Practice CCNA Final - gnu.univ.gda.plgnu.univ.gda.pl/~drizzt7/practiseccnafinal.pdf · Practice...
Transcript of Practice CCNA Final - gnu.univ.gda.plgnu.univ.gda.pl/~drizzt7/practiseccnafinal.pdf · Practice...
Practice CCNA Final1.
The show cdp neighbors command is a very useful network troubleshooting tool. Using theoutput in the graphic, select the statements that are true. (Choose two.)
nmlkji
CDP operates at the network layer of the OSI model.
nmlkjThe output of this command displays information about directly connected Ciscodevices only.
nmlkj
The switch is attached to the SanJose1 FastEthernet0/21 interface.
nmlkj
SanJose1 is running CDP version 12.0.
nmlkj
SanJose1 has two fully operational, cdp-enabled Cisco switches directly connected to it.
nmlkjSanJose2 is a 2600 series router running several routed protocols.
2. Which of the following commands will display "Serial0 is up, line protocol is up"?(Choose two.)
nmlkj
Router# show ip route
nmlkjRouter# show protocols
nmlkj
Router# show interfaces
nmlkjRouter# show ip protocols
nmlkj
Router# show running-config
nmlkjRouter# show cdp neighbors detail
3. Which of the following statements are true regarding the command "ip route 192.168.7.24 255.255.255.248 192.168.7.9"?(Choose two.)
nmlkj
A packet destined for host 192.168.7.30 will be forwarded to address 192.168.7.9.
gfedc
192.168.7.9 is the destination network for this route.
nmlkj
192.168.7.24 is the next-hop router in this command.
gfedc
This command is issued from the interface configuration mode.
gfedcbThis command is used to define a static route.
gfedc
The route for this network will be propagated to other routers via RIP.
4. Which of the following statements are true regarding IP default routing? (Choose three.)
gfedcRouter(config-if)# ip default-route 150.150.150.150 will set a default route.
gfedcbRouter(config)# ip default-network 150.150.150.150 will set a default route.
gfedcbDefault routes keep the routing table shorter.
gfedcbA default route is used to forward data when the destination network is not explicitly listed in the routing table.
gfedc
Default routes are automatically created when the routing protocol is enabled.
5. After several configuration changes are made to a router, the copy run start command is issued. Where will the changes bestored?
nmlkj
flash
nmlkj
ROM
nmlkjiNVRAM
nmlkj
RAM
nmlkj
the configuration register
nmlkj
a TFTP server
nmlkj
flash
nmlkj
ROM
nmlkjiNVRAM
nmlkj
RAM
nmlkj
the configuration register
nmlkj
a TFTP server
6. On a Cisco router, which of the following can be configured during setup mode? (Choose three.)
gfedcbIP addresses
gfedc
a message of the day banner
gfedcbrouted protocols
gfedc
the clock rate for a serial interface
gfedcbthe enable password
gfedc
host tables
7.
A network administrator can ping the Denver router, but gets a 'Password Required but None Set' message when trying to connectremotely via Telnet. Which command sequence must be applied to the Denver router to allow remote access?
nmlkjRouter(config)# line console 0Router(config-line)# loginRouter(config-line)# password cisco
nmlkjiRouter(config)# line vty 0 4Router(config-line)# loginRouter(config-line)# password cisco
nmlkjRouter(config)# line virtual terminalRouter(config-line)# enable loginRouter(config-line)# password cisco
nmlkjRouter(config)# line vty 0 4Router(config-line)# enable secretRouter(config-line)# password cisco
nmlkj
Router(config)# enable secret cisco
nmlkjRouter(config)# enable cisco
8. Understanding the differences between PAP and CHAP is essential. Read the items below and determine which are correct.(Choose three.)
gfedcbPAP sends passwords in clear text.
gfedc
PAP uses a 3-way handshake to establish a link.
gfedc
PAP uses the router to control the frequency of login attempts.
gfedc
CHAP uses a 2-way handshake to establish a link.
gfedcbCHAP encrypts the password while providing protection against playback attacks.
gfedcbCHAP uses repeated challenges for verification.
gfedcbPAP sends passwords in clear text.
gfedc
PAP uses a 3-way handshake to establish a link.
gfedc
PAP uses the router to control the frequency of login attempts.
gfedc
CHAP uses a 2-way handshake to establish a link.
gfedcbCHAP encrypts the password while providing protection against playback attacks.
gfedcbCHAP uses repeated challenges for verification.
9. Which commands can a network administrator use to monitor and verify access list operations? (Choose two.)
gfedcRouter# show IOS version
gfedcbRouter# show access-lists
gfedc
Router# show ip route
gfedcRouter# show protocols
gfedcbRouter# show ip interface
gfedcRouter# show cdp neighbor
10. Identify the factors that contribute to congestion on an Ethernet LAN. (Choose three.)
gfedcbimproper placement of enterprise level servers
gfedcbaddition of hosts to a physical segment
gfedc
replacement of hubs with workgroup switches
gfedcbincreasing use of bandwidth intensive network applications
gfedc
creation of new collision domains without first adding network hosts
gfedc
migration to full-duplex Ethernet within the LAN
11. What command will display a list of commands available for viewing the status of the router?
nmlkjRouter# ?show
nmlkjRouter# sh?
nmlkjiRouter# show ?
nmlkjRouter# help
nmlkjRouter# status ?
nmlkjRouter# ?show
nmlkjRouter# sh?
nmlkjiRouter# show ?
nmlkjRouter# help
nmlkjRouter# status ?
12.
Refer to the diagram. All ports on Switch A are in the Sales VLAN and all ports on Switch B are in the Accounting VLAN. How manybroadcast domains and how many collision domains are shown? (Choose two).
gfedc
3 collision domains
gfedcb3 broadcast domains
gfedc
5 broadcast domains
gfedcb9 collision domains
gfedc
10 collision domains
gfedc
13 collision domains
13. Which type of VLAN identification is specified by IEEE 802.1q?
nmlkj
frame filtering
nmlkj
frame switching
nmlkj
frame bridging
nmlkj
frame checking
nmlkjiframe tagging
14.
Refer to the diagram. Two VLANs have been configured on the switch and users have been assigned. Users in the Sales VLAN canping all of the users in their VLAN, but can not ping the users in the HR VLAN. Why is this true? (Choose two.)
gfedc
All users are in one collision domain.
gfedc
All users are in one broadcast domain.
gfedcbA router is required for communication between VLANs.
gfedcbThe users are in separate broadcast domains.
gfedc
The switch has not been assigned an IP address.
15.
Refer to the diagram. Spanning-Tree Protocol is running in all three switches. After running Spanning-Tree Protocol, ports 1,2,3,4, and 5 areplaced in the forwarding state. Which Spanning-Tree state will port 6 be assigned in order to prevent a loop?
nmlkj
listening state
nmlkj
disabled state
nmlkjiblocking state
nmlkj
learning state
nmlkj
forwarding state
16. Which of the following ISDN devices can be directly connected to the local loop? (Choose three.)
gfedc
a router serial port
gfedcban ISDN router with a NT interface
gfedc
an ISDN terminal adapter
gfedcban NT1 device
gfedcban NT1/NT2 device
gfedc
a TE1 device
gfedc
a router serial port
gfedcban ISDN router with a NT interface
gfedc
an ISDN terminal adapter
gfedcban NT1 device
gfedcban NT1/NT2 device
gfedc
a TE1 device
gfedc
a TE1 device
17. Which of the following are true concerning full-duplex operation on an Ethernet network? (Choose three.)
gfedcbThere are no collisions in full-duplex mode.
gfedcbA dedicated switch port is required for each node.
gfedc
Hub ports are preconfigured for full-duplex mode.
gfedc
The host network card must detect the availability of the media before transmitting.
gfedcbThe host network card and the switch port must be capable of operating in full-duplex mode.
18. Which of the following encapsulation methods are available on the ISDN B channel? (Choose three.)
gfedc
DDR
gfedcbHDLC
gfedcbLAPB
gfedc
LAPD
gfedc
LCP
gfedcbPPP
gfedc
DDR
gfedcbHDLC
gfedcbLAPB
gfedc
LAPD
gfedc
LCP
gfedcb
gfedc
LCP
gfedcbPPP
19.
According to the the provided router output, which of the following statements is true regarding PPP operation?
nmlkj
Only the link-establishment phase completed successfully.
nmlkj
Only the network-layer phase completed successfully.
nmlkj
Neither the link-establishment phase nor the the network-layer phase completed successfully.
nmlkjiBoth the link-establishment and network-layer phase completed successfully.
20. Which of the following IOS commands will define the "interesting" traffic that will cause an ISDN link to become active, and whichcommand will assign that definition to an interface? (Choose two.)
gfedcRouter(config)# dialer 100 idle-timeout 180
gfedcbRouter(config)# dialer-list 100 protocol ip permit
gfedcRouter(config)# dialer map ip 192.168.100.1 name sanjose 555 1234
gfedcbRouter(config-if)# dialer-group 100
gfedcRouter(config-if)# dialer 100 string 555-5000
21.
When troubleshooting a network, it is important to interpret the output of various router commands. Using the graphic, identify which of thefollowing statements are true. (Choose three.)
gfedcbThe missing information for Blank 1 is the command show ip route.
gfedcThe missing information for Blank 1 is the command debug ip route.
gfedc
The missing information for Blank 2 is the number 100.
gfedc
The missing information for Blank 3 is the letter R.
gfedcbThe missing information for Blank 3 is the letter I.
gfedcbThe missing information for Blank 4 is the letter C.
22. Which of the following best describes the operation of distance vector routing protocols?
nmlkj
They use hop count as their only metric.
nmlkj
They only send out updates when a new network is added.
nmlkji
They send their routing tables to directly connected neighbors.
nmlkj
They flood the entire network with routing updates.
23. Which of the following is associated with link-state routing protocols?
nmlkj
low processor overhead
nmlkj
poison reverse
nmlkj
routing loops
nmlkj
split horizon
nmlkjishortest-path first calculations
nmlkj
low processor overhead
nmlkj
poison reverse
nmlkj
routing loops
nmlkj
split horizon
nmlkjishortest-path first calculations
24. The output of the show ip interface brief command displays Serial0 is up, line protocol is down. Which of the following are possiblecauses for the line protocol being in the down state? (Choose two.)
gfedc
The clock rate is not set on the DTE.
gfedc
An incorrect default gateway is set on the router.
gfedc
A network is missing from the routing protocol configuration.
gfedcbThe encapsulation on the Serial0 interface is incorrect.
gfedcbKeepalives are not being sent.
25. A router has learned about a network through static and dynamic routing processes. Which of the following routes will be used toreach network 192.168.168.0?
nmlkj
I 192.168.168.0/24 [100/8947] via 192.168.200.1, 00:00:09, Ethernet0
nmlkj
O 192.168.168.0/24 [110/1012] via 192.168.200.1, 00:00:22, Ethernet0
nmlkj
R 192.168.168.0/24 [120/1] via 192.168.200.1, 00:00:17, Ethernet0
nmlkjiS 192.168.168.0/24 [1/0] via 192.168.200.1, 00:00:10, Ethernet0
nmlkj
I 192.168.168.0/24 [100/8947] via 192.168.200.1, 00:00:09, Ethernet0
nmlkj
O 192.168.168.0/24 [110/1012] via 192.168.200.1, 00:00:22, Ethernet0
nmlkj
R 192.168.168.0/24 [120/1] via 192.168.200.1, 00:00:17, Ethernet0
nmlkjiS 192.168.168.0/24 [1/0] via 192.168.200.1, 00:00:10, Ethernet0
26.
A company has outgrown the address space provided by its 192.168.10.0 network. To accommodate new users, the networkadministrator decided to implement VLANs and do the following:
1. Place the users of the 192.168.10.0 network in VLAN 168.2. Assign new users an IP address from the 172.30.10.0/24 network.3. Place users of the 172.30.10.0 network in VLAN 30.
After implementing the planned VLANs and connecting the network as shown in the graphic, the administrator finds that the users inVLAN 30 are unable to access the Internet or communicate with users in VLAN 168. However, VLAN 168 users are able to access theInternet and each other.
Using the graphic, what should be done to enable users in VLAN 30 to communicate with VLAN 168 users and the Internet? (Choosethree.)
gfedcbConfigure E1 with an address in the 172.30.10.0/24 network.
gfedc
Place all VLAN 30 hosts on the same switch.
gfedc
Configure all hosts with 192.168.10.1 as the default gateway.
gfedcbConnect the router's E1 port to a switch port configured for VLAN 30.
gfedc
Connect the router's E1 port to a switch port configured for VLAN 168.
gfedcbAdd the network 172.30.10.0 to the dynamic routing protocol process.
27.
Which hosts will receive ARP requests from host A, assuming that port 4 on both switches is configured to carry traffic for multiple VLANs?(Choose three.)
gfedc
host B
gfedcbhost C
gfedcbhost D
gfedc
host E
gfedcbhost F
28.
A dynamic routing protocol is configured and working on all of the routers shown in the network. The new network, 143.116.123.0/24, wasadded to the configuration of Router E and advertised in its routing table 60 seconds ago. Which of the following statements are trueregarding the new network? (Choose three.)
gfedcbIf RIP is the routing protocol, routers A,B,C,D, and E should display the new network in their routing table.
gfedc
If RIP is the routing protocol, all of the routers should display the new network in their routing table.
gfedc
If IGRP is the routing protocol, routers A,B,C,D, and E should display the new network in their routing table.
gfedcbIf IGRP is the routing protocol, only router E should display the new network in its routing table.
gfedc
If OSPF is the routing protocol, routers B,C, and E should display the new network in their routing table.
gfedcbIf OSPF is the routing protocol, all of the routers should display the new network in their routing table.
29.
The Tampa and Orlando routers have been configured but do not have full connectivity. Using the partial command output and the diagram,which of the following will occur when testing the network?
nmlkj
Tampa and Orlando will not be able to ping each other through the serial interfaces.
nmlkji
Tampa and Orlando will not learn any routes through the RIP process.
nmlkj
Orlando will have all five of the networks listed in its routing table.
nmlkj
Tampa will have all five of the networks listed in its routing table.
30.
The network administrator shown in the graphic is unable to access the TFTP server attached to the Miami router. Consider only the IPaddressing scheme to identify the causes of this problem. (Choose two.)
gfedc
The default gateway configured on the network administrator's workstation is not a valid host address.
gfedcbThe IP address configured on interface E1 of the Miami router is not a valid host address.
gfedc
The IP address of the TFTP server is a subnetwork address.
gfedc
The IP address of the S0 interface of the Detroit router is a broadcast address.
gfedcbThe IP addresses for the Miami S1 interface and the Detroit S0 are not in the same subnet.
31. Assuming that four bits have been borrowed to make subnets, identify the subnet network addresses. (Choose three.)
gfedc
192.168.14.8
gfedcb192.168.14.16
gfedc
192.168.14.24
gfedcb192.168.14.32
gfedc
192.168.14.148
gfedcb192.168.14.208
32 Which of the following are features of a connection-oriented protocol? (Choose two.)
gfedcbdata transport reliability
gfedc
best path determination
gfedcbestablishing, maintaining, and terminating virtual circuits
gfedc
encapsulation of packets in a data frame with source and destination MAC addresses
gfedc
best-effort datagram delivery
33. Which of the following are private IP addresses? (Choose three.)
gfedc
172.168.33.1
gfedcb10.35.66.70
gfedcb192.168.99.5
gfedcb172.18.88.90
gfedc
192.169.77.89
gfedc
127.33.55.16
gfedc
172.168.33.1
gfedcb10.35.66.70
gfedcb192.168.99.5
gfedcb172 18 88 90
192.168.99.5
gfedcb172.18.88.90
gfedc
192.169.77.89
gfedc
127.33.55.16
34. Assuming a subnet mask of 255.255.224.0, which of the following would be valid host addresses? (Choose three.)
gfedcb124.78.103.0
gfedc
125.67.32.0
gfedc
125.78.160.0
gfedcb126.78.48.0
gfedc
176.55.96.0
gfedcb186.211.100.0
gfedcb124.78.103.0
gfedc
125.67.32.0
gfedc
125.78.160.0
gfedcb126.78.48.0
gfedc
176.55.96.0
gfedcb186.211.100.0
35. The router reads each bit to determine the class of an address. Which of the following binary numbers would the router identify aspublic class A addresses? (Choose three.)
gfedc
00001010.10101100.11001100.00000111
gfedcb00011111.11110011.11111111.00111011
gfedcb01011101.11100001.11001100.11011011
gfedc
10000000.11111000.11000111.11110011
gfedcb00010111.11011011.11000001.11001100
36. A network has been assigned the IP address of 156.16.0.0. A decision has been made to divide the network into 1024 subnets.Which of the following commands are required to activate an Ethernet interface and configure it with an address from the 25th subnet of thisnetwork? (Choose two.)
