100-105 Net Cert Interconnecting Cisco Networking Exam Set 1

In the following partial output of the show ip route command, what does the letter D stand for? D 192.1.2.0/24 via 5.1.1.71 [w:0 m:0] C 192.8.1.1/32 directly connected to loopback 0


Options are :

  • This is a default route
  • This is static route
  • This is an EIGRP route
  • This is a directly connected route

Answer : This is an EIGRP route

You wish to configure Secure Shell (SSH) support on your router so that incoming VTY connections are secure. Which of the following commands must be configured? (Choose all that apply.)


Options are :

  • ip domain-name
  • ip access-group
  • transport input ssh
  • crypto key generate rsa

Answer : ip domain-name transport input ssh crypto key generate rsa

Which commands would you use to determine the IP address and hostname of a directly connected switch from which you received VLAN information? (Choose two. Each correct answer is part of the solution.)


Options are :

  • show vtp counters
  • show cdp neighbor status
  • show vtp status
  • show cdp neighbors deta

Answer : show vtp status show cdp neighbors deta

200-105 Interconnecting Cisco Networking Devices Part Exam Set 6

Which of the following commands would allow you to determine the bandwidth of an interface?


Options are :

  • show interfaces
  • show cdp neighbors
  • show interfaces accounting
  • show cdp

Answer : show interfaces

A new switch is added to the network, and several production VLANs are shut down. Which of the following is a probable cause for this scenario? (Choose two.)


Options are :

  • The new switch is operating in server mode.
  • The new switch is operating in transparent mode.
  • The new switch has a higher configuration revision number than existing switches
  • The new switch has a lower configuration revision number than existing switches.

Answer : The new switch is operating in server mode. The new switch has a higher configuration revision number than existing switches

What is the default administrative distance of a static route?


Options are :

  • 1
  • 0
  • 90
  • 110

Answer : 1

642-732 Conducting Cisco Unified Wireless Site Survey Exam Set 4

You are a network administrator, and you are configuring an access list to permit Hypertext Transfer Protocol (HTTP) traffic based on the source and destination IP address of the devices. What access list (ACL), protocol, and port number will you configure to permit HTTP traffic? (Choose three.)


Options are :

  • 23
  • Extended
  • UDP
  • 80
  • TCP

Answer : Extended 80 TCP

Which of the following features is used with the ip nat inside command to translate multiple devices in the internal network to the single address in the IP address pool?


Options are :

  • override
  • dynamic
  • overload
  • static

Answer : overload

A newly implemented IP-based video conferencing application is causing the network to slow down. Which OSI layer needs to be addressed to resolve the problem?


Options are :

  • Layer 2
  • Layer 4
  • Layer 3
  • Layer 1

Answer : Layer 1

200-125 Cisco Certified Network Associate Practice Exam Set 1

Which Cisco IOS command allows you to change the setting of the configuration register?


Options are :

  • config-register
  • configuration-register edit
  • edit configuration-register
  • boot config

Answer : config-register

Cisco 300-209 Implementing Secure Mobility Solutions Exam Set 6

You have successfully configured a router, but it prompts you to run Setup mode every time the router is restarted. Based on the following output, what could be causing this problem? RouterA# show version Cisco Internetwork Operating System SoftwareIOS (tm) 2500 Software (C2500-JS-L), Version 11.3(6), RELEASE SOFTWARE (fc1) Copyright 1986-1998 by Cisco Systems, Inc. Compiled Tue 06-Oct-98 22:17 by kpma Image text-base: 0x03048CF4, data-base: 0x00001000 ROM: System Bootstrap, Version 5.2(8a), RELEASE SOFTWARE BOOTFLASH: 3000 Bootstrap Software (IGS-RXBOOT), Version 10.2(8a), RELEASE SOFTWARE (fc1) RouterA uptime is 25 minutes System restarted by power-on System image file is "flash:c2500-js-l_113-6.bin", booted via flash Cisco 2500 (68030) processor (revision D) with 4096K/2048K bytes of memory. Processor board ID 04203139, with hardware revision 00000000 Bridging software. X.25 software, Version 3.0.0. SuperLAT software copyright 1990 by Meridian Technology Corp). TN3270 Emulation software. 2Ethernet/IEEE 802.3 interface(s) 2 Serial network interface(s) 32K bytes of non-volatile configuration memory. 16384K bytes of processor board System flash (Read ONLY) Configuration register is 0x2142


Options are :

  • The router does not have sufficient flash memory.
  • The configuration file could not be found in NVRAM.
  • The router could not locate a configuration file over the network.
  • The configuration register is incorrect.

Answer : The configuration register is incorrect.

Which Cisco Internetwork Operating System (IOS) command is used to copy the configuration stored in Random Access Memory (RAM) to Non-Volatile Random Access Memory (NVRAM)?


Options are :

  • router# copy running-config startup-config
  • router# copy startup-config running-config
  • router(config)# copy startup-config running-config
  • router(config)# copy running-config startup-config

Answer : router# copy running-config startup-config

What configuration is needed to span a user defined Virtual LAN (VLAN) between two or more switches?


Options are :

  • A trunk connection should be set up between the switches.
  • VTP pruning should be enabled.
  • A VTP domain must be configured.
  • The VTP mode of operation should be server.

Answer : A trunk connection should be set up between the switches.

200-125 Cisco Certified Network Associate (CCNA) Exam Set 2

Which command would you use to see which interfaces are currently operating as trunks?


Options are :

  • show interfaces trunk
  • show trunk interface
  • show switchport trunk
  • show interface switchports

Answer : show interfaces trunk

You are the network administrator for your company. You wanted to connect the host computers to the switches. Which cable should you use to ensure the connectivity?


Options are :

  • Rollover cable
  • Straight-through cable
  • Serial cable
  • Crossover cable

Answer : Straight-through cable

Which of the following is NOT a VLAN Trunking Protocol (VTP) mode of operation?


Options are :

  • transparent
  • server
  • virtual
  • client

Answer : virtual

Cisco Data Center Architecture Set 5

Which command(s) will enable you to configure only serial interface 0 on a Cisco router?


Options are :

  • router(config-if)#interface serial 0
  • router>interface serial 0
  • router(config)#interface serial 0
  • router#interface serial 0

Answer : router(config-if)#interface serial 0 router(config)#interface serial 0

You are the network administrator for your company. You are in the process of verifying the configuration of the network devices to ensure smooth network connectivity. You want information on the routes taken by packets so that you are able to identify the network points where packets are getting dropped. Which Cisco IOS command should you use to accomplish this task in the most efficient manner?


Options are :

  • tracert
  • extended ping
  • traceroute
  • ping

Answer : traceroute

Which Cisco Internetwork Operating System (IOS) command is used to save the running configuration to non-volatile random access memory (NVRAM)?


Options are :

  • copy startup-config running-config
  • copy running-config startup-config
  • move startup-config running-config
  • move startup-config running-config

Answer : copy running-config startup-config

Cisco 210-060 Implement Collaboration Device Practice Exam Set 7

In which of the following IPv6 address assignment methods will the interface receive its IPv6 address from a process native to IPv6, and receive additional parameters from DHCP?


Options are :

  • Stateless autoconfiguration
  • Stateful DHCPv6
  • DHCPv6-PD
  • Stateless DHCPv6

Answer : Stateless DHCPv6

A device has an address of 192.168.144.21 and a mask of 255.255.255.240. What will be the broadcast address for the subnet to which this device is attached?


Options are :

  • 192.168.144.23
  • 192.168.144.32
  • 192.168.144.31
  • 192.168.144.28

Answer : 192.168.144.31

You have a router that is not syncing with its configured time source. Which of the following is NOT a potential reason for this problem?


Options are :

  • The reported stratum of the time source is 12
  • There is an access list that blocks port 123
  • NTP authentication is failing
  • The IP address configured for the time source is incorrect

Answer : The reported stratum of the time source is 12

400-101 CCIE Routing and Switching Written Practice Exam Set 4

Which keywords can be substituted for access list wildcards while configuring access lists? (Choose two.)


Options are :

  • all
  • host
  • any
  • range

Answer : host any

Which three statements are TRUE regarding static route assignments? (Choose three.)


Options are :

  • Static routes are used to discover the network destinations automatically.
  • Static routes are manually configured on the router.
  • A single static route cannot respond to network outages.
  • Static routes respond to network outages.
  • Static routes are not removed from the routing table if the interface goes down.
  • Static routes are removed from the routing table if the interface goes down.

Answer : Static routes are manually configured on the router. A single static route cannot respond to network outages. Static routes are removed from the routing table if the interface goes down.

Examine the following partial output of the show interfaces command. Router# show interfaces ethernet 0/0 Ethernet0/0 is administratively down, line protocol is down Hardware is AmdP2, address is 0003.e39b.9220 (bia 0003.e39b.9220) Internet address is 10.1.0.254/16 MTU 1500 bytes, BW 10000 Kbit, DLY 1000 usec, reliability 255/255, txload 1/255, rxload 1/255 Encapsulation ARPA, loopback not set Keepalive set (10 sec) ARP type: ARPA, ARP Timeout 04:00:00 <> Which of the following statements are true? (Choose all that apply.)


Options are :

  • the interface needs the no shutdown command executed to be functional
  • the largest frame allowed through this connection is 10000 Kbs
  • the largest frame allowed through this connection is 1500 bytes
  • the interface is functional

Answer : the interface needs the no shutdown command executed to be functional the largest frame allowed through this connection is 1500 bytes

200-310 Designing for Cisco Inter network Solutions Exam Set 5

Which Cisco IOS command can be used to troubleshoot switch startup problems on a Cisco Catalyst 2950 switch?


Options are :

  • show post
  • show diagnostic
  • show test
  • show switchstartup

Answer : show post

Which feature enables a host to obtain an IP address from a DHCP server on another subnet?


Options are :

  • DHCP BOOTP relay
  • DHCP relay protocol
  • DHCP relay agent
  • DHCP BOOTP agent

Answer : DHCP relay agent

Which command would be used to establish static translation between an inside local address 192.168.144.25 and an inside global address 202.56.63.102?


Options are :

  • router(config)#ip nat inside source static 192.168.144.25 202.56.63.102
  • router(config)#ip nat inside static source 192.168.144.25 202.56.63.102
  • router(config)#ip source natinside static local-ip 192.168.144.25 global-ip 202.56.63.102
  • router(config)#ip nat static inside source 192.168.144.25 202.56.63.102

Answer : router(config)#ip nat inside source static 192.168.144.25 202.56.63.102

Cisco CCNP Route 300-101 Practice Tests Set 5

Which of the following values will be used by a router to make a routing decision when two routes have been learned from OSPF?


Options are :

  • cost
  • administrative distance
  • composite metric
  • hop count

Answer : cost

Which of the following methods will ensure that only one specific host can connect to port F0/1 on a switch? (Choose two. Each correct answer is a separate solution.)


Options are :

  • Configure an inbound access control list on port F0/1 limiting traffic to the IP address of the host.
  • Configure port security on F0/1 to accept traffic only from the MAC address of the host
  • Configure the MAC address of the host as a static entry associated with port F0/1.
  • Configure port security on F0/1 to forward traffic to a destination other than that of the MAC address of the host.

Answer : Configure port security on F0/1 to accept traffic only from the MAC address of the host Configure the MAC address of the host as a static entry associated with port F0/1.

You know that Router2 is configured for RIP. Which Cisco Internetwork Operating System (IOS) command is used to view the current state of all active routing protocols?


Options are :

  • show ip protocols
  • show ip routing process
  • show ip arp
  • debug ip rip

Answer : show ip protocols

200-125 Cisco Certified Network Associate Practice Exam Set 8

Two catalyst switches on a LAN are connected to each other with redundant links and have Spanning Tree Protocol (STP) disabled. What problem could occur from this configuration?


Options are :

  • It may cause broadcast storms.
  • All ports on both switches may change to a forwarding state.
  • It may cause a collision storm.
  • These switches will not forward VTP information

Answer : It may cause broadcast storms.

Which two are the limitations of the service password-encryption command? (Choose two.)


Options are :

  • The algorithm used by this command cannot protect the configuration files against detailed analysis by attackers.
  • An observer cannot read the password when looking at the administrator's screen.
  • It uses the MD5 algorithm for password hashing.
  • It uses the Vigenere cipher algorithm.

Answer : The algorithm used by this command cannot protect the configuration files against detailed analysis by attackers. It uses the Vigenere cipher algorithm.

When a packet is forwarded through a network from one host to another host, which of the following fields in the Ethernet frame will change at every hop?


Options are :

  • Source port number
  • Source IP address
  • Destination IP address
  • Destination MAC address

Answer : Destination MAC address

200-125 Cisco Certified Network Associate Practice Exam Set 9

You are considering a candidate for a job as a Cisco network technician. As part of the assessment process, you ask the candidate to write down the commands required to configure a serial interface, in the proper order with the correct command prompts. The candidate submits the set of commands shown below (line numbers are for reference only): 1 Router# configure terminal 2 Router(config)# interface S0 3 Router(config)# ip address 192.168.5.5 4 Router(config-if)# enable interface 5 Router(config-if)# description T1 to Raleigh What part(s) of this submission are incorrect? (Choose all that apply.)


Options are :

  • The prompt is incorrect on line 1
  • The prompt is incorrect on line 5
  • The command on line 4 is incorrect
  • The IP address is missing a subnet mask
  • The prompt is incorrect on line 3

Answer : The command on line 4 is incorrect The IP address is missing a subnet mask The prompt is incorrect on line 3

Which Ethernet LAN contention or access method listens for a signal on the channel before transmitting data, and stops transmitting if a collision is detected?


Options are :

  • CSMA/CD
  • CSMA/CB
  • CSMA/CA
  • CSMA/CS

Answer : CSMA/CD

Which of the following is NOT an advantage of static routes over dynamic routing protocols?


Options are :

  • Bandwidth is not consumed by route advertisements between network devices.
  • Static route configuration is more fault tolerant than dynamic routing protocols
  • Routing protocol overhead is not generated by the router
  • Static routes are easier to configure and troubleshoot than dynamic routing protocols.

