Are You Getting Bored? Take This Quiz On CCNA

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Grahamley
G
Grahamley
Community Contributor
Quizzes Created: 1 | Total Attempts: 99
| Attempts: 99
SettingsSettings
Please wait...
  • 1/112 Questions

    When a host transmits data across a network to another host, which process does the data go through?

    • A. standardization
    • B. conversion
    • C. encapsulation
    • D. synchronization
Please wait...
About This Quiz


Whether you’re working towards the certification right now, you’re wondering if the subject matter is something you’d be interested in or you’re just plain bored and want something to do, this quiz on some of the topics related to the Cisco Certified Network Associate should help you out!

Are You Getting Bored? Take This Quiz On CCNA - Quiz

Quiz Preview

  • 2. 

    What is the first 24 bits in a MAC address called?

    • A. NIC

    • B. BIA

    • C. OUI

    • D. VAI

    Correct Answer
    A. C. OUI
    Explanation
    Organizational Unique Identifier (OUI) is the first 24 bits of a MAC address for a network device, which indicates the specific vendor for that device as assigned by the Institute of Electrical and Electronics Engineers, Incorporated (IEEE). This identifier uniquely identifies a vendor, manufacturer, or an organization.

    Rate this question:

  • 3. 

    Which protocols are found in the network layer of the OSI reference model and are responsible for path determination and traffic switching?

    • A. LAN

    • B. routing

    • C. WAN

    • D. network

    Correct Answer
    A. B. routing
    Explanation
    Routing protocols are responsible for determining the best path for network traffic to reach its destination. They make decisions based on factors such as network congestion, link quality, and available bandwidth. These protocols exchange information with other routers to build a routing table, which is used to direct traffic. Therefore, option B, routing, is the correct answer as it accurately describes the protocols that are responsible for path determination and traffic switching in the network layer of the OSI reference model.

    Rate this question:

  • 4. 

    Refer to the exhibit. PC> tracert 10.16.176.23 Tracing route to 10.16.176.23 over a maximum of 30 hops 1 31 ms 31 ms 32ms 172.16.182.1 2 62 ms 62 ms 62 ms 192.1681.6 3 93 ms 92 ms 34 ms 192.168.1.10 4 125 ms 110ms 125ms 10.16.176.23 Trace complete.   Host A has tested connectivity to a remote network. What is the default gateway for host A?

    • A. 172.16.182.1

    • B. 192.168.1.1

    • C. 10.16.176.1

    • D. 192.168.1.6

    Correct Answer
    A. A. 172.16.182.1
    Explanation
    It will list all the routers (from nearest to farthest) it passes through until it reaches its destination so the first hop is its nearest IP. If we ping from a PC, it is also the default gateway for that PC -> A is correct.

    Rate this question:

  • 5. 

    Which command shows system hardware and software version information?

    • A. show configuration

    • B. show environment

    • C. show inventory

    • D. show platform

    • E. show version

    Correct Answer
    A. E. show version
    Explanation
    The correct answer is E. show version. This command is used to display the hardware and software version information of a system. It provides details such as the operating system version, firmware version, hardware model, and other relevant information. By using this command, users can quickly gather information about the system's configuration and ensure compatibility with software updates or troubleshooting purposes.

    Rate this question:

  • 6. 

    Which command shows your active Telnet connections?

    • A. show sessions

    • B. show cdp neighbors

    • C. show users

    • D. show queue

    Correct Answer
    A. A. show sessions
    Explanation
    The command "show sessions" is used to display the active Telnet connections. This command provides information about the current Telnet sessions that are established on the device. By using this command, users can see details such as the source and destination IP addresses, session duration, and other relevant information about the active Telnet connections.

    Rate this question:

  • 7. 

    When you are logged into a switch, which prompt indicates that you are in privileged mode?

    • A. %

    • B. @

    • C. >

    • D. $

    • E. #

    Correct Answer
    A. E. #
    Explanation
    The “#” (like Switch#) indicates you are in privileged mode while the “>” indicates you are in user mode.

    Note: The “#” sign in “Switch(config)#” indicates this is only accessible at privileged EXEC mode. The “(config)#” part indicates we are in configuration mode.

    Below lists popular modes in Cisco switch/router:

    Router> User EXEC mode
    Router# Privileged EXEC mode
    Router(config)# Configuration mode
    Router(config-if)# Interface level (within configuration mode)
    Router(config-router)# Routing engine level (within configuration mode)
    Router(config-line)# Line level (vty, tty, async) within configuration mode

    Rate this question:

  • 8. 

    Which command is used to copy the configuration from RAM into NVRAM?

    • A. copy running-config startup-config

    • B. copy startup-config: running-config:

    • C. copy running config startup config

    • D. copy startup config running config

    • E. write terminal

    Correct Answer
    A. A. copy running-config startup-config
    Explanation
    The running-config is saved in RAM while the startup-config is saved in NVRAM. So in order to copy the configuration from RAM into NVRAM we use the command “copy running-config startup-config” (syntax: copy ).

    Rate this question:

  • 9. 

    Which type of cable is used to connect the COM port of a host to the COM port of a router or switch?

    • A. crossover

    • B. straight-through

    • C. rolled

    • D. shielded twisted-pair

    Correct Answer
    A. C. rolled
    Explanation
    Explanation

    The correct question should be “Which type of cable is used to connect the COM port of a host to the CONSOLE port of a router or switch?” and the correct answer is rollover cable. But we can’t plug this rollover cable directly into our host because it will not work. We often use a RJ45 to DB9 Female cable converter as shown below:

    Rate this question:

  • 10. 

    A TCP/IP Transfer is diagrammed in the exhibit. A window size of three has been negotiated for this transfer. Which message will be returned from the receiver to the sender as part of this TCP/IP transfer?

    • A. Send ACK 1-3

    • B. Send ACK 3

    • C. Send ACK 4

    • D. Send ACK 4-6

    • E. Send ACK 6

    • F. Send ACK 7

    Correct Answer
    A. C. Send ACK 4
    Explanation
    In response, the receiver replies with an ACK. The acknowledgment number is set to one more than the received sequence number. The ACK means “I have got all messages up to sequence number n-1 so please send me the message for sequence number n”.

    Rate this question:

  • 11. 

    For which type of connection should a straight-through cable be used?

    • A. switch to switch

    • B. switch to hub

    • C. switch to router

    • D. hub to hub

    • E. router to PC

    Correct Answer
    A. C. switch to router
    Explanation
    To specify when we use crossover cable or straight-through cable, we should remember:

    Group 1: Router, Host, Server
    Group 2: Hub, Switch
    One device in group 1 + One device in group 2: use straight-through cable
    Two devices in the same group: use crossover cable

    In this case we can use straight-through cable to connect a switch to a router -> C is correct.

    Rate this question:

  • 12. 

    Refer to the exhibit. A network engineer is troubleshooting an internet connectivity problem on the computer. What causing the problem?

    • A. wrong DNS server

    • B. wrong default gateway

    • C. incorrect IP address

    • D. incorrect subnet mask

    Correct Answer
    A. C. incorrect IP address
    Explanation
    The IP address of the PC (192.168.11.2/24) is not on the same network with its gateway 192.168.1.1 -> C is correct.

    Rate this question:

  • 13. 

    Which line from the output of the show ip interface command indicates a layer 1 problem?

    • A. Serial0/1 is up, line protocol is down

    • B. Serial0/1 is down, line protocol is down

    • C. Serial0/1 is up, line protocol is up

    • D. Serial0/1 is administratively down, line protocol is down

    Correct Answer
    A. B. Serial0/1 is down, line protocol is down
    Explanation
    The line "Serial0/1 is down, line protocol is down" indicates a layer 1 problem because it states that the interface is physically down and the line protocol is also down. Layer 1 problems typically involve physical issues such as cable disconnections or hardware failures, which can cause the interface to be down.

    Rate this question:

  • 14. 

    An administrator attempts a traceroute but receives a “Destination Unreachable” message. Which protocol is responsible for that message?

    • A. RARP

    • B. RUDP

    • C. ICMP

    • D. SNMP

    Correct Answer
    A. C. ICMP
    Explanation
    The ICMP destination unreachable message is generated by a router (which is reachable) to inform the source host that the destination unicast address is unreachable.

    Rate this question:

  • 15. 

    Refer to the exhibit. What type of connection would be supported by the cable diagram shown?

    • A. PC to router

    • B. PC to switch

    • C. server to switch

    • D. switch to router

    Correct Answer
    A. A. PC to router
    Explanation
    Explanation

    This is a crossover cable so it can be used to connect PC and router.

    Rate this question:

  • 16. 

    Refer to the exhibit. A network administrator configures a new router and enters the copy startup-config running-config on the router. The network administrator powers down the router and sets it up at a remote location. When the router starts, it enter the system configuration dialog as shown. What is the cause of the problem? — System Configuration Dialog — Would you like to enter the initial configuration dialog? [yes/no]: % Please answer yes’ or ‘no’. Would you like to enter the initial configuration dialog? [yes/ho]: n Would you like to terminate autoinstall? [yes]: Press RETURN to get started!

    • A. The network administrator failed to save the configuration.

    • B. The configuration register is set to 0×2100.

    • C. The boot system flash command is missing from the configuration.

    • D. The configuration register is set to 0×2102.

    • E. The router is configured with the boot system startup command.

    Correct Answer
    A. A. The network administrator failed to save the configuration.
    Explanation
    The “System Configuration Dialog” appears only when no startup configuration file is found. The network administrator has made a mistake because the command “copy startup-config running-config” will copy the startup config (which is empty) over the running config (which is configured by the administrator). So everything configured was deleted.

    Note: We can tell the router to ignore the start-up configuration on the next reload by setting the register to 0×2142. This will make the “System Configuration Dialog” appear at the next reload.

    Rate this question:

  • 17. 

    How does using the service password encryption command on a router provide additional security?

    • A. by encrypting all passwords passing through the router

    • B. by encrypting passwords in the plain text configuration file

    • C. by requiring entry of encrypted passwords for access to the device

    • D. by configuring an MD5 encrypted key to be used by routing protocols to validate routing exchanges

    • E. by automatically suggesting encrypted passwords for use in configuring the router

    Correct Answer
    A. B. by encrypting passwords in the plain text configuration file
    Explanation
    By using this command, all the (current and future) passwords are encrypted. This command is primarily useful for keeping unauthorized individuals from viewing your password in your configuration file.

    Rate this question:

  • 18. 

    Refer to the exhibit. What can be determined about the router from the console output?

    • A. No configuration file was found in NVRAM.

    • B. No configuration file was found in flash.

    • C. No configuration file was found in the PCMCIA card.

    • D. Configuration file is normal and will load in 15 seconds.

    Correct Answer
    A. A. No configuration file was found in NVRAM.
    Explanation
    When no startup configuration file is found in NVRAM, the System Configuration Dialog will appear to ask if we want to enter the initial configuration dialog or not.

    Rate this question:

  • 19. 

    Which layer of the OSI reference model uses flow control, sequencing, and acknowledgments to ensure that reliable networking occurs?

    • A. data link

    • B. network

    • C. transport

    • D. presentation

    • E. physical

    Correct Answer
    A. C. transport
    Explanation
    The transport layer of the OSI reference model is responsible for ensuring reliable networking by implementing flow control, sequencing, and acknowledgments. Flow control regulates the flow of data between the sender and receiver to prevent overwhelming the receiver. Sequencing ensures that data packets are received and delivered in the correct order. Acknowledgments are used to confirm the successful delivery of data packets and request retransmission if necessary. Therefore, the transport layer is the correct answer for this question.

    Rate this question:

  • 20. 

    A network administrator is verifying the configuration of a newly installed host by establishing an FTP connection to a remote server. What is the highest layer of the protocol stack that the network administrator is using for this operation?

    • A. application

    • B. presentation

    • C. session

    • D. transport

    • E. internet

    • F. data link

    Correct Answer
    A. A. application
    Explanation
    FTP belongs to Application layer and it is also the highest layer of the OSI model.

    Rate this question:

  • 21. 

    A network admin wants to know every hop the packets take when he accesses cisco.com. Which command is the most appropriate to use?

    • A. path cisco.com

    • B. debugcisco.com

    • C. trace cisco.com

    • D. traceroute cisco.com

    Correct Answer
    A. D. traceroute cisco.com
    Explanation
    The correct command to use in this scenario is D. traceroute cisco.com. The traceroute command is used to track the route that packets take from the source to the destination. By using this command with the destination address "cisco.com", the network admin will be able to see every hop or router that the packets pass through on their way to the cisco.com server. This can be helpful in troubleshooting network connectivity issues and identifying any potential bottlenecks or delays in the network.

    Rate this question:

  • 22. 

    Which command can you use to determine the cisco ios feature set on a cisco router?

    • A. show version

    • B. dir flash:include ios

    • C. show environment

    • D. show diag

    • E. show inventory

    Correct Answer
    A. A. show version
    Explanation
    The correct answer is A. show version.
    The "show version" command can be used to determine the Cisco IOS feature set on a Cisco router. This command provides detailed information about the router's hardware and software, including the IOS version, feature set, and license information. By using the "show version" command, network administrators can quickly verify the installed IOS feature set and ensure that the router has the necessary features and capabilities for their network requirements.

    Rate this question:

  • 23. 

    A host is attempting to send data to another host on a different network. What is the first action that the sending host will take?

    • A. Drop the data.

    • B. Send the data frames to the default gateway

    • C. Create an ARP request to get a MAC address for the receiving host.

    • D. Send a TCP SYN and wait for the SYN ACK with the IP address of the receiving host.

    Correct Answer
    A. B. Send the data frames to the default gateway
    Explanation
    Before sending data, the sending host checks if the destination host is inside or outside the local network. If it is outside the local network, the data will be sent to the default gateway.

    Rate this question:

  • 24. 

    Refer to the exhibit. Two buildings on the San Jose campus of a small company must be connected to use Ethernet with a bandwidth of at least 100 Mbps. The company is concerned about possible problems from voltage potential difference between the two buildings. Which media type should be used for the connection?

    • A. UTP cable

    • B. STP cable

    • C. Coaxial cable

    • D. Fiber optic cable

    Correct Answer
    A. D. Fiber optic cable
    Explanation
    Because the company has problem about voltage potential difference between the two buildings so they should connect via fiber optic cable which uses light pulses to transmit information instead of using electronic pulses.

    Rate this question:

  • 25. 

    Which command is used to load a configuration from a TFTP server and merge the configuration into RAM?

    • A. copy running-config: TFTP:

    • B. copy TFTP: running-config

    • C. copy TFTP: startup-config

    • D. copy startup-config: TFTP:

    Correct Answer
    A. B. copy TFTP: running-config
    Explanation
    The syntax of the copy command is “copy ” so to copy a configuration from a TFTP server into RAM we use the command “copy TFTP: running-config”

    Rate this question:

  • 26. 

    Which layer of the OSI reference model uses the hardware address of a device to ensure message delivery to the proper host on a LAN?

    • A. physical

    • B. data link

    • C. network

    • D. transport

    Correct Answer
    A. B. data link
    Explanation
    The hardware address of a device or the Media Access Control (MAC) address is added in the Data Link layer. An Ethernet MAC address is a 48-bit binary value expressed as 12 hexadecimal digits (for example: 00:15:A4:CB:03:CA).

    Rate this question:

  • 27. 

    Which command displays CPU utilization?

    • A. show protocols

    • B. show process

    • C. show system

    • D. show version

    Correct Answer
    A. B. show process
    Explanation
    The “show process” (in fact, the full command is “show processes”) command gives us lots of information about each process but in fact it is not easy to read. Below shows the output of this command (some next pages are omitted)


    A more friendly way to check the CPU utilization is the command “show processes cpu history”, in which the total CPU usage on the router over a period of time

    Rate this question:

  • 28. 

    A system administrator types the command to change the hostname of a router. Where on the Cisco IFS is that change stored?

    • A. NVRAM

    • B. RAM

    • C. FLASH

    • D. ROM

    • E. PCMCIA

    Correct Answer
    A. B. RAM
    Explanation
    The change is only reflected in the running-config on RAM. It can be lost if we reset the router without saving it.

    Note: Cisco IFS means “Cisco IOS File System”

    Rate this question:

  • 29. 

    Acknowledgement, Sequencing, and Flow control are characteristics of which OSI layer?

    • A. Layer 2

    • B. Layer 3

    • C. Layer 4

    • D. Layer 5

    • E. Layer 6

    • F. Layer 7

    Correct Answer
    A. C. Layer 4
    Explanation
    At Layer 4, the data is encapsulated as either a TCP or UDP segment. The choice depends on what application generated the data. Source and destination port numbers are added, as are sequence and acknowledgment numbers and window size.

    Rate this question:

  • 30. 

    What is the purpose using the traceroute command?

    • A. to map all the devices on a network.

    • B. to display the current TCP/IP configuration values.

    • C. to see how a device MAC address is mapped to its IP address.

    • D. to see the path a packet will take when traveling to a specified destination.

    • E. to display the MTU values for each router in a specified network path from source to a destination.

    Correct Answer
    A. D. to see the path a packet will take when traveling to a specified destination.
    Explanation
    The purpose of using the traceroute command is to see the path a packet will take when traveling to a specified destination. Traceroute sends out a series of packets with increasing TTL (Time to Live) values, and each router along the path sends back an ICMP Time Exceeded message. By analyzing the source IP addresses of these messages, traceroute can determine the path taken by the packets and display it to the user. This helps in troubleshooting network connectivity issues and identifying any bottlenecks or delays in the network.

    Rate this question:

  • 31. 

    How many broadcast domains are shown in the graphic assuming only the default vlan is configured on the switches?

    • A. one

    • B. six

    • C. twelve

    • D. two

    Correct Answer
    A. A. one
    Explanation
    Only router can break up broadcast domains but in this exhibit no router is used so there is only 1 broadcast domain.

    For your information, there are 7 collision domains in this exhibit (6 collision domains between hubs & switches + 1 collision between the two switches).

    Rate this question:

  • 32. 

    Refer to the exhibit. If number 2 is selected from the setup script, what happens when the user runs setup from a privileged prompt? [0] Go to the IOS command prompt without saving this config. [1] Return back to the setup without saving this config. [2] Save this configuration to nvram and exit. Enter your selection [2]:

    • A. Setup is additive and any changes will be added to the config script.

    • B. Setup effectively starts the configuration over as if the router was booted for the first time.

    • C. Setup will not run if an enable secret password exists on the router.

    • D. Setup will not run, because it is only viable when no configuration exists on the router.

    Correct Answer
    A. A. Setup is additive and any changes will be added to the config script.
    Explanation
    When the user selects option 2 and runs setup from a privileged prompt, the setup process will save the configuration to nvram and exit. This means that any changes made during the setup process will be added to the existing configuration script. This option indicates that the setup is additive and does not start the configuration over from scratch. Therefore, the correct answer is A.

    Rate this question:

  • 33. 

    There are no boot system commands in a router configuration in NVRAM. What is the fallback sequence that router will use to find an IOS during reload?

    • A. Flash, TFTP server, ROM

    • B. Flash, NVRAM, ROM

    • C. ROM, NVRAM, TFTP server

    • D. NVRAM, TFTP server, ROM

    • E. TFTP server, Flash, NVRAM

    Correct Answer
    A. A. Flash, TFTP server, ROM
    Explanation
    When you turn the router on, it runs through the following boot process.

    The Power-On Self Test (POST) checks the router’s hardware. When the POST completes successfully, the System OK LED indicator comes on.
    The router checks the configuration register to identify where to load the IOS image from. A setting of 0×2102 means that the router will use information in the startup-config file to locate the IOS image. If the startup-config file is missing or does not specify a location, it will check the following locations for the IOS image:

    1. Flash (the default location)
    2. TFTP server
    3. ROM (used if no other source is found)

    The router loads the configuration file into RAM (which configures the router). The router can load a configuration file from:

    + NVRAM (startup-configuration file)
    + TFTP server
    If a configuration file is not found, the router starts in setup mode.

    Rate this question:

  • 34. 

    Where does routing occur within the DoD TCP/IP reference model?

    • A. application

    • B. internet

    • C. network

    • D. transport

    Correct Answer
    A. B. internet
    Explanation
    The picture below shows the comparison between TCP/IP model & OSI model. Notice that the Internet Layer of TCP/IP is equivalent to the Network Layer which is responsible for the routing decision
    .

    Rate this question:

  • 35. 

    The network administrator normally establishes a Telnet session with the switch from host A. The administrator’s attempt to establish a connect via Telnet to the switch from host B fails, but pings from host B to other two hosts are successful. What is the issue for this problem?

    • A. Host B and the switch need to be in the same subnet.

    • B. The switch needs an appropriate default gateway assigned.

    • C. The switch interface connected to the router is down.

    • D. Host B need to be assigned an IP address in vlan 1.

    Correct Answer
    A. B. The switch needs an appropriate default gateway assigned.
    Explanation
    Host A (172.19.1.1) and the management IP address of the Switch (172.19.1.250) are in the same subnet so telnet from host A to the switch can be successful even if a default gateway is not set on host A.

    But host B (172.19.32.2) and the management IP address of the Switch (172.19.1.250) are not in the same subnet so host B needs a default gateway to telnet to the switch. The default gateway on host B should be 172.19.32.254.

    Rate this question:

  • 36. 

    DNS servers provide what service?

    • A. They run a spell check on host names to ensure accurate routing

    • B. They convert domain names into IP address

    • C. Given an IP address.they determine the name of the host that is sought

    • D. They map individual hosts to their specific IP addresses

    Correct Answer
    A. B. They convert domain names into IP address
    Explanation
    For example, when you open a web browser (IE, Firefox…) and type a domain (like google.com). This domain will be sent to a DNS server. The DNS server looks up this domain in its database and sends back a corresponding IP address which you can use to access that website.

    Note: A DNS server can be a dedicated device for DNS service or integrated into a networking device (like router).

    Rate this question:

  • 37. 

    Which two benefits are provided by using a hierarchical addressing network addressing scheme? (Choose two)

    • A. reduces routing table entries

    • B. auto-negotiation of media rates

    • C. efficient utilization of MAC addresses

    • D. dedicated communications between devices

    • E. ease of management and troubleshooting

    Correct Answer(s)
    A. A. reduces routing table entries
    A. E. ease of management and troubleshooting
    Explanation
    A hierarchical addressing network addressing scheme provides two benefits. Firstly, it reduces routing table entries, which means that the routing tables in network devices will be smaller and more efficient. This helps in improving the overall performance and scalability of the network. Secondly, it offers ease of management and troubleshooting. With a hierarchical addressing scheme, network administrators can easily organize and manage the network by dividing it into smaller subnets. This makes it simpler to troubleshoot network issues and locate the source of problems.

    Rate this question:

  • 38. 

    Refer to the diagram. What is the largest configuration file that can be stored on this router? R# show version Cisco IOS Software. 1841 Software (C1841-IPBASE-M}, Version 12.4(1a), RELEASE SOFTWARE (fc2) Technical Support: http://www.cisco.com/techsupport  Copyright (c) 1986*2005 by Cisco Systems, Inc. Compiled Fri 27-May-0512:32 by hqluong ROM: System Bootstrap. Version 12.3(8r)T8, RELEASE SOFTWARE (fc1) N-East uptime is 5 days, 49 minutes System returned to ROM by reload at 15:17:00 UTC Thu Jun 8 2006  System image file is “flash:c1841-ipbase-mz.124-1a.bin” Cisco 1841 (revision 5.0) with 114688K/16384K bytes of memory. Processor board ID FTX0932W21Y 2 FastEthernet interfaces 2 Low-speed serial(sync/async) interfaces DRAM configuration is 64 bits wide with parity disabled. 191K bytes of NVRAM. 31360K bytes of ATA CompactFlash (Read/Write) Configuration register Is 0×2102 R#

    • A. 191K bytes

    • B. 16384K bytes

    • C. 31369K bytes

    • D. 114688K bytes

    Correct Answer
    A. A. 191K bytes
    Explanation
    Non-volatile RAM (NVRAM) holds the router’s startup configuration file. NVRAM contents are not lost when the router is powered down or reloaded.

    Rate this question:

  • 39. 

    Which of the following protocols uses both TCP and UDP ports?

    • A. SMTP

    • B. Telnet

    • C. FTP

    • D. DNS

    Correct Answer
    A. D. DNS
    Explanation
    DNS can use either the User Datagram Protocol (UDP) or Transmission Control Protocol (TCP) with a destination port of 53.

    Note:

    +Simple Mail Transfer Protocol (SMTP) is specified for mail transport and uses TCP port 25.
    + Telnet uses TCP on port 23.
    + File Transfer Protocol (FTP) uses TCP on port 20, 21.
    + Trivial File Transfer Protocol (TFTP) uses UDP on port 69.
    + HTTP Secure (HTTPS) uses TCP on port 443.

    Rate this question:

  • 40. 

    Which protocol should be used to establish a secure terminal connection to a remote network device?

    • A. ARP

    • B. SSH

    • C. Telnet

    • D. WEP

    • E. SNMPv1

    • F. SNMPv2

    Correct Answer
    A. B. SSH
    Explanation
    Secure Shell (SSH) protocols secure terminal session data across insecure environments such as the internet.

    Rate this question:

  • 41. 

    A Cisco router is booting and has just completed the POST process.It is now ready to find and load an IOS image. What function does the router perform next?

    • A. It checks the configuration register

    • B. It attempts to boot from a TFTP server

    • C. It loads the first image file in flash memory

    • D. It inspects the configuration file in NVRAM for boot instructions

    Correct Answer
    A. A. It checks the configuration register
    Explanation
    After completing the POST process, a Cisco router will perform the next function by checking the configuration register. The configuration register is a 16-bit value that determines how the router will boot up. It specifies various options such as boot source, console speed, and whether to ignore the startup configuration. By checking the configuration register, the router can determine the boot settings and proceed accordingly.

    Rate this question:

  • 42. 

    Refer to the exhibit. Why is flash memory erased prior to upgrading the IOS image from the TFTP server? Router# copy tftp flash Address or name of remote host []? 192.168.2.167  Source filename []? c1600-k8sy-mz.123-16a.bin  Destination filename [c1600-k8sy-mz.123-16a.bin]? Accessing tftp://192.168.2.167/ c1600-k8sy-mz.l23-16a.bin… Erasing flash before copying? [confirm] Erasing the flash filesystem will remove all files! continue? [confirm]  Erasing device  Eeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeee  Eeeeeeeeeeeeeeeeeeeeeeeeeeeeeee …erased  Erase of flash: complete Loading c1600-k8sy-mz.l23-16a.bin from 192.168.2.167 (via Ethernet0): !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! [OK - 6888962/13777920 bytes] verifying checksum… OK (0x7BF3) 6888962 bytes copied in 209.920 secs (32961 bytes/sec) Router#

    • A. The router cannot verify that the Cisco IOS image currently in flash is valid

    • B. Flash memory on Cisco routers can contain only a single IOS image.

    • C. Erasing current flash content is requested during the copy dialog.

    • D. In order for the router to use the new image as the default, it must be the only IOS image in flash.

    Correct Answer
    A. C. Erasing current flash content is requested during the copy dialog.
    Explanation
    During the copy process, the router asked “Erasing flash before copying? [confirm]” and the administrator confirmed (by pressing Enter) so the flash was deleted.

    Note: In this case, the flash has enough space to copy a new IOS without deleting the current one. The current IOS is deleted just because the administrator wants to do so. If the flash does not have enough space you will see an error message like this:

    %Error copying tftp://192.168.2.167/ c1600-k8sy-mz.l23-16a.bin (Not enough space on device)

    Rate this question:

  • 43. 

    Refer to the exhibit. A router boots to the prompt shown in the exhibit. What does this signify, and how should the network administrator respond?  rommon 1>  

    • A. This prompt signifies that the configuration file was not found in NVRAM. The network administrator should follow the prompts to enter a basic configuration.

    • B. The prompt signifies that the configuration file was not found in flash memory. The network administrator should use TFTP to transfer a configuration file to the router.

    • C. The prompt signifies that the IOS image in flash memory is invalid or corrupted. The network administrator should use TFTP to transfer an IOS image to the router.

    • D. The prompt signifies that the router could not authenticate the user. The network administrator should modify the IOS image and reboot the router.

    Correct Answer
    A. C. The prompt signifies that the IOS image in flash memory is invalid or corrupted. The network administrator should use TFTP to transfer an IOS image to the router.
    Explanation
    If a Cisco router boots in ROMmon mode, it means:

    + The value of the configuration register is set to XXX0 (the boot field – fourth bit – is 0)
    + The router is unable to locate a valid Cisco IOS software image (you can use the “dir flash:” command in ROMmon mode to look for the IOS in the Flash then try to boot that flash with the “boot flash:” command).

    If the IOS image is invalid or corrupted, the fastest way to re-install a new Cisco IOS software image on the router is to copy a new one from TFTP (with “tftpdnld” command).

    Rate this question:

  • 44. 

    What are two characteristics of Telnet? (Choose two)

    • A. It sends data in clear text format.

    • B. It is no longer supported on Cisco network devices.

    • C. It is more secure than SSH.

    • D. It requires an enterprise license in order to be implemented.

    • E. It requires that the destination device be configured to support Telnet connections.

    Correct Answer(s)
    A. A. It sends data in clear text format.
    A. E. It requires that the destination device be configured to support Telnet connections.
    Explanation
    Telnet, part of the TCP/IP protocol suite, is a virtual terminal protocol that allows you to make connections to remote devices, gather information, and run programs. Telnet is considered insecure because it transfers all data in clear text -> A is correct.

    The destination device needs to support Telnet connection. For example, if a device doesn’t support TCP/IP protocol suit then maybe we can’t telnet to it.

    Rate this question:

  • 45. 

    Refer to the exhibit. Why would the network administrator configure RA in this manner?

    • A. to give students access to the Internet

    • B. to prevent students from accessing the command prompt of RA

    • C. to prevent administrators from accessing the console of RA

    • D. to give administrators access to the Internet

    • E. to prevent students from accessing the Internet

    • F. to prevent students from accessing the Admin network

    Correct Answer
    A. B. to prevent students from accessing the command prompt of RA
    Explanation
    Although the access-list is used to “permit” network 10.1.1.0/24 but the best answer here is “to prevent students from accessing the command prompt of RA”. From the picture above, we know that 10.1.1.0/24 is the “Admin” network. This access list is applied to “line vty 0 4″ so it will permit only Telnet traffic from “Admin” to RA while drop all other traffic (because of the implicit “deny all” command at the end of the access list). Therefore we can deduce that it will “prevent students from accessing the command prompt of RA”.

    This access list only filters Telnet traffic (because it is applied to vty line) so it will not prevent or allow anyone to access the Internet -> A, D, E are not correct.

    C is not correct as this access list allows administrators to access the console of RA.

    F is not correct as this access list does not proceed TCP, UDP or IP traffic so the students still access the Admin network.

    (Notice that the “command prompt” here implies telnet as telnet is the only way to remotely access RA)

    Rate this question:

  • 46. 

    Which command reveals the last method used to powercycle a router?

    • A. show reload

    • B. show boot

    • C. show running-config

    • D. show version

    Correct Answer
    A. D. show version
    Explanation
    The “show version” command can be used to show the last method to powercycle (reset) a router

    Rate this question:

  • 47. 

    A network administrator changes the configuration register to 0×2142 and reboots the router. What are two results of making this change? (Choose two)

    • A. The IOS image will be ignored.

    • B. The router will prompt to enter initial configuration mode.

    • C. The router will boot to ROM.

    • D. Any configuration entries in NVRAM will be ignored.

    • E. The configuration in flash memory will be booted.

    Correct Answer(s)
    A. B. The router will prompt to enter initial configuration mode.
    A. D. Any configuration entries in NVRAM will be ignored.
    Explanation
    The router bypasses the startup configuration stored in NVRAM during its boot sequence so the router will enter initial configuration mode. This feature is normally used during a password recovery procedure.

    Rate this question:

  • 48. 

    Refer to the exhibit. Host A pings Host B. What source MAC address and source IP address are contained in the frame as the frame leaves R2 destined for host B?

    • A. abcd.abcd.a001

    • B. abcd.abcd.b002

    • C. abcd.abcd.c003

    • D. 10.2.0.15

    • E. 10.0.64.1

    • F. 10.0.128.15

    Correct Answer(s)
    A. B. abcd.abcd.b002
    A. D. 10.2.0.15
    Explanation
    When packets are sent from Host A to Host B, the source and destination IP addresses are never changed and they are the IP addresses of Host A & Host B. Only the MAC addresses will be changed to reflect the device of the current network. In this case, when the frame leaves R2 destined for host B. It will have:

    + Source IP: IP of Host A - 10.2.0.15 (never changed)
    + Destination IP: IP of Host B – 10.0.128.15 (never changed)
    + Source MAC: MAC of Fa0/0 of R2 – abcd.abcd.b002
    + Destination MAC: MAC of Host B – abcd.abcd.d004

    Rate this question:

  • 49. 

    Refer to the exhibit. What can be determined from the output?

    • A. 192.168.1.2 is local to the router.

    • B. 192.168.3.1 is local to the router.

    • C. 192.168.1.2 will age out in less than 1 minute.

    • D. 192.168.3.1 has aged out and is marked for deletion.

    Correct Answer
    A. B. 192.168.3.1 is local to the router.
    Explanation
    The “Age” field in the “show ip arp” command is the age in minutes of the cache entry. A hyphen (-) means the address is local so in this case 192.168.1.1 & 192.168.3.1 are local to this router -> B is correct.

    Note: The “Age 0″ means that the address was cached less than 1 minute ago.

    Rate this question:

Quiz Review Timeline (Updated): Jul 9, 2024 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Jul 09, 2024
    Quiz Edited by
    ProProfs Editorial Team
  • Apr 10, 2012
    Quiz Created by
    Grahamley
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.