ICND1 100-105 Certification Practice Tests Set 4

Which subnet mask provides the most efficient use of a Class C address space for a company that requires 10 subnets and 12 hosts per subnet?


Options are :

  • 255.255.255.192
  • 255.255.255.248
  • 255.255.255.0
  • 255.255.255.224
  • 255.255.255.252
  • 255.255.255.240

Answer :255.255.255.240

ICND2 200-105 Certification Practice Tests Set 2

What is the last usable address of the network 10.10.64.0 255.255.252.0?


Options are :

  • 10.10.64.254
  • 10.10.67.254
  • 10.10.66.254
  • 10.10.65.254

Answer :10.10.67.254

What is the most efficient subnet mask for a small branch office with seven hosts?


Options are :

  • 255.255.255.0
  • 255.255.255.248
  • 255.255.255.240
  • 255.255.255.224

Answer :255.255.255.240

Which class of IP address will provide sufficient addresses for 66,000 or more hosts?


Options are :

  • Class A
  • Class B
  • Class C
  • Class D
  • Class E

Answer :Class A

200-105 Interconnecting Cisco Networking Devices Part Exam Set 3

From which IP address class can 15 bits be borrowed to create subnets?


Options are :

  • A
  • B
  • C
  • D
  • E

Answer :A

If a host on a network has the address 172.16.45.14/30, what is the address of the subnetwork to which this host belongs?


Options are :

  • 172.16.45.0
  • 172.16.45.4
  • 172.16.45.8
  • 172.16.45.12
  • 172.16.45.16

Answer :172.16.45.12

Which of the following describe Class A host addresses? (Choose three).


Options are :

  • The decimal value of the first octet can range from 1 to 126.
  • The decimal value of the first octet can range from 1 to 192.
  • The first octet represents the entire network portion of the address.
  • The default subnet mask for a Class A network is 255.255.0.0.
  • The value of the first binary place in the first octet must be 0.
  • The first two binary bits of the address must be 00.

Answer :The decimal value of the first octet can range from 1 to 126. The first octet represents the entire network portion of the address. The value of the first binary place in the first octet must be 0.

Cisco 210-060 Implement Collaboration Device Practice Exam Set 3

From where does a small network get its IP network address?


Options are :

  • Internet Assigned Numbers Authority (IANA)
  • Internet Architecture Board (IAB)
  • Internet Service Provider (ISP)
  • Internet Domain Name Registry (IDNR)

Answer :Internet Service Provider (ISP)

A network administrator has subnetted the 172.16.0.0 network using a subnet mask of 255.255.255.192. A duplicate IP address of 172.16.2.120 has accidentally been configured on a workstation in the network. The technician must assign this workstation a new IP address within that same subnetwork. Which address should be assigned to the workstation?


Options are :

  • 172.16.1.80
  • 172.16.2.80
  • 172.16.1.64
  • 172.16.2.64
  • 172.16.2.127
  • 172.16.2.128

Answer :172.16.2.80

On which type of device, is every port in the same collision domain?


Options are :

  • A router
  • A Layer 2 switch
  • A hub
  • A wireless access point

Answer :A hub

300-115 Implementing Cisco IP Switched Network Practice Exam Set 2

A host computer has the IP address 192.168.43.139 and netmask 255.255.255.240. On which logical IP network does this host reside?


Options are :

  • 192.168.0.0/26
  • 192.168.0.0/28
  • 192.168.43.0/28
  • 192.168.43.64/28
  • 192.168.43.112/28
  • 192.168.43.128/28

Answer :192.168.43.128/28

Assuming a subnet mask of 255.255.248.0, three of the following addresses are valid host addresses. Which are these addresses? (Choose three).


Options are :

  • 172.16.9.0
  • 172.16.8.0
  • 172.16.31.0
  • 172.16.20.0

Answer :172.16.9.0 172.16.31.0 172.16.20.0

You have been asked to come up with a subnet mask that will allow all three web servers to be on the same network while providing the maximum number of subnets. Which network address and subnet mask meet this requirement?


Options are :

  • 192.168.252.0 255.255.255.252
  • 192.168.252.8 255.255.255.248
  • 192.168.252.8 255.255.255.252
  • 192.168.252.16 255.255.255.240
  • 192.168.252.16 255.255.255.252

Answer :192.168.252.8 255.255.255.248

210-260 Implementing Cisco Network Security Practice Exam Set 2

Given an IP address 172.16.28.252 with a subnet mask of 255.255.240.0, what is the correct network address?


Options are :

  • 172.16.16.0
  • 172.16.0.0
  • 172.16.24.0
  • 172.16.28.0

Answer :172.16.16.0

You are working in a data center environment and are assigned the address range 10.188.31.0/23. You are asked to develop an IP addressing plan to allow the maximum number of subnets with as many as 30 hosts each. Which IP address range meets these requirements?


Options are :

  • 10.188.31.0/26
  • 10.188.31.0/25
  • 10.188.31.0/28
  • 10.188.31.0/27
  • 10.188.31.0/29

Answer :10.188.31.0/27

Which two addresses can be assigned to a host with a subnet mask of 255.255.254.0? (Choose two).


