CCNA Practice Certification Exam #1

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Rodney.butler
R
Rodney.butler
Community Contributor
Quizzes Created: 21 | Total Attempts: 29,077
| Attempts: 1,205 | Questions: 55
Please wait...
Question 1 / 55
0 %
0/100
Score 0/100
1.
Hands on... Reference Only Choose A for Correct Answer...

Explanation

The correct answer is "Choose me" because it is the only option that does not contain derogatory language or insults. The other options use offensive language and insults to discourage the reader from choosing them.

Submit
Please wait...
About This Quiz
CCNA Practice Certification Exam #1 - Quiz

The Cisco Certified Network Associate aims to provide you with all the tools necessary in order to obtain a career in a wide variety of areas, such as... see moreengineering, systems administration and IT managing, among many others. Take this practice certification exam to see how close you are to acquiring such an important certification. see less

2.

This question is for reference....  Choose A for Correct Answer..

Explanation

The correct answer is "Click Me" because it is the only option that does not have any negative connotations or discourages the user from selecting it. The other options explicitly state that the user is a dummy or an extreme dummy if they pick them, which can be seen as insulting or offensive. Therefore, "Click Me" is the most appropriate and neutral choice.

Submit
3. What creates a loop-free path through a switch network?

Explanation

The Spanning Tree Protocol creates a loop-free path through a switch network. It is a network protocol that prevents loops by dynamically selecting the best path for data transmission. It accomplishes this by identifying and blocking redundant paths, ensuring that there is only one active path between any two network devices. This helps to prevent broadcast storms and ensures efficient and reliable communication within the network.

Submit
4. When is a WLAN a better solution than a LAN?

Explanation

A WLAN (Wireless Local Area Network) is a better solution than a LAN (Local Area Network) when user mobility is needed. WLAN allows users to connect to the network and access resources without being physically connected to a wired network. This is beneficial in situations where users need to move around freely while maintaining network connectivity, such as in a large office or a public space.

Submit
5.
Refer to the exhibit. Router B should not send routing updates to router A. Which command can be used on router B to prevent RIP from sending these updates?

Explanation

The "passive-interface serial 0/0/0" command can be used on router B to prevent RIP from sending updates to router A. This command will make the serial 0/0/0 interface on router B passive, meaning it will not send any routing updates. This is useful in scenarios where you want to receive updates from other routers but do not want to send updates on a specific interface.

Submit
6. A Catalyst switch must be in which VTP mode in order to delete or add VLANs to a management domain?

Explanation

In order to delete or add VLANs to a management domain in a Catalyst switch, it must be in server mode. In server mode, the switch can create, modify, and delete VLANs, and the changes will be propagated to other switches in the domain. The server mode is responsible for managing the VLAN database and synchronizing it with other switches.

Submit
7.
Refer to the exhibit. Which three hosts will receive ARP requests from host A, assuming that port Fa0/4 on both switches is configured to carry traffic for multiple VLANs? (Choose three.)

Explanation

Host A will send ARP requests to hosts B, C, and F because they are connected to the same VLAN as Host A. Hosts D and E are connected to different VLANs, so they will not receive ARP requests from Host A.

Submit
8. What is the purpose of the Spanning Tree Protocol (STP)?

Explanation

The purpose of the Spanning Tree Protocol (STP) is to prevent Layer 2 loops. Layer 2 loops can occur in a network when there are multiple paths between switches, causing duplicate frames to be forwarded and resulting in network congestion and broadcast storms. STP helps to eliminate these loops by identifying redundant paths and blocking them, ensuring that there is only one active path between switches at any given time. This helps to maintain network stability and prevent performance issues.

Submit
9.
Refer to the exhibit. Which sequence of commands will configure router A for OSPF?

Explanation

The correct answer is "router ospf 1 network 192.168.10.64 0.0.0.63 area 0 network 192.168.10.192 0.0.0.3 area 0". This is the correct sequence of commands to configure router A for OSPF. It specifies the OSPF process ID as 1 and adds two network statements to include the networks 192.168.10.64/26 and 192.168.10.192/30 in area 0.

