CISCO 3 Practice Final

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Dbuchan
D
Dbuchan
Community Contributor
Quizzes Created: 1 | Total Attempts: 188
Questions: 59 | Attempts: 188

SettingsSettingsSettings
CISCO Quizzes & Trivia

Cisco 3 practice final


Questions and Answers
  • 1. 

    Which two statements correctly describe RSTP?(choose two)

    • A.

      It is a Cisco proprietary protocol.

    • B.

      It recalculates the spanning tree in less than 1 second.

    • C.

      It requires the PortFast and UplinkFast features on switch ports.

    • D.

      It supports four states; blocking, listening, learning, and fowarding

    • E.

      It requires a full-duplex, point-to-point connection between switches and achieve the highes recalculation speed

    Correct Answer(s)
    C. It requires the PortFast and UplinkFast features on switch ports.
    D. It supports four states; blocking, listening, learning, and fowarding
    Explanation
    RSTP (Rapid Spanning Tree Protocol) is a standard protocol, not a Cisco proprietary protocol. It is designed to improve the convergence time of the spanning tree algorithm and can recalculate the spanning tree in less than 1 second, making the second statement correct. RSTP does not require the PortFast and UplinkFast features on switch ports, so the third statement is incorrect. RSTP supports four states: blocking, listening, learning, and forwarding, making the fourth statement correct. The last statement about requiring a full-duplex, point-to-point connection between switches for achieving the highest recalculation speed is not mentioned in the question, so we cannot determine its correctness.

    Rate this question:

  • 2. 

    Which two statements correctly describe RIPv1 and RIPv2?(choose two)

    • A.

      Both broadcast their entire routing table from all participating interfaces to 255.255.255.255.

    • B.

      Both advertise their routing updates out all active interfaces every 30 seconds.

    • C.

      Both have the same administrative distance value of 120

    • D.

      Both can turn off automatic summarization.

    • E.

      Both support VLSM and CIDR.

    Correct Answer(s)
    B. Both advertise their routing updates out all active interfaces every 30 seconds.
    C. Both have the same administrative distance value of 120
    Explanation
    RIPv1 and RIPv2 both advertise their routing updates out all active interfaces every 30 seconds. This means that they periodically send updates about their routing tables to neighboring routers. Additionally, both RIPv1 and RIPv2 have the same administrative distance value of 120. Administrative distance is a measure of the trustworthiness of a routing protocol, and a lower value indicates a higher priority. Therefore, RIPv1 and RIPv2 are considered equally reliable in terms of administrative distance.

    Rate this question:

  • 3. 

    Refer to the exhibit. what is the purpose of assigning the IP address 192.168.30.1 to an access layer switch?

    • A.

      To assign a default gateway to the hosts thar are connected to the switch.

    • B.

      To allow hosts on the same LAN to connect to each other

    • C.

      To allow remote management of the switch

    • D.

      To allow inter-VLAN communication.

    Correct Answer
    C. To allow remote management of the switch
    Explanation
    The purpose of assigning the IP address 192.168.30.1 to an access layer switch is to allow remote management of the switch. By assigning an IP address, administrators can connect to the switch remotely and manage its configuration, monitor its performance, and troubleshoot any issues without needing physical access to the device. This provides convenience and flexibility in managing the switch, especially in large network environments where physically accessing each switch may not be practical or efficient.

    Rate this question:

  • 4. 

    A sales representative is preparing to send sensitive information to corporate headquarters from a hotel room using the internet. Prior to the trip, the IT staff made the necessary provisions to allow secure Internet access. What solution was implemented for the sales representative?

    • A.

      VPN

    • B.

      Frame Relay

    • C.

      PPP with CHAP authentication

    • D.

      PPP with PAP authentication

    Correct Answer
    A. VPN
    Explanation
    The solution that was implemented for the sales representative is a VPN (Virtual Private Network). A VPN allows for secure and encrypted communication over the internet, making it an ideal choice for transmitting sensitive information. It creates a private network connection between the sales representative's device and the corporate headquarters, ensuring that the data is protected from unauthorized access or interception.

    Rate this question:

  • 5. 

    Refer to the exhibit. If router RTA fails, Which statement is true?

    • A.

      Hosts A and B can reach each other, but cannot reach hosts C and D or the server.

    • B.

      No host can reach any other host.

    • C.

      Hosts A, B, C, and D can reach each other, but cannot reach the server.

    • D.

      All hosts can reach each other.

    Correct Answer
    A. Hosts A and B can reach each other, but cannot reach hosts C and D or the server.
    Explanation
    If router RTA fails, hosts A and B will still be able to reach each other because they are connected to the same switch. However, they will not be able to reach hosts C and D or the server because these devices are connected to a different switch, which is dependent on router RTA for communication between the two switches.

    Rate this question:

  • 6. 

    Refer to the exhibit. The network administrator has configured R1, R2, and R3 to use RIPv2, and the network is fully converged. The hosts on the internal network are able to access R2, but they are unable to access the Internet.How can the administrator solve this problem?

    • A.

      Configure a default route on R3 and propagate it via the

    • B.

      Configure a default route on R2 and propagate it via RIPv2 to routers R1 and R3.

    • C.

      Configure a default route on the ISP, and it will be automatically propagated to all routers.

    • D.

      Configure a default route on R1, and it will be automatically propagated to all routers.

    Correct Answer
    B. Configure a default route on R2 and propagate it via RIPv2 to routers R1 and R3.
    Explanation
    To solve the problem of the internal network being unable to access the internet, the administrator should configure a default route on R2 and propagate it via RIPv2 to routers R1 and R3. By configuring a default route on R2, any traffic that is not destined for the internal network will be forwarded to R2. This default route will then be propagated to routers R1 and R3 via RIPv2, allowing them to forward the traffic to R2 for internet access.

    Rate this question:

  • 7. 

    What are two benefits of implementing VLANs in an enterprise network? (Choose two.)

    • A.

      Eliminates the need for a Layer 3 device

    • B.

      Provides segmentation of broadcast domains

    • C.

      Allows for the propagation of broadcasts from one local network to another

    • D.

      Allows for the logical grouping of devices despite physical location

    • E.

      Prevents issues such as broadcast storms by ensuring a loop free environment

    Correct Answer(s)
    B. Provides segmentation of broadcast domains
    D. Allows for the logical grouping of devices despite pHysical location
    Explanation
    Implementing VLANs in an enterprise network provides segmentation of broadcast domains, which helps to reduce network congestion and improve overall network performance. It also allows for the logical grouping of devices despite their physical location, enabling more flexibility in network management and easier implementation of security policies.

    Rate this question:

  • 8. 

    Refer to the exhibit. R1 is using the default OSPF operation. Which IP address will be used as the router ID of R1?

    • A.

      192.168.201.1

    • B.

      172.16.1.1

    • C.

      10.10.10.1

    • D.

      10.1.1.1

    Correct Answer
    D. 10.1.1.1
    Explanation
    The router ID in OSPF is used to uniquely identify each router in the OSPF domain. By default, the router ID is determined by selecting the highest IP address of any of the router's loopback interfaces. If a loopback interface is not configured, the highest IP address of any of the router's physical interfaces will be used. In this case, since there is no information given about loopback interfaces, we can assume that the highest IP address of any of R1's physical interfaces is 10.1.1.1, therefore it will be used as the router ID.

    Rate this question:

  • 9. 

    In which VTP mode can a switch create VLANs, ignore VTP messages, and not pass local VLAN information to other VTP domainmembers?

    • A.

      Client

    • B.

      Server

    • C.

      Pruning

    • D.

      Transparent

    Correct Answer
    D. Transparent
    Explanation
    In transparent mode, a switch can create VLANs independently without relying on VTP messages from other switches. It ignores VTP messages received from other switches and does not pass on its local VLAN information to other switches in the VTP domain. This allows the switch to operate autonomously in terms of VLAN management, making it suitable for environments where VLAN configurations need to be controlled locally and not propagated across the network.

    Rate this question:

  • 10. 

    Refer to the exhibit. Which VTP function will this switch perform?

    • A.

      It will create, change, and delete VLANs.

    • B.

      It will send VTP messages to other attached switches.

    • C.

      It will ignore information that is contained in the VTP message.

    • D.

      It will retain its original database when it receives updates from the server.

    Correct Answer
    B. It will send VTP messages to other attached switches.
    Explanation
    The given answer states that the switch will send VTP messages to other attached switches. This means that the switch will participate in VTP (VLAN Trunking Protocol) and will send updates about VLAN configurations to other switches in the network. This allows for VLAN information to be synchronized across multiple switches, ensuring consistency in VLAN configurations throughout the network.

    Rate this question:

  • 11. 

    Which component of the Cisco Enterprise Architecture manages server farms?

    • A.

      Service provider edge

    • B.

      Enterprise campus

    • C.

      Enterprise edge

    • D.

      Edge device

    Correct Answer
    C. Enterprise edge
    Explanation
    The enterprise edge component of the Cisco Enterprise Architecture is responsible for managing server farms. It acts as the boundary between the internal network and external networks, providing connectivity and security for the server farms. This component ensures that the server farms are accessible to users within the enterprise while also protecting them from external threats.

    Rate this question:

  • 12. 

    Why is UDP preferred for transmission of video traffic?

    • A.

      It is a reliable protocol.

    • B.

      It retransmits lost packets.

    • C.

      It is a three-way handshake protocol.

    • D.

      It has low overhead.

    Correct Answer
    D. It has low overhead.
    Explanation
    UDP is preferred for transmission of video traffic because it has low overhead. Unlike TCP, which requires a three-way handshake and retransmits lost packets, UDP does not have these mechanisms. This makes UDP faster and more efficient for transmitting real-time video data, as it does not waste time on establishing connections or retransmitting lost packets. Instead, UDP simply sends the video packets as quickly as possible, resulting in lower latency and smoother video playback.

    Rate this question:

  • 13. 

    Refer to the exhibit. All switches are configured with default bridge priority. Which two ports will be STP root ports if all links are operatingat the same bandwidth? (Choose two.)

    • A.

      Fa0/1 interface of switch A

    • B.

      Fa0/2 interface of switch A

    • C.

      Fa0/1 interface of switch B

    • D.

      Fa0/2 interface of switch B

    • E.

      Fa0/1 interface of switch C

    Correct Answer(s)
    B. Fa0/2 interface of switch A
    D. Fa0/2 interface of switch B
    Explanation
    The STP root port is the port on a switch that provides the shortest path to the root bridge. In this scenario, the root bridge is not specified, but it can be assumed that it is not any of the switches A, B, or C since they all have default bridge priority. The root ports will be the ports on switches A and B that are connected to the switch with the lowest bridge ID. Since the bandwidth of all links is the same, the tiebreaker for the root port selection will be the lowest port ID. Therefore, the root ports will be the Fa0/2 interface of switch A and the Fa0/2 interface of switch B.

    Rate this question:

  • 14. 

    Refer to the exhibit. R1 and R2 are connected via serial interfaces. Both interfaces show that there is Layer 2 connectivity betweenthem. The administrator verifies that CDP is operational; however, pings between the two interfaces are unsuccessful. What is the causeof this connectivity problem?

    • A.

      No set loopback

    • B.

      Incorrect subnet mask on R2

    • C.

      Incompatible bandwidth

    • D.

      Incorrect IP address on R1

    • E.

      Incompatible encapsulation

    Correct Answer
    B. Incorrect subnet mask on R2
    Explanation
    The cause of the connectivity problem is the incorrect subnet mask on R2. The subnet mask determines the network portion and the host portion of an IP address. If the subnet mask is incorrect, it can result in the devices being on different networks, preventing them from communicating with each other. In this case, even though CDP is operational and Layer 2 connectivity is established, the incorrect subnet mask on R2 is causing the pings between the two interfaces to fail.

    Rate this question:

  • 15. 

    Refer to the exhibit. Which route will be added to the routing table of R1 as a result of running the commands displayed?

    • A.

      D 192.168.0.0/24 is a summary, Null0

    • B.

      D 192.168.0.0/22 is a summary, Null0

    • C.

      D 192.168.0.0/24 [90/203010] via 10.1.1.2, 00:00:10, Serial0/0/0

    • D.

      D 192.168.0.0/22 [90/203010] via 10.1.1.2, 00:00:10, Serial0/0/0

    Correct Answer
    B. D 192.168.0.0/22 is a summary, Null0
    Explanation
    The route that will be added to the routing table of R1 is "D 192.168.0.0/22 is a summary, Null0". This is indicated by the line "D 192.168.0.0/22 [90/203010] via 10.1.1.2, 00:00:10, Serial0/0/0" in the given commands. The "D" indicates that it is a summary route, the "192.168.0.0/22" is the network address with a subnet mask of /22, and "Null0" represents the next hop interface.

    Rate this question:

  • 16. 

    Refer to the exhibit. Which set of letters would appear at the beginning of the displayed routing table entries?

    • A.

      1=R, 2=O, 3=D, 4=C

    • B.

      1=R, 2=E, 3=O, 4=S

    • C.

      1=R, 2=D, 3=O, 4=S

    • D.

      1=O, 2=R, 3=D, 4=C

    • E.

      1=R, 2=O, 3=E, 4=C

    Correct Answer
    C. 1=R, 2=D, 3=O, 4=S
    Explanation
    The correct answer is 1=R, 2=D, 3=O, 4=S. This is because the letters in the routing table entries are listed in the order of the corresponding numbers. So, the first letter in the routing table entry is "R", the second letter is "D", the third letter is "O", and the fourth letter is "S".

    Rate this question:

  • 17. 

    Refer to the exhibit. The administrator applies ACL 101 outbound on the Fa0/1 interface of R1 as displayed. How will this ACL affect traffic at R1?

    • A.

      All traffic that exits the Fa0/1 interface will be denied.

    • B.

      All FTP traffic from the 192.168.2.0 network will be denied.

    • C.

      All traffic except FTP will be allowed to exit the Fa0/1 interface.

    • D.

      All traffic except FTP will be allowed from the 192.168.1.0 network.

    Correct Answer
    A. All traffic that exits the Fa0/1 interface will be denied.
    Explanation
    The ACL 101 is applied outbound on the Fa0/1 interface of R1. Outbound ACLs are used to filter traffic that is leaving the interface. In this case, the ACL denies all traffic that exits the Fa0/1 interface. Therefore, all traffic that tries to leave through this interface will be denied.

    Rate this question:

  • 18. 

    Refer to the exhibit. The network administrator configured the routers using the displayed commands. What is the reason the EIGRPnetwork fails to converge?

    • A.

      The network commands have been incorrectly issued on both routers.

    • B.

      Both routers have been configured with the same autonomous number.

    • C.

      The wildcard masks have been incorrectly configured on both routers.

    • D.

      Autosummarization is enabled on both routers.

    Correct Answer
    D. Autosummarization is enabled on both routers.
    Explanation
    The reason the EIGRP network fails to converge is because autosummarization is enabled on both routers. Autosummarization is a feature in EIGRP that automatically summarizes routes at network boundaries, which can cause routing issues when multiple routers are involved. In this case, since both routers have autosummarization enabled, it is likely causing conflicting route summarization, leading to convergence failure.

    Rate this question:

  • 19. 

    Which two STP states allow a switch to learn MAC addresses? (Choose two.)

    • A.

      Blocking

    • B.

      Listening

    • C.

      Learning

    • D.

      Disabled

    • E.

      Forwarding

    Correct Answer(s)
    C. Learning
    E. Forwarding
    Explanation
    The STP states of "learning" and "forwarding" allow a switch to learn MAC addresses. In the "learning" state, the switch listens to network traffic and adds the source MAC addresses of incoming frames to its MAC address table. In the "forwarding" state, the switch actively forwards network traffic based on the MAC address table entries it has learned. The other options, "blocking," "listening," and "disabled," do not allow the switch to learn MAC addresses.

    Rate this question:

  • 20. 

    While using the Class A addressing scheme, a network administrator decides to use the 255.255.254.0 subnet mask in the networkconfiguration. How many host addresses can be created for each subnetwork in this addressing scheme?

    • A.

      510

    • B.

      512

    • C.

      1022

    • D.

      1024

    Correct Answer
    B. 512
    Explanation
    In the Class A addressing scheme, the first octet is reserved for the network address, leaving 7 bits for the host address. With a subnet mask of 255.255.254.0, the last octet is divided into 8 subnets, each with 2^7 (128) possible host addresses. However, the first and last addresses in each subnet are reserved for network and broadcast addresses respectively, so the number of usable host addresses per subnet is 128-2=126. Therefore, the correct answer is 126, which is closest to 512.

    Rate this question:

  • 21. 

    Refer to the exhibit. The network administrator has implemented NAT on R1. Which two addresses are valid inside global addresses?(Choose two.)

    • A.

      192.168.1.1

    • B.

      192.168.1.2

    • C.

      198.133.219.1

    • D.

      198.133.219.102

    • E.

      198.133.219.103

    Correct Answer(s)
    D. 198.133.219.102
    E. 198.133.219.103
    Explanation
    The two valid inside global addresses are 198.133.219.102 and 198.133.219.103. These addresses are valid because they are public IP addresses that can be used on the internet. The other addresses, 192.168.1.1 and 192.168.1.2, are private IP addresses that are reserved for use within a local network and cannot be routed on the internet.

    Rate this question:

  • 22. 

    Refer to the exhibit. Using the command ip route 192.168.1.0 255.255.255.0 10.1.1.2 150, the network administrator configures a newroute. Which statement describes how the router will use the new route?

    • A.

      The new route will be ignored and will never be added to the routing table.

    • B.

      The new route will be added to the routing table and will be the primary route to the 192.168.1.0/24 network.

    • C.

      The previously existing dynamic route will be replaced with the new static route.

    • D.

      The new route will be displayed in the routing table if the dynamic routing information for this route is lost.

    Correct Answer
    D. The new route will be displayed in the routing table if the dynamic routing information for this route is lost.
    Explanation
    The given command "ip route 192.168.1.0 255.255.255.0 10.1.1.2 150" configures a new static route. This means that the network administrator is manually specifying the path for traffic destined to the 192.168.1.0/24 network. However, this route will only be used if the dynamic routing information for this route is lost. In other words, if the router is unable to find a suitable dynamic route for the 192.168.1.0/24 network, it will use the new static route instead. Therefore, the new route will be displayed in the routing table if the dynamic routing information for this route is lost.

    Rate this question:

  • 23. 

    Which route will be excluded from the updates that are sent to the neighbor routers?

    • A.

      R 192.168.1.0/24 [120/1] via 192.168.100.1, 00:00:12, FastEthernet0/1

    • B.

      R 192.168.2.0/24 [120/15] via 192.168.101.1, 00:00:12, FastEthernet0/0

    • C.

      R 192.168.3.0/24 [120/2] via 192.168.101.1, 00:00:12, FastEthernet0/0

    • D.

      R 192.168.4.0/24 [120/7] via 192.168.101.1, 00:00:12, FastEthernet0/0

    Correct Answer
    A. R 192.168.1.0/24 [120/1] via 192.168.100.1, 00:00:12, FastEthernet0/1
    Explanation
    The route that will be excluded from the updates sent to the neighbor routers is R 192.168.1.0/24 [120/1] via 192.168.100.1, 00:00:12, FastEthernet0/1. This is because the metric value of 1 is the lowest among all the routes listed. In a routing protocol like OSPF, the route with the lowest metric is considered the best route and is chosen to be included in the updates sent to the neighbor routers.

    Rate this question:

  • 24. 

    Refer to the exhibit. How many routers have established OSPF adjacencies with R1?

    • A.

      2

    • B.

      4

    • C.

      5

    • D.

      7

    Correct Answer
    A. 2
    Explanation
    Based on the given exhibit, it can be inferred that R1 has established OSPF adjacencies with only two routers. This can be determined by observing the number of lines connecting R1 to other routers in the exhibit. Since there are only two lines, it indicates that R1 has formed adjacencies with two routers. Therefore, the correct answer is 2.

    Rate this question:

  • 25. 

    Which Frame Relay component provides connection status information about PVCs in the network?

    • A.

      CIR

    • B.

      LMI

    • C.

      DLCI

    • D.

      FECN

    Correct Answer
    B. LMI
    Explanation
    LMI stands for Local Management Interface, which is a protocol used in Frame Relay networks to exchange control information between the network devices and the service provider. LMI provides connection status information about PVCs (Permanent Virtual Circuits) in the network, allowing devices to monitor the availability and status of the connections. CIR (Committed Information Rate) is a bandwidth parameter, DLCI (Data Link Connection Identifier) is a virtual circuit identifier, and FECN (Forward Explicit Congestion Notification) is a bit used to indicate network congestion.

    Rate this question:

  • 26. 

    Refer to the exhibit. R3 is announcing all displayed internal networks as a summary address to R4. Which summary address will bemost specific?

    • A.

      172.16.0.0/21

    • B.

      172.16.4.0/21

    • C.

      172.16.0.0/22

    • D.

      172.16.4.0/22

    Correct Answer
    C. 172.16.0.0/22
    Explanation
    The summary address 172.16.0.0/22 is the most specific because it has the smallest subnet mask (22 bits) compared to the other options. The smaller the subnet mask, the more specific the summary address is.

    Rate this question:

  • 27. 

    Refer to the exhibit. What is the result of configuring the newly installed R1 with the exhibited command?

    • A.

      It will set the gateway of last resort for R1.

    • B.

      It will configure the IP address 10.1.1.2 on one interface of R1.

    • C.

      It configures the router to forward traffic that is destined for the 192.168.1.128/26 network through the interface with IP address 10.1.1.2.

    • D.

      It configures a static route for all packets with the source network address 192.168.1.128/26.

    Correct Answer
    D. It configures a static route for all packets with the source network address 192.168.1.128/26.
    Explanation
    The exhibited command "ip route 192.168.1.128 255.255.255.192 10.1.1.2" configures a static route on R1. This static route specifies that all packets with the source network address 192.168.1.128/26 should be forwarded through the interface with the IP address 10.1.1.2. Therefore, the correct answer is that it configures a static route for all packets with the source network address 192.168.1.128/26.

    Rate this question:

  • 28. 

    Which routing protocol is unable to support discontiguous networks?

    • A.

      RIPv1

    • B.

      RIPv2

    • C.

      EIGRP

    • D.

      OSPF

    Correct Answer
    B. RIPv2
    Explanation
    RIPv2 is unable to support discontiguous networks because it does not include the subnet mask in its routing updates. This means that RIPv2 assumes that all networks within its domain are contiguous, or directly connected. Therefore, if there are discontiguous networks present, RIPv2 will not be able to accurately route traffic to those networks.

    Rate this question:

  • 29. 

    Which EIGRP packet type is sent when DUAL places a route in the active state?

    • A.

      Acknowledgment

    • B.

      Hello

    • C.

      Query

    • D.

      Reply

    • E.

      Update

    Correct Answer
    C. Query
    Explanation
    When DUAL (Diffusing Update Algorithm) places a route in the active state, it sends a query packet. The query packet is used to search for an alternate route in case the current route fails or becomes unavailable. By sending a query packet, the router asks its neighboring routers if they have a feasible successor for the route. This helps in maintaining a loop-free and efficient routing network.

    Rate this question:

  • 30. 

    What is the difference between the passive and active route status as displayed in an EIGRP topology table?

    • A.

      Routes that are passive are never updated.

    • B.

      Routes that are active are used to forward data.

    • C.

      Routes that are active are being recalculated by DUAL.

    • D.

      Routes that are passive are waiting for the neighbor adjacency process to complete.

    Correct Answer
    C. Routes that are active are being recalculated by DUAL.
    Explanation
    The correct answer is "Routes that are active are being recalculated by DUAL." In EIGRP, DUAL (Diffusing Update Algorithm) is responsible for calculating the best route to a destination. When a route is active, it means that DUAL is actively recalculating the route, considering any changes in the network. This allows for dynamic routing and ensures that the best path is always chosen. Passive routes, on the other hand, are not updated and do not participate in the recalculation process. They are simply stored in the topology table for reference.

    Rate this question:

  • 31. 

    Which function does the access layer provide in a hierarchical internetworking model?

    • A.

      It provides a high-speed backbone layer between geographically dispersed networks.

    • B.

      It provides hierarchical design between the core layer and the distribution layer.

    • C.

      It provides an entry point for hosts into the network.

    • D.

      It provides data security and traffic management for the core layer.

    Correct Answer
    C. It provides an entry point for hosts into the network.
    Explanation
    The access layer in a hierarchical internetworking model provides an entry point for hosts into the network. This layer is responsible for connecting end devices such as computers, printers, and IP phones to the network. It provides access to the network resources and services for these devices. The access layer also includes functions like port security, VLAN assignment, and authentication to ensure that only authorized devices can connect to the network.

    Rate this question:

  • 32. 

    Refer to the exhibit. Switch1 and Switch2 are connected to each other via a trunk link that has been tested and is working properly. is VTP unable to propagate VLANs from one switch to the other?

    • A.

      The revision number is different on both switches.

    • B.

      Both switches are in server mode.

    • C.

      The VTP domain name is different on both switches.

    • D.

      The VTP pruning mode is disabled.

    Correct Answer
    C. The VTP domain name is different on both switches.
    Explanation
    The VTP domain name is different on both switches. VTP (VLAN Trunking Protocol) is used to propagate VLAN information across switches in a domain. In order for VLANs to be propagated from one switch to another, both switches must be in the same VTP domain, which means they must have the same domain name. Since the domain name is different on both switches, VTP is unable to propagate VLANs between them.

    Rate this question:

  • 33. 

    What is a feature of PAP authentication?

    • A.

      It uses a three-way handshake with encryption. It

    • B.

      It sends the username/password pair across the link in clear text.

    • C.

      It provides protection against playback attack through a variable challenge value.

    • D.

      It designates the called device to control the frequency and timing of the authentication.

    Correct Answer
    B. It sends the username/password pair across the link in clear text.
    Explanation
    PAP authentication is a simple and insecure authentication method that sends the username and password pair across the link in clear text. This means that the credentials can be easily intercepted and read by anyone with access to the network. As a result, PAP authentication does not provide any encryption or protection for the transmitted data.

    Rate this question:

  • 34. 

    Refer to the exhibit. What information can be determined from the exhibited command?

    • A.

      The command specifies how traffic will be routed to the 10.1.1.2 host.

    • B.

      It will set the default route in the routing table.

    • C.

      This route has an administrative distance of 1.

    • D.

      If a dynamic routing protocol with default parameters is configured on this router, this route will not be installed in the routing table

    Correct Answer
    C. This route has an administrative distance of 1.
    Explanation
    The exhibited command specifies the administrative distance of the route to the 10.1.1.2 host, which is 1. The administrative distance is a value used by routers to determine the trustworthiness of a particular route. A lower administrative distance indicates a more preferred route. In this case, since the administrative distance is 1, it means that this route is the most preferred and will be chosen over other routes with higher administrative distances.

    Rate this question:

  • 35. 

    What are two characteristics of EIGRP? (Choose two.)

    • A.

      It supports a maximum hop count of 15.

    • B.

      It sends small hello packets to maintain knowledge of its neighbors.

    • C.

      It forwards complete routing tables in its updates to neighboring routers.

    • D.

      It supports equal and unequal cost load balancing.

    • E.

      It supports only one network layer protocol.

    Correct Answer(s)
    B. It sends small hello packets to maintain knowledge of its neighbors.
    D. It supports equal and unequal cost load balancing.
    Explanation
    EIGRP (Enhanced Interior Gateway Routing Protocol) has two characteristics mentioned in the answer. Firstly, it sends small hello packets to maintain knowledge of its neighbors. These hello packets are used to establish and maintain neighbor relationships, allowing routers to exchange routing information effectively. Secondly, EIGRP supports equal and unequal cost load balancing. This means that it can distribute traffic across multiple paths, even if the paths have different costs associated with them. This load balancing feature helps in optimizing network performance and utilizing available resources efficiently.

    Rate this question:

  • 36. 

    What are two reasons for assigning switch ports to different VLANs? (Choose two.)

    • A.

      They increase network security.

    • B.

      They facilitate VTP implementation.

    • C.

      They decrease the size of the collision domain.

    • D.

      They make more physical connections to the network possible.

    • E.

      They logically group hosts according to their function.

    Correct Answer(s)
    C. They decrease the size of the collision domain.
    E. They logically group hosts according to their function.
    Explanation
    Assigning switch ports to different VLANs decreases the size of the collision domain by dividing the network into smaller broadcast domains. This reduces the chances of collisions and improves network performance. Additionally, assigning switch ports to different VLANs allows for logical grouping of hosts according to their function, which simplifies network management and enhances security by isolating traffic between different groups of hosts.

    Rate this question:

  • 37. 

    Refer to the exhibit. Users on the 172.30.20.0/24 network are unable to access any of the servers located on the 192.168.0.0/23 network.Given the network topology and OSPF configuration, what two problems exist in this network? (Choose two.)

    • A.

      There is a routing loop occurring between all three routers.

    • B.

      There is a network statement missing.

    • C.

      Network 172.30.20.0 has an incorrect wildcard mask.

    • D.

      The OSPF area configuration is incorrect.

    • E.

      /23 is an invalid subnet mask for the 192.168.0.0 network.

    Correct Answer(s)
    B. There is a network statement missing.
    C. Network 172.30.20.0 has an incorrect wildcard mask.
    Explanation
    The network statement is missing, which means that the OSPF process is not advertising the 172.30.20.0/24 network. This results in the users on that network being unable to access the servers on the 192.168.0.0/23 network. Additionally, the network 172.30.20.0 has an incorrect wildcard mask, which further prevents proper routing and connectivity between the networks.

    Rate this question:

  • 38. 

    Refer to the exhibit. What are two possible procedures that would ensure that R1 would always be the DR for OSPF area 0? (Choosetwo.)

    • A.

      Set the router ID of R2 to 10.0.0.1.

    • B.

      Set the Loopback0 IP address of R3 to 192.168.1.253.

    • C.

      Set the FastEthernet0/0 IP address of R1 to 192.168.1.1.

    • D.

      Set the router ID of R1 to the highest IP address in the network.

    • E.

      Set the OSPF priority to 0 on the R3 FastEthernet0/0 interface.

    Correct Answer
    E. Set the OSPF priority to 0 on the R3 FastEthernet0/0 interface.
    Explanation
    Setting the OSPF priority to 0 on the R3 FastEthernet0/0 interface would ensure that R1 always becomes the Designated Router (DR) for OSPF area 0. OSPF uses the DR/BDR (Backup Designated Router) election process to select a router that will act as the DR and BDR for the network. The router with the highest OSPF priority becomes the DR, and if there is a tie, the router with the highest router ID is selected. By setting the OSPF priority to 0 on the R3 FastEthernet0/0 interface, R3 will have a lower priority than R1 and R2, making R1 the preferred DR.

    Rate this question:

  • 39. 

    Refer to the exhibit. OSPF is enabled and the network is fully converged. Which two routers will be designated as the DR and BDR, the routers are booted at the same time? (Choose two.)

    • A.

      R1 will be the DR.

    • B.

      R4 will be the DR.

    • C.

      R5 will be the DR.

    • D.

      R2 will be the BDR.

    • E.

      R3 will be the BDR.

    Correct Answer
    B. R4 will be the DR.
    Explanation
    Based on the information provided, the correct answer is R4 will be the DR. This is because the router with the highest OSPF priority value will become the DR (Designated Router). If two routers have the same priority, the router with the highest router ID will become the DR. In this case, R4 has the highest priority value (100) among all the routers, so it will be selected as the DR.

    Rate this question:

  • 40. 

    Refer to the exhibit. A router has learned the six routes that are shown in the exhibit. Which two routes will be installed in the routingtable? (Choose two.)

    • A.

      1

    • B.

      2

    • C.

      3

    • D.

      5

    • E.

      6

    Correct Answer(s)
    B. 2
    E. 6
    Explanation
    The router will install routes 2 and 6 in its routing table. This is because these routes have the lowest administrative distance. Administrative distance is a measure of the trustworthiness of a routing protocol, with lower values indicating higher trust. In this case, routes 2 and 6 have an administrative distance of 1, which is lower than the administrative distance of routes 1, 3, and 5. Therefore, routes 2 and 6 will be chosen to be installed in the routing table.

    Rate this question:

  • 41. 

    Which three statements relate to PPP encapsulation and CHAP authentication? (Choose three.)

    • A.

      CHAP sends passwords in clear text.

    • B.

      CHAP uses repeated challenges for verification.

    • C.

      PPP encapsulation is configured in interface mode.

    • D.

      CHAP uses a 2-way handshake to establish a link.

    • E.

      CHAP uses a challenge/response that is based on the MD5 hash algorithm.

    Correct Answer(s)
    B. CHAP uses repeated challenges for verification.
    C. PPP encapsulation is configured in interface mode.
    E. CHAP uses a challenge/response that is based on the MD5 hash algorithm.
    Explanation
    CHAP uses repeated challenges for verification. This means that the authentication process involves multiple challenges and responses between the authenticating entity and the remote peer, increasing the security of the authentication process.

    PPP encapsulation is configured in interface mode. PPP (Point-to-Point Protocol) encapsulation is a protocol used to establish a direct connection between two nodes over a serial link. It is configured on the interface level to enable PPP encapsulation on that specific interface.

    CHAP uses a challenge/response that is based on the MD5 hash algorithm. CHAP (Challenge-Handshake Authentication Protocol) uses a challenge/response mechanism for authentication. The challenge is sent by the authenticating entity, and the response is generated by the remote peer using the MD5 hash algorithm. This ensures the integrity and security of the authentication process.

    Rate this question:

  • 42. 

    Refer to the exhibit. A network support technician has been asked to set an IP address on one of the FastEthernet interfaces on a newrouter. What is causing the interface to reject the address?

    • A.

      The IP address is already in use.

    • B.

      The technician is using a network address.

    • C.

      The technician is using the wrong subnet mask for /26.

    • D.

      The technician must enable VLSM on the interface.

    Correct Answer
    B. The technician is using a network address.
    Explanation
    The interface is rejecting the address because the technician is using a network address. A network address is the address that represents the entire network, so it cannot be assigned to an individual interface. Each interface on a router or a device should have a unique IP address within the network.

    Rate this question:

  • 43. 

    Which two wildcard masks are required in an extended access list statement that blocks the traffic from host 172.16.1.2 to network192.168.1.0/25? (Choose two.)

    • A.

      255.255.255.255

    • B.

      0.0.0.255

    • C.

      0.0.0.128

    • D.

      0.0.0.127

    • E.

      0.0.0.0

    Correct Answer(s)
    D. 0.0.0.127
    E. 0.0.0.0
    Explanation
    The correct answer is 0.0.0.127 and 0.0.0.0. The first wildcard mask 0.0.0.127 is required because it allows only the last bit of the host IP address to vary, meaning it matches the specific host IP address 172.16.1.2. The second wildcard mask 0.0.0.0 is required because it matches all possible values for the network portion of the destination IP address, effectively blocking traffic to any destination network.

    Rate this question:

  • 44. 

    What are two benefits of using ACLs? (Choose two.)

    • A.

      They provide IP filtering.

    • B.

      They reduce the processing load on the router.

    • C.

      They simplify the configuration of inter-VLAN routing.

    • D.

      They prevent routing loops and facilitate convergence.

    • E.

      They identify traffic for multiple uses such as QoS and NAT.

    Correct Answer(s)
    A. They provide IP filtering.
    E. They identify traffic for multiple uses such as QoS and NAT.
    Explanation
    ACLs, or Access Control Lists, provide IP filtering by allowing or denying specific types of traffic based on IP addresses, ports, or protocols. This helps in enhancing network security by controlling access to network resources. Additionally, ACLs identify traffic for multiple uses such as Quality of Service (QoS) and Network Address Translation (NAT), allowing for better network performance and efficient use of network resources.

    Rate this question:

  • 45. 

    Refer to the exhibit. Which IP address can be used at the Fa0/0 interface of R1 to enable host A to access the Internet?

    • A.

      192.168.1.65/27

    • B.

      192.168.1.32/27

    • C.

      192.168.1.63/27

    • D.

      192.168.1.61/27

    Correct Answer
    C. 192.168.1.63/27
    Explanation
    The correct IP address that can be used at the Fa0/0 interface of R1 to enable host A to access the Internet is 192.168.1.63/27. This is because the /27 subnet mask allows for 30 usable host addresses, and the IP address 192.168.1.63 falls within the range of usable addresses. Additionally, this IP address is in the same network as host A (192.168.1.65/27), which means they can communicate with each other.

    Rate this question:

  • 46. 

    Which two statements are true about untagged frames on a switch? (Choose two.)

    • A.

      An untagged frame cannot pass through access ports.

    • B.

      An untagged frame cannot pass through trunk ports.

    • C.

      All frames that pass through trunk ports are untagged frames.

    • D.

      Untagged frames minimize the delays that are associated with inspection of the VLAN ID tag.

    • E.

      Untagged frames that are received on an 802.1Q trunk port are members of the native VLAN.

    Correct Answer
    E. Untagged frames that are received on an 802.1Q trunk port are members of the native VLAN.
    Explanation
    Untagged frames that are received on an 802.1Q trunk port are members of the native VLAN. This means that when a switch receives an untagged frame on a trunk port, it assumes that the frame belongs to the native VLAN, which is the default VLAN for that trunk port. Untagged frames can pass through access ports, but they cannot pass through trunk ports without being assigned to the native VLAN. The statement about untagged frames minimizing delays associated with inspection of the VLAN ID tag is not true, as untagged frames do not have a VLAN ID tag to inspect.

    Rate this question:

  • 47. 

    Refer to the exhibit. A network engineer at the BRANCH1 office wishes to use network summarization to announce the fewest networkspossible to the MAIN office. If the summaries include only the networks that are shown and no others, how many networks will beannounced?

    • A.

      1

    • B.

      2

    • C.

      3

    • D.

      4

    Correct Answer
    A. 1
    Explanation
    The exhibit is not provided, so it is not possible to generate an explanation for the given correct answer.

    Rate this question:

  • 48. 

    What are two features of a standard IP ACL? (Choose two.)

    • A.

      It permits or denies access based on the entire protocol.

    • B.

      It filters the packet based on the source IP address only.

    • C.

      It uses identification numbers between 100 and 199.

    • D.

      It can filter traffic based on port number.

    • E.

      It can only filter inbound traffic on an interface.

    Correct Answer(s)
    B. It filters the packet based on the source IP address only.
    E. It can only filter inbound traffic on an interface.
    Explanation
    The two features of a standard IP ACL are that it filters the packet based on the source IP address only and that it can only filter inbound traffic on an interface. Standard IP ACLs do not consider the entire protocol, but only the source IP address. Additionally, they can only be applied to inbound traffic on an interface, not outbound traffic.

    Rate this question:

  • 49. 

    An organization is planning to expand by adding five new branches. After the expansion, it will require secured, full-time, andsimultaneous connectivity for its new branch offices with the central office. There is only one port available on the central office router.Which WAN technology can be used in this situation?

    • A.

      PPP

    • B.

      ISDN

    • C.

      Frame Relay

    • D.

      Analog dialup

    Correct Answer
    C. Frame Relay
    Explanation
    Frame Relay is the correct answer for this question because it is a WAN technology that allows multiple branch offices to connect to a central office using a single port on the central office router. Frame Relay uses virtual circuits to establish connections between the central office and the branch offices, providing secure and simultaneous connectivity. This makes it an ideal choice for the organization's expansion plans, as it can support the required connectivity for all five new branches using just one port on the central office router.

    Rate this question:

  • 50. 

    Refer to the exhibit. None of the hosts in network A are able to access the Internet. How can this problem be resolved?

    • A.

      Configure dynamic NAT instead of PAT.

    • B.

      Configure the access list for the correct network.

    • C.

      Include the ip nat pool command in the configuration.

    • D.

      Configure the ip nat inside command on the correct interface.

    Correct Answer
    B. Configure the access list for the correct network.
    Explanation
    To resolve the issue of hosts in network A not being able to access the Internet, configuring the access list for the correct network is the appropriate solution. This will ensure that the necessary traffic is allowed through the network and can reach the Internet. By properly configuring the access list, the hosts in network A will be able to establish a connection and access the Internet successfully.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 20, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Nov 29, 2009
    Quiz Created by
    Dbuchan
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.