ICND 1

Description

Quiz on ICND 1, created by Kaylynn Schulder on 30/10/2014.
Kaylynn Schulder
Quiz by Kaylynn Schulder, updated more than 1 year ago
Kaylynn Schulder
Created by Kaylynn Schulder about 10 years ago
30
2

Resource summary

Question 1

Question
The ip helper-address command does what?
Answer
  • A. assigns an IP address to a host
  • B. resolves an IP address from a DNS server
  • C. relays a DHCP request across networks
  • D. resolves an IP address overlapping issue

Question 2

Question
What is the best practice when assigning IP addresses in a small office of six hosts?
Answer
  • . Use a DHCP server that is located at the headquarters.
  • Use a DHCP server that is located at the branch office.
  • Assign the addresses by using the local CDP protocol.
  • Assign the addresses statically on each node.

Question 3

Question
Refer to the exhibit. As packets travel from Mary to Robert, which three devices will use the destination MAC address of the packet to determine a forwarding path? (Choose three)
Answer
  • HUB 1
  • Switch 1
  • Router 1
  • Switch 2
  • Router 2
  • Switch 3

Question 4

Question
Refer to the exhibit. HostX is transferring a file to the FTP server. Point A represents the frame as it goes toward the Toronto router. What will the Layer 2 destination address be at this point?
Answer
  • A. abcd. 1123.0045
  • B. 192.168.7.17
  • C. aabb.5555.2222
  • D. 192.168.1.1
  • E. abcd.2246.0035

Question 5

Question
The command ip route 192.168.100.160 255.255.255.224 192.168.10.2 was issued on a router. No routing protocols or other static routes are configured on the router. Which statement is true about this command?
Answer
  • A. The interface with IP address 192.168.10.2 is on this router.
  • B. The command sets a gateway of last resort for the router.
  • Packets that are destined for host 192.168.100.160 will be sent to 192.168.10.2.
  • The command creates a static route for all IP traffic with the source address 192.168.100.160.

Question 6

Question
What does administrative distance refer to?
Answer
  • . the cost of a link between two neighboring routers
  • the advertised cost to reach a network
  • the cost to reach a network that is administratively set
  • a measure of the trustworthiness of a routing information source

Question 7

Question
Refer to the exhibit. If host A sends an IP packet to host B, what will the source physical address be in the frame when it reaches host B?
Answer
  • 10.168.10.99
  • 10.168.11.88
  • A1:A1:A1:A1:A1:A1
  • B2:B2:B2:B2:B2:B2
  • C3:C3:C3:C3:C3:C3
  • D4:D4:D4:D4:D4:D4

Question 8

Question
Refer to the exhibit. Host A is sending a packet to Host B for the first time. What destination MAC address will Host A use in the ARP request?
Answer
  • 192.168.0.1
  • 172.16.0.50
  • 00-17-94-61-18-b0
  • 00-19-d3-2d-c3-b2
  • ff-ff-ff-ff-ff-ff
  • 255.255.255.255

Question 9

Question
Refer to the exhibit. Host A can communicate with Host B but not with Host C or D. How can the network administrator solve this problem?
Answer
  • Configure Hosts C and D with IP addresses in the 192.168.2.0 network.
  • Install a router and configure a route to route between VLANs 2 and 3.
  • Install a second switch and put Hosts C and D on that switch while Hosts A and B remain on the original switch.
  • Enable the VLAN trunking protocol on the switch.

Question 10

Question
Refer to the exhibit. The host in Kiev sends a request for an HTML document to the server in Minsk. What will be the source IP address of the packet as it leaves the Kiev router?
Answer
  • 10.1.0.1
  • 10.1.0.5
  • 10.1.0.6
  • 10.1.0.14
  • 10.1.1.16
  • 10.1.2.8

Question 11

Question
Refer to the exhibit. Mary is sending an instant message to Robert. The message will be broken into a series of packets that will traverse all network devices. What addresses will populate these packets as they are forwarded from Router1 to Router2?

Question 12

Question
Refer to the exhibit. Which two statements are correct? (Choose two)
Answer
  • This is a default route.
  • Adding the subnet mask is optional for the ip route command.
  • This will allow any host on the 172.16.1.0 network to reach all known destinations beyond RouterA.
  • This command is incorrect, it needs to specify the interface, such as s0/0/0 rather than an IP address.
  • The same command needs to be entered on RouterA so that hosts on the 172.16.1.0 network can reach network 10.0.0.0.

Question 13

Question
Refer to the exhibit. Which command would you use to configure a static route on Router1 to network 192.168.202.0/24 with a nondefault administrative distance?
Answer
  • router1(config)#ip route 1 192.168.201.1 255.255.255.0 192.168.201.2
  • router1(config)#ip route 192.168.202.0 255.255.255.0 192.168.201.2 1
  • router1(config)#ip route 5 192.168.202.0 255.255.255.0 192.168.201.2
  • router1(config)#ip route 192.168.202.0 255.255.255.0 192.168.201.2 5

Question 14

Question
Refer to the exhibit. The output is from a router in a large enterprise. From the output, determine the role of the router.
Answer
  • A Core router.
  • The HQ Internet gateway router.
  • The WAN router at the central site.
  • Remote stub router at a remote site.

Question 15

Question
Refer to the exhibit. What is the simplest way to configure routing between the regional office network 10.89.0.0/20 and the corporate network?
Answer
  • router1(config)#ip route 10.89.0.0 255.255.240.0 10.89.16.2
  • router2(config)#ip route 10.89.3.0 255.255.0.0 10.89.16.2
  • router1(config)#ip route 10.89.0.0 255.255.240.0 10.89.16.1
  • router2(config)#ip route 0.0.0.0 0.0.0.0 10.89.16.1

Question 16

Question
Refer to the exhibit. What must be configured to establish a successful connection from Host A to switch SW-A through router RT-A?
Answer
  • VLAN 1 on RT-A
  • IP routing on SW-A
  • default gateway on SW-A
  • crossover cable connecting SW-A and RT-A

Question 17

Question
Refer to the exhibit. Which default gateway address should be assigned to HostA?
Answer
  • 192.168.1.1
  • 192.168.1.65
  • 192.168.1.66
  • 192.168.1.129
  • 10.1.1.1
  • 10.1.1.2

Question 18

Question
Which OSI layer header contains the address of a destination host that is on another network?
Answer
  • A. application
  • B. session
  • C. transport
  • D. network
  • E. data link
  • F. physical

Question 19

Question
At which layer of the OSI model does the protocol that provides the information that is displayed by the show cdp neighbors command operate?
Answer
  • A. application
  • B. transport
  • C. network
  • D. physical
  • E. data link

Question 20

Question
What are two common TCP applications? (Choose two)
Answer
  • A. TFTP
  • B. SMTP
  • C. SNMP
  • D. FTP
  • E. DNS

Question 21

Question
Which two characteristics describe the access layer of the hierarchical network design model? (Choose two)
Answer
  • A. layer 3 support
  • B. port security
  • C. redundant components
  • D. VLANs
  • E. PoE

Question 22

Question
Which layer of the TCP/IP stack combines the OSI model physical and data link layers?
Answer
  • A. Internet layer
  • B. transport layer
  • C. application layer
  • D. network access layer

Question 23

Question
Which layer of the OSI model controls the reliability of communications between network devices using flow control, sequencing and acknowledgments?
Answer
  • A. Physical
  • B. Data-link
  • C. Transport
  • D. Network

Question 24

Question
Which network device functions only at Layer 1 of the OSI model?
Answer
  • bridge
  • hub
  • NIC
  • router
  • switch

Question 25

Question
Which of the following describe the process identifier that is used to run OSPF on a router? (Choose two)
Answer
  • A. It is locally significant.
  • B. It is globally significant.
  • C. It is needed to identify a unique instance of an OSPF database.
  • D. It is an optional parameter required only if multiple OSPF processes are running on the router.
  • E. All routers in the same OSPF area must have the same process ID if they are to exchange routing information.

