Question 1
Question
How should you power up a Cisco router?
Answer
-
Press the Reset button.
-
Turn the power switch to “on.”
-
Connect the fiber cable to another router.
-
Attach the power cable plug to the router power supply socket.
Question 2
Question
How do you instruct a Cisco device to parse and execute an entered command?
Question 3
Question
Which Cisco router component is used primarily to store the startup-config file?
Answer
-
RAM
-
ROM
-
NVRAM
-
Flash memory
-
Configuration register
Question 4
Question
If a route for a network is in holddown and an update arrives from a neighboring router with the same metric as was originally recorded for the network, what does the router do?
Answer
-
Ignores the update
-
Increments the holddown timer
-
Marks the network as “accessible” and removes the holddown timer
-
Marks the network as “accessible” but keeps the holddown timer on
Question 5
Question
How could you obtain CDP information about a remote device that is not directly connected?
Answer
-
Use the command show cdp neighbors’ address.
-
Use the command show cdp neighbors’ hostname.
-
Use SSH or Telnet to access a Cisco device connected to the target device.
-
It is not possible to obtain CDP information about a remote device.
Question 6
Question
Which address type from IPv4 was eliminated in IPv6?
Answer
-
Unicast
-
Multicast
-
Broadcast
-
Everycast
Question 7
Question
Set of networks subject to translation using NAT.
Question 8
Question
If a router does not match the appropriate address portions to a number on its routing table, it [blank_start].[blank_end]
Answer
-
sends the packet back to the sender.
-
passes the packet to the next router in.
-
adds that number to its table.
-
discards the packet.
Question 9
Question
How many subnets are gained by subnetting 172.17.32.0/20 into multiple /28 subnets?
Question 10
Question
Which of the following describes the DHCP server provided by Cisco IOS?
Answer
-
It is a full DHCP server
-
Its support is limited to assigning IP addresses to clients.
-
It has to get is DHCP information for a master DHCP server.
-
It has limited DHCP support and can only assign IP addresses and default gateways to clients.
Question 11
Question
How can you most effectively summarize the IP range of addresses from 172.168.12.0/24 through 172.168.13.0/24?
Answer
-
172.168.12.0/23
-
172.168.12.0/22
-
172.168.12.0/21
-
172.168.12.0/20
Question 12
Question
A subnet mask tells the router to look at which portions of an IP address?
Answer
-
Mask and host bits
-
Host and network bits
-
Host and subnet bits
-
Network and subnet bits
Question 13
Question
If a route for a network is in holddown and an update arrives from a neighboring router with the same metric as was originally recorded for the network, what does the router do?
Answer
-
Ignores the update
-
Increments the holddown timer
-
Marks the network as “accessible” and removes the holddown timer
-
Marks the network as “accessible” but keeps the holddown timer on
Question 14
Question
What is the decimal equivalent of the binary number 11000111?
Question 15
Question
What does split horizon specify?
Answer
-
That information about a route should not be sent in any direction
-
That information about a route should not be sent back in the direction that the original information came from
-
That information about a route should always be sent back in the direction that the original information came from
-
That information about a route should be sent back only in the direction that the original information came from
Question 16
Question
The binary number 11101000111 converted into a decimal number, using powers of 2, is [blank_start].[blank_end]
Question 17
Question
In which situation is an administrative distance required?
Answer
-
whenever static routes are defined
-
whenever dynamic routing is enabled
-
when the same route is learned via multiple routing sources
-
when multiple paths are available to the same destination and they are all learned via the same routing protocol
Question 18
Question
What is the RSTP equivalent to the STP listening state?
Answer
-
Blocking
-
Listening
-
Discarding
-
Forwarding
Question 19
Question
Which statement is true of a port in the listening state?
Answer
-
The port is able to check for BPDUs and populate the MAC table.
-
The port is able to check for BPDUs, but not yet populate its MAC table.
-
The port is able to populate its MAC table, but not yet forward user frames.
-
The port is able to forward user frames, but not yet populate its MAC table.
Question 20
Question
Which of the following is a customized text that is displayed before the username and password login prompts?
Answer
-
Message Of the Day
-
Login banner
-
User banner
-
Warning message
Question 21
Question
With RSTP, which two port roles are included in the active topology?
Answer
-
Root and alternate
-
Root and designated
-
Alternate and backup
-
Designated and backup
Question 22
Question
Which term commonly describes the endless flooding or looping of frames?
Answer
-
Flood storm
-
Loop overload
-
Broadcast storm
-
Broadcast overload
Question 23
Question
Regarding STP, what is the state of a nondesignated port?
Answer
-
Blocking
-
Learning
-
Listening
-
Forwarding
Question 24
Question
Which of the following is the most secure method of remotely accessing a network device?
Answer
-
http
-
telnet
-
ssh
-
rmon
-
snmp
Question 25
Question
When you use the show interface command to display the status and statistics for the interfaces configured on a Catalyst switch, which output field indicates the MAC address that identifies the interface hardware?
Question 26
Question
Which term describes multiple copies of a frame arriving on different ports of a switch?
Question 27
Question
Which show command requires that you have privileged EXEC mode access?
Answer
-
show ip
-
show version
-
show running
-
show interfaces
Question 28
Question
What are TWO major benefits of adding a bridge to a network?
Answer
-
Isolating potential network problems to specific segments
-
Increasing the speed of a network
-
Extending a LAN to cover greater distances by joining multiple segments
-
Creating fewer collision domains
-
Forwarding data frames between LAN segments
Question 29
Question
When a single computer with one IP address has several websites open at once, this is called [blank_start].[blank_end]
Question 30
Question
If the POST tests complete successfully on a Catalyst switch, what display could you see on the console?
Answer
-
The > prompt
-
The privileged EXEC prompt
-
The Management Console logon screen
-
A list of commands available on the switch
Question 31
Question
Which information does the show vlan command display?
Answer
-
VTP domain parameters
-
VMPS server configuration parameters
-
Which ports are configured as trunks
-
Names of the VLANs and the ports assigned to the VLANs
Question 32
Question
What are TWO reasons for using 802.1Q?
Answer
-
To allow switches to share a trunk link with non-trunking clients
-
To allow clients to see the 802.1Q header
-
To provide inter-VLAN communications over a bridge
-
To load-balance traffic between parallel links using the Spanning Tree Protocol
-
To provide trunking between Cisco switches and other vendor switches
Question 33
Question
Which CLI prompt indicates that you are working in privileged EXEC mode?
Answer
-
hostname#
-
hostname>
-
hostname-exec>
-
hostname-config
Question 34
Question
What are the TWO most common IPv4-to-IPv6 transition techniques?
Answer
-
IPv6 NAT
-
dual stack
-
6to4 tunnels
-
IPv6 mobile
Question 35
Question
Which TWO pieces of information are included in a CDP update packet?
Answer
-
platform
-
routing updates
-
device identifiers
-
MAC Address list
-
link speed
Question 36
Question
Which TWO statements are true regarding dual stack?
Answer
-
A new API replaces gethostbyname and gethostbyaddr calls.
-
Tunneling is automatic.
-
Dual stack prefers IPv4 over IPv6.
-
You cannot use IPv4 while converting to IPv6.
-
The stack to use is chosen based on destination address.
Question 37
Question
How can you most effectively summarize the IP range of addresses from 10.1.32.0 through 10.1.35.255?
Answer
-
10.1.32.0/23
-
10.1.32.0/22
-
10.1.32.0/21
-
10.1.32.0/20
Question 38
Question
How do you start a Catalyst 2950 series switch?
Answer
-
Press the on/off switch.
-
Power up the redundant power supply.
-
Connect a network cable to another switch on the network.
-
Attach the power cable plug to the switch power supply socket.
Question 39
Question
Which Cisco IOS command should you use to set the clock speed to 64 kbps on a serial interface on a Cisco router?
Answer
-
clock rate 64
-
clock speed 64
-
clock rate 64000
-
clock speed 64000
Question 40
Question
OSPF routes packets within a single [blank_start].[blank_end]
Answer
-
area.
-
network.
-
segment.
-
autonomous system.
Question 41
Question
Which Cisco IOS command creates a message to be displayed upon router login?
Question 42
Question
Which Cisco IOS command is used to return to user EXEC mode from the privileged EXEC mode?
Answer
-
exit>
-
quit
-
disable
-
userexec
Question 43
Question
Which access level allows a person to access all router commands and can be password protected to allow only authorized individuals to access the router?
Answer
-
user EXEC level
-
setup EXEC level
-
enable EXEC level
-
privileged EXEC level
Question 44
Question
Which component of security ensures the data has not been tampered with?
Answer
-
Authentication
-
Integrity
-
Confidentiality
-
Anti-Playback
Question 45
Question
Which organization offers certification for interoperability between vendors of 802.11 products?
Question 46
Question
Which THREE are the steps to secure a WLAN?
Answer
-
Encryption for providing privacy and confidentiality
-
Authentication to ensure that legitimate clients and users access the network via trusted access points
-
Controls transmit power to limit the AP access range to the property boundaries of the parent organization
-
Protection from security risks and availability with intrusion detection and intrusion protection systems for WLANs
Question 47
Question
What are THREE characteristics of Ethernet 802.3?
Answer
-
based on the CSMA/CD process
-
a standard that has been replaced by Ethernet II
-
specifies the physical layer (Layer 1)
-
developed in the mid-1970s
-
specifies the MAC portion of the data link layer (Layer 2)
-
also referred to as thick Ethernet
Question 48
Question
Which TWO of these addresses are private IP addresses?
Answer
-
10.215.34.124
-
127.16.71.43
-
172.17.10.10
-
225.200.15
Question 49
Question
How many bits are in an IPv4 address?
Question 50
Question
Encapsulates the network layer packet in a frame.
Answer
-
Network layer
-
Datalink layer
-
Physical layer
Question 51
Question
Occurs when RF waves are soaked up by walls.
Answer
-
Absorption
-
Reflection
-
Scattering
Question 52
Question
How many bits are in an IPv6 address?
Question 53
Question
Provides applications for file transfer, network troubleshooting, and Internet activities, and supports the network
Answer
-
Physical layer
-
Datalink layer
-
Internet layer
-
Transport layer
-
Application layer
Question 54
Question
Encodes the data-link frame into a pattern of 1s and 0s (bits) for transmission on the medium (usually a wire).
Answer
-
Network layer
-
Datalink layer
-
Physical layer
Question 55
Question
Which of the following four attacks are classified as access attacks? (choose one or more)
Answer
-
Password attacks
-
DDoS
-
Trojan horse
-
Love Bug
Question 56
Question
Which THREE statements about TCP are accurate?
Answer
-
TCP operates at Layer 3 of the TCP/IP stack.
-
TCP is a connection-oriented protocol.
-
TCP provides no error checking.
-
TCP packets are numbered and sequenced so that the destination can reorder packets and determine if a packet is missing.
-
TCP provides no recovery service.
-
Upon receipt of one or more TCP packets, the receiver returns an acknowledgement to the sender indicating that it received the packets.
Question 57
Question
What are TWO major benefits of adding a bridge to a network?
Answer
-
isolating potential network problems to specific segments
-
increasing the speed of a network
-
extending a LAN to cover greater distances by joining multiple segments
-
creating fewer collision domains.
-
forwarding data frames between LAN segments.
Question 58
Question
Indicates how well the network can accommodate more users or data transmission requirements.
Answer
-
Speed
-
Cost
-
Security
-
Availability
-
Scalability
-
Reliability
-
Topology
Question 59
Question
Which two statements about wireless networks are accurate?
Answer
-
Instead of cables, wireless communication uses RFs or infrared waves to transmit data.
-
To receive the signals from the access point, a computer needs to have a wireless adapter card or wireless NIC.
-
For wireless LANs, a key component is a router, which propagates signal distribution.
-
Wireless networks are not very common, and generally only large corporations use them.
Question 60
Question
What are TWO characteristics of OSPF?
Answer
-
hierarchical
-
proprietary
-
open standard
-
similar to RIP