Time limit: 0
Quiz-summary
0 of 70 questions completed
Questions:
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
Information
Good luck
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading...
You must sign in or sign up to start the quiz.
You have to finish following quiz, to start this quiz:
Results
0 of 70 questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 points, (0)
Average score |
|
Your score |
|
Categories
- Not categorized 0%
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- Answered
- Review
-
Question 1 of 70
1. Question
You have been asked to come up with a subnet mask that will allow all three web servers to be on the same network while providing the maximum number of subnets. Which network address and subnet mask meet this requirement?Correct
Incorrect
-
Question 2 of 70
2. Question
What parameter can be different on ports within an EtherChannel?Correct
Incorrect
-
Question 3 of 70
3. Question
Which two statements about IPv6 router advertisement messages are true? (Choose two.)Correct
Incorrect
-
Question 4 of 70
4. Question
Which spanning-tree protocol rides on top of another spanning-tree protocol?Correct
Incorrect
-
Question 5 of 70
5. Question
A network administrator needs to configure port security on a switch. Which two statements are true? (Choose two.)Correct
Incorrect
-
Question 6 of 70
6. Question
Which switching method duplicates the first six bytes of a frame before making a switching decision?Correct
Incorrect
-
Question 7 of 70
7. Question
Which logging command can enable administrators to correlate syslog messages with millisecond precision?Correct
Incorrect
-
Question 8 of 70
8. Question
Which three statements about link-state routing are true? (Choose three.)Correct
Incorrect
-
Question 9 of 70
9. Question
Which command can you enter to determine whether a switch is operating in trunking mode?Correct
Incorrect
-
Question 10 of 70
10. Question
Which command can you enter to view the ports that are assigned to VLAN 20?Correct
Incorrect
-
Question 11 of 70
11. Question
In which two formats can the IPv6 address fd15:0db8:0000:0000:0700:0003:400F:572B be written? (Choose two.)Correct
Incorrect
-
Question 12 of 70
12. Question
Which function of the IP SLAs ICMP jitter operation can you use to determine whether a VoIP issue is caused by excessive end-to-end time?Correct
Incorrect
-
Question 13 of 70
13. Question
Refer to the exhibit. Which of these statements correctly describes the state of the switch once the boot process has been completed?Correct
Incorrect
-
Question 14 of 70
14. Question
Refer to the exhibit. The network administrator normally establishes a Telnet session with the switch from host A. However, host A is unavailable. The administrator’s attempt to telnet to the switch from host fails, but pings to the other two hosts are successful. What is the issue?Correct
Incorrect
-
Question 15 of 70
15. Question
Which condition does the err-disabled status indicate on an Ethernet interface?Correct
Incorrect
-
Question 16 of 70
16. Question
Refer to the exhibit All of the routers in the network are configured with the ip subnet-zero command. Which network addresses should be used for Link A and Network A? (Choose two.)Correct
Incorrect
-
Question 17 of 70
17. Question
Which type of device can be replaced by the use of subinterfaces for VLAN routing?Correct
Incorrect
-
Question 18 of 70
18. Question
Which statement about LLDP is true?Correct
Incorrect
-
Question 19 of 70
19. Question
If the primary root bridge experiences a power loss, which switch takes over?Correct
Incorrect
-
Question 20 of 70
20. Question
A network administrator is troubleshooting an EIGRP problem on a router and needs to confirm the IP addresses of the devices with which the router has established adjacency. The retransmit interval and the queue counts for the adjacent routers also need to be checked. What command will display the required information?Correct
Incorrect
-
Question 21 of 70
21. Question
Which three statements about IPv6 prefixes are true? (Choose three.)Correct
Incorrect
-
Question 22 of 70
22. Question
Which command can you enter to display duplicate IP addresses that the DHCP server assigns?Correct
Incorrect
-
Question 23 of 70
23. Question
Which three ports will be STP designated ports if all the links are operating at the same bandwidth? (Choose three.)Correct
Incorrect
-
Question 24 of 70
24. Question
Refer to the exhibit The network administrator cannot connect to Switch 1 over a Telnet session, although the hosts attached to Switch1 can ping the interface Fa0/0 of the router. Given the information in the graphic and assuming that the router and Switch2 are configured properly, which of the following commands should be issued on Switch1 to correct this problem?Correct
Incorrect
-
Question 25 of 70
25. Question
Refer to the exhibit. Each of these four switches has been configured with a hostname, as well as being configured to run RSTP.No other configuration changes have been made. Which three of these show the correct RSTP port roles for the indicated switches and interfaces? (Choose three.)Correct
Incorrect
-
Question 26 of 70
26. Question
Which feature builds a FIB and an adjacency table to expedite packet forwarding?Correct
Incorrect
-
Question 27 of 70
27. Question
Which command can you enter to verify that a 128-bit address is live and responding?Correct
Incorrect
-
Question 28 of 70
28. Question
What are two reasons that duplex mismatches can be difficult to diagnose? (Choose two.)Correct
Incorrect
-
Question 29 of 70
29. Question
Which condition indicates that service password-encryption is enabled?Correct
Incorrect
-
Question 30 of 70
30. Question
Which protocol advertises a virtual IP address to facilitate transparent failover of a Cisco routing device?Correct
Incorrect
-
Question 31 of 70
31. Question
What is the correct routing match to reach 172.16.1.5/32?Correct
Incorrect
-
Question 32 of 70
32. Question
Which layer in the OSI reference model is responsible for determining the availability of the receiving program and checking to see if enough resources exist for that communication?Correct
Incorrect
-
Question 33 of 70
33. Question
What is the purpose of the POST operation on a router?Correct
Incorrect
-
Question 34 of 70
34. Question
Which protocol is the Cisco proprietary implementation of FHRP?Correct
Incorrect
-
Question 35 of 70
35. Question
Which three characteristics are representative of a link-state routing protocol? (Choose three.)Correct
Incorrect
-
Question 36 of 70
36. Question
Which part of the PPPoE server configuration contains the information used to assign an IP address to a PPPoE client?Correct
Incorrect
-
Question 37 of 70
37. Question
Drag and dropSort elements
- All Nodes (link-local)
- OSPFv3 Routers
- OSPFv3 Designated Routers
- EIGRPv3 Routers
- PIM Routers
- All Routers (site-local)
-
FF02::1
-
FF02::5
-
FF02::6
-
FF02::A
-
FF02::D
-
FF05::2
Correct
Incorrect
-
Question 38 of 70
38. Question
Which three statements about RSTP are true? (Choose three.)Correct
Incorrect
-
Question 39 of 70
39. Question
What are two benefits of using NAT? (Choose two.)Correct
Incorrect
-
Question 40 of 70
40. Question
Which two commands correctly verify whether port security has been configured on port FastEthernet 0/12 on a switch? (Choose two.)Correct
Incorrect
-
Question 41 of 70
41. Question
Refer to the exhibit. Given this output for SwitchC, what should the network administrator’s next action be?Correct
Incorrect
-
Question 42 of 70
42. Question
Which statement is correct regarding the operation of DHCP?Correct
Incorrect
-
Question 43 of 70
43. Question
Which two statements about using the CHAP authentication mechanism in a PPP link are true? (Choose two.)Correct
Incorrect
-
Question 44 of 70
44. Question
Refer to the exhibit. Switch port FastEthernet 0/24 on ALSwitch1 will be used to create an IEEE 802.1Q-compliant trunk to another switch. Based on the output shown, what is the reason the trunk does not form, even though the proper cabling has been attached?Correct
Incorrect
-
Question 45 of 70
45. Question
Refer to the exhibit. A junior network administrator was given the task of configuring port security on SwitchA to allow only PC_A to access the switched network through port fa0/1. If any other device is detected, the port is to drop frames from this device. The administrator configured the interface and tested it with successful pings from PC_A to RouterA, and then observes the output from these two show commands. Which two of these changes are necessary for SwitchA to meet the requirements? (Choose two.)Correct
Incorrect
-
Question 46 of 70
46. Question
Which three statements about static routing are true? (Choose three.)Correct
Incorrect
-
Question 47 of 70
47. Question
What are the address that will show at the show ip route if we configure the above statements? (Choose Three.)Correct
Incorrect
-
Question 48 of 70
48. Question
Which feature facilitates the tagging of frames on a specific VLAN?Correct
Incorrect
-
Question 49 of 70
49. Question
What does split horizon prevent?Correct
Incorrect
-
Question 50 of 70
50. Question
Which value to use in HSRP protocol election process?Correct
Incorrect
-
Question 51 of 70
51. Question
Which of the following is needed to be enable back the role of active in HSRP?Correct
Incorrect
-
Question 52 of 70
52. Question
Which command is used to show the interface status of a router?Correct
Incorrect
-
Question 53 of 70
53. Question
Which of the following privilege level is the most secured?Correct
Incorrect
-
Question 54 of 70
54. Question
Which IPV6 feature is supported in IPV4 but is not commonly used?Correct
Incorrect
-
Question 55 of 70
55. Question
Which two statements are true about IPv6 Unique Local Addresses? (Choose Two.)Correct
Incorrect
-
Question 56 of 70
56. Question
Which range represents the standard access list?Correct
Incorrect
-
Question 57 of 70
57. Question
What to do when the router password was forgotten?Correct
Incorrect
-
Question 58 of 70
58. Question
What is true about Cisco Discovery Protocol?Correct
Incorrect
-
Question 59 of 70
59. Question
Which of the following encrypts the traffic on a leased line?Correct
Incorrect
-
Question 60 of 70
60. Question
How do you configure a hostname?Correct
Incorrect
-
Question 61 of 70
61. Question
How do you maintain security in multiple websites?Correct
Incorrect
-
Question 62 of 70
62. Question
Refer to the exhibit. Switch-1 needs to send data to a host with a MAC address of 00b0.d056.efa4. What will Switch-1 do with this data?Correct
Incorrect
-
Question 63 of 70
63. Question
What routing protocol use first-hand information from peers?Correct
Incorrect
Hint
http://www.ciscopress.com/articles/article.asp?p=24090&seqNum=4 The reason is that unlike the routing-by-rumor approach of distance vector, link state routers have firsthand information from all their peer routers. Each router originates information about itself, its directly connected links, and the state of those links (hence the name). This information is passed around from router to router, each router making a copy of it, but never changing it. The ultimate objective is that every router has identical information about the internetwork, and each router will independently calculate its own best paths. -
Question 64 of 70
64. Question
What field is consist of 6 bytes in the field identification frame in IEEE 802.1Q?Correct
Incorrect
-
Question 65 of 70
65. Question
What is new in HSRPv2?Correct
Incorrect
-
Question 66 of 70
66. Question
What’s are true about MPLS?Correct
Incorrect
-
Question 67 of 70
67. Question
A network engineer wants to allow a temporary entry for a remote user with a specific username and password so that the user can access the entire network over the internet. Which ACL can be used?Correct
Incorrect
Hint
http://xgu.ru/wiki/Cisco_ACL -
Question 68 of 70
68. Question
Which command is necessary to permit SSH or Telnet access to a cisco switch that is otherwise configured for these vty line protocols?Correct
Incorrect
-
Question 69 of 70
69. Question
What should be part of a comprehensive network security plan?Correct
Incorrect
-
Question 70 of 70
70. Question
Which two Cisco IOS commands, used in troubleshooting, can enable debug output to a remote location? (Choose two)Correct
Incorrect