A Practice Quiz For The CCENT Certification Exam

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Rodney.butler
R
Rodney.butler
Community Contributor
Quizzes Created: 21 | Total Attempts: 29,070
| Attempts: 3,149 | Questions: 50
Please wait...
Question 1 / 50
0 %
0/100
Score 0/100
1.
for Reference only... Choose C....

Explanation

not-available-via-ai

Submit
Please wait...
About This Quiz
A Practice Quiz For The CCENT Certification Exam - Quiz


Do you have any experience with CCENT? The CCENT is the acronym for Cisco Certified Entry Networking Technician. It is an entry-level certification designed to give someone the... see morebasic knowledge to begin a career in networking and instill in someone the appropriate networking skills to understand how networking affects applications or operating systems. A programmer, for example, might be interested in this certification. This quiz will give you some insight regarding going in for this certification yourself. see less

2.
Reference place holder.. Choose Answer C...

Explanation

not-available-via-ai

Submit
3.

For Reference only... Choose D....

Explanation

not-available-via-ai

Submit
4. When configuring a switch to use SSH for virtual terminal connections, what is the purpose of the crypto key generate rsa command?

Explanation

The purpose of the "crypto key generate rsa" command is to create a public and private key pair. This key pair is necessary for secure communication between the switch and clients using SSH. The public key is used to encrypt data sent from the switch, while the private key is used to decrypt the data on the receiving end. This ensures that the communication is secure and cannot be easily intercepted or tampered with.

Submit
5.
Refer to the exhibit. If Host 1 needs to request its IP address from the server, what protocol would be used to process that request?

Explanation

When Host 1 needs to request its IP address from the server, it would use the DHCP (Dynamic Host Configuration Protocol) protocol to process that request. DHCP is responsible for dynamically assigning IP addresses to devices on a network. It allows Host 1 to automatically obtain an IP address, subnet mask, default gateway, and other network configuration parameters from the server, making network configuration easier and more efficient.

Submit
6. A network administrator wants to configure a Cisco 2960 switch so that access to each switch port is limited to one MAC address. What will accomplish the administrator’s objective?

Explanation

Port security is a feature on Cisco switches that allows the network administrator to limit the number of MAC addresses that can be learned on a specific switch port. By enabling port security, the administrator can ensure that only one MAC address is allowed on each switch port, effectively limiting access to that port. This helps to prevent unauthorized devices from connecting to the network and enhances network security.

Submit
7.
Refer to the exhibit. Considering the information that follows and the exhibit, where is the data flowing?

Source IP address: 192.168.1.88
Destination IP address: 209.165.200.225
Source MAC address: 00-11-12-7a-41-10
Destination MAC address: 00-0d-cc-f4-ad-2c
Source Port: 1464
Destination Port: 23

Explanation

The data is flowing from the host (laptop) to the default gateway router. This can be determined by looking at the source and destination IP addresses. The source IP address is 192.168.1.88, which is the IP address of the host (laptop), and the destination IP address is 209.165.200.225, which is the IP address of the default gateway router.

Submit
8. Which technology is primarily used for security in a wireless network environment?

Explanation

WPA (Wi-Fi Protected Access) is primarily used for security in a wireless network environment. It is a security protocol designed to provide secure access to Wi-Fi networks. WPA encrypts the data transmitted over the network, making it difficult for unauthorized users to access and intercept the information. It uses authentication and encryption methods to ensure the confidentiality and integrity of the data being transmitted. WPA also supports different authentication methods, such as Pre-Shared Key (PSK) and Enterprise, providing flexibility in securing wireless networks.

Submit
9. In what two situations would UDP be the preferred transport protocol over TCP? (Choose two.)

Explanation

UDP would be the preferred transport protocol over TCP when a faster delivery mechanism is needed because UDP does not have the overhead of establishing and maintaining a connection like TCP does. Additionally, when applications do not need to guarantee delivery of the data, UDP can be used as it does not provide reliability mechanisms such as acknowledgments and retransmissions.

Submit
10. Why is it important for the router to maintain an accurate routing table?

Explanation

It is important for the router to maintain an accurate routing table because it allows the router to determine the best path to the destination network. The routing table contains information about the available paths and their associated metrics, such as hop count, bandwidth, and delay. By accurately maintaining this table, the router can make informed decisions on which path to choose in order to efficiently deliver packets to their intended destination. This helps to optimize network performance and ensure that data is transmitted in the most efficient and reliable manner.

Submit
11. A wireless network has one access point installed. Users at some locations in the office complain that their wireless access is slow, while others say that the wireless network performance is fine. What should be done to remedy this situation?

Explanation

To improve the wireless network performance in the office, installing another access point at a different location within the office is recommended. This will help to distribute the network coverage more evenly and reduce congestion. By adding another access point, users in the areas that are currently experiencing slow access will have better connectivity and improved network performance.

Submit
12.
Refer to the exhibit. The router that is named myhome has received a frame from the host 192.168.254.7. The contents of this frame are being sent to host 172.16.14.243. What is the Layer 2 destination address of the frame as it leaves the myhome router?

Explanation

The Layer 2 destination address of the frame as it leaves the myhome router is 0008.a3b6.ce05.

Submit
13. Given a host with the IP address 192.168.65.54 and a subnet mask of 255.255.255.240, to which network does the host belong?

Explanation

The given host belongs to the network 192.168.65.48 because the subnet mask 255.255.255.240 indicates that the first 28 bits of the IP address are used for the network address, and the remaining 4 bits are used for host addresses. So, the network address is obtained by applying the subnet mask to the IP address, which gives 192.168.65.48 as the network address.

Submit
14. Which group of commands allows a router to be administered remotely?

Explanation

The group of commands "line vty 0 4, password cisco, login" allows a router to be administered remotely. The "line vty 0 4" command specifies the virtual terminal lines that can be used for remote administration. The "password cisco" command sets the password for remote access. The "login" command enables the router to prompt for a password when someone tries to connect remotely.

Submit
15. ABC company needs to connect its router to an ISP to access the Internet. What device is needed to connect the router to the ISP if the ISP supplies a T1 leased line for the connection?

Explanation

To connect the router to the ISP using a T1 leased line, a CSU/DSU device is needed. A CSU/DSU (Channel Service Unit/Data Service Unit) is a device that converts the digital signals from the router into a format suitable for transmission over the T1 leased line. It also performs functions such as signal conditioning, line monitoring, and error detection. This device is specifically designed for connecting routers to digital leased lines like T1 lines. A modem, DSL router, NT1 device, or ISDN modem would not be suitable for this type of connection.

Submit
16.
What type of cable is used for connectivity between a model 2620 router and a model 2950 switch (point A), a model 2950 switch and a model 1900 switch (point B), and a model 2950 switch and a host (point C)?

Explanation

The correct answer is A – straight-through; B – crossover; C – straight-through.

In this scenario, a straight-through cable is used for connectivity between the model 2620 router and the model 2950 switch at point A. This is because both devices are of different types (router and switch), and a straight-through cable is used to connect different types of devices.

At point B, a crossover cable is used to connect the model 2950 switch and the model 1900 switch. This is because both devices are of the same type (switch), and a crossover cable is used to connect devices of the same type.

Finally, at point C, another straight-through cable is used to connect the model 2950 switch and the host. This is because the host is a different type of device (computer or server), and a straight-through cable is used to connect different types of devices.

Submit
17.
Refer to the exhibit. A switch with a default configuration connects four hosts. The ARP table for host A is shown. What happens when host A wants to send an IP packet to host D?

Explanation

When host A wants to send an IP packet to host D, it sends out a broadcast of FF:FF:FF:FF:FF:FF. This broadcast is received by every other host connected to the switch. Host D, upon receiving the broadcast, responds with its MAC address. This allows host A to know the MAC address of host D, which is necessary for sending the IP packet.

Submit
18. What would be a common reason to upgrade from RIPv1 to RIPv2?

Explanation

RIPv2 supports classless routing, which means it can advertise subnets with variable length subnet masks (VLSM). This allows for more efficient use of IP addresses and better scalability compared to RIPv1, which only supports classful routing. Therefore, upgrading from RIPv1 to RIPv2 would be a common reason to take advantage of the benefits of classless routing.

Submit
19. What type of address is 172.16.134.64 with the subnet mask 255.255.255.224?

Explanation

The given IP address 172.16.134.64 belongs to the network address range of the subnet with the subnet mask 255.255.255.224. The network address is the first address in the subnet range, which is used to identify the network itself. Therefore, 172.16.134.64 is the network address for this subnet.

Submit
20. What is the outcome when a wireless host has a different SSID configured than the access point to which it is attempting to connect?

Explanation

When a wireless host has a different SSID configured than the access point it is trying to connect to, it will not be allowed access to the wireless network. The SSID (Service Set Identifier) is a unique identifier that distinguishes one wireless network from another. If the host's SSID does not match the access point's SSID, the access point will not grant access to the host, preventing it from connecting to the wireless network.

Submit
21. Which protocol is described as an enhanced distance vector routing protocol?

Explanation

EIGRP (Enhanced Interior Gateway Routing Protocol) is described as an enhanced distance vector routing protocol. It combines the features of both distance vector and link-state routing protocols, providing fast convergence, loop prevention mechanisms, and efficient use of bandwidth. EIGRP uses a metric based on bandwidth, delay, reliability, and load to determine the best path for routing.

Submit
22. Which three addresses are valid public addresses? (Choose three.)

Explanation

The three valid public addresses are 198.133.219.17, 128.107.12.117, and 64.104.78.227. These addresses are considered valid public addresses because they fall within the range of IP addresses that are designated for public use. Public IP addresses are routable on the internet and can be accessed by devices outside of a private network. In contrast, the addresses 192.168.1.245 and 10.15.250.5 are private addresses, which are reserved for use within a local network and cannot be directly accessed from the internet.

Submit
23.
Refer to the exhibit. Which two interfaces could be used for a leased-line WAN connection? (Choose two.)

Explanation

The correct answer is A and B. The exhibit does not provide any specific information about the interfaces or the devices. However, in a leased-line WAN connection, commonly used interfaces are T1/E1 and Serial interfaces. Therefore, it can be inferred that interfaces A and B could be used for a leased-line WAN connection.

Submit
24.
Refer to the exhibit. What would be a valid network address for the new subnet on RTA?

Explanation

The given subnet mask is /28, which means that the first 28 bits of the IP address represent the network address. In the given options, 10.16.10.16 is the only IP address where the first 28 bits match with the given IP address 10.16.10.16/28. Therefore, 10.16.10.16 is the valid network address for the new subnet on RTA.

Submit
25. Which technology is primarily used in a WAN?

Explanation

PPP (Point-to-Point Protocol) is primarily used in a WAN (Wide Area Network). PPP is a data link protocol that is used to establish a direct connection between two nodes in a network. It provides a secure and reliable way to transmit data over a WAN connection. ARP (Address Resolution Protocol) is used to map an IP address to a physical MAC address in a LAN (Local Area Network). CDP (Cisco Discovery Protocol) is a proprietary protocol used by Cisco devices to share information about connected devices. WEP (Wired Equivalent Privacy) is a security protocol used in wireless networks. CSMA/CD (Carrier Sense Multiple Access with Collision Detection) is a protocol used in Ethernet networks to manage access to the network medium.

Submit
26.
Refer to the exhibit. A small business has asked for advice about what type of cable will be needed to connect their modular routers. What type of connector is used by each device that is shown?

Explanation

The correct answer is that the WIC-2T uses a Smart Serial connector, the WIC1T uses a DB60 connector, and the WIC-1ENET uses an RJ45 connector. This can be determined by examining the exhibit and identifying the connectors on each device. The WIC-2T device has a small, compact connector which is characteristic of a Smart Serial connector. The WIC1T device has a larger, circular connector which is characteristic of a DB60 connector. The WIC-1ENET device has a rectangular connector with eight pins, which is characteristic of an RJ45 connector.

Submit
27.
Refer to the exhibit. How many collision domains exist in the exhibited network?

Explanation

In the exhibited network, there is only one collision domain. A collision domain is a network segment where collisions can occur between devices that are connected to a shared medium, such as a hub. In this case, there is only one hub shown in the exhibit, which means that all devices connected to the hub are in the same collision domain.

Submit
28. Which three statements are true about full-duplex operation on an Ethernet network? (Choose three.)

Explanation

In full-duplex mode on an Ethernet network, there are no collisions because data can be transmitted and received simultaneously on the same link. A dedicated switch port is required for each node to enable full-duplex communication. Both the host network card and the switch port must be in full-duplex mode to ensure proper communication.

Submit
29.
Refer to the exhibit. Four hosts are being added to the 172.16.112.0 network. Which IP address is invalid as a host address for this network?

Explanation

The given network address is 172.16.112.0, which means the valid host addresses for this network range from 172.16.112.1 to 172.16.127.254. Therefore, the IP address 172.16.127.255 is invalid as a host address because it is the broadcast address for this network.

Submit
30. What are two actions performed by a Cisco switch? (Choose two.)

Explanation

The two actions performed by a Cisco switch are using the source MAC addresses of frames to build and maintain a MAC address table and utilizing the MAC address table to forward frames via the destination MAC address. The switch learns the MAC addresses of devices connected to its ports by examining the source MAC address of incoming frames and then adds these entries to its MAC address table. When a frame is received, the switch looks up the destination MAC address in its table and forwards the frame to the appropriate port.

Submit
31. Which layer of the OSI model handles the process of identifying and discarding damaged frames?

Explanation

The data link layer of the OSI model handles the process of identifying and discarding damaged frames. This layer is responsible for ensuring reliable transmission of data over a physical link by providing error detection and correction mechanisms. It checks the integrity of each frame received and discards any frames that are found to be damaged or corrupted.

Submit
32.
Refer to the exhibit. Using PAT, RouterA is configured to translate all private inside addresses to a single public address. The network administrator wants to determine which port number is being used in the translation of the ComputerA inside private IP address. Which command could be used if the administrator sits at ComputerA but is not allowed remote access to RouterA?

Explanation

The netstat command can be used to display active network connections and listening ports on a computer. By running netstat on ComputerA, the network administrator can see the port number that is being used in the translation of the inside private IP address. This information can help identify the specific translation rule being used by RouterA for ComputerA's traffic.

Submit
33. What are two requirements for establishing a console communication session between a computer and a router? (Choose two.)

Explanation

To establish a console communication session between a computer and a router, two requirements must be met. Firstly, a rollover cable must be used to connect the console port of the router to the serial port of the computer. This cable is specifically designed for this purpose. Secondly, there must be a terminal emulator application installed on the computer. This application allows the computer to communicate with the router via the console connection. Without these two requirements, the console communication session cannot be established.

Submit
34.  
Refer to the exhibit. If Host 1 were to transfer a file to the server, what layers of the TCP/IP model would be used?

Explanation

The correct answer is application, transport, Internet, and network access layers. This is because when Host 1 transfers a file to the server, the application layer is responsible for initiating the file transfer. The transport layer ensures reliable delivery of data by segmenting the file into smaller packets and providing error checking. The Internet layer handles the addressing and routing of the packets across the network. Finally, the network access layer is responsible for transmitting the packets over the physical network.

Submit
35. Which two statements describe the command ip route 192.168.7.24 255.255.255.248 192.168.7.9? (Choose two.)

Explanation

The command "ip route 192.168.7.24 255.255.255.248 192.168.7.9" is used to define a static route. It specifies that any packet destined for host 192.168.7.30 should be forwarded to the next-hop router with the address 192.168.7.9. Therefore, the statement "A packet that is destined for host 192.168.7.30 will be forwarded to address 192.168.7.9" is correct.

Submit
36. What three services are provided by the transport layer? (Choose three.)

Explanation

The transport layer provides three services: flow control, connection establishment, and error recovery. Flow control ensures that data is transmitted at an appropriate rate, preventing overwhelming the receiving device. Connection establishment establishes a reliable connection between the sender and receiver before data transfer begins. Error recovery detects and corrects errors that may occur during transmission, ensuring data integrity.

Submit
37. What are three characteristics of CSMA/CD? (Choose three.)

Explanation

CSMA/CD (Carrier Sense Multiple Access with Collision Detection) is a protocol used in Ethernet networks. The three characteristics of CSMA/CD mentioned in the answer are:

1. A device listens and waits until the media is not busy before transmitting. This means that devices check if the network medium is idle before sending data to avoid collisions.
2. All of the devices on a segment see data that passes on the network medium. This implies that all devices on a shared network segment can see the data being transmitted by other devices.
3. After detecting a collision, hosts can attempt to resume transmission after a random time delay has expired. This feature allows devices to wait for a random period of time after a collision before retransmitting, reducing the chances of another collision occurring.

Submit
38.
Refer to the exhibit. The network shown is using classful subnetting. The serial link between routers A and B is configured with addresses from the 172.16.6.0/23 subnet. How many valid IP addresses are wasted on this subnetwork?

Explanation

In classful subnetting, a /23 subnet has a subnet mask of 255.255.254.0. This means that the network can have a total of 512 IP addresses. However, the question states that the serial link between routers A and B is configured with addresses from the 172.16.6.0/23 subnet. This means that the network can only use 510 IP addresses because the first and last IP addresses in the subnet are reserved for the network address and the broadcast address, respectively. Therefore, 508 valid IP addresses are wasted on this subnetwork.

Submit
39.
Refer to the exhibit. From router R1, the command telnet 192.168.11.2 is entered from privileged mode and this message displays:

00:06:45: %SYS-5-CONFIG_I: Configured from console by console 192.168.11.2
Trying 192.168.11.2 . . . Open

Password required, but none set

If the R2 interfaces are in the status shown in the exhibit, what is the most likely problem?

Explanation

The message "Password required, but none set" indicates that a password is required to access the device, but no password has been set. This suggests that the problem lies with the configuration on R2, specifically in the line configuration mode. The password command is used to set a password for accessing the device, so if it is missing from the line configuration mode on R2, it would explain why the telnet command from R1 is prompting for a password that has not been set.

Submit
40. Data is being sent from a source PC to a destination server. Which three statements correctly describe the function of TCP or UDP in this situation? (Choose three.)

Explanation

The UDP destination port number identifies the application or service on the server which will handle the data. This is because the destination port number is used by the server to determine which application or service should receive the data.

UDP segments are encapsulated within IP packets for transport across the network. This is because UDP does not have its own mechanism for addressing and routing, so it relies on IP packets to transport its segments across the network.

The source port field identifies the running application or service that will handle data returning to the PC. This is because the source port number is used by the server to determine which application or service on the PC should receive the returning data.

Submit
41.
Refer to the exhibit. Workstation A sends an IP packet to workstation B. Which two statements describe the encapsulation of the packet as it passes through the network?

Explanation

As the IP packet passes through each router, the Layer 2 header is stripped from the packet. This means that the Layer 2 header, which contains information such as the source and destination MAC addresses, is removed by each router. Additionally, the Layer 2 header changes at each router, indicating that a new Layer 2 header is added by each router as the packet is forwarded along the network. Therefore, the correct answers are "The Layer 2 header is stripped from the packet by each router" and "The Layer 2 header changes at each router."

Submit
42.
Refer to the exhibit. Which IP address can be assigned to the default gateway for host A?

Explanation

The IP address 10.199.255.254 can be assigned to the default gateway for host A because it falls within the same network range as the IP address of host A (10.199.0.0/16). The default gateway is typically the IP address of the router that connects the local network to external networks.

Submit
43.
Refer to the exhibit. Switch1 has only the following commands added to a default Cisco 2960 configuration:

enable secret cisco
line vty 0 4
password Kn0ckkn-cK
login
interface vlan 1
ip address 10.0.1.8 255.255.255.0
no shutdown

Assume that routing between networks is functioning properly and that Switch2 has been properly configured for remote access. What would the result be if the telnet 10.0.2.2 command is issued from Switch1 privileged mode?

Explanation

When the command "telnet 10.0.2.2" is issued from Switch1 privileged mode, the packet would be dropped. This is because Switch1 has not been configured with the necessary commands to establish a telnet session with Switch2. Without the proper configuration, Switch1 is unable to establish a connection with Switch2 and the packet is dropped.

Submit
44. Why is the ip host command used to create host tables on Cisco routers?

Explanation

The ip host command is used to create host tables on Cisco routers in order to allow communication with other IP devices by name. This means that instead of using IP addresses to communicate with devices, the router can use the names assigned to those devices in the host table. This makes it easier for administrators to manage and identify devices on the network, as they can use familiar names instead of memorizing or looking up IP addresses.

Submit
45. Which two items can be modified by the system administrator to determine from where the Cisco IOS loads? (Choose two.)

Explanation

The system administrator can modify the startup configuration file and the configuration register value to determine from where the Cisco IOS loads. The startup configuration file contains the configuration settings for the device and can be modified to specify the source from which the IOS should load. The configuration register value is a 16-bit value that determines various settings for the device, including the source from which the IOS should load. By modifying these two items, the system administrator can control the boot process and specify the desired source for loading the IOS.

Submit
46. What are three valid host addresses given a subnet mask of 255.255.254.0? (Choose three.)

Explanation

The given subnet mask 255.255.254.0 allows for a total of 9 bits for host addresses. This means that the last 9 bits of the IP address can be used for host addresses.

Among the given options, 64.100.2.255, 64.104.129.0, and 192.168.162.255 have the last 9 bits as 111111111, which are valid host addresses within the given subnet mask.

Submit
47.

Explanation

not-available-via-ai

Submit
48. The router reads each bit to determine the class of an address. Which three series of binary numbers would the router identify as public Class C addresses? (Choose three.)

Explanation

The router identifies Class C addresses by looking at the first three bits of the first octet. If the first three bits are 110, it is a Class C address. The three binary numbers that start with 110 are: 11000110.10000101.11011011.01010111, 11010001.10100101.11001000.11101101, and 11000000.00011111.00000111.10111011. These are the three public Class C addresses.

Submit
49. When would you want to use the switchport port-security mac-address sticky command?

Explanation

The switchport port-security mac-address sticky command is used whenever multiple devices share the same port. This command enables the switch to dynamically learn the MAC addresses of the devices connected to the port and then restricts the port to only allow those specific MAC addresses. This helps in preventing unauthorized devices from connecting to the network through that port and enhances network security.

Submit
50.
Refer to the exhibit. Based on the exhibited router output, what two conclusions can be made? (Choose two.)

Explanation

Based on the exhibited router output, two conclusions can be made. First, the service password-encryption command has not been added to the configuration, as the enable password is shown in clear text. Second, the passwords that are shown will be required to enter privileged EXEC mode on this router, as the output indicates that the enable password is required for privileged mode access.

Submit
View My Results

Quiz Review Timeline (Updated): Mar 22, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 22, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • May 16, 2010
    Quiz Created by
    Rodney.butler
Cancel
  • All
    All (50)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
For Reference only... Choose C....
Reference place holder.. Choose Answer C...
For Reference only... Choose D....
When configuring a switch to use SSH for virtual terminal connections,...
Refer to the exhibit. If Host 1 needs to request its IP address from...
A network administrator wants to configure a Cisco 2960 switch so that...
Refer to the exhibit. Considering the information that follows and the...
Which technology is primarily used for security in a wireless network...
In what two situations would UDP be the preferred transport protocol ...
Why is it important for the router to maintain an accurate routing ...
A wireless network has one access point installed. Users at some ...
Refer to the exhibit. The router that is named myhome has received a ...
Given a host with the IP address 192.168.65.54 and a subnet mask of ...
Which group of commands allows a router to be administered remotely?
ABC company needs to connect its router to an ISP to access the ...
What type of cable is used for connectivity between a model 2620...
Refer to the exhibit. A switch with a default configuration connects ...
What would be a common reason to upgrade from RIPv1 to RIPv2?
What type of address is 172.16.134.64 with the subnet mask ...
What is the outcome when a wireless host has a different SSID...
Which protocol is described as an enhanced distance vector routing ...
Which three addresses are valid public addresses? (Choose three.)
Refer to the exhibit. Which two interfaces could be used for a ...
Refer to the exhibit. What would be a valid network address for the...
Which technology is primarily used in a WAN?
Refer to the exhibit. A small business has asked for advice about what...
Refer to the exhibit. How many collision domains exist in the...
Which three statements are true about full-duplex operation on an ...
Refer to the exhibit. Four hosts are being added to the 172.16.112.0 ...
What are two actions performed by a Cisco switch? (Choose two.)
Which layer of the OSI model handles the process of identifying and ...
Refer to the exhibit. Using PAT, RouterA is configured to translate...
What are two requirements for establishing a console communication ...
 Refer to the exhibit. If Host 1 were to transfer a file to the...
Which two statements describe the command ip route 192.168.7.24 ...
What three services are provided by the transport layer? (Choose...
What are three characteristics of CSMA/CD? (Choose three.)
Refer to the exhibit. The network shown is using classful subnetting....
Refer to the exhibit. From router R1, the command telnet 192.168.11.2 ...
Data is being sent from a source PC to a destination server. Which...
Refer to the exhibit. Workstation A sends an IP packet to workstation...
Refer to the exhibit. Which IP address can be assigned to the default...
Refer to the exhibit. Switch1 has only the following commands added to...
Why is the ip host command used to create host tables on Cisco ...
Which two items can be modified by the system administrator to...
What are three valid host addresses given a subnet mask of ...
The router reads each bit to determine the class of an address. Which...
When would you want to use the switchport port-security mac-address ...
Refer to the exhibit. Based on the exhibited router output, what two ...
Alert!

Advertisement