CCNA Practice Certification Exam # 1

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Kapper59
K
Kapper59
Community Contributor
Quizzes Created: 7 | Total Attempts: 2,295
| Attempts: 337 | Questions: 54
Please wait...
Question 1 / 54
0 %
0/100
Score 0/100
1. When is a WLAN a better solution than a LAN?

Explanation

A WLAN (Wireless Local Area Network) is a better solution than a LAN (Local Area Network) when user mobility is needed. Unlike a LAN, which requires wired connections, a WLAN allows users to connect to the network wirelessly, enabling them to move freely within the network coverage area. This is particularly beneficial in environments where users need to access the network while on the move, such as in a large office space or a public area. WLANs provide flexibility and convenience for users, making them a better solution when user mobility is a requirement.

Submit
Please wait...
About This Quiz
CCNA Practice Certification Exam # 1 - Quiz

This CCNA Practice Certification Exam # 1 assesses key skills in networking protocols, TCP\/IP layers, Ethernet LAN congestion factors, and VLAN management on Cisco devices. It's designed to prepare learners for CCNA certification, enhancing their understanding of network infrastructure and operations.

Tell us your name to personalize your report, certificate & get on the leaderboard!
2. Refer to the exhibit. Router B should not send routing updates to router A. Which command can be used on router B to prevent RIP from sending these updates?

Explanation

The correct answer is "passive-interface serial 0/0/0". This command will configure the serial interface 0/0/0 on router B as a passive interface for RIP. A passive interface does not send or receive routing updates. Therefore, by configuring the serial interface as passive, router B will not send routing updates to router A.

Submit
3. Which statement describes the process that occurs in Network Address Translation (NAT) overloading?

Explanation

In Network Address Translation (NAT) overloading, multiple private IP addresses are mapped to one public IP address. This allows multiple devices with private IP addresses to share a single public IP address when communicating with external networks. This process is commonly used in home and small office networks where there are more devices than available public IP addresses. By mapping multiple private IP addresses to one public IP address, NAT overloading helps conserve the limited number of available public IP addresses.

Submit
4. A Catalyst switch must be in which VTP mode in order to delete or add VLANs to a management domain?

Explanation

In order to delete or add VLANs to a management domain on a Catalyst switch, it must be in the "server" mode. In this mode, the switch can create, modify, and delete VLANs and propagate these changes to other switches in the VTP domain. The "client" mode can only receive and synchronize VLAN information from the server, while the "transparent" mode does not participate in VTP updates. The "domain" and "designated" options are not valid VTP modes.

Submit
5. What creates a loop-free path through a switch network? 

Explanation

The Spanning Tree Protocol creates a loop-free path through a switch network. It does this by identifying and disabling redundant links in the network, ensuring that there is only one active path between any two switches. This prevents the formation of loops, which can cause network congestion and broadcast storms. By using a tree-like structure, the Spanning Tree Protocol allows for efficient and reliable communication within the network.

Submit
6. Refer to the exhibit. Which three hosts will receive ARP requests from host A, assuming that port Fa0/4 on both switches is configured to carry traffic for multiple VLANs? (Choose three.)

Explanation

Host A will send ARP requests to hosts C, D, and F because they are connected to the same VLAN as Host A. Host B, E, and G are not on the same VLAN as Host A, so they will not receive ARP requests from Host A.

Submit
7. What is the purpose of the Spanning Tree Protocol (STP)?

Explanation

The purpose of the Spanning Tree Protocol (STP) is to prevent Layer 2 loops. Layer 2 loops can occur in a network when there are redundant links between switches, causing broadcast storms and network congestion. STP helps to eliminate these loops by selecting a single, optimal path for data transmission and blocking the redundant paths. This ensures that there is a loop-free topology in the network, improving its stability and performance.

Submit
8. Refer to the exhibit. VLAN10 and VLAN20 have been created on SW_1 and SW_2 and switch ports have been assigned to the appropriate VLAN. Workstations in VLAN 10 can ping workstations in VLAN 10 that connect to either switch, but workstations in VLAN 20 cannot ping workstations in VLAN 20 on the opposite switch. Based on the output, what is most likely the problem? 

Explanation

The problem is most likely that interfaces FA0/1 on SW_1 and SW_2 need to be configured as trunk ports. Trunk ports are used to carry traffic for multiple VLANs, while access ports are used for individual VLANs. Since workstations in VLAN 20 cannot ping workstations in VLAN 20 on the opposite switch, it suggests that the VLAN traffic is not being properly carried between the switches. By configuring FA0/1 on both switches as trunk ports, the VLAN traffic will be able to pass between the switches, allowing workstations in VLAN 20 to communicate with each other.

Submit
9. Refer to the exhibit. Which command needs to be used on router interface Fa 0/1 to complete the VLAN configuration? 

Explanation

The correct answer is "RT_1(config-subif)# encapsulation dot1q 10". This command is used to configure the VLAN encapsulation on the router interface Fa 0/1. The "dot1q" keyword indicates that the VLAN encapsulation will be using the IEEE 802.1Q standard, and the "10" specifies the VLAN ID that will be associated with this interface.

Submit
10. What type of IP address is 172.16.134.48/27?

Explanation

The IP address 172.16.134.48/27 is a usable host address. The "/27" indicates that the first 27 bits of the IP address are the network portion, leaving the remaining 5 bits for host addresses. This means that there are 32 possible host addresses in this network. The given IP address falls within this range and can be assigned to a device on the network as a usable host address.

Submit
11. A router has learned about network 192.168.168.0 through static and dynamic routing processes. Which route will appear in the routing table for this network if the router has learned multiple routes?

Explanation

The route that will appear in the routing table for the network 192.168.168.0 is the "S" route. This is because the "S" route has the lowest administrative distance of 1, indicating that it is a static route. The other routes have higher administrative distances, indicating that they are learned through dynamic routing processes.

Submit
12. Refer to the exhibit. An initial configuration is being performed on a new router. The network administrator encounters the error message that is shown in the exhibit. What is the problem?

Explanation

The error message "No password set" indicates that a password has not been set for the console port. This means that anyone can access the router's console without authentication, which is a security risk. To resolve this issue, the network administrator should use the password command to set a password for the console port.

Submit
13.

Explanation

not-available-via-ai

Submit
14. Which two keywords can be used in an access control list to replace a wildcard mask or address and wildcard mask pair? (Choose two.)

Explanation

In an access control list, the "host" keyword can be used to replace a wildcard mask or address and wildcard mask pair. This keyword is used to specify a single host or IP address. The "any" keyword can also be used to replace a wildcard mask or address and wildcard mask pair. This keyword is used to match any IP address or host. Both keywords provide flexibility in specifying access control rules without the need for specific addresses or masks.

Submit
15. Which statement is true regarding states of the IEEE 802.1D Spanning Tree Protocol?

Explanation

not-available-via-ai

Submit
16. Wdwd

Explanation

not-available-via-ai

Submit
17. What is the default Layer 2 encapsulation protocol for a synchronous serial interface on a Cisco router? 

Explanation

HDLC (High-Level Data Link Control) is the default Layer 2 encapsulation protocol for a synchronous serial interface on a Cisco router. HDLC is a bit-oriented protocol that provides both connection-oriented and connectionless service options. It is widely used in Cisco networks and is the default encapsulation protocol for synchronous serial interfaces unless otherwise specified. HDLC provides reliable and efficient data transmission over synchronous serial links, making it a suitable choice for Cisco routers.

Submit
18. Refer to the exhibit. A network administrator has configured routers RTA and RTB, but cannot ping from serial interface to serial interface. Which layer of the OSI model is the most likely cause of the problem? 

Explanation

The most likely cause of the problem is the data link layer. The data link layer is responsible for the reliable transmission of data between network devices over a physical link. If the routers cannot ping from serial interface to serial interface, it suggests that there may be an issue with the data link layer, such as a problem with the physical connection or with the data link protocols being used.

Submit
19. A router with two LAN interfaces, two WAN interfaces, and one configured loopback interface is operating with OSPF as its routing protocol. What does the router OSPF process use to assign the router ID?

Explanation

The router OSPF process uses the IP address of the loopback interface to assign the router ID. The loopback interface is a virtual interface that is always up and available, even if the physical interfaces are down. Assigning the router ID based on the loopback interface IP address ensures that the router ID remains stable and does not change even if there are changes in the physical interfaces or their IP addresses.

Submit
20. Which address is a valid IPv6 global unicast address?

Explanation

not-available-via-ai

Submit
21. Refer to the exhibit. What type of Layer 2 encapsulation will be used for connection D on the basis of this configuration on a newly installed router: RtrA(config)# interface serial0/0/0 RtrA(config-if)# ip address 128.107.0.2 255.255.255.252 RtrA(config-if)# no shutdown 

Explanation

Based on the given configuration, HDLC will be used for Layer 2 encapsulation for connection D. The configuration does not mention any specific encapsulation protocol, so the default protocol, which is HDLC, will be used.

Submit
22. . Which industry-wide specification was developed to decrease the time that is needed to move to the forwarding state by switch ports that are operating in a redundantly switched topology? 

Explanation

RSTP (Rapid Spanning Tree Protocol) was developed to decrease the time needed for switch ports to move to the forwarding state in a redundantly switched topology. It improves the convergence time of the spanning tree protocol by reducing the time it takes for a switch to transition from the blocking state to the forwarding state. This helps to minimize network downtime and improve network performance in environments with redundant links.

Submit
23. A router needs to be configured to route within OSPF area 0. Which two commands are required to accomplish this? (Choose two.) 

Explanation

The correct answer is "RouterA(config)# router ospf 1" because this command is used to enable OSPF routing process on the router.

The correct answer is "RouterA(config-router)# network 192.168.2.0 0.0.0.255 area 0" because this command is used to advertise the network 192.168.2.0 with a wildcard mask of 0.0.0.255 into OSPF area 0. This command tells the router to include this network in its OSPF routing table and advertise it to other OSPF routers in the same area.

Submit
24. Refer to the exhibit. All ports on switch fl-1 are in the Production VLAN and all ports on switch fl-2 are in the Development VLAN. How many broadcast domains and how many collision domains are in the network? (Choose two.)

Explanation

The network has three broadcast domains because each VLAN represents a separate broadcast domain. The Production VLAN on switch fl-1 and the Development VLAN on switch fl-2 are two separate broadcast domains, and the third broadcast domain is the default VLAN that exists on both switches.

The network has nine collision domains because each port on a switch represents a separate collision domain. There are a total of nine ports on both switches, so there are nine collision domains in the network.

Submit
25. Refer to the exhibit. What type of header is shown?

Explanation

The type of header shown in the exhibit is IPv6.

Submit
26. Refer to the exhibit and the following error message from the SwA switch. 00:22:43: %SPANTREE-7-RECV_1Q_NON_TRUNK: Received 802.1Q BPDU on non trunk FastEthernet0/1 VLAN1. 00:22:43: %SPANTREE-7-BLOCK_PORT_TYPE: Blocking FastEthernet0/1 on VLAN0001. Inconsistent port type. Considering that the link between the two switches is good and the correct type, what could cause this error message? 

Explanation

The error message indicates that the switch SwA received an 802.1Q BPDU on a non-trunk port, specifically FastEthernet0/1 VLAN1. This suggests that the port on SwA is configured as a trunk port, capable of carrying multiple VLANs, while the port on SwB is configured as an access port, only allowing traffic from a single VLAN. This inconsistency in port configuration is causing the error message to be generated.

Submit
27. Refer to the exhibit. Which switch will be elected the root bridge and which switch will place a port in blocking mode? (Choose two.)

Explanation

SW3 will become the root bridge because it has the lowest bridge ID. SW4 will get a port blocked because it has the second highest bridge ID among the switches.

Submit
28. What table does the EIGRP DUAL algorithm use to calculate the best route to each destination router?

Explanation

The EIGRP DUAL algorithm uses the topology table to calculate the best route to each destination router. The topology table contains information about all the routers in the network and their respective routes. This table is constantly updated with the latest information about network topology changes. The DUAL algorithm uses this information to determine the best path to each destination based on metrics such as bandwidth, delay, reliability, and load. The routing table, on the other hand, is the table that contains the actual routes that will be used for forwarding packets.

Submit
29. Refer to the exhibit. Based on the exhibited configuration and output, why is VLAN 99 missing?  

Explanation

The VLAN 99 is missing because it has not been manually entered into the VLAN database using the "vlan 99" command. This command is necessary to create and activate VLAN 99 on the switch. Without this command, VLAN 99 will not be recognized or available for use.

Submit
30. Refer to the exhibit. Which sequence of commands will configure router A for OSPF?

Explanation

The correct answer is "router ospf 1". This command is used to configure OSPF on router A with process ID 1. The other commands mentioned in the exhibit are either duplicates or incorrect, as they repeat the same command or use incorrect process IDs.

Submit
31. What guideline is generally followed about the placement of extended access control lists?

Explanation

Extended access control lists (ACLs) are used to filter network traffic based on specific criteria. By placing the ACLs as close as possible to the source of the traffic to be denied, network administrators can prevent unnecessary traffic from entering the network, thus improving overall network performance and reducing the load on other network devices. This placement allows for more efficient filtering and reduces the potential for unwanted traffic to consume network resources.

Submit
32. Four bits have been borrowed to create subnets. Which three addresses are subnet addresses? (Choose three.)

Explanation

When four bits are borrowed to create subnets, it means that the subnet mask has been increased by four bits, resulting in a subnet mask of 255.255.255.240. This means that the last four bits of the IP address are used for subnetting. The three addresses that have subnet addresses are the ones where the last four bits are not all zeros or all ones. In this case, the subnet addresses are 192.168.14.16, 192.168.14.32, and 192.168.14.208.

Submit
33. Which wireless standard works only in the 2.4 GHz range and provides speeds up to 54 Mb/s?

Explanation

802.11g is the correct answer because it is the wireless standard that works only in the 2.4 GHz range and provides speeds up to 54 Mb/s. This standard was introduced as an improvement over the 802.11b standard, offering faster speeds while still operating in the same frequency range. It is backward compatible with 802.11b devices, making it a popular choice for home and small office networks.

Submit
34. What are two characteristics of TCP? (Choose two.)  

Explanation

TCP (Transmission Control Protocol) is a reliable transport protocol that ensures data transport reliability by providing mechanisms for error detection, retransmission of lost packets, and flow control. It also establishes, maintains, and terminates virtual circuits between communicating devices, ensuring a reliable and ordered delivery of data. Therefore, the two characteristics of TCP mentioned in the answer are data transport reliability and establishing, maintaining, and terminating virtual circuits.

Submit
35. Refer to the exhibit. What can be concluded from the output that is shown? 

Explanation

The output suggests that the management VLAN for the switch is VLAN 99.

Submit
36. Which three factors contribute to congestion on an Ethernet LAN? (Choose three.) 

Explanation

The three factors that contribute to congestion on an Ethernet LAN are improper placement of enterprise level servers, addition of hosts to a physical segment, and increasing use of bandwidth intensive network applications. Improper placement of servers can lead to congestion as it may result in uneven distribution of network traffic. Adding more hosts to a physical segment without considering the capacity can also cause congestion. Similarly, the use of bandwidth intensive applications can consume a significant amount of network resources, leading to congestion.

Submit
37. Refer to the exhibit. Two VLANs have been configured on the switch and hosts have been assigned. Hosts in the Sales VLAN can ping all hosts in their own VLAN, but cannot ping the hosts in the HR VLAN. What are two explanations for this problem? (Choose two.)  

Explanation

The first explanation for this problem is that a router is required for communication between VLANs. VLANs are designed to separate broadcast domains, and without a router to connect them, communication between VLANs is not possible.
The second explanation is that the hosts are in separate broadcast domains. This is a characteristic of VLANs - they create separate broadcast domains, which means that broadcasts sent by hosts in one VLAN will not be received by hosts in another VLAN.

Submit
38. Refer to the exhibit. The exhibit shows simplified protocol data units from different OSI model layers. Which three statements are true about the PDUs and the encapsulation process? (Choose three.) 

Explanation

The correct answer states that PDU #1 is a frame, PDU #3 is a segment, and the order in which these PDUs are created during the encapsulation process is 3, 4, 1, 2. This means that PDU #1 is created after PDU #4, which is a transport layer PDU, and PDU #3, which is a segment. The order of creation suggests that the encapsulation process starts at the transport layer, then moves to the network layer (PDU #3), followed by the data link layer (PDU #1), and finally the application layer (PDU #2 is not mentioned in the answer).

Submit
39. Refer to the exhibit. Computer A is configured with an IP address of 192.168.20.5 and cannot ping RT_1. What is most likely the problem? 

Explanation

The most likely problem is that the IP address of computer A is incorrect. This is because if the IP address is incorrect, it will not be able to communicate with other devices on the network, such as RT_1. The other options mentioned in the question do not directly relate to the issue of computer A being unable to ping RT_1.

Submit
40. Refer to the exhibit. When the show ip ospf neighbor command is given from the R1# prompt, no output is shown. However, when the show ip interface brief command is given, all interfaces are showing up and up. What is the most likely problem?

Explanation

The most likely problem is that R1 or R2 does not have a network statement for the 172.16.100.0 network. This is indicated by the fact that when the "show ip ospf neighbor" command is given, no output is shown. OSPF neighbors are formed based on the network statements configured on the routers, and if the network statement for the 172.16.100.0 network is missing, OSPF neighbors will not be established. However, the "show ip interface brief" command shows that all interfaces are up and up, indicating that the physical connections are functioning properly.

Submit
41. Refer to the exhibit. The XYZ Company hosts web pages for small companies. Based on the exhibited information, what would be an appropriate route for the ISP to configure for the XYZ network? 

Explanation

The appropriate route for the ISP to configure for the XYZ network would be "ISP# ip route 192.135.250.0 255.255.255.248 s0/0/1". This is because it specifies the correct destination network (192.135.250.0) and subnet mask (255.255.255.248) for the XYZ network, and it specifies the correct outgoing interface (s0/0/1) for forwarding the traffic to the XYZ network.

Submit
42. Which two pieces of information are required when creating a standard access control list? (Choose two.)

Explanation

When creating a standard access control list, two pieces of information are required. The first is the source address and wildcard mask, which determine the specific source IP addresses that will be affected by the access control list. The second is the access list number between 1 and 99, which identifies the access control list itself and allows it to be referenced and applied to the appropriate interfaces or traffic.

Submit
43. A network administrator needs to configure three local networks. The networks have these requirements: Network 1 - 500 hosts Network 2 - 100 hosts Network 3 - 1000 hosts Which three subnet masks will be needed to fulfill these requirements? (Choose three.)

Explanation

The given answer is correct because it includes three subnet masks that can accommodate the specified number of hosts for each network.

- Network 1 requires a subnet mask that can accommodate 500 hosts, so the subnet mask 255.255.254.0 is suitable as it allows for 512 hosts.
- Network 2 requires a subnet mask that can accommodate 100 hosts, so the subnet mask 255.255.252.0 is suitable as it allows for 1024 hosts.
- Network 3 requires a subnet mask that can accommodate 1000 hosts, so the subnet mask 255.255.255.128 is suitable as it allows for 1022 hosts.

Submit
44. Refer to the exhibit. Two switches have been connected with ports that are configured as trunks. After the connection was made, SW2 displayed the status message as shown in the exhibit. What will solve this problem?

Explanation

not-available-via-ai

Submit
45. What best describes the operation of distance vector routing protocols?

Explanation

Distance vector routing protocols, such as RIP (Routing Information Protocol), operate by sending their routing tables to directly connected neighbors. This means that each router shares information about the networks it knows how to reach with its immediate neighbors. By exchanging this information, routers can build a picture of the entire network and determine the best path to reach each network. The hop count, or the number of routers a packet must pass through, is one of the metrics used by distance vector protocols to determine the best path. However, it is not the only metric, as other factors like link speed or network congestion may also be considered.

Submit
46. Which network device is commonly used to allow multiple VPN connections into a corporate network?

Explanation

A concentrator is a network device commonly used to allow multiple VPN connections into a corporate network. It acts as a central point for managing and processing VPN connections, allowing remote users to securely connect to the corporate network over the internet. By using a concentrator, multiple VPN tunnels can be established simultaneously, providing secure access to the corporate network for remote employees, branch offices, or business partners. This helps to ensure data confidentiality, integrity, and privacy while enabling remote access to network resources.

Submit
47. Refer to the exhibit. A named access list called chemistry_block has been written to prevent users on the Chemistry Network and public Internet from access to the Records Server. All other users within the school should have access to this server. The list contains the following statements: deny 172.16.102.0 0.0.0.255 172.16.104.252 0.0.0.0 permit 172.16.0.0 0.0.255.255 172.16.104.252 0.0.0.0 Which command sequence will place this list to meet these requirements?

Explanation

not-available-via-ai

Submit
48. Refer to the exhibit. An administrator who is connected to the console of the Peanut router is able to ping the Serial0 and Ethernet0 ports of the Popcorn router but unable to ping its Ethernet1 interface. What are two possible causes for this problem? (Choose two.)

Explanation

Two possible causes for the problem could be that the Ethernet1 interface of the Popcorn router is shutdown and that the Popcorn router did not include network 192.168.12.0 in its routing configuration. This means that the administrator is unable to ping the Ethernet1 interface because it is not operational, and the Popcorn router is not aware of the network 192.168.12.0, so it cannot forward any traffic to that network.

Submit
49. Refer to the exhibit. R3 has the following configuration: R3# show running-config --some output text omitted-- interface serial0 bandwidth 128 ip address 192.168.11.2 255.255.255.0 encapsulation frame-relay frame-relay map ip 192.168.11.2 30 broadcast After the command R3# debug frame-relay packet is executed, a ping is issued from R3 to R1 but is unsuccessful. Based on the output of the debug command shown in the graphic and the router configuration, what is the problem?

Explanation

The debug output shows that the router is attempting to send the frame-relay packet to the IP address 192.168.11.2, which is its own IP address. This indicates that there is an incorrect IP address in the map statement. The map statement should specify the IP address of the destination router, in this case, R1. Since the IP address is incorrect, the packet is not being sent to the correct destination, resulting in the unsuccessful ping.

Submit
50.  What are three examples of TCP/IP application layer protocols? (Choose three.) 

Explanation

The three examples of TCP/IP application layer protocols are:
1. A terminal emulation protocol that supports remote console connections with various network devices. This protocol allows users to access and control network devices remotely as if they were directly connected to them.
2. A protocol responsible for transporting electronic mail on TCP/IP networks and the Internet. This protocol is used for sending and receiving emails over the network.
3. A protocol that exchanges network management information between a network device and a management console. This protocol is used for monitoring and managing network devices, allowing administrators to configure and troubleshoot them.

Submit
51. What two measures are used to prevent routing loops in networks that use distance vector routing protocols? (Choose two)

Explanation

Split horizon and hold-down timers are two measures used to prevent routing loops in networks that use distance vector routing protocols. Split horizon is a technique where a router does not advertise a route back to the same interface from which it was learned, preventing loops from occurring. Hold-down timers are used to temporarily ignore route updates after a route has been invalidated, preventing incorrect information from being propagated and potential loops from forming. These measures help maintain the stability and efficiency of the routing protocol.

Submit
52.

Explanation

not-available-via-ai

Submit
53. Assuming a subnet mask of 255.255.224.0, which three addresses would be valid host addresses? (Choose three.)

Explanation

not-available-via-ai

Submit
54. What are three Frame Relay congestion management mechanisms? (Choose three.)

Explanation

BECN (Backward Explicit Congestion Notification) and DE (Discard Eligibility) are two Frame Relay congestion management mechanisms. BECN is used by the network to notify the sending device that congestion has been detected, allowing it to slow down its transmission rate. DE is a mechanism that marks certain frames as eligible for discard during periods of congestion, ensuring that less important frames are dropped first. These mechanisms help regulate network traffic and prevent congestion-related issues.

Submit
View My Results

Quiz Review Timeline (Updated): Mar 18, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 18, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Jun 04, 2011
    Quiz Created by
    Kapper59
Cancel
  • All
    All (54)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
When is a WLAN a better solution than a LAN?
Refer to the exhibit. Router B should not send routing updates to...
Which statement describes the process that occurs in Network Address...
A Catalyst switch must be in which VTP mode in order to delete or add...
What creates a loop-free path through a switch network? 
Refer to the exhibit. Which three hosts will receive ARP requests from...
What is the purpose of the Spanning Tree Protocol (STP)?
Refer to the exhibit. VLAN10 and VLAN20 have been created on SW_1 and...
Refer to the exhibit. Which command needs to be used on router...
What type of IP address is 172.16.134.48/27?
A router has learned about network 192.168.168.0 through static and...
Refer to the exhibit. An initial configuration is being performed on a...
Which two keywords can be used in an access control list to replace a...
Which statement is true regarding states of the IEEE 802.1D Spanning...
Wdwd
What is the default Layer 2 encapsulation protocol for a synchronous...
Refer to the exhibit. A network administrator has configured routers...
A router with two LAN interfaces, two WAN interfaces, and one...
Which address is a valid IPv6 global unicast address?
Refer to the exhibit. What type of Layer 2 encapsulation will be used...
. Which industry-wide specification was developed to decrease the time...
A router needs to be configured to route within OSPF area 0. Which two...
Refer to the exhibit. All ports on switch fl-1 are in the Production...
Refer to the exhibit. What type of header is shown?
Refer to the exhibit and the following error message from the SwA...
Refer to the exhibit. Which switch will be elected the root bridge and...
What table does the EIGRP DUAL algorithm use to calculate the best...
Refer to the exhibit. Based on the exhibited configuration and output,...
Refer to the exhibit. Which sequence of commands will configure router...
What guideline is generally followed about the placement of extended...
Four bits have been borrowed to create subnets. Which three addresses...
Which wireless standard works only in the 2.4 GHz range and provides...
What are two characteristics of TCP? (Choose two.)  
Refer to the exhibit. What can be concluded from the output that is...
Which three factors contribute to congestion on an Ethernet LAN?...
Refer to the exhibit. Two VLANs have been configured on the switch and...
Refer to the exhibit. The exhibit shows simplified protocol data units...
Refer to the exhibit. Computer A is configured with an IP address of...
Refer to the exhibit. When the show ip ospf neighbor command is given...
Refer to the exhibit. The XYZ Company hosts web pages for small...
Which two pieces of information are required when creating a standard...
A network administrator needs to configure three local networks. The...
Refer to the exhibit. Two switches have been connected with ports that...
What best describes the operation of distance vector routing...
Which network device is commonly used to allow multiple VPN...
Refer to the exhibit. A named access list called chemistry_block has...
Refer to the exhibit. An administrator who is connected to the console...
Refer to the exhibit. R3 has the following configuration:...
 What are three examples of TCP/IP application layer protocols?...
What two measures are used to prevent routing loops in networks that...
Assuming a subnet mask of 255.255.224.0, which three addresses would...
What are three Frame Relay congestion management mechanisms? (Choose...
Alert!

Advertisement