Can You Pass This CCIE Routing And Switching Exam?

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Tarun
T
Tarun
Community Contributor
Quizzes Created: 1 | Total Attempts: 1,536
| Attempts: 1,536 | Questions: 36
Please wait...
Question 1 / 36
0 %
0/100
Score 0/100
1. How can you disable logging on the console of a router?

Explanation

To disable logging on the console of a router, the command "no logging console" can be used. This command turns off the logging feature specifically for the console interface. By using this command, log messages will no longer be displayed on the console, providing a more streamlined and less cluttered console interface.

Submit
Please wait...
About This Quiz
Can You Pass This CCIE Routing And Switching Exam? - Quiz

The Cisco Certified Internetwork Expert (CCIE) is an internationally recognized certification test which is conducted for IT Networking Professionals. The expert level can only be achieved... see moreby technically proficient and experienced IT professionals. This trivia quiz has been developed to test your knowledge about the operations of networks, engineering and networking. Read the questions carefully and answer. So, let's try out the quiz. All the best!
see less

2. How does eigrp do unequal load balancing?

Explanation

EIGRP can achieve unequal load balancing by using the variance command. This command allows the router to consider paths with a metric that is higher than the best path. By setting a variance value, EIGRP will include paths with a metric that is up to that value times higher than the best path. This enables the router to distribute traffic across multiple paths, even if their metrics are not equal. This way, EIGRP can achieve unequal load balancing and optimize network performance.

Submit
3. What are the extended VLANs?

Explanation

Extended VLANs refer to VLANs that have a VLAN ID greater than 1005. In traditional VLAN implementations, VLAN IDs range from 1 to 1005, with VLANs 1 and 1002-1005 being reserved for specific purposes. However, in some newer implementations, VLAN IDs can exceed 1005, allowing for a larger number of VLANs to be created and used in the network.

Submit
4. How can you only enable SSH connection on a Cisco Route for management?

Explanation

The correct answer is "transport input ssh." This command allows only SSH connections for management on a Cisco router. By specifying "ssh" as the only transport input method, other methods such as telnet or HTTP are disabled, ensuring that only SSH connections are allowed for remote management of the router.

Submit
5. What are RFC 1918 addresses?

Explanation

RFC 1918 addresses refer to a range of IP addresses that are reserved for private use within a network. These addresses are not routable on the internet and are commonly used for internal networks, such as those found in homes, offices, or organizations. They are designed to provide a limited number of unique IP addresses that can be used within a private network without conflicting with public IP addresses. This helps to ensure the security and integrity of private networks by keeping them separate from the public internet.

Submit
6. In BGP if the AS filter is _40_ what does it mean?

Explanation

The correct answer is "Passing from AS 40." In BGP, if the AS filter is set to 40, it means that the route is being passed through AS 40. This indicates that the route is being transmitted or forwarded through AS 40 to reach its destination.

Submit
7. What command must be typed in OSPF to make a loopback appear with its correct mask?

Explanation

The correct answer is "ip ospf network point-to-point". This command must be typed in OSPF to make a loopback appear with its correct mask. This command configures the OSPF network type as point-to-point, which is necessary for loopback interfaces to function properly in OSPF.

Submit
8. What does regular expression _40_ in BGP AS-path access-list mean?

Explanation

The regular expression _40_ in BGP AS-path access-list means that the route is passing through AS 40. This means that the AS-path of the route contains AS 40 as one of the intermediate ASes that the route traverses.

Submit
9. What is the adminitrative distance of EBGP route?

Explanation

The administrative distance of a route is a measure of its trustworthiness or reliability. A lower administrative distance indicates a more preferred route. In this case, the correct answer is 20, which means that EBGP (External Border Gateway Protocol) routes have an administrative distance of 20. This suggests that EBGP routes are considered very reliable and trustworthy, making them a preferred choice for routing decisions.

Submit
10. What is the port number for tftp?

Explanation

The correct answer is 69. TFTP (Trivial File Transfer Protocol) is a simple file transfer protocol that operates on UDP port 69. It is commonly used for transferring files between network devices, such as routers and switches, in a network. The other options (87, 80, 23, and 53) are incorrect port numbers and are not associated with TFTP.

Submit
11. What methods can be used to overcome IBGP full mesh requirement?(Choose Two)

Explanation

Route reflectors and confederations are two methods that can be used to overcome the IBGP full mesh requirement.

1. Route reflectors: In a full mesh IBGP network, every router needs to establish a direct BGP session with every other router. This can become impractical and difficult to manage in large networks. Route reflectors address this issue by allowing routers to establish a BGP session with a selected set of route reflectors instead of every router in the network. The route reflectors then reflect the BGP updates to other routers, reducing the number of required BGP sessions.

2. Confederations: Similar to route reflectors, confederations also aim to reduce the number of required BGP sessions in large networks. In a confederation, the network is divided into smaller sub-autonomous systems, and each sub-autonomous system has its own internal BGP (IBGP) mesh. The sub-autonomous systems then establish external BGP (EBGP) sessions with routers in other sub-autonomous systems, reducing the overall number of required IBGP sessions.

Submit
12. In BGP if the next hop is not reachable, what happens to the route?

Explanation

If the next hop is not reachable in BGP, the route is not installed in the routing table and in the BGP table it shows up as inaccessible.

Submit
13. (*,G) is the characteristic of which multicast protocol?

Explanation

The characteristic of (*,G) is associated with the multicast protocol known as "sparse mode". In sparse mode, multicast traffic is only forwarded to specific groups that have requested it, rather than being flooded to all devices on the network. This helps to conserve network bandwidth and resources by only sending traffic where it is needed.

Submit
14. What is the admin distance of external EIGRP routes?

Explanation

The admin distance of external EIGRP routes is 170. Admin distance is a measure of the trustworthiness of a routing protocol, indicating the preference of one routing source over another. In EIGRP, external routes are those learned from other routing protocols. The admin distance of 170 for external EIGRP routes means that these routes are considered less trustworthy compared to internal EIGRP routes, which have an admin distance of 90.

Submit
15. What IGMP version supports IGMP leave messages?

Explanation

IGMP (Internet Group Management Protocol) is a communication protocol used by hosts and adjacent routers on an Internet Protocol (IP) network to establish multicast group memberships. IGMP version 2 (V2) supports IGMP leave messages. These messages are sent by a host to inform the router that it no longer wants to receive multicast traffic for a specific group. Therefore, V2 is the correct answer as it specifically supports the IGMP leave messages.

Submit
16. What is the name given to the Firewall built into the Cisco IOS?

Explanation

CBAC stands for Context-Based Access Control. It is a feature built into the Cisco IOS firewall that provides advanced security capabilities. CBAC allows the firewall to inspect and control traffic based on the context of the connection, including the application layer protocols and state information. It can dynamically open and close ports, keeping track of the state of the connection, and provides protection against various network attacks. CBAC is an important component of network security in Cisco devices and helps to prevent unauthorized access and protect against potential threats.

Submit
17. Which protocols are affected by the rule of split horizon? choose 2

Explanation

The protocols that are affected by the rule of split horizon are RIP and EIGRP. Split horizon is a technique used in routing protocols to prevent routing loops by not advertising routes back out of the same interface they were learned from. In the case of RIP and EIGRP, both protocols implement split horizon to avoid routing loops and ensure efficient routing within a network.

Submit
18. When redistributing rip into OSPF what routes get redistributed into OSPF(choose all that apply)

Explanation

When redistributing RIP into OSPF, the routes that get redistributed into OSPF are RIP routes and directly connected interfaces running RIP. RIP routes are the routes learned through the RIP routing protocol, while directly connected interfaces running RIP are the interfaces that are directly connected to the router and are running the RIP protocol. The other options, static routes, floating routes, and null routes, are not included in the redistribution process.

Submit
19. How can you contain spoofing attacks?

Explanation

Urpf (Unicast Reverse Path Forwarding) is a technique used to prevent spoofing attacks. It checks the source IP address of incoming packets against the routing table to ensure that the packet is arriving on the expected interface. If the source IP address does not match the expected interface, the packet is dropped. Urpf helps in verifying the authenticity of the source IP address and prevents attackers from impersonating other systems by spoofing their IP addresses.

Submit
20. In MCQ how much bandwidth % can you reserve on an interface?

Explanation

The correct answer is 75. In networking, bandwidth refers to the amount of data that can be transmitted over a network connection in a given time. Reserving bandwidth on an interface allows for prioritization of certain types of traffic, ensuring that they have sufficient bandwidth to function properly. In this case, the correct answer suggests that you can reserve up to 75% of the available bandwidth on an interface.