gfedcRouter(config-if)# ip address 156.16.5.0 255.255.255.224
gfedcRouter(config-if)# ip address 156.16.5.0 255.255.255.192
gfedcbRouter(config-if)# ip address 156.16.6.65 255.255.255.192
gfedcRouter(config-if)# ip address 156.16.4.193 255.255.255.192
gfedcbRouter(config-if)# no shutdown
gfedcRouter(config-if)# clockrate 56000
gfedcRouter(config-if)# ip address 156.16.5.0 255.255.255.224
gfedcRouter(config-if)# ip address 156.16.5.0 255.255.255.192
gfedcbRouter(config-if)# ip address 156.16.6.65 255.255.255.192
gfedcRouter(config-if)# ip address 156.16.4.193 255.255.255.192
gfedcbRouter(config-if)# no shutdown
gfedcRouter(config-if)# clockrate 56000
37. Which of the following are examples of TCP/IP application layer protocols? (Choose three.)
gfedcba terminal emulation protocol that supports remote console connections with various network devices
gfedc
a protocol created by IBM that makes it easier for mainframes to connect to remote offices
gfedcba protocol responsible for transporting electronic mail on TCP/IP networks and the Internet
gfedc
a protocol that controls the rate at which data is sent to another computer
gfedcba protocol that exchanges network management information between a network device and a management console
gfedcba terminal emulation protocol that supports remote console connections with various network devices
gfedc
a protocol created by IBM that makes it easier for mainframes to connect to remote offices
gfedcba protocol responsible for transporting electronic mail on TCP/IP networks and the Internet
gfedc
a protocol that controls the rate at which data is sent to another computer
gfedcba protocol that exchanges network management information between a network device and a management console
38. Which of the following are methods of flow control? (Choose three.)
gfedc
positive acknowledgement
gfedcbbuffering
gfedcbcongestion avoidance
gfedc
retransmission
gfedcbwindowing
gfedc
positive acknowledgement
gfedcbbuffering
gfedcbbuffering
gfedcbcongestion avoidance
gfedc
retransmission
gfedcbwindowing
39. Which terms refer to Frame Relay congestion management mechanisms? (Choose three.)
gfedcbBECN
gfedc
CIR
gfedc
DLCI
gfedcbDE
gfedcbFECN
gfedc
LMI
gfedcbBECN
gfedc
CIR
gfedc
DLCI
gfedcbDE
gfedcbFECN
gfedc
LMI
40. Frame Relay is configured over a point-to-point connection between two routers. The output of the show frame-relay pvccommand indicates that the status of this PVC is inactive. Which of the following devices could be the source of the problem? (Choose two.)
gfedc
local router
gfedc
local Frame Relay switch
gfedcbremote router
gfedcbremote Frame Relay switch
41. A serial link between RouterA and RouterB is configured for PPP with PAP authentication. Which of the following additionalcommands are required on the routers in order for RouterB to authenticate to RouterA? (Choose two.)
gfedcbRouterA(config)# username stranger password letmein
gfedcRouterB(config)# username stranger password letmein
gfedcRouterA(config-if)# ppp pap sent-username stranger password letmein
gfedcbRouterB(config-if)# ppp pap sent-username stranger password letmein
42. Which of the following application layer protocols use TCP? (Choose three.)
gfedcbSMTP
gfedcbFTP
gfedc
ICMP
gfedcbTelnet
gfedc
HDLC
gfedc
ISDN
43. Which of the following applications use the UDP protocol? (Choose two.)
gfedc
Telnet
gfedcbSNMP
gfedc
SMTP
gfedc
SQL
gfedcbTFTP
44. What steps are required to implement and assign hosts to VLANs? (Choose two.)
gfedcbCreate the VLANs on a switch.
gfedcbAssign ports to the VLANs.
gfedc
Select the VLAN number on the host machine.
gfedc
Configure the switchports with IP addresses.
gfedcbCreate the VLANs on a switch.
gfedcbAssign ports to the VLANs.
gfedc
Select the VLAN number on the host machine.
gfedc
Configure the switchports with IP addresses.
45. What must be done to enable a network administrator to configure a switch remotely?
nmlkj
The switch must be assigned a host name.
nmlkj
The remote management terminal must be assigned to the management VLAN.
nmlkjiThe management IP address of the switch must be set.
nmlkj
The managment port must be configured for full-duplex operation.
nmlkj
Cisco Discovery Protocol must be active on the switch.
nmlkj
SNMP must be configured with the IP address of the management console.
46.
A switch can be configured for three different forwarding modes based on how much of a frame is received before the forwarding processbegins. Each of the numbered arrows in the accompanying graphic signifies the point in a frame where a particular forwarding mode willbegin. Which one of the following groups reflects the sequence of forwarding modes signified by the numbered arrows?
nmlkji1) fast forward2) fragment free3) store-and-forward
nmlkj
1) store-and-forward2) fragment free3) fast forward
nmlkj
1) fragment free2) fast forward3) store-and-forward
nmlkj
1) fast forward2) store-and-forward3) fragment free
47.
Refer to the partial protocol data unit diagrams shown. Which of the following statements are true regarding the encapsulation process?(Choose three.)
gfedcbPDU #1 is an encapsulated packet.
gfedc
PDU #2 is an application layer PDU
gfedcbPDU #3 is a segment.
gfedc
PDU #4 is a transport layer PDU.
gfedcbThe order in which these PDUs are created during the encapsulation process is 3, 4, 1, 2.
gfedc
The order in which these PDUs are created during the encapsulation process is 2, 1, 4, 3.
48. Which of the following commands will verify Layer 3 reachability between networks?
nmlkjRouter# show ip interface brief
nmlkjiRouter# show ip route
nmlkjRouter# show cdp neighbors
nmlkjRouter# show running-config
nmlkjRouter# show protocols
49. Which layer of the TCP/IP model corresponds with Layer 3 of the OSI model?
nmlkj
the application layer
nmlkj
the network layer
nmlkjithe internet layer
nmlkj
the IP layer
nmlkj
the data-link layer
nmlkj
the network interface layer
nmlkj
the application layer
nmlkj
the network layer
nmlkjithe internet layer
nmlkj
the IP layer
nmlkj
the data-link layer
nmlkj
the network interface layer
50. A network host can ping other hosts on its local LAN segment, but it is unable to ping the IP address of the corporate intranet server onanother subnet. Which of the following are potential causes of this problem? (Choose two.)
gfedc
a faulty patch cable from the host to the communications outlet
gfedc
a NIC hardware resource conflict on the host
gfedcban incorrect subnet mask on the host
gfedcban incorrect default gateway setting on the host
gfedc
a local DNS server failure
51. A router does not load its configuration after a power failure. After running the show startup-configuration command, theadminstrator finds that the original configuration is intact. What is the cause of this problem?
nmlkj
The configuration register is set for 0x2100.
nmlkj
The configuration register is set for 0x2101.
nmlkj
The configuration register is set for 0x2102.
nmlkjiThe configuration register is set for 0x2142.
nmlkj
Boot system commands are not configured.
nmlkj
Flash memory is empty causing the router to bypass the configuration in NVRAM.
nmlkj
The configuration register is set for 0x2100.
nmlkj
The configuration register is set for 0x2101.
nmlkj
The configuration register is set for 0x2102.
nmlkjiThe configuration register is set for 0x2142.
nmlkj
Boot system commands are not configured.
nmlkj
Flash memory is empty causing the router to bypass the configuration in NVRAM.
52. Where should extended access control lists be placed?
nmlkjiThey should be placed as close as possible to the source of the traffic to be denied.
nmlkj
They should be placed as close as possible to the destination of the traffic to be denied.
nmlkj
They should be placed on the fastest interface available.
nmlkj
They should be placed on the destination WAN link.
53. Which of the following statements are true regarding the meaning of the access control list wildcard mask 0.0.0.15? (Choose two.)
gfedc
The first 28 bits of a supplied IP address will be ignored.
gfedcbThe last four bits of a supplied IP address will be ignored.
gfedc
The first 32 bits of a supplied IP address will be matched.
gfedcbThe first 28 bits of a supplied IP address will be matched.
gfedc
The last five bits of a supplied IP address will be ignored.
gfedc
The last four bits of a supplied IP address will be matched.