signals from a router to a leased line; a modem converts analog signals from a router to a leased line. B. A CSU/DSU converts analog signals from a router to a phone line; a modem converts digital signals from a router to a leased line. C. A CSU/DSU converts digital signals from a router to a phone line; a modem converts analog signals from a router to a phone line. D. A CSU/DSU converts digital signals from a router to a leased line; a modem converts digital signals from a router to a phone line."

D

"A router has two FastEthernet interfaces and needs to connect to four vlans in the local network. How can you accomplish this task, using the fewest physical interfaces and without decreasing network performance? A. Add two more FastEthernet interfaces. B. Add a second router to handle the vlan traffic. C. Use a hub to connect the four vlans with a FastEthernet interface on router. D. Implement a router-on-a-stick configuration."

D

"Question 3 Refer to the exhibit: System flash director File Length Name/status 1 3802992 c827v-y6-mz.121-1.XB [3803056 bytes used,4585552 available, 8388608 total] 8192K bytes of processor board System flash(Read/Write) The technician wants to upload a new IOS in the router while keeping the existing IOS. What is the maximum size of an IOS file that could be loaded if the original IOS is also kept in flash? A. 3MB B. 5MB C. 7MB D. 4MB"

D

"The network administrator is asked to configure 113 point-to-point links. Which IP addressing scheme best defines the address range and subnet mask that meet the requirement and waste the fewest subnet and host addresses? A. 10.10.0.0/18 subnetted with mask 255.255.255.252 B. 10.10.0.0/25 subnetted with mask 255.255.255.252 C. 10.10.0.0/24 subnetted with mask 255.255.255.252 D. 10.10.0.0/23 subnetted with mask 255.255.255.252 E. 10.10.0.0/16 subnetted with mask 255.255.255.252"

D

"The output of the show frame-relay pvc command shows "PVC STATUS=INACTIVE". What does this mean? A. The PVC is configured correctly and is operating normally,but no data packets have been detected for more than five minutes. B. The PVC is configured correctly, is operating normally and is no longer actively seeking the address the remote route. C. The PVC is configured correctly, is operating normally and is waiting for interesting to trigger a call to the remote router. D. The PVC is configured correctly on the local switch, but there is a problem on the remote end of the PVC. E. The PVC is not configured on the switch."

D

"What is the result of issuing the frame-relay map ip 192.168.1.2 202 broadcast command? A. defines the destination IP address that is used in all broadcast packets on DLCI 202 B. defines the source IP address that is used in all broadcast packets on DLCI 202 C. defines the DLCI on which packets from the 192.168.1.2 IP address are received D. defines the DLCI that is used for all packets that are sent to the 192.168.1.2 IP address"

D

"What occurs on a Frame Relay network when the CIR is exceeded? A. All TCP traffic is marked discard eligible. B. All UDP traffic is marked discard eligible and a BECN is sent. C. All TCP traffic is marked discard eligible and a BECN is sent. D. All traffic exceeding the CIR is marked discard eligible."

D

"Which parameter can be tuned to affect the selection of a static route as a backup when a dynamic protocol is also being used? A. link bandwidth B. hop count C. link cost D. administrative distance E. link delay"

D

"Which subnet mask would be appropriate for a network address range to be subnetted for up to eight LANs, with each LAN containing 5 to 26 hosts? A. 0.0.0.240 B. 255.255.255.252 C. 255.255.255.0 D. 255.255.255.224 E. 255.255.255.240"

D

A receiving host computes the checksum on a frame and determines that the frame is damaged. The frame is then discarded. At which OSI layer did this happen? A. session B. network C. physical D. data link E. transport

D

A switch is configured with all ports assigned to vlan 2 with full duplex FastEthernet to segment existing departmental traffic. What is the effect of adding switch ports to a new VLAN on the switch? A. More collision domains will be created. B. IP address utilization will be more efficient. C. More bandwidth will be required than was needed previously. D. An additional broadcast domain will be created.

D

Refer to the exhibit. line vty 0 4 password 7 030752180599 login transport input ssh What is the effect of the configuration that is shown? A. It configures SSH globally for all logins. B. It tells the router or switch to try to establish an SSh connection first and if that foils to use Telnet. C. It configures the virtual terminal lines with the password 030752180500. D. It configures a Cisco network device to use the SSH protocol on incoming communications via the virtual terminal ports. E. It allows seven failed login attempts before the VTY lines are temporarily shutdown.

D

Which PPP subprotocol negotiates authentication options? A. NCP B. ISDN C. SUP D. LCP E. DLCI

D

Which term describes a spanning-tree network that has all switch ports in either the blocking or forwarding state? A. redundant B. spanned C. provisioned D. converged

D

"What two statistics appear in show frame-relay map output? (Choose two) A. The number of FECN packets that are received by the router B. The number of BECN packets that are received by the router C. The ip address of the local router D. The value of the local DLCI E. The status of the PVC that is configured on the router"

D E

What can be done to secure the virtual terminal interfaces on a router? (Choose two) A. Administratively shut down the interface. B. Physically secure the interface. C. Create an access list and apply it to the virtual terminal interfaces with the access-group command. D. Configure a virtual terminal password and login process. E. Enter an access list and apply it to the virtual terminal interfaces using the access-class command.

D E

Which two of these are characteristics of the 802.1Q protocol? (Choose two) A. It is a layer 2 messaging protocol which maintains vlan configurations across network. B. It includes an 8-bit field which specifies the priority of a frame. C. It is used exclusively for tagging vlan frames and does not address network reconvergence following switched network topology changes. D. It modifies the 802.3 frame header and thus requires that the FCS be recomputed. E. It is a trunking protocol capable of earring untagged frames.

D E

"A router receives information about network 192.168.10.0/24 from multiple sources. What will the router consider the most reliable information about the path to that network? A. an OSPF update for network 192.168.0.0/16 B. a static router to network 192.168.10.0/24 C. a static router to network 192.168.10.0/24 with a local serial interface configured as the next hop D. a RIP update for network 192.168.10.0/24 E. a directly connected interface with an address of 192.168.10.254/24 F. a default route with a next hop address of 192.168.10.1"

E

"Gateway of last resort is not set 192.168.25.0/30 is subnetted, 4 subnets D 192.168.25.20 [90/2681856] via 192.168.15.5, 00:00:10, Serial0/1 D 192.168.25.16 [90/1823638] via 192.168.15.5, 00:00:50, Serial0/1 D 192.168.25.24 [90/3837233] via 192.168.15.5, 00:05:23, Serial0/1 D 192.168.25.28 [90/8127323] via 192.168.15.5, 00:06:45, Serial0/1 C 192.168.15.4/30 is directly connected, Serial0/1 C 192.168.2.0/24 is directly connected, FastEthernet0/0 Which address and mask combination a summary of the routes learned by EIGRP? A. 192.168.25.0 255.255.255.240 B. 192.168.25.16 255.255.255.252 C. 192.168.25.0 255.255.255.252 D. 192.168.25.28 255.255.255.240 E. 192.168.25.16 255.255.255.240 F. 192.168.25.28 255.255.255.240"

E

"The command frame-relay map ip 10.121.16.8 102 broadcast was entered on the router. Which of the following statements is true concerning this command? A. This command should be executed from the global configuration mode. B. The IP address 10.121.16.8 is the local router port used to forward data. C. 102 is the remote DLCI that will receive the information. D. This command is required for all Frame Relay configurations. E. The broadcast option allows packets, such as RIP updates, to be forwarded across the PVC."

E

Refer to the exhibit. An administrator pings the default gateway at 10.10.10.1 and sees the output as shown. At which OSI layer is the problem? C:\> ping 10.10.10.1 Pinging 10.10.10.1 with 32 bytes of data: Request timed out. Request timed out. Request timed out. Request timed out. Ping statistics for 10.10.10.1: Packets: sent - 4, Received = 0, Lost - 4 (100% loss) C. access layer D. session layer E. network layer

E

What is a global command? A. a command that is available in every release of IOS, regardless of the version or deployment status B. a command that can be entered in any configuration mode C. a command that is universal in application and supports all protocols D. a command that is implemented in all foreign and domestic IOS versions E. a command that is set once and affects the entire router

E

What is the effect of using the service password-encryption command? A. Only passwords configured after the command has been entered will be encrypted. B. Only the enable password will be encrypted. C. Only the enable secret password will be encrypted D. It will encrypt the secret password and remove the enable secret password from the configuration. E. It will encrypt all current and future passwords.

E

What value is primarily used to determine which port becomes the root port on each non-root switch in a spanning-tree topology? A. lowest port MAC address B. port priority number and MAC address. C. VTP revision number D. highest port priority number. E. path cost

E

Which layer in the OSI reference model is responsible for determining the availability of the receiving program and checking to see if enough resources exist for that communication? A. transport B. network C. presentation D. session E. application

E

What does a Layer 2 switch use to decide where to forward a received frame? A. source MAC address B. source IP address C. source switch port D. destination IP address E. destination port address F. destination MAC address

F


संबंधित स्टडी सेट्स

Organizational Behavior Ch. 5/6/7/8 Exam #2

View Set

World Geography: High Middle Ages

View Set

24. Identify the electrical events associated with a normal electrocardiogram (ECG) and identify an abnormal ECG.

View Set

The Client with Cardiac Problems

View Set

CompTIA CySA+ Practice Certification Exam

View Set

Chapter 15: Forecasting and Reading Homework

View Set

(English III) Act One Scene 2/3 Study Guide- Jaren Katz

View Set

Real Estate Unit 29-Title Issues

View Set

Español Módulo 3: El sistema político

View Set