Submit
21. In BGP when filtering inbound What is the order of filtering?

Explanation

The correct order of filtering in BGP when filtering inbound is route-map, filter-list, distribute-list. This means that the route-map is applied first to filter the incoming routes, followed by the filter-list and then the distribute-list.

Submit
22. How are required for SSH on a router? choose 3

Explanation

The question is asking for three requirements for SSH on a router. The first requirement is the hostname, which is the unique name given to the router. The second requirement is the domain-name, which is the name of the domain to which the router belongs. The third requirement is to generate an RSA public/private key, which is used for secure authentication and encryption in SSH. These three requirements are necessary for enabling and configuring SSH on a router.

Submit
23. How can summarization be done in OSPF? (choose all that apply)

Explanation

Summarization in OSPF can be achieved through the use of "area range" and "summary address". The "area range" command allows the aggregation of multiple subnets into a single summary route within an OSPF area. This helps in reducing the size of the routing table and improving network efficiency. Similarly, the "summary address" command can be used to summarize routes at the boundary between OSPF areas, allowing for efficient routing and reducing the number of entries in the routing table.

Submit
24. (*.G) is the characteristic of which Mutlticast Mode?

Explanation

The correct answer is sparse. Sparse mode is a multicast mode that is used when there are only a few receivers interested in receiving the multicast traffic. In this mode, multicast routers do not forward multicast traffic unless explicitly requested by a receiver. This helps to conserve network bandwidth by only sending traffic to those receivers that have explicitly requested it.

Submit
25. What is the significance of the same cluster-id in BGP cluster?

Explanation

The significance of having the same cluster-id in BGP cluster is that it prevents routes coming from one route reflector from entering the routing table of another route reflector in the same cluster. This helps to avoid routing loops and ensures that the routes are properly distributed within the cluster without redundancy.

Submit
26. What are E1 routes in OSPF?

Explanation

E1 routes in OSPF refer to external routes with a more specific cost. This means that these routes have a higher level of specificity compared to other routes. In OSPF, routes with higher specificity are preferred over routes with lower specificity. Therefore, when multiple routes are available, OSPF will choose the route with the more specific cost as the preferred route.

Submit
27. MQC is a combination of which queuing mechanisms?(choose 2)

Explanation

MQC (Modular QoS CLI) is a feature in Cisco IOS that allows for the configuration of quality of service (QoS) parameters on a network device. CBWFQ (Class-Based Weighted Fair Queuing) and PQ (Priority Queuing) are both queuing mechanisms that can be used with MQC. CBWFQ allows for the allocation of bandwidth to different traffic classes based on defined policies, while PQ gives priority to certain traffic classes over others. Therefore, CBWFQ and PQ are the two queuing mechanisms that can be combined with MQC. The other options, Custom Queue, FIFO, and In/out, are not specific queuing mechanisms and are not compatible with MQC.

Submit
28. What flag does spare mode use for SPT switch over?

Explanation

Spare mode uses the flag "T" for SPT switch over.

Submit
29. Which protocols have a default metric of infinity when other protocols are redistributed into them? (choose 2)

Explanation

RIP and EIGRP have a default metric of infinity when other protocols are redistributed into them. RIP (Routing Information Protocol) uses a hop count as its metric, and a hop count of 16 is considered infinity. EIGRP (Enhanced Interior Gateway Routing Protocol) uses a metric called "feasible distance," and a feasible distance of 4294967295 is considered infinity. Therefore, when other protocols are redistributed into RIP or EIGRP, their metrics are set to infinity.

Submit
30. In a RR senario a non client will not advertise to which bgp peer?

Explanation

In a route-reflector (RR) scenario, a non-client will not advertise to the route-reflector peer. This is because a non-client does not have the capability to reflect routes to other peers. Only RR clients, which are configured with the "route-reflector-client" command, can advertise routes to the route-reflector peer. Therefore, the non-client will not advertise to the route-reflector peer.

Submit
31. EIGRP Query can be stopped from propagating using?(choose 2)

Explanation

EIGRP queries can be stopped from propagating using two methods: stub area and summarization. In a stub area, routers do not advertise external routes, which prevents EIGRP queries from being sent outside the area. Summarization involves aggregating multiple routes into a single route, reducing the number of queries that need to be sent. Passive interface, shutdown, and different domain are not valid methods for stopping EIGRP queries from propagating.

