CCNA – Operation Questions

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Rap
R
Rap
Community Contributor
Quizzes Created: 14 | Total Attempts: 36,011
Questions: 10 | Attempts: 109

SettingsSettingsSettings
CCNA  Operation Questions - Quiz

Questions and Answers
  • 1. 

    Which command would you use on a Cisco router to verify the Layer 3 path to a host?

    • A.

      Traced address

    • B.

      Traceroute address

    • C.

      Telnet address

    • D.

      Ssh address

    Correct Answer
    B. Traceroute address
    Explanation
    To check the connectivity between a host and a destination (through some networks) we can use both “tracert” and “ping” commands. But the difference between these 2 commands is the “tracert” command can display a list of near-side router interfaces in the path between the source and the destination. The “traceroute” command has the same function of the “tracert” command but it is used on Cisco routers only, not on a PC -> B is correct.

    Rate this question:

  • 2. 

    Refer to the exhibit:Which three statements correctly describe Network Device A? (Choose three)

    • A.

      With a network wide mask of 255.255.255.128, each interface does not require an IP address.

    • B.

      With a network wide mask of 255.255.255.128, each interface does require an IP address on a unique IP subnet.

    • C.

      With a network wide mask of 255.255.255.0, must be a Layer 2 device for the PCs to communicate with each other.

    • D.

      With a network wide mask of 255.255.255.0, must be a Layer 3 device for the PCs to communicate with each other.

    • E.

      With a network wide mask of 255.255.254.0, each interface does not require an IP address.

    Correct Answer(s)
    B. With a network wide mask of 255.255.255.128, each interface does require an IP address on a unique IP subnet.
    D. With a network wide mask of 255.255.255.0, must be a Layer 3 device for the PCs to communicate with each other.
    E. With a network wide mask of 255.255.254.0, each interface does not require an IP address.
    Explanation
    The principle here is if the subnet mask makes two IP addresses 10.1.0.36 and 10.1.1.70 in the same subnet then the Network device A does not need to have IP addresses on its interfaces (and we don’t need a Layer 3 device here).

    A quick way to find out the correct answers is notice that all 255.255.255.x subnet masks will separate these two IP addresses into two separate subnets so we need a Layer 3 device here and each interface must require an IP address on a unique IP subnet -> A, C are not correct while B, D are correct.

    With 255.255.254.0 subnet mask, the increment here is 2 in the third octet -> the first subnet is from 10.1.0.0 to 10.1.1.255, in which two above IP addresses belong to -> each interface of Network device A does not require an IP address -> E is correct.

    Rate this question:

  • 3. 

    What are three reasons that an organization with multiple branch offices and roaming users might implement a Cisco VPN solution instead of point-to-point WAN links? (Choose three)

    • A.

      Reduced cost

    • B.

      Better throughput

    • C.

      Broadband incompatibility

    • D.

      Increased security

    • E.

      Scalability

    • F.

      Reduced latency

    Correct Answer(s)
    A. Reduced cost
    D. Increased security
    E. Scalability
    Explanation
    An organization with multiple branch offices and roaming users might implement a Cisco VPN solution instead of point-to-point WAN links for three reasons. Firstly, it can help reduce costs as VPNs utilize existing internet connections rather than requiring dedicated point-to-point links. Secondly, it provides increased security by encrypting data transmitted over the internet, ensuring confidentiality and integrity. Lastly, VPNs offer scalability, allowing the organization to easily add or remove users and branch offices without the need for significant infrastructure changes.

    Rate this question:

  • 4. 

    What two things will a router do when running a distance vector routing protocol? (Choose two)

    • A.

      Send periodic updates regardless of topology changes.

    • B.

      Send entire routing table to all routers in the routing domain.

    • C.

      Use the shortest-path algorithm to the determine best path.

    • D.

      Update the routing table based on updates from their neighbors.

    • E.

      Maintain the topology of the entire network in its database.

    Correct Answer(s)
    A. Send periodic updates regardless of topology changes.
    D. Update the routing table based on updates from their neighbors.
    Explanation
    A router running a distance vector routing protocol will send periodic updates regardless of topology changes to ensure that all routers in the network have the most up-to-date routing information. Additionally, it will update its routing table based on updates received from its neighboring routers, allowing it to make informed decisions about the best path to forward packets.

    Rate this question:

  • 5. 

    What is the purpose of the inverse ARP?

    • A.

      To map a known DLCI to an IP address

    • B.

      To map a known IP address to a MAC address

    • C.

      To map known SPID to a MACaddress

    • D.

      To map a known DLCI to a MAC address

    • E.

      To map a known IP address to a SPID.

    • F.

      To map a known MAC address to an IP address

    Correct Answer
    A. To map a known DLCI to an IP address
    Explanation
    For more information about Inverse ARP, please read my Frame Relay tutorial.

    Rate this question:

  • 6. 

    The network shown in the diagram is experiencing connectivity problems. Which of the following will correct the problems? (Choose two.)

    • A.

      Configure the gateway on Host A as 10.1.1.1.

    • B.

      Configure the gateway on Host B as 10.1.2.254.

    • C.

      Configure the IP address of Host A as 10.1.2.2.

    • D.

      Configure the IP address of Host B as 10.1.2.2.

    • E.

      Configure the masks on both hosts to be 255.255.255.224.

    • F.

      Configure the masks on both hosts to be 255.255.255.240.

    Correct Answer(s)
    B. Configure the gateway on Host B as 10.1.2.254.
    D. Configure the IP address of Host B as 10.1.2.2.
    Explanation
    Configuring the gateway on Host B as 10.1.2.254 will correct the connectivity problems because the gateway is responsible for routing network traffic between different networks. By setting the correct gateway address, Host B will be able to send and receive data from other networks. Additionally, configuring the IP address of Host B as 10.1.2.2 will also help to resolve the connectivity problems as it ensures that Host B has a valid IP address within the same network.

    Rate this question:

  • 7. 

    Refer to the exhibit. For what two reasons has the router loaded its IOS image from the location that is shown? (Choose two)

    • A.

      Router1 has specific boot system command that instruct it to load IOS from TFTP server.

    • B.

      Router1 is acting as a TFTP server for other routers.

    • C.

      Router1 cannot locate a valid IOS image in flash memory.

    • D.

      Router1 defaulted to ROMMON mode and loaded the IOS image from a TFTP server.

    • E.

      Cisco routers will first attempt to load a image from TFTP for management purposes.

    Correct Answer(s)
    A. Router1 has specific boot system command that instruct it to load IOS from TFTP server.
    C. Router1 cannot locate a valid IOS image in flash memory.
    Explanation
    When powered on, the router first checks its hardware via Power-On Self Test (POST). Then it checks the configuration register to identify where to load the IOS image from. In the output above we learn that the Configuration register value is 0×2102 so the router will try to boot the system image from Flash memory first.

    But we also see a line “System image file is “tftp://112.16.1.129/hampton/nitro/c7200-j-mz”. Please notice that this line tells us the image file that the device last started. In this case it is from a TFTP server. Therefore we can deduce that the router could not load the IOS image from the flash and the IOS image has been loaded from TFTP server.

    Note:

    If the startup-config file is missing or does not specify a location, it will check the following locations for the IOS image:

    + Flash (the default location)
    + TFTP server
    + ROM (used if no other source is found)

    Rate this question:

  • 8. 

    Host 1 is trying to communicate with Host 2. The e0 interface on Router C is down. Which of the following are true? (Choose two)

    • A.

      Router C will use ICMP to inform Host 1 that Host 2 cannot be reached.

    • B.

      Router C will use ICMP to inform Router B that Host 2 cannot be reached.

    • C.

      Router C will use ICMP to inform Host 1, Router A, and Router B that Host 2 cannot be reached.

    • D.

      Router C will send a Destination Unreachable message type.

    • E.

      Router C will send a Router Selection message type.

    • F.

      Router C will send a Source Quench message type.

    Correct Answer(s)
    A. Router C will use ICMP to inform Host 1 that Host 2 cannot be reached.
    D. Router C will send a Destination Unreachable message type.
    Explanation
    The last known good router will try to inform you that the destination cannot be reached (with a Destination Unreachable message type) so from that information you can learn how far your packets can travel to and where the problem is.

    Rate this question:

  • 9. 

    How is an EUI-64 format interface ID created from a 48-bit MAC address?

    • A.

      By appending 0xFF to the MAC address.

    • B.

      By prefixing the MAC address with 0xFFEE.

    • C.

      By prefixing the MAC address with 0xFF and appending 0xFF to it.

    • D.

      By inserting 0xFFFE between the upper three bytes and the lower three bytes of the MAC address

    • E.

      By prefixing the MAC address with 0xF and inserting 0xF after each of its first three bytes.

    Correct Answer
    D. By inserting 0xFFFE between the upper three bytes and the lower three bytes of the MAC address
    Explanation
    We convert a 48-bit MAC address (IEEE 802) to a 64-bit value by breaking the MAC address into its two 24-bit halves. The first part is the Organizationally Unique Identifier (OUI) and the next part is the NIC specific part. Then the 16-bit hex value 0xFFFE is inserted between them to create a 64-bit value.Just for your information, to obtain an IPv6 interface identifier from EUI-64 address, we have to complement the U/L bit (the seventh bit of the first byte and is used to determine whether the address is universally or locally administered). This means if it is a 1, it is set to 0; and if it is a 0, it is set to 1. In the above example, the U/L bit is 0 (from 00 = 0000 0000). Therefore we have to set this bit to 1 to create an IPv6 interface address.

    Rate this question:

  • 10. 

    Refer to the exhibit:A network administrator is adding two new hosts to SwitchA. Which three values could be used for the configuration of these hosts? (Choose three)

    • A.

      Host A IP address: 192.168.1.79

    • B.

      Host A IP address: 192.168.1.64

    • C.

      Host A default gateway: 192.168.1.78

    • D.

      Host B IP address: 192.168.1.128

    • E.

      Host B default gateway: 192.168.1.129

    • F.

      Host B IP address: 192.168.1.190

    Correct Answer(s)
    A. Host A IP address: 192.168.1.79
    C. Host A default gateway: 192.168.1.78
    F. Host B IP address: 192.168.1.190
    Explanation
    The correct answer includes three values that could be used for the configuration of the two new hosts. The first value is the IP address for host A, which is 192.168.1.79. The second value is the default gateway for host A, which is 192.168.1.78. The third value is the IP address for host B, which is 192.168.1.190. These values are necessary for the hosts to be able to communicate on the network.

    Rate this question:

Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.