CCENT (ICND1) Practice Certification Exam

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Which three statements accurately describe duplex and speed settings on Cisco 2960 switches? (Choose three.) Enabling autonegotiation on a hub will prevent mismatched port speeds when connecting the hub to the switch. An autonegotiation failure can result in connectivity issues. When the speed is set to 1000 Mb/s, the switch ports will operate in full-duplex mode. By default, the autonegotiation feature is disabled. The duplex and speed settings of each switch port can be manually configured. By default, the speed is set to 100 Mb/s and the duplex mode is set to autonegotiation.

- An autonegotiation failure can result in connectivity issues. - When the speed is set to 1000 Mb/s, the switch ports will operate in full-duplex mode. - The duplex and speed settings of each switch port can be manually configured.

A network administrator has been allocated the IPv4 10.10.240.0/20 block of addresses for a LAN. Two devices on two different, but contiguous, subnets on the LAN have been assigned the addresses 10.10.247.1/21 and 10.10.248.10/24, respectively. The administrator has to create a third subnet from the remaining address range. To optimize the use of this address space, the new subnet will follow on directly from the existing subnets. What is the first available host address in the next available subnet?​ 10.10.250.1 10.10.249.1 10.10.248.17 10.10.255.17

10.10.249.1

Refer to the exhibit. Fill in the blank. There are __________ collision domains in the topology.​ https://assessment.netacad.net/assessment/images/i211557v1n1_211557.png (back-up link: http://puu.sh/tqkbZ/eb3e1fa4d8.png)

12

Refer to the exhibit. OSPFv2 has been configured on router R1, and the router-id command has not been manually configured. When the network administrator reboots router R1, what will be the value of the OSPF router ID? 10.0.10.2 192.168.2.254 172.16.1.1 10.15.15.1 https://assessment.netacad.net/assessment/images/i215702v1n1_215702.png (back-up link: http://puu.sh/tqk3f/021b5c4da3.png)

172.16.1.1

What is the most compressed representation of the IPv6 address 2001:0000:0000:abcd:0000:0000:0000:0001? 2001:0:abcd::1 2001:0:0:abcd::1 2001::abcd::1 2001:0000:abcd::1 2001::abcd:0:1

2001:0:0:abcd::1

Given IPv6 address prefix 2001:db8::/48, what will be the last subnet that is created if the subnet prefix is changed to /52? 2001:db8:0:8000::/52 2001:db8:0:f000::/52 2001:db8:0:f00::/52 2001:db8:0:f::/52

2001:db8:0:f000::/52

An organization is assigned an IPv6 address block of 2001:db8:0:ca00::/56. How many subnets can be created without using bits in the interface ID space? 4096 1024 256 512

256

A network administrator is designing an IPv4 addressing scheme and requires these subnets. 1 subnet of 100 hosts 2 subnets of 80 hosts 2 subnets of 30 hosts 4 subnets of 20 hosts Which combination of subnets and masks will provide the best addressing plan for these requirements? 1 subnet of 126 hosts with a 255.255.255.192 mask 2 subnets of 80 hosts with a 255.255.255.224 mask 6 subnets of 30 hosts with a 255.255.255.240 mask 9 subnets of 126 hosts with a 255.255.255.128 mask 3 subnets of 126 hosts with a 255.255.255.128 mask 6 subnets of 30 hosts with a 255.255.255.224 mask 3 subnets of 126 hosts with a 255.255.255.192 mask 6 subnets of 30 hosts with a 255.255.255.240 mask

3 subnets of 126 hosts with a 255.255.255.128 mask 6 subnets of 30 hosts with a 255.255.255.224 mask

Fill in the blank. A late collision occurs after ___ bits of a frame have been transmitted.

512

How many /30 subnets can be created from one /27 subnet? 8 6 2 4

8

What are three characteristics of CSMA/CD? (Choose three.) A jam signal indicates that the collision has cleared and the media is not busy. A device listens and waits until the media is not busy before transmitting. After detecting a collision, hosts can attempt to resume transmission after a random time delay has expired. Devices can be configured with a higher transmission priority. All of the devices on a segment see data that passes on the network medium. The device with the electronic token is the only one that can transmit after a collision.

A device listens and waits until the media is not busy before transmitting. After detecting a collision, hosts can attempt to resume transmission after a random time delay has expired. All of the devices on a segment see data that passes on the network medium.

Which three statements describe a DHCP Discover message? (Choose three.) The source MAC address is 48 ones (FF-FF-FF-FF-FF-FF). All hosts receive the message, but only a DHCP server replies. The destination IP address is 255.255.255.255. Only the DHCP server receives the message. The message comes from a server offering an IP address. The message comes from a client seeking an IP address.

All hosts receive the message, but only a DHCP server replies. The destination IP address is 255.255.255.255. The message comes from a client seeking an IP address.

Refer to the exhibit. Interfaces Fa0/5, Fa0/7, and Fa0/9 are the only connected ports on the switch CiscoSwitch. All other ports are unused. Which security best practice did the administrator forget to configure?​ Delete VLAN 1 from the switch CiscoSwitch. Configure all unused ports to a 'black-hole' VLAN that is not used for anything on the network.​ All active user ports are associated with VLANs distinct from VLAN 1​. Change the native VLAN to a fixed VLAN other than VLAN 1. https://assessment.netacad.net/assessment/images/i215687v1n1_215687.png (back-up link: http://puu.sh/tqjXm/82ed1f3090.png)

Configure all unused ports to a 'black-hole' VLAN that is not used for anything on the network.​

A network administrator is using the router-on-a-stick model to configure a switch and a router for inter-VLAN routing. What configuration should be made on the switch port that connects to the router? Configure it as a trunk port and allow only untagged traffic. Configure the port as an access port and a member of VLAN1. Configure the port as an 802.1q trunk port. Configure the port as a trunk port and assign it to VLAN1.

Configure the port as an 802.1q trunk port.

Refer to the exhibit. Interfaces Fa0/2, Fa0/4, and Fa0/6 are connected to users on the data network of a switch named CiscoSwitch. Interface Fa0/24 is connected to a file server on the management network. All other ports are unused. Which security best practice did the administrator forget to configure?​​ Delete VLAN 1 from CiscoSwitch.​ Configure all unused ports to a 'black-hole' VLAN that is not used for anything on the network.​​ Disable autonegotiation on interfaces that are not being utilized as a trunk. Change the native VLAN to a fixed VLAN other than VLAN 1.​ https://assessment.netacad.net/assessment/images/i215693v1n1_215693.png (back-up link: http://puu.sh/tqk9Z/bdccb7c3d4.png)

Disable autonegotiation on interfaces that are not being utilized as a trunk.

What is the purpose of deploying dual stack devices? Dual stack allows companies to migrate to IPv6 over time. It permits multiple devices to share a single IPv6 address. It creates redundancy in the network by eliminating a single point of failure. It provides globally unique IPv6 addresses to end devices.

Dual stack allows companies to migrate to IPv6 over time.

How will a router handle static routing differently if Cisco Express Forwarding is disabled? Static routes that use an exit interface will be unnecessary. Serial point-to-point interfaces will require fully specified static routes to avoid routing inconsistencies. It will not perform recursive lookups. Ethernet multiaccess interfaces will require fully specified static routes to avoid routing inconsistencies.

Ethernet multiaccess interfaces will require fully specified static routes to avoid routing inconsistencies.

Refer to the exhibit. A switch with a default configuration connects four hosts. The ARP table for host A is shown. What happens when host A wants to send an IP packet to host D? Host A sends an ARP request to the MAC address of host D. Host D responds with its IP address. Host A sends out a broadcast of FF:FF:FF:FF:FF:FF. Every other host connected to the switch receives the broadcast and host D responds with its MAC address. Host A sends out the packet to the switch. The switch adds the MAC address for host D to the frame and forwards it to the network. Host D sends an ARP request to host A. Host A responds with its MAC address. https://assessment.netacad.net/assessment/images/i220007v1n1_220007.png (back-up link: http://puu.sh/tqkUu/3fbe02699f.png)

Host A sends out a broadcast of FF:FF:FF:FF:FF:FF. Every other host connected to the switch receives the broadcast and host D responds with its MAC address.

What is the purpose of using SSH to connect to a router? It allows a router to be configured using a graphical interface. It allows secure transfer of the IOS software image from an unsecure workstation or server. It allows a secure remote connection to the router command line interface. It allows the router to be monitored through a network management application.

It allows a secure remote connection to the router command line interface.

Which two devices allow hosts on different VLANs to communicate with each other? (Choose two.) Layer 3 switch repeater router hub Layer 2 switch

Layer 3 switch router

Refer to the exhibit. A network administrator has configured R2 for PAT. Why is the configuration incorrect? NAT-POOL2 is bound to the wrong ACL. The static NAT entry is missing. The overload keyword should not have been applied. The ACL does not define the list of addresses to be translated. https://assessment.netacad.net/assessment/images/i215210v1n1_215210.png (back-up link: http://puu.sh/tqlch/3697a3c5cb.png)

NAT-POOL2 is bound to the wrong ACL.

In which memory location are the VLAN configurations of normal range VLANs stored on a Catalyst switch? NVRAM RAM ROM flash

flash

Match the description to the various trunking modes for Cisco 2960 Catalyst switches. Not all options are used. Option 1 - The interface becomes a nontrunk interface regardless of whether the neighboring interface is a trunk interface. Option 2 - The interface becomes a trunk interface if the neighboring interface is set to trunk or desirable mode. Option 3 - The interface becomes a trunk interface even if the neighboring interface is not a trunk interface.

Option 1 - switchport mode access Option 2 - switchport mode dynamic auto Option 3 - switchport mode trunk

Match the order of precedence to the process logic that an OSPFv3 network router goes through in choosing a router ID. (Not all options are used.) (link to image of matching chart: http://puu.sh/tqji9/3c8c05a0e0.png) Flip card to view answers.

Priority 1 - The router uses the explicitly configured router ID if any. Priority 2 - The router uses the highest configured IPv4 address of a loopback interface. Priority 3 - The router uses the highest configured IPv4 address of an active interface. Priority 4 - The router displays a console message to configure the router ID manually.

Which series of commands will cause access list 15 to restrict Telnet access on a router? R1(config)# line vty 0 4 R1(config​-line)# access-class 15 in R1(config)# int gi0/0 R1(config​-if)# access-class 15 in R1(config)# line vty 0 4 R1(config​-line)# ip access-group 15 in R1(config)# int gi0/0 R1(config​-if)# ip access-group 15 in

R1(config)# line vty 0 4 R1(config​-line)# access-class 15 in

A network administrator has enabled single-area OSPFv3 on a router via the ipv6 router ospf 100 command. Which command will enable this OSPFv3 process on an interface of that router?​ R1(config-router)# network 192.168.10.0 0.0.0.255 area 0 R1(config-if)# ipv6 ospf 0 area 100 R1(config-if)# ipv6 ospf 100 area 0 R1(config-router)# network 192.168.10.0 0.0.0.255 area 100​

R1(config-if)# ipv6 ospf 100 area 0

A network administrator has recently implemented OSPFv2 across the entire network topology. Which command can be implemented to prevent the forwarding of OSPF messages to Layer 2 switches and hosts on interface Fast Ethernet 0/1, while maintaining network connectivity? R1(config-router)# passive-interface FastEthernet 0/1 R1(config-if)# no cdp run R1(config-if)# no cdp enable R1(config-if)# no ipv6 ospf 10

R1(config-router)# passive-interface FastEthernet 0/1

Which device connects a local LAN to a geographically separate network? switch hub router bridge

Router

Refer to the exhibit. Routers R1 and R2 are connected via a serial link. One router is configured as the NTP master, and the other is an NTP client. Which two pieces of information can be obtained from the partial output of the show ntp associations detail command on R2? (Choose two.) Router R1 is the master, and R2 is the client. The IP address of R2 is 192.168.1.2. The IP address of R1 is 192.168.1.2. Both routers are configured to use NTPv2. Router R2 is the master, and R1 is the client. https://assessment.netacad.net/assessment/images/i229317v1n1_27941.jpg (back-up link: http://puu.sh/tqjTX/b7a50d4ed3.png)

Router R1 is the master, and R2 is the client. The IP address of R1 is 192.168.1.2.

Refer to the exhibit. Host A sends a data packet to host B. What will be the addressing information of the data packet when it reaches host B? https://assessment.netacad.net/assessment/images/i220008v1n1_220008.png (back-up link: http://puu.sh/tqj3k/6c00d08cf3.png) Flip card to view answer.

Source MAC af:3c:dc:4c:55:66 Destination MAC a0:4c:5f:21:33:77 Source IP 172.16.1.10 Destination IP 172.16.2.10 image of data packet: https://assessment.netacad.net/assessment/images/opt1848777.jpg (back up-link: http://puu.sh/tqj9Q/ff9948c411.png)

A network technician is configuring port security on a LAN switch interface. The security policy requires host MAC addresses to be learned dynamically, stored in the address table, and saved to the switch running configuration. Which command does the technician need to add to the following configuration to implement this policy? Switch(config)# interface fa0/1 Switch(config-if)# switchport mode access Switch(config-if)# switchport port-security Switch(config-if)# switchport port-security maximum 40 Switch(config-if)# switchport port-security mac-address 000B.FCFF.E880 Switch(config-if)# switchport port-security mac-address sticky Switch(config-if)# switchport port-security mac-address

Switch(config-if)# switchport port-security mac-address sticky

What will be the result of adding the command ip dhcp excluded-address 172.16.4.1 172.16.4.5 to the configuration of a local router that has been configured as a DHCP server? Traffic will not be routed from clients with addresses between 172.16.4.1 and 172.16.4.5. Traffic that is destined for 172.16.4.1 and 172.16.4.5 will be dropped by the router. The router will ignore all traffic that comes from the DHCP servers with addresses 172.16.4.1 and 172.16.4.5. The DHCP server function of the router will not issue the addresses from 172.16.4.1 through 172.16.4.5 inclusive.

The DHCP server function of the router will not issue the addresses from 172.16.4.1 through 172.16.4.5 inclusive.

What is the purpose of the SVI on a Cisco switch? The SVI provides a physical interface for remote access to the switch. The SVI adds Layer 4 connectivity between VLANs. The SVI provides a virtual interface for remote access to the switch. The SVI provides a faster method for switching traffic between ports on the switch.

The SVI provides a virtual interface for remote access to the switch.

Which three statements are true about full-duplex operation on an Ethernet network? (Choose three.) The host network card and the switch port must both be in full-duplex mode. The host network card must detect the availability of the media before transmitting. There are no collisions in full-duplex mode. Hub ports are preconfigured for full-duplex mode. A dedicated switch port is required for each node.

The host network card and the switch port must both be in full-duplex mode. There are no collisions in full-duplex mode. A dedicated switch port is required for each node.

Refer to the exhibit. After the configuration that is shown in the exhibit is applied to the SVI, the switch fails to respond to Telnet attempts from a host in the same subnet. What is the cause of the problem? The subnet mask is invalid. The interface is administratively down. The SVI is incorrectly cabled. The address should be applied to interface Fa0/1. The SVI should be interface vlan 1. https://assessment.netacad.net/assessment/images/i215697v1n1_Q4.PNG (back-up link: http://puu.sh/tqiSu/070f885564.png)

The interface is administratively down.

Refer to the exhibit. Which two statements are correct based on the output as shown in the exhibit? (Choose two.) The output is the result of the show ip nat translations command. The output is the result of the show ip nat statistics command. The host with the address 209.165.200.235 will respond to requests by using a source address of 192.168.10.10. Traffic with the destination address of a public web server will be sourced from the IP of 192.168.1.10. The host with the address 209.165.200.235 will respond to requests by using a source address of 209.165.200.235. https://assessment.netacad.net/assessment/images/i215692v1n3_Q2.PNG (back-up link: http://puu.sh/tqksN/4c2ec32f53.png)

The output is the result of the show ip nat translations command. The host with the address 209.165.200.235 will respond to requests by using a source address of 192.168.10.10.

A network engineer is configuring PAT on a router and has issued the command: ip nat source list 1 interface serial 0/1/0 overload Which additional command is required to specify addresses from the 192.168.128.0/18 network as the inside local addresses? access-list 1 permit 192.168.128.0 255.255.192.0 ip nat inside source list 1 pool INSIDE_NAT_POOL access-list 1 permit 192.168.128.0 0.0.127.255 ip nat inside source static 192.168.128.0 209.165.200.254 access-list 1 permit 192.168.128.0 0.0.63.255

access-list 1 permit 192.168.128.0 0.0.63.255

Data is being sent from a source PC to a destination server. Which three statements correctly describe the function of TCP or UDP in this situation? (Choose three.) TCP is the preferred protocol when a function requires lower network overhead. The source port field identifies the running application or service that will handle data returning to the PC. The UDP destination port number identifies the application or service on the server which will handle the data. The TCP process running on the PC randomly selects the destination port when establishing a session with the server. UDP segments are encapsulated within IP packets for transport across the network. The TCP source port number identifies the sending host on the network.

The source port field identifies the running application or service that will handle data returning to the PC. The UDP destination port number identifies the application or service on the server which will handle the data. UDP segments are encapsulated within IP packets for transport across the network.

A user calls the help desk to report that a Windows XP workstation is unable to connect to the network after startup and that a popup window says "This connection has limited or no connectivity." The technician asks the user to issue the ipconfig /all command. The user reports the IP address is 169.254.69.196 with subnet mask of 255.255.0.0 and nothing is displayed for the DNS server IP address. What is the cause of the problem? The workstation is unable to obtain an IP address from a DHCP server. The workstation NIC has malfunctioned. The subnet mask was configured incorrectly. The DNS server IP address needs to be configured.

The workstation is unable to obtain an IP address from a DHCP server.

Refer to the exhibit. A network administrator is reviewing port and VLAN assignments on switch S2 and notices that interfaces Gi0/1 and Gi0/2 are not included in the output. Why would the interfaces be missing from the output? There is a native VLAN mismatch between the switches. They are administratively shut down. There is no media connected to the interfaces. They are configured as trunk interfaces. https://assessment.netacad.net/assessment/images/i215660v1n1_215660.gif (back-up link: http://puu.sh/tqiyT/69222b8599.png)

They are configured as trunk interfaces.

Which three statements characterize UDP? (Choose three.) UDP provides sophisticated flow control mechanisms. UDP relies on IP for error detection and recovery. UDP relies on application layer protocols for error detection. UDP provides connectionless, fast transport of data at Layer 4. UDP provides connection-oriented, fast transport of data at Layer 3. UDP works well when an application does not need to guarantee delivery of data.

UDP relies on application layer protocols for error detection. UDP provides connectionless, fast transport of data at Layer 4. UDP works well when an application does not need to guarantee delivery of data.

Which two issues might cause excessive runt and giant frames in an Ethernet network? (Choose two.) damaged cable connector using the incorrect cable type native VLAN mismatch a malfunctioning NIC excessive collisions incorrectly configured auto-MDIX feature

a malfunctioning NIC excessive collisions

A network administrator is issuing the login block-for 180 attempts 2 within 30 command on a router. Which threat is the network administrator trying to prevent? an unidentified individual who is trying to access the network equipment room a worm that is attempting to access another part of the network a user who is trying to guess a password to access the router a device that is trying to inspect the traffic on a link

a user who is trying to guess a password to access the router

Which address type is not supported in IPv6? multicast private unicast broadcast

broadcast

Refer to the exhibit. How will R1 generate the interface ID portion of the IPv6 address on interface FastEthernet 0/0? by using the interface MAC address with a 16-bit filler by using stateful DHCP by using a randomly generated 64-bit number by using a manually set value of 64 https://assessment.netacad.net/assessment/images/37446.jpg (back-up link: http://puu.sh/tqkSQ/6d4a29c35d.png)

by using the interface MAC address with a 16-bit filler

Refer to the exhibit. A network administrator is investigating a lag in network performance and issues the show interfaces fastethernet 0/0 command. Based on the output that is displayed, what two items should the administrator check next? (Choose two.) cable lengths damaged cable termination incorrect cable types duplex settings electrical interference https://assessment.netacad.net/assessment/images/i215680v1n1_215680.PNG (back-up link: http://puu.sh/tql82/48871aa067.png)

cable lengths duplex settings

Refer to the exhibit. Which password will the administrator need to use on this device to enter privileged EXEC mode? password Cisco class cisco https://assessment.netacad.net/assessment/images/21199.jpg (back-up link: http://puu.sh/tqk7E/e73ea5a3ff.png)

cisco

Which layer of the OSI model handles the process of identifying and discarding damaged frames? physical session data link network presentation transport

data link

Which combination of DTP modes will form a link to allow multiple VLANs? trunk-access dynamic auto-dynamic auto dynamic auto-dynamic desirable access-access

dynamic auto-dynamic desirable

Which feature on a Cisco router permits the forwarding of traffic for which there is no specific route? route source next-hop outgoing interface gateway of last resort

gateway of last resort

What can a network administrator modify on a router to specify the location from which the Cisco IOS loads? (Choose two.) the configuration register value the NVRAM file system system ROM the system image file the startup configuration file

the configuration register value the startup configuration file

What are two actions performed by a Cisco switch? (Choose two.) building a routing table that is based on the first IP address in the frame header forwarding frames with unknown destination IP addresses to the default gateway utilizing the MAC address table to forward frames via the destination MAC address examining the destination MAC address to add new entries to the MAC address table using the source MAC addresses of frames to build and maintain a MAC address table

utilizing the MAC address table to forward frames via the destination MAC address using the source MAC addresses of frames to build and maintain a MAC address table

When creating an IPv6 static route, when must a next-hop IPv6 address and an exit interface both be specified? when the exit interface is a point-to-point interface when the next hop is a link-local address when the static route is a default route when CEF is enabled

when the next hop is a link-local address


Set pelajaran terkait

Business Studies - Chapter 7: Marketing Mix (4 Ps)

View Set

Chapter 32: Assessment of Hematologic Function and Treatment Modalities

View Set