100-105 Net Cert Interconnecting Cisco Networking Exam Set 6

Which Cisco Internetwork Operating System (IOS) command would be used to set the privileged mode password to "cisco"?


Options are :

  • router# enable secret cisco
  • router(config)# line password cisco
  • router(config)# enable password cisco
  • router(config-router)# enable password cisco

Answer : router(config)# enable password cisco

ICND2 200-105 Certification Practice Tests Set 3

The conference room has a switch port available for use by the presenter during classes. Each presenter uses the same PC attached to the port. You would like to prevent any other PCs from using that port. You have completely removed the former configuration in order to start anew. Which of the following steps are required to prevent any other PCs from using that port?


Options are :

  • . make the port an access port
  • assign the MAC address of the PC to the port
  • make the port a trunk port
  • enable port security

Answer : . make the port an access port assign the MAC address of the PC to the port enable port security

Which of the following statements are true of Class C IP addresses?


Options are :

  • The decimalvalues of the first octet can range from 192 to 223
  • The first three octets represent the entire network portion ofthe address
  • The value of the first binary place in the first octet must be 0
  • The first octet represents the entire network portion of the address
  • The value of the first two binary places in the first octet must be 11
  • The decimal values of the first octet can range from 1 to 126

Answer : The decimalvalues of the first octet can range from 192 to 223 The first three octets represent the entire network portion ofthe address The value of the first two binary places in the first octet must be 11

Which of the following topologies is used in Wide Area Networks (WANs)?


Options are :

  • CDDI
  • FDDI
  • SONET
  • Token Ring

Answer : SONET

200-105 Interconnecting Cisco Networking Devices Part Exam Set 3

Which Cisco Internetwork Operating System (IOS) command can be used to configure the location of the configuration file?


Options are :

  • service config
  • configure
  • boot config
  • boot buffersize

Answer : boot config

Which command will allow host 192.168.144.25 to have Telnet access to network 172.16.0.0?


Options are :

  • access-list 150 permit udp 192.168.144.25 0.0.0.0 172.16.0.0 0.0.255.255 eq 23
  • access-list 150 permit tcp 192.168.144.25 0.0.0.0 172.16.0.0 0.0.255.255 eq 23
  • access-list 150 permit tcp 192.168.144.25 0.0.0.0 172.16.0.0 0.0.255.255 eq 21
  • access-list 15 permit tcp 192.168.144.25 0.0.0.0 172.16.0.0 0.0.255.255 eq 23

Answer : access-list 150 permit tcp 192.168.144.25 0.0.0.0 172.16.0.0 0.0.255.255 eq 23

Which of the following is a frame tagging method for identifying Virtual LAN (VLAN) memberships over trunk links?


Options are :

  • CDP
  • RIP
  • 802.1q
  • STP

Answer : 802.1q

100-105 Net Cert Interconnecting Cisco Networking Exam Set 3

You have multiple departments sharing a common network. You are concerned about network traffic from one department reaching another department. What would be a solution for isolating the departments? (Choose all that apply.)


Options are :

  • Put each department in a separate collision domain.
  • Configure trunk links between departmental switches
  • Configure separate subnets for each department
  • Assign a unique VTP domain for each department.
  • Configure separate VLANs for each department.

Answer : Configure separate subnets for each department Configure separate VLANs for each department.

Which of the following statements are NOT part of the guidelines for configuring VLAN Trunking Protocol (VTP) to ensure that VLAN information is distributed to all Cisco switches in the network? (Choose all that apply.)


Options are :

  • The VTP password must be the same on all switches in a VTP domain.
  • The VTP version must be the same on all switches in a VTP domain.
  • VLANs configured on clients should exist on the server switch.
  • The VTP domain name must be the same on all switches in a VTP domain.
  • The configuration revision number must be configured identically on all switches in a VTP domain.

Answer : VLANs configured on clients should exist on the server switch. The configuration revision number must be configured identically on all switches in a VTP domain.

Which type of network connection requires a straight-through cable?


