This CCNA DCompnwk FINAL 1 quiz assesses knowledge in configuring network systems, understanding EIGRP authentication, FTP traffic, router boot processes, and network redundancy. It prepares learners for practical network troubleshooting and management, essential for certification.
Authentication will fail because only one key is configured.
Authentication will fail because the key chain names do not match.
Authentication will succeed and EIGRP updates can be exchanged.
Authentication will fail because the key chain names must match the router names.
Rate this question:
Low-volume traffic
Predictable bandwidth usage
Large packet sizes for transfers
Low throughput with high response-time requirements
Rate this question:
Setup mode
User mode
Rommon mode
Privileged mode
Rate this question:
File transfer
Web browsing
Videoconferencing
Voice over IP
Video on demand
Rate this question:
Create a static route with the administrative distance of 1.
Create a floating static route
Add a new route to the routing protocol configuration.
Create a second default route for the backup path
Rate this question:
Alternate
Backup
Designated
Root
Rate this question:
Install the hot-swappable option module
Turn off the power to the router before installing the new module.
Remove the WIC-2T module so that the new module can be installed in slot 0.
Shut down all Fast Ethernet ports on the router until the new WIC module installation is complete.
Configure the Cisco IOS software to support an internal trunk link between the two WIC modules.
Rate this question:
STP
RIP
BGP
VTP
RSTP
Rate this question:
Frame Relay Layer 2 address
One DLCI allowed per local loop
Locally significant circuit endpoint
Signaling standard between DTE and DCE
Establishes the data transfer rate through a Frame Relay network
Rate this question:
The power outlet to the PC that is used by the caller
The trunks between switches in the wiring closet
The status of the departmental workgroup switch in the wiring closet
The cable that connects the PC of the caller to the network jack
The cable connection between a PC and a network outlet that is used by a neighbor
Rate this question:
post-sales field engineer
pre-sales engineer
Network designer
Account manager
Rate this question:
There is enough DRAM and flash.
There is not enough DRAM and flash.
There is enough DRAM but not enough flash
There is not enough DRAM but enough flash
Rate this question:
The commands overwrite the existing Managers ACL
The commands are added at the end of the existing Managers ACL.
The commands are added at the beginning of the existing Managers ACL.
The network administrator receives an error that states that the ACL already exists.
Rate this question:
Access to the the servers will be los
Convergence time will be slow and possibly cause applications to time out.
Routing protocols will not send the triggered updates in the event of a failure of the root bridge.
Switches that connect the servers to the network will not be found by other switches in thenetwork
Rate this question:
Dynamic
Reflexive
Standard
Extended
Time-based
Rate this question:
Configure the router using the no inverse-arp command
Ensure that the LMI type is correct for the circuit.
Configure the router using the frame-relay map ip command
Verify that the remote router has Frame Relay encapsulation enabled
Rate this question:
There is a single route to the 192.168.24.0/24 LAN using the T1 connection
There is a single route to the 192.168.24.0/24 LAN using the DSL connection
There is a single route to the 192.168.24.0/24 LAN using the Metro Ethernet connection
EIGRP installs all three routes to the 192.168.24.0/24 LAN and load balances the traffic
Rate this question:
The R1 router needs a routing protocol configured
The subinterfaces of the R1 router should have IP addresses applied
The R1 router needs three additional Fast Ethernet interfaces installed.
The subinterfaces of the R1 router should be configured in the same VLAN.
Rate this question:
DSL
ISDN
Leased line
Frame relay
Rate this question:
Leased line with PPP authentication
Site-to-site VPN
Remote-access VPN
Access control list
Rate this question:
RTB Fa0/0 inbound
RTC S0/0/1 inbound
RTD Fa0/0 outbound
RTC S0/1/0 outbound
Rate this question:
Router eigrp 11 network 10.5.0.0 network 192.168.0.0 no auto summary interface s0/1/0 ip address 10.5.0.1 255.255.255.252
Router eigrp 11 network 192.168.0.0 0.0.3.255 network 192.168.8.0 0.0.3.255 network 10.5.0.0 0.0.0.3 no auto summary interface s0/1/0 ip address 10.5.0.1 255.255.255.252
Router eigrp 11 network 10.5.0.0 0.0.0.3 network 192.168.0.0 0.0.3.255 no auto summary interface s0/1/0 ip address 10.5.0.1 255.255.255.252 ip summary-address eigrp 11 192.168.0.0 255.255.252.0
router eigrp 11 network 10.5.0.0 0.0.0.3 network 192.168.8.0 network 192.168.28.0 network 192.168.20.0 no auto summary interface s0/1/0 ip address 10.5.0.1 255.255.255.252 ip summary-address eigrp 11 192.168.0.0 255.255.224.0
Rate this question:
24 port 2950 switch with a non-default native VLAN
24 port 2950 switch that is connected to Fa0/0 on Router1
24 port 2950 switch that is assigned to the administrator-defined VTP domain
24 port 2950 switch with interface GigabitEthernet0/1 that is operating at 1000 Mb/s
Rate this question:
Scalability
Manageability
Availability
Security
Rate this question:
Traffic filtering is needed on the internal LAN.
Multiple levels of access to the network are needed
The DMZ requires packet filtering and port blocking
Heavy network traffic will be handled best by using a dedicated device
Rate this question:
QoS operation
VLAN configuration
Tunneling protocols
IPv6 and IPv4 dual stack
Encryption algorithms
Frame Relay configuration
Rate this question:
Performs routing and packet manipulation
Supplies redundancy and failover protection
Provides a high-speed, low-latency backbone
Serves as a network connection point for IP telephony devices
Rate this question:
Using the production network of the customer
Using actual network equipment in a lab
Using the Cisco Network Assistant
Using a network simulation tool
Rate this question:
provides reliable connectivity to end users
Creates fewer IP subnets to configure and manage
Reduces the number of redundant links required
Enables traffic filtering based on subnet addresses
provides connectivity between different VLANs
Rate this question:
DNS traffic from host A to the Internet
FTP traffic from host A to the Internet
ICMP traffic from the ISP to server 1
Traffic from the ISP to the server on port 23
Rate this question:
Traffic queues
Multicast
Multiple Layer 4 sessions
High priority from QoS
Rate this question:
provides data which can be used to create a network diagram
Allows for monitoring and managing network devices
Allows for classification and monitoring of network traffic
Displays the IOS versions and IP addresses on neighboring devices
Rate this question:
Disable all logging.
Enable Telnet on TCP port 23.
Use HTTP for web administration.
Set timeouts and ACLs on VTY lines.
Shut down any unused ports and interfaces.
Rate this question:
Change to a public IP address scheme.
Disable automatic route summarization.
Change the IP network address on R3 Fa0/0 to 172.16.1.128 /26.
Change the subnet mask on the link between R2 and R3 to 255.255.255.0.
The WAN links need IP addresses from a different major network.
The WAN link that connects R1 to R2 overlaps with the R3 LAN.
The WAN links that connect R1 to R3 and R1 to R2 have incorrect masks.
The R1 LAN is incorrect because subnet zero cannot be used with VLSM.
Rate this question:
Redundant links are not blocked.
Routing tables converge more quickly.
Spanning Tree convergence times are reduced.
Fewer redundant links are required to maintain connectivity.
Rate this question:
SSID
WEP keys
VLAN parameters
WPA encryption keys
VPN authentication information
Rate this question:
192.168.1.1 /26
192.168.1.22 /28
192.168.1.32 /28
192.168.1.44 /28
192.168.1.47 /28
192.168.1.55 /28
Rate this question:
The router at the client site is still in the process of rebooting.
The administrator probably configured the wrong password.
The administrator has not issued a no shut command on the serial interface.
The administrator probably configured the wrong IP address for the serial interface.
Rate this question:
BGP
RIP1
RIP2
EIGRP
Rate this question:
ESP
DES
MD5
DHI
SHA-1
Rate this question:
The company will not be able to send data faster than 4 Mb/s.
If the company sends data faster than 4 Mb/s, some of the data frames will be flagged with a DE bit
If the company sends data faster than 4 Mb/s, the TSP will change the CIR to zero
When the company sends data faster than 4 Mb/s, the Frame Relay switch will set the BECN bit t 1on the frames that are headed to the company
Rate this question:
IPv6 does not support broadcasts
IPv6 uses a simplified header structure.
IPv6 does not require private addresses.
IPv6 uses fixed length address strings.
IPsec for IPv6 is not compatible with IPsec for IPv4
Rate this question:
Configure multipoint subinterfaces on the physical interface.
Configure point-to-point subinterfaces on the physical interface.
Configure a single subinterface to establish multiple PVC connections.
Configure the physical interface to share one DLCI to multiple remote sites and their connections.
Rate this question:
BGP
EIGRP
OSPF
RIPV2
Rate this question:
DNS
SNMP
DHCP
SMTP
TFTP
Rate this question:
EasyVPN Server
EasyVPN Remote
EasyVPN Client
EasyVPN Remote-Access
Rate this question:
IPSec
Tunneling
Dual stack
Authentication
Anycast addressing
Header simplification
Rate this question:
Quiz Review Timeline (Updated): Aug 18, 2024 +
Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.
Wait!
Here's an interesting quiz for you.