Answer : Static route configuration is more fault tolerant than dynamic routing protocols

200-125 Cisco Certified Network Associate Practice Exam Set 11

Which feature is NOT provided by flow control?


Options are :

  • windowing
  • full duplex transmission
  • buffering
  • source-quench messaging

Answer : full duplex transmission

Which Cisco Internetwork Operating System (IOS) command is used to apply an access list to an interface?


Options are :

  • router(config-if)# ip access-lis
  • router(config)# ip access-group
  • router(config-if)# ip access-group
  • router(config)# ip access-list

Answer : router(config-if)# ip access-group

A host is powered up, but the connected switch port does not turn amber or green. Which of the following methods would you use to troubleshoot the situation? (Choose three. Each answer is a complete solution.)


Options are :

  • Ensure that the cable is straight-through.
  • Reseat the cable.
  • Ensure that the cable is crossover.
  • Ensure the switch is powered up
  • Reinstall Windows on the workstation.

Answer : Ensure that the cable is straight-through. Reseat the cable. Ensure the switch is powered up

Which type of switching process requires a switch to wait for the entire frame to be received before forwarding it to a destination port?


Options are :

  • cut-through
  • frame-forward
  • fragment free
  • store and forward

Answer : store and forward

200-125 CCNA Cisco Certified Network Associate Test Set 2

Router-A# show running-configuration s0/0 interface serial0/0 description connected to router A IP address 10.10.10.1 255.0.0.0 encapsulation frame-relay shutdown clock rate 64000 Based on the interface configuration provided, which two statements are TRUE? (Choose two.)


Options are :

  • The router's serial interface connects using the point-to-point protocol.
  • The router's serial interface is administratively down.
  • The router's serial interface is connected using a DCE cable
  • The router's serial interface is connected using a DTE cable.

Answer : The router's serial interface is administratively down. The router's serial interface is connected using a DCE cable

Which Cisco IOS command is used to view the information about the interfaces on which Cisco Discovery Protocol (CDP) is enabled?


Options are :

  • show cdp
  • show interfaces
  • show cdp interface
  • show cdp interfaces

Answer : show cdp interface

You are the network administrator for your company and have configured Cisco Discovery Protocol (CDP) in your network. You recently noticed that when devices send large numbers of CDP neighbor announcements, some devices are crashing. You decide to disable CDP on the router. Which command should you use to achieve the objective?


Options are :

  • no cdp enable
  • no cdp run
  • set cdp disable
  • no cdpadvertise-v2

Answer : no cdp run

Cisco 100-101 Interconnecting Cisco Networking Devices Exam Set 1

You are the network administrator for your company and have configured Cisco Discovery Protocol (CDP) in your network. You recently noticed that when devices send large numbers of CDP neighbor announcements, some devices are crashing. You decide to disable CDP on the router. Which command should you use to achieve the objective?


Options are :

  • no cdp run
  • set cdp disable
  • no cdp advertise-v2
  • no cdp enable

Answer : no cdp run

You are the senior network administrator for a large corporation. Some new trainees have recently joined the network security team. You are educating them about denial-of-service (DoS) attacks and the risks posed to a network by such attacks. Which three are risks that a DoS attack poses to a network? (Choose three.)


Options are :

  • Spread of viruses
  • Information theft
  • Revenue loss
  • Downtime and productivity loss

Answer : Information theft Revenue loss Downtime and productivity loss

Which of the following commands is used to verify the link-local, global unicast, and multicast addresses of an IPv6 router?


Options are :

  • show ipv6 route
  • show ipv6 protocols
  • show ipv6 interface
  • show ipv6 neighbors (only link-local addresses)

Answer : show ipv6 interface

200-105 Interconnecting Cisco Networking Devices Part Exam Set 3

Which of the following statements are TRUE regarding Cisco access lists? (Choose two.)


Options are :

  • When a line is added to an existing access list, it is inserted at the beginning of the access list.
  • Extended access lists are used to filter protocol-specific packets.
  • You must specify a deny statement at the end of each access list to filter unwanted traffic.
  • In an inbound access list, packets are filtered before they exit an interface.
  • In an inbound access list, packets are filtered as they enter an interface

Answer : Extended access lists are used to filter protocol-specific packets. In an inbound access list, packets are filtered as they enter an interface

Which Cisco IOS command disables Cisco Discovery Protocol Version 2 (CDPv2) advertisements?


Options are :

  • no cdp enable
  • no cdp v2-advertise
  • no cdp advertise-v2
  • no cdp run

Answer : no cdp advertise-v2

Which Cisco IOS Cisco Discovery Protocol (CDP) command displays the IP address of the directly connected Cisco devices?


Options are :

  • show cdp
  • show cdp traffic
  • show cdp devices
  • show cdp neighbors detail

Answer : show cdp neighbors detail

300-320 Designing Cisco Network Service Architectures Exam Set 5

Which of the following statements are true of Class C IP addresses?


Options are :

  • The decimal values of the first octet can range from 192to 223
  • The first octet represents the entire network portion of the address
  • The first three octets represent the entire network portion of the address
  • The value of the first binary place in the first octet must be 0
  • The decimal values of the first octet can range from 1 to 126
  • The value of the first two binary places in the first octet must be 11

Answer : The decimal values of the first octet can range from 192to 223 The first three octets represent the entire network portion of the address The value of the first two binary places in the first octet must be 11

Your assistant just entered the following command on a router: R67(config)#logging trap 0 Which of the following levels will be trapped? (Choose all that apply.)


Options are :

  • Alert
  • Critical
  • Emergency
  • Error

Answer : Emergency

During the process of connecting four switches to the central router and implementing VLANS between the devices, it becomes apparent that there was a misunderstanding about which encapsulation protocol to use on the links between the switches and the router. If there is mismatch between the encapsulation types used on the router interface and the type used on the connected switch port, what will be the result?


Options are :

  • The relevant switch ports will be green and flashing.
  • The relevant switch ports will be amber.
  • The relevant switch ports will be neither green nor amber
  • The relevant switch ports will be green.

Answer : The relevant switch ports will be neither green nor amber

200-105 Interconnecting Cisco Networking Devices Part Exam Set 4

Which trunk encapsulation defines one VLAN on each trunk as a native VLAN?


Options are :

  • auto
  • ISL
  • IEEE 802.1q
  • IEEE 802.11a

Answer : IEEE 802.1q

How many collision domains are in a LAN with four hubs and two bridges that are connected directly to each other, as shown in the following figure? (Click the Exhibit(s) button.)


Options are :

  • fourteen
  • four
  • six
  • five

Answer : five

A packet is received with a destination IP address of 10.2.16.10. What would the next hop IP address be for this packet? Router# show ip route <> D 10.0.0.0 /8 [90/2172515] via 192.168.1.10, 00:00:44, Serial0/0 D 10.1.0.0 /16 [90/2144425] via 192.168.1.10, 00:01:03, Serial0/0 C 192.168.1.0 is directly connected, Serial0/0 C 192.168.4.0 is directly connected, Serial0/1 D 10.2.16.0 /24 [90/2162425] via 192.168.4.2, 00:00:25, Serial0/1 C 192.168.10.0 is directly connected, Serial1/0 D 10.2.32.0 /24 [90/2172425] via 192.168.10.254, 00:00:21, Serial1/0 90/2172425] via 192.168.1.10, 00:03:33:, Serial0/1


Options are :

  • 192.168.1.10
  • 192.168.10.254
  • None; the packet will be dropped.
  • 192.168.4.2

Answer : 192.168.4.2

Cisco Data Center Architecture Set 5

Which of the following NAT terms refers to a registered address that represents an inside host to an outside network?


Options are :

  • outside local
  • inside local
  • outside global
  • inside global

Answer : inside global

In what order are the lines of an access list read when an access list is applied to a router interface? (Choose all that apply.)


Options are :

  • Bottom to top, if it is an extended access list
  • Bottom to top, if it is a standard access list
  • Top to bottom it is an extended access list
  • Top to bottom if it is a standard access list

Answer : Top to bottom it is an extended access list Top to bottom if it is a standard access list

esterday one of your associates made some changes to the syslog configuration on the router R69. Today, while working on the router you received this syslog message: 000019: %SYS-5-CONFIG_I: Configured from console by vty2 (10.34.195.36) Based on this output, which of the following commands did the associate execute?


Options are :

  • service timestamps log
  • logging console 4
  • service sequence-numbers
  • service timestamps log datetime msec

Answer : service sequence-numbers

200-310 Designing for Cisco Inter network Solutions Exam Set 5

You are the network administrator for your company. You have been assigned the task of configuring an appropriate IP addressing scheme in the network. Assuming that the network address is 192.16.100.0/28, what will be the number of hosts per network in this scenario?


Options are :

  • 30
  • 14
  • 6
  • 2

Answer : 14

200-310 Designing for Cisco Inter network Solutions Exam Set 3

What is the purpose of frame tagging in Virtual LAN (VLAN) configurations?


Options are :

  • frame identification over access links
  • encryption of network packets
  • inter-VLAN routing
  • frame identification over trunk links

Answer : frame identification over trunk links

Which of the following is the correct command to define a default route using a gateway address of 172.16.0.254?


Options are :

  • default-gateway 172.16.0.254
  • ip route default 172.16.0.254
  • ip default-route 172.16.0.254 255.255.0.0
  • ip route 0.0.0.0 0.0.0.0 172.16.0.254

Answer : ip route 0.0.0.0 0.0.0.0 172.16.0.254

File Transfer Protocol (FTP) and Simple Mail Transfer Protocol (SMTP) work at which layer in the Open Systems Interconnection (OSI) model?


Options are :

  • the Network layer
  • the Presentation layer
  • the Application layer
  • the Session layer

Answer : the Application layer

642-732 Conducting Cisco Unified Wireless Site Survey Exam Set 1

Which Cisco IOS command will enable a switch to copy the configuration from NVRAM to its RAM?


Options are :

  • copy running-config flashC copy startup-config flash
  • copy running-config startup config
  • copy tftp flash
  • copystartup-config running-config

Answer : copy running-config startup config

Which is NOT a valid range for private IP addresses?


Options are :

  • 172.16.0.0 - 172.31.255.255
  • 192.255.255.255-193.0.0.0
  • 10.0.0.0 - 10.255.255.255
  • 192.168.0.0 - 192.168.255.255

Answer : 192.255.255.255-193.0.0.0

Which of the following commands helps you determine the Layer 1 and Layer 2 up/down status of a Cisco interface?


Options are :

  • show running-config
  • show controllers
  • show interfaces trunk
  • show interfaces

Answer : show interfaces

200-105 Inter connecting Cisco Networking Devices Exam Set 3

Which Cisco Internetwork Operating System (IOS) command is used to encrypt passwords on Cisco routers?


Options are :

  • enable password
  • service encryption-password
  • service password-encryption
  • password secure

Answer : service password-encryption

Which of the following fields are in a Transmission Control Protocol (TCP) header? (Choose three.)


Options are :

  • Type-of-Service
  • Length
  • Sequence Number
  • Window
  • Data Offset

Answer : Sequence Number Window Data Offset

What IOS command produced the following output? Vlan Mac Address Type Ports ---- ------------ ------- ----- 1 0040.63d8.ba0a DYNAMIC Fa0/1 1 0004.274c.9ca0 DYNAMIC Fa0/3 1 0040.63d8.bab8 DYNAMIC Fa0/10 1 000f.1fd3.d85a DYNAMIC Fa0/7


Options are :

  • show ip interface
  • show interface mac
  • show mac
  • show mac-address-table

Answer : show mac-address-table

Which Cisco Internetwork Operating System (IOS) command would be used to set the privileged mode password to "cisco"?


Options are :

  • router# enable secret cisco
  • router(config)# line password cisco
  • router(config)# enable password cisco
  • router(config-router)# enable password cisco

Answer : router(config)# enable password cisco

ICND2 200-105 Certification Practice Tests Set 3

The conference room has a switch port available for use by the presenter during classes. Each presenter uses the same PC attached to the port. You would like to prevent any other PCs from using that port. You have completely removed the former configuration in order to start anew. Which of the following steps are required to prevent any other PCs from using that port?


Options are :

  • . make the port an access port
  • assign the MAC address of the PC to the port
  • make the port a trunk port
  • enable port security

Answer : . make the port an access port assign the MAC address of the PC to the port enable port security

Which of the following statements are true of Class C IP addresses?


Options are :

  • The decimalvalues of the first octet can range from 192 to 223
  • The first three octets represent the entire network portion ofthe address
  • The value of the first binary place in the first octet must be 0
  • The first octet represents the entire network portion of the address
  • The value of the first two binary places in the first octet must be 11
  • The decimal values of the first octet can range from 1 to 126

Answer : The decimalvalues of the first octet can range from 192 to 223 The first three octets represent the entire network portion ofthe address The value of the first two binary places in the first octet must be 11

Which of the following topologies is used in Wide Area Networks (WANs)?


Options are :

  • CDDI
  • FDDI
  • SONET
  • Token Ring

Answer : SONET

200-105 Interconnecting Cisco Networking Devices Part Exam Set 3

Which Cisco Internetwork Operating System (IOS) command can be used to configure the location of the configuration file?


Options are :

  • service config
  • configure
  • boot config
  • boot buffersize

Answer : boot config

Which command will allow host 192.168.144.25 to have Telnet access to network 172.16.0.0?


Options are :

  • access-list 150 permit udp 192.168.144.25 0.0.0.0 172.16.0.0 0.0.255.255 eq 23
  • access-list 150 permit tcp 192.168.144.25 0.0.0.0 172.16.0.0 0.0.255.255 eq 23
  • access-list 150 permit tcp 192.168.144.25 0.0.0.0 172.16.0.0 0.0.255.255 eq 21
  • access-list 15 permit tcp 192.168.144.25 0.0.0.0 172.16.0.0 0.0.255.255 eq 23

Answer : access-list 150 permit tcp 192.168.144.25 0.0.0.0 172.16.0.0 0.0.255.255 eq 23

Which of the following is a frame tagging method for identifying Virtual LAN (VLAN) memberships over trunk links?


Options are :

  • CDP
  • RIP
  • 802.1q
  • STP

Answer : 802.1q

100-105 Net Cert Interconnecting Cisco Networking Exam Set 3

You have multiple departments sharing a common network. You are concerned about network traffic from one department reaching another department. What would be a solution for isolating the departments? (Choose all that apply.)


Options are :

  • Put each department in a separate collision domain.
  • Configure trunk links between departmental switches
  • Configure separate subnets for each department
  • Assign a unique VTP domain for each department.
  • Configure separate VLANs for each department.

Answer : Configure separate subnets for each department Configure separate VLANs for each department.

Which of the following statements are NOT part of the guidelines for configuring VLAN Trunking Protocol (VTP) to ensure that VLAN information is distributed to all Cisco switches in the network? (Choose all that apply.)


Options are :

  • The VTP password must be the same on all switches in a VTP domain.
  • The VTP version must be the same on all switches in a VTP domain.
  • VLANs configured on clients should exist on the server switch.
  • The VTP domain name must be the same on all switches in a VTP domain.
  • The configuration revision number must be configured identically on all switches in a VTP domain.

Answer : VLANs configured on clients should exist on the server switch. The configuration revision number must be configured identically on all switches in a VTP domain.

Which type of network connection requires a straight-through cable?


Options are :

  • host to router's Ethernet port
  • host to host
  • switch to switch
  • switch to router

Answer : switch to router

Cisco 210-060 Implement Collaboration Device Practice Exam Set 1

You have been asked to troubleshoot the NTP configuration of a router named R70. After executing the show run command, you receive the following partial output of the command that shows the configuration relevant to NTP: clock timezone PST -8 clock summer-time PDT recurring ntp update-calendar ntp server 192.168.13.57 ntp server 192.168.11.58 interface Ethernet 0/0 ntp broadcast Based on this output, which of the following statements is true?


Options are :

  • the router will periodically update its software clock
  • the router will listen for NTP broadcasts on interface E0/0
  • the router will send NTP broadcasts on interface E0/0
  • the time zone is set to 8 hours less than Pacific Standard time

Answer : the router will send NTP broadcasts on interface E0/0

You are the network administrator for your company. You have installed a new router in your network. You want to establish a remote connection from your computer to the new router so it can be configured. You are not concerned about security during the remote connection. Which Cisco IOS command should you use to accomplish the task?


Options are :

  • ssh
  • virtual
  • terminal
  • telnet

Answer : telnet

Which two are TRUE of straight-through cable? (Choose two.)


Options are :

  • You can connect a hub to a switch using a straight through cable.
  • The wires on the cable are crossed over.
  • You can connect two routers using a straight-through cable.
  • It is also known as a patch cable.
  • You can connect a switch to a router using a straight through cable.

Answer : It is also known as a patch cable. You can connect a switch to a router using a straight through cable.

200-125 Cisco Certified Network Associate Practice Exam Set 4

What is the primary benefit of the Virtual Local Area Network (VLAN) Trunking Protocol (VTP)?


Options are :

  • consistent VLAN configuration across switches in a domain
  • frame tagging
  • broadcast control
  • inter-VLAN routing

Answer : consistent VLAN configuration across switches in a domain

Which of the following represents the correct method of assigning an IP address and default gateway to a switch?


Options are :

  • Switch(config)# interface vlan1Switch(config-if)# ip address 10.0.0.1 255.0.0.0Switch(config-if)# default-gateway 10.0.0.254
  • Switch(config)# ip address 10.0.0.1 255.0.0.0Switch(config)# interface vlan1Switch(config)# ip default-gateway 10.0.0.254
  • Switch(config)# ip default-gateway 10.0.0.254Switch(config)# interface vlan1Switch(config-if)# ip address 10.0.0.1 255.0.0.0
  • Switch(config)# ip address 10.0.0.1 255.0.0.0Switch(config)# default-gateway 10.0.0.254

Answer : Switch(config)# ip default-gateway 10.0.0.254Switch(config)# interface vlan1Switch(config-if)# ip address 10.0.0.1 255.0.0.0

From which of the following attacks can Message Authentication Code (MAC) shield your network?


Options are :

  • spoofing
  • DoS
  • DDoS
  • SYN floods

Answer : spoofing

200-125 Cisco Certified Network Associate (CCNA) Exam Set 6

In the following partial output of the show ip route command, what does the letter D stand for? D 192.1.2.0/24 via 5.1.1.71 [w:0 m:0] C 192.8.1.1/32 directly connected to loopback 0


Options are :

  • This is an EIGRP route
  • This is a directly connected route
  • This is a default route
  • This is static route

Answer : This is an EIGRP route

Which is the shortest possible notation of the following Internet Protocol version 6 (IPv6) address? 2001:0DB8:0000:0001:0000:0000:0000:F00D


Options are :

  • 2001:DB8:0:1::F00D
  • 2001:0DB8:0:1::F00D
  • 2001:DB8::1::F00D
  • 2001:DB8:0:1:0:0:0:F00D

Answer : 2001:DB8:0:1::F00D

When are packets processed by an outbound access list?


Options are :

  • After they are routed to an outbound interface
  • Before they are routed to an inbound interface
  • After they are routed to an inbound interface
  • Before they are routed to an outbound interface

Answer : After they are routed to an outbound interface

642-732 Conducting Cisco Unified Wireless Site Survey Exam Set 4

In which of the following networks does the address 192.168.54.23/27 reside?


Options are :

  • 192.168.54.16
  • 192.168.54.4
  • 192.168.54.0
  • 192.168.54.8

Answer : 192.168.54.0

200-125 Cisco Certified Network Associate Practice Exam Set 1

Which two statements represent physical security guidelines that should be followed during Cisco security deployment? (Choose two.)


Options are :

  • Simple Network Management Protocol version 3 (SNMPv3) should be used for security and privacy features.
  • Images should be managed using File Transfer Protocol (FTP) and Secure FTP (SFTP) instead of Trivial File Transfer Protocol (TFTP).
  • Network equipment should be accessed remotely with Secure Socket Layer (SSL) instead of Telnet.
  • Potential security breaches should be evaluated.
  • The potential impact of stolen network resources and equipment should be assessed.

Answer : Potential security breaches should be evaluated. The potential impact of stolen network resources and equipment should be assessed.

Which statement best describes a converged network?


Options are :

  • a network with real-time applications
  • a network with mix of data and video traffic
  • a network with a mix of voice, video, and data traffic
  • a network with a mix of voice, video, and data traffic

Answer : a network with a mix of voice, video, and data traffic

Which two are NOT features of Cisco NAT implementation? (Choose two.)


Options are :

  • overrule
  • overload
  • dynamic NAT
  • override
  • static NAT

Answer : overrule override

200-125 Cisco Certified Network Associate Practice Exam Set 7

Which of the following represent valid ranges of access list numbers on a Cisco router for an Internet Protocol (IP) standard access list? (Choose all that apply.)


Options are :

  • 2000 - 2699
  • 100 - 199
  • 1300 - 1999
  • Jan-99

Answer : 1300 - 1999 Jan-99

You are working with an Internet Service Provider (ISP) as network manager. A corporate client approaches you to lease a public IP subnet that can accommodate 250 users. You have assigned him the 192.25.27.0 subnet. What subnet mask should be assigned to this IP address so that it can accommodate the number of users required by the corporate client?


Options are :

  • 255.255.255.128
  • 255.255.255.224
  • 255.255.255.252
  • 255.255.255.0

Answer : 255.255.255.0

Which layer in the Open Systems Interconnection (OSI) model defines an Internet Protocol (IP) address that helps in selecting the route to the destination?


Options are :

  • Transport
  • Data Link
  • Network
  • Application

Answer : Network

Cisco 210-060 Implement Collaboration Device Practice Exam Set 3

Which device will always have all of its ports in the same collision domain?


Options are :

  • Router
  • Switch
  • Bridge
  • Hub

Answer : Hub

How would you stop an unauthorized user from establishing a Telnet connection to your router? (Choose two.)


Options are :

  • Configure an access control list and apply it to the virtual terminal lines using the access-class command.
  • Configure a console login process and password.
  • Configure a virtual terminal login process and password.
  • Configure an access control list and apply it to the virtual terminal lines using the ip access-group command.

Answer : Configure an access control list and apply it to the virtual terminal lines using the access-class command. Configure a virtual terminal login process and password.

As part of a new initiative to tighten the security of your Cisco devices, you have configured the firewall to restrict access to the devices from the outside. What would be other recommended ways of protecting the integrity of the device configuration files on the devices while ensuring your continued ability to manage the devices remotely? (Choose all that apply.)


Options are :

  • encrypt the configuration files
  • disable the VTY ports on the devices
  • prevent the loss of administrator passwords by disabling their encryption
  • use an encrypted password for VTY access
  • use SSH to connect to the devices for management

Answer : use an encrypted password for VTY access use SSH to connect to the devices for management

400-101 CCIE Routing and Switching Written Practice Exam Set 2

You are the network administrator for your company. You want to restrict all ping attempts from outside your company from reaching internal hosts. Your internal network is using the IP network of 200.15.24.0/24. Which command should be executed on the corporate boundary router to accomplish the task?


Options are :

  • router(config)# access-list 100 deny icmp any 200.15.24.0 0.0.0.255 eq echo
  • router(config)# access-list 1 deny icmp any 200.15.24.0 0.0.0.255 eq ping
  • router(config)# access-list 1 deny tcp any 200.15.24.0 0.0.0.255 eq ping
  • router(config)# access-list 100 deny tcp any 200.15.24.0 /24 eq echo

Answer : router(config)# access-list 100 deny icmp any 200.15.24.0 0.0.0.255 eq echo

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions