You got 0 out of 25 correct. (That's 0%.) Scroll through the page to review your answers.

The correct answer is highlighted in green. Your incorrect answers (if any) are highlighted in red. If you'd like to take the test over again, click the reset button at the end of the test. 01. Why would a network administrator configure port security on a switch? (A) to prevent unauthorized Telnet access to a switch port (B) to limit the number of Layer 2 broadcasts on a particular switch port (C) to prevent unauthorized hosts from accessing the LAN (D) to protect the IP and MAC address of the switch and associated ports (E) to block unauthorized access to the switch management interfaces over common TCP ports 02. Which form of NAT maps multiple private IP addresses to a single registered IP address by using different ports? (A) static NAT (B) dynamic NAT (C) overloading (D) overlapping (E) port loading 03. What should be part of a comprehensive network security plan? (A) Allow users to develop their own approach to network security (B) Physically secure network equipment from potential access by unauthorized individuals (C) Encourage users to use personal information in their passwords to minimize the likelihood of passwords being forgotten (D) Delay deployment of software patches and updates until their effect on end-user equipment is well known and widely reported (E) Minimize network overhead by deactivating automatic antivirus client updates 04. Which of the following commands will configure a default route to any destination network not found in the routing table?

255 s0 (C) Router(config)# ip default-route 0.255.0.255.0. including platform and IP addresses.255.(A) Router(config)# ip default-route 0.0. should not be accessible from the Internet.0 0.0.0 255. Host A has established a communication session with host B for the first time. information about RTA. Which command or series of commands will accomplish these objectives? (A) RTA(config)#no cdp run (B) RTA(config)#no cdp enable (C) RTA(config)#interface s0/0 RTA(config-if)#no cdp run (D) RTA(config)#interface s0/0 RTA(config-if)#no cdp enable 06.0. be accessible to devices on the internal networks of RT A.255 s0 (B) Router(config)# ip route 0.0. For security reasons. What is the purpose of flow control? (A) to ensure data is retransmitted if an acknowledgment is not received (B) to reassemble segments in the correct order at the destination device (C) to provide a means for the receiver to govern the amount of data sent by the sender (D) to regulate the size of each segment 07. What enabled R1 to forward this traffic in the appropriate direction to reach the nework to which host B is attached? (A) DNS (B) DHCP (C) TCP/IP .0 s0 (D) Router(config)# ip route 0.0.0.0. This information should.0. however.0 255.255.0 s0 (E) Router(config)# ip route any any e0 05.

(D) a Layer 4 protocol (E) a routing protocol (F) a default gateway 08. What does the "Inside Global" address represent in the configuration of NAT? (A) the summarized address for all of the internal subnetted addresses (B) the MAC address of the router used by inside hosts to connect to the Internet (C) a globally unique. which prompt is the global configuration mode on a Cisco router identified? (A) Router> (B) Router# (C) Router(config)# (D) Router(config-if)# (E) Router(config-line)#c (F) Router(config-router)# . How many simultaneous Telnet sessions does a Cisco router support by default? (A) 1 (B) 2 (C) 3 (D) 4 (E) 5 (F) 6 10. private IP address assigned to a host on the inside network (D) a registered address that represents an inside host to an outside network 09.

0.30 (E) 192. What term defines the wireless topology? . What will be the source MAC address of the frames received by Host A from the server? (A) the MAC address of router interface e0 (B) the MAC address of router interface e1 (C) the MAC address of the server network interface (D) the MAC address of host A 12.33.19.42.20.194. Which encryption type does WPA2 use? (A) AES-CCMP (B) PPK via IV (C) PSK (D) TKIP/MIC 14.172. Host A is communicating with the server.1 (B) 168.34 13. Which of the following protocols uses both TCP and UDP ports? (A) FTP (B) SMTP (C) Telnet (D) DNS 15.36 (D) 172.169.11.0.14. Which IP address is a private address? (A) 12.39 (C) 172. Three access points have been installed and configured to cover a small office.

168.12.0.168.168.1 (D) Switch(config)# ip route 192.168.0.(A) BSS (B) IBSS (C) ESS (D) SSID 16.12. Which command is used on a Cisco router to reach the global configuration mode? (A) Router> enable (B) Router# router (C) Router# setup (D) Router# interface (E) Router# configure terminal 17. What is the purpose of a default route? .12.1 (C) Switch(config)# ip default-gateway 192.0 18.12. What is the effect of using the service password-encryption command? (A) Only the enable password will be encrypted (B) Only the enable secret password will be encrypted (C) Only passwords configured after the command has been entered will be encrypted (D) It will encrypt the secret password and remove the enable secret password from the configuration (E) It will encrypt all current and future passwords 19.1 (B) Switch(config)# ip route-default 192. Which command will set the default gateway to 192.12.1 0.1 on a Cisco switch? (A) Switch(config)# ip default-network 192.168.

Workstation A must be able to telnet to switch SW-A through router RTA for management purposes. (D) It is a route manually configured for a specific remote network for which a routing protocol is not configured. Serial0/0 does not respond to a ping request from a host on the FastEthernet0/0 LAN. (E) It is used to send traffic to a stub network 20.(A) It is a route to be used when the routing protocol fails (B) It is a route configured by an ISP that sends traffic into a corporate network (C) It is a route used when a packet is destined for a remote network that is not listed in the routing table. What must be configured for this connection to be successful? (A) VLAN 1 on RTA (B) default gateway on SW-A (C) IP routing on SW-A (D) cross-over cable connecting SW-A and RTA 21. How can this problem be corrected? (A) Enable the Serial 0/0 interface (B) Correct the IP address for Serial 0/0 (C) Correct the IP address for FastEthernet 0/0 (D) Change the encapsulation type on Serial 0/0 . At which layer of the OSI model does the protocol that provides the information displayed by the show cdp neighbors command operate? (A) physical (B) data link (C) network (D) transport (E) application 22.

(E) Enable autoconfiguration on the Serial 0/0 interface 23. Which form of NAT maps multiple private IP addresses to a single registered IP address by using different ports? (A) static NAT (B) dynamic NAT (C) overloading (D) overlapping (E) port loading 24.) . Which form of NAT maps multiple private IP addresses to a single registered IP address by using different ports? (A) static NAT (B) dynamic NAT (C) overloading (D) overlapping (E) port loading 20 CCNA Practice Test Questions Top of Form You got 0 out of 20 correct. (That's 0%. Why would a network administrator configure port security on a switch? (A) to prevent unauthorized Telnet access to a switch port (B) to limit the number of Layer 2 broadcasts on a particular switch port (C) to prevent unauthorized hosts from accessing the LAN (D) to protect the IP and MAC address of the switch and associated ports (E) to block unauthorized access to the switch management interfaces over common TCP ports 25.

3 frame has a type field. and the Ethernet frame has a type field (B) The 802.Scroll through the page to review your answers. and the Ethernet frame has a length field (C) The frames are completely different (D) The frames are exactly the same 03. The CSMA/CD access method is defined by what IEEE standard? . click the reset button at the end of the test. What is the difference between an 802. To force the router to ignore the configuration file in NVRAM. the configuration register should be set to which of the following ? (A) 0x2102 (B) 0x4102 (C) 0x2142 (D) 0x2101 05. Where is the running configuration located? (A) RAM (B) ROM (C) NVRAM (D) Flash memory 04. If you'd like to take the test over again. Your incorrect answers (if any) are highlighted in red. At what layer in the OSI model would you find protocols such as RIP and OSPF? (A) Session (B) Transport (C) Network (D) Data Link 02.3 frame and an Ethernet frame? (A) The 802. 01. The correct answer is highlighted in green.3 frame has a length field.

1 (B) 802.3 (D) 802.(A) 802.2 (C) 802. Which of the following are true regarding STP? (A) A two-line channel can be treated as a loop (B) A VLAN can have multiple instances of STP (C) VTP eliminates the need for STP (D) STP is irrelevant in routed networks 09.5 standard? (A) Star (B) Bus (C) Hub-and-spoke (D) None of the above 08.518 07. What is the MTU for Ethernet? (A) 64 (B) 512 (C) 1.500 (D) 1. Which of the following is the well-known TCP port for SMTP? (A) 23 (B) 21 . Which topology is specified in the IEEE 802.4 06.

What is DUAL? (A) A Cisco proprietary routing protocol (B) A routing algorithm (C) A mnemonic device for configuring default routes (D) A loop prevention technique 13.3. 100-byte ICMP Echos to 192.252.10/22? (A) 255.255.252 (D) 255.248 11.255.10. packet for output to the next network 12. timeout is 2 seconds: . What address mask is associated with the following.255.255. 172. What do the following “ping” results indicate? router>ping 192.3 Type escape sequence to abort.255.UU (A) There is no route within the routing table to the specified host (B) There is a route to the specified host. but there was some kind of routing failure (C) The specified host is not connected to the network (D) The specified host is connected to the network but did not reply for some reason.0 (C) 255.1.255.240.0 (B) 255. Sending 5.(C) 67 (D) 25 10.168. Distance Vector protocols use what algorithm? (A) DUAL (B) FIFO .10.255.168.

6.0 via IGRP. VLSM is possible with ___? (A) RIPv1 (B) RIPv2 (C) Both A and B .0 via RIP.0. A router has a route to 10.3.0.0.255.(C) Bellman-Ford (D) SPF 14. It also has a route to 10. a route with a hop count of ____ indicates that the network is unreachable ? (A) 0 (B) 15 (C) 1 (D) 16 17. It wants to send a packet to 10.0.0.6.0. How will the packet be sent? (A) Via the RIP route (B) Via the IGRP route (C) It will not be sent (D) It will be sent to the default route 15. Which of the following statements regarding RIP are true? (A) RIP is a distance vector algorithm (B) RIP is best suited as an IGP (C) There are two versions of RIP (D) All of the above 16. In a RIP routing table.0 255.0 255.12.

Which of the following does not accept LSAs from any external autonomous systems? (A) Backbone Area (B) Totally Stubby Area (C) Stub Area (D) NSSA 20. MTU. and Load 19.(D) Neither A nor B 18. Which of the following prompts indicates that you are in privileged mode? (A) > (B) (config)# (C) # (D) ! Bottom of Form . Delay. Reliability. What are the routing metrics used by IGRP? (A) TTL (B) Hop count (C) Count to Infinity (D) Bandwidth.

Sign up to vote on this title
UsefulNot useful