CCNA 2 v6.0 – CCENT (ICND1) Practice Certification Exam Answers

New Version:

How to find: Press “Ctrl + F” in the browser and fill in whatever wording is in the question to find that question/answer. If the question is not here, find it in Questions Bank.

NOTE: If you have the new question on this test, please comment Question and Multiple-Choice list in form below this article. We will update answers for you in the shortest time. Thank you! We truly value your contribution to the website.

1. How many /30 subnets can be created from one /27 subnet

  • 2
  • 4
  • 6
  • 8

A /27 subnet contains 32 IP addresses, and a /30 subnet contains 4 IP addresses, so eight /30 subnets can be created from one /27 subnet.

2. What information can be verified through the show ip dhcp binding command?

  • that DHCPv4 discover messages are still being received by the DHCP server
  • the number of IP addresses remaining in the DHCP pool
  • the IPv4 addresses that are assigned to hosts by the DHCP server
  • the IPv4 addresses that have been excluded from the DHCPv4 pool

This command displays a list of all IPv4 address to MAC address bindings that have been provided by the DHCPv4 service.

3. Refer to the exhibit. A network administrator is reviewing port and VLAN assignments on switch S2 and notices that interfaces Gi0/1 and Gi0/2 are not included in the output. Why would the interfaces be missing from the output

CCNA 2 v6.0 - CCENT (ICND1) Practice Certification Exam Answers 1

  • There is a native VLAN mismatch between the switches.
  • There is no media connected to the interfaces.
  • They are administratively shut down.
  • They are configured as trunk interfaces

6.2.2 VLAN Trunks
Interfaces that are configured as trunks do not belong to a VLAN and therefore will not show in the output of the show vlan brief commands.

4. Refer to the exhibit. A switch with a default configuration connects four hosts. The ARP table for host A is shown. What happens when host A wants to send an IP packet to host D?

CCNA 2 v6.0 - CCENT (ICND1) Practice Certification Exam Answers 2

  • Host A sends an ARP request to the MAC address of host D. Host D responds with its IP address.
  • Host D sends an ARP request to host A. Host A responds with its MAC address.
  • Host A sends out the packet to the switch. The switch adds the MAC address for host D to the frame and forwards it to the network.
  • Host A sends out a broadcast of FF:FF:FF:FF:FF:FF. Every other host connected to the switch receives the broadcast and host D responds with its MAC address.

5. Refer to the exhibit. A network administrator needs to add an ACE to the TRAFFIC-CONTROL ACL that will deny IP traffic from the subnet 172.23.16.0/20. Which ACE will meet this requirement?

CCNA 2 v6.0 - CCENT (ICND1) Practice Certification Exam Answers 3

  • 5 deny 172.23.16.0 0.0.15.255
  • 5 deny 172.23.16.0 0.0.255.255
  • 15 deny 172.23.16.0 0.0.15.255
  • 30 deny 172.23.16.0 0.0.15.255

6. Which three layers of the OSI model map to the application layer of the TCP/IP model? (Choose three.)

  • Application
  • Data Link
  • Transport
  • Session
  • Presentation
  • Network

7. Refer to the exhibit. When a packet arrives on interface Serial0/0/0 on R1, with a destination IP address of PC1, which two events occur? (Choose two)

CCNA 2 v6.0 - CCENT (ICND1) Practice Certification Exam Answers 4

  • Router R1 will de-encapsulate the packet and encapsulate it in a PPP frame.
  • Router R1 will forward the packet out Gig0/1.
  • Router R1 will forward the packet out Gig0/0.
  • Router R1 will de-encapsulate the packet and encapsulate it in an Ethernet frame.
  • Router R1 will forward the packet out S0/0/0.

Routing and Switching Essentials
1.1.1 Router Functions
1.2.2 Path Determination

A router will look in the routing table for a destination network and locate an exit interface to forward a packet to a destination. After the exit interface is determined, the router will encapsulate a packet into the correct frame type.

(PPP) is a data link (layer 2) protocol used to establish a direct connection between two nodes. (from wikipedia)

8. What is the purpose of the overload keyword in the ip nat inside source list 1 pool NAT_POOL overload command?

  • It allows many inside hosts to share one or a few inside global addresses.
  • It allows a pool of inside global addresses to be used by internal hosts.
  • It allows external hosts to initiate sessions with internal hosts.
  • It allows a list of internal hosts to communicate with a specific group of external hosts.

The primary difference between this configuration and the configuration for dynamic, one-to-one NAT is that the overload keyword is used. The overload keyword enables PAT.

9. What type of installation is needed to view syslog messages?

  • A syslog client must be installed on a workstation.
  • Because any network equipment can interpret syslog messages, nothing special is needed to view them.
  • A syslog server must be installed on a router.
  • A syslog server must be installed on a workstation.

The syslog protocol allows networking devices to send their system messages across the network to syslog servers.

10. Refer to the exhibit. A network administrator has added a new subnet to the network and needs hosts on that subnet to receive IPv4 addresses from the DHCPv4 server.
What two commands will allow hosts on the new subnet to receive addresses from the DHCP4 server? (Choose two.)

CCNA 2 v6.0 - CCENT (ICND1) Practice Certification Exam Answers 5

  • R1(config-if)# ip helper-address 10.2.0.250
  • R1(config)# interface G0/1
  • R1(config)# interface G0/0
  • R2(config-if)# ip helper-address 10.2.0.250
  • R2(config)# interface G0/0
  • R1(config-if)# ip helper-address 10.1.0.254

You need the router interface that is connected to the new subnet and the dhcp server address.

11. Refer to the exhibit. Static NAT is being configured to allow PC 1 access to the web server on the internal network. What two addresses are needed in place of A and B to complete the static NAT configuration? (Choose two.)

CCNA 2 v6.0 - CCENT (ICND1) Practice Certification Exam Answers 6

  • B = 209.165.201.7
  • A = 10.1.0.13
  • B = 10.0.254.5
  • B = 209.165.201.1
  • A = 209.165.201.2

12. When creating an IPv6 static route, when must a next-hop IPv6 address and an exit interface both be specified

  • when CEF is enabled
  • when the static route is a default route
  • when the next hop is a link-local address
  • when the exit interface is a point-to-point interface

Routing and Switching Essentials
2.2.3 Configure IPv6 Static Routes

Link-local addresses are only unique on a given link, and the same address could exist out multiple interfaces. For that reason, any time a static route specifies a link-local address as the next hop, it must also specify the exit interface. This is called a fully specified static route.

13. Which address prefix range is reserved for IPv4 multicast?

  • 224.0.0.0 – 239.255.255.255
  • 240.0.0.0 – 254.255.255.255
  • 169.254.0.0 – 169.25.255.255
  • 127.0.0.0- 127.255.255.255

Explanation: Multicast IPv4 addresses use the reserved class D address range of 224.0.0.0 to 239.255.255.255.

14. Refer to the exhibit. What would happen after the IT administrator enters the new static route?

CCNA 2 v6.0 - CCENT (ICND1) Practice Certification Exam Answers 7

  • The 172.16.1.0 route learned from RIP would be replaced with the 172.16.1.0 static route.
  • The 172.16.1.0 static route is added to the existing routes in the routing table.
  • The 172.16.1.0 static route would be entered into the running-config but not shown in the routing table.
  • The 0.0.0.0 default route would be replaced with the 172.16.1.0 static route.

A route will be installed in a routing table if there is not another routing source with a lower administrative distance. If a route with a lower administrative distance to the same destination network as a current route is entered, the route with the lower administrative distance will replace the route with a higher administrative distance.

15. What effect does the default-information originate command have on a Cisco router that is configured for RIP?

  • Any dynamic route that is learned from a neighboring router will propagate to other adjacent routers.
  • Any default static route that is configured on the router will propagate to other adjacent routers.
  • Any static route that is learned from a neighboring router will propagate to other adjacent routers.
  • Any routes that are learned from a neighboring router will propagate to other adjacent routers.

16. Which type of IPv6 address refers to any unicast address that is assigned to multiple hosts?

  • Single location
  • Any cast
  • Link-local
  • Global unicast

The anycast address is a unicast address that is assigned to multiple hosts. Anycast addresses are usually used to locate the nearest server of a specifc type–for example, the nearest DNS or network time server. Assigning the same unicast address to more than one interface makes it an anycast address. You can have link-local, unique local, or global unicast anycast addresses. When you assign an anycast address to an interface, you must explicitly identify the address as an anycast address.

17. An administrator wants to replace the configuration file on a Cisco router by loading a new configuration file from a TFTP server. What two things does the administrator need to know before performing this task? (Choose two.)

  • TFTP server IP address
  • name of the configuration file that is currently stored on the router
  • router IP address
  • configuration register value
  • name of the configuration file that is stored on the TFTP server
  • The name of the configuration file that is currently stored on the TFTP server
  • The name of the configuration file that is currently stored on the router

Routing and Switching Essentials
10.3.3 IOS Image Management

In order to identify the exact location of the desired configuration file, the IP address of the TFTP server and the name of the configuration file are essential information. Because the file is a new configuration, the name of the current configuration file is not necessary.

18. Refer to the exhibit. Inter-VLAN communication between VLAN 10, VLAN 20, and VLAN 30 is not successful. What is the problem?

CCNA 2 v6.0 - CCENT (ICND1) Practice Certification Exam Answers 8

  • The switch interface FastEthernet0/1 is configured to not negotiate and should be configured to negotiate.​
  • The access interfaces do not have IP addresses and each should be configured with an IP address.
  • The switch interface FastEthernet0/1 is configured as an access interface and should be configured as a trunk interface.
  • The switch interfaces FastEthernet0/2, FastEthernet0/3, and FastEthernet0/4 are configured to not negotiate and should be configured to negotiate.​

6.3.3 Configure Router-on-a-Stick Inter-VLAN Routing

To forward all VLANs to the router, the switch interface Fa0/1 must be configured as a trunk interface with the switchport mode trunk command.

19. Which statement describes the Cisco License Manager?

  • It is a free, standalone software application for deploying Cisco software licenses across the network.
  • It is a web-based portal for getting and registering individual software licenses.
  • It is a centralized TFTP server that enables control of the number and revision level of Cisco IOS images.
  • It is an organized collection of processes and components used to activate Cisco IOS software feature sets by obtaining and validating Cisco software licenses.

Routing and Switching Essentials
10.3.4 Software Licensing

Cisco License Manager (CLM) is available as a free download from the Cisco website and is a standalone application that helps network administrators deploy licenses across entire networks.

20. A user sends an HTTP request to a web server on a remote network. During encapsulation for this request, what information is added to the address field of a frame to indicate the destination?

  • the MAC address of the default gateway
  • the network domain of the destination host
  • the IP address of the default gateway
  • the MAC address of the destination host

A frame is encapsulated with source and destination MAC addresses. The source device will not know the MAC address of the remote host. An ARP request will be sent by the source and will be responded to by the router. The router will respond with the MAC address of its interface, the one which is connected to the same network as the source.

21. A network administrator is designing an IPv4 addressing scheme and requires these subnets.

1 subnet of 100 hosts
2 subnets of 80 hosts
2 subnets of 30 hosts
4 subnets of 20 hosts

Which combination of subnets and masks will provide the best addressing plan for these requirements

  • 9 subnets of 126 hosts with a 255.255.255.128 mask
  • 3 subnets of 126 hosts with a 255.255.255.128 mask
    6 subnets of 30 hosts with a 255.255.255.224 mask
  • 3 subnets of 126 hosts with a 255.255.255.192 mask
    6 subnets of 30 hosts with a 255.255.255.240 mask
  • 1 subnet of 126 hosts with a 255.255.255.192 mask
    2 subnets of 80 hosts with a 255.255.255.224 mask
    6 subnets of 30 hosts with a 255.255.255.240 mask

IPv4 subnets that require 100 and 80 hosts are provided by creating subnets of 126 usable addresses, each of which requires 7 host bits. The resulting mask is 255.255.255.128.

Subnets that require 30 and 20 hosts are provided by creating subnets of 30 usable addresses, each of which requires 5 host bits. The resulting mask is 255.255.255.224.

Creating nine subnets, each consisting of 126 usable addresses, would waste large numbers of addresses in the six smaller subnets.

22. Refer to the exhibit. How was the host route 2001:DB8:CAFE:4::1/128 installed in the routing table?

CCNA 2 v6.0 - CCENT (ICND1) Practice Certification Exam Answers 9

  • The route was automatically installed when an IP address was configured on an active interface.
  • The route was dynamically created by router R1.
  • The route was manually entered by an administrator.
  • The route was dynamically learned from another router.

A host route is an IPv6 route with a 128-bit mask. A host route can be installed in a routing table automatically when an IP address is configured on a router interface or manually if a static route is created

23. What are three characteristics of the CSMA/CD process? (Choose three.)

  • The device with the electronic token is the only one that can transmit after a collision.
  • After detecting a collision, hosts can attempt to resume transmission after a random time delay has expired.
  • All of the devices on a segment see data that passes on the network medium.
  • Devices can be configured with a higher transmission priority.
  • A device listens and waits until the media is not busy before transmitting.
  • A jam signal indicates that the collision has cleared and the media is not busy.

The Carrier Sense Multiple Access/Collision Detection (CSMA/CD) process is a contention-based media access control mechanism used on shared media access networks, such as Ethernet. When a device needs to transmit data, it listens and waits until the media is available (quiet), then it will send data. If two devices transmit at the same time, a collision will occur. Both devices will detect the collision on the network. When a device detects a collision, it will stop the data transmission process, wait for a random amount of time, then try again.

24. A network engineer is troubleshooting connectivity issues among interconnected Cisco routers and switches. Which command should the engineer use to find the IP address information, host name, and IOS version of neighboring network devices?

  • show ip route
  • show interfaces
  • show version
  • show cdp neighbors detail

The show cdp neighbors command provides helpful information about each CDP neighbor device, including the following:

Device identifiers – The host name of the neighbor device (S1)
Port identifier – The name of the local and remote port (Gig 0/1 and Fas 0/5, respectively)
Capabilities list – Whether the device is a router or a switch (S for switch; I for IGMP is beyond scope for this course)
Platform – The hardware platform of the device (WS-C2960 for Cisco 2960 switch)

he show cdp neighbors detail command can also provide information, such as the neighbors’ IOS version and IPv4 address

25. Fill in the blank

When port security is enabled, a switch port uses the default violation mode of ___shutdown ___ until specifically configured to use a different violation mode.

If no violation mode is specified when port security is enabled on a switch port, then the security violation mode defaults to shutdown.

Routing and Switching Essentials
5.2.2 Switch Port Security

26. Refer to the exhibit. Which source address is being used by router R1 for packets being forwarded to the Internet?

CCNA 2 v6.0 - CCENT (ICND1) Practice Certification Exam Answers 10

  • 198.51.100.3
  • 10.6.15.2
  • 209.165.200.225
  • 209.165.202.141

The inside global address is used as the source address for packets leaving the network

The source address for packets forwarded by the router to the Internet will be the inside global address of 209.165.200.225. This is the address that the internal addresses from the 10.6.15.0 network will be translated to by NAT.

27. Which feature on a Cisco router permits the forwarding of traffic for which there is no specific route

  • route source
  • next-hop
  • outgoing interface
  • gateway of last resort

1.2.2 Path Determination

A default static route is used as a gateway of last resort to forward unknown destination traffic to a next hop/exit interface. The next-hop or exit interface is the destination to send traffic to on a network after the traffic is matched in a router. The route source is the location a route was learned from.

28. Which three statements characterize UDP (Choose three.)

  • UDP provides sophisticated flow control mechanisms.
  • UDP relies on IP for error detection and recovery.
  • UDP is a low overhead protocol that does not provide sequencing or flow control mechanisms.
  • UDP provides basic connectionless transport layer functions.
  • UDP relies on application layer protocols for error detection.
  • UDP provides connection-oriented, fast transport of data at Layer 3.

UDP is a simple protocol that provides the basic transport layer functions. It has much lower overhead than TCP because it is not connection-oriented and does not offer the sophisticated retransmission, sequencing, and flow control mechanisms that provide reliability.

29. Refer to the exhibit. What will router R1 do with a packet that has a destination IPv6 address of 2001:db8:cafe:5::1?

CCNA 2 v6.0 - CCENT (ICND1) Practice Certification Exam Answers 11

  • forward the packet out GigabitEthernet0/1
  • drop the packet
  • forward the packet out Serial0/0/0
  • forward the packet out GigabitEthernet0/0

Routing and Switching Essentials
2.2.4 Configure IPv6 Default Routes

The route ::/0 is the compressed form of the 0000:0000:0000:0000:0000:0000:0000:0000/0 default route. The default route is used if a more specific route is not found in the routing table.

30. How will a router handle static routing differently if Cisco Express Forwarding is disabled

  • Static routes that use an exit interface will be unnecessary.
  • Serial point-to-point interfaces will require fully specified static routes to avoid routing inconsistencies.
  • It will not perform recursive lookups.
  • Ethernet multiaccess interfaces will require fully specified static routes to avoid routing inconsistencies.

Routing and Switching Essentials
2.2.1 Configure IPv4 Static Routes

In most platforms running IOS 12.0 or later, Cisco Express Forwarding is enabled by default. Cisco Express Forwarding eliminates the need for the recursive lookup. If Cisco Express Forwarding is disabled, multiaccess network interfaces require fully specified static routes in order to avoid inconsistencies in their routing tables. Point-to-point interfaces do not have this problem, because multiple end points are not present. With or without Cisco Express Forwarding enabled, using an exit interface when configuring a static route is a viable option.

31. Refer to the exhibit. A network technician issues the command show vlan to verify the VLAN configuration. Based on the output, which port should be assigned with native VLAN?

CCNA 2 v6.0 - CCENT (ICND1) Practice Certification Exam Answers 12

  • Fa0/12
  • Gig0/1
  • Fa0/24
  • Fa0/20

32. Which two things should a network administrator modify on a router to perform password recovery? (Choose two.)

  • the configuration register value
  • the NVRAM file system
  • system ROM
  • the system image file
  • the startup configuration file

33. What are two reasons why an administrator might choose to use static routing rather than dynamic routing? (Choose two.)

  • Static routing is more scalable.
  • Static routing is easier to maintain in large networks.
  • Static routing uses less router processing and bandwidth.
  • Static routing is more secure.
  • Static routing does not require complete knowledge of the whole network.

Explanation: Because static routes must be created and changed manually, they require a larger investment of administrative time and do not scale easily. Static routes do not require additional CPU cycles to calculate and advertise routes, and they provide more security because they are not advertised over the network. Proper implementation of static routes requires the administrator to have a complete understanding of the network topology.

34. An administrator who is troubleshooting connectivity issues on a switch notices that a switch port configured for port security is in the err-disabled state. After verifying the cause of the violation, how should the administrator re-enable the port without disrupting network operation?

  • Reboot the switch.
  • Issue the no switchport port-security violation shutdown command on the interface.
  • Issue the no switchport port-security command, then re-enable port security.
  • Issue the shutdown command followed by the no shutdown command on the interface.

To re-enable the port, use the shutdown interface configuration mode command (Figure 3). Then, use the no shutdown interface configuration command to make the port operational.

35. A network administrator has been allocated the IPv4 10.10.240.0/20 block of addresses for a LAN. Two devices on two different, but contiguous, subnets on the LAN have been assigned the addresses 10.10.247.1/21 and 10.10.248.10/24, respectively. The administrator has to create a third subnet from the remaining address range. To optimize the use of this address space, the new subnet will follow on directly from the existing subnets. What is the first available host address in the next available subnet

  • 10.10.250.1
  • 10.10.249.1
  • 10.10.248.17
  • 10.10.255.17

The complete address range of the subnet with the host 10.10.247.1/21 is 10.10.240.0/21 to 10.10.247.255/21. The complete address range of the subnet that contains the host 10.10.248.10/24 is 10.10.248.0/24 to 10.10.248.255/24. This means that the next subnet will have a network address of 10.10.249.0 with a prefix length between 24 and 30. The first useable host address on this new subnet is therefore 10.10.249.1.

36. Refer to the exhibit. A ping to PC3 is issued from PC0, PC1, and PC2 in this exact order. Which MAC addresses will be contained in the S1 MAC address table that is associated with the Fa0/1 port?

CCNA 2 v6.0 - CCENT (ICND1) Practice Certification Exam Answers 13

  • PC0, PC1, and PC2 MAC addresses
  • just the PC1 MAC address
  • just PC0 and PC1 MAC addresses
  • just the PC2 MAC address​
  • just the PC0 MAC address

Switch S1 builds a MAC address table based on the source MAC address in the frame and the port upon which the frame enters the switch. The PC2 MAC address will be associated with port FA0/2. Because port FA0/1 of switch S1 connects with another switch, port FA0/1 will receive frames from multiple different devices. The MAC address table on switch S1 will therefore contain MAC addresses associated with each of the sending PCs.

37. Refer to the exhibit. A network administrator issues the show lldp neighbors command to display information about neighboring devices. What can be determined based on the information?

CCNA 2 v6.0 - CCENT (ICND1) Practice Certification Exam Answers 14

  • Device C1 is a switch.
  • Device A1 is connected to the port Fa0/5 on device B1.
  • Device C1 is a switch.
  • Device B1 is a WLAN access point.
  • Device C1 is connected to device B1 through the port Fa0/3.

38. Which two devices allow hosts on different VLANs to communicate with each other (Choose two.)

  • Layer 3 switch
  • repeater
  • router
  • hub
  • Layer 2 switch

Routing and Switching Essentials
6.3.1 Inter-VLAN Routing Operation

Members of different VLANs are on separate networks. For devices on separate networks to be able to communicate, a Layer 3 device, such as a router or Layer 3 switch, is necessary.

39. Refer to the exhibit. Host A sends a data packet to host B. What will be the addressing information of the data packet when it reaches host B

CCNA 2 v6.0 - CCENT (ICND1) Practice Certification Exam Answers 15

A. CCNA 2 v6.0 - CCENT (ICND1) Practice Certification Exam Answers 16

B. CCNA 2 v6.0 - CCENT (ICND1) Practice Certification Exam Answers 17

C. CCNA 2 v6.0 - CCENT (ICND1) Practice Certification Exam Answers 18

D. CCNA 2 v6.0 - CCENT (ICND1) Practice Certification Exam Answers 19

Correct Answers: A

40. Data is being sent from a source PC to a destination server. Which three statements correctly describe the function of TCP or UDP in this situation (Choose three.)

  • TCP is the preferred protocol when a function requires lower network overhead.
  • The source port field identifies the running application or service that will handle data returning to the PC.
  • The UDP destination port number identifies the application or service on the server which will handle the data.
  • The TCP process running on the PC randomly selects the destination port when establishing a session with the server.
  • UDP segments are encapsulated within IP packets for transport across the network.
  • The TCP source port number identifies the sending host on the network.

Layer 4 port numbers identify the application or service which will handle the data. The source port number is added by the sending device and will be the destination port number when the requested information is returned. Layer 4 segments are encapsulated within IP packets. UDP, not TCP, is used when low overhead is needed. A source IP address, not a TCP source port number, identifies the sending host on the network. Destination port numbers are specific ports that a server application or service monitors for requests.

41. What is defined by the ip nat pool command when configuring dynamic NAT?

  • the pool of global address
  • the range of external IP addresses that internal hosts are permitted to access
  • the pool of available NAT servers
  • the range of internal IP addresses that are translated

Routing and Switching Essentials

9.2.2 Configure Dynamic NAT

Dynamic NAT uses a pool of inside global addresses that are assigned to outgoing sessions. Creating the pool of inside global addresses is accomplished using the ip nat pool command.

42. Which address type is not supported by IPv6

  • multicast
  • private
  • unicast
  • broadcast

IPv6 supports unicast, private, and multicast addresses but does not support Layer 3 broadcasts.

43. What is the purpose of setting the native VLAN separate from data VLANs?

  • The native VLAN is for routers and switches to exchange their management information, so it should be different from data VLANs.
  • A separate VLAN should be used to carry uncommon untagged frames to avoid bandwidth contention on data VLANs.
  • The security of management frames that are carried in the native VLAN can be enhanced.
  • The native VLAN is for carrying VLAN management traffic only.

Routing and Switching Essentials
6.1.1 Overview of VLANs

When a Cisco switch trunk port receives untagged frames (unusual in well-designed networks), it forwards these frames to the native VLAN. When the native VLAN is moved away from data VLANs, those untagged frames will not compete for bandwidth in the data VLANs. The native VLAN is not designed for carrying management traffic, but rather it is for backward compatibility with legacy LAN scenarios.

44. Which ACE would permit traffic from hosts only on the 192.168.8.0/22 subnet?

  • permit 192.168.8.0 0.0.3.255
  • permit 192.168.0.0 0.0.15.255
  • permit 192.168.8.0 255.255.248.0
  • permit 192.168.8.0 0.0.7.255

45. Which two issues might cause excessive runt and giant frames in an Ethernet network? (Choose two.)

  • damaged cable connector
  • using the incorrect cable type
  • native VLAN mismatch
  • a malfunctioning NIC
  • excessive collisions
  • incorrectly configured auto-MDIX feature

Routing and Switching Essentials
5.1.2 Configure Switch Ports

In an Ethernet network, a runt is a frame that is shorter than 64 bytes and a giant is a frame that is longer than the maximum allowed length. Both are often caused by NIC malfunctioning, but can also be caused by excessive collisions. CRC errors usually indicate a media or cable error caused by electrical interference, loose or damaged connections, or using the incorrect cabling type.

46. Refer to the exhibit. Which static route would an IT technician enter to create a backup route to the 172.16.1.0 network that is only used if the primary RIP learned route fails?

CCNA 2 v6.0 - CCENT (ICND1) Practice Certification Exam Answers 20

  • ip route 172.16.1.0 255.255.255.0 s0/0/0
  • ip route 172.16.1.0 255.255.255.0 s0/0/0 111
  • ip route 172.16.1.0 255.255.255.0 s0/0/0 91
  • ip route 172.16.1.0 255.255.255.0 s0/0/0 121

Routing and Switching Essentials
2.2.5 Configure Floating Static Routes

A backup static route is called a floating static route. A floating static route has an administrative distance greater than the administrative distance of another static route or dynamic route.

47. Refer to the exhibit. Which three events will occur as a result of the configuration shown on R1? (Choose three.)

CCNA 2 v6.0 - CCENT (ICND1) Practice Certification Exam Answers 21

  • Only traffic that originates from the GigabitEthernet 0/1 interface will be monitored.
  • The syslog messages will contain the IP address the GigabitEthernet 0/1 interface.
  • Messages that are sent to the syslog server will be limited to levels 3 or lower.
  • Messages that are sent to the syslog server will use 192.168.1.5 as the destination IP address.
  • For multiple occurrences of the same error, only the first three messages will be sent to the server.
  • Messages that are sent to the syslog server will be limited to levels 3 and higher.

48. Which IPv6 prefix is reserved for communication between devices on the same link?

  • 2001::/32
  • FC00::/7
  • FDFF::/7
  • FE80::/10

fe80::/10 — Addresses in the link-local prefix are only valid and unique on a single link. Within this prefix only one subnet is allocated (54 zero bits), yielding an effective format of fe80::/64. The least significant 64 bits are usually chosen as the interface hardware address constructed in modified EUI-64 format. A link-local address is required on every IPv6-enabled interface—in other words, applications may rely on the existence of a link-local address even when there is no IPv6 routing. These addresses are comparable to the auto-configuration addresses 169.254.0.0/16 of IPv4.

fc00::/7 — Unique local addresses (ULAs) are intended for local communication. They are routable only within a set of cooperating sites.[24] The block is split into two halves, the upper half (fd00::/8) is used for “probabilistically unique” addresses in which a 40-bit pseudorandom number is used to obtain a /48 allocation. This means that there is only a small chance that two sites that wish to merge or communicate with each other will have conflicting addresses. No allocation method for the lower half of the block (fc00::/8) is currently defined. These addresses are comparable to IPv4 private addresses (10.0.0.0/8, 172.16.0.0/12 and 192.168.0.0/16)

49. Refer to the exhibit. Packets destined to which two networks will require the router to perform a recursive lookup? (Choose two.)

CCNA 2 v6.0 - CCENT (ICND1) Practice Certification Exam Answers 22

  • 128.107.0.0/16
  • 192.168.1.0/24
  • 64.100.0.0/16
  • 192.168.2.0/24
  • 172.16.40.0/24
  • 10.0.0.0/8

50. Refer to the exhibit. Routers R1 and R2 are connected via a serial link. One router is configured as the NTP master, and the other is an NTP client. Which two pieces of information can be obtained from the partial output of the show ntp associations detail command on R2 (Choose two.)

CCNA 2 v6.0 - CCENT (ICND1) Practice Certification Exam Answers 23

  • Router R1 is the master, and R2 is the client.
  • The IP address of R2 is 192.168.1.2.
  • The IP address of R1 is 192.168.1.2.
  • Both routers are configured to use NTPv2.
  • Router R2 is the master, and R1 is the client.

Routing and Switching Essentials
10.2.1 NTP

With the show NTP associations command, the IP address of the NTP master is given.

51. A network technician is configuring port security on a LAN switch interface. The security policy requires host MAC addresses to be learned dynamically, stored in the address table, and saved to the switch running configuration. Which command does the technician need to add to the following configuration to implement this policy?

  • Switch(config)# interface fa0/1
    Switch(config-if)# switchport mode access
    Switch(config-if)# switchport portsecurity
  • Switch(config-if)# switchport port-security maximum 40
  • Switch(config-if)# switchport port-security macaddress
  • Switch(config-if)# switchport port-security macaddress sticky
  • Switch(config-if)# switchport port-security macaddress 000B.FCFF.E880

52. After a license has been purchased and installed, what is the next step that is required before it is activated?

  • Copy the running configuration to flash.
  • Reboot the router.
  • Issue the license boot module technology-package command.
  • Copy the running configuration to NVRAM.

Routing and Switching Essentials
10.3.5 License Verification and Management

After the license is installed, the device needs to be reloaded to activate the license.

53.Refer to the exhibit. A technician is programming switch SW3 to manage voice and data traffic through port Fa0/20. What, if anything, is wrong with the configuration?

CCNA 2 v6.0 - CCENT (ICND1) Practice Certification Exam Answers 24

  • There is nothing wrong with the configuration.
  • Interface Fa0/20 can only have one VLAN assigned.
  • The mls qos trust cos command should reference VLAN 35.
  • The command used to assign the voice VLAN to the switch port is incorrect.

54. A network administrator is using the router-on-a-stick model to configure a switch and a router for inter-VLAN routing. What configuration should be made on the switch port that connects to the router

  • CConfigure it as a trunk port and allow only untagged traffic.
  • Configure the port as an access port and a member of VLAN1.
  • Configure the port as an 802.1q trunk port.
  • Configure the port as a trunk port and assign it to VLAN1.

Routing and Switching Essentials
6.3.3 Configure Router-on-a-Stick Inter-VLAN Routing

The port on the switch that connects to the router interface should be configured as a trunk port. Once it becomes a trunk port, it does not belong to any particular VLAN and will forward traffic from various VLANs.

55. On which switch interface would an administrator configure an IP address so that the switch can be managed remotely?

  • vty 0
  • FastEthernet0/1
  • VLAN 1
  • console 0

5.1.1 Configure a Switch with Initial Settings

Interface VLAN 1 is a virtual interface on a switch, called SVI (switch virtual interface). Configuring an IP address on the default SVI, interface VLAN 1, will allow a switch to be accessed remotely. The VTY line must also be configured to allow remote access, but an IP address cannot be configured on this line

56.

CCNA 2 v6.0 - CCENT (ICND1) Practice Certification Exam Answers 25

CCNA 2 v6.0 - CCENT (ICND1) Practice Certification Exam Answers 26

57. The exhibit shows configuration commands from switch SW3 as follows:

SW3(config)# vlan 35
SW3(config-vlan)# name marketing
SW3(config-vlan)# vlan 150
SW3(config-vlan)# name voice
SW3(config-vlan)# int fa0/20
SW3(config-if)# switchport mode access
SW3(config-if)# switchport access vlan 35
SW3(config-if)# mls qos trust cos
SW3(config-if)# switchport access vlan 150
SW3(config-if)# end

Refer to the exhibit. A technician is programming switch SW3 to manage voice and data traffic through port Fa0/20. What, if anything, is wrong with the configuration?

  • The mls qos trust cos command should reference VLAN 35.
  • The command used to assign the voice VLAN to the switch port is incorrect.
  • Interface Fa0/20 can only have one VLAN assigned.
  • There is nothing wrong with the configuration.

Explain: The voice VLAN should be configured with the switchport voice vlan 150 command. A switch interface can be configured to support one data VLAN and one voice VLAN. The mls qos trust cos associates with the interface. Voice traffic must be trusted so that fields within the voice packet can be used to classify it for QoS.

58. Which address type is not supported in IPv6?

  • unicast
  • private
  • multicast
  • broadcast

59. Refer to the exhibit. Match the packets with their destination IP address to the exiting interfaces on the router. (Not all targets are used.)

CCNA 2 v6.0 - CCENT (ICND1) Practice Certification Exam Answers 27

CCNA 1 v7 Modules 8 - 10: Communicating Between Networks Exam Answers 2

Explanation: Packets with a destination of 172.17.6.15 are forwarded through Fa0/0. Packets with a destination of 172.17.10.5 are forwarded through Fa1/1. Packets with a destination of 172.17.12.10 are forwarded through Fa1/0. Packets with a destination of 172.17.14.8 are forwarded through Fa0/1. Because network 172.17.8.0 has no entry in the routing table, it will take the gateway of last resort, which means that packets with a destination of 172.17.8.20 are forwarded through Serial0/0/0. Because a gateway of last resort exists, no packets will be dropped.

Subscribe
Notify of
guest

65 Comments
Inline Feedbacks
View all comments
Hanna
Hanna
3 years ago

Refer to the exhibit. Match the packets with their destination IP address to the exiting interfaces on the router. (Not all targets are used.)

Dom
Dom
4 years ago

Hi I have the CCENT ICND1 exam in a few weeks, I would like to know if these 60 questions are enough to pass the exam? Thank you in advance for your answer.

Brian Harding
Brian Harding
3 years ago
Reply to  Dom

How do you write an obsolete exam in a few weeks?
Sorry not trying to come off as a jerk, just curious as where I live that exam has been obsolete since February 2020, with no opportunity to book past Feb 20 if not passed in full, ICND1 and 2 by Feb 20 then you have to write the
entire new exam and your ICND1 score is out the window.

Whomever created this tool kudos man, I wish I found it sooner as I write the new exam in 2 weeks today.

Kevin
Kevin
4 years ago

Hi! can i have the vce file please? i appreciate your efforts!

John
John
4 years ago

Hi, i will have exam from CCNA 2 rse v6 this week. Can you please tell me which final exam and which PT will be here. Thank you

jmr
jmr
4 years ago

A network administrator is designing an IPv4 addressing scheme and requires these subnets.

1 subnet of 100 hosts
2 subnets of 80 hosts
2 subnets of 30 hosts
4 subnets of 20 hosts

Which combination of subnets and masks will provide the best addressing plan for these requirements?
Correct
Response
Your
Response

1 subnet of 126 hosts with a 255.255.255.192 mask
2 subnets of 80 hosts with a 255.255.255.224 mask
6 subnets of 30 hosts with a 255.255.255.240 mask

9 subnets of 126 hosts with a 255.255.255.128 mask

3 subnets of 126 hosts with a 255.255.255.192 mask
6 subnets of 30 hosts with a 255.255.255.240 mask
Correct Response

3 subnets of 126 hosts with a 255.255.255.128 mask
6 subnets of 30 hosts with a 255.255.255.224 mask

Jahan
Jahan
4 years ago

May I get the PDF Dumps? Taking the 100-105 – Interconnecting Cisco Networking Devices Part 1 on Thursday

IVAN
IVAN
4 years ago

I HAVE ICN1 AND 1CND2 next week , can i get the dumps

Tesnime
Tesnime
4 years ago

Hello , I’m going to take CCNA2 ” ‘Routing and Switching Essentials” exam on wednesday 19/02 , which questions are included please? Should I learn version 6 or 7 ?

ted
ted
4 years ago

Is OSPF on ICND1v6? I don’t remember covering it during class.

ted
ted
4 years ago

Interesting. Besides RIP, I don’t remember covering anything beyond the admin distance of OSPF (nothing about router ID’s etc…). I’m taking the exam soon so I guess I’ll report back and post if there were any in depth OSPF questions on mine.

Jam
Jam
4 years ago

Is page two strictly icnd 1 or are there CCNA questions included as well?

Vic
Vic
4 years ago

I have ICND1 Certification Exam test next week, can you send me the vce please?

Arismendy Gomez
Arismendy Gomez
4 years ago

Can I get the vce dumps of ICND1 too?

MaX
MaX
4 years ago

I have the exam this Friday, could you pass me the vce?

kamz
kamz
3 years ago

Hi, could you please tell me how i can the latest updated ccna dumps . Thanks

Mike
Mike
4 years ago

Can I get the vce dumps of ICND1 too?

hoest
hoest
4 years ago

i have ccna1 exam next week can you send me the vce plz?

GuestRR
GuestRR
4 years ago

Would it be possible to get the vce dumps for the ICND1???

Randy L Robbins
Randy L Robbins
4 years ago

Can I get the vce dumps of ICND1? I am scheudled to take the test in two weeks.

Randy L Robbins
Randy L Robbins
4 years ago

Can I get the vce dumps of ICND1

Pajevo
Pajevo
4 years ago

Can I get the vce dumps of ICND1 too? I have a exam scheduled tomorrow

feri
feri
4 years ago

can you pls send me the pdf of the latest dumps???

mike
mike
4 years ago

Can I get the vce dumps of ICND1 too?..

Guest
Guest
4 years ago
Reply to  Pajevo

Can us if the CCENT (ICND1) Practice Certification Exam Answers help

Guest
Guest
4 years ago
Reply to  Pajevo

Can you pajevo us if the CCENT (ICND1) Practice Certification Exam Answers help on your test tomorrow

usama saeed
usama saeed
4 years ago

hey guys, is this the same questions from icnd1 certification exam? I heard it’s 58 questions and so this too. please can you guys verify it cause I’m about to take the exam next week.

Guest
Guest
4 years ago

So these CCENT (ICND1) Practice Certification Exam questions on are the same as the the CCENT exam

Guest
Guest
4 years ago

If I study these CCENT (ICND1) Practice Certification Exam will this help me on the real CCENT (ICND1) Certification Exam test

Guest
Guest
4 years ago

what If I study only the CCENT (ICND1) Practice Certification Exam on your site will this help me on the real CCENT (ICND1) Certification Exam test better then the vce

Benedict Peter
Benedict Peter
4 years ago

Please am preparing for CCENT and am to take it next week, please i need help that goes beyond this questions on the site

Gin
Gin
4 years ago

Hello! In a few days I have to take the ICND1/CCENT exam, can you send me vce dump file please? Thank you for the fantastic work you do on this site!

ben
ben
4 years ago
Reply to  Guest

hi sir, I am answering my 100-105 interconnecting cisco ND exam. could you please email me the VCE dumps pleaseeeeee.Thanks

usama saeed
usama saeed
4 years ago

can you send vce dump file for me please?

studying only this questions will make me pass the real ICND1?

ben
ben
4 years ago

hi there, I am answering my 100-105 interconnecting cisco ND exam. could you please email me the VCE dumps pleaseeeeee.Thanks

Guest
Guest
4 years ago

will this help me on the real CCENT (ICND1) Certification Exam test

guest
guest
4 years ago

snip

L
L
4 years ago

These same questions come in the exam?

JonM
JonM
5 years ago

These same questions come in the exam?

mulumbwa
mulumbwa
5 years ago

hi guy’s!!! is ccent updated ? because i’m taking the exam this Friday!!! waiting your response

JonM
JonM
5 years ago
Reply to  mulumbwa

Hello, I also hope to take my exam in a month, you can sell me the questions that come in your ccent, psdt: luck in your exam.

Guest
Guest
4 years ago
Reply to  JonM

THE CCENT (ICND1) Practice Certification have These same questions come in the real CCENT CERTIFICATION EXAM QUESTIONS

mulumbwa
mulumbwa
5 years ago

HI GUY’S!!!!! MAY YOU PROVIDE CCENT CERTIFICATION EXAM QUESTIONS AND ANSWERS PLESASE

paul
paul
5 years ago

many thank to you

Wim
Wim
5 years ago

34. An administrator who is troubleshooting connectivity issues on a switch notices that a switch port configured for port security is in the err-disabled state. After verifying the cause of the violation, how should the administrator re-enable the port without disrupting network operation?

– Issue the shutdown command followed by the no shutdown command on the interface.
– Reboot the switch.
– Issue the no switchport port-security violation shutdown command on the interface.
– Issue the no switchport port-security command, then re-enable port security.

Aa A
Aa A
4 years ago
Reply to  Wim

Shutdown followed by no shutdown

Ali
Ali
6 years ago

Thanks

Rami
Rami
6 years ago

The answer for question number 26 is wrong , the correct answer is :209.165.200.225 Not 10.6.15.2.
Explanation: The source address for packets forwarded by the router to the Internet will be the inside global address of 209.165.200.225. This is the address that the internal addresses from the 10.6.15.0 network will be translated to by NAT.

Warriormon87
Warriormon87
6 years ago

Which WAN connectivity method would be used in a remote location where there are no service provider networks?

WiMax
cable
VPN
VSAT

Extra Question for Me
Extra Question for Me
6 years ago

The exhibit shows configuration commands from switch SW3 as follows:
SW3(config)# vlan 35
SW3(config-vlan)# name marketing
SW3(config-vlan)# vlan 150
SW3(config-vlan)# name voice
SW3(config-vlan)# int fa0/20
SW3(config-if)# switchport mode access
SW3(config-if)# switchport access vlan 35
SW3(config-if)# mls qos trust cos
SW3(config-if)# switchport access vlan 150
SW3(config-if)# end
Refer to the exhibit. A technician is programming switch SW3 to manage voice and data traffic through port Fa0/20. What, if anything, is wrong with the configuration?
Correct
Response
Your
Response
The mls qos trust cos command should reference VLAN 35.
There is nothing wrong with the configuration.

The command used to assign the voice VLAN to the switch port is incorrect.
Interface Fa0/20 can only have one VLAN assigned.
The voice VLAN should be configured with the switchport voice vlan 150 command. A switch interface can be configured to support one data VLAN and one voice VLAN. The mls qos trust cos associates with the interface. Voice traffic must be trusted so that fields within the voice packet can be used to classify it for QoS.

rokk
rokk
7 years ago

On Question 23 the answers are:
– All of the devices on a segment see data that passes on the network medium.
– After detecting a collision, hosts can attempt to resume transmission after a random time delay has expired.
– A device listens and waits until the media is not busy before transmitting.

The Carrier Sense Multiple Access/Collision Detection (CSMA/CD) process is a contention-based media access control mechanism used on shared media access networks, such as Ethernet. When a device needs to transmit data, it listens and waits until the media is available (quiet), then it will send data. If two devices transmit at the same time, a collision will occur. Both devices will detect the collision on the network. When a device detects a collision, it will stop the data transmission process, wait for a random amount of time, then try again.

Christian-Martin
Christian-Martin
7 years ago

Problem 11: A = 10.1.0.13; B = 209.165.201.1