Options are :

  • 26.35.2.255
  • 186.54.3.0
  • 113.10.4.0
  • 17.35.36.0
  • 175.33.3.255

Answer :26.35.2.255 186.54.3.0

200-105 Inter connecting Cisco Networking Devices Exam Set 4

For the network 192.0.2.0/23, which option is a valid IP address that can be assigned to a host?


Options are :

  • 192.0.2.0
  • 192.0.2.255
  • 192.0.4.0
  • 192.0.3.255

Answer :192.0.2.255

A national retail chain needs to design an IP addressing scheme to support a nationwide network. The company needs a minimum of 300 sub-networks and a maximum of 50 host addresses per subnet. Working with only one Class B address, which of the subnet masks will support an appropriate addressing scheme? (Choose two).


Options are :

  • 255.255.255.192
  • 255.255.252.0
  • 255.255.248.0
  • 255.255.255.0
  • 255.255.255.128
  • 255.255.255.224

Answer :255.255.255.192 255.255.255.128

What cable would you use between a Router and a Switch or Hub?


Options are :

  • Straight-Through
  • Crossover
  • Rolled
  • Coax

Answer :Straight-Through

300-320 Designing Cisco Network Service Architectures Exam Set 4

What is the equivalent of 11001010.11110101.10000011.11101011 in hexadecimal?


Options are :

  • 0xE61A3D67
  • 0xD8B2D356
  • 0xCAF583EB
  • 0xE81E3D36

Answer :0xCAF583EB

Which of the following correctly describe steps in the OSI data encapsulation process? (Choose two).


Options are :

  • The transport layer divides a data stream into segments and may add reliability and flow control information.
  • The data link layer adds physical source and destination addresses and an FCS to the segment.
  • Packets are created when the network layer encapsulates a frame with source and destination host addresses and protocol-related control information.
  • Packets are created when the network layer adds Layer 3 addresses and control information to a segment.
  • The presentation layer translates bits into voltages for transmission across the physical link.

Answer :The transport layer divides a data stream into segments and may add reliability and flow control information. Packets are created when the network layer adds Layer 3 addresses and control information to a segment.

The Cisco Hierarchical Model contains what three layers?


Options are :

  • Core Layer, Distribution Layer, Access Layer
  • Backbone Layer, Production Layer, Access layer
  • Border Gateway Layer, ISP Layer, Distribution Layer
  • Regional Layer, Local Layer, User Layer

Answer :Core Layer, Distribution Layer, Access Layer

200-105 Inter connecting Cisco Networking Devices Exam Set 3

Which fields are contained within an IEEE Ethernet Frame? (Choose two).


Options are :

  • Source and destination MAC address
  • Source and destination network address
  • Source and destination port number
  • FCS Field

Answer :Source and destination MAC address FCS Field

1000Base-T is which IEEE standard?


Options are :

  • 802.3F
  • 802.3z
  • 802.3ab
  • 802.3ae

Answer :802.3ab

Data encapsulation follows what process?


Options are :

  • Application, Segment, Network, Frame, Bits
  • Segments, Packets, Frames, Bits
  • Coax, Twisted pair, Fiber, Wireless
  • Packets, Frames, Segments, Bits
  • Bits, Packets, Segments, Application data

Answer :Segments, Packets, Frames, Bits

210-065 Implementing Cisco Video Network Devices Exam Set 1

What term is used for the unwanted signal interference from adjacent pairs in a cable?


Options are :

  • EMI
  • RFI
  • Crosstalk
  • Attenuation

Answer :Crosstalk

For what two purposes does the Ethernet protocol use physical addresses? (Choose two).


Options are :

  • to uniquely identify devices at Layer 2.
  • to allow communication with devices on a different network.
  • to differentiate a Layer 2 frame from a Layer 3 packet.
  • to establish a priority system to determine which device gets to transmit first.
  • to allow communication between different devices on the same network.
  • to allow detection of a remote device when its physical address is unknown.

Answer :to uniquely identify devices at Layer 2. to allow communication between different devices on the same network.

In an Ethernet network, under what two scenarios can devices transmit? (Choose two).


Options are :

  • when they receive a special token.
  • when there is a carrier.
  • when they detect no other devices are sending.
  • when the medium is idle.
  • when the server grants access.

Answer :when they detect no other devices are sending.

400-101 CCIE Routing and Switching Written Practice Exam Set 3

Which two statements about late collisions are true? (Choose two).


Options are :

  • They may indicate a duplex mismatch.
  • By definition, they occur after the 512th bit of the frame has been transmitted.
  • They indicate received frames that did not pass the FCS match.
  • They are frames that exceed 1518 bytes.
  • They occur when CRC errors and interference occur on the cable.

Answer :They may indicate a duplex mismatch. By definition, they occur after the 512th bit of the frame has been transmitted.

If a router has four interfaces and each interface is connected to four switches, how many broadcast domains are present on the router?


Options are :

  • 1
  • 2
  • 4
  • 8

Answer :4

Which network protocols does DNS use? (Choose two).


Options are :

  • TCP
  • TFTP
  • FTP
  • SCP
  • UDP

Answer :TCP UDP

400-101 CCIE Routing and Switching Written Practice Exam Set 8

The network administrator has asked you to check the status of the workstation's IP stack by pinging the loopback address. What address would you ping to perform this task?


Options are :

  • 10.1.1.1
  • 192.168.0.1
  • 127.0.0.1
  • 239.1.1.1

Answer :127.0.0.1

Which IP address can be assigned to an internet interface?


Options are :

  • 9.255.255.10
  • 10.180.48.224
  • 192.168.20.223
  • 172.16.200.18

Answer :9.255.255.10

What TCP message does a host send to establish a connection with a destination host?


Options are :

  • ISN
  • Establish
  • HELLO
  • SYN
  • Request open
  • ACK

Answer :SYN

300-320 Designing Cisco Network Service Architectures Exam Set 4

DNS servers provide what service?


Options are :

  • They map individual hosts to their specific IP addresses
  • Given an IP address, they determine the name of the host that is sought
  • They run a spell check on host names to ensure accurate routing
  • The convert domain names into IP addresses

Answer :The convert domain names into IP addresses

The corporate head office has a teleconferencing system that uses VOIP (voice over IP) technology. This system uses UDP as the transport for the data transmissions. If these UDP datagrams arrive at their destination out of sequence, what will happen?


Options are :

  • UDP will drop the datagrams.
  • UDP will pass the information in the datagrams up to the next OSI layer in the order that they arrive.
  • UDP will send an ICMP Information Request to the source host.
  • UDP will use the sequence numbers in the datagram headers to reassemble the data in the correct order.

Answer :UDP will pass the information in the datagrams up to the next OSI layer in the order that they arrive.

Which two benefits are provided by using a hierarchical addressing network addressing scheme? (Choose two).


Options are :

  • ease of management and troubleshooting
  • efficient utilization of MAC addresses
  • dedicated communications between devices
  • reduces routing table entries
  • auto-negotiation of media rates

Answer :ease of management and troubleshooting reduces routing table entries

300-320 Designing Cisco Network Service Architectures Exam Set 3

Which of the following describes private IP addresses? (Choose two).


Options are :

  • addresses that can be routed through the public internet
  • a scheme to conserve public addresses
  • addresses licensed to enterprises or ISPs by an internet registry organization
  • addresses chosen by a company to communicate with the internet
  • addresses that cannot be routed through the public internet

Answer :a scheme to conserve public addresses addresses that cannot be routed through the public internet

Which protocol should be used to establish a secure terminal connection to a remote network device?


Options are :

  • SSH
  • ARP
  • Telnet
  • SNMPv2
  • SNMPv1
  • WEP

Answer :SSH

An administrator attempts a traceroute but receives a "Destination Unreachable" message. Which protocol is responsible for that message?


Options are :

  • TCP
  • SNMP
  • RUDP
  • RARP
  • ICMP

Answer :ICMP

200-105 Inter connecting Cisco Networking Devices Exam Set 3

When two hosts are trying to communicate across a network, how does the host originating the communication determine the hardware address of the host that it wants to "talk" to?


Options are :

  • Show Network Address request
  • ARP request
  • RARP request
  • Proxy ARP request
  • Show Hardware Address request
  • Ping request

Answer :ARP request

Which statement is correct regarding the operation of DHCP?


Options are :

  • a DHCP server uses a gratuitous ARP to detect DHCP clients
  • if an address conflict is detected, the address removed from the pool for an amount of time configurable by the administrator
  • a DHCP client uses a ping to detect address conflicts
  • a DHCP client uses a gratuitous ARP to detect DHCP server
  • if an address conflict is detected, the address is removed from the pool and will not be reused until server is rebooted
  • if an address conflict is detected, the address is removed from the pool and an administrator must resolve the conflict

Answer :if an address conflict is detected, the address is removed from the pool and an administrator must resolve the conflict

Which of the following host addresses are members of networks that cannot be routed across the public internet? (Choose three).


Options are :

  • 10.172.13.65
  • 198.234.12.95
  • 172.16.223.125
  • 172.64.12.29
  • 212.193.48.254
  • 192.168.23.252

Answer :10.172.13.65 172.16.223.125 192.168.23.252

200-125 Cisco Certified Network Associate Practice Exam Set 8

Given a subnet mask of 255.255.255.224, which of the following addresses can be assigned to network hosts? (Choose three).


Options are :

  • 201.45.116.159
  • 15.234.118.63
  • 217.63.12.192
  • 92.11.178.93
  • 134.178.18.56
  • 192.168.16.87

Answer :92.11.178.93 134.178.18.56 192.168.16.87

Your ISP has given you the address 223.5.14.7/29 to assign to your router's interface. They have also given you the default gateway address of 223.5.14.4. After you have configured the address, the router is unable to ping any remote devices. What is preventing the router from pinging remote devices?


Options are :

  • the IP address is an invalid class D multicast address
  • the default gateway is the broadcast address for this subnet
  • the IP address is the broadcast address for this subnet
  • the default gateway is not an address on the subnet

Answer :the IP address is the broadcast address for this subnet

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions