In
the following partial output of the show ip route command, what does
the letter D stand for? D 192.1.2.0/24 via 5.1.1.71 [w:0 m:0] C
192.8.1.1/32 directly connected to loopback 0
Options are :
- This is a default route
- This is static route
- This is an EIGRP route
- This is a directly connected route
Answer : This is an EIGRP route
You
wish to configure Secure Shell (SSH) support on your router so that
incoming VTY connections are secure. Which of the following commands
must be configured? (Choose all that apply.)
Options are :
- ip domain-name
- ip access-group
- transport input ssh
- crypto key generate rsa
Answer : ip domain-name
transport input ssh
crypto key generate rsa
Which
commands would you use to determine the IP address and hostname of a
directly connected switch from which you received VLAN information?
(Choose two. Each correct answer is part of the solution.)
Options are :
- show vtp counters
- show cdp neighbor status
- show vtp status
- show cdp neighbors deta
Answer : show vtp status
show cdp neighbors deta
200-105 Interconnecting Cisco Networking Devices Part Exam Set 6
Which of the following commands would allow you to determine the bandwidth of an interface?
Options are :
- show interfaces
- show cdp neighbors
- show interfaces accounting
- show cdp
Answer : show interfaces
A
new switch is added to the network, and several production VLANs are
shut down. Which of the following is a probable cause for this scenario?
(Choose two.)
Options are :
- The new switch is operating in server mode.
- The new switch is operating in transparent mode.
- The new switch has a higher configuration revision number than existing switches
- The new switch has a lower configuration revision number than existing switches.
Answer : The new switch is operating in server mode.
The new switch has a higher configuration revision number than existing switches
What is the default administrative distance of a static route?
Options are :
Answer : 1
642-732 Conducting Cisco Unified Wireless Site Survey Exam Set 4
You
are a network administrator, and you are configuring an access list to
permit Hypertext Transfer Protocol (HTTP) traffic based on the source
and destination IP address of the devices. What access list (ACL),
protocol, and port number will you configure to permit HTTP traffic?
(Choose three.)
Options are :
Answer : Extended
80
TCP
Which
of the following features is used with the ip nat inside command to
translate multiple devices in the internal network to the single address
in the IP address pool?
Options are :
- override
- dynamic
- overload
- static
Answer : overload
A
newly implemented IP-based video conferencing application is causing
the network to slow down. Which OSI layer needs to be addressed to
resolve the problem?
Options are :
- Layer 2
- Layer 4
- Layer 3
- Layer 1
Answer : Layer 1
200-125 Cisco Certified Network Associate Practice Exam Set 1
Which Cisco IOS command allows you to change the setting of the configuration register?
Options are :
- config-register
- configuration-register edit
- edit configuration-register
- boot config
Answer : config-register
Cisco 300-209 Implementing Secure Mobility Solutions Exam Set 6
You
have successfully configured a router, but it prompts you to run Setup
mode every time the router is restarted. Based on the following output,
what could be causing this problem? RouterA# show version Cisco
Internetwork Operating System SoftwareIOS (tm) 2500 Software
(C2500-JS-L), Version 11.3(6), RELEASE SOFTWARE (fc1) Copyright
1986-1998 by Cisco Systems, Inc. Compiled Tue 06-Oct-98 22:17 by kpma
Image text-base: 0x03048CF4, data-base: 0x00001000 ROM: System
Bootstrap, Version 5.2(8a), RELEASE SOFTWARE BOOTFLASH: 3000 Bootstrap
Software (IGS-RXBOOT), Version 10.2(8a), RELEASE SOFTWARE (fc1) RouterA
uptime is 25 minutes System restarted by power-on System image file is
"flash:c2500-js-l_113-6.bin", booted via flash Cisco 2500 (68030)
processor (revision D) with 4096K/2048K bytes of memory. Processor board
ID 04203139, with hardware revision 00000000 Bridging software. X.25
software, Version 3.0.0. SuperLAT software copyright 1990 by Meridian
Technology Corp). TN3270 Emulation software. 2Ethernet/IEEE 802.3
interface(s) 2 Serial network interface(s) 32K bytes of non-volatile
configuration memory. 16384K bytes of processor board System flash (Read
ONLY) Configuration register is 0x2142
Options are :
- The router does not have sufficient flash memory.
- The configuration file could not be found in NVRAM.
- The router could not locate a configuration file over the network.
- The configuration register is incorrect.
Answer : The configuration register is incorrect.
Which
Cisco Internetwork Operating System (IOS) command is used to copy the
configuration stored in Random Access Memory (RAM) to Non-Volatile
Random Access Memory (NVRAM)?
Options are :
- router# copy running-config startup-config
- router# copy startup-config running-config
- router(config)# copy startup-config running-config
- router(config)# copy running-config startup-config
Answer : router# copy running-config startup-config
What configuration is needed to span a user defined Virtual LAN (VLAN) between two or more switches?
Options are :
- A trunk connection should be set up between the switches.
- VTP pruning should be enabled.
- A VTP domain must be configured.
- The VTP mode of operation should be server.
Answer : A trunk connection should be set up between the switches.
200-125 Cisco Certified Network Associate (CCNA) Exam Set 2
Which command would you use to see which interfaces are currently operating as trunks?
Options are :
- show interfaces trunk
- show trunk interface
- show switchport trunk
- show interface switchports
Answer : show interfaces trunk
You
are the network administrator for your company. You wanted to connect
the host computers to the switches. Which cable should you use to ensure
the connectivity?
Options are :
- Rollover cable
- Straight-through cable
- Serial cable
- Crossover cable
Answer : Straight-through cable
Which of the following is NOT a VLAN Trunking Protocol (VTP) mode of operation?
Options are :
- transparent
- server
- virtual
- client
Answer : virtual
Cisco Data Center Architecture Set 5
Which command(s) will enable you to configure only serial interface 0 on a Cisco router?
Options are :
- router(config-if)#interface serial 0
- router>interface serial 0
- router(config)#interface serial 0
- router#interface serial 0
Answer : router(config-if)#interface serial 0
router(config)#interface serial 0
You
are the network administrator for your company. You are in the process
of verifying the configuration of the network devices to ensure smooth
network connectivity. You want information on the routes taken by
packets so that you are able to identify the network points where
packets are getting dropped. Which Cisco IOS command should you use to
accomplish this task in the most efficient manner?
Options are :
- tracert
- extended ping
- traceroute
- ping
Answer : traceroute
Which
Cisco Internetwork Operating System (IOS) command is used to save the
running configuration to non-volatile random access memory (NVRAM)?
Options are :
- copy startup-config running-config
- copy running-config startup-config
- move startup-config running-config
- move startup-config running-config
Answer : copy running-config startup-config
Cisco 210-060 Implement Collaboration Device Practice Exam Set 7
In
which of the following IPv6 address assignment methods will the
interface receive its IPv6 address from a process native to IPv6, and
receive additional parameters from DHCP?
Options are :
- Stateless autoconfiguration
- Stateful DHCPv6
- DHCPv6-PD
- Stateless DHCPv6
Answer : Stateless DHCPv6
A
device has an address of 192.168.144.21 and a mask of 255.255.255.240.
What will be the broadcast address for the subnet to which this device
is attached?
Options are :
- 192.168.144.23
- 192.168.144.32
- 192.168.144.31
- 192.168.144.28
Answer : 192.168.144.31
You
have a router that is not syncing with its configured time source.
Which of the following is NOT a potential reason for this problem?
Options are :
- The reported stratum of the time source is 12
- There is an access list that blocks port 123
- NTP authentication is failing
- The IP address configured for the time source is incorrect
Answer : The reported stratum of the time source is 12
400-101 CCIE Routing and Switching Written Practice Exam Set 4
Which keywords can be substituted for access list wildcards while configuring access lists? (Choose two.)
Options are :
Answer : host
any
Which three statements are TRUE regarding static route assignments? (Choose three.)
Options are :
- Static routes are used to discover the network destinations automatically.
- Static routes are manually configured on the router.
- A single static route cannot respond to network outages.
- Static routes respond to network outages.
- Static routes are not removed from the routing table if the interface goes down.
- Static routes are removed from the routing table if the interface goes down.
Answer : Static routes are manually configured on the router.
A single static route cannot respond to network outages.
Static routes are removed from the routing table if the interface goes down.
Examine
the following partial output of the show interfaces command. Router#
show interfaces ethernet 0/0 Ethernet0/0 is administratively down, line
protocol is down Hardware is AmdP2, address is 0003.e39b.9220 (bia
0003.e39b.9220) Internet address is 10.1.0.254/16 MTU 1500 bytes, BW
10000 Kbit, DLY 1000 usec, reliability 255/255, txload 1/255, rxload
1/255 Encapsulation ARPA, loopback not set Keepalive set (10 sec) ARP
type: ARPA, ARP Timeout 04:00:00 <> Which of the following
statements are true? (Choose all that apply.)
Options are :
- the interface needs the no shutdown command executed to be functional
- the largest frame allowed through this connection is 10000 Kbs
- the largest frame allowed through this connection is 1500 bytes
- the interface is functional
Answer : the interface needs the no shutdown command executed to be functional
the largest frame allowed through this connection is 1500 bytes
200-310 Designing for Cisco Inter network Solutions Exam Set 5
Which Cisco IOS command can be used to troubleshoot switch startup problems on a Cisco Catalyst 2950 switch?
