You are on page 1of 35

CCNA ICND1/ICND2 Exam

1. The ____________ layer is responsible for finding the network


resources broadcast from a server and adding flow control and error
control.
Answer: Application Layer
2. If you wanted to have 16 subnets with a Class C network ID, which
subnet mask would you use?
A. 255.255.255.252
B. 255.255.255.248
C. 255.255.255.240
D. 255.255.255.255
Answer: C
3. Which of the following are associated with the application layer of
the OSI model? (choose two)
A. ping
B. Telnet
C. FTP
D. TCP
E. IP
Answer: B, C
4. Convert the following MAC address into a EUI-64 address:
0a0c.abac.caba.
Answer: 2001:db8:1:1:080c:abff:feac:caba
5. Which protocol should you block with an ACL to stop a ping into
your corporate network?
A. IP
B. TCP
C. ICMP
D. UDP
E. ARP
Answer: C
7. A switch has a port that is alternating between green and amber.
Which condition could this indicate?
A. The port is experiencing errors
B. The port is administratively disabled
C. The port is blocked by STP
D. The port is normal
Answer: A
8. Which type of IPv6 address is used just like a regular public routable
address in IPv4?
Answer: Global Unicast
9. What will a switch do with a frame received on a port that has a
destination MAC address not in the mac address-table?
A. The switch will send an ARP request out all ports except the
port from which the data originated.
B. The switch will flood the data out all ports except the port
from which the data originated.
C. The frame will be forwarded to the switches default-gateway
D. The frame will be dropped
Answer: B
10. Which subnet mask is the most efficient for point-to-point serial
links when using VLSM?
A. 255.255.255.0
B. 255.255.255.248
C. 255.255.255.252
D. 255.255.255.254
Answer: C
11. Segmentation and reassembly of data from the upper-layer
applications occurs at what layer?
A. The Application layer
B. The Presentation layer
C. The Session layer
D. The Transport layer
Answer: D
12. What prevents a sending host on one side of the connection from
overflowing the buffers in the receiving host?
A. Resistors
B. Flow control
C. BRI
D. Full duplex
Answer: B
13. What controls how much information is transferred from one end to
the other?
A. Broadcast domains
B. IEEE
C. Windowing
D. Bit registers
Answer: C
14. Which command is used to manually encrypt passwords on a Cisco
router?
A. Router#service password-encryption
B. Router(config)#service-password-
encryption
C. Router(config)#service password-
encryption
D. Router(config)#set password encrypt on
Answer: C
15. The OSPFv3 protocol uses multicast address _________?
Answer: FF02::5
16. Name the two sublayers and the specification number of the
IEEE Ethernet Data Link layer:
A. _________________________
B. _________________________
Answer:
A: Media Access Control (MAC) 802.3
B: Logical Link Control (LLC) 802.2
17. The IPV6 address ::1 represents what?
Answer: The localhost address, or loopback address for IPv6
18. What are two reasons that a network administrator would use access
lists? (Choose two)
A. To control vty access into a router
B. To control broadcast traffic through a router
C. To filter traffic as it passes through a router
D. To filter traffic that originates from a router
Answer: A, C
19. Which OSI layer is responsible for combining bits into bytes and
bytes into frames?
A. The Transport layer
B. The Network layer
C. The Data Link layer
D. The Physical layer
Answer: C
20. State the term applied to each layers Protocol Data Unit (PDU):
A. Transport layer: _______________
B. Network layer: ________________
C. Data Link layer: _______________
D. Physical layer: ________________
Answer:
A: Transport layer: Segment
B: Network layer: Packet
C: Data Link layer: Frame
D: Physical layer: Bits
21. State the three layers in the Cisco hierarchical model:
A. _____________
B. _____________
C. _____________
Answer:
A: Core layer
B: Distribution layer
C: Access layer
22. __________ addresses identify multiple interfaces, which is
somewhat similar to multicast addresses; however, the big difference
is that the __________ packet is only delivered to one address, the
first one it finds defined in the terms of routing distance. This
address can also be called one-to-one-of-many, or one-to-nearest.
