Time limit: 0
Quiz-summary
0 of 70 questions completed
Questions:
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
Information
Good luck
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading...
You must sign in or sign up to start the quiz.
You have to finish following quiz, to start this quiz:
Results
0 of 70 questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 points, (0)
Average score |
|
Your score |
|
Categories
- Not categorized 0%
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- Answered
- Review
-
Question 1 of 70
1. Question
1 pointsWhich IP configuration does the CIDR notation 192.168.1.1/25 refer?Correct
Incorrect
-
Question 2 of 70
2. Question
1 pointsCIDR notation (255.255.255.252 ) / notation?Correct
Incorrect
-
Question 3 of 70
3. Question
1 pointsWhich two of these statements regarding RSTP are correct? (Choose two)Correct
Incorrect
-
Question 4 of 70
4. Question
1 pointsWhat is known as ―one-to-nearest addressing in IPv6?Correct
Incorrect
-
Question 5 of 70
5. Question
1 pointsWhen a device learns multiple routes to a specific network, it installs the route with :Correct
Incorrect
Hint
http://www.ciscopress.com/articles/article.asp?p=2180208&seqNum=9 -
Question 6 of 70
6. Question
1 pointsRequirement to configure DHCP binding ( 2 options)Correct
Incorrect
-
Question 7 of 70
7. Question
1 pointsHow to see dhcp conflict?Correct
Incorrect
Hint
-
Question 8 of 70
8. Question
1 pointsWhat type of MAC address is aged automatically by the switch?Correct
Incorrect
-
Question 9 of 70
9. Question
1 pointsWhich major component of the network virtualization architecture isolate users according to policy?Correct
Incorrect
Hint
Network access control and segmentation of classesof users: Users are authenticated and either allowed or denied into a logical partition. Users are segmented into employees, contractors and consultants, and guests, with respective access to IT assets. This component identifies users who are authorized toaccess the network and then places them into the appropriate logical partition. -
Question 10 of 70
10. Question
1 pointsWhich two statements about firewalls are true?Correct
Incorrect
-
Question 11 of 70
11. Question
1 pointsWhich two statements about data VLANs on access ports are true? ( Choose two)Correct
Incorrect
-
Question 12 of 70
12. Question
1 pointsWhere does the configuration reside when a helper address is configured to support DHCP?Correct
Incorrect
-
Question 13 of 70
13. Question
1 pointsWhich command can you enter to configure an IPV6 floating static route?Correct
Incorrect
-
Question 14 of 70
14. Question
1 pointsHow does NAT overloading provide one-to-many address translation?Correct
Incorrect
-
Question 15 of 70
15. Question
1 pointsWhich three options are types of Layer 2 network attack? (Choose three)Correct
Incorrect
-
Question 16 of 70
16. Question
1 pointsWhat does split-horizon do?Correct
Incorrect
-
Question 17 of 70
17. Question
1 pointsRefer to the exhibit. After you apply the given configuration to R1, you notice that it failed to enable OSPF Which action can you take to correct the problem?Correct
Incorrect
Hint
http://www.cisco.com/c/en/us/td/docs/ios-xml/ios/iproute_ospf/configuration/15-sy/iro-15-sy-book/ip6-route-ospfv3.html Prerequisites for IPv6 Routing: OSPFv3 Complete the OSPFv3 network strategy and planning for your IPv6 network. For example, you must decide whether multiple areas are required. Enable IPv6 unicast routing. Enable IPv6 on the interface. -
Question 18 of 70
18. Question
1 pointsHow many broadcast domains are shown in the graphic assuming only the default VLAN is confgured on the switches?Correct
Incorrect
-
Question 19 of 70
19. Question
1 pointsWhich three statements correcctly describe Network Device A? (Choose three.)Correct
Incorrect
-
Question 20 of 70
20. Question
1 pointsAt the end of an RSTP election process, which access layer switch port will assume the discarding role?Correct
Incorrect
Hint
In this question, we only care about the Access Layer switches (Switch3 & 4). Switch 3 has a lower bridge ID than Switch 4 (because the MAC of Switch3 is smaller than that of Switch4) so both ports of Switch3 will be in forwarding state. The alternative port will surely belong to Switch4. Switch4 will need to block one of its ports to avoid a bridging loop between the two switches. But how does Switch4 select its blocked port? Well, the answer is based on the BPDUs it receives from Switch3. A BPDU is superior to another if it has: 1. A lower Root Bridge ID 2. A lower path cost to the Root 3. A lower Sending Bridge ID 4. A lower Sending Port ID These four parameters are examined in order. In this specific case, all the BPDUs sent by Switch3 have the same Root Bridge ID, the same path cost to the Root and the same Sending Bridge ID. The only parameter left to select the best one is the Sending Port ID (Port ID = port priority + port index). In this case the port priorities are equal because they use the default value, so Switch4 will compare port index values, which are unique to each port on the switch, and because Fa0/12 is inferior to Fa0/1, Switch4 will select the port connected with Fa0/1 (of Switch3) as its root port and block the other port -> Port fa0/11 of Switch4 will be blocked (discarding role). -
Question 21 of 70
21. Question
1 pointsWhy is flash memory erased prior to upgrading the IOS image from the TFTP server?Correct
Incorrect
-
Question 22 of 70
22. Question
1 pointsThe network shown in the diagram is experiencing connectivity problems. Which of the following will correct the problems? (Choose two.)Correct
Incorrect
-
Question 23 of 70
23. Question
1 pointsWhich utility can you use to identify the cause of a traffic-flow blockage between the two devices in a network?Correct
Incorrect
Hint
Previously was path analysis, but I think its ACL analysis -
Question 24 of 70
24. Question
1 pointsWhich IEEE mechanism is responsible for the authentication of devices when they attempt to connect to a local network?Correct
Incorrect
Hint
IEEE 802.1X is an IEEE Standard for port-based Network Access Control (PNAC). It is part of the IEEE 802.1 group of networking protocols. It provides an authentication mechanism to devices wishing to attach to a LAN or WLAN -
Question 25 of 70
25. Question
1 pointsWhen a router is unable to find a known route in the routing table, how does it handle the packet?Correct
Incorrect
-
Question 26 of 70
26. Question
1 pointsIf router R1 knows a static route to a destination network and then learns about the same destination network through a dynamic routing protocol, how does R1 respond?Correct
Incorrect
Hint
By default the administrative distance of a static route is 1, meaning it will be preferred over all dynamic routing protocols. If you want to have the dynamic routing protocol used and have the static route be used only as a backup, you need to increase the AD of the static route so that it is higher than the dynamic routing protocol. -
Question 27 of 70
27. Question
1 pointsWhich two statements about floating static routes are true? (Choose two)Correct
Incorrect
-
Question 28 of 70
28. Question
1 pointsRefer to the exhibit. If R1 receives a packet destined to 172.16.1.1, to which IP address does it send the packet?Correct
Incorrect
Hint
It can’t find the address 172.16.1.1 so it will be directed to the Gate of last resort 192.168.14.4 -
Question 29 of 70
29. Question
1 pointsWhat is the danger of the permit any entry in a NAT access list?Correct
Incorrect
-
Question 30 of 70
30. Question
1 pointsHow does a DHCP server dynamically assign IP addresses to hosts?Correct
Incorrect
Hint
The DHCP lifecycle consists of the following: Release: The client may decide at any time that it no longer wishes to use the IP address it was assigned, and may terminate the lease, releasing the IP address. -
Question 31 of 70
31. Question
1 pointsRefer to the exhibit. What two results would occur if the hub were to be replaced with a switch that is configured with one Ethernet VLAN? (Choose two.)Correct
Incorrect
-
Question 32 of 70
32. Question
1 pointsRefer to the exhibit, you determine that Computer A cannot ping Computer Which reason for the problem is most likely true?Correct
Incorrect
Hint
255.255.255.224 = /27 -
Question 33 of 70
33. Question
1 pointsWhich effect of the passive-interface command on R1 is true?Correct
Incorrect
Hint
With most routing protocols, the passive-interface command restricts outgoing advertisements only. But, when used with Enhanced Interior Gateway Routing Protocol (EIGRP), the effect is slightly different. -
Question 34 of 70
34. Question
1 pointsWhich three encapsulation layers in the OSI model are combined into the TCP/IP application layer? (Choose three)Correct
Incorrect
Hint
-
Question 35 of 70
35. Question
1 pointsWhen is the most appropriate time to escalate an issue that you troubleshooting?Correct
Incorrect
-
Question 36 of 70
36. Question
1 pointsWhich two command can you enter to display the current time sources statistics on devices? (Choose TWO)Correct
Incorrect
Hint
-
Question 37 of 70
37. Question
1 pointsWhen you enable PortFast on a switch port, the port immediately transitions to which state?Correct
Incorrect
Hint
PortFast causes a switch or trunk port to enter the spanning tree forwarding state immediately, bypassing the listening and learning states. You can use PortFast on switch or trunk ports that are connected to a single workstation, switch, or server to allow those devices to connect to the network immediately, instead of waiting for the port to transition from the listening and learning states to the forwarding state. -
Question 38 of 70
38. Question
1 pointsWhich path does a router choose when it receives a packet with multiple possible paths to the destination over different routing protocols?Correct
Incorrect
-
Question 39 of 70
39. Question
1 pointsWhich command is used to know the duplex speed of serial link?Correct
Incorrect
-
Question 40 of 70
40. Question
1 pointsWhat command is used to configure a switch as authoritative NTP server?Correct
Incorrect
-
Question 41 of 70
41. Question
1 pointsWhich address class includes network 191.168.0.1/27?Correct
Incorrect
-
Question 42 of 70
42. Question
1 pointsOn which type of port can switches interconnect for multi-VLAN communication?Correct
Incorrect
-
Question 43 of 70
43. Question
1 pointsRefer to the exhibit. If R1 sends traffic to 192.168.101.45 the traffic is sent through which interface?Correct
Incorrect
-
Question 44 of 70
44. Question
1 pointsWhich IPV6 function serves the same purpose as ARP entry verification on an IPv4 network?Correct
Incorrect
-
Question 45 of 70
45. Question
1 pointsWhich HSRP feature was new in HSRPv2?Correct
Incorrect
-
Question 46 of 70
46. Question
1 pointsRefer to exhibit. Which command can you enter to verify link speed and duplex setting on the interface?Correct
Incorrect
-
Question 47 of 70
47. Question
1 pointsWhich two statements about unique local IPv6 addresses are true?Correct
Incorrect
-
Question 48 of 70
48. Question
1 pointsWhich DTP switch port mode allows the port to create a trunk link if the neighboring port is in trunk mode, dynamic desirable mode, or desirable auto mode?Correct
Incorrect
Hint
http://bradhedlund.com/2007/11/27/switchport-configurations-explained/ -
Question 49 of 70
49. Question
1 pointsWhen you troubleshoot an IPv4 connectivity issue on a router, which three router configuration checks you must perform?Correct
Incorrect
-
Question 50 of 70
50. Question
1 pointsConfiguration of which option is required on a Cisco switch for the Cisco IP phone to work?Correct
Incorrect
Hint
Configure the Switch Port to Carry Both Voice and Data TrafficWhen you connect an IP phone to a switch using a trunk link, it can cause high CPU utilization in the switches. As all the VLANs for a particular interface are trunked to the phone, it increases the number of STP instances the switch has to manage. This increases the CPU utilization. Trunking also causes unnecessary broadcast / multicast / unknown unicast traffic to hit the phone link. In order to avoid this, remove the trunk configuration and keep the voice and access VLAN configured along with Quality of Service (QoS). Technically, it is still a trunk, but it is called a Multi-VLAN Access Port (MVAP). Because voice and data traffic can travel through the same port, you should specify a different VLAN for each type of traffic. You can configure a switch port to forward voice and data traffic on different VLANs. Configure IP phone ports with a voice VLAN configuration. This configuration creates a pseudo trunk, but does not require you to manually prune the unnecessary VLANs. The voice VLAN feature enables access ports to carry IP voice traffic from an IP phone. The voice VLAN feature is disabled by default. The Port Fast feature is automatically enabled when voice VLAN is configured. When you disable voice VLAN, the Port Fast feature is not automatically disabled -
Question 51 of 70
51. Question
1 pointsWhich method does a connected trunk port use to tag VLAN traffic?Correct
Incorrect
-
Question 52 of 70
52. Question
1 pointsWhich RFC was created to alleviate the depletion of IPv4 public addresses?Correct
Incorrect
-
Question 53 of 70
53. Question
1 pointsWhat is the default lease time for a DHCP binding?Correct
Incorrect
Hint
By default, each IP address assigned by a DHCP Server comes with a one- day lease, which is the amount of time that the address is valid. To change the lease value for an IP address, use the following command in DHCP pool configuration mode: -
Question 54 of 70
54. Question
1 pointsWhich NAT type is used to translate a single inside address to a single outside address?Correct
Incorrect
Hint
Network address translation (NAT) is the process of modifying IP address information in IP packet headers while in transit across a traffic routing device. There are two different types of NAT: NAT PAT -
Question 55 of 70
55. Question
1 pointsWhich network topology allows all traffic to flow through a central hub?Correct
Incorrect
-
Question 56 of 70
56. Question
1 pointsWhich statement about a router on a stick is true?Correct
Incorrect
Hint
https://www.freeccnaworkbook.com/workbooks/ccna/configuring-inter-vlan-routing-router-on-a-stick -
Question 57 of 70
57. Question
1 pointsBy default, how many MAC addresses are permitted to be learned on a switch port with port security enabled?Correct
Incorrect
-
Question 58 of 70
58. Question
1 pointsWhich device allows users to connect to the network using a single or double radio?Correct
Incorrect
-
Question 59 of 70
59. Question
1 pointsWhen enabled, which feature prevents routing protocols from sending hello messages on an interface?Correct
Incorrect
Hint
You can use the passive-interface command in order to control the advertisement of routing information. The command enables the suppression of routing updates over some interfaces while it allows updates to be exchanged normally over other interfaces. With most routing protocols, the passive-interface command restricts outgoing advertisements only. But, when used with Enhanced Interior Gateway Routing Protocol (EIGRP), the effect is slightly different. This document demonstrates that use of the passive-interface command in EIGRP suppresses the exchange of hello packets between two routers, which results in the loss of their neighbor relationship. This stops not only routing updates from being advertised, but it also suppresses incoming routing updates. This document also discusses the configuration required in order to allow the suppression of outgoing routing updates, while it also allows incoming routing updates to be learned normally from the neighbor -
Question 60 of 70
60. Question
1 pointsRefer to the exhibit. Which statement describes the effect of this configuration?Correct
Incorrect
-
Question 61 of 70
61. Question
1 pointsWhich route source code represents the routing protocol with a default administrative distance of 90 in the routing table?Correct
Incorrect
Hint
Default Administrative distance of EIGRP protocol is 90 then answer is C. -
Question 62 of 70
62. Question
1 pointsWhich statement about native VLAN traffic is true?Correct
Incorrect
-
Question 63 of 70
63. Question
1 pointsWhich statement about unicast frame forwarding on a switch is true?Correct
Incorrect
-
Question 64 of 70
64. Question
1 pointsWhich component of the routing table ranks routing protocols according to their preferences?Correct
Incorrect
Hint
Administrative distance – This is the measure of trustworthiness of the source of the route. If a router learns about a destination from more than one routing protocol, administrative distance is compared and the preference is given to the routes with lower administrative distance. In other words, it is the believability of the source of the route -
Question 65 of 70
65. Question
1 pointsWhich switch would STP choose to become the root bridge in the selection process?Correct
Incorrect
-
Question 66 of 70
66. Question
1 pointsRefer to the graphic. R1 is unable to establish an OSPF neighbor relationship with R3. What are possible reasons for this problem? (Choose two.)Correct
Incorrect
-
Question 67 of 70
67. Question
1 pointsFor what two purposes does the Ethernet protocol use physical addresses? (Choose two.)Correct
Incorrect
-
Question 68 of 70
68. Question
1 points2 authentication type of MLPPPCorrect
Incorrect
-
Question 69 of 70
69. Question
1 pointsWhat is the effect of the overload keyword in a static NAT translation configuration?Correct
Incorrect
Hint
http://www.firewall.cx/networking-topics/network-address-translation-nat/233-nat-overload-part-1.html -
Question 70 of 70
70. Question
1 pointsWhat are the requirements for running VTP (choose two)Correct
Incorrect
Hint
http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst3560/software/release/12-2_52_se/configuration/guide/3560scg/swvtp.html ” Follow these guidelines when deciding which VTP version to implement: •All switches in a VTP domain must have the same domain name, but they do not need to run the same VTP version. •A VTP version 2-capable switch can operate in the same VTP domain as a switch running VTP version 1 if version 2 is disabled on the version 2-capable switch (version 2 is disabled by default). “