Submit
10. Which statement describes the process that occurs in Network Address Translation (NAT) overloading?

Explanation

In Network Address Translation (NAT) overloading, multiple private IP addresses are mapped to one public IP address. This allows multiple devices within a private network to share a single public IP address when communicating with external networks. This process helps conserve public IP addresses and enables more efficient use of available resources.

Submit
11. Which statement is true regarding states of the IEEE 802.1D Spanning Tree Protocol?

Explanation

not-available-via-ai

Submit
12.
Refer to the exhibit. An initial configuration is being performed on a new router. The network administrator encounters the error message that is shown in the exhibit. What is the problem?

Explanation

The problem is that the password command has not been set for the console port. This means that there is no password set to access the console port of the router. Without a password, anyone can gain access to the router through the console port, which is a security risk. The network administrator should set a password for the console port to secure access to the router.

Submit
13.
Refer to the exhibit. VLAN10 and VLAN20 have been created on SW_1 and SW_2 and switch ports have been assigned to the appropriate VLAN. Workstations in VLAN 10 can ping workstations in VLAN 10 that connect to either switch, but workstations in VLAN 20 cannot ping workstations in VLAN 20 on the opposite switch. Based on the output, what is most likely the problem?

Explanation

Based on the information provided, workstations in VLAN 10 can communicate with each other regardless of which switch they are connected to. However, workstations in VLAN 20 cannot communicate with each other across switches. This suggests that there is an issue with the inter-switch connectivity for VLAN 20. To enable communication between VLANs across switches, the interfaces FA0/1 on both SW_1 and SW_2 need to be configured as trunk ports, allowing the transmission of multiple VLANs between the switches.

Submit
14. What type of IP address is 172.16.134.48/27?

Explanation

The IP address 172.16.134.48/27 is a usable host address. The /27 subnet mask indicates that the first 27 bits of the IP address are used to identify the network, leaving the remaining 5 bits for host addresses. This means that there are 32 (2^5) possible host addresses within this network. Therefore, 172.16.134.48 is one of the usable host addresses within this range.

Submit
15.
Refer to the exhibit. Which command needs to be used on router interface Fa 0/1 to complete the VLAN configuration?

Explanation

The correct answer is "RT_1(config-subif)# encapsulation dot1q 10". This command is used to configure the VLAN encapsulation on the router interface Fa 0/1. The "encapsulation dot1q" command is used to enable IEEE 802.1Q encapsulation, and the "10" specifies the VLAN ID. This command is necessary to complete the VLAN configuration on the interface.

Submit
16. A router has learned about network 192.168.168.0 through static and dynamic routing processes. Which route will appear in the routing table for this network if the router has learned multiple routes?

Explanation

The route that will appear in the routing table for network 192.168.168.0 is "S 192.168.168.0/24 [1/0] via 192.168.200.1". This is because the "S" indicates that the route was learned through a static routing process, which takes precedence over dynamic routing processes. The other routes with "D", "O", and "R" indicate dynamic routing processes, but the static route has a lower administrative distance of 1 compared to the others.

Submit
17.
This is for reference. Choose A for Correct Answer...

Explanation

The correct answer is "Don't Choose me..." because it is the only option that explicitly tells the reader not to choose it. The other options either dare the reader to choose them or express confusion, but none of them discourage selection like the correct answer does.

Submit
18. Which two keywords can be used in an access control list to replace a wildcard mask or address and wildcard mask pair? (Choose two.)

Explanation

The keywords "host" and "any" can be used in an access control list to replace a wildcard mask or address and wildcard mask pair. The keyword "host" is used to specify a single host or IP address, while the keyword "any" is used to represent all addresses or any source or destination IP address. These keywords provide flexibility in defining access control rules by allowing specific or general address matching.

Submit
19.
For Reference only.  Based on previous reference questions which answer is correct?

Explanation

not-available-via-ai

Submit
20.
Refer to the exhibit and the following error message from the SwA switch.

00:22:43: %SPANTREE-7-RECV_1Q_NON_TRUNK: Received 802.1Q BPDU on non trunk FastEthernet0/1 VLAN1.
00:22:43: %SPANTREE-7-BLOCK_PORT_TYPE: Blocking FastEthernet0/1 on VLAN0001. Inconsistent port type.

Considering that the link between the two switches is good and the correct type, what could cause this error message?

Explanation

The error message indicates that there is an inconsistency in the port type between SwA and SwB. This means that one switch has its port configured as a trunk port, while the other switch has its port configured as an access port. The Spanning Tree Protocol (STP) is designed to prevent loops in a network, and it requires all ports on the same VLAN to have the same port type. In this case, the error message suggests that the SwA port is configured as a trunk port and the SwB port is configured as an access port, which is causing the inconsistency and triggering the error message.

Submit
21.
Refer to the exhibit. Which switch will be elected the root bridge and which switch will place a port in blocking mode? (Choose two.)

Explanation

SW3 will become the root bridge because it has the lowest bridge ID. SW4 will get a port blocked because it has the highest bridge ID among the switches that are not elected as the root bridge.

Submit
22.
Refer to the exhibit. All ports on switch fl-1 are in the Production VLAN and all ports on switch fl-2 are in the Development VLAN. How many broadcast domains and how many collision domains are in the network? (Choose two.)

Explanation

In this network, there are two switches, fl-1 and fl-2, with all ports on fl-1 in the Production VLAN and all ports on fl-2 in the Development VLAN. Each VLAN represents a separate broadcast domain, so there are two broadcast domains in total.

For collision domains, each port on a switch represents a separate collision domain. Since there are 9 ports on fl-1 and 9 ports on fl-2, there are a total of 9 collision domains in the network.

Submit
23. Which industry-wide specification was developed to decrease the time that is needed to move to the forwarding state by switch ports that are operating in a redundantly switched topology?

Explanation

RSTP (Rapid Spanning Tree Protocol) is an industry-wide specification developed to decrease the time needed to move to the forwarding state by switch ports operating in a redundantly switched topology. RSTP improves the convergence time of the Spanning Tree Protocol (STP) by reducing the amount of time it takes for a switch to transition from blocking to forwarding state. This allows for faster network recovery and improved performance in redundant network topologies. VLSM (Variable Length Subnet Masking), PVST (Per VLAN Spanning Tree), 802.1Q (VLAN Trunking Protocol), and VTP (VLAN Trunking Protocol) are not directly related to decreasing the time to move to the forwarding state in a redundant switched topology.

Submit
24. A router with two LAN interfaces, two WAN interfaces, and one configured loopback interface is operating with OSPF as its routing protocol. What does the router OSPF process use to assign the router ID?

Explanation

The router OSPF process assigns the router ID based on the IP address of the loopback interface. The loopback interface is a logical interface that is always up and has a stable IP address. This makes it a reliable choice for assigning the router ID, as it will not change even if other interfaces go down or their IP addresses change.

Submit
25. What is the default Layer 2 encapsulation protocol for a synchronous serial interface on a Cisco router?

Explanation

The default Layer 2 encapsulation protocol for a synchronous serial interface on a Cisco router is HDLC. HDLC stands for High-Level Data Link Control and is a synchronous data link layer protocol used for point-to-point and multipoint connections. It provides error detection and correction, as well as flow control. HDLC is the default encapsulation protocol because it is simple and efficient, making it suitable for a wide range of network environments.

Submit
26. Which address is a valid IPv6 unicast address?

Explanation

not-available-via-ai

Submit
27. A router needs to be configured to route within OSPF area 0. Which two commands are required to accomplish this? (Choose two.)

Explanation

To configure a router to route within OSPF area 0, the first command "RouterA(config)# router ospf 1" is required to enable OSPF routing process with process ID 1. The second command "RouterA(config-router)# network 192.168.2.0 0.0.0.255 area 0" is required to specify the network and its corresponding area that the router will advertise. This command informs OSPF that the network 192.168.2.0 with a wildcard mask of 0.0.0.255 belongs to area 0.

Submit
28. Which three factors contribute to congestion on an Ethernet LAN? (Choose three.)

Explanation

The three factors that contribute to congestion on an Ethernet LAN are the improper placement of enterprise level servers, the addition of hosts to a physical segment, and the increasing use of bandwidth intensive network applications. These factors can lead to an increase in network traffic and overload the LAN, causing congestion and slowing down the network performance.

Submit
29.
Refer to the exhibit. What can be concluded from the output that is shown?

Explanation

The output shown in the exhibit indicates that the management VLAN is VLAN 99.

Submit
30.
Refer to the exhibit. Computer A is configured with an IP address of 192.168.20.5 and cannot ping RT_1. What is most likely the problem?

Explanation

The most likely problem is that the IP address of computer A is incorrect. This is because the question states that computer A cannot ping RT_1, which suggests a connectivity issue. Since computer A is configured with an IP address of 192.168.20.5, it is possible that this IP address is not in the same network as RT_1, causing the ping to fail.

Submit
31.
Refer to the exhibit. The exhibit shows simplified protocol data units from different OSI model layers. Which three statements are true about the PDUs and the encapsulation process? (Choose three.)

Explanation

The given answer states that PDU #1 is a frame, PDU #3 is a segment, and the order in which these PDUs are created during the encapsulation process is 3, 4, 1, 2. This means that PDU #1 is created after PDU #4, which is a transport layer PDU, and before PDU #2, which is an application layer PDU. Additionally, PDU #3 is created before PDU #1 and PDU #2. Therefore, the correct answer is that PDU #1 is a frame, PDU #3 is a segment, and the order of creation is 3, 4, 1, 2.

Submit
32.
Refer to the exhibit. What type of Layer 2 encapsulation will be used for connection D on the basis of this configuration on a newly installed router:

RtrA(config)# interface serial0/0/0
RtrA(config-if)# ip address 128.107.0.2 255.255.255.252
RtrA(config-if)# no shutdown

Explanation

Based on the given configuration, the type of Layer 2 encapsulation that will be used for connection D is HDLC. This can be inferred from the fact that there is no mention of any other encapsulation protocol being configured, such as PPP or Frame Relay. Therefore, the default encapsulation protocol, which is HDLC, will be used for this connection.

Submit
33.
Refer to the exhibit. A network administrator has configured routers RTA and RTB, but cannot ping from serial interface to serial interface. Which layer of the OSI model is the most likely cause of the problem?

Explanation

The most likely cause of the problem is the data link layer. The data link layer is responsible for the reliable transmission of data between two directly connected nodes. If the routers cannot ping from serial interface to serial interface, it suggests that there may be an issue with the data link layer, such as a misconfiguration or a faulty cable.

Submit
34. Which wireless standard works only in the 2.4 GHz range and provides speeds up to 54 Mb/s?

Explanation

802.11g is the correct answer because it is the wireless standard that works only in the 2.4 GHz range and provides speeds up to 54 Mb/s. 802.11a works in the 5 GHz range, 802.11b also works in the 2.4 GHz range but provides slower speeds, 802.11i is a security standard, and 802.11n works in both the 2.4 GHz and 5 GHz ranges with higher speeds than 802.11g.

Submit
35. What guideline is generally followed about the placement of extended access control lists?

Explanation

Extended access control lists are used to deny or permit specific traffic based on various criteria such as source IP address, destination IP address, and port numbers. By placing the extended access control lists as close as possible to the source of the traffic to be denied, network administrators can prevent unwanted traffic from entering the network at an early stage. This helps in reducing network congestion and improving overall network performance. Placing the extended access control lists closer to the source also allows for more efficient use of network resources by blocking unwanted traffic before it traverses through the network.

Submit
36. Four bits have been borrowed to create subnets. Which three addresses are subnet addresses? (Choose three.)

Explanation

When four bits are borrowed to create subnets, the subnet mask becomes 255.255.255.240. This means that the subnet addresses will have a range of 16, with each subnet having 16 addresses. The three addresses that fall within the subnet ranges are 192.168.14.16, 192.168.14.32, and 192.168.14.208. These are the subnet addresses.

Submit
37. What are three examples of TCP/IP application layer protocols? (Choose three.)

Explanation

Three examples of TCP/IP application layer protocols are a terminal emulation protocol that supports remote console connections with various network devices, a protocol responsible for transporting electronic mail on TCP/IP networks and the Internet, and a protocol that exchanges network management information between a network device and a management console. These protocols are essential for various functions in a TCP/IP network, such as remote console connections, email communication, and network management.

Submit
38. What table does the EIGRP DUAL algorithm use to calculate the best route to each destination router?

Explanation

The EIGRP DUAL algorithm uses the topology table to calculate the best route to each destination router. The topology table contains information about all the available routes and their associated metrics. By analyzing this table, the algorithm determines the most efficient path to reach each destination. The routing table, on the other hand, is the final result of this calculation and contains the selected best routes.

Submit
39. What are two characteristics of TCP? (Choose two.)

Explanation

TCP (Transmission Control Protocol) is a reliable transport protocol that ensures data transport reliability. It guarantees that data sent over a network is received correctly and in the correct order. TCP also establishes, maintains, and terminates virtual circuits, allowing for a reliable and ordered data transfer between two endpoints. These two characteristics make TCP a suitable choice for applications that require guaranteed delivery of data and a reliable connection between devices.

Submit
40.
Refer to the exhibit. Based on the exhibited configuration and output, why is VLAN 99 missing?

Explanation

The VLAN 99 is missing because it has not been manually entered into the VLAN database with the "vlan 99" command. This command is necessary to create and activate VLAN 99 on the switch. Without this command, VLAN 99 will not be recognized or functional on the switch.

Submit
41.
Refer to the exhibit. When the show ip ospf neighbor command is given from the R1# prompt, no output is shown. However, when the show ip interface brief command is given, all interfaces are showing up and up. What is the most likely problem?

Explanation

The most likely problem is that either R1 or R2 does not have a network statement for the 172.16.100.0 network. This means that OSPF is not enabled on the interface connecting to the 172.16.100.0 network, which is why no OSPF neighbors are being displayed when the "show ip ospf neighbor" command is used. However, all interfaces are showing up and up when the "show ip interface brief" command is used, indicating that the physical interfaces are operational.

Submit
42.
Refer to the exhibit. Two VLANs have been configured on the switch and hosts have been assigned. Hosts in the Sales VLAN can ping all hosts in their own VLAN, but cannot ping the hosts in the HR VLAN. What are two explanations for this problem? (Choose two.)

Explanation

The first explanation for the problem is that a router is required for communication between VLANs. VLANs are separate virtual networks and by default, they cannot communicate with each other without a router to route the traffic between them. The second explanation is that the hosts are in separate broadcast domains. Each VLAN is its own broadcast domain, and hosts within a VLAN can communicate with each other using broadcast messages. However, hosts in different VLANs cannot communicate using broadcast messages.

Submit
43.

Explanation

not-available-via-ai

Submit
44. A network administrator needs to configure three local networks. The networks have these requirements:

Network 1 - 500 hosts
Network 2 - 100 hosts
Network 3 - 1000 hosts

Which three subnet masks will be needed to fulfill these requirements? (Choose three.)

Explanation

The subnet masks needed to fulfill the requirements of the three local networks are 255.255.254.0, 255.255.252.0, and 255.255.255.128. These subnet masks provide enough host addresses for each network. The subnet mask 255.255.254.0 can accommodate up to 510 hosts, which satisfies the requirement for Network 1 with 500 hosts. The subnet mask 255.255.252.0 can accommodate up to 1022 hosts, which satisfies the requirement for Network 3 with 1000 hosts. The subnet mask 255.255.255.128 can accommodate up to 126 hosts, which satisfies the requirement for Network 2 with 100 hosts.

Submit
45.
Refer to the exhibit. A named access list called chemistry_block has been written to prevent users on the Chemistry Network and public Internet from access to the Records Server. All other users within the school should have access to this server. The list contains the following statements:

deny 172.16.102.0 0.0.0.255 172.16.104.252 0.0.0.0
permit 172.16.0.0 0.0.255.255 172.16.104.252 0.0.0.0


Which command sequence will place this list to meet these requirements?

Explanation

The correct command sequence to place the named access list "chemistry_block" to meet the given requirements is to apply it to the outbound traffic on the interface fa0/0 of the Athena router using the command "Athena(config)# interface fa0/0
Athena(config-if)# ip access-group chemistry_block out". This will ensure that all users within the school, except those on the Chemistry Network and public Internet, have access to the Records Server.

Submit
46. What two measures are used to prevent routing loops in networks that use distance vector routing protocols? (Choose two.)

Explanation

Split horizon and hold-down timers are two measures used to prevent routing loops in networks that use distance vector routing protocols. Split horizon is a technique where a router does not advertise a route back to the same interface from which it was learned, preventing loops from occurring. Hold-down timers are used to temporarily ignore route updates after a route has been invalidated, allowing time for the network to stabilize and prevent incorrect route information from being propagated.

Submit
47. Which two pieces of information are required when creating a standard access control list? (Choose two.)

Explanation

When creating a standard access control list, two pieces of information are required. The first is the source address and wildcard mask, which specifies the source IP address or range of addresses that the ACL will filter. The second is the access list number between 1 and 99, which identifies the ACL and determines its order of precedence when multiple ACLs are applied.

Submit
48.
Refer to the exhibit. The XYZ Company hosts web pages for small companies. Based on the exhibited information, what would be an appropriate route for the ISP to configure for the XYZ network?

Explanation

The appropriate route for the ISP to configure for the XYZ network would be "ISP# ip route 192.135.250.0 255.255.255.248 s0/0/1". This route specifies that any traffic destined for the network 192.135.250.0/29 should be forwarded out of the s0/0/1 interface. The subnet mask 255.255.255.248 indicates that the network has 6 usable IP addresses, which matches the requirement for the XYZ network.

Submit
49. What best describes the operation of distance vector routing protocols?

Explanation

Distance vector routing protocols, such as RIP (Routing Information Protocol), operate by sending their routing tables to directly connected neighbors. This means that each router in the network communicates with its immediate neighbors to exchange information about network destinations and the number of hops required to reach them. By sharing this information, routers can build a map of the network and determine the best path to forward packets. Unlike link-state protocols, distance vector protocols do not flood the entire network with updates or use hop count as their only metric.

Submit
50. Assuming a subnet mask of 255.255.224.0, which three addresses would be valid host addresses? (Choose three.)

Explanation

not-available-via-ai

Submit
51. Which network device is commonly used to allow multiple VPN connections into a corporate network?

Explanation

A concentrator is commonly used to allow multiple VPN connections into a corporate network. It is a network device that aggregates and manages multiple incoming connections, allowing remote users to securely connect to the corporate network via VPN. The concentrator acts as a central point for authentication, encryption, and routing of VPN traffic, providing a secure and efficient way to handle multiple VPN connections simultaneously.

Submit
52. What are three Frame Relay congestion management mechanisms? (Choose three.)

Explanation

The correct answer is BECN, DE, and FECN. These three options are all Frame Relay congestion management mechanisms. BECN stands for Backward Explicit Congestion Notification, which is a mechanism used by the network to notify the sender that congestion has occurred. DE stands for Discard Eligibility, which is a bit in the Frame Relay header that indicates whether a packet can be discarded during times of congestion. FECN stands for Forward Explicit Congestion Notification, which is a mechanism used by the network to notify the receiver that congestion has occurred.

Submit
53.
Refer to the exhibit. An administrator who is connected to the console of the Peanut router is able to ping the Serial0 and Ethernet0 ports of the Popcorn router but unable to ping its Ethernet1 interface. What are two possible causes for this problem? (Choose two.)

Explanation

Two possible causes for the problem could be that the Ethernet1 interface of the Popcorn router is shutdown and that the Popcorn router did not include the network 192.168.12.0 in its routing configuration.

Submit
54.
Refer to the exhibit. Two switches have been connected with ports that are configured as trunks. After the connection was made, SW2 displayed the status message as shown in the exhibit. What will solve this problem?

Explanation

The problem can be solved by configuring the duplex mode on SW2's interface to be full. This will ensure that the interface on SW2 matches the duplex mode of the interface on SW1, allowing for proper communication between the switches.

Submit
55.
Refer to the exhibit. R3 has the following configuration:

R3# show running-config
--some output text omitted--
interface serial0
bandwidth 128
ip address 192.168.11.2 255.255.255.0
encapsulation frame-relay
frame-relay map ip 192.168.11.2 30 broadcast

After the command R3# debug frame-relay packet is executed, a ping is issued from R3 to R1 but is unsuccessful. Based on the output of the debug command shown in the graphic and the router configuration, what is the problem?

Explanation

The problem is that there is an incorrect IP address in the map statement. This can be inferred from the debug output which shows that the received packet has a destination IP address of 192.168.11.1, but the map statement on R3 is configured with a destination IP address of 192.168.11.2. Therefore, the packet is being sent to the wrong destination and the ping is unsuccessful.

Submit
View My Results

Quiz Review Timeline (Updated): Mar 22, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 22, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • May 15, 2010
    Quiz Created by
    Rodney.butler
Cancel
  • All
    All (55)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
Hands on... Reference Only Choose A for Correct Answer...
This question is for reference....  Choose A for Correct Answer..
What creates a loop-free path through a switch network?
When is a WLAN a better solution than a LAN?
Refer to the exhibit. Router B should not send routing updates to...
A Catalyst switch must be in which VTP mode in order to delete or add...
Refer to the exhibit. Which three hosts will receive ARP requests from...
What is the purpose of the Spanning Tree Protocol (STP)?
Refer to the exhibit. Which sequence of commands will configure router...
Which statement describes the process that occurs in Network Address ...
Which statement is true regarding states of the IEEE 802.1D Spanning ...
Refer to the exhibit. An initial configuration is being performed on a...
Refer to the exhibit. VLAN10 and VLAN20 have been created on SW_1 and...
What type of IP address is 172.16.134.48/27?
Refer to the exhibit. Which command needs to be used on router...
A router has learned about network 192.168.168.0 through static and ...
This is for reference. Choose A for Correct Answer...
Which two keywords can be used in an access control list to replace a...
For Reference only.  Based on previous reference questions which...
Refer to the exhibit and the following error message from the SwA ...
Refer to the exhibit. Which switch will be elected the root bridge and...
Refer to the exhibit. All ports on switch fl-1 are in the Production ...
Which industry-wide specification was developed to decrease the time ...
A router with two LAN interfaces, two WAN interfaces, and one...
What is the default Layer 2 encapsulation protocol for a synchronous ...
Which address is a valid IPv6 unicast address?
A router needs to be configured to route within OSPF area 0. Which two...
Which three factors contribute to congestion on an Ethernet LAN?...
Refer to the exhibit. What can be concluded from the output that is ...
Refer to the exhibit. Computer A is configured with an IP address of ...
Refer to the exhibit. The exhibit shows simplified protocol data units...
Refer to the exhibit. What type of Layer 2 encapsulation will be used...
Refer to the exhibit. A network administrator has configured routers...
Which wireless standard works only in the 2.4 GHz range and provides ...
What guideline is generally followed about the placement of extended ...
Four bits have been borrowed to create subnets. Which three addresses...
What are three examples of TCP/IP application layer protocols? (Choose...
What table does the EIGRP DUAL algorithm use to calculate the best...
What are two characteristics of TCP? (Choose two.)
Refer to the exhibit. Based on the exhibited configuration and output,...
Refer to the exhibit. When the show ip ospf neighbor command is ...
Refer to the exhibit. Two VLANs have been configured on the switch and...
A network administrator needs to configure three local networks. The ...
Refer to the exhibit. A named access list called chemistry_block ...
What two measures are used to prevent routing loops in networks that...
Which two pieces of information are required when creating a standard...
Refer to the exhibit. The XYZ Company hosts web pages for small ...
What best describes the operation of distance vector routing...
Assuming a subnet mask of 255.255.224.0, which three addresses would...
Which network device is commonly used to allow multiple VPN...
What are three Frame Relay congestion management mechanisms? (Choose ...
Refer to the exhibit. An administrator who is connected to the console...
Refer to the exhibit. Two switches have been connected with ports that...
Refer to the exhibit. R3 has the following configuration: ...
Alert!

Advertisement