Answer: anycast
23. You just replaced three old hubs with three new Cisco switches.
Which two technologies should be implemented to help to prevent
unauthorized access to the company payroll server? (Choose two)
A. access lists
B. STP
C. VTP
D. VLANs
E. Wireless LANs
Answer: A, D
24. Which of the following are Layer 2 switch functions?
A. Address learning.
B. Network learning.
C. Forward/filter decisions
D. Loop avoidance
Answer: A, C, and D
25. What happens if a frame is received on a switch port and the
destination hardware address is not listed in the MAC database of a
switch?
A. The frame is deleted.
B. The frame is transmitted out of the interface on which it was
received.
C. The frame is broadcasted out of all active interfaces.
D. The frame is broadcasted out of all active interfaces except
the interface on which it was received.
Answer: D
26. Which two of the following will prevent a broadcast storm?
A. Forward/Filter decisions
B. Address learning
C. Bridges
D. Router
E. layer 3 switch
Answer: D, E
27. A router solicitation is sent out using the all-routers multicast
address of _______ . The router can send a router advertisement to
all hosts using the _________ multicast address.
Answer: FF02::2, FF02::1
28. There are ________ bits (_____ hex characters) in an IPv6 field.
Answer: 16, four
29. You can configure NAT three ways on a Cisco router: ________,
_________ and ___________.
Answer: static, dynamic, and NAT Overload (PAT)
30. Which of the following commands under the vty lines sets the router
to only except Secure Shell (SSH) connections and not telnet?
A. transport input ssh
B. transport input ssh telnet
C. transport only ssh
D. transport only ssh no telnet
Answer: A
31. Which type of attack is characterized by a flood of packets that are
requesting a TCP connection to a server?
A. denial of service
B. brute force
C. reconnaissance
D. Trojan horse
Answer: A
32. To place an access list on an interface, use the _____________
command in interface configuration mode.
Answer: ip access-group
33. Name the four layers of the DoD reference model:
A. ________________
B. ________________
C. ________________
D. ________________
Answer:
A: Process/Application layer
B: Host-to-Host layer
C: Internet layer
D: Network Access layer
34. A company is installing IP phones. The phones and office computers
connect to the same device. To ensure maximum throughout for the
phone data, the company needs to make sure that the phone traffic is
on a different network form that of the office computer data traffic.
What is the best network device to which to directly connect the
phone and computers, and what technology should be implemented
on this device? (Choose two)
A. Hub
B. Router
C. Switch
D. STP
E. Subinterfaces
F. VLAN
Answer: C, F
35. IPv6 unicast routing is running on the Corp router. Which of the
following addresses would show up with the show ipv6 int
brief command?
Corp#sh int f0/0
FastEthernet0/0 is up, line protocol is up
Hardware is AmdFE, address is 000d.bdc9.af12 (bia
000d.bdc9.af12)
[output cut]
A. FF02::3c3d:0d:bdff:fec9:af12
B. FE80::3c3d:2d:bdff:fec9:af12
C. FE80::3c3d:0d:bdff:fe3c9:af12
D. FE80::3c3d:2d:ffbd:3bc9:af12
Answer: B.
36. A host sends a type of NDP message providing the MAC address
that was requested. Which type of NDP was sent?
A. NS
B. RS
C. RA
D. NA
Answer: D
37. Which of the following information can be provided by a DHCP
server?
A. IP address
B. Subnet mask
C. Domain name
D. Default gateway (routers)
E. DNS
F. WINS information
G. All of the above.
Answer: G
38. Which of the following protocols creates a virtual circuit to transmit
data?
A. UDP
B. TCP
C. IP
D. ICMP
Answer: B
39. Match the following protocols with their port numbers:
A. FTP: ____________ port 144
B. News: ___________ port 23
C. Telnet: ___________ port 69
D. TFTP: ___________ port 53
E. DNS: ____________ port 21
F. POP3: ____________ port 110
G. UDP: ____________ port 6
H. TCP: ____________ port 17
Answer:
A: FTP: port 21
B: News: port 144
C: Telnet: port 23
D: TFTP: port 69
E: DNS: port 53
F: POP3: port 110
G: UDP: port 17
H: TCP: port 6
40. Which protocol is used to find the hardware address of a host from a
known IP address?
A. RARP
B. ARP
C. DNS
D. DHCP
Answer: B
41. The binary equivalent of the decimal number 192 is:
A. 11100000
B. 11000000
C. 01000000
D. 10000000
Answer: B
42. What are the four simple steps that Cisco recommends for network
troubleshooting?
A. ________________
B. ________________
C. ________________
D. ________________
Answer:
A: Ping the loopback (127.0.0.1)
B. Ping the IP address of the host NIC
C. Ping the IP address of the default gateway
D. Ping a device on a different subnet
43. When discussing reserved IP addresses which of the following is
interpreted to mean all networks?
A. Node address of all 1s
B. Network address of all 1s
C. Network address of all 0s
D. Node address of all 0s
Answer: B
44. Which of the following are methods of connection to a Cisco router?
A. Console port
B. Telnet
C. Auxiliary port
D. All of the above
Answer: D
45. True or False: When a router first powers up it will look for and load
a valid configuration file from flash memory.
A. True
B. False
Answer: B
46. Which of the following describes an instant message?
A. provides a way to look at and interact with information on the
Internet
B. allows users to create and send text to other users in real time
C. allows users to send messages and files to users on or outside
their network
D. allows users to store and retrieve information from a central
location
Answer: B
47. Which mode enables you to view and change the configuration of a
Cisco router?
A. Basic Management mode
B. Extended Setup mode
C. User mode
D. Privileged mode
Answer: D
48. The running-config is stored in what memory?
A. NVRAM
B. DRAM
C. Flash memory
D. Short-term memory
Answer: B
49. What command mode must you be in if you wish to change the
configuration of a router?
A. User mode
B. Administrative Exec mode
C. Privileged mode
D. Superuser mode
Answer: C
50. When setting the auxiliary password what command must you
remember to use so the router will prompt for authentication?
A. Logon
B. Login
C. Authentication
D. Password
Answer: B
51. Which command is used to manually encrypt your passwords?
A. Manual encryption
B. Manual-encryption
C. Service password encryption
D. Service password-encryption
Answer: D
52. Which command is used to enable an interface?
A. No shutdown
B. Interface turn on
C. Interface turn-on
D. No shut-down interface
Answer: A
53. What is the default administrative distance of a static route if you
use an exit interface instead of a next hop address?
A. 1
B. 0
C. 15
D. 110
Answer: B
54. Which of the following information will enable a router to route
packets?
A. Possible routers to all remote networks
B. The best route to each remote network
C. How to maintain and verify routing information
D. The destination address
E. The neighbor routers from which it can learn about remote
networks
F. All of the above.
Answer: F
55. True or False: Routers, by default, only know about their directly-
connected networks.
A. True
B. False
Answer: A
56. To enable OSPFv3, you enable the protocol at the interface level.
The command string is
_____________________________________.
Answer: ipv6 ospf process-id area area-id.
57. ____________________ is the process of an administrator manually
adding routes in each routers routing table.
Answer: Static routing
58. ____________________ is used to send packets with a remote
destination network not in the routing table to the next hop router.
Answer: Default routing
59. ____________________ is the process of using protocols to find and
update routing tables on routers.
Answer: Dynamic routing
60. On what type of networks can default routing be used?
A. Dynamic
B. Static
C. Stub
D. Homogeneous
Answer: C
61. State the definition of an autonomous system (AS).
________________________________________
Answer: An autonomous system (AS) is a collection of networks
under a common administrative domain.
62. For what purpose is an administrative distance (AD) used?
A. To administer a remote network
B. To administer a remote router
C. To rate the trustworthiness of a remote network
D. To rate the trustworthiness of routing information received on
a router from a neighbor router
Answer: D
63. State the three classes of routing protocols:
A. __________________
B. __________________
C. __________________
Answer:
A: Distance vector routing protocols.
B: Link state routing protocols.
C: Hybrid routing protocols.
64. RIP uses only ______________ to determine the best path to an
internetwork.
Answer: hop count
65. RIP can perform load balancing for up to how many equal-cost links
by default in pre 15.0 code?
A. One
B. Two
C. Four
D. Six
Answer: D
66. What is the default maximum hop count for RIP?
A. One
B. Six
C. Fifteen
D. Sixteen
Answer: C
67. A solution for routing loop problems that reduces incorrect routing
information and routing overhead in a distance-vector network by
not enabling information to be sent back in the direction from which
it was received is known as ________________.
Answer: split horizon.
68. An IPv6 link-local address always start with?
Answer: FF80::/10
69. A _________ unicast range start with FC00::/7.
Answer: unique local.
70. A _________ packet is addressed and delivered to only a single
interface
Answer: unicast.
71. Bridges and switches use which of the following to filter a network?
A. Network addresses.
B. Network addresses and subnet masks
C. ATM addresses
D. MAC addresses
Answer: D
72. Which type of cable should be used when connecting between Cisco
switches?
A. Straight-through
B. Cross-over
C. Null modem
D. Cisco proprietary DB9
Answer: B
73. Your hosts is connected to a switch and you have steady green lights
on both your NIC and the switch port. However, when you ping
from the host, you receive a request timed out message. What
layer of the OSI does the problem most likely exist?
A. Transport
B. Network
C. Data Link
D. Physical
Answer: B
74. A host receives a frame and computes the checksum and determines
that the frame is damaged. The frame is discarded. At what layer of
the OSI model did this happen?
A. Transport
B. Network
C. Data link
D. Physical
Answer: C
75. What command will you type on a serial interface to verify the cable
type that is connected?
A. show interfaces s0/0
B. show processes s0/0
C. show run
D. show controllers s0/0
Answer: D
76. Which switch IOS command allows access to high-level commands,
such as debug?
A. ip default-gateway
B. hostname
C. ip address
D. configure terminal
E. enable
Answer: E
77. How does a switch populate the switch table?
A. by reading broadcasts sent through the switch
B. by reading the destination hardware address of a frame
C. by reading the source hardware address of a packet
D. by reading the source hardware address of a frame
Answer: D
78. Which switch IOS command allows access to configuration
commands that affect the system as a whole?
A. ip default-gateway
B. hostname
C. ip address
D. configure terminal
E. enable
Answer: D
79. Name two different types of links in a switched environment:
A. __________________________
B. __________________________
Answer:
A: Access links
B: Trunk links
80. Which of the following is used to store a Cisco routers IOS by
default?
A. Flash memory
B. NVRAM
C. RAM
D. DRAM
Answer: A
81. Which of the following is used to store a router and switch
configuration?
A. Flash memory
B. NVRAM
C. RAM
D. DRAM
Answer: B
82. _________________ is used to control how the router boots up.
Answer: The configuration register
83. Which switch IOS command allows the switch to be managed from
remote networks?
A. ip default-gateway
B. hostname
C. ip address
D. configure terminal
E. enable
Answer: A
84. Which CDP command output provides parameters for the CDP timer
and holdtime?
A. sh cdp nei
B. sh cdp
C. sh nei
D. sh cdp neighbor detail
Answer: B
85. The ______________ command shows the hop or hops that a packet
traverses on its way to a remote device.
Answer: traceroute
86. The ______________ command is used to provide name resolution
on the router on which it was built.
Answer: ip host
87. Which switch IOS command sets the switch management IP
address?
A. ip default-gateway
B. hostname
C. ip address
D. configure terminal
E. enable
Answer: C
88. State the two methods of authentication that can be used with PPP
links:
A. ____________
B. ____________
Answer:
A: Password Authentication Protocol (PAP)
B: Challenge Authentication Protocol (CHAP)
89. True or False: Named access lists are an exclusive replacement for
extended IP access lists.
A. True
B. False
Answer: B
90. The access list type that only examines the source IP address in a
packet, is:
A. Source Access List
B. Standard Access Lists
C. Extended Access Lists
D. Simple Access Lists
Answer: B
91. Indicate whether the following statements are either true or false.
A. Packets are always compared to each line of the access list in
sequential order.
B. Packets are compared to all lines of the access list.
C. There is an implicit deny at the beginning of each access
list.
Answer:
A: True
B: False. Packets are compared with lines of the access list only until
a match is made.
C: False. There is an implicit deny at the end of each access list.
92. Extended access lists (IP) check for which of the following? (Choose
all that apply.)
A. Source IP address
B. Destination IP address
C. Protocol field
D. Port number
Answer: A, B, C, D
93. Standard access lists (IP) check for which of the following?
A. Source IP address
B. Destination IP address
C. Protocol field
D. Port number
Answer: A
94. _____________ are used with access lists to specify a host, network,
or part of a network.
Answer: Wildcards
95. __________________ is located at the subscribers premises.
Answer: Customer Premises Equipment (CPE)
96. The ______________ is the last responsibility of the service
provider.
Answer: Demarcation (demarc)
97. The ________________ connects the demarc to the closest
switching office.
Answer: Local loop
98. The _______________ connects the customer to the providers
switching network.
Answer: Central Office (CO)
99. Which switch IOS command sets the system name?
A. ip default-gateway
B. hostname
C. ip address
D. configure terminal
E. enable
Answer: B
100. _______________ is used to encapsulate packets that connect a T1
between a Cisco router and a non-Cisco router
Answer: PPP
101. ______________ is a proprietary connection-oriented protocol used
at the Data Link layer and carries no identification of the type of
protocol being carried inside its encapsulation.
Answer: High-Level Data Link Control (HDLC)
102. What protocol can be used to synchronize the time on network
devices?
A. Network time protocol
B. Time sync protocol
C. Sync time protocol
D. Network sync protocol
Answer: A
103. DHCP can provide all of the following but what?
A. IP address
B. Domain name
C. Default gateway
D. Computer name
Answer: D
104. Which two of the following commands are required when
configuring SSH on your router? (Choose two.)
A. enable secret password
B. exec-timeout 0 0
C. ip domain-name name
D. username name password password
E. ip ssh version 2
Answer: C, D
105. Which if the following is not an issue addressed by STP?
A. Broadcast storms
B. Gateway redundancy
C. A device receiving multiple copies of the same frame
D. Constant updating of the MAC filter table
Answer: B
106. Which of the following statements is true with regard to ISL and
802.1q?
A. 802.1q encapsulates the frame with control information; ISL
inserts an ISL field along with tag control information.
B. 802.1q is Cisco proprietary.
C. ISL encapsulates the frame with control information; 802.1q
inserts an 802.1q field along with tag control information.
D. ISL is a standard.
Answer: C
Unlike ISL which encapsulates the frame with control information,
802.1q inserts an 802.1q field along with tag control information.
107. Ethernet networking uses what protocol to help devices share the
bandwidth evenly while preventing two devices from transmitting
simultaneously on the same network medium?
A. STP
B. Ethernet collision avoidance protocol
C. CSMA/CD
D. CSMA/CA
Answer: C
108. True or False: Content Addressable Memory (CAM) filter table uses
software technology to build and maintain their MAC filter tables.
A. True
B. False
Answer: B
109. Cisco EtherChannel allows us to bundle up to how many active ports
between switches?
A. 2
B. 4
C. 6
D. 8
Answer: D
110. You want to ping the loopback address of your IPv6 local host. What
will you type?
A. ping 127.0.0.1
B. ping 0.0.0.0
C. ping ::1
D. trace 0.0.::1
Answer: C
111. Which of the following statements about IPv6 addresses are true?
(Choose two.)
A. Leading zeros are required.
B. Two colons (::) are used to represent successive hexadecimal
fields of zeros.
C. Two colons (::) are used to separate fields.
D. A single interface will have multiple IPv6 addresses of
different types.
Answer: B, D
112. To enable OSPFv3, which of the following would you use?
A. Router(config-if)#ipv6 ospf 10 area
0.0.0.0
B. Router(config-if)#ipv6 router rip 1
C. Router(config)#ipv6 router eigrp 10
D. Router(config-rtr)#no shutdown
E. Router(config-if)#ospf ipv6 10 area 0
Answer: A
113. In reserved IP addressing, the network address is all 1's. What does
this mean?
A. This network or segment
B. Any host on this network
C. A default route
D. All networks
Answer: D
114. Layer 2 broadcasts are sent to what?
A. All nodes on a LAN
B. All nodes on a WAN
C. All networks
D. A single destination host
Answer: A
115. In IPv6 expression, using the address
2001:0db8:3c4d:0012:0000:0000:1234:56ab
Which of the following is an acceptable way to shorten this address?
A. 2001::12::1234:56ab
B. 2001:db8:3c4d:12::1234:56ab
C. 21:db8:3c4d:12::1234:56ab
D. 2001:db8:3c4d::12::1234:56ab
Answer: B
116. Which of the following describe the process identifier that is used to
run OSPF on a router? (Choose two.)
A. It is locally significant.
B. It is globally significant.
C. It is needed to identify a unique instance of an OSPF
database.
D. It is an optional parameter required only if multiple OSPF
processes are running on the router.
E. All routes in the same OSPF area must have the same process
ID if they are to exchange routing information.
Answer: A, C
117. Which two of the following are true regarding the distance-vector
and link-state routing protocols? (Choose two.)
A. Link state sends its complete routing table out of all active
interfaces at periodic time intervals.
B. Distance vector sends its complete routing table out of all
active interfaces at periodic time intervals.
C. Link state sends updates containing the state of its own links
to all routers in the internetwork.
D. Distance vector sends updates containing the state of its own
links to all routers in the internetwork.
Answer: B, C
118. What are the minimum factors a router must know to be able to
affectively route packets?
A. Destination address
B. Possible routes to all remote networks
C. The best route to each remote network
D. Neighbor routers
E. B&C
F. All the above
Answer: F
119. When a router boots up, it performs a POST. Where is the POST
located on a router?
A. RAM
B. NVRAM
C. ROM
D. NVROM
Answer: C
120. When configuring the clock rate command on a serial interface,
how many seconds is the clock rate?
A. megabytes per second
B. bytes per second
C. bits per seconds
D. gigabytes per second
Answer: C
121. What does a next hop of 0.0.0.0 mean in the show ip bgp
command output?
A. The router does not know the next hop.
B. Network is locally originated via network command in BGP.
C. It is not a valid network.
D. The next hop is not reachable.
Answer: B
122. Which command would you place on an interface connected to the
Internet?
A. ip nat inside
B. ip nat outside
C. ip outside global
D. ip inside local
Answer: B
123. If you want to exclude certain IP addresses from being issued to
hosts such as servers or printers by a router configured with dhcp,
what command can you use?
A. Router(config-dhcp)#ip exclude address ip
addresses
B. Router(config)#dhcp exclude address ip
addresses
C. Router(config-dhcp)#ip dhcp-exclude
address ip addresses
D. Router(config)#ip dhcp excluded-address
ip addresses
Answer: D
124. Standard Access Lists filter traffic based on what?
A. Source IP address in a packet
B. Destination IP address in a packet
C. Source MAC address in a frame
D. Destination MAC address in a frame
Answer: A
125. True or False: Extended access-list ranges are from 1000-1999.
A. True
B. False
Answer: B
Extended access-list ranges are from 100 to 199 and 20002699.
126. Overloading is the most popular form of NAT. It is also known as
what?
A. 1 to 1 NAT
B. Source addressing NAT
C. One way NAT
D. PAT
Answer: D
127. Which of the following commands sets the privileged mode
password to Cisco and encrypts the password?
A. enable secret password Cisco
B. enable secret cisco
C. enable secret Cisco
D. enable password Cisco
Answer: C
128. Which two of the following switch port violation modes will alert
you via SNMP that a violation has occurred on a port?
A. Restrict
B. Protect
C. Shutdown
D. Err-disable
Answer: B, C
129. Which Cisco IOS command is used to verify the port security
configuration of a switch port?
A. show interfaces port-security
B. show port-security interface
C. show ip interface
D. show interfaces switchport
Answer: B
130. When configuring security on switch ports, which options can you
choose from when a violation occurs on a particular port? (Choose
three)
A. protect
B. disable
C. restrict
D. shutdown
Answer: A, C, D
131. Which of the following would put switch interfaces into
EtherChannel port number 1, using LACP? (Choose two.)
A. Switch(config)#interface port-channel 1
B. Switch(config)#channel-group 1 mode
active
C. (config-if)#Switch#interface port-channel
1
D. Switch(config-if)#channel-group 1 mode
active
Answer: A, D
132. Which should you look for when troubleshooting an adjacency?
(Choose four.)
A. Verify the AS numbers.
B. Verify that you have the proper interfaces enabled for EIGRP.
C. Make sure there are no mismatched K values.
D. Check your passive -interface settings.
E. Make sure your remote routers are no connected to the
Internet.
F. If authentication is configured, make sure all routers use
different passwords.
Answer: A, B, C, D
133. The cloud service models define which services the cloud service
providers offer. Depending on which types of service you can get
from a cloud, which of the following three service models exist?
(Choose 3)?
A. Infrastructure as a Service (IaaS)
B. Cloud as a Service (CaaS)
C. Platform as a Service (PaaS):
D. Software as a Service (SaaS)
Answer: A, C, D
134. To test the local IP stack to see if it is working, what address should
you ping?
A. IP address
B. Loopback address
C. Default gateway address
D. APIPA address
Answer: B
135. What does using SDN in your network mean?
A. Network engineers will be out of a job because everything
will be automated.
B. You will have to replace all existing software.
C. You will have to replace all existing hardware.
D. You will be able to react faster when a new business
requirement arises.
Answer: D
136. Which VLAN is typically the administrative VLAN on a Switch?
A. VLAN 1
B. VLAN 2
C. VLAN 3
D. VLAN 5
Answer: A
VLAN 1 is the default administrative VLAN on a Cisco switch.
137. The cloud service models define which services the cloud service
providers offer. Depending on which types of service you can get
from a cloud, which of the following three service models exist?
(Choose 3)?
A. Infrastructure as a Service (IaaS)
B. Cloud as a Service (CaaS)
C. Platform as a Service (PaaS):
D. Software as a Service (SaaS)
Answer: A, C, D
138. Which of the following are benefits of using a VPN in your
internetwork? (Choose three.)
A. Security
B. Private high-bandwidth links
C. Cost savings
D. Incompatibility with broadband technologies
E. Scalability
Answer: A, C, E
139. Which of the following is true regarding WAN technologies?
(Choose three.)
A. You must use PPP on a link connecting two routers using a
point-to-point lease line.
B. You can use a T1 to connect a customer site to the ISP.
C. You can use a T1 to connect a Frame Relay connection to the
ISP.
D. You can use Ethernet as a WAN service by using EoMPLS.
E. When using an Ethernet WAN, you must configure the DLCI.
Answer: B, C, D
140. What is a data-carrying mechanism that emulates some properties of
a circuit-switched network over a packet-switched network?
A. HDLC
B. PPP
C. Frame Relay
D. MPLS
Answer: D
141. What is the default encapsulation used by Cisco routers over
synchronous serial links.
A. PPP
B. MPLS
C. HDLC
D. 802.1Q
Answer: C
142. The following configuration was made on RouterA. What is the
purpose of the "pap" authentication configuration?
RouterA#config t
RouterA(config)#int s0
RouterA(config-if)#ppp authentication chap pap
RouterA(config-if)#^Z
RouterA#

A. It is used to verify the chap authentication.


B It is used as a backup in the event chap fails
C. It is the password for chap authentication
D. Both chap and pap are needed together to verify
authentication.
Answer: B
143. What command can be used on a Cisco router to display the ARP
cache?
A. arp -a
B. show arp address
C. show arp cache
D. show ip arp
Answer: D
144. What is the sys-id-ext field in a BPDU used for?
A. This is a 4-bit field inserted into an Ethernet frame to define
trunking information between switches.
B. This is a 12-bit field inserted into an Ethernet frame to define
VLANs in an STP instance.
C. This is a 4-bit field inserted into an non-Ethernet frame to
define EtherChannel options.
D. This is a 12-bit field inserted into an Ethernet frame to define
STP root bridges.
Answer: B
145. You have four RSTP PVST+ links between switches and want to
aggregate the bandwidth. What solution will you use?
A. EtherChannel
B. PortFast
C. BPDU Channel
D. VLANs
E. EtherBundle
Answer: A
146. What configuration parameters must be configured the same
between switches for LACP to form a channel? (Choose three.)
A. Virtual MAC address
B. Port speeds
C. Duplex
D. PortFast enabled
E. VLAN information
Answer: B, C, E
147. You reload a router with a configuration register setting of 0x2101.
What will the router do when it reloads?
A. The router enters setup mode.
B. The router enters ROM monitor mode.
C. The router boots the mini-IOS in ROM.
D. The router expands the first IOS in flash memory into RAM.
Answer: C
2100 boots the router into ROM monitor mode, 2101 load the mini-
IOS from ROM, 2102 is the default and loads the IOS from flash.
148. Which of the following commands provides the product ID and
serial number of a router?
A. show license
B. show license feature
C. show version
D. show license udi
Answer: D
149. Which command allows you to view the technology options and
licenses that are supported on your router along with several status
variables?
A. show license
B. show license feature
C. show license udi
D. show version
Answer: B
150. Between which two planes are SDN southbound interfaces used?
(Choose two)
A. switching plane
B. data plane
C. routing plane
D. application plane
E. OpenFlow
Answer: A, C
151. You want to send console message to a syslog server, but you only
want to send status messages of 3 and lower. Which of the following
commands will you use?
A. logging trap emergencies
B. logging trap errors
C. logging trap debugging
D. logging trap notifications
E. logging trap critical
F. logging trap warnings
G. logging trap alerts
Answer: B
152. What is With Cloud Computing and its effect on the enterprise
network, which four are advantages to cloud service builder or
provider? (Choose 4)
A. Cost reduction from standardization and automation
B. Cost reduction from non-standardization and specialized
automation of each vendor
C. High utilization through virtualized, shared resources
D. Easier administration
E. Fail-off-auto-on operations model
F. Fail-in-place operations model
Answer: A, C, D, F
153. What command is used to view the IPv6-to-MAC-address resolution
table on a Cisco router?
A. show ip arp
B. show ipv6 arp
C. show ip neighbors
D. show ipv6 neighbors
E. show arp
Answer: D
154. An IPv6 ARP entry is listed as with a status of REACH. What can
you conclude about the IPV6-to-MAC-address mapping?
A. The interface has communicated with the neighbor address
and the mapping is current.
B. The interface has not communicated within the neighbor
reachable time frame.
C. The ARP entry has timed out.
D. IPv6 can reach the neighbor address but the addresses has not
yet been resolved.
Answer: A
155. What command produced the following output?
via FE80::201:C9FF:FED0:3301 (29110112/33316), Serial0/0/0
via FE80::209:7CFF:FE51:B401 (4470112/42216), Serial0/0/1
via FE80::209:7CFF:FE51:B401 (2170112/2816), Serial0/0/2
A. show ip protocols
B. show ipv6 protocols
C. show ip eigrp neighbors
D. show ipv6 eigrp neighbors
E. show ip eigrp topology
F. show ipv6 eigrp topology
Answer: F
156. You need to troubleshoot an adjacency between two EIGRP
configured routers? What should you look for? (Choose four.)
A. Verify the AS numbers.
B. Verify that you have the proper interfaces enabled for EIGRP.
C. Make sure there are no mismatched K values.
D. Check your passive interface settings.
E. Make sure your remote routers are not connected to the
Internet.
F. If authentication is configured, make sure all routers use
different passwords.
Answer: A, B, C, D
157. You have two OSPF directly configured routers that are not forming
an adjacency. What should you check? (Choose three.)
A. Process ID
B. Hello and dead timers
C. Link cost
D. Area
E. IP address/subnet mask
Answer: B, D, E
158. When do two adjacent routers enter the 2WAY state?
A. After both routers have received Hello information
B. After they have exchanged topology databases
C. When they connect only to a DR or BDR
D. When they need to exchange RID information
Answer: A
159. Which type of LSAs are generated by ABRs and referred to as
summary link advertisements (SLAs)?
A. Type 1
B. Type 2
C. Type 3
D. Type 4
E. Type 5
Answer: C
160. Which of the following is not provided by the AH portion of IPsec?
A. Integrity
B. Confidentiality
C. Authenticity
D. Anti-replay
Answer: B

You might also like