Submit
32. Links with speeds lower than what value require fragmentation and interleaving?

Explanation

Links with speeds lower than 768K require fragmentation and interleaving. This means that if the link speed is 768K or higher, fragmentation and interleaving are not necessary.

Submit
33. How can you contain a smurf attack?

Explanation

A smurf attack is a type of Distributed Denial of Service (DDoS) attack where the attacker floods a target network with a large volume of ICMP echo request packets, using spoofed IP addresses of the victim. These packets are then broadcasted to a network that amplifies the attack, overwhelming the victim's network and causing it to become inaccessible. To contain a smurf attack, implementing Car (Committed Access Rate) can be effective. Car limits the bandwidth that can be used for certain types of traffic, including ICMP, preventing the attacker from flooding the network with excessive ICMP packets and reducing the impact of the attack.

Submit
34. Which authentication type is supported by BGP?

Explanation

BGP supports the md5 authentication type. This means that BGP routers can use the md5 algorithm to authenticate the BGP messages exchanged between them. MD5 authentication helps ensure that the BGP messages are not tampered with during transit and that they are coming from trusted sources.

Submit
35. What type of LSA's are blocked in the totally stubby area? (choose all that apply)

Explanation

In a totally stubby area, only LSA1 and LSA2 are allowed to propagate, while LSA3, LSA4, and LSA5 are blocked. LSA3 is a summary LSA generated by an ABR to advertise routes from outside the autonomous system (AS). LSA5 is an external LSA generated by an ASBR to advertise routes from other AS. Since a totally stubby area is designed to reduce the size of the routing table and limit external routes, LSA3 and LSA5 are blocked to prevent unnecessary routing information from entering the area.

Submit
36. In frame relay what OSPF network type requires a neighbor statement?(choose all that apply)

Explanation

The OSPF network types that require a neighbor statement in frame relay are broadcast and non-broadcast. In a broadcast network, OSPF routers can dynamically discover their neighbors without explicitly configuring them. However, in a non-broadcast network, such as frame relay, OSPF routers cannot automatically discover their neighbors. Therefore, a neighbor statement must be configured to establish adjacency between OSPF routers in both broadcast and non-broadcast networks.

Submit
View My Results

Quiz Review Timeline (Updated): Mar 21, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 21, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Jul 03, 2008
    Quiz Created by
    Tarun
Cancel
  • All
    All (36)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
How can you disable logging on the console of a router?
How does eigrp do unequal load balancing?
What are the extended VLANs?
How can you only enable SSH connection on a Cisco Route for...
What are RFC 1918 addresses?
In BGP if the AS filter is _40_ what does it mean?
What command must be typed in OSPF to make a loopback appear with its...
What does regular expression _40_ in BGP AS-path access-list mean?
What is the adminitrative distance of EBGP route?
What is the port number for tftp?
What methods can be used to overcome IBGP full mesh...
In BGP if the next hop is not reachable, what happens to the route?
(*,G) is the characteristic of which multicast protocol?
What is the admin distance of external EIGRP routes?
What IGMP version supports IGMP leave messages?
What is the name given to the Firewall built into the Cisco IOS?
Which protocols are affected by the rule of split horizon? choose 2
When redistributing rip into OSPF what routes get redistributed into...
How can you contain spoofing attacks?
In MCQ how much bandwidth % can you reserve on an interface?
In BGP when filtering inbound What is the order of filtering?
How are required for SSH on a router? choose 3
How can summarization be done in OSPF? (choose all that apply)
(*.G) is the characteristic of which Mutlticast Mode?
What is the significance of the same cluster-id in BGP cluster?
What are E1 routes in OSPF?
MQC is a combination of which queuing mechanisms?(choose 2)
What flag does spare mode use for SPT switch over?
Which protocols have a default metric of infinity when other protocols...
In a RR senario a non client will not advertise to which bgp peer?
EIGRP Query can be stopped from propagating using?(choose 2)
Links with speeds lower than what value require fragmentation and...
How can you contain a smurf attack?
Which authentication type is supported by BGP?
What type of LSA's are blocked in the totally stubby area? (choose...
In frame relay what OSPF network type requires a neighbor...
Alert!

Advertisement