CCENT Practice Certification Exam Quiz 1

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Kapper59
K
Kapper59
Community Contributor
Quizzes Created: 7 | Total Attempts: 2,294
| Attempts: 316 | Questions: 49
Please wait...
Question 1 / 49
0 %
0/100
Score 0/100
1. Which device connects a local LAN to a geographically separate network?

Explanation

A router is a device that connects a local LAN (Local Area Network) to a geographically separate network. It is responsible for directing network traffic between different networks, such as connecting a home network to the internet. Routers use routing tables and protocols to determine the best path for data packets to reach their destination. Unlike switches and hubs, which are used to connect devices within a local network, routers are designed to connect networks together. Therefore, a router is the correct device for connecting a local LAN to a geographically separate network.

Submit
Please wait...
About This Quiz
CCENT Practice Certification Exam Quiz 1 - Quiz

It is not uncommon for one to have cold feet on how ready they are for an exam and this is because one can never be a hundred... see moreprevent ready. Do you believe you are ready for the certification exam? If so take up the quiz below and see what you need to brush up on. see less

2. What is the purpose of using SSH to connect to a router? 

Explanation

SSH (Secure Shell) is a network protocol that provides a secure and encrypted connection to a remote device's command line interface. It ensures that the communication between the user and the router is protected from eavesdropping or unauthorized access. By using SSH, administrators can remotely access and manage the router's configuration, troubleshoot issues, and perform various administrative tasks securely. It is a preferred method for remote management of network devices, as it provides strong authentication and encryption mechanisms to protect sensitive data and prevent unauthorized access.

Submit
3. When configuring a switch to use SSH for virtual terminal connections, what is the purpose of the crypto key generate rsa command?

Explanation

The purpose of the "crypto key generate rsa" command is to create a public and private key pair. This key pair is used for encryption and authentication in SSH (Secure Shell) connections. The public key is shared with the clients trying to establish an SSH connection, while the private key is kept securely on the switch. The client uses the public key to encrypt data that can only be decrypted by the switch using its private key, ensuring secure communication between the client and the switch.

Submit
4. A company needs to connect an office router to a service provider to access a WAN. What device is needed to connect the router to the ISP if the service provider supplies a T1 line for the connection?

Explanation

A CSU/DSU (Channel Service Unit/Data Service Unit) is needed to connect the router to the ISP when the service provider supplies a T1 line. A CSU/DSU is a device that provides termination for the digital signal and converts it into a format that can be transmitted over the T1 line. It also ensures the quality and reliability of the connection.

Submit
5. Which layer of the OSI model defines logical addressing?

Explanation

The network layer of the OSI model defines logical addressing. This layer is responsible for routing and forwarding data packets across different networks. Logical addressing involves assigning unique addresses to devices on a network, such as IP addresses in the case of the Internet Protocol (IP). The network layer ensures that packets are properly addressed and delivered to their intended destinations based on these logical addresses.

Submit
6. What caused the following error message to appear? 01:11:12: %PM-4-ERR_DISABLE: psecure-violation error detected on Fa0/8, putting Fa0/8 in err-disable state 01:11:12: %PORT_SECURITY-2-PSECURE_VIOLATION: Security violation occurred, caused by MAC address 0011.a0d4.12a0 on port FastEthernet0/8. 01:11:13: %LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthernet0/8, changed state to down 01:11:14: %LINK-3-UPDOWN: Interface FastEthernet0/8, changed state to down

Explanation

The error message indicates that a security violation occurred on switch port Fa0/8, causing it to be put into an err-disable state. This suggests that port security was enabled on the switch port and an unauthorized connection was made.

Submit
7. Which command is used to create an encrypted password that restricts access to the privileged EXEC mode of a Cisco router?

Explanation

The correct answer is "RouterA(config)# enable secret cisco" because the "enable secret" command is used to create an encrypted password that restricts access to the privileged EXEC mode of a Cisco router. This command encrypts the password using the MD5 algorithm, providing a higher level of security compared to the "enable password" command.

Submit
8. . Refer to the exhibit. The router named "myhome" has received a frame from the host 192.168.254.7. The contents of this frame are being sent to host 172.16.14.243. What is the Layer 2 destination address of the frame as it leaves the myhome router?

Explanation

The Layer 2 destination address of the frame as it leaves the myhome router is 0008.a3b6.ce05.

Submit
9. Which protocol is described as an enhanced distance vector routing protocol? 

Explanation

EIGRP, or Enhanced Interior Gateway Routing Protocol, is described as an enhanced distance vector routing protocol. It combines features of both distance vector and link-state routing protocols, making it more efficient and scalable. EIGRP uses a metric that takes into account factors like bandwidth, delay, reliability, and load to determine the best path for routing. It also supports features like fast convergence and load balancing, which make it suitable for large and complex networks.

Submit
10. A company has a sales team that travels with laptops. On Fridays, the sales members come into assigned cubicles and connect their laptop to the wired network. The company is concerned that unauthorized users could also connect to the network. What can be done to ensure that unauthorized laptops are not connected to the wired network?

Explanation

Switch port security is the most appropriate solution to ensure that unauthorized laptops are not connected to the wired network. Switch port security allows the administrator to specify which devices are allowed to connect to a specific switch port by configuring MAC address filtering. This means that only authorized laptops with known MAC addresses will be able to connect to the network, preventing unauthorized access. This solution is effective in maintaining network security and preventing unauthorized users from connecting to the network.

Submit
11. A network host has the IP address 10.250.206.55/20. How many more network devices can be added to this same subnetwork? 

Explanation

The given IP address has a subnet mask of /20, which means that the first 20 bits of the IP address are fixed and represent the network portion. The remaining 12 bits can be used for host addresses. With 12 bits available, there are 2^12 or 4096 possible host addresses. However, 2 of these addresses are reserved for the network address and the broadcast address, leaving 4094 usable host addresses. Therefore, 4093 more network devices can be added to this subnetwork.

Submit
12. Which security method uses the Advanced Encryption Standard (AES)?

Explanation

WPA2 uses the Advanced Encryption Standard (AES). AES is a symmetric encryption algorithm widely used for securing data. It provides a high level of security and is considered to be one of the strongest encryption methods available. WPA2, which stands for Wi-Fi Protected Access 2, is a security protocol used to secure wireless networks. It uses AES to encrypt the data transmitted over the network, ensuring that it is protected and cannot be easily intercepted or accessed by unauthorized users.

Submit
13. What is the purpose of WEP?

Explanation

The purpose of WEP (Wired Equivalent Privacy) is to encrypt data. WEP is a security protocol used to protect wireless networks. It provides a level of confidentiality by encrypting the data transmitted over the network, making it difficult for unauthorized users to intercept and understand the information. This helps to ensure the privacy and security of the data being transmitted over the wireless network.

Submit
14. Refer to the exhibit. What two facts can be determined from the output of the ping command? (Choose two.) 

Explanation

From the output of the ping command, two facts can be determined. Firstly, one packet timed out, indicating that there was a failure to receive a response from the destination within the specified time. Secondly, four packets of data were successfully received, indicating that there were successful responses from the destination for four of the sent packets.

Submit
15. Which three statements are true about full-duplex operation on an Ethernet network? (Choose three.)  

Explanation

In full-duplex mode on an Ethernet network, there are no collisions because data can be transmitted and received simultaneously. A dedicated switch port is required for each node to enable full-duplex communication. Both the host network card and the switch port must be in full-duplex mode to establish a full-duplex connection.

Submit
16. Which type of Network Address Translation allows a host on a public network consistent access to a specified private inside host? 

Explanation

Static NAT allows a host on a public network to have consistent access to a specific private inside host. It involves mapping a public IP address to a private IP address, allowing incoming traffic to be directed to the specific inside host. This type of NAT is often used for services that need to be accessed from the internet, such as web servers or email servers.

Submit
17.

Explanation

not-available-via-ai

Submit
18. Refer to the exhibit. The devices have been configured with static IP addresses as shown. All hosts can communicate with each other but none of the hosts can communicate with the server. What is the cause of this problem? 

Explanation

The reason why none of the hosts can communicate with the server is because the IP address assigned to the server is in an incorrect subnet. This means that the server's IP address does not fall within the same range as the other devices in the network. As a result, the server and the other hosts are not able to communicate with each other.

Submit
19. Refer to the exhibit. A technician applies the configuration in the exhibit to an unconfigured router. To verify the configuration, the technician issues the show running-config command in the CLI session with the router. What lines should the technician expect to see in the router output from the show running-config command?

Explanation

The lines that the technician should expect to see in the router output from the show running-config command are: enable secret 5 $1$v0/3$QyQWmJyT7zCa/yaBRasJm0, enable password 7 14141E0A1F17, and line console 0 password 7 020507550A. These lines indicate that the router has been configured with an enable secret password, an enable password, and a password for the console line. The "5" and "7" in the commands indicate the type of encryption used for the passwords.

Submit
20. Refer to the exhibit. If host A sends an IP packet to host B, what will the destination address be in the frame when it leaves host A?

Explanation

When host A sends an IP packet to host B, the destination address in the frame when it leaves host A will be BB:BB:BB:BB:BB:BB.

Submit
21. What are two ways that TCP uses the sequence numbers in a segment? (Choose two.)  

Explanation

TCP uses sequence numbers in a segment to identify missing segments at the destination and to reassemble the segments at the remote location. By assigning a unique sequence number to each segment, TCP can keep track of which segments have been received and which are missing. This allows TCP to request retransmission of any missing segments and ensure that all segments are received in the correct order. Additionally, TCP uses the sequence numbers to reassemble the received segments in the correct order at the remote location.

Submit
22. Which set of commands is used to name a router and save the configuration?

Explanation

The correct set of commands to name a router and save the configuration is "Router(config)# hostname South", "South(config)# exit", and "South# copy running-config startup-config".

Submit
23. Which router component holds the routing table, ARP cache, and running configuration file?

Explanation

RAM stands for Random Access Memory, which is a type of computer memory that is used to store data that is actively being used by the router. It is a volatile memory, meaning that its contents are lost when the router is powered off or restarted. The routing table, ARP cache, and running configuration file are all important data that need to be quickly accessible by the router during its operation, so they are stored in RAM. Therefore, RAM is the correct answer for the component that holds these data.

Submit
24. Which three statements characterize UDP? (Choose three.)

Explanation

UDP is a connectionless protocol that operates at Layer 4 of the OSI model. It does not establish a connection before sending data and does not guarantee delivery of data. UDP relies on the application layer protocols for error detection, as it does not have built-in error detection and recovery mechanisms. This makes UDP a fast and efficient protocol for applications that prioritize speed over reliability, such as streaming media or online gaming.

Submit
25. Refer to the exhibit. A network administrator working at HostA has problems accessing the FTP server. Layer 3 connectivity testing was successful from HostA to the S0/0/1 interface of RouterB. Which set of commands will allow the network administrator to telnet to RouterB to check its status? 

Explanation

The set of commands will allow the network administrator to telnet to RouterB to check its status because it configures the enable secret password, sets up the virtual terminal lines for telnet access, sets a password for the virtual terminal lines, and enables login authentication for the virtual terminal lines. This allows the network administrator to securely access RouterB using telnet and check its status.

Submit
26. Refer to the exhibit. The switches are in their default configuration. Host A needs to communicate with host D, but host A does not have the MAC address for its default gateway. Which network hosts will receive the ARP request sent by host A? 

Explanation

Host A needs to communicate with host D, but it does not have the MAC address for its default gateway. In this scenario, host A will send an ARP request to the network asking for the MAC address of the default gateway. The ARP request will be broadcasted to all the hosts in the network. Therefore, only hosts B and C will receive the ARP request sent by host A.

Submit
27. Refer to the exhibit. Which password will the administrator need to use on this device to enter privileged EXEC mode?

Explanation

The administrator will need to use the password "cisco" to enter privileged EXEC mode on this device.

Submit
28. Refer to the exhibit. If all the switches have a default configuration, how many broadcast domains are in the network?

Explanation

In a network, a broadcast domain is a group of devices that receive broadcast frames from each other. In the given exhibit, there are two switches connected together. Each switch represents a separate broadcast domain. The devices connected to each switch can communicate with each other using broadcast frames within their respective switch's broadcast domain. Therefore, the correct answer is 2.

Submit
29. Which two items are required for initial configuration of Cisco routers if the IOS command-line interface is used? (Choose two.)

Explanation

A rollover cable is required for connecting to the console port of the Cisco router, which is used for initial configuration. Terminal emulation software is needed to establish a connection between the computer and the router's console port, allowing the user to interact with the IOS command-line interface.

Submit
30.

Explanation

The correct answer is that the packets will be sent to Router1 and dropped because private addresses are not transmitted across the Internet. Private addresses are used for internal networks and are not routable on the public Internet. Therefore, when the packets with private addresses are sent to Router1, it recognizes that these addresses cannot be transmitted across the Internet and drops the packets.

Submit
31. Refer to the exhibit. For security reasons, information about the HQ R1 router model and IP address should not be accessible from the Site 2 R2 router. What security measure should be implemented?  

Explanation

To prevent the Site 2 R2 router from accessing information about the HQ R1 router model and IP address, the security measure that should be implemented is to disable CDP (Cisco Discovery Protocol) on the R1 interface that connects to R2. CDP is a Cisco proprietary protocol used to gather information about neighboring devices, and by disabling it on the specific interface, the R2 router will not be able to obtain any information about the HQ R1 router.

Submit
32. Which two statements describe the functions or characteristics of ROM in a router? (Choose two.)

Explanation

ROM in a router maintains instructions for POST diagnostics, which means it contains the necessary instructions for the router's Power-On Self Test (POST) to check the hardware components during startup. Additionally, ROM stores the bootstrap program, which is responsible for initializing the router's hardware and loading the operating system. These characteristics make ROM essential for the proper functioning and booting of the router.

Submit
33. Company has an 802.11b wireless access point installed. Which type of wireless NIC is a valid standards-based one but will not work in this environment?

Explanation

The 802.11a wireless NIC is a valid standards-based one but will not work in this environment because it operates on a different frequency band than the 802.11b wireless access point. The 802.11a standard uses the 5 GHz frequency band, while the 802.11b standard uses the 2.4 GHz frequency band. Therefore, a wireless NIC that supports 802.11a will not be able to communicate with the 802.11b access point.

Submit
34. Refer to the exhibit. Switch1 has only the following commands added to a default Cisco 2960 configuration: enable secret cisco line vty 0 4 password Kn0ckkn-cK login interface vlan 1 ip address 10.0.1.8 255.255.255.0 no shutdown Assume that routing between networks is functioning properly and that Switch2 has been properly configured for remote access. What would the result be if the telnet 10.0.2.2 command is issued from Switch1 privileged mode?

Explanation

When the telnet 10.0.2.2 command is issued from Switch1 privileged mode, the packet would be dropped. This is because Switch1 does not have a route to the 10.0.2.0/24 network, which is the network that Switch2 is on. Since there is no route, the packet cannot reach its destination and is therefore dropped.

Submit
35. Refer to the exhibit. A network administrator can ping the Denver router, but gets a 'Password Required but None Set' message when trying to connect remotely via Telnet. Which command or sequence of commands must be applied to the Denver router to allow remote access?

Explanation

not-available-via-ai

Submit
36. Which two statements describe the command ip route 192.168.7.24 255.255.255.248 192.168.7.9? (Choose two.)

Explanation

The command "ip route 192.168.7.24 255.255.255.248 192.168.7.9" is used to define a static route. It specifies that any packet destined for host 192.168.7.30 will be forwarded to the next-hop address 192.168.7.9. Therefore, the statement "A packet that is destined for host 192.168.7.30 will be forwarded to address 192.168.7.9" is correct.

Submit
37. From what two locations can a router load the Cisco IOS during the boot process? (Choose two.)

Explanation

During the boot process, a router can load the Cisco IOS from two locations: the TFTP server and the Flash memory. The TFTP server is a remote location where the router can retrieve the IOS image over the network. The Flash memory, on the other hand, is a non-volatile storage location within the router itself, where the IOS image can be stored and loaded during the boot process. Both of these locations provide the necessary files for the router to initialize and operate with the Cisco IOS.

Submit
38. What can a network administrator modify on a router to specify the location from which the Cisco IOS loads? (Choose two.)

Explanation

A network administrator can modify the startup configuration file on a router to specify the location from which the Cisco IOS loads. This file contains the configuration settings for the router and can be modified to specify the location of the IOS image. Additionally, the network administrator can modify the configuration register value on the router to specify the location from which the IOS loads. The configuration register is a 16-bit value that determines various settings on the router, including the boot source for the IOS image. By modifying this value, the administrator can specify the location from which the IOS loads.

Submit
39. Refer to the exhibit. What is the broadcast address for the subnetwork on which host A resides?

Explanation

The broadcast address for a subnetwork is the highest address in that subnetwork, which is used to send a message to all devices within that subnetwork. In this case, the highest address given is 10.159.255.255, so this is the broadcast address for the subnetwork on which host A resides.

Submit
40. Refer to the exhibit. What two facts can be determined about the network from the exhibited output? (Choose two.)

Explanation

From the exhibited output, two facts can be determined about the network. First, the Negril router is connected to the S0/1 interface of the MontegoBay router. Second, layer 2 is operational on three ports of the MontegoBay router.

Submit
41. Which two statements correctly identify the function of router memory components? (Choose two.)

Explanation

The first correct statement is that ROM contains diagnostic self test procedures executed on hardware modules. ROM, or Read-Only Memory, is a type of memory that contains permanent instructions or data that cannot be modified. In the case of a router, ROM holds the diagnostic self test procedures that are executed to check the hardware modules during the boot sequence.

The second correct statement is that Flash memory does not lose its contents when a router is powered off. Flash memory is a type of non-volatile memory that retains its data even when the power is turned off. In a router, the IOS (Internetwork Operating System) is typically stored in the Flash memory, allowing the router to retain its operating system and configurations even after a power cycle.

Submit
42. Which addresses are valid host IP addresses given the subnet mask 255.255.255.248? (Choose three.)

Explanation

The subnet mask 255.255.255.248 indicates that the first 29 bits of the IP address are the network portion, and the remaining 3 bits are the host portion. Therefore, the valid host IP addresses are those that have the same first 29 bits as the network address but have different combinations of the last 3 bits. Among the given options, 223.168.210.100, 220.100.100.154, and 196.123.142.190 satisfy this condition and are valid host IP addresses.

Submit
43. The router receives a packet with the destination address of 172.16.30.79/22. To which subnetwork does this packet belong?

Explanation

The given destination address, 172.16.30.79/22, falls within the range of 172.16.28.0/22. This is because the /22 subnet mask allows for a range of IP addresses from 172.16.28.0 to 172.16.31.255. Therefore, the packet belongs to the subnetwork 172.16.28.0/22.

Submit
44. Refer to the exhibit. Which two addresses are "inside global" addresses? (Choose two.)

Explanation

The two addresses that are "inside global" addresses are 198.133.219.35 and 198.133.219.44.

Submit
45. Refer to the exhibit. If host 1 was to send an HTTP request to the web server that connects to Router2, what type of Layer 2 frame would be sent between Router1 and the ISP?

