Time limit: 0
Quiz-summary
0 of 70 questions completed
Questions:
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
Information
Good luck!
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading...
You must sign in or sign up to start the quiz.
You have to finish following quiz, to start this quiz:
Results
0 of 70 questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 points, (0)
Average score |
|
Your score |
|
Categories
- Not categorized 0%
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- Answered
- Review
-
Question 1 of 70
1. Question
What is the use of IPv4 private space (choose two)Correct
Incorrect
-
Question 2 of 70
2. Question
Assuming a subnet mask of 255.255.248.0, three of the following addresses are valid host addresses. Which are these addresses? (Choose three.)Correct
Incorrect
-
Question 3 of 70
3. Question
Which type does a port become when it receives the best BPDU on a bridge?Correct
Incorrect
-
Question 4 of 70
4. Question
Which value can you modify to configure a specific interface as the preferred forwarding interface?Correct
Incorrect
-
Question 5 of 70
5. Question
Which statement about VLAN configuration is true?Correct
Incorrect
-
Question 6 of 70
6. Question
Refer to the exhibit. Which switch provides the spanning-tree designated port role for the network segment that services the printers?Correct
Incorrect
-
Question 7 of 70
7. Question
In which two situations should you use out-of-band management?Correct
Incorrect
-
Question 8 of 70
8. Question
Which command can you enter to configure a local username with an encrypted password and EXEC mode user privileges?Correct
Incorrect
-
Question 9 of 70
9. Question
What happens when an 802.11a node broadcasts within the range of an 802.11g access point?Correct
Incorrect
-
Question 10 of 70
10. Question
Which value is indicated by the next hop in a routing table?Correct
Incorrect
-
Question 11 of 70
11. Question
Which statement about the inside interface configuration in a NAT deployment is true?Correct
Incorrect
-
Question 12 of 70
12. Question
Which option is the default switch port port-security violation mode?Correct
Incorrect
-
Question 13 of 70
13. Question
Which entity assigns IPv6 addresses to end users?Correct
Incorrect
-
Question 14 of 70
14. Question
Which value indicate the distance from the ntp authoritative time source?Correct
Incorrect
-
Question 15 of 70
15. Question
Which NTP type designates a router without an external reference clock as an authoritative time source?Correct
Incorrect
-
Question 16 of 70
16. Question
Which 3 feature are represented by A letter in AAA? (Choose Three)Correct
Incorrect
-
Question 17 of 70
17. Question
Which of the following are the valid numbers of standard ACL (choosse 2)Correct
Incorrect
-
Question 18 of 70
18. Question
When you deploy multilink PPP on your network, where must you configure the group IP Address on each device?Correct
Incorrect
-
Question 19 of 70
19. Question
What are two statement for SSH?Correct
Incorrect
-
Question 20 of 70
20. Question
If a route is not present in the routing table for a particular destination, what would the router do?Correct
Incorrect
-
Question 21 of 70
21. Question
Host is able to ping a web server but it is not able to do HTTP request.Correct
Incorrect
-
Question 22 of 70
22. Question
Which NTP command configures the local devices as an NTP reference clock source?Correct
Incorrect
-
Question 23 of 70
23. Question
Which item represents the standard IP ACL?Correct
Incorrect
-
Question 24 of 70
24. Question
Which command can you enter to verify that a 128-bit address is live and responding?Correct
Incorrect
-
Question 25 of 70
25. Question
Where information about untrusted hosts are stored?Correct
Incorrect
Hint
Builds and maintains the DHCP snooping binding database, which contains information about untrusted hosts with leased IP addresses. -
Question 26 of 70
26. Question
What is one benefit of PVST+?Correct
Incorrect
Hint
The PVST+ provides Layer 2 load-balancing for the VLAN on which it runs. You can create different logical topologies by using the VLANs on your network to ensure that all of your links are used but that no one link is oversubscribed. Each instance of PVST+ on a VLAN has a single root switch. This root switch propagates the spanning-tree information associated with that VLAN to all other switches in the network. Because each switch has the same information about the network, this process ensures that the network topology is maintained and optimized per VLAN. -
Question 27 of 70
27. Question
Which statement about VLAN operation on Cisco Catalyst switches is true?Correct
Incorrect
Hint
Each VLAN resides in its own broadcast domain, so incoming frames with unknown destinations are only transmitted to ports that reside in the same VLAN as the incoming frame. -
Question 28 of 70
28. Question
Three switches are connected to one another via trunk ports. Assuming the default switch configuration, which switch is elected as the root bridge for the spanning-tree instance of VLAN 1?Correct
Incorrect
Hint
Each switch in your network will have a Bridge ID Priority value, more commonly referred to as a BID. This BID is a combination of a default priority value and the switch’s MAC address, with the priority value listed first. The lowest BID will win the election process. For example, if a Cisco switch has the default priority value of 32,768 and a MAC address of 11-22-33- 44-55-66, the BID would be 32768:11-22-33-44-55-66. Therefore, if the switch priority is left at the default, the MAC address is the deciding factor in the root bridge election. -
Question 29 of 70
29. Question
Which two options are primary responsibilities of the APlC-EM controller? (Choose two.)Correct
Incorrect
Hint
http://www.cisco.com/c/en/us/products/cloud-systems-management/application-policy-infrastructure-controller-enterprise-module/index.html Automate network configuration and setup Deploy network devices faster Automate device deployment and provisioning across the enterprise. Provide a programmable network Enable developers to create new applications that use the network to fuel business growth. -
Question 30 of 70
30. Question
Which command can be used from a PC to verify the connectivity between hosts that connect through a switch in the same LAN?Correct
Incorrect
Hint
ICMP pings are used to verify connectivity between two IP hosts. Traceroute is used to verify the router hop path traffic will take but in this case since the hosts are in the same LAN there will be no router hops involved. -
Question 31 of 70
31. Question
Refer to the exhibit. Which two statements are true about interVLAN routing in the topology that is shown in the exhibit? (Choose two.)Correct
Incorrect
Hint
In order for multiple VLANs to connect to a single physical interface on a Cisco router, subinterfaces must be used, one for each VLAN. This is known as the router on a stick configuration. Also, for any trunk to be formed, both ends of the trunk must agree on the encapsulation type, so each one must be configured for 802.1q or ISL. -
Question 32 of 70
32. Question
What value is primarily used to determine which port becomes the root port on each nonroot switch in a spanning-tree topology?Correct
Incorrect
Hint
The path cost to the root bridge is the most important value to determine which port will become the root port on each non-root switch. In particular, the port with lowest cost to the root bridge will become root port (on non-root switch). -
Question 33 of 70
33. Question
Refer to the exhibit. lf RTRO1 as configured as shown, which three addresses will be received by other routers that are running ElGRP on the network? (Choose three.)Correct
Incorrect
-
Question 34 of 70
34. Question
Which two statements about TACACS+ are true? (Choose two.)Correct
Incorrect
Hint
http://tacacs.net/docs/TACACS_Advantages.pdf Many IT departments choose to use AAA (Authentication, Authorization and Accounting) protocols RADIUS or TACACS+ to address these issues. http://www.cisco.com/c/en/us/support/docs/security-vpn/terminal-access-controller-access-control-system-tacacs-/13865-tacplus.pdf This document describes how to configure a Cisco router for authentication with the TACACS+ that runs on UNIX. TACACS+ does not offer as many features as the commercially available Cisco Secure ACS for Windows or Cisco Secure ACS UNIX. TACACS+ software previously provided by Cisco Systems has been discontinued and is no longer supported by Cisco Systems. -
Question 35 of 70
35. Question
Which command enables RSTP on a switch?Correct
Incorrect
Hint
Rapid Spanning Tree Protocol (RSTP) is an enhancement of the original STP 802.1D protocol. The RSTP 802.1w protocol is an IEEE open implementation. Cisco has its own proprietary implementation of RSTP, that includes the benefits of its Per-VLAN spanning tree protocols, called Rapid-PVST+. To activate the Rapid-PVST+ protocol: switch(config)#spanning-tree mode rapid-pvst -
Question 36 of 70
36. Question
A switch is configured with all ports assigned to VLAN 2 with full duplex FastEthernet to segment existing departmental traffic. What is the effect of adding switch ports to a new VLAN on the switch?Correct
Incorrect
-
Question 37 of 70
37. Question
VLAN 3 is not yet configured on your switch. What happens if you set the switchport access vlan 3 command in interface configuration mode?Correct
Incorrect
Hint
The “switchport access vlan 3″will put that interface as belonging to VLAN 3 while also updated the VLAN database automatically to include VLAN 3. -
Question 38 of 70
38. Question
Cisco Catalyst switches CAT1 and CAT2 have a connection between them using ports FA0/13. An 802.1Q trunk is configured between the two switches. On CAT1, VLAN 10 is chosen as native, but on CAT2 the native VLAN is not specified. What will happen in this scenario?Correct
Incorrect
Hint
A “native VLAN mismatch” error will appear by CDP if there is a native VLAN mismatch on an 802.1Q link. “VLAN mismatch” can cause traffic from one vlan to leak into another vlan. -
Question 39 of 70
39. Question
Refer to the exhibit All switch ports are assigned to the correct VLANs, but none of the hosts connected to SwitchA can communicate with hosts in the same VLAN connected to SwitchB. Based on the output shown, what is the most likely problem?Correct
Incorrect
Hint
In order to pass traffic from VLANs on different switches, the connections between the switches must be configured as trunk ports. -
Question 40 of 70
40. Question
What is the function of the command switchport trunk native vlan 999 on a Cisco Catalyst switch?Correct
Incorrect
Hint
Configuring the Native VLAN for Untagged Traffic A trunk port configured with 802.1Q tagging can receive both tagged and untagged traffic. By default, the switch forwards untagged traffic in the native VLAN configured for the port. The native VLAN is VLAN 1 by default. -
Question 41 of 70
41. Question
Which parameter or parameters are used to calculate OSPF cost in Cisco routers?Correct
Incorrect
Hint
http://www.cisco.com/c/en/us/support/docs/ip/open-shortest-path-first-ospf/7039-1.html#t6 OSPF Cost The cost (also called metric) of an interface in OSPF is an indication of the overhead required to send packets across a certain interface. The cost of an interface is inversely proportional to the bandwidth of that interface. A higher bandwidth indicates a lower cost. There is more overhead (higher cost) and time delays involved in crossing a 56k serial line than crossing a 10M ethernet line. The formula used to calculate the cost is: cost= 10000 0000/bandwith in bps For example, it will cost 10 EXP8/10 EXP7 = 10 to cross a 10M Ethernet line and will cost 10 EXP8/1544000 = 64 to cross a T1 line. By default, the cost of an interface is calculated based on the bandwidth; you can force the cost of an interface with the ip ospf costinterface subconfiguration mode command. -
Question 42 of 70
42. Question
Which command shows your active Telnet connections?Correct
Incorrect
Hint
The “show users” shows telnet/ssh connections to your router while “show sessions” shows telnet/ssh connections from your router (to other devices). The question asks about “your active Telnet connections”, meaning connections from your router -
Question 43 of 70
43. Question
Refer to the exhibit. Based on the exhibited routing table, how will packets from a host within the 192.168.10.192/26 LAN be forwarded to 192.168.10.1?Correct
Incorrect
-
Question 44 of 70
44. Question
Refer to the exhibit. You have discovered that computers on the 192 168 10 0/24 network can ping their default gateway, but they cannot connect to any resources on a remote network. Which reason for the problem is most likely true?Correct
Incorrect
-
Question 45 of 70
45. Question
Which WAN topology provides a direct connection from each site to all other sites on the network?Correct
Incorrect
-
Question 46 of 70
46. Question
Which two passwords must be supplied in order to connect by Telnet to a properly secured Cisco switch and make changes to the device configuration? (Choose two.)Correct
Incorrect
-
Question 47 of 70
47. Question
Refer to the exhibit. Which user-mode password has just been set?Correct
Incorrect
-
Question 48 of 70
48. Question
Which component of a routing table entry represents the subnet mask?Correct
Incorrect
Hint
IP Routing Table Entry Types An entry in the IP routing table contains the following information in the order presented: Network ID. The network ID or destination corresponding to the route. The network ID can be class- based, subnet, or supernet network ID, or an IP address for a host route. Network Mask. The mask that is used to match a destination IP address to the network ID. Next Hop. The IP address of the next hop. Interface. An indication of which network interface is used to forward the IP packet. Metric. A number used to indicate the cost of the route so the best route among possible multiple routes to the same destination can be selected. A common use of the metric is to indicate the number of hops (routers crossed) to the network ID. Routing table entries can be used to store the following types of routes: Directly Attached Network IDs. Routes for network IDs that are directly attached. For directly attached networks, the Next Hop field can be blank or contain the IP address of the interface on that network. Remote Network IDs. Routes for network IDs that are not directly attached but are available across other routers. For remote networks, the Next Hop field is the IP address of a local router in between the forwarding node and the remote network. Host Routes. A route to a specific IP address. Host routes allow routing to occur on a per-IP address ba- sis. For host routes, the network ID is the IP address of the specified host and the network mask is 255.255.255.255. Default Route. The default route is designed to be used when a more specific network ID or host route is not found. The default route network ID is 0.0.0.0 with the network mask of 0.0.0.0. -
Question 49 of 70
49. Question
How can you disable DTP on a switch port?Correct
Incorrect
-
Question 50 of 70
50. Question
How is the redundancy represented in ntp master?Correct
Incorrect
Hint
NTP redundancy http://sflanders.net/2015/02/09/time-hard-proper-ntp-configuration/ -
Question 51 of 70
51. Question
Which command you enter on a switch to display the ip address associated with connected devices?Correct
Incorrect
-
Question 52 of 70
52. Question
Which technology can enable multiple vlan to communicate with one another?Correct
Incorrect
-
Question 53 of 70
53. Question
Which protocol is a Cisco proprietary implementation of STP?Correct
Incorrect
-
Question 54 of 70
54. Question
Which Type of ipv6 unicast ip address is reachable across the internet?Correct
Incorrect
-
Question 55 of 70
55. Question
interface Loopback0 ip address 172.16.1.33 255.255.255.224 router bgp 999 neighbor 10.1.5.2 remote-as 65001 Refer to the exhibit . Which Command do you enter so that R1 advertises the loopback0 interface to the BGP Peers?Correct
Incorrect
-
Question 56 of 70
56. Question
Which networking Technology is currently recognized as the standard for computer networking?Correct
Incorrect
-
Question 57 of 70
57. Question
Which two are advantages of static routing when compared to dynamic routing? (Choose two.)Correct
Incorrect
Hint
Explanation: Since static routing is a manual process, it can be argued that it is more secure (and more prone to human errors) since the network administrator will need to make changes to the routing table directly. Also, in stub networks where there is only a single uplink connection, the load is reduced as stub routers just need a single static default route, instead of many routes that all have the same next hop IP address. -
Question 58 of 70
58. Question
Refer to the exhibit. Which rule does the DHCP server use when there is an IP address conflict?Correct
Incorrect
Hint
Explanation: An address conflict occurs when two hosts use the same IP address. During address assignment, DHCP checks for conflicts using ping and gratuitous ARP. If a conflict is detected, the address is removed from the pool. The address will not be assigned until the administrator resolves the conflict. -
Question 59 of 70
59. Question
Which two tasks does the Dynamic Host Configuration Protocol perform? (Choose two.)Correct
Incorrect
Hint
Explanation: The Dynamic Host Configuration Protocol (DHCP) is a network protocol used to configure devices that are connected to a network (known as hosts) so they can communicate on that network using the Internet Protocol (IP). It involves clients and a server operating in a client-server model. DHCP servers assigns IP addresses from a pool of addresses and also assigns other parameters such as DNS and default gateways to hosts. -
Question 60 of 70
60. Question
Which definition of default route is true?Correct
Incorrect
-
Question 61 of 70
61. Question
Which value must the device send as its username when using CHAP to authenticate with the remote peer site id:17604704 over a PPP link?Correct
Incorrect
Hint
http://www.cisco.com/c/en/us/support/docs/wan/point-to-point-protocol-ppp/10241-ppp-callin-hostname.html -
Question 62 of 70
62. Question
Which two statements about Ethernet standards are true?(choose two)Correct
Incorrect
-
Question 63 of 70
63. Question
How to configure RIPv2? (Choose Two.)Correct
Incorrect
-
Question 64 of 70
64. Question
Which technology supports multiple dynamic secure connections over an unsecure transport network?Correct
Incorrect
-
Question 65 of 70
65. Question
interface fa0/0 ip address x.x.x.33 255.255.255.224 router bgp XXX neighbor x.x.x.x remote as x.x.x.x You need to advertise the network of Int fa0/0.Correct
Incorrect
-
Question 66 of 70
66. Question
Which two statements about MPLS are true? (Choose two)Correct
Incorrect
-
Question 67 of 70
67. Question
Which command is used to build DHCP pool?Correct
Incorrect
-
Question 68 of 70
68. Question
Which option describes a benefit of a point-to-point leased line ?Correct
Incorrect
-
Question 69 of 70
69. Question
Which DTP switch port mode allows the port to create a trunk link if the neighboring port is in trunk mode, dynamic desirable mode, or desirable or auto mode?Correct
Incorrect
-
Question 70 of 70
70. Question
Which type of IP address of ipv6 that also exist in IPv4 but barely used?Correct
Incorrect