12
You got 0 out of 25 correct. (That's 0%.) Scroll through the page to review your answers. The correct answer is highlighted in green. Your incorrect answers (if any) are highlighted in red. If you'd like to take th e test over again, clic k the reset button a t the end of the test. 01. Why would a network administrator configure port security on a switch? (A) to prevent unauthorized Telnet access to a switch port (B) to limit the number of Layer 2 broadcasts on a particular switch port (C) to prevent unauthorized hosts from accessing the LAN (D) to protect the IP and MAC address of the switch and associated ports (E) to block unauthorized access to the switch management interfaces over common TCP ports 02. Which form of NAT maps multiple private IP addresses to a single registered IP address by using different ports? (A) static NAT (B) dynamic NAT (C) overloading (D) overlapping (E) port loading 03. What should be part of a comprehensive network security plan? (A) Allow users to develop their own approach to network security (B) Physically secure network equipment from potential access by unauthorized individuals (C) Encourage users to use personal information in their passwords to minimize the likelihood of passwords being forgotten (D) Delay deployment of software patches and updates until their effect on end-user equipment is well known and widely reported (E) Minimize network overhead by deactivating automatic antivirus client updates 04. Which of the following commands wi ll configure a default route to any destination network not found in the routing table?

You Got 0 Out of 25 Correct

Embed Size (px)

Citation preview

Page 1: You Got 0 Out of 25 Correct

8/8/2019 You Got 0 Out of 25 Correct

http://slidepdf.com/reader/full/you-got-0-out-of-25-correct 1/12

You got 0 out of 25 correct. (That's 0%.)

Scroll through the page to review your answers. The correct answer is highlighted in green. Your incorrect

answers (if any) are highlighted in red. If you'd like to take the test over again, click the reset button atthe end of the test.

01. Why would a network administrator configure port security on a switch?

(A) to prevent unauthorized Telnet access to a switch port

(B) to limit the number of Layer 2 broadcasts on a particular switch port

(C) to prevent unauthorized hosts from accessing the LAN

(D) to protect the IP and MAC address of the switch and associated ports

(E) to block unauthorized access to the switch management interfaces over common TCP ports

02. Which form of NAT maps multiple private IP addresses to a single registered IP address byusing different ports?

(A) static NAT

(B) dynamic NAT

(C) overloading

(D) overlapping

(E) port loading

03. What should be part of a comprehensive network security plan?

(A) Allow users to develop their own approach to network security

(B) Physically secure network equipment from potential access by unauthorized individuals

(C) Encourage users to use personal information in their passwords to minimize the likelihood of passwords being forgotten

(D) Delay deployment of software patches and updates until their effect on end-user equipment is wellknown and widely reported

(E) Minimize network overhead by deactivating automatic antivirus client updates

04. Which of the following commands will configure a default route to any destination networknot found in the routing table?

Page 2: You Got 0 Out of 25 Correct

8/8/2019 You Got 0 Out of 25 Correct

http://slidepdf.com/reader/full/you-got-0-out-of-25-correct 2/12

(A) Router(config)# ip default-route 0.0.0.0 255.255.255.255 s0

(B) Router(config)# ip route 0.0.0.0 255.255.255.255 s0

(C) Router(config)# ip default-route 0.0.0.0 s0

(D) Router(config)# ip route 0.0.0.0 0.0.0.0 s0

(E) Router(config)# ip route any any e0

05. For security reasons, information about RTA, including platform and IP addresses, should notbe accessible from the Internet. This information should, however, be accessible to devices onthe internal networks of RT A. Which command or series of commands will accomplish theseobjectives?

(A) RTA(config)#no cdp run

(B) RTA(config)#no cdp enable

(C) RTA(config)#interface s0/0

RTA(config-if)#no cdp run

(D) RTA(config)#interface s0/0RTA(config-if)#no cdp enable

06. What is the purpose of flow control?

(A) to ensure data is retransmitted if an acknowledgment is not received

(B) to reassemble segments in the correct order at the destination device

(C) to provide a means for the receiver to govern the amount of data sent by the sender

(D) to regulate the size of each segment

07. Host A has established a communication session with host B for the first time. What enabled

R1 to forward this traffic in the appropriate direction to reach the nework to which host B isattached?

(A) DNS

(B) DHCP

(C) TCP/IP

Page 3: You Got 0 Out of 25 Correct

8/8/2019 You Got 0 Out of 25 Correct

http://slidepdf.com/reader/full/you-got-0-out-of-25-correct 3/12

(D) a Layer 4 protocol

(E) a routing protocol

(F) a default gateway

08. What does the "Inside Global" address represent in the configuration of NAT?

(A) the summarized address for all of the internal subnetted addresses

(B) the MAC address of the router used by inside hosts to connect to the Internet

(C) a globally unique, private IP address assigned to a host on the inside network

(D) a registered address that represents an inside host to an outside network

09. How many simultaneous Telnet sessions does a Cisco router support by default?

(A) 1

(B) 2

(C) 3

(D) 4

(E) 5

(F) 6

10. which prompt is the global configuration mode on a Cisco router identified?

(A) Router>

(B) Router#

(C) Router(config)#

(D) Router(config-if)#

(E) Router(config-line)#c

(F) Router(config-router)#

Page 4: You Got 0 Out of 25 Correct

8/8/2019 You Got 0 Out of 25 Correct

http://slidepdf.com/reader/full/you-got-0-out-of-25-correct 4/12

11. Host A is communicating with the server. What will be the source MAC address of the framesreceived by Host A from the server?

(A) the MAC address of router interface e0

(B) the MAC address of router interface e1

(C) the MAC address of the server network interface

(D) the MAC address of host A

12. Which IP address is a private address?

(A) 12.0.0.1

(B) 168.172.19.39

(C) 172.20.14.36

(D) 172.33.194.30

(E) 192.169.42.34

13. Which encryption type does WPA2 use?

(A) AES-CCMP

(B) PPK via IV

(C) PSK

(D) TKIP/MIC

14. Which of the following protocols uses both TCP and UDP ports?

(A) FTP

(B) SMTP

(C) Telnet

(D) DNS

15. Three access points have been installed and configured to cover a small office. What term

defines the wireless topology?

Page 5: You Got 0 Out of 25 Correct

8/8/2019 You Got 0 Out of 25 Correct

http://slidepdf.com/reader/full/you-got-0-out-of-25-correct 5/12

(A) BSS

(B) IBSS

(C) ESS

(D) SSID

16. Which command is used on a Cisco router to reach the global configuration mode?

(A) Router> enable

(B) Router# router

(C) Router# setup

(D) Router# interface

(E) Router# configure terminal

17. Which command will set the default gateway to 192.168.12.1 on a Cisco switch?

(A) Switch(config)# ip default-network 192.168.12.1

(B) Switch(config)# ip route-default 192.168.12.1

(C) Switch(config)# ip default-gateway 192.168.12.1

(D) Switch(config)# ip route 192.168.12.1 0.0.0.0

18. What is the effect of using the service password-encryption command?

(A) Only the enable password will be encrypted

(B) Only the enable secret password will be encrypted

(C) Only passwords configured after the command has been entered will be encrypted

(D) It will encrypt the secret password and remove the enable secret password from the configuration

(E) It will encrypt all current and future passwords

19. What is the purpose of a default route?

Page 6: You Got 0 Out of 25 Correct

8/8/2019 You Got 0 Out of 25 Correct

http://slidepdf.com/reader/full/you-got-0-out-of-25-correct 6/12

(A) It is a route to be used when the routing protocol fails

(B) It is a route configured by an ISP that sends traffic into a corporate network

(C) It is a route used when a packet is destined for a remote network that is not listed in the routingtable.

(D) It is a route manually configured for a specific remote network for which a routing protocol is notconfigured.

(E) It is used to send traffic to a stub network

20. Workstation A must be able to telnet to switch SW-A through router RTA for managementpurposes. What must be configured for this connection to be successful?

(A) VLAN 1 on RTA

(B) default gateway on SW-A

(C) IP routing on SW-A

(D) cross-over cable connecting SW-A and RTA

21. At which layer of the OSI model does the protocol that provides the information displayed bythe show cdp neighbors command operate?

(A) physical

(B) data link

(C) network

(D) transport

(E) application

22. Serial0/0 does not respond to a ping request from a host on the FastEthernet0/0 LAN. Howcan this problem be corrected?

(A) Enable the Serial 0/0 interface

(B) Correct the IP address for Serial 0/0

(C) Correct the IP address for FastEthernet 0/0

(D) Change the encapsulation type on Serial 0/0

Page 7: You Got 0 Out of 25 Correct

8/8/2019 You Got 0 Out of 25 Correct

http://slidepdf.com/reader/full/you-got-0-out-of-25-correct 7/12

(E) Enable autoconfiguration on the Serial 0/0 interface23. Which form of NAT maps multiple private IP addresses to a single registered IP address byusing different ports?

(A) static NAT

(B) dynamic NAT

(C) overloading

(D) overlapping

(E) port loading

24. Why would a network administrator configure port security on a switch?

(A) to prevent unauthorized Telnet access to a switch port

(B) to limit the number of Layer 2 broadcasts on a particular switch port

(C) to prevent unauthorized hosts from accessing the LAN

(D) to protect the IP and MAC address of the switch and associated ports

(E) to block unauthorized access to the switch management interfaces over common TCP ports25. Which form of NAT maps multiple private IP addresses to a single registered IP address byusing different ports?

(A) static NAT

(B) dynamic NAT

(C) overloading

(D) overlapping

(E) port loading

20 CCNA Practice Test Questions

Top of Form

You got 0 out of 20 correct. (That's 0%.)

Page 8: You Got 0 Out of 25 Correct

8/8/2019 You Got 0 Out of 25 Correct

http://slidepdf.com/reader/full/you-got-0-out-of-25-correct 8/12

Scroll through the page to review your answers. The correct answer is highlighted in green. Yourincorrect answers (if any) are highlighted in red. If you'd like to take the test over again, click the

reset button at the end of the test.

01. At what layer in the OSI model would you find protocols such as RIP and OSPF?

(A) Session

(B) Transport

(C) Network

(D) Data Link

02. What is the difference between an 802.3 frame and an Ethernet frame?

(A) The 802.3 frame has a length field, and the Ethernet frame has a type field

(B) The 802.3 frame has a type field, and the Ethernet frame has a length field

(C) The frames are completely different

(D) The frames are exactly the same

03. Where is the running configuration located?

(A) RAM

(B) ROM

(C) NVRAM

(D) Flash memory

04. To force the router to ignore the configuration file in NVRAM, the configuration registershould be set to which of the following ?

(A) 0x2102

(B) 0x4102

(C) 0x2142

(D) 0x2101

05. The CSMA/CD access method is defined by what IEEE standard?

Page 9: You Got 0 Out of 25 Correct

8/8/2019 You Got 0 Out of 25 Correct

http://slidepdf.com/reader/full/you-got-0-out-of-25-correct 9/12

(A) 802.1

(B) 802.2

(C) 802.3

(D) 802.4

06. What is the MTU for Ethernet?

(A) 64

(B) 512

(C) 1,500

(D) 1,518

07. Which topology is specified in the IEEE 802.5 standard?

(A) Star

(B) Bus

(C) Hub-and-spoke

(D) None of the above

08. Which of the following are true regarding STP?

(A) A two-line channel can be treated as a loop

(B) A VLAN can have multiple instances of STP

(C) VTP eliminates the need for STP

(D) STP is irrelevant in routed networks

09. Which of the following is the well-known TCP port for SMTP?

(A) 23

(B) 21

Page 10: You Got 0 Out of 25 Correct

8/8/2019 You Got 0 Out of 25 Correct

http://slidepdf.com/reader/full/you-got-0-out-of-25-correct 10/12

(C) 67

(D) 25

10. What address mask is associated with the following, 172.240.1.10/22?

(A) 255.255.255.0

(B) 255.255.252.0

(C) 255.255.255.252

(D) 255.255.255.248

11. What do the following “ping” results indicate?

router>ping 192.168.10.3Type escape sequence to abort.

Sending 5, 100-byte ICMP Echos to 192.168.10.3, timeout is 2 seconds:.UU

(A) There is no route within the routing table to the specified host

(B) There is a route to the specified host, but there was some kind of routing failure

(C) The specified host is not connected to the network

(D) The specified host is connected to the network but did not reply for some reason. packet for

output to the next network

12. What is DUAL?

(A) A Cisco proprietary routing protocol

(B) A routing algorithm

(C) A mnemonic device for configuring default routes

(D) A loop prevention technique

13. Distance Vector protocols use what algorithm?

(A) DUAL

(B) FIFO

Page 11: You Got 0 Out of 25 Correct

8/8/2019 You Got 0 Out of 25 Correct

http://slidepdf.com/reader/full/you-got-0-out-of-25-correct 11/12

(C) Bellman-Ford

(D) SPF

14. A router has a route to 10.0.0.0 255.0.0.0 via RIP. It also has a route to 10.6.0.0255.255.0.0 via IGRP. It wants to send a packet to 10.6.12.3. How will the packet be sent?

(A) Via the RIP route

(B) Via the IGRP route

(C) It will not be sent

(D) It will be sent to the default route

15. Which of the following statements regarding RIP are true?

(A) RIP is a distance vector algorithm

(B) RIP is best suited as an IGP

(C) There are two versions of RIP

(D) All of the above

16. In a RIP routing table, a route with a hop count of ____ indicates that the network isunreachable ?

(A) 0

(B) 15

(C) 1

(D) 16

17. VLSM is possible with ___?

(A) RIPv1

(B) RIPv2

(C) Both A and B

Page 12: You Got 0 Out of 25 Correct

8/8/2019 You Got 0 Out of 25 Correct

http://slidepdf.com/reader/full/you-got-0-out-of-25-correct 12/12

(D) Neither A nor B

18. What are the routing metrics used by IGRP?

(A) TTL

(B) Hop count

(C) Count to Infinity

(D) Bandwidth, Reliability, MTU, Delay, and Load

19. Which of the following does not accept LSAs from any external autonomous systems?

(A) Backbone Area

(B) Totally Stubby Area

(C) Stub Area

(D) NSSA

20. Which of the following prompts indicates that you are in privileged mode?

(A) >

(B) (config)#

(C) #

(D) !

Bottom of Form