CCNA (200-120) / 60questions 60minuts / EN

Description

CCNA 200-120 CCNA 5.0 (CCNA 5.0 EN) Quiz on CCNA (200-120) / 60questions 60minuts / EN, created by Almery M. on 16/03/2016.
Almery M.
Quiz by Almery M., updated more than 1 year ago
Almery M.
Created by Almery M. almost 9 years ago
37
1

Resource summary

Question 1

Question
How should you power up a Cisco router?
Answer
  • Press the Reset button.
  • Turn the power switch to “on.”
  • Connect the fiber cable to another router.
  • Attach the power cable plug to the router power supply socket.

Question 2

Question
How do you instruct a Cisco device to parse and execute an entered command?
Answer
  • Press the Send key
  • Press the Enter key
  • Add a space at end of the command
  • Wait 5 seconds after you enter the command

Question 3

Question
Which Cisco router component is used primarily to store the startup-config file?
Answer
  • RAM
  • ROM
  • NVRAM
  • Flash memory
  • Configuration register

Question 4

Question
If a route for a network is in holddown and an update arrives from a neighboring router with the same metric as was originally recorded for the network, what does the router do?
Answer
  • Ignores the update
  • Increments the holddown timer
  • Marks the network as “accessible” and removes the holddown timer
  • Marks the network as “accessible” but keeps the holddown timer on

Question 5

Question
How could you obtain CDP information about a remote device that is not directly connected?
Answer
  • Use the command show cdp neighbors’ address.
  • Use the command show cdp neighbors’ hostname.
  • Use SSH or Telnet to access a Cisco device connected to the target device.
  • It is not possible to obtain CDP information about a remote device.

Question 6

Question
Which address type from IPv4 was eliminated in IPv6?
Answer
  • Unicast
  • Multicast
  • Broadcast
  • Everycast

Question 7

Question
Set of networks subject to translation using NAT.
Answer
  • Static NAT
  • Dynamic NAT
  • Inside network
  • Outside global IP address

Question 8

Question
If a router does not match the appropriate address portions to a number on its routing table, it [blank_start].[blank_end]
Answer
  • sends the packet back to the sender.
  • passes the packet to the next router in.
  • adds that number to its table.
  • discards the packet.

Question 9

Question
How many subnets are gained by subnetting 172.17.32.0/20 into multiple /28 subnets?
Answer
  • 16
  • 32
  • 256
  • 1024

Question 10

Question
Which of the following describes the DHCP server provided by Cisco IOS?
Answer
  • It is a full DHCP server
  • Its support is limited to assigning IP addresses to clients.
  • It has to get is DHCP information for a master DHCP server.
  • It has limited DHCP support and can only assign IP addresses and default gateways to clients.

Question 11

Question
How can you most effectively summarize the IP range of addresses from 172.168.12.0/24 through 172.168.13.0/24?
Answer
  • 172.168.12.0/23
  • 172.168.12.0/22
  • 172.168.12.0/21
  • 172.168.12.0/20

Question 12

Question
A subnet mask tells the router to look at which portions of an IP address?
Answer
  • Mask and host bits
  • Host and network bits
  • Host and subnet bits
  • Network and subnet bits

Question 13

Question
If a route for a network is in holddown and an update arrives from a neighboring router with the same metric as was originally recorded for the network, what does the router do?
Answer
  • Ignores the update
  • Increments the holddown timer
  • Marks the network as “accessible” and removes the holddown timer
  • Marks the network as “accessible” but keeps the holddown timer on

Question 14

Question
What is the decimal equivalent of the binary number 11000111?
Answer
  • 218
  • 199
  • 179
  • 208

Question 15

Question
What does split horizon specify?
Answer
  • That information about a route should not be sent in any direction
  • That information about a route should not be sent back in the direction that the original information came from
  • That information about a route should always be sent back in the direction that the original information came from
  • That information about a route should be sent back only in the direction that the original information came from

Question 16

Question
The binary number 11101000111 converted into a decimal number, using powers of 2, is [blank_start].[blank_end]
Answer
  • 1183.
  • 1873.
  • 1638.
  • 1863.

Question 17

Question
In which situation is an administrative distance required?
Answer
  • whenever static routes are defined
  • whenever dynamic routing is enabled
  • when the same route is learned via multiple routing sources
  • when multiple paths are available to the same destination and they are all learned via the same routing protocol

Question 18

Question
What is the RSTP equivalent to the STP listening state?
Answer
  • Blocking
  • Listening
  • Discarding
  • Forwarding

Question 19

Question
Which statement is true of a port in the listening state?
Answer
  • The port is able to check for BPDUs and populate the MAC table.
  • The port is able to check for BPDUs, but not yet populate its MAC table.
  • The port is able to populate its MAC table, but not yet forward user frames.
  • The port is able to forward user frames, but not yet populate its MAC table.

Question 20

Question
Which of the following is a customized text that is displayed before the username and password login prompts?
Answer
  • Message Of the Day
  • Login banner
  • User banner
  • Warning message

Question 21

Question
With RSTP, which two port roles are included in the active topology?
Answer
  • Root and alternate
  • Root and designated
  • Alternate and backup
  • Designated and backup

Question 22

Question
Which term commonly describes the endless flooding or looping of frames?
Answer
  • Flood storm
  • Loop overload
  • Broadcast storm
  • Broadcast overload

Question 23

Question
Regarding STP, what is the state of a nondesignated port?
Answer
  • Blocking
  • Learning
  • Listening
  • Forwarding

Question 24

Question
Which of the following is the most secure method of remotely accessing a network device?
Answer
  • http
  • telnet
  • ssh
  • rmon
  • snmp

Question 25

Question
When you use the show interface command to display the status and statistics for the interfaces configured on a Catalyst switch, which output field indicates the MAC address that identifies the interface hardware?
Answer
  • MTU 1500 bytes
  • Hardware is … 10BaseT
  • Address is 0050.BD73.E2C1
  • 802.1d STP State: Forwarding

Question 26

Question
Which term describes multiple copies of a frame arriving on different ports of a switch?
Answer
  • Flood storm
  • Multiple frame transmission
  • MAC database instability
  • Loop overload

Question 27

Question
Which show command requires that you have privileged EXEC mode access?
Answer
  • show ip
  • show version
  • show running
  • show interfaces

Question 28

Question
What are TWO major benefits of adding a bridge to a network?
Answer
  • Isolating potential network problems to specific segments
  • Increasing the speed of a network
  • Extending a LAN to cover greater distances by joining multiple segments
  • Creating fewer collision domains
  • Forwarding data frames between LAN segments

Question 29

Question
When a single computer with one IP address has several websites open at once, this is called [blank_start].[blank_end]
Answer
  • windowing.
  • session multiplexing.
  • segmenting.
  • connection-oriented protocol.

Question 30

Question
If the POST tests complete successfully on a Catalyst switch, what display could you see on the console?
Answer
  • The > prompt
  • The privileged EXEC prompt
  • The Management Console logon screen
  • A list of commands available on the switch

Question 31

Question
Which information does the show vlan command display?
Answer
  • VTP domain parameters
  • VMPS server configuration parameters
  • Which ports are configured as trunks
  • Names of the VLANs and the ports assigned to the VLANs

Question 32

Question
What are TWO reasons for using 802.1Q?
Answer
  • To allow switches to share a trunk link with non-trunking clients
  • To allow clients to see the 802.1Q header
  • To provide inter-VLAN communications over a bridge
  • To load-balance traffic between parallel links using the Spanning Tree Protocol
  • To provide trunking between Cisco switches and other vendor switches

Question 33

Question
Which CLI prompt indicates that you are working in privileged EXEC mode?
Answer
  • hostname#
  • hostname>
  • hostname-exec>
  • hostname-config

Question 34

Question
What are the TWO most common IPv4-to-IPv6 transition techniques?
Answer
  • IPv6 NAT
  • dual stack
  • 6to4 tunnels
  • IPv6 mobile

Question 35

Question
Which TWO pieces of information are included in a CDP update packet?
Answer
  • platform
  • routing updates
  • device identifiers
  • MAC Address list
  • link speed

Question 36

Question
Which TWO statements are true regarding dual stack?
Answer
  • A new API replaces gethostbyname and gethostbyaddr calls.
  • Tunneling is automatic.
  • Dual stack prefers IPv4 over IPv6.
  • You cannot use IPv4 while converting to IPv6.
  • The stack to use is chosen based on destination address.

Question 37

Question
How can you most effectively summarize the IP range of addresses from 10.1.32.0 through 10.1.35.255?
Answer
  • 10.1.32.0/23
  • 10.1.32.0/22
  • 10.1.32.0/21
  • 10.1.32.0/20

Question 38

Question
How do you start a Catalyst 2950 series switch?
Answer
  • Press the on/off switch.
  • Power up the redundant power supply.
  • Connect a network cable to another switch on the network.
  • Attach the power cable plug to the switch power supply socket.

Question 39

Question
Which Cisco IOS command should you use to set the clock speed to 64 kbps on a serial interface on a Cisco router?
Answer
  • clock rate 64
  • clock speed 64
  • clock rate 64000
  • clock speed 64000

Question 40

Question
OSPF routes packets within a single [blank_start].[blank_end]
Answer
  • area.
  • network.
  • segment.
  • autonomous system.

Question 41

Question
Which Cisco IOS command creates a message to be displayed upon router login?
Answer
  • hostname hostname
  • banner motd message
  • hostname interface description
  • description interface description

Question 42

Question
Which Cisco IOS command is used to return to user EXEC mode from the privileged EXEC mode?
Answer
  • exit>
  • quit
  • disable
  • userexec

Question 43

Question
Which access level allows a person to access all router commands and can be password protected to allow only authorized individuals to access the router?
Answer
  • user EXEC level
  • setup EXEC level
  • enable EXEC level
  • privileged EXEC level

Question 44

Question
Which component of security ensures the data has not been tampered with?
Answer
  • Authentication
  • Integrity
  • Confidentiality
  • Anti-Playback

Question 45

Question
Which organization offers certification for interoperability between vendors of 802.11 products?
Answer
  • Wi-Fi
  • IEEE
  • EMA
  • WISC

Question 46

Question
Which THREE are the steps to secure a WLAN?
Answer
  • Encryption for providing privacy and confidentiality
  • Authentication to ensure that legitimate clients and users access the network via trusted access points
  • Controls transmit power to limit the AP access range to the property boundaries of the parent organization
  • Protection from security risks and availability with intrusion detection and intrusion protection systems for WLANs

Question 47

Question
What are THREE characteristics of Ethernet 802.3?
Answer
  • based on the CSMA/CD process
  • a standard that has been replaced by Ethernet II
  • specifies the physical layer (Layer 1)
  • developed in the mid-1970s
  • specifies the MAC portion of the data link layer (Layer 2)
  • also referred to as thick Ethernet

Question 48

Question
Which TWO of these addresses are private IP addresses?
Answer
  • 10.215.34.124
  • 127.16.71.43
  • 172.17.10.10
  • 225.200.15

Question 49

Question
How many bits are in an IPv4 address?
Answer
  • 16
  • 32
  • 48
  • 64
  • 128

Question 50

Question
Encapsulates the network layer packet in a frame.
Answer
  • Network layer
  • Datalink layer
  • Physical layer

Question 51

Question
Occurs when RF waves are soaked up by walls.
Answer
  • Absorption
  • Reflection
  • Scattering

Question 52

Question
How many bits are in an IPv6 address?
Answer
  • 16
  • 32
  • 48
  • 64
  • 128

Question 53

Question
Provides applications for file transfer, network troubleshooting, and Internet activities, and supports the network
Answer
  • Physical layer
  • Datalink layer
  • Internet layer
  • Transport layer
  • Application layer

Question 54

Question
Encodes the data-link frame into a pattern of 1s and 0s (bits) for transmission on the medium (usually a wire).
Answer
  • Network layer
  • Datalink layer
  • Physical layer

Question 55

Question
Which of the following four attacks are classified as access attacks? (choose one or more)
Answer
  • Password attacks
  • DDoS
  • Trojan horse
  • Love Bug

Question 56

Question
Which THREE statements about TCP are accurate?
Answer
  • TCP operates at Layer 3 of the TCP/IP stack.
  • TCP is a connection-oriented protocol.
  • TCP provides no error checking.
  • TCP packets are numbered and sequenced so that the destination can reorder packets and determine if a packet is missing.
  • TCP provides no recovery service.
  • Upon receipt of one or more TCP packets, the receiver returns an acknowledgement to the sender indicating that it received the packets.

Question 57

Question
What are TWO major benefits of adding a bridge to a network?
Answer
  • isolating potential network problems to specific segments
  • increasing the speed of a network
  • extending a LAN to cover greater distances by joining multiple segments
  • creating fewer collision domains.
  • forwarding data frames between LAN segments.

Question 58

Question
Indicates how well the network can accommodate more users or data transmission requirements.
Answer
  • Speed
  • Cost
  • Security
  • Availability
  • Scalability
  • Reliability
  • Topology

Question 59

Question
Which two statements about wireless networks are accurate?
Answer
  • Instead of cables, wireless communication uses RFs or infrared waves to transmit data.
  • To receive the signals from the access point, a computer needs to have a wireless adapter card or wireless NIC.
  • For wireless LANs, a key component is a router, which propagates signal distribution.
  • Wireless networks are not very common, and generally only large corporations use them.

Question 60

Question
What are TWO characteristics of OSPF?
Answer
  • hierarchical
  • proprietary
  • open standard
  • similar to RIP
Show full summary Hide full summary

Similar

CCNA (200-120) / 60questões 60minutos / PT-BR
Almery M.
CCNA - MODELO OSI
Rafael La Selva
Roteadores - Memorias - Armazenamento
Fabiana Claro
Camada de Rede/Network
Fabiana Claro
Tabela de Roteamento
Fabiana Claro
Roteadores - Interfaces
Fabiana Claro
ACL - Lista de Controle de Acesso
Fabiana Claro
SYSLOG
Fabiana Claro
Palavras inglês CCNA
Igor Allen Ritzm