Appendix . Practice Exam

1.

You are trying to enter a command in the IOS, and you receive the following console message: “Invalid input detected at ^.” What should you do to correct this?

  1. Enter more characters for the IOS to understand the command.

  1. Enter more keywords so that the IOS understands what you want to do with the command.

  1. Check your typing syntax.

  1. Check your console connection.

2.

Which of the following forms of NAT incorporates the source IP address (inside local) along with the source port number to make every translation unique?

  1. Static NAT

  1. Dynamic NAT

  1. NAT Overload

  1. NAT Port Mapping

3.

What verification command can show you the current state of the PPP Link Control Protocol?

  1. show interface

  1. show ip interface

  1. show ppp interface

  1. show wan interface

4.

Which of the following are Application layer protocols? (Choose the three best answers)

  1. Telnet

  1. JPEG

  1. HTTP

  1. FTP

5.

Which of the following commands enable you to specify the datagram size in a ping to 10.1.1.1?

  1. Router>ping -l

  1. Router#ping

  1. Router#ping 10.1.1.1

  1. Router>ping 10.1.1.1

6.

The NAT Overload feature on a Cisco router takes multiple inside local addresses and overloads a single ______________ address.

  1. Inside local

  1. Inside global

  1. Outside local

  1. Outside global

7.

Which Application layer protocol resolves hostnames or fully qualified domain names (FQDNs) such as www.cisco.com into IP addresses?

  1. SMTP

  1. NFS

  1. NNTP

  1. DNS

8.

Which of the following configuration registers causes the IOS to boot from flash if no boot system commands are present?

  1. 0×2100

  1. 0×2106

  1. 0×2140

  1. 0×210P

9.

When connecting a serial cable from the CSU/DSU to your Cisco router, what two standards are supported on the Cisco end of the connection? (Choose two)

  1. EIA/TIA-449

  1. Smart Serial

  1. DB-60

  1. RJ-45

10.

Which layer of the OSI model handles dialog control among devices?

  1. Application

  1. Presentation

  1. Session

  1. Transport

11.

Which of the following STP 802.11d port states actively learns MAC addresses? (Choose all that apply)

  1. Blocking

  1. Learning

  1. Listening

  1. Forwarding

12.

Which of the following IP addresses represent public addresses? (Choose two)

  1. 192.186.6.32

  1. 172.31.20.55

  1. 172.200.166.99

  1. 10.255.255.5

  1. 172.17.50.2

13.

SNMP uses which port number?

  1. 67

  1. 68

  1. 69

  1. 161

14.

Which of the following is a form of DoS attack? (Choose three)

  1. TCP SYN

  1. Smurf

  1. DDoS

  1. Trust exploitation

15.

At the end of your Setup Mode dialog, you are asked whether you want to keep the configuration you created. This configuration will be present even if you reboot the device. Where is this configuration stored?

  1. NVRAM

  1. RAM

  1. ROM

  1. Flash

16.

You are troubleshooting network connectivity issues between a client and a server. The server’s IP address recently changed, and you would like to clear the client’s ARP table. What command will accomplish this?

  1. arp -clear

  1. arp -a

  1. arp -c all

  1. arp -d *

17.

____________ is an electrical or magnetic field that is a result of one communications signal that can affect the signal in a nearby circuit.

  1. EMI

  1. Attenuation

  1. Crosstalk

  1. Bandwidth

18.

Which command allows only SSH through the vty lines?

  1. Switch(config)#ssh-service restrict

  1. Switch(config-line)#password ssh-only

  1. Switch(config-line)#transport input ssh

  1. Switch(config)#line ssh 0 4

19.

A host is assigned the IP address 10.5.62.173/27. An application on the host attempts to contact a server with the IP address 10.5.62.158/27. What is the next step in the process of network communication?

  1. The host sends an ARP message directly to the destination server to obtain its MAC address.

  1. The host contacts the IP address of its default gateway to find the MAC address for the destination server.

  1. The host sends an ARP broadcast to find the MAC address of its default gateway.

  1. The host sends an ARP broadcast to find the MAC address of the destination server.

20.

What type of UTP cable would you use to connect a switch to a PC?

  1. Coaxial cable

  1. Straight-through cable

  1. Cross-over cable

  1. Thin coax

21.

Given the following output, which of the statements is false?

Routing Protocol is "rip"
  Sending updates every 30 seconds, next due in 2 seconds
  Invalid after 180 seconds, hold down 180, flushed after 240
  Outgoing update filter list for all interfaces is not set
  Incoming update filter list for all interfaces is not set
  Redistributing: rip
  Default version control: send version 2, receive version 2
    Interface        Send  Recv   Key-chain
    Ethernet0        2     2      examprep
    Serial0          2     2
  Routing for Networks:
    172.19.0.0
    10.2.0.0
  Routing Information Sources:
    Gateway         Distance      Last Update
  Distance:          80

  1. The administrative distance has been changed.

  1. This is version 2 of RIP.

  1. Update authentication is configured.

  1. The router configuration looks like the following:

Router(config)#router rip
Router(config-router)#version 2
Router(config-router)#network 10.2.0.0
Router(config-router)#network 172.19.0.0

22.

What form of NAT allows you to translate one group of IP addresses to another in a 1:1 relationship with minimal configuration?

  1. Port Address Translation

  1. Static NAT

  1. NAT Overload

  1. Dynamic NAT

23.

The Ethernet IEEE 802.3 specification defines which of the following LAN standards? (Choose the three best answers)

  1. 10BASE-2

  1. 10BASE-5

  1. 10BASE-T

  1. Wi-Fi

24.

Which of the following networks are contained in the summarized CIDR route of 192.168.64.0 /19? (Choose all that apply)

  1. 192.168.96.0 /24

  1. 192.168.60.0 /24

  1. 192.168.80.0 /24

  1. 192.168.101.0 /24

25.

Which of the following encapsulation types can be used on leased-line connections? (Choose two)

  1. HDLC

  1. Frame Relay

  1. ISDN

  1. PPP

26.

Which devices are implemented at the Physical layer of the OSI model? (Choose the two best answers.)

  1. Switch

  1. Bridge

  1. Hub

  1. Repeater

27.

Which of the following are 802.3 MAC sublayer Ethernet addresses? (Choose the three best answers)

  1. IP address

  1. Unicast address

  1. Multicast address

  1. Broadcast address

28.

Which of the following would you typically configure as the default gateway for a PC?

  1. The IP address of the local Layer 2 switch

  1. The MAC address of the local Layer 2 switch

  1. The IP address of the local router

  1. The MAC address of the local router

29.

Which of the following match the correct encryption algorithm with the wireless security standard? (Choose two)

  1. WPA / TKIP

  1. WPA2 / TKIP

  1. WPA / AES

  1. WPA2 / AES

30.

Which Ethernet MAC 802.3 sublayer address type always starts with the hexadecimal characters 0100.5E?

  1. Unicast address

  1. Multicast address

  1. Broadcast address

  1. IP address

31.

You no longer have IP connectivity to a remote router at a customer’s site. From your location, what terminal option can you use to gain access to an EXEC session on the remote router?

  1. Console port

  1. Telnet

  1. SSH

  1. Auxiliary port

32.

Which of the following commands would allow a network client to test connectivity to a destination device and verify the current delay for all routers traversed while making the connection?

  1. ping

  1. test

  1. tracert

  1. telnet

  1. ssh -h -d

33.

______________ occurs when a switch creates a dedicated path for sending and receiving transmissions with each connected host.

  1. Microsegmentation

  1. Half-duplex

  1. Full-duplex

  1. CSMA/CD

34.

How does a switch forward frames when the destination MAC address is unknown?

  1. It sends the frame out every port.

  1. It drops the frame and sends an ICMP Destination Unreachable.

  1. It sends an ARP request to find the MAC address and then sends the frame out the port that receives the response.

  1. It floods the frame out every port except the one on which the original frame arrived.

35.

How many wireless channels are available in the U.S. for the 2.4GHz band without overlapping frequencies for close-proximity wireless access points?

  1. 1

  1. 3

  1. 11

  1. 23

36.

Which devices are implemented at the Data Link layer of the OSI model? (Choose the two best answers)

  1. Hub

  1. Repeater

  1. Switch

  1. Bridge

37.

What range represents the first-octet value of a Class A address?

  1. 0 to 126

  1. 1 to 126

  1. 128 to 191

  1. 192 to 223

38.

What Layer 2 protocol can identify information such as the IP address of Cisco devices connected to you?

  1. ICMP

  1. CDP

  1. DNS

  1. DHCP

39.

You are using NAT Overload on your company’s Cisco router to provide Internet access to your internal network. The NAT process is overloading the IP address assigned to the router’s outside interface. Which of the following statements are not true? (Choose two)

  1. Multiple internal users cannot access the same website at the same time, because the website sees two requests coming from the same IP address.

  1. Static NAT mappings can be added for the interface IP address, but only for specific ports.

  1. Static NAT mappings can be added for the full interface IP address.

  1. Cisco’s NAT process allows you to NAT not only to the interface IP address but also to other IP addresses not assigned to the interface.

40.

You are the network administrator of ACME Corp. You have received a number of tickets from your San Diego office complaining about server connectivity issues. You verify the WAN interface connecting the corporate office to the San Diego office:

Router# show interfaces serial
Serial 0 is administratively down, line protocol is down
   Hardware is MCI Serial
   Internet address is 150.136.190.203, subnet mask is 255.255.255.0
   MTU 1500 bytes, BW 1544 Kbit, DLY 20000 usec, rely 255/255, load 1/255
   Encapsulation HDLC, loopback not set, keepalive set (10 sec)
   Last input 0:00:07, output 0:00:00, output hang never
   Output queue 0/40, 0 drops; input queue 0/75, 0 drops
   Five minute input rate 0 bits/sec, 0 packets/sec
   Five minute output rate 0 bits/sec, 0 packets/sec
       16263 packets input, 1347238 bytes, 0 no buffer
       Received 13983 broadcasts, 0 runts, 0 giants
       2 input errors, 0 CRC, 0 frame, 0 overrun, 0 ignored, 2 abort
1 carrier transitions
     22146 packets output, 2383680 bytes, 0 underruns
     0 output errors, 0 collisions, 2 interface resets, 0 restarts

The line protocol is down due to an HDLC encapsulation mismatch. HDLC is Cisco-proprietary and should be changed to PPP. The interface is experiencing input errors. The keepalive value is set too low. The interface is in a shutdown state. You are logged into a router and want to view the IP address of neighboring Cisco routers. What IOS command gives this information for the directly connected neighbors?

  1. show ip clients

  1. show cdp neighbor

  1. show cdp neighbor detail

  1. show ip links

41.

What is the end result of the 192.168.2.0 network based on the following output?

RouterA# debug ip rip
RIP protocol debugging is on
RouterA#
00:26:27: RIP: received v1 update from 192.168.1.6 on Serial0/0
00:26:27:      192.168.2.0 in 12 hops
00:26:37: RIP: received v1 update from 192.168.1.12 on Serial0/1
00:26:37:      192.168.2.0 in 12 hops

  1. The router forwards packets to 192.168.1.6 because it received that update first.

  1. The router forwards packets to 192.168.1.12 because it received that update last.

  1. The router ignores the updates because the maximum hop count is reached.

  1. Both entries are put in the router, and it load-balances over both links.

42.

Your organization uses a wireless security standard that requires users to authenticate to a back-end server with a valid active directory username and password before they are granted access to the wireless network. Upon successful authentication, the dynamic encryption keys are generated for use during the wireless session. What type of network security is in use?

  1. WEP

  1. WPA

  1. 802.11i

  1. 802.1x (EAPOL)

43.

What is 00111000 10110011 01010111 11011010 converted into decimal format?

  1. 56.179.87.217

  1. 56.179.87.218

  1. 56.179.87.219

  1. 56.179.87.220

44.

Which of the following security practices is incorrect?

  1. Disable CDP on an interface with the no cdp run command.

  1. Physically secure access to your devices.

  1. Use SSH instead of Telnet.

  1. Enable port security.

45.

You are configuring your Cisco 2600XM router to connect across the WAN to a Cisco 3800 router. You would like to use the default WAN encapsulation. Will this work?

  1. Yes. Cisco routers all support the same WAN encapsulation standards.

  1. Yes. Newer Cisco routers support different WAN encapsulation standards, but they are backward-compatible with older WAN encapsulation types.

  1. No. Newer Cisco routers use PPP as their WAN encapsulation types, and older Cisco routers use HDLC.

  1. No. Newer Cisco routers use the industry-standard HDLC, and older Cisco routers use a proprietary version.

46.

What is the broadcast IP of 212.84.5.66/26?

  1. 212.84.5.125

  1. 212.84.5.126

  1. 212.84.5.127

  1. 212.84.5.128

47.

Which statement is true regarding the 10.1.100.0 network based on the following output?

CstmrARtr# show ip route
...output omitted...

Gateway of last resort is 192.168.1.9 to network 0.0.0.0

R    10.1.100.0 /24 [120/14] via 192.168.1.9, 00:00:11, Serial0
C    172.17.0.0/16 is directly connected, Ethernet0
R    172.16.0.0/16 [120/11] via 172.17.0.2, 00:00:02, Ethernet0
     192.168.1.0/30 is subnetted, 1 subnets
C       192.168.1.8 is directly connected, Serial0

  1. The 10.1.100.0 network is 11 hops away.

  1. RIPv2 is configured on this router.

  1. Serial 0 has an IP address of 192.168.1.9.

  1. The maximum hop count has been reached.

48.

You suspect that one of your network users has violated the corporate security policy and plugged in a personal wireless access point in his cubicle. What Cisco security solution would allow you to detect and identify this issue?

  1. Cisco ACS Server

  1. Cisco Wireless IPS

  1. Cisco Wireless 802.1x

  1. MAC Address Security

49.

What is the network ID of 212.84.5.66/26?

  1. 212.84.5.0

  1. 212.84.5.64

  1. 212.84.5.128

  1. 212.84.5.192

50.

When pinging a device on a remote segment, which of the following are true of the packet as soon as it leaves the device that originated the packet? (Choose two)

  1. The destination IP address is the default gateway.

  1. The destination MAC address is the default gateway.

  1. The destination IP address is the remote device’s IP.

  1. The destination MAC address is the local switch.

51.

Which of the following are valid interface connections for serial WAN connections? (Choose three)

  1. EIA/TIA-449

  1. V.35

  1. RJ-48

  1. RJ-44

  1. X.21

52.

What does the c2600 portion of the Cisco IOS filename c2600-ipbase-1.122-1.T.bin represent?

  1. Hardware platform

  1. Feature set

  1. Train identifier

  1. IOS version

53.

After telnetting from RouterA into RouterB, you realize that your debug outputs are not showing on the terminal screen in RouterB. How can you remedy this?

  1. RouterA#terminal monitor

  1. RouterA(config-line)#terminal monitor

  1. RouterA#(config-line)#terminal monitor

  1. RouterB#terminal monitor

54.

While troubleshooting a serial connection, you issue the following command:

router# sh controllers serial 0/0
Interface Serial0/0
Hardware is PowerQUICC MPC850
DTE V.24 (RS-232) clocks stopped.
RX ring with 32 entries at 0x45560 : RLEN=5, Rxhead 0
00 pak=0x6044D78  ds=0x6044ED4 status=80 max_size=1524 pak_size=0
01 pak=0x60445F0  ds=0x604474C status=80 max_size=1524 pak_size=0
02 pak=0x6043E68  ds=0x6043FC4 status=80 max_size=1524 pak_size=0
03 pak=0x60436E0  ds=0x604383C status=80 max_size=1524 pak_size=0
04 pak=0x6042F58  ds=0x60430B4 status=80 max_size=1524 pak_size=0

What problem is indicated by the output, and what action will most likely solve it?

  1. The serial interface is receiving PAK errors from the service provider. You must contact the service provider to resolve the issue.

  1. A hardware failure has occurred. The serial interface should be replaced.

  1. The router does not have a clock rate. It should be set on the opposite side.

  1. The wrong end of the cable is connected. The serial cable should be reversed.

55.

Which of the following bridge IDs will become the root bridge?

  1. 1024FACE198476AB

  1. 1024AB121704F52E

  1. 102410241234FACE

  1. 1024ABCD1234FACE

56.

________________ allows an end device to receive power over a copper Ethernet cable.

  1. Long-Reach Ethernet

  1. Gigabit Ethernet

  1. Fast Ethernet

  1. Power over Ethernet

57.

What command configures a default route in a Layer 2 switch?

  1. ip route 0.0.0.0 0.0.0.0 FastEthernet 0/0

  1. ip default-gateway 172.16.1.1

  1. ip default-network 192.168.1.0

  1. default-route 172.16.1.1

58.

You are using a Cisco 7921 Wireless VoIP device. While speaking to your coworker on the phone, you are walking through multiple wireless cells. What type of network topology is this?

  1. Multiservice

  1. Roaming

  1. Basic Service Set

  1. Extended Service Set

59.

You walk away from your terminal for five minutes to get some coffee. When you return, you notice that someone has made configuration changes to your router. Which three commands will keep this from happening in the future?

  1. Router(config-line)#line-timeout 1

  1. Router(config-line)#login

  1. Router(config)#password password

  1. Router(config)#exec-timeout 1

  1. Router(config-line)#password password

  1. Router(config-line)#exec-timeout 1

60.

Which of the following is not a step in configuring SSH on your Cisco device?

  1. Create an RSA key.

  1. Configure a username and password.

  1. Configure a domain name for your device.

  1. Enable SSH on the vty lines.

61.

You are configuring an office to use a Cisco router to connect to the Internet. The onsite network administrator would like to publish an internal email server, two internal web servers, and an internal FTP server to the Internet so that outside users can access them. What is necessary for this configuration?

  1. You will need a public Internet IP address for each internal server. These addresses can be mapped using Static NAT features.

  1. You will need a single public Internet IP address for this configuration and will use NAT Overload to share it between all four internal servers.

  1. You will need a single public Internet IP address for this configuration and will use Static NAT to map specific ports to all four internal servers.

  1. You will need two public Internet IP addresses to accommodate the internal web servers. The FTP and email server can be mapped to individual ports on either of the addresses.

62.

Which of the following conditions could cause the port to transition to a disabled state? (Choose all that apply)

  1. A BPDU is detected on a BPDU Guard-enabled port.

  1. The port is not a root or designated port.

  1. The switch connected to your port has a faster way back to the root.

  1. A port security violation has occurred.

63.

What is a typical reason why the first ICMP ping response times out?

  1. The interface is in a sleep state.

  1. The IP stack is not working correctly.

  1. An ARP request and response must transpire first.

  1. The local switch does not know the destination MAC address.

64.

Given the following output, how can you close Telnet session 2? (Choose two)

CCNA2620# show sessions
Conn  Host               Address           Idle     Conn Name
1     131.108.100.152    131.108.100.152   0        131.108.100.152
*2    126.102.57.63      126.102.57.63     0        126.102.57.63

  1. Press the Enter key and enter exit.

  1. Enter disconnect 2.

  1. Press the Enter key and enter disconnect 2.

  1. Enter close 2.

65.

Which of the following is not part of configuring RIPv2 to be classless?

  1. Advertise directly connected classful networks.

  1. Specify the version of RIP as 2.

  1. Specify the subnet mask in the network statement.

  1. Enter the RIP routing process.

66.

You connected your switch into a device at half duplex. What is a possible reason for not using full duplex?

  1. It is a 10Mbps port.

  1. You are connecting it to another switch.

  1. You are using a straight-through cable.

  1. You are connected to a hub.

67.

Which of the following is not an additional feature of RIPv2 over RIPv1?

  1. A full update followed by hellos

  1. Update authentication

  1. Multicast updates

  1. Classless support

68.

How many bits does an IPv6 address have?

  1. 32

  1. 64

  1. 96

  1. 128

69.

Which of the following is an encryption protocol? (Choose three)

  1. IPsec

  1. SSL

  1. NTP

  1. SSH

70.

Private addressing for IPv6 is represented by a _____________________ address.

  1. Link-local

  1. Global

  1. Unique/site-local

  1. Multicast

 

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
18.216.149.94