CCENT/CCNA Icnd1 Chapters 10 + 11

17 Questions | Total Attempts: 348

SettingsSettingsSettings
CCENT Quizzes & Trivia

If you are studying for the CCENT/CCNA icnd1 exam then the quiz below is one you should take. It is made up of some questions designed to help you extensively revise for chapter 12 and 13 as a whole. Give it a shot and see how well you understood them.


Questions and Answers
  • 1. 
    Imagine that a switch connects via an Ethernet cable to a router, and the router’s hostname is Hannah. Which of the following commands could tell you information about the IOS version on Hannah without establishing a Telnet connection to Hannah?
    • A. 

      Show cdp entry Hannah

    • B. 

      Show cdp neighbor Hannah

    • C. 

      Show cdp neighbor detail

    • D. 

      Show cdp neighbor

    • E. 

      Show neighbor Hannah

  • 2. 
    Which of the following CDP commands could identify a neighbor’s model of hardware?
    • A. 

      Show neighbors Hannah

    • B. 

      Show cdp neighbors

    • C. 

      Show cdp interface

    • D. 

      Show cdp entry hannah

    • E. 

      Show neighbors

  • 3. 
    The output of the show interfaces status command on a 2960 switch shows interface Fa0/1 in a “disabled” state. Which of the following is true about interface Fa0/1?
    • A. 

      The interface is configured with the shutdown command.

    • B. 

      The show interfaces fa0/1 command will list the interface with two status codes of administratively down and down.

    • C. 

      The show interfaces fa0/1 command will list the interface with two status codes of up and down.

    • D. 

      The interface can currently be used to forward frames.

    • E. 

      The interface cannot currently be used to forward frames.

  • 4. 
    Switch SW1 uses its gigabit 0/1 interface to connect to switch SW2’s gigabit 0/2 interface. SW2’s Gi0/2 interface is configured with the speed 1000 and duplex full commands. SW1 uses all defaults for interface configuration commands on its Gi0/1 interface. Which of the following is true about the link after it comes up?
    • A. 

      The link works at 1000 Mbps (1 Gbps).

    • B. 

      SW1 attempts to run at 10 Mbps because SW2 has effectively disabled IEEE standard autonegotiation.

    • C. 

      The link runs at 1 Gbps, but SW1 uses half duplex, and SW2 uses full duplex.

    • D. 

      Both switches use full duplex.

  • 5. 
    The following line of output was taken from a show interfaces fa0/1 command: Full-duplex, 100Mbps, media type is 10/100BaseTX Which of the following is/are true about the interface?
    • A. 

      The speed was definitely configured with the speed 100 interface subcommand.

    • B. 

      The speed may have been configured with the speed 100 interface subcommand.

    • C. 

      The duplex was definitely configured with the duplex full interface subcommand.

    • D. 

      The duplex may have been configured with the duplex full interface subcommand.

  • 6. 
    Switch SW1, a Cisco 2960 switch, has all default settings on interface Fa0/1, the speed 100 command configured on Fa0/2, and both the speed 100 and duplex half commands on Fa0/3. Each interface is cabled to a 10/100 port on different Cisco 2960 switches, with those switches using all default settings. Which of the following is true about the interfaces on the other 2960 switches?
    • A. 

      The interface connected to SW1’s Fa0/1 runs at 100 Mbps and full duplex.

    • B. 

      The interface connected to SW1’s Fa0/2 runs at 100 Mbps and full duplex.

    • C. 

      The interface connected to SW1’s Fa0/3 runs at 100 Mbps and full duplex.

    • D. 

      The interface connected to SW1’s Fa0/3 runs at 100 Mbps and half duplex.

    • E. 

      The interface connected to SW1’s Fa0/2 runs at 100 Mbps and half duplex.

  • 7. 
    A frame just arrived on interface Fa0/2, source MAC address 0200.2222.2222, destination MAC address 0200.2222.2222. (The frame was created as part of a security attack; it is not normal to see frames with the same source and destination MAC address.) Interface Fa0/2 is assigned to VLAN 2. Consider the following command output:     SW2#show mac address-table dynamic                  Mac Address Table            -------------------------------------------Vlan     Mac Address           Type          Ports ----           -----------                --------           -----  1     0200.1111.1111     DYNAMIC     Gi0/2  1     0200.2222.2222     DYNAMIC    Fa0/13    Total Mac Addresses for this criterion: 2 Which of the following describes how the switch will forward the frame if the destination address is 0200.2222.2222?
    • A. 

      The frame will likely be flooded on all other interfaces in VLAN 2, unless the switch has a static entry for 0200.2222.2222, VLAN 2, in the MAC address table.

    • B. 

      The frame will be flooded out all other interfaces in VLAN 2.

    • C. 

      The switch will add an entry to its MAC address table for MAC address 0200.2222.2222, interface Fa0/2, and VLAN 2.

    • D. 

      The switch will replace the existing entry for 0200.2222.2222 with an entry for address 0200.2222.2222, interface Fa0/2, and VLAN 2.

  • 8. 
    Which of the following commands list the MAC address table entries for MAC addresses configured by port security?
    • A. 

      Show mac address-table dynamic

    • B. 

      Show mac address-table

    • C. 

      Show mac address-table static

    • D. 

      Show mac address-table port-security

  • 9. 
    Which of the following IEEE wireless LAN standards uses only the U-NII band of frequencies (around 5.4 GHz)?
    • A. 

      802.11a

    • B. 

      802.11b

    • C. 

      802.11g

    • D. 

      802.11i

  • 10. 
    Which of the following answers is the correct maximum speed at which two IEEE WLAN devices can send data with a particular standard?
    • A. 

      802.11b, using OFDM, at 54 Mbps

    • B. 

      802.11g, using OFDM, at 54 Mbps

    • C. 

      802.11a, using DSSS, at 54 Mbps

    • D. 

      802.11a, using DSSS, at 11 Mbps

  • 11. 
    Which of the following lists the nonoverlapping channels when using 802.1b DSSS in the U.S.?
    • A. 

      1, 2, 3

    • B. 

      1, 5, 9

    • C. 

      1, 6, 11

    • D. 

      A, b, g

    • E. 

      22, 33, 44

  • 12. 
    Which of the following terms refers to a WLAN mode that allows a laptop to roam between different access points?
    • A. 

      ESS

    • B. 

      BSS

    • C. 

      IBSS

    • D. 

      None of the other answers are correct.

  • 13. 
    When configuring a wireless access point, which of the following are typical configuration choices?
    • A. 

      SSID

    • B. 

      The speed to use

    • C. 

      The wireless standard to use

    • D. 

      The size of the desired coverage area

  • 14. 
    Which of the following is true about an ESS’s connections to the wired Ethernet LAN?
    • A. 

      The AP connects to the Ethernet switch using a crossover cable.

    • B. 

      The various APs in the same WLAN need to be assigned to the same VLAN by the Ethernet switches.

    • C. 

      The APs must have an IP address configured to forward traffic.

    • D. 

      The APs using mixed 802.11g mode must connect via a Fast Ethernet or faster connection to an Ethernet switch.

  • 15. 
    Which of the following are not common reasons why a newly installed WLAN does not allow a client to connect through the WLAN into the wired infrastructure?
    • A. 

      The AP is installed on top of a metal filing cabinet.

    • B. 

      The client is near a fast-food restaurant’s microwave oven.

    • C. 

      The client is sitting on top of a big bundle of currently used Cat5 Ethernet cables.

    • D. 

      The AP was configured to use DSSS channel 1 instead of the default channel 6, and no one configured the client to use channel 6.

  • 16. 
    Which of the following WLAN security standards refer to the IEEE standard?
    • A. 

      WPA

    • B. 

      WPA2

    • C. 

      WEP

    • D. 

      802.11i

  • 17. 
    Which of the following security features were not in the original WEP security standard but are now in the WPA2 security standard?
    • A. 

      Dynamic key exchange

    • B. 

      Preshared Keys (PSK)

    • C. 

      802.1x authentication

    • D. 

      AES encryption