Related Topics
Take Another Quiz

CCENT Practice Certification Exam # 1

50 Questions
CCENT practice certification exam # 1

CCENT Practice Certification Exam #1

Questions and Answers
  • 1. 
    • A. 

      To identify missing segments at the destination

    • B. 

      To reassemble the segments at the remote location

    • C. 

      To specify the order in which the segments travel from source to destination

    • D. 

      To limit the number of segments that can be sent out of an interface at one time

    • E. 

      To determine if the packet changed during transit

  • 2. 
    • A. 

      UDP provides connectionless, fast transport of data at Layer 4.

    • B. 

      UDP provides connection-oriented, fast transport of data at Layer 3.

    • C. 

      UDP relies on application layer protocols for error detection.

    • D. 

      UDP works well when an application does not need to guarantee delivery of data.

    • E. 

      UDP relies on IP for error detection and recovery.

  • 3. 
    • A. 

      Image A

    • B. 

      Image B

    • C. 

      Image C

    • D. 

      Image D

  • 4. 
    • A. 

      Application

    • B. 

      Presentation

    • C. 

      Session

    • D. 

      Transport

    • E. 

      Network

  • 5. 
    Which device connects a local LAN to a geographically separate network?
    • A. 

      Switch

    • B. 

      Hub

    • C. 

      Router

    • D. 

      Bridge

  • 6. 
    • A. 

      The packets will be sent to the server because it is a server-based port.

    • B. 

      The packets will be sent to Switch2 and not leave the switch because the packets are local.

    • C. 

      The packets will be sent to the laptop host.

    • D. 

      The packets will be sent to Router1 and dropped because private addresses are not transmitted across the Internet.

    • E. 

      The packets will be sent to Router2 and dropped because the server is not directly attached.

  • 7. 
    • A. 

      A frame with a header that contains the port number of 80

    • B. 

      A frame with a header and trailer, but no MAC addresses

    • C. 

      A frame with a header and a trailer that only contains IP addresses

    • D. 

      A frame with the host 1 MAC address as the source and Router1 MAC address as the destination

    • E. 

      A frame with the host 1 MAC address as the source and the server MAC address as the destination

  • 8. 
    • A. 

      A CSU/DSU

    • B. 

      A cable modem

    • C. 

      A DSL router

    • D. 

      A DTE device

    • E. 

      An SLA device

  • 9. 
    • A. 

      Enable password class line console 0 password ccna

    • B. 

      Enable secret cisco enable password class line console 0 password ccna

    • C. 

      Enable secret 5 $1$v0/3$QyQWmJyT7zCa/yaBRasJm0 enable password class line console 0 password ccna

    • D. 

      Enable secret cisco enable password 7 14141E0A1F17 line console 0 password 7 020507550A

    • E. 

      Enable secret 5 $1$v0/3$QyQWmJyT7zCa/yaBRasJm0 enable password 7 14141E0A1F17 line console 0 password 7 020507550A

  • 10. 
    Refer to the exhibit. If host A sends an IP packet to host B, what will the destination address be in the frame when it leaves host A?
    • A. 

      DD:DD:DD:DD:DD:DD

    • B. 

      172.168.10.99

    • C. 

      CC:CC:CC:CC:CC:CC

    • D. 

      172.168.10.65

    • E. 

      BB:BB:BB:BB:BB:BB

  • 11. 
    • A. 

      There was a destination unreachable error.

    • B. 

      The packet type was unknown.

    • C. 

      One packet timed out.

    • D. 

      The ping was interrupted.

    • E. 

      Four packets of data were successfully received.

  • 12. 
    Refer to the exhibit. The switches are in their default configuration. Host A needs to communicate with host D, but host A does not have the MAC address for its default gateway. Which network hosts will receive the ARP request sent by host A?
    • A. 

      Only host D

    • B. 

      Only router R1

    • C. 

      Only hosts A, B, C, and D

    • D. 

      Only hosts B and C

    • E. 

      Only hosts B, C, and router R1

  • 13. 
    • A. 

      Cisco

    • B. 

      Class

    • C. 

      Password

    • D. 

      Cisco

  • 14. 
    • A. 

      The following prompt would appear: User Access Verification Password:

    • B. 

      Switch2 would return a destination unreachable message to Switch1.

    • C. 

      Router1 would return a destination unreachable message to Switch1.

    • D. 

      The packet would be dropped.

  • 15. 
    What caused the following error message to appear? 01:11:12: %PM-4-ERR_DISABLE: psecure-violation error detected on Fa0/8, putting Fa0/8 in err-disable state 01:11:12: %PORT_SECURITY-2-PSECURE_VIOLATION: Security violation occurred, caused by MAC address 0011.a0d4.12a0 on port FastEthernet0/8.01:11:13: %LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthernet0/8, changed state to down 01:11:14: %LINK-3-UPDOWN: Interface FastEthernet0/8, changed state to down
    • A. 

      Another switch was connected to this switch port with the wrong cable.

    • B. 

      An unauthorized user tried to telnet to the switch through switch port Fa0/8.

    • C. 

      NAT was enabled on a router, and a private IP address arrived on switch port Fa0/8.

    • D. 

      A host with an invalid IP address was connected to a switch port that was previously unused.

    • E. 

      Port security was enabled on the switch port, and an unauthorized connection was made on switch port Fa0/8.

  • 16. 
    When configuring a switch to use SSH for virtual terminal connections, what is the purpose of the crypto key generate rsa command?
    • A. 

      Show SSH connected hosts

    • B. 

      Disconnect SSH connected hosts

    • C. 

      Create a public and private key pair

    • D. 

      Show active SSH ports on the switch

    • E. 

      Access the SSH database configuration

  • 17. 
    Which three statements are true about full-duplex operation on an Ethernet network? (Choose three.)
    • A. 

      There are no collisions in full-duplex mode.

    • B. 

      A dedicated switch port is required for each node.

    • C. 

      Hub ports are preconfigured for full-duplex mode.

    • D. 

      The host network card must detect the availability of the media before transmitting.

    • E. 

      The host network card and the switch port must both be in full-duplex mode.

  • 18. 
    • A. 

      1

    • B. 

      2

    • C. 

      3

    • D. 

      4

    • E. 

      14

  • 19. 
    Reference Only.. Choose Answer A
    • A. 

      A

    • B. 

      B

    • C. 

      C

    • D. 

      D

  • 20. 
    • A. 

      The IP address that is assigned to the server is in an incorrect subnet.

    • B. 

      The IP address that is assigned to the server is a broadcast address.

    • C. 

      The IP address that is assigned to the server is a network address.

    • D. 

      The switch to which the server is connected has not been assigned an IP address.

    • E. 

      The RouterB LAN interface is incorrectly addressed in the RouterA LAN subnet.

  • 21. 
    • A. 

      253

    • B. 

      509

    • C. 

      1021

    • D. 

      2045

    • E. 

      4093

  • 22. 
    Which type of Network Address Translation allows a host on a public network consistent access to a specified private inside host?
    • A. 

      Port-based NAT

    • B. 

      Static NAT

    • C. 

      Dynamic NAT

    • D. 

      NAT overload

  • 23. 
    • A. 

      192.168.7.3

    • B. 

      64.100.1.5

    • C. 

      198.133.219.35

    • D. 

      192.168.7.2

    • E. 

      198.133.219.44

  • 24. 
    • A. 

      192.168.200.87

    • B. 

      194.10.10.104

    • C. 

      223.168.210.100

    • D. 

      220.100.100.154

    • E. 

      196.123.142.190

  • 25. 
    • A. 

      172.16.30.0/22

    • B. 

      172.16.30.64/22

    • C. 

      172.16.30.76/22

    • D. 

      172.16.28.0/22

    • E. 

      172.16.28.56/22

  • 26. 
    Refer to the exhibit. What is the broadcast address for the subnetwork on which host A resides?
    • A. 

      10.255.255.255

    • B. 

      10.144.255.255

    • C. 

      10.149.255.255

    • D. 

      10.149.191.255

    • E. 

      10.159.255.255

  • 27. 
    Reference only. Choose Answer B
    • A. 

      A

    • B. 

      B

    • C. 

      C

    • D. 

      D

  • 28. 
    What can a network administrator modify on a router to specify the location from which the Cisco IOS loads? (Choose two.)
    • A. 

