CCNA ICND 1 Part 2

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Msmith721
M
Msmith721
Community Contributor
Quizzes Created: 2 | Total Attempts: 329
| Attempts: 73 | Questions: 125
Please wait...
Question 1 / 125
0 %
0/100
Score 0/100
1. Arrange the steps of the routing process in the correct order
Submit
Please wait...
About This Quiz
CCNA ICND 1 Part 2 - Quiz

CCNA ICND 1 Part 2 quiz assesses knowledge on common components in IT devices, router functions, and routing processes. It evaluates understanding of routing tables, path determination, and... see morepacket handling, crucial for network configuration and troubleshooting. see less

2. Match each method of populating a routing table to its definition
Submit
3. Match the type of help that is available with the Cisco IOS CLI to its description
Submit
4. Match each router prompt to its configuration mode
Submit
5. Match each type of WAN device to its function
Submit
6. MAtch the type of connection on a router to its function
Submit
7. Match each type of multiplexing to its function.
Submit
8. Match each type of communication link to its function in a WAN
Submit
9. Match each NAT term with its definition
Submit
10. What information does the show running-config command provide on a Cisco router?

Explanation

The show running-config command provides information about the current (running) configuration in RAM on a Cisco router. It displays the configuration settings that are currently active and being used by the router. This command does not provide information about the system hardware, names of configuration files, amount of NVRAM used, or the version of Cisco IOS software running on the router.

Submit
11. Which three of the following components are common to routers, switches, and Computers?

Explanation

RAM, CPU, and motherboard are common components to routers, switches, and computers. RAM (Random Access Memory) is used for temporary storage of data and instructions that are currently being processed. CPU (Central Processing Unit) is the main component responsible for executing instructions and performing calculations. The motherboard is the main circuit board that connects all the components together and allows communication between them. These components are essential for the functioning of all three devices, regardless of their specific purpose or functionality.

Submit
12. Using six subnet bits, how many usable subnets are created?

Explanation

By using six subnet bits, we can create a total of 64 subnets. However, the first and last subnets are typically reserved for network and broadcast addresses respectively, leaving us with 62 usable subnets. Therefore, the correct answer is 62.

Submit
13. Which part of the IP address 172.17.128.47 does the subnet mask 255.255.0.0 tell the router to look for?

Explanation

The subnet mask 255.255.0.0 tells the router to look for the network portion of the IP address. In this case, the network portion is 172.17. So, the router will look for the network with the IP address 172.17.

Submit
14. Which Cisco IOS software command creates a message to be displayed upon logging into a router?

Explanation

The correct answer is "banner motd message". This command is used to create a message of the day (MOTD) that will be displayed to users upon logging into a router. The "banner" command is used to create various types of banners, and "motd" specifies that it is a message of the day banner. The "message" parameter is used to specify the actual message that will be displayed.

Submit
15. If both enable secret and the enable password commans are configured on your router, how do you get the # prompt?

Explanation

To get the # prompt when both the enable secret and enable password commands are configured on the router, you need to enter the enable secret command. The enable secret command is a more secure method of authentication compared to the enable password command. It uses a stronger encryption algorithm to protect the password. Therefore, when both commands are configured, the router will prioritize the enable secret command for authentication and grant access to the # prompt.

Submit
16. Which Cisco IOS software command configures a serial port in slot 0, port 1 on a modular router?

Explanation

The correct answer is "interface serial 0/0/1". This command configures a serial port in slot 0, port 1 on a modular router. The format "0/0/1" represents the slot number, subslot number, and port number respectively.

Submit
17. Which of the following is a Cisco IOS tool that can be used for secure remote access to another device?

Explanation

SSH (Secure Shell) is a Cisco IOS tool that can be used for secure remote access to another device. It provides encrypted communication between the client and the server, ensuring that data transmitted over the network cannot be intercepted or tampered with by unauthorized individuals. Unlike telnet, which transmits data in plain text, SSH encrypts the data, making it a more secure option for remote access. SDM (Security Device Manager) is a web-based tool used for managing Cisco devices, while ping and traceroute are network troubleshooting tools.

Submit
18. Which statement most accurately describes static and dynamic routes?

Explanation

Static routes are routes that are manually configured by a network administrator. These routes are set up by specifying the destination network and the next hop or exit interface for the router to use when forwarding packets to that network. Static routes do not adjust or change automatically.

Dynamic routes, on the other hand, are routes that are automatically learned and adjusted by a routing protocol. A routing protocol is a set of rules and algorithms that routers use to exchange information about the networks they are connected to. The routing protocol dynamically updates the routing table, which contains information about the best path to reach different networks.

So, the correct statement is that static routes are manually configured by a network admin, whereas dynamic routes are automatically learned and adjusted by a routing protocol.

Submit
19. What stage of a Cisco router boot process verifies that all router components are operational?

Explanation

POST stands for Power-On Self Test. It is the stage of the Cisco router boot process that verifies the functionality of all router components. During the POST stage, the router checks if all hardware components such as the CPU, memory, interfaces, and power supply are operational. This ensures that the router is in a suitable state to proceed with the boot process.

Submit
20. Which Cisco router component is used primarily to store the startup config file?

Explanation

NVRAM, or Non-Volatile Random Access Memory, is the correct answer. NVRAM is a type of memory that retains its information even when the router is powered off. It is used primarily to store the startup configuration file, which contains the initial settings and configurations for the router. This allows the router to load the saved configuration upon startup, ensuring consistent settings each time it is powered on.

Submit
21. Given the system image file c2600-js-mz.122.21abin, which part of the name indicates the platform

Explanation

The part of the name "c2600" indicates the platform.

Submit
22. How many host addresses can be used in a Class C network

Explanation

A Class C network uses a 24-bit network mask, which allows for 256 possible addresses. However, two of these addresses are reserved for network identification and broadcast, leaving 254 host addresses that can be used for devices within the network.

Submit
23. All computers function using the?

Explanation

Computers function using the binary system, which is a numeric system that uses only two digits: 0 and 1. This system is used because computers are made up of electronic circuits that can be in one of two states, either on or off, represented by 1 and 0 respectively. These binary digits, also known as bits, are used to represent all types of data and instructions in a computer, allowing it to perform calculations, store and retrieve information, and execute programs. The binary system is fundamental to computer architecture and is the basis for all digital computing.

Submit
24. IP addresses are represented using?

Explanation

IP addresses are represented using 32-bit binary numbers. This means that an IP address consists of 32 binary digits, which are typically grouped into four octets (each octet containing 8 bits). This binary representation allows for a total of 2^32 (or approximately 4.3 billion) unique IP addresses to be assigned.

Submit
25. Which two of the following are functions of DHCP

Explanation

DHCP (Dynamic Host Configuration Protocol) is a network protocol that automatically assigns IP addresses and other network configuration settings to client devices. It allows client devices to obtain an IP address and other necessary information from a DHCP server. Therefore, the correct answers are "DHCP dynamically assigns IP addresses to client devices" and "DHCP dynamically assigns a default gateway to client devices".

Submit
26. At which OSI level do WAN protocols describe how to provide electrical, mechanical, operational, and functional connections to the services of a communications service provider?

Explanation

WAN protocols describe how to provide electrical, mechanical, operational, and functional connections to the services of a communications service provider at Layer 1 of the OSI model. Layer 1, also known as the Physical layer, deals with the physical transmission of data over the network. It defines the physical characteristics of the network such as cables, connectors, and signaling. Therefore, it is responsible for describing the physical connections required for WAN protocols to connect to the services of a communications service provider.

Submit
27. Which of the following protocols is an example of an exterior gateway protocol?

Explanation

BGP (Border Gateway Protocol) is an example of an exterior gateway protocol. It is designed to exchange routing information between different autonomous systems (AS) on the internet. BGP is used by internet service providers (ISPs) to establish and maintain routing tables, allowing them to make informed decisions on the best paths for data to travel across different networks. Unlike interior gateway protocols (IGP) such as RIP, IGRP, and EIGRP, which are used within a single autonomous system, BGP is specifically designed for interconnecting multiple autonomous systems.

Submit
28. Which keyword do you add to the show cdp neighbors command to obtain additional information in the output

Explanation

Adding the "detail" keyword to the "show cdp neighbors" command will provide additional information in the output. This additional information may include the device's capabilities, platform, and the port ID of the neighbor device.

Submit
29. Why must you be very careful when using debug commands?

Explanation

When using debug commands, it is important to be very careful because they can have a negative impact on performance. Debug commands are designed to provide detailed information about the system's processes and operations, but they can consume significant system resources and slow down the overall performance. Therefore, using debug commands without caution can result in system slowdowns, delays, and even crashes. It is crucial to use them sparingly and only when necessary to avoid any negative impact on the system's performance.

Submit
30. When a router receives a packet with a destination address that is within an unkown subnetwork of a directly attached network, what is the default behavior ip the ip classless command is not enabled?

Explanation

If the "ip classless" command is not enabled, the default behavior when a router receives a packet with a destination address within an unknown subnetwork of a directly attached network is to drop the packet. This means that the router will not forward the packet to any other destination or broadcast it through any interfaces. Instead, it will simply discard the packet, effectively preventing it from reaching its intended destination.

Submit
31. What is the max number of bits that can be borrowed to create a subnet for a Class C network?

Explanation

The maximum number of bits that can be borrowed to create a subnet for a Class C network is 6. A Class C network has a default subnet mask of 255.255.255.0, which means that the first 24 bits are reserved for the network address and the last 8 bits are available for host addresses. By borrowing 6 bits from the host portion, we can create subnets with a subnet mask of 255.255.255.192, allowing for a maximum of 64 subnets.

Submit
32. Which two of the following are binary default subnet masks?

Explanation

The two binary default subnet masks are 11111111.00000000.00000000.00000000 and 11111111.11111111.11111111.000000000. These subnet masks are binary representations of the decimal subnet masks 255.0.0.0 and 255.255.255.0 respectively. The first subnet mask has all 8 bits in the first octet set to 1, indicating that the network portion of the IP address is 8 bits long. The second subnet mask has all 8 bits in the first three octets set to 1, indicating that the network portion of the IP address is 24 bits long.

Submit
33. How should you power up a Cisco router?

Explanation

To power up a Cisco router, you should turn the power switch to the "on" position. This action will supply the necessary electrical power to the router and allow it to start functioning. Pressing the reset button is not the correct method for powering up the router, as it is mainly used for resetting the device to its default settings. Connecting the fiber cable to another router or attaching the power cable plug to the router power supply socket are also not the appropriate steps for powering up the Cisco router.

Submit
34. What would you use to suspend a Telnet session?

Explanation

To suspend a Telnet session, you would use the Ctrl-Shift-6 key sequence. This key combination allows you to temporarily suspend the Telnet session without closing it completely. This is useful when you need to switch to another task or access a different command prompt while keeping the Telnet session active in the background.

Submit
35. Which output for the show interface command indicates that PPP is configured properly?

Explanation

The output "Encapsulation PPP" indicates that PPP is configured properly. PPP (Point-to-Point Protocol) is a data link protocol used to establish a direct connection between two nodes. The "Encapsulation PPP" output suggests that the interface is configured to use PPP encapsulation, which is the correct configuration for establishing a PPP connection.

Submit
36. How does  a distance vector router learn about paths for networks that are not directly connected?

Explanation

A distance vector router learns about paths for networks that are not directly connected from neighboring routers. Distance vector routing protocols, such as Routing Information Protocol (RIP) and Interior Gateway Routing Protocol (IGRP), use a routing algorithm that determines the best path to a destination network based on the distance (or metric) and the direction (or vector) to that network. By exchanging routing information with neighboring routers, a distance vector router can learn about networks that are not directly connected and update its routing table accordingly.

Submit
37. What does a distance vector router send to its neighboring routers as apart of a periodic routing table update?

Explanation

A distance vector router sends the entire routing table to its neighboring routers as a part of a periodic routing table update. This allows the neighboring routers to have the most up-to-date information about all the available routes. By sending the entire routing table, the router ensures that any changes or updates in routes are communicated to its neighbors, enabling them to make informed routing decisions.

Submit
38. Which Cisco IOS command produces the same result as the show cdp neighbors detail command?

Explanation

The correct answer is "show cdp entry *". This command will display detailed information about all CDP neighbors, just like the "show cdp neighbors detail" command. The wildcard (*) is used to include all entries.

Submit
39. What happens if the router cannot find a valid startup config file in NVRAM during router boot?

Explanation

If the router cannot find a valid startup config file in NVRAM during boot, it will enter setup mode. In this mode, the router prompts the user to configure basic settings such as hostname, passwords, and IP addresses. This allows the user to manually set up the router's initial configuration.

Submit
40. Which bits of the configuration register value make up the boot field 

Explanation

The boot field in the configuration register value is made up of the lowest four bits.

Submit
41. Which action can lead to a software reload on a Cisco device?

Explanation

Enabling a debug privileged EXEC command on a heavily used production router can lead to a software reload on a Cisco device. Debug commands are used for troubleshooting purposes and can generate a large amount of output, which can consume system resources and cause the router to become unresponsive. In a heavily used production environment, where the router is already under high load, enabling a debug command can push the device beyond its capacity and result in a software reload.

Submit
42. What is that max allowable hop count for RIP

Explanation

The maximum allowable hop count for RIP (Routing Information Protocol) is 15. This means that RIP will only consider routes that are within 15 hops away from the source. If a route exceeds this hop count, it will be considered unreachable. RIP uses hop count as a metric to determine the best path for routing packets in a network. By limiting the hop count to 15, RIP ensures that the network topology remains relatively small and prevents routing loops or excessive delays in packet delivery.

Submit
43. Where is the runnign configuration of the router usually stored?

Explanation

The running configuration of a router is usually stored in RAM. RAM, or Random Access Memory, is a volatile memory that is used to store data that is actively being used by the router. The running configuration includes the current settings and parameters of the router, such as interface configurations, routing protocols, and security settings. Storing the running configuration in RAM allows for quick access and modification of the router's settings. However, it is important to note that the running configuration is lost if the router is restarted or powered off.

Submit
44. On a heavily used production router, enabling a debug privileged EXEC command can be blank

Explanation

Enabling a debug privileged EXEC command on a heavily used production router can be harmful. Debug commands generate a significant amount of output, which can consume valuable system resources and impact the router's performance. This can lead to network slowdowns, dropped packets, and even router crashes. Debug commands should only be used in controlled environments or during troubleshooting, as they can disrupt normal network operations and cause unintended consequences.

Submit
45. Which two types of ports do routers have?

Explanation

Routers have two types of ports: console and network. The console port is used for connecting to the router for configuration and management purposes. It allows administrators to access the router's command-line interface (CLI) and make changes to its settings. The network ports, on the other hand, are used for connecting the router to other devices in the network. These ports enable the router to send and receive data packets, allowing it to route traffic between different networks.

Submit
46. Which two statements best decribe the functions of a router in a network

Explanation

Routers maintain their routing tables and ensure that other routers know of changes in the network. This means that routers keep track of the available paths in a network and update their routing tables accordingly. They also communicate these changes to other routers so that they are aware of the updated network topology.

Routers use the routing table to determine where to forward packets. The routing table contains information about the available paths and their associated costs. When a router receives a packet, it looks at the destination address and checks its routing table to determine the best path to forward the packet towards its destination. By using the routing table, routers can efficiently route packets through the network.

Submit
47. Which one of the following containst routing information that helps a router determine the routing path?

Explanation

A routing table contains routing information that helps a router determine the routing path. It is a database that is stored in a router and contains a list of available routes to different network destinations. The routing table includes information such as the destination network address, the next hop router, and the metric or cost associated with each route. By referencing the routing table, a router can determine the most appropriate path to send data packets to their intended destination.

Submit
48. If a router does not match the appropriate address portions to a number on its routing table, it?

Explanation

When a router does not find a match for the appropriate address portions in its routing table, it discards the packet. This means that the router does not have any information on how to forward the packet to its intended destination. Discarding the packet ensures that it does not continue to be passed along the network, preventing unnecessary network congestion.

Submit
49. Which statement best describes what the user EXEC mode command allows you to configure on a Cisco router?

Explanation

The correct answer states that the user EXEC mode commands do not allow the user to configure anything on a Cisco router. Instead, these commands are used solely to display information.

Submit
50. When configuring NAT, the internet interface would be considered which of he following? 

Explanation

The internet interface in NAT is considered the "NAT outside interface." This interface connects the local network to the internet and is responsible for translating the private IP addresses of the local network to a public IP address that can be used on the internet. The NAT outside interface is typically connected to the router or firewall that connects the local network to the internet.

Submit
51. What does the ppp authentication chap pap command configure?

Explanation

The correct answer states that if authentication fails using CHAP, then PAP authentication is attempted. This means that the ppp authentication chap pap command configures the router to first try CHAP authentication. If the authentication fails, it will then attempt PAP authentication as a backup method.

Submit
52. Which command correctly specifies RIP as the routing protocol?

Explanation

The correct answer is "Router(config)#router rip" because this command is used to enter the routing protocol configuration mode for RIP (Routing Information Protocol). By using this command, the router is configured to use RIP as the routing protocol.

Submit
53. Which command displays the CDP packet checksum errors?

Explanation

The command "show cdp traffic" displays information about the CDP (Cisco Discovery Protocol) traffic on a Cisco device. This includes the number of CDP packets received and transmitted, as well as any checksum errors encountered. Therefore, this command can be used to view the CDP packet checksum errors.

Submit
54. The command show startup-config displays the onfiguration in which location?

Explanation

The command "show startup-config" displays the configuration stored in NVRAM. NVRAM stands for Non-Volatile Random Access Memory, which is a type of memory that retains its data even when the power is turned off. The startup-config file contains the configuration settings that are used when the device is powered on or restarted. By using the "show startup-config" command, the user can view and verify the configuration stored in NVRAM.

Submit
55. Which Cisco IOS command is used to DL a copy of the Cisco IOS image file from a TFTP server

Explanation

The correct answer is "copy tftp: flash:". This command is used to download a copy of the Cisco IOS image file from a TFTP server to the flash memory of a Cisco device. The "copy" command is used to copy files, and in this case, "tftp:" specifies the source file location (TFTP server) and "flash:" specifies the destination file location (flash memory).

Submit
56. Which Cisco IOS command enables a Telnet session to receive console messages

Explanation

The Cisco IOS command "terminal monitor" enables a Telnet session to receive console messages. This means that when this command is used, any console messages that are generated on the device will be displayed on the Telnet session. This is useful for troubleshooting and monitoring purposes as it allows the user to see important system messages without having physical access to the device's console.

Submit
57. It is preferable to use debug commands during periods of blank network traffic and blank users

Explanation

During periods of blank network traffic and blank users, it is preferable to use debug commands with lower intensity and fewer executions. This is because debug commands can generate a significant amount of output, which can overload the network and impact its performance. By using lower intensity and fewer executions of debug commands, the impact on network traffic and users is minimized, allowing for smoother operations.

Submit
58. Which two statements accurately describe the difference between LAN's and WAN's?

Explanation

LANs typically transmit data faster than WANs because they cover a smaller geographic area, allowing for faster transmission speeds. LANs connect devices within a single building or small area, while WANs transmit data across larger distances. Additionally, companies or organizations usually own the hardware and software required for WANs, making them responsible for their maintenance and operation.

Submit
59. When you start a Cisco router, what shoudl you see on the console?

Explanation

When you start a Cisco router, you should see Cisco IOS software output text on the console. This text typically includes information about the router's boot process, system initialization, and any error or status messages that may be relevant. It provides important information for troubleshooting and monitoring the router's operation.

Submit
60. What is the primary purpose of setup mode on a Cisco router?

Explanation

The primary purpose of setup mode on a Cisco router is to bring up a minimal feature config. Setup mode allows users to quickly and easily configure basic settings on the router, such as hostname, IP addresses, and passwords, in order to establish a basic functioning configuration. It is designed to simplify the initial setup process and provide a starting point for further configuration and customization of the router.

Submit
61. Which Cisco IOS software command displays the configuration of the system hardware and the software version information?

Explanation

The "show version" command is used to display the configuration of the system hardware and the software version information on Cisco IOS software. This command provides details such as the IOS version, hardware model, uptime, configuration register, and more. It is commonly used to gather information about the device and verify the software and hardware configurations.

Submit
62. What is the defualt value of the RIP hold-down timer?

Explanation

The default value of the RIP hold-down timer is 180 seconds. This timer is used in the Routing Information Protocol (RIP) to prevent routing loops by temporarily ignoring updates from a neighbor after a route has been invalidated. During the hold-down period, the router will not accept updates for that route, helping to stabilize the routing table. After the hold-down timer expires, the router will accept new updates for the route.

Submit
63. Which stage during a Cisco router boot occurs last?

Explanation

The last stage during a Cisco router boot process is to find and load the configuration. After the router has completed the Power-On Self Test (POST), it proceeds to find and load the Cisco IOS software, followed by finding and loading the bootstrap. Finally, it looks for the configuration file and loads it, allowing the router to apply the necessary settings and configurations for operation.

Submit
64. Which Cisco IOS software command sets the clock speed to 64kb/s on a serial interface on a Cisco router?

Explanation

The correct answer is "clock rate 64000". In Cisco IOS software, the "clock rate" command is used to set the clock speed on a serial interface. The value specified after the command is in bits per second (bps), so "64000" represents a clock speed of 64kbps.

Submit
65. Which Cisco IOS command diplays the amount of memory that is available where the Cisco IOS image is stored on your router?

Explanation

The correct answer is "show flash". This command displays the amount of memory that is available where the Cisco IOS image is stored on the router.

Submit
66. The outside of which command displays the active translation for a NAT translations table?

Explanation

The command "show ip nat translations" displays the active translation for a NAT translations table.

Submit
67. In which Cisco CLI mode do you enter the command to specify PPP authentication?

Explanation

In Cisco CLI, the command to specify PPP authentication is entered in the "interface config mode". This mode allows the user to configure settings specific to a particular interface, such as authentication protocols, IP addresses, and other interface-related configurations. By entering the command in this mode, the user can specify PPP authentication for the desired interface.

Submit
68. Which command disables CDP on the device as a whole?

Explanation

The correct answer is "no cdp run". This command is used to disable CDP (Cisco Discovery Protocol) on the device as a whole. CDP is a Cisco proprietary protocol used to discover and gather information about directly connected Cisco devices. By using the "no cdp run" command, CDP functionality is turned off on the device, preventing it from sending or receiving CDP packets.

Submit
69. Which of the following describes the DHCP server that is provided by Cisco IOS software?

Explanation

The correct answer states that the DHCP server provided by Cisco IOS software is a complete DHCP server. This means that it is capable of performing all the necessary functions of a DHCP server, such as assigning IP addresses, default gateways, DNS servers, and other network configuration parameters to clients. It does not require obtaining DHCP information from a master DHCP server, as it can independently handle all DHCP requests and provide the necessary network settings to clients.

Submit
70. A serial interface displays "Serial1 is up, line protocol is down" Which two situations may cause this error?

Explanation

The error message "Serial1 is up, line protocol is down" indicates that the physical layer of the serial interface is functioning properly (up), but the data link layer protocol is not established (down). This can be caused by two situations. Firstly, if there are no keepalives, it means that the interface is not receiving regular signals to confirm the connection, resulting in the line protocol being down. Secondly, if there is a mismatch in the encapsulation type between the devices connected to the serial interface, they won't be able to establish a proper data link layer protocol, causing the line protocol to be down.

Submit
71. A subnet mask tells the router to look at which portions of an IP address?

Explanation

A subnet mask is used to divide an IP address into network and host portions. It helps the router determine which part of the IP address represents the network and which part represents the host. The network bits identify the network to which the IP address belongs, while the subnet bits further divide the network into smaller subnets. Therefore, the correct answer is "network and subnet bits."

Submit
72. What happens when you enter a major command on a Cicso router?

Explanation

When you enter a major command on a Cisco router, the router switches you from one configuration mode to another. This means that you are moving from one level of configuration to a higher level, allowing you to make more advanced changes to the router's settings.

Submit
73. Which command displays information about static route config on a Cisco router?

Explanation

The correct answer is "show ip route". This command is used to display information about the static route configuration on a Cisco router. It provides details about the routing table, including the static routes that have been configured. By using this command, network administrators can view the static routes and their associated next-hop addresses, administrative distances, and other relevant information.

Submit
74. How does the Cisco-proprietary HDLC make it possible for multiple network layer protocols to share the same serial link?

Explanation

Cisco-proprietary HDLC adds a new type of field to make it possible for multiple network layer protocols to share the same serial link. This new field allows for the inclusion of protocol information with the data field, enabling different protocols to be identified and processed correctly. By including this additional field, HDLC ensures that each protocol's data is properly encapsulated and transmitted over the serial link, allowing for efficient and reliable communication between different network layer protocols.

Submit
75. With RIP, load balancing is performed over multiple paths that have which characteristic?

Explanation

With RIP (Routing Information Protocol), load balancing is performed over multiple paths that have equal cost. This means that the paths have the same metric or cost value, indicating that they are equally efficient or desirable for routing traffic. By distributing the traffic across these paths, RIP ensures that the network resources are utilized optimally and that no single path becomes overloaded.

Submit
76. Which three statements accurately describe a distance vector protocol?

Explanation

Distance vector protocols, such as RIP, determine the direction and distance to any network in an internetwork. They use a hop count to measure the distance and determine the best path for routing. This process is also known as "routing by rumor" because routers exchange periodic updates to share information about network changes. Examples of distance vector protocols include RIP.

Submit
77. How many octets does a Class A network have in the host field?

Explanation

A Class A network has 3 octets in the host field. In IPv4 addressing, the host field represents the portion of the IP address that identifies a specific device on a network. In a Class A network, the first octet is reserved for the network ID, while the remaining three octets are used for the host ID. This allows for a large number of unique host addresses within a Class A network, making it suitable for large organizations or internet service providers.

Submit
78. What information is included in the output of the command show cdp interface

Explanation

The output of the "show cdp interface" command includes information about the encapsulation type. This means that the command will display the type of encapsulation used for the interface, which is important for understanding how data is formatted and transmitted over the network.

Submit
79. Which Cisco IOS command merges a configuration file from NVRAM into configuration in RAM?

Explanation

The correct answer is "copy startup running". This command copies the configuration file stored in NVRAM (non-volatile RAM) into the running configuration in RAM (random access memory). This allows the configuration changes made in the startup configuration file to take effect immediately in the running configuration.

Submit
80. Which Cisco IOS software command sets the console session timeout to 15 mins and 30 seconds?

Explanation

The correct answer is "exec-timeout 15 30". This command is used to set the console session timeout to 15 minutes and 30 seconds. It specifies the amount of time of inactivity before the console session is terminated.

Submit
81. Which two statements are true of Cisco Discovery protocol?

Explanation

Cisco Discovery Protocol (CDP) is a proprietary protocol developed by Cisco. It is used to discover information about directly connected Cisco devices. CDP runs at the data link layer of the network, allowing devices to share information about their capabilities, such as device type, IP address, and software version. However, CDP is not an open protocol standard and it does not discover information about all devices on the network. Therefore, the given answer is correct.

Submit
82. Which command enables HDLC?

Explanation

The correct answer is "Router(config-if)# encapsulation hdlc". This command is used to enable HDLC (High-Level Data Link Control) encapsulation on a specific interface in a router's configuration mode. HDLC is a protocol used for serial communication between routers and is commonly used in WAN (Wide Area Network) connections. By using this command, the router will encapsulate data using HDLC protocol on the specified interface, allowing for efficient and reliable communication between routers.

Submit
83. Which two peives of information are included in a CDP update packet?

Explanation

A CDP update packet includes two pieces of information: platform and device identifiers. The platform refers to the type of device or operating system being used, while device identifiers provide unique identification for the device. These two pieces of information help in identifying and understanding the devices connected to the network. Other options like routing updates, MAC address list, and link speed are not included in a CDP update packet.

Submit
84. Which Cisco IOS software command is used to return user EXEC mode fro the privileged EXEC mode

Explanation

The "disable" command is used in Cisco IOS software to return from privileged EXEC mode to user EXEC mode. This command terminates the current privileged EXEC session and returns the user to the previous user EXEC mode.

Submit
85. Which three statements accurately describe WAN's

Explanation

The first statement accurately describes WANs as they are usually owned by the companies in which they are implemented. The second statement is also accurate as WANs connect devices that are separated by a wide geographical area. The third statement is true as WANs utilize the services of carriers such as telephone companies, cable companies, satellite systems, and network providers. However, the last statement is incorrect as WANs do not connect devices that are in small geographic areas. Instead, they connect devices that are separated by a wide geographical area.

Submit
86. Which two of the following are types of DSL

Explanation

ADSL (Asymmetric Digital Subscriber Line) and IDSL (ISDN Digital Subscriber Line) are both types of DSL (Digital Subscriber Line) technologies. ADSL is the most common type of DSL, providing high-speed internet access over existing telephone lines. It allows for faster download speeds compared to upload speeds. IDSL, on the other hand, is a slower version of DSL that uses ISDN (Integrated Services Digital Network) technology. It provides symmetrical upload and download speeds, making it suitable for businesses that require reliable and consistent data transmission.

Submit
87. How could you obtain CDP information about a remote device that is not directly connected?

Explanation

To obtain CDP information about a remote device that is not directly connected, one can use SSH or Telnet to access a Cisco device that is connected to the target device. By accessing the connected Cisco device, one can retrieve the CDP information about the remote device indirectly.

Submit
88. Which command would you use to see who has Telnet sessions to your router?

Explanation

The "show user" command would be used to see who has Telnet sessions to your router. This command provides information about the current users logged into the router, including their usernames, session IDs, and login times. By using this command, you can identify the active Telnet sessions and the users connected to your router.

Submit
89. At which OSI lever do WAN protocols define encapsulation of data for transmission toward a remote location and the mechanisms for transferring the resulting frames?

Explanation

WAN protocols define encapsulation of data for transmission toward a remote location and the mechanisms for transferring the resulting frames at Layer 2 of the OSI model. Layer 2, also known as the Data Link Layer, is responsible for error-free transmission of data frames over the physical network. This layer handles functions such as framing, addressing, and error detection, ensuring reliable communication between devices on the same network or across different networks.

Submit
90. You are troubleshooting a NAT connectivity problem on a Cisco router.  You determine that the appropriate translation is not installed in the translation table.  Whish three actions should you take? 

Explanation

To troubleshoot a NAT connectivity problem on a Cisco router, there are three actions that should be taken. Firstly, it is important to determine whether there are enough addresses in the NAT pool to ensure that there are sufficient addresses available for translation. Secondly, verifying that the router interfaces are appropriately defined as NAT inside or NAT outside is crucial for proper NAT functionality. Lastly, it is necessary to confirm that the ACL referenced by the NAT command is permitting all the necessary inside local IP addresses, as any restrictions in the ACL could cause connectivity issues.

Submit
91. Which three of the following statements about the path determination process are accurate?

Explanation

Routers evaluate the available paths to a destination, which means that they analyze the different routes that can be taken to reach a specific destination. The routing process uses metrics and administrative distances to evaluate network paths, which helps determine the best route based on factors such as speed, reliability, and cost. Dynamic routing occurs when routers learn and update their routing information using routing protocols, allowing them to adapt to changes in the network. This is different from static routing, where the network admin manually configures the routing information on each router.

Submit
92. You should use debug commands to blank problems, not to monitor normal network operation

Explanation

Debug commands are used to troubleshoot and identify issues within a network. They are not meant to be used for monitoring normal network operations. Instead, they are specifically designed to isolate problems and gather information about network behavior during abnormal situations. By using debug commands, network administrators can identify and fix issues more efficiently, ensuring the smooth operation of the network. Therefore, the correct answer is "isolate."

Submit
93. Which command displays the device platform of a directly connected device?

Explanation

The "show cdp entry" command displays the device platform of a directly connected device. CDP (Cisco Discovery Protocol) is a Cisco proprietary protocol used to discover and collect information about directly connected Cisco devices. By using the "show cdp entry" command, the user can view detailed information about the neighboring devices, including their platform type. This command is useful for network administrators to identify the type of devices connected to their network and ensure compatibility and proper configuration.

Submit
94. What does the copy tftp startup command do?

Explanation

The copy tftp startup command is used to download a config file from a TFTP server to NVRAM. This allows the router or device to retrieve its startup configuration from the TFTP server and store it in non-volatile RAM (NVRAM), ensuring that the device uses the correct configuration upon startup.

Submit
95. What's the practical minimum number of bits that can be borrowed to form a subnet?

Explanation

The practical minimum number of bits that can be borrowed to form a subnet is 2. Borrowing 2 bits allows for the creation of 4 subnets (2^2), which is the smallest number of subnets that can be formed. By borrowing fewer than 2 bits, the number of subnets would be insufficient for practical use.

Submit
96. Which of the following subnet masks falls on octet boundaries?

Explanation

The subnet mask 255.0.0.0 falls on octet boundaries because each octet in the mask has a value of either 255 or 0, indicating that the entire octet is either fully utilized or not utilized at all. This means that the network address is defined by the first octet, while the remaining three octets are available for host addresses.

Submit
97. During the Cisco router bootup process, what does the router do if the boot firld value is 0x2

Explanation

If the boot field value is 0x2 during the Cisco router bootup process, the router will check the startup config file for boot system commands. This means that the router will look for any commands in the startup configuration file that specify which IOS image or subset to load during the bootup process. This allows the router to determine the appropriate software to load and run.

Submit
98. Which command can be used to see if an address in the DHCP pool is already in use by another device?

Explanation

The command "sh ip dhcp conflicts" can be used to see if an address in the DHCP pool is already in use by another device. This command displays any IP addresses that are in conflict, meaning they have been assigned to multiple devices. By using this command, network administrators can identify and resolve address conflicts, ensuring that each device on the network has a unique IP address.

Submit
99. What does command cdp enable do?

Explanation

The command "cdp enable" enables the Cisco Discovery Protocol (CDP) on an individual interface. CDP is a proprietary protocol used by Cisco devices to gather information about neighboring devices and their capabilities. By enabling CDP on a specific interface, the device will start sending CDP advertisements on that interface, allowing neighboring devices to discover and gather information about it.

Submit
100. Which of the following is a low-level operating system that is typically ised for manufacturing testing and troubleshooting?

Explanation

ROM monitor is a low-level operating system that is typically used for manufacturing testing and troubleshooting. It is a firmware program that resides in the read-only memory (ROM) of a computer system. The ROM monitor provides basic functions and commands that allow technicians to diagnose and troubleshoot hardware and software issues. It is often used in situations where the main operating system is not accessible or functional.

Submit
101. On most routers, the Cisco IOS software is loaded into blank to run, but on some routers, it is run directly from blank.

Explanation

The Cisco IOS software is typically loaded into RAM to run on most routers. However, on some routers, it is run directly from flash memory. RAM is a type of volatile memory that allows for fast access to data and instructions, but it requires power to retain information. Flash memory, on the other hand, is non-volatile and can store data even when power is removed. Running the Cisco IOS software from flash memory allows for more permanent storage and ensures that the software is readily available even after a power cycle.

Submit
102. What does the command ip route 186.157.5.0 255.255.255.0 10.1.1.3 specify?

Explanation

The command "ip route 186.157.5.0 255.255.255.0 10.1.1.3" specifies that the router should use address 10.1.1.3 to get devices on network 186.157.5.0. This means that any traffic destined for the devices on the network 186.157.5.0 will be routed through the specified address 10.1.1.3.

Submit
103. Which three of the following statements describe the functon of routing tables

Explanation

Routing tables provide an ordered list of known network addresses, allowing routers to determine the best path for data transmission. These tables also contain metrics, such as hop count or bandwidth, which help determine the desirability of a route. Additionally, routing table associations inform routers whether a destination is directly connected or can be reached through another router (the next hop router) on the way to the final destination.

Submit
104. When you copy a config from another source into RAM, what happens to the previous config?

Explanation

When you copy a config from another source into RAM, the previous config is merged with the new config, with the new config taking precedence. This means that any conflicting configurations in the new config will overwrite the corresponding configurations in the previous config. The result is a merged configuration where the settings from the new config are prioritized over the settings from the previous config.

Submit
105. To see how many bits you should borrow from the host portion of the network address to give you the number of subnets that you need, you should?

Explanation

To determine how many bits to borrow from the host portion of the network address, you need to subtract the number of subnets that you need from the network portion. This is because the network portion represents the total number of subnets available, and subtracting the desired number of subnets will give you the number of additional bits required. By borrowing these bits from the host portion, you can create the necessary number of subnets.

Submit
106. Which Cisco IOS command adds a time stamp to a debug or log message?

Explanation

The correct answer is "service timestamps". This command is used in Cisco IOS to add a time stamp to a debug or log message. By enabling this feature, the router or switch will append a time stamp to each debug or log message, allowing for easier troubleshooting and analysis of events.

Submit
107. Which three statements properly describe Frame Relay?

Explanation

Frame Relay is a data link layer protocol that operates between the physical layer and the network layer. It does not work at the application layer. The statement that Frame Relay works at the application layer is incorrect.

The connection to the network edge in Frame Relay is often a leased line, but dialup connections using ISDN or xDSL lines are also available from some providers. This statement is true.

Frame Relay implements no error or flow control. Unlike other protocols, Frame Relay does not have built-in error detection or correction mechanisms. This statement is true.

Frame Relay provides both PVC (Permanent Virtual Circuit) and SVC (Switched Virtual Circuit) services. It uses shared medium-bandwidth connectivity to carry both voice and data traffic. This statement is true.

Submit
108. What three are most commonly used by routing protools to determine a network path

Explanation

Routing protocols use hop count, bandwidth, and delay to determine the best network path. Hop count refers to the number of routers or hops that a packet must traverse to reach its destination. Bandwidth is the capacity of a network link to transmit data, and routing protocols consider links with higher bandwidth as preferable. Delay refers to the time it takes for a packet to travel from its source to its destination, and routing protocols aim to minimize delay. These three factors help routing protocols make informed decisions about the most efficient and reliable network path.

Submit
109. Which three statements accurately describe a link-state routing protocol?

Explanation

Link-state routing protocols respond quickly to network changes because they use the information in the link-state database to calculate the shortest paths and update routing tables accordingly. LS routing protocols send periodic updates (LS refreshes) at long time intervals, approximately once every 30 minutes, to ensure that routers have the most up-to-date information about the network topology. In LS routing protocols, every router tries to build its own internal map of the network topology by exchanging link-state information with other routers. This allows each router to have a comprehensive understanding of the network and make informed routing decisions.

Submit
110. Which three statements accurately describe the history of the internet?

Explanation

The answer accurately describes three key milestones in the history of the internet. Firstly, the statement about U.S. Department of Defense researchers devising the packet system is significant because it revolutionized data transmission. Secondly, the mention of ARPANET developers creating the first email messaging software in 1972 highlights the early development of communication protocols on the internet. Lastly, the introduction of DNS in 1984 is crucial as it provided the world with domain suffixes and country codes, which are fundamental to the structure and organization of the internet.

Submit
111. Which three statements are considerations for DSL?  

Explanation

DSL service can be incrementally added in any area, meaning that it can be implemented gradually in different locations. DSL also has distance limitations, which means that the quality and speed of the connection can decrease as the distance between the user and the provider's central office increases. Additionally, DSL is not universally available in all geographical locations, indicating that there may be areas where DSL service is not accessible or not offered.

Submit
112. Which command clears a specific extended dynamic translation entry from the NAT translation table?

Explanation

The command "clear ip nat translation inside" clears a specific extended dynamic translation entry from the NAT translation table. This command specifically clears the translation entry that is associated with the inside interface.

Submit
113. Which three statements accurately describe the functions of a packet-switching WAN communications link?

Explanation

Packet-switching is a method of communication where data is divided into packets and sent over different routes to reach the destination. This allows for more efficient use of network resources and increased flexibility. The fact that the route taken by the packets can vary ensures redundancy and fault tolerance. Packet-switched networks utilize a shared public network owned by a carrier, allowing for cost savings compared to point-to-point leased lines. Therefore, the three statements accurately describe the functions of a packet-switching WAN communications link.

Submit
114. Which two statements accurately describe data-link protocols in a WAN?

Explanation

The first statement accurately describes data-link protocols in a WAN by stating that many protocols use a framing mechanism similar to HDLC. This means that these protocols divide data into frames for transmission over the network.

The second statement also accurately describes data-link protocols by stating that they define how data is encapsulated for transmission to remote sites and the mechanisms for establishing a connection between the sending and receiving devices.

Both statements provide accurate information about the characteristics and functions of data-link protocols in a WAN.

Submit
115. Which three statements identify the promary uses of a network map

Explanation

A network map is a visual representation of a network's infrastructure, including devices and their connections. It is primarily used to track modifications to network design, as it allows administrators to easily identify changes made to the network's layout or structure. Additionally, a network map helps track changes to the topology, which refers to the physical or logical arrangement of network devices. This information is crucial for troubleshooting network problems, as it provides a clear overview of the network's components and their interconnections. Therefore, the three identified statements accurately describe the primary uses of a network map.

Submit
116. Which three communications needs to do WAN's address?

Explanation

The correct answer is organizations often want to share information with other organizations over across large distances because WANs are designed to connect multiple networks over a large geographical area. A department needs to share large data files quickly because WANs have high bandwidth capabilities that allow for fast data transfer. Students need to do research for classes by accessing library indexes and publications that are located in other parts of their country and in other parts of the world because WANs provide connectivity to remote resources.

Submit
117. Which three statements accurately describe ATM 

Explanation

ATM is implemented by using virtual circuits, which provide a bidirectional communication path from one ATM endpoint to another. ATM is a type of cell-switched connection technology that is capable of transferring voice, video, and data through private and public networks.

Submit
118. Which three statements accurately describe cable connections?

Explanation

The original purpose of the Multimedia Cable Network System Partners Ltd. was to define a product and system standard capable of providing data and future services over CATV plants. This statement explains the initial objective of the organization, which was to establish a standard for delivering data and other services through cable television networks.

Cable modems enable two-way, high-speed data transmissions using the same coaxial lines that transmit cable television. This statement highlights the capability of cable modems to facilitate bi-directional data transfer, utilizing the existing coaxial infrastructure.

Cable modem access provides speeds superior to leased lines, with lower costs and simpler installation. This statement emphasizes the advantages of cable modem technology, such as faster speeds compared to traditional leased lines, cost-effectiveness, and ease of installation.

Submit
119. Which three statements describe the function of PPP

Explanation

PPP originally emerged as an encapsulation protocol for transporting IP traffic over point-to-point links. This means that PPP was initially developed to provide a way to transmit IP packets over direct connections between two devices. PPP provides router-to-router and host-to-host connections over synchronous and asynchronous circuits, allowing for reliable communication between network devices. The LCP in PPP is used for the establishment, configurations, and testing of the data-link connection, ensuring that the connection is properly established and maintained.

Submit
120. Which Cisco IOS command displays the frequency at which packets are sent?

Explanation

The "show cdp interface" command in Cisco IOS displays the frequency at which packets are sent. This command provides information about the interfaces on a device that are running Cisco Discovery Protocol (CDP), including the holdtime value which indicates the frequency at which CDP packets are sent. By using this command, network administrators can monitor and troubleshoot CDP traffic on their network devices.

Submit
121. In which situation is an administrative distance required?

Explanation

An administrative distance is required when the same route is learned via multiple routing protocols. This is because each routing protocol assigns a different administrative distance to its routes, which is used to determine the preference of one route over another. When the same route is learned via multiple routing protocols, the administrative distance helps determine which route should be used. The route with the lowest administrative distance is preferred and will be chosen as the best route to reach the destination.

Submit
122. Which three statements describe considerations for point-to-point communication links?

Explanation

The three statements that describe considerations for point-to-point communication links are:
1) Point-to-point comm links require minimal expertise to install and maintain, indicating that they are relatively easy to set up and manage.
2) P2P comm links usually offer high QOS, suggesting that they provide a high level of quality of service, ensuring reliable and efficient communication.
3) P2P comm links provide permanent, dedicated capacity that is always available, indicating that the capacity of the link is dedicated solely to the communication between the two endpoints and is consistently accessible.

Submit
123. Which four of the following are required DHCP parameters when configuring a DHCP server using SDM on a Cisco router.

Explanation

When configuring a DHCP server using SDM on a Cisco router, the following four parameters are required:

1. Pool name: This is the name given to the DHCP pool, which is a range of IP addresses that the DHCP server can assign to clients.

2. Lease time: This parameter determines the duration for which a client can use an IP address assigned by the DHCP server before it needs to renew the lease.

3. DHCP network and subnet: This specifies the network and subnet mask for the DHCP pool. It defines the range of IP addresses that can be assigned to clients.

4. Starting and ending addresses: These are the first and last IP addresses in the DHCP pool range, respectively. The DHCP server will assign addresses within this range to clients.

These parameters are essential for configuring a DHCP server and ensuring proper IP address assignment to clients on the network.

Submit
124. Which three statements accurately describe DSL?

Explanation

DSL (Digital Subscriber Line) technology is a circuit-switched connection technology that utilizes existing twisted-pair telephone lines to transmit high bandwidth data, such as multimedia and video, to service subscribers. It allows subscribers to use the same local-loop line for regular telephone voice connection as well as an always-on connection for instant network connectivity. DSL technologies also enable simultaneous voice and data transmissions by placing upload (upstream) and download (downstream) data transmissions within a 4 kHz window. This ensures that both voice and data can be transmitted simultaneously on a DSL service.

Submit
125. Which three statements accurately describe the characteristics and functions of circuit-switched networks?

Explanation

Circuit-switched networks involve the establishment, maintenance, and termination of a dedicated physical circuit for each communication session. This ensures a reliable and secure connection between the communicating parties. Additionally, circuit-switched networks allow multiple sites to connect to the switched network of a carrier and communicate with each other. ISDN, which stands for Integrated Services Digital Network, is an example of a circuit-switched network.

Submit
View My Results

Quiz Review Timeline (Updated): Jul 13, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Jul 13, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Feb 08, 2012
    Quiz Created by
    Msmith721
Cancel
  • All
    All (125)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
Arrange the steps of the routing process in the correct order
Match each method of populating a routing table to its definition
Match the type of help that is available with the Cisco IOS CLI to its...
Match each router prompt to its configuration mode
Match each type of WAN device to its function
MAtch the type of connection on a router to its function
Match each type of multiplexing to its function.
Match each type of communication link to its function in a WAN
Match each NAT term with its definition
What information does the show running-config command provide on a...
Which three of the following components are common to routers,...
Using six subnet bits, how many usable subnets are created?
Which part of the IP address 172.17.128.47 does the subnet mask...
Which Cisco IOS software command creates a message to be displayed...
If both enable secret and the enable password commans are configured...
Which Cisco IOS software command configures a serial port in slot 0,...
Which of the following is a Cisco IOS tool that can be used for secure...
Which statement most accurately describes static and dynamic routes?
What stage of a Cisco router boot process verifies that all router...
Which Cisco router component is used primarily to store the startup...
Given the system image file c2600-js-mz.122.21abin, which part of the...
How many host addresses can be used in a Class C network
All computers function using the?
IP addresses are represented using?
Which two of the following are functions of DHCP
At which OSI level do WAN protocols describe how to provide...
Which of the following protocols is an example of an exterior gateway...
Which keyword do you add to the show cdp neighbors command to obtain...
Why must you be very careful when using debug commands?
When a router receives a packet with a destination address that is...
What is the max number of bits that can be borrowed to create a subnet...
Which two of the following are binary default subnet masks?
How should you power up a Cisco router?
What would you use to suspend a Telnet session?
Which output for the show interface command indicates that PPP is...
How does  a distance vector router learn about paths for networks...
What does a distance vector router send to its neighboring routers as...
Which Cisco IOS command produces the same result as the show cdp...
What happens if the router cannot find a valid startup config file in...
Which bits of the configuration register value make up the boot...
Which action can lead to a software reload on a Cisco device?
What is that max allowable hop count for RIP
Where is the runnign configuration of the router usually stored?
On a heavily used production router, enabling a debug privileged EXEC...
Which two types of ports do routers have?
Which two statements best decribe the functions of a router in a...
Which one of the following containst routing information that helps a...
If a router does not match the appropriate address portions to a...
Which statement best describes what the user EXEC mode command allows...
When configuring NAT, the internet interface would be considered which...
What does the ppp authentication chap pap command configure?
Which command correctly specifies RIP as the routing protocol?
Which command displays the CDP packet checksum errors?
The command show startup-config displays the onfiguration in which...
Which Cisco IOS command is used to DL a copy of the Cisco IOS image...
Which Cisco IOS command enables a Telnet session to receive console...
It is preferable to use debug commands during periods of blank network...
Which two statements accurately describe the difference between...
When you start a Cisco router, what shoudl you see on the console?
What is the primary purpose of setup mode on a Cisco router?
Which Cisco IOS software command displays the configuration of the...
What is the defualt value of the RIP hold-down timer?
Which stage during a Cisco router boot occurs last?
Which Cisco IOS software command sets the clock speed to 64kb/s on a...
Which Cisco IOS command diplays the amount of memory that is available...
The outside of which command displays the active translation for a NAT...
In which Cisco CLI mode do you enter the command to specify PPP...
Which command disables CDP on the device as a whole?
Which of the following describes the DHCP server that is provided by...
A serial interface displays "Serial1 is up, line protocol is...
A subnet mask tells the router to look at which portions of an IP...
What happens when you enter a major command on a Cicso router?
Which command displays information about static route config on a...
How does the Cisco-proprietary HDLC make it possible for multiple...
With RIP, load balancing is performed over multiple paths that have...
Which three statements accurately describe a distance vector protocol?
How many octets does a Class A network have in the host field?
What information is included in the output of the command show cdp...
Which Cisco IOS command merges a configuration file from NVRAM into...
Which Cisco IOS software command sets the console session timeout to...
Which two statements are true of Cisco Discovery protocol?
Which command enables HDLC?
Which two peives of information are included in a CDP update packet?
Which Cisco IOS software command is used to return user EXEC mode fro...
Which three statements accurately describe WAN's
Which two of the following are types of DSL
How could you obtain CDP information about a remote device that is not...
Which command would you use to see who has Telnet sessions to your...
At which OSI lever do WAN protocols define encapsulation of data for...
You are troubleshooting a NAT connectivity problem on a Cisco router....
Which three of the following statements about the path determination...
You should use debug commands to blank problems, not to monitor normal...
Which command displays the device platform of a directly connected...
What does the copy tftp startup command do?
What's the practical minimum number of bits that can be borrowed...
Which of the following subnet masks falls on octet boundaries?
During the Cisco router bootup process, what does the router do if the...
Which command can be used to see if an address in the DHCP pool is...
What does command cdp enable do?
Which of the following is a low-level operating system that is...
On most routers, the Cisco IOS software is loaded into blank to run,...
What does the command ip route 186.157.5.0 255.255.255.0 10.1.1.3...
Which three of the following statements describe the functon of...
When you copy a config from another source into RAM, what happens to...
To see how many bits you should borrow from the host portion of the...
Which Cisco IOS command adds a time stamp to a debug or log message?
Which three statements properly describe Frame Relay?
What three are most commonly used by routing protools to determine a...
Which three statements accurately describe a link-state routing...
Which three statements accurately describe the history of the...
Which three statements are considerations for DSL?  
Which command clears a specific extended dynamic translation entry...
Which three statements accurately describe the functions of a...
Which two statements accurately describe data-link protocols in a WAN?
Which three statements identify the promary uses of a network map
Which three communications needs to do WAN's address?
Which three statements accurately describe ATM 
Which three statements accurately describe cable connections?
Which three statements describe the function of PPP
Which Cisco IOS command displays the frequency at which packets are...
In which situation is an administrative distance required?
Which three statements describe considerations for point-to-point...
Which four of the following are required DHCP parameters when...
Which three statements accurately describe DSL?
Which three statements accurately describe the characteristics and...
Alert!

Advertisement