Options are :

  • host to router's Ethernet port
  • host to host
  • switch to switch
  • switch to router

Answer : switch to router

Cisco 210-060 Implement Collaboration Device Practice Exam Set 1

You have been asked to troubleshoot the NTP configuration of a router named R70. After executing the show run command, you receive the following partial output of the command that shows the configuration relevant to NTP: clock timezone PST -8 clock summer-time PDT recurring ntp update-calendar ntp server 192.168.13.57 ntp server 192.168.11.58 interface Ethernet 0/0 ntp broadcast Based on this output, which of the following statements is true?


Options are :

  • the router will periodically update its software clock
  • the router will listen for NTP broadcasts on interface E0/0
  • the router will send NTP broadcasts on interface E0/0
  • the time zone is set to 8 hours less than Pacific Standard time

Answer : the router will send NTP broadcasts on interface E0/0

You are the network administrator for your company. You have installed a new router in your network. You want to establish a remote connection from your computer to the new router so it can be configured. You are not concerned about security during the remote connection. Which Cisco IOS command should you use to accomplish the task?


Options are :

  • ssh
  • virtual
  • terminal
  • telnet

Answer : telnet

Which two are TRUE of straight-through cable? (Choose two.)


Options are :

  • You can connect a hub to a switch using a straight through cable.
  • The wires on the cable are crossed over.
  • You can connect two routers using a straight-through cable.
  • It is also known as a patch cable.
  • You can connect a switch to a router using a straight through cable.

Answer : It is also known as a patch cable. You can connect a switch to a router using a straight through cable.

200-125 Cisco Certified Network Associate Practice Exam Set 4

What is the primary benefit of the Virtual Local Area Network (VLAN) Trunking Protocol (VTP)?


Options are :

  • consistent VLAN configuration across switches in a domain
  • frame tagging
  • broadcast control
  • inter-VLAN routing

Answer : consistent VLAN configuration across switches in a domain

Which of the following represents the correct method of assigning an IP address and default gateway to a switch?


Options are :

  • Switch(config)# interface vlan1Switch(config-if)# ip address 10.0.0.1 255.0.0.0Switch(config-if)# default-gateway 10.0.0.254
  • Switch(config)# ip address 10.0.0.1 255.0.0.0Switch(config)# interface vlan1Switch(config)# ip default-gateway 10.0.0.254
  • Switch(config)# ip default-gateway 10.0.0.254Switch(config)# interface vlan1Switch(config-if)# ip address 10.0.0.1 255.0.0.0
  • Switch(config)# ip address 10.0.0.1 255.0.0.0Switch(config)# default-gateway 10.0.0.254

Answer : Switch(config)# ip default-gateway 10.0.0.254Switch(config)# interface vlan1Switch(config-if)# ip address 10.0.0.1 255.0.0.0

From which of the following attacks can Message Authentication Code (MAC) shield your network?


Options are :

  • spoofing
  • DoS
  • DDoS
  • SYN floods

Answer : spoofing

200-125 Cisco Certified Network Associate (CCNA) Exam Set 6

In the following partial output of the show ip route command, what does the letter D stand for? D 192.1.2.0/24 via 5.1.1.71 [w:0 m:0] C 192.8.1.1/32 directly connected to loopback 0


Options are :

  • This is an EIGRP route
  • This is a directly connected route
  • This is a default route
  • This is static route

Answer : This is an EIGRP route

Which is the shortest possible notation of the following Internet Protocol version 6 (IPv6) address? 2001:0DB8:0000:0001:0000:0000:0000:F00D


Options are :

  • 2001:DB8:0:1::F00D
  • 2001:0DB8:0:1::F00D
  • 2001:DB8::1::F00D
  • 2001:DB8:0:1:0:0:0:F00D

Answer : 2001:DB8:0:1::F00D

When are packets processed by an outbound access list?


Options are :

  • After they are routed to an outbound interface
  • Before they are routed to an inbound interface
  • After they are routed to an inbound interface
  • Before they are routed to an outbound interface

Answer : After they are routed to an outbound interface

642-732 Conducting Cisco Unified Wireless Site Survey Exam Set 4

In which of the following networks does the address 192.168.54.23/27 reside?


Options are :

  • 192.168.54.16
  • 192.168.54.4
  • 192.168.54.0
  • 192.168.54.8

Answer : 192.168.54.0

200-125 Cisco Certified Network Associate Practice Exam Set 1

Which two statements represent physical security guidelines that should be followed during Cisco security deployment? (Choose two.)


Options are :

  • Simple Network Management Protocol version 3 (SNMPv3) should be used for security and privacy features.
  • Images should be managed using File Transfer Protocol (FTP) and Secure FTP (SFTP) instead of Trivial File Transfer Protocol (TFTP).
  • Network equipment should be accessed remotely with Secure Socket Layer (SSL) instead of Telnet.
  • Potential security breaches should be evaluated.
  • The potential impact of stolen network resources and equipment should be assessed.

Answer : Potential security breaches should be evaluated. The potential impact of stolen network resources and equipment should be assessed.

Which statement best describes a converged network?


Options are :

  • a network with real-time applications
  • a network with mix of data and video traffic
  • a network with a mix of voice, video, and data traffic
  • a network with a mix of voice, video, and data traffic

Answer : a network with a mix of voice, video, and data traffic

Which two are NOT features of Cisco NAT implementation? (Choose two.)


Options are :

  • overrule
  • overload
  • dynamic NAT
  • override
  • static NAT

Answer : overrule override

200-125 Cisco Certified Network Associate Practice Exam Set 7

Which of the following represent valid ranges of access list numbers on a Cisco router for an Internet Protocol (IP) standard access list? (Choose all that apply.)


Options are :

  • 2000 - 2699
  • 100 - 199
  • 1300 - 1999
  • Jan-99

Answer : 1300 - 1999 Jan-99

You are working with an Internet Service Provider (ISP) as network manager. A corporate client approaches you to lease a public IP subnet that can accommodate 250 users. You have assigned him the 192.25.27.0 subnet. What subnet mask should be assigned to this IP address so that it can accommodate the number of users required by the corporate client?


Options are :

  • 255.255.255.128
  • 255.255.255.224
  • 255.255.255.252
  • 255.255.255.0

Answer : 255.255.255.0

Which layer in the Open Systems Interconnection (OSI) model defines an Internet Protocol (IP) address that helps in selecting the route to the destination?


Options are :

  • Transport
  • Data Link
  • Network
  • Application

Answer : Network

Cisco 210-060 Implement Collaboration Device Practice Exam Set 3

Which device will always have all of its ports in the same collision domain?


Options are :

  • Router
  • Switch
  • Bridge
  • Hub

Answer : Hub

How would you stop an unauthorized user from establishing a Telnet connection to your router? (Choose two.)


Options are :

  • Configure an access control list and apply it to the virtual terminal lines using the access-class command.
  • Configure a console login process and password.
  • Configure a virtual terminal login process and password.
  • Configure an access control list and apply it to the virtual terminal lines using the ip access-group command.

Answer : Configure an access control list and apply it to the virtual terminal lines using the access-class command. Configure a virtual terminal login process and password.

As part of a new initiative to tighten the security of your Cisco devices, you have configured the firewall to restrict access to the devices from the outside. What would be other recommended ways of protecting the integrity of the device configuration files on the devices while ensuring your continued ability to manage the devices remotely? (Choose all that apply.)


Options are :

  • encrypt the configuration files
  • disable the VTY ports on the devices
  • prevent the loss of administrator passwords by disabling their encryption
  • use an encrypted password for VTY access
  • use SSH to connect to the devices for management

Answer : use an encrypted password for VTY access use SSH to connect to the devices for management

400-101 CCIE Routing and Switching Written Practice Exam Set 2

You are the network administrator for your company. You want to restrict all ping attempts from outside your company from reaching internal hosts. Your internal network is using the IP network of 200.15.24.0/24. Which command should be executed on the corporate boundary router to accomplish the task?


Options are :

  • router(config)# access-list 100 deny icmp any 200.15.24.0 0.0.0.255 eq echo
  • router(config)# access-list 1 deny icmp any 200.15.24.0 0.0.0.255 eq ping
  • router(config)# access-list 1 deny tcp any 200.15.24.0 0.0.0.255 eq ping
  • router(config)# access-list 100 deny tcp any 200.15.24.0 /24 eq echo

Answer : router(config)# access-list 100 deny icmp any 200.15.24.0 0.0.0.255 eq echo

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions