200-125 Cisco Certified Network Associate Practice Exam Set 6

A technician has configured the ability to connect to a small office server using remote desktop from a workstation within the office. The technician has reviewed logs that show constant brute force attacks to that server from outside the network. Which of the following would prevent this from occurring?


Options are :

  • Configure the server to use a static IP
  • Reallocate the server to a different networking closet
  • Disable the remote desktop port
  • Logically move the server to the DMZ

Answer : Disable the remote desktop port

Privacy filters applied to users computer screens are used to combat which of the following security risks?


Options are :

  • Rootkits
  • Spear phishing
  • Social Engineering
  • Shoulder surfing

Answer : Shoulder surfing

After being infected with a virus, a user's computer does not recognize the user as having local administrator rights to the computer. After troubleshooting the issue, a technician determines the computer needs to be rebuilt and data needs to be restored from the user's backup. Which of the following tools would BEST reset the computer to how it worked when first purchased?


Options are :

  • Anti-malware software
  • Factory restore CD
  • System Restore
  • Recovery Console

Answer : Factory restore CD

642-732 Conducting Cisco Unified Wireless Site Survey Exam Set 3

A technician is trying to setup a non-domain user account on a workstation, but receives the following error message "Password does not meet the complexity requirements." Which of the following utilities should the technician use to identify the criteria?


Options are :

  • Users and Groups
  • MSCONFIG
  • Performance Monitor
  • Local Security Policy

Answer : Local Security Policy

Which two of these are characteristics of the 802.1Q protocol? (Choose two.)


Options are :

  • It is a trunking protocol capable of carrying untagged frames.
  • B,E
  • It modifies the 802.3 frame header, and thus requires that the FCS be recomputed.
  • It is a Layer 2 messaging protocol which maintains VLAN configurations across networks.
  • It is used exclusively for tagging VLAN frames and does not address network reconvergence following switched network topology changes.
  • It includes an 8-bit field which specifies the priority of a frame.

Answer : B,E

200-125 Cisco Certified Network Associate (CCNA) Exam Set 4

Which term describes a spanning-tree network that has all switch ports in either the blocking or forwarding state?


Options are :

  • redundant
  • converged
  • provisioned
  • spanned

Answer : converged

What value is primarily used to determine which port becomes the root port on each nonroot switch in a spanning-tree topology?


Options are :

  • highest port priority number
  • port priority number and MAC address
  • lowest port MAC address
  • path cost
  • VTP revision number

Answer : path cost

Which parameter would you tune to affect the selection of a static route as a backup, when a dynamic protocol is also being used?


Options are :

  • link delay
  • link bandwidth
  • link cost
  • administrative distance
  • hop count

Answer : administrative distance

200-105 Interconnecting Cisco Networking Devices Part Exam Set 2

A network administrator is troubleshooting an EIGRP problem on a router and needs to confirm the IP addresses of the devices with which the router has established adjacency. The retransmit interval and the queue counts for the adjacent routers also need to be checked. What command will display the required information?


Options are :

  • Router# show ip eigrp topology
  • Router# show ip eigrp neighbors
  • Router# show ip eigrp adjacency
  • Router# show ip eigrp interfaces

Answer : Router# show ip eigrp neighbors

Which command can be used from a PC to verify the connectivity between hosts that connect through a switch in the same LAN?


Options are :

  • traceroute address
  • tracert address
  • arp address
  • ping address

Answer : ping address

Which three statements about RSTP are true? (Choose three.)


Options are :

  • RSTP significantly reduces topology reconverging time after a link failure.
  • RSTP provides a faster transition to the forwarding state on point-to-point links than STP does.
  • A,B,D
  • RSTP also uses the STP proposal-agreement sequence.
  • RSTP expands the STP port roles by adding the alternate and backup roles.
  • RSTP uses the same timer-based process as STP on point-to-point links.
  • RSTP port states are blocking, discarding, learning, or forwarding.

Answer : A,B,D

642-732 Conducting Cisco Unified Wireless Site Survey Exam Set 5

Which two commands can be used to verify a trunk link configuration status on a given Cisco switch interface? (Choose two.)


Options are :

  • A,E
  • show interface vlan
  • show interface interface
  • show ip interface brief
  • show interface switchport
  • show interface trunk

Answer : A,E

Which three statements accurately describe Layer 2 Ethernet switches? (Choose three.)


Options are :

  • Micro segmentation decreases the number of collisions on the network.
  • Spanning Tree Protocol allows switches to automatically share VLAN information.
  • In a properly functioning network with redundant switched paths, each switched segment will contain one root bridge with all its ports in the forwarding state. All other switches in that broadcast domain will have only one root port.
  • B,D,E
  • Establishing VLANs increases the number of broadcast domains.
  • Switches that are configured with VLANs make forwarding decisions based on both Layer 2 and Layer 3 address information.
  • If a switch receives a frame for an unknown destination, it uses ARP to resolve the address.

Answer : B,D,E

A network administrator is verifying the configuration of a newly installed host by establishing an FTP connection to a remote server. What is the highest layer of the protocol stack that the network administrator is using for this operation?


Options are :

  • presentation
  • data link
  • internet
  • transport
  • session
  • application

Answer : application

400-101 CCIE Routing and Switching Written Practice Exam Set 5

A switch is configured with all ports assigned to VLAN 2 with full duplex FastEthernet to segment existing departmental traffic. What is the effect of adding switch ports to a new VLAN on the switch?


Options are :

  • More bandwidth will be required than was needed previously.
  • More collision domains will be created.
  • IP address utilization will be more efficient.
  • An additional broadcast domain will be created.

Answer : An additional broadcast domain will be created.

Which three of these statements regarding 802.1Q trunking are correct? (Choose three.)


Options are :

  • 802.1Q trunks can use 10 Mb/s Ethernet interfaces.
  • 802.1Q trunks should have native VLANs that are the same at both ends.
  • 802.1Q trunking ports can also be secure ports.
  • 802.1Q trunks require full-duplex, point-to-point connectivity.
  • 802.1Q native VLAN frames are untagged by default.
  • A,C,E

Answer : A,C,E

Which two of these statements regarding RSTP are correct? (Choose two.)


Options are :

  • RSTP cannot operate with PVST+.
  • RSTP defines new port roles.
  • RSTP is a proprietary implementation of IEEE 802.1D STP.
  • RSTP is compatible with the original IEEE 802.1D STP.
  • B,E
  • RSTP defines no new port states.

Answer : B,E

200-125 CCNA Cisco Certified Network Associate Test Set 2

In an Ethernet network, under what two scenarios can devices transmit? (Choose two.)


Options are :

  • when there is a carrier
  • when they receive a special token
  • when they detect no other devices are sending
  • when the server grants access
  • when the medium is idle
  • C,D

Answer : C,D

What is one benefit of PVST+?


Options are :

  • PVST+ automatically selects the root bridge location, to provide optimized bandwidth usage.
  • PVST+ reduces the CPU cycles for all the switches in the network.
  • PVST+ supports Layer 3 load balancing without loops.
  • PVST+ allows the root switch location to be optimized per VLAN.

Answer : PVST+ allows the root switch location to be optimized per VLAN.

What is the function of the command switchport trunk native vlan 999 on a Cisco Catalyst switch?


Options are :

  • It designates VLAN 999 as the default for all unknown tagged traffic.
  • It designates VLAN 999 for untagged traffic.
  • It blocks VLAN 999 traffic from passing on the trunk.
  • It creates a VLAN 999 interface.

Answer : It designates VLAN 999 for untagged traffic.

Cisco 210-060 Implement Collaboration Device Practice Exam Set 4

Which switch would STP choose to become the root bridge in the selection process?


Options are :

  • 32768: 22-33-44-55-66-77
  • 32769: 22-33-44-55-66-78
  • 32769: 11-22-33-44-55-65
  • 32768: 11-22-33-44-55-66

Answer : 32768: 11-22-33-44-55-66

In a switched environment, what does the IEEE 802.1Q standard describe?


Options are :

  • an approach to wireless LAN communication
  • a method of VLAN trunking
  • the process for root bridge selection
  • VLAN pruning
  • the operation of VTP

Answer : a method of VLAN trunking

Which command would you use on a Cisco router to verify the Layer 3 path to a host?


Options are :

  • traceroute address
  • ssh address
  • telnet address
  • tracert address

Answer : traceroute address

200-105 Interconnecting Cisco Networking Devices Part Exam Set 7

What are the possible trunking modes for a switch port? (Choose three.)


Options are :

  • client
  • B,C,D
  • auto
  • on
  • transparent
  • desirable
  • forwarding

Answer : B,C,D

A receiving host computes the checksum on a frame and determines that the frame is damaged. The frame is then discarded. At which OSI layer did this happen?


Options are :

  • session
  • physical
  • data link
  • network
  • transport

Answer : data link

Which two states are the port states when RSTP has converged? (Choose two.)


Options are :

  • listening
  • learning
  • forwarding
  • disabled
  • discarding
  • A,D

Answer : A,D

200-310 Designing for Cisco Inter network Solutions Exam Set 4

Which two link protocols are used to carry multiple VLANs over a single link? (Choose two.)


Options are :

  • B,D
  • ISL
  • 802.3u
  • 802.1q
  • VTP
  • IGP

Answer : B,D

What does a Layer 2 switch use to decide where to forward a received frame?


Options are :

  • destination MAC address
  • destination port address
  • destination IP address
  • source IP address
  • source MAC address
  • source switch port

Answer : destination MAC address

Which layer in the OSI reference model is responsible for determining the availability of the receiving program and checking to see if enough resources exist for that communication?


Options are :

  • application
  • transport
  • network
  • presentation
  • session

Answer : application

200-105 Interconnecting Cisco Networking Devices Part Exam Set 4

Cisco Catalyst switches CAT1 and CAT2 have a connection between them using ports FA0/13. An 802.1Q trunk is configured between the two switches. On CAT1, VLAN 10 is chosen as native, but on CAT2 the native VLAN is not specified. What will happen in this scenario?


Options are :

  • A native VLAN mismatch error message will appear.
  • VLAN 10 on CAT1 and VLAN 1 on CAT2 will send tagged frames.
  • 802.1Q giants frames could saturate the link.
  • VLAN 10 on CAT1 and VLAN 1 on CAT2 will send untagged frames.

Answer : A native VLAN mismatch error message will appear.

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions