CCNA

112 Questions  I  By Grahamley on April 10, 2012
CCNA study

  

Question Excerpt

Removing question excerpt is a premium feature

Upgrade and get a lot more done!
1.  For which type of connection should a straight-through cable be used?
A.
B.
C.
D.
E.
2.  Which type of cable is used to connect the COM port of a host to the COM port of a router or switch?
A.
B.
C.
D.
3.  What is the first 24 bits in a MAC address called?
A.
B.
C.
D.
4.  In an Ethernet network, under what two scenarios can devices transmit? (Choose two)
A.
B.
C.
D.
E.
5.  Which two benefits are provided by using a hierarchical addressing network addressing scheme? (Choose two)
A.
B.
C.
D.
E.
6.  When a host transmits data across a network to another host, which process does the data go through?
A.
B.
C.
D.
7.  Which two Ethernet fiber-optic modes support distances of greater than 550 meters?
A.
B.
C.
D.
E.
8.  Refer to the exhibit. What type of connection would be supported by the cable diagram shown?
A.
B.
C.
D.
9.  Which two topologies are using the correct type of twisted-pair cables? (Choose two)
A.
B.
C.
D.
E.
10.  Refer to the exhibit. What type of connection would be supported by the cable diagram shown?
A.
B.
C.
D.
11.  What are some of the advantages of using a router to segment the network? (Choose two)
A.
B.
C.
D.
E.
12.  Which of the following statements describe the network shown in the graphic? (Choose two)
A.
B.
C.
D.
E.
F.
13.  Refer to the exhibit. The two connected ports on the switch are not turning orange or green. What would be the most effective steps to troubleshoot this physical layer problem? (Choose three)
A.
B.
C.
D.
E.
F.
14.  For what two purposes does the Ethernet protocol use physical addresses? (Choose two)
A.
B.
C.
D.
E.
F.
15.  Refer to the exhibit. Two buildings on the San Jose campus of a small company must be connected to use Ethernet with a bandwidth of at least 100 Mbps. The company is concerned about possible problems from voltage potential difference between the two buildings. Which media type should be used for the connection?
A.
B.
C.
D.
16.  Which command can be used from a PC to verify the connectivity between host that connect through path?
A.
B.
C.
D.
17.  Refer to the exhibit. A network engineer is troubleshooting an internet connectivity problem on the computer. What causing the problem?
A.
B.
C.
D.
18.  How many broadcast domains are shown in the graphic assuming only the default vlan is configured on the switches?
A.
B.
C.
D.
19.  Refer to the exhibit. PC> tracert 10.16.176.23 Tracing route to 10.16.176.23 over a maximum of 30 hops 1 31 ms 31 ms 32ms 172.16.182.1 2 62 ms 62 ms 62 ms 192.1681.6 3 93 ms 92 ms 34 ms 192.168.1.10 4 125 ms 110ms 125ms 10.16.176.23 Trace complete.   Host A has tested connectivity to a remote network. What is the default gateway for host A?
A.
B.
C.
D.
20.  What functions do routers perform in a network? (Choose two)
A.
B.
C.
D.
E.
F.
21.  How does using the service password encryption command on a router provide additional security?
A.
B.
C.
D.
E.
22.  Refer to the diagram. What is the largest configuration file that can be stored on this router? R# show version Cisco IOS Software. 1841 Software (C1841-IPBASE-M}, Version 12.4(1a), RELEASE SOFTWARE (fc2) Technical Support: http://www.cisco.com/techsupport  Copyright (c) 1986*2005 by Cisco Systems, Inc. Compiled Fri 27-May-0512:32 by hqluong ROM: System Bootstrap. Version 12.3(8r)T8, RELEASE SOFTWARE (fc1) N-East uptime is 5 days, 49 minutes System returned to ROM by reload at 15:17:00 UTC Thu Jun 8 2006  System image file is “flash:c1841-ipbase-mz.124-1a.bin” Cisco 1841 (revision 5.0) with 114688K/16384K bytes of memory. Processor board ID FTX0932W21Y 2 FastEthernet interfaces 2 Low-speed serial(sync/async) interfaces DRAM configuration is 64 bits wide with parity disabled. 191K bytes of NVRAM. 31360K bytes of ATA CompactFlash (Read/Write) Configuration register Is 0×2102 R#
A.
B.
C.
D.
23.  Which command shows system hardware and software version information?
A.
B.
C.
D.
E.
24.  Refer to the exhibit. If number 2 is selected from the setup script, what happens when the user runs setup from a privileged prompt? [0] Go to the IOS command prompt without saving this config. [1] Return back to the setup without saving this config. [2] Save this configuration to nvram and exit. Enter your selection [2]:
A.
B.
C.
D.
25.  Which command shows your active Telnet connections?
A.
B.
C.
D.
26.  Which command can you use to determine the cisco ios feature set on a cisco router?
A.
B.
C.
D.
E.
27.  A system administrator types the command to change the hostname of a router. Where on the Cisco IFS is that change stored?
A.
B.
C.
D.
E.
28.  Before installing a new, upgraded version of the IOS, what should be checked on the router, and which command should be used to gather this information? (Choose two)
A.
B.
C.
D.
E.
F.
29.  Refer to the exhibit. A network administrator configures a new router and enters the copy startup-config running-config on the router. The network administrator powers down the router and sets it up at a remote location. When the router starts, it enter the system configuration dialog as shown. What is the cause of the problem? — System Configuration Dialog — Would you like to enter the initial configuration dialog? [yes/no]: % Please answer yes’ or ‘no’. Would you like to enter the initial configuration dialog? [yes/ho]: n Would you like to terminate autoinstall? [yes]: Press RETURN to get started!
A.
B.
C.
D.
E.
30.  Refer to the exhibit. What can be determined about the router from the console output?
A.
B.
C.
D.
31.  When you are logged into a switch, which prompt indicates that you are in privileged mode?
A.
B.
C.
D.
E.
32.  Which command is used to copy the configuration from RAM into NVRAM?
A.
B.
C.
D.
E.
33.  Which command is used to load a configuration from a TFTP server and merge the configuration into RAM?
A.
B.
C.
D.
34.  There are no boot system commands in a router configuration in NVRAM. What is the fallback sequence that router will use to find an IOS during reload?
A.
B.
C.
D.
E.
35.  A Cisco router is booting and has just completed the POST process.It is now ready to find and load an IOS image. What function does the router perform next?
A.
B.
C.
D.
36.  Refer to the partial command output shown. Which two statements are correct regarding the router hardware? (Choose two) system image file is “flash:c2600-do3s-mz.120-5.T1″ Cisco 2621 (MPC860) processor (revision 0×600) with 53248K/12288K bytes of memory Processor board ID JAD05280307 (3536592999) M860 processor: part number 0, mask 49  Bridging software. X.25 software, version 3.0.0. 2 FastEthernet/IEEE 802.3 interface(s) 2 Serial(sync/async) network interface(s) 2 Low-speed serial(sync/async) network interface(s) 16 terminal line(s) 32K bytes of non-volatile configuration memory. 16384K bytes of processor board system flash (Read/Write)
A.
B.
C.
D.
E.
F.
37.  Which router IOS commands can be used to troubleshoot LAN connectivity problems? (Choose three)
A.
B.
C.
D.
E.
F.
38.  Which two locations can be configured as a source for the IOS image in the boot system command? (Choose two)
A.
B.
C.
D.
E.
F.
39.  Refer to the exhibit. Why is flash memory erased prior to upgrading the IOS image from the TFTP server? Router# copy tftp flash Address or name of remote host []? 192.168.2.167  Source filename []? c1600-k8sy-mz.123-16a.bin  Destination filename [c1600-k8sy-mz.123-16a.bin]? Accessing tftp://192.168.2.167/ c1600-k8sy-mz.l23-16a.bin… Erasing flash before copying? [confirm] Erasing the flash filesystem will remove all files! continue? [confirm]  Erasing device  Eeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeee  Eeeeeeeeeeeeeeeeeeeeeeeeeeeeeee …erased  Erase of flash: complete Loading c1600-k8sy-mz.l23-16a.bin from 192.168.2.167 (via Ethernet0): !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! [OK - 6888962/13777920 bytes] verifying checksum… OK (0x7BF3) 6888962 bytes copied in 209.920 secs (32961 bytes/sec) Router#
A.
B.
C.
D.
40.  Which command reveals the last method used to powercycle a router?
A.
B.
C.
D.
41.  Refer to the exhibit. A router boots to the prompt shown in the exhibit. What does this signify, and how should the network administrator respond?  rommon 1>  
A.
B.
C.
D.
42.  What should be done prior to backing up an IOS image to a TFTP server? (Choose three)
A.
B.
C.
D.
E.
F.
43.  Which two privileged mode cisco ios commands can be used to determine a cisco router chassis serial number? (choose two)
A.
B.
C.
D.
E.
44.  Which command helps a network administrator to manage memory by displaying flash memory and NVRAM utilization?
A.
B.
C.
D.
45.  A network administrator changes the configuration register to 0×2142 and reboots the router. What are two results of making this change? (Choose two)
A.
B.
C.
D.
E.
46.  Refer to the exhibit. For what two reasons has the router loaded its IOS image from the location that is shown? (Choose two) Router1> show version Cisco Internetwork Operating System Software IOS ™ 7200 Software (C7200-J-M), Experimental Version 11.3tl997091S:1647S2)  [hampton-nitro-baseline 249] Copyright (c) 1986-1997 by cisco Systems, Inc. Compiled Wed 08-0ct-97 06:39 by hampton Image text-base: 0×60008900, data-base: 0x60B98000 ROM: System Bootstrap, Version 11.1(11855) [beta 2], INTERIM SOFTWARE  BOOTPLASH: 7200 Software (C7200-BOOT-M), Version 11.1(472), RELEASE SOFTWARE (fcl) Router1 uptime is 23 hours, 33 minutes System restarted by abort at PC 0x6022322C at 10:50:SS PDT Tue Oct 21 1997  System image file is “tftp://112.16.1.129/hampton/nitro/c7200-j-mz” cisco 7206 (NPE150) processor with 57344K/8192K bytes of memory. <output omitted> Configuration register is 0×2102
A.
B.
C.
D.
E.
47.  Which of the following correctly describe steps in the OSI data encapsulation process? (Choose two)
A.
B.
C.
D.
E.
48.  Which layer of the OSI reference model uses the hardware address of a device to ensure message delivery to the proper host on a LAN?
A.
B.
C.
D.
49.  Which layer of the OSI reference model uses flow control, sequencing, and acknowledgments to ensure that reliable networking occurs?
A.
B.
C.
D.
E.
50.  Which layer in the OSI reference model is responsible for determining the availability of the receiving program and checking to see if enough resources exist for that communication?
A.
B.
C.
D.
E.
51.  Data transfer is slow between the source and destination. The quality of service requested by the transport layer in the OSI reference model is not being maintained. To fix this issue, at which layer should the troubleshooting process begin?
A.
B.
C.
D.
E.
52.  Which protocols are found in the network layer of the OSI reference model and are responsible for path determination and traffic switching?
A.
B.
C.
D.
53.  Refer to the exhibit. An administrator pings the default gateway at 10.10.10.1 and sees the output as shown. At which OSI layer is the problem? C:\> ping 10.10.10.1 Pinging 10.10.10.1 with 32 bytes of data: Request timed out. Request timed out. Request timed out. Request timed out. Ping statistics for 10.10.10.1: Packets: sent – 4, Received = 0, Lost – 4 (100% loss)  
A.
B.
C.
D.
E.
54.  Which of the following are types of flow control? (Choose three)
A.
B.
C.
D.
E.
55.  A network administrator is verifying the configuration of a newly installed host by establishing an FTP connection to a remote server. What is the highest layer of the protocol stack that the network administrator is using for this operation?
A.
B.
C.
D.
E.
F.
56.  A receiving host computes the checksum on a frame and determines that the frame is damaged. The frame is then discarded. At which OSI layer did this happen?
A.
B.
C.
D.
E.
57.  As a frame leaves a Layer 3 device, the Layer 2 encapsulation information is changed from what it was when it entered the device. For what two reasons can this happen? (Choose two)
A.
B.
C.
D.
E.
58.  Acknowledgement, Sequencing, and Flow control are characteristics of which OSI layer?
A.
B.
C.
D.
E.
F.
