200-105 Inter connecting Cisco Networking Devices Exam Set 4

How is load balancing achieved when implementing HSRP?


Options are :

  • By configuring multiple gateways on the routers
  • By using multiple HSRP groups
  • By configuring the same priority on all HSRP group members
  • By configuring multiple virtual router addresses

Answer : By using multiple HSRP groups

300-320 Designing Cisco Network Service Architectures Exam Set 6

Which of the following are port roles in the Rapid Spanning Tree Protocol (RSTP)? (Choose three.)


Options are :

  • Backup
  • Listening
  • Alternate
  • Designated
  • Routing

Answer : Backup Alternate Designated

A new trainee is setting up a router in a test lab, and he asks you to describe the use of the connector marked BRI on the router. Which is a correct use for this connecter?


Options are :

  • An interface to connect a console cable
  • A WAN interface for an ISDN connection
  • A WAN interface for a T1 connection
  • A LAN interface to connect to a switch

Answer : A WAN interface for an ISDN connection

What port types are available for Rapid Spanning Tree Protocol (RSTP) but NOT available in Spanning Tree Protocol (STP)? (Choose two.)


Options are :

  • Backup port
  • Designated port
  • Alternate port
  • Root port

Answer : Backup port Alternate port

642-732 Conducting Cisco Unified Wireless Site Survey Exam Set 2

Router 5 has four interfaces. The networks hosted on each interface are as follows: Fa0/1 192.168.5.4/29 Fa0/2 192.168.6.0/24 Fa0/3 192.168.7.0/24 S0/0 172.16.5.0/24 You execute the following commands on the router: Router5(config)# router bgp 20 Router5(config-router)# network 192.168.5.0 Router5(config-router)# network 192.168.6.0 Router5(config-router)# network 192.168.7.0 Router5(config-router)# network 172.16.5.0 Router5(config-router)# neighbor 172.16.5.2 remote-as 50 Router5(config-router)# aggregate-address 192.168.5.0 255.255.252.0 After this command sequence is executed, what routes will be present in the routing table of the router at 172.16.5.2? (Choose all that apply.)


Options are :

  • 192.168.7.0/24
  • 172.16.5.0/24
  • 192.168.6.0/24
  • 192.168.5.4/29
  • none of these will be present

Answer : 192.168.7.0/24 172.16.5.0/24 192.168.6.0/24 192.168.5.4/29

Which protocol is responsible for negotiating and maintaining Point-to-Point Protocol (PPP) connections?


Options are :

  • LCP
  • NCP
  • ISDN
  • BRI

Answer : LCP

Which of the following protocols allow the root switch location to be optimized per VLAN? (Choose all that apply.)


Options are :

  • PVST+
  • PVRST
  • RSTP
  • STP

Answer : PVST+ PVRST

100-105 Net Cert Interconnecting Cisco Networking Exam Set 2

Which type of connector is used for an Integrated Services Digital Network Basic Rate Interface (ISDN BRI) connection?


Options are :

  • AUI
  • Console
  • RJ-45
  • DB-60

Answer : RJ-45

Which protocol is used in redundant network topologies to avoid receiving multiple copies of the same frame?


Options are :

  • Cisco Discovery Protocol
  • Routing Information Protocol
  • 802.1q
  • Spanning Tree Protocol

Answer : Spanning Tree Protocol

What command disables 802.1x authentication on a port and permits traffic without authentication?


Options are :

  • dot1x port-control auto
  • dot1x port-control disable
  • dot1x port-control force-unauthorized
  • dot1x port-control force-authorized

Answer : dot1x port-control force-authorized

Cisco 300-209 Implementing Secure Mobility Solutions Exam Set 1

You set up several routers in your lab. Two of them are connected back to back using Data Terminal Equipment (DTE)-to-Data Circuit-terminating Equipment (DCE) cable. You need to configure the clock rate. On which router would you configure the clock rate?


Options are :

  • the DCE
  • the DTE
  • The clock rate is set by default
  • The clock rate cannot be configured

Answer : the DCE

ICND1 100-105 Certification Practice Tests Set 4

When the auth keyword is used in the snmp-server host command, which of the following must be configured with an authentication mechanism?


Options are :

  • the group
  • the interface
  • the user
  • the host

Answer : the user

Your network consists of one HSRP group of six routers. All of the routers are functioning properly. The network has been stable for several days. In which HSRP state are most of the routers?


Options are :

  • Standby
  • Learn
  • Listen
  • Active

Answer : Listen

What port types are available for Rapid Spanning Tree Protocol (RSTP) but NOT available in Spanning Tree Protocol (STP)? (Choose two.)


Options are :

  • Backup port
  • Root port
  • Designated port
  • Alternate port

Answer : Backup port Alternate port

ICND1 100-105 Certification Practice Tests Set 3

How is the designated router (DR) determined by OSPF on a multi-access network segment?


Options are :

  • The lowest interface priority, then the highest OSPF process ID
  • The lowest interface priority, then the highest RID
  • The highest interface priority, then the highest OSPF process ID
  • The highest interface priority, then the highest RID

Answer : The highest interface priority, then the highest RID

Which of the following commands configures an SNMP host to authenticate a user by username and send clear text notifications, the receipt of which will be acknowledged by the receiver?


Options are :

  • Router(config)# snmp-server host 192.168.5.5 informs version 2c public
  • Router(config)# snmp-server host 192.168.5.5 informs version 3 noauth public
  • Router(config)# snmp-server host 192.168.5.5 traps version 3 auth public
  • Router(config)# snmp-server host 192.168.5.5 informs version 3 authpriv public

Answer : Router(config)# snmp-server host 192.168.5.5 informs version 3 noauth public

Which of the following protocols is responsible for negotiating upper-layer protocols that will be carried across a Point-to-Point Protocol (PPP) connection?


Options are :

  • . LMI
  • LCP
  • ISDN
  • NCP

Answer : NCP

Cisco Data Center Architecture Set 2

What will an EIGRP router do if the successor route fails and there is no feasible successor?


Options are :

  • EIGRP will query neighboring routers until a new successor route is determined.
  • EIGRP will redistribute routes into RIP or OSPF.
  • EIGRP will mark the route as passive until a new successor route is determined.
  • EIGRP will forward traffic to the neighbor with the lowest administrative distance.

Answer : EIGRP will query neighboring routers until a new successor route is determined.

You run the following command: switch# show ip interface brief What information is displayed?


Options are :

  • A summary of the IP addresses and subnet mask on the interface
  • The IP packet statistics for the interfaces
  • A summary of the IP addresses on the interface and the interface's status
  • The IP addresses for the interface and the routing protocol advertising the network

Answer : A summary of the IP addresses on the interface and the interface's status

You are configuring an authenticated connection between two routers named Tacoma and Lansing. The connection on the Lansing end is correctly set up with a password of keypass. You are directing an assistant to configure the name and password on Tacoma. Which of the following commands would be correct to complete this authenticated connection?


Options are :

  • username Tacoma password keypass
  • username Lansing keypass password
  • username Tacoma keypass password
  • username Lansing password keypass

Answer : username Lansing password keypass

400-101 CCIE Routing and Switching Written Practice Exam Set 11

Which Enhanced Interior Gateway Routing Protocol (EIGRP) packet is NOT sent reliably over the network?


Options are :

  • Update
  • Acknowledgement
  • Reply
  • Query

Answer : Acknowledgement

Which of the following is a Point-to-Point Protocol (PPP) authentication protocol that supports sending of hashed values instead of sending passwords in clear text?


Options are :

  • PAP
  • NCP
  • LCP
  • CHAP

Answer : CHAP

What Cisco Catalyst switch feature can be used to define ports as trusted for DHCP server connections?


Options are :

  • port security
  • private VLANs
  • 802.1x
  • DHCP snooping

Answer : DHCP snooping

Cisco 300-209 Implementing Secure Mobility Solutions Exam Set 5

Which of the following excerpts from the output of the show ip eigrp topology command include EIGRP learned routes or pairs of routes that will be included in the routing table? (For excerpts that include multiple routes, do not include the entry unless BOTH routes will be included in the routing table.)


Options are :

  • P 172.16.250.0/24, 1 successors, FD is 2248564via Connected, Serial0/0
  • P 172.16.10.0/24 2 successors, FD is 284244via 172.16.50.1 (284244/17669856), Serial1/0via 172.16.60.1 (284244/17669856), Serial1/1
  • P 172.16.60.0/24, 1 successors, FD is 2248564via Connected, Serial1/1
  • P 172.16.16.0/24, 1 successors, FD is 284244via 172.16.250.2 (284244/17669856), Serial0/0via 172.16.251.2 (12738176/27819002), Serial0/1

Answer : P 172.16.10.0/24 2 successors, FD is 284244via 172.16.50.1 (284244/17669856), Serial1/0via 172.16.60.1 (284244/17669856), Serial1/1

What is the significance of the 1 in the following configuration? router(config)# router eigrp 1


Options are :

  • It is the process ID for EIGRP and is locally significant to this router
  • It is the AS number for EIGRP and is locally significant to this router.
  • It is the process ID for EIGRP and must be the same on all EIGRP routers
  • It is the AS number for EIGRP and must be the same on all EIGRP routers.

Answer : It is the AS number for EIGRP and must be the same on all EIGRP routers.

Which WAN switching technology is used by Asynchronous Transfer Mode (ATM)?


Options are :

  • packet switching
  • circuit-switching
  • virtual switching
  • cell-switching

Answer : cell-switching

210-260 Implementing Cisco Network Security Practice Exam Set 2

Which of the following statements are true when discussing link state and distance vector routing protocols? (Choose all that apply.)


Options are :

  • Packets are routed based upon the shortest path calculated by an algorithm with link state protocols
  • Distance vector protocols require a hierarchical IP addressing scheme for optimal functionality
  • Link-state protocols place a high demand on router resources running the link-state algorithm
  • Link-state protocols use hello packets and LSAs from other routers to build and maintain the topological database
  • Distance vector protocols send the entire routing table to a neighbor

Answer : Packets are routed based upon the shortest path calculated by an algorithm with link state protocols Link-state protocols place a high demand on router resources running the link-state algorithm Link-state protocols use hello packets and LSAs from other routers to build and maintain the topological database Distance vector protocols send the entire routing table to a neighbor

Which of the following are classless routing protocols? (Choose four.)


Options are :

  • Routing Information Protocol version 2 (RIPv2)
  • Enhanced Interior Gateway Routing Protocol (EIGRP)
  • Open Shortest Path First (OSPF)
  • Border Gateway Protocol (BGP)
  • Interior Gateway Routing Protocol (IGRP)

Answer : Routing Information Protocol version 2 (RIPv2) Enhanced Interior Gateway Routing Protocol (EIGRP) Open Shortest Path First (OSPF) Border Gateway Protocol (BGP)

You have implemented SNMP v3 in your network. After making the configuration changes, you find that technicians in the TECHS group cannot access the MIB. You execute the show run command and receive the following output that relates to SNMP: snmp-server group NORMAL v3 priv read NORMAL write NORMAL snmp-server group TECHS v3 priv read TECHS access 99 snmp-server group TRAP v3 priv !! snmp-server user NORMAL NORMAL v3 auth sha CISCO priv des56 CISCO snmp-server user TECHS TECHS v3 auth sha CISCO priv des56 CISCO snmp-server user TRAP TRAP v3 auth sha CISCO priv des56 CISCO snmp-server enable traps snmp linkup linkdown snmp-server host 155.1.146.100 traps version 3 priv TRAP What is preventing the TECHS group from viewing the MIB?


Options are :

  • A mismatch between the authentication mechanism and the encryption type in the command creating the TECHS user
  • The absence of an access list defining the stations that can used by the TECHS group
  • The presence of the keyword auth in the command creating the TECHS user
  • The presence of the keyword priv in the command creating the RESTRICTED group

Answer : The absence of an access list defining the stations that can used by the TECHS group

210-260 Implementing Cisco Network Security Practice Exam Set 2

Which service is denoted by TCP/UDP port number 53?


Options are :

  • Domain Name Service (DNS)
  • File Transfer Protocol (FTP)
  • HTTP
  • Telnet

Answer : Domain Name Service (DNS)

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions