Professional Documents
Culture Documents
wiki
e-mail
weblog
instant messaging
DSL
dial-up
satellite
cell modem
cable modem
LAN
MAN
WAN
WLAN
5. Refer to the exhibit. From which location did this router load the IOS?
flash memory
NVRAM?
RAM
ROM
a TFTP server?
a console connection
an AUX connection
a Telnet connection
an SSH connection
9. What function does pressing the Tab key have when entering a
command in IOS?
My Switch(config)#?
Switch(config)#?
MySwitch(config)#?
My(config)#?
Switch#
letmein
secretin
lineconin
linevtyin
14. Which IPv4 address can be pinged to test the internal TCP/IP
operation of a host?
0.0.0.0
0.0.0.1
127.0.0.1
192.168.1.1
255.255.255.255
15. What three application layer protocols are part of the TCP/IP protocol
suite? (Choose three.)
ARP
DHCP
DNS
FTP
NAT
PPP
16. Which two protocols function at the internet layer? (Choose two.)
ARP
BOOTP
ICMP
IP
PPP
IP address
default gateway address
MAC address
logical address
19. What is the protocol that is used to discover a physical address from
a known logical address and what message type does it use?
ARP, multicast
DNS, unicast
DNS, broadcast
ARP, broadcast
PING, multicast
PING, broadcast
The host cannot communicate with other hosts in the local network.
The switch will not forward packets initiated by the host.
The host will have to use ARP to determine the correct address of the default gateway.
The host cannot communicate with hosts in other networks.
A ping from the host to 127.0.0.1 would not be successful.
21. What is an important function of the physical layer of the OSI model?
logical address
physical address
data
error detection
26. Refer to the exhibit. A ping to PC3 is issued from PC0, PC1, and PC2
in this exact order. Which MAC addresses will be contained in the S1
MAC address table that is associated with the Fa0/1 port?
ARP
DNS
NAT
SMB
DHCP
HTTP
It is the IP address of the Router1 interface that connects the company to the Internet.
It is the IP address of the Router1 interface that connects the PC1 LAN to Router1.
It is the IP address of Switch1 that connects PC1 to other devices on the same LAN.
It is the IP address of the ISP network device located in the cloud.
packet switching
microsegmentation
domain name resolution
path selection
flow control
32. Which two statements correctly describe a router memory type and
its contents? (Choose two.)
33. In which default order will a router search for startup configuration
information?
10.172.168.1
172.32.5.2
192.167.10.10
172.20.4.4
192.168.5.254
224.6.6.6
36. How many bits make up the single IPv6 hextet :10CD:?
4
8
16
32
FEC0::/10?
FDFF::/7?
FEBF::/10?
FF00::/8
192.168.1.64/26
192.168.1.32/27
192.168.1.32/28
192.168.1.64/29
Site 1
Site 2
Site 3
Site 4
44. Which two notations are useable nibble boundaries when subnetting
in IPv6? (Choose two.)
/62
/64
/66
/68
/70
DHCPDISCOVER
DHCPOFFER
DHCPREQUEST
DHCPACK
DHCPNACK
47. When applied to a router, which command would help mitigate bruteforce password attacks against the router?
exec-timeout 30
service password-encryption
banner motd $Max failed logins = 5$
login block-for 60 attempts 5 within 60
ipconfig /all
arp -a
ipconfig /displaydns
nslookup
192.168.9.254
192.168.10.1
192.168.10.2
192.168.11.252
192.168.11.254
50. Match the IPv6 address to the IPv6 address type. (Not all options are
used.)
51. What two preconfigured settings that affect security are found on
most new wireless routers? (Choose two.)
broadcast SSID
MAC filtering enabled
WEP encryption enabled
PSK authentication required
default administrator password
EAP
PSK
WEP
WPA
media
wireless NIC
custom adapter
crossover cable
wireless bridge
wireless client software
2001:0DB8:BC15:00AF:0000::
The prefix-length for the range of addresses is
/60
56. Match the phases to their correct stage in the router bootup process.
(Not all options are used.)
59. On a school network, students are surfing the web, searching the
library database, and attending an audio conference with their sister
school in Japan. If network traffic is prioritized with QoS, how will the
traffic be classified from highest priority to lowest priority?
60. During normal operation, from which location do most Cisco routers
run the IOS?
RAM
flash
NVRAM
disk drive
a console connection
an AUX connection
a Telnet connection
an SSH connection
62. Which keys act as a hot key combination that is used to interrupt an
IOS process?
Ctrl-Shift-X
Ctrl-Shift-6
Ctrl-Z
Ctrl-C
HR Switch(config)#?
Switch(config)#?
HRSwitch(config)#?
HR(config)#?
Switch#
FastEthernet0/1
VLAN 1
vty 0
console 0
switch
hub
router
host
71. What are two features of a physical, star network topology? (Choose
two.)
It is straightforward to troubleshoot.
End devices are connected together by a bus.
It is easy to add and remove end devices.
All end devices are connected in a chain to each other.
Each end system is connected to its respective neighbor.
73. What will a Layer 2 switch do when the destination MAC address of a
received frame is not in the MAC table?
cut-through
store-and-forward
fragment-free
fast-forward
75. Which parameter does the router use to choose the path to the
destination when there are multiple routes available?
the lower metric value that is associated with the destination network
the lower gateway IP address to get to the destination network
the higher metric value that is associated with the destination network
the higher gateway IP address to get to the destination network
192.0.2.199
198.51.100.201
203.0.113.211
209.165.201.223
10.20.30.1
172.32.5.2
192.167.10.10
172.30.5.3
192.168.5.5
224.6.6.6
private addresses
public addresses
multicast addresses
experimental addresses
82. Refer to the exhibit. What is the maximum TTL value that is used to
reach the destination www.cisco.com??
11
12
13
14
192.168.1.16/28
192.168.1.64/27
192.168.1.128/27
192.168.1.96/28
192.168.1.192/28
84. In a network that uses IPv4, what prefix would best fit a subnet
containing 100 hosts?
/23
/24
/25
/26
87. Refer to the exhibit. What is the significance of the asterisk (*) in the
exhibited output?
The asterisk shows which file system was used to boot the system.
The asterisk designates which file system is the default file system.
An asterisk indicates that the file system is bootable.
An asterisk designates that the file system has at least one file that uses that file system.
88. Which WLAN security protocol generates a new dynamic key each
time a client establishes a connection with the AP?
EAP
PSK
WEP
WPA
92. Refer to the exhibit. Which area would most likely be an extranet for
the company network that is shown?
area A
area B
area C
area D
94. Three office workers are using the corporate network. The first
employee uses a web browser to view a company web page in order to
read some announcements. The second employee accesses the
corporate database to perform some financial transactions. The third
employee participates in an important live audio conference with other
office workers in branch offices. If QoS is implemented on this network,
what will be the priorities from highest to lowest of the different data
types?
RAM
flash
NVRAM
disk drive
CSMA/CD
priority ordering
CSMA/CA
token passing
100. What happens when a switch receives a frame and the calculated
CRC value is different than the value that is in the FCS field?
The switch places the new CRC value in the FCS field and forwards the frame.
The switch notifies the source of the bad frame.
The switch drops the frame.
The switch floods the frame to all ports except the port through which the frame arrived
to notify the hosts of the error.
0.0.0.0
255.255.255.255
FFFF.FFFF.FFFF
127.0.0.1
01-00-5E-00-AA-23
103. Which frame forwarding method receives the entire frame and
performs a CRC check to detect errors before forwarding the frame?
cut-through switching
store-and-forward switching
fragment-free switching
fast-forward switching
104. What are the two main components of Cisco Express Forwarding
(CEF)? (Choose two.)
adjacency tables
MAC-address tables
routing tables
ARP tables
forwarding information base (FIB)
ARP
DNS
NAT
SMB
DHCP
HTTP
107. Refer to the exhibit. Router R1 has two interfaces that were
configured with correct IP addresses and subnet masks. Why does the
show ip route command output not display any information about the
directly connected networks??
TCP and UDP port numbers are used by application layer protocols.