Options are :
- show post
- show diagnostic
- show test
- show switchstartup
Answer : show post
Which feature enables a host to obtain an IP address from a DHCP server on another subnet?
Options are :
- DHCP BOOTP relay
- DHCP relay protocol
- DHCP relay agent
- DHCP BOOTP agent
Answer : DHCP relay agent
Which
command would be used to establish static translation between an inside
local address 192.168.144.25 and an inside global address
202.56.63.102?
Options are :
- router(config)#ip nat inside source static 192.168.144.25 202.56.63.102
- router(config)#ip nat inside static source 192.168.144.25 202.56.63.102
- router(config)#ip source natinside static local-ip 192.168.144.25 global-ip 202.56.63.102
- router(config)#ip nat static inside source 192.168.144.25 202.56.63.102
Answer : router(config)#ip nat inside source static 192.168.144.25 202.56.63.102
Cisco CCNP Route 300-101 Practice Tests Set 5
Which of the following values will be used by a router to make a routing decision when two routes have been learned from OSPF?
Options are :
- cost
- administrative distance
- composite metric
- hop count
Answer : cost
Which
of the following methods will ensure that only one specific host can
connect to port F0/1 on a switch? (Choose two. Each correct answer is a
separate solution.)
Options are :
- Configure an inbound access control list on port F0/1 limiting traffic to the IP address of the host.
- Configure port security on F0/1 to accept traffic only from the MAC address of the host
- Configure the MAC address of the host as a static entry associated with port F0/1.
- Configure port security on F0/1 to forward traffic to a destination other than that of the MAC address of the host.
Answer : Configure port security on F0/1 to accept traffic only from the MAC address of the host
Configure the MAC address of the host as a static entry associated with port F0/1.
You
know that Router2 is configured for RIP. Which Cisco Internetwork
Operating System (IOS) command is used to view the current state of all
active routing protocols?
Options are :
- show ip protocols
- show ip routing process
- show ip arp
- debug ip rip
Answer : show ip protocols
200-125 Cisco Certified Network Associate Practice Exam Set 8
Two
catalyst switches on a LAN are connected to each other with redundant
links and have Spanning Tree Protocol (STP) disabled. What problem could
occur from this configuration?
Options are :
- It may cause broadcast storms.
- All ports on both switches may change to a forwarding state.
- It may cause a collision storm.
- These switches will not forward VTP information
Answer : It may cause broadcast storms.
Which two are the limitations of the service password-encryption command? (Choose two.)
Options are :
- The algorithm used by this command cannot protect the configuration files against detailed analysis by attackers.
- An observer cannot read the password when looking at the administrator's screen.
- It uses the MD5 algorithm for password hashing.
- It uses the Vigenere cipher algorithm.
Answer : The algorithm used by this command cannot protect the configuration files against detailed analysis by attackers.
It uses the Vigenere cipher algorithm.
When
a packet is forwarded through a network from one host to another host,
which of the following fields in the Ethernet frame will change at every
hop?
Options are :
- Source port number
- Source IP address
- Destination IP address
- Destination MAC address
Answer : Destination MAC address
200-125 Cisco Certified Network Associate Practice Exam Set 9
You
are considering a candidate for a job as a Cisco network technician. As
part of the assessment process, you ask the candidate to write down the
commands required to configure a serial interface, in the proper order
with the correct command prompts. The candidate submits the set of
commands shown below (line numbers are for reference only): 1 Router#
configure terminal 2 Router(config)# interface S0 3 Router(config)# ip
address 192.168.5.5 4 Router(config-if)# enable interface 5
Router(config-if)# description T1 to Raleigh What part(s) of this
submission are incorrect? (Choose all that apply.)
Options are :
- The prompt is incorrect on line 1
- The prompt is incorrect on line 5
- The command on line 4 is incorrect
- The IP address is missing a subnet mask
- The prompt is incorrect on line 3
Answer : The command on line 4 is incorrect
The IP address is missing a subnet mask
The prompt is incorrect on line 3
Which
Ethernet LAN contention or access method listens for a signal on the
channel before transmitting data, and stops transmitting if a collision
is detected?
Options are :
- CSMA/CD
- CSMA/CB
- CSMA/CA
- CSMA/CS
Answer : CSMA/CD
Which of the following is NOT an advantage of static routes over dynamic routing protocols?
Options are :
- Bandwidth is not consumed by route advertisements between network devices.
- Static route configuration is more fault tolerant than dynamic routing protocols
- Routing protocol overhead is not generated by the router
- Static routes are easier to configure and troubleshoot than dynamic routing protocols.
Answer : Static route configuration is more fault tolerant than dynamic routing protocols
200-125 Cisco Certified Network Associate Practice Exam Set 11
Which feature is NOT provided by flow control?
Options are :
- windowing
- full duplex transmission
- buffering
- source-quench messaging
Answer : full duplex transmission
Which Cisco Internetwork Operating System (IOS) command is used to apply an access list to an interface?
Options are :
- router(config-if)# ip access-lis
- router(config)# ip access-group
- router(config-if)# ip access-group
- router(config)# ip access-list
Answer : router(config-if)# ip access-group
A
host is powered up, but the connected switch port does not turn amber
or green. Which of the following methods would you use to troubleshoot
the situation? (Choose three. Each answer is a complete solution.)
Options are :
- Ensure that the cable is straight-through.
- Reseat the cable.
- Ensure that the cable is crossover.
- Ensure the switch is powered up
- Reinstall Windows on the workstation.
Answer : Ensure that the cable is straight-through.
Reseat the cable.
Ensure the switch is powered up
Which
type of switching process requires a switch to wait for the entire
frame to be received before forwarding it to a destination port?
Options are :
- cut-through
- frame-forward
- fragment free
- store and forward
Answer : store and forward
200-125 CCNA Cisco Certified Network Associate Test Set 2
Router-A#
show running-configuration s0/0 interface serial0/0 description
connected to router A IP address 10.10.10.1 255.0.0.0 encapsulation
frame-relay shutdown clock rate 64000 Based on the interface
configuration provided, which two statements are TRUE? (Choose two.)
Options are :
- The router's serial interface connects using the point-to-point protocol.
- The router's serial interface is administratively down.
- The router's serial interface is connected using a DCE cable
- The router's serial interface is connected using a DTE cable.
Answer : The router's serial interface is administratively down.
The router's serial interface is connected using a DCE cable
Which Cisco IOS command is used to view the information about the interfaces on which Cisco Discovery Protocol (CDP) is enabled?
Options are :
- show cdp
- show interfaces
- show cdp interface
- show cdp interfaces
Answer : show cdp interface
You
are the network administrator for your company and have configured
Cisco Discovery Protocol (CDP) in your network. You recently noticed
that when devices send large numbers of CDP neighbor announcements, some
devices are crashing. You decide to disable CDP on the router. Which
command should you use to achieve the objective?
Options are :
- no cdp enable
- no cdp run
- set cdp disable
- no cdpadvertise-v2
Answer : no cdp run
Cisco 100-101 Interconnecting Cisco Networking Devices Exam Set 1
You
are the network administrator for your company and have configured
Cisco Discovery Protocol (CDP) in your network. You recently noticed
that when devices send large numbers of CDP neighbor announcements, some
devices are crashing. You decide to disable CDP on the router. Which
command should you use to achieve the objective?
Options are :
- no cdp run
- set cdp disable
- no cdp advertise-v2
- no cdp enable
Answer : no cdp run
You
are the senior network administrator for a large corporation. Some new
trainees have recently joined the network security team. You are
educating them about denial-of-service (DoS) attacks and the risks posed
to a network by such attacks. Which three are risks that a DoS attack
poses to a network? (Choose three.)
Options are :
- Spread of viruses
- Information theft
- Revenue loss
- Downtime and productivity loss
Answer : Information theft
Revenue loss
Downtime and productivity loss
Which of the following commands is used to verify the link-local, global unicast, and multicast addresses of an IPv6 router?
Options are :
- show ipv6 route
- show ipv6 protocols
- show ipv6 interface
- show ipv6 neighbors (only link-local addresses)
Answer : show ipv6 interface
200-105 Interconnecting Cisco Networking Devices Part Exam Set 3
Which of the following statements are TRUE regarding Cisco access lists? (Choose two.)
Options are :
- When a line is added to an existing access list, it is inserted at the beginning of the access list.
- Extended access lists are used to filter protocol-specific packets.
- You must specify a deny statement at the end of each access list to filter unwanted traffic.
- In an inbound access list, packets are filtered before they exit an interface.
- In an inbound access list, packets are filtered as they enter an interface
Answer : Extended access lists are used to filter protocol-specific packets.
In an inbound access list, packets are filtered as they enter an interface
Which Cisco IOS command disables Cisco Discovery Protocol Version 2 (CDPv2) advertisements?
Options are :
- no cdp enable
- no cdp v2-advertise
- no cdp advertise-v2
- no cdp run
Answer : no cdp advertise-v2
Which Cisco IOS Cisco Discovery Protocol (CDP) command displays the IP address of the directly connected Cisco devices?
Options are :
- show cdp
- show cdp traffic
- show cdp devices
- show cdp neighbors detail
Answer : show cdp neighbors detail
300-320 Designing Cisco Network Service Architectures Exam Set 5
Which of the following statements are true of Class C IP addresses?
Options are :
- The decimal values of the first octet can range from 192to 223
- The first octet represents the entire network portion of the address
- The first three octets represent the entire network portion of the address
- The value of the first binary place in the first octet must be 0
- The decimal values of the first octet can range from 1 to 126
- The value of the first two binary places in the first octet must be 11
Answer : The decimal values of the first octet can range from 192to 223
The first three octets represent the entire network portion of the address
The value of the first two binary places in the first octet must be 11
Your
assistant just entered the following command on a router:
R67(config)#logging trap 0 Which of the following levels will be
trapped? (Choose all that apply.)
Options are :
- Alert
- Critical
- Emergency
- Error
Answer : Emergency
During
the process of connecting four switches to the central router and
implementing VLANS between the devices, it becomes apparent that there
was a misunderstanding about which encapsulation protocol to use on the
links between the switches and the router. If there is mismatch between
the encapsulation types used on the router interface and the type used
on the connected switch port, what will be the result?
Options are :
- The relevant switch ports will be green and flashing.
- The relevant switch ports will be amber.
- The relevant switch ports will be neither green nor amber
- The relevant switch ports will be green.
Answer : The relevant switch ports will be neither green nor amber
200-105 Interconnecting Cisco Networking Devices Part Exam Set 4
Which trunk encapsulation defines one VLAN on each trunk as a native VLAN?
Options are :
- auto
- ISL
- IEEE 802.1q
- IEEE 802.11a
Answer : IEEE 802.1q
How
many collision domains are in a LAN with four hubs and two bridges that
are connected directly to each other, as shown in the following figure?
(Click the Exhibit(s) button.)
Options are :
Answer : five
A
packet is received with a destination IP address of 10.2.16.10. What
would the next hop IP address be for this packet? Router# show ip route
<> D 10.0.0.0 /8 [90/2172515] via 192.168.1.10, 00:00:44,
Serial0/0 D 10.1.0.0 /16 [90/2144425] via 192.168.1.10, 00:01:03,
Serial0/0 C 192.168.1.0 is directly connected, Serial0/0 C 192.168.4.0
is directly connected, Serial0/1 D 10.2.16.0 /24 [90/2162425] via
192.168.4.2, 00:00:25, Serial0/1 C 192.168.10.0 is directly connected,
Serial1/0 D 10.2.32.0 /24 [90/2172425] via 192.168.10.254, 00:00:21,
Serial1/0 90/2172425] via 192.168.1.10, 00:03:33:, Serial0/1
Options are :
- 192.168.1.10
- 192.168.10.254
- None; the packet will be dropped.
- 192.168.4.2
Answer : 192.168.4.2
Cisco Data Center Architecture Set 5
Which of the following NAT terms refers to a registered address that represents an inside host to an outside network?
Options are :
- outside local
- inside local
- outside global
- inside global
Answer : inside global
In
what order are the lines of an access list read when an access list is
applied to a router interface? (Choose all that apply.)
Options are :
- Bottom to top, if it is an extended access list
- Bottom to top, if it is a standard access list
- Top to bottom it is an extended access list
- Top to bottom if it is a standard access list
Answer : Top to bottom it is an extended access list
Top to bottom if it is a standard access list
esterday
one of your associates made some changes to the syslog configuration on
the router R69. Today, while working on the router you received this
syslog message: 000019: %SYS-5-CONFIG_I: Configured from console by vty2
(10.34.195.36) Based on this output, which of the following commands
did the associate execute?
Options are :
- service timestamps log
- logging console 4
- service sequence-numbers
- service timestamps log datetime msec
Answer : service sequence-numbers
200-310 Designing for Cisco Inter network Solutions Exam Set 5
You
are the network administrator for your company. You have been assigned
the task of configuring an appropriate IP addressing scheme in the
network. Assuming that the network address is 192.16.100.0/28, what will
be the number of hosts per network in this scenario?
Options are :
Answer : 14
200-310 Designing for Cisco Inter network Solutions Exam Set 3
What is the purpose of frame tagging in Virtual LAN (VLAN) configurations?
Options are :
- frame identification over access links
- encryption of network packets
- inter-VLAN routing
- frame identification over trunk links
Answer : frame identification over trunk links
Which of the following is the correct command to define a default route using a gateway address of 172.16.0.254?
Options are :
- default-gateway 172.16.0.254
- ip route default 172.16.0.254
- ip default-route 172.16.0.254 255.255.0.0
- ip route 0.0.0.0 0.0.0.0 172.16.0.254
Answer : ip route 0.0.0.0 0.0.0.0 172.16.0.254
File
Transfer Protocol (FTP) and Simple Mail Transfer Protocol (SMTP) work
at which layer in the Open Systems Interconnection (OSI) model?
Options are :
- the Network layer
- the Presentation layer
- the Application layer
- the Session layer
Answer : the Application layer
642-732 Conducting Cisco Unified Wireless Site Survey Exam Set 1
Which Cisco IOS command will enable a switch to copy the configuration from NVRAM to its RAM?
Options are :
- copy running-config flashC copy startup-config flash
- copy running-config startup config
- copy tftp flash
- copystartup-config running-config
Answer : copy running-config startup config
Which is NOT a valid range for private IP addresses?
Options are :
- 172.16.0.0 - 172.31.255.255
- 192.255.255.255-193.0.0.0
- 10.0.0.0 - 10.255.255.255
- 192.168.0.0 - 192.168.255.255
Answer : 192.255.255.255-193.0.0.0
Which of the following commands helps you determine the Layer 1 and Layer 2 up/down status of a Cisco interface?
Options are :
- show running-config
- show controllers
- show interfaces trunk
- show interfaces
Answer : show interfaces
200-105 Inter connecting Cisco Networking Devices Exam Set 3
Which Cisco Internetwork Operating System (IOS) command is used to encrypt passwords on Cisco routers?
Options are :
- enable password
- service encryption-password
- service password-encryption
- password secure
Answer : service password-encryption
Which of the following fields are in a Transmission Control Protocol (TCP) header? (Choose three.)
Options are :
- Type-of-Service
- Length
- Sequence Number
- Window
- Data Offset
Answer : Sequence Number
Window
Data Offset
What
IOS command produced the following output? Vlan Mac Address Type Ports
---- ------------ ------- ----- 1 0040.63d8.ba0a DYNAMIC Fa0/1 1
0004.274c.9ca0 DYNAMIC Fa0/3 1 0040.63d8.bab8 DYNAMIC Fa0/10 1
000f.1fd3.d85a DYNAMIC Fa0/7
Options are :
- show ip interface
- show interface mac
- show mac
- show mac-address-table
Answer : show mac-address-table
Which Cisco Internetwork Operating System (IOS) command would be used to set the privileged mode password to "cisco"?
Options are :
- router# enable secret cisco
- router(config)# line password cisco
- router(config)# enable password cisco
- router(config-router)# enable password cisco
Answer : router(config)# enable password cisco
ICND2 200-105 Certification Practice Tests Set 3
The
conference room has a switch port available for use by the presenter
during classes. Each presenter uses the same PC attached to the port.
You would like to prevent any other PCs from using that port. You have
completely removed the former configuration in order to start anew.
Which of the following steps are required to prevent any other PCs from
using that port?
Options are :
- . make the port an access port
- assign the MAC address of the PC to the port
- make the port a trunk port
- enable port security
Answer : . make the port an access port
assign the MAC address of the PC to the port
enable port security
Which of the following statements are true of Class C IP addresses?
Options are :
- The decimalvalues of the first octet can range from 192 to 223
- The first three octets represent the entire network portion ofthe address
- The value of the first binary place in the first octet must be 0
- The first octet represents the entire network portion of the address
- The value of the first two binary places in the first octet must be 11
- The decimal values of the first octet can range from 1 to 126
Answer : The decimalvalues of the first octet can range from 192 to 223
The first three octets represent the entire network portion ofthe address
The value of the first two binary places in the first octet must be 11
Which of the following topologies is used in Wide Area Networks (WANs)?
Options are :
- CDDI
- FDDI
- SONET
- Token Ring
Answer : SONET
200-105 Interconnecting Cisco Networking Devices Part Exam Set 3
Which Cisco Internetwork Operating System (IOS) command can be used to configure the location of the configuration file?
Options are :
- service config
- configure
- boot config
- boot buffersize
Answer : boot config
Which command will allow host 192.168.144.25 to have Telnet access to network 172.16.0.0?
Options are :
- access-list 150 permit udp 192.168.144.25 0.0.0.0 172.16.0.0 0.0.255.255 eq 23
- access-list 150 permit tcp 192.168.144.25 0.0.0.0 172.16.0.0 0.0.255.255 eq 23
- access-list 150 permit tcp 192.168.144.25 0.0.0.0 172.16.0.0 0.0.255.255 eq 21
- access-list 15 permit tcp 192.168.144.25 0.0.0.0 172.16.0.0 0.0.255.255 eq 23
Answer : access-list 150 permit tcp 192.168.144.25 0.0.0.0 172.16.0.0 0.0.255.255 eq 23
Which of the following is a frame tagging method for identifying Virtual LAN (VLAN) memberships over trunk links?
Options are :
Answer : 802.1q
100-105 Net Cert Interconnecting Cisco Networking Exam Set 3
You
have multiple departments sharing a common network. You are concerned
about network traffic from one department reaching another department.
What would be a solution for isolating the departments? (Choose all that
apply.)
Options are :
- Put each department in a separate collision domain.
- Configure trunk links between departmental switches
- Configure separate subnets for each department
- Assign a unique VTP domain for each department.
- Configure separate VLANs for each department.
Answer : Configure separate subnets for each department
Configure separate VLANs for each department.
Which
of the following statements are NOT part of the guidelines for
configuring VLAN Trunking Protocol (VTP) to ensure that VLAN information
is distributed to all Cisco switches in the network? (Choose all that
apply.)
Options are :
- The VTP password must be the same on all switches in a VTP domain.
- The VTP version must be the same on all switches in a VTP domain.
- VLANs configured on clients should exist on the server switch.
- The VTP domain name must be the same on all switches in a VTP domain.
- The configuration revision number must be configured identically on all switches in a VTP domain.
Answer : VLANs configured on clients should exist on the server switch.
The configuration revision number must be configured identically on all switches in a VTP domain.
Which type of network connection requires a straight-through cable?
Options are :
- host to router's Ethernet port
- host to host
- switch to switch
- switch to router
Answer : switch to router
Cisco 210-060 Implement Collaboration Device Practice Exam Set 1
You
have been asked to troubleshoot the NTP configuration of a router named
R70. After executing the show run command, you receive the following
partial output of the command that shows the configuration relevant to
NTP: clock timezone PST -8 clock summer-time PDT recurring ntp
update-calendar ntp server 192.168.13.57 ntp server 192.168.11.58
interface Ethernet 0/0 ntp broadcast Based on this output, which of the
following statements is true?
Options are :
- the router will periodically update its software clock
- the router will listen for NTP broadcasts on interface E0/0
- the router will send NTP broadcasts on interface E0/0
- the time zone is set to 8 hours less than Pacific Standard time
Answer : the router will send NTP broadcasts on interface E0/0
You
are the network administrator for your company. You have installed a
new router in your network. You want to establish a remote connection
from your computer to the new router so it can be configured. You are
not concerned about security during the remote connection. Which Cisco
IOS command should you use to accomplish the task?
Options are :
- ssh
- virtual
- terminal
- telnet
Answer : telnet
Which two are TRUE of straight-through cable? (Choose two.)
Options are :
- You can connect a hub to a switch using a straight through cable.
- The wires on the cable are crossed over.
- You can connect two routers using a straight-through cable.
- It is also known as a patch cable.
- You can connect a switch to a router using a straight through cable.
Answer : It is also known as a patch cable.
You can connect a switch to a router using a straight through cable.
200-125 Cisco Certified Network Associate Practice Exam Set 4
What is the primary benefit of the Virtual Local Area Network (VLAN) Trunking Protocol (VTP)?
Options are :
- consistent VLAN configuration across switches in a domain
- frame tagging
- broadcast control
- inter-VLAN routing
Answer : consistent VLAN configuration across switches in a domain
Which of the following represents the correct method of assigning an IP address and default gateway to a switch?
Options are :
- Switch(config)# interface vlan1Switch(config-if)# ip address 10.0.0.1 255.0.0.0Switch(config-if)# default-gateway 10.0.0.254
- Switch(config)# ip address 10.0.0.1 255.0.0.0Switch(config)# interface vlan1Switch(config)# ip default-gateway 10.0.0.254
- Switch(config)# ip default-gateway 10.0.0.254Switch(config)# interface vlan1Switch(config-if)# ip address 10.0.0.1 255.0.0.0
- Switch(config)# ip address 10.0.0.1 255.0.0.0Switch(config)# default-gateway 10.0.0.254
Answer : Switch(config)# ip default-gateway 10.0.0.254Switch(config)# interface vlan1Switch(config-if)# ip address 10.0.0.1 255.0.0.0
From which of the following attacks can Message Authentication Code (MAC) shield your network?
Options are :
- spoofing
- DoS
- DDoS
- SYN floods
Answer : spoofing
200-125 Cisco Certified Network Associate (CCNA) Exam Set 6
In
the following partial output of the show ip route command, what does
the letter D stand for? D 192.1.2.0/24 via 5.1.1.71 [w:0 m:0] C
192.8.1.1/32 directly connected to loopback 0
Options are :
- This is an EIGRP route
- This is a directly connected route
- This is a default route
- This is static route
Answer : This is an EIGRP route
Which
is the shortest possible notation of the following Internet Protocol
version 6 (IPv6) address? 2001:0DB8:0000:0001:0000:0000:0000:F00D
Options are :
- 2001:DB8:0:1::F00D
- 2001:0DB8:0:1::F00D
- 2001:DB8::1::F00D
- 2001:DB8:0:1:0:0:0:F00D
Answer : 2001:DB8:0:1::F00D
When are packets processed by an outbound access list?
Options are :
- After they are routed to an outbound interface
- Before they are routed to an inbound interface
- After they are routed to an inbound interface
- Before they are routed to an outbound interface
Answer : After they are routed to an outbound interface
642-732 Conducting Cisco Unified Wireless Site Survey Exam Set 4
In which of the following networks does the address 192.168.54.23/27 reside?
Options are :
- 192.168.54.16
- 192.168.54.4
- 192.168.54.0
- 192.168.54.8
Answer : 192.168.54.0
200-125 Cisco Certified Network Associate Practice Exam Set 1
Which
two statements represent physical security guidelines that should be
followed during Cisco security deployment? (Choose two.)
Options are :
- Simple Network Management Protocol version 3 (SNMPv3) should be used for security and privacy features.
- Images should be managed using File Transfer Protocol (FTP) and Secure FTP (SFTP) instead of Trivial File Transfer Protocol (TFTP).
- Network equipment should be accessed remotely with Secure Socket Layer (SSL) instead of Telnet.
- Potential security breaches should be evaluated.
- The potential impact of stolen network resources and equipment should be assessed.
Answer : Potential security breaches should be evaluated.
The potential impact of stolen network resources and equipment should be assessed.
Which statement best describes a converged network?
Options are :
- a network with real-time applications
- a network with mix of data and video traffic
- a network with a mix of voice, video, and data traffic
- a network with a mix of voice, video, and data traffic
Answer : a network with a mix of voice, video, and data traffic
Which two are NOT features of Cisco NAT implementation? (Choose two.)
Options are :
- overrule
- overload
- dynamic NAT
- override
- static NAT
Answer : overrule
override
200-125 Cisco Certified Network Associate Practice Exam Set 7
Which
of the following represent valid ranges of access list numbers on a
Cisco router for an Internet Protocol (IP) standard access list? (Choose
all that apply.)
Options are :
- 2000 - 2699
- 100 - 199
- 1300 - 1999
- Jan-99
Answer : 1300 - 1999
Jan-99
You
are working with an Internet Service Provider (ISP) as network manager.
A corporate client approaches you to lease a public IP subnet that can
accommodate 250 users. You have assigned him the 192.25.27.0 subnet.
What subnet mask should be assigned to this IP address so that it can
accommodate the number of users required by the corporate client?
Options are :
- 255.255.255.128
- 255.255.255.224
- 255.255.255.252
- 255.255.255.0
Answer : 255.255.255.0
Which
layer in the Open Systems Interconnection (OSI) model defines an
Internet Protocol (IP) address that helps in selecting the route to the
destination?
Options are :
- Transport
- Data Link
- Network
- Application
Answer : Network
Cisco 210-060 Implement Collaboration Device Practice Exam Set 3
Which device will always have all of its ports in the same collision domain?
Options are :
Answer : Hub
How would you stop an unauthorized user from establishing a Telnet connection to your router? (Choose two.)
Options are :
- Configure an access control list and apply it to the virtual terminal lines using the access-class command.
- Configure a console login process and password.
- Configure a virtual terminal login process and password.
- Configure an access control list and apply it to the virtual terminal lines using the ip access-group command.
Answer : Configure an access control list and apply it to the virtual terminal lines using the access-class command.
Configure a virtual terminal login process and password.
As
part of a new initiative to tighten the security of your Cisco devices,
you have configured the firewall to restrict access to the devices from
the outside. What would be other recommended ways of protecting the
integrity of the device configuration files on the devices while
ensuring your continued ability to manage the devices remotely? (Choose
all that apply.)
Options are :
- encrypt the configuration files
- disable the VTY ports on the devices
- prevent the loss of administrator passwords by disabling their encryption
- use an encrypted password for VTY access
- use SSH to connect to the devices for management
Answer : use an encrypted password for VTY access
use SSH to connect to the devices for management
400-101 CCIE Routing and Switching Written Practice Exam Set 2
You
are the network administrator for your company. You want to restrict
all ping attempts from outside your company from reaching internal
hosts. Your internal network is using the IP network of 200.15.24.0/24.
Which command should be executed on the corporate boundary router to
accomplish the task?
Options are :
- router(config)# access-list 100 deny icmp any 200.15.24.0 0.0.0.255 eq echo
- router(config)# access-list 1 deny icmp any 200.15.24.0 0.0.0.255 eq ping
- router(config)# access-list 1 deny tcp any 200.15.24.0 0.0.0.255 eq ping
- router(config)# access-list 100 deny tcp any 200.15.24.0 /24 eq echo
Answer : router(config)# access-list 100 deny icmp any 200.15.24.0 0.0.0.255 eq echo