      System ROM

    • B. 

      The startup configuration file

    • C. 

      The system image file

    • D. 

      The configuration register value

    • E. 

      The NVRAM file system

  • 29. 
    Which two items are required for initial configuration of Cisco routers if the IOS command-line interface is used? (Choose two.)
    • A. 

      A crossover cable

    • B. 

      A rollover cable

    • C. 

      An RJ-15 to DB-9 adapter

    • D. 

      Terminal emulation software

    • E. 

      Router VTY port

  • 30. 
    Refer to the exhibit. The router named "myhome" has received a frame from the host 192.168.254.7. The contents of this frame are being sent to host 172.16.14.243. What is the Layer 2 destination address of the frame as it leaves the myhome router?
    • A. 

      0008.a3b6.ce05

    • B. 

      0009.1281.18a8

    • C. 

      000a.8a47.e612

    • D. 

      172.16.14.129

    • E. 

      172.16.14.243

  • 31. 
    • A. 

      The MontegoBay router does not have any LAN interfaces configured.

    • B. 

      The Negril router is connected to the S0/1 interface of the MontegoBay router.

    • C. 

      There are only four devices in this network.

    • D. 

      Layer 3 is functioning properly on all routers.

    • E. 

      Layer 2 is operational on three ports of the MontegoBay router.

  • 32. 
    • A. 

      Router(config)# hostname South South(config)# copy running-config startup-config

    • B. 

      Router(config)# hostname South South(config)# exit South# copy running-config startup-config

    • C. 

      Router(config)# ip host South South(config)# copy running-config startup-config

    • D. 

      Router(config)# ip host South South(config)# exit South# copy running-config startup-config

  • 33. 
    Which command is used to create an encrypted password that restricts access to the privileged EXEC mode of a Cisco router?
    • A. 

      RouterA(config)# encrypted password cisco

    • B. 

      RouterA(config)# password encrypted cisco

    • C. 

      RouterA(config)# enable password cisco

    • D. 

      RouterA(config)# enable secret cisco

    • E. 

      RouterA(config)# service-password encryption cisco

  • 34. 
    Refer to the exhibit. A network administrator working at HostA has problems accessing the FTP server. Layer 3 connectivity testing was successful from HostA to the S0/0/1 interface of RouterB. Which set of commands will allow the network administrator to telnet to RouterB to check its status?
    • A. 

      RouterB(config)# enable secret class RouterB(config)# line vty 0 4 RouterB(config-if)# login

    • B. 

      RouterB(config)# enable secret class RouterB(config)# line vty 0 RouterB(config-line)# password cisco RouterB(config-line)# login

    • C. 

      RouterB(config)# enable secret class RouterB(config)# line aux 0 RouterB(config-line)# password cisco RouterB(config-line)# login

    • D. 

      RouterB(config)# enable secret class RouterB(config)# line aux 0 RouterB(config-vty)# password cisco RouterB(config-vty)# login

  • 35. 
    What is the purpose of using SSH to connect to a router?
    • A. 

      It allows a router to be configured using a graphical interface.

    • B. 

      It allows a secure remote connection to the router command line interface.

    • C. 

      It allows the router to be monitored through a network management application.

    • D. 

      It allows secure transfer of the IOS software image from an unsecure workstation or server.

  • 36. 
    Which two statements describe the command ip route 192.168.7.24 255.255.255.248 192.168.7.9? (Choose two.)
    • A. 

      A packet that is destined for host 192.168.7.30 will be forwarded to address 192.168.7.9.

    • B. 

      The address 192.168.7.9 is the destination network for this route.

    • C. 

      The address 192.168.7.24 is the next-hop router in this command.

    • D. 

      This command is issued from the interface configuration mode.

    • E. 

      This command is used to define a static route.

  • 37. 
    Which protocol is described as an enhanced distance vector routing protocol?
    • A. 

      RIP v1

    • B. 

      RIP v2

    • C. 

      EIGRP

    • D. 

      OSPF

  • 38. 
    • A. 

      The Jax router is not an entry in the host table of the Atlanta router.

    • B. 

      The Jax router does not have an entry for Atlanta in its host table.

    • C. 

      The hostname command is not configured correctly on the Atlanta router.

    • D. 

      The hostname command is not configured correctly on the Jax router.

    • E. 

      Access to a DNS server is not available.

  • 39. 
    • A. 

      RAM

    • B. 

      TFTP server

    • C. 

      NVRAM

    • D. 

      Setup routine

    • E. 

      Flash memory

  • 40. 
    Which two statements describe the functions or characteristics of ROM in a router? (Choose two.)
    • A. 

      Stores routing tables

    • B. 

      Allows software to be updated without replacing pluggable chips on the motherboard

    • C. 

      Maintains instructions for POST diagnostics

    • D. 

      Holds ARP cache

    • E. 

      Stores bootstrap program

  • 41. 
    Which two statements correctly identify the function of router memory components? (Choose two.)
    • A. 

      RAM permanently stores the configuration file used during the boot sequence.

    • B. 

      ROM contains diagnostic self test procedures executed on hardware modules.

    • C. 

      NVRAM stores a backup copy of the IOS used during the boot sequence.

    • D. 

      Flash memory does not lose its contents when a router is powered off.

    • E. 

      Flash contains boot system commands to identify the location of the IOS.

  • 42. 
    Which router component holds the routing table, ARP cache, and running configuration file?
    • A. 

      RAM

    • B. 

      Flash

    • C. 

      NVRAM

    • D. 

      ROM

  • 43. 
    Refer to the exhibit. A network administrator can ping the Denver router, but gets a 'Password Required but None Set' message when trying to connect remotely via Telnet. Which command or sequence of commands must be applied to the Denver router to allow remote access?
    • A. 

      Router(config)# line console 0 Router(config-line)# login Router(config-line)# password cisco

    • B. 

      Router(config)# line vty 0 4 Router(config-line)# login Router(config-line)# password cisco

    • C. 

      Router(config)# line virtual terminal Router(config-line)# enable login Router(config-line)# password cisco

    • D. 

      Router(config)# line vty 0 4 Router(config-line)# enable secret Router(config-line)# password cisco

    • E. 

      Router(config)# enable secret cisco

  • 44. 
    For Reference Only... Choose Answer C...
    • A. 

      A

    • B. 

      B

    • C. 

      C

    • D. 

      D

  • 45. 
    Which security method uses the Advanced Encryption Standard (AES)?
    • A. 

      EAP

    • B. 

      TKIP

    • C. 

      WEP

    • D. 

      WPA2

  • 46. 
    What is the purpose of WEP?
    • A. 

      It encrypts data.

    • B. 

      It uniquely identifies a wireless network.

    • C. 

      It coordinates and accepts transmissions from wireless hosts.

    • D. 

      It provides information about a directly connected Cisco network device.

  • 47. 
    A company has an 802.11b wireless access point installed. Which type of wireless NIC is a valid standards-based one but will not work in this environment?
    • A. 

      802.11a

    • B. 

      802.11b

    • C. 

      802.11g

    • D. 

      802.11n

  • 48. 
    For Reference Only... Choose D...
    • A. 

      A

    • B. 

      B

    • C. 

      C

    • D. 

      D

  • 49. 
    A company has a sales team that travels with laptops. On Fridays, the sales members come into assigned cubicles and connect their laptop to the wired network. The company is concerned that unauthorized users could also connect to the network. What can be done to ensure that unauthorized laptops are not connected to the wired network?
    • A. 

      Implement SSH.

    • B. 

      Install WEP or WPA.

    • C. 

      Use switch port security.

    • D. 

      Clearly label the cubicle network port and the switch port.

    • E. 

      Configure usernames and passwords on the switch ports assigned to each cubicle.

  • 50. 
    Refer to the exhibit. For security reasons, information about the HQ R1 router model and IP address should not be accessible from the Site 2 R2 router. What security measure should be implemented?
    • A. 

      Install an IDS between R1 and R2.

    • B. 

      Install an IPS between R1 and R2.

    • C. 

      Install a firewall between R1 and R2.

    • D. 

      Disable CDP on the R1 interface that connects to R2.

    • E. 

      Disable any routing protocol used between R1 and R2 and install static routes.