TCP uses port numbers to provide reliable transportation of IP packets.
UDP uses windowing and acknowledgments for reliable transfer of data.
TCP uses windowing and sequencing to provide reliable transfer of data.
TCP is a connection-oriented protocol. UDP is a connectionless protocol.
111. Which statement is true regarding the UDP client process during a
session with a server?
Datagrams that arrive in a different order than that in which they were sent are not placed
in order.
A session must be established before datagrams can be exchanged.
A three-way handshake takes place before the transmission of data begins.
Application servers have to use port numbers above 1024 in order to be UDP capable.
112. Which two components are configured via software in order for a
PC to participate in a network environment? (Choose two.)
MAC address
IP address
kernel
shell
subnet mask
114. Which two reasons generally make DHCP the preferred method of
assigning IP addresses to hosts on large networks? (Choose two.)
2001:DB8:BC15::0
2001:DB8:BC15:A::0
2001:DB8:BC15:A:1::1
2001:DB8:BC15:A:12::0
116. Which two tasks are functions of the presentation layer? (Choose
two.)
compression
addressing
encryption
session control
authentication
EAP
PSK
WEP
WPA
CCNA 1
END
CCNA 5 Blog
1.
ATM
ISDN
Frame Relay
metro Ethernet
smaller cells
number of subscribers
committed information rate
distance from the central office of the provider
cable
DSL
ISDN
o
o
o
o
channel widths
access method
maximum data rate
modulation techniques
compression techniques
3DES
AES
Diffie-Hellman
DES
ESP
SHA
Which two Layer 1 requirements are outlined in the Dataover-Cable Service Interface Specification (DOCSIS)? (Choose two.)
o
POTS
7
8
9
10
24
o
o
o
o
31
two.)
o
o
o
o
o
Conduct a performance test and compare with the baseline that was
established previously.
Determine performance on the intranet by monitoring load times of
company web pages from remote sites.
Interview departmental administrative assistants and determine if they
think load time for web pages has improved.
Compare the hit counts on the company web server for the current
week to the values that were recorded in previous weeks.
o
o
o
o
o
o
o
o
o
o
ingress interface
TOS field
egress interface
number of packets
number of bytes
port number
o
o
o
o
o
o
o
o
o
o
o
o
o
o
o
authentication
encryption
automatic creation of a public network
automatic creation of a private network
encapsulation
o
o
o
o
GRE
IPsec
SSH
SSL
What is IPsec?
ICMP
TCP-Telnet
TCP-other
UDP-DNS
UDP-other
o
o
o
o
o
o
o
o
static NAT
dynamic NAT
port forwarding
PAT off the external router interface
dynamic NAT overload using the pool of addresses
Cisco
Cisco
Cisco
Cisco
Cisco
The data is encrypted and decrypted by the sending and target hosts.
The data is encrypted and decrypted by VPN gateways at both the
sending and receiving sides.
The data is encrypted by the sending host and decrypted by the VPN
gateway at the receiving side.
The data is encrypted by the VPN gateway at the sending side and
decrypted by the target host.
PAT
dynamic NAT
static NAT
NAT overloading
host?
o
o
o
o
PC-A
PC-A
PC-B
PC-B
with
with
with
with
address
address
address
address
64.100.0.100
209.165.200.225
64.100.0.100
209.165.200.225
o
o
o
o
Which three parts of a Frame Relay Layer 2 PDU are used for
congestion control? (Choose three.)
o
o
o
o
o
o
the
the
the
the
the
the
10-bit DLCI
Extended Address field
C/R bit
FECN bit
BECN bit
DE bit
o
o
o
o
o
Issue the ietf keyword when enabling Frame Relay on interface serial
0/1/0.
Issue the broadcast keyword when performing static mapping on
interface serial 0/1/0.
Correct the IP address used in the frame-relay map command.
Issue the frame-relay lmi-type ansi command on interface serial 0/1/0.
Modify the OSPF process-id from 10 to 1.
Relay?
o
o
o
o
o
o
o
o
802.3
802.5
802.11
802.16
QoS
ADSL
LTE
IPsec
o
o
o
o
encapsulation errors
framing errors
electromagnetic interference
incorrect interface clock rates
late collisions and jabber
data center
services module
access-distribution
enterprise edge
CMTS
CDMA
DOCSIS
VPN
IPsec
o
o
o
o
o
o
Messages that are sent to the syslog server will be limited to levels 3
or lower.
Messages that are sent to the syslog server will be limited to levels 3
and higher.
Only traffic that originates from the GigabitEthernet 0/1 interface will
be monitored.
Messages that are sent to the syslog server will use 192.168.1.5 as the
destination IP address.
The syslog messages will contain the IP address the GigabitEthernet
0/1 interface.
For multiple occurrences of the same error, only the first three
messages will be sent to the server.
o
o
o
o
user?
o
o
o
o
o
o
o
o
site-to-site
remote access
public
private
8
16
24
32
o
o
o
o
o
o
o
o
Ping
Ping
Ping
Ping
from
from
from
from
o
o
o
o
o
o
o
o
o
o
o
o
VPN
VPN
VPN
VPN
gateway
appliance
concentrator
client software
Ethernet
Frame Relay
HDLC
PPP
PAP
CHAP
LCP
IPCP
the problem?
o
o
o
o
o
application
transport
network
data link
physical
auxiliary port
console port
syslog server
virtual terminal
Well done!
PPP is working!
PPP configured!
Configured correctly!
209.165.200.231
209.165.200.225 200.165.200.229
209.165.200.231 209.165.200.239
192.168.10.21
CCNA 4 END
CCNA 5 Blog
1.
failover capabilities
collapsed core
failure domains
services module
S4 and PC_2
S1 and S4
volume
link aggregation
virtual LANs
interface.
o
Redundant paths can be available without causing logical Layer 2 loops.
Network access can be expanded to support both wired and wireless devices.
increased flexibility
reduced costs
flexibility.
o
They are cloud-managed access switches that enable virtual stacking of
switches.
o
They are campus LAN switches that perform the same functions as Cisco
2960 switches.
o
They are service provider switches that aggregate traffic at the edge of the
network.
management
o
on a data center network to provide expansion and transport flexibility
o
They do not support an active switched virtual interface (SVI) with IOS
a Layer 3 switch
a modular router
a PoE device
devices
o
to display router ID and other information about OSPF neighbors
o
to display line status and other information about directly connected Cisco
devices
o
to display routing table and other information about directly connected Cisco
devices
show flash
show NVRAM
show startup-config
show running-config
show version
unavailable.
o
It uses a direct connection to a console or AUX port.
o
CCNA 5 Blog
1.
congested.
o
New traffic is discarded by the switch because it is unable to be processed.
MAC address
VLAN ID
IP address
port ID
port ID
IP address
extended system ID
MAC address
bridge priority
cost
STP
Rapid PVST+
PVST+
MST
STP
Rapid PVST+
PVST+
MSTP
RSTP
PVST+ requires fewer CPU cycles for all the switches in the network.
blocking
disabled
forwarding
learning
listening
lowest IP address
highest IP address
trunk ports
designated ports
root ports
edge ports
Link types can only be configured on access ports configured with a single
VLAN.
listening
learning
forwarding
blocking
HSRP
VRRPv2
GLBP
SLB
FHRP
GLBP
HSRP
VRRP
host?
192.168.2.0
192.168.2.1
192.168.2.2
192.168.2.100
Switch_1
Switch_2
Switch_3
Switch_4
CCNA 3 END
CCNA 5 Blog
1.
The IPv6 DHCP pool configuration has no IPv6 address range specified.
The state is not maintained by the DHCPv6 server under stateless DHCPv6
operation.
ip dhcp pool
ip address dhcp
service dhcp
ip helper-address
A DHCP server must be installed on the same LAN as the host that is
The ip address dhcp command was not issued on the interface Gi0/1.
The router does not need to alter the checksum of the IPv4 packets.
The internal hosts have to use a single public IPv4 address for external
communication.
o
The costs of readdressing hosts can be significant for a publicly addressed
network.
Telnet
IPsec
HTTP
ICMP
DNS
It allows sites to use private IPv6 addresses and translates them to global IPv6
addresses.
o
It allows sites to connect multiple IPv4 hosts to the Internet via the use of a
single public IPv4 address.
o
It allows sites to connect IPv6 hosts to an IPv4 network by translating the
IPv6 addresses to IPv4 addresses.
o
It allows sites to use private IPv4 addresses, and thus hides the internal
addressing structure from hosts on public IPv4 networks.
R1 Gi0/1.12
R1 S0/0/0
R2 S0/0/1
R2 Gi0/1.20
inbound
outbound
computer type
in an IPv6 extended ACL that stops packets going to one specific destination
VLAN
o
in an IPv4 named standard ACL that has specific UDP protocols that are
allowed to be used on a specific server
o
in an IPv6 named ACL that permits FTP traffic from one particular LAN
getting to another LAN
o
in an IPv4 extended ACL that allows packets from a range of TCP ports
destined for a specific network device
0.0.0.127
0.0.0.255
0.0.1.255
0.0.255.255
A single ACL command and wildcard mask should not be used to specify these
particular networks or other traffic will be permitted or denied and present a
security risk.
access-class 5 in
ip access-group 5 out
ip access-group 5 in
Refer to the exhibit. How did the router obtain the last route
that is shown?
Another router in the same organization provided the default route by using a
IPv6 uses the link-local address of neighbors as the next-hop address for
dynamic routes.
child route
ultimate route
default route
scalability
ISP selection
speed of convergence
A higher cost for an OSPF link indicates a faster path to the destination.
Link cost indicates a proportion of the accumulated value of the route to the
destination.
o
Cost equals bandwidth.
o
A lower cost indicates a better path to the destination than a higher cost does.
The two routers must include the inter-router link network in an OSPFv2
network command.
o
The OSPFv2 process is enabled on the interface by entering the ospf process
area-id command.
The link interface on each router must be configured with a link-local address.
routers.
o
The database information for each router is obtained from the same source.
o
Paths are chosen based on the lowest number of hops to the designated
router.
to determine which ports are not correctly configured to prevent MAC address
flooding
o
to determine when the CAM table size needs to be increased in order to
prevent overflows
o
to determine if the switch is forwarding the broadcast traffic correctly
o
switchport port-security
o
switchport mode access
switchport port-security
switchport port-security maximum 2
switchport port-security mac-address sticky
switchport port-security violation restrict
o
switchport mode access
switchport port-security maximum 2
switchport port-security mac-address sticky
o
switchport mode access
switchport port-security maximum 2
switchport port-security mac-address sticky
switchport port-security violation protect
Another switch was connected to this switch port with the wrong cable.
An unauthorized user tried to telnet to the switch through switch port Fa0/8.
NAT was enabled on a router, and a private IP address arrived on switch port
Fa0/8.
o
A host with an invalid IP address was connected to a switch port that was
previously unused.
o
Port security was enabled on the switch port, and an unauthorized connection
was made on switch port Fa0/8.
access trunk
What are two ways of turning off DTP on a trunk link between
switches? (Choose two.)
o
Configure attached switch ports with the dynamic desirable command option.
Configure one port with the dynamic auto command option and the opposite
Designed to carry traffic that is generated by users, this type of VLAN is also
High priority traffic, such as voice traffic, uses the native VLAN.
The security of management frames that are carried in the native VLAN can
be enhanced.
o
A separate VLAN should be used to carry uncommon untagged frames to
avoid bandwidth contention on data VLANs.
o
The native VLAN is for routers and switches to exchange their management
information, so it should be different from data VLANs.
Only devices that are connected to the local switch see the frame.
problem?
The access list defines the valid public addresses for the NAT or PAT pool.
The access list defines the private IP addresses that are to be translated.
The access list prevents external devices from being a part of the address
translation.
o
The access list permits or denies specific addresses from entering the device
doing the translation.
ultimate routes.
Hello
packet.
the source and destination MAC addresses and the incoming port
the source and destination MAC addresses and the outgoing port
fault isolation
borderless switching
cut-through switching
store-and-forward switching