ICND1 100-105 Certification Practice Tests Set 2

Which statement about IPv6 is true?


Options are :

  • Addresses are not hierarchical and are assigned at random.
  • Only one IPv6 address can exist on a given interface.
  • There are 2.7 billion addresses available.
  • Broadcasts have been eliminated and replaced with multicasts.

Answer :Broadcasts have been eliminated and replaced with multicasts.

300-115 Implementing Cisco IP Switched Network Practice Exam Set 4

Which command enables IPv6 forwarding on a Cisco router?


Options are :

  • ipv6 host
  • ipv6 unicast-routing
  • ipv6 local
  • ipv6 neighbor

Answer :ipv6 unicast-routing

Identify the four valid IPv6 addresses. (Choose four).


Options are :

  • ::
  • ::192:168:0:1
  • 2000::
  • 2001:3452:4952:2837::
  • 2002:c0a8:101::42
  • 2003:dead:beef:4dad:23:46:bb:101

Answer ::: ::192:168:0:1 2002:c0a8:101::42 2003:dead:beef:4dad:23:46:bb:101

Which two statements describe characteristics of IPv6 unicast addressing? (Choose two).


Options are :

  • Global addresses start with 2000::/3.
  • Link-local addresses start with FE00:/12.
  • Link-local addresses start with FF00::/10.
  • There is only one loopback address and it is ::1.
  • If a global address is assigned to an interface, then that is the only allowable address for the interface.

Answer :Global addresses start with 2000::/3. There is only one loopback address and it is ::1.

200-125 Cisco Certified Network Associate (CCNA) Exam Set 2

Which statement about IPv6 is true?


Options are :

  • An IPv6 address is 64 bits long and is represented as hexadecimal characters.
  • An IPv6 address is 32 bits long and is represented as decimal digits.
  • An IPv6 address is 128 bits long and is represented as decimal digits.
  • An IPv6 address is 128 bits long and is represented as hexadecimal characters.

Answer :An IPv6 address is 128 bits long and is represented as hexadecimal characters.

If an Ethernet port on a router was assigned an IP address of 172.16.112.1/20, what is the maximum number of hosts allowed on this subnet?


Options are :

  • 1024
  • 2046
  • 4094
  • 4096
  • 8190

Answer :4094

Which statements are TRUE regarding Internet Protocol version 6 (IPv6) addresses? (Choose three).


Options are :

  • An IPv6 address is divided into eight 16-bit groups.
  • A double colon (::) can only be used once in a single IPv6 address.
  • IPv6 addresses are 196 bits in length.
  • Leading zeros cannot be omitted in an IPv6 address.
  • Groups with a value of 0 can be represented with a single 0 in IPv6 address.

Answer :An IPv6 address is divided into eight 16-bit groups. A double colon (::) can only be used once in a single IPv6 address. Groups with a value of 0 can be represented with a single 0 in IPv6 address.

200-125 Cisco Certified Network Associate (CCNA) Exam Set 1

Which of the following IP addresses are valid Class B host addresses if a default Class B mask is in use? (Choose two).


Options are :

  • 10.6.8.35
  • 133.6.5.4
  • 192.168.5.9
  • 127.0.0.1
  • 190.6.5.4

Answer :190.6.5.4

What two things does a router do when it forwards a packet? (Choose two).


Options are :

  • switches the packet to the appropriate outgoing interfaces
  • computes the destination host address
  • determines the next hop on the path
  • updates the destination IP address
  • forwards ARP requests

Answer :switches the packet to the appropriate outgoing interfaces determines the next hop on the path

What does administrative distance refer to?


Options are :

  • the cost of a link between two neighboring routers
  • the advertised cost to reach a network
  • the cost to reach a network that is administratively set
  • a measure of the trustworthiness of a routing information source

Answer :a measure of the trustworthiness of a routing information source

200-125 Cisco Certified Network Associate Practice Exam Set 12

Which IOS command is used to initiate a login into a VTY port on a remote router?


Options are :

  • router# login
  • router# telnet
  • router# trace
  • router# ping
  • router(config)# line vty 0 5
  • router(config-line)# login

Answer :router# telnet

The command ip route 192.168.100.160 255.255.255.224 192.168.10.2 was issued on a router. No routing protocols or other static routes are configured on the router. Which statement is true about this command?


Options are :

  • The interface with IP address 192.168.10.2 is on this router.
  • The command sets a gateway of last resort for the router.
  • Packets that are destined for host 192.168.100.160 will be sent to 192.168.10.2.
  • The command creates a static route for all IP traffic with the source address 192.168.100.160.

Answer :Packets that are destined for host 192.168.100.160 will be sent to 192.168.10.2.

Which two of these functions do routers perform on packets? (Choose two).


Options are :

  • Examine the Layer 2 headers of inbound packets and use that information to determine the next hops for the packets
  • Update the Layer 2 headers of outbound packets with the MAC addresses of the next hops
  • Examine the Layer 3 headers of inbound packets and use that information to determine the next hops for the packets
  • Examine the Layer 3 headers of inbound packets and use that information to determine the complete paths along which the packets will be routed to their ultimate destinations
  • Update the Layer 3 headers of outbound packets so that the packets are properly directed to valid next hops
  • Update the Layer 3 headers of outbound packets so that the packets are properly directed to their ultimate destinations

Answer :Update the Layer 2 headers of outbound packets with the MAC addresses of the next hops Examine the Layer 3 headers of inbound packets and use that information to determine the next hops for the packets

200-105 Interconnecting Cisco Networking Devices Part Exam Set 2

Which two commands will display the current IP address and basic Layer 1 and 2 status of an interface? (Choose two).


Options are :

  • router#show version
  • router#show ip interface
  • router#show protocols
  • router#show controllers
  • router#show running-config

Answer :router#show ip interface router#show protocols

An administrator is in the process of changing the configuration of a router. What command will allow the administrator to check the changes that have been made prior to saving the new configuration?


Options are :

  • Router# show startup-config
  • Router# show current-config
  • Router# show running-config
  • Router# show memory
  • Router# show flash
  • Router# show processes

Answer :Router# show running-config

On a live network, which commands will verify the operational status of router interfaces? (Choose two).


Options are :

  • Router# show interfaces
  • Router# show ip protocols
  • Router# debug interface
  • Router# show ip interface brief
  • Router# show start

Answer :Router# show interfaces Router# show ip interface brief

100-105 Net Cert Interconnecting Cisco Networking Exam Set 5

Which router command will configure an interface with the IP address 10.10.80.1/19?


Options are :

  • router(config-if)# ip address 10.10.80.1/19
  • router(config-if)# ip address 10.10.80.1 255.255.0.0
  • router(config-if)# ip address 10.10.80.1 255.255.255.0
  • router(config-if)# ip address 10.10.80.1 255.255.224.0
  • router(config-if)# ip address 10.10.80.1 255.255.240.0
  • router(config-if)# ip address 10.10.80.1 255.255.255.240

Answer :router(config-if)# ip address 10.10.80.1 255.255.224.0

Some routers have been configured with default routes. What are some of the advantages of using default routes? (Choose two).


Options are :

  • They establish routes that will never go down.
  • They keep routing tables small.
  • They require a great deal of CPU power.
  • They allow connectivity to remote networks that are not in the routing table
  • They direct traffic from the internet into corporate networks.

Answer :They keep routing tables small. They allow connectivity to remote networks that are not in the routing table

Which three statements are correct about RIP version 2? (Choose three).


Options are :

  • It uses broadcast for its routing updates.
  • It supports authentication.
  • It is a classless routing protocol.
  • It has a lower default administrative distance then RIP version 1.
  • It has the same maximum hop count as RIP version 1.
  • It does not send the subnet mask any updates.

Answer :It supports authentication. It is a classless routing protocol. It has the same maximum hop count as RIP version 1.

Cisco CCNP Route 300-101 Practice Tests Set 1

A router has learned three possible routes that could be used to reach a destination network. One route is from EIGRP and has a composite metric of 20514560. Another route is from OSPF with a metric of 782. The last is from RIPv2 and has a metric of 4. Which route or routes will the router install in the routing table?


Options are :

  • the OSPF route
  • the EIGRP route
  • the RIPv2 route
  • all three routes
  • the OSPF and RIPv2 routes

Answer :the EIGRP route

What is the best practice when assigning IP addresses in a small office of six hosts?


Options are :

  • Use a DHCP server that is located at the headquarters.
  • Use a DHCP server that is located at the branch office.
  • Assign the addresses by using the local CDP protocol.
  • Assign the addresses statically on each node.

Answer :Assign the addresses statically on each node.

In the configuration of NAT, what does the keyword overload signify?


Options are :

  • When bandwidth is insufficient, some hosts will not be allowed to access network translation.
  • The pool of IP addresses has been exhausted.
  • Multiple internal hosts will use one IP address to access external network resources.
  • If the number of available IP addresses is exceeded, excess traffic will use the specified address pool.

Answer :If the number of available IP addresses is exceeded, excess traffic will use the specified address pool.

ICND1 100-105 Certification Practice Tests Set 3

What happens when computers on a private network attempt to connect to the Internet through a Cisco router running PAT?


Options are :

  • The router uses the same IP address but a different TCP source port number for each connection.
  • An IP address is assigned based on the priority of the computer requesting the connection.
  • The router selects an address from a pool of one-to-one address mappings held in the lookup table.
  • The router assigns a unique IP address from a pool of legally registered addresses for the duration of the connection.

Answer :The router uses the same IP address but a different TCP source port number for each connection.

When configuring NAT, the Internet interface is considered to be what?


Options are :

  • local
  • inside
  • global
  • outside

Answer :outside

The ip helper-address command does what?


Options are :

  • assigns an IP address to a host
  • resolves an IP address from a DNS server
  • relays a DHCP request across networks
  • resolves an IP address overlapping issue

Answer :relays a DHCP request across networks

200-125 Cisco Certified Network Associate (CCNA) Exam Set 2

The network administrator is using a Windows PC application that is called putty.exe for remote communication to a switch for network troubleshooting. Which two protocols could be used during this communication? (Choose two).


Options are :

  • SNMP
  • HTTP
  • Telnet
  • RMON
  • SSH

Answer :Telnet SSH

A network administrator cannot connect to a remote router by using SSH. Part of the show interfaces command is shown. router#show interfaces Serial0/1/0 is up, line protocol is down At which OSI layer should the administrator begin troubleshooting?


Options are :

  • physical
  • data link
  • network
  • transport

Answer :data link

Which of the following statements are TRUE regarding Cisco access lists? (Choose two).


Options are :

  • In an inbound access list, packets are filtered as they enter an interface.
  • In an inbound access list, packets are filtered before they exit an interface.
  • Extended access lists are used to filter protocol-specific packets.
  • You must specify a deny statement at the end of each access list to filter unwanted traffic.
  • When a line is added to an existing access list, it is inserted at the beginning of the access list.

Answer :In an inbound access list, packets are filtered as they enter an interface. Extended access lists are used to filter protocol-specific packets.

200-125 Cisco Certified Network Associate Practice Exam Set 2

What does the "Inside Global" address represent in the configuration of NAT?


Options are :

  • the summarized address for all of the internal subnetted addresses
  • the MAC address of the router used by inside hosts to connect to the Internet
  • a globally unique, private IP address assigned to a host on the inside network
  • a registered address that represents an inside host to an outside network

Answer :a registered address that represents an inside host to an outside network

What is the effect of using the service password-encryption command?


Options are :

  • Only the enable password will be encrypted.
  • Only the enable secret password will be encrypted.
  • Only passwords configured after the command has been entered will be encrypted.
  • It will encrypt the secret password and remove the enable secret password from the configuration.
  • It will encrypt all current and future passwords.

Answer :It will encrypt all current and future passwords.

An administrator has connected devices to a switch and, for security reasons, wants the dynamically learned MAC addresses from the address table added to the running configuration. What must be done to accomplish this?


Options are :

  • Enable port security and use the keyword sticky.
  • Set the switchport mode to trunk and save the running configuration.
  • Use the switchport protected command to have the MAC addresses added to the configuration.
  • Use the no switchport port-security command to allow MAC addresses to be added to the configuration.

Answer :Enable port security and use the keyword sticky.

Cisco 100-101 Interconnecting Cisco Networking Devices Exam Set 2

A company has placed a networked PC in a lobby so guests can have access to the corporate directory. A security concern is that someone will disconnect the directory PC and re-connect their laptop computer and have access to the corporate network. For the port servicing the lobby, which three configuration steps should be performed on the switch to prevent this? (Choose three).


Options are :

  • Enable port security.
  • Create the port as a trunk port.
  • Create the port as an access port.
  • Create the port as a protected port.
  • Set the port security aging time to 0.
  • Statically assign the MAC address to the address table.

Answer :Enable port security. Create the port as an access port. Statically assign the MAC address to the address table.

Why would a network administrator configure port security on a switch?


Options are :

  • to prevent unauthorized Telnet access to a switch port
  • to prevent unauthorized hosts from accessing the LAN
  • to limit the number of Layer 2 broadcasts on a particular switch port
  • block unauthorized access to the switch management interfaces

Answer :to prevent unauthorized hosts from accessing the LAN

How can you ensure that only the MAC address of a server is allowed by switch port Fa0/1?


Options are :

  • Configure port Fa0/1 to accept connections only from the static IP address of the server.
  • Configure the server MAC address as a static entry of port security.
  • Use a proprietary connector type on Fa0/1 that is incomputable with other host connectors.
  • Bind the IP address of the server to its MAC address on the switch to prevent other hosts from spoofing the server IP address.

Answer :Configure the server MAC address as a static entry of port security.

400-101 CCIE Routing and Switching Written Practice Exam Set 1

What should be part of a comprehensive network security plan?


Options are :

  • Allow users to develop their own approach to network security.
  • Physically secure network equipment from potential access by unauthorized individuals.
  • Encourage users to use personal information in their passwords to minimize the likelihood of passwords being forgotten.
  • Delay deployment of software patches and updates until their effect on end-user equipment is well known and widely reported.
  • Minimize network overhead by deactivating automatic antivirus client updates.

Answer :Physically secure network equipment from potential access by unauthorized individuals.

What are two recommended ways of protecting network device configuration files from outside network security threats? (Choose two).


Options are :

  • Allow unrestricted access to the console or VTY ports.
  • Use a firewall to restrict access from the outside to the network devices.
  • Always use Telnet to access the device command line because its data is automatically encrypted.
  • Use SSH or another encrypted and authenticated transport to access device configurations.
  • Prevent the loss of passwords by disabling password encryption.

Answer :Use a firewall to restrict access from the outside to the network devices. Use SSH or another encrypted and authenticated transport to access device configurations.

From which of the following attacks can Message Authentication Code (MAC) shield your network?


Options are :

  • DoS
  • DDoS
  • spoofing
  • SYN floods

Answer :spoofing

200-125 CCNA Cisco Certified Network Associate Test Set 3

If a host experiences intermittent issues that relate to congestion within a network while remaining connected, what could cause congestion on this LAN?


Options are :

  • half-duplex operation
  • broadcast storms
  • network segmentation
  • multicasting

Answer :broadcast storms

A host had a NIC card installed. The NIC can run in either half or full-duplex mode. The host is connected to a hub that is located in a wiring closet. The network administrator notes that the NIC is only communicating in half-duplex mode. Which action could be taken to enable full-duplex operation?


Options are :

  • Replace the host NIC.
  • Replace the hub with a Fast Ethernet switch.
  • Replace the cable between the PC and hub port.
  • Install a second NIC card in the host and connect it to another port on the hub.

Answer :Replace the hub with a Fast Ethernet switch.

Which layer of the OSI model is responsible for segmenting data from a sending host that enables large files to be broken down into smaller segments to prevent transmission errors?


Options are :

  • session
  • presentation
  • application
  • transport

Answer :transport

ICND2 200-105 Certification Practice Tests Set 2

What are two characteristics of segmenting a network with a router? (Choose two).


Options are :

  • a router processes data more quickly than switches
  • filtering can occur based on layer 3 information
  • A router decreases the number of collision domains.
  • adding a router to the network decreases latency
  • broadcasts are not forwarded across the router

Answer :filtering can occur based on layer 3 information broadcasts are not forwarded across the router

What process is used to establish a connection-oriented virtual circuit between two communicating hosts?


Options are :

  • flow control
  • sequencing
  • windowing
  • three-way handshake
  • duplexing

Answer :three-way handshake

What is the result of starting a new router that has no files saved in NVRAM?


Options are :

  • The router starts up in global configuration mode.
  • The router starts up in user EXEC mode.
  • The router starts up in privileged EXEC mode.
  • The router starts up in setup mode.
  • The router starts up in IP configuration mode.
  • The router starts up in RX-boot mode.

Answer :The router starts up in setup mode.

400-101 CCIE Routing and Switching Written Practice Exam Set 6

What source and destination information can be found in the data link layer?


Options are :

  • URL
  • IP address
  • port number
  • MAC address

Answer :MAC address

When troubleshooting a LAN interface operating in full duplex mode, which error condition can be immediately ruled out?


Options are :

  • giants
  • no buffers
  • collisions
  • ignored
  • dribble condition

Answer :collisions

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions