CCNA ICND 1 Part 2

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Msmith721
M
Msmith721
Community Contributor
Quizzes Created: 2 | Total Attempts: 321
Questions: 125 | Attempts: 67

SettingsSettingsSettings
CCNA ICND 1 Part 2 - Quiz


Questions and Answers
  • 1. 

    Which three of the following components are common to routers, switches, and Computers?

    • A.

      RAM

    • B.

      CPU

    • C.

      Motherboard

    • D.

      Keyboard

    Correct Answer(s)
    A. RAM
    B. CPU
    C. Motherboard
    Explanation
    RAM, CPU, and motherboard are common components to routers, switches, and computers. RAM (Random Access Memory) is used for temporary storage of data and instructions that are currently being processed. CPU (Central Processing Unit) is the main component responsible for executing instructions and performing calculations. The motherboard is the main circuit board that connects all the components together and allows communication between them. These components are essential for the functioning of all three devices, regardless of their specific purpose or functionality.

    Rate this question:

  • 2. 

    Which two types of ports do routers have?

    • A.

      Printer

    • B.

      Console

    • C.

      Network

    • D.

      CD-ROM

    • E.

      USB

    Correct Answer(s)
    B. Console
    C. Network
    Explanation
    Routers have two types of ports: console and network. The console port is used for connecting to the router for configuration and management purposes. It allows administrators to access the router's command-line interface (CLI) and make changes to its settings. The network ports, on the other hand, are used for connecting the router to other devices in the network. These ports enable the router to send and receive data packets, allowing it to route traffic between different networks.

    Rate this question:

  • 3. 

    Which two statements best decribe the functions of a router in a network

    • A.

      Routers maintain their routing tables and ensure that other routers know of changes in the network

    • B.

      Routers use the routing table to determine where to forward packets

    • C.

      Routers strengthen the signal over large distances in a network

    • D.

      Routers create larger collision domains

    • E.

      Routers use ICMP to communicate network information from their own routing table with other routers

    Correct Answer(s)
    A. Routers maintain their routing tables and ensure that other routers know of changes in the network
    B. Routers use the routing table to determine where to forward packets
    Explanation
    Routers maintain their routing tables and ensure that other routers know of changes in the network. This means that routers keep track of the available paths in a network and update their routing tables accordingly. They also communicate these changes to other routers so that they are aware of the updated network topology.

    Routers use the routing table to determine where to forward packets. The routing table contains information about the available paths and their associated costs. When a router receives a packet, it looks at the destination address and checks its routing table to determine the best path to forward the packet towards its destination. By using the routing table, routers can efficiently route packets through the network.

    Rate this question:

  • 4. 

    Which three of the following statements about the path determination process are accurate?

    • A.

      Routers evaluate the available paths to a destination

    • B.

      The routing process uses metrics and administrative distances when evaluating network paths

    • C.

      Dynamic routing occurs when the network admin configures information on each router

    • D.

      Dynamic routing when the information is learned using routing information that is obtained from routing protocols

    • E.

      A default route holds an explicit route to every network

    • F.

      The routing table holds multiple entries per network

    Correct Answer(s)
    A. Routers evaluate the available paths to a destination
    B. The routing process uses metrics and administrative distances when evaluating network paths
    D. Dynamic routing when the information is learned using routing information that is obtained from routing protocols
    Explanation
    Routers evaluate the available paths to a destination, which means that they analyze the different routes that can be taken to reach a specific destination. The routing process uses metrics and administrative distances to evaluate network paths, which helps determine the best route based on factors such as speed, reliability, and cost. Dynamic routing occurs when routers learn and update their routing information using routing protocols, allowing them to adapt to changes in the network. This is different from static routing, where the network admin manually configures the routing information on each router.

    Rate this question:

  • 5. 

    Which one of the following containst routing information that helps a router determine the routing path?

    • A.

      IP address

    • B.

      MAC address

    • C.

      Routing table

    • D.

      Routing protocol

    Correct Answer
    C. Routing table
    Explanation
    A routing table contains routing information that helps a router determine the routing path. It is a database that is stored in a router and contains a list of available routes to different network destinations. The routing table includes information such as the destination network address, the next hop router, and the metric or cost associated with each route. By referencing the routing table, a router can determine the most appropriate path to send data packets to their intended destination.

    Rate this question:

  • 6. 

    Which three of the following statements describe the functon of routing tables

    • A.

      Routing provide an ordered list of known network addresses

    • B.

      Routing tables are maintained through the transmission of MAC addresses

    • C.

      Routing tables contain metrics that are used to determine the disirability of the route

    • D.

      Routing table associations tell a router that a particular destination is either directly connected to the router or that it can be reached via another router (the next hop router) on the wat to the final destination

    • E.

      When a router recieves an incoming packet, it uses the source address and searches the routing table to find the best path for the data from that source

    • F.

      Routing tables are used to compare which routing protocols allow reaching the destination network

    Correct Answer(s)
    A. Routing provide an ordered list of known network addresses
    C. Routing tables contain metrics that are used to determine the disirability of the route
    D. Routing table associations tell a router that a particular destination is either directly connected to the router or that it can be reached via another router (the next hop router) on the wat to the final destination
    Explanation
    Routing tables provide an ordered list of known network addresses, allowing routers to determine the best path for data transmission. These tables also contain metrics, such as hop count or bandwidth, which help determine the desirability of a route. Additionally, routing table associations inform routers whether a destination is directly connected or can be reached through another router (the next hop router) on the way to the final destination.

    Rate this question:

  • 7. 

    What three are most commonly used by routing protools to determine a network path

    • A.

      Hop count

    • B.

      Bandwith

    • C.

      Delay

    • D.

      Packet length

    • E.

      Distance

    • F.

      Quantity

    Correct Answer(s)
    A. Hop count
    B. Bandwith
    C. Delay
    Explanation
    Routing protocols use hop count, bandwidth, and delay to determine the best network path. Hop count refers to the number of routers or hops that a packet must traverse to reach its destination. Bandwidth is the capacity of a network link to transmit data, and routing protocols consider links with higher bandwidth as preferable. Delay refers to the time it takes for a packet to travel from its source to its destination, and routing protocols aim to minimize delay. These three factors help routing protocols make informed decisions about the most efficient and reliable network path.

    Rate this question:

  • 8. 

    Which three statements accurately describe a distance vector protocol?

    • A.

      RIP was developed by Cisco to address the issues that are associated with routing in medium-sized LAN's

    • B.

      Examples of this protocol include RIP

    • C.

      This protocol determines the direction (vector) and distance (hop count) to any network in the internetwork

    • D.

      A router needs to know the entire path to every network segment

    • E.

      This process is also known as "routing by rumor"

    • F.

      Routers that are running the distance vector routing protocol send periodic updates only when there are changes in the network

    Correct Answer(s)
    B. Examples of this protocol include RIP
    C. This protocol determines the direction (vector) and distance (hop count) to any network in the internetwork
    E. This process is also known as "routing by rumor"
    Explanation
    Distance vector protocols, such as RIP, determine the direction and distance to any network in an internetwork. They use a hop count to measure the distance and determine the best path for routing. This process is also known as "routing by rumor" because routers exchange periodic updates to share information about network changes. Examples of distance vector protocols include RIP.

    Rate this question:

  • 9. 

    Which three statements accurately describe a link-state routing protocol?

    • A.

      The link-state database is used to calculate the paths with the highest bandwidths on the network

    • B.

      Link-State routing protocols respond quickly to network changes

    • C.

      In link-state routing protocols, each router periodically sends messages to the network, listing the routers to which it is directly connected and also information about whether the link to each router is active

    • D.

      LS routing protocols send periodic updates (LS refreshes) at long time intervals, approx once every 30 mins

    • E.

      In LS routing protocols, every router tries to build it's own internal map of the network topology

    • F.

      LS routing protocols send periodic detailed routing tables eeven tho network changes have occurred

    Correct Answer(s)
    B. Link-State routing protocols respond quickly to network changes
    D. LS routing protocols send periodic updates (LS refreshes) at long time intervals, approx once every 30 mins
    E. In LS routing protocols, every router tries to build it's own internal map of the network topology
    Explanation
    Link-state routing protocols respond quickly to network changes because they use the information in the link-state database to calculate the shortest paths and update routing tables accordingly. LS routing protocols send periodic updates (LS refreshes) at long time intervals, approximately once every 30 minutes, to ensure that routers have the most up-to-date information about the network topology. In LS routing protocols, every router tries to build its own internal map of the network topology by exchanging link-state information with other routers. This allows each router to have a comprehensive understanding of the network and make informed routing decisions.

    Rate this question:

  • 10. 

    All computers function using the?

    • A.

      Base-10 system

    • B.

      Decimal system

    • C.

      Numeric system

    • D.

      Binary system

    Correct Answer
    D. Binary system
    Explanation
    Computers function using the binary system, which is a numeric system that uses only two digits: 0 and 1. This system is used because computers are made up of electronic circuits that can be in one of two states, either on or off, represented by 1 and 0 respectively. These binary digits, also known as bits, are used to represent all types of data and instructions in a computer, allowing it to perform calculations, store and retrieve information, and execute programs. The binary system is fundamental to computer architecture and is the basis for all digital computing.

    Rate this question:

  • 11. 

    IP addresses are represented using?

    • A.

      32-bit binary numbers

    • B.

      16-bit decimal numbers

    • C.

      8-bit binary numbers

    • D.

      Eight sets of 4-bit decimal numbers

    Correct Answer
    A. 32-bit binary numbers
    Explanation
    IP addresses are represented using 32-bit binary numbers. This means that an IP address consists of 32 binary digits, which are typically grouped into four octets (each octet containing 8 bits). This binary representation allows for a total of 2^32 (or approximately 4.3 billion) unique IP addresses to be assigned.

    Rate this question:

  • 12. 

    How many octets does a Class A network have in the host field?

    • A.

      1

    • B.

      2

    • C.

      3

    • D.

      4

    Correct Answer
    C. 3
    Explanation
    A Class A network has 3 octets in the host field. In IPv4 addressing, the host field represents the portion of the IP address that identifies a specific device on a network. In a Class A network, the first octet is reserved for the network ID, while the remaining three octets are used for the host ID. This allows for a large number of unique host addresses within a Class A network, making it suitable for large organizations or internet service providers.

    Rate this question:

  • 13. 

    What's the practical minimum number of bits that can be borrowed to form a subnet?

    • A.

      1

    • B.

      2

    • C.

      3

    • D.

      4

    Correct Answer
    B. 2
    Explanation
    The practical minimum number of bits that can be borrowed to form a subnet is 2. Borrowing 2 bits allows for the creation of 4 subnets (2^2), which is the smallest number of subnets that can be formed. By borrowing fewer than 2 bits, the number of subnets would be insufficient for practical use.

    Rate this question:

  • 14. 

    Using six subnet bits, how many usable subnets are created?

    • A.

      58

    • B.

      60

    • C.

      62

    • D.

      66

    Correct Answer
    C. 62
    Explanation
    By using six subnet bits, we can create a total of 64 subnets. However, the first and last subnets are typically reserved for network and broadcast addresses respectively, leaving us with 62 usable subnets. Therefore, the correct answer is 62.

    Rate this question:

  • 15. 

    How many host addresses can be used in a Class C network

    • A.

      253

    • B.

      254

    • C.

      255

    • D.

      256

    Correct Answer
    B. 254
    Explanation
    A Class C network uses a 24-bit network mask, which allows for 256 possible addresses. However, two of these addresses are reserved for network identification and broadcast, leaving 254 host addresses that can be used for devices within the network.

    Rate this question:

  • 16. 

    What is the max number of bits that can be borrowed to create a subnet for a Class C network?

    • A.

      2

    • B.

      4

    • C.

      6

    • D.

      8

    Correct Answer
    C. 6
    Explanation
    The maximum number of bits that can be borrowed to create a subnet for a Class C network is 6. A Class C network has a default subnet mask of 255.255.255.0, which means that the first 24 bits are reserved for the network address and the last 8 bits are available for host addresses. By borrowing 6 bits from the host portion, we can create subnets with a subnet mask of 255.255.255.192, allowing for a maximum of 64 subnets.

    Rate this question:

  • 17. 

    A subnet mask tells the router to look at which portions of an IP address?

    • A.

      Mask and host bits

    • B.

      Host and network bits

    • C.

      Host and subnet bits

    • D.

      Network and subnet bits

    Correct Answer
    D. Network and subnet bits
    Explanation
    A subnet mask is used to divide an IP address into network and host portions. It helps the router determine which part of the IP address represents the network and which part represents the host. The network bits identify the network to which the IP address belongs, while the subnet bits further divide the network into smaller subnets. Therefore, the correct answer is "network and subnet bits."

    Rate this question:

  • 18. 

    If a router does not match the appropriate address portions to a number on its routing table, it?

    • A.

      Sends the packet back to the sender

    • B.

      Passes the packet to the next router in the hierarchy

    • C.

      Adds that number to its table

    • D.

      Discards the packet

    Correct Answer
    D. Discards the packet
    Explanation
    When a router does not find a match for the appropriate address portions in its routing table, it discards the packet. This means that the router does not have any information on how to forward the packet to its intended destination. Discarding the packet ensures that it does not continue to be passed along the network, preventing unnecessary network congestion.

    Rate this question:

  • 19. 

    Which of the following subnet masks falls on octet boundaries?

    • A.

      255.255.0.0

    • B.

      255.255.255.254

    • C.

      255.128.0.0

    • D.

      255.0.0.0

    Correct Answer
    D. 255.0.0.0
    Explanation
    The subnet mask 255.0.0.0 falls on octet boundaries because each octet in the mask has a value of either 255 or 0, indicating that the entire octet is either fully utilized or not utilized at all. This means that the network address is defined by the first octet, while the remaining three octets are available for host addresses.

    Rate this question:

  • 20. 

    Which two of the following are binary default subnet masks?

    • A.

      11111111.00000000.00000000.00000000

    • B.

      11111111.11111111.010000000.00000000

    • C.

      11111111.11111111.11111111.000000000

    • D.

      255.255.224.0

    Correct Answer(s)
    A. 11111111.00000000.00000000.00000000
    C. 11111111.11111111.11111111.000000000
    Explanation
    The two binary default subnet masks are 11111111.00000000.00000000.00000000 and 11111111.11111111.11111111.000000000. These subnet masks are binary representations of the decimal subnet masks 255.0.0.0 and 255.255.255.0 respectively. The first subnet mask has all 8 bits in the first octet set to 1, indicating that the network portion of the IP address is 8 bits long. The second subnet mask has all 8 bits in the first three octets set to 1, indicating that the network portion of the IP address is 24 bits long.

    Rate this question:

  • 21. 

    Which part of the IP address 172.17.128.47 does the subnet mask 255.255.0.0 tell the router to look for?

    • A.

      172.17.128.47

    • B.

      172.17.128

    • C.

      172.17

    • D.

      10.172.47

    Correct Answer
    C. 172.17
    Explanation
    The subnet mask 255.255.0.0 tells the router to look for the network portion of the IP address. In this case, the network portion is 172.17. So, the router will look for the network with the IP address 172.17.

    Rate this question:

  • 22. 

    To see how many bits you should borrow from the host portion of the network address to give you the number of subnets that you need, you should?

    • A.

      Subtract the value of subnets that you need from the host portion

    • B.

      Add the bit values from the right to the left until the total (decimal value) is just greatere than the number of subnets that you need

    • C.

      Add the bit values from left to right until the total (decimal value) is just greater thatn the number of subnets that you need

    • D.

      Subtract the number of subnets that you need from the network portion

    Correct Answer
    D. Subtract the number of subnets that you need from the network portion
    Explanation
    To determine how many bits to borrow from the host portion of the network address, you need to subtract the number of subnets that you need from the network portion. This is because the network portion represents the total number of subnets available, and subtracting the desired number of subnets will give you the number of additional bits required. By borrowing these bits from the host portion, you can create the necessary number of subnets.

    Rate this question:

  • 23. 

    How should you power up a Cisco router?

    • A.

      Presst he reset button

    • B.

      Turn the power switch to on

    • C.

      Connect the fiber cable to another router

    • D.

      Attach the power cable plug to the router power supply socket

    Correct Answer
    B. Turn the power switch to on
    Explanation
    To power up a Cisco router, you should turn the power switch to the "on" position. This action will supply the necessary electrical power to the router and allow it to start functioning. Pressing the reset button is not the correct method for powering up the router, as it is mainly used for resetting the device to its default settings. Connecting the fiber cable to another router or attaching the power cable plug to the router power supply socket are also not the appropriate steps for powering up the Cisco router.

    Rate this question:

  • 24. 

    When you start a Cisco router, what shoudl you see on the console?

    • A.

      Cisco IOS software debug messages

    • B.

      The diagnostic console menu

    • C.

      Cisco IOS software output text

    • D.

      A graphical picture showing the real time status of the LED

    Correct Answer
    C. Cisco IOS software output text
    Explanation
    When you start a Cisco router, you should see Cisco IOS software output text on the console. This text typically includes information about the router's boot process, system initialization, and any error or status messages that may be relevant. It provides important information for troubleshooting and monitoring the router's operation.

    Rate this question:

  • 25. 

    What is the primary purpose of setup mode on a Cisco router?

    • A.

      To display the current router config

    • B.

      To complete hardware and interface testing

    • C.

      To bring up a minimal feature config

    • D.

      To fully configure a Cisco router for IP routing

    Correct Answer
    C. To bring up a minimal feature config
    Explanation
    The primary purpose of setup mode on a Cisco router is to bring up a minimal feature config. Setup mode allows users to quickly and easily configure basic settings on the router, such as hostname, IP addresses, and passwords, in order to establish a basic functioning configuration. It is designed to simplify the initial setup process and provide a starting point for further configuration and customization of the router.

    Rate this question:

  • 26. 

    Which statement best describes what the user EXEC mode command allows you to configure on a Cisco router?

    • A.

      You cannot configure anything; the user mode commands are used to display information

    • B.

      The user EXEC mode allows you to perform lgobal config tasks that affect the entire router

    • C.

      The user EXEC mode commands allow you to enter a secret password so that you can configure the router

    • D.

      The user EXEC mode commands allow you to configure interfaces, subinterfaces, lines, and routers

    Correct Answer
    A. You cannot configure anything; the user mode commands are used to display information
    Explanation
    The correct answer states that the user EXEC mode commands do not allow the user to configure anything on a Cisco router. Instead, these commands are used solely to display information.

    Rate this question:

  • 27. 

    Which Cisco IOS software command is used to return user EXEC mode fro the privileged EXEC mode

    • A.

      Exit

    • B.

      Quit

    • C.

      Disable

    • D.

      Userexec

    Correct Answer
    C. Disable
    Explanation
    The "disable" command is used in Cisco IOS software to return from privileged EXEC mode to user EXEC mode. This command terminates the current privileged EXEC session and returns the user to the previous user EXEC mode.

    Rate this question:

  • 28. 

    What information does the show running-config command provide on a Cisco router?

    • A.

      Current (running) configuration in RAM

    • B.

      System hardware and names of configuration files

    • C.

      Amount of NVRAM used to store the configuration

    • D.

      Version of Cisco IOS software running on the router

    Correct Answer
    A. Current (running) configuration in RAM
    Explanation
    The show running-config command provides information about the current (running) configuration in RAM on a Cisco router. It displays the configuration settings that are currently active and being used by the router. This command does not provide information about the system hardware, names of configuration files, amount of NVRAM used, or the version of Cisco IOS software running on the router.

    Rate this question:

  • 29. 

    Which Cisco IOS software command displays the configuration of the system hardware and the software version information?

    • A.

      Show version

    • B.

      Show interfaces

    • C.

      Show startup-config

    • D.

      Show runnning-config

    Correct Answer
    A. Show version
    Explanation
    The "show version" command is used to display the configuration of the system hardware and the software version information on Cisco IOS software. This command provides details such as the IOS version, hardware model, uptime, configuration register, and more. It is commonly used to gather information about the device and verify the software and hardware configurations.

    Rate this question:

  • 30. 

    What happens when you enter a major command on a Cicso router?

    • A.

      The router returns you to user EXEC mode

    • B.

      The router returns a list of possible commands

    • C.

      The router invokes a global config command

    • D.

      The router switches you from one config mode to another

    Correct Answer
    D. The router switches you from one config mode to another
    Explanation
    When you enter a major command on a Cisco router, the router switches you from one configuration mode to another. This means that you are moving from one level of configuration to a higher level, allowing you to make more advanced changes to the router's settings.

    Rate this question:

  • 31. 

    Which Cisco IOS software command creates a message to be displayed upon logging into a router?

    • A.

      Hostname hostname

    • B.

      Banner motd message

    • C.

      Hostname interface description

    • D.

      Description interface description

    Correct Answer
    B. Banner motd message
    Explanation
    The correct answer is "banner motd message". This command is used to create a message of the day (MOTD) that will be displayed to users upon logging into a router. The "banner" command is used to create various types of banners, and "motd" specifies that it is a message of the day banner. The "message" parameter is used to specify the actual message that will be displayed.

    Rate this question:

  • 32. 

    If both enable secret and the enable password commans are configured on your router, how do you get the # prompt?

    • A.

      Enter the enable secret command

    • B.

      Enter the enable password command

    • C.

      Enter either enable secret or enable password commands

    • D.

      Enter both the enable secret and enable password commands

    Correct Answer
    A. Enter the enable secret command
    Explanation
    To get the # prompt when both the enable secret and enable password commands are configured on the router, you need to enter the enable secret command. The enable secret command is a more secure method of authentication compared to the enable password command. It uses a stronger encryption algorithm to protect the password. Therefore, when both commands are configured, the router will prioritize the enable secret command for authentication and grant access to the # prompt.

    Rate this question:

  • 33. 

    Which Cisco IOS software command sets the console session timeout to 15 mins and 30 seconds?

    • A.

      Set exec timeout 15 30

    • B.

      Console timeout 15 30

    • C.

      Timeout 15 30

    • D.

      Exec-timeout 15 30

    Correct Answer
    D. Exec-timeout 15 30
    Explanation
    The correct answer is "exec-timeout 15 30". This command is used to set the console session timeout to 15 minutes and 30 seconds. It specifies the amount of time of inactivity before the console session is terminated.

    Rate this question:

  • 34. 

    Which Cisco IOS software command configures a serial port in slot 0, port 1 on a modular router?

    • A.

      Interface serial 0-0-1

    • B.

      Interface serial 0 0 1

    • C.

      Interface serial 0/0/1

    • D.

      Interface serial 0/0-1

    Correct Answer
    C. Interface serial 0/0/1
    Explanation
    The correct answer is "interface serial 0/0/1". This command configures a serial port in slot 0, port 1 on a modular router. The format "0/0/1" represents the slot number, subslot number, and port number respectively.

    Rate this question:

  • 35. 

    Which Cisco IOS software command sets the clock speed to 64kb/s on a serial interface on a Cisco router?

    • A.

      Clock rate 64

    • B.

      Clock speed 64

    • C.

      Clock rate 64000

    • D.

      Clock speed 64000

    Correct Answer
    C. Clock rate 64000
    Explanation
    The correct answer is "clock rate 64000". In Cisco IOS software, the "clock rate" command is used to set the clock speed on a serial interface. The value specified after the command is in bits per second (bps), so "64000" represents a clock speed of 64kbps.

    Rate this question:

  • 36. 

    A serial interface displays "Serial1 is up, line protocol is down" Which two situations may cause this error?

    • A.

      The clock rate has not been set

    • B.

      The interface has been manually disabled

    • C.

      No cable is attached to the serial interface

    • D.

      There are no keepalives

    • E.

      There is a mismatch in the encapsulation type

    Correct Answer(s)
    D. There are no keepalives
    E. There is a mismatch in the encapsulation type
    Explanation
    The error message "Serial1 is up, line protocol is down" indicates that the physical layer of the serial interface is functioning properly (up), but the data link layer protocol is not established (down). This can be caused by two situations. Firstly, if there are no keepalives, it means that the interface is not receiving regular signals to confirm the connection, resulting in the line protocol being down. Secondly, if there is a mismatch in the encapsulation type between the devices connected to the serial interface, they won't be able to establish a proper data link layer protocol, causing the line protocol to be down.

    Rate this question:

  • 37. 

    Which two of the following are functions of DHCP

    • A.

      DHCP dynamically assigns hostnames to client devices

    • B.

      DHCP dynamically assigns IP addresses to client devices

    • C.

      DHCP dynamically assigns a default gateway to client devices

    • D.

      DHCP dynamically assigns security access level to client devices

    Correct Answer(s)
    B. DHCP dynamically assigns IP addresses to client devices
    C. DHCP dynamically assigns a default gateway to client devices
    Explanation
    DHCP (Dynamic Host Configuration Protocol) is a network protocol that automatically assigns IP addresses and other network configuration settings to client devices. It allows client devices to obtain an IP address and other necessary information from a DHCP server. Therefore, the correct answers are "DHCP dynamically assigns IP addresses to client devices" and "DHCP dynamically assigns a default gateway to client devices".

    Rate this question:

  • 38. 

    Which of the following describes the DHCP server that is provided by Cisco IOS software?

    • A.

      It is a complete DHCP server

    • B.

      Its support is limited to assigning IP addresses to clients

    • C.

      It must obtain its DHCP information from a master DHCP server

    • D.

      It has limited DHCP support and can only assign IP addresses and default gateways to clients

    Correct Answer
    A. It is a complete DHCP server
    Explanation
    The correct answer states that the DHCP server provided by Cisco IOS software is a complete DHCP server. This means that it is capable of performing all the necessary functions of a DHCP server, such as assigning IP addresses, default gateways, DNS servers, and other network configuration parameters to clients. It does not require obtaining DHCP information from a master DHCP server, as it can independently handle all DHCP requests and provide the necessary network settings to clients.

    Rate this question:

  • 39. 

    Which four of the following are required DHCP parameters when configuring a DHCP server using SDM on a Cisco router.

    • A.

      Pool name

    • B.

      Lease time

    • C.

      Domain name

    • D.

      Default router

    • E.

      DNS server address

    • F.

      WINS server address

    • G.

      DHCP network and subnet

    • H.

      Starting and ending addresses

    Correct Answer(s)
    A. Pool name
    B. Lease time
    G. DHCP network and subnet
    H. Starting and ending addresses
    Explanation
    When configuring a DHCP server using SDM on a Cisco router, the following four parameters are required:

    1. Pool name: This is the name given to the DHCP pool, which is a range of IP addresses that the DHCP server can assign to clients.

    2. Lease time: This parameter determines the duration for which a client can use an IP address assigned by the DHCP server before it needs to renew the lease.

    3. DHCP network and subnet: This specifies the network and subnet mask for the DHCP pool. It defines the range of IP addresses that can be assigned to clients.

    4. Starting and ending addresses: These are the first and last IP addresses in the DHCP pool range, respectively. The DHCP server will assign addresses within this range to clients.

    These parameters are essential for configuring a DHCP server and ensuring proper IP address assignment to clients on the network.

    Rate this question:

  • 40. 

    Which command can be used to see if an address in the DHCP pool is already in use by another device?

    • A.

      Sh ip dhcp bindings

    • B.

      Sh ip dhcp database

    • C.

      Sh ip dhcp mapping

    • D.

      Sh ip dhcp conflicts

    Correct Answer
    D. Sh ip dhcp conflicts
    Explanation
    The command "sh ip dhcp conflicts" can be used to see if an address in the DHCP pool is already in use by another device. This command displays any IP addresses that are in conflict, meaning they have been assigned to multiple devices. By using this command, network administrators can identify and resolve address conflicts, ensuring that each device on the network has a unique IP address.

    Rate this question:

  • 41. 

    Which of the following is a Cisco IOS tool that can be used for secure remote access to another device?

    • A.

      SSH

    • B.

      SDM

    • C.

      Ping

    • D.

      Telnet

    • E.

      Traceroute

    Correct Answer
    A. SSH
    Explanation
    SSH (Secure Shell) is a Cisco IOS tool that can be used for secure remote access to another device. It provides encrypted communication between the client and the server, ensuring that data transmitted over the network cannot be intercepted or tampered with by unauthorized individuals. Unlike telnet, which transmits data in plain text, SSH encrypts the data, making it a more secure option for remote access. SDM (Security Device Manager) is a web-based tool used for managing Cisco devices, while ping and traceroute are network troubleshooting tools.

    Rate this question:

  • 42. 

    Which command would you use to see who has Telnet sessions to your router?

    • A.

      Show user

    • B.

      Show telnet

    • C.

      Show sessions

    • D.

      Show connections

    Correct Answer
    A. Show user
    Explanation
    The "show user" command would be used to see who has Telnet sessions to your router. This command provides information about the current users logged into the router, including their usernames, session IDs, and login times. By using this command, you can identify the active Telnet sessions and the users connected to your router.

    Rate this question:

  • 43. 

    What would you use to suspend a Telnet session?

    • A.

      End keyword

    • B.

      Suspend keyword

    • C.

      Ctrl-Shift-6 key sequence

    • D.

      Ctrl-Shift-Del Key sequence

    Correct Answer
    C. Ctrl-Shift-6 key sequence
    Explanation
    To suspend a Telnet session, you would use the Ctrl-Shift-6 key sequence. This key combination allows you to temporarily suspend the Telnet session without closing it completely. This is useful when you need to switch to another task or access a different command prompt while keeping the Telnet session active in the background.

    Rate this question:

  • 44. 

    Which three statements accurately describe WAN's

    • A.

      The companies in which WAN's are implemented usually own the WAN's

    • B.

      WAN's connect devices that are separated by a wide geographical area

    • C.

      WAN's use the services of carries such as telephone companies, cable companies, satellite systems, and network providers

    • D.

      WAN's generally carry limited types of data at high speeds

    • E.

      WAN's use serial connections of various types to provide access to bandwidth

    • F.

      WAN's connect devices that are in small geographic areas

    Correct Answer(s)
    B. WAN's connect devices that are separated by a wide geographical area
    C. WAN's use the services of carries such as telephone companies, cable companies, satellite systems, and network providers
    E. WAN's use serial connections of various types to provide access to bandwidth
    Explanation
    The first statement accurately describes WANs as they are usually owned by the companies in which they are implemented. The second statement is also accurate as WANs connect devices that are separated by a wide geographical area. The third statement is true as WANs utilize the services of carriers such as telephone companies, cable companies, satellite systems, and network providers. However, the last statement is incorrect as WANs do not connect devices that are in small geographic areas. Instead, they connect devices that are separated by a wide geographical area.

    Rate this question:

  • 45. 

    Which two statements accurately describe the difference between LAN's and WAN's?

    • A.

      A WAN transmits data faster than a LAN

    • B.

      A LAN transmits data faster than a WAN

    • C.

      While a LAN connects computers, peripherals, and other devices in a single building or other small geographic area, a WAN transmits data across broad geographic distances

    • D.

      A company or organization usually owns the hardware and software required for WAN's

    • E.

      LAN's span large geographic areas if a LAN administrator configures them correctly

    Correct Answer(s)
    B. A LAN transmits data faster than a WAN
    C. While a LAN connects computers, peripherals, and other devices in a single building or other small geographic area, a WAN transmits data across broad geographic distances
    Explanation
    LANs typically transmit data faster than WANs because they cover a smaller geographic area, allowing for faster transmission speeds. LANs connect devices within a single building or small area, while WANs transmit data across larger distances. Additionally, companies or organizations usually own the hardware and software required for WANs, making them responsible for their maintenance and operation.

    Rate this question:

  • 46. 

    Which three communications needs to do WAN's address?

    • A.

      Workers in a small business need to be able to communicate and sharedata with each other

    • B.

      Admin staff within a school needs to share schedule information with teachers

    • C.

      Organizations often want to share information with other organizations over across large distances

    • D.

      A department needs to share large data files quickly

    • E.

      Students need to do research for classes by accessing library indexes and publications that are located in other parts of their country and in other parts of the world

    • F.

      Workers within a branch of a large company need to share project data with each other

    Correct Answer(s)
    C. Organizations often want to share information with other organizations over across large distances
    D. A department needs to share large data files quickly
    E. Students need to do research for classes by accessing library indexes and publications that are located in other parts of their country and in other parts of the world
    Explanation
    The correct answer is organizations often want to share information with other organizations over across large distances because WANs are designed to connect multiple networks over a large geographical area. A department needs to share large data files quickly because WANs have high bandwidth capabilities that allow for fast data transfer. Students need to do research for classes by accessing library indexes and publications that are located in other parts of their country and in other parts of the world because WANs provide connectivity to remote resources.

    Rate this question:

  • 47. 

    At which OSI level do WAN protocols describe how to provide electrical, mechanical, operational, and functional connections to the services of a communications service provider?

    • A.

      Layer 1

    • B.

      Layer 2

    • C.

      Layer 3

    • D.

      Layer 4

    Correct Answer
    A. Layer 1
    Explanation
    WAN protocols describe how to provide electrical, mechanical, operational, and functional connections to the services of a communications service provider at Layer 1 of the OSI model. Layer 1, also known as the Physical layer, deals with the physical transmission of data over the network. It defines the physical characteristics of the network such as cables, connectors, and signaling. Therefore, it is responsible for describing the physical connections required for WAN protocols to connect to the services of a communications service provider.

    Rate this question:

  • 48. 

    At which OSI lever do WAN protocols define encapsulation of data for transmission toward a remote location and the mechanisms for transferring the resulting frames?

    • A.

      Layer 1

    • B.

      Layer 2

    • C.

      Layer 3

    • D.

      Layer 4

    Correct Answer
    B. Layer 2
    Explanation
    WAN protocols define encapsulation of data for transmission toward a remote location and the mechanisms for transferring the resulting frames at Layer 2 of the OSI model. Layer 2, also known as the Data Link Layer, is responsible for error-free transmission of data frames over the physical network. This layer handles functions such as framing, addressing, and error detection, ensuring reliable communication between devices on the same network or across different networks.

    Rate this question:

  • 49. 

    Which two statements accurately describe data-link protocols in a WAN?

    • A.

      Many data link layer protocols use a framing mechanism similar to HDLC

    • B.

      Data link Layer protocols determine the cable type to be used in the WAN

    • C.

      ICMP is an example of a data link protocol

    • D.

      Data link layer protocols define how data is encapsulated for transmission to remote sites, and also the mechanisms for transferring the resulting frames to establish the connection across the communication line from the sending to the receiving device

    • E.

      RIP is an example of data-link protocol

    Correct Answer(s)
    A. Many data link layer protocols use a framing mechanism similar to HDLC
    D. Data link layer protocols define how data is encapsulated for transmission to remote sites, and also the mechanisms for transferring the resulting frames to establish the connection across the communication line from the sending to the receiving device
    Explanation
    The first statement accurately describes data-link protocols in a WAN by stating that many protocols use a framing mechanism similar to HDLC. This means that these protocols divide data into frames for transmission over the network.

    The second statement also accurately describes data-link protocols by stating that they define how data is encapsulated for transmission to remote sites and the mechanisms for establishing a connection between the sending and receiving devices.

    Both statements provide accurate information about the characteristics and functions of data-link protocols in a WAN.

    Rate this question:

  • 50. 

    Which three statements accurately describe the functions of a packet-switching WAN communications link?

    • A.

      Packet switching is a communications method in which users have a dedicated path between source and destination endpoints

    • B.

      The route that the packets take to reach the destination site will vary

    • C.

      Packet-switched networks send data packets over different routes of a shared public network owned by a carrier to reach the same destination

    • D.

      In a packet-switching network, each customer uses the full bandwidth on its virtual circuit

    • E.

      The PSTN uses packet switching

    • F.

      The cost of a packet-switched network to the customer is generally lower than the cost of point-to-point leased lines

    Correct Answer(s)
    B. The route that the packets take to reach the destination site will vary
    C. Packet-switched networks send data packets over different routes of a shared public network owned by a carrier to reach the same destination
    F. The cost of a packet-switched network to the customer is generally lower than the cost of point-to-point leased lines
    Explanation
    Packet-switching is a method of communication where data is divided into packets and sent over different routes to reach the destination. This allows for more efficient use of network resources and increased flexibility. The fact that the route taken by the packets can vary ensures redundancy and fault tolerance. Packet-switched networks utilize a shared public network owned by a carrier, allowing for cost savings compared to point-to-point leased lines. Therefore, the three statements accurately describe the functions of a packet-switching WAN communications link.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Jul 13, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Feb 08, 2012
    Quiz Created by
    Msmith721
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.