CCNA

112 Questions  I  By Grahamley
Please take the quiz to rate it.

 CCNA
CCNA study

  
Changes are done, please start the quiz.


Questions and Answers

Removing question excerpt is a premium feature

Upgrade and get a lot more done!
  • 1. 
    For which type of connection should a straight-through cable be used?
    • A. 

      A. switch to switch

    • B. 

      B. switch to hub

    • C. 

      C. switch to router

    • D. 

      D. hub to hub

    • E. 

      E. router to PC


  • 2. 
    Which type of cable is used to connect the COM port of a host to the COM port of a router or switch?
    • A. 

      A. crossover

    • B. 

      B. straight-through

    • C. 

      C. rolled

    • D. 

      D. shielded twisted-pair


  • 3. 
    What is the first 24 bits in a MAC address called?
    • A. 

      A. NIC

    • B. 

      B. BIA

    • C. 

      C. OUI

    • D. 

      D. VAI


  • 4. 
    In an Ethernet network, under what two scenarios can devices transmit? (Choose two)
    • A. 

      A. when they receive a special token

    • B. 

      B. when there is a carrier

    • C. 

      C. when they detect no other devices are sending

    • D. 

      D. when the medium is idle

    • E. 

      E. when the server grants access


  • 5. 
    Which two benefits are provided by using a hierarchical addressing network addressing scheme? (Choose two)
    • A. 

      A. reduces routing table entries

    • B. 

      B. auto-negotiation of media rates

    • C. 

      C. efficient utilization of MAC addresses

    • D. 

      D. dedicated communications between devices

    • E. 

      E. ease of management and troubleshooting


  • 6. 
    When a host transmits data across a network to another host, which process does the data go through?
    • A. 

      A. standardization

    • B. 

      B. conversion

    • C. 

      C. encapsulation

    • D. 

      D. synchronization


  • 7. 
    Which two Ethernet fiber-optic modes support distances of greater than 550 meters?
    • A. 

      A. 1000BASE-CX

    • B. 

      B. 100BASE-FX

    • C. 

      C. 1000BASE-LX

    • D. 

      D. 1000BASE-SX

    • E. 

      E. 1000BASE-ZX


  • 8. 

    Refer to the exhibit. What type of connection would be supported by the cable diagram shown?
    • A. 

      A. PC to router

    • B. 

      B. PC to switch

    • C. 

      C. server to switch

    • D. 

      D. switch to router


  • 9. 
    Which two topologies are using the correct type of twisted-pair cables? (Choose two)
    • A. 
    • B. 
    • C. 
    • D. 
    • E. 

  • 10. 

    Refer to the exhibit. What type of connection would be supported by the cable diagram shown?
    • A. 

      A. PC to router

    • B. 

      B. PC to switch

    • C. 

      C. server to switch

    • D. 

      D. switch to router


  • 11. 
    What are some of the advantages of using a router to segment the network? (Choose two)
    • A. 

      A. Filtering can occur based on Layer 3 information.

    • B. 

      B. Broadcasts are eliminated.

    • C. 

      C. Routers generally cost less than switches.

    • D. 

      D. Broadcasts are not forwarded across the router.

    • E. 

      E. Adding a router to the network decreases latency.


  • 12. 

    Which of the following statements describe the network shown in the graphic? (Choose two)
    • A. 

      A. There are two broadcast domains in the network.

    • B. 

      B. There are four broadcast domains in the network.

    • C. 

      C. There are six broadcast domains in the network.

    • D. 

      D. There are four collision domains in the network.

    • E. 

      E. There are five collision domains in the network.

    • F. 

      F. There are seven collision domains in the network.


  • 13. 

    Refer to the exhibit. The two connected ports on the switch are not turning orange or green. What would be the most effective steps to troubleshoot this physical layer problem? (Choose three)
    • A. 

      A. Ensure that the Ethernet encapsulations match on the interconnected router and switch ports.

    • B. 

      B. Ensure that cables A and B are straight-through cables.

    • C. 

      C. Ensure cable A is plugged into a trunk port.

    • D. 

      D. Ensure the switch has power.

    • E. 

      E. Reboot all of the devices.

    • F. 

      F. Reseat all cables.


  • 14. 
    For what two purposes does the Ethernet protocol use physical addresses? (Choose two)
    • A. 

      A. to uniquely identify devices at Layer 2

    • B. 

      B. to allow communication with devices on a different network

    • C. 

      C. to differentiate a Layer 2 frame from a Layer 3 packet

    • D. 

      D. to establish a priority system to determine which device gets to transmit first

    • E. 

      E. to allow communication between different devices on the same network

    • F. 

      F. to allow detection of a remote device when its physical address is unknown


  • 15. 

    Refer to the exhibit. Two buildings on the San Jose campus of a small company must be connected to use Ethernet with a bandwidth of at least 100 Mbps. The company is concerned about possible problems from voltage potential difference between the two buildings. Which media type should be used for the connection?
    • A. 

      A. UTP cable

    • B. 

      B. STP cable

    • C. 

      C. Coaxial cable

    • D. 

      D. Fiber optic cable


  • 16. 
    Which command can be used from a PC to verify the connectivity between host that connect through path?
    • A. 

      A. tracert address

    • B. 

      B. ping address

    • C. 

      C. arp address

    • D. 

      D. traceroute address


  • 17. 

    Refer to the exhibit. A network engineer is troubleshooting an internet connectivity problem on the computer. What causing the problem?
    • A. 

      A. wrong DNS server

    • B. 

      B. wrong default gateway

    • C. 

      C. incorrect IP address

    • D. 

      D. incorrect subnet mask


  • 18. 

    How many broadcast domains are shown in the graphic assuming only the default vlan is configured on the switches?
    • A. 

      A. one

    • B. 

      B. six

    • C. 

      C. twelve

    • D. 

      D. two


  • 19. 
    Refer to the exhibit. PC> tracert 10.16.176.23 Tracing route to 10.16.176.23 over a maximum of 30 hops 1 31 ms 31 ms 32ms 172.16.182.1 2 62 ms 62 ms 62 ms 192.1681.6 3 93 ms 92 ms 34 ms 192.168.1.10 4 125 ms 110ms 125ms 10.16.176.23 Trace complete.   Host A has tested connectivity to a remote network. What is the default gateway for host A?
    • A. 

      A. 172.16.182.1

    • B. 

      B. 192.168.1.1

    • C. 

      C. 10.16.176.1

    • D. 

      D. 192.168.1.6


  • 20. 
    What functions do routers perform in a network? (Choose two)
    • A. 

      A. packet switching

    • B. 

      B. access layer security

    • C. 

      C. path selection

    • D. 

      D. VLAN membership assignment

    • E. 

      E. bridging between LAN segments

    • F. 

      F. microsegmentation of broadcast domains


  • 21. 
    How does using the service password encryption command on a router provide additional security?
    • A. 

      A. by encrypting all passwords passing through the router

    • B. 

      B. by encrypting passwords in the plain text configuration file

    • C. 

      C. by requiring entry of encrypted passwords for access to the device

    • D. 

      D. by configuring an MD5 encrypted key to be used by routing protocols to validate routing exchanges

    • E. 

      E. by automatically suggesting encrypted passwords for use in configuring the router


  • 22. 
    Refer to the diagram. What is the largest configuration file that can be stored on this router? R# show version Cisco IOS Software. 1841 Software (C1841-IPBASE-M}, Version 12.4(1a), RELEASE SOFTWARE (fc2) Technical Support: http://www.cisco.com/techsupport  Copyright (c) 1986*2005 by Cisco Systems, Inc. Compiled Fri 27-May-0512:32 by hqluong ROM: System Bootstrap. Version 12.3(8r)T8, RELEASE SOFTWARE (fc1) N-East uptime is 5 days, 49 minutes System returned to ROM by reload at 15:17:00 UTC Thu Jun 8 2006  System image file is “flash:c1841-ipbase-mz.124-1a.bin” Cisco 1841 (revision 5.0) with 114688K/16384K bytes of memory. Processor board ID FTX0932W21Y 2 FastEthernet interfaces 2 Low-speed serial(sync/async) interfaces DRAM configuration is 64 bits wide with parity disabled. 191K bytes of NVRAM. 31360K bytes of ATA CompactFlash (Read/Write) Configuration register Is 0×2102 R#
    • A. 

      A. 191K bytes

    • B. 

      B. 16384K bytes

    • C. 

      C. 31369K bytes

    • D. 

      D. 114688K bytes


  • 23. 
    Which command shows system hardware and software version information?
    • A. 

      A. show configuration

    • B. 

      B. show environment

    • C. 

      C. show inventory

    • D. 

      D. show platform

    • E. 

      E. show version


  • 24. 
    Refer to the exhibit. If number 2 is selected from the setup script, what happens when the user runs setup from a privileged prompt? [0] Go to the IOS command prompt without saving this config. [1] Return back to the setup without saving this config. [2] Save this configuration to nvram and exit. Enter your selection [2]:
    • A. 

      A. Setup is additive and any changes will be added to the config script.

    • B. 

      B. Setup effectively starts the configuration over as if the router was booted for the first time.

    • C. 

      C. Setup will not run if an enable secret password exists on the router.

    • D. 

      D. Setup will not run, because it is only viable when no configuration exists on the router.


  • 25. 
    Which command shows your active Telnet connections?
    • A. 

      A. show sessions

    • B. 

      B. show cdp neighbors

    • C. 

      C. show users

    • D. 

      D. show queue


  • 26. 
    Which command can you use to determine the cisco ios feature set on a cisco router?
    • A. 

      A. show version

    • B. 

      B. dir flash:include ios

    • C. 

      C. show environment

    • D. 

      D. show diag

    • E. 

      E. show inventory


  • 27. 
    A system administrator types the command to change the hostname of a router. Where on the Cisco IFS is that change stored?
    • A. 

      A. NVRAM

    • B. 

      B. RAM

    • C. 

      C. FLASH

    • D. 

      D. ROM

    • E. 

      E. PCMCIA


  • 28. 
    Before installing a new, upgraded version of the IOS, what should be checked on the router, and which command should be used to gather this information? (Choose two)
    • A. 

      A. the amount of available ROM

    • B. 

      B. the amount of available flash and RAM memory

    • C. 

      C. the version of the bootstrap software present on the router

    • D. 

      D. show version

    • E. 

      E. show processes

    • F. 

      F. show running-config


  • 29. 
    Refer to the exhibit. A network administrator configures a new router and enters the copy startup-config running-config on the router. The network administrator powers down the router and sets it up at a remote location. When the router starts, it enter the system configuration dialog as shown. What is the cause of the problem? — System Configuration Dialog — Would you like to enter the initial configuration dialog? [yes/no]: % Please answer yes’ or ‘no’. Would you like to enter the initial configuration dialog? [yes/ho]: n Would you like to terminate autoinstall? [yes]: Press RETURN to get started!
    • A. 

      A. The network administrator failed to save the configuration.

    • B. 

      B. The configuration register is set to 0×2100.

    • C. 

      C. The boot system flash command is missing from the configuration.

    • D. 

      D. The configuration register is set to 0×2102.

    • E. 

      E. The router is configured with the boot system startup command.


  • 30. 
    Refer to the exhibit. What can be determined about the router from the console output?
    • A. 

      A. No configuration file was found in NVRAM.

    • B. 

      B. No configuration file was found in flash.

    • C. 

      C. No configuration file was found in the PCMCIA card.

    • D. 

      D. Configuration file is normal and will load in 15 seconds.


  • 31. 
    When you are logged into a switch, which prompt indicates that you are in privileged mode?
    • A. 

      A. %

    • B. 

      B. @

    • C. 

      C. >

    • D. 

      D. $

    • E. 

      E. #


  • 32. 
    Which command is used to copy the configuration from RAM into NVRAM?
    • A. 

      A. copy running-config startup-config

    • B. 

      B. copy startup-config: running-config:

    • C. 

      C. copy running config startup config

    • D. 

      D. copy startup config running config

    • E. 

      E. write terminal


  • 33. 
    Which command is used to load a configuration from a TFTP server and merge the configuration into RAM?
    • A. 

      A. copy running-config: TFTP:

    • B. 

      B. copy TFTP: running-config

    • C. 

      C. copy TFTP: startup-config

    • D. 

      D. copy startup-config: TFTP:


  • 34. 
    There are no boot system commands in a router configuration in NVRAM. What is the fallback sequence that router will use to find an IOS during reload?
    • A. 

      A. Flash, TFTP server, ROM

    • B. 

      B. Flash, NVRAM, ROM

    • C. 

      C. ROM, NVRAM, TFTP server

    • D. 

      D. NVRAM, TFTP server, ROM

    • E. 

      E. TFTP server, Flash, NVRAM


  • 35. 
    A Cisco router is booting and has just completed the POST process.It is now ready to find and load an IOS image. What function does the router perform next?
    • A. 

      A. It checks the configuration register

    • B. 

      B. It attempts to boot from a TFTP server

    • C. 

      C. It loads the first image file in flash memory

    • D. 

      D. It inspects the configuration file in NVRAM for boot instructions


  • 36. 
    Refer to the partial command output shown. Which two statements are correct regarding the router hardware? (Choose two) system image file is “flash:c2600-do3s-mz.120-5.T1″ Cisco 2621 (MPC860) processor (revision 0×600) with 53248K/12288K bytes of memory Processor board ID JAD05280307 (3536592999) M860 processor: part number 0, mask 49  Bridging software. X.25 software, version 3.0.0. 2 FastEthernet/IEEE 802.3 interface(s) 2 Serial(sync/async) network interface(s) 2 Low-speed serial(sync/async) network interface(s) 16 terminal line(s) 32K bytes of non-volatile configuration memory. 16384K bytes of processor board system flash (Read/Write)
    • A. 

      A. Total RAM size is 32 KB

    • B. 

      B. Total RAM size is 16384 KB (16 MB)

    • C. 

      C. Total RAM size is 65536 KB (64 MB)

    • D. 

      D. Flash size is 32 KB

    • E. 

      E. Flash size is 16384 KB (16 MB)

    • F. 

      F. Flash size is 65536 KB (64 MB)


  • 37. 
    Which router IOS commands can be used to troubleshoot LAN connectivity problems? (Choose three)
    • A. 

      A. ping

    • B. 

      B. tracert

    • C. 

      C. ipconfig

    • D. 

      D. show ip route

    • E. 

      E. winipcfg

    • F. 

      F. show interfaces


  • 38. 
    Which two locations can be configured as a source for the IOS image in the boot system command? (Choose two)
    • A. 

      A. RAM

    • B. 

      B. NVRAM

    • C. 

      C. flash memory

    • D. 

      D. HTTP server

    • E. 

      E. TFTP server

    • F. 

      F. Telnet server


  • 39. 
    Refer to the exhibit. Why is flash memory erased prior to upgrading the IOS image from the TFTP server? Router# copy tftp flash Address or name of remote host []? 192.168.2.167  Source filename []? c1600-k8sy-mz.123-16a.bin  Destination filename [c1600-k8sy-mz.123-16a.bin]? Accessing tftp://192.168.2.167/ c1600-k8sy-mz.l23-16a.bin… Erasing flash before copying? [confirm] Erasing the flash filesystem will remove all files! continue? [confirm]  Erasing device  Eeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeee  Eeeeeeeeeeeeeeeeeeeeeeeeeeeeeee …erased  Erase of flash: complete Loading c1600-k8sy-mz.l23-16a.bin from 192.168.2.167 (via Ethernet0): !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! [OK - 6888962/13777920 bytes] verifying checksum… OK (0x7BF3) 6888962 bytes copied in 209.920 secs (32961 bytes/sec) Router#
    • A. 

      A. The router cannot verify that the Cisco IOS image currently in flash is valid

    • B. 

      B. Flash memory on Cisco routers can contain only a single IOS image.

    • C. 

      C. Erasing current flash content is requested during the copy dialog.

    • D. 

      D. In order for the router to use the new image as the default, it must be the only IOS image in flash.


  • 40. 
    Which command reveals the last method used to powercycle a router?
    • A. 

      A. show reload

    • B. 

      B. show boot

    • C. 

      C. show running-config

    • D. 

      D. show version


  • 41. 
    Refer to the exhibit. A router boots to the prompt shown in the exhibit. What does this signify, and how should the network administrator respond?  rommon 1>  
    • A. 

      A. This prompt signifies that the configuration file was not found in NVRAM. The network administrator should follow the prompts to enter a basic configuration.

    • B. 

      B. The prompt signifies that the configuration file was not found in flash memory. The network administrator should use TFTP to transfer a configuration file to the router.

    • C. 

      C. The prompt signifies that the IOS image in flash memory is invalid or corrupted. The network administrator should use TFTP to transfer an IOS image to the router.

    • D. 

      D. The prompt signifies that the router could not authenticate the user. The network administrator should modify the IOS image and reboot the router.


  • 42. 
    What should be done prior to backing up an IOS image to a TFTP server? (Choose three)
    • A. 

      A. Make sure that the server can be reached across the network.

    • B. 

      B. Check that authentication for TFTP access to the server is set.

    • C. 

      C. Assure that the network server has adequate space for the IOS image.

    • D. 

      D. Verify file naming and path requirements.

    • E. 

      E. Make sure that the server can store binary files.

    • F. 

      F. Adjust the TCP window size to speed up the transfer.


  • 43. 
    Which two privileged mode cisco ios commands can be used to determine a cisco router chassis serial number? (choose two)
    • A. 

      A. show inventory

    • B. 

      B. show flash filesys

    • C. 

      C. dir flash:|include chassis

    • D. 

      D. show diag

    • E. 

      E. show controllers


  • 44. 
    Which command helps a network administrator to manage memory by displaying flash memory and NVRAM utilization?
    • A. 

      A. show secure

    • B. 

      B. show file systems

    • C. 

      C. show flash

    • D. 

      D. show version


  • 45. 
    A network administrator changes the configuration register to 0×2142 and reboots the router. What are two results of making this change? (Choose two)
    • A. 

      A. The IOS image will be ignored.

    • B. 

      B. The router will prompt to enter initial configuration mode.

    • C. 

      C. The router will boot to ROM.

    • D. 

      D. Any configuration entries in NVRAM will be ignored.

    • E. 

      E. The configuration in flash memory will be booted.


  • 46. 
    Refer to the exhibit. For what two reasons has the router loaded its IOS image from the location that is shown? (Choose two) Router1> show version Cisco Internetwork Operating System Software IOS ™ 7200 Software (C7200-J-M), Experimental Version 11.3tl997091S:1647S2)  [hampton-nitro-baseline 249] Copyright (c) 1986-1997 by cisco Systems, Inc. Compiled Wed 08-0ct-97 06:39 by hampton Image text-base: 0×60008900, data-base: 0x60B98000 ROM: System Bootstrap, Version 11.1(11855) [beta 2], INTERIM SOFTWARE  BOOTPLASH: 7200 Software (C7200-BOOT-M), Version 11.1(472), RELEASE SOFTWARE (fcl) Router1 uptime is 23 hours, 33 minutes System restarted by abort at PC 0x6022322C at 10:50:SS PDT Tue Oct 21 1997  System image file is “tftp://112.16.1.129/hampton/nitro/c7200-j-mz” cisco 7206 (NPE150) processor with 57344K/8192K bytes of memory. <output omitted> Configuration register is 0×2102
    • A. 

      A. Router1 has specific boot system command that instruct it to load IOS from TFTP server.

    • B. 

      B. Router1 is acting as a TFTP server for other routers.

    • C. 

      C. Router1 cannot locate a valid IOS image in flash memory.

    • D. 

      D. Router1 defaulted to ROMMON mode and loaded the IOS image from a TFTP sewer.

    • E. 

      E. Cisco routers will first attempt to load a image from TFTP for management purposes.


  • 47. 
    Which of the following correctly describe steps in the OSI data encapsulation process? (Choose two)
    • A. 

      A. The transport layer divides a data stream into segments and may add reliability and flow control information.

    • B. 

      B. The data link layer adds physical source and destination addresses and an FCS to the segment.

    • C. 

      C. Packets are created when the network layer encapsulates a frame with source and destination host addresses and protocol-related control information.

    • D. 

      D. Packets are created when the network layer adds Layer 3 addresses and control information to a segment.

    • E. 

      E. The presentation layer translates bits into voltages for transmission across the physical link.


  • 48. 
    Which layer of the OSI reference model uses the hardware address of a device to ensure message delivery to the proper host on a LAN?
    • A. 

      A. physical

    • B. 

      B. data link

    • C. 

      C. network

    • D. 

      D. transport


  • 49. 
    Which layer of the OSI reference model uses flow control, sequencing, and acknowledgments to ensure that reliable networking occurs?
    • A. 

      A. data link

    • B. 

      B. network

    • C. 

      C. transport

    • D. 

      D. presentation

    • E. 

      E. physical


  • 50. 
    Which layer in the OSI reference model is responsible for determining the availability of the receiving program and checking to see if enough resources exist for that communication?
    • A. 

      A. transport

    • B. 

      B. network

    • C. 

      C. presentation

    • D. 

      D. session

    • E. 

      E. application


  • 51. 
    Data transfer is slow between the source and destination. The quality of service requested by the transport layer in the OSI reference model is not being maintained. To fix this issue, at which layer should the troubleshooting process begin?
    • A. 

      A. presentation

    • B. 

      B. session

    • C. 

      C. transport

    • D. 

      D. network

    • E. 

      E. physical


  • 52. 
    Which protocols are found in the network layer of the OSI reference model and are responsible for path determination and traffic switching?
    • A. 

      A. LAN

    • B. 

      B. routing

    • C. 

      C. WAN

    • D. 

      D. network


  • 53. 
    Refer to the exhibit. An administrator pings the default gateway at 10.10.10.1 and sees the output as shown. At which OSI layer is the problem? C:\> ping 10.10.10.1 Pinging 10.10.10.1 with 32 bytes of data: Request timed out. Request timed out. Request timed out. Request timed out. Ping statistics for 10.10.10.1: Packets: sent – 4, Received = 0, Lost – 4 (100% loss)  
    • A. 

      A. data link layer

    • B. 

      B. application layer

    • C. 

      C. access layer

    • D. 

      D. session layer

    • E. 

      E. network layer


  • 54. 
    Which of the following are types of flow control? (Choose three)
    • A. 

      A. buffering

    • B. 

      B. cut-through

    • C. 

      C. windowing

    • D. 

      D. congestion avoidance

    • E. 

      E. load balancing


  • 55. 
    A network administrator is verifying the configuration of a newly installed host by establishing an FTP connection to a remote server. What is the highest layer of the protocol stack that the network administrator is using for this operation?
    • A. 

      A. application

    • B. 

      B. presentation

    • C. 

      C. session

    • D. 

      D. transport

    • E. 

      E. internet

    • F. 

      F. data link


  • 56. 
    A receiving host computes the checksum on a frame and determines that the frame is damaged. The frame is then discarded. At which OSI layer did this happen?
    • A. 

      A. session

    • B. 

      B. network

    • C. 

      C. physical

    • D. 

      D. data link

    • E. 

      E. transport


  • 57. 
    As a frame leaves a Layer 3 device, the Layer 2 encapsulation information is changed from what it was when it entered the device. For what two reasons can this happen? (Choose two)
    • A. 

      A. The data is moving from 10BASE-TX to 100BASE-TX.

    • B. 

      B. The WAN encapsulation type has changed.

    • C. 

      C. The data format has changed from analog to digital.

    • D. 

      D. The source and destination hosts are in the same subnet.

    • E. 

      E. The source and destination MAC addresses have changed.


  • 58. 
    Acknowledgement, Sequencing, and Flow control are characteristics of which OSI layer?
    • A. 

      A. Layer 2

    • B. 

      B. Layer 3

    • C. 

      C. Layer 4

    • D. 

      D. Layer 5

    • E. 

      E. Layer 6

    • F. 

      F. Layer 7


  • 59. 
    An inbound access list has been configured on a serial interface to deny packet entry for TCP and UDP ports 21, 23 and 25. What types of packets will be permitted by this ACL? (Choose three)
    • A. 

      A. FTP

    • B. 

      B. Telnet

    • C. 

      C. SMTP

    • D. 

      D. DNS

    • E. 

      E. HTTP

    • F. 

      F. POP3


  • 60. 
    What are two characteristics of Telnet? (Choose two)
    • A. 

      A. It sends data in clear text format.

    • B. 

      B. It is no longer supported on Cisco network devices.

    • C. 

      C. It is more secure than SSH.

    • D. 

      D. It requires an enterprise license in order to be implemented.

    • E. 

      E. It requires that the destination device be configured to support Telnet connections.


  • 61. 
    An administrator issues the command ping 127.0.0.1 from the command line prompt on a PC. If a reply is received, what does this confirm?
    • A. 

      A. The PC has connectivity with a local host.

    • B. 

      B. The PC has connectivity with a Layer 3 device.

    • C. 

      C. The PC has a default gateway correctly configured

    • D. 

      D. The PC has connectivity up to Layer 5 of the OSI model

    • E. 

      E. The PC has the TCP/IP protocol stack correctly installed.


  • 62. 
    Where does routing occur within the DoD TCP/IP reference model?
    • A. 

      A. application

    • B. 

      B. internet

    • C. 

      C. network

    • D. 

      D. transport


  • 63. 
    A host is attempting to send data to another host on a different network. What is the first action that the sending host will take?
    • A. 

      A. Drop the data.

    • B. 

      B. Send the data frames to the default gateway

    • C. 

      C. Create an ARP request to get a MAC address for the receiving host.

    • D. 

      D. Send a TCP SYN and wait for the SYN ACK with the IP address of the receiving host.


  • 64. 

    A TCP/IP Transfer is diagrammed in the exhibit. A window size of three has been negotiated for this transfer. Which message will be returned from the receiver to the sender as part of this TCP/IP transfer?
    • A. 

      A. Send ACK 1-3

    • B. 

      B. Send ACK 3

    • C. 

      C. Send ACK 4

    • D. 

      D. Send ACK 4-6

    • E. 

      E. Send ACK 6

    • F. 

      F. Send ACK 7


  • 65. 
    What is the purpose using the traceroute command?
    • A. 

      A. to map all the devices on a network.

    • B. 

      B. to display the current TCP/IP configuration values.

    • C. 

      C. to see how a device MAC address is mapped to its IP address.

    • D. 

      D. to see the path a packet will take when traveling to a specified destination.

    • E. 

      E. to display the MTU values for each router in a specified network path from source to a destination.


  • 66. 
    A network admin wants to know every hop the packets take when he accesses cisco.com. Which command is the most appropriate to use?
    • A. 

      A. path cisco.com

    • B. 

      B. debugcisco.com

    • C. 

      C. trace cisco.com

    • D. 

      D. traceroute cisco.com


  • 67. 

    Refer to the exhibit. Host A pings Host B. What source MAC address and source IP address are contained in the frame as the frame leaves R2 destined for host B?
    • A. 

      A. abcd.abcd.a001

    • B. 

      B. abcd.abcd.b002

    • C. 

      C. abcd.abcd.c003

    • D. 

      D. 10.2.0.15

    • E. 

      E. 10.0.64.1

    • F. 

      F. 10.0.128.15


  • 68. 

    Host 1 is trying to communicate with Host 2. The e0 interface on Router C is down. Which of the following are true? (Choose two)
    • A. 

      A. Router C will use ICMP to inform Host 1 that Host 2 cannot be reached.

    • B. 

      B. Router C will use ICMP to inform Router B that Host 2 cannot be reached.

    • C. 

      C. Router C will use ICMP to inform Host 1, Router A, and Router B that Host 2 cannot be reached.

    • D. 

      D. Router C will send a Destination Unreachable message type.

    • E. 

      E. Router C will send a Router Selection message type.

    • F. 

      F. Router C will send a Source Quench message type.


  • 69. 

    Refer to the exhibit. The switch in the graphic has a default configuration and the MAC table is fully populated. In addition, this network is operating properly. The graphic represents selected header information in a frame leaving host A. What can be concluded from this information?
    • A. 

      A. The MAC address of host A is FFFF.FFFF.FFFF.

    • B. 

      B. The router will forward the packet in this frame to the Internet.

    • C. 

      C. The switch will only forward this frame to the attached router interface.

    • D. 

      D. All devices in this LAN except host A will pass the packet to Layer 3.


  • 70. 

    Refer to the exhibit. What can be determined from the output?
    • A. 

      A. 192.168.1.2 is local to the router.

    • B. 

      B. 192.168.3.1 is local to the router.

    • C. 

      C. 192.168.1.2 will age out in less than 1 minute.

    • D. 

      D. 192.168.3.1 has aged out and is marked for deletion.


  • 71. 

    Refer to the exhibit. What could be possible causes for the “Serial0/0 is down” interface status? (Choose two)
    • A. 

      A. A Layer 1 problem exists.

    • B. 

      B. The bandwidth is set too low.

    • C. 

      C. A protocol mismatch exists.

    • D. 

      D. An incorrect cable is being used.

    • E. 

      E. There is an incorrect IP address on the Serial 0/0 interface.


  • 72. 
    Which line from the output of the show ip interface command indicates a layer 1 problem?
    • A. 

      A. Serial0/1 is up, line protocol is down

    • B. 

      B. Serial0/1 is down, line protocol is down

    • C. 

      C. Serial0/1 is up, line protocol is up

    • D. 

      D. Serial0/1 is administratively down, line protocol is down


  • 73. 

    Refer to the exhibit. What is the meaning of the output MTU 1500 bytes?
    • A. 

      A. The maximum number of bytes that can traverse this interface per second is 1500.

    • B. 

      B. The minimum segment size that can traverse this interface is 1500 bytes.

    • C. 

      C. The maximum segment size that can traverse this interface is 1500 bytes.

    • D. 

      D. The minimum packet size that can traverse this interface is 1500 bytes.

    • E. 

      E. The maximum packet size that can traverse this interface is 1500 bytes.

    • F. 

      F. The maximum frame size that can traverse this interface is 1500 bytes.


  • 74. 

    The network administrator normally establishes a Telnet session with the switch from host A. The administrator’s attempt to establish a connect via Telnet to the switch from host B fails, but pings from host B to other two hosts are successful. What is the issue for this problem?
    • A. 

      A. Host B and the switch need to be in the same subnet.

    • B. 

      B. The switch needs an appropriate default gateway assigned.

    • C. 

      C. The switch interface connected to the router is down.

    • D. 

      D. Host B need to be assigned an IP address in vlan 1.


  • 75. 
    Which command displays CPU utilization?
    • A. 

      A. show protocols

    • B. 

      B. show process

    • C. 

      C. show system

    • D. 

      D. show version


  • 76. 

    Refer to the exhibit. You are connected to the router as user Mike. Which command allows you to see output from the OSPF debug command?
    • A. 

      A. terminal monitor

    • B. 

      B. show debugging

    • C. 

      C. show sessions

    • D. 

      D. show ip ospf interface


  • 77. 
    An administrator attempts a traceroute but receives a “Destination Unreachable” message. Which protocol is responsible for that message?
    • A. 

      A. RARP

    • B. 

      B. RUDP

    • C. 

      C. ICMP

    • D. 

      D. SNMP


  • 78. 
    DNS servers provide what service?
    • A. 

      A. They run a spell check on host names to ensure accurate routing

    • B. 

      B. They convert domain names into IP address

    • C. 

      C. Given an IP address.they determine the name of the host that is sought

    • D. 

      D. They map individual hosts to their specific IP addresses


  • 79. 
    Which of the following protocols uses both TCP and UDP ports?
    • A. 

      A. SMTP

    • B. 

      B. Telnet

    • C. 

      C. FTP

    • D. 

      D. DNS


  • 80. 
    Which protocol should be used to establish a secure terminal connection to a remote network device?
    • A. 

      A. ARP

    • B. 

      B. SSH

    • C. 

      C. Telnet

    • D. 

      D. WEP

    • E. 

      E. SNMPv1

    • F. 

      F. SNMPv2


  • 81. 
    A network administrator issues the ping 192.168.2.5 command and successfully tests connectivity to a host that has been newly connected to the network. Which protocols were used during the test? (Choose two)
    • A. 

      A. ARP

    • B. 

      B. CDP

    • C. 

      C. DHCP

    • D. 

      D. DNS

    • E. 

      E. ICMP


  • 82. 
    Which network protocol does DNS use?
    • A. 

      A. FTP

    • B. 

      B. TFTP

    • C. 

      C. TCP

    • D. 

      D. UDP

    • E. 

      E. SCP


  • 83. 
    When two hosts are trying to communicate across a network, how does the host originating the communication determine the hardware address of the host that it wants to “talk” to?
    • A. 

      A. RARP request

    • B. 

      B. Show Network Address request

    • C. 

      C. Proxy ARP request

    • D. 

      D. ARP request

    • E. 

      E. Show Hardware Address request


  • 84. 

    Your boss is learning a CCNA training course, refer to the exhibit. The access list has been configured on the S0/0 interface of router RTB in the outbound direction. Which two packets, if routed to the interface, will be denied? (Choose two) access-list 101 deny tcp 192.168.15.32 0.0.0.15 any eq telnet access-list 101 permit ip any any
    • A. 

      A. source ip address: 192.168.15.5; destination port: 21

    • B. 

      B. source ip address: 192.168.15.37 destination port: 21

    • C. 

      C. source ip address: 192.168.15.41 destination port: 21

    • D. 

      D. source ip address: 192.168.15.36 destination port: 23

    • E. 

      E. source ip address: 192.168.15.46; destination port: 23

    • F. 

      F. source ip address: 192.168.15.49 destination port: 23


  • 85. 

    Refer to the graphic. It has been decided that PC1 should be denied access to Server. Which of the following commands are required to prevent only PC1 from accessing Server1 while allowing all other traffic to flow normally? (Choose two)
    • A. 

      A – Router(config)# interface fa0/0 Router(config-if)# ip access-group 101 out

    • B. 

      B – Router(config)# interface fa0/0 Router(config-if)# ip access-group 101 in

    • C. 

      C – Router(config)# access-list 101 deny ip host 172.16.161.150 host 172.16.162.163 Router(config)# access-list 101 permit ip any any

    • D. 

      D – Router(config)# access-list 101 deny ip 172.16.161.150 0.0.0.255 172.16.162.163 0.0.0.0 Router(config)# access-list 101 permit ip any any


  • 86. 

    Refer to the exhibit. Why would the network administrator configure RA in this manner?
    • A. 

      A. to give students access to the Internet

    • B. 

      B. to prevent students from accessing the command prompt of RA

    • C. 

      C. to prevent administrators from accessing the console of RA

    • D. 

      D. to give administrators access to the Internet

    • E. 

      E. to prevent students from accessing the Internet

    • F. 

      F. to prevent students from accessing the Admin network


  • 87. 

    An access list was written with the four statements shown in the graphic. Which single access list statement will combine all four of these statements into a single statement that will have exactly the same effect?
    • A. 

      A. access-list 10 permit 172.29.16.0 0.0.0.255

    • B. 

      B. access-list 10 permit 172.29.16.0 0.0.1.255

    • C. 

      C. access-list 10 permit 172.29.16.0 0.0.3.255

    • D. 

      D. access-list 10 permit 172.29.16.0 0.0.15.255

    • E. 

      E. access-list 10 permit 172.29.0.0 0.0.255.255


  • 88. 
    A network administrator wants to add a line to an access list that will block only Telnet access by the hosts on subnet 192.168.1.128/28 to the server at 192.168.1.5. What command should be issued to accomplish this task?
    • A. 

      A – access-list 101 deny tcp 192.168.1.128 0.0.0.15 192.168.1.5 0.0.0.0 eq 23 access-list 101 permit ip any any

    • B. 

      B – access-list 101 deny tcp 192.168.1.128 0.0.0.240 192.168.1.5 0.0.0.0 eq 23 access-list 101 permit ip any any

    • C. 

      C – access-list 1 deny tcp 192.168.1.128 0.0.0.255 192.168.1.5 0.0.0.0 eq 21 access-list 1 permit ip any any

    • D. 

      D – access-list 1 deny tcp 192.168.1.128 0.0.0.15 host 192.168.1.5 eq 23 access-list 1 permit ip any any


  • 89. 

    As a network administrator, you have been instructed to prevent all traffic originating on the LAN from entering the R2 router. Which the following command would implement the access list on the interface of the R2 router?
    • A. 

      A – access-list 101 in

    • B. 

      B – access-list 101 out

    • C. 

      C – ip access-group 101 in

    • D. 

      D – ip access-group 101 out


  • 90. 
    The following access list below was applied outbound on the E0 interface connected to the 192.169.1.8/29 LAN: access-list 135 deny tcp 192.169.1.8 0.0.0.7 eq 20 any  access-list 135 deny tcp 192.169.1.8 0.0.0.7 eq 21 any How will the above access lists affect traffic?
    • A. 

      A – FTP traffic from 192.169.1.22 will be denied

    • B. 

      B – No traffic, except for FTP traffic will be allowed to exit E0

    • C. 

      C – FTP traffic from 192.169.1.9 to any host will be denied

    • D. 

      D – All traffic exiting E0 will be denied

    • E. 

      E – All FTP traffic to network 192.169.1.9/29 will be denied


  • 91. 

    The access control list shown in the graphic has been applied to the Ethernet interface of router R1 using the ip access-group 101 in command. Which of the following Telnet sessions will be blocked by this ACL? (Choose two)
    • A. 

      A – from host PC1 to host 5.1.1.10

    • B. 

      B – from host PC1 to host 5.1.3.10

    • C. 

      C – from host PC2 to host 5.1.2.10

    • D. 

      D – from host PC2 to host 5.1.3.8


  • 92. 
    The following configuration line was added to router R1 Access-list 101 permit ip 10.25.30.0 0.0.0.255 any What is the effect of this access list configuration?
    • A. 

      A – permit all packets matching the first three octets of the source address to all destinations

    • B. 

      B – permit all packet matching the last octet of the destination address and accept all source addresses

    • C. 

      C – permit all packet matching the host bits in the source address to all destinations

    • D. 

      D – permit all packet from the third subnet of the network address to all destinations


  • 93. 
    Refer to the exhibit. What will happen to HTTP traffic coming from the Internet that is destined for 172.16.12.10 if the traffic is processed by this ACL? router#show access-lists  Extended IP access list 110 10 deny tcp 172.16.0.0 0.0.255.255 any eq telnet  20 deny tcp 172.16.0.0 0.0.255.255 any eq smtp  30 deny tcp 172.16.0.0 0.0.255.255 any eq http  40 permit tcp 172.16.0.0 0.0.255.255 any  
    • A. 

      A. Traffic will be dropped per line 30 of the ACL.

    • B. 

      B. Traffic will be accepted per line 40 of the ACL.

    • C. 

      C. Traffic will be dropped, because of the implicit deny all at the end of the ACL.

    • D. 

      D. Traffic will be accepted, because the source address is not covered by the ACL.


  • 94. 

    Refer to the exhibit. Which statement describes the effect that the Router1 configuration has on devices in the 172.16.16.0 subnet when they try to connect to SVR-A using Telnet or SSH?
    • A. 

      A. Devices will not be able to use Telnet or SSH.

    • B. 

      B. Devices will be able to use SSH, but not Telnet.

    • C. 

      C. Devices will be able to use Telnet, but not SSH.

    • D. 

      D. Devices will be able to use Telnet and SSH.


  • 95. 

    Refer to the exhibit. Which three variables (router, protocol port, and router ACL direction) apply to an extended ACL that will prevent student 01 from securely browsing the internet?
    • A. 

      A. OUT

    • B. 

      B. Router 3

    • C. 

      C. HTTPS

    • D. 

      D. IN

    • E. 

      E. Router 1


  • 96. 
    Which two statements apply to dynamic access lists? (choose two)
    • A. 

      A. they offer simpler management in large internetworks.

    • B. 

      B. you can control logging messages.

    • C. 

      C. they allow packets to be filtered based on upper-layer session information.

    • D. 

      D. you can set a time-based security policy.

    • E. 

      E. they provide a level of security against spoofing.

    • F. 

      F. they are used to authenticate individual users.


  • 97. 
    Which command shows if an access list is assigned to an interface?
    • A. 

      A. show ip interface [interface] access-lists

    • B. 

      B. show ip access-lists interface [interface

    • C. 

      C. show ip interface [interface]

    • D. 

      D. show ip access-lists [interface]


  • 98. 
    Which item represents the standard IP ACL?
    • A. 

      A. access-list 50 deny 192.168.1.1 0.0.0.255

    • B. 

      B. access-list 110 permit ip any any

    • C. 

      C. access-list 2500 deny tcp any host 192.168.1.1 eq 22

    • D. 

      D. access-list 101 deny tcp any host 192.168.1.1


  • 99. 
    Which statement about access lists that are applied to an interface is true?
    • A. 

      A. you can apply only one access list on any interface

    • B. 

      B. you can configure one access list, per direction, per layer 3 protocol

    • C. 

      C. you can place as many access lists as you want on any interface

    • D. 

      D. you can configure one access list, per direction, per layer 2 protocol


  • 100. 
    A network engineer wants to allow a temporary entry for a remote user with a specific username and password so that the user can access the entire network over the internet. Which ACL can be used?
    • A. 

      A. reflexive

    • B. 

      B. extended

    • C. 

      C. standard

    • D. 

      D. dynamic


  • 101. 
    Which parameter standard access list takes into consideration for traffic filtering decisions?
    • A. 

      A. Source MAC address

    • B. 

      B. Destination IP address

    • C. 

      C. Destination MAC address

    • D. 

      D. Source IP address


  • 102. 
    In which solution is a router ACL used?
    • A. 

      A. protecting a server from unauthorized access

    • B. 

      B. controlling path selection, based on the route metric

    • C. 

      C. reducing router CPU utilization

    • D. 

      D. filtering packets that are passing through a router


  • 103. 
    The command frame-relay map ip 10.121.16.8 102 broadcast was entered on the router. Which of the following statements is true concerning this command?
    • A. 

      A: This command should be executed from the global configuration mode.

    • B. 

      B: The IP address 10.121.16.8 is the local router port used to forward data.

    • C. 

      C: 102 is the remote DLCI that will receive the information.

    • D. 

      D: This command is required for all Frame Relay configurations.

    • E. 

      E: The broadcast option allows packets, such as RIP updates, to be forwarded across the PVC.


  • 104. 

    Refer to the exhibit. Which statement describes DLCI 17?
    • A. 

      A: DLCI 17 describes the ISDN circuit between R2 and R3.

    • B. 

      B: DLCI 17 describes a PVC on R2. It cannot be used on R3 or R1.

    • C. 

      C: DLCI 17 is the Layer 2 address used by R2 to describe a PVC to R3.

    • D. 

      D: DLCI 17 describes the dial-up circuit from R2 and R3 to the service provider.


  • 105. 
    A default Frame Relay WAN is classified as what type of physical network?
    • A. 

      A: point-to-point

    • B. 

      B: broadcast multi-access

    • C. 

      C: nonbroadcast multi-access

    • D. 

      D: nonbroadcast multipoint

    • E. 

      E: broadcast point-to-multipoint


  • 106. 
    Which of the following are key characteristics of PPP? (Choose three.)
    • A. 

      A: can be used over analog circuits

    • B. 

      B: maps Layer 2 to Layer 3 address

    • C. 

      C: encapsulates several routed protocols

    • D. 

      D: supports IP only

    • E. 

      E: provides error correction


  • 107. 
    Which three Layer 2 encapsulation types would be used on a WAN rather than a LAN? (Choose three)
    • A. 

      A: HDLC

    • B. 

      B: Ethernet

    • C. 

      C: Token Ring

    • D. 

      D: PPP

    • E. 

      E: FDDI

    • F. 

      F: Frame Relay


  • 108. 

    Refer to the exhibit. What is the meaning of the term dynamic as displayed in the output of the show frame-relay map command shown?
    • A. 

      A: The Serial0/0 interface is passing traffic.

    • B. 

      B: The DLCI 100 was dynamically allocated by the router

    • C. 

      C: The Serial0/0 interface acquired the IP address of 172.16.3.1 from a DHCP server

    • D. 

      D: The DLCI 100 will be dynamically changed as required to adapt to changes in the Frame Relay cloud

    • E. 

      E: The mapping between DLCI 100 and the end station IP address 172.16.3.1 was learned through Inverse ARP


  • 109. 
    Which of the following describes the roles of devices in a WAN? (Choose three.)
    • A. 

      A: A CSU/DSU terminates a digital local loop

    • B. 

      B: A modem terminates a digital local loop

    • C. 

      C: A CSU/DSU terminates an analog local loop

    • D. 

      D: A modem terminates an analog local loop

    • E. 

      E: A router is commonly considered a DTE device

    • F. 

      F: A router is commonly considered a DCE device


  • 110. 
    How should a router that is being used in a Frame Relay network be configured to avoid split horizon issues from preventing routing updates?
    • A. 

      A: Configure a separate sub-interface for each PVC with a unique DLCI and subnet assigned to the sub-interface

    • B. 

      B: Configure each Frame Relay circuit as a point-to-point line to support multicast and broadcast traffic

    • C. 

      C: Configure many sub-interfaces on the same subnet

    • D. 

      D: Configure a single sub-interface to establish multiple PVC connections to multiple remote router interfaces


  • 111. 
    What can a network administrator utilize by using PPP Layer 2 encapsulation? (Choose three.)
    • A. 

      A: VLAN support

    • B. 

      B: compression

    • C. 

      C: authentication

    • D. 

      D: sliding windows

    • E. 

      E: multilink support

    • F. 

      F: quality of service


  • 112. 

    The Frame Relay network in the diagram is not functioning properly. What is the cause of the problem?
    • A. 

      A: The Gallant router has the wrong LMI type configured

    • B. 

      B: Inverse ARP is providing the wrong PVC information to the Gallant router

    • C. 

      C: The S3 interface of the Steele router has been configured with the frame-relay encapsulation ietf command

    • D. 

      D: The frame-relay map statement in the Attalla router for the PVC to Steele is not correct

    • E. 

      E: The IP address on the serial interface of the Attalla router is configured incorrectly


Back to top

Removing ad is a premium feature

Upgrade and get a lot more done!
Take Another Quiz
We have sent an email with your new password.