Explanation

The correct answer is a frame with a header and trailer, but no MAC addresses. This is because the Layer 2 frame between Router1 and the ISP does not need MAC addresses as it is being sent over the internet. The header and trailer in the frame would contain the necessary information for routing the packet, such as IP addresses and other protocol-specific information.

Submit
46.

Explanation

not-available-via-ai

Submit
47. Refer to the exhibit. A network administrator can successfully ping, using IP addresses, between router Jax and router Atlanta. However, when the command telnet Atlanta is entered from the Jax router, the Telnet connection fails. Which two reasons could be the cause of the failure? (Choose two.)

Explanation

The first reason for the Telnet connection failure could be that the Jax router does not have an entry for Atlanta in its host table. This means that the Jax router does not know the IP address associated with the hostname "Atlanta" and therefore cannot establish a connection.

The second reason could be that access to a DNS server is not available. A DNS server is responsible for resolving hostnames to their corresponding IP addresses. If the Jax router does not have access to a DNS server, it will be unable to resolve the hostname "Atlanta" to its IP address, resulting in a failed Telnet connection.

Submit
48. Refer to the exhibit. Host A sends a data packet to host B. What will be the addressing information of the data packet when it reaches host B? Refer to the exhibit. Host A sends a data packet to host B. What will be the addressing information of the data packet when it reaches host B?

Explanation

not-available-via-ai

Submit
49. Efee

Explanation

not-available-via-ai

Submit
View My Results

Quiz Review Timeline (Updated): Mar 20, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 20, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Jun 09, 2011
    Quiz Created by
    Kapper59
Cancel
  • All
    All (49)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
Which device connects a local LAN to a geographically separate...
What is the purpose of using SSH to connect to a router? 
When configuring a switch to use SSH for virtual terminal connections,...
A company needs to connect an office router to a service provider to...
Which layer of the OSI model defines logical addressing?
What caused the following error message to appear?...
Which command is used to create an encrypted password that restricts...
. Refer to the exhibit. The router named "myhome" has...
Which protocol is described as an enhanced distance vector routing...
A company has a sales team that travels with laptops. On Fridays, the...
A network host has the IP address 10.250.206.55/20. How many more...
Which security method uses the Advanced Encryption Standard (AES)?
What is the purpose of WEP?
Refer to the exhibit. What two facts can be determined from the output...
Which three statements are true about full-duplex operation on an...
Which type of Network Address Translation allows a host on a public...
Refer to the exhibit. The devices have been configured with static IP...
Refer to the exhibit. A technician applies the configuration in the...
Refer to the exhibit. If host A sends an IP packet to host B, what...
What are two ways that TCP uses the sequence numbers in a segment?...
Which set of commands is used to name a router and save the...
Which router component holds the routing table, ARP cache, and running...
Which three statements characterize UDP? (Choose three.)
Refer to the exhibit. A network administrator working at HostA has...
Refer to the exhibit. The switches are in their default configuration....
Refer to the exhibit. Which password will the administrator need to...
Refer to the exhibit. If all the switches have a default...
Which two items are required for initial configuration of Cisco...
Refer to the exhibit. For security reasons, information about the HQ...
Which two statements describe the functions or characteristics of ROM...
Company has an 802.11b wireless access point installed. Which type of...
Refer to the exhibit. Switch1 has only the following commands added to...
Refer to the exhibit. A network administrator can ping the Denver...
Which two statements describe the command ip route 192.168.7.24...
From what two locations can a router load the Cisco IOS during the...
What can a network administrator modify on a router to specify the...
Refer to the exhibit. What is the broadcast address for the subnetwork...
Refer to the exhibit. What two facts can be determined about the...
Which two statements correctly identify the function of router memory...
Which addresses are valid host IP addresses given the subnet mask...
The router receives a packet with the destination address of...
Refer to the exhibit. Which two addresses are "inside...
Refer to the exhibit. If host 1 was to send an HTTP request to the web...
Refer to the exhibit. A network administrator can successfully ping,...
Refer to the exhibit. Host A sends a data packet to host B. What will...
Efee
Alert!

Advertisement