59.  An inbound access list has been configured on a serial interface to deny packet entry for TCP and UDP ports 21, 23 and 25. What types of packets will be permitted by this ACL? (Choose three)
A.
B.
C.
D.
E.
F.
60.  What are two characteristics of Telnet? (Choose two)
A.
B.
C.
D.
E.
61.  An administrator issues the command ping 127.0.0.1 from the command line prompt on a PC. If a reply is received, what does this confirm?
A.
B.
C.
D.
E.
62.  Where does routing occur within the DoD TCP/IP reference model?
A.
B.
C.
D.
63.  A host is attempting to send data to another host on a different network. What is the first action that the sending host will take?
A.
B.
C.
D.
64.  A TCP/IP Transfer is diagrammed in the exhibit. A window size of three has been negotiated for this transfer. Which message will be returned from the receiver to the sender as part of this TCP/IP transfer?
A.
B.
C.
D.
E.
F.
65.  What is the purpose using the traceroute command?
A.
B.
C.
D.
E.
66.  A network admin wants to know every hop the packets take when he accesses cisco.com. Which command is the most appropriate to use?
A.
B.
C.
D.
67.  Refer to the exhibit. Host A pings Host B. What source MAC address and source IP address are contained in the frame as the frame leaves R2 destined for host B?
A.
B.
C.
D.
E.
F.
68.  Host 1 is trying to communicate with Host 2. The e0 interface on Router C is down. Which of the following are true? (Choose two)
A.
B.
C.
D.
E.
F.
69.  Refer to the exhibit. The switch in the graphic has a default configuration and the MAC table is fully populated. In addition, this network is operating properly. The graphic represents selected header information in a frame leaving host A. What can be concluded from this information?
A.
B.
C.
D.
70.  Refer to the exhibit. What can be determined from the output?
A.
B.
C.
D.
71.  Refer to the exhibit. What could be possible causes for the “Serial0/0 is down” interface status? (Choose two)
A.
B.
C.
D.
E.
72.  Which line from the output of the show ip interface command indicates a layer 1 problem?
A.
B.
C.
D.
73.  Refer to the exhibit. What is the meaning of the output MTU 1500 bytes?
A.
B.
C.
D.
E.
F.
74.  The network administrator normally establishes a Telnet session with the switch from host A. The administrator’s attempt to establish a connect via Telnet to the switch from host B fails, but pings from host B to other two hosts are successful. What is the issue for this problem?
A.
B.
C.
D.
75.  Which command displays CPU utilization?
A.
B.
C.
D.
76.  Refer to the exhibit. You are connected to the router as user Mike. Which command allows you to see output from the OSPF debug command?
A.
B.
C.
D.
77.  An administrator attempts a traceroute but receives a “Destination Unreachable” message. Which protocol is responsible for that message?
A.
B.
C.
D.
78.  DNS servers provide what service?
A.
B.
C.
D.
79.  Which of the following protocols uses both TCP and UDP ports?
A.
B.
C.
D.
80.  Which protocol should be used to establish a secure terminal connection to a remote network device?
A.
B.
C.
D.
E.
F.
81.  A network administrator issues the ping 192.168.2.5 command and successfully tests connectivity to a host that has been newly connected to the network. Which protocols were used during the test? (Choose two)
A.
B.
C.
D.
E.
82.  Which network protocol does DNS use?
A.
B.
C.
D.
E.
83.  When two hosts are trying to communicate across a network, how does the host originating the communication determine the hardware address of the host that it wants to “talk” to?
A.
B.
C.
D.
E.
84.  Your boss is learning a CCNA training course, refer to the exhibit. The access list has been configured on the S0/0 interface of router RTB in the outbound direction. Which two packets, if routed to the interface, will be denied? (Choose two) access-list 101 deny tcp 192.168.15.32 0.0.0.15 any eq telnet access-list 101 permit ip any any
A.
B.
C.
D.
E.
F.
85.  Refer to the graphic. It has been decided that PC1 should be denied access to Server. Which of the following commands are required to prevent only PC1 from accessing Server1 while allowing all other traffic to flow normally? (Choose two)
A.
B.
C.
D.
86.  Refer to the exhibit. Why would the network administrator configure RA in this manner?
A.
B.
C.
D.
E.
F.