Question 26

Question
Which statements describe the routing protocol OSPF? (Choose three)
Answer
  • A. It supports VLSM.
  • B. It is used to route between autonomous systems.
  • C. It confines network instability to one area of the network.
  • D. It increases routing overhead on the network.
  • E. It allows extensive control of routing updates.
  • F. It is simpler to configure than RIPv2.

Question 27

Question
Which address are OSPF hello packets addressed to on point-to-point networks?
Answer
  • A. 224.0.0.5
  • B. 172.16.0.1
  • C. 192.168.0.5
  • D. 223.0.0.1
  • E. 254.255.255.255

Question 28

Question
What information does a router running a link-state protocol use to build and maintain its topological database? (Choose two)
Answer
  • A. hello packets
  • B. SAP messages sent by other routers
  • C. LSAs from other routers
  • D. beacons received on point-to-point links
  • E. routing tables received from other link-state routers
  • F. TTL packets from designated routers

Question 29

Question
Which protocol uses a connection-oriented service to deliver files between end systems?
Answer
  • A. TFTP
  • B. DNS
  • C. FTP
  • D. SNMP
  • E. RIP

Question 30

Question
On a Cisco switch, which protocol determines if an attached VoIP phone is from Cisco or from another vendor?
Answer
  • A. RTP
  • B. TCP
  • C. CDP
  • D. UDP

Question 31

Question
Which statements accurately describe CDP? (Choose three)
Answer
  • A. CDP is an IEEE standard protocol.
  • B. CDP is a Cisco proprietary protocol.
  • C. CDP is a datalink layer protocol.
  • D. CDP is a network layer protocol.
  • E. CDP can discover directly connected neighboring Cisco devices.
  • F. CDP can discover Cisco devices that are not directly connected.

Question 32

Question
A workstation has just resolved a browser URL to the IP address of a server. What protocol will the workstation now use to determine the destination MAC address to be placed into frames directed toward the server?
Answer
  • A. HTTP
  • B. DNS
  • C. DHCP
  • D. RARP
  • E. ARP

Question 33

Question
Which statements are true regarding ICMP packets? (Choose two)
Answer
  • A. They acknowledge receipt of TCP segments.
  • B. They guarantee datagram delivery
  • C. TRACERT uses ICMP packets.
  • D. They are encapsulated within IP datagrams.
  • E. They are encapsulated within UDP datagrams

Question 34

Question
An administrator has connected devices to a switch and, for security reasons, wants the dynamically learned MAC addresses from the address table added to the running configuration. What must be done to accomplish this?
Answer
  • A. Enable port security and use the keyword sticky.
  • B. Set the switchport mode to trunk and save the running configuration.
  • C. Use the switchport protected command to have the MAC addresses added to the configuration.
  • D. Use the no switchport port-security command to allow MAC addresses to be added to the configuration.

Question 35

Question
The following commands are entered on the router: Burbank(config)# enable secret fortress Burbank(config)# line con 0 Burbank(config-line)# login Burbank(config-line)# password n0way1n Burbank(config-line)# exit Burbank(config)# service password-encryption What is the purpose of the last command entered?
Answer
  • A. to require the user to enter an encrypted password during the login process
  • B. to prevent the vty, console, and enable passwords from being displayed in plain text in the configuration files
  • C. to encrypt the enable secret password
  • D. to provide login encryption services between hosts attached to the router

Question 36

Question
Why would a network administrator configure port security on a switch?
Answer
  • A. to prevent unauthorized Telnet access to a switch port
  • B. to prevent unauthorized hosts from accessing the LAN
  • C. to limit the number of Layer 2 broadcasts on a particular switch port
  • D. block unauthorized access to the switch management interfaces

Question 37

Question
A company has placed a networked PC in a lobby so guests can have access to the corporate directory. A security concern is that someone will disconnect the directory PC and re-connect their laptop computer and have access to the corporate network. For the port servicing the lobby, which three configuration steps should be performed on the switch to prevent this? (Choose three)
Answer
  • A. Enable port security.
  • B. Create the port as a trunk port.
  • C. Create the port as an access port.
  • D Create the port as a protected port.
  • E. Set the port security aging time to 0.
  • F. Statically assign the MAC address to the address table.
  • G. Configure the switch to discover new MAC addresses after a set time of inactivity

Question 38

Question
What is the effect of using the service password-encryption command?
Answer
  • A. Only the enable password will be encrypted.
  • B. Only the enable secret password will be encrypted.
  • C. Only passwords configured after the command has been entered will be encrypted.
  • D. It will encrypt the secret password and remove the enable secret password from the configuration.
  • E. It will encrypt all current and future passwords.

Question 39

Question
How can you ensure that only the MAC address of a server is allowed by switch port Fa0/1?
Answer
  • A. Configure port Fa0/1 to accept connections only from the static IP address of the server.
  • B. Configure the server MAC address as a static entry of port security.
  • C. Use a proprietary connector type on Fa0/1 that is incomputable with other host connectors.
  • D. Bind the IP address of the server to its MAC address on the switch to prevent other hosts from spoofing the server IP address.

Question 40

Question
What is the subnet address for the IP address 172.19.20.23/28?
Answer
  • A. 172.19.20.0
  • B. 172.19.20.15
  • C. 172.19.20.16
  • D. 172.19.20.20
  • E. 172.19.20.32

Question 41

Question
What is the network address for the host with IP address 192.168.23.61/28?
Answer
  • A. 192.168.23.0
  • B. 192.168.23.32
  • C. 192.168.23.48
  • D. 192.168.23.56
  • E. 192.168.23.60

Question 42

Question
Given an IP address of 192.168.1.42 255.255.255.248, what is the subnet address?
Answer
  • A. 192.168.1.8/29
  • B. 192.168.1.32/27
  • C. 192.168.1.40/29
  • D. 192.168.1.16/28
  • E. 192.168.1.48/29

Question 43

Question
An administrator must assign static IP addresses to the servers in a network. For network 192.168.20.24/29, the router is assigned the first usable host address while the sales server is given the last usable host address. Which of the following should be entered into the IP properties box for the sales server?
Answer
  • A. IP address: 192.168.20.14 Subnet Mask: 255.255.255.248 Default Gateway. 192.168.20.9
  • B. IP address: 192.168.20.254 Subnet Mask: 255.255.255.0 Default Gateway: 192.168.20.1
  • C. IP address: 192.168.20.30 Subnet Mask: 255.255.255.248 Default Gateway: 192.168.20.25
  • D. IP address: 192.168.20.30 Subnet Mask: 255.255.255.240 Default Gateway: 192.168.20.17
  • E. IP address: 192.168.20.30 Subnet Mask: 255.255.255.240 Default Gateway. 192.168.20.25

Question 44

Question
Given a Class C IP address subnetted with a /30 subnet mask, how many valid host IP addresses are available on each of the subnets?
Answer
  • A. 1
  • B. 2
  • C. 4
  • D. 8
  • E. 252
  • F. 254

Question 45

Question
Refer to the exhibit. The enterprise has decided to use the network address 172.16.0.0. The network administrator needs to design a classful addressing scheme to accommodate the three subnets, with 30, 40, and 50 hosts, as shown. What subnet mask would accommodate this network? Net bits Subnet mask total-addresses per subnet /20 255.255.240.0 4096 /21 255.255.248.0 2048 /22 255.255.252.0 1024 /23 255.255.254.0 512 /24 255.255.255.0 256 /25 255.255.255.128 128 /26 255.255.255.192 64 /27 255.255.255.224 32 /28 255.255.255.240 16 /29 255.255.255.248 8 /30 255.255.255.252 4
Answer
  • A. 255.255.255.192
  • B. 255.255.255.224
  • C. 255.255.255.240
  • D. 255.255.255.248

Question 46

Question
The network manager has requested a 300-workstation expansion of the network. The workstations are to be installed in a single broadcast domain, but each workstation must have its own collision domain. The expansion is to be as cost-effective as possible while still meeting the requirements. Which three items will adequately fulfill the request? (Choose three)
Answer
  • A. one IP subnet with a mask of 255.255.254.0
  • B. two IP subnets with a mask of 255.255.255.0
  • C. seven 48-port hubs
  • D. seven 48-port switches
  • E. one router interface
  • F. seven router interfaces

Question 47

Question
Which router command will configure an interface with the IP address 10.10.80.1/19?
Answer
  • A. router(config-if)# ip address 10.10.80.1/19
  • B. router(config-if)# ip address 10.10.80.1 255.255.0.0
  • C. router(config-if)# ip address 10.10.80.1 255.255.255.0
  • D. router(config-if)# ip address 10.10.80.1 255.255.224.0
  • E. router(config-if)# ip address 10.10.80.1 255.255.240.0
  • F. router(config-if)# ip address 10.10.80.1 255.255.255.240

Question 48

Question
A PC sends packets to the default gateway IP address the first time since the PC turned on.
Answer
  • ICMP
  • ARP
  • DNS
  • DHCP

Question 49

Question
The network administrator is checking basic IP connectivity from a workstation to a server.
Answer
  • ARP
  • DNS
  • DHCP
  • ICMP

Question 50

Question
The TCP/IP protocol stack must find an IP address for packets destined for a URL.
Answer
  • DNS
  • DHCP
  • ICMP
  • ARP

Question 51

Question
A network device will automatically assign IP addresses to workstations.
Answer
  • DHCP
  • DNS
  • ICMP
  • ARP

Question 52

Question
A PC with address 10.1.5.10 must access devices on the Internet.
Answer
  • NAT
  • DHCP
  • DNS
  • OSPF

Question 53

Question
Only routers and servers require static IP addresses. Easy IP administration is required.
Answer
  • DHCP
  • NAT
  • DNS
  • OSPF

Question 54

Question
A PC only knows a server as Media Server. IP needs to send data to that server.
Answer
  • DNS
  • OSPF
  • DHCP
  • NAT

Question 55

Question
A protocol is needed to replace current static routes with automatic route updates.
Answer
  • OSPF
  • DNS
  • DHCP
  • NAT

Question 56

Question
A protocol used to monitor and manage network devices
Answer
  • SNMP
  • FTP
  • TFTP
  • DNS
  • DHCP

Question 57

Question
A reliable, connection-oriented service that uses TCP to transfer files between systems
Answer
  • FTP
  • TFTP
  • SNMP
  • DNS
  • DHCP

Question 58

Question
A connectionless service that uses UDP to transfer files between systems
Answer
  • TFTP
  • DNS
  • DHCP
  • FTP
  • SNMP

Question 59

Question
A protocol that converts human-readable names into machine-readable addresses
Answer
  • DNS
  • TFTP
  • DHCP

Question 60

Question
Used to assign IP addresses automatically and set parameters such as subnet mask and default gateway
Answer
  • DHCP
  • DNS
  • TFTP
  • SNMP
Show full summary Hide full summary

Similar

Day 2 Quiz
Brian Gamble
DIKTA ICND1 Ch 7
Brian Gamble
DIKTA ICND1 Ch 4
Brian Gamble
DIKTA ICND 1 Ch 3
Brian Gamble
DIKTA ICND 1 Ch 10
Brian Gamble
DIKTA ICND 1 Ch 9
Brian Gamble
DIKTA ICND 1 Ch 17
Brian Gamble
Subnetting
Brian Gamble
DIKTA ICND 1 Ch 8
Brian Gamble
DIKTA ICND 1 Ch 13
Brian Gamble
DIKTA ICND 1 Ch 14
Brian Gamble